200825831 九、發明說明: 【發明所屬之技術領域】 本發明係有關一種數位資料防護,特別是指一種保護數位資料之 方法,數位資料可譬如為多媒體内容,其利用浮水印來識別不同的使 用者與内容,從而防止數位資料遭受非法複製。 【先前技術】 - 隨著頻寬的不斷提昇,經由網際網路來進行數位多媒體的存取行 為已經變得非常普遍。使用者將可以透過瀏覽内容供應者的網站並下 載如電影或音樂等多媒體。 而為了保護内容供應者所提供的内容,通常會使用數位版權管理 (digital rights management; DRM)。數位版權管理是一種用來管控 及處理數位資料的技術,一般而言,數位版權管理將會對 的數位資料或裝置的處理加以限制。 ' 月 ^然而,當内容供應者很好地利用了數位版權管理,這個技術卻往 往令許多使用者感到困惱。舉例來說,假若使用者購買了一首特定歌 曲並將這首歌曲下載到使用者裝置A,即使使用者已經合法地購買了 這《:曲,但這首歌㈣是紐在者裝置B巾進行傳輸與聽取。 、 另外,有些類型的數位版權管理可以被認為是反競爭 - (antkompetitive)行為,因為他們要求使用者必須使用特定的裝置、 播案類型絲㈣容。譬如,具有數位版鮮理的歌曲只可以在 某種品牌的音賴放平台帽放,這樣對使用者並不方便,因為使用 者使用特疋裝置,而不能選擇使用者所想要使用的裝置。 並且,有些麵的數位版權管理已經獅客成功的攻擊,導致 需^授權,而只要使用-般的檔案分享卫具即可以分享數位資料 使得數位内容擁有者無法接收到他們應得的利益。 δ 因此,實有必要尋求-種改善的保護數位㈣之方法,來 位資料遭受非法的㈣與分享,同時此方法並不會強迫翻擾使用^數 5 200825831 Λ 【發明内容】 =獲得這些與其他目的來克服傳統方法之種種缺失,在此,作具 體與寬廣地描述本發明之目的。本發明乃提供一種保護數位資料之方 法,係利用浮水印來識別不同的使用者與多媒體内容,以避免該多媒 體内容遭到非法複製。 ” ^ ^發明所提供的保護數位資料之方法乃包含有嵌入數位浮水印或 ^ 電子指紋於數位資料的步驟。此浮水印會識別下載數位資料的使用 者,假如數位資料被發現未授權複製或分享,可以容易地識別原先的 使用者並加以處罰。 在本1明中,内谷供應者所提供的多媒體内容可由已註冊的使用 者下載而取得。此數位内容包括音樂、視訊、遊戲、軟體、電子書、 或其他類型的數位資料。使用者向伺服器註冊並建立使用者帳號:當 使用者登入使用者帳號,即可以開始下載該數位資料。 當數位資料被成功地下載到使用者裝置,本發明的保護數位資料 之方法可以嵌入浮水印到數位資料中。此浮水印包含有使用者帳號資 料、使用者識卿、使用者真實姓名、資料翻項、崎供應者識別 項、裝置識別項或前述這些資料的組合。 由於使用者在註冊過程已經提出個人的身分資料,因而可以容易 地識別出使时。顧者提供的資料包括,譬如有賴者名稱、地址、 電話號碼、聯絡資料、年齡、性別、付款方式、付款工具等等。 假若找到未授權複製的數位資料,可以讀取浮水印並識 的使用者。假如數位資料被原先使用者非法分享,則原先使用者會= 受處罰。譬如,使用者的身分可以被更新到適當的授權機構,以檢舉 使用者或者終止使用者的帳號。所以,使用者可以保護他們的數位資 料並且將不會讓授權管理的資料被隨意分享。因此,將可消滅數位資 料的剽竊行為。 、 假若浮水印包含資料識別項,不管資料檔案的名稱是否已經改 6 200825831 變,數位資料都可以被識別出來。因此,為了隱藏正碟資料内容而去 ^新αρ名貝料棺案的行為是毫無用處的。另外,假若浮水印包含内容 供應者綱項,獅先⑽供應者或數㈣容擁有者就可以被識別出 來。 本=明所提供的保護數位資料之方法很適合用在音樂·訊下載 服務J ’本方法係可以制在提供任何麵可下載賴的服務。 本毛明所提供的保護數位資料之方法可防止數位資料遭受未授權複 製,因此會增加内容供應者的所得利益,並將可以較低的費用提供數 位貧料給伽者。魏會影_作_服_航更加地普遍。 本發明的-個優點在於使用者可以保護他們的數位資料,而不是 -=位資料脫_容供應者的控制時,必須要仙容供應者嘗試去 保羞貝料。本方法對於容易控制數位資料的保護是相當有效的。 以下將可透侧讀以下本㈣之較佳實施_詳細描述之後,使 啦:之技*思想更被突顯,以了解與麟本發明之這些和其他目的。 :、、、使對柄明中專利範圍能有進一步的了解,兹舉出具體 評細說明如下·· u 【實施方式】 現在舉出數她佳實施觸細_本發明之内容,並關式 付^參閱第1圖’騎示根據本發明之—個實酬所揭露的保護數 1丨=^與方:,呈與結構示意圖,以說明如何利用浮水印識 5 、使用者與資料以防止數位資料遭受非法複製。 包含’卿本發明之保護數位倾之方法的系統觸, 勺It谷供應者伺服器110,用以儲存數位資料120。數位資料120 二^彳^A、_、軟體、多媒體或其他類型的數位資料。在本 喪明的—個實施射,數位資料可以由數位版權管理⑽Μ) 13^ 7 200825831 保護。 一開始’使用者為了利用内容供應者伺服器得向内容供廣、者a主 冊。在註冊期間,使用者必須提供個人資料,個人資料包括,链士有 使用者名稱、真實姓名、地址、電話號碼、聯絡資料、年齡、性別 付款方式、付款工具、付款資料、密碼或用以識別這位使用者 資料。 、、他 在註冊完成之後,使用者要藉由提供他們的使用者名稱與密碼來 登入。當使用者登入後,使用者可以透過網頁瀏覽並選擇各^案的 數位資料120,然後進行下載。 ^、、 當數位資料120已經被成功下載到使用者裝置14〇,譬如為電腦、 筆記型電腦、個人數位助理(PDA)'或攜帶型電話,則浮^水印或數3立 指,將會被嵌入數位資料150。浮水印包含有可以識別原先下載此數 位資料的使用者之資料。譬如,在本發明之一個實施例中,浮水印包 含有已下載了數位資料的使用者的使用者名稱。 匕 當發現數位資料的複製版本時,將會讀出浮水印 者,如,可以在點對點傳輸(pier-t0-pie「)、網路、BPT (=== 下載網路、或其他檔案分享網路中發現複製版本。一旦識別出使用者, 將巧者的身分請_#的授權機構崎舉或處罰使用者,或 =内讀應者就可職意職使用者,可以將該制者的帳號 取消或終止。 a由於數位資料包含用以識別使用者的嵌入式浮水印,使用者將會 =小心謹慎地麟數位雜。使用者將不會魏姆料脫離他們當 ; Ϊ如,—旦當這種未經授權而隨意分享標案的行為會讓使 又到處t㈣’使用者將不會允許具有浮水印的數位資料在標案分 予網路上被分享出來。 ” 的竹利用本發明之方法,使用者將會對待數位資料如同他們對待他們 。用卡-樣切。制者不會允許他們的信时被其他人使用來毀 8 200825831 。由本發明的同樣道理可知,當數位資料之複製版本會 二身分—併被複製時,使用者將不會允許他們的數位資料 ^複旱給其他人。假若在檔案分享網路上發現數位資料的多媒 版本,原先的制者將祕嚴重的後果。@此,使用者會非常 保4他們的數位資料。 次料在的其他實施例中,浮水印紐位指紋包含有使用者帳號 者識別項、使用者真實姓名、資料識別項、内容供應者識 =、名置酬項或前述這些龍的組合。譬如,在數個實施例中, 〜印包3有内谷供應者識別項’而可以容易識別出内容供應者。 在本發明的—個實施财,錢^水㈣倾之前,會先將數 位版核管理的密碼從數位資射移除掉。這樣的做法可避免任何數位 版權官理和使用者裝置之間的潛在衝突。 位資說明根據本發明之-個實施例所揭露的保護數 如第2圖所說明之方法·,其包含下列步驟:首先,如步驟2扣, f可^載的數位資料。然後’如步驟22〇,利用數位版權管理保 β文位貝料’如步驟23〇 ’再將數位版權管理所保護的數位資料儲存 於内容舰器上。之後,如步驟24〇,藉由提出個人f料,使用=向 進行註冊。接著,如步驟250,當已註冊的使用者 k擇要下載的數位貝料,如步驟260,再將數位資料下載 + 驟27〇二當數位細鍵功地彻_者裝置,會移轉數位版^ 官理的检碼’並^,如步驟280,會在數位f料中嵌 者的浮水印。 