Information processing apparatus, program and method for transmitting content in security scheme according to license policy

ABSTRACT

An information processing apparatus is connectable to a user device over a network. The apparatus includes a processor. The processor transmits, in response to reception of a request for a particular item of content, an identification of a security scheme which is applicable to transmission of the particular item of content in accordance with a license policy. When the item of content can be received by the user device in the security scheme, the processor transmits the item of content in the security scheme.

FIELD OF THE INVENTION

[0001] The present invention relates to secure transmission of content, and more particularly to secure delivery of content to a user apparatus in accordance with the license policy of a content provider.

BACKGROUND OF THE INVENTION

[0002] Pay digital content, such as audio and video files for example, is transmitted from a server to a client over a network, such as the Internet. In such a case, a client user is first authenticated to the server and the content is then transmitted in accordance with a protocol, such as FTP, HTTP and SSL.

[0003] Transmission of content, however, involves such security problems as unauthorized interception, tampering, masquerading, denial of a concluded transaction, redistribution and the like. To prevent such problems, it is proposed that a digital watermark be embedded in the content to restrict its ownership, or that the content be encrypted so that it cannot be replayed without a proper decryption key which can be obtained for value.

[0004] However, content encrypted in a particular encryption method can not necessarily be decrypted by any client or electronic apparatus. In addition, the content provider does not always desire to protect all kinds of items of content in the same security scheme. For example, the provider may want to transmit content of higher value in a higher security scheme, and to transmit content of lower value, or content such as advertisement content which is required to be distributed widely, in a lower security scheme without encryption.

[0005] In Japanese Unexamined Patent Publication 2001-325177 (A) published on Nov. 22, 2001, Miyazaki discloses a content application server. When the server receives apparatus specification environment information and a request for a content application from a client, the server converts a corresponding source content application to a content application which conforms to the apparatus specification environment information, and supplies the converted content application to the client.

[0006] In Japanese Unexamined Patent Publication 2001-202307 (A) published on Jul. 27, 2001, Kawamoto et al. discloses a method of communication between terminals over a network. In this method, one terminal distinguishes a communication application which can be used by another terminal, and transmits information to the other terminal by using that application.

[0007] In Japanese Unexamined Patent Publication 2001-175757 (A) published on Jun. 29, 2001, Yamanaka et al. disclose a system for delivering digital content over a network. In this system, a buyer transmits information describing desired content and a transfer condition to a seller. The seller delivers the described content to the buyer in accordance with the transfer condition.

[0008] In Japanese Unexamined Patent Publication HEI 11-341040 (A) published on Dec. 10, 1999, Saito et al. disclose a communication apparatus connected between two networks. The communications apparatus collects attribute information from a server on the first network, presents the server's attribute information to a terminal on the second network in accordance with the protocol of the second network, transmits to the server a request for the service selected in accordance with the attribute information, and provides the service from the server to the terminal, if necessary, by converting a format.

[0009] In Japanese Unexamined Patent Publication 2001-256162 (A) published on Sep. 21, 2001, Asai et al. discloses a portable terminal which acquires content from a server via a gateway. The content includes a file and an identifier indicating the type of a file, such as video, audio and the like. The terminal transmits the content file to a peripheral device corresponding to an identifier.

[0010] The inventors have recognized the need for selection of a security scheme for the transmission of content in accordance with a license policy of a content provider. The inventors have also recognized the need for the transmission or delivery of content from a server to a client in a security scheme available on the client.

[0011] An object of the present invention is to provide secure transmission of content to a buyer in accordance with a license policy of a content provider.

[0012] Another object of the present invention is to transmit content in an available secure transmission scheme to a user.

SUMMARY OF THE INVENTION

[0013] In accordance with an aspect of the present invention, an information processing apparatus is connectable to a user device over a network. The apparatus includes a processor. The processor transmits, in response to reception of a request for a particular item of content, an identification of a security scheme which is applicable to transmission of the particular item of content in accordance with a license policy. When the item of content can be received by the user device in the security scheme, the processor transmits the item of content in the security scheme.

[0014] In accordance with a further aspect of the invention, an information processing apparatus is connectable to a user device over a network. The apparatus includes a processor. The processor is adapted to receive a request for a particular item of content from the user device. The processor is adapted to receive an identification of an available security scheme from the user device. When the requested item of content can be transmitted in the security scheme in accordance with a license policy, the processor transmits the requested item of content in the security scheme.

