WO2002063482A1 - Contenu et systeme de gestion/d'utilisation de contenu - Google Patents

Contenu et systeme de gestion/d'utilisation de contenu Download PDF

Info

Publication number
WO2002063482A1
WO2002063482A1 PCT/JP2001/000859 JP0100859W WO02063482A1 WO 2002063482 A1 WO2002063482 A1 WO 2002063482A1 JP 0100859 W JP0100859 W JP 0100859W WO 02063482 A1 WO02063482 A1 WO 02063482A1
Authority
WO
WIPO (PCT)
Prior art keywords
content
data
source data
client
management
Prior art date
Application number
PCT/JP2001/000859
Other languages
English (en)
Japanese (ja)
Inventor
Kouki Hara
Motoshi Kimura
Original Assignee
Shima, Masahiko
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shima, Masahiko filed Critical Shima, Masahiko
Priority to JP2002563357A priority Critical patent/JPWO2002063482A1/ja
Priority to PCT/JP2001/000859 priority patent/WO2002063482A1/fr
Publication of WO2002063482A1 publication Critical patent/WO2002063482A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/306User profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/60Network streaming of media packets
    • H04L65/61Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio
    • H04L65/612Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio for unicast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/60Network streaming of media packets
    • H04L65/75Media network packet handling
    • H04L65/762Media network packet handling at the source 