喊刎便用 數位資料在任何時候被複製或傳輸到另外的裝置時,浮 持嵌入在數位資料中。數位龍的任何複製版本中,浮水 : ^取並識別出個者。這可避免制者從事非法的複製或分享數位資 9 200825831 請參閱第3圖,其說明根據本發明之—個實施例所揭露的保護數 位資料之方法之流程圖。本方法300包含下列步驟:如步驟3i〇w,提 供數位資料,如步驟320,並儲存數位資料在伺服器上。然後,如步 驟330,已註冊的使用者選擇要下載的資料,如步.驟34〇,則數位二 料會被下載到使用者裝置上。最後,浮水印會被嵌人到數位資料,用 以識別下載過數位資料的使用者。 、 本實施例所提供的方法中,儲存在内容伺服器的數位資料並不為 數位版權管理聽護。内容供應者會儲存供人下載的數位資料在内^ 伺服器上,已註冊的制者可崎擇要下載的數位雜,並將數位 料下載下來。 、 在數位資料被下載之後,浮水印會被嵌入於數位資料中。此 印包含用來識別下_數位資料的使用者的資料,使得數位資料的ς 何複製版本將具有用以識別使用者的嵌入式浮水印。 在此實施射’絲使雌錄辟理,也不t要去概它。然 :到:可以識別使用者的浮水印’故數位資料仍然有、 大或帶來困擾的情況下受到保護。 曰、刀居 參閱第4圖’其况明根據本發明之—個實施例_露的保護| =料之方法之流簡。在此實關所提供的方法彻,浮水印= 如所後入。首先,如步驟41〇,由内容供應者提供數位資料, 用二卜’,數位資料儲存在概器上。隨後,如步驟422,使 的資並且’如步驟425 ’伺服11會挑選或檢索使用者 案,當已註冊的使用者選擇了要下載的數位資料槽 ‘ 驟440 ’洋水印就會在下載之前先被嵌入於數位資料中。此 作單據或身分證明而個人化’讓每個使用者可以 會被下步驟450 ’當浮水印嵌入於數位資料之後,就 200825831 其理Γΐ容供應者極賴安全性。本實_不需要數位版權 :二所包含的特性為可識別正在下載數位資料的使用 因任何複製版本都可以由讀取浮水印而識別出來。 冊原先下載的仙者,使用者將不會允許數位資 子而導致遭倾舉或處罰的危機。用此種方式,本發明 之方法s有处有效率地保魏㈣料,並 或,的複製與分享。同時,本方法對使用者是友;二= 不曰對於裝置或錄放的衝突而感到困擾。 位資==程:說明根據本發明之一個實施例_ 此胃歸彳巾’首先’如步驟51G,内容供應者會提供數位資料, 如步驟520,並將數位資料儲存在伺服器上。隨後,如步驟522,使 旦入i丨伺服☆並〉敢所有可取得的數位資料。如步驟530,使用 遙擇他們想要下躺數崎料,織,如麵,紐資料就會 下載到使用者的電子裝置。如步驟,使用者 & =確認個者的衫。如步驟57G,浮水印會基於使用者的 並肷入於數位資料巾。本實施例是將使用者的身分儲存在電子裝 置中、,並侧來下載數位資料。譬如,使用者的身分可由檢查下列資 料來進行確$ ’包括庫存記號(GQ〇kie)、硬體保龍(d〇ng丨㊀)、個 化辨識衣置可抹除儲存媒體、硬體錄匙(hardware 、認證、 l置辨識、數位職、執行槽、儲存資料、密碼、生物測定資料、生 物測疋特}'生、或疋動恕連結函式庫(办⑽⑴匕丨丨·冰肋阳以忉㊀)。 明二閱第6圖,其說明根據本發明之一個實施例所 位資料之方法之流程圖。 第6圖所說明之實施例乃相似於第5圖之實施例,但此實施例中, 無論數位資料是傳輸到另外的裝置、複製版本、轉換到另外的格式、 Z錄到光碟或?功驗位光碟(DVD)、或是同步播放於可攜式裝置, 11 200825831 ^:位貝料中都嵌人有浮水印。如步驟挪 :::!-:' 660 · 】甘入入林印於數位資料中。在_個實 ,670 ’ 先將浮水印嵌入於數位資料令。譬如 =執=動作之前就 檔名為mp3 ( mp3) #夂今6^;^垒a又、、位資料是—個副 ㈣、// P )格式的赌,當被燒制_上作為立抑 案#,=水印就會被欲入到光碟上的音訊權案中。 為《叫 當使用者的電子裝置從網際網路離線或斷_,It 曰士將二水印肷入數位資料。因此,當儲存有數位資料的 子f %,就可以對於數位資料提供保護。 線上200825831 IX. Description of the invention: [Technical field of invention] The present invention relates to digital data protection, and more particularly to a method for protecting digital data, such as multimedia content, which uses watermark to identify different users. With content, thereby preventing digital data from being illegally copied. [Prior Art] - As the bandwidth continues to increase, digital multimedia access via the Internet has become very common. Users will be able to browse the content provider's website and download multimedia such as movies or music. In order to protect the content provided by content providers, digital rights management (DRM) is often used. Digital rights management is a technology used to control and process digital data. In general, digital rights management will limit the processing of digital data or devices. 'Month ^ However, when content providers make good use of digital rights management, this technology is often annoying to many users. For example, if the user purchases a particular song and downloads the song to user device A, even if the user has legally purchased the ": song, but the song (four) is the button device for transmission. And listen. In addition, some types of digital rights management can be considered anti-competitive - (antkompetitive) behavior, because they require users to use a specific device, broadcast type (4) capacity. For example, a song with a digital version can only be placed on a platform cap of a certain brand, which is not convenient for the user, because the user uses the special device and cannot select the device that the user wants to use. . Moreover, some digital rights management has been successfully attacked by Lions, resulting in the need for authorization. As long as the use of the file sharing aids can share digital data, digital content owners can not receive the benefits they deserve. δ Therefore, it is necessary to seek an improved method of protecting the number (4). The data is illegally illegally shared (4) and shared, and this method does not force the use of the number 5. 5 200825831 Λ 【Abstract】=Get these and Other objects are to overcome the various deficiencies of the conventional methods, and the purpose of the present invention is specifically and broadly described herein. The present invention provides a method of protecting digital data by using a watermark to identify different users and multimedia content to avoid illegal copying of the multimedia content. ^ ^ The method of protecting digital data provided by the invention includes the steps of embedding a digital watermark or ^ electronic fingerprint on the digital data. The watermark identifies the user who downloads the digital data, if the digital data is found to be unauthorized to copy or Sharing, the original user can be easily identified and penalized. In this description, the multimedia content provided by the Neigu supplier can be downloaded and downloaded by the registered user. This digital content includes music, video, games, software. , e-book, or other type of digital data. The user registers with the server and creates a user account: when the user logs in to the user account, the digital data can be downloaded. When the digital data is successfully downloaded to the user device The method for protecting digital data of the present invention can be embedded into a watermark to a digital data. The watermark includes a user account data, a user identification, a user's real name, a data reversal, a Kazi supplier identification, and device identification. Item or combination of the foregoing. Since the user has filed a personal Dividing the information so that the time can be easily identified. The information provided by the applicant includes, for example, the name, address, telephone number, contact information, age, gender, payment method, payment instrument, etc. if the unauthorized copy is found. Digital data can be read by the user who knows the watermark. If the digital data is illegally shared by the original user, the original user will be punished. For example, the user's identity can be updated to the appropriate authority to report. The user or the user's account is terminated. Therefore, the user can protect their digital data and will not allow the authorized management data to be shared arbitrarily. Therefore, the plagiarism of digital data can be eliminated. If the watermark contains data identification Regardless of whether the name of the data file has been changed to 200825831, the digital data can be identified. Therefore, it is useless to hide the content of the original disc. If the watermark contains the content provider's outline, the lion first (10) supplier or the number (four) capacity owner It is recognized. The method of protecting digital data provided by Ben = Ming is very suitable for use in the music download service J ' This