G11B20/00086

Apparatus for managing members of at least one group of decoders having access to broadcast data
09730057 · 2017-08-08 · ·

A technique to manage members of a group of decoders having access to broadcast data, each group member sharing a common broadcast encryption scheme (BES) comprising the steps of, in a stage for a decoder to become a group member, receiving keys pertaining to the position in the group according to the BES, receiving a current group access data comprising a current group access key, and in a stage of accessing broadcast data, using the current group access data to access the broadcast data, and in a stage of renewing the current group access key, sending a first group message comprising at lease a next group access key encrypted so that only non-revoked decoders can access it, said group message being further encrypted by the current group access key, updating the current group access key with the next group access key.

INFORMATION PROCESSING DEVICE, INFORMATION RECORDING MEDIUM, AND INFORMATION PROCESSING METHOD, AND PROGRAM
20170220783 · 2017-08-03 · ·

A configuration in which a reliable source of illegal copy content is analyzed using content in which a reproduction path can be set is realized. Content which has a segment area including a plurality of items of variation data which can be decrypted using different keys and in which a reproduction path corresponding to the selected variation data can be set is used. Each item of variation data is configured such that embedded information such as a digital watermark can be acquired from decrypted data. Each item of variation data includes a 192-byte source packet or a 6144-byte aligned unit. A reproduction device selects and reproduces one item of variation data from each segment area on the basis of a variation data identifier recorded in the variation data.

SYSTEM, METHOD, AND DEVICE FOR DELIVERING COMMUNICATIONS AND STORING AND DELIVERING DATA
20170220781 · 2017-08-03 ·

A system, method, and device includes a platform data storage that stores a wrap that secures an executable controller and executable sensors. The wrap is verified, optionally through a downloaded authentication driver. After verifying the wrap, the wrap is opened and a sister of the executable controller is installed into the platform memory to cooperate with the executable controller. Additionally or alternatively, the authentication driver may cooperate with the executable controller. The executable controller allows the platform processor to access data secured in a vault and/or verify the platform to create a connection to an application server.

Information carrier comprising access information

An apparatus for reading out information from an information carrier includes a reading unit for reading out user information and access information from the information carrier. The user information are stored in a first region of the information carrier and the access information are stored in a second region of the information carrier. The apparatus further includes an access controller for providing access to the user information in dependence on the access information. The access information are stored in a first portion of the second region, and the dummy information are stored in a second portion of the second region according to a similar format as used for storing the access information.

Media content feed format for management of content in a content hosting website
09773098 · 2017-09-26 · ·

A system and method for providing a content feed file for a content file to a content host. The method comprises delivering the content file and the content feed file to the content host, wherein the content feed file comprises one or more policies and the one or more policies direct the content host to manage the content file according to the one or more policies. After the content host processes the content file according to the provided policies, the content owner receives a status report wherein the status report comprises information about actions taken by the content host according to the one or more policies.

OPTICAL MEDIUM REPRODUCING APPARATUS, OPTICAL MEDIUM REPRODUCING METHOD, AND OPTICAL MEDIUM

Provided is an optical medium reproducing apparatus including: a detection unit that divides a luminous flux into a plurality of regions including a first region and a second region which are different in a position in a radial direction and/or a tangential direction, and combines a plurality of detection signals in correspondence with the amount of light that is incident to each of the plurality of regions with combination patterns which are selected to form signals of a plurality of channels; a multi-input equalizer unit that includes a plurality of equalizer units to which the signals of the plurality of channels are respectively supplied, computes outputs of the plurality of equalizer units, and outputs the resultant value as an equalization signal; and a binarization unit that performs binarization processing with respect to the equalization signal to obtain binary data. An addition signal channel including a constant multiplication of detection signals of the first region and the second region is included in at least one of the combination patterns.

INFORMATION PROCESSING DEVICE, INFORMATION RECORDING MEDIUM, AND INFORMATION PROCESSING METHOD, AND PROGRAM
20170322890 · 2017-11-09 ·

A configuration capable of performing reliable source analysis of illegal copy content using content in which a reproduction path is settable is implemented. Content in which an individual segment region including a plurality of pieces of variation data which include different identification information embedded therein and are decryptable using different keys and a common segment region including single data are provided, and variation data is configured with an aligned unit is set. A content reproducing device calculates a reproduction path by applying a device key and selects and reproduces an aligned unit corresponding to the reproduction path on the basis of a variation data identifier recorded in an adaptation field in a plain text region at the head of a plurality of aligned units constituting the variation data.

Information processing device, information processing method, and program

An information processing device including: a data processing unit that generates an encryption key of content; and a communication unit that transmits an encryption key generated by the data processing unit, wherein the data processing unit generates, as the encryption key, individual keys that are different for each new content recording processing on a recording medium in a content recording device, and transmits the individual keys through the communication unit.

Multimedia Distribution System for Multimedia Files with Packed Frames

A multimedia file and methods of generating, distributing and using the multimedia file are described. Multimedia files in accordance with embodiments of the present invention can contain multiple video tracks, multiple audio tracks, multiple subtitle tracks, data that can be used to generate a menu interface to access the contents of the file and ‘meta data’ concerning the contents of the file. Multimedia files in accordance with several embodiments of the present invention also include references to video tracks, audio tracks, subtitle tracks and ‘meta data’ external to the file. One embodiment of a multimedia file in accordance with the present invention includes a series of encoded video frames and encoded menu information.

Authenticating a hardware chip using an intrinsic chip identifier

Embodiments of the present invention provide an authenticating service of a chip having an intrinsic identifier (ID). In a typical embodiment, an authenticating device is provided that includes an identification (ID) engine, a self-test engine, and an intrinsic component. The intrinsic component is associated with a chip and includes an intrinsic feature. The self-test engine retrieves the intrinsic feature and communicates it to the identification engine. The identification engine receives the intrinsic feature, generates a first authentication value using the intrinsic feature, and stores the authentication value in memory. The self-test engine generates a second authentication value using an authentication challenge. The identification engine includes a compare circuitry that compares the first authentication value and the second authentication value and generates an authentication output value based on the results of the compare of the two values.