Information management method and information management apparatus
First Claim
1. An information management method wherein predetermined information stored in a predetermined area of a recording medium having medium-specific information is encrypted using said medium-specific information or a key generated therefrom and is derived outside said predetermined area.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention presents an information management method wherein, when electronic data stored on a recording medium is lost for whatever reason, a user can restore this electronic data using backup information.
License information stored in a second layer inaccessible to a user of the recording medium is read out (Step S31) and is encrypted using a medium-specific number of the recording medium (Step S32), and the encrypted license information is stored in a third layer which the user of the recording medium can access at will (Step S33).
-
Citations
26 Claims
- 1. An information management method wherein predetermined information stored in a predetermined area of a recording medium having medium-specific information is encrypted using said medium-specific information or a key generated therefrom and is derived outside said predetermined area.
-
18. An information management apparatus having medium-specific information, and comprising a user-use area allowing writing and reading out of any information in accordance with external instructions and a secure area that is not subject to control by external instructions, said information management apparatus managing information of a recording medium wherein license information based on use rights for any information stored in a user-use area is stored in a secure area, said information management apparatus comprising:
-
write and read out means writing any information to and reading any information from said user-use area; and
predetermined information deriving means encrypting predetermined information stored in said secure area using said medium-specific information or a key generated therefrom and deriving the same outside said secure area. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26)
-
Specification