method can be used to provide any service that can be downloaded. The protection digital provided by Ben Mao Ming The method of data can prevent digital data from being unauthorizedly copied, thus increasing the benefits of the content provider, and providing the poorer material to the gambler at a lower cost. The invention is more common. The advantage is that the user can protect their digital data, instead of -= bit data, when the supplier's control, the supplier must try to go to shy beggar. This method is easy to control digital data. The protection is quite effective. The following will be able to read the following (4) preferred implementation _ detailed description, so that the technical idea is more prominent to understand these and other purposes of the invention. To further understand the patent scope of the handle, the specific details are as follows: u [Embodiment] Now, the implementation of the number is better.关付付 ^ Refer to Figure 1 'Riding according to the present invention - a kind of protection disclosed by the number of protection 1 丨 = ^ and square:, and the structure diagram to illustrate how to use the watermark to identify 5, users and data To prevent digital data from being illegally copied. A system touch containing the method of protecting the digital position of the present invention, the spoon It Valley Provider Server 110, for storing digital data 120. Digital data 120 2 ^ 彳 ^ A, _, software, multimedia or other types of digital data. In the case of this murder, the digital data can be protected by Digital Rights Management (10)Μ) 13^ 7 200825831. In the beginning, the user has to provide content to the user in order to use the content provider server. During registration, the user must provide personal information, including personal name, real name, address, phone number, contact information, age, gender payment method, payment instrument, payment information, password or identification. This user profile. After he has registered, the user has to log in by providing their username and password. After the user logs in, the user can browse through the webpage and select the digital data 120 of each file, and then download. ^,, when the digital data 120 has been successfully downloaded to the user device 14, such as a computer, a notebook computer, a personal digital assistant (PDA)' or a portable telephone, then the watermark or the number 3 finger will be Embedded in the digital data 150. The watermark contains information that identifies the user who originally downloaded the digital data. For example, in one embodiment of the invention, the watermark package contains the user name of the user who has downloaded the digital data. When a duplicate version of a digital data is found, the watermarker will be read. For example, it can be transmitted point-to-point (pier-t0-pie", network, BPT (=== download network, or other file sharing network). The copied version is found in the road. Once the user is identified, the authorized person of the _# is authorized to raise or punish the user, or = the internal reader should be the user of the job, and the account of the system can be used. Cancellation or termination. a Since the digital data contains an embedded watermark to identify the user, the user will be careful and careful. The user will not