WO2006006241A1 - Système de distribution de contenu et dispositif de lancement - Google Patents

Système de distribution de contenu et dispositif de lancement Download PDF

Info

Publication number
WO2006006241A1
WO2006006241A1 PCT/JP2004/010038 JP2004010038W WO2006006241A1 WO 2006006241 A1 WO2006006241 A1 WO 2006006241A1 JP 2004010038 W JP2004010038 W JP 2004010038W WO 2006006241 A1 WO2006006241 A1 WO 2006006241A1
Authority
WO
WIPO (PCT)
Prior art keywords
content
user
information
file
downloaded
Prior art date
Application number
PCT/JP2004/010038
Other languages
English (en)
Japanese (ja)
Inventor
Naoto Suzuki
Original Assignee
D4 Enterprise, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by D4 Enterprise, Inc. filed Critical D4 Enterprise, Inc.
Priority to PCT/JP2004/010038 priority Critical patent/WO2006006241A1/fr
Priority to JP2006527671A priority patent/JPWO2006006241A1/ja
Publication of WO2006006241A1 publication Critical patent/WO2006006241A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]

Definitions

  • the present invention relates to a content distribution system that downloads content such as games, images, movies, and music, and a launcher that downloads and executes content using such a distribution system.
  • Patent Document 1 a hardware key is prepared at a terminal of a computer, and a check is made whether the hardware key matches at start-up. There is something that only activates content when. However, installing such a hardware key is not easy for the user. The hardware key gets in the way again.
  • Patent Document 1 JP 2004-133576 A
  • the present invention can protect content when downloading content in a content distribution system, and also route unauthorized copying when content is illegally copied. It is an object of the present invention to provide a content distribution system and launcher that can suppress the distribution of content files through a file exchange system.
  • a content distribution system is a download server in which a plurality of downloadable contents are stored, user information, and content of each user.
  • a database server that stores purchase history information, download server content information, an application server that provides an authentication function, a user terminal that downloads content from a download server, and executes the downloaded content;
  • a content distribution system consisting of a download server, an application server, and a network connecting user terminals.
  • a download server and other contents are downloaded to the user terminals, and a launcher for executing the downloaded contents is provided.
  • the launcher When launching for the first time, the launcher performs user ID and password registration processing, obtains device specific information of the user terminal, and stores the user ID, password, and device specific information locally.
  • download the content from the download server decompress the downloaded content, and register it in the local registration information. If the user ID and device-specific information are added and compressed and saved again, and the content is activated, the saved content is decompressed, and the user ID and device-specific information are extracted from the decompressed content.
  • the user ID and device specific information extracted from the decompressed content is compared with the user ID and device specific information registered as local registration information, and the content is activated only when they match.
  • the content stored in the download server is game content
  • the game content is obtained from an emulator of the game execution environment and the game content.
  • the content stored in the download server is a content of a still image, a moving image, or music.
  • An executable file is generated from a player that reproduces content, and the executable file is compressed and protected.
  • a history of downloaded content is further registered in the local registration information storage unit, and the content stored in the content storage unit is registered as local registration information. This is characterized in that the history of downloaded contents is collated, and if the contents do not match, an illegal content warning is issued.
  • the stored content is decompressed, the user ID and device-specific information are extracted from the decompressed content, and the user ID and device-specific information extracted from the decompressed content The information is compared with the user ID and device-specific information registered as local registration information. If they do not match, an illegal content warning is issued.
  • a sixth invention provides an authentication unit that performs authentication processing using a user ID and a password, a download processing unit that downloads content, a content execution processing unit that performs processing to execute content, and a protection process for downloaded content
  • a protection processing unit for performing the registration, a local registration information storage unit for storing the local registration information, and a content storage unit for storing the downloaded content.
  • the content execution processing unit decompresses the content stored in the content storage unit, extracts the user ID and device specific information from the decompressed content, and retrieves the user extracted from the decompressed content.
  • the feature is that the ID and device-specific information are compared with the user ID and device-specific information registered as local registration information, and the contents are executed only when they match.
  • the downloaded content file is decompressed to generate an executable game content file and executed.
  • a special feature is to execute the game contents by emulating the execution environment with an emulator included in a game content file in a possible format.
  • the downloaded content file is decompressed and the content file is an executable game. And a still image, a moving image, or music content is generated by a player included in an executable game content file.
  • the history of the downloaded content is further registered in the local registration information storage unit, the content registered in the content storage unit, and the local registration information storage unit Compared with the history of downloaded content that has been saved, if the contents do not match, a warning is given for illegal content.
  • the stored content is decompressed, and the user ID and the device-specific information are extracted from the decompressed content. Compare the user ID and device specific information retrieved from the user ID and device specific information registered as local registration information, and if they do not match, warn of illegal content.
  • a download server storing a plurality of downloadable contents, user information, purchase history information of each user's content, and content information of the download server
  • a database server that stores data, an application server that provides an authentication function, a user terminal that downloads content from a download server and executes the downloaded content, a download server, an application server, and a user terminal
  • a content distribution system that consists of a network that connects the two, downloading content from a download server to a user terminal and installing a launcher that executes the downloaded content.
  • Distribution of content files in the file exchange system can be suppressed.
  • the content stored in the download server is the content of the game
  • the content of the game is stored in an emulator and a game in the game execution environment. Since the executable file is generated from the content of the game, and the executable file is compressed and protected, the game content can be executed only on a special launcher. Protection can be achieved.
  • the content stored in the download server is a still image, a moving image, or a music content
  • the still image, the moving image, or the music content and its content are reproduced.
  • An executable file is generated from the player, and the executable file is compressed and removed from the file, so still images, videos, or music content can be played only on a special launcher. As a result, content can be protected.
  • the downloaded content history is further registered in the local registration information storage unit, the content stored in the user terminal, and the downloaded content registered as local registration information. If the contents do not match, an illegal content warning is issued, so that the path of the illegally acquired content can be known and the distribution of the content file in the file exchange system can be suppressed. wear.
  • the stored content is decompressed, the user ID and the device-specific information are extracted from the decompressed content, and the user is retrieved from the decompressed content.
  • the ID and device specific information are compared with the user ID and device specific information registered as local registration information. If they do not match, an illegal content warning is issued. As a result, distribution of content files through the file exchange system can be suppressed.
  • an authentication unit that performs authentication processing using a user ID and a password, a download processing unit that downloads content, a content execution processing unit that performs processing to execute content, and a downloaded content
  • a protection processing unit that performs content protection processing
  • a local registration information storage unit for storing local registration information
  • a content storage unit for storing downloaded content.
  • the device specific information is acquired, and the user ID, password, and device specific information are stored in the local registration information storage unit.
  • the content execution processing unit decompresses the content stored in the content storage unit, and the user ID and user ID are extracted from the decompressed content.
  • Device specific information is extracted, and the user ID and device specific information extracted from the decompressed content is compared with the user ID and device specific information registered as local registration information, and the content is executed only when they match.
  • the content downloaded device and content If the device is not connected, the content cannot be executed and the content can be protected.
  • the downloaded content file is decompressed to generate an executable game content file, and the executable game content file is generated.
  • the emulator included in the content file emulates the execution environment to execute the game content, so that the game content can be executed only on a special launcher, protecting the content.
  • the downloaded content file when the downloaded content is a still image, a video, or music content, the downloaded content file is decompressed to generate an executable game content file. Since the player included in the executable game content file generates still image, movie, or music content, the still image, movie, or music content is only on a special launcher. It is possible to execute it with this, and the content can be protected.
  • the history of downloaded content is further registered in the local registration information storage unit, the content registered in the content storage unit, and the download registered as local registration information
  • the content history is collated, and if it does not match, a warning is given for illegal content, so the path of the illegally acquired content is known, and the content file is distributed by the file exchange system That Can be suppressed.
  • the stored content is decompressed, the decompressed content force user ID and device specific information are extracted, and the user ID and device specific information extracted from the decompressed content are extracted.
  • the user ID and device-specific information registered as local registration information are compared, and if they do not match, an illegal content warning is issued.
  • Content files can be prevented from being distributed in the exchange system.
  • FIG. 1 shows an outline of a content distribution system to which the present invention is applied.
  • a download server 1 is a server for providing content.
  • Download server 1 stores a large number of downloadable content files.
  • the database server 2 is a server for storing user information such as user IDs and passwords, purchase history information of each user's content, information about each content in the download server 1, and the like.
  • the application server 3 Upon receiving a request from the user, the application server 3 provides a program execution environment, a database connection function, an authentication function, and the like.
  • the web server 4 is a server for providing web pages on the Internet 7. On the web page, content introduction, content sales, membership guidance, membership procedures, user support, etc. are performed.
  • the user terminal 5 is a terminal of each member.
  • a personal computer having a function of connecting to the Internet 7 is used.
  • the management terminal 6 is a terminal of a management company that manages and operates a system to which the present invention is applied.
  • the user when using the content distribution service, the user becomes a member and obtains a user ID and a password.
  • Member registration can be performed online by accessing the web page of the web server 4 with the user terminal 5 and on the web page. Of course, member registration may be performed directly by letter, telephone, facsimile, or the like.
  • Content execution and content download are all performed using a dedicated launcher. Users acquire the launcher 8 program in advance and use their own users.
  • the launcher 8 can be obtained from the web page of the web server 4. Alternatively, the launcher 8 may be recorded on a recording medium such as CD_RM (Compact Disc Read Only Memory) and distributed to each user.
  • CD_RM Compact Disc Read Only Memory
  • the launcher 8 When the launcher 8 is first activated, a user ID and password input screen is displayed, and the user ID and password are input. At this time, the device specific information of the user terminal 5 is acquired.
  • the device specific information is information for identifying the user terminal 5, and is, for example, a MAC (Media Access Control) address. These user ID, password, and device specific information are registered and stored as local registration information 10.
  • a download request for the content is sent from the user terminal 5 to the download server 1 via the Internet 7.
  • the download server 1 receives the download request from the user terminal 5, the download server 1 transmits the designated content to the user terminal 5.
  • This content file is sent from the download server 1 to the user terminal 5 via the Internet 7.
  • the content files stored in the download server 1 are compressed in a unique format and stored in a protected state.
  • the content file compressed by the original method is sent from the download server 1 to the user terminal 5.
  • the launcher 8 of the user terminal 5 downloads the content file 11a, decompresses the downloaded content file 11a, and executes the executable content file l ib and the readme (README).
  • Acquire file 12 and call the user ID and device-specific information stored as local registration information 10, encrypt this user ID and device-specific information, and attach it to the executable content file.
  • To create a content file 11c and this executable content file The file is compressed and protected again in its own format to generate the content file id. To ensure security, no evidence of unzipped executable content files l lb, 11c is left behind.
  • the encrypted user ID and device specific information are added, and the content file l id compressed by a unique method is stored in the user terminal 5 as a download file.
  • the user When executing the downloaded content file, the user starts up the launcher 8 installed in each user terminal 5.
  • the downloaded content file id is compressed by a unique method, and the user ID and device-specific information are encoded and added.
  • the content file id is activated from the launcher 8, the content file id is decompressed and the user ID and device specific information are extracted.
  • Content file l The user ID and device specific information extracted from the id and the user ID and device specific information extracted from the local registration information 10 of the user terminal 5 are compared. Is activated.
  • the user terminal 5 that has downloaded the content and the user terminal 5 that is trying to execute the content are the same device.
  • file exchange is performed, the user terminal 5 that downloaded the content is different from the user terminal 5 that is trying to execute the content.
  • the user terminal 5 that downloaded the content and the user who is trying to execute the content If the terminal 5 is the same device, the user ID and device specific information extracted from the content file l id should match the user ID and device specific information obtained from the local registration information 10. If the content is illegally copied, the user ID and device specific information extracted from the content file id and the user ID and device specific information obtained from the local registration information 10 will be different.
  • launcher 8 When launcher 8 is launched and a user ID and password are entered in input boxes 21a and 21b, authentication is performed. When authentication is established, a list of contents as shown in FIG. 4 is displayed.
  • This list of contents is a list of contents that the user has purchased so far.
  • the contents name, presence / absence of download, presence / absence of purchase, presence / absence of version upgrade, and file size are displayed.
  • the content 22a is content that has not been downloaded after the content has been purchased. In such contents, “Yes” is added to the presence / absence of purchase, but the presence / absence of download is unmarked.
  • the button 24 becomes a download button, and when the button 24 is clicked, as shown in FIG. The download of the file of the number starts.
  • content 22b is content that has been purchased and downloaded.
  • “ ⁇ ” is added to whether or not there is a purchase, and “ ⁇ ” is also added to whether or not it is downloaded.
  • the button 24 becomes a play button. Click button 24, as shown in Figure 6.
  • the content is executed.
  • content 22c is content that has been illegally acquired.
  • an “X” is added to the purchase and download.
  • Such illegal files cannot be downloaded or executed. If there is such an illegal file, information on the illegal file is transmitted to the management terminal 6.
  • FIG. 7 shows an example of a content file stored in the download server 1.
  • the content provided by the download server 1 includes product content such as games and data content such as images and music.
  • the content file of the download server 1 is handled as an executable file, whether it is a content of a program such as a game or a content of data such as an image or music.
  • the executable content file is compressed in a unique format together with the read me file and stored in the download server 1.
  • the content file stored in the download server 1 is created as shown in FIGS.
  • FIG. 8 shows a process for creating a content file when the content is a game.
  • a game program main body 31 is a program that is the core of the game program. Some game programs run only in the execution environment of a specific model or operating system. The game program body 31 can be of any execution environment.
  • an emulator 32 for emulating the execution environment of the game program main body 31 Is prepared.
  • an emulator 32 for emulating the game execution environment is added to the game program main body 31, and an executable file 34 as shown in FIG. 9 is formed.
  • the executable file 34 and the read-me text file 35 describing the precautions for the execution of the game are sent to the compressed file generator 36.
  • the compressed file generator 36 compresses the executable file 34, the read me text file 35, and the force S original compression format.
  • This compressed file 37 is stored on the download server.
  • the emulator 32 is added to the game program main body 31, and the executable file 34 is created.
  • the function of the emulator 32 it is possible to operate a dedicated model, an operating system, or a program of the game program main body 31 created for a dedicated game machine.
  • the Emilyator 32 operates on the basis of a dedicated launcher, so the game cannot be operated independently. For this reason, it can be avoided that the program is imitated or ported to another device.
  • model dependency is absorbed by Launcher 8, and the downloaded game can work reliably on any device.
  • FIG. 10 shows a process for creating a content file when the content is an image (still image), a movie (moving image), or music.
  • a data body 41 is data of images, movies, and music.
  • the data body 41 can be anything.
  • a player 42 for reproducing data of each content is prepared.
  • the player 42 corresponding to the data format is added to the data body 41, and the executable content program 44 is formed as shown in FIG.
  • the executable content program 44 and the read-me text file 45 describing the precautions of the content are sent to the compressed file generation unit 46.
  • the compression file generation unit 46 compresses the executable content program 44 and the read-me text file 45 in a unique compression format. This compressed file 47 is stored in the download server 1.
  • the content data book The player 42 is added to the body 41, and the executable content program 44 is created. With the function of the player 42, data can be reproduced regardless of the format of the data body 41 of the content. In addition, since the player 42 operates based on the dedicated launcher 8, it is possible to prevent content from being illegally copied.
  • FIG. 12 shows an example of information registered in the database server 2.
  • the database server 2 accumulates user information such as user IDs and passwords, purchase history information of each user's contents, information about each content in the download server 1, and the like.
  • the database server 2 includes a user information table 51, a purchase history information table 52, and a content information table 53.
  • the user information table 51 is a table for managing user information, and includes fields such as a user ID, a password, a user name, an address, an email address, and a payment method. Such information is described at the time of member registration.
  • the purchase history information table 52 is a table for managing the content purchased by each user, and includes fields such as a user ID, a content ID purchased by the user, and a date of purchase of the content. The By referring to the user ID from the user information table 51, the purchase history of the corresponding user in the purchase history information table 52 can be accessed. Each time each user purchases content, the purchase history of the content is described in the purchase history information table 52.
  • the content information table 53 is a table for managing content stored in the download server 1, and includes fields such as a content ID, a content name, a content file name, and a version. By referring to the content name from the purchase history information table 52, the corresponding content information can be accessed from the content information table 53. When new contents are added to the download server 1 or the version of the contents is changed, the contents information table 53 is described correspondingly.
  • the web server 4 provides a web page for content introduction, content sales, user support, and the like. On the member page, you can purchase content from the web page, as shown in Figure 13. In FIG. 13, when the content purchase buttons 60a and 60b are clicked, this information is transmitted from the Web server 4 to the database server 2 via the application server 3, and the purchase history is described in the database server 2.
  • the member registration page includes a member name input box 62a, an address input box 62b, an e-mail address input box 62c, a payment method input box 62d, and the like.
  • a member name input box 62a When the user becomes a member, input necessary information in the input boxes 62a 62d and click the confirmation button 63. Such information is sent to the application server 3, and if there is no problem even if it is registered as a member, a user ID and a password are given, and the user information is registered in the database server 2.
  • the user terminal 5 is a normal personal computer.
  • the user terminal 5 is installed with the program of the luncher 8.
  • FIG. 15 is a functional block diagram when the launcher 8 is installed in the user terminal 5.
  • the user terminal 5 composed of a personal computer includes a control unit 71 composed of a CPU (Central Processing Unit) and the like, an HDD (Hard Disk Drive), a RAM (Random Access Memory), and a ROM (Read Only Memory). ) Etc., a communication unit 73 consisting of a modem or a LAN (Local Area Network) board, etc., an input unit 74 for various inputs, a CRT (Cathode-Ray Tube) or LCD (Liquid Crystal Display) ) It consists of a display unit 75 consisting of a display.
  • a control unit 71 composed of a CPU (Central Processing Unit) and the like, an HDD (Hard Disk Drive), a RAM (Random Access Memory), and a ROM (Read Only Memory).
  • a communication unit 73 consisting of a modem or a LAN (Local Area Network) board, etc.
  • the control unit 71 executes an authentication processing unit 81 that performs an authentication process using a user ID and a password, a download processing unit 82 that performs a process of downloading content, and a content.
  • a content execution processing unit 83 that performs processing for protecting content
  • a protection processing unit 84 that performs protection processing of downloaded content
  • a warning unit 80 that issues a warning when there is illegal content.
  • the memory unit 72 includes a local registration information storage unit 85 for storing the local registration information 10, and a content storage unit 86 for storing the downloaded content file.
  • the communication unit 73 includes a content receiving unit 87 for downloading content.
  • the input unit 74 is used by the user to input a user ID and password and perform various input operations, and includes a keyboard 88 and a mouse 89.
  • the launcher 8 performs content download processing and downloaded content execution processing. As described above, when downloading content, the launcher 8 decompresses the downloaded content file and calls the user ID stored as the local registration information 10 and the device-specific information. , Add this user ID and device-specific information to the content file, add it to the content file, compress it in its own format, protect it, and generate the content file
  • the launcher 8 decompresses the downloaded content file, extracts the user ID and device specific information, and performs local registration.
  • the local registration information 10 is stored somewhere in the memory unit 72 such as HDD, RAM, ROM, etc., but is hidden from the user.
  • FIG. 16 is an example of the local registration information 10.
  • the local registration information 10 includes a user ID, a password, a function, Device-specific information, the number of contents, and content information. There are as many pieces of content information as the number of contents. As shown in Fig. 16 (B), this content information includes the content ID, content name, content registration date, content version, Is described. In the local registration information 10, data is recorded with a sign.
  • FIG. 17 is a flowchart showing the overall operation of the launcher 8.
  • step S1 when the launcher is activated (step S1), it is determined whether or not it is the first activation (step S2). If it is activated for the first time, initial application initialization processing is performed (step S3).
  • step S4 If the activation is not the first time in step S2, the second and subsequent application initialization processes are performed (step S4). Then, it is determined whether or not to download (step S5). When downloading, download processing is executed (step S6). If the down load process is not performed, it is determined whether to execute the content (step S7). If the content is to be executed, the content is activated (step S8). Then, it is determined whether or not to terminate the launcher (step S9). If the launcher is to be terminated, the process is terminated. If not, the process returns to step S5.
  • step S5 When downloading, download processing is executed (step S6). If the down load process is not performed, it is determined whether to execute the content (step S7). If the content is to be executed, the content is activated (step S8). Then, it is determined whether or not to terminate the launcher (step S9). If the launcher is to be terminated, the process is terminated. If not, the process returns to step S5.
  • FIG. 18 is a flowchart showing details of the initial application initialization process in step S3 in FIG.
  • step Sl device specific information (for example, MAC address) of the device is acquired from the device of the user terminal 5 (step Sl 1). Then, the user ID and password are entered (step S12). When the user ID and password are entered, authentication processing is performed (step S13).
  • device specific information for example, MAC address
  • the launcher 8 sends an authentication request to the application server 3, and the application server 3 refers to the database server 2 to read out the personal information of the user and displays the authentication result. Send to Launcher 8.
  • the application server 3 transmits an authentication result of the authentication establishment to the launcher 8.
  • launcher 8 receives the authentication result from application server 3. (Step S14). When the authentication result is received, it is determined whether the authentication result is an authentication success (step S15). If the authentication is successful, the user ID, password, and device-specific information acquired in step S11 are registered in the local registration information 10 (step S16). If authentication is not established in step S15, for example, a warning such as “Authentication failed” is displayed (step S17), and the process is terminated.
  • FIG. 20 is a flowchart showing details of the second and subsequent initialization processes in step S4 in FIG.
  • a process of acquiring unique information (for example, MAC address) of the device from the device of the user terminal 5 is performed (step S 21). Then, the local registration information 10 is read (step S22), and the user ID and password are input (step S23).
  • unique information for example, MAC address
  • step S24 It is determined whether or not the device unique information acquired from the user terminal 5 and the device unique information obtained from the local registration information 10 match.
  • User terminal 5 force If the device-specific information obtained does not match the device-specific information obtained from the local registration information 10, for example, “The device that was downloaded differs from the current device.” A warning like this is displayed (step S25), and the process is terminated.
  • step S24 the device-specific information acquired from the user terminal 5 and the local registration information
  • the downloaded content information is acquired (step S26).
  • the local registration information 10 has a purchase history, and the content is stored in the user terminal 5.
  • the content is stored in the user terminal 5. [0090] In the case of (a), it is determined that the content has been purchased and downloaded. In the case of (b), it is determined that the content has already been purchased and has not been downloaded yet. In case (c), the content is determined to be an unauthorized purchase.
  • the content information is acquired, the content information is displayed on the screen (step S27). At this time, the content is marked according to whether it has been purchased, whether it has been downloaded, or whether it has been fraudulently purchased (see Figure 4).
  • step S28 it is determined whether there is illegal content. Unauthorized content is content whose purchase history is not stored in the local registration information 10, but the content is stored in the user terminal 5. If there is no illegal content, the process ends there. If there is unauthorized content, this unauthorized content is described in the local registration information 10 (step S29). Then, unauthorized content transmission processing is performed (step S30), and the initialization processing is terminated.
  • FIG. 21 is a flowchart showing the content download processing in step S6 in FIG.
  • the content to be downloaded is selected (step S31).
  • the contents to be downloaded are those that have a purchase history of the contents but have not saved the contents.
  • a download command is given (step S32)
  • a download request is sent to the download server 1 (step S33).
  • the download server 1 determines whether or not a download request has arrived (step S41). When the download request arrives, the requested content is called (step S42), and the request Processing to send to the terminal that was found (Step S43).
  • the launcher 8 determines whether or not the content is received (step S34).
  • step S34 When content is received from the download server 1 in step S34, the content is received. Are temporarily stored (step S35). The content file is decompressed (step S36), and the executable file of the content and the readme text file are extracted from the content file (step S37). Then, the device-specific information and the user ID are added to the executable file of the content by adding a sign (step S38), compressed again, and stored (step S39). The download content file temporarily stored is deleted (step S40).
  • FIG. 23 is a flowchart showing the content activation process in step S8 in FIG.
  • a content file to be activated is selected (step S51).
  • the content to be activated has the purchase history of the content and the content is saved.
  • the content file is decompressed (step S53).
  • the device unique information and the user ID are extracted from the executable file obtained by decompression (step S54).
  • the device unique information and user ID are read from the local registration information 10 (step S55), and the device unique information and user ID extracted from the executable file obtained by decompression are registered as a role. It is determined whether the device-specific information and the user ID read from information 10 match (step S56). Only when the device unique information and user ID extracted from the executable file obtained by decompression matches the device unique information and user ID read from the local registration information 10.
  • the content is activated (step S57). It is then determined whether the content is finished (step S57).
  • step S56 the device unique information and user ID extracted from the executable file obtained by decompression match the device unique information and user ID read from the local registration information 10. For example, a warning such as ⁇ Please purchase and download the content again because it is a content that cannot be executed '' is displayed. S60), information on illegal content is described in the local registration information 10 (step S61), and the content activation process is terminated.
  • the step is performed.
  • the device unique information and user ID extracted from the executable file obtained by decompression, and the device unique information and user ID read from the local registration information 10 are extracted. Judgment whether the user ID matches, device specific information and user ID extracted from the executable file obtained by decompression, and device specific information read from the oral registration information 10 If the user ID and the user ID do not match, information on illegal content is described in the local registration information 10 in step S61. As described above, when it is determined that the content is illegal, the information content S local registration information 10 of the illegal content is described.
  • FIG. 24 shows the unauthorized content transmission process of step S30 in FIG.
  • Step S71 it is determined from the description of the local registration information 10 whether there is illegal content. If there is illegal content, the information is transmitted to the management terminal 6 ( Step S72).
  • the system administrator of the system management company monitors the management terminal 6, and the administrator Can detect unauthorized use of content based on the information on illegal content sent from each user terminal.
  • the copy source user and the device can be identified from the user ID and device specific information of the decompressed content. From the local registration information 10 of the device to be executed, the copy destination user and the device can be identified. For this reason, it is possible to track which device of which user has been copied to which device of which user, and which device of which user has been copied, and can perform appropriate processing against unauthorized copying. Therefore, it is possible to prevent the illegally copied content from being distributed by a file exchange system or the like.
  • the present invention is not limited to the above-described embodiment, and various modifications and applications can be made without departing from the scope of the invention.
  • the force S using the MAC address as the device specific information and the device specific information may be anything as long as the device can be specified, such as a CPU serial number.
  • the user ID and password are registered in the database server 2 together with the user's personal information. Further, at the time of member registration, the device-specific information of the user terminal 5 is sent to the application server 3, The device unique information of the user terminal 5 may be registered in the database server 2 together with the user ID and password. In addition, when performing authentication, the device specific information of the user terminal 5 may be used together with the user ID and password.
  • the present invention is a content distribution system that downloads games, images, movies, music, etc. from the Internet, and is used to prevent unauthorized copying and protect copyrights.
  • FIG. 1 is a block diagram showing a schematic configuration of a content distribution system to which the present invention is applied.
  • FIG. 3 is an explanatory diagram of a launcher screen in the content distribution system to which the present invention is applied.
  • FIG. 4 is an explanatory diagram of a launcher screen in the content distribution system to which the present invention is applied.
  • FIG. 5 is an explanatory diagram of a launcher screen in the content distribution system to which the present invention is applied.
  • FIG. 6 is an explanatory diagram of a launcher screen in the content distribution system to which the present invention is applied.
  • FIG. 7 is an explanatory diagram of a download server in a content distribution system to which the present invention is applied.
  • FIG. 8 is a block diagram showing processing of content stored in a download server. 9] It is an explanatory diagram showing processing of content stored in the download server.
  • FIG. 10 is a block diagram showing processing of content stored in a download server.
  • FIG. 11 is an explanatory diagram showing processing of content stored in the download server.
  • FIG. 12 is an explanatory diagram of a database server in a content distribution system to which the present invention is applied.
  • FIG. 13 is an explanatory diagram of a web page of a web server in a content distribution system to which the present invention is applied.
  • FIG. 14 is an explanatory diagram of a web server member registration page in a content distribution system to which the present invention is applied.
  • FIG. 19 is a sequence diagram used for explaining a launcher in a content distribution system to which the present invention is applied.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)
  • Reverberation, Karaoke And Other Acoustics (AREA)

Abstract

L’invention décrit un système de téléchargement et de distribution de contenus, dans lequel système la copie non autorisée de fichiers de contenu peut être supprimée. Un dispositif de lancement (8) a été installé dans un terminal utilisateur (5). Le dispositif de lancement (8) acquiert des informations matérielles inhérentes du terminal utilisateur (5) et enregistre, sous forme d’informations du registre local (10), et stocke un ID utilisateur, un mot de passe et les informations matérielles inhérentes. Dans le cas du téléchargement d’un contenu, le contenu une fois téléchargé est décompressé, et l’ID utilisateur et les informations matérielles inhérentes des informations du registre local (10) sont ajoutées au contenu, lequel est ensuite à nouveau décompressé et stocké. Dans le cas du lancement d’un contenu, le contenu est décompressé, et un ID utilisateur et les informations matérielles inhérentes sont extraites du contenu. Ensuite, l’ID utilisateur et les informations matérielles inhérentes extraites du contenu sont comparés à l’ID utilisateur et aux informations matérielles inhérentes des informations du registre local (10), et uniquement lorsqu’ils coïncident les uns avec les autres, le contenu est lancé.
PCT/JP2004/010038 2004-07-14 2004-07-14 Système de distribution de contenu et dispositif de lancement WO2006006241A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/JP2004/010038 WO2006006241A1 (fr) 2004-07-14 2004-07-14 Système de distribution de contenu et dispositif de lancement
JP2006527671A JPWO2006006241A1 (ja) 2004-07-14 2004-07-14 コンテンツ配信システム及びランチャー

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2004/010038 WO2006006241A1 (fr) 2004-07-14 2004-07-14 Système de distribution de contenu et dispositif de lancement

Publications (1)

Publication Number Publication Date
WO2006006241A1 true WO2006006241A1 (fr) 2006-01-19

Family

ID=35783607

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2004/010038 WO2006006241A1 (fr) 2004-07-14 2004-07-14 Système de distribution de contenu et dispositif de lancement

Country Status (2)

Country Link
JP (1) JPWO2006006241A1 (fr)
WO (1) WO2006006241A1 (fr)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008073259A (ja) * 2006-09-21 2008-04-03 Sony Computer Entertainment Inc ゲーム装置
WO2013063497A2 (fr) 2011-10-26 2013-05-02 Donaldson Company, Inc Ensembles filtres, composants et éléments associés, et procédés d'utilisation et d'assemblage
JP2015502585A (ja) * 2011-10-11 2015-01-22 パラマウント ピクチャーズ コーポレーション ネットワーク上で配信されるコンテンツへのアクセスを制御するためのシステムおよび方法
WO2017139673A1 (fr) 2016-02-12 2017-08-17 Donaldson Company, Inc. Éléments filtrants, ensembles filtres à air et procédés d'utilisation et d'assemblage
WO2018102712A2 (fr) 2016-12-01 2018-06-07 Donaldson Company, Inc. Éléments filtrants, ensembles de filtres à air et procédés d'utilisation et d'assemblage
WO2018111434A2 (fr) 2016-11-04 2018-06-21 Donaldson Company, Inc. Éléments filtrants, ensembles purificateurs d'air, et procédés d'utilisation et d'assemblage

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0836519A (ja) * 1994-07-26 1996-02-06 Canon Inc 情報処理方法及び装置
JP2003303137A (ja) * 2002-04-09 2003-10-24 Matsushita Electric Ind Co Ltd 情報処理装置、情報処理方法および情報処理プログラム
JP2004118241A (ja) * 2002-09-20 2004-04-15 Matsushita Electric Ind Co Ltd データ処理端末、データ管理サーバ、データ処理方法並びにその方法をコンピュータにより実行するためのプログラム
JP2004118929A (ja) * 2002-09-26 2004-04-15 Sanyo Electric Co Ltd コンテンツ再生装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0836519A (ja) * 1994-07-26 1996-02-06 Canon Inc 情報処理方法及び装置
JP2003303137A (ja) * 2002-04-09 2003-10-24 Matsushita Electric Ind Co Ltd 情報処理装置、情報処理方法および情報処理プログラム
JP2004118241A (ja) * 2002-09-20 2004-04-15 Matsushita Electric Ind Co Ltd データ処理端末、データ管理サーバ、データ処理方法並びにその方法をコンピュータにより実行するためのプログラム
JP2004118929A (ja) * 2002-09-26 2004-04-15 Sanyo Electric Co Ltd コンテンツ再生装置

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008073259A (ja) * 2006-09-21 2008-04-03 Sony Computer Entertainment Inc ゲーム装置
JP2015502585A (ja) * 2011-10-11 2015-01-22 パラマウント ピクチャーズ コーポレーション ネットワーク上で配信されるコンテンツへのアクセスを制御するためのシステムおよび方法
WO2013063497A2 (fr) 2011-10-26 2013-05-02 Donaldson Company, Inc Ensembles filtres, composants et éléments associés, et procédés d'utilisation et d'assemblage
EP4151302A1 (fr) 2011-10-26 2023-03-22 Donaldson Company, Inc. Cartouche filtrante
EP3777996A1 (fr) 2011-10-26 2021-02-17 Donaldson Company, Inc. Cartouche filtrante
DE112017000784T5 (de) 2016-02-12 2018-10-25 Donaldson Company, Inc. Filterelemente, Luftreinigerbaugruppen und Verfahren zum Verwenden und Zusammenbauen
US10413855B2 (en) 2016-02-12 2019-09-17 Donalson Company, Inc. Filter elements, air cleaner assemblies, and methods of use and assembly
WO2017139673A1 (fr) 2016-02-12 2017-08-17 Donaldson Company, Inc. Éléments filtrants, ensembles filtres à air et procédés d'utilisation et d'assemblage
US11794139B2 (en) 2016-02-12 2023-10-24 Donaldson Company, Inc. Filter elements, air cleaner assemblies, and methods of use and assembly
EP4272855A2 (fr) 2016-02-12 2023-11-08 Donaldson Company, Inc. Éléments filtrants, ensembles épurateurs d'air et procédés d'utilisation et d'assemblage
WO2018111434A2 (fr) 2016-11-04 2018-06-21 Donaldson Company, Inc. Éléments filtrants, ensembles purificateurs d'air, et procédés d'utilisation et d'assemblage
EP4039353A1 (fr) 2016-11-04 2022-08-10 Donaldson Company, Inc. Éléments de filtre, ensembles purificateur d'air, et procédés d'utilisation et ensemble
WO2018102712A2 (fr) 2016-12-01 2018-06-07 Donaldson Company, Inc. Éléments filtrants, ensembles de filtres à air et procédés d'utilisation et d'assemblage

Also Published As

Publication number Publication date
JPWO2006006241A1 (ja) 2008-04-24

Similar Documents

Publication Publication Date Title
CN1333314C (zh) 软件执行控制系统
JP4694077B2 (ja) 権利管理アーキテクチャにおける保護コンテンツにアクセスするためのコンピューティングデバイス
KR100605071B1 (ko) 디지털 전자 콘텐츠의 안전하고 편리한 관리 시스템 및 방법
US8533860B1 (en) Personalized digital media access system—PDMAS part II
JP3914430B2 (ja) ソフトウェア・オブジェクトの配布を可能にするための方法および装置
US7047241B1 (en) System and methods for managing digital creative works
TWI220620B (en) Method of protecting and managing digital contents and system for using thereof
JP2008508595A (ja) 権利保護に応じて装置をイネーブルにするシステムならびに方法
US20040210535A1 (en) Methods to securely package content
JP4769475B2 (ja) コンテンツ配信用サーバ及びこれを備えたコンテンツ配信システム
JP2004046790A (ja) デジタルコンテンツの保護及び管理のためのシステム
JP2006526204A (ja) セキュアストリーミングコンテナ
JP2003517767A (ja) 電子配布システム用のサーバとそれを操作するための方法
JP2002132584A (ja) 通信システム、端末装置、再生プログラムを記録した記録媒体、サーバ装置、およびサーバプログラムを記録した記録媒体
JPH10214297A (ja) インターネットを利用した会員制サービスシステムおよび方法
US20030233563A1 (en) Method and system for securely transmitting and distributing information and for producing a physical instantiation of the transmitted information in an intermediate, information-storage medium
KR20040044144A (ko) 콘텐츠 재생 장치 및 콘텐츠 재생 제어 프로그램을 기록한기록 매체
WO2006006241A1 (fr) Système de distribution de contenu et dispositif de lancement
US7418433B2 (en) Content providing system, content providing method, content processing apparatus, and program therefor
WO2007141927A1 (fr) système de reproduction de contenu, terminal client, serveur publicitaire, gestionnaire de décodage et procédé de reproduction de contenu
KR100784300B1 (ko) 통합 디지털 콘텐츠 권한 관리 시스템 및 그 방법
KR101564731B1 (ko) 다운로드된 디지털 매체 파일을 추적하기 위한 시스템 및 방법
JP2004030617A (ja) インターネットを利用したトランザクションサービスシステムおよびその方法
JPH10240517A (ja) ソフトウェアの複製防止方法及び装置
JP4694241B2 (ja) コンテンツファイルを記憶したコンピュータ読み取り可能な記録媒体

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

WWE Wipo information: entry into national phase

Ref document number: 2006527671

Country of ref document: JP

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: COMMUNICATION UNDER RULE 69 EPC ( EPO FORM 1205A DATED 26/06/07 )

122 Ep: pct application non-entry in european phase

Ref document number: 04747504

Country of ref document: EP

Kind code of ref document: A1

WWW Wipo information: withdrawn in national office

Ref document number: 4747504

Country of ref document: EP