摘要:
To provide an apparatus, a recording medium and a method for effectively preventing unauthorized use of a content. A content containing broken data different from correct content member data is recorded on an information recording medium. Furthermore, transform data, as the correct member data, to be substituted for the broken data, and a fix-up table storing setting position information of the content are recorded on the information recording medium. During the content playback process, the transform data is substituted for the content member data in accordance with the fix-up table recorded on the information recording medium. With this arrangement, even if the encryption key corresponding to the encrypted content recorded on the information recording medium is leaked, an apparatus unable to acquire the transform data cannot play back the content. Unauthorized use of the content is thus controlled.
摘要:
A method and apparatus for processing information, method and apparatus for manufacturing an information recording medium, an information recording medium, and a computer program are provided. An information processing apparatus for playing back a content recorded on an information recording medium and includes a data transform processor performing a substitution process on content member data recorded on the information recording medium. The data transform processor substitutes transform data as substitute data for the content member data in accordance with a fix-up table holding recording position information of the transform data.
摘要:
A method and apparatus for processing information, method and apparatus for manufacturing an information recording medium, an information recording medium, and a computer program are provided. An information processing apparatus for playing back a content recorded on an information recording medium and includes a data transform processor performing a substitution process on content member data recorded on the information recording medium. The data transform processor substitutes transform data as substitute data for the content member data in accordance with a fix-up table holding recording position information of the transform data.
摘要:
To provide an apparatus, a recording medium and a method for effectively preventing unauthorized use of a content. A content containing broken data different from correct content member data is recorded on an information recording medium. Furthermore, transform data, as the correct member data, to be substituted for the broken data, and a fix-up table storing setting position information of the content are recorded on the information recording medium. During the content playback process, the transform data is substituted for the content member data in accordance with the fix-up table recorded on the information recording medium. With this arrangement, even if the encryption key corresponding to the encrypted content recorded on the information recording medium is leaked, an apparatus unable to acquire the transform data cannot play back the content. Unauthorized use of the content is thus controlled.
摘要:
To provide an apparatus, a recording medium and a method for effectively preventing unauthorized use of a content. A content containing broken data different from correct content member data is recorded on an information recording medium. Furthermore, transform data, as the correct member data, to be substituted for the broken data, and a fix-up table storing setting position information of the content are recorded on the information recording medium. During the content playback process, the transform data is substituted for the content member data in accordance with the fix-up table recorded on the information recording medium. With this arrangement, even if the encryption key corresponding to the encrypted content recorded on the information recording medium is leaked, an apparatus unable to acquire the transform data cannot play back the content. Unauthorized use of the content is thus controlled.
摘要:
To provide an apparatus, a recording medium and a method for effectively preventing unauthorized use of a content. A content containing broken data different from correct content member data is recorded on an information recording medium. Furthermore, transform data, as the correct member data, to be substituted for the broken data, and a fix-up table storing setting position information of the content are recorded on the information recording medium. During the content playback process, the transform data is substituted for the content member data in accordance with the fix-up table recorded on the information recording medium. With this arrangement, even if the encryption key corresponding to the encrypted content recorded on the information recording medium is leaked, an apparatus unable to acquire the transform data cannot play back the content. Unauthorized use of the content is thus controlled.
摘要:
To provide a configuration in which a unit classification number corresponding to a content playback path is set based on various units. A unit classification number defining a playback path of content including encrypted data having different variations generated by encrypting a segment portion which forms the content by using a plurality of segment keys and encrypted content generated by encrypting a non-segment portion by a unit key is set based on various units, such as a content management unit and an index. In a CPS unit key file storing key generating information concerning CPS units as content management units, settings of unit classification numbers are indicated. Based on the CPS unit key file, a unit classification number to which content to be played back belongs can be obtained.
摘要:
An information recording medium manufacturing method includes the steps of: determining an encryption mode of each sector, which serves as an encrypt processing unit; generating encrypted data having different variations by using a plurality of cryptographic keys for a segment portion; generating encrypted data by using a single cryptographic key for a non-segment portion; and recording the encrypted data. In determining the encryption mode, a cryptographic key for each sector is specified on the basis of an auxiliary file including determination information indicating whether each sector is data of a segment portion or data of a non-segment portion and identification information for identifying a segment and a variation associated with the sector if the sector is found to be the data of a segment portion. In generating the encrypted data for the segment portion or for the non-segment portion, the encrypted data is generated by using the specified cryptographic key.
摘要:
A virtual machine can be implemented by anyone because the interface and other information necessary for implementation are publicly available. Therefore, it is possible that by implementing the virtual machine illegitimately, programs run thereon on will be made to operate illegitimately instead of legitimately. A program compares secret information held by the virtual machine with verification information held by the program itself. The program thereby verifies whether the virtual machine that runs the program is implemented legitimately, and is able to reject an illegitimate virtual machine.
摘要:
A data placement configuration which ensures seamless playback of contents having segment portions including multiple different variations of encrypted data is provided. With regard to contents having segment portions configured of multiple different variations of encrypted data to which individual segment keys have been applied, and non-segment portions serving as encrypted data to which a unit key has been applied, the placement of segment data and non-segment portion configuration data is determined such that the maximum jump distance executed at the time of playback processing is equal to or less than a maximum jump distance set beforehand. Data placement has been determined based on seek time, ECC block processing time, sequence key usage time which is key switchover time, and so forth.