WO2015104743A1 - 情報処理装置および情報処理方法 - Google Patents
情報処理装置および情報処理方法 Download PDFInfo
- Publication number
- WO2015104743A1 WO2015104743A1 PCT/JP2014/005782 JP2014005782W WO2015104743A1 WO 2015104743 A1 WO2015104743 A1 WO 2015104743A1 JP 2014005782 W JP2014005782 W JP 2014005782W WO 2015104743 A1 WO2015104743 A1 WO 2015104743A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- application
- broadcast
- ait
- information processing
- xml
- Prior art date
Links
- 230000010365 information processing Effects 0.000 title claims abstract description 165
- 238000003672 processing method Methods 0.000 title claims description 5
- 238000004891 communication Methods 0.000 claims description 17
- 230000004913 activation Effects 0.000 claims description 10
- 238000000034 method Methods 0.000 description 37
- 238000010586 diagram Methods 0.000 description 29
- 238000012795 verification Methods 0.000 description 21
- 238000012545 processing Methods 0.000 description 19
- 230000008859 change Effects 0.000 description 11
- 230000006870 function Effects 0.000 description 10
- 238000005516 engineering process Methods 0.000 description 9
- 238000012544 monitoring process Methods 0.000 description 8
- 238000004422 calculation algorithm Methods 0.000 description 7
- 230000004044 response Effects 0.000 description 7
- 230000007704 transition Effects 0.000 description 7
- 239000000284 extract Substances 0.000 description 6
- 230000007246 mechanism Effects 0.000 description 6
- 238000013515 script Methods 0.000 description 6
- 230000006399 behavior Effects 0.000 description 5
- 230000005236 sound signal Effects 0.000 description 4
- 238000007726 management method Methods 0.000 description 3
- 238000010606 normalization Methods 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000009467 reduction Effects 0.000 description 2
- 238000010200 validation analysis Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/443—OS processes, e.g. booting an STB, implementing a Java virtual machine in an STB or power management in an STB
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/254—Management at additional data server, e.g. shopping server, rights management server
- H04N21/2541—Rights Management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/442—Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
- H04N21/44204—Monitoring of content usage, e.g. the number of times a movie has been viewed, copied or the amount which has been watched
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4627—Rights management associated to the content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/63—Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
- H04N21/633—Control signals issued by server directed to the network components or client
- H04N21/6332—Control signals issued by server directed to the network components or client directed to client
- H04N21/6334—Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key
Definitions
- the present technology relates to an information processing apparatus and an information processing method capable of executing an application using an application information table together with presentation of broadcast content.
- Hybrid Broadcast Broadband TV Hybrid Broadcast Broadband TV
- ETSI TS 102 796 As a standard for HbbTV, “ETSI TS 102 796” (see Non-Patent Document 1) has been established in Europe. In Japan, equivalent standards “IPTVFJ STD-0010” (see Non-Patent Document 2) and “IPTVFJ STD-0011” (see Non-Patent Document 3) have been formulated.
- the life cycle from the start to the end of the application is based on a data structure called an AIT section (Application Information Table) superimposed on the broadcast content.
- AIT section Application Information Table
- the information terminal that has acquired the AIT section controls the application based on the application control code included in the AIT section.
- XML-AIT described in the XML format as an optimal format for providing information related to the application to the receiver using a communication network such as the Internet, which has information equivalent to the broadcast AIT section.
- ETSI European Telecommunications Standards Institute
- ETSI TS 102-796 V1.1.1 (2010-06) http://www.etsi.org/deliver/etsi_ts/102700_102799/102796/01.01.01_60/ts_102796v010101p.pdf (2011) (October 21) General IPTV Forum "Broadcasting and Communication Cooperation System Specification 1.0 Version” https://www.iptvforum.jp/download/input.html (accessed December 4, 2013)
- non-broadcast managed application In the future, it is assumed that applications other than broadcasting stations, for example, application manufacturers such as terminal manufacturers and third parties, will provide applications that use broadcast programs in some way.
- application manufacturers such as terminal manufacturers and third parties
- non-broadcast managed application Such an application is referred to as a “non-broadcast managed application”.
- an object of the present technology is to provide an information processing apparatus and an information processing method capable of improving the quality of a service using a non-broadcast managed application.
- an information processing apparatus includes: A broadcast receiver capable of receiving broadcast signals; At least obtain an application information table in which information for controlling the operation of an application using a broadcast signal received by the broadcast receiving unit and information indicating an expiration date are described, and based on the information indicating the expiration date Determining whether an expiration date of the acquired application information table has been exceeded, and invalidating activation of the application based on the application information table when it is determined that the expiration date has been exceeded And a controller configured as described above.
- the controller holds the application information table acquired last, and whether or not the expiration date of the application information table is exceeded based on the information indicating the expiration date described in the held application information table May be configured to determine.
- the controller may be configured to determine whether an expiration date of the application information table has expired when the application to be activated is selected by a user.
- the controller may be configured to control the operation of the application based on the held application information table when offline.
- the controller may be configured to acquire the application through communication.
- the controller may be configured to acquire the application information table by communication.
- the information processing method is as follows:
- the controller At least obtain an application information table in which information for controlling the operation of the application using the broadcast signal and information indicating the expiration date are described, Based on the information indicating the expiration date, determine whether the expiration date of the acquired application information table has exceeded, When it is determined that the expiration date has been exceeded, the activation of the application based on the application information table is invalidated.
- FIG. 10 is a sequence diagram showing a flow of exchange among a broadcasting station, an application server, an XML-AIT server, and an information processing apparatus regarding control of a broadcast resource usage permission range after a non-broadcast managed application is activated.
- FIG. 10 is a sequence diagram showing a flow of exchange among a broadcasting station, an application server, an XML-AIT server, and an information processing apparatus when a direct channel selection operation occurs during execution of a non-broadcast managed application. It is a flowchart which shows the flow of control of an application controller when direct channel selection operation generate
- FIG. 1 It is a figure which shows the 3rd example of an update of an overlay area. It is a block diagram for demonstrating the structure of the production
- FIG. 10 is a flowchart showing a flow of control from when a non-broadcast managed application to be activated is selected in the application launcher until determining whether to activate the non-broadcast managed application based on the expiration date of the XML-AIT. It is a figure which shows the syntax of an application type descriptor. It is a figure for demonstrating full screen control. It is a figure for demonstrating full screen control. It is a figure for demonstrating partial screen control.
- FIG. 1 is a diagram illustrating a configuration of an information processing system according to the present embodiment.
- the information processing system 10 of the present embodiment includes a broadcasting station 100, a first network 200 such as the Internet, an application server 300, an XML-AIT server 400, an edge router 500, a LAN (Local Area Network), and the like. It has a second network 600, an information processing apparatus 700 as a broadcast receiver, and a store server 800.
- the broadcasting station 100 (broadcasting device) has a broadcasting facility (broadcasting unit) that transmits a digital broadcasting signal via a communication medium such as a terrestrial wave, a satellite wave, and an IP (Internet Protocol) network.
- the broadcast station 100 sends out an AV stream in which transport streams such as video, audio, and subtitles are multiplexed, and a so-called broadcast stream in which data associated with the AV stream is superimposed.
- As data accompanying the AV stream in order to control the operation of a broadcast managed application written in a markup language such as HTML or BML or a script language such as Java (registered trademark) or a non-broadcast managed application after startup.
- Section format AIT Application Information Table
- this AIT is referred to as “section AIT”.
- an AV stream in which transport streams such as video, audio, and subtitles are multiplexed and transmitted is called “broadcast content”, and this term includes the meanings of application and section AIT. Suppose that it is not possible.
- the store server 800 provides the user of the information processing apparatus 700 with an environment in which a non-broadcast managed application to be used can be selected or purchased, and information necessary for using the non-broadcast managed application selected or purchased by the user. Perform the service to be granted.
- the “non-broadcast managed application” is an application provided by a person other than the creator of the broadcast resource, for example, an application provider such as a terminal manufacturer or a third party.
- the fundamental difference between the non-broadcast managed application and the above-mentioned broadcast managed application is that the operation from the start to the end of the broadcast managed application is managed by the section AIT distributed by the broadcast wave, whereas the non-broadcast managed application Is that at least operations such as activation are controlled by XML-AIT (Extensible Markup Language-Application Information Table) acquired through the network.
- XML-AIT Extensible Markup Language-Application Information Table
- the store server 800 distributes information necessary for making the non-broadcast managed application available to the information processing apparatus 700 of the user in response to a request for use of an arbitrary non-broadcast managed application from the user.
- the information necessary to make the non-broadcast managed application available is, for example, XML-AIT location information of the non-broadcast managed application.
- the XML-AIT server 400 can be connected to the first network 200.
- the XML-AIT server 400 distributes the XML-AIT through the first network 200 in response to a request from the information processing apparatus 700.
- the XML-AIT includes information for controlling at least activation of a managed application outside broadcasting. Note that the section AIT may include information for controlling the operation after activation of a non-broadcast managed application activated in accordance with XML-AIT.
- the application server 300 can be connected to the first network 200.
- the application server 300 responds to a non-broadcast managed application in response to a request from the information processing apparatus 700.
- the application server 300 may be able to provide a broadcast managed application.
- Store server 800, the application server 300, and the XML-AIT server 400 may be a single server.
- Store server 800, application server 300, and XML-AIT server 400 each include a CPU, a main memory, a data storage device, a user interface, and the like, and have a configuration as a typical computer.
- the edge router 500 is a router for connecting the first network 200 and the second network 600.
- the second network 600 may be wired or wireless.
- the information processing apparatus 700 is, for example, a personal computer, a mobile phone, a smartphone, a television device, a game machine, a tablet terminal, an audio / video playback device, or the like, but a specific product form is not limited.
- the information processing apparatus 700 receives a digital broadcast signal from the broadcast station 100 and demodulates it to obtain a transport stream.
- the information processing apparatus 700 separates a broadcast stream from the transport stream, decodes and decodes the stream and connects to the information processing apparatus 700, a speaker unit (not shown), and a recording device (not shown). Output).
- Each of the display unit, the speaker unit, and the recording device may be integrated with the information processing device 700, or may be connected to the information processing device 700 directly or via the second network 600 as an independent device. Also good. Alternatively, a device (not shown) having a display unit and a speaker unit may be connected to the information processing apparatus 700 directly or via the second network 600.
- the information processing apparatus 700 can extract a broadcast managed application and a PSI / SI including an AIT section from the acquired transport stream, interpret the AIT section, and control the broadcast managed application.
- the broadcast managed application is a visible application
- the information processing apparatus 700 combines the video signal generated by the execution of the broadcast managed application with the video signal and the caption signal of the broadcast content on the display unit. Output.
- the information processing apparatus 700 can select or purchase a non-broadcast managed application that the user wants to use by accessing the store server 800 in accordance with a command given by the user.
- the timing at which the information processing apparatus 700 accesses the store server 800 to select or purchase a non-broadcast managed application does not depend on the timing of the broadcast stream. That is, it is arbitrary.
- the information processing apparatus 700 selects, from the store server 800, XML-AIT location information for the non-broadcast managed application as information necessary for using the non-broadcast managed application by selecting or purchasing the non-broadcast managed application. To get.
- the information processing apparatus 700 can acquire the XML-AIT by accessing the XML-AIT server 400 using the acquired location information of the XML-AIT.
- the information processing apparatus 700 accesses the application server 300 through the network using the location information of the non-broadcast managed application described in the acquired XML-AIT, thereby broadcasting the XML-AIT to be controlled. External managed application can be acquired.
- the information processing apparatus 700 extracts the application identifier of the non-broadcast managed application that is the control target from the acquired XML-AIT, and extracts the application from one or more sections AIT multiplexed in the received transport stream. A section AIT having an identifier is extracted.
- the information processing apparatus 700 can also control the operation of a broadcast-excluding managed application that has already been started according to this section AIT.
- Non-broadcast managed applications are roughly classified into package-type non-broadcast managed applications and web-type non-broadcast managed applications.
- FIG. 34 is a diagram illustrating the configuration of a non-broadcast managed application (package type).
- the non-broadcast managed application 30 includes markup documents 31 and 32 such as an HTML (Hyper Text Markup Language) document, a BML document (Broadcast Markup Language), an MHEG document (Multimedia and Hypermedia information coding), and the markup document 31. 32, for example, data files 33, 34, 35, and 36 such as still images, moving images, sounds, and vector graphics, script files 37 such as Java (registered trademark) scripts, and CSS (Cascading Style Sheets) ) And the like.
- markup documents 31 and 32 such as an HTML (Hyper Text Markup Language) document, a BML document (Broadcast Markup Language), an MHEG document (Multimedia and Hypermedia information coding), and the markup document 31. 32, for example, data files 33, 34, 35, and 36 such as still images, moving images, sounds, and vector graphics, script files 37 such as Java (registered trademark)
- the non-broadcast managed application 30 is composed of one or more pages. Each page is connected to each other by a hyperlink to constitute one non-broadcast managed application 30 as a whole.
- the package-type non-broadcast managed application 30 is a package of all resource files constituting the non-broadcast managed application 30. This package is arranged in the application server 300 and is sent to the information processing apparatus 700 in response to an acquisition request from the information processing apparatus 700. The information processing apparatus 700 stores the acquired package. Therefore, the information processing apparatus 700 can activate the non-broadcast managed application 30 only by accessing each resource file in the package stored in the information processing apparatus 700.
- a web-type non-broadcast managed application is an application that is started by acquiring necessary resource files by the information processing apparatus 700 in units of pages.
- the acquired resource file for each page is not stored in the information processing apparatus 700.
- the information processing apparatus 700 accesses a resource file in page units necessary for the server each time.
- Non-broadcast managed applications can be visible or invisible.
- the visible state is a state where the user can see the operation of the non-broadcast managed application through the screen.
- the invisible state is a state in which the user cannot see the operation of the non-broadcast managed application through the screen.
- non-broadcast managed application may be an interactive application that can change information and functions to be presented according to an operation by the user of the information processing apparatus 700, or may be an application that presents information in one direction to the user.
- FIG. 2 is a diagram showing the data structure of the XML-AIT according to this embodiment.
- XML-AIT includes an application name (appName), an application identifier (applicationId), an application descriptor (applicationDescriptor), a transport protocol descriptor (applicationTransport), an application location descriptor (applicationLocation), an application for each managed application other than broadcast.
- Boundary descriptor applicationBoundary
- application specific descriptor applicationSpecificDescriptor
- application usage descriptor applicationUsageDescriptor
- usage permission information descriptor 21 (broadcastResourcePermissionDescriptor), expiration date (expireDate) 22, parent application ID (parentAppID) 23, application Hash descriptor (applicationHashDescriptor) 24 and application type descriptor (applicationTypeDescriptor) 25 Etc.
- the application descriptor includes an application type (applicationType), an application control code (controlCode) 26, a flag (visibility) that specifies visibility and invisibility of the application, a flag (serviceBound) indicating whether the application is associated with a service, , A version of the application, a version of the application, icon information (icon), information for the information processing apparatus 700 to record or cache the application (storageCapability), and the like are stored.
- the usage permission information descriptor 21 is a descriptor added when the use of broadcast resources is permitted to a non-broadcast managed application.
- the expiration date 22 is information for designating the expiration date of the XML-AIT cached in the information processing device 700 when the information processing device 700 is not connected to the network (when offline).
- the parent application ID 23 is an ID of a parent non-broadcast managed application having a relationship that the expiration date is linked.
- the “relationship with which the expiration date is linked” is, for example, 1. Synchronize with the expiration date of the parent non-broadcast managed application and set it as the expiration date of the self-broadcast managed application. 2. When the expiration date of the parent non-broadcast managed application expires, the expiration date of the self-broadcast managed application becomes valid. 3. The expiration date of the non-broadcast managed application runs out in synchronization with the expiration date of the parent non-broadcast managed application. And so on.
- the managed application other than its own broadcast is affected by the expiration date of the parent non-broadcast managed application. That is, whether or not the parent non-broadcast managed application is affected by the expiration date of the managed application other than its own broadcast depends on the parent application ID of the parent non-broadcast managed application XML-AIT.
- FIG. 3 is a diagram illustrating the syntax of the usage permission information descriptor 21.
- the use permission information descriptor 21 one or more service use permission information (Service_permission) and one or more overlay area information (Overlay_area) can be described.
- the service use permission information includes a permission designation unit (scope) indicating the scope of use permission.
- scope indicating the scope of use permission.
- the permission specification units are as follows. all: All broadcasters affiliate: affiliates broadcaster: broadcasters service: channel event: program series: series
- the permission designation unit is “service”, which channel is designated by a network ID (network_Id), a transport stream ID (transport_stream_id), and a service ID (service_id).
- Event which program is designated by the network ID, transport stream ID, service ID, and event ID (event_id).
- a permission bitmap (permission) is further stored.
- the permission bitmap is binary data of service usage permission information.
- the permission bitmap is stored in the memory of the application controller 708.
- the application controller 708 refers to the permission bitmap held in the memory and controls the range of use of the broadcast resource by the non-broadcast managed application.
- the permission bitmap held in the memory is compared with the permission bitmap stored in the external application control descriptor of the section AIT acquired by the information processing apparatus 700 after starting the non-broadcast managed application. If there is a difference between the two permission bitmaps, the permission bitmap stored in the external application control descriptor of the section AIT is overwritten with the permission bitmap of the memory. Thereafter, the application controller 708 controls the broadcast resource usage range by the non-broadcast managed application with reference to the overwritten permission bitmap.
- the broadcast station side can dynamically change the range of the usage permission information set in the XML-AIT created by a third party such as a provider of a non-broadcast managed application using the section AIT. Realized.
- information (Overlay_Permission_error_behaviour) related to the behavior at the time of a permission error is further described. For example, the following is information regarding the behavior at the time of a permission error.
- app_off Hides the application.
- video_off Hide the broadcast resource video.
- app_suspend Hides the application and suspends the operation of the application. As described above, when a permission error occurs, at least the video of the broadcast resource is hidden, so that the use of the broadcast resource is substantially disabled.
- the overlay area information is information for defining an overlay area.
- the overlay area is an area on the display screen where a non-broadcast managed application may be displayed.
- the overlay area is an area that is set so as to overlap mainly on an area where broadcast video is displayed.
- Information for defining the overlay area includes area ID (areaId), element ID in HTML application (elementId), area upper left horizontal coordinate (upper_left_horizontal), area upper left vertical coordinate (upper_left_vertical), and area horizontal size (horizontal_size) And area vertical size (vertical_size).
- the area ID is an identifier for identifying the overlay area.
- the ID of the element in the HTML application is an identifier that identifies the non-broadcast managed application or the element in the non-broadcast managed application associated with the overlay area.
- the area upper left horizontal coordinate and the area upper left vertical coordinate are information for specifying the coordinates of the upper left corner of the overlay area.
- the area vertical size and area horizontal size are information for specifying the vertical and horizontal sizes of the overlay area.
- An electronic signature for detecting tampering is attached to XML-AIT.
- an XML signature is used as the electronic signature.
- the format of the XML signature may be any one of a detached signature independent of the XML-AIT, an enveloping signature having a format including the XML-AIT, and an enveloped signature having a format included in the XML-AIT. In order to suppress the influence on the format of XML-AIT, it is preferable to adopt a detached signature.
- the application controller 708 of the information processing apparatus 700 verifies the XML signature in accordance with a core verification procedure including reference verification (Reference Validation) and signature verification (Signature Validation).
- Reference verification is a method of verifying a digest value (DigestValue) of a reference (Reference) by applying a normalization transformation process (Transform) and a digest calculation algorithm (DigestMethod) to a resource (XML-AIT). The result obtained by the reference verification is compared with the registered digest value (DigestValue). If they do not match, the verification fails.
- SignatureInfo signature information
- CanonicalizationMethod XML normalization algorithm
- KeyInfo key information
- SignatureMethod a signature algorithm
- FIG. 4 shows the data structure of section AIT.
- the section AIT includes a table ID (table_id), a section syntax instruction (section_syntax_indicator), a section length (section_length), an application type (application_type), a version number (version_number), a current next instruction (current_next_indicator), a section number (section_number), and a final number.
- a section number (last_section_number), a common descriptor area 41 (descriptor), an application information loop length (application_loop_length), an application identifier (application_identifier), an application control code 42 (application_control_code), an application descriptor (application_descriptor), and the like are stored.
- the common descriptor area 41 stores an external application control descriptor (External_application_control_descriptor) for controlling the operation of the non-broadcast managed application.
- FIG. 5 is a diagram illustrating the syntax of the external application control descriptor (External_application_control_descriptor).
- a descriptor tag (descriptor_tag), a descriptor length (descriptor_length), a permission bitmap number (permission_bitmap_count), a permission bitmap 58 (permission_bitmap), and the like are described.
- the permission bitmap 58 described in the section AIT is binary data indicating a range of permission for use of broadcast resources by a non-broadcast managed application that is already activated in the information processing apparatus 700, that is, binary data of service use permission information. .
- This permission bitmap is compared with the permission bitmap already held in the memory of the application controller 708 of the information processing apparatus 700.
- the XML-AIT permission bitmap and the section AIT permission bitmap may include binary data of information related to behavior at the time of a permission error.
- the XML-AIT is configured so that binary data of information regarding the behavior at the time of the permission error is included in the permission bitmap.
- overlay permission polarity (overlay_admission_polarity) and the number of overlay control areas (overlay_contolled_area_count) are described as information on the overlay area.
- the overlay permission polarity is information that specifies whether the overlay area defined in the section AIT can be used or cannot be used.
- the number of overlay control areas is information that specifies the number of overlay areas.
- the external application control descriptor further includes overlay area tag (overlay_controlled_area_tag), area upper left horizontal coordinate (upper_left_horizontal), area upper left vertical coordinate (upper_left_vertical), area horizontal size (horizontal_size) and area vertical size ( vertical_size) etc. are described.
- the overlay area tag is tag information for identifying the overlay area.
- the information specified by each of the area upper left horizontal coordinate, area upper left vertical coordinate, area horizontal size, and area vertical size is the same as the descriptor with the same name in the usage permission information descriptor of XML-AIT.
- a black / white application list number (bw_application_list_count), an application ID (application_identifier), a black / white polarity (black_white_polarity), and the like are further described.
- the number of black / white application lists is information that specifies the number of applications that are permitted or prohibited to use broadcast resources.
- Application ID is the application ID of an application that permits or prohibits the use of broadcast resources.
- Black / white polarity is information that specifies whether to permit or prohibit the use of broadcast resources. For example, even if the polarity that can use the overlay area is specified as the overlay permission polarity, if "prohibited" is specified by the black / white polarity for a specific non-broadcast managed application, Use of broadcast resources by the specific non-broadcast managed application is prohibited. In addition, even if the polarity that cannot use the overlay area is specified as the overlay permission polarity, if “permission” is specified by the black / white polarity for a specific non-broadcast managed application, Use of broadcast resources by the specific non-broadcast managed application is permitted.
- the life cycle of the application is dynamically controlled by the information processing apparatus 700 based on the application control codes 26 and 42 stored in the XML-AIT and the section AIT.
- FIG. 6 is a diagram showing the definition of the application control codes 26 and 42.
- “AUTOSTART”, “PRESENT”, “DESTROY”, “KILL”, “PREFETCH”, “REMOTE”, “DISABLED”, “PLAYBACK_AUTOSTART” are standard specifications. Exist on.
- the definitions of these application control codes are as follows.
- AUTOSTART is a code for instructing to automatically start an application in accordance with selection of a service. This is not the case if the application is already running.
- PRESENT is a code for instructing that the application be executable while the service is selected. However, the target application is not automatically activated in accordance with the selection of the service, but is activated in response to an activation instruction from the user.
- DESTROY is a code for instructing permission to end the application.
- KILL is a code for instructing the forced termination of the application.
- PREFETCH is a code for instructing application caching.
- REMOTE is a code indicating that the application cannot be acquired with the current transport stream. The application can be acquired from another transport stream or cache and used.
- DISABLED is a code indicating that the activation of the application is prohibited.
- PLAYBACK_AUTOSTART is a code for starting an application along with reproduction of broadcast content recorded in the storage (recording device).
- FIG. 7 is a block diagram showing the configuration of the information processing apparatus 700 of this embodiment.
- the information processing apparatus 700 includes a broadcast interface 701, a demultiplexer 702, an output processing unit 703, a video decoder 704, an audio decoder 705, a caption decoder 706, a communication interface 707, and an application controller 708 (controller).
- the broadcast interface 701 (broadcast receiving unit) includes an antenna and a tuner, and receives a digital broadcast signal selected by the user using these.
- the broadcast interface 701 outputs a transport stream obtained by performing demodulation processing or the like on the received digital broadcast signal to the demultiplexer 702.
- the demultiplexer 702 separates the broadcast content stream packet, application packet, and AIT section packet from the transport stream.
- the demultiplexer 702 separates the video ES (Elementary Stream), the audio ES, and the caption ES from the stream packet of the broadcast content.
- the demultiplexer 702 includes PSI / SI (Program Specific Information / Service Information) including video ES to the video decoder 704, audio ES to the audio decoder 705, subtitle ES to the subtitle decoder 706, and application packet and AIT section. Are distributed to the application controller 708 respectively.
- PSI / SI Program Specific Information / Service Information
- the video decoder 704 decodes the video ES to generate a video signal, and outputs the generated video signal to the output processing unit 703.
- the audio decoder 705 decodes the audio ES to generate an audio signal, and outputs the generated audio signal to the output processing unit 703.
- the caption decoder 706 decodes the caption ES to generate a caption signal, and outputs the generated caption signal to the output processing unit 703.
- a broadcast interface 701, a demultiplexer 702, an output processing unit 703, a video decoder 704, an audio decoder 705, and a caption decoder 706 are broadcast content processing units that perform processing for receiving and presenting broadcast content.
- the communication interface 707 is an interface for communicating with an external device through the second network 600 such as a LAN.
- the communication interface 707 may be wireless communication or wired communication.
- Application controller 708 is a controller that performs processing related to application control.
- the output processing unit 703 combines the video signal from the video decoder 704, the audio signal from the audio decoder 705, the subtitle signal from the subtitle decoder 706, the video signal and audio signal from the application controller 708, and the like into the information processing apparatus 700.
- the data is output to a connected recording device (not shown), a display unit, and a speaker unit (not shown).
- Part or all of the configuration including at least the application controller 708 of the information processing apparatus 700 is provided by a computer having a CPU (Central Processing Unit) and a memory, and a program that causes the computer to function as the application controller 708 and the like. .
- a computer having a CPU (Central Processing Unit) and a memory, and a program that causes the computer to function as the application controller 708 and the like.
- FIG. 8 shows an application server 300, an XML-AIT server 400, from when the app shop call button of the remote controller is operated in the information processing apparatus 700 until the non-broadcast managed application selected by the user is started in the information processing apparatus 700.
- 6 is a sequence diagram showing a flow of exchange between information processing apparatus 700 and store server 800.
- a predetermined button of the remote controller of the information processing apparatus 700 is provided with an app shop call button in which location information such as a URL of an application store operated by the application server 300 is linked in advance.
- location information such as a URL of an application store operated by the application server 300 is linked in advance.
- the application controller 708 of the information processing apparatus 700 accesses the store server 800 by using the location information associated with the app shop button, thereby allowing the app store.
- a screen is acquired and displayed on the display unit of the information processing apparatus 700.
- non-broadcast managed applications are presented along with various information such as function descriptions and usage conditions.
- the user can select a desired non-broadcast managed application. Thereafter, for example, when the non-broadcast managed application is a paid application, the user performs a procedure such as purchase. Needless to say, purchase and other procedures are not necessary for a free non-broadcast managed application.
- the store server 800 includes, for example, the name of the non-broadcast managed application, icon information (bitmap image), and the non-broadcast managed application.
- Application information including location information such as a URL indicating the location of the XML-AIT that controls the operation is returned to the information processing apparatus 700 of the user.
- the application controller 708 of the information processing apparatus 700 stores the application information returned from the store server 800.
- the application controller 708 of the information processing apparatus 700 continues to select another non-broadcast managed application on the app store screen, and obtains and stores the application information of the other non-broadcast managed application that is responded from the store server 800. can do.
- FIG. 9 is a flowchart showing a processing procedure by the application controller 708 of the information processing apparatus 700 after the application launcher is displayed.
- Another predetermined button of the remote controller of the information processing apparatus 700 is provided with an application launcher button for displaying the application launcher.
- the application launcher button When the application launcher button is operated by the user of the information processing apparatus 700, the application controller 708 generates the application launcher 61 as shown in FIG. 10 based on each stored application information, Control is performed so that the information is displayed on the display unit of the information processing apparatus 700 (step 101 in FIG. 9).
- FIG. 10 is a diagram illustrating an example of an application launcher.
- the application launcher 61 is a menu screen of a selectable non-broadcast managed application.
- App1-App8 are icons for selecting individual managed applications outside broadcasting. In the vicinity of the icon, the name or function description of the non-broadcast managed application is displayed.
- Each selection icon App1-App8 is associated with location information such as a URL indicating the location of the XML-AIT that controls the operation of the corresponding non-broadcast managed application.
- the application controller 708 recognizes the selected non-broadcast managed application (step S102 in FIG. 9).
- the application controller 708 of the information processing apparatus 700 uses the location information associated with the icon selected by the user in the application launcher 61 to control the operation of the non-broadcast managed application selected by the user. Is acquired and transmitted to the XML-AIT server 400. In response to the XML-AIT acquisition request from the information processing apparatus 700, the XML-AIT server 400 returns a response including the corresponding XML-AIT to the information processing apparatus 700 (step S103 in FIG. 9). In this way, the information processing apparatus 700 can acquire the XML-AIT that controls the operation of the non-broadcast managed application selected by the user.
- the application controller 708 of the information processing apparatus 700 acquires the non-broadcast managed application by accessing the application server 300 based on the location information of the application described in the acquired XML-AIT (FIG. 9). Step S104).
- the acquired non-broadcast managed application is a packaged application.
- the packaged application is an application in a format in which all information (HTML5, script, image, etc.) necessary for executing this application is stored (installed) in the information processing apparatus 700 and executed.
- the application controller 708 After acquiring the non-broadcast managed application, the application controller 708 starts the acquired non-broadcast managed application according to the application control code “AUTOSTART” described in the XML-AIT (step S105 in FIG. 9).
- FIG. 11 shows a flow of communication among the broadcasting station 100, the application server 300, the XML-AIT server 400, and the information processing apparatus 700 related to control of the broadcast resource usage permission range after the non-broadcast managed application is activated.
- FIG. 11 shows a flow of communication among the broadcasting station 100, the application server 300, the XML-AIT server 400, and the information processing apparatus 700 related to control of the broadcast resource usage permission range after the non-broadcast managed application is activated.
- the application controller 708 activates the non-broadcast managed application and then monitors a broadcast resource access request from the non-broadcast managed application (step S106 in FIG. 9).
- the application controller 708 detects a broadcast resource access request from a non-broadcast managed application (Y in step S106 in FIG. 9)
- the broadcast station public key certificate corresponding to this broadcast resource is stored in the memory in the information processing apparatus 700. Whether it is stored is checked (step S107 in FIG. 9).
- the application controller 708 of the information processing apparatus 700 transmits the target broadcast station public key certificate in the data carousel. Wait for. Upon receiving the target broadcast station public key certificate, the application controller 708 stores it in the memory (step S108 in FIG. 9).
- the application controller 708 verifies the electronic signature attached to the running non-broadcast managed application using the broadcasting station public key certificate stored in the memory (step S110 in FIG. 9). If verification of the electronic signature fails (N in step S111 in FIG. 9), the application controller 708 assumes that the non-broadcast managed application has not been authenticated by the broadcast station, and accesses all broadcast resources of the broadcast station. Is set to be prohibited (step S112 in FIG. 9). In a state where access to the broadcast resource is prohibited, access to the broadcast resource is disabled even when a non-broadcast managed application is activated.
- step S111 If the verification of the electronic signature is successful (Y in step S111), the application controller 708 executes the managed application other than broadcast based on the service use permission information in the use permission information descriptor 21 described in the XML-AIT. It is determined whether or not access to the requested broadcast resource is possible (step S113 in FIG. 9).
- the service use permission information in the use permission information descriptor 21 described in the XML-AIT is held in the memory of the application controller 708 as a permission bitmap (binary data).
- the application controller 708 refers to the permission bitmap to determine whether or not the broadcast resource requested to be accessed by the non-broadcast managed application can be accessed.
- the permission designation unit in the service use license information is “service”.
- information for specifying a channel is specified by a network ID, a transport stream ID, and a service ID by the service use permission information in the use permission information descriptor 21.
- the channel is referred to as “channel x”.
- the application controller 708 permits the access request and permits access to “channel x”.
- the application controller 708 determines that a permission error has occurred. In this case, the application controller 708 controls the operation of the non-broadcast managed application in accordance with the information regarding the behavior at the time of the permission error stored in the service usage permission information in the usage permission information descriptor 21.
- the application controller 708 allows the non-broadcast managed application to access the broadcast resource within the permitted range based on the XML-AIT service usage permission information when the electronic signature is successfully verified. Control is performed (step S114 in FIG. 9).
- a section AIT for controlling the operation of a non-broadcast managed application running on the information processing apparatus 700 is periodically transmitted from the broadcasting station 100.
- the section AIT transmission cycle is, for example, about 100 ms.
- the generation of the section AIT is managed by the version number.
- the application controller 708 holds the version number of the section AIT acquired last, and receives the section AIT having a version number different from the held version number (step S115 in FIG. 9).
- the application controller 708 confirms whether or not an external application control descriptor is added to the received section AIT (step S116 in FIG. 9).
- the external application control descriptor is not added (N in step S116 in FIG. 9)
- the use of broadcast resources based on the usage permission information descriptor 21 (permission bitmap held in the memory) stored in the XML-AIT Control of permission continues.
- the application controller 708 displays the permission bitmap of this external application control descriptor and the permission bits held in the memory. The map is compared (step S117 in FIG. 9). If there is a difference between the two permission bitmaps (Y in step S117 in FIG. 9), the application controller 708 updates the memory permission bitmap with the permission bitmap in the external application control descriptor (step S118 in FIG. 9). . As a result, the use permission range of the broadcast resource intended by the broadcast station is set in the information processing apparatus 700.
- the permission bitmap stored in the external application control descriptor If there is no difference between the permission bitmap stored in the external application control descriptor and the permission bitmap stored in the memory (N in step S117 in FIG. 9), the permission bitmap stored in the memory is left as it is. Thus, the control of the license for using the broadcast resource based on the permission bitmap is continued.
- step S120 in FIG. 9 the application controller 708 of the information processing apparatus 700 selects a non-broadcast managed application. Terminate (step S122 in FIG. 9).
- the application controller 708 of the information processing apparatus 700 when an application control code other than “AUTOSTART”, “DESTROY”, and “KILL” is described in the section AIT acquired during execution of the non-broadcast managed application, After processing such as transition of the state of the non-broadcast managed application in accordance with the application control code (step S121 in FIG. 9), the next section AIT is waited.
- FIG. 12 is a sequence showing a flow of exchange among the broadcasting station 100, the application server 300, the XML-AIT server 400, and the information processing apparatus 700 when a direct channel selection operation occurs during execution of a non-broadcast managed application.
- FIG. 13 is a flowchart showing a control flow of the application controller 708 when a direct channel selection operation occurs during execution of a non-broadcast managed application.
- the application controller 708 of the information processing apparatus 700 displays a broadcast station public key certificate corresponding to the directly selected broadcast channel. It is checked whether or not the document is stored in the memory in the information processing apparatus 700 (step S202 in FIG. 13).
- the application controller 708 of the information processing apparatus 700 displays the data carousel of the broadcast channel to which the target broadcast station public key certificate is switched.
- the target broadcast station public key certificate transmitted by the data carousel or the like is received, it is stored in the memory (step S203 in FIG. 13).
- a broadcast station public key certificate is transmitted in a data carousel, but a public key certificate using communication, such as obtaining a public key certificate from a server designated in advance, is obtained. You may make it do.
- the application controller 708 verifies the electronic signature attached to the running non-broadcast managed application using the broadcast station public key certificate stored in the memory (step S205 in FIG. 13). If the digital signature fails (N in step S206 in FIG. 13), the application controller 708 ends the non-broadcast managed application (step S209 in FIG. 13).
- step S206 of FIG. 13 If the signature of the electronic signature is successful (Y in step S206 of FIG. 13), the application controller 708 continues the operation of the non-broadcast managed application, and within the permitted range based on the permission bitmap, the non-broadcast managed application Is controlled to access the broadcast resource (step S207 in FIG. 13).
- the application controller 708 performs control in the same manner as when the non-broadcast managed application is selected by the user from the application launcher described above.
- the XML-AIT and the section AIT can describe overlay area information (Overlay_area) for defining an area on the display screen D on which a non-broadcast managed application may be displayed as an overlay area. .
- FIG. 14 is a diagram showing an example of setting an overlay area based on the overlay area information in the XML-AIT usage permission information descriptor 21.
- Each overlay area defines an area on the display screen D by area upper left horizontal coordinates (upper_left_horizontal), area upper left vertical coordinates (upper_left_vertical), area horizontal size (horizontal_size), and area vertical size (vertical_size).
- the application controller 708 creates each overlay area based on the overlay area information (Overlay_area) in the usage permission information descriptor 21 of the XML-AIT.
- the application controller 708 again sets the overlay area based on the information about the overlay area included in the external application control descriptor (External_application_control_descriptor) of the common descriptor area 41 (descriptor) of the section AIT obtained after the start of the non-broadcast managed application. Can be created. That is, it can be updated to the overlay area intended by the broadcasting station 100.
- FIG. 15 is a diagram illustrating a first update example of the overlay area.
- the overlay area 1 is created based on the overlay area information (Overlay_area) in the usage permission information descriptor 21 of the XML-AIT. Furthermore, it is assumed that a display area 2 of a broadcast non-broadcast managed application is provided in the overlay area 1.
- the application controller 708 creates a new overlay area 3 instead of the existing overlay area 1 based on the information regarding the overlay area included in the external application control descriptor of the received section AIT. .
- the application controller 708 moves the display area 2 of the non-broadcast managed application into the newly created overlay area 3 in accordance with a program incorporated in advance in the application controller 708. To control.
- the position of the display area 2 of the non-broadcast managed application is controlled by the application controller 708.
- the display area 2 of the non-broadcast managed application is controlled to be arranged at a predetermined position.
- the application controller 708 exclusively controls each other's position.
- FIG. 16 is a diagram illustrating a second update example of the overlay area.
- the application controller 708 is incorporated in the application controller 708 in advance. The following control is performed according to the programmed program.
- the application controller 708 reduces the broadcast video display area 4 from the state in which, for example, the entire surface of the display screen D is used as the broadcast video display area 4, and sets the free space thus created as the application display area 5. .
- the application controller 708 performs control so that the display area 2 of the non-broadcast managed application is displayed in the application display area 5 regardless of the information regarding the overlay area of the external application control descriptor.
- FIG. 17 is a diagram illustrating a third update example of the overlay area.
- an overlay area 1 that uses the entire screen of the display screen D is set based on the XML-AIT overlay area information.
- the display area 2 of the non-broadcast managed application is allocated to the entire overlay area 1, and the broadcast video display area 4 is set in a part thereof.
- the application controller 708 creates a new overlay area 3 instead of the existing overlay area 1 based on the information regarding the overlay area included in the external application control descriptor of the section AIT received after channel switching or the like. .
- the application controller 708 sets the broadcast video display area 4 to the full screen of the display screen D according to a program incorporated in advance in the program controller 708, and puts the display area 2 of the non-broadcast managed application in a non-display state.
- the video in the broadcast video display area 4 is partially hidden by a non-broadcast managed application.
- the child element may be displayed.
- FIG. 18 is a block diagram for explaining a mechanism for generating and verifying an electronic signature.
- the XML-AIT server 400 and the application server 300 may be one server owned by the application creator or may be separate servers.
- the XML-AIT server 400 and the application server 300 are collectively referred to as “servers”.
- the server is a device having a typical computer configuration. Therefore, it is configured by a storage device such as a CPU, a main memory, and an HDD, an input device such as a mouse and a keyboard, and a display unit such as a liquid crystal display.
- the main memory and storage device include an OS (Operating System), software such as a server application program, a non-broadcast managed application provided to the information processing apparatus 700, an XML-AIT file for each application, a signature generation key, and the like. Stored.
- OS Operating System
- the server has a signed application generation unit 350.
- the signed application generation unit 350 is realized by a program loaded in the main memory and a CPU that executes the program.
- the application creator requests the broadcasting station 100 to authenticate the non-broadcast managed application 351 and the XML-AIT 355.
- the broadcast station 100 examines the contents of the non-broadcast managed application 351 and the XML-AIT 355 that are subject to authentication requested by the application producer, and if there is no problem, the secret key issued from the root CA 900 (FIG. 1)
- the private key of the broadcast station public key certificate pair is set in the signature generator 356 as the signature generation key 357.
- the signature generator 356 generates a digest for the non-broadcast managed application 351 using a signature hash function, encrypts the digest with a signature generation key (secret key) 357, and generates an XML signature 358.
- the broadcasting station 100 returns the generated XML signature 358 to the server.
- the signed application generation unit 350 generates an application 360 with an electronic signature by adding the XML signature 358 returned from the broadcast station 100 to the non-broadcast managed application 351, and distributes it to the information processing apparatus 700.
- the application controller 708 of the information processing apparatus 700 extracts an XML signature from the application 360 with an electronic signature acquired from the server by the signature generator 753 and uses the signature verification key extracted from the broadcast station public key certificate. Verification is performed using a certain public key 754 to obtain a signature verification result 755.
- a method for transmitting a broadcast station public key certificate from the broadcast station 100 to the information processing apparatus 700 will be described.
- a method for transmitting a broadcasting station public key certificate from the broadcasting station 100 to the information processing apparatus 700 there are a dedicated module method, a data broadcasting extension method (part 1), a data broadcasting extension method (part 2), and the like.
- FIG. 19 is a conceptual diagram of a dedicated module system.
- a dedicated module for example, module_id
- component_tag 0x40
- component_tag 0x40
- DII Download Info Indication
- FIG. 20 is a diagram illustrating a configuration of a broadcast station public key certificate descriptor.
- the broadcast station public key certificate descriptor (broadcast certificate_descriptor) includes an ID (broadcaster_certificate_id) for identifying the broadcast station public key certificate and a version (broadcaster_certificate_version) of the broadcast station public key certificate.
- FIG. 21 is a flowchart relating to acquisition and update of a broadcasting station public key certificate by a dedicated module method.
- the application controller 708 of the information processing apparatus 700 monitors DII module information transmitted in the data carousel (step S401).
- the application controller 708 of the information processing apparatus 700 detects that the DII module information includes a broadcast station public key certificate descriptor (Y in step S402)
- the broadcast controller public key certificate descriptor is analyzed.
- the ID and version are extracted from the broadcast station public key certificate descriptor (step S403).
- the application controller 708 compares the ID of the broadcasting station public key certificate already stored in the memory with the ID acquired this time, and checks whether the broadcasting station public key certificate with the matching ID is stored in the memory. (Step S404). If the corresponding broadcast station public key certificate is not stored (N in step S405), the application controller 708 acquires the broadcast station public key certificate transmitted in the data carousel and stores it in the memory (step S406). . Thereafter, the monitor returns to the DII module information monitoring state.
- the application controller 708 checks the version of the broadcast station public key certificate stored in the memory (step S407).
- the application controller 708 compares the confirmed version of the broadcast station public key certificate with the version of the broadcast station public key certificate acquired this time, and determines whether or not a version upgrade of the broadcast station public key certificate has occurred (step). S408).
- the application controller 708 If it is determined that the broadcast station public key certificate has not been upgraded (N in step S408), the application controller 708 returns to the DII module information monitoring state.
- the application controller 708 acquires the broadcast station public key certificate transmitted in the data carousel and stores it in the memory (step S408). S409). Thereafter, the monitor returns to the DII module information monitoring state.
- the information processing apparatus 700 can acquire one or more types of the latest version of the broadcast station public key certificate having different IDs and store them in the memory.
- FIG. 22 is a diagram showing a configuration of a root certificate descriptor according to the data broadcasting extension method (part 1).
- the data broadcasting extension method (part 1) an extension for transmitting a public key certificate of a new service is applied to the root_certificate_type of the root certificate descriptor, and an ID (broadcaster_certificate_id) for identifying the broadcasting station public key certificate is provided there.
- the broadcast station public key certificate version (broadcaster_certificate_version) is described.
- FIG. 23 is a flowchart relating to acquisition and update of a broadcasting station public key certificate by the data broadcasting extension method (part 1).
- the application controller 708 of the information processing apparatus 700 monitors the DII root certificate descriptor transmitted in the data carousel (step S501).
- the application controller 708 of the information processing device 700 detects the DII root certificate descriptor (Y in step S502)
- the application controller 708 compares the ID of the broadcasting station public key certificate already stored in the memory with the ID acquired this time, and checks whether the broadcasting station public key certificate with the matching ID is stored in the memory. (Step S404). If the corresponding broadcast station public key certificate is not stored (N in step S405), the application controller 708 acquires the broadcast station public key certificate transmitted in the data carousel and stores it in the memory (step S406). . Thereafter, the monitoring state of the DII root certificate descriptor is restored.
- the application controller 708 checks the version of the broadcast station public key certificate stored in the memory (step S407).
- the application controller 708 compares the confirmed version of the broadcast station public key certificate with the version of the broadcast station public key certificate acquired this time, and determines whether or not a version upgrade of the broadcast station public key certificate has occurred (step). S408).
- the application controller 708 If it is determined that the broadcast station public key certificate has not been upgraded (N in step S408), the application controller 708 returns to the DII module information monitoring state.
- the application controller 708 acquires the broadcast station public key certificate transmitted in the data carousel and stores it in the memory (step S408). S409). Thereafter, the monitor returns to the DII module information monitoring state.
- the information processing apparatus 700 can acquire one or more types of the latest version of the broadcast station public key certificate having different IDs and store them in the memory.
- Data broadcasting expansion method (Part 2)
- one fixed storage area is allocated for a new service among the storage areas that can transmit the public key certificate for data broadcasting in the root certificate descriptor, and broadcast to that area.
- An ID (broadcaster_certificate_id) for identifying the station public key certificate and a version (broadcaster_certificate_version) of the broadcast station public key certificate are described.
- a new flag (broadcaster_certificate_flag) is arranged in the root certificate descriptor. For example, when the value of this flag is “1”, it indicates that the broadcasting station public key certificate is transmitted, and when the value of the flag is “0”, it indicates that the broadcasting station public key certificate is not transmitted. Show.
- FIG. 25 is a flowchart relating to acquisition and update of a broadcasting station public key certificate by the data broadcasting extension method (part 2).
- the application controller 708 of the information processing apparatus 700 monitors the DII root certificate descriptor transmitted in the data carousel (step S601).
- the application controller 708 of the information processing apparatus 700 detects the DII root certificate descriptor (Y in step S502)
- the application controller 708 analyzes the root certificate descriptor and checks the value of the flag (broadcaster_certificate_flag).
- the application controller 708 performs data broadcasting processing (step S504), and then returns to the monitoring state of the DII root certificate descriptor.
- Step S605 When the value of the flag is “0”, the application controller 708 transmits the broadcast station from a predetermined storage area among a plurality of storage areas that can transmit the public key certificate for data broadcasting in the root certificate descriptor.
- the public key certificate ID and version are extracted (step S605).
- Step S606 to Step S611 Subsequent operations from Step S606 to Step S611 are the same as Steps S404 to S409 of the dedicated module system, and thus description thereof is omitted.
- the information processing apparatus 700 can acquire one or more types of the latest version of the broadcast station public key certificate having different IDs and store them in the memory.
- the electronic signature is attached to the application.
- the electronic signature may be attached to the XML-AIT.
- the digital signatures of all broadcast stations that permit the use of broadcast resources are attached to XML-AIT.
- the application hash value is embedded in the XML-AIT, and the information processing apparatus 700 compares the hash value calculated from the entity of the application with the hash value notified by being embedded in the XML-AIT, thereby falsifying the application. Can be detected indirectly.
- this method will be described.
- FIG. 26 is a diagram for explaining the generation of electronic signatures and hash values attached to XML-AIT and the mechanism of these verifications.
- the server includes a signed AIT generation unit 350A.
- the signed AIT generating unit 350A is realized by a program loaded in the main memory that generates an electronic signature and a hash value, and a CPU that executes the program.
- the signed AIT generating unit 350A calculates a hash value 353A from the entity of the non-broadcast managed application 351A using a predetermined hash calculator 352A.
- hash algorithms include SHA-1 and SHA-2, which are standardized by FIPS PUB-1,180-1,180-2.
- the signed AIT generation unit 350A combines the hash value 353A with the XML-AIT 362A of the non-broadcast managed application 351A to generate an XML-AIT 355A with a hash value.
- the application creator requests the broadcasting station 100A to authenticate the non-broadcast managed application 351A and the XML-AIT 355A.
- the broadcasting station 100 examines the contents of the non-broadcast managed application 351A and the XML-AIT 355A that are the objects of authentication requested by the application producer.
- the private key of the pair of broadcast station public key certificates is set in the signature generator 356A as the signature generation key 357A.
- the signature generator 356A generates a digest for the XML-AIT 355A using a signature hash function, and encrypts the digest with a signature generation key (secret key) 357A to generate an XML signature 358A.
- the broadcasting station 100A responds the generated XML signature 358A to the server.
- the server-signed AIT generation unit 350A adds the XML signature 358A responded from the broadcast station 100A to the XML-AIT 355A with a hash value to generate an XML-AIT 360A with a digital signature, and distributes it to the information processing apparatus 700A. .
- the application controller 708A of the information processing apparatus 700 calculates a hash value 752A using a predetermined hash calculator 751A (hash function) from the non-broadcast managed application 351A acquired from the server.
- the hash function used here needs to be the same as that of the hash calculator 352A of the server-signed AIT generation unit 350A. Therefore, the application controller 708A checks the hash algorithm described in the XML-AIT 360A with the electronic signature obtained from the server, and determines whether or not the hash algorithm of the hash calculator 751A (hash function) is consistent. . If a hash algorithm mismatch is determined, the application controller 708A switches the hash calculator 751A (hash function) to match that of the hash calculator 352A of the server-signed AIT generation unit 350A.
- the application controller 708A compares the hash value 353A and the hash value 752A extracted from the XML-AIT 360A with the electronic signature obtained from the server using the hash comparator 756A, and obtains a match / mismatch result 757A.
- the application controller 708A extracts the XML signature from the XML-AIT 360A with the electronic signature obtained from the server by the signature generator 753A, verifies the XML signature using the signature verification key (public key) 754A, and verifies the signature. Result 755A is obtained.
- the hash value is added to the application and provided to the information processing apparatus 700. Therefore, the information processing apparatus 700 transmits the hash value calculated for the application acquired from the application server 300 and the XML-AIT. The validity of the application can be determined by comparing the obtained hash value.
- the XML-AIT stored in the XML-AIT server 400 that is, the XML-AIT distributed to the information processing apparatus 700 may be updated.
- the application controller 708 of the information processing apparatus 700 caches the acquired XML-AIT in an internal memory, and controls the operation of the broadcast-excluding managed application with reference to the cached XML-AIT when offline.
- the XML-AIT to be cached is the XML-AIT acquired by the information processing apparatus 700 last.
- the application controller 708 inquires of the XML-AIT server 400 about the latest update date of the XML-AIT every time a user selects a non-broadcast managed application to be activated in the application launcher.
- the application controller 708 compares the update date / time of the latest XML-AIT inquired with the cache date / time of the cached XML-AIT. If the update date / time of the latest XML-AIT is later (newer) than the cached XML-AIT cache date / time, the application controller 708 acquires the XML-AIT from the XML-AIT server 400 and caches the XML. -Overwrite AIT.
- the application controller 708 obtains the XML-AIT from the XML-AIT server 400. The control is performed so that the cached XML-AIT is left as it is.
- the application controller 708 controls the operation of the non-broadcast managed application using the cached XML-AIT.
- an XML-AIT expiration date 22 (see FIG. 2) is provided in the XML-AIT data structure.
- the expiration date 22 is designated by an absolute date or a relative date.
- the absolute date and time is given by the date and time, for example. Of course, it may be given only by date.
- the relative date and time is given by, for example, an elapsed time after acquiring XML-AIT. In the present embodiment, it is assumed that the expiration date 22 is given by an absolute date and time.
- the application controller 708 of the information processing apparatus 700 has an expiration date 22 of the XML-AIT acquired from the XML-AIT server 400 and the cached XML-AIT each time a non-broadcast managed application to be started is selected in the application launcher. Determine if it has exceeded. If the expiration date 22 has not been exceeded, the application controller 708 activates a non-broadcast managed application based on the XML-AIT. When the expiration date 22 is exceeded, the application controller 708 prevents the non-broadcast managed application from being activated.
- step S701 When a non-broadcast managed application to be activated in the application launcher is selected by the user (step S701), the application controller 708 determines whether or not the XML-AIT for the selected non-broadcast managed application is stored as a cache. It investigates (step S702).
- the application controller 708 checks whether the information processing apparatus 700 is currently connected online (step S703). If online connection is not established (N in step S703), the application controller 708 determines that the non-broadcast managed application cannot be activated and ends the operation (step S704).
- step S703 the application controller 708 acquires the latest XML-AIT from the XML-AIT server 400 and stores it (step S705).
- the application controller 708 determines whether or not the expiration date 22 of the acquired XML-AIT has been exceeded (step S706). If the expiration date 22 is exceeded (Y in step S706), the application controller 708 determines that the non-broadcast managed application cannot be activated and ends the operation (step S704). If the expiration date 22 has not been exceeded (N in step S706), the application controller 708 activates the non-broadcast managed application using the XML-AIT (step S707).
- the application controller 708 checks whether the information processing apparatus 700 is currently connected online (step S708). When the online connection is not established (N in Step S708), the application controller 708 determines whether or not the cached XML-AIT expiration date 22 has been exceeded (Step S709). If the expiration date 22 is exceeded (Y in Step S709), the application controller 708 determines that the non-broadcast managed application cannot be activated and ends the operation (Step S704). If the expiration date 22 has not been exceeded (N in step S709), the application controller 708 activates the non-broadcast managed application using the cached XML-AIT (step S710).
- step S708 when online connection is made (Y in step S708), the application controller 708 inquires the XML-AIT server 400 about the latest update date and time of XML-AIT (step S711).
- the application controller 708 compares the latest update date and time of the XML-AIT with the update date and time of the cached XML-AIT.
- the application controller 708 acquires the latest XML-AIT from the XML-AIT server 400, and The cached XML-AIT is overwritten and saved (step S713).
- the application controller 708 determines whether or not the expiration date 22 of the overwritten and saved XML-AIT has been exceeded (step S714). If the expiration date 22 is exceeded (Y in step S714), the application controller 708 terminates the operation (step S704), assuming that the non-broadcast managed application cannot be activated. If the expiration date 22 has not been exceeded (N in step S714), the application controller 708 activates a non-broadcast managed application using the XML-AIT that has been overwritten (step S715).
- an application type descriptor (applicationType) 25 is included in the application descriptor of XML-AIT.
- FIG. 28 is a diagram illustrating the syntax of the application type descriptor 25.
- an area type area_type
- a format type format_type
- a context type context_type
- the area type is information for defining the type of screen control used by the non-broadcast managed application.
- Information that defines the type of screen control includes the following. 1. whole: full screen control partial: partial screen control invisible: Non-screen control
- Full screen control 29 and 30 are diagrams for explaining the full screen control.
- Full screen control is a type that controls the display of the entire screen of the display unit.
- a broadcast video is specified by an object element, and an area for displaying the broadcast video is defined.
- the non-broadcast managed application smaller than the full screen size is displayed on the broadcast video 11 displayed using the full screen.
- the display area 12 is arranged in an overlay.
- FIG. 30 there is a form in which a broadcast video 11A converted into a sub-screen by scaling is displayed on the display area 12A of the non-broadcast managed application displayed using the full screen.
- a non-broadcast managed non-broadcast managed application can operate in parallel with a plurality of non-broadcast managed applications only in combination with a non-screen controlled non-broadcast managed application. That is, one full-screen controlled non-broadcast managed application and one or more non-screen controlled non-broadcast managed applications can be operated in parallel.
- [Partial screen control] 31, 32 and 33 are diagrams for explaining the partial screen control.
- the partial screen control is a type for controlling a partial display on the screen of the display unit.
- the size of the display area 12B of the non-broadcast managed application is specified, and the position of the display area 12B depends on the control by the application controller 708.
- a non-broadcast managed size having a size smaller than the full screen size is displayed on the broadcast video 11B displayed using the full screen.
- the display area 12B of the application is arranged with an overlay.
- the difference from FIG. 29 by the full screen control is that the broadcast video 11 displayed using the full screen by the full screen control is specified by the object element of the non-broadcast managed application.
- the broadcast video 11B displayed using the full screen by the screen control is a broadcast video selected by the user.
- FIG. 32 there is a form in which the broadcast video 11C reduced by scaling is brought to one side of the screen, and the display area 12C of the non-broadcast managed application is arranged in the vacant area.
- the reduction rate and position of the broadcast video display area 11C, and further the position of the display area 12C of the non-broadcast managed application depend on the control by the application controller 708.
- FIG. 33 there is a form in which the broadcast video 11D reduced by scaling is brought to one side of the screen, and display areas 12D and 13D of a plurality of non-broadcast managed applications are arranged in the vacant area. Also in this example, the reduction rate and position of the broadcast video 11D and the positions of the display areas 12D and 13D of a plurality of non-broadcast managed applications depend on the control by the application controller 708.
- partial screen control non-broadcast managed application can be operated in parallel with one or more non-screen control non-broadcast managed applications.
- Non-screen control A non-broadcast managed application that is not broadcast is a non-broadcast managed application that is executed only by a script without displaying anything on the screen of the display unit.
- a non-screen control non-broadcast managed application can simultaneously perform a plurality of parallel operations, and can also operate in parallel with other screen control type non-broadcast managed applications.
- the package-type non-broadcast managed application and the web-type non-broadcast managed application are as described above, and how the information processing apparatus 700 acquires them.
- control based on the format type by the application controller 708 of the information processing apparatus 700 will be described.
- This control based on the format type is effective in a method of performing verification by attaching an electronic signature to XML-AIT.
- the hash value of the non-broadcast managed application is calculated and attached to the XML-AIT so that tampering of the non-broadcast managed application can be detected.
- the signed AIT generating unit 350A shown in FIG. 26 calculates a hash value 353A from all files constituting the package type non-broadcast managed application 351A using a predetermined hash calculator 352A.
- the application controller 708 (application controller 708A in FIG. 26) of the information processing apparatus 700 confirms the format type of the non-broadcast managed application with reference to the XML-AIT after starting the non-broadcast managed application.
- the application controller 708A calculates a hash value 752A from all the resource files constituting the non-broadcast managed application 351A.
- the application controller 708A compares the calculated hash value 752A with the hash value 353A described in the XML-AIT, and determines match / mismatch.
- hash value described in the XML-AIT for a web-type non-broadcast managed application is calculated for a markup document file such as an HTML document that forms the first page of the non-broadcast managed application. Adopted.
- hash values may be calculated for all resource files that make up the first page. In this embodiment, a description will be given assuming that a hash value is calculated for a markup document file such as an HTML document constituting the first page.
- Application controller 708A activates a web-type non-broadcast managed application, and then checks the format type of the non-broadcast managed application with reference to XML-AIT.
- the application controller 708A calculates a hash value 752A from a markup document file such as an HTML document that forms the first page of the non-broadcast managed application 351A.
- the application controller 708A compares the calculated hash value 752A with the hash value 353A stored in the XML-AIT, and determines a match / mismatch.
- the context type includes the following. 1. application: application oriented tv: Broadcast reception oriented
- the application orientation is, for example, a type in which a broadcast service referred to by an object element is not specified by a user of the information processing apparatus 700 but is specified by a non-broadcast managed application.
- FIG. 35 is a diagram for explaining an application-oriented non-broadcast managed application together with operations corresponding to user operations on the non-broadcast managed application.
- the user of the information processing apparatus 700 operates the application launcher button of the remote controller, for example, so that the application launcher 50 is displayed on the display unit of the information processing apparatus 700.
- the application controller 708 of the information processing apparatus 700 activates the non-broadcast managed application based on the XML-AIT of the non-broadcast managed application. At this time, the application controller 708 refers to the XML-AIT and checks the context type of the broadcast-excluding managed application.
- the context type of the non-broadcast managed application selected by the user is application-oriented.
- the application controller 708 releases the channel selection state of the broadcast stream 0 that is the channel selection by the user.
- Application controller 708 activates a non-broadcast managed application.
- the first page 51 of the non-broadcast managed application is displayed first.
- the first page 51 is provided with, for example, one or more hyperlinks for transitioning to a page related to one or more broadcasting stations.
- the non-broadcast managed application includes a first page 51 and one or more pages 52 and 53 that are linked destinations.
- the pages 52 and 53 related to each of the linked broadcast stations are configured to use the broadcast stream of the own broadcast station as a broadcast service referred to by the object element.
- the broadcast stream video of the own broadcast station is displayed in the pages 52 and 53 on the sub-screens 52a and 53a.
- a page 52 related to the broadcast station that is the transition destination is displayed.
- a sub-screen 52a for displaying the video of the broadcast stream (broadcast stream 1) of the broadcast station that is the transition destination is arranged.
- the user of the information processing apparatus 700 has performed an operation for transitioning to a page related to another broadcast station. That is, the page 51 is provided with one or more hyperlinks for transitioning to a page related to one or more other broadcasting stations.
- This page transition operation displays a page 53 related to another broadcast station that is the transition destination.
- a sub-screen 53a that displays a video of a broadcast stream (broadcast stream 2) of another broadcast station that is a transition destination is arranged.
- the non-broadcast managed application When the user of the information processing apparatus 700 performs a termination operation for a non-broadcast managed application, the non-broadcast managed application is terminated.
- the channel selection state of the broadcast stream is determined by the context type.
- the context type of the non-broadcast managed application launched this time is application-oriented.
- the application controller 708 of the information processing apparatus 700 performs control so as to return the channel selection state to the broadcast stream 0 that was selected immediately before the start of the non-broadcast managed application. Do.
- the tuning of a broadcast stream that occurs during the execution of a non-broadcast managed application is not a direct channel selection action by the user. Therefore, it is desirable to return the channel selection state to the broadcast stream 0 that was selected immediately before the start of the non-broadcast managed application after terminating the non-broadcast managed application in order not to give the user a sense of incongruity.
- the broadcast reception orientation is, for example, a type in which a broadcast service referred to by an object element is not specified by a non-broadcast managed application, but is specified by a user of the information processing apparatus 700.
- FIG. 36 is a diagram for describing a broadcast reception-oriented managed application intended for broadcast reception, together with operations corresponding to user operations on the non-broadcast managed application.
- the user of the information processing apparatus 700 operates the application launcher button of the remote controller, for example, so that the application launcher 54 is displayed on the display unit of the information processing apparatus 700.
- the application launcher 54 may be selectable only for a broadcast reception-oriented non-broadcast managed application. In this case, the application launcher 54 may be displayed in a translucent state on the video of the broadcast stream 0 selected at that time.
- the application controller 708 of the information processing apparatus 700 activates the non-broadcast managed application based on the XML-AIT of the non-broadcast managed application. At this time, the application controller 708 refers to the XML-AIT and checks the context type of the broadcast-excluding managed application.
- the context type of the non-broadcast managed application selected by the user is broadcast reception oriented.
- the broadcast service referred to by the object element is a broadcast stream selected by the user.
- the page 55 of the non-broadcast managed application is configured to use a broadcast stream selected by the user as a broadcast service referred to by an object element.
- the video stream of the broadcast stream selected by the user is displayed on the page 55 on the sub-screen 55a.
- the non-broadcast managed application page 55 When the non-broadcast managed application page 55 is displayed (when the non-broadcast managed application is executed), when another broadcast stream is selected by the user, the contents of the sub-screen 55a in the page 55 are newly selected. It changes to the video of the broadcast stream that was broadcast.
- the video on the sub-screen 55a is broadcast stream 0, broadcast stream 1, broadcast It shows that the stream has been switched in the order.
- the non-broadcast managed application When the user of the information processing apparatus 700 performs a termination operation for a non-broadcast managed application, the non-broadcast managed application is terminated.
- the channel selection state of the broadcast stream is determined by the context type.
- the context type of the non-broadcast managed application launched this time is broadcast reception oriented.
- the application controller 708 of the information processing apparatus 700 performs control so that the broadcast stream being selected is displayed as it is after the non-broadcast managed application is terminated.
- the application controller 708 controls the use range of the broadcast resource by the non-broadcast managed application based on the external application control descriptor of the section AIT.
- a mechanism is realized in which the broadcast station side can dynamically change the range of the usage permission information set in the XML-AIT created by a third party such as a provider of a non-broadcast managed application using the section AIT.
- the application controller 708 holds a permission bitmap, which is binary data of XML-AIT service usage permission information, in a memory.
- the application controller 708 can obtain the difference by comparing the permission bitmap held in the memory and the permission bitmap in the section AIT acquired after starting the non-broadcast managed application by binary operation. As a result, the load on the application controller 708 of the information processing apparatus 700 can be reduced and the speed can be increased.
- the application controller 708 controls the display position on the display screen of the non-broadcast managed application based on the external application control descriptor of the section AIT.
- the application controller 708 activates the non-broadcast managed application by the expired XML-AIT cached in the information processing device 700 when the information processing device 700 is offline. It can be controlled to be invalidated. Accordingly, it is possible to solve the problem that the intention of updating the XML-AIT is not reflected in the operation control of the non-broadcast managed application indefinitely.
- the application controller 708 can control various display forms of broadcast video and non-broadcast managed applications.
- the application controller 708 can determine whether the activated non-broadcast managed application is a package type or a web type. When the calculation target of the hash value is different between the package type and the web type, the application controller 708 can recognize the calculation target from the format type.
- the application controller 708 can select the optimum channel selection state of the broadcast video after the end of the non-broadcast managed application.
- the embodiment based on the HbbTV standard has been described.
- the present technology is not necessarily limited to being based on the HbbTV standard.
- This technique can also take the following configurations.
- a broadcast receiving unit capable of receiving a broadcast signal; At least obtain an application information table in which information for controlling the operation of an application using a broadcast signal received by the broadcast receiving unit and information indicating an expiration date are described, and based on the information indicating the expiration date Determining whether an expiration date of the acquired application information table has been exceeded, and invalidating activation of the application based on the application information table when it is determined that the expiration date has been exceeded
- An information processing apparatus comprising a controller configured as described above.
- the information processing apparatus holds the application information table acquired last, and whether or not the expiration date of the application information table is exceeded based on the information indicating the expiration date described in the held application information table
- An information processing apparatus configured to determine
- the information processing apparatus is configured to determine whether or not an expiration date of the application information table has been exceeded when the application to be activated is selected by a user.
- the controller is configured to control an operation of the application based on the held application information table when offline.
- the information processing apparatus is configured to acquire the application by communication.
- the information processing apparatus is configured to acquire the application information table by communication.
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Circuits Of Receivers In General (AREA)
- Stored Programmes (AREA)
Abstract
Description
放送信号を受信可能な放送受信部と、
少なくとも、前記放送受信部により受信される放送信号を利用するアプリケーションの動作を制御する情報と、有効期限を示す情報が記述されたアプリケーション情報テーブルを取得し、前記有効期限を示す情報をもとに、前記取得されたアプリケーション情報テーブルの有効期限が超過しているかどうかを判定し、前記有効期限を超過していることが判定されたとき、前記アプリケーション情報テーブルに基づく前記アプリケーションの起動を無効化するように構成されるコントローラと
を具備する。
コントローラが、
少なくとも、放送信号を利用するアプリケーションの動作を制御する情報と、有効期限を示す情報が記述されたアプリケーション情報テーブルを取得し、
前記有効期限を示す情報をもとに、前記取得されたアプリケーション情報テーブルの有効期限が超過しているかどうかを判定し、
前記有効期限を超過していることが判定されたとき、前記アプリケーション情報テーブルに基づく前記アプリケーションの起動を無効化する。
<第1の実施形態>
[情報処理システム]
図1は、本実施形態の情報処理システムの構成を示す図である。
本実施形態の情報処理システム10は、放送局100と、インターネットなどの第1のネットワーク200と、アプリケーションサーバ300と、XML-AITサーバ400と、エッジルータ500と、LAN(Local Area Network)などの第2のネットワーク600と、放送用の受信機としての情報処理装置700と、ストアサーバ800とを有する。
放送外マネージドアプリケーション30は、例えば、HTML(Hyper Text Markup Language)文書、BML文書(Broadcast Markup Language)、MHEG文書(Multimedia and Hypermedia information coding)などのマークアップ文書31,32と、このマークアップ文書31,32に紐付けられた、例えば、静止画、動画、音声、ベクター図形などのデータファイル33,34,35,36、Java(登録商標)スクリプトなどのスクリプトファイル37、さらにはCSS(Cascading Style Sheets)などのスタイルシート38などで構成される。
次に、XML-AITのデータ構造について説明する。
図2は、本実施形態のXML-AITのデータ構造を示す図である。
1.親の放送外マネージドアプリケーションの有効期限と同期して自放送外マネージドアプリケーションの有効期限とする。
2.親の放送外マネージドアプリケーションの有効期限が尽きたときに自放送外マネージドアプリケーションの有効期限が有効になる。
3.親の放送外マネージドアプリケーションの有効期限と同期して自放送外マネージドアプリケーションの有効期限が尽きる。
ことなどが挙げられる。
利用許諾情報記述子21には、1以上のサービス利用許諾情報(Service_permission)と1以上のオーバーレイエリア情報(Overlay_area)を記述できる。
all:全ての放送事業者
affiliate:系列局
broadcaster:放送事業者
service:チャンネル
event:番組
series:シリーズ
app_off:アプリケーションを非表示にする。
video_off:放送リソースのビデオを非表示にする。
app_suspend:アプリケーションを非表示にし、アプリケーションの動作を一時停止する。
このように、パーミッションンエラーが発生したとき、放送リソースの少なくともビデオが非表示の状態とされるため、実質的に放送リソースの利用が不可の状態となる。
オーバーレイエリア情報はオーバーレイエリアを定義するための情報である。オーバーレイエリアとは、放送外マネージドアプリケーションを表示してよい表示画面上の領域のことである。言い換えれば、オーバーレイエリアは、主に放送映像が表示される領域の上に重ねて設定される領域である。
HTMLアプリケーション内の要素のIDは、オーバーレイエリアと紐付けられる放送外マネージドアプリケーションまたは放送外マネージドアプリケーション内の要素を特定する識別子である。
エリア垂直サイズとエリア水平サイズはオーバーレイエリアの縦横のサイズを指定する情報である。
XML-AITには、改ざんを検出するための電子署名が添付される。電子署名としては、例えばXML署名などが用いられる。XML署名の形式は、XML-AITに対して独立したdetached署名、XML-AITを包含した形式を有するenveloping署名、XML-AITに包含された形式のenveloped署名のいずれであるかを問わない。なお、XML-AITのフォーマットへの影響を抑えるにはdetached署名を採用するのがよい。
図4はセクションAITのデータ構造を示す図である。
セクションAITは、テーブルID(table_id)、セクションシンタックス指示(section_syntax_indicator)、セクション長(section_length)、アプリケーションタイプ(application_type)、バージョン番号(version_number)、カレントネクスト指示(current_next_indicator)、セクション番号(section_number)、最終セクション番号(last_section_number)、共通記述子領域41(descriptor)、アプリケーション情報ループ長(application_loop_length)、アプリケーション識別子(application_identifier)、アプリケーション制御コード42(application_control_code)、アプリケーション記述子(application_descriptor)などが格納される。
図5は、外部アプリケーション制御記述子(External_application_control_descriptor)のシンタクスを示す図である。
外部アプリケーション制御記述子には、記述子タグ(descriptor_tag)、記述子長(descriptor_length)、パーミッションビットマップ数(permission_bitmap_count)、パーミッションビットマップ58(permission_bitmap)などが記述される。
アプリケーションのライフサイクルは、XML-AITおよびセクションAITに格納されるアプリケーション制御コード26、42をもとに、情報処理装置700によって動的に制御される。
同図に示すように、アプリケーション制御コード26、42としては、"AUTOSTART"、"PRESENT"、"DESTROY"、"KILL"、"PREFETCH"、"REMOTE"、"DISABLED"、"PLAYBACK_AUTOSTART"が標準規格上存在する。これらアプリケーション制御コードの定義は以下のとおりである。
"PRESENT"は、サービスが選択されている間、アプリケーションを実行可能な状態とすることを指示するコードである。但し、対象のアプリケーションは、サービスの選択に伴って自動的にアプリケーションは起動されず、ユーザからの起動の指示を受けて起動される。
"DESTROY"は、アプリケーションの終了の許可を指示するコードである。
"KILL"は、アプリケーションの強制的な終了を指示するコードである。
"PREFETCH"は、アプリケーションのキャッシュを指示するコードである。
"REMOTE"は、現在のトランスポートストリームでは取得できないアプリケーションであることを示すコードである。そのアプリケーションは、別のトランスポートストリームあるいはキャッシュから取得して利用可能となる。
"DISABLED"は、アプリケーションの起動を禁止することを示すコードである。
"PLAYBACK_AUTOSTART"は、ストレージ(記録装置)に録画された放送コンテンツの再生に伴いアプリケーションを起動させるためのコードである。
図7は本実施形態の情報処理装置700の構成を示すブロック図である。
情報処理装置700は、放送インタフェース701、デマルチプレクサ702、出力処理部703、映像デコーダ704、音声デコーダ705、字幕デコーダ706、通信インタフェース707、アプリケーションコントローラ708(コントローラ)を有する。
字幕デコーダ706は、字幕ESをデコードして字幕信号を生成し、生成した字幕信号を出力処理部703に出力する。
次に、本実施形態の情報処理システム10の動作を説明する。
動作の説明は、以下の順番で行うこととする。
1.放送外マネージドアプリケーションの取得
2.放送リソースの利用許諾範囲の制御(その1)
3.放送リソースの利用許諾範囲の制御(その2)
4.オーバーレイエリアの制御
5.電子署名の生成と検証
6.XML-AITの有効期限の管理
7.アプリケーションタイプによる制御
図8は情報処理装置700においてリモートコントローラのアプリショップ呼び出しボタンが操作されから、情報処理装置700においてユーザにより選択された放送外マネージドアプリケーションが起動されるまでのアプリケーションサーバ300、XML-AITサーバ400、情報処理装置700およびストアサーバ800の間でのやりとりの流れを示すシーケンス図である。
同図に示すように、アプリケーションローンチャ61は、選択可能な放送外マネージドアプリケーションのメニュー画面である。ここで、App1-App8は、個々の放送外マネージドアプリケーションの選択用のアイコンである。アイコンの近傍には当該放送外マネージドアプリケーションの名前や機能説明文などが表示される。各々の選択用のアイコンApp1-App8には、対応する放送外マネージドアプリケーションの動作を制御するXML-AITの置き場所を示すURLなどのロケーション情報が紐付けられている。
図11は、放送外マネージドアプリケーションが起動されてから以後の放送リソースの利用許諾範囲の制御に関する放送局100、アプリケーションサーバ300、XML-AITサーバ400、および情報処理装置700の間でのやりとりの流れを示すシーケンス図である。
放送外マネージドアプリケーションが実行中であるとき、例えば、ユーザのマニュアル操作などによって放送チャンネルが切り替えられる操作(ダイレクト選局操作)が行われることがある。
なお、ここでは、データカルーセルで放送局公開鍵証明書が伝送されてくる例を示したが、予め指定されたサーバから公開鍵証明書を取得するなど、通信を用いた公開鍵証明書を取得するようにしてもよい。
既に説明したように、XML-AITおよびセクションAITには、放送外マネージドアプリケーションを表示させてもよい表示画面Dにおける領域をオーバーレイエリアとして定義するためのオーバーレイエリア情報(Overlay_area)を記述することができる。
この例では、XML-AITの利用許諾情報記述子21の中のオーバーレイエリア情報(Overlay_area)をもとにオーバーレイエリア1が作成される。さらに、オーバーレイエリア1内には放送外マネージドアプリケーションの表示領域2が設けられていることとする。
この例では、アプリケーションコントローラ708は、セクションAITの外部アプリケーション制御記述子に含まれるオーバーレイエリアに関する情報をもとに、既存のオーバーレイエリア1からオーバーレイエリア3への変更が発生した場合、自身に予め組み込まれたプログラムに従って以下の制御を行う。
この例は、XML-AITのオーバーレイエリア情報をもとに表示画面Dの全画面を使用するオーバーレイエリア1が設定されている場合を想定する。このオーバーレイエリア1の全体に放送外マネージドアプリケーションの表示領域2が割り当てられており、その一部に放送映像表示エリア4が設定される。
次に、電子署名の生成と検証について説明する。
図18は電子署名の生成と検証の仕組みについて説明するためのブロック図である。
放送局100から情報処理装置700に放送局公開鍵証明書を伝送する方法には、専用モジュール方式、データ放送拡張方式(その1)、データ放送拡張方式(その2)などがある。
図19は専用モジュール方式の概念図である。
専用モジュール方式では、データ放送番組がユーザにより選択された時最初に起動させるべきスタート文書を含むモジュールであるcomponent_tag=0x40に、放送局公開鍵証明書43を伝送するための専用のモジュール(例えばmodule_id=0xFFFEなど)44が新たな配置される。
また、上記の専用モジュールで配布する放送局公開鍵証明書の更新を情報処理装置700に知らせるために、放送局公開鍵証明書記述子がDII(Download Info Indication)が配置される。
放送局公開鍵証明書記述子(broadcast certificate_descriptor)は放送局公開鍵証明書を識別するID(broadcaster_certificate_id)および放送局公開鍵証明書のバージョン(broadcaster_certificate_version)を含む。
図22はデータ放送拡張方式(その1)によるルート証明書記述子の構成を示す図である。
データ放送拡張方式(その1)は、ルート証明書記述子のroot_certificate_typeに新しいサービスの公開鍵証明書を伝送するための拡張を施し、そこに放送局公開鍵証明書を識別するID(broadcaster_certificate_id)および放送局公開鍵証明書のバージョン(broadcaster_certificate_version)を記述するようにしたものである。
データ放送拡張方式(その2)は、ルート証明書記述子の中でデータ放送向け公開鍵証明書を伝送できる格納領域のうち、固定の1つの格納領域が新しいサービス向けに割り当てられ、そこに放送局公開鍵証明書を識別するID(broadcaster_certificate_id)および放送局公開鍵証明書のバージョン(broadcaster_certificate_version)が記述される。また、例えば図24に示すように、ルート証明書記述子に新たなフラグ(broadcaster_certificate_flag)が配置される。例えば、このフラグの値が"1"であるとき、放送局公開鍵証明書が伝送されることを示し、フラグの値が"0"であるとき、放送局公開鍵証明書が伝送されないことを示す。
まず、情報処理装置700のアプリケーションコントローラ708は、データカルーセルで伝送されるDIIのルート証明書記述子を監視する(ステップS601)。情報処理装置700のアプリケーションコントローラ708は、DIIのルート証明書記述子を検出すると(ステップS502のY)、このルート証明書記述子を解析し、フラグ(broadcaster_certificate_flag)の値を確認する。フラグの値が"0"である場合、アプリケーションコントローラ708はデータ放送の処理を行い(ステップS504)、その後、DIIのルート証明書記述子の監視状態に戻る。
上記の方式ではアプリケーションに電子署名が添付されることとしたが、XML-AITに電子署名を添付してもよい。この方式によると、1つのアプリケーションに対して、複数の放送局が放送リソースの利用を許可する場合には、XML-AITには放送リソースの利用を許可するすべての放送局の電子署名が添付される。
サーバは、署名付きAIT生成部350Aを有する。署名付きAIT生成部350Aは、具体的にはメインメモリにロードされた、電子署名およびハッシュ値の生成を行うプログラムと、このプログラムを実行するCPUとで実現される。
次に、XML-AITの有効期限の管理について説明する。
この場合、アプリケーションコントローラ708は、現在、情報処理装置700がオンライン接続されているかどうかを調べる(ステップS708)。オンライン接続されていない場合(ステップS708のN)、アプリケーションコントローラ708は、キャッシュされているXML-AITの有効期限22が超過しているかどうかを判断する(ステップS709)。有効期限22が超過しているならば(ステップS709のY)、アプリケーションコントローラ708は放送外マネージドアプリケーションの起動させることができないとして、動作を終了する(ステップS704)。有効期限22が超過していないならば(ステップS709のN)、アプリケーションコントローラ708は、キャッシュされているXML-AITにより放送外マネージドアプリケーションを起動させる(ステップS710)。
次に、アプリケーションタイプによる制御について説明する。
アプリケーションタイプ記述子25としては、エリアタイプ(area_type)、フォーマットタイプ(format_type)、コンテキストタイプ(context_type)などを記述できる。
はじめに、エリアタイプ(area_type)について説明する。
1.whole:全画面制御
2.partial:部分画面制御
3.invisible:非画面制御
図29および図30は全画面制御を説明するための図である。
全画面制御は、表示部のスクリーン全体の表示を制御するタイプである。
図31、図32および図33は部分画面制御を説明するための図である。
部分画面制御は、表示部の画面における一部分の表示を制御するタイプである。
部分画面制御の放送外マネージドアプリケーションでは、放送外マネージドアプリケーションの表示エリア12Bのサイズのみが指定され、その表示エリア12Bの位置はアプリケーションコントローラ708による制御に依存する。
非画面制御の放送外マネージドアプリケーションは、表示部の画面に何も表示することなくスクリプトのみが実行される不可視の放送外マネージドアプリケーションである。非画面制御の放送外マネージドアプリケーションは、同時に複数の並行動作が可能であり、また、他の画面制御のタイプの放送外マネージドアプリケーションとの並行動作も可能である。
次に、フォーマットタイプ(format_type)について説明する。
放送外マネージドアプリケーションのフォーマットタイプには、以下がある。
1.packaged:パッケージタイプ
2.web:ウェブタイプ
次に、コンテキストタイプについて説明する。
1.application:アプリケーション志向
2.tv:放送受信志向
アプリケーション志向は、例えば、オブジェクト要素で参照される放送サービスが、情報処理装置700のユーザによって指定されるのではなく、放送外マネージドアプリケーションによって指定されるタイプである。
放送受信志向は、例えば、オブジェクト要素で参照される放送サービスが、放送外マネージドアプリケーションによって指定されるのではなく、情報処理装置700のユーザによって指定されるタイプである。
本実施形態では、次のような効果が得られる。
1.アプリケーションコントローラ708は、セクションAITの外部アプリケーション制御記述子をもとに、放送外マネージドアプリケーションによる放送リソースの利用範囲を制御する。これにより、放送外マネージドアプリケーションの提供者などの第三者によって作成されたXML-AITに設定された利用許諾情報の範囲を、放送局側がセクションAITを用いて動的に変更できる仕組みが実現される。
本技術は以下のような構成も採ることができる。
(1)放送信号を受信可能な放送受信部と、
少なくとも、前記放送受信部により受信される放送信号を利用するアプリケーションの動作を制御する情報と、有効期限を示す情報が記述されたアプリケーション情報テーブルを取得し、前記有効期限を示す情報をもとに、前記取得されたアプリケーション情報テーブルの有効期限が超過しているかどうかを判定し、前記有効期限を超過していることが判定されたとき、前記アプリケーション情報テーブルに基づく前記アプリケーションの起動を無効化するように構成されるコントローラと
を具備する情報処理装置。
前記コントローラは、最後に取得した前記アプリケーション情報テーブルを保持し、前記保持されたアプリケーション情報テーブルに記述された前記有効期限を示す情報をもとに当該アプリケーション情報テーブルの有効期限が超過しているかどうかを判定するように構成される
情報処理装置。
前記コントローラは、起動させたい前記アプリケーションがユーザにより選択されたとき、前記アプリケーション情報テーブルの有効期限が超過しているかどうかを判定するように構成される
情報処理装置。
前記コントローラは、オフライン時に、前記保持された前記アプリケーション情報テーブルをもとに前記アプリケーションの動作を制御するように構成される
情報処理装置。
前記コントローラは、通信により前記アプリケーションを取得するように構成される
情報処理装置。
前記コントローラは、通信により前記アプリケーション情報テーブルを取得するように構成される
情報処理装置。
200…第1のネットワーク
300…アプリケーションサーバ
400…XML-AITサーバ
600…第2のネットワーク
700…情報処理装置
701…放送インタフェース
702…デマルチプレクサ
703…出力処理部
704…映像デコーダ
705…音声デコーダ
706…字幕デコーダ
707…通信インタフェース
708…アプリケーションコントローラ
800…ストアサーバ
Claims (7)
- 放送信号を受信可能な放送受信部と、
少なくとも、前記放送受信部により受信される放送信号を利用するアプリケーションの動作を制御する情報と、有効期限を示す情報が記述されたアプリケーション情報テーブルを取得し、前記有効期限を示す情報をもとに、前記取得されたアプリケーション情報テーブルの有効期限が超過しているかどうかを判定し、前記有効期限を超過していることが判定されたとき、前記アプリケーション情報テーブルに基づく前記アプリケーションの起動を無効化するように構成されるコントローラと
を具備する情報処理装置。 - 請求項1に記載の情報処理装置であって、
前記コントローラは、最後に取得した前記アプリケーション情報テーブルを保持し、前記保持されたアプリケーション情報テーブルに記述された前記有効期限を示す情報をもとに当該アプリケーション情報テーブルの有効期限が超過しているかどうかを判定するように構成される
情報処理装置。 - 請求項2に記載の情報処理装置であって、
前記コントローラは、起動させたい前記アプリケーションがユーザにより選択されたとき、前記アプリケーション情報テーブルの有効期限が超過しているかどうかを判定するように構成される
情報処理装置。 - 請求項3に記載の情報処理装置であって、
前記コントローラは、オフライン時に、前記保持された前記アプリケーション情報テーブルをもとに前記アプリケーションの動作を制御するように構成される
情報処理装置。 - 請求項4に記載の情報処理装置であって、
前記コントローラは、通信により前記アプリケーションを取得するように構成される
情報処理装置。 - 請求項5に記載の情報処理装置であって、
前記コントローラは、通信により前記アプリケーション情報テーブルを取得するように構成される
情報処理装置。 - コントローラが、
少なくとも、放送信号を利用するアプリケーションの動作を制御する情報と、有効期限を示す情報が記述されたアプリケーション情報テーブルを取得し、
前記有効期限を示す情報をもとに、前記取得されたアプリケーション情報テーブルの有効期限が超過しているかどうかを判定し、
前記有効期限を超過していることが判定されたとき、前記アプリケーション情報テーブルに基づく前記アプリケーションの起動を無効化する
情報処理方法。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP14878365.7A EP3094102B1 (en) | 2014-01-07 | 2014-11-18 | Information processing device and information processing method |
CN201480071957.3A CN105874815A (zh) | 2014-01-07 | 2014-11-18 | 信息处理装置和信息处理方法 |
US15/103,434 US10798449B2 (en) | 2014-01-07 | 2014-11-18 | Information processing apparatus and information processing method for validating an application |
JP2015556631A JP6481620B2 (ja) | 2014-01-07 | 2014-11-18 | 情報処理装置および情報処理方法 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2014-000999 | 2014-01-07 | ||
JP2014000999 | 2014-01-07 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015104743A1 true WO2015104743A1 (ja) | 2015-07-16 |
Family
ID=53523605
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2014/005782 WO2015104743A1 (ja) | 2014-01-07 | 2014-11-18 | 情報処理装置および情報処理方法 |
Country Status (7)
Country | Link |
---|---|
US (1) | US10798449B2 (ja) |
EP (1) | EP3094102B1 (ja) |
JP (6) | JP6481620B2 (ja) |
CN (1) | CN105874815A (ja) |
AR (1) | AR098972A1 (ja) |
CL (1) | CL2016001683A1 (ja) |
WO (1) | WO2015104743A1 (ja) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017014034A1 (ja) * | 2015-07-23 | 2017-01-26 | ソニー株式会社 | 受信装置、送信装置、およびデータ処理方法 |
JP2019068410A (ja) * | 2017-10-04 | 2019-04-25 | 日本放送協会 | 受信装置およびプログラム |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106937258B (zh) * | 2017-03-10 | 2019-07-12 | Oppo广东移动通信有限公司 | 一种广播的控制方法、装置及移动终端 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110093895A1 (en) * | 2009-10-20 | 2011-04-21 | Joon Hui Lee | Method of processing application in digital broadcast receiver connected with interactive network and the digital broadcast receiver |
JP2013008374A (ja) * | 2007-02-28 | 2013-01-10 | Ricoh Co Ltd | 情報処理システム、情報処理方法、情報処理装置、機器、プログラム、及び記録媒体 |
JP2013098859A (ja) * | 2011-11-02 | 2013-05-20 | Sony Corp | 情報処理装置、情報処理方法及びプログラム |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3270102B2 (ja) * | 1991-03-11 | 2002-04-02 | ヒューレット・パッカード・カンパニー | ライセンス付与方法及びシステム |
US6157719A (en) * | 1995-04-03 | 2000-12-05 | Scientific-Atlanta, Inc. | Conditional access system |
JP3793009B2 (ja) * | 2000-09-06 | 2006-07-05 | キヤノン株式会社 | コンテンツ再生装置 |
JP2003008568A (ja) * | 2001-02-28 | 2003-01-10 | Matsushita Electric Ind Co Ltd | 受信装置、受信方法及び受信プログラム並びに受信プログラムを記録したコンピュータ読み取り可能な記録媒体 |
US7840812B1 (en) * | 2002-05-24 | 2010-11-23 | Access Systems Americas, Inc. | Authentication of digital certificates used by portable computing devices |
DE602005012581D1 (de) * | 2004-04-21 | 2009-03-19 | Panasonic Corp | Wiedergabeeinrichtung und -verfahren für digitale ausstrahlungen, computerprogramm und speichermedium |
US20070223392A1 (en) * | 2006-03-21 | 2007-09-27 | Samsung Electronics Co., Ltd. | Method and device for checking validity period of certificate and method and device for displaying content information |
EP1965330A3 (en) * | 2007-02-28 | 2010-02-10 | Ricoh Company, Ltd. | Information processing system, information processor, image forming apparatus, and information processing method |
US8516251B2 (en) * | 2007-12-20 | 2013-08-20 | Koninklijke Philips N.V. | Device and method for digital right management |
JP2011142397A (ja) * | 2010-01-05 | 2011-07-21 | Canon Inc | 放送受信装置及び方法 |
US8867401B1 (en) * | 2010-08-20 | 2014-10-21 | Amazon Technologies, Inc. | Scheduled device communication |
JP5815370B2 (ja) * | 2011-11-02 | 2015-11-17 | ソニー株式会社 | 情報処理装置、情報処理方法及びプログラム |
WO2013126615A1 (en) * | 2012-02-21 | 2013-08-29 | Pulselocker, Inc. | Method and apparatus for limiting access to data by process or computer function with stateless encryption |
US9332292B2 (en) * | 2012-08-15 | 2016-05-03 | Verizon Patent And Licensing Inc. | Media playlists with selective media expiration |
US20140109176A1 (en) * | 2012-10-15 | 2014-04-17 | Citrix Systems, Inc. | Configuring and providing profiles that manage execution of mobile applications |
US9756041B2 (en) * | 2015-04-30 | 2017-09-05 | Rockwell Automation Technologies, Inc. | Offline access control for an application |
-
2014
- 2014-11-18 EP EP14878365.7A patent/EP3094102B1/en active Active
- 2014-11-18 JP JP2015556631A patent/JP6481620B2/ja active Active
- 2014-11-18 WO PCT/JP2014/005782 patent/WO2015104743A1/ja active Application Filing
- 2014-11-18 CN CN201480071957.3A patent/CN105874815A/zh active Pending
- 2014-11-18 US US15/103,434 patent/US10798449B2/en active Active
- 2014-12-29 AR ARP140104924A patent/AR098972A1/es active IP Right Grant
-
2016
- 2016-06-30 CL CL2016001683A patent/CL2016001683A1/es unknown
-
2019
- 2019-02-13 JP JP2019023587A patent/JP6620901B2/ja active Active
- 2019-11-22 JP JP2019211001A patent/JP6908093B2/ja active Active
-
2021
- 2021-07-01 JP JP2021110348A patent/JP7140241B2/ja active Active
-
2022
- 2022-09-08 JP JP2022142908A patent/JP7409448B2/ja active Active
-
2023
- 2023-12-21 JP JP2023215716A patent/JP2024026456A/ja active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2013008374A (ja) * | 2007-02-28 | 2013-01-10 | Ricoh Co Ltd | 情報処理システム、情報処理方法、情報処理装置、機器、プログラム、及び記録媒体 |
US20110093895A1 (en) * | 2009-10-20 | 2011-04-21 | Joon Hui Lee | Method of processing application in digital broadcast receiver connected with interactive network and the digital broadcast receiver |
JP2013098859A (ja) * | 2011-11-02 | 2013-05-20 | Sony Corp | 情報処理装置、情報処理方法及びプログラム |
Non-Patent Citations (3)
Title |
---|
"ETSI TS 102 796 VI.1.1", June 2010 |
"Integrated Broadcast-Broadband System Specification Version 1.0", 4 December 2013 |
"IPTVFJ STD-0011 HTML5 Browser Specification Version 1.0", 4 December 2013 |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017014034A1 (ja) * | 2015-07-23 | 2017-01-26 | ソニー株式会社 | 受信装置、送信装置、およびデータ処理方法 |
CN107851072A (zh) * | 2015-07-23 | 2018-03-27 | 索尼公司 | 接收设备、发送设备和数据处理方法 |
EP3327576A4 (en) * | 2015-07-23 | 2018-12-12 | Sony Corporation | Reception device, transmission device, and data processing method |
US10820041B2 (en) | 2015-07-23 | 2020-10-27 | Saturn Licensing Llc | Reception apparatus, transmission apparatus and data processing method |
JP2019068410A (ja) * | 2017-10-04 | 2019-04-25 | 日本放送協会 | 受信装置およびプログラム |
JP7300250B2 (ja) | 2017-10-04 | 2023-06-29 | 日本放送協会 | 受信装置およびプログラム |
Also Published As
Publication number | Publication date |
---|---|
JP6908093B2 (ja) | 2021-07-21 |
JP2020039171A (ja) | 2020-03-12 |
JP7409448B2 (ja) | 2024-01-09 |
US20160316260A1 (en) | 2016-10-27 |
CL2016001683A1 (es) | 2017-01-13 |
JP6620901B2 (ja) | 2019-12-18 |
US10798449B2 (en) | 2020-10-06 |
JPWO2015104743A1 (ja) | 2017-03-23 |
JP6481620B2 (ja) | 2019-03-13 |
JP2021168492A (ja) | 2021-10-21 |
JP2024026456A (ja) | 2024-02-28 |
CN105874815A (zh) | 2016-08-17 |
JP2022173266A (ja) | 2022-11-18 |
EP3094102B1 (en) | 2021-12-29 |
JP2019110561A (ja) | 2019-07-04 |
EP3094102A1 (en) | 2016-11-16 |
AR098972A1 (es) | 2016-06-22 |
JP7140241B2 (ja) | 2022-09-21 |
EP3094102A4 (en) | 2017-08-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7409448B2 (ja) | 受信装置及び受信方法 | |
US10390066B2 (en) | Information processing apparatus, information processing method, program, and server apparatus | |
JPWO2013094110A1 (ja) | 情報処理装置、サーバ装置、情報処理方法、サーバ処理方法およびプログラム | |
JP6213197B2 (ja) | 情報処理装置および受信方法 | |
JP6627950B2 (ja) | 送信装置および送信方法 | |
WO2014030283A1 (ja) | 署名検証情報の伝送方法、情報処理装置、情報処理方法および放送送出装置 | |
JP7334772B2 (ja) | 情報処理装置及び受信方法 | |
JP6984709B2 (ja) | 受信装置および受信方法 | |
JP6663892B2 (ja) | 送信システム及び送信方法 | |
JP6766918B2 (ja) | 受信装置および受信方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14878365 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 15103434 Country of ref document: US |
|
ENP | Entry into the national phase |
Ref document number: 2015556631 Country of ref document: JP Kind code of ref document: A |
|
REEP | Request for entry into the european phase |
Ref document number: 2014878365 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2014878365 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112016015395 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 112016015395 Country of ref document: BR Kind code of ref document: A2 Effective date: 20160630 |