Abstract:
A data converter (1) capable of reducing a size of the total implementation in a device is a processing apparatus that performs secret converting processing predetermined to input data with 64 bits, the data converter including a finite field polynomial cubing unit (10), data integrating units (11a) to (11d), (12) and (13), a first converter (14), a second converter (15), a data splitting unit (16), and a data integrating unit (17). The finite field polynomial cubing unit (10) performs cubing, on the 32 bits data, in the polynomial residue class ring with a value in the finite field GF (28) as a coefficient and respectively outputs data with 32 bits.
Abstract:
Un sistema de protección de contenido incluyendo un aparato de generación de datos de clave (100) que usa una estructura de árbol para gestionar una pluralidad de claves de dispositivo mantenidas por un aparato terminal (200), y el aparato terminal (200), el aparato de generación de datos de clave (100) para generar información de cabecera basada en una información posicional de claves de dispositivo seleccionadas en la estructura de árbol, una unidad de selección (102), operable para seleccionar una o más claves de dispositivo correspondientes a información de revocación, una unidad de conversión (103) operable para convertir primeros datos de clave usados para encriptar contenido, realizando una conversión predeterminada con el uso de información de conversión generada para una clave de dispositivo seleccionada usada para el encriptado de los primeros datos de clave, generando por ello segundos datos de clave; una unidad de encriptado (105) operable para encriptar los segundos datos de clave usando la clave de dispositivo, generando por ello datos de clave encriptados; una unidad de salida (110) operable para enviar los datos de clave encriptados, que tiene la información de cabecera anexa y el aparato terminal (200) incluye: una unidad de conservación (202) operable para mantener una pluralidad de claves de dispositivo y para mantener información posicional de las claves de dispositivo del aparato terminal en la estructura de árbol; una unidad de obtención (207) operable para obtener los datos de clave encriptados y la información de cabecera que está anexa a los datos de clave encriptados; una unidad de selección (201) operable para seleccionar una de las claves de dispositivo correspondientes a información de revocación, una unidad de desencriptado (203) operable para desencriptar los datos de clave encriptados usando la clave de dispositivo seleccionada mantenida por la unidad de conservación (202), generando por ello los segundos datos de clave; una unidad de conversión (204) operable para generar información de conversión a partir de la información de cabecera y la información posicional, y convertir los segundos datos de clave, realizando una conversión predeterminada con el uso de la información de conversión generada; generando por ello los primeros datos de clave; y una unidad de uso de contenido (205, 206, 208) operable para enviar el contenido desencriptado usando los primeros datos de clave.
Abstract:
A service user's personal information that has been verified and to which a digital signature has been attached by a personal information verification apparatus 11 (signed-personal information) is stored in a highly secure form within a service user apparatus 12. For receiving services, the service user apparatus 12 transmits the signed-personal information stored therein, to a service provider apparatus 13. The service provider apparatus 13 verifies the signed-personal information based on the digital signature, and then provides services based on the personal information.
Abstract:
PROBLEM TO BE SOLVED: To provide a secure device that can download a program exceeding the capacity of the storage area implemented on the TRM, while assuring security required by the administrator of each program. SOLUTION: This information processing unit is provided with: a tamper resistant integrated circuit; and an external storage means outside the tamper resistant integrated circuit, wherein the tamper resistant integrated circuit is provided with: an internal storage means for storing data; a key holding means for holding key information; encryption processing means for encrypting the data stored in the internal storage means using the key information held by the key holding means to store the data in an external storage means; and an error output means for outputting an error to the outside of the tamper resistant integrated circuit when the error occurs in processing performed by the encryption processing means, the external storage means stores the data obtained by encrypting the data stored in the internal storage means using the key information held by the key holding means by the encryption processing means, and stores another piece of data in a free area where the data in the internal storage data are stored. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide an encryption method capable of defending against an attack enacted by replacing a public key certificate revocation list, and transferring a digital work safely. SOLUTION: In an encryption apparatus that encrypts a digital work and outputs the encrypted digital work to a storage medium or a transmission medium, the encryption method repeats, among a first through an n-1th of n secret keys (n≥2), a sequence of encrypting the digital work using the first secret key, and encrypting an i-1th secret key using an i-th (2≤i≤n) secret key, and outputs the encrypted first through n-1th secret keys to the medium. The encrypting using at least one of the first through n-th secret keys includes a first step of modifying the secret key using an attribute value which depends on the contents of the public key revocation list that is a list of information for specifying revoked public key certificates, prior to the encryption. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a storage medium, capable of protecting contents by preliminarily registering revocation information in a specific storage area of the storage medium to thereby invalidate, when the storage medium is installed to unauthorized electronic equipment shown by the revocation information and used, the electronic equipment. SOLUTION: A revocation list RL from which PD (recording and reproducing device) to be invalidated for content protection can be discriminated is preliminarily registered in a read-only disclosure ROM area 132 ensured on PM (storage medium) 13. When the PM 13 is installed to LCM (content use management system) or PD and used, a controller 130 provided on the PM 13 receives information showing the equipment from the LCM or PD, refers to the revocation list RL based on the information, and determines whether the equipment is invalidated or not according to the reference result. COPYRIGHT: (C)2009,JPO&INPIT