WO2006115252A1 - 情報セキュリティ装置 - Google Patents
情報セキュリティ装置 Download PDFInfo
- Publication number
- WO2006115252A1 WO2006115252A1 PCT/JP2006/308588 JP2006308588W WO2006115252A1 WO 2006115252 A1 WO2006115252 A1 WO 2006115252A1 JP 2006308588 W JP2006308588 W JP 2006308588W WO 2006115252 A1 WO2006115252 A1 WO 2006115252A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key
- information
- circuit
- encryption
- file
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0877—Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Definitions
- the present invention relates to a technique for acquiring new device-specific key information safely and easily.
- the content provider encrypts the content to generate encrypted content, records the encrypted content on a recording medium, distributes it, and the playback device side Then, the encrypted content is decrypted and played using the device key held by each playback device.
- the device key is unique to each playback device.
- Patent Document 1 discloses a technique for changing the encryption method in accordance with the type of application and data.
- Patent Document 3 discloses a system in which each terminal device stores a plurality of keys in advance and changes the key to be used in accordance with the same rule for all device powers. Yes.
- Patent Document 1 Japanese Patent Laid-Open No. 10-320191
- Patent Document 2 JP 2002-50956 A
- Patent Document 3 JP 2002-290396 A
- the present invention that satisfies this demand provides an information security system, an information security device, a key acquisition method, a key acquisition program, and an integrated circuit capable of safely and easily distributing device keys unique to each device.
- the purpose is to do.
- the present invention is an information security apparatus that safely or reliably handles information using a device key, and that executes a predetermined process and a rewritable logic circuit
- a circuit that acquires circuit formation information that defines a circuit, rewrites the logic circuit according to the acquired circuit formation information, and constructs the execution circuit, and a key storage that stores a unique secret key unique to the device.
- Means for acquiring key circuit formation information for determining a key generation circuit for generating the device key unique to the device using the unique secret key, and the key circuit formation information effectively acquired.
- the circuit formation information includes output means for outputting to the construction means, and control means for controlling the key generation circuit constructed so as to generate the device key.
- the present invention is a key distribution system including an information security device and a server device that handle information securely or reliably using a device key, and the information security device is rewritable.
- Specific construction circuit for acquiring a logic circuit and circuit formation information for determining an execution circuit for executing a predetermined process, rewriting the logic circuit according to the acquired circuit formation information, and constructing the execution circuit
- a key storage unit that stores a unique secret key, an acquisition unit that obtains key circuit formation information that defines a key generation circuit that generates the device key unique to the device using the unique secret key, and valid
- the key generation information constructed in such a way as to generate the device key and output means for outputting the key circuit formation information acquired in step S3 to the construction means as the circuit formation information.
- the server device includes a storage means for storing the key circuit formation information, and an output means for outputting the key circuit formation information.
- the above-described "logic circuit” corresponds to the FPGA 122 of the first embodiment described later.
- the construction mechanism 123 corresponds to the “construction means”.
- the “key storage means” corresponds to the master individual key storage unit 102.
- the “acquisition means” corresponds to the program acquisition unit 106, the FPGA 122, the main storage unit 107, the validity check unit 112, and the key circuit storage unit 119.
- the selection unit 114 corresponds to the “output unit”.
- the control unit 116 corresponds to “control means”. “Master individual key” corresponds to “unique secret key”.
- the key generation circuit constructed by the construction means uses the unique secret key to generate the device key unique to the own device. Since the device key itself is not exchanged, the information security apparatus of the present invention has an excellent effect that the device key can be acquired safely.
- the server device forms the same key circuit in the information security device and similar devices. By simply distributing information, each device can easily obtain a device key specific to the device.
- the acquisition unit acquires the key circuit formation information corresponding to a current information processing method in which the device handles the information, and is constructed according to the key circuit formation information.
- the key generation circuit generates the device key suitable for the property of the current information processing method.
- the information security apparatus since the device key generated by the key generation circuit is suitable for the nature of the current information processing method, the information security apparatus appropriately uses the device key to appropriately process the information. Can be handled.
- the acquisition unit may be an information security apparatus that acquires the key circuit formation information from an external device connected via a network.
- the above external devices are considered to be server devices owned by an organization that manages information related to the safety of various information processing methods, and the encryption method management server of the first embodiment is compatible. To do.
- the acquisition unit is
- the acquisition unit notifies the external device of a current information processing method in which the device itself handles the information, and the current information processing method corresponding to the current information processing method notified from the external device.
- a receiving unit that receives key circuit formation information.
- the notification unit since the notification unit notifies the external device of the current information processing method in which the information security apparatus handles the information, the key circuit formation information corresponding to the current information processing method is surely obtained. Can be obtained.
- the external device encrypts the key circuit formation information, generates encrypted key circuit formation information, transmits the generated encryption key circuit formation information, and the information security apparatus acquires the acquisition
- the means includes a receiving unit that receives the encryption key circuit formation information from the external device, and a generation unit that decrypts the received encryption key circuit formation information and generates the key circuit formation information. It is characterized by.
- the key circuit formation information may include information that should be kept secret, such as parameters for facilitating the estimation of the device key and the know-how of the producer.
- the receiving unit receives the encryption key circuit formation information from the external device, and thus has an excellent effect that the key circuit formation information is not eavesdropped in communication with the external device. .
- the key storage means may be tamper-resistant and may be configured to securely store the unique secret key.
- the acquisition unit further acquires signature information generated by applying a digital signature to the key circuit formation information
- the information security device further includes the signature Information and the obtained key circuit formation information
- the output means determines that the key circuit formation information has been acquired effectively, and It may be configured to output key circuit formation information.
- the above-mentioned “verification means” corresponds to the validity check unit 112, the main storage unit 107, and the FPGA 112 of the first embodiment described later.
- the information security apparatus of the present invention can generate the device key only when the key circuit formation information acquired by the acquisition unit is valid. By doing so, it is possible to remove the illegal key circuit formation information distributed by a malicious third party.
- the information security device further includes verification information storage means for storing verification circuit formation information indicating a configuration of the verification means, and the output means further includes the verification information storage means.
- the verification circuit formation information is read, and the read verification circuit formation information is output to the construction unit as the circuit formation information.
- the construction unit rewrites the logical circuit according to the verification circuit formation information and constructs the verification unit. Therefore, the information security apparatus can reduce the circuit scale that does not need to include the circuit having the function of the verification means by effectively using the logic circuit.
- the current information processing method may be an encryption method for encrypting or decrypting the information.
- the information security apparatus can prevent leakage of information to a third party and safely handle the information by performing cryptographic processing on the information.
- the current information processing method may be a signature method including a signature generation or verification procedure indicating the validity of the information.
- the information security apparatus of the present invention can securely exchange the information by applying a signature to the information or by verifying the signature applied to the information. it can.
- the current information processing method may be a device authentication method for authenticating the validity of an external device that exchanges the information.
- the information security device of the present invention is in accordance with the device authentication method.
- the information Since the information is exchanged only with a device that is authenticated as a legitimate device, the information can be handled safely.
- the current information processing method is a message code authentication method including a procedure for generating or verifying a message authentication code generated using a one-way function in order to verify the presence or absence of falsification of the information. As well.
- the information security device verifies the presence or absence of falsification by verifying the message authentication code attached to the information according to the message authentication code authentication method, and can reliably acquire the information. Further, by attaching the message authentication code generated from the information to the output of the information again, the device that acquires the information can detect falsification of the information during transmission.
- the current information processing method may be a key sharing method in which the same key is shared with a device that exchanges the information.
- the information security device can share the same key with the device in accordance with a key sharing method, and can safely exchange the information using the shared key.
- the key circuit formation information corresponds to a predetermined information processing method
- the key generation circuit constructed according to the key circuit formation information is a device suitable for the nature of the predetermined information processing method.
- a key is generated, and the information security device further comprises combination confirmation means for determining whether or not the current information processing method in which the device itself handles the information matches the predetermined information processing method,
- the output means determines that the key circuit formation information has been acquired effectively when the combination confirmation means determines that the two match, and outputs the key circuit formation information. It may be a configuration.
- the above “combination confirmation unit” corresponds to the combination check unit 118 of the first embodiment.
- the device key is generated when the acquisition unit acquires the key circuit formation information corresponding to the current information processing method. Therefore, the information security device of the present invention can reliably acquire a device key suitable for the property of the current information processing method.
- FIG. 1 is a configuration diagram showing a configuration of an information security system according to a first embodiment.
- FIG. 2 shows information recorded on DVDs 400a and 400b.
- FIG. 3 is a block diagram showing a functional configuration of the encryption method management server 600.
- FIG. 4 shows details of invalid encryption method list 621 and transmission key table 626 stored in information storage unit 610.
- FIG. 5 shows the configuration of the encryption circuit file 631, the key circuit file 651, and the verification key file 671 stored in the information storage unit 610.
- FIG. 6 shows details of the signature key table 691 held by the signature generation unit 603.
- FIG. 7 shows an example of a group of information that is transmitted from the encryption method management server 600 to the content reproduction device 100 when a new encryption method is introduced.
- FIG. 8 is a block diagram showing a configuration of the content reproduction apparatus 100.
- FIG. 9 shows information stored in the master individual key storage unit 102 and the device key storage unit 103.
- FIG. 10 shows an example of information stored in the main storage unit 107.
- FIG. 11 The configuration of the usable method table 166 and the usable method table 1 66b after introducing the new encryption method are shown.
- FIG. 12 shows a specific example of information stored in the encryption circuit storage unit 117 before and after the introduction of a new encryption method.
- FIG. 13 shows a specific example of information stored in the key circuit storage unit 119 before and after the introduction of a new encryption method.
- FIG. 14 is a block diagram functionally showing a key generation circuit built in the variable circuit 108 in accordance with a key circuit formation program.
- FIG. 15 is a flowchart showing an example of the operation of the key generation circuit constructed according to the key generation program “KgenA”.
- FIG. 16 is a block diagram functionally showing a cryptographic processing circuit built in the variable circuit 108 in accordance with a cryptographic key program.
- FIG. 17 Functions of decoding processing circuit built in variable circuit 108 according to decoding program FIG.
- FIG. 18 shows details of the check information table 201 held by the validity check unit 112.
- FIG. 19 is a block diagram showing a functional configuration of a memory card 500.
- FIG. 20 is a flowchart showing an operation of the content reproduction apparatus.
- FIG. 21 is a flowchart showing the operations of the content playback device 100 and the encryption method management server 600, which are used to introduce the AES encryption method accompanying the decryption of the DES encryption method.
- FIG. 22 is a flowchart showing the operations of the content playback device 100 and the encryption method management server 600, which are effective in introducing the AES encryption method accompanying the decryption of the DES encryption method. Continued from Figure 21.
- FIG. 23 is a flowchart showing the operations of the content playback device 100 and the encryption method management server 600 that are conducive to introducing the AES encryption method accompanying the decryption of the DES encryption method. Continued from Figure 21.
- FIG. 24 is a flowchart showing the operations of the content playback device 100 and the encryption method management server 600, which are powerful in introducing the AES encryption method accompanying the decryption of the DES encryption method. Continued from Figure 21.
- FIG. 25 is a flowchart showing an operation of verifying whether or not the acquired content can be played back by the content playback apparatus 100.
- FIG. 26 is a flowchart showing an operation related to verification of signature data.
- FIG. 27 is a flowchart showing a content reproduction operation.
- FIG. 28 is a flowchart showing an operation of outputting content to a memory card.
- FIG. 29 is a flowchart showing an operation of outputting content to a memory card. Figure 28 Force continues.
- FIG. 30 is a flowchart showing an operation of outputting content to a memory card. Figure 28 Force continues.
- FIG. 31 shows an example of information stored in the signature storage unit 220.
- the information security system 1 includes a content playback device 100, an encryption method management server 600, a content server 700, and a portable player 800.
- the content server 700, the encryption method management server 600, and the content reproduction apparatus 100 are connected to the Internet 20.
- the content server 700 is a device that provides content such as movies, and has been generated by an encrypted content generated by encrypting the content and the above-mentioned encrypted content power. Is provided to the content reproduction apparatus 100 via the Internet 20 or a recording medium such as a DVD.
- the content playback device 100 acquires the encrypted content and signature from the content server 700 via the Internet 20 or DVD, verifies the acquired signature, and is distributed by a valid distributor. It authenticates that it is content, and decrypts and plays back the encrypted content.
- the content playback apparatus 100 can be loaded with a memory card, and encrypts the content key used to generate the encrypted content in accordance with the user's operation, and the encrypted content key and the encrypted content key. Write content to the memory card.
- the system identifier indicating the encryption system used for content encryption is the system identifier "IDA", which is useful for signature verification.
- a scheme identifier indicating an encryption scheme to be used is a scheme identifier “IDB”.
- the encryption method indicated by the method identifier “IDA” is the DES (Data Encryption Standard) encryption method
- the encryption method indicated by the method identifier “IDB” is the RSA (Rivest Shamir Adleman) encryption method.
- the content playback apparatus 100 includes a rewritable circuit, and when verifying a signature, a decryption processing circuit that performs a decryption process according to the RSA encryption method is constructed on the circuit, and the content is reproduced.
- a decryption processing circuit that performs decryption according to the DES encryption method
- create a cryptographic processing circuit that performs encryption processing using the DES encryption method.
- the encryption method management server 600 manages the security of the encryption method used by the content reproduction apparatus 100 for the above-described signature verification, content decryption, and the like.
- the encryption method management server 600 stores information on the encryption method used by the content playback apparatus 100 instead of the decrypted encryption method when the DES encryption method or the RSA encryption method is decrypted. .
- the information related to the new encryption method that replaces the decrypted encryption method is encrypted according to the other unencrypted encryption method and transmitted to the content playback apparatus 100.
- the content server 700 and the encryption method management server 600 are managed by the same or related organization, and share information regarding the change of the encryption method and information regarding the key of the new encryption method. .
- the content server 700 encrypts the content or generates a signature using the new encryption method described above, instead of the decrypted encryption method.
- Content reproduction apparatus 100 uses the other unencrypted encryption method to safely acquire information related to the new encryption method, and introduces a new encryption method.
- DVDs 400a and 400b are portable optical disk media.
- DVD400a and 400b were manufactured to distribute the same content “ConA”, but DVD400a was released when the content playback device 100 was manufactured and was encrypted using the DES encryption method. The content is memorized. DVD400b Later, after the DES encryption method was decrypted, it was released and stores content encrypted by an encryption method that replaces the DES encryption method.
- AES Advanced Encryption Standard
- AES Advanced Encryption Standard
- FIG. 2 shows information recorded on the DVDs 400a and 400b. As shown in FIG. 2, a content file 401, content key information 404, and a signature file 411 are recorded on the DVD 400a.
- the content file 401 includes a method identifier 402 “IDA” and encrypted content 403 “EncA (ConA, KconA)”.
- the plaintext “ ⁇ ” is encrypted and generated using the encryption key “
- 8” by the encryption method indicated by the method identifier “ID ⁇ ;” ( ⁇ A, ⁇ , C "').
- the encrypted ciphertext is written as Enc ⁇ ( ⁇ , ⁇ ).
- a system identifier 402 indicates the encryption system used for generating the encrypted content 403. Here, the DES encryption method is shown.
- the encrypted content 403 is a ciphertext generated by applying the encryption key algorithm according to the DES encryption method indicated by the method identifier “IDA” to the content “ConA” using the content key “KconA”.
- the content key “KconA” is a 56-bit encryption key.
- the content key information 404 “CKinf A” includes a media key block and a media ID!
- the media key block is information for giving a content decryption key for decrypting encrypted content only to a legitimate playback device that can access the DVD 400a.
- the content decryption key is the same as the content key, but when using public key cryptography such as RSA cryptography for content encryption, the content decryption key It is different from the content key.
