摘要 |
PROBLEM TO BE SOLVED: To limit use of content.SOLUTION: When a source receives a request for transmitting content from a sink, the source performs an authentication process. When authentication is successful, the source transmits, to the sink, key information necessary for decrypting encryption applied to the content. The sink receives the key information and decrypts the encryption applied to the content by using the key information, thereby decrypting the encrypted content. This invention is applicable to, for example, a communication system comprising a transmitting apparatus for transmitting content and a receiving apparatus for receiving content from the transmitting apparatus. |