Abstract:
A data encryption device is connected between an HDD and an HDD controller that controls the HDD. The data encryption device encrypts data that is stored from the HDD controller to the HDD, and decrypts data that is read from the HDD. A CPU of the data encryption device receives a command issued from the HDD controller to the HDD, and determines whether the command is executable at the HDD. When it is determined that the command is executable, the command is issued to the HDD. On the other hand, when it is determined that the command is unexecutable, the CPU prohibits issuance of the command to the HDD. Furthermore, when a command issued to the HDD is a specific command, the CPU bypasses data transferred between the HDD controller and the HDD without encryption or decryption.
Abstract:
A data processing apparatus for reproducing a plurality of object streams having predetermined information severally, which apparatus is provided with an IPMP information extraction circuit (54) for extracting hierarchical management information for controlling the permission and inhibition of the usage of each object from input data, a usage status check circuit (56) for judging whether the usage of an upper level object of a subjected object is prohibited or not in accordance with the IPMP information extracted by the IPMP information extraction circuit (54), and a control information extraction circuit (58) for controlling the data processing apparatus to prohibit the usage of the subjected object if the usage of the upper level object of the subjected object is prohibited in accordance with a judgment result by the usage status check circuit (56).
Abstract:
A data encryption device is connected between an HDD and an HDD controller that controls the HDD. The data encryption device encrypts data that is stored from the HDD controller to the HDD, and decrypts data that is read from the HDD. A CPU of the data encryption device receives a command issued from the HDD controller to the HDD, and determines whether the command is executable at the HDD. When it is determined that the command is executable, the command is issued to the HDD. On the other hand, when it is determined that the command is unexecutable, the CPU prohibits issuance of the command to the HDD. Furthermore, when a command issued to the HDD is a specific command, the CPU bypasses data transferred between the HDD controller and the HDD without encryption or decryption.
Abstract:
In verification of image data of a captured image as to whether it is original one, the verification is possible even for image data subjected to a peripheral illumination correction or an exposure correction. An order information calculation unit selects a pixel set including two or more pixels based on pixel values and information on an image space of image data of a captured image, and calculates an order of magnitude between pixels in the selected pixel set. A verification data producing unit generates verification data used in verification of whether the image data has not been tampered with, based on the calculated order of magnitude. An image output unit outputs the image data and the verification data.
Abstract:
A data encryption device is connected between an HDD and an HDD controller that controls the HDD. The data encryption device encrypts data that is stored from the HDD controller to the HDD, and decrypts data that is read from the HDD. A CPU of the data encryption device receives a command issued from the HDD controller to the HDD, and determines whether the command is executable at the HDD. When it is determined that the command is executable, the command is issued to the HDD. On the other hand, when it is determined that the command is unexecutable, the CPU prohibits issuance of the command to the HDD. Furthermore, when a command issued to the HDD is a specific command, the CPU bypasses data transferred between the HDD controller and the HDD without encryption or decryption.
Abstract:
In an encryption device, in a case where predetermined first data is input, the first data is converted into second data that is data decrypted from the first data and, in a case where the second data is input, the second data is converted into the first data, and the converted data is encrypted to be output to a storage unit.
Abstract:
This invention provides a technique of preventing determination of image alteration when digital image data has undergone, e.g., rotation without any substantial change in contents. To do this, an area separation processing unit separates image data into areas. For each of the separated areas, an area feature value calculator calculates an area feature value independent of the coordinate information of the image. An area order sorter sorts the separated areas in accordance with the calculated area feature values. A validation data generation processing unit generates validation data based on the sort result.
Abstract:
In an encryption device, in a case where predetermined first data is input, the first data is converted into second data that is data decrypted from the first data and, in a case where the second data is input, the second data is converted into the first data, and the converted data is encrypted to be output to a storage unit.
Abstract:
In an image process apparatus, a key different for each level of hierarchy is generated on the basis of a specific key with respect to image data having a hierarchical structure, the image data in each level of the hierarchy is encrypted using the generated key for each level, and the specific key is managed, so that key management can be easily performed while the image data having a hierarchical structure is enciphered using different keys for each level of the hierarchy.
Abstract:
Copyright information embedded in a digital content can always be sampled and the copyright of the digital content can be protected reliably, by using a sampling program which is automatically activated and samples the copyright information from the digital content. For example, the digital content added with the sampling program is distributed or an application program added with the sampling program for utilizing the digital content is distributed so that the copyright information can be reliably sampled from the digital content and the utilization of the digital content can be controlled in accordance with the copyright information. If a file containing a plurality of digital contents is used, copyright information is embedded in each digital content and the copyright information is sampled from each digital content. It is possible to control the utilization of each digital content in accordance with the sampled copyright information.