-
公开(公告)号:DE60031062D1
公开(公告)日:2006-11-16
申请号:DE60031062
申请日:2000-04-11
Applicant: SONY CORP
Inventor: ASANO TOMOYUKI , OSAWA YOSHITOMO
IPC: H04L9/08 , G06F21/44 , G06F21/60 , H04H20/00 , H04L9/14 , H04L9/32 , H04L12/28 , H04L12/40 , H04L12/64 , H04L29/06 , H04N7/167 , H04N7/173
Abstract: Prior to data transmission, a protocol for performing mutual authentication and sharing a plurality of encryption keys is executed between a CPU 12 on the side of a data transmission apparatus 10 and a CPU 22 on the side of a data receiving apparatus 20. The data transmission apparatus 10 causes the CPU 12 to encrypt data requiring the assurance of a transmission band by a first encryption key and to transmit the data in a first transmission mode via an input/output interface 16, and also to encrypt related data relating to the data by a second encryption key and to transmit the related data in a second transmission mode via the input/output interface 16. The data receiving apparatus 20 causes the CPU 22 to decode, by a first encryption key, the data requiring the assurance of a transmission band received in the first transmission mode via an input/output interface 24, and also to decode, by a second encryption key, the related data received in the second transmission mode via the input/output interface 24.
-
公开(公告)号:DE69832321T2
公开(公告)日:2006-07-27
申请号:DE69832321
申请日:1998-04-20
Applicant: SONY CORP
Inventor: OSAKABE YOSHIO , SATO MAKOTO , OSAWA YOSHITOMO , ASANO TOMOYUKI , ISHIGURO RYUJI , SHIMA HISATO
IPC: G11B20/10 , G06F21/10 , G06F21/62 , G11B20/00 , H04L9/08 , H04L9/14 , H04L9/16 , H04L12/28 , H04L12/40 , H04L12/64 , H04L47/43 , H04N7/24 , H04N21/436 , H04N21/4363 , H04N21/4367
Abstract: Data to be transmitted via a serial bus (5) in conformity with the IEEE 1394 protocol are ciphered by a ciphering/deciphering circuit (24), and headers are attached thereto by a header sync detecting/generating circuit (23). After further attachment of a CRC code by a CRC detector/generator (33), the data are packetized into isochronous packets of an isochronous mode by a transmission/reception switching circuit (21), whereby transmission of the data can be performed with enhanced security. Out of the cipher keys employed, a session key invariable in each session of the data is transmitted in each packet of an asynchronous mode, and a time variable key updated in each session is transmitted in each packet of an isochronous mode. The ciphered data obtained by depacketizing the packets of the isochronous mode are deciphered, so that the data transmitted with security can be deciphered exactly, and thus illegal use of the data can be prevented.
-
公开(公告)号:DE69833608D1
公开(公告)日:2006-04-27
申请号:DE69833608
申请日:1998-04-20
Applicant: SONY CORP
Inventor: ISHIGURO RYUJI , OSAWA YOSHITOMO , OSAKABE YOSHIO , SATO MAKOTO
IPC: G06F1/00 , G06F12/14 , G06F3/06 , G06F21/00 , G06F21/24 , G11B19/04 , G11B19/12 , G11B20/00 , G11B20/10 , H04L9/08 , H04L12/40 , H04L12/64
Abstract: An information processing apparatus and an information processing method are capable of preventing information from being copied illegally. A hash function and a service key are stored in advance in an EEPROM of a DVD player serving as a source. In an EEPROM of a personal computer (PC) serving as a sink, its ID and a license key are stored beforehand. The DVD player requests the PC to transmit the ID. The DVD player then applies the hash function to data resulting from concatenation of the ID with the service key to generate a license key (= hash (ID PARALLEL service_key)). Subsequently, the DVD player generates a source side common session key and encrypts the session key by using the generated license key. Then, the DVD player transmits the encrypted source side common session key to the PC. The PC decrypts the encrypted source side common session key by using the license key stored in its EEPROM to produce a sink side common session key which has a value equal to that of the source side common session key.
-
公开(公告)号:DE69925654T2
公开(公告)日:2006-03-23
申请号:DE69925654
申请日:1999-02-15
Applicant: SONY CORP
Inventor: HASHIMOTO MEGUMU , OSAWA YOSHITOMO , ASANO TOMOYUKI
IPC: G06F12/14 , G11B20/00 , G06F21/10 , G11B20/10 , H04L12/40 , H04L12/64 , H04N5/765 , H04N5/775 , H04N5/85 , H04N5/913 , H04N21/41 , H04N21/4363 , H04N21/8355
Abstract: An optical disc recorder/reproducer, a personal computer, a television receiver, an IRD and so forth are connected mutually via a 1394 serial bus. When data transmitted from the personal computer to the optical disc recorder/reproducer via the 1394 serial bus are to be recorded, an isochronous packet is sent to the recorder/reproducer inclusive of the data to indicate whether the personal computer is a device capable of cognizing copy control information. And depending on whether the source of the transmitted data is a copy control information cognizant device or not, the optical disc recorder/reproducer updates the copy control information with reference to a selected table, and then the updated copy control information is recorded on the optical disc. This system can distinguish between a prerecorded disc and a user-recorded disc, hence achieving exact management of copy control information.
-
公开(公告)号:DE69635312D1
公开(公告)日:2006-03-02
申请号:DE69635312
申请日:1996-06-27
Applicant: SONY CORP
Inventor: SAKO YOICHIRO , OWA HIDEO , OSAWA YOSHITOMO , KURIHARA AKIRA , KAWASHIMA ISAO
IPC: G11B20/10 , G06F1/00 , G11B7/00 , G11B7/004 , G11B7/0045 , G11B7/005 , G11B7/007 , G11B7/24 , G11B11/105 , G11B19/12 , G11B20/00
Abstract: An optical disk (D) has a first working area and a second working area having two recording formats. Encrypted data is recorded on the second working area. Encrypting key data is recorded on the first working area. The encrypting key data is used for decoding the encrypted data. This recording technique makes easy reproduction of the recorded data quite difficult. If data recorded on a bit-formed portion can be reproduced by any means, the data signal recorded on the optical disk cannot easily be reproduced.
-
公开(公告)号:AU780325C
公开(公告)日:2006-03-02
申请号:AU4470901
申请日:2001-04-02
Applicant: SONY CORP
Inventor: ISHIGURO RYUJI , OSAWA YOSHITOMO , OISHI TATEO , ASANO TOMOYUKI , MITSUZAWA ATSUSHI
IPC: G06F12/14 , H04L9/00 , G06F1/00 , G06F21/10 , G06F21/62 , G11B20/00 , G11B20/10 , G11B20/12 , H04L9/08
Abstract: A content key, an authentication key, and a program data etc. are transmitted with an enabling key block (EKB) in an encrypted key constitution of a tree structure. The EKB has a constitution in which a device as a leaf of the tree holds a leaf key and a limited node key, and a specific enabling key block (EKB) is generated and distributed to a group specified by a specific node to limit devices that can be renewed. As the devices that do not belong to the group cannot perform decryption, the security for distributing keys etc. can be secured. Thus, distribution of various kinds of keys or data is executed in an encryption key constitution of a tree structure to realize an information processing system and method enabling to distribute data efficiently and safely.
-
公开(公告)号:HK1058269A1
公开(公告)日:2004-05-07
申请号:HK03109357
申请日:2003-12-23
Applicant: SONY CORP
Inventor: ASANO TOMOYUKI , OSAWA YOSHITOMO , OISHI TATEO , ISHIGURO RYUJI , TAKI RYUTA
IPC: G06F12/14 , G06F21/00 , G06F21/10 , G06F21/62 , G06Q30/06 , G06Q50/00 , G06Q50/10 , G11B20/00 , H04L9/08 , H04L29/06 , H04N7/167 , H04L , G06F
Abstract: An information processing system and method are disclosed in which information processing is performed in a highly efficient manner using an enabling key block (EKB) on the basis of a tree structure including category subtrees. A key tree is produced so as to include a plurality of subtrees that are grouped in accordance with categories and managed by category entities. An EKB is produced so as to include data produced by selecting a path in the key tree and encrypting an upper-level key in the selected path using a lower-level key in the selected path, and the resultant EKB is provided to a device. If a change occurs in state of a category tree capable of processing an EKB identified in the EKB type definition list, a notification of the change in state is sent to an entity that uses the EKB thereby making it possible for an EKB requester to perform processing in accordance with a newest EKB.
-
公开(公告)号:DE69626724T2
公开(公告)日:2004-02-05
申请号:DE69626724
申请日:1996-06-27
Applicant: SONY CORP
Inventor: SAKO YOICHIRO , OWA HIDEO , OSAWA YOSHITOMO , KURIHARA AKIRA , KAWASHIMA ISAO
IPC: G11B20/10 , G06F1/00 , G11B7/00 , G11B7/004 , G11B7/0045 , G11B7/005 , G11B7/007 , G11B11/105 , G11B19/12 , G11B20/00 , G11B7/24
Abstract: An optical disk (D) has a first working area and a second working area having two recording formats. Encrypted data is recorded on the second working area. Encrypting key data is recorded on the first working area. The encrypting key data is used for decoding the encrypted data. This recording technique makes easy reproduction of the recorded data quite difficult. If data recorded on a bit-formed portion can be reproduced by any means, the data signal recorded on the optical disk cannot easily be reproduced.
-
公开(公告)号:HU0202148A2
公开(公告)日:2002-10-28
申请号:HU0202148
申请日:2001-04-05
Applicant: SONY CORP
Inventor: ASANO TOMOYUKI , ISHIGURO RYUJI , MITSUZAWA ATSUSHI , OISHI TATEO , OSAWA YOSHITOMO
Abstract: In a tree-structural key distribution system, renewed data of a master key and medium key are sent along with a key renewal block (KRB). KRB is such that each of devices included as leaves of a tree structure has a leaf key and restricted node key. A specific KRB can be generated for a group identified by a specific node and distributed to the group to restrict a device for which the key can be renewed. Any device not belonging to the group cannot decrypt the key, whereby the security of key distribution can be assured. Especially in a system using a generation-managed master key, a master key renewed with KRB can be distributed.
-
公开(公告)号:NO20015908L
公开(公告)日:2002-02-05
申请号:NO20015908
申请日:2001-12-03
Applicant: SONY CORP
Inventor: ISHIGURO RYUJI , OSAWA YOSHITOMO , OISHI TATEO , ASANO TOMOYUKI , MITSUZAWA ATSUSHI
Abstract: A content key, an authentication key, and a program data etc. are transmitted with an enabling key block (EKB) in an encrypted key constitution of a tree structure. The EKB has a constitution in which a device as a leaf of the tree holds a leaf key and a limited node key, and a specific enabling key block (EKB) is generated and distributed to a group specified by a specific node to limit devices that can be renewed. As the devices that do not belong to the group cannot perform decryption, the security for distributing keys etc. can be secured. Thus, distribution of various kinds of keys or data is executed in an encryption key constitution of a tree structure to realize an information processing system and method enabling to distribute data efficiently and safely.
-
-
-
-
-
-
-
-
-