[0015] In accordance with a still further aspect of the invention, an information processing apparatus is connectable to a user device over a network. The apparatus includes a processor. The processor is adapted to receive an identification of an available security scheme from the user device. The processor transmits, in response to reception of a request for a content list, a list of items of content that can be transmitted in the available security scheme in accordance with a license policy.

[0016] In accordance with a still further aspect of the invention, an information processing apparatus is connectable to a content source over a network. The apparatus includes a processor. The processor transmits a request for a particular item of content. The processor transmits an identification of a security scheme available for reception and reproduction of the particular item of content. The processor receives the particular item of content transmitted in the security scheme in accordance with a license policy.

[0017] In accordance with a still further aspect of the invention, an information processing apparatus is connectable to a content source over a network. The apparatus includes a processor. The processor transmits a request for a particular item of content. The processor receives an identification of a security scheme which is applicable to transmission of the particular item of content in accordance with a license policy. When the security scheme is available, the processor transmits the identification of the security scheme.

[0018] In accordance with a still further aspect of the invention, an information processing apparatus is connectable to a content source over a network. The apparatus includes a processor. The processor transmits an identification of a security scheme available for reception and reproduction of content. The processor transmits a request for a content list. The processor receives a list of items of content which can be transmitted in the security scheme in accordance with a license policy.

[0019] In accordance with a still further aspect of the invention, a program (which may be stored on a storage medium) is for use in an information processing apparatus connectable to a user device over a network. The program is operable to effect the step of transmitting, in response to reception of a request for a particular item of content, an identification of a security scheme which is applicable to transmission of the particular item of content in accordance with a license policy; and the step of transmitting the item of content in the security scheme, when the item of content can be received by the user device in the security scheme.

[0020] In accordance with a still further aspect of the invention, a program (which may be stored on a storage medium) is for use in an information processing apparatus connectable to a user device over a network. The program is operable to effect the step of receiving a request for a particular item of content; the step of receiving an identification of an available security scheme; and the step of transmitting the requested item of content in the security scheme, when the requested item of content can be transmitted in the security scheme in accordance with a license policy.

[0021] In accordance with a still further aspect of the invention, a method is provided for transmitting an item of content in an information processing apparatus connectable to a user device over a network. The method comprises the step of transmitting, in response to reception of a request for a particular item of content, an identification of a security scheme which is applicable to transmission of the particular item of content in accordance with a license policy; and the step of transmitting the particular item of content in the security scheme, when the particular item of content can be received by the user device in the security scheme.

[0022] In accordance with a still further aspect of the invention, a method is provided for transmitting an item of content in an information processing apparatus connectable to a user device over a network. The method comprises the step of receiving, from the user device, a request for a particular item of content; and the step of transmitting the requested particular item of content in the security scheme, when the requested particular item of content can be transmitted in the security scheme in accordance with a license policy.

[0023] According to the invention, content can be transmitted in a secure transmission scheme available to a user.

[0024] Throughout the drawings, similar symbols and numerals indicate similar items and functions.

BRIEF DESCRIPTION OF THE DRAWINGS

[0025]FIG. 1 shows the configuration of a content server and a residential gateway server interconnected via a network, in accordance with an embodiment of the present invention.

[0026]FIG. 2 shows the configuration of the content server and another residential gateway server interconnected via the network, in accordance with another embodiment of the invention.

[0027]FIG. 3 shows a process for transmitting and receiving the content performed by the content server and the gateway server, in accordance with the invention.

[0028]FIG. 4 shows another process for transmitting and receiving the content performed by the content server and the gateway server, in accordance with the invention.

[0029]FIG. 5 shows a further process for transmitting and receiving the content performed by the content server and the gateway server, in accordance with the invention.

[0030]FIG. 6 shows an example of a set of security schemes applicable to a certain item of content and determined in accordance with the license policy.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

[0031]FIG. 1 shows the configuration of a content server 10 and a residential gateway server 20 interconnected via a network 5 such as the Internet, in accordance with an embodiment of the present invention. The gateway server 20 is also connected to user devices, such as a television receiver (TV) 320 and an audio apparatus 330.

