Information access control method and apparatus
First Claim
1. An access management method for deleting a specific content or contents from an information medium on which recorded are one or more contents or objects being encrypted using an encryption key according to a given encryption system, said method comprising:
- deleting the contents and the encryption key when the contents are to be deleted, provided that the information medium does not record another content or another object encrypted using an encryption key which is equivalent to the encryption key used for encrypting the contents to be deleted.
1 Assignment
0 Petitions
Accused Products
Abstract
According to one embodiment, an access management system such as an AACS is used to protect highly confidential information. A specific content is deleted from a medium on which recorded are one or more contents or objects being encrypted using an encryption key (or Title Key) according to the AACS. When the contents are to be deleted, the contents and the encryption key will be deleted simultaneously, provided that the information medium does not record another content or another object encrypted using an encryption key which is equivalent to the encryption key used for encrypting the contents to be deleted.
17 Citations
6 Claims
-
1. An access management method for deleting a specific content or contents from an information medium on which recorded are one or more contents or objects being encrypted using an encryption key according to a given encryption system, said method comprising:
deleting the contents and the encryption key when the contents are to be deleted, provided that the information medium does not record another content or another object encrypted using an encryption key which is equivalent to the encryption key used for encrypting the contents to be deleted. - View Dependent Claims (2, 3, 5, 6)
-
4. A method for reproducing encrypted object data from an information medium wherein the encrypted object data is encrypted using an encryption key, said reproducing method comprising:
-
reading information relating to an encryption from the information medium; generating a decryption key corresponding to the encryption key from the read encryption-related information; and decrypting and reproducing data of the encrypted object or encrypted contents from the information medium according to the generated decryption key.
-
Specification