Transmission/reception system

A technology for receiving systems and senders, applied in transmission systems, digital transmission systems, user identity/authority verification, etc., and can solve problems such as inability to restrict devices

Inactive Publication Date: 2006-09-20
PANASONIC CORP
View PDF1 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, there is no way to restrict the distribution of content to devices outside of AD

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Transmission/reception system
  • Transmission/reception system
  • Transmission/reception system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0121]

[0122] Fig. 1 shows the outline of AD of the first embodiment.

[0123] The AD includes a server 10, a client 20, a router 30, and a hub 40, and the server 10 and the client 20 are connected in a star shape around the hub 40. It should be noted that other clients than the client 20 may be connected to the hub 40, but are omitted from the drawing. Furthermore, it is assumed that the hub 40 does not perform CRC code error detection.

[0124] The router 30 is the only device in the AD network connected to a network outside the AD (hereinafter also referred to as an external network). The server 10 acquires content from an external network through the router 30 and stores the content in the content storage and distribution unit 11 . When receiving a content distribution request from the client 20, the server 10 first confirms that the client 20 is a device in the AD according to the authentication process, and then distributes the content to the client 20. The distri...

no. 2 example

[0249]

[0250] In the described first embodiment, authentication frames are prevented from passing through router 30 to other networks during the authentication process. This means that the content stored in the server 10 is shared only in one subnet attached to the router 30 . From another point of view, it can be considered that the scope of AD is limited to a subnet.

[0251] However, if the scope of AD is limited to one subnet, there will be problems, for example, users who operate different networks upstairs or downstairs in their home will not be able to use the server stored downstairs in the upstairs device in the content.

[0252] For this purpose, in this embodiment, the MAC addresses of the server and the client are registered in the router in advance, and if a frame for one registered MAC address is received, it is transmitted without error detection using the CRC code the frame. This means that when an authentication frame is sent by the server to the client...

no. 3 example

[0294]

[0295] In the second embodiment, the router registers the MAC addresses of the server and the client in advance, and when receiving a frame for a registered MAC address, transmits the frame without performing an error check using a CRC code . This prevents frames sent by the server to the client via the router from being discarded by the router, even if the router's communication interface does not support the special CRC mode.

[0296] However, with this method, even if an error occurs on the communication path, the router transmits the frame from the server to the router without performing error checking. This is especially problematic in a busy network environment.

[0297] In consideration of this problem, the present embodiment allows special CRC mode error checking in routers by providing communication interfaces in routers that support special CRC modes. This prevents the router from transmitting frames in which errors have occurred. As in the first embodi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A server 10 and a client 20 hold common secret information in respective secret information holding units 13 and 23. A server CRC unit 14 in the server 10 generates a CRC code after adding the secret information to communication data, and transmits the communication data with the CRC code attached. A client CRC unit 24 of the client 20 generates a CRC code after adding the secret information to communication data, and checks whether or not an error has occurred in the communication data on the communication path. Since the client 20 holds the secret information, the client 20 determines that an error has not occurred, and obtains the communication data. On the other hand, a router 30, which does not hold the secret information, is unable to obtain the communication data. This prevents the communication data from being transferred to devices outside an authorized domain.

Description

technical field [0001] The present invention relates to a transmission / reception system, and more particularly, to a technique for preventing unauthorized use of content at the time of content distribution. Background technique [0002] In recent years, home networking has begun to become a reality. In this type of network, devices in the home connected through the network share content. One form of such a home network is where devices such as servers, televisions, and audio equipment are connected in a star around a central hub. Said hub connects to the router, which is the only device in the home that will connect to the outside network. The server stores various contents, obtains the contents from the external network through the hub and the router, and then distributes the contents to the devices in response to the requests from the devices. [0003] However, unlimited sharing of content is unacceptable from the viewpoint of rights protection. Therefore, content that...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L1/00H04L9/08H04L9/30H04L29/06
CPCH04L9/0841H04L63/0442H04L2463/101H04L63/10H04L63/08H04L9/3271H04L2209/60H04L1/00H04L9/30H04L9/32H04L12/22
Inventor 山内弘贵松崎枣太田雄策布田裕一
Owner PANASONIC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products