WO2005109209A1 - コンテンツ利用システム - Google Patents
コンテンツ利用システム Download PDFInfo
- Publication number
- WO2005109209A1 WO2005109209A1 PCT/JP2005/007890 JP2005007890W WO2005109209A1 WO 2005109209 A1 WO2005109209 A1 WO 2005109209A1 JP 2005007890 W JP2005007890 W JP 2005007890W WO 2005109209 A1 WO2005109209 A1 WO 2005109209A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- content
- information
- card
- secure
- secure information
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/835—Generation of protective data, e.g. certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/254—Management at additional data server, e.g. shopping server, rights management server
- H04N21/2541—Rights Management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/258—Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
- H04N21/25808—Management of client data
- H04N21/2585—Generation of a revocation list, e.g. of client devices involved in piracy acts
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/418—External card to be used in combination with the client device, e.g. for conditional access
- H04N21/4181—External card to be used in combination with the client device, e.g. for conditional access for conditional access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4627—Rights management associated to the content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/162—Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing
- H04N7/163—Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing by receiver means only
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/173—Analogue secrecy systems; Analogue subscription systems with two-way working, e.g. subscriber sending a programme selection signal
Definitions
- the present invention relates to a content use system that uses a digital work content based on a license.
- Such a content using apparatus obtains encrypted content from Sano via a communication line, and if there is a license for the content, decrypts and reproduces the content using the license.
- the license includes content usage conditions and a content key for decrypting the content.
- the usage conditions include the number of times the content can be used. That is, when attempting to play back the content, the content use device determines whether the number of times the use condition included in the license can be used is one or more, that is, whether the content is usable. As a result, if the available number of times is one or more, the content use device reproduces the content using the content key.
- the card has a function of managing a license and determining whether or not it can be used.
- the content use device inquires of the card whether or not the content can be used.
- the card receiving the inquiry determines whether or not the content can be used based on the usage conditions included in the license for the content, and transfers the content key to the content using device when it is determined that the content can be used.
- the content use device decrypts and reproduces the content using the content key received from the card.
- Patent Document 1 Japanese Patent Application Laid-Open No. 2003-58660
- the card In order to determine whether or not a card can be used, it is necessary to provide information for determining whether or not the card can be used in accordance with the usage conditions. In other words, the current date and time are needed as a judgment factor when the usage conditions are to be used, and when the usage conditions are to be used, the area where the content is used is determined. Is necessary.
- the card operates by power supply from the content utilization device, and it is difficult to mount a clock that requires constant power supply on the card. Therefore, it is difficult to manage the current date and time by the card, and it is not possible to determine whether the card can be used based on the usable period.
- the card even if the area is recorded on the card as the area where the content is used, the card may be easily taken out of the area, so it is not necessary to record the area on the card. Meaning. Therefore, the card cannot be used or not determined based on the available area.
- the present invention has been made in view of such a problem, and a content IJ system capable of using contents under appropriate use conditions while maintaining a high security level.
- the purpose is to provide.
- a content use system is a content use system that includes a card and a host terminal, and uses content as a digital work by communicating with each other.
- the host terminal transmits secure information managed by the secure information management means to the card, and secure information management means for securely managing secure information used to determine whether the content can be used.
- An information transmitting unit and a use unit that uses the content when it is determined that the content can be used by the card, wherein the card includes a condition holding unit that holds a use condition of the content; Information acquiring means for acquiring secure information, and information acquired by the information acquiring means; Based on the secure information obtained and the usage conditions held in the condition holding means, Determining means for determining whether or not the content can be used.
- the secure information management means manages the current date and time obtained by measuring the time as the secure information
- the condition holding means holds the use condition indicating a usable period of the content
- the determination means When the date and time indicated by the secure information is included in the usable period of the content, which is the use condition, it is determined that the content can be used, and the date and time indicated by the secure information is set to the usable period. If not included, it is determined that the content cannot be used.
- the secure information management means manages a use area where the content is used as the secure information, and the condition holding means holds the use condition indicating an area where the content can be used, and the determination means When the use area indicated by the secure information is included in the area where the content, which is the use condition, is available, it is determined that the content can be used, and the use area indicated by the secure information is used. If it is not included in any other area, it is determined that the content cannot be used.
- the card holds the usage conditions and determines whether or not the card can be used. Therefore, a high security level can be maintained, and the host terminal manages the secure information and transmits it to the force. This allows the card to determine whether or not the card can be used based on the secure information. As a result, the host terminal can reproduce the content under appropriate usage conditions. In addition, since the secure information is securely managed in the host terminal, it is possible to prevent the content from being illegally used.
- the card further includes secure information holding means for securely holding card secure information used for judging whether or not the content can be used, and the judging means comprises the secure information and the card secure information. It may be characterized in that whether to use the content is determined based on the information and the usage conditions.
- the card further includes date and time holding means for securely holding the date and time indicated by the secure information obtained last by the information obtaining means, and the determination means is obtained next by the information obtaining means. Date and time indicated by the secured information before the date and time held by the date and time holding means. When it is determined that the content cannot be used by the host terminal.
- the card further includes a region holding unit for securely holding region information indicating a predetermined region, and the determining unit determines that a use region indicated by the security information acquired by the information acquiring unit is used. If it does not match the area indicated by the area information, it is determined that the host terminal cannot use the content.
- the security level can be further improved.
- the present invention can also be realized as a method of the above-mentioned content utilization system, a program of a card and a host terminal provided in the content utilization system, and a storage medium for storing those programs.
- the content use system of the present invention has an advantageous effect when content can be used under appropriate use conditions while maintaining a high security level.
- FIG. 1 is a configuration diagram showing a configuration of a content using system according to Embodiment 1 of the present invention.
- FIG. 2 is a block diagram showing an internal configuration of a host and a card in the above.
- FIG. 3 is a diagram showing contents of information included in a license according to the above.
- FIG. 4 is a sequence diagram showing an operation of the host and the card in the above.
- FIG. 5 is a block diagram showing an internal configuration of a card and a host of the content use system according to the modification of the above.
- FIG. 6 is a flowchart showing an operation of a card according to a modification of the above.
- FIG. 7 is a flowchart showing an operation of a card according to a modification of the above.
- FIG. 8 is a block diagram showing an internal configuration of a host and a card according to Embodiment 2 of the present invention.
- FIG. 9 is a diagram showing the content of information included in a license managed by the license management unit of the above.
- FIG. 10 shows subscription service identification information managed by the subscription service management unit of the above.
- FIG. 7 is a diagram showing the contents of information included in the information.
- FIG. 11 is a flowchart showing the operation of a card use determination unit of the above card.
- FIG. 12 is a diagram showing usage conditions according to a modification of the above.
- FIG. 13 is a block diagram showing an internal configuration of a host and a card according to Embodiment 3 of the present invention.
- FIG. 14 is a diagram showing the contents of information included in a license managed by the license management unit of the above.
- FIG. 15 is a flowchart showing the operation of the card use judgment unit of the above.
- FIG. 16 shows an internal configuration of a card according to Embodiment 4 of the present invention.
- FIG. 17 is a flowchart showing the operation of a card use judgment unit of the above.
- FIG. 1 is a configuration diagram showing a configuration of a content use system according to the present embodiment.
- This content usage system is capable of using content under appropriate usage conditions while maintaining a high security level, and includes a host 100 and a card 200 inserted into the host 100. Te ru.
- the host 100 acquires the encrypted content from the server 300 via a communication line such as the Internet, and decrypts and reproduces the content.
- the card 200 is configured as, for example, an IC (Integrated Circuit) card, and communicates with the host 100 by being inserted into the host 100.
- the card 200 holds a license for the content, and determines whether or not the content can be used based on the usage conditions included in the license. When the card 200 is determined to be usable, the card 200 transfers the content key to the host 100.
- IC Integrated Circuit
- FIG. 2 is a block diagram showing the internal configuration of the host 100 and the card 200.
- the host 100 includes a host communication processing unit 101 that communicates with the card 200, a host authentication management unit 102 that holds authentication information including a secret key and a public key certificate of the host 100, and a revocation list, and a server 300.
- a content storage unit 103 for storing the encrypted content obtained from the content storage unit 103; a playback unit 104 for decoding and playing back the content stored in the content storage unit 103; and a content storage unit 103 for determining whether the content can be used.
- Secure information management unit that securely protects (manages) secure information that is not changed by the user
- the secure information management unit 105 performs anti-tampering by software or software.
- the card 200 includes a card communication processing unit 201 that communicates with the host 100, a card authentication management unit 202 that holds authentication information including a secret key and a public key certificate of the card 200, and a revocation list.
- a license management unit 203 that stores and manages the license 203L; and a usage determination unit 204 that determines whether or not the content can be used.
- An anti-tampering dagger is made by air.
- the host communication processing unit 101 transmits the public key certificate of the authentication information held in the host authentication management unit 102 to the card.
- the card communication processing unit 201 transmits the public key certificate of the authentication information held in the card authentication management unit 202 to the host communication processing unit 101 while transmitting it to the host communication processing unit 101.
- the card communication processing unit 201 performs mutual authentication.
- each of the host communication processing unit 101 and the card communication processing unit 201 authenticates the other party based on the other party's public key certificate, and the identification information for identifying the other party is registered in the revocation list. Make sure that there is no Identification information for identifying an unauthorized device is registered in the revocation list. Therefore, if the host communication processing unit 101 and the card communication processing unit 201 do not have the identification information of the other party registered in the corresponding revocation list, the host communication processing unit 101 and the card communication processing unit 201 regard the other party as a valid party. On the other hand, if the identification information of the other party is registered, the host communication processing unit 101 and the card communication processing unit 201 respectively prohibit communication with the other device.
- the host communication processing unit 101 and the card communication processing unit 201 exchange session keys at the same time as the mutual authentication, so that communication messages are encrypted by the session keys and transmitted and received.
- Establish a secure authentication channel Secure Authenticated Channel, hereinafter referred to as SAC.
- SSL Secure Socket Layer
- TLS Transport Layer Security
- the host 100 and the card 200 authenticate each other to eliminate communication with an unauthorized device, and establish SAC to transmit and receive data. Keep your level high.
- the reproducing unit 104 When reproducing the content, the reproducing unit 104 requests the host communication processing unit 101 for a content key necessary for decrypting the content. Then, upon acquiring the content key from the host communication processing unit 101, the reproducing unit 104 decrypts the content using the content key.
- the secure information management unit 105 specifies the current date and time by measuring the time. a, and a region section 105b for holding a region code indicating a region where the content is used. That is, the secure information management unit 105 manages the current date and time specified by the clock unit 105a and the region code held in the region unit 105b as secure information.
- the host communication processing unit 101 When the host communication processing unit 101 receives the request for the content key from the reproduction unit 104, the host communication processing unit 101 performs a card communication process on the content ID for identifying the content and the secure information managed by the secure information management unit 105. Transmit to section 201. When the host communication processing unit 101 acquires the content key from the card communication processing unit 201 of the card 200, the host communication processing unit 101 outputs the content key to the reproduction unit 104.
- the usage determining unit 204 When the usage determining unit 204 obtains the content ID and the secure information from the host 100 via the card communication processing unit 201, the usage determining unit 204 selects the obtained content ID from the licenses 203L managed by the license managing unit 203. Search for license 203L corresponding to. The use determination unit 204 determines whether the host 100 can use the content of the content ID based on the use condition included in the license 203L corresponding to the search result and the secure information acquired from the host 100. Is determined. If it is determined that the license 203L is available, the usage determining unit 204 transmits the content key included in the license 203L to the host communication processing unit 101 via the card communication processing unit 201.
- FIG. 3 is a diagram showing the contents of information included in license 203L.
- the license 203L includes a usage condition 203a indicating a condition under which the content can be used, and a content key 203b necessary for decrypting the content.
- the usage conditions 203a include a content ID of the content to be used, an available period of the content, an available number of times of the content, and an available code indicating an area where the content is available.
- the usage conditions 203a include a content ID "CONTENT—ID-0001", an available period "November 24, 2002-December 24, 2002", an available number of times of 5, Includes possible codes "1, 2, 3".
- the available code 1 indicates, for example, Japan
- the available code 2 indicates, for example, the United States
- the available code 3 indicates, for example, the United Kingdom.
- FIG. 4 is a sequence diagram showing operations of host 100 and card 200 according to the present embodiment. It is.
- the host 100 and the card 200 authenticate each other, and then establish the SAC (step S 100).
- the host 100 inquires of the card 200 whether or not the content can be used. That is, the host 100 transmits the content ID and the secure information of the content to the card 200 (Step S102).
- the card 200 specifies the license 203L corresponding to the content ID acquired from the host 100 as a key of the license 203L held by the license management unit 203 (step S104).
- the card 200 specifies the license 203L including the use condition 203a as shown in FIG.
- the card 200 stores the secure information acquired from the host 100, the ability to satisfy the use condition 203a included in the license 203L specified in step S104, that is, the content of the acquired content ID is stored in the host 100. Determine whether or not it is available (step S106)
- the current date and time and the region code of the secure information are "13:50 on November 25, 2002" and "1", respectively, and the license 203L including the use condition 203a as shown in FIG.
- the card 200 includes the current date and time and the region code of the secure information in the usable period and the usable code indicated in the use condition 203a, and the usable number of times is five. Therefore, it is determined that the content with the content ID “CONTENT —ID—0001” is available on the host 100. If the current date and time of the security information is not included in the available period or the region code of the secure information is not included in the available area, the content of the card 200 cannot be used on the host 100. Is determined.
- the card 200 determines that the card can be used in step S106, the card 200 transmits the content key 203b included in the license 203L specified in step S104 to the host 100 (step S108)
- the usage count is updated so that the usage count included in the license 203L usage condition 203a is subtracted by one. For example, if the use condition 203a is as shown in FIG. 3, the use determination unit 204 of the card 200 updates the available number of times from five to four.
- the host 100 that has obtained the content key 203b from the card 200 decrypts and reproduces the content using the content key 203b (step S110).
- the host 100 transmits a content ID for identifying other content and secure information to the card 200, and performs the operations in steps S102 to S110 described above. Is repeatedly executed. That is, the host 100 according to the present embodiment transmits the secure information every time the card 100 inquires of the card 200 whether or not the card 200 can be used.
- a high security level is maintained by configuring the content use system from the card 200 and the host 100, which hold the license 203L and are tamper-resistant. It is possible to set the use conditions from a wide viewpoint unlike the case where the secure information is stored in the card 200 by allowing the host 100 to store the secure information to be securely managed in order to determine whether the content can be used. And use the content under appropriate terms and conditions.
- FIG. 5 is a block diagram showing the internal configuration of the card and host 100 of the content use system according to the present modification.
- the content use system according to this modification is characterized in that the card 200a includes the card secure information management unit 205, thereby further improving the security level.
- the card secure information management unit 205 securely protects the card secure information 205a from being changed by the user.
- the card secure information 205a indicates, for example, the current date and time of the secure information notified last from the host 100.
- the current date and time protected by the card security information management unit 205 as the card secure information 205a is hereinafter referred to as the last date and time.
- the use determining unit 204a compares the current date and time and the last date and time included in the secure information.
- the use determination unit 204a determines whether or not use is possible based on the use condition 203a of the license 203L and the secure information, as described above. On the other hand, if the current date and time is before the last date and time, the usage determining unit 204a determines that the host 100 is an unauthorized device, determines that the use of the content is not possible, and determines the host 100 to identify the host 100. The ID is added to the revocation list of the authentication information held by the card authentication management unit 202. Here, the host ID is acquired by the card 200a when the SAC is established between the host 100 and the card 200a or when mutual authentication is performed.
- the card 200a will then attempt to establish mutual authentication and SAC with the host 100 of the host ID, but the host ID will be included in the revocation list. Since it has been registered, the host 100 with that host ID is regarded as invalid, and communication with the host 100 is prohibited.
- the usage determining unit 204a determines that the host 100 is an unauthorized device if the current date and time is before the last date and time. Alternatively, the device may be regarded as an unauthorized device. For example, the predetermined time is about several minutes. By setting the time before the specified time in this way, even when the current date and time is fine-tuned to the correct date and time, the card 200a is clearly prohibited from communicating with unauthorized devices without being affected by the fine-tuning. can do.
- FIG. 6 is a flowchart showing the operation of card 200a according to the present modification.
- the card 200a when performing mutual authentication with the host 100, acquires a host ID for identifying the host 100 from the host 100 (step S200). Then, the card 200a acquires the content ID and the secure information from the host 100 (step S202), and determines whether the current date and time included in the secure information is later than the last date and time protected by the card secure information management unit 205. Is determined (step S204).
- the acquired content ID power also specifies the license 203L (step S206).
- the card 200a determines that it is impossible to use the content by the host 100 that transmitted the security information.
- the host 100 is regarded as an unauthorized device, and the host ID acquired in step S200 is added to the revocation list of the card authentication management unit 202 (step S208).
- the card 200a that has specified the license 203L in step S206 determines whether or not the current date and time, the region code, and the number of uses (for example, once) of the secure information satisfy the use condition 203a (step S210). .
- the card 200a determines that the secure information and the number of times of use satisfy the use condition 203a (Yes in step S210)
- the card 200a transmits the content key 203b to the host 100 (step S212).
- the last date and time protected by the card secure information management unit 205 is updated to the current date and time of the secure information acquired in step S202 (step S214). Also, at this time, the card 200a is updated so that the number of usable times of the use condition 203a is reduced by one.
- the process ends without transmitting the content key 203b to the host 100.
- the card 200a securely manages the current date and time of the secure information last notified from the host 100 as the last date and time, and uses the current date and time before the last date and time as the secure information. Since the host 100 to be notified is excluded, the security level can be further improved.
- the content use system further improves the security level by providing the card 200a with the card secure information management unit 205, similarly to the first modification.
- the card security information 205a protected by the secure information management unit 205 is configured as a card region code indicating a use area of the content.
- the use determining unit 204a compares the region code included in the secure information with the card region code. If the region code and the card region code match, the usage determination unit 204a Based on the usage condition 203a of the sense 203L and the secure information, the availability is determined! If not, the transmission of the content key 203b to the host 100 is prohibited.
- FIG. 7 is a flowchart showing the operation of the card 200a according to the present modification.
- the card 200a first obtains the content ID and the secure information from the host 100 (step S300), and the region code included in the secure information.
- the card region code protected by the card secure information management unit 205 It is determined whether or not the force matches with (step S302).
- the content ID force when it is determined that the card 200a matches (Yes in step S302), the content ID force also specifies the license 203L (step S304). On the other hand, if it is determined that they do not match (No in step S302), the card 200a determines that the content cannot be used by the host 100 that transmitted the secure information, and transmits the content key 203b to the host 100. Without processing.
- the card 200a that has specified the license 203L in step S304 determines whether or not the current date and time, the region code, and the number of times of use of the secure information satisfy the use condition 203a (step S306).
- the card 200a transmits the content key 203b to the host 100 (step S308). Also, at this time, the card 200a is updated so that the number of usable times of the use condition 203a is reduced by one. On the other hand, when the card 200a determines that the secure information and the number of times of use do not satisfy the use condition 203a (No in step S306), the process ends without transmitting the content key 203b to the host 100.
- the security level can be further improved because the card 200a determines whether or not the content can be used in consideration of the card region code.
- the content use system can use contents under appropriate use conditions while maintaining a high security level. Card to be inserted.
- the content usage system determines whether or not the content can be used.
- the feature is that secure information and non-secure information that may be changed by the user are used properly for the judgment according to the type, value, quality, etc. of the services and contents to which the user subscribes. There is.
- FIG. 8 is a block diagram showing an internal configuration of the host and the card in the present embodiment.
- the host 100b includes a host communication processing unit 101b, a host authentication management unit 102, a content storage unit 103, a playback unit 104, a secure information management unit 106, and a non-secure information management unit 107. .
- the card 200b includes a card communication processing unit 201, a card authentication management unit 202, a license management unit 207, a usage determination unit 204b, and a subscription service management unit 206. Is done.
- the secure information management unit 106 securely protects the secure information used to determine whether or not the content can be used, so that the secure information is not changed by the user.
- the secure information management unit 106 is tamper-resistant by hardware or software.
- the secure information management unit 106 in the present embodiment specifies the current date and time by measuring the time, and manages the specified current date and time as secure information. Further, the secure information management unit 106 acquires server time information indicating the current date and time by communicating with the server 300, and determines the current date and time of the secure information managed by itself based on the acquired server time information. It has been corrected.
- the non-secure information management unit 107 protects non-secure information used to determine whether or not the content can be used.
- the non-secure information management unit 107 in the present embodiment specifies the current date and time by measuring the time, and manages the specified current date and time as non-secure information.
- the non-secure information management unit 107 obtains broadcast time information indicating the current date and time from a broadcast station that transmits contents and the like by digital broadcast waves. Then, the current date and time of the non-secure information managed by itself is corrected based on the acquired broadcast time information.
- the broadcast time information indicates the time of a broadcast clock such as TOT (Time Offset Table) and TDT (Time and Date Table).
- the secure information managed by the secure information management unit 106 and the non-secure information managed by the non-secure information management unit 107 are collectively referred to as determination source information.
- the host communication processing unit 101b When receiving the request for the content key from the reproduction unit 104, the host communication processing unit 101b manages the content ID for identifying the content and the secure information management unit 106 or the non-secure information management unit 107.
- the determination source information and the secure identification information for identifying whether the determination source information is secure information or non-secure information are transmitted to the force communication processing unit 201.
- the host communication processing unit 101b determines that the secure information cannot be acquired due to a communication failure or the like, or that the reliability of the secure information is low.
- non-secure information is transmitted as the determination source information instead of the secure information.
- the function of transmitting secure information or non-secure information and secure identification information attached to a content ID is the first embodiment.
- other functions are the same as the other functions of the host communication unit 101 of the first embodiment.
- the license management unit 207 stores and manages a plurality of licenses 207L indicating a service mode of the content.
- FIG. 9 is a diagram showing the contents of information included in the license 207L managed by the license management unit 207.
- the license 207L includes a use condition 207a indicating a condition under which the content can be used, and a content key 207b necessary for decrypting the content.
- the use condition 207a includes the content ID of the content to be used, the usable period of the content, the number of times the content can be used, and the service mode of the content.
- the usage condition 207a indicates that the content ID “CONTENT—ID—0001” Includes the period “November 24, 2002-December 24, 2002”, five usable times, and service form “PPV”.
- PV means “Pay Per View”, and when content corresponding to the license 207L is downloaded via a network, a fee will be charged according to the number of downloads and the number of views. Is shown.
- the subscription service management unit 206 stores and manages subscription service identification information indicating the type of service (subscription service) that a user subscribes to.
- FIG. 10 is a diagram showing contents of information included in subscription service identification information 206b managed by subscription service management section 206.
- the subscription service identification information 206b includes names of various services and an identifier indicating whether or not the user has subscribed to the service.
- the subscription service identification information 206b includes "broadcast service” and "communication service” as service names, and an identifier "@” indicating that the user subscribes to the broadcast service. And an identifier “X” indicating that the user has not subscribed to the communication service.
- the “broadcasting service” refers to a service that provides contents and licenses of broadcasting stations through digital broadcasting waves
- the “communication service” transmits contents and licenses from a server of a content provider to the Internet. Means the service provided through the Internet.
- the usage determining unit 204b checks the licenses 207L managed by the license management unit 207. From among them, the license 207L corresponding to the acquired content ID is specified. Then, the usage determining unit 204b uses the content of the content ID in the host 100b based on the usage condition 207a included in the specified license 207L and the determination source information and the secure identification information acquired from the host 100b. Determine if you can. When determining that the license key 207L is available, the usage determining unit 204b transmits the content key 207b included in the license 207L to the host communication processing unit 101b via the card communication processing unit 201.
- FIG. 11 is a flowchart showing an operation of use determining section 204b of card 200b of the present embodiment.
- the use determining unit 204b acquires a content ID, determination source information, and secure identification information from the host 100b via the card communication processing unit 201 (step S400). Then, the use determining unit 204b specifies the subscription service of the user based on the subscription service identification information 206b of the subscription service management unit 206 (Step S402).
- usage determining unit 204b determines whether or not the non-secure information can be used to determine whether or not the content can be used (step S402). S404). For example, when “the user has subscribed to only the broadcasting service” is indicated in the subscription service identification information 206b, the usage determining unit 204b considers that the secure information cannot be obtained by communication. However, if it is determined that non-secure information can be used and “the user has subscribed to the communication service” is indicated in the subscription service identification information 206b, the usage determining unit 204b acquires the secure information by communication. Considering that the non-secure information can be used, it is determined that the non-secure information is unusable.
- step S404 If it is determined in step S404 that the non-secure information is usable (Yes in step S404), the use determination unit 204b selects the step S400 from the licenses 207L managed by the license management unit 207. Then, the license 207L corresponding to the content ID acquired in step S207 is specified (step S406).
- the usage determination unit 204b determines that the current date and time and the number of uses of the determination source information satisfy the usage condition 207a. It is determined whether or not (step S408).
- the usage determining unit 204b determines that the current date and time and the number of uses of the determination source information satisfy the usage condition 207a (Yes in step S408), the usage determining unit 204b transmits the content key 207b to the host 100b. Send (step S410). On the other hand, the usage determining unit 204b transmits the content key 207b to the host 100b when determining that the current date and time and the number of times of use of the determination source information satisfy the usage condition 207a (No in step S408). End processing without
- step S404 If it is determined in step S404 that non-secure information cannot be used (step S40 No. 4), the usage determining unit 204b specifies the license 207L corresponding to the content ID acquired in step S400 as described above (step S412). Further, the use determining unit 204b specifies the service mode indicated by the use condition 207a of the license 207L specified in step S412 (step S414).
- usage determining unit 204b determines whether the non-secure information is usable or not in determining whether the content can be used (step S416). For example, when “PPV” is indicated in the usage condition 207a as the service mode, the use determination unit 204b cannot use the non-secure information in consideration of that “PPV” indicates high-value content. Is determined. Further, for example, when “monthly” is indicated as the service form in the usage condition 207a, the use determination unit 204b determines that the non-secure information is usable. Here, “monthly” indicates that viewing of the content corresponding to the license requires a monthly viewing period contract.
- the usage determination unit 204b determines that the non-secure information is usable, and “HD video quality” is displayed as the service mode. Is indicated in the usage condition 207a, the usage determination unit 204b determines that the non-secure information is unusable.
- SD image quality indicates that the content corresponding to the license has standard image quality
- HD image quality indicates that the content corresponding to the license has high standard image quality. Show.
- step S416 When it is determined in step S416 that the non-secure information is usable (Yes in step S416), the use determining unit 204b executes the processing from step S408 described above. On the other hand, if the non-secure information is determined to be unusable in step S416 (No in step S416), the usage determining unit 204b further obtains the non-secure information in step S400 based on the secure identification information obtained in step S400. It is determined whether or not the determined information is secure information (Step S418).
- step S4108 when the use determining unit 204b determines that the information is not secure information (No in step S418), the process ends without transmitting the content key 207b to the host 100b, and determines that the information is secure information. Then (Yes in step S418), it is further determined whether or not the current date and time and the number of times of use of the secure information as the determination source information satisfy the usage condition 207a (step S418). 420). When determining that the current date and time and the number of uses of the secure information satisfy the use condition 207a (Yes in step S420), the use determination unit 204b transmits the content key 207b to the host 100b (step S422).
- the use determination unit 204b determines that the current date and time and the number of uses of the secure information satisfy the use condition 207a (No in step S420), the use determination unit 204b does not transmit the content key 207b to the host 100b. The process ends.
- the determination source information from the host is secure. It is determined whether or not the current date and time of the determination source information irrespective of whether the information is power zone secure information satisfies the use condition. Therefore, in the present embodiment, when the user subscribes only to services for which secure information is not required as judgment source information, that is, only to services for which the host does not need to securely manage the current date and time. In addition, it is possible to easily perform the determination without using the secure information to determine whether the content can be used.
- the determination source information from the host is transmitted to the secure information. It is determined whether or not the current date and time of the determination source information irrespective of whether the information is power-zone secure information satisfies use conditions. Therefore, in the present embodiment, when a user tries to view content for which secure information is not required as the determination source information, that is, content for which the host does not need to securely manage the current date and time, use of the content is prohibited. It is possible to easily perform the determination without using the secure information for the determination of availability.
- the availability of non-secure information is determined based on the service mode of the content, but may be determined based on the type of usage condition. For example, if the usage conditions include the usable period, the non-secure information is determined to be unusable, and if the usage conditions include the cumulative usage time, the non-secure information is determined to be usable. .
- step S402 and the process associated with step S414 are performed continuously, but only one of the processes may be performed. That is, the book In the embodiment, whether or not non-secure information can be used is determined based on the subscription service and the service form. However, the determination may be based on only one of the subscription service and the service form.
- the usage condition 207a working in the present variation indicates whether or not there is a flag instead of the above-described service mode.
- the presence or absence of this flag explicitly indicates whether it is possible to use non-secure information to determine whether or not the content can be used.
- the flag “present” indicates that non-secure information cannot be used to determine the availability of content, that is, only secure information can be used.
- the flag “absent” indicates that non-secure information can be used to determine whether the content can be used.
- FIG. 12 is a diagram showing a use condition 207a according to the present modification.
- the use condition 207a includes a content ID of the content to be used, a usable period of the content, a usable number of times of the content, and information indicating the presence or absence of the above-described flag.
- the usage condition 207a includes a content ID "CONTENT—ID-0001", an available period "November 24, 2002-December 24, 2002”, and an available number of times "5". ,flag
- the use determining unit 204b determines whether the non-secure information can be used to determine whether the content can be used or not based on the presence or absence of the flag instead of the service mode. For example, when the flag “Yes” is indicated in the usage condition 207a, the usage determining unit 204b determines that the non-secure information is unusable. When the flag “absence” is indicated in the use condition 207a, the use determination unit 204b determines that the non-secure information is usable.
- the subscription service management unit 206 may be provided in the power host 100b provided in the card 200b. In this case, the host 100b transmits the subscription service identification information 206b of the subscription service management unit 206 together with the content ID to the card 200b.
- the content usage system can use content under appropriate usage conditions while maintaining a high security level, as in Embodiment 1 or Embodiment 2. And a card to be inserted into the host
- the content use system uses secure information and non-secure information as information to be used in determining whether or not content can be used, according to the acquisition status of server time information, which is secure information. There is a feature.
- FIG. 13 is a block diagram showing an internal configuration of the host and the card according to the present embodiment.
- the host 100c includes a host communication processing unit 101c, a host authentication management unit 102, a content storage unit 103, a playback unit 104, a secure information management unit 106, and a non-secure information management unit 107. .
- the card 200c includes a card communication processing unit 201, a card authentication management unit 202, a license management unit 208, and a use determination unit 204c, and is tamper-resistant by hardware.
- the host communication processing unit 101c When receiving the request for the content key from the reproducing unit 104, the host communication processing unit 101c manages the content ID for identifying the content and the secure information managing unit 106 or the non-secure information managing unit 107. Determination source information, secure identification information for identifying whether the determination source information is secure information or non-secure information, and the power of obtaining server time information from the server 300 within a predetermined period. Security indicating whether or not The key confirmation information is transmitted to the card communication processing unit 201. For example, the host communication processing unit 101c in the present embodiment stores the acquisition date and time when the secure information management unit 106 acquired the server time information from the server 300, and changes the acquisition date and time within the predetermined period before the current date and time.
- secure confirmation information indicating that the server time information has been acquired within a predetermined period is transmitted.
- the host communication processing unit 101c transmits secure confirmation information indicating that server time information has not been acquired within the predetermined period.
- the information indicating the predetermined period may be managed (stored) in the use determining unit 204c of the card 200c or the like, and may be included in the license 208L of the license management unit 208.
- the predetermined period can be changed for each content.
- the predetermined period may be set so that the transmitting power of the content can be changed.
- the function of transmitting secure information or non-secure information, secure identification information, and secure confirmation information attached to a content ID is implemented.
- other functions are the same as the other functions of the host communication unit 101 of the first embodiment.
- the license management unit 208 stores and manages a plurality of licenses 208L for each content.
- FIG. 14 is a diagram showing the contents of information included in the license managed by the license management unit 208.
- the license 208L includes a use condition 208a indicating a condition under which the content can be used, and a content key 208b necessary for decrypting the content.
- the use condition 208a does not include the usable code of the first embodiment, the service form of the second embodiment, and the like, and includes the content ID of the content to be used, the usable period of the content, and And the number of possible times.
- the use condition 208a includes a content ID “CONTENT-ID-0001”, a usable period “November 24, 2002 to December 24, 2002”, and five usable times.
- the usage determining unit 204c acquires the content ID, the determination source information, the secure identification information, and the secure confirmation information from the host 100c via the card communication processing unit 201, the usage determining unit 204c
- the license 208L corresponding to the acquired content ID is specified from among the licenses 208L.
- the usage determining unit 204c determines the content ID of the host 100c. It is determined whether or not the user can use the content. If it is determined that the license key 208L is available, the usage determining unit 204c transmits the content key 208b included in the license 208L to the host communication processing unit 101c via the card communication processing unit 201.
- FIG. 15 is a flowchart showing the operation of use determining section 204c of card 200c in the present embodiment.
- the use determining unit 204c acquires a content ID, determination source information, secure identification information, and secure confirmation information from the host 100c via the card communication processing unit 201 (step S500). Then, the usage determining unit 204c specifies the license 208L corresponding to the content ID acquired in step S500 (step S502).
- usage determining unit 204c determines whether or not the server time information is obtained from server 300 within a predetermined period (step S500). 504).
- the use determining unit 204c determines whether or not the determination source information acquired in step S500 is secure information. Regardless of this, it is determined whether the current date and time and the number of times of use of the determination source information satisfy the use condition 208a (step S506). That is, when the server time information is acquired within a predetermined period, the use determining unit 204c corrects the current date and time of the secure information accurately, and as a result, it is considered that the credibility of the non-secure information is high. It has been determined that the current date and time may be regarded as the current date and time of the secure information.
- step S506 when the use determining unit 204c determines that the current date and time and the number of uses of the determination source information satisfy the use condition 208a (Yes in step S506), the use determination unit 204c transmits the content key 208b to the host 100c. Send it (step S508).
- the usage determining unit 204c When it is determined that the current date and time and the number of times of use of the original information do not satisfy the use condition 208a (No in step S506), the process ends without transmitting the content key 208b to the host 100c.
- step S504 determines in step S504 that the information has not been obtained within the predetermined period (No in step S504)
- the usage determining unit 204c further determines the! Based on the secure identification information obtained in step S500. Then, it is determined whether or not the determination source information acquired in step S500 is secure information (step S510).
- the use determining unit 204c determines that the information is not secure information (No in step S510)
- the use determining unit 204c ends the process without transmitting the content key 208b to the host 100c, and determines that the information is secure information ( It is determined whether the current date and time and the number of times of use of the secure information as the determination source information satisfy the use condition 208a (Yes in step S510) (step S512).
- the use determining unit 204c transmits the content key 208b to the host 100c (step S514).
- the usage determination unit 204c when determining that the current date and time and the number of times of use of the secure information satisfy the usage condition 208a (No in step S512), the usage determination unit 204c does not transmit the content key 208b to the host 100c. The process ends.
- the non-secure information is usable based on whether or not the server time information, which is the secure information, is acquired within a predetermined period.
- it is determined whether or not the current date and time of the determination source information irrespective of whether the determination source information from the host is secure information that is secure information satisfies the use condition. That is, in the present embodiment, when the host performs an operation of appropriately correcting the current date and time of the secure information, the current date and time of the non-secure information is also regarded as reliable.
- the host is performing an operation to appropriately correct the current date and time of the secure information, it is easy to make the determination without using the secure information to determine whether or not the content can be used. Can be done.
- the secure confirmation information indicates the date and time when the server time information was acquired from the server 300, indicating whether the server time information was acquired within a predetermined period. Is also good.
- use the card 200c that has obtained the secure confirmation information The determination unit 204c determines whether or not the server time information has been acquired within a predetermined period based on the date and time indicated in the secure confirmation information.
- the use determination unit 204c of the card 200c stores the secure information (server time information) obtained last from the host 100c, and indicates the date and time indicated by the server time information and the secure confirmation information. By comparing with the date and time, it is determined whether or not the server time information has been acquired within a predetermined period.
- server time information may be directly obtained from the server 300 and stored.
- the card 200c may prompt the host 100c to transmit the secure confirmation information to the card 200c or to acquire the secure information by communication at a timing according to the predetermined period.
- the content usage system can use content under appropriate usage conditions while maintaining a high security level, as in the first to third embodiments.
- the card is characterized, and the host of the present embodiment is the same as the host 100b of the second embodiment.
- the card according to the present embodiment is characterized in that even when non-secure information is obtained as the determination source information, the content can be used by the host under predetermined restrictions regardless of the content of the non-secure information. .
- FIG. 16 is a block diagram showing an internal configuration of the card according to the present embodiment.
- the card 200d includes a card communication processing unit 201, a card authentication management unit 202, a license management unit 208, and a use determination unit 204d, and is tamper resistant by hardware.
- the usage determining unit 204d sends the content ID to the host 100b via the card communication processing unit 201. After obtaining the determination source information and the secure identification information, the license 208L corresponding to the obtained content ID is specified from the plurality of licenses 208L managed by the license management unit 208. Then, the usage determining unit 204d uses the content of the content ID in the host 100b based on the usage conditions 208a included in the specified license 208L and the determination source information and the secure identification information obtained from the host 100b. Determine if you can.
- the usage determining unit 204d transmits the content key 208b included in the license 208L to the host communication processing unit 101b via the card communication processing unit 201.
- the use determination unit 204d of the card 200d according to the present Make content available to the host under certain restrictions, such as limiting time.
- FIG. 17 is a flow chart showing the operation of use determining section 204d of card 200d in the present embodiment.
- the use determining unit 204d acquires the content ID, the determination source information, and the secure identification information via the card communication processing unit 201 with the host 100b (step S600). Then, the use determining unit 204d specifies the license 208L corresponding to the content ID acquired in step S600 (step S602).
- step S604 usage determining unit 204d determines whether or not the determination source information obtained in step S600 is secure information.
- step S606 when the usage determining unit 204d determines that the information is secure information (Yes in step S604), the current date and time and the number of times of use of the secure information as the determination source information satisfy the usage condition 208a. It is determined whether or not (step S606).
- step S606 When determining in step S606 that the current date and time and the number of times of use of the secure information satisfy the use condition 208a (Yes in step S606), the use determining unit 204d transmits the content key 208b to the host 100b (step S606). Step S608).
- step S606 When it is determined in step S606 that the current date and time and the number of times of use of the secure information do not satisfy the use condition 208a (No in step S606), the use determination unit 204d transmits the content key 208b to the host 100b. The process ends without any processing.
- the use determining unit 204d determines that the information is not secure information in step S604 (No in step S604), the use determining unit 204d transmits the use restriction information and the content key 208b to the host 100b (step S610).
- This use restriction information indicates the contents that limit the number of times of reproduction, reproduction time, reproduction time limit, reproduction image quality, and the like of the content to be reproduced by the host 100b.
- the usage restriction information indicates that the number of playbacks is up to three times, that the total playback time is up to 30 minutes, that the playback expiration date is until April 1, 2005, and that the playback image quality is low. Indicates a level.
- the host 100b that has obtained such usage restriction information and the content key 208b decrypts the content using the content key 208b, and reproduces the content within the range restricted by the usage restriction information.
- the determination source information is not secure information !
- the content is made available to the host under a predetermined restriction, so that user convenience is improved. It comes out.
- usage determining section 204d transmits the secure information to the user who transmitted content key 208b and usage restriction information. May be transmitted.
- the host 100b that has acquired the message information presents the content indicated in the message information to the user and prompts the user to transmit the secure information.
- the card transmits only the content key to the host when it is determined that the content can be used.
- Rendering conditions (corresponding to the use restriction information of the fourth embodiment) related to rendering of the content, such as playback time and playback quality, may be transmitted together with the content key.
- the host according to the first to third embodiments and the modification reproduces the content according to the rendering condition. For example, if the rendering condition is "reproduction time 30 minutes", the host decrypts the content with the content key and then plays the content for only 30 minutes.
- the above rendering conditions are based on the power contained in the license.
- the information may be included in the license or may be stored in advance on the card regardless of the license.
- the host 100 transmits both the current date and time and the region code as secure information to the cards 200 and 200a. , 200a.
- the host can specify the license that transmitted the content ID to the card, other information may be transmitted.
- the license ID is transmitted. You may.
- the host asks the card whether or not the card can be used.
- the host transmits the secure information or the non-secure information only when the SAC is established. May be.
- the host sends secure information or non-secure information when establishing SAC, and then sends only the content ID when inquiring about the availability.
- the card determines the availability of the content based on the secure information or the non-secure information acquired at the time of establishing the SAC.
- the host may transmit secure information or non-secure information when the card is initialized.
- the host when the card is inserted into the host, the host initializes the card, and then transmits secure information or non-secure information. For example, when the card is removed from the host, when the power supply to the card or the host is stopped, when the secure information or the non-secure information is transmitted to the card and a predetermined time has passed, the SAC is disconnected. The host deletes the secure information held on the card.
- the host authentication management unit 102 and the card authentication management unit 202 each send the latest revocation list to the server 300 or another server (hereinafter, simply referred to as a server) at any time. ).
- the host authentication management unit 102 acquires the revocation list from the server via the host communication processing unit 101, and the card authentication management unit 202 transmits the revocation list from Sano via the card communication processing unit 201.
- the card authentication management unit 202 determines the terminal device and the card communication processing that can be connected to the server.
- a revocation list is obtained via the control unit 201.
- the card authentication management unit 202 acquires the revocation list with the cards 200 and 200a inserted in the terminal device.
- the card authentication management unit 202 may also acquire the revocation list acquired by the host authentication management unit 102 as described above from the host authentication management unit 102.
- the revocation list acquired by the unit 202 as described above may be acquired from the card authentication management unit 202.
- the host communication processing unit 101 and the card communication processing unit 201 communicate with the server in order to prevent tampering of the revocation list and retransmission attacks. Communication between SACs is performed.
- the secure information management unit 105 of the host 100 manages the secure information.
- the secure information may be acquired by the server and managed by the server.
- the secure information management unit 105 acquires the current date and time as secure information from the server via the host communication processing unit 101, and transmits the current date and time to the cards 200 and 200a.
- the card secure information management unit 205 manages the last date and time of the current date and time notified from Sano via the host 100 last.
- the secure information management unit 105 of the host 100 acquires the secure information from Sanoku and obtains the cards 200, 200a. Send to
- the card 200a determines that the host 100 cannot use the content and transmits the content key 203b.
- the unexecuted card 200a may transmit the content key 203b even if the region code and the card region code do not match.
- the region code or the card region code matches the usable code of the use condition 203a, and the current date and time and the number of times of use of the secure information satisfy the use condition 203a
- the content of the host 200 is stored in the card 200a. Is determined to be usable, and the content key 203b is transmitted to the host 100.
- the content use system according to the present invention maintains a high security level and It has an effect that contents can be used under various usage conditions, and can be applied to, for example, a content reproduction system that reproduces contents such as a movie distributed via the Internet.
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Graphics (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/579,701 US20080040282A1 (en) | 2004-05-10 | 2005-04-26 | Content Use System |
JP2006512959A JPWO2005109209A1 (ja) | 2004-05-10 | 2005-04-26 | コンテンツ利用システム |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2004-140358 | 2004-05-10 | ||
JP2004140358 | 2004-05-10 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005109209A1 true WO2005109209A1 (ja) | 2005-11-17 |
Family
ID=35320383
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2005/007890 WO2005109209A1 (ja) | 2004-05-10 | 2005-04-26 | コンテンツ利用システム |
Country Status (4)
Country | Link |
---|---|
US (1) | US20080040282A1 (ja) |
JP (1) | JPWO2005109209A1 (ja) |
CN (1) | CN1950809A (ja) |
WO (1) | WO2005109209A1 (ja) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008079091A (ja) * | 2006-09-22 | 2008-04-03 | Fujitsu Ltd | 電子証明書を用いる認証システム |
JP2012190421A (ja) * | 2011-03-14 | 2012-10-04 | Toshiba Corp | 携帯可能電子装置、及び携帯可能電子装置の制御方法 |
WO2013175851A1 (ja) * | 2012-05-21 | 2013-11-28 | ソニー株式会社 | 情報処理装置、情報処理システム、および情報処理方法、並びにプログラム |
JP2014139803A (ja) * | 2014-02-25 | 2014-07-31 | Toshiba Corp | 携帯可能電子装置、及び携帯可能電子装置の制御方法 |
JP2016048575A (ja) * | 2015-12-01 | 2016-04-07 | 株式会社東芝 | 携帯可能電子装置、及び携帯可能電子装置の制御方法 |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009140447A (ja) * | 2007-12-11 | 2009-06-25 | Nec Corp | ネットワークシステム、端末、ネットワーク方法及びプログラム |
KR101495722B1 (ko) * | 2008-01-31 | 2015-02-26 | 삼성전자주식회사 | 홈 네트워크에서의 통신 보안성을 보장하는 방법 및 이를위한 장치 |
DE102008010788B4 (de) * | 2008-02-22 | 2013-08-22 | Fachhochschule Schmalkalden | Verfahren zur Authentisierung und Authentifizierung von Personen und Einheiten |
GB2499787B (en) * | 2012-02-23 | 2015-05-20 | Liberty Vaults Ltd | Mobile phone |
US10515021B2 (en) * | 2012-03-09 | 2019-12-24 | Sony Corporation | Information processing to set usage permission in content |
GB2517732A (en) * | 2013-08-29 | 2015-03-04 | Sim & Pin Ltd | System for accessing data from multiple devices |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH1141229A (ja) * | 1997-07-18 | 1999-02-12 | Fuji Xerox Co Ltd | アクセス制御装置及びアクセス制御プログラムを記録した媒体 |
JP2002268549A (ja) * | 2001-03-06 | 2002-09-20 | Sharp Corp | 情報へのアクセス制御方法、情報へのアクセス制御装置、情報へのアクセス制御ネットワークシステム、情報へのアクセス制御プログラム |
JP2003256704A (ja) * | 2002-02-28 | 2003-09-12 | Toshiba Corp | ポイント生成装置、携帯端末、ポイント管理サーバ及びポイント管理システム |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4043828B2 (ja) * | 2001-04-19 | 2008-02-06 | 松下電器産業株式会社 | ライセンス管理システム、ライセンス管理装置及び中継装置 |
CN1237804C (zh) * | 2001-04-19 | 2006-01-18 | 松下电器产业株式会社 | 许可证管理系统、许可证管理设备、中继设备和终端设备 |
US7904392B2 (en) * | 2001-10-25 | 2011-03-08 | Panasonic Corporation | Content usage rule management system |
US20040093509A1 (en) * | 2002-11-12 | 2004-05-13 | Gidon Elazar | Method and apparatus for connecting a storage device to a television |
JP4343542B2 (ja) * | 2003-01-30 | 2009-10-14 | ソニー株式会社 | 情報処理システム、情報処理装置および情報処理方法、並びにプログラムおよび記録媒体 |
US7685642B2 (en) * | 2003-06-26 | 2010-03-23 | Contentguard Holdings, Inc. | System and method for controlling rights expressions by stakeholders of an item |
NZ551233A (en) * | 2004-04-14 | 2009-04-30 | Digital River Inc | Geographic location based licensing system |
-
2005
- 2005-04-26 US US11/579,701 patent/US20080040282A1/en not_active Abandoned
- 2005-04-26 CN CNA2005800149443A patent/CN1950809A/zh active Pending
- 2005-04-26 JP JP2006512959A patent/JPWO2005109209A1/ja active Pending
- 2005-04-26 WO PCT/JP2005/007890 patent/WO2005109209A1/ja active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH1141229A (ja) * | 1997-07-18 | 1999-02-12 | Fuji Xerox Co Ltd | アクセス制御装置及びアクセス制御プログラムを記録した媒体 |
JP2002268549A (ja) * | 2001-03-06 | 2002-09-20 | Sharp Corp | 情報へのアクセス制御方法、情報へのアクセス制御装置、情報へのアクセス制御ネットワークシステム、情報へのアクセス制御プログラム |
JP2003256704A (ja) * | 2002-02-28 | 2003-09-12 | Toshiba Corp | ポイント生成装置、携帯端末、ポイント管理サーバ及びポイント管理システム |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008079091A (ja) * | 2006-09-22 | 2008-04-03 | Fujitsu Ltd | 電子証明書を用いる認証システム |
JP2012190421A (ja) * | 2011-03-14 | 2012-10-04 | Toshiba Corp | 携帯可能電子装置、及び携帯可能電子装置の制御方法 |
WO2013175851A1 (ja) * | 2012-05-21 | 2013-11-28 | ソニー株式会社 | 情報処理装置、情報処理システム、および情報処理方法、並びにプログラム |
JPWO2013175851A1 (ja) * | 2012-05-21 | 2016-01-12 | ソニー株式会社 | 情報処理装置、情報処理システム、および情報処理方法、並びにプログラム |
JP2014139803A (ja) * | 2014-02-25 | 2014-07-31 | Toshiba Corp | 携帯可能電子装置、及び携帯可能電子装置の制御方法 |
JP2016048575A (ja) * | 2015-12-01 | 2016-04-07 | 株式会社東芝 | 携帯可能電子装置、及び携帯可能電子装置の制御方法 |
Also Published As
Publication number | Publication date |
---|---|
CN1950809A (zh) | 2007-04-18 |
US20080040282A1 (en) | 2008-02-14 |
JPWO2005109209A1 (ja) | 2008-03-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2005109209A1 (ja) | コンテンツ利用システム | |
US7568234B2 (en) | Robust and flexible digital rights management involving a tamper-resistant identity module | |
US7458101B2 (en) | Information viewing/listening system, information player, and information provider | |
US6898708B2 (en) | Device for reproducing data | |
EP1513040B1 (en) | System and method for distributing content access data | |
JP4824309B2 (ja) | ネットワークを介して、コンテンツプロバイダから提供されるデジタルコンテンツを監視する方法 | |
EP1815378B1 (en) | Technique for registering a device with a rights issuer system | |
US20090037728A1 (en) | Authentication System, CE Device, Mobile Terminal, Key Certificate Issuing Station, And Key Certificate Acquisition Method | |
US20080109882A1 (en) | Drm System For Devices Communicating With A Portable Device | |
US8997216B2 (en) | Recording medium apparatus and control method for authenticating a device based on a revocation list | |
JP2004072721A (ja) | 認証システム、鍵登録装置及び方法 | |
US20030009667A1 (en) | Data terminal device that can easily obtain content data again, a program executed in such terminal device, and recording medium recorded with such program | |
CN103370944A (zh) | 具有数字版权管理的客户端装置和本地站以及随其使用的方法 | |
EP1684222A1 (en) | License management method, information processing apparatus, information processing method, and program | |
JP2004133654A (ja) | 記憶装置、端末装置およびサーバ装置 | |
WO2006135078A1 (ja) | コンテンツの利用端末を制限する方法、記憶装置およびシステム | |
JP2004318448A (ja) | コンテンツ保護機能付き端末装置 | |
JP2004303107A (ja) | コンテンツ保護システム及びコンテンツ再生端末 | |
JP3788572B2 (ja) | レンタルコンテンツ流通システムおよびその方法 | |
JP2004135021A (ja) | 記憶装置およびサーバ装置 | |
JP4556615B2 (ja) | 情報格納方式及び情報格納方法及び受信情報提供装置及び情報記憶端末 | |
JP2004254193A (ja) | ユーザ機器、サーバ、コンテンツ流通システム、コンテンツ流通方法、及びプログラム | |
JP2003346000A (ja) | コンテンツ配信システムおよび方法 | |
JP4904728B2 (ja) | コンテンツ配信システム、クライアント端末、プログラム及び記録媒体 | |
JP2000322320A (ja) | コンテンツディレクトリシステム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
DPEN | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed from 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2006512959 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11579701 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 200580014944.3 Country of ref document: CN |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
122 | Ep: pct application non-entry in european phase | ||
WWP | Wipo information: published in national office |
Ref document number: 11579701 Country of ref document: US |