Data storage apparatus, information processing apparatus, information processing method, and program
An information processing device and information storage technology, which is applied in the direction of electrical digital data processing, recording signal processing, data recording, etc., and can solve problems such as unauthorized use of content
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0040] 4. Second embodiment of verification value generation / recording processing performed during content recording processing
[0041] 5. Third Embodiment of Verification Value Generation / Recording Process Executed During Contents Recording Process
[0042] 6. Fourth embodiment of verification value generation / recording processing performed during content recording processing
[0043] 7. Content reproduction processing sequence
[0044] 8. Example of hardware configuration of each device
[0045] [1. Example of Configuration of Data Storage Device (Memory Card)]
[0046] Hereinafter, a data storage device, an information processing device, an information processing method, and a program according to an embodiment of the present disclosure will be described in detail with reference to the accompanying drawings.
[0047] First, refer to figure 2 and subsequent figures describe examples of configurations of data storage devices (memory cards).
[0048] figure 2 is a dia...
no. 3 example
[0218] (3) signature data (marker) based on the connection data of CID and FID (corresponding to the third embodiment ( Figure 7 ))
[0219] (4) Two signature data based on separate data of CID and FID (corresponding to the fourth embodiment ( Figure 8 ))
[0220] Next, in step S303, the reproducing apparatus reads the matching verification value from the memory card. There is a reference above Figure 4 to Figure 8 Several validation values described. More specifically, there are several verification values as follows.
[0221] (1) in Figure 4 and Figure 5 In the case of the configuration of the first embodiment illustrated in , this is the authentication value (MAC) 303 .
[0222] (2) at Figure 6 In the case of the configuration of the second embodiment illustrated in , these are the first authentication value (MAC) 303a and the second authentication value (MAC) 303b.
[0223] (3) at Figure 7 In the case of the configuration of the third embodiment illust...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 