Abstract:
A log collecting/analyzing system has a log collection terminal device as a client terminal device which collects logs and transmits the collected logs to a log server via a network. The log server receives the transmitted logs and stores the received logs for analysis. According to this configuration, it is possible to obtain useful information, such as information about what play modes are popular in the case of games and so forth, or information about what characters are popular in the case of selecting a character for a game. Therefore, it is possible to make use of the result of log analysis to develop the game.
Abstract:
Methods and apparatus in accordance with the present invention are operable to carry out certain functions including: receiving an encrypted program at a processing apparatus; transmitting at least some identification information related to the processing apparatus over a network to an administrator; receiving an encrypted decryption key at the processing apparatus over the network from the administrator in response to the at least some identification information; decrypting the encrypted decryption key; decrypting the encrypted program using the decryption key; re-encrypting the program using at least some of the identification information; and storing the identification information and the re-encrypted program in a first storage device.
Abstract:
Methods and apparatus in accordance with the present invention are operable to carry out certain functions including: receiving an encrypted program at a processing apparatus; transmitting a machine ID over a network to an administrator; receiving registration data over the network from the administrator in response to the machine ID; transmitting the registration data over the network to a distributor; receiving an encrypted decryption key and an encrypted virtual ID at the processing apparatus over the network from the distributor in response to the registration data; decrypting the encrypted decryption key using the virtual ID, and decrypting the encrypted program using the decryption key; re-encrypting the program using the virtual ID; and storing the encrypted virtual ID and the re-encrypted program in a first storage device.