Copyright protection system, transmitter, receiver, bridge device, copyright protective method, medium, and program

ABSTRACT

In the case that a bridge unit is connected to a network such as an IEEE 1394 bus, the desire of copyright holders for limitation on the number of apparatuses that can receive a signal cannot be met.  
     The invention is characterized by providing at least one reception unit, or more, that receives and utilizes data requiring copyright protection, connected to a network, and by providing a transmission unit  20  for transmitting data requiring copyright protection to a reception unit by utilizing a network, wherein the transmission unit  20  has an authentication means  23  on the transmission side for carrying out authentication for a reception unit and an authentication number counting means  24  for counting the authentication number that is the number of the authentications carried out by the authentication means  23  on the transmission side while the reception unit has an authentication means on the reception side for carrying out authentication for the authentication means on the transmission side and wherein the above authentication number is limited.

TECHNICAL FIELD

[0001] The present invention relates to a copyright protection system, a transmission unit, a reception unit, a bridge unit, a copyright protection method, a medium and a program wherein data requiring copyright protection is transmitted or received while the copyright of the data is protected.

BACKGROUND TECHNOLOGY

[0002] In recent years network technology for making connections between audio visual systems has come into common use. As one of such networks, a serial bus (hereinafter referred to as IEEE 1394 bus) of the IEEE 1394-1995 standard (hereinafter referred to as IEEE 1394) exists. IEEE 1394 is a standard of high speed bus system for carrying out a serial transmission, wherein data can be synchronously transmitted so that a real time transmission of audio visual data, or the like, is possible. This IEEE 1394 has begun to be installed in a variety of digital video and sound apparatuses, such as digital audio visual apparatuses for home use, as an external interface.

[0003] On the other hand, in the case that data requiring copyright protection such as newly released movies or TV programs, music of paid broadcasts is handled, it is necessary to protect the copyright. As an effective method for protecting copyright, there is a method of the encrypting of data requiring copyright protection so as to limit the utilization of the data.

[0004] For example, when video and sound data (hereinafter referred to as AV data) is transmitted utilizing an IEEE 1394 bus, such AV data is encrypted at the time of transmission in the case that copyright protection of the AV data is required. As an example of this, the DTCP (digital transmission content protection) system has become a standard.

[0005] The DTCP system is provided with an authentication function and a key nullification function so that copyright protection is implemented by encrypting and transmitting data requiring copyright protection, such as AV data, while excluding unauthorized apparatuses at the time of data transmission over an IEEE 1394.

[0006] A transmitter for transmitting content data encrypts content data with a content key. This content key is periodically updated by the transmitter. The transmitter encrypts the content key with a key called an exchange key and transmits the content key to a receiver in order to safely pass the updated content key to the receiver.

[0007] The authentication function is required for passing the key for decrypting the encrypted data to only the receiver that has received a DTCP license and a full authentication utilizing public key encryption technology and a limited authentication utilizing common key encryption are used in accordance with copy limitation information (such as “copy once” or “copy never”) added to the data and in accordance with the characteristics of the apparatuses (such as inclusion of a recording function, inclusion of a display function only, whether or not format analysis and decoding are possible within data). An apparatus compatible with the full authentication system has certificate data including a signature added by a licensing organization. At the time of authentication, the certificate data is transmitted and received so that the signature is determined to be correct by utilizing an algorithm of an electronic signature using public key encryption technology. Random numbers are transmitted to each other together with the certificate data and, thereby, an authentication key that is effective only between the two apparatuses wherein authentication is carried out can be produced within the respective apparatuses by using the random numbers from both sides.

[0008] An apparatus compatible with the limited authentication system has common secret information and a processing function. At the time of authentication, challenging random numbers are transmitted. The apparatus that has received the random numbers carries out processing according to a predetermined function and sends back the result. The apparatus, which has transmitted the challenging random numbers, compares the response and the value that is processed within the apparatus and, thereby, confirms that the other apparatus is the authorized apparatus. An authentication key that is effective only between the two apparatuses that carry out the authentication can be produced within the respective apparatuses by using random numbers from both sides.

[0009] When the authorized apparatus can be confirmed through the above described authentication process, the transmitter encrypts the exchange key with the authentication key and transmits the exchange key to the receiver. Thereby, a content key can be gained at the receiver side so that the received encrypted contents can be decrypted and utilized.

[0010] In the following, the IEEE 1394 bus system is described in reference to FIG. 12.

[0011] In FIG. 12, IEEE 1394 bus #1 (50) and IEEE 1394 bus #2 (51) are, respectively, different IEEE 1394 buses and are connected to each other by a bridge unit 52.

[0012] Devices such as device #0 (53) and device #1 (54) are connected to IEEE 1394 bus #1 (50).

[0013] Devices such as device #0 (58) and device #1 (59) are connected to IEEE 1394 bus #2 (51).

[0014] Device #0 (53), device #1 (54), device #0 (58), device #1 (59), and the like, are apparatuses for transmitting or receiving data by utilizing IEEE 1394 bus #1 (50) or IEEE 1394 bus #2 (51) and are, for example, an STB (set top box) or a TV (television).

[0015] In addition, bridge unit 52 is a unit that receives data, which is transmitted from device #2 (55), or the like, connected to IEEE 1394 bus #1 (54), and transmits the data to IEEE 1394 bus #2.

[0016] In the IEEE 1394 standard there is a limitation wherein a maximum of sixty-three devices can be simultaneously connected to one bus. Accordingly, a maximum of sixty-three devices can be simultaneously connected to IEEE 1394 bus #1 (50) and, in addition, a maximum of sixty-three devices can be simultaneously connected to IEEE 1394 bus #2 (51).

[0017] For example, in the example of FIG. 12, seven devices, including bridge unit 52, are connected to IEEE 1394 bus #1 (50) and, therefore, fifty-six additional devices can be connected.

[0018] Device 53 transmits data at a transmission rate of 20 Mbps through a synchronous transmission called an isochronous transmission to channel 1 of IEEE 1394 bus #1 (50). Then, device #1 (54) receives the data that is transferred to channel 1 of IEEE 1394 bus #1 (50).

[0019] In addition, device #4 (56) transmits data at a transmission rate of 40 Mbps to channel 63 of IEEE 1394 bus #1 (50). Then, device #5 (57) receives the data transmitted over channel 63.

[0020] Device #0 (58) transmits data at a transmission rate of 30 Mbps to channel 2 of IEEE 1394 bus #2 (51) in the same manner and device #1 (59) receives the data transmitted to channel 2. In addition, device #3 (61) transmits data at 30 Mbpb to channel 1 and device #4 (62) and device #5 (63) simultaneously receive data transmitted to channel 1.

[0021] On the other hand, device #2 (55) transmits data at a transmission rate of 20 Mbps to channel 0 of IEEE 1394 bus #1 (50). Bridge 52 receives data transmitted to channel 0 of IEEE 1394 bus #1 (50), which is transmitted to channel 0 of IEEE 1394 bus #2. Then, device #2 (60) receives data that is transmitted to channel 0 of IEEE 1394 bus #2 (51).

[0022] Thus, it is possible to transmit data in real time by utilizing an isochronous transmission and the data transmitted by a device can be received in real time by a device connected to a different bus through a bridge unit when the two different IEEE 1394 buses are connected via bridge unit 52.

[0023] Furthermore, copyright holders have a desire for the number of reception apparatuses that can receive a signal from the apparatus that becomes a signal source to be limited at the time when video and sound data (AV data) requiring copyright protection, or the like, is transmitted.

[0024] As described above, there is a limitation wherein a maximum of only sixty-three apparatuses can be simultaneously connected to one IEEE 1394 bus. Accordingly, the number of reception units that can simultaneously receive data transmitted from the apparatus that becomes a signal source is sixty-two at the maximum.

[0025] When different IEEE 1394 buses are connected via a bridge unit as described above, however, it becomes impossible to grasp how many reception apparatuses receive the signal, from the apparatus that becomes a signal source, through the other bus connected to the apparatus that becomes a signal source via bridge unit 52. For example, a case can occur wherein an additional bridge unit is connected to the other bus connected to the apparatus that becomes a signal source via bridge unit 52. When bridge unit 52 is connected to an IEEE 1394 bus in such a manner, there is a risk that a very large number of reception apparatuses may receive the signal transmitted from the apparatus that becomes a signal source. In addition, the same may be said concerning the case of a network, such as USB, in addition to the IEEE 1394 bus.

[0026] That is to say, in the case that a bridge unit is connected to a network, such as the IEEE 1394 bus, there is a risk that a very large number of reception apparatuses may receive a signal requiring copyright protection sent from the apparatus that becomes a signal source so that there is a problem (first problem) wherein the desire of copyright holders to limit the number of apparatuses that can receive the signal cannot be met.

[0027] In addition, in the case that a bridge unit is not connected to an IEEE 1394 bus, the desire of copyright holders cannot be met when six, or more, reception apparatuses are simultaneously connected to the IEEE 1394 bus even in the case wherein the copyright holders desire that only up to five reception apparatuses be able to receive the signal. In addition, this is not limited to the IEEE 1394 bus but, rather, the same can be said concerning a network such as USB.

[0028] That is to say, even in the case that copyright holders desire to designate and limit the number of reception apparatuses that can receive the signal, there is a problem (second problem) wherein the desire cannot be met.

DISCLOSURE OF THE INVENTION

[0029] The present invention is provided by taking the above described first problem into consideration and a purpose thereof is to provide a copyright protection system, a transmission unit, a reception unit, a bridge unit, a copyright protection method, a medium and a program wherein the desire of copyright holders to limit the number of reception apparatuses that can receive the signal requiring copyright protection can be met even in the case that a bridge unit is connected to the network.

[0030] In addition, the present invention is provided taking the above described second problem into consideration and a purpose thereof is to provide a copyright protection system, a transmission unit, a reception unit, a bridge unit, a copyright protection method, a medium and a program wherein the desire of copyright holders to limit the number of reception apparatuses that can receive the signal requiring copyright protection by designating the number of reception apparatuses can be met.

[0031] To solve the above problems, the 1st invention of the present invention (corresponding to claim 1) is a copyright protection system, comprising:

[0032] at least one, or more, reception unit that is connected to a network and that receives and utilizes data requiring copyright protection; and

[0033] a transmission unit of transmitting said data requiring copyright protection to said reception unit by utilizing said network, wherein

[0034] said transmission unit has: an authentication means on the transmission side, of carrying out authentication for said reception unit; and an authentication number counting means of counting the authentication number, that is the number authenticated by said authentication means on the transmission side, and

[0035] said reception unit has an authentication means on the reception side, of carrying out authentication for said authentication means on the transmission side, and wherein

[0036] said authentication number is limited.

[0037] The 2nd invention of the present invention (corresponding to claim 2) is the copyright protection system according to the 1st invention, wherein said authentication number counting means adds said authentication number in the case that said authentication means on the transmission side successfully carries out authentication.

[0038] The 3rd invention of the present invention (corresponding to claim 3) is the copyright protection system according to the 2nd invention, wherein in the case that authentication is successfully carried out for said transmission unit, said reception unit does not, again, carry out an authentication request as long as said successful authentication is not reset due to a predetermined cause.

[0039] The 4th invention of the present invention (corresponding to claim 4) is the copyright protection system according to the 3rd invention, further comprising a bridge unit of connecting said network to another network, wherein the bridge unit is handled in the same manner as said reception unit in said network to which said transmission unit is connected, and wherein said bridge unit can, again, carry out an authentication request.

[0040] The 5th invention of the present invention (corresponding to claim 5) is the copyright protection system according to the 2nd invention, wherein in the case that authentication is successfully carried out for said reception unit, said transmission unit does not accept an authentication request even if the authentication request is carried out, again, by said reception unit as long as said successful authentication is not reset due to a predetermined cause.

[0041] The 6th invention of the present invention (corresponding to claim 6) is the copyright protection system according to the 5th invention, further comprising a bridge unit of connecting said network to another network,

[0042] wherein the bridge unit is handled in the same manner as said reception unit in said network to which said transmission unit is connected, and

[0043] wherein in the case that an authentication request is carried out by said bridge unit said transmission unit accepts the authentication request.

[0044] The 7th invention of the present invention (corresponding to claim 7) is the copyright protection system according to the 2nd invention, wherein in the case that authentication is successfully carried out on said reception unit, said transmission unit carries out authentication, again, for said reception unit and said authentication number counting means does not add said authentication number even if the authentication is successful, as long as said authentication is not reset due to a predetermined cause.

[0045] The 8th invention of the present invention (corresponding to claim 8) is the copyright protection system according to the 7th invention, further comprising a bridge unit of connecting said network to another network,

[0046] wherein the bridge unit is handled in the same manner as said reception unit in said network to which said transmission unit is connected, and

[0047] wherein in the case that authentication is successfully carried out again for said bridge unit said authentication number counting means adds said authentication number.

[0048] The 9th invention of the present invention (corresponding to claim 9) is the copyright protection system according to any of the 3rd to 8th inventions, wherein said authentication means on the transmission side has:

[0049] a registration means of registering information that specifies said reception unit for which authentication is successfully carried out; and

[0050] a redundancy determination means of determining whether or not an authentication request is the authentication request from said reception unit that has already successfully carried out authentication, when the authentication request is carried out by said reception unit, by utilizing the registered information that specifies said reception unit.

[0051] The 10th invention of the present invention (corresponding to claim 10) is the copyright protection system according to any of the 3rd to 8th inventions, wherein the reset of said authentication occurs at the time when an update of a key is carried out.

[0052] The 11th invention of the present invention (corresponding to claim 11) is the copyright protection system according to any of the 3rd to 8th inventions, wherein the reset of said authentication occurs at the time when an update of an exchange key is carried out.

[0053] The 12th invention of the present invention (corresponding to claim 12) is the copyright protection system according to the 10th invention, comprising a bridge unit for connecting said network to another network,

[0054] wherein the bridge unit is handled in the same manner as said reception unit in said network to which said transmission unit is connected, and

[0055] wherein in the case that said transmission unit carries out said update of a key the reset of said authentication is carried out also in said other network.

[0056] The 13th invention of the present invention (corresponding to claim 13) is the copyright protection system according to any of the 3rd to 8th inventions, wherein the reset of said authentication occurs at the time when a bus reset is carried out.

[0057] The 14th invention of the present invention (corresponding to claim 14) is the copyright protection system according to the 13th invention, comprising a bridge unit of connecting said network to another network,

[0058] wherein the bridge unit is handled in the same manner as said reception unit in said network to which said transmission unit is connected, and

[0059] wherein in the case that said bus reset is carried out in said network to which said transmission unit is connected, the reset of said authentication is carried out also in said other network.

[0060] The 15th invention of the resent invention (corresponding to claim 15) is the copyright protection system according to the 1st invention, wherein the limitation in said authentication number indicates that said authentication means on the transmission side does not accept an authentication request from said reception unit in the case that said authentication number becomes a predetermined value, or greater.

[0061] The 16th invention of the present invention (corresponding to claim 16) is the copyright protection system according to the 1st invention, wherein said authentication number counting means subtracts said authentication number in the case that said reception unit that has successfully carried out authentication for said authentication means on the transmission side stops the utilization of said data requiring copyright protection that is sent from said transmission unit.

[0062] The 17th invention of the present invention (corresponding to claim 17) is the copyright protection system according to the 16th invention, comprising a bridge unit of connecting said network to another network,

[0063] wherein the bridge unit is handled in the same manner as said reception unit in said network to which said transmission unit is connected, and

[0064] wherein “said bridge unit stops the utilization of said data requiring copyright protection that is sent from said transmission unit” indicates that all of said reception units connected to said other network stop the utilization of said data requiring copyright protection that is sent from said transmission unit.

[0065] The 18th invention of the present invention (corresponding to claim 18) is the copyright protection system according to the 16th invention, wherein said transmission unit has a registration means of registering information that specifies said reception unit that has successfully carried out authentication for said authentication means on the transmission side, and

[0066] said registration means cancels the registration of the information that specifies the reception unit that has successfully carried out authentication for said authentication means on the transmission side, in the case that said authentication number counting means subtracts said authentication number.

[0067] The 19th invention of the present invention (corresponding to claim 19) is the copyright protection system according to the 16th inveniton, wherein said transmission unit has an examination means of examining whether or not said reception unit has stopped the utilization of said data requiring copyright protection.

[0068] The 20th invention of the present invention (corresponding to claim 20) is the copyright protection system according to the 19th invention, wherein the stoppage of the utilization of said data requiring copyright protection indicates that said reception unit is detached from said network, and

[0069] said examination means periodically examines whether or not said reception unit is detached from said network.

[0070] The 21st invention of the present invention (corresponding to claim 21) is the copyright protection system according to the 20th invention, wherein said examination indicates the periodically examining of the connection number that is the number of said reception units connected to said network and the checking of which of said reception units is detached from said network in the case that said connection number is reduced.

[0071] The 22nd invention of the present invention (corresponding to claim 22) is the copyright protection system according to the 19th invention, wherein said examination means checks if said reception unit has stopped the utilization of said data requiring copyright protection by examining an operational condition of said reception unit and/or an active condition of the connection plugs, and

[0072] said authentication number counting means subtracts said authentication number in the case that, as a result of the examination by said examination means, said reception unit is determined not to utilize said data requiring copyright protection.

[0073] The 23rd invention of the present invention (corresponding to claim 23) is the copyright protection system according to the 20th or 21st invention, wherein said examination means has a correspondence table of allowing information that specifies said reception unit to correspond to the signature of that reception unit

[0074] said examination means determines whether or not authentication has been carried out on said reception unit that is detached from said network by utilizing said correspondence table, and

[0075] said authentication number counting means subtracts said authentication number in the case that said determination result shows that authentication has been carried out for said reception unit that is detached from said network.

[0076] The 24th invention of the present invention (corresponding to claim 24) is the copyright protection system according to the 16th invention, wherein said authentication means on the reception side carries out a decrement authentication request of subtracting said authentication number for said transmission unit in the case that said reception unit stops the utilization of said data requiring copyright protection that is sent from said transmission unit,

[0077] said authentication means on the transmission side carries out said decrement authentication for said authentication means on the reception side, and

[0078] said authentication number counting means subtracts said authentication number when said decrement authentication is successful.

[0079] The 25th invention of the present invention (corresponding to claim 25) is the copyright protection system according to the 24th invention, wherein a command for decrement authentication, that is a command for carrying out said decrement authentication, is prepared separately from the authentication command that is the command for carrying out authentication at the time when said data requiring copyright protection is utilized.

[0080] The 26th invention of the present invention (corresponding to claim 26) is the copyright protection system according to the 24th or 25th invention, wherein said data requiring copyright protection is encrypted and

[0081] said reception unit abandons the key for decoding said data requiring copyright protection when said decrement authentication is successful.

[0082] The 27th invention of the present invention (corresponding to claim 27) is the copyright protection system according to the 24th or 25th invention, wherein said decrement authentication differs from the authentication for utilizing said data requiring copyright protection in at least one, or more, of a signature, an authentication method and an operational equation.

[0083] The 28th invention of the present invention (corresponding to claim 28 is the copyright protection system according to the 18th invention, wherein when the authentication is reset due to the predetermined cause, said authentication number counting means initializes said authentication number while said registration means cancels all the registrations of information that specifies the reception unit which has successfully carried out authentication for said authentication means on the transmission side.

[0084] The 29th invention of the present invention (corresponding to claim 29) is the copyright protection system according to the 2nd invention, further comprising a bridge unit of connecting said network to another network.

[0085] The 30th invention of the present invention (corresponding to claim 30) is the copyright protection system according to the 29th invention, wherein said bridge unit is handled in the same manner as said transmission unit in said other network, and

[0086] in the case that an authentication request is carried out by said reception unit connected to said other network,

[0087] authentication is carried out for said transmission unit connected to said network before authentication is carried out for the reception unit and in the case that the authentication for the transmission unit is successful authentication is carried out for said reception unit.

[0088] The 31st invention of the present invention (corresponding to claim 31) is the copyright protection system according to the 29th invention, wherein, in the case that said authentication number counting means of said bridge unit is subtracted, said bridge unit carries out decrement authentication for said transmission unit connected to said network, in order to subtract said authentication number counted by said authentication number counting means of said transmission unit that is connected to said network.

[0089] The 32nd invention of the present invention (corresponding to claim 32) is the copyright protection system according to the 29th invention, wherein said authentication number counting means of said bridge unit counts the authentication number that is the number of the successful authentications carried out for said reception unit, which is connected to said other network, by said authentication means on the transmission side of said bridge unit.

[0090] The 33rd invention of the present invention (corresponding to claim 33) is the copyright protection system according to the 32nd invention, wherein, in the case that said transmission unit is newly connected to said network, said bridge unit carries out authentication for said newly connected transmission unit in accordance with said authentication number that is counted by said authentication number counting means of said bridge unit.

[0091] The 34th invention of the present invention (corresponding to claim 34) is the copyright protection system according to the 30th invention, wherein said bridge unit has a key counting means of counting a limitation number of a permissions allocated by said transmission unit that is connected to said network,

[0092] said authentication number counting means of said bridge unit counts said authentication number that is the number of successful authentication carried out for said reception unit, which is connected to said other network, by said authentication means on the transmission side of said bridge unit,

[0093] said bridge unit sets the number of successful authentications carried out for said transmission unit, which is connected to said network, as the limitation number of said permissions counted by said key counter,

[0094] in the case that a decrement authentication request is carried out, in order to subtract said authentication number counted by said authentication number counting means of said bridge unit, by said reception unit that is connected to said other network, said bridge unit does not carry out decrement authentication for said transmission unit that is connected to said network but, rather, carries out decrement authentication for the reception unit,

[0095] said authentication number counting means of said bridge unit subtracts said authentication number when said decrement authentication is successful, and

[0096] at the time when an authentication request is newly carried out by said reception unit connected to said other network,

[0097] authentication is carried out for the reception unit in the case that the limitation number of said permissions is smaller than said authentication number that is counted by said authentication number counting means of said bridge unit while authentication is carried out for said transmission unit connected to said network before authentication is carried out for the reception unit in the case that the limitation number of said permissions is not smaller than said authentication number counted by said authentication number counting means of said bridge unit and, then, authentication is carried out for the reception unit in the case that the authentication for said transmission unit is successful.

[0098] The 35th invention of the present invention (corresponding to claim 35) is the copyright protection system according to the 29th inveniton, wherein said bridge unit reencrypts data that is sent from said transmission unit connected to said network and transmits the data to said reception unit connected to said other network,

[0099] said authentication number counting means of said bridge unit counts the authentication number that is the number of successful authentications carried out for said reception unit, which is connected to said other network, by said authentication means on the transmission side of said bridge unit, and

[0100] said bridge unit has a key counting means of counting the limitation number of permissions allocated by said transmission unit connected to said network.

[0101] The 36th invention of the present invention (corresponding to claim 36) is the copyright protection system according to the 35th invention, wherein in the case that an authentication request is carried out by said reception unit that is connected to said other network, in the case that said authentication number counted by said authentication number counting means of said bridge unit and the limitation number of said permissions counted by said key counting means are greater than said authentication number counted by said authentication number counting means of said bridge unit, said bridge unit permits the authentication request.

[0102] The 37th invention of the present invention (corresponding to claim 37) is the copyright protection system according to the 36th invention, wherein the upper limit of the limitation number of permissions counted by said key counting means is in advance given by said transmission unit that is connected to said network.

[0103] The 38th invention of the present invention (corresponding to claim 38) is the copyright protection system according to the 36th invention, wherein said bridge unit carries out authentication for said transmission unit, which is connected to said network and, thereby, the upper limit of the limitation number of permissions counted by said key counting means is added.

[0104] The 39th invention of the present invention (corresponding to claim 39) is the copyright protection system according to the 35th invention, wherein, in the case that an authentication request is carried out by said reception unit connected to said other network, in the case that the limitation number of said permissions counted by said key counting means is not greater than said authentication number counted by said authentication number counting means of said bridge unit, said bridge unit rejects the authentication request.

[0105] The 40th invention of the present invention (corresponding to claim 40) is the copyright protection system according to the 35th invention, wherein, in the case that an authentication request is carried out by said reception unit connected to said other network, in the case that the limitation number of said permissions counted by said key counting means is not greater than said authentication number counted by said authentication number counting means of said bridge unit, said bridge unit calls on said transmission unit connected to said network to add the limitation number of said permissions.

[0106] The 41st invention of the present invention (corresponding to claim 41) is the copyright protection system according to the 35th invention, wherein, in the case that an authentication request is carried out by said reception unit connected to said other network, in the case that the limitation number of said permissions counted by said key counting means is not greater than said authentication number counted by said authentication number counting means of said bridge unit, said bridge unit carries out an authentication request for said transmission unit connected to said network and said key counting means adds the limitation number of said permissions in the case that said authentication is successful.

[0107] The 42nd invention of the present invention (corresponding to claim 42) is the copyright protection system according to the 29th invention, wherein said bridge unit makes a notification of the number of said reception units that is connected to said other network and that carries out an authentication request for said transmission unit connected to said network whenever an authentication request is carried out by said reception unit connected to said other network.

[0108] The 43rd invention of the present invention (corresponding to claim 43) is the copyright protection system according to the 42nd invention, wherein a field for making a notification of said number is provided in an authentication command of said bridge unit to carry out an authentication request for said transmission unit that is connected to said network so that said bridge unit makes a notification of said number by utilizing said field.

[0109] The 44th invention of the present invention (corresponding to claim 44) is the copyright protection system according to the 29th invention, wherein an authentication command of said bridge unit to carry out an authentication request for said transmission unit that is connected to said network is distinguished from an authentication command of said reception unit that does not have a function of said bridge unit and that is connected to said network to carry out an authentication request for said transmission unit connected to said network.

[0110] The 45th invention of the present invention (corresponding to claim 45) is the copyright protection system according to the 44th invention, wherein said distinguishment is carried out by means of the signature attached to said authentication command.

[0111] The 46th invention of the present invention (corresponding to claim 46) is a transmission unit for transmitting data requiring copyright protection, by utilizing a network, to at least one, or more, reception unit which has an authentication means on the reception side for carrying out authentication for a transmission unit, is connected to said network and receives and utilizes said data requiring copyright protection, wherein the transmission unit comprises characterized in having:

[0112] an authentication means on the transmission side for carrying out authentication for said authentication means on the reception side; and

[0113] an authentication number counting means of counting authentication number that is the number of authentications carried out by said authentication means on the transmission side,

[0114] wherein said authentication number is limited.

[0115] The 47th invention of the present invention (corresponding to claim 47) is a reception unit that is connected to a network and that receives and utilizes data requiring copyright protection, wherein the reception unit comprises:

[0116] an authentication means on the reception side of carrying out authentication for an authentication means on the transmission side which is provided in a transmission unit having said authentication means on the transmission side of carrying our authentication for the reception unit and an authentication number counting means of counting authentication number that is the number of the authentications carried out by said authentication means on the transmission side,

[0117] wherein said authentication number is limited.

[0118] The 48th invention of the present invention (corresponding to claim 48) is a bridge unit for transmitting data requiring copyright protection that is transmitted from a transmission unit connected to one said network to a reception unit connected to the other said network, wherein the bridge unit comprises:

[0119] an authentication means on the transmission side for bridge unit that carries out authentication for said reception unit;

[0120] an authentication number counting means of bridge unit that counts the authentication number for bridge unit that is the number of the authentications carried out by said authentication means on the transmission side; and

[0121] an authentication means on the reception side for bridge unit, that carries out authentication for said transmission unit,

[0122] wherein said transmission unit has: an authentication means on the transmission side for carrying out authentication for said reception unit that is connected to said bridge unit or for said network; and an authentication number counting means of counting the authentication number that is the number of the authentications carried out by said authentication means on the transmission side,

[0123] wherein said reception unit has an authentication means on the reception side that carries out authentication for said transmission unit connected to said bridge unit or for said other network, and

[0124] wherein said authentication number counted by said authentication means on the transmission side is limited.

[0125] The 49th invention of the present invention (corresponding to claim 49) is a copyright protection method of transmitting data requiring copy protection from a transmission unit, by utilizing a network, to at least one, or more, reception unit that is connected to said network and that receives and utilizes said data requiring copyright protection, wherein that copyright protection method is characterized in that said transmission unit counts the authentication number that is the number of authentications carried out on said reception unit, and in that

[0126] said authentication number is limited.

[0127] The 50th invention of the present invention (corresponding to claim 50) is a medium that can be processed by a computer and that is a medium holding a program for allowing a computer to function as the entirety, or a part, of:

[0128] the authentication means on the reception side in said reception unit for carrying out authentication for said authentication means on the transmission side;

[0129] the authentication means on the transmission side in said transmission unit for carrying out authentication for said reception unit; and

[0130] the authentication number counting means of counting the authentication number that is the number of authentications carried out by said authentication means on the transmission side,

[0131] in the copyright protection system according to the 1st invention.

[0132] The 51st invention of the present invention (corresponding to claim 51) is a program for allowing a computer to function as the entirety, or a part, of:

[0133] the authentication means on the reception side in said reception unit for carrying out authentication for said authentication means oh the transmission side;

[0134] the authentication means on the transmission side in said transmission unit for carrying out authentication for said reception unit; and

[0135] the authentication number counting means of counting the authentication number that is the number of authentications carried out by said authentication means on the transmission side,

[0136] in the copyright protection system according to the 1st invention.

[0137] Here, another aspect of the first invention is the transmission unit according to the forty-sixth present invention characterized in that the above authentication number counting means adds the above authentication number when the above authentication means on the transmission side successfully carries out authentication. The present invention may be this aspect of the first invention.

[0138] In addition, another aspect of the second invention is the transmission unit according to the forty-sixth present invention characterized in that the above reception unit does not again request authentication as long as the above authentication is not reset due to a predetermined cause in the case that authentication is successfully carried out on the above authentication means on the transmission side. The present invention may be this aspect of the second invention.

[0139] In addition, another aspect of the third invention is the transmission unit according to the above aspect of the second invention characterized by comprising a bridge unit for connecting the above network to another network,

[0140] wherein the bridge unit is handled in the same manner as the above reception unit in the above network to which the transmission unit is connected, and

[0141] wherein the above bridge unit can again request authentication. The present invention may be the above aspect of the third invention.

[0142] In addition, another aspect of the fourth invention is the transmission unit according to the above aspect of the first invention characterized in that the above authentication means on the transmission side does not accept the authentication request even if there is, again, an authentication request from the above reception unit as long as the above authentication is not reset due to a predetermined cause in the case that authentication is successfully carried out on the above reception unit. The present invention may be the above aspect of the fourth invention.

[0143] In addition, another aspect of the fifth invention is the transmission unit according to the above aspect of the fourth invention characterized by comprising a bridge unit for connecting the above network to another network,

[0144] wherein the bridge unit is handled in the same manner as the above reception unit in the above network to which the transmission unit is connected, and

[0145] wherein the above authentication means on the transmission side accepts an authentication request in the case that the authentication request is carried out from the above bridge unit. The present invention may be the above aspect of the fifth invention.

[0146] In addition, another aspect of the sixth invention is the transmission unit according to the above aspect of the first invention characterized in that the above authentication means on the transmission side carries out authentication again on the above reception unit in the case that authentication is successfully carried out on the above reception unit while the above authentication number counting means does not add the above authentication number even if the authentication is successful as long as the above authentication is not reset due to a predetermined cause. The present invention may be the above aspect of the sixth invention.

[0147] In addition, another aspect of the seventh invention is the transmission unit of the above aspect of the sixth invention characterized by comprising a bridge unit for connecting the above network to another network,

[0148] wherein the bridge unit is handled in the same manner as the above reception unit in the above network to which the transmission unit is connected, and

[0149] wherein the above authentication number counting means adds the above authentication number in the case that authentication is, again, carried out successfully on the above bridge unit. The present invention may be the above aspect of the seventh invention.

[0150] In addition, another aspect of the eighth invention is the transmission unit according to any of the above aspects of the second to seventh inventions, characterized by having:

[0151] a registration means of registering information that specifies the above reception unit in the case that the above authentication means on the transmission side successfully carries out authentication for the above reception unit; and

[0152] a redundancy determination means of determining whether or not an authentication request is from the above reception unit, on which the authentication has already been carried out successfully, by utilizing the registered information that specifies the above reception unit when the authentication request is required by the above reception unit. The present invention may be the above aspect of the eighth invention.

[0153] In addition, another aspect of the ninth invention is the transmission unit according to any of the above aspects of the second to seventh inventions characterized in that said reset of authentication occurs at the time when the update of the key is carried out. The present invention may be the above aspect of the ninth invention.

[0154] In addition, another aspect of the tenth invention is the transmission unit of any of the above aspects of the second to seventh inventions characterized in that said reset of authentication occurs at the time when the update of the exchange key is carried out. The present invention is the above aspect of the tenth invention.

[0155] In addition, another aspect of the eleventh invention is the transmission unit of the above aspect of the ninth invention, characterized by comprising a bridge unit for connecting the above network to another network,

[0156] wherein the bridge unit is handled in the same manner as the above reception unit in the above network to which the transmission unit is connected, and

[0157] wherein the above reset of authentication is carried out in the above other network in the case that the above authentication means on the transmission side carries out the above update of the key. The present invention may be the above aspect of the eleventh invention.

[0158] In addition, another aspect of the twelfth invention is the transmission unit according any of the above aspects of the second to seventh inventions, characterized in that the above reset of authentication occurs at the time when a bus reset is carried out. The present invention may be the above aspect of the twelfth invention.

[0159] In addition, another aspect of the thirteenth invention is the transmission unit of the above aspect of the twelfth invention characterized by comprising abridge unit for connecting the above network to another network,

[0160] wherein the bridge unit is handled in the same manner as the above reception unit in the network to which the transmission unit is connected, and

[0161] wherein the above reset of authentication is carried out in the above other network in the case that the above bus reset is carried out in the above network to which the transmission unit is connected. The present invention may be the above aspect of the thirteenth invention.

[0162] In addition, another aspect of the fourteenth intervention is the transmission unit according to the present forty-sixth invention, characterized in that the limitation of the above authentication number indicates that the above authentication means on the transmission side does not accept an authentication request from the above reception unit in the case that the above authentication number becomes a predetermined value, or greater. The present invention may be the above aspect of the fourteenth invention.

[0163] In addition, another aspect of the fifteenth invention is the transmission unit according to the present forty-sixth invention, characterized in that the above authentication number counting means subtracts the above authentication number in the case that the above reception unit that has successfully carried out authentication for said authentication means on the transmission side stops the utilization of the above data requiring copyright protection that is sent from the transmission unit. The present invention may be the other aspect of the fifteenth invention.

[0164] In addition, another aspect of the sixteenth invention is the transmission unit of the above aspect of the fifteenth invention, characterized by comprising a bridge unit for connecting said network to another network,

[0165] wherein the bridge unit is handled in the same manner as said reception unit in said network to which the transmission unit is connected, and

[0166] wherein “the above bridge unit stops the utilization of the above data requiring copyright protection that is sent from the transmission unit” indicates that all of the above reception units connected to the above other network stop the utilization of the above data requiring copyright protection sent from the transmission unit. The present invention maybe the above aspect of the sixteenth invention.

[0167] In addition, another aspect of the seventeenth invention is the transmission unit of the aspect of the fifteenth invention, characterized by comprising a registration means of registering information that specifies the above reception unit that has successfully carried out authentication for the above authentication means on the transmission side,

[0168] wherein the above registration means cancels the registration of the information that specifies the reception unit that has successfully carried out authentication for the above authentication means on the transmission side. The present invention may be the above aspect of the seventeenth invention.

[0169] In addition, another aspect of the eighteenth invention is the transmission unit according to the above aspect of the fifteenth invention, characterized in that the above reception unit is provided with an examination means of examining whether or not the utilization of the above data requiring copyright protection is stopped. The present invention may be the above aspect of the eighteenth invention.

[0170] In addition, another aspect of the nineteenth invention is the transmission unit according to the above aspect of the eighteenth invention, characterized in that to stop the utilization of the above data requiring copyright protection indicates that the above reception unit is detached from the above network, and

[0171] the above examination means periodically examines whether or not said reception unit is detached from the above network. The present invention may be the above aspect of the nineteenth invention.

[0172] In addition, another aspect of the twentieth invention is the transmission unit according to the above aspect of the nineteenth invention, characterized in that the examination in the above indicates the periodic examination of the connection number that is the number of the above reception unit connected to the above network and the checking of which of the above reception units is detached from the above network in the case that the above connection number is reduced. The present invention may be the above aspect of the twentieth invention.

[0173] In addition, another aspect of the twenty-first invention is the transmission unit according to the above aspect of the eighteenth invention, characterized in that the above examination means examines the operation condition of the above reception unit and/or the active condition of the connection plug and, thereby, checks whether or not the above reception unit has stopped the utilization of the above data requiring copyright protection, and

[0174] the above authentication number counting means subtracts the above authentication means in the case that the above reception unit does not utilize the above data requiring copyright protection as a result of the above examination by the examination means. The present invention may be the above aspect of the twenty-first invention.

[0175] In addition, another aspect of the twenty-second invention is the transmission unit according to the above aspect of the nineteenth or twentieth invention, characterized in that the above examination means has a correspondence table that makes information for specifying said reception unit correspond to the signature of this reception unit,

[0176] the above examination means determines whether or not authentication has been carried out on the above reception unit that is detached from the above network by utilizing the above correspondence table, and

[0177] the above authentication number counting means subtracts the above authentication number in the case that the above determination result indicates that authentication has been carried out on the above reception unit that is detached from the above network. The present invention may be the above aspect of the twenty-second invention.

[0178] In addition, another aspect of the twenty-third invention is the transmission unit of the above aspect of the fifteenth invention, characterized in that the above authentication means on the transmission side carries out a decrement authentication request on the above authentication means on the transmission side for subtracting the above authentication number in the case that the above reception unit stops the utilization of the above data requiring copyright protection that is transmitted from the transmission unit,

[0179] the above authentication means on the transmission side carries out the above decrement authentication for the above authentication means on the reception side, and

[0180] the above authentication number counting means subtracts the above authentication number when the above decrement authentication is successful. The present invention may be the above aspect of the twenty-third invention.

[0181] In addition, another aspect of the twenty-fourth invention is the transmission unit according to the above aspect of the twenty-third invention, characterized in that a command for decrement authentication that is a command for carrying out the above decrement authentication is prepared separately from an authentication command that is a command for carrying out authentication at the time of utilization of the above data requiring copyright protection. The present invention may be the above aspect of the twenty-fourth invention.

[0182] In addition, another aspect of the twenty-fifth invention is the transmission unit of the above aspect of the twenty-third or twenty-fourth invention, characterized in that the above data requiring copyright protection is encrypted, and

[0183] the above reception unit abandons the key for decoding the above data requiring copyright protection when the above decrement authentication is successful. The present invention may be the above aspect of the twenty-fifth invention.

[0184] In addition, another aspect of the twenty-sixth invention is the transmission unit according to the above aspect of the twenty-third or twenty-fourth invention, characterized in that the above decrement authentication differs from the authentication for utilizing the above data requiring copyright protection in, at least, one or more of the signature, the authentication method or the operational equation. The present invention may be the above aspect of the twenty-sixth invention.

[0185] In addition, another aspect of the twenty-seventh invention is the transmission unit according to the above aspect of the seventeenth invention, characterized in that the above authentication number counting means initialized the above authentication number and the above registration means cancels all of the registrations of information for specifying a reception unit that has successfully carried out authentication for the above authentication means on the transmission side in the case that authentication is reset due to a predetermined cause. The present invention may be the above aspect of the twenty-seventh invention.

[0186] In addition, another aspect of the twenty-eighth invention is the reception unit according to the present forty-seventh invention, characterized in that the above authentication number counting means adds the above authentication number when the above authentication means on the transmission side successfully carries out authentication. The present invention may be the above aspect of the twenty-eighth invention.

[0187] In addition, another aspect of the twenty-ninth invention is the reception unit according to the above aspect of the twenty-eighth invention, characterized in that the above authentication means on the reception side does not, again, carry out an authentication request as long as the above authentication is not reset due to a predetermined cause in the case that authentication is successfully carried out on the above transmission unit. The present invention may be the above aspect of the twenty-ninth invention.

[0188] In addition, another aspect of the thirtieth invention is the reception unit according to the above aspect of the twenty-ninth invention, characterized by comprising a bridge unit for connecting the above network to another network,

[0189] wherein the bridge unit is handled in the same manner as a reception unit in the above network to which the above transmission unit is connected, and

[0190] wherein the above bridge unit can again carry out an authentication request. The present invention may be the above aspect of the thirtieth invention.

[0191] In addition, another aspect of the thirty-first invention is the reception unit according to the above aspect of the twenty-eighth invention, characterized in that the above transmission unit does not accept an authentication request when the authentication request is again required by the above authentication means on the reception side as long as the above authentication is not reset due to a predetermined cause in the case that authentication is successfully carried out on the above authentication means on the reception side. The present invention may be the above aspect of the thirty-first invention.

[0192] In addition, another aspect of the thirty-second invention is the reception unit according to the above aspect of the thirty-first invention, characterized by being a bridge unit for connecting the above network to another network,

[0193] wherein the bridge unit is handled in the same manner as the reception unit in the above network to which the above transmission unit is connected, and

[0194] wherein the above transmission unit accepts an authentication request in the case that the authentication request is carried out by the above bridge unit. The present invention may be the above aspect of the thirty-second invention.

[0195] In addition, another aspect of the thirty-third invention is the reception unit according to the above aspect of the twenty-eighth invention, characterized in that the above transmission unit carries out authentication, again, on the above authentication means on the reception side in the case that authentication is successfully carried out on the above authentication means on the reception side while the above authentication number counting means does not add the above authentication number, even if the authentication is successful, as long as the above authentication is not reset due to a predetermined cause. The present invention may be the above aspect of the thirty-third invention.

[0196] In addition, another aspect of the thirty-fourth invention is the reception unit according to the above aspect of the thirty third invention, characterized by being a bridge unit for connecting the above network to another network,

[0197] wherein the bridge unit is handled in the same manner as the reception unit in the above network to which the above transmission unit is connected, and

[0198] wherein the above authentication number counting means adds the above authentication number in the case that authentication is again carried out successfully on the above bridge unit. The present invention may be the above aspect of the thirty-fourth invention.

[0199] In addition, another aspect of the thirty-fifth invention is the reception unit according to the any of the above aspects of the twenty-ninth to thirty-fourth inventions, characterized in that the above authentication means on the transmission side has: a registration means of registering information that specifies the above authentication means on the reception side in the case that authentication is successfully carried out for the above authentication means on the reception side; and

[0200] a redundancy determination means of determining whether or not an authentication request is an authentication request from the above authentication means on the reception side for which authentication has already been successfully carried out by utilizing the registered information that specifies the above authentication means on the reception side when an authentication request is carried out by the above authentication means on the reception side. The present invention may be the above aspect of the thirty-fifth invention.

[0201] In addition, another aspect of the thirty-sixth invention is the reception unit according to the any of the above aspects of the twenty-ninth to thirty-fourth inventions, characterized in that the above reset of authentication occurs at the time when the update of the key is carried out. The present invention may be the above aspect of the thirty-sixth invention.

[0202] In addition, another aspect of the thirty-seventh invention is the reception unit according to the any of the above aspects of the twenty-ninth to thirty-fourth inventions, characterized in that the above reset of authentication occurs at the time when the update of the exchange key is carried out. The present invention may be the above aspect of the thirty-seventh invention.

[0203] In addition, another aspect of the thirty-eighth invention is the reception unit according to the above aspect of the thirty sixth invention, characterized by being a bridge unit for connecting the above network to another network,

[0204] wherein the bridge unit is handled in the same manner as a reception unit in the above network to which the above transmission unit is connected, and

[0205] wherein the above reset of authentication is carried out in the above other network in the case that the above transmission unit carries out the above update of the key. The present invention may be the above aspect of the thirty-eighth invention.

[0206] In addition, another aspect of the thirty-ninth invention is the reception unit according to the any of the above aspects of the twenty-ninth to thirty-fourth inventions, characterized in that the above reset of authentication occurs at the time when a bus reset is carried out. The present invention may be the above aspect of the thirty-ninth invention.

[0207] In addition, another aspect of the fortieth invention is the reception unit according to the above aspect of the thirty-ninth invention, characterized by being a bridge unit for connecting the above network to another network,

[0208] wherein the bridge unit is handled in the same manner as a reception unit in the above network to which the above transmission unit is connected, and

[0209] wherein the above reset of authentication is carried out in the above other network in the case that the above bus reset is carried out in the above network to which the transmission unit is connected. The present invention may be the above aspect of the fortieth invention.

[0210] In addition, another aspect of the forty-first invention is the reception unit according to the present forty-seventh invention, characterized in that the above limitation in the authentication number indicates that the above authentication means on the transmission side does not accept an authentication request from the above authentication means on the reception side in the case that the above authentication number becomes a predetermined value, or greater. The present invention may be the above aspect of the forty-first invention.

[0211] In addition, another aspect of the forty-second invention is the reception unit according to present forty-seventh invention, characterized in that the above authentication number counting means subtracts the above authentication number in the case that the above authentication means on the reception side that has successfully carried out authentication for the above authentication means on the transmission side stops the utilization of the above data requiring copyright protection that is transmitted from the above transmission unit. The present invention may be the above aspect of the forty-second invention.

[0212] In addition, another aspect of the forty-third invention is the reception unit according to the above aspect of the forty-second invention, characterized by being a bridge unit for connecting the above network to another network,

[0213] wherein the bridge unit is handled in the same manner as a reception unit in the above network to which the above transmission unit is connected, and

[0214] wherein “the above bridge unit stops the utilization of the above data requiring copyright protection that is transmitted from the above transmission unit” indicates that all of the reception units connected to the above other network stop the utilization the above data requiring copyright protection transmitted from the above transmission unit. The present invention may be the above aspect of the forty-third invention.

[0215] In addition, another aspect of the forty-fourth invention is the reception unit according to the above aspect of the forty-second invention, characterized in that the above transmission unit has a registration means of registering information that specifies the above authentication means on the reception side that has successfully carried out authentication for the above authentication means on the transmission side, and

[0216] the above registration means cancels the registration of the information that specifies the above authentication means on the reception side that has successfully carried out authentication for the above authentication means on the transmission side in the case that the above authentication number counting means subtracts the above authentication number. The present invention may be the above aspect of the forty-fourth invention.

[0217] In addition, another aspect of the forty-fifth invention is the reception unit according to the above aspect of the forty-second invention, characterized in that the above transmission unit has an examination means of examining whether or not the reception unit has stopped the utilization of the above data requiring copyright protection. The present invention may be the above aspect of the forty-fifth invention.

[0218] In addition, another aspect of the forty-sixth invention is the reception unit according to the above aspect of the forty-fifth invention, characterized in that to stop the utilization of the above data requiring copyright protection indicates that the above reception unit is detached from the above network, and

[0219] the above examination means periodically examines whether or not the above reception unit is detached from the above network. The present invention may be the above aspect of the forty-sixth invention.

[0220] In addition, another aspect of the forty seventh invention is the reception unit according to the above aspect of the forty-sixth invention, characterized in that the above examination indicates the periodic examination of the connection number that is the number of reception units connected to the above network and the checking of which reception unit is detached from the above network in the case that the above connection number is reduced. The present invention may be the above aspect of the forty-seventh invention.

[0221] In addition, another aspect of the forty-eighth invention is the reception unit according to the above aspect of the forty-fifth invention, characterized in that the above examination means checks if the reception unit has stopped the utilization of the above data requiring copyright protection by examining the operational condition of the above reception unit and/or the active condition of the connection plug, and

[0222] the above authentication number counting means subtracts the above authentication number in the case that the above reception unit does not utilize the above data requiring copyright protection as a result of the above examination by the examination means. The present invention may be the above aspect of the forty-eighth invention.

[0223] In addition, another aspect of the forty-ninth invention is the reception unit according to the above aspect of the forty-sixth or forty-seventh invention, characterized in that the above examination means has a correspondence table for making information that specifies the reception unit correspond to the signature of this reception unit,

[0224] the above examination means determines whether or not authentication has been carried out on the above reception unit that is detached from the above network by utilizing the above correspondence table, and

[0225] the above authentication number counting means subtracts the above authentication number in the case that the above determination result indicates that authentication has been carried out on the above reception unit that is detached from the above network. The present invention may be the above aspect of the forty-ninth invention.

[0226] In addition, another aspect of the fiftieth invention is the reception unit according to the above aspect of the forty-second invention, characterized in that the above authentication means on the reception side carries out a decrement authentication request on the above transmission unit to subtract the above authentication number in the case that the reception unit stops the utilization of the above data requiring copyright protection that is transmitted from the above transmission unit,

[0227] the above authentication means on the transmission side carries out the above decrement authentication for the above authentication means on the reception side, and

[0228] the above authentication number counting means subtracts the above authentication number in the case that the above decrement authentication is successful. The present invention may be the above aspect of the fiftieth invention.

[0229] In addition, another aspect of the fifty-first invention is the reception unit according to the above aspect of the fiftieth invention, characterized in that a command for decrement authentication that is a command for carrying out the above decrement authentication is prepared separately from an authentication command that is a command for carrying out authentication at the time of the utilization of the above data requiring copyright protection. The present invention may be the above aspect of the fifty-first invention.

[0230] In addition, another aspect of the fifty-second invention is the reception unit according to the above aspect of the fiftieth or fifty-first invention, characterized in that the above data requiring copyright protection is encrypted, and

[0231] the reception unit abandons the key for decoding the above data requiring copyright protection when the above decrement authentication is successful. The present invention may be the above aspect of the fifty-second invention.

[0232] In addition, another aspect of the fifty-third invention is the reception unit according to the above aspect of the fiftieth or fifty-first invention, characterized in that the above decrement authentication differs from the authentication for utilizing the above data requiring copyright protection in, at least, one or more of the signature, the authentication method and the operational equation. The present invention may be the above aspect of the fifty-third invention.

[0233] In addition, another aspect of the fifty-fourth invention is the reception unit according to the above aspect of the forty-fourth invention, characterized in that the above authentication number counting means initializes the above authentication number and the above registration means cancels all of the registrations of information that specify the reception unit that have successfully carried out authentication for the above authentication means on the transmission side in the case that the authentication is reset due to a predetermined cause. The present invention may be the above aspect of the fifty-fourth invention.

[0234] In addition, another aspect of the fifty-fifth invention is the bridge unit according to the present forty-eighth invention, characterized by being handled in the same manner as the above transmission unit in the above other network,

[0235] wherein, in the case that an authentication request is carried out by the above reception unit connected to the above other network, the above authentication means on the reception side for the bridge unit carries out authentication for the above transmission unit that is connected to the above network before the above authentication means on the transmission side for the bridge unit carries out authentication for the reception unit and in the case that the authentication of this transmission unit is successful, the above authentication means on the transmission side for the bridge unit carries out authentication for the above reception unit. The present invention may be the above aspect of the fifty-fifth invention.

[0236] In addition, another aspect of the fifty-sixth invention is the bridge unit according to the present forty-eighth invention, characterized in that the above authentication means on the reception side for the bridge unit carries out decrement authentication for subtracting the above authentication number, which is counted by the above authentication number counting means of the above transmission unit connected to the above network, on the above transmission unit connected to the above network in the case that subtraction is carried out on the above authentication number counting means of the bridge unit. The present invention may be the above aspect of the fifty-sixth invention.

[0237] In addition, another aspect of the fifty-seventh invention is the bridge unit according to the present forty-eighth invention, characterized in that the above authentication number counting means of the bridge unit counts the authentication number that is the number of the successful authentications carried out by the above authentication means on the transmission side for the bridge unit on the above reception unit connected to the above other network. The present invention may be the above aspect of the fifty-seventh invention.

[0238] In addition, another aspect of the fifty-eighth invention is the bridge unit according to the aspect of the fifty-seventh invention, characterized in that the above authentication means on the reception side for the above bridge unit carries out authentication for the above transmission unit that is newly connected according to the number of times the above authentication number that is counted by the above authentication number counting means of the bridge unit in the case that the above transmission unit is newly connected to the above network. The present invention may be the above aspect of the fifty-eighth invention.

[0239] In addition, another aspect of the fifty-ninth invention is the bridge unit according to the above aspect of the fifty-fifth invention, characterized by comprising a key counting means of counting the limitation number of the permissions allocated by the above transmission unit connected to the above network,

[0240] wherein the above authentication number counting means of the bridge unit counts the above authentication number that is the number of successful authentications carried out on the above reception unit connected to the above other network,

[0241] the number of successful authentications that are carried out on the above transmission unit connected to the above network is assumed to be the above limitation number of the permissions counted by the above key counter,

[0242] wherein the above authentication means on the reception side for the bridge unit does not carried out decrement authentication for the above transmission unit that is connected to the above network but, rather, the above authentication means on the transmission side for the bridge unit carries out decrement authentication for the reception unit in the case that a decrement authentication request for subtracting the above authentication number that is counted by the above authentication number counting means of the bridge unit is carried out by the above reception unit connected to the above other network,

[0243] wherein the above authentication number counting means of the bridge unit subtracts the above authentication number when the above decrement authentication is successful,

[0244] wherein the authentication means on the transmission side for the bridge unit carries out authentication for the reception unit in the case that the above limitation number of the permissions is smaller than the above authentication number that is counted by the above authentication number counting means of the bridge unit at the time when an authentication request is newly carried out by the above reception unit connected to the above other network, and

[0245] wherein the above authentication means on the reception side for the bridge unit carries out authentication for the above transmission unit connected to the above network before authentication is carried out on the reception unit in the case that the above limitation number of permissions is not smaller than the above authentication number counted by the above authentication number counting means of the bridge unit and, in the case that the authentication is successful, the above authentication means on the transmission side for the bridge unit carries out authentication for the reception unit. The present invention may be the above aspect of the fifty-ninth invention.

[0246] In addition, another aspect of the sixtieth invention is the bridge unit according to the present forty-eighth invention, wherein the above bridge unit comprises a key counting means of counting the limitation number of the permissions allocated by the above transmission unit that is connected to the above network,

[0247] wherein the data sent from the above transmission unit that is connected to the above network is again encrypted so as to be transmitted to the above reception unit that is connected to the above other network, and

[0248] wherein the above authentication number counting means of the bridge unit counts the authentication number that is the successful number of authentications carried out on the above reception unit that is connected to the above other network by the above authentication means on the transmission side for the bridge unit. The present invention maybe the above aspect of the sixtieth invention.

[0249] In addition, another aspect of the sixty-first invention is the bridge unit according to the above aspect of the sixtieth invention, characterized by permitting an authentication request when the authentication request is carried out by the above reception unit that is connected to the above other network in the case that the above authentication number counted by the above authentication number counting means of the bridge unit and the above limitation number of permissions counted by the above key counting means are greater than the above authentication number counted by the above authentication number counting means of the bridge unit. The present invention may be the above aspect of the sixty-first invention.

[0250] In addition, another aspect of the sixty-second invention is the bridge unit according to the above aspect of the sixty-first invention, characterized in that the upper limit of the limitation number of permissions counted by the above key counting means is given in advance by the above transmission unit that is connected to the above network. The present invention may be the above aspect of the sixty-second invention.

[0251] In addition, another aspect of the sixty-third invention is the bridge unit according to the above aspect of the sixty-first invention, characterized in that the upper limit of the limitation number of permissions counted by the above key counting means is added by the above authentication means on the reception side for the bridge unit carrying out authentication for the above transmission unit that is connected to the above network. The present invention may be the above aspect of the sixty-third invention.

[0252] In addition, another aspect of the sixty-fourth invention is the bridge unit according to the above aspect of the sixtieth invention, characterized in that the above authentication means on the transmission side for the bridge unit rejects an authentication request when the authentication request is carried out by the above reception unit that is connected to the above other network in the case that the above limitation number of permissions counted by the above key counting means is not greater than the above authentication number counted by the above authentication number counting means of the bridge unit. The present invention may be the above aspect of the sixty-fourth invention.

[0253] In addition, another aspect of the sixty-fifth invention is the bridge unit according to the above aspect of the sixtieth invention, characterized in that the above authentication means on the transmission side for the bridge unit calls on the above transmission unit that is connected to the above network to add the above limitation number of permissions when an authentication request is carried out by the above reception unit that is connected to the above other network in the case that the above limitation number of permissions counted by the above key counting means is not greater than the above authentication number counted by the above authentication number counting means of the bridge unit. The present invention may be the above aspect of the sixty-fifth invention.

