The present invention relates to a data use limitation setting method, a data use limitation setting apparatus, and a data use limitation setting program which set a data use limitation on content data held by the user; and a recording medium containing the data use limitation setting program.
As a conventional technique for protecting copyrights of data, there is a technique which embeds in content data, limitation information for limiting use of the content data. In this technique, a computer reads the limitation information embedded in data when the data is to be used, and limits the use of the data in accordance with the limitation information, thereby protecting the copyrights of the data.
Further, Japanese Unexamined Patent Publication No. 86435/1999 (Tokukaihei 11-86435) discloses an invention in which prohibition information for prohibiting reproduction of data and permission information for limiting the number of reproduction of data are embedded in the data. With this invention, the user is limited from reproducing the data, so that the copyrights of the data are protected.
Specifically, when the user reproduces the data, the computer of the user reads the prohibition information and the permission information, and the reproduction of the data is limited in accordance with the information. Further, a digital signature is put on the permission information. The signature is authenticated when the permission information is read, and the reproduction of the data is prohibited if the authentication is not successful. This prevents unauthorized alteration of the permission information.
As described above, the conventional arrangement limits the use of content data by embedding the limitation information in the content data, and reading the limitation information when using the content data. Further, the conventional arrangement prevents the unauthorized setting or unauthorized alteration of the limitation information by encrypting the limitation information or by putting a digital signature on the limitation information.
In the conventional arrangement, however, the limitation information can be embedded in the content data only by a person who has a key for encrypting or who can put a digital signature. On the other hand, if the limitation information is not encrypted or the digital signature is not put on the limitation information, a general user of the content data can embed the limitation information in the content data. In this case, the general user may embed in the content data, limitation information that is undesired by the creator of the content data, or the general user may rewrite the limitation information.
For this reason, a dedicated tool or software is used to set the use limitation on the content data in the present circumstances. With such a method, however, the use limitation can be freely modified if the tool or software is analyzed. Thus, the reliability of the use limitation is low. Accordingly, the tool or software can be distributed to only a part of reliable users, for improving the reliability by preventing the unauthorized analysis.
As described above, the conventional technique has a problem such that it is not possible to widely provide a highly reliable system for limiting the use of the content data.
Further, the conventional technique also has a problem such that it is not possible to provide a system which allows only the creator of the content data to freely limit the use of the content data.
Therefore the present invention has an objective to widely provide as a system for limiting the use of content data, a highly reliable system that is not easily subjected to the unauthorized analysis. Further, the present invention has another objective to provide a system that allows only the creator of content data to freely limit the use of the content data.
In order to solve the foregoing problems, a data use limitation setting method of the present invention is characterized by including a data receiving step of receiving from a user terminal device, (A) limitation setting target data such as content data and (B) user authentication data corresponding to the limitation setting target data; an authentication judging step of judging in accordance with the user authentication data, success or failure of authentication; and a data use limitation setting step of, if the success of the authentication is judged in the judgment, setting on the limitation setting target data, a data use limitation for limiting use of the limitation setting target data.
In this arrangement, the user has registered as a member, for example, so as to set the data use limitation on the limitation setting target data. In the authentication judging step, the user authentication data received in the data receiving step is compared with the user registration information so that success or failure of authentication, namely, whether or not the user who sent the user authentication data has registered as a member, for example, is judged.
In the data use limitation setting step, the data use limitation is set on the limitation setting target data received in the data receiving step, namely the data use limitation is set on the content data, for example, if the success of the authentication is judged in the authentication judging step, namely, if the user who sent the user authentication data is judged to have registered as a member, for example.
Here, the limitation setting target data (content data) is data created by any given user or apparatus. The limitation setting target data may be moving image data, music data, document data, and the like, for example. Further, the data use limitation is a limitation on use of the limitation setting target data by any given user, apparatus, or the like. The data use limitation may limit reproduction, storing, printing, transfer, and editing of the content data, a terminal device that can use the content data, a usable time of the content data, or the like. Further, the data use limitation may limit use of the content data for a specific service, for example.
With this arrangement, in the data use limitation setting step, the data use limitation is set on the limitation setting target data sent from the user terminal device, if the success of the authentication is judged in the authentication judging step. Therefore it is not necessary to provide the user terminal device with a device for setting the data use limitation.
Further, the data use limitation on the limitation setting target data is not set at the user terminal device, but set at a data use limitation setting apparatus which communicates with the user terminal device via the Internet, for example, and which performs the foregoing steps. Therefore it is possible to widely provide a highly reliable system whose method to set the data use limitation is not easily subjected to unauthorized analysis.
The data use limitation setting method may be so arranged that the limitation setting target data includes creator information for specifying a creator of the limitation setting target data, the data use limitation setting method further including a creator information acquiring step of acquiring the creator information from the limitation setting target data; and an association judging step of judging whether or not the user authentication data is associated with the creator information, the data use limitation setting step being carried out only if, in the association judging step, the creator information that is acquired from the limitation setting target data is judged to be associated with the user authentication data that is received in accordance with a request to set the data use limitation on the limitation setting target data.