- the media ID is an identifier unique to the DVD 400a.
- a legitimate playback device can generate the content key “KconA” from the media key block using the device key and media ID unique to the playback device.
- the signature file 411 includes a Sano 10412 “001 8”, a method identifier 413 “108”, and a signature file.
- the server ID 412 is an identifier for identifying the device that created the signature data 414 “SignA”. Specifically, “001A” indicates the content server 700 from which the content “ConA” is distributed.
- a system identifier 413 indicates the encryption system used to generate the signature data 414, and here indicates the RSA encryption system.
- the signature data 414 is generated by substituting the combined product of the content file 401 and the content key information 404 into the hash function to generate 160-bit digest data, and using the signature key “Ksig-Ba”, The above-mentioned digest data is generated by applying an encryption algorithm based on the RSA encryption method shown.
- the signature key “Ksig-Ba” is a 128-bit key corresponding to the RSA encryption method indicated by the method identifier 413, and is a key unique to the content Sano 700 corresponding to the Sano ID 412.
- SHA-1 is used for the Noh and Shush functions.
- This signature generation method is an example, and other methods may be used.
- the DVD 400b stores a content file 421, content key information 424, and a signature file 431.
- the content file 421 includes a method identifier 422 “IDC” and encrypted content 423 “EncC (ConA, KconC)”.
- a system identifier 422 indicates the AES encryption system used to generate the encrypted content 423.
- the encrypted content 423 is generated by applying the encryption algorithm according to the AES encryption method to the content “ConA” using the content key “Kcon C”.
- the content key “KconC” is a 128-bit encryption key.
- the content key information 424 is data that includes a media key block and a media ID, and gives the content key "KconC" to a legitimate playback device.
- the signature file 431 includes a server ID 432, a method identifier 433, and signature data 434.
- the Sano ID 432 is an identifier indicating the content server 700 from which the content “ConA” is distributed.
- the system identifier 433 indicates the RS A encryption system used for generating the signature data 434.
- the signature data 434 “SignA,” generates a digest data by substituting the combined product of the content file 421 and the content key information 424 into a hash function, and generates the signature data “Ksig-Ba” of the content server 700 indicated by the Sano ID 432. Is applied to the generated digest data using an encryption algorithm that conforms to the RSA encryption method. It is a thing.
- the encryption method management server 600 instructs the content playback apparatus 100 to introduce the AES encryption method instead of the DES encryption method, and installs it using the RSA encryption method that has not been decrypted. Such information is encrypted and transmitted. At the same time, signature data indicating that the transmitted information is transmitted by the valid encryption method management server 600 is generated and transmitted using the RS A encryption method.
- the encryption method management server 600 instructs the content playback apparatus 100 to introduce an elliptic curve encryption method instead of the RSA encryption method, and the decryption is performed.
- No DES encryption method is used to encrypt and transmit information related to the installation.
- signature data indicating that the transmitted information is transmitted by the valid encryption method management server 600 is generated and transmitted using the DES encryption method.
- the encryption method management server 600 includes a transmission / reception unit 601, a signature generation unit 603, a control unit 607, an information storage unit 610, an input unit 613, and a display unit 612, as shown in FIG.
- the encryption system management server 600 is a computer system including a microprocessor, RAM, and ROM, and a computer program is stored in the RAM and ROM.
- the cryptographic method management server 600 achieves part of its functions by the microprocessor operating according to the computer program.
- the information storage unit 610 includes a hard disk, and as an example, as shown in FIG. 3, the invalid encryption method list 621, the transmission key table 626, the encryption circuit files 631, 641
- the invalid encryption method list 621 includes a plurality of pieces of encryption method information 622, 623 as shown in FIG.
- Each encryption method information corresponds to the decrypted encryption method, and includes a method identifier, an encryption circuit file name, a key circuit file name, and a verification key file name.
- the scheme identifier is an identifier indicating the decrypted encryption scheme.
- the cipher circuit file name is the name of a file containing a program for introducing a new encryption method to replace the decrypted encryption method.
- the key circuit file name is a name of a file including a program for generating a device key suitable for a new encryption method replacing the decrypted encryption circuit.
- the verification key file name is a name of a file including a verification key for verifying signature data generated using the new encryption method.
- the encryption method information 622 includes a method identifier “IDA”, an encryption circuit file name “C”, a key circuit file name “KC”, and a verification key file name “VeriC”.
- the system identifier “ID A” indicates the DES encryption system.
- the cryptographic circuit file name “C” is the name of the cryptographic circuit file 631
- the key circuit file name “KC” is the name of the key circuit file 651
- the verification key file name rVeriCj is the verification key file 671. It is a name.
- the transmission key table 626 is composed of a plurality of transmission key information 627, 628, and 629.
- Each transmission key information includes a scheme identifier, an encryption key, a decryption key, and a decryption key. Contains information.
- Each transmission key information corresponds to one of the encryption methods.
- the scheme identifier indicates a corresponding encryption scheme
- the encryption key is a key having a bit length suitable for cryptographic operation according to the encryption scheme indicated by the scheme identifier.
- the decryption key is a key for decrypting the generated ciphertext using the encryption key according to the encryption method indicated by the method identifier. If the encryption method indicated by the method identifier belongs to the common key encryption method, the encryption key and the decryption key are the same.
- the decryption key information is configured to include a media key block, and is information for giving a decryption key only to a proper content reproduction apparatus.
- the cipher circuit files 631, 641 ... correspond to the key circuit files 651, 661 ..., respectively. Also, the verification key files 671... Correspond respectively.
- FIG. 5 (a) shows details of the cryptographic circuit file 631.
- the encryption circuit file 631 “C” has a method identifier 632 “IDC”, an encryption circuit program 633 “ EncC ”and decryption circuit program 634, which correspond to the key circuit file 651 and the verification key file 671.
- the system identifier 632 “IDC” is an identifier indicating another encryption system different from the DES encryption system and the RSA encryption system, and here indicates the AES encryption system.
- the encryption circuit program 633 and the decryption circuit program 634 are composed of a plurality of machine language instructions generated by compiling a hardware description language. These machine language formats are executed by the construction mechanism 123 (described later) in the variable circuit 108 constituting the content reproduction apparatus 100.
- VHDL VHSIC Hardware Description Language
- the encryption circuit program 633 "EncC" includes a configuration of an encryption processing circuit that performs encryption processing according to the AES encryption method indicated by the method identifier 632 in the variable circuit 108 provided in the content reproduction device 100. .
- the decryption circuit program 634 includes a configuration of a decryption processing circuit that performs decryption processing according to the AES encryption scheme indicated by the scheme identifier 632 in the variable circuit 108 included in the content reproduction apparatus 100.
- the key circuit file 651 “KC” includes a method identifier 652 “IDC” and a key generation circuit program 653 “KgenC” as shown in FIG.
- the scheme identifier 652 is the same as the scheme identifier 632 included in the encryption circuit file 631 corresponding to the key circuit file 651.
- the key generation circuit program 635 includes a plurality of machine language format instructions generated by compiling a hardware description language. These machine language formats are executed by the construction mechanism 123 (described later) in the variable circuit 108 of the content reproduction apparatus.
- the key generation circuit program 635 “KgenC” includes a configuration of a key generation circuit that generates a device key having a key length suitable for the encryption scheme indicated by the scheme identifier 632 in the variable circuit 108 included in the content reproduction apparatus 100.
- the verification key file 671 “VeriC” has a method identifier 672 “IDC” Includes certificate key information 673 and 674.
- the system identifier 672 “IDC” indicates the AES encryption system, similar to the system identifier included in the encryption circuit file 631 and the key circuit file 651.
- the verification key information 673 includes a Sano ID “001A” and a verification key “Kve—Ca”.
- the server ID “001A” is identification information indicating the content server 700.
- the verification key “Kve—Ca” is a 128-bit key suitable for the AES encryption method, and corresponds to the signature key “Ksig—Ca” unique to the content server 700. Since the AES encryption method is a common key encryption method, the signature key “Ksig-Ca” and the verification key “Kve-Ca” are the same.
- the verification key information 674 includes a Sano ID “001B” and a verification key “Kve—Cb”.
- the server ID “001B” is identification information indicating the encryption method management server 600.
- the verification key “Kve—Cb” is a 128-bit key suitable for the AES encryption method, and corresponds to the signature key “Ksig_Cb” unique to the content server 700.
- the transmission / reception unit 601 transmits and receives various types of information between an external device connected via the Internet 20 and the control unit 607.
- the signature generation unit 603 stores a signature key table 691 shown in FIG.
- the signature key table 691 includes a plurality of signature key information 692, 693, 694.
- Each signature key information corresponds to one of the encryption methods, and includes a method identifier, a signature key, and a verification key.
- the method identifier indicates the corresponding encryption method.
- the signature key is a key having a key length suitable for the encryption method indicated by the method identifier.
- the verification key is a key having a key length suitable for the encryption method indicated by the method identifier, and corresponds to the signature key.
- the signing key and the verification key are both key data unique to the encryption method management server 600. If the encryption method indicated by the method identifier is a common key encryption method, the signature key and the verification key are the same.
- the signature key information 693 includes a scheme identifier “IDB”, a signature key “Ksig—Bb”, and a verification key “Kve—Bb”.
- the scheme identifier “IDB” indicates the RSA encryption scheme
- the signature key “Ksig-Bb” is a 128-bit key.
- the verification key “Kve-Bb” is a 128-bit key and is a key for decrypting the ciphertext generated using the signature key.
- the signature generation unit 603 receives the encryption circuit file, the key circuit file, the verification key file, the decryption key information, and the method identifier from the control unit 607, and is instructed to generate a signature.
- the signature generation unit 603 When instructed to generate a signature, the signature generation unit 603 generates a digest data by substituting a combined product obtained by combining the received encryption circuit file, key circuit file, verification key file, and decryption key information into a hash function. .
- signature generation section 603 selects signature key information including the received method identifier in stored signature key table 691, and reads the signature key included in the selected signature key information. put out. Using the read signature key, the generated digest data is subjected to an encryption algorithm based on the encryption method indicated by the received method identifier to generate encrypted data digest data. The generated cipher key digest data is output to the control unit 607 as signature data.
- the control unit 607 When the encryption method included in the content playback apparatus 100 is decrypted, the control unit 607 relates to a method identifier indicating the decrypted encryption method and a new encryption method replacing the decrypted encryption method via the input unit 613. Receives input of information distribution instructions. When a method identifier indicating the decrypted encryption method and an instruction to distribute information related to the new encryption method are received, the received method identifier is temporarily stored. Next, a warning notification for warning that the encryption method indicated by the received method identifier has been decoded is transmitted to the content reproduction apparatus 100 via the transmission / reception unit 601.
- control unit 607 receives an introduction request indicating a request for introduction of an encryption method from content reproduction device 100. Also, the operator accepts input of a system identifier indicating an encryption system used for encryption such as an encryption circuit file and a system identifier indicating an encryption system used for signature generation.
- the control unit 607 Upon receiving the input of the system identifier for encryption and the system identifier for signature generation, the control unit 607 reads out the encryption system information including the temporarily stored system identifier from the invalid encryption system list 621 and reads the read encryption code.
- the encryption circuit file, key circuit file, and verification key file corresponding to the file name included in the method information are read.
- the control unit 607 outputs the input signature generation method identifier to the signature generation unit 603 and instructs signature generation.
- the signature data is received from the signature generation unit 603, a signature file including the received signature data, the server identifier “0001B” indicating the encryption method management server 600 itself, and the input signature generation method identifier is generated.
- control unit 607 reads the input encryption method identifier and the corresponding encryption key and decryption key information from the transmission key table 626. Using the read encryption key, the encryption algorithm by the encryption method indicated by the input method identifier for the encryption key is applied to the read encryption circuit file, key circuit file, and verification key file to The encrypted encryption circuit file, the encryption key circuit file, and the encryption key verification key file are generated.
- control unit 607 sends the encryption / decryption circuit file, the encryption / decryption key circuit file, the encryption verification key file, the decryption key information and the signature to the content reproduction device 100 via the transmission / reception unit 601. Sends a method identifier that indicates the encryption method used to generate the file, encrypted cryptographic circuit file, etc.
- FIG. 7 shows an example of an information group transmitted by the control unit 607 here. This is a group of information to be transmitted when the DES encryption method is decrypted.
- the operator of the encryption method management server 600 first inputs the method identifier “IDA” and the instruction for introducing the encryption method, then the method identifier “IDB” indicating the encryption method for encryption, and the signature generation Enter the method identifier “IDB” that indicates the encryption method.
- the control unit 607 performs encryption and encryption circuit file 681 “EncB (C, KencB)”, encryption key circuit file 682 “EncB (KC, KencB)” and encryption.
- the verification key file 683 “EncB (VeriC, KencB)”, method identifier 684 “IDB”, decryption key information 685 “KinfBj and signature file 686 are transmitted.
- the scheme identifier 684 is a scheme identifier “IDB” for the encryption key input by the operator.
- the RSA encryption method used to generate the encryption key circuit file 681 and the like is shown below.
- the decryption key information 685 “13 ⁇ 41 ⁇ 8” is read from the transmission key information 626 corresponding to the RSA encryption method used for the encrypted cryptographic circuit file 681 and the like.
- the signature file 686 includes a method identifier 687 “IDB”, a Sano ID 688 “001B”, and signature data 689.
- the method identifier 687 “IDB” is the method identifier “IDB” input by the operator and indicates the RSA encryption method used to generate the signature data 689.
- the signature data 689 is obtained by substituting a combined product obtained by combining the cryptographic circuit file 631 “C”, the key circuit file 651 “KC”, the verification key file 671 “VeriC”, and the decryption key information “KinfB” into the hash function.
- the generated digest data is generated by applying an encryption algorithm according to the RS A encryption method using a signature key “Ksig-Bb” unique to the encryption method management server 600.
- content reproduction apparatus 100 is provided with two encryption methods, and one of them is assumed to be decrypted, the same encryption is used for both file encryption and signature generation. Although the method is used, if the content reproduction apparatus 100 includes a large number of encryption methods, different encryption methods may be used for encryption and signature generation.
- the input unit 613 includes various keys, receives various instructions and information input by the operator, and outputs the received information and instructions to the control unit 607.
- Display unit 612 includes an indicator lamp and a display, and displays various screens, lights the lamp, and the like under the control of control unit 607.
- the content playback device 100 has a DES encryption method and an RSA encryption method, and acquires and acquires content encrypted using the DES encryption method and signature data generated using the RSA encryption method. Verify the signed data. If the verification is successful, the obtained encrypted content is decrypted and reproduced. Also, the content encrypted by the DES encryption method is written in the memory card 500.
- the content playback apparatus 100 replaces the DES encryption method.
- AES encryption method is introduced.
- content encrypted by DES encryption is acquired after the introduction of AES encryption, the encrypted content can be decrypted and played back. It cannot be output to memory card 500.
- the content playback apparatus 100 introduces an elliptic curve encryption method that replaces the RSA encryption method. After installing the elliptic curve cryptosystem, if the encrypted content is obtained together with the signature data generated using the RSA cryptosystem, the encrypted content can be played. Output to the memory card 500. I can't.
- FIG. 8 is a block diagram showing a functional configuration of content reproduction device 100.
- the content reproduction apparatus 100 includes a content acquisition unit 101, a master individual key storage unit 102, a device key storage unit 103, an input / output unit 104, a program acquisition unit 106, a main storage unit 107, and a variable circuit 108.
- the content reproduction apparatus 100 is a computer system including a microprocessor, RAM, and ROM, and a computer program is stored in the RAM and ROM.
- the content reproduction apparatus 100 achieves part of its functions by the microprocessor operating according to the computer program. Each component will be described below.
- the master individual key storage unit 102 is also configured with ROM power.
- the master individual key storage unit 102 is tamper resistant and does not accept access by external devices!
- the master individual key storage unit 102 stores a master individual key 126 and a common secret key 127 as shown in FIG. 9 (a).
- the master individual key 126 and the common secret key 127 are recorded when the content playback apparatus 100 is manufactured.
- the master individual key 126 is data having a length of 1024 bits and is unique to the content reproduction apparatus 100.
- the common secret key 127 is data having a length of 1024 bits, and is a data common to legitimate playback devices that can play back the content distributed by the content server 700. Data.
- the device key storage unit 103 is composed of a writable and erasable recording element such as a flash memory, and stores, as an example, a device key 128 “DevA” as shown in FIG. 9B.
- the device key 128 “DevA” is key data unique to the content reproduction device 100.
- Device key 128 “DevA” is 56-bit key data corresponding to the DES encryption method, and is generated by a key generation circuit built in variable circuit 108 according to key generation circuit program 143. It is.
- the main storage unit 107 is accessed by the control unit 116, the validity check unit 112, and the variable circuit 108.
- FIG. 10 shows an example of information stored in the main storage unit 107.
- the main storage unit 107 stores variable circuit information 161 and an available encryption method table 166.
- the variable circuit information 161 is information indicating the current state of the variable circuit 108, and includes an operable method identifier 162, an operation flag 163, and a key identifier 164.
- the operable method identifier 162 is a method identifier indicating an encryption method corresponding to a circuit currently built in the variable circuit 108.
- the operation flag 163 is a flag indicating whether the circuit constructed in the variable circuit 108 is an encryption processing circuit, a decryption processing circuit, or a key generation circuit. “0” indicates the encryption processing circuit, “ “1” indicates a decryption processing circuit, and “2” indicates a key generation circuit.
- the key identifier 164 indicates an encryption method corresponding to the device key currently stored in the device key storage unit 103.
- the variable circuit information 161 includes an operable method identifier 162 “IDA”, an operation flag 163 “1”, and a key identifier 164 “IDA”.
- the device key storage unit 103 is configured by the DES encryption method. Indicates that the 56-bit device key “DevA” suitable for the method is stored. The following is a concrete explanation.
- the power control unit 116 and the correctness check unit 112 each specify the operable method identifier 162 and the operation flag 163 each time the selection unit 113 and 114 are instructed to output the program to the variable circuit 108.
- the operable method identifier 162 and the operation flag 163 are rewritten so as to indicate the state of the variable circuit 108.
- the control unit 116 causes the key identifier 164 to correspond to the device key generated by the key generation circuit each time the key generation circuit constructed in the variable circuit 108 is instructed to generate a device key.
- the key identifier 164 is rewritten.
- Available encryption method table 166 is a table showing encryption methods provided in content reproduction apparatus 100, and FIG. 11 (a) shows details thereof. As shown in FIG. 11 (a), the usable encryption method table 166 includes a plurality of pieces of usable information 171 and 172. Each usable information includes a method identifier and a usage flag.
- the system identifier indicates an encryption system provided in the content reproduction apparatus 100.
- the use flag indicates whether encryption and decryption processing according to the encryption method indicated by the method identifier is possible.
- the usage flag “1” indicates that the encryption key and the decryption key can be processed.
- the usage flag “0” indicates that the decryption process can be performed but the encryption process cannot be performed.
- FIG. 11 (a) is an available encryption method table 166 at the time of manufacturing the content reproduction device 100.
- the available information 171 includes a method identifier “IDA” and a use flag “1”, which perform encryption processing and decryption processing by the DES encryption method indicated by the content playback device 100 method identifier “IDA”. It shows that you can.
- the usable information 172 includes a scheme identifier “IDB” and a utilization flag “1”. This indicates that the content playback apparatus 100 performs encryption processing by the RS A encryption scheme indicated by the scheme identifier “IDB”. It also shows that the decryption process can be performed.
- Figure 11 (b) shows the available encryption method table 166b after the DES encryption method was decrypted and the AES encryption method replaced with the DES encryption method was introduced.
- the usable encryption method table 166b includes usable information 171b instead of the usable information 171 of the usable encryption method table 166, and further includes usable information 173 corresponding to the newly introduced AES encryption method.
- the usable information 171b includes a scheme identifier “IDA” and a utilization flag “0”, and the content playback apparatus 100 performs a decoding process using the DES encryption scheme indicated by the scheme identifier “IDA”. The power to be able to show that cipher processing is not possible.
- the available information 173 includes a method identifier “IDC” and a use flag “1”, which perform encryption processing and decryption processing by the AES encryption method indicated by the content playback device 100 method identifier “IDC”. It shows that you can.
- the main storage unit 107 temporarily stores various types of information during various types of processing by the control unit 116, the validity check unit 112, and the variable circuit 108.
- the cryptographic circuit storage unit 117 is configured by a writable and erasable nonvolatile memory such as a flash memory.
- FIG. 12 shows an example of information stored in the cryptographic circuit storage unit 117.
- Fig. 12 (a) shows the encryption circuit storage unit 11 7 at the beginning of the production of the content playback device 100.
- the encryption circuit storage unit 117 after the introduction is shown.
- FIG. 12 (a) and (b) the same information is denoted by the same reference numerals.
- the cryptographic circuit storage unit 117 stores a cryptographic circuit file 131 “A” and a cryptographic circuit file 136 “B”. Each encrypted file corresponds to the DES encryption method and the RSA encryption method. Each encryption circuit file is stored in the key circuit storage unit 119 and corresponds to the key circuit file.
- Each cryptographic circuit file has a scheme identifier indicating a corresponding cryptographic scheme and a cryptographic processing circuit configuration that performs encryption processing using the corresponding cryptographic scheme, similar to the cryptographic circuit file 631 “C” described with reference to FIG. And a decryption circuit program showing a configuration of a decryption processing circuit that performs decryption processing by a corresponding encryption method.
- the encryption circuit file 131 “A” includes a method identifier 132 “IDA” indicating the DES encryption method, an encryption circuit program 133 indicating the configuration of the encryption processing circuit according to the DES encryption method, “EncAj, DES encryption method”
- the decryption circuit program 134 “DecA” indicating the configuration of the decryption processing circuit according to the above is included.
- Cryptographic circuit file 136 “B” contains a scheme identifier 137 “IDB” indicating the RSA cryptographic scheme, a cryptographic circuit program 138 “EncB” indicating the configuration of the cryptographic processing circuitry according to the RS A cryptographic scheme, and a decryption processing circuit compliant with the RS A cryptographic scheme. Includes decryption circuit program 139 “DecB” showing the configuration.
- the cryptographic circuit storage unit 117 after the introduction of the AES encryption method stores the cryptographic circuit files 131b, 136, and 181.
- the encryption circuit file 131b “A” is obtained by deleting the encryption circuit program 133 “EncA” from the encryption circuit file 131 “A”.
- the encryption circuit file 181 “C” corresponds to the AES encryption method and is the same as the encryption circuit file 631 “C” stored in the encryption method management server 600.
- the key circuit storage unit 119 is configured by a writable and erasable nonvolatile memory such as a flash memory.
- FIG. 13 shows an example of information stored in the key circuit storage unit 119.
- Fig. 13 (a) shows the key circuit storage unit 119 at the beginning of manufacture of the content playback device 100
- Fig. 13 (b) shows the AES encryption method that replaces the DES encryption method when the DES encryption method is decrypted.
- the key circuit storage unit 119 after installation is shown.
- the same information is denoted by the same reference numerals.
- the key circuit storage unit 119 stores a key circuit file 141 “KA” and a key circuit file 146 “KB”. Each key circuit file corresponds to the DES encryption method and RSA encryption method. Each key circuit file includes a method identifier indicating a corresponding encryption method and a key generation circuit program indicating a configuration of a key generation circuit that generates a device key suitable for the corresponding encryption method.
- the key circuit file 141 “KA” includes a scheme identifier 142 “IDA” indicating a DES encryption scheme and a configuration of a key generation circuit that generates a 56-bit device key suitable for the DES encryption scheme.
- the key circuit file 146 “KB” includes a method identifier 147 “IDB” indicating an RSA encryption method and a key generation circuit program 148 “showing the configuration of a key generation circuit that generates a 128-bit device key suitable for the RS A encryption method” KgenB ".
- the key circuit storage unit 119 stores the key circuit files 141, 146, and 186.
- the key circuit file 186 “KC” corresponds to the AES encryption method, and is the same as the key circuit file 651 stored in the encryption method management server 600.
- the selection unit 113 reads the method identifier and the encryption circuit program or the method identifier and the decryption circuit program from the encryption circuit file stored in the encryption circuit storage unit 117 according to the instruction of the control unit 116 or the validity check unit 112. Memorize temporarily.
- control unit 116 or the validity checking unit 112 instructs to output the read program.
- the read encryption circuit program or decryption circuit program is output to the construction mechanism 123 and the configurator ROM 124 (detailed later) in the variable circuit 108.
- the selection unit 114 reads the method identifier and the key generation circuit program from the encryption circuit file stored in the key circuit storage unit 119 in accordance with an instruction from the control unit 116, and temporarily executes fe. .
- the selection unit 114 is instructed by the control unit 116 to output the read program.
- the read key generation circuit program is output to the construction mechanism 123 and the configurator ROM 124 in the variable circuit 108.
- the combination check unit 118 confirms from the control unit 116 that the encryption circuit program or decryption circuit program read by the selection unit 113 and the key generation circuit program read by the selection unit 114 correspond to! / Receive the instruction to confirm the response.
- the combination check unit 118 compares the method identifier held by the selection unit 113 with the method identifier held by the selection unit 114. When the two match, an OK signal indicating that the program read by the selection unit 113 corresponds to the program read by the selection unit 114 is output to the control unit 116.
- variable circuit 108 is tamper-resistant hardware, and when the data in the variable circuit 108 is read from the outside, the data is lost.
- the method for realizing tamper resistance is arbitrary and is not limited to this method.
- the variable circuit 108 includes an FPGA 122, a configuration ROM 124, and a construction mechanism 123.
- the config ROM 124 includes an EEPROM, and stores any one of the programs stored in the encryption circuit storage unit 117 and the key circuit storage unit 119.
- the FPGA 122 includes a plurality of CLBs (Configuration Logic Blocks) and a connection resource force that connects them.
- CLBs Configuration Logic Blocks
- the construction mechanism 123 configures the FPGA 122 according to the program stored in the confider ROM 124 when the content playback apparatus 100 is powered on.
- a key generation circuit, an encryption processing circuit, and a decryption processing circuit are constructed on the FPGA 122 in accordance with the key circuit generation program, the encryption circuit program, and the decryption circuit program output from the selection units 113 and 114.
- an arbitrary logic function circuit is generated on a plurality of CLBs (Configuration Logic Blocks) constituting the FPGA 122, and the logic circuit is connected by a connection resource existing between the CLBs.
- CLBs Configuration Logic Blocks
- the constructed key generation circuit, encryption processing circuit, or decryption processing circuit performs encryption, decryption, and key generation in accordance with instructions from the control unit 116 and the validity check unit 112. In the following, encryption, decryption, and key generation using a variable circuit will be described.
- FIG. 14 functionally shows the key generation circuit 151 built in the variable circuit 108.
- the key generation circuit 151 is instructed by the control unit 116 to generate a device key.
- the master individual key 126 and the common secret key 127 are read from the master individual key storage unit 102, and the device key 1 28 based on the read master individual key 126 and the common secret key 127. Is generated.
- the key generation circuit 151 When the key generation circuit 151 is constructed according to the key generation circuit program “KgenA”, the key generation circuit 151 The generation circuit 151 generates a 56-bit device key “DevA” suitable for the DES encryption method.
- the key generation circuit 151 When the key generation circuit 151 is constructed according to the key generation circuit program “KgenB”, the key generation circuit 151 generates a 128-bit device key “DevB” suitable for the RSA encryption method.
- the key generation circuit 151 If the key generation circuit 151 is constructed according to the key generation circuit program “KgenC”, the key generation circuit 151 generates a 128-bit device key “DevC” suitable for the AES encryption method.
- FIG. 15 is a flowchart showing an example of device key generation processing by the key generation circuit 151 constructed according to the key generation circuit program “KgenA”.
- KgenA the key generation processing by the key generation circuit 151 will be described with reference to FIG.
- the key generation circuit 151 reads the master individual key 126 from the master individual key storage unit 102 (step S101). The 151st to 156th bits from the beginning of the read master individual key are extracted (step S102). The extracted bit string is called the first extraction part.
- the key generation circuit 151 reads the common secret key 127 from the master individual key storage unit 102 (step S103).
- the last 56 bits of the common secret key 127 (hereinafter referred to as the second extraction part) are extracted (step S106), the second extraction part is used as the encryption key, and the first extraction part uses the DES encryption method encryption algorithm.
- To generate a ciphertext (step S107).
- the generated ciphertext is written in the device key storage unit 103 as the device key “DevA” (step S108).
- the key generation method described above is an example, as long as it can generate a 56-bit device key suitable for the DES encryption method.
- a method for generating a device key by a key generation circuit constructed by another key generation circuit program is arbitrary, and any method can be used as long as a device key having a key length suitable for the corresponding encryption method can be generated.
- a method that makes it difficult for a third party to guess the key generation procedure by key generation is preferable.
- FIG. 16 shows a functional configuration of the cryptographic processing circuit 152 constructed on the variable circuit 108.
- the cryptographic processing circuit 152 includes a key processing unit 153 and a cryptographic key unit 154.
- the key processing unit 153 receives card key information from the control unit 116.
- the card key information is stored in a memory card (to be described later) attached to the content reproduction apparatus 100 and is stored in a memory card (described later), and includes a media key block and a card ID.
- the key processing unit 153 Upon receiving the card key information, the key processing unit 153 reads the device key 128 from the device key storage unit 103, and from the media key block included in the card information based on the read device key 128. A unique card key unique to the memory card is generated. The generated card unique key is output to the encryption key unit 154. If the encryption method of the memory card is a common key encryption method such as the DES encryption method, the card unique key generated here is the same as the card unique key stored in the memory card itself, In the case of the public key cryptosystem, it is a key corresponding to the card unique key stored in the memory card itself.
- the encryption key unit 154 receives the card encryption key from the key processing unit 153. Also, the content key is received from the control unit 116, and encryption is instructed.
- the encryption key unit 154 When instructed to encrypt the content key, the encryption key unit 154 generates an encrypted content by encrypting the content key using the received card unique key, and inputs the generated encrypted content key. Output to the output unit 104.
- the key processing unit 153 When the encryption circuit 152 is constructed according to the encryption circuit program "EncA", the key processing unit 153 generates a 56-bit card unique key, and the encryption unit 154 uses the DES encryption method.
- a cryptographic key content key is generated by applying a cryptographic key algorithm according to the above.
- the key processing unit 153 When the cryptographic processing circuit 152 is constructed in accordance with the cryptographic circuit program “EncB”, the key processing unit 153 generates a 128-bit card unique key, and the cryptographic key unit 154 is a cryptographic key algorithm according to the RSA encryption method. To generate an encrypted content key.
- the cryptographic processing circuit 152 When the cryptographic processing circuit 152 is constructed according to the cryptographic circuit program "EncC", the key processing unit 153 generates a 128-bit card unique key, and the cryptographic key unit 154 performs encryption using the AES encryption method. A key algorithm is applied to generate an encrypted key key.
- FIG. 17 functionally shows a decoding processing circuit 156 built in the variable circuit 108.
- Decryption processing circuit 156 includes a key processing unit 157 and a decryption unit 158.
- Key processing unit 157 receives content key information and content key extraction instructions from control unit 116. It also receives decryption key information and a decryption key extraction instruction.
- the key processing unit 157 Upon receiving the instruction to extract the content key or the decryption key, the key processing unit 157 reads the device key from the device key storage unit 103, and based on the read device key, the content key or the decryption key information Extract the decryption key. The extracted content key or decryption key is output to the decryption unit 158 and the main storage unit 107.
- the decryption unit 158 receives the ciphertext and the decryption instruction for the ciphertext from the control unit 116 or the validity check unit, generates a decrypted text by applying a decryption algorithm to the received ciphertext, and generates the decrypted text. Output.
- the ciphertext received by the decryption unit 158 from the control unit 116 is an encrypted content, an encrypted encryption circuit file, an encryption key circuit file, and an encryption verification key file.
- the decrypting unit 158 obtains the content key from the key processing unit 157, decrypts the B-signed content using the obtained content key, and generates content. . In response to an instruction from the control unit 116, the generated content is output to the reproduction processing unit 109.
- the decryption unit 158 obtains the decryption key from the key processing unit 157, decrypts the encrypted key circuit file, the encrypted key circuit file, and the encrypted key verification key file by using the acquired decryption key.
- a circuit file, a key circuit file, and a verification key file are generated, and the generated encryption circuit file, key circuit file, and verification key file (in FIG. 17, these three are collectively referred to as a file) are stored in the main memory. Write to part 107.
- the ciphertext received by the decryption unit 158 from the validity check unit 112 is received from the encryption method management server 600 together with the signature data read from the DV D400a or 400b or the encryption program.
- Signature data is received from the encryption method management server 600 together with the signature data read from the DV D400a or 400b or the encryption program.
- the decryption unit 158 obtains a verification key from the validity check unit 112 together with the signature data.
- a decryption algorithm is applied to the signature data using the acquired verification key.
- decryption digest data is generated.
- the generated decryption digest data is output to the main storage unit 107.
- the decryption unit 158 When the decryption unit 158 is constructed in accordance with the decryption circuit program “DecA”, the decryption unit 158 generates decryption digest data by applying a decryption algorithm by the DES encryption method to the signature data.
- the decryption unit 158 when the decryption unit 158 is constructed according to the decryption circuit program “DecB”, the decryption unit 158 generates decryption digest data by applying a decryption algorithm by the RSA encryption method to the signature data.
- the decryption unit 158 When the decryption unit 158 is constructed according to the decryption circuit program "DecC", the decryption unit 158 generates decryption digest data by applying a decryption algorithm based on the AES encryption method to the signature data.
- the content acquisition unit 101 can be loaded with a DVD, reads information stored in the DVD under the control of the control unit 116, and outputs the read information to the variable circuit 108 or the main storage unit 107.
- the content acquisition unit 101 can receive information similar to the information recorded on the DVD from the content server 700 connected to the Internet 20.
- the program acquisition unit 106 transmits and receives information and instructions to and from the encryption method management server 600 connected via the Internet 20 under the control of the control unit 116.
- the validity check unit 112 holds a check information table 201 shown in FIG.
- the check information table 201 includes a plurality of check information modules, and each check information corresponds to the encryption method provided in the content reproduction apparatus 100 and includes a method identifier, a server, and a verification key.
- the verification key is a key having a bit length suitable for the encryption method indicated by the method identifier, and corresponds to a signature key unique to the device indicated by the server ID.
- the check information 203 includes a method identifier “IDB”, a Sano ID “001B”, and a verification key “Kve Bb”.
- Verification key ⁇ Kve BbJ is a 128-bit key corresponding to the RSA encryption method indicated by the method identifier “IDB”, and corresponds to the signature key “Ksig—Bb” unique to the encryption method management Sano 600 indicated by the sano ID “001B”. ing.
- the validity checking unit 112 receives the content file, the content key information, and the signature file from which the DVD 400a or 400b has been read from the control unit 116, and is instructed to verify the signature.
- the validity checking unit 112 receives an encryption circuit file “C”, a key circuit file “KC”, a verification key file “VeriC”, a decryption key from the control unit 116 during the introduction of the encryption method (details will be described later).
- the key information “KinfB” and a signature file having the configuration shown in FIG. 7 as an example are received, and signature verification is instructed.
- the validity check unit 112 extracts the method identifier included in the received signature file.
- the validity check unit 112 searches the check information table 201 for check information including the same method identifier as the extracted method identifier. When the corresponding check information cannot be detected, a verification failure notification indicating signature verification failure is output to the control unit 116.
- the correctness check unit 112 When the corresponding check information is detected, the correctness check unit 112 next outputs the extracted method identifier to the selection unit 113, and the decoding processing circuit 156 for instructing the reading and output of the decoding circuit program is constructed. Then, the validity check unit 112 reads the verification key included in the detected check information, and the signature data included in the signature file and the read verification key are stored in the decryption processing circuit 156 built in the variable circuit 108. The data is output to the decoding unit 158, and decoding is instructed.
- the validity check unit 112 converts a combined product obtained by combining the content file received from the control unit 116 and the content key information into a no-shake function. Assign to generate digest data. Generated die The digest data is compared with the decrypted digest data, and if they match, a verification success notification indicating that the signature verification is successful is output to the control unit 116.
- the validity checking unit 112 outputs a verification failure notification indicating that the signature verification has failed to the control unit 116.
- the validity check unit 112 performs the same procedure as in (10-a) on the received book name file. Verify the included signature data.
- the digest data is generated by substituting the combined product obtained by combining the encryption circuit file, the key circuit file, the verification key file, and the decryption key information into the hash function.
- the validity checking unit 112 is further instructed by the control unit 116 to write the encryption circuit file and the key circuit file.
- the validity checking unit 112 writes the encryption circuit file and the key circuit file to the encryption circuit storage unit 117 and the key circuit storage unit 119, respectively.
- the validity check unit 112 is instructed by the control unit 116 to update the check information table 201.
- the validity check unit 112 When instructed to update the check information table 201, the validity check unit 112 generates new check information based on the verification key file, and adds the generated check information to the check information table 201.
- the specific wiring is omitted, and the force control unit 116 is connected to each component constituting the content reproduction device 100 and controls each operation.
- control unit 116 When the control unit 116 receives a warning notification notifying that the encryption method has been decrypted from the encryption method management server 600 via the program acquisition unit 106, the control unit 116 creates a new encryption method in place of the decrypted encryption method. Introduce the method.
- control unit 116 detects the installation of the DVD 400a or 400b via the content acquisition unit 101. When the installation of the DVD 400a or 400b is detected, it is verified whether the encrypted content recorded on the attached DVD can be played.
- control unit 116 receives operation instructions indicating various operations by the user from the input unit 121. Information is received, and content is played back and copied to the memory card according to the received operation instruction information.
- the warning notification received from the encryption method management server 600 includes a method identifier indicating the decrypted encryption method.
- a method identifier indicating the decrypted encryption method.
- the case where the method identifier “IDA” indicating the DES encryption method is included will be described as an example, but the same processing is performed when other method identifiers are included.
- Control unit 116 detects available information 171 including method identifier “IDA” in available encryption method table 166. If the usage flag included in the available information is read and the read usage flag is “0”, the installation of the encryption method that replaces the DES encryption method has already been completed, and the subsequent processing is stopped.
- control unit 116 transmits an introduction request for requesting introduction of the encryption method to the encryption method management server 600 via the program acquisition unit 106.
- the control unit 116 via the program acquisition unit 106, performs the encryption key circuit file 681, the encryption key circuit file 682, the encryption key verification key file 683, and the method identifier 6 84 shown in FIG.
- the decryption key information 685 and the signature file 686 are received.
- the selection unit 113 is instructed to read the decryption circuit program corresponding to the RSA encryption method indicated by the method identifier 684, and is instructed to read the key generation circuit program corresponding to the RSA encryption method indicated by the method identifier 684.
- the combination check unit 118 outputs a corresponding confirmation instruction for the read programs.
- the control unit 116 Upon receiving an OK signal from the combination check unit 118, the control unit 116 instructs the selection unit 114 to output the read key generation circuit program. Next, the key generation circuit 151 constructed in the variable circuit 108 is instructed to generate a device key.
- the control unit 116 When the device key “DevB” is generated by the key generation circuit 151, the control unit 116 then The selection unit 113 is instructed to output the read decoding circuit program.
- variable circuit information 161 stored in the main storage unit 107 corresponds to the device key strength SA encryption method currently stored in the device key storage unit 103, and the variable circuit information 108 is currently present. If it is shown that a decryption processing circuit conforming to the RSA encryption method is constructed, the above-mentioned program reading instruction, device key generation, and construction of the decryption processing circuit are omitted.
- the control unit 116 outputs the decryption key information 685 to the key processing unit 157 in the decryption processing circuit 156. Also, the encrypted encryption circuit file 681 “EncB (C, KencB)”, the encryption key circuit file 682 “EncB (KC, KencB)”, and the encryption verification key file 683 “En cB (VeriC, KencB)” are sent to the decryption unit 158. "Is output to instruct decoding.
- the control unit 116 transmits the encryption circuit file “C”, the key The circuit file “KC”, the verification key file rVeriCj, the received decryption key information 685 and the signature file are output to the validity check unit 112 to instruct signature verification.
- control unit 116 instructs the validity checking unit 112 to write the cryptographic circuit file “C” and the key circuit file “KC”. If the signature verification is unsuccessful, the installation request is transmitted again to the encryption method management server 600 via the program acquisition unit 106.
- control unit 116 instructs the validity checking unit 112 to update 201 of the check information table.
- usable information including the method identifier “IDC” and the usage flag “1” included in the cryptographic circuit file “C” is generated, and the generated usable information is added to the available cryptographic method table 166. To do.
- the control unit 116 detects the cryptographic circuit file 131 including the method identifier “IDA”, and deletes the cryptographic circuit program 133 from the detected cryptographic circuit file 131. Subsequently, the control unit 116 selects the available information 171 including the method identifier “IDA” in the available encryption method table 166 stored in the main storage unit 107, and uses included in the selected available information 171. Rewrite the flag to “0”.
- the control unit 116 reads the content file 401, the content key information 404, and the signature file 411 from the DVD 400a mounted via the content acquisition unit 101. .
- the method identifier 402 “IDA” included in the content file 401 is extracted, and the method identifier that matches the extracted method identifier is stored in the available encryption method table 166 stored in the main storage unit 107. Contains Search for available information. At this time, if the corresponding usable information cannot be detected, it is determined that the information cannot be reproduced.
- the control unit 116 When the corresponding usable information 171 is detected, the control unit 116 next outputs the read content file 401, content key information 404 and signature file 411 to the validity check unit 112, and the signature file 411 The verification of the included signature data 414 is instructed. If the verification of the signature data 414 by the validity check unit 112 is successful, the control unit 116 determines that the content can be reproduced. If the verification of the signature data fails, the control unit 116 determines that the content cannot be reproduced.
- the content playback apparatus 100 cannot play back the content recorded on the DVD 400b until the AES encryption method that replaces the decrypted DES encryption method is introduced. Even after introducing the AES encryption method, DV D400a content can be played.
- the control unit 116 After determining that playback is possible by the above verification, when receiving operation instruction information indicating playback from the input unit 121, the control unit 116 extracts the method identifier 402 “IDA” included in the content file 401. To do. Next, the control unit 116 controls the selection units 113 and 114, the combination check unit 118, and the variable circuit 108 to generate the device key “DevA” corresponding to the method identifier 402 “IDA”, and the decryption processing circuit Build 156. The generation of the device key and the control of the construction of the decryption processing circuit 156 are the same as the procedure described in the above (introduction of the encryption method), and thus the description thereof is omitted here.
- control unit 116 outputs the read content key information 404 to the key processing unit 157 in the constructed decryption processing circuit 156, and outputs the encrypted content 403 to the decryption unit 158.
- the decryption of the encryption key content 403 is instructed.
- control unit 116 instructs the reproduction processing unit 109 to reproduce the content.
- the control unit 116 receives the method identifier 402 riDAj and the signature file 411 included in the content file 401.
- the system identifier 413 “ID B” included in is extracted.
- the usable encryption method table 166 is read from the main storage unit 107, and the read available encryption method table 166 is searched for usable information including the method identifier “IDA” and the method identifier “IDB”, respectively. To do.
- control unit 116 If neither of them can be detected, the control unit 116 generates an error screen indicating that copying cannot be performed, and displays the error screen on the monitor 15 via the reproduction processing unit 109.
- the control unit 116 reads the usage flags included in the detected usable information 171 and 172, respectively. If any one of the read usage flags is “0”, an error screen is generated to notify that the content recorded on the attached DVD cannot be copied, and is monitored. Displayed at 15.
- control unit 116 extracts the method identifier 402 “IDA” from the content file 401, and inputs / outputs the extracted method identifier “IDA”.
- the data is output to the memory card 500 via the section 104, and an inquiry is made as to whether or not the encryption method indicated by the output method identifier “IDA” is provided.
- control unit 116 receives a response signal from the memory card 500 via the input / output unit 104. If the received response signal is provided with the encryption method indicated by the method identifier “IDA!”! / ⁇ ! And “0” indicating this, an error screen is displayed to notify that the requested copy cannot be made. And display on monitor 15.
- the control unit 116 selects the selection units 113 and 114,
- the combination check unit 118 controls the variable circuit 108 to read the method identifier “ID” read from the content file 401.
- a device key corresponding to “A” 3 ⁇ 4 ⁇ 8 ” is generated, and a decryption processing circuit for performing decryption processing according to the scheme identifier“ ID Aj ”is constructed on the variable circuit 108.
- Device key generation and decryption processing circuit The control of the construction of 156 is the same as the procedure described in the above (introduction of the encryption method), and thus the description thereof is omitted here.
- control unit 116 outputs the read content key information 404 to the key processing unit 157 in the constructed decryption processing circuit 156, and instructs generation of a content key.
- the control unit 116 When the content key “KconA” is generated by the key processing unit 157, the control unit 116 next instructs the selection unit 113 to read out and output the cryptographic circuit program corresponding to the scheme identifier 402 “IDA”.
- the control unit 116 instructs the memory card 500 to output card key information via the input / output unit 104, and the memory card 500 Get key information.
- control unit 116 outputs the acquired card key information to the key processing unit 153 in the encryption processing circuit 152, and outputs the content key “KconA” to the encryption unit 154 to output the content key “KconA”. Specify cipher key.
- the control unit 116 extracts the encrypted content 403 “EncA (ConA, KconA)” from the content file 401.
- the extracted encrypted content 403 “EncA (ConA, KconA)” and the encrypted content key “EncA (KconA, MkeyA)” are output to the memory card 500 via the input / output unit 104.
- the input / output unit 104 can be loaded with a memory card 500 and inputs / outputs various information under the control of the control unit 116.
- the input unit 121 includes various buttons such as a play button, a selection button, and an enter button.
- the input unit 121 receives an operation of the button by the user, and outputs operation instruction information indicating the received operation to the control unit 116.
- the playback processing unit 109 is connected to the monitor 15 and is variable according to the instruction of the control unit 116. A screen and sound are generated from the content received from the circuit 109 and output to the monitor 15.
- various screens including an error screen are displayed on the monitor 15 according to instructions from the control unit 116.
- the memory card 500 includes an input / output unit 502, a control unit 507, an encryption unit 508, a decryption unit 509, and an information storage unit 510.
- the information storage unit 510 includes a flash memory, and the inside thereof is divided into a secure area 520 and a general area 512.
- Secure area 520 is an area that cannot be accessed by devices other than legitimate devices.For example, method identifier 521 ⁇ IDA '', card key information 522, and card unique key 5 23 ⁇ MkeyA '' are stored! /
- Method identifier 521 "IDA" indicates the encryption method provided in the memory card 500, and here indicates the DES encryption method.
- the card key information 522 includes a media key block and a media ID.
- the media ID is an identifier unique to the memory card 500.
- the media key block is data that gives the card unique key “MkeyA” only to a legitimate device that is permitted to access the memory card 500. If the memory card supports the public key cryptosystem, the card unique key generated from the card key information by a legitimate device is not the same as the card unique key stored in the memory card itself! / ,.
- Card unique key 523 "MkeyA" is a key unique to memory card 500, and here is a 56-bit key corresponding to the encryption method indicated by method identifier 521.
- the general area 512 is an area that can be freely accessed by an external device, and stores a content file 513 as an example.
- the content file 513 includes the encrypted content 514 “EncA (ConA, KconA)” and the encrypted content key 515 “EncA (KconA, MkeyA)”.
- the encrypted content 514 is the same as the encrypted content 403 recorded on the DVD 400a.
- the encrypted content key 515 is generated by applying the encryption algorithm according to the DES encryption method to the content key “KconA” using the card unique key “MkeyA”.
- the input / output unit 502 includes an interface connectable to an external device, and exchanges various types of information between the external device and the control unit 507.
- the external devices are the content playback device 100 and the portable player 800.
- the encryption unit 508 receives the encryption key and plaintext from the control unit 507 and is instructed to perform encryption. When encryption is instructed, an encryption key based on the DES encryption method is applied to the plaintext using the encryption key to generate a ciphertext, and the generated ciphertext is output to the control unit 507.
- Decryption unit 509 receives a decryption key and ciphertext from control unit 507 and is instructed to decrypt. When decryption is instructed, decryption algorithm based on the DES encryption method is applied to the ciphertext using the decryption key to generate a decrypted text, and the generated decrypted text is output to the control unit 507.
- the control unit 507 controls each component constituting the memory card 500.
- the control unit 507 receives the system identifier from the content playback apparatus 100 via the input / output unit 502, and includes the encryption system indicated by the received system identifier. Get inquiries about the power or not. When the inquiry is received, the received method identifier is compared with the method identifier 521 stored in the secure area 520, and if they match, the ciphertext encrypted by the encryption method indicated by the received method identifier is obtained. A response signal “1” indicating that decoding is possible is generated.
- control unit 507 If the two do not match, control unit 507 generates response signal “0” indicating that the ciphertext encrypted by the encryption method indicated by the received method identifier cannot be decrypted.
- control unit 507 outputs the generated response signal to the content reproduction device 100 via the input / output unit 502.
- control unit 507 outputs the card key information 522 to the content reproduction apparatus 100 in accordance with a request from the content reproduction apparatus 100.
- the encrypted content and the encrypted content key are received from the content reproduction apparatus 100, a content final including the received encrypted content and the B sound key content key is generated, and the generated content file is generated. Write to the general area.
- Memory card 500 power When portable player 800 power is requested to play content while it is attached to portable player 800, control unit 507 decrypts card-specific key 523 and encrypted content key 515. 509 to instruct the decryption of the encrypted content key 515.
- control unit 507 Upon receiving the content key from the decryption unit 509, the control unit 507 outputs the received content key and the encrypted content 514 to the decryption unit 509, and instructs decryption. Subsequently, the content generated by the decryption unit 509 is output to the portable player.
- a portable player is a device dedicated to playback of content consisting of video and audio, and is a device that reads and plays back the content recorded on the memory card 500.
- FIG. 20 is a flowchart showing a part of the operation of the content playback apparatus 100 after the power is turned on.
- the operation of the content reproduction apparatus 100 will be described with reference to FIG.
- the encryption method management server 600 After the power is turned on, the encryption method management server 600 has decrypted! / Of the encryption methods of the content playback device 100 via the program acquisition unit 106.
- the content reproduction apparatus 100 When receiving the warning notification indicating that this is the case (YES in step S121), the content reproduction apparatus 100 introduces an encryption method that replaces the decrypted encryption method (step S122).
- step S123 when it is detected via the content acquisition unit 101 that a new DVD has been loaded (YES in step S123), the content playback device 100 converts the content recorded on the loaded DVD into the relevant content. It is verified whether or not the content reproduction apparatus 100 is capable of reproduction (step S124).
- step S121 If neither warning notification nor DVD installation is detected (NO in step S121, NO in step S123), the process waits as it is.
- step S124 As a result of the verification in step S124, it is determined that playback is possible (step S
- step S126 if it is determined that playback is not possible (NO in step S126), the monitor 15 is informed that it is attached and recorded on a DVD that cannot be played back! Display the error screen (step S127).
- FIG. 21 to FIG. 24 are flowcharts showing the operations of the content playback apparatus 100 and the encryption method management server 600 regarding the introduction of an encryption method that replaces the decrypted encryption method. This is a detail of step S122 in FIG.
- the control unit 607 of the encryption method management server 600 receives the input of the method identifier “IDA” and a new encryption method distribution instruction by the operator via the input unit 613 (step S1 41). Upon receiving the input of the distribution instruction, the control unit 607 generates a warning notification including the input method identifier “IDA”, and transmits the generated warning notification to the content playback apparatus 100 via the transmission / reception unit 601. (Step S142). Also, via the input unit 613, there are a method identifier “IDB” indicating an encryption method for encryption of various files related to the introduction of the encryption method, and a method identifier “IDB” indicating an encryption method for generating signature data. Accept input (Step S143).
- the control unit 116 of the content reproduction apparatus 100 passes through the program acquisition unit 106 to A warning notification is received from the expression management server 600.
- the warning notification is received, based on the method identifier “IDA” included in the received warning notification, the usable information 171 is detected from the usable encryption method table 166 stored in the main storage unit 107, and the detected use is detected.
- the usage flag included in the possible information 171 is read (step S146). If the read usage flag is “0” (NO in step S147), the introduction of the encryption method that replaces the DES encryption method has already been completed. Therefore, the encryption method introduction process is terminated and the processing returns to FIG. .
- step S147 If the read usage flag is "1" (YES in step S147), the control unit 116 sends an introduction request requesting introduction of an encryption method instead of the DES encryption method via the program acquisition unit 106. Is transmitted to the encryption method management server 600 (step S148).
- the control unit 607 of the encryption method management server 600 receives the introduction request from the content reproduction apparatus 100 via the transmission / reception unit 601.
- the encryption method information 622 including the method identifier “IDA” is read from the invalid encryption method list 621 (step S 151).
- the encryption circuit file 631 “ “C”, key circuit file 651 “KC”, and verification key file 671 “VeriC” are read (step S 152).
- control unit 607 selects transmission key information 628 including the scheme identifier “IDB” from the transmission key table 626 based on the scheme identifier “IDB” indicating the encryption scheme for the encryption key. Then, the encryption key “KencB” and the decryption key information “Kinf B” included in the selected transmission key information 628 are read (step S153).
- the control unit 607 includes a scheme identifier “IDB” indicating an encryption scheme for signature generation, a read encryption circuit file 631 “C”, a key circuit file 651 “KC”, a verification key file 671 “VeriC”, and decryption key information. “KinfB” is output to the signature generation unit 603 to instruct generation of signature data.
- the signature generation unit 603 combines the received encryption circuit file 631 “C”, the key circuit file 651 “KCJ, the verification key file 671“ VeriC ”, and the decryption key information“ KinfB ”and substitutes them into the hash function. Then, digest data is generated (step S156).
- the signature key information 693 including the received scheme identifier “IDB” is selected from the signature key table 691, and the signature key “Ksig—Bb” included in the selected signature key information 693 is read (Step S1). S157). Using the read signature key “Ksig_Bb”, the generated digest data is subjected to an encryption algorithm using the RSA encryption method indicated by the method identification riDBj to generate signature data (step S158). The generated signature data is output to the control unit 607.
- the control unit 607 generates a signature file including the server ID “001B” indicating the encryption method management server 600, the method identifier “IDB” indicating the signature generation encryption method, and the signature data (step S). 161).
- the control unit 607 uses the read encryption key “KencB” to encode the read encryption circuit file 631 “C”, key circuit file 651 “KC”, and verification key file 671 “VeriC”. Encrypted by applying an encryption algorithm according to the RSA encryption method indicated by the system identifier “IDB”, encrypted encryption circuit file “EncB (C, KencB)”, encryption key circuit file “En cB (KC, KencB) ) ”And an encrypted verification key file“ EncB (VeriC, KencB) ”are generated (step SI 62).
- the generated encryption key circuit file “EncB (C, KencB)”, encryption key circuit file “EncB (KC, KencB)”, and encryption verification key file “EncB (VeriC, KencB) ”, the scheme identifier“ IDB ”indicating the encryption scheme used for the encryption of these files, the decryption key information“ KinfB ”, and the signature file are transmitted to the content playback apparatus 100 via the transmission / reception unit 601. (Step S163).
- the control unit 116 of the content playback apparatus 100 via the program acquisition unit 106, encrypts the encryption key circuit file 681 “EncB (C, KencB)” and the encryption key circuit file 682 “EncB (KC, KencB). ", The encryption verification key file 683" EncB (VeriC, KencB) ", the scheme identifier 684 riDBj, the decryption key information 685" KinfB ", and the signature file 686 are received (step S163).
- the control unit 116 Upon receiving these, the control unit 116 outputs the received method identifier 684 “ID B” to the selection unit 114, and instructs to read out the key generation circuit program.
- the selection unit 114 selects the key circuit file 146 “KB” including the received method identifier “IDB”, and reads the selected key circuit file 146 “KB” force method identifier 147 riDBj and key generation circuit program 148 “KgenB”. (Step S166).
- control unit 116 outputs the received method identifier 684 “IDB” to the selection unit 113 for restoration. Instructs reading of signal circuit program.
- the selection unit 113 selects the received scheme identifier “Cryptographic circuit file 136“ B ”including I DBJ”, and selects the scheme identifier 137 “IDB” and the decryption circuit file 139 “DecB” from the selected cryptographic circuit file 136 “B”. Is read (step S167).
- the combination check unit 118 compares the method identifiers read by the selection units 113 and 114, and if they do not match (NO in step S169), outputs the NG signal to the control unit 116 to the control unit 116. Return to step S166. If they match (YES in step S169), an OK signal is output to the control unit 116.
- the control unit 116 Upon receiving the OK signal, the control unit 116 instructs the selection unit 114 to output the read program. Upon receiving the output instruction, the selection unit 114 outputs the read key generation circuit program 148 “KgenB” to the variable circuit 108, and the construction mechanism 123 in the variable circuit 108 receives the key generation circuit program 148 “KgenB”. Accordingly, the key generation circuit 151 is constructed on the FPGA 122 (step S171).
- the control unit 116 instructs the key generation circuit 151 to generate a device key.
- the key generation circuit 151 generates a 128-bit device key “DevB” corresponding to the RSA encryption method according to an instruction from the control unit 116, and writes the generated device key “DevB” to the device key storage unit 103 (step S 172).
- control unit 116 instructs the selection unit 113 to output the read program.
- the selection unit 113 Upon receiving the output instruction, the selection unit 113 outputs the read decoding circuit program 139 “DecB” to the variable circuit 108.
- the construction mechanism 123 in the variable circuit 108 constructs the decryption processing circuit 156 on the FPGA 122 according to the decryption circuit program 139 “DecB” output from the selection unit 113 (step S173). If the device “DevB” has already been stored in the device key storage unit 103, the processes of steps S166 and 169 to 172 are omitted. Further, if a decoding processing circuit corresponding to the encryption scheme indicated by the scheme identifier “IDB” has already been constructed in the variable circuit 108, steps S166 to S173 are omitted.
- the control unit 116 sends the received key information 6 to the key processing unit 157 in the decryption processing circuit 156.
- 85 ⁇ KinfB '' is output, and the received encrypted encryption circuit file 681 ⁇ EncB (C, KencB) '', encryption key circuit file 682 ⁇ EncB (KC, KencB) '' and encryption verification key are sent to the decryption unit 158 File 683 “EncB (VeriC, KencB)” is output and the decoding of these is instructed.
- the key processing unit 157 reads the device key “DevB” from the device key storage unit 103, generates the decryption key “KdecB” based on the device key “DevB” and the key information “KinfB”, and decrypts it. Part 1 58 is output (step S174).
- the decryption unit 158 obtains the decryption key (16 8) from the key processing unit 157, and uses the obtained decryption key “Kd ecB” to receive the encrypted encryption circuit file “EncB (C, Ke ncB) '', the encryption key circuit file ⁇ EncB (KC, KencB) '' and the encryption verification key file ⁇ EncB (VeriC, KencB) '' are subjected to a decryption algorithm according to the RSA encryption method, and the encryption circuit file ⁇ C '', The key circuit file “KC” and the verification key file rVeriCj are generated (step S 176), and the generated files are written to the main memory 107 (step S 177).
- the control unit 116 sends the received signature file to the validity check unit 112. The verification of the signature data contained in is instructed.
- the validity checking unit 112 verifies the signature data in accordance with the instruction from the control unit 116 (step S 178).
- step S181 If the signature verification by the validity check unit 112 fails (NO in step S181), the control unit 116 returns to step S148, and again manages the installation request via the program acquisition unit 106 using the encryption method management. Send to server 600.
- control unit 116 instructs the validity checking unit 112 to write the encryption circuit file “C” and the key circuit file “KC”.
- the validity checking unit 112 writes the cryptographic circuit file “C” into the cryptographic circuit storage unit 117, and writes the key circuit file “KC” into the key circuit storage unit 119 (step S182).
- control unit 116 instructs the validity checking unit 112 to update the check information table 201.
- the validity check unit 112 When instructed to update the check information table 201, the validity check unit 112 performs verification key file verification. Check information including method identifier “IDC”, Sano 10 “001 8” and verification key “1 ⁇ — ji &”, method identifier “IDC”, server ID “001B” and verification based on “VeriC” Check information including the key “Kve—C b” is newly generated (step S183), and the generated two pieces of check information are added to the check information table 201 (step S184).
- control unit 116 generates usable information including the method identifier "IDC” and the usage flag "1" included in the cryptographic circuit file "C", and the generated usable information can be used. This is added to the encryption scheme table 166 (step S 186).
- the cryptographic circuit storage unit 117 detects the cryptographic circuit file 131 “A” including the method identifier “IDA”, and deletes the cryptographic circuit program 133 “Enc A” from the detected cryptographic circuit file 131 “A” ( Step S188).
- control unit 116 selects the usable information 171 including the method identifier “IDA” in the usable encryption method table 166 stored in the main storage unit 107, and selects the selected usable information.
- the usage flag included in the report 171 is rewritten to “0” (step S189).
- the control unit 116 verifies whether or not the content playback device 100 can play back the content recorded on the attached DVD. To do.
- FIG. 25 is a flowchart showing the verification operation performed by the content reproduction apparatus 100. In FIG. 25, it is more generalized to indicate whether the mounted DVD is the DVD 400a or 400b without distinguishing.
- step S124 in FIG. 1 The verification of whether or not the content recorded on the attached DVD can be reproduced will be described below with reference to FIG. This is a detail of step S124 in FIG.
- the control unit 116 reads the content file, the content key information, and the signature file from the attached DVD via the content acquisition unit 101 (step S201). Next, the method identifier included in the content file is extracted (step S202), and the available encryption method table 166 stored in the main storage unit 107 includes a method identifier that matches the extracted method identifier. Information is searched (step S204). At this time, if the corresponding usable information cannot be detected (NO in step S206), it is determined that reproduction is impossible. (Step S211).
- the control unit 116 When the corresponding usable information 171 is detected (YES in step S206), the control unit 116 next outputs the read content file, content key information, and signature file to the validity check unit 112, and Instructs verification of the signature data contained in the signature file.
- the validity check unit 112 verifies the signature data using the encryption method indicated by the method identifier included in the signature file (step S207). The signature data verification operation will be described later.
- step S208 If the verification of the signature data is successful (step S208), the control unit 116 determines that the content can be reproduced (step S209). If the verification of the signature data fails, the control unit 116 determines that the content cannot be reproduced (step S211).
- the validity check unit 112 receives various types of information and a signature file including signature data generated based on the information from the control unit 116, and is instructed to verify the signature data. Upon receiving an instruction from the control unit 116, the validity check unit 112 controls the selection unit 113 and the variable circuit 108 to verify the signature data.
- FIG. 26 is a flowchart showing a signature data verification operation.
- the signature data verification operation will be described below with reference to FIG. This is a detail of step S178 in FIG. 23 and step S207 in FIG.
- the various types of information received together with the signature file is described as data to be checked.
- the combination is a combination of a content file and content key information and a signature file read from a DVD card, a cryptographic circuit file, a key circuit file, a verification key file, There is a combination of decryption key information and a key file.
- the validity checking unit 112 reads the server ID and the method identifier included in the signature file (step S221). Next, check information including the read method identifier and server ID is searched in the check information table 201 stored in itself (step S222). If the corresponding check information is not detected (NO in step S224), the signature data is verified. A verification failure notification indicating that the data is a failure is output to the control unit 116 (step S236).
- the validity check unit 112 When the corresponding check information is detected (YES in step S224), the validity check unit 112 outputs the read method identifier to the selection unit 113, and instructs reading and output of the decoding circuit program.
- the selection unit 113 reads the decryption circuit program corresponding to the received method identifier in accordance with the instruction from the validity check unit 112 (step S226), and outputs the read decryption circuit program to the variable circuit 108.
- the construction mechanism 123 of the variable circuit 108 performs FPG according to the received decoding circuit program.
- the decryption circuit 156 is constructed by rewriting A122 (step S227).
- the validity checking unit 112 reads the verification key included in the detected check information (step S228), and reads the signature data included in the signature file and the read verification key. Output to the decryption unit 158 in the constructed decryption processing circuit 156
- the decrypting unit 158 decrypts the signature data using the verification key to generate decrypted digest data (step S229).
- the decryption unit 158 outputs the generated decryption digest data to the validity check unit 112.
- the validity checking unit 112 generates digest data by substituting the combined data obtained by combining the data to be checked into the Noh and Ysch functions (step S231).
- the generated digest data is compared with the decrypted digest data output from the decryption unit 158 (step S232), and if they match (YES in step S234), a verification success notification indicating that the signature verification is successful is sent.
- the data is output to the control unit 116 (step S237).
- step S236 If the two do not match (NO in step S234), a verification failure notification indicating that signature verification has failed is output to the control unit 116 (step S236).
- FIG. 27 is a flowchart showing a content reproduction operation by the content generation device.
- the same operation is performed in the case of 1S DVD 400b, which shows the case where DVD 400a is loaded in content reproduction apparatus 100.
- the control unit 116 When receiving the operation instruction information indicating the content reproduction from the input unit 121, the control unit 116 extracts the method identifier 402 “IDA” included in the read content file 401 (step S241). Next, the control unit 116 controls the selection units 113 and 114, the combination check unit 118, and the variable circuit 108 to generate a device key “DevA” corresponding to the scheme identifier “IDA”, and sets the decryption processing circuit 156 to Build (step S242).
- the procedure for generating the device key and constructing the decryption processing circuit is the same as steps S166 to S173 in FIG. 22, and therefore detailed description thereof is omitted here.
- the read content key information 404 is output to the key processing unit 157 in the constructed decryption processing circuit 156, and the encrypted content 403 is output to the decryption unit 158, so that the encrypted content 403 Is instructed to decrypt.
- the key processing unit 157 When the key processing unit 157 receives the content key information 404, the key processing unit 157 reads the device key 128 “DevA” from the device key storage unit 103. Based on the read device key 128 “DevA” and the content key information 404, the content key information 404 is read. A key “KconA” is generated (step S243).
- the decryption unit 158 acquires the content key 0118 from the key processing unit 157, decrypts the encrypted content 403 using the acquired content key "KconA", and generates the content "ConA” (Step S244).
- Decoding section 158 outputs the generated content to reproduction processing section 109 in accordance with an instruction from control section 116.
- the reproduction processing unit 109 Upon receiving the content “ConA”, the reproduction processing unit 109 reproduces the received content on the motor 15 (step S246).
- FIG. 28 to 30 are flowcharts showing an operation of outputting content to the memory card 500 by the content reproduction device 100.
- FIG. The content output operation will be described below with reference to FIGS. This is a detail of step S132 in FIG.
- a description will be given by taking as an example the case where the content playback apparatus 100 is equipped with a DVD 400a and a memory card 500 that holds the scheme identifier “IDA”. The same operation is performed when a memory card is held.
- the control unit 116 displays the method identifier 402 "IDA” included in the content file 401 and the method identifier 413 "IDB” included in the signature file 411. Extract (step S261).
- the available encryption method table 166 is read from the main storage unit 107 (step S262), and the available information including the method identifier “IDA” and the method identifier “IDB” in the read encryption method table 166, respectively. Search (step S 263).
- step S264 If either of them cannot be detected (NO in step S264), An error screen indicating the effect is generated, and the error screen is displayed on the monitor 15 via the reproduction processing unit 109 (step S 265).
- step S264 When the corresponding usable information 171 and 172 are detected (YES in step S264), the usage flags included in the detected usable information 171 and 172 are read (step S266). If either of the read usage flags is “0” (NO in step S268), an error screen is displayed to notify that the content recorded on the attached DVD cannot be copied. Display (step S265).
- step S268 If both of the read usage flags are "1" (YES in step S268), method identifier 402 "IDA” is extracted from content file 401 (step S269), and the extracted method The identifier 402 “IDA” is output to the memory card 500 via the input / output unit 104, and the encryption method indicated by the output method identifier “IDA” is provided! Step S271).
- the control unit 507 of the memory card 500 receives the scheme identifier “IDA” from the content playback apparatus 100 via the input / output unit 502, and includes the encryption scheme indicated by the received scheme identifier “IDA”. Ask whether or not.
- the control unit 507 When receiving the inquiry, the control unit 507 reads the method identifier 521 stored in the secure area 520 (step S272).
- the read method identifier 521 is compared with the received method identifier “IDA” (step S273), and if they match (YES in step S274), the ciphertext encrypted by the encryption method indicated by the received method identifier.
- a response signal “1” indicating that can be decoded is generated (step S276).
- control unit 507 outputs the generated response signal to content reproduction device 100 via input / output unit 502 (step S279).
- the control unit 116 of the content reproduction apparatus 100 receives a response signal from the memory card 500 via the input / output unit 104. If the received response signal is “0” (“0” in step S281), an error screen notifying that the requested copy cannot be made is generated and displayed on the monitor 15 (step S282).
- step S281 If the received response signal is "1" ("1" in step S281), then the control unit 116 controls the selection units 113 and 114, the combination check unit 118, and the variable circuit 108, A device key “DevA” corresponding to the method identifier 402 “IDA” read from the content file 401 is generated, and a decryption processing circuit for performing decryption processing according to the method identifier “IDA” is constructed on the variable circuit 108 (step S286).
- step S287 The details of step S287 are the same as steps S166 to S173 in FIG. 22, and the method identifier “IDB” in FIG. 22 is replaced with “IDA” and the key circuit file “13 ⁇ 4” is replaced with “”.
- the key generation circuit program may be read as “Kgen BJ” as “KgenA” and the decryption circuit program “DecB” as “DecA”.
- control unit 116 outputs the read content key information 404 to the key processing unit 157 in the constructed decryption processing circuit 156, and instructs generation of a content key.
- the key processing unit 157 generates the content key “KconA” based on the content key information 404 and the device key “DevA” (step S 287).
- control unit 116 instructs the selection unit 113 to read and output the cryptographic circuit program corresponding to the scheme identifier 402 “IDA”.
- the selection unit 113 reads out the encryption circuit program 133 “EncA” corresponding to the scheme identifier “IDA” from the encryption circuit storage unit 117 (step S289) according to an instruction from the control unit 116. 133 “EncA” is output to variable circuit 108.
- the construction mechanism 123 in the variable circuit 108 constructs the cryptographic processing circuit 152 in accordance with the cryptographic circuit program 133 “EncA” (step S 291).
- the control unit 116 connects the memory via the input / output unit 104.
- the card 500 is instructed to output card key information (step S293).
- control unit 507 of the memory card 500 When the control unit 507 of the memory card 500 is instructed to output card key information from the content playback device 100 via the input / output unit 502, the control unit 507 reads the card key information 522 from the secure area 520 (step S294). ). The read card key information 522 is output to the content reproduction apparatus 100 via the input / output unit 502 (step S296).
- the control unit 116 of the content reproduction apparatus 100 acquires card key information from the memory card 500 via the input / output unit 104, and uses the acquired card key information as a key processing unit 153 in the encryption processing circuit 152. And the content key “KconA” is output to the encryption unit 154 to instruct encryption.
- the key processing unit 153 reads the device key “DevA” from the device key storage unit 103, and generates the card unique key “MkeyA” based on the read device key “DevA” and the card key information (step S297). .
- the encryption unit 154 obtains the card unique key “MkeyA” from the key processing unit 153, encrypts the content key “KconA” using the obtained card unique key “MkeyA”, and encrypts the encrypted content key.
- EncA KconA, MkeyA
- the control unit 116 extracts the encrypted content 403 "EncA (ConA, KconA)" from the content file 401. (Step S301), the extracted encrypted content 403 “EncA (Con A, KconA)” and the encrypted content key “EncA (KconA, MkeyA)” are output to the memory card 500 via the input / output unit 104. (Step S302).
- the control unit 507 of the memory card 500 receives the encrypted content “EncA (ConA, KconA)” and the encrypted content key “EncA (KconA, MkeyA)” from the content playback device 100, and receives the received encryption.
- a content file including the content “EncA (ConA, KconA)” and the encrypted content key “EncA (KconA, MkeyA)” is generated, and the generated content file is written in the general area 512 (step S303).
- the force described above based on the first embodiment of the present invention is not limited to this, and the following cases are also included in the present invention.
- the content playback apparatus 100 has been described as having a DES encryption method and an RSA encryption method at the beginning of manufacture, and has a power of 3 or more. It is possible to have the encryption method.
- the encryption method management server 600 selects one of the undeciphered encryption methods, and converts the decrypted encryption method to the selected encryption method.
- the encryption circuit file, key circuit file, and verification key file corresponding to the alternative encryption method are encrypted and transmitted to the content playback apparatus 100.
- the signature data may be generated using an encryption method different from the encryption method used for the encryption key.
- the use of the encryption method provided in the content reproduction apparatus 100 is not limited to the force described above as encryption / decryption of content and verification of signature data. You may use for various uses, such as sharing and apparatus authentication.
- the encryption method management server 600 selects the encryption method used for the generation of encryption and signature data as an example by using the encryption strength of each encryption method.
- a method of selecting the strongest encryption strength among the encryption methods that are stored and not decrypted is conceivable. Also, a newer encryption method may be selected.
- the content reproduction apparatus 100 may select an encryption method used for encryption and signature data generation, and notify the encryption method management server 600 of a method identifier indicating the selected encryption method.
- the date and time when the encryption method was introduced is stored, and a method of selecting an encryption method with a new introduction date is conceivable.
- the user of content playback apparatus 100 may accept selection of an encryption method.
- a signature file including signature data is generated by using an undecipherable encryption method. Power This method of generating a signature is an example, and the present invention is not limited to this.
- this new encryption method is introduced when the new encryption method is introduced.
- the encryption method management server 600 transmits a verification key file including a verification key corresponding to the new encryption method, but it is not essential to transmit the verification key file. If a new encryption method is not used for signature verification, it is not necessary to send a verification key file.
- the encryption method to be newly introduced is the public key encryption method
- the verification key is the public key of each server, and therefore may be transmitted without encryption.
- a decryption processing circuit is constructed in the variable circuit 108, and the decryption processing circuit bears a part of the verification processing of the signature data.
- a configuration may be adopted in which a verification circuit for performing a series of processing for signature verification is built in the variable circuit 108 and verification of signature data is executed. In this case, it is not necessary to exchange the verification key file for the process of introducing the encryption method.
- Embodiment 1 is an example that focuses on an encryption method that performs encryption and decryption. Even when an encryption method that is used for signature generation and verification is decrypted, a new encryption method is used. Introduce. In that case, the verification key file is acquired from the encryption method management server 600 in consideration that a new encryption method is used for signature generation and verification.
- the signature method may be changed separately from the change of the encryption method used for encryption and decryption.
- the signing method refers to a series of procedures for generating signature data and a series of procedures for verifying signature data.
- the content reproduction apparatus 100 includes a signature storage unit 220 instead of the validity check unit 112, and the signature storage unit 220 includes a check information table 221 as shown in FIG. And a plurality of signature scheme files 223, 224,...
- the check information table 221 has the same configuration as the check information table 201 described in the first embodiment, but each check information corresponds to one of the signature schemes and corresponds to a scheme identifier instead. Contains a signature scheme identifier that indicates the signature scheme!
- Each signature file corresponds to one of the signature schemes, and includes a signature scheme identifier indicating the corresponding signature scheme and a verification circuit program.
- the verification circuit program shows a configuration of a verification circuit having a function of verifying signature data generated by the signature scheme indicated by the signature scheme identifier.
- the encryption method management server 600 also manages the security related to the signature method. If any signature method is decrypted and the signature can be easily tampered with, the encryption method management server 600 can replace the signature method. It holds a signature file rsicj and a verification key file related to various signature methods.
- the signature file “SiC” consists of the signature scheme identifier “SIDC” and the verification circuit program “
- the verification key file is similar to the verification key file 671 shown in FIG. 5 (c), but includes the signature scheme identifier “SIDC” instead of the scheme identifier 672.
- SIDC signature scheme identifier
- the content playback device 100 uses the signature scheme file “SiC” corresponding to the new signature scheme, the verification key file, and the signature scheme identifier “SIDB”.
- the signature data generated by applying the signature to the verification key file and the signature file “SiC” and the signature scheme identifier “SIDB” indicating the signature method used to generate the signature data are received.
- the control unit 116 reads the verification circuit program 237 corresponding to the same signature scheme identifier as the received signature scheme identifier “SIDB”, and outputs it to the variable circuit 108.
- the verification circuit corresponding to the signature scheme “SIDB” is built in the variable circuit 108, the received signature scheme file “SiC”, the verification key file, and the signature data are output to the verification circuit to verify the signature. Instruct.
- the received signature file is written to the signature storage unit 220, the received verification key file power also generates new check information, and the generated check information is added to the check information table 221. To do.
- the information to be transmitted / received includes information to be concealed, the information may be encrypted and transmitted / received.
- a configuration may be adopted in which a MAC (Message Authentication Code) generation 'verification method is introduced instead of the signature method.
- a MAC (Message Authentication Code) generation 'verification method is introduced instead of the signature method.
- a plurality of MAC verification circuit programs indicating the configuration of the MAC verification circuit are stored, and each MAC verification program has a different MAC generation and verification method. It corresponds.
- the content reproduction apparatus 100 stores key sharing circuit programs corresponding to different key sharing methods.
- Each key sharing circuit program is a program in a format that can be decrypted by the construction mechanism in the variable circuit 108, and is a key sharing circuit that executes key sharing with an external device in a procedure according to the corresponding key sharing method. The configuration is shown.
- the server device that manages the key sharing method holds a key sharing circuit program corresponding to the new key sharing method!
- a key sharing circuit is constructed according to any of the previously stored key sharing circuit programs, and the server is used by the constructed key sharing circuit. Generate a shared key with the device.
- the server device encrypts the key sharing circuit program corresponding to the new key sharing method using the generated shared key to generate an encryption key sharing circuit program, and the content playback apparatus 100 Send to.
- the content reproduction apparatus 100 receives the encryption key sharing program, decrypts it using the generated shared key, and acquires a key sharing circuit program corresponding to the new key sharing method.
- the variable circuit 108 includes a rewritable FPGA 122, a construction mechanism 123, and a confider ROM 124 as an example, and the selection units 113 and 114 extend to the construction mechanism 123 such as the read encryption circuit program.
- variable circuit 108 is configured only by the FPGA and the construction mechanism, and the configuration ROM attached to the FPGA may constitute the encryption circuit storage unit 117 and the key circuit storage unit 119.
- the control unit 116 reads the variable circuit information 161 stored in the main storage unit 107, and based on the read variable circuit information 161, the selection units 113, 114 and The construction mechanism 123 causes the circuit constructed in the variable circuit 108 to be reconstructed immediately before the power is turned off.
- the content playback device 100 and the encryption method management server 600 are connected to the Internet 20 and are capable of transmitting and receiving encrypted encryption circuit files and the like via the Internet 20.
- the method is not limited to this method.
- the encryption system management server 600 sends the same encryption circuit file, key circuit file, and signature circuit file to all valid content playback devices, these files are transmitted by one-way communication such as broadcast waves. May be sent.
- the power of starting a series of operations for content introduction triggered by an instruction from the operator of the encryption method management server 600 is not limited to this.
- the content playback device 100 periodically transmits a method identifier indicating its own encryption method, and the encryption method management server 600 decrypts its own encryption method. You can ask and match.
- the encryption method management server 600 Upon receiving the inquiry, if the encryption method information including the method identifier that matches the received method identifier exists in the invalid encryption method list 621, the encryption method management server 600 sends a warning notification including the encryption method to the content playback device. To device 100.
- Embodiment 1 content playback apparatus 100 simply re-plays if the encryption method corresponding to the method identifier included in the content file of the attached DVD is not provided. At this time, the above inquiry may be made to the encryption method management server 600.
- the force encryption method introducing a new encryption method is not decrypted. Even in this case, for example, when a new excellent encryption method is developed, the new encryption method may be introduced.
- the encrypted circuit file and the key circuit file corresponding to the decrypted encryption method are all deleted, and the content encrypted by the decrypted encryption method and the signature data generated by the decrypted encryption method A configuration may be adopted in which playback of content marked with is not permitted at all.
- the check information table 201 also deletes the check information corresponding to the decrypted encryption method.
- variable circuit 108 is the force that has been described as being configured by the FPGA, but is not limited to this, and may be a rewritable circuit.
- rewritable circuits are PLD (Programmable Logic Device), PLA (Programmable) depending on the circuit scale, internal logic circuit structure, etc.
- Array Logic Array Logic
- CPLD Complex Programmable Logic Device
- Reconfigurable LSI Dynamic Reconfigurable LSI.
- the force that employs an example using a media key block is not limited to this method.
- a device key including a plurality of key data is assigned to each device using a tree structure, and a legitimate device may acquire content using any key included in the device key. Possible technologies are considered.
- the content playback apparatus 100 corresponds to each encryption method in advance.
- the encryption circuit file and the key circuit file stored therein may be configured to receive a necessary key circuit file when performing encryption processing such as decryption of content.
- the control unit 116 when decrypting the encrypted content 403 stored in the DVD 400a, the control unit 116 reads the method identifier 402 from the content file 401 and uses the program acquisition unit 106 to read the read method identifier 402. To the encryption method management server 600 to request transmission of the key circuit file.
- the encryption method management server 600 stores a key circuit file corresponding to each encryption method.
- the control unit 607 receives the method identifier from the content playback apparatus 100 and is requested to transmit the key circuit file, the control unit 607 reads the key circuit file corresponding to the encryption method indicated by the received method identifier, and reads the read key circuit file. Send the file.
- the control unit 116 of the content reproduction device 100 receives the key circuit file from the encryption method management server 600, and outputs the key circuit generation program included in the received key circuit file to the variable circuit 108.
- the device key is generated, the decryption processing circuit is constructed, and the encrypted content 403 is decrypted in the same manner as in the first embodiment.
- the content playback apparatus 100 is a device that securely acquires and plays back content by means of secret communication, and a new device key is introduced along with the introduction of a new encryption method used for secret communication. To get.
- the present invention is not limited to this example, and the content playback apparatus 100 is an information security apparatus that safely or reliably handles information using a key unique to the content playback apparatus 100.
- a key corresponding to the new information processing method is acquired.
- the information processing method using the secret key mentioned above may include a signature method, a device authentication method, a key sharing method, a MAC generation / verification method, and the like.
- the content reproduction device 100 is a device that generates and verifies signature data according to a predetermined signature scheme.
- the content reproduction apparatus 100 includes a signature circuit storage unit instead of the encryption circuit storage unit 117 (or in addition to the encryption circuit storage unit 117), and the signature circuit storage unit stores the signature circuit file. Is remembered.
- the signature circuit file corresponds to one of the signature schemes, and includes a signature scheme identifier indicating the corresponding signature scheme and a signature generation circuit program and signature verification circuit in a format that can be decrypted by the construction mechanism 123. Including programs.
- the signature generation circuit program shows the configuration of the signature generation circuit that generates signature data in accordance with the corresponding signature scheme.
- the signature verification circuit program shows the configuration of the signature verification circuit that verifies the signature data according to the corresponding signature method.
- the key circuit storage unit 119 stores a signature key circuit file corresponding to the signature circuit file stored in the signature circuit storage unit.
- the signature key circuit file includes a signature method identifier indicating a corresponding signature method, and a signature key circuit program indicating a configuration of a signature key generation circuit that generates a signature key and a verification key used for generation and verification of signature data.
- the control unit 116 controls the selection units 113 and 114, the combinational check unit 118 and the variable circuit 108 to generate a signature key and a verification key corresponding to a desired signature method, and generates a signature.
- Build a circuit or signature verification circuit The procedure for generating the key and constructing the circuit is the same as the procedure for generating the device key and constructing the decryption processing circuit in the first embodiment (for example, shown in steps S166 to 173 in FIG. 22).
- the control unit 116 acquires a signature file corresponding to the new signature method via the program acquisition unit 106, and in combination with this, the control unit 116 is suitable for the new signature method.
- the signature key file including the signature key circuit program indicating the configuration of the signature key generation circuit for generating the signature key and the verification key is obtained.
- the control unit 116 writes the acquired signature circuit file in the signature circuit storage unit, and writes the acquired signature key file in the key circuit storage unit 119.
- the selection unit 114 reads the signature key circuit program included in the acquired signature key file under the control of the control unit 116.
- the construction mechanism 123 of the variable circuit 108 constructs a signature key generation circuit according to the signature key circuit program output from the selection unit 114, and the constructed signature key generation circuit is a new signature scheme.
- the content playback apparatus 100 is a device that performs device authentication, key sharing, MAC generation / verification in accordance with a predetermined device authentication method, key sharing method, and MAC generation / verification method.
- the content reproduction apparatus 100 includes a file including an execution circuit program indicating a configuration of an execution circuit that executes processing according to each information processing method, and a key circuit including a key circuit generation program corresponding to each execution circuit program Write the file and think of it.
- the control unit 116 adds a new information processing method and a file including an execution circuit program corresponding to the new information processing method to the new information processing method via the program acquisition unit 106.
- the acquired key circuit file is written in the key circuit storage unit 119.
- the selection unit 114 outputs the key generation circuit program included in the acquired key circuit file to the variable circuit 108 under the control of the control unit 116.
- the construction mechanism 123 constructs a key generation circuit according to the output key generation circuit program, and the constructed key generation circuit generates a key suitable for a new information processing method.
- System L SI is an ultra-multifunctional LSI manufactured by integrating multiple components on a single chip. Specifically, it is a computer system that includes a microprocessor, ROM, RAM, and so on. Stem. A computer program is stored in the RAM. The microphone processor power By operating according to the computer program, the system LSI achieves its functions.
- the method of circuit integration is not limited to LSI's, and implementation using dedicated circuitry or general purpose processors is also possible. It is also possible to use an FPGA that can be programmed after LSI manufacturing or a reconfigurable processor that can reconfigure the connection and settings of circuit cells inside the LSI.
- each of the above devices may be configured as an IC card or a single module force that can be attached to and detached from each device.
- the IC card or the module is a computer system including a microprocessor, ROM, RAM, and the like.
- the IC card or the module may include the super multifunctional LSI described above.
- the IC card or the module achieves its function by the microprocessor operating according to the computer program. This IC card or module may be tamper resistant! /.
- the present invention may be the method described above. Further, the present invention may be a computer program that realizes these methods by a computer, or may be a digital signal that also has the computer program power.
- the present invention also relates to a computer-readable recording medium such as a flexible disk, hard disk, CD-ROM, MO, DVD, DVD-ROM, DVD-RAM, BD ( Blu-ray Disc), semiconductor memory, etc. may be recorded. Further, the present invention may be the computer program or the digital signal recorded on these recording media.
- a computer-readable recording medium such as a flexible disk, hard disk, CD-ROM, MO, DVD, DVD-ROM, DVD-RAM, BD ( Blu-ray Disc), semiconductor memory, etc.
- the present invention may be the computer program or the digital signal recorded on these recording media.
- the present invention may be configured such that the computer program or the digital signal is transmitted via an electric communication line, a wireless or wired communication line, a network typified by the Internet, a data broadcast, or the like.
- the present invention may also be a computer system including a microprocessor and a memory.
- the memory may store the computer program, and the microprocessor may operate according to the computer program.
- the present invention relates to an industry that manufactures and sells electrical devices that perform various processes using encryption technology such as secret communication, signature, and device authentication using a key unique to each device, and these electrical devices.
- encryption technology such as secret communication, signature, and device authentication using a key unique to each device, and these electrical devices.
- it can be used in a management and iterative manner.
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP06732298A EP1879322A1 (en) | 2005-04-25 | 2006-04-24 | Information security device |
US11/912,473 US7958353B2 (en) | 2005-04-25 | 2006-04-24 | Information security device |
CN200680014095.6A CN101167300B (zh) | 2005-04-25 | 2006-04-24 | 信息安全装置 |
JP2007514724A JP4801055B2 (ja) | 2005-04-25 | 2006-04-24 | 情報セキュリティ装置 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2005-126038 | 2005-04-25 | ||
JP2005126038 | 2005-04-25 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006115252A1 true WO2006115252A1 (ja) | 2006-11-02 |
Family
ID=37214866
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2006/308588 WO2006115252A1 (ja) | 2005-04-25 | 2006-04-24 | 情報セキュリティ装置 |
Country Status (5)
Country | Link |
---|---|
US (1) | US7958353B2 (ja) |
EP (1) | EP1879322A1 (ja) |
JP (1) | JP4801055B2 (ja) |
CN (1) | CN101167300B (ja) |
WO (1) | WO2006115252A1 (ja) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2010098367A (ja) * | 2008-10-14 | 2010-04-30 | Sony Corp | 情報処理装置、暗号切替方法、及びプログラム |
JP2010117968A (ja) * | 2008-11-14 | 2010-05-27 | National Institute Of Advanced Industrial Science & Technology | 再構成可能論理デバイスの論理プログラムデータ保護システム及び保護方法 |
JP2010183278A (ja) * | 2009-02-04 | 2010-08-19 | Sony Optiarc Inc | 情報処理装置、および情報処理方法、並びにプログラム |
JP2014099752A (ja) * | 2012-11-14 | 2014-05-29 | Fujitsu Ltd | 通信装置、通信システム、及び通信システムにおける暗号アルゴリズム実行方法 |
Families Citing this family (68)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9064364B2 (en) * | 2003-10-22 | 2015-06-23 | International Business Machines Corporation | Confidential fraud detection system and method |
CN101484877A (zh) * | 2006-07-04 | 2009-07-15 | 皇家飞利浦电子股份有限公司 | 用可重新配置的硬件执行计算机指令 |
JP5138970B2 (ja) * | 2006-12-20 | 2013-02-06 | リプレックス株式会社 | システム、サーバ、情報端末、オペレーティングシステム、ミドルウェア、情報通信機器、認証方法、システム及びアプリケーションソフトウェア |
US20080219427A1 (en) * | 2007-03-09 | 2008-09-11 | Naono Norihiko | Information terminal, server and communication method and method for selecting a communication service |
US20080222543A1 (en) * | 2007-03-09 | 2008-09-11 | Naono Norihiko | Information terminal, server and information processing method |
US20080288462A1 (en) * | 2007-05-16 | 2008-11-20 | Naono Norihiko | Database system and display method on information terminal |
TW200847690A (en) * | 2007-05-24 | 2008-12-01 | Nat Univ Tsing Hua | Device and method for security reconfiguration |
JP2008312048A (ja) * | 2007-06-15 | 2008-12-25 | Ripplex Inc | 情報端末の認証方法 |
JP2009003690A (ja) * | 2007-06-21 | 2009-01-08 | Ripplex Inc | システム、サーバ及び情報端末 |
JP2009005202A (ja) * | 2007-06-25 | 2009-01-08 | Ripplex Inc | 情報交換装置 |
JP5180182B2 (ja) * | 2007-08-28 | 2013-04-10 | パナソニック株式会社 | 鍵端末装置、暗号処理用lsi、固有鍵生成方法及びコンテンツシステム |
TW200925934A (en) * | 2007-12-06 | 2009-06-16 | Avision Inc | Key status detecting circuit |
JP2009157737A (ja) * | 2007-12-27 | 2009-07-16 | Ripplex Inc | 情報共有のためのサーバ装置及び情報端末装置 |
US8515996B2 (en) | 2008-05-19 | 2013-08-20 | Emulex Design & Manufacturing Corporation | Secure configuration of authentication servers |
JP2010026936A (ja) * | 2008-07-23 | 2010-02-04 | Ripplex Inc | 個人情報を検索するための端末装置及びシステム |
US20110131138A1 (en) * | 2008-08-07 | 2011-06-02 | Icon Corp. | Collective suspension/settlement representation processing server device and program |
US9448964B2 (en) * | 2009-05-04 | 2016-09-20 | Cypress Semiconductor Corporation | Autonomous control in a programmable system |
US8516272B2 (en) | 2010-06-30 | 2013-08-20 | International Business Machines Corporation | Secure dynamically reconfigurable logic |
GB2500356A (en) | 2011-01-20 | 2013-09-18 | Box Inc | Real time notification of activities that occur in a web-based collaboration environment |
JP5306405B2 (ja) | 2011-03-31 | 2013-10-02 | 株式会社東芝 | 情報処理装置およびプログラム |
US9652741B2 (en) | 2011-07-08 | 2017-05-16 | Box, Inc. | Desktop application for access and interaction with workspaces in a cloud-based content management system and synchronization mechanisms thereof |
US9197407B2 (en) | 2011-07-19 | 2015-11-24 | Cyberlink Corp. | Method and system for providing secret-less application framework |
US9098474B2 (en) | 2011-10-26 | 2015-08-04 | Box, Inc. | Preview pre-generation based on heuristics and algorithmic prediction/assessment of predicted user behavior for enhancement of user experience |
WO2013062599A1 (en) | 2011-10-26 | 2013-05-02 | Box, Inc. | Enhanced multimedia content preview rendering in a cloud content management system |
GB2500152A (en) | 2011-11-29 | 2013-09-11 | Box Inc | Mobile platform file and folder selection functionalities for offline access and synchronization |
US9904435B2 (en) | 2012-01-06 | 2018-02-27 | Box, Inc. | System and method for actionable event generation for task delegation and management via a discussion forum in a web-based collaboration environment |
US11232481B2 (en) | 2012-01-30 | 2022-01-25 | Box, Inc. | Extended applications of multimedia content previews in the cloud-based content management system |
US9965745B2 (en) | 2012-02-24 | 2018-05-08 | Box, Inc. | System and method for promoting enterprise adoption of a web-based collaboration environment |
US9195636B2 (en) | 2012-03-07 | 2015-11-24 | Box, Inc. | Universal file type preview for mobile devices |
US9575981B2 (en) | 2012-04-11 | 2017-02-21 | Box, Inc. | Cloud service enabled to handle a set of files depicted to a user as a single file in a native operating system |
US9413587B2 (en) | 2012-05-02 | 2016-08-09 | Box, Inc. | System and method for a third-party application to access content within a cloud-based platform |
GB2514947B (en) | 2012-05-04 | 2015-06-17 | Box Inc | Repository redundancy implementation of a system which incrementally updates clients with events that occured via a cloud-enabled platform |
US9691051B2 (en) | 2012-05-21 | 2017-06-27 | Box, Inc. | Security enhancement through application access control |
US8914900B2 (en) | 2012-05-23 | 2014-12-16 | Box, Inc. | Methods, architectures and security mechanisms for a third-party application to access content in a cloud-based platform |
GB2505072A (en) | 2012-07-06 | 2014-02-19 | Box Inc | Identifying users and collaborators as search results in a cloud-based system |
US9712510B2 (en) | 2012-07-06 | 2017-07-18 | Box, Inc. | Systems and methods for securely submitting comments among users via external messaging applications in a cloud-based platform |
US9794256B2 (en) | 2012-07-30 | 2017-10-17 | Box, Inc. | System and method for advanced control tools for administrators in a cloud-based service |
GB2513671A (en) | 2012-08-27 | 2014-11-05 | Box Inc | Server side techniques for reducing database workload in implementing selective subfolder synchronization in a cloud-based environment |
US9135462B2 (en) | 2012-08-29 | 2015-09-15 | Box, Inc. | Upload and download streaming encryption to/from a cloud-based platform |
US9195519B2 (en) | 2012-09-06 | 2015-11-24 | Box, Inc. | Disabling the self-referential appearance of a mobile application in an intent via a background registration |
US9292833B2 (en) | 2012-09-14 | 2016-03-22 | Box, Inc. | Batching notifications of activities that occur in a web-based collaboration environment |
US10915492B2 (en) | 2012-09-19 | 2021-02-09 | Box, Inc. | Cloud-based platform enabled with media content indexed for text-based searches and/or metadata extraction |
US9959420B2 (en) | 2012-10-02 | 2018-05-01 | Box, Inc. | System and method for enhanced security and management mechanisms for enterprise administrators in a cloud-based environment |
US9495364B2 (en) | 2012-10-04 | 2016-11-15 | Box, Inc. | Enhanced quick search features, low-barrier commenting/interactive features in a collaboration platform |
US9665349B2 (en) | 2012-10-05 | 2017-05-30 | Box, Inc. | System and method for generating embeddable widgets which enable access to a cloud-based collaboration platform |
US9178862B1 (en) * | 2012-11-16 | 2015-11-03 | Isaac S. Daniel | System and method for convenient and secure electronic postmarking using an electronic postmarking terminal |
US10235383B2 (en) | 2012-12-19 | 2019-03-19 | Box, Inc. | Method and apparatus for synchronization of items with read-only permissions in a cloud-based environment |
US9396245B2 (en) | 2013-01-02 | 2016-07-19 | Box, Inc. | Race condition handling in a system which incrementally updates clients with events that occurred in a cloud-based collaboration platform |
US9953036B2 (en) | 2013-01-09 | 2018-04-24 | Box, Inc. | File system monitoring in a system which incrementally updates clients with events that occurred in a cloud-based collaboration platform |
US9507795B2 (en) | 2013-01-11 | 2016-11-29 | Box, Inc. | Functionalities, features, and user interface of a synchronization client to a cloud-based environment |
US10599671B2 (en) | 2013-01-17 | 2020-03-24 | Box, Inc. | Conflict resolution, retry condition management, and handling of problem files for the synchronization client to a cloud-based platform |
US10846074B2 (en) | 2013-05-10 | 2020-11-24 | Box, Inc. | Identification and handling of items to be ignored for synchronization with a cloud-based platform by a synchronization client |
US10725968B2 (en) | 2013-05-10 | 2020-07-28 | Box, Inc. | Top down delete or unsynchronization on delete of and depiction of item synchronization with a synchronization client to a cloud-based platform |
GB2515192B (en) | 2013-06-13 | 2016-12-14 | Box Inc | Systems and methods for synchronization event building and/or collapsing by a synchronization component of a cloud-based platform |
US9805050B2 (en) | 2013-06-21 | 2017-10-31 | Box, Inc. | Maintaining and updating file system shadows on a local device by a synchronization client of a cloud-based platform |
US9535924B2 (en) | 2013-07-30 | 2017-01-03 | Box, Inc. | Scalability improvement in a system which incrementally updates clients with events that occurred in a cloud-based collaboration platform |
US9535909B2 (en) | 2013-09-13 | 2017-01-03 | Box, Inc. | Configurable event-based automation architecture for cloud-based collaboration platforms |
US10509527B2 (en) | 2013-09-13 | 2019-12-17 | Box, Inc. | Systems and methods for configuring event-based automation in cloud-based collaboration platforms |
US9213684B2 (en) | 2013-09-13 | 2015-12-15 | Box, Inc. | System and method for rendering document in web browser or mobile device regardless of third-party plug-in software |
US9461815B2 (en) * | 2013-10-18 | 2016-10-04 | Advanced Micro Devices, Inc. | Virtualized AES computational engine |
US10530854B2 (en) | 2014-05-30 | 2020-01-07 | Box, Inc. | Synchronization of permissioned content in cloud-based environments |
US9894119B2 (en) | 2014-08-29 | 2018-02-13 | Box, Inc. | Configurable metadata-based automation and content classification architecture for cloud-based collaboration platforms |
US10038731B2 (en) | 2014-08-29 | 2018-07-31 | Box, Inc. | Managing flow-based interactions with cloud-based shared content |
DE102014218218A1 (de) * | 2014-09-11 | 2016-03-17 | Robert Bosch Gmbh | Verfahren zum Erzeugen eines kryptographischen Schlüssels in einem System-on-a-Chip |
US9705501B2 (en) * | 2014-10-01 | 2017-07-11 | Maxim Integrated Products, Inc. | Systems and methods for enhancing confidentiality via logic gate encryption |
US10795742B1 (en) | 2016-09-28 | 2020-10-06 | Amazon Technologies, Inc. | Isolating unresponsive customer logic from a bus |
US10223317B2 (en) | 2016-09-28 | 2019-03-05 | Amazon Technologies, Inc. | Configurable logic platform |
EP3483772A1 (en) * | 2017-11-14 | 2019-05-15 | Nagravision S.A. | Integrated circuit personalisation with data encrypted with the output of a physically unclonable function |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH08204702A (ja) * | 1995-01-30 | 1996-08-09 | Nec Corp | 暗号鍵管理装置 |
JPH10320191A (ja) | 1997-04-30 | 1998-12-04 | Motorola Inc | プログラム可能暗号処理システムおよび方法 |
WO2001030019A1 (fr) * | 1999-10-18 | 2001-04-26 | Sony Corporation | Processeur d'information et procede de traitement d'information, support enregistre |
JP2002050956A (ja) | 2000-07-13 | 2002-02-15 | Sun Microsyst Inc | フィールド・プログラマブル・ゲート・アレイ |
JP2002290396A (ja) | 2001-03-23 | 2002-10-04 | Toshiba Corp | 暗号鍵更新システムおよび暗号鍵更新方法 |
JP2003304235A (ja) * | 2002-04-10 | 2003-10-24 | Sony Corp | 無線通信装置、およびプログラム・ダウンロード方法、並びにコンピュータ・プログラム |
JP2004248232A (ja) * | 2002-03-20 | 2004-09-02 | Matsushita Electric Ind Co Ltd | コンテンツを再生する再生装置、再生方法、プログラム、鍵管理装置及び鍵管理システム |
JP2004336178A (ja) * | 2003-04-30 | 2004-11-25 | Rohm Co Ltd | デバイス鍵保護方法およびその方法を利用可能な暗号化装置と復号装置ならびに映像送信装置と映像受信装置 |
JP2005006302A (ja) * | 2003-06-11 | 2005-01-06 | Hewlett-Packard Development Co Lp | プログラマブルハードウェアを使用したコンテンツ暗号化 |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3776619B2 (ja) | 1999-03-05 | 2006-05-17 | 株式会社東芝 | 暗号通信端末、暗号通信センター装置、暗号通信システム及び記憶媒体 |
JP2001325153A (ja) | 2000-05-15 | 2001-11-22 | Toyo Commun Equip Co Ltd | フィールドプログラマブルゲートアレイの回路情報保護方法 |
JP2003198530A (ja) | 2001-12-21 | 2003-07-11 | Mitsubishi Electric Corp | パケット通信装置及び暗号アルゴリズム設定方法 |
CN100498948C (zh) * | 2003-06-18 | 2009-06-10 | 松下电器产业株式会社 | 重放装置、重放方法 |
US8103004B2 (en) * | 2003-10-03 | 2012-01-24 | Sony Corporation | Method, apparatus and system for use in distributed and parallel decryption |
CN100338905C (zh) * | 2004-03-03 | 2007-09-19 | 北京北大方正电子有限公司 | 具有硬件适应性的数字内容与硬件绑定的方法 |
EP1659810B1 (en) * | 2004-11-17 | 2013-04-10 | TELEFONAKTIEBOLAGET LM ERICSSON (publ) | Updating configuration parameters in a mobile terminal |
US7788502B1 (en) * | 2005-03-10 | 2010-08-31 | Xilinx, Inc. | Method and system for secure exchange of IP cores |
-
2006
- 2006-04-24 JP JP2007514724A patent/JP4801055B2/ja active Active
- 2006-04-24 US US11/912,473 patent/US7958353B2/en active Active
- 2006-04-24 CN CN200680014095.6A patent/CN101167300B/zh not_active Expired - Fee Related
- 2006-04-24 EP EP06732298A patent/EP1879322A1/en not_active Withdrawn
- 2006-04-24 WO PCT/JP2006/308588 patent/WO2006115252A1/ja active Application Filing
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH08204702A (ja) * | 1995-01-30 | 1996-08-09 | Nec Corp | 暗号鍵管理装置 |
JPH10320191A (ja) | 1997-04-30 | 1998-12-04 | Motorola Inc | プログラム可能暗号処理システムおよび方法 |
WO2001030019A1 (fr) * | 1999-10-18 | 2001-04-26 | Sony Corporation | Processeur d'information et procede de traitement d'information, support enregistre |
JP2002050956A (ja) | 2000-07-13 | 2002-02-15 | Sun Microsyst Inc | フィールド・プログラマブル・ゲート・アレイ |
JP2002290396A (ja) | 2001-03-23 | 2002-10-04 | Toshiba Corp | 暗号鍵更新システムおよび暗号鍵更新方法 |
JP2004248232A (ja) * | 2002-03-20 | 2004-09-02 | Matsushita Electric Ind Co Ltd | コンテンツを再生する再生装置、再生方法、プログラム、鍵管理装置及び鍵管理システム |
JP2003304235A (ja) * | 2002-04-10 | 2003-10-24 | Sony Corp | 無線通信装置、およびプログラム・ダウンロード方法、並びにコンピュータ・プログラム |
JP2004336178A (ja) * | 2003-04-30 | 2004-11-25 | Rohm Co Ltd | デバイス鍵保護方法およびその方法を利用可能な暗号化装置と復号装置ならびに映像送信装置と映像受信装置 |
JP2005006302A (ja) * | 2003-06-11 | 2005-01-06 | Hewlett-Packard Development Co Lp | プログラマブルハードウェアを使用したコンテンツ暗号化 |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2010098367A (ja) * | 2008-10-14 | 2010-04-30 | Sony Corp | 情報処理装置、暗号切替方法、及びプログラム |
JP2010117968A (ja) * | 2008-11-14 | 2010-05-27 | National Institute Of Advanced Industrial Science & Technology | 再構成可能論理デバイスの論理プログラムデータ保護システム及び保護方法 |
JP2010183278A (ja) * | 2009-02-04 | 2010-08-19 | Sony Optiarc Inc | 情報処理装置、および情報処理方法、並びにプログラム |
US8370647B2 (en) | 2009-02-04 | 2013-02-05 | Sony Opitarc Inc. | Information processing apparatus, information processing method, and program |
JP2014099752A (ja) * | 2012-11-14 | 2014-05-29 | Fujitsu Ltd | 通信装置、通信システム、及び通信システムにおける暗号アルゴリズム実行方法 |
US9411968B2 (en) | 2012-11-14 | 2016-08-09 | Fujitsu Limited | Apparatus and method for performing different cryptographic algorithms in a communication system |
Also Published As
Publication number | Publication date |
---|---|
US7958353B2 (en) | 2011-06-07 |
EP1879322A1 (en) | 2008-01-16 |
CN101167300B (zh) | 2011-08-10 |
JP4801055B2 (ja) | 2011-10-26 |
CN101167300A (zh) | 2008-04-23 |
US20090132821A1 (en) | 2009-05-21 |
JPWO2006115252A1 (ja) | 2008-12-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4801055B2 (ja) | 情報セキュリティ装置 | |
WO2006109738A1 (ja) | 回路構築装置 | |
WO2011111370A1 (ja) | 記録システム、再生システム、鍵配信サーバ、記録装置、記録媒体装置、再生装置、記録方法、及び、再生方法 | |
US7647646B2 (en) | Information input/output system, key management device, and user device | |
JP2002152187A (ja) | 情報処理装置、および情報処理方法、並びにプログラム記憶媒体 | |
EP1975841A2 (en) | Method and system for mutual authentication between mobile and host devices | |
WO2001056224A1 (fr) | Systeme d'authentification de dispositif de stockage | |
JP6010023B2 (ja) | 記録媒体装置及びコントローラ | |
WO2001099331A1 (en) | System and method for processing information using encryption key block | |
KR20040085009A (ko) | 은닉해야 할 데이터를 암호화하여 입출력하는 방법 및 장치 | |
WO2012144193A1 (ja) | 無効化リスト生成装置、無効化リスト生成方法及びコンテンツ管理システム | |
WO2005121980A1 (ja) | 情報取得装置、情報取得方法、情報取得プログラム | |
JP2006157887A (ja) | コンテンツ利用情報提供装置およびコンテンツ利用情報送信方法 | |
US8275998B2 (en) | Encryption device, key distribution device and key distribution system | |
JP4638160B2 (ja) | 著作物保護システム、記録装置、再生装置及び記録媒体 | |
JP2001211152A (ja) | データ処理装置、コンテンツデータ生成方法、およびデータ処理方法、並びにプログラム提供媒体 | |
WO2006115213A1 (ja) | 回路更新システム | |
JP2001125481A (ja) | 暗号通信端末、暗号通信センター装置及び暗号通信システム並びに記録媒体 | |
JP2001209580A (ja) | データ記憶素子製造方法およびデータ記憶素子、並びにデータ処理装置 | |
JP2013150179A (ja) | 情報処理装置、情報記憶装置、情報処理システム、および情報処理方法、並びにプログラム | |
AU2002301287B8 (en) | Data Processing Apparatus and Data Processing Method | |
JP2008259013A (ja) | コンテンツ管理装置及び方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200680014095.6 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2007514724 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11912473 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
NENP | Non-entry into the national phase |
Ref country code: RU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2006732298 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2006732298 Country of ref document: EP |