


According to the present configuration, a configuration is realized wherein an unrevoked application is not subjected to utilization restriction, and only a revoked application is subjected to utilization restriction. for communicating with said service implemented by an interface list with. A certificate revocation list (CRL) in which the revocation information of a content owner who is a providing entity of an application program recorded in a disc is recorded is referred to verify whether or not a content owner identifier recorded in an application certificate is included in the CRL, and in the case that the content owner identifier is included in the CRL, comparison between a timestamp stored in a content certificate and a CRL timestamp is executed, and in the case that the content certificate timestamp has date data equal to or later than the CRL timestamp, utilization processing of the application program is prohibited or restricted. Abstract: Disclosed herein is an information processing apparatus, including: a data processing section reproducing contents stored in a medium having a general purpose area storing encrypted contents and utilization controlling information corresponding to the contents, and a protected area including blocks to which access limitation is set and which include a title key storage block in which an encryption key for decrypting the contents and validity period information applied to the application contents of the encryption key are stored and a status storage block in which date information upon content first-time reproduction is stored the data processing section acquires validity period information indicative of the content utilization permission period determined in response to date information upon the content first-time reproduction from the title key storage block and decides whether or not content reproduction is to be permitted based on comparison between the acquired validity period information and current datĪbstract: A configuration is provided wherein usage restrictions of an application are determined in accordance with timestamps.
