Information transaction system

ABSTRACT

A contents use right discrimination card corresponding to encrypted contents is sold to a user, who then transmits data recorded on the contents use right discrimination card to a contents use right management center. The contents use right management center then discriminates the contents and the card, based on data of the received contents use right discrimination card, to encrypt the contents key for decoding the contents with, for example, a session key, to transmit the encrypted contents key to the user. The contents use right discrimination card sold to the user can be set for enabling the resale, and can be transferred between different users so that the contents key can be transmitted plural times from the contents use right management center. This enables the contents to be utilized without executing on-line settlement processing.

TECHNICAL FIELD

[0001] This invention relates to an information transaction system, an information transaction method and a program providing medium. More particularly, it relates to an information transaction system and an information transaction method in which a variety of contents information, such as music, picture data or game programs are provided to a user through a recording medium, such as CD or DVD, or by the distribution over the network, and in which the fee pertinent to the use of the contents is collected or use points are afforded in connection with such use.

BACKGROUND ART

[0002] Nowadays, a variety of software data, such as game programs, speech data, picture data, referred to below as contents, are in circulation over a network, such as Internet, or a commercially available mediums, such as DVD or CD. These contents in circulation may be stored in the recording devices annexed to the recording and/or reproducing apparatus, owned by a user, such as PV (personal computers) or game appliances, memory cards or in hard discs. If stored once, the contents can be exploited by replay from the storage mediums.

[0003] The main component elements of the memory card devices, used in a conventional information equipment, such as video game equipment or PC, are control means for operational control, a connector connected to the control means and adapted for connection to a slot formed in a main body portion of the information equipment, and a non-volatile memory for data storage connected to the control means. The non-volatile memory provided in the memory card is formed by an EEPROM and a flash memory.

[0004] The data stored in the commercially available recording mediums, such as DVD or memory card, or a variety of contents, stored in the memory means, such as memory cards, are fetched from the respective memory means, responsive to a user command from the game equipment used as a reproducing equipment or from the main body portion of the information equipment, such as PC, or to a user command through inputting means connected in circuit, for replay through the main body portion of the information equipment or through a display or a loudspeaker connected in circuit.

[0005] In general, the right of distribution, for example, of a large number of software contents, such as game programs, music data or picture data, is owned by authors or sellers. Thus, in distributing the contents by recording mediums, such as DVD or CD, the fee is collected at the time of sale of the recording mediums, such as DVD or CD. Alternatively, in distributing the contents over the network, such as the Internet, the user information, such as the user credit number, is acquired in distributing the contents, to collect the counter-value for the provided contents, that is the use fee, from the user.

[0006] In distributing these contents, the conventional practice is to allow the use of the software for only authorized users, by way of imposing certain restrictions on use, so as not to permit unauthorized duplication, in consideration of security. In distributing the contents data through a recording medium, such as DVD or CD, or over a network, the contents for distribution is encrypted and a key for decoding the encrypted contents (contents key) is provided only for an authorized user.

[0007] For example, in the configuration of an on-line distribution system for digital data (contents), which is becoming popular, a user acquires contents encrypted over a network or medium and, for utilizing the contents, connects a user terminal to a contents utilization right sale center to carry out the procedure for purchasing the rights to use the contents on-line to acquire a key applicable to the decoding of the encrypted contents.

[0008] The contents data encrypted can be decoded by the on-line procedure, using the key acquired from the contents use right sale center, such that the data can be restored by decoding to the decoded data (plain text) at a user terminal. The above depicted data encrypting and decoding method, employing a secret key for encrypting the information and a decoding key for decrypting the information, has so far been used extensively.

[0009] Among a variety of data encrypting or decrypting data employing the secret key and the decoding key, there is a system termed a common key encryption system. This common key encryption system makes common use of a secret key used for data encryption processing and a decoding key used in decrypting the data to afford a common key used for encryption and decoding to an authorized user to prohibit an unauthorized user not having the key from accessing the data. Typical of this system is a data encryption standard (DES).

[0010] The secret key and the decoding key, used in the above-described encryption and decoding, may be obtained by applying a unidirectional function, such as Hash function, based e.g., on a certain password. The uni-directional function is such a function in which an input is extremely difficult to find from an output by a reverse path. For example, a uni-directional function is applied using a password determined by a user as input to generate the secret and decoding keys based on the resulting output. It is virtually not possible to find the password as the original data from the so-acquired secret and decoding keys by tracing a reverse path.

[0011] There is also a system, called an open key encryption system, in which an algorithm different from that used in decoding is used in processing by the secret key used in encryption. The open key encryption system is a method employing an open key that may be used by unidentified users. Specifically, a document for encryption for a certain individual is encrypted using the open key distributed by the individual or the open key acquired from an authentication office. The document encrypted by the open key may be decoded only by the secret key corresponding to the open key used for encryption. Since the secret key is owned solely by the person who distributed the open key, the document encrypted by the open key can be decoded solely by the person as an owner of the secret key. Typical of the open key encryption system is the Rivest-Shamir-Adleman (RSA) cipher.

[0012] By exploiting this encryption system, such a system may be provided in which encrypted contents can be decoded solely by an authorized user. The configuration of the. conventional contents distribution, employing these encryption systems, is explained briefly by referring to FIG. 1.

[0013]FIG. 1 shows a typical configuration in which contents such as programs, speech data or video data, acquired from data providing means, such as DVD, CD30 or Internet 40, are reproduced by reproducing means 10, such as game equipment, and in which data acquired from the DVD, CD30 or Internet 40, can be stored in memory means 20, such as floppy disc, memory card or a hard disc.

[0014] These contents, such as programs, speech data or video data, are encrypted and sent to a user having the respective means 10. An authorized user acquires, in addition to the encrypted data, key data as encryption and decoding keys for the encrypted data.

[0015] The reproducing means 10 includes a CPU 12 and executes the input data reproducing operation by a reproducing unit 14. The reproducing unit executes the processing of decoding the encrypted data to reproduce the program provided and contents provided, such as audio or picture data. 12.

[0016] The authorized user saves the contents, such as programs/data, in the memory means 20, in order to re-use the programs provided. The reproducing means 10 includes a saving processor 13 for executing the contents saving processing. In order to prevent unauthorized use of data stored in the memory means 20, the saving processor 13 encrypts the data to execute data saving.

[0017] For encrypting the contents, a key for contents encryption is used. The saving processor 13 uses the contents encryption to cipher the contents to store the ciphered contents in a memory unit 21 of the memory means 20.

[0018] In taking out and reproducing the contents stored in the memory means 20, the user captures encrypted data from the memory means 20 and executes the decoding in the reproducing unit 14 of the reproducing means 10, using a contents decoding key, that is a decoding key, to acquire and reproduce decoded data from the encrypted data.

[0019] For utilizing the ciphered contents, it is necessary to acquire the authentic use rights for the contents from the contents use right sale center and to purchase the key applicable to the decoding of the ciphered contents. As a method for payment of the purchase fee, there are a variety of methods, such as (1) inputting a credit card number from a terminal for transmission to the contents use right sale center, (2) inputting a bank account number of the user from a terminal for transmission to the contents use right sale center, (3) making user registration at the contents use right sale center in advance to register the credit card number or a bank account number so that the contents use right sale center effects debit based on the pre-registered data, and (4) using electronic money for payment.

[0020] In the above payment methods (1) to (3), the user credit numbers or the bank account numbers are needed. So, for the nonaged users not having the credit card or the bank account, difficulties are met in taking the payment procedure. Recently, the transaction of the contents occurs in smaller units, such that, in distributing music contents, the unit of transaction may be a sole music number. In such case, the contents fee is on a small value of 100 or 1000 yen. The form of transaction in which presentation of the credit number or the bank account number is needed tends to obstruct the flow of circulation of contents.

[0021] The use of electronic money in (4) is as yet on the tentative stage such that its form of utilization has as yet not been established, while it is not in extensive use at large.

DISCLOSURE OF THE INVENTION

[0022] The present invention has been made in view of the above-described status of the prior art and aims at providing an information transaction system and an information transaction method of a simplified structure and configuration in which credit card numbers, bank account numbers or electronic money is not used in the sale of using rights of the majority of software contents, such as game programs, music data or picture data.

[0023] The present invention is aimed at achieving the above purpose. The present invention provides a system comprising a user equipment for decoding and exploiting encrypted contents, and a contents use right management device, connected to said user equipment through communication means, for providing a contents key for decoding said encrypted contents through the communication means, said user equipment including means for acquiring contents using right identification data required in acquiring said contents key for decoding said encrypted contents, recorded on a using right providing medium provided off-line to the user without the interposition of said communication means, and for transmitting the acquired contents key to said contents use right management device through said communication means, said contents use right management device including means for transmitting said contents key for decoding said encrypted contents, through said communication means to said user equipment, based on said contents using right identification data received from said user device through said communication means.

[0024] The present invention also provides a method for providing a contents key for decoding encrypted contents from a contents use right management device to a user equipment for decoding the encrypted contents and using the decoded contents, through communication means, said method comprising a first step of acquiring contents use right identification data, required for acquiring a contents key for decoding the encrypted contents, recorded on a using right providing medium which is supplied to the user off-line without interposition of said communication means, and transmitting the contents use right discriminating data through said communication means from said user equipment to said contents use right management device, and a second step of transmitting said contents key for decoding said encrypted contents, through said communication means to said user equipment, based on the contents use right identification data received through said communication means from said user equipment.

[0025] The present invention also provides an apparatus, connected through communication means to a user equipment decoding and exploiting encrypted contents, for providing a contents key for decoding said encrypted contents through communication means, said apparatus comprising reception processing means for receiving contents use right identification data, required in acquiring the contents key for decoding the encrypted contents, acquired from using right providing medium provided off-line to the user without interposition of said communication means, from said user equipment, through said communication means, and transmission processing means for transmitting through said communication means to said user equipment said contents key for decoding said encrypted contents based on said contents use right identification data received from said communication means.

[0026] The present invention also provides an apparatus connected through communication means to a contents use right management device for providing a contents key for decoding encrypted contents, said apparatus comprising acquisition means for acquiring contents use right identification data required in acquiring the contents key for decoding the encrypted contents, recorded on a using right providing medium provided off-line to a user without interposition of said communication means, transmission processing means for performing a processing of transmitting the contents use right identification data, acquired by said acquisition means, to said contents use right management device through said communication means, and reception processing means for performing the processing of receiving said contents key transmitted from said contents use right management device through said communication means, based on said contents use right identification data.

[0027] The present invention also provides an apparatus connected through communication means to a contents use right management device providing a contents key for decoding encrypted contents, in which the apparatus includes acquisition means for acquiring contents use right identification data required in acquiring the contents key for decoding the encrypted contents, recorded in a using right providing medium provided off-line to a user without intermediary of the communication means, transmission processing means for performing the processing of transmitting the contents use right identification data, acquired in the acquisition means, to the contents use right management device through the communication. means, and reception processing means for performing the processing of receiving the contents key transmitted from the contents use right management device through the communication means based on the contents use right identification data.

[0028] The present invention also provides a method for receiving a contents key for decoding encrypted contents from a contents use right management device through communication means, in which the method includes an acquisition step of acquiring contents use right identification data required in acquiring the contents key for decoding the encrypted contents, recorded in a using right providing medium provided off-line to a user without intermediary of the communication means, a transmission processing step of performing the processing of transmitting the contents use right identification data, acquired in the acquisition step, to the contents use right management device through the communication means, and a reception processing step of performing the processing of receiving the contents key transmitted from the contents use right management device through the communication means based on said contents use right identification data.

[0029] The present invention also provides a program providing medium for providing a computer program processed in an information processing apparatus connected through communication means to a contents use right management device providing a contents key for decoding encrypted contents, in which the computer program includes an acquisition step of acquiring contents use right identification data required in acquiring the contents key for decoding the encrypted contents, recorded on a using right providing medium furnished off-line to a user without intermediary of the communication means, a transmission processing step of performing the processing of transmitting the contents use right identification data, acquired in the acquisition means, to the contents use right management device through the communication means, and a reception processing step of performing the processing of receiving the contents key transmitted from the contents use right management device through the communication means based on said contents use right identification data. dr

BRIEF DESCRIPTION OF THE DRAWINGS

[0030]FIG. 1 illustrates the configuration of utilization of the encrypted contents in the prior art.

[0031]FIG. 2 illustrates a structure of a data processing apparatus usable in an information transaction system according to the present invention.

[0032]FIG. 3 illustrates the configuration of circulation of the contents in the information transaction system of the present invention and the circulation configuration of the contents use right discrimination card.

[0033]FIG. 4 shows a data structure of the contents use right discrimination card in the information transaction system of the present invention.

[0034]FIG. 5 shows a data structure of a database of a contents use right sale center in the information transaction system of the present invention.

[0035]FIG. 6 illustrates the structure of a user terminal, contents use right sale center and a contents provider in the information transaction system of the present invention.

[0036]FIG. 7 illustrates signature generation in the contents use right discrimination card in the information transaction system of the present invention.

[0037]FIG. 8 is a flowchart for illustrating the signature generation in the contents use right discrimination card in the information transaction system of the present invention.

[0038]FIG. 9 is a flowchart for illustrating the signature verification in the contents use right discrimination card in the information transaction system of the present invention.

[0039]FIG. 10 illustrates reciprocal authentication processing in the information transaction system of the present invention.

[0040]FIG. 11, similarly to FIG. 10, illustrates reciprocal authentication processing in the information transaction system of the present invention.

[0041]FIG. 12 illustrates the structure of an open key certificate used in the reciprocal authentication processing in the information transaction system of the present invention.

[0042]FIG. 13 illustrates the structure of re-sale of the contents use right discrimination card in the information transaction system of the present invention.

[0043]FIG. 14 shows the data structure of the database of the contents use right sale center in the information transaction system of the present invention.

BEST MODE FOR CARRYING OUT THE INVENTION

[0044] Referring to the drawings, a preferred embodiment of the present invention will be explained in detail.

[0045]FIG. 2 shows a block diagram showing an embodiment of a data processing apparatus as a user terminal used in the information transaction system of the present invention. The data processing apparatus is comprised mainly of a recording and/or reproducing unit 300 and a recording device 400.

[0046] The recording and/or reproducing unit 300 is comprised e.g., of a personal computer (PC) or a game equipment. Referring to FIG. 2, the recording and/or reproducing unit 300 is made up of a controller 301 for executing comprehensive control inclusive of communication control with the recording device 400 in ciphering in the recording and/or reproducing unit 300, a cipher processor 302 responsible for ciphering processing at large, a recording device controller 303 for executing authentication processing with the recording device 400 connected to the recording and/or reproducing unit to effect data read/write processing, a readout unit 304 for reading out at least data from a medium 500, such as DVD, and a communication unit 305 for data transmission/reception with outside.

[0047] The recording and/or reproducing unit 300 downloads contents data for the recording device 400, while reproducing the contents data from the recording device 400, under control by the controller 301. The recording device 400 is a recording medium preferably detachable from the recording and/or reproducing unit 300 and includes an external memory 402 formed by a non-volatile memory, such as flash memory, a hard disc or a RAM fitted with a cell.

[0048] The recording and/or reproducing unit 300 includes a readout unit 304, as an interface that may be fed with contents data stored in the recording medium, shown on the left end of FIG. 2, such as DVD, CD, FD or HDD, and a communication unit 305, as an interface that may be fed with contents data distributed from the network, such as Internet.

[0049] The recording and/or reproducing unit 300 includes a cipher processor 302 for executing authentication processing, encryption processing, decoding processing and data verification processing in downloading the contents data input from outside through the readout unit 304 or the communication unit 305. The cipher processor 302 holds a controller 306 for controlling the cipher processor 302 in its entirety, an internal memory 307 holding the information such as cipher processing and adapted to render data readout from outside extremely difficult, and a coding/decoding unit 308 responsible for encryption, decoding, generation and verification of data for authentication or generation of random numbers.

[0050] The controller 301 performs mediation control in the reciprocal authentication processing between the contents use right sale center, explained with reference to FIGS. 3ff., connected through the recording and/or reproducing unit 300 and the communication unit 305 and the cipher processor 302, mediation control in the decoding processing in the cipher processor 302 of the contents key encrypted with a session key and sent in this encrypted state, transmission of an initializing command for the recording device 40 through the recording device controller 303 on loading of the recording device 40, reciprocal authentication processing between the coding/decoding unit 308 of the cipher processor 302 of the recording and/or reproducing unit 300 and the recording device 400 and mediation control in the various processing operations, such as check value collation, encryption or decoding operations.

[0051] The cipher processor 302 executes authentication processing, encryption processing, decoding processing and data verification processing, and includes the controller 306, internal memory 307 and the coding/decoding unit 308, as described above.

[0052] The controller 306 of the cipher processor 302 is a controller for executing control pertinent to the cipher processing in general, such as authentication processing and coding/decoding, executed in the recording and/or reproducing unit 300. the controller 306 performs control for the encryption processing in general, such as control of the reciprocal authentication processing executed in the contents use right sale center, explained with reference to FIG. 3ff., control of the reciprocal authentication processing executed between the recording and/or reproducing unit 300 and the recording device 400, and control of various processing executed in the coding/decoding unit 308 of the cipher processor 302 in the recording and/or reproducing unit 300, such as downloading or issuing commands for execution of encryption processing for replay contents data.

[0053] The internal memory 307 holds key data required in reciprocal authentication processing, encryption or decoding, executed in the recording and/or reproducing unit 300, or identification data for the recording and/or reproducing unit. The identification data of the recording and/or reproducing unit are required in the reciprocal authentication processing with the contents use right sale center, as will be explained with reference to FIG. 3ff. The identification data is also used as data registered in a database of the contents use right sale center.

[0054] The coding/decoding unit 308 executes the processing, such as authentication processing, encryption processing, decoding processing, data verification or random number generation in downloading contents data input from outside on the recording device 400 or in reproducing and executing the contents data from the recording device 400, with the aid of e.g., the key data stored in the internal memory 307.

[0055] It should be noted that the internal memory 307, holding the crucial information, such as secret key, need to be invulnerable to illicit readout from outside. So, the cipher processor 302 is formed by a semiconductor chip scarcely accessible from outside, and is of a multi-layered structure, with an internal memory being a tamper-proof memory scarcely readable illicitly from outside, by being sandwiched by a dummy layer, e.g., an aluminum dummy layer or as a lowermost layer, or by the low operating voltage and/or narrow frequency width.

[0056] In addition to the above-described cipher processing function, the recording and/or reproducing unit 300 includes a central processing unit (main CPU) 106, a random access memory (RAM) 207, a read-only memory (ROM) 108, an AV processor 109 and an SIO (serial I/O interface) 112.

[0057] The central processing unit (main CPU) 106, a random access memory (RAM) 107 and a read-only memory (ROM) 108 operate as a control system for the main body portion of the recording and/or reproducing unit 300, and mainly operate as a replay processor for reproducing data decoded by the cipher processor 302 of the recording and/or reproducing unit 300. For example, these units perform control pertinent to reproduction and execution of the contents, such as outputting contents data read out and decoded by the recording device to the AV processor 109 under control by the controller 301.

[0058] The RAM 107 is used as a main storage memory for performing various processing in the CPU 106, that is, as a work area for processing by the main CPU 106. In the ROM 108, there is stored e.g., a basic program for booting the OS which is started by the main CPU 106.

[0059] Specifically, the AV processor 109 has the data compressing/expanding function, such as that of an MPEG2 decoder, ATRAC decoder or MP3 decoder, and executes the processing for outputting data to a data outputting equipment, such as a display or a loudspeaker, annexed or connected to the main body portion of the recording and/or reproducing unit.

[0060] An input/output interface 110 outputs input data from a variety of inputting means connected thereto, such as controller, keyboard, or mouse, to the main CPU 106. Based on the game program, then running, the main CPU 106 executes the processing conforming to the user command from the controller.

[0061] A parallel I/O interface (PIO) 111 and a serial I/O interface (SIO) 112 are used as a connection interface with respect to the memory devices, such as a memory card or a game cartridge, or a portable electronic equipment.

[0062] The main CPU 106 also exercises control for storing setting data pertinent to the game being executed as data for saving. For this processing, data for storage is transferred to the controller 301 which causes the cipher processor 302 to execute the ciphering for the saved data as necessary to store the encrypted data in the recording device 400.

[0063] The recording device 400 preferably is a recording medium detachably mounted on the recording and/or reproducing unit 300 and is formed e.g., by a memory card. The recording device 400 includes a cipher processor 401 and an external memory 402.

[0064] The cipher processor 401 of the recording device 400 is a processor for executing downloading of contents data from the recording and/or reproducing unit 300, reciprocal authentication processing between the recording and/or reproducing unit 300 and the recording device 400 during reproduction of the contents data from the recording device 400 to the recording and/or reproducing unit 300, encryption or decoding processing or data verification processing. Similarly to the cipher processor of the recording and/or reproducing unit 300, the cipher processor 401 includes a controller, an internal memory and a coding/decoding unit. The external memory 402 is formed by a non-volatile memory, such as EEPROM or flash memory, a hard disc or a RAM fitted with a cell, and holds contents data, as described above.

[0065] A contents provider, supplying many software contents, such as game program, music data or picture data, or the contents use right sale center supervising the use rights of the contents, encrypts the contents it provides to send the encrypted contents to the user through mediums, such as DVD or CD, or over a network. If the contents are to be circulated through mediums, such as DVD or CD, a card stating an identifier proving the contents use rights, referred to below as contents use right discrimination card, is sealed so as not to be seen from outside and co-packed in the medium for sale. It is also possible to hide the identifier stated on the contents use right discrimination card with a pre-set member so that the user when using the contents dismounts the member hiding the identifier to recognize the identifier. The card may, for example, be in the form of a scratch card.

[0066] If the contents are distributed over the network, the card stating the identifier testifying to the contents use rights, that is the contents use right discrimination card, is not traded on-line, but is traded off-line, that is via e.g., a retail store, so that the contents use right discrimination card will be sold apart from the contents. The contents use right discrimination card again is sealed in a package so as not to be seen from outside or is designed as a scratch card.

[0067]FIG. 3 illustrates a user terminal, a contents provider, and the manner of circulation of the contents, contents use right discrimination cards and the contents use rights (contents keys used as decoding keys).

[0068] In FIG. 3, a user (user terminal) 601 is a recording and/or reproducing unit, explained for example by referring to FIG. 2. The user terminal 601 may also be a terminal installed in a personal computer or a game equipment, owned by the user, or in a common space, such as railway station or a convenience store, so as to be used by unidentified users at large.

[0069] The user desirous to use various contents, such as music, pictures, or game programs, exploits the user terminal 601 to have encrypted contents distributed from contents providers 602 to 604 over the network, or acquires the contents through a medium 606. Moreover, the contents purchaser buys and receives the contents use right discrimination card as he or she acquires the contents.

[0070] The contents use right discrimination card is a card on which is recorded the identifier necessary in acquiring the decoding key of the encrypted contents. If the distribution route of the encrypted contents is via mediums, such as DVD or CD, the contents use right discrimination card is co-packed with the mediums, whereas, if the distribution route of the encrypted contents is over the network, the contents use right discrimination cards are distributed or sold independently. Meanwhile, in case of distribution of the contents through mediums, the contents use right discrimination cards are distributed or sold independently, without being co-packed with the mediums. In any of these cases, the contents use right discrimination cards are distributed or sold in a sealed fashion, or as a scratch pad, so that the identifier data will not be observed from outside on the circulation channel.

[0071] The contents providers 602to 604, providing the encrypted contents to the user, collect the contents use fee responsive to the providing of the contents use right discrimination card to the users, to omit the transaction of on-line fee collection from the users. Meanwhile, the assignment of the counter-values responsive to the providing of the contents use right discrimination card to the users may be suitably made among the contents providers, the contents use right sale center and even the retail stores etc. which have sold the contents use right discrimination card.

[0072]FIG. 4 shows a typical identification data recorded on the contents use right discrimination card. That is, FIG. 4 shows that the contents identifier (ID) for discriminating the contents to be used, serial numbers and electronic signature are recorded as the identification data. The contents identifier (ID) is data for the user to discriminate the contents scheduled to be used and which has been acquired from the from the contents providers through the medium or over the network. The serial numbers are numbers afforded to the respective contents use right discrimination cards and represent the numbers for identifying the respective contents use right discrimination cards. The electronic signature is the executed by an organization issuing or supervising the contents use right discrimination cards. Meanwhile, in FIG. 4, the electronic signature is used as a check data recorded in the contents use right discrimination card. Alternatively, the electronic signature may not be used, but only simplified check data, such as check sum, may be afforded in its stead.

[0073] Reverting to FIG. 3, explanation on the manner of circulation of contents, the contents use right discrimination cards and the contents use rights (decoding keys) among the user terminal, contents providers and the contents use right sale center is continued.

[0074] The user (user terminal 601), purchases and receives the contents use right discrimination card, configured as explained with reference to FIG. 4, simultaneously with the medium 606, or over a separate route.

[0075] The user 601, who has purchased and received the contents use right discrimination card, sends the identification data, recorded on the contents use right discrimination card, and which is made up of the contents ID, serial number and the electronic signature, to the contents use right sale center 605 over a network 607.

[0076] The contents use right sale center 605 is managing the information pertinent to the issued contents use right discrimination card by its database, and also manages data indicating as to whether or not the decoding key for the contents associated with the contents use right discrimination card identified by the serial number has already been distributed. The contents use right sale center 605 decides whether or not the identification data, recorded on the contents use right discrimination card received from the user, and which are formed by the contents ID, serial number and the electronic signature, are authentic data. The contents use right sale center 605 also discriminates the contents to decide whether or not the key has already been distributed.

[0077] If, after checking for these items, the contents use right sale center 605 has decided that the contents use right be issued to the user, the decoding key (contents key) is distributed to the to the user. Meanwhile, in consideration of safety in communication over the network, the contents key is desirably sent in an encrypted form. So, the contents key is encrypted by the session key co-owned after reciprocal authentication processing with the user terminal and sent in this encrypted form. The user who has received the key decodes the encrypted contents key received with the session key to execute the decoding processing of the encrypted contents using the decoded contents key to render the contents usable.

[0078]FIG. 5 shows a database for the contents use right discrimination cards owned by the contents use right sale center 605. In the database, there are stored such information as the contents identifier (ID) for discriminating the contents to be used, the serial numbers, the number of times of sale of the use rights (decoding keys) or the information on the purchasers of the use rights. The contents identifier (ID) and the serial numbers are data corresponding to data in the contents use right discrimination card explained with reference to FIG. 4. The number of times of sale of the use rights, which will be explained further subsequently, records the number of times of sale of the use rights when the use rights are sold plural times by re-sale of one contents use right discrimination card. The purchaser information records the identification data of the purchasers. Among the other information recorded there are the re-sale possibility of the contents use right discrimination card associated with the serial number and the number of times of re-sale in case of resale being possible. The re-sale will be explained subsequently.

[0079] In the case of FIG. 5, upper two columns denote the contents use right discrimination cards that can be re-sold, two mid columns indicate the contents use right discrimination cards that cannot be re-sold and two lower columns indicate the contents use right discrimination cards that can be re-sold within the maximum number of times of sale as set.

[0080]FIG. 6 shows a block diagram for the contents use right sale center, contents providers and the user terminals forming the information transaction system of the present invention. A user terminal 900 is similar to the recording and/or reproducing unit 300, explained with reference to FIG. 2, and the same reference numerals are used to depict the same components. The respective components of the recording and/or reproducing unit 300 have already been explained in FIG. 2 and are not explained here in detail.

[0081] Referring to FIG. 6, a contents use right management center 700 includes a communication unit 703, for executing communication with a user terminal 900, a controller 701 for exercising comprehensive control inclusive of the communication control, cipher processor 702, taking charge of the cipher processing in general, a database 704 holding management data of the contents use right discrimination cards, explained in connection with FIG. 5, and a contents key storage memory 705 for holding the contents key used for decoding the contents. The cipher processor 702 executes reciprocal authentication processing with respect to the user terminal 900, session key generation and encryption of the contents key with the session key.

[0082] A contents provider 800 has a configuration of supplying the encrypted contents to the user through a medium 500 or over a communication means 600, such as network, and is comprised of a contents database 804, a cipher processor 802 for executing the encryption processing of the contents, a communication unit 803 for executing communication with the user terminal and a controller 801 for executing comprehensive control including communication control. Meanwhile, the structure of the contents provider 90 is merely illustrative. If, for example, the provider simply supplies only the medium, no communication means is required.

[0083] Although the contents management center and the contents provider are shown in FIG. 6 as being independent means, the functions of the contents management center and the contents provider may also be provided by sole means having the two functions in combination.

[0084] The sequence of processing operations, executed in the configuration of FIG. 6, is explained in detail. First, the contents use right discrimination card, explained with reference to FIG. 4, is created by the contents use right management center 700 in association with distribution of the contents from the contents provider 800. The contents use right management center 700 affords the contents identifier to the newly distributed contents, while affording the serial number to each contents use right discrimination card issued and generating electronic signature for these contents identifiers and the serial numbers to generate the contents use right discrimination cards having the data explained with reference to FIG. 4 to provide the card as it is co-packed in the in the contents supplied by the contents provider, such as the medium. If the contents provider provides the contents by network distribution, the contents use right discrimination card is sold and distributed over a route different from that for the contents, for example, in a specified retail store.

[0085] Although the case in which the contents use right management center 700 prepares the contents use right discrimination card is explained here, it is also possible for the contents provider to prepare the contents use right discrimination card and to provide the information on contents use right discrimination card thus prepared so that the subsequent use right distribution procedure will be taken charge of by the contents use right management center 700.

[0086] As typical of the method for generating the electronic signature data, which is constituent data of the contents use right discrimination card, a case of employing DES in the common key encryption system is hereinafter explained. Meanwhile, FEAL (fast encipherment algorithm: NTT) or AES (advanced encryption standard, next generation standard cipher of the United States), may also be used in place -of DES as the processing in the similar common key encryption system.

[0087] Referring to FIG. 7, the method for generating the electronic signature using the routine DES is explained. Before generating the electronic signature, a message for which an electronic signature is to be generated is divided every 8 bytes. The divided message portions are designated M1, M2, . . . , MN. An initial value IV is exclusive-ORed with M1 to give a result 12 which is input to a DES encryption unit and encrypted using a key K1 to give an output E1. This output then is exclusive-ORed with M2 to find an output 12. This output 12 is fed to the DES encryption unit where it is encrypted using the key K1 to give an output E2. The above-mentioned sequence of operations is repeated to encrypt the totality of the message portions. The last result EN represents the electronic signature. This value is generally termed a message authentication code (MAC) and is used to check for possible message counterfeiting. This system of linking to the encrypted message is called CBC (cipherblock chaining). In verifying the MAC value, the operator generates the MAC value in the same way as when generating the MAC and, if the two values coincide, the verification is successful.

