Abstract:
PROBLEM TO BE SOLVED: To make it difficult to perform illegal decode or illegal copy. SOLUTION: This signal reproducing device reproduces enciphered data from a digital recording medium 101 recording the enciphered data, to which one enciphering processing has been performed at least, and key storage place information instructing for the place to arrange one piece of key information for deciphering at least, and this device is provided with a reproducing head device 212 for reading the enciphered data and key storage place information from the recording medium 101, TOC decoder 219, CPU 224 or the like and a digital signal processing circuit 220 for deciphering the enciphered data by using the key information of the place designated based on the key storage place information.
Abstract:
PROBLEM TO BE SOLVED: To conduct ciphering whose decoding is difficult and to enhance security of key information with a simple configuration. SOLUTION: An input conversion circuit 14 in an error correction coding processing section 13 converts data by applying logic arithmetic operation to information data from an interface circuit 12 in response to key data, converted information data are fed to an encoder 15, in which parity data are generated. The parity data and the information data before data conversion are mixed by a mixer circuit 16 and the result is outputted. Data from the error correction coding processing section 13 are modulated by a modulation circuit 17 and the modulated data are recorded on a recording disk medium 20.
Abstract:
PROBLEM TO BE SOLVED: To prevent illegal use and illegal copying by preventing reproduction form information such as copy administration information and charging information to be altered or modified. SOLUTION: A reproduction form information adding circuit 14 in a header adding circuit 13 performs data conversion for ciphering for the reproduction form information such as copy administration information and charging information from a terminal 15 according to key information from a terminal 15K, and adds the converted information to data and transmits them. On a reproduction side, a reproduction form information detecting circuit 25 in a header separating circuit 25 performs data conversion deciphering for the ciphered reproduction format information by using key information from a terminal 27K and the original reproduction format information is taken out of a terminal 27P.
Abstract:
PROBLEM TO BE SOLVED: To make it difficult to decipher a code making it easy to handle key information by performing a ciphering processing by using 1st key information and performing a ciphering processing by using 2nd key information obtained from the information through data conversion. SOLUTION: Input digital data supplied to an input terminal 1 is sent to an output terminal 4 through signal processing circuits 2 and 3. The 1st key information KE1 from a key information supply part 5 is sent to a data converting circuit 6 and converted into the 2nd key information KE2 . Further, one of the 1st and 2nd pieces KE1 and KE2 of key information are sent to a 1st signal processing circuit 2 and the other is sent to a 2nd signal processing circuit 3. Then the respective signal processing circuits 2 and 3 performs data conversion corresponding to the pieces KE1 and KE2 of key information for ciphering what are supplied for input and other signal processings are performed when necessary before output. Further, a signal led out of an output terminal 4 is recorded on and reproduced from a recording medium and sent and received through a communication medium.
Abstract:
PROBLEM TO BE SOLVED: To surely prevent unauthorized copying.SOLUTION: Data encrypted by a 1394 interface 26 of a DVD player 1 is transmitted to a personal computer 2 and a magneto-optical disk device 3 via a 1394 bus 11. In the magneto-optical disk device 3 in which function modification is not released to users, a 1394 interface 36 decrypts the received data. On the other hand, in the personal computer 2 in which function modification is released to users, a 1394 interface 49 decrypts the encrypted data by using time-varying key i, and an application unit 61 decrypts again the decrypted result by using a session key S.
Abstract:
PROBLEM TO BE SOLVED: To securely prevent illegal copying.SOLUTION: The decoder transmits data encoded on a 1394 interface 26 of a DVD player 1 to a personal computer 2 and an optical magnetic disk device 3 via a 1394 bus 11. In the optical magnetic disk device 3 for which users are not allowed to modify its functions, the received data is decoded on a 1394 interface 36. On the other hand, in the personal computer 2 for which user are allowed to modify its functions, encoded data is decoded on a 1394 interface 49 by using a time-variant key i and the decoded output is further decoded on an application unit 61 by using a session key S.
Abstract:
PROBLEM TO BE SOLVED: To attain strict use control in content use which involves data transfer between a drive and a host. SOLUTION: When the reproduction of an information storage medium-stored content is executed through the drive, the host applies a drive revocation list in mutual authentication between the host and the driver to confirm the revoke state of the drive, and executes data verification based on alteration verification data generated based on data containing the drive revocation list and control information related to the reproduction object content stored in the information storage medium, for example, data based on an MAC value. By this structure, an illicit content use such as the illicit establishment of authentication by applying a revocation list of an old version can be prevented, and the strict use control of contents can be performed. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide an information recording medium, an information processor and a method which permit content use, complying with copyright protection in both of a CD player and an information processor of PC or the like. SOLUTION: A licensing condition for a client is set dynamically, based on the content use status of the client. For instance, the license price is reduced or free for a client who uses the content many times. This device is constituted such that after receiving a medium ID stored in a CD or the like and product IDs as identifiers for titles, album units or the like from the client, on the basis of these pieces of identification data, content use status data are confirmed, thus furnishing license to the client under assured content use management. COPYRIGHT: (C)2004,JPO
Abstract:
PROBLEM TO BE SOLVED: To realize a system and a method for realizing legal contents utilization by preventing an illegal utilization of contents by right data rewriting. SOLUTION: The right data composed of contents utilization limitation information and DRM(digital rights management) data composed of a right data and an encipherment contents key, etc., are recorded on a digital data recording medium (media), and an interpolation check value(ICV) for the DRM data is stored in an area (protected area) where the interpolation check value(ICV) can be recorded/reproduced only through a dedicated IC different from a normal data recording and reproduction system. A key for generating a key for ICV generation verification is performed by an EKB distribution that distributes the key by a key distribution configuration of a tree (tree) structure. By this configuration, it is possible to prevent the contents from being illegally utilized due to right data rewriting.
Abstract:
PROBLEM TO BE SOLVED: To realize a system and a method for processing information, which can execute an effective processing using an effective key block(EKB) using a categorized key structure. SOLUTION: This system comprises a configuration, which provides a device with an EKB that is generated from encrypted data of an upper key by a lower key of a key tree which has a plurality of sub trees categorized and managed by category entity, where a synthesized EKB of sub EKBs capable of decryption is configured at each sub tree set as a part tree of the key tree, so as to hold a key array in each of sub effective key blocks(sub EKBs) stored in the synthesized EKB and to add a data length of a sub EKB storage area and a sub EKB identifying data to each of the sub EKBs. Thus decryption can be executed at each device even if the sub EKBs are synthesized by any of various algorithms.