BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS
A general architecture that implements the various feature of the invention will now be described with reference to the drawings. The drawings and the associated descriptions are provided to illustrate embodiments of the invention and not to limit the scope of the invention.
FIGS. 1A, 1B and 1C are diagrams illustrating method of storing/recording highly confidential data according to a first embodiment of the invention, illustrating how a set (key set) formed of a plurality of pairs of keys and position information items thereof changes in executing the method.
FIGS. 2A, 2B, 2C, 2D, 2E and 2F are diagrams illustrating example how the key set obtained by executing the storing/recording method according to the first embodiment of the invention is used in decoding encrypted content.
FIG. 3 is a flowchart illustrating an example of key set storing/recording processing, which is performed after obtaining and decoding a specific key set (such as encrypted key information provided in the form of a licensee release key disc).
FIG. 4 is a flowchart illustrating an example of processing of decoding encrypted content by using the stored/recorded key set.
FIG. 5 is a block diagram illustrating an example of a playback apparatus equipped with a memory storing highly confidential data.