leave the Weim material; for example, when This unauthorized and random sharing of the standard will cause the user to not allow the digital data with watermarks to be shared on the network. The bamboo uses the method of the present invention. The user will treat the digital data as if they were treating them. Use the card-like cut. The maker will not allow their letter to be used by others to ruin 8 200825831. By the same reason of the invention, when the digital data is copied When the two are assigned - and copied, the user will not allow their digital data to be repaid to others. If a multimedia version of digital data is found on the file sharing network, the original system will have serious consequences. @这, The user will very much protect their digital data. In other embodiments, the watermarking button fingerprint contains the user account identification, the user's real name, the data identification, and the content provider. =, a remuneration or a combination of the foregoing dragons. For example, in several embodiments, the ~printing package 3 has an inner valley provider identification item' and the content provider can be easily identified. In the implementation of the present invention Before the money, the water (four) will first remove the digital version of the nuclear management password from the digital camera. This approach can avoid any potential conflict between the digital copyright government and the user device. The protection number disclosed in one embodiment of the present invention is as described in FIG. 2, and includes the following steps: First, as shown in step 2, f can carry the digital data. Then, as in step 22, use The copyright management keeps the β-literal material 'as in step 23〇' and then stores the digital data protected by the digital copyright management on the content ship. Then, as in step 24, by using the personal material, use the = direction Then, as in step 250, when the registered user k selects the digital material to be downloaded, as in step 260, and then downloads the digital data + step 27, the digital fine key function is completed, and the device moves. Rotate the digital version ^ The rule of the government's code 'and ^, as in step 280, the watermark will be embedded in the digital material. The shouting will use the digital data to be copied or transferred to another device at any time, floating Embedded in digital data. In any copy of the digital dragon, floating water: ^ take and identify the individual. This can prevent the manufacturer from engaging in illegal copying or sharing digital resources. 9 200825831 Please refer to Figure 3, which illustrates the invention according to the present invention. A flowchart of a method of protecting digital data disclosed in an embodiment. The method 300 includes the steps of providing digital data, such as step 320, and storing the digital data on the server, as in step 3i. Then, as in step 330, the registered user selects the data to be downloaded, as in step 34, the digital data is downloaded to the user device. Finally, the watermark will be embedded into the digital data to identify the user who downloaded the digital data. In the method provided in this embodiment, the digital data stored in the content server is not digital copyright management. The content provider