WO2006028092A1 - コンテンツ配信管理装置 - Google Patents

コンテンツ配信管理装置 Download PDF

Info

Publication number
WO2006028092A1
WO2006028092A1 PCT/JP2005/016333 JP2005016333W WO2006028092A1 WO 2006028092 A1 WO2006028092 A1 WO 2006028092A1 JP 2005016333 W JP2005016333 W JP 2005016333W WO 2006028092 A1 WO2006028092 A1 WO 2006028092A1
Authority
WO
WIPO (PCT)
Prior art keywords
content
receiver
transmitter
time
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/JP2005/016333
Other languages
English (en)
French (fr)
Japanese (ja)
Inventor
Ayako Takatsuji
Hiroyuki Iitsuka
Naoshi Usuki
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Panasonic Holdings Corp
Original Assignee
Matsushita Electric Industrial Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Matsushita Electric Industrial Co Ltd filed Critical Matsushita Electric Industrial Co Ltd
Priority to US11/661,968 priority Critical patent/US20080019276A1/en
Priority to EP05782214A priority patent/EP1791361A4/en
Publication of WO2006028092A1 publication Critical patent/WO2006028092A1/ja
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/173Analogue secrecy systems; Analogue subscription systems with two-way working, e.g. subscriber sending a programme selection signal
    • H04N7/17309Transmission or handling of upstream communications
    • H04N7/17318Direct or substantially direct transmission and handling of requests
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2541Rights Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/4104Peripherals receiving signals from specially adapted client devices
    • H04N21/4108Peripherals receiving signals from specially adapted client devices characterised by an identification number or address, e.g. local network address
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/426Internal components of the client ; Characteristics thereof
    • H04N21/42684Client identification by a unique number or address, e.g. serial number, MAC address, socket ID
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/436Interfacing a local distribution network, e.g. communicating with another STB or one or more peripheral devices inside the home
    • H04N21/43615Interfacing a Home Network, e.g. for connecting the client to a plurality of peripherals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4405Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/442Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
    • H04N21/44227Monitoring of local network, e.g. connection or bandwidth variations; Detecting new devices in the local network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4623Processing of entitlement messages, e.g. ECM [Entitlement Control Message] or EMM [Entitlement Management Message]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4627Rights management associated to the content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/63Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
    • H04N21/633Control signals issued by server directed to the network components or client
    • H04N21/6332Control signals issued by server directed to the network components or client directed to client
    • H04N21/6334Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key
    • H04N21/63345Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key by transmitting keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8355Generation of protective data, e.g. certificates involving usage data, e.g. number of copies or viewings allowed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/765Interface circuits between an apparatus for recording and another apparatus

Definitions

  • the present invention relates to a content distribution management device that manages content distribution by a transmitter.
  • a router is installed in the home, such as a TV or video device (hereinafter referred to as a “receiver”), content storage, a DVD recorder, etc.
  • a router is assumed to be connected to a network outside the home only in the home.
  • the transmitter has a function to distribute the stored content to the receiver in response to a request from the receiver.
  • each receiver can share various contents stored in the transmitter.
  • the time required for communication between a transmitter and a receiver is less than a predetermined period. It is considered to use a method for testing whether or not (see Non-Patent Document 1).
  • Non-Patent Literature 1 Work Plan for Localizing Transmission, September 9, 2003 Disclosure of Invention
  • An object of the present invention is to provide a content distribution management device that manages distribution of content to a receiver that can share content stored in a transmitter.
  • a content distribution management device of the present invention is a device for managing distribution of content when a transmitter distributes content to a plurality of receivers.
  • Setting means for setting a reception valid period, which is an upper limit of a time during which the receiver allowed to share the content to be distributed can receive the content, to the holding means; and Based on the situation, all of the receivers permitted to share the content have management means for managing the time during which the content can be received.
  • a unique identifier is assigned to each receiver, and the content distribution management device of the present invention further includes sharing of content distributed by the transmitter.
  • the means is registered in the holding means when the delivery time of the content distributed by the transmitter reaches the reception valid period after the reception valid period is set in the holding means! Eliminate the identifier that speaks.
  • the distribution time is an actual time when the transmitter distributes content
  • the management means is the actual time when the transmitter distributes content, and the receiver receives the content. Reduce from the time you can.
  • the distribution time is a reproduction time of the content distributed by the transmitter, and the management means receives the reproduction time of the content distributed from the transmitter. Decrease from the time that the receiver can receive the content.
  • the transmitter encrypts and distributes content
  • the receiver permitted to share the content is a receiver whose connection state with the transmitter satisfies a predetermined relationship.
  • the setting means sets an identifier of a receiver whose connection state with respect to the transmitter satisfies a predetermined relationship in the holding means, and the transmitter, after the identifier is set in the holding means, Information necessary for decrypting the encrypted content is transmitted to the receiver corresponding to the identifier.
  • the content distribution management device is a device that manages content distribution when a transmitter distributes content to one or a plurality of receivers, and is unique to each receiver.
  • the identifier is stored in the holding means the identifier of the receiver that is allowed to share the content of the transmitter, and the registration means stores the identifier of the receiver.
  • a setting unit that sets a reception valid period that is an upper limit of a time during which the receiver can receive the content is set in the holding unit, and the reception valid period is set in the holding unit.
  • a management unit that deletes the identifier registered in the holding unit when the distribution time of the content distributed by the transmitter reaches the valid reception period.
  • the distribution time is an actual time when the transmitter distributes the content
  • the management means is an actual time when the transmitter distributes the content, and the receiver receives the content. Reduce from the time you can.
  • the distribution time is a reproduction time of the content distributed by the transmitter
  • the management means indicates the reproduction time of the content distributed from the transmitter
  • the receiver receives the content. Decrease from the time that can be received.
  • the transmitter encrypts and distributes content
  • the receiver permitted to share the content is a receiver whose connection state with the transmitter satisfies a predetermined relationship.
  • the setting means sets an identifier of a receiver whose connection state with respect to the transmitter satisfies a predetermined relationship in the holding means, and the transmitter, after the identifier is set in the holding means, Information necessary for decrypting the encrypted content is transmitted to the receiver corresponding to the identifier.
  • the present invention can be realized as a content distribution management method using characteristic constituent means of the content distribution management device of the present invention as steps, or as a program for causing a computer to execute these steps.
  • the program can be distributed via a recording medium such as a CD-ROM or a transmission medium such as a communication network.
  • the present invention can provide a content distribution management device that manages distribution of content to a receiver that can share content stored in the distribution machine.
  • the transmitter is easy to manage because it is only necessary to collectively manage the content distribution status without being aware of the distribution status to each receiver individually. Undoubtedly, sharing of unlimited content can be prevented.
  • receivers that are in a registered state are exempted from the determination process related to a connection state that requires time, thereby making it possible to achieve both security of content and reduction of the load of permission determination processing on the receiver.
  • the time that the receiver can receive the content is measured, for example, only for the time when the transmitter delivered the content. Therefore, after the receiver is allowed to share the content, When viewing is unavoidably interrupted (for example, an unexpected visitor), the blank time is not consumed, and a reduction in the processing frequency of obtaining permission from the transmitter again can provide a certain effect.
  • the transmitter can manage the distribution of the content with a small number of resources, thereby facilitating the implementation. Can do.
  • the time that the receiver can receive the content is managed by a counter for each receiver, and the value of the counter is individually initialized to a predetermined value when each receiver is registered. Therefore, the transmitter power that the initial value of the receiver is not dynamically shortened due to the influence of the distribution status to other receivers before the receiver is registered is also permitted. Reducing the processing frequency can produce a drought effect.
  • FIG. 1 is a diagram showing a configuration of a home network 1 according to an embodiment.
  • FIG. 2 is a diagram showing a configuration of a transmitter 20 according to the embodiment.
  • Fig. 3 is a diagram showing a processing procedure until the exchange key is delivered to the receiver to which the transmitter 20 has requested authentication in the first embodiment.
  • FIG. 4 is a diagram showing a processing procedure from when the transmitter 20 starts distributing content to when it ends according to the first embodiment.
  • FIG. 5 is a diagram illustrating an example of a change in a value of a counter that is specified by the transmitter 20 according to Embodiment 1 and that specifies a period during which each receiver can receive content. .
  • FIG. 6 is a diagram illustrating an example of a change in a value of a counter that is specified by the transmitter 20 according to Embodiment 2 and that specifies a period during which each receiver can receive content. . Explanation of symbols
  • FIG. 1 is a diagram showing a configuration of the home network 1 according to the first embodiment.
  • the home network 1 is a network for sharing content in the home, and includes a router 10, a transmitter 20, and receivers 30, 31, and 32.
  • the router 10 is the only home network 1 connected to a network (Internet) outside the home network 1.
  • the transmitter 20 and the receivers 30, 31, and 32 are connected to the router 10.
  • the home network 1 is a star network centered on the router 10.
  • the transmitter 20 stores various contents, receives an authentication request from another device via the router 10, and the other device is a device in the home network 1, and the transmitter 2 It is determined whether or not the device is a device capable of sharing the content with 0 accumulated. If it is determined that the other device is a device that can share the content, the transmitter 20 delivers the content requested by the other device to the other device.
  • the transmitter 20 is an AV server or the like having a function of distributing various stored contents.
  • the receivers 30, 31, and 32 are a television, a video, a DVD player, and the like having a function of acquiring various contents.
  • the transmitter 20 enables a receiver that is permitted to share content to receive the content for a predetermined reception valid period.
  • the predetermined reception valid period is a predetermined reference time.
  • the transmitter 20 has a counter for specifying a period during which the receiver can receive the content for each receiver that is permitted to share the content.
  • the transmitter 20 determines that the receiver is a valid device (hereinafter referred to as “authentication”), and the connection state between the transmitter 20 and the receiver is determined.
  • connection status verification Check whether the specified conditions are met (hereinafter referred to as “connection status verification”), and if it is determined that the receiver can permit content sharing, Register the receiver as a receiver that allows sharing, and set a predetermined reception valid period for the receiver in the counter. That is, the counter for the receiver is initialized. When the receiver counter indicates that the predetermined valid reception period has elapsed, the receiver registration is deleted from the transmitter 20.
  • the content is encrypted and distributed from the transmitter 20, but the transmitter 20 does not register the receiver in response to an authentication request from the receiver. After registering, pass the information necessary to decrypt the encrypted content to the receiver. On the other hand, if the receiver is already registered, the transmitter 20 only authenticates the receiver and passes information necessary for decrypting the encrypted content.
  • the counter for each receiver is decremented while the transmitter 20 distributes the content. That is, if the content is distributed to any of the registered receivers, the counters for all receivers are uniformly decremented.
  • content is broadcast (or multicast) at a constant data rate for real-time playback using, for example, RTP (Real-Time Transport Porotocol). Since the delivered content is encrypted, the receiver cannot decrypt the encrypted content unless it is allowed to share the content and receives the information necessary to decrypt it.
  • RTP Real-Time Transport Porotocol
  • FIG. 2 is a diagram showing a configuration of the transmitter 20.
  • Transmitter 20 includes communication unit 200, device authentication unit 201, connection state verification unit 202, registration information 'counter holding unit 203, registration determination unit 204, registration information' counter change unit 205, The exchange key transmitting unit 206, the content distribution receiving unit 207, the content storage unit 208, the content encryption unit 209, the content distribution unit 210, and the content distribution measurement unit 211 are configured.
  • the communication unit 200 communicates with a device external to the transmitter 20. Each component inside the transmitter 20 communicates with a device outside the transmitter 20 via the communication unit 200.
  • the device authentication unit 201 receives an authentication request from the receiver, and confirms whether or not the receiver is a valid device by authentication.
  • the device authentication method for example, the transmitter 20 and the receiver each hold a public key encryption key pair (public key, private key) and a certificate, and the transmitter 20 and the receiver Is a challengeless type authentication method that uses a public key and a private key.
  • the connection state verification unit 202 verifies whether the connection state of the receiver (requesting receiver) that has issued the authentication request satisfies a predetermined condition.
  • a verification method for example, the round-trip time required until the transmitter 20 receives echo response data corresponding to the echo request data after the transmitter 20 transmits the echo request data to the request receiver. If the measured round-trip time is less than or equal to a predetermined reference time, a method is used in which the request receiver is determined to be a device in the home network 1. In the following, verification by this method is called Round Trip Time (RTT) verification.
  • RTT Round Trip Time
  • the registration information 'counter holding unit 203 is a counter that indicates an identification code of a receiver whose authentication result by the device authentication unit 201 and a verification result by the connection state verification unit 202 are positive, and a predetermined reception valid period. And hold.
  • information unique to a device for example, a device ID
  • a certificate obtained by the device authentication unit 201 is used as the identification code.
  • Registration determination unit 204 checks registration information 'counter holding unit 203, and determines whether or not the receiver whose authentication result by device authentication unit 201 is affirmative is a registered device.
  • Registration information 'counter changing section 205 changes information in registration information' counter holding section 203.
  • the changes include (A) initialization of the new registration Z counter, (B) reflection to the counter of the content delivery time performed, and (C) deletion of the registration (Z counter).
  • the identification code of the receiver to be registered is stored in the registration information'counter holding unit 203, and the power counter of the receiver is initialized.
  • the initialization is to set the counter value to a preset reference value (reception valid period: upper limit of the period during which the receiver can receive content).
  • the reference value is time, and if the reception valid period is 40 hours, For example, the initial value of the counter is “40” and the unit of change is 1 hour.
  • Exchange key transmitting section 206 transmits information necessary for decrypting the encrypted content to the registered receiver.
  • the necessary information is an exchange key, which is necessary to create a content 'key used for decrypting the content.
  • This exchange key is transmitted by the device authentication unit 201 using an authentication key shared between the transmitter 20 and the registered receiver.
  • the transmitter 20 is not the main point of the present invention regarding the rule of the power change timing for changing the exchange key at a timing according to a predetermined rule, and the description thereof is omitted.
  • the exchange key transmitting unit 206 transmits the latest exchange key, that is, an exchange key that can be used for decrypting the content if the content is currently being distributed.
  • the content delivery accepting unit 207 accepts and responds to content delivery requests of each receiver.
  • the content storage unit 208 stores various contents to be distributed.
  • the content encryption unit 209 encrypts the content to be distributed.
  • the content encryption unit 209 creates a content key by using an exchange key and content copy control information, and encrypts the content to be distributed.
  • the content distribution unit 210 distributes the encrypted content.
  • the content distribution measuring unit 211 measures the time for which the content is distributed.
  • FIG. 3 is a diagram showing a processing procedure until the exchange key is delivered to the receiver that the transmitter 20 has requested for authentication.
  • Step S21 The device authentication unit 201 executes device authentication with respect to the receiver that has issued the authentication request, and confirms whether the device is a legitimate device. The device authentication method is as described above. If it is confirmed that the device is valid, the process proceeds to step S22 to determine whether or not the device is a registered receiver. Otherwise, the process ends.
  • Step S22 It is determined whether or not the receiver that is executed by the registration determination unit 204 and has been authenticated as a valid device by the device authentication unit 201 is a registered device. For registration determination, the device-specific identification code acquired in step S21 is used. If the identification code is registered, the process proceeds to step S25, and the exchange key is transmitted. Otherwise, go to step S23 and perform RTT verification.
  • Step S23 In order to determine whether or not the connection state of the receiver that is executed by the connection state verification unit 202 and is authenticated as a valid device by the device authentication unit 201 satisfies a predetermined condition. Perform RTT verification. The RTT verification is as described above. If it is confirmed that the predetermined condition is satisfied, the process proceeds to step S 24, and the receiver is registered in the registration information ′ counter holding unit 203 as a receiver that can share the content. Otherwise, the process ends.
  • Step S24 The identification code acquired in step S21 of the receiver that is executed by the registration information 'counter changing unit 205 and determined that the connection state satisfies the predetermined condition by the connection state verification unit 202 is obtained. Registration information 'is registered in the counter holding unit 203 and the corresponding counter is initialized. Thereafter, the process proceeds to step S25, and the exchange key is transmitted.
