Patent application number | Description | Published |
20080212770 | Key Information Generating Method and Device, Key Information Updating Method, Tempering Detecting Method and Device, and Data Structure of Key Information - A domain key is used to perform chaining decryption with respect to encrypted content key information (ST | 09-04-2008 |
20090013183 | Confidential Information Processing Method, Confidential Information Processor, and Content Data Playback System - In order to maintain the confidentiality of information at a high level even in cases where a confidential information processor in which multiple types of decryption sequences are applicable is used, decryption is performed according to the value of content decryption information | 01-08-2009 |
20090037721 | PROGRAM DEVELOPMENT METHOD, PROGRAM DEVELOPMENT SUPPORTING SYSTEM, AND PROGRAM INSTALLATION METHOD - An development environment of a high security level is provided for a key-installed system. Development of a program for a system having an LSI device which includes a secure memory is performed by providing another LSI device having the same structure and setting the provided LSI device to a development mode which is different from a product operation mode. Alternatively, the provided LSI device is set to an administrator mode to perform development and encryption of a key-generation program. The LSI device is set to a key-generation mode to execute the encrypted key-generation program, thereby generating various keys. | 02-05-2009 |
20090083547 | CONFIDENTIAL INFORMATION PROCESSING HOST DEVICE AND CONFIDENTIAL INFORMATION PROCESSING METHOD - In the case where a target device stores: m keys {Ka | 03-26-2009 |
20090138728 | Program update method and server - A system including a secure LSI | 05-28-2009 |
20090316884 | DATA ENCRYPTION METHOD, ENCRYPTED DATA REPRODUCTION METHOD, ENCRYPTED DATA PRODUCTION DEVICE, ENCRYPTED DATA REPRODUCTION DEVICE, AND ENCRYPTED DATA STRUCTURE - An encrypted data production device ( | 12-24-2009 |
20100180137 | CONTROL DEVICE - A control device performs the reading of data from a recording medium that is authenticated mutually or the writing of data into the recording medium. The control device includes an interface section which interfaces with the recording medium, a storing section which stores key information and authentication information produced in an authentication operation, and a controlling section which controls a supply of power based on whether or not the control device performs either the reading of data from the recording medium or the writing of data into the recording medium. While the control device performs neither the reading of data from the recording medium nor the writing of data into the recording medium, the controlling section controls so as to supply only to the storing section. Therefore, in the control device, a reduction in the number of times of mutual authentication with a recording medium is compatible with low power consumption. | 07-15-2010 |
20100205461 | METHOD FOR GENERATING DATA FOR DETECTION OF TAMPERING, AND METHOD AND APPARATUS FOR DETECTION OF TAMPERING - In a target apparatus which stores at least one piece of domain key information in a first area and a plurality of pieces of content key information each associated with any one of the domain key information in a second area, a method for generating data for detecting tampering of the content key information. The method comprises the steps of encrypting the content key information associated with one of the domain key information using a chain encryption technique; extracting data at predetermined positions in the encrypted content key information, concatenating the pieces of data extracted at the predetermined positions in the encrypted content key information to obtain concatenated data, performing a hash calculation with respect to the concatenated data to obtain a hash value, storing check values corresponding to the data at the predetermined positions in plain text, in the target apparatus, and storing the hash value in the target apparatus. | 08-12-2010 |
20100250961 | CONTROL DEVICE - A control device performs reading of data from a recording medium or writing of data into the recording medium. The control device includes a plurality of processing sections for performing at least any one of encrypting and decrypting processes, a plurality of interface sections serving as an interface to the recording medium respectively, and a controlling section for allocating one of the plurality of processing sections and one of the plurality of interface sections to each type of contents read from the recording medium or each type of contents written into the recording medium respectively. The control device encrypts or decrypts a plurality of contents in parallel. | 09-30-2010 |
20100318690 | CARD HOST LSI AND SET DEVICE INCLUDING THE SAME - In a set device having a card host LSI, high-speed data transmission to a removable card or the like is realized without hindering a reduction in size and weight. The card host LSI and the removable card are connected to a card bus complying with predetermined card bus specifications. A microcomputer module and the card host LSI are connected also by a card bus complying with the predetermined card bus specifications. | 12-16-2010 |
20100329456 | SEMICONDUCTOR DEVICE INCLUDING ENCRYPTION SECTION, SEMICONDUCTOR DEVICE INCLUDING EXTERNAL INTERFACE, AND CONTENT REPRODUCTION METHOD - A secure LSI device | 12-30-2010 |
20110197008 | CARD HOST LSI AND SET DEVICE INCLUDING THE LSI - A card host LSI includes M card host I/Fs for N-bit card modules, and M card bus terminals. A bridge circuit sets coupling relationship of signal lines so that a card host I/F corresponding to a card bus coupled to an (M×N)-bit card module and the other card host I/F(s) operate in conjunction with each other to control the card module, when an enable signal indicates the (M×N)-bit mode. | 08-11-2011 |
20110202752 | SEMICONDUCTOR DEVICE INCLUDING ENCRYPTION SECTION, SEMICONDUCTOR DEVICE INCLUDING EXTERNAL INTERFACE, AND CONTENT REPRODUCTION METHOD - A secure LSI device | 08-18-2011 |
20120027214 | KEY IMPLEMENTATION SYSTEM - An LSI includes a first decryptor which receives first encrypted key data, and decrypts the first encrypted key data using a first cryptographic key, thereby generating first decrypted key data, a second cryptographic key generator which generates a second cryptographic key based on a second ID, a second encryptor which encrypts the first decrypted key data using the second cryptographic key, thereby generating second encrypted key data, and a second decryptor which decrypts the second encrypted key data using the second cryptographic key, thereby generating second decrypted key data. At a time of key setting, the second encryptor stores the second encrypted key data in a storage unit. At a time of key usage, the second decryptor reads the second encrypted key data from the storage unit. | 02-02-2012 |
20130151836 | SEMICONDUCTOR DEVICE INCLUDING ENCRYPTION SECTION, SEMICONDUCTOR DEVICE INCLUDING EXTERNAL INTERFACE, AND CONTENT REPRODUCTION METHOD - A secure LSI device | 06-13-2013 |
20140129849 | SEMICONDUCTOR DEVICE INCLUDING ENCRYPTION SECTION, SEMICONDUCTOR DEVICE INCLUDING EXTERNAL INTERFACE, AND CONTENT REPRODUCTION METHOD - A secure LSI device | 05-08-2014 |
20140369496 | KEY IMPLEMENTATION SYSTEM - An LSI includes a first decryptor which receives first encrypted key data, and decrypts the first encrypted key data using a first cryptographic key, thereby generating first decrypted key data, a second cryptographic key generator which generates a second cryptographic key based on a second ID, a second encryptor which encrypts the first decrypted key data using the second cryptographic key, thereby generating second encrypted key data, and a second decryptor which decrypts the second encrypted key data using the second cryptographic key, thereby generating second decrypted key data. At a time of key setting, the second encryptor stores the second encrypted key data in a storage unit. At a time of key usage, the second decryptor reads the second encrypted key data from the storage unit. | 12-18-2014 |