[go: up one dir, main page]

TW200409005A - Information processing system and method, information providing system and method, information processing device and method, figure, object and program storage medium and program - Google Patents

Information processing system and method, information providing system and method, information processing device and method, figure, object and program storage medium and program Download PDF

Info

Publication number
TW200409005A
TW200409005A TW92114558A TW92114558A TW200409005A TW 200409005 A TW200409005 A TW 200409005A TW 92114558 A TW92114558 A TW 92114558A TW 92114558 A TW92114558 A TW 92114558A TW 200409005 A TW200409005 A TW 200409005A
Authority
TW
Taiwan
Prior art keywords
aforementioned
information processing
processing device
content
information
Prior art date
Application number
TW92114558A
Other languages
Chinese (zh)
Other versions
TWI280495B (en
Inventor
Akiko Asami
Takashi Suzuki
Takashi Takeda
Original Assignee
Sony Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sony Corp filed Critical Sony Corp
Publication of TW200409005A publication Critical patent/TW200409005A/en
Application granted granted Critical
Publication of TWI280495B publication Critical patent/TWI280495B/en

Links

Landscapes

  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention relates to an information processing system and method, information providing system and method, information processing device and method, figure, object and program storage medium and program for precisely authorizing the user; wherein, the user should obtain in advance the figure of Po-Kyara in an IC chip embedded with the user ID of the authorization. When the user places the figure of Po-Kyara on the station 23 connected to an personal computer 22, the user ID memorized in the IC chip will be read by the writer embedded in the station 23, and transmitted to the Po-Kyara service server 9 through the Internet 1. The Po-Kyara service server 9 will register the personal information of each user in the Po-Kyara database 10 in advance, and proceed with the authorization process based on the information. The present invention can be applied to the server providing services through the network.

Description

200409005 玖、發明說明: 【發明所屬之技術領域】 本發明係有關資訊處㈣統及方法、資訊提供系統及方 法、資訊處理裝置及方法、人偶、物件、程式儲存媒體及 程式,特別是有關操作不熟練之使用者亦可輕易且迅速地 認證之資訊處理系統及方法、資訊提供系統及方法、資訊 處理裝置及方法、人偶、物件、程式儲存媒體及程式。 【先前技術】 近年來’網際網路等網路普及,可經由網路下載視頻資 料及聲頻資料等各種内容資料加以利用。 先前經由網路取得内容資料時,使用者如自個人電腦經 由網路進入飼服器,並經由網路下載内容資料。此時,使 用者為求於伺服器内認證自6,係預先操作附屬於個人電 腦惑鍵盤等,輸入分配自己之1〇及密碼。 如此,自鍵盤輸入ID及密碼來認證使用者時,存在鍵盤 操作不熟練之初學者、孩童、女性、老人等使用者,或是 操作鍵盤有障礙的使用者,不易輕易且迅速地進入飼服器 來認證自己的問題。 【發明内容】 有鑑於此種狀況,本發明為可輕易且迅速地認證使用者。 本發明之資訊處理系統之特徵為包含:物件,其係保持 識別使用者之使用者識別資訊;執行特定處理之第一資訊 處理裝置;讀取裝置’其係對應於第—資訊處理裝置而設 置,並讀取物件保持之使用者識別資訊,·及第二資訊處理 84661 200409005 、上其係I由網路,自前述第一資訊處理裝置接收、認 二猎由謂取裝置所讀取之使用者識別資訊,再經由網路傳 幸則^忍證結果至第一資訊處理裝置;且依據藉由讀取裝置 所=取义使用者識別資訊與第二資訊處理裝置之使用者識 別資訊之認證結果,使對應於物件之圖像顯示於第一資訊 處理裝置之顯示部上。 則述第二資訊處理裝置經由網路取得利用第一資訊處理 裝置<使用者之使用者資訊,將對應於使用者資訊之識別 使用者之使用者識別資訊記憶於物件保持之記憶體後,可 執行將物件分發給使用者之處理。 如述頃取裝置無法讀取保持於物件内之資訊的狀態下, 可解除經由第一資訊處理裝置與第二資訊處理裝置之網路 的連接。 前述物件可為人偶。 本發明之資訊處理系統之資訊處理方法之特徵為包含: 物件,其係保持識別使用者之使用者識別資訊;執行特定 處理之資訊處理裝置;讀取裝置,其係對應於資訊處理裝 置而設置,並讀取物件保持之使用者識別資訊;及第二資 訊處理裝置,其係經由網路自第一資訊處理裝置接收、認 證藉由讀取裝置所讀取之使用者識別資訊,再經由網路將 其認證結果傳輸至第一資訊處理裝置;且依據藉由讀取裝 置所讀取之使用者識別資訊與第二資訊處理裝置之使用者 識別資訊之認證結果,使對應於物件之圖像顯示於第一資 訊處理裝置之顯示部上。 84661 200409005 本發明之第一資訊處理裝置之特徵為具備:管理機構, 其係管理識別使用者之使用者識別資訊;接收機構,其係 藉由對應於其他資訊處理裝置之讀取裝置讀取,並接收藉 由其他資訊處理裝置送來之使用者識別資訊;認證機構, 其係依據藉由管理機構管理之使用者識別資訊認證藉由接 收機構所接收之使用者識別資訊;及傳輸機構,其係其他 ”訊處理裝置依據認證機構之認證結果,經由網路傳輸顯 不對應於藉由讀取裝置所讀取之使用者識別資訊之圖 所需之顯示資訊。 對應於前述使用者識別資訊之圖像可為對應於記憶有使 用者識別資訊之物件之形狀的圖像。 可進一步具備分發機構,其係執行分發物件給使用者之 處理,該物件具有記憶有對應於利用前述其他資訊處理裝 置义使用者之使用者資訊之使用者識別資訊的記憶體。 前述物件可為人偶。 則述接收機構接收物件放置於讀取裝置上時所讀取之使 用者4別貝汛,並且接收表示物件自讀取裝置取下之信 唬& ί里機構進一步管理對應於使用者識別資訊,使用者 利用《内容的相關資訊,接收機構可進一步具備更新機 構其係收到表示物件自讀取裝置取下之信號時,更新對 應於使用者識別資訊所管理之内容相關資訊。 本I明之第一資訊處理方法之特徵為包含:管理步驟, 二係“里識別使用者之使用者識別資訊;接收步驟,其係 藉由對應於其他資减理裝置之讀取裝置讀取,接收藉由 84661 200409005 其他資訊處理裝置送來之使用者識別資訊;認證步驟,其 =據藉由管理步驟之處理所管理之使用者識別資訊,認 證藉由接收步驟之處理收到之使用者識別資訊;及傳輸步 驟,其係其他資訊處理裝置依據認證步驟之處理之認證結 果:由網路傳輸顯不對應於藉由讀取裝置所讀取之使用 者4別資訊之圖像時所需之顯示資訊。 本毛月〈第一程式儲存媒體之程式之特徵& ··係控制經 、罔各/、其他貝訊處理裝置連接之資訊處理裝置之電腦程 式二且&含:管理步驟,其係、管理識別使用者之使用者識 f貝m ’接收步驟’其係藉由對應於其他資訊處理裝置之 =取裝置項取’接收藉由其他資訊處理裝置送來之使用者 識別貝訊,認證步驟,其係依據藉由管理步驟之處理所管 理<使用者識別資訊,認證藉由接收步驟之處理收到之使 用者識別資訊;及值於丰_ μ步騍,其係其他資訊處理裝置依據 =步驟之處理之認證結果,經由網路傳輸顯示對應於藉 資二取裝置所頃取之使用者識別資訊之圖像時所需之顯示 ^發月《弟-心式之特徵為:於控制經由網路與其他資 5理裝置連接之資訊處理裝置之電腦上執行··管理步 二=管理識別使用者之使用者識別資訊;接收步驟: 其他資減縣置之讀取裝置讀取,接收 他資訊處理裝置送來之使用者識別資訊;認證步 >/、係依據精由管理步驟之處理所管理之使用㈣ 訊,認證藉由接收步驟之處理收到之使用者識別資 84661 200409005 傳輸步驟,其係其他資訊處理裝置依據認證步驟之處理之 認證結果,經由網路傳輸顯示對應於藉由讀取裝置所讀取 之使用者識別資訊之圖像時所需之顯示資訊。 / 本發明之第二資訊處理裝置之特徵為具備:取得機構, 其係取得識別使用者之使用者識別資訊;傳輸機構,其係 經由網路將藉由取得機構所取得之使用者識別資訊傳輸至 其他資訊處理裝置;接收機構,其係依據藉由傳輸機構所 傳輸疋使用者識別資訊,接收藉由其他資訊處理裝置認證 。果,及&制機構,其係依據藉由接收機構所接收之 認證結果,以顯示對應於藉由取得機構所取得之使用者識 別貝訊之圖像之方式控制顯示。 對應於前述使用者識別資訊之圖像可為對應於記憶有使 用者識別資訊之物件形狀之圖像。 前述物件可為人偶。 义進步具備㈣取機構’其係自前述人偶讀取使用者識別 貝訊,取得機構可取得藉由讀取機構所讀取之使用者識別 資訊。 、前述讀取機構與資訊處理裝置獨立設置,並且連接於資 訊處理裝置,放置有人偶時,可讀取記憶於人偶内之使用 者識別資訊。 進-步具備檢測機構,其係檢測前述人偶自讀取機構取 下,前述傳輸機構於藉由檢測機構檢測出人偶自讀取機構 取下時’可進步經由網路將表示人偶自讀取機構取下之 信號傳輸至其他資訊處理裝置。 84661 取下制機構於精由檢測機構檢測出人偶已自讀取機構 、可解除經由網路對其他資訊處理裝置之連接。 發:之第二資訊處理方法之特徵為包含··取得步騾, ^係取仔識別使用者之使 經由網路將获丄貝傳輸步驟,其係 傳輪至其他資訊處理裝置.識別資訊 步驟之處理所_ ,彡收步*•驟’其係依據藉由傳輸 處理裝置認證後之处果.…, 接收猎由其他貝訊 步驟之處理所,、 驟’其係依據藉由接收 爻處理所接收之認證 驟之處理所^對應於猎由讀取步 示。處里所…使用者識別資訊之圖像之方式控制顯 本發明《第二程式儲存媒體之程 由網路與其他資訊處理裝置連接之资係控制經 式,且包本.& ^ 土 ”訊處理裝置乏電腦程 別資訊;傳輪步W甘& 于·^使用者《使用者識 所取得之使用者^f次、,^精由取件步驟之處理 吏用者减別貝訊傳輸至其他資訊 步驟,其係依據藉由傳輪+啊、+ 置,接收 資訊,接收藉由並他資Γ 所傳輸之使用者識別 步驟,其係依據藉由接收步… U,及控制 相叫任收步騾 < 處理所接 々 以顯示對應於藉由讀取步驟之::-果, 訊之圖像之方式控制顯示。 喂取《使用者識別資 本發明之第二程式之牿外 訊處理裝置連接之/4 ·於控制經由網路與其他資 驟,其係取得識別使用者執仃:取得步 者《吏用者識別資訊;傳輸步驟, 84661 200409005 〜、上由網路將藉由取得步驟之處理所取得之使用者 至其他資訊處理裝置;接收步驟,其係依_ =驟之處理所傳輸之使用者識別資訊,接收藉由其他 接收步ΓΓ證後之結果;及控制步驟,其係依據藉由 處理所接收之認證結果,以顯示對應於藉由讀 取步細之處理所讀取之使用者識別資訊之圖像之制 顯示。 二刊 本發明之第-人偶之特徵為:係使用資訊處理裝置時利 之人偶’ JL具有· 1己憶體’其係記憶識別所有使用者之 :用者識別資訊;及對應於圖像之形狀,其係藉由對應於 資訊處理裝置之讀取裝置所讀出之使用者識別資訊經認證 時,顯示於資訊處理裝置之顯示部上。 本發明之資訊提供系統之特徵為包含··第一資訊處理裝 置,其係經由網路提供内容;第二資訊處理裝置,其係經 由網路接受前述内容之提供;及第三資訊處理裝置,其係 將依據第二資訊處理裝置要求之信號輸出至第一資訊處理 裝置;且將對應於内容之物件分發給第二資訊處理裝置之 使用者,第二資訊處理裝置自物件讀取識別物件之物件識 別資訊,並經由網路傳輸至第三資訊處理裝置,第三資訊 處理裝置依據自第二資訊處理裝置接收之物件識別資訊, 檢索識別内容之内容識別資訊,並傳輸至第一資訊處理裝 置’第一資訊處理裝置收到來自第三資訊處理裝置之内容 識別資訊時’經由網路將對應於内容識別資訊之内容傳輸 至第二資訊處理裝置。 84661 -12- 200409005 本發明之資訊提供系統之資訊提供方法之特徵為包含: 第一資訊處理裝置,其係經由前述網路提供内容;第二資 訊處理裝置,其係經由網路接受内容之提供;及第三資訊 處理裝置,纟係將依據第二資訊處理裝置I求之信號輸出 至第一資訊處理裝置;且將對應於内容之物件分發給第二 資訊處理裝置《使用者,第二資訊處理裝置自物件讀取識 別物件i物件識別資訊,並經由網路傳輸至第三資訊處理 裝置,第s資訊處理裝置依據自第二資訊處理裝置接收之 物件識別資訊,檢索識別内容之内容識別資訊,並傳輸至 第一資訊處理裝置,第一資訊處理裝置收到來自第三資訊 處理裝置之内答識別資訊時,經由網路將對應於内容識別 貝訊之内谷傳輸至第二資訊處理裝置。 本發明 < 第二資訊處理裝置之特徵為具備:接收機構, 其係接收物件識別資訊,該物件識別資訊識別第二其他資 訊處理裝置自物件讀取,經由網路送來而記憶於物件内之 物件,傳輸機構,其係經由網路將對應於藉由接收機構所 接t之物件識別資訊之識別内容之内容識別資訊傳輸至第 一資訊處理裝置;及收費機構,其係對第二其他資訊處理 裝置之使用者進行收費處理。 本發明之第三資訊處理方法之特徵為包含:接收步驟, 其係接收物件識別資訊,該物件識別資訊識別第二其他資 Λ處理裝置自物件讀取,經由網路送來而記憶於物件内之 牛傳輸步私,其係經由網路將對應於藉由接收步驟之 處理所接收之物件識別資訊之識別内容之内容識別資訊傳 84661 -13- 200409005 輸至第一資訊處理裝置;及收費步驟,其係對第二其他資 訊處理裝置之使用者進行收費處理。 本發明之第三程式儲存媒體之程式之特徵為:係管理第 一其他資訊處理裝置經由網路提供之内容由第二其他資訊 處理裝置使用之資訊處理裝置之程式,且包含:接收步驟, 其係接收物件識別資訊,該物件識別資訊識別第二其他資 訊處理裝置自物件讀取,經由網路送來而記憶於物件内之 物件;傳輸步騾,其係經由網路將對應於藉由接收步驟之 處理所接收〈物件識別資訊之識別内容之内容識別資訊傳 輸至第一資訊處理裝置;及收費步驟,其係對第二其他資 訊處理裝置之使用者進行收費處理。 本發明之第三程式之特徵為:於控制管理第一其他資訊 處理裝置經由網路提供之内容由第二其他資訊處理裝置使 用之資訊處理裝置之電腦上執行:接收步驟,其係接收物 件識別資訊’該物件識別資訊識別第二其他資訊處理裝置 自物件讀取,經由網路送來而記憶於物件内之物件;傳輸 步驟,其係經由網路將對應於藉由接收步驟之處理所接收 <物件識別資訊之識別内容之内容識別資訊傳輸至第一資 訊處理裝置;及收費步驟’其係對第二其他資訊處理裝置 之使用者進行收費處理。 本發明之第四資訊處理裝置之特徵為:係經由網路提供 内容至其他資訊處理裝置’且具備:識別資訊取得機構, 其係取得識別資訊,該識別資訊表示其他資訊處理裝置自 物件讀取,經由網路送來之物件可取得之内容的種類;及 84661 -14· 200409005 子刀始資料傳輸機構,其係將並 * ,丄 將其他資訊處理裝置自物件靖 取,經由網路送來之經密碼化 ^ ^ . 仞士口 /貝料予以解碼,並將 知馬後^始資料傳輸至其他資訊處理裝置。 初始資料具有:物件τ載完成 可下載内容之次數;初始资料傳…/丄及表, 兑係將物、 ”科傳知機構可具備解碼機構, ,、係將物件< 下载完成内容之資 容次數之資訊予以解碼。及表-物件可下載内200409005 (1) Description of the invention: [Technical field to which the invention belongs] The present invention relates to information systems and methods, information providing systems and methods, information processing devices and methods, puppets, objects, program storage media and programs, and more particularly Information processing systems and methods, information providing systems and methods, information processing devices and methods, puppets, objects, program storage media, and programs that can be easily and quickly authenticated by users who are not skilled in operation. [Previous technology] In recent years, networks such as the Internet have become widespread, and various content data such as video data and audio data can be downloaded and used through the network. When the content data was previously obtained via the Internet, the user may access the feeder from a personal computer via the network and download the content data via the network. At this time, in order to authenticate the server 6 in the server, the user inputs the assigned 10 and password by operating the keyboard attached to the personal computer in advance. In this way, when entering the ID and password from the keyboard to authenticate the user, there are users who are not skilled in keyboard operation, such as beginners, children, women, the elderly, or users who have trouble operating the keyboard, and it is not easy and quick to enter the feeding clothing. Device to authenticate itself. SUMMARY OF THE INVENTION In view of such a situation, the present invention is capable of easily and quickly authenticating a user. The information processing system of the present invention is characterized by including: an object that holds user identification information that identifies the user; a first information processing device that performs specific processing; a reading device that is provided corresponding to the first information processing device , And read the user identification information held by the object, and the second information processing 84661 200409005, which is received by the network from the aforementioned first information processing device, and is used by the pre-fetch device The identification information is transmitted to the first information processing device through the network. The authentication result is based on the authentication result of the user identification information obtained by the reading device and the user identification information of the second information processing device. So that the image corresponding to the object is displayed on the display portion of the first information processing device. Then the second information processing device obtains the user information of the first information processing device < user through the network, and stores the user identification information corresponding to the user information of the identified user in the memory held by the object, The process of distributing objects to users can be performed. As described above, in a state where the pick-up device cannot read the information held in the object, the network connection between the first information processing device and the second information processing device can be released. The aforementioned object may be a puppet. The information processing method of the information processing system of the present invention is characterized by including: an object that holds user identification information that identifies the user; an information processing device that performs specific processing; a reading device that is set corresponding to the information processing device And read the user identification information held by the object; and the second information processing device, which receives and authenticates the user identification information read by the reading device from the first information processing device via the network, and then passes through the network The authentication result is transmitted to the first information processing device; and the image corresponding to the object is made according to the authentication result of the user identification information read by the reading device and the user identification information of the second information processing device Displayed on the display section of the first information processing device. 84661 200409005 The first information processing device of the present invention is characterized by having: a management mechanism that manages user identification information that identifies the user; a receiving mechanism that reads by a reading device corresponding to another information processing device, And receive user identification information sent by other information processing devices; certification agencies that authenticate user identification information received by receiving agencies based on user identification information managed by management agencies; and transmission agencies that According to the authentication result of the certification body, the other information processing device transmits the display information required by the network that does not correspond to the picture of the user identification information read by the reading device. Corresponding to the aforementioned user identification information The image may be an image corresponding to the shape of an object in which the user identification information is stored. It may further be provided with a distribution mechanism that performs a process of distributing the object to the user, and the object has a memory corresponding to the use of the other information processing device described above The memory of user identification information of user information of the right user. The puppet. The receiving mechanism receives the user 4 when the object is placed on the reading device, and receives a message indicating that the object has been removed from the reading device. The user uses the content-related information, and the receiving organization may further include an update mechanism that updates the content-related information corresponding to the user identification information when it receives a signal indicating that the object has been removed from the reading device. The features of the first information processing method of this invention include: a management step, the second line is the user identification information for identifying the user; the receiving step is read by a reading device corresponding to other data reduction devices, Receive user identification information sent by 84661 200409005 other information processing devices; authentication step, which = according to the user identification information managed by the processing of the management step, authenticate the user identification received by the processing of the receiving step Information; and transmission steps, which are the authentication results processed by other information processing devices in accordance with the authentication steps: The desired information displayed when the image corresponding to the 4 who do not use the information read by the reading means. This Maoyue "Characteristics of the program of the first program storage medium & · is a computer program that controls the information processing device connected to the controller, the computer, and other Bess processing devices, and & contains: management steps, which are, The user identification of the management and identification user is as follows. The 'receiving step' is to receive the user identification sent from the other information processing device, and the authentication step is to take the corresponding item from the other information processing device. , Which is based on the user identification information managed by the processing of the management step, and authentication of the user identification information received by the processing of the receiving step; and the value of Yu Feng _ μ step, which is the basis of other information processing devices = The authentication result of the processing of the step, which is required to display the image corresponding to the user identification information taken by the borrowed secondary device through the network. Executed on the computer of the information processing device connected to other information management devices via the network. · Management step two = Manage user identification information to identify the user; Receiving steps: Reading devices installed by other resources Read and receive user identification information sent by other information processing devices; authentication step > /, based on the usage information managed by the management step processing, authentication user identification received through the processing of the receiving step 84661 200409005 transmission step, which is the display information required to display an image corresponding to the user identification information read by the reading device via the network in accordance with the authentication result processed by the authentication step by other information processing devices . / The second information processing device of the present invention is characterized by having: an acquisition mechanism that acquires user identification information identifying the user; and a transmission mechanism that transmits the user identification information obtained by the acquisition mechanism through the network. To other information processing devices; receiving organizations, which receive authentication by other information processing devices based on the user identification information transmitted by the transmission mechanism. The result, and the & manufacturing organization, is based on the authentication result received by the receiving organization to control the display in a manner corresponding to the image of the user identification Besson obtained by the obtaining organization. The image corresponding to the aforementioned user identification information may be an image corresponding to the shape of an object in which the user identification information is stored. The aforementioned object may be a puppet. Yijin has a capture mechanism 'which reads the user identification from the aforementioned puppet, and the acquisition mechanism can obtain the user identification information read by the reading mechanism. The aforementioned reading mechanism is set independently from the information processing device, and is connected to the information processing device. When placing a puppet, the user identification information stored in the puppet can be read. Further, a detection mechanism is provided to detect the removal of the puppet self-reading mechanism, and the transmission mechanism can progress to indicate that the puppet self The signal removed by the reading mechanism is transmitted to other information processing devices. 84661 The removal mechanism detects the puppet has read the mechanism from the detection mechanism, and it can release the connection to other information processing devices via the network. The characteristics of the second information processing method include: obtaining steps, ^ is a step of identifying the user and transmitting the obtained data via the network, which is a round to other information processing devices. Identifying information steps的 处理 所 _ , 彡 收 步 * • Step 'is based on the results obtained by the transmission processing device after authentication ...., Receiving is handled by the other processing steps of the Besson step. The processing of the received authentication step corresponds to the reading step. Premises ... The method of identifying the image of the user's information controls the present invention. "The process of the second program storage medium is controlled by the network and other information processing devices, and the book is included. &Amp; ^ 土" The message processing device lacks computer programming information; pass round steps W & Yu ^ user "users obtained by user identification ^ f times, ^ refined by the user of the pick-up step minus the message The steps of transmitting to other information are based on receiving information by passing + +, +, and receiving the user identification step transmitted by other sources Γ, based on receiving steps ... U, and the control phase. Call any step of receiving < processing the received message to display the image corresponding to controlling the display by reading the steps ::-fruit, message. / 4 of the information processing device connection · In the control via the network and other information, it is to obtain the identification user's instructions: to obtain the "user identification information; transmission steps, 84661 200409005 ~, will be borrowed by the Internet Users acquired by processing of acquisition steps To other information processing devices; a receiving step, which processes the user identification information transmitted in accordance with _ = step, and receives the results after the other receiving steps ΓΓ certificate; and a control step, which is based on the data received by processing The authentication result is displayed in a system that displays an image corresponding to the user identification information read by the processing of the reading step. The second-character feature of the present invention is: a person who is beneficial when using an information processing device The 'JL has · 1 Ji Yi body' which is used to identify all users: user identification information; and the shape corresponding to the image, which is used by the reading device corresponding to the information processing device When the user identification information is authenticated, it is displayed on the display portion of the information processing device. The information providing system of the present invention is characterized by including a first information processing device that provides content via a network, and a second information processing device that Receiving the aforementioned content via the network; and a third information processing device that outputs a signal requested by the second information processing device to the first information processing device; and The object corresponding to the content is distributed to the user of the second information processing device. The second information processing device reads the object identification information identifying the object from the object and transmits it to the third information processing device via the network. The third information processing device is based on The object identification information received from the second information processing device retrieves the content identification information of the identified content and transmits it to the first information processing device 'when the first information processing device receives the content identification information from the third information processing device' via the network The content corresponding to the content identification information is transmitted to the second information processing device. 84661 -12- 200409005 The information providing method of the information providing system of the present invention is characterized by including: a first information processing device provided through the aforementioned network Content; a second information processing device that accepts the provision of content via a network; and a third information processing device that does not output a signal requested by the second information processing device I to the first information processing device; and will correspond to The contents of the content are distributed to the second information processing device "user, the second information processing device The identification information of the object i is read from the object and transmitted to the third information processing device via the network. The s information processing device retrieves the content identification information of the identification content based on the object identification information received from the second information processing device, and The information is transmitted to the first information processing device. When the first information processing device receives the internal identification information from the third information processing device, it transmits the inner valley corresponding to the content identification to the second information processing device via the network. The feature of the second information processing device of the present invention is that it has a receiving mechanism that receives object identification information, and the object identification information identifies the second other information processing device to read from the object, send it over the network, and store it in the object. An object, a transmission mechanism that transmits content identification information corresponding to the identification content of the object identification information received by the receiving agency to the first information processing device via a network; and a charging agency that The user of the information processing device performs charge processing. The third information processing method of the present invention is characterized by including: a receiving step for receiving object identification information, the object identification information identifying the second other information processing device read from the object, and sending it over the network to store in the object Zuni Transmission Step Private is to transmit the content identification information corresponding to the identification content of the object identification information received through the processing of the receiving step to the first information processing device through the network 84661 -13- 200409005; and the charging step , Which charges users of the second other information processing device. The program of the third program storage medium of the present invention is characterized in that it is a program that manages the information processing device used by the second other information processing device for the content provided by the first other information processing device via the network, and includes: a receiving step, Receiving the object identification information, the object identification information identifies the second other information processing device that reads from the object, sends it over the network and memorizes the object in the object; the transmission step, which corresponds to receiving the The processing of the steps transmits the content identification information of the identification content of the object identification information to the first information processing device; and a charging step, which performs charging processing for the user of the second other information processing device. The third program of the present invention is characterized in that it is executed on a computer that controls and manages the content provided by the first other information processing device via the network and used by the second information processing device of the information processing device: the receiving step, which is the identification of the received object Information 'The object identification information identifies the second other information processing device that reads from the object and sends it over the network to memorize the object in the object; the transmission step is that it will correspond to the processing received by the receiving step via the network. < The content identification information of the identification content of the object identification information is transmitted to the first information processing device; and the charging step 'which is to charge the user of the second other information processing device. The fourth information processing apparatus of the present invention is characterized in that it provides content to other information processing apparatuses via a network and has: an identification information acquisition mechanism that acquires identification information, which indicates that other information processing apparatuses read from objects , The types of content that can be obtained from the objects sent through the network; and 84661 -14 · 200409005 sub-knife data transmission mechanism, which will merge *, 丄 take other information processing devices from the object, and send them through the network It is encrypted ^ ^. The 仞 士 口 / 贝 料 is decoded, and the known data is transmitted to other information processing devices. The initial data includes: the number of times that the downloadable content of the object τ has been completed; the initial data transmission ... / and the table, which refers to the object, "the science and technology knowing agency may have a decoding mechanism, and the object to download the content & The content of the information is decoded. And the table-object can be downloaded

資Γ1:?備:、内容一覽表傳輸機構,其係將依據識別 、 可下載又内容一覽表傳輸至 :得要及:容:=其係依據其™^ 傳輸内各至其他資訊處理裝置。 内容傳輸機構可具備··第一值私办 訊處理構,其係傳輸其他資 裝置下載《内容;及第二傳輸機構,其係傳輸其他 貝訊處理裝置試聽之内容。 二:處輪機構,其Γ1 :? Preparation :, the content list transmission mechanism, which is based on identification, downloadable, and content list transmission to: get to and: content: = It is based on its ™ ^ transmission to other information processing devices. The content transmission organization may have a first value private messaging processing organization that transmits other content to download the content; and a second transmission organization that transmits content that other hearing processing devices have audited. Two: the round mechanism, its

發明之第四資訊處理方法之特徵為:係經由網路提供 内容至其他資訊處理裝置之資訊處理裝置之資訊處理方 2 ’且包含:識別資訊取得步驟,其係取得識別資訊,該 誠別資訊表示其他資訊處理裝置自物件讀取,經由網路送 來、物件可取得之内容的種類;及初始資料傳輸步驟,其 係將其他資訊處理裝置自物件讀取,經由網路送來之經密 碼化爻初始資料予以解碼,並將解碼後之初始資料傳輸至 其他資訊處理裝置。 84661 • 15 - ^發明之第四程式儲存媒體之程式之特徵為:係經由網 各楗供内谷至其他資訊處理裝置之電腦程式,且包含:熾 別資訊取得控制步驟,其係控制識別資訊之取冑,該 資訊表示其他資訊處理裝置自物件讀取,經由網路之 物件可取得之内容的種類;及初始資料傳輸控制步驟,並 係以將其他資減縣置自物件讀取,㈣㈣送來之妹 =化之初始資❹以解碼,並將解碼後之初始資料料 土則述其他資訊處理裝置之方式控制。 於經由網路提供内容至其 識別資訊取得控制步驟 本發明之第四程式之特徵為 他資訊處理裝置之電腦上執行 甘 ................. , ς係控制識別資訊之取得,該識別資訊表示其他資訊處理 裝置自物件讀取,經由網路送來之物 =及初始資料傳輸控制步驟,其係以將其他資= 自物件項取’經由網路送來之經密碼化之初始資料予以 :碼’並將解碼後之初始資料傳輸至前述其他資訊處理裝 置 < 方式控制。 么月之第五貝訊處理裝置,係經 他資訊處理裝置提供之内容,自弟〆、 ^ ^ ^ 其特欲為具備:取得機構, 撼係取得記憶於物件内之識別物件之物件識別資訊;傳輸 、構’其係經由網路將藉由取得機構所取得之物件識別資 Z輸至第二其他資訊處理裝置;及接收機構,其係依據 機構所傳輸之物件識別資訊,第二其他資訊處理裝置 t據識別傳輸至第—其他資訊處理裝置之内容之内容識別 接收I由網路自第一其他資訊處理裝置送來之内容。 84661 -16· 200409005 取得機構可進-步具備控制機構,其係進—步取得記情 於物件内之内容使用條件,依據藉由取得機構所取得之 用條件,控制傳輸機構之傳輸處理。 前述物件可為人偶。 放置有前述人偶時,進一步具備讀取機構,其係讀取記 憶於人偶μ物件識別資訊,取得機構可取得藉由讀取機 構自人偶所讀取之物件識別資訊。 ,讀取機構與資訊處理裝錢立地設置,並且於連接 訊處理裝置並放置有人偶時,可讀 一 識別資訊。 人偶内之物件 可進一步具備取得要求傳輸機構,其係依據自n他 資訊處理裝置所傳輸之物件可下載之内容—覽表第一 其他資机處理裝置傳輪内容之取得要求。 取得要求傳輸機構可具備:物件可下載 顯示機構,其係顯示物件可下載内容之次數 3機 構,其係判定是否指示有下载内容;: 係判定是否指示有試k檝構其 内覽:具::★機構’其係顯示使用物件所下載之 裝置傳料^ 要求機構,其料第—其他資訊處理 容之許Γ的取得要求;及重現機構,其係自第-兑他i 訊處理裝置接收藉由許可證要求機 並重現内容。 5伃之汗了也, 可進一步具備:有無内容判定機構,其係受理須自内容 84661 -17- 200409005 見表中重ί見之内$的指$,判定須1現之内容是否記憶 u處理裝置之内邵;及重現取得要求傳輸機構,其係 藉由有無内容判定機構判定須重現之内容並未記憶於資訊 處理裝置 < 内邵時,對第一其他資訊處理裝置傳輸須重現 之内容的取得要求。 本泰月之第五貝釩處理方法,係經由網路接收自第一其 他貝λ處理裝置提供之内容之資訊處理裝置之資訊處理方 /、特说為包含·取得步驟,其係取得記憶於物件内之 4別物件<物件識別資訊;傳輸步驟,其係經由網路將藉 由取得步驟之處理所取得之物件識別資訊傳輸至第二其他 貪訊處理裝置;及接收步驟,其係依據傳輸步驟之處理所 物件識別資訊’第二其他資訊處理裝置依據識別傳 土第其他貝訊處理裝置之内容之内容識別資訊,接收 、、星由網路自第一其他資訊處理裝置送來之内容。 —本毛明《弟五程式儲存媒體之程式,係經由網路接受第 理裝置提供内容之資訊處理裝置之程式,其 件!、、、^ ·取得步驟,其係取得記憶於物件内之識別物 步驟之處理所取得之= 埋^ . mm / 傳輸至第二其他資訊處 ,、、,風’其係、依據傳輸步驟之處理所傳輸之 識別資訊’第二其他資訊處理裝置依據識別傳輸至第 裝Γ内容之内容識別資訊,接收經由網 自弟一其他資訊處理裝置送來之内容。 本I月〈第五私式’係於控制經由網路接收第—其他資 84661 -18- 200409005 訊處理裝置提供内容之資訊處理裝置之電財執行:取得 步驟’其係、取得記憶於物件内之識別物件之物件識別資 訊;傳輸步驟’其係經由網路將藉由取得步驟之處理所取 得之物件制資訊傳輸至第二其他資訊處理裝置;及接收 步驟’其係依據傳輸步驟之處理所傳輸之物件識別資訊, 第二其他資訊處理裝置依據識別傳輸至第—其他資訊處理 裝置之内容之内容識別資訊’接收經由網路自第一其他資 訊處理裝置送來之内容。 本炙月之冑—人偶之特徵4 :係藉&資訊處理裝置使用 内答時所使用之人偶,且具有··記憶體,其係記憶識別人 偶時所需〈識別資訊;及對應㈣容相關圖像之形狀。 前述記憶體可進-步記憶表示可藉由人偶取得之内容的 種類。 前述記憶體可進一步記憶内容之使用條件。 前述使用條件中可包含金額資訊。 前述使用條件中可包含··藉由人偶所取得之内容一覽 表’及藉由人偶可取得内容之次數。 前述記憶體使用有内容時,可更新使用條件。 本發明之物件之特徵為:係藉由資訊處理裝置使用内容 時所使用 < 物件’且具有:記憶體,其係記憶識別内容時 所需之識別資訊;及對應於内容相關圖像之特徵。 本發明之資訊處理系統及其資訊處理方法,係依據藉由 項取裝置所謂取之使用者識別資訊與第二資訊處理裝置之 使用者識別資訊之認證結果,對應於物件之圖像顯示於第 84661 -19- 一資訊處理裝置之顯示部上。 本發明之第一資訊處理裝置及第一資訊處理方法、第一 秸式儲存媒體與第一程式,係依據其他資訊處理裝置送來 <使用者識別資訊進行認證,依據認證結果,經由網路傳 輸其他資訊處理裝置顯示對應於使用者識別資訊之圖像時 所需之顯示資訊。 本發明之第二資訊處理裝置及第二資訊處理方法、第二 秩式儲存媒體與第二程式,係所取得之使用者識別資訊傳 幸則土其他資訊處理裝置,並依據所傳輸之使用者識別資訊 及藉由其他資訊處理裝置所認證之結果顯示對應於使用者 識別資訊之圖像。 本發明之第一人偶於記憶體内記憶有使用者識別資訊, 人偶之形狀經使用者識別資訊認證時,形成對應於顯示於 貝訊處理裝置之顯示部上之圖像的形狀。 本發明之資訊提供系統及方法,於記憶物件識別資訊之 物件分發給第二資訊處理裝置之使用者,自第二資訊處理 裝置經由網路送來物件識別資訊時’第三資訊處理裝置將 對應於物件識別資訊之内容識別資訊提供至第一資訊處理 裝置’弟一資机處理裝置將對應於内容識別資訊之内容經 由網路傳輸至第二資訊處理裝置。 本發明之第三資訊處理裝置及第三資訊處理方法、第三 程式儲存媒體與第三程式,於接收第二其他資訊處理裝置 送來之物件識別資訊時,依據物件識別資訊之内容識別資 訊傳輸至第一資訊處理裝置,並對第二其他資訊處理裝置 84661 -20- 200409005 之使用者進行收費處理。 本發明之第四資訊處理裝置及第四資訊處理方法、第四 程式儲存媒體與第四程式中,其他資訊處理裝置取得自物 件碩取,經由網路送來之表示物件可取得之内容種類之識 別資詋’其他資訊處理裝置將自物件讀取,經由網路送來 •^經密碼化之初始資料予以解碼,解碼後之初始資料傳輸 至其他資訊處理裝置。 本發明之第五資訊處理裝置及第五資訊處理方法、第五 程式儲存媒體與第五程式中,取得記憶於物件内之物件識 別資訊,物件識別資訊經由網路傳輸至第二其他資訊處理 裝置。第二其他資訊處理裝置將對應於物件識別資訊之内 谷識別資訊傳輸至第一其他資訊處理裝置,並依據内容識 別資訊,接收自第一其他資訊處理裝置經由網路送來之内 容。 本發明之第二人偶於記憶體内記憶有識別人偶時所需之 識別資訊,並且其形狀形成對應於内容相關圖像之形狀。 本發明之物件於記憶體内記憶有識別内容時所需之識別 ;貝纸,並且具有對應於内容相關圖像之特徵。 【實施方式】 圖1表π週用本發明之資訊處理系統之構造例。該構造例 中,於網際網路1上,經由網際網路服務提供者(ispp連接 有家庭3的LAN(區域網路)21。LAN 21上連接有房間31至房 間33<機益。本例之房間3丨中之個人電腦(pc)22連接於 21,個人包|自22上連接有後述之親友波卡拉(商標)人偶 84661 -21 - 200409005 161(圖4)’或是連接有放置販賣波卡拉(商標)人偶181(圖10) 之站台23。 另外LAN 21係藉由使用者或無線構t藉由無線構成 時’可採用IEEE(電機電子工程師學會)8〇2」ia,、 则(超寬頻)4BlueT〇〇thf所規定之方式。此夕卜,藉有線 構成時,可利用USB(通用串列匯流排)等所規定之方式。 房間32中,電視收訊機(TV)24it接於lan 21,電視收訊 機24上連接有站台…房間辦,個人電腦%連接於lan 21 ’個人電腦26上連接有站台27。 網際網路!經由!SP4,亦連接有職場^LAN5i〇lan5i 上連接有個人電腦52,個人電腦52上進一步連接有站台兄。 網際網路1上連接有提供對應於販賣波卡拉人偶i8i(圖 10)之内各;貝料之内容伺服器6。連接於網際網路〖之内容伺 服器7提供對應於親友波卡拉人偶161 (圖4)之内容資料。連 接於網際網路1之許可證伺服器8提供對應於由内容伺服器 7供給之内容之許可證。 再者,於網際網路丨上連接有波卡拉(商標)服務祠服器9。 該波卡拉服務伺服器9提供對應於親友波卡拉人偶161或販 賣波卡拉人偶18 1之各種服務。 波卡拉服務伺服裔9上連接有記憶有關波卡拉之各種資 訊之波卡扭資料庫1〇。另外,波卡拉服務伺服器9上除連接 有對於親友波卡拉人偶161進行認證處理之私人認證伺服 器11、對販賣波卡扭人偶181進行認證處理之公用認證伺服 器12之外’亦連接有執行各種收費處理之收費祠服器13。 84661 -22· 200409005 波卡拉資料庫10、私人認證伺服器u、公用認證伺服器i2 及收費伺服器13中之一個以上,依需要亦可與波卡拉服務 祠服器9 一體化。 再者’圖1之系統中,行動電話6丨可經由最近的基地台i 5 連接於網際網路1。 波卡拉服務伺服器9如以圖2所示之方式構成。 圖2中之CPU(中央處理單元)121按照記憶於R〇M(唯讀記 憶體)122之程式,或自記憶部128載入RAM(隨機存取記憶The fourth information processing method of the invention is characterized in that it is an information processor 2 'of an information processing device that provides content to other information processing devices via a network, and includes: an identification information acquisition step, which is to obtain identification information, the honest information Indicates the type of content that other information processing devices read from the object, sent over the network, and the object can obtain; and the initial data transmission step, which reads the other information processing device from the object and sent the password through the network. The original data is decoded, and the decoded initial data is transmitted to other information processing devices. 84661 • 15-^ The fourth program storage medium invented program is characterized in that it is a computer program for the inner valley to other information processing devices through the network, and includes: a control step for obtaining the identification information, which controls the identification information The information indicates the type of content that other information processing devices read from the object, and the objects that can be obtained through the network; and the initial data transmission control steps, and it is based on the other data reduction devices to read from the object. The sent sister = the initial resources of the decoding to decode, and the decoded initial data is described in the way of other information processing devices. The fourth program of the present invention is characterized in that the content is provided to the identification information through the network and the control step is executed on a computer of another information processing device... It is used to control the acquisition of identification information. The identification information indicates that other information processing devices read from objects and send them through the network = and the initial data transmission control steps. The encrypted initial data sent is coded and the decoded initial data is transmitted to the aforementioned other information processing device < mode control. The fifth Beixun processing device of Moyue is the content provided by other information processing devices. From the younger brother, ^ ^ ^, it is specifically required to have: obtain the organization, and obtain the object identification information of the identified objects stored in the object. ; Transmission, construction ', which is to transmit the object identification information Z obtained by the acquisition organization to the second other information processing device via the network; and receiving organization, which is based on the object identification information transmitted by the organization, the second other information The processing device t recognizes the content transmitted to the first other information processing device according to the content identification and receives the content sent from the first other information processing device by the network. 84661 -16 · 200409005 The obtaining mechanism can further-equipped with a control mechanism, which is to further obtain the content use conditions recorded in the object, and control the transmission processing of the transmission mechanism based on the use conditions obtained by the obtaining mechanism. The aforementioned object may be a puppet. When the aforementioned puppet is placed, a reading mechanism is further provided, which reads the object identification information memorized in the puppet, and the acquiring mechanism can obtain the object identification information read from the puppet by the reading mechanism. The reading mechanism and the information processing device are installed on the ground, and when the communication processing device is connected and a puppet is placed, the identification information can be read. The objects in the puppet may further have an acquisition request transmission mechanism, which is based on the downloadable content of the objects transmitted from the other information processing device—the first table of the list. The acquisition request transmission mechanism may include: an object downloadable display mechanism, which is the number of times that the object can download the content 3, which determines whether there is an instruction to download the content ;: determines whether to instruct a trial to construct its content: : ★ Organization 'It is used to display the materials transmitted by the device downloaded using the request ^ The requesting organization is the material—the other information processing capacity is required to obtain Γ; and the reproduction mechanism is the first-to-other information processing device. Receive a license request machine and reproduce the content. 5 Khan's sweat can also be further equipped with: whether there is a content determination mechanism, which accepts the content of 84861 -17- 200409005 from the table, which refers to the $ in the table, and determines whether the current content must be memorized. The internal transmission of the device; and the transmission requesting mechanism for reproduction and acquisition, which determines whether the content to be reproduced is not stored in the information processing device by the presence or absence of the content determination mechanism. When transmitting to the first other information processing device, the transmission to the first other information processing device must be repeated. Requirements for obtaining current content. The fifth shell-vanadium processing method of this month is an information processor / specially included in the information processing device that receives the content provided by the first other shell-λ processing device via the network. In particular, it includes the step of obtaining. 4 types of objects within the object < object identification information; transmission step, which transmits the object identification information obtained by the processing of the acquisition step to the second other corruption processing device via the network; and the reception step, which is based on The processing step of the object identification information in the transmission step 'the second other information processing device receives, based on the content identification information identifying the content of the other transmission processing device of the first transmission device, the content sent by the network from the first other information processing device . — Ben Maoming's "Five-five program storage media program is a program for an information processing device that accepts content provided by a third-party device via the Internet. Its pieces! ,,,, ^ · Obtaining steps, which is to obtain the identification stored in the object Obtained from the processing of the physical steps = buried ^. Mm / transmitted to the second other information location, ",", "there is the identification information transmitted according to the processing of the transmission step", and the second other information processing device is transmitted to the identification The content identification information of the installed content Γ receives the content sent from the other information processing device through the network. This month, the "fifth private type" is to control the financial execution of information processing devices that provide content through the information processing device provided by the Internet—the other information 84661 -18- 200409005: the acquisition step ', which is to obtain the memory in the object The object identification information for identifying the object; the transmission step 'which transmits the object-based information obtained by the processing of the acquisition step to the second other information processing device via the network; and the receiving step' which is the processing station based on the transmission step The transmitted object identification information is received by the second other information processing device based on the content identification information of the content transmitted to the first-other information processing device 'from the first other information processing device. The Moon of the Moon—Characteristics of Puppets 4: The puppet used by the & information processing device when using internal answering, and has a memory, which is used to identify the identification information needed to identify the puppet; and Corresponds to the shape of the volume-related image. The foregoing memory advance-memory indicates the kind of content that can be obtained by the puppet. The aforementioned memory can further memorize the conditions of use of the content. The aforementioned conditions of use may include amount information. The aforementioned conditions of use may include a list of contents obtained by a puppet 'and the number of times content can be obtained by a puppet. When the memory is used, the conditions of use can be updated. The object of the present invention is characterized in that it is a < object 'used when using content by an information processing device and has: a memory, which stores identification information required for identifying content; and a feature corresponding to a content-related image . The information processing system and the information processing method of the present invention are based on the authentication result of the so-called user identification information obtained by the item taking device and the user identification information of the second information processing device. 84661 -19- on the display of an information processing device. The first information processing device, the first information processing method, the first storage medium, and the first program of the present invention are authenticated based on the user identification information sent by other information processing devices, and based on the authentication results, via the network. Transmission of display information required when another information processing device displays an image corresponding to user identification information. The second information processing device, the second information processing method, the second rank storage medium, and the second program of the present invention are the obtained user identification information, and the other information processing devices are based on the transmitted user identification. Information and results authenticated by other information processing devices display images corresponding to user identification information. According to the first puppet of the present invention, user identification information is stored in the memory. When the shape of the puppet is authenticated by the user identification information, a shape corresponding to an image displayed on the display portion of the Bess processing device is formed. According to the information providing system and method of the present invention, when an object storing the object identification information is distributed to a user of the second information processing device, when the object identification information is sent from the second information processing device via the network, the third information processing device will respond The content identification information of the object identification information is provided to the first information processing device, and the information processing device transmits the content corresponding to the content identification information to the second information processing device via the network. According to the third information processing device, the third information processing method, the third program storage medium, and the third program of the present invention, when receiving the object identification information sent by the second other information processing device, the content identification information is transmitted according to the content of the object identification information. Go to the first information processing device and charge the user of the second other information processing device 84661 -20- 200409005. In the fourth information processing device, the fourth information processing method, the fourth program storage medium, and the fourth program of the present invention, other information processing devices are obtained from the object, and are sent through the network to indicate the types of content that the object can obtain. Identification information 'Other information processing devices will read from the objects and send them via the network to decode the encrypted initial data. The decoded initial data will be transmitted to other information processing devices. The fifth information processing device, the fifth information processing method, the fifth program storage medium, and the fifth program of the present invention obtain the object identification information stored in the object, and the object identification information is transmitted to the second other information processing device through the network. . The second other information processing device transmits the valley identification information corresponding to the object identification information to the first other information processing device, and receives the content sent from the first other information processing device via the network according to the content identification information. The second puppet of the present invention stores identification information required for identifying the puppet in the memory, and its shape is formed to correspond to the shape of the content-related image. The object of the present invention has identification required when the identification content is stored in the memory, and has characteristics corresponding to content-related images. [Embodiment] Fig. 1 shows an example of the structure of the information processing system of the present invention for π week. In this configuration example, on the Internet 1, a LAN (Local Area Network) 21 of the home 3 is connected via an Internet service provider (ispp. The LAN 21 is connected to the room 31 to the room 33 < machine benefit. This example The personal computer (pc) 22 in room 3 丨 is connected to 21, and the personal bag | is connected to the friends and relatives Pocara (trademark) puppets described below 84661 -21-200409005 161 (Figure 4) 'or connected to the 22 Platform 23 where Pokhara (trademark) doll 181 (Figure 10) is sold. In addition, when LAN 21 is configured by a user or a wireless device, and it is configured wirelessly, IEEE (Institute of Electrical and Electronics Engineers) 802 "ia, (Ultra-wideband) 4BlueT〇〇thf. In this case, when using a cable configuration, you can use the USB (Universal Serial Bus) and other methods. In Room 32, the TV receiver (TV ) 24it is connected to lan 21, and a platform is connected to TV receiver 24 ... room office, personal computer is connected to lan 21 'Personal computer 26 is connected to platform 27. Internet! Via! SP4, also connected to the workplace ^ A personal computer 52 is connected to the LAN5i〇lan5i, and a station is further connected to the personal computer 52 Dear brother, there is a content server 6 connected to the Internet 1 that provides the corresponding Pokhara dolls i8i (Figure 10); a content server 7 that is connected to the Internet, and a corresponding content server 7 Content data of Pokhara figure 161 (Figure 4). The license server 8 connected to the Internet 1 provides a license corresponding to the content provided by the content server 7. Furthermore, it is connected to the Internet 丨There is a Pokhara (trademark) service temple server 9. The Pokhara service server 9 provides various services corresponding to relatives and friends Pokhara figure 161 or the sale of Pokhara figure 18 1. There is a memory connected to the Pokhara service server 9 A Poca twist database 10 for various information about Pokhara. In addition, the Pokhara service server 9 is connected to a private authentication server 11 for authenticating relatives and friends Pokhara dolls 161, and a twist on the sale of Poca In addition to the public authentication server 12 that performs authentication processing, 181 is also connected to a charge server 13 that performs various charging processes. 84661 -22 · 200409005 Pokhara database 10, private authentication server u, and public authentication server i2One or more of the toll servers 13 can be integrated with the Pokhara service temple server 9 as needed. Furthermore, in the system of FIG. 1, the mobile phone 6 丨 can be connected to the Internet via the nearest base station i 5 1. The Pokhara service server 9 is structured as shown in Fig. 2. The CPU (Central Processing Unit) 121 in Fig. 2 follows the program stored in ROM (Read Only Memory) 122, or the self-memory section 128. Load RAM (random access memory

體)123之程式執行各種處理。ram 123内還適切記憶CPU 121執行各種處理時所需之資料等。 CPU 12卜ROM 122及RAM 123經由匯流排124相互連接。 該匯流排124亦連接有輸入輸出介面丨25。 輸入輸出介面125上連接有··包含鍵盤、滑鼠等之輸入部 126,包含CRT(陰極射線管)、LCD(液晶顯示器)等之顯示部 (Display);包含揚聲器等之輸出部127 :由硬碟等構成之記 憶邵128 ;及由數據機、終端配接器等構成之通信部丨29。 通信部129進行經由包含網際網路i之網路的通信處理。 輸入輸出介面125上,依需要連接有驅動器13〇,適切安 裝有磁碟14卜光碟142、光磁碟143或半導體記憶體144等, 自此等所讀取之電腦程式,依需要安裝於記憶部128内。 個人電腦22如以圖3所示之方式構成。其基本構造與圖2 之波卡拉服務伺服器9相同。亦即,個人電腦22之CPU 221 至通信部229基本上具有與圖2之波卡拉服務伺服器9之 CPU 121至通信部129相同的功能。 84661 •23- 200409005 圖3之個人電腦22之輸入輸出介面225上連接有連接部 230 ’該連接部232連接站台B。如圖3所示,站台23内藏讀 寫器41,具有自放置其内之波卡拉人偶,藉由電磁感應, 非接觸性讀取資訊的功能。 . 輸入輸出介面225上,依需要連接驅動器231,安裝有磁 碟251、光碟252、光磁碟253或半導體記憶體254時,自其 謂取之電腦程式,依需要安裝於記憶部228内。 该資訊處理系統(資訊提供系統)中,為使本身實施認證, 各使用者預先購買圖4所示之親友波卡拉人偶161。如圖5所 示’該親友波卡拉人偶161内藏有具有天線172之ic晶片 171。如圖6所示,該1C晶片171内記憶有使用者id,其係作 為識別保持該親友波卡拉人偶161之使用者之使用者識別 資訊’及波卡拉ID,其係作為識別其親友波卡拉人偶161用 之波卡拉人偶識別資訊。 另外,使用者ID亦可與波卡拉id兼用。 其次’參照圖7之流程圖,說明使用者取得親友波卡拉人 偶161之處理。 個人電腦22之使用者操作輸入部226,下達對波卡拉服務 伺服态9之存取指令。CPU 221取得來自輸入部226之該指令 時’於步驟S 1中,控制通信部229,並經由LAN 21、ISP 2 及網際網路1,進入波卡拉服務伺服器9。波卡拉服務伺服 斋9對進來之個人電腦2 2,經由網際網路1提供輸入使用者 資訊用之GUI(圖形使用者介面)(後述之圖9的步驟S21)。因 而’使用者操作輸入部226,輸入本身姓名、住址、出生日 -24- 84661 200409005 期、性別、電話號碼、傳真號碼、郵件網址、信用卡號、 銀行帳戶號碼等使用者資訊。於步驟S2中,CPU 221自通信 部229,經由網際網路1,將所輸入之使用者資訊傳輸至波 卡拉服務伺服器9。另外,個人電腦22(其他終端亦同)與波 卡拉服務伺服器9間之通信,依需要予以密碼化。 此時,波卡拉服務伺服器9對個人電腦22傳輸親友波卡拉 人偶之候補(一覽)(圖9之步驟S23)。因而,於步驟S3中,CPU 221經由通信部229,接收自波卡拉服務伺服器9送來之親友 波卡拉人偶之候補時,使其輸出而顯示於輸出部227之顯示 部上。藉此,顯示如圖8所示之親友波卡拉人偶之候補。圖 8中顯示A至F等六種親友波卡拉人偶。圖4所示之親友波卡 拉人偶161對應於其中之圖8F。 使用者操作輸入部226,自所顯示之親友波卡拉人偶之候 補中指定利用者,作為本身之親友波卡拉人偶。CPU 221 於步驟S4中,受理該親友波卡拉人偶之選擇。 於步驟S5中,CPU 221將步驟S4處理時受理之親友波卡拉 人偶的選擇資訊傳輸至波卡拉服務伺服器9。 波卡拉服務伺服器9接收來自個人電腦22之選擇資訊 時’送來包含對應於其選出之親友波卡拉人偶之親友波卡 拉之資料之波卡拉服務用之電腦程式(圖9之步驟S26)。 於步驟S6中,個人電腦22之CPU 221接收自波卡拉服務伺 服器9送來之電腦程式,並記憶於記憶部228内。該程式包 含使對應於親友波卡拉人偶之親友波卡拉(為對於實際存 在之親友波卡拉人偶進行動畫顯示之虛擬人偶,以下,亦 84661 -25- 200409005 將其稱為角色)顯示於輸出部227之顯示部上所需之資料(親 友波卡拉之資料)。 該親友波卡拉之角色係以與對應之親友波卡拉人偶相同 之圖像表現。換言之,親友波卡拉人偶具有與作為顯示於 輸出邵227之顯示部上之虛擬人偶之親友波卡拉相同的形 狀(包含顏色等)。 如圖4之親友波卡拉人偶ι61係對應於圖8F所示之親友波 卡拉之角色者。 使用者將步驟S6處理所接收之程式安裝於利用波卡拉服 務伺服詻9提供之服務之其他機器内。圖1之例時,電視收 訊機24與個人電腦26内安裝該程式。此外,亦安裝於職場5 之個人電腦52内。 遠視收訊機24設有如安裝Memory Stick(商標)等半導體 記憶體之安裝部,使用者如藉由個人電腦22,在Mem〇ry Stick内記憶其程式,於電視收訊機24内安裝該Mem〇ry Stick,可對電視收訊機24安裝該程式。 而後,由於波卡拉服務伺服器9分送使用者於步驟S4處理 中選擇之親友波卡拉人偶(圖9之步驟S27),因此使用者於步 驟S8中,接收自波卡拉服務伺服器9送來之人偶。 波卡拉服務伺服器9對應於以上之圖7之個人電腦22的處 理’而執行圖9之流程圖所示之處理。 亦即’於步驟S21中,波卡拉服務伺服器9之CPU 121於個 人電腦22之使用者經由網際網路1存取時,並經由通信部 129受理該存取時,係對於該個人電腦22,經由網際網路1, 84661 -26- 200409005 提供輸入使用者資訊用之GUI至個人電腦22。 如上所述’使用者依據該GUI送來使用者資訊(圖7之步驟 S2)。因而,於步驟S22中,波卡拉服務伺服器9之CPU 121 接收來自個人電腦22之使用者資訊時,係經由通信部129將 其供給、登錄於波卡拉資料庫1〇内。藉此,使用者資訊登 錄於波卡拉資料庫1〇内(其詳細内容參照圖3〇敘述如後)。 其次,於步驟S23中,CPU 121自記憶部128讀取親友波卡 拉人偶之候補,並傳輸至個人電腦22。藉此,如上所述, 圖8所示之親友波卡拉人偶之候補傳輸至個人電腦22。 如上所述’使用者自傳輸之親友波卡拉人偶之候補中選 擇一個親友波卡拉人偶,並送來其選擇資訊(圖7之步騾 S5) 〇 因而’於步驟S25中,CPU 121對使用者分配使用者ID, 作為識別使用者用之識別資訊。此外,CPU 121分配波卡拉 ID至使用者選出之親友波卡拉人偶,並對應於使用者資訊 而登錄於波卡拉資料庫10内,作為波卡拉資訊。該波卡拉 資訊中’除波卡拉ID之外,還包含表示其波卡拉是否為親 友波卡拉之旗標(親友波卡拉旗標),或是具有其波卡拉之參 數等。該參數表示其親友波卡拉穿著之服裝,或是其親友 波卡拉具有之功能等。另外,親友波卡拉旗標亦可含於分 配於親友波卡拉人偶161之波卡拉ID内。 其次,於步驟S26中,CPU 121自記憶部128讀取使用者接 收波卡拉服務用之程式,並經由網際網路1傳輸至個人電腦 22。此時,CPU 121將使用者ID及表示其親友波卡拉之角色 84661 • 27- 2〇〇4〇9〇〇5 所需之波卡拉資訊含於程式㈣輸。該波卡拉資訊中,除 波卡拉ID之外,還包含屬於包含各種參數之圖像來源之波 卡扭資料。該程式係藉由個人電腦22接收(圖7之步驟S6)。 而後,於步驟S27中,CPU 121執行分送對應於步驟S24 之處理所接收之選擇資訊之親友波卡拉人偶的處理。具體 而言,CPU 121自構成輸出部127之列印機輸出指定使用者 選出之親友波卡拉人偶之資訊(波卡拉1]〇)及其使用者之住 址、姓名等。波卡拉服務伺服器9之管理者依據該列印機之 輸出,進行將特定之親友波卡拉人偶分送至使用者的手續。 其次,於步驟S28中,CPU 121執行對應於分送給使用者 之親友波卡拉人偶之代價的收費處理。 具體而j,CPU 121對收費伺服器13,依據使用者資訊内 所含之k用卡號,要求對應於親友波卡拉人偶之代價之價 格結算。或是,CPU 121對收費伺服器13,要求自使用者資 訊内所含之銀行帳戶號碼扣除代價。收費伺服器13依據該 要求’對其使用者之信用卡公司或銀行要求對應於親友波 卡拉人偶之代價的扣款處理。 使用者如上述地取得親友波卡拉人偶161。使用者亦可直 接前往藉由波卡拉服務伺服器9之管理者所管理之店舖購 買親友波卡拉人偶161。此時,使用者於該店舖中直接輸入 使用者資訊。 上述中,自個人電腦22進入波卡拉服務伺服器9内,預先 傳輸必要之使用者資訊後,可接收親友波卡拉人偶之分 送’換言之,預先登錄使用者後,可接收親友波卡拉人偶 -28- 84661 200409005 之分送,不過,亦可於使用者預先購買僅記憶有波卡拉m 之親友波卡拉人偶後,經由網路登錄使用者。此時購買之 親友波卡拉,爾後作為使用者代理人的功能。 此外’店舖内除親友波卡扭人偶161之外,亦販賣圖1 〇所 示之販賣波卡拉人偶181。使用者依需要可於各種店舖中購 買該販賣波卡拉人偶181。該販賣波卡拉人偶181亦於内部 内藏1C晶片191。1C晶片191記憶對應於其販賣波卡拉人偶 181具有之功能的資訊。 圖11表示販賣波卡拉人偶181具有提供内容資料功能時 之一種1己憶於1C晶片191内之資訊。該例中,於具有天線192 之1C晶片191内記憶有波卡拉ID、規定使用内容之條件之使 用條件。該使用條件中如包含可重現其内容之次數及可重 現之期限等。 再者,1C晶片191内,依需要亦記憶對應於使用者為使用 内容而支付之金額(購買金額)之預付金額。 使用者如此取得親友波卡拉人偶161或販賣波卡拉人偶 181,並接收内容之提供時,將親友波卡拉人偶ι61或販賣 波卡拉人偶181放置於對應於使用之機器之站台上。如使用 個人電腦22時,使用者於對應於個人電腦22而連接之站台 2 3上放置親友波卡拉人偶161或販賣波卡拉人偶1 § 1。此 時,個人電腦22執行圖12至圖16之流程圖所示的處理。 於步驟S41中,個人電腦22之CPU 221判定站台23上是否 放置有波卡拉人偶。尚未放置波卡拉人偶時,等待其放置。 放置有波卡拉人偶時,藉由讀寫器241讀取記憶於其…晶 84661 -29- 200409005 片171(或191)内之資訊,並經由連接部230送至CPU 221。因 而CPU 221在讀取該資訊前,重複執行步騾S41之處理。 判定站台23上放置有波卡拉人偶時,進入步驟S42,CPU 221讀取|己憶於波卡拉人偶之1C晶片171(或191)内之資訊。 即使所放置之波卡拉人偶為親友波卡拉人偶161或販賣波 卡拉人偶181,其1C晶片171或191内仍記憶有波卡拉ID(圖6 及圖11)。CPU 221於步驟S43中,控制通信部229,將所讀 取之波卡拉ID傳輸至波卡拉服務伺服器9。此時所傳輸之 ID,於波卡拉服務伺服器9中,係用於識別使用者(波卡拉 人偶)。亦即,由於此時之波卡拉ID係用作識別使用者之 ID,因此記憶有使用者ID時,亦可將其傳輸。此外,亦可 傳輸波卡拉ID與使用者ID兩者。 亦即,所讀取之波卡拉ID係經由LAN 21、ISP 2、網際網 路1而傳輸至波卡拉服務伺服器9。換言之,親友波卡拉人 偶161放置於站台23上時,CPU 21於步騾S43中,執行對於 波卡拉服務伺服器9之登入處理(連接處理)。 如此’由於使用者無須利用鍵盤等輸入ID,因此可對波 卡拉服務伺服器9輕易地存取,並且可防止輸入錯誤的發 生。因此,如不習慣鍵盤操作之孩童、女性、老人等,亦 可進行存取。 波卡拉服務伺服器9接收波卡拉ID時,判定其波卡拉ID是 否登錄於波卡拉資料庫1〇内(後述之圖28之步驟S93)。另 外,於波卡拉資料庫10内,除親友波卡拉之1〇外,亦登錄 有販賣波卡拉之ID。登錄所有讀取之波卡拉id的情況下, 84661 -30- 200409005 波卡拉服務伺服器9自波卡拉資料庫1〇讀取並送來公事包 資訊(圖28之步驟S98、S107)。 此外’波卡拉服務伺服器9於波卡拉ID尚未登錄於波卡拉 貪料庫10内的情況下,送來錯誤資訊(圖28之步騾S103)。 因而’於步驟S44中,個人電腦22之CPU 221判定是否自 波卡拉服務祠服器9接收錯誤資訊。於步驟S44中,判定接 收有錯誤資訊(於圖28之步騾S103之處理時所傳輸之資訊) 的情況下,進入步驟S45,CPU 221執行錯誤處理。亦即, 此種情況下,由於波卡拉ID尚未登錄於波卡拉資料庫10 内’因此使用者無法利用波卡拉服務。 另外,於步驟S44中,判定未接收錯誤資訊的情況下(判 定所接收者係圖28之步驟S98、S107之處理時所傳輸之公事 包資訊的情況下),進入步驟S46,CPU 221接收自波卡拉服 務伺服器9送來之公事包資訊。於步驟S47中,CPU 221將波 卡拉到達資訊傳輸至波卡拉服務伺服器9。該波卡拉到達資 訊係於後述之圖28之步驟S99中,藉由波卡拉服務伺服器9 接收。 於步驟S48中,CPU 221判定放置於站台23上者是否為親 友波卡拉人偶161。亦即,自波卡拉服務伺服器9送來之公 事包資訊中包含步驟S43處理時,表示傳輸至波卡拉服務词 服器9之波卡拉ID是否為親友波卡拉之ID之親友波卡拉旗 標。CPU 221依據該親友波卡拉旗標進行步驟S48之判定處 理。 親友波卡拉之公事包資訊中,如圖Π所示,含有:角色 84661 -31- 200409005 資訊、郵件資訊、行事曆資訊、喜好資訊、工作資訊、快 取資訊、搜尋資訊、内容資訊及親友波卡拉旗標。 此外,如圖18所示,於販賣波卡拉之公事包資訊中包含: 角色資訊、内容資訊及親友波卡拉旗標。 此等資訊係含於後述之圖3 1之親友波卡拉之波卡拉資 訊,或圖32之販賣波卡拉之波卡拉資訊内,不過,係作為 公事包資訊而送來者。此等資訊的詳細内容,參照圖31與 圖32敘述如後。 另外,親友波卡拉或販賣波卡拉之公事包資訊中,依需 要亦可進一步包含許可證資訊,其包含:伺服器網址、許 可證ID、密碼鍵等。 此外,亦可使角色資訊及内容之圖像資料等記憶於1〇:晶 片及個人電腦等終端内,於變更時使其更新。如此有助於 利用帶域狹窄之線路及以資料重量進行收費的線路。 放置於站台23上者為親友波卡拉人偶161的情況下,執行 其使用者相關處理。此時,進入步騾S49,CPU 221依據步 驟S46處理時接收之公事包資訊,生成波卡拉圖像資料,使 波卡拉之角色顯示於輸出部227之顯示部上。 亦即,於個人電腦22之記憶部228内記憶有圖7之步驟S6 處理時’自波卡拉服務伺服器9所接收之波卡拉資訊。cpu 221讀取對應於公事包資訊内所含之波卡拉m之波卡拉資 訊中之親友波卡拉的角色,於其參數内設定公事包資訊内 所含之參數的具體值,生成親友波卡拉之圖像資料,輸出 至輸出部227之顯示部,並使親友波卡拉(虛擬親友波卡拉 84661 -32- 200409005 之角色)顯示。該親友波卡拉之角色成為對應於放置於站台 2 3上之親友波卡拉人偶161的圖像。 換言之,親友波卡拉人偶161形成對應於該圖像(角色)之 形狀。因此,使用者看到顯示於輸出部227之顯示部上之親 - 友波卡拉之角色時,即可立即瞭解其親友波卡拉之角色即 為對應於放置於站台23上之親友波卡拉ι61者。 如此’由於顯示人偶與外觀相同波卡拉之角色,因此使 用者可輕易地識別利用之服務。 0 另外,可自波卡拉服務伺服器9供給顯示虛擬親友波卡拉 之角色用之波卡拉資訊至個人電腦22,不過,亦可預先使 其波卡拉資訊記憶於親友波卡拉人偶161内。如此可更迅速 地顯示。 此外自波卡拉服務伺服為9接收之波卡拉資訊,特別是 包含表示角色多邊形(Character Polygon)、結構(Texture)、 移動等角色時所需之參數之波卡拉圖像資料,自波卡拉服 務伺服器9接收時,亦可保存於親友波卡拉人偶161(或個人 φ %月自22)内。此時,對波卡拉服務伺服器9進行存取時,判 毛波卡拉圖像貝料是否更新過,尚未更新時,利用原保存 义波卡拉圖像資料,已更新時,自波卡拉服務伺服器9接收 並保存新的波卡拉圖像資料。 〜 再者’波卡拉資訊内可包含電子郵件之標頭部分的内容 - (如後述之圖22所示之電子郵件寄件人、收信日期(收訊日期 時間、郵件標題等郵件選擇上所需的資訊”。此時,於使用 者k擇适子郵件之功能時,係對作為郵件伺服器之Bp 2進 84661 -33- 200409005 行存取,並下載電子郵件的本文。 其次,於步驟S50中,CPU 221依據其親友波卡拉之公事 包資訊,將親友波卡拉具有之功能一覽作為圖符,使其顯 示於親友波卡拉之周圍。 圖19與圖20顯示該步驟S49與步驟S50之處理結果的顯示 例0 首先,如圖19所示,顯示親友波卡拉之角色出場之出場 口 301。而後,如圖20所示,對應於親友波卡拉人偶161之 親友波卡拉之角色311登錄之圖像自出場口 3〇1以動畫顯 示。如上所述,該親友波卡拉之角色311成為對應於親友波 卡拉人偶161之圖像。 於親友波卡拉之角色311之周圍顯示對應於親友波卡拉 之角色311(其使用者)保持之功能之圖符321_丨至32卜?。圖 20之顯示例中,圖符數量為7個,不過其數量並不限定於此。 另外,亦T使角色3 11具有公_包,使用者點選其公事包 時,使其公事包内所含之圖符顯示。 使用者自對應於如此顯示之功能的圖符中,操作構成輸 入邵226之如滑鼠等,來選擇特定之圖符。 Q而於步如』51中,CPU 221於選擇一個功能之前待用。 判定選出-個功能時,進入步驟S52,咖221執行對應於 選出之功能的處理。 如自7個圖符中選出對應於郵件之圖符3仏3時,⑽⑵ 執行對應於郵件之處理。且髀丄μ 、 /、把而吕,CPU221係控制通信部 ⑵,並對波卡拉服務伺服器9要求讀取郵件資訊。 84661 -34· 200409005 波卡拉服務伺服器9經個人電腦22指示取得郵件資訊 時,或是每隔一定時間周期性地經由網際網路1進入撕 2(具有郵件伺服器之功能),讀取其使用者之郵件資訊,並 登錄於波卡拉資料庫1〇内。波卡拉黯伺服器9讀取登錄於 波卡拉資料庫10内之郵件資訊,並自網際網路1,經由聊 2、LAN 21傳輸至個人電腦22。 CPU 221使對應於所讀取之郵件資訊之圖像顯示於輸出 邵227之顯示部上。 圖21顯示此時之顯示例。圖21之顯示例中,於親友波卡 才之角色311的左上方顯示對白框“I,其中顯示有「今天 有4件新郵件」的訊息。使用者自該顯示可知自己的信箱内 有4件新郵件。 使用者操作輸入部226之滑鼠,指示讀取郵件時,cpu 221 如圖22所示,自ISP 2讀取,使儲存於波卡拉資料庫ι〇内之 郵件的標題資訊顯示於視窗351上。使用者自如此顯示之郵 件中選擇特定之郵件,進一步可顯示其郵件内容。 使用者自7個圖符中選擇行事暦之圖符321_5時,cpu 221 進入波卡拉服務伺服器9,要求自波卡拉資料庫1〇讀取其親 友波卡拉之使用者的行事曆資訊,並傳輸至個人電腦22。 個人電腦22之CPU 221取得該行事暦資訊時,將其輸出至 輸出邵227之顯示部上使其顯示。因而,如圖23所示,於視 窗361上顯示親友波卡拉之角色3丨丨之使用者的行事暦。 使用者操作滑鼠,點選顯示於視窗361上之行事曆中之特 定日期時’如圖24所示,當天的行事曆顯示於視窗371上。 84661 -35- 200409005 該顯示例中顯示有3月1日之行事麼。 使用者自7個圖符中選擇換穿之圖符321_2時,cpu 221進 入波卡拉服務伺服器9,取得進行親友波卡拉之角色311之 換穿所需的Gm,如圖25所示,使其顯示於視窗381上。使 用者點選Μ視冒38 1之特定按鈕時,可使親友波卡拉之角色 3 11換穿喜好的襯衫及長褲。此時穿著的服裝作為參數被記 憶。因此,避免使用者對於作為自己分身之親友波卡拉之 角色3 11感到厭煩。 如以上所述,在對應於步驟S52選出之功能的處理中,係 對應於使用者之選擇而執行各種處理。該處理於後進一步 詳述。 其次,於步騾S53中,CPU 221判定親友波卡拉人偶161 疋否自站台23取下。尚未取下時,進入步驟S54,cpu 221 判定是否接收有波卡拉之處理結束。使用者使波卡拉之處 理結束時,自站台23取下親友波卡拉人偶丨6丨,或是操作輸 入部226,指示處理結束。 於步騾S54中,判定尚未指示波卡拉處理結束時,處理回 到步驟S51,重複執行其以後之處理。 CPU 221如以每1秒等較短之時間間隔,定期地控制讀寫 器241,自放置於站台23上之親友波卡拉161之1(:晶片171指 示讀取資料,而無法讀取資料時,判定親友波卡拉人偶161 已自站台23取下。 判定親友波卡拉人偶161已自站台23取下時,或是於步驟 S54中,判定使用者指示波卡拉之處理結束時,於步驟s55 84661 -36- 200409005 中,CPU 221將公事包資訊之變更履歷傳輸至波卡拉服務伺 服器9。因此,該履歷具有將親友波卡拉人偶l6i已自站台 23取下,或是使用者指示波卡拉處理結束通知波卡拉服務 伺服器9的功能。該履歷登錄於波卡拉服務伺服器9中(圖29 之步驟S109)。 另外,履歷中包含更新之行事暦、書藏、角色資訊(髮型、 服裝等)與使用者之思考資訊等。此等履歷直接寫入波卡拉 服務伺服器9内時,其更新處理由波卡拉服務伺服器9本身 進行。 再者,於步驟S56中,CPU 221使親友波卡拉之角色311 返回的圖像顯示於輸出部227之顯示部上。 圖26與圖27顯示此時之顯示例。 圖26之顯示例中,於親友波卡拉之角色3ΐι之左上方顯示 有對白框391,其中顯示「那麼該回去了」的訊息。而後, 如圖27所不,頰不有出口 4〇1,並動畫顯示親友波卡拉之角 色311自其出口 4〇1返回的圖像。The program of 123) performs various processes. The ram 123 also stores data necessary for the CPU 121 to perform various processes. The CPU 12, the ROM 122, and the RAM 123 are connected to each other via a bus 124. The bus 124 is also connected to an input / output interface 25. The input / output interface 125 is connected to an input section 126 including a keyboard, a mouse, etc., a display section including a CRT (cathode ray tube), an LCD (liquid crystal display), and the like; an output section 127 including a speaker, etc .: Memory Shao 128 composed of hard disks, etc .; and communication section 29 composed of modems, terminal adapters, etc. The communication unit 129 performs communication processing via a network including the Internet i. On the input / output interface 125, a drive 13 is connected as required, and a magnetic disk 14, a optical disk 142, an optical magnetic disk 143, or a semiconductor memory 144, etc. are suitably installed. The computer programs read therefrom are installed in the memory as required. Department 128. The personal computer 22 is configured as shown in FIG. 3. Its basic structure is the same as that of the Pokhara service server 9 of FIG. 2. That is, the CPU 221 to the communication section 229 of the personal computer 22 basically have the same functions as the CPU 121 to the communication section 129 of the Pokara service server 9 of FIG. 2. 84661 • 23- 200409005 A connection section 230 is connected to the input / output interface 225 of the personal computer 22 in FIG. 3, and the connection section 232 is connected to the station B. As shown in FIG. 3, the reader / writer 41 is built in the station 23, and has a function of reading information without contact by self-positioned Pocara dolls by electromagnetic induction. When the drive 231 is connected to the input / output interface 225 as required, and a magnetic disk 251, optical disk 252, optical magnetic disk 253, or semiconductor memory 254 is installed, a computer program taken from it is installed in the memory section 228 as required. In this information processing system (information providing system), in order to authenticate itself, each user purchases a relative and friend Pokhara doll 161 shown in FIG. 4 in advance. As shown in FIG. 5, 'the relative and friend Pokhara figure 161 has an IC chip 171 having an antenna 172 inside. As shown in FIG. 6, the 1C chip 171 stores a user id, which is used to identify the user identification information of the user who keeps the relative and friend Pokhara doll 161, and a Pokhara ID, which is used to identify his relatives and friends. Cara Doll 161 uses Pocara Doll identification information. In addition, the user ID can be used in combination with the pokhara id. Next, referring to the flowchart of FIG. 7, the processing for the user to obtain the relative and friend Pokhara doll 161 will be described. The user of the personal computer 22 operates the input section 226 to issue an access instruction to the Pokhara service servo state 9. When the CPU 221 obtains the instruction from the input unit 226 ', in step S1, it controls the communication unit 229 and enters the Pokhara service server 9 via the LAN 21, the ISP 2 and the Internet 1. The Pokhara service server 9 pairs the incoming personal computer 2 2 with a GUI (graphical user interface) for inputting user information via the Internet 1 (step S21 of FIG. 9 described later). Therefore, the user operates the input unit 226 to input user information such as name, address, date of birth, -24- 84661 200409005, gender, telephone number, fax number, email address, credit card number, and bank account number. In step S2, the CPU 221 transmits the inputted user information from the communication section 229 to the pokara service server 9 via the Internet 1. In addition, the communication between the personal computer 22 (the same is true of other terminals) and the Pokhara service server 9 is encrypted as necessary. At this time, the Pokhara service server 9 transmits the candidates (list) of Pokhara dolls of relatives and friends to the personal computer 22 (step S23 in FIG. 9). Therefore, in step S3, the CPU 221 receives the candidates of the relatives and friends of the Pocara dolls sent from the Pocara service server 9 via the communication unit 229, and outputs it to the display unit of the output unit 227. Thereby, the candidates of the relatives and friends Pokhara dolls shown in FIG. 8 are displayed. Figure 8 shows six types of puppets of relatives and friends such as A to F. The relatives and friends of Pocara figure 161 shown in FIG. 4 corresponds to FIG. 8F therein. The user operates the input unit 226, and designates a user from among the displayed candidates of relatives and friends of the Pokhara dolls, as the relatives and friends of the Pokhara dolls. In step S4, the CPU 221 accepts the selection of the puppets of the relatives and friends. In step S5, the CPU 221 transmits the selection information of the puppets of relatives and friends accepted during the processing in step S4 to the pokhara service server 9. When the Pokhara service server 9 receives the selection information from the personal computer 22, it sends a computer program for the Pokhara service that contains information corresponding to the selected relatives and friends of the Pokhara dolls, relatives and friends of Pokhara (step S26 in FIG. 9). . In step S6, the CPU 221 of the personal computer 22 receives the computer program sent from the Pokhara service server 9 and stores it in the memory 228. This program includes displaying the relatives and friends of Pokhara dolls (virtual puppets that are animated display of actual relatives and friends of Pokhara dolls, hereinafter also referred to as characters in 84661 -25- 200409005). The information required on the display section of the output section 227 (data of relatives and friends Pokhara). The character of the relative and friend Pokhara is represented in the same image as the corresponding relative and friend Pokhara doll. In other words, the relatives and friends Pokhara dolls have the same shape (including colors, etc.) as the relatives and friends of Pokhara as the virtual dolls displayed on the display section of output Shao 227. The relatives and friends Pocara doll ι61 shown in FIG. 4 corresponds to the characters of the relatives and friends Pocara shown in FIG. 8F. The user installs the program received in step S6 in other machines using the services provided by the Pokhara service servo 詻 9. In the example shown in FIG. 1, the program is installed in the television receiver 24 and the personal computer 26. It is also installed in the personal computer 52 of the workplace 5. The farsighted receiver 24 is provided with a semiconductor memory mounting section such as a Memory Stick (trademark). If the user uses a personal computer 22 to memorize its program in the Memory Stick, the user can install the Mem in the TV receiver 24 〇ry Stick, this program can be installed on the TV receiver 24. Then, since the Pokhara service server 9 distributes the pokhara dolls (the step S27 in FIG. 9) of the relatives and friends selected by the user in step S4, the user receives the Pokhara service server 9 in step S8. Here comes the puppet. The Pokhara service server 9 executes the processing shown in the flowchart of FIG. 9 corresponding to the processing of the personal computer 22 of FIG. 7 above. That is, 'in step S21, when the CPU 121 of the Pokhara service server 9 is accessed by the user of the personal computer 22 via the Internet 1, and when the access is accepted by the communication unit 129, it is for the personal computer 22 Provide a GUI for inputting user information to the personal computer 22 via the Internet 1, 84661 -26- 200409005. As described above, the user sends user information according to the GUI (step S2 in FIG. 7). Therefore, in step S22, when the CPU 121 of the Pokhara service server 9 receives the user information from the personal computer 22, it supplies and registers it to the Pokhara database 10 via the communication unit 129. As a result, user information is registered in the Pocara database 10 (the details are described later with reference to FIG. 30). Next, in step S23, the CPU 121 reads the candidate of the relative Pocara doll from the memory section 128 and transmits it to the personal computer 22. As a result, as described above, the candidates of the Pokhara dolls shown in FIG. 8 are transmitted to the personal computer 22. As described above, 'The user selects a friend and relative Pokhara doll from the candidates of the transmitted friend and relative Pokhara doll and sends its selection information (step S5 in FIG. 7). Therefore, in step S25, the CPU 121 The user assigns a user ID as identification information for identifying the user. In addition, the CPU 121 assigns a Pokhara ID to a relative and friend Pokhara doll selected by the user, and registers it in the Pokhara database 10 in correspondence with the user information as the Pokhara information. In addition to the Pocara ID, the Pocara information includes a flag indicating whether the Pocara is a relative or friend of the Pocara (Family and Friends Pocara Flag) or has parameters of the Pocara. This parameter indicates the clothing worn by his relatives and friends Pokhara, or the functions that his relatives and friends Pokhara has. In addition, relatives and friends 'Pokhara flag can also be included in the Pokhara ID assigned to relatives and friends' Pokhara doll 161. Next, in step S26, the CPU 121 reads a program for the user to receive the Pokhara service from the memory section 128, and transmits the program to the personal computer 22 via the Internet 1. At this time, the CPU 121 includes the user ID and the pokara information required to indicate the roles of its relatives and friends, Pokhara 84661 • 27-20040905, into the program input. In addition to the Pokhara ID, the Pokhara information also includes Pokhara data belonging to an image source containing various parameters. The program is received by the personal computer 22 (step S6 in FIG. 7). Then, in step S27, the CPU 121 executes a process of distributing relatives and friends of the pokhara dolls corresponding to the selection information received in the process of step S24. Specifically, the CPU 121 outputs, from the printer constituting the output section 127, information (Pocara 1) of relatives and friends selected by the designated user, and the address and name of the user. The administrator of the Pokhara service server 9 performs the procedure of distributing specific relatives and friends Pokhara dolls to users based on the output of the printer. Next, in step S28, the CPU 121 executes a charging process corresponding to the price distributed to the user's relatives and friends of the Pokhara doll. Specifically, j, the CPU 121 requests the charge server 13 to settle the price corresponding to the price of the relatives and friends' Pokhara doll according to the k card number contained in the user information. Alternatively, the CPU 121 requests the charging server 13 to deduct the consideration from the bank account number contained in the user information. The charging server 13 requests the user's credit card company or bank to perform a deduction processing corresponding to the price of a relative or friend Pokhara doll in accordance with the request '. The user obtains the relative and friend Pokhara doll 161 as described above. The user can also go directly to the store managed by the manager of the Pokhara service server 9 to buy relatives and friends Pokhara doll 161. At this time, the user directly enters the user information in the store. In the above, after entering the Pokhara service server 9 from the personal computer 22, after transmitting necessary user information in advance, it can receive the distribution of relatives and friends 'Pokhara dolls. In other words, after registering users in advance, it can receive relatives and friends' Pokhara O-28- 84661 200409005 will be distributed, but you can also register users via the Internet after the user purchases in advance the Pocara puppets that only memorize Pocara. The relatives and friends who bought at this time, Pokara, then acted as user agents. In addition, in addition to friends and relatives Poca twisted dolls 161, Pocara dolls 181 shown in Figure 10 are also sold. The user can purchase the selling Pokhara doll 181 in various stores as needed. The sold Pokhara doll 181 also contains a 1C chip 191 therein. The 1C chip 191 stores information corresponding to the functions of the sold Pokhara doll 181. FIG. 11 shows a type of information that has been memorized in the 1C chip 191 when the Pocara doll 181 has a function of providing content data. In this example, a 1C chip 191 having an antenna 192 stores a Pocara ID, and a use condition that specifies conditions for use. The conditions of use include the number of times that the content can be reproduced and the period within which it can be reproduced. In addition, the 1C chip 191 also stores a prepaid amount corresponding to the amount (purchase amount) paid by the user for using the content, as necessary. When the user obtains the relatives and friends 'Pokhara dolls 161 or the sale of Pokhara dolls 181 and receives the contents, the relatives and friends' Pokhara dolls 161 or the sale of Pokhara dolls 181 are placed on the platform corresponding to the used machine. For example, when using the personal computer 22, the user places a relative or friend Pokhara doll 161 or sells a Pokhara doll 1 § 1 on the platform 2 3 corresponding to the personal computer 22. At this time, the personal computer 22 executes the processing shown in the flowcharts of Figs. 12 to 16. In step S41, the CPU 221 of the personal computer 22 determines whether or not a Pokhara figure is placed on the platform 23. When the Pokhara doll has not been placed, wait for it to be placed. When the Pokhara doll is placed, the information stored in the ... crystal 84661 -29- 200409005 piece 171 (or 191) is read by the reader 241 and sent to the CPU 221 through the connection section 230. Therefore, the CPU 221 repeats the processing of step S41 before reading the information. When it is determined that the Pokhara doll is placed on the station 23, the process proceeds to step S42, and the CPU 221 reads the information in the 171 (or 191) 1C chip of the Pokhara doll. Even if the placed Pokhara doll is a relative or friend Pokhara doll 161 or a sold Pokhara doll 181, the Pokhara ID is still stored in the 1C chip 171 or 191 (Figure 6 and Figure 11). In step S43, the CPU 221 controls the communication section 229 to transmit the read Pokara ID to the Pokara service server 9. The ID transmitted at this time is used in the Pokhara service server 9 to identify the user (Pokhara doll). That is, since the Pocara ID at this time is used as an ID for identifying a user, the user ID can also be transmitted when it is memorized. In addition, both Pocara ID and user ID can be transmitted. That is, the read Pokhara ID is transmitted to the Pokhara service server 9 via the LAN 21, the ISP 2, and the Internet 1. In other words, when the relatives and friends of the Pokhara doll 161 are placed on the platform 23, the CPU 21 executes the login process (connection process) to the Pokhara service server 9 in step S43. In this way, since the user does not need to input the ID using a keyboard or the like, the pocara service server 9 can be easily accessed and input errors can be prevented from occurring. Therefore, children, women, and the elderly who are not used to keyboard operation can also access it. When the Pokhara service server 9 receives the Pokhara ID, it is determined whether the Pokhara ID is registered in the Pokhara database 10 (step S93 of FIG. 28 described later). In addition, in the Pokhara database 10, in addition to 10 of the relatives and friends of Pokhara, the ID of Pokhara is also registered. In the case of registering all read Pocara IDs, 84661 -30- 200409005 Pocara service server 9 reads and sends briefcase information from the Pocara database 10 (steps S98 and S107 in FIG. 28). In addition, if the Pokhara service server 9 has not registered in the Pokhara ID bank 10, an error message is sent (step S103 in FIG. 28). Therefore, in step S44, the CPU 221 of the personal computer 22 determines whether or not the error information is received from the Pokhara service temple server 9. In step S44, if it is determined that error information has been received (information transmitted during the processing of step S103 in FIG. 28), the process proceeds to step S45, and the CPU 221 executes error processing. That is, in this case, since the Pokara ID is not registered in the Pokara database 10 ', the user cannot use the Pokara service. In addition, in step S44, when it is determined that the error information is not received (when it is determined that the recipient is the briefcase information transmitted during the processing of steps S98 and S107 in FIG. 28), the process proceeds to step S46, and the CPU 221 receives the Briefcase information from Pokhara service server 9. In step S47, the CPU 221 transmits the Pocara arrival information to the Pocara service server 9. The Pokhara arrival information is received by the Pokhara service server 9 in step S99 of FIG. 28 described later. In step S48, the CPU 221 determines whether the person placed on the platform 23 is a relative or friend Pokhara figure 161. That is, when the briefcase information sent from the Pokhara service server 9 includes the processing in step S43, it indicates whether the Pokhara ID transmitted to the Pokhara service server 9 is a relative or friend of the Pokhara flag of the Pokhara ID. . The CPU 221 performs determination processing of step S48 based on the relatives and friends' Pokhara flag. The briefcase information of relatives and friends Pokhara, as shown in Figure II, contains: role 84661 -31- 200409005 information, mail information, calendar information, preference information, job information, cache information, search information, content information, and relatives and friends wave Cara flag. In addition, as shown in FIG. 18, the briefcase information for the sale of Pokhara includes: character information, content information, and relatives and friends' Pokhara flags. This information is included in the Pokhara information of relatives and friends of Pokhara in Figure 31, described below, or in the Pokhara information of Pokhara selling in Figure 32, but it is sent as briefcase information. The details of such information will be described later with reference to FIGS. 31 and 32. In addition, relatives and friends of Pokhara or the briefcase that sells Pokhara can further include license information as required, which includes: server URL, license ID, password key, etc. In addition, character information and content image data can be stored in terminals such as 10: wafers and personal computers, and updated when changes are made. This helps to use narrow-band lines and lines that charge based on data weight. When the person placed on the platform 23 is a relative and friend Pokhara figure 161, the user-related processing is performed. At this time, it proceeds to step S49, and the CPU 221 generates Pokhara image data based on the briefcase information received during the processing in step S46, so that the character of Pokhara is displayed on the display section of the output section 227. That is, in the memory section 228 of the personal computer 22, the Pokhara information received from the Pokhara service server 9 during the processing of step S6 in FIG. 7 is stored. The CPU 221 reads the roles of relatives and friends of Pocara in the Pocara information contained in the briefcase information, and sets the specific values of the parameters contained in the briefcase information in its parameters to generate the relatives and friends of Pocara. The image data is output to the display section of the output section 227, and the relatives and friends Pokhara (virtual relatives and friends Pokhara 84661 -32- 200409005) are displayed. The character of the relative and friend Pokhara becomes an image corresponding to the relative and friend Pokhara doll 161 placed on the platform 23. In other words, relatives and friends of the Pokhara figure 161 form a shape corresponding to the image (character). Therefore, when the user sees the role of the relative-friend Pocara displayed on the display section of the output section 227, the user can immediately understand that the role of his relative and friend Pocara is corresponding to the relative and friend Pocara 61 placed on the platform 23. . In this way, since the puppet has the same appearance as the pokhara, the user can easily identify the service used. 0 In addition, the Pokhara service server 9 may provide Pokhara information for displaying the characters of virtual relatives and friends Pokhara to the personal computer 22, but it is also possible to memorize the Pokhara information in the relatives and friends Pokhara doll 161 in advance. This can be displayed more quickly. In addition, the Pokhara information received from the Pokhara service servo is 9, especially the Pokhara image data including the parameters needed to represent the character Polygon, Texture, and movement. When the device 9 is received, it can also be stored in relatives and friends Pokhara doll 161 (or individual φ% month since 22). At this time, when accessing the Pokhara service server 9, it is judged whether the Mao Pokhara image material has been updated. If it has not been updated, the original saved Pokhara image data is used. The receiver 9 receives and saves new Pokhara image data. ~ Furthermore, the content of the header part of the e-mail may be included in the Pocara information-(e.g., the e-mail sender, the date of receipt (such as the date and time of receipt, the title of the message, etc.) Required information ". At this time, when the user selects the function of apt mail, it accesses Bp 2 as a mail server into 84661 -33- 200409005, and downloads the text of the e-mail. Second, in the step In S50, according to the briefcase information of relatives and friends Pocara, the CPU 221 displays the functions of the relatives and friends Pocara as icons to display them around the relatives and friends Pocara. Figures 19 and 20 show steps S49 and S50. Display Example 0 of the processing result First, as shown in FIG. 19, the exit 301 of the role of relatives and friends Pokhara is displayed. Then, as shown in FIG. The image is displayed in an animation from the entrance 30.1. As mentioned above, the character 311 of the relative and friend Pokhara becomes an image corresponding to the friend and friend Pokhara doll 161. The corresponding character is displayed around the character 311 of the relative and friend Pokhara. The icons 321_ 丨 to 32 of the functions held by the character 311 (its user) of relatives and friends Pokhara. In the example shown in FIG. 20, the number of icons is seven, but the number is not limited to this. Also, T makes the character 3 11 have a briefcase, and when the user clicks on his briefcase, the icon contained in the briefcase is displayed. The user operates from the icon corresponding to the function thus displayed to constitute an input Shao 226, such as a mouse, selects a specific icon. Q In step 51, the CPU 221 waits until a function is selected. When a function is determined to be selected, the process proceeds to step S52, and the execution of the coffee 221 corresponds to Processing of the selected function. For example, if the icon corresponding to the mail 3 仏 3 is selected from 7 icons, ⑽⑵ executes the processing corresponding to the mail. And 髀 丄 μ, /, 把, and the CPU221 is the control communication unit⑵ And request the reading of mail information from the Pokhara service server 9. 84661 -34 · 200409005 When the Pokhara service server 9 instructs to obtain the mail information via the personal computer 22, or periodically via the Internet 1 at certain intervals Enter Tear 2 (with mail server function ), Read the mail information of its users, and register it in the Pokhara database 10. The Pokhara server 9 reads the message information registered in the Pokhara database 10, and from the Internet 1, via Chat 2, LAN 21 is transmitted to personal computer 22. CPU 221 displays an image corresponding to the read mail information on the display section of output Shao 227. Fig. 21 shows a display example at this time. In the display example of Fig. 21 On the upper left of the character 311 of relatives and friends Bokacai, a dialogue box "I" is displayed, which shows "There are 4 new messages today." The user can know that there are 4 new messages in his mailbox. When the user operates the mouse of the input unit 226 and instructs to read the mail, the CPU 221 is read from the ISP 2 as shown in FIG. 22, so that the header information of the mail stored in the Pocara database ι〇 is displayed on the window 351. . The user selects a specific email from the emails thus displayed to further display the content of the email. When the user selects the acting icon 321_5 from the 7 icons, the CPU 221 enters the Pokhara service server 9 and requests to read the calendar information of the users of his relatives and friends Pokhara from the Pokhara database 10. Transfer to personal computer 22. When the CPU 221 of the personal computer 22 obtains the action information, it outputs it to the display section of the output module 227 for display. Therefore, as shown in FIG. 23, on the window 361, the behavior of the user of the character 3 of the relative and friend Pocara is displayed. When the user operates the mouse and clicks on a specific date in the calendar displayed on the window 361, as shown in FIG. 24, the calendar of the day is displayed on the window 371. 84661 -35- 200409005 Does this display example show that March 1st? When the user selects the icon 321_2 to be changed from the 7 icons, the CPU 221 enters the Pokhara service server 9 and obtains the Gm required for changing the character 311 of relatives and friends Pokhara, as shown in FIG. 25. It is displayed on window 381. When the user clicks on the specific button of M Video 38 1, the character 3 11 of the relatives and friends Pokhara can be changed to wear his favorite shirt and trousers. The clothing worn at this time is memorized as a parameter. Therefore, it is avoided that the user is bored with the character 3 11 of Pocara who is a close relative of his own. As described above, in the process corresponding to the function selected in step S52, various processes are executed in accordance with the selection of the user. This process is further detailed later. Next, in step S53, the CPU 221 determines whether the relatives and friends Pokhara doll 161 has been removed from the platform 23. If it has not been removed, the process proceeds to step S54, and the CPU 221 determines whether or not the process of receiving a pocara is finished. When the user finishes the Pokhara treatment, the relative and friend Pokhara doll 丨 6 丨 is removed from the platform 23, or the input unit 226 is operated to instruct the end of the processing. When it is determined in step S54 that the end of the Pokhara process has not been instructed, the process returns to step S51 and the subsequent processes are repeatedly executed. If the CPU 221 periodically controls the reader 241 at a short time interval such as 1 second, the relatives and friends of Pocara 161-1 placed on the platform 23 (the chip 171 instructs to read the data, but cannot read the data. , It is determined that the relative and friend Pokhara doll 161 has been removed from the platform 23. When it is determined that the relative and friend Pokhara doll 161 has been removed from the platform 23, or in step S54, it is determined that the user instructs the end of the processing of the Pokhara in step S54. In s55 84661 -36- 200409005, the CPU 221 transmits the change history of the briefcase information to the Pokhara service server 9. Therefore, the resume has the relatives and friends Pokhara doll 16i removed from platform 23, or the user instructs The function of the Pokhara service notification is notified to the function of the Pokhara service server 9. The history is registered in the Pokhara service server 9 (step S109 in FIG. 29). In addition, the history includes updated actions, books, character information (hair style) , Clothing, etc.) and user's thinking information, etc. When these resumes are written directly into the Pokhara service server 9, the update process is performed by the Pokhara service server 9 itself. Furthermore, in step S56, the CPU 221 causes the image returned by the character 311 of the relatives and friends Pokhara to be displayed on the display section of the output section 227. Figs. 26 and 27 show examples of the display at this time. Fang displayed a dialogue box 391 with the message "then it's time to go back." Then, as shown in Figure 27, there is no exit 401 on the cheek, and the animation shows that the character 311 of relatives and friends Pokhara returns from its exit 401. Image.

進行此種顯示時,使用者可立即瞭解親友波卡拉之相關 處理結束。亦即,親友波卡拉人偶16丨自站台23取下時,CPU 21於步驟S54中,執行解除與波卡拉服務伺服器9之連接的 登出處理。 如以上所述,於開始服務時,顯示與人偶相同之波卡拉 (角色),服務結束時,其顯示即結束,因此使用者可輕易地 掌握登入及登出1而’若使用者於錯誤期間輸入接收服 々斤而之衩作,即操法利用服務,因此可避免裝置故障與 84661 -37- 200409005 誤認。 回到圖12,於步驟S48中,判定放置於站台23上者並非親 友波卡拉人偶161時(判定為販賣波卡拉人偶181時),進入步 騾S57,個人電腦22之CPU 221依據步驟S46之處理所接收之 公事包資訊内所含之販賣波卡拉之波卡拉資訊,生成波卡 拉圖像資料,並於構成輸出部227之顯示部上顯示販賣波卡 拉之角色(販賣波卡拉人偶181之虛擬人偶)。亦即,如後述 之圖30至圖32所示’於波卡拉資料庫1〇内登錄有販賣波卡 扭之波卡拉資訊與内容圖像資料,該波卡拉資訊與内容圖 像資料含於認證資訊内,並自波卡拉服務伺服器9送來。該 販買波卡拉之角色亦形成具有與販賣波卡拉人偶181大致 相同之形狀的圖像(使用者可立即瞭解為對應於販賣波卡 拉人偶181之虚擬人偶之圖像)。 於步驟S58中,CPU 221抽出步驟S46之處理時接收之公事 包資訊内所含之内容圖像資料(内容利用資訊),依據其内容 圖像資料生成内容圖像,並使其顯示於輸出部227之顯示部 上藉此,對應於使用者購買之販賣波卡拉人偶⑻相關内 容之内容圖像顯示於輸出部227上。該内容圖像中如包含相 關<内客說明1「想下載該樂曲時,請點選存取按备」之 訊息等。 ”因而,使用者於取得内容時,係以構成輸人部226之滑鼠 等操作所顯示之内容圖像中的存取按鈕。 CPU221於步驟S59中,在對内容伺服器指示存取(操作存 取按紐)之前待用,判定為指示對内容伺服器存取時,進入 84661 -38- 200409005 步驟S60,CPU 221讀取記憶於1C晶片191内之使用條件(圖 11)。而後,於步驟S61中,CPU 221判定是否已滿足使用條 件。該使用條件内如包含内容之使用期限。CPU 221將内藏 之計時器計時之現在日期時間與使用條件内定義之使用期 限比較,判定是否已滿足使用條件。此外,使用條件為定 義最大可使用次數及預付金額時,係判定其值是否為r 〇」。 於步驟S61中,判定已滿足使用條件時(如判定現在之曰 期時間未達使用期限,且最大可使用次數及預付金額並非 「0」時),進入步騾S62,CPU 221依據記憶於ic晶片191之 存取目的地資訊,進入内容伺服器,要求傳輸内容資料。 藉此,如對於圖1所示之内容伺服器6要求傳輸内容資料。 内容伺服器6依據該要求,經由網際網路1送來内容資料 (後述之圖33之步驟S123)。因而,於步驟S63中,個人電腦 22之CPU 221經由通信部229接收自内容伺服器6送來之内 容資料。該内容資料供給並記憶於記憶部228内。 於步驟S64中,CPU 221將步騾S63處理時接收並記憶之内 各負料丁以解碼,並執行輸出處理。亦即,自内容伺服器6 送來之内容資料經過密碼化處理,而CPU221使用自波卡拉 服務伺服器9取得之許可證資訊(圖32)内所含之密碼鍵,將 該密碼化之内容資料予以解碼。而後,Cpu 221經由輸出部 2 2 7輸出解碼後獲得之内容資料。 另外’經由網際網路1傳輸密碼化内容與密碼鍵時,有可 能遭第二者盜取,因此,於重現(或複製)内容時,亦可變更 密碼化内容之密碼鍵。 84661 -39- 200409005 於步·驟S65中,CPU 221判定是否已自輸入部226輸入(是 否經使用者指示)結束内容輸出,尚未指示結束内容輸出 時,進入步驟S66,判定販賣波卡拉人偶181是否自站台23 取下。該判定處理與圖13之步騾S53之處理同樣地進行。 於步驟S66中,判定販賣波卡拉人偶181尚未自站台23取 下時,回到步驟S65,重複執行其以後之處理。 步驟S65之處理,判定為指示結束内容輸出時,或於步驟 S66中,判定販賣波卡拉人偶ι81已自站台23取下時,進入 步驟S67,CPU 221結束内容輸出。 而後,於步騾S68中,CPU 221控制讀寫器24卜使記憶於 販賣波卡拉人偶181之1C晶片191之使用條件更新。如使用 條件中定義有最大可使用次數(可重現次數)時,其值僅減少 1。如最大可使用次數定義為20次等時,其值減少1 ,當其 值為「0」時,即無法再使用(重現)。 其次,於步驟S69中,CPU 221於記憶於販賣波卡拉人偶 Ml内之1C晶片191之預付金額為每次使用内容即扣除之系 統時,以僅減去特定金額(僅對應於1次重現部分之金額)之 方式更新其預付金額。步騾S68與S69之處理,亦可僅進行 任何一方之處理。 於步驟S70中,CPU 221與圖13之步騾S56同樣地,使販賣 波卡拉之角色返回之圖像顯示於輸出部227之顯示部上。藉 此’因自站台23取下販賣波卡拉人偶1 81,並指示結束内容 輪出,因此使用者可立即瞭解内容輸出結束。 於步驟S61中,判定尚未滿足使用條件時(超過使用期限 84661 -40- 200409005 寺使用久數達到最大可使用次數時或預付金額為「〇」 時)’進入步驟S7卜CPU221生成特定之訊息,並顯示於輸 出邵227之顯示部上。藉此,如達到重現次數所允許之次數 時,即顯示「内容已重現⑽。還需要利用内容時,須重新 支付五額。」之訊息。使用者依據該訊息之顯示,進—步 想利用内容時’即操作輸人部226,指*更新使用條件。 因而,,於步驟S72中,CPU 221判定是否要求更新使用條 件,判定已要求更新使用條件時,於步驟S73中,CPU 221 依據公事包資訊之内容資訊内所含之#取目的地資訊(目籲 18),經由網際網路J進入内容伺服器6。於步驟s74中,cpu 221對内容伺服器6要求作為使用條件之最大可使用次數與 預付金額之更新。内容伺服器6依據該要求,其使用者雖為 可結算之使用者,不過,獲得波卡拉服務伺服器9通知時, 係對個人電腦22傳輸更新資料(圖33之步驟S127)。 因而,於步驟S75中,CPU 221判定是否自内容伺服器6 U來更新貝料’已送來時,進入步驟S 7 6,接收自内容伺服 咨6送來之更新資料,並經由讀寫器241將其資料供給至ic 晶片191,使最大可使用次數與預付金額更新。 如此,使用者藉由要求更新最大可使用次數與預付金 額,利用其販賣波卡拉人偶1 8 1,可無數次利用内容。 -· 另外,如後述,進行預付金額之更新時,波卡拉服務伺 、 服器9依據來自内容伺服器6之要求(圖33之步驟S125),對使 用者執行收費處理(圖28之步驟S105)。 於步驟S75中,判定尚未送來更新資料時,進入步驟S77, 84661 -41 · 200409005 執行錯誤處理。 亦即,波卡拉服務伺服器9判定使用其販賣波卡拉人偶 181之使用者,因銀行帳戶存款不足等原因,而為無法進行 預付金額結算之使用者時,内容伺服器6即對個人電腦22通 知錯誤訊息(圖33之步驟S118)。此時,CPU 221由於尚未送 來更新資料,因此執行錯誤處理。具體而言,Cpu 221係使 輸出部227之顯示部上顯示如「無法利用内容」之訊息。 於步驟S72中,判定使用者未要求更新使用條件時,即跳 過步驟S73至步驟S77之處理。 另外’亦可將内藏1C晶片之信用卡放置於站台上,自其 信用卡結算預付金額。 其次,參照圖28與圖29之流程圖,說明對應於以上之圖 12至圖16之泥程圖所示之個人電腦22處理而執行之波卡拉 服務伺服器9的處理。 於步驟S91中,波卡拉服務伺服器9之CPU 191判定是否自 個人電腦22取得波卡拉ID,判定尚未取得時,進入步驟 S108,判定是否接收波卡拉之履歷。於步驟§1〇8中,判定 尚未接收波卡拉之履歷時,進入步驟su〇,cpu 121判定是 否自内容伺服器6接收結算要求,判定尚未接收結算要求 時’回到步驟S91,重複執行其以後之處理。 於步驟S91中,判定取得波卡拉m時,cpu 121進入步驟 S92,自波卡拉資料庫1〇檢索自個人電腦22取得之(在圖u 之步驟S43處理時,自個人電腦22傳輸之)波卡拉①。 波卡拉資料庫10内,如圖30至圖32所示,記憶有使用者 -42- 84661 200409005 資訊與波卡拉資訊。使用者資訊(圖30)内除記錄有··識別使 用者之使用者ID、使用者姓名、住址、出生日期、性別、 電話號碼、傳真號碼、郵件網址、登錄其使用者之登錄日 期等之外,還纪錄有使用者之信用卡號、銀行帳戶號碼等。 波卡拉貝訊内包含·親友波卡拉之波卡拉資訊(圖3 1)與販 賣波卡拉之波卡拉(圖32)。 親友波卡拉之波卡拉資訊内包含··其使用者具有之親友 波卡拉人偶之波卡拉ID、使用者ID、顯示其波卡拉為親友 波卡拉或販賣波卡拉之親友波卡拉旗標,或是有關其波卡 拉之服裝之參數等顯示其波卡拉時所需之波卡拉的角色資 料等。 、 波卡拉資訊進-#亦登錄有親友波卡拉具有之各種功能 相關資訊131之例中記憶有:郵件資訊、行事麼資訊此 喜好資訊、工作資訊、快取資訊、搜尋資訊等。郵件資呀 記憶有迄今送達其使用者之郵件’或是迄今其使用者傳於 之郵件等。 則 行事麼資訊内記錄有:其使用者現在及過去之行事辱、 及使用者輸人之備忘錄。此外,該行事曆内亦記錄有二 拉執行之各種事件資訊等。 、 喜好資訊内記憶使用者附加書籤之首頁的url等。 工作資訊内登錄有使用者本身保持之終端(硬體),藉由預 先登錄而可接受之服務相關資訊。該工作資訊中: 使用者暫存之資料。 、有 快取資訊内登錄有親友波卡拉分析其使用者之思考, 84661 -43- 200409005 行收集之建議内容。 搜尋資訊内1己錄:檢索引擎及使用者指示預先檢索之販 賣波卡拉相關資訊。 波卡拉資訊還登錄有表示親友波卡拉之角色實際顯示於 網路上之特足裝置之位置的現在位置。藉此,可防止親友 波卡拉之角色在網路上之裝置中同時顯示於兩個以上的位 置(實現顯示之排他性)。換言之,可避免其他使用者利用冒 充真正使用者之親友波卡拉人偶161之其他親友波卡拉人 偶’來盜取使用者之資訊。亦即,波卡拉服務伺服器9於自 現在位置以外傳輸有親友波卡拉ID時,執行錯誤處理。因 而在網路上之裝置内僅顯示一個親友波卡拉之角色。 此外,可防止因同時自兩個以上裝置對波卡拉服務伺服 器9進行存取造成資料的不整合。換言之,藉由一個波卡拉 可往返於數個裝置,可使使用者立即瞭解排他性存取。 波卡拉資訊内亦記錄:其使用者取得之内容資訊及使用 其内容時所需之許可證資訊等。内容資訊内亦包含:識別 内容之内容ID及存取其内容所需之存取資訊等。許可證資 訊内記錄:識別許可證之許可證ID、將密碼化之内容予以 解碼之密碼鍵及取得許可證時進入之許可證伺服器之網址 等資訊。 販賣波卡拉之波卡拉資訊(圖32)内包含:波卡拉ID、親友 波卡拉旗標、角色資訊、内容資訊、許可證資訊及内容利 用資訊。When this display is performed, the user can immediately know that the related processing of relatives and friends Pokhara is over. That is, when the relative and friend Pokhara doll 16 丨 is removed from the platform 23, the CPU 21 executes a log-out process of releasing the connection with the Pokhara service server 9 in step S54. As mentioned above, when the service is started, the same pokara (character) as the puppet is displayed, and when the service ends, its display ends, so the user can easily grasp the login and logout 1 and 'if the user is in error During the period, you can enter the receiving service to do the work, which means you can use the service, so you can avoid device failure and misunderstanding of 84661 -37- 200409005. Returning to FIG. 12, in step S48, when it is determined that the person placed on the platform 23 is not a relative or friend of Pokhara doll 161 (when it is determined to sell Pokhara doll 181), the process proceeds to step S57, and the CPU 221 of the personal computer 22 according to the steps The processing of S46 includes the Pokhara selling Pokhara information contained in the briefcase information received, generates Pokhara image data, and displays the character of Pokhara selling on the display section constituting the output section 227 (selling Pokhara dolls 181 virtual puppet). That is, as shown in FIG. 30 to FIG. 32 described below, 'Pocara information and content image data of the Poca twist sale are registered in the Pocara database 10, and the Pocara information and content image data are included in the authentication. The information is sent from the Pokhara service server 9. The character selling Pokhara also forms an image having a shape substantially the same as that of selling Pokhara doll 181 (users can immediately understand that it is an image of a virtual puppet that corresponds to selling Pokhara doll 181). In step S58, the CPU 221 extracts the content image data (content utilization information) contained in the briefcase information received during the processing in step S46, generates a content image based on the content image data, and displays it in the output section. On the display unit 227, a content image corresponding to the content related to the sale of Pokhara dolls purchased by the user is displayed on the output unit 227. If the content image contains the related < internal guest description 1 "when you want to download the music, please click the access to backup" message, etc. Therefore, when the user obtains the content, it is the access button in the content image displayed by the operation of the mouse and the like constituting the input unit 226. In step S59, the CPU 221 instructs the content server to access (operation The access button) was previously inactive, and when it was determined to instruct access to the content server, the process proceeds to 84661 -38- 200409005 in step S60, and the CPU 221 reads the usage conditions stored in the 1C chip 191 (Fig. 11). In step S61, the CPU 221 determines whether the use condition has been satisfied. The use condition includes the use period of the content. The CPU 221 compares the current date and time of the built-in timer with the use period defined in the use condition to determine whether it has been used. The use condition is satisfied. In addition, when the use condition is defined as the maximum number of usable times and the prepaid amount, it is determined whether the value is r 〇 ". In step S61, when it is determined that the use conditions have been met (for example, it is determined that the current date has not reached the use period, and the maximum number of usable times and the prepaid amount is not "0"), the process proceeds to step S62, and the CPU 221 according to the memory in the ic The access destination information of the chip 191 enters the content server and requests transmission of the content data. Thereby, the content server 6 as shown in FIG. 1 is required to transmit content data. The content server 6 sends content data via the Internet 1 in accordance with the request (step S123 of FIG. 33 described later). Therefore, in step S63, the CPU 221 of the personal computer 22 receives the content data sent from the content server 6 via the communication section 229. The content data is supplied and stored in the storage unit 228. In step S64, the CPU 221 decodes each negative material received and memorized during the processing of step S63, and performs output processing. That is, the content data sent from the content server 6 is encrypted, and the CPU 221 uses the password key contained in the license information (Figure 32) obtained from the Pokhara service server 9 to encrypt the encrypted content. The data is decoded. Then, the CPU 221 outputs the content data obtained after decoding through the output section 2 2 7. In addition, when the encrypted content and the password key are transmitted via the Internet 1, they may be stolen by a second party. Therefore, when the content is reproduced (or copied), the password key of the encrypted content may be changed. 84661 -39- 200409005 In step S65, the CPU 221 determines whether or not the content output has been input from the input unit 226 (whether instructed by the user). If the output of the content has not been instructed, the process proceeds to step S66 to determine the sale of the Pokhara dolls. Is 181 removed from platform 23. This determination processing is performed in the same manner as the processing of step S53 in FIG. 13. When it is determined in step S66 that the sale of the pokhara doll 181 has not been removed from the platform 23, the process returns to step S65 and the subsequent processing is repeated. When it is determined in step S65 that the output of the content is instructed to be ended, or in step S66, it is determined that the sale of the pokhara doll 81 has been removed from the platform 23, the process proceeds to step S67, and the CPU 221 ends the output of the content. Then, in step S68, the CPU 221 controls the reader / writer 24 to update the use conditions stored in the 1C chip 191 of the sold Pokhara figure 181. If the maximum number of usable times (reproducible times) is defined in the use conditions, its value is only reduced by one. If the maximum number of usable times is defined as 20 times, the value is reduced by 1, and when the value is "0", it can no longer be used (reproduced). Secondly, in step S69, the CPU 221 deducts only a specific amount when the prepaid amount of the 1C chip 191 stored in the sold Pokhara doll M1 is deducted each time the content is used (corresponding to only one reload) Current amount) to update its prepaid amount. The processing of steps S68 and S69 can also be performed by either one. In step S70, the CPU 221 displays the image returned by the character selling Pokhara on the display section of the output section 227 in the same manner as in step S56 of FIG. With this, because the Pocara Doll 1 81 is removed from the platform 23 and the content is instructed to end, the user can immediately know that the content output is finished. In step S61, when it is determined that the use conditions have not been met (exceeded the use period 84661 -40- 200409005, the temple has reached the maximum number of usable times or the prepaid amount is "0"), the process proceeds to step S7, and the CPU221 generates a specific message, And displayed on the display of output Shao 227. As a result, if the number of times allowed for reproduction is reached, the message "The content has been reproduced" is displayed. If you still need to use the content, you must pay five more. ". Based on the display of the message, the user proceeds further—when he wants to use the content ’, the input section 226 is operated, and the * use conditions are updated. Therefore, in step S72, when the CPU 221 determines whether to update the use conditions and determines that the use conditions have been requested to be updated, in step S73, the CPU 221 obtains the destination information (the destination information according to the # contained in the content information of the briefcase information). (18), enter the content server 6 via the Internet J. In step s74, the CPU 221 requests the content server 6 to update the maximum number of usable times and the prepaid amount as the use conditions. According to the request, although the content server 6 is a user who can settle accounts, when receiving the notification from the Pokhara service server 9, it transmits the update data to the personal computer 22 (step S127 in FIG. 33). Therefore, in step S75, when the CPU 221 determines whether to update the shell material from the content server 6U has been sent, it proceeds to step S7 6 and receives the update data sent from the content server 6 and passes the reader. 241 supplies its data to the IC chip 191 to update the maximum number of usable times and the prepaid amount. In this way, the user can update the maximum number of usable times and the prepaid amount, and use the Pokhara doll to sell 1 8 1 to use the content numerous times. -· In addition, as will be described later, when updating the prepaid amount, the Pokhara service server 9 performs the charge processing for the user according to the request from the content server 6 (step S125 in FIG. 33) (step S105 in FIG. 28). ). When it is determined in step S75 that the update data has not been sent, the process proceeds to steps S77, 84661-41 · 200409005, and error processing is performed. That is, when the Pokhara service server 9 judges that the user who used to sell the Pokhara doll 181 is a user who cannot settle the prepaid amount due to insufficient bank account deposits, etc., the content server 6 immediately checks the personal computer. 22 notifies an error message (step S118 of FIG. 33). At this time, the CPU 221 executes error processing because no updated data has been sent. Specifically, the CPU 221 causes a message such as "unavailable content" to be displayed on the display section of the output section 227. When it is determined in step S72 that the user has not requested to update the use conditions, the processing in steps S73 to S77 is skipped. Alternatively, a credit card with a built-in 1C chip can be placed on the platform and the prepaid amount can be settled from its credit card. Next, with reference to the flowcharts of Figs. 28 and 29, the processing performed by the Pokara service server 9 corresponding to the processing performed by the personal computer 22 shown in the mud charts of Figs. 12 to 16 will be described. In step S91, the CPU 191 of the Pokhara service server 9 determines whether or not a Pokhara ID has been obtained from the personal computer 22. If it is determined that the Pokhara ID has not been obtained, it proceeds to step S108 to determine whether to receive a Pokhara history. In step §108, when it is determined that the resume of Pokara has not been received, the process proceeds to step su0, and CPU 121 determines whether a settlement request has been received from the content server 6. When it is determined that a settlement request has not been received, it returns to step S91 and repeats it. Handle it later. When it is determined in step S91 that the Pocara m is obtained, the CPU 121 proceeds to step S92, and retrieves the wave obtained from the personal computer 22 from the Pocara database 10 (transmitted from the personal computer 22 during the processing of step S43 in FIG. U). Cara①. In the Pokhara database 10, as shown in FIGS. 30 to 32, the user-42- 84661 200409005 information and Pokhara information are stored. In addition to the user information (Figure 30), the user ID, user name, address, date of birth, gender, phone number, fax number, email address, and login date of the user who registered the user are recorded. In addition, the user's credit card number and bank account number are also recorded. The Pocara News contains information about Pocara (relative to friends and relatives) (Figure 31) and the sale of Pocara (Figure 32). The information of relatives and friends of Pokhara includes Pokhara ID, user ID of their friends and relatives of Pokhara dolls, user ID, showing that their Pokhara is a relative or friend of Pokhara or the Pokhara flag of friends and relatives selling Pokhara, It is related to the parameters of Pokhara's costumes, etc. It is used to display the character information of Pokhara when they are in Pokhara. 、 Pocara Infojin- # is also registered with various functions of relatives and friends Pocara. Examples of related information 131 are memorized: mail information, action information, preference information, job information, cache information, search information, etc. E-mail information: I remember the mails that have been delivered to their users so far, or the mails that have been delivered to their users so far. What is recorded in the information: the user's current and past actions, and the user's memo. In addition, the calendar also records information on various events performed by Erla. 2. The url of the homepage where the user bookmarks is stored in the preference information. In the job information, the terminal (hardware) held by the user is registered, and service-related information that can be accepted by pre-registration. In the job information: the user's temporary data. Yes, cached information is registered with relatives and friends Pokhara to analyze the thinking of their users, 84661 -43- 200409005 suggested content collected. 1 recorded in the search information: the search engine and the user instructed to pre-retrieve the information related to the sale of Pokhara. Pokhara Information also registers the current position indicating that the character of relatives and friends Pokhara is actually displayed on the special foot device on the Internet. This can prevent relatives and friends of Pocara from being displayed in two or more places at the same time on a device on the Internet (to achieve the exclusiveness of display). In other words, it is possible to prevent other users from stealing the user's information by using other relatives and friends' Pokhara dolls 161 who are posing as real friends and relatives of Pokhara dolls 161. That is, when the Pokhara service server 9 transmits a Pokhara ID of a relative or friend other than its current location, it performs error processing. As a result, only one of friends and relatives, Pokhara, is displayed on the device on the Internet. In addition, data inconsistency caused by accessing the Pokhara service server 9 from two or more devices at the same time can be prevented. In other words, with one Pocara being able to travel to and from several devices, the user is immediately informed of exclusive access. Pokhara Information also records: content information obtained by its users and license information required to use its content. The content information also includes: the content ID that identifies the content and the access information required to access its content. Records in the license information: identify the license ID of the license, the password key to decode the encrypted content, and the URL of the license server entered when obtaining the license. The Pocara Information (Figure 32) that sells Pocara contains: Pocara ID, relatives and friends Pocara flag, character information, content information, license information and content utilization information.

CpU 121於步騾S93中判定步驟S92中檢索之結果及波卡 84661 -44- 200409005 拉ID是否登錄於波卡拉資料庫1 〇内。波卡拉ID尚未登錄 時,進入步驟S94,CPU 121判定取得之波卡拉①是否為親 友波卡拉之ID。如上所述,該判定可自親友波卡拉旗標進 行。 判定波卡拉ID為親友波卡拉之ID時,進入步騾S95,CPU 121自波卡拉資料庫1 〇讀取波卡拉資訊(圖3 1)。 於步驟S96中,CPU 121自記憶於讀取之波卡拉資訊内之 親友波卡拉的現在位置,判定親友波卡拉之現在位置是否 在波卡拉服務伺服器9内。判定親友波卡拉之現在位置在波 卡拉服務伺服器9内時,進入步驟S103,CPU 121傳輸錯誤 資訊至個人電腦22。 亦即,此時,儘管親友波卡拉之現在位置在波卡拉服務 伺服器9内,由於自其他裝置有依據親友波卡拉人偶161之 存取,所以可能為冒充存取。因此,於此種情況下係進行 錯誤處理。 於步驟S96中,判定親友波卡拉之現在位置不在波卡拉服 務伺服器9内時,進入步驟S97,CPU 121自波卡拉資料庫1〇 讀取公事包資訊。而後,於步驟S98中,CPU 121將讀取之 公事包資訊傳輸至個人電腦22。 於步驟S99中,CPU 121判定是否已接收波卡拉到達資 訊。如上所述,個人電腦22接收公事包資訊時,送來波卡 拉到達資訊(圖12之步驟S47)。步驟S98之處理時,儘管已傳 輸公事包資訊,但是尚未接收波卡拉到達信號時,判斷可 能發生異常狀態。因此進入步驟S103,經由CPU 121將錯誤 84661 -45- 200409005 資訊傳輸至個人電腦22。 反之,於步驟S99中’判斷收到波卡拉到達信號時,則進 入步驟S100, CPU 121將親友波卡拉之現在位置作為在個人 %腦22上’而I錄(更新)於波卡拉資料庫1〇内,亦即,由於 現在親友波卡拉到達個人電腦22,因此將親友波卡拉之現 在位置作為個人電腦22來登錄。 如上所述,個人電腦22之使用者選擇其親友波卡拉之角 色311具有之功能中的一個功能時,其選出之波卡拉之功能 相關資訊自個人電腦22送來(圖13之步騾S52)。 於步驟S101中,波卡拉服務伺服器9之CPU 121判定是否 選擇有親友波卡拉之角色3 11之功能,判定已選擇時,進入 步驟S102,執行對應於其選出功能之處理。藉此,如選出 郵件相關功能時’作為郵件資訊而登錄之資訊傳輸至個人 電腦22。選出行事曆相關功能時,登錄之行事暦相關資訊 傳輸至個人電腦22。 於步驟S101中,判定尚未選擇波卡拉之功能時,跳過步 驟S102之處理’處理回到步驟S91,重複執行其以後之處理。 於步驟S94中’判定取得之波卡拉⑴並非親友波卡拉人偶 161之ID時(判定為販賣波卡拉人偶之m時),進入步騾 S 104 ’ CPU 121通知對應於其販賣波卡拉人偶之伺服器(為 對應於上述之販賣波卡拉人偶181之1〇時,為内容伺服器 6) °如後述’内容伺服器6收到來自波卡拉服務伺服器9之 琢通知時’進一步收到個人電腦22要求傳輸内容資料時, 項取内容資料’並執行傳輸至個人電腦22之處理(後述之圖 84661 -46- 200409005 33之步驟S121至步騾S123)。 另外’波卡拉服務伺服器9亦進行對應於各種内容提供者 或服務提供者提供之内容或服務之販賣波卡拉人偶的相關 管理,如圖32所示,波卡拉資料庫1〇内登錄有:作為顯示 對應於全部販賣波卡拉人偶181之虛擬販賣波卡拉人偶之 角色時所需之波卡拉資訊之波卡拉ID、顯示附隨内容1〇指 定之内容之内容圖像(如内容為特定歌手之樂曲的聲頻資 料時,為樂曲之名稱、歌詞、歌手之影像)時所需之内容圖 像資料(内容利用資訊)、内容資訊等。該内容資訊中,於使 用者迈來其販買波卡拉ID時,包含通知已有來自使用者之 存取之存取目的地(網路上之網址)。cpu i2i對該存取目的 地(通知目的地)進行通知。 其次’於步驟S1〇5中,CPU 121執行收費處理。亦即,該 系統中’使用者將販賣波卡拉人偶181放置於站台23上,接 又特疋服&之&供時’支付此時接受其服務之提供的代價。 具體而言’波卡拉服務飼服器9之CPU 121經由通信部 進人收費伺服器13’要求對其使用者之信用卡號或銀 2戶號碼實施收費處理。收費伺服器邮據該要求執行 特足金額之收費處理。 賣波卡拉人偶181來提高收益 ^卜’該收費處理亦可不對使用者進行,而對販賣販 皮卡拉人偶181之管理者進行。 其次,於步驟S106中,ΓΡΤΤ 191 6、;上tThe CpU 121 determines in step S93 whether the result retrieved in step S92 and Poca 84661 -44- 200409005 are registered in the Pocara database 100. When the Pocara ID has not been registered, the process proceeds to step S94, and the CPU 121 determines whether the acquired Pocara ① is an ID of a relative or friend Pocara. As mentioned above, this determination can be made from the relatives and friends of the Pokhara flag. When it is determined that the Pokhara ID is the ID of a relative and friend Pokhara, it proceeds to step S95, and the CPU 121 reads the Pokhara information from the Pokhara database 10 (Fig. 31). In step S96, the CPU 121 determines whether the current position of the relatives and friends Pokhara is stored in the Pokhara service server 9 from the current position of the relatives and friends Pokhara stored in the read Pokhara information. When it is determined that the current position of the relatives and friends Pokhara is in the Pokhara service server 9, the process proceeds to step S103, and the CPU 121 transmits error information to the personal computer 22. That is, at this time, although the current location of the relatives and friends of Pokhara is in the Pokhara service server 9, since there is access from other devices based on the relatives and friends of the Pokhara figure 161, it may be a fake access. Therefore, error handling is performed in this case. In step S96, when it is determined that the current position of relatives and friends Pokhara is not in the Pokhara service server 9, it proceeds to step S97, and the CPU 121 reads the briefcase information from the Pokhara database 10. Then, in step S98, the CPU 121 transmits the read briefcase information to the personal computer 22. In step S99, the CPU 121 determines whether the Pocara arrival information has been received. As described above, when the personal computer 22 receives briefcase information, it sends Pocara arrival information (step S47 in Fig. 12). During the processing of step S98, although the briefcase information has been transmitted, it is determined that an abnormal state may occur when the Pokhara arrival signal has not been received. Therefore, the process proceeds to step S103, and the error 84661 -45- 200409005 information is transmitted to the personal computer 22 via the CPU 121. Conversely, in step S99, when it is judged that the Pokhara arrival signal is received, it proceeds to step S100, and the CPU 121 sets the current position of the relatives and friends Pokhara as the personal% brain 22 and records (updates) it in the Pokhara database 1 Within 〇, that is, since the relatives and friends of Pokhara have arrived at the personal computer 22, the current position of the relatives and friends of Pokhara is registered as the personal computer 22. As described above, when the user of the personal computer 22 selects one of the functions of the character 311 of his relatives and friends, Pocara, the information about the function of the selected Pocara is sent from the personal computer 22 (step S52 in FIG. 13) . In step S101, the CPU 121 of the Pokhara service server 9 determines whether the function of the role 3 11 of relatives and friends Pokhara is selected. When it is determined that it has been selected, it proceeds to step S102 to execute processing corresponding to its selected function. With this, if the mail-related function is selected, information registered as mail information is transmitted to the personal computer 22. When the calendar-related function is selected, the registered calendar / related information is transmitted to the personal computer 22. When it is determined in step S101 that the function of Pokhara has not been selected, the process of step S102 is skipped and the process returns to step S91, and the subsequent processes are repeatedly executed. In step S94, when it is determined that the obtained Pokhara ⑴ is not the ID of a relative or friend Pokhara Doll 161 (when it is determined that the Pokhara doll is sold m), the process proceeds to Step S 104 ′ The CPU 121 notifies the person corresponding to the Pokhara sold. Even server (corresponding to the above 10 hours of selling Pokhara doll 181, content server 6) ° As described later, "When content server 6 receives notification from Pokhara service server 9," further When receiving the personal computer 22's request for transmission of the content data, the content data is retrieved and the processing for transmitting to the personal computer 22 is executed (step S121 to step S123 of the following figure 84661 -46- 200409005 33). In addition, the 'Pokhara service server 9 also performs related management of the sale of Pokhara dolls corresponding to the contents or services provided by various content providers or service providers. As shown in FIG. 32, the Pokhara database 10 is registered in : The Pocara ID, which displays the Pocara information required for the virtual sale of the characters of Pocara puppets corresponding to all of the Pocara puppets 181 sold, displays the content image of the content specified in the accompanying content 10 (if the content is When the audio data of a particular singer's music is the name of the music, the lyrics, and the image of the singer, the content image data (content use information), content information, etc. are required. In this content information, when the user comes to buy a Pocara ID, it includes an access destination (a web address on the Internet) informing that access has been received from the user. The CPU i2i notifies the access destination (notification destination). Next 'In step S105, the CPU 121 executes charging processing. That is, in the system, the 'user puts the sold pokhara doll 181 on the platform 23, and then specially serves & of & time' to pay the price for accepting the provision of his service at this time. Specifically, the CPU 121 of the 'Pokhara service feeder 9 enters the charging server 13 via the communication department, and requests charging processing to its user's credit card number or bank account number. The charging server will perform the charging processing of the full amount according to the request. Selling Pokhara Dolls 181 to increase revenue ^ [b] The charging process may not be performed on users, but may be performed on the manager of the Pakala Dolls 181. Next, in step S106, ΓΡΤΤ 191 6;

CpU 121自波卡拉資料庫1〇讀取 84661 -47- 200409005 買波卡拉之公事包資訊(圖18),於步驟S1〇7中,將其公事包 資訊傳輸至個人電腦22。 步驟S107之處理後,處理回到步驟S9卜重複執行其以後 之處理。 另外’如販買波卡拉人偶181為占卜相關之波卡拉人偶 時’而其占卜内容之資料量並不多時,圖丨8之公事包資訊 内’亦保存有占卜之内容資料,於叫出波卡拉時,亦可與 波卡拉之角色同時顯示其内容之資料。 _ 於步驟S108中,CPU 121判定收到波卡拉之履歷時,進入 步驟S1 〇 9,並執行將波卡拉之履歷登錄(更新)於波卡拉資料 庫10内之處理。而後,處理回到步驟S91,重複執行其以後 之處理。 如此,如圖13之步驟S55之處理,自個人電腦22送來波卡 拉之履歷時,係依據其履歷更新波卡拉資料庫丨〇。 於步騾S110中,判定自内容伺服器6收到要求結算(後述 之圖33之步驟S125之處理)時,進入步驟Si丨丨,12ι對 _ 内容伺服器6要求之使用者進行結算處理。具體而言,cpu 121就登錄於波卡拉資料庫1〇之使用者資訊(圖30)之其使用 者之信用卡號或銀行帳戶號碼,調查過去是否存在無法結 算夂情事。而後,於步驟S112中,CPU 121將其調查結果(結 ‘ · 算結果)通知内容伺服器6。 . 而後,處理回到步驟S9丨,重複執行其以後之處理。 其次,參照圖33之流程圖,說明使用者將販賣波卡拉人 偶181放置於站台23上,接受内容提供時之内容伺服器㈣ 84661 -48- 200409005 處理。 内容伺服器6之CPU 121於步驟S121中,判定是否經由通 #邵129,自波卡拉服務伺服器9收到有來自個人電腦22之 存取通知(圖28之步驟S104中傳輸之通知)。判定自波卡拉服 務伺服器9收到通知時,進入步驟S124,cpu 121判定是否 自個人電腦22收到預付金額(或最大可使用次數)之更新要 求(圖16之步驟S74)。CPU 121判定尚未收到預付金額(或最 大可使用次數)之更新要求時,結束處理。 步驟S121中,CPU 121判定已自波卡拉服務伺服器9收到 通知時,進入步驟s 122,判定是否收到來自記述於其通知 <個人電腦22之内容資料的傳輸要求(圖14之步驟S62)。收 到來自個人電腦22之内容資料之傳輸要求時,進入步驟 S123,CPU 121讀取記憶於記憶部128内經密碼化之内容資 料’並自通#部129傳輸至個人電腦22。 另外,該内容資料亦可以預先密碼化之狀態記憶於記憶 部128内,不過,亦可於傳輸時予以密碼化。 步驟S121中取得之來自波卡拉服務伺服器9之通知,須包 ^指定内容之資訊。該資訊亦可為内容m,不過内容與販 賣波卡拉人偶181為一對一地對應時,亦可為波卡拉出。 、,万;步.¾ S122中’判足尚未收到來自個人電腦之内容資 料的傳輸要求時,跳過步驟S123的處理。 亦即,即使自波卡拉服務伺服器9收到通知,然而,記述 於其通知之個人電腦22之# γ 土 φ丄、 包物便用者並未要求傳輸内容資料 時’不進行内容資料的傳輸。 84661 -49- 200409005 於步驟S124中,判定自個人電腦22收到預付金額(或最大 可使用次數)之更新要求時,進入步驟S125,CPU 121對波 卡拉服務伺服器9要求結算。波卡拉服務伺服器9依據該要 求’對利用販賣波卡拉人偶181之使用者進行結算處理,並 將其結算結果通知内容伺服器6(上述圖29之步騾S111, S112) 〇 於步驟S126中,内容伺服器6之CPU 121依據步驟S125之 要求及自波卡拉服務伺服器9送來之通知,判定結算是否 OK。結算〇κ時,進入步驟S127,CPU 121對個人電腦22傳 輸更新預付金額(或最大可使用次數)用之更新資料。如上所 述,個人電腦22依據該更新資料更新販賣波卡拉人偶181之 1C晶片191之預付金額(或最大可使用次數)(圖16之步驟 S76)。藉此,使用者可再度利用内容。 於步騾S126中,來自波卡拉服務伺服器9之通知表示結算 並非OK時,進入步驟S128,CPU 121執行錯誤處理。亦即, 此時CPU 121對個人電腦22輸出無法提供内容之訊息。使用 者藉此可瞭解無法更新預付金額(或最大可使用次數)。該訊 息於圖16之步騾S76中,顯示於個人電腦22上。 其次,說明於站台23上放置親友波卡拉人偶161,使用者 自内容伺服器7取得内容,自許可證伺服器8取得使用其内 容時所需之許可證之處理。該處理係執行對應於圖13之步 驟S52中選出之功能的一個處理。亦即,該處理係於使用者 自親友波卡拉之角色3 11具有之功能中選擇内容取得處理 之功能時開始。 84661 -50- 200409005 於步驟S131中,個人電腦22之CPU 221進入内容伺服器7 内’要求傳輸内容。使用者依需要檢查進入之網址。 如後述,内容伺服器7對進來之個人電腦22附加内容10與 許可證ID,並傳輸内容資料(後述之圖35之步驟S142)。因 而’於步驟S132中,個人電腦22之CPU 221自内容伺服器7, 接收經由網際網路1送來之内容資料時,於步驟S133中,將 其内容資料供給並記憶於記憶部228内。 其次,於步驟S134中,CPU 221將識別目前取得之内容之 内容ID ;存取記憶之内容資料用之存取資訊(為自記憶部 228讀取内容資料所需之資訊);及對目前取得之内容發行 許可證之許可證伺服器(為圖丨之系統時,係許可證伺服器 8)之網路上之網址(該網址自内容伺服器7附隨於内容資料 送來)傳輸至波卡拉服務伺服器9。 内容伺服器7對應於個人電腦22之此種存取,執行圖35之 流程圖所示的處理。 亦即,於步驟S141中,内容伺服器7之CPU 121自個人電 月每22接受存取時,於步驟s丨42中,讀取記憶於記憶部128之 内容資料,並傳輸至個人電腦22。此時,Cpu 121同時傳輸 内容1D與識別使用其内容時所需之許可證之許可證ID。另 外’該内容資料亦予以密碼化。 此外’波卡拉服務伺服器9對應於個人電腦22之圖34之步 驟S134之處理,執行圖36之流程圖所示的處理。 首先’於步驟S151中,波卡拉服務伺服器9之CPU 121接 收個人電腦22於步驟S134處理時傳輸之内容ID、存取資 84661 -51 - 200409005 、’、午了從词服态之網址。於步驟S152中,CPU 121對廡 \起迗來之親友波卡拉ID,將步驟S151處理時收到之内 容1D、存取資訊與許可證伺服器之網址記憶於波卡拉資料 庫10内。 ' 八人於步驟si 53中,CPU 121執行對應於使用者取得内 备處理爻收費處理。亦即,要求收費伺服器13結算内容代 饧卩刀之金額。收費伺服器13依據該要求,對使用者執行 收費處理。 另外,對該内容之提供的收費處理,係於提供許可證時 進行收費,因此亦可省略。不對内容之提供收費,而係於 挺供許可證時進行收費,使用者無須擔心金額,可於任何 終數次接收並記憶内容。如此即可有效分發内容。 此外,藉由於希望重現之裝置内預先記憶内容,即使裝 置連接之線路的容量小,仍可以其裝置利用高品質之内容。 使用者如此僅取得内容時,尚不能利用内容。亦即,利 用内容時’須進一步取得利用内容所需之許可證。因而, 個人電腦22為求取得許可證,而執行圖37之流程圖所示的 處理。 該處理亦執行對應於圖13之步驟S52選出之功能的一個 處理。 於步驟S171中,個人電腦22之CPU 221進入波卡拉服務伺 服器9内。於步驟3172中,cpu 221於波卡拉服務伺服器9 内要求取得對應於内容ID之許可證。該内容ID係包含於圖 34之步驟S132處理時收到之内容資料内者。 84661 -52- 200409005 如此,要求取得許可證時,如後述地,波卡拉服務伺服 器9進入許可證伺服器取得許可證。而後,於取得許可證 時’通知個人電腦22取得許可證(後述之圖38之步驟以94, S195)。 因而,於步驟S173中,CPU221接收自波卡拉服務伺服器 9¾來义許可證取得通知。cpu221將該通知結果輸出至輸 出卩227之顯示邵上使其顯示。藉此,使用者可瞭解已取得 許可證。 其次,參照圖38之流程圖說明對應於圖37之個人電腦22 之汴可澄取得處理而執行之波卡拉服務伺服器9之處理。 於步驟S191中,波卡拉服務伺服器9之cpu 121自個人電 腦22接收許可證取得處理之要求(圖37之步驟§172處理時 所輸出之要求)。於步驟S192中,CPU 121判定使用者有無 内容。使用者取得内容時,於波卡拉資料庫1〇内記憶有存 取其内容用之存取資訊(圖36之步驟S152)。因而,cpu ΐ2ι 依據該存取資訊,可判定使用者有無内容。 \步驟S192中,判定使用者取得内容時,進入步驟$ 1 %, 21進入對應於内各id之许可證伺服器,要求對使用者 發仃許可證。圖36之步騾S152的處理中,使用者已取得内 容時,為了利用其内容,許可證伺服器之網址亦登錄於波 卡拉資料庫10内。此外,亦登錄有發行其許可證 伺服器的網址。 〜 许可證伺服器8於波卡拉服務伺服器9要求發行許可誇 時,發行許可證,並傳輸至波卡拉服務伺服器9(後述圖% 84661 -53- 200409005 之步驟S212)。 、因而,於步驟S194中,CPU 121將自許可證伺服器8送來 《密碼鍵(將密碼化之内容予以解碼用之鍵)與許可證10, 對應於親友波卡拉ID與内容m,而記憶於波卡拉資料庫⑺ 内。 其次,於步驟S195中,CPU121通知使用者(個人電腦22) 已取得許可證。 而後,於步驟S196中,CPU 121執行對應於許可證取得處 理之收費處理。亦即’ CPU121要求收f伺服器13進行對應 於許可證之代價的結算。收費伺服器13依據該要求執行結 鼻處理。 於步蘇S192中,判定使用者無内容時,進入步驟$ 1, 並執行錯誤處理。亦即,由於此時使用者並無内容,因此 操須取得許可證。因而執行錯誤處理。具體而言,cPU 121 係對個人電腦22傳輸錯誤訊息。此時,個人電腦22於步驟 S173中,係接收錯誤訊息,而非許可證取得之通知。 許可證伺服器8對應於來自波卡拉服務伺服器9之存取, 執行圖39之流程圖所示之處理。 於步驟S211中,許可證伺服器8之CPU 121判定是否收到 來自波卡拉服務伺服器9之許可證發行之要求,於判定收到 許可證發行之要求時,進入步驟S212,自記憶部128讀取對 應於要求所含之内容ID之許可證(將密碼化之内容予以解 碼用之密碼鍵與許可證ID),並傳輸至波卡拉服務伺服器9。 於步驟S211中,判定未收到來自波卡拉服務伺服器9之許 84661 -54- 200409005 可證發行之要求時,不執行步驟S212之處理。 如以上所述,使用者取得内容與許可證時,即可使用(重 現)内容。 其次’參照圖40之流程圖說明此時之處理。 此時之處理,使用者亦將親友波卡拉人偶161放置於站台 23上,於選擇一個功能時,執行對應於圖13之步驟S52選出 之功能的一個處理。 於步驟S231中,個人電腦22之cpu221進入波卡拉服務伺 服器9。於步驟S232中,cpu221對波卡拉服務伺服器9指定 、 要求重現内容。波卡拉服務飼服器9依據該要求, 於使用者取得内容與許可證時,進入保持有内容資料之存 耳目的地,取得内容資料。本例時,由於個人電腦22内保 持有内谷資料,因此係自波卡拉服務伺服器9要求個人電腦 22傳輸内容資料(後述圖41之步驟S27)。於步驟S233中,接 收該要求時,CPU221讀取指定之存取目的地之内容資料, 並傳輸至波卡拉服務伺服器9。 皮卡“服務伺服咨9使用密碼鍵,將接收之經過密碼化之 内谷資料予以解碼,並傳輸解碼後之内容資料(後述之圖Μ 之步驟S275、步驟S276)。 Q而,於步驟S234中,CPU 221接收自波卡拉服務伺服器 9运來 < 内容資料。如上所述,該内容資料已經過解碼。因 個人%驷22無須保持密碼鍵,且無須依據其密碼鍵進 仃解碼處理。因而,即使如行動電話、pDA(個人數位助理) 等而要著重攜帶性,而執行複雜處理困難之攜帶式機器, 84661 -55- 200409005 仍可輕易重現内容。 於步驟S235中,CPU 221自輸出部227之顯示部與揚聲器 幸則出步驟S234處理時所接收之内容。藉此,使用者可收視 内容。 其次,於步驟S236中,CPU 221執行預付金額之扣款處 理。該處理係對親友波卡拉人偶161之1€晶片丨71執行與上 述販賣波卡拉人偶181之1C晶片191時相同的處理。 晶片171内尚未記憶預付金額時,該處理省略。 於步驟S237中,CPU 221將包含已扣款之預付金額與重現 次數之履歷傳輸至波卡拉服務伺服器9。波卡拉服務伺服器 9依據該履歷更新波卡拉資料庫丨〇(上述圖29之步驟s丨〇9)。 波卡拉服務伺服器9對應於個人電腦22執行圖40所示流 程圖之處理,而執行圖41之流程圖所示之處理,作為對應 於圖28之步驟S102選出之波卡拉功能的一個處理。 於步驟S271中,波卡拉服務伺服器9之cpu 121於收到個 人電腦22要求内容重現(包含内容⑴)前待用,收到時,於步 驟S272中,判定傳輸要求之使用者是否取得對應於内容ι〇 <許可證。該判定可自對應於自個人電腦22送來之要求内 所含之内容ID,許可證ID是否登錄於波卡拉資料庫1〇内來 判定。當然,此時波卡拉ID與使用者1〇之至少一方在圖以 之步驟S43的處理時,自個人電腦22傳輸,並於圖以之步驟 S 91之處理時,已被波卡拉服務伺服器9接收。 使用者取得對應於内容ID之許可證時,進入步驟幻73, CPU 121於步驟S273中,依據存取資訊進入保持内容資料之 84661 -56- 200409005 來源。如參照圖34之說明,利用親友波卡拉取得内容資料, 而於内藏之記憶部内記錄其内容資料時,其裝置(此時為個 人電腦22)係將存取其内容資料用之存取資訊傳輸至波卡 拉服務伺服器9(圖34之步驟S 134),波卡拉服務伺服器9將該 存取資訊登錄於波卡拉資料庫10内(圖36之步驟S152)。因 此,CPU 121可依據該存取資訊取得内容資料。具體而言, 此時CPU 121係進入個人電腦22,要求讀取記憶於記憶部 228内之内容資料。 個人電腦2 2依據該要求,自波卡拉服務飼服器9所指定之 位置(存取目的地資訊指定之記憶部228)讀取並傳輸内容資 料(圖40之步驟S233)。因而,CPU 121於步驟S274中,係接 收自保持内容資料之裝置送來之内容資料。此時,CPU 121 接收自個人電腦22送來之内容資料(當然,若内容資料保持 於存取之個人電腦22以外之裝置内時,係進入其裝置接收 内容資料)。 於步驟S275中,CPU 121使用密碼鍵,將自個人電腦22 送來之内容資料予以解碼。取得該密碼鍵係作為重現其内 容所需的一個許可證,並記憶於波卡拉資料庫10内(圖38之 步驟S194)。 其次,於步驟S276中,CPU 121將步驟S275處理時解碼之 内容傳輸至進來之個人電腦22(親友波卡拉之角色3 11位於 現在位置之裝置)。如上所述,該内容資料在個人電腦22中 接收、輸出(圖40之步驟S234, S235)。 如此,若使密碼键記憶於波卡拉服務伺服器9内,密碼鍵 84661 -57- 200409005 則無須輸出至外邵’因此減少密碼键遭盜取的可能性。因 而,密碼化之内容解讀困難,安全性提高。 而後,於内容重現結束時,自個人電腦22傳輸履歷資訊 (圖40之步騾S237)。因而,於步騾S278中,cpu 128接收自 個人電腦22送來之履歷,並依據其履歷更新波卡拉資料庫 資訊。孩履歷中包含内容之重現次數、扣款後之預付 金額等。 於步驟S272中,判定送來要求之使用者尚未取得對内容 ID之許可證時,進入步驟S278,cpu 121執行錯誤處理(亦 即,此時錯誤訊息傳輸至個人電腦22)。個人電腦22於步騾 S234中,接收该錯误汛息,而非接收内容,並將其輸出、 顯示於輸出部227上。 另外,以上為波卡拉服務伺服器9將經過密碼化之内容資 料予以解碼,不過,亦可自波卡拉服務伺服器9傳輸鍵至個 人黾知2 2 ’並於個人電腦2 2中將内容資料予以解碼。 如此,可經由發揮使用者代理人功能之親友波卡拉,自 内容伺服器自由地下載密碼化内容,此外,可經由親友波 卡拉自由地複製其密碼化内容。進行複製時,其儲存位置 登錄於波卡拉資料庫10内。親友波卡拉於指示重現時二參 照登錄於波卡拉資料庫10内之儲存位置,提供其内容至使 用者。因此,使用者可收視其内#’進—步複製於其他裝 置,以資料流重現。但是,於重現時,始終需要親友波卡 拉。 另外,於内容複製及重現時,藉由以不同鍵將内容予以 84661 -58 - 200409005 =碼化,即使鍵遭盜取,仍可將其損害抑制在最小限度。 藉此可提高安全性。 對波卡拉服務伺服器9之登入,除將親友波卡拉人偶161 放置於站台上之外,亦可藉由輸入分配給使用者之id與密 碼來執行。以致第三者可能盜取山與密碼,冒充真正使用 者對波卡拉服務伺服器9存取。此種情況下,真正使用者(保 持親友波卡拉人偶161之使用者)利用親友波卡拉人偶161 自網路上之特定位置對波卡拉服務伺服器9登入時,波卡拉 服務伺服器9對以後登入之使用者,僅顯示親友波卡拉人偶 161之角色的黑影(Silhouette),此時,讓使用者知道親友波 卡拉之角色被其他裝置使用中。亦即,使用者可立即瞭解 對波卡拉服務伺服器9之存取係排他性者。 因而,利用親友波卡拉之内容重現,亦僅能在網路上之 一台裝置上進行,即使使用者未意識DRM(數位權管理), 仍可保護内容的著作權。 親友波卡拉人偶161之ic晶片m内記憶有預付金额(或 重現次數),每次重現内容,即扣除其預付金額(或重現次 數),其次,於預付金額(或重現次數)為0時,使用者以後無 法重現(使用)内容《因而,此時使用者藉由進一步追加支付 特定金額,即可再度重現内容。此時之處理,參照圖42與 圖4 3之流程圖來說明。 圖42之流程圖的處理,係將親友波卡拉人偶161放置於站 台23上,執行對應於選擇一個功能時,圖13之步驟S52選出 之功能的一個處理。 84661 -59- 200409005 於步驟S301中,個人電腦22之CPU 221對波卡拉服務伺服 器9要求更新預付金額(或最大可使用次數)。波卡拉服務伺 服器9依據該要求,進行對應於預付金額(或最大可使用次 數)之收費處理後,將預付金額(或最大可使用次數)傳輪至 個人電腦22(後述之圖43之步驟S322至步驟S326)。因而,於 步驟S302中,CPU 221接收自波卡拉服務伺服器9送來之預 付金額(或最大可使用次數)。於步驟S3〇3中,Cpu 221經由 謂寫器241將接收之預付金額(或最大可使用次數)加進記憶 於1C晶片171之預付金額(或最大可使用次數)内。 如此,爾後使用者可再度於預付金額(或最大可使用次數) 的範圍内,再度重現内容。 波卡拉服務伺服器9對應於圖42之流程圖所示之個人電 腦22之處理’係執行圖43之流程圖所示之處理。 亦即,該處理係執行對應於圖28之步驟S102選出之波卡 拉之功能的一個處理。 於步驟S321中,波卡拉服務伺服器9之cpu 121於自個人 電腦22收到要求更新預付金額(或最大可使用次數)之前待 用,收到時,於步驟S322中’判定送來要求之使用者(對應 於親友波卡拉之角色311之使用者)是否使用信用卡。該判 定可自登錄於波卡拉資料庫10内之使用者資訊作判定。 使用者具有信用卡時,進入步驟S323,cpu 121自使用者 之要求抽出預付金額(或最大可使用次數)。於步驟幻乃中, CPU 121判定對應於步驟S323之處理時抽出之預付金額(或 最大可使用次數)之金額是否為可結算之金額。亦即,此時 84661 -60- 200409005 判疋疋否為藉由信用卡可結算之金額。超過預先設定基準 金額之金額時,判定為無法結算。 對應於預付金額之金額為可結算之金額時,進入步驟 S325 CPU 121執行對其金額之結算處理。亦即,此時,cpu 121要求收費伺服器丨3執行對應於預付金額之收費處理。收 費飼服器13對應於該要求,依據其使用者之信用卡號執行 預付金額之扣款處理。 當然,除信用卡之外,此種處理亦可執行自銀行帳戶之 扣款處理。 於步驟S326中,CPU121將預付金額(或最大可使用次數) 傳輸至個人電腦22。如上所述,個人電腦22接收時,更新 親友波卡拉人偶161之1C晶片171的預付金額(或最大可使 用次數)(圖42之步驟S303)。 其次,進入步驟S327’CPU 121更新使用者之履歷。亦即, 使用者此時保持之預付金額(或最大可使用次數)登錄於波 卡拉資料庫10内。 於步驟S322中,判定使用者無信用卡時,或於步驟S324 中,判定預付金額並非可結算金額時,進入步驟S328,cpu 128執行錯誤處理。亦即,此時CPu m係將無法更新預付 金額之内容的訊息傳輸至個人電腦22。 個人電腦22於圖42之步驟幻02中,接收該訊息,而非預 付金額。因而,該信息顯示於輸出部227之顯示部上。藉此, 使用者可瞭解無法更新預付金額。 另外,增加(更新)此種預付金額之處理,亦可對記憶於販 84661 •61 · 200409005 賣波卡拉人偶181之1C晶片191内之預付金額進行。 進行記憶於販賣波卡拉人偶181之1(::晶片191内之預付金 額之更新處理時,亦可自親友波卡拉進帳。如此,由於收 費結算與親友波卡拉一體化,因此較為便利。 此時,如使用者藉由將親友波卡拉人偶161放置於站台23 上,進入波卡拉服務伺服器9。而後,波卡拉服務伺服器9 顯示選單後,自其選單中,如選擇「販賣波卡拉人偶進帳(購 男折價券)」之項目。進行該選擇時,波卡拉服務伺服器9 如使「請將希望進帳之波卡拉人偶放置於站台上」之訊息 顯示於個人電腦22上。使用者按照該訊息,取下放置於站 台上之親友波卡拉人偶161,改放販賣波卡拉人偶181。但 是’此時,波卡拉服務伺服器9使自對應之裝置之存取(連 接)在此種情況下繼續。 波卡拉服務伺服器9(或内容伺服器6)對販賣波卡拉人偶 181之1C晶片191進行預付金額之更新處理後,再度如使「請 將親友波卡拉人偶放置於站台上」之訊息顯示於個人電腦 22上。使用者按照該訊息將親友波卡拉人偶161放置於站台 23上時,波卡拉服務伺服器9依據親友波卡拉人偶161,執 行對應於對販賣波卡拉人偶181之1C晶片191進行之預付金 額之更新處理的收費處理。 或是,於無法藉由販賣波卡拉人偶181重現内容時,波卡 拉服務伺服器9使「是否要進帳(購買折價券)」之訊息顯示 於個人電腦22上,操作「OK」按鈕時,進一步顯示促使替 換成親友波卡拉人偶161之操作的訊息,親友波卡拉人偶 84661 -62- 200409005 161取代販賣波卡拉人偶181放置於站台23上時,執行收費 處理。而後,再度顯示促使販賣波卡拉人偶181取代親友波 卡拉人偶161放置於站台23上之操作的訊息。使用者按照該 訊息將販買波卡拉人偶181放置於站台2 3上。此時執行預付 金額之更新處理,形成可再度重現内容之狀態。 其次’參照圖44之流程圖,說明利用親友波卡拉,將保 存於特定終端之内容,在其終端重現的其他處理例。 另外,内容如係藉由上述圖34之流程圖所示之處理,已 ?己憶於作為終端之個人電腦22之記憶部228内。 於步驟S401中,個人電腦22之CPU 221使保存之内容之標 題(名稱)顯示於構成輸出部227之顯示部上。使用者藉由操 作輸入部226,自顯示之標題中指定特定之内容作為重現對 象。因而,CPU221於步驟S402中,依據輸入部226之輸入, 選擇使用者指定之内容。 於步驟S403中,CPU 221控制通信部229,使步驟S402之 處理時選出之内容的内容ID傳輸至波卡拉服務伺服器9。如 參照圖45而後述者,波卡拉服務伺服器9對應於該内容⑴傳 輸錯誤資訊(步驟S425)或密碼鍵(步驟S424)。 、,Q而,於步驟S4〇4中,CPU 221判定是否收到錯誤資訊, 、足收到錯误資訊時,進入步驟S4〇9,並執行錯誤處理。 反之’判定未收到錯誤資訊時,進入步驟S4〇5,Cpu 22 J 依據使用者之輸入,取得收費處理時所需之收費資訊,並 將收費資訊傳輸至波卡拉服務伺服器9。 、步% S406中,CPU 221接收波卡拉服務伺服器9送來之 84661 -63- 200409005 密碼鍵(於步驟S424處理時所傳輸之密碼鍵)。於步驟S407 中,CPU 221使用步驟S406處理時收到之密碼鍵,將步驟 S402處理時選出之内容(經過密碼化)予以解碼。於步驟S408 中,CPU 221自輸出部227輸出步騾S407處理時解碼之内容。 波卡拉服務伺服器9對應於圖44之以上處理,而執行圖45 之流程圖所示的處理。 於步騾S421中,波卡拉服務伺服器9之CPU 121接收自個 人電腦22送來(於步騾S403處理時傳輸)之内容ID。於步驟 S422中,CPU 121判定使用者是否取得對應於在步驟S421 收到之内容ID的許可證。如參照圖31之說明,親友波卡拉 之波卡拉資訊登錄有作為内容資訊之内容ID,或作為許可 證資訊之許可證ID。CPU 121依據圖31之波卡拉資訊來判定 是否對應於收到之内容ID登錄有許可證ID。 於步驟S422中,判定已取得對應於内容ID之許可證時, 進入步騾S423,CPU 121接收個人電腦22於步騾S405處理時 送來之收費資訊,並進行收費處理。於步驟S424中,CPU 121 讀取對應於許可證ID之密碼键,並傳輸至重現終端(此時為 個人電腦22)。該密碼鍵如上所述,於個人電腦22中,係在 步驟S406中接收。 於步·驟S422中,判定尚未對應於内容ID取得許可證時, 進入步驟S425,CPU 121執行錯誤處理。而後,CPU 121將 錯誤訊息傳輸至個人電腦22。 其次,參照圖46之流程圖說明未保存内容之終端重現内 容時之處理。 84661 -64- 200409005 另外’此時,如於個人電腦26内登錄有内容,個人電腦 22係重現該内容者。 於步驟S441中,個人電腦22之CPU 221進入波卡拉服務伺 服咨9 ’接收登錄於波卡拉資料庫1 〇内之各内容的存取資 訊。如上所述,波卡拉資料庫1 〇内登錄有作為内容之存取 目的地(保持内容之裝置)之存取資訊,CPU 221自波卡拉服 務伺服器9接收該資訊。 於步驟S442中,CPU 221依據收到之存取資訊,將密碼化 <内容與保持其之終端的列表顯示於輸出部227上。使用者 藉由操作輸入部226,自顯示之内容中選擇特定内容。因而 於步驟S443中,CPU 221依據自輸入部226之輸入選擇内 谷’並自選出之内容的存取資訊決定存取目的地。 於步驟S444中,CPU 221控制通信部229,對步驟S443處 理時決足之存取目的地執行直接連接處理。此時,個人電 月自22之CPU 221係進入儲存内容之個人電腦26内。 於步驟S445中,CPU 221對波卡拉服務伺服器9傳輸於步 •‘S443中所決定(選擇)之内容的内容m。波卡拉服務伺服器 9如後述’送來對應於内容ID之密碼键(後述之圖48之步驟 S493) 〇 因而’於步驟S446中,CPU 221接收自波卡拉服務伺服器 9送來之始、碼鍵。於步驟8447中,Cpu 221傳輸内容ID至内 谷提供終端(此時為個人電腦26)。 於步HS448中’ CPU 221判定是否保存内容,該判定係依 據自使用者之輸入來進行。 84661 -65- 200409005 於保存内容時,進入步驟S449,CPU 221接收自個人電腦 26送來之經過密碼化之内容時,將其保存於記憶部228内。 於步驟S450中,CPU 221將存取資訊之更新資訊傳輸至波 卡拉服務伺服器9。亦即,此時内容係自個人電腦26轉送至 個人電腦22,因此,以後對其内容之存取目的地成為個人 電腦22(保持其内容之終端為個人電腦22),存取目的地傳輸 至波卡拉服務伺服器9。 於步騾S451中,0卩1;221使用步驟8446處理時收到之密碼 鍵,將記憶於記憶部228之經過密碼化之内容予以解碼、重 現。重現輸出係自輸出部227輸出。 於步驟S448中,判定未保存内容時,於步騾S452中,CPU 221使用密碼键,將内容予以解碼,並自輸出部227資料流 重現。 對應於以上圖46之流程圖所示之個人電腦22的處理,對 個人電腦22提供内容之個人電腦26係執行圖47之流程圖所 7F的處理。 首先,於步驟S471中,個人電腦26之CPU 221啟動波卡拉 精靈。於步驟S472中,波卡拉精靈於自其他終端接收存取 前待用,自其他終端收到存取時(此時,係自個人電腦22收 到存取時)進入步驟S473,並自重現終端接收内容ID。此 時,係接收步騾S447處理時,個人電腦22傳輸之内容ID。 於步驟S474中,個人電腦26之CPU 221對連接來源傳輸密碼 化内容。此時,傳輸密碼化内容至個人電腦22。 如上所述,該密碼化内容於個人電腦22中,係於步驟S449 84661 -66- 200409005 時保存,或是於步驟S452中予以解碼後資料流重現。 參照圖48說明對應於圖46之個人電腦22處理而執行之波 卡拉服務伺服器9之處理。 波卡拉服務伺服器9之CPU 121於步騾S491中,傳輸存取 資訊至重現終端。亦即,CPU 121讀取登錄於波卡拉資料庫 10内之存取資訊,並將其傳輸至個人電腦22。個人電腦22 如上所述,在步驟S441之處理時接收該存取資訊。 於步驟S492中,波卡拉服務伺服器9之CPU 121自重現終 端(此時為個人電腦22)接收内容ID。該内容ID係在圖46之步 騾S445處理時,自個人電腦22傳輸者。 於步驟S493中,CPU 121自重現終端接收存取資訊之更新 資訊。該更新資訊係於圖46之步驟S450中,自個人電腦22 傳輸者。 於步驟S495中,CPU 121將步驟S494處理時接收之存取資 訊登錄(更新)於波卡拉資料庫10内。如此,由於内容移動, 因此先前個人電腦26作為存取目的地所登錄之内容之存取 目的地變更成個人電腦22。 其次,參照圖49之流程圖,說明將密碼化内容複製於其 他裝置之處理。如將個人電腦26保持之内容複製於個人電 腦52 〇 於步驟S511中,個人電腦22之CPU 221自波卡拉服務伺服 器9接收存取資訊。於步騾S512中,CPU 221依據步驟S511 處理時接收之存取資訊,將密碼化内容及保存其之終端的 列表輸出並顯示於輸出部227上。 84661 -67- 200409005 使用者觀察該顯示,並藉由操作輸入部226來指定複製源 頭與複製目的地。 因而,於步驟S5 13中,CPU 221依據自輸入部226之輸入, 選擇複製之密碼化内容,並且分別選擇個人電腦26作為複 製源頭’選擇個人電腦52作為複製目的地。於步騾3514中, CPU 221通知複製至複製源頭或複製目的地。此時,複製源 頭為個人電腦26,複製目的地為個人電腦52,因此分別對 其進行複製通知。 依據該通知,如參照圖5〇與圖51之流程圖而後述者,自 複製源頭轉送、複製内容至複製目的地。 於步驟S515中,個人電腦22之cpu221依據自複製源頭或 複製目的地之通知,判定複製是否正常結束。正常結束時, 進入步驟S5 16,CPU 221更新存取資訊。亦即,此時,由於 内容被儲存於兩者,因此,存取目的地係登錄個人電腦% 與個人電腦52兩者。 於步驟S515中,判定複製並未正常結束時,進入步驟 S5 17,CPU 221執行錯誤處理。 其久,參照圖50之流程圖說明複製源頭之處理。此時, 孩處理係藉由個人電腦26來執行。 於步驟S531中,個人電腦自個人電腦22接收 步馭S5 14處理時發行之複製通知(複製要求)。於步騾Μ” :,個人電腦26之CPU 221讀取記憶於記憶部228内之内 万、步I S533中,使其内容自通信部229傳輸至個人電腦 A於傳輸正常結束時,cpU22l將其内容通知個人電腦仏 84661 •68- 200409005 圖51顯示對應於複製源頭之處理而執行之複製目的地之 處理。此時,Μ複製目的地之處理係藉由個人電腦52來執 行。 個人私腦52於步驟S551中,接收個人電腦22在步驟S514 處理時發行之複製通知(複製要求)。於步驟§552中,個人電 腦52之CPU 221接收複製源頭之個人電腦%在步驟幻3之處 理時傳輻之内各。於步驟S563中,個人電腦52之cpu 221 將步驟S552處理時收到之内容記錄於記憶部228内。於接收 正常結束時,CPU 221將其内容通知個人電腦22。 以上,係使用者在連接於房間3丨之個人電腦22的站台 上放置親友波卡拉人偶161或販賣波卡拉人偶丨81,來執行 各種處理,不過使用者亦可在連接於希望使用之機器的站 台上放置波卡拉人偶。如對應於親友波卡拉之角色3丨丨而附 加控制電視收訊機之功能時,使用者可藉由將親友波卡拉 人偶161放置在連接於配置在房間32之電視收訊機24之站 台25上,來控制電視收訊機24。 此外’如亦可在站台23上放置親友波卡拉人偶161,而將 ?己錄於個人電腦22中之内容,於房間33内使用。此時,使 用者係在連接於房間33之個人電腦26之站台27上放置親友 波卡拉人偶161。此時,自個人電腦26收到存取之波卡拉服 務伺服器9讀取記錄於個人電腦22之内容資料,予以解碼後 傳輸至個人電腦26。因此,使用者可在任意位置(連接於希 望使用之機器之站台上放置親友波卡拉人偶161)使用内 容。 84661 -69- 200409005 如使用者將親友波卡拉人偶161攜往職場5,放置在連接 於配置於職場5之個人電腦52之站台53上,個人電腦52自 LAN 5 1經由ISP 4連接於網際網路1,自網際網路丨進一步連 接於波卡拉服務伺服器9。因此,使用者亦可於職場5確認 傳輸至自宅之郵件。當然,亦可自職場5寄出郵件。 如以上所述,使用者藉由攜帶親友波卡拉人偶161,並在 連接於希望使用之裝置的站台上放置親友波卡拉人偶 16卜可自其裝置接τ發揮代理人功能之親友波卡拉相關之 服務的提供。其裝置亦可為圖丨所示之行動電話61。 但是,行動電話61内並未連接站台,行動電話61内藏讀 寫器。因此,使用者可將親友波卡拉人偶161鄰近行動電話 61配置(使其接觸),來進入波卡拉服務伺服器9。 利用行動電話61時,因不存在站台,所以無法將親友波 卡拉人偶161始終放置於站台上。因此,自行動電純進入 波卡拉服務伺服器9時,冑行動隸61鄰近配置親友波卡拉 人偶161時,係於波卡拉服務伺服器9内進行存取(登入),而 後,即使自行動電話61拿開親友波卡拉人偶16卜對波卡拉 服務伺服态9之存取(連接)仍然持續。 、 使用料登出時,藉由適_作行動電純之按知等, 來顯示選單,自其選單中選擇登出之項目,來指示登出。 進行該操作時,可執行登出。 旦 、使用販賣波卡拉人偶181時亦同樣地,使用者將販賣波卡 拉人偶181配置於行動電話6丨之近旁(使其接觸)。此時,一 旦進行存取(登人)時,其存取(連接)於以後仍然持續至使用 84661 -70- 200409005 者自選單指示登出。 & @ 由於内藏於行動電話61之CPU之能力低於内 藏於個人電腦等> rx>TT ^ ^ < CPU,因此,顯示親友波卡拉或販買波 卡拉《角色時又解像度、色數、多邊形數、慧差數等,比 顯示於個人電腦等時,變更成簡易之格式者。 波卡拉貝料如可以基於XML之資料表現。此外,亦可使 用Java(登錄商標)顯示角色。此外,亦可利用i mode。 同時攜τ仃動電話61與親友波卡拉人偶161時,若親友波 卡拉人偶16 1過大則攜帶不便。因而,將親友波卡拉人偶丨6 i 形成如可藉由鍵座保持之鍵(Key)的大小,如可以配件之方 式吊掛於行動電話61之帶子上。 由於1C晶片可縮小,因此,可形成可將親友波卡拉人偶 161吊掛於行動電話61之帶子上的大小。 除行動電話之外,亦可自PDA、數位一般相機、 Camcoder、錄影機、DVD放映機、硬碟放映機、汽車導航 裝置、電腦遊戲機器等各種裝置對波卡拉服務伺服器9進行 存取。 以上,主要係說明利用内容時,不過,發揮代理人功能 之親友波卡拉即使並非為求生成參照圖3丨說明之快取資 訊,而分析使用者之嗜好,接受使用者指示,仍可自連接 於網際網路1之各種伺服器取得使用者喜好之内容。因此, 使用者可經由親友波卡拉閱讀該快取資訊。親友波卡拉指 示閱覽快取資訊時,顯示介紹先前曾檢索之内容之販賣波 卡扭。使用者可經由該販賣波卡拉接收先前所取得之内容 84661 -71 - 200409005 的挺示,作為快取資訊。亦即,此時不經由販賣波卡拉人 偶181來顯示販賣波卡拉。 使用者進入販賣波卡拉之入口網站時亦同。此等情況 下’收費並非經由販賣波卡拉,而係經由親友波卡拉進行。 再者’將販賣波卡拉之波卡拉ID加註書籤,如登錄參照 圖31說明之喜好資訊時,可迅速地進入其販賣波卡拉之 URL 〇 此外以上係將親友波卡拉人偶161及販賣波卡拉人偶 18 1作成人偶形態,不過亦可形成動物、建造物及其他物件。 再者販貝波卡拉人偶之變形例,如亦可利用光碟(cd) 及DVD(多樣化數位光碟)之封套作為物件。 此時,1C晶片内藏於其封套(物件)内。因此,將其封套放 置毛站口上時’對應於其封套之販賣波卡拉之角色顯示於 連接於站台的裝置上。此時之販賣波卡拉如其封套為之 封套時,係形成正在唱歌之歌手的角色,作為收錄於其CD 之内容。 该販買波卡拉之角色進行與使用者虛擬對話,並介紹對 應之歌手之首頁的處理。 或疋’販買波卡拉依據記錄於其封套所收納之IC晶片内 之折彳貝券,讓使用者試聽其歌手最新的歌曲(内容)。此外, 為1C晶片内記憶有記錄於其CD内之内容相關說明及歌手 之促銷資訊等,販賣波卡拉介紹以上内容。 或疋,其封套為DVD之封套時,出現收錄於其内之 電影主角之角色,作為販賣波卡拉。其封套之…晶片内記 84661 •72- 200409005 憶有其電影相關製作過程之詳細資訊及折價券等,販賣波 卡拉依據其折價券進行販賣電影相關商品的處理。 此外’亦可賦予販賣波卡拉取得内容之權利,藉由使用 者購買販賣波卡拉,提供於喜好之場所隨時重現内容之服 矛;0此時,於販賣波卡拉之1C晶片内儲存表示可取得之内 客種類的服務ID。如購買具有可取得樂曲4〇曲部分之服務 ID之販賣波卡拉的使用者,可自記錄於内容伺服器内之 2500曲之樂曲中取得喜好的4〇曲。 圖52顯示此種服務。服務a係提供樂曲A至樂曲c之服 矛乃使用者藉由購貝波卡扭1至波卡拉3之任何一個販賣波 卡拉人偶,可獲得服務A之提供。於服務A中,顯示於使用 者之個人電腦畫面上之波卡拉圖像形成虛擬波卡拉A。 服務B係提供樂曲D至樂曲F之服務,使用者藉由購買波 卡拉4或波卡拉5之任何一個販賣波卡拉人偶,可獲得服務b 之提供。於服務B中,顯示於使用者之個人電腦畫面上之波 卡拉圖像形成虛擬波卡拉B。 服務C係提供樂曲e至樂曲j之服務,使用者藉由購買波卡 拉6至波卡拉9之任何一個販賣波卡拉人偶,可獲得服務c 之提供。於服務C中,顯示於使用者之個人電腦畫面上之波 卡拉圖像形成虛擬波卡拉C。 圖53顯π使用販賣波卡拉人偶取得内容時之處理流程。 於步驟S611中,使用者將販賣波卡拉人偶181放置於對應於 使用之機态的站台上。如使用個人電腦22時,使用者係在 對應於個人電腦22而連接之站台23上放置販賣波卡拉人偶 84661 -73- 200409005 181。而後,自販賣波卡拉人偶181之ic晶片傳輸波卡拉1〇、 卡ID及服務ID至個人電腦22。 於步驟S631中,個人電腦22取得波卡拉ID、卡1〇及服務 ID。於步驟S632中,個人電腦632進行參照圖54而後述之認 證要求處理。於步驟S633中,個人電腦22傳輸認證要求至 内容伺服器6,並於於步騾S65 1中接收。 於步驟S652中,内容伺服器6進行參照圖55而後述之認證 處理。藉此,進行波卡拉之認證。於步驟S653中,將認證 結果傳輸至個人電腦22,並於步驟S634中接收。 於步驟S635中,個人電腦22執行參照圖56而後述之初始 資料取得處理。此時係自販賣波卡拉人偶181取得使用販賣 波卡拉人偶181所取得之樂曲(内容)一覽表及可下載次數之 計數器之值(步驟S622, S623),不過所取得之資料經過密碼 化。此等資料可使用記憶於内容伺服器6之鍵予以解碼,不 過個人電腦22無法解碼。 於步驟S636中,個人電腦22將步驟S623中傳輸之資料作 為服務資訊傳輸至内容伺服器6,並於步驟S654中接收。於 步驟S655中,内容伺服器6執行參照圖58而後述之初始資料 傳輸處理。藉此,顯示使用販賣波卡拉人偶181所取得之樂 曲(内容)之一覽表及可下載次數之統計值予以解碼,並作為 子刀始資料而記憶於個人電腦22内。於步驟S656中,内容伺 服益6傳輸初始資料至個人電腦22,並於步驟S637中接收。 其次,參照圖54之流程圖,說明圖53之步驟S631之認證 處理。於步驟S701中,個人電腦22之CPU 221判定販賣波卡 84661 •74· 200409005 拉人偶181是否放置於站台23上,並於判定已放置前待用。 於步驟S701中,判定販賣波卡拉人偶181已放置於站台23 上時,CPU 221進入步騾S702,取得販賣波卡拉人偶181之 波卡拉ID與服務id。販賣波卡拉人偶18 1之1C晶片中,除上 述之波卡拉ID之外,還包含顯示服務種類(如服務A)之服務 ID ’與指定其1C晶片之卡ID。此等資料予以密碼化,於步 驟S702中係取得經過密碼化之此等資料。 於步驟S703中,〇?11221依據於步騾3702中取得之資料生 成認證要求,並傳輸至内容伺服器6。 如此,販賣波卡拉人偶181之認證要求係對内容伺服器6 傳輸。 其次,參照圖55之流程圖,說明圖53之步驟S652之認證 處理。於步驟S721中,内容伺服器6之CPU 121接收認證要 求’於步驟S722中,使用解碼鍵,將波卡拉ID、卡ID及服 務ID 丁以解碼。將波卡拉id、卡ID及服務ID予以解碼之解 碼鍵係預先記憶於伺服器6之記憶部128内。 於步驟S723中,CPU 121判定於步驟S722中解碼之id是否 為正當之ID。此時,是否為正當id之判定執行如下。於伺 服器6之記憶部128内記憶有資料庫,其係記述有對應於服 務ID之卡ID,來判定是否為對應於其服務ID之卡ID。此外, 同樣地,依據記述有記憶於記憶部128之販賣之波卡拉人偶 之波卡拉ID—覽表之資料庫,來檢查波卡拉⑴之正當性。 於步驟S723中,判定為正當之ID時,CPU 121進入步驟 S724,傳輸認證結果為認證〇κ至個人電腦22。於步驟S723 84661 •75- 200409005 中’判足並非正當之ID時,CPU 121進入步驟S725,傳輸認 證結果為認證NG至個人電腦22。 如此’進行販賣波卡拉人偶1 8 1之認證。 其次’參照圖56,說明圖53之步驟S635之初始資料取得 處理。於步驟S741中,個人電腦22之CPU 221接收認證結 果。於步驟S742中,CPU 221判定所接收之認證結果是否為 認證OK。於步驟S742中,判定為認證〇K時,進入步驟S743, 自販賣波卡拉人偶181取得計數器及下載完成之樂曲。 販買波卡拉人偶181之ic晶片中儲存有圖57所示之資 汛。販買波卡拉人偶181如賦予有可取得4〇曲之内容之權利 的服務ID,取得内容時,儲存内容1£)及取得日期時間。本 例中,於西曆2002年3月7日13時12分,取得對應於内容m 「10001」之内容,下載完成之樂曲記述成内容10「1〇〇〇1」。 而後,取得(下載)一個内容時,表示可下載次數之計數器之 值僅減少1。可下载次數之初始值為40,本例中,由於已下 載一個内容與許可證,因此計數器之值變成39。 另外,圖57所7F之資訊予以密碼化儲存,於步驟S743中, 貝訊在密碼化狀態下取得。 於步驟S744中,CPU221於計數器及下載完成之樂曲上附 加特足 < 標頭,並生成服務資訊,傳輸至内容伺服器6。 另外,於步驟S742中,判定並非認證⑽時,亦即㈣證 NG時,CPU221進入步驟S745,執行錯誤處理。 如此,儲存於販賣波卡拉人偶181之1(:晶片内之表示下載 完成之樂曲之内容10與表示可下載次數之計數器之值在密 84661 -76- 200409005 碼化狀態下傳輸至内容伺服器6。 圖53之步驟S655之初始 容伺服器6之CPU 121接 其次,參照圖58之流程圖,說明 資料傳輸處理。於步驟S76丨中,内 錢務資訊,於步雜62中,將計數器、下載完成之樂曲 …解I另外,將叶數器、下載完成之樂曲予以解碼之 解碼鍵預先記憶於内容伺服器6之記憶部128内。 於步驟S763中,CPU22U5l得波卡拉資源。波卡拉資源係 藉由顯示於個人電腦之輸出部上之角色之三次元圖像之資 ^、其角色<對話資料、其角色之名稱等資訊所構成之資 料,並預先記憶於内容伺服器6之記憶部128内。波卡拉資 源存在於各服務内,並對應於服務1〇來指定。 於:驟S764中,CPU 121於計數器、下载完成之樂曲及波 卡拉資源中附加特定之標頭,作為初始資料而傳輸至個人 電腦22。所傳輸之初始資料記憶於個人電腦22之記憶部 内。 如此,使用販賣波卡拉人偶181取得(下載)之樂曲一覽表 與可下載次數藉由個人電腦22識別。此外,由於將販賣波 卡拉人偶181之1C晶片内所含之資訊予以密碼化,而僅可以 内容伺服器6解碼,因此可更確實地防止資訊遭竄改。 於步驟S764中,依據所傳輸之波卡拉資源,於個人電腦 22之輸出邵227的顯示部上顯示圖59所示之圖像。圖59中顯 示有該服務使用之虛擬波卡拉5〇 1,並顯示有對白框5〇2作 為其旁白。對白框502内顯示有「EGC的現場表演好像在4 月20日於原宿的LUIDA」的文字。 84661 -77- 200409005 服務提供者藉由更新 ^ 新的資訊。此外4 ,卡拉貝源,可始終提供使用者最 可取得\Γ 購買販f波卡拉人偶⑻之使用者如 :取仔自己有興趣之歌手的最新資訊 使用者可㈣易1«㈣式進行。I貝叙#疋供, 其’人,參照圖60,說 之下載處理n y 波卡拉人偶181進行内容 後計、。 係於參照圖53之上述處理結束 伺服二° S831中,個人電腦22傳輸τ載要求至内容 H並於步物1巾純。下錢求之傳輸,如使用 者知作個人電腦22之輸入部226,藉由輸入特定之指令 行0 於步驟S862中 列表傳輸處理。 至個人電腦22, ,内容伺服器6執行參照圖61而後述之内容 於步驟S863中,内容伺服器6傳輸内容列表 並於步驟S832中接收。 於步驟S833中,個人電腦22執行參照圖64而後述之下載 處理。藉此,指定下載或預覽(試聽)之内容,並傳輸至内容 祠服器6。於步驟S834中,個人電腦22傳輸下載要求或預覽 要求至内容伺服器6,並於步驟別料中接收。 於步驟S865中,内容伺服器6執行參照圖67而後述之内容 傳輸處理。藉此,傳輸内容至個人電腦22,並於步驟ss35 中接收。此外,傳輸服務資訊,於步驟S836中藉由個人電 腦22接收,於步驟S811中藉由販賣波卡拉人偶181接收。 其次,參照圖61,說明圖60之步驟S862之内容列表傳輸 處理。於步驟S901中,内容伺服器6<cpu 121生成對應於 服務ID之内容列表。 84661 -78- 200409005 於内容伺服器之記憶部128中如記憶有圖62所示之資料 庫。本例中’係記憶有對應於内容ID之服務ID、許可證、 下載完成ID。如第一列上記述有「1〇〇」作為對應於内容出 「1001」之服務ID,若為具有服務11}「100」之販賣波卡拉, 表示可取得對應於内容10 r 1〇〇1」之内容。此外,記述有 「XXXX」作為許可證,對應於内容ID「1〇〇1」之内容表示 可使用許可證「χχχχ」解碼。 下載完成(波卡拉)ID記述有「A」、「B」及「c」,波卡拉 ID為「A」、「B」及「c」之販賣波卡拉表示已下載對應於 内容ID「1〇〇1」之内容者。 再者’於内容伺服器之記憶部128内記憶有圖63所示之資 料庫。該資料庫内記憶有對應於内容ID之曲名、本週之售 出點數、累計售出點數、收錄樂曲名稱、表示該樂曲是否 為新曲之新曲旗標。並記憶有該樂曲之歌手姓名、作詞者 姓名、作曲者姓名及演奏時間。 再者,記述有至介紹該樂曲之唱片套檔案之路徑、至該 樂曲之音樂檔案(如WAV檔案)之路徑、至卡拉〇&資料檔案 之路徑、及至封套照片檔案之路徑。並記述有該樂曲之開 封日期、種類名稱、預覽開始框編號、預覽結束框編號。 如於步驟S631(圖53)中所接收之服務1〇為「1〇〇」時,於 步.驟S901中,生成對應於内容m「1〇〇1」與「1〇〇3」之内 容的内容列表。内容列表中包含其内容之曲名、歌手姓名、 收錄樂曲名稱、售出點數等。 於步驟S902中,CPU 121將内容列表傳輸至個人電腦22。 84661 -79- 200409005 如此’可下載之樂曲一覽表傳輸至個人電腦22。 其次’參照圖64之流程圖,說明圖6〇之步驟S833之下載 處理。於步驟S921中,個人電腦22之cpu 221接收内容列 表。於步驟S922中,CPU 221判定可下載次數是否超過i。 於步驟S637(圖53)中,自内容伺服器6傳輸可下載次數,並 參照記憶於個人電腦22之初始資料中之計數器之值來取 得。 於步驟S922中,判定可下載次數超過丨時,cpu 221進入 步% S923頭示下載畫面。此時係於輸出部之顯示部上 顯示圖65所示之畫面。圖65中顯示有虛擬波卡拉5〇1對白框 5 11,其左上側顯示有下載列表畫面5 1〇。 圖66係顯示下載列表畫面51〇之顯示例圖。搁位531係顯 示所顯示之内容之歌手姓名的欄位,使用者藉由於搁位531 内輸入所需之歌手姓名’可於櫊位536内顯示對應於其歌手 之内容的曲名與售出成效。本例巾,就歌手「松下亞彌」 之内各,顯示其曲名與售出成效一覽表。 本例中’係於欄位531内輸入所顯示内容之歌手姓名,不 過於欄位53 1内如藉由輸入種猶 田彻八禋力頁研可於欄位536内顯示對 應於其種類之内容之曲名與售出成效。 於搁位532内顯示可下載次數(樂曲數)。本例中顯示剩餘 厂X曲」。 另外,該畫面中,藉由使用者於搁位533内輸入曲名,或 是於欄位534内輸入樂曲本名稱後,點選檢索按㈣$,可 檢索所需之内容(樂曲)。 84661 -80- 200409005 回到圖64,於步驟S924中,CPU 221判定是否已指定内 容,並於判定已指定前待用。内容之指定如藉由點選一次 圖66之欄位536中之曲名來進行。 · 於步驟S924中,判定已指定内容時,進入步驟S925,CPU ' 22判定是否已指定預覽(試聽)。預覽之指示如藉由使用者點 ‘ 選圖66之預覽按鈕537來進行。於步·驟S925中,判定已指示 , 預覽時,進入步騾S926, CPU 221將預覽要求傳輸至内容伺 服器6。 φ 於步驟S925中,判定並未指示預覽時,進入步驟S927, CPU 221判定是否已指示下載。下載指示如藉由使用者點選 圖66之下載按鈕53 8來進行。於步驟S927中,判定已指示下 載時,進入步驟S928,CPU 221傳輸下載要求至内容伺服器 6 〇 步驟S926或S928之處理後,CPU 221於步驟S929中,將對 應於步驟S924中所指定之内容之内容ID傳輸至内容伺服器 6。 馨 於步騾S922中,判定可下載次數並非超過1,亦即判定以 後無法下載時,或是於步騾S927中,判定並未指示下載時, 進入步驟S930,CPU 221執行錯誤處理。 如此,進行所需之内容的下載。 · · 其次,參照圖67,說明圖60之步驟S865之内容傳輸處理。 ^ 於步驟S951中,内容伺服器6之CPU 121接收下載要求或預 覽要求,並於步驟S952中接收内容ID。 於步驟S953中,CPU 121判定於步驟S951中所接收之資料 84661 -81 - 200409005 是否要求下載,判定為要求下載時,進入步驟S954,執行 參照圖68而後述之下載内容傳輸處理。 另外,於步騾S953中,判定不是要求下載(係要求預覽) Λ 時,進入步驟S955,CPU 121執行參照圖70而後述之預覽内 . 容傳輸處理。 _ 其次,參照圖68,說明圖67之步驟S954之下載内容傳輸 , 處理。於步驟S971中,CPU 121取得對應於内容ID之下載用 資料。 ⑩ 於内容伺服器之記憶部128内記憶有圖69所示之資料。樂 曲邊緣資料601係記述有其樂曲之演奏時間等資訊的檔案 群,歌詞資料602係記述有其樂曲之歌詞的檔案群,唱片套 說明603係記述有介紹其樂曲内容之評論等之檔案群。封套 照片604係依據其樂曲之CD封套照片作成之電腦可讀取之 檔案(如JPEG檔案)群,樂曲資料605係其樂曲之音樂檔案(如 WAV檔案)群。樂曲邊緣資料601至樂曲資料605係藉由各樂 曲之數個檔案構成,並對應於内容ID來指定各檔案。 _ 如以上所述,於内容伺服器之記憶部128内記憶有圖63所 示之資料庫,指定内容ID時,係指定至對應於其内容ID之 唱片套說明檔案之路徑、至樂曲資料檔案之路徑、至卡拉 OK資料(樂曲邊緣資料及歌詞資料)檔案之路徑及至封套照 ~ Λ 片檔案之路徑。於步騾S971中,CPU 121自樂曲邊緣資料601 至樂曲資料605中指定對應於内容ID之檔案,並合併此等檔 案,取得下載用資料。 於步騾S972中,CPU 121將步騾S971中取得之下載用資料 84661 -82- 200409005 作為内容,傳輸至個人電腦22。所傳輸之内容於步驟 S835(圖60)中,被個人電腦22接收並記憶於記憶部228内。 此時所傳輸之内容予以密碼化,並在密碼化狀態下記憶於 記憶部228内。為求重現經過密碼化之内容,需要將内容予 以解碼之鍵(許可證),其内容後述。 此外’接收下載用資料之個人電腦22之輸出部227的顯示 邵上’如於圖65所示之顯示畫面之對白框5 11内顯示下載的 進展狀況(如「完成X%之下載」 於步驟S973中,CPU 121判定該内容是否完成下載。此 時,係依據於步驟S654(圖53)中取得之服務資訊中的下載完 成樂曲,來判定該内容是否完成下載。 於步驟S973中,判定該内容並非下載完成時,進入步驟 S974 CPU 121更新於步騾S654(圖53)中取得之服務資訊中 之下載完成樂曲。如傳輸對應於内容ID「1〇〇2」之内容時, 在下載完成樂曲上加註「1〇〇2」。 於步驟S975中,CPU 121扣除於步驟S654(圖53)中取得之 服務資訊中之計數器之值。 次於步驟S976中,CPU 121將步驟別74與S975中更新之服務 貝況傳輸至個人電腦22。所傳輸之服務資訊,於步驟 S^6(圖60)中,被個人電腦22接收,並於步驟s8ii中儲存於 販買波卡拉人偶181之1C晶片内。 j步驟咖中,CPU121更新資料庫。此時,於圖62所示 之貝料庫中更新下載完成ID。如使用波卡拉ID「A」之販奮 波卡拉’下載對應於内容ID「1 〇〇3」之内容時,係於第三 84661 -83- 200409005 列之下載完成ID内加註「A」。 另外,於步驟S973中,判定該内容為下載完成時,跳過 步驟S974至S977之處理。 如此,傳輸所下載之内容,同時亦更新販賣波卡拉人偶 181之1C晶片内的資訊。 其/人,參照圖70,說明圖67之步驟S955之預覽内容傳輸 =理。於步驟S991中,CPU 121取得對應於内容①之預覽用 資料。此時,係自圖69之樂曲邊緣資料601至樂曲資料605 中指定對應於内容ID之檔案,並依據圖63之資料庫中之預 覽開始框編號與預覽結束框編號,自檔案中抽出特定部分 之資料,並合併作為預覽用資料。 此外,亦可預先準備畫質及音質稍差之預覽用樂曲邊緣 資料601至樂曲資料6〇5,自此等中指定對應於内容ι〇之檔 案,並合併作為預覽用資料。 於步驟S992中,CPU 121將步驟S991中取得之預覽用資料 作為内容傳輸至個人電腦22。 如此,進行内容之預覽(試聽)。於預覽中,由於並未扣除 儲存於販賣波卡拉人偶之IC晶片中之可下載次數(計數器 •^值)’因此使用者可隨意試聽樂曲。此外,於接收預覽用 資料之個人電腦22中進行資料之重現。此時,於個Z電腦 22乏輸出部227的顯示部上,如於圖65所示之顯示畫面之對 白框5 11内顯示内容之唱片套說明的内容。 使用者可使用販賣波卡拉人偶181重現取得(下载)之内 容。使用於重現之機器亦可為下載内容之機器,亦可為與 84661 -84 - 200409005 其不同之機器。 如使用已下載内容之個人電腦22時,使用者在對應於個 人電腦22而連接之站台23上放置販賣波卡拉人偶181。此 尚未下載内各之個人電腦26時’使用者在對應於 個人私驷22而連接之站台27上放置販賣波卡拉人偶丨8卜而 後進行人參知、圖5 3之上述處理相同的處理,於個人電腦 2 2或2 6内記憶初始資料。 另外本例中使用之機器係個人電腦22或26 ,不過使用 之機器並不限定於此。 其次,參照圖71,說明重現内容處理之流程。於步驟§11〇1 中,個人電腦22或26進行參照圖72而後述之列表顯示處 理。藉此’顯示内容之列表,並指定使用者須重現之内容。 此時檢索個人電腦22或26之記憶部228内是否存在所指定 之内容。 如使用者使用個人電腦22時,内容已記憶(下載)於記憶部 228内,不過使用者使用個人電腦辦,則記憶部228内不 存在内容。 内容不存在於記憶部228内時,於步驟3臟中,自個人 電腦26對内容伺服器6傳輸内㈣,並好雜⑶中接 收,於步驟S 113 2中,内容祠服哭&、在y止, 、 τ門奋服為6達行對應於内容Π)之内 容傳輸處理。由於該處理係與參照_67之上述内容傳輸處 理相同之處理’因此省略其說明。於步驟川33中,内容飼 服器6傳輸内容至個人電腦26 ’並於步驟su〇3中接收。 另外,如使用者使用個人電腦22時,由於内容已記憶(下 84661 -85 - 200409005 載)於記憶部228内,因此不進行步驟S1l〇2, SU31,S1132 S1133及S1103之處理。 於步驟SU04中’個人電腦22或26進行參照圖乃而後述之 許可證要求處理。於步中,個人電腦22_傳輸許 可證要求至内容伺服器6,並於步驟川34中接收。於步驟 SU35中,内容伺服器6進行參照圖%而後述之許可證傳輸 處理。藉此,傳輸將經過密碼化之内容予以解碼之解碼鍵 的許可證。 於步%Sll〇6中,内容伺服器6對個人電腦22或26傳輸許 可證,並於步驟S1106中接收。於步驟311〇7中,個人電腦 22或26進行參照圖77而後述之許可證重現處理1而重現 内容。 其次,參照圖72之流程圖,說明圖71之步驟sn〇1之列表 顯示處理。於步驟_1中,個人電腦22或26之CPU 221顯 示重現畫面。此時,於輸出部227之顯示部上顯示圖73所示 之圖像。 圖73中顯示有虛擬波卡拉5〇1與對白框,其左上側顯 示有重現列表畫面5 61。 圖74係顯示重現列表畫面561之顯示例圖。欄位581係顯 示所顯7F之内容之歌手姓名的攔位,使用者藉由於欄位58 } 内輸入所需之歌手姓名,可於欄位583内顯示對應於其歌手 之内答曲名與購買日期(取得日期P本例中,歌手「松下亞 彌」之内容顯示有其曲名與購買日期一覽表。 顯不於欄位538内之内容中,已記憶於記憶部228内之内 84661 -86- 200409005 容曲名與購買日期以深色顯示,尚未記憶於記憶部228内之 内容曲名與購買日期以淺色顯示。 欄位538之第一列之曲名「桃色思念」與其購買日期 「2002/02/02」以淺色顯示,該内容係於過去使用該販賣波 卡扭人偶18 1取得,不過並未記憶於現在使用中之個人電腦 之記憶部228内,亦即,該内容表示係被其他機器下載。欄 位538之第二列之曲名「1〇〇〇次KISS」與其購買日期 「2002/04/04」以深色顯示,其内容表示係於過去使用該販 買波卡拉人偶181而取得,並記憶於現在使用中之個人電腦 之記憶部228内。 本例中,係於攔位581内輸入有所顯示之内容之歌手姓 名,不過亦可於攔位581内,如藉由輸入種類,而於欄位583 内顯示對應於其種類之内容曲名與購買日期。 於欄位582内顯示擁有樂曲數量。擁有樂曲數量係表示使 用該販賣波卡拉人偶181下載(取得)之内容數量,本例中顯 示為「Y曲」。 回到圖72,於步驟S1202中,cpu 221判定是否已指示重 現之内容,並於判定已指示前待用。重現之内容的指示係 藉由使用者如操作輸入部226,點選兩次圖74所示之重現列 表畫面中所需之曲名來進行。於步驟s丨2〇2中,判定已指示 重現之内容時,CPU 221進入步驟312〇3。 於步驟S1203中,CPU 221判定重現之内容是否在終端(使 用中之機器)内。如重現之内容係指示圖74之欄位583之第 列之内容(曲名「桃色思念」)時,判定重現之内容未在終 84661 -87 - 200409005 端内,而進入步驟S12〇4 , CPU 221將對應於所指定之内容 之内容ID傳輸至内容伺服器,並下載内容。 此時’自内容伺服器6傳輸内容至個人電腦22或26。該内 容傳輸處理(圖71之步驟S 1132)係與參照圖67與圖68之上述 内各傳輸處理相同之處理,不過,由於此時於步驟S973(圖 68)中判定該内容為下載完成,因此跳過步驟mm至S977之 處理。 另外’如重現之内容係指示欄位583之第二列之内容「曲 名「1000次KISS」」時,判定重現之内容在終端内,因此跳 過步驟S1204之處理。 如此’重現内容之指定,於其内容不在終端内時,則進 行内容之下載。 其次,參照圖75之流程圖,說明圖71之步驟S1104之許可 證要求處理。於步騾S1221中,個人電腦22或26之CPU 221 取得對應於所指定之内容之内容ID。於步驟S1222中,CPU 221於步驟S1221中取得之内容ID上附加特定之標頭,並將 許可證要求傳輸至内容伺服器6。 如此,進行重現内容用之許可證要求。 其次,參照圖76,說明圖71之步驟S1135之許可證傳輸處 理。於步驟S1241中,内容伺服器6之CPU 121接收許可證要 求。於步驟S1242中,CPU 121判定内容是否下載完成。此 時’係參照圖62所示之資料庫,檢查内容是否下載完成。 於步驟S1243中,CPU 121生成僅可重現一次之内容的許 可澄。該許可證之生成,如利用OpenMGX,Windows, 84661 -88 - 200409005 DRM(數k椎管理)等之記述來進行。於步驟si244中,CPU 121傳輸許可證至個人電腦22或26。 如此,傳輸將經過密碼化之内容予以解碼之鍵的許可證。 其次,參照圖76之流程圖,說明圖71之步驟S1107之許可 證重現處理。於步驟S1261中,個人電腦22或26之CPU 221 接收許可證。於步驟S1262中,CPU 221依據取得之許可證 將内容予以解碼、重現。 此時,於個人電腦22或26之輸出部227之顯示部上顯示圖 78所示之圖像。圖78中顯示虛擬波卡拉5〇 1與對白框562, 於虛擬波卡拉501之左上側顯示重現列表畫面561,於虛擬 波卡拉501之左下側顯示該内容之封套照片563。於顯示畫 面之對白框562内顯示重現中之内容的歌詞,虛擬波卡拉 5 01進行特定之動作。 如此進行内容之重現。 如此,可藉由内容伺服器6管理重現内容之許可證。此 外,由於内容予以密碼化,為求重現,須使用販賣波卡拉 人偶181來取得許可證,因此即使内容被不正當複製,仍然 無法重現,可保護内容之著作權。另外,購買販賣波卡拉 人偶181之使用者僅須將販賣波卡拉人偶18丨放置於站台 上,即可輕易地重現内容。重現内容時,必須於内容伺服 器6内判定販賣波卡拉之ID是否為正當之id,因此可更有效 地保護内容之著作權。 以上,係說明一種藉由内容伺服器6管理取得之内容的許 可證,不過亦可將許可證儲存於販賣波卡拉人偶181之1€晶 84661 -89- 片中,於重現内容時,自販賣波卡拉人偶181取得許可證。 如此,使用者可自由地取得並重現對應於販賣波卡拉人偶 181之服務ID之内容。 藉由物件内保持使用者識別資訊,使對應於其物件之圖 像顯示於顯示部上,可使使用者立即瞭解本身與物件之關 係,可避免錯誤使用其他使用者之物件。 巨理使用者識別資訊,接收自其他資訊處理裝置送來之 使用者識別資訊時,依據管理所接收之使用者識別資訊之 使用者識別資訊認證,依據其認證結果,其他資訊處理裝 置係經由網路傳輸顯示對應於使用者識別資訊之圖像用之 所需顯示資訊,因此可輕易且確實地識別使用其他資訊處 理裝置之使用者。 經由網路將取得之使用者識別資訊傳輸至其他資訊處理 裝置依據其使用者識別資訊,自其他資訊處理裝置接收 ^從結果,再依據其認證結果,以顯示對應於使用者識別 資訊之圖像的方式來控,可使使用㈣實認證本身。 藉由使人偶内藏圮憶體,使其記憶體内記憶使用者識別 貝Λ且使人偶之形狀為對應於顯示之圖像的形狀,可讓 使用者使用其人偶確實地進行認證處理。 …藉由77配记憶物件識別資訊之物件,經由網路接收物件 識別貝Λ時,獲得對應於物件識別資訊之内容識別資訊, 再經由網路傳輸對應於内容識別資訊之内#,可實現可更 有效地將内各分配於各使用者之系統。 、、二由網路將依據第二其他資訊處理裝置送來之物件識別 84661 200409005 傳輸至第—資訊處理裝置’對第二其他資訊處 # <吏用者進仃收費處理,可安全地將内容提供給各 用卜者,並JL可確實回收對於提供之内容的代價。 猎由取得記憶於物件内之内容識別資訊,並經由網路傳 内谷識別資訊至其他資訊處理裝置,接收對應之内容, 並輸出所接收《内$,只須取得物件,即可確實利用對與 之内容。 〜 精由於人偶保持之記憶體内記憶人偶識別資訊,並且使 其人偶之形狀對應於内容相關之圖像,可有效分配内容於 使用者。 藉由於物件保持之記憶體内記憶内容識別資訊,並且於 其物件内保持對應於内容相關圖像之特徵,可讓使用者更 高興地使用内容。 上述連串之處理亦可藉由硬體來執行,亦可藉由軟體 來執行。藉由軟體執行一連串之處理時,構成其軟體之程 式自網路及記錄媒體安裝於組裝有專用硬體之電腦,或是 藉由安裝各種程式而可執行各種功能之如通用個人電腦 等0 如圖2或圖3所示,該記錄媒體係除裝置本體之外,另行 刀發給使用者提供程式用之I己錄有程式之磁碟141,2 5 1 (包 含軟碟)、光碟142,252(包含CD-R〇M(唯讀記憶光碟)、 DVD(多樣化數位光碟))、光磁碟143,253(包含MD(迷你光 碟))或精由包含半導體記憶體144 ’ 254等之套裝軟體媒體構 成之外’亦可在預先組裝於裝置本體内之狀態下提供使用 84661 -91- 200409005 122,222及記憶部128,228内所含 者之記錄有程式之ROM 之硬碟等構成。 另外,本說明書中記述記錄於記錄媒體内之程式之步 驟,當然係按照所記載之順序時間序列進行之處理,即使 並非時間序列處理,亦包含並列或個別地執行的處理。 此外’本說明書中所謂之系統,係表示藉由數個裝置構 成之整個裝置者。 【產業上之利用可行性】 如以上所述,採用本發明之資訊處理系統及其資訊處理 万法’可實現可識別使用者之系、统。此外,可實現可避免 使用者誤用物件之系統。 採用本發明之第-資訊處理裝置及第—資訊處理方法、 f一程式儲存媒體與第一程式,可於其他資訊處理裝置確 只也減別使用者。此外,可讓使用其他資訊處理裝置之使 用者確實瞭解是否已獲得正確之認證結果。 採用本毛明之第一資訊處理裝置及第二資訊處理方法、 第一程式儲存媒體與第二程式,可確實地認證使用者。此 外,可讓使用者確實地判斷是否獲得正確之認證結果。 採用本發明之第一人偶,可確實地識別保持其之使用 者。此外,可避免誤用其他人偶來認證本身。 採用本發明之資訊提供系統及方法,可實現可分發許多 内答之系統。此外,可實現可安全地分發内容之系統。 採用本發明之第三資訊處理裝置及第三資訊處理方法、 第三程式儲存媒體與第三程式,可確實提供内容給使用 84661 -92- 200409005 者此外,可確實地自其使用者回收對於内容之代價。 知用本發明之第四資訊處理裝置及第四資訊處理方法、 第四私式儲存媒體與第四程式,可於使用者使用中之機器 内提供所需之内容。 知用本發明之第五資訊處理裝置及第五資訊處理方法、 第五私式儲存媒體與第五程式,可輕易且迅速地利用内 容。此外’無須將其構造予以複雜化。 採用本發明之第二人偶,可輕易且確實地刺激使用者之 内容麟買慾。此外,可安全且確實地提供内容給使用者。 採用本發明之物件可讓使用者更加享受内容。 【圖式簡單說明】 圖1係顯示適用本發明之資訊處理系統之構造例的區塊 圖。 圖2係顯示圖丨之波卡拉服務伺服器之構造例的區塊圖。 圖3係顯示圖1之個人電腦之構造例的區塊圖。 圖4係顯示一種親友波卡拉人偶。 圖5係顯示親友波卡拉人偶之内部構造的區塊圖。 圖6係說明記憶於圖5之IC晶片内之資訊之圖。 圖7係說明使用者取得親友波卡拉人偶之處理的流程圖。 圖8係顯示一種親友波卡拉人偶。 圖9係說明圖1之波卡拉服務伺服器之親友波卡拉販賣處 理的流程圖。 圖10係顯示一種販賣波卡拉人偶。 圖11係顯示一種記憶於販賣波卡拉人偶之1C晶片内之货 84661 -93- 200409005 訊之圖。 圖12係說明圖1之個人電腦之波卡拉處理的流程圖。 圖13係說明圖1之個人電腦之波卡拉處理的流程圖。 · 圖14係說明圖1之個人電腦之波卡拉處理的流程圖。 · 圖15係說明圖1之個人電腦之波卡拉處理的流程圖。 . 圖16係說明圖1之個人電腦之波卡拉處理的流程圖。 . 圖17係說明親友波卡拉之公事包資訊之圖。 圖1 8係說明販貝波卡拉之公事包資訊之圖。 圖19係顯示波卡拉之顯示例圖。 鲁 圖20係顯示波卡拉之顯示例圖。 圖21係顯示選擇有郵件功能時之波卡拉顯示例圖。 圖22係顯示選擇有郵件功能時之波卡拉其他顯示例圖。 圖23係顯示選擇有行事曆功能時之波卡拉顯示例圖。 圖24係顯示選擇有行事曆功能時之波卡拉其他顯示例 圖。 圖25係顯示選擇有換穿功能時之波卡拉顯示例圖。 圖26係顯示波卡拉之其他顯示例圖。 圖27係顯示波卡拉之其他顯示例圖。 圖28係忒明圖1之波卡拉服務伺服器之處理的流程圖。 圖29係說明圖1之波卡拉服務伺服器之處理的流程圖。 — 圖30係顯示一種登錄於圖1之波卡拉資料庫内之使用者 , 資訊之圖。 圖3 1係顯示一種登錄於圖1之波卡拉資料庫内之親友波 卡拉之波卡拉資訊之圖。 84661 -94- 200409005 圖32係顯示一種登錄於圖1之波卡拉資料庫内之販賣波 卡拉之波卡拉資訊之圖。 圖3 3係說明圖1之内容伺服器之處理的流程圖。 圖34係說明圖1之個人電腦之内容接收處理的流程圖。 圖35係說明圖1之内容伺服器之内容提供處理的流程圖。 圖3 6係說明圖1之波卡拉伺服器之處理的流程圖。 圖37係說明取得圖1之個人電腦之許可證之處理的流程 圖。 圖38係說明圖1之波卡拉服務伺服器之處理的流程圖。 圖39係說明圖1之許可證伺服器之處理的流程圖。 圖40係說明圖1之個人電腦之内容重現處理的流程圖。 圖41係說明圖1之波卡拉服務飼服器之内容重現處理的 流程圖。 圖42係說明圖1之個人電腦之預付金額更新處理的流程 圖。 圖43係說明圖1之波卡拉服務伺服器之預付金額更新處 理的流程圖。 圖44係說明儲存於終端内之内容重現處理之流程圖。 圖45係說明重現終端内之内容時之波卡拉服務伺服器之 處理的流程圖。 圖46係說明自其他終端接收内容提供之終端重現處理的 流程圖。 圖47係說明終端之内容提供處理之流程圖。 圖4 8係說明重現終端内容時之波卡拉服務祠服器之處理 84661 -95- 200409005 的流程圖。 圖49係說明密碼化内容之複製處理的流程圖。 圖50係說明複製源頭之處理的流程圖。 · 圖5 1係說明複製目的地之處理的流程圖。 · 圖52係顯示使用販賣波卡拉提供内容之服務的構造圖。 · 圖53係顯示販賣波卡拉之認證與初始資料之取得處理流 _ 程之流程圖。 圖5 4係說明認證要求處理之流程圖。 圖55係說明認證處理之流程圖。 _ 圖56係說明初始資料取得處理之流程圖。 圖57係顯示一種儲存於販賣波卡拉人偶之1C晶片内之資 vUL 圖。 圖58係說明初始資料傳輸處理之流程圖。 圖59係顯示出使資料取得時顯示之畫面之顯示例圖。 圖60係顯示使用販賣波卡拉下載内容之處理流程的流程 圖。 圖61係說明内容傳輸處理之流程目。 _ 圖62係顯示一種記憶於内容伺服器内之資料庫圖。 圖63係顯示一種記憶於内容伺服器内之資料庫圖。 圖64係說明下載處理之流程圖。 · 圖65係顯不下載處理時顯示之晝面之顯示例圖。 … 圖66係顯示下載列表畫面之顯示例圖。 圖67係說明内容傳輸處理之流程圖。-圖68係說明下載内容傳輸處理之流程圖。 84661 -96- 200409005 圖69係顯示一種構成記憶於内容伺服器内之内容資料之 圖。 圖70係說明預覽内容傳輸處理之流程圖。 圖71係顯示使用販賣波卡拉重現内容處理之流程的流程 圖。 圖7 2係說明列表顯示處理之流程圖。 圖73係顯示於列表顯示處理中顯示之畫面之顯示例圖。 圖74係顯示重現列表畫面之顯示例圖。 圖75係說明許可證要求處理之流程圖。 圖76係說明許可證傳輸處理之流程圖。 圖77係說明許可證重現處理之流程圖。 圖78係顯示一種許可證重現處理時之顯示畫面之圖。 【圖式代表符號說明】 網際網路 2 3 4 5 6,7 8 9 10 11 12 網際網路服務提供者(ISP) 家庭CpU 121 reads 84661 -47- 200409005 from Pokhara database 10 to buy Pokhara briefcase information (Figure 18), and transmits its briefcase information to personal computer 22 in step S107. After the processing of step S107, the processing returns to step S9b and the subsequent processing is repeatedly performed. In addition, when the Pokhara doll 181 is a Pokhara doll related to divination, and the amount of divination content is not large, the content of divination is also stored in the briefcase information in Figure 8 When you call Pokhara, you can also display information about its contents at the same time as Pokhara's character. _ In step S108, when the CPU 121 determines that the Pokhara's resume is received, it proceeds to step S109 and executes the process of registering (updating) Pokhara's resume in the Pokhara database 10. Thereafter, the process returns to step S91, and the subsequent processes are repeatedly executed. Thus, as shown in the process of step S55 in FIG. 13, when the resume of Pocara is sent from the personal computer 22, the Pocara database is updated based on the resume. In step S110, when it is determined that the content server 6 has received the requested settlement (the processing of step S125 of FIG. 33 described later), it proceeds to step S1, 12i to perform the settlement processing for the user requested by the content server 6. Specifically, the CPU 121 checks the credit card number or bank account number of the user information (Figure 30) of the user information registered in the Pokhara database 10, and investigates whether there was any unsettled event in the past. Then, in step S112, the CPU 121 notifies the content server 6 of the result of its investigation (the result of the calculation). Then, the process returns to step S9 丨, and the subsequent processes are repeatedly executed. Next, referring to the flowchart of FIG. 33, the description will be given of the processing of the content server ㈣ 84661 -48- 200409005 when the user places the sales pokhara doll 181 on the platform 23 and accepts the content provision. In step S121, the CPU 121 of the content server 6 determines whether or not an access notification from the personal computer 22 has been received from the Pokhara service server 9 via the communication port # 119 (the notification transmitted in step S104 of FIG. 28). When it is determined that the notification is received from the Pokhara service server 9, the process proceeds to step S124, and the CPU 121 determines whether or not an update request for the prepaid amount (or the maximum number of usable times) has been received from the personal computer 22 (step S74 in FIG. 16). When the CPU 121 determines that an update request for the prepaid amount (or the maximum number of usable times) has not been received, the processing is terminated. In step S121, when the CPU 121 determines that a notification has been received from the Pokhara service server 9, it proceeds to step s122 to determine whether a notification from the description is received. < Requirement for transmission of content data of the personal computer 22 (step S62 in Fig. 14). When the transmission request of the content data from the personal computer 22 is received, the process proceeds to step S123, and the CPU 121 reads the encrypted content data 'stored in the memory section 128' and transmits it to the personal computer 22 from the communication section # 129. In addition, the content data can also be stored in the storage unit 128 in a pre-encrypted state, but it can also be encrypted during transmission. The notification from the Pokhara service server 9 obtained in step S121 must include the information of the specified content. The information may also be the content m, but when the content corresponds to the one-to-one correspondence with the sale of the Pokhara figures 181, it may also be output for Pokhara. Step. ¾ In S122, when the transmission request for content data from the personal computer has not been received, the processing in step S123 is skipped. That is, even if a notification is received from the Pokhara service server 9, the # γ φ 丄, which is written on the personal computer 22 described in the notification, does not require the content data to be transmitted when the user does not request the transmission of the content data. transmission. 84661 -49- 200409005 In step S124, when it is determined that an update request for the prepaid amount (or the maximum number of usable times) has been received from the personal computer 22, the process proceeds to step S125, and the CPU 121 requests settlement of the Pokara service server 9. According to the request, the Pokhara service server 9 performs settlement processing on the user who sells the Pokhara doll 181, and notifies the content server 6 of the settlement result (steps S111 and S112 in FIG. 29 above). In step S126 In the process, the CPU 121 of the content server 6 determines whether the settlement is OK according to the request of step S125 and the notification sent from the Pokhara service server 9. When the settlement is 0K, the process proceeds to step S127, and the CPU 121 transmits the update data for updating the prepaid amount (or the maximum usable number) to the personal computer 22. As described above, the personal computer 22 updates the prepaid amount (or the maximum usable number) of the 1C chip 191 for selling the Pokhara doll 181 based on the update information (step S76 in FIG. 16). This allows users to reuse content. In step S126, when the notification from the Pokhara service server 9 indicates that the settlement is not OK, the process proceeds to step S128, and the CPU 121 executes error processing. That is, at this time, the CPU 121 outputs a message to the personal computer 22 that the content cannot be provided. This allows the user to know that the prepaid amount (or maximum number of uses) cannot be updated. This information is displayed on the personal computer 22 in step S76 of FIG. Next, a description will be given of the processing of placing relatives and friends Pokhara figure 161 on the platform 23, the user obtaining the content from the content server 7, and obtaining the license required for using the content from the license server 8. This process executes a process corresponding to the function selected in step S52 of FIG. That is, the processing is started when the user selects a function of content acquisition processing from among the functions possessed by the character 3 11 of relatives and friends Pokhara. 84661 -50- 200409005 In step S131, the CPU 221 of the personal computer 22 enters the content server 7 'and requests the content to be transmitted. The user checks the incoming URL as needed. As described later, the content server 7 adds the content 10 and the license ID to the incoming personal computer 22 and transmits the content data (step S142 of FIG. 35 described later). Therefore, in step S132, when the CPU 221 of the personal computer 22 receives the content data sent from the content server 7 via the Internet 1, the content data is supplied and stored in the storage unit 228 in step S133. Next, in step S134, the CPU 221 identifies the content ID of the currently acquired content; access information for accessing the memory content data (information required for reading the content data from the memory unit 228); and The content URL of the license server (for the system shown in Figure 丨, the license server 8) (the URL is sent from the content server 7 attached to the content data) to Pokhara Service server 9. The content server 7 executes the processing shown in the flowchart of Fig. 35 in response to such access of the personal computer 22. That is, in step S141, when the CPU 121 of the content server 7 accepts access every 22 days from the personal electric month, in step s42, the content data stored in the storage section 128 is read and transmitted to the personal computer 22 . At this time, the CPU 121 transmits both the content 1D and the license ID identifying the license required to use the content. In addition, the content data is also encrypted. In addition, the 'Pokara service server 9 corresponds to the processing of step S134 of Fig. 34 of the personal computer 22, and executes the processing shown in the flowchart of Fig. 36. First, in step S151, the CPU 121 of the Pokhara service server 9 receives the content ID and access data transmitted by the personal computer 22 during the processing in step S134. In step S152, the CPU 121 stores the content 1D, the access information and the URL of the license server received in the process of step S151 in the Pocara database 10 to the relatives and friends of Pocara ID. 'In step si 53, the CPU 121 executes the processing corresponding to the user's acquisition of the internal processing and the charging. That is, the charge server 13 is requested to settle the amount of the stab in the content. The charging server 13 executes charging processing for the user in accordance with the request. In addition, the charge processing for the provision of this content is charged when the license is provided, so it can be omitted. There is no charge for the provision of content, but it is charged when the license is available. The user does not need to worry about the amount, and can receive and remember the content any number of times. This effectively distributes the content. In addition, by pre-memorizing the content in the device that it is desired to reproduce, even if the capacity of the connected line of the device is small, the device can still use high-quality content. When the user only obtains the content in this way, the content cannot be used yet. That is, when using the content ', it is necessary to further obtain a license required to use the content. Therefore, the personal computer 22 executes the processing shown in the flowchart of Fig. 37 in order to obtain a license. This process also executes a process corresponding to the function selected in step S52 of FIG. In step S171, the CPU 221 of the personal computer 22 enters the Pokhara service server 9. In step 3172, the CPU 221 requests in the Pokhara service server 9 to obtain a license corresponding to the content ID. The content ID is included in the content data received during the processing of step S132 in FIG. 34. 84661 -52- 200409005 In this case, when a license is required, as described later, the Pokhara service server 9 enters the license server to obtain a license. Then, when the license is obtained, the personal computer 22 is notified to obtain the license (the steps in FIG. 38 described later are 94, S195). Therefore, in step S173, the CPU 221 receives the license obtaining notice from the Pokhara service server 92a. The CPU 221 outputs the notification result to the display of output 227 to display it. This allows the user to know that a license has been obtained. Next, with reference to the flowchart of FIG. 38, the processing of the Pokhara service server 9 executed by the personal computer 22 corresponding to FIG. 37 can be acquired and described. In step S191, the CPU 121 of the Pokhara service server 9 receives the license acquisition processing request from the personal computer 22 (the request output during the processing of step § 172 in FIG. 37). In step S192, the CPU 121 determines whether the user has content. When the user obtains the content, the access information for storing the content is stored in the Pocara database 10 (step S152 in FIG. 36). Therefore, cpu ΐ2ι can determine whether the user has content based on the access information. \ In step S192, when it is determined that the user obtains the content, it proceeds to step $ 1%, 21 enters the license server corresponding to each internal id, and requests a license to be issued to the user. In the process of step S152 in FIG. 36, when the user has obtained the content, the URL of the license server is also registered in the Pocara database 10 in order to use the content. In addition, the URL of the server that issued its license is also registered. ~ The license server 8 issues a license when the Pokhara service server 9 requests a license issuance, and transmits the license to the Pokhara service server 9 (step S212 of Fig. 84661 -53- 200409005 described later). Therefore, in step S194, the CPU 121 sends the "password key (the key for decoding the encrypted content) and the license 10 from the license server 8, corresponding to the relatives and friends' Pokhara ID and content m, and Stored in the Pokhara database ⑺. Next, in step S195, the CPU 121 notifies the user (personal computer 22) that the license has been obtained. Then, in step S196, the CPU 121 executes charging processing corresponding to the license acquisition processing. That is, the CPU 121 requests the receiving server 13 to settle the consideration corresponding to the license. The charging server 13 executes the nose processing in accordance with the request. In step S192, when it is determined that the user has no content, it proceeds to step $ 1 and executes error processing. That is, since the user has no content at this time, a license must be obtained. Thus, error processing is performed. Specifically, the cPU 121 transmits an error message to the personal computer 22. At this time, the personal computer 22 receives an error message in step S173 instead of a notification of obtaining a license. The license server 8 executes the processing shown in the flowchart of Fig. 39 corresponding to the access from the Pokhara service server 9. In step S211, the CPU 121 of the license server 8 determines whether a request for license issuance from the Pokhara service server 9 has been received. When it is determined that the request for license issuance is received, it proceeds to step S212 and the self-memory section 128 Read the license corresponding to the content ID contained in the request (the cipher key and license ID for decoding the encrypted content), and transmit it to the Pokhara service server 9. When it is determined in step S211 that the permit from the Pokhara service server 9 is not received 84661 -54- 200409005, the request for issuance of the certificate is not performed, and the process of step S212 is not performed. As described above, when users obtain content and licenses, they can use (reproduce) the content. Next, the processing at this time will be described with reference to the flowchart of FIG. At this time, the user also places relatives and friends Pokhara doll 161 on the platform 23, and when selecting a function, executes a process corresponding to the function selected in step S52 of FIG. In step S231, the CPU 221 of the personal computer 22 enters the Pokhara service server 9. In step S232, the cpu221 specifies the Pokhara service server 9 and requests to reproduce the content. In accordance with this requirement, when the Pocara service feeder 9 obtains the content and license, the user enters the storage destination where the content data is held to obtain the content data. In this example, since the personal computer 22 holds the inner valley data, the personal computer 22 is requested to transmit content data from the Pokhara service server 9 (step S27 of FIG. 41 described later). In step S233, upon receiving the request, the CPU 221 reads the content data of the designated access destination and transmits it to the Pokhara service server 9. The pickup server 9 uses a password key to decode the received encrypted Uchiya data, and transmits the decoded content data (step S275, step S276 of Figure M described later). Q, in step S234 , CPU 221 received from Pokhara service server 9 < Content data. As described above, the content material has been decoded. Because individuals do not need to keep password keys, and do not need to perform decoding processing based on their password keys. Therefore, even if portable devices such as mobile phones, pDA (Personal Digital Assistants), etc. are important, and portable machines that perform complex processing are difficult, 84661 -55- 200409005 can still easily reproduce the content. In step S235, the display section and speaker of the CPU 221 from the output section 227 are lucky to receive the content received during the processing of step S234. This allows users to watch the content. Next, in step S236, the CPU 221 performs a deduction process of the prepaid amount. This process is the same as that performed when the 1C wafer 191 of the Pocara puppet 161 is sold to relatives and friends. If the prepaid amount has not been stored in the chip 171, this process is omitted. In step S237, the CPU 221 transmits a history including the prepaid amount of the debit and the number of times of reproduction to the Pokhara service server 9. The Pokhara service server 9 updates the Pokhara database according to the history (step S9 of the above FIG. 29). The Pokhara service server 9 executes the processing shown in the flowchart shown in FIG. 40 in response to the personal computer 22, and executes the processing shown in the flowchart shown in FIG. 41 as a process corresponding to the Pokhara function selected in step S102 in FIG. In step S271, the CPU 121 of the Pokhara service server 9 waits until the personal computer 22 requests the content to be reproduced (including the content), and when received, determines whether the user of the transmission request has obtained it in step S272. Corresponds to content ι〇 < License. This determination can be made based on whether the content ID contained in the request sent from the personal computer 22 and the license ID are registered in the Pokhara database 10 or not. Of course, at this time, at least one of the Pokhara ID and the user 10 is transmitted from the personal computer 22 during the processing in step S43 in the figure, and has been processed by the Pokhara service server in the processing at step S91 in the figure. 9 receive. When the user obtains a license corresponding to the content ID, the process proceeds to step S73, and in step S273, the CPU 121 enters the source holding the content data 84661-56-200409005 according to the access information. As described with reference to FIG. 34, when using relatives and friends Pokhara to obtain content data, and when recording its content data in the built-in memory section, its device (in this case, a personal computer 22) will be access information for accessing its content data It is transmitted to the Pokhara service server 9 (step S 134 in FIG. 34), and the pokhara service server 9 registers the access information in the pokhara database 10 (step S152 in FIG. 36). Therefore, the CPU 121 can obtain content data based on the access information. Specifically, at this time, the CPU 121 enters the personal computer 22 and requests to read the content data stored in the memory unit 228. According to the request, the personal computer 22 reads and transmits the content data from the location designated by the Pokhara service feeder 9 (the storage unit 228 designated by the access destination information) (step S233 in FIG. 40). Therefore, the CPU 121 receives the content data sent from the device holding the content data in step S274. At this time, the CPU 121 receives the content data sent from the personal computer 22 (Of course, if the content data is held in a device other than the accessed personal computer 22, it enters its device to receive the content data). In step S275, the CPU 121 uses the password key to decode the content data sent from the personal computer 22. This password key is obtained as a license required to reproduce its content, and is stored in the Pokhara database 10 (step S194 in FIG. 38). Next, in step S276, the CPU 121 transmits the content decoded during the processing in step S275 to the incoming personal computer 22 (a device in which the relatives and friends of Pocara 31 are located at the present position). As described above, the content data is received and output in the personal computer 22 (steps S234 and S235 in Fig. 40). In this way, if the cipher key is stored in the Pokhara service server 9, the cipher key 84661 -57- 200409005 does not need to be output to the foreign country ', thus reducing the possibility of the cipher key being stolen. Therefore, it is difficult to interpret the encrypted content and the security is improved. Then, at the end of the content reproduction, the history information is transmitted from the personal computer 22 (step S237 in FIG. 40). Therefore, in step S278, the CPU 128 receives the resume sent from the personal computer 22, and updates the information of the Pokhara database based on the resume. The resume of the child includes the number of times the content has been reproduced, the amount of prepayment after deduction, and so on. In step S272, when it is determined that the user who sent the request has not obtained the license for the content ID, the process proceeds to step S278, and the CPU 121 performs error processing (that is, the error message is transmitted to the personal computer 22 at this time). In step S234, the personal computer 22 receives the error information instead of receiving the content, and outputs it to the output unit 227. In addition, the above is the Pokhara service server 9 to decode the encrypted content data, but it is also possible to transfer the keys from the Pokhara service server 9 to the personal knowledge 2 2 ′ and the content data in the personal computer 22 Decode it. In this way, the encrypted content can be freely downloaded from the content server through the friends and relatives Pocara, which functions as a user agent, and the encrypted content can be freely copied through the relatives and friends Pocara. When copying, its storage location is registered in the Pokhara database 10. The relatives and friends of Pocara registered in the storage location in Pocara database 10 when the instructions were reproduced, and provided their contents to the users. Therefore, the user can view it in the # ′ and further copy it to other devices to reproduce it with the data stream. However, when it comes to reproduction, relatives and friends, Pocara, are always needed. In addition, when the content is copied and reproduced, 84661 -58-200409005 = coded by different keys, even if the keys are stolen, the damage can be suppressed to a minimum. This improves safety. The login to the Pokhara service server 9 can be performed by entering the id and password assigned to the user besides placing the relatives and friends' Pokhara doll 161 on the platform. As a result, a third party may steal the mountain and password, and pretend to be a real user to access the Pokhara service server 9. In this case, when a real user (a user who keeps friends and relatives Pokhara Doll 161) uses relatives and friends Pokhara Doll 161 to log in to Pokhara Service Server 9 from a specific location on the network, Pokhara Service Server 9 pairs Users who log in later will only display the Silhouette of the character of relatives and friends Pokhara Doll 161. At this time, let the user know that the character of relatives and friends Pokhara is being used by other devices. That is, the user can immediately understand that the access to the Pokhara service server 9 is exclusive. Therefore, the reproduction of the content using relatives and friends Pokhara can only be performed on one device on the Internet, and even if the user is not aware of DRM (digital rights management), the copyright of the content can still be protected. The prepaid amount (or the number of repetitions) is stored in the IC chip m of relatives and friends Pokhara doll 161. Each time the content is reproduced, the prepaid amount (or the number of repetitions) is deducted. When) is 0, the user cannot reproduce (use) the content later. Therefore, at this time, the user can reproduce the content again by paying a specific additional amount. The processing at this time will be described with reference to the flowcharts of FIGS. 42 and 43. The process of the flowchart of FIG. 42 is a process of placing relatives and friends of the Pokhara figure 161 on the platform 23 and executing a function corresponding to the function selected in step S52 of FIG. 13. 84661 -59- 200409005 In step S301, the CPU 221 of the personal computer 22 requests the Pokhara service server 9 to update the prepaid amount (or the maximum number of usable times). According to the request, the Pokhara service server 9 transfers the prepaid amount (or the maximum number of usable times) to the personal computer 22 after the charge processing corresponding to the prepaid amount (or the maximum number of times it can be used) (step of FIG. 43 described later) S322 to step S326). Therefore, in step S302, the CPU 221 receives the prepaid amount (or the maximum number of usable times) sent from the Pokhara service server 9. In step S303, the CPU 221 adds the received prepaid amount (or the maximum usable number) to the prepaid amount (or the maximum usable number) of the 1C chip 171 via the writer 241. In this way, the user can reproduce the content again within the range of the prepaid amount (or the maximum number of usable times). The process of the Pokhara service server 9 corresponding to the personal computer 22 shown in the flowchart of FIG. 42 executes the process shown in the flowchart of FIG. 43. That is, this process is a process that executes a function corresponding to the Pocara selected in step S102 of Fig. 28. In step S321, the CPU 121 of the Pokhara service server 9 waits until it receives the request to update the prepaid amount (or the maximum number of times that it can be used) from the personal computer 22. When received, it is determined in step S322 that the request Whether the user (corresponding to the character 311 of relatives and friends Pokhara) uses a credit card. This determination can be made from user information registered in the Pokhara database 10. When the user has a credit card, the process proceeds to step S323, and the CPU 121 withdraws the prepaid amount (or the maximum number of usable times) from the user's request. In step magic, the CPU 121 determines whether the amount corresponding to the prepaid amount (or the maximum number of usable times) drawn during the processing of step S323 is a billable amount. That is, at this time 84661 -60- 200409005 judges whether it is the amount that can be settled by credit card. If the amount exceeds the pre-set base amount, it is determined that settlement cannot be made. When the amount corresponding to the prepaid amount is a settlement amount, the process proceeds to step S325. The CPU 121 executes settlement processing of the amount. That is, at this time, the CPU 121 requests the charging server 3 to perform a charging process corresponding to the prepaid amount. The charging feeder 13 responds to this request, and executes the deduction processing of the prepaid amount according to the credit card number of its user. Of course, in addition to credit cards, this type of processing can also be performed from your bank account. In step S326, the CPU 121 transmits the prepaid amount (or the maximum number of usable times) to the personal computer 22. As described above, upon receiving the personal computer 22, the prepaid amount (or the maximum number of usable times) of the 1C chip 171 of the relatives and friends Pokhara doll 161 is updated (step S303 in Fig. 42). Next, the process proceeds to step S327 'and the CPU 121 updates the history of the user. That is, the prepaid amount (or the maximum number of usable times) held by the user at this time is registered in the Pokhara database 10. In step S322, when it is determined that the user does not have a credit card, or in step S324, it is determined that the prepaid amount is not a settleable amount, the process proceeds to step S328, and the CPU 128 executes an error process. That is, at this time CPum transmits a message to the personal computer 22 that cannot update the contents of the prepaid amount. The personal computer 22 receives the message in step S02 of FIG. 42 instead of the prepaid amount. Therefore, the information is displayed on the display section of the output section 227. This allows users to understand that the prepaid amount cannot be updated. In addition, the process of increasing (updating) such a prepaid amount can also be performed on the prepaid amount stored in the 1C chip 191 of the seller 84661 • 61 · 200409005 selling pokhara dolls 181. When updating the prepaid amount memorized in the sale of Pokhara dolls 181 (:: chip 191), you can also receive funds from your relatives and friends Pokhara. In this way, because the payment settlement is integrated with your friends and relatives Pokhara, it is more convenient. At this time, if the user enters the Pokhara service server 9 by placing relatives and friends Pokhara doll 161 on the platform 23, and then the Pokhara service server 9 displays a menu, and selects "Sell" from its menu. Pokhara Doll Credit (Purchasing Male Discount Coupons) "item. When making this selection, the Pokhara Service Server 9 displays the message" Please place the Pokhara Doll you wish to receive on the platform "to the individual. The computer 22. According to the message, the user removes the relatives and friends of the Pokhara dolls 161 placed on the platform and resells and sells the Pokhara dolls 181. However, at this time, the Pokhara service server 9 uses the corresponding device. The access (connection) continues in this case. After the Pokhara service server 9 (or the content server 6) updates the prepaid amount of the 1C chip 191 that sells Pokhara dolls 181, once again, the "Please "Friends and friends Pokhara doll placed on the platform" message is displayed on the personal computer 22. When the user places relatives and friends Pokhara doll 161 on the platform 23 according to the message, the Pokhara service server 9 according to friends and relatives Pokhara doll 161. Perform a charging process corresponding to the update processing of the prepaid amount for the 1C chip 191 of the sold Pokhara figure 181. Or, when the content cannot be reproduced by selling the Pokhara figure 181, the Pokhara service server 9 Display the message "Whether to add money (purchase coupon)" on the personal computer 22. When the "OK" button is operated, a message prompting the operation to be replaced by the relative and friend Pokhara doll 161 is further displayed. 84661 -62- 200409005 161 replaces the sale of Pokhara dolls 181 on platform 23, and executes charge processing. Then, it is shown again that the operation of promoting the sale of Pokhara dolls 181 to replace relatives and friends of Pokhara dolls 161 on platform 23 Message. The user will place the Pokhara doll 181 on the platform 2 3 according to the message. At this time, the update process of the prepaid amount is performed, and it can be reproduced again. Next, referring to the flowchart of FIG. 44, another processing example of using the family and friends Pocara to reproduce content stored in a specific terminal on the terminal will be described. In addition, the content is as described in the flowchart of FIG. 34 described above. The processing shown has been stored in the memory section 228 of the personal computer 22 as the terminal. In step S401, the CPU 221 of the personal computer 22 causes the title (name) of the stored content to be displayed on the display section constituting the output section 227. The user designates specific content from the displayed title as a reproduction target by operating the input section 226. Therefore, the CPU 221 selects the content designated by the user based on the input of the input section 226 in step S402. In step S403 In this case, the CPU 221 controls the communication unit 229 to transmit the content ID of the content selected in the process of step S402 to the Pokhara service server 9. As described later with reference to Fig. 45, the Pokhara service server 9 transmits error information (step S425) or a password key (step S424) corresponding to the content. In step S404, the CPU 221 determines whether the error information is received. When the error information is received, it proceeds to step S409 and executes error processing. On the contrary, when it is determined that no error information has been received, the process proceeds to step S405, and the CPU 22 J obtains the charging information required for the charging processing according to the user's input, and transmits the charging information to the Pokhara service server 9. In step S406, the CPU 221 receives the 84661 -63- 200409005 password key (the password key transmitted during the processing of step S424) sent by the Pokhara service server 9. In step S407, the CPU 221 uses the password key received during the processing of step S406 to decode the content (password-encoded) selected during the processing of step S402. In step S408, the CPU 221 outputs the content decoded in step S407 from the output unit 227. The Pokhara service server 9 corresponds to the processes of FIG. 44 and above, and executes the processes shown in the flowchart of FIG. 45. In step S421, the CPU 121 of the Pokhara service server 9 receives the content ID sent from the personal computer 22 (transmitted during the processing of step S403). In step S422, the CPU 121 determines whether the user has obtained a license corresponding to the content ID received in step S421. As described with reference to Fig. 31, the Pocara information of relatives and friends Pocara is registered with the content ID as the content information or the license ID as the license information. The CPU 121 determines whether or not a license ID is registered corresponding to the received content ID based on the pokara information of FIG. 31. When it is determined in step S422 that the license corresponding to the content ID has been obtained, the process proceeds to step S423, and the CPU 121 receives the charging information sent by the personal computer 22 during the processing of step S405 and performs charging processing. In step S424, the CPU 121 reads the password key corresponding to the license ID and transmits it to the reproduction terminal (in this case, the personal computer 22). The password key is received in the personal computer 22 in step S406 as described above. When it is determined in step S422 that a license has not been obtained corresponding to the content ID, the process proceeds to step S425, and the CPU 121 executes error processing. Then, the CPU 121 transmits an error message to the personal computer 22. Next, referring to the flowchart of Fig. 46, a process when a terminal which has not stored content reproduces the content will be described. 84661 -64- 200409005 In addition, at this time, if content is registered in the personal computer 26, the personal computer 22 reproduces the content. In step S441, the CPU 221 of the personal computer 22 enters the Pokhara service server 9 'to receive the access information of each content registered in the Pokhara database 100. As described above, the Pocara database 10 registers access information as a content access destination (device holding the content), and the CPU 221 receives the information from the Pocara server 9. In step S442, the CPU 221 ciphers the received access information. < A list of contents and terminals holding them is displayed on the output section 227. The user selects specific content from the displayed content by operating the input section 226. Therefore, in step S443, the CPU 221 determines the access destination based on the access information of the content selected by the input unit 226 and the selected content. In step S444, the CPU 221 controls the communication unit 229 to perform direct connection processing on the access destination that is determined in the processing in step S443. At this time, the personal computer 26 enters the personal computer 26 storing the content from the CPU 221 of the month 22. In step S445, the CPU 221 transmits the content m of the content determined (selected) in step 'S443 to the Pokhara service server 9. As described later, the Pokhara service server 9 sends a password key corresponding to the content ID (step S493 in FIG. 48 described later). Therefore, in step S446, the CPU 221 receives the start of the transmission from the Pokhara service server 9, Code key. In step 8447, the CPU 221 transmits the content ID to the Utsuya providing terminal (in this case, the personal computer 26). In step HS448, the 'CPU 221 determines whether to save the content. This determination is made based on the input from the user. 84661 -65- 200409005 When saving the content, proceed to step S449. When the CPU 221 receives the encrypted content sent from the personal computer 26, it saves it in the memory 228. In step S450, the CPU 221 transmits the update information of the access information to the Pokara service server 9. That is, the content is transferred from the personal computer 26 to the personal computer 22 at this time, and therefore, the access destination of the content in the future becomes the personal computer 22 (the terminal holding the content is the personal computer 22), and the access destination is transmitted to Pokara service server 9. In step 451S451, 0 卩 1; 221 uses the password key received during the processing of step 8446 to decode and reproduce the encrypted content stored in the memory section 228. The reproduction output is output from the output section 227. When it is determined in step S448 that the content has not been saved, in step S452, the CPU 221 uses the password key to decode the content and reproduce it from the data stream of the output unit 227. Corresponding to the processing of the personal computer 22 shown in the flowchart of FIG. 46 above, the personal computer 26 providing content to the personal computer 22 executes the processing of 7F in the flowchart of FIG. 47. First, in step S471, the CPU 221 of the personal computer 26 starts the Pokhara sprite. In step S472, the Pokara Wizard waits until receiving access from other terminals. When receiving access from other terminals (in this case, when receiving access from personal computer 22), it proceeds to step S473 and reproduces itself The terminal receives the content ID. At this time, it is the content ID transmitted by the personal computer 22 when receiving step S447. In step S474, the CPU 221 of the personal computer 26 transmits the encrypted content to the connection source. At this time, the encrypted content is transmitted to the personal computer 22. As described above, the encrypted content is stored in the personal computer 22 at steps S449 84661-66- 200409005, or it is reproduced after being decoded in step S452. With reference to Fig. 48, a process performed by the Kara service server 9 corresponding to the process performed by the personal computer 22 of Fig. 46 will be described. The CPU 121 of the Pokhara service server 9 transmits the access information to the reproduction terminal in step S491. That is, the CPU 121 reads the access information registered in the Pokhara database 10 and transmits it to the personal computer 22. As described above, the personal computer 22 receives the access information in the process of step S441. In step S492, the CPU 121 of the Pokhara service server 9 receives the content ID from the reproduction terminal (the personal computer 22 at this time). This content ID is transmitted from the personal computer 22 during step S445 in FIG. 46. In step S493, the CPU 121 receives the update information of the access information from the reproduction terminal. The update information is transmitted from the personal computer 22 in step S450 of FIG. 46. In step S495, the CPU 121 registers (updates) the access information received in the processing of step S494 in the Pocara database 10. In this way, because the content is moved, the access destination of the content previously registered as the access destination by the personal computer 26 is changed to the personal computer 22. Next, a process of copying the encrypted content to another device will be described with reference to the flowchart of FIG. 49. For example, the content held by the personal computer 26 is copied to the personal computer 52. In step S511, the CPU 221 of the personal computer 22 receives the access information from the Pokhara service server 9. In step S512, the CPU 221 outputs and displays on the output section 227 the encrypted content and a list of terminals storing the encrypted content according to the access information received during the processing in step S511. 84661 -67- 200409005 The user observes this display and specifies the copy source and copy destination by operating the input section 226. Therefore, in step S513, the CPU 221 selects the encrypted content to be copied based on the input from the input section 226, and individually selects the personal computer 26 as the copy source 'and the personal computer 52 as the copy destination. In step 3514, the CPU 221 notifies the copy to the copy source or copy destination. At this time, since the copy source is the personal computer 26 and the copy destination is the personal computer 52, the copy is notified separately. According to the notification, as described later with reference to the flowcharts of FIG. 50 and FIG. 51, the content is transferred from the copy source to the copy destination. In step S515, the CPU 221 of the personal computer 22 determines whether the duplication is completed normally based on the notification from the duplication source or the duplication destination. When the process ends normally, the process proceeds to step S5 16. The CPU 221 updates the access information. That is, at this time, since the content is stored in both, the access destination is both the registered personal computer% and the personal computer 52. When it is determined in step S515 that the copying has not ended normally, the process proceeds to step S5 17 and the CPU 221 executes error processing. In the meantime, the processing of the copy source will be described with reference to the flowchart of FIG. 50. At this time, the child processing is executed by the personal computer 26. In step S531, the personal computer receives a copy notification (copy request) issued from the personal computer 22 during the processing of step S5 14. In step 骡 ”: The CPU 221 of the personal computer 26 reads and stores the contents of the memory section 228 and the step I S533, and transfers its contents from the communication section 229 to the personal computer A. When the transmission ends normally, cpU22l will The contents are notified to the personal computer 仏 84661 • 68- 200409005 Figure 51 shows the processing of the copy destination executed in accordance with the processing of the copy source. At this time, the processing of the M copy destination is performed by the personal computer 52. Personal private brain 52 In step S551, the copy notification (copy request) issued by the personal computer 22 during the processing in step S514 is received. In step §552, the CPU 221 of the personal computer 52 receives the personal computer at the source of the copy during the processing in step 3 In step S563, the CPU 221 of the personal computer 52 records the content received during the processing of step S552 in the memory section 228. When the reception ends normally, the CPU 221 notifies the personal computer 22 of the content. , The user places relatives and friends Pokhara dolls 161 or sells Pokhara dolls 81 on the platform connected to the personal computer 22 in the room 3 to perform various processes, but the user can also Place the Pokhara doll on the platform connected to the machine you want to use. If you correspond to the role of relatives and friends Pokhara 3 丨 丨 and add the function of controlling the TV receiver, users can place the relatives and friends Pokhara doll 161 Control the television receiver 24 on the platform 25 connected to the television receiver 24 arranged in the room 32. In addition, 'If you can place relatives and friends Pokhara doll 161 on the platform 23, you can record it yourself The contents of the computer 22 are used in the room 33. At this time, the user places a relative and friend Pokhara doll 161 on the platform 27 of the personal computer 26 connected to the room 33. At this time, the access is received from the personal computer 26 The Pokhara service server 9 reads the content data recorded on the personal computer 22, decodes it, and transmits it to the personal computer 26. Therefore, users can place relatives and friends Pokhara people at any location (on the platform connected to the machine they want to use) 161) Use content. 84661 -69- 200409005 If the user brings relatives and friends Pokhara Doll 161 to Workplace 5 and place it on the platform 53 connected to the personal computer 52 placed in Workplace 5, the personal computer 52 comes from LAN 5. 1 Connected to Internet 1 via ISP 4, and further connected to Pokhara service server 9 from the Internet. Therefore, users can also confirm the mail transmitted to their home at Work 5. Of course, you can also send it from Work 5. As mentioned above, by carrying relatives and friends Pokhara Doll 161, and placing relatives and friends Pokhara Doll 16 on the platform connected to the device they want to use, they can connect to their devices to play the role of agent Provide related services for relatives and friends Pokhara. The device can also be the mobile phone 61 shown in Figure 丨. However, the mobile phone 61 is not connected to the platform, and the mobile phone 61 has a built-in reader. Therefore, the user can arrange (contact) the relatives and friends of the Pokhara doll 161 near the mobile phone 61 to enter the Pokhara service server 9. When using a mobile phone 61, there is no platform, so it is impossible to always place relatives and friends Pocara Doll 161 on the platform. Therefore, when the self-acting electric pure enters the Pokhara service server 9, and when the action slave 61 arranges the relatives and friends of the Pokhara doll 161 nearby, it is accessed (logged in) in the Pokhara service server 9, and then, even if the self-acting Phone 61 took away the relatives and friends of Pokhara Doll 16 and access (connection) to Pokhara Service Servo State 9 continued. When you use the material to log out, you can display the menu by pressing the button, etc., and select the item to log out from its menu to instruct the log out. When you do this, you can log out. Once, when using the Pocara Doll 181 for sale, the user places the Pocara Doll 181 near the mobile phone 6 (to make contact). At this time, once the access (login) is performed, the access (connection) will continue until the logout using the 84661 -70- 200409005 option menu. & @ Because the CPU of the built-in mobile phone 61 is lower than the built-in PC etc. > rx > TT ^ ^ < CPU. Therefore, when displaying relatives and friends Pokara or Pokara, the resolution, color number, polygon number, coma number, etc. are displayed in a simpler format than when displayed on a personal computer. Pocarabe can be expressed based on XML data. In addition, characters can be displayed using Java (registered trademark). Alternatively, i mode can be used. When carrying τ mobile phone 61 and relatives and friends Pokhara doll 161 at the same time, if the relatives and friends Pokhara doll 16 1 is too large, it is inconvenient to carry. Therefore, the relatives and friends of the Pokhara doll 6i are formed into the size of a key that can be held by the key holder, and can be hung on the strap of the mobile phone 61 as an accessory. Since the 1C chip can be shrunk, it can be formed in a size that can hang the relatives and friends' Pokhara figure 161 on the strap of the mobile phone 61. In addition to mobile phones, the Pokhara service server 9 can also be accessed from various devices such as PDAs, digital cameras, Camcoders, video recorders, DVD projectors, hard disk projectors, car navigation devices, and computer gaming devices. The above mainly describes the use of the content. However, even if the relatives and friends who play the role of agent Pocara do not want to generate the cache information described with reference to Figure 3 丨, analyze the user's preferences and accept the user's instructions, they can still connect themselves. Get the user's favorite content from various servers on Internet 1. Therefore, users can read the cached information through relatives and friends Pokhara. When friends and relatives Pokhara instructed to view the cached information, they displayed a pop-up card that introduced the content that they had previously retrieved. The user can receive the reminder of the previously obtained content 84661 -71-200409005 through this selling pokhara as cached information. That is, the sale of Pokhara is not shown at this time through the sale of Pokhara dolls 181. The same goes for users entering the portal where Pokhara is sold. In these cases, the charges are not made through the sale of Pokhara, but through relatives and friends, Pokhara. Furthermore, you can bookmark the Pokhara ID of Pokhara for sale. If you register the preference information explained with reference to Figure 31, you can quickly enter the URL of Pokhara for sale. In addition, the above are relatives and friends of Pokhara doll 161 and Pokhara Kala Doll 18 1 is an adult figure, but it can also form animals, buildings and other objects. Furthermore, as a modified example of the Bepocara doll, the cover of a compact disc (cd) and a DVD (various digital disc) can be used as an object. At this time, the 1C chip is embedded in its envelope (object). Therefore, when the cover is placed on the mouth of the hair stand, the character of the Pokhara for sale corresponding to the cover is displayed on the device connected to the platform. At this time, when selling Pokhara as its cover, it formed the role of a singer who was singing as the content included in his CD. The character who bought Pokhara conducts a virtual dialogue with the user and introduces the treatment of the corresponding singer's homepage. Or, you can buy Pocara based on the coupons recorded in the IC chip stored in its cover, so that users can listen to the latest songs (contents) of their singers. In addition, for the 1C chip, there is a description of the content recorded on its CD and the promotion information of the singer. Or, when the cover is a DVD cover, the role of the movie protagonist included in it will be sold as Pokhara. The cover of it ... in the chip 84661 • 72- 200409005 Remembering the detailed information of its movie-related production process and discount coupons, etc., the sale of pocara is based on its discount coupons for the sale of movie-related goods. In addition, 'Pokhara can be given the right to obtain content. Users can purchase and sell Pokhara, and provide the service to reproduce the content at any time in a favorite place. At this time, storing in the 1C chip of Pokhara's sale indicates that it is possible. Get the service ID of the internal customer type. If you purchase a Pocara user who has a service ID that can obtain 40 pieces of music, you can get your favorite 40 pieces from the 2500 pieces of music recorded in the content server. Figure 52 shows such a service. Service a is the service that provides music A to music c. The spear is a user who sells Pocara dolls by buying Beboka twist 1 to Pocara 3, and can get service A. In service A, the Pocara image displayed on the screen of the user's personal computer forms a virtual Pocara A. Service B is to provide services from Music D to Music F. Users can purchase any of the Pocara dolls by buying any of Poca Cara 4 or Poca Cara 5 to obtain service b. In service B, the pokara image displayed on the user's personal computer screen forms a virtual pokara B. Service C provides services from music e to music j. Users can purchase any of the Pocara dolls by purchasing any of Pocara 6 to Pocara 9 to obtain service c. In service C, the pokara image displayed on the user's personal computer screen forms a virtual pokara c. Fig. 53 shows a processing flow when π is obtained by selling a pokémon doll. In step S611, the user places the selling Pokhara doll 181 on a platform corresponding to the used state. In the case of using the personal computer 22, the user places a Pokhara doll 84661 -73- 200409005 181 on the platform 23 connected to the personal computer 22. Then, the IC chip of the Pokhara doll 181 is sold to transmit the Pokhara 10, the card ID and the service ID to the personal computer 22. In step S631, the personal computer 22 obtains a Pokhara ID, a card 10, and a service ID. In step S632, the personal computer 632 performs authentication request processing described later with reference to Fig. 54. In step S633, the personal computer 22 transmits the authentication request to the content server 6, and receives it in step S651. In step S652, the content server 6 performs an authentication process described later with reference to FIG. 55. With this, Pokhara is certified. In step S653, the authentication result is transmitted to the personal computer 22, and is received in step S634. In step S635, the personal computer 22 executes initial data acquisition processing described later with reference to FIG. 56. At this time, it is obtained from the sale of Pokhara dolls 181 by using the list of songs (contents) obtained by selling Pokhara dolls 181 and the number of downloadable counters (steps S622, S623). Such data can be decoded using the key stored in the content server 6, but the personal computer 22 cannot decode it. In step S636, the personal computer 22 transmits the data transmitted in step S623 as service information to the content server 6, and receives it in step S654. In step S655, the content server 6 executes an initial data transmission process described later with reference to FIG. 58. As a result, the list of music (contents) obtained by selling the Pokhara doll 181 and the statistics of the number of downloadable times are decoded and stored in the personal computer 22 as sub-knife data. In step S656, the content server 6 transmits the initial data to the personal computer 22 and receives it in step S637. Next, the authentication process of step S631 of FIG. 53 will be described with reference to the flowchart of FIG. 54. In step S701, the CPU 221 of the personal computer 22 determines whether or not to sell the poka 84661 • 74 · 200409005. The pull puppet 181 is placed on the platform 23 and waits until it is determined to have been placed. In step S701, when it is determined that the selling Pokhara doll 181 has been placed on the platform 23, the CPU 221 proceeds to step S702 to obtain the Pokhara ID and service id of the selling Pokhara doll 181. The 1C chip of the Pokhara doll 18 1 is sold, in addition to the above-mentioned Pokhara ID, it also includes a service ID that displays the type of service (such as service A) and a card ID that specifies its 1C chip. These data are encrypted, and the encrypted data are obtained in step S702. In step S703, 0-1221 generates an authentication request based on the data obtained in step 3702, and transmits it to the content server 6. As such, the authentication requirements for the sale of Pokhara dolls 181 are transmitted to the content server 6. Next, the authentication process of step S652 of FIG. 53 will be described with reference to the flowchart of FIG. 55. In step S721, the CPU 121 of the content server 6 receives the authentication request '. In step S722, the Pocara ID, the card ID, and the service ID are decoded using the decoding key. The decoding key for decoding the Pocara id, the card ID and the service ID is stored in the storage section 128 of the server 6 in advance. In step S723, the CPU 121 determines whether the id decoded in step S722 is a proper ID. At this time, the determination of whether it is a proper id is performed as follows. A database is stored in the memory section 128 of the server 6, and a card ID corresponding to the service ID is described to determine whether it is a card ID corresponding to the service ID. In addition, the legitimacy of Pokhara was checked based on the database of the Pokhara ID-list of the sold Pokhara dolls stored in the memory 128. When it is determined in step S723 that the ID is a valid ID, the CPU 121 proceeds to step S724 and transmits the authentication result to the personal computer 22 as authentication κ. In step S723 84661 • 75- 200409005, the CPU 121 proceeds to step S725 when the 'determination is not a proper ID', and the authentication result is transmitted to the personal computer 22. In this way, the authentication of the sale of Pokhara dolls is performed. Next, referring to Fig. 56, the initial data acquisition processing of step S635 in Fig. 53 will be described. In step S741, the CPU 221 of the personal computer 22 receives the authentication result. In step S742, the CPU 221 determines whether the received authentication result is authentication OK. When it is determined in step S742 that the authentication is OK, the process proceeds to step S743, where a counter is obtained from the sale of the Pokhara doll 181 and the downloaded music is completed. The IC chip of the Pocara puppet 181, which has been sold, has the asset shown in FIG. 57 stored therein. If the Pokhara doll 181 is given a service ID that has the right to obtain 40 pieces of content, the content is stored for 1 £) and the date and time of acquisition. In this example, at 13:12 on March 7, 2002, the Western calendar, the content corresponding to the content m "10001" is obtained, and the downloaded music is described as the content 10 "10000". Then, when a content is acquired (downloaded), the value of the counter indicating the number of downloadable times is only decreased by one. The initial number of downloads is 40. In this example, since a content and license have been downloaded, the value of the counter becomes 39. In addition, the information of 7F in FIG. 57 is encrypted and stored. In step S743, Beixun is obtained in the encrypted state. In step S744, the CPU 221 attaches a special foot to the counter and the downloaded music. < header, and generate service information and transmit it to the content server 6. In addition, in step S742, when it is determined that the authentication is not valid, that is, when the authentication is NG, the CPU 221 proceeds to step S745 and executes error processing. In this way, stored in the sold Pokhara dolls 181 (1: the content of the song indicating the completion of the download in the chip 10 and the value of the number of downloadable counters are transmitted to the content server in a secret code of 84661 -76- 200409005. 6. The CPU 121 of the initial capacity server 6 of step S655 of FIG. 53 is next, and the data transmission process is explained with reference to the flowchart of FIG. 58. In step S76, the internal money information is set in step 62, and the counter is set. 1. Downloaded music ... Solution I In addition, the decoding device that decodes the leaf number and downloaded music is stored in advance in the memory section 128 of the content server 6. In step S763, the CPU 22U5l obtains Pokara resources. Pokara Resources are based on three-dimensional images of characters displayed on the output section of a personal computer ^, their characters < The data composed of the information such as the dialogue data and the name of the character is stored in the storage unit 128 of the content server 6 in advance. Pokhara resources exist within each service and are specified in correspondence to service 10. In step S764, the CPU 121 attaches specific headers to the counter, downloaded music and pokara resources, and transmits them to the personal computer 22 as initial data. The transmitted initial data is stored in the memory section of the personal computer 22. In this way, the list of songs acquired and downloaded using the sold Pokhara doll 181 and the number of downloadable times are identified by the personal computer 22. In addition, since the information contained in the 1C chip of the Pocara Doll 181 is encrypted and can only be decoded by the content server 6, it is possible to more reliably prevent the information from being tampered with. In step S764, the image shown in FIG. 59 is displayed on the display section of the output port 227 of the personal computer 22 based on the transmitted Pokara resources. Figure 59 shows the virtual Pocara 501 used by the service, and a dialog box 502 as its narration. In the dialog box 502, the text "LEGA's live performance seems to be at LUIDA in Harajuku on April 20" is displayed. 84661 -77- 200409005 Service provider updated ^ new information. In addition, Karabei source can always provide users with the best access to the users. \ Γ Purchasing and selling users of Pocara dolls, such as: taking the latest information of singers who are interested in themselves, users can easily perform 1 « . I 贝 叙 # 疋 confession, its person, referring to FIG. 60, said that download processing n y Pocara figure 181 performs content calculation. At the end of the above-mentioned processing referring to FIG. 53 in the servo 2 ° S831, the personal computer 22 transmits the τ load request to the content H and is pure at step 1. If the user asks for the transmission, if the user knows it as the input section 226 of the personal computer 22, enter a specific command line 0 in step S862 to perform a list transmission process. To the personal computer 22, the content server 6 executes the content described later with reference to FIG. 61. In step S863, the content server 6 transmits the content list and receives it in step S832. In step S833, the personal computer 22 executes download processing described later with reference to FIG. 64. With this, you can specify the content to download or preview (listen to) and transfer it to the content server 6. In step S834, the personal computer 22 transmits a download request or a preview request to the content server 6, and receives it in the step separate material. In step S865, the content server 6 executes content transmission processing described later with reference to FIG. 67. Thereby, the content is transmitted to the personal computer 22 and received in step ss35. In addition, the transmission service information is received by the personal computer 22 in step S836, and is received by the sale of Pokhara doll 181 in step S811. Next, the content list transmission processing in step S862 of FIG. 60 will be described with reference to FIG. 61. In step S901, the content server 6 < cpu 121 generates a content list corresponding to the service ID. 84661 -78- 200409005 In the memory section 128 of the content server, the database shown in FIG. 62 is stored. In this example, a service ID, a license, and a download completion ID corresponding to the content ID are stored. For example, "100" is described in the first column as the service ID corresponding to the content "1001". If it is a sales pokhara with service 11} "100", it means that the content corresponding to the content 10 r 1〇001 ". In addition, "XXXX" is described as a license, and content corresponding to the content ID "1001" indicates that it can be decoded using the license "χχχχ". Download completed (Pocara) ID descriptions include "A", "B", and "c", and the sale of Pocara with Pocara ID "A", "B", and "c" indicates that the content ID "1〇" has been downloaded 〇1 "content. Furthermore, a database shown in Fig. 63 is stored in the storage section 128 of the content server. This database stores the song name corresponding to the content ID, the number of points sold this week, the cumulative number of points sold, the name of the recorded song, and a new song flag indicating whether the song is a new song. And memorize the name of the singer, the name of the composer, the name of the composer, and the performance time. In addition, the path to the album cover file introducing the music, the path to the music file (such as a WAV file) of the music, the path to the Karao & data file, and the path to the cover photo file are described. It also describes the opening date, genre name, preview start frame number, and preview end frame number of the music. When the service 10 received in step S631 (Fig. 53) is "100", in step S901, the content corresponding to the content m "1001" and "1003" is generated. Content list. The content list includes the title of the content, the name of the artist, the name of the recorded song, and the number of points sold. In step S902, the CPU 121 transmits the content list to the personal computer 22. 84661 -79- 200409005 In this way, the list of downloadable songs is transferred to the personal computer 22. Next, referring to the flowchart of Fig. 64, the download processing of step S833 of Fig. 60 will be described. In step S921, the CPU 221 of the personal computer 22 receives the content list. In step S922, the CPU 221 determines whether the number of downloadable times exceeds i. In step S637 (Fig. 53), the number of downloadable times is transmitted from the content server 6, and is obtained by referring to the value of the counter stored in the initial data of the personal computer 22. In step S922, when it is determined that the number of downloadable times exceeds 丨, the CPU 221 enters a step% S923 to display a download screen. At this time, the screen shown in Fig. 65 is displayed on the display section of the output section. In FIG. 65, a virtual Pocara 501 dialog box 5 11 is displayed, and a download list screen 5 10 is displayed on the upper left side thereof. FIG. 66 is a display example of a download list screen 51o. Seat 531 is a field that displays the artist name of the displayed content. The user can display the song name and sales performance of the content corresponding to the artist in position 536 by entering the required artist name in the space 531 . In this example, a list of the song titles and sales results is displayed for each of the singers "Panasonic Aya". In this example, 'the name of the singer whose content is entered in field 531, but in field 53 1 if you enter the type of Yuta Toru Hachiman page research can be displayed in field 536 corresponding to its type Content title and sales results. The number of downloadable times (number of songs) is displayed in the seat 532. In this example, the remaining factory X songs are displayed. " In addition, in this screen, after the user enters the title of the song in the shelf 533, or enters the title of the song in the field 534, clicks Search and press ㈣ $ to retrieve the desired content (music). 84661 -80- 200409005 Returning to Fig. 64, in step S924, the CPU 221 determines whether the content has been designated, and waits until it is determined that it has been designated. The content can be specified by clicking the song title in the field 536 in FIG. 66 once. · In step S924, when it is determined that the content has been designated, the process proceeds to step S925, and the CPU '22 determines whether a preview (listening) has been designated. The preview instruction is performed by the user clicking the preview button 537 of FIG. 66. In step S925, it is determined that has been instructed. When previewing, the process proceeds to step S926, and the CPU 221 transmits the preview request to the content server 6. φ In step S925, when it is determined that the preview is not instructed, the process proceeds to step S927, and the CPU 221 determines whether downloading has been instructed. The download instruction is performed by the user clicking the download button 53 8 in FIG. 66. In step S927, when it is determined that downloading has been instructed, the process proceeds to step S928, and the CPU 221 transmits the download request to the content server 6. After the processing in step S926 or S928, the CPU 221 in step S929 will correspond to the one specified in step S924. The content ID of the content is transmitted to the content server 6. Xin In step S922, it is determined that the number of downloadable times does not exceed 1, that is, when it is determined that downloading cannot be performed in the future, or in step S927, when it is determined that downloading is not instructed, the process proceeds to step S930, and the CPU 221 executes error processing. In this way, the required content is downloaded. · Next, the content transmission processing in step S865 in Fig. 60 will be described with reference to Fig. 67. ^ In step S951, the CPU 121 of the content server 6 receives a download request or a preview request, and receives a content ID in step S952. In step S953, the CPU 121 determines whether the data 84661 -81-200409005 received in step S951 requires downloading. When it is determined that downloading is required, it proceeds to step S954 and executes download content transmission processing described later with reference to FIG. 68. In addition, when it is determined in step S953 that the download is not required (the preview is required) Λ, the process proceeds to step S955, and the CPU 121 executes a preview content transfer process described later with reference to FIG. 70. _ Next, the download content transmission and processing of step S954 in FIG. 67 will be described with reference to FIG. 68. In step S971, the CPU 121 obtains downloading data corresponding to the content ID.资料 The data shown in FIG. 69 is stored in the memory section 128 of the content server. The music edge data 601 is a file group in which information such as the performance time of the music is described, the lyrics data 602 is a file group in which the lyrics of the music is described, and the album cover description 603 is a file group in which a comment introducing the content of the music is described. Cover photo 604 is a group of computer-readable files (such as JPEG files) created from the CD cover photos of his music, and music data 605 is a group of music files (such as WAV files) of his music. The music piece edge data 601 to the music piece data 605 are constituted by a plurality of files of each music piece, and each file is specified corresponding to the content ID. _ As described above, the database shown in FIG. 63 is stored in the storage unit 128 of the content server. When specifying the content ID, it specifies the path to the album description file corresponding to its content ID, and to the music data file. The path to the karaoke data (song data and lyrics data) file and the path to the cover photo ~ Λ film file. In step S971, the CPU 121 designates a file corresponding to the content ID from the music edge data 601 to the music data 605, and merges these files to obtain downloading data. In step S972, the CPU 121 transmits the download data 84661 -82- 200409005 obtained in step S971 to the personal computer 22 as content. In step S835 (FIG. 60), the transmitted content is received by the personal computer 22 and stored in the storage unit 228. The content transmitted at this time is encrypted and stored in the memory section 228 under the encrypted state. In order to reproduce the encrypted content, it is necessary to decode the content (license). The content will be described later. In addition, 'the display of the output unit 227 of the personal computer 22 receiving the downloading data is displayed on the screen' as shown in the dialog box 5 11 of the display screen shown in FIG. 65 (eg, “X% download completed” in step In S973, the CPU 121 determines whether the content has been downloaded. At this time, it is determined whether the content has been downloaded based on the download completed music in the service information obtained in step S654 (FIG. 53). In step S973, it is determined whether the content has been downloaded. When the content is not downloaded, the process proceeds to step S974. The CPU 121 updates the downloaded completed music in the service information obtained in step S654 (Fig. 53). If the content corresponding to the content ID "1002" is transmitted, the download is completed "1002" is added to the piece of music. In step S975, the CPU 121 deducts the value of the counter in the service information obtained in step S654 (Fig. 53). Next in step S976, the CPU 121 divides steps 74 and 74. The updated service status in S975 is transmitted to the personal computer 22. The transmitted service information is received by the personal computer 22 in step S ^ 6 (Fig. 60), and stored in step s8ii in the Pokhara doll 181. 1C chip. In step j, the CPU 121 updates the database. At this time, the download completion ID is updated in the shell database shown in FIG. 62. For example, the download using the Pokhara ID "A" for Fen Pokhara's corresponds to the content ID "1 〇 〇3 ", the download completion ID in the third 84661 -83- 200409005 column is marked with" A ". In addition, if it is determined in step S973 that the content is downloaded, skip steps S974 to S977. In this way, the downloaded content is transmitted, and the information in the chip 1C of the Pocara Doll 181 is also updated at the same time. With reference to FIG. 70, the preview content transmission of step S955 in FIG. 67 is explained. In step S991 In the process, the CPU 121 obtains preview data corresponding to the content ①. At this time, the file corresponding to the content ID is specified from the music edge data 601 to the music data 605 of FIG. 69, and starts from the preview in the database of FIG. 63. Frame number and preview end frame number, extract specific data from the file, and combine them as preview data. In addition, you can also prepare in advance preview music edge data 601 to music data 605, which has a poor picture and sound quality. from The file corresponding to the content ι0 is specified and merged as the preview data. In step S992, the CPU 121 transmits the preview data obtained in step S991 to the personal computer 22. As a result, the content preview (trial listening) is performed. ). In the preview, since the number of downloadable times (counter • ^ value) stored in the IC chip of the sold Pokhara doll is not deducted, the user can listen to the music at will. In addition, the personal computer that receives the preview data Reproduce the data in 22. At this time, on the display section of the output section 227 of the Z computer 22, as shown in the dialog box 5 11 of the display screen shown in FIG. 65, the contents of the album cover are displayed. The user can reproduce the contents obtained (downloaded) using the sold Pokhara figure 181. The machine used for reproduction may also be a machine for downloading content, or a machine different from 84661 -84-200409005. When using the downloaded personal computer 22, the user places a Pocara doll 181 on a platform 23 connected to the personal computer 22. At this time, the personal computer 26 has not been downloaded. The user puts a Pokhara doll on the station 27 connected to the personal private station 22, and then performs ginseng knowledge and the same process as described above in FIG. 53. Store initial data in PC 2 2 or 26. In addition, the machine used in this example is a personal computer 22 or 26, but the machine used is not limited to this. Next, a flow of reproduction content processing will be described with reference to FIG. 71. In step §1101, the personal computer 22 or 26 performs the list display processing described later with reference to FIG. 72. This ’displays a list of content and specifies what content the user must reproduce. At this time, it is searched whether the designated content exists in the memory section 228 of the personal computer 22 or 26. For example, when the user uses the personal computer 22, the contents are stored (downloaded) in the memory section 228, but if the user uses a personal computer to do so, there is no content in the memory section 228. When the content does not exist in the memory section 228, the internal contents are transmitted from the personal computer 26 to the content server 6 in step 3, and are received in the miscellaneous CD. In step S 113 2, the content temple is crying &, At y, the τ gate is struggling for 6 content lines corresponding to the content transmission process. Since this processing is the same processing as the above-mentioned content transmission processing referring to _67 ', its explanation is omitted. In step S33, the content server 6 transmits the content to the personal computer 26 'and receives it in step su03. In addition, when the user uses the personal computer 22, since the contents have been memorized (contained below 84661 -85-200409005) in the memory section 228, the processing of steps S1102, SU31, S1132, S1133, and S1103 is not performed. In step SU04, the 'personal computer 22 or 26' performs the license request processing with reference to the drawing and described later. In step, the personal computer 22_ transmits the license request to the content server 6 and receives it in step S34. In step SU35, the content server 6 performs a license transmission process described later with reference to FIG. Thereby, a license for a decoding key for transmitting the encrypted content is transmitted. In step% S106, the content server 6 transmits the license to the personal computer 22 or 26 and receives it in step S1106. In step 31107, the personal computer 22 or 26 performs license reproduction processing 1 described later with reference to FIG. 77 to reproduce the content. Next, the list display processing of step sn〇1 in FIG. 71 will be described with reference to the flowchart in FIG. 72. In step_1, the CPU 221 of the personal computer 22 or 26 displays a reproduction screen. At this time, the image shown in Fig. 73 is displayed on the display section of the output section 227. Fig. 73 shows a virtual pokara 501 and a dialog box, and a reproduction list screen 5 61 is displayed on the upper left side. Fig. 74 is a diagram showing a display example of a reproduction list screen 561; Field 581 is a stop for displaying the artist name of the content displayed in 7F. The user can enter the name of the artist in field 58} to display the answer name and purchase corresponding to the artist in field 583 Date (acquisition date P) In this example, the content of the singer "Aya Matsushita" is displayed with a list of song titles and purchase dates. Contents that are not shown in column 538 have been stored in memory 228 84661 -86- 200409005 The title and date of purchase are shown in dark colors, and the title and purchase date of the content that has not been memorized in the memory section 228 are displayed in light colors. The title of the song "Peachy Miss" in the first column of column 538 and its purchase date are "02" is displayed in a light color. The content was obtained in the past using the selling Boca twisted doll 18 1 but it is not stored in the memory section 228 of the personal computer currently in use, that is, the content indicates that it is Downloaded by machine. The title of the song "1000 times KISS" in the second column of field 538 and its purchase date "2002/04/04" are displayed in dark colors, and its content indicates that it used to buy Pokhara dolls 181 And get and remember The memory section 228 of the personal computer currently in use. In this example, the name of the singer who entered the content is displayed in the block 581, but it can also be entered in the block 581. Bit 583 shows the content title and purchase date corresponding to its genre. The number of owned music is displayed in field 582. The number of owned music indicates the number of content downloaded (acquired) using the sold Pokhara doll 181, which is shown in this example. It is "Y song". Returning to FIG. 72, in step S1202, the CPU 221 determines whether the content that has been reproduced has been instructed, and waits until it is determined that it has been instructed. The instruction of the reproduced content is input by the user as an operation The unit 226 clicks the desired song name twice in the reproduction list screen shown in FIG. 74 to perform it. When it is determined in step s202 that the reproduction has been instructed, the CPU 221 proceeds to step 31203. In step S1203, the CPU 221 determines whether the reproduced content is in the terminal (the machine in use). If the reproduced content indicates the content in the first column of the field 583 in FIG. 74 (the title "Peachy Miss"), Judging the content of reproduction is not final 84661 -87-200409005, and proceed to step S1204, the CPU 221 transmits the content ID corresponding to the specified content to the content server, and downloads the content. At this time, the content is transmitted from the content server 6 to the personal computer 22 or 26. This content transmission process (step S 1132 of FIG. 71) is the same process as the above-mentioned transmission processes with reference to FIG. 67 and FIG. 68, but the content is determined in step S973 (FIG. 68) at this time. In order to complete the download, the processing from steps mm to S977 is skipped. In addition, if the content of the reproduction is the content of the second column of the instruction field 583, "the title" 1000 times KISS ", it is determined that the reproduced content is in the terminal. Therefore, the processing of step S1204 is skipped. In this way, the designation of the reproduction content is downloaded when the content is not in the terminal. Next, referring to the flowchart of FIG. 75, the license request processing of step S1104 of FIG. 71 will be described. In step S1221, the CPU 221 of the personal computer 22 or 26 obtains a content ID corresponding to the specified content. In step S1222, the CPU 221 attaches a specific header to the content ID obtained in step S1221, and transmits the license request to the content server 6. As such, license requirements for reproducing content are made. Next, referring to Fig. 76, the license transmission processing of step S1135 in Fig. 71 will be described. In step S1241, the CPU 121 of the content server 6 receives a license request. In step S1242, the CPU 121 determines whether the content download is completed. At this time ', it is checked whether the content is downloaded with reference to the database shown in FIG. In step S1243, the CPU 121 generates a license that can reproduce the content only once. The license is generated by using the descriptions of OpenMGX, Windows, 84661 -88-200409005 DRM (Several kinematics management) and so on. In step si244, the CPU 121 transmits the license to the personal computer 22 or 26. As such, a license is transmitted to key that decodes the encrypted content. Next, referring to the flowchart of FIG. 76, the license reproduction process of step S1107 in FIG. 71 will be described. In step S1261, the CPU 221 of the personal computer 22 or 26 receives the license. In step S1262, the CPU 221 decodes and reproduces the content according to the obtained license. At this time, the image shown in Fig. 78 is displayed on the display section of the output section 227 of the personal computer 22 or 26. FIG. 78 shows a virtual pokara 501 and a dialog box 562, a reproduction list screen 561 is displayed on the upper left side of the virtual pokara 501, and a jacket photo 563 of the content is displayed on the lower left side of the virtual pokara 501. The lyrics of the content being reproduced are displayed in the dialog box 562 of the display screen, and the virtual pokara 501 performs a specific action. This is how the content is reproduced. In this way, the license for reproducing content can be managed by the content server 6. In addition, since the content is encrypted, in order to reproduce it, it is necessary to obtain a license by selling the Pocara Doll 181, so even if the content is copied improperly, it cannot be reproduced and the copyright of the content can be protected. In addition, users who purchase the Pocara Doll 181 only need to place the Pocara Doll 18 丨 on the platform to easily reproduce the content. When the content is reproduced, it is necessary to determine in the content server 6 whether the ID of the sale of Pokhara is a proper id. Therefore, the copyright of the content can be protected more effectively. The above is a description of a license for the content obtained through the management of the content server 6, but the license can also be stored in a 1- € 84,861-89-selling Pokhara figure 181. When reproducing the content, Obtained a license to sell Pokhara dolls 181. In this way, the user can freely obtain and reproduce the content corresponding to the service ID of the sold Pokhara figure 181. By keeping the user identification information in the object, the image corresponding to the object is displayed on the display, so that the user can immediately understand the relationship between the object and the object, and can avoid using the object of other users by mistake. Juli user identification information, when receiving user identification information sent from other information processing devices, authentication is based on user identification information management of the received user identification information, and according to the authentication results, other information processing devices are via the Internet The transmission display displays the required display information for the image corresponding to the user identification information, so that users who use other information processing devices can be easily and surely identified. The obtained user identification information is transmitted to other information processing devices via the network. According to the user identification information, the result is received from the other information processing devices, and then an image corresponding to the user identification information is displayed according to the authentication result. The way to control can make use of authentic authentication itself. By having the puppet in the memory, the user can recognize the frame in the memory and make the shape of the puppet correspond to the shape of the displayed image. This allows the user to use the puppet for authentic authentication. deal with. … With 77 objects with memory object identification information, when receiving object identification information via the network, the content identification information corresponding to the object identification information is obtained, and the content corresponding to the content identification information is transmitted over the network #, which can be achieved The system can be more effectively allocated to each user. The second and the second information processing devices are identified by the network and transmitted according to the second other information processing device 84661 200409005. < The user can enter the fee processing to securely provide the content to each user, and JL can certainly recover the price for the provided content. Obtain the content identification information stored in the object, and transmit the internal valley identification information to other information processing devices via the network, receive the corresponding content, and output the received "internal $, just obtain the object, you can use the correct With its content. ~ Since the puppet identification information is stored in the memory held by the puppet, and the shape of the puppet corresponds to the content-related image, the content can be effectively distributed to the user. By storing the content identification information in the memory held by the object, and maintaining the characteristics corresponding to the content-related image in the object, the user can use the content happily. The above-mentioned series of processing can also be executed by hardware or software. When a series of processing is performed by software, programs constituting the software are installed from a network and a recording medium on a computer equipped with dedicated hardware, or various functions such as a general-purpose personal computer can be performed by installing various programs. As shown in FIG. 2 or FIG. 3, the recording medium is a program disk 141, 2 5 1 (including a floppy disk), and an optical disc 142, which are provided to the user in addition to the device body. 252 (including CD-ROM (read-only memory disc), DVD (various digital discs)), magneto-optical discs 143, 253 (including MD (mini-disc)), or semiconductor memory 144 '254, etc. In addition to the package software media structure, it can also be used in a state of being pre-assembled in the body of the device. 84661 -91- 200409005 122, 222 and memory sections 128, 228 include hard disks with recorded ROMs and other programs. . In addition, the procedures described in this manual for the programs recorded in the recording medium are, of course, processes performed in the time sequence in the order described, and even if they are not time-series processes, they also include processes executed in parallel or individually. In addition, the term "system" as used in this specification refers to an entire device constituted by a plurality of devices. [Industrial use feasibility] As described above, by adopting the information processing system and the information processing method of the present invention, a system and system that can identify users can be realized. In addition, a system can be realized which can prevent users from misusing objects. By adopting the -information processing device and the -information processing method, the f-program storage medium and the first program of the present invention, it is possible to reduce other users in other information processing devices. In addition, users who use other information processing devices can be sure that they have obtained the correct certification results. By using the first information processing device and the second information processing method, the first program storage medium, and the second program of this Maoming, the user can be authenticated reliably. In addition, users can be sure whether to obtain the correct authentication results. With the first puppet of the present invention, the user who holds it can be reliably identified. In addition, you can avoid misusing other puppets to authenticate themselves. By using the information providing system and method of the present invention, a system capable of distributing many internal answers can be realized. In addition, a system that can securely distribute content can be realized. By adopting the third information processing device, the third information processing method, the third program storage medium, and the third program of the present invention, it is possible to surely provide content to those who use 84661 -92- 200409005. In addition, the content can be reliably recovered from its users. The price. It is known that the fourth information processing device, the fourth information processing method, the fourth private storage medium, and the fourth program of the present invention can provide the required content in the machine in use by the user. It is known that the fifth information processing device and the fifth information processing method, the fifth private storage medium, and the fifth program of the present invention can easily and quickly use the content. Furthermore, there is no need to complicate its structure. With the second doll of the present invention, it is possible to easily and surely stimulate the content desire of the user. In addition, content can be provided to users securely and reliably. By adopting the object of the present invention, users can enjoy content more. [Brief Description of the Drawings] FIG. 1 is a block diagram showing a configuration example of an information processing system to which the present invention is applied. FIG. 2 is a block diagram showing a configuration example of the Pokara service server of FIG. FIG. 3 is a block diagram showing a configuration example of the personal computer of FIG. 1. FIG. Figure 4 shows a puppet of a relative and friend. Fig. 5 is a block diagram showing the internal structure of relatives and friends of the Pokhara doll. FIG. 6 is a diagram illustrating the information stored in the IC chip of FIG. 5. FIG. FIG. 7 is a flowchart illustrating a process in which a user obtains a relative and friend's Pokhara doll. Figure 8 shows a puppet of relatives and friends. Fig. 9 is a flowchart illustrating the pocara sales process of relatives and friends of the pocara service server of Fig. 1; Fig. 10 shows a pokhara doll sold. Fig. 11 is a diagram showing a kind of goods stored in the 1C chip of the sold Pokhara figure 84661 -93- 200409005. FIG. 12 is a flowchart illustrating the Pokhara process of the personal computer of FIG. 1. FIG. FIG. 13 is a flowchart illustrating the Pokhara process of the personal computer of FIG. 1. FIG. Fig. 14 is a flowchart illustrating the Pokhara process of the personal computer of Fig. 1. FIG. 15 is a flowchart illustrating the Pokhara process of the personal computer of FIG. 1. FIG. FIG. 16 is a flowchart illustrating the Pokhara process of the personal computer of FIG. 1. FIG. Figure 17 illustrates the briefcase information of relatives and friends Pokhara. Figure 18 is a diagram explaining the briefcase information of Bepokara. Fig. 19 is a diagram showing a display example of Pokhara. Figure 20 shows an example of a display of Pokhara. FIG. 21 is a diagram showing an example of a Pokara display when the mail function is selected. Fig. 22 is a diagram showing another display example of Pokara when the mail function is selected. Fig. 23 is a diagram showing an example of a Pocara display when the calendar function is selected. Fig. 24 is a diagram showing other display examples of Pocara when the calendar function is selected. Fig. 25 is a diagram showing an example of a Pocara display when a change-over function is selected. Fig. 26 is a diagram showing another display example of Pokhara. Fig. 27 is a diagram showing another display example of Pokhara. FIG. 28 is a flowchart showing the processing of the Pokhara service server of FIG. 1. FIG. FIG. 29 is a flowchart illustrating processing of the Pokhara service server of FIG. 1. FIG. — Figure 30 is a diagram showing a user and information registered in the Pokhara database in Figure 1. Fig. 31 is a diagram showing information of relatives and friends of Pocara registered in the Pocara database of Fig. 1. 84661 -94- 200409005 Fig. 32 is a diagram showing a Pocara information registered in the Pocara database in Fig.1. FIG. 33 is a flowchart illustrating processing of the content server of FIG. 1. FIG. FIG. 34 is a flowchart illustrating content receiving processing of the personal computer of FIG. 1. FIG. FIG. 35 is a flowchart explaining the content providing processing of the content server of FIG. 1. FIG. FIG. 36 is a flowchart illustrating the processing of the Pokhara server of FIG. 1. FIG. FIG. 37 is a flowchart illustrating the process of obtaining a license for the personal computer of FIG. 1. FIG. FIG. 38 is a flowchart illustrating processing of the Pokhara service server of FIG. 1. FIG. FIG. 39 is a flowchart illustrating processing of the license server of FIG. 1. FIG. FIG. 40 is a flowchart illustrating content reproduction processing of the personal computer of FIG. 1. FIG. Fig. 41 is a flowchart illustrating the content reproduction processing of the pokara service feeder of Fig. 1; FIG. 42 is a flowchart illustrating a prepaid amount update process of the personal computer of FIG. 1. FIG. FIG. 43 is a flowchart illustrating a prepaid amount update process of the Pokhara service server of FIG. 1. FIG. FIG. 44 is a flowchart illustrating content reproduction processing stored in the terminal. Fig. 45 is a flowchart illustrating the processing performed by the Pokara service server when the content in the terminal is reproduced. Fig. 46 is a flowchart illustrating a terminal reproduction process that receives content provision from another terminal. FIG. 47 is a flowchart illustrating a content providing process of the terminal. Figure 48 is a flowchart illustrating the processing of the Pokara Service Temple Server 84661 -95- 200409005 when the content of the terminal is reproduced. FIG. 49 is a flowchart illustrating a copy process of encrypted content. Fig. 50 is a flowchart illustrating processing of a copy source. Figure 51 is a flowchart illustrating the processing of the copy destination. · Figure 52 is a diagram showing the structure of a service that sells content provided by Pokhara. · Figure 53 is a flowchart showing the flow of the authentication and initial data acquisition process for the sale of Pokhara. Figure 54 is a flowchart illustrating the processing of the authentication request. Fig. 55 is a flowchart illustrating authentication processing. _ Fig. 56 is a flowchart illustrating initial data acquisition processing. Figure 57 shows a vUL chart of the data stored in the 1C chip of the Pokhara doll. FIG. 58 is a flowchart illustrating an initial data transmission process. FIG. 59 is a diagram showing a display example of a screen displayed when data is acquired. Fig. 60 is a flowchart showing a processing flow for downloading content using the sale of Pokhara. FIG. 61 is a flowchart for explaining a content transmission process. _ Figure 62 shows a database diagram stored in the content server. FIG. 63 is a diagram showing a database stored in a content server. Fig. 64 is a flowchart illustrating download processing. · Fig. 65 is a diagram showing an example of the daytime display displayed when the download process is not performed. … Fig. 66 is a display example of a download list screen. Fig. 67 is a flowchart illustrating a content transmission process. -Figure 68 is a flowchart illustrating download content transmission processing. 84661 -96- 200409005 Figure 69 shows a diagram of content data that is stored in the content server. FIG. 70 is a flowchart illustrating a preview content transmission process. Fig. 71 is a flowchart showing the flow of reproduction content processing using the sale of Pocara. Fig. 72 is a flowchart illustrating a list display process. FIG. 73 is a diagram showing a display example of a screen displayed in the list display processing. Fig. 74 is a diagram showing a display example of a reproduction list screen. Figure 75 is a flowchart illustrating the processing of a license request. Fig. 76 is a flowchart illustrating a license transmission process. Fig. 77 is a flowchart illustrating a license reproduction process. Fig. 78 is a diagram showing a display screen during license reproduction processing. [Illustrative Symbols] Internet 2 3 4 5 6, 7 8 9 10 11 12 Internet Service Provider (ISP) Family

ISP 職場 内容伺服器 許可證伺服器 波卡拉服務伺服器 波卡拉資料庫 私人認證伺服器 公用認證伺服器 84661 -97- 200409005 13 收費伺服器 15 基地台 21,51 LAN(區域網路) 22,26,52 個人電腦(PC) 23,25,27,53 站台 24 電視收訊機(TV) 31 〜33 房間 61 行動電話 121,221 CPU(中央處理單元) 122,222 ROM(唯讀記憶體) 123,223 RAM(隨機存取記憶體) 124 匯流排 125,225 輸入輸出介面 126,226 輸入部 127,227 輸出部 128,228 記憶部 129,229 通信部 130,231 驅動器 141,251 磁碟 142,252 光碟 143,253 光磁碟 144,254 半導體記憶體 161 親友波卡拉人偶 171 1C晶片 84661 -98- 200409005 172,192 天線 181 販賣波卡拉人偶 191 1C晶片 230 連接部 241 讀寫器 321-1 〜321-7 圖符 311 特徵 351,361,371,381 視窗 341,391,502,51 1,562 白框 401 出口 501 虛擬波卡拉 531,532,533,534,536,538, 581,582,583 爛位 535 檢索按紐 537 預覽按鈕 561 重現列表晝面 601 樂曲邊緣資料 602 歌詞資料 603 唱片套說明 604 封套照片 605 樂曲資料 510 下載列表畫面 301 出場口 84661 - 99 -ISP Workplace Content Server License Server Pokhara Service Server Pokhara Database Private Certificate Server Public Certificate Server 84661 -97- 200409005 13 Charge Server 15 Base Station 21,51 LAN (Local Area Network) 22,26 , 52 Personal computer (PC) 23, 25, 27, 53 Platform 24 TV receiver (TV) 31 to 33 Room 61 Mobile phone 121, 221 CPU (central processing unit) 122, 222 ROM (read-only memory) 123, 223 RAM (random storage (Access memory) 124 bus 125,225 input and output interface 126,226 input section 127,227 output section 128,228 memory section 129,229 communication section 130,231 drive 141,251 disk 142,252 optical disk 143,253 optical disk 144,254 semiconductor memory 161 relatives and friends Pokhara doll 171 1C chip 84661 -98 -200409005 172,192 Antenna 181 Sale of Pokara dolls 191 1C chip 230 Connection section 241 Reader 321-1 to 321-7 Icon 311 Features 351, 361, 371, 381 Windows 341, 391, 502, 51 1,562 white Box 401 Exit 501 Virtual Pokhara 531, 532, 533, 534, 536, 538, 581, 582, 583 Bad 535 Search button 537 Preview button 561 Replay list Day and day 601 Song edge data 602 Lyrics data 603 Record cover description 604 Cover photo 605 Music data 510 Download list screen 301 Exit 84661-99-

Claims (1)

拾、申請專利範園: •種資訊處理系統,其特徵為包含: 物件,其係保持識別使用者之使用者識別資訊; . 第一資訊處理裝置,執行特定處理; , 項取裝置,其係對應於前述第一資訊處理裝置而設 · 置,並項取可述物件保持之前述使用者識別資訊;及 . 第一貝Λ處理裝置,其係經由網路,自前述第一資訊 處理裝置接收、認證藉由前述讀取裝置所讀取之前述使 _ 用者識別資訊’再經由前述網路傳輸其認證結果至前述 第一資訊處理裝置; 欠且依據藉由前述讀取裝置所讀取之前述使用者識別 貝訊與前述第二資訊處理裝置之前述使用者識別資訊 之 &lt; 從結果’使對應於前述物件之圖像顯示於前述第一 資訊處理裝置之顯示部上。 如申清專利範圍第!項之資訊處理系統,其中前述第二資 覘處理裝置經由前述網路取得利用前述第一資訊處理裝 _ 置之4述使用者之使用者資訊,將對應於前述使用者資 訊之4别%述使用者之使用者識別資訊記憶於前述物件 保持&lt;記憶體後,執行將前述物件分發給前述使用者之 處理。 .. 3·如申請專利範圍第2項之資訊處理系、统,其中前述讀取裝 置辨法碩取保持於前述物件内之資訊的狀態下,解除經 由幻述第負訊處理裝置與前述第二資訊處理裝置之前 述網路的連接。 84661 4·如申請專利範圍第i項之資訊處理系統,其中前述物件為 人偶。 •—種資訊處理系統之資訊處理方法,其特徵為該系統包 含: 物件,其係保持識別使用者之使用者識別資訊; 奢訊處理裝置,執行特定處理; 靖取裝置,其係對應於前述資訊處理裝置而設置,並 讀取前述物件保持之前述使用者識別資訊;及 第一資讯處理裝置,其係經由網路自前述第一資訊處 理裝置接收n藉由前述讀取裝置所讀取之前述使用 者識別資訊’再經由前述網路將其認證結果傳輸至前述 第一資訊處理裝置;其中, 、依據藉由前述讀取裝置所讀取之前述使用者識別資 訊與則心二資訊處理裝置之前述使用者識別資訊之 W 4結果,使對應於前述物件之圖像顯示於前述第一資 戒處理裝置之顯示部上。 6.種貝Λ處理裝置,其係經由網路與其他資訊處理裝置 連接,其特徵為具備: 管理機構,其係管理識別使用者之使用者識別資訊; 士接收機構,其係藉由對應於前述其他資訊處理裝置之 謂取裝置讀取,並接收藉由前述其他資訊處理裝置送來 之前述使用者識別資訊; 認證機構,其係依據藉由前述管理機構管理之前述使 用者識別資訊認證藉由前述接收機構所接收之前述使 84661 用者識別資訊;及 傳輸機構,其係仿;A 1 依據則述認證機構之認證結果,前述 其他資訊處理裝置經ώ 4d — H α由則述網路傳輸顯示對應於藉由 · 前述讀取裝置所讀取&gt; Α^ 只取 &lt; 則述使用者識別資訊之圖像時 - 所需之顯示資訊。 7·如申請專利範圍第6項令咨4 ^ - 只成處理裝置,其中對應於前述 - 使用者識別資訊之圖傻A # 口像為對應於記憶有前述使用者識別 資訊之物件之形狀的圖像。 8.如申請專利範圍第7項之資訊處理裝置,其中進一步具備· 分發機構’其係執行分發前述物件給前述使用者之處 里.亥物件具有§己憶有對應於利用前述其他資訊處理裝 置《則述使用者之使用者資訊之前述使用者識別資訊的 記憶體。 如申请專利範圍第7項之資訊處理裝置,其中前述物件為 人偶。 10·如申請專利範圍第6項之資訊處理裝置,其中前述接收機 # 構接收前述物件放置於前述讀取裝置上時所讀取之前述 使用者4別 &gt; 訊,並且接收表示前述物件自前述讀取裝 置取下之信號, 則述管理機構進一步管理對應於前述使用者識別資 …· 訊’前述使用者利用之内容的相關資訊, --· 前述接收機構進一步具備更新機構,其係收到表示前 述物件自前述讀取裝置取下之信號時,更新對應於前述 使用者識別資訊所管理之前述内容相關資訊。 84661 200409005 ιι· 一種資訊處理方法,其係經由網路與其他資訊處理裝置 連接&lt;資訊處理裝置之資訊處理方法,其特徵為包含: 管理步驟,其係管理識別使用者之使用者識別資訊;· 接收步驟,其係藉由對應於前述其他資訊處理裝置之 讀取裝置讀取,接收藉由前述其他資訊處理裝置送來之 , 前述使用者識別資訊; 認證步驟,其係依據藉由前述管理步驟之處理所管理 之前述使用者識別資訊,認證藉由前述接收步驟之處理 收到之前述使用者識別資訊;及 籲 傳輸步驟,其係依據前述認證步驟之處理之認證結 果二前述其他資訊處理裝置經由前述網路傳輸顯示對應 万、藉由a述頃取裝置所m取之前述使用者識別資訊之 圖像時所需之顯示資訊。 12. -種儲存有電腦可讀取之程式之程式儲存媒體,其特徵 為:該程式係控制經由網路與其他資訊處理裝置連接之 資訊處理裝置之電腦的程式,且包含·· 管理步驟,其係管理識別使用者之使用者識別資訊;· 士接收步驟’其係藉由對應於前述其他資訊處理裝置之 讀取裝置讀取,接收藉由前述其他資訊處理裝置送來之 前述使用者識別資訊; . ^拉步驟,其係依據藉由前述管理步驟之處理所管理 … 之前述使用者識別資訊,認證藉由前述接收步驟之處理 · 收到之前述使用者識別資訊;及 傳輸步驟,其係依據前述認證步驟之處理之認證結 84661 200409005 果,Μ述其他資訊處理裝置經由前述網路傳輸顯示對應 於藉由前述讀取裝置所讀取之前述使用者識別資訊之 圖像時所需之顯示資訊。 13. —種程式,其特徵為:於控制經由網路與其他資訊處理 裝置連接之資訊處理裝置之電腦上執行: 管理步驟,其係管理識別使用者之使用者識別資訊; 接收步驟,其係藉由對應於前述其他資訊處理裝置之 續取裝置讀取,接收藉由前述其他資訊處理裝置送來之 前述使用者識別資訊; 認證步驟,其係依據藉由前述管理步驟之處理所管理 &lt;則述使用者識別資訊’認證藉由前述接收步驟之處理 收到之前述使用者識別資訊;及 傳輸步驟,其係依據前述認證步驟之處理之認證結 果二前述其他資訊處理裝置經由前述網路傳輸顯示對應 於藉由以4 $買取裝置所讀取之前述使用者識別資訊之 圖像時所需之顯示資訊。 14·「種資訊處理裝置,其係經由網路與其他資訊處理裝置 連接,其特徵為具備: 取得機構,其係取得識別使用者之使用者識別資訊; 傳輸機構,其係經由前述網路將藉由前述取得機構所 取得之前述使用者識別資訊傳輸至前述其他資訊處理 裝置; 接收機構,其係依據藉由前述傳輸機構所傳輸之前述 使用者减別貝訊’接收藉由前述其他資訊處理裝置認證 84661 200409005 後之結果;及 控制機構’其係依據藉由前述接收機構所接收之認證 、、、口果以顯示對應於藉由前述取得機構所取得之前述使. 用者識別資訊之圖像之方式控制顯示。 — 15. 如申請專利範圍第14項之資訊處理裝置,其中對應於前 . 述使用者識㈣訊之圖像為對應於前述記财制者識 - 別資訊之物件形狀之圖像。 16. 如申請專利範圍第15項之資訊處理裝置,其中前述物件 為人偶。 · 17. 如申請專利範圍第16項之資訊處理裝置,其中進一步具 備讀取機構’其係自前述人偶讀取前述使用者識別資 訊,前述取得機構取得藉由前述讀取機構所讀取之前述 使用者識別資訊。 18·如申請專利範圍第17項之資訊處理裝置,其中前述讀取 機構與前述資訊處理裝置獨立設置,並且連接於前述資 訊處理裝置,放置有前述人偶時,讀取記憶於前述人㉟ _ 内之前述使用者識別資訊。 19·如申請專利範圍第18項之資訊處理裝置,其中進一步具 備檢測機構,其係檢測前述人偶自前述讀取機構取下, 可述傳輸機構於藉由前述檢測機構檢測出前述人偶自前 迷讀取機構取下時,進-步經由前述網路將表示前述Λ 偶自前述讀取機構取下之信號傳輸至前述其他資訊處理 裝置。 20.如申請專利範圍第19項之資訊處理裝置,其中前述控制 84661 機構於藉由前述檢_構檢測㈣述人偶已自前述讀取 機構取下時’解除經由前述網路對前述其他資訊處理裝 置之連接。 一種資訊處理方法,其係經由網路與其他資訊處理裝置 連接之資訊處理裝置之資訊處理方法,其特徵為包含: 取得步驟,其係取得識別使用者之使用者識別資訊; 傳輸步驟,其係經由前述網路將藉由前述取得步驟之 斤取得之月;j述使用者識別資訊傳輸至前述其他資 訊處理裝置; 、 、=收步驟,其係依據藉由前述傳輸步驟之處理所傳輸 心二这使用者識別資訊,接收藉由前述其他資訊處理裝 置認證後之結果;及 控制步驟,其係依據藉由前述接收步驟之處理所接收 ^忍證結果’以顯讀應於藉由前述讀取步驟之處理所 讀取之前述使用者識別資訊之圖像之方式控制顯示。 一種儲存有電腦可讀取之程式之程式儲存媒體,其特徵 録龍由網路與其他資訊處理裝置連接之 /貝訊處理裝置之電腦的程式,且包含: 取1步帮,其係取得識別使用者之使用者識別資訊; 傳如步驟,其係經由前述網路將藉由前述取得步驟之 處理所取得之前述使用者識別資訊傳輸至前述 訊處理裝置; ” 200409005 置認證後之結果;及 控制步騾,其係依據 之認證結果 'α彡步驟之處理所接收 衣 頌不對應於藉由前述讀取+炉、+ 23讀取之前述使用者識別資訊之圖像之:式處理所 ·:種程式’其特徵為:於控制經由網路與:他:、:處 置連接〈資訊處理裝置之電腦上執行:…理 取得步驟,其係取得識別使用者 傳輸步驟,JL係妳Α a + 史]者減別為訊; 處理所取得之μ網路將藉由前述取得步驟之 處斤取仔《則迷使用者識別資訊傳輸 訊處理裝置; 』他貝 之係依據藉由前述傳輸步驟之處理所傳輸 =述使用者識別資訊,接收藉由前述其他資訊處理裝 置涊證後之結果;及 控制步驟,其係依據藉由前述接收步驟之處理所接收 ^證結果’以顯示對㈣藉由前述讀取步驟之處理所 讀取之前述使用者識別資訊之圖像之方式控制顯示。 从-種人偶’其特徵為:係使用資訊處理裝置時利用之人 偶,且具有: 記憶體,其係記憶識別所有使用者之使用者識別資 訊;及 ' 對應於圖像之形狀,該圖像係藉由對應於前述資訊處 理裝置乙讀取裝置所讀出之前述使用者識別資訊經認 證時,顯示於前述資訊處理裝置之顯示部上。 25· —種資訊提供系統,其特徵為包含: 84661 200409005 第一資訊處理裝置,其係經由網路提供内容; 第二資訊處理裝置,其係經由前述網路接受前述内容 之提供;及 . 弟—' 貝訊處理裝置’其係將依據前述第二資訊處理裝 - 置要求之信號輸出至前述第一資訊處理裝置;其中, _· 將對應於前述内容之物件分發給前述第二資訊處理 - 裝置之使用者, W述第二資訊處理裝置自前述物件讀取識別前述物 件之物件識別資訊,並經由前述網路傳輸至前述第三資 _ 訊處理裝置, 月!i述第二資訊處理裝置依據自前述第二資訊處理裝 置接收之前述物件識別資訊,檢索識別前述内容之内容 識別資訊,並傳輸至前述第一資訊處理裝置, 前述第-資訊處理裝置收到來自前述第三資訊處理 裝置之前述内容識別資訊時,經由前述網路將對應於前 述内容識別資訊之前述内容傳豸至前述第二資訊處㉟ # 裝置。 26. -種資訊提供系統之資訊提供方法,其特徵為該系統包 含: 第一資訊處理裝置 第二資訊處理裝置 之提供;及 其係經由網路提供内容; 其係經由前述網路接受前述内容Pick up and apply for a patent garden: • An information processing system, which is characterized by including: an object that holds user identification information that identifies the user; a first information processing device that performs specific processing; an item taking device that is It is set and set corresponding to the aforementioned first information processing device, and selects the aforementioned user identification information held by the described object; and. The first shell processing device, which is received from the aforementioned first information processing device via a network 2. Authenticate the aforementioned user identification information read by the aforementioned reading device, and then transmit its authentication result to the aforementioned first information processing device via the aforementioned network; owing to and based on the information read by the aforementioned reading device &Lt; From the result, 'the image corresponding to the object is displayed on the display section of the first information processing device from the result of the user identification information of the beixun and the second information processing device. If the patent scope is declared! Item information processing system, in which the aforementioned second information processing device obtains user information of the user using the first information processing device via the aforementioned network, and will correspond to 4% of the aforementioned user information. The user identification information of the user is stored in the aforementioned object holding &lt; memory, and then the process of distributing the aforementioned object to the aforementioned user is executed. .. 3 If the information processing system and system in item 2 of the patent application scope, wherein the above-mentioned reading device discriminates the information held in the aforementioned object, release the negative processing device and the aforementioned The aforementioned network connection of the two information processing devices. 84661 4. The information processing system of item i in the scope of patent application, wherein the aforementioned objects are puppets. • An information processing method for an information processing system, characterized in that the system includes: an object that maintains user identification information that identifies the user; a luxury information processing device that performs specific processing; a fetching device that corresponds to the foregoing The information processing device is provided and reads the user identification information held by the object; and the first information processing device receives n from the first information processing device via the network and reads by the reading device. The aforementioned user identification information 'then transmits its authentication result to the aforementioned first information processing device via the aforementioned network; wherein, based on the aforementioned user identification information and the second information processing read by the aforementioned reading device, The W 4 result of the aforementioned user identification information of the device causes an image corresponding to the aforementioned object to be displayed on the display section of the aforementioned first data or processing device. 6. A shellfish processing device, which is connected to other information processing devices via a network, and is characterized by: a management organization that manages user identification information that identifies the user; a taxi receiver that responds by The aforementioned other information processing devices are referred to as reading devices, and receive the aforementioned user identification information sent by the aforementioned other information processing devices; the certification body is based on the aforementioned user identification information management borrowings managed by the aforementioned management organization to authenticate borrowing. The aforementioned identification information of 84661 users received by the aforementioned receiving agency; and the transmission mechanism, which is imitated; A 1 according to the certification results of the certification authority, and the other information processing devices described above are free of charge 4d — H α by the rule network The transmission display corresponds to when the image is read by the aforementioned reading device &gt; Α ^ only &lt; the image of the user identification information-the required display information. 7 · If the scope of the patent application is the 6th order, please refer to ^-only as a processing device, which corresponds to the aforementioned-user identification information. Figure A # mouth image corresponds to the shape of the object in which the foregoing user identification information is stored. image. 8. The information processing device according to item 7 of the scope of patent application, which further includes a distribution mechanism 'which executes the distribution of the aforementioned objects to the aforementioned users. Hai objects have § already remembered corresponding to the use of the aforementioned other information processing devices << The memory of the aforementioned user identification information of the user information of the user. For example, the information processing device under the scope of patent application No. 7 wherein the aforementioned objects are puppets. 10. The information processing device according to item 6 of the scope of patent application, wherein the aforementioned receiver #structure receives the above-mentioned user 4 message read when the aforementioned object is placed on the aforementioned reading device, and receives a message indicating that the aforementioned object has been When the signal is removed by the aforementioned reading device, the management organization further manages the information corresponding to the content of the user identification information above. The information related to the content used by the foregoing user, the information receiving device further includes an update mechanism, which is When the signal indicating that the object is removed from the reading device is updated, the content-related information managed corresponding to the user identification information is updated. 84661 200409005 ι · An information processing method, which is an information processing method for connecting with other information processing devices via a network &lt; information processing device, which is characterized by including: a management step, which manages user identification information that identifies the user; · Receiving step, which is read by a reading device corresponding to the aforementioned other information processing device, and receiving the aforementioned user identification information sent by the aforementioned other information processing device; the authentication step, which is based on using the aforementioned management Processing of the aforementioned user identification information managed by the step of authenticating the aforementioned user identification information received through the processing of the aforementioned receiving step; and calling for a transmission step which is based on the authentication result of the processing of the aforementioned authentication step. The device transmits display information required to display an image corresponding to the aforementioned user identification information obtained by the device through the aforementioned network. 12. A program storage medium storing a computer-readable program, which is characterized in that the program is a program that controls a computer of an information processing device connected to another information processing device via a network, and includes management steps, It manages the user identification information that identifies the user; · The step of receiving a taxi 'is read by a reading device corresponding to the aforementioned other information processing device, and receives the aforementioned user identification sent by the aforementioned other information processing device Information;. ^ Pull step, which is based on the aforementioned user identification information managed by the processing of the aforementioned management steps, authenticates the aforementioned user identification information received by the processing of the aforementioned receiving steps; and the transmission step, which Based on the authentication result of processing according to the aforementioned authentication step 84661 200409005, the other information processing device transmits the image corresponding to the aforementioned user identification information read by the aforementioned reading device via the aforementioned network, and is required for Display information. 13. — A program characterized by being executed on a computer that controls an information processing device connected to another information processing device via a network: a management step that manages user identification information that identifies the user; a receiving step that is Read by the retrieving device corresponding to the aforementioned other information processing device, and receive the aforementioned user identification information sent by the aforementioned other information processing device; the authentication step, which is managed based on the processing by the aforementioned management step &lt; Then the user identification information is authenticated by the aforementioned user identification information received through the processing of the aforementioned receiving step; and the transmission step is based on the authentication result processed according to the aforementioned authentication step. The aforementioned other information processing device is transmitted via the aforementioned network. Display information required to display an image corresponding to the aforementioned user identification information read by buying the device for 4 $. 14 · "An information processing device, which is connected to other information processing devices via a network, and is characterized by: an acquisition mechanism, which acquires user identification information identifying the user; a transmission mechanism, which transmits the information through the aforementioned network. The aforementioned user identification information obtained by the aforementioned obtaining organization is transmitted to the aforementioned other information processing device; the receiving organization is based on the aforementioned user minus Bessung 'received by the aforementioned transmitting organization and received and processed by the aforementioned other information Result of device authentication 84661 200409005; and the control agency 'It is based on the certification received by the aforementioned receiving agency, and the fruit to display a map corresponding to the aforementioned use obtained by the aforementioned acquiring agency. User identification information The display is controlled in the same manner. — 15. If the information processing device of the scope of application for patent No. 14 corresponds to the foregoing. The image of the user identification information is the shape of the object corresponding to the aforementioned accounting system identification-different information. 16. An information processing device such as item 15 of the patent application, wherein the aforementioned object is a puppet. · 1 7. If the information processing device of the scope of application for patent No. 16 is further provided with a reading mechanism 'which reads the aforementioned user identification information from the aforementioned puppet, the aforementioned acquiring mechanism obtains the aforementioned information read by the aforementioned reading mechanism User identification information. 18. The information processing device according to item 17 of the scope of patent application, in which the aforementioned reading mechanism is set independently from the aforementioned information processing device, and is connected to the aforementioned information processing device. When the aforementioned puppet is placed, the memory is read The aforementioned user identification information in the aforementioned person _ _ 19. If the information processing device of the 18th scope of the patent application, further includes a detection mechanism, which detects that the aforementioned puppet is removed from the aforementioned reading mechanism, the transmission can be described When the mechanism detects that the puppet is removed from the front fan reading mechanism by the detection mechanism, it further transmits a signal indicating that the Λ puppet was removed from the reading mechanism to the other information processing device via the network. 20. The information processing device according to item 19 of the scope of patent application, wherein the aforementioned control of the 84661 mechanism is based on the aforementioned inspection_ Detecting that the said puppet has been removed from the aforementioned reading mechanism, 'unlinking the aforementioned other information processing device via the aforementioned network. An information processing method, which is an information processing device which is connected to another information processing device via the internet. The information processing method is characterized by including: an obtaining step of obtaining user identification information identifying the user; a transmitting step of obtaining a month through the aforementioned network to be obtained by the foregoing obtaining step; j said user identification The information is transmitted to the aforementioned other information processing device;,,, = receiving steps, which are based on the user identification information transmitted through the processing of the aforementioned transmission step, and receive the results after being authenticated by the aforementioned other information processing device; and control The step is based on the control and display of the image of the user identification information read by the processing of the foregoing reading step according to the received ^ tolerance result received through the processing of the foregoing receiving step. A program storage medium storing a computer-readable program, which is characterized by a computer program of a computer connected to the Internet and other information processing devices / beixun processing devices, and includes: Take 1 step to obtain identification The user's user identification information of the user; a transmission step, which transmits the aforementioned user identification information obtained through the processing of the aforementioned obtaining step to the aforementioned message processing device via the aforementioned network; and the result after the authentication is set; and The control step is based on the result of the authentication result 'α 彡 step. The received song does not correspond to the image of the aforementioned user identification information read by the aforementioned reading + furnace, + 23: type processing station · : Kind of program 'is characterized in that it is executed on the control computer via the network and: he:,: disposes the connection to the computer of the information processing device:… to obtain the step, which is to obtain the step of identifying the user, JL is you Α a + [History] is reduced to information; processing of the acquired μ network will use the aforementioned steps to obtain the information "Zefan user identification information transmission information processing device;" It is based on the transmission through the processing of the foregoing transmission steps, the user identification information is received, and the result obtained after being authenticated by the other information processing device is received; and the control step is based on the received certificate through the processing of the foregoing receiving steps The result 'controls the display in such a way as to display an image of the aforementioned user identification information read by the processing of the aforementioned reading step. The slave-kind puppet' is characterized by being a person used when using an information processing device Even, and has: a memory that memorizes user identification information that identifies all users; and a shape corresponding to the image, which is read out by a reading device corresponding to the aforementioned information processing device B When the aforementioned user identification information is authenticated, it is displayed on the display section of the aforementioned information processing device. 25 · —An information providing system including: 84661 200409005 a first information processing device that provides content via a network; Two information processing devices, which accept the provision of the foregoing content via the aforementioned network; and. Brother—'Bexun processing device 'will be based on The signal requested by the aforementioned second information processing device-device is output to the aforementioned first information processing device; among them, _ · distributes objects corresponding to the aforementioned content to the user of the aforementioned second information processing-device, and describes the second information processing The device reads the object identification information identifying the aforementioned object from the aforementioned object and transmits it to the aforementioned third information processing device via the aforementioned network. The second information processing device is based on the aforementioned information received from the aforementioned second information processing device. The object identification information retrieves the content identification information identifying the foregoing content and transmits it to the first information processing device. When the first information processing device receives the content identification information from the third information processing device, it transmits the content identification information via the network The aforementioned content corresponding to the aforementioned content identification information is transmitted to the aforementioned second information office # device. 26. An information providing method for an information providing system, characterized in that the system includes: the provision of a first information processing device and a second information processing device; and it provides content via a network; it accepts the aforementioned content via the aforementioned network 第三資訊處理裝置,其係將依據 置要求之信號輸出至前述第一 前述第二資訊處理裝 資訊處理裝置;其中, 84661 -9- 200409005 將對應於前述内容之物件分發給前述第二資訊處理 裝置之使用者, 前述第二資訊處理裝置自前述物件讀取識別前述物 件之物件識別資訊,並經由前述網路傳輸至前述第三資 訊處理裝置, 箾述弟二貝訊處理裝置依據自前述第二資訊處理裝 置接收之前述物件識別資訊,檢索識別前述内容之内容 識別資訊’並傳輸至前述第一資訊處理裝置, 前述第一資訊處理裝置收到來自前述第三資訊處理 裝置之則述内容識別資訊時,經由前述網路將對應於前 述内容識別資訊之前述内容傳輸至前述第二資訊處理 裝置。 其係f理第一其他資訊處理裝置經 第二其他資訊處理裝置使用,其特 27. —種資訊處理裝置,其係 由網路提供之内容由第二 徵為具備: 卜接收機構’其係接收物件識別資訊,該物件識別資訊· 識別前述第二其他資訊處理裝置自物件讀取,經由前述 網路运來而記憶於前述物件内之前述物件; 傳輸機構,The third information processing device outputs a signal according to the setting request to the aforementioned first and second information processing equipment information processing device; among them, 84661 -9- 200409005 distributes objects corresponding to the foregoing content to the foregoing second information processing The user of the device, the second information processing device reads the object identification information identifying the object from the object, and transmits the object identification information to the third information processing device via the network. The information identification device receives the aforementioned object identification information, retrieves the content identification information that identifies the foregoing content, and transmits the content identification information to the first information processing device. The first information processing device receives the content identification from the third information processing device. At the time of information transmission, the aforementioned content corresponding to the aforementioned content identification information is transmitted to the aforementioned second information processing device via the aforementioned network. This is because the first other information processing device is used by the second other information processing device, and it features 27. An information processing device whose content is provided by the Internet and is provided by the second one: Receiving object identification information that identifies the aforementioned object read by the aforementioned second other information processing device from the object, transported through the aforementioned network, and memorized in the aforementioned object; a transmission mechanism, 者進行收費處理。 一種資訊處理方法, 其係管理第一其他資訊處理裝置經 84661 -10- 200409005 由、’罔路k供 &lt; 内容由第二其他資訊處理裝置使用之資訊 處理裝置之資訊處理方法,其特徵為包含: —接收步驟,其係接收物件識別資訊,該物件識別資訊 識別4述第_其他資訊處理裝置自物件讀取,經由前述 網路送來而記憶於前述物件内之前述物件; 傳輸步驟,其係經由前述網路將對應於藉由前述接收 =之處理所接收之前述物件識別資訊之識別前述内 容&lt;内容識別資訊傳輸至前述第一資訊處理裝置;及 費步驟,其係對前述第二其他資訊處理裝置之使用 者進行收費處理。 、種儲存有電腦可讀取之程式之程式儲存媒體,其特徵 為.J秸式係管理第一其他資訊處理裝置經由網路提供 、、Λ由第一其他’貝訊處理裝置使用之資訊處理裝置之 程式,且包含: 、—接=步驟’其係接收物件識別資訊,該物件識別資訊 減別則4第二其他資訊處理裝置自物件讀取,經由前述 網路送來而記憶於前述物件内之前述物件; 傳輻步驟,其係經由前述網路將對應於藉由前述接收 =驟又處理所接收之前述物件識別資訊之識別前述内 合 &lt; 内合識別資訊傳輸至前述第一資訊處理裝置;及 片/、步驟,其係對前述第二其他資訊處理裝置之使用 者進行收費處理。 30·種私式,其特徵為:於控制管理第一其他資訊處理裝 ❹由網路提供之内容由第:其他資訊處理裝置使用之 84661 -11- 資訊處理裝置之電腦上執行: 接=步ϋ ’其係接收物件識別資訊,該物件識別資訊 識別前述第二其他資訊處理裝置自物件讀取,經由前述 網路送來而記憶於前述物件内之前述物件; 傳輸步驟,其係經由前述網路將對應於藉由前述接收 t驟之處理所接收之前述物件識別資訊之識別前述内 ”、内卷4別貝紕傳輸至前述第一資訊處理裝置;及 收費步驟,其係對前述第二其他資訊處理裝置之使用 者進行收費處理。 種” Λ處理裝置,其特徵為:係經由網路提供内容至 其他資訊處理裝置,且具備: 識別資訊取得機構,其係取得識別資訊,該識別資訊 表示$述其他資訊處理裝置自物件讀取,經由前述網路 送來之前述物件可取得之内容的種類;及 初I貝料傳輸機構,其係將前述其他資訊處理裝置自 則迷物件讀取,經由前述網路送來之經密碼化之初始資 料予以解碼’並將解碼後之前述初始資料傳輸至前述其 他資訊處理裝置。 32·如申請專利範園第31項之資訊處理裝置,纟中前述初始 資料具有: ㈤述物件下載完成内容之資訊;及 表不前述物件可下載内容之次數; 七述初始資料傳輸機構具備解碼機構,其係將前述物 件之下載完成内容之資訊;及表示前述物件可下載内容 84661 -12- 200409005 〆人數之 &gt; 訊予以解碼。 33. 如申請專利範園第3 1項之資訊處 備·· 理裝置,其中進一步 具 、内今見表傳輸機構,其係將依據前述識別資訊,前 述物件可下載之内容-覽表傳輸至前述其他資理 裝置;及 、Λ傳輸機構’其係、依據前述其他資訊處理裝置之内 八耳得要求,傳輸内容至前述其他資訊處理裝置。 34.如申請專利範園第33項之資訊處理裝置,其中 傳輸機構具備: 第傳輸機構,其係傳輸前述其他資訊處理裝置下載 之内容;及 第一傳輸機構’其係傳輸前述其他資訊處理裝置試聽 之内容。 35. 如申請專利範圍第31項之資訊處理裝置,其中前述其他 資訊處理裝m步具備許可證傳輸機構,其係傳輸 φ 僅可重現一次别述内容之許可择。 36. —種資訊處理方法,其特徵為:係經由網路提供内容至 其他資訊處理裝置之資訊處理裝置之資訊處理方法,I 包含: 識別資訊取得步驟,其係取得識別資訊,該識別資訊 表示前述其他資訊處理裝置自物件讀取,經由前述網路 送來之前述物件可取得之内容的種類;及 初始資料傳輸步驟,其係將前述其他資訊處理裝置自 84661 13· 200409005 前,物件讀取’經由前述網路送來之經密碼化之初始資 料丁以解碼,並將解碼後之前述初始資料傳輸至前述並 他資訊處理裝置。 〃 37_ —種儲存有電腦可读¥ _ _ 項取 &lt; 程式之程式儲存媒體,其特徵 為· 4程式係經由網路提供内容至其他資訊處理裝置之 電腦的程式,且包含: 識別貝以取仔担制步驟,其係控制識別資訊之取得, 該識別資訊表示前述其他資訊處理裝置自物件讀取,細 由前述網路送來之前述物件可取狀内容的種類;及工 初料料傳輸控制步驟,其係以將前述其他資訊處理 裝置自w述物件頃取’經由前述網路送來之經密碼化之 初七貝料T以解碼’並將解碼後之前述初始資料傳輸至 前述其他資訊處理裝置之方式控制。 38. -種程式’其特徵為:於經由網路提供内容至其他資訊 處理裝置之電腦上執行: 、 、:我別貝矾取得控制步驟,其係控制識別資訊之取得, θ Μ貝訊表不W述其他資訊處理裝置自物件讀取,經 由則述網路运來之前述物件可取得之内容的種類;及 Μ貝料傳幸則控制步驟,其係以將前述其他資訊處理 裝置自物件哨取’經由前述網路送來之經密碼化之初始 貝料丁以解碼’並將解碼後之前述初始資料傳輸至前述 其他資訊處理裝置之方式控制。 39 種貝訊處理裝置,其係經由網路接收自第一其他資訊 處理裝置提供之_,其特徵為具備: 84661 -14- 200409005 取得機構,並佴瓦渡 物件識別資訊Γ、 件内之識別前述物件之 取Γ:= ’其係經由前述網路將藉由前述取得機構所 •于心物件識別資訊傳輸至第二其他資訊處 直,及 接二機構,其係依據前述傳輸機構所傳輸之前述物件 減別貝訊,前诚镇—i 、 a、+. _〗辻弟一其他貨訊處理裝置依據識別傳輸至 心弟-其他資訊處理裝置之前述内容之内容識別資 訊,接收經由前述網路自前述第—其他資訊處理裝置送 來之前述内容。 4〇·:申請專利範園第39項之資訊處理裝置,其中前述取得 、構進#具備!空制機冑,其係、進一步取得記憶於前述 物件内之前述内容使用條件, ^依據藉由前述取得機構所取得之前述使用條件,控制 則述傳輸機構之傳輸處理。 如申清專利範圍第39項之資訊處理裝置,其中前述物件 為人偶。 如申请專利範圍第39項之資訊處理裝置,其中放置有前 迷人偶時,進一步具備讀取機構,其係讀取記憶於前述 人偶内之前述物件識別資訊, 的述取待機構取得藉由前述讀取機構自前述人偶所 讀取之前述物件識別資訊。 如申請專利範圍第42項之資訊處理裝置,其中前述讀取 機構與的述資訊處理裝置獨立地設置,並且於連接於前 84661 -15- 200409005 述資訊處理裝置並放置有前述人偶時, 碩取記憶於前述人偶内之前述物件識別資訊。 44.如申請專利範圍第39項之資訊處理裝置,其_進一步具 備取彳于要求傳輸機構,其係依據自前述第一其他資訊處 =裝置所傳輸之前述物件可下載之内容一覽表,對前述 第其他資訊處理裝置傳輸内容之取得要求。 仏如申請專利範園第44項之資訊處理裝置,其中前述取得 要求傳輸機構具備: Μ述物件可下載之内容一覽纟,·顯示機冑,其係顯示 前述物件可下載内容之次數; 及 試聽判定機構, 下載判定機構,其係判定是否指示有下載前述内容; 46·如申請專利範圍第外項 其係判定是否指示有試聽前述内容。 備·· 顯示機構,其係顯 ’ 9項之資訊處理裝置,其中進一步具 表; 許可證要求機構, 其係顯示使用前述物件所下載之内容一覽 其^系對前述第一其他資訊處理裝置Charge processing. An information processing method is an information processing method for managing an information processing device of a first other information processing device via 84661 -10- 200409005, an information processing device whose content is used by a second other information processing device, and is characterized by: Including:-receiving step, which is to receive the object identification information, the object identification information identification described in the fourth paragraph _ other information processing device read from the object, sent through the aforementioned network and memorized in the aforementioned object; the transmitting step, It is to transmit the aforementioned content &lt; content identification information corresponding to the aforementioned object identification information received through the aforementioned receiving = processing to the aforementioned first information processing device via the aforementioned network; and 2. The users of other information processing devices perform charge processing. A program storage medium storing a computer-readable program, which is characterized by the management of the information provided by the first other information processing device via the Internet, and by the first other information processing device The program of the device, including: , — == 'It is to receive the object identification information, the object identification information is reduced 4 The second other information processing device reads from the object, sends it through the aforementioned network, and stores it in the aforementioned object. The aforementioned object within; the transmission step, which transmits the identification corresponding to the aforementioned object identification information received by the aforementioned receiving = processing and the aforementioned internal integration &lt; internal identification information to the first information via the aforementioned network A processing device; and a film / step, which performs charge processing on a user of the aforementioned second other information processing device. 30 · A kind of private type, which is characterized in that the content provided by the Internet is controlled and managed in the first other information processing device. The first is executed by the computer of the other information processing device 84661 -11- ϋ 'It is to receive the object identification information, the object identification information identifies the aforementioned second other information processing device which is read from the object and sent via the aforementioned network and memorized in the aforementioned object; the transmission step is via the aforementioned network And transmitting the identification information corresponding to the aforementioned object identification information received through the aforementioned processing of receiving t ”, the inscribed volume 4 is transmitted to the aforementioned first information processing device; and the charging step is for the aforementioned second Users of other information processing devices perform charge processing. The "Λ" processing device is characterized in that it provides content to other information processing devices via the network and has: an identification information acquisition mechanism that obtains identification information and the identification information Indicates that the content described in the other information processing device can be obtained from the object and can be obtained by the foregoing object sent through the foregoing network. Class I; and the initial material transmission mechanism, which reads the aforementioned other information processing device from the original object, decodes the encrypted initial data sent via the aforementioned network, and transmits the decoded aforementioned initial data To the aforementioned other information processing device. 32. If the information processing device of the patent application park No. 31, the foregoing initial data in the following paragraphs includes: information describing the downloading content of the object; and indicates the number of times the content can be downloaded by the foregoing object; Organization, which decodes the information on the downloadable content of the aforementioned object; and the &gt; message indicating the downloadable content of the aforementioned object 84661 -12- 200409005. 33. If the information processing equipment of Item 31 of the patent application park is equipped with a management device, which further includes a transmission mechanism, which is based on the aforementioned identification information, the content downloadable from the aforementioned objects-the list is transmitted to the aforementioned Other asset management devices; and Λ transmission mechanism ', which transmits content to the aforementioned other information processing devices in accordance with the requirements of the eight ears in the aforementioned other information processing devices. 34. The information processing device according to item 33 of the patent application park, wherein the transmission mechanism includes: the first transmission mechanism, which transmits the content downloaded by the other information processing device; and the first transmission mechanism, which transmits the aforementioned other information processing device. Listen to the content. 35. If the information processing device in the scope of patent application No. 31, wherein the aforementioned other information processing equipment has a license transmission mechanism, it is a permission to transmit φ which can reproduce the content of the other content only once. 36. — An information processing method, characterized in that it is an information processing method of an information processing device that provides content to other information processing devices via a network. I includes: The step of obtaining identification information, which is to obtain identification information, and the identification information indicates The aforementioned other information processing devices read from the objects, the types of content that can be obtained by the aforementioned objects sent via the aforementioned network; and the initial data transmission steps, which read the aforementioned other information processing devices from the objects before 84661 13 · 200409005 'The encrypted initial data sent via the aforementioned network is decoded, and the decoded aforementioned initial data is transmitted to the aforementioned other information processing device. 〃 37_ —A program storage medium with a computer-readable ¥ _ _ item and a &lt; program, which is characterized in that 4 programs are programs that provide content to a computer on another information processing device via a network, and include: The fetching step is to control the acquisition of identification information, which indicates that the aforementioned other information processing device reads from the object, and the type of the content of the aforementioned object sent from the aforementioned network; and the initial material transmission The control step is to take the above-mentioned other information processing device from the above-mentioned objects and 'encrypted the first seven materials T sent via the aforementioned network to decode' and transmit the decoded aforementioned initial data to the aforementioned other Information processing device mode control. 38.-A program is characterized in that it is executed on a computer that provides content to other information processing devices via the network:,, :: I do n’t want to obtain control steps, which is to control the acquisition of identification information. It does not describe the types of content that other information processing devices can read from the objects, and the types of content that can be obtained from the foregoing objects that are sent through the network; and the control steps of the data transmission mechanism, which is to transfer the aforementioned other information processing devices from the object whistle. It is controlled by taking 'the encrypted initial shell material sent through the aforementioned network for decoding' and transmitting the decoded aforementioned initial data to the aforementioned other information processing device. 39 types of Besson processing devices, which are received from the first other information processing device via the Internet, and are characterized by: 84661 -14- 200409005 acquisition mechanism and identification of the object identification information Γ, the identification within the case Picking of the aforementioned objects Γ: = 'It is transmitted through the aforementioned network through the aforementioned acquisition organization • The identification information of the heart object is transmitted to the second other information location, and the second agency is based on the transmission by the aforementioned transmission agency The aforementioned objects are reduced to Beixun, Qiancheng Zhen—i, a, +. _ 辻 Yidi, another cargo processing device, transmits the content identification information of the aforementioned content to Xindi, other information processing device based on the identification, and receives it via the aforementioned network. The aforementioned content is sent from the aforementioned first-other information processing device. 4〇 ·: The information processing device of the 39th patent application park, in which the aforementioned acquisition and construction # are provided! The air machine is to further obtain the use conditions of the foregoing content memorized in the aforementioned object, and ^ according to the foregoing use conditions obtained by the foregoing obtaining mechanism, control the transmission processing of the transmission mechanism. For example, the information processing device of item 39 of the patent scope is cleared, in which the aforementioned objects are puppets. For example, the information processing device in the 39th scope of the patent application, when a former charming figure is placed, further includes a reading mechanism, which reads the aforementioned object identification information memorized in the aforementioned puppet. The reading mechanism reads the object identification information read by the puppet. For example, the information processing device of the 42nd patent application scope, in which the aforementioned reading mechanism and the information processing device are separately provided, and when connected to the information processing device of the front 84661 -15- 200409005 and the aforementioned puppet is placed, Take the aforementioned object identification information stored in the aforementioned puppet. 44. If the information processing device in the scope of patent application item 39 is further equipped with a request transmission mechanism, it is based on a list of downloadable content of the aforementioned objects transmitted from the aforementioned first other information office = device, and Acquisition requirements for content transmitted by other information processing devices.仏 If the information processing device of item 44 of the patent application park, the aforementioned request transmission mechanism is provided with: a list of downloadable contents of the above mentioned objects 纟, a display unit 显示, which displays the number of times the contents of the aforementioned objects can be downloaded; and audition Judgment agency, download judging agency, is to judge whether the download of the foregoing content is instructed; 46. If the patent application is not in the scope of the item, it is to judge whether to instruct the aforementioned content. The display organization is an information processing device that displays ‘9 items, which is further displayed; the license requesting organization is to display a list of the content downloaded using the aforementioned object, and it is a reference to the aforementioned first other information processing device 如申請專利範圍第46項之資訊處 理裝置,其中進一步具 84661 備: 内容有無判定趟、&amp; # 賤構,其係受理須自前述内容一 重現之内容的指令 Tt 二,判定須重現之前述内容是否記憶於 則述駕訊處理裝置之内部;及 重現取仔要求傳輸機構,其係藉由前述有無内容判定 機構欺前述須重現之内容並未記憶㈣述資訊處理 裝置Up時,對可述第一其他資訊處理裝置傳輸前述 須重現之内容的取得要求。 48.For example, the information processing device in the 46th scope of the application for patents, which further has 84661. Preparation: Whether the content is judged, &#; structure, which is an instruction Tt II that accepts the content that must be reproduced from the foregoing content. Whether the foregoing content is memorized in the driving processing device; and the reproduction request transmission mechanism, which is used by the foregoing content determination organization to deceive the content to be reproduced and not memorized when the information processing device is Up , The acquisition request for the first other information processing device transmitting the aforementioned content to be reproduced. 48. 種Λ訊處理方法,其係經由網路接收自第—其他資訊 處理裝置提供之内容之資訊處理裝置之資訊處理方法: 其特徵為包含: 取仔步知,其係取得記憶於物件内之識別前述物件之 物件識別資訊; 傳輸步%,其係經由前述網路將藉由前述取得步驟之An Λ message processing method is an information processing method of an information processing device that receives content provided by the first-other information processing device via a network: It is characterized by including: The object identification information of the aforementioned object; the transmission step%, which is obtained by the aforementioned step through the aforementioned network 處理所取得之前述物件識別資訊傳輸至第二其他資訊 處理裝置;及 、 、接收步%,其係依據前述傳輸步驟之處理所傳輸之前 (物件4別f訊’前述第二其他資訊處理裝置依據識別 傳輸至前述第一其他資訊處理裝置之前述内容之内容 識別資訊,接收經由前述網路自前述第一其他資訊處理 裝置送來之前述内容。 49.—種儲存有電腦可讀取之程式之程式儲存媒體,該程式 係經由網路接受第一其他資訊處理t置提供内容之資訊 處理裝置之程式,其特徵為包含·· 84661 -17- 取得步驟,其係取得記憶 物件識別資訊; ⑼爻減別则述物件之 傳輸步驟,其係經由前述網 處理所心… 續精由則述取得步驟之 所取件〈可述物件識別資訊傳輸 處理裝置;及 八他貝訊 接收步騍,其係依據前述傳輸步驟之 述物件識別資訊,前述第-並他資^ 斤傳輸之則 述弟一其他資訊處理裝置之前述内容之内容 二:接收經由前述綱路自前述第―其 裝置迗來之前述内容。 处 50.The aforementioned object identification information obtained during the processing is transmitted to the second other information processing device; and, and the receiving step is performed before the transmission according to the processing of the aforementioned transmission step (the object 4 does not correspond to the aforementioned second other information processing device) Content identification information identifying the aforementioned content transmitted to the aforementioned first other information processing device, and receiving the aforementioned content sent from the aforementioned first other information processing device via the aforementioned network. 49. A computer-readable program stored therein A program storage medium, which is a program of an information processing device that accepts content provided by the first other information processing device via a network, and is characterized by including 84661 -17- an acquisition step, which is to obtain identification information of a memory object; ⑼ 爻The transmission steps of the articles described in the minus rule are processed through the aforementioned network processing center ... Continued to obtain the retrieved steps of the acquisition steps (the description processing device of the object identification information transmission; and the receiving step of the Octopus News, which is According to the object identification information described in the foregoing transmission steps, the other information described in the above-mentioned other transmission methods is described below. The content of the content processing apparatus II: - means E to which the content of the 50 received from the first passage via the aforementioned classes. :種:式’其特徵為:係於控制經由網路接收第 貨訊處理裝置提供内容之資訊處理裝置之電腦中執二 取得步驟,其係取得記料物件内之識別前述 物件識別資訊; 千又 傳輸步驟’其係經由前述網路將藉由前述取得Type: Type 'is characterized in that it is performed in a computer that controls the information processing device that receives the content provided by the cargo processing device via the network. The second acquisition step is to obtain the identification information identifying the aforementioned object within the recorded object; Transmission step 'which is obtained by the aforementioned network via the aforementioned network 處理所取得之前述物件識別資訊傳輸至第二其他資 處理裝置;及 ” 接收步風,其係依據前述傳輸步驟之處理所傳輸之前 述物賴別資訊,前述第二其他資訊處理裝置依據識別 傳輸至可述第一其他資訊處理裝置之前述内容之内容 識別只ifl ’接收經由前述網路自前述第_其他資訊處理 裝置送來之前述内容。 51·種人偶’其特徵為:係藉由資訊處理裝置使用内容時 所使用之人偶,且具有·· 84661 -18· ζυ〇4〇9〇〇5 記憶體,其係記憶識別前述人偶時所需之識別資訊; 及 、 對·應於前述内容相關圖像之形狀。 52. 53. 54. 55. 56. 57. 如申請專利範圍第51項之人偶,其中前述記憶體進一步 兒憶表示可藉由前述人偶取得之内容的種類。 如申請專利範圍第51項之人偶,其中前述記憶體進一步 ?己憶前述内容之使用條件。 如申請專利範圍第53項之人偶,其中前述使用條件中包 含金額資訊。 t申請專利範圍第53項之人偶’其中前述使用條件中包 含:藉由前述人偶所取得之内容一覽表;及藉由前述人 偶可取得前述内容之次數。 如申請專利範圍第53項之人偶,其中前述記憶體使用有 前述内容時,更新前述使用條件。 一種物件,其特徵為:其係藉由資訊處理裝置使用内容 時所使用之物件,且具有: 記憶體,其係記憶識別前述内容時所需之識別資訊· 對應於前述内容相關圖像之特徵。 84661The aforementioned object identification information obtained during the processing is transmitted to the second other information processing device; and “Receiving Buffon is based on the aforementioned object identification information transmitted according to the processing of the aforementioned transmission step, and the aforementioned second other information processing device is transmitted according to the identification The content identification of the aforementioned content of the first other information processing device is only ifl 'receives the aforementioned content sent from the aforementioned _ other information processing device via the aforementioned network. 51 · Doll' is characterized by: The puppet used by the information processing device when using the content, and has a memory of 84661 -18 ζυ〇〇〇〇〇〇〇 05 memory, which is to remember the identification information needed to identify the aforementioned puppet; and, corresponding The shape of the image related to the aforementioned content. 52. 53. 54. 55. 56. 57. For example, the figure 51 of the scope of patent application, wherein the aforementioned memory further recalls the content of the content that can be obtained by the aforementioned figure. Type. For example, the puppet with the scope of patent application No. 51, in which the aforementioned memory further recalls the use conditions of the foregoing content. For example, with the puppet with scope of the patent application, no. 53 The aforementioned conditions of use include information on the amount of money. T The puppet with the scope of patent application No. 53, wherein the aforementioned conditions of use include: a list of contents obtained by the aforementioned doll; and the number of times the aforementioned content can be obtained by the aforementioned doll. For example, in the case of a puppet with the scope of patent application No. 53, in which the aforementioned conditions are used when the aforementioned memory is used, an object is characterized in that it is an object used when the content is used by an information processing device and has : Memory, which stores the identification information required to identify the aforementioned content · Features corresponding to the image of the aforementioned content 84661
TW92114558A 2002-05-29 2003-05-29 Information processing system and method, information providing system and method, information processing device and method, figure, object and program storage medium and program TWI280495B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2002156051 2002-05-29
JP2003152451A JP4547867B2 (en) 2002-05-29 2003-05-29 Information processing apparatus and program

Publications (2)

Publication Number Publication Date
TW200409005A true TW200409005A (en) 2004-06-01
TWI280495B TWI280495B (en) 2007-05-01

Family

ID=31949035

Family Applications (1)

Application Number Title Priority Date Filing Date
TW92114558A TWI280495B (en) 2002-05-29 2003-05-29 Information processing system and method, information providing system and method, information processing device and method, figure, object and program storage medium and program

Country Status (2)

Country Link
JP (1) JP4547867B2 (en)
TW (1) TWI280495B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1870805A1 (en) * 2006-06-22 2007-12-26 Thomson Telecom Belgium Method and device for updating a language in a user interface
US7865572B2 (en) * 2007-01-08 2011-01-04 Mspot, Inc. Method and apparatus for transferring digital content from a personal computer to a mobile handset
US7865571B2 (en) 2007-01-08 2011-01-04 Mspot, Inc. Method and apparatus for transferring digital content from a personal computer to a mobile handset
US9317179B2 (en) 2007-01-08 2016-04-19 Samsung Electronics Co., Ltd. Method and apparatus for providing recommendations to a user of a cloud computing service
US7937451B2 (en) 2007-01-08 2011-05-03 Mspot, Inc. Method and apparatus for transferring digital content from a computer to a mobile handset
JP4322296B2 (en) * 2007-08-02 2009-08-26 株式会社コナミデジタルエンタテインメント Communication system, server device, and toy
JP5988375B2 (en) * 2012-12-03 2016-09-07 Kddi株式会社 Control equipment
CN106133738A (en) * 2014-04-02 2016-11-16 索尼公司 Information processing system and computer program
US11307717B2 (en) 2017-03-28 2022-04-19 Sony Corporation Information processing apparatus and information processing system
JP7271338B2 (en) 2019-06-28 2023-05-11 シャープ株式会社 Display system, display method, and display program

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001312512A (en) * 2000-05-02 2001-11-09 Canon Inc Information distribution system, information terminal device, information center, information distribution method, and storage medium
JP2002063092A (en) * 2000-06-09 2002-02-28 Tomy Co Ltd Information providing system, information providing device, server, toy, information providing method, and recording medium

Also Published As

Publication number Publication date
TWI280495B (en) 2007-05-01
JP2004054914A (en) 2004-02-19
JP4547867B2 (en) 2010-09-22

Similar Documents

Publication Publication Date Title
CN103810411B (en) Information processing system
TWI229801B (en) Information transmission/reception apparatus, apparatus and method of information transmission, apparatus and method of information reception, apparatus and method of information processing, management apparatus and method of information transmission, ma
US20090210517A1 (en) Information management device and method, information processing device and method recording medium, and program
JP2000099010A (en) Music distribution method via communication network, apparatus therefor and program recording medium therefor
TW200409005A (en) Information processing system and method, information providing system and method, information processing device and method, figure, object and program storage medium and program
JP4580009B2 (en) Video rental system using video distribution technology
TWI237977B (en) Information processing system and method, information processing device and method, program storage medium, program and object
TWI240180B (en) Data management device and method, data processing device and method, recording medium and program information management device and method, information processing device and method, and record medium
JP2004054913A (en) Information processing system and method, information processing apparatus and method, program storage medium, program, and object
JP2002007750A (en) Product sales system
KR20090001987A (en) Content auto sales, rental system and method
HK1050788A1 (en) Sound data delivering system and method, delivering server and client-side terminal thereof
HK1050788B (en) Sound data delivering system and method, delivering server and client-side terminal thereof

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees