Information processing apparatus and method
First Claim
Patent Images
1. An information processing apparatus for carrying out secure transmission of content to another apparatus over a network, said information processing apparatus comprising:
- an encryption unit operable to encrypt the content;
an authentication unit operable to receive authentication information from the another apparatus when the another apparatus requests permission to receive the encrypted content, and to determine whether the authentication information is valid;
a first obtaining unit operable to obtain identification information of the another apparatus from the authentication information when the authentication information is valid and to determine whether the identification information of the another apparatus is already stored in a storage unit;
a transmitting unit operable to transmit a key used for content decryption to the another apparatus when the authentication information is valid;
a first counting unit operable to increment by one a count of a total number of apparatuses having permission to receive the encrypted content when the identification information of the another apparatus is not already stored in said storage unit and the count of the total number of apparatuses having permission to receive the encrypted content is less than the maximum value;
said storage unit being operable to store the identification information of the another apparatus when the identification information of the another apparatus is not already stored in said storage unit; and
an information updating unit operable to delete the identification information stored in said storage unit and to reset the count of the total number of apparatuses having permission to receive the encrypted content when the key used for content decryption is changed.
1 Assignment
0 Petitions
Accused Products
Abstract
In order to limit use of content, when a source receives a request for transmitting content from a sink, the source performs an authentication process. When the authentication is successful, the source transmits to the sink key information necessary for decrypting the encryption applied to the content. The sink can receive the content by receiving the key information and by decrypting the encryption applied to the content by using the key information.
-
Citations
12 Claims
-
1. An information processing apparatus for carrying out secure transmission of content to another apparatus over a network, said information processing apparatus comprising:
-
an encryption unit operable to encrypt the content; an authentication unit operable to receive authentication information from the another apparatus when the another apparatus requests permission to receive the encrypted content, and to determine whether the authentication information is valid; a first obtaining unit operable to obtain identification information of the another apparatus from the authentication information when the authentication information is valid and to determine whether the identification information of the another apparatus is already stored in a storage unit; a transmitting unit operable to transmit a key used for content decryption to the another apparatus when the authentication information is valid; a first counting unit operable to increment by one a count of a total number of apparatuses having permission to receive the encrypted content when the identification information of the another apparatus is not already stored in said storage unit and the count of the total number of apparatuses having permission to receive the encrypted content is less than the maximum value; said storage unit being operable to store the identification information of the another apparatus when the identification information of the another apparatus is not already stored in said storage unit; and an information updating unit operable to delete the identification information stored in said storage unit and to reset the count of the total number of apparatuses having permission to receive the encrypted content when the key used for content decryption is changed. - View Dependent Claims (2, 3)
-
-
4. A method for carrying out secure transmission of content from an information processing apparatus to another apparatus over a network, said method comprising:
-
encrypting the content; receiving authentication information from the another apparatus when the another apparatus requests permission to receive the encrypted content; determining whether the authentication information is valid; obtaining identification information of the another apparatus from the authentication information when the authentication information is valid; determining whether the identification information of the another apparatus is already stored; transmitting a key used for content decryption to the another apparatus when the authentication information is valid; incrementing by one a count of a total number of apparatuses having permission to receive the encrypted content when the identification information of the another apparatus is not already stored and the count of the total number of apparatuses having permission to receive the encrypted content is less than the maximum value; storing the identification information of the another apparatus when the identification information of the another apparatus is not already stored; and deleting the stored identification information and resetting the count of the total number of apparatuses having permission to receive the encrypted content when the key used for content decryption is changed. - View Dependent Claims (5)
-
-
6. A computer-readable medium having recorded thereon computer program instructions for executing a method for carrying out secure transmission of content from an information processing apparatus to another apparatus over a network, said method comprising:
-
encrypting the content; receiving authentication information from the another apparatus when the another apparatus requests permission to receive the encrypted content; determining whether the authentication information is valid; obtaining identification information of the another apparatus from the authentication information when the authentication information is valid; determining whether the identification information of the another apparatus is already stored; transmitting a key used for content decryption to the another apparatus when the authentication information is valid; incrementing by one a count of a total number of apparatuses having permission to receive the encrypted content when the identification information of the another apparatus is not already stored and the count of the total number of apparatuses having permission to receive the encrypted content is less than the maximum value; storing the identification information of the another apparatus when the identification information of the another apparatus is not already stored; and deleting the stored identification information and resetting the count of the total number of apparatuses having permission to receive the encrypted content when the key used for content decryption is changed. - View Dependent Claims (7)
