摘要:
A domain key is used to perform chaining decryption with respect to encrypted content key information (ST203-1), and first data is extracted (ST203-2). The extracted first data is compared with partial-check data (ST203-4). The first data as it is encrypted is extracted from the m pieces of encrypted content key information (ST203-6), and a predetermined operation is executed with respect to concatenated data including m extracted check values to generate second data (ST203-8). The second data is compared with whole-check data included in domain key information (ST203-11). If the first data matches the partial-check data (ST203-5) and the second data matches the whole-check data (ST203-12), it is determined that there is not tampering.
摘要:
In a target apparatus which stores at least one piece of domain key information in a first area and a plurality of pieces of content key information each associated with any one of the domain key information in a second area, a method for generating data for detecting tampering of the content key information. The method comprises the steps of encrypting the content key information associated with one of the domain key information using a chain encryption technique, extracting data at predetermined positions in the encrypted content key information, concatenating the pieces of data extracted at the predetermined positions in the encrypted content key information to obtain concatenated data, performing a hash calculation with respect to the concatenated data to obtain a hash value, storing check values corresponding to the data at the predetermined positions in plain text, in the target apparatus, and storing the hash value in the target apparatus.
摘要:
In a target apparatus which stores at least one piece of domain key information in a first area and a plurality of pieces of content key information each associated with any one of the domain key information in a second area, a method for generating data for detecting tampering of the content key information. The method comprises the steps of encrypting the content key information associated with one of the domain key information using a chain encryption technique; extracting data at predetermined positions in the encrypted content key information, concatenating the pieces of data extracted at the predetermined positions in the encrypted content key information to obtain concatenated data, performing a hash calculation with respect to the concatenated data to obtain a hash value, storing check values corresponding to the data at the predetermined positions in plain text, in the target apparatus, and storing the hash value in the target apparatus.
摘要:
In a target apparatus which stores at least one piece of domain key information in a first area and a plurality of pieces of content key information each associated with any one of the domain key information in a second area, a method for generating data for detecting tampering of the content key information. The method comprises the steps of encrypting the content key information associated with one of the domain key information using a chain encryption technique, extracting data at predetermined positions in the encrypted content key information, concatenating the pieces of data extracted at the predetermined positions in the encrypted content key information to obtain concatenated data, performing a hash calculation with respect to the concatenated data to obtain a hash value, storing check values corresponding to the data at the predetermined positions in plain text, in the target apparatus, and storing the hash value in the target apparatus.
摘要:
In a target apparatus which stores at least one piece of domain key information in a first area and a plurality of pieces of content key information each associated with any one of the domain key information in a second area, a method for generating data for detecting tampering of the content key information. The method comprises the steps of encrypting the content key information associated with one of the domain key information using a chain encryption technique, extracting data at predetermined positions in the encrypted content key information, concatenating the pieces of data extracted at the predetermined positions in the encrypted content key information to obtain concatenated data, performing a hash calculation with respect to the concatenated data to obtain a hash value, storing check values corresponding to the data at the predetermined positions in plain text, in the target apparatus, and storing the hash value in the target apparatus.
摘要:
A semiconductor memory card (101) has a plurality of areas (105, 106) based on different file systems. An adapter (102) includes: an area switching part (110) which a user can operates, a determination part (109) for determining the operation; and a card controller (108) for issuing a switching command for switching the area to be used for the semiconductor memory card (101) in accordance with the judgment result. When the switching command is issued in response to input from the area switching part (110), the command is interpreted by an area selector (107) of the semiconductor memory card (101) so as to select an area.
摘要:
An information recording medium includes a data storage section having a plurality of recording regions for storing data, and a region information storing section operable to store information about each recording region in the data storage section. The region information storing section stores information about a recording region (for example, a recording region has been accessed finally) which is set first as an accessible region when the information recording medium is initialized at the next time among a plurality of recording regions in the data storage section. A data processing apparatus refers to the information about the recording region and changes over a recording region to the recording region specified by the information about the recording region just after initialization of the recording medium.
摘要:
The invention presents an encrypted content playback equipment capable of decryption and playback of an encrypted content by using key information when a key medium storing the key information is not inserted, an encrypted content playback method, a program, and a recording medium for storing the program.An encrypted content playback equipment 100 obtains key information 1 for a key medium 120, and stores the key information 1 in a provisional-key storage memory 102 as provisional key 1a, and obtains provisional-key usage limitation information 2 for limiting the use of provisional key 1a from the key medium 120. The encrypted content playback equipment 100 judges whether the provisional key 1a is usable or not based on the provisional-key usage limitation information 2, and if usable, plays back an encrypted content 3 by using the provisional key 1a.
摘要:
A content search device calculates the number of valid encrypted contents as comparison objects contained in encrypted content databases and the number of valid decryption keys contained in decryption key databases. The database having the smaller number is decided to be a reference database. By successively reading out entries contained in the reference database, a combination of an encrypted content and a corresponding decryption key is searched.
摘要:
An information recording medium (100) is a recording medium to/from which data can be written/read from a data processing apparatus. The recording medium includes a host interface (110) for communicating with the data processing apparatus, a data storage section (130) having a plurality of recording regions (#1, . . . ,#N) for storing data, and a region information storage section (124) for storing information on each recording region. The region information storage section (124) stores information about address attribute of each recording region of the data storage section (130). The information about the address attribute includes information indicating unit (byte or sector) of address specified on access to the recording region.