[0088] In the contents use right discrimination card, used in the information transaction system of the present invention, the contents ID and the serial number, associated with the message being verified, are contained, as explained with reference to FIG. 4. Thus, an electronic signature is generated with these data or data derived from these data as a message to be input to the DES cipher processor shown in FIG. 7.

[0089] The method for generating an electronic signature using the open key encryption system is now explained with reference to FIG. 8. The processing shown in FIG. 8 is the processing flow for generating the electronic signature employing the EC-DSA(elliptic curve digital signature algorithm, IEEE P1363/D3). Here, a case of using an elliptic curve cryptography (ECC) as the open key cipher is explained. In the data processing apparatus of the present invention, an RSA code (Rivest, Shamir, Adleman, ANSI X9.31) in the similar open key cipher system may also be used.

[0090] The respective steps of FIG. 8 are explained. At step S1, p is the number of marks, a and b are coefficients of the elliptical curve (y2=x3+ax+b). G is a base point on the elliptical curve, r is the number of orders of G, and Ks is a secret key (0<Ks<r). At step S2, the hash value of the message M is calculated to give f=Hash(M).

[0091] The method of finding the hash value using the Hash function is explained. The Hash function is such a function in which a message is input and compressed to data of a pre-set bit length to output the compressed data as the hash value. The hash function has a feature that an input is difficult to predict from the hash value (output), and that, if one bit of input data to the hash function is changed, many bits of the hash value are changed, while it is difficult to find the different input data having the same hash value. As the hash function, MD4, MD5 or SHA-1 may be used, while DES-CBC may be used. In such case, the MAC (check value: corresponding to ICV) as the ultimate output value, represents the hash value.

[0092] Then, at step S3, a random number u (0<u<r) is generated and, at step S4, a coordinate corresponding to the base point tomes u (Xv, Yv) is calculated. Meanwhile, addition and multiplication by 2 on the elliptical curve are defined as follows:

[0093] Provided that P=(Xa, Ya), Q=(Xb, Yb), R =(Xc, Yc)=P+Q and if P≈0 (addition)

Xc=λ2−Xa−Xb

Yc=λ×(Xa−Xc)−Ya

λ=(Yb−Ya)/(Xb−Xa)

[0094] whereas, if P=Q (multiplication by 2)

Xc=λ2−2Xa

Yc=λ×(Xa−Xc)−Ya

λ=(3(Xa)2+a)/(2Ya)

[0095] Using these, the point G times u is calculated. Although the operating speed is low, the calculating method which is easiest to understand is as follows: G, 2×G, 4×G, . . . are calculated and u is expanded into a binary number and 2i×G (G multiplied by 2 i times) is added to 1 in the resulting binary number, where i is the bit position of u as counted from its LSB.

[0096] At step S5, c=Xvmod r is calculated and, at step S6, it is verified whether or not this value is 0. If the value is not 0, d=[(f+cKs)/u] mod r is calculated at step S7. At step S8, it is checked whether or not d is 0. If d is not 0, c and d are output as electronic signature data. If r is of a 16-bit length, the electronic signature data is 320 bits long.

[0097] If c=0 at step S6, processing reverts to step S3 to re-generate a new random number. Similarly, if d=0 at step S8, processing reverts to step S3 to re-generate a random number.

[0098] The method for verifying the electronic signature using the open key encryption system is explained with reference to FIG. 9. At step S11, M is a message, p is the number of marks, a and b are coefficients of the elliptical curve (y2=x3+ax+b), G is a base point on the elliptical curve, r is the number of orders of G, and Ks×G is a secret key (0<Ks<r). At step S12, it is verified whether or not the electronic signature data c and d are such that 0<c<r and 0<d<r. If this condition is met, the hash value of the message M is calculated at step S13 to set f=Hash(M). Next, h=1/d mod r is calculated at step S14 and, at step S15, h1=fh mod r and h2=ch mod r are calculated.

[0099] At step S16, h1 and h2, already calculated, are used to calculate a point P=(Xp, Yp)=h1×G+h2·Ks×G. Since the electronic signature verifier knows the open key G and Ks×G scalar-tupled values of points on the elliptical curve can be calculated, as at step S4 of FIG. 8. At step S17, it is checked whether or not the point P is a point at infinity. If the point P is not a point at infinity, processing transfers to step S18. It is noted that decision as to the point P being or not being a point at infinity may be given at step S16. That is, if the point P=(X, Y) is summed to the point Q (X,−Y), λ cannot be calculated, meaning that P+Q is at infinity. At step S18, Xp mod r is calculated and compared to the electronic signature c. If finally this value is coincident, processing transfers to step S19 to verify that the electronic signature is correct.

[0100] If the electronic signature is found to be correct, it may be seen that the data has not been counterfeited, thus indicating that the person who is the owner of the secret key for the open key has generated the electronic signature.

[0101] If, at step, the electronic signature data are not such that 0<c<r nor 0<d<r, processing transfers to step S20. If, at step S17, the point P is a point at infinity, processing transfers similarly to step S20. Moreover, if, at step S18, the value of Xp mod r is not coincident with the electronic signature data c, processing transfers similarly to step S20.

[0102] If, at step S20, the electronic signature is found to be not correct, it may be seen that the data has been counterfeited, or that the person who generated the electronic signature is not person who is the owner of the secret key for the open key.

[0103] In the contents use right discrimination card, used in the information. transaction system of the present invention, an electronic signature is prepared in the contents use right management center 700 or in the contents provider 800 and verified in the contents using right management center. If the electronic signature is prepared in the contents provider 800 and verified in the contents use right management center 700, the contents use right management center is configured for holding key for verification of the electronic signature matched to the contents provider 800 which prepared the signature.

[0104] Reverting to FIG. 6, the explanation on the procedure of distributing the contents using rights is continued. In FIG. 6, the user terminal 900 acquires contents or transmits identification data, recorded on the contents use right discrimination card, purchased through a separate route, to the contents use right management center 700 over communication means 600. The contents use right management center 700 verifies the signature on the data of the contents use right discrimination card transmitted from the user terminal 900 by the technique described above to check for possible data counterfeiting.

[0105] After verifying through signature verification that data has not been counterfeited, the contents use right management center 700 extracts from the database 704 the data coincident with the contents ID and the serial number in the identification data sent from the user (see FIG. 5). If the number of times of sale of corresponding data is zero, it is confirmed that the using right (contents key) has not as yet been distributed as for-the contents use right discrimination card, that is that the impending distribution is the first distribution. Thus, the contents key is taken out from the contents key storage memory 705 and transmitted to the user. Preferably, the contents key is transmitted in the encrypted form. Meanwhile, the number of times of sale of corresponding data in the database 704 is set to “1” at the same time as the contents key is transmitted to the user.

[0106] Meanwhile, the contents key is preferably transmitted from the contents use right management center 700 to the user terminal 900 after encrypting the contents key in the cipher processor 702, in view of safety in communication over the network. For encrypting the contents key, encryption processing employing a common key in accordance with the common key encryption method, employing a secret key of the contents use right management center or employing a session key generated by reciprocal authentication processing with the contents use right management center 700, may be used. The reciprocal authentication processing is hereinafter explained.

[0107] The reciprocal authentication processing employing the common key encryption method is explained with reference to FIG. 10. Although DES is used as the common key encryption method, any suitable system may be used if the system is the common key encryption method. In FIG. 10, one of A and B corresponds to the user terminal 900 in FIG. 6, with the other corresponding to the contents use right management center 700.

[0108] First, B generates a 64-bit random number Rb and transmits Rb and an ID(b) as its ID to A. On receipt of the transmitted data, A newly generates a 64-bit random number Ra and encrypts the data, in the order of Ra, Rb and ID(b), in the CBC mode of the DES, using a key Kab, to return the encrypted data to B. In the CBC mode processing configuration of DES, shown in FIG. 7, Ra corresponds to M1, Rb corresponds to M2 and ID(b) corresponds to M3, with the outputs E1, E2 and E3 for the initial value IV=0, being the cipher text.

