Method and device for protecting digital data by double re-encryption
First Claim
1. A method for protecting decrypted digital data from illegitimate use, said method comprising:
- encrypting said decrypted digital data using a changeable key to produce changeable key re-encrypted digital data;
encrypting said changeable key re-encrypted digital data using an unchangeable key to produce changeable-unchangeable keys double re-encrypted digital data to be stored, copied and/or transferred, wherein said unchangeable key is capable of being operationally unchangeable at least during said encrypting of said changeable key re-encrypted digital data;
decrypting said copied, stored and/or transferred changeable-unchangeable keys double re-encrypted digital data using said unchangeable key to said changeable key re-encrypted digital data; and
decrypting said changeable key re-encrypted digital data using said changeable key to said decrypted digital data.
5 Assignments
0 Petitions
Accused Products
Abstract
A method and an apparatus ensuring protection of digital data are provided. In addition to re-encrypting the data using an unchangeable key, the data is double re-encrypted using a changeable key. The changeable key is used first and the unchangeable key is then used, or in another case, the unchangeable key is used first, and the changeable key is then used. In the aspect of embodiments, there is a case adopting a software, a case adopting a hardware, or a case adopting the software and the hardware in combination. The hardware using the unchangeable key developed for digital video is available. In adopting the software, encryption/decryption is performed in a region below the kernel which cannot be handled by the user to ensure the security for the program and for the key used. More concretely, encryption/decryption is performed with RTOS using a HAL and a device driver, i.e., a filter driver, a disk driver and a network driver, in an I/O manager. Either one of two filter drivers, with a file system driver between them, may be used. Further, both filter drivers may be used.
-
Citations
92 Claims
-
1. A method for protecting decrypted digital data from illegitimate use, said method comprising:
-
encrypting said decrypted digital data using a changeable key to produce changeable key re-encrypted digital data; encrypting said changeable key re-encrypted digital data using an unchangeable key to produce changeable-unchangeable keys double re-encrypted digital data to be stored, copied and/or transferred, wherein said unchangeable key is capable of being operationally unchangeable at least during said encrypting of said changeable key re-encrypted digital data; decrypting said copied, stored and/or transferred changeable-unchangeable keys double re-encrypted digital data using said unchangeable key to said changeable key re-encrypted digital data; and decrypting said changeable key re-encrypted digital data using said changeable key to said decrypted digital data. - View Dependent Claims (2, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
3. A method for protecting decrypted digital data from illegitimate use, comprising:
-
encrypting said decrypted digital data using an unchangeable key to produce unchangeable key re-encrypted digital data, wherein said unchangeable key is capable of being operationally unchangeable at least during said encrypting of said decrypted digital data; encrypting said unchangeable key re-encrypted digital data using a changeable key to produce unchangeable-changeable key double re-encrypted digital data to be stored, copied and/or transferred; decrypting said copied, stored and/or transferred unchangeable-changeable keys double re-encrypted digital data using said changeable key to said unchangeable key re-encrypted digital data; and decrypting said unchangeable key re-encrypted digital data using said unchangeable key to said decrypted digital data. - View Dependent Claims (4)
-
-
16. An apparatus for protecting decrypted digital data from illegitimate use, said apparatus comprising:
-
a changeable key encryption unit capable of encrypting said decrypted digital data using a changeable key to produce changeable key re-encrypted digital data; an unchangeable key encryption unit capable of encrypting said changeable key re-encrypted digital data using an unchangeable key to produce changeable-unchangeable keys double re-encrypted digital data to be stored, copied and/or transferred, wherein said unchangeable key is capable of being operationally unchangeable at least during production of said changeable-unchangeable keys double re-encrypted digital data; an unchangeable key decryption unit capable of decrypting said copied, stored and/or transferred changeable-unchangeable keys double re-encrypted digital data using said unchangeable key to said changeable key re-encrypted digital data; and a changeable key decryption unit capable of decrypting said changeable key re-encrypted digital data using said changeable key to said decrypted digital data. - View Dependent Claims (17, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
18. An apparatus for protecting decrypted digital data from illegitimate use, said apparatus comprising:
-
an unchangeable key encryption unit capable of encrypting said decrypted digital data using an unchangeable key to produce unchangeable key re-encrypted digital data, wherein said unchangeable key is capable of being operationally unchangeable at least during production of said unchangeable key re-encrypted digital data; a changeable key encryption unit capable of encrypting said unchangeable key re-encrypted digital data using a changeable key to produce changeable-unchangeable keys double re-encrypted digital data to be stored, copied and/or transferred; a changeable key decryption unit capable of decrypting said copied, stored and/or transferred changeable-unchangeable keys double re-encrypted digital data using said changeable key to said unchangeable key re-encrypted digital data; and an unchangeable key decryption unit capable of decrypting said unchangeable key re-encrypted digital data using said unchangeable key to said decrypted digital data. - View Dependent Claims (19)
-
-
31. A method for protecting decrypted digital data from illegitimate use, said decrypted digital data being decrypted from digital data encrypted using a first changeable key, said method comprising:
-
encrypting said decrypted digital data using a second changeable key to produce second changeable key re-encrypted digital data; encrypting said second changeable key re-encrypted digital data using an unchangeable key to produce unchangeable second changeable keys double re-encrypted digital data to be stored, wherein said unchangeable key is capable of being operationally unchangeable at least during said encrypting of said second changeable key re-encrypted digital data; decrypting said stored unchangeable-second changeable keys double re-encrypted digital data using said unchangeable key to said second changeable key re-encrypted digital data; encrypting said second changeable key re-encrypted digital data using a third changeable key to produce third changeable-second changeable keys double re-encrypted digital data to be copied and/or transferred; decrypting said copied and/or transferred third changeable-second changeable keys double re-encrypted digital data using said third changeable key to said second changeable key re-encrypted digital data; and decrypting said second changeable key re-encrypted digital data using said second changeable key to said decrypted digital data. - View Dependent Claims (32, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49)
