Information processing apparatus and method
First Claim
Patent Images
1. An information processing apparatus, comprising:
- circuitry configured totransmit a random value to another information processing apparatus that receives encrypted content;
judge whether information is valid, the information being generated at the another information processing apparatus based on the random value and then transmitted from the another information processing apparatus;
transmit key information used for decrypting the encrypted content to the another information processing apparatus in response to the information being valid;
determine an additional value used to update a count of information processing apparatuses that receive the key information based on whether identification information of the another information processing apparatus is registered in a registration list that includes respective identification information of each one of the information processing apparatuses that receive the key information;
update the count by adding the additional value to the count; and
increase a predefined maximum value of the count during an authentication process when (i) the count is equal to or larger than the predefined maximum value and (ii) the information processing apparatus is arranged as a bridge processing apparatus.
1 Assignment
0 Petitions
Accused Products
Abstract
In order to limit use of content, when a source receives a request for transmitting content from a sink, the source performs an authentication process. When the authentication is successful, the source transmits to the sink key information necessary for decrypting the encryption applied to the content. The sink can receive the content by receiving the key information and by decrypting the encryption applied to the content by using the key information.
-
Citations
27 Claims
-
1. An information processing apparatus, comprising:
circuitry configured to transmit a random value to another information processing apparatus that receives encrypted content; judge whether information is valid, the information being generated at the another information processing apparatus based on the random value and then transmitted from the another information processing apparatus; transmit key information used for decrypting the encrypted content to the another information processing apparatus in response to the information being valid; determine an additional value used to update a count of information processing apparatuses that receive the key information based on whether identification information of the another information processing apparatus is registered in a registration list that includes respective identification information of each one of the information processing apparatuses that receive the key information; update the count by adding the additional value to the count; and increase a predefined maximum value of the count during an authentication process when (i) the count is equal to or larger than the predefined maximum value and (ii) the information processing apparatus is arranged as a bridge processing apparatus. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
17. An information processing apparatus comprising:
-
circuitry configured to receive a random value transmitted by another information processing apparatus; generate information based on the received random value; transmit the information to the another information processing apparatus; and receive key information transmitted by the another processing apparatus in response to the another information processing apparatus judging that the information is valid, the key information being used for decrypting encrypted content; wherein the circuitry receives the random value from the another information processing apparatus in response to the another information processing apparatus determining that a count of information processing apparatuses that receive the key information is less than a predefined maximum value, and in which the predefined maximum value of the count is increased during an authentication process when (i) the count is equal to or larger than the predefined maximum value and (ii) the information processing apparatus is arranged as a bridge processing apparatus. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
Specification