摘要:
A technology is provided to improve tamper resistance in encrypting data to be secured and inputting/outputting the data between a recording device and a host device. When the recording device issues an input/output command to a storage device to input/output data to be secured, the recording device attaches an ID to the command to identify to which cryptographic input/output processing the command belongs. Upon reception of a sequence command, the storage device receives the command if its ID has been allocated and the command is verified to have been issued in the correct sequence. The sequence ID is used to identify a process system while appropriately managing the steps of executing commands.
摘要:
A controller in a hard disk serving as a data storage device stores a license including a content key for decrypting encrypted content data E and others in a secure data storage portion. The license is managed in the secure data storage portion in accordance with a LBA, and the LBA for storing the license, which is being processed for transmission, is stored as a log in a log memory of the secure data storage portion. When a failure occurs during the transmission processing, the license, which was being processed for transmission, is specified based on the LBA stored in the log memory.
摘要:
A controller in a hard disk serving as a data storage device stores a license including a content key for decrypting encrypted content data E and others in a secure data storage portion. The license is managed in the secure data storage portion in accordance with a LBA, and the LBA for storing the license, which is being processed for transmission, is stored as a log in a log memory of the secure data storage portion. When a failure occurs during the transmission processing, the license, which was being processed for transmission, is specified based on the LBA stored in the log memory.
摘要:
A data storage device includes a secure data storage portion including a log memory. The log memory is formed of a plurality of banks, and stores history information in the plurality of banks in a ring-like fashion. The plurality of banks are designated by addresses (0-(N−1)), respectively. Each of the items of the history information respectively stored in the banks includes a management number region, a license ID (LID) region, a Ks2x region, an ST1 region, an ST2 region, a KPcmy region and a LBA region.
摘要:
A controller of a recording device issues a secure command to a storage device, and then waits the time estimated necessary for the storage device to execute the secure command before issuing the next secure command. When a controller of the storage device is executing the previous command, it notifies the recording device of being in process. When the previous command has been completed normally, the controller moves to the next process. Information for estimating the execution time of the command is obtained from the storage device in advance.
摘要:
A data storage device includes a secure data storage portion including a log memory. The log memory is formed of a plurality of banks, and stores history information in the plurality of banks in a ring-like fashion. The plurality of banks are designated by addresses (0−(N−1)), respectively. Each of the items of the history information respectively stored in the banks includes a management number region, a license ID (LID) region, a Ks2x region, an ST1 region, an ST2 region, a KPcmy region and a LBA region.
摘要:
A decryption processing unit decrypts encrypted content data using a license key Kc. When an elapsed time after reception of the license key (Kc) does not exceed a hold time at a time of the license key (Kc) included in reproduction control information (ACp), reproduction of encrypted content data continues. When the elapsed time exceeds the hold time at a time, the license key (Kc) is discarded, and a reproduction control unit again obtains a license key (Kc) from a memory card. Discarding and reobtaining license key (Kc) continues until an allowable output count of license key (Kc) from the memory card becomes zero. As a result, a reproduction time of encrypted content data can be controlled safely.
摘要:
A personal computer 50 holds encrypted contents data and a license acquired from a distribution server (10) over an Internet network (30) or from a music CD (60) using a CD-ROM drive. The personal computer (50), which is connected to a portable reproduction terminal (100) through a USB cable (70), performs a checkout operation for lending out, the encrypted contents data and the license to a memory card (110) attached to the portable reproduction terminal (100), and a checkin operation for returning the lent encrypted contents data and the lent license. As a result, it is possible to shift the encrypted contents data and the license acquired by software to the other device.
摘要:
A memory card (110) stores access restriction information (AC1) to a license information hold unit (1440) arranged in a TRM area. Access restriction information (AC1) has information for example of a frequency of reproduction allowed and a number of licenses owned. A controller (1420) in reproducing and transferring content initially confirms access restriction information (AC1) and thereafter effects reproduction and transfer and after the reproduction and transfer are effected updates access restriction information (AC1), as required, for storage in a license information hold unit (1440).
摘要:
A cellular phone has distributed encrypted content data and an encrypted content key stored in a memory. The encrypted content key data read out from the memory is decrypted by a decryption processing unit using key data Kp stored in a Kp hold unit, and then applied to a audio reproduction module. A decryption processing unit decrypts encrypted content data read out from the memory using a content key Kc extracted by the decryption processing unit to reproduce content data Dc.