[0032] The content server 10 includes a processor 102 having a CPU, a ROM and a RAM, a program memory or storage device 104, a memory or storage device 120, such as a hard disk unit, for storing a content database, user information and the like, and a network interface (NW I/F) 130 connected to the network 5 such as the Internet, all of which are interconnected via an internal bus.

[0033] The storage device 104 stores application programs for the content server 10. The processor 102 operates in accordance with the application programs. Alternatively, such applications may be implemented in the form of hardware, such as an integrated circuit, in the processor 102.

[0034] The term “content” herein should be broadly interpreted to include digital content in its narrow sense, such as a motion picture program, a music program, a picture and a dictionary in the form of audio and/or video files or a document file, as well as other copyrighted digital products or software in its broader sense, which is suitable for delivery on the Web, such as an application file. The content may be of the kind which is updated periodically, such as audio and video files of different news, advertisements and weather forecasts, for example. Each item of such content is associated with at least one applicable security scheme for distribution in accordance with the license policy of an administrator of the content server 10, for example in accordance with the type and value of the content, the intended user class, the term of validity of the content, and the like.

[0035]FIG. 6 shows an example of a set of security schemes, which are applicable to a certain item of content, and which are determined in accordance with the license policy. Ones of these security schemes may be assigned different priorities, and ones of them may be assigned the same priority. In FIG. 6, for the certain item of content, the first security scheme uses the DES as an encryption method, the digital signature as an authentication method, and the MD-5 as a hash method. The second security scheme uses the AES as an encryption method, but uses neither authentication nor a hash method. The third security scheme uses the triple DES as an encryption method, but uses neither an authentication method nor a hash method. The security scheme may include provisions to restrict the network used for the transmission of an item of content to a network of high security. An advertisement video file, for example, may be transmitted in a lowest security scheme which uses neither an encryption method, an authentication method nor a hash method.

[0036] The residential gateway server 20 includes a processor 202 having a CPU, a ROM and a RAM, a content reproducing module 204, a security module 206, a memory or storage device 220, such as a hard disk unit, for storing application programs, a received file and the like, an input device 240 including a keyboard and a mouse, a display device 250, an audio device 260 including a microphone and a speaker, an external network interface (NW I/F) 230, and a device interface (I/F) 270, all of which are interconnected via an internal bus. The device interface 270 is connected to user devices, such as a television receiver (TV) 320 and an audio apparatus 330, via an IEEE 1394 bus or a USB cable.

[0037] The memory device 220 stores application programs for the residential gateway server 20. The processor 202 operates in accordance with the application programs. Alternatively, such applications may be implemented in the form of hardware, such as an integrated circuit, in the processor 202.

[0038] The reproducing module 204 is used for decoding and reproducing an audio and/or video stream. The reproducing module 204 may perform decryption in accordance with a predetermined encryption method. The security module 206 processes the received content in accordance with a predetermined authentication method, a predetermined hash method, and/or a predetermined encryption method. The reproducing module 204 and the security module 206 are implemented in the form of hardware or software. When they are implemented in software programs, the processor 202 operates in accordance with the programs.

[0039]FIG. 2 shows the configuration of the content server 10 and another residential gateway server 30 interconnected via the network 5 such as the Internet, in accordance with another embodiment of the invention. The gateway server 30 is also connected to user devices, such as a personal computer (PC) 310, the television receiver (TV) 320, and the audio apparatus 330. Further, the gateway server 30 communicates with a mobile telephone 360 and/or a PDA (Personal Digital Assistant) 370 over a network 7, such as a public switched telephone network (PSTN) or a mobile telephone network. The content server 10 has the same configuration as the one shown in FIG. 1, and hence is not described again.

[0040] The residential gateway server 30 includes a processor 302 having a CPU, a ROM and a RAM, the security module 206, the memory device 220 such as a hard disk unit, the external network interface (NW I/F) 230, a network interface (NW I/F) 332 connected to the network 7, and the device interface 270, all of which are interconnected via an internal bus.

[0041] The memory device 220 stores application programs for the residential gateway server 30. The processor 302 operates in accordance with the application programs. Alternatively, such applications may be implemented in the form of hardware, such as an integrated circuit, in the processor 302.

[0042] The device interface 270 is connected to user devices, such as the personal computer (PC) 310, the television receiver (TV) 320, and the audio apparatus 330, via an IEEE 1394 bus or a USB cable. Each of the user devices, including the mobile telephone 360 and the PDA 370 as well as the devices 310, 320 and 330, includes a reproducing module similar to the reproducing module 204 shown in FIG. 1, and each device may further have a security module similar to the security module 206. Preferably, the gateway server 30 collects beforehand the information on the content types, coding methods and security schemes (for example, identifications of encryption schemes) available in the user device, such as the devices 310, 320 and 330, the mobile telephone 360 and the PDA 370, and stores the information in the memory device 220 together with the security schemes (for example, identifications of authentication schemes) available in the gateway server 30. Such information may be entered manually by the user to store in the memory device 220.

[0043]FIG. 3 shows a process for transmitting and receiving the content performed by the content server 10 and the gateway server 20 or 30, in accordance with the invention.

[0044] Now, the operations of the content server 10 and the gateway server 20 are described below with reference to FIGS. 1 and 3.

[0045] At Step 301, the user operates the input device 240 while viewing the display device 250 of the gateway server 20, to operatively connect the gateway server 20 to the content server 10 over the network 5 and request a desired item of content. The content request may involve purchasing an item of pay content.

[0046] At Step 303, in response to the content request, the gateway server 20 (more specifically, the processor 202) requests the content server 10 to transmit the requested item of content. At Step 323, the content server 10 receives the request for transmission of the item of content.

[0047] At Step 325, the content server 10 (more specifically the processor 102) looks up a table of content security schemes in the content database 120, retrieves the identifications (IDs) of the security schemes which are applicable to the transmission of the item of content in accordance with the license policy of the content, and transmits a list of the identifications of the applicable security schemes to the gateway server 20. The applicable security schemes may be the ones as shown in FIG. 6, for example. At Step 305, the gateway server 20 receives the presented list of the identifications of the applicable security schemes.

[0048] At Step 307, the gateway server 20 looks up a table of identifications of the security schemes stored in the memory device 220 and available in the gateway server 20 and compares the presented security schemes with the available security schemes to determine whether the item of content to be transmitted in any ones of the presented security schemes can be received, decoded and reproduced. The security schemes available in the gateway server 20 mean the ones which are available in the reproducing module 204 and the security module 206 of the gateway server 20, and may include the security schemes which can be available in the user devices 320 and 330 connected to the gateway server 20 or other user devices (not shown) not connected to the gateway server 20.

[0049] If it is determined that the item of content can be received, decoded and reproduced, then the gateway server 20 at Step 309 selects or designates a security scheme of the highest priority from among the applicable security schemes that match with the available security schemes, and transmits an identification of the selected security scheme to the server 10. At Step 329, the content server 10 receives the identification of the selected security scheme. At Step 331, the content server 10 retrieves the requested item of content from the database 120, processes the item of content in accordance with the selected security scheme, and transmits the thus processed item of content to the gateway server 20 in accordance with the selected security scheme. Such an item of content may be processed beforehand in accordance with parts of the applicable security schemes and stored in the database 120. At Step 311, the gateway server 20 receives the item of content, stores it in the memory device 220, and produces a display on the display device 250 indicating that the item of content has been received. The item of content thus becomes ready for use by the user.

[0050] If it is determined at Step 307 that the item of content cannot be received, then the gateway server 20 at Step 313 sends a request for canceling the content transmission request to the server 10, and produces a display on the display device 250 indicating that the requested item of content is not available. At Step 333, the server 10 receives the request for canceling the content transmission request, and the procedure exits the routine for content transmission of FIG. 3.

[0051]FIG. 4 shows another process for transmitting and receiving the content performed by the content server 10 and the gateway server 20 or 30, in accordance with the invention.

[0052] Now, the operations of the content server 10 and the gateway server 20 are described below with reference to FIGS. 1 and 4.

[0053] At Step 401, the user operates the input device 240, while viewing the display device 250 of the gateway server 20, to operatively connect the gateway server 20 to the content server 10 over the network 5 and request a desired item of content.