In this arrangement, the creator information is a serial ID assigned to each user of the creation tool of the limitation setting target data (content data), for example. The creator information itself may be used as the user authentication data. Further, the ID that is used as the user authentication data may be associated with the creator information when the user is registered, for example.
In this arrangement, only if, in the association judging step, the creator information that is acquired from the limitation setting target data is judged to be associated with the user authentication data that is received in accordance with a request to set the data use limitation on the limitation setting target data, the data use limitation setting step is carried out, namely, the data use limitation is set on the limitation setting target data.
Therefore, in addition to the judgment in accordance with the user authentication data as to success or failure of the authentication, it is judged whether or not the user who requested to set the data use limitation on the limitation setting target data is the creator of the limitation setting target data (content data). With this, it is possible to prevent unauthorized data use limitation from being set in accordance with a request from the user who acquired the use authentication data in an unauthorized manner. For example, it is possible to prevent the alteration of the data use limitation on the limitation setting data, which is intended for unauthorized use of the limitation setting target data (content data), and the like. Further, it is possible to prohibit the data use limitation from being set against the intentions of the creator of the limitation setting target data. This can further increase the reliability of the system which implements the method of the present invention.
The data use limitation setting method may be so arranged that in the data use limitation setting step, the data use limitation is desirably selected by a user, the data use limitation being set on the limitation setting target data in accordance with use limitation setting data received from the user terminal device.
With this arrangement, the user can desirably select the data use limitation in accordance with the form of the limitation setting target data, the type of the user, and the like. As an example, the data use limitation may be set such that the data use limitation cannot be reset if the data use limitation has been already set on the content data. As another example, the data use limitation may be set such that resetting that intensifies the currently set limitation is only permitted if the data use limitation has been already set on the content data. As a further example, the data use limitation may be set such that the use of specific data is prohibited to only a specific user.
As described above, in the arrangement of the present invention, the data use limitation can be desirably selected by the user, thereby enhancing the convenience of the system which implements the method of the present invention.
The data use limitation setting method may be arranged so as to further include the step of sending to a designated terminal device in response to a request sent from the user terminal device, the limitation setting target data on which the data use limitation has been set in the data use limitation setting step.
In this arrangement, the designated terminal device is a terminal device of a copyright holder of the limitation setting target data (content data), and a terminal device of a specific customer, for example.
With this arrangement, the limitation setting target data on which the data use limitation has been set can be directly sent to the designated terminal device desired by the user without being sent to the user terminal device, thereby enhancing the convenience of the system which implements the method of the present invention.
The data use limitation setting method may be arranged so as to further include the step of sending to a device that has a purpose of providing the limitation setting target data, the limitation setting target data on which the data use limitation has been set in the data use limitation setting step.
In this arrangement, the device that has a purpose of providing the limitation setting target data is a server for a downloading service of the limitation setting target data (content data) and a server for a transmission service of the content data, for example.
With this arrangement, the limitation setting target data on which the data use limitation has been set can be directly sent to the device that has a purpose of providing the limitation setting target data without being sent to the user terminal device, thereby enhancing the convenience of the system which employs the method of the present invention.
The data use limitation setting method may be arranged so as to further include the step of billing a user who requested to set the data use limitation on the limitation setting target data.
With this arrangement, by billing the user who requested to set the data use limitation on the limitation setting target data, it is possible to properly make profits in the service of setting the data use limitation on the limitation setting target data.
Further, a step of selecting a billing price depending on the user may be further provided in the step of billing. The billing price depending on the user may be selected in accordance with the type of the user, the type of the data use limitation to be set, the type of the limitation setting target data, and the like.
As an example, when the price is billed at a metered rate per limitation setting target data, a unit price is discounted if the data use limitation is requested to be set on a large amount of the data use limitation target data at a time. As another example, the billing price is varied depending on whether the limitation setting target data on which the data use limitation is set is used for profit or for nonprofit. As a further example, a student discount is applied to the billing price if the user is a student. As yet another example, billing price information for setting the data use limitation is embedded in the limitation setting target data, and the billing price is calculated based on the billing price information. With this arrangement, it is possible to provide the user with a variety of billing methods.
A data use limitation setting apparatus of the present invention is characterized by including communication means for sending and receiving data to and from a user terminal device; authentication judging means for judging in accordance with user authentication data received from the user terminal device, success or failure of authentication; and data use limitation setting means for, if the authentication judging means judges the success of the authentication, setting on limitation setting target data that is received from the user terminal device, a data use limitation for limiting use of the limitation setting target data, the limitation setting target data corresponding to the user authentication data.
In this arrangement, the user has registered as a member, for example, so as to set the data use limitation on the limitation setting target data. The authentication judging means compares the user authentication data received by the communication means with the user registration information so as to judge success or failure of authentication, namely, whether or not the user who sent the user authentication data has registered as a member, for example.