-
-
33. A method for protecting decrypted digital data from illegitimate use, said decrypted digital data being decrypted from digital data encrypted using a first changeable key, said method comprising:
-
encrypting said decrypted digital data using an unchangeable key to produce unchangeable key re-encrypted digital data, wherein said unchangeable key is capable of being operationally unchangeable at least during said encrypting of said decrypted digital data, and encrypting said unchangeable key re-encrypted digital data using a second changeable key to produce second changeable-unchangeable keys double re-encrypted digital data to be stored; decrypting said stored second changeable-unchangeable keys double re-encrypted digital data using said second changeable key to said unchangeable key re-encrypted digital data; decrypting said unchangeable key re-encrypted digital data using said unchangeable key to said decrypted digital data; encrypting said decrypted digital data using a third changeable key to produce third changeable key re-encrypted digital data, and encrypting said third changeable key re-encrypted digital data using said second changeable key to produce second changeable-third changeable keys double re-encrypted digital data to be copied and/or transferred; decrypting said copied and/or transferred second changeable-third changeable keys double re-encrypted digital data using said second changeable key to said third changeable key re-encrypted digital data; and decrypting said third changeable key re-encrypted digital data using said third changeable key to said decrypted digital data. - View Dependent Claims (34)
-
-
50. An apparatus for protecting decrypted digital data from illegitimate use, said decrypted digital data being decrypted from digital data encrypted using a first changeable key, said apparatus comprising:
-
a second changeable key encryption unit capable of encrypting said decrypted digital data using a second changeable key to produce second changeable key re-encrypted digital data; an unchangeable key encryption unit capable of encrypting said second changeable key re-encrypted digital data using an unchangeable key to produce unchangeable-second changeable keys double re-encrypted digital data to be stored, wherein said unchangeable key is capable of being operationally unchangeable at least during production of said unchangeable-second changeable keys double re-encrypted digital data; an unchangeable key decryption unit capable of decrypting said stored unchangeable-second changeable keys double re-encrypted digital data using said unchangeable key to said second changeable key re-encrypted digital data; a third changeable key encryption unit capable of encrypting said second changeable key re-encrypted digital data using a third changeable key to produce third changeable-second changeable keys double re-encrypted digital data to be copied and/or transferred; a third changeable key decryption unit capable of decrypting said copied and/or transferred changeable-second changeable keys double re-encrypted digital data using said third changeable key to said second changeable key re-encrypted digital data; and a second changeable key decryption unit capable of decrypting said second changeable key re-encrypted digital data using said second changeable key to decrypted digital data. - View Dependent Claims (51, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68)
-
-
52. An apparatus for protecting decrypted digital data from illegitimate use, said decrypted digital data being decrypted from digital data encrypted using a first changeable key, said apparatus comprising:
-
an unchangeable key encryption unit capable of encrypting said decrypted digital data using an unchangeable key to produce unchangeable key re-encrypted digital data, wherein said unchangeable key is capable of being operationally unchangeable at least during production of said unchangeable key re-encrypted digital data, and a second changeable key encryption unit capable of encrypting said unchangeable key re-encrypted digital data using a second changeable key to produce second changeable-unchangeable key double re-encrypted digital data to be stored; a second changeable key decryption unit capable of decrypting said stored second changeable-unchangeable keys double re-encrypted digital data using said second changeable key to unchangeable key re-encrypted digital data, and an unchangeable key decryption unit capable of decrypting said unchangeable key re-encrypted digital data using said unchangeable key to decrypted digital data; a third changeable key encryption unit capable of encrypting said decrypted digital data using a third changeable key to produce third changeable key re-encrypted digital data, and a second changeable key encryption unit capable of encrypting said third changeable key re-encrypted digital data using said second changeable key to produce second changeable-third changeable keys double re-encrypted digital data to be copied and/or transferred; and
a second changeable key decryption unit capable of decrypting said copied and/or transferred second changeable-third changeable keys double re-encrypted digital data using said second changeable key to said third changeable key re-encrypted digital data, and a third changeable key decryption unit capable of decrypting said third changeable key re-encrypted digital data using said third changeable key to decrypted digital data. - View Dependent Claims (53)
-
-
69. A method for protecting digital data from illegitimate use, said method comprising:
-
determining whether said digital data is subject to be protected or not; encrypting said digital data, determined to be protected, using an unchangeable key to produce unchangeable key encrypted digital data, wherein said unchangeable key is capable of being operationally unchangeable at least during said encrypting of said digital data; storing, copying and/or transferring said unchangeable key encrypted digital data; decrypting said stored, copied and/or transferred unchangeable key encrypted digital data using said unchangeable key to decrypted digital data; and utilizing said stored, copied and/or transferred unchangeable key encrypted digital data and said decrypted digital data. - View Dependent Claims (70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80)
-
-
81. An apparatus for protecting digital data from illegitimate use, said apparatus comprising:
-
determining means for determining whether said digital data is subject to be protected or not; means for encrypting said digital data, determined being subject to be protected, using an unchangeable key to produce unchangeable key encrypted digital data, wherein said unchangeable key is capable of being operationally unchangeable at least during said encrypting of said digital data; means for storing, copying and/or transferring said unchangeable key encrypted digital data; means for decrypting said stored, copied and/or transferred unchangeable key encrypted digital data to said decrypted digital data; and means for utilizing said stored, copied and/or transferred unchangeable key encrypted digital data and said decrypted digital data. - View Dependent Claims (82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92)
-
Specification