[0109] On receipt of the cipher text, B decodes it with the key Kab. In decoding the received data, the cipher text E1 is decoded with the key Kab to acquire a random number Ra. The cipher text E2 then is decoded with the key Kab and the result obtained is exclusive-ORed with E1 to acquire Rb. Finally, the cipher text E3 is decoded with the key Kab and the result obtained is exclusive-ORed with E2 to acquire (ID)b. Of Ra, Rb and ID(b), thus obtained, Rb and ID(b) are verified as to whether or not these coincide with the data transmitted by B. If the data has passed the verification, B authenticates A as being valid.

[0110] The, B generates a session key Kses used after authentication, by a method employing random numbers. Rb, Ra and Kses are encrypted, in this order, in the CBC mode of DES, to return the encrypted data to A.

[0111] On receipt of the returned data, A decodes it with the key Kab. The method for decoding the received data is similar to that used in the decoding processing for B and hence is not explained further. Of Rb, Ra and Kses, thus obtained, Rb and Ra are verified as to whether or not these coincide with the data transmitted by A. If the data has passed the verification, A authenticates B as being valid. After reciprocal authentication, the session key Kses is used as a common key for confidential communication following authentication.

[0112] If, in verifying the received data, illicitness or non-coincidence is found, the processing is discontinued on the assumption that the reciprocal authentication has failed.

[0113] The method of reciprocal authentication employing the elliptical ElGamar cipher 160 bits long, as an open key encryption system, is explained with reference to FIG. 11. Although ECC is used as the open key encryption system, any suitable system may be used if it is of the open key encryption system. The key size need not be 160 bits. In FIG. 11, B first generates a 6-bit random number Rb to transmit it to A. On receipt of the transmitted data, A newly generates a 64-bit random number Ra and a random number Ak smaller than the number of marks p. A point obtained on Ak-tupling the base point G, or a point Av=Ak×G, is found and an electronic signature A.Sig for Ra, Rb and Av (X- and Y-coordinates) is generated and returned to B along with the open key certificate of A. Since Ra and Rb are both 64 bits and the X- and Y-coordinates of Av are both 160 bits, an electronic signature for a sum total of 448 bits is generated. The method for generating the electronic signature has already been explained with reference to FIG. 8 and hence is not explained here for simplicity.

[0114] The open key certificate is issued by the Certificate Authority (CA). It is prepared by the Certificate Authority in the open key encryption system when the user submits his or her ID and the open key, with the Certificate Authority then appending the ID of the Certificate Authority and the information on the term of validity and the signature by the Authority.

[0115] Atypical open key certificate is shown in FIG. 12, from which it is seen that the certificate includes a version number of the certificate, a serial number of the certificate assigned by the Authority to the certificate user, an algorithm and parameters used in the electronic signature, name of the Authority, term of validity of the certificate, name of the certificate user and the open key and the electronic signature of the certificate user.

[0116] The electronic signature is such data generated by applying a hash function to the serial number of the certificate assigned by the Authority to the certificate user, an algorithm and parameters used in the electronic signature, name of the Authority, term of validity of the certificate, name and the open key of the certificate user to generate the hash function and by applying the secret key of the Authority to the hash value. For generating the electronic signature, the processing flow explained for example with reference to FIG. 6 is applied.

[0117] The Authority issues an open key certificate, shown in FIG. 12, while updating the open key certificate, the term of validity of which has lapsed, preparing, supervising and distributing the list of unauthorized users for excluding the users who made illicit acts. This operation is termed revocation. The Authority also generates open and secret keys as necessary.

[0118] On the other hand, if this open key certificate is to be used, the user uses the open key of the Authority to the certificate user the or she owns, verifies the electronic signature of the open key certificate and takes out the open key from the open key certificate after having won success in the verification of the to exploit the open key certificate to exploit the open key. Consequently, the totality of the users exploiting the open key certificate must needs own the open key of the common authentication office. Meanwhile, the method for verifying the electronic signature has already been explained with reference to FIG. 9 and hence is not explained in detail.

[0119] Reverting to FIG. 11, B who has received the open key certificate, Ra, Rb, Av and the electronic signature of A verifies whether or not Rb, transmitted from A coincides with those generated by B. If the results indicate coincidence, B verifies the electronic signature in the open key certificate of A, with the open key of the authentication office, to take out the open key of A. Using the open key of A, thus taken out, B verifies the electronic signature A.Sig. The method for verifying the electronic signature has already been explained with reference to FIG. 9 and hence is not explained in detail. After having won success in the verification of the electronic signature, B authorizes A as being just.

[0120] The, B generates a random number smaller than the target number p. Then, B finds a point Bv=Bk×G, corresponding to the base point G times Bk, to generate the electronic signature B.Sig for Rb, Ra and Bv (X- and Y-coordinates) to return the generated electronic signature to A along with the open key certificate of B.

[0121] A who has received the open key certificate of B, Rb, Ra, Bv and the electronic signature of B, verifies whether or not Ra transmitted from B coincides with that generated by A. In case of coincidence, A verifies whether or not Ra transmitted from B coincides with that generated by A. In case of coincidence, A verifies the electronic signature in the open key certificate of the authentication office to take out the open key of B. Using the open key of the authentication office, A verifies the electronic signature in the open key certificate of B to take out the open key certificate of B. After having won success in verifying the electronic signature, A authorizes B as being just.

[0122] If both A and B have won success in authentication, B calculates Bk×Av, while A calculates Ak×Bv to use lower 64 bits of the X-coordinate of these points as a session key in the subsequent communication. It should be noted that a scalar number times the point on an elliptical curve is required since av is a point on the elliptical curve although Bk is a random number. Meanwhile, it is assumed that the common key cipher is a common key cipher of a 64 bit key length. Of course, the session key may be generated from the Y-coordinate while the lower 64 bits are not essential. In secret communication following reciprocal authentication, the transmission data is not only encrypted with the session key but also an electronic signature may be appended thereto.

[0123] If, at the time of verification of the electronic signature or reception data, illicitness or non-coincidence has been found, the processing is aborted on the assumption that the reciprocal authentication has resulted in failure.

[0124] In the above-described reciprocal authentication, the contents use right sale center 700 encrypts the contents key, using the generated session key, to send the encrypted contents key to the user terminal 900.

[0125] The user terminal 900, which has received the encrypted contents key, executes the decoding processing of the contents key, using the session key generated at the time of authentication processing in the cipher processor 302. The contents key, obtained by the decoding processing, is able to decode the contents recorded on the contents using right identification card, that is the encrypted contents received via the medium 500 or the communication means 600. The user utilizes this contents key to execute the decoding processing of the encrypted contents to decode the contents into usable data.

[0126] In the transaction system and method of the present invention, there is no necessity for e.g., the contents provider or the contents distributors to construct an on-line settlement system with a credit card or a bank account designation. On the contrary, the contents provider or the contents distributors are able to recover the contents using fee as the sale fee of the contents using right through a circulation route of the contents using right identification card, thus facilitating the utilization of the contents by the user not having a credit card nor a bank account.

[0127] In the foregoing description, it is assumed that the contents provider executes lumped preparation and distribution of the contents. Alternatively, the contents provider may prepare contents, in which case the service provider who has the contents purveyed from the contents provider performs encryption and distribution services of contents prepared by the contents provider (procedure shown at 4 in the figure).

Resale of Contents Use Right

[0128] In the above explanation, distribution of the contents key based on the contents using right identification card is performed only once and for all. However, with the use of the contents using right identification card in the information transaction system and method of the present invention, such a configuration is realized in which, by transferring the same contents using right identification card from a user who has acquired the card to other users, the other users to whom the card has been assigned newly acquires the contents key from the contents using right management center based on the contents using right identification card. This configuration will now be explained.

