Method for judging use permission of information and content distribution system using the method
4 Assignments
0 Petitions
Accused Products
Abstract
A method for judging use permission of information on one or more terminal apparatuses which uses content provided by a content provider and metadata provided by a metadata provider and supplementing the content, the method comprising: metadata use permission judgment judging use permission of the metadata based on usage control information regarding use control of the metadata; and using the metadata in the case where in said metadata use permission judgment, the use of the metadata is permitted. Specifically, the usage control information includes the first signer identification information which identifies the range of the provider of the metadata that can be used. The metadata includes a signature of the metadata provider identified in the first signer identification information, and the second signer identification information identifying the signer of the signature. And, said metadata use permission judgment judges the metadata use permission based on the metadata provider identified in said first signer identification information, said second signer identification information, and signature verification.
97 Citations
84 Claims
-
1-46. -46. (canceled)
-
47. A method for judging use permission of information used by one or more terminal apparatuses which use content provided by a content provider and metadata which is data provided by a metadata provider and supplementing the content, the method comprising:
-
judging use permission of the metadata based on usage control information regarding use control of the metadata; and
using the metadata in the case where it is judged that the use of the metadata is permitted in said judging, wherein the usage control information includes first signer identification information identifying a range of a provider of metadata that can be used, a signature of the metadata provider is included in the metadata, second signer identification information is included in a public key certificate used for verifying the signature of the metadata, the second signer identification information identifying at least one of the signer of the metadata and the signer of the public key certificate, in said judging, it is judged whether the metadata use is permitted based on the metadata provider identified in the first signer identification information, the second signer identification information, and the signature verification using the public key certificate, and the first signer identification information includes information identifying at least one of (i) the signer of the metadata, (ii) the signer of the public key certificate used for the signature verification of the metadata and (iii) no limit. - View Dependent Claims (48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80)
-
-
81. One or more terminal apparatuses which use content provided by a content provider and metadata which is data provided by a metadata provider and supplementing the content, the apparatus comprising:
-
metadata use permission judging unit operable to judge use permission of the metadata based on usage control information regarding use control of the metadata; and
use unit operable to use the metadata in the case where in said metadata use permission judging unit, the use of the metadata is permitted, wherein the usage control information includes first signer identification information identifying a range of a provider of metadata that can be used, a signature of the metadata provider is included in the metadata, second signer identification information is included in a public key certificate used for verifying the signature of the metadata, the second signer identification information identifying at least one of the signer of the metadata and the signer of the public key certificate, in said judging, it is judged whether the metadata use is permitted based on the metadata provider identified in the first signer identification information, the second signer identification information, and the signature verification using the public key certificate, and the first signer identification information includes information identifying at least one of (i) the signer of the metadata, (ii) the signer of the public key certificate used for the signature verification of the metadata and (iii) no limit. - View Dependent Claims (83)
-
-
82. A transmitting apparatus which transmits, to one or more terminal apparatuses, content provided by a content provider and metadata which is data, provided by a metadata provider, supplementing the content, based on a request, the apparatus comprising:
-
a means to transmit usage control information regarding use control of the metadata so as to have the one or more terminal apparatuses judge use permission of the metadata, wherein the usage control information includes first signer identification information identifying a range of a provider of metadata that can be used, a signature of the metadata provider is included in the metadata, second signer identification information is included in a public key certificate used for verifying the signature of the metadata, second signer identification information identifying at least one of the signer of the metadata and the signer of the public key certificate, in said judging, it is judged whether the metadata use is permitted based on the metadata provider identified in the first signer identification information, the second signer identification information, and the signature verification using the public key certificate, and the first signer identification information includes information identifying at least one of (i) the signer of the metadata, (ii) the signer of the public key certificate used for the signature verification of the metadata and (iii) no limit.
-
-
84. A program for judging use permission of information on one or more terminal apparatuses which use content provided by a content provider and metadata which is data provided by a metadata provider and supplementing the content, the program causing a computer to execute the following:
-
judging use permission of the metadata based on usage control information regarding use control of the metadata; and
using the metadata in the case where in said metadata use permission judging, the use of the metadata is permitted, wherein the usage control information includes first signer identification information identifying a range of a provider of metadata that can be used, a signature of the metadata provider is included in the metadata, second signer identification information is included in a public key certificate used for verifying the signature of the metadata, the second signer identification information identifying at least one of the signer of the metadata and the signer of the public key certificate, in said judging, it is judged whether the metadata use is permitted based on the metadata provider identified in the first signer identification information, the second signer identification information, and the signature verification using the public key certificate, and the first signer identification information includes information identifying at least one of (i) the signer of the metadata, (ii) the signer of the public key certificate used for the signature verification of the metadata and (iii) no limit.
-
Specification