Further, the data use limitation setting means sets the data use limitation on the limitation setting target data received in the data receiving step, namely, sets the data use limitation on the content data, for example, if the authentication judging means judges the success of the authentication, if the authentication judging means judges that the user who sent the user authentication data is judged to have registered as a member, for example.
As described above, the data use limitation setting means sets the data use limitation on the limitation setting target data sent from the user terminal device, if the success of the authentication is judged in the authentication judging means. Therefore it is not necessary to provide the user terminal device with a device for setting the data use limitation.
Further, the data use limitation on the limitation setting target data is not set at the user terminal device, but set at a data use limitation setting apparatus. Therefore it is possible to widely provide a highly reliable system whose method to set the data use limitation is not easily subjected to unauthorized analysis.
The data use limitation setting apparatus may be arranged so that the limitation setting target data includes creator information for specifying a creator of the limitation setting target data, the data use limitation setting apparatus further including creator information acquiring means for acquiring the creator information from the limitation setting target data; and association judging means for judging whether or not the user authentication data is associated with the creator information, the data use limitation setting means setting the data use limitation only if the association judging means judges that the creator information that is acquired from the limitation setting target data is associated with the user authentication data that is received in accordance with a request to set the data use limitation on the limitation setting target data.
With this arrangement, only if the association judging means judges that the creator information that is acquired from the limitation setting target data is judged to be associated with the user authentication data that is received in accordance with a request to set the data use limitation on the limitation setting target data, the data use limitation setting means sets the data use limitation on the limitation setting target data.
Therefore, in addition to the judgment in accordance with the user authentication data as to success or failure of the authentication, it is judged whether or not the user who requested to set the data use limitation on the limitation setting target data is the creator of the limitation setting target data (content data). With this, it is possible to prevent unauthorized data use limitation from being set in accordance with a request from the user who acquired the use authentication data in an unauthorized manner. For example, it is possible to prevent the alteration of the data use limitation on the limitation setting data, which is intended for unauthorized use of the limitation setting target data (content data), and the like. Further, it is possible to prohibit the data use limitation from being set against the intentions of the creator of the limitation setting target data. This can further increase the reliability of the system which is provided with the data use limitation setting apparatus of the present invention.
A data use limitation setting program of the invention causes a computer to realize each of the means in the foregoing data use limitation setting apparatus.
A recording medium of the present invention is a computer-readable recording medium that contains the foregoing data use limitation setting program.
For a fuller understanding of the nature and advantages of the invention, reference should be made to the ensuing detailed description taken in conjunction with the accompanying drawings.
The following will explain an embodiment of the present invention with reference to
As shown in
The data use limitation setting server 1 is configured as a system for setting a data use limitation on the content data. The data use limitation setting server 1 is provided with a communication control section (communication means) 1, a user authenticating section (authentication judging means) 12, and a data use limitation setting section (data use limitation setting means) 13.
The communication control section 11 performs data transmission and data reception with respect to the user terminal device 2, and receives data sent from the user terminal device 2. The data includes content data, user authentication data, and use limitation setting data. The content data, use limitation setting data, and user authentication data may be transmitted using an e-mail attachment (affix), a HTTP request, and the like. The use limitation setting data may be sent separately from the content data. Alternatively, the use limitation setting data may be embedded in the content data and sent together with the content data.
The user terminal device 2 may be composed of a PC (personal computer), a server, a cellular phone, a PDA (Personal Digital Assistant), or other terminal device having communication function. The data use limitation setting server 1 (communication control section 11) is connected to the user terminal device 2 via the Internet 3, for example. Note that, instead of the communication using the Internet 3, communication using wired line such as a telephone circuit and a LAN cable, or wireless communication such as infrared data communication may be used to connect the data use limitation setting server 1 with the user terminal device 2.
The user authenticating section 12 performs user authentication in accordance with the user authentication data sent from the user terminal device 2, so as to judge whether or not the user is authorized to use the data use limitation setting server 1. The user authentication data may be arranged to include at least a user ID (authentication ID) for specifying the user and a password for identifying the user. The user authentication data may further include data for specifying the user terminal device 2, and the like.
Accordingly, the user authentication is performed by pre-registering a user ID and a password in a database, and by comparing the pre-registered user ID and password with user ID and password that are received as the user authentication data from the user terminal device 2. In order to carry out this processing, the user authenticating section 12 is provided with an authentication database 21 for containing the pre-registered user ID and the password, and an authentication processing section 22 for performing the comparing processing so as to judge whether or not the user is authorized to use the data use limitation setting server 1, as shown in
Note that, the user authentication may be alternatively performed in the following manner. For example, the user terminal device 2 sends a credit card number as the user authentication data, and the user authentication data 22 judges whether or not a credit card corresponding to the credit card number is valid. With this, the authentication processing section 22 judges whether or not the use of the data use limitation setting server 1 is allowed in accordance with the judgment result. In this case, the credit card may be further billed. As an alternative example, the user terminal device 2 may have a unique ID, and the ID of the user terminal device 2 is used as the user authentication data.
In accordance with the use limitation setting data received from the user terminal device 2, the data use limitation setting section 13 sets the data use limitation on the content data that is received from the user terminal device 2, if the user authentication section 12 has judged that the use of the data use limitation setting server 1 is allowed. The content data on which the data use limitation is set by the data use limitation setting section 13 is sent to, for example, the user terminal device 2 by the communication control section 11.
The data use limitation may limit reproduction, transfer, storing, downloading, printing, and editing of the content data, use of the content data for a specific service, a terminal device that can use the content data, or the like. If the data use limitation is set on the content data, the above-mentioned processing, etc., is entirely prohibited on the content data, or even if the processing, etc., can be performed on the content data, some limitation is applied to the processing, etc., in accordance with how the data use limitation is set.
An objective to set the data use limitation is, for example, to prohibit the reproduction, transfer, etc., of the content data, and permit only a billed user to use the content data. Another objective to set the data use limitation is to prohibit the editing of the content data in order to prevent the content data from being altered against the intentions of the creator of the content data.
Note that, if the content data is used as an advertisement to an unbilled user, the data use limitation may be arranged so as not to prohibit the reproduction and transfer of the content data in order to allow the content data to be freely distributed for an advertising purpose. In this case, on the other hand, the content data may be prohibited from being stored in the user terminal device 2.
Alternatively, the use limitation may be set in such a manner that the price of the content data is varied in accordance with whether or not the printing of the content data is permitted, for example. With this, it is possible to provide a variety of services in addition to the protection of the copyrights.
Further, settable types of the data use limitation may be limited depending on the user who requested the processing. For example, the user who is billed a higher price may be allowed to set more types of the data use limitation. Further, settable types of the data use limitation may be modified in accordance with the type, data amount, etc., of the content data.
Further, the data use limitation setting section 13 may be arranged to set the data use limitation on the content data in the following manner. First, the data use limitation setting section 13 analyzes the content data received from the user terminal device 2, and creates possible data use limitation items that can be set on the content data. Next, the possible data use limitation items are sent to the user terminal device 2 via the communication control section 11. The user terminal device 2 then allows the user to select a desired item or items of the data use limitation from the possible data use limitation items. After this, from the user terminal device 2, the data use limitation setting section 13 receives the selected data use limitation item that is selected by the user. The data use limitation setting section 13 then sets the data use limitation on the content data in accordance with the selected data use limitation item. In this case, the use limitation setting data is the selected data use limitation item.
Alternatively, for setting the data use limitation, the data use limitation setting section 13 may use information such as a file extension of the content data so as to determine a data use limitation item to be set on the content data. In this case, the use limitation setting data is the information such as a file extension used for determining the data use limitation item to be set.
Note that, unauthorized analysis of the data use limitation setting section 13 degrades the reliability of the data use limitation. It is thus desirable that the data use limitation setting section 13 is protected with high security.
Further, the arrangement of the data use limitation setting system is not limited to the arrangement that is provided with the data use limitation setting server 1 as shown in
The creator information is a serial ID assigned to each user of the creation tool (creation software) of the content data, for example. The creator information is embedded in the content data when the user creates the content data. The creator information may be embedded as header information of the content data, for example, or may be embedded using an electronic watermark technique. It is desirable to encrypt the creator information so that the creator information is not subjected to unauthorized alteration or unauthorized analysis.
The creator information itself may be used as the user authentication data. In this case, the authentication processing section 22 in the user authenticating section 12 judges whether or not creator information that is pre-stored in the authentication database 21 as the user authentication data is identical to the creator information acquired by the creator information acquiring section 14. Then, the data use limitation setting section 13 sets the data use limitation on the content data only if the pre-stored creator information and the acquired creator information are identical to each other. In
Note that, in a case where the data use limitation setting server 31 is in danger of being used in an unauthorized manner if the creator information is used as the user authentication data, the data use limitation setting server 31 may be arranged as follows. Namely, the authentication database 21 in the user authenticating section 12, for example, is arranged to hold a table showing correspondence between the user authentication data and the creator information. Here, the user limitation setting section 13 sets the data use limitation on the content data if the authentication processing section 22 confirms that the creator information that is acquired by the creator information acquiring section 14 corresponds to the user authentication data, instead of directly using the creator information as the user authentication data.
Further, the data use limitation setting system may be arranged so as to further include a billing section 15 as in the data use limitation setting server 41 shown in
The billing section 15 bills a credit-card number, a bank account, or the like, which are pre-registered by the user, for example. A variety of forms may be appropriately used in the billing. For example, the billing price may not be uniform, but may be varied depending on the number of items or type of the data use limitation that is set on the content data. Alternatively, the billing price may be varied depending on the user, the intended use of the data after the use limitation is set, or the like.
With respect to the foregoing arrangement, the operation of the data use limitation setting system shown in
First, the user terminal device 2 sends user authentication data to the data use limitation setting server 1 (S11) so as to confirm whether or not the user is authorized to use the data use limitation setting server 1. Note that, the user ID and the password, for example, which are pre-registered in the data use limitation setting server 1 are used for comparing with the user authentication data.
In the data use limitation setting server 1, when the communication control section 11 receives the user authentication data from the user terminal device 2 (S21), the authentication processing section 22 in the user authenticating section 12 compares the received user authentication data, namely a user ID and a password, with the user ID and the password that are registered in the authentication database 21 (S22). With this, the authentication processing section 22 judges whether or not the user terminal device 2 is authorized to use the data use limitation setting server 1 (S23).
If the user (creator of the content data) is authorized to use the data use limitation setting server 1 as a result of the judgment of the authentication processing section 22, the communication control section 11 requests the user terminal device 2 to send (A) the animation data as the content data and (B) the use limitation setting data (S24).
In response to this request (S12), the user terminal device 2 sends the animation data and the use limitation setting data to the data use limitation setting server 1 (S13). Here, the animation data may be sent either together with or separately from the use limitation setting data.
Here, the data use limitation setting server 1 receives the content data first, and in accordance with the content data, the data use limitation setting section 13 creates possible (settable) data use limitation items that can be set on the content data. The data use limitation setting server 1 then sends the possible data use limitation items to the user terminal device 2 so as to allow the user terminal device 2 to display the possible data use limitation items.
As an example other than the arrangement using the data use limitation setting screen, the authentication database 21, for example, in the data use limitation setting server 1 may pre-register use limitation setting data corresponding to the user authentication data. In this case, the data use limitation setting server 1 authenticates the user and sets the data use limitation, only by receiving the user authentication data and the content data that are sent from the user terminal device 2.
When receiving the content data and the use limitation setting data from the user terminal device 2 (S25), the data use limitation setting section 13 in the data use limitation setting server 1 modifies the content data in accordance with the use limitation setting data so as to prohibit the content data from being edited. In other words, the use limitation that prohibits editing is set (S26).
After this, the communication control section 11 in the data use limitation setting server 1 sends to the user terminal device 2, the content data on which the use limitation is set (S27). The user terminal device 2 receives the content data (S14).
Note that, it is preferable that all of the data that is sequentially transmitted between the data use limitation setting server 1 and the user terminal device 2 as described above is encrypted for security.
Next, the operation of the data use limitation setting system shown in
First, the user terminal device 2 sends user authentication data to the data use limitation setting server 31 (S31) so as to confirm whether or not the user is authorized to use the data use limitation setting server 31. Here, the serial ID and the password of the creator of the content data, which are pre-registered in the data use limitation setting server 31, are used for comparing with the user authentication data. The serial ID is automatically assigned to the user (creator of the content data) when the tool for creating the content data is distributed to the user.
In the data use limitation setting server 31, when the communication control section 11 receives the user authentication data (creator information) from the user terminal device 2 (S41), the authentication processing section 22 in the user authenticating section 12 compares the received user authentication data (creator information), namely the serial ID and password of the creator of the content data, with user information, namely the pre-registered serial ID and password, which is registered in the authentication database 21 (S42). With this, the authentication processing section 22 judges whether or not the user terminal device 2 is authorized to use the data use limitation setting server 31 (S43).
If the user (creator of the content data) is authorized to use the data use limitation setting server 31 as a result of the judgment of the authentication processing section 22, the communication control section 11 requests the user terminal device 2 to send the content data and the use limitation setting data (S44).
In response to this request (S32), the user terminal device 2 sends the content data and the use limitation setting data to the data use limitation setting server 31 (S33). Here, the content data may be sent either together with or separately from the use limitation setting data. Note that, if the content data is sent separately from the use limitation setting data, the use limitation setting data is created as in the data use limitation setting system shown in
When receiving the content data and the use limitation setting data from the user terminal device 2 (S45), the creator information acquiring section 14 in the data use limitation setting server 31 acquires the creator information, namely the serial ID of the creator of the content data, which is embedded in the content data (S46), and supplies the acquired creator information to the user authenticating section 12.
The user authentication section 12 judges whether or not the serial ID that is supplied from the creator information acquiring section 14 is identical to the serial ID that is used for comparing with the user authentication data (S47). In this case, the serial ID that is used for comparing with the user authentication data is the pre-registered serial ID that is pre-stored, for example, in the authentication database 21 and used in the comparing in S42, or the serial ID that is sent from the user terminal device 2 in S31 and stored, for example, in the authentication database 21.
As a result of the judgment of the user authenticating section 12, if the serial ID supplied from the creator information acquiring section 14 is not identical to the serial ID that is used for comparing with the user authentication data, the processing ends. If the serial ID supplied from the creator information acquiring section 14 is identical to the serial ID that is used for comparing with the user authentication data, on the other hand, the data use limitation setting section 13 modifies the content data in accordance with the use limitation setting data so as to prohibit the content data from being edited. In other words, the use limitation that prohibits editing is set (S48).
After this, the communication control section 11 in the data use limitation setting server 31 sends to the user terminal device 2, the content data on which the use limitation is set (S49). The user terminal device 2 receives the content data (S34).
Next, an arrangement of the data use limitation setting system in which a limitation on the number of uses is set as the data use limitation on the content data will be explained with reference to
The use of the data use limitation setting server 41 in this data use limitation setting system is only an example, and another data use limitation setting server 1 or 31 may be alternatively used in the data use limitation setting system. The stamp service device 51 provides the user with the content data whose number of uses is limited. The stamp service device 51 is provided with a stamp service provider terminal device 53 and a stamp service providing server 54, each of which is composed of a computer, for example. The stamp service provider terminal device 53 sends and receives data to and from (A) the communication control section 11 in the data use limitation setting server 41 and (B) the stamp service providing server 54. The stamp service providing server 54 holds the content data which is to be subjected to stamp service. The content data to be subjected to stamp service is an image, moving images, animation, or music data, for example. The user cellular phone terminal device 52 is an example of the user terminal device 2, and uses services of the data use limitation setting server 41 and the stamp service device 51.
In this example, the stamp service device 51 provides the user cellular phone terminal device 52 with a stamp service that is dedicated for cellular phone. Here, the stamp service is a service for providing affixing content data to the content data. Directly, the stamp service is performed by the stamp service providing server 54 in the stamp service device 51. By affixing the affixing content data to another content data as if affixing an actual stamp, the original content data ceases to exist. Further, the affixing content data once used for the affixing cannot be reused by being separated from the affixed content data.
Further, the content data to which the affixing content data is affixed may be an image, moving images, animation, or music data, for example. Further, the affixing content data provided by the stamp service device 51 may be an image, moving images, animation, or music data, for example. Namely, in this data use limitation setting system, the stamp service device 51 allows the user cellular phone terminal device 52 to download image data, music data, etc., which is the affixing content data to be affixed to the affixed content data such as image data or moving image data.
Further, in the data use limitation setting system, the user of the data use limitation setting server 41 is the stamp service device 51. In other words, the data use limitation setting server 41 sets the data use limitation on the content data that is requested by the stamp service device 51.
Further, the data use limitation setting system uses the user ID, for example, as the user authentication data that is sent from the stamp service provider terminal device 53 to the data use limitation setting server 41. The authentication database 21 in the user authenticating section 12 holds a table showing correspondence between the user authentication data and the creator information. With this, the data use limitation setting section 13 sets the data use limitation on the content data if the authentication processing section 22 confirms that the user authentication data corresponds to the creator information.
The operation of the stamp service device 51 and the data use limitation setting server 41 in this case will be explained with reference to flow charts shown in
First, the stamp service provider terminal device 53 sends a user ID as the user authentication data to the data use limitation setting server 41 (S61) so as to confirm whether or not the stamp service provider terminal device 53 is authorized to use the data use limitation setting server 41. The user ID has been assigned to the stamp service device 51, and pre-registered in the data use limitation setting server 41.
In the data use limitation setting server 41, when the communication control section 11 receives the user authentication data (user ID) from the stamp service provider terminal device 53 (S71), the authentication processing section 22 in the user authenticating section 12 compares the received user authentication data (user ID) with the user ID that is registered in the authentication database 21 (S72). With this, the authentication processing section 22 judges whether or not the stamp service provider terminal device 53 is authorized to use the data use limitation setting server 41 (S73).
If the stamp service provider terminal device 53 is authorized to use the data use limitation setting server 41 as a result of the judgment of the authentication processing section 22, the communication control section 11 requests the stamp service provider terminal device 53 to send the content data and the use limitation setting data (S74).
In response to this request (S62), the stamp service provider terminal device 53 sends the content data and the use limitation setting data to the data use limitation setting server 41 (S63). Here, the content data may be sent either together with or separately from the use limitation setting data. Note that, if the content data is sent separately from the use limitation setting data, the use limitation setting data is created as in the data use limitation setting system shown in
When receiving the content data and the use limitation setting data from the stamp service provider terminal device 53 (S75), the creator information acquiring section 14 in the data use limitation setting server 41 acquires the creator information embedded in the content data, namely a serial ID assigned to the stamp service provider terminal device 53, for example, (S76) and supplies the acquired creator information to the user authenticating section 12.
In accordance with the table showing correspondence between the user authentication data and the creator information, the authentication processing section 22 in the user authenticating section 12 judges whether or not the creator information that is supplied from the creator information acquiring section 14 is identical to the creator information that has been registered in the authentication database 21 and that corresponds to the user ID (S77).
If the received creator information is not identical to the pre-registered creator information as a result of the judgment of the user authenticating section 12, the processing ends. If the received creator information is identical to the pre-registered creator information, on the other hand, the data use limitation setting section 13 sets the data use limitation on the content data in accordance with the use limitation setting data (S78).
Here, if necessary, the billing section 15 performs billing processing on a stamp service provider. Note that, the billing processing can be performed in any processing that sets the data use limitation on the content data.
After this, the communication control section 11 in the data use limitation setting server 41 sends to the stamp service provider terminal device 53, the content data on which the use limitation is set (S79). The stamp service provider terminal device 53 receives the content data (S64).
Then, the stamp service provider sends from the stamp service provider terminal device 53 to the stamp service providing server 54, the content data on which data use limitation is set, thereby providing the user with the stamp service.
The user who uses the stamp service downloads the content data from the stamp service providing server 54, using the user cellular phone terminal device 52. If necessary, the stamp service providing server 54 may performs billing processing on the user cellular phone terminal device 52 for using the stamp service. Further, the user may register as a member on the stamp service providing server 54 so that the registered user can freely download the content data by paying a membership fee.
The user cellular phone terminal device 52 which downloads the content data (affixing content data) from the stamp service providing server 54 permits the user to use the stamp service only once in accordance with the data use limitation that is set on the content data. Further, the reproduction and transfer of the content data are prohibited on the user cellular phone terminal device 52 (cellular phone).
Further, if the user affixes the content data as a stamp to another content data, the user cellular phone terminal device 52 deletes the affixing content data in accordance with the use conditions (the number of uses of the stamp is one) that is set on the content data in accordance with the use limitation setting data. Note that, instead of deleting the affixing content data, the user cellular phone terminal device 52 may rewrite the data use limitation so that the number of uses of the stamp is reduced by one to 0. Further, instead of allowing the user cellular phone terminal device 52 to have the function of rewriting the data use limitation, the user cellular phone terminal device 52 may store data that associates the affixing content data with the number of uses of the stamp, thereby managing the number of uses of the stamp. The affixing content data whose number of uses becomes 0 cannot be used any more.
Next, using the arrangement of
Here, it is assumed that the user terminal device 2 shown in
First, the user terminal device 2 sends user authentication data to the data use limitation setting server 1 (S91). In the data use limitation setting server 1, when the communication control section 11 receives the user authentication data from the user terminal device 2 (S101), the authentication processing section 22 in the user authenticating section 12 compares the received user authentication data with the user authentication data that is registered in the authentication database 21 (S102). In this case, the authentication processing section 22 judges that the user terminal device 2 is authorized to use the data use limitation setting server 1 (S103). With this, the communication control section 11 in the data use limitation setting server 1 requests the user terminal device 2 to send the content data and the use limitation setting data (S104).
In response to this request (S92), the user terminal device 2 sends to the data use limitation setting server 1, (A) the content data whose data use limitation is to be rewritten in an unauthorized manner and (B) the use limitation setting data shown in
When receiving the content data and the use limitation setting data from the user terminal device 2 (S105), the data use limitation setting section 13 in the data use limitation setting server 1 compares the received use limitation setting data with the data use limitation that has been already set on the content data. With this, the data use limitation setting section 13 judges that the received use limitation setting data is an unauthorized use limitation setting data which cancels the use limitation that is currently set on the content data, thereby interrupting the processing (S106).
With the operation as described above, the unauthorized use of the content data can be prevented even if the data use limitation setting server 1 is used in an unauthorized manner.
Next, with reference to a block diagram shown in
In
First, the user terminal device 2 sends user authentication data to the data use limitation setting server 1 (S121) so as to confirm whether or not the user is authorized to use the data use limitation setting server 1.
In the data use limitation setting server 1, when the communication control section 11 receives the user authentication data from the user terminal device 2 (S131), the authentication processing section 22 in the user authenticating section 12 compares the received user authentication data with the user authentication data that is registered in the authentication database 21 (S132). With this, the authentication processing section 22 judges whether or not the user terminal device 2 is authorized to use the data use limitation setting server 1 (S133).
If the user (creator of the content data) is authorized to use the data use limitation setting server 1 as a result of the judgment of the authentication processing section 22, the communication control section 11 requests the user terminal device 2 to send the content data, the use limitation setting data, and destination data indicating the destination of the content data on which the data use limitation has been set (S134).
In response to this request (S122), the user terminal device 2 sends the content data, the use limitation setting data, and the destination data to the data use limitation setting server 1 (S123).
When receiving the content data, the use limitation setting data, and the destination data from the user terminal device 2 (S135), the data use limitation setting section 13 in the data use limitation setting server 1 sets the use limitation that prohibits editing on the content data in accordance with the use limitation setting data (S136). After this, the communication control section 11 sends to the designated terminal device 61 designated by the destination data, the content data on which the use limitation has been set (S137).
With the foregoing operation, the content data on which the data use limitation has been set can be directly sent from the data use limitation setting server 1 to the designated terminal device 61 without going through the user terminal device 2 which requested the processing.
