Identification mode of contents file producer and its program

An authentication method and producer's technology, applied in user identity/authority verification, digital data processing components, preventing unauthorized use of memory, etc., can solve problems such as unrealistic direct communication between content creators and receivers

Inactive Publication Date: 2004-08-04
KDDI CORP
View PDF1 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, in the above-mentioned prior art, communication between the sender and the receiver is necessary to authenticate the other party, and there is a problem that direct communication between the content producer and the receiver is not practical in the content delivery service.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification mode of contents file producer and its program
  • Identification mode of contents file producer and its program
  • Identification mode of contents file producer and its program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Hereinafter, the present invention will be described in detail with reference to the accompanying drawings. FIG. 1 is a schematic system diagram of a service for providing multimedia content files for mobile phones using the present invention.

[0027] The sending side (creating side) of the content file applies a certain hardware key 2 (secret information held only by the producing side) to the content data, such as the music source 1, performs encryption processing 3, and obtains the content file 4. That is, the sending side (creating side) creates the content file 4 with its own content creation tool (including the hardware key 2 and the encryption process 3).

[0028] On the other hand, the receiving side (mobile device side) downloads the content file 4 and temporarily stores it in the file storage unit 11 . The verification unit 12 verifies whether the downloaded content file is created by an authorized authoring tool, and if it is verified that it was created by...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Provided is a method and program for authenticating a contents file producer, which offers a predetermined service at a mobile device side only for the contents file produced with the use of a genuine contents production tool, in a service providing a multimedia contents file for the mobile device (for example, a mobile phone). At a contents production side, encryption processing (3) is executed on contents, for example, a music source (1) using a certain hardware key (2) or secret information, to obtain a contents file (4). At the mobile device side, the contents file (4) is downloaded and is temporarily held in a file storage part (11). An inspection part (12) inspects whether the downloaded contents file has been produced with the use of the proper production tool. If it is authenticated, the contents file (4) is registered in a registration part (13), and is provided to users.

Description

technical field [0001] The present invention relates to an authentication method and its program for content file creators. In the authentication method, in the provision service of multimedia content files for mobile phones, the mobile phone side only provides content files produced by legitimate content creation tools. prescribed service. Background technique [0002] As such prior art, there is a digital signature technology for judging whether or not a transmitted content, such as a contract, has been falsified. In addition, as another prior art, there is a method for authenticating the other party between the receiver and the sender, that is, for verifying the sender's side. This is a query-response method for whether you have the correct secret key. [0003] Figure 8 An outline of the query-response procedure is shown in . Such as Figure 8 As shown in , the receiving side generates a random number, and sends the random number to the sending side (transmitting a cha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06F1/00G09C1/00H04L9/32
Inventor 酒泽茂之高木幸一宫地悟史
Owner KDDI CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products