JP5075410B2 - Television receiver and client terminal - Google Patents

Television receiver and client terminal Download PDF

Info

Publication number
JP5075410B2
JP5075410B2 JP2006527642A JP2006527642A JP5075410B2 JP 5075410 B2 JP5075410 B2 JP 5075410B2 JP 2006527642 A JP2006527642 A JP 2006527642A JP 2006527642 A JP2006527642 A JP 2006527642A JP 5075410 B2 JP5075410 B2 JP 5075410B2
Authority
JP
Japan
Prior art keywords
information
personal information
management server
storage unit
key management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
JP2006527642A
Other languages
Japanese (ja)
Other versions
JPWO2006006200A1 (en
Inventor
涼太 衞藤
順子 杉中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of JPWO2006006200A1 publication Critical patent/JPWO2006006200A1/en
Application granted granted Critical
Publication of JP5075410B2 publication Critical patent/JP5075410B2/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/65Transmission of management data between client and server
    • H04N21/658Transmission by the client directed to the server
    • H04N21/6582Data stored in the client, e.g. viewing habits, hardware capabilities, credit card number
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25866Management of end-user data
    • H04N21/25891Management of end-user data being end-user preferences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/47End-user applications
    • H04N21/475End-user interface for inputting end-user data, e.g. personal identification number [PIN], preference data
    • H04N21/4755End-user interface for inputting end-user data, e.g. personal identification number [PIN], preference data for defining user preferences, e.g. favourite actors or genre
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/162Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/167Systems rendering the television signal unintelligible and subsequently intelligible
    • H04N7/1675Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/173Analogue secrecy systems; Analogue subscription systems with two-way working, e.g. subscriber sending a programme selection signal
    • H04N7/17309Transmission or handling of upstream communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/601Broadcast encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Graphics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Human Computer Interaction (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Storage Device Security (AREA)

Description

本発明は、双方向テレビ放送を視聴する人の個人情報をテレビ受像機から放送局に安全に送信したり、ホームページにアクセスする人の個人情報をクライアント端末からサイトに安全に送信したりするシステムのための双方向テレビ方式のテレビ受像機及びクライアント端末に関する。 The present invention is a system for safely transmitting personal information of a person who views an interactive television broadcast from a television receiver to a broadcasting station, or for safely transmitting personal information of a person accessing a home page from a client terminal to a site. The present invention relates to an interactive television type television receiver and a client terminal .

双方向テレビ方式においては、視聴者に対してアンケートをとったり、視聴者に物品を販売したりすることが行われている。その際に、アンケートであれば、視聴者の属性情報(性別、年令、職業など)を得たうえで、階層別に回答を分析している。物品販売であれば、販売物品の配送先となる住所氏名や支払いのためのクレジット番号などの情報を入手している。視聴者はこれらの情報を必要とされる都度、端末(通常はリモコンを使う)を操作して各情報を入力し、放送局に送信している(例えば、特許文献1参照)。   In the interactive television system, questionnaires are given to viewers and articles are sold to viewers. At that time, if it is a questionnaire, after obtaining the viewer's attribute information (gender, age, occupation, etc.), the responses are analyzed by rank. In the case of merchandise sales, information such as an address name and a credit number for payment is obtained. Whenever this information is required, the viewer operates the terminal (usually using a remote controller) to input each information and transmit it to a broadcasting station (see, for example, Patent Document 1).

また、近年、インターネット上で様々な企業・個人がホームページを使った広告宣伝活動を行うことが多くなっている。このホームページは不特定多数の人間が閲覧することができるが、企業側からするとホームページの閲覧者の属性を知ることができないために、閲覧者一人ひとりへ向けた情報の発信をすることが難しい。また、閲覧者は、個人情報を提供するのは構わないが、野放しに提供したくはなく、しかるべき管理下で個人情報を提供したい。このような状況で、従来は、各企業が自ホームページに訪れた人に属性情報を質問して、進んで回答してくれる閲覧者の属性情報に関して、自らの責任において、所定の制限の下で管理利用している。
特開平9−98411号公報
In recent years, various companies / individuals on the Internet frequently conduct advertising activities using homepages. This homepage can be browsed by an unspecified number of people, but from the corporate side, it is difficult to send information to each viewer because it cannot know the attributes of the homepage viewer. Also, the viewer may provide personal information, but does not want to provide it openly, but wants to provide personal information under appropriate management. Under such circumstances, conventionally, each company asks the attribute information to the person who visited the homepage, and regarding the attribute information of the viewer who is willing to answer, it is under its own responsibility and under the prescribed restrictions. It is used for management.
JP-A-9-98411

しかし、このようなテレビの視聴者やホームページの閲覧者の属性情報を取得する方法では、個人は、新たに必要とされる度に自分の属性情報を逐一書き込む面倒があり、企業は面倒な作業をいとわない個人の属性情報を取得することができるにとどまる。   However, in such a method of acquiring attribute information of TV viewers and homepage viewers, individuals have the trouble of writing their attribute information one by one each time it is newly required, and companies are troublesome work It is only possible to acquire attribute information of individuals who are willing.

本発明は、上記問題点に鑑み、個人が逐一書き込まなくても個人の属性情報をしかるべき管理下で企業側に提供することができる双方向テレビ方式のテレビ受像機及びクライアント端末を提供することを目的とする。 In view of the above problems, the present invention provides an interactive television television receiver and a client terminal that can provide personal attribute information to a company under appropriate management even if the individual does not write them one by one. With the goal.

本発明のテレビ受像機は、鍵管理サーバから暗号化個人情報を受信する受信手段と、該受信手段によって受信した暗号化個人情報を記憶する情報記憶部と、個人情報を放送局に開示することを許可する情報開示許可信号を予め前記鍵管理サーバに送信しておいて、テレビ放送視聴に際して双方向テレビ放送上り回線を介して前記放送局に前記情報記憶部に記憶されている暗号化個人情報を送信する送信手段とを備えることを特徴とする。 The television receiver of the present invention discloses a receiving means for receiving encrypted personal information from a key management server, an information storage unit for storing the encrypted personal information received by the receiving means, and disclosing the personal information to a broadcasting station. keep in transmitting information disclosure permission signal for permitting advance to the key management server, encrypted personal information stored in the information storage unit in the broadcast station via the interactive television broadcast uplink time of the television broadcast viewing And transmitting means for transmitting.

また、本発明のクライアント端末は、鍵管理サーバから暗号化個人情報を受信する受信手段と、該受信手段によって受信した暗号化個人情報を記憶する情報記憶部と、個人情報を企業サーバに開示することを許可する情報開示許可信号を予め前記鍵管理サーバに送信しておいて、前記企業サーバが開設するホームページ閲覧に際して前記企業サーバに前記情報記憶部に記憶されている暗号化個人情報を送信する送信手段とを備えることを特徴とする。 Further, the client terminal of the present invention discloses a receiving unit that receives encrypted personal information from the key management server, an information storage unit that stores the encrypted personal information received by the receiving unit, and discloses the personal information to the company server. keep sending in advance the key management server information disclosure permission signal for permitting to transmit the encrypted personal information enterprise server is stored in the information storage unit to the enterprise server when homepage browsing to open And a transmission means.

また、前記情報記憶部は、クッキーであることで、ユーザが特にそのための操作をすることなく個人情報を企業サーバに送信することができる。   In addition, since the information storage unit is a cookie, the user can transmit personal information to the company server without any particular operation for the user.

本発明によれば、個人が逐一書き込まなくても個人の属性情報をしかるべき管理下で企業側に提供することができる。   According to the present invention, personal attribute information can be provided to a company under appropriate management even if the individual does not write it one by one.

図1は、本発明の実施例1によるテレビ受像機及び鍵管理サーバを含むシステム全体の構成を示す図である。FIG. 1 is a diagram showing a configuration of the entire system including a television receiver and a key management server according to Embodiment 1 of the present invention. 図2は、鍵管理サーバ、テレビ受像機、及び放送局の動作を説明するフローチャートである。FIG. 2 is a flowchart for explaining operations of the key management server, the television receiver, and the broadcasting station. 図3は、鍵管理サーバの情報記憶部の内容を示す図である。FIG. 3 is a diagram illustrating the contents of the information storage unit of the key management server. 図4は、本発明の実施例2によるクライアント端末及び鍵管理サーバを含むシステム全体の構成を示す図である。FIG. 4 is a diagram illustrating a configuration of the entire system including the client terminal and the key management server according to the second embodiment of the present invention. 図5は、鍵管理サーバ、クライアント端末、及び企業サーバの動作を説明するフローチャートである。FIG. 5 is a flowchart for explaining operations of the key management server, the client terminal, and the enterprise server.

以下、添付図面を参照しながら本発明を実施するための最良の形態について詳細に説明する。   The best mode for carrying out the present invention will be described below in detail with reference to the accompanying drawings.

図1は、本発明の実施例1によるテレビ受像機及び鍵管理サーバを含むシステム全体の構成を示す図である。本システムは、鍵管理サーバ1、テレビ受像機2、及び放送局3からなる。鍵管理サーバ1は、通信部10、CPU部20、及び情報記憶部30からなる。テレビ受像機2は、通信部40、CPU部50、情報記憶部60、及びチューナ70からなる。放送局3は、通信部80、CPU部90、情報記憶部100、及び放送設備110からなる。   FIG. 1 is a diagram showing a configuration of the entire system including a television receiver and a key management server according to Embodiment 1 of the present invention. This system includes a key management server 1, a television receiver 2, and a broadcasting station 3. The key management server 1 includes a communication unit 10, a CPU unit 20, and an information storage unit 30. The television receiver 2 includes a communication unit 40, a CPU unit 50, an information storage unit 60, and a tuner 70. The broadcast station 3 includes a communication unit 80, a CPU unit 90, an information storage unit 100, and a broadcast facility 110.

鍵管理サーバ1の通信部10は、テレビ受像機2が鍵管理サーバ1にアクセスできるホームページを開設する。また、通信部10は、放送局3と接続して、放送局3に後述する暗号解読キーなどの情報を送信する。CPU部20は、暗号解読キー作成手段21、及び暗号化手段22からなり、通信部10及び情報記憶部30を制御する。情報記憶部30は、暗号解読キー31、及び情報開示許可信号32を記憶する。   The communication unit 10 of the key management server 1 opens a home page where the television receiver 2 can access the key management server 1. The communication unit 10 is connected to the broadcast station 3 and transmits information such as a decryption key to be described later to the broadcast station 3. The CPU unit 20 includes a decryption key creation unit 21 and an encryption unit 22 and controls the communication unit 10 and the information storage unit 30. The information storage unit 30 stores a decryption key 31 and an information disclosure permission signal 32.

テレビ受像機2の通信部40は、鍵管理サーバ1に接続して、鍵管理サーバ1が開設するホームページにアクセスし、情報をやりとりする。また、通信部40は、双方向テレビ放送の上り回線である電話回線などで放送局3と接続して、暗号化個人情報などの情報を放送局3に送信する。CPU部50は、ブラウザ手段51、及びテレビ受信ソフト52からなり、通信部40、情報記憶部60、及びチューナ70を制御する。情報記憶部60は、暗号化個人情報を記憶する。チューナ70は、放送局3からの双方向テレビ放送(下り)を受信する。   The communication unit 40 of the television receiver 2 connects to the key management server 1, accesses a homepage established by the key management server 1, and exchanges information. In addition, the communication unit 40 is connected to the broadcast station 3 through a telephone line that is an uplink of interactive television broadcasting, and transmits information such as encrypted personal information to the broadcast station 3. The CPU unit 50 includes browser means 51 and television reception software 52, and controls the communication unit 40, the information storage unit 60, and the tuner 70. The information storage unit 60 stores encrypted personal information. The tuner 70 receives an interactive television broadcast (downlink) from the broadcast station 3.

放送局3の通信部80は、鍵管理サーバ1に接続して、暗号解読キーなどの情報を受信する。また、通信部80は、双方向テレビ放送の上り回線である電話回線などでテレビ受像機2に接続して、暗号化個人情報などの情報を受信する。CPU部90は、暗号解読手段91を有し、通信部80、情報記憶部100、及び放送設備110を制御する。情報記憶部100は、暗号解読キー101、及び個人情報102を記憶する。放送設備110は、双方向テレビ放送を送信する。   The communication unit 80 of the broadcasting station 3 connects to the key management server 1 and receives information such as a decryption key. The communication unit 80 receives information such as encrypted personal information by connecting to the television receiver 2 via a telephone line that is an uplink of interactive television broadcasting. The CPU unit 90 includes a decryption unit 91 and controls the communication unit 80, the information storage unit 100, and the broadcast facility 110. The information storage unit 100 stores a decryption key 101 and personal information 102. Broadcast equipment 110 transmits interactive television broadcasts.

図2は、鍵管理サーバ、テレビ受像機、及び放送局の動作を説明するフローチャートである。図3は、鍵管理サーバの情報記憶部の内容を示す図である。まず、テレビ受像機2の通信部40は、ブラウザ手段51によって鍵管理サーバ1のホームページにアクセスし、アンケート形式などのガイドに従って、視聴者の個人情報を鍵管理サーバ1に送信する(ステップS11)。つぎに、鍵管理サーバ1の暗号解読キー作成手段21は、個人情報に関して、例えば3つのレベルの暗号解読キー31を作成して、受像機と対応付けて、情報記憶部30に記憶する(図3のキー、L1、L2、L3参照)。例えば、レベル1としては、個人を特定することができないレベルの情報(年令、性別、趣味など)を暗号化し解読できるキー(L1)。レベル2としては、個人を特定する情報であるが、金銭に関係しない情報(氏名、住所、電話番号、Eメールアドレスなど)を暗号化し解読できるキー(L2)。レベル3としては、金銭に関係する情報(銀行口座番号、クレジット番号など)を暗号化し解読できるキー(L3)。そして、暗号化手段22は、テレビ受像機2から受信した個人情報をその受像機に対応した暗号解読キー31によって暗号化する(ステップS12)。通信部10は、暗号化された個人情報をテレビ受像機2に送信する(ステップS13)。テレビ受像機2の情報記憶部60は、鍵管理サーバ1から受信した暗号化個人情報を記憶する(ステップS14)。ここで、視聴者がテレビ受像機2を操作することによって、通信部40はCPU部50に制御されて、A社、B社、C社などの放送局別に所定レベルで個人情報を公開することを許可する信号を鍵管理サーバ1に送信する(ステップS15)。鍵管理サーバ1の通信部10が、テレビ受像機2から許可信号を受信すると、情報記憶部30は、その受像機がその放送局に個人情報を公開するレベルを情報開示許可信号32(L0〜L3)として記憶し、通信部10は、各放送局3に対応する情報開示許可レベルの暗号解読キーをその放送局3に送信する(ステップS16)。ここで、公開を許可しないレベルL0に対してはキーを送信せず、レベルL1の公開に対してはL1のキーを送信し、レベルL2の公開に対してはL1及びL2のキーを送信し、レベルL3の公開に対してはL1〜L3のすべてのキーを送信する。これによって放送局3は公開の各レベルに応じた個人情報を解読することができる。放送局3は、鍵管理サーバ1から受信した暗号解読キー101を情報記憶部100にテレビ受像機2と対応づけて記憶する(ステップS17)。つぎに、テレビ受像機2が放送局3の放送を視聴する際に、双方向テレビ放送の上り回線を使って情報記憶部60に記憶している暗号化個人情報を放送局3に送信すると(ステップS18)、放送局3は、受信した暗号化個人情報を、予め記憶している暗号解読キー101によってそのレベルに応じた範囲で解読して(ステップS19)、解読した個人情報102を情報記憶部100にテレビ受像機2と対応づけて記憶する(ステップS20)。これにより視聴者は逐一自分の個人情報をキー入力せずに予め情報記憶部60に記憶されている暗号化個人情報を送信する操作をするだけで、自分の意図する範囲の個人情報を放送局3に送信することができる。そして、放送局3は、視聴者の意図する範囲で視聴者の個人情報を視聴者と対応づけて取得し、記憶することができる。   FIG. 2 is a flowchart for explaining operations of the key management server, the television receiver, and the broadcasting station. FIG. 3 is a diagram illustrating the contents of the information storage unit of the key management server. First, the communication unit 40 of the television receiver 2 accesses the homepage of the key management server 1 by the browser means 51, and transmits the viewer's personal information to the key management server 1 according to a guide such as a questionnaire format (step S11). . Next, the decryption key creation means 21 of the key management server 1 creates, for example, three levels of decryption keys 31 for personal information, and stores them in the information storage unit 30 in association with the receiver (see FIG. 3 keys, see L1, L2, L3). For example, level 1 is a key (L1) that can encrypt and decrypt information (such as age, sex, hobbies, etc.) at a level that cannot identify an individual. Level 2 is information that identifies an individual, but is a key (L2) that can encrypt and decrypt information (name, address, telephone number, e-mail address, etc.) that is not related to money. Level 3 is a key (L3) that can encrypt and decrypt information related to money (bank account number, credit number, etc.). Then, the encryption means 22 encrypts the personal information received from the television receiver 2 with the decryption key 31 corresponding to the receiver (step S12). The communication unit 10 transmits the encrypted personal information to the television receiver 2 (step S13). The information storage unit 60 of the television receiver 2 stores the encrypted personal information received from the key management server 1 (step S14). Here, when the viewer operates the television receiver 2, the communication unit 40 is controlled by the CPU unit 50, and the personal information is disclosed at a predetermined level for each broadcasting station such as the company A, the company B, and the company C. Is transmitted to the key management server 1 (step S15). When the communication unit 10 of the key management server 1 receives the permission signal from the television receiver 2, the information storage unit 30 sets the level at which the receiver opens the personal information to the broadcasting station as the information disclosure permission signal 32 (L0 to L0). L3), and the communication unit 10 transmits to the broadcasting station 3 the decryption key of the information disclosure permission level corresponding to each broadcasting station 3 (step S16). Here, the key is not transmitted to the level L0 that is not permitted to be disclosed, the L1 key is transmitted to the level L1 disclosure, and the L1 and L2 keys are transmitted to the level L2 disclosure. All keys L1 to L3 are transmitted for level L3 disclosure. As a result, the broadcasting station 3 can decipher the personal information corresponding to each public level. The broadcasting station 3 stores the decryption key 101 received from the key management server 1 in the information storage unit 100 in association with the television receiver 2 (step S17). Next, when the television receiver 2 views the broadcast of the broadcast station 3, the encrypted personal information stored in the information storage unit 60 is transmitted to the broadcast station 3 using the uplink of the interactive television broadcast ( In step S18), the broadcast station 3 decrypts the received encrypted personal information within a range corresponding to the level using the decryption key 101 stored in advance (step S19), and stores the decrypted personal information 102 as information. The information is stored in the unit 100 in association with the television receiver 2 (step S20). As a result, the viewer can perform the operation of transmitting the encrypted personal information stored in the information storage unit 60 in advance without keying his / her personal information one by one. 3 can be transmitted. The broadcast station 3 can acquire and store the viewer's personal information in association with the viewer within the range intended by the viewer.

図4は、本発明の実施例2によるクライアント端末及び鍵管理サーバを含むシステム全体の構成を示す図である。本システムは、鍵管理サーバ4、クライアント端末5、及び企業サーバ6からなる。鍵管理サーバ4は、通信部210、CPU部220、及び情報記憶部230からなる。クライアント端末5は、通信部240、CPU部250、及び情報記憶部260からなる。企業サーバ6は、通信部270、CPU部280、及び情報記憶部290からなる。   FIG. 4 is a diagram illustrating a configuration of the entire system including the client terminal and the key management server according to the second embodiment of the present invention. This system includes a key management server 4, a client terminal 5, and a company server 6. The key management server 4 includes a communication unit 210, a CPU unit 220, and an information storage unit 230. The client terminal 5 includes a communication unit 240, a CPU unit 250, and an information storage unit 260. The company server 6 includes a communication unit 270, a CPU unit 280, and an information storage unit 290.

鍵管理サーバ4の通信部210は、クライアント端末5が鍵管理サーバ4にアクセスできるホームページを開設する。また、通信部10は、企業サーバ6と接続して、企業サーバ6に後述する暗号解読キーなどの情報を送信する。CPU部220は、暗号解読キー作成手段221、及び暗号化手段222からなり、通信部210及び情報記憶部230を制御する。情報記憶部230は、暗号解読キー231、及び情報開示許可信号232を記憶する。   The communication unit 210 of the key management server 4 opens a home page where the client terminal 5 can access the key management server 4. Further, the communication unit 10 is connected to the company server 6 and transmits information such as a decryption key described later to the company server 6. The CPU unit 220 includes a decryption key creation unit 221 and an encryption unit 222, and controls the communication unit 210 and the information storage unit 230. The information storage unit 230 stores a decryption key 231 and an information disclosure permission signal 232.

クライアント端末5の通信部240は、鍵管理サーバ4に接続して、鍵管理サーバ4が開設するホームページにアクセスし、情報をやりとりする。また、通信部240は、企業サーバ6が開設するホームページにアクセスし、クッキーの機能を使って暗号化個人情報などの情報を企業サーバ6に送信する。CPU部250は、ブラウザ手段251を有し、通信部240、及び情報記憶部260を制御する。情報記憶部260は、クッキー261のためのメモリ領域を有し暗号化個人情報を記憶する。   The communication unit 240 of the client terminal 5 connects to the key management server 4, accesses a homepage established by the key management server 4, and exchanges information. Further, the communication unit 240 accesses a homepage established by the company server 6 and transmits information such as encrypted personal information to the company server 6 using a cookie function. The CPU unit 250 includes browser means 251 and controls the communication unit 240 and the information storage unit 260. The information storage unit 260 has a memory area for the cookie 261 and stores encrypted personal information.

企業サーバ6の通信部270は、鍵管理サーバ4に接続して、暗号解読キーなどの情報を受信する。また、通信部270は、ホームページを開設してクライアント端末5のアクセスを受けて、クッキーの機能を使って暗号化個人情報などの情報を受信する。CPU部280は、暗号解読手段281を有し、通信部270、及び情報記憶部290を制御する。情報記憶部290は、暗号解読キー291、及び個人情報292を記憶する。   The communication unit 270 of the company server 6 is connected to the key management server 4 and receives information such as a decryption key. In addition, the communication unit 270 establishes a home page, receives access from the client terminal 5, and receives information such as encrypted personal information using a cookie function. The CPU unit 280 includes a decryption unit 281 and controls the communication unit 270 and the information storage unit 290. The information storage unit 290 stores a decryption key 291 and personal information 292.

図5は、鍵管理サーバ、クライアント端末、及び企業サーバの動作を説明するフローチャートである。まず、クライアント端末5の通信部240は、ブラウザ手段251によって鍵管理サーバ4のホームページにアクセスし、アンケート形式などのガイドに従って、ユーザの個人情報を鍵管理サーバ4に送信する(ステップS21)。つぎに、鍵管理サーバ4の暗号解読キー作成手段221は、実施例1と同様にして、個人情報に関して、例えば3つのレベルの暗号解読キー231を作成して、クライアント端末5と対応付けて、情報記憶部230に記憶する。そして、暗号化手段222は、クライアント端末5から受信した個人情報をそのクライアント端末に対応した暗号解読キー231によって暗号化する(ステップS22)。通信部210は、暗号化された個人情報をクライアント端末5に送信する(ステップS23)。クライアント端末5の情報記憶部260は、鍵管理サーバ4から受信した暗号化個人情報をクッキー261に記憶する(鍵管理サーバ4からクライアント端末5に暗号化個人情報を送信する際にクッキーの機能を使えば直接クッキー261に記憶することができる。)(ステップS24)。ここで、ユーザがクライアント端末5を操作することによって、通信部240はCPU部250に制御されて、企業サーバ別に所定レベルで個人情報を公開することを許可する信号を鍵管理サーバ4に送信する(ステップS25)。鍵管理サーバ4の通信部210が、クライアント端末5から許可信号を受信すると、情報記憶部230は、そのクライアント端末5がその企業サーバ6に個人情報を公開するレベルを情報開示許可信号232(L0〜L3)として記憶し、通信部210は、各企業サーバ6に対応する情報開示許可レベルの暗号解読キーをその企業サーバ6に送信する(ステップS26)。これによって企業サーバ6は公開の各レベルに応じた個人情報を解読することができる。企業サーバ6は、鍵管理サーバ4から受信した暗号解読キー291を情報記憶部290にクライアント端末5と対応づけて記憶する(ステップS27)。つぎに、クライアント端末5が企業サーバ6のホームページにアクセスして閲覧する際に、クッキーの機能を使ってクッキー261に記憶している暗号化個人情報を企業サーバ6に送信すると(ステップS28)、企業サーバ6は、受信した暗号化個人情報を、予め記憶している暗号解読キー291によってそのレベルに応じた範囲で解読して(ステップS29)、解読した個人情報102を情報記憶部100にクライアント端末5と対応づけて記憶する(ステップS30)。これによりユーザは逐一自分の個人情報をキー入力せずに予めクッキー261に記憶されている暗号化個人情報を送信する操作をするだけで(実際には単にホームページを閲覧する操作をするだけでよい。)、自分の意図する範囲の個人情報を企業サーバ6に送信することができる。そして、企業サーバ6は、ユーザの意図する範囲でユーザの個人情報をユーザと対応づけて取得し、記憶することができる。   FIG. 5 is a flowchart for explaining operations of the key management server, the client terminal, and the enterprise server. First, the communication unit 240 of the client terminal 5 accesses the homepage of the key management server 4 by the browser unit 251 and transmits the user's personal information to the key management server 4 according to a guide such as a questionnaire format (step S21). Next, the decryption key creation means 221 of the key management server 4 creates, for example, three levels of decryption keys 231 for personal information and associates them with the client terminal 5 in the same manner as in the first embodiment. The information is stored in the information storage unit 230. Then, the encryption unit 222 encrypts the personal information received from the client terminal 5 with the decryption key 231 corresponding to the client terminal (step S22). The communication unit 210 transmits the encrypted personal information to the client terminal 5 (step S23). The information storage unit 260 of the client terminal 5 stores the encrypted personal information received from the key management server 4 in the cookie 261 (the function of the cookie when transmitting the encrypted personal information from the key management server 4 to the client terminal 5). If it is used, it can be directly stored in the cookie 261.) (Step S24). Here, when the user operates the client terminal 5, the communication unit 240 is controlled by the CPU unit 250 and transmits a signal permitting the disclosure of personal information at a predetermined level for each company server to the key management server 4. (Step S25). When the communication unit 210 of the key management server 4 receives the permission signal from the client terminal 5, the information storage unit 230 indicates the level at which the client terminal 5 discloses personal information to the company server 6 as the information disclosure permission signal 232 (L0). ~ L3), and the communication unit 210 transmits the decryption key of the information disclosure permission level corresponding to each company server 6 to the company server 6 (step S26). As a result, the company server 6 can decrypt the personal information corresponding to each level of disclosure. The company server 6 stores the decryption key 291 received from the key management server 4 in association with the client terminal 5 in the information storage unit 290 (step S27). Next, when the client terminal 5 accesses and browses the home page of the company server 6, the encrypted personal information stored in the cookie 261 is transmitted to the company server 6 using the cookie function (step S28). The company server 6 decrypts the received encrypted personal information with a decryption key 291 stored in advance within a range corresponding to the level (step S29), and the decrypted personal information 102 is stored in the information storage unit 100 as a client. It is stored in association with the terminal 5 (step S30). As a result, the user simply performs an operation of transmitting the encrypted personal information stored in the cookie 261 in advance without keying his / her own personal information (actually, the user simply needs to browse the home page). ), Personal information within a range intended by the user can be transmitted to the company server 6. Then, the company server 6 can acquire and store the user's personal information in association with the user within a range intended by the user.

なお、本発明は上記実施例に限定されるものではない。   In addition, this invention is not limited to the said Example.

クライアント端末は携帯電話であってもよい。この場合、現在は携帯電話のブラウザにクッキー機能がないが、同じ機能を構築すればよい。この携帯電話はIP(Internet Protocol)携帯電話であってもよい。   The client terminal may be a mobile phone. In this case, the mobile phone browser does not currently have a cookie function, but the same function may be constructed. This mobile phone may be an IP (Internet Protocol) mobile phone.

企業サーバは、法律的な企業が開設するホームページのためのサーバである必要はなく、例えば個人が開設するホームページのためのサーバなどであってもよい。   The company server does not have to be a server for a homepage established by a legal company, and may be a server for a homepage established by an individual, for example.

テレビ受像機又はクライアント端末から鍵管理サーバに、個人情報、及び、個人情報公開許可信号を送信するのに代えて、普通郵便で行ってもよい。
Instead of transmitting personal information and a personal information disclosure permission signal from the television receiver or client terminal to the key management server, it may be performed by ordinary mail.

Claims (3)

鍵管理サーバから暗号化個人情報を受信する受信手段と、
該受信手段によって受信した暗号化個人情報を記憶する情報記憶部と、
個人情報を放送局に開示することを許可する情報開示許可信号を予め前記鍵管理サーバに送信しておいて、テレビ放送視聴に際して双方向テレビ放送上り回線を介して前記放送局に前記情報記憶部に記憶されている暗号化個人情報を送信する送信手段と
を備えることを特徴とするテレビ受像機。
Receiving means for receiving encrypted personal information from the key management server;
An information storage unit for storing the encrypted personal information received by the receiving means;
Keep in transmitting information disclosure permission signal for permission to disclose personal information to the broadcasting station in advance in the key management server, the information storage unit in the broadcast station via the interactive television broadcast uplink time of the television broadcast viewing Transmitter means for transmitting encrypted personal information stored in the television receiver.
鍵管理サーバから暗号化個人情報を受信する受信手段と、
該受信手段によって受信した暗号化個人情報を記憶する情報記憶部と、
個人情報を企業サーバに開示することを許可する情報開示許可信号を予め前記鍵管理サーバに送信しておいて、前記企業サーバが開設するホームページ閲覧に際して前記企業サーバに前記情報記憶部に記憶されている暗号化個人情報を送信する送信手段と
を備えることを特徴とするクライアント端末。
Receiving means for receiving encrypted personal information from the key management server;
An information storage unit for storing the encrypted personal information received by the receiving means;
Sure you send personal information in advance the key management server information disclosure permission signal permitting to disclose to the enterprise server, the stored in the enterprise server in the information storage unit upon homepage browsing the enterprise server to open A client terminal comprising: transmitting means for transmitting the encrypted personal information.
前記情報記憶部は、クッキーであることを特徴とする請求項2記載のクライアント端末。The client terminal according to claim 2 , wherein the information storage unit is a cookie.
JP2006527642A 2004-07-07 2004-07-07 Television receiver and client terminal Expired - Fee Related JP5075410B2 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2004/009640 WO2006006200A1 (en) 2004-07-07 2004-07-07 Television receiver, client terminal and key management server

Publications (2)

Publication Number Publication Date
JPWO2006006200A1 JPWO2006006200A1 (en) 2008-04-24
JP5075410B2 true JP5075410B2 (en) 2012-11-21

Family

ID=35783566

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2006527642A Expired - Fee Related JP5075410B2 (en) 2004-07-07 2004-07-07 Television receiver and client terminal

Country Status (2)

Country Link
JP (1) JP5075410B2 (en)
WO (1) WO2006006200A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7619805B2 (en) 2005-03-29 2009-11-17 Hewlett-Packard Development Company, L.P. Light modulator device

Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH1153668A (en) * 1997-07-31 1999-02-26 F F C:Kk Disaster information system
JPH11145949A (en) * 1997-11-11 1999-05-28 Oki Software Okayama:Kk Personal information safety operating method
JP2001339537A (en) * 2000-05-29 2001-12-07 Web Logic:Kk Personal information list preparation system and personal information list generation method
WO2001095185A1 (en) * 2000-06-05 2001-12-13 Wincess Yugen Kaisha Information processing system and terminal device for wide-area network, and user identification information encrypting and decrypting methods
JP2002032408A (en) * 2000-05-09 2002-01-31 Yutaka Nishimura Method and system for providing article information and retrieval system
JP2002041522A (en) * 2000-07-24 2002-02-08 4D Communications Inc Personal information disclosure system and electronic mail distribution system
JP2002073787A (en) * 2000-08-25 2002-03-12 Sharp Corp Compatibility diagnosing server, compatibility diagnosing method and machine-readable recording medium with program for realizing the method stored thereon
JP2002198947A (en) * 2000-12-26 2002-07-12 Mitsubishi Materials Corp Information reserving server, information reserving method, and recording medium
JP2002297598A (en) * 2001-03-29 2002-10-11 Nec Corp Providing system, method and program for personal information
JP2002359618A (en) * 2001-05-31 2002-12-13 Mitsubishi Electric Corp Personal information protection system and personal information protecting method
JP2002368883A (en) * 2001-06-08 2002-12-20 Takenao Hattori Information providing system and information providing server
JP2003152895A (en) * 2001-11-19 2003-05-23 Nec Corp Personal information opening system and information opening method
JP2003157366A (en) * 2001-11-20 2003-05-30 Sanyo Electric Co Ltd Personal information management method, management device, physical distribution device, and goods physical distribution system
JP2003178216A (en) * 2001-12-11 2003-06-27 Dainippon Printing Co Ltd Data transmission system and receiver
JP2003264540A (en) * 2002-03-07 2003-09-19 Dainippon Printing Co Ltd Method and system for distributing information
JP2003323409A (en) * 2002-05-07 2003-11-14 Seiko Epson Corp Single sign-on system, and program and method therefor
JP2003338816A (en) * 2002-03-15 2003-11-28 Matsushita Electric Ind Co Ltd Service providing system for verifying personal information
JP2004110425A (en) * 2002-09-18 2004-04-08 Sony Corp Delivery system for delivery object, delivery company's server device, cipher reader, delivery method for delivery object, program and recording medium
JP2004185623A (en) * 2002-12-05 2004-07-02 Microsoft Corp Method and system for authenticating user associated with sub-location in network location

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH1153668A (en) * 1997-07-31 1999-02-26 F F C:Kk Disaster information system
JPH11145949A (en) * 1997-11-11 1999-05-28 Oki Software Okayama:Kk Personal information safety operating method
JP2002032408A (en) * 2000-05-09 2002-01-31 Yutaka Nishimura Method and system for providing article information and retrieval system
JP2001339537A (en) * 2000-05-29 2001-12-07 Web Logic:Kk Personal information list preparation system and personal information list generation method
WO2001095185A1 (en) * 2000-06-05 2001-12-13 Wincess Yugen Kaisha Information processing system and terminal device for wide-area network, and user identification information encrypting and decrypting methods
JP2002041522A (en) * 2000-07-24 2002-02-08 4D Communications Inc Personal information disclosure system and electronic mail distribution system
JP2002073787A (en) * 2000-08-25 2002-03-12 Sharp Corp Compatibility diagnosing server, compatibility diagnosing method and machine-readable recording medium with program for realizing the method stored thereon
JP2002198947A (en) * 2000-12-26 2002-07-12 Mitsubishi Materials Corp Information reserving server, information reserving method, and recording medium
JP2002297598A (en) * 2001-03-29 2002-10-11 Nec Corp Providing system, method and program for personal information
JP2002359618A (en) * 2001-05-31 2002-12-13 Mitsubishi Electric Corp Personal information protection system and personal information protecting method
JP2002368883A (en) * 2001-06-08 2002-12-20 Takenao Hattori Information providing system and information providing server
JP2003152895A (en) * 2001-11-19 2003-05-23 Nec Corp Personal information opening system and information opening method
JP2003157366A (en) * 2001-11-20 2003-05-30 Sanyo Electric Co Ltd Personal information management method, management device, physical distribution device, and goods physical distribution system
JP2003178216A (en) * 2001-12-11 2003-06-27 Dainippon Printing Co Ltd Data transmission system and receiver
JP2003264540A (en) * 2002-03-07 2003-09-19 Dainippon Printing Co Ltd Method and system for distributing information
JP2003338816A (en) * 2002-03-15 2003-11-28 Matsushita Electric Ind Co Ltd Service providing system for verifying personal information
JP2003323409A (en) * 2002-05-07 2003-11-14 Seiko Epson Corp Single sign-on system, and program and method therefor
JP2004110425A (en) * 2002-09-18 2004-04-08 Sony Corp Delivery system for delivery object, delivery company's server device, cipher reader, delivery method for delivery object, program and recording medium
JP2004185623A (en) * 2002-12-05 2004-07-02 Microsoft Corp Method and system for authenticating user associated with sub-location in network location

Also Published As

Publication number Publication date
JPWO2006006200A1 (en) 2008-04-24
WO2006006200A1 (en) 2006-01-19

Similar Documents

Publication Publication Date Title
US8082591B2 (en) Authentication gateway apparatus for accessing ubiquitous service and method thereof
US7024552B1 (en) Location authentication of requests to a web server system linked to a physical entity
US20120210119A1 (en) Method and Apparatus for Secure Internet Browsing
JP4759198B2 (en) Service providing apparatuses that allow other apparatuses to access unique information recorded on a portable recording medium in which unique information is recorded, methods thereof, and the recording medium.
US20050278544A1 (en) Removable data storage medium and associated marketing interface
CN102177498B (en) data anonymity system
CN101771676B (en) Setting and authentication method for cross-domain authorization and relevant device and system
JP2006338587A (en) Access control server, user terminal, and information access control method
EP1461892A1 (en) Information content distribution based on privacy and/or personal information
JP2008299396A (en) Introduction support device, program for introduction support device and introduction support method
JP2007163621A (en) Advertisement distributing system, advertisement distributing method, advertisement distributing device, and advertisement receiving terminal
JP5537377B2 (en) Service provision system
AU2007200902A1 (en) Portable telephone and program for sending and receiving electronic mail
JP5075410B2 (en) Television receiver and client terminal
JP2010066928A (en) Server system, electronic equipment, communication terminal, and authentication method
KR100581653B1 (en) Apparatus and method for providing interactive television service using personal authentication
JP2007053658A (en) Inquiry answering system, terminal, server, and program
JP2003296278A (en) System and method for data management, program for the data management system, and recording medium for the data management system
JP2006072629A (en) Personal information management system
KR101971428B1 (en) Contents exchange method based on interaction between users and system performing the same
KR20000064159A (en) System and Method of settling transactions with portable telecommunications equipments
JP2002152188A (en) Information acquisition system
US20120131339A1 (en) System and method for secure bi-directional communication
JP4819589B2 (en) Authentication system and authentication method
US8760266B1 (en) Systems and methods to deliver information to a member

Legal Events

Date Code Title Description
A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20101110

A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20110111

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20110928

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20120801

A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20120827

R150 Certificate of patent or registration of utility model

Ref document number: 5075410

Country of ref document: JP

Free format text: JAPANESE INTERMEDIATE CODE: R150

Free format text: JAPANESE INTERMEDIATE CODE: R150

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20150831

Year of fee payment: 3

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

LAPS Cancellation because of no payment of annual fees