[0054] At Step 403, in response to the content request, the gateway server 20 (more specifically, the processor 202) requests the content server 10 to transmit the requested item of content, looks up the table of the identifications of the security schemes stored in the memory device 220 and available in the gateway server 20, and transmits the identifications of the available security schemes. At Step 423, the content server 10 (more specifically, the processor 102) receives the request for transmission of the item of content together with the identifications of the available security schemes.

[0055] At Step 425, the content server 10 compares the security schemes available in the gateway server 20 with the security schemes stored in a memory device 120 of the content server 10 and applicable to the requested item of content, and determines whether the requested item of content can be transmitted in any ones of the available security schemes.

[0056] If it is determined that the item of content can be transmitted in any ones of the available security schemes, then the content server 10 at Step 427 selects a security scheme of the highest priority from among the applicable security schemes that match the available security schemes, retrieves the requested item of content from the database 120, processes the item of content in accordance with the selected security scheme, and transmits the thus processed item of content to the gateway server 20 in accordance with the selected security scheme. Such an item of content may be processed beforehand in accordance with parts of the applicable security schemes and stored in the database 120. The gateway server 20 receives the item of content at Step 407.

[0057] If it is determined that the item of content cannot be transmitted in any one of the available security schemes, then the gateway server 20 at Step 429 sends a notification of rejecting content transmission to the gateway server 20. At Step 409, the server 10 receives the notification of rejecting content transmission, and produces a display on the display device 250 indicating that the requested item of content is not available.

[0058]FIG. 5 shows a further process for transmitting and receiving the content performed by the content server 10 and the gateway server 20 or 30, in accordance with the invention.

[0059] Now, the operations of the content server 10 and the gateway server 20 are described below with reference to FIGS. 1 and 5.

[0060] At Step 501, the user operates the input device 240, while viewing the display device 250 of the gateway server 20, to operatively connect the gateway server 20 to the content server 10 over the network 5 and request a list of available items of content from the gateway server 20.

[0061] At Step 502, the gateway server 20 (more specifically, the processor 202) determines whether the identifications of the security schemes available in the gateway server 20 for the type of content have already been reported to the content server 10. For this purpose, the gateway server 20 may send, to the content server 10, a query as to whether the identifications of the available security schemes have already been reported. If it is determined that they have already been reported, then the gateway server 20 at Step 505 requests transmission of a list of available items of content. On the other hand, if it is determined that they have not been reported yet, then the gateway server 20 at Step 503 retrieves the identifications of the available security schemes stored in the memory device 220, transmits the identifications to the content server 10 and, at Step 505, requests transmission of a list of available items of content.

[0062] At Step 523, the content server 10 (more specifically, the processor 102) receives the identifications of the available security schemes, and stores them as user information in the memory device 120. The content server 10, at Step 525, receives the request for transmission of a content list, and, at Step 527, retrieves the identifications of the security schemes available in the gateway server 20 from the memory device 120.

[0063] At Step 529, the content server 10 compares the security schemes available in the gateway server 20 with the security schemes and applicable to items of content which can be provided by the content server 10, produces a list of available items of content which can be transmitted in the available security schemes, and transmits the list to the gateway server 20. The list may include attributes of each item of content, such as a type of content (for example, identification of the type, such as an audio and/or video file, a text file, and the like), a title or identification of an item of content, license policy, a price, and the term of validity.

[0064] At Step 509, the gateway server 20 displays the content list on the display device 250. At Step 511, the user operates the input device 240, while viewing the display device 250 of the gateway server 20, selects one or more items of content and requests the selected one or more items of content. In response to the request, the gateway server 20 requests the content server 10 to transmit the selected one or more items of content.

[0065] At Step 531, the content server 10 receives the request for content transmission, selects a security scheme of the highest priority from among the applicable security schemes that match the available security schemes for each item of content, retrieves the requested each item of content from the database 120, processes each item of content in accordance with the selected security scheme, and transmits the thus processed one or more items of content to the gateway server 20 in accordance with the respective selected security schemes. Such items of content may be processed beforehand in accordance with parts of the applicable security schemes and stored in the database 120. At Step 513, the gateway server 20 receives the one or more items of content and stores them in the memory device 220. The items of content thus become ready for use by the user.

[0066] Now, the operations of the content server 10 and the gateway server 30 are described below with reference to FIGS. 2 and 3.

[0067] At Step 301, the user operates the keys on the mobile telephone 360 or the PDA 370 while viewing the display thereof, to connect the mobile telephone 360 or the PDA 370 to the gateway server 30 over the network 7, and requests a desired item of content from the gateway server 30. In this case, when the item of content is to be used on the mobile telephone 360 or the PDA 370, the mobile telephone 360 or the PDA 370 may also transmit, to the gateway server 30, the identifications of the security schemes available in the mobile telephone 360 or the PDA 370. The gateway server 30 then stores the identifications of the available security schemes in the memory device 220. The content request may involve purchasing an item of pay content.

[0068] The operations of the content server 10 and the gateway server 30 at Steps 303 to 305 and Steps 323 to 325 are the same as those of the content server 10 and the gateway server 20 shown in FIG. 1, and hence are not described again.

[0069] At Step 307, the gateway server 30 (more specifically, the processor 302) looks up a table of the identifications of the security schemes stored in the memory device 220 and available for a combination of the gateway server 30 and the user devices 310, 320, 330, 360 and 370, compares the available security schemes with the security schemes presented by the content server 10, and determines whether the item of content to be transmitted in any ones of the presented security schemes can be received, decoded and reproduced.

[0070] The operations of the content server 10 and the gateway server 30 at Steps 309 and 329 to 333 are the same as those of the content server 10 and the gateway server 20 shown in FIG. 1, and hence are not described again.

[0071] At Step 311, the gateway server 30 receives the item of content transmitted in the selected security scheme, stores the received item of content in the memory device 220, and sends a notification of the reception of the item of content to the mobile telephone 360 or the PDA 370 for display. On the other hand, at Step 313, the gateway server 30 transmits a request for canceling the content transmission request to the server 10 and, at the same time, sends the notification of the cancellation to the mobile telephone 360 or the PDA 370 for display.

[0072] Now, the operations of the content server 10 and the gateway server 30 are described below with reference to FIGS. 2 and 4.

[0073] At Step 401, the user operates the keys on the mobile telephone 360 or the PDA 370 while viewing the display thereof, to connect the mobile telephone 360 or the PDA 370 to the gateway server 30 over the network 7, and requests a desired item of content from the gateway server 30. In this case, when the item of content is to be used on the mobile telephone 360 or the PDA 370, the mobile telephone 360 or the PDA 370 may also transmit, to the gateway server 30, the identifications of the security schemes available in the mobile telephone 360 or the PDA 370. The gateway server 30 then stores the identifications of the available security schemes in the memory device 220.

[0074] At Step 403, in response to the content request received from the user, the gateway server 30 (more specifically, the processor 302) requests the content server 10 to transmit the item of content and, at the same time, looks up a table of the identifications of the security schemes stored in the memory device 220 and available for a combination of the gateway server 30 and the user devices 310, 320, 330, 360 and 370, and transmits the identifications of the available security schemes to the content server 10.

[0075] The operations of the content server 10 and the gateway server 30 at Steps 423 to 429 are the same as those of the content server 10 and the gateway server 20 shown in FIG. 1, and hence are not described again.

[0076] At Step 407, the gateway server 30 receives the item of content, stores the received item of content in the memory device 220, and sends a notification of the reception of the item of content to the mobile telephone 360 or the PDA 370 for display. On the other hand, at Step 409, the gateway server 30 receives, from the server 10, a notification of rejecting the content transmission request, and passes the notification to the mobile telephone 360 or the PDA 370 for display.

[0077] Now, the operations of the content server 10 and the gateway server 30 are described below with reference to FIGS. 2 and 5.

[0078] At Step 501, the user operates the keys on the mobile telephone 360 or the PDA 370 while viewing the display thereof, connects the mobile telephone 360 or the PDA 370 to the gateway server 30 over the network 7, and requests a list of items of content from the gateway server 30. In this case, the mobile telephone 360 or the PDA 370 may also transmit, to the gateway server 30, the identifications of the security schemes available in the mobile telephone 360 or the PDA 370. The gateway server 30 then stores the identifications of the available security schemes in the memory device 220.

[0079] At Step 502, in response to the request, the gateway server 30 (more specifically, the processor 302) determines whether the identifications of the security schemes stored in the memory device 220 and available for a combination of the gateway server 30 and the user devices 310, 320, 330, 360 and 370 have already been reported to the content server 10. For this purpose, the gateway server 30 may send a query as to whether the identifications of the available security schemes have already been reported to the content server 10. If it is determined that they have already been reported, then the gateway server 30 at Step 505 requests the content server 10 to transmit a list of available items of content. On the other hand, if it is determined that they have not been reported yet, then at Step 503 the gateway server 30 transmits the identifications of the available security schemes to the content server 10 and, at Step 505, requests the transmission of a list of available items of content.

[0080] The operations of the content server 10 and the gateway server 30 at Steps 523 to 533 are the same as those of the content server 10 and the gateway server 20 shown in FIG. 1, and hence are not described again.

[0081] At Step 509, the gateway server 30 transmits the content list to the mobile telephone 360 or the PDA 370 for display on its display device. At Step 511, the user operates the keys on the mobile telephone 360 or the PDA 370 while viewing the list of available items of content, selects one or more items of content, and requests the selected one or more items of content from the gateway server 30. In response to the request, the gateway server 30 requests the content server 10 to transmit the selected one or more items of content.

[0082] At Step 513, the gateway server 30 receives the items of content, stores the received items of content in the memory device 220, and sends a notification of the reception of the items of content to the mobile telephone 360 or the PDA 370 for display.

[0083] The above-described embodiments are only typical examples, and their modifications and variations are apparent to those skilled in the art. It should be noted that those skilled in the art can make various modifications to the above-described embodiments without departing from the principle of the invention and the accompanying claims. 

What is claimed is:
 1. An information processing apparatus connectable to a user device over a network, said information processing apparatus comprising a processor, wherein said processor transmits, in response to reception of a request for a particular item of content, an identification of a security scheme which is applicable to transmission of said particular item of content in accordance with a license policy, and when the item of content can be received by said user device, and reproduced in said security scheme, said processor transmits the item of content in said security scheme.
 2. An information processing apparatus according to claim 1, wherein after transmitting the identification of said security scheme, said processor receives selection of the identification of said security scheme or cancellation of said request for the item of content.
 3. An information processing apparatus connectable to a user device over a network, said information processing apparatus comprising a processor, wherein said processor is adapted to receive a request for a particular item of content from said user device, said processor is adapted to receive an identification of an available security scheme from said user device, and when the requested item of content can be transmitted in said security scheme in accordance with a license policy, said processor transmits the requested item of content in said security scheme.
 4. An information processing apparatus according to claim 3, wherein when the requested item of content cannot be transmitted in said security scheme in accordance with said license policy, said processor does not transmit the requested item of content.
 5. An information processing apparatus connectable to a user device over a network, said information processing apparatus comprising a processor, wherein said processor is adapted to receive an identification of an available security scheme from said user device, and said processor transmits, in response to reception of a request for a content list, a list of items of content that can be transmitted in said available security scheme in accordance with a license policy.
 6. An information processing apparatus according to claim 5, wherein in response to a request for an item of content selected from said list of items of content, said processor transmits the selected item of content in an applicable security scheme which matches said available security scheme.
 7. An information processing apparatus connectable to a content source over a network, said information processing apparatus comprising a processor, wherein said processor transmits a request for a particular item of content, said processor transmits an identification of a security scheme available for reception and reproduction of the particular item of content, and said processor receives the particular item of content transmitted in said security scheme in accordance with a license policy.
 8. An information processing apparatus according to claim 7, wherein said processor transmits said request for the particular item of content, in response to a request for the particular item of content received from another apparatus.
 9. An information processing apparatus connectable to a content source over a network, said information processing apparatus comprising a processor, wherein said processor transmits a request for a particular item of content, said processor receives an identification of a security scheme which is applicable to transmission of said particular item of content in accordance with a license policy, when said security scheme is available, said processor transmits the identification of said security scheme.
 10. An information processing apparatus according to claim 9, wherein said processor transmits said request for the particular item of content, in response to a request for the particular item of content received from another apparatus.
 11. An information processing apparatus connectable to a content source over a network, said information processing apparatus comprising a processor, wherein said processor transmits an identification of a security scheme available for reception and reproduction of content, said processor transmits a request for a content list, and said processor receives a list of items of content which can be transmitted in said security scheme in accordance with a license policy.
 12. An information processing apparatus according to claim 11, wherein said processor further transmits an identification of an item of content selected from said received list of items of content, and receives the selected item of content transmitted in said security scheme.
 13. An information processing apparatus according to claim 11, wherein said processor transmits said request for the content list, in response to a content request received from another apparatus.
 14. A program, stored on a storage medium, for an information processing apparatus connectable to a user device over a network, said program being operable to effect the steps of: transmitting, in response to reception of a request for a particular item of content, an identification of a security scheme which is applicable to transmission of said particular item of content in accordance with a license policy; and transmitting the item of content in said security scheme, when the item of content can be received by said user device in said security scheme.
 15. A program according to claim 14, being operable to further effect the step of receiving selection of the identification of said security scheme or cancellation of said request for the item of content, after transmitting the identification of said security scheme.
 16. A program stored on a storage medium for an information processing apparatus connectable to a user device over a network, said program being operable to effect the steps of: receiving a request for a particular item of content, receiving an identification of an available security scheme, and transmitting the requested item of content in said security scheme, when the requested item of content can be transmitted in said security scheme in accordance with a license policy.
 17. A program stored on a storage medium for an information processing apparatus connectable to a user device over a network, said program being operable to effect the steps of: receiving an identification of an available security scheme, and transmitting, in response to reception of a request for a content list, a list of items of content which can be transmitted in said available security scheme in accordance with a license policy.
 18. A program according to claim 17, being operable to further effect the step of transmitting, in response to a request for an item of content selected from said list of items of content, the selected item of content in an applicable security scheme which matches said available security scheme.
 19. A program stored on a storage medium for an information processing apparatus connectable to a content source over a network, said program being operable to effect the steps of: transmitting a request for a particular item of content, transmitting an identification of a security scheme available for reception and reproduction of the item of content, and receiving the item of content transmitted in said security scheme in accordance with a license policy.
 20. A program stored on a storage medium for an information processing apparatus connectable to a content source over a network, said program being operable to effect the steps of: transmitting a request for a particular item of content, receiving an identification of a security scheme which is applicable to transmission of said particular item of content in accordance with a license policy, and transmitting the identification of said security scheme, when said security scheme is available.
 21. A program stored on a storage medium for an information processing apparatus connectable to a content source over a network, said program being operable to effect the steps of: transmitting an identification of a security scheme available for reception and reproduction of content, transmitting a request for a content list, and receiving a list of items of content which can be transmitted in said security scheme in accordance with a license policy.
 22. A program according to claim 21, being operable to further effect the step of transmitting an identification of an item of content selected from said received list of items of content, and receiving the selected item of content transmitted in said security scheme.
 23. A method for transmitting an item of content in an information processing apparatus connectable to a user device over a network, said method comprising the steps of: transmitting, in response to reception of a request for a particular item of content, an identification of a security scheme which is applicable to transmission of said particular item of content in accordance with a license policy; and transmitting the particular item of content in said security scheme, when the particular item of content can be received by said user device in said security scheme.
 24. A method for transmitting an item of content in an information processing apparatus connectable to a user device over a network, said method comprising the steps of: receiving, from said user device, a request for a particular item of content, and transmitting the requested particular item of content in said security scheme, when the requested particular item of content can be transmitted in said security scheme in accordance with a license policy.
 25. A method for transmitting an item of content in an information processing apparatus connectable to a user device over a network, said method comprising the steps of: receiving an identification of an available security scheme from said user device, and transmitting, in response to reception of a request for a content list, a list of items of content that can be transmitted in said available security scheme in accordance with a license policy.
 26. A method for transmitting an item of content in an information processing apparatus connectable to a content source over a network, said method comprising the steps of: transmitting a request for a particular item of content, transmitting an identification of a security scheme available for reception and reproduction of the item of content, and receiving the item of content transmitted in said security scheme in accordance with a license policy.
 27. A method for transmitting an item of content in an information processing apparatus connectable to a content source over a network, said method comprising the steps of: transmitting a request for a particular item of content, receiving an identification of a security scheme which is applicable to transmission of said particular item of content in accordance with a license policy, and transmitting the identification of said security scheme, when said security scheme is available. 