will store the digital data for downloading on the server. The registered system can choose the number of bits to download and download the digital material. After the digital data is downloaded, the watermark will be embedded in the digital data. This print contains the data of the user identifying the next _ digital data so that any copied version of the digital data will have an embedded watermark to identify the user. In this case, the implementation of the shooting of the silk makes the female record, and does not want to go to the general. However: to: can identify the user's watermark ', so the digital data is still protected, large or troublesome.曰, 刀居 Referring to Figure 4, it is a simplified flow of the method according to the present invention. In this case, the method provided by the actual, watermark = as entered. First, as in step 41, the content provider provides the digital data, and the digital data is stored on the generalizer. Then, as in step 422, the resource and 'as in step 425' the servo 11 will select or retrieve the user case, and when the registered user selects the digital data slot to be downloaded, the watermark will be before the download. First embedded in digital data. This is personalized as a document or proof of identity' so that each user can be embedded in the digital data after the next step 450 ‘, the 200825831 is a security provider. This _ does not require digital copyright: The second feature is to identify the use of digital data being downloaded. Any copy version can be identified by reading the watermark. The original download of the immortal, the user will not allow a number of capital and lead to a crisis of dumping or punishment. In this manner, the method of the present invention is effective in protecting the material and/or copying and sharing. At the same time, the method is friendly to the user; secondly, it is troublesome for the conflict of the device or the recording and playback. Position ==程: Description According to one embodiment of the present invention _ This stomach smear 'first', as in step 51G, the content provider will provide digital data, such as step 520, and store the digital data on the server. Then, as in step 522, the servo is entered and the data is obtained. In step 530, using the remote selection, they want to lay down the number of raw materials, weave, and the information will be downloaded to the user's electronic device. As in the step, the user & = confirm the individual's shirt. In step 57G, the watermark is based on the user's input and is inserted into the digital data towel. In this embodiment, the user's identity is stored in the electronic device, and the digital data is downloaded side by side. For example, the user's identity can be checked by checking the following information: including the inventory symbol (GQ〇kie), hardware Baolong (d〇ng丨一), individualized identification clothing, erasable storage media, hardware recording Spoon (hardware, certification, l identification, digital position, execution slot, storage data, password, biometric data, biometrics} 'Life, or inciting the connection library (doing (10) (1) 匕丨丨 · ice ribs Figure 2 is a flow chart illustrating a method for storing information according to an embodiment of the present invention. The embodiment illustrated in Figure 6 is similar to the embodiment of Figure 5, but In this embodiment, whether the digital data is transferred to another device, copied version, converted to another format, Z recorded to a disc or a work position disc (DVD), or synchronized to a portable device, 11 200825831 ^: There is a watermark embedded in the material. If the step moves:::!