Definitions

  • the present invention relates to content and content management 'operation systems. More specifically, data is compiled by adding ID information to the source data, and the compiled source data is generated by incorporating a management program for managing the source data or an execution program for reproducing the source data, and generating the content. It relates to content and content management and operation systems that can be used by clients who use this content by obtaining permission to use the server. Background art
  • ID information is embedded in content using technology such as content or digital watermarking that can be used only by specific users by encrypting the content itself, recorded on a recording medium such as a CD-ROM or DVD, and distributed. Or distribute it through a network, etc., and if non-authorized users illegally use this content on a website, software that searches for the website on the network ( There is a system that downloads and uses the content from the server to regularly search the web site using a program, etc., and deletes it from the client after use.
  • technology such as content or digital watermarking that can be used only by specific users by encrypting the content itself, recorded on a recording medium such as a CD-ROM or DVD, and distributed. Or distribute it through a network, etc., and if non-authorized users illegally use this content on a website, software that searches for the website on the network ( There is a system that downloads and uses the content from the server to regularly search the web site using a program, etc., and deletes it from the client after use
  • a content and a content management / operation system have the following configuration.
  • (1) It comprises a client and a server that can be connected via a network, notifies the server when the client uses the content, and permits the use of the content upon receiving the notification, thereby allowing the client to use the content.
  • Content management in which content can be used on the data side.
  • the content is a data management program for converting the source data by a predetermined method and managing the converted source data. Or a reproduction program for reproducing the converted source data.
  • the source data contains at least a book, video, and / or video
  • the data conversion of the source data includes A / D conversion means for converting analog data into digital data, D / D conversion means for converting digital data into digital data of a predetermined format, and digital data. And / or all means for reducing the capacity of digital data, and adding authentication information for managing the source data. Content described in (1).
  • the management program has at least an inspection function for inspecting an operating environment of a client using the source data, and a management function for managing usage information including a usage time and a usage frequency of the source data.
  • a client and a server that can be connected via a network The client notifies the server when the client uses the content, and permits the use of the content upon receiving the notification, thereby allowing the client to use the content.
  • the content is converted into data by a predetermined method, and a management program for managing the converted source data and / or a conversion program.
  • Content management and operation system characterized by content that incorporates a reproduction program that reproduces the source data.
  • the source data includes at least a book, a movie, and / or a still image.
  • the content management / operation system according to (7) or (8) which is characterized by images, photographs, sounds, and text data.
  • the data conversion of the source data includes A / D conversion means for converting analog data into digital data, DZD conversion means for converting digital data into digital data of a predetermined format, and encryption of digital data.
  • the conversion is performed by any or all of the encryption means for encrypting and the capacity reduction means for reducing the volume of digital data, and the authentication information for managing the source data is added.
  • the management program includes a check function for checking at least an operating environment of a client that uses the source data, and a management function for managing usage information including a usage time period and a usage period of the source data. And a erasing function for erasing the source data.
  • the server has a charging function for charging according to usage information including the usage time Z of the source data / the number of usages / the usage period, wherein the content management / operation system described in (7) is provided. .
  • FIG. 1 is an explanatory diagram schematically showing a content generation process in the present invention.
  • FIG. 2 is a flowchart showing a method of data compiling of source data in the content according to the present invention.
  • FIG. 3 is an explanatory diagram of the converted data generated by performing a compiling process on the source data when generating the content according to the present invention.
  • FIG. 4 is a schematic diagram schematically showing a system configuration of the first embodiment of the content management / operation system according to the present invention.
  • FIG. 5 is a flowchart when the content is used by the content management / operation system according to the first embodiment of the present invention.
  • FIG. 6 is a schematic diagram schematically showing a system configuration of a second embodiment of the content management / operation system according to the present invention.
  • FIG. 7 is a flowchart when a content is used by the content management / operation system according to the second embodiment of the present invention.
  • Fig. 1 shows the process of generating content, where the source data 100 is analog data that can be converted to digital data such as video, photos, sounds, books including moving images and still images, or digital data that has already been converted. Is what it is.
  • the source data 100 is not limited to these as long as it can be converted to digital data.
  • data conversion processing 100 for adding ID information for management to such source data 100 and converting the data into digital data of a predetermined format to generate converted data 200 is performed.