[0254] In addition, another aspect of the sixty-sixth invention is the bridge unit according to the above aspect of the thirty-fifth invention, characterized in that the above authentication means on the reception side for the bridge unit carries out an authentication request on the above transmission unit that is connected to the above network and in the case that the above authentication is successful, the above key counting means adds the above limitation number of permissions when an authentication request is carried out by the above reception unit connected to the above other network in the case that the above limitation number of permissions counted by the above key counting means is not greater than the above authentication number counted by the above authentication number counting means of the bridge unit. The present invention may be the above aspect of the sixty-sixth invention.

[0255] In addition, another aspect of the sixty-seventh invention is the bridge unit according to the present forty-eighth invention, characterized in that the above authentication means on the reception side for the bridge unit makes a notification of the number of the above reception units that are connected to the above other network and that carry out an authentication request to the above transmission unit that is connected to the above network whenever an authentication request is carried out by the above reception unit connected to the above other network on the above authentication means on the transmission side for the bridge unit. The present invention maybe the above aspect of the sixty-seventh invention.

[0256] In addition, another aspect of the sixty-eighth invention is the bridge unit according to the above aspect of the sixty-seventh invention, characterized in that an authentication command for carrying out an authentication request on the above transmission unit connected to the above network by the above authentication means on the reception side for the bridge unit is provided with a field for making the above notification of the number and the above authentication means on the reception side for the bridge unit makes the above notification of the number by utilizing the above field. The present invention may be the above aspect of the sixty-eighth invention.

[0257] In addition, another aspect of the sixty-ninth invention is the bridge unit according to the present forty-eighth invention, characterized in that an authentication command for carrying out an authentication request on the above transmission unit connected to the above network by the above authentication means on the reception side for the bridge unit is discriminated from an authentication command for carrying out an authentication request on the above transmission unit connected to the above network by the above reception unit that is connected to the above network and does not have a function to the above bridge unit. The present invention may be the above aspect of the sixty-ninth invention.

[0258] In addition, another aspect of the seventieth invention is the bridge unit according to the above aspect of the sixty-ninth invention, characterized in that the above discrimination is carried out by the signature attached to the above authentication command. The present invention may be the above aspect of the seventieth invention.

BRIEF DESCRIPTION OF THE DRAWINGS

[0259]FIG. 1 is a diagram showing the configuration of a copyright protection system according to the first to seventh embodiments of the present invention;

[0260]FIG. 2 is a diagram showing the configuration of an STB according to the first embodiment of the present invention;

[0261]FIG. 3 is a diagram showing the configuration of a TV 30 according to the first, second, seventh and eighth embodiments of the present invention;

[0262]FIG. 4 is a diagram showing examples of authentication numbers counted by an authentication number counting means and device information stored by a device information storage means according to the first embodiment of the present invention;

[0263]FIG. 5 is a diagram showing the configuration of an STB 40 according to the second, seventh and eighth embodiments of the present invention;

[0264]FIG. 6 is a diagram showing examples of authentication numbers counted by an authentication number counting means and device information stored by a device information storage means according to the second embodiment of the present invention;

[0265]FIG. 7 is a diagram showing the configuration of an STB according to the third embodiment of the present invention;

[0266]FIG. 8 is a diagram showing the configuration of a TV according to the third and fourth embodiments of the present invention;

[0267]FIG. 9 is a diagram showing the configuration of an STB according to the fourth embodiment of the present invention;

[0268]FIG. 10 is a diagram showing the configuration of a bridge unit according to the fifth embodiment of the present invention;

[0269]FIG. 11 is a state machine diagram for describing the operation of the bridge unit according to the fifth embodiment of the present invention; and

[0270]FIG. 12 is a diagram showing the configuration of a bus system according to a prior art.

EXPLANATION OF NUMERALS

[0271]1 IEEE 1394 bus #1

[0272]2 IEEE 1394 bus #2

[0273]3 source

[0274]4 sink 0

[0275]5 sink 1

[0276]6 sink 2 (bridge unit)

[0277]7 sink 3

[0278]8 sink 4

[0279]9 sink 5

[0280]20 STB

[0281]21 D-I/F on transmission side

[0282]22 encryption means

[0283]23 authentication means on transmission side

[0284]24 authentication number counting means

[0285]25 upper limit authentication number storage means

[0286]26 count adjustment and determination means

[0287]27 device information storage means

[0288]28 authentication selection means on the transmission side

[0289]29 authentication rule storage means on the transmission side

[0290]30 TV

[0291]31 D-I/F on the reception side

[0292]32 decoding means

[0293]33 authentication request means

[0294]34 authentication means on the reception side

[0295]35 authentication selection means on the reception side

[0296]36 authentication rule storage means on the reception side

PREFERRED EMBODIMENTS FOR CARRYING OUT THE INVENTION

[0297] In the following, the embodiments of the present invention are described in reference to the drawings.

[0298] (First Embodiment)

[0299] First, the first embodiment is herein described.

[0300]FIG. 1 shows a copyright protection system according to the present embodiment.

[0301] In the copyright protection system according to the present embodiment, IEEE 1394 bus #1 (1) and IEEE 1394 bus #2 (2) are connected to each other by means of a sink 2 (bridge unit) (6) while source 3, sink 0 (4), and the like, are connected to IEEE 1394 bus #1 (1). In addition, sink 5 (9), sink 6 (10), and the like, are connected to IEEE 1394 bus #2 (2).

[0302] IEEE 1394 bus #1 (1) and IEEE 1394 bus #2 (2) are, respectively, different IEEE 1394 buses.

[0303] The source 3 is an apparatus for transmitting AV data requiring copyright protection to IEEE 1304 bus #1 (1) and is, for example, an STB (set top box).

[0304] The sink 0 (4), the sink 1 (5), the sink 3 (9) and the sink 4 (8) are connected to IEEE 1394 bus #1 (1) and are apparatuses receiving and utilizing AV data requiring copyright protection transmitted from the source 3 and are, for example, TVs (televisions).

[0305] The sink 5 (9), the sink 6 (10) and the sink 7 (11) are connected to IEEE 1394 bus #2 (2) and are apparatuses receiving and utilizing AV data requiring copyright protection transmitted to IEEE 1394 bus #2 (2) and are, for example, TVs (televisions).

[0306] The bridge unit 6 is a unit for receiving, for reencrypting and, then, for transmitting AV data requiring copyright protection transmitted from the source 3. Since the bridge unit 6 relays the transmission of AV data, the AV data requiring copyright protection transmitted from the source 3 that is connected to IEEE 1394 bus #1 (1) can be received by the sink 5 (9), or the like, connected to IEEE 1394 bus #2 (2).

[0307]FIG. 2 shows the configuration of the source 3. FIG. 2 shows the source 3 as an STB 20.

[0308] The STB 20 is formed of a D-I/F 21 on the transmission side, an encryption means 22, an authentication means 23 on the transmission side, an authentication number counting means 24, an upper limit authentication number storage means 25, a count adjustment and determination means 26 and a device information storage means 27.

[0309] The D-I/F 21 on the transmission side is a digital interface for transmitting the AV data requiring copyright protection to the IEEE 1394 bus #1 (1) as an isochronous packet and for transmitting and receiving a command, or the like, in an asynchronous packet to and from another apparatus connected to IEEE 1394 bus #1 (1).

[0310] The encryption means 22 is a means of encrypting AV data received from a tuner (not shown).

[0311] The authentication means 23 on the transmission side is a means of carrying out authentication for utilizing the apparatuses connected to IEEE 1394 bus #1 (1), such as sink 0 (4), sink 1 (5), and the like, as well as AV data and of carrying out a decrement authentication that is an authentication for stopping the utilization of AV data. The authentication for utilizing this AV data (hereinafter, references to authentication, alone, indicate authentication for utilizing the AV data) and the decrement authentication (hereinafter, the authentication for stopping the utilization of AV data is referred to as decrement authentication) that is an authentication for stopping the utilization of the AV data are carried out according to different authentication rules.

[0312] The authentication number counting means 24 is a means of counting the authentication number that is the number of authentications that have been successfully carried out by the authentication means 23 on the transmission side in accordance with the determination result of the count adjustment and determination means 26.

[0313] The upper limit authentication number storage means 25 is a means of storing the upper limit of the number of apparatuses that can simultaneously receive and utilize AV data requiring copyright protection transmitted by the STB 20.

[0314] The device information storage means 27 is a means of storing device IDs of the apparatuses on which authentication has been successfully carried out by the authentication means 23 on the transmission side. Here, the device IDs are assigned in advance by a key management center and are information for specifying the apparatuses.

[0315] The count adjustment and determination means 26 is a means of determining, in the case that the authentication means 23 on the transmission side has successfully carried out authentication by utilizing a device ID that is stored in the device information storage means 25, whether or not the authentication number counted by the authentication number counting means 24 is increased by checking if the authentication is the duplicated authentication for the same apparatus and for determining whether or not the authentication number counted by the authentication number counting means 24 is decreased in the case that the authentication means 23 on the transmission side has successfully carried out the below described decrement authentication.

[0316] An authentication rule storage means 29 on the transmission side is a means of storing respective authentication rules of the authentication and the decrement authentication carried out by the authentication means 23 on the transmission side.

[0317] An authentication selection means 28 on the transmission side is a means of selecting, at the time when the authentication means 23 on the transmission side carries out authentication, the authentication rule thereof and for selecting, at the time when decrement authentication is carried out, the authentication rule for the decrement authentication thereof.

[0318] The sink 0 (4), the sink 1 (5), the sink 3 (9) and sink 4 (8) respectively have a similar configuration. FIG. 3 shows the configuration of one sink, that is TV 30.

[0319] The TV 30 is formed of a D-I/F 31 on the reception side, a decoding means 32, an authentication request means 33, an authentication means 34 on the reception side, an authentication selection means 35 on the reception side and an authentication rule storage means 36 on the reception side.

[0320] The authentication selection means 35 on the reception side is a digital interface for receiving AV data requiring copyright protection that is transmitted to IEEE 1394 bus #2 (2) as an isochronous packet and for transmitting and receiving a command, or the like, to and from another apparatus connected to IEEE 1394 bus #1 (1) in an asynchronous packet.

[0321] The decoding means 32 is a means of decoding the encryption of the received AV data requiring copyright protection. The AV data decoded by the decoding means 32 to plain text is decoded by a decoder (not shown) and is displayed on a monitor (see the figure).

[0322] The authentication request means 33 is a means of transmitting, to the STB 20, an authentication command (hereinafter referred to as authentication command) for carrying out a request for authentication and an authentication command (hereinafter referred to as command for decrement authentication) for decrement authentication that requests the carrying out of decrement authentication. Different commands are used for the authentication command for carrying out authentication and the authentication command for carrying out decrement authentication.

[0323] The authentication means 34 on the reception side is a means of carrying out authentication and decrement authentication for the authentication means 23 on the transmission side of the STB 20.

[0324] The authentication selection means 35 on the reception side is a means of selecting an authentication rule for authentication at the time when the authentication means 34 on the reception side carries out authentication and for selecting an authentication rule for decrement authentication at the time when authentication means 34 on the reception side carries out decrement authentication.

[0325] The authentication rule storage means 36 on the reception side is a means of storing authentication rules for authentication and authentication rules for decrement authentication.

[0326] Here, IEEE 1394 bus #1 (1) and IEEE 1394 bus #2 (2) of the present embodiment are examples of a network in the present invention, the source 3, that is to say the STB 20, of the present embodiment is an example of a transmission unit of the present invention, the sink 1 (5), that is to say TV 30, of the present embodiment is an example of a reception unit of the present invention, the authentication rule storage means 29 on the transmission side, the authentication means 28 on the transmission side and the authentication means on the transmission side of the present embodiment are examples of an authentication means on the transmission side of the present invention, the upper limit authentication number storage means 25, the authentication number counting means 24 and the count adjustment and determination means 26 of the present embodiment are examples of an authentication number counting means of the present invention, the authentication rule storage means 36 on the reception side, the authentication selection means 35 on the reception side and the authentication means 35 on the reception side of the present embodiment are examples of an authentication means on the reception side of the present invention, the count adjustment and determination means 26 of the present embodiment is an example of a redundancy determination means of the present invention, the device information storage means 27 of the present embodiment is an example of a registration means of the present invention and the decoding of the AV data that has become plain text after being decoded by the decoding means 32 of the present embodiment by the decoder (not shown) and the display thereof on the monitor (see the figure) are examples of the utilization of data requiring copyright protection of the present invention.

[0327] Next, the operation of the present embodiment formed in the above manner is described.

[0328] First, the operation wherein the sink 1 (5) receives the AV data requiring copyright protection transmitted by the source 3 to IEEE 1394 bus #1 and displays this image and sound on the monitor of sink 1 (5) is described.

[0329] The AV data requiring copyright protection is an MPEG transport stream and is received by a tuner, not shown, of the STB 20 that is the source 3. Then, a limitation is assumed to be provided such that a maximum of only three apparatus can simultaneously receive and utilize the AV data requiring copyright protection transmitted by the STB 20 that is the source 3.

[0330] Information showing this limitation is contained within the MPEG transport stream at the time that the AV data is transmitted from a broadcasting station. The STB 20 extracts this information from inside of the MPEG transport stream received by a tuner and the upper limit authentication number storage means 25 sets three as the upper limit authentication number by referring to the extracted information.

[0331] In order for the STB 20 to transmit the AV data received by the tuner to IEEE 1394 bus #1 (1), first, the D-I/F 21 on the transmission side requests a channel utilization right by designating the transmission band to be utilized in the isochronous resource manager of IEEE 1394 bus #1 (1). Then, the channel utilization right is assumed to have been granted by the isochronous resource manager.

[0332] Thus, the encryption means 22 encrypts the AV data requiring copyright protection that is received by the tuner and outputs the result to the D-I/F 21 on the transmission side.

[0333] The D-I/F 21 on the transmission side prepares, from the encrypted AV data, a number of isochronous channels in the header and an isochronous packet to which its own node ID is attached and transmits the prepared isochronous packet to IEEE 1394 bus #1 (1).

[0334] Thus, the STB 20 transmits the AV data requiring copyright protection to IEEE 1394 bus #1 (1).

[0335]FIG. 4 shows how the authentication number counted by the authentication number counting means 24 and the device ID stored in the device information storage means 27 change whenever the apparatus carries out an authentication request. At the present point in time, the STB 20 has not received an authentication request and the authentication number counted by the authentication number counting means 24 is 0 while the device information storage means 27 does not store device ID of any apparatuses.

[0336] On the other hand, in the case that the sink 1 (5) receives and utilizes the AV data transmitted by the source 3, first, an authentication request is carried out on the STB 20, which is the source 3.

[0337] That is to say, the D-I/F 31 on the reception side of the TV 30 that is the sink 1 (5) receives the transmitted isochronous packet and acquires the node ID of the transmission origin from the header information. Then, the authentication request means 30 outputs an authentication command for requesting authentication to the D-I/F 31 on the reception side. A device ID is allocated in advance to the TV 30 from the key management center so that this device ID can specify each apparatus, such as the TV 30, in an exclusive manner. Then, the device ID of the TV 30 is attached to the authentication command outputted by authentication request means 30.

[0338] When receiving an authentication command the D-I/F 30 on the reception side prepares an asynchronous packet wherein the node ID of the transmission origin acquired in advance from the authentication command and the node ID of its own are added to the header and transmits the asynchronous packet to IEEE 1394 bus # (1).

[0339] Then, the authentication means 34 on the reception side indicates the authentication selection means 35 on the reception side to select an authentication rule for authentication and this is received by the authentication selection means 35 on the reception side, which selects the authentication command for authentication from the authentication rule storage means 36 on the reception side.

[0340] The D-I/F 31 on the reception side transmits the authentication command to the STB 20 as an asynchronous packet.

[0341] When receiving an authentication command sent as an asynchronous packet from the D-I/F 31 on the reception side of the TV 30, the D-I/F 21 on the transmission side of the STB 20 outputs the authentication command to the authentication means 23 on the transmission side.

[0342] The authentication means 23 on the transmission side makes a notification of the device ID of the TV 30 to the count adjustment and determination means 26 and makes a request for determination.

[0343] The count adjustment and determination means 26 determines whether or not the device ID received in response to the request from the authentication means 23 on the transmission side has already be stored in the device information storage means 27. Then, referring to the authentication number counted by the authentication number counting means 24 and the upper limit value of the authentication number stored in the upper limit authentication number storage means 25, whether the authentication request from the TV 30 is accepted or rejected is determined in the following manner.

[0344] That is to say, in the case that this authentication number is smaller than the upper limit value of the authentication number the authentication command is determined as being acceptable. In addition, in the case that the received device ID has already been stored in the device information storage means 27 even when this authentication number is equal to the upper limit value, or is the value greater than that, the authentication command is determined to be received. Then, in the case that the authentication number is equal to the upper limit value of the authentication number, or is the value greater than that, and the received device ID is not stored in the device information storage means 27, the authentication command from the TV 30 is determined to be rejected.

[0345] The authentication means 23 on the transmission side determines whether or not authentication is carried out on the authentication means 34 on the reception side according to the above determination result.

[0346] At this point in time, for example, the upper limit number stored by the upper limit authentication number storage means 25 is three and the authentication number counted by the authentication number counting means 24 is zero so that the authentication number is smaller than the upper limit of the authentication number and, therefore, the count adjustment and determination means 26 determines the authentication request to be received and the authentication means 24 on the transmission side carries out authentication for the authentication means 34 on the reception side according to this determination result.

[0347] That is to say, the authentication means 23 on the transmission side directs the authentication selection means 28 on the transmission side to select an authentication rule and, in response to this, the authentication selection means 28 on the transmission side selects an authentication rule for authentication from the authentication rule storage means 29 on the transmission side.

[0348] The authentication means 23 on the transmission side uses the authentication rule for authentication selected by the authentication selection means 28 on the transmission side while the authentication means 34 on the reception side uses the authentication rule for authentication selected by the authentication selection means 34 on the reception side so that authentication is mutually carried out.

[0349] When the TV 30 is found to be an authorized apparatus as a result of the above and the authentication is successful, the authentication means 23 on the transmission side and the authentication means 34 on the reception side exchange keys for encrypting and for decoding AV data. Accordingly, when the authentication is successful, the TV 30 decodes the encryption of the AV data transmitted from the STB 20 with the acquired key so that the image and sound can be displayed on a monitor so as to be viewed and listened to.

[0350] In addition, in the case that the TV 30 is an unauthorized apparatus and the authentication has failed the above described exchange of keys is not carried out. Accordingly, in this case, the TV 30 can not decode the encryption of the AV data transmitted by the STB 20 and, therefore, the image and sound can not be displayed on a monitor so as to be viewed and listened to even in the case the AV data is decoded.

[0351] In such a manner, the AV data requiring copyright protection is encrypted and transmitted so that an unauthorized apparatus can be removed by carrying out authentication.

[0352] In the case that the authentication is successful in such a manner, the authentication means 23 on the transmission side first makes a notification, to the count adjustment and determination means 26, of the successful authentication of the device ID of the TV 30 that is added to the authentication command.

[0353] The count adjustment and determination means 26 checks whether or not the notified device ID of the TV 30 has already been stored in the device information stored by the device information storage means 27 when receiving the notification of the successful authentication.

[0354] Then, in the case that the device ID of the TV 30 has not yet been stored in the device information storage means 27, the device ID of the TV 30 is newly stored in the device information storage means 27.

[0355] Furthermore, in the case that the device ID of the TV 30 is newly stored in the device information storage means 27, the count adjustment and determination means 26 indicates the authentication number counting means 24 to increase the counted authentication number by one. In the case that the device ID of the TV 30 has already been stored in the device information storage means 27, the authentication number counting means 24 is not indicated so as to increase the counted authentication number.

[0356] The authentication number counting means 24 increases the counted authentication number by one in accordance with the indication by the count adjustment and determination means 26.

[0357] Accordingly, the authentication number counting means 24 does not count authentications carried out on the same apparatus repeatedly.

[0358] Furthermore, the authentication means 23 on the transmission side passes the key exchanged at the time of authentication of the authentication means 34 on the reception side to the encryption means 22.

[0359] Afterwards, the encryption means 22 encrypts AV data using the key passed from the authentication means 23 on the transmission side and outputs the result to the D-I/F 21 on the transmission side.

[0360] On the other hand, in the case that the authentication of the STB 20 is successful, the authentication means 34 on the reception side outputs the key exchanged at the time of this authentication to the decoding means 32.

[0361] Afterwards, the decoding means 32 decodes the AV data transmitted from the STB 20 using the key received from the authentication means 34 on the reception side and the decoded AV data that has become plain text is decoded by a decoder, not shown, and is converted into an analog signal so as to be displayed on a monitor.

[0362] The TV 30 that is the sink 1 (5) receives AV data requiring copyright protection that is transmitted from the STB 20, which is the source 3, and displays the data on a monitor.

[0363] That is to say, as shown in FIG. 4, the sink 1 (5) requests authentication, and authentication is carried out on the STB 20, and when a successful result is gained the authentication number counted by the authentication number counting means 24 becomes one so that the device ID of the sink 1 (5) is stored in the device information storage means 27.

[0364] The operation is described in the above wherein the sink 1 (5) receives the AV data requiring copyright protection transmitted to IEEE 1394 bus #1 by the source 3 and the image and sound are displayed on the monitor of sink 1 (5).

[0365] In the same manner as the above described operation, it is assumed that the sink 0 (3) receives the AV data requiring copyright protection that is transmitted to IEEE 1394 bus #1 (1) by the source 3 so that the image and sound can be displayed on the monitor. That is to say, the sink 0 (4) and the source 3 carry out authentication and, as a result, the authentication is successful.

[0366] That is to say, when the authentication means 23 on the transmission side receives an authentication request from the sink 0 (4) at the time of authentication carried out by the sink 0 (4) and the source 3, a request is made to the count adjustment and determination means 26 for a determination of whether or not the authentication request is acceptable.

[0367] The count adjustment and determination means 26 determines to receive the authentication since the authentication number counted by the authentication number counting means 24 is one and the upper limit number stored in the upper limit authentication number storage means 25 is three so that the authentication number is still smaller than the upper limit number.

[0368] Then, the authentication means 23 on the transmission side carries out authentication for the sink 0 (4) in accordance with this determination.

[0369] When the authentication is successful, the count adjustment and determination means 26 checks whether or not the device ID of the sink 0 (4) has already been stored in the device information storage means 27. At this point in time, the device ID stored in the device information storage means 27 is the-device ID of the sink 1 (5) only and, therefore, the device ID of the sink 0 (4) has not yet been stored. Accordingly, the authentication number counting means 24 indicates to increase the counted authentication number by one.

[0370] The authentication number counting means 24 increases the authentication number by one in accordance with the indication from the count adjustment and determination means 26. Accordingly, the authentication number counted by the authentication number counting means 24 becomes two at this point in time.

[0371] Afterwards the sink 0 (4) decodes the AV data transmitted from the source 3 in the same manner as described above so that the image can be displayed on a monitor.

[0372] That is to say, as shown in FIG. 4, the sink 0 (4) carries out an authentication request while the STB 20 and the sink 0 (4) carries out authentication and when they are successful the authentication number counted by the authentication number counting means 24 is increased to two and a sink 1 (5) is added to the device information storage means 27 so that the device IDs of the sink 1 (5) and the sink 0 (4) are stored.

[0373] Here, when the sink 3 (7) carries out an authentication request on the source 3 so that the authentication is successful, the authentication number counted by the authentication number counting means 24 becomes 3 so that the device information storage means 27 stores the device IDs of the sink 0 (4), the sink 1 (5) and the sink 3 (7).

[0374] That is to say, the number of apparatuses that display the AV data transmitted by the source 3 on a monitor is three at this point in time.

[0375] That is to say, as shown in FIG. 4, the sink 3 (7) carries out an authentication request while the STB 20 and the sink 3 (7) carry out authentication and when they are successful, the authentication number counted by the authentication number counting means 24 is increased to three and a sink 3 (7) is added to the device information storage means 27 so that the device IDs of the sink 1 (5), the sink 0 (4) and the sink 3 (7) are stored.

[0376] Here, a sink 4 (8) is assumed to have carried out an authentication request on the source 3 as the fourth apparatus. When receiving an notification that the device ID and authentication of the sink 4 (8) are requested by the authentication means 23 on the transmission side, the count adjustment and determination means 26 determines whether or not the authentication command is accepted in the same manner as in the above. In this case, the device IDs of the sink 0 (4), the sink 1 (5) and the sink 3 (7) are registered with the device information storage means 27 while the device ID of the sink 4 (8) is not registered. Then, the authentication number counted by the authentication number counting means 24 is three while the upper limit number stored by the upper limit authentication number storage means 25 is three.

[0377] Accordingly, the device ID of the sink 4 (8) is not registered with the device information storage means 27 and the authentication number and the upper limit number become equal so that the count adjustment and determination means 26 determines that the authentication command from the sink 4 (8) should be rejected. The authentication means 23 on the transmission side rejects the authentication request from the sink 4 (8) in accordance with this determination and, thereby, this authentication fails.

[0378] Accordingly, the sink 4 (8) can not decode the encryption of the AV data transmitted from the source 3 and can not display the image and sound on a monitor.

[0379] That is to say, as shown in FIG. 4, when the sink 4 (8) carries out an authentication request the STB 20 rejects the authentication request so that the count number counted by the authentication number counting means 24 and the device ID stored by the device information storage means 27 do not change In addition, in the case that an apparatus such as the sink 0 (4) that has already succeeded in authentication carries out an authentication request repeatedly, the device ID of the sink 0 (4) has already been stored in the device information storage means 27 so that the authentication means 24 on the transmission side carries out authentication even though the authentication number counted by the authentication number counting means 24 is not smaller than the upper limit number. Then, even when the authentication is successful the authentication number counting means 24 does not increase the counted authentication number. Here, in the case that a bridge unit such as the sink 2 (bridge unit) (6) carries out an authentication request again, the authentication number counting means 24 increases the counted authentication number as an exception. Then, an authentication request from a bridge unit has a different format as that of an authentication request from an apparatus that is not a bridge unit. A bridge unit, for example, is given a signature that is different from that of an apparatus that is not a bridge unit from the key management center. Accordingly, the source 3 can determine whether or not the apparatus that has carried out an authentication request is a bridge unit from the signature attached to the authentication command.

[0380] That is to say, as shown in FIG. 4, in the case that the sink 0 (4) carries out an authentication request again, the authentication is carried out and, as a result, when the authentication is successful the authentication number 24 counted by the authentication number counting means 24 stays at three while the device IDs stored by the device information storage means 27 stay at those of the sink 1 (5), the sink 0 (4) and the sink 3 (7).

[0381] Thus, the source 3 rejects the authentication request from the sink that has not yet carried out authentication in the case that the authentication number exceeds the upper limit number. Accordingly, the number of the sinks that can receive the AV data transmitted by the source 3 so that the image and sound are displayed on a monitor can be limited to three at a maximum.

[0382] Next, in the case that the sink 1 (5) stops displaying the AV data transmitted from the source 3 on a monitor, the sink 1 (5) makes a notification to the source 3 by carrying out decrement authentication. The operation of this case is described in the following.

[0383] The authentication request means 33 of the TV 30 that is the sink 1 (5) outputs a command for decrement authentication to the D-I/F 31 on the reception side in order to make a notification that it stops displaying the AV data on a monitor.

[0384] This authentication command for decrement is provided separately from the authentication command for authentication that is carried out in advance at the time when AV data is displayed on a monitor. That is to say, an authentication command and an authentication command for decrement differ in the signature, the operational equation and the authentication method.

[0385] The D-I/F 31 on the reception side transmits the authentication command for decrement to the STB 20 that is the source 3 in the same manner as described above.

[0386] The D-I/F 21 on the transmission side outputs an authentication command for decrement to the authentication means 23 on the transmission side when receiving the command.

[0387] Then, the authentication means 23 on the transmission side utilizes an authentication rule for decrement on the transmission side selected by the authentication selection means 28 on the transmission side while the authentication means 34 on the reception side utilizes an authentication rule for decrement on the reception side selected by the authentication selection means 35 on the reception side so as to carry out decrement authentication.

[0388] Then, when the decrement authentication is successful, the authentication means 23 on the transmission side makes a notification that the decrement authentication is successful to the count adjustment and determination means 26.

[0389] The count adjustment and determination means 26 deletes the device ID of the sink 1 (5) stored in the device information storage means 27. Then, it indicates that the authentication number counted by the authentication number counting means 23 is decreased by one. Responding to this, the authentication number counting means 24 decreases the counted authentication number by one.

[0390] On the other hand, when the decrement authentication is successful in the TV 30, the authentication means 34 on the reception side makes a notification that the decrement authentication is successful to the decoding means 32.

[0391] The decoding means 32 deletes the key that decodes the AV data transmitted from the STB 20 in accordance with the notification from the authentication means 34 on the reception side.

[0392] As a result of the decrement authentication, the count number counted by the authentication number counting means 24 becomes two, which is smaller than three that is the upper limit number. In addition, the device ID of the sink 1 (5) is deleted and the two device IDs of the sink 0 (4) and the sink (3) are stored in the device information storage means 27.

[0393] That is to say, as shown in FIG. 4, in the case that the sink 1 (5) requests decrement authentication and the decrement authentication is successful, the authentication number counted by the authentication number counting means 24 is decreased by one so as to become two so that the device ID of the sink 1 (5) is deleted from the device IDs stored in the device information storage means 27 and only the device IDs of the sink 0 (4) and the sink 3 (7) are stored.

[0394] Here, decrement authentication is carried out at the time when the sink 2 (bridge unit) (6) stops the utilization of data requiring copyright protection and, in this case, as described in the fifth embodiment, the sink 2 (bridge unit) (6) carries out decrement authentication for the source 3 according to a plurality of number and in the case that all the apparatuses such as the sink 5 (9) connected to IEEE 1394 bus #2 (2) stop decoding and displaying data requiring copyright protection, the registration of the device ID of the sink 2 (bridge unit) (6) stored in the device information storage means 27 is deleted. That is to say, stoppage of the utilization of data requiring copyright protection from the source 3 by the sink 2 (bridge unit) (6) indicates that all the apparatuses, such as the sink 5 (9) connected to the IEEE 1394 bus #2 (2), have stopped the utilization of the data.

[0395] In the case that the sink 4 (8), or the like, carries out an authentication request at this point in time, the authentication is successful in the case of an authorized apparatus since the authentication number counted by the authentication number counting means 24 is smaller than the upper limit number.

[0396] That is to say, as shown in FIG. 4, when the sink 4 (8) carries out an authentication request, authentication is successfully carried out. Then, as a result, the authentication number counted by the authentication number counting means 24 becomes three and the device IDs of the sink 0 (4), the sink 3 (7) and the sink 4 (8) are stored in the device information storage means 27.

[0397] Thus, the apparatus that has already successfully carried out authentication requests decrement authentication at the time when stopping the utilization of AV data and the STB 20 carries out decrement authentication when receiving a command for decrement authentication so that when this is successful, the device information storage means 27 deletes the device ID of the apparatus that has requested decrement authentication and the authentication number counting means 24 decreases the counted authentication number by one and, therefore, another apparatus can be allowed to newly utilize AV data while maintaining the limitation on the number of apparatuses that can simultaneously utilize AV data. In addition, since an authentication command for decrement is separately provided from an authentication command, an unauthorized apparatus can be prevented from misusing the decrement authentication.

[0398] In addition, in the case wherein any of the apparatuses are removed from IEEE 1394 bus #1 (1) or in the case that an apparatus is newly connected to IEEE 1394 bus #1, a bus reset is carried out. Thus, when a bus reset occurs, a authentication number counted by the authentication number counting means 24 is initialized to zero and, in addition, the device IDs stored by the device information storage means 27 are all deleted. Then, the decoding means 32 of the TV 30 discards the key for decoding the utilized AV data. In the case that a bus reset has occurred in such a manner, the operation is repeated from the initial condition.

[0399] Here, though in the present embodiment, an authentication command and an authentication command for decrement are described as being different in the signature, the optimal equation and the authentication method, the invention is not limited to this. The authentication command and the authentication command for decrement may differ at least any one, or more, of the signature, the optimal equation and the authentication method.

[0400] Furthermore, though in the present embodiment a case is described wherein the number of apparatuses connected to IEEE 1394 bus # (1) is six, the invention is not limited to this but, rather, an arbitrary number, of 63 or less, such as three, 10 or 63, of apparatuses may be connected.

[0401] Furthermore, though in the present embodiment after a successful authentication is carried out on an apparatus such as the sink 1 (5), other than the bridge unit, the source 3 carries out authentication again on an apparatus such as the sink 1 (5) that has undergone a successful authentication before the authentication is reset due to a predetermined cause and even if the authentication is successful, the authentication number counting means 24 does not increase the counted authentication number and the source 3 carries out authentication again on the sink 2 (bridge unit) (6) that has undergone a successful authentication after successfully carrying out authentication for the sink 2 (bridge unit) (6), etc. before the authentication is reset due to a predetermined cause and in the case that the authentication is successful, the authentication number counting means 24 is described as increasing the counted authentication number, the invention is not limited to this. After authentication is successfully carried out on an apparatus such as the sink 1 (5), other than the bridge unit, the source rejects the authentication request when the source 3 again receives an authentication request from the apparatus, such as the sink 1 (5), that has successfully carried out authentication before the authentication is reset due to a predetermined cause. Here, in the case that the source 3 again receives an authentication request from the sink 2 (bridge unit) (6) after authentication is successfully carried out on the sink 2 (bridge unit) (6) and before the authentication is reset due to a predetermined cause, the source 3 receives this authentication request. Then, in the case that the source 3 successfully carries out authentication again on the sink 2 (bridge unit) (6), the authentication number counting means 24 may increase the counted authentication number.

[0402] (Second Embodiment)

[0403] Next, the second embodiment is described.

[0404] A copyright protection system of the present embodiment is shown in FIG. 1 in the same manner as of the first embodiment.

[0405]FIG. 5 shows a source 3 of the present embodiment as an STB 40. The difference from the STB 20 of the first embodiment is the point that the STB 40 is provided with a determination means 41 instead of the count adjustment and determination means 26.

[0406] The determination means 41 differs from the count adjustment and determination means 26 described in the first embodiment and does not carry out a determination of whether or not an authentication request is a repeated authentication.

[0407] In addition, a sink 0 (4), a sink 1 (5), and the like, do not arbitrarily carry out an authentication request again, unlike in the first embodiment. That is to say, the apparatuses, such as the sink 0 (4) and the sink 1 (5), connected to IEEE 1394 bus #1 (1) do not carry out a repeated authentication request until the source 3 updates the key or a bus reset occurs at IEEE 1394 bus #1 (1). The parts other than the above are the same as of the first embodiment.

[0408] Here, the source 3 of the present embodiment, that is to say, the STB 40, is an example of a transmission unit of the present invention and the upper limit authentication number storage means 25, the authentication number counting means 24 and the determination means 41 of the present embodiment are examples of authentication number counting means of the present invention.

[0409] Next, the operation of the present embodiment having such a configuration is described focusing on the difference from the first embodiment.

[0410] The upper limit authentication number storage means 25 of the STB 40 as the source 3 is assumed to store 3 in the same manner as in the first embodiment. That is to say, the AV data requiring copyright protection transmitted by the STB 40 can be displayed on a monitor so as to be viewed and listened to by means of a maximum of three apparatuses at the same time.

[0411] In the case that an authentication request from any apparatus, such as the sink 1 (5), has not yet been received, the authentication number counted by the authentication number counting means 24 of the STB 40 as the source 3 is zero and the device information storage means 27 does not store the device ID of any apparatus as shown in FIG. 6.

[0412] Here, when the sink 1 (5) carries out an authentication request, authentication is successfully carried out in the same manner as in the first embodiment. As a result, as shown in FIG. 6, the authentication number counted by the authentication number counting means 24 becomes one and the device information storage means 27 stores the device ID of the sink 1 (5).

[0413] Furthermore, when the sink 0 (4) carries out an authentication request, authentication is successfully carried out in the same manner as in the first embodiment. As a result, as shown in FIG. 6, the authentication number counted by the authentication number counting means 24 becomes two and the device information storage means 27 stores the device IDs of the sink 1 (5) and of the sink 0 (4).

[0414] Furthermore, when the sink 3 (7) carries out an authentication request, authentication is successfully carried out in the same manner as in the first embodiment. As a result, as shown in FIG. 6, the authentication number becomes three and the stored device IDs become of the sink 1 (5), of the sink 0 (4) and of the sink 3 (7).

[0415] Furthermore, when the sink 4 (8) carries out an authentication request, the upper limit number stored by the upper limit authentication number storage means 25 and the authentication number counted by the authentication number counting means 24 are equal, so that the authentication request is rejected in the same manner as in the first embodiment. As a result, the authentication number stays at three as shown in FIG. 6 and the stored device IDs, of the sink 1 (5), the sink 0 (4) and the sink 3 (7) do not change.

[0416] Next, though in the first embodiment the sink 0 (4) carried out an authentication request again, the authentication request means 33 of the TV 30 as the sink 1 (5) of the present embodiment does not arbitrarily carry out an authentication request again. That is to say, a repeated authentication request is not carried out until the STB 40 updates the key or a bus reset occurs in IEEE 1394 bus #1 (1) and, thereby, the authentication is reset.

[0417] Accordingly, in the case that an authentication request is carried out, the determination means 41 does not carry out a determination of whether or not the authentication request is carried out by the same apparatus.

[0418] Afterwards, the sink 1 (5) requests decrement authentication and, after that, the sink 4 (8) carries out an authentication request, wherein the operation thereof is the same as in the first embodiment, as shown in FIG. 16, of which the descriptions are omitted.

[0419] Here, a bridge unit such as the sink 2 (bridge unit) (6) can carries out an authentication request again on the source 3 by the time when the STB 40 updates the key or a bus reset is carried out in IEEE 1394 bus #1 (1) and, thereby, authentication is reset. Then, in the case that an authentication request is again carried out by the sink 2 (bridge unit) (6) and the authentication is successfully carried out, the authentication number counting means 24 increases the counted authentication number.

[0420] Moreover, the STB 40 updates the key for encrypting the AV data to another key whenever a predetermined time elapses. At this time, authentication is reset. That is to say, AV data is encrypted using another key instead of the key that has encrypted the AV data until now.

[0421] In addition, the STB 40 initializes the authentication number counted by the authentication number counting means 24 to zero and deletes the device ID stored in the device information storage means 27 in the case that the update to another key is carried out as described above.

[0422] That is to say, the STB 40 returns to the same condition as the initial condition wherein authentication is not carried out on any apparatus.

[0423] Then, when the STB 40 updates the key, the decoding means 32 of the TV 30 can not decode AV data using the key that has been used until now.

[0424] Therefore, the authentication request means 33 of the TV 30 carries out an authentication request again after confirming that the STB 40 has updated the key.

[0425] Furthermore, in the case that the STB 40 and the TV 30 have successfully carried out authentication, the authentication means 23 on the transmission side passes, to the authentication means 34 on the reception side, the key that becomes effective after the update of the key carried out following this update of the key, too.

[0426] Accordingly, even when an authentication request is carried out after the STB 40 updates the key, the decoding means 32 has already gained the key that becomes effective at the time when the STB 40 exchanges the keys and, therefore, decoding of the AV data can be sequentially carried out.

[0427] In addition, in the case that a bus reset occurs in IEEE 1394 bus #1 (1) authentication is reset. That is to say, the authentication number counted by the authentication number counting means 24 is initialized to zero and the device ID stored in the device information storage means 27 is deleted.

[0428] That is to say, the STB 40 returns to the same condition as the initial condition wherein authentication is not carried out on any apparatus. In this case also, the authentication request means 33 of the TV 30 carries out an authentication request again after confirming that the STB 40 has updated the key in the same manner as in the above.

[0429] Thus, an apparatus, such as the sink 1 (5), is made not to arbitrarily carry out an authentication request again and, thereby, the number of apparatuses that can display AV data requiring copyright protection on a monitor can be limited in the same manner as in the first embodiment.

[0430] (Third Embodiment)

[0431] Next, the third embodiment is described.

[0432] A copyright protection system of the present embodiment is shown in FIG. 1 in the same manner as in the first embodiment.

[0433]FIG. 7 shows a source 3 of the present embodiment as an STB 42. The STB 42 of the present embodiment does not, unlike the STB 20 of the first embodiment, carry out decrement authentication but, instead, the STB 42 periodically examines whether or not the sink 1 (5), or the like, has stopped decoding AV data or displaying the AV data on a monitor. That is to say, the STB 42 of the present embodiment is provided with an examination means 43 and a correspondence table storage means 50 unlike the STB 20 of the first embodiment and, in addition, is not provided with an authentication rule storage means 29 nor an authentication selection means 28 on the transmission side.

[0434] The examination means 43 is a means of periodically examining whether or not the sink 1 (5), or the like, has stopped decoding AV data or displaying AV data on a monitor.

[0435] The correspondence table storage means 50 is a means of storing a correspondence table wherein the node unique ID that is information for exclusively specifying an apparatus in the IEEE 1394 standard and the device ID that is information exclusively specifying an apparatus, which is allocated as a portion of the signature from the key management center, are made to correspond to each other.

[0436] In addition, FIG. 8 shows the sink 1 (5), or the like, of the present embodiment as TV 44.

[0437] The TV 44 of the present embodiment does not request decrement authentication, unlike the TV 30 of the first embodiment, in the case that decoding and display on a monitor of AV data are stopped. That is to say, the TV 44 is not provided with the authentication rule storage means 36 on the reception side nor the authentication selection means 35 on the reception side.

[0438] The parts other than the above are the same as in the first embodiment.

[0439] Here, the source 3 of the present embodiment, that is to say, the STB 42, is an example of a transmission unit of the present-invention, the sink 1 (5) of the present embodiment, that is to say, the TV 44, is an example of a reception unit of the present invention and the examination means 43, the count adjustment and determination means 26 of the present embodiment, the correspondence table storage means 50 and the device information storage means 27 are examples of examination means of the present invention.

[0440] Next, the operation of the present embodiment having such a configuration is described focusing on the difference from the first embodiment.

[0441] As shown in FIG. 4, a sink 1 (5), a sink 0 (4), a sink 3 (7) and sink 0 (4) carry out an authentication request in the order of this in the same manner as in the first embodiment and, as a result, the authentication number counted by the authentication number counting means 24 as the source 3 is assumed to be three while the device information storage means 27 is assumed to store the device IDs of the sink 1 (5), the sink 0 (4) and the sink 3 (7). Here, the STB 42 is not provided with the authentication selection means 29 on the transmission side nor the authentication rule storage means 28 on the transmission side and, therefore, the STB 42 does not select an authentication rule at the time when authentication is carried out on the TV 44. The TV 44 does not select an authentication rule in the same manner.

[0442] The TV 44 as the sink 1 (5) displays the image and sound of the AV data transmitted from the STB 42 as the source 3 on a monitor.

[0443] The examination means 43 periodically examines the conditions of plugs of every apparatus, such as the sink 0 (4) or the sink 1 (5), connected to IEEE 1394 bus #1 (1).

[0444] Here, the plugs are standardized according to IEC 61883, which is the standard for transmitting data of AV apparatuses using the IEEE 1394 bus and for carrying out apparatus control, and are used conceptually for managing logical connections among apparatuses connected to IEEE 1394 buses. In the following, the plugs are briefly described.

[0445] There are two types of plugs, input plugs and output plugs. That is to say, in the case that an apparatus has a function of inputting AV data from IEEE 1394 bus, the apparatus has input plugs according to the same number as the number of pieces of AV data that can be imputed at the same time, that is to say, the same number of isochronous channels that can be inputted at the same time while in the case that an apparatus has a function of outputting AV data to IEEE 1394 bus, the apparatus has output plugs according to the same number as the pieces of AV data that can be outputted at the same time, that is to say, the same number of isochronous channels that can be outputted at the same time.

[0446] Then, each apparatus has one iPCR (input plug control register) for maintaining the condition of an input plug corresponding to one input plug. In addition, each apparatus has one oPCR (output plug control register) for maintaining the condition of an output plug corresponding to one output plug.

[0447] In the case that apparatuses connected to IEEE 1394 bus carry out transmission and reception of AV data to and from each other, it is necessary for these apparatuses to establish a connection between them. That is to say, a connection is established by setting information necessary for iPCR and oPCR, such as a type of connection (broadcast connection or point to point connection), the number of connections and a utilized channel number, in the oPCR of the apparatus on the transmission side and in the iPCR of the apparatus on the output side. In addition, at the time when an apparatus connected to IEEE 1394 bus stops receiving AV data and decoding for display, it is necessary to cut off the above described connection. At this time, by subtracting the number of connections set in iPCR or in oPCR, or by canceling the types of registered connections, the connection is cut off. Accordingly, by examining the conditions that are set in the iPCR, it can be known whether the apparatus receives AV data to be decoded and displayed or whether decoding and display of AV data are stopped. The plugs are described in the above.

[0448] Here, the sink 1 (5) is assumed to stop receiving the AV data transmitted from the source 3 and decoding for the display. Then, the setting of the connection of the iPCR that corresponds to the AV data is released.

[0449] The examination means 43 found that the sink 1 (5) has cut off the connection with the source 3 as a result of examining the condition of the iPCR of the sink 1 (5).

[0450] Then, the examination means 43 acquires the node unique ID of the sink 1 (5) and makes a notification that the node unique ID of the sink 1 (5) and the sink 1 (5) have cut off the connection with the STB 42, as the source 3, to the count adjustment and determination means 26.

[0451] The count adjustment and determination means 26 examines the device ID of the sink 1 (5) that corresponds to the node unique ID from the received node unique ID by utilizing the correspondence table stored in the correspondence table storage means 50 when receiving a notification from the examination means 43.

[0452] As described above, the authentication number counted by the authentication number counting means 24, as the source 3, is three as shown in FIG. 4 and the device information storage means 27 stores the device IDs of the sink 1 (5) the sink 0 (4) and the sink 3 (7).

[0453] Accordingly, the count adjustment and determination means 26 directs that, since the device ID of the sink 1 (5) has already been stored in the device information storage means 27, the device ID of the sink 1 (5) is deleted from the device information storage means 27 and the authentication number counted by the authentication number counting means 24 is decreased by one. In response to this, the authentication number counting means 24 decreases the counted authentication number by one.

[0454] Thus, unlike the first embodiment, the examination means 43 of the STB 42 that is the source 3 examines the apparatus that has stopped receiving the AV data transmitted from the source 3 and decoding for the display and, thereby, the same effects as of the first embodiment can be gained without carrying out decrement authentication.

[0455] Here, though in the present embodiment the examination means 43 is described as examining whether or not the sink 1 (5), or the like, has stopped receiving AV data and decoding for the display by examining the condition of the plug of the sink 1 (5), or the like, the invention is limited to this. The invention may have the structure as described below.

[0456] That is to say, the examination means 43 checks the number of apparatuses connected to IEEE 1394 bus #1 (1) before checking the condition of the plug of each apparatus, and only when the number of these apparatuses has decreased, the examination means 43 checks which apparatus is removed from the IEEE 1394 bus #1 so as to acquire the node unique ID of the apparatus removed from IEEE 1394 bus #1 and, then, makes a notification to the count adjustment and determination means 26 of the node unique ID of the apparatus and that the apparatus is removed. Then, the count adjustment and determination means 26 finds the device ID that corresponds to the notified node unique ID from the correspondence table. Then, the count adjustment and determination means 36 checks whether or not the found device ID has already been registered with the device information storage means 27. In the case that it is registered, the STB 42 and the apparatus on which authentication has been carried out are removed and, therefore, the count adjustment and determination means 26 directs the authentication number counting means 24 to decrease the counted authentication number. In response to this direction, the authentication number counting means 24 decreases the counted authentication number. Furthermore, the count adjustment and determination means 26 deletes the device ID of the removed apparatus that is stored in the device information storage means 27.

[0457] Note that the removal from IEEE 1394 bus #1 as described hereinbefore does not indicate that the connector connected to IEEE 1394 bus #1 (1) is removed from IEEE 1394 bus #1 (1) but, rather, it indicates that the TV 44 receives data sent from a system different from the D-I/F 31 on the reception side so as to allow display on a monitor.

[0458] (Fourth Embodiment)

[0459] Next, the fourth embodiment is described.

[0460] A copyright protection system of the present embodiment is shown in FIG. 1 in the same manner as in the first embodiment.

[0461]FIG. 9 shows a source 3 of the present embodiment as an STB 45. The STB 45 of the present embodiment does not carry out decrement authentication, unlike the STB 40 of the second embodiment but, instead, periodically examines whether or not the sink 1 (5), or the like, has stopped the decoding and the displaying on a monitor of AV data. That is to say, the STB 42 of the present embodiment is, unlike the STB 40 of the second embodiment, provided with an examination means 43 and a correspondence table storage means 50 and, in addition, is not provided with an authentication rule storage means 29 nor with an authentication selection means 28 on the transmission side.

[0462] The examination means 43 is a means of periodically examining whether or not the sink 1 (5), or the like, has stopped the decoding and the displaying on a monitor of AV data.

[0463] The correspondence table storage means 50 is a means of storing a correspondence table that makes the node unique ID, which is information for exclusively specifying an apparatus in the IEEE 1394 standard, and the device ID, which is information for exclusively specifying a device allocated from the key management center, correspond to each other.

[0464] In addition, FIG. 8 shows the sink 1 (5), and the like, of the present embodiment as the TV 44. The TV 44 is the same as in the third embodiment.

[0465] That is to say, the TV 44 of the present embodiment does not, unlike the TV 30 of the first embodiment, request decrement authentication in the case that the decoding and the displaying on a monitor of AV data are stopped.

[0466] The parts, other than the above, are the same as in the second embodiment.

[0467] Here, the source 3 of the present embodiment, that is to say the STB 45, is an example of a transmission unit of the present invention and the correspondence table storage means 50, the determination means 41, the examination means 43 and the device information storage means 27 are examples of the examination means of the present invention.

[0468] Next, the operation of the present embodiment having such a configuration is described focusing on the differences from the second embodiment.

[0469] As shown in FIG. 6, authentication requests are carried out on the sink 1 (5), the sink 0 (4), the sink 3 (7) and the sink 4 (8), in this order, in the same manner as in the second embodiment and, as a result, the authentication number counted by the authentication number counting means 24 as the source 3 is three and the device information storage means 27 is assumed to store the device IDs of the sink 1 (5), the sink 0 (4) and the sink 3 (7). Here, the STB 45 is not provided with the authentication selection means 29 on the transmission side nor the authentication rule storage means 28 on the transmission side and, therefore, the selection of an authentication rule is not carried out at the time when authentication is carried out on the TV 44.

[0470] The TV 44, as the sink 1 (5), displays the image and sound of the AV data transmitted from the STB 42, as the source 3, on a monitor.

[0471] The examination means 43 periodically examines the conditions of a plug of every apparatus, such as the sink 0 (4) or the sink 1 (5), connected to IEEE 1394 bus #1 (1) Here, the sink 1 (5) is assumed to stop the reception and decoding for display of AV data transmitted from the source 3. Then, the setting of the connection of the iPCR, which corresponds to the above AV data, is released.

[0472] It is assumed that the examination means 43 finds that the sink 1 (5) has cut off the connection with the source 3 as a result of examining the condition of the iPCR of the sink 1 (5).

[0473] Then, the examination means 43 acquires the node unique ID of the sink 1 (5) and makes a notification to the count adjustment and determination means 26 of the node unique ID of the sink 1 (5) and that the sink 1 (5) has cut off the connection with the STB 42, as the source 3.

[0474] The operation hereinafter is the same as in the third embodiment and, accordingly, the count adjustment and determination means 26 deletes the device ID of the sink 1 (5) from the device information storage means 27 and directs the authentication number counting means 24 to decrease the authentication number counted by the authentication number counting means 24 by one since the device ID of the sink 1 (5) has already been stored in the device information storage means 27. In response to this, the authentication number counting means 24 decreases the counted authentication number by one.

[0475] Thus, unlike in the second embodiment, the examination means 43 of the STB 42, which is the source 3, examines the apparatus that has stopped the reception and decoding for display of the AV data transmitted from the source 3 and, thereby, the same effects as of the second embodiment can be gained without carrying out decrement authentication.

[0476] (Fifth Embodiment)

[0477] Next, the fifth embodiment is described.

[0478]FIG. 1 shows a copyright protection system of the present embodiment.

[0479]FIG. 5 shows a source 3 of the present embodiment as an STB 40. The STB 40 of the present embodiment is the same as is described in Embodiment 2.

[0480]FIG. 3 shows a sink 1 (5) connected to IEEE 1394 bus #1 (1), a sink 5 (9) connected to IEEE 1394 bus #2 (2), and the like, as a TV 30. The TV 30 of the present embodiment is the same as is described in the second embodiment.

[0481]FIG. 10 shows a sink 2 (bridge unit) (4) as a bridge unit 46.

[0482] The bridge unit 46 is a unit that once decodes AV data sent from IEEE 1394 bus #1 (1) as the received isochronous packet, that encrypts the AV data using a key the bridge unit 46 has, that transmits the AV data to IEEE 1394 bus #2 (2) as an isochronous packet and that rewrites the node ID of the transmission origin attached to the header of the isochronous packet received from IEEE 1394 bus #1 (1) at this time into the node ID of its own, which is then transmitted.

[0483] The bridge unit 46 is formed of a D-I/F 31 on the reception side, a decoding means 32, an authentication means 34 on the reception side, a key counting means 47, an authentication request means 47, an authentication rule storage means 36 on the reception side, an authentication selection means 35 on the reception side, a D-I/F 21 on the transmission side, an encryption means 22, an authentication means 23 on the transmission side, an authentication number counting means 48, a determination means 41, a device information storage means 27, an authentication rule storage means 29 on the transmission side and an authentication selection means 28 on the transmission side.

[0484] The key counting means 47 is a means of counting the key count number that is the number of successful authentications carried out on apparatuses such as the source 3 that transmits AV data to IEEE 1394 bus #1 (1).

[0485] The authentication number counting means 48 is a means of counting the authentication number that is the number of the successful authentications carried out on the apparatuses such as the sink 5 (9) connected to IEEE 1394 bus #2 (2) such as the sink 5 (9).

[0486] The other parts of the configuration are the same as of the second embodiment, of which the descriptions are omitted.

[0487] Here, the bridge unit 46 of the present embodiment is an example of a bridge unit of the present invention, the authentication rule storage means 36 on the reception side, the authentication selection means 35 on the reception side and the authentication means 34 on the reception side are examples of authentication means on the reception side of a bridge unit of the present invention, the authentication rule storage means 29 on the transmission side, the authentication selection means 28 on the transmission side and the authentication means 23 on the transmission side are examples of authentication means on the transmission side of a bridge unit of the present invention, the authentication number counting means 48 of the present embodiment is an example of an authentication number counting means of a bridge unit of the present invention, the authentication number counted by the authentication number counting means 48 of the present embodiment is an example of the authentication number counted by an authentication number counting means of a bridge unit of the present invention and the key count number of the present embodiment is an example of the upper limit number of permissions of the present invention.

[0488] Next, the operation of the present embodiment having such a configuration is described.

[0489]FIG. 11 shows a state machine diagram showing the operation of the bridge unit 46. In the following, the description is given in reference to this state machine diagram.

[0490] The bridge unit 46 functions as a sink that receives the AV data transmitted by the source 3 in IEEE 1394 bus #1 (1) and functions as a source that transmits AV data to the sink 5, or the like, in IEEE 1394 bus #2 (2).

[0491] In the case that the power supply of the bridge unit 46 is turned on or the bridge unit 46 is connected to IEEE 1394 bus #1 (1) and to IEEE 1394 bus #2 (2) so that a bus reset of IEEE 1394 bus #2 (2) occurs, or in the case that an apparatus is connected to or removed from IEEE 1394 bus #1 (1), so that a bus reset occurs in IEEE 1394 bus #1 (1), the bridge unit 46 is reset to the unauthenticated condition of (S0). That is to say, the authentication of the bridge unit is reset. The key count number counted by the key counting means 47 of the bridge unit 46 is initialized to zero and the authentication number counted by the authentication number counting means 48 of the bridge unit 46 is initialized to zero, respectively, under the unauthenticated condition (S0).

