Information distribution apparatus and method and information reception method
An information sending device and information sending technology, applied in computer security devices, encoding/decoding devices, image communication, etc., can solve the problem that the sending device 1 cannot communicate with the third receiving device 5
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0030] FIG. 1 shows the structure of an information transmission system including the information transmission device of Embodiment 1. As shown in FIG.
[0031] Referring to FIG. 1, a content transmitting device (information transmitting device) 101 and three receiving devices 103 to 105 are connected to a network 102 conforming to a predetermined transmission protocol. Naturally, the number of receiving devices is not limited to three, and the present invention can also be applied to situations with two, four or more receiving devices.
[0032] The sending device 101 includes a storage device 106 , an encryption / decryption device 108 and a communication device 107 . The number of encryption / decryption devices and the number of communication devices are not limited to one as shown in FIG. 1, but can be arbitrarily determined. Multiple items of content are stored in the storage device 106 in advance.
[0033] The sending device 101 also includes a monitoring circuit 109 . Th...
Embodiment 2
[0038] In Embodiment 1, if the current usage rate P is lower than the reference usage rate Pt, a new content request is accepted and related content is transmitted. The usage rate P may subsequently exceed 100% as a result of accepting new content requests. In this case, the encryption of the content may not be timely, causing the content to be interrupted during transmission. Embodiment 2 proposes a method of preventing the use rate P from exceeding the limit use rate P1 which is a system use limit reference value.
[0039] The method of this embodiment will be described with reference to FIG. 1 and FIG. 3 . Note that the limited usage rate P1 satisfies "reference usage rate Pt≦limited usage rate P1≦100[%]".
[0040] Consider a case where the transmitting device 101 newly receives a content request from the receiving device 104 while performing encrypted communication with the receiving device 103 .
[0041] Referring to FIG. 3, the receiving device 104 transmits a content...
Embodiment 3
[0045] FIG. 4 shows the structure of an information transmission system including the information transmission device of Embodiment 3. Referring to FIG. The information sending device in this embodiment includes a control circuit 110 in addition to the components in the information sending device in Embodiment 1.
[0046] When a content request from any one of the receiving devices 103 to 105 is rejected by the monitoring circuit 109, the control circuit 110 can control the transmission priority of the content currently being transmitted based on the encryption mode of the content currently being transmitted (when the priority is high , the usage rate P and the encryption rate R become higher). Meanwhile, the control circuit 110 can control the transmission priority of the requested content based on the encryption mode of the requested content.
[0047] For example, as shown in Figure 5, the encryption modes of never copy, once copy, move and no longer copy are provided based...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


