摘要:
In order to satisfactorily transmit audio data of various formats through a transmission line, when data having a predetermined data length as a unit is transmitted by a predetermined format between devices connected to a predetermined transmission line, label data indicating a system of transmitted audio data is located at a starting portion of the data having the predetermined data length, sub-label data is located at an interval behind label data if necessary and data accompanying with audio data is located and transmitted, whereby a side which receives this data can easily identify a system of audio data or the like.
摘要:
In order to satisfactorily transmit audio data of various formats through a transmission line, when data having a predetermined data length as a unit is transmitted by a predetermined format between devices connected to a predetermined transmission line, label data indicating a system of transmitted audio data is located at a starting portion of the data having the predetermined data length, sub-label data is located at an interval behind label data if necessary and data accompanying with audio data is located and transmitted, whereby a side which receives this data can easily identify a system of audio data or the like.
摘要:
In order to satisfactorily transmit audio data of various formats through a transmission line, when data having a predetermined data length as a unit is transmitted by a predetermined format between devices connected to a predetermined transmission line, label data indicating a system of transmitted audio data is located at a starting portion of the data having the predetermined data length, sub-label data is located at an interval behind label data if necessary and data accompanying with audio data is located and transmitted, whereby a side which receives this data can easily identify a system of audio data or the like.
摘要:
In order to satisfactorily transmit audio data of various formats through a transmission line, when data having a predetermined data length as a unit is transmitted by a predetermined format between devices connected to a predetermined transmission line, label data indicating a system of transmitted audio data is located at a starting portion of the data having the predetermined data length, sub-label data is located at an interval behind label data if necessary and data accompanying with audio data is located and transmitted, whereby a side which receives this data can easily identify a system of audio data or the like.
摘要:
In order to satisfactorily transmit audio data of various formats through a transmission line, when data having a predetermined data length as a unit is transmitted by a predetermined format between devices connected to a predetermined transmission line, label data indicating a system of transmitted audio data is located at a starting portion of the data having the predetermined data length, sub-label data is located at an interval behind label data if necessary and data accompanying with audio data is located and transmitted, whereby a side which receives this data can easily identify a system of audio data or the like.
摘要:
An information processing apparatus and an information processing method capable of preventing information from being copied illegally. where a hash function and a service key are stored in advance in an EEPROM of a DVD player serving as a source. In an BEPROM of a personal computer (PC) serving as a sink, on the other hand, its ID and a license key are stored beforehand. The DVD player requests the PC to transmit the ID. The DVD player then applies the hash function to data resulting from concatenation of the lID with the service key to generate a license key (=hash (ID ∥service_key)). Subsequently, the DVD player generates a source side common session key and encrypts the session key by using the generated license key. Then, the DVD player transmits the encrypted source side common session key to the PC. The PC decrypts the encrypted source side common session key by using the license key stored in its EEPROM to produce a sink side common session key which has a value equal to that of the source side common session key.
摘要:
An information processing apparatus and an information processing method are capable of preventing information from being copied illegally. To put it in detail, a hash function and a service key are stored in advance in an EEPROM of a DVD player serving as a source. In an EEPROM of a personal computer (PC) serving as a sink, on the other hand, its ID and a license key are stored beforehand. The DVD player requests the PC to transmit the ID. The DVD player then applies the hash function to data resulting from concatenation of the ID with the service key to generate a license key (=hash (ID ∥ service-key)). Subsequently, the DVD player generates a source side common session key and encrypts the session key by using the generated license key. Then, the DVD player transmits the encrypted source side common session key to the PC. The PC decrypts the encrypted source side common session key by using the license key stored in its EEPROM to produce a sink side common session key which has a value equal to that of the source side common session key.
摘要:
An information processing apparatus and an information processing method are capable of preventing information from being copied illegally.To put it in detail, a hash function and a service key are stored in advance in an EEPROM of a DVD player serving as a source. In an EEPROM of a personal computer (PC) serving as a sink, on the other hand, its ID and a license key are stored beforehand. The DVD player requests the PC to transmit the ID. The DVD player then applies the hash function to data resulting from concatenation of the ID with the service key to generate a license key (=hash (ID∥service_key)). Subsequently, the DVD player generates a source side common session key and encrypts the session key by using the generated license key. Then, the DVD player transmits the encrypted source side common session key to the PC. The PC decrypts the encrypted source side common session key by using the license key stored in its EEPROM to produce a sink side common session key which has a value equal to that of the source side common session key.
摘要:
To securely transmit content through remote access via an external network, such as a WAN, while exceeding restrictions of an RTT and a TTL.A way of handling a flag for controlling remote access of content is explicitly defined, and an authentication method is explicitly defined when a content using device performs remote access. Thus, also in remote access, similarly to access of the related art in a household, a copyright protection environment of content based on the DTCP-IP is constructed.
摘要:
Content is transmitted within a range of the user's legitimate use while limiting the number of equipment to which the content is transmitted at the same time.A content using apparatus periodically transmits an exchange key and the corresponding key ID using a command. Only while receiving the key ID at predetermined reception cycles, a content providing apparatus maintains the corresponding exchange key. When not periodically receiving the key ID, the content providing apparatus destroys the corresponding exchange key. After that, when receiving a command including the key ID, the content providing apparatus returns a response including information indicating that the exchange key has become invalid.