[0492] During the transition from the unauthenticated condition (S0) to the authentication (S1) carried out on the source, initialization of authentication is carried out. That is to say, the authentication request means 33 of the bridge unit 33 prepares an authentication command that is the command for carrying out an authentication request and outputs the authentication command to the D-I/F 31 on the reception side. The D-I/F 31 on the reception side transmits the authentication command to the source 3 of IEEE 1394 bus #1 (1).

[0493] Under the condition of the authentication (S1) carried out on the source, the STB 40 as the source 3 shown in FIG. 5 determines whether the authentication command is accepted or rejected when receiving the authentication command from the bridge unit 46 in the same manner as in the second embodiment. Then, in the case that the STB 40 rejects the authentication command from the bridge unit 46, or in the case that the authentication command from the bridge unit 46 is accepted but authentication has failed, the condition wherein the authentication (S1) is carried out on the source makes a transition to the unauthenticated condition (S0).

[0494] In addition, in the case that the STB 40 accepts the authentication command from the bridge unit 46 and the authentication means 23 on the transmission side of the STB 40 and the authentication means 34 on the reception side of the bridge unit 46 successfully carry out authentication, the condition wherein the authentication (S1) is carried out on the source makes a transition to the condition of authenticated (S2). At this time, the key counting means 47 of the bridge unit 46 increases the key count number by one, that is to say, sets the counted key count number at 1.

[0495] In addition, the determination means 41 of the STB 40 as the source 3 succeeds in authentication and, therefore, directs the authentication number counting means 24 of the STB 40 to increase the counted count number by one so that in response to this, the authentication number counting means 24 of the STB 40 increases the counted authentication number by one. Such an operation of the STB 40 is described in detail in the second embodiment.

[0496] Under the condition of authenticated (S2), the bridge unit 46 is in the condition wherein authentication is successfully carried out on the source 3, or the like.

[0497] When an authentication request is carried out by an apparatus such as the sink 5 (9) connected to IEEE 1394 #2 (2) under the condition of authenticated (S2), the determination means 41 of the bridge unit 46 determines as follows. That is to say, at present, the authentication number counted by the authentication number counting means 48 of the bridge unit is zero and the key count number counted by the key counting means 47 is one and, therefore, the value of the authentication number is smaller than the value of the key count number. In this case, the determination means 41 of the bridge unit 46 determines that the authentication means 23 on the transmission side of the bridge unit 46 should carry out authentication for the sink 5 (9) corresponding to the authentication command from the sink 5 (9). The authentication means 23 on the transmission side of the bridge unit 46 carries out authentication for the sink 5 (9) in accordance with this determination. That is to say, the authenticated condition (S2) makes a transition to the condition wherein authentication (S3) is carried out on the sink or on another bridge (reception side). When authentication carried out on the authentication means 23 on the transmission side of the bridge unit 46 and the sink 5 (9) succeeds, the authentication number counting means 48 of the bridge unit 46 increases the counted authentication number by one and the device information storage means 27 stores the device ID of the sink 5 (9). Accordingly, the key count number counted by the key counting means 47 is one and the authentication number counted by the authentication number counting means 48 becomes one. Then, the condition makes a transition to the authenticated condition (S2).

[0498] Here, furthermore, suppose the sink 6 (10) transmits an authentication command to the bridge unit 46. In this case, when the authentication means 23 on the transmission side of the bridge unit 46 receives the authentication command from the sink 6 (10), the determination means 41 of the bridge unit 46 determines as follows based on the request from the authentication means 23 on the transmission side. That is to say, at present, the key count number counted by the key counting means 47 is one, the authentication number counted by the authentication number counting means 48 of the bridge unit 46 is also one so that the key count number and the authentication number become equal. In the case that the key count number and the authentication number are equal, the determination means 41 allows the authentication request from the sink 6 (10) to be completed after the retrial and determines that authentication should first be carried out on the source 3. The authentication means 23 on the transmission side follows this determination so as to once reject the authentication request from the sink 6 (10) and complete it. Then, the authentication request means 33 of the bridge unit 46 transmits the authentication command to the source 3. That is to say, the authenticated condition (S2) makes a transition to the condition wherein authentication (S4) is carried out on the source.

[0499] Though not described in the second embodiment, the bridge unit 46, as the sink 2 (6) of IEEE 1394 bus #1 (1) carries out an authentication request repeatedly on the source 3 unlike other sink 5 (9), and the like. Then, whenever the STB 40 as the source 3 successfully carries out authentication for the bridge unit 46 the authentication number counting means 24 of the STB 40 increases the counted authentication number in the range that does not exceed the upper limit number of the upper limit authentication number storage means 25. The determination of whether the determination means 41 of the STB 40 accepts or rejects the authentication request is carried out in the completely same manner as in the case of the bridge unit 46, the sink 1 (5), and the like.

[0500] In the case that the source 3 and the authentication means 34 on the transmission side of the bridge unit 46 successfully carry out authentication in the same manner as in the second embodiment, the key counting means 47 increases the counted key count number by one. That is to say, the condition where in authentication (S4) is carried out on the source makes a transition to the authenticated condition (S2). At this point in time, the key count number becomes two and the authentication number becomes one.

[0501] When an authentication command is received again from the sink 6 (10) under the condition of authenticated (S2) the determination means 41 of the bridge unit 46 determines that authentication should be carried out on the sink 6 (10) because the key count number is larger than the authentication number. That is to say, the authenticated condition (S2) makes a transition to the condition wherein authentication (S3) is carried out on the sink or on another bridge (reception side). Then, when the authentication means 23 on the transmission side of the bridge unit 46 successfully carries out authentication for the sink 6 (10) under the condition of authentication (S3) carried out on the sink or another bridge (reception side), the authentication number counting means 48 of the bridge unit 46 increases the counted authentication number by one and the device information storage means 27 stores the device ID of the sink 6 (10). Then, the condition wherein authentication (S3) is carried out on the sink or on another bridge (reception side) makes a transition to the authenticated condition (S2). In this condition, the key count number is two and the authentication number has become two.

[0502] When the bridge unit 46 is requested for authentication from an apparatus connected to IEEE 1394 bus #2 in the above manner, the bridge unit 46 makes a transition from the authenticated condition (S2) to the condition wherein authentication (S3) is carried out on the sink or on another bridge (reception side) in the case that the key count number is greater than the authentication number and completes the authentication request from that apparatus after the retrial so as to carry out authentication for the source 3 in the case that the key count number and the authentication number are equal. That is to say, the authenticated condition (S2) makes a transition to the condition wherein authentication (S4) is carried out on the source. That is to say, in the case that the bridge unit 46 is requested for authentication from an apparatus connected to IEEE 1394 bus #2 (2), the values of the key count number and the authentication number are compared and in the case that the key count number is greater than the authentication number, authentication is carried out on the apparatus connected to IEEE 1394 bus #2 (2) while in the case that the key count number and the authentication number are equal, authentication is carried out on the source 3 before authentication is carried out on the apparatus that has carried out an authentication request.

[0503] In addition, the source 3 connected to IEEE 1394 bus #1 is an apparatus that controls AV data to be decoded and displayed only on a maximum of three apparatuses as described in the second embodiment. In the case that the bridge unit 46 receives an authentication request from the sink connected to IEEE 1394 bus #2 in the above described manner, the bridge unit carries out authentication for the source connected to IEEE 1394 bus #1 before authentication is carried out on the above apparatus so that authentication is carried out on the sink connected to IEEE 1394 bus #2 after the above authentication is successful and, therefore, the limitation on the number of apparatuses for the AV data requiring copyright protection that is transmitted from the source 3 can be adhered to even in the case the bridge unit 46 exists.

[0504] Here, the sink 5 (9) receives and decodes the AV data requiring copyright protection that is transmitted from the source 3 and the sink 5 (9) that stops displaying the AV data on a monitor requests decrement authentication by transmitting a command for decrement authentication to the bridge unit 46 in the same manner as described in the first embodiment. That is to say, the authenticated condition (S2) makes a transition to the condition wherein decrement authentication (S5) is carried out on the sink or on another bridge (reception side). At this point in time, the key count number of the key counting means 47 is two and the authentication number counted by the authentication number counting means 48 of the bridge unit 46 is also two.

[0505] Under the condition of decrement authentication (S5) carried out on the sink or another bridge (reception side) the bridge unit 46 carries out decrement authentication for the sink 5 (9) Then, in the case that the decrement authentication is successful, the authentication number counted by the authentication number counting means 48 of the bridge unit 46 is decreased by one and the device information storage means 27 deletes the device ID of the stored sink 5 (9). Then, the condition wherein decrement authentication (S5) is carried out on the sink or on another bridge (reception side) makes a transition to the condition wherein decrement authentication (S6) is carried out on the source. On the other hand, in the case that decrement authentication has failed, the condition wherein the decrement authentication (S5) is carried out on the sink or on another bridge (reception side) makes a transition to the authenticated condition (S2).

[0506] The bridge unit 46 carries out decrement authentication for the source 3 in the condition of the decrement authentication (S6) carried out on the source and when it is successful, the key count number is decreased by one and the condition wherein decrement authentication (S6) is carried out on the source makes a transition to the authenticated condition (S2) In addition, in the case that the decrement authentication has failed the key count number is not decreased and the condition wherein decrement authentication (S6) is carried out on the source makes a transition to the authenticated condition (S2). At this point in this time, the key count number becomes one and the authentication number of the bridge unit 46 has also become one.

[0507] The above described operation is repeated continuously in the case that an authentication request or a decrement authentication request is received from another apparatus connected to IEEE 1394 bus #2 under the condition of authenticated (S2).

[0508] In the case that an apparatus connected to IEEE 1394 bus #2 (2) stops receiving, decoding and displaying AV data, this is declared to the bridge unit 46 in the same manner as in the second embodiment and the bridge unit 46 carries out decrement authentication and, thereby, the apparatuses connected to IEEE 1394 bus #1 (1) and to IEEE 1394 bus #2 (2) can newly utilize AV data in the same manner as in the second embodiment even in the case that IEEE 1394 bus #1 (1) and IEEE 1394 bus #2 (2) are connected to the bridge unit.

[0509] Furthermore, the source 3 must immediately send an isochronous packet when a band and a channel are allocated from the isochronous resource manager according to IEEE 1394. The source 3 sends an empty isochronous packet to IEEE 1394 bus #1 (1) in the case wherein no AV data is to be transmitted. Then, even in the case that the source 3 does not send an empty isochronous packet to IEEE 1394 bus #1 (1), authentication of the source 3 is reset in the DTCP system.

[0510] Accordingly, in the case that the bridge unit 46 (S2) is in the authenticated condition (S2) and the transmission of isochronous packets from the source 3 is cut off, a transition from the authenticated condition (S2) is made, the key counter is initialized to zero and the authentication number counting means 48 of the bridge unit 46 initializes the counted authentication number to zero so as to return the authenticated condition (S2). That is to say, when the authentication of source 3 is reset, the bridge unit 46 also resets the authentication.

[0511] In addition, though the transmission of isochronous packets from the source 3 continues, in the case that the transmission of isochronous packets from the bridge unit 46 is cut off, a transition is made from the authenticated condition (S2) and the authentication number counted by the authentication number counting means 23 of the bridge unit 46 is initialized to zero and the condition again returns to the authenticated condition (S2). That is to say, the bridge unit 46 resets the authentication.

[0512] In addition, in the case that the bridge unit 46 that is in the authenticated condition (S2) discovers that an apparatus, such as the sink 5 (9) connected to IEEE 1394 bus #2 (2), has been lost from IEEE 1394 bus #2 (2), the authenticated condition (S2) makes a transition to the condition wherein decrement authentication (S6) is carried out on the source.

[0513] Then, under the condition wherein decrement authentication (S6) is carried out on the source, the bridge unit 46 carries out decrement authentication for the source 3. In the case that this is successful, the key count number is decreased by one so that the condition makes a transition to the authenticated condition (S2) In the case of failure, the key count number is not decreased so that the condition makes a transition to the authenticated condition (S2).

[0514] Thus, even in the case that the bridge unit 46 connects IEEE 1394 bus #1 (1) and IEEE 1394 bus #2, the same effects can be gained as are described in the second embodiment.

[0515] Here, though in the present embodiment in the case that the bridge unit 46 receives an authentication request from an apparatus connected to IEEE 1394 bus #2 (2), it is determined whether authentication is carried out on that apparatus or authentication is carried out on the source 3 before authentication is carried out on that apparatus based on the relative magnitude between the key count number counted by the key counting means 47 and the authentication number counted by the authentication number counting means 48 of the bridge unit 46, the invention is not limited to this. In the case that the key counting means 47 is not provided and an authentication request is received from the sink connected to IEEE 1394 bus #2 (2), only when authentication is carried out on the source 3 before this authentication is carried and the authentication is successfully carried out on the source 3, the authentication can be carried out on the sink. The same effects as of the present embodiment can be gained in such a manner.

[0516] (Sixth Embodiment)

[0517] Next, the sixth embodiment is described.

[0518] A copyright protection system of the present embodiment is shown in FIG. 1 in the same manner as in the fifth embodiment.

[0519]FIG. 5 shows a source 3 of the present embodiment as an STB 40. The STB 40 is the same as described in the second embodiment.

[0520] In addition, FIG. 3 shows a sink 1 (5) connected to IEEE 1394 bus #1 (1), a sink 5 (9) connected to IEEE 1394 bus #2 (2), and the like, as a TV 30. The TV 30 is the same as described in the second embodiment.

[0521] In addition, FIG. 10 shows a bridge unit 46 as a sink 2 (bridge unit) (4).

[0522] The bridge unit 46 of the present embodiment has the same configuration as that of the fifth embodiment.

[0523] Next, the operation of the present embodiment having such a configuration is described focusing on the difference from that of the fifth embodiment.

[0524] In the fifth embodiment, the bridge unit 46 carries out authentication only once on the source 3 at the time when the unauthenticated condition (S0) makes a transition to the condition wherein authentication (S1) is carried out on the source or to the authenticated condition (S2) in the state machine diagram of FIG. 11 and, in the case of success, the key count number counted by the key counting means 47 is set at 1.

[0525] In contrast to this, in the present embodiment the authentication request means 33 of the bridge unit 46 transmits an authentication command, to which is added the number of authentications desired to be carried out on the source 3, to the source 3 at the time when the unauthenticated (S0) condition makes a transition to the condition wherein the authentication (S1) is carried out on the source or to the authenticated (S2) condition.

[0526] Then, the authentication means 34 on the reception side of the bridge unit 46 carries out authentication for the source 3 according to the number of times designated at the time authentication is requested. On the other hand, the source 3 carries out authentication by determining whether authentication from the bridge unit 46 is rejected or authentication is carried out based on the upper limit number stored in the upper limit authentication number storage means 25 in the same manner as in the second embodiment and on the authentication number counted by the authentication number counting means 24 of STB 40 at the time when authentication is carried out on the authentication means 34 on the reception side of the bridge unit 46.

[0527] The key counting means 47 increases the key count number by the number of times that the bridge unit 46 has successfully carried out authentication when authentication is collectively carried out according to the number of times designated in such a manner.

[0528] Accordingly, in the case that the above described authentication is successful and in the case that the number of times that is desired that the authentication request means 33 carry out authentication for the source 3 attached to the authentication command is greater than 1 at the point in time when a transition is made to the authenticated (S2) condition, the key count number has a value greater than 1 and the authentication number of the authentication number counting means 48 of the bridge unit 48 has become 0.

[0529] The parts other than the above are the same as in the fifth embodiment. That is to say, the bridge unit 46 of the present embodiment makes a notification of the number of times authentication is desired to be carried out to the source 3 and authentication is carried out in advance according to this number of times and, therefore, even in the case that an authentication request is received from an apparatus such as the sink 5 connected to IEEE 1394 bus #2 (2), it is not necessary to carry out a two stage process wherein the authentication request is once rejected and authentication is successfully carried out on the source 3 and again, authentication is carried out on this apparatus that has received the authentication request. An authentication request from an apparatus, such as sink 5, connected to IEEE 1394 bus #2 (2) is instantly accepted up to the number of times authentication is carried out on the source 3 in advance so that authentication can be carried out on this apparatus. Accordingly, in addition to the same effects as in the fifth embodiment, the effects can further be gained wherein response time of the bridge unit 46 to the authentication request is shortened.

[0530] (Seventh Embodiment)

[0531] Next, the seventh embodiment is described.

[0532] A copyright protection system of the present embodiment is shown in FIG. 1 in the same manner as in the fifth embodiment.

[0533] A source 3 of the present embodiment is shown in FIG. 5 as an STB 40. The STB 40 is the same as is described in the second embodiment.

[0534] In addition, FIG. 3 shows a sink 1 (5) connected to IEEE 1394 bus #1 (1) of the present embodiment, a sink 5 (9) connected to IEEE 1394 bus #2 (2), and the like, as shown as a TV 30. The TV 30 is the same as is described in the second embodiment.

[0535] In addition, FIG. 10 shows a bridge unit 46 as a sink 2 (bridge unit) (6).

[0536] The bridge unit 46 of the present embodiment has the same configuration as that of the fifth embodiment.

[0537] Next, the operation of the present embodiment having such a configuration is described focusing on the differences from the fifth embodiment.

[0538] In the fifth embodiment, in the case that decrement authentication is requested from an apparatus connected to IEEE 1394 bus #2, the authenticated (S2) condition makes a transition to the condition wherein decrement authentication (S5) is carried out on the sink or on another bridge (reception side) and, furthermore, makes a transition to the condition wherein decrement authentication (S6) is carried out on the source and, again, makes a transition to the authenticated (S2) condition.

[0539] That is to say, the bridge unit 46 decreases the authentication number counted by the authentication number counting means 48 of the bridge unit 46 by 1 in the case that decrement authentication is successfully carried out on an apparatus connected to IEEE 1394 bus #2 (2) and, subsequently, decreases the key count number counted by the key counting means 47 by 1 in the case that decrement authentication is successfully carried out on the source 3.

[0540] In contrast to this, in the present embodiment the authenticated (S2) condition makes a transition to decrement authentication (S5) carried out on the sink or on another bridge (reception side) in the case that decrement authentication is requested from IEEE 1394 bus #2. That is to say, the bridge unit 46 carries out decrement authentication for the apparatus connected to IEEE 1394 bus #2 and in the case of a successful result, the authentication number counted by the authentication number counting means 48 of the bridge unit 46 is decreased by 1.

[0541] Next, a transition is not made to decrement authentication (S6) carried out on the source but, rather, a transition is made to the authenticated (S2) condition. That is to say, decrement authentication is not sequentially carried out on the source 3. Accordingly the key count number counted by the key counting means 47 does not change.

[0542] When a predetermined period of time, for example 5 minutes, has elapsed wherein an authentication request is not newly received from the apparatus connected to IEEE 1394 bus #2 since the above described decrement authentication is carried out, the bridge unit 46 carries out decrement authentication for the source.

