Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

System and method for processing information using encryption key block

An information processing system and key group technology, applied in the field of information processing systems, can solve the problems of inconvenient update processing, increased storage capacity, large computing load, etc.

Inactive Publication Date: 2007-01-24
SONY CORP
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the authentication method, there are mutual authentication using a common key encryption method, and an authentication method using a public key method. In the authentication using a common key, a common key is required for the entire system. In the update process Inconvenient to wait
In addition, in the public key method, the calculation load is large and the amount of memory required is also large, and it cannot be said that it is a desired configuration to install such a processing device in each device.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for processing information using encryption key block
  • System and method for processing information using encryption key block
  • System and method for processing information using encryption key block

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0109] [System Outline]

[0110] figure 1 An example of a content distribution system to which the data processing system of the present invention is applicable is shown. The content distribution side 10 encrypts the content or the content key and transmits it to a device on the content receiving side 20 capable of reproducing various contents. The device on the receiving side 20 decrypts the received encrypted content or encrypted content key to obtain the content or content key, reproduces image data and audio data, or executes various programs. Data exchange between the content distribution side 10 and the content receiving side 20 is performed via a network such as the Internet, or a traversable recording medium such as DVD or CD.

[0111] As a data distributor on the content distribution side 10, there are Internet 11, satellite broadcasting 12, telephone line 13, DVD, CD and other media 14, etc. On the other hand, as a device on the content receiving side 20, there is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In the key tree that uses multiple devices as the root of the tree, nodes and keys are associated with the keys on the leaves, set sub-trees that are distinguished by the data processing capabilities (capacities) of the devices, and the management subject of each sub-tree (Entity), an effective sub-effective key group is generated within the entity, and an effective key group that can only be decrypted by devices with common capabilities is generated in the key distribution center based on the capability information of the devices. In addition, manage the partial tree (subtree) of the key tree, generate a sub-activation key based only on the key set corresponding to the node or leaf belonging to the sub-tree, use the sub-effective key group, and generate The effective key group that can be decrypted in the selected entity can generate and distribute the effective key group according to the data processing capability of the device, and can divide and manage the key tree structure of the hierarchical structure.

Description

[0001] This application is a divisional application of: [0002] Invention title: "Information processing system and method using encryption key group" [0003] Application date: June 15, 2001 [0004] Application number: 01802411.4 (PCT / JP01 / 05146) technical field [0005] The present invention relates to an information processing system using an encryption key group, an information processing method, and a program providing medium, and particularly relates to a system and method for distributing cryptographic processing keys in a system accompanying cryptographic processing. In particular, to provide an information processing system using an encryption key group, an information processing method, and a program providing medium, which suppress the amount of messages to a small amount by using a tree-structured hierarchical key distribution method, For example, the load of data distribution at the time of content distribution or updating of various ke...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08G06F12/14G06F12/00G06F13/00G06F21/00G06F21/10G06F21/14G06F21/33G06F21/44G06F21/60G06F21/62G06F21/64G11B20/00H04L9/10
CPCH04L9/0822G11B20/0021G11B20/00086H04L9/0836G11B20/00659H04L2209/60H04L9/0891G11B20/00536
Inventor 北谷义道石黑隆二大泽义和浅野智之
Owner SONY CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products