  • Step S25 The exchange key executed by the exchange key transmission unit 206 and encrypted for decrypting the encrypted content to be distributed is encrypted using the authentication key shared in step S21, and an authentication request is issued. Send to the receiver that performed.
  • FIG. 4 is a diagram showing a processing procedure from when the transmitter 20 starts distributing contents until it ends.
  • step S31, step S32, and step S33 are performed by the content distribution measuring unit 211.
  • step S34, step S35, and step S36 are executed by the registration information counter counter 205.
  • Step S31 It is determined whether or not the distribution of the content has been one hour since the distribution of the content was started or the one-hour measurement was reset. If one hour has not elapsed, the process proceeds to step S32 to check whether or not the content has been completed. If 1 hour has passed, go to step S33 to reset the 1-hour measurement.
  • Step S32 It is determined whether or not the content is finished. If the content continues, return to step S31 to determine whether 1 hour has passed. When the content ends, the process ends.
  • Step S33 Reset the measurement for one hour. Then proceed to step S34 to decrement the counters of all registered receivers.
  • Step S34 Counters of all registered receivers (indicating the remaining time for content distribution) are also decremented (decremented) by “1” (value indicating one hour of content distribution). After that, go to step S35 and check if there is a registered receiver whose counter value is “0”.
  • Step S35 It is confirmed whether there is a counter of the registered receiver whose value is “0”.
  • step S 36 If there is a counter whose value is “0”, the process proceeds to step S 36, and the registration of the receiver is deleted from the registration information ′ counter holding unit 203. If there is no counter with a value of “0”, the process returns to step S31 as it is, and it is determined whether or not another hour has passed.
  • Step S36 The identification code of the receiver whose counter value is “0” is deleted from the registration information ′ counter holding unit 203, and the registration is invalidated. Return to step S31 as it is and determine whether or not another hour has passed.
  • FIG. 5 is a diagram illustrating an example of a change in a value of a counter that is held by the transmitter 20 according to Embodiment 1 and that specifies a period during which each receiver can receive content. .
  • Transmitter 20 receives content distribution requests CR01 and CR02 from receiver 30, distributes content 1 and content 2, respectively, receives content distribution request CR21 from receiver 32, and distributes content 3. To do. Thereafter, the transmitter 20 receives the content distribution request CR03 from the receiver 30, and distributes the content 4. The receiver 31 is also received by the transmitter 20. When content 1 is distributed in response to the content distribution request CRO 1 from the machine 30, the content 1 is requested to be shared simultaneously (CR11).
  • Content 1 is 15 hours long
  • Content 2 is 20 hours long
  • Content 3 is 1 long
  • the transmitter 20 receives the authentication request AR01 from the receiver 30, performs authentication (A1) and RTT verification (B1), and the receiver 30 is a valid device that satisfies a predetermined condition regarding the connection state. It is determined that it exists, and the registration information of the receiver is registered in the counter holding unit 203.
  • the counter of the receiver 30 is initialized to “40” (TC01), and the exchange key Kxl is passed to the receiver 30 (XOl) o
  • the transmitter 20 receives a content 1 distribution request from the receiver 30 (CR01), encrypts the content 1 using the content 'key created based on the exchange key Kxl, and distributes the content. As the content delivery is executed, the counter for the receiver 30 is decremented. The transmitter 20 subsequently receives a content 2 distribution request from the receiver 30 (CR02). The transmitter 20 encrypts the content 2 using the content key created based on the exchange key Kxl and distributes it.
  • the distribution request is interrupted when receiver 30 receives content 2 for 15 hours (BR01).
  • BR01 content 2 for 15 hours
  • the distribution of the content 2 is interrupted, and the counter value for the receiver 30 stops at “10” (TC02), in which only the 15 hours for the distribution of the content 2 are decremented.
  • transmitter 20 receives authentication request AR21 from receiver 32, performs authentication (A1) and RTT verification (B1), and receiver 32 is connected to a valid device. It is determined that it is a receiver that satisfies a predetermined condition, registration is performed, and the exchange key Kx2 is passed to the receiver 32 ( ⁇ 21).
  • the receiver 30 is, for example, in a power-off state and again in a power-on state after several hours.
  • the transmitter 20 receives the authentication request AR02 from the receiver 30, performs authentication ( ⁇ 2), and sets the counter value of the receiver 30. Is “10”, and it can be confirmed that the receiver is currently registered after the valid reception period, the RTT verification is not performed, and the latest exchange key Kx2 is passed to the receiver 30 (X02).
  • the transmitter 20 receives a content 3 distribution request from the receiver 32 (CR21), encrypts the content 3 using a content key created based on the exchange key Kx2, and distributes the content 3.
  • the content distribution request does not have dynamic information such as the IP address of the request source. Therefore, it is difficult for the transmitter 20 to determine from which receiver the content distribution request is a request.
  • the content distribution request source receiver may be identified and managed by adding an identification code used at the time of authentication 'registration to the content distribution request, the processing becomes complicated. Even if the content distribution requesting receiver is identified, it is not guaranteed that only the content distribution requesting receiver will receive the content in broadcast content distribution.
  • the content distribution request CR21 is a distribution request with 32 receivers, and even if the receiver 30 has not made a content 3 distribution request to the transmitter 20, Using key Kx2, it is possible to receive and decrypt content 3.
  • the transmitter 20 performs not only the counter of the receiver 32 but also the counter of the receiver 30 with the execution of the distribution of the content 3, regardless of whether the receiver 30 is receiving the content. , Decrement.
  • the counter value of the receiver 30 reaches “0” (TC03)
  • the registration permitting content sharing of the receiver 30 is deleted from the registration information ′ counter holding unit 203.
  • the transmitter 20 when receiving the authentication request AR03 from the receiver 30, the transmitter 20 does not have the registration of the receiver 30, so both authentication (A3) and RTT verification (TT3) are performed. It is determined that the receiver is a legitimate device that satisfies the specified conditions regarding the connection status, and registration is performed.
  • the counter of the receiver 30 is initialized to “40” (TC04), and the latest exchange key Kx3 is passed to the receiver 30 ( ⁇ 03).
  • the transmitter 20 identifies in some way that the content distribution request CR 21 is a distribution request from the receiver 32 at the time of distribution of the above-described content 3, and sets the counter of the receiver 30. It is assumed that the registration of the receiver 30 is continued at the time of the authentication request AR03 without decrementing (dotted line portion D of the counter value for the receiver 30 in FIG. 5). In this case, the receiver 30 Assuming that the distribution of S content 3 was also received and decrypted, the transmitter 20 received the receiver 30 even after 43 hours of content distribution exceeding the valid reception time of 40 hours.
  • the authentication key (A3) is passed only to the receiver 30 with the latest exchange key Kx3 that does not perform RTT verification (B3).
  • the receiver 30 If the receiver 30 is taken out of the home before making the content 4 distribution request (CR03) and the authentication request AR03 is made, the predetermined condition determined by the RTT verification is satisfied. Even when the condition is not satisfied, the receiver 30 can receive and decode the content illegally beyond the permitted reception valid period.
  • transmitter 20 Upon receiving a content distribution request from receiver 30 (CR01) During distribution of content 1, transmitter 20 receives authentication request AR11 from receiver 31 and performs authentication (A1) and RTT verification (B1). Then, it is determined that the receiver 31 is a legitimate device and satisfies the predetermined condition regarding the connection state, and registration is performed.
  • the counter of the receiver 31 is initialized to “40” (TC11), and the exchange key Kxl is passed to the receiver 31 (Xl l).
  • the counter for the receiver 31 is decremented with the execution of the distribution of the content 1, and when the distribution of the content 1 is completed, the counter for the receiver 31 is decremented.
  • the value of is "34" (TC12).
  • the transmitter 20 executes the delivery of the content 2 and sets the counter of the receiver 31 to indicate whether the receiver 31 is receiving content. Regardless, it will decrement. Since the distribution of the content 2 is interrupted by the receiver 30, the counter value for the receiver 31 stops at “19” (TC 13) in which only the 15 hours for the distribution of the content 2 has been decremented. Thereafter, the transmitter 20 receives the content distribution request CR21 from the receiver 32 and distributes the content 3, receives the content distribution request CR03 from the receiver 30, distributes the content 4, and executes those distributions. At the same time, the counter for the receiver 31 is decremented. The counter value for the receiver 31 is “6” (TC14) at the end of the distribution of content 3 for 13 hours, and “0” (TC15) during the distribution of content 4.
  • the transmitter 20 receives the authentication request AR21 from the receiver 32, performs authentication (A1) and RTT verification (B1), and the receiver 32 is a valid device that satisfies a predetermined condition regarding the connection state. And register.
  • the counter of the receiver 32 is initialized to “40” (TC21), and the transmitter 20 passes the exchange key Kx2 to the receiver 32.
  • the transmitter 20 receives a content 3 distribution request from the receiver 32 (CR 21), encrypts the content 3 using the content key created based on the exchange key ⁇ 2, and distributes the content 3. Along with the delivery of content 3, the counter for the receiver 32 is decremented. At the end of the delivery of content 3 for 13 hours, the value of the counter for the receiver 32 becomes “27” (TC22). Thereafter, the transmitter 20 receives the content distribution request CR03 from the receiver 30, distributes the content 4, and decrements the counter for the receiver 32.
  • the transmitter 20 can manage the content distribution in a batch without having to be aware of the distribution status to each receiver individually. In addition, unlimited content sharing can be prevented. In addition, by exempting receivers that are in a registered state from the time-consuming connection state determination process, content security protection and content sharing permission determination processing for the receiver can both be reduced. .
  • the counter that specifies the period during which the receiver can receive the content is individually initialized to a predetermined value when the transmitter 20 registers each receiver.
  • the receiver The processing frequency of obtaining permission from the transmitter 20 of the receiver, where the initial value is not dynamically set to be short, is affected, for example, by being affected by the distribution status before being registered.
  • the power counter is decremented only during the time when the transmitter 20 delivers the content. Therefore, if the user interrupts viewing on the way after receiving permission to share the content of the receiver power S content (such as an unexpected visitor) The blanking time is not consumed, and the processing frequency for obtaining permission from the transmitter 20 again is reduced.
  • Embodiment 1 describes the situation where the transmitter 20 performs streaming distribution of content in real time.
  • the present invention is not limited to this, and for example, each receiver is connected to the transmitter 20. It can also be applied to non-real-time distribution in which stored content is downloaded and shared using the HTTP protocol. For non-real-time delivery, a two-hour It can be assumed that the contents can be delivered in one hour. In such a case, it is clear that the counter that specifies the valid reception period may decrement the content length (2 hours) during playback instead of the content distribution time (1 hour).
  • Embodiment 1 has been described assuming that the content distribution management device is installed in transmitter 20. However, the content distribution management device may be provided separately from the transmitter 20.
  • the registered information 'counter changing unit 205 is an example of a setting unit, a management unit, and a registration unit of the content distribution management apparatus of the present invention.
  • the transmitter 20 uses a single counter for all registrations to measure the period during which the receiver can receive the content, with respect to the receiver permitted to share the content. Manage the content distribution status of the receiver.
  • the transmitter 20 performs authentication and RTT verification, and if it is determined that content sharing can be permitted, the transmitter 20 registers the receiver as a permitted receiver.
  • the transmitter 20 sets the upper limit (reception valid period) during which all receivers can receive content in the common counter. That is, the transmitter 20 initializes a common counter for all registered receivers.
  • the registration of all registered receivers is deleted from the transmitter 20 when it is measured that the predetermined valid reception period has elapsed.
  • the counter is decremented while the transmitter 20 is delivering content. In other words, the counter is decremented if the content is delivered to the registered receiver.
  • FIG. 6 is a diagram illustrating an example of a change in the value of a counter that is held by the transmitter 20 according to Embodiment 2 and that specifies a period during which each receiver can receive content. .
  • receivers 30, 31, and 32 are the same as those in Fig. 5 in the first embodiment.
  • the transmitter 20 receives the authentication request AR01 from the receiver 30, performs authentication (A1) and RTT verification (B1), and the receiver 30 is a legitimate device and is a receiver that satisfies a predetermined condition regarding the connection state. It is determined that it exists, and registration is performed (Rl).
  • the counter is initialized to “40” (TC01), and the exchange key Kxl is passed to the receiver 30 (X01).
  • Transmitter 20 content from receiver 30 1 In response to the distribution request (CR01), content 1 is encrypted using the content 'key created based on the exchange key Kxl and distributed. The counter is decremented as the content is distributed.
  • transmitter 20 receives authentication request AR11 from receiver 31, and performs authentication (A1) and RTT verification.
  • (B1) is performed, and it is determined that the receiver 31 is a legitimate device and is a receiver satisfying a predetermined condition regarding the connection state, and registration is performed (R2).
  • Receiver 30 requests delivery of content 2 (CR02).
  • the transmitter 20 encrypts and distributes content 2 using the content 'key created based on the exchange key Kxl.
  • the receiver 30 interrupts the distribution request when receiving the content 2 for 15 hours, the distribution of the content 2 is interrupted, and the counter value is only for 15 hours when the distribution of the content 2 is performed. Stop at "10" (TC02) decremented.
  • transmitter 20 receives authentication request AR21 from receiver 32, performs authentication (A1) and RTT verification (B1), and receiver 32 is valid.
  • the device determines that the receiver satisfies a predetermined condition regarding the connection status, registers (R3), and passes the exchange key Kx2 to the receiver 32.
  • the transmitter 20 receives the authentication request AR02 from the receiver 30, and the value of the force counter for performing authentication ( ⁇ 2) is “10” and the receiver 30 is registered. Therefore, RTT verification is not performed, and the latest exchange key ⁇ 2 is passed to the receiver 30 ( ⁇ 02). Thereafter, the transmitter 20 receives a distribution request for content 3 from the receiver 32 (CR21), encrypts the content 3 using the content 'key created based on the exchange key Kx2, and distributes the content. The transmitter 20 decrements the counter as content 3 is distributed. When the counter value reaches "0" (TC03), registration that permits content sharing for all registered receivers (receivers 30, 31, 32) is deleted.
  • the receiver 30 is registered in the registration information 'counter holding unit 203, so authentication (A3) and RTT verification ( ⁇ 3 ),
  • the receiver 30 is a legitimate device and is determined to be a receiver satisfying a predetermined condition regarding the connection state, and is registered.
  • the counter is initialized to “40” (TC04), and the latest exchange key Kx3 is passed to the receiver 30 ( ⁇ 03). Therefore, it is clear that unlimited sharing of content is surely prevented, and the transmitter 20 can manage the distribution of content with less resources and is easy to implement.
  • connection state between the transmitter and the receiver that has issued the authentication request satisfies a predetermined condition.
  • the force that the connection state satisfies a predetermined condition may be verified by Time TO Live.
  • the content distribution management device of the present invention is useful as a transmitter or the like that distributes content for a predetermined period to a receiver that has shared the content on a network and manages the distribution of the content.

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Computer And Data Communications (AREA)
PCT/JP2005/016333 2004-09-07 2005-09-06 コンテンツ配信管理装置 Ceased WO2006028092A1 (ja)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US11/661,968 US20080019276A1 (en) 2004-09-07 2005-09-06 Content Distribution Management Device
EP05782214A EP1791361A4 (en) 2004-09-07 2005-09-06 CONTENT DISTRIBUTION MANAGEMENT DEVICE

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2004-259214 2004-09-07
JP2004259214A JP4734872B2 (ja) 2004-09-07 2004-09-07 コンテンツ配信管理装置及びコンテンツ配信管理方法

Publications (1)

Publication Number Publication Date
WO2006028092A1 true WO2006028092A1 (ja) 2006-03-16

Family

ID=36036373

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2005/016333 Ceased WO2006028092A1 (ja) 2004-09-07 2005-09-06 コンテンツ配信管理装置

Country Status (5)

Country Link
US (1) US20080019276A1 (enExample)
EP (1) EP1791361A4 (enExample)
JP (1) JP4734872B2 (enExample)
CN (2) CN102065323A (enExample)
WO (1) WO2006028092A1 (enExample)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011030520A1 (en) * 2009-09-09 2011-03-17 Sony Corporation Communication system, communication apparatus, communication method, and computer program
CN101086752B (zh) * 2006-06-08 2012-05-23 华为技术有限公司 通过中间设备实现许可共享的方法及装置
JP2014068349A (ja) * 2009-09-09 2014-04-17 Sony Corp 通信システム、通信装置及び通信方法、並びにコンピューター・プログラム
JPWO2015008521A1 (ja) * 2013-07-19 2017-03-02 ソニー株式会社 コンテンツ送信装置及びコンテンツ送信方法、コンテンツ受信装置及びコンテンツ受信方法、コンピューター・プログラム、並びにコンテンツ伝送システム

Families Citing this family (47)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8266657B2 (en) 2001-03-15 2012-09-11 Sling Media Inc. Method for effectively implementing a multi-room television system
US6263503B1 (en) 1999-05-26 2001-07-17 Neal Margulis Method for effectively implementing a wireless television system
US8099755B2 (en) 2004-06-07 2012-01-17 Sling Media Pvt. Ltd. Systems and methods for controlling the encoding of a media stream
AU2005253152B2 (en) 2004-06-07 2010-04-22 Sling Media L.L.C. Personal media broadcasting system
US7917932B2 (en) 2005-06-07 2011-03-29 Sling Media, Inc. Personal video recorder functionality for placeshifting systems
US8346605B2 (en) * 2004-06-07 2013-01-01 Sling Media, Inc. Management of shared media content
US7769756B2 (en) 2004-06-07 2010-08-03 Sling Media, Inc. Selection and presentation of context-relevant supplemental content and advertising
US7975062B2 (en) 2004-06-07 2011-07-05 Sling Media, Inc. Capturing and sharing media content
US9998802B2 (en) 2004-06-07 2018-06-12 Sling Media LLC Systems and methods for creating variable length clips from a media stream
EP1688944A1 (en) * 2005-02-02 2006-08-09 Thomson Licensing Distinguishing between live content and recorded content
US7702952B2 (en) 2005-06-30 2010-04-20 Sling Media, Inc. Firmware update for consumer electronic device
JP4730187B2 (ja) * 2006-04-25 2011-07-20 日本ビクター株式会社 コンテンツ再生装置
US8094037B2 (en) * 2007-03-30 2012-01-10 Sony Corporation Method and apparatus for identifying an electronic appliance
US8477793B2 (en) 2007-09-26 2013-07-02 Sling Media, Inc. Media streaming device with gateway functionality
US8350971B2 (en) 2007-10-23 2013-01-08 Sling Media, Inc. Systems and methods for controlling media devices
US8060609B2 (en) 2008-01-04 2011-11-15 Sling Media Inc. Systems and methods for determining attributes of media items accessed via a personal media broadcaster
US8667279B2 (en) 2008-07-01 2014-03-04 Sling Media, Inc. Systems and methods for securely place shifting media content
US8381310B2 (en) 2009-08-13 2013-02-19 Sling Media Pvt. Ltd. Systems, methods, and program applications for selectively restricting the placeshifting of copy protected digital media content
US8667163B2 (en) 2008-09-08 2014-03-04 Sling Media Inc. Systems and methods for projecting images from a computer system
US9191610B2 (en) 2008-11-26 2015-11-17 Sling Media Pvt Ltd. Systems and methods for creating logical media streams for media storage and playback
US8438602B2 (en) 2009-01-26 2013-05-07 Sling Media Inc. Systems and methods for linking media content
US8171148B2 (en) 2009-04-17 2012-05-01 Sling Media, Inc. Systems and methods for establishing connections between devices communicating over a network
US8406431B2 (en) 2009-07-23 2013-03-26 Sling Media Pvt. Ltd. Adaptive gain control for digital audio samples in a media stream
US8879419B2 (en) * 2009-07-28 2014-11-04 Centurylink Intellectual Property Llc System and method for registering an IP telephone
US9479737B2 (en) 2009-08-06 2016-10-25 Echostar Technologies L.L.C. Systems and methods for event programming via a remote media player
US8799408B2 (en) 2009-08-10 2014-08-05 Sling Media Pvt Ltd Localization systems and methods
US8532472B2 (en) 2009-08-10 2013-09-10 Sling Media Pvt Ltd Methods and apparatus for fast seeking within a media stream buffer
US8966101B2 (en) * 2009-08-10 2015-02-24 Sling Media Pvt Ltd Systems and methods for updating firmware over a network
US9525838B2 (en) 2009-08-10 2016-12-20 Sling Media Pvt. Ltd. Systems and methods for virtual remote control of streamed media
US9565479B2 (en) * 2009-08-10 2017-02-07 Sling Media Pvt Ltd. Methods and apparatus for seeking within a media stream using scene detection
US9160974B2 (en) 2009-08-26 2015-10-13 Sling Media, Inc. Systems and methods for transcoding and place shifting media content
US8314893B2 (en) 2009-08-28 2012-11-20 Sling Media Pvt. Ltd. Remote control and method for automatically adjusting the volume output of an audio device
US9015225B2 (en) 2009-11-16 2015-04-21 Echostar Technologies L.L.C. Systems and methods for delivering messages over a network
US8799485B2 (en) 2009-12-18 2014-08-05 Sling Media, Inc. Methods and apparatus for establishing network connections using an inter-mediating device
US8626879B2 (en) 2009-12-22 2014-01-07 Sling Media, Inc. Systems and methods for establishing network connections using local mediation services
US9178923B2 (en) 2009-12-23 2015-11-03 Echostar Technologies L.L.C. Systems and methods for remotely controlling a media server via a network
US9275054B2 (en) 2009-12-28 2016-03-01 Sling Media, Inc. Systems and methods for searching media content
US8856349B2 (en) 2010-02-05 2014-10-07 Sling Media Inc. Connection priority services for data communication between two devices
US20120278728A1 (en) * 2011-04-29 2012-11-01 Sling Media Inc. Download monitoring in a media distribution system
JP2014171107A (ja) * 2013-03-04 2014-09-18 Oki Electric Ind Co Ltd データ処理システム、方法、及びプログラム、並びにデータ配信システム
JP6036415B2 (ja) * 2013-03-08 2016-11-30 ソニー株式会社 通信装置、並びにコンピューター・プログラム配信システム
JP5962549B2 (ja) * 2013-03-08 2016-08-03 ソニー株式会社 通信装置及び通信方法、コンピューター・プログラム、並びに通信システム
KR102133711B1 (ko) * 2013-04-29 2020-07-14 삼성전자 주식회사 무선 통신 시스템에서 사용자 디바이스의 보호 콘텐츠 데이터 전송 방법 및 사용자 디바이스
US9336537B2 (en) 2014-03-06 2016-05-10 Catalina Marketing Corporation System and method of providing a particular number of distributions of media content through a plurality of distribution nodes
JP6095730B2 (ja) * 2015-06-16 2017-03-15 日立マクセル株式会社 コンテンツ送信装置及び方法
JP6323514B2 (ja) * 2016-08-30 2018-05-16 ソニー株式会社 コンテンツ・リモート・アクセス制御方法
KR20180077431A (ko) * 2016-12-29 2018-07-09 주식회사 인코어드 테크놀로지스 전력수요 관리 기능을 갖는 서버, 가전기기, 및 그것의 전력 사용 관리 방법

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001069096A (ja) * 1999-08-27 2001-03-16 Sony Corp 情報配信システム及び情報受信装置
JP2002539724A (ja) * 1999-03-15 2002-11-19 トムソン ライセンシング ソシエテ アノニム デジタル・ホーム・ネットワーク用のグローバル・コピー保護システム
JP2003323343A (ja) * 2001-07-17 2003-11-14 Matsushita Electric Ind Co Ltd コンテンツ利用装置及びネットワークシステム並びにライセンス情報取得方法
JP2004005315A (ja) * 2002-06-03 2004-01-08 Matsushita Electric Ind Co Ltd コンテンツ配信システム及び、それに関する、装置または方法または記録媒体またはプログラム
JP2004110817A (ja) * 2002-08-28 2004-04-08 Matsushita Electric Ind Co Ltd コンテンツ複製管理システム及びネットワーク機器
JP2004362546A (ja) * 2003-06-05 2004-12-24 Samsung Electronics Co Ltd ホームネットワーク上におけるコンテンツ実行のためのライセンス管理システム及び方法

Family Cites Families (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3351919A (en) * 1965-05-19 1967-11-07 Gen Electric Data recording and error detection system
AU3585000A (en) * 1999-01-28 2000-08-18 Brown, Douglas G. Methods and systems for providing information to set-top boxes having set-top box identifiers using frequency shift keying modulation
US7730300B2 (en) * 1999-03-30 2010-06-01 Sony Corporation Method and apparatus for protecting the transfer of data
KR100735503B1 (ko) * 1999-08-27 2007-07-06 소니 가부시끼 가이샤 정보 송신 시스템, 장치 및 방법 및 정보 수신 시스템,장치 및 방법
JP4135287B2 (ja) * 2000-02-01 2008-08-20 ソニー株式会社 記録再生装置、携帯装置、データ転送システム、データ転送方法、データ再生方法、データ転送及び再生方法
JP2002064483A (ja) * 2000-08-18 2002-02-28 Sony Corp ユーザ認証方法、携帯情報端末およびクライアントサービスサーバ
KR100485096B1 (ko) * 2000-09-29 2005-04-25 마츠시타 덴끼 산교 가부시키가이샤 저작권보호 시스템, 송신장치, 수신장치, 브리지장치,저작권보호방법, 매체 및 프로그램
CN1503953A (zh) * 2000-12-08 2004-06-09 ���µ�����ҵ��ʽ���� 分配装置、终端装置以及其中所用的程序和方法
US20020077984A1 (en) * 2000-12-19 2002-06-20 Mark Ireton Enabling protected digital media to be shared between playback devices
US6990116B1 (en) * 2001-01-12 2006-01-24 3Com Corporation Method and system for improving throughput over wireless local area networks with mode switching
KR20030077584A (ko) * 2001-01-29 2003-10-01 다이니폰 인사츠 가부시키가이샤 광고 분배 서버 시스템 및 광고 분배 방법
US6965933B2 (en) * 2001-05-22 2005-11-15 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for token distribution
JP4831890B2 (ja) * 2001-07-06 2011-12-07 パナソニック株式会社 コンテンツ管理方法及びコンテンツ管理装置
WO2003009112A1 (en) * 2001-07-17 2003-01-30 Matsushita Electric Industrial Co., Ltd. Content usage device and network system, and license information acquisition method
JP2003036219A (ja) * 2001-07-25 2003-02-07 Sony Corp コンテンツ配信システム、コンテンツ予約管理装置、コンテンツ予約管理方法、コンテンツ予約管理プログラム及びコンテンツ予約管理プログラム格納媒体
JP4604422B2 (ja) * 2001-07-31 2011-01-05 ソニー株式会社 通信システム、通信装置及び通信方法
CN1564980A (zh) * 2001-08-03 2005-01-12 松下电器产业株式会社 备份恢复系统及权限管理服务器
JP4251794B2 (ja) * 2001-08-07 2009-04-08 ソニー株式会社 情報配信システム及び情報配信方法、並びに情報供給装置及び情報供給方法
JP2005505885A (ja) * 2001-10-17 2005-02-24 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ 安全な1つのドライブによるコピー方法および装置
US8068610B2 (en) * 2001-11-21 2011-11-29 General Instrument Corporation Method and system for providing security within multiple set-top boxes assigned for a single customer
JP4250366B2 (ja) * 2002-02-12 2009-04-08 キヤノン株式会社 電子メール処理システム、方法、プログラム及び記憶媒体
JP3927834B2 (ja) * 2002-02-12 2007-06-13 キヤノン株式会社 サービス提供システム、方法、プログラム及び記憶媒体
CN100479455C (zh) * 2002-04-05 2009-04-15 松下电器产业株式会社 内容使用系统
WO2003098512A1 (en) * 2002-05-15 2003-11-27 Matsushita Electric Industrial Co., Ltd. Content use management system
EP1383327B1 (en) * 2002-06-11 2013-12-25 Panasonic Corporation Content distributing system and data-communication controlling device
JP4426215B2 (ja) * 2002-06-11 2010-03-03 パナソニック株式会社 コンテンツ配送システム及びデータ通信制御装置
AU2003259561A1 (en) * 2002-08-28 2004-03-29 Matsushita Electric Industrial Co., Ltd. Content duplication management system and networked apparatus
US7313137B2 (en) * 2003-02-26 2007-12-25 International Business Machines Corp. System and method for efficient replication and distribution of data objects
JP2004265335A (ja) * 2003-03-04 2004-09-24 Sony Corp 情報処理装置および方法、並びにプログラム
JP4214807B2 (ja) * 2003-03-26 2009-01-28 パナソニック株式会社 著作権保護システム、送信装置、著作権保護方法、及び記録媒体
JP3793171B2 (ja) * 2003-04-25 2006-07-05 株式会社東芝 受信装置、受信システム、受信方法
JP4647903B2 (ja) * 2003-07-09 2011-03-09 株式会社東芝 情報通信装置、通信システム及びデータ伝送制御プログラム
US20050044397A1 (en) * 2003-08-19 2005-02-24 Telefonaktiebolaget Lm Ericsson Method and system for secure time management in digital rights management
JP4645049B2 (ja) * 2004-03-19 2011-03-09 株式会社日立製作所 コンテンツ送信装置およびコンテンツ送信方法
CA2560570C (en) * 2004-03-22 2011-09-13 Samsung Electronics Co., Ltd. Authentication between device and portable storage
US7437771B2 (en) * 2004-04-19 2008-10-14 Woodcock Washburn Llp Rendering protected digital content within a network of computing devices or the like
US7925704B2 (en) * 2004-04-29 2011-04-12 Unspam, Llc Method and system for a reliable distributed category-specific do-not-contact list

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002539724A (ja) * 1999-03-15 2002-11-19 トムソン ライセンシング ソシエテ アノニム デジタル・ホーム・ネットワーク用のグローバル・コピー保護システム
JP2001069096A (ja) * 1999-08-27 2001-03-16 Sony Corp 情報配信システム及び情報受信装置
JP2003323343A (ja) * 2001-07-17 2003-11-14 Matsushita Electric Ind Co Ltd コンテンツ利用装置及びネットワークシステム並びにライセンス情報取得方法
JP2004005315A (ja) * 2002-06-03 2004-01-08 Matsushita Electric Ind Co Ltd コンテンツ配信システム及び、それに関する、装置または方法または記録媒体またはプログラム
JP2004110817A (ja) * 2002-08-28 2004-04-08 Matsushita Electric Ind Co Ltd コンテンツ複製管理システム及びネットワーク機器
JP2004362546A (ja) * 2003-06-05 2004-12-24 Samsung Electronics Co Ltd ホームネットワーク上におけるコンテンツ実行のためのライセンス管理システム及び方法

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101086752B (zh) * 2006-06-08 2012-05-23 华为技术有限公司 通过中间设备实现许可共享的方法及装置
WO2011030520A1 (en) * 2009-09-09 2011-03-17 Sony Corporation Communication system, communication apparatus, communication method, and computer program
JP2011082952A (ja) * 2009-09-09 2011-04-21 Sony Corp 通信システム、通信装置及び通信方法、並びにコンピューター・プログラム
CN102498690A (zh) * 2009-09-09 2012-06-13 索尼公司 通信系统、通信设备、通信方法和计算机程序
JP2014068349A (ja) * 2009-09-09 2014-04-17 Sony Corp 通信システム、通信装置及び通信方法、並びにコンピューター・プログラム
JP2015136158A (ja) * 2009-09-09 2015-07-27 ソニー株式会社 通信システム
JPWO2015008521A1 (ja) * 2013-07-19 2017-03-02 ソニー株式会社 コンテンツ送信装置及びコンテンツ送信方法、コンテンツ受信装置及びコンテンツ受信方法、コンピューター・プログラム、並びにコンテンツ伝送システム

Also Published As

Publication number Publication date
EP1791361A4 (en) 2011-03-16
CN101010957A (zh) 2007-08-01
EP1791361A1 (en) 2007-05-30
JP2006080588A (ja) 2006-03-23
CN102065323A (zh) 2011-05-18
JP4734872B2 (ja) 2011-07-27
US20080019276A1 (en) 2008-01-24

Similar Documents

Publication Publication Date Title
JP4734872B2 (ja) コンテンツ配信管理装置及びコンテンツ配信管理方法
US7949703B2 (en) Group admission system and server and client therefor
KR100975682B1 (ko) 콘텐츠 송신 장치, 콘텐츠 수신 장치 및 콘텐츠 송신 방법
US9774595B2 (en) Method of authentication by token
JP4647903B2 (ja) 情報通信装置、通信システム及びデータ伝送制御プログラム
KR101443612B1 (ko) Ro 이동을 위한 drm 에이전트 간의 인증 방법 및 장치
US8904172B2 (en) Communicating a device descriptor between two devices when registering onto a network
CN100495962C (zh) 内容发送装置、内容接收装置和内容传送方法
US20110179497A1 (en) Data transmission and reception control apparatus, and data transmission and reception system, method, and program
US20090164786A1 (en) Content delivery method, control terminal, and display terminal
CN100481764C (zh) 内容发送装置和内容接收装置
WO2018161807A1 (zh) 用户身份校验方法及装置
JP2006323707A (ja) コンテンツ送信装置、コンテンツ受信装置、コンテンツ送信方法及びコンテンツ受信方法
CN100448198C (zh) 信息处理方法和信息处理装置
JP4470573B2 (ja) 情報配信システム、情報配信サーバ、端末機器、情報配信方法、情報受信方法、情報処理プログラム、及び記憶媒体
CN111049797B (zh) 为智能家居设备配网及数据传输方法、设备及存储介质
US8813191B2 (en) Method and apparatus for controlling the number of devices installed in an authorized domain
US20050021469A1 (en) System and method for securing content copyright
KR100706085B1 (ko) 복수의 디바이스에 적용 가능한 drm 방법
JP4602384B2 (ja) 情報通信装置
JP2010119137A (ja) コンテンツ送信装置及びコンテンツ送信方法
JP2011015444A (ja) コンテンツ送信装置、コンテンツ受信装置およびコンテンツ伝送方法

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

DPEN Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed from 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 200580029634.9

Country of ref document: CN

WWE Wipo information: entry into national phase

Ref document number: 2005782214

Country of ref document: EP

Ref document number: 11661968

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE

WWP Wipo information: published in national office

Ref document number: 2005782214

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 11661968

Country of ref document: US