Abstract:
A system, business methodology and apparatus for facilitating controlled dissemination of digital works is disclosed. An audio and video organizer, entertainment, and communication unit that plays back audio and video media content received from a central storage server. The unit relies on a smartcard, which has a personalized key that unlocks encrypted content. Using the unit, a user can purchase music or other types of media using a appropriate ordering method. The central storage server then transmits a double-encrypted, compressed audio file to the unit, where it is decrypted based on the smartcard key, and available for listening.
Abstract:
A block-level storage device is provided that implements a digital rights management (DRM) system. In response to receiving a public key from an associated host system, the storage device challenges the host system to prove it has the corresponding private key to establish trust. This trust is established by encrypting a secure session key using the public key. The host system uses its private key to recover the secure session key. The storage device may store content that has been encrypted according to a content key. In addition, the storage device may encrypt the content key using the secure session key.
Abstract:
This invention is directed to a recording medium on which contents data of movie, etc. is recorded. At the position where reproduction is carried out prior to first data consisting of contents data in reproducing the first data, there is recorded second data like advertisement data in which contents concealment data for concealing contents data is buried. In reproduction of the first data recorded on this recording medium, contents concealment data is extracted from the second data, and cipher implemented to the first data which has been read out from the recording medium is decoded by using the extracted contents concealment data. Thus, the first data is reproduced subsequently to the second data.
Abstract:
In an information input/output system, a user device inputs and outputs information to and from external sources including a key management device. The system includes the key management device that securely outputs invalid-device information specifying an invalid device unit that has been made invalid for use, and the user device that includes an input/output unit and a host unit. Via the input/output unit, input and output of information is enabled between the host unit and the external sources. The host unit securely receives, via the input/output unit, the invalid-device information outputted by the key management device and judges whether or not the input/output unit is an invalid device unit by referring to the received invalid-device information. When judging, that the input/output unit is an invalid device, the host unit thereafter prohibits input and output via the input/output unit. Due to this construction, the host unit can correctly judge whether or not the input/output unit is an invalid device unit.
Abstract:
A data placement configuration which ensures seamless playback of contents having segment portions including multiple different variations of encrypted data is provided. With regard to contents having segment portions configured of multiple different variations of encrypted data to which individual segment keys have been applied, and non-segment portions serving as encrypted data to which a unit key has been applied, the placement of segment data and non-segment portion configuration data is determined such that the maximum jump distance executed at the time of playback processing is equal to or less than a maximum jump distance set beforehand. Data placement has been determined based on seek time, ECC block processing time, sequence key usage time which is key switchover time, and so forth.
Abstract:
User keys make sensitive management of users which are different per type of services. A SD card SDq may store plural kinds of service user keys Kus which are different per type of services. The service user key Kus is encrypted by a medium unique key Kmu and is stored in a protection area 3. The protection area 3 stores a master user key Kumst encrypted by the medium unique key Kmu, as well as the service user keys Kus. The master user key Kumst is a key used for encrypting the service user key Kus when obtaining a service user key Kus.
Abstract:
Described herewith is an optical disk manufacturing apparatus for reading recorded digital data from an optical disk, comprising an encryption unit for encrypting entered digital data according to a plurality of key information; an optical disk substrate manufacturing unit for manufacturing an optical disk substrate on which the encrypted digital data and key information are recorded in the form of physical form changes; a reflection film forming unit for forming a reflection film on the optical disk substrate; and a key information recording unit for recording key information on the optical disk substrate on which the reflection film is formed. The reflection factor of the optical disk is changed locally, thereby giving a jitter to the position information of each pit edge, and desired data is recorded additionally according to this jitter. Pits, etc. are disposed so as to be deviated from the track center towards the inner/outer region of the optical disk, thereby recording such sub-data as key information KY, etc.
Abstract:
A method and an apparatus ensuring protection of digital data are provided. In addition to re-encrypting the data using an unchangeable key, the data is double re-encrypted using a changeable key. The changeable key is used first and the unchangeable key is then used, or in another case, the unchangeable key is used first, and the changeable key is then used. In the aspect of embodiments, there is a case adopting a software, a case adopting a hardware, or a case adopting the software and the hardware in combination. The hardware using the unchangeable key developed for digital video is available. In adopting the software, encryption/decryption is performed in a region below the kernel which cannot be handled by the user to ensure the security for the program and for the key used. More concretely, encryption/decryption is performed with RTOS using a HAL and a device driver, i.e., a filter driver, a disk driver and a network driver, in an I/O manager. Either one of two filter drivers, with a file system driver between them, may be used. Further, both filter drivers may be used.
Abstract:
Described herewith is an optical disk manufacturing apparatus for reading recorded digital data from an optical disk, comprising an encryption unit (22, 23) for encrypting entered digital data according to a plurality of key information; an optical disk substrate manufacturing unit 2 for manufacturing an optical disk substrate 4 on which the encrypted digital data and key information are recorded in the form of physical form changes; a reflection film forming unit 41 for forming a reflection film on the optical disk substrate 4; and a key information recording unit 7 for recording key information on the optical disk substrate on which the reflection film is formed. The reflection factor of the optical disk is changed locally, thereby giving a jitter to the position information of each pit edge, and desired data is recorded additionally according to this jitter. Pits, etc. are disposed so as to be deviated from the track center towards the inner/outer region of the optical disk 2, thereby recording such sub-data as key information KY, etc.
Abstract:
A method and apparatus to protect unencrypted content or data in a storage media from prohibited use or reproduction by encrypting unprotected content before it is transmitted to another device or software application. A compliant device or software application is capable of decrypting the content, detecting any watermark within the content, and accessing or processing the content according to the restrictions associated with the detected watermark. Non-compliant devices or software are prevented from accessing or processing the content since they are unable to decrypt it.