In order to limit use of content, when a source receives a request for transmitting content from a sink, the source performs an authentication process. When the authentication is successful, the source transmits to the sink key information necessary for decrypting the encryption applied to the conte
In order to limit use of content, when a source receives a request for transmitting content from a sink, the source performs an authentication process. When the authentication is successful, the source transmits to the sink key information necessary for decrypting the encryption applied to the content. The sink can receive the content by receiving the key information and by decrypting the encryption applied to the content by using the key information.
대표청구항▼
1. An information processing apparatus, comprising: circuitry configured to transmit a random value to another information processing apparatus that receives encrypted content;judge whether information is valid, the information being generated at the another information processing apparatus based on
1. An information processing apparatus, comprising: circuitry configured to transmit a random value to another information processing apparatus that receives encrypted content;judge whether information is valid, the information being generated at the another information processing apparatus based on the random value and then transmitted from the another information processing apparatus;transmit key information used for decrypting the encrypted content to the another information processing apparatus in response to the information being valid;determine an additional value used to update a count of information processing apparatuses that receive the key information based on whether identification information of the another information processing apparatus is registered in a registration list that includes respective identification information of each one of the information processing apparatuses that receive the key information;update the count by adding the additional value to the count; andincrease a predefined maximum value of the count during an authentication process when (i) the count is equal to or larger than the predefined maximum value and (ii) the information processing apparatus is arranged as a bridge processing apparatus. 2. The information processing apparatus according to claim 1, further comprising: a random number generator;wherein the circuitry transmit the random value generated at the random number generator to the another information processing apparatus. 3. The information processing apparatus according to claim 1, wherein the random value is generated using a pseudo-random number generation process. 4. The information processing apparatus according to claim 1, in which the circuitry is further configured to receive from the another information processing apparatus a digital certificate associated with the another information processing apparatus, and determine whether the digital certificate received from the another information processing apparatus is valid, wherein the circuitry transmits the random value to the another information processing apparatus in response to the digital certificate being determined to be valid. 5. The information processing apparatus according to claim 4, wherein the digital certificate includes the identification information of the another information processing apparatus and further key information associated with the another information processing apparatus. 6. The information processing apparatus according to claim 1, wherein the information is generated by the another information processing apparatus using further key information associated with the another information processing apparatus. 7. The information processing apparatus according to claim 6, wherein the further key information associated with the another information processing apparatus is a private key. 8. The information processing apparatus according to claim 1, wherein the circuitry judges whether the information is valid using further key information associated with the another information processing apparatus. 9. The information processing apparatus according to claim 8, wherein the further key information associated with the another information processing apparatus is a public key. 10. The information processing apparatus according to claim 1, wherein the circuitry transmits the random value to the another information processing apparatus in response to the count being less than the predefined maximum value. 11. The information processing apparatus according to claim 1, wherein in response to the circuitry determining that the identification information of the another information processing apparatus is not registered in the registration list, the circuitry determines the additional value and updates the count by adding to it the additional value, and in response to the circuitry determining that the identification information of the another information processing apparatus is registered in the registration list, the circuitry does not determine the additional value and does not update the count. 12. The information processing apparatus according to claim 1, in which the circuitry includes a control section that controls the random value transmitting, the judging, the key information transmitting, and the determining. 13. The information processing apparatus according to claim 1, in which the circuitry includes a communication interface (I/F) from which the random value and the key information are transmitted to the another information processing apparatus, and the information generated by the another information processing apparatus is received via the communication interface. 14. The information processing apparatus according to claim 1, in which the circuitry plays back content recorded on a medium. 15. The information processing apparatus according to claim 1, in which the circuitry encrypts at least one of played back content or received content. 16. The information processing apparatus according to claim 1, in which the circuitry stores at least one of played back content or received content. 17. An information processing apparatus comprising: circuitry configured to receive a random value transmitted by another information processing apparatus;generate information based on the received random value;transmit the information to the another information processing apparatus; andreceive key information transmitted by the another processing apparatus in response to the another information processing apparatus judging that the information is valid, the key information being used for decrypting encrypted content;wherein the circuitry receives the random value from the another information processing apparatus in response to the another information processing apparatus determining that a count of information processing apparatuses that receive the key information is less than a predefined maximum value, andin which the predefined maximum value of the count is increased during an authentication process when (i) the count is equal to or larger than the predefined maximum value and (ii) the information processing apparatus is arranged as a bridge processing apparatus. 18. The information processing apparatus according to claim 17, in which the circuitry is further configured to transmit a digital certificate associated with the information processing apparatus to the another information processing apparatus, and receive the random value from the another information processing apparatus in response to the another information processing apparatus determining that the digital certificate is valid. 19. The information processing apparatus according to claim 18, wherein the digital certificate includes the identification information of the information processing apparatus and further key information associated with the information processing apparatus. 20. The information processing apparatus according to claim 17, wherein the circuitry generates the information using further key information associated with the information processing apparatus. 21. The information processing apparatus according to claim 20, wherein the further key information associated with the information processing apparatus is a private key. 22. The information processing apparatus according to claim 17, wherein the circuitry receives the key information in response to the another information processing apparatus judging that the information is valid using further key information associated with the information processing apparatus. 23. The information processing apparatus according to claim 22, wherein the further key information associated with the information processing apparatus is a public key. 24. The information processing apparatus according to claim 17, in which the circuitry includes a control section that controls the random value receiving, the information transmitting, and the key information receiving. 25. The information processing apparatus according to claim 17, in which the circuitry includes a communication interface (I/F) whereat the random value is received from the another information processing apparatus, and the key information transmitted by the another information processing apparatus is received via the communication interface. 26. The information processing apparatus according to claim 17, in which the circuitry decrypts the encrypted content using the received key information. 27. The information processing apparatus according to claim 17, in which the circuitry stores at least one of the encrypted content or the decrypted content.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (45)
Cuccia David ; Epstein Michael A. ; Pasieka Michael S., Administration and utilization of secret fresh random numbers in a networked environment.
Hatakeyama, Takahisa; Yoshioka, Makoto; Miyazawa, Yuji, Content usage control system, content usage apparatus, computer readable recording medium with program recorded for computer to execute usage method.
Narasimhalu Arcot D. (Singapore SGX) Wang Weiguo (Singapore SGX) Kankanhalli Mohan S. (Singapore SGX), Controlled dissemination of digital information.
Itoh, Hiroyasu; Akiyama, Ryota; Nakagawa, Toru, Device for generating, detecting, recording, and reproducing a watermarked moving image having a copy preventing capability and storage medium for storing program or the moving image.
Jones, Thomas C.; Brackenridge, Billy, Digital content distribution, transmission and protection system and method, and portable device for use therewith.
Kondoh, Takashi; Higurashi, Masaki; Komiya, Yasuhiro; Yamada, Hidetoshi, Digital evidential camera system for generating alteration detection data using built-in encryption key.
Katz Donald R. ; Lau Edwin J. ; Mott Timothy ; Brenneman Scott A. ; Jun Benjamin Che-Ming ; Pai Samuel Hong-Yen, Digital information library and delivery system with logic for generating files targeted to the playback device.
Peinado,Marcus; Abburi,Rajasekhar; England,Paul; Ganesan,Krishnamurthy; Bell,Jeffrey R. C.; Blinn,Arnold N.; Jones,Thomas C., Digital license and method for obtaining/providing a digital license.
Peinado, Marcus; Liu, Donna; Ganesan, Krishnamurthy, Digital rights management system operating on computing device and having black box tied to computing device.
John Knight ; Thomas Anthony Roden ; Darrell Myers Shively, II ; Pauline Chen ; Kavita Shekhar Patil ; Sonny Bui, Distributed database system with authoritative node.
Ross Cliff D. (Pleasant Grove UT) Taylor Neil W. (Springville UT) Kingdon Kevin W. (Orem UT) Davis Howard R. (Salem UT) Major Drew (Orem UT), Method and apparatus for electronic licensing.
DeMello, Marco A.; Keely, Leroy B.; Byrum, Frank D.; Yaacovi, Yoram; Hughes, Kathryn E., Method and system for binding enhanced software features to a persona.
Takashima Youichi (Kanagawaken JPX) Ishii Shinji (Kanagawaken JPX) Yamanaka Kiyoshi (Kanagawaken JPX), Method and system for digital information protection.
Halter Bernard J. (Longmont CO) Bracco Alphonse M. (Reston VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak ; deceased Rostislaw (late of Dumfries VA , Method and system for multimedia access control enablement.
Boyle Stephen S. ; Fox Mark A. ; Ramasubramani Seetharaman ; Schwartz Bruce V. ; Martin ; Jr. Bruce K. ; King Peter F. ; Liao Hanqing, Method and system for pushing and pulling data using wideband and narrowband transport systems.
Herzberg Amir ; Krawczyk Hugo Mario ; Kutten Shay ; Le An Van ; Matyas Stephen Michael ; Yung Marcel Mordechay, Method and system for the secured distribution of multimedia titles.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.