INFORMATION PROCESSING APPARATUS, DATA PROCESSING APPARATUS, AND METHODS THEREOF
First Claim
1. A data processing apparatus comprising:
- an input section, arranged to input information for encryption key generation;
a key generator, arranged to generate an encryption key from the information for encryption key generation;
an authenticator, arranged to acquire encryption key verification data from a storage medium and authenticate, based on the verification data, validity of the encryption key generated by said key generator;
a data generator, arranged to generate data to be stored in the storage medium;
an encryption section, arranged to encrypt the data generated by said data generator by using the encryption key whose validity is authenticated by said authenticator; and
a controller, arranged to store the data encrypted by said encryption section in the storage medium.
1 Assignment
0 Petitions
Accused Products
Abstract
An object of this invention is to protect the right of a content holder without any necessity of a special storage medium incorporating a copyright protecting mechanism when the content holder does not coincide with a content creator. Information for encryption key generation is input. An encryption key is generated from the information for encryption key generation. Encryption key verification data is acquired from a storage medium, and the validity of the generated encryption key is authenticated based on the verification data. Generated data is encrypted by using the encryption key whose validity is authenticated by the authentication. The encrypted data is stored in the storage medium.
37 Citations
22 Claims
-
1. A data processing apparatus comprising:
-
an input section, arranged to input information for encryption key generation; a key generator, arranged to generate an encryption key from the information for encryption key generation; an authenticator, arranged to acquire encryption key verification data from a storage medium and authenticate, based on the verification data, validity of the encryption key generated by said key generator; a data generator, arranged to generate data to be stored in the storage medium; an encryption section, arranged to encrypt the data generated by said data generator by using the encryption key whose validity is authenticated by said authenticator; and a controller, arranged to store the data encrypted by said encryption section in the storage medium. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An information processing apparatus comprising:
-
a key generator, arranged to generate an encryption key to be used when an external device stores data in a storage medium; a verification data generator, arranged to generate verification data to authenticate validity of the encryption key and store the verification data in the storage medium; and a decryption section, arranged to decrypt the data stored in the storage medium by using the encryption key. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A method of processing data, the method comprising the steps of:
-
inputting information for encryption key generation; generating an encryption key from the information for encryption key generation; acquiring encryption key verification data from a storage medium and authenticating, based on the verification data, validity of the generated encryption key; generating data to be stored in the storage medium; encrypting the generated data by using the encryption key whose validity is authenticated in the authenticating step; and storing the encrypted data in the storage medium.
-
-
18. A method of processing information, the method comprising the steps of:
-
generating an encryption key to be used when an external device stores data in a storage medium; generating verification data to authenticate validity of the encryption key and storing the verification data in the storage medium; and decrypting the data stored in the storage medium by using the encryption key.
-
-
19. A computer-executable program stored on a computer-readable storage medium comprising program code causing a computer to perform a data processing method, the method comprising the steps of:
-
inputting information for encryption key generation; generating an encryption key from the information for encryption key generation; acquiring encryption key verification data from a storage medium and authenticating, based on the verification data, validity of the generated encryption key; generating data to be stored in the storage medium; encrypting the generated data by using the encryption key whose validity is authenticated in the authenticating step; and storing the encrypted data in the storage medium.
-
-
20. A computer-executable program stored on a computer-readable storage medium comprising program code causing a computer to perform a data processing method, the method comprising the steps of:
-
generating an encryption key to be used when an external device stores data in a storage medium; generating verification data to authenticate validity of the encryption key and storing the verification data in the storage medium; and decrypting the data stored in the storage medium by using the encryption key.
-
-
21. A computer-readable storage medium storing a computer-executable program causing a computer to perform an information processing method, the method comprising the steps of:
-
inputting information for encryption key generation; generating an encryption key from the information for encryption key generation; acquiring encryption key verification data from a storage medium and authenticating, based on the verification data, validity of the generated encryption key; generating data to be stored in the storage medium; encrypting the generated data by using the encryption key whose validity is authenticated in the authenticating step; and storing the encrypted data in the storage medium.
-
-
22. A computer-readable storage medium storing a computer-executable program causing a computer to perform an information processing method, the method comprising the steps of:
-
generating an encryption key to be used when an external device stores data in a storage medium; generating verification data to authenticate validity of the encryption key and storing the verification data in the storage medium; and decrypting the data stored in the storage medium by using the encryption key.
-
Specification