Apparatus and system for providing fee-based content
First Claim
1. An information processing system which includes a server and one or more information processing apparatuses and enables the information processing apparatuses to purchase rights to decrypt and use encrypted information, comprising:
- first preparation means, located at the server, for preparing a first usage control status which identifies first usage details describing purchased rights and pricing details corresponding to said first usage details;
storage means for storing, located at the server, said encrypted information, said first usage control status, a usage control policy that contains a second use type that describes rights available for purchase at a subsequent time based on the first usage details of said purchased rights, price tags that contain pricing details corresponding to second usage details, and a key needed to decrypt said encrypted information; and
second preparation means, located at the server, for preparing a second usage control status that identifies said second usage details and pricing details corresponding to said second usage details, based on said usage control policy and said price tags, when rights are purchased again by said one or more information processing apparatuses;
wherein said encrypted information is accessed, at a first information processing apparatus, for a first pre-selected period of time, as a function of said purchased rights and usage control policy,wherein said encrypted information is accessed, by a second information processing apparatus, using second rights, for a second pre-selected period of time, wherein the second information processing apparatus accesses said encrypted information independent of a connection to the first information processing apparatus,wherein the first usage control status and the second usage control status includes at least system registration information; and
wherein the system registration information includes at least an equipment number, a settlement number, account-settling user information, subordinate user information, and use point information.
1 Assignment
0 Petitions
Accused Products
Abstract
A user who repeatedly purchases the same electronic content is entitled to receive a discount price for the additional purchases. This is accomplished by establishing an “Accounting History” of accounting information that is prepared when the electronic content is repurchased. The price of the repurchased electronic content is set to “Discount Price,” which is less than the original price at which the electronic content was purchased for the first time. Since accounts are settled based on the accounting information with “Accounting History” set to “Discount Price,” the user who is purchasing the same content again can buy it at a discount price.
-
Citations
21 Claims
-
1. An information processing system which includes a server and one or more information processing apparatuses and enables the information processing apparatuses to purchase rights to decrypt and use encrypted information, comprising:
-
first preparation means, located at the server, for preparing a first usage control status which identifies first usage details describing purchased rights and pricing details corresponding to said first usage details; storage means for storing, located at the server, said encrypted information, said first usage control status, a usage control policy that contains a second use type that describes rights available for purchase at a subsequent time based on the first usage details of said purchased rights, price tags that contain pricing details corresponding to second usage details, and a key needed to decrypt said encrypted information; and second preparation means, located at the server, for preparing a second usage control status that identifies said second usage details and pricing details corresponding to said second usage details, based on said usage control policy and said price tags, when rights are purchased again by said one or more information processing apparatuses; wherein said encrypted information is accessed, at a first information processing apparatus, for a first pre-selected period of time, as a function of said purchased rights and usage control policy, wherein said encrypted information is accessed, by a second information processing apparatus, using second rights, for a second pre-selected period of time, wherein the second information processing apparatus accesses said encrypted information independent of a connection to the first information processing apparatus, wherein the first usage control status and the second usage control status includes at least system registration information; and wherein the system registration information includes at least an equipment number, a settlement number, account-settling user information, subordinate user information, and use point information. - View Dependent Claims (2, 3)
-
-
4. An information processing method for providing rights to encrypted information to one or more information processing apparatuses, comprising the steps of:
-
preparing a first usage control status, at a server location, which identifies first usage details describing purchased rights and pricing details corresponding to said first usage details, for use by a first information processing apparatus; storing said encrypted information, at the server location, said first usage control status, a usage control policy that contains a second use type that describes rights that can be purchased again based on said purchased rights, price tags that contain pricing details corresponding to second usage details, and a key needed to decrypt said encrypted information; preparing a second usage control status, at the server location, that identifies said second usage details and said pricing details corresponding to said second usage details, based on said usage control policy and said price tags, when rights are purchased again through a second information processing apparatus; and a first access step of accessing said encrypted information, for a first pre-selected period of time, at the first information processing apparatus, as a function of said purchased rights and usage control policy; and a second access step of subsequently accessing said encrypted information, for a second pre-selected period of time, at the second information processing apparatus, independent of a connection to the first information processing apparatus, wherein the first usage control status and the second usage control status includes at least system registration information; and wherein the system registration information includes at least an equipment number, a settlement number, account-settling user information, subordinate user information, and use point information.
-
-
5. A providing medium, which provides a computer-readable program for executing a process at a server apparatus which is connected to one or more other information processing apparatus, which purchases rights to decrypt and use encrypted information, comprising the steps of:
-
a first preparation step, at the server apparatus, of preparing a first usage control status which identifies first usage details describing purchased rights and pricing details corresponding to said first usage details; a storage step of storing, at the server, said encrypted information, said first usage control status, a usage control policy that, contains a second use type that describes rights that can be purchased again based on details of said purchased rights, price tags that contain pricing details corresponding to said second usage details, and a key needed to decrypt said encrypted information; a second preparation step of preparing, at the server, a second usage control status that identifies said second usage details and said pricing details corresponding to said second usage details, based on said usage control policy and said price tags, when rights are purchased again through said one or more other information processing apparatuses; a first access step of accessing, at a first information processing apparatus, said encrypted information, for a first pre-selected period of time, as a function of said purchased rights and usage control policy; and a second access step of subsequently accessing, at a second information processing apparatus, said encrypted information, for a second pre-selected period of time, independent of a connection to the first information processing apparatus, wherein the first usage control status and the second usage control status includes at least system registration information; and wherein the system registration information includes at least an equipment number, a settlement number, account-settling user information, subordinate user information, and use point information.
-
-
6. A first information processing apparatus, which is connected to one or more second information processing apparatuses and which purchases rights to decrypt and use encrypted information, comprising:
-
receiving means for receiving, at a first information processing apparatus, said encrypted information, a key needed to decrypt said encrypted information, and usage control status which identifies first usage details describing first purchase rights as well as first pricing details corresponding to said first usage details, wherein said receiving means receives second usage details describing second purchase rights and second pricing details corresponding to said second usage details; wherein said encrypted information is accessed, for a first pre-selected period of time, as a function of said purchased rights and usage control policy, by the first information processing apparatus wherein said encrypted information is accessed, for a second pre-selected period of time, at one of more second information processing apparatus, independent of a connection to the first information processing apparatus, wherein the first usage control status and the second usage control status includes at least system registration information; and wherein the system registration information includes at least an equipment number, a settlement number account-settling user information, subordinate user information and use point information.
-
-
7. An information processing method for a first information processing apparatus which is connected to one or more second information processing apparatuses and which purchases rights to decrypt and use encrypted information, comprising the steps of:
-
a receiving step of receiving, at the first information processing apparatus, said encrypted information, a key needed to decrypt said encrypted information, and a usage control status which identifies first usage details describing first purchase rights as well as first pricing details corresponding to said first usage details, wherein said receiving step receives second usage details describing second purchase rights and second pricing details; a first access step of accessing, at the first information processing apparatus, said encrypted information, for a first pre-selected period of time, as a function of said purchased rights and usage control policy; and a second access step of subsequently accessing, at one or more second information processing apparatus, said encrypted information, for a second pre-selected period of times wherein the usage control status includes at least system registration information; and wherein the system registration information includes at least an equipment number, a settlement number, account-settling user information, subordinate user information, and use point information.
-
-
8. A providing medium, which provides a computer-readable program for executing a process to a first information processing apparatus which is connected to one or more second information processing apparatuses and which purchases rights to decrypt and use encrypted information, comprising the steps of:
-
a receiving step of receiving, at the first information processing apparatus, said encrypted information, a key needed to decrypt said encrypted information, and usage control status which identifies first usage details describing first purchased rights as well as first pricing details corresponding to said first usage details, wherein said receiving step receives second usage details describing second purchase rights and second pricing details; a first access step of accessing said encrypted information, at the first information processing apparatus, for a first pre-selected period of time, as a function of said purchased rights and usage control policy; and a second access step of subsequently accessing said encrypted information, at one or more second information processing apparatus, for a second pre-selected period of time, independent of a connection to the first information processing apparatus, wherein the usage control status includes at least system registration information; and wherein the system registration information includes at least an equipment number, a settlement number, account-settling user information, subordinate user information, and use point information.
-
-
9. An information processing system that enables the purchase of rights to decrypt and use encrypted information, comprising:
-
storage means for storing said encrypted information, at a server location, a usage control policy that contains usage details that describe purchasable rights, price tags that contain pricing details corresponding to said usage details, and a key needed to decrypt said encrypted information; and preparation means for preparing, at the server location, a usage control status which identifies said usage details and the pricing details corresponding to said usage details, based on said usage control policy and said price tags stored on said storage means; wherein said encrypted information is accessed, at a first information processing apparatus, for a first pre-selected period of time, as a function of said purchased rights and usage control policy, and wherein said encrypted information is accessed, at a second information processing apparatus, for a second pre-selected period of time, independent of a connection to the first information processing apparatus, wherein the usage control status includes at least system registration information; and wherein the system registration information includes at least an equipment number, a settlement number, account-settling user information, subordinate user information, and use point information.
-
-
10. An information processing method for purchasing rights to decrypt and use encrypted information, comprising the steps of:
-
a storage step of storing at a server location, said encrypted information, a usage control policy that contains usage details that describe purchasable rights, price tags that contain pricing details corresponding to said usage details, and a key needed to decrypt said encrypted information; a preparation step of preparing, at the server location, a usage control status which identifies said usage details and the pricing details corresponding to said usage details, based or said usage control policy and said price tags stored during said storage step; a first access step of accessing said encrypted information, at a first information processing apparatus, for a first pre-selected period of time, as a function of said purchased rights and usage control policy; and a second access step of subsequently accessing said encrypted information, at a second information processing apparatus, for a second pre-selected period of time, independent of a connection to the first information processing apparatus, wherein the usage control status includes at least system registration information; and wherein the system registration information includes at least an equipment number, a settlement number, account-settling user information, subordinate user information, and use point information.
-
-
11. A providing medium, which provides a computer-readable program for executing a process to purchase rights to decrypt and use encrypted information, comprising:
-
a storage step of storing, at a server location, said encrypted information, a usage control policy that contains usage details that describe purchasable rights, price tags that contain pricing details corresponding to said usage details, and a key needed to decrypt said encrypted information; a preparation step of preparing, at the server location, a usage control status which identifies said usage details and the pricing details corresponding to said usage details, based on said usage control policy and said price tags stored during said storage step; a first access step of accessing said encrypted information, at a first information processing apparatus, for a first pre-selected period of time, as a function of said purchased rights and usage control policy; and a second access step of subsequently accessing said encrypted information, at a second information processing apparatus, for a second pre-selected period of time, independent of a connection to the first information processing apparatus, wherein the usage control status includes at least system registration information; and wherein the system registration information includes at least an equipment number, a settlement number, account-settling user information, subordinate user information, and use point information.
-
-
12. An information processing apparatus, which includes a server connected to one or more information processing apparatuses and which purchases rights to decrypt and use encrypted information, comprising:
-
receiving means for receiving, at the server location, said encrypted information, a key adapted to decrypt said encrypted information, and a first usage control status which identifies a first use type describing predetermined rights and pricing details corresponding to said first use type; storage means for storing, at the server location, a usage control policy that contains second usage details that describe rights that can be purchased again based on said first usage control status and price tags that contain pricing details corresponding to said second usage details; and first preparation means for preparing, at the server location, a second usage control status which identifies said second usage details and pricing details corresponding to said second usage details, based on said usage control policy and said price tags stored by said storage means, wherein said encrypted information is accessed, for a first pre-selected period of time, at the first information processing apparatus, as a function of said purchased rights and usage control policy, wherein said encrypted information is accessed, for a second pre-selected period of time, at a second information processing apparatus, independent of a connection to the first information processing apparatus, wherein the first usage control status and the second usage control status includes at least system registration information; and wherein the system registration information includes at least an equipment number, a settlement number, account-settling user information, subordinate user information, and use point information. - View Dependent Claims (13)
-
-
14. An information processing method for purchasing rights to decrypt and use encrypted information, comprising:
-
a receiving step of receiving, at a server location, said encrypted information, a key adapted to decrypt said encrypted information, and a usage control status which identifies a first use type describing predetermined rights and pricing details corresponding to said first use type; a storage step of storing a usage control policy, at the server location, that contains second usage details that describe rights that can be purchased again based on said first use type and price tags that contain pricing details corresponding to said second usage details; a first preparation step of preparing, at the server location, a second usage control status which identifies said second usage details and pricing details corresponding to said second usage details, based on said usage control policy and said price tags stored during said storage step; a first access step of accessing said encrypted information, at a first information processing apparatus, for a first pre-selected period of time, as a function of said purchased rights and usage control policy; a second access step of subsequently accessing said encrypted information, at a second information processing apparatus, for a second pre-selected period of time, independent of a connection to the first information processing apparatus, wherein the first usage control status and the second usage control status includes at least system registration information; and wherein the system registration information includes at least an equipment number, a settlement number, account-settling user information, subordinate user information, and use point information.
-
-
15. A providing medium, which provides a computer-readable program for executing a process to a first information processing apparatus which is connected to one or more second information processing apparatuses and which purchases rights to decrypt and use encrypted information, comprising:
-
a receiving step of receiving, at a server location, said encrypted information, a key adapted to decrypt said encrypted information, and a first usage control status which identifies a first use type describing predetermined rights and pricing details corresponding to said first use type; a storage step of storing, at the server location, a usage control policy that contains second usage details that describe rights that can be purchased again based on said first use type, and price tags that contain pricing details corresponding to said second usage details; a first preparation step of preparing, at the server location, a second usage control status which identifies said second usage details and the pricing details corresponding to said second usage details, based on said usage control policy and said price tags stored during said storage step; a first access step of accessing said encrypted information, at a first information processing apparatus, for a first pre-selected period of time, as a function of said purchased rights and usage control policy; and a second access step of subsequently accessing said encrypted information, at a second information processing apparatus, for a second pre-selected period of time, independent of a connection to the first information processing apparatus, wherein the first usage control status and the second usage control status includes at least system registration information; and wherein the system registration information includes at least an equipment number, a settlement number, account-settling user information, subordinate user information, and use point information.
-
-
16. A computer-readable medium, storing program code for a method for modifying a price associated with content, the program code when executed causes a processor to perform a process comprising:
-
providing a first price associated with particular content; utilizing, at a first occurrence, at least a portion of the particular content at one or more reception locations, for a first pre-selected period of time; providing a second price associated with the particular content as a function of the utilizing step; utilizing, at a second occurrence, at least a portion of the particular content at one or more reception locations, the second utilization being for a second pre-selected period of time, and independent of a connection to one or more reception locations; generating billing information as a function of the first price and the second price; and determining a fee for the particular content based on the billing information, wherein the first usage control status and the second usage control status includes at least system registration information; and wherein the system registration information includes at least an equipment number, a settlement number, account-settling user information, subordinate user information, and use point information. - View Dependent Claims (17, 18)
-
-
19. An apparatus for modifying a price associated with content comprising:
-
means for providing a first price associated with particular content; means for utilizing, at a first occurrence, at least a portion of the particular content at one or more reception locations; means for providing a second price associated with the particular content as a function of the means for utilizing; means for utilizing, at a second occurrence, at least a portion of the particular content at one or more reception locations; wherein said encrypted information is accessed for a first pre-selected period of time, at a first reception location, as a function of said purchased rights and usage control policy, wherein said encrypted information is accessed, at a second reception location, for a second pre-selected period of time, independent of a connection to one or more information processing apparatus, wherein the first usage control status and the second usage control status includes at least system registration information, wherein the system registration information includes at least an equipment number, a settlement number, account-settling user information, subordinate user information, and use point information; and means for generating billing information as a function of the first price and the second price. - View Dependent Claims (20, 21)
-
Specification