US20040003281A1 - Information processing apparatus, program and method for transmitting content in security scheme according to license policy - Google Patents

Information processing apparatus, program and method for transmitting content in security scheme according to license policy Download PDF

Info

Publication number
US20040003281A1
US20040003281A1 US10/282,160 US28216002A US2004003281A1 US 20040003281 A1 US20040003281 A1 US 20040003281A1 US 28216002 A US28216002 A US 28216002A US 2004003281 A1 US2004003281 A1 US 2004003281A1
Authority
US
United States
Prior art keywords
content
item
security scheme
information processing
processing apparatus
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/282,160
Inventor
Toshihiro Sonoda
Eiji Hasegawa
Kouichi Yasaki
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujitsu Ltd
Original Assignee
Fujitsu Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujitsu Ltd filed Critical Fujitsu Ltd
Assigned to FUJITSU LIMITED reassignment FUJITSU LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MASEGAWA, EUJI, SONODA, TOSHIHIRO, YASAKI, KOUICHI
Assigned to FUJITSU LIMITED reassignment FUJITSU LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MASEGAWA, EIJI, SONODA, TOSHIHIRO, YASAKI, KOUICHI
Assigned to FUJITSU LIMITED reassignment FUJITSU LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HASEGAWA, EIJI, SONODA, TOSHIHIRO, YASAKI, KOUICHI
Publication of US20040003281A1 publication Critical patent/US20040003281A1/en
Priority to US11/826,973 priority Critical patent/US7873990B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]

Definitions

  • the present invention relates to secure transmission of content, and more particularly to secure delivery of content to a user apparatus in accordance with the license policy of a content provider.
  • Pay digital content such as audio and video files for example, is transmitted from a server to a client over a network, such as the Internet.
  • a client user is first authenticated to the server and the content is then transmitted in accordance with a protocol, such as FTP, HTTP and SSL.
  • content encrypted in a particular encryption method can not necessarily be decrypted by any client or electronic apparatus.
  • the content provider does not always desire to protect all kinds of items of content in the same security scheme. For example, the provider may want to transmit content of higher value in a higher security scheme, and to transmit content of lower value, or content such as advertisement content which is required to be distributed widely, in a lower security scheme without encryption.
  • Miyazaki discloses a content application server.
  • the server receives apparatus specification environment information and a request for a content application from a client, the server converts a corresponding source content application to a content application which conforms to the apparatus specification environment information, and supplies the converted content application to the client.
  • Kawamoto et al. discloses a method of communication between terminals over a network.
  • one terminal distinguishes a communication application which can be used by another terminal, and transmits information to the other terminal by using that application.
  • Yamanaka et al. disclose a system for delivering digital content over a network.
  • a buyer transmits information describing desired content and a transfer condition to a seller.
  • the seller delivers the described content to the buyer in accordance with the transfer condition.
  • Asai et al. discloses a portable terminal which acquires content from a server via a gateway.
  • the content includes a file and an identifier indicating the type of a file, such as video, audio and the like.
  • the terminal transmits the content file to a peripheral device corresponding to an identifier.
  • the inventors have recognized the need for selection of a security scheme for the transmission of content in accordance with a license policy of a content provider.
  • the inventors have also recognized the need for the transmission or delivery of content from a server to a client in a security scheme available on the client.
  • An object of the present invention is to provide secure transmission of content to a buyer in accordance with a license policy of a content provider.
  • Another object of the present invention is to transmit content in an available secure transmission scheme to a user.
  • an information processing apparatus is connectable to a user device over a network.
  • the apparatus includes a processor.
  • the processor transmits, in response to reception of a request for a particular item of content, an identification of a security scheme which is applicable to transmission of the particular item of content in accordance with a license policy.
  • the processor transmits the item of content in the security scheme.
  • an information processing apparatus is connectable to a user device over a network.
  • the apparatus includes a processor.
  • the processor is adapted to receive a request for a particular item of content from the user device.
  • the processor is adapted to receive an identification of an available security scheme from the user device.
  • the processor transmits the requested item of content in the security scheme.
  • an information processing apparatus is connectable to a user device over a network.
  • the apparatus includes a processor.
  • the processor is adapted to receive an identification of an available security scheme from the user device.
  • the processor transmits, in response to reception of a request for a content list, a list of items of content that can be transmitted in the available security scheme in accordance with a license policy.
  • an information processing apparatus is connectable to a content source over a network.
  • the apparatus includes a processor.
  • the processor transmits a request for a particular item of content.
  • the processor transmits an identification of a security scheme available for reception and reproduction of the particular item of content.
  • the processor receives the particular item of content transmitted in the security scheme in accordance with a license policy.
  • an information processing apparatus is connectable to a content source over a network.
  • the apparatus includes a processor.
  • the processor transmits a request for a particular item of content.
  • the processor receives an identification of a security scheme which is applicable to transmission of the particular item of content in accordance with a license policy. When the security scheme is available, the processor transmits the identification of the security scheme.
  • an information processing apparatus is connectable to a content source over a network.
  • the apparatus includes a processor.
  • the processor transmits an identification of a security scheme available for reception and reproduction of content.
  • the processor transmits a request for a content list.
  • the processor receives a list of items of content which can be transmitted in the security scheme in accordance with a license policy.
  • a program (which may be stored on a storage medium) is for use in an information processing apparatus connectable to a user device over a network.
  • the program is operable to effect the step of transmitting, in response to reception of a request for a particular item of content, an identification of a security scheme which is applicable to transmission of the particular item of content in accordance with a license policy; and the step of transmitting the item of content in the security scheme, when the item of content can be received by the user device in the security scheme.
  • a program (which may be stored on a storage medium) is for use in an information processing apparatus connectable to a user device over a network.
  • the program is operable to effect the step of receiving a request for a particular item of content; the step of receiving an identification of an available security scheme; and the step of transmitting the requested item of content in the security scheme, when the requested item of content can be transmitted in the security scheme in accordance with a license policy.
  • a method for transmitting an item of content in an information processing apparatus connectable to a user device over a network.
  • the method comprises the step of transmitting, in response to reception of a request for a particular item of content, an identification of a security scheme which is applicable to transmission of the particular item of content in accordance with a license policy; and the step of transmitting the particular item of content in the security scheme, when the particular item of content can be received by the user device in the security scheme.
  • a method for transmitting an item of content in an information processing apparatus connectable to a user device over a network.
  • the method comprises the step of receiving, from the user device, a request for a particular item of content; and the step of transmitting the requested particular item of content in the security scheme, when the requested particular item of content can be transmitted in the security scheme in accordance with a license policy.
  • content can be transmitted in a secure transmission scheme available to a user.
  • FIG. 1 shows the configuration of a content server and a residential gateway server interconnected via a network, in accordance with an embodiment of the present invention.
  • FIG. 2 shows the configuration of the content server and another residential gateway server interconnected via the network, in accordance with another embodiment of the invention.
  • FIG. 3 shows a process for transmitting and receiving the content performed by the content server and the gateway server, in accordance with the invention.
  • FIG. 4 shows another process for transmitting and receiving the content performed by the content server and the gateway server, in accordance with the invention.
  • FIG. 5 shows a further process for transmitting and receiving the content performed by the content server and the gateway server, in accordance with the invention.
  • FIG. 6 shows an example of a set of security schemes applicable to a certain item of content and determined in accordance with the license policy.
  • FIG. 1 shows the configuration of a content server 10 and a residential gateway server 20 interconnected via a network 5 such as the Internet, in accordance with an embodiment of the present invention.
  • the gateway server 20 is also connected to user devices, such as a television receiver (TV) 320 and an audio apparatus 330 .
  • TV television receiver
  • audio apparatus 330 an audio apparatus
  • the content server 10 includes a processor 102 having a CPU, a ROM and a RAM, a program memory or storage device 104 , a memory or storage device 120 , such as a hard disk unit, for storing a content database, user information and the like, and a network interface (NW I/F) 130 connected to the network 5 such as the Internet, all of which are interconnected via an internal bus.
  • a processor 102 having a CPU, a ROM and a RAM, a program memory or storage device 104 , a memory or storage device 120 , such as a hard disk unit, for storing a content database, user information and the like, and a network interface (NW I/F) 130 connected to the network 5 such as the Internet, all of which are interconnected via an internal bus.
  • NW I/F network interface
  • the storage device 104 stores application programs for the content server 10 .
  • the processor 102 operates in accordance with the application programs.
  • such applications may be implemented in the form of hardware, such as an integrated circuit, in the processor 102 .
  • the term “content” herein should be broadly interpreted to include digital content in its narrow sense, such as a motion picture program, a music program, a picture and a dictionary in the form of audio and/or video files or a document file, as well as other copyrighted digital products or software in its broader sense, which is suitable for delivery on the Web, such as an application file.
  • the content may be of the kind which is updated periodically, such as audio and video files of different news, advertisements and weather forecasts, for example.
  • Each item of such content is associated with at least one applicable security scheme for distribution in accordance with the license policy of an administrator of the content server 10 , for example in accordance with the type and value of the content, the intended user class, the term of validity of the content, and the like.
  • FIG. 6 shows an example of a set of security schemes, which are applicable to a certain item of content, and which are determined in accordance with the license policy.
  • Ones of these security schemes may be assigned different priorities, and ones of them may be assigned the same priority.
  • the first security scheme uses the DES as an encryption method, the digital signature as an authentication method, and the MD-5 as a hash method.
  • the second security scheme uses the AES as an encryption method, but uses neither authentication nor a hash method.
  • the third security scheme uses the triple DES as an encryption method, but uses neither an authentication method nor a hash method.
  • the security scheme may include provisions to restrict the network used for the transmission of an item of content to a network of high security.
  • An advertisement video file for example, may be transmitted in a lowest security scheme which uses neither an encryption method, an authentication method nor a hash method.
  • the residential gateway server 20 includes a processor 202 having a CPU, a ROM and a RAM, a content reproducing module 204 , a security module 206 , a memory or storage device 220 , such as a hard disk unit, for storing application programs, a received file and the like, an input device 240 including a keyboard and a mouse, a display device 250 , an audio device 260 including a microphone and a speaker, an external network interface (NW I/F) 230 , and a device interface (I/F) 270 , all of which are interconnected via an internal bus.
  • the device interface 270 is connected to user devices, such as a television receiver (TV) 320 and an audio apparatus 330 , via an IEEE 1394 bus or a USB cable.
  • the memory device 220 stores application programs for the residential gateway server 20 .
  • the processor 202 operates in accordance with the application programs.
  • such applications may be implemented in the form of hardware, such as an integrated circuit, in the processor 202 .
  • the reproducing module 204 is used for decoding and reproducing an audio and/or video stream.
  • the reproducing module 204 may perform decryption in accordance with a predetermined encryption method.
  • the security module 206 processes the received content in accordance with a predetermined authentication method, a predetermined hash method, and/or a predetermined encryption method.
  • the reproducing module 204 and the security module 206 are implemented in the form of hardware or software. When they are implemented in software programs, the processor 202 operates in accordance with the programs.
  • FIG. 2 shows the configuration of the content server 10 and another residential gateway server 30 interconnected via the network 5 such as the Internet, in accordance with another embodiment of the invention.
  • the gateway server 30 is also connected to user devices, such as a personal computer (PC) 310 , the television receiver (TV) 320 , and the audio apparatus 330 . Further, the gateway server 30 communicates with a mobile telephone 360 and/or a PDA (Personal Digital Assistant) 370 over a network 7 , such as a public switched telephone network (PSTN) or a mobile telephone network.
  • the content server 10 has the same configuration as the one shown in FIG. 1, and hence is not described again.
  • the residential gateway server 30 includes a processor 302 having a CPU, a ROM and a RAM, the security module 206 , the memory device 220 such as a hard disk unit, the external network interface (NW I/F) 230 , a network interface (NW I/F) 332 connected to the network 7 , and the device interface 270 , all of which are interconnected via an internal bus.
  • a processor 302 having a CPU, a ROM and a RAM
  • the security module 206 such as a hard disk unit
  • the memory device 220 such as a hard disk unit
  • the external network interface (NW I/F) 230 such as a hard disk unit
  • NW I/F network interface
  • NW I/F network interface
  • the memory device 220 stores application programs for the residential gateway server 30 .
  • the processor 302 operates in accordance with the application programs.
  • such applications may be implemented in the form of hardware, such as an integrated circuit, in the processor 302 .
  • the device interface 270 is connected to user devices, such as the personal computer (PC) 310 , the television receiver (TV) 320 , and the audio apparatus 330 , via an IEEE 1394 bus or a USB cable.
  • user devices such as the personal computer (PC) 310 , the television receiver (TV) 320 , and the audio apparatus 330 , via an IEEE 1394 bus or a USB cable.
  • Each of the user devices including the mobile telephone 360 and the PDA 370 as well as the devices 310 , 320 and 330 , includes a reproducing module similar to the reproducing module 204 shown in FIG. 1, and each device may further have a security module similar to the security module 206 .
  • the gateway server 30 collects beforehand the information on the content types, coding methods and security schemes (for example, identifications of encryption schemes) available in the user device, such as the devices 310 , 320 and 330 , the mobile telephone 360 and the PDA 370 , and stores the information in the memory device 220 together with the security schemes (for example, identifications of authentication schemes) available in the gateway server 30 .
  • security schemes for example, identifications of authentication schemes
  • FIG. 3 shows a process for transmitting and receiving the content performed by the content server 10 and the gateway server 20 or 30 , in accordance with the invention.
  • the user operates the input device 240 while viewing the display device 250 of the gateway server 20 , to operatively connect the gateway server 20 to the content server 10 over the network 5 and request a desired item of content.
  • the content request may involve purchasing an item of pay content.
  • the gateway server 20 (more specifically, the processor 202 ) requests the content server 10 to transmit the requested item of content.
  • the content server 10 receives the request for transmission of the item of content.
  • the content server 10 looks up a table of content security schemes in the content database 120 , retrieves the identifications (IDs) of the security schemes which are applicable to the transmission of the item of content in accordance with the license policy of the content, and transmits a list of the identifications of the applicable security schemes to the gateway server 20 .
  • the applicable security schemes may be the ones as shown in FIG. 6, for example.
  • the gateway server 20 receives the presented list of the identifications of the applicable security schemes.
  • the gateway server 20 looks up a table of identifications of the security schemes stored in the memory device 220 and available in the gateway server 20 and compares the presented security schemes with the available security schemes to determine whether the item of content to be transmitted in any ones of the presented security schemes can be received, decoded and reproduced.
  • the security schemes available in the gateway server 20 mean the ones which are available in the reproducing module 204 and the security module 206 of the gateway server 20 , and may include the security schemes which can be available in the user devices 320 and 330 connected to the gateway server 20 or other user devices (not shown) not connected to the gateway server 20 .
  • the gateway server 20 at Step 309 selects or designates a security scheme of the highest priority from among the applicable security schemes that match with the available security schemes, and transmits an identification of the selected security scheme to the server 10 .
  • the content server 10 receives the identification of the selected security scheme.
  • the content server 10 retrieves the requested item of content from the database 120 , processes the item of content in accordance with the selected security scheme, and transmits the thus processed item of content to the gateway server 20 in accordance with the selected security scheme.
  • Such an item of content may be processed beforehand in accordance with parts of the applicable security schemes and stored in the database 120 .
  • the gateway server 20 receives the item of content, stores it in the memory device 220 , and produces a display on the display device 250 indicating that the item of content has been received. The item of content thus becomes ready for use by the user.
  • the gateway server 20 at Step 313 sends a request for canceling the content transmission request to the server 10 , and produces a display on the display device 250 indicating that the requested item of content is not available.
  • the server 10 receives the request for canceling the content transmission request, and the procedure exits the routine for content transmission of FIG. 3.
  • FIG. 4 shows another process for transmitting and receiving the content performed by the content server 10 and the gateway server 20 or 30 , in accordance with the invention.
  • Step 401 the user operates the input device 240 , while viewing the display device 250 of the gateway server 20 , to operatively connect the gateway server 20 to the content server 10 over the network 5 and request a desired item of content.
  • the gateway server 20 (more specifically, the processor 202 ) requests the content server 10 to transmit the requested item of content, looks up the table of the identifications of the security schemes stored in the memory device 220 and available in the gateway server 20 , and transmits the identifications of the available security schemes.
  • the content server 10 (more specifically, the processor 102 ) receives the request for transmission of the item of content together with the identifications of the available security schemes.
  • the content server 10 compares the security schemes available in the gateway server 20 with the security schemes stored in a memory device 120 of the content server 10 and applicable to the requested item of content, and determines whether the requested item of content can be transmitted in any ones of the available security schemes.
  • the content server 10 at Step 427 selects a security scheme of the highest priority from among the applicable security schemes that match the available security schemes, retrieves the requested item of content from the database 120 , processes the item of content in accordance with the selected security scheme, and transmits the thus processed item of content to the gateway server 20 in accordance with the selected security scheme.
  • a security scheme of the highest priority from among the applicable security schemes that match the available security schemes
  • retrieves the requested item of content from the database 120 processes the item of content in accordance with the selected security scheme, and transmits the thus processed item of content to the gateway server 20 in accordance with the selected security scheme.
  • Such an item of content may be processed beforehand in accordance with parts of the applicable security schemes and stored in the database 120 .
  • the gateway server 20 receives the item of content at Step 407 .
  • the gateway server 20 at Step 429 sends a notification of rejecting content transmission to the gateway server 20 .
  • the server 10 receives the notification of rejecting content transmission, and produces a display on the display device 250 indicating that the requested item of content is not available.
  • FIG. 5 shows a further process for transmitting and receiving the content performed by the content server 10 and the gateway server 20 or 30 , in accordance with the invention.
  • Step 501 the user operates the input device 240 , while viewing the display device 250 of the gateway server 20 , to operatively connect the gateway server 20 to the content server 10 over the network 5 and request a list of available items of content from the gateway server 20 .
  • the gateway server 20 determines whether the identifications of the security schemes available in the gateway server 20 for the type of content have already been reported to the content server 10 .
  • the gateway server 20 may send, to the content server 10 , a query as to whether the identifications of the available security schemes have already been reported. If it is determined that they have already been reported, then the gateway server 20 at Step 505 requests transmission of a list of available items of content.
  • the gateway server 20 at Step 503 retrieves the identifications of the available security schemes stored in the memory device 220 , transmits the identifications to the content server 10 and, at Step 505 , requests transmission of a list of available items of content.
  • the content server 10 (more specifically, the processor 102 ) receives the identifications of the available security schemes, and stores them as user information in the memory device 120 .
  • the content server 10 receives the request for transmission of a content list, and, at Step 527 , retrieves the identifications of the security schemes available in the gateway server 20 from the memory device 120 .
  • the content server 10 compares the security schemes available in the gateway server 20 with the security schemes and applicable to items of content which can be provided by the content server 10 , produces a list of available items of content which can be transmitted in the available security schemes, and transmits the list to the gateway server 20 .
  • the list may include attributes of each item of content, such as a type of content (for example, identification of the type, such as an audio and/or video file, a text file, and the like), a title or identification of an item of content, license policy, a price, and the term of validity.
  • the gateway server 20 displays the content list on the display device 250 .
  • the user operates the input device 240 , while viewing the display device 250 of the gateway server 20 , selects one or more items of content and requests the selected one or more items of content.
  • the gateway server 20 requests the content server 10 to transmit the selected one or more items of content.
  • the content server 10 receives the request for content transmission, selects a security scheme of the highest priority from among the applicable security schemes that match the available security schemes for each item of content, retrieves the requested each item of content from the database 120 , processes each item of content in accordance with the selected security scheme, and transmits the thus processed one or more items of content to the gateway server 20 in accordance with the respective selected security schemes.
  • Such items of content may be processed beforehand in accordance with parts of the applicable security schemes and stored in the database 120 .
  • the gateway server 20 receives the one or more items of content and stores them in the memory device 220 . The items of content thus become ready for use by the user.
  • the user operates the keys on the mobile telephone 360 or the PDA 370 while viewing the display thereof, to connect the mobile telephone 360 or the PDA 370 to the gateway server 30 over the network 7 , and requests a desired item of content from the gateway server 30 .
  • the mobile telephone 360 or the PDA 370 may also transmit, to the gateway server 30 , the identifications of the security schemes available in the mobile telephone 360 or the PDA 370 .
  • the gateway server 30 then stores the identifications of the available security schemes in the memory device 220 .
  • the content request may involve purchasing an item of pay content.
  • the gateway server 30 looks up a table of the identifications of the security schemes stored in the memory device 220 and available for a combination of the gateway server 30 and the user devices 310 , 320 , 330 , 360 and 370 , compares the available security schemes with the security schemes presented by the content server 10 , and determines whether the item of content to be transmitted in any ones of the presented security schemes can be received, decoded and reproduced.
  • the gateway server 30 receives the item of content transmitted in the selected security scheme, stores the received item of content in the memory device 220 , and sends a notification of the reception of the item of content to the mobile telephone 360 or the PDA 370 for display.
  • the gateway server 30 transmits a request for canceling the content transmission request to the server 10 and, at the same time, sends the notification of the cancellation to the mobile telephone 360 or the PDA 370 for display.
  • the user operates the keys on the mobile telephone 360 or the PDA 370 while viewing the display thereof, to connect the mobile telephone 360 or the PDA 370 to the gateway server 30 over the network 7 , and requests a desired item of content from the gateway server 30 .
  • the mobile telephone 360 or the PDA 370 may also transmit, to the gateway server 30 , the identifications of the security schemes available in the mobile telephone 360 or the PDA 370 .
  • the gateway server 30 then stores the identifications of the available security schemes in the memory device 220 .
  • the gateway server 30 in response to the content request received from the user, the gateway server 30 (more specifically, the processor 302 ) requests the content server 10 to transmit the item of content and, at the same time, looks up a table of the identifications of the security schemes stored in the memory device 220 and available for a combination of the gateway server 30 and the user devices 310 , 320 , 330 , 360 and 370 , and transmits the identifications of the available security schemes to the content server 10 .
  • the gateway server 30 receives the item of content, stores the received item of content in the memory device 220 , and sends a notification of the reception of the item of content to the mobile telephone 360 or the PDA 370 for display.
  • the gateway server 30 receives, from the server 10 , a notification of rejecting the content transmission request, and passes the notification to the mobile telephone 360 or the PDA 370 for display.
  • the user operates the keys on the mobile telephone 360 or the PDA 370 while viewing the display thereof, connects the mobile telephone 360 or the PDA 370 to the gateway server 30 over the network 7 , and requests a list of items of content from the gateway server 30 .
  • the mobile telephone 360 or the PDA 370 may also transmit, to the gateway server 30 , the identifications of the security schemes available in the mobile telephone 360 or the PDA 370 .
  • the gateway server 30 then stores the identifications of the available security schemes in the memory device 220 .
  • the gateway server 30 determines whether the identifications of the security schemes stored in the memory device 220 and available for a combination of the gateway server 30 and the user devices 310 , 320 , 330 , 360 and 370 have already been reported to the content server 10 .
  • the gateway server 30 may send a query as to whether the identifications of the available security schemes have already been reported to the content server 10 . If it is determined that they have already been reported, then the gateway server 30 at Step 505 requests the content server 10 to transmit a list of available items of content. On the other hand, if it is determined that they have not been reported yet, then at Step 503 the gateway server 30 transmits the identifications of the available security schemes to the content server 10 and, at Step 505 , requests the transmission of a list of available items of content.
  • the gateway server 30 transmits the content list to the mobile telephone 360 or the PDA 370 for display on its display device.
  • the user operates the keys on the mobile telephone 360 or the PDA 370 while viewing the list of available items of content, selects one or more items of content, and requests the selected one or more items of content from the gateway server 30 .
  • the gateway server 30 requests the content server 10 to transmit the selected one or more items of content.
  • the gateway server 30 receives the items of content, stores the received items of content in the memory device 220 , and sends a notification of the reception of the items of content to the mobile telephone 360 or the PDA 370 for display.

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

An information processing apparatus is connectable to a user device over a network. The apparatus includes a processor. The processor transmits, in response to reception of a request for a particular item of content, an identification of a security scheme which is applicable to transmission of the particular item of content in accordance with a license policy. When the item of content can be received by the user device in the security scheme, the processor transmits the item of content in the security scheme.

Description

    FIELD OF THE INVENTION
  • The present invention relates to secure transmission of content, and more particularly to secure delivery of content to a user apparatus in accordance with the license policy of a content provider. [0001]
  • BACKGROUND OF THE INVENTION
  • Pay digital content, such as audio and video files for example, is transmitted from a server to a client over a network, such as the Internet. In such a case, a client user is first authenticated to the server and the content is then transmitted in accordance with a protocol, such as FTP, HTTP and SSL. [0002]
  • Transmission of content, however, involves such security problems as unauthorized interception, tampering, masquerading, denial of a concluded transaction, redistribution and the like. To prevent such problems, it is proposed that a digital watermark be embedded in the content to restrict its ownership, or that the content be encrypted so that it cannot be replayed without a proper decryption key which can be obtained for value. [0003]
  • However, content encrypted in a particular encryption method can not necessarily be decrypted by any client or electronic apparatus. In addition, the content provider does not always desire to protect all kinds of items of content in the same security scheme. For example, the provider may want to transmit content of higher value in a higher security scheme, and to transmit content of lower value, or content such as advertisement content which is required to be distributed widely, in a lower security scheme without encryption. [0004]
  • In Japanese Unexamined Patent Publication 2001-325177 (A) published on Nov. 22, 2001, Miyazaki discloses a content application server. When the server receives apparatus specification environment information and a request for a content application from a client, the server converts a corresponding source content application to a content application which conforms to the apparatus specification environment information, and supplies the converted content application to the client. [0005]
  • In Japanese Unexamined Patent Publication 2001-202307 (A) published on Jul. 27, 2001, Kawamoto et al. discloses a method of communication between terminals over a network. In this method, one terminal distinguishes a communication application which can be used by another terminal, and transmits information to the other terminal by using that application. [0006]
  • In Japanese Unexamined Patent Publication 2001-175757 (A) published on Jun. 29, 2001, Yamanaka et al. disclose a system for delivering digital content over a network. In this system, a buyer transmits information describing desired content and a transfer condition to a seller. The seller delivers the described content to the buyer in accordance with the transfer condition. [0007]
  • In Japanese Unexamined Patent Publication HEI 11-341040 (A) published on Dec. 10, 1999, Saito et al. disclose a communication apparatus connected between two networks. The communications apparatus collects attribute information from a server on the first network, presents the server's attribute information to a terminal on the second network in accordance with the protocol of the second network, transmits to the server a request for the service selected in accordance with the attribute information, and provides the service from the server to the terminal, if necessary, by converting a format. [0008]
  • In Japanese Unexamined Patent Publication 2001-256162 (A) published on Sep. 21, 2001, Asai et al. discloses a portable terminal which acquires content from a server via a gateway. The content includes a file and an identifier indicating the type of a file, such as video, audio and the like. The terminal transmits the content file to a peripheral device corresponding to an identifier. [0009]
  • The inventors have recognized the need for selection of a security scheme for the transmission of content in accordance with a license policy of a content provider. The inventors have also recognized the need for the transmission or delivery of content from a server to a client in a security scheme available on the client. [0010]
  • An object of the present invention is to provide secure transmission of content to a buyer in accordance with a license policy of a content provider. [0011]
  • Another object of the present invention is to transmit content in an available secure transmission scheme to a user. [0012]
  • SUMMARY OF THE INVENTION
  • In accordance with an aspect of the present invention, an information processing apparatus is connectable to a user device over a network. The apparatus includes a processor. The processor transmits, in response to reception of a request for a particular item of content, an identification of a security scheme which is applicable to transmission of the particular item of content in accordance with a license policy. When the item of content can be received by the user device in the security scheme, the processor transmits the item of content in the security scheme. [0013]
  • In accordance with a further aspect of the invention, an information processing apparatus is connectable to a user device over a network. The apparatus includes a processor. The processor is adapted to receive a request for a particular item of content from the user device. The processor is adapted to receive an identification of an available security scheme from the user device. When the requested item of content can be transmitted in the security scheme in accordance with a license policy, the processor transmits the requested item of content in the security scheme. [0014]
  • In accordance with a still further aspect of the invention, an information processing apparatus is connectable to a user device over a network. The apparatus includes a processor. The processor is adapted to receive an identification of an available security scheme from the user device. The processor transmits, in response to reception of a request for a content list, a list of items of content that can be transmitted in the available security scheme in accordance with a license policy. [0015]
  • In accordance with a still further aspect of the invention, an information processing apparatus is connectable to a content source over a network. The apparatus includes a processor. The processor transmits a request for a particular item of content. The processor transmits an identification of a security scheme available for reception and reproduction of the particular item of content. The processor receives the particular item of content transmitted in the security scheme in accordance with a license policy. [0016]
  • In accordance with a still further aspect of the invention, an information processing apparatus is connectable to a content source over a network. The apparatus includes a processor. The processor transmits a request for a particular item of content. The processor receives an identification of a security scheme which is applicable to transmission of the particular item of content in accordance with a license policy. When the security scheme is available, the processor transmits the identification of the security scheme. [0017]
  • In accordance with a still further aspect of the invention, an information processing apparatus is connectable to a content source over a network. The apparatus includes a processor. The processor transmits an identification of a security scheme available for reception and reproduction of content. The processor transmits a request for a content list. The processor receives a list of items of content which can be transmitted in the security scheme in accordance with a license policy. [0018]
  • In accordance with a still further aspect of the invention, a program (which may be stored on a storage medium) is for use in an information processing apparatus connectable to a user device over a network. The program is operable to effect the step of transmitting, in response to reception of a request for a particular item of content, an identification of a security scheme which is applicable to transmission of the particular item of content in accordance with a license policy; and the step of transmitting the item of content in the security scheme, when the item of content can be received by the user device in the security scheme. [0019]
  • In accordance with a still further aspect of the invention, a program (which may be stored on a storage medium) is for use in an information processing apparatus connectable to a user device over a network. The program is operable to effect the step of receiving a request for a particular item of content; the step of receiving an identification of an available security scheme; and the step of transmitting the requested item of content in the security scheme, when the requested item of content can be transmitted in the security scheme in accordance with a license policy. [0020]
  • In accordance with a still further aspect of the invention, a method is provided for transmitting an item of content in an information processing apparatus connectable to a user device over a network. The method comprises the step of transmitting, in response to reception of a request for a particular item of content, an identification of a security scheme which is applicable to transmission of the particular item of content in accordance with a license policy; and the step of transmitting the particular item of content in the security scheme, when the particular item of content can be received by the user device in the security scheme. [0021]
  • In accordance with a still further aspect of the invention, a method is provided for transmitting an item of content in an information processing apparatus connectable to a user device over a network. The method comprises the step of receiving, from the user device, a request for a particular item of content; and the step of transmitting the requested particular item of content in the security scheme, when the requested particular item of content can be transmitted in the security scheme in accordance with a license policy. [0022]
  • According to the invention, content can be transmitted in a secure transmission scheme available to a user. [0023]
  • Throughout the drawings, similar symbols and numerals indicate similar items and functions.[0024]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 shows the configuration of a content server and a residential gateway server interconnected via a network, in accordance with an embodiment of the present invention. [0025]
  • FIG. 2 shows the configuration of the content server and another residential gateway server interconnected via the network, in accordance with another embodiment of the invention. [0026]
  • FIG. 3 shows a process for transmitting and receiving the content performed by the content server and the gateway server, in accordance with the invention. [0027]
  • FIG. 4 shows another process for transmitting and receiving the content performed by the content server and the gateway server, in accordance with the invention. [0028]
  • FIG. 5 shows a further process for transmitting and receiving the content performed by the content server and the gateway server, in accordance with the invention. [0029]
  • FIG. 6 shows an example of a set of security schemes applicable to a certain item of content and determined in accordance with the license policy.[0030]
  • DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • FIG. 1 shows the configuration of a [0031] content server 10 and a residential gateway server 20 interconnected via a network 5 such as the Internet, in accordance with an embodiment of the present invention. The gateway server 20 is also connected to user devices, such as a television receiver (TV) 320 and an audio apparatus 330.
  • The [0032] content server 10 includes a processor 102 having a CPU, a ROM and a RAM, a program memory or storage device 104, a memory or storage device 120, such as a hard disk unit, for storing a content database, user information and the like, and a network interface (NW I/F) 130 connected to the network 5 such as the Internet, all of which are interconnected via an internal bus.
  • The [0033] storage device 104 stores application programs for the content server 10. The processor 102 operates in accordance with the application programs. Alternatively, such applications may be implemented in the form of hardware, such as an integrated circuit, in the processor 102.
  • The term “content” herein should be broadly interpreted to include digital content in its narrow sense, such as a motion picture program, a music program, a picture and a dictionary in the form of audio and/or video files or a document file, as well as other copyrighted digital products or software in its broader sense, which is suitable for delivery on the Web, such as an application file. The content may be of the kind which is updated periodically, such as audio and video files of different news, advertisements and weather forecasts, for example. Each item of such content is associated with at least one applicable security scheme for distribution in accordance with the license policy of an administrator of the [0034] content server 10, for example in accordance with the type and value of the content, the intended user class, the term of validity of the content, and the like.
  • FIG. 6 shows an example of a set of security schemes, which are applicable to a certain item of content, and which are determined in accordance with the license policy. Ones of these security schemes may be assigned different priorities, and ones of them may be assigned the same priority. In FIG. 6, for the certain item of content, the first security scheme uses the DES as an encryption method, the digital signature as an authentication method, and the MD-5 as a hash method. The second security scheme uses the AES as an encryption method, but uses neither authentication nor a hash method. The third security scheme uses the triple DES as an encryption method, but uses neither an authentication method nor a hash method. The security scheme may include provisions to restrict the network used for the transmission of an item of content to a network of high security. An advertisement video file, for example, may be transmitted in a lowest security scheme which uses neither an encryption method, an authentication method nor a hash method. [0035]
  • The [0036] residential gateway server 20 includes a processor 202 having a CPU, a ROM and a RAM, a content reproducing module 204, a security module 206, a memory or storage device 220, such as a hard disk unit, for storing application programs, a received file and the like, an input device 240 including a keyboard and a mouse, a display device 250, an audio device 260 including a microphone and a speaker, an external network interface (NW I/F) 230, and a device interface (I/F) 270, all of which are interconnected via an internal bus. The device interface 270 is connected to user devices, such as a television receiver (TV) 320 and an audio apparatus 330, via an IEEE 1394 bus or a USB cable.
  • The [0037] memory device 220 stores application programs for the residential gateway server 20. The processor 202 operates in accordance with the application programs. Alternatively, such applications may be implemented in the form of hardware, such as an integrated circuit, in the processor 202.
  • The reproducing [0038] module 204 is used for decoding and reproducing an audio and/or video stream. The reproducing module 204 may perform decryption in accordance with a predetermined encryption method. The security module 206 processes the received content in accordance with a predetermined authentication method, a predetermined hash method, and/or a predetermined encryption method. The reproducing module 204 and the security module 206 are implemented in the form of hardware or software. When they are implemented in software programs, the processor 202 operates in accordance with the programs.
  • FIG. 2 shows the configuration of the [0039] content server 10 and another residential gateway server 30 interconnected via the network 5 such as the Internet, in accordance with another embodiment of the invention. The gateway server 30 is also connected to user devices, such as a personal computer (PC) 310, the television receiver (TV) 320, and the audio apparatus 330. Further, the gateway server 30 communicates with a mobile telephone 360 and/or a PDA (Personal Digital Assistant) 370 over a network 7, such as a public switched telephone network (PSTN) or a mobile telephone network. The content server 10 has the same configuration as the one shown in FIG. 1, and hence is not described again.
  • The [0040] residential gateway server 30 includes a processor 302 having a CPU, a ROM and a RAM, the security module 206, the memory device 220 such as a hard disk unit, the external network interface (NW I/F) 230, a network interface (NW I/F) 332 connected to the network 7, and the device interface 270, all of which are interconnected via an internal bus.
  • The [0041] memory device 220 stores application programs for the residential gateway server 30. The processor 302 operates in accordance with the application programs. Alternatively, such applications may be implemented in the form of hardware, such as an integrated circuit, in the processor 302.
  • The [0042] device interface 270 is connected to user devices, such as the personal computer (PC) 310, the television receiver (TV) 320, and the audio apparatus 330, via an IEEE 1394 bus or a USB cable. Each of the user devices, including the mobile telephone 360 and the PDA 370 as well as the devices 310, 320 and 330, includes a reproducing module similar to the reproducing module 204 shown in FIG. 1, and each device may further have a security module similar to the security module 206. Preferably, the gateway server 30 collects beforehand the information on the content types, coding methods and security schemes (for example, identifications of encryption schemes) available in the user device, such as the devices 310, 320 and 330, the mobile telephone 360 and the PDA 370, and stores the information in the memory device 220 together with the security schemes (for example, identifications of authentication schemes) available in the gateway server 30. Such information may be entered manually by the user to store in the memory device 220.
  • FIG. 3 shows a process for transmitting and receiving the content performed by the [0043] content server 10 and the gateway server 20 or 30, in accordance with the invention.
  • Now, the operations of the [0044] content server 10 and the gateway server 20 are described below with reference to FIGS. 1 and 3.
  • At Step [0045] 301, the user operates the input device 240 while viewing the display device 250 of the gateway server 20, to operatively connect the gateway server 20 to the content server 10 over the network 5 and request a desired item of content. The content request may involve purchasing an item of pay content.
  • At Step [0046] 303, in response to the content request, the gateway server 20 (more specifically, the processor 202) requests the content server 10 to transmit the requested item of content. At Step 323, the content server 10 receives the request for transmission of the item of content.
  • At Step [0047] 325, the content server 10 (more specifically the processor 102) looks up a table of content security schemes in the content database 120, retrieves the identifications (IDs) of the security schemes which are applicable to the transmission of the item of content in accordance with the license policy of the content, and transmits a list of the identifications of the applicable security schemes to the gateway server 20. The applicable security schemes may be the ones as shown in FIG. 6, for example. At Step 305, the gateway server 20 receives the presented list of the identifications of the applicable security schemes.
  • At Step [0048] 307, the gateway server 20 looks up a table of identifications of the security schemes stored in the memory device 220 and available in the gateway server 20 and compares the presented security schemes with the available security schemes to determine whether the item of content to be transmitted in any ones of the presented security schemes can be received, decoded and reproduced. The security schemes available in the gateway server 20 mean the ones which are available in the reproducing module 204 and the security module 206 of the gateway server 20, and may include the security schemes which can be available in the user devices 320 and 330 connected to the gateway server 20 or other user devices (not shown) not connected to the gateway server 20.
  • If it is determined that the item of content can be received, decoded and reproduced, then the [0049] gateway server 20 at Step 309 selects or designates a security scheme of the highest priority from among the applicable security schemes that match with the available security schemes, and transmits an identification of the selected security scheme to the server 10. At Step 329, the content server 10 receives the identification of the selected security scheme. At Step 331, the content server 10 retrieves the requested item of content from the database 120, processes the item of content in accordance with the selected security scheme, and transmits the thus processed item of content to the gateway server 20 in accordance with the selected security scheme. Such an item of content may be processed beforehand in accordance with parts of the applicable security schemes and stored in the database 120. At Step 311, the gateway server 20 receives the item of content, stores it in the memory device 220, and produces a display on the display device 250 indicating that the item of content has been received. The item of content thus becomes ready for use by the user.
  • If it is determined at Step [0050] 307 that the item of content cannot be received, then the gateway server 20 at Step 313 sends a request for canceling the content transmission request to the server 10, and produces a display on the display device 250 indicating that the requested item of content is not available. At Step 333, the server 10 receives the request for canceling the content transmission request, and the procedure exits the routine for content transmission of FIG. 3.
  • FIG. 4 shows another process for transmitting and receiving the content performed by the [0051] content server 10 and the gateway server 20 or 30, in accordance with the invention.
  • Now, the operations of the [0052] content server 10 and the gateway server 20 are described below with reference to FIGS. 1 and 4.
  • At Step [0053] 401, the user operates the input device 240, while viewing the display device 250 of the gateway server 20, to operatively connect the gateway server 20 to the content server 10 over the network 5 and request a desired item of content.
  • At Step [0054] 403, in response to the content request, the gateway server 20 (more specifically, the processor 202) requests the content server 10 to transmit the requested item of content, looks up the table of the identifications of the security schemes stored in the memory device 220 and available in the gateway server 20, and transmits the identifications of the available security schemes. At Step 423, the content server 10 (more specifically, the processor 102) receives the request for transmission of the item of content together with the identifications of the available security schemes.
  • At [0055] Step 425, the content server 10 compares the security schemes available in the gateway server 20 with the security schemes stored in a memory device 120 of the content server 10 and applicable to the requested item of content, and determines whether the requested item of content can be transmitted in any ones of the available security schemes.
  • If it is determined that the item of content can be transmitted in any ones of the available security schemes, then the [0056] content server 10 at Step 427 selects a security scheme of the highest priority from among the applicable security schemes that match the available security schemes, retrieves the requested item of content from the database 120, processes the item of content in accordance with the selected security scheme, and transmits the thus processed item of content to the gateway server 20 in accordance with the selected security scheme. Such an item of content may be processed beforehand in accordance with parts of the applicable security schemes and stored in the database 120. The gateway server 20 receives the item of content at Step 407.
  • If it is determined that the item of content cannot be transmitted in any one of the available security schemes, then the [0057] gateway server 20 at Step 429 sends a notification of rejecting content transmission to the gateway server 20. At Step 409, the server 10 receives the notification of rejecting content transmission, and produces a display on the display device 250 indicating that the requested item of content is not available.
  • FIG. 5 shows a further process for transmitting and receiving the content performed by the [0058] content server 10 and the gateway server 20 or 30, in accordance with the invention.
  • Now, the operations of the [0059] content server 10 and the gateway server 20 are described below with reference to FIGS. 1 and 5.
  • At [0060] Step 501, the user operates the input device 240, while viewing the display device 250 of the gateway server 20, to operatively connect the gateway server 20 to the content server 10 over the network 5 and request a list of available items of content from the gateway server 20.
  • At Step [0061] 502, the gateway server 20 (more specifically, the processor 202) determines whether the identifications of the security schemes available in the gateway server 20 for the type of content have already been reported to the content server 10. For this purpose, the gateway server 20 may send, to the content server 10, a query as to whether the identifications of the available security schemes have already been reported. If it is determined that they have already been reported, then the gateway server 20 at Step 505 requests transmission of a list of available items of content. On the other hand, if it is determined that they have not been reported yet, then the gateway server 20 at Step 503 retrieves the identifications of the available security schemes stored in the memory device 220, transmits the identifications to the content server 10 and, at Step 505, requests transmission of a list of available items of content.
  • At Step [0062] 523, the content server 10 (more specifically, the processor 102) receives the identifications of the available security schemes, and stores them as user information in the memory device 120. The content server 10, at Step 525, receives the request for transmission of a content list, and, at Step 527, retrieves the identifications of the security schemes available in the gateway server 20 from the memory device 120.
  • At Step [0063] 529, the content server 10 compares the security schemes available in the gateway server 20 with the security schemes and applicable to items of content which can be provided by the content server 10, produces a list of available items of content which can be transmitted in the available security schemes, and transmits the list to the gateway server 20. The list may include attributes of each item of content, such as a type of content (for example, identification of the type, such as an audio and/or video file, a text file, and the like), a title or identification of an item of content, license policy, a price, and the term of validity.
  • At [0064] Step 509, the gateway server 20 displays the content list on the display device 250. At Step 511, the user operates the input device 240, while viewing the display device 250 of the gateway server 20, selects one or more items of content and requests the selected one or more items of content. In response to the request, the gateway server 20 requests the content server 10 to transmit the selected one or more items of content.
  • At Step [0065] 531, the content server 10 receives the request for content transmission, selects a security scheme of the highest priority from among the applicable security schemes that match the available security schemes for each item of content, retrieves the requested each item of content from the database 120, processes each item of content in accordance with the selected security scheme, and transmits the thus processed one or more items of content to the gateway server 20 in accordance with the respective selected security schemes. Such items of content may be processed beforehand in accordance with parts of the applicable security schemes and stored in the database 120. At Step 513, the gateway server 20 receives the one or more items of content and stores them in the memory device 220. The items of content thus become ready for use by the user.
  • Now, the operations of the [0066] content server 10 and the gateway server 30 are described below with reference to FIGS. 2 and 3.
  • At Step [0067] 301, the user operates the keys on the mobile telephone 360 or the PDA 370 while viewing the display thereof, to connect the mobile telephone 360 or the PDA 370 to the gateway server 30 over the network 7, and requests a desired item of content from the gateway server 30. In this case, when the item of content is to be used on the mobile telephone 360 or the PDA 370, the mobile telephone 360 or the PDA 370 may also transmit, to the gateway server 30, the identifications of the security schemes available in the mobile telephone 360 or the PDA 370. The gateway server 30 then stores the identifications of the available security schemes in the memory device 220. The content request may involve purchasing an item of pay content.
  • The operations of the [0068] content server 10 and the gateway server 30 at Steps 303 to 305 and Steps 323 to 325 are the same as those of the content server 10 and the gateway server 20 shown in FIG. 1, and hence are not described again.
  • At Step [0069] 307, the gateway server 30 (more specifically, the processor 302) looks up a table of the identifications of the security schemes stored in the memory device 220 and available for a combination of the gateway server 30 and the user devices 310, 320, 330, 360 and 370, compares the available security schemes with the security schemes presented by the content server 10, and determines whether the item of content to be transmitted in any ones of the presented security schemes can be received, decoded and reproduced.
  • The operations of the [0070] content server 10 and the gateway server 30 at Steps 309 and 329 to 333 are the same as those of the content server 10 and the gateway server 20 shown in FIG. 1, and hence are not described again.
  • At [0071] Step 311, the gateway server 30 receives the item of content transmitted in the selected security scheme, stores the received item of content in the memory device 220, and sends a notification of the reception of the item of content to the mobile telephone 360 or the PDA 370 for display. On the other hand, at Step 313, the gateway server 30 transmits a request for canceling the content transmission request to the server 10 and, at the same time, sends the notification of the cancellation to the mobile telephone 360 or the PDA 370 for display.
  • Now, the operations of the [0072] content server 10 and the gateway server 30 are described below with reference to FIGS. 2 and 4.
  • At Step [0073] 401, the user operates the keys on the mobile telephone 360 or the PDA 370 while viewing the display thereof, to connect the mobile telephone 360 or the PDA 370 to the gateway server 30 over the network 7, and requests a desired item of content from the gateway server 30. In this case, when the item of content is to be used on the mobile telephone 360 or the PDA 370, the mobile telephone 360 or the PDA 370 may also transmit, to the gateway server 30, the identifications of the security schemes available in the mobile telephone 360 or the PDA 370. The gateway server 30 then stores the identifications of the available security schemes in the memory device 220.
  • At Step [0074] 403, in response to the content request received from the user, the gateway server 30 (more specifically, the processor 302) requests the content server 10 to transmit the item of content and, at the same time, looks up a table of the identifications of the security schemes stored in the memory device 220 and available for a combination of the gateway server 30 and the user devices 310, 320, 330, 360 and 370, and transmits the identifications of the available security schemes to the content server 10.
  • The operations of the [0075] content server 10 and the gateway server 30 at Steps 423 to 429 are the same as those of the content server 10 and the gateway server 20 shown in FIG. 1, and hence are not described again.
  • At [0076] Step 407, the gateway server 30 receives the item of content, stores the received item of content in the memory device 220, and sends a notification of the reception of the item of content to the mobile telephone 360 or the PDA 370 for display. On the other hand, at Step 409, the gateway server 30 receives, from the server 10, a notification of rejecting the content transmission request, and passes the notification to the mobile telephone 360 or the PDA 370 for display.
  • Now, the operations of the [0077] content server 10 and the gateway server 30 are described below with reference to FIGS. 2 and 5.
  • At [0078] Step 501, the user operates the keys on the mobile telephone 360 or the PDA 370 while viewing the display thereof, connects the mobile telephone 360 or the PDA 370 to the gateway server 30 over the network 7, and requests a list of items of content from the gateway server 30. In this case, the mobile telephone 360 or the PDA 370 may also transmit, to the gateway server 30, the identifications of the security schemes available in the mobile telephone 360 or the PDA 370. The gateway server 30 then stores the identifications of the available security schemes in the memory device 220.
  • At Step [0079] 502, in response to the request, the gateway server 30 (more specifically, the processor 302) determines whether the identifications of the security schemes stored in the memory device 220 and available for a combination of the gateway server 30 and the user devices 310, 320, 330, 360 and 370 have already been reported to the content server 10. For this purpose, the gateway server 30 may send a query as to whether the identifications of the available security schemes have already been reported to the content server 10. If it is determined that they have already been reported, then the gateway server 30 at Step 505 requests the content server 10 to transmit a list of available items of content. On the other hand, if it is determined that they have not been reported yet, then at Step 503 the gateway server 30 transmits the identifications of the available security schemes to the content server 10 and, at Step 505, requests the transmission of a list of available items of content.
  • The operations of the [0080] content server 10 and the gateway server 30 at Steps 523 to 533 are the same as those of the content server 10 and the gateway server 20 shown in FIG. 1, and hence are not described again.
  • At [0081] Step 509, the gateway server 30 transmits the content list to the mobile telephone 360 or the PDA 370 for display on its display device. At Step 511, the user operates the keys on the mobile telephone 360 or the PDA 370 while viewing the list of available items of content, selects one or more items of content, and requests the selected one or more items of content from the gateway server 30. In response to the request, the gateway server 30 requests the content server 10 to transmit the selected one or more items of content.
  • At Step [0082] 513, the gateway server 30 receives the items of content, stores the received items of content in the memory device 220, and sends a notification of the reception of the items of content to the mobile telephone 360 or the PDA 370 for display.
  • The above-described embodiments are only typical examples, and their modifications and variations are apparent to those skilled in the art. It should be noted that those skilled in the art can make various modifications to the above-described embodiments without departing from the principle of the invention and the accompanying claims. [0083]

Claims (27)

What is claimed is:
1. An information processing apparatus connectable to a user device over a network, said information processing apparatus comprising a processor, wherein
said processor transmits, in response to reception of a request for a particular item of content, an identification of a security scheme which is applicable to transmission of said particular item of content in accordance with a license policy, and
when the item of content can be received by said user device, and reproduced in said security scheme, said processor transmits the item of content in said security scheme.
2. An information processing apparatus according to claim 1, wherein after transmitting the identification of said security scheme, said processor receives selection of the identification of said security scheme or cancellation of said request for the item of content.
3. An information processing apparatus connectable to a user device over a network, said information processing apparatus comprising a processor, wherein
said processor is adapted to receive a request for a particular item of content from said user device,
said processor is adapted to receive an identification of an available security scheme from said user device, and
when the requested item of content can be transmitted in said security scheme in accordance with a license policy, said processor transmits the requested item of content in said security scheme.
4. An information processing apparatus according to claim 3, wherein when the requested item of content cannot be transmitted in said security scheme in accordance with said license policy, said processor does not transmit the requested item of content.
5. An information processing apparatus connectable to a user device over a network, said information processing apparatus comprising a processor, wherein
said processor is adapted to receive an identification of an available security scheme from said user device, and
said processor transmits, in response to reception of a request for a content list, a list of items of content that can be transmitted in said available security scheme in accordance with a license policy.
6. An information processing apparatus according to claim 5, wherein in response to a request for an item of content selected from said list of items of content, said processor transmits the selected item of content in an applicable security scheme which matches said available security scheme.
7. An information processing apparatus connectable to a content source over a network, said information processing apparatus comprising a processor, wherein
said processor transmits a request for a particular item of content,
said processor transmits an identification of a security scheme available for reception and reproduction of the particular item of content, and
said processor receives the particular item of content transmitted in said security scheme in accordance with a license policy.
8. An information processing apparatus according to claim 7, wherein said processor transmits said request for the particular item of content, in response to a request for the particular item of content received from another apparatus.
9. An information processing apparatus connectable to a content source over a network, said information processing apparatus comprising a processor, wherein
said processor transmits a request for a particular item of content,
said processor receives an identification of a security scheme which is applicable to transmission of said particular item of content in accordance with a license policy,
when said security scheme is available, said processor transmits the identification of said security scheme.
10. An information processing apparatus according to claim 9, wherein said processor transmits said request for the particular item of content, in response to a request for the particular item of content received from another apparatus.
11. An information processing apparatus connectable to a content source over a network, said information processing apparatus comprising a processor, wherein
said processor transmits an identification of a security scheme available for reception and reproduction of content,
said processor transmits a request for a content list, and
said processor receives a list of items of content which can be transmitted in said security scheme in accordance with a license policy.
12. An information processing apparatus according to claim 11, wherein said processor further transmits an identification of an item of content selected from said received list of items of content, and receives the selected item of content transmitted in said security scheme.
13. An information processing apparatus according to claim 11, wherein said processor transmits said request for the content list, in response to a content request received from another apparatus.
14. A program, stored on a storage medium, for an information processing apparatus connectable to a user device over a network, said program being operable to effect the steps of:
transmitting, in response to reception of a request for a particular item of content, an identification of a security scheme which is applicable to transmission of said particular item of content in accordance with a license policy; and
transmitting the item of content in said security scheme, when the item of content can be received by said user device in said security scheme.
15. A program according to claim 14, being operable to further effect the step of receiving selection of the identification of said security scheme or cancellation of said request for the item of content, after transmitting the identification of said security scheme.
16. A program stored on a storage medium for an information processing apparatus connectable to a user device over a network, said program being operable to effect the steps of:
receiving a request for a particular item of content,
receiving an identification of an available security scheme, and
transmitting the requested item of content in said security scheme, when the requested item of content can be transmitted in said security scheme in accordance with a license policy.
17. A program stored on a storage medium for an information processing apparatus connectable to a user device over a network, said program being operable to effect the steps of:
receiving an identification of an available security scheme, and
transmitting, in response to reception of a request for a content list, a list of items of content which can be transmitted in said available security scheme in accordance with a license policy.
18. A program according to claim 17, being operable to further effect the step of transmitting, in response to a request for an item of content selected from said list of items of content, the selected item of content in an applicable security scheme which matches said available security scheme.
19. A program stored on a storage medium for an information processing apparatus connectable to a content source over a network, said program being operable to effect the steps of:
transmitting a request for a particular item of content,
transmitting an identification of a security scheme available for reception and reproduction of the item of content, and
receiving the item of content transmitted in said security scheme in accordance with a license policy.
20. A program stored on a storage medium for an information processing apparatus connectable to a content source over a network, said program being operable to effect the steps of:
transmitting a request for a particular item of content,
receiving an identification of a security scheme which is applicable to transmission of said particular item of content in accordance with a license policy, and
transmitting the identification of said security scheme, when said security scheme is available.
21. A program stored on a storage medium for an information processing apparatus connectable to a content source over a network, said program being operable to effect the steps of:
transmitting an identification of a security scheme available for reception and reproduction of content,
transmitting a request for a content list, and
receiving a list of items of content which can be transmitted in said security scheme in accordance with a license policy.
22. A program according to claim 21, being operable to further effect the step of transmitting an identification of an item of content selected from said received list of items of content, and receiving the selected item of content transmitted in said security scheme.
23. A method for transmitting an item of content in an information processing apparatus connectable to a user device over a network, said method comprising the steps of:
transmitting, in response to reception of a request for a particular item of content, an identification of a security scheme which is applicable to transmission of said particular item of content in accordance with a license policy; and
transmitting the particular item of content in said security scheme, when the particular item of content can be received by said user device in said security scheme.
24. A method for transmitting an item of content in an information processing apparatus connectable to a user device over a network, said method comprising the steps of:
receiving, from said user device, a request for a particular item of content, and
transmitting the requested particular item of content in said security scheme, when the requested particular item of content can be transmitted in said security scheme in accordance with a license policy.
25. A method for transmitting an item of content in an information processing apparatus connectable to a user device over a network, said method comprising the steps of:
receiving an identification of an available security scheme from said user device, and
transmitting, in response to reception of a request for a content list, a list of items of content that can be transmitted in said available security scheme in accordance with a license policy.
26. A method for transmitting an item of content in an information processing apparatus connectable to a content source over a network, said method comprising the steps of:
transmitting a request for a particular item of content,
transmitting an identification of a security scheme available for reception and reproduction of the item of content, and
receiving the item of content transmitted in said security scheme in accordance with a license policy.
27. A method for transmitting an item of content in an information processing apparatus connectable to a content source over a network, said method comprising the steps of:
transmitting a request for a particular item of content,
receiving an identification of a security scheme which is applicable to transmission of said particular item of content in accordance with a license policy, and
transmitting the identification of said security scheme, when said security scheme is available.
US10/282,160 2002-06-27 2002-10-29 Information processing apparatus, program and method for transmitting content in security scheme according to license policy Abandoned US20040003281A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/826,973 US7873990B2 (en) 2002-06-27 2007-07-19 Information processing apparatus, program and method for transmitting content in security scheme according to license policy

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2002187482A JP2004030374A (en) 2002-06-27 2002-06-27 Information processor for transmitting contents in security system corresponding to license policy, program and method
JP2002-187482 2002-06-27

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US11/826,973 Division US7873990B2 (en) 2002-06-27 2007-07-19 Information processing apparatus, program and method for transmitting content in security scheme according to license policy

Publications (1)

Publication Number Publication Date
US20040003281A1 true US20040003281A1 (en) 2004-01-01

Family

ID=29774188

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/282,160 Abandoned US20040003281A1 (en) 2002-06-27 2002-10-29 Information processing apparatus, program and method for transmitting content in security scheme according to license policy
US11/826,973 Expired - Fee Related US7873990B2 (en) 2002-06-27 2007-07-19 Information processing apparatus, program and method for transmitting content in security scheme according to license policy

Family Applications After (1)

Application Number Title Priority Date Filing Date
US11/826,973 Expired - Fee Related US7873990B2 (en) 2002-06-27 2007-07-19 Information processing apparatus, program and method for transmitting content in security scheme according to license policy

Country Status (2)

Country Link
US (2) US20040003281A1 (en)
JP (1) JP2004030374A (en)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050065624A1 (en) * 2003-01-02 2005-03-24 Yaacov Ben-Yaacov Method and system for managing rights for digital music
US20050192904A1 (en) * 2002-09-09 2005-09-01 Candelore Brant L. Selective encryption with coverage encryption
GB2412452A (en) * 2004-03-27 2005-09-28 George Stronach Mudie Protection and controlled distribution of digital content
US20060107330A1 (en) * 2003-01-02 2006-05-18 Yaacov Ben-Yaacov Method and system for tracking and managing rights for digital music
US20060265441A1 (en) * 2003-06-06 2006-11-23 Stefan Andersson Allowing conversion of one digital rights management scheme to another
US20060265427A1 (en) * 2005-04-05 2006-11-23 Cohen Alexander J Multi-media search, discovery, submission and distribution control infrastructure
US20070162395A1 (en) * 2003-01-02 2007-07-12 Yaacov Ben-Yaacov Media management and tracking
US20080107265A1 (en) * 2003-03-25 2008-05-08 James Bonan Content scrambling with minimal impact on legacy devices
US20080243692A1 (en) * 2007-03-30 2008-10-02 Verizon Services Corp. Content ingest, maintenance, and delivery
US20080266466A1 (en) * 2007-04-27 2008-10-30 Buffalo Inc. Method of playing broadcast program contents using encryption and decryption techniques
US20090094663A1 (en) * 2003-01-02 2009-04-09 Yaacov Ben-Yaacov Portable music player and transmitter
US20090100525A1 (en) * 2006-05-22 2009-04-16 Canon Kabushiki Kaisha Information processing apparatus, information processing method, and information processing program
US20090210346A1 (en) * 2006-03-01 2009-08-20 Candelore Brant L Multiple DRM management
US20090235361A1 (en) * 2008-03-14 2009-09-17 Microsoft Corporation Segment based digital content protection
US20100189254A1 (en) * 2002-01-02 2010-07-29 Candelore Brant L Slice mask and moat pattern partial encryption
US20110035769A1 (en) * 2002-01-02 2011-02-10 Candelore Brant L Content Replacement by PID Mapping
US20110049253A1 (en) * 2009-08-27 2011-03-03 Thomas & Betts International, Inc. Radiant heat reflector and heat converter
US8243921B1 (en) 2003-09-15 2012-08-14 Sony Corporation Decryption system
US8411857B2 (en) 2002-01-02 2013-04-02 Sony Corporation Partial multiple encryption
US8452010B2 (en) 2002-01-02 2013-05-28 Sony Corporation Video slice and active region based multiple partial encryption
US8644969B2 (en) 2003-01-02 2014-02-04 Catch Media, Inc. Content provisioning and revenue disbursement
US9473815B1 (en) * 2012-04-05 2016-10-18 Mlb Advanced Media, L.P. Content redistribution protection

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004111804A2 (en) * 2003-06-06 2004-12-23 Sony Ericsson Mobile Communications Ab Allowing conversion of one digital rights management scheme to another
US9172710B2 (en) * 2007-02-05 2015-10-27 Broadcom Corporation Media transport protocol extensions for system integrity and robustness, and applications thereof
US8832467B2 (en) * 2007-05-16 2014-09-09 Broadcom Corporation Digital rights management metafile, management protocol and applications thereof
US8752191B2 (en) * 2007-05-16 2014-06-10 Broadcom Corporation Generic digital rights management framework, and applications thereof
JP2011164901A (en) * 2010-02-09 2011-08-25 Optim Corp System, method and program for distributing digital content

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020015497A1 (en) * 2000-08-02 2002-02-07 Junichi Maruyama Hub apparatus with copyright protection function
US20020035723A1 (en) * 2000-01-28 2002-03-21 Hiroshi Inoue Digital contents distribution system, digital contents distribution method, roaming server, information processor, and information processing method
US6772176B1 (en) * 2000-11-17 2004-08-03 Oracle International Corporation Coordinating a distributed transaction between participants unable to follow a two-phase commit

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3571912B2 (en) 1998-05-26 2004-09-29 株式会社東芝 Communication device and service providing method
JP2001175757A (en) 1999-12-15 2001-06-29 Mitsubishi Electric Corp System for distributing digital contents through network
JP4507030B2 (en) 2000-01-21 2010-07-21 ソニー株式会社 Network system, terminal device, and information transmission method
JP2001306737A (en) 2000-01-28 2001-11-02 Canon Inc System and method for distributing digital contents, information converting server, device and method for processing information, storage medium and program software
JP2001256162A (en) 2000-03-14 2001-09-21 Nec Corp Information processing terminal and contents acquisition system
JP2001325177A (en) 2000-05-15 2001-11-22 Vertex Software:Kk Method and system for providing contents application
JP2002163170A (en) 2000-11-29 2002-06-07 Hitachi Ltd Contents ordering method and terminal unit thereof and contents providing method and system thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020035723A1 (en) * 2000-01-28 2002-03-21 Hiroshi Inoue Digital contents distribution system, digital contents distribution method, roaming server, information processor, and information processing method
US20020015497A1 (en) * 2000-08-02 2002-02-07 Junichi Maruyama Hub apparatus with copyright protection function
US6772176B1 (en) * 2000-11-17 2004-08-03 Oracle International Corporation Coordinating a distributed transaction between participants unable to follow a two-phase commit

Cited By (43)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100189254A1 (en) * 2002-01-02 2010-07-29 Candelore Brant L Slice mask and moat pattern partial encryption
US8452010B2 (en) 2002-01-02 2013-05-28 Sony Corporation Video slice and active region based multiple partial encryption
US8453172B2 (en) 2002-01-02 2013-05-28 Sony Corporation Content replacement by PID mapping
US8411857B2 (en) 2002-01-02 2013-04-02 Sony Corporation Partial multiple encryption
US8103000B2 (en) 2002-01-02 2012-01-24 Sony Corporation Slice mask and moat pattern partial encryption
US20110035769A1 (en) * 2002-01-02 2011-02-10 Candelore Brant L Content Replacement by PID Mapping
US20050192904A1 (en) * 2002-09-09 2005-09-01 Candelore Brant L. Selective encryption with coverage encryption
US8818896B2 (en) 2002-09-09 2014-08-26 Sony Corporation Selective encryption with coverage encryption
US8918195B2 (en) 2003-01-02 2014-12-23 Catch Media, Inc. Media management and tracking
US20090094663A1 (en) * 2003-01-02 2009-04-09 Yaacov Ben-Yaacov Portable music player and transmitter
US20050065624A1 (en) * 2003-01-02 2005-03-24 Yaacov Ben-Yaacov Method and system for managing rights for digital music
US20080320605A1 (en) * 2003-01-02 2008-12-25 Yaacov Ben-Yaacov Method and system for tracking and managing rights for digital music
US20080320598A1 (en) * 2003-01-02 2008-12-25 Yaacov Ben-Yaacov Method and system for tracking and managing rights for digital music
US20090044285A1 (en) * 2003-01-02 2009-02-12 Yaacov Ben-Yaacov Method and system for managing rights for digital music
US20090043412A1 (en) * 2003-01-02 2009-02-12 Yaacov Ben-Yaacov Method and system for managing rights for digital music
US20070162395A1 (en) * 2003-01-02 2007-07-12 Yaacov Ben-Yaacov Media management and tracking
US20090093899A1 (en) * 2003-01-02 2009-04-09 Yaacov Ben-Yaacov Portable music player and transmitter
US8732086B2 (en) 2003-01-02 2014-05-20 Catch Media, Inc. Method and system for managing rights for digital music
US8666524B2 (en) 2003-01-02 2014-03-04 Catch Media, Inc. Portable music player and transmitter
US8644969B2 (en) 2003-01-02 2014-02-04 Catch Media, Inc. Content provisioning and revenue disbursement
US20060107330A1 (en) * 2003-01-02 2006-05-18 Yaacov Ben-Yaacov Method and system for tracking and managing rights for digital music
US8996146B2 (en) 2003-01-02 2015-03-31 Catch Media, Inc. Automatic digital music library builder
US20080107265A1 (en) * 2003-03-25 2008-05-08 James Bonan Content scrambling with minimal impact on legacy devices
US8265277B2 (en) 2003-03-25 2012-09-11 Sony Corporation Content scrambling with minimal impact on legacy devices
US20060265441A1 (en) * 2003-06-06 2006-11-23 Stefan Andersson Allowing conversion of one digital rights management scheme to another
US8706637B2 (en) * 2003-06-06 2014-04-22 Sony Corporation Allowing conversion of one digital rights management scheme to another
US8243921B1 (en) 2003-09-15 2012-08-14 Sony Corporation Decryption system
GB2412452B (en) * 2004-03-27 2007-02-21 George Stronach Mudie Data protection and controlled distribution
GB2412452A (en) * 2004-03-27 2005-09-28 George Stronach Mudie Protection and controlled distribution of digital content
US20060265427A1 (en) * 2005-04-05 2006-11-23 Cohen Alexander J Multi-media search, discovery, submission and distribution control infrastructure
US9406066B2 (en) 2006-03-01 2016-08-02 Sony Corporation Multiple DRM management
US20090210698A1 (en) * 2006-03-01 2009-08-20 Candelore Brant L Multiple DRM management
US20090210346A1 (en) * 2006-03-01 2009-08-20 Candelore Brant L Multiple DRM management
US20090100525A1 (en) * 2006-05-22 2009-04-16 Canon Kabushiki Kaisha Information processing apparatus, information processing method, and information processing program
US20080243692A1 (en) * 2007-03-30 2008-10-02 Verizon Services Corp. Content ingest, maintenance, and delivery
US20080266466A1 (en) * 2007-04-27 2008-10-30 Buffalo Inc. Method of playing broadcast program contents using encryption and decryption techniques
US8068611B2 (en) * 2007-04-27 2011-11-29 Buffalo Inc. Method of playing broadcast program contents using encryption and decryption techniques
US8935796B2 (en) * 2008-03-14 2015-01-13 Microsoft Corporation Segment based digital content protection
US20090235361A1 (en) * 2008-03-14 2009-09-17 Microsoft Corporation Segment based digital content protection
US20110049253A1 (en) * 2009-08-27 2011-03-03 Thomas & Betts International, Inc. Radiant heat reflector and heat converter
US9022298B2 (en) 2009-08-27 2015-05-05 Reznor Llc Radiant heat reflector and heat converter
US9473815B1 (en) * 2012-04-05 2016-10-18 Mlb Advanced Media, L.P. Content redistribution protection
US11445249B1 (en) * 2012-04-05 2022-09-13 Bamtech, Llc Content redistribution protection

Also Published As

Publication number Publication date
US20080282316A1 (en) 2008-11-13
JP2004030374A (en) 2004-01-29
US7873990B2 (en) 2011-01-18

Similar Documents

Publication Publication Date Title
US7873990B2 (en) Information processing apparatus, program and method for transmitting content in security scheme according to license policy
US7124297B2 (en) Information providing apparatus and method, information processing apparatus and method, and program storage medium
US10140432B2 (en) Method for scalable access control decisions
US7215779B2 (en) Information providing apparatus and method, information processing apparatus and method, and program storage medium
CN1522516B (en) Secure header information for multi-content e-mail
JP4596554B2 (en) Method and system for mapping encrypted HTTPS network packets to specific URL names and other data without decryption outside the secure web server (mapping)
US8443014B2 (en) Computer systems and data processing methods for using a web service
US20060200415A1 (en) Videonline security network architecture and methods therefor
US20020032861A1 (en) System and method for executing and assuring security of electronic mail for users, and storage medium storing program to cause computer to implement same method
JP2002503354A (en) How to manage access to devices
JP2001242786A (en) Device and method for distribution, and recording medium
JPH10303986A (en) Method and device for providing broker application server
WO2004051453A1 (en) Multiple content provider user interface
US20210226931A1 (en) Process and system for selectable data transmission
EP2925007A1 (en) Information processing device and information processing method
JP2003530635A (en) System and method for securely storing confidential information, and digital content distribution device and server used in the system and method
US7487354B2 (en) Methods and systems for using digital signatures in uniform resource locators
JP2000349725A (en) Broadcast reception device and content use control method
WO2003081499A1 (en) License management method and license management apparatus
WO2017035784A1 (en) Method for preventing the hotlink of url and anti-hotlink system
JP2005149437A (en) Information distribution system and terminal authentication method
KR20040073265A (en) A system and a method for providing multimedia contents on demand
JP2002314523A (en) Method for providing distribution contents including advertisement employing peer-to-peer network, and its management server, and user terminal
CN116614689A (en) Video anti-theft method, device and computer readable storage medium
TW200412109A (en) Method for protecting copyright of an electronic document in a wireless communication system

Legal Events

Date Code Title Description
AS Assignment

Owner name: FUJITSU LIMITED, JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SONODA, TOSHIHIRO;MASEGAWA, EUJI;YASAKI, KOUICHI;REEL/FRAME:013432/0060

Effective date: 20021011

AS Assignment

Owner name: FUJITSU LIMITED, JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SONODA, TOSHIHIRO;MASEGAWA, EIJI;YASAKI, KOUICHI;REEL/FRAME:013885/0485

Effective date: 20021011

AS Assignment

Owner name: FUJITSU LIMITED, JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SONODA, TOSHIHIRO;HASEGAWA, EIJI;YASAKI, KOUICHI;REEL/FRAME:014607/0746

Effective date: 20021110

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION