[go: up one dir, main page]

TW200304126A - A method to identify CD content - Google Patents

A method to identify CD content Download PDF

Info

Publication number
TW200304126A
TW200304126A TW92110051A TW92110051A TW200304126A TW 200304126 A TW200304126 A TW 200304126A TW 92110051 A TW92110051 A TW 92110051A TW 92110051 A TW92110051 A TW 92110051A TW 200304126 A TW200304126 A TW 200304126A
Authority
TW
Taiwan
Prior art keywords
content
digital content
encoding
rate
program
Prior art date
Application number
TW92110051A
Other languages
Chinese (zh)
Other versions
TWI255443B (en
Inventor
Kenneth Louis Milsted
Qing Gong
Craig Kindell
Original Assignee
Ibm
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US09/177,096 external-priority patent/US6389538B1/en
Application filed by Ibm filed Critical Ibm
Publication of TW200304126A publication Critical patent/TW200304126A/en
Application granted granted Critical
Publication of TWI255443B publication Critical patent/TWI255443B/en

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A method to automatically retrieve data associated with content. An identifier is read that is stored on electronic readable medium storing content. The identifier is used to search a database for data associated with the content. Data that is associated with the content is retrieved as guided by the database. And the data retrieved is used to create a version of the content for electronic distribution. In accordance with another aspect of the invention, a computer readable medium is described to carry out the above method. A method of automatically selecting processing parameters for encoding digital content. Metadata containing the genre of the digital content; receiving the compression level selected for encoding the digital content is received. An algorithm selected for encoding the digital content is received. And a previously defined table to select the processing parameters for encoding the digital content based on the genre of the content, the compression level selected and the algorithm selected is indexed and the processing parameters are retrieved. In accordance with another aspect of the invention, an apparatus is described to carry out the above method. A method of determining an encoding rate for digital content. According to the method, the a sample of the content data is encoded for a predetermined period of time. The encoding rate is calculated by knowing the size of the sample of content encoded and the length of time necessary for encoding. In another embodiment, the encoding rate calculated for a specific encoding algorithm and encoding bit rate is averaged with any previously stored encoding rate for this encoding algorithm and encoding bit rate. In accordance with another aspect of the invention, an apparatus is described to carry out the above method.

Description

200304126 玖、發明說明: 相關申請案之對照 本申請案是1998年10月22日(目前日期為_)提出 申請的申請案09/177,096之分案申請案,而該申請案 09/1 77,096是1998年8月13日(目前日期為_)提出申 請的申請案09/13 3,5 19之部份繼續申請案。本申請案特此 引用先前申請案09/177,096之整個揭示事項以供參照。此 外,本申請案主張在技術上與連同本申請案讓渡給國際商 務機器股份有限公司(IBM)的下列申請案相關的主題之權 項0 内部案號 申請案 序號 發明名稱 發明人 SE9-98-006 Secure Electronic Content Management Kenneth L. Milsted George Gregory Gruse Marco M. Hurtado Edgar Downs Cesar Medina SE9-98-007 Multimedia Player Toolkit George Gregory Gruse John J. Dorak, Jr. Kenneth L. Milsted SE9-98-008 Multimedia Content Kenneth L. Milsted Qing Gong - Creation System Edgar Downs SE9-98-010 Key Management System for End-User Digital Player Jeffrey B. Lotspiech Marco M. Hurtado George Gregory Gruse Kenneth L. Milsted SE9-98-011 Multi-media player for an Electronic Content Delivery System Marco M. Hurtado George Gregory Gruse Edgar Downs Kenneth L. Milsted SE9-98-013 A method to identify CD content Kenneth L. Milsted Craig Kindell Qing Gong200304126 发明 Description of the invention: Contrast of related applications This application is a divisional application of application 09 / 177,096, filed on October 22, 1998 (current date is _). On August 13, 1998 (currently _), the application 09/13 3,5 19 part of the application continued. This application hereby cites the entire disclosure of the previous application 09 / 177,096 for reference. In addition, this application claims technical rights to the subject matter related to the following applications transferred to International Business Machines Corporation (IBM) together with this application: 0 -006 Secure Electronic Content Management Kenneth L. Milsted George Gregory Gruse Marco M. Hurtado Edgar Downs Cesar Medina SE9-98-007 Multimedia Player Toolkit George Gregory Gruse John J. Dorak, Jr. Kenneth L. Milsted SE9-98-008 Multimedia Content Kenneth L. Milsted Qing Gong-Creation System Edgar Downs SE9-98-010 Key Management System for End-User Digital Player Jeffrey B. Lotspiech Marco M. Hurtado George Gregory Gruse Kenneth L. Milsted SE9-98-011 Multi-media player for an Electronic Content Delivery System Marco M. Hurtado George Gregory Gruse Edgar Downs Kenneth L. Milsted SE9-98-013 A method to identify CD content Kenneth L. Milsted Craig Kindell Qing Gong

O:\85\85156 分割.DOC 200304126 SE9-98-014 Toolkit for delivering electronic content from an Online store Richard Spagna Kenneth L. Milsted David P. Lybrand Edgar Downs SE9-98-015 A method and apparatus to automatically create encode digital content Kenneth L. Milsted Kha Kinh Nguyen Qing Gong SE9-98-016 A method and apparatus to indicate an encoding rate for digital content Kenneth L. Milsted Qing Gong 發明背景 技術領域 所揭示的本發明在廣義上係有關電子商務(electronic commerce)之領域,尤係有關一種經由諸如網際網路及全球 資訊網等的全球性通訊網路而安全傳送諸如印刷媒體、電 影、電玩、及音樂等數位資產並管理該等數位資產的權利 之系統及相關工具程式。 先前技術 使用諸如網際網路等的全球性配送系統來配送諸如音 樂、電影、電腦程式、圖片、電玩、及其他内容之趨勢持 續在成長。在此同時,有價數位内容的所有人及出版商已 減、緩了接受利用網際網路來配送數位資產,其原因有數 個。第—個原因是:所有人恐懼未經授權的複製、或數位 内容的剽竊。數位内容的電子式傳送消除了剽竊的數個障 礙。電子式配送消除的一個障礙是對實體可記錄媒體(例如 軟碟或光碟)本身的需求。雖然將數位内容複製到實體媒 體時’在使用空白錄音帶或可記錄光碟的許多情形中之成O: \ 85 \ 85156 segmentation. DOC 200304126 SE9-98-014 Toolkit for delivering electronic content from an Online store Richard Spagna Kenneth L. Milsted David P. Lybrand Edgar Downs SE9-98-015 A method and apparatus to automatically create encode digital content Kenneth L. Milsted Kha Kinh Nguyen Qing Gong SE9-98-016 A method and apparatus to indicate an encoding rate for digital content Kenneth L. Milsted Qing Gong BACKGROUND OF THE INVENTION The present invention disclosed in the technical field relates to e-commerce in a broad sense ( electronic commerce), especially the right to securely transfer and manage digital assets such as print media, movies, video games, and music via global communication networks such as the Internet and the World Wide Web System and related tools. Prior art The trend of using global distribution systems such as the Internet to deliver music, movies, computer programs, pictures, video games, and other content continues to grow. At the same time, owners and publishers of valuable digital content have reduced or slowed their acceptance of the use of the Internet to distribute digital assets for several reasons. The first reason is that everyone fears unauthorized copying or plagiarism of digital content. The electronic delivery of digital content removes several obstacles to plagiarism. One obstacle removed by electronic distribution is the need for physical recordable media (such as floppy disks or optical disks) themselves. While copying digital content to physical media ’is accomplished in many situations using blank audio cassettes or recordable discs.

O:\85\85156 分割.DOC 200304126 、本:了’但是總是要耗用金錢。然而,在電子式配 2料形中,不再需要實體媒體1為心€子方式配送 内容,所以實體媒體的成本不是—個因素。第二個障礙是 2谷本身的格式’亦即以m格式儲存的内容相對於以 -數位格式储存的内容。當以影印方式複製諸如印刷圖片 寺的以一類比格式儲存之内容時,拷貝的品質低於原始的 口口質。每-次後續的複製一份拷貝(有時被稱為_代)之品 質又比原始的品質再低一些。當以數位方式儲存圖片時, 就不會發生品質的降低。每—份㈣及每—代的拷貝都如 原始圖片-般的清晰及鮮明。由於完美的數位拷貝加上以 才-低成本利用電子方式配送内容及經由網際網路而廣泛地 配送内容之整合效應’所以使未經授權的拷貝之割竊及配 〜仔車义為谷易。只要按下鍵盤的幾個鍵,非法複製者即 可經由網際網路而傳送數百份甚至數千份完美複製的數位 内容。因此’目前需要確保以電子方式配送的數位資產的 保護及安全性。 數位内容提供者希望建立一種可保護内容所有人權利 的安全〈數位内容全球性配送系統。建立一數位内容配送 系統的問題包括開發用於數位内容電子式配送、權利管 理及貝產保4〈系統。以電子方式配送的數位内容包括 诸如印刷媒骨豆、電影、電玩、程式、電視、多媒體、及音 樂等内容。 部署一電子式配送系、统時,使數位内容提供者能夠經由 乂即的銷售回報及電子式對帳而迅速得到付款,並經由内O: \ 85 \ 85156 Divide .DOC 200304126, Ben: It ’s, but it always costs money. However, in the electronic distribution 2 material form, it is no longer necessary for physical media 1 to distribute content in a heart-like manner, so the cost of physical media is not a factor. The second obstacle is the format of 2 Valley itself ', that is, content stored in m format versus content stored in -digital format. When copying content stored in an analog format such as a printed picture temple by photocopying, the quality of the copy is lower than the original quality of the mouth. The quality of each subsequent copy (sometimes called _generation) is lower than the original quality. When pictures are stored digitally, no degradation occurs. Every copy and every copy is as clear and sharp as the original picture. Due to the perfect integration of digital copies and the integrated effect of using electronic means to distribute content at low cost and to distribute content extensively via the Internet, the theft and distribution of unauthorized copies is made possible by Gu Yi . Just by pressing a few keys on the keyboard, illegal copyers can send hundreds or even thousands of perfectly copied digital content via the Internet. So ‘it ’s time to ensure the protection and security of digital assets that are delivered electronically. Digital content providers want a secure, digital content global distribution system that protects the rights of content owners. Issues in setting up a digital content distribution system include developing systems for digital content electronic distribution, rights management, and Beijinbao 4 <system. Digital content distributed electronically includes content such as print media, bones, movies, video games, programs, television, multimedia, and music. When an electronic distribution system is deployed, digital content providers can quickly get paid through immediate sales returns and electronic reconciliation, and internally

O:\85\85156 分割.DOC 200304126 容的重新發行而得到第二份的收益來源。因為電子式數位 内容配送系統不會受到實體庫存缺貨或退貨的影響,所以 數位内容提供者及零售商可以有更低的成本及更高的利潤 率。數位内容提供者可協助新的配送通路或強化現有的配 送通路以更快的時效分送庫存。可利用電子式配送系統的 父易資料來取得與客戶購買模式有關的資訊,並用來提供 與笔子式行銷计畫及促銷有關的立即回饋。為了達到這些 目標,數位内容提供者需要使用一種電子式配送模式,使 範圍免廣的使用者及企業可以取得數位内容,同時確保了 數位資產的保護及計費。 諸如即時晋訊系統(real audio)、AT&amp;T的A2B、LiquidO: \ 85 \ 85156 Divide the reissue of .DOC 200304126 and get a second source of revenue. Because the electronic digital content distribution system is not affected by physical inventory shortages or returns, digital content providers and retailers can have lower costs and higher profit margins. Digital content providers can assist new distribution channels or strengthen existing distribution channels to distribute inventory faster. The parent-friendly data of the electronic distribution system can be used to obtain information related to customer purchase patterns and used to provide immediate feedback related to pen-based marketing plans and promotions. To achieve these goals, digital content providers need to use an electronic distribution model to enable a wide range of users and businesses to access digital content, while ensuring the protection and billing of digital assets. Such as real audio, AT &amp; T's A2B, Liquid

Audio Pro Corp.的 Liquid Audio Pro、Audi〇s〇ft 的 chyLiquid Audio Pro by Audio Pro Corp., chy by Audi〇s〇ft

Music Network、及其他系統等的在市場上可取得的數位内 容電子式配送系統提供了、經由有擔保及無擔保&lt;電子網路 而傳送數位資料。使用有擔保式電子網路時,大幅降低了 數位内容提供者將數位資料配送到廣泛的閱聽者之要求。 使用諸如網際網路及全球資訊網等無擔保式網路時,可利 用加密法而使數位内容安全地送抵使用者。然而,一旦在 使用者的機器上將經過加密的數位内容解密時,則使用者 易於對該數位内容作未經授權的再度傳播。因此,目前需 要-種安全的數位内容電子式配送系統,肖系統提供了二 數位資產的保護,並確保:縱使在將數位内容配送到消費 者及企業之後,也能保護内容提供者的糟糾 ^ τ 肩J锥利。因此,權利 管理需要能夠進行安全配送、合約授權、另* 欠、 唯及數位資產使用 〇.\85\85156 分割 -10- 200304126 的控制。 數位内容所有人已減緩接受電子式配送的另一個理由 是這些數位内容所有人希望維持及促進現有的配銷通路。 大多數内容所有人係經由零售商銷售。在音樂市場中,這 些美國的零售商包括T〇wer Rec〇rds、peaches、 Blockbuster、Circuit City、及其他的零售商。許多這些零 售商都設有網站’可讓網際網路使用者經由網際網路選 購’且可以電子郵件寄給使用者供其選購。音樂網站包括 @tower、Music Boulevard、及 Columbia House。使用電 子式配送時,可能使這些零售商店之間無法差異化,且與 内客所有人之間無法差異化,尤其在全球資訊網上時更是 如此。因此,目前需要對諸如圖片、電玩、音樂、程式、 及視訊產品等的電子内容零售商於其經由電子式配送而銷 售曰木時#疋供一種相互之間且與内容所有人之間差異化的 方式。 内各所有人準備其數位内容,以便經由諸如電子商店等 的配銷網站而進行電子式配送。在網際網路上的各電子商 店或經由其他線上服務的各電子商店想要經由其產品線及 產PP促銷而在相互之間差異化。傳統的商店(亦即類比於電 子商店的非電子式且非線上的商店)利用產品促銷、產品業 務員、產品樣本、自由退貨政策、及其他促銷計畫,使其 與競爭者之間差異化。然而,在内容提供者對數位内容有 加上使用條件的線上世界中,電子商店進行差異化的能力 可能受到嚴重的限制。此外,縱使可改變使用條件,電子Digital content available on the market, such as Music Network and other systems, electronic content distribution systems provide digital data transmission via secured and unsecured &lt; electronic networks. When using a secured electronic network, the requirements for digital content providers to distribute digital data to a wide range of audiences are greatly reduced. When using unsecured networks such as the Internet and the World Wide Web, digital content can be securely delivered to users using encryption. However, once the encrypted digital content is decrypted on the user's machine, the user is liable to unauthorized re-distribution of the digital content. Therefore, a secure digital content electronic distribution system is currently required. The Shaw system provides protection for digital assets and ensures that even after delivering digital content to consumers and businesses, it can protect content providers ^ τ Shoulder J Conical. Therefore, rights management needs to be able to control the secure distribution, contract authorization, other * owed, and only the use of digital assets 〇. \ 85 \ 85156 division -10- 200304126. Another reason that digital content owners have slowed their acceptance of electronic distribution is that these digital content owners want to maintain and promote existing distribution channels. Most content owners sell through retailers. In the music market, these US retailers include Tower Rectors, peaches, Blockbuster, Circuit City, and others. Many of these retailers have websites 'that allow Internet users to purchase via the Internet' and can email users to purchase them. Music sites include @tower, Music Boulevard, and Columbia House. When using electronic distribution, these retail stores may not be differentiated from each other, and they may not be differentiated from the insider owner, especially on the World Wide Web. Therefore, there is currently a need for electronic content retailers such as pictures, video games, music, programs, and video products to sell them through electronic distribution. The way. Each owner prepares their digital content for electronic distribution via distribution sites such as electronic stores. Electronic stores on the Internet or electronic stores through other online services want to differentiate each other through their product lines and PP promotions. Traditional stores (that is, non-electronic and non-online stores analogous to electronic stores) use product promotions, product salespeople, product samples, free returns policies, and other promotional programs to differentiate them from competitors . However, in the online world where content providers have conditions for using digital content, the ability of electronic stores to differentiate can be severely limited. In addition, even though the conditions of use can be changed,

O:\85\85156 分割.DOC -11 - 200304126 两店也面臨了處理與來自内容提供者的數位内容相關聯的 中)丨/、料(metadata)以便用電子方式促銷及銷售產品之困 ^作^電子商店處理中介資料時,需要管理數種需要。 的 $子商店而要自内容提供者接收與數位内容相關聯 的:介資料。大部分的時間可能係以加密方式傳送此種中 介資料的-部分,因而内容提供者必須建立一種機制,以 便將經過加密的内容解密。第二,電子商店可能希望在自 内容提供者接收内容之前’或在電子商店接收内容之後, 預覽來自内容提供者的内容,以便有助於產品行銷、產品 :位、及其他與内容有關的促銷考慮點。第三,電子商店 :要I疋取木些用於諸如圖形及藝人等促銷材料之中介資 料%子商店通常將此種促銷材料直接用於線上促銷。第 四,電子商店可能希望修改某些容許的使用條件,以便產 生不同的數位内容產品、線,而使其與其他電子商店之間有 差異化。第五,電子商店可能需要將諸如網址等的某些地 址插入中介資料,或改變中介資料中的某些地址,以便使 採購者自動向一帳款代收機構付款,而不必向該電子商店 付π人第/、,包子商店可能需要產生授權許可,以便容許 在符合使用條件的情形下使用有著作權的數位内容。例 如,该杈權許可可能同意對該數位内容進行次數有限制的 拷貝。授權許可必須能反映所同意的條款。 有鑑於所有這些要求,為了處理與數位内容相關的中介 貝料,許多電子商店撰寫自訂規格的軟體程式,以便處理 這些要求。開發這些自訂規格的軟體程式所需的時間、成 O:\85\85156 分割.d〇c -12- 200304126 忒可此疋相當多的。因此,目前需要一種對這虺 要求的解決方案。 σ淮内谷所有人已減緩了接納電子式配送的另一原因 疋卞備用於電子式配送的内容之困難。目前許多内容提供 者在其產品目錄中右 、η ^ 求肀有數千甚至數萬的產品内容。在一音樂 平場的實例中,—内容所有人對單-錄音母帶同時有數種 不同的t式(例如CD、錄音帶、及MD)不是太奇怪的。此 卜 單格式可能針對一特定的配銷通路,或針對諸如 D錄曰τ、D VD、或等效媒體等特定的配送媒體, 而將錄θ母V重新製作母帶或重新混音。針對廣播電台 播放的混音可能不同於針對舞曲用音執所作的混音,也可 能不同於一般消費者可購得的CD之混音。盤點及追縱這些 不同的混音版本可能是相當累贅的。此外,許多錄音母帶 所有人經常以各種後續出版系列之方式重新發行舊的錄 曰例如以知選集”〈方式,或編排成電影原聲帶及其他 出版系列《方式、或其他編排方式重新發行。當以數位方 式提供更多的内容時,將内容重新混音或重新處理並編碼 以,電子式配送的需求也成長了。内容所有人經常需要利 用舊的錄音格式作為指引,以便選擇正確的錄音母帶,並 將每些錄晋重新處理及編碼,便經由電子式配送而發行。 想要將其舊的格式用於協助其重新發行舊的錄音以供電子 式配送的内容提供者尤其適用上述的㈣。$容提供者將 搜尋資料庫,以便匹配内容名稱、藝人、及錄音,並設定 編碼參數,且擷取相關聯的内容資訊或附帶的材料,例如 0__\85\85156 分割.DOC -13- 200304126 : 中已括木#、網址、巧問記錄、及試聽樣本 段寺的相關促銷資訊。此種以人工方式搜尋 資料庫的程序不是沒有缺點的。一種缺點即是需要讓= 人員以人工方式搜尋-資料庫,並適當地設定處理參數。 另一種缺點即是作業人員在自一資料庫選擇資科時可能發 生^ 胃錯誤的機率。因此,目前需要將—種可自動擴取諸 如曰訊等内客之相關聯的資料及錄音母帶。 内容所有人經由一種稱為編碼的程序而準備並供電子 式配送之數位内容。編碼涉及内容的取得、在該内容:以 一種類比格式呈現時對該内容進行的數位化'及對該内容 的壓縮。該壓縮程序可讓數位内容以更有效率的方式經由 ㈣傳送並儲存在可記錄媒體,這是因為傳送或儲存的资 科!減少了。然而,壓縮也不是沒有缺點的。大部分的壓 _涉及某些資訊的失掉,因而被稱為耗損式壓縮(1〇ssy c〇mpressiGn)。内容提供者必彡貞決定採用冑 =壓縮等級。例如,在音樂中,數位内容或歌= 視曰木類型的不同而有相當不同的特徵。針對某一類型而 ,擇的壓縮演算法及壓縮等級可能對另一音樂類型並不是 取佳的選擇。内容提供者可能發現壓縮演算 的某些組合相當適料諸如古典音樂等的某—音樂類 :對諸如重金屬音樂等的另—音樂類型就無法得到令人滿 勺-果。此外’錄首工程師經常必須稍微調整音樂的等 二’執行動態範圍調整,並執行其他的預先處理及處理設 疋’以便確保所編碼的音樂類型將產生所需的結果。此種 O:\85\S5156 分割_D〇c -14- 200304126 固定必須以人工方式設定這些編碼參數之需要,例如針對 每一數位内容設定等化位準及動態壓縮及擴張設定值之需 要可能是累贅的及成本昂貴的。再回到該音樂的例子,一 個内容系列涵蓋多種音樂類型的音樂内容提供者將必須以 人工方式選擇待編碼的每一首歌曲或每一組歌曲、及所需 的編碼參數組合。因此,目前需要-種無須以人工方式選 擇編碼處理參數之方式。 壓縮内容的程序可能需要大量專用的計算資源,特別是 諸如完整長度的電影等較大内容㈣目。壓縮演算法供應 商提供與錢縮技術相關聯的各《捨及優點。這些取捨 包括:壓縮内容所需的時間長度及計算資源;自原始内容 得到的£、、宿里’播放所需的位元傳輸速率;壓縮後内容之 效能^質;以及其他因素。當一編碼程式採用-多媒體檔 作為輸入’並產生一編碼後輸出樓,但並無進程或狀態的 過渡期間指7T:時’採用此種編碼程式時將發生問題。此外, 在彳夕^开^/中’利用其他的程式來呼叫或管理一個並無進 程的過渡期間指示之編碼程式。此時將使呼叫的應用程式 無法量度已編碼的内容量為指定要編碼的完整選擇之百分 率在及啤叫的程式正嘗試安排數個不同的程式立即執行 時’上述的情形將發生問題。此外,纟已選擇要編碼的内 奋批/人且内奋提供者想要決定編碼程序的進度時,前文所 述的情形是相當累贅的。因此,目前需要一種可解決這此 問題的方式。 — 數位内容提供者已減緩了採用電子式配送的又一理由O: \ 85 \ 85156 segmentation. DOC -11-200304126 Both stores also face difficulties in processing digital content associated with content from content providers 丨 /, metadata in order to promote and sell products electronically ^ There are several needs that need to be managed when working as an electronic store for intermediary data. $ Sub-store to receive digital media-related information from content providers. Most of the time it may be that part of this intermediary is transmitted encrypted, so content providers must establish a mechanism to decrypt encrypted content. Second, electronic stores may want to preview content from content providers before they receive content from content providers, or after receiving content from electronic stores, in order to facilitate product marketing, product: bits, and other content-related promotions. Think about it. Third, electronic stores: I want to grab some of the promotional materials used in promotional materials such as graphics and artists. Sub-stores usually use such promotional materials directly for online sales. Fourth, e-shops may wish to modify certain permissible conditions of use in order to produce different digital content products and lines that differentiate them from other e-shops. Fifth, e-shops may need to insert certain addresses, such as web addresses, into intermediary materials, or change some addresses in intermediary materials, so that buyers can automatically pay a billing agency instead of paying to the e-shop π person, /, Baozi store may need to generate a license to allow the use of copyrighted digital content in accordance with the conditions of use. For example, the license may permit a limited number of copies of the digital content. The license must reflect the terms agreed. In view of all of these requirements, in order to process intermediary materials related to digital content, many electronic stores write custom specifications software programs to handle these requests. The time required to develop these custom-spec software programs is divided into O: \ 85 \ 85156. Doc -12- 200304126 This is quite a lot. Therefore, a solution to this requirement is currently needed. σHuai Nei Valley owners have slowed down another reason for accepting electronic distribution: The difficulty of preparing content for electronic distribution. Many content providers currently have thousands or even tens of thousands of product content in their product catalogs. In an example of a music flat, it is not too surprising that the content owner has several different t-styles (e.g., CD, audio cassette, and MD) on the single-recording master tape at the same time. This form may be directed to a specific distribution channel, or to a specific distribution medium such as D record, τ, D VD, or equivalent media. The record θ master V is remastered or remixed. The mix for radio stations may be different from the mix for dance music notes, or it may be different from the mix for CDs available to the average consumer. Inventorying and chasing these different mix versions can be quite cumbersome. In addition, many recording masters often reissue old recordings in a variety of subsequent publishing series, such as "Selected Works," or arrange them into movie soundtracks and other publishing series, "Reproduction," or other arrangements. When As more content is provided digitally, the content is remixed or reprocessed and coded, and the need for electronic distribution has grown. Content owners often need to use the old recording format as a guide in order to choose the right recording master And re-process and encode each recording, and then distribute it through electronic distribution. Content providers who want to use their old format to assist them in re-issuing old recordings to power sub-distribution are particularly suitable ㈣. $ 容 Provider will search the database to match the content name, artist, and recording, set the encoding parameters, and retrieve the associated content information or attached materials, such as 0 __ \ 85 \ 85156 split. DOC -13 -200304126: China has included wooden #, website address, Qiaowen record, and relevant promotional information for sample audition section temple. This kind of manual method The process of searching the database is not without its shortcomings. One disadvantage is the need for = personnel to manually search the -database and set the processing parameters appropriately. Another disadvantage is that the operator may choose the resources from a database. Probability of a stomach error. Therefore, currently there is a need to automatically expand the relevant information and recording master tapes of internal customers such as Yue Xun. Content owners prepare and power sub-types through a program called coding Digital content delivered. Encoding involves obtaining the content, digitizing the content when presented in an analog format, and compressing the content. The compression program makes digital content more efficient It is transmitted via 在 and stored in recordable media. This is because the amount of resources transmitted or stored is reduced! However, compression is not without its disadvantages. Most compressions involve the loss of certain information, so they are called lossy. Compression (1〇ssy c〇mpressiGn). The content provider must decide to use 胄 = compression level. For example, in music, digital content or song = video Different wood types have quite different characteristics. For a certain type, the compression algorithm and compression level chosen may not be the best choice for another music type. Content providers may find that certain combinations of compression algorithms are equivalent It is suitable for a certain type of music such as classical music: for other types of music such as heavy metal music, it is impossible to get a full spoonful of results. In addition, 'recording engineers often have to adjust the music slightly, etc.' to perform dynamic range adjustment And perform other pre-processing and processing settings to ensure that the type of music encoded will produce the desired result. This O: \ 85 \ S5156 segmentation_D〇c -14- 200304126 must be set manually The need for encoding parameters, such as setting equalization levels for each digital content and the need for dynamic compression and expansion settings, can be cumbersome and costly. Going back to the music example, a music content provider with a content series covering multiple genres of music will have to manually select each song or group of songs to be encoded, and the required combination of encoding parameters. Therefore, there is currently a need for a method that does not require manual selection of encoding processing parameters. Programs that compress content may require a significant amount of dedicated computing resources, especially for larger content projects such as full-length movies. Compression algorithm vendors offer various advantages and disadvantages associated with money shrinking technology. These trade-offs include: the length of time and computing resources required to compress the content; the £,, and bit rate required for playback in the original content obtained from the original content; the performance of the compressed content; and other factors. When an encoding program uses -multimedia files as input 'and generates an encoded output building, but there is no process or state, the transition period refers to 7T: when' this problem occurs when using this encoding program. In addition, in the eve of ^^^ / ', another program is used to call or manage a coding program that has no process transition instruction. This will make the calling application unable to measure the amount of coded content as a percentage of the complete selection specified to be coded. When the calling program is attempting to schedule the execution of several different programs for immediate execution, the problem described above will occur. In addition, the situation described above is quite cumbersome when you have selected the endorsement / person to be coded and the endogenous provider wants to determine the progress of the encoding process. Therefore, a way is needed to solve this problem. — Digital content providers have slowed down another reason to adopt electronic distribution

O:\85\85156 分割.DOC -15- 200304126 為:其内容缺少針對電子傳送式内容而在使用者裝置上產 生數位播放機之標準。内容提供者、電子商店、或電子式 配送鏈中的其他成員可能想要在諸如個人電腦系統、視訊 轉換器(set-top boxes)、及手持式裝置等的各種裝置上提供 自訂規格的播放機。目前需要一種可在一防篡改環境(亦即 一種在一第三者正在播放時可阻止對内容作未經授權的存 取之環境)中處理數位内容的解密之一組工具程式。此外, 需要一組工具程式使一使用者得以管理一本機數位内容 庫,但該組工具程式不讓該使用者存取非其所購買的内容 以供使用。 若要得知與保護數位内容的背景有關之進一步資訊,請 參閱下列三種來源。AT&amp;T Labs (Florham Park,N.J·)的 Jack Lacy、James Synder、David Maher所著的“Music on the Internet and the Intellectual Property Protection Problem”,可進 入網址 http://www.a2bmusic.com/about/papers/musicipp.htm 於線上閱讀該論文 。InterTrust Technologies Corp.(Sunnyvale,CA)的 Olin Sibert、David Bernstein、及 David Van Wie 所著的論文 “Securing the Content,Not the Wire for Information Commerce” 中述及一種稱為 DigiBox的密碼保護容器物件,可進入網址 http://www.intertrust.com/architecture/stc.html於線上閱讀 該論文。以及一 IBM White Paper “Cryptolope Container Technology”,可進入網址 http:///cyptolope.ibm.com/white.htm 於線上閱1買該論文。 O:\85\85156 分割.DOC -16- 200304126 發明内容 本發明之一目的在於去除前文所述的各項缺點並提供 一種用來追蹤内容資料的使用之系統。本發明之一實施例 提供了一種用來追蹤使用者裝置上的數位内容的使用之系 統。搞合到一網路之電子商店將播放數位内容資料之授權 許可銷售給使用者。自網路接收授權許可的内容資料之内 容播放機係用來播放授權許可的内容資料。此外,♦禺合到 網路的一記錄網站追蹤内容資料的播放。更具體而言,該 記錄網站自網路接收播放資訊,且該播放資訊包含相關聯 的内容播放機已播放内容資料的次數。 本發明之另一實施例提供一種用於追蹤在使用者裝置 上的數位内容的使用之方法。根據該方法,將一播放數位 内容資料之授權許可銷售給一使用者,並將授權許可的内 容資料傳送到該使用者的一内容播放機。此外,當該内容 播放機播放該内容資料時,或當將該内容資料自該内容播 放機拷貝到一外部媒體時,即將資訊傳送到一記錄網站, 因而可追蹤該授權許可的内容資料之使用。 實施方式 現在提供本發明的一目錄,以便協助讀者迅速找到本實 施例中之不同的各節。 L 安全數位内容電子式配送系統 A.系統概述 1 ·權利管理 2·量度(Metering) O:\85\85 丨 56 分割.d〇c -17- 200304126 3.開放性架構 B. 系統功能組成部分 1. 内容提供者 2. 電子數位内容商店 3. 中間市場夥伴 4. 清算所 5. 使用者裝置 6. 傳輸基礎建設 C. 系統使用 II. 密碼觀念及其在安全數位内容電子式配送系統上的 應用 A. 對稱演算法 B. 公共金鑰演算法 C. 數位簽名 D. 數位證明書 E. SC(s)圖形表示法指南 F. —安全容器物件加密實例 III. 安全數位内容電子式配送系統流程 IV. 權利管理架構模型 A. 架構層功能 B. 功能分割及流程 1. 内容格式化層 2. 内容使用控制層 3. 内容識別層 ΟΛ85\85156 分割.DOC -18- 200304126 屯授權許可控制層 c.内容配送及授權許可控制 V. 安全容器物件結構 A. —般性結構 B. 權利管理語言語法及語意 C. 安全容器物件流程及處理概述 D. 中介資料安全容器物件620格式 E. 報價安全容器物件641格式 F. 交易安全容器物件640格式 G. 訂單安全容器物件650格式 H. 授權許可安全容器物件660格式 I. 内容安全容器物件格式 VI. 安全容器物件包封及打開 A. 概述 B. 材料表(Bill Of Material ;簡稱BOM) C. 金鑰說明部份 VII. 清算所 A. 概述 B. 權利管理程序 C. 特定國家參數 D. 稽核記錄及追蹤 E. 結果回報 F. 帳單開立及付款驗證 G. 重新傳輸 O:\85\85156 分割.D0C -19- 200304126 VIII.内容提供者 A. 概述 B. 工作流程管理程式 1. 產品等候動作/資訊程序 2. 新内容要求程序 3. 自動中介資料取得程序 4. 手動式中介資料輸入程序 5. 使用條件程序 6. 受監控的發行程序 7. 中介資料SC(s)產生程序 8. 浮水印程序 9. 預先處理及壓縮程序 10. 内容品質管制程序 11. 加密程序 12. 内容SC(s)產生程序 13. 最後品質保證程序 14. 内容傳播程序 15. 工作流程規則 C. 中介資料同化及輸入工具程式 1. 自動中介資料取得工具程式 2. 手動式中介資料輸入工具程式 3 .使用條件工具程式 4. 中介資料SC(s)之各組成部分 5. 受監控的發行工具程式 O:\85\85156 分割.DOC -20- 200304126 D.内容處理工具程式 1 ·浮水印工具程式 2·預先處理及壓縮工具程式 3 ·内容品質管制工具程式 4_加密工具程式 E·内容SC(s)產生工具程式 F ·最後品質保證工具程式 G. 内容傳播工具程式 H. 内容促銷網站 I. 内客網站代管(Content Hosting) 1 · 代管内容網站 2·安全數位内容電子式配送系統提供的代管内 容網站111 IX.電子數位内容商店 A·概述-對多個電子數位内容商店之支援 B.點對點電子數位内容配送服務 1 ·整合要求 2 ·内容取得工具程式 3 ·交易處理模組 4.通知介面模組 5·帳戶對帳工具程式 C·廣播電子數位内容配送服務 Χ·使用者裝置 Α_概述O: \ 85 \ 85156 Split. DOC -15- 200304126 is: its content lacks the standard for digital players to produce digital players on electronic devices. Content providers, e-shops, or other members of the electronic distribution chain may want to provide customized playback on a variety of devices such as personal computer systems, set-top boxes, and handheld devices machine. There is a need for a set of tools that can decrypt digital content in a tamper-resistant environment (that is, an environment that prevents unauthorized access to the content while a third party is playing). In addition, a set of utility programs is required to enable a user to manage a local digital content library, but the set of utility programs does not allow the user to access content that is not purchased for use. For more information on protecting the context of digital content, see the three sources below. "Music on the Internet and the Intellectual Property Protection Problem" by Jack Lacy, James Synder, and David Maher of AT &amp; T Labs (Florham Park, NJ ·), available at http://www.a2bmusic.com/about /papers/musicipp.htm Read the paper online. A paper entitled "Securing the Content, Not the Wire for Information Commerce" by Olin Sibert, David Bernstein, and David Van Wie of InterTrust Technologies Corp. (Sunnyvale, CA) describes a password-protected container object called DigiBox. Go to http://www.intertrust.com/architecture/stc.html to read the paper online. And an IBM White Paper "Cryptolope Container Technology", which can be purchased online at http: ///cyptolope.ibm.com/white.htm. O: \ 85 \ 85156 Segmentation. DOC -16- 200304126 Summary of the Invention One object of the present invention is to remove the disadvantages mentioned above and provide a system for tracking the use of content data. An embodiment of the present invention provides a system for tracking the use of digital content on a user device. An electronic store connected to a network sells licenses for playing digital content to users. The content player that receives the licensed content data from the network is used to play the licensed content data. In addition, a recording site connected to the Internet tracks the playback of content data. More specifically, the recording website receives playback information from the network, and the playback information includes the number of times the content data has been played by the associated content player. Another embodiment of the invention provides a method for tracking the use of digital content on a user device. According to the method, an authorized license for playing digital content data is sold to a user, and the authorized content data is transmitted to a content player of the user. In addition, when the content player plays the content data, or when the content data is copied from the content player to an external media, the information is transmitted to a recording website, so the use of the licensed content data can be tracked . Embodiments A catalog of the present invention is now provided to assist the reader in quickly finding the different sections in this embodiment. L Secure Digital Content Electronic Distribution System A. System Overview 1 · Rights Management 2 · Metering O: \ 85 \ 85 丨 56 Segmentation. Doc -17- 200304126 3. Open Architecture B. System Function Components 1. Content Provider 2. Electronic Digital Content Store 3. Intermediate Market Partner 4. Clearing House 5. User Device 6. Transmission Infrastructure C. System Use II. Cryptography Concept and Its Application in Secure Digital Content Electronic Distribution System Application A. Symmetric algorithm B. Public key algorithm C. Digital signature D. Digital certificate E. SC (s) Graphical Representation Guide F. — Security container object encryption example III. Process of secure digital content electronic distribution system IV. Rights management architecture model A. Architecture layer functions B. Function segmentation and flow 1. Content formatting layer 2. Content usage control layer 3. Content identification layer ΟΛ85 \ 85156 segmentation. DOC -18- 200304126 Authorization control layer c Content distribution and license control V. Structure of secure container objects A. General structure B. Rights management language syntax and semantics C. Overview of the process and processing of secure container objects D. Intermediate data secure container objects 6 20 format E. quote secure container object 641 format F. transaction secure container object 640 format G. order secure container object 650 format H. authorized security container object 660 format I. content secure container object format VI. Secure container object encapsulation and Open A. Overview B. Bill Of Material (BOM) C. Key Description Section VII. Clearing House A. Overview B. Rights Management Procedures C. Country Specific Parameters D. Audit Records and Tracking E. Results Return F. Billing and payment verification G. Retransmission O: \ 85 \ 85156 split. D0C -19- 200304126 VIII. Content provider A. Overview B. Workflow management program 1. Product wait action / information program 2. New content request procedures 3. Automatic intermediary data acquisition procedures 4. Manual intermediary data entry procedures 5. Conditions of use procedures 6. Monitored distribution procedures 7. Intermediate data SC (s) generation procedures 8. Watermark procedures 9. Pre-processing And compression procedures 10. Content quality control procedures 11. Encryption procedures 12. Content SC (s) generation procedures 13. Final quality assurance procedures 14. Content dissemination procedures 15. Workflow rules C. Assimilation of intermediary data Input tool program 1. Automatic intermediary data acquisition tool program 2. Manual intermediary data input tool program 3. Conditions of use tool program 4. Components of intermediary data SC (s) 5. Monitored distribution tool program O: \ 85 \ 85156 Segmentation. DOC -20- 200304126 D. Content processing tool program 1 · Watermark tool program 2 · Pre-processing and compression tool program 3 · Content quality control tool program 4_ Encryption tool program E · Content SC (s) generation tool Program F · Final Quality Assurance Tool Program G. Content Dissemination Tool Program H. Content Promotion Website I. Internal Hosting Website Hosting (Content Hosting) 1 · Hosting Content Website 2 · Secure Digital Content Electronic Distribution System Hosting Content Website 111 IX. Electronic Digital Content Store A · Overview-Support for multiple electronic digital content stores B. Peer-to-peer electronic digital content distribution service 1 · Integration requirements 2 · Content acquisition tool program 3 · Transaction processing module 4. Notification interface module Group 5 · Account Reconciliation Tool Program C · Broadcast Electronic Digital Content Distribution Service X · User Device Α_Overview

ΟΛ85\85156 分割.DOC 200304126 B. 應用程式安裝 C. 安全容器物件處理器 D. 播放應用程式 1. 概述 2 ·使用者介面元件 3. 拷貝/播放管理元件 4. 解密1505、解壓縮15〇6、及播放元件 5. 資料管理1502及資料庫存取元件 6 _應用程式間通訊元件 7·其他雜項元件 8 · —般性播放應用程式 I·安全數位内容電子式配送系統 A.系統概述 安全數位内容電子式配送系統是—種技術平台,包含將 數位内容及與數位内容相關的内容安全地傳送到一使用者 用戶端裝置並對該等内容進行權利管理所需之之技術、規 格、工具程式、及軟體。使用者裝置包含個人電腦系統、 視訊轉換器(IRDs)、及網際網路裝置。這些裝置可將該内 容拷貝到該内容所有人許可的外部媒體或可攜式、;肖費家電 裝置。術語數位内容(Digital c_ent)或内容(CQn㈣意: 讀位格式儲存的資訊及資料,包括:圖彳、電影、視訊 節目、音樂、程式、多媒體、及電玩。 11 該技術平台規定如何準備數位内容、如何經由點對點或 κ播基礎建設(例如I線、網際網路、衛星、及無線電)而 〇:\85\85!56 分割 D〇c -22- 200304126 、王也配送、如何授權給使用者裝置、以及如何防止未經 技‘的拷貝或播放。此外,該技術平台之架構可在諸如浮 水印、壓縮/編碼、加密、及其他安全演算法等的各種技術 隧著時間而有所進展時,整合或移植該等技術。 安全數位内容電子式配送系統之基本組成部分包括:(1 ) 對内奋所有人的所有權保護之權利管理;(2)交易計次以便 進仃互即且精確的報酬給付;以及一種開放性且文件記 載詳盡的架構,可讓内容提供者準備内容,並可讓該内容 經由多種網路基礎建設而安全配送,以便在任何符合標準 的播放機上播放。 1·權利管理 係經由分佈在該系統的各工作組成部分之間的一組功 能而實施該安全數位内容電子式配送系統中之權利管理。 其王要功能包括··授權許可及控_,使該内容只能被取得 一授權許可的得到授權之中間人或最終使用者解碼;以及 根據採購或授權許可的條款,例如根據容許拷貝次數、播 放次數、或授權許可有效的時間間隔或期限,而對内容的 使用進行控制及強制執行。權利管理的次要功能為起動一 裝置,用以識別未經授權的内容拷貝之起源,以便對抗剽 竊。 係利用一種清算所(Clearingh〇use)實體及安全容器物件 (Secure Container;簡稱sc)技術而實施授權許可及控制。 清算所在驗證過已成功完成—授權許可交易之後,即使中 間人或最終使用者可以將内容解碼,藉此*提供授權許 O:\85\85156 分割.D0C -23- 200304126 可。安全容器物件係用來在各系統組成部分之間配送加密 的内容及資訊。sc是一種加密的資訊或内容載體,該載體 利用加密、數位簽名、及數位證明書,而使電子資訊及内 容不會受到未經授權的攔截或修改。該sc亦可驗證數位内 容的可信賴性及完整性。這些權利管理功能的優點在於: 電子數位内容配送基礎建設並不一定要是安全的或可信賴 的。因此,可經由諸如全球資訊網及網際網路等的網路基 礎建設而傳輸。這是由於係在安全容器物件内將内容加 密,且該内容的儲存及配送係與該内容的解密及使用隔 離。只有具有解密金鑰的使用者可將加密的内容解密,且 清算所只針對經過授權且適當的使用要求發出解密金鑰。 清异所將不批准未知或未經授權者的額外要求、或不符内 容所有人設定的内容使用條件的要求。此外,如果在内容 的傳輸期間一 SC被墓改,則清算所中之軟體決定該sc被裏 改或被偽造,並拒絕接受該交易。 係經由在一最終使用者裝置上執行的最終使用者播放 應用程式(i95)而起動内容使用的控制。該應用程式將一數 位碼嵌入每一份的内容,該數位碼規定可容許的拷貝及播 放次數。利用數位浮水印技術來產生該數位碼,使其他的 最終使用者播放應用程式(195)無法得知該數位碼,並使該 數碼了抗拒更改的費試。在一替代實施例中,只是將該 數位碼保存為與内容(113)相關聯的使用條件之一部分。當 在一符合標準的最終使用者裝置中存取數位内容(113) 時,最終使用者播放應用程式(195)讀取該浮水印,以便檢ΟΛ85 \ 85156 Segmentation. DOC 200304126 B. Application installation C. Secure container object handler D. Playback application 1. Overview 2 · User interface element 3. Copy / playback management element 4. Decryption 1505, decompression 15〇6 And playback components 5. Data management 1502 and data library access components 6 _ Inter-application communication components 7 · Other miscellaneous components 8 ·-General playback applications I · Secure digital content Electronic distribution system A. System overview Secure digital content An electronic distribution system is a technology platform that includes the technologies, specifications, tools, programs, and programs needed to securely transfer digital content and content related to digital content to a user client device and manage rights on those content. And software. User devices include personal computer systems, video converters (IRDs), and Internet devices. These devices may copy the content to external media or portable, portable, or smart home appliances with the permission of the content owner. The term Digital Content (CQn) or Content (CQn): Information and data stored in reading format, including: pictures, movies, video programs, music, programs, multimedia, and video games. 11 The technology platform specifies how to prepare digital content How to use point-to-point or κ-broadcast infrastructure (such as I-line, Internet, satellite, and radio) and 〇: \ 85 \ 85! 56 to divide D〇c -22- 200304126, Wang also delivers, how to authorize Device, and how to prevent unskilled copying or playback. In addition, the technology platform's architecture allows for advancements in various technologies such as watermarking, compression / encoding, encryption, and other security algorithms to progress over time. Integrate or transplant these technologies. The basic components of a secure digital content electronic distribution system include: (1) rights management for the owner's ownership protection; (2) transaction counting for immediate and accurate Remuneration payments; and an open and well-documented framework that allows content providers to prepare content and allow it to be built across multiple network infrastructures It is designed to be securely distributed for playback on any standard-compliant player. 1. Rights management implements the rights in the secure digital content electronic distribution system through a set of functions distributed between the various working components of the system. Its key functions include: · Licensing and control, so that the content can only be decoded by authorized intermediaries or end users who have obtained an authorized license; and according to the terms of the purchase or license, such as copying allowed Number of times, number of playbacks, or the time interval or period during which the license is valid, to control and enforce the use of the content. A secondary function of rights management is to activate a device to identify the origin of unauthorized content copies so that Combating plagiarism. It uses a Clearing House entity and Secure Container (sc) technology to implement authorization and control. The clearing house has verified that the transaction has been successfully completed—after authorizing the transaction, even if an intermediary or End-users can decode content to provide licenses O: \ 85 \ 85156 points .D0C -23- 200304126 Yes. A secure container object is used to distribute encrypted content and information between system components. Sc is an encrypted information or content carrier that uses encryption, digital signatures, and digital certificates , So that electronic information and content will not be intercepted or modified without authorization. The sc can also verify the trustworthiness and integrity of digital content. The advantages of these rights management functions are: Electronic digital content distribution infrastructure is not necessarily If it is secure or trusted. Therefore, it can be transmitted via network infrastructure such as the World Wide Web and the Internet. This is because the content is encrypted in a secure container object, and the content is stored and distributed Isolated from the decryption and use of the content. Only users with a decryption key can decrypt the encrypted content, and the clearing house only issues decryption keys for authorized and appropriate use requests. Qingyi will not approve additional requirements from unknown or unauthorized persons, or requirements that do not meet the content use conditions set by the content owner. In addition, if an SC is altered during the transmission of the content, the software in the clearing house decides that the sc is altered or forged, and refuses to accept the transaction. Control of the use of content is initiated by an end-user playback application (i95) running on an end-user device. The application embeds a digital code into each piece of content, which specifies the allowable number of copies and playbacks. The digital watermarking technology is used to generate the digital code, so that other end-user playback applications (195) cannot know the digital code, and make the digital resistant to change. In an alternative embodiment, the digital code is only saved as part of the conditions of use associated with the content (113). When the digital content (113) is accessed in a standard end-user device, the end-user playback application (195) reads the watermark in order to detect

O:\85\85156 分割.d〇C -24- 200304126 查使用限制,並在需要時更新該浮水印。如果對該内容所 要求的使用不符使用條件,例如拷貝次數用完了,則最終 使用者裝置將不執行該要求。 數位浮水印也提供了識別經過授權的或未經授權的内 容拷貝的來源之方式。内容所有人將一起始浮水印嵌入内 容中,以便識別内容所有人、指定著作權資訊、規定配送 地理區、及加入其他相關的資訊。將一第二浮水印嵌入最 終使用者裝置上的内容,以便識別内容購買者(或授權許可) 及最終使用者裝置、指定購買或授權許可條件及日期、及 加入任何其他相關的資訊。 因為浮水印變成内容中不可分的一部分,所以不論拷貝 是經過授權的或未經授權的,該等内容中都必然載有這些 浮水印。因此,不論將内容儲存在何處,也不論内容的來 源為何’數位内容都必然包含與該内容的來源及容許使用 有關的資訊。可利用該資訊來對抗内容的非法使用。 2. 量度 清算所保留經由該清算所而批准金鑰交換的所有交易 之記錄’作為其權利管理功能的一部分。該記錄可量度授 權許可及原始的使用條件。可將該交易記錄以立即或定期 之方式回報給諸如内容所有人或内容提供者、零售商、及 其他相關夥伴等的各負責方,以便有助於以電子方式進行 交易付款的對帳、及其他的用途。 3. 開放性架構 該安全數位内容電子式配送系統是一種開放性架構,該O: \ 85 \ 85156 Divide .d〇C -24- 200304126 Check the usage restrictions and update the watermark when needed. If the required use of the content does not meet the usage conditions, such as running out of copies, the end-user device will not execute the request. Digital watermarks also provide a way to identify the source of authorized or unauthorized content copies. The content owner embeds an initial watermark into the content in order to identify the content owner, specify copyright information, specify distribution geographic areas, and add other relevant information. A second watermark is embedded in the content on the end-user device to identify the content purchaser (or license) and end-user device, specify the purchase or license conditions and dates, and add any other relevant information. Because watermarks become an integral part of the content, whether the copy is authorized or unauthorized, the content must contain these watermarks. Therefore, wherever the content is stored, and regardless of the source of the content ', digital content necessarily contains information about the source of the content and its permitted use. This information can be used to combat illegal use of the content. 2. Measurement The clearing house maintains a record of all transactions approved for key exchange via that clearing house 'as part of its rights management function. This record measures licenses and original conditions of use. The transaction record may be reported to various responsible parties, such as content owners or content providers, retailers, and other relevant partners, in an immediate or regular manner to facilitate the reconciliation of transaction payments electronically, and Other uses. 3. Open architecture The secure digital content electronic distribution system is an open architecture.

O:\85\85156 分割.DOC -25- 200304126 架構具有公佈的規格及介面,而有助於廣泛地在是市場中 實施並接受該系統,並同時維護内容所有人的權利保護。 該系統架構的彈性及開放性亦可使該系統在各種技術、傳 輸基礎建設、及裝置進入市場時,能夠隨著時間而有所進 展。 該架構在有關内容的本質及其格式方面具有開放性。該 架構支援音訊、程式、多媒體、視訊、或其他類型的内容 之配送。忒内各可以疋諸如用於數位音樂的線性等的 一原生格式,也可以是經過諸如濾波、壓縮、或預強調/ 解強調等的額外預先處理或編碼而得到的一格式。該架構 對於各種加密及浮水印技術都具有開放性。該架構可以選 擇特定的技術以適應不同的内容類型及格式,並可導入或 採用新開發出的技術。此種彈性可讓内容提供者在安全數 杈内容電子式配送系統内選擇及升級其用於資料壓縮、加 密、及格式化所用的技術。 孩架構也對不同的配送網路及配送模式具有開放性。該 架構支援經由低速網際網路連線或高速衛星及纜線網路而 進行的内容配送,並可配合點對點或廣播模型。此外,該 架構被設計成可在其中包括低成本消費家電裝置的多種裝 置上貫施最終使用者裝置中之功能。此種裝置可讓内容提 ^者及零售商經由多種服務類型而將内容提供給中間人或 最終使用者,並可讓使用者購買内容或取得内容的授權許 &quot;播放咸内各,並將該内容記錄在各種符合標準的播放 0物⑽分割概 -26- 200304126 B ·系統功能組成部分 現在請參閱圖1,圖中示出根據本發明的-安全數位内 容電子式配送系統⑽概觀之方塊圖。安全數位内容電子式 配,系統⑽包含數個其中包含—端到端解決方案:業務 、-且成邯分’這些業務組成部分包括:内容提供者⑻或數位 内容所有人、電子數位内容商店⑻、中間市場夥伴(圖中 未示出)、清算所105、代管内容網站⑴、傳輸基礎建設 ι〇7、及最終使用者裝置⑽。每—這些業務組成部分都利 用到安全數位内容電子式配送系統⑽的各種組成部分。下 文中將對與電子内容113配送有關的這些業務組成部分及 系統組成部分作高階的說明。 1·内容提供者101 内容提供者101或内容所有人是原始内容113的所有 人、及(或)被授權將獨立内容113作成套件以供進一步配銷 之配銷商。内容提供者101可直接利用其權利,或將内容113 授權給電子數位内容商店103、或中間市場夥伴(圖中未示 出),且通常回收與電子商務收益相關的内容使用付款。内 春才疋供者101的例子包括Sony、Time_Warner、MTV、IBM、 MiCr0S0ft、Turner、F〇x、及其他内容提供者。 内各提供者1 0 1使用作為安全數位内容電子式配送系統 100的一部分而提供之各工具程式,以便準備其内容113及 相關的貝料以供配送。一工作流程管理程式i 5 4安排所要處 理的内容113之時程,並在該内容113經過内容113準備及套 件組成的各步驟時,追蹤該内容丨丨3,以便保持優異的品質 O:\S5\85156 分割.D〇c -27- 200304126 的資料,:1太:、,’街語中介資料意指與内容113相關 /甘A I施例中並不包括内容113本身。舉例而 σ木歌曲的中介資料可能是歌曲名稱或歌曲的消蛰 點數,但並非該歌曲的錄音。内容113將包含錄音。_中\ 貝科同化及輸入工具程式161係用來自内容提 :二介:料:或提取内容提供者以-指定格式提二 ' 曰木的只例中,為諸如CD名稱、藝人名稱、歌 H稱'^㈣片等内容113之資訊),並將這些資料組成 以供電子式配送。也利用中介資料同化及輸入工且程 式⑹來輸入内容113之使用條件。使用條件中的資料可包 括拷㈣制規則、批發價、以及任何必要的業務規則。利 用'予水印工具程式來隱藏内容113中用來識別内容所有 人、處理日期、及其他相關資料等的資料。在内容113是音 訊的$她例中,利用—音訊預先處理工具程式來調整内 容113或其他音訊的動態範圍,及(或)等化内容113,以便 :到最佳二壓縮品質’並壓縮到所需的壓縮等級,且將内 谷113加密。這些工具程式具有適應性,以遵循數位内容壓 社編碼、加密、及格式化方法在技術上的進展,而讓内容 工 &amp;i、者10 1在市%上出現新的工具程式時,可利用最佳的 具程式。 SC包封工具程式將加密的内容113、數位内容相關資料 或中介資料、及加密金料封在各Scs(將於下文中說明之) 中並儲存在代答内容網站及(或)促銷網站,以供電子 式配送。代管内容網站可設於内容提供者101或設於多個場O: \ 85 \ 85156 Segmentation. DOC -25- 200304126 The architecture has published specifications and interfaces, which helps to implement and accept the system in a wide range of markets, while maintaining the protection of the rights of content owners. The flexibility and openness of the system architecture also enables the system to progress over time when various technologies, transmission infrastructure, and devices enter the market. The architecture is open in terms of the nature of the content and its format. The architecture supports the distribution of audio, programming, multimedia, video, or other types of content. Each frame can be a native format such as linear for digital music, or a format obtained by additional pre-processing or encoding such as filtering, compression, or pre-emphasis / de-emphasis. The architecture is open to various encryption and watermarking technologies. The architecture can select specific technologies to suit different content types and formats, and can import or adopt newly developed technologies. This flexibility allows content providers to select and upgrade their technologies for data compression, encryption, and formatting within secure digital content electronic distribution systems. The child architecture is also open to different distribution networks and distribution models. The architecture supports content distribution over low-speed Internet connections or high-speed satellite and cable networks, and can work with peer-to-peer or broadcast models. In addition, the architecture is designed to implement the functions in end-user devices on a variety of devices including low-cost consumer appliances. This device allows content providers and retailers to provide content to middlemen or end users through a variety of service types, and allows users to purchase content or obtain a license for the content. This content is recorded in various standards-compliant playbacks. 0-2003-04126 B. System function components. Please refer to FIG. 1. A block diagram of an overview of the secure digital content electronic distribution system according to the present invention is shown. Illustration. Secure digital content electronic distribution, the system⑽ includes several which include—end-to-end solutions: business, and success—these business components include: content providers⑻ or digital content owners, electronic digital content stores⑻ , Middle market partners (not shown in the figure), clearing house 105, hosting content website ⑴, transmission infrastructure 007, and end-user devices ⑽. Each—these business components make use of the various components of a secure digital content electronic distribution system. The following sections provide a high-level description of these business components and system components related to electronic content 113 distribution. 1. Content Provider 101 The content provider 101 or the content owner is the owner of the original content 113 and / or a distributor authorized to make the independent content 113 into a package for further distribution. The content provider 101 can directly use its rights, or authorize the content 113 to the electronic digital content store 103, or a middle market partner (not shown in the figure), and usually recover the content usage payment related to the e-commerce revenue. Examples of internal talent gift providers 101 include Sony, Time_Warner, MTV, IBM, MiCrOS0ft, Turner, Fox, and other content providers. Each of the providers 101 uses tools provided as part of the secure digital content electronic distribution system 100 to prepare its content 113 and related shellfish for distribution. A workflow management program i 5 4 schedules the content 113 to be processed, and tracks the content 113 as it passes through the steps of content 113 preparation and package composition, in order to maintain excellent quality O: \ S5 \ 85156 Segmentation. D〇c -27- 200304126 The data: 1 Tai: ,,, 'Street language intermediary data means that it is related to content 113 / Content 113 is not included in the AI embodiment. For example, the mediating data of a σ wood song may be the song title or the elimination point of the song, but not the recording of the song. Content 113 will contain audio recordings. _ 中 \ Beco assimilation and input tool program 161 is used to extract from the content: second introduction: material: or extract the content provider to mention-in the specified format. H refers to information such as '^ ㈣ 片 113'), and composes these materials to provide power distribution. Intermediate data assimilation and input procedures are also used to enter the use conditions of content 113. The information in the conditions of use may include copying rules, wholesale prices, and any necessary business rules. The 'watermarking tool program' is used to hide the information in the content 113 used to identify the content owner, the processing date, and other related data. In the case where the content 113 is audio, the audio pre-processing tool program is used to adjust the dynamic range of the content 113 or other audio, and / or equalize the content 113 in order to: to the best second compression quality and compress The required compression level, and the inner valley 113 is encrypted. These tool programs are adaptable to follow the technological progress of digital content compression coding, encryption, and formatting methods, so that when content workers &amp; i, or 10 1 new tool programs appear in the market, they can Use the best programming. The SC encapsulation tool program encapsulates the encrypted content 113, digital content-related data or intermediary data, and encrypted gold material in each SCS (to be described below) and stores it on the pickup content website and / or promotion website, Distribution by power supply. The hosted content website can be located at the content provider 101 or at multiple venues

O:\85\85156 ^tij.D〇C -28- 200304126 所:其中包括電子數位内容商店103及中間市場夥伴⑽中 未不出)的场所。因為内容113及金瑜(將於下文中說明之) 係在各SCs中加密及包封,所以電子數位内容商店1〇3或人 ㈣他網站代管業者無法在不經過清算所批准且通知内容 才疋供者1 〇丨的情形下直接存取解密後的内容113。 2·電子數位内容商店1〇3 電子數位内容商店103是經由諸如以内容113為主題的 銷售計畫或内容113的電子式促銷等多種服務或應用而行 銷内容113之實體。電子數位内容商店1〇3管理其服務的設 計、開發、業務運作、結帳、促銷、及銷售。線上電子數 位内容商店103的例子為提供軟體的電子式下載之網站。 電子數位内容商店103在其服務的範圍内,執行了安全 數位内容電子式配送系統100的某些功能。電子數位内容商 店103集合來自内容提供者丨〇丨之資訊,將内容及中介資料 包封在額外的SCs中,並將這些SCs傳送到消費者或企業, 作為一服務或應用的一部分。電子數位内容商店1〇3利用安 全數位内容電子式配送系統1 00提供的工具程式,而協助其 完成下列事項:中介資料提取、次要使用條件、SC的包封、 及電子内容交易的追蹤。該次要使用條件資料可包括諸如 内容113購買價格、計次付費價格、複製授權及目標裝置類 型、或可用時間限制等的零售業務報價資料。 一旦一電子數位内容商店1〇3完成一最終使用者對電子 内容113的一有效要求之後,該電子數位内容商店1〇3即負 責授權清算所105將内容1 1 3的解密金鑰發給該客戶。該電 O:\85\85156 分割.DOC -29- 200304126 子數位内奋商店也授權包含内容113的SC之下載。該電子 數“内谷商;^可選擇將包含數位$容的各奶放在其本身 的網站,及(或)可選擇利用另一代管内容網站的網站代管 及配送設施。 數位内容商店可利用安全數位内容電子式配送系 、、充100而針對取終使用纟可能提出的疑問或問題提供客戶 服而⑨子數位内容商店103也可將其客戶服務支援外包給 清算所105。 3·中間市場夥伴(圖中未示出) 、在一替代實施例巾’可利用纟全數位内纟電子式配送系 統100將内容113提供給被稱為中間市場夥伴的其他企業。 每些夥伴可包括提供非電子服務的數位内容相關公司,例 如配銷内容113的電視台或視訊俱樂部、電台或唱片俱樂部 等這二泰伴亦可包括諸如錄音室、複製公司、製作人等 處理材料作為|彔晉製作或行銷一部 &gt; 的其❿受託者。這些 中門市琢茅&gt; 伴舄要清昇所^ 〇 5的批准,以便將内容113解密。 4.清算所Γ〇5 清异所105對與在一SC中加密的内容113的銷售及(或)容 許使用提供授權許可及記錄保存。當清算所1〇5自一中間人 或最終使用者接收到一個對内容丨丨3的一解密金鑰之要求 時,清算所105即確認所要求資訊的完整性及可信賴性;驗 澄一電子數位内容商店或内容提供者丨〇丨已授權該要求;以 及驗證所要求的使用符合内容提供者1〇1所規定的内容使 用條件。一旦滿足這些驗證之後,清算所105即將包封在一 O:\85\85156 分割.DOC •30- 200304126 拍:榷許可sc的内容 用去、、“ 鑰傳W㈣要求的最終使 用者。孩金鑰被加密成 八从 成八有i過杈椎的使用者才能擷取該 -鑰。如果最終使用者的要求是無法驗證的、不完整的、 或=授權的,料算所1G5拒絕對解密金鑰的要求。 、清算所105保存所有交易的記錄,並可以立即、定期、 $偈限某些交易之^式料些記錄回報給諸如電子數位内 容商店103及内容提供者1()1等各負責方。此種回報是一種 可將内容113的銷售資訊通知内容提供者1()1且電子數位内 容商店103可得到以電子方式配送到其客戶的稽核報告之 一種方式。如果清算所105偵測到_sc中的資訊已洩漏出 去或不符内容使用條件,則清算所1〇5亦可通知内容提供者 101及(或)電子數位内容商店103。係針對資料收集儲存及 報告產生,而設計清算所105資料庫的交易記錄及儲存能 力0 在另一實施例中,清算所1 05可提供客戶支援及交易例 外狀況的處理,例如退款、傳輸失敗、及購買爭端。清算 所105可以一獨立實體之方式運作,而作為權利管理及量度 之一受託管理人。清算所於需要時也提供開立帳單及結算 的服務。電子清算所的例子包括Secure-Bank.com、及由 Visa/Mastercard 所成立的安全電子交易(Secure Electronic Transaction ;簡稱SET)。在一實施例中,清算所105是最終 使用者裝置109可連線到的網站。在另一實施例中,清算所 105是電子數位内容商店103的一部分。 5·最終使用者裝置109 ΟΛ85\85156 分割.D0C -31 - 200304126 取終使用者裝置109可以是包含符合安全數位内容電子 式配迗系統100規格的一最終使用者播放應用程式195(將 於下又中說明之)之任何播放裝置。些裝置包括個人電腦系 、’、先視汛轉換器(IRDS)、及網際網路裝置。可在軟體及(或) 消費私子裝置硬體中實施最終使用者播放應用程式195。除 了執行播放、圮錄、及内容庫管理功能以外,最終使用者 播放應用程式195也執行SC處理,而起動最終使用者裝置 109中〈權利管理。最終使用者裝置管理包含數位内容 的各SCs之下載及儲存;要求並管理自清算所1〇5接收經過 加在的數位内容金鑰;處理每次拷貝或播放數位内容時的 &gt;予水印;根據數位内容的使用條件而管理所作拷貝(或刪除 拷貝)的次數;以及在容許時執行拷貝至卜外部媒體或可攜 ”費電子裝置。該可攜式消費電子裝置可執行一部分的 最、、使用者播放應用程式195功能,以便處理浮水印中嵌入 的内容使用條件。在本文全文中,術語最終使用者及最終 使用者裝置係用來意指在—最終使用者裝置1G9上的使用 或執行。: 6·傳輸基礎建設1〇7 、去王數U内各兒子式配送系統丨〇〇與連接電子數位内容 商店103及最終使用者裝置i Q9的傳輸網路無關。安全數位 内合電子式配送系統1〇〇支援諸如網際網路等點對點配送 杈式、及諸如數位廣播電視等廣播配送模式。 縱然使用相同的工具程式及應用程式來取得、包封、及 追蹤經由各種傳輸基礎建設1〇7的内容113交易,但是可根O: \ 85 \ 85156 ^ tij.D〇C -28- 200304126 Places: These include electronic digital content stores 103 and intermediate market partners (not shown). Because Content 113 and Jin Yu (to be described below) are encrypted and encapsulated in each SCs, the digital content store 103 or Renhe website hosting company cannot notify the content without approval from the clearing house. In the case of the donor 10, the decrypted content 113 is directly accessed. 2. Electronic Digital Content Store 103 The electronic digital content store 103 is an entity that markets the content 113 through various services or applications such as a sales plan with the theme of the content 113 or an electronic promotion of the content 113. The electronic digital content store 103 manages the design, development, business operations, checkout, promotion, and sales of its services. An example of an online electronic digital content store 103 is a website that provides electronic download of software. The electronic digital content store 103 performs certain functions of the secure digital content electronic distribution system 100 within the scope of its services. The electronic digital content store 103 gathers information from the content provider 丨 〇 丨, encapsulates the content and intermediary data in additional SCs, and transmits these SCs to consumers or businesses as part of a service or application. The electronic digital content store 103 uses the tools and programs provided by the secure digital content electronic distribution system 100 to assist it in completing the following tasks: intermediary data extraction, secondary use conditions, encapsulation of SC, and tracking of electronic content transactions. The secondary use condition data may include retail business quotation data such as the content 113 purchase price, pay-per-view price, copy authorization and target device type, or available time limit. Once an electronic digital content store 103 completes a valid request from an end user for the electronic content 113, the electronic digital content store 103 is responsible for authorizing the clearing house 105 to send the decryption key of the content 113 to the client. The electricity O: \ 85 \ 85156 divided. DOC -29- 200304126 sub-digital store also authorized the download of SC containing content 113. The electronic number "inner valley business; ^ can choose to place each milk containing digital capacity on its own website, and / or choose to use another website hosting and distribution facilities hosting content site. Digital content stores can Use secure digital content electronic distribution system, charge 100, provide customer service for possible end-use questions, and digital content store 103 can also outsource its customer service support to clearing house 105. 3. · Intermediate Market partners (not shown in the figure), in an alternative embodiment, 'all digital internal electronic distribution system 100 may be used to provide content 113 to other enterprises known as middle market partners. Each of these partners may include providing Digital content related companies that are not electronic services, such as TV stations or video clubs, radio or record clubs who distribute content 113. The two Thai partners can also include processing materials such as recording studios, reproduction companies, producers, etc. | Other trustees who are marketing a &gt;. These Zhongmao Zhuomao &gt; companions will need to clear the approval of ^ 05 to decrypt the content 113. 4. The Γ〇5 Qingyi Institute 105 provides authorization and record keeping for the sale and / or permissible use of the content 113 encrypted in an SC. When the clearing house 105 receives an intermediary or end user from a When a request for a decryption key for content 丨 丨 3 is made, clearing house 105 confirms the integrity and reliability of the requested information; verifies that an electronic digital content store or content provider has authorized the request; and The required use of the verification is in accordance with the content use conditions specified by the content provider 101. Once these verifications are satisfied, the clearing house 105 will be encapsulated in a O: \ 85 \ 85156 division. DOC • 30- 200304126 The content of the sc is used, ", and the key is transmitted to the end user who requested it. The child key is encrypted into eight from which the user can retrieve the key. If the end user's request is unverifiable, incomplete, or = authorized, it is expected that 1G5 of the computer will refuse the request for the decryption key. The clearing house 105 keeps records of all transactions, and can immediately, regularly, and $ 、 limit certain transactions to return these records to responsible parties such as electronic digital content stores 103 and content providers 1 () 1. Such a return is one way in which the sales information of the content 113 can be notified to the content provider 1 () 1 and the electronic digital content store 103 can obtain an audit report for electronic distribution to its customers. If the clearing house 105 detects that the information in _sc has been leaked or does not meet the content use conditions, the clearing house 105 may also notify the content provider 101 and / or the electronic digital content store 103. For the purpose of data collection, storage and reporting, the transaction records and storage capacity of the clearing house 105 database are designed. In another embodiment, the clearing house 105 can provide customer support and transaction exception handling, such as refunds, transmissions Failure and purchase disputes. The clearing house 105 can operate as an independent entity and act as a trustee for rights management and measurement. The clearing house also provides billing and settlement services when needed. Examples of electronic clearing houses include Secure-Bank.com and Secure Electronic Transaction (SET) established by Visa / Mastercard. In one embodiment, the clearing house 105 is a website to which the end-user device 109 can connect. In another embodiment, the clearinghouse 105 is part of the electronic digital content store 103. 5. End-user device 109 ΟΛ85 \ 85156 divided. D0C -31-200304126 The end-user device 109 may be an end-user playback application program 195 that meets the specifications of the secure digital content electronic distribution system 100 (will be Also explained)) any playback device. These devices include personal computer systems, I’E, IRDS, and Internet devices. The end-user playback application 195 can be implemented in software and / or consumer hardware. In addition to performing playback, recording, and content library management functions, the end-user playback application 195 also performs SC processing and activates <rights management> in the end-user device 109. The end-user device manages the download and storage of each SCs containing digital content; requests and manages the receipt of the added digital content key from the clearing house 105; handles &gt; pre-watermarks each time the digital content is copied or played; Manage the number of copies (or delete copies) made according to the conditions of use of the digital content; and perform copying to external media or portable "federal electronic devices" when allowed. The portable consumer electronic device can perform part of the most, The user plays the application 195 function in order to handle the content usage conditions embedded in the watermark. Throughout this article, the terms end-user and end-user device are used to mean the use or execution on-end-user device 1G9. : 6 · Transfer infrastructure 1107, all son-type distribution systems in Wangshuo U 丨 00 have nothing to do with the transmission network connecting the electronic digital content store 103 and the end user device i Q9. Secure digital internal electronic distribution System 100 supports point-to-point distribution channels such as the Internet, and broadcast distribution modes such as digital broadcast television. Using the same tools and application programs to obtain, encapsulation, and track content 1〇7 of 113 transactions via various transmission infrastructure, but can root

O:\85\85156 分割.DOC -32- 200304126 據所選擇的基礎建設及配送模式,而改變將服務提供給客 戶的表現万式及方法。所傳輸内容丨13的品質可能也有所不 同,這是因為高頻寬的傳輸基礎建設能夠以比較低頻寬的 傳輸基礎建設更可接受的回應時間傳輸高品質的數位内 容。可調整針對-點對點配送模式而設計的服務應用程 式,以便也可支援一廣播配送模式。 c.系統使用 安全數位内容電子式配送系統1〇〇可安全地將高品質的 電子式内容113傳送到消費者或企業的最終使用者裝置 109,以便管制及追蹤内容113的使用。 可利用新的及現有的配送通路,而在各種消費者及企業 對企業服務中部署安全數位内容電子式配送系統1〇〇。每一 特定的服務可使用一種不同的金融模式,且可經由安全數 位内容電子式配送系統100的各權利管理而執行該金融模 式。可利用清算所105的權利管理及最終使用者播放應用程 式195的防止拷貝特殊功能,而實施諸如批發或零買、計次 付費使用、訂用服務、拷貝/無拷貝限制、或重新配送等模 式。 安全數位内容電子式配送系統i 〇〇可讓電子數位内容商 店103及中間市場夥伴於創造用來銷售内容113的服務時, 有很大的彈性。在此同時,安全數位内容電子式配送系統 100將某一私度的保證提供給内容提供者丨〇 i,使内容提供 者101的數位資產得到保護及量度,因而内容提供者1〇1可 因内容113的授權而收到適當的報酬。 O:\85\85156 分割.DOC -33- 200304126 II.密碼觀念及其在安全數位内容電子式配送系統上的應 用 安全數位内容電子式配送系統100中之授權許可控制係 基於密碼的使用。本節介紹本發明的基本密碼技術。公共 金输(public key)加密、對稱金鑰(symmetric key)加密、數 位簽名、數位浮水印、及數位證明書都是習知的。 A_對稱演算法 在安全數位内容電子式配送系統100中,内容提供者101 利用對稱演算法將内容加密。因為此種演算法利用同一金 鑰將資料加密及解密,所以被稱為對稱演算法。資料傳送 者及訊息接收者必須共用該金鑰。本文中將共用的金鑰稱 為對稱金鑰。安全數位内容電子式配送系統100與針對一特 定實施例而選擇的特硬對稱演算法無關。 常見的對稱演算法有DES、RC2、及RC4。DES及RC2都是 區段密碼(block cipher)。區段密碼一次利用一區段的資料位 元將資料加密。DES是一種美國政府官方的加密標準,具有 64位元的區废長度,並使用56位元的金鑰。通常利用三重 DES(Triple-DES)來增加簡單DES所能達到的安全性。RSA資 料安全(RSA Data Security)設計出RC2°RC2使用一可變金鑰 長度的密碼,且具有64位元的區段長度。也是由RSA資料安 全設計出的RC4是一種可變金鑰長度的位元流密碼(stream cipher)。位元流密碼係一次在單一資料位元上運算。RSA資 料安全聲稱:在RC4中,每一輸出位元組需要八到十六個機 器運算。 O:\85\85156 分割.D0C -34- 200304126 IBM設計了一種稱為SEAL的快速演算法。SEAL是一種位 元流演算法,該演算法使用一可變長度的金鑰,且係針對32 位元的處理器而最佳化。SEAL在每個資料位元組中需要大 約五個基本的機器指令。如果已將所使用的160位元金鑰預 先處理到内部表中,則採用50百萬赫的486 CPU之電腦係以 每秒7.2百萬位元組的速率執行SEAL程式碼。 密碼 金鑰長度 金鑰建立時間 加密速度 DES 56 460 1,138,519 RC2 40 40 286,888 RC4 40 151 2,377,723 B ·公共金瑜演算法O: \ 85 \ 85156 Divide .DOC -32- 200304126 According to the selected infrastructure and distribution mode, change the performance and methods of providing services to customers. The quality of the transmitted content 13 may also be different, because the high-frequency transmission infrastructure can transmit high-quality digital content with a more acceptable response time than the low-frequency transmission infrastructure. Service applications designed for the point-to-point distribution model can be adjusted so that a broadcast distribution model can also be supported. c. System Use The secure digital content electronic distribution system 100 can securely transmit high-quality electronic content 113 to a consumer or enterprise end-user device 109 in order to control and track the use of the content 113. New and existing distribution channels can be leveraged to deploy secure digital content electronic distribution systems 100 in a variety of consumer and business-to-business services. Each specific service can use a different financial model, and the financial model can be implemented through the rights management of the secure digital content electronic distribution system 100. Can use the clearing house 105's rights management and end-user playback application 195's special copy prevention features to implement models such as wholesale or retail purchase, pay-per-use, subscription services, copy / no copy restrictions, or redistribution . The secure digital content electronic distribution system i00 allows electronic digital content stores 103 and middle market partners to have great flexibility in creating services for selling content 113. At the same time, the secure digital content electronic distribution system 100 provides a certain degree of privacy to the content provider, so that the digital assets of the content provider 101 are protected and measured. Therefore, the content provider 101 can Content 113 is authorized for appropriate compensation. O: \ 85 \ 85156 Segmentation. DOC -33- 200304126 II. Password concept and its application on secure digital content electronic distribution system Authorization control in secure digital content electronic distribution system 100 is based on password usage. This section describes the basic cryptographic techniques of the present invention. Public key encryption, symmetric key encryption, digital signatures, digital watermarks, and digital certificates are all known. A_Symmetric Algorithm In the secure digital content electronic distribution system 100, the content provider 101 encrypts the content using a symmetric algorithm. Because this algorithm uses the same key to encrypt and decrypt data, it is called a symmetric algorithm. The sender and recipient of the message must share the key. The shared key is called symmetric key in this paper. The secure digital content electronic distribution system 100 has nothing to do with the special hard symmetric algorithm selected for a particular embodiment. Common symmetric algorithms are DES, RC2, and RC4. Both DES and RC2 are block ciphers. Segment passwords encrypt data using the data bits of one segment at a time. DES is an official US government encryption standard with a 64-bit block size and uses a 56-bit key. Triple-DES is usually used to increase the security that simple DES can achieve. RSA Data Security designs RC2 ° RC2 uses a variable key length password and has a 64-bit sector length. RC4, also designed by RSA Data Security, is a variable key length bit stream cipher. Bitstream ciphers operate on a single data bit at a time. RSA data security claims that in RC4, each output byte requires eight to sixteen machine operations. O: \ 85 \ 85156 segmentation. D0C -34- 200304126 IBM designed a fast algorithm called SEAL. SEAL is a bit-streaming algorithm that uses a variable-length key and is optimized for 32-bit processors. SEAL requires about five basic machine instructions in each data byte. If the 160-bit key used is pre-processed into the internal table, a computer using a 486 CPU at 50 MHz will execute the SEAL code at a rate of 7.2 million bytes per second. Password Key length Key creation time Encryption speed DES 56 460 1,138,519 RC2 40 40 286,888 RC4 40 151 2,377,723 B

Microsoft在其Crypto API文件的概論中報告了加密效能標 準檢查程式的結果。在一採用Pentium 120百萬赫CPU且作業 系統為Windows NT 4.0的電腦上執行的一個使用Microsoft 的CryptoAPI之應用程式得到了下列的結果。 _ 在安全數位内容電子式配送系統100中,係利用公共金 瑜將各對稱金瑜及其他小資料片段加密。公共金鑰演算法 使用兩個金輪。這兩個金输在數學上是相關的,因而利用 一個金鑰加密的資料可以利用另一金鑰解密。金鑰的所有 人將一個金鑰保密(秘密金鍮(private key)),並公開分送第 二金鑰(公共金鍮)。 為了確保一個利用公共金鑰演算法的機密訊息的安全 性,必須使用接收者的公共金鑰將該訊息加密。只有擁有 相關聯的秘密金鍮的接收者可將該訊息解密。也利用公共 O:\85\85156 分割.D0C -35 - 200304126 金瑜演异法來產生數位簽名。秘密切係用於此種用途。 下節將提供與數位簽名有關的資訊。 最常用的公共金鑰演算法是RSA公共金输密碼。RSA公 共金鑰铪碼已成為業界中公共金鍮事實上的標準。在加密 及數位簽名上也相當好用的其他演算法包括E1G㈣以及 Rabin。RSA是一種可變金鑰長度的密碼。 對稱金鑰演算法比公共金鑰演算法快速許多。在軟體 中DES的速度大致為rs a的至少1 〇〇倍。因此,並不將rsa 用來將大量的資料加密。RSA資料安全報告在一使用9〇百 萬赫Pentium CPU的機器上,RSa資料安全的工具程式套件 BSAFE 3.0在秘密金鑰運算(利用秘密金鑰進行的加密或解 密)中具有下列的產生速率:在512位元模數下為每秒216 千位元,而在1024位元模數下為每秒7.4千位元。 C.數位簽名 在安全數位内容電子式配送系統1〇〇中,SC(s)的發出者 在該SC(s)上數位方式簽名,而保護sc(s)的完整性。一般 而言,為f產生一訊息的數位簽名,一訊息所有人首先計 算訊息摘要(將於下文中說明之),然後利用該所有人的秘 密金瑜將該訊息摘要加密。將該訊息連同其簽名而配送。 該訊息的任何接收者可首先可利用該訊息所有人的公共金 鑰將該簽名解密,以便恢復該訊息摘要,而驗證數位簽名。 該接收者然後計算所接收訊息的摘要,並將該摘要與所恢 復的摘要比較。如果在配送的過程中,該訊息並未被改變, 則所計算的摘要與所恢復的摘要必須相同。 O:\85\85156 分割.DOC -36- 200304126 在安全數位内容電子式配送系統100中,因為SC(s)包含 數個資料部分,所以為每一部分計算一摘要,且為該等序 連部分的摘要計算一總結摘要。係利用該Sc(s)發出者的秘 密金鑰將該總結摘要加密。經過加密的總結摘要即是該發 出者的SC(s)數位簽名。各部分摘要及該數位簽名係包含在 SC(s)的本體中。sc(s)的接收者利用所接收的數位簽名及 部分摘要,而驗證該SC(s)及其各組成部分之完整性。 利用一種單向雜亂演算法(hash alg〇rhhm)計算一訊息摘 要。一雜亂濟算法取得一可變長度的輸入訊息,並將該輸 入釩息轉換成一固定長度的字串,亦即訊息摘要。單向雜 亂演异法只在一個方向上運算。亦即,易於計算一輸入訊 息的摘要,但是非常難以(計算上的不可行)自其摘要產生 輸入訊息。因為該單向雜亂函數的特性,我們可將一訊息 摘要視為該訊息的指紋。 取苇見的單向雜IL函數是來自rsA資料安全的MD5、及 美國國永技術及標準協會(Nati〇nal Institute 〇f Techn〇1〇gy and Standards ;簡稱NITS)設計的 SHA。 D.數位證明書 數位#明書係用來證明或驗證已傳送一經數位簽名的 訊息的人員或實體之身分。證明書是一種由一將一公共金 鑰與一人員或實體結合的認證中心(cmificati〇n auth〇dty) 發出的數位文件。孩證明書包括公共金鑰、人員或實體的 名稱、到期日、認證中心的名稱、及其他資訊。該證明書 也包含該認證中心之數位簽名。 O:\85\85156 分割.DOC -37- 200304126 當一實體(或人員)傳送一份以其公共金鑰簽署並伴隨有 其數位證明書之訊息時,訊息的接收者利用來自該證明書 的實體名稱來決定是否要接受該訊息。 在安全數位内容電子式配送系統100中,除了最終使用 者裝置109發出的以外的每一 SC(s)都包含該SC(s)的產生 者之證明書。因為許多最終使用者並不需要取得一證明書 或握有由非真實認證中心所發出的證明書,所以最終使用 者裝置109並不需要將證明書包含在其SC(s)中。在安全數 位内容電子式配送系統100中,清算所105可選擇將證明書 發出到電子數位内容商店103。因而可讓最終使用者裝置 109獨立驗證安全數位内容電子式配送系統100已授權電子 數位内容商店103。 E. SC(s)圖形表示法指南 本文件使用圖示而以圖形來代表SC(s),圖中示出加密部 分、非加密部分、加密金瑜、及證明書。現在請參閱圖2, 該圖示出SC(s) 200的一例示圖示。下列符號係用於SC(s) 的圖示。金瑜2 0 1是一公共金瑜或秘密金瑜。諸如清算所 CLRNGH的金鑰之齒孔指示該金鑰之所有人。鑰把内的PB 指示該金鑰是一公共金瑜,因而該金瑜2 0 1是一清算所的公 共金鑰。鑰把内的PV指示該金鑰是一秘密金鑰。菱形是一 最終使用者數位簽名202。首字指示該秘密金鑰係用來產生 簽名,因而EU係指示如下表所示的最終使用者之數位簽 名。對稱金鍮203係用來將内容加密。一加密對稱金鑰物件 204包含一個以一CLRNGH的PB加密的對稱金鑰203。長方 O:\85\85156 分割.DOC -38- 200304126 形上方邊界的金鑰是用來將物件加密的之金鑰。該長方形 之内的符號或文字指示該加密物件(在該例中為一對稱金 鑰)。圖中示出另一加密物件’該加密物件在此實例中為一 交易識別碼加密物件2〇5。内容授權管理的使用條件2〇6將 於^文中說明。SC⑷2〇〇包含以—最終使用者數位簽名 2〇2簽名的若干使用條件206、交易識別碼加密物件205、一 應用程式識別碼加密物件2G7、以及加密對稱金鑰物件綱。 識別 sc(s)w _名 字Microsoft reports the results of the Crypto Performance Standard Checker in an overview of its Crypto API document. An application using Microsoft's CryptoAPI running on a computer using a Pentium 120 MHz CPU with an operating system of Windows NT 4.0 obtained the following results. _ In the secure digital content electronic distribution system 100, the public Jinyu is used to encrypt each symmetrical Jinyu and other small data fragments. The public key algorithm uses two golden wheels. These two gold loses are mathematically related, so data encrypted with one key can be decrypted with another key. The owner of the key keeps one key secret (private key) and publicly distributes the second key (public key). To ensure the security of a confidential message using a public key algorithm, the message must be encrypted using the recipient's public key. Only recipients who have an associated secret gold coin can decrypt the message. The public O: \ 85 \ 85156 division is also used. D0C -35-200304126 Jin Yu plays a different method to generate a digital signature. Secret cuts are used for this purpose. The next section provides information related to digital signatures. The most commonly used public key algorithm is the RSA public gold cipher. RSA public key codes have become the de facto standard for public keys in the industry. Other algorithms that are also quite good for encryption and digital signatures include E1G㈣ and Rabin. RSA is a variable key length cipher. Symmetric key algorithms are much faster than public key algorithms. The speed of DES in software is approximately at least 100 times that of rsa. Therefore, rsa is not used to encrypt large amounts of data. RSA Data Security Report On a machine using a 90 MHz Pentium CPU, the RSa Data Security tool suite BSAFE 3.0 has the following generation rates in secret key operations (encryption or decryption using secret keys): It is 216 kilobits per second with a 512-bit modulus and 7.4 kilobits per second with a 1024-bit modulus. C. Digital signature In the secure digital content electronic distribution system 100, the sender of the SC (s) digitally signs the SC (s) to protect the integrity of the sc (s). In general, to generate a digital signature for a message, the owner of a message first calculates the message digest (described below), and then encrypts the message digest using the owner's secret, Jin Yu. Deliver the message with its signature. Any recipient of the message may first decrypt the signature using the public key of the owner of the message in order to recover the message digest and verify the digital signature. The recipient then calculates a digest of the received message and compares the digest to the recovered digest. If the message has not been changed during the distribution process, the calculated digest must be the same as the recovered digest. O: \ 85 \ 85156 division. DOC -36- 200304126 In the secure digital content electronic distribution system 100, because SC (s) contains several data parts, a summary is calculated for each part, and these are sequential parts A summary summary is calculated. The summary digest is encrypted using the secret key of the Sc (s) issuer. The encrypted summary digest is the SC (s) digital signature of the sender. The summary of each part and the digital signature are included in the ontology of SC (s). The recipient of sc (s) uses the received digital signature and partial digest to verify the integrity of the SC (s) and its components. A one-way hash algorithm (hash algrhhm) is used to calculate a message digest. A chaotic algorithm takes a variable-length input message and converts the input vanadium interest into a fixed-length string, that is, a message digest. The one-way clutter algorithm operates in only one direction. That is, it is easy to calculate a digest of an input message, but it is very difficult (computationally infeasible) to generate an input message from its digest. Because of the nature of the one-way mess function, we can treat a message digest as the fingerprint of the message. The one-way miscellaneous IL function we found is MD5 from rsA data security, and SHA designed by the National Institute of Technology and Standards (NITOnal Technology 0gy and Standards; NITS for short). D. Digital Certificate Digital # 明 表 is used to prove or verify the identity of the person or entity who has transmitted a digitally signed message. A certificate is a digital document issued by a certificate authority (cmificationauthty) that combines a public key with a person or entity. The child certificate includes the public key, the name of the person or entity, the expiration date, the name of the certificate authority, and other information. The certificate also contains the digital signature of the certification authority. O: \ 85 \ 85156 Division. DOC -37- 200304126 When an entity (or person) sends a message signed with its public key and accompanied by its digital certificate, the recipient of the message uses the The entity name to decide whether to accept the message. In the secure digital content electronic distribution system 100, each SC (s) other than the one issued by the end-user device 109 contains a certificate of the producer of the SC (s). Because many end users do not need to obtain a certificate or hold a certificate issued by a non-authentication certification center, the end user device 109 does not need to include the certificate in its SC (s). In the secure digital content electronic distribution system 100, the clearing house 105 may choose to issue a certificate to the electronic digital content store 103. Thus, the end-user device 109 can be independently verified that the secure digital content electronic distribution system 100 has authorized the electronic digital content store 103. E. Guide to SC (s) Graphical Representation This document uses a graphic representation to represent SC (s). The figure shows the encrypted part, non-encrypted part, encrypted Jinyu, and certificate. Reference is now made to FIG. 2, which illustrates an exemplary illustration of an SC (s) 200. The following symbols are used for the SC (s). Jin Yu 2001 is a public Jin Yu or secret Jin Yu. The perforation of a key such as clearing house CLRNGH indicates the owner of the key. The PB in the keypad indicates that the key is a public Jinyu, so the Jinyu 201 is a public key of a clearing house. The PV in the keypad indicates that the key is a secret key. The diamond is an end user digital signature 202. The prefix indicates that the secret key was used to generate the signature, and therefore the EU indicates the digital signature of the end user as shown in the table below. Symmetrical golden ring 203 is used to encrypt the content. A cryptographic symmetric key object 204 includes a symmetric cryptographic key 203 encrypted with a CLRNGH PB. Rectangular O: \ 85 \ 85156 division. DOC -38- 200304126 The upper key of the shape is the key used to encrypt the object. The symbol or text within the rectangle indicates the encrypted object (a symmetric key in this example). The figure shows another encrypted object ', which in this example is a transaction identification code encrypted object 205. The conditions of use for content license management 206 will be explained in the text. SC⑷200 includes a number of conditions of use 206 signed with an end-user digital signature 202, a transaction ID encryption object 205, an application identification code encryption object 2G7, and an encryption symmetric key object schema. Identify sc (s) w _name

F· —安全容器物件加密實例 、下表及圖提供了用來產生資訊並自^⑷取得資訊的加 山及解^程序之一概觀。在該程序概觀中產生及解密的 S+C⑷是一個—般性Sc(s)。該sc⑷並不代表安全數位内容 私子式配送系統丨〇〇中的權利管理所用的任何特定SC(s)類 土汶私序包含圖3中針對加密程序而示出之步騾。 圖3所示加密程序之流程 步驟 301 傳迗者產生一隨機對稱金鑰,並利用該對稱金输F · — Example of Encryption of Secure Container Objects, the table below and the figure provide an overview of one of the addition and solution procedures used to generate information and obtain information from it. The S + C⑷ generated and decrypted in the program overview is a general Sc (s). This sc⑷ does not represent any particular SC (s) used for rights management in the secure digital content private distribution system 丨 00. Tubon Private Sequence contains the steps shown in Figure 3 for the encryption process. The encryption process shown in Figure 3 Step 301 The passer generates a random symmetric key and uses the symmetric gold

O:\85\85156 分割.DOC -39- 200304126 302 將内容加密。 傳送者利用―雜乱演算法執㈣㈣的内容 便產生内容摘要。 以 303 304 305 傳送者利用接收者的公共金鑰將”稱金輪加 密。PBRECPNT意指接收者的公共金瑜。 傳迗者利用步驟302所用的相同雜亂演算法執行 加被的對稱金鑰,以便產生對稱金鑰摘要。 傳送者利用步驟302所用的相同雜亂演算法執行 S内各摘要及該對稱金鑰摘要之序連,以便產生 Sc(s)摘要。 3 06 傳送者利用该傳送者的秘密金鑰將該sc(s)摘要加 ^以便產生1^亥SC(s)之數位簽名。pv SENDER意 指該傳送者的秘密金鑰。 3 07B 傳运者產生一 SC(s)檔案,該SC(s)檔案包含加密的 内容、加密的對稱金鑰、内容摘要、對稱金鑰摘 要、傳送者的證明書、及SC(s)簽名。 307A 傳送者在開始安全的通訊之前,必須先自一認證 中心取得證明書。該認證中心將該傳送者的公共 金鑰及該傳送者的名稱包含在該證明書中,並在 該證明書上簽認。PV CAUTHR意指該認證中心的 秘密金鑰。傳送者將SC(s)傳輸到接收者。 圖4所示解密程序之流程 步騾 程序 408 接收者接收SC(s),並準備其各組成部分。 O:\85\85156 分割.DOC -40- 200304126 409 410 411 412 413 414 415 接收者利用認證中心的公共金鑰將傳送者證明書 中之數位簽名解密,而驗證該數位簽名。如果該 證明書的數位簽名是有效的,則接收者自該證明 書取得該傳送者的公共金鑰。 接收者利用該傳送者的公共金鑰將SC(s)數位簽名 解密。因而恢復SC(s)摘要。PB SENDER意指該傳 送者的公共金鑰。 接收者利用該傳送者用來計算SC(s)摘要的同一雜 亂演算法來執行所接收的内容摘要及加密的金餘 摘要之序連。 接收者將所計算的SC(s)摘要與自該傳送者數位簽 名恢復的SC(s)摘要比較。如果兩者相同,則接收 者確遇所接收的摘要並未被變更,並繼續進行解 密程序。如果兩者不同,則接收者捨棄該SC(s), 並通知該傳送者。 接收者利用步驟411中所用的相同雜亂演算法執 伃加密的對稱金鑰,以便計算對稱金鑰摘要。 接收者將所計算的對稱金鑰摘要與該SC(s)中接收 的對稱金鑰摘要比較。如果兩者相同,則接收者 知遒加密的對稱金鑰並未被改變。接收者繼續進 y一解i私序。如果兩者不同,則接收者捨棄該 sC(s),並通知該傳送者。 接收者利用步驟411中所用的相同雜亂演算法執 仃加密的内容,以便計算内容摘要。O: \ 85 \ 85156 Split .DOC -39- 200304126 302 Encrypt the content. The content produced by the messenger using the “chaotic algorithm” generates a content summary. With 303 304 305 the sender uses the recipient's public key to encrypt "the Golden Wheel." PRECCPNT means the recipient's public golden yu. The sender uses the same messy algorithm used in step 302 to perform the added symmetric key in order to Generate a symmetric key digest. The sender uses the same hash algorithm used in step 302 to perform the sequential connection of the digests in S and the symmetric key digest in order to generate a Sc (s) digest. 3 06 The sender uses the secret of the sender. The key adds the sc (s) digest ^ to generate a digital signature of 1 ^ SC (s). Pv SENDER means the secret key of the carrier. 3 07B The carrier generates an SC (s) file. The SC (s) file contains the encrypted content, the encrypted symmetric key, the content digest, the symmetric key digest, the certificate of the sender, and the SC (s) signature. 307A Before the sender can begin secure communication, A certificate is obtained by a certificate authority. The certificate authority includes the public key of the sender and the name of the sender in the certificate, and signs the certificate. PV CAUTHR means the secret money of the certificate authority Key. The sender will SC (s) Transmission to the receiver. The decryption procedure shown in Figure 4: Step 408: The receiver receives SC (s) and prepares its components. O: \ 85 \ 85156 Segmentation. DOC -40- 200304126 409 410 411 412 413 414 415 The receiver uses the public key of the certificate authority to decrypt the digital signature in the sender's certificate and verify the digital signature. If the digital signature of the certificate is valid, the receiver obtains it from the certificate The sender's public key. The receiver uses the sender's public key to decrypt the SC (s) digital signature. Thus the SC (s) digest is restored. PB SENDER means the sender's public key. The receiver uses The same messy algorithm that the sender uses to calculate the SC (s) digest performs the sequential concatenation of the received content digest and the encrypted gold abstract. The receiver combines the calculated SC (s) digest with the digits from the sender. Comparison of SC (s) digests for signature recovery. If the two are the same, the receiver does not change the received digest and continues the decryption process. If the two are different, the receiver discards the SC (s), And notify the sender. The user performs the encrypted symmetric key using the same hash algorithm used in step 411 in order to calculate the symmetric key digest. The receiver compares the calculated symmetric key digest with the symmetric key digest received in the SC (s). If the two are the same, the receiver knows that the encrypted symmetric key has not been changed. The receiver continues to resolve the private sequence. If the two are different, the receiver discards the sC (s) and informs the Sender: The receiver uses the same hash algorithm used in step 411 to execute the encrypted content in order to calculate the content digest.

ΟΛ85\85156 分割.DOC •41 - 200304126 f收者將所4算的内容揭要與該%⑷中接收的内 奋摘要比較。如果兩者相同,則接收者知道加密 、内4並未被改’交。接收者繼續進行解密程序。 如果兩者不同’則接收者掩棄該Sc(s),並通知該 傳送者。 417 #收者利用該接收者的秘密金鑰將該加密的對稱 至鑰解笟。因而恢復該對稱金鑰。pv RECPNT意 指該接收者的秘密金鑰。 418 接收者利用對稱金鑰將加密的内容解密,因而恢 復該内容。 ΙΠ·安全數位内容電子式配送系統流程 安王數位内容電子式配送系統i00包含該系統的不同參 舁者所使用的數個組成部分。這些參與者包括内容提供者 101、電子數位内容商店103、經由最終使用者裝置1〇9的最 終使用者、及清算所丨〇5。一高階系統流程係用來作為安全 數位内容電子式配送系統100的一概觀。當内容流經系統 100時,下大所概述的該流程追蹤該内容。此外,該流程概 述各參與者使用的步驟,以便進行購買交易,因而將内容 113解密及使用。系統流程所作的某些假設包括: 這是用於一數位内容服務的系統流程(一個人電腦的點 對點介面)。 内容提供者101以PCM未壓縮格式(以音樂音訊舉例)傳 送音訊數位内容。 内容提供者101在一符合ODBC的資料庫中設有中介資 O:\85\85156 分割.D0C -42- 200304126 料’或内容提供者i 0 i將資料直接輸入内容資訊處理子系 統,或將以規定的ASCII檔案格式提供資料。 電子數位内容商店執行金融結算。 内各1 13係放在一單一代管内容網站丨u。 熟悉本門技術者當可了解,可改變這些假設,以便適應 諸如q樂、視訊、及程式等數位内容、以及電子式配送系 統廣播的精確本質。 下列流程係示於圖1。 步騾 程序 内各麵:供者1 〇 1提供一未壓縮的PCM音訊檔作為 内容113。將該音訊檔的檔案名稱連同内容提供者 101的内容113之特有識別碼輸入工作流程管理程 式 154 〇 122 内谷資訊處理子系統利用内容提供者1 〇丨的内容 11 3之特有識別碼、及資料庫映射樣板所提供的資 口凡而自内容提供者的資料庫160獲得中介資料。 123 内谷提供者1〇1在整個取得及準備程序中,利用工 作流程管理工具程式154來指引内容流程。 1 知内么11 3的使用條件輸入内容資訊處理子系 統且可以人工或自動方式執行上述步驟。該資 料包括拷貝限制規則、及需要的任何其他的業務 規則。所有的中介資料輸入可以與資料的音訊處 理同時發生。 125 利用/孚水印工具程式將資料隱藏在内容11 3中,而ΟΛ85 \ 85156 Segmentation. DOC • 41-200304126 f The recipient will compare the calculated content with the summary of the internal effort received by the %%. If the two are the same, the receiver knows that the encryption is not changed. The receiver continues the decryption process. If the two are different ', the receiver discards the Sc (s) and notifies the sender. 417 #The receiver uses the receiver's secret key to decrypt the encrypted symmetric key. The symmetric key is thus restored. pv RECPNT means the recipient's secret key. 418 The recipient uses the symmetric key to decrypt the encrypted content and recovers it. ΙΠ · Process of secure digital content electronic distribution system Anwang digital content electronic distribution system i00 contains several components used by different participants of the system. These participants include a content provider 101, an electronic digital content store 103, an end user via an end user device 109, and a clearing house 05. A high-level system flow is used as an overview of the secure digital content electronic distribution system 100. As content flows through the system 100, the process outlined by the National University tracks the content. In addition, the process outlines the steps used by each participant to conduct a purchase transaction, thereby decrypting and using the content 113. Some of the assumptions made by system processes include: This is a system process for a digital content service (a PC-to-peer interface). The content provider 101 transmits audio digital content in an uncompressed PCM format (taking music audio as an example). The content provider 101 has an intermediary O: \ 85 \ 85156 division in an ODBC-compliant database. D0C -42- 200304126 materials' or content providers i 0 i directly input data into the content information processing subsystem, or Provide information in the required ASCII file format. Electronic digital content stores perform financial settlement. Each of the 13 lines is placed on a single hosted content website. Those skilled in the art will understand that these assumptions can be changed to accommodate digital content such as q music, video, and programming, as well as the precise nature of electronic distribution system broadcasting. The following flow is shown in Figure 1. Steps 骡 Inside the program: Donor 101 provides an uncompressed PCM audio file as content 113. Enter the file name of the audio file along with the unique identification code of the content 113 of the content provider 101 into the workflow management program 154 〇122 Uchigo Information Processing Subsystem uses the unique identification code of the content 11 3 of the content provider 1 and The information provided by the database mapping template is usually obtained from the database 160 of the content provider. 123 Uchiya provider 101 uses the work flow management tool program 154 to guide the content flow throughout the acquisition and preparation process. 1 Zhinei 11 3 Use condition input content information processing subsystem and can perform the above steps manually or automatically. This information includes copy restriction rules and any other business rules required. All intermediary data entry can occur simultaneously with the audio processing of the data. 125 Use / F watermark tool program to hide data in content 11 3, and

O:\85\85 丨 56 分割.DOC &gt;43- 200304126 内容提供者101必須以該浮水印工具程式來識別 ^亥内容不响内么來自何處(此例為内容提供者 ιοί),也不論内容提供者101指定的任何其他資 訊’都可包含浮水印資料。 内谷處理工具程式!25針對所支援的不同壓 縮等級,而執行内容丨丨3需要的等化、動態範 圍調整、及重新抽樣。 利用内容處理工具程式125將内容113壓縮成 所需的壓縮層級。然後可播放内容丨13,以便 驗證該壓縮產生了所需的内容1丨3品質等 級。在必要時,可視需要而多次執行等化、 動態範圍調整、壓縮、及播放品質檢查。 SC包封工具程式利用一對稱金鑰將内容n 3 及一邵分的中介資料加密。該工具程式然後 利用清异所1 0 5的公共金鑰將該金瑜加密,以 便產生一加密的對稱金輸。在不包含内容113 的安全性資料的情形下,可將該金鑰傳送到 任何場所,這是因為可將該金鑰解密的唯一 實體即是清算所1〇5。 126 SC包封工具程式152然後將加密的對稱金鑰、中介 資料、及與内容113有關的其他資訊包封在一中介 資料SC中。 127 然後將加密的内容113及中介資料包封到一内容 SC。此時完成了對内容n3及中介資料的處理。 O:\85\85156 分割.DOC -44- 200304126 128 129 130 131 132 133 134 135 f後利用内容傳播工具程式(圖中未示出)將中介 資料SC(s)傳送到内容促銷網站156。 内容傳播工具程式將内容Sc(s)傳送到代管内容網 站111。該代管内容網站可設於内容提供者、 清算所105、或代管内容網站專用的一特殊場所。 該網站的網址是被加入中介資料sc的中介資料。 内容促銷網站156將加入系統100的新内容113通 知電子數位内容商店103。 黾子數位内各商店1 Q 3然後利用内容取得工具程 式下載對應於其想要銷售的内容113之中介資料 SCs 〇 黾子數位内各商店10 3將利用該内容取得工具程 式自中介資料SC(s)抽取其想要在其網站上促銷内 容113的任何資料。在必要時,存取該中介資料的 這些邵分可以是安全的且要收費的。 利用该内容取得工具程式輸入該電子數位内容商 店103專用的内容113使用條件。這些使用條件包 括在内容113的不同壓縮等級下之零售價格及拷 貝/播放限制。 SC包封工具程式將電子數位内容商店103專用的 使用條件及原始的中介資料SC(s)包封到一報價 SC。 在更新電子數位内容商店103之後,上網的最終使 用者即可購得内容113。O: \ 85 \ 85 丨 56 segmentation. DOC &gt; 43- 200304126 The content provider 101 must use the watermarking tool program to identify where the content comes from. (This example is the content provider.) Regardless of any other information specified by the content provider 101, the watermark data may be included. Uchiya processing tool program! 25 For the different compression levels supported, the implementation needs to perform the equalization, dynamic range adjustment, and resampling. The content processing tool 125 is used to compress the content 113 to a desired compression level. The content can then be played back to verify that the compression produced the desired content level of quality. If necessary, perform equalization, dynamic range adjustment, compression, and playback quality checks as many times as necessary. The SC encapsulation tool program uses a symmetric key to encrypt the intermediary data of the content n 3 and one point. The utility program then encrypts Jin Yu with the public key of Qingyi 105, to generate an encrypted symmetric gold loss. Without the security information of Content 113, the key can be transferred to any location because the only entity that can decrypt the key is the clearing house 105. 126 The SC encapsulation tool program 152 then encapsulates the encrypted symmetric key, the intermediary data, and other information related to the content 113 in an intermediary data SC. 127 Then the encrypted content 113 and the intermediary data are encapsulated into a content SC. At this point, the processing of the content n3 and the intermediary data is completed. O: \ 85 \ 85156. DOC -44- 200304126 128 129 130 131 132 133 134 135 f. Then use the content distribution tool program (not shown) to send the intermediary data SC (s) to the content promotion website 156. The content distribution tool program transmits the content Sc (s) to the hosted content website 111. The hosted content website may be located at a content provider, clearing house 105, or a special place dedicated to the hosted content website. The URL of the website is the intermediary data added to the intermediary data sc. The content promotion website 156 will add the new content 113 of the system 100 to the electronic digital content store 103. Stores in Xunzi Digital 1 Q 3 and then use the content acquisition tool program to download the 113 intermediary data SCs corresponding to the content they want to sell. 〇Zunzi digital stores 10 3 will use the content acquisition tool program from the intermediary data SC ( s) Extract any material they want to promote content 113 on their website. These points of access to the intermediary data may be secure and chargeable when necessary. The content acquisition tool program is used to input the use conditions of the content 113 exclusively for the digital content store 103. These conditions of use include retail prices and copy / play restrictions at different compression levels of Content 113. The SC encapsulation tool program encapsulates the conditions of use exclusively for the electronic digital content store 103 and the original intermediary data SC (s) into a quote SC. After the electronic digital content store 103 is updated, end users who are online can purchase the content 113.

O:\85\85156 分割.DOC -45- 200304126 136 當一最終使用者找到其想要購買的内容丨13時,該 最終使用者點選一内容圖像,並將該内容項目加 入其購〃貝車中,而該購貨車是由電子數位内容商 店103所維護。當該最終使用者完成選購時,該最 終使用者將購買要求傳送到電子數位内容商店 103以供處理。 137 電子數位内容商店1〇3然後聯繫信用卡清算機 構,以便用其目前與信用卡清算機構往來的相同 方式要求持有該資金。 138 一旦该電子數位内容商店103自信用卡清算機構 接收到傳回的信用卡授權號碼之後,該電子數位 内客商店103即將該號碼儲存在一資料庫,並利用 SC包封工具程式建立一交易SC。該交易SC包含該 最終使用者已購買的内容u 3之所有報價SCs、一 個可追縱到該電子數位内容商店1 〇3之交易識別 碼、識別該最終使用者之資訊、壓縮等級、所購 買歌曲的使用條件及價格表。 139 140 然後將该X易SC傳送到最終使用者裝置丨〇9。 當摄父易sc到達最終使用者裝置1〇9時,該交易sc 起動最終使用者播放應用程式195,而該最終使用 者播放應用程式195則開啟該交易sc,並得知該最 、、冬使用者的購買。最終使用者播放應用程式195然 後開啟個別的報價SCs,且在一替代實施例中可將 估计下載時間通知該使用者。最終使用者播放 O:\85\85156 分割.D〇c -46- 200304126 141 142 143 144 145 146 147 148 應用程式1 95然後要求該使用者指定其想要下載 内容113的時間。 取終使用者播放應用程式195將根據最終使用者 要求的下載時間而醒來,並建立一個包含内容i 13 的加密對稱金鑰、交易識別碼、及最終使用者資 訊等資訊的訂單SC,而開始下載程序。 然後將該訂單SC傳送到清算所1〇5以供處理。 清算所105接收到該訂單sc,開啟該訂單sc,並驗 證資料並未被篡改。清算所105確認該最終使用者 購買的使用條件。這些使用條件必須符合内容提 供者101所規定的使用條件。然後將該資訊記錄在 一資料庫。 -旦完成了所有的檢查之後,利用清算所⑻的祕 密金鑰將加密的對稱金鑰解密。然後利用該最終 使用者的A共金輪將該對稱金餘加密。然後利用 SC包封工具程式將該新的加密對稱金鑰包封到一 授'權許可SC。 然後將該授權許可SC傳送到該最終使用者。 當最終使用者裝置109接收到該授權許可8&lt;:時,即 將該授權許可SC儲存在記憶體中,直到下載内容 SC為止。 最終使用者裝置109要求代管内容網站丨丨丨傳送對 應於該授權許可sc的所購買内容113。 内容113被傳送到最終使用者裝置1〇9。於接收到 O:\85\85156 分割.D0C -47- 200304126 内各113時最、、冬使用者裝置109利用該對稱金鑰 將内容113解密。 IV·權利管理架構模型 A·架構層功能 圖5是安全數位㈣電子式配送系、统ι〇〇的權利管理架 構之方塊圖。纟架構丨,有四層❹安全數位内容電子式 配送系統⑽:授權許可控制層5〇卜内容識別層5〇3、内容 使用控制層505、及内容格式化層5〇7。本節中將說明每一 層的整體功能目標、及每一層的個別主要功能。每一層的 功能係完全獨立於其他各層的功能。在廣義的限制之内, 可以類似的功能取代一層中之功能,而不會影響到其他層 的功能。一層的輸出顯然需要滿足相鄰層可接受的格式及 語意。 授權許可控制層501確保: 使數位内容於配送過程中不會受到非法攔截及篡改; 内容113係來自一合法的内容所有人,並經由一授權 配銷商(例如電子數位内容商店1〇3)而配送; 數位内容購買者具有一經適當授權的應用程式; 在購買者或最終使用者取得内容丨13的一份拷貝之 月ίι ’該購買者先付款給該配銷商;以及 保留一份交易記錄以供回報之用。 内容識別層503可驗證著作權及内容購買者之身分。内 备的著作權資訊及内容購買者的身分可以對内容113的任 何經授權的或未經授權的拷貝進行來源追蹤。因此,内容O: \ 85 \ 85156 Segmentation. DOC -45- 200304126 136 When an end user finds the content he wants to buy 丨 13, the end user clicks on a content image and adds the content item to his purchase In the car, the shopping cart is maintained by the electronic digital content store 103. When the end user completes the purchase, the end user transmits the purchase request to the electronic digital content store 103 for processing. 137 The electronic digital content store 103 then contacts the credit card clearing agency to request that the funds be held in the same way it currently does with credit card clearing agencies. 138 Once the electronic digital content store 103 receives the returned credit card authorization number from the credit card clearing agency, the electronic digital internal store 103 stores the number in a database and uses the SC encapsulation tool program to establish a transaction SC. The transaction SC contains all the quotes SCs of the content u 3 that the end user has purchased, a transaction identification code that can be traced to the electronic digital content store 103, information identifying the end user, the compression level, the purchase Conditions of use of songs and price list. 139 140 The Xeasy SC is then transmitted to the end-user device. When the camera-scene reaches the end-user device 109, the transaction sc starts the end-user playback application 195, and the end-user playback application 195 opens the transaction sc, and learns that the User purchases. The end user plays the application 195 and then turns on individual quotes SCs, and in an alternative embodiment the user can be notified of the estimated download time. The end user plays the O: \ 85 \ 85156 split. Doc -46- 200304126 141 142 143 144 145 146 147 148 Application 1 95 then asks the user to specify the time at which they want to download the content 113. The end-user playback application 195 will wake up according to the download time requested by the end-user, and create an order SC containing information such as the encrypted symmetric key of the content i 13, the transaction identifier, and the end-user information, and The download process starts. The order SC is then transmitted to the clearing house 105 for processing. The clearing house 105 receives the order sc, opens the order sc, and verifies that the information has not been tampered with. The clearing house 105 confirms the use conditions purchased by the end user. These conditions of use must meet the conditions of use specified by Content Provider 101. This information is then recorded in a database. -Once all checks have been completed, the encrypted symmetric key is decrypted using the secret key held by the clearing house. Then use the end user's A gold wheel to encrypt the symmetric gold balance. Then use the SC encapsulation tool program to encapsulate the new encrypted symmetric key to an authorized SC. The authorization SC is then transmitted to the end user. When the end user device 109 receives the license 8 &lt;:, it stores the license SC in the memory until the content SC is downloaded. The end-user device 109 requests the hosting content website to transfer the purchased content 113 corresponding to the license sc. The content 113 is transmitted to the end-user device 109. Upon receiving the O: \ 85 \ 85156 segment. D0C -47- 200304126 at 113 o'clock and winter user device 109 uses the symmetric key to decrypt the content 113. IV. Rights Management Architecture Model A. Architecture Layer Functions Figure 5 is a block diagram of the rights management architecture of the secure digital electronic distribution system and system.纟 Architecture 丨, there are four layers❹Secure digital content electronic distribution system⑽: Authorization control layer 50, content identification layer 503, content use control layer 505, and content formatting layer 507. This section describes the overall functional goals of each layer and the individual main functions of each layer. The function of each layer is completely independent of the functions of other layers. Within the broad limits, functions in one layer can be replaced by similar functions without affecting the functions of other layers. The output of one layer obviously needs to meet the acceptable format and semantics of the adjacent layers. The license control layer 501 ensures that: digital content will not be illegally intercepted and tampered with during the distribution process; content 113 comes from a legitimate content owner and passes through an authorized distributor (such as an electronic digital content store 103) And distribution; digital content purchasers have an appropriately authorized application; the month when the purchaser or end-user obtains a copy of the content; 'the purchaser pays the distributor first; and retains a transaction Record for return. The content identification layer 503 can verify the copyright and the identity of the content purchaser. The built-in copyright information and the identity of the content purchaser can track the source of any authorized or unauthorized copy of the content 113. So the content

O:\85\85156 分割.DOC -48- 200304126 識別層503提供了一 種對抗盜版之方式。O: \ 85 \ 85156 split. DOC -48- 200304126 The identification layer 503 provides a way to combat piracy.

又施中之原生表示法轉換成_種與安全數位内容電子式配 辽系、、、充1 00的服務特殊功能及配送裝置一致的形式。該轉換 處理可包括壓縮編碼及其相關聯的預先處理,例如頻率等 化及振幅動悲範圍碉整。對於是音訊的内容丨丨3而言,在購 貝者‘上,也需要處理所接收的内容i i 3,以便得到一種適 於播放的格式,或傳輸到一可攜式裝置。 B·功能分劄及流程 權利管理架構模式係示於圖5,且該圖示出將各架構層 對映到構成安全數位内容電子式配送系統1 〇〇的各工作組 成部分、友每一層中的重要功能。 1.内容格式化層507 與内容格式化層507相關聯的一般性功能是在内容提供 者101上的内容預先處理502及壓縮511、以及最終使用者裝 置109上的内容解碼513及解壓縮515。預先處理的需要及特 足功能之例子係如前文所述。利用内容壓縮5 11來減少内容 113的檔案大小及其傳輸時間。適用於内容113類型的任何 壓縮演算法及傳輸媒體可用於安全數位内容電子式配送系The original notation of Shizhong is converted into a form consistent with the special service functions and distribution devices of the electronic distribution of secure digital content. This conversion process may include compression coding and its associated pre-processing, such as frequency equalization and amplitude range truncation. For audio content 3, the purchaser ′ also needs to process the received content i i 3 in order to obtain a format suitable for playback or to transmit to a portable device. B. Functional analysis and process rights management architecture model is shown in Figure 5, and the figure shows the mapping of each architectural layer to each of the working components and each layer of the friend that constitutes the secure digital content electronic distribution system 1000. Important features. 1. The content formatting layer 507 The general functions associated with the content formatting layer 507 are pre-processing of content 502 and compression 511 on the content provider 101, and content decoding 513 and decompression 515 on the end-user device 109 . Examples of pre-processed needs and special features are described above. Use content compression 5 11 to reduce the file size of content 113 and its transfer time. Suitable for any type 113 compression algorithms and transmission media can be used for secure digital content electronic distribution systems

O:\85\85156 分割.DOC -49- 200304126 統100。對於音樂而言,MPEG 1/2/4、Dolby AC-2及 AC-3、Sony適應性變換碼(Adaptive Transform Coding ;簡 稱ATRAC)、及低位元傳輸速率演算法是某些一般使用的 壓縮演算法。係以壓縮形式將内容113儲存在最終使用者裝 置109,以便減少儲存容量的要求。於實際播放時將内容1丄3 解壓縮。易於實際播放時執行解碼。於後文中討論到内容 使用控制層505時將說明編碼之目的及類型。 2·内容使用控制層505 内容使用控制層505容許對最終使用者裝置109上的内 容113使用所施加的條件或限制進行規範及強制執行。這些 條件可規定内容113被容許的播放次數、是否容許内容113 的後續拷貝、後續拷貝的次數、以及是否可將内容丨丨3拷貝 到一外邵可攜式裝置。内容提供者丨〇丨設定容許的使用條件 517,並將該使用條件517以一 sc的形式(請參閱討論授權 許可控制層501的該節)傳送到電子數位内容商店1〇3。電子 數位内容商店1〇3可增添或縮小使用條件517,只要該使用 條件517不使内容提供者1〇1所設定的原始條件失效即可。 電子數位内答商店i03然後將(一 sc中)所有的商店使用條 件519傳送到最終使用者裝置1〇9及清算所1〇5。清算所⑺$ 在授權將内容U3釋出到最終使用者裝置1〇9之#,先執行 使用條件確認521。 最終使用者裝置109中之内容使用控制層505執行 Ί又州性刺屬5執行内容O: \ 85 \ 85156 split .DOC -49- 200304126 system 100. For music, MPEG 1/2/4, Dolby AC-2 and AC-3, Sony's Adaptive Transform Coding (ATRAC), and low bit rate algorithms are some commonly used compression algorithms. law. The content 113 is stored in compressed form on the end-user device 109 in order to reduce the storage capacity requirements. Decompress the content 1 丄 3 during actual playback. It is easy to perform decoding during actual playback. The purpose and type of encoding will be explained later when the content uses the control layer 505. 2. Content use control layer 505 The content use control layer 505 allows the conditions or restrictions imposed on the use of the content 113 on the end-user device 109 to be regulated and enforced. These conditions may specify the number of times the content 113 is allowed to be played, whether subsequent copies of the content 113 are allowed, the number of subsequent copies, and whether the content can be copied to an external portable device. The content provider 丨 〇 丨 sets an allowable use condition 517, and transmits the use condition 517 in the form of an sc (see the section discussing the license control layer 501) to the electronic digital content store 103. The electronic digital content store 103 may increase or decrease the use condition 517 as long as the use condition 517 does not invalidate the original condition set by the content provider 101. The electronic digital answer store i03 then transmits (in one sc) all store usage conditions 519 to the end-user device 109 and the clearing house 105. The clearing house ⑺ $ authorizes the release of the content U3 to # 9 of the end-user device, and first executes the use condition confirmation 521. The content in the end-user device 109 is executed using the control layer 505.

O:\85\85156 分割.D0C 貝時, —’、起始拷 -50 - 200304126 貝/播放許可的拷貝/播放碼523標示該内容1 13。播放應用 私式195然後在將該内容丨13儲存在最終使用者裝置1〇9之 則,先以密碼方式將内容113編碼。播放應用程式195為每 内各員目產生一編碼金瑜,並將該金鑰加密,且將該金 鑰隱藏在最終使用者裝置109中。然後每當最終使用者裝置 109存取内容ι13以便進行拷貝或播放時,最終使用者裝置 109在容許將内容113解碼並執行播放或拷貝之前,先驗證 藏拷貝/播放碼。最終使用者裝置1〇9也適當地更新内容n3 的原始拷貝中的任何新後續拷貝中的拷貝/播放碼。係在已 被壓縮的内容113上執行拷貝/播放編碼。亦即,在嵌入該 拷貝/播放碼之前,無須先將内容1丨3解壓縮。 最終使用者裝置1〇9使用一授權許可浮水印527將該拷 貝/播放碼嵌入内容丨13内。只有可識別嵌入演算法及相關 聯編碼金鑰的最終使用者播放應用程式195可讀取或修改 所嵌入的資料。閱聽人無法看到或無法聽到該資料;亦即, 該資料並未對内容113之品質造成可感知的降低。自浮水印 經歷過内容處理、資料壓縮、數位至類比及類比至數位轉 換、及正常内容處理所導入的信號品質降低的數個步驟以 來’浮水印仍然以其中包括類比表示法的任何表示形式而 保留在内容113中。在一替代實施例中,並不使用一授權許 可浮水印5 2 7將該拷貝/播放碼後入内容113内,最終使用者 播放應用程式195反而使用安全儲存的使用條件519。 3·内容識別層503 作為内容識別層503的一部分,内容提供者1〇1也使用一 O:\85\85156 分割.DOC -51 - 200304126 授權許可浮水印527將諸如内容識別碼、内容所有人、及其 他資訊(例如出版日期及地理配送區)等的資料彼入内容 113中。本發明中將該浮水印稱為著作權浮水印529。於接 收到時’最=使用者裝置1G9將内容113的拷貝加上内容講 買者名稱及交易識別碼535(請參閱下文中之授權許可控制 =501該節)及諸如授權許可日期及使用條件5 17等的其他 貝Λ之浮水印。在本發明終將該浮水印稱為授權許可浮水 印。經過杈榷或未經授權取得的且經過可保有内容品質的 曰汛處理之任何内容丨丨3拷貝都載有著作權浮水印及授權 許可浮水印。内容識別層503可嚇阻盜版。 4·授權許可控制層5〇1 授權許可控制層501使内容113不會受到未經授權的攔 截,並確保只以個別的方式將内容釋出給一個具有經適當 授權的最終使用者裝置1〇9且與一經授權的電子數位内容 商店103完成一授權許可購買交易之最終使用者。授權許可 控制層501以雙重加密53〗保護内容丨13。係利用一個内容提 供者ιοί產生的加密對稱金鑰將内容113加密,且係利用清 算所的公共金鑰621將該對稱金鑰加密。只有清算所1〇5可 在開始時恢復該對稱金鑰。 授權許可控制係將清算所1〇5設計成“受託方,,。在授與授 權許可要求537的許可(亦即將内容113的對稱金鑰623釋出 給最終使用者裝置109)之前,清算所1〇5先驗證··交易541 及杈權許可543已完成且為可信的;電子數位内容商店ι〇3 已自安全數位内容電子式配送系統100取得銷售電子内容 O:\85\85156 分割.DOC -52- 200304126 113的㈣.;以及最終使用者繼而—經適當授權的應用程 式。稽核/回報545可產生報告,並與安全數位内容電子式 配送系統100中經授權的其他各方分享授權許可交易資訊。 係利用SC處理533實施授權許可控制。利用^⑷將加密 的内容113及資訊配送給各系統作業組成部分(下文中將述 及^SC(S)詳細結構有關的更多冑訊)。叱是一種使用密碼 的資訊載體,該資訊載體使用密碼加密、數位簽名、及數 位從明書’使電子資訊及内容丨13不會受到未經授權的搁截 及修改。SC亦可對電子資料進行可信賴性的驗證。 授權許可控制要求内容提供者101、電子數位内容商店 103、及π异所1〇5具有自用來鑑定這些組成部分的有聲譽 認證中心所發出之真實加密數位證明書。最終使用者裝置 10 9並不需要具有數位證明書。 C ·内容配送及授權許可控制 圖6是内容配送及授權許可控制於應用於圖5所示授權 存可控制層時的一概觀之方塊圖。該圖示出電子數位内容 商店103、最終使用者裝置丨〇9、及清算所1 〇5係經由網際網 路而互連且在這些組成部分之間使用單向(點對點)傳輸之 情形。内容提供者1〇1與電子數位内容商店1〇3間之通訊亦 可經由網際網路或其他網路。現在假設最終使用者裝置丨 與私子數位内容商店丨〇3間之内容購買商務交易係基於標 準的網際網路全球資訊網協定。作為全球資訊網型互動的 一邵分’最終使用者選擇所要購買的内容丨丨3,提供個人及 至融貝並同思講貝的條件。電子數位内容商店1 〇 3可利 ΟΛ85\8515ό 分割.D〇c -53- 200304126 用諸如安全電子交易(SET)等的協定自一受讓機 款授權。 于丁 圖6中也假設電子數位内容商店1〇3根據標準全球資訊 網通訊協定而已將最終使用者播放應用程式195下載到一 最終使用者裝置109。該架構要求電子數位内容商店⑻將 -特有的應用程式識別碼指定給下載的播放應用程式 195 ’並要求最終使用者裝置1()9儲存該識別碼,以供爾後 的應用程式授權許可驗證(請參閱下文)。 整體授權許可流程開始於内容提供者1〇1。内容提供者 101利用一個在當地產生的加密對稱金鑰將内容113加密, 並利用清算所105的公共金鑰621將對稱金鑰623加密。在一 替代實施例中,並不在當地產生該對稱金鑰,而是將該對 稱金输自清算所105傳送到内容提供者丨〇 1。内容提供者丨〇工 產生一個圍繞加密的内容113之内容Sc(s) 63〇、一個圍繞 加密的對稱金鑰623之中介資料SC(s) 620、商店使用條件 5 19、以及與資訊相關聯的其他内容丨13。每一内容113物件 都有一個中介資料SC(s) 620及一個内容sc(s) 630。内容 113物件可以是同一首歌的一壓縮等級,或者内容n 3物件 可以是專輯上的每一首歌,或者内容n 3物件可以是整張專 輯。對於每一内容113物件而言,中介資料sc(s) 620亦載 有與内容使用控制層505相關聯的商店使用條件5 1 9。 在步驟601中,内容提供者1〇1將中介資料sc(s) 620配送 到一個或多個電子數位内容商店1 〇3,並在步騾602中將内 容SC(s) 630配送到一個或多個代管内容網站。每一電子數 O:\85\85156 分割.DOC -54- 200304126 位内容商店103又產生一報價SC(s) 641。該報價SC(s) 641 通常包含與中介資料SC(s) 620相同的許多資訊,其中包括 内容提供者101的數位簽名624、及内容提供者101的數位證 明書(圖中未示出)。如前文所述,電子數位内容商店1〇3可 增添或縮小内容提供者1〇丨開始時所指定的(由内容使用控 制層處理的)商店使用條件519。亦可選擇以内容提供者1〇1 的數位簽名624簽認内容SC(s) 630及(或)中介資料SC(s) 620 〇 在步·驟603中完成了最終使用者裝置1〇9與電子數位内 容商店103間的内容購買交易之後,電子數位内容商店1〇3 在步驟604中產生一交易SC(s) 640,並將該交易SC(s) 640 傳送到最終使用者裝置109。該交易SC(s) 640包含一特有 父易識別碼53 5、購買者的名稱(亦即最終使用者)(圖中未 示出)、最終使用者裝置i 09之公共金鑰66丨、及與所購買的 内容113相關聯之報價sc(s) 641。圖6所示之交易資料642 代表叉易識別碼535及最終使用者名稱(圖中未示出)。係利 用清算所105的公共金鑰621將交易資料642加密。亦可選擇 利用電子數位内容商店1〇3的一數位簽名643簽認交易sC(s) 640 ° 在步驟605中,於接收到交易SC(s) 640(及包含在交易 SC(s) 640之報價Sc(s) 641),在最終使用者裝置ι〇9上執行 的最終使用者播放應用程式195利用一訂單Sc(s) 65〇向清 算所105要求授權許可。訂單Sc(s) 65〇包含:來自報價sc(s) 641ι加密後對稱金鑰623及商店使用條件5i9、來自交易O: \ 85 \ 85156 When splitting .D0C frame, — ’, start copy -50-200304126 frame / playback copy / play code 523 indicates the content 1-13. Play the application private 195 and then store the content 13 in the end-user device 109, first encode the content 113 with a password. The playback application 195 generates a coded Jin Yu for each member, encrypts the key, and hides the key in the end-user device 109. Then whenever the end-user device 109 accesses the content 13 for copying or playback, the end-user device 109 verifies the Tibetan copy / playback code before allowing the content 113 to be decoded and executed for playback or copying. The end-user device 109 also appropriately updates the copy / play code in any new subsequent copies of the original copy of the content n3. Copy / play encoding is performed on the compressed content 113. That is, it is not necessary to decompress the contents 1 丨 3 before embedding the copy / play code. The end-user device 109 embeds the copy / play code in the content 13 using a license watermark 527. Only end-user playback applications 195 that can recognize the embedded algorithm and associated encoding keys can read or modify the embedded data. The viewer cannot see or hear the data; that is, the data does not cause a perceptible reduction in the quality of the content 113. Since the watermark has gone through several steps of content processing, data compression, digital-to-analog and analog-to-digital conversion, and the degradation of signal quality introduced by normal content processing, the 'watermark' is still in any representation that includes analog representations. Remains in content 113. In an alternative embodiment, an authorized license watermark 5 2 7 is not used to post the copy / play code into the content 113, and the end user plays the application 195 instead using the securely stored usage conditions 519. 3. Content identification layer 503 As part of the content identification layer 503, the content provider 10 also uses a 10: \ 85 \ 85156 segmentation. DOC -51-200304126 Authorized license watermark 527 will be used for content identification code, content owner, etc. , And other information (such as publication date and geographic distribution area), etc. are included in Content 113. This watermark is referred to as a copyright watermark 529 in the present invention. Upon receipt, 'most = user device 1G9 adds a copy of the content 113 plus the name of the content buyer and the transaction identification code 535 (see section Authorization Control = 501 below) and such dates as the authorization permission and conditions of use 5 17 and other other Λ watermarks. This watermark is referred to as a license watermark at the end of the invention. Any copy of any content that has been queried or obtained without authorization and that has been preserved in quality can be treated with copyright watermarks and license watermarks. The content identification layer 503 can deter piracy. 4. Authorization control layer 501 The authorization control layer 501 protects the content 113 from unauthorized interception and ensures that the content is only released to an end user device with appropriate authorization in an individual manner. 9 and an end user who has completed an authorized purchase transaction with an authorized digital content store 103. The authorization control layer 501 protects the content with double encryption 53. The content 113 is encrypted using an encrypted symmetric key generated by the content provider, and the symmetric key is encrypted using the public key 621 of the clearing house. Only clearing house 105 can recover the symmetric key at the beginning. The license control system designed the clearing house 105 as a "trustee." Before granting the license for license request 537 (that is, releasing the symmetric key 623 of content 113 to the end-user device 109), the clearing house 105 Validation first. Transaction 541 and license 543 have been completed and trusted; the electronic digital content store ι03 has obtained sales electronic content from the secure digital content electronic distribution system 100 O: \ 85 \ 85156 division .DOC -52- 200304126 113 以及.; And end users in turn—appropriately authorized applications. Audits / reports 545 can generate reports and share them with other authorized parties in the Secure Digital Content Electronic Distribution System 100 Authorize transaction information. Use SC processing 533 to implement authorization control. Use ^ ⑷ to distribute encrypted content 113 and information to each system operation component (more on the detailed structure of ^ SC (S) below) Information). 叱 is a type of information carrier that uses a password. The information carrier uses password encryption, digital signatures, and digital certificates to protect electronic information and content. 13 Intercept and modify. SC can also verify the reliability of electronic materials. Licensing control requires content providers 101, electronic digital content stores 103, and π alienation 105 to have their own reputation authentication to identify these components. The authentic encrypted digital certificate issued by the center. The end-user device 10 9 does not need to have a digital certificate. C · Content distribution and authorization control Figure 6 shows the content distribution and authorization control applied to the authorization storage shown in Figure 5. An overview block diagram of the controllable layer. This figure shows that the electronic digital content store 103, the end-user device 丨 09, and the clearing house 105 are interconnected via the Internet and between these components. Use of one-way (point-to-point) transmission. Communication between content provider 101 and electronic digital content store 103 can also be via the Internet or other networks. Now suppose end-user devices and private digital content The content purchase business transaction between stores 丨 〇3 is based on the standard Internet World Wide Web Agreement. As a part of the global information network type interaction, the ultimate The user selects the content to buy 丨 丨 3, provides personal and financial conditions and thinks about the conditions. The electronic digital content store 1 〇3 can benefit ΟΛ85 \ 8515ό division. Doc -53- 200304126 Use such as secure electronic transactions Agreements such as (SET) are authorized from a transferee. In Figure 6, it is also assumed that the digital digital content store 103 has downloaded the end-user playback application 195 to an end-user in accordance with the standard World Wide Web communication protocol. Device 109. This architecture requires an electronic digital content store to assign a unique application identification code to the downloaded playback application 195 'and requires the end-user device 1 () 9 to store the identification code for subsequent application authorization License verification (see below). The overall licensing process begins with content provider 101. The content provider 101 encrypts the content 113 with a locally generated encryption symmetric key, and encrypts the symmetric key 623 with the public key 621 of the clearing house 105. In an alternative embodiment, instead of generating the symmetric key locally, the symmetric key is transmitted from the clearing house 105 to the content provider. The content provider produces a content Sc (s) 63 surrounding the encrypted content 113, a symmetric key 623 surrounding the encryption, SC (s) 620, store usage conditions 5 19, and associated information Other content 丨 13. Each content 113 object has an intermediary data SC (s) 620 and a content sc (s) 630. The content 113 object can be a compression level of the same song, or the content n 3 object can be each song on the album, or the content n 3 object can be the entire album. For each content 113 object, the intermediary data sc (s) 620 also contains the store use conditions 5 1 9 associated with the content use control layer 505. In step 601, the content provider 101 distributes the intermediary material sc (s) 620 to one or more electronic digital content stores 103, and distributes the content SC (s) 630 to one or more in step 602. Multiple hosted content sites. Each electronic number O: \ 85 \ 85156 is divided. DOC -54- 200304126 The content store 103 generates another quote SC (s) 641. The quotation SC (s) 641 usually contains much of the same information as the intermediary material SC (s) 620, including the digital signature 624 of the content provider 101 and the digital certificate of the content provider 101 (not shown in the figure). As mentioned above, the electronic digital content store 103 can increase or decrease the store usage conditions 519 specified by the content provider 1010 at the beginning (processed by the content use control layer). You can also choose to sign the content SC (s) 630 and / or the intermediary data SC (s) 620 with the digital signature of the content provider 101. The end-user device 10 and 9 were completed in step 603. After the content purchase transaction between the electronic digital content stores 103, the electronic digital content store 103 generates a transaction SC (s) 640 in step 604 and transmits the transaction SC (s) 640 to the end-user device 109. The transaction SC (s) 640 includes a unique parent easy identification code 53 5. The name of the purchaser (ie, the end user) (not shown in the figure), the public key 66 of the end user device i 09, and A quote sc (s) 641 associated with the purchased content 113. The transaction information 642 shown in FIG. 6 represents the fork easy identification code 535 and the end user name (not shown in the figure). The transaction data 642 is encrypted using the public key 621 of the clearing house 105. Alternatively, use a digital signature of the electronic digital content store 103 to sign the transaction sC (s) 640 ° In step 605, upon receiving the transaction SC (s) 640 (and included in the transaction SC (s) 640) Quotation Sc (s) 641), the end-user playback application 195 running on the end-user device ι09 uses an order Sc (s) 65 to request clearinghouse 105 authorization. Order Sc (s) 65〇 includes: from quote sc (s) 641ι encrypted symmetric key 623 and store usage conditions 5i9, from transaction

O:\85\85156 分割.DOC -55- 200304126 SC(s) 640之加密後交易資料642、以及來自最終使用者裝 置1 09之加密後應用程式識別碼55 1。在另一實施例中,係 利用最終使用者裝置109之一數位簽名652簽認訂單SC(s) 650 〇 自最終使用者裝置109接收到訂單SC(s) 650時,清算所 105驗證下列事項·· 1 ·電子數位内容商店1 03自安全數位内容電子式配送系統 100取得授權(存在於清算所1〇5之資料庫160); 2·訂單SC(s) 650並未被變更; 3·交易資料642及對稱金鑰623是完整的及可信的; 4·最終使用者裝置1〇9所購買的電子商店使用條件519與 内容提供者101設定的使用條件517 一致;以及 5·應用程式識別碼551具有一有效結構,且係由一經過授 權的電子數位内容商店103提供該應用程式識別碼55 i。 如果藏驗證是成功的,則在步驟6〇6中清算所i 〇5將對稱 金鑰623及交易資料642解密,並建立授權許可Sc(s) 66〇, 且將該授權許可SC(s) 660傳送到最終使用者裝置1〇9。該 杈權终可SC(s) 660載有對稱金鑰623及交易資料642,且係 利用最終使用者裝置109的公共金鑰661將對稱金鑰623及 X易資料642加密。如果任何驗證並未成功,則清算所ι〇5 拒絕授權給最終使用者裝置1〇9,並通知最終使用者裝置 109。清算所105亦立即將該驗證失敗的訊息通知電子數位 内容商店H)3。在-替代實施例中,清算所⑽以其數位簽 名663簽認授權許可sc(s) 660。 O:\85\85156 分割.D〇c -56- 200304126 在接收到授權許可SC(s) 660之後,最終使用者裝置1〇9 將先岫自清异所1〇5接收的對稱金鑰623及交易資料解 密,並在步驟607中向一代管内容網站m要求内容Sc(s) 630。在步驟608中内容SC(s) 630到達時,最終使用者裝置 109在步驟609中利用對稱金鑰623將内容113解密,並將内 容113及父易資料642傳送到其他層,以便進行前文中朱照 圖5所述的授權許可浮水印嵌入、拷貝/播放編碼、亂序編 碼、及進一步的内容1丨3處理。 最後,在步驟610中,清算所1〇5定期將總結交易報告傳 送到内容提供者1〇1及電子數位内容商店1〇3,以供稽核及 追蹤之用。 V·安全容器物件結構 A.—般性結構 安全容器物件(SC)是一種包含數個組成部分之結構,這 些組成部分合而界定了一個單位的内容113、或一交易的一 部分,這些組成部分也界定了諸如使用條件、中介資料、 及加金方各等相關資訊。S C (s)被設計成使資訊的完整性、 完成性、及可信賴性可以被驗證。可將SC(s)中的某些資訊 加密,因而只有在取得適當的授權之後,才可存取這些資 訊。 SC(s)包含至少一個材料表(Bill Of Materials ;簡稱BOM) 組成部分,該組成部分具有與SC(s)有關的資訊記錄、及與 SC(s)中包含的每一組成部分有關的資訊記錄。針對每一組 成部分,利用諸如MD-5等的一雜亂演算法計算一訊息摘 〇Λ85\85156 分割.D0C -57- 200304126 要,然後將該訊息摘要包含在該組成部分的BOM記錄中。 私讀等組成部分的摘要序連在一起,且利用這些摘要計算 另一摘要,然後利用產生該SC(s)的實體的秘密金鑰將該另 一摘要加密,以便產生一數位簽名。接收該Sc(s)的各方可 利用該數位簽名來驗證所有的摘要,並因而確認該sC(s) 及所有該SC(s)的各組成部分之完整性及完成性。 可包含下列資訊作為B0M中之記錄及每一組成部分之 死錄。SC(s)類型決定需要包含哪些記錄: SC(s)版本 SC(s)識別碼 SC(s)類型(例如報價、訂單、交易、内容、中介資料 或促銷、及授權許可) SC(s)的發行人 產生SC(s)的日期 SC(s)的到期日 清算所的網址 用於所包含各組成部分的摘要演算法之描述(系統預 設為MD-5) 〃 用於數位簽名加密的清算法之 垂u、一 开忐〈撝述(系統預設為RSA) 數位食名(所包含各組成部分 後摘要) )所有序連摘要之加密 SC⑷可包含一個以上的B〇M。例如 包含原始的中介資料Sfv 1 貝 (s) T J丨貝科SC(S) 620組成部分 B〇M)、電子數位内容商 (,、中匕括” 占所曰添的頸外資訊、以及一O: \ 85 \ 85156 Division. DOC -55- 200304126 SC (s) 640 encrypted transaction data 642, and encrypted application ID 55 1 from end user device 1 09. In another embodiment, the order SC (s) 650 is signed with the digital signature 652 of one of the end-user devices 109. When the order SC (s) 650 is received from the end-user device 109, the clearing house 105 verifies the following ·· 1 · Electronic Digital Content Store 1 03 Obtained authorization from the secure digital content electronic distribution system 100 (existing in the clearing house 105 database 160); 2 · The order SC (s) 650 has not been changed; 3 · The transaction data 642 and the symmetric key 623 are complete and trustworthy; 4. The use conditions 519 of the electronic store purchased by the end-user device 109 are consistent with the use conditions 517 set by the content provider 101; and 5. the application The identification code 551 has a valid structure, and the application identification code 55 i is provided by an authorized electronic digital content store 103. If the Tibetan verification is successful, the clearing house i 〇5 decrypts the symmetric key 623 and the transaction data 642 in step 606, and establishes the authorization permission Sc (s) 66〇, and the authorization permission SC (s) 660 is transmitted to the end-user device 109. The control key SC (s) 660 can carry the symmetric key 623 and the transaction data 642, and the public key 661 of the end-user device 109 is used to encrypt the symmetric key 623 and the X-easy data 642. If any verification is unsuccessful, the clearing house ι05 refuses to authorize the end-user device 109 and notifies the end-user device 109. The clearing house 105 also immediately notified the electronic digital content store of the verification failure message 3). In an alternative embodiment, the clearing house signs the authorization sc (s) 660 with its digital signature 663. O: \ 85 \ 85156 division. D〇c -56- 200304126 After receiving the authorization SC (s) 660, the end-user device 109 will first receive the symmetric key 623 received from the Qingyuan 105 And transaction data is decrypted, and in step 607, the content management site m is requested for content Sc (s) 630. When the content SC (s) 630 arrives in step 608, the end-user device 109 decrypts the content 113 using the symmetric key 623 in step 609, and transmits the content 113 and the parent data 642 to other layers for the purpose of the foregoing Zhu Zhao authorizes the watermark embedding, copy / playback encoding, out-of-order encoding, and further content processing as described in FIG. 5. Finally, in step 610, the clearing house 105 periodically transmits the summary transaction report to the content provider 101 and the electronic digital content store 103 for auditing and tracking purposes. V. Safe Container Object Structure A. General Structure A Safe Container Object (SC) is a structure that contains several components that collectively define the content of a unit 113 or a part of a transaction. These components It also defines relevant information such as conditions of use, intermediary information, and Canadian gold. SC (s) is designed so that the integrity, completeness, and trustworthiness of information can be verified. Some information in the SC (s) can be encrypted so that it can be accessed only with proper authorization. SC (s) contains at least one Bill Of Materials (BOM) component, which has a record of information related to SC (s) and information related to each component contained in SC (s) recording. For each component, a messy algorithm such as MD-5 is used to calculate a message digest 〇Λ85 \ 85156 segmentation. D0C -57- 200304126 is necessary, and then the message digest is included in the BOM record of the component. The digests of the private reading and other components are connected together in sequence, and another digest is calculated using these digests, and then the other digest is encrypted with the secret key of the entity that generated the SC (s) to generate a digital signature. The parties receiving the Sc (s) can use the digital signature to verify all the digests, and thus confirm the integrity and completeness of the sC (s) and all components of the SC (s). The following information may be included as a record in B0M and a dead record for each component. The SC (s) type determines which records need to be included: SC (s) version SC (s) identifier SC (s) type (such as quote, order, transaction, content, intermediary information or promotion, and authorization) SC (s) The date on which the issuer generates SC (s). The expiry date of SC (s). The website of the clearing house is used for the description of the digest algorithm of each component. (The system defaults to MD-5.) 〃 For digital signature encryption. The definition of the clear algorithm is as follows: [Description (the system defaults to RSA) Digital food name (summary after each component is included)) The encrypted SC⑷ of all sequential digests may contain more than one BOM. For example, it contains the original intermediary data Sfv 1 Be (s) T J 丨 Beco SC (S) 620 component BOM), electronic digital content quotients (,, and daggers) account for the extra-neck information, and a

O:\85\85156 分割.DOC -58- 200304126 個新的BOM。中介資料SC(s) 620 BOM之一記錄係包含在 報價SC(s) 641之BOM中。該記錄包含中介資料SC(s) 620 BOM的一摘要,該摘要可用來確認中介資料SC(s) 620之完 整性,因而亦可利用中介資料SC(s) 620 BOM中儲存的各 組成部分摘要值來確認中介資料SC(s) 620中包含的該等 組成部分之完整性。中介資料SC(s) 620的各組成部分在為 報價SC(s) 641而產生的該新BOM中並無任何記錄。只有電 子數位内容商店103及中介資料SC(s) 620 BOM所增添的各 組成部分在該新BOM中有記錄。 SC(s)亦可包含一金鑰描述組成部分。金鑰描述組成部分 包含一些記錄,這些記錄包含與該S C (s)中各加密組成邵分 有關的下列資訊: 加密組成部分之名稱。 當將該組成部分解密時該組成部分所用的名稱。 將該組成部分加密所用的加密演算法。 指示用來將該組成部分加密的公共加密金输之一金 鑰識別碼、或於解密時用來將該加密組成部分解密之 一加密的對稱金鑰。 用來將該對稱金鑰加密之加密演算法。當該金鑰描述 組成部分中之記錄包含一個用來將該加密組成部分 加密之加密的對稱金餘時,才有本欄位。 用來將該對稱金输加密的該公共加密金鑰之一金瑜 識別碼。只有在該金瑜描述組成邵分中之記錄包含一 加密的對稱金鑰、及用來將該加密部分加密的對稱金 O:\85\85156 分割.DOC -59- 200304126 鑰《加密演算法識別碼時,才有本搁位。 如果SC(s)並未包含任何加密组, ^ &gt; 且成邵分,則並無任何金鑰 描述組成部分。 B·權利管理語言語法及語意 權利管理語言包含若干參數’可將值指定給該等參數, 以便在購買内容⑴之後’規定對—最終使用者於使用内容 113時的限制。對内容113使用的限制是使用條件川。每一 内容提供者ΗΠ針對其每-内容113項目規定使用條件 517。電子數位内答商店103解譯中介資料sc〇) 中之使 用條件517,並利用該資訊提供其想要對其客戶報價的選 項,且利用該資訊增添内容113之零售資訊。在一最終使用 者選擇所要購買的一内容113項目之後,最終使用者裝置 1〇9要求根據商店使用條件519的内容113授權。在清算所 1〇5將一授權許可SC(s) 660傳送到該最終使用者之前,清 所105先驗|登该商店使用條件。所要求的條件5 19係與内 容提供者101在中介資料Sc(s) 620中規定的容許使用條件 5 17 —致。' 當一最終使用者裝置109接收所購買的内容113時,利用 浮水印工具程式將商店使用條件5 19編碼到該内容113中, 或編碼到安全儲存的使用條件5丨9中。在最終使用者裝置 1 09上執行的最終使用者播放應用程式195確保編碼到内容 113的商店使用條件5丨9被強制執行。 下列是在内容113是音樂的一實施例中商店使用條件 5 19的一些例子: O:\85\85156 分割_D〇c -60- 200304126 可將歌曲錄晋。 可播放歌曲若干次。 c_安全容器物件流程及處理概述 内容提供者1〇1建立中介資料Sc(s) 620,並利用中介資 料SC(s) 620來界定諸如歌曲等的内容丨13。内容η)本身並 不包含在這些SC(s)中,這是因為内容in的容量通常對於 笔子數位内各商店1〇3及最終使用者是太大了,而無法只為 了存取描述性中介資料而有效率地下載容器物件。sc(s) 反而包含一個指向内容113的一外部通用資源位標 (Uniform Resource Locators ;簡稱URL)。SC(s)亦包含:提 供與内容113有關的描述性資訊之中介資料、以及在諸如音 樂的情形中為CD封面圖片及(或)在歌曲内容113的情形中 為數位音訊片段之任何其他相關聯之資料。 笔子數位内容商店1 〇3下載其得到授權的中介資料sc(s) 620,並建立報價sc(s) 641。總之,報價SC(s) 041包含來 自中介資料SC(s) 620的某些組成部分及bom、以及電子數 位内容商店1〇3加入的額外資訊。於建立報價Sc(s) 641 時,產生該報價SC(s) 641的一個新BOM。電子數位内容商 店103也利用中介資料sc(s) 620自這些中介資料提取中介 資料資訊,而在其網站上建立HTML網頁,用以將内容丨! 3 的描述提供給最終使用者,因而最終使用者可能購買内容 113 ° 報價SC(s) 641中由電子數位内容商店1〇3加入的資訊通 常是用來縮小在中介資料SC(s) 62〇中指定的使用條件517 O:\85\85156 分割.DOC ^ 200304126 ^擇、以及諸如商店的圖形影像構及商店的網站的網址 ^促銷資料。中介資料Sc(s)62时之—報價sc(s)⑷樣板 電子數位内容商店1G3可取代報價sc(s)641中的哪 一 ” Λ,包子數位内客商店丨〇3需要哪些额外資訊(在需要 額外資訊的情形);以及在嵌入的中介資料Sc(s)62G中要保 留哪些組成部分。 、田讀使用者決定向-電子數位内容商店1〇3購買内 容⑴時’將報價%⑷641包含在一交易sc(s) 64〇中。電 :數位内容商店1()3建立一交易Sc(s) _,並為所講買的 每一内容113項目包含報價sc⑷641 ’且將該交a%⑷ 40傳辽到最終使用者裝置丨〇9。最終使用者裝置1 〇9接收交 易SC(S) 640 ’並確認交易SC(s) 640及所包含報價Sc(s) 641 之完整性。 最終使用者裝置109為所購買的内容113項目建立一訂 單SC(s) 650。自報價Sc(s)641、交易sc(s)64〇、及最終使 用者裝置109的組態檔包含資訊。以一次一個之方式將訂單 SC(s) 65〇傳送到清算所1〇5。接收訂單^⑷6s〇的清算所 105之網址係被包含作為中介資料Sc(s) 62〇的bom中之一 個記錄,且清算所105之網址又係包含在報價Sc(s)641中。 清算所105驗證並處理訂單SC(s) 650,以便將一授權許 可浮水印527及存取所購買内容1丨3所需的所有資訊提供給 最終使用者裝置109。清算所1 〇5的一個功能即是將來自報 價SC(s) 641的浮水印指令解密並將來自内容sc(s) 630的 内容113解密所需的對稱金鑰623解密。一個加密的對稱金 O:\85\85156 分割.DOC -62- 200304126 鑰623記錄實際包含一個以上的實際加密之對稱金鑰。 在執行該加密之前,内容提供者1〇1可先選擇將其名稱附加 在實際對稱金鑰623之後。將内容提供者1〇1的名稱連同對 稱金鑰623—起加密時,可在安全性上對抗仿冒内容提供者 ιοί利用合法sc(s)建立其本身的中介資料Sc(s) 62〇及内容 SC(s) 630。清算所105驗證連同對稱金鑰623而加密的内容 k供者101名稱符合SC(S)證明書中該内容提供者1〇1的名 稱。 如果清异所105需要對浮水印指令進行任何改變,則清 算所105將對稱金鑰623解密,然後修改浮水印指令,並利 用一個新對稱金鑰623再度將這些浮水印指令加密。然後利 用最終使用者裝置109的公共金鑰661重新將該對稱金鑰 623加密。清算所105也將sc⑷中的其他對稱金鑰623解 密,並利用最終使用者裝置109的公共金鑰661再度將這些 對稱金鑰623加密。清算所105建立一個包含新加密的對稱 金鑰623及更新後浮水印指令之授權許可Sc(s) 66〇,並回 應訂單SC(s) 650 ’而將該授權許可§(:(3) 66〇傳送到最終使 用者裝置1〇9。如果訂單SC⑷65〇的處理並未成功地完 成,則清算所105將一報告授權程序失敗的html網頁或等 效資訊送回到最終使用者裝置丨〇9。 一杈權許可SC(s) 660將存取一内容113項目所需的每一 資訊提供給-最終使用者裝置1G9。最終使用者裝置1〇9向 代管内容網站111要求適當的内容8〇(8) 63〇。内容提供者 101建立内容SC(s) 630,且内容Sc(s)㈣包含加密的内容 O:\85\85156 分割.DOC -63- 200304126 11 3及中’丨貝料口15分。最終使用者播放應用程式195利用來 自授權許可SC(S) 660的對稱金鑰623將内容113、中介資 料、及浮水印指令解密。然後將浮水印指令附加到内容 U3,並對内容113進行亂序編碼,且將編碼後的内容113 儲存在最終使用者裝置109。 D·中介資料安全容器物件620格式 下表示出匕§在一中介資料Sc(s) 62〇的各組成部分。組 成部分(Parts)行中的每一攔都是與BOM在一起的Sc(s)中 包含的各別物件(例外為以[]字元包圍的組成部分名稱)。 BOM存有SC(s)中包含的每一組成部分之一記錄。組成部分 存在(Part Exists)行指示該組成部分本身實際上包含在 SC(s)中,且摘要(Digest)行指示是否針對該組成部分而計 异一吼息摘要。當一 SC(s)係包含在其他的Sc(s)時(由相關 聯的樣板決足),某些組成部分並不會傳播,但是整個原始 的BOM則會傳播。因為清算所1〇5需要整個bom來驗證原 始SC(s)中之數位簽名,所以才執行上述步驟。 下表的金鑰描述邵分行界定Sc(s)的金输描述部分中包 含的記錄。金鑰描述部分中的記錄界定與加密金鑰相關的 資訊、以及用來將SC(s)内的組成部分加密或將另一 sc(s) 内的組成部分加密之演算法。每一記錄包含加密的組成部 分名稱、及(在必要時)一個指向另一包含該加密的組成部 分的SC(s)之網址。結果名稱(Result Name)行界定被指定給 接密後的組成部分之名稱。加密演算法(Encrypt Alg)行界 定用來將組成部分加密的加密演算法。金鑰識別碼/加密金 O:\85\85156 分割.D〇c -64- 200304126 鑰(Key Id/Enc Key)行界定用來將組成部分加密的加密金 鑰之一識別碼、或用來將組成部分加密的加密對稱金鑰623 位元串之一 64基編碼。對稱金瑜演算法(Sym Key Alg)行是 一可選用的參數,而當前一行是一加密的對稱金鑰623時, 該參數界定用來將對稱金鑰623加密的加密演算法。對稱金 鑰識別碼(Sym Key ID)行是當金鑰識別碼/加密金鑰行是一 加密的對稱金鑰623時用來將對稱金鑰623加密的加密金鑰 之一識別碼。 域部分 ,喊部分存在 [内容網蝴 [中介資枰_O: \ 85 \ 85156 split .DOC -58- 200304126 new BOMs. One record of the intermediary data SC (s) 620 BOM is included in the BOM of the quote SC (s) 641. The record contains a summary of the intermediary data SC (s) 620 BOM. The summary can be used to confirm the integrity of the intermediary data SC (s) 620, so it can also use the summary of each component stored in the intermediary data SC (s) 620 BOM. Value to confirm the integrity of those components contained in the intermediary information SC (s) 620. The components of the intermediary information SC (s) 620 do not have any records in the new BOM generated for the quote SC (s) 641. Only the components added to the digital content store 103 and the intermediary data SC (s) 620 BOM are recorded in the new BOM. SC (s) can also contain a key description component. The key description component contains records that contain the following information about each cryptographic component in the SC (s): The name of the cryptographic component. The name used when the component was decrypted. The encryption algorithm used to encrypt this component. Indicate one of the key cryptographic keys used to encrypt the component in public encryption, or an encrypted symmetric key used to decrypt the component in decryption. The encryption algorithm used to encrypt the symmetric key. This field is only available when the record in the key description component contains an encrypted symmetric balance used to encrypt the encrypted component. One of the public encryption keys used to encrypt the symmetric golden input. Only the record described by Jin Yu in the composition of Shao Fen contains an encrypted symmetric key and the symmetric gold O: \ 85 \ 85156 segment used to encrypt the encrypted part. DOC -59- 200304126 Key "Encryption Algorithm Identification This seat is only available when the yard is set. If SC (s) does not contain any encryption group, and ^ &gt; is a fraction, there is no key description component. B. Rights Management Language Grammar and Semantics Rights management language contains a number of parameters' values can be assigned to these parameters so that after the purchase of content ', the restrictions on end-users' use of content 113 are specified. Restrictions on the use of content 113 are conditions of use. Each content provider specifies usage conditions 517 for each of its 113 items. The electronic digital answering store 103 interprets the use condition 517 in the intermediary data sc0), and uses the information to provide options for which it wants to quote its customers, and uses the information to add the retail information of the content 113. After an end user selects an item of content 113 to be purchased, the end user device 109 asks for authorization of the content 113 according to the store use condition 519. Before the clearing house 105 transmits an authorized SC (s) 660 to the end user, the clearing house 105 transcends | the store's conditions of use. The required condition 5 19 is the same as the allowable use condition 5 17 specified by the content provider 101 in the intermediary information Sc (s) 620. 'When an end-user device 109 receives the purchased content 113, it uses a watermark tool program to encode the store usage condition 5 19 into the content 113 or the secure storage usage condition 5 丨 9. The end-user playback application 195 executing on the end-user device 109 ensures that the store usage conditions 5i-9 encoded to the content 113 are enforced. The following are some examples of store usage conditions 5 19 in an embodiment where the content 113 is music: O: \ 85 \ 85156 Divide_Doc -60- 200304126 Songs can be recorded. Can play songs several times. c_Overview of the process and processing of secure container objects The content provider 101 establishes an intermediary material Sc (s) 620, and uses the intermediary material SC (s) 620 to define content such as songs, etc.13. The content η) itself is not included in these SC (s), because the capacity of the content in is usually too large for each store 103 and the end user in the pen digits, and cannot be used only for descriptive access. Intermediate data to efficiently download container objects. sc (s) instead contains an external Uniform Resource Locator (URL) pointing to the content 113. SC (s) also includes: any descriptive information about the content 113, intermediary material, and any other relevant information about a CD cover picture in the case of music, and / or a digital audio clip in the case of song content 113 Information. The pen digital content store 103 downloads its authorized intermediary data sc (s) 620 and creates a quote sc (s) 641. In summary, the offer SC (s) 041 contains additional information added from some components of the intermediary data SC (s) 620 and the bom, and the electronic digital content store 103. When the quote Sc (s) 641 is created, a new BOM for the quote SC (s) 641 is generated. The electronic digital content store 103 also uses the intermediary data sc (s) 620 to extract intermediary data information from these intermediary data, and create an HTML page on its website to use the content 丨! The description of 3 is provided to the end user, so the end user may purchase the content 113 ° Quote SC (s) 641 The information added by the electronic digital content store 103 is usually used to narrow down the intermediary data SC (s) 62. Conditions of use specified in 517 O: \ 85 \ 85156 Divide .DOC ^ 200304126 ^ selection, and graphic image structure of the store and the website URL of the store ^ promotional materials. Intermediary data Sc (s) at 62 o'clock—quote sc (s) ⑷ model electronic digital content store 1G3 can replace which one of the offer sc (s) 641 ”Λ, what additional information is required for the Baozi digital in-house shop 丨 〇3 (When additional information is needed); and what components to keep in the embedded intermediary data Sc (s) 62G. When the readers decide to purchase content from Electronic Digital Content Store 103, the price will be% 641 Contained in a transaction sc (s) 64〇. Electricity: Digital content store 1 () 3 establishes a transaction Sc (s) _, and includes a quote sc⑷641 'for each item purchased, and submits the transaction a % ⑷ 40 is transmitted to the end-user device 丨 09. The end-user device 10 receives the transaction SC (S) 640 'and confirms the integrity of the transaction SC (s) 640 and the included quote Sc (s) 641. The end-user device 109 creates an order SC (s) 650 for the purchased content 113 item. The self-quote Sc (s) 641, the transaction sc (s) 64, and the configuration file of the end-user device 109 contain information. Transfer orders SC (s) 65〇 to clearing house 105 one by one. Clearing house receiving orders ^ ⑷6s〇 The URL of 105 is included as a record in the bom of the intermediary data Sc (s) 62〇, and the URL of Clearing House 105 is included in the quote Sc (s) 641. Clearing House 105 verifies and processes the order SC (s) ) 650 in order to provide a license watermark 527 and all the information required to access the purchased content 1 丨 3 to the end-user device 109. One function of the clearing house 105 is to send the price from the quote SC (s) The 641 watermark instruction decrypts and decrypts the symmetric key 623 required to decrypt the content 113 from the content sc (s) 630. An encrypted symmetric key O: \ 85 \ 85156 segmentation. DOC -62- 200304126 key 623 records the actual Contains more than one symmetric key for actual encryption. Before performing this encryption, the content provider 101 can choose to append its name to the actual symmetric key 623. The name of the content provider 101 is included with the symmetric key. Key 623—when encrypted, it can be secure against counterfeit content providers, using legal sc (s) to establish its own intermediary data Sc (s) 62〇 and content SC (s) 630. Clearing house 105 verification together with symmetry Key 623 and encrypted content k donor 101 name character The name of the content provider 101 in the SC (S) certificate. If the clearing house 105 needs to make any changes to the watermark instruction, the clearing house 105 decrypts the symmetric key 623, then modifies the watermark instruction and uses A new symmetric key 623 encrypts these watermark instructions again. Then the public key 661 of the end-user device 109 is used to re-encrypt the symmetric key 623. The clearing house 105 also decrypts the other symmetric keys 623 in sc⑷ and uses the public key 661 of the end-user device 109 to encrypt these symmetric keys 623 again. The clearing house 105 establishes a license Sc (s) 66 including the newly encrypted symmetric key 623 and the updated watermark instruction, and responds to the order SC (s) 650 'to grant the license § (:( 3) 66 〇Transfer to the end-user device 1 0. If the processing of the order SC⑷65 is not successfully completed, the clearing house 105 returns an html webpage or equivalent information reporting the failure of the authorization procedure back to the end-user device 丨 09 A license SC (s) 660 provides every information required to access a content 113 item to-end-user device 1G9. End-user device 109 requests hosted content website 111 for appropriate content 8 〇 (8) 63〇. Content provider 101 establishes content SC (s) 630, and content Sc (s) contains encrypted content O: \ 85 \ 85156 segmentation. DOC -63- 200304126 11 3 and Chinese 15 points. The end-user playback application 195 decrypts the content 113, the intermediary data, and the watermark instruction using the symmetric key 623 from the license SC (S) 660. Then, the watermark instruction is attached to the content U3, and Encode the content 113 out of order, and store the encoded content 113 End-user device 109. D. Intermediate data security container object 620 format The table below shows the components of an intermediary data Sc (s) 62. Each block in the Parts line is related to the BOM Individual objects contained in the Sc (s) together (except for the name of the component surrounded by [] characters). The BOM stores a record of each component contained in the SC (s). The component exists ( The Part Exists line indicates that the component itself is actually contained in the SC (s), and the Digest line indicates whether or not a roaring abstract is different for the component. When a SC (s) is included in other At Sc (s) (determined by the associated template), some components will not propagate, but the entire original BOM will propagate. Because the clearing house 105 requires the entire bom to verify the original SC (s) The digital signature is used to perform the above steps. The key description in the following table describes the records contained in the Shao branch's definition of the Sc (s) gold loss description. The records in the key description section define the information related to the encryption key, and Used to encrypt components within SC (s) or The algorithm of the component encryption in sc (s). Each record contains the name of the encrypted component, and (if necessary) a URL pointing to another SC (s) that contains the encrypted component. The result name ( The Result Name line defines the name of the component assigned to the encrypted part. The Encrypt Alg line defines the encryption algorithm used to encrypt the component. Key Identifier / Encryption Key O: \ 85 \ 85156 divided. Doc -64- 200304126 Key (Id / Enc Key) line defines one of the encryption keys used to encrypt the component, or used to A 64-base encoding of one of the 623-bit strings of the cryptographic symmetric key that the component is encrypted with. The Sym Key Alg line is an optional parameter, and when the current line is an encrypted symmetric key 623, this parameter defines the encryption algorithm used to encrypt the symmetric key 623. The Sym Key ID line is one of the encryption keys used to encrypt the symmetric key 623 when the key identification code / encryption key line is an encrypted symmetric key 623. The domain part, the shout part exists [Content network butterfly [

述部分 結總爯 加密演算法 加密 離銳 演算法 tmm 識祕馬 輸出部分 RC4 加密儒嫌 RSA CH 公 輸出部分 Ren 加齡懈 RSA SC紗 SCI娜馬 scm sc發行人 細日 清獅贩 緻演算法瓣馬 數位簽名演算法娜馬 内容識別^ 中介資料 細制牛 sc樣板 浮私時岭 述部分 清算所證明書 證明書 是 是 是 是 是 是 是 是 是 是 是 是 是 是 否 否 輸出部分 加密儒魏 CH 公 數位簽名 下文中將說明用於上述中介資料SC(s)表之術語: [内容網址]-金鑰描述部分中的一記錄中之一參數。這 是指向與該中介資料SC(s) 620相關聯的内容SC(s) O:\85\85156 分割.DOC -65- 200304126 630中的加密内容丨13之一網址。該中介資料%⑷620 本身並不包含該加密内容113。 [中介資料網址]-金瑜描述部分中的一記錄中之一參 數。這是指向與該中介資料SC(s) 620相關聯的内容 SC(s) 630中的加密中介資料之一網址。該中介資料 SC(s) 620本身並不包含該加密的中介資料。 内各識別碼-界定一個指定給一内容1丨3項目的一特有 識別碼之組成部分。如果中介資料Sc(s) 620對照到一 個以上的内容113項目,則有一個以上的内容識別碼 包含在該組成部分中。 中介資料-包含與一内容H3項目相關的資訊(例如在 歌曲情形中的藝人及CD封面圖片)之組成部分。可 以有多個中介資料組成部分,可將某些中介資料組成 部分加密。中介資料組成部分的内部結構係取決於内 含的中介資料之類型。 使用條件-包含用來描述將要對一最終使用者或内容 113的〜使用施加的使用選項、規則、及限制的資訊之 組成部分。 SC(s)樣板-界定用來描述建立報價、訂單、及授權許 可SC(s) 660的必要及選用資訊的樣板之組成部分。 浮水印指令-一個包含用來在内容丨丨3中實施浮水印的 加在“令及參數之組成邵分。清算所1 〇 5可修改浮水 印指令,並將浮水印指令送回到最終使用者裝置1〇9 内的杈權許可SC(s) 660。金鑰描述部分中有一記錄, ΟΛ85\85156 分割.DOC -66- 200304126 用以界定用來將浮水印指令加密的加密演算法、於將 浮水印指令解密時所使用的輸出組成部分名稱、用來 將浮水印指令加密的加密對稱金鑰623位元串之一 64 基編碼、用來將對稱金鑰623加密之加密演算法、以 及將對稱金鑰623解密所需的公共金鑰之識別碼。 清算所證明書-一認證中心或清算所1 05發出的證明 書,該證明書包含清算所105的簽認公共金鑰621。可 能有一個以上的證明書,在此種其情形中,係使用一 階層式結構,其中最高層的證明書包含用來開啟次一 層級證明書之公共金鑰,依此類推,直到到達最低層 級的證明書,而該最低層級的證明書包含清算所105 之公共金鑰621。 證明書-一認證中心或清算所105發出的證明書,該證 明書包含產生SC(s)的實體之簽認公共金鑰621。可能 有一個以上的證明書,在此種其情形中,係使用一階 層式結構,其中最高層的證明書包含用來開啟次一層 級證明書之公共金鑰,依此類推,直到到達最低層級 的證明書,而該最低層級的證明書包含SC(s)產生者之 公共金鍮62 1。 SC版本-由SC包封工具程式指定給SC(s)之一版本編 號。 SC識別碼-由產生SC(s)的實體指定給該SC(s)之一特 有識別碼。 SC類型-指示SC(s)的類型(例如中介資料、報價、訂單 ΟΛ85\85156 分割_DOC -67- 200304126 等)。 sc發行人·指示產生Sc(s)之實體。 產生曰-產生SC(S)的曰期。 到期日-SC(s)到期且不再有效的曰期。 清算所網址-最終使用者播放應用程式19 5應與之互動 以便取得存取内容丨丨3的適當授權之清算所丨〇5位址。 摘要演算法識別碼-用來計算各組成部分的摘要的演 算法之識別碼。 數位簽名演算法識別碼_用來將序連的組成部分摘要 之摘要加密之一識別碼。 數位簽名-利用產生SC(s)的實體的公共金鑰加密的各 序連組成部分摘要之一摘要。 輸出部分-當將一加密的組成部分解密時指定給輸出 部分之名稱。 RSA及RC4-用來將對稱金鑰623及資料部分加密的系 統預設加密演算法。 加法、對稱金鑰-於解密時用來將一 SC(s)組成部分解密 的一加密金输位元串之一 64基編碼。 CH公共金鑰-指示清算所1〇5的公共金鑰621係用來將 資料加密之一識別碼。 E.報價安全容器物件641格式 下表示出包含在報價SC(s) 641的各組成部分。除了某些 中介貧料組成部分以外的各組成邵分、以及來自中介資料 SC(s) 620之BOM亦係包含在報價SC(s)641中。 〇_Λ85\85156 分割.DOC -68- 200304126 部分 [内容酬 [中介資獅ij 述部分 滅部分存在齡 結賴爯 加密演算法 加密金鑰 演算法 辦爯 mm 輸出部分 RC4 加密猶鱗 RSA cH^m 輸出部分 RC4 加密對f爯金鑰 RSA CH 公 SC脉 mm sc麵 sc發行人 曰期 細曰 搞要演算法識^馬 數位簽名演算法1¾蝸 内容識^馬 中介資料 SC雜 浮柳齡 述部分 清算所證明書 證明書 是 有些 是 是 是 是 是 是 是 是 是 是 是 是 否 否 輸出部分Describe the part of the encryption algorithm, the encryption algorithm, the sharp algorithm, tmm, the secret horse output, the RC4, the encryption, the RSA, the CH, the public output, and the Ren ’s age, the RSA, the SC, the SCI, and the Nama scm. Petal horse digital signature algorithm Nama content recognition ^ Intermediate data refined Niu sc model floating private part of the clearing house certificate certificate Yes Yes Yes Yes Yes Yes Yes Yes Yes No Whether to output partly encrypted Confucianism and Wei CH Common Digit Signature The term used in the SC (s) table for the above intermediary data will be explained below: [Content URL]-A parameter in a record in the key description section. This is a URL pointing to one of the encrypted content in the content SC (s) O: \ 85 \ 85156 divided .DOC -65- 200304126 630 associated with the intermediary material SC (s) 620. The intermediary data% ⑷620 itself does not contain the encrypted content 113. [Intermediary Data URL]-A parameter in a record in the description section of Jin Yu. This is a URL to one of the encrypted intermediary data in the content SC (s) 630 associated with the intermediary data SC (s) 620. The intermediary data SC (s) 620 itself does not contain the encrypted intermediary data. Internal Identifiers—Defines the components of a unique identifier assigned to a content item. If the intermediary data Sc (s) 620 is matched to more than one content 113 item, then more than one content identifier is included in the component. Intermediary Data-A component that contains information related to a content H3 item, such as the artist and CD cover image in the case of a song. There can be multiple mediation data components, and some mediation data components can be encrypted. The internal structure of the mediation data component depends on the type of mediation data it contains. Conditions of use-Components that contain information describing the usage options, rules, and restrictions that will be imposed on the use of an end user or content 113. SC (s) template-Defines the components of a template that describes the necessary and optional information for creating a quote, order, and license SC (s) 660. Watermark instruction-a component that contains the "order and parameter" used to implement the watermark in the content 丨 3. Clearing House 1 05 can modify the watermark instruction and send the watermark instruction back to its final use. The license is SC (s) 660 in the user ’s device 109. There is a record in the key description part, ΟΛ85 \ 85156 divided. DOC -66- 200304126 is used to define the encryption algorithm used to encrypt the watermark instruction. The name of the output component used to decrypt the watermark instruction, the 64-base encoding of one of the 623-bit strings of the encrypted symmetric key used to encrypt the watermark instruction, the encryption algorithm used to encrypt the symmetric key 623, and The identification code of the public key required to decrypt the symmetric key 623. Clearing House Certificate-A certificate issued by a certification center or clearing house 105 that contains the public key 621 of the clearing house 105. Possible There are more than one certificate, in which case a hierarchical structure is used, where the highest-level certificate contains the public key used to open the next-level certificate, and so on, until the lowest level is reached And the lowest-level certificate contains the public key 621 of clearing house 105. Certificate-A certificate issued by a certification authority or clearing house 105 that contains the signature of the entity that generated the SC (s) Public key 621. There may be more than one certificate, in which case a hierarchical structure is used, where the highest-level certificate contains the public key used to open the next-level certificate, and so on Until the certificate of the lowest level is reached, and the certificate of the lowest level contains the public money of the SC (s) generator 62 1. SC version-a version number assigned to the SC (s) by the SC encapsulation tool program. SC identification code-a unique identification code assigned to the SC (s) by the entity that generated the SC (s). SC type-indicates the type of the SC (s) (such as intermediary data, quotes, orders 0Λ85 \ 85156 split_DOC- 67- 200304126, etc.) sc issuer · Instructs the entity that produced Sc (s). Generation date-the date of SC (S). Expiration date-The date when SC (s) expires and is no longer valid. Liquidation All URLs-End-User Play Apps 19 5 Should Interact With For Access The proper authorized clearing house address of 丨 丨 3. Digest algorithm identification code-the identification code of the algorithm used to calculate the digest of each component. Digital signature algorithm identification code _ used to connect the sequence An identifier for the digest encryption of the component digest. Digital Signature-A digest of each sequential component digest encrypted with the public key of the entity that generated the SC (s). Output-When a cryptographic component is decrypted The name assigned to the output part. RSA and RC4- The system default encryption algorithm used to encrypt the symmetric key 623 and the data part. Additive, Symmetric Key-A 64-bit encoding of an encrypted gold input bit string used to decrypt an SC (s) component during decryption. CH Public Key-A public key 621 that indicates the clearing house 105 is an identification code used to encrypt data. E. Format of Quote Safe Container Object 641 The following table shows the components contained in the quote SC (s) 641. In addition to some components of the intermediary lean material, and the BOM from the intermediary data SC (s) 620 are also included in the quote SC (s) 641. 〇_Λ85 \ 85156 segmentation. DOC -68- 200304126 part [content reward [intermediate capital lion ij part of the extinction part of the age of 爯 爯 encryption algorithm encryption key algorithm 爯 mm output part RC4 encryption still scale RSA cH ^ m Output part RC4 encryption pair f 爯 key RSA CH public SC pulse mm sc surface sc issuer date and time to perform algorithm identification ^ horse digital signature algorithm 1 ¾ snail content identification ^ horse intermediary data SC miscellaneous willow age description part liquidation Some of the certificate certificates are yes yes yes yes yes yes yes yes no no output part

RCA 加密儒鱗 CH 公 數位簽名 SC祕 SC麵 SC發行人 曰期 _日 贼寅算法娜馬 數位簽名演算法獅馬 中介資料SCBOM 是 是 額外及柳獅立 ~ 是 是 電子數ί立内容 是 是 商店翻書 k 是 數位簽名 報價SC、喊部分 下文將說明一些用於上文所述報價SC(s) 641但先前並 未在另一 SC(s)中說明的術語: 中介資料SC(s) BOM-來自原始中介資料SC(s) 620之 BOM。報價SC(s) 641 BOM包含中介資料SC(s) 620 BOM之摘要。 O:\85\85156 分割.DOC -69- 200304126 額外及取代的欄位-被電子數位内容商店1 〇3取代的使 用條件資訊。清算所105利用所接收的SC(s)樣板確認 孩資訊’以便確定電子數位内容商店1 〇3所取代的任 何使用條件是在其授權的範圍内。 電子數位内容商店證明書-清算所1〇5利用其秘密金鑰 簽名並提供給電子數位内容商店103的證明書。最終 使用者播放應用程式195利用該證明書驗證電子數位 内答商店103是内容113的一合法配銷商。最終使用者 播放應用程式195及清算所105可利用清算所1〇5的公 共金鑰621將該證明書的簽名解密,而驗證電子數位 内容商店1〇3是一授權配銷商。最終使用者播放應用 程式195在本機保留一份其於安裝時所接收作為起始 設足的一邵分之清算所1〇5公共金鑰621。 F·交易安全容器物件640格式 下表示出包含在交易Sc(s) 640中的各組成部分、以及其 BOM與金鑰描述部分。 〃 O:\85\85156 分割.D0C 70- 200304126 喊部分 BOM 述部分 、喊部分存在麟 結絲稱 加密演算法鑛麵銳辦爯鱗 _ 加密金输演算法識別^ SC贴 scmm sc麵 sc發行人 曰期 纖曰 緻演算法鄭Μ 數位簽名演算法瓣馬 交易i娜1 是 是 輸出部分 RC4 加密儀金瑜 RSA CH 公* 是 是 輸出邵分 RC4 加密對f爯金瑜 RSA CH 公* 是 是 報價SQs) 是 是 内容献1之》 是 是 是 是 备鱗述部分 是 是 電子數位内容 ^店證a月書 是 否 數位簽名 下文將說明一些用於上文所述交易SC(s) 640但先前並 未在另一 SC(s)中說明的術語: 交易識別碼535-被電子數位内容商店103指定而唯一 識別交易之一識別碼。 最終使用者識別碼-最終使用者於進行購買選擇並提 供信用卡資訊時電子數位内容商店1 03所取得的最終 使用者指示碼。 最終使用者之公共金鑰-清算所105用來將對稱金鑰 623重新加密的最終使用者之公共金瑜661。於購買交 易時,最終使用者的公共金鑰66 1被傳送到電子數位 内容商店103。 報價SC(s)-所購買的内容113項目之報價SC(s) 641。 内容使用之選擇-最終使用者所購買的每一内容113項 目之一使用條件陣列。 O:\85\85156 分割.DOC -71 - 200304126 要顯示的HTML-於接收到交易SC(s) 640時或在最終 使用者裝置109與清算所105進行互動時最終使用者 播放應用程式195在網際網路瀏覽器視窗中顯示的一 個或多個HTML網頁。 當最終使用者裝置109接收一交易SC(s) 640時,可執行 下列步騾,以便驗證SC(s)之完整性及可信賴性: 1. 利用清算所105之公共金鑰621驗證電子數位内容商店 103證明書之完整性。在接收到清算所105的公共金鑰 621作為最終使用者播放應用程式195的安裝程序時起 始設定的一部分之後,將該公共金鑰621儲存在最終使 用者裝置109。 2. 利用來自電子數位内容商店103證明書的公共金鑰來驗 證SC(s)之數位簽名643。 3. 驗證該S C (s)各組成部分的雜亂函數。 4·驗證交易SC(s) 640中包含的每一報價SC(s) 641之完整 性及可信賴性。 G.訂單安全容器物件650格式 下表示出包含在訂單SC(s) 650中的各組成部分、以及其 BOM與金鑰描述部分。這些組成部分將資訊提供給清算所 105,以供解密及驗證之用,或由清算所105確認這些組成 部分。這些組成部分及來自報價SC(s) 641之BOM亦係包含 在訂單SC(s) 650。中介資料SC(s) BOM的組成部分存在行 中之某些字串指示該等組成部分中之某些組成部分並未包 ΟΛ85\85156 分割.DOC -72- 200304126 含在訂單SC(S) 650。亦可在不作任何改變的情形下包含來 自中介資料SC(s) 620之BOM,因而清算所105可確認中介 資料SC(s) 620及其各組成部分之完整性。 ,喊部分 [内容酬 一~ 、喊部分存在麟 [中介資伟酬 — SCfs财 SCfs湖碼 SQs麵 — SQs修行人 — 曰期 — 輸日 清獅紙 — 摘要演細瓣馬 數位簽名演置法獅Μ 内馬 _ 是 是 中介資料 — 有歧 是 綱餅 是 是 SQs麻 — 是 是 浮柳齡 是 是Π 述部分 __ 是 是 清》継月書 _ 是 否 證0月書 一 是 否 — 數佐 备名 ==r--- 報價 輸出部分 輸出部分 SC(s)、喊部分 SQs)絲 SC(s嫩鴻 述部分 結秘爯加密演算法缝·w _錄 _錄 中介資料sg輪分域鑷纖細 輸出部分 RC4 1rC4 RC4 一 SQs獅 行人 至傾月日 娜馬RCA Encrypted Confucian Scale CH Public Digital Signature SC Secret SC Face SC Issuer Date _ Japanese thief algorithm Nama digital signature algorithm lion and horse intermediary data SCBOM is additional and willow lion ~ yes electronic digital content yes yes The store flip book k is a digitally signed offer SC, and the shouting section will explain some terms used in the offer SC (s) 641 described above but not previously described in another SC (s): Intermediary information SC (s) BOM-BOM from the original intermediary data SC (s) 620. The quote SC (s) 641 BOM contains a summary of the intermediary information SC (s) 620 BOM. O: \ 85 \ 85156 Divide. DOC -69- 200304126 Extra and Replaced Fields-Usage conditions information replaced by Digital Content Store 1 03. The clearing house 105 uses the received SC (s) template to confirm the child information 'in order to determine that any conditions of use replaced by the electronic digital content store 103 are within its authorized scope. Digital Content Store Certificate-Clearing House 105 uses the secret key to sign and provide a certificate to the digital content store 103. The end-user playback application 195 uses the certificate to verify that the electronic digital answer store 103 is a legitimate distributor of the content 113. The end user playing application 195 and clearing house 105 can use the public key 621 of clearing house 105 to decrypt the signature of the certificate, and verify that the electronic digital content store 103 is an authorized distributor. The end-user playback application 195 keeps a copy of the clearing house 105 public key 621 that it received at the time of installation as a starting point. F. Transaction Security Container Object 640 Format The following table shows the components included in the transaction Sc (s) 640, and their BOM and key description sections. 〃 O: \ 85 \ 85156 segmentation. D0C 70- 200304126 The shouting part of the BOM description part and shouting part has a knot knot, which is called the encryption algorithm. The mining surface is sharply processed. _ Encryption gold algorithm identification ^ SC stickers scmm sc surface sc release People ’s day and month ’s performance algorithm Zheng M ’s digital signature algorithm ’s signature transaction i Na 1 is the output part of the RC4 encryption device Jinyu RSA CH public * Yes Yes The output of Shaofen RC4 encryption pair f 爯 金 瑜 RSA CH public * Yes Yes Quotation SQs) Yes Yes No. 1 Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Term not previously explained in another SC (s): Transaction ID 535-One of the IDs designated by the electronic digital content store 103 to uniquely identify the transaction. End-user identification code-The end-user identification code obtained by the digital content store 103 when the end-user makes a purchase selection and provides credit card information. The end user's public key-the clearing house 105 uses the end user's public key 661 to re-encrypt the symmetric key 623. At the time of the purchase transaction, the public key 661 of the end user is transmitted to the electronic digital content store 103. Quote SC (s)-Quote SC (s) 641 for item 113 purchased. Choice of content usage-An array of usage conditions for one of 113 items of content purchased by the end user. O: \ 85 \ 85156 segmentation. DOC -71-200304126 HTML to display-upon receiving SC (s) 640 of the transaction or when the end-user device 109 interacts with the clearing house 105 the end-user plays the application 195 in One or more HTML pages displayed in an Internet browser window. When the end-user device 109 receives a transaction SC (s) 640, the following steps can be performed in order to verify the integrity and reliability of the SC (s): 1. Use the public key 621 of the clearing house 105 to verify the electronic digits Content store 103 certificate integrity. After receiving the public key 621 of the clearing house 105 as part of the initial setting when the end user plays the installation program of the application 195, the public key 621 is stored in the end user device 109. 2. Use the public key from the electronic digital content store 103 certificate to verify the digital signature 643 of the SC (s). 3. Verify the chaotic functions of the components of the SC (s). 4. Verify the integrity and reliability of each quote SC (s) 641 included in the transaction SC (s) 640. G. Order Security Container Object 650 Format The following table shows the components included in the order SC (s) 650, and their BOM and key description sections. These components provide the information to clearing house 105 for decryption and verification purposes, or are confirmed by clearing house 105. These components and the BOM from the quote SC (s) 641 are also included in the order SC (s) 650. Intermediary information SC (s) BOM The existence of certain strings in the line indicates that some of these components are not divided into 0Λ85 \ 85156 segments. DOC -72- 200304126 included in the order SC (S) 650 . The BOM from the intermediary data SC (s) 620 can also be included without any change, so the clearing house 105 can confirm the integrity of the intermediary data SC (s) 620 and its components. , Shouting part [content reward one ~, shouting part exists [intermediate Ziwei reward — SCfs financial SCfs lake code SQs noodle — SQs practitioners — date — lose the Japanese lion paper — abstract play fine-petal horse digital signature method Shi M Neima _ is the intermediary information-there is a difference is the pancake is SQs hemp-is the pussy willow age is yes Π part of the description __ is the Qing》 継 月 书 _ is the certificate 0月 书 一 不 — number Name == r --- quote output part output part SC (s), shout part SQs) silk SC (s tender Hongshu part of the secret secret encryption algorithm seam · w _ 录 _ 录 Intermediate data sg wheel subdomain tweezers slim Output part RC4 1rC4 RC4 A SQs Lion Pedestrian to Sun Moon Nama

中介資料 SC(s)BOM 額外及取你娜立 電子數位内容 商店翻書 證明書Intermediary information SC (s) BOM Extra and fetch your digital content Digital store certificate

名演算法娜I 是 是 否 ΛΤ 否 O:\85\85156 分割 DOC 73- 200304126Famous algorithm Na I Yes Yes No ΛΤ No O: \ 85 \ 85156 Segmentation DOC 73- 200304126

下文將說明一些用於上文所述訂單SC(s) 650但先前並 未在另一 SC(s)中說明的術語: 交易SC(s) BOM-原始交易SC(s) 640中之BOM。訂單 SC(s) 65 0 BOM 包含交易 SC(s) 640 BOM的摘要。 加密信用卡資訊-用來將購買金額記帳到一信用卡或 借方卡的最終使用者之選用加密資訊。當產生報價 SC(s) 641的電子數位内容商店103並不處理向客戶開 立帳單時,需要該資訊,在此種情形中,清算所105 可處理向客戶開立帳單。 O:\85\85156 分割.DOC -74- 200304126 Η.授權許可安全容器物件660格式 下表示出包含在授權許可SC(s) 660之各組成部分、及其 BOM。如金鑰描述部分所示,清算所105已利用最終使用 者的公共金鑰661將浮水印指令解密所需的對稱金鑰623、 内容113、及内容113中介資料重新加密。當最終使用者裝 置109接收到授權許可SC(s) 660時,最終使用者裝置109將 對稱金鑰623解密,並利用解密後的對稱金鑰623存取授權 許可SC(s) 660及内容SC(s) 630之各加密組成部分。 域部分 BOM 述部分 、喊部分存在 撇結總爯加密演算法 跡專辦爯魏辦爯鱗 _ _加密鱗演算法娜焉 [内容_ 輸出部分 RC4 加密规嫌 RSA CH 公 [中介資糊_ 輸出部分 RC4 加密姻錄 RSA SQs)鉢 sc(s)mm SQs_ SC(s)«·行人 曰期 趣日 齡演算法娜馬 數位簽名演算法 1娜馬 内容鄭轉 是 是 綱餅 是 是 交易資料 是 是 浮柳齡 是 是1 輸出部分 RC4 加密姻魏 RSA CH 公 ^^^述部分 是 是 證0月書 是 否 數位簽名 下文將說明一些用於上文所述授權許可SC(s) 660但先 前並未在另一 SC(s)中說明的術語: 最終使用者公共金鑰-指示最終使用者的公共金鑰661 係用來將資料加密之一識別碼。 訂單SC(s) 650識別碼-自訂單SC(s) 650 BOM取得的 SC(s)識別碼。 O:\85\85156 分割.DOC -75- 200304126 證明書廢止清單-先前由清算所105發出並簽名但目前 不再有效的證明書識別碼之一可選用清單。具有一個 廢止清單中包含的一證明書可驗證的簽名之任何SC(s) 都是無效的SC(s)。最終使用者播放應用程式195將一 份清算所1 〇 5的證明書廢土清單儲存在最終使用者裝 置109。當接收到一廢止清單時,如果新的廢止清單 是更新的版本時,則最終使用者播放應用程式195以 該更新的版本取代其本機的拷貝。廢止清單包含一版 本編號或一時戳(或以上兩者),以便決定哪一份清單 是最新的。 I.内容安全容器物件格式 下表示出包含在内容SC(s) 630中的各組成部分、及 BOM :The following describes some of the terms used in the order SC (s) 650 described above but not previously described in another SC (s): Transaction SC (s) BOM-BOM in original transaction SC (s) 640. The order SC (s) 65 0 BOM contains a summary of the transaction SC (s) 640 BOM. Encrypted Credit Card Information-Optional encrypted information used by end users to bill purchases to a credit or debit card. This information is needed when the electronic digital content store 103 that generates the quote SC (s) 641 does not process billing to the customer, in which case clearing house 105 may process billing to the customer. O: \ 85 \ 85156 Division. DOC -74- 200304126 Η. Authorization Security Container Object 660 Format The following table shows the components included in the authorization SC (s) 660 and their BOM. As shown in the key description section, the clearing house 105 has re-encrypted the symmetric key 623, content 113, and content 113 intermediary data required for decrypting the watermark instruction using the public key 661 of the end user. When the end user device 109 receives the license SC (s) 660, the end user device 109 decrypts the symmetric key 623 and uses the decrypted symmetric key 623 to access the license SC (s) 660 and the content SC (s) Encrypted components of 630. The domain part of the BOM description part and the shout part have a total amount of entropy. Encryption algorithm traces are specially organized. _ Encryption scale algorithm 焉 焉 [Contents_ Output part RC4 Encryption rules suspect RSA CH Public [Intermediate information paste_ Output Part of the RC4 encryption marriage record RSA SQs) bowl sc (s) mm SQs_ SC (s) «· Pedestrian date fun age algorithm Nama digital signature algorithm 1 Nama content Yes Willow Age Yes Yes 1 Output part RC4 Encryption marriage Wei RSA CH Public ^^^ The description part is proof whether the 0 month book is digitally signed The following will explain some of the licenses SC (s) 660 described above but not previously Terminology described in another SC (s): End User Public Key-The public key 661 indicating the end user is an identifier used to encrypt data. Order SC (s) 650 ID-SC (s) ID obtained from order SC (s) 650 BOM. O: \ 85 \ 85156 Division. DOC -75- 200304126 Certificate Revocation List-One of the certificate identification codes previously issued and signed by Clearing House 105 but no longer valid is an optional list. Any SC (s) with a certificate verifiable signature included in a revocation list is invalid SC (s). The end-user playback application 195 stores a certificate waste list of the clearing house 105 in the end-user device 109. When a revocation list is received, if the new revocation list is an updated version, the end-user playback application 195 replaces its own copy with the updated version. The revocation list contains a version number or a timestamp (or both) to determine which list is up-to-date. I. Content Security Container Object Format The following table shows the components and BOM contained in content SC (s) 630:

喊部分 BOM _喊部分存在齡 [内容_ [中介資獅 SQs)鉢 SQs)娜鬲 SC(s_ SQs·亍人 &quot; 曰期 至撕曰 線斤105酿 娜寅脚娜1 數位簽名演算法卿馬 内容1跡馬 是 是 力口密的内容 是 是 加密的中介資料 是 是 中介資料 是 是 證0月書 是 否 數位簽名 下文將說明一些用於上文所述内容SC(s) 630但先前並 O:\85\85156 分割.DOC -76- 200304126 未在另一 S.C(s)中說明的術語: 加密的内容-一内容提供者101利用一對稱金鑰623加 密的内容11 3。 加密的中介資料-與内容113相關聯且係由一内容提供 者101利用一對稱金鑰623加密的中介資料。 内容SC(s)630中並未包含任何金瑜描述部分,這是因為 將加密的組成部分解密的金鑰是在清算所1 〇5上建立的授 權許可SC(s) 660中。 VI·安全容器物件的包封及打開 A.概述 SC(s)包封工具程式是一個具有一應用程式介面 (Application Programming Interface;簡稱API)的 32 位元Shouting part BOM _ Shouting part exists [Content_ [Intermediary lion SQs) Bowl SQs) Na 鬲 SC (s_ SQs · 亍 人 &quot; Date to tear line weight 105 Na Na Yin foot Na 1 Digital signature algorithm Horse content 1 Trace horse is the secret content is the encrypted intermediary information is the intermediary information is the certificate is the digital signature of the month book will be explained below for some of the content described above SC (s) 630 but previously and O: \ 85 \ 85156 split. DOC -76- 200304126 Terms not specified in another SC (s): Encrypted content-a content provider 101 encrypted content using a symmetric key 623 11 3. Encrypted intermediary Data-Intermediary data associated with content 113 and encrypted by a content provider 101 using a symmetric key 623. Content SC (s) 630 does not include any description of Jinyu because it is an encrypted component The decrypted key is in the authorization SC (s) 660 established on the clearing house 105. VI · Encapsulation and opening of the secure container object A. Overview The SC (s) encapsulation tool program is an application program Interface (Application Programming Interface; A for short) PI) 32-bit

Windows程式,可在多個或單一程序步驟中呼叫該程式, 以便產生一個具有所有指定組成部分之Sc(s)。sc(s)包封 工具程式15 :1、152、153可在各種硬體平台上支援内容提供 者101、清算所1〇5、電子數位内容商店1〇3、及需要%⑷ 包封的其他網站上支援Wind〇Ws程式。一bom及一或有的 金鑰描述邵分被產生,並被包含在SC(s)中。一組包封工具 程式API可讓呼叫的程式指定所需的資訊,以便產生b〇m 及金鑰描述部分中之記錄,並將各組成部分包含在sc⑷ 中。也是由包封工具程式執行各組成部分及對稱金鑰623 之加密、以及各摘要及數位簽名之計算。包封工具程式所 支援的加密演算法及摘要演算法係包含在包封工具程式碼 中,或係經由一外部介面而呼叫該加密演算法及摘要演算A Windows program that can be called in multiple or single process steps to produce a Sc (s) with all specified components. sc (s) encapsulation tool program 15: 1, 152, 153 can support content providers 101, clearing houses 105, electronic digital content stores 103, and others that require% ⑷ encapsulation on various hardware platforms The website supports Wind〇Ws program. A bom and a contingent key description are generated and included in SC (s). A set of encapsulation tools. The program API allows the calling program to specify the required information in order to generate records in the bmm and key description sections and include each component in sc⑷. Encryption tool program also performs encryption of each component and symmetric key 623, as well as calculation of each digest and digital signature. The encryption algorithm and digest algorithm supported by the encapsulation tool program are included in the encapsulation tool code, or the encryption algorithm and digest algorithm are called through an external interface

O:\85\85156 分割!x)C -77- 200304126 法。 一 API執行用來建立一 SC(s)的包封工具程式介面,而該 API接受下列參數作為輸入: 各序連結構的一緩衝區之一指標。該緩衝區中的每一結 構是對該包封工具程式的一命令、及執行該命令所需的 資訊。包封工具程式命令包括:將一組成部分加入具有 一相關聯的BOM記錄之SC(s)、將一記錄加入該BOM、 以及將記錄加入金鑰描述部分。 指示上述緩衝區中包含的序連結構數目之一值。 BOM組成部分之名稱及位置。 每一位元為供未來使用的一指定旗標或保留旗標之一 值。目前界定了下列的旗標: - 指示在處理了緩衝區中所有的結構之後是否應將 該SC(s)的所有組成部分結合放入單一檔案中。於建 立一 SC(s)時,將各組成部分結合成單一物件是最後 一個步驟。 - 指示是否在BOM部分中省略了數位簽名。如果該旗 標並未被設定,則在將SC(s)結合到一單一物件之 前,先計算數位簽名。 在一替代實施例中,若干API執行用來建立一 SC(s)的包 封工具程式介面,而該等API接受下列參數作為輸入: 首先呼叫一 API,以便產生一材料表(BOM)部分,其方式 為傳送一結構之指標,而該結構包含一些用來設定SC(s) 起始值的資訊,這些資訊包括SC(s) BOM部分中之IP記 O:\85\85156 分割.D0C -78- 200304126 錄、用於BOM部分的名稱、尋找將被加入的組成部分之 一系統預設位置、及一旗標值。該API送回一個用於後 續各包封工具程式API之SC(s)識別值(handle)。 該包封工具程式具有一個當將一組成部分加入一 SC(s) 時即使用之API。該API接受一先前包封工具程式API於 先前送回的一 S C (s)識別值、包含與所加入的組成邵分有 關的資訊之一結構之一指標、以及一旗標值。與所加入 的組成部分有關的資訊包括:該組成部分之名稱及位 置、用於該組成部分的BOM之名稱、所加入的該組成部 分之類型、該組成部分的一雜亂值、及旗標等。 在將所有的組成部分加入該SC(s)之後,呼叫一包封工具 程式API,以便將其中包括BOM部分的所有組成部分包 封到一單一 SC(s)物件中,而該單一 SC(s)物件通常是一 檔案。該API接受:一先前包封工具程式API於先前送回 的一 SC(s)識別值、用於經過包封的SC(s)之名稱、一個 具有用來簽認該SC(s)的資訊的一結構之指標、以及一旗 標值。 包封工具程式或呼叫包封工具程式的實體可利用一 SC(s) 樣板來建立一 SC(s)。SC(s)樣板具有用來指定正在建立的 該SC(s)中所需的各組成部分及記錄之資訊。樣板亦可指定 用於將對稱金鑰623及各加密組成部分加密的加密方法及 金输參考位置。 包封工具程式具有一個用來打開一 SC(s)之API。打開一 SC(s)即是取得一 SC(s)並將該SC(s)分開成其個別組成部分 O:\85\85156 分割.D0C -79- 200304126 之程序。然後可呼叫該包封工具程式,以便將自該SC(S) 打開的各加密組成部分解密。 B.材料表(BOM)部分 於建立一 SC(s)時,即由包封工具程式產生BOM部分。該 BOM是一文字檔,包含與該SC(s)有關的資訊、及與該SC(s) 中包含的各組成部分有關之資訊。BOM中的每一記錄是在 單一行上,而一新的行則指示一個新的記錄之開始。BOM 通常包含:每一組成部分之摘要、以及可用來確認該SC(s) 的可信賴性及完整性之一數位簽名。 一 BOM内的記錄類型係如下文所示: IP — IP記錄包含一組名稱=與SC(s)相關的數值對。下列名 稱係保留給SC(s)的一些特性: V major.minor.fix V特性指定SC(s)的版本。這是產生SC(s)時所依據的 SC(s)規格之版本編號。接續的字串應是major.minor.fix 的形式,其中major、minor、及Πχ分別是主要版本編號、 次要版本編號、及修補層級。 ID值 ID特性是是正在產生該特定SC(s)的實體指定給該SC(s) 的一特有值。該文件的一後續版本中將界定該值的格 式。 T值 該T特性指定SC(s)的類型,而此種類型應為下列所示的 其中之一: O:\85\85156 分割.D0C -80- 200304126 ORD-—訂單 SC(s) 650。 OFF-—報價 SC(s) 641。 LIC-一授權許可 SC(s) 660。 TRA-—交易 SC(s) 640。 MET-—中介資料SC(s) 620。 CON-—内容 SC(s) 630。 A值 該A特性識別SC(s)的製作者或發行人。製作者/發行人 的身分應是清楚的及(或)登錄到清算所1 〇5的。 D值 該D特性識別SC(s)產生的日期及或有的時間。該值的 形式應為yyyy/mm/dd[@hh:mm[:ss[.fsec]][(TZ)]],用以 代表年/月/日@時/分/秒/十分之一秒(時區)。該值的可 選用部分係以□字元圍住。 E值 该E特性識別SC(s)終止的日期及或有的時間。該值的形 式應#先前所界定的D特性值所用的形式相同。於可能 時’應將終止日期/時間與清算所1 〇 5中存放的日期/時 間比較。 CCURL 值 該CCURL特性識別清算所1〇5之網址。該值的形式為— 有效的外部網址。 Η值 Η特性識別用來計算SC(s)中包含的各組成部分的訊自 0:\85\85丨56 分割.DOC -81 - 200304126 摘要之演算法。 D D記錄是一種資料或組成部分資料項記錄,包含用來識 別組成邵分的類型、組成部分的名稱、組成部分的(或 有)摘要、以及該組成部分並未包含在SC(S)的一(或有) 指示。在該類型識別碼之後的一負號係用來指示該組 成部分並未包含在該SC(S)中。下列是資料或組成部分 記錄的保留類型: K part—name [digest] 指定金鑰描述部分。 C part—name [digest] 指定用來確認數位簽名之證明書。 T part—name [digest] 指定使用條件部分。 YF part—name [digest] 指定報價SC(s) 641的樣板部分。 YO part—name [digest] 指定訂單SC(s) 650的樣板部分。 YL part_name [digest] 指定授權許可SC(s) 660的樣板部分。 ID part—name [digest] 指定被查詢到的内容113項目的内容113之識別石馬。 CH part—name [digest] 指定清算所105證明書部分。 SP part—name [digest] O:\85\85156 分割.DOC -82- 200304126 指定電子數位内容商店103證明書部分。 B part_name [digest] 指定在另一 SC(s)的組成部分或組成部分的子集係包含 在該SC(s)時該另一 SC(s)之一 BOM部分。 BP part_name sc_part_name [digest] 指定在另一 SC(s)係被包含而作為該SC(s)的一單一組 成部分時該另一 SC(s)之一 BOM部分。該sc_part_name 是包含在該SC(s)中且係由該BOM部分界定的SC(s)組 成部分之名稱。與該BOM相同的一BOM亦係包含在由 該sc_part_name參數界定的SC(s)中。 D part_name [digest] 指定一資料(或中介資料)部分。 S S記錄是一個用來界定該SC(s)的數位簽名之一簽名記 錄。係亦下文所述方式規定該數位簽名: S key_identifier signature__string signature_algorithm 該S記錄包含:金鑰識別碼,用以指示該簽名之加密金 鑰;簽名位元串,該簽名字申是對數位簽名位元串之 64基編碼;以及簽名演算法,用以將摘要加密,以便 產生該數位簽名。 C.金鑰描述部分 包封工具程式產生金鑰描述部分,以便提供與將加密組 成部分解密所需的加密金鑰有關之資訊。可將加密組成部 分包含在所建立的該SC(s)中,而加密組成部分也可放在被 所建立的SC(s)參照到的其他SC(s)中。金鑰描述部分是一 O:\85\85156 分割.DOC -83 - 200304126 文字檔,包含與加密金鑰及用到加密金鑰的組成部分有關 之資訊記錄。金鑰描述部分中的每一記錄是在單行上,而 一新行則指示一個新記錄的開始。 下列記錄類型係用於一金鑰描述部分内,且係界定如 下: K encrypted』art—η 咖 e;result__partjiame;part—encryption—algorithm—identifier; public_key_identifier key_encryption_algorithm 及 encrypted_symmetric_key。 K記錄指定可包含在該SC(s)中或可包含在該記錄所參 照的另一 SC(s)中之一加密組成部分。該 encrypted_part_name是該SC(s)的一組成部分之名稱、 或指向另一 SC(s)的加密組成部分之名稱。 result_part_name是提供給解密後組成部分之名稱。 part_encryption—algorithm—identifier指示用來將該組 成部分加密的加密演算法。public_key__identifier是用 來將對稱金鑰623加密的金鑰之一識別碼。 key_encryption—algorithm—identifier才旨示用來將對稱金 鑰623加密的加密演算法。加密的對稱金鑰是對用來將 該組成部分加密的加密對稱金鑰623進行一 64基編碼。 VII.清算所105 A.概述 清算所105負責安全數位内容電子式配送系統100的權 利管理功能。清算所105的功能包括:電子數位内容商店103 的起動、對内容113權利的驗證、購買交易及相關資訊的完 O:\85\85156 分割.D0C -84 - 200304126 整性及可#賴性確認、將内容加密金鑰或對稱金鑰623配送 到最終使用者裝置109、這些金鑰配送的追蹤、以及將交易 總結回報到電子數位内容商店1〇3及内容提供者1〇1。最終 使用者裝置1 09利用内容加密金鑰將其通常由一購買交易 而自一授權電子數位内容商店1〇3取得權利的内容ιΐ3解 密。在將一内容加密金鑰傳送到一最終使用者裝置1〇9之 前,清算所105執行整個驗證程序,以便確認銷售内容ιΐ3 的實體之可信賴性、及最終使用者裝置1〇9對内容ιΐ3之權 利二上述程序要呼叫sc分析工具程式185。在某些組態中, m #所105亦可在其%所代管(c〇_i⑽如吗)一個用來執行電 子數位内谷商店1〇3的信用卡授權及開立帳單功能之系 統,而處理内容113的金融結算。;青算所H)5利用諸如 IC Verify及Taxware等的〇EM套裝軟體來處理信用卡流程 及地方營業稅。 電子數位内容商店實施例 -個想要加人安全數位内容電子式配送系統⑽成為一 内客113經銷商的電子數位内容商店1〇3向提供内容113給 安全數位内容電子式配送系統⑽的—個或多個數位内容 挺供者⑻提出要求。只要雙方達成協議,並沒有限定的提 出要求的程序。在諸如SGny、Time_w_等音樂内容所有 數位内容所有人決线電子數位内容商店⑻銷售並 13時’通常係利用電子郵件聯繫清算㈣5,要求將 =子數㈣容商W人安全數位内容電子式配送系 數位内容所有人提供電子數位内容商店1〇3的名O: \ 85 \ 85156 split! X) C -77- 200304126 method. An API is executed to create a SC (s) encapsulation tool program interface, and the API accepts the following parameters as input: an indicator of a buffer of each sequential structure. Each structure in the buffer is a command to the encapsulation tool program and the information required to execute the command. Encapsulation tool program commands include: adding a component to an SC (s) with an associated BOM record, adding a record to the BOM, and adding a record to the key description portion. One of the number of sequential structures contained in the above buffer. The name and location of the BOM component. Each bit is one of a designated or reserved flag for future use. The following flags are currently defined:-Indicates whether all components of the SC (s) should be combined into a single file after all structures in the buffer have been processed. When building an SC (s), combining the components into a single object is the last step. -Indicates whether digital signatures are omitted in the BOM section. If this flag is not set, the digital signature is calculated before SC (s) is combined into a single object. In an alternative embodiment, several APIs execute an encapsulation tool programming interface used to create an SC (s), and the APIs accept the following parameters as input: first call an API to generate a bill of materials (BOM) section The method is to send an indicator of a structure, and the structure contains some information used to set the starting value of SC (s). This information includes the IP record O: \ 85 \ 85156 division in the SC (s) BOM part. D0C- 78- 200304126 record, the name used for the BOM part, a system preset location to find one of the parts to be added, and a flag value. The API returns a SC (s) identification value (handle) for subsequent encapsulation tool APIs. The encapsulation tool has an API that is used when a component is added to a SC (s). The API accepts an S C (s) identification value previously returned by a previous encapsulation tool API, a pointer to a structure containing information related to the added composition, and a flag value. Information related to the added component includes: the name and location of the component, the name of the BOM used for the component, the type of the component added, a messy value of the component, and flags, etc. . After all the components are added to the SC (s), an encapsulation tool API is called to encapsulate all the components including the BOM part into a single SC (s) object, and the single SC (s) The object is usually a file. The API accepts: an SC (s) identification value previously returned by the previous encapsulation tool API, the name of the SC (s) to be encapsulated, and a piece of information to identify the SC (s) A structured index, and a flag value. The entity of the encapsulation tool program or the calling encapsulation tool program can use an SC (s) template to create an SC (s). The SC (s) template has information used to specify the components and records required in the SC (s) being created. The template can also specify the encryption method and gold reference position used to encrypt the symmetric key 623 and each encryption component. The encapsulation tool has an API for opening a SC (s). Opening a SC (s) is to obtain a SC (s) and divide the SC (s) into its individual components. O: \ 85 \ 85156 Divide. D0C -79- 200304126. The encapsulation tool can then be called to decrypt the encrypted components opened from the SC (S). B. BOM part When creating an SC (s), the BOM part is generated by the encapsulation tool program. The BOM is a text file containing information related to the SC (s) and information related to each component contained in the SC (s). Each record in the BOM is on a single line, and a new line indicates the beginning of a new record. The BOM usually contains a summary of each component and a digital signature that can be used to confirm the trustworthiness and integrity of the SC (s). The types of records in a BOM are as follows: IP — IP records contain a set of name = value pairs associated with SC (s). The following names are reserved for SC (s): V major.minor.fix The V attribute specifies the version of SC (s). This is the version number of the SC (s) specification on which the SC (s) was generated. Subsequent strings should be in the form of major.minor.fix, where major, minor, and Πχ are the major version number, minor version number, and patch level, respectively. ID value The ID property is a unique value assigned to the SC (s) by the entity that is generating the particular SC (s). The format of this value will be defined in a subsequent version of the document. T value This T characteristic specifies the type of SC (s), and this type should be one of the following: O: \ 85 \ 85156 Divide. D0C -80- 200304126 ORD-—Order SC (s) 650. OFF-—Quotation SC (s) 641. LIC-A license SC (s) 660. TRA-—Transaction SC (s) 640. MET-—Intermediary Information SC (s) 620. CON-—Content SC (s) 630. A value This A characteristic identifies the producer or publisher of the SC (s). The identity of the producer / issuer should be clear and / or registered in the clearing house 105. D value This D characteristic identifies the date and contingent time that SC (s) was generated. The value should be in the form yyyy / mm / dd [@hh: mm [: ss [.fsec]] [(TZ)]], which is used to represent the year / month / day @ hour / minute / second / tenth Second (time zone). The optional part of the value is enclosed by □ characters. E-value This E-characteristic identifies the date and contingent time when SC (s) ends. The value should be in the same form as the D characteristic value previously defined. Where possible, 'the end date / time should be compared to the date / time deposited in the clearing house 105. CCURL value This CCURL feature identifies the URL of the clearing house 105. The value has the form — a valid external URL. Threshold value The feature identification algorithm is used to calculate the algorithm of each component contained in SC (s) from 0: \ 85 \ 85 丨 56 segmentation. DOC -81-200304126 Abstract. A DD record is a type of data or component data item record that contains the type used to identify the component, the name of the component, the (or contingent) summary of the component, and a component that is not included in the SC (S). (Or yes) instructions. A minus sign after the type identifier is used to indicate that the component is not included in the SC (S). The following are the retention types for data or component records: K part—name [digest] Specifies the key description part. C part—name [digest] Specifies the certificate used to confirm the digital signature. T part—name [digest] specifies the use condition part. YF part—name [digest] Specifies the template part of the quote SC (s) 641. YO part—name [digest] Specifies the sample part of order SC (s) 650. YL part_name [digest] Specifies the model part of the license SC (s) 660. ID part—name [digest] Specifies the identified stone horse of the content 113 of the content 113 item being queried. CH part—name [digest] Specifies the clearing house 105 certificate part. SP part—name [digest] O: \ 85 \ 85156 Divide .DOC -82- 200304126 Specify the digital certificate store 103 certificate part. B part_name [digest] specifies that when a component or a subset of a component of another SC (s) is included in the SC (s), one BOM part of the other SC (s). BP part_name sc_part_name [digest] specifies a BOM part of another SC (s) when another SC (s) is included as a single component of the SC (s). The sc_part_name is the name of the SC (s) component contained in the SC (s) and defined by the BOM part. A BOM identical to the BOM is also included in the SC (s) defined by the sc_part_name parameter. D part_name [digest] specifies a piece of data (or intermediary data). The S S record is a signature record that is one of the digital signatures that define the SC (s). The digital signature is also specified in the following manner: S key_identifier signature__string signature_algorithm The S record contains: a key identifier, which indicates the encryption key of the signature; a signature bit string, the signature word is a logarithmic signature bit 64-base encoding of the string; and a signature algorithm to encrypt the digest to generate the digital signature. C. Key description part The encapsulation tool program generates a key description part in order to provide information about the encryption key required to decrypt the encryption component. The encrypted component can be included in the SC (s) established, and the encrypted component can also be placed in other SC (s) referenced by the established SC (s). The key description part is an O: \ 85 \ 85156 split. DOC -83-200304126 text file, which contains a record of information related to the encryption key and the components that use the encryption key. Each record in the key description section is on a single line, and a new line indicates the start of a new record. The following record types are used in a key description part and are defined as follows: K encrypted ”art—η coffee e; result__partjiame; part—encryption—algorithm—identifier; public_key_identifier key_encryption_algorithm and encrypted_symmetric_key. The K record specifies an encryption component that can be included in the SC (s) or in another SC (s) to which the record refers. The encrypted_part_name is the name of a component of the SC (s) or the name of an encrypted component that points to another SC (s). result_part_name is the name provided to the decrypted part. part_encryption_algorithm_identifier indicates the encryption algorithm used to partially encrypt the component. public_key__identifier is one of the keys used to encrypt the symmetric key 623. key_encryption_algorithm_identifier indicates the encryption algorithm used to encrypt the symmetric key 623. The encrypted symmetric key is a 64-based encoding of the encrypted symmetric key 623 used to encrypt the component. VII. Clearing House 105 A. Overview The clearing house 105 is responsible for the rights management functions of the secure digital content electronic distribution system 100. The functions of the clearing house 105 include the launch of the electronic digital content store 103, the verification of the rights to the content 113, the completion of the purchase transaction and related information, and the O: \ 85 \ 85156 division. D0C -84-200304126 integrity and availability confirmation , Delivering the content encryption key or symmetric key 623 to the end-user device 109, tracking the distribution of these keys, and returning the transaction summary to the electronic digital content store 103 and the content provider 101. The end-user device 109 uses the content encryption key to decrypt the content, which is usually obtained from an authorized electronic digital content store 103 by a purchase transaction. Before transmitting a content encryption key to an end-user device 109, the clearing house 105 performs the entire verification process to confirm the trustworthiness of the entity that sells the content ιΐ3 and the end-user device 109 to the content ιΐ3 The second right is to call the sc analysis tool program 185. In some configurations, m # 所 105 can also be hosted in its% (c0_i?) Is a system used to perform credit card authorization and billing functions of the electronic digital Utani store 103 While processing financial settlement of content 113. HYPC5) uses OEM software packages such as IC Verify and Taxware to process credit card processes and local business taxes. Example of an electronic digital content store-An electronic digital content store that wants to add a secure digital content electronic distribution system (becomes an internal customer 113 dealer) 103 provides content 113 to the secure digital content electronic distribution system "- One or more digital content providers are asking for it. As long as the two parties reach an agreement, there is no defined procedure for requesting it. All digital content owners such as SGny, Time_w_ and other digital content owners have finalized their electronic digital content stores. When it is sold, at 13 o'clock, it is usually cleared by email contact.5, it is required to set the value of the digital content of the digital content to the digital content of the merchant. Distribution factor Content owner Provides name of electronic digital content store 103

O:\85\85156 分割.D0C -85- 200304126 稱、以及清算所1 〇5可能需要用來產生該電子數位内容商店 103的數位證明書之任何其他資訊。以一種安全的方式將該 數位證明書傳送到該數位内容所有人,該數位内容所有人 然後將該數位證明書傳送到該電子數位内容商店1〇3。清算 所105維護其已指定的數位證明書之一資料庫。每一證明書 包含:一版本編號、一特有序號、簽名演算法、發出者的 名稱(清算所105的名稱)、該證明書的有效日期範圍、電子 數位内各商店1 〇3的名稱、電子數位内容商店丨的公共金 鑰、以及利用清算所丨〇 5的秘密金鑰簽認的所有其他資訊之 庫亂碼。具有清异所1 05的公共金输621之各實體可確認 該證明書,然後保證一個具有一可利用證明書的公共金鑰 確認的簽名之SC(s)是一有效的sc(s)。 在私子數位内容商店1 〇3自數位内容所有人接收到清算 所105為其產生的數位證明書、及用來處理SC(s)的必要工 /、程式之後,即可開始提供最終使用者可購買的内容Η 3 之報價。電子數位内容商店1〇3在交易Sc(s) 64〇中加入其 證明書,並利用其數位簽名643簽認該Sc(s)。最終使用者 裝置109首先檢查數位證明書廢止清單,然後利用清算所 1 〇5的么共金鑰621來驗證電子數位内容商店i 〇3的數位證 明書中之資訊,而驗證該電子數位内容商店1〇3是安全數位 内谷電子式配送系統1〇〇上的内容113之一有效配銷商。清 才所105維濩數位證明書廢止清單。可將該廢止清單包含 在清异所105產生的一授權許可SC⑷660中,作為該SC(s) 的一個組成部分。最終使用者裝置⑽保留-份廢止清單,O: \ 85 \ 85156 division. D0C -85- 200304126 claim, and any other information that the clearing house 105 may need to generate the digital certificate for the electronic digital content store 103. The digital certificate is transmitted to the digital content owner in a secure manner, and the digital content owner then transmits the digital certificate to the electronic digital content store 103. The clearing house 105 maintains a database of one of its designated digital certificates. Each certificate contains: a version number, a unique serial number, a signature algorithm, the name of the issuer (name of clearing house 105), the valid date range of the certificate, the name of each store in the electronic digits, electronic A garbled library of digital content stores' public keys and all other information signed with the clearing house's secret key. Each entity with the public gold loser 621 of the Foreign Affairs Office 105 can confirm the certificate, and then guarantee that a signed SC (s) with a public key confirmable with a certificate is a valid sc (s). After the private digital content store 1 03 receives the digital certificate generated by the clearing house 105 and the necessary labor / programs for processing SC (s) from the digital content owner, it can begin to provide end users. Available content: 3 quotes. The electronic digital content store 103 adds its certificate to the transaction Sc (s) 64 and uses its digital signature 643 to sign the Sc (s). The end-user device 109 first checks the digital certificate revocation list, and then uses the common key 621 of the clearing house 105 to verify the information in the digital certificate of the electronic digital content store i 〇3 and verify the electronic digital content store 103 is one of the effective distributors of the content 113 on the secure digital Neigu electronic distribution system 100. List of revocation of 105-dimensional digital certificate of Qingcai Institute. The revocation list may be included in an authorization SC⑷660 generated by the alienation 105 as an integral part of the SC (s). End-user devices do not maintain a revocation list,

O:\85\85156 ^flJ.DOC -86 - 200304126 因而可利用該廢止清單作為電子數位内容商店1〇3數位證 明書確認的一部分。當最終使用者裝置1〇9接收一授權許可 SC(s) 660時’即決定該sc(s)中是否包含一新的廢止清單, 如果確係如此,則更新最終使用者裝置1 〇 9上的本機儲存之 廢止清單。 B ·權利管理程序 報價SC(s)分析 一最終使用者自電子數位内容商店1〇3接收到包含報價 SC(s) 641的交易sc(s) 64〇之後,清算所105自該最終使用 者接收一訂單SC(s) 650。訂單sc(s)65〇包含:若干包含與 内容113及其使用相關的資說之組成部分、與銷售内容113 的電子數位内容商店1 〇3有關之資訊、以及與購買内容丨j 3 的最終使用者有關之資訊。在清算所1〇5開始處理訂單Sc(s) 650中的資訊之前,清算所ι〇5先執行某些程序,以便確保 sc⑷是事實上有效的且並未以任何方式篡改該sc⑷包含 的資料。 確認 ' 清算所105驗證數位簽名而開始訂單SC(s) 650的確認, 清算所105然後驗證訂單SC(S) 650各組成部分的完整性。 為了確認數位簽名,在有簽名的情形下,清算所1 〇5首先利 用所包含的簽認實體之公共金鑰66丨將該簽名本身的内容 63 1解密。(該簽認實體可以是内容提供者丨〇丨、電子數位内 容商店103、取終使用者裝置1〇9、或上述各組成部分的任 何組合。)清算所105然後計算該SC(s)的各序連組成部分摘 O:\85\85156 分割.DOC -87- 200304126 要之摘要,並將所計算出的該摘要與該數位簽名的解密後 内容113比較。如果這兩個值相符,則該數位簽名是有效 的。為了驗證每一組成部分的完整性,清算所1〇5計算該組 成邯分的摘要,並將所計算出的該摘要與B〇M中的數位值 比較。清算所105遵循相同的程序來驗證訂單Sc(s) 65〇内 包含的中介資料及報價SC(s) 641部分的數位簽名及組成 部分之完整性。 交易及報價SC(s) 641數位簽名的驗證程序也間接地驗 證電子數位内容商店103係為安全數位内容電子式配送系 統100所授權。上述程序係基於清算所i 〇5是證明書的發出 者。此外,清算所1〇5亦可利用電子數位内容商店1〇3的公 共金鑰而成功地驗證交易SC(s) 640及報價SC(s) 641之數 位簽名,但是只有在簽認該SC(s)的實體具有相關聯的秘密 金鑰之所有權時,才能如此進行。請注意,清算所1〇5並不 需要設有電子數位内容商店1〇3的本機資料庫,這是因為該 商店係利用清算所的公共金鑰來簽認交易Sc(s) 640及報 價SC(s) 641之公共金瑜。 清异所10 5然後確認最終使用者購買的内容113之商店 使用條件519,以便確保該商店使用條件519係包含在中介 資料SC(s) 620中設定的限制之内。如前文所述,中介資料 SC(s) 620係包含在訂單sc(s) 650之内。 金输處理 在成功地完成訂單SC(s) 650的可信賴性及完整性檢 查、電子數位内容商店103的確認、以及商店使用條件519 ΟΛ85\85156 分割.DOC -88- 200304126 的確認之後,清算所105執行加密後對稱金鑰623及浮水印 指令之處理。可單SC(s) 650的中介資料sc(s) 620部分通常 具有數個對稱金鑰623,而這些對稱金鑰623係位於利用清 算所105的公共金鑰621加密之金鑰描述部分。於產生中介 資料SC(S) 620時,内容提供者101執行對稱金鑰623之加 密。 一個對稱金鑰623係用來將浮水印指令解密,且其他的 對稱金输係用來將内容113及任何加密的中介資料解密。内 容113可代表單一首歌曲或一CD上的所有歌曲,所以不同 的對稱金鑰623可用於每一首歌曲。浮水印指令係包含在訂 單SC(s) 650中的中介資料SC(s) 620部分内。内容113及加 密後中介資料是存放在代管内容網站i丨丨上的内容Sc(s) 630中。内容SC(s) 630内的加密後内容113及中介資料部分 之網址及組成部分名稱係包含在訂單Sc(s) 65〇的中介資 料SC(s) 620邵分之金鑰描述部分。清算所ι〇5利用其祕密 金鑰將對稱金鑰623解密,然後利用最終使用者裝置1〇9的 么共金鑰661將母一該等對稱金鑰加密。係自訂單sc(s) 65 0擴取最終使用者裝置丨〇9之公共金鑰661。新加密的對稱 金鑰623係包含在清算所1〇5送回到最終使用者裝置1〇9的 授權許可SC(s) 660之金鑰描述部分。 在處理對稱金鑰623的這段時間中,清算所1〇5可能想要 修改浮水印指令。如果發生此種情形,則在清算所1〇5將對 稱金鑰623解密之後,將浮水印指令修改並重新加密。新的 净水印指令被包含在傳送回最終使用者裝置1〇9的授權許 O:\85\85156 分割.D0C -89 - 200304126 可SC(s) 66.0内,作為#sc⑷的—個組成部分。 如果杈權許可SC(s) 660的所有處理都是成功的,則清算 所105將一授權許可Sc(s) 66〇送回到最終使用者裝置 1〇9。最終使用者裝置1〇9利用授權許可sc(s)66〇資訊下載 内谷SC(s) 630,並存取加密的内容113及中介資料。最終 使用者裝置1 09亦執行浮水印指令。 如果清算所105無法成功地處理訂單SC(s) 650,則將一 HTML、、’罔頁送回到最終使用者裝置丨〇9,並在網際網路瀏覽 器視窗中顯示該HTML網頁。該HTML網頁指示清算所1〇5 無法處理該交易的原因。 在替代貫施例中,如果使用者在内容113銷售所設定 的發行日之前,已購買了該内容113的一份拷貝,則傳送回 不具有對稱金鑰623之授權許可Sc(s) 66〇。在發行日當天 或發行日之後,將授權許可SC(s) 660傳送回清算所1〇5, 以便接收對稱金鑰623。舉例而言,内容提供者ι〇ι可讓使 用者在一首新歌的發行日之前先下載該首新歌,讓使用者 在内容提供者1〇1設定的發行日之前可先下載該歌曲,並準 備好播放該歌曲。此種方式可在發行日立即該起内容⑴, 而典肩在發行日為頻寬及下載時間而煩惱。 c_特定國家參數 清算所1 〇 5可選擇使用最終使用者裝置10 9的網域名稱 及(或有的)信用卡帳單開立地址來決定最終使用者的國家 位置。如果該最終使用者所居住的國家對内容113的销售有 任何限制’則清算所1G5在將授權許可sg(s) 送到最O: \ 85 \ 85156 ^ flJ.DOC -86-200304126 Therefore, the revocation list can be used as part of the confirmation of the digital certificate of the electronic digital content store 103. When the end-user device 109 receives a license SC (s) 660 ', it is determined whether the sc (s) contains a new revocation list, and if so, it is updated on the end-user device 10 Revocation list for local storage. B. Rights Management Program Quotation SC (s) Analysis-After the end user receives a transaction sc (s) 64 from the electronic digital content store 103 including the quote SC (s) 641, the clearing house 105 clears the transaction from the end user. Receive an order SC (s) 650. The order sc (s) 65〇 contains: a number of components including information related to the content 113 and its use, information related to the sales of the digital digital content store 1 03 of the content 113, and the final purchase of the content 丨 j 3 Information about users. Before the clearing house 105 begins to process the information in the order Sc (s) 650, the clearing house 005 performs certain procedures to ensure that the sc⑷ is in fact valid and has not tampered with the information contained in the sc⑷ . Confirmation 'Clearing house 105 verifies the digital signature and begins the confirmation of order SC (s) 650. Clearing house 105 then verifies the integrity of each component of order SC (S) 650. In order to confirm the digital signature, if there is a signature, the clearing house 105 first uses the public key 66 of the signed entity to decrypt the content of the signature itself 63 1. (The signing entity may be a content provider 丨 〇 丨, an electronic digital content store 103, an end-user device 109, or any combination of the above.) The clearinghouse 105 then calculates the SC (s) Each sequence component extracts O: \ 85 \ 85156 segmentation. DOC -87- 200304126 abstract, and compares the calculated digest with the decrypted content 113 of the digital signature. If the two values match, the digital signature is valid. In order to verify the integrity of each component, the clearing house 105 calculates a summary of the composition and compares the calculated summary with the digital value in the BOM. The clearing house 105 follows the same procedure to verify the integrity of the digital signatures and components of the intermediary information and quotation SC (s) 641 contained in the order Sc (s) 65. The transaction and quotation SC (s) 641 digital signature verification procedure also indirectly verifies that the electronic digital content store 103 is authorized by the secure digital content electronic distribution system 100. The above procedure is based on the clearing house i 05 as the issuer of the certificate. In addition, the clearing house 105 can also successfully verify the digital signatures of transaction SC (s) 640 and quoted SC (s) 641 by using the public key of electronic digital content store 103, but only when the SC (s) 641 is signed s) can only do so when the entity has ownership of the associated secret key. Please note that the clearing house 105 does not need to have a local database of the electronic digital content store 103, because this store uses the public key of the clearing house to sign the transaction Sc (s) 640 and quote SC (s) 641 Public Kim Yu. Qingyi 10 5 then confirms the store use conditions 519 of the content 113 purchased by the end user, so as to ensure that the store use conditions 519 are included within the limits set in the intermediary data SC (s) 620. As mentioned earlier, the intermediary information SC (s) 620 is included in the order sc (s) 650. The gold loss processing was completed after the order SC (s) 650 was successfully checked for reliability and completeness, the confirmation of the electronic digital content store 103, and the use conditions of the store 519 ΟΛ85 \ 85156. DOC -88- 200304126 The 105 performs processing of the encrypted symmetric key 623 and the watermark instruction. The SC (s) 620 part of the SC (s) 650 can usually have several symmetric keys 623, and these symmetric keys 623 are located in the key description part encrypted by the public key 621 of the clearing house 105. When the intermediary data SC (S) 620 is generated, the content provider 101 performs encryption of the symmetric key 623. One symmetric key 623 is used to decrypt the watermark instruction, and the other symmetric key is used to decrypt the content 113 and any encrypted intermediary data. Content 113 can represent a single song or all songs on a CD, so different symmetric keys 623 can be used for each song. The watermark instruction is included in the SC (s) 620 part of the intermediary information in the order SC (s) 650. The content 113 and the encrypted intermediary data are stored in the content Sc (s) 630 on the hosted content website i 丨 丨. The URL and component names of the encrypted content 113 and the intermediary data part in the content SC (s) 630 are included in the key description part of the intermediary data SC (s) 620 in the order Sc (s) 650. The clearing house ι05 uses its secret key to decrypt the symmetric key 623, and then uses the common key 661 of the end-user device 109 to encrypt the parent symmetric key. From the order sc (s) 650, the public key 661 of the end-user device 9 is obtained. The newly encrypted symmetric key 623 is included in the key description part of the license SC (s) 660 that the clearing house 105 returns to the end-user device 1009. During the processing of the symmetric key 623, the clearing house 105 may want to modify the watermark instruction. If this happens, after the clearing house 105 decrypts the symmetrical key 623, the watermark instruction is modified and re-encrypted. The new watermark instruction is included in the license license O: \ 85 \ 85156 transmitted back to the end-user device 10.9. D0C -89-200304126 can be included in SC (s) 66.0 as a component of # sc⑷ . If all processing of the license SC (s) 660 is successful, the clearinghouse 105 returns a license Sc (s) 66 to the end-user device 109. The end-user device 10 downloads Uchiya SC (s) 630 with a license sc (s) 66, and accesses encrypted content 113 and intermediary data. The end-user device 109 also executes the watermark instruction. If the clearing house 105 is unable to successfully process the order SC (s) 650, an HTML page is sent back to the end-user device and the HTML page is displayed in an Internet browser window. The HTML page indicates why Clearing House 105 was unable to process the transaction. In an alternative embodiment, if the user has purchased a copy of the content 113 before the release date set for the sale of the content 113, the authorization license Sc (s) 66 without the symmetric key 623 is transmitted back. . On or after the issue date, the authorization SC (s) 660 is transmitted back to the clearing house 105 to receive the symmetric key 623. For example, the content provider ιιι allows users to download a new song before the release date of a new song, allowing users to download the song before the release date set by the content provider 101, and Ready to play the song. In this way, the content should start immediately on the release date, and the code shoulder is troubled by the bandwidth and download time on the release date. c_ country-specific parameters Clearing House 105 may choose to use the domain name of the end-user device 10 9 and / or the credit card billing address to determine the country location of the end-user. If there are any restrictions on the sales of Content 113 in the country where the end user lives, then Clearing House 1G5 will send the authorized license sg (s) to the most

O:\85\85156 分割.DOC -90- 200304126 =使用者裝置109之前,先確保所處理的交易並未達反任何 m制。也希望電子數位内容商店1()3執行與清算所⑽ 相同的核查’而加入將内容! 13 g己送到各國家的管理。如果 =子數位内容商店103並未顧及内容提供者ι〇ι所設定的特 足國冢規則’則清算所1G5執行其所能執行的所有檢查。 D·稽核記錄及追蹤 清算所1G5針對於内容113購買交易及報告要求交易期 間所執行的每一作業維護這些作業的資訊之一稽核記錄 150。該資訊可用於諸如安全數位内容電子式配送系統⑽ 之稽核、報告的產生、及資料採擷(dau 等的多種 用途。 清异所105也為電子數位内容商店1〇3維護帳單開立子 系統182中的帳戶餘額。數位内容所有人將電子數位内容商 店1〇3的定價結構提供給清算所1〇5。該資訊可包括電子數 位内容商店103必須接受的現行特價、量販折扣、及帳戶不 足頜限制等的資訊。清算所丨〇5利用該定價資訊來追蹤電子 數位内谷商店1 〇 3的帳戶餘額,並確保這些帳戶餘額不會超 過内客提供者1 〇 1所設定的不足額限制。 清算所105通常記錄下列的作業·· 最終使用者裝置1 〇9對授權許可sc(s)66〇的要求 當清算所105處理帳單開立時的信用卡授權號碼 將授權許可SC(s) 660傳送到最終使用者裝置1〇9 對報告的要求 最終使用者通知内容Sc(s) 63〇及授權許可Sc(s) 66〇O: \ 85 \ 85156 Divide.DOC -90- 200304126 = Before user device 109, make sure that the transaction being processed does not meet any M system. It is also hoped that the electronic digital content store 1 () 3 will perform the same inspection as the clearing house 而 and join to send content! 13 g has been sent to the management of each country. If the sub-digital content store 103 does not take into account special country rules set by the content provider, the clearing house 1G5 performs all checks it can perform. D. Audit records and tracking Clearing House 1G5 maintains an audit record 150 of information on these operations for each operation performed during the content 113 purchase transaction and reporting request transaction period. This information can be used for a variety of purposes such as auditing of secure digital content electronic distribution systems, report generation, and data extraction (dau, etc.). Qingyi 105 also maintains a billing subsystem for electronic digital content stores 103. Account balance in 182. The digital content owner provided the pricing structure of the digital content store 103 to the clearing house 105. This information may include current specials that the digital content store 103 must accept, volume discounts, and insufficient account Jaw limits, etc. Clearing House 丨 〇5 uses this pricing information to track the account balances of electronic digital Utani Stores 103 and to ensure that these account balances do not exceed the shortfall limits set by the domestic customer provider 101 Clearing house 105 usually records the following operations: · End-user device 1 009 request for authorization permission sc (s) 66〇 The credit card authorization number when clearing house 105 handles billing will authorize permission SC (s) 660 Transmission to end-user device 10 Request for report End-user notification content Sc (s) 63〇 and license Sc (s) 66〇

O:\85\85156 分割 DOC -91 - 200304126 已接收到且已確認 ’目开所1〇5通$針對一授權許可Sc(s) 66〇記錄下列資 訊: 要求的日期及時間 購買交易的日期及時間 所購買項目之内容識別碼 内容提供者1 0 1之識別碼 商店使用條件5 1 9 浮水印指令修改 私子數位内谷商店1〇3所加入的交易識別碼535 電子數位内容商店1〇3之識別碼 最終使用者裝置1〇9之識別碼 取終使用者的信用卡資訊(在清算所1〇5處理帳單開立 的情形下) 清异所105通常針對最終使用者信用卡的確認而記錄下 列資訊: 要求的日期及時間 向信用卡收費的金額 所購買項目之内容識別碼 電子數位内容商店103所加入的交易識別碼535 電子數位内容商店1 03之識別碼 最終使用者之識別碼 最終使用者的信用卡資訊 自信用卡清算銀行接收的授權號碼O: \ 85 \ 85156 Segmented DOC -91-200304126 has been received and confirmed that the 'opening of the project' 105 yuan for a license Sc (s) 66〇 records the following information: the date and time of the purchase transaction Content ID of the item purchased at the time and content ID of the content provider 1 0 1 Store use conditions 5 1 9 The watermark instruction modifies the transaction ID 535 added by the private digital store Uchigu store 013 Electronic digital content store 1 The identification code of 3 The end-user device's 10-9 identification code obtains the end-user's credit card information (in the case that the clearing house 105 processes the billing process) Record the following information: The requested date and time The amount charged to the credit card Content ID of the purchased item Electronic ID Content Store 103 Transaction ID ID 535 Digital ID Store 1 03 ID End User ID End Use Authorization number received from credit card clearing bank

O:\85\85156 分割.DOC -92-O: \ 85 \ 85156 split. DOC -92-

^UUJUH-IZO 當將一授權許可sc⑷660傳 時,、、主嘗^ , &amp;到取終使用者裝置109 、/目斤所1 〇5通常記錄下列資訊: 要求的日期及時間 所購買項目之内容識別碼 内容提供者1 〇 1之識別碼 使用條件5 1 7 电于数位内容商店1〇3所加入 j人易滅別碼5 3 黾子數位内容商店103之識別碼 通常記錄下列資訊 最終使用者之識別碼 當提出對一報告的要求時 要求的日期及時間 傳送出報告的日期及時間 所要求的報告之類型 用來產生報告之參數 要求報告的實體之識別碼 E.結果回報 开所1G5利用其在最終使用者購f交易期間所記錄的 資訊來產生報告。内容提供者⑻及電子數位内容商店ι〇3 可經由-付款驗證介面183向清算所⑽要求交易報告,因 =以上兩者可使其本身的交易資料庫與清算所iq5記錄的 資訊-致。清算所10 5村將定期的報告提供給内容提供者 101及電子數位内容商店1〇3。 清算所H)5界定-安全電子介面,可讓内容提供者⑻及 電子數位内容商店1〇3要求及接收報告。報告要求sc(s)&amp; O:\85\85156 分割.DOC -93 - 200304126 含一個由清算所105指定給提出要求的實體之證明書。清算 所105利用該證明書及該%的數位簽名來驗證該要求係自 技權只fa發出。該要求亦包含諸如界定報告的範園的持 續時間等之參數。清算所1〇5確認該等要求參數,以便確保 提出要求者只能接收其容許持有的資訊。 如果清算所105決定報告要求SC⑷是可信賴性的及有效 的,則清异所1 〇5產生一報告,並將該報告包封到一報告 SC(s),以便傳送到提出該要求的實體。可以自動的方式在 指疋的時間間隔產生某些報告,並將這些報告儲存在清算 所105,因而在接收到一要求時,可立即傳送該等報告。在 本文件的後續版本將指定報告中資料的格式。 F ·帳早開立及付款驗證 清算所1〇5或電子數位内容商店103可處理内容113的帳 單開立。在清算所105處理電子内容113的帳單開立之情形 中笔子數位内容商店1 〇 3將最終使用者的訂單分成電子式 商即、及(或有的)貫體商品。電子數位内容商店i 〇3然後將 其中包括最終使用者的帳單開立資訊及需要得到授權的總 金額的交易資訊通知清算所105。清算所1〇5授權該最終使 用者的信用卡,並將一通知送回到電子數位内容商店1〇3。 在清算所105對該最終使用者的信用卡授權的同時,電子數 位内容商店1 03可對所購買的任何實體商品向該最終使用 者的信用卡收費。在最終使用者裝置1〇9下載某一電子項目 之後,即通知清算所105,而可向該最終使用者的信用卡收 費。上述步騾即是可在最終使用者裝置1〇9上使用内容113 O:\85\85156 分割.DOC -94- 200304126 足前由最終使用者裝置109所執行的最後一步騾。 在甩子數位内容商店丨〇3處理内容〗丨3的帳單開立之情 形中,在最終使用者裝置109將訂單sc⑷65〇傳送到清算θ 所1〇5&lt;則,並不將與交易有關的資訊通知清算所1 。在 :載每-電子项目之後,仍然由最終使用者裝置⑽通知清 算所105。當清算所1()5收到通知之後,清算所⑽將一通知 傳适到電子數位内容商店1G3,使電子數位内容商店⑻可 向該最終使用者的信用卡收費。 G_重新傳輸 安全數位内容電子式配送系統100提供用來處理内容 ^的重新傳輸之能力。通常係由—客戶服務介面184執行 “匕力甩子數位内容商店1〇3 一使用者介面,而最終使用 °依’、、、S使用者介面的指引而起動—重新傳輸。最終使 用者連線到購買内容113的電子數位内容商店顧罔站,以 便要求内容113的重新傳輸。 當最終使用者因無法下載内容113或無法使用先前下載 的内容⑴,而對一先前購買的内容ιΐ3項目要求一份新的 拷曰即執行内容113的重新傳輸。電子數位内容商店ι〇3 — 最、’、使用者是否有資格進行内容1 1 3的一重新傳 輸。:果該最終使用者有資格進行一重新傳輸,則電子數 人合商店103建互一叉易Sc(s) 64〇,該交易sc(s) 6她 :所要重新傳輸的内容113項目之報價sc⑷641。將該交 ()640傳运到取終使用者裳置⑽,且由該最終使用 .仃與-購買交易相同的各步驟。如果對於要進行重新^ UUJUH-IZO When transmitting an authorization license sc⑷660, the master and the master ^, &amp; to the end-user device 109, / 目 目 所 105 generally record the following information: The date and time of the purchase of the requested item Content Identification Code Content Provider 1 〇1 Identification code use conditions 5 1 7 Electricity added to the digital content store 1 03 Add a j-permanent identification code 5 3 Xunzi Digital content store 103 The identification code usually records the following information for final use When the request for a report is made, the date and time of the report are requested. The date and time of the report are transmitted. The type of report requested. The parameter used to generate the report. Generates reports using information recorded during end-user purchase transactions. Content providers and electronic digital content stores can request transaction reports from the clearing house through the payment verification interface 183, because the above two can bring their own transaction database and the information recorded by the clearing house iq5. Clearing House 105 Village provides regular reports to content providers 101 and electronic digital content stores 103. Clearing House H5) Definition-A secure electronic interface that allows content providers and electronic digital content stores to request and receive reports. The report requires sc (s) &amp; O: \ 85 \ 85156 split. DOC -93-200304126 contains a certificate designated by clearing house 105 to the requesting entity. The clearing house 105 uses the certificate and the digital signature of the% to verify that the request was issued from the technical right. The requirement also includes parameters such as defining the duration of the reporting park. Clearing House 105 confirms these required parameters to ensure that the requester can only receive information that it is allowed to hold. If the clearing house 105 decides that the report request SC⑷ is trustworthy and valid, the clearing house 105 generates a report and encapsulates the report into a report SC (s) for transmission to the entity making the request . Certain reports can be generated automatically at fingertip intervals and stored in clearing house 105 so that they can be transmitted immediately upon receipt of a request. The format of the information in the report will be specified in subsequent editions of this document. F. Early account issuance and payment verification Clearing house 105 or electronic digital content store 103 can process billing of content 113. In the case where the clearing house 105 processes the billing of the electronic content 113, the pen digital content store 103 divides the end-user's order into electronic merchants, and (or some) continuous products. The electronic digital content store i 03 then notifies the clearing house 105 which includes billing information for the end user and transaction information for the total amount that needs to be authorized. The clearing house 105 authorizes the credit card of the end user and sends a notice back to the electronic digital content store 103. While the clearing house 105 authorizes the credit card of the end user, the electronic digital content store 103 may charge the credit card of the end user for any physical goods purchased. After an end user device 109 downloads an electronic item, the clearing house 105 is notified and the end user's credit card can be charged. The above step is the last step that can be performed by the end user device 109 using the content 113 O: \ 85 \ 85156 segmentation on the end user device 109. DOC -94- 200304126. In the case of the billing of digital content store 丨 〇3 processing content 〖丨 3, the end user device 109 transmits the order sc ⑷ 65 to the clearing θ office 105, and will not be related to the transaction Clearing House Information 1. After the electronic items are loaded, the clearing house 105 is still notified by the end-user device. When the clearing house 1 () 5 receives the notification, the clearing house transmits a notification to the electronic digital content store 1G3, so that the electronic digital content store can charge the credit card of the end user. G_Retransmission The secure digital content electronic distribution system 100 provides the ability to handle retransmission of content. It is usually performed by the customer service interface 184 "the digital content store 103 user interface, and the final use is activated according to the instructions of the user interface-retransmission. The end user connects Go to the electronic digital content store Guzhan to purchase content 113 in order to request the retransmission of content 113. When the end user cannot download content 113 or cannot use previously downloaded content, an item purchased previously requires 3 items. A new copy means re-transmission of content 113. Electronic Digital Content Store ι03—most, ', whether the user is eligible for a re-transmission of content 1 1 3: If the end user is eligible for As soon as retransmission, the electronic digital store 103 will build a mutual exchange Sc (s) 64〇, the transaction sc (s) 6 she: the content of the item to be retransmitted 113 item sc 641. The transaction () 640 will be transmitted Shipped to the end-user user, and used by the end-user. The same steps as-purchase transaction. If you want to re-

0:\85\85!56 分割 DOC -95 - 200304126 傳輸的内容1 13項目最終使用者裝置109要用到金鑰庫中之 一亂序編碼的金鑰,則交易SC(s) 640包含用來指示最終使 用者裝置1 09刪除該亂序編碼的金鑰之指令。 在α异所1 〇 5處理内容1 1 3購買的金融結算的情形中,電 子數位内容商店103在交易SC(s) 640中加入一旗標,且該 旗標係承載於訂單SC 650中而傳送到清算所1〇5。清算所 1〇5解譯訂單Sc(s) 65〇中之該旗標,並繼續進行該交易, 而不針對内容113的購買而向最終使用者收費。 VIII·内容提供者 Α.概述 妥王數位内各電子式配送系統丨〇〇中之内容提供者1 〇 1 即疋數位内容所有人、或擁有内容113的權利之實體。内容 獒供者101的任務是準備内容113以供配銷,並使可下載版 的内容113之電子數位内容商店1〇3或零售商可得到與内容 113有關的資訊。為了將最高的安全性及權利控制提供給内 谷k供者101,提供了 一系列的工具程式,使内容提供者 仔以在其營業場所準備其内容113並將其内容安全地包 封到SC(s),因而當内容113離開内容提供者1〇1的領域時, 孩内容113是安全的,且未經授權者無法接觸或存取該内容 113。此種方式可使内容113自由地經由諸如網際網路等不 安全的網路配送,而不必害怕駭客或未經授權者將竊取該 内容113。 内谷提供者1(H的工具程式之終極目標在於:準備諸如 -歌曲或歌曲系列等的一内容113,並將該内容113包封到0: \ 85 \ 85! 56 Split DOC -95-200304126 Content transmitted 1 13 Item End-user device 109 uses an out-of-order encoded key in the key library, then the transaction SC (s) 640 contains the An instruction to instruct the end-user device 109 to delete the out-of-order encoded key. In the case of the financial settlement of the purchase of the contents of α 1 0 5 1 1 3, the electronic digital content store 103 adds a flag to the transaction SC (s) 640, and the flag is carried in the order SC 650. Transfer to Clearing House 105. The clearing house 105 interprets the flag in order Sc (s) 65 and continues the transaction without charging end users for purchases of content 113. VIII. Content Providers A. Overview The content providers 1 in the various electronic distribution systems within the Towking Digital are digital content owners or entities that have rights to content 113. The content provider 101's task is to prepare the content 113 for distribution, and to make the downloadable version of the content 113 available to the electronic digital content store 103 or the retailer to obtain information related to the content 113. In order to provide the highest security and rights control to Uchiya Koshino 101, a series of tools and programs are provided to enable content providers to prepare their content 113 in their business premises and securely encapsulate their content in SC (s), therefore, when the content 113 leaves the domain of the content provider 101, the content 113 is secure, and unauthorized persons cannot access or access the content 113. This method allows the content 113 to be freely distributed through an insecure network such as the Internet without fear of hackers or unauthorized persons from stealing the content 113. Uchiya Provider 1 (H The ultimate goal of the utility is to prepare a content 113 such as -song or song series, etc.

O:\85\85156 分割.DOC -96- 200304126 内容SC(s) 630,並且將描述該歌曲的資訊、該歌曲的核准 使用法(内容使用條件517)、及該歌曲的促銷資訊包封到一 中介資料SC(s) 620。為了達到此一目的,提供了下列一組 的工具程式: 工作流程管理程式1 54-安排處理活動的時程,並管理各 程序之所需同步。 内容處理工具程式1 5 5 -用來控制其中包括加上浮水印、 預先處理(在一音訊的例子中,任何必需的等化、動態範 圍調整、或重新取樣)、編碼、及壓縮的内容丨丨3檔案準 備之一組工具程式。 中介貝料同化及輸入工具程式161-用來自内容提供者的 資料庫160及(或)協力廠商的資料庫或資料輸入檔案收 集内容113描述資訊及(或)經由操作者的互動而收集該 資訊並提供用來指定内容使用條件517之一組工具程 式。亦k供一種用來擷取或提取諸wcDS4DDp檔的數 位音訊内容之介面。一品質管制工具程式可用來預覽所 準備的内容及中介資料。可進行中介資料所需的任何修 正、或内容的重新提交以供進一步的處理。 SC(s)包封工具程式152_將所有的内容丨ι3及資訊加密及 包封,並呼叫SC(s)包封工具程式將該内容113及資訊包 封到sc〇)。 2谷傳播工具程式(圖中未示出)_將%⑷傳播到諸如代 巨内奋網站111及電子數位内容商店i 〇3等的指定配銷 中心。 O:\85\85156 分割.D〇c •97- 200304126 内容促銷網站i 56_儲存中介資料Sc(s) 62〇及或有的 促销材料,以供電子數位内容商店1〇3下載。 、 B·作流程管理程式 該工具程式之目的在於對内容113的處理活動進 安排、追縱、及管理。該應用程式可進行多使用者的存取: 並可在内容提供者101的企業内部網路(intr_t)或企業外 部網路(extr_t)内的遠端位置上進行内容ιΐ3的時程 及狀態檢查。此種設計容許進行協力式處理,此時多個個 人可以平行之方式對多件内容113進行作業,且可將特定的 責任指定給不同的個人,而且這㈣人可㈣在世界各地。 現在請參閱圖8,該圖是對應於圖7的工作流程管理程式 154的主要程序之方塊圖。_8所示之主要程序總結了 Μ 中所述工具程式提供的内容113處理功能。工作流程管理程 式154負責將工作提供給這些程序,並於完成其現行程序 時,將工作導引到下-個需要的程序。係利用一系列的應 用程式介面(APIs)完成上述步驟,而每一處理工具程式呼 叫該等應用程式介面,以便執行下列事項: 擷取所要處理的次一工作 指不成功地冗成一程序 指示並未成功地完成一程序及失敗的原因 提供-程序的過渡狀態(以便起動一些只需要一相依程 序的部分完成之程序) 將註釋加入一個指定程序可取得的產口 工作流程管理程式154也具有—使用^介面,而—例示 O:\85\85156 分割 DOC -98- 200304126 工作流程管理程式使用者介面7〇〇係示於圖7,而該使用者 介面提供了下列功能: 在處理的各階段中可指定並執行系統預設值及條件的 規格之一組態設定控制功能 讓使用者自行訂定工作流程及自動化處理流程 工作的時程安排 狀態查詢及報告 將一相關聯的工作之註釋或指令加入一個或多個程序 工作管理(亦即暫停、解除、移除、改變優先順序(處理 的順序)) 每一程序具有一個與其相關聯且由工作流程管理工具 程式154管理的佇列。向工作流程管理程式154要求工作的 所有私序將使工作流程管理程式丨54於該程序的相關聯佇 列中目前並無工作時,將該程序(工具程式)暫停在一等候 狀態,或將與該工作有關的且執行該工作的各別程序所需 2所有資訊送回到該程序。如果一程序被暫停於一等候狀 怨’則當工作流程管理程式154將一工作置於該程序之佇列 時,該程序即恢復處理。 工作机私官理私式丨54也根據一組指定的規格而管理處 理的流程或順序。如果内容提供者⑻有特殊的處理需求或 要設定特定的預設規則,則内容提供者HH可自行訂定這些 規則m報告完成了指定給該程序的王作時,該程 序即將此種狀態通知工作流程管理程式丄5 4,且工作流程管 理程式154根據指定的規則而決定要將次一工作放在哪一 O:\85\85156 分割.D〇c -99- 200304126 個佇列中。 亦可在任何處理步驟上,經由程式API,或以人工方式 經由工作流程管理程式使用者介面7〇〇或處理器介面,而將 指不特殊處理指令或注意事項之註釋附加到產品上。 在較佳實施例中,係利用Java來實施工作流程管理程式 154中乏各程序,但是亦可使用諸如c/c++、組合語言 (Assembler)及等效語言等其他的程式語言。我們當了解, 下又中針對工作流程管理程式154而說明的各程序可在多 種硬體及軟體平台上執行。可以在一電腦可讀取的媒體中 的:應用程式之方式配送作為—完整系統或—完整系統構 成私序的口h私序《工作流程管理程式i 54,而該電腦可讀 取的媒體包括(但不限於)諸如網路之電子式配送方式、軟 碟、光碟、及抽換式硬碟機。 現在請參閱圖8,圖中示出對應於圖7所示工作流程管理 程式m的主要程序之方塊圖。τ列各節概述每一程序,並 說明每一程序所需的資訊或動作。 1·產品等鎂動作/資訊程序8〇1 一—可取得程料需的时資訊n作業已成功地完 成了所有相依的程序時,即將工作置於特定的程序符列。 一特殊传列係存在於工作流程管理程式154,而該特殊符列 係用來存放因缺少資訊或發生了無法進行進—步處理的失 敗而目前無法處理的工作。係將這些工作置於產品等候動 ^資訊程序_宁列。該仔列中每—工作有相關聯的狀 悲,用以指示該工作正在等候的動作或資訊、該工作完成 0:\85\85156 分割.D〇c -100- 200304126 的上一程成、bV τζ 、 斤 ^及—旦提供了缺少的或額外的資訊之後或 成力地凡成了所需的動作之後該工作將要進行的次一程 序。 任何程序芫成時,將使工作流程管理程式154檢查該佇 列L並決定該佇列中是否有任何工作正在等候該程序(動作) 的芫成、或該程序所提供的資訊。如果確係如此,則將該 工作存放在適當的程序佇列中。 2·新内容要求程序8〇2 内卷提仏者1 〇 1決定其想要以電子方式銷售及配送的那 二產(例如,一產品可以是一首歌曲或一歌曲集)。工作 流程管理程式154的起始功能是使一操作者得以識別這些 產口口並將這些產品放置在新内容要求程序的佇列中。 内容提供者101可利用組態設定選項而指定在產品選擇介 面上k不哪些資訊。輸入足夠的資訊,以便唯一地識別該 產w亦可選擇包含一些額外的攔位,以便在中介資料提 取的同時,要求以人工方式輸入起動音訊處理階段所需的 貝訊如果並未以人工方式提供,則可選擇自系統預設的 組態環境中擷取該資訊,或自内容提供者的資料庫16〇擷取 該資訊,且係如同在自動中介資料取得程序8〇3中的情形, 係在中介資料處理的第一階段中取得該資訊。内容提供者 的資料庫160中的内容113之構造及能力決定内容選擇程 序。 如果指定了執行向内容提供者101的資料庫16〇查詢所 需的必要資訊,則由自動中介資料取得程序8〇3處理該工 O:\85\85156 分割.DOC -101 - 200304126 作。在一首樂實施例中,為了 寒口、J蹲两女排要進行晋訊處理的 產口口《時程,將指定產品的辩 嘀J、所需的壓縮等級、以及 该b訊的PCM或WAV檔案名稱。 七入成次4 、 了、、工由一自訂的查詢介面 =’貝㈣^器功能,而輸人該資訊作為產品選擇程 序的一部分,或選擇該資訊。 時程,以便進㈣容處理。 的規格可㈣產品的 =亥=選擇❹者介面提供了 ―選項,使操作者得以指 疋要和屋品釋出以供處理、或暫時保留該產品以等候進一 步的資訊輸入。如果保留該產品,則將工作加入新内容要 求程㈣2时列中,而等候進-步的動作來完成資料的輸 入,及(或)釋出該產品以供處理。—旦釋出該產品之後, :作咖理程式154即評估所指定的資訊,並決定該工作 準備要轉移到哪些程序。 如果提供了適當的資訊而得以自動化地查詢内容提供 者101的資料庫16G,則將工作放到用於自動中介資料取得 和序8G34列。如果並未針對自動中介資料取得程序咖 而設疋資料庫映射表的組態,則將該工作放到用於手動式 中介資料輸入程序804之件列(請參閱自動中介資料取得程 序803節中有關資料庫映射表之細節說明)。 如果才曰疋了用於骨訊處理的所需一般性資訊、及加入浮 水印所需的特定資訊’則將該工作放到用於加入浮水印程 序_之佇列(内容處理的第一階段)。如果在釋出工作時失 掉I所需的資訊,則將該工作連同用來指示失掉該資訊的 狀怨放到產品等候動作/資訊程序丨之佇列。O: \ 85 \ 85156 Divide .DOC -96- 200304126 Content SC (s) 630, and enclose the information describing the song, the approved use method of the song (content use condition 517), and the promotion information of the song to An intermediary information SC (s) 620. To achieve this, the following set of tools are provided: Workflow Manager 1 54- Schedule the processing activities and manage the required synchronization of the processes. Content Processing Tool Program 1 5 5-Used to control content including watermarking, pre-processing (in an audio example, any necessary equalization, dynamic range adjustment, or resampling), encoding, and compression 丨 丨3 file preparation tools. Intermediate material assimilation and input tool program 161- Use the database 160 from the content provider and / or the third party database or data input file to collect the content 113 descriptive information and / or collect this information through operator interaction It also provides a set of utility programs for specifying content use conditions 517. It also provides an interface for retrieving or extracting digital audio content from wcDS4DDp files. A quality control tool program can be used to preview the prepared content and mediation data. Any corrections required for the intermediary material, or resubmission of the content for further processing, may be performed. SC (s) encapsulation tool program 152_ Encrypts and encapsulates all content and information, and calls the SC (s) encapsulation tool program to encapsulate the content 113 and information to sc〇). 2 Valley communication tool program (not shown in the figure) _ Disseminate% 到 to designated distribution centers such as Daijuu Neifen website 111 and electronic digital content store IO3. O: \ 85 \ 85156 Div.. Doc • 97- 200304126 Content Promotion Website i 56_ Stores intermediary data Sc (s) 62〇 and contingent promotional materials for downloading at Digital Content Store 103. B. Workflow management program The purpose of this tool program is to arrange, track, and manage the processing activities of content 113. The application can be accessed by multiple users: and can perform content schedules and status checks on remote locations within content provider 101's intranet (intr_t) or extranet (extr_t) . This design allows collaborative processing, in which multiple individuals can work on multiple pieces of content 113 in parallel, and specific responsibilities can be assigned to different individuals, and this person can be located around the world. Refer now to FIG. 8, which is a block diagram of the main procedures corresponding to the workflow management program 154 of FIG. 7. The main program shown in _8 summarizes the content 113 processing functions provided by the tool program described in M. The workflow management process 154 is responsible for providing work to these processes and, when completing its current processes, directs the work to the next required process. The above steps are accomplished using a series of application programming interfaces (APIs), and each processing tool program calls these application programming interfaces in order to perform the following tasks: Retrieving the next job to be processed refers to unsuccessful redundancy of a program instruction and Failure to complete a procedure successfully and the reason for failure-transitional state of the procedure (in order to start some procedures that only require partial completion of a dependent procedure) Adding a comment to a designated procedure can be obtained from the production workflow management program 154 which also has— Use ^ interface, and-exemplify O: \ 85 \ 85156 split DOC -98- 200304126 workflow management program user interface 700 is shown in Figure 7, and the user interface provides the following functions: at each stage of processing One of the specifications that can specify and execute the system default values and conditions. The configuration setting control function allows users to customize the workflow and automate the processing of work schedules. Status query and reporting. Annotate a related job or Instruction to add one or more program work management (that is, pause, release, remove, change priority ( The order of processing)) Each program has an associated and managed by the workflow management utility 154 queue. Requesting all private sequences of work to the workflow management program 154 will cause the workflow management program 54 to suspend the program (tool program) in a waiting state when there is currently no work in the associated queue of the program, or All information related to the job and required to perform the individual procedures of the job2 is sent back to the procedure. If a procedure is suspended in a waiting state, then when the workflow management program 154 places a task on the queue, the procedure resumes processing. The private machine management style of work machine 54 also manages the process or sequence of processing according to a specified set of specifications. If the content provider does not have special processing requirements or needs to set specific preset rules, the content provider HH can set these rules on its own. When the report completes the masterpiece assigned to the program, the program will notify the status of the workflow. The management program 丄 54, and the workflow management program 154 decides which O: \ 85 \ 85156 partition .D〇c -99- 200304126 queues to place the next job according to the specified rules. It is also possible to attach a note indicating no special processing instructions or precautions to the product at any processing step, via program API, or manually via the workflow management program user interface 700 or processor interface. In the preferred embodiment, Java is used to implement the procedures in the workflow management program 154, but other programming languages such as c / c ++, Assembler, and equivalent languages can also be used. We should understand that the procedures described below for the workflow management program 154 can be executed on a variety of hardware and software platforms. Can be distributed in a computer-readable medium: application-style distribution as-a complete system or-a complete system constitutes a private sequence of the "workflow management program i 54, and the computer-readable media includes (But not limited to) electronic distribution methods such as internet, floppy disks, optical disks, and removable hard drives. Referring now to FIG. 8, there is shown a block diagram of the main procedures corresponding to the workflow management program m shown in FIG. The τ column sections outline each procedure and explain the information or actions required for each procedure. 1 · Products and other magnesium actions / information programs 801—The time information required for the process can be obtained. N When the operation has successfully completed all the dependent procedures, the work will be placed in a specific program sequence. A special queue exists in the workflow management program 154, and the special queue is used to store tasks that cannot be currently processed due to lack of information or failure to perform further processing. These tasks are put on the product waiting list ^ Information Process_ 宁 列. Each job in the list has a state of sorrow, which indicates the action or information that the job is waiting for, the job is completed 0: \ 85 \ 85156 split. D〇c -100- 200304126, bV τζ, ^^ and-the next procedure to be performed after the missing or additional information is provided or after the successful completion of the required action. When any procedure is completed, it will cause the workflow management program 154 to check the queue L and determine whether any tasks in the queue are waiting for the completion of the procedure (action) or the information provided by the procedure. If this is the case, store the job in the appropriate process queue. 2. New Content Requirement Procedure 802 Scroll Initiator 1 101 determines which secondary product (e.g., a product may be a song or a collection of songs) that it wants to sell and distribute electronically. The initial function of the workflow management program 154 is to enable an operator to identify these products and place these products in the queue of a new content request procedure. The content provider 101 can use the configuration setting options to specify which information is not available on the product selection interface. Enter enough information to uniquely identify the product. You can also choose to include some additional stops, so that when the intermediary data is extracted, it is required to manually enter the bexun required to start the audio processing stage. Provided, you can choose to retrieve the information from the system's default configuration environment, or from the content provider's database 160, as in the automatic intermediary data acquisition process 803, This information is obtained in the first stage of the mediation data processing. The structure and capabilities of the content 113 in the content provider's database 160 determine the content selection process. If the necessary information required to query the database 16 of the content provider 101 is specified, the automatic intermediary data acquisition program 803 will handle the job O: \ 85 \ 85156 division. DOC -101-200304126 operation. In a music example, for the cold mouth and J squats, two women's volleyball teams need to perform Jinxun's "time schedule, will specify the product's defense J, the required compression level, and the PCM or WAV file name. Seven times into four times, a time, a time, a time, a custom query interface = ‘beijing ^ device function, and enter the information as part of the product selection process, or select the information. Schedule for easy handling. The specifications of the product can be used to select the product. The user interface provides ―options that allow the operator to specify that the product and the product should be released for processing, or that the product should be temporarily held for further information input. If the product is retained, the job is added to the new content request process 2 hour list, while waiting for further action to complete the data entry, and / or release the product for processing. -Once the product is released, the program 154 evaluates the specified information and decides the procedures to which the work is to be transferred. If the appropriate information is provided and the database 16G of the content provider 101 can be queried automatically, the work is placed on the 8G34 sequence for automatic intermediary data acquisition and ordering. If the configuration of the database mapping table is not set up for the automatic intermediary data acquisition procedure, then this task is placed in the list for the manual intermediary data input procedure 804 (see section 803 of the automatic intermediary data acquisition procedure) Details about the database mapping table). If the general information required for bone processing and the specific information required to add a watermark are added, then the job is placed in the queue for adding a watermark process (the first stage of content processing) ). If the information required by I is lost when the job is released, the job is placed on the queue of the product waiting action / information program along with the complaint indicating the loss of the information.

O:\85\85156 分割.DOC -102- 200304126 如果該狀態指示内容H3的檔案名稱遣失,例如在内容 113是首訊而WAV檔遣失的例子中,該狀態可指示 需要擴取内容(或自數位媒體進行數位提取)。音訊處理功 月b要求可絰由一標準檔案系統介面而存取歌曲檔。如果歌 曲係位於外#媒體或音訊處理王具程式無法直接存取的— 樓案系統上’則首先將該等標案㈣到—可存取的樓案系 統:如果歌曲為數位格式但係存放在⑶或數位錄音帶上, 則音訊處理工具程式可存取的—㈣系統提取這些歌曲。 一旦可存料•案之後,㈣Μ作流程管理程式使用 者^面700來指定或選擇工作的路徑及標案名稱,因而在也 已指疋加入浮水印程序所需的所有其他資訊的情形下,可 將該工作釋出到加入浮水印程序。 3·自動中介資料取得程序803 中貝料取知程序803執行對内容提供者1〇1的漬 ί 〇或已^人貪料的_階段性資料庫之—系列查詢,售 試以一種自動化的方式取得所能得到的最多產品資訊。名 ^各^目放到自㈣介資料取得程序陶㈣之前,自 力中介②料取得程序8喊要求下列資訊·· 資料庫映射表,該資料庫映射表具有適當的資訊,用以 產生對内容提供者101的資料庫160之查詢 執行查詢所需的產品資訊 用來唯—界定產品之適當產品資訊 供者101的資料庫16〇執行一自詢,以便 取仔處理内容U3所需 所而 &lt;貝5凡。例如,如果内容113是音樂, O:\85\85156 分割.D〇c -103 - 200304126 」,仃屋查询所需的資訊可以是專輯名稱,或者可以是内 、者101扣疋的— upc、或一特定專輯、或選擇識別 在所要取传的資訊中,某些資訊被指定為必續的(請參 ^自動中介會料取得程序803的該節所述之細節)。如果 、知了所有必須的資訊,則隨即將該工作放到使用條件程 序列。如果失掉了任何必須的資訊,則將該歌曲放 到手:式中介資料輸入程序8〇4的佇列中。如果產品等候動 乍” Λ私序801仔列中的任何工作正在等候該步驟中得到 =任何資訊,則更新工作狀態,以便指示不再需要等候該 ” Λ如果邊工作不再有任何未解決的需求,則將該工作 放到下一個界定的佇列。 4·手動式中介資料輸入程序8〇4 手動式中介資料輸入程序804提供了一種讓操作者可輸 入失掉的貝訊之方式《該程序並無相依性。一旦指定了所 有必須的資訊之後,即將該工作放到使用條件程序8〇5。 5·使用條件程序805 使用條件程序805可指定產品使用及限制之規格。使用 條件程序805可能需要某些中介資料。在完成使用條件規格 時’除非要求受監控的發行程序806選項,或者受監控的發 行私序806選項被设定為工作流程管理程式1 54規則中之預 設選項,否則該工作有資格被放到中介資料sc(s)產生程序 807之佇列。在此種情形中,該工作被放到受監控的發行程 序806之彳宁列。在放到中介資料SC(s)產生程序807的传列之 前,工作流程管理程式154將首先保證已滿足了各程序的所 O:\85\85156 分割.DOC -104- 200304126 則將該工作放到 有相依性(請參閱下文)。如果並非如此 產品等候動作/資訊程序801之佇列中。 6_受監控的發行程序806 受監控的發行程序8G6可對數位内容產品指定的資訊進 行品錄查及確認。該程序並無任何相依性。監控者可審 查先可在該產品的任何處理階段中附加到該工作之註釋, 並採取適當的動作。在審查了所有的資訊及註釋之後,監 控者可以有下列的選項: μ 核准♦行,並將孩產品放到中介資料SC(s)產生程序8〇7 之佇列中。 修改及(或)加入.資訊,並將該產品放到中介資料%⑷產 生程序807之侍列中。 將註釋加入該工作中,並將該工作重新放到手動式中介 貝料輸入程序8 0 4之件列中。 加入註釋,並將該工作放到產品等候動作/資訊程序 之传列中。 7·中介資料SC(s)產生程序go? 中介資料SC(s)產生程序8〇7將先前收集的所有資訊及中 介資料SC(s) 620所需的其他資訊蒐集在一起,並呼叫Sc(s) 包封程序,以便產生中介資料SC(s) 620。該工具程式需要 下列資訊作為輸入: 必須的中介資料 使用條件 在該產品的所有品質等級的加密階段中使用之加密金 O:\85\85156 分割.DOC -105- 200304126 输 該最後一個相依性要求··相關聯的音訊物件先完成音訊 處理階段,然後才可產生中介資料Sc(s) 620。在完成中介 資料SC(s)產生程序807時,將根據所指定的工作流程規 則,而將該工作放到最後品質保證程序8 13之佇列、或内容 傳播程序814之佇列。 8·加入浮水印程序808 加入浮水印程序808將著作權及其他資訊加入内容 113。在内容113是一首歌曲的一實施例中,該工具程式需 要下列資訊作為輸入: 歌曲檔案名稱(在專輯的情形中為多個檔案名稱) 浮水印指令 浮水印參數(將包含在浮水印的資訊) 於完成加入浮水印程序808時,如果可取得預先處理及 壓縮程序809所需的輸入,則將該工作放到預先處理及壓縮 程序809之佇列,否則將該工作放到產品等候動作/資訊程 序801之佇列。 9·預先處理及壓縮程序809 ”預先處理及壓縮程序809將内容113編碼成指定的壓縮 等級,以便先執行任何必需的預先處理。將一工作放到該 佇:時’實際上產生了多個佇列資料項。係針對所需產品 的每-壓縮等級而產生-工作。可以平行方式在多個系統 上執行該編碼程序。該工具程式需要下列的輸入: 加入浮水印的内容之檔案名稱(在專輯的情形中為多個O: \ 85 \ 85156 Split. DOC -102- 200304126 If the status indicates that the file name of content H3 is lost, for example, in the case where content 113 is the first message and the WAV file is lost, the status may indicate that the content needs to be expanded ( Or digital extraction from digital media). Audio processing functions require that song files be accessible through a standard file system interface. If the song is located outside the #Media or Audio Processing Wang Gu program, which cannot be accessed directly — on the building case system ', then the projects are first accessed to the accessible building case system: if the song is in digital format but stored On CDs or digital audio cassettes, the audio processing tool program can access—the system extracts these songs. Once the materials and cases can be stored, the user can use the process management program user 700 to specify or select the work path and project name, so in the case that all other information required for the watermarking process has also been referred to, This work can be released to a watermarking program. 3 · Automatic intermediary data acquisition program 803 Sinopec material acquisition program 803 executes the content provider 1101 or has been _ ________ _ phased database of a series of queries, sales test with an automated Way to get the most product information you can get. Name ^ each ^ item is placed before the self-introduction data acquisition process Tao Li, the self-help intermediary ② the material acquisition process 8 calls for the following information ... The database mapping table, which has the appropriate information to generate the content Query of the database 160 of the provider 101 The product information required to execute the query is used to define the appropriate product information for the product. The database of the provider 101 16 performs a self-inquiry in order to obtain the information required to process the content U3. Bey 5 Where. For example, if the content 113 is music, O: \ 85 \ 85156 is divided. D〇c -103-200304126 ", the information required by the queen query can be the album name, or it can be deducted from within, or by 101 — upc, Or a specific album, or choose to identify in the information to be transmitted, some information is designated as mandatory (please refer to the details described in this section of the automatic intermediary meeting acquisition program 803). If, knows all the necessary information, then the task is placed in the sequence of use conditions. If you lose any necessary information, put the song in your hand: the queue of the mediation data input program 804. If the product is waiting to start "Λ Any sequence in 801 private sequence is waiting to get = any information in this step, then update the job status to indicate that there is no longer any need to wait for the side job Λ Demand, the job is placed on the next defined queue. 4. Manual Intermediary Data Entry Program 804 The manual intermediary data entry program 804 provides a way for the operator to enter the lost Beacon. The procedure is not dependent. Once all the necessary information has been specified, the job is placed in the use condition program 805. 5. Use condition program 805 Use condition program 805 can specify the specifications of product use and restrictions. Using conditional procedure 805 may require some intermediary information. Upon completion of the conditions of use specification, unless the monitored distribution program 806 option is required, or the monitored distribution private sequence 806 option is set as the default option in the Workflow Manager 1 54 rule, the job is eligible for release Go to the queue of the intermediary data sc (s) generating program 807. In this case, the job is placed in the queue of monitored departure sequence 806. Prior to the introduction of the intermediary data SC (s) generation program 807, the workflow management program 154 will first ensure that all the O: \ 85 \ 85156 divisions of each program have been met. DOC -104- 200304126 puts the job To have dependencies (see below). If this is not the case, the product wait action / information program 801 is on the queue. 6_Supervised distribution program 806 The supervised distribution program 8G6 can perform product inspection and confirmation on information specified by digital content products. The procedure has no dependencies. The monitor can review the comments that can be attached to the job at any stage of the product's processing and take appropriate action. After reviewing all the information and notes, the supervisor can have the following options: μ approve the line and place the child product in the queue of the intermediary data SC (s) generation program 807. Modify and / or add the information, and put the product in the queue of the intermediary data% production program 807. Add comments to the job, and put the job back in the manual intermediary shell material input program 804. Add a note and put the job in the queue of the product wait action / information process. 7. Intermediate data SC (s) generation process go? Intermediate data SC (s) generation process 807 collects all previously collected information and other information required by the intermediary data SC (s) 620, and calls Sc ( s) Encapsulation procedure to generate intermediary data SC (s) 620. The tool requires the following information as input: The necessary intermediary data conditions are used in the encryption phase of all quality levels of the product: O: \ 85 \ 85156 division. DOC -105- 200304126 Enter the last dependency requirement · The associated audio object first completes the audio processing stage before the intermediary data Sc (s) 620 can be generated. When the intermediate data SC (s) generation procedure 807 is completed, the work will be placed in the queue of the final quality assurance procedure 8 13 or the content dissemination procedure 814 according to the specified workflow rules. 8. Add a watermark program 808. Add a watermark program 808 to add copyright and other information to the content 113. In an embodiment where the content 113 is a song, the utility requires the following information as input: Song file name (multiple file names in the case of an album) Watermark command Watermark parameters (will be included in the watermark (Information) When adding the watermark program 808 is completed, if the input required for the pre-processing and compression program 809 can be obtained, the job is placed in the queue of the pre-processing and compression program 809, otherwise the job is put into the product waiting action / Information program 801. 9. Pre-Processing and Compression Program 809 "The pre-processing and compression program 809 encodes the content 113 into a specified compression level in order to perform any necessary pre-processing first. Putting a job to this 时: 时 'actually produces multiple Queued data items. Generated-work for each compression level of the desired product. The encoding process can be executed on multiple systems in parallel. The utility requires the following inputs: The file name of the content to which the watermark is added ( In the case of an album, multiple

0_·、85、85】56 分割,D0C -106- 200304126 標案名稱) 產品的品質等級(可預先設定該品質等級) 壓縮演算法(可預先設定該壓縮演算法) 產品類型(在預先處理器需要的情形下) 於完成該編碼程序時,如果工作流程規則已有設定,則 將工作放到内容品質管制程㈣〇之㈣。如果並非如此, 則將這些工作放到加密程序811之佇列。 如果編碼工具程式的協力供應商並未提供一種顯示諸 如音訊的内容113中已被處理的百分率之方法,或者並未提 2 —種指示所選擇的内容113的整個選擇中已被編碼的百 刀率&lt;万法,則在圖丨丨中示出一種決定圖8所示内容預先處 理及壓縮工具程式對數位内容之編碼率。該方法開始時係 v翳1 1 0 1中選擇所需的編碼演算法及位元傳輸速率。然 =步驟1102中進行查詢,以便決定該演算法及編碼速率 疋否具有一預先計算的速率因數。該速率因數是用來決定 、子^特足編碼續异法及一特定位元傳輸速率而進行壓縮的 、、'、、Q數如果並未儲存任何先前計算的速率因數,則 在一段預疋的時間中將内容丨13的一樣本編碼。在較佳實施 例中,該段預定的時間是幾秒鐘。在一段預定的時間中之 該編碼速率是用來計算一個新的速率因數‘。在步驟 110 8中,於已知時間長度及所編碼的内容113量時,一新的 、、“、婁RNEW的计算為Rnew=(所編碼的數位内容長 度)/(時間長度)。在步驟11〇9中,將内容113編碼,並利用 、’十算的速率因數Rnew顯示該編碼狀態。然後在步驟 O:\85\85156 分割·D〇c -107- 200304126 1107中儲存該編碼速率因數rnew,以供未來用於該編碼演 异法及編碼位元傳輸速率。在步驟丨丨〇3中,如果所選擇的 演鼻法具有一個先前計算的速率因數Rst〇red 1104中將内容113編碼,並利用該先前計算的速率因數 Rstored顯不進度。在此同時,在步騾11〇5中為所選擇的該 演异法及位元傳輸速率計算一現行速率因數^⑽以财。在 步驟1106中,利用該現行速率因數Rcurrent來更新所儲存 的速率因數rnew=(Rst〇red+Rcurrent)之平均值。速率因數 的此種反覆更新在每一次持續使用一特定編碼演算法及位 兀傳輸速率時,可使編碼速率的決定變得愈來愈精確。炊 後在步驟11〇7中儲存該新的速率反卿,以供未來使用。如 果現行速率因數Rcurrent超出先前儲存的速率因數Rst〇red 到一特定範圍或臨界值,則可以不更新心了_。 然後可提供編碼狀態的顯示。該編碼狀態包括:在現行 的編碼速率下,根據編碼速率、及内容⑴的總構案長度, 而將全邵内容1 1 3的百分率顯示為 、 々㈡刀手長條。孩編碼狀態 吓可包括剩餘的編碼時間。將内容丨^ ^ ^ ^ ^ ^ ^ ^ ^ 斗管AA泌、\ &lt;、、心私案長度除以所 &quot;异々、扁碼速率Rcurrent,即可計算 了抄、、 1异其餘的編碼時間。 可私孩編碼狀態傳送到另一個、 把用到孩呼叫程序之葙 式。此種方式可協助監督程式對各相 次# w 、 伋私式進行編碼及批 ,以便得到更有效率的處理。我 代舍益△丨小 玳們§ 了解,在一替 代只她例中,編碼可包含加入浮水印的步驟。 曰0_ ·, 85, 85] 56 divisions, D0C -106- 200304126 Project name) Product quality level (the quality level can be set in advance) Compression algorithm (the compression algorithm can be set in advance) Product type (in the pre-processor When necessary) When the coding process is completed, if the workflow rules have been set, the work will be placed in the content quality control process (㈣〇㈣). If this is not the case, then these tasks are put on the queue of the encryption program 811. If the third-party supplier of the coding tool program does not provide a method to display the percentage of content 113 that has been processed, such as audio, or does not mention 2-a way to indicate that the entire selection of selected content 113 has been coded Rate &lt; Wanfa, then a method for determining the encoding rate of digital content by the content pre-processing and compression tool program shown in FIG. 8 is shown in FIG. At the beginning of the method, the required coding algorithm and bit transmission rate are selected in v 翳 1 1 0 1. However, a query is performed in step 1102 to determine the algorithm and encoding rate. 疋 Does it have a pre-calculated rate factor. The rate factor is used to determine, compress the special encoding continuation method and a specific bit transmission rate and compress it. If the Q factor is not stored in any previously calculated rate factor, then Copies the contents of 13 samples in time. In the preferred embodiment, the predetermined period of time is a few seconds. The encoding rate is used to calculate a new rate factor 'over a predetermined period of time. In step 1108, when the length of time and the amount of encoded content 113 are known, a new, “,” and RNEW are calculated as Rnew = (length of encoded digital content) / (length of time). In step In 11〇9, the content 113 is encoded, and the encoding status is displayed using a rate factor Rnew of ten counts. Then, the encoding rate factor is stored in step O: \ 85 \ 85156 divided by Doc -107- 200304126 1107. rnew for future use of this encoding variant and encoding bit transmission rate. In step 丨 03, if the selected nose rendering method has a previously calculated rate factor Rst〇red 1104, the content 113 is encoded , And use the previously calculated rate factor Rstored to show no progress. At the same time, in step 1105, calculate a current rate factor for the selected differentiation method and bit transmission rate ^ ⑽ for financial gain. In step In 1106, the current rate factor Rcurrent is used to update the average value of the stored rate factor rnew = (Rst〇red + Rcurrent). This repeated update of the rate factor continuously uses a specific encoding algorithm and bit transmission each time. Rate The encoding rate decision can be made more and more precise. After cooking, the new rate counter is stored in step 1107 for future use. If the current rate factor Rcurrent exceeds the previously stored rate factor Rst〇red to one For a specific range or critical value, you do not need to update your mind. Then you can provide a display of the encoding status. The encoding status includes: Under the current encoding rate, according to the encoding rate and the total project length of the content, The percentage of Shao content 1 1 3 is displayed as a barbarian. The coding status of the child may include the remaining coding time. The content 丨 ^ ^ ^ ^ ^ ^ ^ ^ ^ Divide the length of the private case by the "quota" and "flat rate" Rcurrent to calculate the remaining coding time. The coding status of the private child can be transmitted to another, and used in the calling procedure of the child. This This method can assist the supervisory program to encode and approve each phase of #w, private mode, in order to get more efficient processing. I am willing to benefit △ 丨 Small people§ Understand that in an alternative case, the encoding Can include plus Steps into the watermark.

瓜内容品質管制程序81〇 AtA 内 容品質管制程序810在功能上類似於受 監控的發行程 0·\85\85156 分割.dqc -108- 200304126 ⑽6。該程序是-可供選用的步驟,可讓使用者確認至目 W為止所執行的内容處理之品f。該程序除了加入浮水印 程序808及預先處理及壓縮程序8〇9的編碼部分的完成之 外,對其他程序並無相依性。於完成内容品質管制程序⑽ 時,可以有下列的選項: 可釋出工作,並將這些工作放到加密程序8ιι的作列。 可附加註釋’並可將-個或多個工作重新放到預先處理 及壓縮程序809的佇列。 最後一個選項要求歌曲檔的未編碼但加有浮水印之版 本保持在可使用的狀態,直到執行過内容品質管制程序8ι〇 後為止。 11.加密程序811 加密程序811呼叫適當的安全數位内容電子式配送權利 管理功能,以便將每一個加上浮水印的/編碼的歌曲檔加 密。該程序除了所有其他音訊處理的完成之外,對其他程 序並無相依性。於完成加密程序8丨丨時,將該工作放到内容 SC(s)產生程序812的佇列。 12·内容SC(s)產生程序812 内容SC(s)產生程序812可能需要將某些中介資料檔案包 含在内容SC(s) 630中。如果需要内容U3以外的檔案,則 收集该等檔案’並呼叫SC(s)包封程序,以便為所產生内容 113(例如一首歌)的每一壓縮等級產生一内容Sc(s) 63〇。於 完成内容SC(s)產生程序812時,將根據規定的工作流程規 則’而將该首歌放到最後品質保證程序813的仵列或内容傳 〇Λ85\85!56 分割.DOC -109- 200304126 播程序8 14的彳宁列。 Π.最後品質保證程序813 最後品質保證程序813是一可供選用的步驟,可在相關 聯的中介資料與内容sc⑷630之間進行—交互對照檢 查:以便驗證上述兩者之間正確地匹酉己,並驗證内含的所 有資訊及内容&quot;3都是正確的。於完成最後品質保證程序 813時,將工作放到内容傳播程序814的佇列。如果發現了 一問題’則在大多數的情形中將把工作重新放到㈣階段 的佇列。在該階段的重作在成本上是高出許多,這是因為 除了修正問題所需的重新處理之外,該產品還必須經過整 個的重新加密及重新包封程序。我們強烈建議利用先前的 各品質保證階段來紐内容113之品f、以及資訊的正確性 及完整性。 14·内容傳播程序814 内容傳播程序814負責將SC(s)傳送到適當的代管網站。 在成功地傳送SC⑷之後,記錄工作完成狀態,並自佇“列中 刪除該工作。如果在傳送SC(s)時發生問題,則在一指定次 數的重新嘗試之後’在工作流程管理程式154中以旗標將該 工作標示為失敗及發生的錯誤。 ^ 15·工作流程規則 圖8所示的工作流程規則係依照下文所述的三種主要系 統而作業: μ A :工作流程管理程式154 1.新内容要求程序802 ΟΛ85\85 丨 56 分割.D〇c -110- 200304126 2·產品等候動作/資訊程序801 3 ·最後品質保證程序8 1 3 4.内各傳播(及通知)程序8 Β ··中介資料同化及輸入工具程式j 6 i 1·自動中介資料取得程序803 2. 手動式中介資料輸入程序8〇4 3. 受監控的發行程序8 〇 6 4·中介資料SC(s)產生程序807 C :内容處理工具程式155 1·加入浮水印程序8〇8(需要著作權資料) 2·預先處理及壓縮程序809 3 ·内容品質管制程序8 1 〇 4·加密程序81 i 5·内容SC(s)產生程序812 工作流程 内谷113選擇操作者輸入一薪甚d、、 、 新產口口及,且孩將工作開始 放到A1的佇列。(新内容要求程序802) A1:當内容113選擇操作者將該工作釋出到工作流程管理 &amp;式154時’則將遠將工作放到B i (自動中介資料取得 程序803)的佇列。 A2:來自步驟B1(自動中介資料取得程序8〇3), 或步驟B2(手動式中介資料輸入程序8〇4), 或步驟B3(受監控的發行程序8〇6) 在至步驟Before(中介資料SC(s)產生程序807)的途The content quality control program 81. AtA content quality control program 810 is similar in function to the monitored departure stroke 0 · \ 85 \ 85156 division. Dqc -108- 200304126 ⑽6. This procedure is an optional step that allows the user to confirm the content f of the content processing performed up to the destination W. This program has no dependencies on other programs except for the completion of the encoding part of the watermark program 808 and the preprocessing and compression program 809. Upon completion of the content quality control process, you can have the following options: You can release the job and place it in the encryption program 8m. Annotations can be appended 'and one or more jobs can be relocated to the queue of the pre-processing and compression program 809. The last option requires that the unencoded but watermarked version of the song file remains available until after the content quality control procedure has been performed. 11. Encryption program 811 The encryption program 811 calls the appropriate secure digital content electronic distribution rights management function to encrypt each watermarked / encoded song file. This program has no dependencies on other programs except for the completion of all other audio processing. When the encryption program 8 is completed, the work is placed in the queue of the content SC (s) generation program 812. 12. Content SC (s) generation program 812 The content SC (s) generation program 812 may need to include certain intermediary data files in the content SC (s) 630. If files other than content U3 are needed, collect these files' and call the SC (s) encapsulation procedure to generate a content Sc (s) 63 for each compression level of the generated content 113 (eg, a song). . Upon completion of the content SC (s) generation program 812, the song will be placed in the queue or content of the final quality assurance program 813 in accordance with the prescribed workflow rules'. Λ85 \ 85! 56 split. DOC -109- 200304126 Broadcast program 8 14 of the Ningning column. Π. Final Quality Assurance Procedure 813 The final quality assurance procedure 813 is an optional step that can be performed between the associated intermediary data and the content sc 630-an interactive comparison check: in order to verify that the two are correctly matched , And verify that all the information and content contained in it &quot; 3 is correct. When the final quality assurance process 813 is completed, the work is placed in the queue of the content distribution process 814. If a problem is found ’, in most cases the work will be put back on the queue. The rework at this stage is much more costly because the product must go through a complete re-encryption and re-encapsulation process in addition to the re-processing required to correct the problem. We strongly recommend that you use the previous quality assurance stages to obtain the quality of New Content 113, as well as the accuracy and completeness of the information. 14. Content Dissemination Procedure 814 The content dissemination procedure 814 is responsible for transmitting the SC (s) to the appropriate hosting website. After successfully transmitting the SC⑷, record the job completion status and delete the job from the “Column. If a problem occurs while sending the SC (s), then after a specified number of retries' in the Workflow Manager 154 Flag this job as a failure and an error with a flag. ^ 15. Workflow Rules The workflow rules shown in Figure 8 operate in accordance with the three main systems described below: μ A: Workflow Manager 154 1. New content request procedure 802 ΟΛ85 \ 85 丨 56 segmentation. Doc -110- 200304126 2 · Product waiting action / information procedure 801 3 · Final quality assurance procedure 8 1 3 4. Dissemination (and notification) procedure in the procedure 8 Β · · Intermediary data assimilation and input tool program j 6 i 1 · Automatic intermediary data acquisition procedure 803 2. Manual intermediary data input procedure 804 3. Monitored issuance process 8 〇 4 4 Intermediate data SC (s) generation procedure 807 C: Content processing tool program 155 1 · Add watermark program 8〇8 (requires copyright data) 2 · Pre-processing and compression program 809 3 · Content quality control program 8 1 04 · Encryption program 81 i 5 · Content SC ( s) produces Sequence 812 In the workflow 113, Valley 113 selects the operator to enter a salary of d ,,,, and a new product, and the child puts work into the queue of A1. (New content request program 802) A1: When content 113 selects operation The person releases the job to Workflow Management &amp; Formula 154. 'The job will be placed in the queue of Bi (automatic intermediary data acquisition program 803). A2: From step B1 (automatic intermediary data acquisition program 8). 3), or step B2 (manual-type intermediary data input program 804), or step B3 (monitored distribution program 806) on the way to step Before (intermediate data SC (s) generation program 807)

〇Λ85\85156 分割 DOC • 111 - 200304126 中 [需要加密金鑰]。 來自步驟Before(中介資料sc(s)產生程序807) 在至步驟A3(最後品質保證程序813)或步驟a4(内 容傳播程序814)的途中 [需要内容SC(s) 630]。 來自步驟C 1 (加入浮水印程序808) 在至步驟C2(預先處理及壓縮程序8〇9)的途中 [需要預先處理及壓縮程序809之中介資料]。 來自步騾C4(加密程序811) 在至步騾C5(内容SC(s)產生程序812)的途中 [需要内容SC(s) 630包封的中介資料]。 來自步騾C5(内容SC(s)產生程序812) 在土步驟A3 (取後品質保證程序8 13)或步驟八4(内 谷傳播私序8 14 )的途中 [需要中介資料SC(s) 。 A3: A4:〇Λ85 \ 85156 Split DOC • 111-200304126 [Encryption key required]. From step Before (intermediate data sc (s) generation program 807) On the way to step A3 (final quality assurance program 813) or step a4 (content distribution program 814) [content SC (s) 630 is required]. From step C 1 (add watermark program 808) On the way to step C2 (pre-processing and compression program 809) [Requires pre-processing and compression program 809 intermediary data]. From step 骡 C4 (encryption program 811) On the way to step 5C5 (content SC (s) generation program 812) [Intermediary data enclosed by content SC (s) 630 is required]. From step C5 (content SC (s) generation program 812) On the way to step A3 (Quality Assurance Procedure 8 13) or Step 8 4 (Uchitani Communication Private Sequence 8 14) [Intermediate data SC (s) . A3: A4:

Bl: 在步驟A3 (最後品質保證程序8丨3)之後, 放到侍列Β2(手動式中介資料輸入程序8〇4), 或放到佇列Β3(受監控的發行程序8〇6), 或放到品質保證作業員所要求的佇列。 在步驟Α4(内容傳播程序814)之後, 針對該產品而執行工作流程管理程式丨54。 在步驟Β1(自動中介資料取得程序8〇3)之後,Bl: After step A3 (the final quality assurance procedure 8 丨 3), put it in the queue B2 (manual intermediary data entry procedure 804), or put it in queue B3 (the monitored release procedure 806), Or put on the queue required by the quality assurance operator. After step A4 (content distribution program 814), a workflow management program 54 is executed for the product. After step B1 (automatic intermediary data acquisition procedure 803),

ΟΛ85\85 丨 56 分刮.DOC -112- 200304126 果有步驟C1(加入浮水印程序808)所需的中介資 、料則將代表孩產品的_資料項放到仵列c i。 (亦執行下列邏輯) 如果失掉了任何必須的中介資料,或者如果有指定 給人工中介資料提供者的註釋,則亦將該產品放 到仔列B2(手動式中介資料輸入程序8〇4), 否則如果向該產品要求受監控的發行,則將該產品 放到佇列B3(受監控的發行程序8〇6)。 B2: 否則^果該產品針對所有要求的品質等級有來自 内谷處理工具程式155的所有資訊,則將該產品 放到件列Before(中介資料sc⑷產生程序8〇7), 否則將產品的旗標標示為需要加密金餘,並將該產 品放到佇列A2(產品等候動作/資訊程序8〇1)。 在步❹2(手動式中介資料輸人程序804)的過程中, 如果尚未執行步驟C 1 (加入浮水印程序8〇8),且有步 驟山所需的中介資料,則將一個代表該產品的資 料項放到佇列c 1。 (亦執行下列邏輯) 如果已提供了步驟C2(預先處理及壓縮程序809)所 需的中介資料,貝|J (亦執行下列邏輯) 如果有中介資料同化及輸入工具程式161可收集的 所有中介資料,貝|| 如果要求該產品的受監控之發行,則將該產品放到ΟΛ85 \ 85 丨 56 minutes scraping. DOC -112- 200304126 If there is the intermediary capital required for step C1 (add watermark program 808), it is expected that the _ data item representing the child product will be placed in the queue c i. (The following logic is also implemented) If any necessary intermediary data is missing, or if there is a comment assigned to the manual intermediary data provider, then the product is also placed in line B2 (manual intermediary data entry program 804), Otherwise, if a monitored release is required for the product, the product is placed in queue B3 (monitored release procedure 806). B2: Otherwise, if the product has all the information from the inner valley processing tool program 155 for all required quality levels, then put the product in the list Before (intermediate data sc⑷ generation program 807), otherwise the product flag The mark indicates that the remaining balance is required, and the product is placed in queue A2 (product waiting action / information program 801). In the process of Step 2 (Manual Intermediary Data Input Procedure 804), if Step C 1 has not been performed (watermarking procedure 808 is added) and there are intermediary data required by Step Hill, a representative of the product will be Data items are placed in queue c 1. (The following logic is also implemented.) If the mediation data required for step C2 (pre-processing and compression program 809) has been provided, Be | J (the following logic is also implemented) If there is any mediation data assimilation and input tool program 161 all mediations can be collected Information, || If a monitored distribution of this product is required, place the product in

O:\85\85 丨 56 分剤_DOC -113 - 200304126 佇列B3(受監控的發行程序8〇6) 否則 如果有來自内容處理工具程式155的步驟C4(加 密程序8 11)之所有資訊,則將該產品放到佇 列Before(中介資料sC⑷產生程序8〇7 否則將該產品的旗標標示為需要加密金鑰,並將 該產品放到佇列A2(產品等候動作/資訊程序 801) 〇 否則 如果中介貝料提供者要求一強制性受監控的發 行,則將該產品放到佇列33(自動中介資料取得 程序806) 否則不執行任何事項(將該產品保留在佇列62(手動 式中介資料輸入程序8〇4)。 B3: 在步驟B3(受監控的發行程序8〇6)的過程中, 如果該作業員正將該產品傳送回步驟B2(手動式中 介資料輸入程序804),則將該產品放到佇列B2。 否則如果該作業員釋出該產品,則 如果有來自内容處理工具程式155的步驟c4(加 密程序81 1)之戶斤有資訊,則冑該產品放到传 列Before(中介資料Sc(s)產生程序) 否則將該產品的旗標標示為需要加密金瑜,並將 該產品放到佇列A 2 (產品等候動作/資訊程序 801) 〇 、 O:\85\85156 分割 D0C -114- 200304126 否則將孩.產品保留在佇列By受監控的發行程序 806) 〇O: \ 85 \ 85 丨 56 minutes _DOC -113-200304126 Queue B3 (monitored distribution program 80) Otherwise, if there is all the information from step C4 (encryption program 8 11) of the content processing tool program 155 , Then put the product into the queue Before (intermediate data sC) generation program 807 otherwise flag the product as requiring encryption key, and put the product in queue A2 (product waiting action / information program 801 ) 〇 Otherwise, if the intermediary material supplier requires a mandatory monitored release, then put the product in queue 33 (automatic intermediary data acquisition program 806) otherwise do nothing (keep the product in queue 62 ( Manual intermediary data entry procedure 804). B3: During step B3 (monitored release procedure 806), if the operator is transferring the product back to step B2 (manual intermediary data entry procedure 804) ), Then put the product into queue B2. Otherwise, if the operator releases the product, if there is information from step c4 (encryption program 81 1) of the content processing tool program 155, then the product Put to the line Before (intermediate data Sc ( s) Generate the program) Otherwise, mark the flag of the product as encrypted Jin Yu, and put the product in queue A 2 (product waiting action / information program 801) 〇, O: \ 85 \ 85156 segment D0C -114 -200304126 Otherwise the product will remain in the queue By monitored distribution program 806) 〇

Before.在步驟(中介資料%⑷產生程序術)之後, 將忒產叩的旗標標示為已包封中介資料。 如果已包封所有的(產品/品質等級)關係(tuple),則 如果内容提供者1 〇 1的組態規定要對SC⑷進行品 保,則將該產品放到佇列A3(最後品質保證程 序 813) 否則將該產品放到佇列A4(内容傳播程序814)。 否則將該產品的旗標標示為需要内容113 SC(s),並 將該產品放到佇列A2(產品等候動作/資訊程 801) 〇 ci·在步驟ci(加入浮水印程序8〇8)之後, 如果有步驟C2(預先處理及壓縮程序8〇9)所需的中 介資料,則為每一(產品/品質等級)關係產生一資 料項’並將這些資料項放到佇列C2, 否則將該產品的旗標標示為需要預先處理/壓縮之 中介資料’並將該產品放到佇列A2(產品等候動 作/資訊程序801)。 C2··在步驟C2(預先處理及壓縮程序8〇9)之後, 如果内容提供者1 〇 1的組態規定要進行内容品質管 制程序810,則將該(產品/品質等級)關係放到仵 列C 3 (内容品質控制程序8 1 〇), 否則將該(產品/品質等級)關係放到仵列C4(加密程Before. After the step (intermediate data% ⑷ generating procedure), mark the flag of 忒 production 为 as encapsulated intermediary data. If all (product / quality level) relationships (tuples) have been encapsulated, if the configuration of the content provider 1 01 requires quality assurance of SC 品, then put the product in queue A3 (final quality assurance procedure 813) Otherwise, place the product in queue A4 (content distribution program 814). Otherwise, the flag of this product is marked as required content 113 SC (s), and the product is placed in queue A2 (product waiting action / information process 801). Ci · At step ci (add watermark program 8〇8) After that, if there is the intermediary data required in step C2 (pre-processing and compression program 809), a data item is generated for each (product / quality level) relationship 'and these data items are placed in queue C2, otherwise Mark the flag of this product as requiring pre-processing / compression of intermediary data 'and place the product in queue A2 (product waiting action / information program 801). C2 ... After step C2 (pre-processing and compression program 809), if the configuration of the content provider 1101 specifies that a content quality control program 810 is to be performed, then this (product / quality level) relationship is placed in Column C 3 (content quality control program 8 1 〇), otherwise put this (product / quality level) relationship into queue C4 (encryption process

O:\85\85156 分割 D0C -115- 200304126 序 811)。 C3:在步驟C3(内容品質管制程序810)之後,將該(產品/ 品質等級)關係放到佇列C4(加密程序8 11)。 C4:在步驟〇4(加密程序811)之後, 將所需的資訊(亦即程序所產生且用來將内容113加 密的對稱金鑰623提供給中介資料同化及輸入工 具程式1 61。 如果有内容SC(s) 630所需的所有中介資料,則將該 (產品/品質等級)關係放到仵列C5(内容SC(s)產生 程序812), 否則將該產品的旗標標示為需要用於内容Sc(s) 630包封之中介資料,並將該(產品/品質等級)關 係放到仔列A2(產品等候動作/資訊程序8〇1)。 C5:在步驟C5(内容SC(s)產生程序812)之後, 將品質等級的旗標標示為已在該品質等級上將内 容113包封。 如果已包封該(產品/品質等級)關係,則 如果將該產品的旗標標示為已包封中介資料,則 如果内谷提供者1〇丨的組態規定要對Sc(s)進行 口口保,則將该產品放到佇列A3(最後品質保 證程序813) 否則將該產品放到佇列A4(内容傳播程序814) 〜J將Θ產w的旗標標示為需要中介資料%⑷ 620 ’並將孩產品放到佇列A2(產品等候動作/ O:\85\85156 ^IJ.DOC -116- 200304126 資訊程序801)。 否則(尚未包封所有的(產品/品質等級)關係)不執行 任何事項(另一(產品/品質等級)關係觸發一行 動)。 C·中介資料同化及輸入工具程式 中介資料包含用來描述内容113的資料,例如在音樂的 例子中,包含錄晋的名稱、藝人、作者/作曲者、製作人、 及錄㈢長度。下列說明係基於内容113為音樂的情形,但是 熱二本門技術者當可了解,諸如視訊、程式、多媒體、電 影、及等效物等的其他内容類型也是在本發明的適用範圍 及意義内。 、該:系統整合下列資料:内容提供者101提供給電子數 位内容商店1G3以便有助於促銷該產品之資料(例如,對於 骨樂而言,為該藝人之音樂段落樣本、該藝人之歷史、該 錄音出現的專輯料、與該藝人及(或)產品相關聯的類 型)、内容提供者1G1針對所購買的產品而提供給最終使用 者的資料(例如藝人、製作人、專輯封面、音樂長度)、以 及内容提供者1〇1想要提供給最終使用者的不同購^選項 (使用條件517)。將料料包封到—巾介料SC⑷620, 並使電子數位内容商店103可取得該等資料。為了達到此一 目的,提供了下列的工具程式: 自動中介資料取得工具程式 手動式中介資料輸入工具程式 使用條件工具程式 O:\85\85 丨 56 分割.DOC -117· 200304126 文監控的發行工具程式 =工具程式使内容提供者ι〇ι得以執行前文所述工作 :理私式154《各程序。在較佳實施例中,纟文所述的 ^m係基於jav_ —工具程式套件,但是亦可使用諸 =/c++、組合語言及等效程式語言等的其他程式語言。 1·自動中介資料取得工具程式 自動中介資料取得工具程式讓使用者能夠執行前文所 迷的自動中介資料取得程序8G3。該自動巾介資料取得工具 料係用來存取内容提供者⑻之資料庫16〇,並在沒有作 ^員^助的W下儘1絲最多的資料。可以使用組態設 疋万=將魏序自動化。内容提供者⑻可修改系統預設的 中介資料樣板’以便識別内容提供者1()1想要提供給最終使 用者的資料類型(例如作曲家、製作人、伴奏者、音樂長 度)、以及内容提供者1G1提供給電子數位内容商店103的促 销資=例如,在-音樂的例子中,為該藝人之音樂段落樣 本、该蟄人《歷史、該錄音出現的專輯清單、與該藝人相 關聯的類型)。系統預設的中介資料樣板包括:最終使用者 裝置109所需的資料欄位、可選擇提供給最終使用者裝置 1〇9的資料欄位、以及目標針對電子數位内容商店ι〇3且係 用來促銷藝人、專輯、及(或)單曲的一組樣本資料欄位。 為了自内容提供者101的資料庫160提取該等樣板資料 欄位’自動中介貝料取得工具程式使用一個將該類資料(例 如作曲者、製作人、藝人的傳記)映射到該資料庫内可找到 該資料的位置之映射表。每一内容提供者101都協助指定其 O:\85\85 丨 56 分剖 〇OC -118- 200304126 環境中之該映射表。 自動中介資料取得工具程式利用内容提供者ιοι的一中 二資料樣板及映射表,而自内容提供者1()1的資料庫16〇取 得所能取得的任何資料。以自動中介資料取得程 果更新每一產品的狀態。失掉任何必須資料的一產品被放 到手動式中介資料輸人程序8G4的仔列,否則可將該:品包 封到一中介資料SC(s) 620。 2·手動式中介資料輸入工具程式 、手動式中介資料輸入工具程式讓一使用者能夠執行前 文所述的手動式中介資料輸入程序804。該手動式中介資料 輸入工具程式可讓任何經過適當授#的作業員才是供失掉的 /、料如果3作業員決定典法取得失掉的資料,則該作業 員可將一註釋附加到該產品,並要求受監控的發行。内容 才疋供者1 0 1可基於品質保證的理由而要求該產品進行受監 控的發行。一旦已有所有必須的資料,且並未要求受監控 的發行,則可將該產品包封到一中介資料Sc(s) 。 3·使用條件工具程式 使用條件工具程式讓一使用者能夠執行前文所述的使 用條件程序805。利用電子式配送之方式提供内容113以供 銷售或租用(有限制的使用)之程序涉及一系列的商業決 朿。内容提供者101決定在何種壓縮等級下提供内容113。 然後針對内容1 13的每一壓縮後編碼版本,規定一個或多個 使用條件。每一使用條件針對内容〗2 3的使用而規定最終使 用者的權力、及對最終使用者的任何限制。 O:\85\85 丨 56 分现D〇c -119- 200304126 將一部分的内容處理工具程式155及 使用者的權利及限制)附加到該產品。 一使用條件規定: —組使用條件(最終 1 ·該使用條件適用的内容 2 ·该使用條件所涵蓋的使 者)。 1 1 3之壓%編碼版本。 用者類型(例如企業、 私人消費 該使用條件係適用於内容113的講買或租用。 對於租用而言: 用來限制租用條件的量度單位(例 起過之後即無法再播放内容丨丨3的 對於購買而言: 如天數、播放次數)。 上述量度單位數。 容許最終使用者製作可播放拷貝的份數。 最終使用者可用來製作這些拷貝的媒體種類(例如可 錄製CD(CD-R)、MD、個人電腦)。 4.可進行購買/租用交易的一段時間(亦即一最終使用者只 有在開始供應日之後且在最後供應日之前才能在該使用 條件的條款下購買/租用)。 5. 最終使用者可進行該交易(或租用)的國家。 6. 在此使用條件下的購買/租用交易價格。 7. 浮水印參數。 8 ·須通知清算所10 5的事件類型。 一組使用條件的例子 内谷k供者101可決定在丨997年第四季測試北美市場對 重新發行-著名童謠歌者所演唱童謠之接受性。該試銷將O: \ 85 \ 85156 split D0C -115- 200304126 sequence 811). C3: After step C3 (content quality control program 810), the (product / quality level) relationship is placed in queue C4 (encryption program 8 11). C4: After step 04 (encryption program 811), provide the required information (ie, the symmetric key 623 generated by the program and used to encrypt the content 113) to the intermediary data assimilation and input tool program 161. If there is For all the intermediary data required for content SC (s) 630, put the (product / quality level) relationship into queue C5 (content SC (s) generation program 812), otherwise mark the product flag as required The intermediary data is encapsulated in the content Sc (s) 630, and the (product / quality level) relationship is placed in the row A2 (product waiting action / information program 801). C5: At step C5 (content SC (s) ) After generating program 812), mark the quality level flag as having encapsulated the content 113 on the quality level. If the (product / quality level) relationship has been encapsulated, if the product flag is marked as If the intermediary data has been encapsulated, if the configuration of Uchiya Provider 1〇 丨 requires oral guarantee of Sc (s), then put the product in queue A3 (final quality assurance procedure 813), otherwise the product Placed in queue A4 (content distribution program 814) ~ J marked the flag of Θ production w as an agency % ⑷ 620 'and put the children's products in queue A2 (product waiting action / O: \ 85 \ 85156 ^ IJ.DOC -116- 200304126 information program 801). Otherwise (all (product / quality level) have not been encapsulated yet Relationship) Do nothing (another (product / quality level) relationship triggers an action.) C. Intermediary data assimilation and input tool program. The intermediary data contains data used to describe the content 113. For example, in the example of music, it contains the recording Jin's name, artist, author / composer, producer, and recording length. The following description is based on the situation where the content 113 is music, but it should be understandable by the skilled person, such as video, program, multimedia, film, And other equivalent content types are also within the scope and meaning of the present invention. The: The system integrates the following data: Content provided by the content provider 101 to the electronic digital content store 1G3 to help promote the product's information (for example, For bone music, it is a sample of the artist ’s music passage, the history of the artist, the album material that appeared in the recording, and the associated with the artist and / or product Type), the content provided by the content provider 1G1 to the end-user for the product purchased (such as artist, producer, album cover, music length), and the difference that the content provider 101 wants to provide to the end-user Purchase option (Condition of use 517). Encapsulate the material to the towel material SC⑷620, and make the information available to the electronic digital content store 103. In order to achieve this purpose, the following tools are provided: Automatic intermediary data Obtaining the tool program Manual mediating data input tool program Use condition tool program O: \ 85 \ 85 丨 56 Segmentation. DOC -117 · 200304126 Document monitoring distribution tool program = tool program enables the content provider ι〇ι to execute the aforementioned Work: Private style 154 "Each procedure. In the preferred embodiment, ^ m described in the following text is based on the jav_ — utility program package, but other programming languages such as = / c ++, combination languages, equivalent programming languages, etc. can also be used. 1. Automatic intermediary data acquisition tool program The automatic intermediary data acquisition tool program allows users to execute the automatic intermediary data acquisition procedure 8G3 described in the previous section. This automatic referral data acquisition tool is used to access the database 16 of the content provider, and to make the most of the data without the help of the staff. You can use the configuration settings 疋 万 = to automate Wei Xu. Content providers: You can modify the system's default mediation data template to identify the type of data that content provider 1 () 1 wants to provide to end users (such as composer, producer, accompanier, music length), and content Promotional materials provided by the provider 1G1 to the electronic digital content store 103 = For example, in the -music example, a sample of the artist's music passage, the dude's "History, the list of albums in which the recording appeared, and the artist's associated Types of). The system's default intermediary data template includes: the data fields required by the end-user device 109, the data fields that can be optionally provided to the end-user device 109, and the target is for electronic digital content stores ι03 and is applicable A set of sample data fields to promote artists, albums, and / or singles. In order to extract these template data fields from the content provider 101's database 160, the automatic intermediary material acquisition tool program uses a map of this type of data (such as biographies of composers, producers, and artists) to the database. Find the mapping table for the location of the material. Each content provider 101 assists in specifying its O: \ 85 \ 85 丨 56 profile 〇OC-118- 200304126 environment. The automatic intermediary data acquisition tool program uses the one-two data template and mapping table of the content provider ιοι, and obtains any data that can be obtained from the content database 160 of the content provider 1 () 1. Update the status of each product with automatic intermediary data acquisition process. A product that has lost any necessary data is placed in the line of manual intermediary data input program 8G4, otherwise the product can be encapsulated into an intermediary data SC (s) 620. 2. Manual mediation data entry tool program, manual mediation data entry tool program allows a user to execute the manual mediation data entry program 804 described above. The manual intermediary data entry tool program allows any operator who has been properly authorized to supply the lost / reported material. If the operator decides to obtain the lost data in code, the operator can attach a note to the product. And require a monitored release. Content Talent Provider 1 0 1 may request the product for a controlled release for quality assurance reasons. Once all necessary information is available and a monitored distribution is not required, the product can be encapsulated into an intermediary data Sc (s). 3. Use Condition Tool Program The use condition tool program enables a user to execute the use condition program 805 described above. The process of providing content 113 by electronic distribution for sale or hire (restricted use) involves a series of commercial decisions. The content provider 101 decides at what compression level the content 113 is provided. One or more conditions of use are then specified for each compressed encoded version of the content 113. Each use condition specifies the rights of the end user and any restrictions on the end user for the use of the content [23]. O: \ 85 \ 85 丨 56 cash points Doc -119- 200304126 A part of the content processing tool program 155 and the user's rights and restrictions) are attached to this product. I. Conditions of use stipulate:-Group conditions of use (final 1 · What the conditions of use apply 2 · Messengers covered by the conditions of use). A 1% 3 coded version. User type (for example, corporate, private consumption. The conditions of use are applicable to the purchase or rental of the content 113. For rental: a unit of measure used to limit the rental conditions (for example, the content can no longer be played after it has been started) 3 For purchases: such as number of days, number of plays). The number of measurement units described above. Allows end users to make playable copies. Types of media that end users can use to make these copies (such as recordable CDs (CD-R)) , MD, personal computer) 4. A period of time during which purchase / rental transactions are possible (that is, an end user can only purchase / rent under the terms of the conditions of use only after the start of supply date and before the last supply date). 5. The country where the end user can make the transaction (or lease). 6. The purchase / rental transaction price under this use condition. 7. Watermark parameters. 8 · The clearing house 10 5 event type must be notified. A group An example of the conditions of use: Donald U.K. 101 may decide to test the acceptability of the North American market for re-released nursery rhymes performed by a famous nursery rhyme singer in the fourth quarter of 997. The test Will

O:\85\85156 分割.DOC -120- 200304126 以兩種不同的壓縮編碼版本供應該童謠:384Kbps(每秒 千位元)及56Kbps。可購買(可在%〇上製作一份拷貝)或租 用(二星期)該384Kbps的版本,而只能購買(不得製作拷貝) 孩56Kbps的版本。任何購買/租用都具有相同的浮水印指 令,且内容提供者101要求清算所1〇5記錄所製作的每一份 拷貝之份數。因而將產生下文所示之使用條件: 使用條件 壓縮編碼版本 3 84Kbps 3 84Kbps 56Kbps 使用者類型 私人消費者 私人消費者 私人消費 交易類型 購買 租用 購買 供應曰期 1 Oct 1997-31 1 Oct 1997-31 1 Oct 1997 Dec 1997 Dec 1997 Dec 1997 國家 美國及加拿大 美國及加拿大 美國及加 浮水印 標準 標準 標準 通知事件 拷貝動作 無 無 拷貝次數 1 0 0 拷貝媒體 MD 不適用 不適用 租用時間 不適用 14天 不適用 價格 價格1 價格2 價格3 4·中介資料SC(s) 620之各組成部分 下文所述是中介資料同化及輸入工具程式16丨所收 供包含在中介資料SC(s) 620中的某些種類的資料。嘗試按O: \ 85 \ 85156 split.DOC -120- 200304126 The nursery rhymes are supplied in two different compression-encoded versions: 384Kbps (kilobits per second) and 56Kbps. The 384Kbps version can be purchased (a copy can be made on% 0) or rented (two weeks), and only the 56Kbps version can be purchased (no copy can be made). Any purchase / rental has the same watermark instruction, and the content provider 101 requires the clearing house 105 to record the number of copies made for each copy. As a result, the following usage conditions will be produced: Use condition compression encoding version 3 84Kbps 3 84Kbps 56Kbps User type Private consumer Private consumer Private consumption transaction type Purchase lease purchase supply date 1 Oct 1997-31 1 Oct 1997-31 1 Oct 1997 Dec 1997 December 1997 Price 1 Price 2 Price 3 4 · The components of the intermediary data SC (s) 620 described below are some types of intermediary data SC (s) 620 received for inclusion in the intermediary data SC (s) 620 data. Try pressing

O:\85\85l56 分刮.DOC -121 - 200304126 照功也及目標將資料分類成各Sc(s)組成部分。 產口口 識別碼 [src:content provider;] [dest:everybody;] 授權者品牌公司 [dest:EMS;end-user;] 被授權者品牌公司 [dest:EMS;end-user;] 該物件(被轉授權者品牌公司) 之來源(發行人) [dest:everybody;] 物件類型(亦即一單一物件或一 陣·列的物件)物件識別碼 [dest:everybody;] 國際標準錄音碼(ISRC) 國際標準音樂編號(ISMN) 使用條件(來源:内容提供者;目標:EMS、最終使用者、 清算所105) 購買使用條件(來源:EMS ;目標:最終使用者、清算所 105) 使用該物件(錄音)的該組使用條件(消費者的限制及 權利) 該陣列的使用條件中之一個別資料項 該使用條件適用的内容丨13之壓縮編碼版本 該使用條件係適用於内容Π 3的購買或租用 對於租用而言: 用來限制租用條件的量度單位(例如天數、 播放次數)。 超過之後即無法再播放内容丨13的上述量度 O:\85\85156 分割 D〇c -122- 200304126 早位數。 對於講買而言: 容許最終使用者製作可播放拷貝的份數。 最終使用者可用來製作這些拷貝的媒體種 類(例如可錄製CD(CD-R)、MD、個人電 月I)。 可進行購買/租用交易的一段時間(亦即一最 終使用者只有在開始供應日之後且在最 後供應日之前才能在該使用條件的條款 下購買/租用) 最終使用者可進行該交易(或租用)的國家之 一指標 在此使用條件下的購買/租用交易價柊 加密浮水印指令及參數之一指標 須通知清算所1 〇 5的事件類型乏— 才曰標 購買資料(經過加密;可選用的資訊;來源· r、· tMS ;目標: 最終使用者、清算所105) 購買曰期 購買價格 帳單開立名稱及地址 消費者名稱及地址 消費者的國家(最佳推測)O: \ 85 \ 85l56 points. DOC -121-200304126 According to Gongye and the target classify the data into each Sc (s) component. Production port identification code [src: content provider;] [dest: everybody;] Authorized brand company [dest: EMS; end-user;] Authorized brand company [dest: EMS; end-user;] The object ( Sub-licensed brand company) Source (issuer) [dest: everybody;] Object type (that is, a single object or an array of objects) Object ID [dest: everybody;] International Standard Recording Code (ISRC) International Standard Music Number (ISMN) Conditions of Use (Source: Content Provider; Target: EMS, End-User, Clearing House 105) Purchase Conditions of Use (Source: EMS; Target: End-User, Clearing House 105) Use the object ( Recording) of the set of conditions of use (restrictions and rights of consumers) One of the individual data items in the conditions of use of the array The content to which the conditions of use apply 13 Compression-coded versions of the conditions of use are applicable to the purchase of content Π 3 or For lease: A unit of measure (such as days, playbacks) used to limit lease conditions. After this, the content cannot be played anymore. The above measurement of 13 O: \ 85 \ 85156 is divided into D〇c -122- 200304126 early digits. For buy-to-sell: Allow end users to make playable copies. The types of media that end users can use to make these copies (e.g., recordable CD (CD-R), MD, personal calendar I). A period of time during which a purchase / rental transaction is possible (that is, an end user can purchase / rent under the terms of the conditions of use only after the start of supply and before the last supply date) The end user can make the transaction (or lease ) One of the country ’s indicators is the purchase / rental transaction price under this condition of use 柊 one of the indicators and parameters of the encrypted watermark must notify the clearing house 1 05 the event type is lacking-only the standard purchase information (encrypted; optional) Source; r, tMS; target: end user, clearing house 105) purchase date purchase price bill issue name and address consumer name and address consumer country (best guess)

中介資料1(來源:内容提供者;目標·· EMS、B 取終使用者) 一陣列的{ ΟΛ85\85156 分’剂 DOC -123 - 200304126 著作權資訊 屬於作曲的 屬於錄音的 歌曲名稱 主要藝人 } 下列事項的一指標{ 美術品(例如專輯封面); 美術品的格式(例如GIF、JPEG); } 可選用的資訊: 一陣列的額外資訊{ 作曲者 發行人 製作人 伴奏者 錄音日期 發行曰期 歌詞 歌曲名稱(說明)/歌曲長度 該錄音出現的專輯清早 類型 } 中介資料2(來源:内容提供者;目標:EMS) O:\85\85156 分剖 DOC -124- 200304126 同一錄音的不同品質等 一陣列的結構,每一結構代表 級{ 該錄音; 該錄音的品質等級; (可能經過壓縮的)該綠音 位); 之長度(以位 元組為單 中介資料3(來源:内容提供者 者) 可選用的資訊·· 目標· EMS、最終使用 促銷材料: 下列藝人促銷材料的一指柄 該藝人網站的一網址; 遠藝人的的背景描述·, 與藝人有關的訪問(連 字、音訊、視訊; 同該訪問的格式(例如文 ” -π你八(例糾人卞, ^本片段(及其格式及壓縮等級); 取近及即將來臨的音樂會 位置; 啤/事件-其日期及 下列專輯促銷材料之一指標( 樣本片段(及其格式及壓縮等級); 製作人、及(或)作曲者、及(或)電影 戰劇/演員班底、Intermediary data 1 (source: content provider; target · EMS, B end-user) An array of {ΟΛ85 \ 85156 cents' agent DOC -123-200304126 copyright information belongs to the composition of the song title of the recording artist main} The following An indicator of the matter {art (eg album cover); art format (eg GIF, JPEG);} optional information: an array of additional information {composer publisher producer accompaniment recording date release date lyrics Song name (description) / song length Early morning type of the album in which this recording appeared} Intermediate data 2 (Source: Content provider; Target: EMS) O: \ 85 \ 85156 Anatomy of DOC -124- 200304126 Different qualities of the same recording, etc. The structure of the array, each structure represents the level {the recording; the quality level of the recording; (possibly compressed) the green phoneme); the length (in bytes as a single medium) 3 (source: content provider ) Available Information · · Objectives · EMS, Final Use Promotional Materials: One finger of the following artist's promotional materials, one URL of the artist's website; Background description ·, Artist-related interviews (ligatures, audio, video; the format of the interview (such as the text "-π 你 八 (example corrections, ^ this fragment (and its format and compression level); close And upcoming concert locations; beer / events-their dates and one of the indicators for the following album promotional materials (sample clips (and their format and compression levels); producers, and / or composers, and / or movie battles Drama / actor team,

0_\85\85丨56 分刮 DOC -J25- 200304126 及(或)專輯的製作等的背景說明; 如文字 與非藝人有關㈣問(連同料問的 音訊、視訊)); °八(例 類型 評論(連同評論的格式(例如文字、音訊、、 — 視吞 單曲促銷: 樣本片段(及其格式及壓縮等級) 製作人、,(或)作曲者、及(或)電影/戲劇/演員班底、 及(或)單曲的製作等的背景說明。 - 評論(連同評論的格式(例如文字、音訊、视 5_雙監控的發行工具程式 )) /監控的發行工具程式讓使用者能夠執行前文所述之 受監控的發行程序8〇6。被内容提供者⑻指定為得到受於 ㈣發行授權之個人可召集—個等候受監控的發行之一產 品(斫即在受監控的發行程序806的佇列上等候之一產 品),檢查其内容113及其附加的註釋,並且 核准其内容U3,並釋出該產品,以便包封在—中介資 料 SC(s) 620, 、 或 作任何必需的更正,並釋出該產品,以便包封在一中介 資料SC(s) 620 ,或 附加一個規定所要採取的更正行動之註釋,並重新將該 產&amp;父到手動式中介資料輸入程序704。 O:\85\85 丨 56 分割.D〇c -126- 200304126 σ ^另—貫施例中,在產生sc⑷之後,有另—個可選用 品質保證步驟,此陆-p 、、 時可開啟SC⑷的内容113,並檢杳咳内 客Π3的完整性及正破从 卫私且3内 產品釋出到零售通路作出芒絲㈣、&quot;才疋否要將巧 乍出取後的核准或拒絕的決定。 D·内容處理工具程式 内谷處理工具程士 1《余L e 只,丁、上疋用來處理數位内容檔案 加上浮水印的、編碼的、及加密的内容之一組軟體 工^程式。該等工具程式利用工業標準的數位内容處理工 具程式,而在技術有所進展時,可以外掛方式更換加上浮 水印、編碼、及加密技術。如果可經由一命令行系統呼叫 介面載入所選擇的該工業標準工具程式,並將參數傳送到 孩^具程式,或提供一可經由一DLL介面而呼叫函式之工 具私式套件,則可將内容處理自動化到相當的程度。每一 工具程式的一前端應用程式查詢内容處理工且程式155中 ㈣當侍列中是否有下一個可進行的工作,麵取所需的 田木及參數,然後載入該工業標準的内容處理工具程式, 以便執行所需的功能。於完成該工作時,如果該:具程式 並未回報終止狀態,則可能需要以人工方式更新該㈣。 現在將說明内容處理工具程式155的一般性版本,但是 使用者自訂的版本也是可能的。可以Java、c/c++、或任何 等效叙體來撰寫内容處理工具程式155。可利用其中包括軟 碟、光碟等任何電腦可讀料裝置或經由一網站而配送内 容處理工具程式155。 1 ·浮水印工具程式0_ \ 85 \ 85 丨 56 background description of DOC-J25- 200304126 and / or album production, etc .; if the text is related to non-artists (with the audio and video of the question); ° 8 (example type Reviews (along with the format of the reviews (eg, text, audio ,, — visual singles promotions: sample clips (and their format and compression level) producers, (or) composers, and / or film / drama / actor groups , And / or single background production, etc.-Comments (along with the format of the comments (eg text, audio, video 5_ dual-monitoring distribution tool program)) / monitoring distribution tool program allows users to execute the previous text The monitored distribution program 806. Individuals designated by the content provider as authorized by the distribution authority may convene a product awaiting monitored distribution (i.e., under the monitored distribution program 806). One of the products waiting on the queue), check its content 113 and its attached notes, and approve its content U3, and release the product so as to be enclosed in — intermediary information SC (s) 620, or make any necessary Correct and release the product to enclose an intermediary data SC (s) 620, or attach a note specifying the corrective action to be taken, and re-enter the product &amp; parent to the manual intermediary data entry program 704. O: \ 85 \ 85 丨 56 segmentation. D〇c -126- 200304126 σ ^ Another-In the embodiment, after generating sc⑷, there is another optional quality assurance step, which can be turned on at -p,, The content of SC⑷ 113, and check the integrity of the internal customer Π3 and is breaking from the release of private products and retail products to the retail channel to make Meng Si, &quot; Decision of rejection. D. Content processing tools Cheng Gu processing tools Cheng Shi 1 "Yu Le e, Ding, Shangying used to process digital content files plus watermarked, encoded, and encrypted content, a group of software workers ^ Programs. These tool programs use industry standard digital content processing tool programs, and when the technology progresses, they can be replaced in a plug-in manner with watermarking, encoding, and encryption technology. If they can be loaded via a command line system call interface The selected job Standard tool program, and pass parameters to the child program, or provide a tool private package that can call functions through a DLL interface, which can automate the content processing to a considerable degree. A front end of each tool program The application queries the content processor and whether there is the next work available in the queue in the program 155. Take the required fields and parameters, and then load the industry standard content processing tool program in order to execute the required When the task is completed, if the program does not report the termination status, you may need to update the card manually. The general version of the content processing tool program 155 will now be explained, but the user-defined version Is also possible. The content processing tool program 155 can be written in Java, c / c ++, or any equivalent. The content processing tool program 155 may be distributed using any computer-readable device including a floppy disk, a compact disc, or the like, or via a website. 1 · Watermark tool program

O:\85\85156 分辄DOC -127- 200304126 浮水印工具程式讓使用者能夠執行前文所述的加入浮 水印程序808。該工具程式利用音訊浮水印技術,將内容113 所有人的著作權資訊施加到歌曲檔。内容提供者丨〇丨及特定 的浮水印技術決定了將要被寫出的實際資訊。前端的浮水 印工具程式可取得該資訊,因而該浮水印工具程式可適當 地將該資訊傳送到加上浮水印函式。此種方式對中介資料 同化及輸入工具程式161有了同步的要求,以便保證該中介 資料同化及輸入工具程式161先取得該資訊,然後才容許該 歌曲的音訊檔被處理。在未取得該浮水印資訊之前,將無 法對遠歌曲進行音訊處理。 浮水印的施加是音訊處理的第一步驟,這是因為該步驟 是對所創作歌曲的所有編碼之共同步㉟。只I該浮水印能 夠經過編碼技術的考驗,則只需對每一首歌進行一次的加 浮水印程序。 各種加浮水印技術都是習知的且可在市場上取得的。然 而則崎的 &gt;于水印工具程式可支援各種工業標準的浮水 工具程式。 2·預先處理及壓縮工具程式 預先處理及壓縮工具程式可讓使用者能夠執行前文所 述《預先處理及壓縮程序_。音訊編碼涉及兩個程序 :基t上是對(―音樂内容例子中之卜PCM音訊流施行— 耗知的壓縮演算法。通常可調整編碼器,以便根據所泰 的:貝等級’而產生各種播放位元流傳輸速率。輕合 的品質將會造成較大的檔案容量’而且因為高品質心:O: \ 85 \ 85156 辄 DOC -127- 200304126 The watermark tool program allows users to execute the watermark adding procedure 808 described above. The utility uses audio watermarking technology to apply copyright information of 113 content owners to song files. The content provider 丨 〇 丨 and the specific watermark technology determine the actual information to be written. The front-end watermarking tool program can obtain this information, so the watermarking tool program can properly transmit the information to the watermarking function. In this way, there is a synchronization requirement for the intermediary data assimilation and input tool program 161 in order to ensure that the intermediary data assimilation and input tool program 161 obtains the information before allowing the audio file of the song to be processed. Until the watermark information is obtained, audio processing of remote songs will not be possible. The application of a watermark is the first step in audio processing because this step is a simultaneous synchronization of all encodings of the song being composed. As long as the watermark can pass the test of the coding technology, it only needs to perform the watermarking procedure once for each song. Various watermarking techniques are well known and available on the market. However, Saki's &gt; Yu watermark tool program can support a variety of industry standard floating tool programs. 2. Pre-processing and compression tool program The pre-processing and compression tool program allows the user to execute the "pre-processing and compression program_" described above. Audio coding involves two procedures: the implementation of the PCM audio stream in the music content example—a known compression algorithm. The encoder can usually be adjusted to produce a variety of Play bit stream transmission rate. Lightweight quality will cause larger file capacity 'and because of high quality:

O:\85\85 丨 56 分割.DOC -128- 200304126 Π 3之檔案容量可能會變得太大,所以高品質内容1丨3的下 載時間可能變得太長,因而有時會禁止使用標準的28,8〇〇 bps的數據機。 因此,内客提供者1 〇 1可能提供各種數位内容品質以供 下載’以便能夠滿足沒有耐心且使用窄頻網路之客戶,這 些客戶不想耗用幾個小時等候下載;同時能夠滿足音響迷 或使用寬頻網路的客戶,這些客戶或者是只購買高品質的 内容113,或具有較高速度的連線。 壓%演算法在其技術上有所變化,以便產生内容丨13的 較低位元傳輸速率之再生。可以演算法(亦即mpeg、ac3、 MRAC)及壓縮等級來改變該技術。&amp; 了獲得較高的壓縮 等級,在將資料傳送到壓縮演算法之前,通常先以最低的 抽樣=將該資料重新抽樣。為了在傳真度的耗損較小的情 形下得到更有效率的壓縮,或者為了避免某些頻率範圍有 極端的信號失落,數位内容有時可能需要對某些頻率的等 化位準進行調整,或對錄音的動態範圍進行調整。内容預 先處理的要求與壓縮演算法及所需的壓縮等級有直接的相 關:生。在某些情形中,可成功地利用内容113 =類型)作為決定預先處理要求的—基礎,這是因為同-Γ:型内的歌曲通常具有類似的動態範園。使用某-壓 Γ使::時’這些預先處理的功能是編碼程岸的-部 執行所需的預先處理。時係、在執行壓縮之前,先 首歌曲也具有一 除了供销售的可下載音訊檔之外,每一O: \ 85 \ 85 丨 56 divided. DOC -128- 200304126 Π 3's file capacity may become too large, so the download time of high-quality content 1 丨 3 may become too long, so sometimes the use of standard The 28,800bps modem. Therefore, the internal customer service provider 010 may provide a variety of digital content quality for downloading, so as to satisfy customers who are impatient and use a narrow-band network. These customers do not want to spend several hours waiting for downloads. Customers using a broadband network, these customers either buy only high-quality content 113 or have a higher speed connection. The compression algorithm has changed in its technology in order to produce a lower bit rate reproduction of the content. Algorithms (ie mpeg, ac3, MRAC) and compression levels can be used to change this technique. &amp; In order to obtain a higher compression level, the data is usually resampled with the lowest sample before being sent to the compression algorithm. In order to get more efficient compression with less loss of facsimile, or to avoid extreme signal loss in some frequency ranges, digital content may sometimes need to adjust the equalization level of some frequencies, or Adjust the dynamic range of the recording. The content pre-processing requirement is directly related to the compression algorithm and the required compression level: generation. In some cases, content (113 = genre) can be successfully used as a basis for determining pre-processing requirements, because songs within the same -Γ: type usually have similar dynamic patterns. The use of a certain-pressure Γ makes :: h 'these pre-processing functions are the pre-processing required by the -part of the encoding process. Time, before performing the compression, the first song also has a downloadable audio file

0:\85\85丨56 分割.DOC -129- 200304126 低位元傳輸速率(Low Bit Rate ;簡稱LBR)編碼片段,可利 用-LBR位元流協定而將該首歌曲抽樣。該咖編碼也是 内容處理工具程式155的責任。内容提供者⑼提供該片段 作為一獨立的PCM檔,或作為偏移量及長度之參數。 與加浮水印的情形相同’我們希望可經由―肌或命令 行系統呼叫介面而載入編碼工具程式,並傳送所有必須: 參數到該等編碼工具程式,以供預先處理及壓縮。例如, 如果内容是音樂,且如果決定在執行任何音訊處理之前先 ^内容提供者的資料庫16G取得該歌曲的類型,則可能要求 則端編碼工具程式與中介資料同化及輸入工具程式⑹同 步。上述情形係取決於所選擇的編碼工具程式、及該歌曲 類,的^找性。如果内容提供者⑻對每首歌曲都改變編 ’、·貝等、.及的選擇’則也在編碼步驟之前先提供該資訊, I該資訊與中介資料同化及輸入工具程式i6i所產生的中 介資料一致。 目:已知有各種高品質的編碼演算法及工具程式。炊 而’前端編碼工具程式可支援各種工業標準的編碼工具程 式。 、月參閱圖12’目中示出根據本發明的圖8所示自動 I貝料取件工具程式的一實施例之流程圖。本程序開始 2自内#提供者1G1正在檢查的媒體讀取—識別碼。内容 中。^子即疋一音樂CD實施例。在一音樂CD實施例 ’可,得下列的代碼··通用價格碼(Universal Price 6稱UPC)、目際標準錄音碼(Inte咖如―s恤0: \ 85 \ 85 丨 56 divided. DOC -129- 200304126 Low Bit Rate (LBR) coded segment, the song can be sampled using the -LBR bit stream protocol. This coffee code is also the responsibility of the content processing tool program 155. The content provider does not provide the segment as a stand-alone PCM file, or as an offset and length parameter. As in the case of watermarking, we want to load encoding tool programs through the “muscle or command line system call interface” and send all necessary: parameters to these encoding tool programs for pre-processing and compression. For example, if the content is music, and if it is decided to obtain the type of the song from the content provider's database 16G before performing any audio processing, the end-encoding tool program may be required to synchronize with the intermediary data assimilation and input tool program. The above situation depends on the selected coding tool program and the searchability of the song category. If the content provider changes the compilation of ', ·, etc., for each song', then the information is also provided before the encoding step. I The information is interspersed with the intermediary data assimilation and input tool program i6i The information is consistent. Objective: Various high-quality encoding algorithms and tools are known. The 'front-end coding tool program can support a variety of industry-standard coding tool programs. Referring to Fig. 12 ', a flowchart of an embodiment of the automatic Ipe material retrieval tool program shown in Fig. 8 according to the present invention is shown. This program starts 2 The media read-identification code that is being inspected by the provider # 1G1. Content. ^ This is an embodiment of a music CD. In the example of a music CD, you can get the following codes: Universal Price Code (Universal Price 6 called UPC), Inter-standard Standard Recording Code (Inte Coffee such as s-shirt

ΟΛ85\85 丨 5ό 分割.DOC -130· 200304126ΟΛ85 \ 85 丨 5th segmentation. DOC -130200304126

Recording Code ;簡稱ISRC)、國際標準音樂編號 (International Standard Music Number ;簡稱ISMN)。在步 驟^⑴中,在適當的播放裝置(例如,對音樂cd而言是音 樂CD唱盤,對DVD電影而言是DVD影碟機、對dat數位^ 錄音帶或等效物而言是DAT錄音機)中讀取内容的識別 碼。然後在步驟1202中,利用該識別碼作為索引而搜尋内 容提供者ιοί之資料庫160。在步驟12〇3中,於資料庫16〇 及任何其他相關的資源中擷取圖8所示工作流程管理程序 所需的資訊之全部或部分。該資訊可包括内容113及與内容 113相關的中介資料。在步驟12〇4中,利用所擷取的額外資 訊來啟動工作流程管理程式154,以便產生電子内容 我們备了解,可將諸如數片音樂CD等的數個所選擇媒體放 到佇列中,使自動中介資料取得工具程式得以產生一系列 的内谷,以供電子式配送。例如,可自一系列的cd中產生 所有的内容113,或者甚至可自内容提供者1〇1檢視的一片 或多片CD的所選出之一些歌曲中產生所有的内容ιΐ3。 在一替代實施例中,可自動自内容提供者的資料庫丨6〇 擷取預先處理參數。現在請參閱圖13,圖中示出一種自動 設定根據本發明的圖8所示預先處理及壓縮工具程式的預 先處理及壓縮參數之方法。在該實施例中,内容113是音 樂。在步驟^…中,選擇要在内容處理工具程式155中編碼 的音樂(内容113)。在步驟1302中,決定所選擇音樂的類 型。可以人工方式輸入該音樂類型,或利用諸如自圖12 所示私序擴取的額外資料等的其他可用中介資料來決定音Recording Code; ISRC for short; International Standard Music Number; ISMN for short. In step ^ ⑴, in an appropriate playback device (eg, a music CD turntable for music cd, a DVD player for DVD movies, a DAT recorder for dat digital ^ cassettes or equivalent) Read the content identification code. Then, in step 1202, the database 160 of the content provider is searched using the identification code as an index. In step 1203, all or part of the information required by the workflow management process shown in FIG. 8 is retrieved from the database 16 and any other related resources. The information may include the content 113 and intermediary information related to the content 113. In step 1204, the captured additional information is used to start the workflow management program 154 in order to generate electronic content. We know that several selected media such as several music CDs can be placed in the queue, so that The automatic intermediary data acquisition tool program was able to generate a series of inner valleys for power distribution. For example, all content 113 may be generated from a series of cds, or even all selected content from one or more selected CDs of one or more CDs viewed by the content provider 101. In an alternative embodiment, the pre-processing parameters can be automatically retrieved from the content provider's database. Referring now to FIG. 13, there is shown a method for automatically setting the pre-processing and compression parameters of the pre-processing and compression tool program shown in FIG. 8 according to the present invention. In this embodiment, the content 113 is music. In step ^ ..., the music (content 113) to be encoded in the content processing tool program 155 is selected. In step 1302, the type of the selected music is determined. The type of music can be entered manually, or other available intermediary data such as additional data extracted from the private sequence shown in Figure 12 can be used to determine the sound

ΟΛ85\85156 分割 D0C -131 - 200304126 樂類型。然後在步驟1303中檢 立、〜 h且所選擇的音訊壓縮等級及 縮㈣法。然後在步驟⑽中,以音樂類型、壓縮 :疋值、及壓縮演算法來查詢應在預先處理及壓縮程序_ 中使用哪些壓縮參數。 3 ·内容品質管制工具程式 内谷品質官制工具程式讓使用者能夠執行前文所述之 内容品質管制程序810。該工具程式是一種可供選用的内容 處理工具程式,且使品質㈣技術員能有機會重新檢查經 過編碼及加上浮水印的内容樓案,並根據品質衡量標準而 核准或拒絕該等内容檔案。品質管制技術員可將該内容重 新、扁碼&amp;以人工方式進行預先處理的調整,直到得到適 當的品質為止,或者將該歌曲的旗標標示為需要重新處 理,並附加一個說明問題的註釋。 内容提供者ΗΠ可將該程序步驟設定為内容處理工作流 程的一個可供選用的步驟或必須的步驟。纟包封該内容的 所有SC⑷(例如- CD上的各首歌曲之每一 sc⑷)之後,提 供了個額外的可供選用之最後品質保證程序813步驟,此 時可測試内容編碼的品質’但是能夠在加密及包封之前早 -些發現問題才能更有效率地進行内容處理。因此,非常 希望能在該步驟中保證内容的品質,而不是等到最後才完 成所有的處理。 4·加密工具程式 · 加密工具程式讓使用者能夠執行前文所述的加密程序 811。内容加密是内容處理工具程式155的最後—個步驟。 ΟΛ85\85Ι56 分割.〇〇(: -132 - 200304126 現在要將先前利用編碼工具程式產生的内容之每一版本加 密。加密工具程式是SC(s)包封工具程式的一種功能。呼叫 該SC(s)包封工具程式而將歌曲加密,並送回所產生的加密 金输。隨後將該金鑰放入SC(s)包封工具程式,以便用來產 生中介資料SC(s) 620。 E·内容SC(s)產生工具程式 旦收集了所有的中介資料之後,内容sc(s)產 式根據中介資料的預定用途而將中介資料分成若干類型 這二、’且的中貝料被寫入檔案中,而放到s c包封工具程式 作為中介資料SC(s) 620的中介資料部分。每一組成部分(檔 案)都有特有的處理要求。一旦對相關聯的歌曲進行處理及 加密,且決定了目的地(代管内容網站lu的網址)之後,即 準2產生内容113的内容Sc(s) 63〇。已完成處理且符合所 有可又所述要求的内容i 13係在仵列中等候,以便包封到工 作流程管理程式154的包封工具程式之佇列中。 内谷SC(s)產生工具程式現在擷取中介資料同化及輸入 工具程式丨6丨的各先前步驟所產生的所有必須檔案,並呼叫 各sC(s)包封工具程式函式’以便產生中介資料sc⑷㈣ 及内容SC(s) 630。該程序為每一首歌曲產生一單一中介資 料sc⑷620及多個内容sc⑷63〇。例如,如果内容是立 樂’則將在針龍首歌㈣各種品科㈣㈣音訊以 :^生的每_音崎包封到各別的内容吻)㈣。傳送 ==產生的音訊播’作為中介資料SC(⑽。中包 含的中介資料檔。ΟΛ85 \ 85156 Split D0C -131-200304126 Music type. Then in step 1303, the selected audio compression level and reduction method are checked, ~ h, and h. Then in step ⑽, use the music type, compression: threshold, and compression algorithm to query which compression parameters should be used in the pre-processing and compression program_. 3 · Content quality control tool program Uchiya quality official tool program allows users to execute the content quality control process 810 described above. This tool program is an optional content processing tool program, and it gives quality technicians the opportunity to re-examine the coded and watermarked content cases and approve or reject the content files based on quality metrics. The quality control technician can re-process the content, pre-code &amp; manually adjust it until the appropriate quality is obtained, or mark the song as re-processing and attach a note explaining the problem. The content provider ΗΠ may set this program step as an optional step or a necessary step in the content processing workflow.纟 After enclosing all SC⑷s of the content (for example-each sc 各 of each song on the CD), an additional optional final quality assurance procedure 813 step is provided, at which time the quality of the content encoding can be tested 'but Able to discover problems early before encryption and encapsulation for more efficient content processing. Therefore, it is highly desirable to ensure the quality of the content in this step, rather than wait until the end of all processing. 4. Encryption tool program Encryption tool program allows users to execute the encryption program 811 described above. Content encryption is the last step of the content processing tool program 155. ΟΛ85 \ 85Ι56 Segmentation. 〇〇 (: -132-200304126 Each version of the content previously generated by the encoding tool program is now encrypted. The encryption tool program is a function of the SC (s) envelope tool program. Call the SC ( s) Encapsulating the tool program to encrypt the song and sending it back to the encrypted encryption. The key is then placed in the SC (s) encapsulating tool program to be used to generate the intermediary data SC (s) 620. E · Content SC (s) generation tool program Once all the intermediary data has been collected, the content sc (s) production type divides the intermediary data into several types according to the intended use of the intermediary data. File, and put it in the sc package tool program as the intermediate data part of the intermediate data SC (s) 620. Each component (file) has unique processing requirements. Once the associated song is processed and encrypted, and After the destination (the URL of the hosting content website lu) is determined, the content Sc (s) 63 of the content 113 will be generated. The content that has been processed and meets all the requirements that can be described i 13 is in the queue Wait for envelop to work In the queue of the encapsulation tool program of the workflow management program 154. Uchiko SC (s) generation tool program now retrieves all the necessary files generated by the previous steps of the intermediary data assimilation and input tool program 丨 6 丨 and calls Each sC (s) wraps the tool program function 'to generate intermediary data sc⑷㈣ and content SC (s) 630. This procedure generates a single intermediary data sc⑷620 and multiple contents sc⑷63 for each song. For example, if the content is "Lele" will be in the song of the Needle Dragon ㈣ various kinds of products ㈣㈣ audio: ^ raw every _ sound Qi packaged to a separate content kiss) ㈣. Send == generated audio broadcast ’as the mediation data SC (⑽. 中’ s mediation data file.

ΟΛ85\85丨弘分割DOC -133- 200304126 F ·最後品質保證工具程式 最後品質保證工具程式 最後品質保證程序能夠執行前文所述的 srm之德,P . —已為一内容檔案建立了所有的 I7可對孩内容進行最後的 内容113準備程序的各階段上執行品質保謹。内容一提2 :1可選擇在完成每-主要步驟時執行品質保證’以避免ΐ ^的:里:作’;者可選擇等候到所有的音訊準備程序完 以1刻對母—項目執行品質保證。如果選擇後者, 則在完成Sc(s)產生的時點上執行品質保證。該工具程式可 對琢首歌曲的每—sc⑷進行開啟、檢查、及音樂播放。 發現任何問題時,縱使是很小的文字改變也要求因SC⑷ 的内邵*全特性而重新建立該吻)。為了避免不必要的重 新處理時間,我們強烈建議利用中間的品質保證步驟來保 證中介資料的精確性,我們並建議預留該特定的品質保择 步驟’用來確認與該歌曲的㈣⑷間之交互參照。如果發 :見了問題,則品保人員可輸入一個附加到該首歌曲的一問 題描述,並將該首歌曲重新放到適當的處理㈣,以供重 新處理。在工作流程管理程式154中適當地更新狀態,以便 指示該歌曲的所有相關組成部分之狀態。如並未發現任何 問題,則將内容113標示為可準備發行。 G·内容傳播工具程式 内容傳播工具程式讓使用者能夠執行前文所述的内容 傳播程序川。一旦已核准内容⑴的發行,則將内容⑴ 的SC⑷放到内容傳播程序之㈣。内容傳播工具程式監督 -J34- 0:\85\S5 丨56 分割 D〇c 200304126 該佇列,並根據内容提供者1〇1所提供的組態設定,而執行 SC(S)檔案的互即傳輸、或一組sc⑷檔案的批次傳輸。内 容提供者101亦可選擇設定内容傳播工具程式的組態,以便 自動將所有的SC⑷保存在时歹,,直到以人工方式將該 等SC(s);^7F為可發行為止。此種方式可讓内容提供者 在内容的預定發行日之前先準備該内容,並保存這些内 容,直到内容提供者想要發行諸如新歌、電影、或電玩等 的内谷為止。SC(s)亦可根據一指定發行日而控制對内容 1,13之絲,因而内容提供者1〇1實際上無須抑.jsc⑷的配 辽彳是此種人工方式的發行選項亦可用來管理傳輸較大 檔案所需的網路頻寬。 當被標示為可發行時,内容113之内容sc⑷63〇係經由 FTP而傳送到指定的代管内容網站u卜中介資料sc(s) _ 係經由FTP而傳送到内容促銷網站156。此時%⑷逐步進入 新的内容113目錄’直到可處理這些柳),並將這些 整合到内容促銷網站156為止。 /曰圖17是自動擷取根據本發明的圖8所示自動中介資料取 得工具^式的額外資訊的—替代實_之流程W。該程序 類似於前文中參照圖8所述之程序。然而,對受監控的發行 k序806的貝檢查及内容品質管制程序_係結合成一個 被稱為品質管制17G4的品質檢查。在中介資料似生程序 咖及内容SC產生程序812之前執行品質檢查產生之 則執行品質檢查時’無須打開内容113及相關聯的中介資料 SC⑷620之步驟。此外,在本實施例中,已取消了產品等ΟΛ85 \ 85 丨 Hong Divided DOC -133- 200304126 F · Final Quality Assurance Tool Program Final Quality Assurance Tool Program The final quality assurance program can perform the srm virtues described above, P. — All I7 have been created for a content file Quality assurance can be performed at each stage of the final content 113 preparation process for child content. Content mentioning 2: 1 can choose to perform quality assurance when every major step is completed to avoid ΐ ^: li: work '; the person can choose to wait until all audio preparation procedures are completed and execute the quality to the mother-item in 1 minute Guarantee. If the latter is selected, quality assurance is performed at the point when Sc (s) generation is completed. This utility program can open, check, and play music of every song. When any problems are found, even small text changes require that the kiss be re-established because of the full nature of SC⑷). In order to avoid unnecessary reprocessing time, we strongly recommend the use of intermediate quality assurance steps to ensure the accuracy of the intermediary data. We also recommend that this specific quality assurance step be reserved to confirm the interaction with the song. Reference. If you see a problem, the QA staff can enter a problem description attached to the song and relocate the song to the appropriate processing unit for reprocessing. The status is appropriately updated in the workflow manager 154 to indicate the status of all relevant components of the song. If no issues are found, the content 113 is marked as ready for distribution. G. Content Dissemination Tool Program The content dissemination tool program allows users to execute the content dissemination procedure described above. Once the distribution of content content has been approved, the content content SC will be placed in the content distribution process. Content Dissemination Tool Program Supervision-J34- 0: \ 85 \ S5 丨 56 Divide the queue D04 200304126, and execute the interaction of SC (S) files according to the configuration settings provided by the content provider 101. Transfer, or batch transfer of a set of sc files. The content provider 101 may also choose to set the configuration of the content dissemination tool program so that all SCs are automatically stored in the time frame until the SC (s) are manually assigned; ^ 7F is available for distribution. This approach allows content providers to prepare the content before its scheduled release date and save it until the content provider wants to publish Uchiya, such as a new song, movie, or video game. SC (s) can also control the content of content 1,13 according to a designated release date, so content provider 101 does not actually need to suppress it. The distribution of jsc⑷ is an artificial distribution option that can also be used to manage Network bandwidth required to transfer larger files. When marked as distributable, the content sc 内容 63 of the content 113 is transmitted to the designated hosted content website via FTP. The intermediary data sc (s) _ is transmitted to the content promotion website 156 via FTP. At this time,% ⑷ gradually enters the new content 113 directory 'until it can handle these willows) and integrates these into the content promotion website 156. Fig. 17 is a process for automatically retrieving additional information in the form of the automatic intermediary data acquisition tool ^ shown in Fig. 8 according to the present invention-instead of the actual W process. This procedure is similar to the procedure described above with reference to FIG. However, the inspection and content quality control procedures for the monitored distribution k sequence 806 are combined into a quality inspection called quality control 17G4. Perform the quality check before the intermediary data appears to be generated, and the content SC generation program 812. When performing the quality check, it is not necessary to open the content 113 and the associated intermediary data SC⑷620. In addition, in this embodiment, products and the like have been eliminated

O:\85\85156 分割.DOC -135- 200304126 候動作/資訊程序801的仵列。根據要求何種行動,而將工 :放到特疋的程序传列。例如,如果工作要求人工的中介 資枓’則輸人”卜的巾介㈣’麵該工作放到人工中介 資料輸入㈣。此外’也將自動中介資料取得程序8〇3及新 内谷要求程序合併,以便在中介資料同化及輸人工具程式 161及内容處理工具程式155之前發生。最後,重要的是要 =出:係在自動中介資料取得程序803時及自動中介資料取 得程序8(33時輸人使用條件_。這是因為可在自動中介資 料取得程序8G3步财自動填人許乡使用條件。 H.内容促銷網站 為了經由數位下載而最有效地傳播内容提供者1〇1為銷 。而k供的貝訊,並為了使電子數位内容商店ι〇3取得必要 的檔案而得以提供將内容113下載到纟客戶,每一内容提供 者101應有一個代管此類資訊的網站。此種方式類似於目前 某些内谷提供者1〇1使其零售商及其他需要此類資訊的夥 伴取彳于促銷内客所用的方法。在此類服務業已存在的情形 中’可將一額外的部分加入網站中,此時電子數位内容商 店103可經由下載而看到一份可供銷售的内容清單。 内容提供者101可完全控制該網站的設計及配置,或者 可選擇利用作為安全數位内容電子式配送系統丨〇()的工具 私式套件的一部分而提供的一組裝完備可立即啟用的網路 飼服器解決方案。為了針對該服務而實施其本身的設計, 内容提供者101只需要將到中介資料SC(s) 620的連結提供 給連線到其網站的電子數位内容商店1〇3。利用安全數位内O: \ 85 \ 85156 Divide .DOC -135- 200304126 queue of waiting action / information program 801. According to what kind of action is required, the job will be placed in the special procedure. For example, if the job requires manual intermediary resources, then “then enter”, the job will be placed in the manual intermediary data input. In addition, the automatic intermediary data acquisition procedure 803 and the Shineiya request procedure will also be entered. Merge so as to occur before the assimilation and input tool program 161 and content processing tool program 155 of the intermediary data. Finally, it is important to = out: at the time of the automatic intermediary data acquisition procedure 803 and the automatic intermediary data acquisition procedure 8 (33 hours Input conditions of use_. This is because you can fill in the conditions of use of Xuxiang in the 8G3 step of the automatic intermediary data acquisition process. H. Content promotion websites are most effective in disseminating content providers 101 for sales via digital download. In order to enable electronic digital content stores to obtain the necessary files and provide the download of content 113 to customers, each content provider 101 should have a website hosting such information. This approach is similar to the method currently used by some Inner Valley Providers 101 to get their retailers and other partners who need such information to promote internal customers. In this type of service industry There are situations where an extra part can be added to the website, at which time the digital content store 103 can download a list of content available for sale. The content provider 101 has full control over the design and configuration of the website , Or you can choose to use a fully assembled and ready-to-use webfeeder solution provided as part of the tool's private suite of secure digital content electronic distribution systems 丨 〇 (). Implement your own for this service Design, the content provider 101 only needs to provide the link to the intermediary material SC (s) 620 to the electronic digital content store 103 connected to its website. Using secure digital

ΟΛ85\85 丨 56 分割 DOC -136 - 200304126 谷電子式配送系統1 0 0的工具程式套件即可達到上述目 的。内谷提供者10 1將自行決定該選擇程序及所要顯示的資 訊。 内容促銷網站15 6處理經由FTP而自内容傳播工具程式 接到一新内容目錄的中介資料Sc(s) 620。可利用Sc(s)預覽 工具程式開啟容器物件,以便顯示或提取容器物件的資 訊。然後可利用該資訊更新HTML網頁及(或)將資訊加到一 個由該服務所維護的可搜尋資料庫。該Sc(s)預覽工具程式 貝際上疋電子數位内容商店1〇3用來開啟及處理中介資料 SC(s) 620的内容取得工具程式之一子集。然後應將中介資 料SC(s) 620檔案移到一個由内容促銷網站ι56維護的永久 性目錄。 一旦將中介資料SC(s) 620整合到内容促銷網站156之 後,即可公告可取得該中介資料sc(s)62〇。當將一個新的 中介資料SC(s) 620加入網站時,内容提供者1〇1可將一通 知傳送到所有的訂閱電子數位内容商店1〇3,或者内容提供 者1〇1可每天(或指定的定期)將這一天(或這段期間)中加入 的所有中介資料SC(s) 620作單一的通知。係傳送一包含對 照到所加入中介資料SC(s) 620的參數之指定CGI訊息串, 而經由一個與電子數位内容商店103網路伺服器的標準 HTTP交換而執行該通知。電子數位内容商店1〇3的通知介 面模組(將於下文中說明)處理該訊息。 I·内容代管 演藝事業每年產生幾千個諸如CD、電影、及電玩等的内 0:\85\85丨50 分别.D〇c -137- 200304126 容節目,再加上現有的以萬為單位的内容節目。安全數位 内容電子式配送系統100被設計成可支援目前可自商店取 得的所有内容節目。 安全數位内容電子式配送系統100最後每天可下載到客 =的内容節目之數目係以千或萬為單位。料大量的内容 即目而&quot;F,需要大量的頻寬Q電腦硬碟儲存空間及頻寬都 需要對多個代管内容網站lu進行分散式且可擴展的配 置。該系統也支援世界各地的客戶。因而需要海外的網站 來加速對全球性客戶的配送。 、安全數位内容電子式配送系統100上的内容代管被設計 成·可讓内容提供者101管理其本身的内容,或共用一組共 同的設施或一組設施。 安全數位内容電子式配送系統100上的内容 多個代管内容網站m ’這些代管内容網站⑴合而包:安 全數位内容電子式配送系統⑽提供的所有内容ιΐ3 ;以及 數個辅助内容網站(圖中未示出),這些辅助内容網站包含 内容提供者101提供的若干現行熱賣產品。代管内容網站 1U的數目係根據使用該系統的最終使用者數目而改變。輔 助内容網站只存有數目有限的歌曲’但是這些網站代表了 孩系統上所使用的—個相當大百分率的頻寬。當主要網站 的容量增加到最大容量點時,即將該等輔助網站上線。辅 助網站可位於接近網路接取點(Netw〇rk “咖:簡稱 )處以便有助於加速下載時間。亦可將輔助網站置於 世界上的不同地理區域,以便加速下載時間。ΟΛ85 \ 85 丨 56 segmentation DOC -136-200304126 The tool program package of Valley Electronic Distribution System 100 can achieve the above purpose. Uchiya Provider 101 will determine the selection process and the information to be displayed. The content promotion website 15 6 processes the intermediary data Sc (s) 620 from the content distribution tool program via FTP to a new content directory. You can use the Sc (s) preview tool to open the container object in order to display or extract information about the container object. This information can then be used to update HTML pages and / or add information to a searchable database maintained by the service. The Sc (s) preview tool program is a subset of the content acquisition tool program used by Beiji Shangyu Electronic Digital Content Store 103 to open and process intermediary data SC (s) 620. The SC (s) 620 archive should then be moved to a permanent directory maintained by the content promotion website ι56. Once the intermediary material SC (s) 620 is integrated into the content promotion website 156, it can be announced that the intermediary material sc (s) 62 can be obtained. When a new intermediary material SC (s) 620 is added to the website, the content provider 101 can send a notification to all subscribed digital content stores 103, or the content provider 101 can be daily (or (Specified periodical) All notifications SC (s) 620 added on this day (or this period) are notified in a single. It sends a specified CGI message string containing parameters corresponding to the added intermediary data SC (s) 620, and the notification is performed via a standard HTTP exchange with the electronic digital content store 103 web server. The notification interface module of the digital content store 103 (described below) processes the message. I · The content hosting and performing business produces thousands of internal 0: \ 85 \ 85 丨 50 such as CDs, movies, and video games. Unit content program. The secure digital content electronic distribution system 100 is designed to support all content programs currently available from stores. The number of content programs that the secure digital content electronic distribution system 100 can finally download to customers every day is in thousands or tens of thousands. A large amount of content is expected at the moment, &quot; F requires a large amount of bandwidth. Computer hard disk storage space and bandwidth both require distributed and scalable configuration of multiple hosted content websites. The system also supports customers around the world. Therefore, overseas websites are needed to accelerate the delivery to global customers. The content hosting on the secure digital content electronic distribution system 100 is designed to allow the content provider 101 to manage its own content, or to share a common set of facilities or a set of facilities. Content on the secure digital content electronic distribution system 100 Multiple hosted content sites m 'These hosted content sites are combined: all content provided by the secure digital content electronic distribution system⑽3; and several auxiliary content sites ( (Not shown in the figure), these auxiliary content websites contain several current hot-selling products provided by the content provider 101. The number of hosted content sites 1U varies according to the number of end users using the system. Auxiliary content sites only have a limited number of songs ’, but these sites represent a fairly large percentage of the bandwidth used on children ’s systems. When the capacity of the main website is increased to the maximum capacity point, such auxiliary websites will be put online. Auxiliary websites can be located close to the Internet access point (Network: Coffee) for faster download times. They can also be located in different geographic regions of the world to speed up download times.

〇Λ85\85156 分别.D0C -138- 200304126 如果内容提供者101選擇將所有其内容&quot;3放在其自身 的系統,則可將該網站視為具有或未具有額外辅助内容網 站的單一代管内容網站J丨i。 此種万式可讓内容提供者建立 其本身的可擴展之分散式萃絲 狀八系統。在另一實施例中,電子數 位内容商店U)3亦可作為某些内容113的代管内容網站 111 H施例要求在電子數位内容商店1G3與内容提供者 101之間有特殊的金融協定。 1·代管内容網站 本說明書的内容提供者一節說明的内容傳播工具程式 經由FTP或HTTP將内容113加入代管内容網站丨丨丨,或經由 諸如在磁帶、CD-ROM、快閃記憶體、或其他電腦可讀取 的媒體上配送内容等的離線裝置而將内容113加入代管内 容網站111。内容提供者1〇1產生的中介資料Sc(s) 62〇包含 一欄位,用以指示找出内容Π3的内容sc(s) 630之網址。 該網址對應於一代管内容網站111。電子數位内容商店i 〇3 如果得到内容提供者101在報價SC(s) 641中的許可,則可 越過該網址。當最終使用者裝置109想要下載内容SC(s) 630時,最終使用者裝置1 〇9即連線到代管内容網站1丨!。 最終使用者裝置109將授權許可SC(s) 660傳送到代管内 容網站111,而提出對内容SC(s) 630的要求。該授權許可 SC(s) 660是清算所105所傳送回的相同授權許可SC⑷ 660。可驗證授權許可SC(s) 660的數位簽名,以便決定該 授權許可SC(s) 660是否為一有效的授權許可SC(s)。如果該 授權許可SC(s)是一有效的授權許可SC(s),則開始下載, O:\85\85 丨 56 分’刻.d〇c -139- 200304126 或可將下載要求轉向到另一代管内容網站1 1 1。 2.安全數位内容電子 送系統ι〇〇提供的 lu &amp;鬥各網站 對於安全數位内容電子式配送系統100而言,接收豐子 内谷SC(s) 630的起始要求之主要内容網站決定 趣利用哪 一個、,,罔站來下載内容丨13。該網站利用下列資 定: 1下出上述決 是否有存放所要求内容113之輔助内容網站?(安入數 位内容電子式配送系統1〇〇所提供的内容113 '^大^邵分 係只存放在主要網站); 最終使用者裝置109位於哪一地理區?(當最終使用者 裝置109提出該要求時,可自該最終使用者裝置1 得到 此一資訊,並將該資訊放到訂單3以〇65〇中而傳送=清 算所105) ; ^ 是否有適當的辅助網站且在工作中?(辅助網站有時可 能是離線的); 辅助網站的負載為何?(在一辅助網站忙於處理存取活 動的某些情形中,可選擇較不忙碌的另一網站。 在將内容SC(s) 630傳送到最終使用者裝置1〇9之前,先 對最終使用者的要求執行分析及驗證。一資料庫存放了曾 用來下載内容113的所有授權許可%⑷之識別碼。可檢查 該資料庫’以便確保最終使用者裝置1〇9只對所購買的每一 件内容⑴提出-個要求。此種方式可避免惡意的使用者重 複存取代管内容網站⑴而嘗試減緩代管内容網站⑴的存 O:\85\85156 分割.DOC -140- 200304126 取速度,並防止對内咖⑷㈣作未經授權的下載。 係根據客卢對個別件的内容113之需求,而定期執行增 加或減V將内容1丨3放到輔助内容網站。 内容代管路由器 内合代f路由器(圖中未示出)係設於代管内容網站1工工 中,且接收最終使用者想要下載内容1 1 3的所有要求。該内 谷代官路由器執行對最終使用者要求的驗證檢查,以便確 保最終使用者確實已購買了内容113。在一資料庫中維護了 各輔助内谷網站的狀態,該狀態包括哪些内容113係存放在 這些辅助内谷網站、及這些輔助内容網站的現行狀態。該 見行狀μ包括網站上的存取活動量、及一網站是否因維護 作業而關閉。 4内么代管路由器的唯一介面是當要求下載内容113時 最終使用者裝置109所傳送的授權許可sc(s) 660。授權許 可SC(s) 660包含用來指示該使用者被容許下載内容113的 資説。 辅助内容網站 輔助内容網站(圖中未示出)存有安全數位内容電子式配 送系統100的熱門内容113。這些網站在地理上係分佈在世 界各地’且設於接近網路接取點(NAP)處,以便縮短下載 時間。當對主要代管内容網站111的需求接近最大容量時, 即將這些輔助内容網站加入系統中。 IX·電子數位内容商店 Α·概述-對多個電子數位内容商店103之支援〇Λ85 \ 85156 respectively. D0C -138- 200304126 If the content provider 101 chooses to place all its content &quot; 3 on its own system, the website can be considered as a single host with or without additional auxiliary content websites Content website J 丨 i. This type of content allows content providers to build their own scalable decentralized filiform eight systems. In another embodiment, the electronic digital content store U3) may also serve as a hosted content website 111 for certain content 113. The embodiment requires a special financial agreement between the electronic digital content store 1G3 and the content provider 101. 1. Hosted content website The content distribution tool program described in the content provider section of this manual adds content 113 to the hosted content website via FTP or HTTP 丨 丨 丨, or via, for example, tape, CD-ROM, flash memory, Or other offline devices that distribute content, etc. on other computer-readable media, and add the content 113 to the hosting content website 111. The intermediary data Sc (s) 62 generated by the content provider 101 includes a field for instructing to find the URL of the content sc (s) 630 of the content III. This URL corresponds to the one-generation content website 111. The electronic digital content store i 〇 3 can get over this website if it has permission from the content provider 101 in the offer SC (s) 641. When the end-user device 109 wants to download the content SC (s) 630, the end-user device 1 09 is connected to the hosted content website 1 丨! . The end-user device 109 transmits a license SC (s) 660 to the hosted content website 111, and requests a content SC (s) 630. The license SC (s) 660 is the same license SC⑷ 660 transmitted back by the clearing house 105. The digital signature of the license SC (s) 660 can be verified to determine whether the license SC (s) 660 is a valid license SC (s). If the license SC (s) is a valid license SC (s), the download will start, O: \ 85 \ 85 丨 56 minutes' tick.d〇c -139- 200304126 Or you can transfer the download request to another Generation tube content website 1 1 1. 2. For the secure digital content electronic delivery system lumoo, each website is determined by the main content website for the secure digital content electronic distribution system 100 to receive the initial request of Toyoko Uchiya SC (s) 630 Which one to use? ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, 13, The website uses the following assets: 1. Make the above decision. Is there an auxiliary content website that stores the required content 113? (The content provided by the Digital Content Electronic Distribution System 100 is stored in the main website only on the main website); In which geographic area is the end-user device 109 located? (When the request is made by the end-user device 109, this information can be obtained from the end-user device 1, and the information can be transmitted in order 3 to 0650, = clearing house 105); ^ Is it appropriate Secondary site and at work? (Auxiliary websites can sometimes be offline); What is the load on the auxiliary website? (In some cases where a secondary website is busy processing access activities, another website that is less busy may be selected. Before transmitting content SC (s) 630 to end-user device 109, Analysis and verification of the requirements. A database holds the identification codes of all licenses used to download the content 113. The database can be checked to ensure that the end-user device 109 only A content request was made. This method can prevent malicious users from repeatedly storing and replacing content hosting websites and trying to slow down the hosting of content hosting websites. O: \ 85 \ 85156 segmentation. DOC -140- 200304126 speed , And prevent unauthorized download of internal coffee. According to Kelu's demand for the content 113 of individual pieces, regularly increase or decrease V to put content 1 丨 3 on the auxiliary content website. Content hosting router The co-generation f router (not shown in the figure) is set up in the hosted content website 1 and receives all the requests from the end user to download the content 1 1 3. The Uchiya Daikan router performs the requirements for the end user Verification check to ensure that the end user has indeed purchased the content 113. The status of each auxiliary inner valley site is maintained in a database, which includes which content 113 is stored on these auxiliary inner valley sites and these auxiliary content sites The current status μ includes the amount of access activity on the website and whether a website is closed due to maintenance. The only interface of the hosted router is when the content of the 113 is requested to be transmitted by the end-user device 109 License sc (s) 660. License SC (s) 660 contains information to indicate that the user is allowed to download content 113. Auxiliary content sites Auxiliary content sites (not shown) have secure digital content Popular content 113 of the electronic distribution system 100. These sites are geographically distributed around the world 'and are located close to a network access point (NAP) to reduce download time. Demand for major hosted content sites 111 When the maximum capacity is approached, these auxiliary content websites are added to the system. IX · Electronic Digital Content Store Α · Overview-For multiple electronic digital content Shop 103 Support

⑽5X85156 分割 DOC -141 « 200304126 電子數位内容商店i 03本質上是零售商。這些電子數位 内容商店是行銷内容113以便將内容丨13配送到客戶之實 。對於内容113的配送而言,該系統將包含數位内容零售 網站、數位内容零售店、或想要涉入將電子内容113配送到 消費者的任何企業。這企業可以只行銷電子内容丨丨3,或者 可選擇將電子式貨品的銷售加入其目前用來銷售的其他行 銷官通中。經由為電子數位内容商店1〇3開發而為安全數位 内谷電子式配送系統1 〇〇的一部分之一組工具程式,即可完 成將可下載的電子式貨品導入電子數位内容商店1〇3的服 務提供中。 %子數位内容商店丨03利用這些工具程式來進行下列事 項: 取得内谷提供者101所包封的中介資料Sc(s) 620。 自這些Sc(s)提取内容113,而用來作為建立其服務提供 之輸入。 產生用來為述其提供銷售的可下載内容Μ之報價sc(s) 641 〇 藉由交易SC(S) 640的產生並將該交易%⑷64〇傳送到 最終使用者裝置1G9,而處理銷售的確認及下載的啟動。 官理可下載内容113的銷售之交易記錄、及每-次下載 的狀態。 處理狀態通知及交易確證要求。 執行帳戶一致性確認。 這些工具程式被設計成可交 风j各4电子數位内容商店1〇3希 O:\85\85l 56 分割 D〇c -142 - 200304126 望將可下載電子内容113的銷隹敕 。正合到其服務的方式之彈 性。可以下列的方式使用這此 二工具式:縱使不是必要的, 也要求清算所105處理所購買 只7 J下載内容113之所有金融 結算。這些工具程式也可讓雷 β、 喊包子數位内容商店1〇3完全服務 /、客戶’並自行處理金融交R 甘山 馬其中包括提供促銷及特價 供應。這些X具程式可讓電子數㈣容商店⑻迅速地將可 下載内容113的銷售整合到其現有的服務中。此外,電子數 位内容商店103無須設有可下截囟六 、 卜戰内谷11 3的網站,且無須管 理内谷113的傳送。係由内玄ρ 田鬥备I疋供者10丨所選擇的代管内容 網站111執行上述的功能。 、在車乂佳貫施例中,係利用iava來實施用於電子數位内容 :店103的各工具程式,但是亦可使用諸如c/c++、組合語 言及等效語言等其他的程式語言。我們當了解,可在多種 更把及庠人平台上執行用於電子數位内容商店1〇3而將於 下文中說明之琢等工具程式。可以一電腦可讀取的媒體中 的一應用程式之形式配送作為一完整系統或一完整系統的 、’且成崢分之電子數位内容商店丨〇3,該電腦可讀取的媒體包 括(彳-不限於)諸如網路的電子式配送、以及軟碟、 CD-R〇m、及抽取式硬碟機。 在另一實施例中,電子數位内容商店103的各組成部分 疋一程式設計師的軟體工具程式套件的一部分。該工具程 式套件起動將於下文中說明的一般性電子數位内容商店 〇 3、、且成σ卩分及工具程式之預定介面。這些預定介面的形式 為應用程式介面(Αρι)。使用這些Αρι的開發人員可自一高 ΟΛ85\85156 分刮.D〇c -143 - 200304126 階應用程式執行該等組成部分之任何功能。由於提供這些 組成部分的API,所以程式設計師可迅速地開發出一自訂 規格的電子數位内容商店1 〇3,而無須重新設計任何這些組 成邵分的這些功能及資源。 電子數位内容商店1 03並不限於網路型的服務提供。想 要銷售可下載電子内容113的所有電子數位内容商店103都 可使用所提供的該等工具程式,而不必顧及用來將内容1 1 3 配送到最終使用者的傳輸基礎設施或傳送模式。經由衛星 或纜線基礎設施而提供的廣播服務也利用這些工具程式來 取得、包封、及追蹤電子内容113的銷售。供銷售的電子式 貨品之展現方式及將這些電子式貨品配送到最終使用者的 方法是廣泛型服務提供與點對點互動網路型態服務提供之 間主要的不同點。 B·點對點電子數位内容配送服務 點對點主要意指電子數位内容商店1 〇3與最終使用者裝 置109之間的一對一互動式服務。此種方式通常代表一種經 由電話或纜線數據機連線而提供的網際網路型服務。在本 模型中也支援網際網路以外的網路,只要這些網路符合網 路伺服器/用戶端瀏覽器的模型即可。圖9是一電子數位内 容商店103的主要工具程式、組成部分、及程序之方塊圖。 1·整合要求 安全數位内容電子式配送系統1〇〇不只是產生了新的線 上業務,而且也提供了 一種讓現有企業將可下載電子内容 113的銷售整合到其現有銷售管道之方法。提供給電子數位 O:\85\85 丨 56 分刮 DOC -144- 200304126 内容商店103的工具程式套件簡化了此種整合的程序。内容 取知工具程式171及sc(s)包封工具程式153提供了 一種方 法給電子數位内容商店1〇3,電子數位内容商店1〇3利用該 万法自參與的内容提供者1〇1取得其可用來銷售的資訊,益 產生將這些可下載物件對照到其本身庫存中的項目所需之 檔案。可以批次方式驅動該程序,並可將該程序的大部分 自動化,並且只在將新的内容113整合到網站時才執行該程 序。 用於安全數位内容電子式配送的工具程式已被設計成 可將可下載電子内容丨13的銷售整合到網路型電子數位内 各商店103的典型貫施例(例如c〇iumbia H⑽化〇niine、 Music Boulevard、@Tower)及等效實施例,而且只需對其 見行的内谷1 1 3零售典範作最小的改變。有數種可行的整合 方法而且在較佳貫施例中,電子數位内容商店丨〇3對全產 品搜尋、預覽、選擇(購物車)、及購買都提供了支援。每 二電子數位内容商店1〇3都要培養其客戶的忠誠度,並以目 削所作的相同方式持續提供其本身的促銷方案且行銷其產 品。在安全數位内容電子式配送系統1〇〇中,只需指示其庫 存中的那些產品可供電子式下載,並讓其客戶於進行購買 k擇時可選擇電子式下載的選項。在另_實施例中,客戶 、、冓物車U包含電子(内^: i i 3)及實體媒體的選擇。在 客一戶結帳之後,電子數位内容商店1G3已完成了金融結算, 渔彔及通知其出貨及裝卸貨功能,以便處理所購買的實 責%子數位内容商店! 03的商務處理函式然後呼叫交 O:\85\85 丨 56 分割 D0(: -145- 200304126 易處理換組175以處理所有的電子式下載。電子數位内容商 =二3 /、傳迗所需的資訊,且自該時點起,將由安全數位内 八%子式配送系統丨〇〇的工具程式套件處理所有的程序。在 另只犯例中,如果電子數位内容商店1 03只希望銷售可下 載的貝口口,或希望將實體的&amp;可下載的貨品之金融結算分 開,則亦可利用安全數位内容電子式配送系、统1⑽的工具程 式而執行其他的交易處理方法,以便處理金融結算。 為了處理貨品的下載,針對自内容提供者101的内容促 销網站156取得的每-種可下載產品,將-產品識別碼(圖 :未π出)提供給電子數位内容商店103。該產品識別碼係 /、客戶對一可下載產品的購買選擇相關聯。電子數位内容 商店103將孩產品識別碼傳送到交易處理模組,以便識 =使用者所購買的產品。為了描述產品而產生的sc(s)(報 饧SC(s) 641)係與電子數位内容商店1〇3隔離,且係存放在 報饧貝料庫1 8 1中,以便簡化對這些物件的管理,並使這 些物件的存在對電子數位内容商店103具有透通性。 提供交易處理模組175及其他額外的函式作為網路伺服 器端的可執行檔(亦即CGI&amp;NSApi、ISApi可呼叫函式), 或只將各API整合到一 DLL*C物件函式庫中。這些函式處 理最終使用者互動及與清算所1〇5間的或有互動之執行時 程序。這些函式與網路伺服器的客戶服務程式互動,以便 產生用來啟動内容113下載程序所需的檔案,並將該等檔案 下載到最終使用者裝置109。這些函式也處理或有的互=, 以便提供授權及接受活動完成的通知。 O:\85\85 丨 56 分割.DOC -146- 200304126 也提供一對帳工具程式,以便協助電子數位内容商店 103聯繫清算所105,以便根據其本身的交易記錄及清算所 105的交易記錄而對帳。 2.内容取得工具程式171 内容取得工具程式171負責連接到内容促銷網站156,以 便預覽及下載中介資料SC(s) 620。因為内容促銷網站是一 標準網站,所以電子數位内容商店1 〇3利用一網路瀏覽器來 劉覽該網站。瀏覽的特性將依據内容提供者1 〇1的網站設計 而有所不同。也些網站可能使許多的促銷資訊畫面具有廣 泛的搜尋能力。其他的網站可能只提供簡單的瀏覽器介 面,用以自曲名、演出者、或新發行項目的清單中作選擇。 所有網站都包含中介資料SC(s) 620的選擇,而中介資料 SC(s) 620包含了一首歌曲或一張專輯的所有促銷資訊及 描述性資訊。 此外,電子數位内容商店103可訂閱内容更新,並經由 FTP而自動接收更新。 閱覽中介資料 内谷取得工具程式1 71是一網路瀏覽器協助應用程式, 而當在内容促銷網站156上選擇一中介資料SC(s) 620連結 時,即啟動該内容取得工具程式171。選擇該%⑷時,將 使内容取得工具程式17 1下載到電子數位内容商店丨〇3,並 啟動該協助應用程式。内容取得工具程式171開啟中介資料 SC(s) 620,便顯示中介資料sc⑷620内含的無加密資訊。 在一音樂的例子中,所顯示的資訊包括所提取的中介資料 O:\85\85156 分’别 DOC -147- 200304126 173、與歌曲相關聯的圖形影像、及描述該歌曲的資訊,而 如果d歌曲的一試聽片段包含在中介資料SC(s) 620中,則 亦可收聽該試聽片段。在内容113是音樂的一個例子中,如 果内谷提供者101有提供,則亦顯示與歌曲或專輯有關的促 銷資訊、專輯名稱、及藝人。係顯示該資訊作為瀏覽器視 ¥中的一系列連結HTML網頁。無法自零售内容網站18〇取 得諸如歌曲及歌詞等的可購買内容113、以及内容提供者 1 〇 1想要保護的中介資料。 在另一實施例中,内容提供者101提供付費下載的可選 用之促銷内容。在該實施例中,係在中介資料§匸(3) 62〇中 將孩促銷内容加密。當已向電子數位内容商店103的帳戶索 取指定的費用時,即可經由清算所105而處理因開啟該資料 所發生的金融結算。 提取中介資料 除了預覽的能力之外,該工具程式提供了兩種額外的特 殊功能:中介資料提取、及報價Sc(s) 641的準備。選擇中 介資料提取選項時,提示電子數位内容商店1〇3將路徑及檔 案名稱輸入到將要儲存該中介資料的位置。係將諸如圖形 及音樂試聽片段等的二進位中介資料儲存成獨立的檔案。 將文字中介資料儲存在一 ASCII定界文字檔,零售内容網 站180然後可將該ASC„s界文字檔輸入到其資料庫中。也 在一獨立的toc檔案中產生用來描述該八8(:11定界文字檔 之一表。也有額外的選項,可在其他國家語言支援⑺州⑽“⑽5X85156 Segment DOC -141 «200304126 Electronic Digital Content Store i 03 is essentially a retailer. These electronic digital content stores are marketing content 113 in order to deliver content to customers. For distribution of content 113, the system will include digital content retail sites, digital content retail stores, or any business that wants to be involved in delivering electronic content 113 to consumers. The company can only market electronic content, or it can choose to add sales of electronic goods to other marketing channels that it currently uses for sales. A set of tool programs developed for the electronic digital content store 103 as part of the secure digital Uchigo electronic distribution system 100 can complete the downloading of electronic goods into the electronic digital content store 103. Service is being provided. % Sub-Digital Content Store 丨 03 uses these tools to do the following: Obtain the intermediary data Sc (s) 620 enclosed by the inner valley provider 101. Content 113 is extracted from these Sc (s) and used as input to build its service offering. Generate a quotation sc (s) 641 for downloadable content M which is used to provide sales for them. By generating the transaction SC (S) 640 and transmitting the transaction% ⑷64 to the end-user device 1G9, the sales process is processed. Confirm and start the download. The official transaction history of the downloadable content 113 and the status of each download. Processing status notifications and transaction confirmation requirements. Perform account consistency confirmation. These tools are designed to be compatible with each of the 4 electronic digital content stores 103, O: \ 85 \ 85l, 56 division D0c -142-200304126, and the electronic content 113 is expected to be downloaded. The elasticity of the way it serves. These two instrumental methods can be used in the following ways: Even if it is not necessary, the clearing house 105 is required to process all financial settlements of the purchased only 7 J download content 113. These tools can also make Ray Beta, call Baozi Digital Content Store 1003 full service /, customers ’and handle financial transactions by themselves. This includes providing promotions and special offers. These X-programs allow electronic data stores to quickly integrate sales of downloadable content 113 into their existing services. In addition, the electronic digital content store 103 does not need to have a website that can download 26, and battle in the inner valley 113, and does not need to manage the transmission of the inner valley 113. The hosted content website 111 selected by Nai Xuan Tian Tian Bei I, the donor 10, performs the functions described above. In the example of the car 乂 Jiaguan, Iava is used to implement various tools for electronic digital content: shop 103, but other programming languages such as c / c ++, combination language and equivalent language can also be used. We should understand that tools and programs for electronic digital content stores 103 that can be executed on a variety of popular platforms are described below. It can be distributed as a complete system or a complete system of an electronic digital content store in the form of an application in a computer-readable medium. The computer-readable medium includes (彳-Not limited to electronic distribution such as internet, and floppy disks, CD-ROMs, and removable hard drives. In another embodiment, the components of the electronic digital content store 103 are part of a software tool program package of a programmer. The tool program package will be launched in the general electronic digital content store described below. 3, and the predetermined interface of σ 卩 points and tool programs. These predetermined interfaces take the form of application programming interfaces (Αρι). Developers using these Αρι can perform any function of these components from a high level ΟΛ85 \ 85156 points. Doc -143-200304126 level applications. By providing these component APIs, programmers can quickly develop a custom-specified electronic digital content store 103 without having to redesign any of these features and resources that make up Shaofen. The electronic digital content store 103 is not limited to Internet-based service provision. All electronic digital content stores 103 that want to sell downloadable electronic content 113 can use the tools provided, regardless of the transmission infrastructure or delivery mode used to deliver the content 1 1 3 to the end user. Broadcasting services provided via satellite or cable infrastructure also use these tools to obtain, encapsulate, and track sales of electronic content 113. The way in which electronic goods for sale are presented and the way in which these electronic goods are delivered to end users are the main differences between a broad-based service provision and a peer-to-peer interactive network type service provision. B. Peer-to-peer electronic digital content distribution service Peer-to-peer mainly refers to a one-to-one interactive service between the electronic digital content store 103 and the end-user device 109. This method usually represents an Internet-type service provided via a telephone or cable modem connection. Networks other than the Internet are also supported in this model, as long as these networks conform to the model of a web server / client browser. FIG. 9 is a block diagram of main tool programs, components, and programs of an electronic digital content store 103. As shown in FIG. 1. Integration requirements The secure digital content electronic distribution system 100 not only generates new online business, but also provides a way for existing companies to integrate sales of downloadable electronic content 113 into their existing sales channels. Provided to the electronic digital O: \ 85 \ 85 丨 56 points DOC -144- 200304126 The utility program suite of the content store 103 simplifies this integration process. The content learning tool program 171 and the sc (s) encapsulation tool program 153 provide a method for the electronic digital content store 103, and the electronic digital content store 103 uses the method to obtain it from the participating content provider 101. The information it can use to sell benefits the files needed to match these downloadable items to items in its own inventory. The program can be driven in batch mode, and most of the program can be automated, and it is executed only when new content 113 is integrated into the website. A tool for secure digital content electronic distribution has been designed to integrate downloadable electronic content and sales of 13 into typical examples of stores 103 in online electronic digital stores (such as coiumium Hannibaline) , Music Boulevard, @Tower) and equivalent embodiments, and only need to make minimal changes to its popular inner valley 1 1 3 retail model. There are several possible integration methods and in the preferred embodiment, the electronic digital content store 〇03 provides support for full product search, preview, selection (shopping cart), and purchase. Every second electronic digital content store 103 develops customer loyalty and continues to provide its own promotional programs and market its products in the same way as the project does. In the secure digital content electronic distribution system 100, it is only necessary to indicate which products in its inventory are available for electronic download, and let its customers select the option of electronic download when making a purchase. In another embodiment, the customer, the vehicle U includes the selection of the electronic (internal ^: i i 3) and physical media. After the customer checkout, the electronic digital content store 1G3 has completed the financial settlement, fishing and notification of its shipping and loading and unloading functions in order to process the purchased %% digital content store! The business processing function of 03 is then called O: \ 85 \ 85 丨 56 Divide D0 (: -145- 200304126 Easy to change the group 175 to handle all electronic downloads. Electronic digital content quotient = 二 3 / 、 传 迗 所Required information, and from that point on, all procedures will be handled by the tool suite of the 8% sub-distribution system within the secure digital. In another offense, if the electronic digital content store 1 03 only wishes to sell Downloaded Beikoukou, or wishing to separate the financial settlement of physical &amp; downloadable goods, you can also use the secure digital content electronic distribution system and unified tools to execute other transaction processing methods in order to process finance In order to handle the download of goods, for each downloadable product obtained from the content promotion website 156 of the content provider 101, a product identification code (picture: not shown) is provided to the electronic digital content store 103. This product The identification code is related to the customer's purchase choice of a downloadable product. The electronic digital content store 103 sends the child product identification code to the transaction processing module so that the user = Purchased products. The sc (s) (report SC (s) 641) generated to describe the product is isolated from the electronic digital content store 103 and stored in the report repositories 1 8 1 to simplify The management of these objects and the existence of these objects are transparent to the electronic digital content store 103. The transaction processing module 175 and other additional functions are provided as executable files on the web server side (that is, CGI &amp; NSApi , ISApi can call functions), or just integrate each API into a DLL * C object library. These functions handle end-user interactions and contingent runtime procedures with the clearing house 105. These functions interact with the client service program of the web server to generate the files needed to launch the content 113 download process and download these files to the end-user device 109. These functions also handle contingent interactions =, In order to provide authorization and notification of completion of the event. O: \ 85 \ 85 丨 56 split. DOC -146- 200304126 also provides a pair of accounting tools to assist the electronic digital content store 103 to contact the clearing house 105 to self Easy to record and reconcile transaction records of clearing house 105. 2. Content acquisition tool program 171 The content acquisition tool program 171 is responsible for connecting to the content promotion website 156 in order to preview and download the intermediary information SC (s) 620. Because the content promotion website is A standard website, so the electronic digital content store 103 uses a web browser to browse the website. The browsing characteristics will vary according to the website design of the content provider 101. These websites may make many The promotional information screen has extensive search capabilities. Other websites may only provide a simple browser interface to choose from a list of song titles, artists, or new releases. All sites contain a selection of intermediary material SC (s) 620, and the intermediary material SC (s) 620 contains all the promotional and descriptive information for a song or an album. In addition, the electronic digital content store 103 can subscribe to content updates and automatically receive updates via FTP. Viewing the intermediary data Uchibuchi tool 1 71 is a web browser assisting application, and when a link to the intermediary data SC (s) 620 is selected on the content promotion website 156, the content acquisition tool program 171 is activated. When the user selects this item, the content acquisition tool program 17 1 is downloaded to the electronic digital content store 丨 〇3, and the assisting application program is started. The content acquisition tool program 171 opens the intermediary data SC (s) 620, and displays the unencrypted information contained in the intermediary data sc⑷620. In the example of a music, the displayed information includes the extracted intermediary data O: \ 85 \ 85156 points' DOC-147- 200304126 173, graphic images associated with the song, and information describing the song, and if A preview segment of the song d is included in the SC (s) 620 of the intermediary material, and the audition segment can also be listened to. In an example where the content 113 is music, if it is provided by the Uchiya provider 101, the promotion information related to the song or album, the album name, and the artist are also displayed. This information is displayed as a series of linked HTML pages in the browser's view. Purchasable content 113, such as songs and lyrics, and intermediary materials that the content provider 101 wants to protect cannot be obtained from the retail content website 180. In another embodiment, the content provider 101 provides optional promotional content for paid download. In this embodiment, the child promotion content is encrypted in the intermediary material § 匸 (3) 62〇. When the specified fee has been charged to the account of the electronic digital content store 103, the financial settlement caused by opening the data can be processed through the clearing house 105. Extracting intermediary data In addition to the ability to preview, the tool provides two additional special functions: intermediary data extraction, and preparation of quotes Sc (s) 641. When the intermediary data extraction option is selected, the electronic digital content store 103 is prompted to enter the path and file name into the location where the intermediary data will be stored. Binary intermediary data such as graphics and music audition clips are stored as separate files. The text intermediary data is stored in an ASCII delimited text file, and the retail content website 180 can then enter the ASC's text file into its database. It is also generated in a separate toc file to describe the eight 8 ( : One table of 11 delimited text files. There are also additional options to support Luzhou in other languages. "

Language Support ;簡稱NLS)所支援的格式中進行提取。 O:\85\85156 分割.D0C -148- 200304126 所提取的資料中提供的一件重要資訊是產品識別碼。該 產品識別碼是電子數位内容商店103的商務處理函式用來 識別交易處理模組n5(若要得知更多的資訊,請參閱交易 處理該節)及使用者所購買的内容113之產品識別碼。交易 處理模組1 7〗利用該產品識別碼來適當地自報價資料庫1 8 i 擷取適當的報價SC(s) 641,以供隨後下載到最終使用者裝 置109。電子數位内容商店103可完全控制其將可下載内容 113在其網站上展現的方式。電子數位内容商店ι〇3只需要 保留一份報價給該產品識別碼的内容丨13之交互對照,以便 適當地連接到安全數位内容電子式配送系統1〇〇之工具程 式。在此處提供該資訊時,可讓電子數位内容商店1〇3以與 報價SC(s) 641程序平行之方式,將該產品或内容ιΐ3整合 到其庫存及銷售網頁(資料庫)中,這是因為這兩個程序使 用相同的產品識別碼來對照到該產品。下文中將進一步說 明此種情形。 報價SC(s)產生包封工具程式153 電子數位内容商店103需要產生一報價8以〇 641,用以 描述供銷售的可下載内容113。係自中介資料sc⑷62〇取 得被放入報價SC(s) 641的資料中之大部分。内容取得工具 程式171以下列步驟產生該報價sc(s) 641 : 自中介資料SC(s) 620中移除並不需要被包含在中介資 料SC(s) 620中的報價SC(s)樣板所指定的報價%⑷641 中之各組成部分。 加入電子數位内容商店103的該工具程式組的組態設定 O:\85\85156 分割.DOC -149- 200304126 選項所規定的預設項目指定之額外必須組成部分。 提示中介資料SC(S) 620的報價SC(s)樣板指定的額外必 須輸入或選擇。 呼叫SC(s)包封工具程式153,以便將該資訊包封到sc(s) 格式中。 在中介資料SC(s) 620中保留將由播放應用程式195在最 終使用者裝置1〇9上顯示的中介資料。自中介資料sc(s) 620中移除只被電子數位内容商店1〇3用來作為其網路服務 資料庫的輸入之其他促銷中介資料。亦保留諸如浮水印指 令、加密的對稱金鑰623、及指定物件的容許使用的使用條 件5 1 7等内容提供者丨〇丨所提供之權利管理資訊。 然後在報價SC(s) 641中包含該拆開的中介資料Sc(s) 620。電子數位内容商店1〇3也將稱為商店使用條件5丨9或購 男選項的其本身之使用條件附加到報價SC(s) 641。可以互 動方式完成上述步驟,或經由一組預設的指令而自動完成 上述步驟。如果被設定為以互動方式處理,則以内容提供 者101規足的一組容許之物件使用條件517來提示電子數位 内谷商店103。電子數位内容商店1〇3然後選擇其想要提供 釔其客戶的選項。這些選項現在變成新的使用條件或商店 使用仏件5 19。為了自動地處理,電子數位内容商店1 ο)設 足一組針對所有内容113而提供的預設購買選項。將這些預 設選項自動比對内容提供者101規定的容許使用條件517, 並於兩者並無不—致時,在報價SC(s) 641中設定這些預設 選項。 一一 ΟΛ85、85!56 分割.D〇c -150- 200304126 一旦產生報價SC(s) 641之後’即將該報價SC(s) 641儲存 在一報價資料庫181中,並以中介資料SC(s) 620中預先指 定的產品識別碼作為該中介資料SC(s) 620之索引。當一客 戶稍後連線到報價資料庫181而擷取報價SC(s) 641,以便 包封並傳送到該最終使用者客戶時,電子數位内容商店1 〇3 利用該產品識別碼來識別該客戶所購買的可下載内容 113。若要得知更多的細節,請參閱交易處理模組175的該 即 ° 在另一實施例中,電子數位内容商店103將報價SC(S) 641放在其網站上。該實施例需要改變報價sc(s) 641,例 如以電子數位内容商店1 03的網址取代代管内容網站1丨J的 網址。 3.交易處理模組175 電子數位内容商店1 03將帳單開立的工作轉送到清算所 105。此外,電子數位内容商店1〇3亦可直接向清算所1〇5 要求金融Μ鼻。有兩種處理最終使用者對可下載内容H3 的購買要求之基本模式。如果電子數位内容商店1〇3並不希 望處理購買的金融結算,且並無將影響到貨品的銷售之特 殊促銷及獎勵辦法,而且並未使用將購買要求批次化的一 購物車圖像,則電子數位内容商店1〇3可選擇提供將其内容 11 3下載網頁直接連結到報價sc(s) 641。將以中介資料中 包含的零售價格資訊建立這些報價Sc(s)641。展現具有銷 售條款的購買選項之一特殊價網頁也是包含在報 價SC(s) 641中。係利用建立報價sc(s) 64丨時所產生的一樣 O:\85\85156 分割 DOC -151 - 200304126 板來建立該網頁。當最終使用者點選到報價Sc(s)64i的該 直接連結時,即將該報價Sc(s)641下載到最終使用者裝置 109之瀏覽器,而啟動一個用來開啟該容器物件並展現該報 饧SC(s) 641中包含的報價網頁之協助應用程式。該網頁包 含-個用來收集客戶資訊之表格,該客戶資訊包括信用卡 資訊及購買選項。然後將該表格直接傳送到清算所1〇5,以 供金融結算其處理。該表格可選擇包含使用最終使用者的 信用資訊或工業標準的區域交易控制常式之欄位。 現在將說明電子數位内容商店1〇3處理帳單開立的一實 施例。處理購買要求的較典型模式可讓電子數位内容商店 103處理金融結算,然後將下載授權許可傳送到最終使用 者。孩万法可讓電子數位内容商店1〇3將可下載内容ιΐ3的 銷售與所提供其他貨品整合,而在其網站上銷售,並可進 行購買要求的批次處理,只須(經由—購物車圖像)向客戶 作人的5併收費,而無須向每一次下載要求作個別的收 費,並且可讓電子數位内容商店103直接追蹤其客戶的購買 模式且彳疋供特殊的促銷及會員優惠選項。在此種環境中, 可下載内谷113的報價係包含在電子數位内容商店丨〇3的購 物網頁中,且當最終使用者選擇該内容113時,即將該内容 113放到一購物車中,並以如同電子數位内容商店103現有 購物模型之方·式進行處理及金融結算。一旦完成該金融結 算之後,安全數位内容電子式配送系統100的商務處理程序 隨即呼叫交易處理模組175,以便完成該交易。 交易處理模組175Language Support; abbreviated as NLS). O: \ 85 \ 85156 Segmentation. D0C -148- 200304126 An important piece of information provided in the extracted data is the product identification code. The product identification code is a business processing function of the electronic digital content store 103 used to identify the transaction processing module n5 (for more information, see the section on transaction processing) and the products purchased by users 113 Identifier. The transaction processing module 17 uses the product identification code to appropriately retrieve the appropriate quotation SC (s) 641 from the quotation database 1 8 i for subsequent download to the end-user device 109. The electronic digital content store 103 has complete control over how it will present downloadable content 113 on its website. The electronic digital content store only needs to keep an interactive comparison of the contents quoted to the product identification code 13 in order to properly connect to the secure digital content electronic distribution system 100 tool program. When this information is provided here, the electronic digital content store 103 can integrate the product or content ιΐ3 into its inventory and sales webpage (database) in a manner parallel to the quotation SC (s) 641 procedure. This is because the two programs use the same product identification code to match the product. This situation is explained further below. The quotation SC (s) generation enveloping tool program 153 The electronic digital content store 103 needs to generate a quotation 8 to 0 641 for describing the downloadable content 113 for sale. Most of the data put into the quotation SC (s) 641 are obtained from the intermediary data sc⑷62〇. The content acquisition tool program 171 generates the quotation sc (s) 641 in the following steps: It is removed from the intermediary data SC (s) 620 and does not need to be included in the quotation SC (s) template in the intermediary data SC (s) 620. Components of the specified quote% ⑷641. The configuration setting of the utility program group added to the electronic digital content store 103 is O: \ 85 \ 85156 divided. The DOC -149- 200304126 option specifies an additional required component. Prompt intermediary information SC (S) 620 for quote SC (s) template specified additional must be entered or selected. Call SC (s) encapsulation utility 153 to encapsulate the information into sc (s) format. The intermediary data SC (s) 620 retains the intermediary data to be displayed by the playback application 195 on the end-user device 109. Remove other promotional intermediary data from the intermediary data sc (s) 620 that is only used by the electronic digital content store 103 as an input to its web service database. It also retains the rights management information provided by content providers such as watermark instructions, encrypted symmetric keys 623, and permitted use conditions for designated objects 5 1 7. Then the quotation SC (s) 641 includes the disassembled intermediary information Sc (s) 620. The electronic digital content store 103 also attaches its own use conditions called store use conditions 5 and 9 or the male purchase option to the offer SC (s) 641. The above steps can be done interactively or automatically through a set of preset instructions. If it is set to be processed in an interactive manner, the electronic digital Uchiya store 103 is prompted with a set of permitted object use conditions 517 which is compliant with the content provider 101. The electronic digital content store 103 then selects the option it wants to offer to its customers. These options now turn into new conditions of use or store usage files 5 19. For automatic processing, the electronic digital content store 1 o) has a set of preset purchase options available for all content 113. These preset options are automatically compared with the allowable use conditions 517 specified by the content provider 101, and when both are the same, the preset options are set in the quote SC (s) 641. One-by-one Λ85, 85! 56 segmentation. Doc -150- 200304126 Once the quotation SC (s) 641 is generated, 'the quotation SC (s) 641 is stored in a quotation database 181, and the intermediary data SC (s) ) The product identification code specified in 620 is used as the index of the intermediary data SC (s) 620. When a customer later connects to the quotation database 181 to retrieve the quotation SC (s) 641 for encapsulation and transmission to the end-user customer, the electronic digital content store 103 uses the product identification code to identify the Downloadable content 113 purchased by the customer. For more details, please refer to the instant of the transaction processing module 175. In another embodiment, the electronic digital content store 103 places the offer SC (S) 641 on its website. This embodiment needs to change the offer sc (s) 641, for example, to replace the web address of the hosted content website 1j with the web address of the electronic digital content store 103. 3. Transaction processing module 175 The electronic digital content store 103 transfers the billing work to the clearing house 105. In addition, the electronic digital content store 103 can also directly ask the clearing house 105 for financial services. There are two basic models for handling end-user purchase requests for downloadable content H3. If the electronic digital content store 103 does not want to handle the financial settlement of purchases, and there are no special promotions and incentives that will affect the sale of goods, and it does not use a shopping cart image that batches purchase requirements, The electronic digital content store 103 may optionally provide a link for downloading its content 11 3 directly to the offer sc (s) 641. These quotes Sc (s) 641 will be created with the retail price information contained in the intermediary data. Special price pages showing one of the purchase options with terms of sale are also included in the quote SC (s) 641. This page is created using the same O: \ 85 \ 85156 split DOC -151-200304126 board that was generated when creating the quote sc (s) 64 丨. When the end user clicks on the direct link of the quote Sc (s) 64i, it downloads the quote Sc (s) 641 to the browser of the end user device 109, and launches a container object to open the container object and display the Assistance app for quote page included in SC (s) 641. The web page contains a form for collecting customer information including credit card information and purchase options. This form is then transmitted directly to the clearing house 105 for financial settlement to process. The form can optionally include fields that use end-user credit information or industry-standard regional transaction control routines. An embodiment of the electronic digital content store 103 processing billing will now be described. A more typical model for processing purchase requests would allow the electronic digital content store 103 to handle financial settlement and then transfer the download authorization to the end user. Howmanfa allows the electronic digital content store 103 to integrate the sale of downloadable content ιΐ3 with other goods provided, and sell it on its website, and can perform batch processing of purchase requirements, only through (shopping cart (Image) 5 charges to customers as a person, without the need to charge a separate charge for each download, and allows the digital content store 103 to directly track their customers' purchase patterns and offers special promotions and membership discount options . In such an environment, the quotation of the downloadable inner valley 113 is included in the shopping page of the electronic digital content store, and when the end user selects the content 113, the content 113 is put into a shopping cart. Processing and financial settlement are performed in the same way as the existing shopping model of the electronic digital content store 103. Once the financial settlement is completed, the business processing program of the secure digital content electronic distribution system 100 then calls the transaction processing module 175 to complete the transaction. Transaction Processing Module 175

O:\85\85 丨 56 分割 DOC -152- 200304126 父易處理模組1 7 5的功能在於整合最終使用者裝置1 〇 9 所需的資訊,以便啟動並處理所購買内容113之下載。將該 =貝Λ包封到一父易S C (s) 6 4 0 ’網路伺服器然後回應該購買 成X而將該交易SC(s) 640送回到最終使用者裝置1〇9。交 易處理模組1 75向電子數位内容商店1 〇3的商務處理程序要 求三件資訊:所購買内容113之產品識別碼、交易資料642、 及確認該購買結算的一 HTML網頁或CGI網址。 該產品識別碼是在與所銷售内容1丨3相關聯的中介資料 SC(s) 620中而提供給電子數位内容商店1〇3之值。該產品 識別碼係用來自報價資料庫1 81擷取相關聯的報價SC(s) 64卜 父易資料642是電子數位内容商店ι〇3的交易處理函式 所扼供的一資訊結構,且隨後利用該交易資料642使清算所 105的處理與電子數位内容商店1〇3執行的金融結算交易相 關聯,並提供將包含在下載到最終使用者裝置丨〇9的内容 113的浮水印之使用者識別資訊。當清算所1〇5接收一有效 的可單SC(s) 650時,清算所1〇5即記錄一個指示電子數位 内容商店103已銷售内容113的交易,並·記錄其中包括最終 使用者的名稱及一交易識別碼535之交易資料642。交易識 別碼535可提供對金融結算交易的一對照。清算所ι〇5隨後 將該資訊送回到電子數位内容商店1〇3,以便用來核對其帳 戶與自内容提供者101(或其代理商)接收的帳單開立報表 是否一致。内容提供者101可利用清算所交易記錄178來決 定其已銷售了哪些内容113,並使其得以向每一電子數位内O: \ 85 \ 85 丨 56 Division DOC -152- 200304126 The parent easy-to-handle module 1 7 5's function is to integrate the information required by the end-user device 1 09 to start and process the download of the purchased content 113. Encapsulate this value to a parent S C (s) 6 4 0 ′ network server and then respond to purchase X to send the transaction SC (s) 640 back to the end user device 109. The transaction processing module 1 75 requests three pieces of information from the business processing program of the electronic digital content store 103: the product identification code of the purchased content 113, the transaction information 642, and an HTML webpage or CGI website address confirming the purchase settlement. The product identification code is a value provided to the electronic digital content store 103 in the intermediary data SC (s) 620 associated with the sold content 1 丨 3. The product identification code is used to retrieve the associated quotation SC (s) from the quotation database 1 81 64. The parent data 642 is an information structure provided by the transaction processing function of the electronic digital content store ι03, and This transaction data 642 is then used to correlate the processing of the clearing house 105 with the financial settlement transactions performed by the electronic digital content store 103 and provide the use of the watermark of the content 113 downloaded to the end-user device. Identification information. When the clearing house 105 receives a valid orderable SC (s) 650, the clearing house 105 records a transaction indicating that the digital content store 103 has sold the content 113, and the record includes the name of the end user And a transaction ID 642 of a transaction ID 535. The transaction identification code 535 can provide a comparison of financial settlement transactions. The clearing house ι05 then sends this information back to the electronic digital content store 103 to use it to check whether its account is consistent with the billing statements received from content provider 101 (or its agent). Content providers 101 can use clearing house transaction records 178 to determine which content 113 they have sold 113 and to enable them to make it available to every electronic digit

ΟΛ85\85156 分割.DOC -153 - 200304126 容商店103開立帳單,以便收取其應得的授權費。亦可替代 性地利用帳單開立以外的其他電子方式來結算内容提供奢 101與電子數位内容商店103之間的帳目。 交易SC(S) 640中提供的資訊以及交易Sc(s) 64〇的安全 性及完整性足以使清算所1G5信賴該購買交易是有效的,且 在清算所105記錄該銷售之前,不需要有進一步的確認。然 而,電子數位内容商店103可選擇在向其帳戶收費之前(清 算所105記錄交易而向内容提供者1〇1指示電子數位内容商 店103已收到銷售該内容113的帳款之時),先要求該交易的 確證。交易資料642中的一旗標指示對確證/通知的該要 求。在此種情形中,清算所105聯繫電子數位内容商店1〇3, 並在向其帳戶收費且釋出加密金鑰623之前,先自電子數位 内容商店103取得授權。自清算所1〇5將該交易識別碼535 傳送到電子數位内容商店103,作為該確證要求的一部分, 而使電子數位内容商店1 〇3得以將該要求與對最終使用者 進行的一先前交易相關聯。該交易識別碼535可以是電子數 位内容商店1 〇3希望使用且只用於此一功效的任何特有值。 父易資料642亦包含一客戶名稱。該名稱可來自使用者 購買時所填寫的購買表格的使用者名稱欄位,或來自先前 電子數位内容商店1 〇3的某一使用者登錄程序期間所登錄 的資訊,或與用於該交易的信用卡相關聯的信用卡資訊所 得到的正式名稱。隨後將該名稱包含在授權許可浮水印527 中〇 交易資料642亦包含最終使用者所購買的商店使用條件 O:\85\85156 分割.DOC -154- 200304126 5 19。該資訊係包含在授權許可浮水印527中,且最終使用 者裝置1 09將該資訊用於拷貝及播放控制。 交易處理模組1 75所需的最後參數是確認該購買結算之 HTML網頁或CGI網址。該參數之目的在於可讓電子數位内 容商店1 03回應最終使用者,且電子數位内容商店1 〇3係利 用金融結算的一確認訊息及其想要在其回應訊息中包含的 任何其他資訊來回應該最終使用者。當接收並處理交易 SC(s) 640時,該HTML網頁及CGI網址係包含在交易SC(s) 640中’且係顯示在最終使用者裝置ι〇9的瀏覽器視窗上。 交易SC(s) 640是在處理購買提交之後自電子數位内容 商店103到最終使用者的HTTP回應。傳送一 SC(s)作為直接 HTTP回應時,將強制在最終使用者裝置1〇9上自動載入一 SC(s)處理器協助應用程式,因而可自動完成交易,而無須 依賴進一步由最終使用者啟動的動作。將在後文的最終使 用者裝置109及播放應用程式195的該節中詳述該程序。 當以必須的參數呼叫交易處理模組175時,交易處理模 組Π5建立一交易SC⑷64〇,該交易sc⑷640包含交易資 料642、交易確認HTML網頁或參照網址、及Sc(s)的其他必 須安全特性,且交易處理模組丨75擷取及嵌入與該購買相關 聯的報價SC(s) 641。交易處理模組175也記錄與該交易相 關的資訊,以供爾後為通知介面模組176及對帳工具程式 1 7 9所使用。 4·通知介面模組丨76 通知介面模組176是一網路伺服器端的可執行常式 O:\85\85156 分’刮.d〇c -155- 200304126 (NS API、IS API、或等效API可呼叫的CGI或函式)。通知介 面模組176處理來自清算所1〇5、最終使用者裝置ι〇9、代管 内容網站111、及内容提供者1〇1之選項要求及通知。電子 數位内容商店103可選擇要求通知的事件有: 清算所105對最終使用者裝置1〇9要求一加密金鑰623且 對稱金鑰623正針對指定的内容113釋出加密金鑰623之 通知可選擇將该通知設定成再將加密金鑰623傳送到 最終使用者裝置109之前先要求來自電子數位内容商店 1 0 3的確註。 代官内容網站111對已將内容Sc(s) 63〇傳送到最終使用 者裝置109之通知。 最終使用者裝置109對已接收到内容8(:(3) 63〇及授權許 可SC(s) 660並成功地利用該等Sc(s)來處理内容ιΐ3或發 現該等SC(s)被篡改之通知。 内容提供者1〇1對已將新的内容113置於内容促銷網站 156之通知。 这些通知中的任一通知都不是安全數位内容電子式配 运系統100中的一必須步驟,但是提供這些通知作為使電子 數位内容商店103有機會可關閉其有關成功完成銷售的記 錄。泛些通知由於讓電子數位内容商店103得知在交易的金 融結算之後已透露了哪些功能’或得知於嘗試完成銷隹的 期間發生了哪些錯誤’而也提供了處理客户服務要求時可 能需要用到的資訊。此外,可視需要而經由客卢服務介面 184自清算所1〇5得到許多這類狀態。 〇Λ85\85156 分割.D〇c -156- 200304126 由内奋k供者101決定對在内容促銷網站丨5 6上可取得 新内容113的通知頻度。可在每當加入新的中介資料叱⑷ 620時,提供該通知,或者每天通知當天所加入的所有新中 介資料SCO) 620。 所有這些通知都將資料項加入交易記錄丨78。電子數位 内各商店103想要對這些通知執行本身的處理,則電子數位 内容商店103可攔截CGI呼叫,執行其特有的函式,然後可 選擇將該要求傳送到通知介面模組丨76。 5.對帳工具程式179 對帳工具程式179聯繫清算所105,以便將交易記錄178 與清算所1〇5的記錄比較。上述程序是一種可供選用的程 序,可用來協助電子數位内容商店1〇3對安全數位内容電子 式配送系統1 00的會計程序有信心。 在另一實施例中,可更新該工具程式,而提供電子式資 金移轉,以便自動化對内容提供者1〇1及清算所1〇5的週期 性付款。亦可將該工具程式設計成:在與交易記錄丨78對過 帳單之後,於自清算所105接收到一電子式帳單時,可自動 處理付款。 c·廣播電子數位内容配送服務 廣播主要意指一種一對多的傳輸方法,其中在最終使用 者裝置109與電子數位内容商店1〇3之間沒有可隨客戶的需 要而選擇閱覽或收聽的個人化介面。通常經由數位衛星或 、、覽線基礎設施而提供廣播,此時係預先設定内容1 13,因而 所有的最終使用者裝置1 09都接收相同的資訊流。 α麵5丨56分辄D〇c 200304126 亦可界定一種混合式模型,使電子數位内容商店l〇3可 提供一種數位内容服務,且該數位内容服務的構成方式 為:可經由一網際網路連線而提供一網路配送介面,並可 經由一廣播服務而提供寬頻衛星或纜線配送介面,且與網 站的設計有相當大的共通性。如果IRD反向頻道串列介面 係連接到網路,且該IRD支援網路瀏覽,則最終使用者可 經由该反向頻道串列介面而以一般方式瀏覽數位内容服 務’並預覽及選擇所要購買的内容113。使用者可選擇高品 質的可下載内容113,然後購買這些選擇,並完全經由一網 際網路連線接收必須的授權許可SC(s) 660,然後要求經由 寬頻廣播介面而傳送内容1 Π(内容SC(s) 630)。網路服務可 根據廣播時間表而指示可以此種方式下載哪些内容113,或 者可完全根據所購買的内容113而建立廣播資訊流。此種方 式可讓一網路型數位内容服務公司與一廣播機構簽約,而 將鬲品質的内容113提供給配備有適當設備的使用者,因而 每天可以此種高品質方式提供有限數目的特定内容113(例 如歌曲或CD),並將經由網路介面而以低品質方式提供可 供下載的完整目錄。 亦可設計出並無通到最終使用者裝置丨〇9的網路介面之 其他廣播模型。在此種模型中,係將促銷内容包封在特殊 格式的數位流,以便用廣播方式傳送到最終使用者裝置 1〇9(亦即IRD),在最終使用者裝置109上執行特殊的處理, 以便將該數位流解碼’並向最終使用者顯示可用來作購買 選擇的該促銷内容。 O:\8S\85156 分割 DOC -158- 200304126 仍然係經由自最終使用者裝置1 09到清算所1〇5的反向 頻道通訊而啟動實際的購買選擇,且將利用SC(s)來執行所 有的資料交換。提供給電子數位内容商店丨03的工具程式套 件之架構及開發方式為:大部分的工具程式都同時適用於 點對點網際網路服務提供、及廣播衛星或纜線服務提供。 衛星型電子數位内容商店103也利用數位内容網站型電子 數位内容商店103取得及管理内容113並準備SC(s)所用之 工具程式來管理並準備内容113,以便在一廣播基礎設施上 配送。經由一網路服務而配送之sc⑷與經由一廣播服務而 配送之SC(s)相同。 X·最終使用者裝置109 安全數位内容電子式配送系統丨〇〇的最終使用者裝置 109中i應用程式執行兩個主要功能:第一,sc(s)處理及 拷貝控制;以及第二,加密的内容113之播放。不論最終使 用者裝置109是一個人電腦或一專用的消費電子裝置,該最 終使用者裝置109都必須可執行這些基本功能。最終使用者 裝置109也提供各種額外的特性及功能,例如產生播放清 單&amp;理數位内容資料庫、於播放内容時顯示資訊及影像、 以及錄製到外邵媒體裝置。這些功能隨著這些應用程式支 援的服私及這些應用程式被設計使用的裝置類型的不同而 有所變化。 A.概述 現在印參閱圖1〇,圖中示出主要組成部分及程序、以及 最、’’、使用者裝置丨〇9的功能流程。被設計用來支援一個人電ΟΛ85 \ 85156 Div. DOC -153-200304126 Rong Store 103 issues a bill in order to collect its due authorization fee. Alternatively, electronic means other than billing may be used to settle accounts between the content providing luxury 101 and the electronic digital content store 103. The information provided in transaction SC (S) 640 and the security and integrity of transaction Sc (s) 64〇 are sufficient to enable clearing house 1G5 to trust that the purchase transaction is valid, and no need to have Further confirmation. However, the electronic digital content store 103 may choose to charge its account (when the clearing house 105 records the transaction and instructs the content provider 101 to the electronic digital content store 103 to have received the payment for the sale of the content 113), Confirmation of the transaction is required. A flag in transaction information 642 indicates the requirement for confirmation / notification. In this case, the clearing house 105 contacts the electronic digital content store 103 and obtains authorization from the electronic digital content store 103 before charging its account and releasing the encryption key 623. The clearing house 105 transmitted the transaction identification code 535 to the electronic digital content store 103 as part of the verification request, and the electronic digital content store 103 was able to pass the request to a previous transaction with the end user Associated. The transaction identification code 535 can be any unique value that the electronic digital content store 103 wants to use and only uses for this function. The parent data 642 also contains a customer name. The name can come from the user name field of the purchase form filled in when the user made a purchase, or from information registered during a user registration process at a previous electronic digital content store 103, or with the information used for the transaction. The official name derived from the credit card information associated with the credit card. The name was then included in the license watermark 527. The transaction information 642 also contained the store usage conditions purchased by the end user O: \ 85 \ 85156 division. DOC -154- 200304126 5 19. This information is included in the license watermark 527, and the end-user device 109 uses this information for copying and playback control. The final parameter required by the transaction processing module 175 is the HTML page or CGI URL that confirms the purchase settlement. The purpose of this parameter is to enable the electronic digital content store 103 to respond to the end user, and the electronic digital content store 103 is a confirmation message using financial settlement and any other information it wants to include in its response message. End user. When the transaction SC (s) 640 is received and processed, the HTML web page and CGI URL are included in the transaction SC (s) 640 'and displayed on the browser window of the end-user device ι09. Transaction SC (s) 640 is an HTTP response from the electronic digital content store 103 to the end user after processing the purchase submission. Sending an SC (s) as a direct HTTP response will force an SC (s) processor to be automatically loaded on the end-user device 109 to assist the application, so transactions can be completed automatically without relying on further end use Initiated actions. This procedure will be described in detail later in this section of the end-user device 109 and the playback application 195. When the transaction processing module 175 is called with the necessary parameters, the transaction processing module Π5 creates a transaction SC⑷64. The transaction sc⑷640 contains transaction data 642, a transaction confirmation HTML web page or reference URL, and other necessary security features of Sc (s). And the transaction processing module 75 captures and embeds the quotation SC (s) 641 associated with the purchase. The transaction processing module 175 also records information related to the transaction for later use by the notification interface module 176 and the reconciliation tool program 179. 4 · Notification interface module 丨 76 The notification interface module 176 is a web server-side executable routine O: \ 85 \ 85156 minutes' scratch.d〇c -155- 200304126 (NS API, IS API, or etc. Effective API callable CGI or function). The notification interface module 176 processes option requests and notifications from the clearing house 105, the end-user device ι09, the hosted content website 111, and the content provider 101. The electronic digital content store 103 may choose to request notification of the following events: The clearing house 105 may request the end user device 109 for an encryption key 623 and the symmetric key 623 is releasing the notification of the encryption key 623 for the specified content 113. The notification is optionally set to require a confirmation from the electronic digital content store 103 before sending the encryption key 623 to the end-user device 109. Notification from the affiliate content website 111 that the content Sc (s) 63 has been transmitted to the end-user device 109. The end-user device 109 has successfully received the content 8 (:( 3) 63〇 and the authorized SC (s) 660 and successfully used the Sc (s) to process the content or discover that the SC (s) has been tampered Notification by the content provider 101 that the new content 113 has been placed on the content promotion website 156. None of these notifications is a required step in the secure digital content electronic distribution system 100, but These notifications are provided as an opportunity for the electronic digital content store 103 to close its record of successful completion of the sale. Some notifications are due to let the electronic digital content store 103 know which features have been revealed after the financial settlement of the transaction 'or learned from What kind of errors occurred during the attempt to complete the sale? It also provides information that may be used when processing customer service requests. In addition, many such statuses can be obtained from the clearing house 105 through the customer service interface 184 as needed. 〇Λ85 \ 85156 segmentation. D〇c -156- 200304126 It is up to the donor 101 to decide the frequency of notification of new content 113 available on the content promotion website 丨 56. It can be added whenever a new When the referral information is 620, provide the notice, or notify every day of all new intermediary information SCO) 620 that was added on that day. All of these notifications add data items to the transaction log 78. The electronic digital stores 103 want to perform their own processing on these notifications, the electronic digital content store 103 can intercept the CGI call, execute its unique function, and then choose to send the request to the notification interface module 76. 5. Reconciliation Tool Program 179 The reconciliation tool program 179 contacts the clearing house 105 to compare the transaction record 178 with the records of the clearing house 105. The above program is an optional program that can be used to assist the digital content store 10 in having confidence in the secure digital content electronic distribution system 100 accounting procedures. In another embodiment, the tool program can be updated to provide electronic funds transfer to automate periodic payments to the content provider 101 and the clearing house 105. The tool program can also be designed to automatically process payment when an electronic bill is received from the clearing house 105 after the bill is paired with the transaction record 78. c. Broadcasting Electronic Digital Content Distribution Service Broadcasting mainly refers to a one-to-many transmission method, in which there is no individual between the end-user device 109 and the electronic digital content store 103 that can be selected to view or listen to as the customer requires化 Interface. Broadcasting is usually provided via digital satellite or satellite line infrastructure. At this time, the content 1 13 is set in advance, so all end-user devices 1 09 receive the same information stream. α plane 5 丨 56 points Doc 200304126 can also define a hybrid model, so that the electronic digital content store 103 can provide a digital content service, and the digital content service is constituted in such a way that it can be accessed through an Internet Connected to provide an Internet distribution interface, and can provide a broadband satellite or cable distribution interface through a broadcast service, and has a considerable commonality with the design of the website. If the IRD reverse channel serial interface is connected to the Internet and the IRD supports web browsing, end users can browse digital content services in the usual way through the reverse channel serial interface 'and preview and select the purchase Content 113. The user can select the high-quality downloadable content 113, then purchase these options, and receive the necessary license SC (s) 660 completely through an Internet connection, and then request the content to be transmitted via a broadband broadcast interface 1 Π (Content SC (s) 630). The web service can indicate which content 113 can be downloaded in this way according to the broadcast schedule, or a broadcast information stream can be established entirely based on the purchased content 113. This method allows a network-type digital content service company to contract with a broadcaster to provide high-quality content 113 to users equipped with appropriate equipment, so that a limited number of specific content can be provided in this high-quality manner every day 113 (such as songs or CDs), and will provide a full downloadable catalogue in a low quality via a web interface. It is also possible to design other broadcast models that do not have a network interface to the end-user device. In this model, the promotional content is encapsulated in a digital stream in a special format for broadcasting to the end-user device 109 (ie, IRD), and special processing is performed on the end-user device 109. In order to decode the digital stream 'and show the end user the promotional content available for purchase choices. O: \ 8S \ 85156 split DOC -158- 200304126 is still the actual purchase selection initiated through reverse channel communication from end-user device 10 09 to clearing house 105, and SC (s) will be used to perform all Information exchange. The structure and development method of the tool package provided to the electronic digital content store 丨 03 are: most of the tool programs are suitable for both point-to-point Internet service provision and broadcast satellite or cable service provision. The satellite-type electronic digital content store 103 also uses the digital content website-type electronic digital content store 103 to obtain and manage the content 113 and prepare tools for SC (s) to manage and prepare the content 113 for distribution on a broadcasting infrastructure. The sc () delivered via a network service is the same as the SC (s) delivered via a broadcast service. X. End-user device 109 The secure digital content electronic distribution system. The i-application in the end-user device 109 performs two main functions: first, sc (s) processing and copy control; and second, encryption. The content of 113 is played. Whether the end-user device 109 is a personal computer or a dedicated consumer electronics device, the end-user device 109 must perform these basic functions. The end-user device 109 also provides various additional features and functions, such as generating a playlist & digital content database, displaying information and images during content playback, and recording to a foreign media device. These features vary depending on the services supported by these applications and the types of devices that these applications are designed to use. A. Overview Reference is now made to FIG. 10, which shows the main components and procedures, and the functional flow of the user equipment 9 '. Designed to support a person

〇Λ85\85 丨 56 分割.DOC -159- 200304126 腦型網路介面内容1 13服務的應用程式包含兩個可執行的 軟體應用程式:SC(S)處理器192、及播放應用程式195qSC(s) 處理器192是一種可執行的應用程式,該應用程式被配置成 一個放入最終使用者網路瀏覽器191之協助應用程式,用以 處理SC(s)檔案/MIME類型。當自電子數位内容商店1〇3、 清算所105、及代管内容網站U1接收到SC(s)時,劉覽器即 啟動該應用程式。該應用程式負責對Sc(s)a行所有必須的 處理,並將内容113加入最終使用者的數位内容資料庫196。 播放應用程式195是一獨立的可執行應用程式,最終使 用者載入該播放應用程式195,以便執行其數位内容資料庫 196中之内谷113 ,管理其數位内容資料庫196,以及在容許 時產生内容113之拷貝。可以java、C/C++、或任何等效語 言撰寫播放應用程式195及SC(s)處理器i 92應用程式。在較 佳實施例中,可自諸如網站等的電腦可讀取的裝置下載該 等應用程式。然而,也可利用其他的配送機制,例如在軟 碟或CD等的電腦可讀取的媒體上配送該等應用程式。 完全係經由最終使用者網路瀏覽器191處理内容113資 訊的搜尋及瀏覽、諸如歌曲片段的試聽、以及選擇所要賭 買的歌曲。電子數位内容商店1〇3以與目前許多内容113零 售網站所提供的相同方式來提供購物的體驗。與最終使用 者經由目前的網路型内容113購物之不同處在於:使用者裝 置現在可選擇將可下載的内容113物件加入其購物車中。如 果電子數位内容商店103除了可下載的物件之外,還有其他 可供銷售的貨品,則最終使用者可將實體貨品及電子式可 O:\85\85156 分割.DOC -160- 200304126 下載# P口口併放到其購物車中。在最終使用者結帳並將其 最後的購貝&amp;權傳送到電子數位内容商店103之前,安全數 位内谷電子式配送的最終使用者裝置i 09並不涉入其間。在 4時點&lt; Μ,係在電子數位内容商店103的網路伺服器與最 終使用者裝置1G9的劉覽器191之間進行所有的互動。這些 互動包括數位内容樣本片段的預覽。數位内容片段並未: 包封到SC⑷中,而是被整合到電子數位内S商店103的網 路服私中作為可下載的檔案,或是自—_流祠服器傳送該 數位内容片段。本系統架構並未規定内容113片段的格式。 在另一實施例中,播放應用程式195可與 ⑻或清算w接互動,或利用促銷進行離= 動。 B·應用程式安裝 將播放應用程式195及協助應用程式198被包封到可自 許多網站下載的-自行安裝之可執行程式。清算所1〇5係作 為在-公眾網站上存有主下載網頁的_中央網站。清算所 1 〇5包含可下載安裝套裝軟體的各網站之連結。可在所有的 代g内谷網站111取得該安裝套裝軟體,以便在地理上分散 下載的要求。每一參與的電子數位内容商店1〇3亦可使該套 裝軟體可自其網站下載,或者可只提供到清算所ι〇5的公眾 網站上的主下載網頁之連結。 想要購買可下載内容113的任何最終使用者下載及安裝 該套裝軟體。該安裝係自行包含在該可下載套裝軟體。該 套裝軟體打開及安裝協助應用程式丨9 8及播放應用程式〇Λ85 \ 85 丨 56 segmentation. DOC -159- 200304126 Brain network interface content 1 13 The service application contains two executable software applications: SC (S) processor 192, and playback application 195qSC (s The processor 192 is an executable application program that is configured as a helper application that is placed in the end-user web browser 191 to process SC (s) file / MIME types. When SC (s) is received from the electronic digital content store 103, the clearing house 105, and the hosted content website U1, Liu Lanji launches the application. The application is responsible for all necessary processing of the Sc (s) a line and adds the content 113 to the digital content database 196 of the end user. The playback application 195 is a stand-alone executable application that is loaded by the end user in order to execute the Uchigaya 113 in its digital content database 196, manage its digital content database 196, and, when allowed, A copy of the content 113 is generated. You can write and play applications 195 and SC (s) processor i 92 applications in java, C / C ++, or any equivalent language. In a preferred embodiment, the applications can be downloaded from a computer-readable device such as a website. However, other distribution mechanisms can also be used, such as distributing such applications on computer-readable media such as floppy disks or CDs. It is entirely through the end user web browser 191 to search and browse the content 113 information, audition such as song clips, and select the songs to bet. The electronic digital content store 103 provides a shopping experience in the same manner as many content 113 retail websites currently provide. The difference from the end user shopping via the current online content 113 is that the user device can now choose to add downloadable content 113 objects to their shopping cart. If the electronic digital content store 103 has other items available for sale in addition to the downloadable items, the end user can divide the physical goods and electronic products into O: \ 85 \ 85156. DOC -160- 200304126 Download # P mouth and put it in its shopping cart. Until the end user checks out and transfers his final purchase &amp; rights to the electronic digital content store 103, the end user device i 09 for secure digital Uchigo electronic distribution is not involved. At 4 o'clock &lt; M, all interactions are performed between the web server of the electronic digital content store 103 and the browser 191 of the end-user device 1G9. These interactions include previews of digital content sample clips. The digital content fragment is not: encapsulated in the SC⑷, but is integrated into the Internet service private of the S store 103 in the electronic digital as a downloadable file, or the digital content fragment is transmitted from the _liuci server. The system architecture does not specify the format of 113 fragments of content. In another embodiment, the playback application 195 may interact with ⑻ or clearing w, or use promotions to leave. B. Application installation The application 195 and the helper application 198 are packaged into executable programs that can be downloaded from many websites and installed by themselves. The clearing house 105 is the _ central website where the main download page is stored on the public website. The clearing house 105 includes links to various websites where software packages can be downloaded and installed. This installation package is available on all Dainetani websites 111 to geographically distribute the download requirements. Each participating digital content store 103 can also make the package downloadable from its website, or it can only provide a link to the main download page on the clearing house's public website. Any end user who wants to purchase downloadable content 113 downloads and installs the software package. The installation is included in the downloadable package itself. The software package opens and installs assisting apps 丨 98 and playback apps

ΟΛ85\85 丨 56 分跗 DOC -161 - 200304126 195,且亦將協助應用程式198的組態設定到所安裝的網路 瀏覽器。 作為该安裝的一邵分,為最終使用者裝置i 〇9產生一公 用/秘密金鑰661對,以便用於處理訂單及授權許可%⑷ 660。也產生一隨機對稱金鑰(秘密使用者金鑰”以便用來 保護授權許可資料庫197中之歌曲加密金鑰。將秘密使用者 金鑰(圖中未示出)分散成多個部分,並將該金鑰的各部分 儲存在最終使用者電腦的多個儲存位置,即可保護該金 鑰。係利用防篡改軟體技術來保護該區域的程式碼,以便 不會洩漏該金鑰的分割方式及儲存位置。防止包括最終使 用者在内的人存取該金鑰有助於避免内容113被其他的電 月回益用或共用。若要得知與如何使用這些金鑰的更多細 節’請參閱SC(s)處理器192的該節。 防篡改軟體技術是一種防止駭客在未經授權的其形下 入侵一電腦軟體應用程式。駭客通常想要知道及(或)修改 軟,,以便移除對使用的限制。事實上,並沒有無法破解 的私細程式,廷就是不將防篡改的軟稱為“保證無法篡改的 叙私的原因。但是破解一以防篡改技術保護的應用程式所 而的工作I通常將嚇阻大部分的駭客,這是因為所耗用的 工作里超過了可能的收穫。此處的工作將是破解内容113 的邛分 &lt; 金鑰,或許是一 上的一首歌之金鑰。 八 邊的防篡改軟體技術是來自IBM。導入該程式碼 的一種產品是IBM Thinkpad 77〇膝上型電腦。在該產品 中防篡改軟體係用來保護電腦中的DVD電影播放機。諸ΟΛ85 \ 85 丨 56 minutes DOC -161-200304126 195, and also set the configuration of the assisting application 198 to the installed web browser. As part of this installation, a public / secret key 661 pair is generated for the end-user device i 09 for use in processing orders and licensing% ⑷ 660. A random symmetric key (secret user key) is also generated to protect the song encryption key in the license database 197. The secret user key (not shown in the figure) is dispersed into multiple parts, and The key can be protected by storing parts of the key in multiple storage locations on the end-user's computer. The tamper-resistant software technology is used to protect the code in the area so that the key's partitioning method is not leaked And storage location. Preventing access to the key by people, including end users, helps to prevent content 113 from being used or shared by other electronic monthly benefits. For more details on how to use these keys' Please refer to this section of SC (s) processor 192. Anti-tampering software technology is a way to prevent hackers from invading a computer software application without their permission. Hackers usually want to know and / or modify software, In order to remove the restrictions on use. In fact, there is no private program that cannot be cracked. Ting does not call the tamper-resistant software "the reason for guaranteeing untamperable privacy. But cracking is to prevent tampering The work of the security application I will usually deter most of the hackers, because the work consumed exceeds the possible gains. The work here will be to crack the content of the content 113 key. It may be the key to a song on the top. Eight sides of the anti-tampering software technology is from IBM. One product that introduced the code is the IBM Thinkpad 77〇 laptop. The anti-tampering software system is used in this product. To protect the DVD movie player in your computer.

O:\85\85 丨56 分割.DOC -162- 200304126 如好萊塢電影廠商等的數位内容提供者關心數位電影的到 來、以及製作完美拷貝的容易程度,因而該等數位内容提 供者堅持放在DVD上的電影必須包含著作權保護的機 制的防篡改軟體使其難以規避這些著作權保護機 制。這是防篡改軟體非常典型的應用;該軟體係用來強制 執行内容113的某些受保護類型的使用。 IBM的防篡改軟體在入侵者的路徑中設置了數種障礙。 第一,該防篡改軟體包含可使骇客使用的除錯程式及反組 合程式等標準軟體工具程式失效或至少降低其有效性之技 術。第二,該防篡改軟體包含自我完整性檢查,因而將偵 測到單一修改、甚至小量的修改,並造成不正確的作業。 最後,該防篡改軟體包含可誤導駭客有關其確實作業的模 糊點。最後一種技術大都是特別的技術,但是前兩種技術 係根據加密及數位簽名等密碼學中習知的工具程式而建 立。 c·安全容器物件處理器192 萬取終使用者將其收集在其購物車中的貨品之最後購 貝技權傳送到電子數位内容商店1〇3時,該最終使用者的網 路4覽為即保持在連線狀態,等候來自網路祠服器的一回 應。電子數位内容商店103上的網路伺服器處理該購買,並 執行金融結算,然後將一交易sc(s)64〇送回到最終使用者 裝置109。網路瀏覽器啟動SC(s)處理器192(協助應用程式 198),以便處理與交易SC(s) 640相關聯的Sc(s)多媒體網際 網路郵件延伸(MIME)類型。圖14是播放應用程式195根據 O:\85\85I56 分刮.D〇c -163- 200304126 本發明而將内容下載到圖10所示的—本機資料庫的一使用 者介面畫面實例。 sc⑷處理器丨92開啟交易Sc(s) 64〇,並提取該sc⑷内▲ ”應HTML„及報價sc⑷641。係在劉覽器視窗中顯 π回應HTML網頁,用以確認最終使用者的購買。铁後在 步驟剛中職報價SC⑷64i,並自這些報價sc(s)’’’⑷提 取内客113(例如歌曲或專輯)名稱、及預計下載時間。然後 在步驟1402中利用該資訊顯示—個新的視窗,且將内容 113(例如對於骨樂而τ ’為歌曲或整張專輯)下載的排定時 私選項提供給最終使用者。最終使用者可選擇立即下載, 或將下載女排在一稍後的時間。如果選擇了一稍後的時 間貝J知下載排程資訊儲存在一記錄中,而且在最終使用 者裝置109於所安排的時間開機的情形下於該安排的時間 開始下載。如果電腦在在所安排的下載時間並未開機,或 通訊鏈路斷線,則在該電腦下—次開機時提示最終使用者 重新安排下載的時間。 當到了所安排的下載時間,或要求立即下載時,則叱⑷ 處理器192利用交易SC⑷64〇、報價%⑷64i中的資訊、 以及安裝時所產生的最終使用者公共金鑰661來產生訂單 SC(s) 650。係經由HTTP要求將該訂單Sc(s) 65〇傳送到清 算所105。當清算所1〇5送回授權許可sc(s)66〇時,重新呼 叫铴助應用程式198來處理授權許可sc(s)66〇。然後開啟 杈榷許可SC(s) 660,且自所參照的訂單sc(s)65〇提取代管 内容網站ill之網址。然後經由劉覽器的Ηττρ *求將授 O:\85\85156 分割.DOC -164 - 200304126 權许可SC(s) 660傳送到指定的代管内容網站lu,而要求 内谷SC(s) 630的下載。當内容sc⑷63〇傳送回瀏覽器時, 再度重新呼叫協助應用程式198。SC(s)處理器192顯示所下 載内谷113的名稱、一下載進度指示器、及一預估完成時間。 當SC(s)處理器192正在接收内容113時,Sc(s)處理器丨92 將貝料下載到記憶體緩衝區,以供解密。該緩衝區的容量 耳/夬於加在/貝异法及浮水印技術1 %的需求,且該容量是可 月匕作到的瑕小容量,以便減少未加密内容113洩漏給駭客程 ^ ^ 緩衝區填滿時,即利用自授權許可SC(s) ^疋取的最終使用者金鑰623 (對應於公共金鑰%丨),將該 爰衝區之内谷解遂、,且係先利用秘密金鑰將金鑰Μ]本身解 衣。然後將解密後的緩衝區内容傳送到加浮水印函式。 人加/、于水印程序193自授權許可SC(s) 660提取浮水印指 令’並利用最終使用者的秘密金料該等指令解密。然後 自授權T可SC(s) 660提取浮水印資料,該浮水印資料包括 诸如購男者名稱等的交易資訊,而該購買者名稱可以是登 π ]購貝内奋113的電子數位内容商店1〇3之購買者名稱, 在包子數位内客商店1()3並未提供一登錄功能時可以 是自信用卡登錄資訊得到的名稱。購買日期及交易識別碼 535也係包含在浮水印中,其中係由電子數位内容商店1〇3 指足収易識別碼535,以便對照到為該交易記錄的特定記 錄也c σ將為播放應用程式519的拷貝控制功能所使用的 商店使用條件1 9 5。 以便不 利用防篡改程式碼技術保護加浮水印程序1 %O: \ 85 \ 85 丨 56 division. DOC -162- 200304126 Digital content providers such as Hollywood film manufacturers are concerned about the arrival of digital movies and the ease of making perfect copies, so these digital content providers insist on DVD The movies on it must include copyright protection mechanisms with tamper-resistant software making it difficult to circumvent these copyright protection mechanisms. This is a very typical application of tamper-resistant software; this software system is used to enforce the use of certain protected types of content 113. IBM's anti-tampering software places several obstacles in the intruder's path. First, the tamper-resistant software includes technologies that can disable or at least reduce the effectiveness of standard software tools such as debug programs and anti-combination programs used by hackers. Second, the tamper-resistant software includes a self-integrity check, which will detect a single modification, or even a small number of modifications, and cause incorrect operations. Finally, the tamper-resistant software contains vague points that can mislead hackers about their actual operation. The last technology is mostly special technology, but the first two technologies are based on the tools and programs known in cryptography such as encryption and digital signature. c · 1.92 million secure container object processors When the end user sends the last purchase of the goods collected in his shopping cart to the electronic digital content store 103, the end user ’s network 4 is That is, stay connected and wait for a response from the Internet Temple Server. A web server on the electronic digital content store 103 processes the purchase, performs a financial settlement, and returns a transaction sc (s) 64 to the end-user device 109. The web browser activates the SC (s) processor 192 (assistance application 198) to process the Sc (s) multimedia Internet mail extension (MIME) type associated with the transaction SC (s) 640. FIG. 14 is an example of a user interface screen of the local database, as shown in FIG. 10-the playback application program 195 downloads content according to O: \ 85 \ 85I56. Doc -163- 200304126 invention. The sc⑷ processor 丨 92 opens the transaction Sc (s) 64 and extracts the contents of the sc⑷ 应 应 HTML HTML 及 and the quote sc⑷641. It displays the π response HTML page in the Liu browser window to confirm the purchase of the end user. After the iron post, the company just offered a quote SC⑷64i in the middle job, and from these quotes sc (s) ’’ ’, the name of the insider 113 (such as a song or album) and the estimated download time are extracted. Then use the information to display a new window in step 1402, and provide the end user with a schedule private option for downloading content 113 (e.g., for bone music τ 'is a song or an entire album). End users can choose to download immediately, or download the women's volleyball team at a later time. If a later time is selected, the download schedule information is stored in a record, and the download is started at the scheduled time when the end-user device 109 is turned on at the scheduled time. If the computer is not turned on at the scheduled download time, or the communication link is disconnected, the next time the computer is turned on, the end user is prompted to reschedule the download time. When the scheduled download time is reached, or an immediate download is required, the processor 192 uses the information in the transaction SC⑷64, the quote% ⑷64i, and the end-user public key 661 generated during installation to generate the order SC ( s) 650. The order Sc (s) 650 is transmitted to the clearing house 105 via an HTTP request. When the clearing house 105 returns the license sc (s) 66, the assistance application 198 is called again to process the license sc (s) 66. Then open the license SC (s) 660, and extract the hosted content website ill URL from the referenced order sc (s) 65. Then via Liu Lanqi ’s Ηττρ * to find the division of O: \ 85 \ 85156. DOC -164-200304126 license SC (s) 660 to the designated hosted content website lu, requesting the inner valley SC (s) 630 Download. When the content sc⑷63 is transmitted back to the browser, the assistance application 198 is called again. The SC (s) processor 192 displays the name of the downloaded inner valley 113, a download progress indicator, and an estimated completion time. When the SC (s) processor 192 is receiving the content 113, the Sc (s) processor 92 downloads the shell material to the memory buffer for decryption. The capacity of the buffer area is 1% of the demand for the addition / addition method, and the watermarking technology, and the capacity is a small capacity that can be made in order to reduce the leakage of unencrypted content 113 to hackers ^ ^ When the buffer area is full, the end-user key 623 (corresponding to the public key% 丨) obtained from the self-authorized license SC (s) ^ is used to decompose the inner valley of the flushing area, and First use the secret key to unravel the key M] itself. The decrypted buffer content is then sent to the watermarking function. The person adds /, in the watermark program 193, extracts the watermark instructions from the authorized license SC (s) 660 and decrypts them using the secret gold of the end user. Then the authorized Tco SC (s) 660 can extract the watermark data, which includes the transaction information such as the name of the man who bought it, and the name of the buyer can be Dengpi] purchase the digital content store in Benefense 113 The buyer's name of 103 may be the name obtained from the credit card registration information when the buns digital internal customer store 1 () 3 does not provide a login function. The purchase date and transaction identification code 535 are also included in the watermark. The electronic digital content store 103 refers to the receipt identification code 535, so that the specific record for the transaction record is also c σ will be used for playback applications. Store usage conditions used by copy control function of program 519 1 9 5. So as not to protect the watermarking process with anti-tampering code technology 1%

ΟΛ85\85156 分割 DOC -165 - 200304126 會戌漏浮水印指令’因而避免駭客參 各^現,予水印的位置及技 術。此種方式可防止駭客移除或修改浮水印。 在將任何必須的浮水印加到該内容緩衝區之後,將該緩 衝區的内容傳送麻序加密函式,以便進行重新加密^ 194。利用諸如IBM的SEAL加密技術等的一有處理2率之 安全加密演算法’而使用一隨機對稱金鑰將内容US重新加 密。一旦完成了下載及解密與重新加密程序194之後,現在 即毀掉内容提供者101原先將内容113加密的加密金鑰 623,並利用在安裝時所產生及隱藏的秘密使用者金瑜即新 的SEAL金鑰本身加密。現在將該新的加密後沾八1金鑰儲 存在授權許可資料庫1 07。 與在内容提供者101處執行的來源不同,在最終使用者 裝置109上執行的使用者浮水印程序可能不需要變成一個 有效的工業標準。這些標準仍然在進展中。該技術可讓控 制資訊嵌入音樂中,並可將控制資訊更新若干次。在拷貝 控制標準更穩定之前,在安全數位内容電子式配送系統1〇〇 中已提供了拷貝控制的替代方法,因而無須依賴拷貝控制 浮水印,即可在消費電子裝置中提供權利管理。利用連接 到最終使用者裝置109的加密之數位内容資料庫196實施儲 存及播放/記錄使用條件的安全性,且係經由防篡改環境而 保護該儲存及播放/記錄使用條件的安全性。當採用標準 時,係利用軟體追蹤點(hook)來支援拷貝控制浮水印。目 前已可支援在各種壓縮等級下的加浮水印AAC及其他編碼 的音訊流,但是此時該技術仍不太成熟,而無法用來作為 ΟΛ85\85156 分割.D0C -166- 200304126 拷貝控制的唯一方法。 解密與重新加密程序194是另一程式碼領域,其中係利 用=篡改程式碼技術保護該程式碼,以便不會淺漏了原始 内合113的加密金鑰、新的SEAL金鑰、及秘密使用者金瑜, 且其中儲存了各秘密使用者金输區段及將該金鑰分段之方 式。 ,解在與重新加密程序丨94的程序有兩個用途。儲存利用 ,似:演算法WEAL加密的内容113時,可執行更快速的 即時解被,且只需比諸如DES等更為工業標準類型的演算 法所需更少的處理器利用率,即可執行解密。此種方式可 讓播放應用程式195對内容113執行一即時且並行的解密_ 解碼-播放,而無須在解碼及播放之前先將内容113的整個 擒案解密。該SEAL演算法及一高效率解碼演算法的效率不 只可進行並行的作業(自加密檔案的申流式播放),而且也 可在效旎低許多的系統處理器上執行該程序。因此,可 在一諸如效能低至6〇百萬赫Pentium系統或效能更低的系 統等的一最終使用者裝置1〇9上支援該應用程式。使最後儲 存内各113所用的加密格式與原始的加密格式分離時,可在 選擇原始内容的加密演算法時有較大的彈性。因此,可使 用被廣泛接受且經過考驗的工業標準演算法,因而進一步 強化了數位内容業界對安全數位内容電子式配送系統ι〇〇 的接受度。 孩解密與重新加密程序194之第二個目的在於:不再需 要將内容提供者101用來將内容113加密的原始主加密金鑰ΟΛ85 \ 85156 Segmentation DOC -165-200304126 will miss the floating watermark instruction ’, so as to avoid hackers from participating, showing the location and technology of the watermark. This method prevents hackers from removing or modifying the watermark. After adding any necessary watermarks to the content buffer, the contents of the buffer are sent with a hex encryption function for re-encryption ^ 194. The content US is re-encrypted using a random symmetric key using a 2-rate secure encryption algorithm 'such as IBM's SEAL encryption technology. Once the download and decryption and re-encryption process 194 is completed, the content provider 101's original encryption key 623, which originally encrypted the content 113, is now destroyed, and the secret user Jin Yu created and hidden during installation is the new The SEAL key itself is encrypted. The new encrypted key is now stored in the license database 107. Unlike the source that is executed at the content provider 101, the user watermark process executed on the end-user device 109 may not need to become an effective industry standard. These standards are still in progress. This technology allows control information to be embedded in the music and updates the control information several times. Before the copy control standard became more stable, an alternative method of copy control had been provided in the secure digital content electronic distribution system 100, so that it was not necessary to rely on the copy control watermark to provide rights management in consumer electronics devices. The encrypted digital content database 196 connected to the end-user device 109 implements security of storage and playback / recording use conditions, and protects the security of the storage and playback / recording use conditions through a tamper-resistant environment. When standard is used, software hooks are used to support copy control watermarks. At present, it can support AAC and other encoded audio streams with various compression levels, but at this time the technology is still not mature enough to be used as ΟΛ85 \ 85156 segmentation. D0C -166- 200304126 The only one for copy control method. The decryption and re-encryption process 194 is another field of code, in which the code is protected by tampering code technology so that the original encryption key 113, the new SEAL key, and secret use are not leaked. Jin Yu, and the secret user's gold loss section and the method of segmenting the key are stored therein. There are two uses for the solution and re-encryption program. Storage utilization, like: When the algorithm WEAL encrypted content 113, faster instantaneous solution can be performed, and it requires less processor utilization than more industry standard types of algorithms such as DES, etc. Perform decryption. In this way, the playback application program 195 can perform a real-time and parallel decryption_decoding-playback of the content 113 without decrypting the entire capture of the content 113 before decoding and playing. The efficiency of the SEAL algorithm and a high-efficiency decoding algorithm can not only perform parallel operations (self-encrypted file streaming playback), but also execute the program on a much less efficient system processor. Therefore, the application can be supported on an end-user device 10, such as a Pentium system with a performance as low as 60 MHz or a system with a lower performance. When the encryption format used by each 113 in the final storage is separated from the original encryption format, there is greater flexibility in selecting the encryption algorithm of the original content. Therefore, widely accepted and tried-and-tested industry standard algorithms can be used, thereby further strengthening the digital content industry's acceptance of the secure digital content electronic distribution system ι〇〇. The second purpose of the child decryption and re-encryption program 194 is to eliminate the need for the original master encryption key used by the content provider 101 to encrypt the content 113.

0__\85\85156 分割.DOC -167- 200304126 623儲存在取得該内容113授權 了的母一個最終使用者奘 置109。只在一段很短的時間中 町外為杈權許可SCis) 660 一邵分的該主加密金鑰623緩衝儲^ *曰 衝儲存在取終使用者裝置1〇9 的硬碟上,而且該主加密金鑰6 丄、、 仗 奴很短的時間中儲 在1己憶體上。在該執行階段期間 又…月間,係經由防篡改程式碼拮 術保護該金鑰623。一旦完成了'馬技 、〜、、 疋成了涿解密與重新加密丨94階段 &lt;後’就不再需要以任何形式將今 式將该金鑰623保留在最終使用 者裝置109上,因而大幅降低了骇客進行破解的機率。 -旦將歌曲重新加密之後,即將該歌曲儲存在數位内容 資料庫196中。在步驟1403中,自相關聯的報價Sc(s) 641 提取播放應用程式195所需的所有中介資料,並也將該等中 介資料儲存在數位内容資料庫196。以前文中針對皇他内容 所述的相同方式’將諸如歌詞等的中介資料中之任何加密 部分解密並重新加密。用來將内容113加密的同—seal金 鑰係用於需要加密的任何相關聯之中介資料。 D·播放應用程式195 1.概述 安全數位内容電子式配送的播放應用程式195(在本文中 稱為播放應用程式;[95)類似於CD、DVD、或其他的數位内 容播放機,並類似於CD、DVD、或其他的數位内容儲存管 理系統。在該應用程式最簡單的功能中,係執行内容ιΐ3, 例如播放歌曲或视訊。在另一層級的功能中,該應用程式 提供最終使用者一種管理該最終使用者的數位内容資料庫 196之工具程式。在另一種同樣重要的功能中,該應用程式 0:\85\85丨56 分割.D〇c -168- 200304126 々供了對諸如歌曲等的内容資料庫(在此例中稱為播放清 單)之編輯及播放。 利用一組可以是經過個別選擇且針對内容提供者ι〇ι及 電子數位内容商店103的需求而訂製的組成部分組合成該 播放應用㈣195。現在將說明該播放應射呈式之—般性版 本,但疋使用者自訂的版本也是可行的。 現在請參閱Η 15,ϋ巾示出在圖職示最終使用者裝置 109上執行的播放應用程式195的主要組成部分及程序之方 塊圖。 有數組構成播放物件管理程式15〇1的各子系統之元件: 1 ·最終使用者介面元件i 509 2·拷貝/播放管理元件1504 3. 解密1505、解壓縮15〇6、播放元件15〇7、及可能包括的 記錄元件。 4. 資料管理1 502及資料庫存取元件15〇3 5 ·應用程式間通訊元件1 $ 〇 g 6·其他雜項(例如安裝等)元件 了根據下歹J的為求而選擇每一個這類組内之各元件·· 平台(Windows、Unix、或同等的作業系統) 通訊協定(網路、、雙線等) 内谷I疋供者101或電子數位内容商店1〇3 硬體(CD、DVD等) 清算所105技術及其他技術。 下列各節將詳述各種元件組。最後-節將詳述如何將這0 __ \ 85 \ 85156 Segmentation. DOC -167- 200304126 623 is stored in a parent end user set 109 that has been authorized for the content 113. Only for a short period of time outside the Nakamachi license SCis) 660 one cent of the master encryption key 623 buffer storage ^ * stored on the hard disk of the end user device 1009, and the master encryption The key 6 丄, is stored on the body of Jiji for a short time. During this execution phase ... the key 623 is protected via tamper-resistant code. Once the 'horse, ~ ,,, and 疋 have been decrypted and re-encrypted, stage 94 &lt; after', it is no longer necessary to retain this key 623 on the end-user device 109 in any form, so Greatly reduced the chance of hackers to crack. -Once the song is re-encrypted, it is stored in the digital content database 196. In step 1403, all the intermediary data required to play the application 195 is extracted from the associated offer Sc (s) 641, and the intermediary data is also stored in the digital content database 196. In the same way as previously described for the content of the king ', any encrypted portion of the intermediary material such as lyrics is decrypted and re-encrypted. The same-seal key used to encrypt the content 113 is used for any associated intermediary data that needs to be encrypted. D · Playback App 195 1. Overview Playback App 195 (herein referred to as Playback App; [95) is similar to CD, DVD, or other digital content players, and CD, DVD, or other digital content storage management system. In the simplest function of the application, content is executed, such as playing songs or videos. In another level of functionality, the application provides an end user with a utility for managing the digital content database 196 of the end user. In another equally important feature, the app is divided into 0: \ 85 \ 85 丨 56. Doc -168- 200304126 々 provides a library of content such as songs (called playlists in this example) Edit and play. The playback application ㈣195 is assembled using a set of components that can be individually selected and tailored to the needs of the content provider and the electronic digital content store 103. The playback version will now be described as a generic version, but a user-defined version is also possible. Referring now to Η15, a block diagram showing the main components and procedures of the playback application program 195 executed on the map end user device 109 is shown. There are array elements that constitute the various subsystems of the play object management program 1501: 1 · end user interface element i 509 2 · copy / play management element 1504 3. decryption 1505, decompression 1506, playback element 1507 , And recording elements that may be included. 4. Data management 1 502 and data inventory fetching component 1503 5 · Communication components between applications 1 $ 0g 6 · Other miscellaneous (such as installation) components are selected according to the following J for each group Each component inside · Platform (Windows, Unix, or equivalent operating system) Protocol (Internet, dual-line, etc.) Uchiya I. Provider 101 or Electronic Digital Content Store 103 Hardware (CD, DVD Etc.) Clearing House 105 technology and other technologies. The following sections detail the various component groups. The last-section will detail how to put this

ΟΛ85\85156 分割.DOC -169- 200304126 並說明如何依使用 二元件正σ到讀一般性播放應用程式 者的舄求而自ΤΓ這些元件。 灵施例中,播放應用程式19s及SC⑷處理器 的各元料用來作為程式設計師的軟體工具程式套件之一 部7刀4工具程式套件起動前文所述-般性播放應用程式 的各元件之預定介面。這些預定介面的形式為應用程式介 面(API) 用每些綱的開發人員可自一高階應用程式執 行該等元件之任何功能。㈣提供了這些元件的Αρι,所 以私式叹计師可迅速開發一客戶自訂規格的播放應 用程式 195,而無須重新產生任何這些元件的函式及資源。 2 ·取終使用者介面元件1 $ 〇 9 咸組的各兀件合而提供播放應用程式195的螢幕上顯 不。請〉王意,該設計並未建立這些元件的任何限定性配置。 忒一般性播放應用程式中提供了 一個此種配置。可根據内 容提供者101及(或)電子數位内容商店的需求以及其他需 求,而提供替代性的配置。 該組被分成若干次組,第一個次組具有若干元件,用以 展現最終使用者顯示幕1 5 1 〇,並處理用於音樂播放低階功 能的稱為最終使用者控制裝置1511之控制裝置,以及展現 中介資料。然後再將最終使用者顯示幕元件1 5 1 0分成若干 特殊的功能組(播放清單、數位内容資料庫等),然後利用 物件容器元件將這些低階元件分類及放置。 在下文所述的元件清單内,任何提到產生CD或將内容 113拷貝到一 CD或其他可記錄媒體之處時,只適用於播放 0奶\85丨56分割D〇c -170- 200304126 應用程式195已起動該功能的情形。亦請注意,在前後文中 提及術語CD時意指總稱的CD,亦可代表諸wMD或DVC^ 各種其他的記錄裝置。 圖16是根據本發明的圖15所示播放應用程式195的一例 示使用者介面畫面。最終使用者控制裝置1511的功能包括 (一最終使用者介面的對應畫面係示為丨6〇 i -1605): 執行内容113之控制: , 播放/停止按ί丑 播放按叙 停止按钮 暫停按紐 快速前轉按紐 快速後轉按姐 音量控制 音軌位置控制/顯示 聲道音量位準顯示及其他功能。 顯示與内4 113相關聯的中介資料之控制裝置·· 封面圖片按知 封面圖片物件 藝人照片按紅 藝人照片物件 音軌表按益 音軌表資訊物件 音軌表選擇器物件(點選播放)ΟΛ85 \ 85156 segmentation. DOC -169- 200304126 and explain how to get these components from ΓΓ according to the requirements of using two components positive σ to read the general playback application. In the spiritual example, each component of the playback application 19s and the SC⑷ processor is used as a part of the software tool program package of the programmer. The 7-knife 4 tool program suite is activated. The components of the general playback application are described above. Scheduled interface. These predetermined interfaces are in the form of application programming interfaces (APIs). Developers of each platform can perform any function of these components from a high-level application.了 Provided the Αρι of these components, so the private singer can quickly develop a customer-specific playback application 195 without having to regenerate the functions and resources of any of these components. 2 · Take away the user interface components 1 $ 〇 9 The various components of the salt group are combined to provide a playback application 195 on the screen. Please> Wang Yi, the design does not establish any limiting configuration of these components.此种 One such configuration is provided in the generic playback application. Alternative configurations can be provided based on the needs of Content Provider 101 and / or Digital Content Store, and other needs. This group is divided into several sub-groups. The first sub-group has several elements to display the end-user display screen 1510 and handles the control called end-user control device 1511 for low-level functions of music playback. Device, and presentation of mediation information. Then divide the end-user display screen components 15 10 into several special function groups (playlist, digital content database, etc.), and then use the object container component to classify and place these low-level components. In the list of components described below, any reference to generating a CD or copying the content 113 to a CD or other recordable media is only suitable for playing 0 milk \ 85 丨 56 split D〇c -170- 200304126 application In case program 195 has activated this function. Please also note that when referring to the term CD in the following text, it means the generic term CD, and it can also represent wMD or DVC ^ various other recording devices. FIG. 16 is an exemplary user interface screen of the playback application 195 shown in FIG. 15 according to the present invention. The functions of the end-user control device 1511 include (a corresponding screen of the end-user interface is shown as 丨 60i-1605): execution of the control of content 113:, play / stop press ugly play, press the stop button to pause the button Quick forward button, fast backward press, volume control, track position control, display channel volume level display, and other functions. Control device for displaying intermediary data associated with inner 4 113 ·· Cover image according to cover art object Artist photo by red Artist photo object Track table press benefit Track table information object Track table selector object (click to play)

O:\85\85156 分割 DOC -171- 200304126 音軌名稱物件 音軌資訊物件 音軌歌詞按紐 音軌歌詞物件 音軌藝人名稱物件 音軌贷項按鈕 音軌贷項物件 CD名稱物件 CD贷項按姐 CD贷項物件 一般性(可設定組態之)中介資料按鈕 一般性中介資料物件及其他。 最終使用者顯示幕15 10的功能包括(一最終使用者介面 的對應畫面係示為1601-1605): 顯示容器物件之播放清單 播放清單管理按紐 播放清單管理視窗 數位内容搜尋按紅 數位内容搜尋定義物件 數位内容搜尋送出按紐 數位内容搜尋結果物件 播放清單按鈕之拷貝選擇搜尋結果 播放清單物件(可編輯的) 播放清單儲存按鈕 O:\85\85156 分割 DOC -172- 200304126 播放清單播放按鈕 播放清單暫停按紐 播放清單重新開始按鈕 自播放清單按鈕產生CD及其他。 數位内容資料庫196之顯示 數位内容資料庫按鈕 數位内容資料庫管理視窗 數位内容種類按钮 數位内容種類物件 按照藝人選擇按鈕 按照類型選擇按紐 按照品牌選擇按紐 按照種類選擇按鈕 刪除按鈕 增加到播放清單按紐 拷貝到CD按鈕 歌曲清單物件 歌曲清單顯示容器物件及其他 容器物件及雜項 播放機視窗容器物件 音樂控制裝置容器物件 中介資料控制裝置容器物件 中介資料顯示容器物件 工具列容器物件 O:\85\85156 分割 DOC -173 - 200304126 樣本按 下載按叙 購買按叙 記錄按紐 播放機名稱物件 品牌/提供者/商店廣告物件 品牌/提供者/商店網址按鈕 蟄人網址按知及其他 3·拷貝/播放管理元件15〇4 這些元件處理加密金鑰、加人浮水印程序、拷貝管埋、 及其他程序之建立。也有與清算所⑽通訊的介面、傳輸蹲 μ求的介m諸如計次付t等特殊服務的介面 按照每次對内容113的存取收費的情形之介面。目前係由 SC⑷處理器192處理與清算所1〇5各功能之通訊。 係將最終使用者裝置109上的播放應用程式195對内容 113之使用記錄在一個諸如授權許可資料庫197等的資科 庫。可將播放應用程式195對内容113的每一次使用之追蹤 傳送到諸如清算所1〇5、内容提供者1〇1、電子數位内容商 店103、或耦合到傳輸基礎建設1〇7的任何指定網站等的〜 個或多個記錄網站。可將該傳輸安排在一預定時間,以便 將使用資訊上傳到一記錄網站。可考慮的一個時間是傳輪 基礎建設107上並無網路塞車現象的清晨之時。利用習知的 技術在一預定時間將播放應用程式195唤醒,並將該資訊自 本機的記錄資料庫傳送到該記錄網站。内容提供者檢杳 O:\85\85156 分割.DOC •174- 200304126 5己錄網站的資訊’即可衡量其内容113受歡迎的程度。 在另一實施例中,並不記錄内容U3的使用,以供爾後 上傳到一記錄網站,而是在每一次使用内容113時將内容 113的使用狀況上傳到該記錄網站。例如,當將最終使用者 裝置109中儲存的内容113複製或拷貝到諸如DVD、數位式 磁帶、快閃記憶體、MD、或等效的可讀取/寫入之抽換式 媒體等的一外部裝置時,即在該記錄網站上更新其使用狀 況。上述情形可能是購買内容113時所傳送的使用條件2〇6 中對拷貝内容113規定的一先決條件。此種方式確保内容提 供者ιοί可在其内容113的播放、複製、或對内容ιΐ3的進行 的其他動作時,能夠精確地追蹤到其内容113的使用狀況。 此外,可將與内容113有關的其他資訊上傳到該記綠網 站。例如,上一次執行内容113的時間(日期及小時);已執 行了内容113多少次;是否曾將内容113複製到或拷貝到— 諸如DVD、數位式磁帶、或河〇等的經授權之外部裝置。在 最終使用者裝置⑽上的ϋ放應靠式195有多個不 同的使用者之情形中,例如在一個家庭中的不同成員之情 形中,係將内容⑴使用者的識別碼連同使用資訊傳送到該 記錄網站。内容提供者101檢查上傳到該記錄網站的使用資 訊,即可根據實際的使用狀況、使用者的身分、及内容丨13 被執行的次數,而衡量内容113受歡迎的程度。此種實際使 用的量度方式使本系統接近事實的程度優於諸如制_ 對電視收視率的收視記錄器調查或電語柚樣調查等使用抽 樣方法的系統’在此類抽樣方法的系統中,係在任何一個 O:\85\85156 分’刻.d〇c -175- 200304126 時間中只對數目有限的使用者 、 考進仃抽樣調查,並以外差法 推論出結果。在本實施例中, 針财圮%到諸如電子數位 内容商店103或内容提供者1〇1等 守的一指疋網站之使用者, 而量度實際的使用狀況。 4.解密1505、解壓縮1506、及播放元件15〇6 外這些元件使用拷貝/播放管理元件取得的金鑰將自資料 管理及資料庫存取元件取得的音訊資料解密,然後進行適 當的解壓縮,以便將該資料準備好以供播放,並利用系統 音訊服務程式來播放該資料。在一替代實施例中,可將自 該等資料管理及資料庫存取元件取得的音訊資料拷貝到諸 如CD、軟碟、磁帶、或MD等的抽換式媒體。 5·資料管理1502及資料庫存取元件15〇3 這些元件係用來儲存及擷取最終使用者的系統上各種 儲存裝置上之歌曲資料,並用來處理對所儲存歌曲有關的 資訊之要求。 6.應用程式間通訊元件15〇8 這些元件係用於安全數位内容電子式配送的播放應用 程式與其他應用程式(例如瀏覽器、協助應用程式、及(或) 外掛應用程式等)間之協調,其中該等其他應用程式可能呼 叫該播放應用程式195,或者該播放應用程式195與執行其 功能時需要用到該等其他應用程式。例如,當起動一網址 的控制元件時,該網址的控制元件呼叫適當的瀏覽器,並 指示該瀏覽器載入適當的網頁。 7-其他雜項元件 O:\85\85156 分割 DOC -176- 200304126 抶法%類到上述各種類的一些個別元 疋件(例如安裝)被歸 類到此種類。 ~ 8·—般性播放應用程式 在本節中,將說明如何將上述各元件組合到—個版本白、 播放應用程式195。這只是多種不同的可能實例中之—^ 例,這是因為播放應用程式195被設計成可根據軟體物件: 自訂規格。 播放物件管理程式1501是一種整合所有其他元件之軟許 架構。如同上述各節所說明的,在本圖示中在播放物件= 理程式15〇1之下的各元件是任何播放應用程式中必須的元 件,但是可根據所用的加密或|L序加密形式、音訊壓縮類 型、以及對内容Π3資料庫的存取方法等的各種因素,而以 特殊的版本取代該等元件。 在播放物件管理程式15〇1之上的是若干可變物件i5i2, 且大邵分係自與所播放或所搜尋的内容113相關聯的中介 資料中衍生出該等可變物件1512。最終使用者裝置1〇9利用 最心使用者顯示幕15 10及自最終使用者控制裝置丨5丨丨接收 的知入,即可取得這些可變物件。所有物件的組態都是可 設定的,且所有容器物件的配置都是可自訂的。可利用 或任何等效的程式語言來實施這些物件。 使用播放應用程式195 下列實施例是最終使用者裝置1〇9上執行的播放應用程 式1 9 5是一音訊播放應用程式且内容u 3是音樂的一個例 子。热悉本門技術者當可了解,播放應用程式丨95亦可支援O: \ 85 \ 85156 Split DOC -171- 200304126 Track Name Object Track Information Object Track Lyrics Press New Track Lyrics Object Track Artist Name Object Track Credit Button Audio Credit Object CD Name Object CD Credit Click the general (configurable) mediation data button of the CD credit object of the sister to general mediation data objects and other. End-user display 15 10 functions include (the corresponding screen of the end-user interface is shown as 1601-1605): display container container playlist playlist management button playlist management window digital content search by red digital content search Define object digital content search submit button digital content search result object playlist button copy selection search result playlist object (editable) playlist save button O: \ 85 \ 85156 split DOC -172- 200304126 playlist play button play List Pause Button Playlist Resume Button Generates CD and other from playlist button. Display of digital content database 196 Digital content database button Digital content database management window Digital content type button Digital content type object Select button by artist Select button by type Select button by brand Select button by type Select button Delete to add to playlist Copy button to CD button Song list object Song list display container object and other container objects and miscellaneous player window container object music control device container object intermediary data control device container object intermediary data display container object toolbar container object O: \ 85 \ 85156 Segmented DOC -173-200304126 Sample Press Download Download Buy Record Record Button Player Name Object Brand / Provider / Store Advertising Object Brand / Provider / Store Website Button Button Click URL and Others 3. Copy / Play Management element 1504 These elements handle the creation of encryption keys, watermarking procedures, copy management, and other procedures. There are also an interface for communication with the clearing house, an interface for transmitting special services, such as a payment service, and an interface for special services such as billing and payment. At present, the SC⑷ processor 192 handles communication with various functions of the clearing house 105. The use of the content 113 by the playback application 195 on the end-user device 109 is recorded in a resource library such as a license database 197. Tracking of each use of the content 113 by the playback application 195 to, for example, clearing house 105, content provider 101, electronic digital content store 103, or any designated website coupled to transmission infrastructure 107 Etc. ~ or more record sites. The transmission can be scheduled at a predetermined time so that usage information can be uploaded to a recording site. One time to consider is early in the morning when there is no traffic jam on the infrastructure 107. Using a known technique, the playback application 195 is woken up at a predetermined time, and the information is transferred from the local recording database to the recording website. Content providers can check the O: \ 85 \ 85156 split.DOC • 174- 200304126 5 Information on the recorded website ’to measure the popularity of their content 113. In another embodiment, the use of the content U3 is not recorded for later upload to a recording website, but the usage status of the content 113 is uploaded to the recording website each time the content 113 is used. For example, when the content 113 stored in the end-user device 109 is copied or copied to a DVD, digital tape, flash memory, MD, or equivalent readable / writeable removable media, etc. When an external device is installed, its usage status is updated on the record website. The above situation may be a prerequisite for the copying of the content 113 in the conditions of use 206 transmitted when the content 113 is purchased. This method ensures that the content provider can accurately track the usage status of its content 113 when playing, copying, or performing other actions on the content 113. In addition, other information related to the content 113 can be uploaded to the Jilu website. For example, the time (date and hour) when the content 113 was last executed; how many times the content 113 has been executed; whether the content 113 has been copied or copied to — an authorized external source such as a DVD, digital tape, or river 0 Device. In the case where there are multiple different users of the release response type 195 on the end-user device, for example, in the case of different members of a family, the content / user identification is transmitted together with the usage information Go to the record website. The content provider 101 checks the usage information uploaded to the recording website, and can measure the popularity of the content 113 according to the actual usage status, the identity of the user, and the number of times the content has been executed. This measurement method actually used makes the system closer to the facts than systems that use sampling methods such as TV recorder surveys or telegram surveys of TV ratings. In such sampling method systems, At any time O: \ 85 \ 85156 points' ticks. Doc -175- 200304126 Only a limited number of users were admitted to the sample survey, and the results were deduced by the heterodyne method. In the present embodiment, the actual usage status is measured by the users of the one-click website such as the electronic digital content store 103 or the content provider 101. 4. Decryption 1505, decompression 1506, and playback element 1506. These components use the key obtained by the copy / play management component to decrypt the audio data obtained from the data management and data library fetching components, and then decompress appropriately. In order to prepare the data for playback, the system audio service program is used to play the data. In an alternative embodiment, the audio data obtained from these data management and data library fetching components may be copied to removable media such as CDs, floppy disks, magnetic tapes, or MDs. 5. Data management 1502 and data library retrieval components 1503 These components are used to store and retrieve song data on various storage devices on the end user's system, and are used to process requests for information related to the stored songs. 6. Communication components between applications 1508 These components are used for coordination between playback applications and other applications (such as browsers, assistance applications, and / or plug-in applications) for secure digital content electronic distribution. , Where the other applications may call the playback application 195, or the playback application 195 and these functions need to use these other applications. For example, when the control element of a web site is activated, the control element of the web site calls an appropriate browser and instructs the browser to load an appropriate web page. 7-Other Miscellaneous Components O: \ 85 \ 85156 Divide DOC -176- 200304126 Some individual components (such as installations) that cannot be classified from the% category to the above-mentioned categories are classified into this category. ~ 8 · —General playback application In this section, we will explain how to combine each of the above components into a single version, the playback application 195. This is just one of many different possible examples-the ^ example, because the playback application 195 is designed to customize specifications based on software objects: The play object management program 1501 is a software architecture that integrates all other components. As explained in the above sections, in this illustration, the components under Play Object = Manager 1501 are necessary components in any playback application, but can be based on the encryption used or the | L-order encryption form, Various types of factors such as the type of audio compression and access method to the content UI3 database, and these components are replaced with special versions. On top of the play object management program 1501 are a number of variable objects i5i2, and Dashao Branch derives these variable objects 1512 from the intermediary data associated with the content 113 being played or searched. The end user device 109 can obtain these variable objects by using the most user display 15 10 and the knowledge received from the end user control device 丨 5 丨 丨. The configuration of all objects is configurable, and the configuration of all container objects is customizable. These objects can be implemented using or any equivalent programming language. Using the Playback Application 195 The following embodiment is a playback application running on the end-user device 109. The 195 is an example of an audio playback application and the content u3 is music. If you are familiar with this technology, you can understand that the playback application 丨 95 can also support

O:\85\85 丨 56 分割 D0C -177- 200304126 其他類型的内容113。典型的音樂愛好者都有歌曲⑶的收 集。在安全數位内容電子式配送系統1〇〇内可取得所有這些 歌曲CD。係將自電子數位内容商店1〇3購買的一組歌曲儲 存在这些音樂愛好者系統上的數位内容資料庫196内。係以 播放清單之方式儲存類似於實體c D的各組歌曲。在某些情 形中,播放清單係完全模擬(:〇的形式(例如,可自市場上 購仵的一 CD之所有音軌都可以線上版CD之方式自一電子 數位内容商店103購買,並以等同於CD方式之一播放清單 界疋邊等所有晋軌)。但是,多半係由最終使用者整合出播 放清早,以便將其儲存在其系統的數位内容資料庫中的歌 曲刀颏.然而’為了便於後續的討論,在提及播放清單的 術二争係思扣使用者自行製作的音樂CD之例子。 當最終使用者明確地啟動播放應用程式195,而不是經由 SC(s)處理器192應用程式的啤叫而啟動播放應用程式 時,播放應用程式195預先載人被存取的上-㈣放清單。 如果數位内容資料庫196中並無任何播放清單,則自動啟動 播放清單編輯器(除非使用者已經由偏好設定而關閉了該 =能)。若要得知更多的細節,請參閱下文中之播放清單該 節0 。亦可利用作為-引數的一首特定的歌曲來呼叫播放應用 私式195在此種情形中,該播放應用程式195立即進入歌 处播欠模&lt; *可選擇使歌曲進入已準備好可播放的狀 彳疋在播放〈則須等候最終使用者的動#。若要得知 種^形的更夕貝訊’請參閱下文的歌曲播放一節。 O:\85\85156 分割D〇c -178- 200304126 播放清單(一最終使用者介面16〇3之對應畫面 當最终使用者已呼叫播放清單功能時,有下列可使用的 功能: 開啟播放清單 呼叫數位内容資料庫管理程式顯示所儲存播放清單 之一清單,以供選擇。若要得知更多的資訊,亦請參 閱下文的數位内容資料庫管理程式一節。 編輯播放清單 呼叫播放清單編輯器(請參閱下文),如果已載入了播 放⑺單,則亦可使用現行的播放清單。否則,該編輯 器將產生一個空的播放清單作為開始。 執行播放清單 自所選擇的歌曲開始(如果並未選擇歌曲〜則自該播放 β單的第-首開始),以—次—首之方式播放歌曲。播 放清單編輯器中設定的選項將影響到播放的順序。然 而可利用控制功能來越過播放清單的這些播放選 項。 播放歌曲 只播放自播放清單選出的歌曲。若要得知更多的資 訊,請參閱下文的歌曲播放一節。 播放清單資訊 與播放清單有關的顯示資訊。 歌曲資訊 與播放清單内所選擇歌曲有關的顯示資訊。O: \ 85 \ 85 丨 56 Divide D0C -177- 200304126 Other types of content 113. The typical music lover has a collection of songs (3). All of these song CDs are available in the secure digital content electronic distribution system 100. A set of songs purchased from the electronic digital content store 103 is stored in a digital content database 196 on these music enthusiast systems. Each group of songs similar to the physical CD is stored as a playlist. In some cases, the playlist is in the form of a complete simulation: (for example, all audio tracks of a CD that are commercially available can be purchased from an electronic digital content store 103 as an online CD, and It is equivalent to one of the CD methods, such as playlists, circles, etc.). However, most of them are integrated by the end user to play songs in the early morning so that they can be stored in the digital content database of their system. However, ' In order to facilitate the subsequent discussion, the second method mentioned in the playlist is an example of a user-made music CD. When the end user explicitly launches the playback application 195 instead of via the SC (s) processor 192 When the app is launched by the beer call of the application, the playback application 195 preloads the pop-up list accessed by the person. If there is no playlist in the digital content database 196, the playlist editor is automatically launched ( (Unless the user has turned this off by preferences = Yes). For more details, see section 0 of the playlist below. It can also be used as a -quote Count a specific song to call the playback application private 195. In this case, the playback application 195 immediately enters the song location and broadcasts the mode &lt; * You can choose to enter the song into a ready-to-play state. To play <you have to wait for the end user ’s action #. To learn more about the ^ shape of the eve, see the song playback section below. O: \ 85 \ 85156 Divide Doc -178- 200304126 Playlist ( The corresponding screen of the end user interface 1603. When the end user has called the playlist function, the following functions are available: Open the playlist and call the digital content database manager to display a list of one of the stored playlists for Select. For more information, see also the Digital Content Database Manager section below. Editing a Playlist Call the Playlist Editor (see below), or if a playlist is loaded, you can also Use the current playlist. Otherwise, the editor will generate an empty playlist as a start. Execution of the playlist starts with the selected song (if not selected The song ~ starts from the first-the first of the β list), and plays the song in the way of "times." The options set in the playlist editor will affect the order of playback. However, you can use the control function to skip the playlist. These play options. Play songs only play the songs selected from the playlist. For more information, please refer to the song playback section below. Playlist information and display information related to playlists. Song information and playlists Select display information about the song.

O:\85\85 丨 56 分割.DOC ' 179- 200304126 連線到網站 將與該播放清單相關聯的網站載入瀏覽器中。 資料庫管理程式 開啟數位内容資料庫管理程式視窗。若要得知更多的 貝訊’亦請參閱下文的數位内容資料庫管理程式一 即 ο 播放清單編輯器(一最終使用者介面1603之對應畫面): §乎叫播放清單編輯器時,有下列的最終使用者選項: 閱覽/載入/刪除播放清單 呼叫數位内容資料庫管理程式顯示所儲存播放清單 的一清單,以便選擇一個要載入或刪除的播放清單。 右要得知更多的資訊,亦請參閱下文的數位内容資料 庫管理程式一節。 儲存播放清單 將現行版本的播放清單儲存在數位内容資料庫 中。 刪除歌曲 自播放清單中刪除目前選擇的歌曲。 加入歌曲O: \ 85 \ 85 丨 56 Divide .DOC '179- 200304126 Connect to website Load the website associated with the playlist into your browser. Database Manager Opens the Digital Content Database Manager window. To learn more about Beixun, please also refer to the following digital content database management program-the playlist editor (a corresponding screen of the end user interface 1603): § When called the playlist editor, there are The following end-user options: View / Load / Delete Playlists Call the Digital Content Database Manager to display a list of stored playlists in order to select a playlist to load or delete. For more information, please also refer to the Digital Content Database Manager section below. Save playlist Save the current version of the playlist in the digital content database. Delete song Delete the currently selected song from the playlist. Add song

設定歌曲資訊 一節。 擇要加入播放清單之歌曲。若要得知更多的資 亦請參閱下文的數位内容資料庫管理程式、 之資訊,且容許對 顯示與播放清單内所選擇歌曲有關Set Song Information section. Select the songs you want to add to the playlist. For more information, please also refer to the digital content database management program below, and allow the display to be related to the selected song in the playlist

0_\85\S5 丨 56 分割.DOC -180- 200304126 該資訊的改變。該資訊係儲存在播放清單内,且並不 改變與數位内容資料庫196内儲存的歌曲有關之資 訊。 顯示歌曲名稱 最終使用者加上與歌曲有關的註釋 播放歌曲時的引入延遲 在播放歌曲之後的跟隨延遲 播放時歌曲内的起點 播放時歌曲内的終點 隨機模式的加權 該歌曲的晋量調整及其他。 設足播放清單屬性:顯示内容庫的屬性,並容許對該屬 性的改變。可設定的這些屬性有: 播放清單名稱 播放清單模式(隨機、循序等) 重播杈式(播放一次、播放完畢後重新開始等) 最終使用者對該播放清單所加上的註釋。 資料庫管理程式(一最終使用者介面16〇1之對應畫面): 開啟數位内容資料庫管理程式視窗。若要得知更多的資 訊,亦凊參閱下文的數位内容資料庫管理程式一節。 歌曲播放 备利用該歌曲作為引數呼叫播放應用程式195,或自一播 放清單或在數位内容資料庫管理程式内選擇一歌曲以供播 放’而率備琢歌曲以#播放時,彳下列的最終使用者選項 O:\85\85156 分割.D〇c -181 - 200304126 (一最終使用者介面1601的對應畫面): 播放 暫停 停止 快速後轉 快速前轉 調整音量 碉整音軌位置 預覽歌詞 預覽貸項 閱覽CD封面 閱覽藝人照片 閱覽音軌資訊 預覽其他中介資料 連線到網站 播放清單 資料庫管理程式。 數位内容資料庫管理程式 可於選擇歌曲或播放清單時自動呼叫數位内容資料庫 管理程式(請參閱前文),或可在其本身的視窗中開敌數位 内容資料庫管理程式,以便f理最終使用者系統上的歌曲 資枓庫。在此種情形中,有下列的最終使用者選項: 對歌曲的操作: 根據藝人、種類、品牌、 及其他因素而分類所有 的歌0_ \ 85 \ S5 丨 56 division. DOC -180- 200304126 This information is changed. This information is stored in the playlist and does not change the information related to the songs stored in the digital content database 196. Show song name End user plus song-related annotations Introduce delay when playing a song Follow the delay after the song is played Follow the start of the song during the delayed playback End of the song during the playback Random mode weights the song's margin adjustment and other . Set full playlist attributes: Display the attributes of the content library and allow changes to the attributes. These attributes that can be set are: Playlist name Playlist mode (random, sequential, etc.) Replay mode (play once, restart after playback, etc.) Annotation added by the end user to the playlist. Database management program (a corresponding screen of the end user interface 1601): Open the digital content database management program window. For more information, see also the Digital Content Database Manager section below. The song playback device uses the song as an argument to call the playback application 195, or select a song for playback from a playlist or in the digital content database management program. When the song is played as #, the following final User option O: \ 85 \ 85156 Divide. D〇c -181-200304126 (a corresponding screen of the end user interface 1601): Play pause pause fast fast forward fast volume adjustment 碉 track position preview lyrics preview loan Item view CD cover view artist photo view track information preview other intermediary data connect to website playlist database management program. The digital content database management program can automatically call the digital content database management program when selecting a song or playlist (see above), or it can open the digital content database management program in its own window to manage the final use Library of songs on the system. In this case, there are the following end-user options: Operations on songs: Sort all songs by artist, genre, brand, and other factors

O:\85\85156 分割 DOC -182- 200304126 曲 根據藝人、種類、品牌、及其他因素而選擇歌曲 將所選擇的歌曲加入現行播放清單 將歌曲拷貝到CD(如果被起動) 刪除歌曲 將歌曲加入種類,及其他。 對播放清單的操作: 根據名稱而分類 根據種類而分類 根據關鍵字而搜尋 根據所包含歌曲的名稱而搜尋 載入所選擇的播放清單 重新命名播放清單 刪除播放清單 自所選擇的播放清單(如果被起動)產生CD,及其他。 雖然已揭示了本發明的—特定實施例,但是熟悉本門技 術者當可了解,在不脫離本發明的精神及範圍了,尚可對 該特定實施例作出改變。因此,本發明之範圍並不限於該 特定實施例,且最後的申請專利範圍明二 的任何及料此財請案、修改、及實施例。_内 附圖簡述 圖1是根據本發明的-安全數位内容電子式配送系統概 觀之方塊圖。 圖2是根據本發明的一例#安全容器物件O: \ 85 \ 85156 Divide DOC -182- 200304126 Songs Select songs based on artist, genre, brand, and other factors. Add selected songs to the current playlist. Copy songs to CD (if activated). Delete songs. Add songs. Kind, and others. Operations on playlists: sort by name, sort by genre, search by keyword, search by the name of the contained song, load the selected playlist, rename the playlist, delete the playlist from the selected playlist (if Boot) to produce CDs, and more. Although a specific embodiment of the present invention has been disclosed, those skilled in the art will understand that changes can be made to the specific embodiment without departing from the spirit and scope of the present invention. Therefore, the scope of the present invention is not limited to the specific embodiment, and any application, modification, and embodiment of the final application patent scope is expected. Brief Description of the Drawings Figure 1 is a block diagram of an overview of a secure digital content electronic distribution system according to the present invention. Figure 2 is an example of #safe container object according to the present invention

O:\85\85156 分割.DOC -183 - 200304126O: \ 85 \ 85156 split. DOC -183-200304126

Container’·簡稱SC)及相關聯的圖形表示法之方塊圖。 圖3疋根據本發明的一安全容器物件(sc)的加密程序概 觀之方塊圖。 圖4是根據本發明的—安全容器物件(s C)的解密程序概 觀之方塊圖。 圖5疋根據本發明的圖丨所示安全數位内容配送系統的 權利管理架構各層概觀之方塊圖。 圖6是内容配送及授權許可控制於應用於圖^所示授權 终可控制層時的一概觀之方塊圖。 圖7 π出根據本發明的圖丨所示工作流程管理工具程式 之一例示使用者介面。 圖8疋對應於根據本發明的圖7所示使用者介面的工作 流程管理程式的主要工具程式、元件、及程序之方塊圖。 圖9是根據本發明的圖1所示一電子數位内容商店的主 要工具程式、元件、程序之方塊圖。 圖10是根據本發明的圖1所示使用者裝置的主要組件及 程序之方塊圖。 圖11是汁异根據本發明的内容預先處理及壓縮工具程 式的一編碼速率因數的一方法之流程圖。 圖12疋自動擷取根據本發明的圖8所示自動中介資料取 得工具程式的額外資訊的一方法之流程圖。 圖13疋自動設疋根據本發明的圖8所示預先處理及壓縮 工具私式的預先處理及壓縮參數的—方法之流程圖。 圖14不出根據本發明而將内容下載到一個圖Η所示本Container '· abbreviated SC) and a block diagram of the associated graphic representation. Fig. 3 is a block diagram of an overview of an encryption process for a secure container object (sc) according to the present invention. Figure 4 is a block diagram of an overview of a decryption procedure for a secure container object (SC) according to the present invention. Fig. 5 is a block diagram of an overview of each layer of the rights management architecture of the secure digital content delivery system shown in Fig. 丨 according to the present invention. FIG. 6 is a block diagram of an overview when content distribution and license control are applied to the license control layer shown in FIG. FIG. 7 illustrates an example user interface of one of the workflow management tool programs shown in FIG. 丨 according to the present invention. Fig. 8 is a block diagram of the main tool programs, components, and procedures corresponding to the workflow management program of the user interface shown in Fig. 7 according to the present invention. Fig. 9 is a block diagram of main tool programs, components, and programs of an electronic digital content store shown in Fig. 1 according to the present invention. Fig. 10 is a block diagram of the main components and procedures of the user device shown in Fig. 1 according to the present invention. FIG. 11 is a flowchart of a method of encoding a rate factor based on the content pre-processing and compression tool program according to the present invention. Fig. 12 is a flowchart of a method for automatically retrieving additional information of the automatic intermediary data acquisition tool program shown in Fig. 8 according to the present invention. FIG. 13 is a flowchart of a method for automatically setting a private pre-processing and compression parameter of the pre-processing and compression tool shown in FIG. 8 according to the present invention. Figure 14 shows the downloading of content to a graphic book according to the present invention.

O:\85\85156 分剖.D0C •184- 200304126 機内容庫的播放應用程式之使用者介面螢幕。 一 ·.圖15是在根據本發明的圖9所示使用者裝置上執行的 播放應用程式的主要元件及程序之方塊圖。 圖16示出根據本發明的圖15所示播放應用程式之一例 示使用者介面螢幕。 圖17是自動擴取根據本發明的圖8所示自動中介資料取 得工具程式的額外資訊的一替代實施例之流程圖/ O:\85\85 丨 56 分刮_D〇C 185-O: \ 85 \ 85156 Partition. D0C • 184- 200304126 User interface screen of the playback application of the machine content library. 1. Fig. 15 is a block diagram of the main components and procedures of a playback application program executed on the user device shown in Fig. 9 according to the present invention. FIG. 16 shows an exemplary user interface screen of one of the playback applications shown in FIG. 15 according to the present invention. Fig. 17 is a flowchart of an alternative embodiment of automatically extracting additional information of the automatic intermediary data acquisition tool program shown in Fig. 8 according to the present invention / O: \ 85 \ 85 丨 56 points scraping_DOC 185-

Claims (1)

200304126 拾、申請專利範圍: l 一種決定數位内容的一編碼速率之方法,該方法包含下 列步驟: 在一段預定時間中將該數位内容的所選擇一樣本編 碼;以及 利用所選擇的該樣本及該段預定時間計算一編碼速 率。 2.如申請專利範圍第丨項之方法,進—步包含下列步驟: 於將該數位内容編碼的期間中,顯示該編碼速率。 步包含下列步騾: 如申請專利範圍第丨項之方法,進一 儲存該編碼速率;以及 使該編碼速率與一特定編碼位元傳輸速率及一特定 編碼演算法相關聯。 如申請專利範圍第2項之方法,並+溢 &lt;万/5* 具中顯7F孩編碼速率之 該步驟包含下列步驟·· 内容總量 顯示已編碼的數位内容佔所要編碼的數位 之百分率。 ,其中顯示該編碼速率之 如申請專利範圍第2項之方法, 該步驟包含下列步驟··200304126 Patent application scope: l A method for determining an encoding rate of digital content, the method includes the following steps: encoding a selected sample of the digital content in a predetermined time; and using the selected sample and the A predetermined rate is calculated at a predetermined time. 2. The method according to item 丨 of the patent application scope, further comprising the following steps: displaying the encoding rate during the period of encoding the digital content. The steps include the following steps: If the method in the scope of the patent application is applied, the encoding rate is further stored; and the encoding rate is associated with a specific encoding bit transmission rate and a specific encoding algorithm. For example, the method of applying for the second item of the patent scope, and + overflow &lt; 10,000 / 5 * This step with the 7F encoding rate of the display includes the following steps: · Total content shows the percentage of encoded digital content to the number of digits to be encoded . The method of displaying the encoding rate, as in item 2 of the patent application scope, includes the following steps: 一種決定數位内容的一編 列步驟: 接收 伍内谷總量編碼尚餘的時間量。 編碼速率之方法,該方法包各下A sequence of steps to determine digital content: Receive the amount of time left in the Woo Valley Total Code. Encoding rate method, this method includes 將數位内容編碼; O:\85\85156 分割.DOC 200304126 计算將該數位内容給、 .. 、’扁馬現行編碼速率;以及 利用茲現行編碼速率# 7 圮旱更新孩預先計算出的編碼速率。 7·如申請專利範圍第6項 圮羊。 ,、夂万去,其中擷取一預先計算屮 的、.扁碼速率之該步驟對、 出 、心;一特定編碼位元傳 及一特定編碼演算法。 寻衢逮率 8·如申請專利範圍第6項之女、土 ^ - /、 法,進一步包含下列步驟: 數位内谷編碼的期間中,將減前計算出的編 碼速率用於顯示該編碼速率。 、、 9. 如申請專利範圍第6項夕+^ ,、乂万法,其中更新該先前計算出 的編碼速率之該步驟包含下列子步驟: 十算4先^算出的編碼速率及該現彳$ 平均值;以及 疋千&lt; 儲存該平均編碼速率作為該先前計算㈣編碼速率 的一新值。 10. 如申請專·圍第6項之方法,其中更新該先前計算出 的編碼速率之該步驟包含下列子步驟: 計算該先前計算出的編碼速率及該 平均值;以及 如果該現行編碼速率並去但雜+ 4 A … 卫禾偏離琢先W計算出的編碼 速率有一設定的臨界值,目丨丨辟六&amp; &amp;仏 ^ ^ 储存孩平均編碼速率作為該 先别叶算出的編碼速率的一新值。 11.如申請專利第9項之方法,其中儲存該平均編碼速 率的該子步驟包含下列步驟: 、使該先前計算出的編碼速率與—特定編碼位元傳輸 速率及一特定編碼演算法相關聯。 O:\85\85156 分割.D0C 200304126 12·如申請專利範圍第6項 V方法’進—步句人-r* *r丨也庄取 於該數位内容的編碼期 列步驟: J门T,顯7K琢編碼速康。 13. —種決定數位内容 、 列步驟: ㈣料q法,該方法包含下 將數位内容的所選擇_樣本mi 利用所選擇的—樣本大小及用來擇 ,扁碼所耗用 &lt; 時間量計算一編碼速率。 14· 一種決定數位內交μ «ή. . -接收機二率之系統’該系統包含: 幾用以接收所要編碼的數位内容. 選擇用以在—段預定時間中將該數位内容的所 k擇 樣本編碼;以及 冲异裝置,孩計算裝置利用數位内容的所選 本及該段預定時間計算一編碼速率。 w樣 15. 如申請專利範圍第14項之系統,進—步包含—顧示哭, 用以於該數位内容編碼的期間中顯示該編碼速率。 16. 如申請專利範圍第14項之系統,進一步包含: 儲存該編碼速率之儲存裝置;以及 使藏編碼速率與一特定編碼位元傳輸速率及一特定 編碼演算法相關聯之裝置。 17. 如申請專利範圍第15項之系統,進一步包含用來顯示 已編碼的數位内容佔所要編碼的數位内容總量之百分 率之裝置。 乃 18·如申請專利範圍第15項之系統,進一步包含用來顯示 將所要編碼的數位内容總量編碼尚餘的時間量之裳置。 O:\85\85156 分割.D〇c 200304126 19. 一 =足數位内容的―編碼速率之系統,該系統包含: 擷取一預先計算出的編碼速率之裝置; 將數位内容編碼之—編碼器; ’ 計异將該數位内容編碼 ’们現仃編碼速率之裝置;以 根據該現行編碼速率、 率之裝置。 更新孩預先計算出的編碼速 20·如申請專利範圍第19 /、又系統,其中擷取一預先計算 出的編碼速率之該劈·番 ^ έ使該先前計算出的編碼速 率與一特定編碼位元億扒 傳輸速率及一特定編碼演算法相 關聯之裝置。 21.如申請專利範圍第19 $之系統,進-步包-顯示器, 用以於將㈣㈣容編碼的期間中,制該先前計算出 的編碼速率來顯示該編碼速率。 22·如申請專利範圍第μ項、3 員 &lt; 系統,其中更新該先前計算 出的編碼速率之該裝置包本· 計算該先前計算出% μ 勺、為碼速率及該現行編碼速率的 平均值之裝置;以及 儲存$先則平均的編碼速率作為該先前計算出的編 碼速率之儲存裝置。 23·如申請專利範圍第1 頁 &lt; 系統,其中更新該先前計算出 的編碼速率之該裝置包厶· 計算平均值之裝置,m 、 用以在該現行編碼速率並未偏離 孩先前計算出的編碼淥 迷率有一設定的臨界值時,計算該 0:\85\85 丨56 分刮.D〇c 200304126 先雨計算出的編碼读逢 、 及 、及孩現行編碼速率之平均值;以 儲存該先前平均编 速率之儲存裝置。率作為該先前計算出的編碼 24·如申請專利範圍第22項 使該先前計算出的編亲座了一^琢儲存裝置包含 率及一特定編 ’、、、η與一特足編碼位元傳輸速 、’馬异法相關聯之裝置。 二請專利範圍第21項之系統,其中該 來顯示已編碼的數位内容佔所要編 : 之百分率之裝置。 妖u円谷總Υ 26·如申請專利範圍第 + , 負乏系統,其中該顯示器包本用 來頭示將所要編碼的數位内容釉 匕口用 之裝置。 〜I、’爲碼尚餘的時間量 π-種決定數位内容的'編碼速率之_,該系 : 接收所要編碼的數位内容之一接收機· ’' ^ 。 將一:斤選擇樣本大小的數位内容編碼之編碼器;以及 擇::Γ 了、擇“本大小的數位内容及用來將該所選 擇松本大小的數位内容編碼所耗 碼速率之裝置。 〈時間!計算-編 28·—種載有用來決定數位内容的— 巧迷率的程式指令之 電腦可讀取的媒體,該等程式指八勺 驟之指令: 〜含用於執行下列步 在&amp;預疋時間中將錢k内容的所選擇—樣本 碼;以及 編 O:\85\85156 分割.D0C 200304126 29. 利用所選擇的該樣本及該段預定時間計算一編碼速 率。 如申凊專利範圍第28項之電腦可讀取的媒體,進一步 包含用於執行下列步驟之指令: 在一段預定時間中將該數位内容的所選擇一樣本編 碼;以及 利用所選擇的該樣本及該段預定時間計算一編碼速 率0 30. 31. 32. 33. 34. 如申請專利範圍第28項之電腦可讀取的媒體,進 包含用於執行下列步驟之指令: 於將該數位内容編碼的期間中,顯示該編碼速率。 如申請專利範圍第28項之電腦可讀取的媒體,進一步 包含用於執行下列步驟之指令: 儲存該編碼速率;以及 使孩編碼速率與—特定編碼位元傳輸速率及一特定 編碼演算法相關聯。 一申叫專利辈巳圍帛30項〈電腦可讀取的媒體,立中顧 示f編碼速率的該指令包含科執行下列步驟之指令; 頭不已編碼的數位内容佔所 叮要、,扁碼的數位内容總量I自分率。 如申請專利範圍第30項之電腦可讀取的媒體,t中顯 ㈣編碼速率的該指令包含料執行下列步驟之指令: 顯不將所要編碼的數位内容她 ’ 、’心T、扁碼尚餘的時間量。 一種載有用來決定數位内容 J 編碼速率的程式指令 0:\85\8515ό 分割 DOC 200304126 式栺令包含用於執行下列 之電腦可讀取的媒體,該等程 步驟之指令: 以及 將所選擇的該樣本 將數位内容的所選擇—樣本編螞· ::用所選擇的一樣本大小及用來 碼&lt;時間量計算'編碼速率。 O:\85\85156 分割.DOCEncode the digital content; O: \ 85 \ 85156 divided. DOC 200304126 calculates the digital content to, .., 'Flat Horse's current encoding rate; and uses the current encoding rate # 7 to update the pre-calculated encoding rate . 7. If the scope of the patent application is the 6th 圮 羊.夂, 夂 万 去, in which a step pair, out, and heart of a pre-calculated 扁, flat code rate are retrieved; a specific encoding bit is passed, and a specific encoding algorithm. Searching rate 8. If the female, soil, ^-/, method of the 6th scope of the patent application, the method further includes the following steps: During the digital valley coding, the coding rate calculated before the subtraction is used to display the coding rate . 9 、 If you are applying for the 6th item in the scope of the patent application, the method of updating the previously calculated encoding rate includes the following sub-steps: ten calculations, 4 first calculation rates and the current calculation rate. $ Average; and 疋 疋 &lt; stores the average encoding rate as a new value of the previously calculated encoding rate. 10. If applying for the method of item 6, wherein the step of updating the previously calculated encoding rate includes the following sub-steps: calculating the previously calculated encoding rate and the average value; and if the current encoding rate is not Debut + 4 A… Wei He deviates from the encoding rate calculated by W. There is a set critical value. The purpose is to save the average encoding rate of the child as the encoding rate calculated by the other leaves. A new value. 11. The method of claim 9, wherein the sub-step of storing the average encoding rate comprises the following steps: associating the previously calculated encoding rate with a specific encoding bit transmission rate and a specific encoding algorithm. O: \ 85 \ 85156 segmentation. D0C 200304126 12 · If method 6 of the scope of application for patents, method "progressive person-r * * r 丨" is also listed in the encoding period of the digital content steps: J 门 T , Shows 7K cut coding Sucom. 13. —A step to determine the digital content and sequence: The q method, which includes the selection of the digital content_sample mi using the selected—sample size and selection, the amount of time spent in the flat code &lt; Calculate a coding rate. 14. · A system for determining the digital interleaving μ «price..--Receiver second rate 'The system includes: a receiver for receiving the digital content to be encoded. It is selected to receive the digital content in a predetermined period of time. Select sample encoding; and a differentiating device, the child computing device calculates an encoding rate using a selected copy of the digital content and the predetermined period of time. Sample 15. If the system of the scope of application for the patent No. 14 further includes-Gu Shi cry, used to display the encoding rate during the encoding of the digital content. 16. The system according to item 14 of the patent application scope, further comprising: a storage device for storing the encoding rate; and a device for associating the Tibetan encoding rate with a specific encoding bit transmission rate and a specific encoding algorithm. 17. The system according to item 15 of the scope of patent application, further comprising a device for displaying the percentage of encoded digital content to the total amount of digital content to be encoded. 18. The system according to item 15 of the scope of patent application, further comprising a display for displaying the amount of time left to encode the total amount of digital content to be encoded. O: \ 85 \ 85156 segmentation. D〇c 200304126 19. digital content-encoding rate system, the system includes: a device that retrieves a pre-calculated encoding rate; encodes digital content—encoder ; 'Differentiating the encoding of this digital content' devices using the current coding rate; devices based on the current coding rate and rate. Update the pre-calculated coding speed 20 · If the patent application scope is 19 /, and the system, which extracts the pre-calculated coding rate of the split and fan ^, the previously calculated coding rate and a specific coding A device associated with a bit rate and a specific coding algorithm. 21. The system of claim 19 $, a step-by-step package-display, is used to display the encoding rate by making the previously calculated encoding rate during the period of encoding the content. 22 · If the scope of the patent application is μ, a 3-member &lt; system, in which the device package of the previously calculated coding rate is updated. Calculate the previously calculated% μ, which is the average of the code rate and the current coding rate. A value storage device; and a storage device that stores the average encoding rate of the $ as the previously calculated encoding rate. 23. If the system of patent application page 1 &lt; system, wherein the device of the previously calculated coding rate is updated, the device for calculating the average value, m, is used to deviate from the current coding rate without deviating from the previously calculated When there is a set critical value for the encoding rate, calculate the 0: \ 85 \ 85 丨 56 points. Doc 200304126 The average value of the encoding reading rate calculated by Xianyu, and, and the current encoding rate of the child; A storage device that stores the previous average editing rate. The rate is used as the previously calculated code Transmission speed, 'horse-related law' associated devices. 2. The system of item 21 of the patent scope, wherein the device for displaying the coded digital content as a percentage of the desired:.妖 u 円 谷 总 Υ 26. If the scope of the patent application is +, the display system is used for displaying the digital content to be coded to glaze the dagger. ~ I, 'are the amount of time left in the code. Π-a type of' encoding rate 'that determines the digital content. This system: Receiver that receives one of the digital content to be encoded.' '^. An encoder that encodes digital content of a selected sample size; and selects: Γ, selects the digital content of this size, and a device used to encode the digital content of the selected Matsumoto size. Time! Calculate-Ed. 28 · —A computer-readable medium containing program instructions for determining digital content—a program that refers to eight steps: ~ Contains instructions for performing the following steps in &amp; The selection of the content of the money k in the pre-scheduled time-the sample code; and the division of O: \ 85 \ 85156. D0C 200304126 29. Use the selected sample and the predetermined time to calculate a coding rate. Such as applying for a patent The computer-readable medium of scope item 28 further includes instructions for performing the following steps: encoding the selected sample of the digital content in a predetermined period of time; and using the selected sample and the predetermined period of time Calculate a coding rate of 0 30. 31. 32. 33. 34. If the computer-readable medium of item 28 of the scope of patent application, including instructions for performing the following steps: During digital content encoding, the encoding rate is displayed. For example, the computer-readable media of item 28 of the patent application scope further includes instructions for performing the following steps: storing the encoding rate; and making the encoding rate of the child-specific The encoding bit transmission rate is associated with a specific encoding algorithm. One application is called the patent generation 巳 帛 30 items <computer-readable media, and the instructions that show the f encoding rate include instructions to perform the following steps; head The non-encoded digital content accounts for the main content, and the flat code total digital content I self-fraction. If the computer-readable media of item 30 of the patent application applies, the instruction that shows the encoding rate in t includes the following: Step instructions: Display the amount of time left in the digital content to be encoded, 'heart T', and flat code. A program instruction containing 0 to determine the J encoding rate of the digital content 0: \ 85 \ 8515ό split DOC 200304126 formula The order contains instructions for performing the following computer-readable media, the steps of the process: and the selection of the selected sample and the selection of the digital content - * Sample :: ed ant with the selected code is used as the size and the present &lt; calculating an amount of time 'coding rate O: \ 85 \ 85156 segmentation .DOC.
TW92110051A 1998-10-22 1999-10-19 A method to identify CD content TWI255443B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/177,096 US6389538B1 (en) 1998-08-13 1998-10-22 System for tracking end-user electronic content usage
US09/203,306 US6345256B1 (en) 1998-08-13 1998-12-01 Automated method and apparatus to package digital content for electronic distribution using the identity of the source content

Publications (2)

Publication Number Publication Date
TW200304126A true TW200304126A (en) 2003-09-16
TWI255443B TWI255443B (en) 2006-05-21

Family

ID=34437156

Family Applications (2)

Application Number Title Priority Date Filing Date
TW92110051A TWI255443B (en) 1998-10-22 1999-10-19 A method to identify CD content
TW88118057A TWI222057B (en) 1998-10-22 1999-10-19 Method to automatically retrieve information and data, computer readable medium, and method and system of automatically selecting encoding parameters

Family Applications After (1)

Application Number Title Priority Date Filing Date
TW88118057A TWI222057B (en) 1998-10-22 1999-10-19 Method to automatically retrieve information and data, computer readable medium, and method and system of automatically selecting encoding parameters

Country Status (1)

Country Link
TW (2) TWI255443B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI578243B (en) * 2015-09-21 2017-04-11 Yun Qi Management Method of Digital Assets Share and Expected Transfer
TWI578772B (en) * 2016-01-26 2017-04-11 威盛電子股份有限公司 Play method and play device for multimedia file
TWI755890B (en) * 2019-10-28 2022-02-21 大陸商深圳市商湯科技有限公司 Data processing method, electronic device and computer-readable storage medium

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102906690B (en) * 2010-09-19 2015-08-19 联发科技(新加坡)私人有限公司 Encoding and decoding resource management method and related processing circuit
TWI445323B (en) 2010-12-21 2014-07-11 Ind Tech Res Inst Hybrid codec apparatus and method for data transferring
TWI720521B (en) * 2018-05-23 2021-03-01 莊連豪 Point management platform
TWI680414B (en) * 2018-05-23 2019-12-21 莊連豪 Point operation platform and its implementation method
TWI699715B (en) * 2018-11-15 2020-07-21 旭曜資訊服務有限公司 An enhanced on-line platform for workforce
TWI661322B (en) * 2018-11-28 2019-06-01 中華電信股份有限公司 Database accessing system and database accessing method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI578243B (en) * 2015-09-21 2017-04-11 Yun Qi Management Method of Digital Assets Share and Expected Transfer
TWI578772B (en) * 2016-01-26 2017-04-11 威盛電子股份有限公司 Play method and play device for multimedia file
TWI755890B (en) * 2019-10-28 2022-02-21 大陸商深圳市商湯科技有限公司 Data processing method, electronic device and computer-readable storage medium

Also Published As

Publication number Publication date
TWI222057B (en) 2004-10-11
TWI255443B (en) 2006-05-21

Similar Documents

Publication Publication Date Title
TW454132B (en) Digital content preparation system
JP4565940B2 (en) System for managing content data, metadata related to the content data, and usage condition data related to the content data
JP4347508B2 (en) Method for uniquely identifying digital content on digital content player-Digital content player, computer-readable recording medium including program
JP4549673B2 (en) Method and system for preventing unauthorized re-recording of multimedia content
TW563037B (en) Digital content distribution using web broadcasting services
KR100374524B1 (en) Secure electronic content distribution on cds and dvds
US7228437B2 (en) Method and system for securing local database file of local content stored on end-user system
US7110984B1 (en) Updating usage conditions in lieu of download digital rights management protected content
US7188085B2 (en) Method and system for delivering encrypted content with associated geographical-based advertisements
US7590866B2 (en) Super-distribution of protected digital content
TW530267B (en) Multimedia player for an electronic content delivery system
US20070208763A1 (en) Computer Database Record Architecture Based on a Unique Internet Media Identifier
TWI255443B (en) A method to identify CD content

Legal Events

Date Code Title Description
MK4A Expiration of patent term of an invention patent