ENCRYPTION COMMUNICATIONS SYSTEM
    1.
    发明申请
    ENCRYPTION COMMUNICATIONS SYSTEM 有权
    加密通信系统

    公开(公告)号:US20080253567A1

    公开(公告)日:2008-10-16

    申请号:US12142403

    申请日:2008-06-19

    IPC分类号: H04L9/00 H04L9/06

    CPC分类号: G06F21/606 G06F21/10

    摘要: A system structured from a management device, a content key distribution device and a plurality of terminals suppresses the data volume of a terminal revocation list (TRL). The management device generates and transmits a TRL formed from data that expresses terminal IDs of all terminals to be invalidated, by only a value and a position of a common bit string in the IDs, to the content key distribution device. Each terminal holds a terminal ID that includes a manufacturer ID and a serial number, and requests the distribution of a content key by sending the terminal ID to the content key distribution device. The content key distribution device refers to the TRL, judges whether the terminal ID transmitted from the terminal is that of an invalidated terminal, and if negative, encrypts and transmits the content key to the terminal.

    摘要翻译: 由管理装置,内容密钥分发装置和多个终端构成的系统抑制终端撤销列表(TRL)的数据量。 管理装置仅通过ID中的公共位串的值和位置来生成并发送由表示要无效的所有终端的终端ID的数据形成的TRL,并发送到内容密钥分配装置。 每个终端保持包括制造商ID和序列号的终端ID,并且通过将终端ID发送到内容密钥分发设备来请求分发内容密钥。 内容密钥分发装置是指TRL,判断从终端发送的终端ID是否为无效终端,如果是否定的,则加密并发送内容密钥到终端。

    DATA PROTECTION SYSTEM THAT PROTECTS DATA BY ENCRYPTING THE DATA

    公开(公告)号:US20100034388A1

    公开(公告)日:2010-02-11

    申请号:US12104165

    申请日:2008-04-16

    IPC分类号: H04L9/00 G06F7/04

    摘要: A data protection system is provided that reduces, to a degree, the amount of encrypted data that is distributed to a plurality of terminals. In the data protection system a terminal whose decryption keys are exposed by a dishonest party is made to be unable to decrypt the data correctly, while other terminals are able to decrypt the data correctly.The data protection system includes a plurality of terminals, and an encryption device that encrypts distribution data distributed to each terminal. Each terminal is corresponded with one node on a lowest level of a 4-ary tree structure or the like having a plurality of hierarchies. The data protection system, for each node in the tree structure, excluding those on the lowest level, determines a plurality of combination patterns that include combinations of two or more of all four nodes that are reached one level below the node, decides an individual decryption key for each determined combination pattern, and decides an individual decryption key for each node on the lowest level. Further, the data protection system has each terminal store all decryption keys decided for the nodes on the path from the node on the lowest level that corresponds to the terminal through to the node on the highest level. The data protection system prescribes nodes that are reached from the node on the lowest level that corresponds to the terminal through to the node on the highest level that correspond to a terminal that has been dishonestly analyzed as invalid nodes. For invalid nodes, other than invalid nodes on the lowest level, the data protection system designates an encryption key that corresponds to the decryption key decided in correspondence with the combination pattern that combines all nodes, excluding invalid nodes, of the four nodes that are reached one level below the node, and has the encryption device encrypt distribution data that uses each of the designated encryption keys.

    ENCRYPTION DEVICE, KEY DISTRIBUTION DEVICE AND KEY DISTRIBUTION SYSTEM
    3.
    发明申请
    ENCRYPTION DEVICE, KEY DISTRIBUTION DEVICE AND KEY DISTRIBUTION SYSTEM 有权
    加密设备,密钥分发设备和密钥分发系统

    公开(公告)号:US20110093706A1

    公开(公告)日:2011-04-21

    申请号:US12953676

    申请日:2010-11-24

    IPC分类号: H04L9/32

    摘要: A key distribution system distributes key data for using content to a second encryption device that has been legitimately outsourced processing by a first encryption device. The first encryption device acquires permission information indicating that the first encryption device has permission to use the content, generates certification information by making an irreversible alteration the to permission information, and transmits the permission information and the certification information to the second encryption device. The second encryption device receives the permission information and the certification information, sends them to a key distribution device, and acquires the key data from the key distribution device. The key distribution device receives the permission information and the certification information, judges whether or not the certification information was generated by the by the first encryption device, and if judging in the affirmative, transmits the key data to the second encryption device.

    摘要翻译: 密钥分配系统将用于使用内容的密钥数据分配给已被第一加密设备合法外包处理的第二加密设备。 第一加密装置获取表示第一加密装置具有允许使用内容的许可信息,通过对许可信息进行不可逆变更来生成认证信息,并将许可信息和认证信息发送到第二加密装置。 第二加密装置接收许可信息和认证信息,将其发送到密钥分发装置,并从密钥分发装置获取密钥数据。 密钥分配装置接收许可信息和认证信息,判断认证信息是否由第一加密装置生成,并且如果肯定地判断,则将密钥数据发送到第二加密装置。

    CONTENT PROTECTION SYSTEM, KEY DATA GENERATION APPARATUS, AND TERMINAL APPARATUS
    4.
    发明申请
    CONTENT PROTECTION SYSTEM, KEY DATA GENERATION APPARATUS, AND TERMINAL APPARATUS 有权
    内容保护系统,关键数据生成设备和终端设备

    公开(公告)号:US20080205652A1

    公开(公告)日:2008-08-28

    申请号:US12112670

    申请日:2008-04-30

    IPC分类号: H04L9/06

    摘要: A content protection system prevents illegal key acquisition, without checking uniqueness of device keys. The content protection system includes a key data generation apparatus and a user terminal. The key data generation apparatus converts first key data, which is for using content, based on a predetermined conversion rule, thereby generating second key data, encrypts the second key data using a device key held by valid terminals, and outputs the encrypted key data. The user terminal obtains the encrypted key data, decrypts the encrypted key data using a device key held by the user terminal, thereby generating second key data, converts the second key data based on a re-conversion rule corresponding to the conversion rule, thereby generating the first key data, and uses the content with use of the generated first key data.