-:' 660 · 】Grow into the forest and print it in the digital data. In _ real, 670 ' first embed the watermark in the digit Information order. For example, if the action is executed, the file name is mp3 (mp3) #夂今6 ^;^垒 a,, bit information is a pair of (four), / / P) format gambling, when burned _ as a vertical case #, = watermark will be into the audio rights on the disc in. For "When the user's electronic device is offline or disconnected from the Internet, the It gentleman will put the second watermark into the digital data. Therefore, when the sub-f% of the digital data is stored, it is possible to provide protection for the digital data. on-line
位置施财浮水印嵌入於數位資料内的複數個 讀枝’即賴H㈣案齡割為概個贿 仍然可以存在於每個段針,這可聽如視 ^ P 授權的複製行為。 干W田累梃%未經 音:ί:;;個ΐΓ中:㈣ 二水印可以為人類聽覺頻率範圍以上或以下 雖然本發明以前述之實施例揭露如上,然其並非用以 =:ϊίΓ=和範圍内,所為之更動與潤飾,均屬本發 月之專利保被犯圍。關於本發明所界定之保護範圍請參 專利範圍。 ,又曱呑月 【圖式簡單說明】 第1圖係根據本發明之一個實施例所揭冑的保護數位資料之系統與方 法,其繪製了說明利用浮水印識別不同的使用者與資料以防止數位資 料遭受非法複製之流程與結構示意圖; 第2圖係说明根據本發明之一個實施例所揭露的保護數位資料之方法 之流程圖; 12 200825831 第3圖係說雜縣發明之—個實_簡露的賴触資料之方法 之流程圖; / 第4圖係根據本發明之—個實施例所揭露的保魏位資料之方法 之流程圖; 第5圖係說龍據本發日狀—個實施例所揭露的賴數位資料之方法 之流程圖;以及 第6圖係制根據本發日狀—個實關賴露的倾數位 之流程圖。 ' 法 【主要元件符號說明】 100 系統 110 内容供應者伺服器 120 數位資料 130 數位版權管理 140 使用者裝置 150 嵌入浮水印之數位資料 13The position of the implementation of the floating watermark embedded in the digital data of a plurality of readings, that is, the H (four) case cut into a bribe can still exist in each segment of the needle, which can be seen as a copy of the authorized act. Dry W field accumulation % unvoiced: ί:;; ΐΓ: (4) The second watermark can be above or below the human hearing frequency range. Although the present invention is disclosed above in the foregoing embodiments, it is not used =: ϊ Γ Γ = And within the scope, the changes and retouchings are all patents of this month. Please refer to the patent scope for the scope of protection defined by the present invention. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a system and method for protecting digital data according to an embodiment of the present invention, which illustrates the use of a watermark to identify different users and data to prevent A schematic diagram of a process and structure for illegally copying digital data; FIG. 2 is a flow chart illustrating a method for protecting digital data according to an embodiment of the present invention; 12 200825831 Figure 3 is a description of the invention of the county A flow chart of a method for revealing data; / FIG. 4 is a flow chart of a method for maintaining Weiwei data according to an embodiment of the present invention; FIG. 5 is a diagram showing a dragon according to the present invention. A flow chart of a method for arranging digital data according to an embodiment; and a flowchart for drawing a digital position according to the present invention. 'Method 【Main component symbol description】 100 System 110 Content provider server 120 Digital data 130 Digital rights management 140 User device 150 Digital data embedded in watermark 13