System and apparatus for information display

ABSTRACT

An apparatus for displaying information received from a communication apparatus includes: a key information producing unit configured to produce key information for authenticating the communication apparatus; a key information display unit for displaying the key information; an authentication information receiving unit for receiving authentication information; an authenticating unit for authenticating the communication apparatus by verifying whether or not the authentication information was formed based upon the key information; and a display information receiving unit for displaying information from the authenticated communication apparatus.

CROSS-REFERENCE TO RELATED APPLICATIONS

[0001] This application claims the benefit of priority under 35 U.S.C. §119 to Japanese Patent Application No. 2003-47122, filed Feb. 25, 2003,the entire contents of which are herein incorporated by reference.

BACKGROUND OF THE INVENTION

[0002] 1. Field of the Invention

[0003] The present invention relates generally to an information displayapparatus, an information display method, and an information displaysystem.

[0004] 2. Description of the Related Art

[0005] Portable communication devices, such as notebook PCs (personalcomputers) and PDAs (personal digital assistants) have recently becomepopular. Very recently, generally speaking, participants of conferencesor other events (hereafter conferences) bring their own portablecommunication devices into the conference. Presentations are facilitatedby operating these portable communication devices.

[0006] For example, a presenter at a conference usually stores materialsfor his presentation in his own communication apparatus as electronicdata. During the presentation, the electronic data stored in thepresenter's communication apparatus is outputted by way of aninformation output apparatus, such as a projector, a television, amonitor, a speaker, or the like.

[0007] Generally speaking, the communication apparatus of the speaker isconventionally connected to the information output apparatus via acable, such as, for example, a serial cable or a video cable.

[0008] Very recently, since wireless communication devices have becomemore popular, the communication apparatus of the presenter may bewirelessly connected to the information output apparatus. Using awireless connection, cumbersome cables are no longer required, and thecommunication apparatus may be positioned at a variety of locations.

[0009] However, there is a risk when using wireless connections that athird party having ill will may intentionally disturb the progress ofthe presentation by connecting his own communication apparatus to theinformation output apparatus. Additionally, a third party may acquiredata transmitted/received between the communication apparatus of thepresenter and the information output apparatus in an unfair manner. Whenthe presenter's communication apparatus is connected to the informationoutput device by a cable, this risk is not present.

[0010] To solve this security problem, an encryption idea may beconceived. That is, the data transmitted/received between thecommunication apparatus of the presenter and the information outputapparatus may be encrypted. For instance, an encryption key may bedistributed to authorized participants for a conference.

[0011] In a location where a conference is held, a presenter having anencryption key can encrypt data via a communication apparatus andtransmit the encrypted data to an information output apparatus, whichcan decode the encrypted data to output the decoded data. Also, otherparticipants having the encryption key may decode the data transmittedby the presenter using their own communication devices, so that theseparticipants may view or hear the content of the presentation.

[0012] However, since the encryption keys are previously distributed, itis possible that the encryption keys might be given to an unauthorizedperson. Also, if an authorized participant forgets the encryption key,this person cannot make the presentation, cannot view the content of thepresentation, or cannot hear the presentation. Thus, it is evident thatdistributing encryption keys in advance has disadvantages.

[0013] Patent Publication No. 2002-218420 (Kokai) describes a potentialsolution for when a third party having good will mistakenly transmitsdata and interferes with a presentation made by another person. Forexample, a method may be conceived in which a participant inputsdiscrimination information for an information output apparatus fromwhich image information is desired. This communication apparatustransmits both the entered discrimination information and imageinformation desired from an information output apparatus to theinformation output apparatus from which the image information is soughtto be outputted. This information output apparatus outputs the receivedimage information only when the received discrimination informationcoincides with the user's own discrimination information.

[0014] This method prevents against accidental interference by a thirdparty. However, since the discrimination information is directlytransmitted without being protected by encryption, it is possible thatthe discrimination information might be stolen by unauthorized thirdparties. As a consequence, this method cannot prevent access bymalicious third parties.

[0015] On the other hand, participants in a conference are oftenacquainted with each other. Even when someone who is not acquainted withthe other participants is present, the identity of the participant maybe confirmed by employing an authentication tool, such as digitalauthentication or an identification card. In such a case, a suspiciouscharacter located in an assembly hall of a conference may be identified,and may be expelled from the assembly hall.

BRIEF SUMMARY OF THE INVENTION

[0016] Assuming that anyone who is present in an assembly hall of aconference is an authorized participant, an object of the presentinvention is to provide an information output apparatus, an informationoutput system, and an information output method, capable of preventingthe disturbance of a presentation by an unauthorized third party, andalso capable of preventing theft of contents of a presentation by anunauthorized third party.

[0017] According to a first aspect of the present invention, anapparatus is provided for displaying information received from acommunication apparatus, the apparatus including: a key informationproducing unit configured to produce key information used toauthenticate said communication apparatus; a key information displayunit configured to display said key information; an authenticationinformation receiving unit configured to receive authenticationinformation; an authenticating unit configured to authenticate saidcommunication apparatus by verifying whether or not said authenticationinformation was formed based upon said key information; and a displayinformation receiving unit configured to receive display informationfrom said authenticated communication apparatus, wherein saidauthenticated communication apparatus has a distribution range of saidkey information such that said key information displayed on said keyinformation display unit can be viewed.

[0018] A second aspect of the invention provides an apparatus fordisplaying information received from a communication apparatus, theapparatus including: a key information producing unit configured toproduce key information used to authenticate said communicationapparatus; a key information output unit configured to output sound todistribute said key information; an authentication information receivingunit configured to receive authentication information; an authenticatingunit configured to authenticate said communication apparatus byverifying whether or not said authentication information was formedbased upon said key information; and a display information receivingunit configured to receive display information from said authenticatedcommunication apparatus, wherein said authenticated communicationapparatus has a distribution range of said key information such that asound outputted by said key information output unit can be heard.

[0019] Another aspect of the present invention provides an apparatus fordisplaying information received from a communication apparatusincluding: a key information producing unit configured to produce keyinformation used to authenticate said communication apparatus; a keyinformation transmitting unit configured to transmit said keyinformation by infrared transmission to distribute said key information;an authentication information receiving unit configured to receiveauthentication information; an authenticating unit configured toauthenticate a communication apparatus by verifying whether or not saidauthentication information was formed based upon said key information;and a display information receiving unit configured to receive displayinformation from said authenticated communication apparatus as displayinformation to be displayed, wherein said authenticated communicationapparatus has a distribution range of said key information such that theinfrared rays transmitted by said key information transmitting unit canbe received.

[0020] Yet another aspect of the present invention includes method usedin an information display apparatus for displaying information receivedfrom a communication apparatus, the method including: producing keyinformation used to authenticate said communication apparatus;distributing said key information; receiving authentication informationfor authenticating said communication apparatus; authenticating saidcommunication apparatus by verifying whether or not said authenticationinformation was formed based upon said key information; and receivingdisplay information of said authenticated communication apparatus todisplay information, wherein said authenticated communication apparatushas a distribution range of said key information such that saidoutputted key information can be acquired.

[0021] The present invention also provides a system including: acommunication apparatus; an information display apparatus configured todisplay information transmitted from said communication apparatus; saidcommunication apparatus including, a key information input unitconfigured to input key information outputted by said informationdisplay apparatus, and authentication information producing unitconfigured to produce authentication information used to authenticatesaid communication apparatus by employing said key information, saidinformation display apparatus including, a key information producingunit configured to produce said key information, a key informationoutput unit configured to output said produced key information, anauthentication information receiving unit configured to receive saidauthentication information, an authenticating unit configured toauthenticate a communication apparatus by verifying whether or not saidauthentication information was formed based upon said key information;and a display information receiving unit configured to displayinformation received from said authenticated communication apparatus,wherein said authenticated communication apparatus has a distributionrange of said key information such that said key information outputtedby said key information output unit can be received.

[0022] The present invention also provides an apparatus for use with aninformation display apparatus for displaying information received from acommunication apparatus, the apparatus including: means for producingkey information used to authenticate said communication apparatus; meansfor distributing said key information; means for receivingauthentication information for authenticating said communicationapparatus; means for authenticating said communication apparatus byverifying whether or not said authentication information was formedbased upon said key information; and means for receiving displayinformation of said authenticated communication apparatus to displayinformation, wherein said authenticated communication apparatus has adistribution range of said key information such that said outputted keyinformation can be acquired.

BRIEF DESCRIPTION OF THE DRAWINGS

[0023] A more complete appreciation of the invention and many of theattendant advantages thereof will be readily obtained as the samebecomes better understood by reference to the following detaileddescription when considered in connection with the accompanyingdrawings, wherein:

[0024]FIGS. 1A and FIG. 1B are block diagrams for schematicallyindicating an arrangement of an information output apparatus 100, and anarrangement of a communication apparatus 101, according to a firstnon-limiting embodiment of the present invention;

[0025]FIG. 2 is a flowchart for describing operations of both theinformation output apparatus 100 and the communication apparatus 101,and also for explaining communication process operations executedbetween elements 100 and 101;

[0026]FIG. 3 is a flowchart for describing process operations executedwhen secret information is displayed by being superimposed withinformation, such as a name of a presenter;

[0027]FIG. 4 is a block diagram for schematically representing anarrangement of a communication apparatus 201 according to a secondnon-limiting embodiment of the present invention;

[0028]FIGS. 5A and 5B are block diagrams for schematically showing anarrangement of an information output apparatus 300 and an arrangement ofa communication apparatus 301, according to a third non-limitingembodiment of the present invention;

[0029]FIG. 6 is a block diagram showing an arrangement of an informationoutput apparatus 400 according to a fourth non-limiting embodiment ofthe present invention; and

[0030]FIG. 7 is a block diagram indicating an arrangement of acommunication apparatus 401 according to a fifth non-limiting embodimentof the present invention.

DETAILED DESCRIPTION OF THE INVENTION

[0031] Referring now to the drawings, embodiments of the presentinvention will be described. It should be understood that theseembodiments do not restrict the technical scope and spirit of thepresent invention.

[0032] In embodiments of the present invention, participants of aconference each bring communication devices, such as notebook PCs andPDAs having communication functions. A presenter transmits electronicpresentation data which has been stored in his own communicationapparatus to an information apparatus, such as a projector, atelevision, a monitor, a speaker, or the like to display the data on theinformation output apparatus. The expression “display” used hereinimplies that images, sound (including voices), characters, and othergeneral information are communicated to participants who are present. Insuch electronic presentations, information output devices executeauthentication process operations, to allow or reject display of data.

[0033] The first non-limiting embodiment will now be described. FIG. 1Ais a schematic block diagram for showing an arrangement of aninformation output apparatus 100 according to a first non-limitingembodiment of the present invention. The information apparatus 100 isprovided with a secret information producing unit 10, a secretinformation output unit 20, a transmitting/receiving unit 30, anauthentication processing unit 40, and a data output unit 50. In thisembodiment, the information output apparatus 100 may correspond to aprojector or the like by which images are projected onto a screen (notshown) by the data output unit 50.

[0034]FIG. 11B is a schematic block diagram for showing an arrangementof a communication apparatus 101 that is capable of wirelesscommunication with the information output apparatus 100 described inFIG. 1A. The communication apparatus 101 is equipped with the secretinformation acquiring unit 60, an authentication information producingunit 70, a transmitting/receiving unit 80, and a data storage unit 90.In this first embodiment, the communication apparatus 101 corresponds toa PC, a PDA, or the like, which is wirelessly connected to theinformation output apparatus 100.

[0035] The secret information producing unit 10 produces secretinformation. The secret information may include any combination ofcharacters, numerals, symbols, and figures. For example, a characterstrain such as “RFYOHR#104” may be employed as the secret information.In this example, characters, numerals, and symbols are all arranged.However, it is possible to have only characters, only numerals, onlysymbols, or only figures. Alternatively, figures such as a circle, apolygon, a barcode, or other common symbols may be employed (alone or incombination) as the secret information.

[0036] The secret information producing unit may include a random numbergenerator that generates a random value for the secret information, oran apparatus for generating secret information in accordance with apreset algorithm. If an algorithm is used to produce the secretinformation, the algorithm itself or a parameter used in the algorithmmust be kept secret. If either the algorithm or the parameter employedin the algorithm is known, it is possible that randomly generated secretinformation may be predicted from previously used secret information.

[0037] The secret information producing unit 10 automatically producessecret information when the information output apparatus 100 isinitiated. Alternatively, the secret information producing unit 10 maybe instructed to generate secret information by a participant, asponsor, or other user.

[0038] For instance, a button used to instruct the secret informationproducing unit 10 to generate secret information may be provided on theinformation output apparatus 100. When a participant pushes the button,the secret information producing unit 10 produces the secretinformation. Additionally, since plural sets of the buttons may beprovided with the information output apparatus 100, the secretinformation producing unit 10 may produce the, secret information inresponse to anyone of the plural buttons being selected, or in responseto a predetermined sequence of buttons being selected.

[0039] The secret information output unit 20 outputs the secretinformation such that the output of secret information may be recognizedonly by either the communication apparatus 101 or the participants. Tomake sure that the secret information may be recognized only by theparticipants, the information output apparatus 100 may output the secretinformation only within a specified range. Such a specified range mayinclude a range physically located in proximity to the informationoutput apparatus 100.

[0040] For example, while the information output apparatus 100 isinstalled inside a room where a conference is held, the informationoutput apparatus 100 may project the secret information on the screen.As a result, only participants located within the room may acquire thesecret information. In this non-limiting example, the secret informationoutput unit 20 may correspond to a projecting unit of a projector. Itshould be noted that the information output apparatus 100 may be aportable apparatus, and is not confined to installation in apresentation room. For example, the information output apparatus 100 mayoutput the secret information by sound, so that only participants whoare located in proximity to the information output apparatus 100 mayreceive the signal. In this non-limiting example, the secret informationoutput unit 20 corresponds to a speaker.

[0041] Alternatively, the secret information output unit 20 may includea compact liquid crystal display positioned in the housing of theinformation output apparatus 100. In this case, a presenter or otherparticipant of the conference may rewrite the secret information onanother output means to enlarge the display, or may read the secretinformation to inform the other participants of the secret information.

[0042] The secret information output unit may alternatively be realizedby combining plural sets of the above-described output devices. Forexample, the secret information may be alternatively displayed on thecompact liquid crystal display provided in the housing and may also beoutputted as sound from the speaker. As a result, all authorizedparticipants may be aware of the secret information.

[0043] To prevent an unauthorized third party from obtaining the secretinformation, the output of the secret information apparatus may becontrolled by an operator of the information output apparatus 100. Forinstance, a button may be provided on the housing of the informationapparatus 100, and the secret information may be displayed only when theoperator pushes this button. Alternatively, for example, after a certainperiod of time has passed since the operator pushed the secretinformation button, the secret information may disappear from display.Additionally, the button may be configured such that when the operatorpresses on it a second time, the secret information disappears fromdisplay. Other equivalent methods of stopping the display of the secretinformation may also be employed.

[0044] When the output information apparatus 100 is equipped with aremote control device, the operator may control display or non-displayoperations of the secret information by operating the remote controlapparatus.

[0045] The secret information acquiring unit may correspond to an inputapparatus such as, for example, a keyboard or a touch panel. In thiscase, when a participant acquires the secret information he may input itusing the keyboard or the touch panel.

[0046] Both the secret information output unit 20 and the secretinformation acquiring unit 60 may be realized by input/output interfacesthat are connected by a wireless communication means operable byelectromagnetic waves, ultrasonic waves, infrared rays, or other waysknown to those of skill in the art. This wireless communication meansmay communicate within a short distance, namely within a singleconference room. In this case, the secret information output unit 20transmits the secret information only to the communication apparatus 101located in the vicinity of the secret information output unit 20. As aresult, the communication apparatus 101 may directly acquire the secretinformation outputted by the secret information output unit 20 withoutbeing seen by any of the participants.

[0047] The transmitting/receiving unit 30 receives authenticationinformation from the communication apparatus 101. The authenticationinformation is generated by the communication apparatus 101 based uponthe secret information. The authentication processing unit 40authenticates the communication apparatus 101 by verifying theauthentication information. The verification of authenticationinformation may use, for example, the Public Key Cryptosystem or theCommon Key Cryptosystem, as non-limiting examples. In this example,authentication information may correspond to information formed byapplying a digital signature to secret information.

[0048] The communication apparatus 101 authenticated by theauthentication processing unit 40 may transmit presentation informationto the information output apparatus 100. The information outputapparatus 100 projects the presentation information transmitted from theauthenticated communication apparatus 101 to the display, such as ascreen. When a communication apparatus is not authenticated by theauthentication processing unit 40, the information output apparatus 100does not receive the presentation information and does not display thepresentation information on the screen.

[0049] In the non-limiting example of FIG. 1A, the information apparatus100 includes a single appliance. Alternatively, the information outputapparatus 100 may be arranged by combining multiple appliances, such asa projector having a conventional image projection function with a PCconnected to the projector. In this alternative non-limiting example,the data output unit 50 shown in FIG. IA corresponds to the projector,the secret information producing unit 10 and the secret informationoutput unit 20 corresponds to software operated in the PC, and thetransmitting/receiving unit 30 may correspond to a wirelesscommunication apparatus provided in the PC.

[0050] As a result of the configuration of the first embodiment, it ispossible to prevent non-participants of a presentation from obtainingthe secret information. At the same time, it is possible to enableparticipants present within a conference room or within a vicinity ofthe information output apparatus to easily obtain the secretinformation. As a result, it is possible to prevent both intentional andunintentional disturbance of the presentation.

[0051] Referring to FIG. 1A, FIG. 1B, and FIG. 2, a description is madeof operations of both the information output apparatus 100 and thecommunication apparatus 101 according to the first non-limitingembodiment. FIG. 2 represents a flowchart for describing both theoperations of the information output apparatus 100 and the communicationapparatus 101 of the participant, and a communication operationperformed between the devices 100 and 101. When the information outputapparatus 100 is initiated, the secret information producing unit 10produces secret information in step S10.

[0052] The secret information is sent to the authentication processingunit 40 to be stored therein, and is transmitted to the secretinformation output unit 20 in step S20.

[0053] Next, the secret information output unit 20 outputs the secretinformation such that the secret information may be recognized only byauthorized participants in step S30. For example, the secret informationoutput unit 20 may project the secret information onto a screen withinthe conference room so that only participants of the conference mayacquire the secret information. Also, if the secret information outputunit 20 is a speaker, the secret information output unit 20 may outputthe secret information aurally, such that only the participants may hearthe secret information. If the secret information unit 20 includes acompact liquid crystal display, a participant may read the secretinformation displayed on the compact liquid crystal display, and maywrite the secret information on a blackboard or other display means thatis visible to the participants. The secret information could then beerased, so that it is not distributed to unauthorized third parties.

[0054] With regard to authentication, when the participants acquire thesecret information, the participants-input the secret information intotheir own communication apparatuses 101 in step S41. For example, theparticipants may enter the secret information into the secretinformation acquiring unit 60 by a keyboard or a touch panel, or othersimilar device known to those of skill in the art.

[0055] If both the secret information output unit 20 and the secretinformation acquiring unit 60 correspond to input/output interfacesconnected via wireless communication means, the participants do not needto enter the secret information because the secret information isautomatically transmitted/received. In this case, while the informationoutput apparatus 100 controls the output power, the information outputapparatus transmits the secret information within only a limited range,such that only participants in the given range may obtain the secretinformation.

[0056] The authentication information producing unit 70 producesauthentication information based upon the secret information in stepS51. The transmitting/receiving unit 80 transmits the producedauthentication information to the information output apparatus 100 instep S61. The transmitting/receiving unit 30 of the information outputapparatus 100 receives the authentication information in step S70. Theauthentication processing unit 40 verifies the authenticationinformation based upon the secret information in step S80.

[0057] The process operations defined from steps S51 to S80 may beexecuted by using either the Public Key Cryptosystem, the Common KeyCryptosystem, or their equivalents, as non-limiting examples.

[0058] When the Public Key Cryptosystem is used, the information outputapparatus 100 previously has a public key of a participant, and thecommunication apparatus 101 previously has a secret key of theparticipant. In step S51, the authentication information producing unit70 produces the authentication information such that a digital signatureis applied to the secret information based upon the individual's secretkey. In step S61, the communication apparatus 101 transmits the secretinformation including the digital signature as the authenticationinformation to the information output apparatus 100. In step S70, theinformation output apparatus 100 receives the authenticationinformation. In step S80, the authentication processing unit 40 confirmsthe digital signature based upon a public key of the owner of thecommunication apparatus that transmits the authentication information.As a result, the authentication processing unit 40 can confirm that thesecret key of the authorized participant has been stored and thecommunication apparatus 101. Furthermore, since the authenticationprocessing unit 40 confirms the contents of the secret informationincluding the digital signature, the authentication processing unit 40can confirm that the owner of the communication apparatus 101 is awareof the secret information.

[0059] In the Common Key Cryptosystem, the information output apparatus100 and the communication apparatus 101 previously stores secret keys ofa participant. In step S51, the authentication information producingunit 70 produces authentication information such that the secretinformation is encrypted by the individual's secret key. In step S61,the communication apparatus 1010 transmits the encrypted secretinformation as authentication information to the information outputapparatus 100. In step S70, the information output apparatus 100receives the authentication information. In step S80, the authenticationprocessing unit 40 decodes the received authentication information usingthe transmitted secret key of the participant. When the decodedauthentication information is authentic to the secret informationproduced by the secret producing unit 10, the authentication processingunit 40 determines that the person who sent the authenticationinformation is an authorized participant.

[0060] When a plurality of participants use a common secret key, thereis a certain possibility that one joint owner of the key who does notknow the secret information intercepts the authentication informationtransmitted by the other joint owners, and transmits the interceptedauthentication information as his own authentication information. Inthis case, the information output apparatus 1.00 may erroneouslydetermine that this unauthorized user is an authorized participant.Accordingly, each participant's secret key should be unique relative tothe secret keys of the other participants.

[0061] Additionally, for improved security, the secret key may be set tochange in accordance with a specified elapsed time. For example, asecret key may be changed synchronously with an algorithm that iscommonly used between the information output apparatus 100 and thecommunication apparatus 101.

[0062] Both the Public Key Cryptosystem and the Common Key Cryptosystemmay simplify communications between the communication apparatus 101 andthe information output apparatus 100 in the authentication processoperation. As indicated by arrows in FIG. 2, it is sufficient that thecommunication apparatus 101 merely transmits the authenticationinformation to the information output apparatus 100, and othercommunications are no longer required. Additionally, a communicationfrom the information output apparatus 100 to the communication apparatus101 is no longer required. Therefore, it is possible to realize thetransmitting/receiving unit 30 as only a receiving unit, as theinformation output apparatus 100 no longer requires a transmissionfunction. Also, the transmitting/receiving unit 80 of the communicationapparatus 100 no longer requires a receiving function. Therefore, thetransmitting/receiving unit 80 may be realized as a transmitting unit80.

[0063] Since either a public key or a secret key of a participant shouldpreviously be stored in the information output apparatus 100 usingeither the Public Key CryptoSystem or the Common Key CryptoSystem, forexample, it is possible that a set up operation is cumbersome. Toalleviate this cumbersome set up, it is possible to develop a “challengeresponse system.” When the challenge response system is employed, thetransmitting/receiving unit 30 should include the transmission function,and the transmitting/receiving unit 80 should include the receptionfunction.

[0064] More precisely, the information output apparatus 100 transmitsindividual random values as challenges to the communication apparatus101. The communication apparatus 101 encrypts the transmitted randomvalue while using the secret information as an encryption key. Thecommunication apparatus 101 then returns this encrypted random value asa response to the information output apparatus 100. The informationoutput apparatus 100 decodes the returned response while the secretinformation is used as the encryption key.

[0065] As a result, when the value obtained by decoding the response isauthentic to the random value transmitted as the challenge, theinformation output apparatus 100 authenticates that the communicationapparatus 101 is an authorized communication apparatus. Therefore, it ispossible to obviate the need to previously store public keys or secretkeys for each participant.

[0066] It should also be noted that the above-described authenticationmethods merely correspond to non-limiting examples of authenticationmethods. Other authentication methods may be employed. That is, theinformation output apparatus 100 may confirm that the same secretinformation is owned by the communication apparatus 101 in analternative authentication method.

[0067] Next, the communication apparatus 101 requests the informationoutput apparatus 100 to allow an establishment of a connection in stepS91. The information output apparatus 100 judges whether the connectionestablishment is permissible, based on a verification result ofauthentication information in step S100. In other words, the informationoutput apparatus 100 enables the establishment of a connection when theconnection is requested by an authorized participant. On the other handif the requestor is an unauthorized participant, the information outputapparatus 100 rejects the request for a connection.

[0068] When the communication output apparatus 100 determines that thecommunication apparatus 100 belongs to an authorized participant, thecommunication apparatus 101 transmits materials for presentation to theinformation output apparatus 100 in step S121. At this time, thecommunication apparatus 101 encrypts the data for presentation using theencrypt key based upon the secret key. Therefore, it is possible toprevent an unauthorized third party who does not know the secretinformation from stealing the presentation materials. The informationoutput apparatus 100 projects the materials for presentation transmittedfrom the communication apparatus 101 to the display, such as a screen,from the data output unit 50 in step S130.

[0069] Additionally, after step S100, the information output apparatus100 may notify an authorized user of a connection establishment. In thiscase, in step S121, the communication apparatus 101 that has receivedthe notification of connection establishment transmits the materials forpresentation to the information output apparatus 100.

[0070] Alternatively, the information output apparatus 100.may producean encryption key without using the secret information, and maydistribute this produced encryption key to the authenticatedcommunication apparatus 101. However, it is preferable that both theinformation output apparatus 100 and the communication apparatus 101produce an encryption key based upon the commonly used secretinformation using the same algorithm. Therefore, it is possible to avoidnew distribution of an encryption key to the communication apparatus101.

[0071] As a result of the verification in step S80, if theauthentication processing unit 40 determines that the owner of thecommunication apparatus 101 is not an authorized participant, theinformation output apparatus 100 may prevent establishment of theconnection in step S110. In this case, the information output apparatus100 may also send a message to the liquid crystal display that anauthorized third party is present. Additionally, the information outputapparatus 100 may project a message that an unauthorized third party ispresent on the display, such as a screen, via the data output unit 50.If the information output apparatus 100 is equipped with a speaker, theinformation output apparatus 100 may aurally announce that anunauthorized third party is present. Additionally, it is possible forthe information output apparatus 100 to display an identifier (forexample, an address) of a communication apparatus owned by theunauthorized third party. As a result, the communication apparatus ofthe unauthorized third party cannot be connected to the informationoutput apparatus 100. Also, it is possible to precisely identify anunauthorized user's communication apparatus.

[0072] According to the non-limiting first embodiment, the secretinformation is produced only once, when the information output apparatus100 is initiated. Therefore, it is possible for a participant joiningthe conference midway through may obtain the secret information from anauthorized user that has been present. However, it is also possible thata participant who has left the conference midway through may unwittinglydisclose the secret information to an unauthorized third party. To stopthis problem, the secret information is properly altered.

[0073] For example, a button used to update the secret information maybe provided with the information output apparatus 100. If largequantities of participants are exchanged for new participants, thepresenter may push this button to produce new secret information. Apresentation may then be commenced through the process steps shown inFIG. 2.

[0074] To change the secret information, a timer may also be employed inthe secret information producing unit 10, by which the secretinformation may be changed in a periodic manner. To update the secretinformation, new secret information may be encrypted while the previoussecret information may be used as the encryption key. Therefore, theencrypted secret information may be transmitted to the communicationapparatus 101. The communication apparatus 101 may automatically acquirenew secret information based upon the previous secret information. As aresult, even when the secret information is changed, the participantsneed not re-enter the new secret information.

[0075] Alternatively, when a communication apparatus 101 of a presentinterrupts a connection established between the communication apparatus101 and the information output apparatus 100, secret information may bechanged. In this case, when a presenter interrupts the connectionbetween his own communication apparatus 101 and the information outputapparatus 100, the secret information is changed. Any of theabove-described methods of updating and changing the secret informationmay be used.

[0076] Since the secret information is updated, even if a participantleaves his seat midway through a conference and accidentally disclosesthe secret information to an unauthorized third party, the unauthorizedthird party cannot participate in the conference because theunauthorized third party cannot learn of the secret information that hasbeen updated.

[0077] In this first non-limiting embodiment, the information outputapparatus 100 may correspond to the projector that projects the images.However, the information output apparatus of the present invention isnot limited only to a projector. In other words, the informationoutputted from the information output apparatus 100 is not limited onlyto an image, but may include sound as well. The information outputted bythe information output apparatus 100 may also include information madeby combining voice, sound, and an image, namely a video signal.Furthermore, the information output apparatus 100 may transmitinformation to the communication apparatus 101 located near theinformation output apparatus 100 wirelessly without outputting any oneof an image, voice, or sound. In this alternative case, thecommunication apparatus 101 outputs a content of a presentation to therespective displays.

[0078] Before a conference begins, it is possible that information suchas a name of a presenter, a title of the presentation, a starting timeand the end time of the presentation may be projected on the screen forthe information of the participants. The information output apparatus100 may display secret information that is superimposed with theabove-described information. In this alternative case, the data outputunit 50 of FIG. 1 reads the secret information from the secretinformation output unit 20 and displays the secret information on thescreen, while the secret information is superimposed on the informationthat is displayed.

[0079]FIG. 3 is a flowchart for explaining a process operation executedwhen secret information is displayed superimposed on information such asthe presenter's name. After the process defined in steps S10 and S20shown in FIG. 2 are executed, the secret information output unit 20determines if the data output unit 50 has projected the information suchas the name of the presenter on the screen in step S22.

[0080] The data output unit 50 displays the secret information while thesecret information is superimposed on the other information in step S32.On the other hand, if the data output unit 50 projects no information,the data output unit 50 displays only the secret information in stepS34. Process operations defined from steps S41-S130 illustrated in FIG.2 are also executed.

[0081] Second Embodiment

[0082]FIG. 4 is a schematic block diagram for indicating an arrangementof a communication apparatus 201 according to the second embodiment ofthe present invention. An information output apparatus 100 (not shown inFIG. 4) is similar to the information output apparatus 100 illustratedin FIG. 1A.

[0083] The communication apparatus 201 according to the secondembodiment may transmit data prepared by the presenter, as well as dataentered during the presentation to the information output apparatus 100.

[0084] The communication apparatus 201 is further equipped with both adata input unit 92 and a transmission unit producing unit 94, inaddition to the structural elements of the communication apparatus 101shown in FIG. 1B. The data input unit 92 is equipped to input data intothe communication apparatus 201. The transmission data producing unit 94produces data to be transmitted to the information output apparatus 100based upon both data that is previously stored in a data storage unit 90and data that is inputted into the data input unit 92. At this time, thedata which has been stored in the data storage unit 90 may besuperimposed with the data that is entered from the data input unit 92.The superimposed data may be subsequently transmitted to the informationoutput apparatus 100. Also, the transmission data producing unit 94 mayalternatively select any one of the data storage unit 90 and the datainput unit 92 to transmit the selected data to the information outputapparatus 100.

[0085] For instance, the data input unit 92 is a sound input apparatus,such as a microphone, and the information output apparatus 100 is anapparatus that may include the capability of outputting both image dataand sound data. Examples include a projector equipped with a speaker, ora television. The communication apparatus 201 transmits both image dataof the data storage unit 90 and sound data inputted into the data input92 to the information output apparatus 100. The information outputapparatus 100 outputs both the image data and the sound data. As aresult, a presenter may display the image data on the information outputapparatus 100, while an explanatory speech accompanies the display. Thepresenter may more effectively carry out the presentation according tothe non-limiting second embodiment.

[0086] If the secret information is outputted as sound, the data inputunit 92 automatically inputs the sound. The authentication informationproducing unit 70 recognizes the secret information from the sound, andproduces the authentication information based upon the secretinformation. As a result, the participants are no longer required toinput the secret information.

[0087] For example, the data input unit 92 may correspond to an imageinput apparatus, such as a camera. In this case, the transmission dataproducing unit 94 may select the image data that has been previouslystored in the data storage unit 90, as well as image data that has beenphotographed by the data input unit 92. As a consequence, when thepresenter properly switches the image data that has been previouslystored in the data storage unit 90 and the image data that has beenphotographed by the data input unit 92, the presenter may perform thepresentation. For instance, if a presenter creates a hand-writtenillustration during the presentation, the presenter may display thishand-written illustration.

[0088] If the secret information is outputted as an image, the datainput unit 92 automatically inputs this image. The authenticationinformation producing unit 70 recognizes the secret information fromthis image, and produces the authentication information based upon thesecret information. As a result, participants are no longer required toinput the secret information.

[0089] For example, if the secret information includes a bar code, thedata input unit 92 may input the bar code. The authenticationinformation producing unit 70 produces authentication information basedupon the inputted bar code, and the transmitting/receiving unit 80transmits the produced authentication information to the informationoutput apparatus 100. The information output apparatus 100 decodes theauthentication information to obtain the bar code, and authenticates theobtained bar code against a previously stored bar code in theinformation output apparatus 100. Therefore, the authentication processmay be easily realized.

[0090] In the case where the data input unit 92 includes a video camerathat inputs both image and sound, and the data storage unit 90corresponds to a video tape that stores both image and sound. In thiscase, both the image and the sound are inputted into the data input unit92 may be stored in the data storage unit 90. Alternatively, theseimages and sounds may be combined with each other, and the combinedinformation may be transmitted to the information output apparatus 100.

[0091] If the secret information is outputted as a combination of imageand sound, the data input unit 92 automatically inputs both the imageand the sound. The authentication information producing unit 70recognizes the secret information from both the inputted image and theinputted sound, and produces the authentication information based uponthe secret information. As a result, participants are no longer requiredto input the secret information.

[0092] Based upon the verification result in the step S80 shown in FIG.2, the contents of data that may be transmitted by the respectivecommunication devices 201 may be restricted. For example, while thesecret information is revealed only to a presenter, the communicationapparatus 201 of the presenter may transmit both the image data that hasbeen stored in the data storage unit and the sound data that is enteredfrom the data input unit 92. On the other hand, the communicationapparatus 201 belonging to another participant may transmit only thesound data entered from the data input 92. As a result, the informationoutput apparatus 100 may ensure a smooth progress of the presentation bydisplaying only the image that is prepared by the announcingparticipant. Furthermore, since all of the participants may transmit thesound data to the information output apparatus 100, both the presenterand the other participants may exchange questions and answers relevantto the content of the presentation.

[0093] Third Embodiment

[0094]FIG. 5A and FIG. 5B are schematic block diagrams for indicating anarrangement of an information output apparatus 300 and an arrangement ofa communication apparatus 301, according to a third non-limitingembodiment of the present invention. In the third embodiment, both theinformation output apparatus 300 and the communication apparatus 301 areprovided with input functions.

[0095] The information output apparatus 300 is further provided for thedata input unit 52 in addition to the structural elements of theinformation output apparatus 100 shown in FIG. 1. The communicationapparatus 301 is further provided with the data output unit 96 inaddition to the structural elements of the communication apparatus 101shown in FIG. 1.

[0096] For instance, the information output apparatus 300 may include aprojector equipped with a picture camera. In this case, the data outputunit 50 of the information output apparatus 300 may correspond to aprojection apparatus for projecting an image on a screen. The data inputunit 52 of the information output apparatus 300 may correspond to acompact picture camera for photographing an image. The data input unit52 may photograph a document printed on a paper, a drawing, or the like.An image photographed by the data input unit 52 may be projected ontothe screen by the data output unit 50. The information output apparatus300 may display secret information via the data output unit 50.

[0097] The communication apparatus 301 may be connected to theinformation output apparatus 300 such that communication is possible. Asa result, the communication apparatus 301 may receive the imagephotographed by the data input unit 52, and then may display thereceived image on the data output unit 96. The data output unit 96corresponds to, for example, a liquid crystal display of a PC. As aconsequence, participants may view the content that is displayed on thescreen from the data output unit 50 of the information output apparatus300.

[0098] Furthermore, the communication apparatus 301 may record the imagein the data storage unit 90. Accordingly, the participants may accessthe contents of the presentation as electronic data. The data storageunit 90 may correspond to, for example, the hard disk of a PC.

[0099] Fourth Embodiment

[0100]FIG. 6 is a schematic block diagram indicating an arrangement ofan information output apparatus 400 according to a fourth non-limitingembodiment of the present invention.

[0101] The information output apparatus 400 is provided with a datastorage unit 54 in addition to the structural elements of theinformation output apparatus 300 shown in FIG. 5A. The data storage unit54 may store data used for a presentation, which is transmitted by apresenter, and also image data photographed by the data input unit 52. Aparticipant may access the data used for the presentation and the imagedata from the data storage unit 54 using the communication apparatus 301shown in FIG. 5B. It should be understood that the above-describedcommunication apparatus 301 may be replaced by either the communicationapparatus 101, the communication apparatus 201, or other communicationapparatus known to those of skill in the art.

[0102] When the data is read, security of presentation data and imagedata may be secured by using the flowchart shown in FIG. 2. Forinstance, in step S61, the communication apparatus 301 transmitsauthentication information to the information output apparatus 400.Next, in both step S70 and step S80, the information output apparatus400 receives the transmitted authentication information and verifies theauthentication information. In step S91, the communication apparatus 301requests the information output apparatus 400 to establish a connectionto require either the presentation data or the image data. In step S100,the information output apparatus 400 allows or rejects the request toestablish a connection based upon the results of the verification.

[0103] If the connection request is allowed, the information outputapparatus 400 encrypts either the presentation data or the image databased upon the secret information and transmits the encrypted data tothe communication apparatus 301. As a result, when either thepresentation data or the image data is transmitted from the informationoutput apparatus 400 to the communication apparatus 301, the security ofthese data may be secured.

[0104] Alternatively, the authentication process operation and theencrypting operation may be selectively carried out, depending on thetype of data that is transmitted/received between the information outputapparatus 400 and the communication apparatus 301. For example, ifpresentation data is transmitted, the information output apparatus 400may execute both the authentication process operation and the encryptingoperation. On the other hand, if image data photographed by the datainput unit 52 is transmitted, the information output apparatus 400 maytransmit the photographed image data to the communication apparatus 301without executing both the authentication operation and the encryptingoperation.

[0105] Additionally, it is possible that only a presenter may be madeaware of the secret information, as a non-limiting alternativeembodiment. As a result, the presenter may transmit the presentationdata to the information output apparatus 400.

[0106] Alternatively, one presenter may download materials that havebeen used by another presenter from the information output apparatus 400to bring back the downloaded materials. On the other hand, while otherparticipants cannot transmit the materials to the information outputapparatus 400 and cannot download the materials from the informationoutput apparatus 400, these participants may view the image photographedby the data input unit 52 using their own communication devices 301. Aspreviously explained, in accordance with the fourth non-limitingembodiment, the presenter may be distinguished from other participants.

[0107] So that only the presenter obtains the specific secretinformation, the secret information producing apparatus produces bothsecret information 1 used for the presenter and secret information 2used for the participants, respectively. For example, the secretinformation 1 may be displayed on the compact liquid crystal displaythat is provided as the secret information output unit 20. As a result,only the announcing participant is able to obtain the secret information1. The secret information 2 may be projected onto a screen or otherdisplay apparatus from the data output unit 50. Consequently, the otherauthorized participants may obtain the secret information 2.

[0108] If the communication apparatus 301 owns the secret information 1,the information output apparatus 400 may permit the communicationapparatus 301 to transmit the data to the information output apparatus400. The communication apparatus 301 may also download the data from theinformation output apparatus 400. On the other hand, if thecommunication apparatus 301 owns the secret information 2, theinformation output apparatus 400 may only enable the communicationapparatus 301 to download the image data photographed by the data inputunit 52.

[0109] Through the fourth embodiment, it is possible to preventparticipants other than the presenter from obtaining the presentationdata in a permanent fashion. Also, it is possible to avoid intentionalor negligent disturbance of the presentation by participants other thanthe presenter.

[0110] Fifth Embodiment

[0111]FIG. 7 is a schematic block diagram indicating an arrangement of acommunication apparatus 401 according to a fifth non-limiting embodimentof the present invention. The communication apparatus 401 is providedwith an authentication processing unit 98 in addition to the structuralelements of the communication apparatus 301 shown in FIG. 5B. Thecommunication apparatus 401 corresponds to a communication apparatusused for a presenter. Communication devices used for participants whoare not presenters may be selected from any one of the communicationdevices 101, 201, 301, or 401. For the discussion below, it is assumedthat the communication apparatus of the participants other than thepresenter is the communication apparatus 402. However, this embodimentis not limited thereby.

[0112] The authentication process unit 98 verifies authenticationinformation transmitted from the communication apparatus 402 to allow orreject a connection between the communication apparatus 402 and thecommunication apparatus 401. As a result, the communication apparatus402 having secret information is not connected to the information outputapparatus, but can directly receive data used for a presentation fromthe communication output apparatus 401.

[0113] For instance, a description will be made of operations of boththe communication apparatus 401 and the communication apparatus 402 withreference to the flowchart illustrated in FIG. 2. In FIG. 2, instead ofthe information output apparatus 100, the communication apparatus 401executes the process operations defined from step S10 to step 100.Additionally, instead of the communication apparatus 101 in FIG. 2, thecommunication apparatus 402 executes the process operations defined fromstep S41 to step S91. In step S20, the secret information is stored intoboth the authentication information producing unit 70 and theauthentication processing unit 98.

[0114] In step S100, when the communication apparatus 401 authorizes aconnection establishing request issued from the communication apparatus402, the communication apparatus 402 can download the presentation datafrom the data storage unit 90 (see FIG. 7) of the communicationapparatus 401. On the other hand, in step S100, if the communicationapparatus 401 rejects a connection establishing request issued from thecommunication apparatus 402, the communication apparatus 402 cannotdownload the presentation data from the data storage unit 90, becausethe communication apparatus 402 cannot be connected to the communicationapparatus 401.

[0115] As a result, only an authorized user who possesses the secretinformation may permanently obtain the presentation data. Additionally,participants who possess the secret information may view thepresentation data using their own communication devices 402.

[0116] In this fifth embodiment, the information that istransmitted/received is not limited only to the data used for thepresentation. For example, a so-called “chat” may be carried out, inwhich short text messages are mutually transmitted/received betweenparticipants and a presenter. In this fifth embodiment, the chat mayalso be encrypted based upon the secret information. As a consequence, athird party who does not know the secret information cannot disturb thepresentation or steal questions and answers made in the chats betweenthe presenter and the participants.

[0117] In the above-described embodiments, an information outputapparatus may be alternatively arranged such that a plurality ofoperation modes may be selected, while the plural operation modescontain a “secure mode” in which both the authentication processoperation and the encrypting operation are carried out as shown in FIG.2, and a “normal mode” in which the security measures are not present.Either a presenter or a participant may select these operation modes inresponse to an environment in which a conference is held. For instance,if the possibility of data disturbance or data being stolen by a thirdparty is very low, then the “normal mode” is selected. If there is ahigh risk of data disruption or data being stolen by a third party, the“secure mode” may be selected.

[0118] The information output apparatus, the information output system,and the information output method according to the present invention mayavoid disturbance of a presentation by an unauthorized third party.Additionally, according to the present invention, it is possible toprevent theft of the presentation by an unauthorized third party.

[0119] Obviously, numerous modifications and variations of the presentinvention are possible in light of the above teachings. It is thereforeto be understood that within the scope of the appended claims, theinvention may be practiced otherwise than as specifically describedherein.

1. An apparatus for displaying information received from a communicationapparatus, comprising: a key information producing unit configured toproduce key information used to authenticate said communicationapparatus; a key information display unit configured to display said keyinformation; an authentication information receiving unit configured toreceive authentication information; an authenticating unit configured toauthenticate said communication apparatus by verifying whether or notsaid authentication information was formed based upon said keyinformation; and a display information receiving unit configured toreceive display information from said authenticated communicationapparatus, wherein said authenticated communication apparatus has adistribution range of said key information such that said keyinformation displayed on said key information display unit can beviewed.
 2. The apparatus as claimed in claim 1, wherein said keyinformation display unit converts said key information into a picturethat can be displayed by said information display unit and superimposessaid picture on an image of the display information to display asuperimposed picture.
 3. The apparatus as claimed in claim 1, furthercomprising a display panel, wherein said key information display unitdisplays said key information on said display panel as at least one of acharacter or an image.
 4. An apparatus for displaying informationreceived from a communication apparatus, comprising: a key informationproducing unit configured to produce key information used toauthenticate said communication apparatus; a key information output unitconfigured to output sound to distribute said key information; anauthentication information receiving unit configured to receiveauthentication information; an authenticating unit configured toauthenticate said communication apparatus by verifying whether or notsaid authentication information was formed based upon said keyinformation; and a display information receiving unit configured toreceive display information from said authenticated communicationapparatus, wherein said authenticated communication apparatus has adistribution range of said key information such that a sound outputtedby said key information output unit can be heard.
 5. An apparatus fordisplaying information received from a communication apparatus,comprising: a key information producing unit configured to produce keyinformation used to authenticate said communication apparatus; a keyinformation transmitting unit configured to transmit said keyinformation by infrared transmission to distribute said key information;an authentication information receiving unit configured to receiveauthentication information; an authenticating unit configured toauthenticate a communication apparatus by verifying whether or not saidauthentication information was formed based upon said key information;and a display information receiving unit configured to receive displayinformation from said authenticated communication apparatus as displayinformation to be displayed, wherein said authenticated communicationapparatus has a distribution range of said key information such that theinfrared rays transmitted by said key information transmitting unit canbe received.
 6. The apparatus as claimed in claim 1, wherein thecommunication apparatus authenticated by said authenticating unit isfurther equipped with a display information transmitting unit configuredto transmit the display information displayed by said informationdisplay unit.
 7. The apparatus as claimed in claim 1, wherein unlesssaid key information producing unit produces a second key information,said display information receiving unit receives display informationfrom said authenticated communication apparatus without requiring asecond authentication.
 8. The apparatus as claimed in claim 1, wherein acommunication system utilized in the communication of saidauthentication information and said display information is differentfrom a communication system utilized in the distribution of said keyinformation.
 9. The apparatus as claimed in claim 6, wherein saiddisplay information transmitting unit encrypts the display informationto be transmitted such that the encrypted display information can bedecoded by said communication apparatus.
 10. A method used in aninformation display apparatus for displaying information received from acommunication apparatus, comprising: producing key information used toauthenticate said communication apparatus; distributing said keyinformation; receiving authentication information for authenticatingsaid communication apparatus; authenticating said communicationapparatus by verifying whether or not said authentication informationwas formed based upon said key information; and receiving displayinformation of said authenticated communication apparatus to displayinformation, wherein said authenticated communication apparatus has adistribution range of said key information such that said outputted keyinformation can be acquired.
 11. The method as claimed in claim 10,wherein said distributing includes at least one of displaying an image,emitting a sound, or transmitting by infrared transmission.
 12. Asystem, comprising: a communication apparatus; an information displayapparatus configured to display information transmitted from saidcommunication apparatus, said communication apparatus comprising, a keyinformation input unit configured to input key information outputted bysaid information display apparatus, and authentication informationproducing unit configured to produce authentication information used toauthenticate said communication apparatus by employing said keyinformation, said information display apparatus comprising, a keyinformation producing unit configured to produce said key information, akey information output unit configured to output said produced keyinformation, an authentication information receiving unit configured toreceive said authentication information, an authenticating unitconfigured to authenticate a communication apparatus by verifyingwhether or not said authentication information was formed based uponsaid key information, and a display information receiving unitconfigured to display information received from said authenticatedcommunication apparatus, wherein said authenticated communicationapparatus has a distribution range of said key information such thatsaid key information outputted by said key information output unit canbe received.
 13. The system as claimed in claim 12, wherein saidinformation display apparatus further comprises a display informationtransmitting unit configured to transmit display information to thecommunication apparatus authenticated by said authenticating unit. 14.The system as claimed in claim 12, wherein outputting said keyinformation transmits by way any one of a display image, a sound, and aninfrared transmission.
 15. The system as claimed in claim 12, whereinsaid key information output unit is configured to convert said keyinformation into a picture for display by said information display unit,and to superimpose said converted picture on the display information todisplay a superimposed picture.
 16. The system as claimed in claim 15,wherein said key information input unit includes a camera configured tocapture an image of the key information outputted by said keyinformation output unit.
 17. The system as claimed in claim 12, whereinsaid communication apparatus includes an encrypting unit configured toencrypt display information such that said encrypted display informationcan be decoded by said information display apparatus, and to encryptdisplay information to transmit the encrypted display information. 18.The system as claimed in claim 13, wherein said communication apparatusincludes an encrypting unit configured to encrypt display informationsuch that said encrypted display information can be decoded by saidinformation display apparatus, and to encrypt display information, andsaid information display apparatus is configured to encrypt the displayinformation transmitted by said display information transmitting unitsuch that said encrypted display information can be decoded by saidcommunication apparatus.
 19. An apparatus for use with an informationdisplay apparatus for displaying information received from acommunication apparatus, the apparatus comprising: means for producingkey information used to authenticate said communication apparatus; meansfor distributing said key information; means for receivingauthentication information for authenticating said communicationapparatus; means for authenticating said communication apparatus byverifying whether or not said authentication information was formedbased upon said key information; and means for receiving displayinformation of said authenticated communication apparatus to displayinformation, wherein said authenticated communication apparatus has adistribution range of said key information such that said outputted keyinformation can be acquired.
 20. The method as claimed in claim 19,wherein said means for distributing includes at least one of means fordisplaying an image, means for emitting a sound, or means fortransmitting by infrared transmission.