Information reproducing apparatus and secure module
First Claim
1. An information reproducing apparatus for reproducing information which is transmitted through a transmission medium or stored in a recording medium, comprising:
- a secure module, which is a tamper resistant module structure not allowing access to first information from outside, and stores the first information;
an insecure memory which allows unauthorized access and tampering of data from outside; and
a controller configured for;
loading a different decryption unit in the insecure memory every time the decryption unit is loaded, so that the decryption unit decrypts the encryption in a different manner every time the decryption unit is loaded, andexecuting the decryption unit in the insecure memory for decrypting an encryption applied to encrypted content information by using a predetermined key,wherein;
a key supply unit which is implemented in the secure module, supplies the first information as the predetermined key to the decryption unit in the insecure memory for decrypting the encrypted content information;
an authentication unit which is implemented in the secure module, supplies second information to the decryption unit in the insecure memory at predetermined time intervals, refers to third information returned from the decryption unit in the insecure memory in response to the second information, and checks authenticity of the decryption unit in the insecure memory based on the third information, where the second information is predetermined; and
a key-supply stop unit which is implemented in the secure module, stops supply of the predetermined key by the key supply unit when the authentication unit does not authenticate the decryption unit in the insecure memory.
1 Assignment
0 Petitions
Accused Products
Abstract
In an information reproducing apparatus having an open architecture, a secure module stores first information, and has a structure which does not allow access to the first information from outside, and a memory has a structure which can be accessed from outside. A decryption unit loaded in the memory decrypts an encryption applied to the first information by using a predetermined key. A key supply unit implemented in the secure module supplies the predetermined key to the decryption unit. An authentication unit implemented in the secure module supplies second information to the decryption unit, refers to third information returned in response to the second information, and checks for authenticity of the decryption unit. A key-supply stop unit implemented in the secure module stops supply of the predetermined key by the key supply unit when the authentication unit does not authenticate the decryption unit.
23 Citations
32 Claims
-
1. An information reproducing apparatus for reproducing information which is transmitted through a transmission medium or stored in a recording medium, comprising:
-
a secure module, which is a tamper resistant module structure not allowing access to first information from outside, and stores the first information; an insecure memory which allows unauthorized access and tampering of data from outside; and a controller configured for; loading a different decryption unit in the insecure memory every time the decryption unit is loaded, so that the decryption unit decrypts the encryption in a different manner every time the decryption unit is loaded, and executing the decryption unit in the insecure memory for decrypting an encryption applied to encrypted content information by using a predetermined key, wherein; a key supply unit which is implemented in the secure module, supplies the first information as the predetermined key to the decryption unit in the insecure memory for decrypting the encrypted content information; an authentication unit which is implemented in the secure module, supplies second information to the decryption unit in the insecure memory at predetermined time intervals, refers to third information returned from the decryption unit in the insecure memory in response to the second information, and checks authenticity of the decryption unit in the insecure memory based on the third information, where the second information is predetermined; and a key-supply stop unit which is implemented in the secure module, stops supply of the predetermined key by the key supply unit when the authentication unit does not authenticate the decryption unit in the insecure memory. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A secure module storing first information and capable of being detachably mounted on an information reproducing apparatus and executing processing related to security when the information reproducing apparatus reproduces information which is transmitted through a transmission medium or stored in a recording medium, where the information reproducing apparatus includes an insecure memory which allows unauthorized access and tampering of data from outside, and a controller loading, in the insecure memory, as a decryption unit for decrypting an encryption applied to encrypted content information by using a predetermined key, the secure module, which is a tamper resistant module structure, comprising:
-
a key supply unit which is implemented in the secure module, and supplies the first information as the predetermined key to a different decryption unit that is loaded in the insecure memory every time the decryption unit is loaded, so that the decryption unit decrypts the encryption in a different manner every time the decryption unit is loaded; an authentication unit which is implemented in the secure module, supplies second information to the decryption unit in the insecure memory at predetermined time intervals, refers to third information returned from the decryption unit in the insecure memory in response to the second information, and checks for authenticity of the decryption unit in the insecure memory based on the third information, where the second information is predetermined; and a key-supply stop unit which is implemented in the secure module, and stops supply of the predetermined key by the key supply unit when the authentication unit does not authenticate the decryption unit in the insecure memory.
-
-
17. An information reproducing method for reproducing information, using an information reproducing apparatus, which is transmitted through a transmission medium or stored in a recording medium, comprising:
-
storing first information in a secure module having a tamper resistant module structure which does not allow access to the first information from outside; loading a different decryption software into an insecure memory every time the decryption software is loaded, so that the decryption software decrypts an encryption in a different manner every time the decryption software is loaded; decrypting by the decryption software in the insecure memory an encryption applied to encrypted content information by using a predetermined key; supplying, by the secure module, the first information as the predetermined key to the decryption software in the insecure memory; supplying, by the secure module, second information to the decryption software in the insecure memory at predetermined time intervals, referring to third information returned from the decryption software in the insecure memory in response to the second information, and checking for authenticity of the decryption software in the insecure memory based on the third information, where the second information is predetermined; and stopping, by the secure module, supply of the predetermined key when the decryption software in the insecure memory is not authenticated. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. A method, comprising:
using a computer, which includes an insecure memory that allows unauthorized external access and tampering of data, and a secure module storing first information and having a tamper resistant module structure which does not allow access to the first information from outside, to execute; loading a different decryption software into the insecure memory every time the decryption software is loaded, so that the decryption software decrypts an encryption in a different manner every time the decryption unit is loaded; decrypting by the decryption software in the insecure memory encrypted content information, which is different from the first information, by using a predetermined key; and supplying by the secure module the first information as the predetermined key to the decryption software in the insecure memory and predetermined second information to the decryption software in the insecure memory at predetermined time intervals; referring by the secure module to third information returned from the decryption software in the insecure memory in response to the second information; and checking by the secure module authenticity of the decryption software in the insecure memory based on the third information.
Specification