  • a process of incorporating the converted data 200 into a management program 300 for managing usage information of the source data 100 or an execution program 400 for reproducing the source data 100 is performed.
  • Content 500 or content 600 is an execution program 400 for reproducing the source data 100.
  • the data conversion process 100 converts the analog source data 100 into digital data by AZD conversion means 11 and converts the digital source data 100 into digital data of a predetermined format.
  • ID addition means 15 for adding ID information to manage source data 100 in any of the conversion processes Are appropriately combined to generate composite data 200 in which ID information is added to the source data 100.
  • the A / D conversion means 11 converts analog data into digital data.Specifically, a book or the like is read by a scanner and converted into text data. Analog data is converted to digital data by a method such as converting video data recorded in a conventional video talent set such as VHS into MPEG format data. It is needless to say that AZD conversion may be performed by other methods.
  • the D / D converter 12 converts digital data such as character data, image data, and audio (sound) data into digital data of a different format.
  • the conversion is as follows: bitmap format (*. Bmp) ⁇ JPEG format (*. Jpeg), WAVE format (*. Wav) ⁇ MP3 format (*. Mp3).
  • bitmap format (*. Bmp) ⁇ JPEG format (*. Jpeg)
  • WAVE format *. Wav
  • MP3 format *. Mp3
  • the encryption means 13 includes a digital signature, a digital watermark, a protect, and the like. Specific methods include public key cryptography, secret key cryptography, elliptic curve cryptography, DE S, AES, ID EA, R SA, E l There are methods such as Gam a I encryption, F EAL, MISTY, PGP, SSL, S / MIME, PKI, PKCS. It is needless to say that the encryption processing may be performed by another method.
  • the capacity reduction means 14 includes lossless compression, which compresses compressed data such as programs and documents so that they become the same as uncompressed data when decompressed, and to some extent, such as voice and moving / still images. There is a method of reducing the capacity by irreversible compression, which is performed when almost the same data is sufficient even if data is lost. Specifically, run-length (R un-Length) is used as reversible compression.
  • the ID adding means 15 directly or directly converts the data into the source data or performs any of the conversion processes (A / D conversion, DZD conversion, encryption, and reduction of the capacity).
  • ID information such as copyright information such as name, contact information and control number is added (embedded or embedded) by technology such as digital watermarking. Also, management information such as the number of times that copying can be performed may be added.
  • the ID information to be added does not affect the use of the source data and does not disappear even if it is copied many times.
  • ID information is cut out or synthesized by another software (application), etc., it is possible to discriminate against falsification such as leaving traces.
  • the source data is (digital) image data such as a photo
  • it can be printed (distributed) on paper or the like, converted to analog data once, and detected even when converted to digital data again. Is also good.
  • the ID adding means 15 is not limited to a digital watermark as long as the same function can be realized.
  • source data 100 is analog data such as data recorded on paper media such as books, charts and photographs, analog audio sources, and video data recorded using conventional analog signals such as VHS and 8 mm. It is determined whether the data is data or digital data (ST1, 2). If the source data 100 is analog data, the data is first converted into digital data by the A / D conversion processing means 11 (ST 3). For example, data, charts, and photographs recorded on paper media such as books are read by a scanner or the like, and characters are converted to digital data such as text format by OCR, and images are converted to bitmap format or other data. Convert to digital data. Also, in the process of the AZD conversion, ID information for managing the resource data 100 is added by the ID adding means 15, and the AZD-converted digital data is converted into the converted data 200. Good (ST 4).
  • the DZD conversion means 12 converts the digital data converted by the AZD conversion means 11 when the source data 100 is digital data or Conversion to digital data (DZD conversion) (ST5).
  • DZD conversion Conversion to digital data
  • ID information for managing the resource data 100 is added by the ID adding means 15, and the D / D converted digital data is converted into the converted data 2.
  • the digital data or digital source data 100 converted by the D / D conversion means 12 is subjected to encryption processing such as digital signature, digital watermarking, and protection. And during this encryption process,
  • ID information for managing the resource data 100 is added by the 1D adding means 15, and this encrypted digital data is converted into converted data 200 (ST 8,
  • the capacity reducing means 14 when the capacity of the encrypted digital data is reduced by the capacity reducing means 14, the capacity of the encrypted digital data is reduced by compressing or reducing the capacity, and the process of reducing the capacity is performed. Then, ID information for managing the resource data 100 is added by the ID adding means 15 to make the encrypted ⁇ small-capacity digital data into the compound data 200 (ST 9, 11, 11, 1 2).
  • the capacity of the digital data after D / D conversion or the digital source data 100 is reduced by processing such as compression or capacity saving.
  • ID information for managing the resource data 100 is added by the ID adding means 15 and the digital data subjected to the reduced capacity is converted data 200 (ST 13, 1 4, 15).
  • ID information for managing the resource data 100 is added by the ID adding means 15, and the digital data that has been reduced in capacity—encrypted is converted into converted data 200 (ST 14, 1 6, 1 7).
  • ID information for managing the resource data 100 is added by the ID adding means 15, AZD conversion (ST 3), D / D conversion (ST 5), encryption (3 8 or It goes without saying that ID addition may be performed in any of the processing steps of 3 T 16) and reducing the capacity (ST 11 or ST 13).
  • the analog or digital source data converted by such a process becomes the composite data as shown in FIG.
  • source data 100 is analog data
  • source data (analog) ⁇ A / D conversion ⁇ D / D conversion processed converted data 2 1 2a is generated
  • the source data 100 is digital data
  • the source data (digital) is converted into DZD-converted data.
  • the source data 100 is analog data
  • the source data 100 is digital data
  • 13 f or source data (digital) ⁇ D / D conversion ⁇ encrypted converted data 2 13 g or source data (digital) ⁇ DZD conversion ⁇ small capacity processing-encryption processing Computed data 2 13 h is generated.
  • the source data 100 is analog data
  • Source data (analog) ⁇ AZD conversion ⁇ encryption processing ⁇ converted data with reduced capacity 2 1 4 b or source data (analog) ⁇ A / D conversion ⁇ D / D conversion ⁇ converter with reduced capacity Set data 21 4 c or source data (analog) ⁇ A / D conversion ⁇ D / D conversion ⁇ encryption processing ⁇ converted data 2 14 d that has been reduced in size are generated.
  • the source data (digital) ⁇ the converted data 2 14 e with reduced capacity or the source data (digital) ⁇ the encryption processing ⁇ the converted data 2 with reduced capacity 2 14 f or source data (digital) ⁇ DZD conversion-converted data with reduced capacity 2 14 g or source data (digital) ⁇ DZD conversion ⁇ encryption processing ⁇ converted data with reduced capacity Data 2 1 4 h is generated.
  • control program 300 that manages the source data 100 or the execution of reproducing the source data 100 is performed by using the composite data 200 that is the source data 100 converted with the ID information added thereto. Perform processing to incorporate program 400 (into the source code) (see Fig. 1).
  • the management program 300 that manages the source data 100 includes a communication function for communicating with the server, an operating environment inspection function for inspecting the operating environment of the client, Usage information that manages usage information such as the usage period It has a management function and erasing means for erasing the source data 100 developed on the client.
  • an execution program (software) 400 for reproducing the source data 100 is, for example, an image when the source data 100 is a still image such as PEG or a moving image (video) such as MPEG.
  • This is a display / playback program that displays and plays back music, and if it is music data like MP3, it has a function to reproduce the source data 100 on the client, such as an MP3 player. It is a program (software) provided.
  • the source data 100 By embedding (embedding, combining and combining) the source data 100 with ID information added to such a management program 300 or the execution program 400, that is, the composite data 200, the content 500, Alternatively, content 600 is generated.
  • the content 500 or the content 600 can be uploaded and downloaded on a network, or distributed as a recording medium recorded on a disk medium, an IC memory, or the like.
  • the content 500 or the content 600 is to be reproduced, the content 500 or the content 600 is expanded on the client, and the server that manages the source data 100 is accessed. Authentication and permission must be obtained, and content 500 and content 600 cannot be displayed or played independently.
  • the content management 'operation system shown in FIG. 4 includes a server 30 that manages source data 100 and performs a billing process, and a client 40 that uses the content 500.
  • Client 40 is connected via a network.
  • Server 300 adds to source data 100 0 contained in content 500
  • Authenticator 31 for authenticating the provided ID information and giving the client 40 permission to use the source data 100, and the usage time, usage count, usage period, copy, etc. of the source data 100
  • a content management unit 32 that manages usage information of the content management unit 32, and a charging unit 33 that performs a charging process in accordance with the usage information of the content management unit 32.
  • the communication unit (not shown) connects the client via a network. Communication with 40.
  • the client 40 has a virtual area 41 for developing and operating the content 500 and the execution program 400, etc., and also plays back the source data 100 (contents 500) in advance.
  • the program 400 is introduced, and a communication unit (not shown) communicates with the server 30 via a network by a management program 300 included in the content 500.
  • the desired content 500 is downloaded from a network, or the content 500 recorded on a recording medium such as a disk medium or a 1C memory is introduced to the client 40.
  • the form of the client 40 is not limited as long as it is a portable information terminal such as a personal computer or a mobile phone, or a device having the above configuration.
  • the virtual area 41 of the client 40 may, of course, be based on JaVaVM or other than the JavaVM.
  • the client 40 introduces desired content 500 in advance via a network or by another method. Further, the content 500 may be downloaded from the server 30.
  • the content 500 is automatically or manually developed in the virtual area 41.
  • the management program 300'and the conversion data 200 are developed in the virtual area 41, the management program 300' starts and inspects the operating environment of the client 40 (ST 101, 102). If the operating environment is such that the source data 100 can be reproduced, In this case, the source data 100 'with available ID information added from the composite data 200 is expanded, and the management program 300' transmits the ID information added to the source data 100 'to the network.
  • the server 30 is notified via the server 30 and the usage is confirmed (ST 103).
  • the management program 300 checks the operating environment of the client 40. For example, if the operating environment is such that the source data 100' cannot be used due to lack of memory, lack of a device driver, etc., the device Prompt to take prescribed measures such as installing a driver (ST 104).
  • the authentication unit 31 authenticates the ID information. Then, when the ID information is authenticated, the use permission of the source data 100 'is notified to the management program 300 of the client 40 via the network (ST 105, 106). If the ID information is not authenticated, the client 40 is notified of prompting the use registration of the source data 100 '(ST 105, 107).
  • the management program 300 'of the client 40 Upon receiving the use permission from the server 30, the management program 300 'of the client 40 introduces / starts the execution program 400 of the content 500 in the virtual area 41 to reproduce the desired source data 100', and The management of the use information such as the use time of the data 100, the number of times, and the duplication is performed (ST108).
  • the management program 300' deletes the source data 100 '(and the execution program 400') from the virtual area 41 (S ⁇ 09), and The use information of the data 100 'is notified to the server 30 via the network (ST110). Note that the source data 100 ′ (and the execution program 400 ′) may be deleted by a notification from the server 30.
  • the server 30 Upon receiving the usage information from the client 40 via the network, the server 30 checks the usage information of the resource data ⁇ 00 'by the content management unit 32. And record and manage them. Then, the billing processing unit 33 performs a billing process according to the usage information recorded in the content management unit 32, and performs a settlement with the user (ST111).
  • the content management and operation system shown in Fig. 6 is composed of a server 30 that manages source data 100A and performs billing processing, and a client 4 OA that uses content 600. 0 and client 40A are connected via the network.
  • the server 30 authenticates the ID information added to the source data 100 A embedded in the content 600 and gives the client 40 A permission to use the source data 100 A.
  • the client 40 A has a virtual area 41 A for deploying and operating the management program 300 A and the content 60, etc., and the management program 300 A has been introduced in advance.
  • the program 30 communicates with the server 30 via the network by a communication unit (not shown) of the OA.
  • the desired content 600 is downloaded from a network, or the content 600 recorded on a recording medium such as a disk medium or an IC memory is introduced to the client 40A.
  • the form of the client 4OA is not limited as long as it is a portable information terminal such as a personal computer or a mobile phone, or a device having the above configuration.
  • client 4 It is the same as in the first embodiment that the virtual area 41A of 0A may be based on the Java VM or may be something other than the Java VM.
  • the desired content 600 and the management program 300A are previously introduced into the client 4 OA via the network or by another method.
  • the management program 300A may be downloaded from the server 30.
  • the management program 300 is automatically or manually developed in the virtual area 41A (ST 201).
  • the management program 300A 'deployed in the virtual area 41A checks the operating environment for the client 40A to use the source data 100A (ST 202). Then, if the operating environment is capable of reproducing the source 100 A, the content 600 is manually or automatically developed in the virtual area 41 A (ST 203).
  • source data 100A 'with ID information added from the converted data 200A is developed together with the execution program 400' of the source data 100A, and the resource data is generated by the management program 30OA '.
  • the ID information added to 100A ' is notified to server 30 via the network (ST 205).
  • the client 40A is in an operating environment in which the source data 10 OA cannot be used while the memory 40A is out of memory or there is no device driver, take a prescribed action such as installing a device driver.
  • Prompt ST 204).
  • the server 30 Upon receiving the ID information notified from the client 4 OA via the network, the server 30 authenticates the ID information. When the ID information is authenticated, the use permission of the source data 100A 'is notified to the management program 300A' of the client 40A via the network (ST 206, 207). ID information If the information is not authenticated, the client 4 OA is notified of prompting registration of use of the source data 100 A or the like (ST 206, 208).
  • the client 4 OA management program 30 OA ′ upon receiving the license from the server 30, activates the execution program 40 OA ′ to reproduce the source data 100 A ′, and simultaneously reproduces the source data 100 A ′. It manages the usage information such as the number / period of usage time and the duplication (ST 209).
  • the management program 300 A' erases the source data 100 A '(and the execution program 400 ⁇ ') from the virtual area 41 (S ⁇ 21 1). 0) Then, the use information of the source data 100 A ′ is notified to the server 30 via the network (S ⁇ 2 11). The erasing of the source data 10OA '(and the execution program 40OA') may be performed by a notification from the server 30.
  • the content management unit 32 checks and records and manages the usage information of the resource data 100 A ′. Then, the charging processing unit 33 performs a charging process according to the usage information recorded in the content management unit 32, and performs a settlement with the user (ST212).
  • the source data when the source data is used by adding the ID information such as a digital watermark to the source data and using the content incorporated in the management program for managing the source data or the execution program for reproducing the source data. Can be used only by obtaining permission to use the contents (source data) from the server, and the source data itself that has been copied illegally cannot be used (played back). Absent. Even if the data is copied, the server can be used only by accessing the server and obtaining the permission to use it. (And bill), there will be no unauthorized (unauthorized) copying of the source data.
  • the source data is embedded in a playback program (software) that plays back images and music, and the management program is downloaded from the server and can be obtained free of charge when the content is used for the first time, the playback program (software) There is also a merit that it can be easily used even without it.

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

L'invention concerne un système de gestion/d'utilisation de contenu comprenant un client et un serveur pouvant être reliés par l'intermédiaire d'un serveur. Dans ce système, le client notifie au serveur l'utilisation d'un contenu, le serveur ayant reçu la notification autorise le client à utiliser le contenu et le client peut utiliser le contenu ; les données de source sont converties selon un procédé prédéterminé et le contenu est géré/utilisé au moyen d'un programme de gestion destiné à la gestion de données de source converties et/ou d'un programme de reproduction incorporé destiné à la reproduction des données de source converties.
PCT/JP2001/000859 2001-02-07 2001-02-07 Contenu et systeme de gestion/d'utilisation de contenu WO2002063482A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
JP2002563357A JPWO2002063482A1 (ja) 2001-02-07 2001-02-07 コンテンツ及びコンテンツ管理・運用システム
PCT/JP2001/000859 WO2002063482A1 (fr) 2001-02-07 2001-02-07 Contenu et systeme de gestion/d'utilisation de contenu

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2001/000859 WO2002063482A1 (fr) 2001-02-07 2001-02-07 Contenu et systeme de gestion/d'utilisation de contenu

Publications (1)

Publication Number Publication Date
WO2002063482A1 true WO2002063482A1 (fr) 2002-08-15

Family

ID=11737000

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2001/000859 WO2002063482A1 (fr) 2001-02-07 2001-02-07 Contenu et systeme de gestion/d'utilisation de contenu

Country Status (2)

Country Link
JP (1) JPWO2002063482A1 (fr)
WO (1) WO2002063482A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008117191A (ja) * 2006-11-06 2008-05-22 Fujitsu Fip Corp ライセンス管理システム、ライセンス管理方法、ライセンス管理プログラム並びにラッピングファイル作成方法
JP2012004937A (ja) * 2010-06-18 2012-01-05 Takeshi Fujita コンテンツ利用装置及びプログラム

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH07234785A (ja) * 1994-02-24 1995-09-05 Canon Inc ソフトウエアの貸出し期限管理を行うコンピュータとソフトウエアの貸出し期限管理方法
JPH11259574A (ja) * 1998-03-13 1999-09-24 Nippon Telegr & Teleph Corp <Ntt> ライセンス管理方法及びシステム及びユーザ端末装置及びライセンス管理プログラムを格納した記憶媒体
JPH11282664A (ja) * 1998-03-27 1999-10-15 Hitachi Software Eng Co Ltd 非互換プログラム修正システム
JP2000076339A (ja) * 1998-09-01 2000-03-14 Toppan Printing Co Ltd コンテンツ運用方法
EP0999488A2 (fr) * 1998-10-23 2000-05-10 Xerox Corporation Documents auto-protégés
JP2000172648A (ja) * 1998-12-10 2000-06-23 Nippon Telegr & Teleph Corp <Ntt> ディジタル情報保護装置及びディジタル情報保護方法並びにディジタル情報保護プログラムを記録した記憶媒体
JP2000242699A (ja) * 1999-02-19 2000-09-08 Sharp Corp 利用期限指定型コンテンツレンタル方法及び該コンテンツレンタル方法で用いるコンテンツ提供装置、コンテンツ利用装置
JP2000285010A (ja) * 1999-03-30 2000-10-13 Japan Research Institute Ltd アプリケーションの動作用メモリ量をチェックするプログラムを記録した媒体

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH07234785A (ja) * 1994-02-24 1995-09-05 Canon Inc ソフトウエアの貸出し期限管理を行うコンピュータとソフトウエアの貸出し期限管理方法
JPH11259574A (ja) * 1998-03-13 1999-09-24 Nippon Telegr & Teleph Corp <Ntt> ライセンス管理方法及びシステム及びユーザ端末装置及びライセンス管理プログラムを格納した記憶媒体
JPH11282664A (ja) * 1998-03-27 1999-10-15 Hitachi Software Eng Co Ltd 非互換プログラム修正システム
JP2000076339A (ja) * 1998-09-01 2000-03-14 Toppan Printing Co Ltd コンテンツ運用方法
EP0999488A2 (fr) * 1998-10-23 2000-05-10 Xerox Corporation Documents auto-protégés
JP2000172648A (ja) * 1998-12-10 2000-06-23 Nippon Telegr & Teleph Corp <Ntt> ディジタル情報保護装置及びディジタル情報保護方法並びにディジタル情報保護プログラムを記録した記憶媒体
JP2000242699A (ja) * 1999-02-19 2000-09-08 Sharp Corp 利用期限指定型コンテンツレンタル方法及び該コンテンツレンタル方法で用いるコンテンツ提供装置、コンテンツ利用装置
JP2000285010A (ja) * 1999-03-30 2000-10-13 Japan Research Institute Ltd アプリケーションの動作用メモリ量をチェックするプログラムを記録した媒体

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"Contents ryutsu ni okeru jirutsu kanri wo mokuteki to shita capsule-ka contents: Matryoshka", RESEARCH REPORT OF INFORMATION PROCESSING SOCIETY OF JAPAN (IPSJ) (2000-DPS-97), vol. 2000, no. 30, 22 March 2000 (2000-03-22), pages 99 - 104, XP002937335 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008117191A (ja) * 2006-11-06 2008-05-22 Fujitsu Fip Corp ライセンス管理システム、ライセンス管理方法、ライセンス管理プログラム並びにラッピングファイル作成方法
JP2012004937A (ja) * 2010-06-18 2012-01-05 Takeshi Fujita コンテンツ利用装置及びプログラム

Also Published As

Publication number Publication date
JPWO2002063482A1 (ja) 2004-09-24

Similar Documents

Publication Publication Date Title
US6834346B1 (en) Content processing system
US8544108B2 (en) Copyright protection storage medium, information recording apparatus and information recording method, and information playback apparatus and information playback method
JP4250089B2 (ja) コンテンツ再生装置およびコンテンツ再生制御方法
US20110038594A1 (en) Handheld recorder incorporating true raw audio or video certification
KR100807006B1 (ko) 범용 컴퓨터 및 이것에 사용하기 위한 저작권 관리 방법
US20030204736A1 (en) Apparatus for authenticated recording and method therefor
JP3468183B2 (ja) 音声再生記録装置および方法
KR20090058146A (ko) 위변조 방지를 위한 디지털 녹음장치
JP2002094924A (ja) 画像データ記録装置および方法ならびに画像データ再生装置および方法
US20020141737A1 (en) Audio data recording medium and related apparatuses
WO2003067590A1 (fr) Dispositif d&#39;enregistrement de donnees et procede d&#39;enregistrement
JP2004222129A (ja) 電子透かし多重化装置および電子透かし検出装置
JP2003044361A (ja) データ保存再生システム、データ保存装置、データ再生装置、データ保存再生方法、プログラム、および媒体
JP2004046452A (ja) 情報記録装置及び情報再生装置並びにそのプログラム
WO2002063482A1 (fr) Contenu et systeme de gestion/d&#39;utilisation de contenu
JP2007019688A (ja) コンテンツ転送方法及びコンテンツ転送システム
CN100458812C (zh) 数据处理电路和方法、再现装置和方法及存储介质
US20050289634A1 (en) Image service system
JPWO2016151880A1 (ja) 情報記録装置および情報記録装置の改竄防止方法
JP2008099098A (ja) デジタル撮影機器
WO2001043422A1 (fr) Procede de traitement d&#39;information et support enregistre
JP6623828B2 (ja) 通信処理装置、通信処理方法およびプログラム
JP2006295403A (ja) コンテンツ提供システム,コンテンツ提供サーバ,携帯電話,携帯電話管理サーバおよびコンテンツ提供方法
JP2001175170A (ja) ストリーム再生方法及びストリーム再生装置
KR20080057015A (ko) 휴대단말의 디지털콘텐츠파일 재생 방법, 장치 및 기록매체

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2002563357

Country of ref document: JP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase