Abstract:
A device classification method that includes: receiving a first action performed on a first device in the device group, for classifying the first device as belonging to the coordinated operation group; setting, when the first action is received, each of one or more devices in the device group other than the first device to a classifiable state in which the device is classifiable as belonging to the coordinated operation group; receiving a second action performed on a second device in the device group that is set to the classifiable state, for classifying the second device as belonging to the coordinated operation group; and classifying, when the second action is received, the first device and the second device as belonging to the coordinated operation group.
Abstract:
AN EXECUTING DEVICE CONDUCTS PLAYBACK OF CONTENTS. THE EXECUTING DEVICE IS EQUIPPED WITH A HIGHLY EFFICIENT PROCESSOR AND REDUCES THE PROCESSING LOAD INVOLVED IN VERIFICATION BY USING, FOR THE VERIFICATION, ONLY A PREDETERMINED NUMBER OF ENCRYPTED UNITS SELECTED RANDOMLY FROM MULTIPLE ENCRYPTED UNITS CONSTITUTING ENCRYPTED CONTENTS RECORDED ON A DVD. IN ADDITION, THE EXECUTING DEVICE IS CAPABLE OF IMPROVING THE ACCURACY OF DETECTING UNAUTHORIZED CONTENTS BY RANDOMLY SELECTING A PREDETERMINED NUMBER OF ENCRYPTED UNITS EVERY TIME THE VERIFICATION IS PERFORMED.
Abstract:
Processing load on an executing device for conducting playback is high during the playback of contents since the executing device performs verification of the contents validity in parallel with the contents playback, and therefore the executing device has to be equipped with a highly efficient processor. The present invention reduces the processing load involved in the verification by using, for the verification, only a predetermined number of encrypted units selected randomly from multiple encrypted units constituting encrypted contents recorded on the DVD. In addition, the present invention is capable of improving the accuracy of detecting unauthorized contents to some extent by randomly selecting a predetermined number of encrypted units every time the verification is performed.
Abstract:
Un dispositivo de procesamiento de datos (1600; 4600) para la utilización de una obra digital (1120; 2120; 4120) registrada sobre un medio de registro (1500; 2500; 4500), que comprende: una unidad de utilización (1606; 2618) operativa para usar la obra digital (1120; 2120; 4120) y una unidad de control de la utilización operativa para detener la unidad de utilización (2618) con relación al uso de la obra digital (1120; 2120; 4120) si la obra digital (1120; 2120; 4120) no es válida, el medio de registro (1500; 2500; 4500) que tiene registrada en él la obra digital (1120; 2120; 4120) que está constituida por una pluralidad de bloques de datos (1231); el medio de registro (1500; 2500; 4500) que tiene registrado en él una pluralidad de valores de resumen de registros (1120; 2120; 4120) generados a partir de una pluralidad de bloques de datos (1231) que constituyen la obra digital y caracterizado por la pluralidad de valores de resumen del registro (1556; 4161, ..., 4166) usados para generar datos de firma del registro, sin excedente o escasez y el dispositivo de procesamiento de datos (1600; 4600) que comprende además: una unidad de selección (1611; 2105; 4611) que es operativa para seleccionar pseudo aleatoriamente un número predeterminado de bloques de datos de entre toda la pluralidad de bloques de datos (1231) en cada momento que se usa la obra digital (1120; 2120; 4120); una unidad de cálculo operativa para calcular los valores de resumen calculados (1556; 4161, ..., 4166) en base a los datos seleccionados; una unidad de lectura operativa para leer, dentro de la pluralidad de valores de resumen del registro (1556; 4161, ..., 4166), los valores de resumen del registro restantes que no incluyen un valor de resumen de registro que corresponde al valor de resumen de cálculo calculado; y una unidad de verificación de firma (1611; 2611; 4606) operativa para verificar si la obra digital (1120; 2120; 4120) es válida en base al registro de datos de firma (4170), todos los valores de resumen calculados y todos los valores de resumen del registro restantes.
Abstract:
Processing load on an executing device for conducting playback is high during the playback of contents since the executing device performs verification of the contents validity in parallel with the contents playback, and therefore the executing device has to be equipped with a highly efficient processor. The present invention reduces the processing load involved in the verification by using, for the verification, only a predetermined number of encrypted units selected randomly from multiple encrypted units constituting encrypted contents recorded on the DVD. In addition, the present invention is capable of improving the accuracy of detecting unauthorized contents to some extent by randomly selecting a predetermined number of encrypted units every time the verification is performed.
Abstract:
PROCESSING LOAD ON AN EXECUTING DEVICE (1600) FOR CONDUCTING PLAYBACK IS HIGH DURING THE PLAYBACK OF CONTENTS SINCE THE EXECUTING DEVICE (1600) PERFORMS VERIFICATION OF THE CONTENTS VALIDITY IN PARALLEL WITH THE CONTENTS PLAYBACK, AND THEREFORE THE EXECUTING DEVICE (1600) HAS TO BE EQUIPPED WITH A HIGHLY EFFICIENT PROCESSOR. THE PRESENT INVENTION REDUCES THE PROCESSING LOAD INVOLVED IN THE VERIFICATION BY USING, FOR THE VERIFICATION, ONLY A PREDETERMINED NUMBER OF ENCRYPTED UNITS SELECTED RANDOMLY FROM MULTIPLE ENCRYPTED UNITS CONSTITUTING ENCRYPTED CONTENTS RECORDED ON THE DVD (1500). IN ADDITION, THE PRESENT INVENTION IS CAPABLE OF IMPROVING THE ACCURACY OF DETECTING UNAUTHORIZED CONTENTS TO SOME EXTENT BY RANDOMLY SELECTING A PREDETERMINED NUMBER OF ENCRYPTED UNITS EVERY TIME THE VERIFICATION IS PERFORMED.
Abstract:
To aim provide a software update apparatus including an install module group (130) composed of a plurality of install modules. Each of the install modules has a function of receiving, from an external server (200), a replacement protection control module (121) to be used for updating a protection control module (120) having a function of verifying whether a predetermined application has been tampered with. Each of the install modules simultaneously running is verified by at least another one of the install modules simultaneously running, as to whether the install module has a possibility of performing malicious operations.
Abstract:
To aim to provide a monitoring system and a program execution apparatus that are capable of maintaining the security intensity even in the case where an unauthentic install module is invalidated. Install modules 131 to 133 included in an apparatus 100 each monitor an install module, which is a monitoring target indicated by a monitoring pattern included therein, as to whether the install module performs malicious operations. An install module that performs malicious operations is invalidated in accordance with an instruction from an update server 200. The monitoring patterns are restructured by the update server 200 such that the install modules except the invalidated install module are each monitored by at least another one of the install modules. The restructured monitoring patterns are distributed to the install modules except the invalidated install module.
Abstract:
An NFC device according to the present invention includes the following units. An antenna unit (101) receives radio waves from a reader/writer (20) by NFC. A first power source unit (102) generates power from the radio waves. A second power source unit (104) is a drive power source. A power-supply state holding unit (107) holds information indicating a power-supply state of the second power source unit (104). An NFC unit (606) performs NFC via the antenna unit (101) to transmit the information indicating the power-supply state of the second power source unit (104). A power source switch unit (103) switches the second power source unit (104) to the first power source unit (102) according to the power-supply state of the second power source unit (104), in order to supply power to activate at least the NFC unit (606) and the power-supply state holding unit (107). Here, the power source switch unit (103) switches the second power source unit (104) to the first power source unit (102), when the information indicates that the second power source unit (104) is powered OFF.