Authentication method, encryption method, decryption method, cryptographic system and recording medium
First Claim
1. An authentication method comprising the steps of:
- decrypting authentication information and a content provider'"'"'s public key stored in a certificate signed by a certificate authority with a public key of the certificate authority to authenticate the content provider using the decrypted authentication information; and
authenticating the content provider'"'"'s public key by checking the decrypted public key of the content provider.
1 Assignment
0 Petitions
Accused Products
Abstract
An authentication method, encryption method, decryption method, cryptographic system and recording medium are disclosed. The present invention includes the steps of decrypting authentication information and a content provider'"'"'s public key stored in a certificate signed by a certificate authority with a public key of the certificate authority to authenticate the content provider using the decrypted authentication information and authenticating the public key of the content provider by checking the decrypted public key of the content provider. And, the present invention provides the encryption method includes the steps of encrypting content data with a secret key, encrypting the secret key with a public key, and transferring the encrypted content data and the encrypted secret key.
31 Citations
37 Claims
-
1. An authentication method comprising the steps of:
-
decrypting authentication information and a content provider'"'"'s public key stored in a certificate signed by a certificate authority with a public key of the certificate authority to authenticate the content provider using the decrypted authentication information; and
authenticating the content provider'"'"'s public key by checking the decrypted public key of the content provider. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A recording medium comprising:
-
a data area storing content data; and
an authentication management area storing authentication information, wherein a certificate generated from encrypting authentication information and a content provider'"'"'s public key is stored in the authentication management area. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. An encryption method comprising the steps of:
-
encrypting content data with a secret key;
encrypting the secret key with a public key; and
transferring the encrypted content data and the encrypted secret key. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A decryption method comprising the steps of:
-
receiving an encrypted secret key and encrypted content data;
decrypting the encrypted secret key; and
decrypting the encrypted content data using the decrypted secret key. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36)
-
-
37. A cryptographic system comprising:
-
an encryption system encrypting content data with a secret key, the encryption system encrypting the secret key with a public key, the encryption system transferring the encrypted content data and the encrypted secret key; and
a decryption system receiving the encrypted secret key and the encrypted content data, the decryption system decrypting the encrypted secret key, the decryption system decrypting the encrypted content data using the decrypted secret key.
-
Specification