-
-
8. An information processing apparatus for carrying out secure receiving of content from a first apparatus over a first network connection and for carrying out secure transmission of the content to a second apparatus over a second network connection, said information processing apparatus comprising:
-
a first transmitting unit operable to transmit to the first apparatus a request for permission to receive the content; a first authentication unit operable to perform a first authentication procedure with the first apparatus; a receiver operable to receive a first key used for content decryption from the first apparatus when the first authentication procedure is successful; a decryption unit operable to use the first key to generate a decryption key used to decrypt encrypted content received from the first apparatus; a reencryption unit operable to reencrypt the decrypted content; a second authentication unit operable to receive authentication information from the second apparatus when a request for permission to receive the content is made from the second apparatus and to determine whether the authentication information is valid; a first obtaining unit operable to obtain identification information of the second apparatus from the authentication information when the authentication information is valid and to determine whether the identification information of the second apparatus is already stored in a storage unit; a second transmitting unit operable to transmit a second key used for content decryption to the second apparatus when the authentication information is valid; a first counting unit operable to increment by one a count of a number of apparatuses having permission to receive the reencrypted content when the identification information of the second apparatus is not already stored in said storage unit and the count of the total number of apparatuses having permission to receive the reencrypted content is less than the maximum value; said storage unit being operable to store the identification information of said second apparatus when the identification information of the second apparatus is not already stored in said storage unit; and an information updating unit operable to delete the identification information stored in said storage unit and to reset the count of the number of apparatuses having permission to receive the reencrypted content when the second key used for content decryption is changed. - View Dependent Claims (9, 10)
-
-
11. A method for carrying out secure receiving of content from a first apparatus over a first network connection and for carrying out secure transmission of the content to a second apparatus over a second network connection, said method comprising:
-
transmitting to the first apparatus a request for permission to receive the content; performing a first authentication procedure with the first apparatus; receiving a first key used for content decryption from the first apparatus when the first authentication procedure is successful; generating a decryption key from the first key used for content decryption; decrypting, using the generated decryption key, encrypted content received from the first apparatus; reencrypting the decrypted content; receiving authentication information from the second apparatus when a request for permission to receive the content is made from the second apparatus; determining whether the authentication information is valid; obtaining identification information of the second apparatus from the authentication information when the authentication information is valid; determining whether the identification information of the second apparatus is already stored; transmitting a second key used for content decryption to the second apparatus when the authentication information is valid; incrementing by one a count of a number of apparatuses having permission to receive the reencrypted content when the identification information of the second apparatus is not already stored in said storage unit and the count of the total number of apparatuses having permission to receive the reencrypted content is less than the maximum value; storing the identification information of the second apparatus when the identification information of the second apparatus is not already stored; and deleting the identification information stored in said storage unit and resetting the count of the number of apparatuses having permission to receive the reencrypted content when the second key used for content decryption is changed.
-
-
12. A computer-readable medium having recorded thereon computer program instructions for executing a method for carrying out secure receiving of content from a first apparatus over a first network connection and for carrying out secure transmission of the content to a second apparatus over a second network connection, said method comprising:
-
transmitting to the first apparatus a request for permission to receive the content; performing a first authentication procedure with the first apparatus; receiving a first key used for content decryption from the first apparatus when the first authentication procedure is successful; generating a decryption key from the first key used for content decryption; decrypting, using the generated decryption key, encrypted content received from the first apparatus; reencrypting the decrypted content; receiving authentication information from the second apparatus when a request for permission to receive the content is made from the second apparatus; determining whether the authentication information is valid; obtaining identification information of the second apparatus from the authentication information when the authentication information is valid; determining whether the identification information of the second apparatus is already stored; transmitting a second key used for content decryption to the second apparatus when the authentication information is valid and a count of a total number of apparatuses having permission to receive the reencrypted content is less than a maximum value; incrementing by one a count of a number of apparatuses having permission to receive the reencrypted content when the identification information of the second apparatus is not already stored in said storage unit and the count of the total number of apparatuses having permission to receive the reencrypted content is less than the maximum value; storing the identification information of the second apparatus when the identification information of the second apparatus is not already stored; and deleting the identification information stored in said storage unit and resetting the count of the number of apparatuses having permission to receive the reencrypted content when the second key used for content decryption is changed.
-
Specification