Data authentication system
First Claim
Patent Images
1. A data processing apparatus for processing content data provided by a recording or communication medium, said apparatus comprising:
- a cryptography process section for executing a cryptography process on said content data; and
a control section for executing control for said cryptography process section, wherein said cryptography process section is configured to;
split a first portion of header data of the content data having data on usage policy into a plurality of first messages, said header data including a first stored check value therein,generate a first integrity check value or values from a first key stored in said cryptography process section to verify integrity of the header data by using said plurality of first messages,collate said first integrity check value or values to verify said first portion of the header data including the usage policy by comparing said first integrity check value or values to said first stored check value,split a second portion of the header data of the content data having a content key into a plurality of second messages, said header data including a second stored check value therein,generate a second integrity check value or values from a second key stored in said cryptography process section to verify integrity of the header data by using said plurality of second messages, wherein said second integrity check value or values is generated by applying the second key to a block information table key, the content key and a block information table,collate said second integrity check value or values to verify said second portion of the header data including said block information table by comparing said second integrity check value or values to said second stored check value,generate an intermediate integrity check value based on said first integrity check value or values and said second integrity check value or values, anduse said intermediate integrity check value to verify said content data corresponding to said first and second integrity check values.
1 Assignment
0 Petitions
Accused Products
Abstract
A data processing system, apparatus and method are provided to verify and validate data. Cryptographic processes employ keys to encrypt the data, check the data and prevent tampering with the data. The data may include header information such as compressed contents or an expansion processing program used to process the data.
-
Citations
32 Claims
-
1. A data processing apparatus for processing content data provided by a recording or communication medium, said apparatus comprising:
-
a cryptography process section for executing a cryptography process on said content data; and a control section for executing control for said cryptography process section, wherein said cryptography process section is configured to; split a first portion of header data of the content data having data on usage policy into a plurality of first messages, said header data including a first stored check value therein, generate a first integrity check value or values from a first key stored in said cryptography process section to verify integrity of the header data by using said plurality of first messages, collate said first integrity check value or values to verify said first portion of the header data including the usage policy by comparing said first integrity check value or values to said first stored check value, split a second portion of the header data of the content data having a content key into a plurality of second messages, said header data including a second stored check value therein, generate a second integrity check value or values from a second key stored in said cryptography process section to verify integrity of the header data by using said plurality of second messages, wherein said second integrity check value or values is generated by applying the second key to a block information table key, the content key and a block information table, collate said second integrity check value or values to verify said second portion of the header data including said block information table by comparing said second integrity check value or values to said second stored check value, generate an intermediate integrity check value based on said first integrity check value or values and said second integrity check value or values, and use said intermediate integrity check value to verify said content data corresponding to said first and second integrity check values. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A data processing method for processing content data provided by a recording or communication medium, said method comprising:
-
splitting a first portion of header data of the content data having data on usage policy into a plurality of first messages, said header data including a first stored check value therein; generating first integrity check value or values from a first key to verify integrity of the header data by using said plurality of first messages; collating said first integrity check value or values to verify said first portion of the header data including the usage policy by comparing said first integrity check value or values to said first stored check value; if said first portion of the header data is verified, splitting a second portion of the header data of the content data having a content key into a plurality of second messages, said header data including a second stored check value therein; generating second integrity check value or values from a second key to verify integrity of the header data by using said plurality of second messages, wherein said second integrity check value or values is generated by applying the second key to a block information table key, the content key and a block information table; collating said second integrity check value or values to verify said second portion of the header data including said block information table by comparing said second integrity check value or values to said second stored check value; if said second portion of the header data is verified, generating an intermediate integrity check value based on said first integrity check value or values and said second integrity check value or values; and verifying said content data corresponding to said first and second integrity check values using said intermediate integrity check value. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A data verifying value imparting method for a data verifying process, said method comprising:
-
splitting a first portion of header data of data having data on usage policy into a plurality of first messages, said header data including a first stored check value therein; imparting first integrity check value or values by using said plurality of first messages and a stored first key; comparing said first integrity check value or values to said first stored check value to verify a usage policy of said header data; if said usage policy is verified, splitting a second portion of the header data of the data having a content key into a plurality of second messages, said header data including a second stored check value therein; imparting second integrity check value or values by using said plurality of second messages, wherein said second integrity check value or values is generated by applying a second key to a block information table key, the content key and a block information table; comparing said second integrity check value or values to said second stored check value to verify said block information table of said header data; and if said block information table is verified, imparting an intermediate integrity check value to data to be verified, said intermediate integrity check value being used to verify content data corresponding to said first integrity check value or values and said second integrity check value or values. - View Dependent Claims (27, 28, 29, 30, 31)
-
-
32. A recording medium recorded with a computer program for executing a data verifying process having certain actions, said actions comprising:
-
splitting a first portion of header data of data having data on usage policy into a plurality of first messages, said header data including a first stored check value therein; executing a collation process using a first integrity check value or values generated by using said plurality of first messages and a stored first key, including comparing said first integrity check value or values to said first stored check value to verify a usage policy of said header data; if said usage policy is verified, splitting a second portion of the header data of the data having a data key into a plurality of second messages, said header data including a second stored check value therein; executing a collation process using a second integrity check value or values generated by using the plurality of second messages, including comparing said second integrity check value or values to said second stored check value to verify a block information table of said header data, wherein said second integrity check value or values is generated by applying a second key to a block information table key, the content key and said block information table; and if said block information table is verified, using an intermediate integrity check value to verify said content data corresponding to said first and second integrity check values, said intermediate integrity check value being based on an integrity check value set obtained by combining at least some of said first and second integrity check values together.
-
Specification