    摘要翻译: 内容保护系统防止非法密钥获取,而不会检查设备密钥的唯一性。 内容保护系统包括密钥数据生成装置和用户终端。 密钥数据生成装置基于预定的转换规则,对使用内容的第一密钥数据进行转换,从而生成第二密钥数据,使用由有效终端保持的装置密钥对第二密钥数据进行加密,并输出加密的密钥数据。 用户终端获取加密的密钥数据,使用由用户终端保存的设备密钥解密加密的密钥数据,从而生成第二密钥数据,并根据与转换规则对应的重新转换规则转换第二密钥数据,从而生成 第一密钥数据,并使用所生成的第一密钥数据的内容。

    CONTENT PLAYBACK DEVICE
    6.
    发明申请
    CONTENT PLAYBACK DEVICE 有权
    内容回放设备

    公开(公告)号:US20110110517A1

    公开(公告)日:2011-05-12

    申请号:US13009459

    申请日:2011-01-19

    IPC分类号: H04N7/167

    摘要: To provide a content playback device capable of protecting content according to DRM, when decrypting encrypted content recorded on a recording medium and playing the decrypted content. If key generation information is “00”, a key control unit 104 concatenates a decrypted media key and content information in this order, and applies a one-way function to the concatenation result to generate a content key. If the key generation information is “10”, the key control unit 104 sets a rights key as the content key. If the key generation information is “01”, the key control unit 104 concatenates the decrypted media key and the rights key in this order, and applies a one-way function to the concatenation result to generate the content key.

    摘要翻译: 为了提供能够根据DRM保护内容的内容回放设备,当解密记录在记录介质上的加密内容并播放解密的内容时。 如果密钥生成信息是“00”,则密钥控制单元104依次连接解密的媒体密钥和内容信息,并且向连接结果应用单向函数以生成内容密钥。 如果密钥生成信息是“10”,则密钥控制单元104设置权限密钥作为内容密钥。 如果密钥生成信息为“01”,则密钥控制单元104依次连接解密的媒体密钥和权限密钥,并将单向功能应用于连接结果以生成内容密钥。

    CONTENT PLAYBACK DEVICE, CONTENT PLAYBACK METHOD, CONTENT PLAYBACK PROGRAM, AND INTEGRATED CIRCUIT
    7.
    发明申请
    CONTENT PLAYBACK DEVICE, CONTENT PLAYBACK METHOD, CONTENT PLAYBACK PROGRAM, AND INTEGRATED CIRCUIT 审中-公开
    内容回放设备,内容回放方法,内容回放程序和集成电路

    公开(公告)号:US20090055650A1

    公开(公告)日:2009-02-26

    申请号:US12179953

    申请日:2008-07-25

    申请人: Toshihisa NAKANO

    发明人: Toshihisa NAKANO

    IPC分类号: H04L9/00

    摘要: When a plurality of types of copyright information are detected on a disk or the like, a content playback device and method can appropriately control playback of content in accordance with the copyright information. As the content playback device, a digital watermark detection device attempts to detect watermark information in blocks that make up the content, and a result storage subunit (401) stores result information constituted from detected watermark information and frequency information indicating how often the watermarks appear. Each time watermark information is detected in one of the blocks, a comparison subunit (402) compares the detected watermark information to the watermark information in the result information, and judges whether updating the result information is necessary with reference to a predetermined condition. An update subunit (403) performs an update, and a control unit (307) performs a playback restriction of the content with use of the result information.

    摘要翻译: 当在盘等上检测到多种类型的版权信息时,内容回放装置和方法可以根据版权信息适当地控制内容的回放。 作为内容回放装置,电子水印检测装置试图检测构成内容的块中的水印信息,结果存储子单元(401)存储由检测到的水印信息构成的结果信息和表示水印出现频率的频率信息。 每个块中的一个块中检测到水印信息,比较子单元402将检测到的水印信息与结果信息中的水印信息进行比较,并且根据预定条件判断是否需要更新结果信息。 更新子单元(403)执行更新,并且控制单元(307)使用结果信息来执行内容的回放限制。

    ENCRYPTION SCHEME MANAGEMENT METHOD
    8.
    发明申请
    ENCRYPTION SCHEME MANAGEMENT METHOD 审中-公开
    加密方案管理方法

    公开(公告)号:US20070113095A1

    公开(公告)日:2007-05-17

    申请号:US11559459

    申请日:2006-11-14

    IPC分类号: H04L9/00

    摘要: An encryption scheme management method according to the present invention is an encryption scheme management method which manages encryption schemes utilized for distributing encrypted data, and includes request receiving which receives encryption scheme switching request from a client device, selecting an encryption scheme from the encryption schemes, generating circuit forming information for forming a decrypting circuit which decrypts the data encrypted by the selected encryption scheme, and sending the circuit forming information to the client device.

    摘要翻译: 根据本发明的加密方案管理方法是管理用于分发加密数据的加密方案的加密方案管理方法,并且包括从客户端设备接收加密方案切换请求的请求接收,从加密方案中选择加密方案, 生成电路形成信息,用于形成解密通过所选择的加密方案加密的数据的解密电路,并将电路形成信息发送到客户端设备。