Next,
In the data use limitation setting system, the data use limitation setting server 1 is only an example, and may be another data use limitation setting server 31 or 41. The content providing server 62 holds content data on which the data use limitation has been set so as to provide the content data for the user who uses the content data. In other words, the content providing server 62 is a server which sells and distributes the content data. The content providing server 62 is a television station, a radio station, a content selling company, and the like, which are connected to the data use limitation setting server 1 via the Internet 3, for example.
After the data use limitation is set on the content data, the content data is sent from the data use limitation setting server 1 to the content providing server 62, and then provided to the user of the content data from the content providing server 62. The content data here is sample moving image data, for example, whose usable and reproducible time is limited and whose editing is prohibited. Further, the transfer of the content data from the user terminal device 2 to another user terminal device 2, etc., is not prohibited. With this, the content data is freely exchanged among the users, so that advertising effects are expected.
The operation of the user terminal device 2 and the data use limitation setting server 1 in this case will be explained with reference to flow charts shown in
First, the user terminal device 2 sends user authentication data to the data use limitation setting server 1 (S151) so as to confirm whether or not the user is authorized to use the data use limitation setting server 1.
In the data use limitation setting server 1, when the communication control section 11 receives the user authentication data from the user terminal device 2 (S161), the authentication processing section 22 in the user authenticating section 12 compares the received user authentication data with the user authentication data that is registered in the authentication database 21 (S162). With this, the authentication processing section 22 judges whether or not the user terminal device 2 is authorized to use the data use limitation setting server 1 (S163).
If the user (creator of the content data) is authorized to use the data use limitation setting server 1 as a result of the judgment of the authentication processing section 22, the communication control section 11 requests the user terminal device 2 to send the content data and the use limitation setting data (S164).
In response to this request (S152), the user terminal device 2 sends the content data and the use limitation setting data to the data use limitation setting server 1 (S153).
When receiving the content data and the use limitation setting data from the user terminal device 2 (S165), the data use limitation setting section 13 in the data use limitation setting server 1 sets the data use limitation on the content data in accordance with the use limitation setting data so as to prohibit reproduction and editing of the content data and limit usable and reproducible time of the content data (S166). After this, the communication control section 11 sends to the content providing server 62, the content data on which the data use limitation has been set (S167).
The content data received by the content providing server 62 can be downloaded in such a manner that the user of the content data accesses the content providing server 62 through a terminal device via the Internet, for example. The content data downloaded to the terminal device can be usable (browsable) on the terminal device, for example. In this case, the terminal device holds software for using (browsing) the content data. The software may be downloaded from the content providing server 62 together with the content data, or may be voluntarily downloaded by the user from the content providing server 62, for example. Alternatively, the software may have been distributed to the terminal device of the user from the content providing server 62, etc., in such a case where the user has registered as a member for using the content data, for example.
Further, if the user uses on the terminal device, the content data downloaded form the content providing server 62, the use limitation on the content data may be executed by the software in accordance with the data use limitation that is set on the content data.
Further, in accordance with predetermined agreements, the present data use limitation setting system can appropriately perform billing processing on the user terminal device 2 (creator of the content data) which requested the data use limitation to be set on the content data in processing where the data use limitation is set on the content data by the data use limitation setting server 1, 31, or 41. Likewise, in accordance with predetermined agreements, the present data use limitation setting system can appropriately perform billing processing on the terminal device of the user (user of the content data) which downloaded the content data in processing where the content data is downloaded from the content providing server 62. With this, the data use limitation setting system can properly make profits.
Note that, if the limitation on the number of uses is not set on the content data, for example, the billing price may depend on the number of uses of the content data by the user.
The invention being thus described, it will be obvious that the same may be varied in many ways. Such variations are not to be regarded as a departure from the spirit and scope of the invention, and all such modifications as would be obvious to one skilled in the art are intended to be included within the scope of the following claims.
As described above, according to the data use limitation setting method of the present invention, a data use limitation is set in the data use limitation setting step on the limitation setting target data sent from the user terminal device, if the success of the authentication is judged in the authentication judging step.
Further, according to the data use limitation setting apparatus of the present invention, the data use limitation setting means sets a data use limitation on the limitation setting target data sent from the user terminal device, if the authentication judging means judges the success of the authentication.
With the data use limitation setting method of the present invention and the data use limitation setting apparatus of the present invention, it is not necessary to provide the user terminal device with a device for setting the data use limitation.
Further, the data use limitation on the limitation setting target data is not set at the user terminal device, but set at a data use limitation setting apparatus which communicates with the user terminal device via the Internet, for example, and which performs the foregoing steps.
Therefore it is possible to widely provide a highly reliable system whose method to set the data use limitation is not easily subjected to unauthorized analysis. With this, it is possible to widely provide a highly reliable system whose method to set the data use limitation is not easily subjected to unauthorized analysis.
Number | Date | Country | Kind |
---|---|---|---|
2001-383650 | Dec 2001 | JP | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/JP02/12725 | 12/4/2002 | WO |