[0543] In the case that an authentication request is received from an apparatus, such as sink 7 (11), connected to IEEE 1394 bus #2 (2) under the condition wherein the bridge unit 46 has not yet carried out decrement authentication for the source, the authentication number has a value smaller than that of the key count number and, therefore, the bridge unit 46 does not need to carry out authentication for the source 3 before authentication is carried out on the apparatus that has requested that authentication so that the bridge unit 46 can respond quickly, in comparison with the fifth embodiment, to the authentication request from IEEE 1394 bus #2 (2).

[0544] Accordingly, in addition to the same effects as of the fifth embodiment, the effect can further be gained that the response time to the authentication request of the bridge unit 46 becomes shorter.

[0545] Here, the present invention is a program for allowing a computer to implement the functions of a means (or unit, element, circuit, portion, or the like) of the entirety, or a portion of, the above described copyright protection system of the present invention and is a program that operates in cooperation with a computer.

[0546] The present invention is a medium that holds a program for allowing a computer to implement the entirety of, or a portion of, the functions of a means of the entirety of, or a portion of, the above described copyright protection system of the present invention and is a medium that can be read by a computer and wherein the above described read out program implements the above described functions in cooperation with the above described computer.

[0547] Here, a portion of a means (or unit, element, circuit, portion, or the like) of the present invention and a portion of the step (or process, operation, working effect, or the like) of the present invention mean several means or steps within this plurality of means or steps, or mean a portion of the functions or a portion of the operation within one means and one step.

[0548] In addition, a portion of a unit (or element, circuit, portion, or the like) of the present invention means several units within this plurality of units, means a portion of a means (or element, circuit, portion, or the like) within one unit or means a portion of the functions within one means.

[0549] In addition, a recording medium that records a program of the present invention and that can be read by a computer is also included in the present invention.

[0550] In addition, one application mode of a program of the present invention may be a mode wherein the program is recorded in a recording medium that can be read by a computer so as to operate in cooperation with the computer.

[0551] In addition, one application mode of a program of the present invention may be a mode wherein the program is transmitted through a transmission medium and is read by a computer so as to operate in cooperation with the computer.

[0552] In addition, the data structure of the present invention includes a data base, a data format, a data table, a data list, a type of data and the like.

[0553] In addition, the recording medium includes a ROM, and the like, while the transmission medium includes a transmission medium such as the Internet, light, radio waves, sound waves, and the like.

[0554] In addition, the above described computer of the present invention is not limited to pure hardware, such as a CPU, but may include firmware, an OS or, in addition, a peripheral apparatus.

[0555] Here, as described above, the configuration of the present invention may be implemented in a software manner or may be implemented in a hardware manner.

INDUSTRIAL APPLICABILITY

[0556] As is clear from the above description, the present invention can provide a copyright protection system, a transmission unit, a reception unit, a bridge unit, a copyright protection method, a medium and a program wherein the desire of copyright holders for limitation on the number of reception apparatuses that can receive a signal requiring copyright protection can be met even in the case that a bridge unit is connected to a network.

[0557] In addition, the present invention can provide a copyright protection system, a transmission unit, a reception unit, a bridge unit, a copyright protection method, a medium and a program wherein the desire of copyright holders for limitation on the number of reception apparatuses that can receive a signal requiring copyright protection can be limited by designating the number of the reception apparatuses. 

What is claimed is:
 1. A copyright protection system, comprising: at least one, or more, reception unit that is connected to a network and that receives and utilizes data requiring copyright protection; and a transmission unit of transmitting said data requiring copyright protection to said reception unit by utilizing said network, wherein said transmission unit has: an authentication means on the transmission side, of carrying out authentication for said reception unit; and an authentication number counting means of counting the authentication number, that is the number authenticated by said authentication means on the transmission side, and said reception unit has an authentication means on the reception side, of carrying out authentication for said authentication means on the transmission side, and wherein said authentication number is limited.
 2. The copyright protection system according to claim 1, wherein said authentication number counting means adds said authentication number in the case that said authentication means on the transmission side successfully carries out authentication.
 3. The copyright protection system according to claim 2, wherein in the case that authentication is successfully carried out for said transmission unit, said reception unit does not, again, carry out an authentication request as long as said successful authentication is not reset due to a predetermined cause.
 4. The copyright protection system according to claim 3, further comprising a bridge unit of connecting said network to another network, wherein the bridge unit is handled in the same manner as said reception unit in said network to which said transmission unit is connected, and wherein said bridge unit can, again, carry out an authentication request.
 5. The copyright protection system according to claim ?, wherein in the case that authentication is successfully carried out for said reception unit, said transmission unit does not accept an authentication request even if the authentication request is carried out, again, by said reception unit as long as said successful authentication is not reset due to a predetermined cause.
 6. The copyright protection system according to claim 5, further comprising a bridge unit of connecting said network to another network, wherein the bridge unit is handled in the same manner as said reception unit in said network to which said transmission unit is connected, and wherein in the case that an authentication request is carried out by said bridge unit said transmission unit accepts the authentication request.
 7. The copyright protection system according to claim 2, wherein in the case that authentication is successfully carried out on said reception unit, said transmission unit carries out authentication, again, for said reception unit and said authentication number counting means does not add said authentication number even if the authentication is successful, as long as said authentication is not reset due to a predetermined cause.
 8. The copyright protection system according to claim 7, further comprising a bridge unit of connecting said network to another network, wherein the bridge unit is handled in the same manner as said reception unit in said network to which said transmission unit is connected, and wherein in the case that authentication is successfully carried out again for said bridge unit said authentication number counting means adds said authentication number.
 9. The copyright protection system according to any of claims 3 to 8, wherein said authentication means on the transmission side has: a registration means of registering information that specifies said reception unit for which authentication is successfully carried out; and a redundancy determination means of determining whether or not an authentication request is the authentication request from said reception unit that has already successfully carried out authentication, when the authentication request is carried out by said reception unit, by utilizing the registered information that specifies said reception unit.
 10. The copyright protection system according to any of claims 3 to 8, wherein the reset of said authentication occurs at the time when an update of a key is carried out.
 11. The copyright protection system according to any of claims 3 to 8, wherein the reset of said authentication occurs at the time when an update of an exchange key is carried out.
 12. The copyright protection system according to claim 10, comprising a bridge unit for connecting said network to another network, wherein the bridge unit is handled in the same manner as said reception unit in said network to which said transmission unit is connected, and wherein in the case that said transmission unit carries out said update of a key the reset of said authentication is carried out also in said other network.
 13. The copyright protection system according to any of claims 3 to 8, wherein the reset of said authentication occurs at the time when a bus reset is carried out.
 14. The copyright protection system according to claim 13, comprising a bridge unit of connecting said network to another network, wherein the bridge unit is handled in the same manner as said reception unit in said network to which said transmission unit is connected, and wherein in the case that said bus reset is carried out in said network to which said transmission unit is connected, the reset of said authentication is carried out also in said other network.
 15. The copyright protection system according to claim 1, wherein the limitation in said authentication number indicates that said authentication means on the transmission side does not accept an authentication request from said reception unit in the case that said authentication number becomes a predetermined value, or greater.
 16. The copyright protection system according to claim 1, wherein said authentication number counting means subtracts said authentication number in the case that said reception unit that has successfully carried out authentication for said authentication means on the transmission side stops the utilization of said data requiring copyright protection that is sent from said transmission unit.
 17. The copyright protection system according to claim 16, comprising a bridge unit of connecting said network to another network, wherein the bridge unit is handled in the same manner as said reception unit in said network to which said transmission unit is connected, and wherein “said bridge unit stops the utilization of said data requiring copyright protection that is sent from said transmission unit” indicates that all of said reception units connected to said other network stop the utilization of said data requiring copyright protection that is sent from said transmission unit.
 18. The copyright protection system according to claim 16, wherein said transmission unit has a registration means of registering information that specifies said reception unit that has successfully carried out authentication for said authentication means on the transmission side, and said registration means cancels the registration of the information that specifies the reception unit that has successfully carried out authentication for said authentication means on the transmission side, in the case that said authentication number counting means subtracts said authentication number.
 19. The copyright protection system according to claim 16, wherein said transmission unit has an examination means of examining whether or not said reception unit has stopped the utilization of, said data requiring copyright protection.
 20. The copyright protection system according to claim 19, wherein the stoppage of the utilization of said data requiring copyright protection indicates that said reception unit is detached from said network, and said examination means periodically examines whether or not said reception unit is detached from said network.
 21. The copyright protection system according to claim 20, wherein said examination indicates the periodically examining of the connection number that is the number of said reception units connected to said network and the checking of which of said reception units is detached from said network in the case that said connection number is reduced.
 22. The copyright protection system according to claim 19, wherein said examination means checks if said reception unit has stopped the utilization of said data requiring copyright protection by examining an operational condition of said reception unit and/or an active condition of the connection plugs, and said authentication number counting means subtracts said authentication number in the case that, as a result of the examination by said examination means, said reception unit is determined not to utilize said data requiring copyright protection.
 23. The copyright protection system according to claim 20 or 21, wherein said examination means has a correspondence table of allowing information that specifies said reception unit to correspond to the signature of that reception unit said examination means determines whether or not authentication has been carried out on said reception unit that is detached from said network by utilizing said correspondence table, and said authentication number counting means subtracts said authentication number in the case that said determination result shows that authentication has been carried out for said reception unit that is detached from said network.
 24. The copyright protection system according to claim 16, wherein said authentication means on the reception side carries out a decrement authentication request of subtracting said authentication number for said transmission unit in the case that said reception unit stops the utilization of said data requiring copyright protection that is sent from said transmission unit, said authentication means on the transmission side carries out said decrement authentication for said authentication means on the reception side, and said authentication number counting means subtracts said authentication number when said decrement authentication is successful.
 25. The copyright protection system according to claim 24, wherein a command for decrement authentication, that is a command for carrying out said decrement authentication, is prepared separately from the authentication command that is the command for carrying out authentication at the time when said data requiring copyright protection is utilized.
 26. The copyright protection system according to claim 24 or 25, wherein said data requiring copyright protection is encrypted and said reception unit abandons the key for decoding said data requiring copyright protection when said decrement authentication is successful.
 27. The copyright protection system according to claim 24 or 25, wherein said decrement authentication differs from the authentication for utilizing said data requiring copyright protection in at least one, or more, of a signature, an authentication method and an operational equation.
 28. The copyright protection system according to claim 18, wherein when the authentication is reset due to the predetermined cause, said authentication number counting means initializes said authentication number while said registration means cancels all the registrations of information that specifies the reception unit which has successfully carried out authentication for said authentication means on the transmission side.
 29. The copyright protection system according to claim 2, further comprising a bridge unit of connecting said network to another network.
 30. The copyright protection system according to claim 29, wherein said bridge unit is handled in the same manner as said transmission unit in said other network, and in the case that an authentication request is carried out by said reception unit connected to said other network, authentication is carried out for said transmission unit connected to said network before authentication is carried out for the reception unit and in the case that the authentication for the transmission unit is successful authentication is carried out for said reception unit.
 31. The copyright protection system according to claim 29, wherein, in the case that said authentication number counting means of said bridge unit is subtracted, said bridge unit carries out decrement authentication for said transmission unit connected to said network, in order to subtract said authentication number counted by said authentication number counting means of said transmission unit that is connected to said network.
 32. The copyright protection system according to claim 29, wherein said authentication number counting means of said bridge unit counts the authentication number that is the number of the successful authentications carried out for said reception unit, which is connected to said other network, by said authentication means on the transmission side of said bridge unit.
 33. The copyright protection system according to claim 32, wherein, in the case that said transmission unit is newly connected to said network, said bridge unit carries out authentication for said newly connected transmission unit in accordance with said authentication number that is counted by said authentication number counting means of said bridge unit.
 34. The copyright protection system according to claim 30, wherein said bridge unit has a key counting means of counting a limitation number of a permissions allocated by said transmission unit that is connected to said network, said authentication number counting means of said bridge unit counts said authentication number that is the number of successful authentication carried out for said reception unit, which is connected to said other network, by said authentication means on the transmission side of said bridge unit, said bridge unit sets the number of successful authentications carried out for said transmission unit, which is connected to said network, as the limitation number of said permissions counted by said key counter, in the case that a decrement authentication request is carried out, in order to subtract said authentication number counted by said authentication number counting means of said bridge unit, by said reception unit that is connected to said other network, said bridge unit does not carry out decrement authentication for said transmission unit that is connected to said network but, rather, carries out decrement authentication for the reception unit, said authentication number counting means of said bridge unit subtracts said authentication number when said decrement authentication is successful, and at the time when an authentication request is newly carried out by said reception unit connected to said other network, authentication is carried out for the reception unit in the case that the limitation number of said permissions is smaller than said authentication number that is counted by said authentication number counting means of said bridge unit while authentication is carried out for said transmission unit connected to said network before authentication is carried out for the reception unit in the case that the limitation number of said permissions is not smaller than said authentication number counted by said authentication number counting means of said bridge unit and, then, authentication is carried out for the reception unit in the case that the authentication for said transmission unit is successful.
 35. The copyright protection system according to claim 29, wherein said bridge unit reencrypts data that is sent from said transmission unit connected to said network and transmits the data to said reception unit connected to said other network, said authentication number counting means of said bridge unit counts the authentication number that is the number of successful authentications carried out for said reception unit, which is connected to said other network, by said authentication means on the transmission side of said bridge unit, and said bridge unit has a key counting means of counting the limitation number of permissions allocated by said transmission unit connected to said network.
 36. The copyright protection system according to claim 35, wherein in the case that an authentication request is carried out by said reception unit that is connected to said other network, in the case that said authentication number counted by said authentication number counting means of said bridge unit and the limitation number of said permissions counted by said key counting means are greater than said authentication number counted by said authentication number counting means of said bridge unit, said bridge unit permits the authentication request.
 37. The copyright protection system according to claim 36, wherein the upper limit of the limitation number of permissions counted by said key counting means is in advance given by said transmission unit that is connected to said network.
 38. The copyright protection system according to claim 36, wherein said bridge unit carries out authentication for said transmission unit, which is connected to said network and, thereby, the upper limit of the limitation number of permissions counted by said key counting means is added.
 39. The copyright protection system according to claim 35, wherein, in the case that an authentication request is carried out by said reception unit connected to said other network, in the case that the limitation number of said permissions counted by said key counting means is not greater than said authentication number counted by said authentication number counting means of said bridge unit, said bridge unit rejects the authentication request.
 40. The copyright protection system according to claim 35, wherein, in the case that an authentication request is carried out by said reception unit connected to said other network, in the case that the limitation number of said permissions counted by said key counting means is not greater than said authentication number counted by said authentication number counting means of said bridge unit, said bridge unit calls on said transmission unit connected to said network to add the limitation number of said permissions.
 41. The copyright protection system according to claim 35, wherein, in the case that an authentication request is carried out by said reception unit connected to said other network, in the case that the limitation number of said permissions counted by said key counting means is not greater than said authentication number counted by said authentication number counting means of said bridge unit, said bridge unit carries out an authentication request for said transmission unit connected to said network and said key counting means adds the limitation number of said permissions in the case that said authentication is successful.
 42. The copyright protection system according to claim 29, wherein said bridge unit makes a notification of the number of said reception units that is connected to said other network and that carries out an authentication request for said transmission unit connected to said network whenever an authentication request is carried out by said reception unit connected to said other network.
 43. The copyright protection system according to claim 42, wherein a field for making a notification of said number is provided in an authentication command of said bridge unit to carry out an authentication request for said transmission unit that is connected to said network so that said bridge unit makes a notification of said number by utilizing said field.
 44. The copyright protection system according to claim 29, wherein an authentication command of said bridge unit to carry out an authentication request for said transmission unit that is connected to said network is distinguished from an authentication command of said reception unit that does not have a function of said bridge unit and that is connected to said network to carry out an authentication request for said transmission unit connected to said network.
 45. The copyright protection system according to claim 44, wherein said distinguishment is carried out by means of the signature attached to said authentication command.
 46. A transmission unit for transmitting data requiring copyright protection, by utilizing a network, to at least one, or more, reception unit which has an authentication means on the reception side for carrying out authentication for a transmission unit, is connected to said network and receives and utilizes said data requiring copyright protection, wherein the transmission unit comprises characterized in having: an authentication means on the transmission side for carrying out authentication for said authentication means on the reception side; and an authentication number counting means of counting authentication number that is the number of authentications carried out by said authentication means on the transmission side, wherein said authentication number is limited.
 47. A reception unit that is connected to a network and that receives and utilizes data requiring copyright protection, wherein the reception unit comprises: an authentication means on the reception side of carrying out authentication for an authentication means on the transmission side which is provided in a transmission unit having said authentication means on the transmission side of carrying our authentication for the reception unit and an authentication number counting means of counting authentication number that is the number of the authentications carried out by said authentication means on the transmission side, wherein said authentication number is limited.
 48. A bridge unit for transmitting data requiring copyright protection that is transmitted from a transmission unit connected to one said network to a reception unit connected to the other said network, wherein the bridge unit comprises: an authentication means on the transmission side for bridge unit that carries out authentication for said reception unit; an authentication number counting means of bridge unit that counts the authentication number for bridge unit that is the number of the authentications carried out by said authentication means on the transmission side; and an authentication means on the reception side for bridge unit that carries out authentication for said transmission unit, wherein said transmission unit has: an authentication means on the transmission side for carrying out authentication for said reception unit that is connected to said bridge unit or for said network; and an authentication number counting means of counting the authentication number that is the number of the authentications carried out by said authentication means on the transmission side, wherein said reception unit has an authentication means on the reception side that carries out authentication for said transmission unit connected to said bridge unit or for said other network, and wherein said authentication number counted by said authentication means on the transmission side is limited.
 49. A copyright protection method of transmitting data requiring copy protection from a transmission unit, by utilizing a network, to at least one, or more, reception unit that is connected to said network and that receives and utilizes said data requiring copyright protection, wherein that copyright protection method is characterized in that said transmission unit counts the authentication number that is the number of authentications carried out on said reception unit, and in that said authentication number is limited.
 50. A medium that can be processed by a computer and that is a medium holding a program for allowing a computer to function as the entirety, or a part, of: the authentication means on the reception side in said reception unit for carrying out authentication for said authentication means on the transmission side; the authentication means on the transmission side in said transmission unit for carrying out authentication for said reception unit; and the authentication number counting means of counting the authentication number that is the number of authentications carried out by said authentication means on the transmission side, in the copyright protection system according to claim
 1. 51. A program for allowing a computer to function as the entirety, or a part, of: the authentication means on the reception side in said reception unit for carrying out authentication for said authentication means on the transmission side; the authentication means on the transmission side in said transmission unit for carrying out authentication for said reception unit; and the authentication number counting means of counting the authentication number that is the number of authentications carried out by said authentication means on the transmission side, in the copyright protection system according to claim
 1. 