×

Archive system, management apparatus, and control method

  • US 8,738,933 B2
  • Filed: 04/28/2010
  • Issued: 05/27/2014
  • Est. Priority Date: 11/13/2007
  • Status: Active Grant
First Claim
Patent Images

1. An archive system, comprising:

  • a user terminal that includes a processor that refers to an encrypted content from a removable memory medium; and

    a management apparatus that includes a memory that stores a decryption key for decrypting the encrypted content that is a management target, and a processor that acquires management information uniquely specifying the encrypted content from the user terminal and authenticating whether a process of decrypting the encrypted content specified by the management information by using the decryption key is permitted, whereinthe processor of the user terminalreads out the encrypted content that is an authentication target from the removable memory medium that stores the encrypted content in association with the management information, assigns data forming the read encrypted content to a same hash function as that of the management apparatus, and computes a first hash value, andthe processor of the management apparatusacquires the first hash value and the management information from the user terminal;

    reads out, from the memory that stores a second hash value in association with the management information, the second hash value corresponding to the first hash value by using the acquired management information as a retrieval key, the second hash value being previously computed by assigning data forming the encrypted content retaining its authenticity to the hash function and authenticates whether the first hash value and the second hash value are identical to each other;

    stores, when the authentication result performed is an authentication failure indicating that the first hash value and the second hash value are not identical to each other, an authentication failure result in the memory in association with the management information;

    authenticates whether there is a corresponding authentication failure result by using the management information acquired from the memory as a retrieval key; and

    permits the process of decrypting when an authentication result is an authentication success indicating that the first hash value and the second hash value are identical to each other and when the corresponding authentication failure does not exist in the memory.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×