Unlock instant, AI-driven research and patent intelligence for your innovation.

Key implementation system

A technology for installing system and keys, which is applied in the field of systems for installing keys on media cards, can solve problems such as increased manufacturing costs, achieve scalability and low cost, and prevent information leakage or improper behavior

Active Publication Date: 2014-07-16
PANASONIC SEMICON SOLUTIONS CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0017] (2) Cloning device manufacturing risk based on device key duplication
Such data management at the time of equipment manufacturing is a burden, which leads to an increase in manufacturing costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key implementation system
  • Key implementation system
  • Key implementation system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 approach

[0069] figure 1 It is a configuration diagram showing the configuration of the key installation system according to the first embodiment of the present invention.

[0070] The key installation system is composed of a component 1 , key writing means 12 , medium 13 and device key providing means 14 . Furthermore, the component 1 is constituted by an LSI 10 and a nonvolatile memory 11 .

[0071] The LSI manufacturer provides the LSI 10 to the component manufacturer. When LSI is developed / manufactured, in LSI 10, two types of ID (Identifier: identification code) namely ID1 and ID2; two types of LSI keys (LSI key A, LSI key B); two types of encryption keys are installed. generation process (first encryption key generation unit 100, second encryption key generation unit 105); three encryption processes (first decoding unit 101, second encryption unit 103, second decoding unit 104); key content decoding processing (content decoding processing unit 107).

[0072] The component man...

no. 2 approach

[0110] image 3 It is a configuration diagram showing the configuration of a key installation system according to the second embodiment of the present invention. exist image 3 In the key writing device 22, the component 2, the medium 23, the structural elements of the device key providing device 24 and their actions, and figure 1 The key writing device 12, the component 1, the medium 13, and the device key providing device 14 in the first embodiment shown are basically the same. Here, only the parts different from the first embodiment will be described.

[0111] The process of setting the device key in the component 2 by the component manufacturer is different from the first embodiment in the following points:

[0112] - Addition of verification processing of the decoded device key by the first verification unit 202

[0113]In the process of setting an encrypted device key for a component, the first verifying unit 202 checks whether the value of a predetermined bit field ...

no. 3 approach

[0125] Figure 5 It is a configuration diagram showing the configuration of the key installation system in the third embodiment of the present invention. figure 1 The configuration of the key installation system in the first embodiment shown is different from that of the LSI 30 , so only this difference will be described.

[0126] In the third embodiment, the same algorithm is used as the decoding algorithm of the first decoding unit 101 and the second decoding unit 104 in the first embodiment, and circuits are shared. This processing is performed in the encryption decoding unit 301 . In addition, generally known encryption processing and decoding processing can reduce the circuit size by sharing core processing, compared to implementing them as completely independent circuits. In addition to this, the processing circuit of the second decoding unit 104 is also installed in the encryption decoding unit 301 .

[0127] In this embodiment, the same algorithm is used as the encr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a key installation system that prevents various information leaks or fraudulent acts, and realizes scalability and low cost. The LSI (10) has: a first decoding unit (101) that receives the first encryption key data, and decodes the first encryption key data using the first encryption key to generate first decoding key data; A key generation unit (105), which generates a second encryption key according to the second ID; a second encryption unit (103), which uses the second encryption key to encrypt the first decoding key data to generate a second encryption key key data; and a second decoding unit (104) that decodes the second encryption key data using the second encryption key to generate second decoding key data. When the key is installed, the second encryption unit (103) stores the second encryption key data in the storage unit (11). When the key is used, the second decoding unit (104) reads the second encryption key data from the storage unit (11).

Description

technical field [0001] The present invention relates to a device for performing authentication processing or encryption processing for copyright protection of digital AV content, and a system for installing a key on a media card. Background technique [0002] Digital AV (Audio Video: Video) content recorded on an SD (Secure Digital) card or DVD (Digital Versatile Disk: Digital Versatile Disc) medium is recorded on the medium in an encrypted state for copyright protection. A key for decoding the encrypted content is installed in a device for recording or reproducing these contents. In addition, there is also a copyright protection method in which stronger security is achieved by performing encryption processing or authentication processing on the main body of the media card on which content is recorded. Furthermore, in the copyright-protected content distribution system, the transmitted content is transmitted to the device in an encrypted state, and is also recorded as encry...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08G06F21/10G06F21/55H04L9/32H04L29/06G06F21/72
CPCG06F2221/0797H04L2209/605H04L63/10H04L9/0866H04L9/0897H04L63/06G06F21/72G06F2221/2107H04L63/0428G06F21/10H04L9/0822H04L2463/101H04L9/321G06F21/556G06F21/109
Inventor 横田薰桂昭仁根本祐辅鸟崎唯之藤原睦
Owner PANASONIC SEMICON SOLUTIONS CO LTD