[0129]FIG. 13 shows a configuration in which a contents using right identification card is transferred among users and in which different users acquire the contents key based on the same contents using right identification card. In FIG. 13, a user (user terminal) 1301 acquires encrypted contents from a contents provider 1303 to purchase a contents using right identification card (procedure shown at 1 in FIG. 13).

[0130] The user (user terminal) 1301 transmits the identification data of the contents using right identification card to a contents using right management center 1304 (procedure shown at 2 in the figure), in accordance with the aforementioned procedure, to accept the contents key (procedure shown at 3 in the figure), to decode the contents to utilize the contents. The user (user terminal) 1301 assigns the medium in which the encrypted contents have been stored and the contents using right identification card to a user (user terminal) 1302.

[0131] The user (user terminal) 1301 transmits the identification data of the contents using right identification card assigned thereto to the contents using right management center 1304 (procedure shown at 5 in the figure) to receive the contents key (procedure shown at 6 in the figure) to decode and utilize the contents.

[0132] Meanwhile, the collection from the user (user terminal) 1302 of the contents using fee in this case may be by a conventional credit card and charge recovery by the bank account designation. Alternatively, the pricing of the contents using right identification card corresponding to the number of times of possible resale as set on the contents using right identification card may be set for sale to the first user. For example, if the price of the contents using right identification card that cannot be resold, that is the contents using right identification card which can acquire a sole contents key, is 1000 yen, that of the contents using right identification card that can be resold once, that is the contents using right identification card which is able to acquire the contents key twice, inclusive of the initial key acquisition, is 2000 yen and that of the contents using right identification card which is able to acquire the contents key three times, inclusive of the initial key acquisition, is 3000 yen, the user to whom the contents using right identification card has been transferred is not in need of taking an on-line settlement procedure. It should be noted that the card having the rights to acquire the contents key plural times, that is twice or thrice, may be soled at a discount price.

[0133] The contents use right sale center 1304 supervises the information on the possible resale of the contents using right identification cards in the database of the contents using right management center explained above with reference to FIG. 5. As may be understood from FIG. 5, serial numbers are afforded to the issued contents using contents right identification cards for identifying the respective cards and, for each of these cards, the possibility of re-sale and the maximum number of the resale N are set. In the case of FIG. 5, the cards shown in two upper rows cannot be resold, that is, these cards are the contents using right identification cards that can acquire the contents key only once. The contents using right identification cards in the two mid rows are the contents using right identification cards that can be resold without definition of the number of times of resale. The lower two cards are set to the number of times of possible resale equal to N so that it is possible to acquire the contents key up to n times from the contents use right sale center 1304.

[0134] On reception of the contents using right identification card from the user, the contents use right sale center 1304 extracts the corresponding data in the database shown in FIG. 5 to determine the transmission or non-transmission of the contents key depending on the setting information. For example, if the key received is the contents using right identification card set capable of acquiring the contents key up to n times from the contents use right sale center 1304, the number of times of resale is checked and the contents key is transmitted by a number of times not exceeding N. When the contents use right sale center 1304 has transmitted the contents key, it increments the number of times of sale of the database by 1.

[0135] Moreover, the purchaser information is recorded in the data shown in FIG. 5, such that the contents use right sale center 1304 registers the information on the user who first purchased the contents using right identification card in association with the serial number of the contents using right identification card, such that, when a request for purchasing the contents plural times based on the contents using right identification card, the contents use right sale center 1304 accords points corresponding to the number of times of purchase to offer a service of discounting the pricing of the different contents or that of the contents using right identification card depending on the points.

[0136] The serial number accorded to the contents using right identification card is preferably classified from one circulation channel to another. In this configuration, the circulating channel can be discriminated based on the serial number to prevent circulation in the market of the contents using right identification card bearing the illicit serial number from circulating in the market.

[0137] If the contents use right sale center 1304 has the user identity decision information or the user equipment information, as management data, the contents use right sale center 1304 is able to accord the points in case of use from the same user or to cope repeatedly with the request of the acquisition of the contents key from the same equipment.

[0138] An exemplary structure of the database is shown in FIG. 14. The database shown in FIG. 14 includes e.g., contents identifiers (ID) for identifying the contents to be used, serial number, number of times of sale of the using rights (decoding key), information on the purchasers of the using rights and the user equipment identification data. The contents identifiers (ID) for identifying the contents to be used, serial number, number of times of sale of the using rights (decoding key), information on the purchasers of the using rights and so forth, are data similar to those explained with reference to FIG. 5.

[0139] The user identification data is acquired from the user who transmitted the contents using right identification card data. For example, the biometric information proper t the user, such as user ID plus the password, fingerprint, iris of the voice print is registered and is received at the time of receipt of the contents using right identification card of the user by the contents use right sale center 1304 to verify the user identity to accord the points for the user if the use is by the same user.

[0140] The user equipment identification data may be configured so that an ID of the equipment being exploited by a user is registered and, if a request is from the same user equipment in acquiring the contents key, repeated transmission of the contents key is allowed. It should be noted that the decision as to the identity of the user equipment may be executed by the reciprocal authentication in FIGS. 10 and 11.

[0141] Although the present invention has been elucidated by referring to its specified embodiment, it is obvious that those skilled in the art can make correction or substitution of the embodiment without departing from the scope of the invention. That is, the foregoing description of the present invention is merely for the sake of illustration and should not be construed to limit the present invention. For verifying the purport of the present invention, reference should be made to the description of the claims.

Industrial Applicability

[0142] With the information transaction system and method according to the present invention, it is unnecessary for the contents provider or the contents distributing company to construct an on-line settlement system through credit cards or bank account designation. On the other hand, the same contents using right identification cards may be transferred between the users, while the contents key can be received plural times based on the same identification to accelerate the contents utilization. The contents provider or the contents distributing company is able to recover the contents using fee as the sale fee of the contents using right identification card through the circulation route of the contents using right identification card. This facilitates the utilization of the contents by a user who is not an owner of a credit card or a bank account. 

1. A system comprising: a user equipment for decoding and exploiting encrypted contents; and a contents use right management device, connected to said user equipment through communication means, for providing a contents key for decoding said encrypted contents through the communication means; said user equipment including means for acquiring contents using right identification data required in acquiring said contents key for decoding said encrypted contents, recorded on a using right providing medium provided off-line to the user without the interposition of said communication means, and for transmitting the acquired contents key to said contents use right management device through said communication means; said contents use right management device including means for transmitting said contents key for decoding said encrypted contents, through said communication means to said user equipment, based on said contents using right identification data received from said user device through said communication means.
 2. The system according to claim 1 wherein a contents provider or a service provider providing said encrypted contents to the user provides the using right providing medium to the user to acquire a contents using fee.
 3. The system according to claim 1 wherein said using right providing medium is configured for hiding said contents using right identification data to prohibit the recorded contents using right identification data from being observed from outside.
 4. The system according to claim 1 wherein said using right providing medium is a scratch card type medium in which the recorded contents using right identification data is concealed so as not to be observed from outside.
 5. The system according to claim 1 wherein said using right providing medium is provided to the user as being co-packed with a medium storing the encrypted contents therein.
 6. The system according to claim 1 wherein said contents use right management device includes a database for storing management data pertinent to said using right providing medium, including corresponding contents identification data of said using right providing medium and medium identification data of said using right providing medium and wherein the contents use right management device extracts the contents key for decoding corresponding contents using said database, based on said contents using right identification data received from the user, to transmit the extracted contents key to said user equipment.
 7. The system according to claim 6 wherein said database further stores the number of times of allowance in providing said contents key from one using right providing medium to another.
 8. The system according to claim 7 wherein said using right providing medium is sold tot he user at a price which is decided based on said number of times of allowance in providing said contents key.
 9. The system according to claim 7 wherein said database stores number of times of providing said contents key from one using right providing medium to another.
 10. The system according to claim 6 wherein said database includes user identification data for identifying the user provided with said contents key from one using right providing medium to another, an wherein said contents use right management device counts a number of times of use by the user, based on the user identification data.
 11. The system according to claim 10 wherein said contents use right management device counts the number of times of use by the user, based on the user identification data in said database, and accords points corresponding to the number of times of use to the user.
 12. The system according to claim 6 wherein said database includes user equipment identification data for discriminating the user equipment provided with the contents key, from one using right providing medium to another, and wherein said contents use right management device verify whether or not said contents key is to be transmitted based on said user equipment identification data.
 13. The system according to claim 1 wherein contents identification data, the medium identification data for the using right providing medium and verification data for verifying a possible counterfeiting of data are recorded on said using right providing medium.
 14. The system according to claim 13 wherein said verification data is electronic signature data by an organization issuing or managing said using right providing medium.
 15. The system according to claim 13 wherein the medium identification data of said using right providing medium is data which permits circulation channel of said using right providing medium to be discriminated.
 16. The system according to claim 13 wherein said contents use right management device executes verification processing of verification data in the contents use right identification data received from said user equipment to verify the possible counterfeiting of the contents use right identification data.
 17. The system according to claim 1 wherein said contents use right management device executes reciprocal authentication with said user equipment and transmits the contents key to the authenticated user equipment only when the authentication is validated.
 18. The system according to claim 1 wherein said contents use right management device transmits said contents key to said user equipment as the contents use right management device encrypts the contents key.
 19. The system according to claim 1 wherein said contents use right management device transmits said contents key to said user equipment as the contents use right management device encrypts the contents key transmitted to said user equipment using a session key generated at the time of reciprocal authentication with said user equipment.
 20. A method for providing a contents key for decoding encrypted contents from a contents use right management device to a user equipment for decoding the encrypted contents and using the decoded contents, through communication means, said method comprising: a first step of acquiring contents use right identification data, required for acquiring a contents key for decoding the encrypted contents, recorded on a using right providing medium which is supplied to the user off-line without interposition of said communication means, and transmitting the contents use right discriminating data through said communication means from said user equipment to said contents use right management device; and a second step of transmitting said contents key for decoding said encrypted contents, through said communication means to said user equipment, based on the contents use right identification data received through said communication means from said user equipment.
 21. The method according to claim 20 wherein a contents provider or a service provider which provides said encrypted contents to the user provides the using right providing medium to the user to acquire a contents using fee.
 22. The method according to claim 20 wherein said using right providing medium is configured for hiding said contents using right identification data to prevent the recorded contents using right identification data from being observed from outside.
 23. The method according to claim 20 wherein said using right providing medium is a scratch card type medium in which the recorded contents using right identification data is concealed so as not to be observed from outside.
 24. The method according to claim 20 wherein said using right providing medium is provided to the user as being co-packed with a medium storing the encrypted contents therein.
 25. The method according to claim 20 wherein said second step extracts the contents key for decoding corresponding contents using a database for storing management data pertinent to said using right providing medium, inclusive of corresponding contents identification data of said using right providing medium and medium identification data of said using right providing medium, based on said contents using right identification dat received from the user, to transmit the extracted contents key to said user equipment.
 26. The method according to claim 25 wherein said second step includes a step of verifying whether or not said contents key for decoding said encrypted contents is to be transmitted based on the number of times of allowance in providing said contents key from one using right providing medium stored in said database to another.
 27. The method according to claim 26 wherein said using right providing medium is sold to the user at a price which is decided based on said number of allowance in providing said contents key.
 28. The method according to claim 26 wherein said second step includes a step of storing the number of times of providing said contents key in said database from one using right providing medium to another.
 29. The method according to claim 25 wherein said second step includes a step of counting the number of times of use by the user, based on user discrimination data for identifying the user provided with said contents key, in said database from one using right providing medium to another.
 30. The method according to claim 29 wherein said second step includes a step of counting the number of times of use by the user based on the user identification data in said database, and of according points corresponding to the number of times of use to the user.
 31. The method according to claim 25 wherein said second step includes a step of verifying whether or not the contents key is to be transmitted, based on user equipment identification data for discriminating the user equipment provided with the contents key stored in said database, from one using right providing medium to another.
 32. The method according to claim 20 wherein the contents identification data, medium identification data for the using right providing medium and verification data for verifying possible counterfeiting of the contents identification data of the using right providing medium are recorded on said using right providing medium.
 33. The method according to claim 32 wherein said verification data is electronic signature data by an organization issuing or managing said using right providing medium.
 34. The method according to claim 32 wherein said medium identification data for the using right providing medium is data by which circulation channel of said using right providing medium can be discriminated.
 35. The method according to claim 32 wherein said second step includes a step of executing verification processing of the verification data in said contents use right identification data received from said user equipment to verify the possible counterfeiting of the contents use right identification data.
 36. The method according to claim 20 wherein said second step executes reciprocal authentication between said contents use right management device and said user equipment and transmits said contents key to an authenticated user equipment only when the authentication is validated.
 37. The method according to claim 20 wherein said second step includes a step of encrypting the contents key transmitted to said user equipment.
 38. The method according to claim 20 wherein said second step includes a step of encrypting the contents key transmitted to said user equipment using a session key generated at the time of reciprocal authentication between said contents use right management device and the user equipment.
 39. An apparatus, connected through communication means to a user equipment decoding and exploiting encrypted contents, for providing a contents key for decoding said encrypted contents through communication means, said apparatus comprising: reception processing means for receiving contents use right identification data, required in acquiring the contents key for decoding the encrypted contents, acquired from using right providing medium provided off-line to the user without interposition of said communication means, from said user equipment, through said communication means; and transmission processing means for transmitting through said communication means to said user equipment said contents key for decoding said encrypted contents based on said contents use right identification data received from said communication means.
 40. A method for providing a contents key for decoding encrypted contents through communication means to a user equipment decoding and exploiting said encrypted contents, said method comprising: a reception processing step of receiving contents use right identification data, required in acquiring the contents key for decoding the encrypted contents, acquired from using right providing medium provided off-line to the user without interposition of said communication means, from said user equipment, through said communication means; and a transmission processing step of transmitting through said communication means to said user equipment said contents key for decoding said encrypted contents based on said contents use right identification data received through said communication means.
 41. An apparatus connected through communication means to a contents use right management device for providing a contents key for decoding encrypted contents, said apparatus comprising: acquisition means for acquiring contents use right identification data required in acquiring the contents key for decoding the encrypted contents, recorded on a using right providing medium provided off-line to a user without interposition of said communication means; transmission processing means for performing a processing of transmitting the contents use right identification data, acquired by said acquisition means, to said contents use right management device through said communication means; and reception processing means for performing the processing of receiving said contents key transmitted from said contents use right management device through said communication means, based on said contents use right identification data.
 42. A method for receiving a contents key for decoding encrypted contents from a contents use right management device through communication means, said method comprising: an acquisition step of acquiring contents use right identification data required in acquiring the contents key for decoding the encrypted contents, recorded on a using right providing medium provided off-line to a user without interposition of said communication means; a transmission processing step of performing a processing of transmitting the contents use right identification data, acquired in said acquisition step, to said contents use right management device through said communication means; and a reception processing step of performing the processing of receiving said contents key transmitted from said contents use right management device through said communication means based on said contents use right identification data.
 43. A program providing medium for providing a computer program processed in an information processing apparatus connected through communication means to a contents use right management device for providing a contents key for decoding encrypted contents, said computer program comprising: an acquisition step of acquiring contents use right identification data required in acquiring the contents key for decoding the encrypted contents, recorded on a using right providing medium provided off-line to a user without interposition of said communication means; a transmission processing step of performing a processing of transmitting the contents use right identification data, acquired by said acquisition means, to said contents use right management device through said communication means; and a reception processing step of performing the processing of receiving said contents key transmitted from said contents use right management device through said communication means based on said contents use right identification data. 