TWI255443B - A method to identify CD content - Google Patents
A method to identify CD content Download PDFInfo
- Publication number
- TWI255443B TWI255443B TW92110051A TW92110051A TWI255443B TW I255443 B TWI255443 B TW I255443B TW 92110051 A TW92110051 A TW 92110051A TW 92110051 A TW92110051 A TW 92110051A TW I255443 B TWI255443 B TW I255443B
- Authority
- TW
- Taiwan
- Prior art keywords
- content
- rate
- digital content
- encoding
- measured
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 181
- 238000012545 processing Methods 0.000 claims abstract description 119
- 230000008569 process Effects 0.000 claims description 71
- 238000007781 pre-processing Methods 0.000 claims description 36
- 238000003860 storage Methods 0.000 claims description 14
- 230000007704 transition Effects 0.000 claims description 10
- 238000005259 measurement Methods 0.000 claims description 7
- 238000004364 calculation method Methods 0.000 claims description 6
- 238000013523 data management Methods 0.000 claims description 5
- 238000012360 testing method Methods 0.000 claims description 5
- 238000012552 review Methods 0.000 claims description 4
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 claims description 3
- 206010011469 Crying Diseases 0.000 claims description 2
- 241000239226 Scorpiones Species 0.000 claims description 2
- 238000012935 Averaging Methods 0.000 claims 2
- 101100169341 Arabidopsis thaliana CYSC1 gene Proteins 0.000 claims 1
- 238000013481 data capture Methods 0.000 claims 1
- 235000011389 fruit/vegetable juice Nutrition 0.000 claims 1
- 235000012054 meals Nutrition 0.000 claims 1
- 230000005236 sound signal Effects 0.000 claims 1
- 238000009826 distribution Methods 0.000 abstract description 166
- 230000006835 compression Effects 0.000 abstract description 80
- 238000007906 compression Methods 0.000 abstract description 70
- 239000000463 material Substances 0.000 description 151
- 230000006870 function Effects 0.000 description 75
- 238000007726 management method Methods 0.000 description 47
- 238000005538 encapsulation Methods 0.000 description 38
- 238000005516 engineering process Methods 0.000 description 33
- 238000013475 authorization Methods 0.000 description 32
- 230000009471 action Effects 0.000 description 27
- 230000005540 biological transmission Effects 0.000 description 22
- 230000001737 promoting effect Effects 0.000 description 20
- 238000012546 transfer Methods 0.000 description 20
- 238000010586 diagram Methods 0.000 description 19
- 238000003908 quality control method Methods 0.000 description 18
- 238000012790 confirmation Methods 0.000 description 17
- 238000000275 quality assurance Methods 0.000 description 17
- 238000012795 verification Methods 0.000 description 16
- 238000004891 communication Methods 0.000 description 15
- PCHJSUWPFVWCPO-UHFFFAOYSA-N gold Chemical compound [Au] PCHJSUWPFVWCPO-UHFFFAOYSA-N 0.000 description 14
- 229910052737 gold Inorganic materials 0.000 description 14
- 239000010931 gold Substances 0.000 description 13
- 238000012384 transportation and delivery Methods 0.000 description 13
- 230000011218 segmentation Effects 0.000 description 11
- 239000000872 buffer Substances 0.000 description 10
- 239000000203 mixture Substances 0.000 description 10
- 239000000284 extract Substances 0.000 description 9
- 230000008859 change Effects 0.000 description 8
- 238000007667 floating Methods 0.000 description 8
- 238000013461 design Methods 0.000 description 7
- 238000009434 installation Methods 0.000 description 7
- 238000004519 manufacturing process Methods 0.000 description 7
- 238000013507 mapping Methods 0.000 description 7
- 230000003993 interaction Effects 0.000 description 6
- 238000002360 preparation method Methods 0.000 description 6
- 230000004044 response Effects 0.000 description 6
- 230000001419 dependent effect Effects 0.000 description 5
- 238000007790 scraping Methods 0.000 description 5
- 230000008901 benefit Effects 0.000 description 4
- 230000006837 decompression Effects 0.000 description 4
- 230000000694 effects Effects 0.000 description 4
- 230000010354 integration Effects 0.000 description 4
- 230000002452 interceptive effect Effects 0.000 description 4
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 238000004458 analytical method Methods 0.000 description 3
- 238000013459 approach Methods 0.000 description 3
- 238000012550 audit Methods 0.000 description 3
- 238000013479 data entry Methods 0.000 description 3
- 238000013075 data extraction Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 3
- 230000018109 developmental process Effects 0.000 description 3
- 239000012634 fragment Substances 0.000 description 3
- 230000010365 information processing Effects 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 230000002829 reductive effect Effects 0.000 description 3
- 238000012958 reprocessing Methods 0.000 description 3
- 230000000717 retained effect Effects 0.000 description 3
- 238000005070 sampling Methods 0.000 description 3
- 208000001613 Gambling Diseases 0.000 description 2
- 244000208060 Lawsonia inermis Species 0.000 description 2
- 241000282320 Panthera leo Species 0.000 description 2
- 238000012952 Resampling Methods 0.000 description 2
- 230000032683 aging Effects 0.000 description 2
- 210000004556 brain Anatomy 0.000 description 2
- 238000006243 chemical reaction Methods 0.000 description 2
- 239000003795 chemical substances by application Substances 0.000 description 2
- 238000012937 correction Methods 0.000 description 2
- 238000005520 cutting process Methods 0.000 description 2
- 238000013144 data compression Methods 0.000 description 2
- 230000008676 import Effects 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 239000008267 milk Substances 0.000 description 2
- 210000004080 milk Anatomy 0.000 description 2
- 235000013336 milk Nutrition 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 230000036961 partial effect Effects 0.000 description 2
- 238000005192 partition Methods 0.000 description 2
- 238000007639 printing Methods 0.000 description 2
- 230000009467 reduction Effects 0.000 description 2
- 230000002441 reversible effect Effects 0.000 description 2
- 238000000638 solvent extraction Methods 0.000 description 2
- 230000026676 system process Effects 0.000 description 2
- TVEXGJYMHHTVKP-UHFFFAOYSA-N 6-oxabicyclo[3.2.1]oct-3-en-7-one Chemical compound C1C2C(=O)OC1C=CC2 TVEXGJYMHHTVKP-UHFFFAOYSA-N 0.000 description 1
- 241000283690 Bos taurus Species 0.000 description 1
- 206010011878 Deafness Diseases 0.000 description 1
- 108010074864 Factor XI Proteins 0.000 description 1
- YQEZLKZALYSWHR-UHFFFAOYSA-N Ketamine Chemical compound C=1C=CC=C(Cl)C=1C1(NC)CCCCC1=O YQEZLKZALYSWHR-UHFFFAOYSA-N 0.000 description 1
- 241000233805 Phoenix Species 0.000 description 1
- 240000005809 Prunus persica Species 0.000 description 1
- 235000006040 Prunus persica var persica Nutrition 0.000 description 1
- 230000004913 activation Effects 0.000 description 1
- 230000003044 adaptive effect Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 235000013405 beer Nutrition 0.000 description 1
- FFBHFFJDDLITSX-UHFFFAOYSA-N benzyl N-[2-hydroxy-4-(3-oxomorpholin-4-yl)phenyl]carbamate Chemical compound OC1=C(NC(=O)OCC2=CC=CC=C2)C=CC(=C1)N1CCOCC1=O FFBHFFJDDLITSX-UHFFFAOYSA-N 0.000 description 1
- 239000011230 binding agent Substances 0.000 description 1
- 230000033228 biological regulation Effects 0.000 description 1
- 210000000988 bone and bone Anatomy 0.000 description 1
- 238000005266 casting Methods 0.000 description 1
- 230000015556 catabolic process Effects 0.000 description 1
- 238000012512 characterization method Methods 0.000 description 1
- 239000000470 constituent Substances 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 238000013480 data collection Methods 0.000 description 1
- 238000007418 data mining Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000006731 degradation reaction Methods 0.000 description 1
- 239000010432 diamond Substances 0.000 description 1
- 229910003460 diamond Inorganic materials 0.000 description 1
- 239000000428 dust Substances 0.000 description 1
- 210000004709 eyebrow Anatomy 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 125000000524 functional group Chemical group 0.000 description 1
- 230000008571 general function Effects 0.000 description 1
- 229910001385 heavy metal Inorganic materials 0.000 description 1
- 239000010977 jade Substances 0.000 description 1
- 238000005304 joining Methods 0.000 description 1
- 239000007788 liquid Substances 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 238000005065 mining Methods 0.000 description 1
- 230000036316 preload Effects 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 230000002250 progressing effect Effects 0.000 description 1
- 238000013442 quality metrics Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 150000003839 salts Chemical class 0.000 description 1
- 230000003319 supportive effect Effects 0.000 description 1
- 238000012549 training Methods 0.000 description 1
- 230000003442 weekly effect Effects 0.000 description 1
- 239000002023 wood Substances 0.000 description 1
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
1255443 玖、發明說明: 相關申請案之對照 本申請案是1998年10月22日(目前日期為_)提出 申請的申請案09/177,096之分案申請案,而該申請案 09/177,096是1998年8月13日(目前曰期為_)提出申 請的申請案09/13 3,519之部份繼續申請案。本申請案特此 引用先前申請案09/177,096之整個揭示事項以供參照。此 外,本申請案主張在技術上與連同本申請案讓渡給國際商 務機器股份有限公司(IBM)的下列申請案相關的主題之權 項0 内部案號 申請案 序號 發明名稱 發明人 SE9-98-006 Secure Electronic Content Management Kenneth L. Milsted George Gregory Gruse Marco M. Hurtado Edgar Downs Cesar Medina SE9-98-007 Multimedia Player Toolkit George Gregory Gruse John J. Dorak, Jr. Kenneth L. Milsted SE9-98-008 Multimedia Content Creation System Kenneth L. Milsted Qing Gong Edgar Downs SE9-98-010 Key Management System for End-User Digital Player Jeffrey B. Lotspiech Marco M. Hurtado George Gregory Gruse Kenneth L. Milsted SE9-98-011 Multi-media player for an Electronic Content Delivery System Marco M. Hurtado George Gregory Gruse Edgar Downs Kenneth L. Milsted SE9-98-013 A method to identify CD content Kenneth L. Milsted Craig Kindell Qing Gong1255443 发明, Invention Description: RELATED APPLICATIONS This application is a divisional application of the application for application 09/177,096 on October 22, 1998 (current date is _), and the application 09/177,096 is 1998 The application for the application on August 13 (currently _) is part of 09/13 3,519. The entire disclosure of the prior application 09/177,096 is incorporated herein by reference. Further, the present application claims the right to the subject matter related to the following application in connection with the following application of the present application to International Business Machines Corporation (IBM). 0 Internal Case Number Application No. Invention Name Inventor SE9-98 -006 Secure Electronic Content Management Kenneth L. Milsted George Gregory Gruse Marco M. Hurtado Edgar Downs Cesar Medina SE9-98-007 Multimedia Player Toolkit George Gregory Gruse John J. Dorak, Jr. Kenneth L. Milsted SE9-98-008 Multimedia Content Creation System Kenneth L. Milsted Qing Gong Edgar Downs SE9-98-010 Key Management System for End-User Digital Player Jeffrey B. Lotspiech Marco M. Hurtado George Gregory Gruse Kenneth L. Milsted SE9-98-011 Multi-media player for an Electronic Content Delivery System Marco M. Hurtado George Gregory Gruse Edgar Downs Kenneth L. Milsted SE9-98-013 A method to identify CD content Kenneth L. Milsted Craig Kindell Qing Gong
O:\85\85156 分割.DOC 1255443 本少於-美元,但是總是要耗用金錢。然而,在電子式配 送的情形中’不再需要實體媒體。因為係以電子方式配送 内容,所以實體媒體的成本不是—個因素。第二個障礙是 内客本身的格式,亦即以一類比格式錯存的内容相對於以 -數位格式儲存的内容。#以影印方式複製諸如印刷圖片 等的以-類比格式儲存之内容時,拷貝的品質低於原始的 品質。每一次後續的複製一份拷貝(有時被稱為一代)之品 質又比原始的品質再低一些。當以數位方式儲存圖片時, 就不會發生品質的降低。每一份拷貝及每—代的拷貝都如 原始圖片-般的清晰及鮮明。由於完美的數位拷貝加上以 扛低成本利用電子万式配送内容及經由網際網路而廣泛地 配送内容之整合效應’所以使未經授權的拷貝之副竊及配 送變得較為容易。只要按下鍵盤的幾個鍵,非法複製者即 可經由網際網路而傳送數百份甚至數千份完美複製的數位 内容。因此’目前需要確保以電子方式配送的數位資產的 保護及安全性。 數仫内奋棱供者希望建立一種可保護内容所有人權利 的女王《數位内谷全球性配送系統。建立一數位内容配送 系統的問題包括開發用於數位内容電子式配送、權利管 理、及資產保護之系統。以電子方式配送的數位内容包括 省如印刷媒體、電影、電玩、程式、電視、多媒體、及立 樂等内容。 3 部署-電子式配送系統時,使數位内容提供者能夠經由 立即的銷售回報及電子式對帳而迅速得到付款,並經由内O:\85\85156 Split.DOC 1255443 This is less than -$, but always consumes money. However, in the case of electronic distribution, physical media is no longer needed. Because the content is delivered electronically, the cost of physical media is not a factor. The second obstacle is the format of the guest itself, that is, the content stored in a similar format relative to the content stored in the -digit format. # When copying content stored in an analogy format such as a printed image by photocopying, the quality of the copy is lower than the original quality. Each subsequent copy of a copy (sometimes referred to as a generation) is of a lower quality than the original one. When the image is stored digitally, there is no degradation in quality. Each copy and every copy of the copy is as clear and distinct as the original picture. Unauthorized copying and distribution of unauthorized copies is made easier by the perfect digital copy combined with the low-cost use of electronically distributed content and the widespread integration of content over the Internet. By simply pressing a few keys on the keyboard, an illegal copyer can transfer hundreds or even thousands of perfectly duplicated digital content over the Internet. Therefore, there is a need to ensure the protection and security of digital assets that are electronically distributed. The number of insiders is hoping to establish a Queen Digital Valley Global Distribution System that protects the rights of content owners. The problem of establishing a digital content distribution system includes the development of systems for electronic distribution of digital content, rights management, and asset protection. Electronically distributed digital content includes provinces such as print media, movies, video games, programs, television, multimedia, and music. 3 Deploy-Electronic Distribution System enables digital content providers to quickly receive payments via immediate sales returns and electronic reconciliations
O:\85\85156 分割.DOC 1255443 各的重新發行而得到第二份的收益來源。因為電予式數位 内谷配运系統不會受到實體庫存缺貨或退貨的影響,所以 數位内容提供者及零售商可以有更低的成本及更高的利潤 率。數位内容提供者可協助新的配送通路或強化現有的配 送通路以更快的時效分送庫存。可利用電子式配送系統的 交易〃料末取知與客戶購買模式有關的資訊,並用來提供 與包子式行銷計畫及促銷有關的立即回饋。為了達到這些 目裇,數位内容提供者需要使用一種電子式配送模式,使 範圍寬廣的使用者及企業可以取得數位内纟,同時確保了 數位資產的保護及計費。 諸如即時音訊系統(realaudi0)、AT&T的A2b、u㈣d Audio Pro Corp.的 Liquid Audi〇 pr〇、的 c办 Music Network、及其他系統等的在市場上可取得的數位内 容電子式配送系統提供了經由有擔保及無擔保式電子網路 而傳送數位資料。使用有擔保式電子網路時,大幅降低了 數位内容提供者將數位資料配㈣廣泛的閱聽者之要求。 使用諸如網際網路及全球資訊網等無擔保式網路時 -加密法而使數位内容安全地送抵使用者。然而,一旦d 用 …·〜π ^ %,一旦 使用者的機器上將經過加密的數位 J数位内谷解密時,則使用: 易於對该數位内各作未經授權的再戶 J丹度傅播。因此,目前 要-種安全的數位内容電子式配送系統,該系統提供了 數位資產的保護,並確保:縱使在將數位内容配送到消 者及企業之後,也能保護内容提供去 從供耆的榷利。因此,權 管理需要能夠進行安全配送、人彡 口約杈椎、及數位資產使 〇.\85\85156 分割 d〇c -10- 1255443 的控制。 數位内谷所有人已減緩接受電子式配送的另一個理由 是這些數位内容所有人希望維持及促進現有的配銷通路。 大多數内容所有人係經由零售商銷售。在音樂市場中,這 些美國的零售商包括Tower Records、Peaches、 Blockbuster、Circuit City、及其他的零售商。許多這些零 售商都设有網站’可讓網際網路使用者經由網際網路選 購,且可以電子郵件寄給使用者供其選購。音樂網站包括 @tower、Music Boulevard、及 Columbia House。使用電 子式配送時,可能使這些零售商店之間無法差異化,且與 内各所有人之間無法差異化,尤其在全球資訊網上時更是 如此。因此,目前需要對諸如圖片、電玩、音樂、程式、 及視訊產品等的電子内容零售商於其經由電子式配送而銷 售音樂時提供一種相互之間且與内容所有人之間差異化的 方式。 内容所有人準備其數位内容,以便經由諸如電子商店等 的配銷網站而進行電子式配送。在網際網路上的各電子商 店或經由其他線上服務的各電子商店想要經由其產品線及 產品促銷而在相互之間差異化。傳統的商店(亦即類比於電 子商店的非電子式且非線上的商店)利用產品促銷、產品業 務員、產品樣本、自由退貨政策、及其他促銷計畫,使其 與競爭者之間差異化。然而,在内容提供者對數位内容有 加上使用條件的線上世界中,電子商店進行差異化的能力 可此文到嚴重的限制。此外,縱使可改變使用條件,電子O:\85\85156 Split.DOC 1255443 Reissue each and get a second source of revenue. Because the digital pre-positioning system is not affected by physical stock out-of-stock or returns, digital content providers and retailers can have lower costs and higher profit margins. Digital content providers can assist with new distribution channels or enhance existing distribution channels to distribute inventory faster. The transaction information of the electronic distribution system can be used to obtain information about the customer's purchase pattern and to provide immediate feedback related to the buns marketing plan and promotion. To achieve these goals, digital content providers need to use an electronic distribution model that enables a wide range of users and businesses to capture digital guilt while ensuring the protection and billing of digital assets. Digital content electronic distribution systems such as real-time audio systems (realaudi0), AT&T's A2b, u(d)d Audio Pro Corp.'s Liquid Audi〇pr〇, c-Music Network, and other systems are available on the market. Transfer digital data via a secured and unsecured electronic network. The use of a secured electronic network has significantly reduced the number of content providers' ability to match digital data to (4) a wide range of readers. Digital content is securely delivered to users using unsecured network-encryption methods such as the Internet and World Wide Web. However, once d uses ...·~π ^ %, once the user's machine decrypts the encrypted digit J digits, it uses: It is easy to make unauthorized unauthorized re-households in the digits. broadcast. Therefore, there is a need for a secure digital content electronic distribution system that provides digital asset protection and ensures that content delivery is protected even after digital content is distributed to consumers and businesses. Profit. Therefore, the rights management needs to be able to carry out the control of safe distribution, human account, and digital assets 〇.\85\85156 split d〇c -10- 1255443. Another reason why digital valley owners have slowed down to accept electronic distribution is that these digital content owners want to maintain and promote existing distribution channels. Most content owners are sold through retailers. In the music market, these US retailers include Tower Records, Peaches, Blockbuster, Circuit City, and other retailers. Many of these retailers have a website that allows Internet users to be selected via the Internet and can be emailed to users for purchase. Music sites include @tower, Music Boulevard, and Columbia House. When using electronic distribution, these retail stores may not be differentiated and can't be differentiated from everyone inside, especially on the World Wide Web. Therefore, there is a need for electronic content retailers such as pictures, video games, music, programs, and video products to provide a way of distinguishing between each other and the content owner when selling music via electronic distribution. The content owner prepares his digital content for electronic distribution via a distribution website such as an electronic store. Electronic stores on the Internet or electronic stores via other online services want to differentiate between each other via their product lines and product promotions. Traditional stores (that is, non-electronic and non-online stores that are analogous to e-shops) use product promotions, product clerk, product samples, free return policies, and other promotional programs to differentiate them from competitors. . However, in an online world where content providers have conditions for digital content, the ability of electronic stores to differentiate can be severely limited. In addition, even if the conditions of use can be changed, the electronics
O:\85\85156 分割.DOC -11- 1255443 & ΐ也面ι了處理與來自内容提供者的數位内容相關聯的 中介資料(metadata)以便用電子方式促銷及銷售產品之困 =作。當電子商店處理中介資料時,需要管理數種需要。 第 包子商店需要自内容提供者接收與數位内容相關聯 的:介資料。大部分的時間可能係以加密方式傳送此種中 J ”料的邵分,因而内容提供者必須建立一種機制,以 便將經過加密的内容解密。第二,電子商店可能希望在自 内容提供者接㈣容之前,或在電子商店接收内容之後, 預覽來自内容提供者的内容,以便有助於產品行銷、產品 定位、及其他與内容有關的促銷考慮點。第三,電子商店 需要提取某些用於諸如圖形及藝人等促銷材料之中介資 料。電子商店通常將此種促銷材料直接用於線上促銷。第 四,電子商店可能希望修改某些料的使用條件,以便產 生不同的數位内容產品線,而使其與其他電子商店之間有 產異化。第五,電子商店可能需要將諸如網址等的某些地 址插入中介資料’或改變中介資料中的某些地址,以便使 採購者自動向一帳款代收機構付款,而不必向該電子商店 付款。第六,電子商店可能需要產生授權許可,以便容許 在符合使用條件的情形下使用有著作權的數位内容。例 如,該授權許可可能同意對該數位内容進行次數有限制的 拷貝。授權許可必須能反映所同意的條款。 有鐘於所有這些要求’為了處理與數位内容相關的中介 資料,許多電子商店撰寫自訂規格的軟體程式,以便處理 這些要求。開發這些自訂規格的軟體程式所需的時間、成 O:\85\85156 分割.DOC -12- 1255443 本、及測4可能是相當多的。因此,目前需要一種對這些 要求的解決方案。 數位内容所有人已減緩了接納電子式配送的另一原因 是準備用於電子式配送的内容之困難。目前許多内容提供 者在其產品目錄中有數千甚至數萬的產品内容。在一音樂 市場的實例中,一内容所有人對單一錄音母帶同時有數種 不同的格式(例如CD、錄音帶、及MD)不是太奇怪的。此 外,一單一格式可能針對一特定的配銷通路,或針對諸如 CD、MD、錄音帶、DVD、或等效媒體等特定的配送媒體, 而將一錄音母帶重新製作母帶或重新混音。針對廣播電台 播放的混音可能不同於針對舞曲用音軌所作的混音,也可 能不同於一般消費者可購得的CD之混音。盤點及追蹤這些 不同的混音版本可能是相當累贅的。此外,許多錄音母帶 所有人經常以各種後續出版系列之方式重新發行舊的錄 音,例如以“精選集,,之方式,或編排成電影原聲帶及其他 出版系列之方式、或其他編排方式重新發行。當以數位方 式提供更多的内容時,將内容重新混音或重新處理並編碼 以供電子式配送的需求也成長了。内容所有人經常需要利 用舊的錄音格式作為指引,以便選擇正確的錄音母帶,並 將這些錄音重新處理及編碼,便經由電子式配送而發行。 想要將其舊的格式用於協助其重新發行舊的錄音以供電子 式配送的内容提供者尤其適用上述的情形。内容提供者將 搜尋資料庫,以便匹配内容名稱、藝人、及錄音,並嗖定 編碼參數,且擷取相關聯的内容資訊或附帶的材料,例如O:\85\85156 Split.DOC -11- 1255443 & ΐ ι 处理 处理 处理 处理 处理 处理 处理 ι ι ι ι ι ι ι ι ι ι ι ι ι ι ι ι ι ι ι ι ι ι ι ι ι ι ι ι ι ι 。 。 。 。 。 。 。 。 。 。 。 There are several needs to be managed when an electronic store processes intermediaries. The first bun store needs to receive the media information associated with the digital content from the content provider. Most of the time, the distribution of such mediations may be transmitted in an encrypted manner, so the content provider must establish a mechanism to decrypt the encrypted content. Second, the e-store may wish to pick up from the content provider. (4) Preview the content from the content provider before the content is received, or after receiving the content in the electronic store, to facilitate product marketing, product positioning, and other content-related promotional considerations. Third, the electronic store needs to extract some uses. For mediation materials such as graphics and artists, promotional materials are often used directly by online stores for online promotion. Fourth, electronic stores may wish to modify the conditions under which certain materials are used in order to produce different digital content lines. And it has an alienation with other e-shops. Fifth, e-shops may need to insert certain addresses, such as URLs, into the intermediary material' or change some of the addresses in the mediation data so that the purchaser automatically goes to the account. Payment by the collection agency without having to pay for the e-shop. Sixth, the e-shop may need A license is granted to allow the use of copyrighted digital content in accordance with the conditions of use. For example, the license may agree to a limited number of copies of the digital content. The license must reflect the agreed terms. For all of these requirements, 'in order to process mediation related to digital content, many e-shops write custom-sized software programs to handle these requirements. The time required to develop these custom-sized software programs is O:\85\ 85156 Segmentation.DOC -12- 1255443 This and the test 4 may be quite large. Therefore, there is a need for a solution to these requirements. Digital content owners have slowed down the acceptance of electronic distribution Another reason is to prepare for Difficulties in the content of electronic distribution. Many content providers currently have thousands or even tens of thousands of product content in their product catalog. In an example of a music market, a content owner has several different types of single recording masters at the same time. Formats (such as CDs, cassettes, and MDs) are not too weird. In addition, a single format may pin Re-producing a master tape or remixing a recording master for a particular distribution channel, or for a specific delivery medium such as a CD, MD, tape, DVD, or equivalent media. The sound may be different from the mix for the music track for dance music, or it may be different from the mix of CDs available to the average consumer. Counting and tracking these different mix versions can be quite cumbersome. In addition, many recording masters The owner often reissues old recordings in a variety of subsequent publications, such as re-releases in the form of "selected collections," or arranged in the original soundtracks and other publications series, or in other arrangements. As more content is provided in digital form, the need to remix or re-process and encode content for electronic distribution has also grown. Content owners often need to use the old recording format as a guide to select the correct recording master and reprocess and encode the recordings for distribution via electronic distribution. Content providers who want to use their old format to assist them in reissuing old recordings for electronic distribution are particularly suitable for the above scenarios. The content provider will search the database to match the content name, artist, and recording, and determine the encoding parameters and retrieve the associated content information or accompanying materials, such as
O:\85\85156 分割 D0C -13- 1255443 圖片、及其中包括樂評、網址、訪問記錄、 久A聽樣本片 段等的相關促銷資訊。此種以人工方式搜I餘、 寸綠骨内容目錄 資料庫的程序不是沒有缺點的。一種缺點 ^ 、、 疋而要讓作業 人員以人工万式搜尋一資料庫,並適當地設定處理參數。 另-種缺點即是作業人員在自—資料庫選擇資料時可能發 生抄寫錯誤的機率。因此,目前需要將一 , 、、 』目動擷取諸 如青等内容之相關聯的資料及錄音母帶。 内容所有人經由一種稱為編碼的程序而準備其供電子O:\85\85156 Split D0C -13- 1255443 The picture, including the music review, website, access record, long-term listening sample clips, etc. Such a procedure for manually searching for the I-Y, G-Green Content Directory database is not without drawbacks. One drawback is that ^, 疋, and let the operator search for a database in a manual manner and set the processing parameters appropriately. Another disadvantage is that the operator may have a chance of copying errors when selecting data from the database. Therefore, it is necessary to take a picture of the relevant information and recording master tapes such as the contents of the first and the other. The content owner prepares it for electronics via a program called encoding
式配送之數位内容。編碼涉及内容的取得、在⑽容:以 一種類比格式呈現時對該内容進行的數位化、及對該内容 的壓縮。該壓縮程序可讓數位内容以更有效率的方:切: 網,傳送並儲存在可記錄媒體,這是因為傳送或儲存㈣ 料量減少了。然而,壓縮也不是沒有缺點的。大部分的壓 縮都涉及某些資訊的失掉,因而被稱為耗損式壓縮(lossy compreSslGn)。@容提供者必須決定採用何種壓縮清算法及Digital content for distribution. Encoding involves the acquisition of content, and (10) capacity: the digitization of the content when it is presented in an analog format, and the compression of the content. This compression program allows digital content to be transferred to and stored on recordable media in a more efficient way: cut-and-store, because the amount of material transferred or stored (4) is reduced. However, compression is not without its drawbacks. Most of the compression involves the loss of certain information and is therefore called lossy compreSslGn. @容Provider must decide which compression algorithm to use and
所需的壓縮等級。例如,在音樂中,數位内容或歌曲可能 視音樂類型的不同而有相當不同的特徵。針對某一類型而 ,擇的壓縮演算法及壓縮等級可能對另-音樂類型並不是 最4的4 #。内谷提供者可能發現壓縮演算法及壓縮等級 勺某二組合相當適用於諸如古典音樂等的某—音樂類型, 二=如重金屬f樂等的另—音樂類型就無法得到令人滿 勺、"果此外,錄骨工程師經常必須稍微調整音樂的等 定執仃動悲|a圍調冑,並執行其他的預先處理及處理設 &以便確保所編碼的音樂類型將產生所需的結果。此種 〇:\85\85156 ^f,j D〇c -14 - 1255443 ——Λ、乂人工方式设定這些編碼參數之需要,例如針對 母-數位内容設定等化位準及動態壓縮及擴張設定值之需 要可此疋累贅的及成本昂貴的。再回到該音樂的例子,— 個内容系列涵蓋多種音樂類型的音樂内容提供者將必須以 人工万式選擇待編碼的每—首歌曲或每―組歌曲、及所需 的編碼參數組合。因此,目前需要-種錢以人工方式選 擇編碼處理參數之方式。 壓縮内容的程序可能需要大量專用的計算資源,特別是 諸如完整長度的電影等較大内容的項目。壓縮演算法供岸 两提供與其壓㈣術相„的各絲捨及㈣。這些取捨 ,括:I縮内容所需的時間長度及計算資源;自原始内容 得到的塵縮量’·播放所需的位元傳輸速率;壓縮後内容之 效能品質;以及其他因素。當一編碼程式採用一多媒體檔 作為輸入,並產生—編碼後輸出構,但並無進程或狀態= 過渡期間扣不時,扭用此種編碼程式時將發生問題。此外, 在'•牛夕k开y中,利用其他的程式來呼叫或管理一個並無進 程的過渡期間指示之編碼程式。此時將使呼叫的應用程式 無法量度已編碼的内容量為指定要編碼的完整選擇之百分 率。在該呼叫的程式正嘗試安排數個不同的程式立即執行 :’上述的情形將發生問題。此外,在已選擇要編碼的内 谷批/人且内谷提供者想要決定編碼程序的進度時,前文所 4的I·月开/疋相當累贅的。因此,目前需要一種可解決這些 問題的方式。 數位内谷k供者已減緩了採用電子式配送的又一理由The level of compression required. For example, in music, digital content or songs may have quite different characteristics depending on the type of music. For a certain type, the compression algorithm and compression level may not be the most 4# for the other-music type. The inner valley provider may find that the compression algorithm and the compression level spoon are quite suitable for a certain type of music such as classical music, and the other type of music such as heavy metal f music cannot be full, " In addition, the recording engineer often has to adjust the music slightly to adjust the sorrow and sorrow, and perform other pre-processing and processing settings to ensure that the type of music being encoded will produce the desired result. This type of 〇: \85\85156 ^f,j D〇c -14 - 1255443 - Λ, 乂 artificially set the need for these coding parameters, such as setting the equalization level and dynamic compression and expansion for the mother-digital content The need to set values can be cumbersome and costly. Returning to the example of music, a content content provider that covers multiple music types will have to manually select each song or group of songs to be encoded, and the desired combination of encoding parameters. Therefore, there is currently a need for money to manually select the encoding parameters. Programs that compress content may require a large amount of dedicated computing resources, especially for larger content such as full-length movies. The compression algorithm provides the two shores and the four (4) of the pressure (4). These choices include: the length of time required for the content of the I and the computing resources; the amount of dust reduction from the original content. Bit transfer rate; performance quality of compressed content; and other factors. When a code program uses a multimedia file as input and generates a coded output structure, but there is no process or state = during the transition period, the twist There will be problems with this encoding program. In addition, in the '•牛夕k开 y, use other programs to call or manage a coded program with no transition during the transition period. The application will be called at this time. The amount of encoded content cannot be measured as the percentage of the complete selection specified to be encoded. The program at the call is attempting to schedule several different programs to execute immediately: 'The above situation will cause problems. In addition, within the selected code to be encoded When the batch/person and the Neigu provider want to decide the progress of the encoding process, the I·month opening/疋 of the previous article 4 is quite cumbersome. Therefore, there is a need to solve this problem. The way the problem within the next few bits k Valley donors have yet another reason to slow down the use of electronic distribution
O:\85\85156 分割.D0C -15- 1255443 為:其内容缺少針對電子傳送式内容而在使用者裝置上產 生數位播放機之標準。内容提供者、電子商店、或電子式 配送鏈中的其他成員可能想要在諸如個人電腦系統、視訊 轉換器(set-top boxes)、及手持式裝置等的各種裝置上提供 自訂規格的播放機。目前需要一種可在一防篡改環境(亦即 一種在一第三者正在播放時可阻止對内容作未經授權的存 取之環境)中處理數位内容的解密之一組工具程式。此外, 需要一組工具程式使一使用者得以管理一本機數位内容 庫,但該組工具程式不讓該使用者存取非其所購買的内容 以供使用。 若要得知與保護數位内容的背景有關之進一步資訊,請 參閱下列三種來源。AT&T Labs (Florham Park,N.J·)的 Jack Lacy、James Synder、David Maher所著的 “Music on the Internet and the Intellectual Property Protection Problem”,可進 入網址 http://www.a2bmusic.com/about/papers/musicipp.htm 於線上閱讀該論文 。InterTrust Technologies Corp.(Sunnyvale,CA)的 Olin Sibert、David Bernstein、及 David Van Wie 所著的論文 “Securing the Content,Not the Wire for Information Commerce” 中述及一種稱為 DigiBox的密碼保護容器物件,可進入網址 http://www.intertrust.com/architecture/stc.html於線上閱讀 該論文。以及一 IBM White Paper “Cryptolope Container Technology”,可進入網址 http:///cyptolope.ibm.com/white.htm 於線上閱讀該論文。 O:\85\85156 分割.DOC -16 - 1255443 發明内容 本發明之一目的在於去除前文所述的各項缺點並提供 一種用來追蹤内容資料的使用之系統。本發明之一實施例 提供了一種用來追蹤使用者裝置上的數位内容的使用之系 統。耦合到一網路之電子商店將播放數位内容資料之授權 $午可銷售給使用者。自網路接收授權許可的内容資料之内 容播放機係用來播放授權許可的内容資料。此外,耦合到 網路的一記錄網站追蹤内容資料的播放。更具體而言,該 記錄網站自網路接收播放資訊,且該播放資訊包含相關聯 的内容播放機已播放内容資料的次數。 本發明之另一實施例提供一種用於追蹤在使用者裝置 上的數位内容的使用之方法。根據該方法,將一播放數位 内客資料之授權許可銷售給一使用者,並將授權許可的内 容資料傳送到該使用者的一内容播放機。此外,當該内容 播放機播放該内容資料時,或當將該内容資料自該内容播 放機拷貝到一外部媒體時,即將資訊傳送到一記錄網站, 因而可追蹤該授權許可的内容資料之使用。 實施方式 現在提供本發明的一目錄,以便協助讀者迅速找到本實 施例中之不同的各節。 I·安全數位内容電子式配送系統 A·系統概述 1 ·權利管理 2. 度(Metering)O:\85\85156 Split.D0C -15- 1255443 is: its content lacks the standard for generating a digital player on a user device for electronically transmitted content. Content providers, e-shops, or other members of the electronic distribution chain may want to provide custom-formatted playback on a variety of devices such as personal computer systems, set-top boxes, and handheld devices. machine. There is a need for a set of tools for decrypting digital content in a tamper-resistant environment (i.e., an environment that prevents unauthorized access to content while a third party is playing). In addition, a set of tools is required to enable a user to manage a native digital content library, but the set of tools does not allow the user to access content that is not purchased for use. To learn more about protecting the background of digital content, please refer to the following three sources. "Music on the Internet and the Intellectual Property Protection Problem" by Jack Lacy, James Synder, and David Maher of AT&T Labs (Florham Park, NJ), available at http://www.a2bmusic.com/about /papers/musicipp.htm Read the paper online. A paper called "DecBox" is described in the paper "Securing the Content, Not the Wire for Information Commerce" by Olin Sibert, David Bernstein, and David Van Wie of InterTrust Technologies Corp. (Sunnyvale, CA). Read the paper online at http://www.intertrust.com/architecture/stc.html. And an IBM White Paper "Cryptolope Container Technology", which can be read online at http:///cyptolope.ibm.com/white.htm. O:\85\85156 Segmentation. DOC -16 - 1255443 SUMMARY OF THE INVENTION One object of the present invention is to eliminate the disadvantages described above and to provide a system for tracking the use of content material. One embodiment of the present invention provides a system for tracking the use of digital content on a user device. An electronic store coupled to a network will be authorized to play digital content for $5 to be sold to the user. The content player that receives the licensed content material from the network is used to play the licensed content material. In addition, a recorded website coupled to the network tracks the playback of content material. More specifically, the recording website receives playback information from the network, and the playback information includes the number of times the associated content player has played the content material. Another embodiment of the present invention provides a method for tracking the use of digital content on a user device. According to the method, a license for playing digital guest data is sold to a user, and the authorized content data is transmitted to a content player of the user. In addition, when the content player plays the content material, or when the content material is copied from the content player to an external media, the information is transmitted to a recording website, thereby tracking the use of the authorized content data. . Embodiments A catalog of the present invention is now provided to assist the reader in quickly finding the various sections of the present embodiment. I·Safe Digital Content Electronic Distribution System A·System Overview 1 ·Right Management 2. Degree (Metering)
O:\85\85156 分割 DOC -17- 1255443 3.開放性架構 B. 系統功能組成部分 1. 内容提供者 2. 電子數位内容商店 3. 中間市場夥伴 4. 清算所 5. 使用者裝置 6. 傳輸基礎建設 C. 系統使用 II. 密碼觀念及其在安全數位内容電子式配送系統上的 應用 A. 對稱演算法 B. 公共金鑰演算法 C. 數位簽名 D. 數位證明書 E. SC(s)圖形表示法指南 F. —安全容器物件加密實例 III. 安全數位内容電子式配送系統流程 IV. 權利管理架構模型 A. 架構層功能 B. 功能分割及流程 1. 内容格式化層 2. 内容使用控制層 3. 内容識別層 O:\85\85156 分割.DOC -18- 1255443 4.授權許可控制層 C.内容配送及授權許可控制 V. 安全容器物件結構 A. —般性結構 B. 權利管理語言語法及語意 C. 安全容器物件流程及處理概述 D. 中介資料安全容器物件620格式 E. 報價安全容器物件641格式 F. 交易安全容器物件640格式 G. 訂單安全容器物件650格式 H. 授權許可安全容器物件660格式 I. 内容安全容器物件格式 VI. 安全容器物件包封及打開 A. 概述 B. 材料表(Bill Of Material ;簡稱 BOM) C. 金鑰說明部份 VII. 清算所 A. 概述 B. 權利管理程序 C. 特定國家參數 D. 稽核記錄及追蹤 E. 結果回報 F. 帳單開立及付款驗證 G ·重新傳輸 O:\85\85156 分割 D0C -19- 1255443 VIII.内容提供者 A. 概述 B. 工作流程管理程式 1. 產品等候動作/資訊程序 2. 新内容要求程序 3. 自動中介資料取得程序 4. 手動式中介資料輸入程序 5. 使用條件程序 6. 受監控的發行程序 7. 中介資料SC(s)產生程序 8. 浮水印程序 9. 預先處理及壓縮程序 10. 内容品質管制程序 11. 加密程序 12. 内容SC(s)產生程序 13. 最後品質保證程序 14. 内容傳播程序 1 5.工作流程規則 C. 中介資料同化及輸入工具程式 1. 自動中介資料取得工具程式 2. 手動式中介資料輸入工具程式 3. 使用條件工具程式 4. 中介資料SC(s)之各組成部分 5. 受監控的發行工具程式 O:\85\85156 分割.DOC -20- 1255443 D. 内容處理工具程式 1. 浮水印工具程式 2. 預先處理及壓縮工具程式 3. 内容品質管制工具程式 4. 加密工具程式 E. 内容SC(s)產生工具程式 F. 最後品質保證工具程式 G. 内容傳播工具程式 H. 内容促銷網站 I. 内容網站代管(Content Hosting) 1. 代管内容網站 2. 安全數位内容電子式配送系統提供的代管内 容網站111 IX. 電子數位内容商店 A. 概述-對多個電子數位内容商店之支援 B. 點對點電子數位内容配送服務 1. 整合要求 2. 内容取得工具程式 3. 交易處理模組 4. 通知介面模組 5. 帳戶對帳工具程式 C. 廣播電子數位内容配送服務 X. 使用者裝置 A.概述 O:\85\85156 分割.DOC -21 - 1255443 Β·應用程式安裝 C·安全容器物件處理器 D·播放應用程式 2.使用者介面元件 3·拷貝/播放管理元件 4.解密1505、解壓縮及播放元件 5·資料管理1502及資料庫存取元件 6 ·應用程式間通訊元件 7·其他雜項元件 8 · —般性播放應用程式 I·安全數位内容電子式配送系統 A.系統概述 安全數位内容電子式配送系統是—種技術平台,包含將 數位内容及與數位内容相關的内纟安全地傳送到—使用者 用戶端裝置並對該等内容進行權利管理所需之之技術、規 才。工八私式、及軟體。使用者裝置包含個人電腦系統、 視訊轉換器(IRDs)、及網際網路裝置。這些裝置可將該内 容拷貝到該内容所有人許可的外部媒體或可肖費家電 裝置。術語數位内容(Digital CGntent)或内容⑷贈⑽)意指 以數位格式儲存的資訊及資料,包括:圖片、電影、视^ 節目、骨樂、程式、多媒體、及電玩。 該技術平台規定如何準備數位内纟、如忙經由點對點或 廣播基礎建設(例如纜線、網際網路、衛 5 久雉線電)而O:\85\85156 Split DOC -17- 1255443 3. Open Architecture B. System Function Components 1. Content Provider 2. Electronic Digital Content Store 3. Intermediate Market Partner 4. Clearing House 5. User Device 6. Transmission Infrastructure C. System Usage II. Cryptographic Concept and Its Application in Secure Digital Content Electronic Distribution System A. Symmetric Algorithm B. Public Key Algorithm C. Digital Signature D. Digital Certificate E. SC(s Graphical Representation Guide F. - Secure Container Object Encryption Example III. Secure Digital Content Electronic Distribution System Process IV. Rights Management Architecture Model A. Architecture Layer Function B. Function Segmentation and Process 1. Content Format Layer 2. Content Usage Control layer 3. Content identification layer O: \85\85156 Split. DOC -18- 1255443 4. License control layer C. Content distribution and license control V. Secure container object structure A. General structure B. Rights management Language grammar and semantics C. Safety container object flow and processing overview D. Intermediary data security container object 620 format E. Quote secure container object 641 format F. Transaction security container object 640 format G. Order security container 650 format H. License security container object 660 format I. Content security container object format VI. Secure container object encapsulation and opening A. Overview B. Bill Of Material (BOM) C. Key Description Part VII Clearing house A. Overview B. Rights management procedures C. Country-specific parameters D. Audit records and tracking E. Result returns F. Billing and payment verification G · Retransmission O:\85\85156 Split D0C -19- 1255443 VIII. Content Provider A. Overview B. Workflow Management Program 1. Product Waiting Action/Information Program 2. New Content Request Program 3. Automatic Intermediary Data Acquisition Program 4. Manual Media Data Entry Program 5. Use Condition Program 6 Monitored Release Program 7. Intermediate Material SC(s) Generation Program 8. Watermark Program 9. Pre-Processing and Compressing Program 10. Content Quality Control Program 11. Encryption Program 12. Content SC(s) Generation Program 13. Finally Quality Assurance Procedures 14. Content Communication Procedures 1. 5. Workflow Rules C. Intermediary Data Assimilation and Input Tools 1. Automatic Intermediary Data Acquisition Tool 2. Manual Intermediary Data Entry Tool 3. Using the conditional tool program 4. The components of the mediation material SC(s) 5. The monitored distribution tool program O:\85\85156 Split. DOC -20- 1255443 D. Content processing tool program 1. Watermark tool program 2 Pre-processing and compression tool program 3. Content quality control tool program 4. Encryption tool program E. Content SC(s) generation tool program F. Final quality assurance tool program G. Content communication tool program H. Content promotion website I. Content Content Hosting 1. Hosted Content Website 2. Secure Digital Content Managed Content Website provided by Electronic Distribution System 111 IX. Electronic Digital Content Store A. Overview - Support for multiple electronic digital content stores B. Point-to-point electronic digital content distribution service 1. Integration requirements 2. Content acquisition tool program 3. Transaction processing module 4. Notification interface module 5. Account reconciliation tool program C. Broadcast electronic digital content distribution service X. User device A. Overview O:\85\85156 Split.DOC -21 - 1255443 Β·Application Install C·Secure Container Object Processor D·Playback Application 2. User Interface Component 3·Copy/Playback Tube Component 4. Decryption 1505, decompression and playback component 5. Data management 1502 and data inventory component 6 · Inter-application communication component 7 · Other miscellaneous components 8 · General playback application I · Secure digital content electronic distribution system A. System Overview Secure Digital Content The electronic distribution system is a technology platform that includes the secure transfer of digital content and digital content related internals to the user's client device and the rights management of such content. Technology, regulations. Work eight private, and software. User devices include personal computer systems, video converters (IRDs), and internet devices. These devices may copy the content to an external media or a portable appliance that is approved by the content owner. The term Digital CGntent or Content (4) Gift (10) means information and materials stored in digital format, including: pictures, movies, video programs, bone music, programs, multimedia, and video games. The technology platform stipulates how to prepare for digital enthusiasm, such as busy peer-to-peer or broadcast infrastructure (such as cable, internet, security, long-term power line)
O:\85\85I56 分割.DOC -22- 1255443 安全地配送、如何授權給使用者裝置、以及如何防止未經 授權的拷貝或播放。此外,該技術平台之架構可在諸如浮 =、壓縮/編碼、加密、及其他安全演算法等的各種技術 隨著時間而有所進展時’整合或移植該等技術。O:\85\85I56 Split.DOC -22- 1255443 Securely distribute, how to authorize the user device, and how to prevent unauthorized copying or playback. In addition, the architecture of the technology platform can be integrated or ported when various technologies, such as floating =, compression/encoding, encryption, and other security algorithms, progress over time.
安王數位内谷電子式配送系統之基本組成部分包括:(U 對内容所有人的所有權保護之權利管理;⑺交易計次以便 進行立即且精確的報酬給付;以及(3)一種開放性且文件記 載詳盡的架構,可讓内容提供者準備内容,並可讓該内容 、·’二由夕種網路基礎建設而安全配送,以便在任何符合標準 的播放機上播放。 1.權利管理 ▲係經由分佈在該系統的各工作組成部分之間的一組功 能而實施該安全數位内容電子式配送#、統中之權利管理。 其王要功能包括··授權許可及控制,使該内容只能被取得 -授權許可的得到授權之中間人或最終使用者解碼;以及 根據採購或授權許可的條款,例如根據容許拷貝次數、播 放次數、或授權許可有效的時間間隔或期限,而對内容的 使用進行控制及強制執行。權利管理的次要功能為起動一 裝置,用以識別未經授權的内容拷貝之起源,以便對抗1 1 ,貫體及安全容器物 (Secure Container ;簡稱sc)技術而實施授權許可及:制 清算所在驗證過已成功完成—授㈣可交易之後,㈣ 間人或最終使用者可以將内容解碼,藉此而提供授權The basic components of the Anwang digital valley distribution system include: (U rights management for ownership protection of content owners; (7) transaction counting for immediate and accurate compensation; and (3) an open and documentary The detailed structure allows the content provider to prepare the content, and allows the content to be safely distributed on the network infrastructure for playback on any standard-compliant player. The secure digital content electronic distribution #, the rights management in the system is implemented through a set of functions distributed between the working components of the system. The functions of the king include: · licensing and control, so that the content can only Authorized intermediaries or end users that are acquired-authorized to decode; and use of content based on terms of the purchase or license, such as the number of copies allowed, the number of plays, or the time interval or period during which the license is valid Control and enforcement. The secondary function of entitlement management is to activate a device to identify unauthorized content. The origin of the shell, in order to combat the 1 1 , the implementation of the Secure Container (Secure Container; sc) technology and the implementation of the license: the system clearing has been successfully completed - after the (four) tradable, (four) between people or the final use Can decode the content to provide authorization
ΟΛ85\85Ι56 分割.DOC •23 - 1255443 可。安全容器物件係用步+ f、用木在各系統組成部分之間配送加密 的内今及貝Λ。SC是一種加密的資訊或内容載體,該載體 利用加密、數位簽名、及數位證明書,而使電子資訊以 各不g又到未I杈權的攔截或修改。該%亦可驗證數位内 今的可L賴性及完整性。這些權利管理功能的優點在於: 電子數位内容配送基礎建設並不一定要是安全的或可信賴 的。因此,可經由諸如全球資訊網及網際網路等的網路基 礎建设而傳輸。這是由於係在安全容器物件内將内容加 密,且該内容的儲存及配送係與該内容的解密及使用隔 離。只有具有解密金鑰的使用者可將加密的内容解密,且 清算所只針對經過授權且適當的使用要求發出解密金鑰。 清算所將不批准未知或未經授權者的額外要求、或不符内 容所有人設定的内容使用條件的要求。此外,如果在内容 的傳輸期間一SC被篡改,則清算所中之軟體決定該sc被篡 改或被偽造,並拒絕接受該交易。 係經由在一最終使用者裝置上執行的最終使用者播放 應用程式(195)而起動内容使用的控制。該應用程式將一數 位碼歆入母一份的内容,該數位碼規定可容許的拷貝及播 放次數。利用數位浮水印技術來產生該數位碼,使其他的 最終使用者播放應用程式(195)無法得知該數位碼,並使該 數位碼可抗拒更改的嘗試。在一替代實施例中,只是將該 數位碼保存為與内容(11 3)相關聯的使用條件之一部分。當 在一符合標準的最終使用者裝置中存取數位内容(u3) 時,最終使用者播放應用程式(195)讀取該浮水印,以便檢 0:\85\85丨56 分割.DOC -24- 1255443 查使用限制,並在需要時更新該浮水印。如果對該内容所 要求的使用不符使用條件,例如拷貝次數用完了,則最終 使用者裝置將不執行該要求。 數位浮水印也提供了識別經過授權的或未經授權的内 容拷貝的來源之方式。内容所有人將一起始浮水印嵌入内 容中,以便識別内容所有人、指定著作權資訊、規定配送 地理區、及加入其他相關的資訊。將一第二浮水印嵌入最 終使用者裝置上的内容,以便識別内容購買者(或授權許可) 及最終使用者裝置、指定購買或授權許可條件及日期、及 加入任何其他相關的資訊。 因為浮水印變成内容中不可分的一部分,所以不論拷貝 是經過授權的或未經授權的,該等内容中都必然載有這此 浮水印。因此,不論將内容儲存在何處,也不論内容的來 源為何,數位内容都必然包含與該内容的來源及容許使用 有關的資訊。可利用該資訊來對抗内容的非法使用。 2. 量度 清算所保留經由該清算所而批准金鑰交換的所有交易 之记錄’作為其權利管理功能的一部分。該記錄可量度授 權許可及原始的使用條件。可將該交易記錄以立即或定期 <方式回報給諸如内容所有人或内容提供者、零售商、及 其他相關夥伴等的各負責方,以便有助於以電子方式進行 父易付款的對帳、及其他的用途。 3. 開放性架構 孩安全數位内容電子式配送系統是一種開放性架構,該ΟΛ85\85Ι56 Split.DOC •23 - 1255443 Yes. The safe container object is encrypted with the step + f, and the wood is used to distribute the encrypted inner and outer bells between the components of the system. The SC is an encrypted information or content carrier that utilizes encryption, digital signatures, and digital certificates to intercept or modify electronic information from time to time. This % also verifies the reliance and integrity of digital in the future. The advantages of these rights management functions are: Electronic digital content distribution infrastructure does not have to be secure or trustworthy. Therefore, it can be transmitted via network infrastructure such as the World Wide Web and the Internet. This is due to the fact that the content is encrypted within the secure container object and the storage and distribution of the content is isolated from the decryption and use of the content. Only the user with the decryption key can decrypt the encrypted content, and the clearing house only issues the decryption key for authorized and appropriate usage requirements. The clearing house will not approve additional requirements from unknown or unauthorized persons, or will not meet the requirements for content usage conditions set by the content owner. In addition, if an SC is tampered with during the transmission of the content, the software in the clearing house determines that the sc has been tampered with or forged and refuses to accept the transaction. Control of content usage is initiated via an end user playback application (195) executing on an end user device. The application digitizes a digit code into the parent's copy, which specifies the number of copies and playbacks that can be tolerated. The digital watermarking technique is utilized to generate the digital code so that other end user playback applications (195) cannot know the digital code and make the digital code resistant to attempts to change. In an alternate embodiment, the digital code is only saved as part of the usage conditions associated with the content (113). When the digital content (u3) is accessed in a standard-compliant end user device, the end user playback application (195) reads the watermark to check 0:\85\85丨56 split.DOC-24 - 1255443 Check the usage limit and update the watermark as needed. If the required use of the content does not meet the conditions of use, such as when the number of copies is exhausted, the end user device will not perform the request. Digital watermarking also provides a way to identify the source of authorized or unauthorized copies of content. The content owner embeds an initial watermark in the content to identify the content owner, specify copyright information, specify a geographic location, and add other relevant information. A second watermark is embedded in the content of the end user device to identify the content purchaser (or license) and end user device, specify the purchase or license conditions and date, and add any other relevant information. Because the watermark becomes an inseparable part of the content, the copy is necessarily carried in the content, whether the copy is authorized or unauthorized. Therefore, regardless of where the content is stored, regardless of the source of the content, the digital content necessarily contains information about the source and permissibility of the content. This information can be used to combat the illegal use of content. 2. Measurements The clearing house retains records of all transactions approved for exchange of keys through the clearing house as part of its rights management function. This record measures the license and the original conditions of use. The transaction record can be returned to the responsible parties such as content owners or content providers, retailers, and other related partners in an immediate or regular <RTIgt; manner, to facilitate electronically reconciling the parental payment And other uses. 3. Open Architecture Child-safe digital content electronic distribution system is an open architecture,
〇:\85\85丨56 分割.D0C -25- 1255443 $構具有公佈的規格及介面,而有助於廣泛地在是市場中 實施並接受該系統,並同時維護内容所有人的權利保護。 該系統架構的彈性及開放性亦可使該系統在各種技術、傳 輸基礎建設、及裝置進入市場時,能夠隨著時間而有所進 展。 該架構在有關内容的本質及其格式方面具有開放性。該 架構支援音訊、程式、多媒體、視訊、或其他類型的内容 之配送P亥内各可以疋诸如用於數位音樂的線性pCM等的 -原生格式’也可以是經過諸如遽波、壓縮、或預強調/ 解強調等的額外預先處理或編碼而得到的—格式。該架構 對於各種加密及浮水印技術都具有開放性。該架構可以選 擇特定的技術以適應不同的内容類型及格式,並可導入或 採用新開發出的技術。此種彈性可讓内容提供者在安全數 位内谷電子式配送系統内選擇及升級其用於資料壓縮、加 密、及格式化所用的技術。 涿架構也對不同的配送網路及配送模式具有開放性。該 架構支援經由低速網際網路連線或高速衛星及纜線網路而 進行的内容配送,並可配合點對點或廣播模型。此外,該 架構被設計成可在其中包括低成本消費家電裝置的多種裝 置上實施最終使用者裝置中之功能。此種裝置可讓内容提 供者及零售商經由多種服務類型而將内容提供給中間人或 取終使用者,並可讓使用者購買内容或取得内容的授權許 可,播放該内容,並將該内容記錄在各種符合標準的播放 裝置。 O:\85\85156 分割.DOC -26- 1255443 Β·系統功能組成部分 現在請參閱圖1,圖中示出根據本發明的一安全數位内 谷電子式配送系統100概觀之方塊圖。安全數位内容電子式 配送系統100包含數個其中包含一端到端解決方案2業務 組成部分,這些業務組成部分包括:内容提供者101或數位 内容所有人、電子數位内容商店103、中間市場夥伴(圖中 未示出)、清算所105、代管内容網站m、傳輸基礎建設 1〇7、及最終使用者裝置1〇9。每一這些業務組成部分都利 用到安全數位内容電子式配送系統1〇〇的各種組成部分。下 文中將對與電子㈣113配送有關的這些業務組成部分及 系統組成部分作高階的說明。 1·内容提供者1〇1 内容提供者101或内容所有人是原始内容113的所有 人、及(或)被授權將獨立内容113作成套件以供進一步配銷 之配銷商。内容提供者101可直接利用其權利,或將内容113 授權給電子數位内容商店103、或中間市場夥伴(圖中未示 出),且通常回收與電子商務收益相關的内容使用付款。内 今I疋供者101的例子包括s〇ny、Tim卜Warner、MTV、、〇:\85\85丨56 Division.D0C -25- 1255443 $ has published specifications and interfaces, and helps to implement and accept the system widely in the market, while maintaining the rights protection of the content owner. The flexibility and openness of the system architecture also allows the system to evolve over time as technology, transmission infrastructure, and devices enter the market. The architecture is open to the nature of the content and its format. The architecture supports the distribution of audio, program, multimedia, video, or other types of content. The native format such as linear pCM for digital music can also be passed through such as chopping, compression, or pre-processing. A format obtained by emphasizing/de-emphasizing additional pre-processing or coding. This architecture is open to a wide range of encryption and watermarking technologies. The architecture can select specific technologies to accommodate different content types and formats, and can import or adopt newly developed technologies. This resiliency allows content providers to select and upgrade their technology for data compression, encryption, and formatting within a secure digital distribution system. The architecture is also open to different distribution networks and distribution models. The architecture supports content delivery over low-speed Internet connections or high-speed satellite and cable networks, and can be paired with point-to-point or broadcast models. In addition, the architecture is designed to implement functions in the end user device on a variety of devices including low cost consumer appliance devices. Such a device allows content providers and retailers to provide content to middlemen or end users via multiple service types, and allows users to purchase content or obtain authorization for content, play the content, and play the content. Recorded in a variety of standards-compliant playback devices. O:\85\85156 Split. DOC -26- 1255443 系统 System Function Components Referring now to Figure 1, there is shown a block diagram of an overview of a secure digital valley electronic dispensing system 100 in accordance with the present invention. The secure digital content electronic distribution system 100 includes a plurality of business components including an end-to-end solution 2, the business components including: a content provider 101 or a digital content owner, an electronic digital content store 103, and an intermediate market partner (figure Not shown), clearing house 105, escrow content website m, transmission infrastructure 1〇7, and end user device 1〇9. Each of these business components utilizes various components of a secure digital content electronic distribution system. A high-level description of these business components and system components related to the distribution of electronic (IV) 113 will be given below. 1. Content Provider 1 内容 The content provider 101 or content owner is the owner of the original content 113, and/or the distributor authorized to make the independent content 113 a kit for further distribution. The content provider 101 can directly utilize its rights, or authorize the content 113 to the electronic digital content store 103, or an intermediate market partner (not shown), and typically reclaim content usage payments associated with the e-commerce revenue. Examples of the current I 疋 donor 101 include s〇ny, Tim Bu Warner, MTV,
Microsoft、Turner、Fox、及其他内容提供者。 内容提供者1〇1使用作為安全數位内容電子式配送系統 100的α卩分而提供之各工具程式,以便準備其内容} 13及 相關的資料以供配送。一工作流程管理程式154安排所要處 理的内各113之時程,並在該内容113經過内容113準備及套 件組成的各步驟時,追蹤該内容113,以便保持優異的品質Microsoft, Turner, Fox, and other content providers. The content provider 101 uses the various tools provided as the alpha-partition of the secure digital content electronic distribution system 100 to prepare its contents and related materials for distribution. A workflow management program 154 arranges the time schedules of the respective 113s to be processed, and tracks the content 113 as the content 113 passes through the steps of content 113 preparation and kit composition in order to maintain excellent quality.
〇:\85\85丨56 分割.D0C -27- 1255443 X在正份本文件中,術語中介資料意指與内容⑴相關 的讀,且在本實施例中並不包括内容113本身。舉例而 吕,某-首歌曲的中介資料可能是歌曲名稱或歌曲的消費 =數,並非該歌曲的錄音。内容113將包含錄音。一中介 、’斗同化及知人工具程式161係用來自内容提供者資料庫 =提取中介資料’或提取内容提供者以—指定格式提供的 資料(在一音樂的實例中,為諸如CD名稱、藝人名稱、歌 曲名稱、及CD圖片等内容113之資訊),並將這些資料組成 套件以供私子式配运。也利用中介資料同化及輸入工具程 式161來輸入内各113之使用條件。使用條件中的資料可包 括拷貝限制規則、批發價、以及任何必$的業務規則。利 用一,予水印工具程式來隱藏内容113中用來識別内容所有 人處理日期、及其他相關資料等的資料。在内容丨丨3是音 詋的一實施例中,利用一音訊預先處理工具程式來調整内 各113或其他晋訊的動態範圍,及(或)等化内容〖,以便 得到最佳的壓縮品質,並壓縮到所需的壓縮等級,且將内 容113加密。這些工具程式具有適應性,以遵循數位内容壓 縮/編碼、加密、及格式化方法在技術上的進展,而讓内容 提供者101在市場上出現新的工具程式時,可利用最佳的工 具程式。 SC包封工具程式將加密的内容丨丨3、數位内容相關資料 或中介資料、及加密金鑰包封在各Scs(將於下文中說明之) 中’並儲存在一代管内容網站及(或)促銷網站,以供電子 式配送。代管内容網站可設於内容提供者1 〇丨或設於多個場〇: \85\85丨56 Division. D0C -27- 1255443 X In the present document, the term intermediary material means a reading related to the content (1), and the content 113 itself is not included in the present embodiment. For example, Lu, the mediation of a certain song may be the song name or the consumption of the song = not the recording of the song. Content 113 will contain the recording. An intermediary, 'Double Assimilation and Knowledge Tool 161 uses data from the Content Provider Database = Extract Intermediary Materials' or extracts content provided by the content provider in a specified format (in the case of a music, such as a CD name, artist) The name, song name, and CD picture and other content 113 information), and these materials are combined into a kit for private distribution. The mediation data assimilation and input tool program 161 is also used to input the usage conditions of the respective 113s. The information in the conditions of use can include copy restriction rules, wholesale prices, and any business rules that must be $. The watermarking tool program is used to hide the content of the content 113 for identifying the date of processing of the content owner, and other related materials. In an embodiment where the content 丨丨3 is a sound, an audio pre-processing tool is used to adjust the dynamic range of each 113 or other Jinxun, and/or equalize the content to obtain the best compression quality. And compress to the desired compression level and encrypt the content 113. These tools are adaptable to follow the technical advances in digital content compression/encoding, encryption, and formatting methods, allowing content providers 101 to take advantage of the best tools when new tools are available on the market. . The SC Encapsulation Tool program encapsulates encrypted content 数3, digital content-related or intermediary data, and encryption keys in each of the Scs (described below) and stores them on a web content site and/or ) Promotional website for electronic distribution. Hosted content sites can be located in content providers 1 or in multiple sites
O:\85\85156 分割.DOC -28 - 1255443 所,其中包括電子數位内容商店103及中間市場夥伴(圖中 未示出)的場所。因為内容113及金鑰(將於下文中說明之) 係在各SCs中加密及包封,所以電子數位内容商店1〇3或人 和其他網站代管業者無法在不經過清算所批准且通知内容 鍉供者1 01的情形下直接存取解密後的内容丨丨3。 2.電子數位内容商店1 〇3 電子數位内容商店103是經由諸如以内容113為主題的 銷售計畫或内容113的電子式促銷等多種服務或應用而行 銷内容113之實體。電子數位内容商店1〇3管理其服務的設 汁、開發、業務運作、結帳、促銷、及銷售。線上電子數 位内容商店103的例子為提供軟體的電子式下載之網站。 電子數位内容商店103在其服務的範園内,執行了安全 數位内容電子式配送系統1〇〇的某些功能。電子數位内容商 店103集合來自内容提供者1〇1之資訊,將内容及中介資料 包封在額外的SCs中,並將這些SCs傳送到消費者或企業, 作為一服務或應用的一部分。電子數位内容商店1〇3利用安 全數位内容電子式配送系統1〇〇提供的工具程式,而協助其 完成下列事項:中介資料提取、次要使用條件、8(:的包封、 及電子内容交易的追蹤。該次要使用條件資料可包括諸如 内容Π3購買價格、計次付費價格、複製授權及目標裝置類 型、或可用時間限制等的零售業務報價資料。 旦包子數位内容商店103完成一最終使用者對電子 :容113的-有效要求之後,該電子數位内容商店103即負 貝技權清算所1〇5將内容113的解密金鑰發給該客戶。該電O:\85\85156 Split.DOC -28 - 1255443, including the electronic digital content store 103 and the intermediate market partner (not shown). Because the content 113 and the key (described below) are encrypted and encapsulated in each SCs, the electronic digital content store 1〇3 or people and other website hosting companies cannot approve and notify the content without going through the clearing house. In the case of the donor 101, the decrypted content 丨丨3 is directly accessed. 2. Electronic Digital Content Store 1 电子 3 The electronic digital content store 103 is an entity that sells content 113 via various services or applications such as a sales plan with the theme 113 as the theme or an electronic promotion of the content 113. The Electronic Digital Content Store 1〇3 manages the design, development, business operations, checkout, promotion, and sales of its services. An example of the online electronic digital content store 103 is a website that provides electronic downloading of software. The electronic digital content store 103 performs certain functions of the secure digital content electronic distribution system 1 in its service park. The electronic digital content store 103 aggregates information from the content provider 1.1, encapsulates the content and intermediary information in additional SCs, and transmits the SCs to the consumer or business as part of a service or application. The Electronic Digital Content Store 1〇3 uses the tools provided by the Secure Digital Content Electronic Distribution System to assist in the following: mediation data extraction, secondary usage conditions, 8 (: encapsulation, and electronic content transactions) The secondary usage condition data may include retail business quotation materials such as content 购买3 purchase price, billing price, copy authorization and target device type, or available time limit, etc. Once the buns digital content store 103 completes a final use. After the valid request for the electronic: capacity 113, the electronic digital content store 103, ie, the negative clearing rights clearinghouse 1〇5, sends the decryption key of the content 113 to the customer.
O:\85\85156 分割.D0C -29- 1255443 子數位内谷商店也授權包含内容"3的SC之下載。該電予 數位内容商店可選擇將包含數位内容的各scs放在其本身 的網站,及(或)可選擇利用另一代管内容網站的網站代管 及配送設施。 電子數位内容商店可利用安全數位内容電子式配送系 統100而針對最終使用者可能提出的疑問或問題提供客戶 服務,電子數位内容商店1G3也可將其客戶服務支援外包給 清算所1 0 5。 3 ·中間市場夥伴(圖中未示出) 在-替代實施例中,可利用安全數位内容電子式配送系 統1〇〇將内容113提供給被稱為中間市場夥伴的其他企業。 這些f夕伴可包括提供非電子服務的數位内容相關公司,例 如配銷内容U3的電視台或視訊倶樂部、電台或唱片俱樂部 等。這些夥伴亦可包括諸如錄音室、複製公司、製作人等 處理材料作域音製作或行銷_部分的其他受託者。這些 中間市場夥伴需要清算所105的批准,以便將内容113解密一。 4.清算所105 清算所105對與在一SC中加密的内容113的銷售及(或)容 許使用提供授權許可及記錄保存。當清算所丨〇5自一中間人 或最終使用者接收到一個對内容丨丨3的一解密金鑰之要求 時,清算所105即確認所要求資訊的完整性及可信賴性;驗 證一電子數位内容商店或内容提供者101已授權該要求;以 及驗證所要求的使用符合内容提供者1〇1所規定的内容使 用條件。一旦滿足這些驗證之後,清算所105即將包封在一 O:\85\85156 分害IJ.DOC •30- 1255443 授權許可sc的内容113解密金鑰傳送到提出要求的最終使 用者。該金鑰被加密成只有經過授權的使用者才能擴取該 金鑰。如果最終使用者的要求是無法驗證的、不完整的、 或未經授權的,則清算所105拒絕對解密金鑰的要求。 清算所1G5保存所有交易的記錄,並可以立即、定期、 或侷限某些交易之方式將這些記錄回報給諸如電子數位内 容商店103及内容提供者1〇1等各負責方。此種回報是一種 可將内答113的銷售資訊通知内容提供者1〇1且電子數位内 容商店103可得到以電子方式配送到其客戶的稽核報告之 一種万式。如果清算所105偵測到—sc中的資訊已洩漏出 去或不符内容使用條件,則清算所1〇5亦可通知内容提供者 101及(或)電子數位内容商店1〇3。係針對資料收集儲存及 報告產生,而設計清算所1〇5資料庫的交易記錄及儲存能 力。 在另一實施例中,清算所105可提供客戶支援及交易例 外狀況的處理,例如退款、傳輸失敗、及購買爭端。清算 所105可以一獨立實體之方式運作,而作為權利管理及量度 之一受託管理人。清算所於需要時也提供開立帳單及結算 的服務。電子清算所的例子包括Secure_Bank c〇m、及由 Visa/Mastercard 所成立的安全電子交易(Secure Electr〇nic Transaction ;簡稱SET)。在一實施例中,清算所i〇5是最終 使用者裝置1 09可連線到的網站。在另一實施例中,清算所 105是電子數位内容商店1〇3的一部分。 5.最終使用者裝置1〇9 O:\85\85156 分割.D0C -31 - 1255443 取、、冬使用者裝置109可以是包各 荄黻… < 疋匕口付&女全數位内容電子 式配运系統100規格的一最線 取、、使用者播放應用程式195(將 二:,說明之)之任何播放裝置。些裝置包括個人電腦系 ^轉換备(IRDs)、及網際網路裝置。可在軟體及(或) ^費電子裝置硬體中實施最終使用者播放應用程式195。除 了執行播放、記錄、及内容庫管理功能以外,最終使用者 播放應用程式195也執行sc處理,而起動最終使用者裝置 109中之權利管理。最終使用者裝置1G9管理包含數位内容 的各SCs《下載及儲存;要求並管理自清算所⑽接收經過 加密的數位内容金鑰;處理每次拷貝或播放數位内容時的 浮水印;«數位内容的使用條件而管料作㈣(或刪除 拷貝)的次數;以及在容許時執行拷貝到一外部媒體或可攜 式消費電子裝置。該可攜式消費電子裝置可執行一部分的 最終使用者播放應用程式195功能,以便處理浮水印中嵌入 的内容使用條件。在本文全文中,術語最終使用者及最終 使用者裝置係用來意指在一最終使用者裝置1 〇 9上的使用 或執行。· 6·傳輸基礎建設107 士王數位内谷電子式配送系統1 〇 〇與連接電子數位内容 商店103及最終使用者裝置109的傳輸網路無關。安全數位 内容電子式配送系統1 〇〇支援諸如網際網路等點對點配送 模式、及諸如數位廣播電視等廣播配送模式。 縱然使用相同的工具程式及應用程式來取得、包封、及 追蹤經由各種傳輸基礎建設107的内容113交易,但是可根 ΟΛ85\85156 分割.DOC -32- 1255443 據所選擇的基礎建設及配送模式,而改變將服務提供給客 戶的表現方式及方法。所傳輸内容113的品質可能也有所不 同,這是因為高頻寬的傳輸基礎建設能夠以比較低頻寬的 料基礎建設更可接受的回應時間傳輸高品質的數位内 春可凋正針對一點對點配送模式而設計的服務應用程 式,以便也可支援一廣播配送模式。 c.系統使用 安全數位内容電子式配送系統100可安全地將高品質的 電子式内容113傳送到消費者或企業的最終使用者裝置 109,以便管制及追蹤内容113的使用。 可利用新的及現有的配送通路,而在各種消費者及企業 對企業服料部署安全數位内容電子式配送系統跡每一 特定的服務可使用一種不同的金融模式,且可經由安全數 位内容電子式配送系統100的各權利管理而執行該金融模 式。可利用清算所105的權利管理及最終使用者播放應用程 式195的防止拷貝特殊功能,而實施諸如批發或零買、計次 付費使用、耵用服務、拷貝/無拷貝限制、或重新配送等模 式。 安全數位内容電子式配送系統1〇〇可讓電子數位内容商 店103及中間市場夥伴於創造用來銷售内容113的服務時, 有很大的彈性。在此同時,安全數位内容電子式配送系統 100將某一程度的保證提供給内容提供者1〇1,使内容提供 者101的數位資產得到保護及量度,因而内容提供者1〇1可 因内容113的授權而收到適當的報酬。 O:\85\85156 分割.DOC -33- 1255443 II.密碼觀念及其在安全數位内容電子式配送系統上的應 用 安全數位内容電子式配送系統100中之授權許可控制係 基於密碼的使用。本節介紹本發明的基本密碼技術。公共 金瑜(public key)加密、對稱金瑜(symmetric key)加密、數 位簽名、數位浮水印、及數位證明書都是習知的。 A.對稱演算法 在安全數位内容電子式配送系統100中,内容提供者101 利用對稱演算法將内容加密。因為此種演算法利用同一金 鑰將資料加密及解密,所以被稱為對稱演算法。資料傳送 者及訊息接收者必須共用該金鑰。本文中將共用的金鑰稱 為對稱金鑰。安全數位内容電子式配送系統1 〇〇與針對一特 定實施例而選擇的特硬對稱演算法無關。 常見的對稱演算法有DES、RC2、及RC4。DES及RC2都是 區段密碼(block cipher)。區段密碼一次利用一區段的資料位 元將資料加密。DES是一種美國政府官方的加密標準,具有 64位元的區段長度,並使用56位元的金鑰。通常利用三重 DES(Triple-DES)來增加簡單DES所能達到的安全性。RSA資 料安全(RSA Data Security)設計出RC2〇RC2使用一可變金鑰 長度的密碼,且具有64位元的區段長度。也是由RSA資料安 全設計出的RC4是一種可變金瑜長度的位元流密碼(stream cipher)。位元流密碼係一次在單一資料位元上運算。RSA資 料安全聲稱:在RC4中,每一輸出位元組需要八到十六個機 器運算。 O:\85\85156 分割.D0C -34- 1255443 IBM設計了一種稱為SEAL的快速演算法。SEAL是一種位 元流演算法,該演算法使用一可變長度的金鑰,且係針對32 位元的處理器而最佳化。SEAL在每個資料位元組中需要大 約五個基本的機器指令。如果已將所使用的160位元金鑰預 先處理到内部表中,則採用50百萬赫的486 CPU之電腦係以 每秒7.2百萬位元組的速率執行SEAL程式碼。 密碼 金鑰長度 金瑜建立時間 加密速度 DES 56 460 1,138,519 RC2 40 40 286,888 RC4 40 151 2,377,723 B.公共金鍮演算法O:\85\85156 Split.D0C -29- 1255443 The sub-digit valley store also authorizes the download of the SC containing the content "3. The digital content store may choose to place each scs containing digital content on its own website, and/or may choose to utilize a web hosting and delivery facility of another hosting content website. Electronic digital content stores can use the secure digital content electronic distribution system 100 to provide customer service to questions or questions that may be raised by end users. The electronic digital content store 1G3 can also outsource its customer service support to the clearing house 105. 3. Intermediate Market Partner (not shown) In an alternative embodiment, the secure digital content electronic distribution system 1 can be utilized to provide content 113 to other businesses known as intermediate market partners. These partners may include digital content-related companies that provide non-electronic services, such as a television station or video club that distributes content U3, a radio station, or a record club. These partners may also include other trustees such as recording studios, copying companies, producers, etc., who process materials for local sound production or marketing. These intermediate market partners require the approval of the clearing house 105 to decrypt the content 113. 4. The clearing house 105 clearing house 105 provides authorization and record keeping for the sale and/or permissive use of the content 113 encrypted in an SC. When the clearing house 接收5 receives a request for a decryption key for the content 丨丨3 from an intermediary or end user, the clearing house 105 confirms the integrity and trustworthiness of the requested information; The digital content store or content provider 101 has authorized the request; and the verification requires that the usage meets the content usage conditions specified by the content provider 1.1. Once these verifications are met, the clearinghouse 105 is about to be wrapped up in an O:\85\85156 victim IJ.DOC • 30-1255443. The content of the license sc is decrypted and transmitted to the requesting end user. The key is encrypted so that only authorized users can extend the key. If the end user's request is unverifiable, incomplete, or unauthorized, the clearinghouse 105 rejects the request for the decryption key. The clearing house 1G5 keeps records of all transactions and can report these records to parties such as the electronic digital content store 103 and the content provider 1〇1 in a timely, regular, or limited manner. Such a return is a type in which the content information provider of the internal answer 113 can be notified to the content provider 1.1 and the electronic digital content store 103 can receive the audit report electronically delivered to its customer. If the clearinghouse 105 detects that the information in the sc has leaked or does not match the content usage condition, the clearinghouse 1〇5 may also notify the content provider 101 and/or the electronic digital content store 1〇3. The transaction records and storage capacity of the database of the Clearing House is designed for data collection, storage and reporting. In another embodiment, the clearinghouse 105 can provide processing of customer support and transaction exceptions, such as refunds, transmission failures, and purchase disputes. The clearing house 105 can operate as an independent entity and as a trustee of one of the rights management and measurement. The clearing house also provides services for opening bills and settlements when needed. Examples of electronic clearing houses include Secure_Bank c〇m and Secure Electr〇nic Transaction (SET) established by Visa/Mastercard. In one embodiment, the clearinghouse i〇5 is the website to which the end user device 109 can be connected. In another embodiment, the clearinghouse 105 is part of an electronic digital content store 101. 5. The end user device 1〇9 O:\85\85156 split. D0C -31 - 1255443 The take, winter user device 109 can be a package... <疋匕口付& 女全数位电子Any of the most suitable devices for the user to play the application program 195 (described in the second paragraph). These devices include personal computer systems (IRDs) and Internet devices. The end user playback application 195 can be implemented in software and/or electronic device hardware. In addition to performing playback, recording, and content library management functions, the end user playback application 195 also performs sc processing to initiate rights management in the end user device 109. The end user device 1G9 manages each SCs containing digital content "downloading and storing; requesting and managing the receipt of the encrypted digital content key from the clearing house (10); processing the watermark each time copying or playing the digital content; «digital content The number of times the material is used as (4) (or deleted); and the copying to an external media or portable consumer electronic device is performed when allowed. The portable consumer electronic device can perform a portion of the end user playback application 195 function to process the content usage conditions embedded in the watermark. Throughout this document, the terms end user and end user device are used to mean the use or execution on an end user device 1 〇 9. · 6. Transmission Infrastructure 107 The King's Digital Valley Electronic Distribution System 1 〇 〇 is connected to the electronic digital content of the store 103 and the end user device 109. Secure Digital Content The electronic distribution system 1 supports point-to-point delivery modes such as the Internet and broadcast distribution modes such as digital broadcast television. Even though the same tools and applications are used to acquire, encapsulate, and track content 113 transactions via various transport infrastructure 107, they can be partitioned by 85\85156. DOC -32 - 1255443 according to the selected infrastructure and distribution model And change the way and means of delivering the service to the customer. The quality of the transmitted content 113 may also be different, because the high-bandwidth transmission infrastructure can transmit higher-quality digital transmissions in a relatively low-frequency wide-based material infrastructure with a more acceptable response time. A service application designed to support a broadcast distribution mode as well. c. System Usage The secure digital content electronic distribution system 100 can securely transfer high quality electronic content 113 to the end user device 109 of the consumer or business to regulate and track the use of the content 113. New and existing distribution channels can be utilized, and secure digital content electronic distribution systems can be deployed across a variety of consumer and business-to-business applications. Each specific service can use a different financial model and can be secured via secure digital content. The financial mode is executed by each rights management of the distribution system 100. The rights management of the clearing house 105 and the anti-copy special function of the end user playing application 195 can be implemented to implement modes such as wholesale or zero-buy, pay-per-use, service, copy/no copy restriction, or re-distribution. . The secure digital content electronic distribution system 1 allows electronic digital content stores 103 and intermediate market partners to have great flexibility in creating services for selling content 113. At the same time, the secure digital content electronic distribution system 100 provides a certain degree of assurance to the content provider 1.1, so that the digital assets of the content provider 101 are protected and measured, and thus the content provider 1〇1 can be content-dependent 113 authorized to receive appropriate compensation. O:\85\85156 Split.DOC -33- 1255443 II. Cryptographic concept and its application in secure digital content electronic distribution system Secure digital content License control in electronic distribution system 100 is based on the use of passwords. This section describes the basic cryptographic techniques of the present invention. Public public key encryption, symmetric key encryption, digital signatures, digital watermarks, and digital certificates are well known. A. Symmetric Algorithm In the secure digital content electronic distribution system 100, the content provider 101 encrypts the content using a symmetric algorithm. Because this algorithm uses the same key to encrypt and decrypt data, it is called a symmetric algorithm. The data sender and the recipient of the message must share the key. The key shared in this article is called a symmetric key. The secure digital content electronic distribution system 1 is independent of the extremely hard symmetric algorithm selected for a particular embodiment. Common symmetric algorithms are DES, RC2, and RC4. Both DES and RC2 are block ciphers. The segment password encrypts the data with one segment of data bits at a time. DES is an official US government encryption standard with a 64-bit segment length and a 56-bit key. Triple DES is often used to increase the security that simple DES can achieve. RSA Data Security designed RC2〇RC2 to use a variable-key length password with a 64-bit segment length. Also designed by RSA, RC4 is a variable stream cipher of variable length. The bitstream cipher is computed on a single data bit at a time. RSA Data Security claims that in RC4, each output byte requires eight to sixteen machine operations. O:\85\85156 Split.D0C -34- 1255443 IBM designed a fast algorithm called SEAL. SEAL is a bitstream algorithm that uses a variable length key and is optimized for a 32 bit processor. SEAL requires approximately five basic machine instructions per data byte. If the 160-bit key used has been pre-processed into the internal table, the computer with a 50 megahertz 486 CPU executes the SEAL code at a rate of 7.2 megabytes per second. Password Key length Jin Yu settling time Encryption speed DES 56 460 1,138,519 RC2 40 40 286,888 RC4 40 151 2,377,723 B. Public key algorithm
Microsoft在其CryptoAPI文件的概論中報告了加密效能標 準檢查程式的結果。在一採用Pentium 120百萬赫CPU且作業 系統為Windows NT 4.0的電腦上執行的一個使用Microsoft 的CryptoAPI之應用程式得到了下列的結果。_ 在安全數位内容電子式配送系統1 00中,係利用公共金 鑰將各對稱金鑰及其他小資料片段加密。公共金鑰演算法 使用兩個金鍮。這兩個金输在數學上是相關的,因而利用 一個金鑰加密的資料可以利用另一金鑰解密。金鑰的所有 人將一個金鑰保密(秘密金输(private key)),並公開分送第 二金瑜(公共金鑰)。 為了確保一個利用公共金鑰演算法的機密訊息的安全 性,必須使用接收者的公共金鑰將該訊息加密。只有擁有 相關聯的秘密金鑰的接收者可將該訊息解密。也利用公共 O:\85\85156 分割.D0C -35- 1255443 金輪 >夫异法來產生數位簽名。秘密金瑜係用於此種用途。 下節將提供與數位簽名有關的資訊。 最常用的公共金鑰演算法是RSA公共金鑰密碼。RSA公 共金鑰密碼已成為業界中公共金鑰事實上的標準。在加密 及數位簽名上也相當好用的其他演算法包括ElGamal及 Rabin。RS A是一種可變金鑰長度的密碼。 對稱金鑰演算法比公共金鑰演算法快速許多。在軟體 中,DES的速度大致為RSA的至少100倍。因此,並不將rsa 用來將大量的資料加密。RSA資料安全報告在一使用90百 萬赫Pentium CPU的機器上,RSA資料安全的工具程式套件 B SAFE 3· 0在秘密金鑰運算(利用秘密金鑰進行的加密或解 密)中具有下列的產生速率:在512位元模數下為每秒216 千位元,而在1024位元模數下為每秒7.4千位元。 C.數位簽名 在士王數位内谷電子式配送系統1〇〇中,SC(s)的發出者 在該SC(s)上數位方式簽名,而保護sC(s)的完整性。一般 而言’為了產生一訊息的數位簽名,一訊息所有人首先計 算訊息摘要(將於下文中說明之),然後利用該所有人的秘 密金鍮將該訊息摘要加密。將該訊息連同其簽名而配送。 該訊息的任何接收者可首先可利用該訊息所有人的公共金 鑰將該簽名解密,以便恢復該訊息摘要,而驗證數位簽名。 該接收者然後計算所接收訊息的摘要,並將該摘要與所恢 復的摘要比較。如果在配送的過程中,該訊息並未被改變, 則所計算的摘要與所恢復的摘要必須相同。 O:\85\85156 分割.DOC -36- 1255443 在安全數位内容電子式配送系統100中,因為Sc(s)包含 數個資料部分,所以為每一部分計算一摘要,且為該等序 連邵分的摘要計算一總結摘要。係利用該Sc(s)發出者的秘 次金瑜將该總結摘要加密。經過加密的總結摘要即是該發 出者的SC(s)數位簽名。各部分摘要及該數位簽名係包含在 SC(s)的本體中。sc(s)的接收者利用所接收的數位簽名及 邵分摘要,而驗證該SC(s)及其各組成部分之完整性。 利用一種單向雜亂演算法(hash algorithm)計算一訊息摘 要。一雜亂演算法取得一可變長度的輸入訊息,並將該輸 入汛息轉換成一固定長度的字串,亦即訊息摘要。單向雜 亂演算法只在一個方向上運算。亦即,易於計算一輸入訊 息的摘要,但是非常難以(計算上的不可行)自其摘要產生 幸則入W息。因為该卓向雜亂函數的特性,我們可將一訊息 摘要視為該訊息的指紋。 最常見的單向雜亂函數是來自RS A資料安全的MD5、及 美國國家技術及標準協會(National lnstitute of TechnQl0gy and Standards ;簡稱NITS)設計的 SHA。 D·數位證明書 數位證明書係用來證明或驗證已傳送一經數位簽名的 訊息的人員或實體之身分。證明書是一種由一將一公共金 鑰與一人員或實體結合的認證中心(certificati〇n auth〇rity) 發出的數位文件。該證明書包括公共金鑰、人員或實體的 名稱、到期日、認證中心的名稱、及其他資訊。該證明書 也包含該認證中心之數位簽名。 O:\85\85 丨 56 分割.D0C -37- 1255443 當一實體(或人員)傳送一份以其公共金鑰簽署並伴隨有 其數位證明書之訊息時,訊息的接收者利用來自該證明書 的實體名稱來決定是否要接受該訊息。 在安全數位内容電子式配送系統100中,除了最終使用 者裝置109發出的以外的每一 SC(s)都包含該SC(s)的產生 者之證明書。因為許多最終使用者並不需要取得一證明書 或握有由非真實認證中心所發出的證明書,所以最終使用 者裝置109並不需要將證明書包含在其SC(s)中。在安全數 位内容電子式配送系統100中,清算所105可選擇將證明書 發出到電子數位内容商店103。因而可讓最終使用者裝置 109獨立驗證安全數位内容電子式配送系統100已授權電子 數位内容商店103。 E. SC(s)圖形表示法指南 本文件使用圖示而以圖形來代表SC(s),圖中示出加密部 分、非加密部分、加密金鍮、及證明書。現在請參閱圖2, 該圖示出SC(s) 200的一例示圖示。下列符號係用於SC(s) 的圖示。金鑰201是一公共金鑰或秘密金鑰。諸如清算所 CLRNGH的金鑰之齒孔指示該金鑰之所有人。鑰把内的PB 指示該金鑰是一公共金鑰,因而該金鑰201是一清算所的公 共金鑰。鑰把内的PV指示該金鑰是一秘密金鑰。菱形是一 最終使用者數位簽名202。首字指示該秘密金鑰係用來產生 簽名,因而EU係指示如下表所示的最終使用者之數位簽 名。對稱金鑰203係用來將内容加密。一加密對稱金鑰物件 204包含一個以一 CLRNGH的PB加密的對稱金鑰203。長方 O:\85\85156 分割.DOC -38- 1255443 形上方邊界的金鑰是用來將物件加密的之金鑰。該長方形 《内的符號或文字#示該加密物件(在該例中為一對稱金 餘)固中示出另一加金物件,該加密物件在此實例中為一 叉易識別碼加密物件205。内容授權管理的使用條件2〇6將 万、下文中說明。SC(S) 200包含以一最終使用者數位簽名 202簽名的若干使用條件2〇6、交易識別碼加密物件川卜一 應用程式識別碼加密物件207、以及加密對稱金鑰物件2〇4。 广已堯^出用來識別SC(s)的簽名去夕首宇. _首字 組成部分 CP 内容提供者101 MS 電子數位内容商店103 HS 代管内容網站1 1 1 EU 最終使用者裝w 1DQ CH 清算所105 CA 認證中心(圖中未示出) F. —安全容器物件加密實例 下表及圖提供了用來產生資訊並自Sc(s)取得資訊的加 密及解密程序之一概觀。在該程序概觀中產生及解密的 SC⑷是一個一般性SC(s)。該SC(s)並不代表安全數位内容 電子式配送系統1〇〇中的權利管理所用的任何特SSC(s)類 型。該程序包含圖3中針對加密程序而示出之步驟。 圖3所示加密程序之流程 步騾 程序 3 01 傳送者產生一隨機對稱金鑰,並利用該對稱金瑜 O:\85\85156 分割 DOC -39· 1255443 將内容加密。 3 02 傳送者利用一雜亂演算法執行該加密的内容,以 便產生内容摘要。 303 傳送者利用接收者的公共金鑰將該對稱金鍮加 密。PB RECPNT意指接收者的公共金鑰。 304 傳送者利用步騾302所用的相同雜亂演算法執行 加密的對稱金鑰,以便產生對稱金鑰摘要。 3 05 傳送者利用步騾302所用的相同雜亂演算法執行 該内容摘要及該對稱金鑰摘要之序連,以便產生 SC(s)摘要。 3 06 傳送者利用該傳送者的秘密金鑰將該SC(s)摘要加 密’以便產生該SC(s)之數位簽名。pv SENDER意 指该傳送者的秘密金输。 307B 傳送者產生一 SC(s)檔案,該SC(s)檔案包含加密的 内容、加密的對稱金鑰、内容摘要、對稱金鑰摘 要、傳送者的證明書、及SC(s)簽名。 307A 傳送者在開始安全的通訊之前,必須先自一認證 中心取得證明書。該認證中心將該傳送者的公共 金鑰及該傳送者的名稱包含在該證明書中,旅在 該證明書上簽認。PV CAUTHR意指該認證中心的 秘密金鑰。傳送者將SC(s)傳輸到接收者。 圖4所示解密程序之流程 步驟 程序 408 接收者接收SC(s),並準備其各組成部分。 O:\85\85156 分割.DOC -40- 1255443 409 410 411 412 413 414 415 接收者利用認證中心的公共金鑰將傳送者證明書 中之數位簽名解密,而驗證該數位簽名。如果該 證明書的數位簽名是有效的,則接收者自該證明 書取得該傳送者的公共金鑰。 接收者利用該傳送者的公共金鑰將Sc(s)數位簽名 解密。因而恢復SC(s)摘要。PB SENDER意指該傳 送者的公共金鑰。 接收者利用該傳送者用來計算Sc(s)摘要的同一雜 亂决算法來執行所接收的内容摘要及加密的金鑰 摘要之序連。 接收者將所計算的SC(s)摘要與自該傳送者數位簽 名恢復的SC(s)摘要比較。如果兩者相同,則接收 者確認所接收的摘要並未被變更,並繼續進行解 密程序。如果兩者不同,則接收者捨棄該叱⑷, 並通知該傳送者。 接收者利用步驟411中所用的相同雜亂演算法執 行加密的對稱金鑰,以便計算對稱金鑰摘要。 接收者將所計算的對稱金鑰摘要與該sc(s)中接收 的對稱金鑰摘要比較。如果兩者相同,則接收者 =通加⑥、的對稱金鑰並未被改變。接收者繼續進 丁解在私序。如果兩者不同,則接收者捨棄該 SC(s),並通知該傳送者。 接收者利用步驟川中所用的相同雜亂演算法執 仃加密的内容,以便計算内容摘要。 〇Λ85\85156 分割.〇〇< -41 - 1255443 416接收者將所計算的内容摘要與該sc⑷中接收的内 容摘要比較。如果兩者相同,則接收者知道加密 的内容並未被改變。接收者繼續進行解密程序。 如果兩者不同’則接收者捨棄該Sc(s),並通知該 傳送者。 接收者利用。亥接收者的秘密金瑜將該加密的對稱 至噙解山因而恢復該對稱金鑰。pv RECPNT意 指該接收者的秘密金鑰。 418 #收者利用對稱金鑰將加密的内容解密,因而恢 復該内容。 ΙΠ·安全數位内容電子式配送系統流程 安全數位内容電子式配送系統⑽包含該系統的不同參 與者所使用的數個組成部分。這些參與者包括内容提供者 1〇卜電子數位内容商店103、經由最終使用者裝置1〇9的最 終使用者、及清算所1〇5。一高階系統流程係用來作為安全 數位内容電子式配送系統100的一概觀。當内容流經系統 100時,下文所概述的該流程追蹤該内容。此外,該流程概 述各參與者使用的步騾,以便進行購買交易,因而將内容 113解密及使用。系統流程所作的某些假設包括: 這是用於一數位内容服務的系統流程(一個人電腦的點 對點介面)。 内容提供者101以PCM未壓縮格式(以音樂音訊舉例)傳 送音訊數位内客。 内容提供者101在一符合ODBC的資料庫中設有中介資 O:\85\85156 分割.DOC -42· 1255443 料,或内容提供者1〇1將資料直接輸入内容資訊處理子系 統,或將以規定的ASCII檔案格式提供資料。 電子數位内容商店執行金融結算。 内容113係放在一單一代管内容網站ηι。 熟悉本Η技術者當可了解,可改變這些假設,以便適應 诸如曰木視詋、及程式等數位内容、以及電子式配送系 統廣播的精確本質。 下列流程係示於圖1。 步騾 程序 121 内今楗供者101提供一未壓縮的PCM音訊檔作為 内容113。將該音訊檔的檔案名稱連同内容提供者 101的内客113之特有識別碼輸入工作流程管理程 式 1 5 4 〇 122 内谷資訊處理子系統利用内容提供者101的内容 113<特有識別碼、及資料庫映射樣板所提供的資 訊,而自内容提供者的資料庫160獲得中介資料。 123内容提供者101在整個取得及準備程序中,利用工 作泥程管理工具程式154來指引内容流程。 124將内容113的使用條件輸入内容資訊處理子系 、充且可以人工或自動方式執行上述步驟。該資 料包括拷貝限制規則、及需要的任何其他的業務 規則。所有的中介資料輸入可以與資料的音訊處 理同時發生。 125利用浮水印工具程式將資料隱藏在内容U3中,而Microsoft reported the results of the encryption performance standard checker in its introduction to the CryptoAPI file. An application using Microsoft's CryptoAPI on a PC with a Pentium 120 megahertz CPU and Windows NT 4.0 operating system yielded the following results. _ In the Secure Digital Content Electronic Distribution System 100, each symmetric key and other small data fragments are encrypted using a public key. The public key algorithm uses two gold bars. These two gold losses are mathematically related, so data encrypted with one key can be decrypted with another key. The owner of the key will keep a key secret (private key) and publicly distribute it to the second Jin Yu (public key). To ensure the security of a confidential message that utilizes a public key algorithm, the recipient's public key must be used to encrypt the message. Only recipients with associated secret keys can decrypt the message. Also use the public O:\85\85156 to split the .D0C -35- 1255443 Golden Wheel > Fuss method to generate a digital signature. Secret Jin Yu is used for this purpose. The next section will provide information about digital signatures. The most common public key algorithm is the RSA public key cipher. The RSA public key cipher has become the de facto standard for public keys in the industry. Other algorithms that are also very useful in encryption and digital signatures include ElGamal and Rabin. RS A is a variable with a variable key length. Symmetric keying algorithms are much faster than public keying algorithms. In software, the speed of DES is roughly at least 100 times that of RSA. Therefore, rsa is not used to encrypt large amounts of data. RSA Data Security Report On a machine using a 90 megahertz Pentium CPU, the RSA Data Security Utility Kit B SAFE 3.0 has the following generations in secret key operations (encryption or decryption using secret keys) Rate: 216 kilobits per second at 512-bit modulus and 7.4 kilobits per second at 1024-bit modulus. C. Digital Signature In the Shiwang Digital Valley Electronic Distribution System, the issuer of SC(s) is digitally signed on the SC(s) to protect the integrity of sC(s). In general, in order to generate a digital signature for a message, a message owner first calculates a message digest (described below) and then encrypts the message digest using the owner's secret key. The message is delivered along with its signature. Any recipient of the message may first decrypt the signature using the public key of the owner of the message to recover the message digest and verify the digital signature. The recipient then calculates a summary of the received message and compares the summary to the recovered summary. If the message has not been changed during the delivery process, the calculated summary must be the same as the recovered summary. O:\85\85156 Split.DOC -36- 1255443 In the secure digital content electronic distribution system 100, since Sc(s) contains several data parts, a summary is calculated for each part, and A summary of the summary is calculated. The summary is encrypted using the secret of the sender of the Sc(s). The encrypted summary summary is the sender's SC(s) digital signature. Each part summary and the digital signature are included in the ontology of SC(s). The recipient of sc(s) verifies the integrity of the SC(s) and its components using the received digital signature and the summary of the score. A message summary is computed using a one-way hash algorithm. A hash algorithm takes a variable length input message and converts the input message into a fixed length string, i.e., a message digest. A one-way hash algorithm operates in only one direction. That is, it is easy to calculate a summary of an input message, but it is very difficult (calculatingly infeasible) to generate a good interest from its abstract. Because of the nature of the scramble function, we can treat a message digest as the fingerprint of the message. The most common one-way mess function is MD5 from RS A data security and SHA designed by the National Institute of Technology and Standards (NITS). D. Digital Certificate A digital certificate is used to prove or verify the identity of a person or entity that has transmitted a digitally signed message. A certificate is a digital file issued by a certificate authority (certificati〇n auth〇rity) that combines a public key with a person or entity. The certificate includes the public key, the name of the person or entity, the due date, the name of the certificate authority, and other information. The certificate also contains the digital signature of the certificate authority. O:\85\85 丨56 Division.D0C -37- 1255443 When an entity (or person) transmits a message signed with its public key accompanied by its digital certificate, the recipient of the message uses the certificate from The entity name of the book determines whether or not to accept the message. In the secure digital content electronic distribution system 100, each SC(s) other than that issued by the end user device 109 contains a certificate of the producer of the SC(s). Since many end users do not need to obtain a certificate or hold a certificate issued by a non-authentic certificate authority, the end user device 109 does not need to include the certificate in its SC(s). In the secure digital content electronic distribution system 100, the clearinghouse 105 may elect to issue a certificate to the electronic digital content store 103. Thus, the end user device 109 can be independently verified that the secure digital content electronic distribution system 100 has authorized the electronic digital content store 103. E. SC(s) Graphical Representation Guide This document uses diagrams to represent SC(s) graphically, showing the encrypted portion, the non-encrypted portion, the encrypted key, and the certificate. Referring now to Figure 2, an illustration of an example of SC(s) 200 is shown. The following symbols are for the illustration of SC(s). The key 201 is a public key or a secret key. The perforation of the key such as the clearing house CLRNGH indicates the owner of the key. The PB in the key indicates that the key is a public key, and thus the key 201 is a public key of a clearing house. The PV in the key indicates that the key is a secret key. The diamond is an end user digital signature 202. The first word indicates that the secret key is used to generate the signature, and thus the EU indicates the digital signature of the end user as shown in the following table. A symmetric key 203 is used to encrypt the content. An encrypted symmetric keying element 204 contains a symmetric key 203 encrypted with a CLBGH PB. Rectangular O:\85\85156 Split.DOC -38- 1255443 The key at the top of the shape is the key used to encrypt the object. The symbol or text # within the rectangle indicates that the encrypted object (in this case, a symmetric gold residue) solidly shows another gold-added object, which in this example is a cross-identification code-encrypted object 205 . The conditions for the use of content authorization management are 〇6, which will be explained below. The SC(S) 200 includes a number of usage conditions 2〇6 signed by a final user digital signature 202, a transaction identifier encryption object, an application identification code encryption object 207, and an encrypted symmetric key object 2〇4.广 has 出 用来 用来 识别 识别 识别 识别 识别 识别 识别 识别 识别 识别 识别 用来 用来 识别 用来 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ CH Clearing House 105 CA Certification Center (not shown) F. — Secure Container Object Encryption Example The following table and figure provide an overview of the encryption and decryption procedures used to generate information and obtain information from Sc(s). The SC(4) generated and decrypted in the program overview is a general SC(s). The SC(s) does not represent any special SSC(s) type used for rights management in secure digital content distribution systems. The program includes the steps shown in Figure 3 for the encryption procedure. The flow of the encryption program shown in Figure 3 Step 3 Program The sender generates a random symmetric key and uses the symmetric Jin Yu O:\85\85156 to split the DOC -39· 1255443 to encrypt the content. 3 02 The sender uses a messy algorithm to execute the encrypted content in order to generate a content summary. 303 The sender encrypts the symmetric key using the recipient's public key. PB RECPNT means the public key of the recipient. The 304 transmitter performs the encrypted symmetric key using the same hash algorithm used by step 302 to generate a symmetric key digest. 3 05 The sender performs the sequence of the content summary and the symmetric key digest using the same hash algorithm used in step 302 to generate the SC(s) digest. 3 06 The sender encrypts the SC(s) digest with the sender's secret key to generate the digital signature of the SC(s). Pv SENDER means the sender's secret gold loss. The 307B sender generates an SC(s) file containing the encrypted content, the encrypted symmetric key, the content digest, the symmetric key digest, the sender's certificate, and the SC(s) signature. The 307A transmitter must obtain a certificate from a certification center before starting a secure communication. The certificate authority includes the sender's public key and the sender's name in the certificate, and the brigade signs the certificate. PV CAUTHR means the secret key of the certificate authority. The transmitter transmits the SC(s) to the recipient. Flow of the decryption program shown in Fig. 4 Procedure 408 The receiver receives the SC(s) and prepares its components. O:\85\85156 Split.DOC -40- 1255443 409 410 411 412 413 414 415 The recipient uses the public key of the certificate authority to decrypt the digital signature in the sender's certificate and verify the digital signature. If the digital signature of the certificate is valid, the recipient obtains the sender's public key from the certificate. The recipient decrypts the Sc(s) digit signature using the sender's public key. Thus the SC(s) summary is restored. PB SENDER means the public key of the sender. The receiver performs the sequence of the received content digest and the encrypted key digest using the same hash algorithm used by the transmitter to calculate the Sc(s) digest. The recipient compares the calculated SC(s) digest with the SC(s) digest recovered from the sender's digital signature. If the two are the same, the recipient confirms that the received digest has not been altered and continues the decryption process. If the two are different, the recipient discards the 叱 (4) and notifies the sender. The recipient performs the encrypted symmetric key using the same hash algorithm used in step 411 to calculate the symmetric key digest. The recipient compares the calculated symmetric key digest with the symmetric key digest received in the sc(s). If the two are the same, the symmetry key of the recipient = plus 6, is not changed. The receiver continues to enter the private order. If the two are different, the recipient discards the SC(s) and notifies the sender. The recipient uses the same hash algorithm used in the process to execute the encrypted content in order to calculate the content summary. 〇Λ85\85156 Split.〇〇< -41 - 1255443 416 The recipient compares the calculated content summary with the content summary received in the sc(4). If the two are the same, the recipient knows that the encrypted content has not been changed. The recipient continues the decryption process. If the two are different, the recipient discards the Sc(s) and notifies the sender. Used by the recipient. The secret of Jin Hai’s recipient, Jin Yu, reconciles the encryption to the mountain and thus restores the symmetric key. Pv RECPNT means the recipient's secret key. 418 #收者 decrypts the encrypted content using a symmetric key, thus restoring the content. ΙΠ·Safe Digital Content Electronic Distribution System Process The secure digital content electronic distribution system (10) contains several components used by different participants of the system. These participants include a content provider 1 electronic digital content store 103, an end user via the end user device 1〇9, and a clearing house 1〇5. A high level system flow is used as an overview of the secure digital content electronic distribution system 100. As the content flows through system 100, the process outlined below tracks the content. In addition, the process outlines the steps used by each participant to make a purchase transaction, thereby decrypting and using the content 113. Some of the assumptions made by the system flow include: This is the system flow for a digital content service (a peer-to-peer interface for a human computer). The content provider 101 transmits the audio digital guest in a PCM uncompressed format (exemplified by music audio). The content provider 101 has an intermediary resource O:\85\85156 splitting .DOC -42· 1255443 in an ODBC-compliant database, or the content provider 1〇1 directly inputs the data into the content information processing subsystem, or Provide information in the specified ASCII file format. The electronic digital content store performs financial settlement. Content 113 is placed on a single hosted content website ηι. Those skilled in the art will appreciate that these assumptions can be changed to accommodate the precise nature of digital content such as 曰木詋, and programs, as well as electronic distribution system broadcasts. The following process is shown in Figure 1. Step 121 Procedure 121 The present donor 101 provides an uncompressed PCM audio file as the content 113. Entering the file name of the audio file together with the unique identification code of the internal user 113 of the content provider 101 into the workflow management program 1 5 4 〇 122 The inner valley information processing subsystem utilizes the content 113 of the content provider 101 < unique identification code, and The database maps the information provided by the template, and the media data is obtained from the content provider's database 160. The content provider 101 utilizes the work mud management tool program 154 to guide the content flow throughout the acquisition and preparation process. The content of the content 113 is input to the content information processing subsystem, and the above steps can be performed manually or automatically. This information includes copy restriction rules and any other business rules that are required. All media data entry can occur simultaneously with the audio processing of the data. 125 use the watermark tool to hide the data in the content U3, and
O:\85\85 丨 56 分割.DOC -43- 1255443 内容提供者101必須以該浮水印工具程式來識別 m内容。不論内容來自何處(此例為内容提供者 101),也不論内容提供者101指定的任何其他資 訊’都可包含浮水印資料。 内各處理工具程式125針對所支援的不同壓 縮等級,而執行内容丨13需要的等化、動態範 園調整、及重新抽樣。 利用内容處理工具程式125將内容113壓縮成 所搞的壓縮層級。然後可播放内容1 1 3,以便 驗燈該壓縮產生了所需的内容1 1 3品質等 級。在必要時,可視需要而多次執行等化、 動態範圍調整、壓縮、及播放品質檢查。 sc包封工具程式利用一對稱金鑰將内容113 及一部分的中介資料加密。該工具程式然後 利用清算所1 〇5的公共金鑰將該金鑰加密,以 便產生一加密的對稱金鑰。在不包含内容113 的安全性資料的情形下,可將該金鑰傳送到 任何場所,這是因為可將該金鑰解密的唯一 實體即是清算所105。 126 SC包封工具程式丨52然後將加密的對稱金鑰、中介 資料、及與内容113有關的其他資訊包封在一中介 資料SC中。 127 然後將加密的内容113及中介資料包封到一内容 Sc。此時%成了對内容1丨3及中介資料的處理。O:\85\85 丨 56 Split.DOC -43- 1255443 The content provider 101 must use the watermarking tool program to identify the m content. The watermark data may be included regardless of where the content comes from (in this case, the content provider 101), and regardless of any other information specified by the content provider 101. Each processing tool program 125 performs equalization, dynamic range adjustment, and resampling required by the content 丨13 for the different compression levels supported. Content 113 is compressed by the content processing utility 125 into the level of compression performed. The content 1 1 3 can then be played to verify that the compression produces the desired content 1 1 3 quality level. When necessary, equalization, dynamic range adjustment, compression, and playback quality check can be performed as many times as needed. The sc encapsulation utility encrypts the content 113 and a portion of the mediation data using a symmetric key. The utility then encrypts the key using the public key of the clearinghouse 1 〇 5 to produce an encrypted symmetric key. In the case of security material that does not contain content 113, the key can be transferred to any location because the only entity that can decrypt the key is clearing house 105. The 126 SC Encapsulation Tool 丨52 then encapsulates the encrypted symmetric key, mediation data, and other information related to the content 113 in an intermediary material SC. 127 Then encapsulate the encrypted content 113 and the mediation data into a content Sc. At this time, % became the processing of the content 1丨3 and the intermediary materials.
ο:、85'8⑽分割.D0C -44 - 1255443 128 129 130 131 132 133 134 135 然後利用内容傳播工具程式(圖中未示出)將中介 資料SC(s)傳送到内容促銷網站156。 内容傳播工具程式將内容SC(s)傳送到代管内容網 站111。該代管内容網站可設於内容提供者1〇1、 清算所105、或代管内容網站專用的一特殊場所。 該網站的網址是被加入中介資料sc的中介資料。 内容促銷網站156將加入系統1〇〇的新内容113通 知電子數位内容商店1 03。 私子數位内容商店1 〇3然後利用内容取得工具程 式下載對應於其想要銷售的内容丨丨3之中介資料 SCs。 電子數位内容商店1〇3將利用該内容取得工具程 式自中介資料SC(s)抽取其想要在其網站上促銷内 容113的任何資料。在必要時,存取該中介資料的 這些邵分可以是安全的且要收費的。 利用該内容取得工具程式輸入該電子數位内容商 店103專用的内容113使用條件。這些使用條件包 括在内容113的不同壓縮等級下之零售價格及拷 貝/播放限制。 sc包封工具程式將電子數位内容商店ι〇3專用的 使用條件及原始的中介資料SC(s)包封到一報價 SC。 在更新電子數位内容商店103之後,上網的最終使 用者即可購得内容11 3。ο:, 85'8 (10) split. D0C - 44 - 1255443 128 129 130 131 132 133 134 135 The mediation material SC(s) is then transferred to the content promotion website 156 using a content distribution tool program (not shown). The content distribution tool program transfers the content SC(s) to the hosted content website 111. The escrow content website may be located in a special place dedicated to the content provider 1, the clearing house 105, or the escrow content website. The website's website address is the intermediary material that was added to the intermediary material sc. The content promotion website 156 will notify the electronic digital content store 103 of the new content 113 added to the system. The private digital content store 1 〇 3 then uses the content acquisition tool to download the intermediary material SCs corresponding to the content 丨丨 3 that it wants to sell. The electronic digital content store 1-3 will use the content acquisition tool to extract any material from the intermediary material SC(s) that it wishes to promote content 113 on its website. These Shaoxing points for accessing the mediation data can be secure and charged when necessary. The content acquisition tool program is used to input the content 113 usage conditions specific to the electronic digital content store 103. These usage conditions include retail price and copy/play restrictions at different levels of compression of content 113. The sc encapsulation tool program encapsulates the use condition of the electronic digital content store ι〇3 and the original intermediary material SC(s) into a quote SC. After updating the electronic digital content store 103, the final user of the Internet can purchase the content 113.
:\85\85!56 分割 D〇C -45- 1255443 136 ^ 一取終使用者找到其想要購買的内容113時,該 最終使用者點選一内容圖像,並將該内容項目加 入其購貨車中’而該購貨車是由電子數位内容商 店103所維護。當該最終使用者完成選購時,該最 終使用者將購買要求傳送到電子數位内容商店 1〇3以供處理。 137 電子數位内容商店丨03然後聯繫信用卡清算機 構,以便用其目前與信用卡清算機構往來的相同 方式要求持有該資金。 _ 138 一旦孩電子數位内容商店1〇3自信用卡清算機構 接收到傳回的信用卡授權號碼之後,該電子數位 内各商店103即將該號碼儲存在一資料庫,並利用 sc包封i具程式建立一 t易sc。該交易%包含該 最終使用者已購買的内容113之所有報價SCs、一 個可追蹤到該電子數位内容商店1〇3之交易識別 j、識別該最終使用者之資訊、壓縮等級、所講 買歌曲的使用條件及價格表。 费 139 140 然後將該交易SC傳送到最終使用者裝置1〇9。 當孩X易SC到達最終使用者裝置丨〇9時,該交易sc I動最終使用者播放應用程式i95,而該最終使用 者播放應用程式195則開啟該交易sc,並得知該最 終使用者的購買。最終使用者播放應用程式195然 後開啟個別的報價Scs,且在—替代實施例中可將 -估計下載時間通知該使用者。最終使用者播放:\85\85!56 Split D〇C -45- 1255443 136 ^ When the end user finds the content 113 he wants to purchase, the end user clicks on a content image and adds the content item to it. In the purchase of a truck, the truck is maintained by the electronic digital content store 103. When the end user completes the purchase, the end user transmits the purchase request to the electronic digital content store 1〇3 for processing. 137 The Electronic Digital Content Store 丨03 then contacts the credit card clearing authority to request the funds in the same manner as it currently does with the credit card clearinghouse. _ 138 Once the child's electronic digital content store receives a credit card authorization number from the credit card clearing institution, the store 103 in the electronic number stores the number in a database and creates the program using the sc package. A t easy to sc. The transaction % includes all the quotes SCs of the content 113 that the end user has purchased, a transaction identifier j that can be traced to the electronic number content store 3.1, information identifying the end user, the compression level, and the purchased songs. Terms of use and price list. The fee 139 140 then transmits the transaction SC to the end user device 1〇9. When the child X reaches the end user device ,9, the transaction sc moves the end user to play the application i95, and the end user play application 195 opens the transaction sc and knows the end user Purchase. The end user plays the application 195 and then opens the individual offer Scs, and in an alternative embodiment, the estimated download time can be notified to the user. End user play
〇:\85\85丨56 分割.D0C -46- 1255443 141 142 143 144 145 146 147 148 應用程式195然後要求該使用者指定其想要下載 内容1 1 3的時間。 最終使用者播放應用程式195將根據最終使用者 要求的下載時間而醒來,並建立一個包含内容丨13 的加法、對稱金鑰、交易識別碼、及最終使用者資 訊等資訊的訂單SC,而開始下載程序。 然後將該訂單SC傳送到清算所105以供處理。 清算所105接收到該訂單SC,開啟該訂單SC,並驗 證資料並未被篡改。清算所i 05確認該最終使用者 _ 購買的使用條件。這些使用條件必須符合内容提 供者101所規定的使用條件。然後將該資訊記錄在 一資料庫。 一旦完成了所有的檢查之後,利用清算所1〇5的秘 密金鑰將加密的對稱金鑰解密。然後利用該最終 使用者的公共金鑰將該對稱金鑰加密。然後利用 SC包封工具私式將該新的加密對稱金鑰包封到一 授權許可SC。 脅 然後將該授權許可SC傳送到該最終使用者。 當最終使用者裝置109接收到該授權許可80時,即 將該授權許可SC儲存在記憶體中,直到下載内容 SC為止。 最終使用者裝置1G9要求代管内容網站m傳送對 應於該授權許可SC的所購買内容113。 内客113被傳送到最終使用者裝置1G9。於接收到 O:\85\85156 分割.DOC -47- 1255443 内容113時,最終使用者裝置1〇9利用該對稱金鑰 將内容113解密。 IV.權利管理架構模型 A-架構層功能 圖5是安全數位内容電子式配送系統1〇〇的權利管理架 構之方塊圖。在架構上,有四層代表安全數位内容電子式 配运系統100 :授權許可控制層5(H、内容識別層5〇3、内容 使用控制層505、及内容格式化層5〇7。本節中將說明每一 層的整體功能目標、及每一層的個別主要功能。每一層的 功旎係完全獨亙於其他各層的功能。在廣義的限制之内, 可以類似的功能取代一層中之功能,而不會影響到其他層 的功能。一層的輸出顯然需要滿足相鄰層可接受的格式及 語意。 授權許可控制層501確保: 使數位内容於配送過程中不會受到非法攔截及篡改; 内容113係來自一合法的内容所有人,並經由一授權 配銷商(例如電子數位内容商店丨〇3)而配送; 數位内容購買者具有一經適當授權的應用程式; 在購買者或最終使用者取得内容丨丨3的一份拷貝之 说’该購買者先付款給該配銷商;以及 保留一份交易記錄以供回報之用。 内容識別層503可驗證著作權及内容購買者之身分。内 客的著作權資訊及内容購買者的身分可以對内容113的任 何經授權的或未經授權的拷貝進行來源追蹤。因此,内容〇:\85\85丨56 Split.D0C -46- 1255443 141 142 143 144 145 146 147 148 The application 195 then asks the user to specify the time he wants to download the content 1 1 3 . The end user playback application 195 will wake up based on the download time requested by the end user and create an order SC containing information such as the addition, symmetry key, transaction identifier, and end user information of the content ,13. Start downloading the program. The order SC is then transferred to the clearing house 105 for processing. The clearing house 105 receives the order SC, opens the order SC, and verifies that the data has not been tampered with. The clearing house i 05 confirms the end user _ purchase conditions of use. These conditions of use must conform to the conditions of use specified by Content Provider 101. The information is then recorded in a database. Once all the checks have been completed, the encrypted symmetric key is decrypted using the secret key of the clearinghouse 1-5. The symmetric key is then encrypted using the public key of the end user. The new encryption symmetric key is then privately encapsulated into a license SC using the SC encapsulation tool. The license then transmits the license SC to the end user. When the end user device 109 receives the license 80, the license SC is stored in the memory until the content SC is downloaded. The end user device 1G9 requests the hosted content website m to transmit the purchased content 113 corresponding to the license SC. The guest 113 is transmitted to the end user device 1G9. Upon receiving O:\85\85156 splitting .DOC -47 - 1255443 content 113, the end user device 1〇9 decrypts the content 113 using the symmetric key. IV. Rights Management Architecture Model A-Architecture Layer Function Figure 5 is a block diagram of the rights management architecture of the secure digital content electronic distribution system. Architecturally, there are four layers representing the secure digital content electronic distribution system 100: the license control layer 5 (H, the content identification layer 5〇3, the content usage control layer 505, and the content formatting layer 5〇7. In this section The overall functional objectives of each layer, as well as the individual main functions of each layer, will be explained. The function of each layer is completely independent of the functions of other layers. Within the broad limits, similar functions can be replaced by similar functions. It does not affect the functions of other layers. The output of one layer obviously needs to meet the acceptable format and semantics of the adjacent layer. The license control layer 501 ensures that the digital content is not illegally intercepted and tampered with during the delivery process; From a legitimate content owner and distributed via an authorized distributor (eg electronic digital content store 丨〇 3); digital content buyers have an appropriately authorized application; content is obtained at the purchaser or end user丨A copy of 丨3 says 'The buyer pays the distributor first; and keeps a transaction record for the return. Content identification layer 503 can verify the identity of the copyright and content purchaser. The copyright information of the guest and the identity of the content purchaser can track the source of any authorized or unauthorized copy of the content 113. Therefore, the content
O:\85\85156 分割.DOC 1255443 識別層503提供了一種對抗盜版之方式。 内谷使用控制層505確保内容113的拷貝係根據商店使 用釭件519而用於購買者的裝置。商店使用條件519可指定 内各113被4許的播放及本機拷貝次數,並可指定是否可將 内容113記錄到一外部可攜式裝置。内容使用控制層505中 之功能追蹤内容的拷貝/播放使用,並更新拷貝/播放狀態。 内容格式化層507可讓内容113的格式自内容所有人的 設施中之原生表示法轉換成一種與安全數位内容電子式配 运系統100的服務特殊功能及配送裝置一致的形式。該轉換 處理可包括壓縮編碼及其相關聯的預先處理,例如頻率等 2及振幅動態範圍調整。對於是音訊的内容113而言,在購 買者端上,也需要處理所接收的内容113,以便得到一種適 於播放的格式,或傳輸到一可攜式裝置。 B·功能分割及流程 權利f理架構模式係示於圖5,且該圖示出將各架構層 對映到構成安全數位内纟電子式配送系統1〇〇的各工作: 成邵分、及每一層中的重要功能。 1·内容格式化層507 人内各格式化層507相關聯的一般性功能是在内容提供 者101上的内容預先處理502及壓縮511、以及最終使用者裝 置109上的内容解碼513及解壓縮515。預先處理的需要及特 定功能之例子係如前文所述。利用内容壓縮511來減少内容 Π3的檔案大小及其傳輸時間。適用於内容ιΐ3類型的任何 壓縮演算法及傳輸媒體可用於安全數位内容電子式配送系O:\85\85156 Split. DOC 1255443 The recognition layer 503 provides a way to combat piracy. The inner valley usage control layer 505 ensures that the copy of the content 113 is for the purchaser's device in accordance with the store usage component 519. The store usage condition 519 can specify the number of playbacks and local copy times for each 113, and can specify whether the content 113 can be recorded to an external portable device. The content in the content control layer 505 tracks the copy/play use of the content and updates the copy/play status. The content formatting layer 507 can convert the format of the content 113 from the native representation in the content owner's facility to a form consistent with the service specific functions and delivery devices of the secure digital content electronic distribution system 100. The conversion process can include compression coding and its associated pre-processing, such as frequency 2 and amplitude dynamic range adjustment. For the content 113 that is audio, on the purchaser side, the received content 113 also needs to be processed in order to obtain a format suitable for playback or to be transmitted to a portable device. B. Function partitioning and flow rights structure mode is shown in FIG. 5, and the figure shows the mapping of each architecture layer to the electronic distribution system 1构成 which constitutes a secure digital number: Cheng Shaofen, and Important features in each layer. 1. Content Formatting Layer 507 The general functions associated with each formatting layer 507 within a person are content pre-processing 502 and compression 511 on content provider 101, and content decoding 513 and decompression on end user device 109. 515. Examples of pre-processed needs and specific functions are as described above. The content compression 511 is used to reduce the file size of the content Π3 and its transmission time. Any compression algorithm and transmission medium suitable for the content ιΐ3 type can be used for secure digital content electronic distribution system
O:\85\85156 分割.DOC -49- 1255443 統100。對於音樂而言,MPEG 1/2/4、Dolby AC-2及 AC-3、Sony適應性變換碼(Adaptive Transform Coding ;簡 稱ATRAC)、及低位元傳輸速率演算法是某些一般使用的 壓縮演算法。係以壓縮形式將内容n 3儲存在最終使用者裝 置109 ’以便減少儲存容量的要求。於實際播放時將内容j J 3 解壓縮。易於實際播放時執行解碼。於後文中討論到内容 使用控制層505時將說明編碼之目的及類型。 2·内容使用控制層505 内容使用控制層505容許對最終使用者裝置i 〇9上的内 容113使用所施加的條件或限制進行規範及強制執行。這些 條件可規定内容113被容許的播放次數、是否容許内容ιΐ3 的後續拷貝、後續拷貝的次數、以及是否可將内容ιΐ3拷貝 到外邛可祆式裝置。内容提供者丨〇丨設定容許的使用條件 517,並將該使用條件517以一 %的形式(請參閲討論授權 許可控制層5〇1的該節)傳送到電子數位内容商店ι〇3。電子 數位内容商店1G3可增添或縮小使用條件517,只要該使用 條件川不使内容提供者⑻所設定的原始條件失效即可。 電子數位内容商店⑻然後將(一㈣)所有的商店使用條 件519傳相i終使用者裝置⑽及清算所⑼。清算所⑻ 在授權將内容113釋出到最終使用者裝置⑽ 使用條件確認521。 先*執订 用者裝置109中之内容使用控制層5〇5執行内容 使用“件517的強制執行。首先,於接收到内容η 最終使用者裝置1〇9中之内容拷/、時, 内合4別層503以—個代表起始拷O:\85\85156 Split.DOC -49- 1255443 System 100. For music, MPEG 1/2/4, Dolby AC-2 and AC-3, Sony Adaptive Transform Coding (ATRAC), and low bit rate algorithm are some commonly used compression calculus. law. The content n 3 is stored in a compressed form in the end user device 109' in order to reduce the storage capacity requirement. The content j J 3 is decompressed during actual playback. It is easy to perform decoding when actually playing. The contents and types of encoding will be explained when the control layer 505 is used. 2. Content Usage Control Layer 505 The content usage control layer 505 allows specification and enforcement of the applied conditions or restrictions on the content 113 on the end user device i 〇9. These conditions may dictate the number of times the content 113 is allowed to be played, whether the subsequent copy of the content ι 3 is allowed, the number of subsequent copies, and whether the content ι 3 can be copied to the external device. The content provider sets the allowable use condition 517 and transmits the use condition 517 in the form of a % (see the section discussing the license control layer 5〇1) to the electronic digital content store ι〇3. The electronic digital content store 1G3 can add or reduce the use condition 517 as long as the use condition does not invalidate the original condition set by the content provider (8). The electronic digital content store (8) then passes (one (four)) all of the store usage conditions 519 to the end user device (10) and the clearing house (9). The clearing house (8) authorizes the release of the content 113 to the end user device (10) use condition confirmation 521. First, the content use control layer 5〇5 in the user device 109 executes the content use “enforcement of the piece 517. First, when the content η is returned to the end user device 1〇9, 4 layers 503 with a representative start copy
O:\85\85156 分割.D0C -50- 1255443 貝/播放許可的拷貝/播放碼523標示該内容1 1 3。播放應用 程式195然後在將该内容113儲存在最終使用者裝置1〇9之 前,先以密碼方式將内容113編碼。播放應用程式195為每 内各項目產生一編碼金鑰,並將該金餘加密,且將該金 鑰隱藏在最終使用者裝置丨〇9中。然後每當最終使用者裝置 109存取内容1 13以便進行拷貝或播放時,最終使用者裝置 109在容許將内容113解碼並執行播放或拷貝之前,先驗證 該拷貝/播放碼。最終使用者裝置1〇9也適當地更新内容n3 的原始拷貝中的任何新後續拷貝中的拷貝/播放碼。係在已 被壓縮的内容113上執行拷貝/播放編碼。亦即,在嵌入該 拷貝/播放碼之前,無須先將内容1丨3解壓縮。 最終使用者裝置109使用一授權許可浮水印527將該拷 貝/播放碼嵌入内容113内。只有可識別嵌入演算法及相關 聯編碼金鑰的最終使用者播放應用程式195可讀取或修改 所嵌入的資料。閱聽人無法看到或無法聽到該資料;亦即, ^亥貝料並未對内谷113之品質造成可感知的降低。自浮水印 經歷過内容處理、資料壓縮、數位至類比及類比至數位轉 換、及正常内容處理所導入的信號品質降低的數個步驟以 來’浮水印仍然以其中包括類比表示法的任何表示形式而 保留在内容113中。在一替代實施例中,並不使用一授權許 可浮水印527將該拷貝/播放碼嵌入内容113内,最終使用者 播放應用程式195反而使用安全儲存的使用條件5丨9。 3 ·内各識別層5 〇 3 作為内容識別層503的一部分,内容提供者1 〇 1也使用一O:\85\85156 Split.D0C -50- 1255443 The copy/playback code 523 of the Bay/Playback License indicates the content 1 1 3. The playback application 195 then encodes the content 113 in a cryptographic manner prior to storing the content 113 in the end user device 1〇9. The play application 195 generates a code key for each item, encrypts the key, and hides the key in the end user device 丨〇9. Then, whenever the end user device 109 accesses the content 1 13 for copying or playback, the end user device 109 verifies the copy/play code before allowing the content 113 to be decoded and performing playback or copying. The end user device 1〇9 also appropriately updates the copy/play code in any new subsequent copies in the original copy of the content n3. The copy/play encoding is performed on the already compressed content 113. That is, it is not necessary to first decompress the content 1丨3 before embedding the copy/play code. The end user device 109 embeds the copy/play code in the content 113 using a license watermark 527. Only the end user playback application 195, which recognizes the embedded algorithm and associated coded key, can read or modify the embedded data. The reader cannot see or hear the information; that is, the haibei material does not cause a perceptible decrease in the quality of the inner valley 113. Since the watermarking has undergone several steps of content processing, data compression, digital to analog and analog to digital conversion, and reduced signal quality introduced by normal content processing, 'the watermark is still in any representation including analogy. Reserved in content 113. In an alternate embodiment, the copy/play code is not embedded in the content 113 using an authorization license watermark 527, and the end user playback application 195 instead uses the secure storage usage condition 5丨9. 3 · Each identification layer 5 〇 3 is part of the content recognition layer 503, and the content provider 1 〇 1 also uses one
O:\85\85156 分割.DOC -51 - 1255443 授權許可浮水印527將諸如内容識別碼、内容所有人、及並 他資訊(例如出版日期及地理配送區)等的資料嵌入内容 in中。本發明切該浮水印稱為著作權浮水印μ9。於接 ,到時:最終使用者裝置1G9將内容ιΐ3的拷貝加上内容講 .、者名稱及人易識別碼535(請參閱下文中之授權許可控制 =5〇1該節)及諸如授權許可日期及使用條件517等的其他 孚水印。在本發明終將該浮水印稱為授權許可浮水 印。經過授權或未經授權取得的且經過可保有内容品質的 音訊處理之任何内容113拷貝都載有著作權浮水印及授權 許可浮水印。内容識別層503可嚇阻盜版。 4.授權許可控制層5(Π 授權許可控制層501使内容丨13不會受到未經授權的攔 截,並確保只以個別的方式將内容釋出給一個具有經適當 授權的最終使用者裝置1 〇9且與一經授權的電子數位内容 商店103完成一授權許可購買交易之最終使用者。授權許可 控制層501以雙重加密53丨保護内容〗丨3。係利用一個内容提 供者1〇1產生的加密對稱金鑰將内容n3加密,且係利用清 算所的公共金鑰621將該對稱金鑰加密。只有清算所丨〇5可 在開始時恢復該對稱金鑰。 授權許可控制係將清算所105設計成“受託方,,。在授與授 權許可要求537的許可(亦即將内容113的對稱金鑰623釋出 給最終使用者裝置109)之前,清算所105先驗證:交易541 及授權許可543已完成且為可信的;電子數位内容商店1〇3 已自安全數位内容電子式配送系統i 〇〇取得銷售電子内容 O:\85\85I56 分割.DOC -52- 1255443 11 3的拍:權,以及最終使用者繼而一經適當授權的應用程 式。稽核/回報545可產生報告,並與安全數位内容電子式 配运系統1〇〇中經授權的其他各方分享授權許可交易資訊。 係利用SC處理533實施授權許可控制。利用sc(s)將加密 的内各113及資訊配送給各系統作業組成部分(下文中將述 及與SC(s)詳細結構有關的更多資訊)。%是一種使用密碼 的資訊載體,該資訊載體使用密碼加密、數位簽名、及數 位證明書,使電子資訊及内容丨13不會受到未經授權的攔截 及修改。SC亦可對電子資料進行可信賴性的驗證。 杈權許可控制要求内容提供者1〇1、電子數位内容商店 103、及清算所105具有自用來鑑定這些組成部分的有聲譽 忍證中心所發出之真實加密數位證明書。最終使用者裝置 109並不需要具有數位證明書。 c ·内容配送及授權許可控制 圖6疋内谷配送及授權許可控制於應用於圖5所示授權 許可控制層時的一概觀之方塊圖。該圖示出電子數位内容 商店103、最終使用者裝置1〇9、及清算所1〇5係經由網際網 路而互連且在這些組成部分之間使用單向(點對點)傳輸之 情形。内答提供者1〇1與電子數位内容商店1〇3間之通訊亦 可經由網際網路或其他網路。現在假設最終使用者裝置1〇9 與電子數位内容商店1()3間之内容購買商務交易係基於標 準的網際、’罔路王球貝訊網協定。作為全球資訊網型互動的 一邵分,最終使用者選擇所要購買的内容113,提供個人及 金融資訊,並同意購買的條件。電子數位内容商店ι〇3可利 ΟΛ85\85156 分割.DOC -53- 1255443 用諸如安全電子交易(SET)等的協定自一受讓機構取得付 款授扭。 圖6中也假設電子數位内容商店1 〇3根據標準全球資訊 網通訊協定而已將最終使用者播放應用程式1 95下載到一 取終使用者裝置1 09。該架構要求電子數位内容商店1们將 一特有的應用程式識別碼指定給下載的播放應用程式 195 ’並要求最終使用者裝置} 09儲存該識別碼,以供爾後 的應用程式授權許可驗證(請參閱下文)。 整體授權許可流程開始於内容提供者1 0 1。内容提供者 101利用一個在當地產生的加密對稱金鑰將内容113加密, 並利用清算所105的公共金鑰621將對稱金鑰623加密。在一 替代實施例中,並不在當地產生該對稱金鍮,而是將該對 稱金鑰自清算所105傳送到内容提供者101。内容提供者ι〇1 產生一個圍繞加密的内容113之内容sc(s) 630、一個圍繞 加密的對稱金鑰623之中介資料SC(s) 620、商店使用條件 5 19、以及與資訊相關聯的其他内容113。每一内容π 3物件 都有一個中介資料SC(s) 620及一個内容SC(s) 630。内容 113物件可以是同一首歌的一壓縮等級,或者内容n 3物件 可以是專輯上的每一首歌,或者内容U3物件可以是整張專 輯。對於每一内容113物件而言,中介資料sc(s) 620亦載 有與内容使用控制層505相關聯的商店使用條件5 19。 在步騾601中,内容提供者ιοί將中介資料sc(s) 620配送 到一個或多個電子數位内容商店丨03,並在步驟602中將内 容SC(s) 630配送到一個或多個代管内容網站。每一電子數 O:\85\85156 分割.DOC -54- 1255443 位内容商店103又產生一報價SC(s) 641。該報價SC(s) 641 通常包含與中介資料SC(s) 620相同的許多資訊,其中包括 内容提供者1 0 1的數位簽名624、及内容提供者1 〇 1的數位證 明書(圖中未示出)。如前文所述,電子數位内容商店1〇3可 增添或縮小内容提供者101開始時所指定的(由内容使用控 制層處理的)商店使用條件5 1 9。亦可選擇以内容提供者1 〇 1 的數位簽名624簽認内容SC(s) 630及(或)中介資料sc(s) 620 〇 在步驟603中完成了最終使用者裝置1〇9與電子數位内 谷商店103間的内容購買交易之後,電子數位内容商店j 〇3 在步驟604中產生一交易sc(s) 640,並將該交易sc(s) 640 傳送到最終使用者裝置109。該交易SC(s) 640包含一特有 乂易識別碼535、購買者的名稱(亦即最終使用者)(圖中未 不出)、最終使用者裝置109之公共金鑰66卜及與所購買的 内容113相關聯之報價Sc(s) 641。圖6所示之交易資料642 代表叉易識別碼535及最終使用者名稱(圖中未示出)。係利 用清算所105的公共金鑰621將交易資料642加密。亦可選擇 利用電子數位内容商店1〇3的一數位簽名643簽認交易SC(s) 640 ° 在步驟605中,於接收到交易SC(s) 640(及包含在交易 SC(s) 640之報價Sc(s) 641),在最終使用者裝置1〇9上執行 的取終使用者播放應用程式195利用一訂單SC(s) 650向清 异所1 〇5要求授權許可。訂單SC(s) 650包含:來自報價SC⑷ 641<加岔後對稱金鑰623及商店使用條件519、來自交易O:\85\85156 Split.DOC -51 - 1255443 The license watermark 527 embeds data such as content identifiers, content owners, and other information (such as publication date and geographic distribution area) into the content in. The watermark of the present invention is called a copyright watermark μ9. Upon receiving, the end user device 1G9 adds a copy of the content ιΐ3 to the content, the person's name and the person's easy identification code 535 (please refer to the license control=5〇1 section below) and such as a license. Other watermarks such as date and usage conditions 517. In the present invention, the watermark is finally referred to as a licensed floating watermark. A copy of any content 113 that has been authorized or obtained without authorization and that is capable of handling content-quality audio is provided with a copyright watermark and an authorized license watermark. The content recognition layer 503 can deter piracy. 4. License Control Layer 5 (Π License Control Layer 501 prevents content 丨 13 from being intercepted without authorization and ensures that content is only released in an individual manner to an appropriately authorized end user device 1 〇9 and the end user of an authorized purchase transaction with an authorized electronic digital content store 103. The license control layer 501 protects the content 丨3 with double encryption 53. It is generated by a content provider 1-1 The encrypted symmetric key encrypts the content n3 and encrypts the symmetric key using the clearing public key 621. Only the clearinghouse 5 can recover the symmetric key at the beginning. The license control system will clear the clearing house 105 Designed as a "trustee," the clearing house 105 first verifies: transaction 541 and authorization 543 prior to granting a license to license 537 (i.e., releasing symmetric key 623 of content 113 to end user device 109). Completed and trusted; electronic digital content store 1〇3 has obtained sales electronic content from secure digital content electronic distribution system i \O:\85\85I56 split.DOC -52- 1255 443 11 3: The right, and the end user and then the appropriately authorized application. The audit/return 545 can generate reports and share the authorization with other authorized parties in the secure digital content electronic distribution system. License transaction information. The license control is implemented by SC processing 533. The encrypted 113 and information are distributed to each system operation component by sc(s) (hereinafter, the details related to the detailed structure of SC(s) will be described. Multi-information).% is a kind of information carrier that uses a password. The information carrier uses password encryption, digital signature, and digital certificate to prevent unauthorized interception and modification of electronic information and content. SC can also The electronic data is verified for trustworthiness. The rights permit control requires that the content provider 1, the electronic digital content store 103, and the clearing house 105 have the real encrypted digits issued by the reputation-bearing center used to identify these components. Certificate. The end user device 109 does not need to have a digital certificate. c · Content distribution and licensing control Figure 6 Inner Valley Distribution and Authorization An overview of the block diagram when applied to the license control layer shown in Figure 5. The figure shows the electronic digital content store 103, the end user device 1〇9, and the clearing house 1〇5 via the Internet. While interconnecting and using one-way (peer-to-peer) transmission between these components, communication between the internal provider 1〇1 and the electronic digital content store 1〇3 can also be via the Internet or other networks. Assume that the end user device 1〇9 and the electronic digital content store 1()3 content purchase business transaction is based on the standard Internet, '罔路王球贝讯网 agreement. As a global information network type of interaction, The end user selects the content 113 to be purchased, provides personal and financial information, and agrees to the terms of the purchase. Electronic digital content store ι〇3 可利 ΟΛ85\85156 Split.DOC -53- 1255443 Get payment from a transferee with an agreement such as Secure Electronic Transaction (SET). Also in Figure 6, it is assumed that the electronic digital content store 1 下载 3 has downloaded the end user playback application 1 95 to a bottling user device 109 in accordance with the standard World Wide Web protocol. The architecture requires the electronic digital content store 1 to assign a unique application identifier to the downloaded playback application 195 'and request the end user device} 09 to store the identification code for subsequent application license verification (please See below). The overall licensing process begins with content provider 1 0 1. The content provider 101 encrypts the content 113 using a locally generated encrypted symmetric key and encrypts the symmetric key 623 using the public key 621 of the clearing house 105. In an alternate embodiment, the symmetric key is not generated locally, but the symmetrical key is transmitted from the clearinghouse 105 to the content provider 101. The content provider ι〇1 generates a content sc(s) 630 around the encrypted content 113, an intermediary material SC(s) 620 surrounding the encrypted symmetric key 623, store usage conditions 5 19, and associated with the information. Other content 113. Each content π 3 object has an intermediary material SC(s) 620 and a content SC(s) 630. The content 113 object may be a compression level of the same song, or the content n 3 object may be each song on the album, or the content U3 object may be an entire album. For each content 113 object, the intermediary material sc(s) 620 also contains store usage conditions 5 19 associated with the content usage control layer 505. In step 601, the content provider ιοί delivers the intermediary material sc(s) 620 to one or more electronic digital content stores 丨03, and delivers the content SC(s) 630 to one or more generations in step 602. Manage content sites. Each electronic number O:\85\85156 is split. The DOC-54- 1255443 bit content store 103 generates another offer SC(s) 641. The offer SC(s) 641 typically contains a lot of information identical to the intermediary material SC(s) 620, including the digital signature 624 of the content provider 1 0 1 and the digital certificate of the content provider 1 〇 1 (not shown) show). As described above, the electronic digital content store 1-3 can add or reduce the store use condition 5 1 9 (processed by the content use control layer) specified by the content provider 101 at the beginning. Alternatively, the content SC(s) 630 and/or the mediation material sc(s) 620 may be selected by the content provider 1 〇1 digital signature 624. The end user device 1〇9 and the electronic digit are completed in step 603. After the content purchase transaction between the inner store 103, the electronic digital content store j 〇 3 generates a transaction sc(s) 640 in step 604 and transmits the transaction sc(s) 640 to the end user device 109. The transaction SC(s) 640 includes a unique identification code 535, the name of the purchaser (ie, the end user) (not shown), the public key of the end user device 109, and the purchase Content 113 associated with the offer Sc(s) 641. The transaction data 642 shown in FIG. 6 represents the fork identification code 535 and the end user name (not shown). The transaction data 642 is encrypted using the public key 621 of the clearing house 105. Alternatively, the transaction SC(s) 640 ° may be selected using a digital signature 643 of the electronic digital content store 1-3. In step 605, the transaction SC(s) 640 is received (and included in the transaction SC(s) 640 The quotation Sc(s) 641), the END user play application 195 executed on the end user device 1 利用 9 requests authorization from the singularity 1 〇 5 using an order SC(s) 650. Order SC(s) 650 contains: from quote SC(4) 641<plus post-symmetric key 623 and store usage condition 519, from transaction
O:\85\85 ] 56 分割.DOC 1255443 SC(s) 640之加密後交易資料642、以及來自最終使用者裝 置109之加密後應用程式識別碼55ι。在另一實施例中,係 利用最終使用者裝置1〇9之一數位簽名652簽認訂單sc(s) 650 〇 自最終使用者裝置109接收到訂單SC(s) 650時,清算所 1〇5驗證下列事項: 1 ·電子數位内容商店103自安全數位内容電子式配送系統 1〇〇取得授權(存在於清算所105之資料庫16〇); 2_訂單SC(s) 650並未被變更; 3. X易資料642及對稱金鑰623是完整的及可信的; 4·最終使用者裝置109所購買的電子商店使用條件519與 内容提供者1 〇 1設定的使用條件5丨7 一致;以及 5·應用程式識別碼551具有一有效結構,且係由一經過授 權的電子數位内容商店1〇3提供該應用程式識別碼551。 如果該驗證是成功的,則在步驟6〇6中清算所1〇5將對稱 金鑰623及交易資料642解密,並建立授權許可Sc(s) 66(), 且將該授權許可SC(s) 660傳送到最終使用者裝置1〇9。該 杈權许可SC(s) 660載有對稱金鑰623及交易資料642,且係 利用取、、、;使用者裝置1 〇9的公共金鑰661將對稱金鑰623及 夂易貝料642加密。如果任何驗證並未成功,則清算所1 拒絕授權給最終使用者裝置丨〇9,並通知最終使用者裝置 109 m算所1 〇5亦互即將該驗證失敗的訊息通知電子數位 内容商店103。在一替代實施例中,清算所1〇5以其數位簽 名663簽認授權許可sc(s) 660。O:\85\85] 56 Split. DOC 1255443 SC(s) 640 encrypted transaction data 642, and encrypted application identifier 55ι from end user device 109. In another embodiment, the order sc(s) 650 is signed by the end user device 1 数 9 digital signature 652, and the clearing house is received when the order SC(s) 650 is received from the end user device 109. 5 Verify the following: 1 • The electronic digital content store 103 obtains authorization from the secure digital content electronic distribution system 1 (existing in the database of the clearing house 105 16); 2_order SC(s) 650 has not been changed 3. X Easy Data 642 and Symmetric Key 623 are complete and trusted; 4. The electronic store usage condition 519 purchased by the end user device 109 is consistent with the usage condition 5丨7 set by the content provider 1 〇1. And the application identifier 551 has an effective structure, and the application identification code 551 is provided by an authorized electronic digital content store 1-3. If the verification is successful, the clearinghouse 1〇5 decrypts the symmetric key 623 and the transaction data 642 in step 6〇6, and establishes a license Sc(s) 66(), and the license is SC(s) 660 is transmitted to the end user device 1〇9. The license authority SC(s) 660 carries the symmetric key 623 and the transaction data 642, and uses the public key 661 of the user device 1 〇9 to use the public key 661 and the symmetric key 623 and the 642. encryption. If any verification is unsuccessful, the clearinghouse 1 refuses to authorize the end user device 丨〇9, and notifies the end user device that the information is not immediately notified to the electronic digital content store 103. In an alternate embodiment, the clearinghouse 105 identifies the license sc(s) 660 with its digital signature 663.
O:\85\85156 分割.DOC -56- 1255443 在接收到授權許可SC(s) 660之後,最終使用者裝置1〇9 將先前自清算所105接收的對稱金鑰623及交易資料642解 密,並在步驟607中向一代管内容網站lu要求内容Sc(s) 630。在步驟608中内容Sc(s) 63〇到達時,最終使用者裝置 109在步驟609中利用對稱金鑰623將内容113解密,並將内 容113及交易資料642傳送到其他層,以便進行前文中參照 圖5所述的授權許可浮水印嵌入、拷貝/播放編碼、亂序編 碼、及進一步的内容1丨3處理。 最後,在步騾610中,清算所1〇5定期將總結交易報告傳 送到内容提供者101及電子數位内容商店1〇3,以供稽核及 追蹤之用。 V·安全容器物件結構 A·—般性結構 安全容器物件(SC)是一種包含數個組成部分之結構,這 些組成部分合而界定了一個單位的内容113、或一交易的一 部分,這些組成部分也界定了諸如使用條件、中介資料、 及加密方法等相關資訊。SC(s)被設計成使資訊的完整性、 完成性、及可信賴性可以被驗證。可將SC(s)中的某些資訊 加密,因而只有在取得適當的授權之後,才可存取這些資 訊。 SC(s)包含至少一個材料表(Bin 〇f Materials ;簡稱bqm) 組成部分,該組成部分具有與SC(s)有關的資訊記錄、及與 SC(s)中包含的每一組成部分有關的資訊記錄。針對每一組 成部分,利用諸如MD-5等的一雜亂演算法計算一訊息摘 ΟΛ85\85156 分割.D0C -57- 1255443 要’然後將該訊息摘要包含在該組成部分的BOM記錄中。 將該等組成部分的摘要序連在一起,且利用這些摘要計算 另一摘要,然後利用產生該SC(s)的實體的秘密金鑰將該另 一摘要加密,以便產生一數位簽名。接收該8(:(3)的各方可 利用該數位簽名來驗證所有的摘要,並因而確認該Sc(s) 及所有該SC(s)的各組成部分之完整性及完成性。 可包含下列資訊作為B〇M中之記錄及每一組成部分之 記錄。SC(s)類型決定需要包含哪些記錄: SC(s)版本 SC(s)識別碼 SC⑷類型(例如報價、訂單、交易、内容、中介資料 或促銷、及授權許可) SC(s)的發行人 產生SC(s)的日期 SC(s)的到期曰 清算所的網址 分的摘要演算法之描述(系統預 用於所包含各組成部 設為MD-5) 的演异法之描述(系統預設為RSA)O:\85\85156 Split.DOC -56- 1255443 After receiving the license SC(s) 660, the end user device 1〇9 decrypts the symmetric key 623 and the transaction data 642 previously received from the clearinghouse 105. And in step 607, the content Sc(s) 630 is requested to a generation of content website lu. Upon arrival of the content Sc(s) 63 in step 608, the end user device 109 decrypts the content 113 using the symmetric key 623 in step 609 and transmits the content 113 and the transaction data 642 to the other layers for proceeding. The license watermark embedding, copy/play encoding, out-of-order encoding, and further content processing are described with reference to FIG. Finally, in step 610, the clearinghouse 1-5 periodically transmits the summary transaction report to the content provider 101 and the electronic digital content store 1-3 for auditing and tracking purposes. V·Safety Container Object Structure A·General Structure Safety Container Object (SC) is a structure consisting of several components that together define a unit of content 113, or a part of a transaction, these components Information such as usage conditions, intermediary data, and encryption methods are also defined. SC(s) is designed to enable the integrity, completeness, and trustworthiness of information to be verified. Some of the information in SC(s) can be encrypted so that it can be accessed only after obtaining the appropriate authorization. SC(s) comprises at least one material table (Bin 〇f Materials; bqm for short), the component having an information record related to SC(s) and related to each component included in SC(s) Information record. For each component, a message extracting 85\85156 segmentation is performed using a hash algorithm such as MD-5, etc. D0C -57 - 1255443 is to 'and then the message digest is included in the BOM record of the component. The digests of the components are concatenated, and the digest is used to calculate another digest, and then the other digest is encrypted using the secret key of the entity that generated the SC(s) to generate a digital signature. The parties receiving the 8 (:(3) may use the digital signature to verify all digests and thus confirm the integrity and completeness of the Sc(s) and all of the components of the SC(s). The following information is used as a record in B〇M and a record of each component. The SC(s) type determines which records need to be included: SC(s) version SC(s) identification code SC(4) type (eg quote, order, transaction, content) , intermediary information or promotion, and licensing) SC(s) issuer generates SC(s) date SC(s) expiration 曰 clearing house's URL algorithm description of the digest algorithm (system pre-use for inclusion) Description of the variants of each component set to MD-5) (the system defaults to RSA)
用於數位簽名加密的 後摘要)Post-summary for digital signature encryption)
O:\85\85156 分割.DOC -58- 1255443 個新的BOM。中介資料SC(s) 620 BOM之一記錄係包含在 報價SC(s) 641之BOM中。該記錄包含中介資料SC(s) 620 BOM的一摘要,該摘要可用來確認中介資料SC(s) 620之完 整性,因而亦可利用中介資料SC(s) 620 BOM中儲存的各 組成部分摘要值來確認中介資料SC(s) 620中包含的該等 組成部分之完整性。中介資料SC(s) 620的各組成部分在為 報價SC(s) 641而產生的該新BOM中並無任何記錄。只有電 子數位内容商店103及中介資料SC(s) 620 BOM所增添的各 組成部分在該新BOM中有記錄。 SC(s)亦可包含一金鑰描述組成部分。金鑰描述組成部分 包含一些記錄,這些記錄包含與該SC(s)中各加密組成部分 有關的下列資訊: 加密組成部分之名稱。 當將該組成部分解密時該組成部分所用的名稱。 將該組成部分加密所用的加密演算法。 指示用來將該組成部分加密的公共加密金鍮之一金 鑰識別碼、或於解密時用來將該加密組成部分解密之 一加密的對稱金鑰。 用來將該對稱金鑰加密之加密演算法。當該金瑜描述 組成部分中之記錄包含一個用來將該加密組成部分 加密之加密的對稱金鑰時,才有本欄位。 用來將該對稱金瑜加密的該公共加密金鑰之一金瑜 識別碼。只有在該金鑰描述組成部分中之記錄包含一 加密的對稱金鑰、及用來將該加密部分加密的對稱金 ΟΛ85\85156 分割.DOC -59- 1255443 瑜之加被演算法識別碼時,才有本攔位 則並無任何金鍮 如果SC(s)並未包含任何加密組成部分, 描述組成部分。 B.權利管理語言語法及語意 權利管理語言包含若干參數, ’可將值指定給該等參數,O:\85\85156 Split .DOC -58 - 1255443 new BOM. One of the records of the intermediary material SC(s) 620 BOM is included in the BOM of the quote SC(s) 641. The record contains a summary of the intermediary material SC(s) 620 BOM, which can be used to confirm the integrity of the intermediary material SC(s) 620, and thus can also utilize the summary of the components stored in the intermediary material SC(s) 620 BOM. The value is used to confirm the integrity of the components contained in the intermediary material SC(s) 620. The components of the intermediary material SC(s) 620 do not have any records in the new BOM generated for the quotation SC(s) 641. Only the components added by the electronic digital content store 103 and the intermediary material SC(s) 620 BOM are recorded in the new BOM. SC(s) may also contain a key description component. The key description component contains records that contain the following information about each of the encryption components in the SC(s): The name of the encryption component. The name used by the component when the component is decrypted. The encryption algorithm used to encrypt this component. A key identification code indicating a public encryption key used to encrypt the component, or an encrypted symmetric key used to decrypt the encrypted component at the time of decryption. The encryption algorithm used to encrypt the symmetric key. This field is only available when the record in the Jin Yu description component contains an encrypted symmetric key used to encrypt the encrypted component. One of the public encryption keys used to encrypt the symmetric Jinyu is the Jinyu identification code. Only when the record in the key description component contains an encrypted symmetric key, and the symmetric golden key 85\85156 used to encrypt the encrypted portion is divided. DOC -59-1255443 is added to the algorithm identification code. There is no gold in this block. If SC(s) does not contain any encryption components, describe the components. B. Rights management language grammar and semantics The rights management language contains several parameters, and 'values can be assigned to these parameters,
517。電子數位内容商店103解譯中介資料sc(s)62〇中之使 用條件517,並利用該資訊提供其想要對其客戶報價的選 項,且利用該資訊增添内容113之零售資訊。在一最終使用 者選擇所要購買的一内容113項目之後,最終使用者裝置 1〇9要求根據商店使用條件519的内容113授權。在清算所 105將一授權許可sc(s) 660傳送到該最終使用者之前,清 算所105先驗證該商店使用條件。所要求的條件519係與内 容提供者101在中介資料SC(s) 620中規定的容許使用條件 517 一 致。 當一最終使用者裝置109接收所購買的内容113時,利用 浮水印工具程式將商店使用條件5 19編碼到該内容113中, 或編碼到安全儲存的使用條件519中。在最終使用者裝置 1 09上執行的最終使用者播放應用程式195確保編碼到内容 113的商店使用條件5丨9被強制執行。 下列是在内容113是音樂的一實施例中商店使用條件 5 1 9的一些例子: O:\85\85156 分割.DOC -60- 1255443 可將歌曲錄音。 可播放歌曲若干次。 C.安全容器物件流程及處理概述 内容提供者101建立中介資料Sc(s) 62〇,並利用中介資 料SC(s) 620來界定諸如歌曲等的内容113。内容113本身並 不包含在這些SC(s)中,這是因為内容113的容量通常對於 電子數位内容商店1〇3及最終使用者是太大了,而無法只為 了存取描述性中介資料而有效率地下載容器物件。sc(s) 反而包含一個指向内容113的一外部通用資源位標 (Uniform Resource Locators ;簡稱 URL)。SC(s)亦包含:提 供與内表113有關的描述性資訊之中介資料、以及在諸如音 樂的情形中為CD封面圖片及(或)在歌曲内容I〗]的情形中 為數位音訊片段之任何其他相關聯之資料。 電子數位内容商店103下載其得到授權的中介資料SC(s) 620,並建立報價SC(s) 641。總之,報價sc(s) 641包含來 自中介資料SC(s) 620的某些組成部分及bom、以及電子數 位内容商店103加入的額外資訊。於建立報價sc(s) 641 時,產生該報價SC(s) 641的一個新BOM。電子數位内容商 店103也利用中介資料SC(s) 620自這些中介資料提取中介 資料資訊,而在其網站上建立HTML網頁,用以將内容丨i 3 的描述提供給最終使用者,因而最終使用者可能購買内容 113。 報價SC(s) 641中由電子數位内容商店103加入的資訊通 常是用來縮小在中介資料SC(s) 620中指定的使用條件517 O:\85\85156 分割.DOC -61· 1255443 之選擇、以及諸如商店的圖形影像檔及商店的網站的網址 之促銷資料。中介資料sc⑷62时之—報價sc(s) 64ι樣板 指示:電子數位内容商店103可取代報價sc⑷641中的哪 些資訊;電子數位内容商店103需要哪些額外資訊 額外資訊的情形);以及在彼入的中介資料^⑷_中要保 留哪些組成部分。 & 一最終使用者決定向一電子數位内容商店1〇3購買内 容113時,將報價Sc⑷641包含在—交易Sc(s) 64〇中。電 子數位内容商店103建立一交易Sc(s) 64〇,並為所購買的 每一内容113項目包含報價sc⑷641,且將該交易%⑷ 640傳送到最終使用者裝置丨〇9。最終使用者裝置丨〇9接收交 易SC(S) 640 ’並確認交易Sc(s) 64〇及所包含報價%⑷641 之完整性。 最終使用者裝置109為所購買的内容U3項目建立一訂 單SC⑷650。自報價SC⑷641、交易sc⑷64〇、及最終使 用者裝置109的組態檔包含資訊。以一次一個之方式將訂單 SC(s) 650傳送到清算所105。接收訂單^⑷65〇的清算所 105之網址係被包含作為中介資料Sc(s) 62〇的B〇M中之一 個記錄,且清算所1〇5之網址又係包含在報價8〇:(4641中。 清算所105驗證並處理訂單sc(s) 650,以便將一授權許 可浮水印527及存取所購買内容113所需的所有資訊提供給 最終使用者裝置109。清算所1 〇5的一個功能即是將來自報 價SC(s) 641的浮水印指令解密並將來自内容sc(s) 630的 内容113解密所需的對稱金鑰623解密。一個加密的對稱金 ΟΛ85\85156 分害IJ.DOC -62- 1255443 鑰623記錄實際包含一個以上的實際加密之對稱金鑰623。 在執行該加密之前,内容提供者101可先選擇將其名稱附加 在實際對稱金鑰623之後。將内容提供者ι〇1的名稱連同對 稱金鑰623 —起加密時,可在安全性上對抗仿冒内容提供者 101利用合法SC(s)建立其本身的中介資料Sc(s) 620及内容 SC(s) 630。清算所105驗證連同對稱金鑰623而加密的内容 才疋供者1 01名稱符合SC(s)證明書中該内容提供者1 的名 稱。 如果清算所105需要對浮水印指令進行任何改變,則清 算所105將對稱金鑰623解密,然後修改浮水印指令,並利 用一個新對稱金餘623再度將這些浮水印指令加密。然後利 用最終使用者裝置109的公共金鑰661重新將該對稱金鑰 623加密。清算所1〇5也將SC(s)中的其他對稱金瑜623解 密’並利用最終使用者裝置109的公共金鑰661再度將這些 對稱金鑰623加密。清算所1〇5建立一個包含新加密的對稱 金鑰623及更新後浮水印指令之授權許可SC(s) 660,並回 應訂單SC(s) 650,而將該授權許可sc(s) 660傳送到最終使 用者裝置109。如果訂單SC(s) 650的處理並未成功地完 成’則清算所105將一報告授權程序失敗的HTML網頁或等 效資訊送回到最終使用者裝置丨〇9。 一授權許可SC(s) 660將存取一内容113項目所需的每一 資訊提供給一最終使用者裝置1 〇9。最終使用者裝置1 〇9向 代管内容網站111要求適當的内容SC(s) 630。内容提供者 101建立内容SC(s) 630,且内容SC(s) 630包含加密的内容 O:\85\85156 分割.DOC -63- 1255443 113及中介資料部分。最終使用者播放應用程式195利用來 自授權許可SC⑷660的對稱金鑰623將内容113、中介資 料、及、/予水印指令解密。然後將浮水印指令附加到内容 113 ’並對内容113進行亂序編碼,且將編碼後的内容⑴ 儲存在最終使用者裝置109。 D·中介資料安全容器物件62〇格式 下表示出包含在-中介資料sc(s)62G的各組成部分。組 成4刀(Parts)行中的每一欄都是與B〇M在一起的sc(s)中 已έ々各別物件(例外為以门字元包圍的組成部分名稱)。 ΒΟΜ存有SC(s)中包含的每一組成部分之一記錄。組成部分 存在(Pan Exists)行指示該組成部分本身實際上包含在 SC(s)中’且摘要(Digest)行指示是否針對該組成部分而計 算一訊息摘要。當一 SC(s)係包含在其他的SC⑷時(由相關 聯的樣板決定),某些組成部分並不會傳播,但是整個原始 的B〇M則會傳播。因為清算所1G5需要整個BQM來驗證原 始SC(s)中之數位簽名,所以才執行上述步驟。 下表的金鑰描述部分行界定sc⑷的金鑰描述部分中包 各的A錄。金鑰描述部分中的記錄界定與加密金鑰相關的 貝訊、以及用來將Sc(s)内的組成部分加密或將另一 sc(s) 内的組成部分加密之演算法。每一記錄包含加密的組成部 刀名稱及(在必要時)一個指向另一包含該加密的組成部 分的SC(s)之網址。結果名稱(Resuh Name)行界定被指定給 接密後的組成部分之名稱。加密演算法(Encrypt Alg)行界 定用來將組成部分加密的加密演算法。金鑰識別碼/加密金517. The electronic digital content store 103 interprets the usage conditions 517 in the intermediary material sc(s) 62 and uses the information to provide an option for which it wishes to quote its customers, and uses the information to add retail information for the content 113. After an end user selects a content 113 item to purchase, the end user device 1〇9 requests authorization based on the content 113 of the store usage condition 519. Before the clearing house 105 transmits a license sc(s) 660 to the end user, the clearinghouse 105 first verifies the store usage condition. The required condition 519 is consistent with the allowable use condition 517 specified by the content provider 101 in the intermediary data SC(s) 620. When an end user device 109 receives the purchased content 113, the store usage condition 5 19 is encoded into the content 113 using a watermarking tool program, or encoded into securely stored usage conditions 519. The end user playback application 195 executing on the end user device 109 ensures that the store usage condition 5丨9 encoded to the content 113 is enforced. The following are some examples of store usage conditions 5 1 9 in an embodiment where content 113 is music: O:\85\85156 Split.DOC -60- 1255443 The song can be recorded. The song can be played several times. C. Security Container Object Flow and Processing Overview The content provider 101 creates an intermediary material Sc(s) 62〇 and uses the intermediary material SC(s) 620 to define content 113 such as songs. The content 113 itself is not included in these SC(s) because the capacity of the content 113 is generally too large for the electronic digital content store 1〇3 and the end user, and cannot be used only for accessing descriptive mediation data. Efficiently download container objects. Instead, sc(s) contains an external generic resource locator (URL) that points to content 113. SC(s) also includes: mediation information providing descriptive information related to the inner table 113, and digital audio segments in the case of a CD cover picture and/or in the case of a song content I] Any other related information. The electronic digital content store 103 downloads its authorized intermediary material SC(s) 620 and creates a quote SC(s) 641. In summary, the offer sc(s) 641 contains certain components from the intermediary material SC(s) 620 and the bom, as well as additional information added by the electronic digital content store 103. When the offer sc(s) 641 is established, a new BOM of the offer SC(s) 641 is generated. The electronic digital content store 103 also uses the intermediary material SC(s) 620 to extract mediation information from these mediation materials, and creates an HTML webpage on its website for providing the description of the content 丨i 3 to the end user, thus ultimately using It is possible to purchase content 113. The information added by the electronic digital content store 103 in the quotation SC(s) 641 is usually used to narrow down the selection condition 517 O:\85\85156 division specified in the intermediary material SC(s) 620. DOC -61· 1255443 And promotional materials such as the graphic image files of the store and the website of the store's website. Intermediary data sc(4)62-quote sc(s) 64ι sample indication: which information in the electronic scoring content store 103 can replace the offer sc(4)641; the electronic digital content store 103 needs additional information additional information); and in the intermediary Which components are to be retained in the data ^(4)_. & When the end user decides to purchase the content 113 from an electronic digital content store 1-3, the quotation Sc(4) 641 is included in the transaction Sc(s) 64〇. The electronic digital content store 103 creates a transaction Sc(s) 64, and contains a quote sc(4) 641 for each content 113 item purchased, and transmits the transaction %(4) 640 to the end user device 丨〇9. The end user device 接收9 receives the transaction SC(S) 640' and confirms the integrity of the transaction Sc(s) 64 and the included offer %(4) 641. The end user device 109 creates a booking SC(4) 650 for the purchased content U3 item. The configuration file from the quote SC(4) 641, the transaction sc(4) 64〇, and the final user device 109 contains information. The order SC(s) 650 is transferred to the clearing house 105 one at a time. The website of the clearing house 105 that receives the order ^(4)65〇 is included in one of the B〇M records of the intermediary information Sc(s) 62〇, and the website of the clearing house 1〇5 is included in the quote 8〇: (4641) The clearing house 105 verifies and processes the order sc(s) 650 to provide an authorization watermark 527 and all information required to access the purchased content 113 to the end user device 109. One of the clearing houses 1 〇 5 The function is to decrypt the watermark instruction from the quote SC(s) 641 and decrypt the symmetric key 623 required to decrypt the content 113 from the content sc(s) 630. An encrypted symmetric key 85\85156 is harmful to IJ. DOC - 62 - 1255443 The key 623 records a symmetric key 623 that actually contains more than one actual encryption. Before performing the encryption, the content provider 101 may first choose to append its name after the actual symmetric key 623. The content provider When the name of ι〇1 is encrypted together with the symmetric key 623, the counterfeit content provider 101 can be used to establish its own intermediary material Sc(s) 620 and content SC(s) 630 in a secure SC(s). Clearing house 105 verification along with symmetric key 623 The encrypted content is the name of the content provider 1 in the SC(s) certificate. If the clearing house 105 needs to make any changes to the watermark instruction, the clearing house 105 decrypts the symmetric key 623. Then, the watermarking instructions are modified, and the watermarking instructions are again encrypted using a new symmetric gold balance 623. The symmetric key 623 is then re-encrypted using the public key 661 of the end user device 109. The clearing house 1〇5 The other symmetric golden 623 in SC(s) is decrypted' and the symmetric key 623 is again encrypted using the public key 661 of the end user device 109. The clearinghouse 1-5 establishes a symmetric key 623 containing the new encryption. And updating the license of the watermarking instruction SC(s) 660, and responding to the order SC(s) 650, and transmitting the authorization sc(s) 660 to the end user device 109. If the order SC(s) 650 The processing has not been successfully completed. Then the clearing house 105 sends an HTML web page or equivalent information that fails the report authorization program back to the end user device 丨〇 9. A license SC(s) 660 will access a content 113 item. Everything you need The message is provided to an end user device 1 〇 9. The end user device 1 要求 9 requests the appropriate content SC(s) 630 from the escrow content website 111. The content provider 101 creates the content SC(s) 630, and the content SC (s) 630 contains the encrypted content O:\85\85156 split.DOC -63- 1255443 113 and the mediation data section. The end user play application 195 decrypts the content 113, the mediation material, and/or the watermark instruction using the symmetric key 623 from the license SC (4) 660. The watermark instructions are then appended to the content 113' and the content 113 is out-of-order encoded, and the encoded content (1) is stored in the end user device 109. D. Intermediary data security container object 62〇 format The following table shows the components included in the mediation material sc(s) 62G. Each of the columns in the 4 Parts row is a separate object in sc(s) with B〇M (except for the part name enclosed by the gate character). A record of one of each component included in SC(s) is stored. The Pan Exists line indicates that the component itself is actually contained in SC(s) and the Digest line indicates whether a message digest is calculated for the component. When an SC(s) system is included in other SC(4) (as determined by the associated template), some components will not propagate, but the entire original B〇M will propagate. Since the clearing house 1G5 requires the entire BQM to verify the digital signature in the original SC(s), the above steps are performed. The key description section of the table below defines the A records for each packet in the key description section of sc(4). The record in the key description section defines the beneficiary associated with the encryption key and the algorithm used to encrypt the components within Sc(s) or to encrypt the components within another sc(s). Each record contains the encrypted component name and, if necessary, a URL to another SC(s) containing the encrypted component. The Resuh Name line defines the name assigned to the encrypted component. The Encrypt Alg line defines the encryption algorithm used to encrypt the components. Key identification code/encryption key
O:\85\85156 分割.DOC -64- 1255443 鑰(Key Id/Enc Key)行界定用來將組成部分加密的加密金 鍮之一識別碼、或用來將組成部分加密的加密對稱金鑰623 位元串之一 64基編碼。對稱金鑰演算法(Sym Key Alg)行是 一可選用的參數,而當前一行是一加密的對稱金鑰623時, 該參數界定用來將對稱金鑰623加密的加密演算法。對稱金 鍮識別碼(Sym Key ID)行是當金瑜識別碼/加密金瑜行是一 加密的對稱金鑰623時用來將對稱金鑰623加密的加密金鑰 之一識別碼。 喊部分 部分存在 [内容_ [中介資糊_ 述部分 結絲稱 加密演系去 加密 fmm 演勒去 鑛嫌 識馬 輸出部分 RC4 加密姻嫌 RSA CH 公*^ 輸出部分 RC4 加密姻魏 RSA CH 公^^ SC脉 scmm sc發行人 曰期 綱曰 清獅雖止 緻演算海娜馬 數位簽名演算法瓣馬 内容識m 中介資料 細制牛 SC雜 述部分 清算所證明書 證明書 是 是 是 是 是 是 是 是 是 是 是 是 是 是 否 否O:\85\85156 Split. DOC -64 - 1255443 The Key Id/Enc Key line defines an identifier for the encrypted key used to encrypt the component, or an encrypted symmetric key used to encrypt the component. One of the 623-bit strings is 64-base encoded. The Sym Key Alg line is an optional parameter, and when the current line is an encrypted symmetric key 623, this parameter defines the encryption algorithm used to encrypt the symmetric key 623. The Sym Key ID line is an identification key of the encryption key used to encrypt the symmetric key 623 when the Jinyu identification code/encryption Jin Yuxing is an encrypted symmetric key 623. Some parts of the shouting exist [content _ [intermediary _ paste _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ ^^ SC pulse scmm sc issuer 曰 曰 曰 曰 虽 演 演 海 海 海 海 海 海 Henna horse digital signature algorithm flap horse content knowledge m intermediary information fine cattle SC miscellaneous part of the clearing house certificate certificate is yes is Yes yes yes yes yes yes yes no
輸出部分 加密備錄 CH 公 數位簽名 下文中將說明用於上述中介資料SC(s)表之術語: [内容網址]-金鑰描述部分中的一記錄中之一參數。這 是指向與該中介資料SC(s) 620相關聯的内容SC(s) O:\85\85156 分割.DOC -65- 1255443 630中的加密内容113之一網址。該中介資料SC(S) 620 本身並不包含該加密内容113。 [中介f料網址]_金鑰描述部分中的一記錄中之一參 數。這是指向與該中介資料Sc(s) 62〇相關聯的内容 SC(s) 630中的加密中介資料之一網址。該中介資料 SC(s) 620本身並不包含該加密的中介資料。 内谷識別碼界定一個指定給一内容丨13項目的一特有 减別碼 < 組成部分。如果中介資料Sc(s) 對照到一 個以上的内容113項目,則有一個以上的内容識別碼 包含在該組成部分中。 中介資料-包含與一内容113項目相關的資訊(例如在 歌曲N开;^中的藝人及CD封面圖片)之組成部分。可 以有多個中介資料組成部分,可將某些中介資料組成 4刀加飨。中介資料組成部分的内部結構係取決於内 含的中介資料之類型。 使用條件-包含用來描述將要對一最終使用者或内容 113的使用施加的使用選項、規則、及限制的資訊之 組成部分。 SC(s);^板-界定用來描述建立報價、訂單、及授權許 可SC⑷660的必要及選用資訊的樣板之組成部分。 浮水P扣5 -個包含用來在内容113中實施浮水印的 加密指令及參數之組成部分。清算所1〇5可修改浮水 P才曰v並將浮水印指令送回到最終使用者裝置1 〇9 内的授權許可SC(s) 660。金鑰描述部分中有一記錄,Output section Encrypted recording CH Common digit signature The term used in the SC(s) table of the above-mentioned mediation material is explained below: [Content URL] - One of the parameters in a record in the key description section. This is a URL pointing to the encrypted content 113 in the content SC(s) O:\85\85156 partitioning .DOC-65-1255443 630 associated with the mediation material SC(s) 620. The mediation material SC(S) 620 does not itself contain the encrypted content 113. [Intermediary f URL] One parameter in a record in the key description section. This is the URL of one of the encrypted mediations in the content SC(s) 630 associated with the mediation material Sc(s) 62〇. The mediation material SC(s) 620 itself does not contain the encrypted mediation material. The inner valley identification code defines a unique minus code < component assigned to a content 丨13 item. If the intermediary material Sc(s) is compared to more than one content 113 item, then more than one content identification code is included in the component. Intermediary material - contains information about a content 113 item (for example, in the song N open; ^ in the artist and CD cover image). There may be multiple mediation data components, which can be combined with some media files. The internal structure of the intermediary data component depends on the type of intermediary information contained. Conditions of Use - Contains information that describes the usage options, rules, and restrictions that will be imposed on the use of an end user or content 113. SC(s);^ Board - defines the components of the template used to describe the necessary and optional information for establishing a quote, order, and authorization license SC(4)660. The floating P button 5 is part of an encryption command and parameters for implementing a watermark in the content 113. The clearinghouse 1-5 can modify the floating water P 曰 v and send the watermark command back to the license SC(s) 660 in the end user device 1 〇9. There is a record in the key description section.
O:\85\85156 分割.DOC •66- 1255443 用以界定用來將浮水印指令加密的加密演算法、於將 浮水印扣令解密時所使用的輸出組成部分名稱、用來 將浮水印指令加密的加密對稱金鑰623位元串之一 64 基、、扁碼、用來將對稱金鍮623加密之加密演算法、以 及將對稱金鑰623解密所需的公共金鑰之識別碼。 π算所祖明書-一認證中心或清算所i 〇5發出的證明 書,孩證明書包含清算所丨〇5的簽認公共金鑰62丨。可 能有一個以上的證明書,在此種其情形中,係使用一 階層式結構,其中最高層的證明書包含用來開啟次—鲁 層級證明書之公共金鑰,依此類推,直到到達最低層 級的證明書,而該最低層級的證明書包含清算所1〇5 之公共金鑰621。 證明書-一認證中心或清算所1〇5發出的證明書,該證 明書包含產生SC(s)的實體之簽認公共金鑰621。可能 有一個以上的證明書,在此種其情形中,係使用一階 層式結構,其中最高層的證明書包含用來開啟次一層 鲁 級證明書之公共金鑰,依此類推,直到到達最低層級 的證明書,而該最低層級的證明書包含Sc(s)產生者之 公共金鑰621。 SC版本_由%包封工具程式指定給Sc(s)之一版本編 號。 S C减別碼-由產生S C (s)的貫體指定給該s c (s)之一特 有識別碼。 SC類型-指示SC⑷的類型(例如中介資料、報價、訂單 O:\85\85156 分割.DOC -67- 1255443 等)。 SC發行人指示產生sc(s)之實體。 產生曰-產生SC(s)的曰期。 :期日_SC(s)到期且不再有效的日期。 m #所網址-最終使用者播放應用程式195應與之互動 以便取彳于存取内容i丨3的適當授權之清算所丨〇5位址。 摘要演算法識別碼-用來計算各組成部分的摘要的演 算法之識別碼。 數位簽名演算法識別碼_用來將序連的組成部分摘要 之摘要加密之一識別碼。 數位簽名利用產生SC(s)的實體的公共金鑰加密的各 序連組成邵分摘要之一摘要。 輸出邵分-當將一加密的組成部分解密時指定給輸出 部分之名稱。 RSA及RC4-用來將對稱金鑰623及資料部分加密的系 統預設加密演算法。 加密對稱金鑰_於解密時用來將一 Sc(s)組成部分解密 的一加密金鑰位元串之一 64基編碼。 CH公共金鑰-指示清算所105的公共金鑰621係用來將 資料加密之一識別碼。 E·報價安全容器物件641格式 下表示出包含在報價SC(s) 641的各組成部分。除了某此 中介資料組成部分以外的各組成部分、以及來自中介資料 SC(s) 620之BOM亦係包含在報價SC(S)641中。 〇Λ85\85156 分割.DOC -68- 1255443 組成部分 BOM 减部分存在 [内容酬 [中介資__ 述部分 結絲稱 加密演算法 加密 娜猶 演算法 娜馬 輸出部分 RCA 加密规鱗 RSA CH 公 輸出部分 RC4 加齡懈4^· RSA CH 公*^ SC鉢 SCI娜馬 SCI sc發行人 蝴曰 清獅鼠 娜嫌去瓣馬 數位簽名演算法瓣馬 内容識^馬 中介資料 綱制牛 SC躲 浮柳齡 述部分 清算所證明書 證明書 是 有些 是 是 是 是 是 是 是 是 是 是 是 是 否 否 數位簽名 SC鉢 SCI娜% SC麵 SC發行人 曰期 蝴日 mm&m 數位簽名演算卿腾 中介資料SCBOM 是 是 額外細職駐 是 是 電子數ί立内容 是 是 商/¾翻書 是 是 數位簽名O:\85\85156 Split.DOC •66- 1255443 is used to define the encryption algorithm used to encrypt the watermark instruction, the output component name used to decrypt the watermark, and the watermark instruction. The encrypted symmetry key 623 bit string 64 base, the flat code, the encryption algorithm used to encrypt the symmetric key 623, and the identification code of the public key required to decrypt the symmetric key 623. The certificate issued by the π-calculation ancestral home-a certification center or clearing house i 〇5, the child certificate contains the public key of the clearing house 丨〇5. There may be more than one certificate, in which case a hierarchical structure is used, where the certificate at the highest level contains the public key used to open the sub-lu level certificate, and so on, until the minimum is reached. A certificate of the hierarchy, and the certificate of the lowest level contains the public key 621 of the clearing house 1〇5. Certificate - A certificate issued by a certification authority or clearing house, which contains the public key 621 of the entity that generated the SC(s). There may be more than one certificate. In this case, a hierarchical structure is used, in which the certificate at the highest level contains the public key used to open the next level of the certificate, and so on, until the minimum is reached. A certificate of the hierarchy, and the certificate of the lowest level contains the public key 621 of the producer of Sc(s). SC version_ is assigned to one of Sc(s) by the % package utility. S C minus code - is assigned to one of the s c (s) unique codes by the body that produces S C (s). SC Type - Indicates the type of SC(4) (eg mediation, quote, order O:\85\85156 split.DOC -67-1255443, etc.). The SC issuer indicates the entity that generated sc(s). Produce 曰 - produces a cycle of SC(s). : Date when the date _SC(s) expires and is no longer valid. m #所网页- The end user playback application 195 should interact with it in order to access the appropriate authorized clearinghouse address 5 of the access content i丨3. Abstract Algorithm Identification Code - The identification code of the algorithm used to calculate the digest of each component. The Digital Signature Algorithmic Identification Code_ is used to encrypt the digest of the component summary of the sequenced one. The digital signature is summarised by each of the sequences encrypted by the public key of the entity that generated the SC(s). Output Score - The name assigned to the output part when decrypting an encrypted component. RSA and RC4 - The system default encryption algorithm used to encrypt the symmetric key 623 and the data portion. The cryptographic symmetry key is a 64-base code of a cryptographic key bit string used to decrypt a Sc(s) component at the time of decryption. CH Public Key - Indicates that the public key 621 of the clearing house 105 is used to encrypt the data with one of the identification codes. E. Quote Safety Container Object 641 Format The following table shows the components included in the quote SC(s) 641. The components other than the components of this intermediary material and the BOM from the intermediary material SC(s) 620 are also included in the quotation SC(S) 641. 〇Λ85\85156 Segmentation.DOC -68- 1255443 Component BOM minus part exists [content remuneration [intermediary __ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Partial RC4 Ageing 4^· RSA CH Public*^ SC钵SCI Na Ma SCI sc Issuer Butterfly 曰 曰 鼠 娜 去 去 去 数 数 数 数 数 数 数 数 内容 内容 内容 中介 中介 中介 中介 中介 中介 中介 中介 中介The certificate of the partial clearing house certificate is some yes or no yes or no yes or no whether it is a digital signature SC钵SCI Na% SC face SC issuer 曰期日日mm&m digital signature calculus Qing Teng intermediary information SCBOM is an extra fine station, it is an electronic number. The content is a business/3⁄4 flip book is a digital signature.
輸出部分 報價SC贼部分 RC4 加密姻讀 CH 公Output part quote SC thief part RC4 encryption inscription CH public
下文將說明一些用於上文所述報價SC(s) 641但先前並 未在另一 SC(s)中說明的術語: 中介資料SC(s) BOM-來自原始中介資料SC(s) 620之 BOM。報價SC(s) 641 BOM包含中介資料SC(s) 620 BOM之摘要。 O:\85\85】56 分割.DOC -69- 1255443 額外及取代的攔位-被電子數位内容商店103取代的使 用條件資訊。清算所1〇5利用所接收的樣板確認 該資訊’以便確定電子數位内容商店1 〇3所取代的任 何使用條件是在其授權的範圍内。 電子數位内容商店證明書-清算所1〇5利用其秘密金鑰 簽名並提供給電子數位内容商店1 03的證明書。最終 使用者播放應用程式195利用該證明書驗證電子數位 内容商店103是内容113的一合法配銷商。最終使用者 播放應用程式19 5及清算所1 〇 5可利用清算所1 〇 5的公 共金鑰621將該證明書的簽名解密,而驗證電子數位 内容商店103是一授權配銷商。最終使用者播放應用 程式195在本機保留一份其於安裝時所接收作為起始 設定的一部分之清算所105公共金鑰621。 F.交易安全容器物件640格式 下表示出包含在交易SC(s) 640中的各組成部分、以及其 BOM與金鑰描述部分。 O:\85\85156 分割.DOC 70- 1255443 、喊部分 BOM 赵織述部分 贼部分存在 概結絲稱加密演算法錦娜蟹雌銳繼嫌 加密金鍮演算法識^馬 SC财 SC獅馬 SC麵 SC發行人 曰期 到期曰 贼寅算法瓣馬 數位簽名演算海娜馬 交易鄭W 是 是 輸出部分 RC4 加密韻爯魏 RSA CH 公^6^· 最終使^者1娜馬 是 是 輸出部分 RC4 加密姻錄 RSA cH^m 是 是 報價SQs) 是 是 内容之邀¥ 是 是 Stt^cHIML 是 是 述部分 是 是 電子數位内容 Λ店翻書 是 否 數位簽名 下文將說明一些用於上文所述交易SC(s) 640但先前並 未在另一 SC(s)中說明的術語: 交易識別碼535-被電子數位内容商店103指定而唯一 識別交易之一識別碼。 最終使用者識別碼-最終使用者於進行購買選擇並提 供信用卡資訊時電子數位内容商店103所取得的最終 使用者指示碼。 最終使用者之公共金鑰-清算所105用來將對稱金鑰 623重新加密的最終使用者之公共金鑰661。於購買交 易時,最終使用者的公共金鑰661被傳送到電子數位 内容商店103。 報價SC(s)-所購買的内容113項目之報價SC(s) 641。 内容使用之選擇-最終使用者所購買的每一内容113項 目之一使用條件陣列。 O:\85\85 丨 56 分割.DOC -71 - 1255443 要顯示的HTML-於接收到交易sg^s) 640時或在最終 使用者裝置1 09與清算所1 〇5進行互動時最終使用者 播放應用程式195在網際網路瀏覽器視窗中顯示的— 個或多個HTML網頁。 當最終使用者裝置109接收一交易SC(s) 640時,可執行 下列步騾’以便驗證SC(s)之完整性及可信賴性: 1. 利用清算所105之公共金鑰621驗證電子數位内容商店 1 03證明書之完整性。在接收到清算所丨〇5的公共金鑰 621作為最終使用者播放應用程式i 的安裝程序時起 始設定的一部分之後,將該公共金鑰621儲存在最終使 用者裝置109。 2. 利用來自電子數位内容商店1〇3證明書的公共金鑰來驗 證SC(s)之數位簽名643。 3. 驗證該SC(s)各組成部分的雜亂函數。 4·驗證X易SC(s) 640中包含的每一報價sc(s) 641之完整 性及可信賴性。 G.訂單安全容器物件650格式 下表示出包含在訂單sc(s)65〇中的各組成部分、以及其 BOM與金鑰描述部分。這些組成部分將資訊提供給清算所 105,以供解密及驗證之用,或由清算所1〇5確認這些組成 4刀這些組成邵分及來自報價SC(s) 641之BOM亦係包含 在訂單SC(s) 650。中介資料Sc(s) bom的組成部分存在行 中之木些今串指示該等組成邵分中之某些組成部分並未包Some of the terms used in the quote SC(s) 641 described above but not previously described in another SC(s) are explained below: Intermediary Information SC(s) BOM - from the original intermediary material SC(s) 620 BOM. The quotation SC(s) 641 BOM contains a summary of the intermediary material SC(s) 620 BOM. O:\85\85] 56 split.DOC -69 - 1255443 Additional and replaced blocks - use condition information superseded by the electronic digital content store 103. The clearing house 1-5 uses the received template to confirm the information' to determine that any conditions of use replaced by the electronic digital content store 1 〇 3 are within its authorized scope. The electronic digital content store certificate - the certificate issued by the clearing house 1〇5 with its secret key and provided to the electronic digital content store 103. The end user playback application 195 uses the certificate to verify that the electronic digital content store 103 is a legitimate distributor of the content 113. The end user playing application 19 5 and the clearing house 1 〇 5 can decrypt the signature of the certificate using the public key 621 of the clearing house 1 〇 5, and verify that the electronic digital content store 103 is an authorized distributor. The end user playback application 195 maintains a clearing house 105 public key 621 that is received as part of the initial setup at the time of installation. F. Transaction Security Container Object 640 Format The following table shows the components included in transaction SC(s) 640, along with their BOM and key description portions. O:\85\85156 Split.DOC 70- 1255443, shouting part of the BOM Zhao Zhishu part of the thief part of the existence of the summary of the silk said encryption algorithm Jinna crab female sharp after the suspicion of encryption Jin Hao algorithm knowledge ^ Ma SC Cai SC Shima SC surface SC issuer expires 曰 曰 寅 algorithm flap horse digital signature calculation Henna horse transaction Zheng W is the output part RC4 encryption rhyme Wei RSA CH public ^ 6 ^ · Finally make ^ 1 1 Na Ma is the output Part of the RC4 encryption marriage RSA cH^m is the quotation SQs) is the content of the invitation ¥ is Stt^cHIML is the part is the electronic digital content Λ shop flip book whether the digital signature will be explained below The term SC(s) 640 is described but not previously described in another SC(s): Transaction ID 535 - is specified by electronic digital content store 103 to uniquely identify one of the transaction identification codes. End User ID - The end user indicator code obtained by the electronic digital content store 103 when the end user makes a purchase selection and provides credit card information. The public key of the end user - the public key 661 of the end user used by the clearing house 105 to re-encrypt the symmetric key 623. At the time of purchase of the transaction, the public key 661 of the end user is transmitted to the electronic digital content store 103. Quote SC(s) - Quoted item SC(s) 641 for the purchased content 113 item. Choice of Content Usage - One of the 113 items of content purchased by the end user uses a conditional array. O:\85\85 丨56 split.DOC -71 - 1255443 HTML to be displayed - when receiving transaction sg^s) 640 or when end user device 1 09 interacts with clearing house 1 〇 5 The play application 195 displays one or more HTML web pages in an internet browser window. When the end user device 109 receives a transaction SC(s) 640, the following steps can be performed to verify the integrity and trustworthiness of the SC(s): 1. Verify the electronic digits using the public key 621 of the clearinghouse 105 The integrity of the content store 103 certificate. The public key 621 is stored in the final user device 109 after receiving the public key 621 of the clearing house 5 as part of the initial setting of the installation program of the application i. 2. Verify the digital signature 643 of SC(s) using the public key from the Electronic Digital Content Store 1-3 certificate. 3. Verify the clutter function of the various components of the SC(s). 4. Verify the completeness and trustworthiness of each offer sc(s) 641 included in X Easy SC(s) 640. G. Order Safe Container Object 650 Format The following table shows the components included in the order sc(s) 65 and their BOM and key description sections. These components provide information to the Clearing House 105 for decryption and verification, or by the Clearing House 1〇5 to confirm these components. The composition of the 4 points and the BOM from the quote SC(s) 641 are also included in the order. SC(s) 650. The composition of the intermediary material Sc(s) bom exists in the middle of the string, indicating that some of the constituent components of the composition are not included.
O:\85\85156 分割.DOC -72- 1255443 含在訂單SC(s) 650。亦可在不作任何改變的情形下包含來 自中介資料SC(s) 620之BOM,因而清算所105可確認中介 資料SC(s) 620及其各組成部分之完整性。 減部分 BOM 述部分 减部分存在緻結絲稱加密演算法鑛齡W 舰姚麟鱗O:\85\85156 Split.DOC -72- 1255443 is included in the order SC(s) 650. The BOM from the intermediary material SC(s) 620 can also be included without any changes, so that the clearing house 105 can confirm the integrity of the intermediary material SC(s) 620 and its components. Subtracting the part of the BOM, the part of the reduction, the existence of the knot, the wire, the encryption algorithm, the mining age, the W.
O:\85\85156 分割.DOC -73 - 1255443 交易sqs)贼部分 SQs)脉 SQs)l跡馬 SQs_ SQ〇#f亍人 曰期 娜寅联娜馬 數位簽名演算趣暢 交易識^馬 是 是 輸出部分 腦 加密辦爯金鑰 RSA CH 公 會_馬 是 是 輸出部分 RC4 加密爾爯嫌 RSA CH 公 是 是 報價SQs) η酿價 SQs) 是 内容使^之邏¥ 是 是 在濁覽親見窗中 是 是 述部分 是 是 電子數泣内容 ^店翻書 是 是 數位簽名O:\85\85156 segmentation.DOC-73 - 1255443 transaction sqs) thief part SQs) pulse SQs) l trace horse SQs_ SQ〇#f亍人曰期娜寅联娜马数码算算算趣畅交易识^马是Is the output part of the brain encryption key RSA CH guild _ Ma is the output part of the RC4 encryption 爯 RS RS RS RS RS RS 是 是 是 是 是 是 是 是 是 是 是 是 是 是 是 是 是 是 是 是 是 是 是 是 是 是 是 是In the window is the part that is the electronic number of crying content ^ shop flip book is a digital signature
訂單SC(s)喊部分 SQs)片林 SQs鄉丨媽 SQs麵 SCs〇#[亍人 曰期 到期曰 緻演算法獅馬 數位簽名演算法鄴媽 報價 SQs) BOM 是 是 交易 SQs) BOM 是 是 加密信用+» 是 是1 輸出撇 RSA CH公*^ 述部分 是 是 數位簽名 下文將說明一些用於上文所述訂單SC(s) 650但先前並Order SC(s) shouts part of SQs) sliced forest SQs township aunt SQs face SCs〇#[亍人曰期曰曰 algorithm lion horse digital signature algorithm aunt quote SQs) BOM is a transaction SQs) BOM Yes Is the encrypted credit +» is yes 1 output 撇RSA CH public *^ The part is the digital signature. The following will explain some of the order SC(s) 650 used above but previously
未在另一 SC(s)中說明的術語: 交易SC(s) BOM-原始交易SC(s) 640中之BOM。訂單 SC(s) 650 BOM 包含交易 SC(s) 640 BOM的摘要。 加密信用卡資訊-用來將購買金額記帳到一信用卡或 借方卡的最終使用者之選用加密資訊。當產生報價 SC(s) 641的電子數位内容商店103並不處理向客戶開 立帳單時,需要該資訊,在此種情形中,清算所1 05 可處理向客戶開立帳單。 O:\85\85156 分割.DOC -74- 1255443 Η.授權許可安全容器物件660格式 下表示出包含在授權許可SC(s) 660之各組成部分、及其 BOM。如金鑰描述部分所示,清算所1 05已利用最終使用 者的公共金鑰661將浮水印指令解密所需的對稱金鑰623、 内容11 3、及内容11 3中介資料重新加密。當最終使用者裝 置109接收到授權許可SC(s) 660時,最終使用者裝置109將 對稱金鑰623解密,並利用解密後的對稱金鑰623存取授權 許可SC(s) 660及内容SC(s) 630之各加密組成部分。 贼部分 BOM 述部分 喊部分存在滕 結絲稱 加密演縣娜娜暫纖鱗辦爯魏 _ _加密鱗 演縣娜馬 [内容_ 輸出部分 RC4 加密備魏 RSA CH 公 [中介資糊_ 輸出部分 RC4 加密儀練 RSA CH 公*^ SQs财 SQs廊丨媽 SQs_ SQs敝人 曰期 纖日 數位簽名演細娜焉 内容1 娜馬 是 是 棚餅 是 是 交易資料 是 是 浮私p才岭 是 是 輸出部分 RC4 加齡搬 RSA 述部分 是 是 翻書 是 否 數位簽名 下文將說明一些用於上文所述授權許可SC(s) 660但先 前並未在另一 SC(s)中說明的術語: 最終使用者公共金鑰-指示最終使用者的公共金鑰661 係用來將資料加密之一識別碼。 訂單SC(s) 650識別碼-自訂單SC(s) 650 BOM取得的 SC(s)識別碼。 O:\85\85156 分割.DOC -75- 1255443 證明書廢止清單-先前由清算所105發出並簽名但目前 不再有效的證明書識別碼之一可選用清單。具有一個 廢止清單中包含的一證明書可驗證的簽名之任何SC(s) 都是無效的SC(s)。最終使用者播放應用程式195將一 份清算所105的證明書廢止清單儲存在最終使用者裝 置109。當接收到一廢止清單時,如果新的廢止清單 是更新的版本時,則最終使用者播放應用程式195以 該更新的版本取代其本機的拷貝。廢止清單包含一版 本編號或一時戳(或以上兩者),以便決定哪一份清單 是最新的。 I.内容安全容器物件格式 下表示出包含在内容SC(s) 630中的各組成部分、及 BOM : m .喊部分 喊部分存在 [内容_ [中介資獅 SC(s)脉 SQs)獅馬 SQs_ SQs麽行人 曰期 到期曰 清算所105網址 娜嫌去娜1 數位簽名演算法娜馬 内辕娜馬 是 是 加密的内容 是 是 加密的中介資料 是 是 中介資料 是 是 溯書 是 否 數位簽名 下文將說明一些用於上文所述内容SC(s) 630但先前並 O:\85\85156 分割.DOC -76- 1255443 未在另一 SC(s)中說明的術語: 加密的内容-一内容提供者1 〇 1利用一對稱金鑰623加 密的内容113。 加密的中介資料-與内容113相關聯且係由一内容提供 者101利用一對稱金鑰623加密的中介資料。 内容SC(s) 630中並未包含任何金鑰描述部分,這是因為 將加密的組成邵分解密的金鑰是在清算所1 〇5上建立的授 權許可SC(s) 660中。 VI·安全容器物件的包封及打開 A.概述 SC(s)包封工具程式是一個具有一應用程式介面 (Application Programming Interface ;簡稱 API)的 32位元Terms not illustrated in another SC(s): Transaction SC(s) BOM - BOM in the original transaction SC(s) 640. The order SC(s) 650 BOM contains a summary of the transaction SC(s) 640 BOM. Encrypted Credit Card Information - The encrypted information used by the end user to bill the purchase amount to a credit or debit card. This information is required when the electronic digital content store 103 that generated the offer SC(s) 641 does not process the billing to the customer, in which case the clearinghouse 105 can process the billing to the customer. O:\85\85156 Split.DOC -74- 1255443 Η. Licensing Secure Container Object 660 Format The following table shows the components included in the license SC(s) 660 and their BOMs. As shown in the key description section, the clearinghouse 105 has re-encrypted the symmetric key 623, the content 11 3, and the content 11 3 required for the decryption of the watermark instruction using the public key 661 of the end user. When the end user device 109 receives the license SC(s) 660, the end user device 109 decrypts the symmetric key 623 and accesses the license SC(s) 660 and the content SC using the decrypted symmetric key 623. (s) Each encryption component of 630. The thief part of the BOM part of the shouting part of the existence of Tengjiesi said that the encryption of the county Nana temporary fiber scales do Wei _ _ encryption scales play county Na Ma [content _ output part RC4 encryption preparation Wei RSA CH public [intermediary _ paste _ output section RC4 cryptographer RSA CH public *^ SQs SQs gallery aunt SQs_ SQs 敝 曰 纤 日 日 数 数 数 数 数 焉 焉 焉 焉 焉 焉 焉 焉 焉 焉 娜 娜 娜 娜 娜 娜 娜 娜 娜 娜 娜 娜 娜 娜 娜 娜 娜 娜 娜 娜 娜 娜 娜 娜 娜 娜 娜 娜 娜 娜 娜Partial RC4 Ageing Moving RSA The part is whether the book is digitally signed. Some terms used in the above-mentioned license SC(s) 660 but not previously stated in another SC(s) are explained below: Final use Public Key - Indicates that the end user's public key 661 is used to encrypt the data with one of the identification codes. Order SC(s) 650 ID - SC(s) identification code obtained from order SC(s) 650 BOM. O:\85\85156 Split.DOC -75- 1255443 Certificate Revocation List - An optional list of one of the certificate identifiers previously issued and signed by the Clearing House 105 but not currently valid. Any SC(s) with a certificate verifiable signature contained in an abolition list is invalid SC(s). The end user playback application 195 stores a certificate revocation list of the clearing house 105 in the end user device 109. When an abolition list is received, if the new revocation list is a newer version, the end user playback application 195 replaces its native copy with the updated version. The revocation list contains a version number or a time stamp (or both) to determine which list is up to date. I. Content Security Container Object Format The following table shows the components included in the content SC(s) 630, and the BOM: m. The shouting part of the shouting part exists [Content_ [Intermediary Lions SC(s) Pulse SQs) Lions SQs_ SQs Pedestrians expired 曰 Clearing House 105 URL Na Na to Na 1 Digital Signature Algorithm Naima Nei Na Ma is encrypted content is encrypted intermediary information is mediation data is whether the book is digital signature Some of the terms used in the above-mentioned content SC(s) 630 but previously and O:\85\85156 splitting. DOC -76-1255443 not illustrated in another SC(s) will be explained below: Encrypted content - one The content provider 1 利用1 uses the content 113 encrypted by a symmetric key 623. Encrypted mediation material - mediation material associated with content 113 and encrypted by a content provider 101 using a symmetric key 623. The content SC(s) 630 does not contain any key description portion because the key to decrypt the encrypted composition score is in the authorization license SC(s) 660 established on the clearinghouse 1 〇 5. Encapsulation and Opening of VI·Safe Container Objects A. Overview The SC(s) Encapsulation Tool is a 32-bit device with an Application Programming Interface (API).
Windows程式,可在多個或單一程序步驟中呼叫該程式, 以便產生一個具有所有指定組成部分之Sc(s)。§c(s)包封 工具程式15卜152、153可在各種硬體平台上支援内容提供 者101、清算所105、電子數位内容商店1〇3、及需要叱⑷ 包封的其他網站上支援Windows程式。一 B〇M及一或有的 金鑰描述部分被產生,並被包含在Sc(s)中。一組包封工具 程式API可讓呼叫的程式指定所需的資訊,以便產生b〇m 及金鑰描述邵分中之記錄,並將各組成部分包含在 中。2是由包封工具程式執行各組成部分及對稱金鑰62\ (加密、以及各摘要及數位簽名之計算。包封工具程式所 支援的加密演算法及摘要演算法係包含在包封工具程式碼 中’或係經由-外部介面而呼叫該加密演算法及摘=算A Windows program that calls a program in multiple or single program steps to produce a Sc(s) with all specified components. §c(s) Encapsulation Tools 15 152, 153 can support content providers 101, clearing houses 105, electronic digital content stores 1, 3, and other websites that require 叱 (4) encapsulation on various hardware platforms. Windows program. A B〇M and a continuation key description portion are generated and included in Sc(s). A set of encapsulation tools The API allows the calling program to specify the information needed to generate records in the b〇m and key descriptions, and to include the components. 2 is the execution of the components and the symmetric key 62\ (encryption, and the summary and digital signature calculations by the encapsulation tool program. The encryption algorithm and digest algorithm supported by the encapsulation tool are included in the encapsulation utility. In the code 'or call the encryption algorithm via the external interface and extract
O:\85\85156 分割.DOC -77- 1255443 法。 一 API執行用來建立一 SC(s)的包封 API接受下列參數作為輸入: 工具程式介面,而該 各序連結構的一緩衝區之一指標; 構是對該包封工具程式的一命令 資訊。包封工具程式命令包括··將— 一相關聯的BOM記錄之SC(s)、將— 以及將記錄加入金鑰描述部分。 該緩衝區中的每一結 及執行該命令所需的 組成邵分加入具有 記錄加入該BOM、 指示上述緩衝區中包含的序連結構數目之一值 BOM組成部分之名稱及位置。O:\85\85156 Split.DOC -77- 1255443 method. An API implementation is used to create an SC(s) encapsulation API that accepts the following parameters as input: a tool interface, and one of the buffers of the sequential structure; an instruction is a command to the encapsulation utility News. The encapsulation tool program command includes the SC(s), an associated BOM record, and the addition of the record to the key description portion. Each node in the buffer and the component SHA required to execute the command are added to the name and location of the BOM component having a value added to the BOM, indicating the number of serial structures included in the buffer.
每一位元為供未來使用的一指定旗標或保留旗標之一 值。目前界定了下列的旗標: 指示在處理了緩衝區中所有的結構之後是否應將 該SC(s)的所有組成部分結合放入單一檔案中。於建 立一 SC(s)時,將各組成部分結合成單一物件是最後 一個步驟。 -指示是否在BOM部分中省略了數位簽名。如果該旗 私並未被設定,則在將Sc(s)結合到一單一物件之 前’先計算數位簽名。 在一替代實施例中,若干API執行用來建立— Sc(s)的包 封工具程式介面,而該等API接受下列參數作為輸入: 首先呼叫一 API,以便產生一材料表(BOM)部分,其方式 為傳送一結構之指標,而該結構包含一些用來設定Sc(s) 起始值的資訊,這些資訊包括Sc(s) 3〇河部分中之巧記Each bit is a designated or reserved flag for future use. The following flags are currently defined: Indicates whether all components of the SC(s) should be combined into a single file after all the structures in the buffer have been processed. When building a SC(s), combining the components into a single object is the final step. - Indicates whether the digital signature is omitted in the BOM section. If the flag is not set, the digital signature is first calculated before the Sc(s) is combined into a single object. In an alternate embodiment, several APIs execute an encapsulation tooling interface for creating - Sc(s), and the APIs accept the following parameters as input: first call an API to generate a bill of materials (BOM) portion, The method is to transmit an indicator of a structure, and the structure contains some information for setting the starting value of Sc(s), which includes the scribble in the section of Sc(s) 3
〇:\85\85156 分割 DOC -78- 1255443 錄、用於BOM邵分的名稱、尋找將被加入的組成部分之 一系統預設位置、及一旗標值。該API送回一個用於後 續各包封工具程式API之SC(s)識別值(handle)。 該包封工具程式具有一個當將一組成部分加入一 sc(s) 時即使用之API。該API接受一先前包封工具程式Αρι於 先前送回的一 SC(s)識別值、包含與所加入的組成部分有 關的資訊之一結構之一指標、以及一旗標值。與所加入 的組成部分有關的資訊包括··該組成部分之名稱及位 置、用於該組成部分的BOM之名稱、所加入的該組成部 分之類型、該組成部分的一雜亂值、及旗標等。 在將所有的組成部分加入該SC(s)之後,呼叫一包封工具 程式API,以便將其中包括B〇M部分的所有組成部分包 封到一單一 SC(s)物件中,而該單一 Sc(s)物件通常是一 檔案。該API接受··一先前包封工具程式Αρι於先前送回 的一 SC(s)識別值、用於經過包封的Sc(s)之名稱、一個 具有用來簽認該SC(s)的資訊的一結構之指標、以及一旗 標值。 、 匕封工具私式或呼叫包封工具程式的實體可利用一 Sc(〇 樣板來建立一 SC(s)。Sc(s)樣板具有用來指定正在建立的 該S C (s)中所需的各組成部分及記錄之資訊。樣板亦可指定 用;將對稱金瑜623及各加密組成邵分加密的加密方法及 金鑰參考位置。 包封工具程式具有一個用來打開一 Sc(s)之Αρι。打開一 SC(s)即是取得一 Sc(s)並將該%⑷分開成其個別組成部分〇:\85\85156 Split DOC -78- 1255443 Record, name for BOM SHARING, a system preset position for finding the components to be added, and a flag value. The API returns a SC(s) identification value for each subsequent wrapper API. The encapsulation utility has an API that is used when a component is added to a sc(s). The API accepts a SC(s) identification value previously sent back by the previous encapsulation tool, an indicator containing one of the structures associated with the added component, and a flag value. Information relating to the components added includes: the name and location of the component, the name of the BOM for the component, the type of component to which it is added, a hash value of the component, and the flag Wait. After all the components are added to the SC(s), an encapsulation utility API is called to encapsulate all components including the B〇M portion into a single SC(s) object, and the single Sc (s) The object is usually a file. The API accepts an SC(s) identification value previously sent back by the previous encapsulation tool, a name for the encapsulated Sc(s), and a signature for the SC(s). A structural indicator of information, and a flag value. The entity of the tool private or call encapsulation utility can utilize a Sc (〇 template to create an SC(s). The Sc(s) template has the required to specify the SC (s) being created. Each component and recorded information. The template can also be specified; the symmetric Jin Yu 623 and each encryption constitute the encryption method and key reference position of the SHAS encryption. The encapsulation tool program has a function for opening a Sc(s). Αρι.Opening an SC(s) is to take a Sc(s) and separate the %(4) into its individual components.
〇:\85\85丨56 分割.DOC 1255443 之程序。然後可呼叫該包封工具程式,以便將自該SC(s) 打開的各加密組成部分解密。 B.材料表(BOM)部分 於建立一 SC(s)時,即由包封工具程式產生BOM部分。該 BOM是一文字檔,包含與該SC(s)有關的資訊、及與該SC(s) 中包含的各組成部分有關之資訊。BOM中的每一記錄是在 單一行上,而一新的行則指示一個新的記錄之開始。BOM 通常包含:每一組成部分之摘要、以及可用來確認該SC(s) 的可信賴性及完整性之一數位簽名。 一 BOM内的記錄類型係如下文所示: IP — IP記錄包含一組名稱=與SC(s)相關的數值對。下列名 稱係保留給SC(s)的一些特性: V major.minor.fix V特性指定SC(s)的版本。這是產生SC(s)時所依據的 SC(s)規格之版本編號。接續的字串應是major.minor.fix 的形式,其中major、minor、及fix分別是主要版本編號、 次要版本編號、及修補層級。 ID值 ID特性是是正在產生該特定SC(s)的實體指定給該SC(s) 的一特有值。該文件的一後續版本中將界定該值的格 式。 T值 該T特性指定SC(s)的類型,而此種類型應為下列所示的 其中之一: O:\85\85156 分割.DOC -80- 1255443 ORD·—訂單 sc(s) 650。 OFF-—報價 sc(s) 641。 LIC-一授權許可 sc(s) 660。 TRA-—交易 sc(s) 640。 MET-—中介資料 sc(s) 620。 CON-—内容 sc(s) 630。 A值 該A特性識別sc(s)的製作者或發行人。製作者/發行人 的身分應是清楚的及(或)登錄到清算所工〇5的。 D值 邊D特性識別SC(s)產生的日期及或有的時間。該值的 形式應為yyyy/mm/dd[@hh:mm[:ss[.fsec]][(TZ)]],用以 代表年/月/日@時/分/秒/十分之一秒(時區)。該值的可 選用部分係以[]字元圍住。 E值 該E特性識別SC(s)終止的日期及或有的時間。該值的形 式應與先前所界定的D特性值所用的形式相同。於可能 時,應將終止曰期/時間與清算所105中存放的曰期/時 間比較。 CCURL 值 該CCURL特性識別清算所1〇5之網址。該值的形式為一 有效的外部網址。 Η值 Η特性識別用來計算sc(s)中包含的各組成部分的訊自 O:\85\85156 分割.DOC -81 - 1255443 摘要之演算法。 D D記錄是一種資料或組成部分資料項記錄,包含用來識 別組成部分的類型、組成部分的名稱、組成部分的(或 有)摘要、以及該組成部分並未包含在SC(s)的一(或有) 指示。在該類型識別碼之後的一負號係用來指示該組 成部分並未包含在該SC(s)中。下列是資料或組成部分 記錄的保留類型: K part_name [digest] 指定金鑰描述部分。 C part_name [digest] 指定用來確認數位簽名之證明書。 T part—name [digest] 指定使用條件部分。 YF part—name [digest] 指定報價SC(s) 641的樣板部分。 YO part_name [digest] 指定ΤΓ單S C (s) 6 5 0的樣板部分。 YL part—name [digest] 指定授權許可SC(s) 660的樣板部分。 ID part—name [digest] 指定被查詢到的内容113項目的内容113之識別_ CH part_name [digest] 指定清算所105證明書部分。 SP part_name [digest] O:\85\85156 分割.DOC -82- 1255443 指定電子數位内容商店103證明書部分。 B part_name [digest] 指定在另一 SC(s)的組成部分或組成部分的子集係包含 在該SC(s)時該另一 SC(s)之一 BOM部分。 BP part_name sc_part_name [digest] 指定在另一 SC(s)係被包含而作為該SC(s)的一單一組 成部分時該另一 SC(s)之一 BOM部分。該sc_part_name 是包含在該SC(s)中且係由該BOM部分界定的SC(s)組 成部分之名稱。與該B0M相同的一B0M亦係包含在由 該sc_part_name參數界定的SC(s)中。 D part_name [digest] 指定一資料(或中介資料)部分。 S S記錄是一個用來界定該SC(s)的數位簽名之一簽名記 錄。係亦下文所述方式規定該數位簽名: S key_identifier signature_string signature_algorithm 該S記錄包含:金鑰識別碼,用以指示該簽名之加密金 鑰;簽名位元串,該簽名字串是對數位簽名位元串之 64基編碼;以及簽名演算法,用以將摘要加密,以便 產生該數位簽名。 C.金鑰描述部分 包封工具程式產生金鑰描述部分,以便提供與將加密組 成部分解密所需的加密金鑰有關之資訊。可將加密組成部 分包含在所建立的該SC(s)中,而加密組成部分也可放在被 所建立的SC(s)參照到的其他SC(s)中。金鑰描述部分是一 O:\85\85156 分割.DOC -83 - 1255443 文字檔,包含與加密金鑰及用到加密金鑰的組成部分有關 之資訊記錄。金输描述部分中的每一記錄是在單行上,而 一新行則指示一個新記錄的開始。 下列記錄類型係用於一金鑰描述部分内,且係界定如 下: K encrypted_part—name; result_part—name;part一encryption—algorithm_identifier; public_key_identifier key_encryption_algorithm 及 encrypted_symmetric—key。 K記錄指定可包含在該SC(s)中或可包含在該記錄所參 照的另一 SC(s)中之一加密組成部分。該 encrypted_part_name是該SC(s)的一組成部分之名稱、 或指向另一 SC(s)的加密組成部分之名稱。 result_part_name是提供給解密後組成部分之名稱。 part_encryption—algorithm—identifier 才旨示用來將該、组 成部分加密的加密演算法。public_key_identifier是用 來將對稱金鑰623加密的金鑰之一識別碼。 key_encryption_algorithm_identifier指示用來將對稱金 鑰623加密的加密演算法。加密的對稱金鑰是對用來將 該組成部分加密的加密對稱金鑰623進行一 64基編碼。 VII.清算所105 A.概述 清算所105負責安全數位内容電子式配送系統1 00的權 利管理功能。清算所105的功能包括:電子數位内容商店103 的起動、對内容113權利的驗證、購買交易及相關資訊的完 O:\85\85156 分割.D0C -84- 1255443 整性及可信賴性確認、將内容加密金鑰或對稱金鑰⑶配送 到最終使用者裝置⑽、這些金鑰配送料縱、以及將交易 總結回報到電子數位内容商店103及内容提供者ι〇ι。最終 使用者裝置109利用内容加密金鑰將其通常由一購買交易 而自一授權電子數位内容商店1〇3取得權利的内容ιΐ3解 密。在將一内容加密金鑰傳送到一最終使用者裝置ι〇9之 前,清算所105執行整個驗證程序,以便確認銷售内容ιι3 的貫體惑可信賴性、及最終使用者裝置1〇9對内容ιΐ3之權 利^上述程序要呼叫SC分析工具程式185。在某些組態中, 算所105亦可在其場所代管(c〇_i〇cating)一個用來執行電 子數位内容商店103的信用卡授權及開立帳單功能之系 統,而處理内容Π3的金融結算。清算所1〇5利用諸如 1(:¥^丨£>及丁狀^^1^等的〇£]^套裝軟體來處理信用卡流程 及地方營業稅。 電子數位内容商店實施例 一個想要加入安全數位内容電子式配送系統1〇〇成為一 内容113經銷商的電子數位内容商店1〇3向提供内容113給 安全數位内容電子式配送系統100的一個或多個數位内容 提供者101提出要求。只要雙方達成協議,並沒有限定的提 要求勺程序在諸如S〇ny、Time_等音樂内容所有 人之數位内各所有人決定讓電子數位内容商店1 03銷售其 内奋113時,通常係利用電子郵件聯繫清算所105,要求將 該電子數位内容商店103加入安全數位内容電子式配送系 、、充100數位内容所有人提供電子數位内容商店丨03的名〇:\85\85丨56 The program of dividing .DOC 1255443. The encapsulation utility can then be called to decrypt each encrypted component that was opened from the SC(s). B. Material Table (BOM) Part When creating a SC(s), the BOM part is generated by the encapsulation tool program. The BOM is a text file containing information about the SC(s) and information about the various components included in the SC(s). Each record in the BOM is on a single line, and a new line indicates the beginning of a new record. A BOM typically contains a summary of each component and a digital signature that can be used to confirm the trustworthiness and integrity of the SC(s). The type of record in an BOM is as follows: IP — The IP record contains a set of names = pairs of values associated with SC(s). The following names are reserved for SC(s): V major.minor.fix The V attribute specifies the version of SC(s). This is the version number of the SC(s) specification on which SC(s) is generated. The continuation string should be in the form of major.minor.fix, where major, minor, and fix are the major version number, the minor version number, and the patch level, respectively. The ID value ID attribute is a unique value assigned to the SC(s) by the entity that is generating the particular SC(s). The format of the value will be defined in a subsequent version of the document. T value This T attribute specifies the type of SC(s), and this type should be one of the following: O:\85\85156 Split.DOC -80- 1255443 ORD·—Order sc(s) 650. OFF--quote sc(s) 641. LIC-one license sc(s) 660. TRA--transaction sc(s) 640. MET--intermediary information sc(s) 620. CON--Content sc(s) 630. A value This A characteristic identifies the producer or issuer of sc(s). The identity of the producer/issuer should be clear and/or logged into the Clearing House's work. D value The edge D characteristic identifies the date and/or time the SC(s) was generated. The value should be of the form yyyy/mm/dd[@hh:mm[:ss[.fsec]][(TZ)]], representing the year/month/day @hour/minute/second/tenth Seconds (time zone). The optional portion of this value is enclosed in [] characters. E value This E characteristic identifies the date and/or time of the termination of SC(s). This value should be in the same form as the previously defined D characteristic value. Where possible, the expiration/time should be compared to the period/time stored in the clearing house 105. CCURL Value This CCURL attribute identifies the URL of the clearing house 1〇5. This value is in the form of a valid external URL. Depreciation Η characterization identifies the algorithm used to calculate the components contained in sc(s) from O:\85\85156 splitting .DOC -81 - 1255443. A DD record is a data or component data item record that contains the type used to identify the component, the name of the component, the (or) summary of the component, and the component that is not included in SC(s) ( Or have) instructions. A minus sign following the type identification code is used to indicate that the component is not included in the SC(s). The following are the retention types for the data or component records: K part_name [digest] Specifies the key description portion. C part_name [digest] Specifies the certificate used to confirm the digital signature. T part—name [digest] specifies the conditions of use section. YF part—name [digest] Specifies the template part of the quote SC(s) 641. YO part_name [digest] Specify the template part of the order S C (s) 6 5 0. YL part—name [digest] Specifies the boilerplate portion of the license SC(s) 660. ID part_name [digest] Specifies the identification of the content 113 of the content 113 item that is queried. _ CH part_name [digest] Specifies the certificate portion of the clearing house 105. SP part_name [digest] O:\85\85156 Split.DOC -82- 1255443 Specifies the certificate portion of the electronic digital content store 103. B part_name [digest] specifies the BOM portion of one of the other SC(s) when the subset or component of another SC(s) is included in the SC(s). BP part_name sc_part_name [digest] specifies the BOM portion of the other SC(s) when another SC(s) is included as a single component of the SC(s). The sc_part_name is the name of the SC(s) component contained in the SC(s) and defined by the BOM portion. The same B0M as the B0M is also included in the SC(s) defined by the sc_part_name parameter. D part_name [digest] specifies a data (or mediation) section. The S S record is a signature record of one of the digital signatures used to define the SC(s). The digital signature is also specified in the manner described below: S key_identifier signature_string signature_algorithm The S record contains: a key identification code indicating the encryption key of the signature; a signature bit string, the signature string being a log signature bit a 64-base encoding of the string; and a signature algorithm for encrypting the digest to generate the digital signature. C. Key Description Section The Encapsulation Tool generates the Key Description section to provide information about the encryption key required to decrypt the encrypted component. The encryption component may be included in the established SC(s), and the encryption component may also be placed in other SC(s) to which the established SC(s) is referred. The key description part is an O:\85\85156 split.DOC -83 - 1255443 text file containing information records related to the encryption key and the components used to encrypt the key. Each record in the gold description section is on a single line, and a new line indicates the beginning of a new record. The following record types are used in a key description section and are defined as follows: K encrypted_part_name; result_part_name; part-encryption-algorithm_identifier; public_key_identifier key_encryption_algorithm and encrypted_symmetric_key. The K record specifies one of the encryption components that may be included in the SC(s) or may be included in another SC(s) referenced by the record. The encrypted_part_name is the name of a component of the SC(s) or the name of the encrypted component pointing to another SC(s). Result_part_name is the name given to the component after decryption. Part_encryption—algorithm—identifier is used to indicate the encryption algorithm used to encrypt the part. The public_key_identifier is one of the keys used to encrypt the symmetric key 623. The key_encryption_algorithm_identifier indicates an encryption algorithm used to encrypt the symmetric key 623. The encrypted symmetric key is a 64-base encoding of the encrypted symmetric key 623 used to encrypt the component. VII. Clearing House 105 A. Overview The Clearing House 105 is responsible for the rights management function of the secure digital content electronic distribution system 100. The functions of the clearing house 105 include: activation of the electronic digital content store 103, verification of the rights of the content 113, purchase transaction, and related information. O:\85\85156 split. D0C -84 - 1255443 Integrity and reliability confirmation, The content encryption key or symmetric key (3) is delivered to the end user device (10), these key distributions, and the transaction summary is reported back to the electronic digital content store 103 and the content provider ι〇ι. The end user device 109 decrypts the content ι3, which is normally acquired by an authorized electronic digital content store 1-3, from the purchase transaction using the content encryption key. Before transmitting a content encryption key to an end user device ι 9, the clearing house 105 performs the entire verification process to confirm the trustworthiness of the sales content ιι3, and the end user device 1 〇 9 pairs of content Rights of ιΐ3 The above program calls the SC analysis tool program 185. In some configurations, the bank 105 may also host (c〇_i〇cating) a system for performing credit card authorization and billing functions of the electronic digital content store 103 at its location, while processing content Π3 Financial settlement. The clearing house 1〇5 uses the software such as 1(:¥^丨£> and Ding^^^^^ to process the credit card process and local business tax. The electronic digital content store embodiment wants to join the security The digital content electronic distribution system 1 becomes a content 113 distributor's electronic digital content store 1 to 3 to provide content 113 to one or more digital content providers 101 of the secure digital content electronic distribution system 100. The two parties reached an agreement, and there is no limit to the request. In the digital content of the owner of music content such as S〇ny, Time_, etc., everyone decides to let the electronic digital content store sell the internal 113, usually using electronic The mail contact clearing house 105 requests that the electronic digital content store 103 be added to the secure digital content electronic distribution system, and the 100-digit content owner to provide the electronic digital content store 丨03
O:\85\85156 分割.D0C -85 - 1255443 稱、以及清算所105可能需要用來產生該電子數位内容商店 103的數位證明書之任何其他資訊。以一種安全的方式將該 數位證明書傳送到該數位内容所有人,該數㈣容所有人 然後將藏數位證明書傳送到該電子數位内容商店1〇3。清算 所105維護其已指定的數位證明書之一資料庫。每一證明書 包含·一版本編號、一特有序號、簽名演算法、發出者的 名稱(清算所105的名稱)、該證明書的有效日期範圍、電子 數位内答商店103的名稱、電子數位内容商店1〇3的公共金 鑰、以及利用清算所105的秘密金鑰簽認的所有其他資訊之 一雜亂碼。具有清算所1〇5的公共金鑰621之各實體可確認 該證明書,然後保證一個具有一可利用證明書的公共金鑰 確認的簽名之SC(s)是一有效的sc(s)。 在電子數位内容商店1 〇3自數位内容所有人接收到清算 所105為其產生的數位證明書、及用來處理sc⑷的必要工 具程式之後,即可開始提供最終使用者可購買的内容ιΐ3 <報價。電子數位内容商店1〇3在交易Sc(s) 64〇中加入其 證明書,並利用其數位簽名643簽認該Sc(s)。最終使用者 裝置109首先檢查數位證明書廢止清單,然後利用清算所 105的公共金鑰621來驗證電子數位内容商店1〇3的數位證 明書中之資訊,而驗證該電子數位内容商店1〇3是安全數位 内答電子式配送系統1〇〇上的内容113之一有效配銷商。清 算所105維濩數位證明書廢止清單。可將該廢止清單包含 在清算所105產生的一授權許可%⑷66〇中,作為該sc(s) 的一個組成部分。最終使用者裝置1〇9保留一份廢止清單, O:\85\85156 分割.DOC -86- 1255443 因而可利用該廢止清單作為電子數位内容商店1〇3數位證 明書確認的一部分。當最終使用者裝置109接收一授權許可 SC(s) 660時,即決定該SC(s)中是否包含一新的廢止清單, 如果確係如此,則更新最終使用者裝置丨〇9上的本機儲存之 廢止清單。 B·權利管理程序 報價SC(s)分析 一最終使用者自電子數位内容商店1 〇3接收到包含報價 SC(s) 641的交易sc(s) 64〇之後,清算所1〇5自該最終使用 者接收一訂單SC(s) 650。訂單SC(s) 050包含:若干包含與 内各113及其使用相關的資訊之組成部分、與銷售内容1 ^ 3 的電子數位内容商店1 〇3有關之資訊、以及與購買内容丨j 3 的最終使用者有關之資訊。在清算所105開始處理訂單Sc(s) 650中的資訊之前,清算所1〇5先執行某些程序,以便確保 SC(s)是事實上有效的且並未以任何方式篡改該sc(s)包含 的資料。 確認 清算所105驗證數位簽名而開始訂單sc(s) 650的確認, 清算所105然後驗證訂單SC(s) 650各組成部分的完整性。 為了確認數位簽名,在有簽名的情形下,清算所1〇5首先利 用所包含的簽認實體之公共金鑰661將該簽名本身的内容 63 1解密。(該簽認實體可以是内容提供者丨〇卜電子數位内 客商店103、最終使用者裝置1〇9、或上述各組成部分的任 何組合。)清算所105然後計算該SC(s)的各序連組成部分摘 ΟΛ85\85156 分割.D0C -87- 1255443 要 < 摘要,並將所計算出的該摘要與該數位簽名的解密後 内谷113比較。如果這兩個值相符,則該數位簽名是有效 的。為了驗證每一組成部分的完整性,清算所1〇5計算該組 成部分的摘要,並將所計算出的該摘要與B〇M中的數位值 比較。清算所105遵循相同的程序來驗證訂單Sc(s) 65〇内 包含的中介資料及報價Sc(s) 641部分的數位簽名及組成 邵分之完整性。 父易及報價SC(s) 641數位簽名的驗證程序也間接地驗 從笔子數位内各商店1 〇3係為安全數位内容電子式配送系 統100所授權。上述程序係基於清算所105是證明書的發出 者。此外,清算所105亦可利用電子數位内容商店丨〇3的公 共金瑜而成功地驗證交易SC(s) 640及報價SC(s) 641之數 位簽名,但是只有在簽認該Sc(s)的實體具有相關聯的秘密 金鑰之所有權時,才能如此進行。請注意,清算所丨〇5並不 需要設有電子數位内容商店1〇3的本機資料庫,這是因為該 商店係利用清算所的公共金鑰來簽認交易Sc(s) 640及報 價SC(s) 641之公共金鑰。 清算所1 05然後確認最終使用者購買的内容n 3之商店 使用條件519,以便確保該商店使用條件519係包含在中介 資料SC(s) 620中設定的限制之内。如前文所述,中介資料 SC(s) 620係包含在訂單sc(s) 650之内。 金鑰處理 在成功地完成訂單SC(s) 650的可信賴性及完整性檢 且、黾子數位内各商店1 〇 3的確認、以及商店使用條件5 19 〇:\85\85丨56 分割.DOC -88 - 1255443 的確認之後,清算所1〇5執行加密後對稱金鑰623及浮水印 指令之處理。訂單SC(S) 650的中介資料Sc(s) 62〇部分通常 具有數個對稱金鍮623 ’而這些對稱金鑰623係位於利用清 算所105的公共金鑰621加密之金鑰描述部分。於產生中介 資料SC(S) 620時,内容提供者101執行對稱金鑰623之加 密。 一個對稱金鑰623係用來將浮水印指令解密,且其他的 對稱金鑰係用來將内容113及任何加密的中介資料解密。内 容113可代表單-首歌曲或-CD上的所有歌曲,所以不同 的對稱金鑰623可用於每一首歌曲。浮水印指令係包含在訂 單SC(S) 650中的中介資料SC⑷62〇部分内。内容ιΐ3及加 密後中介資料是存放在代管内容網站lu上的内容%⑷ 630中。内容SC(s) 630内的加密後内容113及中介資料部分 之網址及組成部分名稱係包含在訂單叱⑷65〇的中介資 料SC(s) 620邵分之金鑰描述部分。清算所1〇5利用其秘密 金鑰將對稱金鑰623解密,然後利用最終使用者裝置1〇9的 公共金鑰661將每一該等對稱金鑰加密。係自訂單sc^ 650擴取最終使用者裝置⑽之公共金鑰66i。新加密的對稱 金鑰623係包含在清算所1〇5送回到最終使用者裝置的 授權許可SC(s) 660之金鑰描述部分。 在處理對稱金鑰623的這段時間中,清算所1〇5可能想要 修改浮水印指令。如果發生此種情形,則在清算所105將對 稱金瑜623解密之後’將浮水印指令修改並重新加密。新的 /予水印指令被包含在傳送回最終使用者裝置⑽的授權許O:\85\85156 Split.D0C -85 - 1255443 The title, and any other information that the clearinghouse 105 may need to generate the digital certificate for the electronic digital content store 103. The digital certificate is transmitted to the digital content owner in a secure manner, the number (4) for the owner and then the digital certificate is transmitted to the electronic digital content store 1〇3. The clearing house 105 maintains a database of one of its designated digital certificates. Each certificate contains a version number, a unique serial number, a signature algorithm, the name of the issuer (the name of the clearing house 105), the effective date range of the certificate, the name of the store 103 in the electronic number, and the electronic digital content. The public key of the store 1-3 and one of all other information signed by the secret key of the clearing house 105 are garbled. Each entity having the public key 621 of the clearinghouse 1-5 can confirm the certificate and then ensure that the SC(s) of the signature confirmed by the public key having a usable certificate is a valid sc(s). In the electronic digital content store 1 〇 3 from the digital content owner to receive the digital certificate generated by the clearing house 105, and the necessary tools for processing sc (4), you can start to provide the content that the end user can purchase ιΐ3 < ; Quote. The electronic digital content store 1〇3 adds its certificate to the transaction Sc(s) 64〇, and uses the digital signature 643 to sign the Sc(s). The end user device 109 first checks the digital certificate revocation list, and then uses the public key 621 of the clearing house 105 to verify the information in the digital certificate of the electronic digital content store 1〇3, and verifies the electronic digital content store 1〇3 It is one of the effective distributors of the content 113 on the electronic distribution system in the secure digital. The clearing list of the 105-dimensional digital certificate of the clearing house. The abolition list may be included in a license %(4)66〇 generated by the clearing house 105 as an integral part of the sc(s). The end user device 1〇9 retains an abolition list, O:\85\85156 split. DOC -86-1255443 and thus the abolition list can be utilized as part of the confirmation of the electronic digital content store 1〇3 digital certificate. When the end user device 109 receives an authorization SC(s) 660, it determines whether the SC(s) contains a new revocation list, and if so, updates the end user device 丨〇9. A list of abolitions of machine storage. B. Rights management program quotation SC(s) analysis: After the end user receives the transaction sc(s) 64 containing the quotation SC(s) 641 from the electronic digital content store 1 〇 3, the clearing house 1〇5 from the final The user receives an order SC(s) 650. The order SC(s) 050 includes: a plurality of components including information related to each 113 and its use, information related to the electronic content store 1 〇 3 of the sales content 1 ^ 3, and the purchase content 丨j 3 Information about the end user. Before the clearing house 105 begins processing the information in the order Sc(s) 650, the clearinghouse 1-5 executes certain procedures to ensure that the SC(s) is actually valid and has not tampering with the sc in any way. ) The information contained. Acknowledging that the clearing house 105 verifies the digital signature and begins the confirmation of the order sc(s) 650, the clearing house 105 then verifies the integrity of the components of the order SC(s) 650. In order to confirm the digital signature, in the case of a signature, the clearinghouse 1-5 first decrypts the content 63 1 of the signature itself using the public key 661 of the included signed entity. (The signing entity may be a content provider, an electronic digital guest store 103, an end user device 1〇9, or any combination of the above components.) The clearing house 105 then calculates each of the SC(s) The sequence component extract 85\85156 splits .D0C -87 - 1255443 to < summary, and compares the calculated summary with the decrypted inner valley 113 of the digital signature. If the two values match, the digital signature is valid. To verify the integrity of each component, the clearinghouse 1-5 calculates a summary of the component and compares the calculated summary to the digit value in B〇M. The clearing house 105 follows the same procedure to verify the intermediary information contained in the order Sc(s) 65 and the digital signature of the quoted Sc(s) 641 part and the integrity of the composition. The parental and quotation SC(s) 641 digital signature verification procedure is also indirectly verified from the store number 1 in the pen number for the secure digital content electronic distribution system 100. The above procedure is based on the clearing house 105 being the issuer of the certificate. In addition, the clearing house 105 can also successfully verify the digital signature of the transaction SC(s) 640 and the quote SC(s) 641 by using the public digital Yu of the electronic digital content store ,3, but only after signing the Sc(s) This can only be done if the entity has ownership of the associated secret key. Please note that the clearing house 丨〇5 does not require a local database of the electronic digital content store 1-3, because the store uses the clearing house's public key to sign the transaction Sc(s) 640 and quote SC(s) 641 public key. The clearinghouse 105 then confirms the store usage condition 519 of the content n 3 purchased by the end user to ensure that the store usage condition 519 is included within the limits set in the intermediary material SC(s) 620. As described above, the intermediary material SC(s) 620 is included in the order sc(s) 650. The key processing successfully completes the trustworthiness and integrity check of the order SC(s) 650, the confirmation of each store 1 〇3 in the dice digit, and the store usage condition 5 19 〇:\85\85丨56 segmentation After the confirmation of .DOC -88 - 1255443, the clearinghouse 1〇5 performs the processing of the encrypted symmetric key 623 and the watermark instruction. The intermediate information Sc(s) of the order SC(S) 650 has a plurality of symmetric keys 623' and the symmetric keys 623 are located in the key description portion encrypted by the public key 621 of the clearing house 105. When the intermediary material SC(S) 620 is generated, the content provider 101 performs encryption of the symmetric key 623. A symmetric key 623 is used to decrypt the watermark instructions, and other symmetric keys are used to decrypt the content 113 and any encrypted mediation data. Content 113 can represent a single-song song or all songs on a -CD, so a different symmetric key 623 can be used for each song. The watermarking instruction is contained in the intermediate material SC(4) 62〇 portion of the order SC(S) 650. The content ιΐ3 and the encrypted mediation data are stored in the content (4) 630 on the hosted content website lu. The encrypted content 113 in the content SC(s) 630 and the website and component names of the intermediate data portion are included in the key description portion of the intermediary information SC(s) 620 of the order 叱(4)65〇. The clearinghouse 1-5 decrypts the symmetric key 623 using its secret key and then encrypts each of the symmetric keys using the public key 661 of the end user device 1〇9. The public key 66i of the end user device (10) is extended from the order sc^ 650. The newly encrypted symmetric key 623 is included in the key description portion of the license SC(s) 660 that is sent back to the end user device at the clearinghouse 1-5. During the processing of the symmetric key 623, the clearinghouse 1〇5 may want to modify the watermarking instructions. If this happens, the watermark instruction will be modified and re-encrypted after the clearing house 105 will decrypt the name Jinyu 623. The new / pre-watermark command is included in the authorization to transmit back to the end user device (10)
ΟΛ85\85156 分割.DOC -89 - 1255443 可SC(s) 660内’作為該SC(s)的一個組成部分。 如果授權許可SC(s) 660的所有處理都是成功的,則清算 所105將一授權許可SC(s) 660送回到最終使用者裝置 1 〇9。最終使用者裝置! 09利用授權許可Sc(s) 66〇資訊下載 内客SC(s) 630,並存取加密的内容n3及中介資料。最終 使用者裝置1 09亦執行浮水印指令。 如果清异所105無法成功地處理訂單sC(s) 650,則將一 HTML網頁送回到最終使用者裝置丨〇9,並在網際網路瀏覽 器視窗中顯示該HTML網頁。該HTML網頁指示清算所105 無法處理該交易的原因。 在一替代實施例中,如果使用者在内容丨13銷售所設定 的發行日之前,已購買了該内容113的一份拷貝,則傳送回 不具有對稱金鑰623之授權許可Sc(s) 66〇。在發行日當天 或發行日之後,將授權許可Sc(s) 66〇傳送回清算所ι〇5, 以便接收對稱金鑰623。舉例而言,内容提供者ι〇ι可讓使 用者在-首新歌的發行曰之前先下載該首新歌,讓使用者 在内谷提供者101設定的發行日之前可先下載該歌曲,並準 備好播放該歌曲。此種方式可在發行日立即該起内容⑴, 而播眉在發行日為頻寬及下載時間而煩惱。 C·特定國家參數 算所105可選擇使用最終使用者裝置109的網域名稱 (或有的)仏用卡帳單開立地址來決定最終使用者的國家 4置如果居最終使用者所居住的國家對内容⑴的鎖售有 任何限制’則清算所1()5在將授權許可sc(s) _傳送到最ΟΛ85\85156 split.DOC -89 - 1255443 can be SC(s) 660 within 'as part of this SC(s). If all processing of the license SC(s) 660 is successful, the clearinghouse 105 sends a license SC(s) 660 back to the end user device 1 〇 9. End user device! 09Using the license Sc(s) 66〇 information downloading the guest SC(s) 630, and accessing the encrypted content n3 and the intermediary data. Finally, the user device 109 also executes a watermarking instruction. If the clearing house 105 cannot successfully process the order sC(s) 650, an HTML web page is sent back to the end user device 丨〇9 and the HTML web page is displayed in the internet browser window. The HTML page indicates why the clearinghouse 105 is unable to process the transaction. In an alternate embodiment, if the user has purchased a copy of the content 113 prior to the release date set by the content 丨13 sale, a license is issued that does not have the symmetric key 623 Sc(s) 66 Hey. On the issue date or after the issue date, the license Sc(s) 66〇 is transmitted back to the clearing house ι〇5 to receive the symmetric key 623. For example, the content provider ι〇ι allows the user to download the first new song before the release of the first new song, and the user can download the song before the release date set by the inner provider 101, and prepare Play the song well. In this way, the content (1) can be immediately issued on the issue date, and the eyebrows are troubled by the bandwidth and download time on the issue date. C. The country-specific parameter database 105 may choose to use the domain name (or privilege) of the end user device 109 to determine the end user's country 4 if the end user resides. The state has any restrictions on the sale of the content (1) 'The clearing house 1 () 5 in the transfer of the license sc (s) _ to the most
O:\85\85156 分割.DOC 1255443 終使用者裝置109之前,先確保所處理的交易並未達反任何 這類限制。也希望電子數位内容商店1〇3執行與清算所 相同的檢查,而加入將内容113配送到各國家的管理。如果 電子數位内容商店103並未顧及内容提供者1〇1所設定的特 足國彖規則,則清算所1 〇5執行其所能執行的所有檢查。 D.稽核記錄及追縱 清算所105針對於内容113購買交易及報告要求交易期 間所執行的每一作業維護這些作業的資訊之一稽核記錄 1 50。該貝汛可用於諸如安全數位内容電子式配送系統1 足稽核、報告的產生、及資料採擷(data㈤匕比幻等的多種 用途。 清算所105也為電子數位内容商店1〇3維護帳單開立子 系統182中的帳戶餘額。數位内容所有人將電子數位内容商 店103的足價結構提供給清算所1〇5。該資訊可包括電子數 位内容商店103必須接受的現行特價、量販折扣、及帳戶不 足額限制等的資訊。清算所1()5利用該定價資訊來追縱電子 數位内容商店H)3的帳戶餘額,並確保這些帳戶餘額不會超 過内容提供者101所設定的不足额限制。 清算所105通常記錄下列的作業·· 取終使用者裝置109對授權許可sc(s)66〇的要求 當清算所H)5處理帳單開立時的信用卡授權號碼 將授權許可SC(s) 660傳送到最終使用者裝置丨⑽ 對報告的要求 最終使用者通知内容SC(s) 63〇及授權許可sc(s) _O:\85\85156 Splitting .DOC 1255443 Before the end user device 109, make sure that the transaction being processed does not meet any of these restrictions. It is also desirable that the electronic digital content store 3.1 performs the same checks as the clearing house, and joins the management of distributing the content 113 to each country. If the electronic digital content store 103 does not take into account the special international rules set by the content provider 1.1, the clearinghouse 1 〇 5 performs all the checks it can perform. D. Audit Recording and Tracking The Clearing House 105 maintains one of the audit information for each of the operations performed during the transaction and the reporting of the required transactions during the transaction. The Bessie can be used for a variety of purposes such as secure digital content distribution system, report generation, and data mining (data). The clearing house 105 also maintains bills for electronic digital content stores. The account balance in the subsystem 182. The digital content owner provides the full price structure of the electronic digital content store 103 to the clearinghouse 1-5. The information may include current specials, volume discounts, and electronic discounts that the electronic digital content store 103 must accept. Information such as the account limit limit. The clearing house 1()5 uses the pricing information to track the account balance of the electronic digital content store H)3, and ensures that the account balance does not exceed the insufficient limit set by the content provider 101. . The clearing house 105 usually records the following operations: • The request of the end user device 109 for the license sc(s) 66〇. When the clearing house H) 5 processes the bill, the credit card authorization number when the bill is opened will be authorized SC(s) 660 is transmitted to the end user device (10) The request for the report The end user notifies the content SC(s) 63〇 and the license sc(s) _
〇八85\85!56 分割,DOC _ 91 - 1255443 已接收到且已確認 /同算所105通常針對一授權許可sc(s) 660記錄下列資 訊: 要求的日期及時間 購買交易的日期及時間 所講買項目之内容識別碼 内容提供者1 0 1之識別碼 商店使用條件5 1 9 浮水印指令修改 私子數位内容商店1〇3所加入的交易識別碼535 電子數位内容商店1〇3之識別碼 最終使用者裝置1 〇9之識別碼 取終使用者的信用卡資訊(在清算所1〇5處理帳單開立 的情形下) 清算所針對最終使用者信用卡的確認而記錄下 列資訊: 要求的日期及時間 向信用卡收費的金額 所購買項目之内容識別碼 電子數位内容商店;I 03所A θ 占所加入的又易識別碼535 電子數位内容商店103之識別碼 最終使用者之識別碼 最終使用者的信用卡資訊 自信用卡清算銀行接收的授權號碼 〇:\85\85丨 56 分割.D〇c •92- 1255443 當將一授權許可sc⑷66〇傳送 欠 時’清算所105通常記錄下列資訊:、,、使用者裝置109 要求的日期及時間 所購買项目之内容識別碼 内容提供者1〇1之識別碼 使用條件5 1 7 入的交易識別碼535 識別碼 通常記錄下列資訊·· 電子數位内容商店103所加 電子數位内容商店103之 最終使用者之識別碼 當提出對一報告的要求時 要求的日期及時間 傳送出報告的日期及時間 所要求的報告之類型 用來產生報告之參數 要求報告的實體之識別碼 E·結果回報 清算所105利用其在最終使用者 資祝來產^間所記錄的 未產生報° °内容提供者⑼及電子數位内容商店103 可經由-付款驗證介面183向清算所⑽要求交易報告’因 :以上兩者可使其本身的交易資料庫與清算所⑼記錄的 資訊-致。清算所1()5亦可較期的報告提供給内容提供者 101及電子數位内容商店1〇3。〇八85\85!56 split, DOC _ 91 - 1255443 Received and confirmed/same office 105 usually records the following information for a license sc(s) 660: Date and time of the requested date and time of purchase The content identification code content provider of the purchased item 1 0 1 identification code store usage condition 5 1 9 watermark instruction modification private number digital content store 1〇3 joined transaction identification code 535 electronic digital content store 1〇3 Identification code End user device 1 〇 9 identification code END end user's credit card information (in the case of clearing house 1 〇 5 processing bills) The clearing office records the following information for the end user credit card confirmation: Date and time the amount charged to the credit card The content identification code of the item purchased by the electronic digital content store; I 03 A θ accounted for the added easy identification code 535 Electronic number content store 103 identification code End user identification code final The user's credit card information is received from the credit card clearing bank. Authorization number: \85\85丨56 Division.D〇c •92- 1255443 When a license is granted sc(4)66 The owed time 'clearing house 105 usually records the following information:,, the date and time requested by the user device 109, the content identification code of the purchased item, the content provider 1-1, the identification code usage condition 5 1 7 entered transaction identification code 535 The identification code usually records the following information: · The number of the end user of the electronic digital content store 103 plus the electronic digital content store 103. The date and time required to transmit the report when the request for a report is requested. The type of report used to generate the parameters of the report requires the identification of the entity of the report. E. The result returns to the clearing house 105 using its unreported content provider (9) and electronic digits recorded in the end user's contribution. The content store 103 can request a transaction report to the clearing house (10) via the payment verification interface 183 because: the above two can make their own transaction database and the information recorded by the clearing house (9). The clearing house 1 () 5 can also provide a report to the content provider 101 and the electronic digital content store 1〇3.
清算所1G5界定-安全電子介面,可讓内容提供者1Q1及 子數位内容商店103要求及接收報告。報告要求包The Clearing House 1G5 defines a secure electronic interface that allows content providers 1Q1 and sub-digit content stores 103 to request and receive reports. Report request package
O:\85\85156 分割.DOC -93- 1255443 含一個由清算所105指定給提出要求的實體之證明書。清算 所105利用該證明書及該8(:的數位簽名來驗證該要求係自 技權5體發出。該要求亦包含諸如界定報告的範圍的持 績時間等之參數。清算所105確認該等要求參數,以便確保 提出要求者只能接收其容許持有的資訊。 如果清算所1 05決定報告要求sc⑷是可信賴性的及有效 的,則清算所105產生一報告,並將該報告包封到—報告 SC(s),以便傳送到提出該要求的實體。可以自動的方式在 指定的時間間隔產生某些報告,並將這些報告儲存在清算 所105 ’因而在接收到一要求時,可立即傳送該等報告。在 本文件的後續版本將指定報告中資料的格式。 F ·帳單開立及付款驗證 清算所105或電子數位内容商店1〇3可處理内容113的帳 單開立。在清算所105處理電子内容113的帳單開立之情形 中,電子數位内容商店丨〇3將最終使用者的訂單分成電子式 商品、及(或有的)實體商品。電子數位内容商店1〇3然後將 其中包括最終使用者的帳單開立資訊及需要得到授權的總 金額的交易資訊通知清算所1〇5。清算所1〇5授權該最終使 用者的仏用卡,並將一通知送回到電子數位内容商店丨〇3。 在β异所1〇5對孩最終使用者的信用卡授權的同時,電子數 位内备商店1 03可對所購買的任何實體商品向該最終使用 者的信用卡收費。在最終使用者裝置109下載某一電子項目 之後,即通知清算所丨〇5,而可向該最終使用者的信用卡收 費。上述步驟即是可在最終使用者裝置1〇9上使用内容113O:\85\85156 Division.DOC -93- 1255443 contains a certificate assigned by the clearing house 105 to the requesting entity. The clearing house 105 uses the certificate and the 8 (: digital signature to verify that the request is issued from the technical right body 5. The request also includes parameters such as the duration of the performance defining the scope of the report, etc. The clearing house 105 confirms such Parameters are required to ensure that the requester can only receive information that it is allowed to hold. If the clearing house determines that the report requires sc(4) to be trustworthy and valid, the clearing house 105 generates a report and encapsulates the report. To report the SC(s) for transmission to the entity making the request. Some reports can be generated at specified intervals in an automated manner and stored in the clearing house 105' and thus upon receipt of a request, The reports are transmitted immediately. The format of the materials in the report will be specified in subsequent versions of this document. F. Billing and Payment Verification Clearinghouse 105 or Electronic Digital Content Store 3.1 can handle the opening of bills for Content 113. In the case where the clearing house 105 processes the billing of the electronic content 113, the electronic digital content store 丨〇3 divides the end user's order into electronic goods, and (or some) The electronic digital content store 1〇3 then informs the clearing house of the transaction information including the billing information of the end user and the total amount of the authorization to be authorized. The clearing house 1〇5 authorizes the end user Use the card and send a notification back to the electronic digital content store 丨〇 3. At the same time as the credit card authorization of the child end user, the electronic digital store 107 can purchase any of the purchased The physical item charges the credit card of the end user. After the end user device 109 downloads an electronic item, the clearing house 通知5 is notified, and the credit card of the end user can be charged. The above steps are finally available. The content 113 is used on the user device 1〇9
ΟΛ85\85156 分割.DOC -94- 1255443 之前由最終使用者裝置109所執行的最後一步驟。 /電子數位内容商店103處理内容113的帳單開立之情 形中,、在最終使用者裝置109將訂單sc⑷650傳送到清^ 所1〇=則’並不將與交易有關的資訊通知清算所叱。在 :載每—電子項目之後,仍'然由最終使用者裝置1G9通知清 异所105。當清算所1()5收到通知之後,清算所⑽將一通知 傳一送,電予數位内容商店103,使電子數位内容商店如可 向該最終使用者的信用卡收費。 G·重新傳輸 女全數位内容電子式配送系統100提供用來處理内容 :1:的重新傳輸之能力。通常係由一客戶服務介面職行 汶此力兒子數位内容商店103 —使用者介面,而最終使用 者可依照該使用者介面的指引而起動一重新傳輸。最終使 用者連、、泉到購貝内容i i 3的電子數位内容商店⑻網站,以 便要求内容113的重新傳輸。 ㊄取終使用纟因無法下載内纟113或無法使用先前下載 的内合113,而對一先前購買的内容丨丨3項目要求一份新的 拷貝時,即執行内容113的重新傳輸。電子數位内容商店1〇3 决定咸最終使用者是否有資格進行内容丨丨3的一重新傳 知如果涘最終使用者有資格進行一重新傳輸,則電子數 位内合商店103建立一交易Sc(s) ,該交易%⑷包 各所要重新傳的内容丨13項目之報價SC⑷641。將該交 易SC(s) 640傳送到最終使用者裝置1〇9,且由該最終使用 者執仃與一購買交易相同的各步驟。如果對於要進行重新ΟΛ85\85156 Split.DOC -94 - 1255443 The last step performed by the end user device 109. In the case where the electronic digital content store 103 processes the bill opening of the content 113, the end user device 109 transmits the order sc(4) 650 to the clearing station 1 〇 = then 'not the information about the transaction is notified to the clearing house 叱. After the loading of each electronic item, the clearing device 105 is still notified by the end user device 1G9. When the clearing house 1 () 5 receives the notification, the clearing house (10) transmits a notification to the digital content store 103 to cause the electronic digital content store to charge the credit card of the end user. G·Retransmission The full digital content electronic distribution system 100 provides the ability to handle the retransmission of content: 1:. Typically, a customer service interface is used to maintain the son's digital content store 103-user interface, and the end user can initiate a retransmission in accordance with the user interface guidelines. The final user connects to the electronic digital content store (8) website of the i i 3 in order to request the retransmission of the content 113. The fifth re-transmission is performed when the inbound 113 is not available or the previously downloaded inner 113 is not available, and a new copy is requested for a previously purchased content 丨丨3 item. The electronic digital content store 1〇3 determines whether the salty end user is eligible for a re-transmission of the content 丨丨3. If the end user is eligible for a retransmission, the electronic digital matching store 103 establishes a transaction Sc(s ), the transaction% (4) package of each content to be re-transmitted 丨 13 item quotation SC (4) 641. The transaction SC(s) 640 is transmitted to the end user device 1〇9, and the end user performs the same steps as a purchase transaction. If you want to re-do it
ΟΛ85\85156 分割.DOC -95 - 1255443 傳知的内容113項目最終使用者裝置1〇9要用到金鑰庫中之 一亂序編碼的金鑰,則交ssc(s) 640包含用來指示最終使 用者裝置1 09刪除該亂序編碼的金鑰之指令。 在清算所105處理内容113購買的金融結算的情形中,電 子數位内容商店1〇3在交易Sc(s) 64〇中加入一旗標,且該 旗標係承載於訂單sc 650中而傳送到清算所1〇5。清算所 105解譯訂單Sc(s) 65〇中之該旗標,並繼續進行該交易, 而不針對内容113的購買而向最終使用者收費。 VIII·内容提供者 A.概述 士王數位内各電子式配送系統1 〇 〇中之内容提供者1 〇 1 即是數位内容所有人、或擁有内容i i 3的權利之實體。内容 提供者101的任務是準備内容113以供配銷,並使可下載版 的内各113之電子數位内容商店103或零售商可得到與内容 113有關的 <貝訊。為了將最咼的安全性及權利控制提供給内 容提供者101,提供了 一系列的工具程式,使内容提供者1〇1 得以在其營業場所準備其内容113並將其内容113安全地包 封到SC(s),因而當内容113離開内容提供者1〇1的領域時, 藏内容113是安全的,且未經授權者無法接觸或存取該内容 113。此種方式可使内容丨丨3自由地經由諸如網際網路等不 士全的網路配送’而不必害怕駭客或未經授權者將竊取該 内容113。 内容提供者101的工具程式之終極目標在於:準備諸如 一歌曲或歌曲系列等的一内容113,並將該内容113包封到 O:\85\85156 分割.DOC -96 - 1255443 内容SC(s) 630,並且將描述該歌曲的資訊、該歌曲的核准 使用法(内容使用條件517)、及該歌曲的促銷資訊包封到一 中介資料SC(s) 620。為了達到此一目的,提供了下列一組 的工具程式: 工作流程管理程式154-安排處理活動的時程,並管理各 程序之所需同步。 内容處理工具程式155-用來控制其中包括加上浮水印、 預先處理(在一音訊的例子中,任何必需的等化、動態範 圍#1整、或重新取樣)、編碼、及壓縮的内容1 1 3檔案準 備之一組工具程式。 中介資料同化及輸入工具程式161_用來自内容提供者的 資料庫160及(或)協力廠商的資料庫或資料輸入檔案收 集内容113描述資訊及(或)經由操作者的互動而收集該 資訊並提供用來指定内容使用條件5丨7之一組工具程 式。亦提供一種用來擷取或提取諸如CDS或DDP檔的數 位音訊内容之介面。一品質管制工具程式可用來預覽所 準備的内容及中介資料。可進行中介資料所需的任何修 正、或内容的重新提交以供進一步的處理。 SC(s)包封工具程式152-將所有的内容113及資訊加密及 包封’並呼叫SC(s)包封工具程式將該内容113及資訊包 封到SC(s)。 内各傳播工具程式(圖中未示出)_將Sc(s)傳播到諸如代 f内容網站111及電子數位内容商店1 〇3等的指定配銷 中心。 0:\85\8S156 分割 D〇< -97- 1255443 内容促銷網站156_儲存中介資料sc(s) 620及或有的額外 促銷材料,以供電子數位内容商店1〇3下載。 B ·作流程管理程式 該工具程式之目的在於對内容113的處理活動進行時程 安排、追縱、及管理。該應用程式可進行多使用者的存取, 並可在内容提供者1G1的企業内部網路(Intranet)或企業外 部網路(extranet)内的遠端位置上進行内容113的時程安排 及狀態檢查。此種設計容許進行協力式處理,此時多個個 人可以平行之方式對多件内容113進行作業,且可將特定的 責任指^給不同的個人,而且這些個人可散佈在世界各地。 現在請參閱圖8,該圖是對應於圖7的工作流程管理程式 154的主要程序之方塊圖所示之主要程序總結了本節 中所述工具㈣提供的内容⑴處理功能。工作流程管理程 幻54負責心作提供料些㈣,並於完成其現行程序 時,將工作導引到下-個需要的程序。係利用一系列的應 用程式介面(APIs)完成上述步驟,而每一處理工具程式呼 叫該等應用程式介面,以便執行下列事項: 擷取所要處理的次一工作 指示成功地完成一程序 指示並未成功地完成一程序及失敗的原因 提供一程序的過渡狀態(以便起動—些只需要一相依程 序的部分完成之程序) 將註釋加入一個指定程序可取得的產品 工作流程管理程式154也具有一使用者介面,而一例示 O:\85\85156 分割.DOC -98 - 1255443 工作流程管理程式使用者介面700係示於圖7,而該使用者 介面提供了下列功能: 在處理的各階段中可指定並執行系統預設值及條件的 規格之一組態設定控制功能 讓使用者自行耵疋工作流程及自動化處理流程 工作的時程安排 狀態查詢及報告 將一相關聯的工作之註釋或指令加入一個或多個程序 工作管理(亦即暫停、解除、移除、改變優先順序(處理 的順序)) 每一程序具有一個與其相關聯且由工作流程管理工具 程式m管理的传列。向工作流程管理程式154要求工作的 所有程序將使工作流程管理程式154於該程序的相關聯佇 列中目則並無工作時,將該程序(工#程式)暫停在一等候 狀態’或將與該工作有關的且執行該工作的各別程序所需 :所有資訊送回到該程序。如果一程序被暫停於一等候狀 感,則當工作流程管理程式154將—工作置於該程序之佇列 時,該程序即恢復處理。 工作流程管理程式154也根據—組指定的規格而管理處 理的流程或順序。如果内容提供者1〇1有特殊的處理需求或 要設定特定的預設規則,則内容提供者1〇1可自行訂定這些 規則。當-程序報告完成了指定給該程序的工作時,該程 序即將此種狀態通知工作流程管理程式154,且工作流程管 理程式154根據指定的規則而決定要將次一工作放在哪一 O:\85\85 〗56 分割.DOC -99- 1255443 個佇列中。 你亦可在任何處理步驟上,、經由程式Αρι,或以人工方式 匕一乍’瓜各&理程式使用者介面7〇〇或處理器介面,而將 .曰不特殊處理指令或注意事項之註釋附加到產品上。 車佳男她例中,係利用Java來實施工作流程管理程式 154中之久妒& 王序’但是亦可使用諸如C/C++、組合語言 (、Mer)及等效語言等其他的程式語言。我們當了解, 下又中針對工作流程管理程式i 5 4而說明的各程序可在多 種硬體及軟體平a卜勒> 口上執仃。可以在一電腦可讀取的媒體中 成:二用程式之方式配送作為一完整系統或一完整系統構 成私序的邵分程庠> 取的媒體包括限、/: 程式154,而該電腦可讀 、I )诸如網路之電子式配送方式、軟 碟、光碟、及抽換式硬碟機。 η 叫參閱圖8,圖中示出對應於圖7所示工作流程管理 》勺王要私序《方塊圖。下列各節概述每一程序,並 說明每-程序所需的資訊或動作。 “序並 1·產品等候動作/資訊程序8〇1 一旦可取得程序所f的所有資訊,且 成了所有相依的程料,_ ^已成功地元 一特殊㈣係存在心作_管理㈣15 / 係用來存放因缺少h W W特殊仔列 敗而目前無法進行進—步處理的失 :法處理的工作。係將這些工作 作/貝崎㈣丨㈣。 寺候動 態,用以指示該工作正在等# h 作有相關聯的狀 戸止在寺候的動作或資訊、該工作完成ΟΛ85\85156 split.DOC -95 - 1255443 The content of the transmission 113 item end user device 1 要 9 to use one of the keys in the key database, the ssc(s) 640 is included to indicate The end user device 109 deletes the instruction of the out-of-order encoded key. In the case of the financial settlement in which the clearing house 105 processes the content 113 purchase, the electronic digital content store 1-3 adds a flag to the transaction Sc(s) 64, and the flag is carried in the order sc 650 and transmitted to Clearing house 1〇5. The clearing house 105 interprets the flag in the order Sc(s) 65〇 and continues the transaction without charging the end user for the purchase of the content 113. VIII·Content Provider A. Overview The electronic distribution system in the prince digital 1 内容 The content provider 1 〇 1 is the digital content owner or the entity that owns the content i i 3 . The task of the content provider 101 is to prepare the content 113 for distribution, and to enable the electronic content store 103 or the retailer 113 of the downloadable version to obtain the <BeiXun related to the content 113. In order to provide the most secure security and rights control to the content provider 101, a series of tools are provided to enable the content provider 1.1 to prepare its content 113 at its premises and securely encapsulate its content 113. To SC(s), thus when the content 113 leaves the realm of the content provider 1.1, the hidden content 113 is secure and the unauthorized person cannot access or access the content 113. This way the content 丨丨3 can be freely distributed via a non-discrete network such as the Internet without fear that the hacker or unauthorized person will steal the content 113. The ultimate goal of the content provider 101's utility program is to prepare a content 113 such as a song or series of songs and enclose the content 113 to O:\85\85156 partition. DOC -96 - 1255443 content SC(s 630, and the information describing the song, the approved usage of the song (content usage condition 517), and the promotional information of the song are encapsulated into an intermediary material SC(s) 620. To achieve this, a set of tools is provided: Workflow Management Program 154 - Schedules the time of the event and manages the synchronization required for each program. The content processing tool 155 - for controlling content including the addition of a watermark, pre-processing (in the case of an audio, any necessary equalization, dynamic range #1 integer, or resampling), encoding, and compression 1 1 3 files prepare a set of tools. The mediation data assimilation and input tool program 161_ uses the database 160 and/or the third party's database or data input file collection content 113 from the content provider to describe the information and/or collect the information via operator interaction and A set of tools for specifying content usage conditions 5丨7 is provided. An interface for capturing or extracting digital audio content such as CDS or DDP files is also provided. A quality control tool can be used to preview the prepared content and mediation data. Any corrections required for the intermediary material, or resubmission of the content may be made for further processing. The SC(s) encapsulation utility 152 - encrypts and encapsulates all of the content 113 and information and calls the SC(s) encapsulation utility to encapsulate the content 113 and information into the SC(s). The respective communication tool programs (not shown) _ propagate Sc(s) to designated distribution centers such as the f content website 111 and the electronic digital content store 1 〇 3 . 0:\85\8S156 Split D〇< -97- 1255443 Content Promotion Website 156_Store the intermediary information sc(s) 620 and any additional promotional materials for the electronic digital content store to download. B. Process Management Program The purpose of this utility program is to schedule, track, and manage the processing activities of Content 113. The application can be accessed by multiple users and can schedule and status the content 113 on the intranet of the content provider 1G1 or the remote location within the enterprise's external network (extranet). an examination. This design allows for collaborative processing where multiple individuals can work on multiple pieces of content 113 in parallel, and can assign specific responsibilities to different individuals, and these individuals can be distributed around the world. Referring now to Figure 8, the main program shown in the block diagram of the main program corresponding to the workflow management program 154 of Figure 7 summarizes the content (1) processing functions provided by the tool (4) described in this section. The workflow management process 54 is responsible for providing the materials (4) and, when completing their current procedures, directs the work to the next required program. The above steps are performed using a series of application interfaces (APIs), and each processing tool calls the application interfaces to perform the following: Capture the next work instruction to be processed successfully to complete a program indication. The successful completion of a program and the reason for the failure provides a transition state of the program (in order to start - some of the procedures that only need to be completed by a dependent program). The product workflow management program 154 that can be obtained by adding the annotation to a specified program also has a use. Interface, and an example O:\85\85156 split. DOC -98 - 1255443 Workflow Manager user interface 700 is shown in Figure 7, and the user interface provides the following functions: Specify and execute one of the system presets and conditions. The configuration settings control function allows the user to self-process the workflow and automate the process flow. The status query and report will add an associated work comment or instruction. One or more program work management (ie, suspend, release, remove, change priorities) Order)) Each program has a pass associated with it and managed by the workflow management tool program m. All programs requesting work from the workflow management program 154 will cause the workflow management program 154 to suspend the program (work #program) in a waiting state when the program is not working in the associated queue of the program' or The individual procedures associated with the job and performing the work are required: all information is returned to the program. If a program is suspended in a wait state, the program resumes processing when the workflow manager 154 places the work in the queue of the program. The workflow management program 154 also manages the flow or sequence of processing in accordance with the specifications specified by the group. If the content provider 1.1 has special processing requirements or wants to set a specific preset rule, the content provider 1〇1 can customize these rules. When the program report completes the work assigned to the program, the program notifies the workflow management program 154 of such status, and the workflow management program 154 decides which one to place the next job based on the specified rules: \85\85 〗 56 Split .DOC -99 - 1255443 in the queue. You can also use the program Α ι , 或 或 , , , , 瓜 瓜 瓜 瓜 瓜 瓜 瓜 瓜 瓜 瓜 瓜 瓜 瓜 瓜 瓜 瓜 瓜 瓜 瓜 瓜 瓜 瓜 瓜 瓜 瓜 瓜 瓜 瓜 瓜 瓜 瓜 瓜 瓜 瓜 瓜 瓜 瓜 瓜 瓜Comments are attached to the product. In her case, Che Jianan used Java to implement the workflow management program 154. It is also possible to use other programming languages such as C/C++, combined language (Mer) and equivalent languages. We understand that the procedures described for the workflow management program i 5 4 can be executed on a variety of hardware and software flats. It can be distributed in a computer-readable medium: a two-program distribution as a complete system or a complete system to form a private sequence of Shao-Segment 庠> The media taken includes a limit, /: program 154, and the computer Readable, I) electronic distribution methods such as the Internet, floppy disks, CDs, and removable hard drives. η is referred to FIG. 8, which shows a block diagram corresponding to the workflow management shown in FIG. The following sections summarize each procedure and describe the information or actions required for each program. "Order and product waiting for action / information program 8〇1 Once all the information of the program f can be obtained, and it becomes all dependent materials, _ ^ has succeeded in the special (four) system exists _ management (four) 15 / system It is used to store the loss of the processing of the W WW due to the lack of special W WW. The work of the method is to be done / Besaki (four) 丨 (4). The temple dynamics, to indicate that the work is waiting # h Make an action or information related to the temple, and the work is completed.
O:\85\85156 分害IJ.DOC -100- 1255443 : 秸序以及一旦提供了缺少的或額外的資訊之後或 成力地π成了所需的動作之後該工作將要進行的次一程 序。 任何程序完成時,將使工作流程管理程式154檢查該佇 列並决疋藏佇列中是否有任何工作正在等候該程序(動作) 的完成、、或該程序所提供的資訊。如果確係如此,則將該 工作存放在適當的程序佇列中。 2.新内容要求程序8〇2 内谷k ί、者1 〇 1決定其想要以電子方式銷售及配送的那 些產品(例如,一產品可以是—首歌曲或一歌曲集)。工作 流程管理程式154的起始功能是使—操作者得以識別這些 產品,並將這些產品放置在新内容要求程序8〇2的佇列中。 内容提供者UH可利用組態設定選項而指定在產品選擇介 面上提示哪些資訊。輸入足夠的資訊,以便唯一地識別該 產品。亦可選擇包含-些額外的攔位,以便在中介資料提 取的同時,要求以人工方式輸入起動音訊處理階段所需的 資訊。如果並未以人工方式提供,則可選擇自系統預設的 組態環境中搞取該資訊,或自内容提供者的資料庫16〇擴取 該資訊,且係如同在自動中介資料取得程序8〇3中的情形, 係在中介資料處理的第-階段中取得該資訊。内容提供者 的資料庫⑽中的内容113之構造及能力決定内容選擇程 序。 如果指定了執行向内容提供者1〇1的資料庫16〇查詢所 需的必要資訊,則由自動中介資料取得程序8〇3處理該工 O:\85\85156 分割.DOC -101 - 1255443 作。在-音樂實施例中’為了適#安排要進行音訊處理的 產品之時私,將指定產品的類型、所需的壓縮等級、以及 該音訊的P C Μ或W A V檔案名稱。可經由一自訂的查詢介面 或全球資訊網瀏覽器功能,而輸入該資訊作為產品選擇程 序的一部分,或選擇該資訊。該資訊的規格可安排產品的 時程,以便進行内容處理。 該產品選擇使用者介面提供了 一選項,使操作者得以指 定要將產品釋出以供處理、或暫時保留該產品以等候進一 步的資訊輸入。如果保留該產品,則將工作加入新内容要 求程序802的佇列中,而等候進一步的動作來完成資料的輸 入,及(或)釋出該產品以供處理。一旦釋出該產品之後, 工作流程管理程式154即評估所指定的資訊,並決定該工作 準備要轉移到哪些程序。 如果提供了適當的資訊而得以自動化地查詢内容提供 者101的資料庫160,則將工作放到用於自動中介資料=得 程序803之佇列。如果並未針對自動中介資料取得程序肋3 而設定資料庫映射表的組態,則將該工作放到用於手動式 中介資料輸入程序804之佇列(請參閱自動中介資料取得^ 序803節中有關資料庫映射表之細節說明)。 如果指定了用於音訊處理的所需一般性資訊、及加入浮 水印所需的特定資訊,則將該玉作放到料加人浮水印: 序_之传列(内容處理的第—階段)。如果在釋出工作時= 掉了所需的資訊’則將該工作連同用來指示失掉該資訊的 狀態放到產品等候動作/資訊程序丨之佇列。 、 ΟΛ85\85156 分割.D0C -102- 1255443 如果該狀態指示内容113的檔案名稱遺失,例如在内容 113是音訊而PCM或WAV檔遺失的例子中’該狀態可指示 需要掏取内容(或自數位媒體進行數位提取)。音訊處理功 此要求可、纟工由軚準檔案系統介面而存取歌曲檔。如果歌 曲係位於外部媒體或音訊處理工具程式無法純存取的一 構案系統上’則首切該等㈣拷㈣—可存取的樓案系 統。、如果歌曲為數位格式但係存放在⑶或數位錄音帶上, j曰訊處理工具私式可存取的—檑案系統提取這些歌曲。 可存取這些柄案之後’即利用工作流程管理程式使用 者介面7GG來指疋或選擇王作的路徑及檔案名稱,因而在也 已指定加人浮水印程序所需的所有其他資訊的情形下,可 將邊工作釋出到加入浮水印程序。 3·自動中介資料取得程序8〇3 自動中介資料取得程序8G3執行對内容提供者ι〇ι的資 料庫16〇或已輸人資料的—階段性資料庫之—系列查詢,嘗 試以-種自動化的方式取得所能得到的最多產品資訊。在 可將各項目放到自動中介資料取得程序803的㈣之前,自 動中介資料取得程序8〇3先要求下列資訊: 資料庫映射表,該資料庫映射表具有適當的資訊,用以 產生對内容提供者1〇1的資料庫16〇之查詢 執行查詢所需的產品資訊 用來唯 ’疋屋品之適當產品資訊 對内容提供者1〇1的資料庫16〇執行一自動化查詢,以便 取得處理内容113所需之資訊。例如,如果内容⑴是音樂,O:\85\85156 Divide IJ.DOC -100-1255443 : The next step in the work and the work that will be performed once the missing or additional information is provided or after the desired action has been made. Upon completion of any program, the workflow manager 154 checks the queue and determines if any work is waiting for the completion of the program (action), or information provided by the program. If this is the case, store the work in the appropriate program queue. 2. The new content requirement program 8〇2 内谷k ί,者1 〇1Determines which products they want to sell and distribute electronically (for example, a product can be – a song or a collection of songs). The initial function of the workflow management program 154 is to enable the operator to identify these products and place them in the queue of the new content requirement program 8〇2. The content provider UH can use the configuration settings option to specify which information is prompted on the product selection interface. Enter enough information to uniquely identify the product. You can also choose to include some additional blocks to manually enter the information needed to initiate the audio processing phase while the media data is being extracted. If it is not provided manually, you can choose to get the information from the configuration environment preset by the system, or expand the information from the content provider's database 16 and it is like the automatic mediation data acquisition program 8 In the case of 〇3, the information is obtained in the first stage of the intermediary data processing. The structure and capabilities of the content 113 in the content provider's database (10) determine the content selection process. If the necessary information required to perform the query to the database 16 of the content provider 1.1 is specified, the automatic mediation data acquisition program 8〇3 processes the work O:\85\85156 split. DOC -101 - 1255443 . In the music embodiment, the type of product, the desired compression level, and the P C Μ or W A V file name of the audio are specified for the time of the product to be arranged for audio processing. This information can be entered as part of the product selection process via a custom query interface or the World Wide Web browser function, or selected. The specification of the information allows the schedule of the product to be scheduled for content processing. The product selection user interface provides an option for the operator to specify that the product is to be released for processing, or to temporarily retain the product for further information input. If the product is retained, the work is added to the queue of the new content requirement program 802, while waiting for further action to complete the input of the data, and/or release the product for processing. Once the product is released, the workflow management program 154 evaluates the information specified and determines which programs the work is ready to transfer to. If the appropriate information is provided and the database 160 of the content provider 101 is automatically queried, the work is placed in the queue for the automatic mediation data = program 803. If the configuration of the database mapping table is not set for the automatic mediation data acquisition program rib 3, the work is placed in the queue for the manual mediation data input program 804 (see automatic mediation data acquisition procedure 803). Detailed description of the database mapping table). If the required general information for audio processing and the specific information required for adding the watermark are specified, then the jade is placed on the material-added watermark: Sequence _ the pass (the first stage of content processing) . If the required information is lost when the work is released, the work is placed in the queue of the product waiting action/information program together with the status indicating that the information was lost. , ΟΛ85\85156 split. D0C -102-1255443 If the status indicates that the file name of the content 113 is missing, for example, in the case where the content 113 is audio and the PCM or WAV file is missing 'this status may indicate that the content needs to be retrieved (or from the digital The media is digitally extracted). Audio Processing This requirement can be accessed by the file system interface. If the song is located on a structured system that the external media or audio processing tool cannot access purely, then the first (four) copy (four)-accessible building system is cut. If the song is in digital format but stored on a (3) or digital tape, the file system extracts the songs by the privately accessible file system. After accessing these handles, the workflow management user interface 7GG is used to index or select the path and file name of the king, so that all other information required for the watermarking program has been specified. , the side work can be released to join the watermark program. 3. Automatic mediation data acquisition program 8〇3 Automatic mediation data acquisition program 8G3 performs a series of queries on the content provider ι〇ι database 16〇 or the input data-stage database, try to automate The way to get the most product information you can get. Before the items can be placed in the automatic mediation data acquisition program 803 (4), the automatic mediation data acquisition program 8〇3 first requests the following information: a database mapping table having appropriate information for generating the content Provider 1 〇 1 〇 〇 查询 查询 执行 执行 执行 执行 执行 执行 执行 执行 执行 执行 执行 执行 执行 产品 产品 产品 产品 产品 产品 产品 产品 产品 产品 适当 适当 适当 适当 适当 适当 适当 适当 适当 适当 适当 适当 适当 适当 适当 适当 适当The information required for Content 113. For example, if the content (1) is music,
ΟΛ85\85156 分割.DOC -103- 1255443 則執行該杳詢所命、 ^ 一 Ί斤而的為訊可以是專輯名稱,或者可以是内 谷提供者101指定的— ^ ^ ^ 0 UPC、或一特定專輯、或選擇識別 所要取得的資訊中,某些資訊被指定為必須的(請參 閱二自動中介貝料取得程序803的該節所述之細節)。如果 耳仔了所有必須的資訊,則隨即將該工作放到使用條件程 序8 0 5之侍列。如|生 失掉了任何必須的資訊,則將該歌曲放 到手動式巾介料輸人程序_的㈣巾。如果產品等候動 作/貝私序8G1㈣中的任何工作正在等候該步驟中得到 2何資訊、’則更新工作狀態,以便指示不再需要等候該 貝Λ °如果孩王作不再有任何未解決的需求,則將該工作 放到下一個界定的佇列。 4.手動式中介資料輸入程序8〇4 手動式中介資料輸人程序8G4提供了—種讓操作者可輸 入失掉的資訊之方式。該程序並無相依 性。一旦指定了所 有心A、的貝Λ之後,即將該工作放到使用條件程序⑽$。 5·使用條件程序805 使用條件程序8〇5可指定產品使用及限制之規格。使用 條件程序805可能需要某些中介資料。在完成使用條件規格 時’除非要求受監控的發行程序8()6選項,或者受監控的發 订程序8 0 6選項被設定為工作流程管理程式丨$ 4規則中之預 成選項’否則孩工作有資格被放到中介資料^⑷產生程序 、仵幻在此種6形中,該工作被放到受監控的發行程 諸6之仵列。在放到中介資料%⑷產絲序術的件列之 前’工作流程管理程式154將首先保證已滿足了各程序的所ΟΛ85\85156 split.DOC -103- 1255443 Then execute the query, ^ Ί 而 而 can be the album name, or can be specified by the valley provider 101 — ^ ^ ^ 0 UPC, or one Some of the information to be obtained for a particular album, or selection identification, is specified as necessary (see the details described in this section of the second automated mediation acquisition program 803). If you have all the necessary information, then the job will be placed in the queue of the use condition program 805. If the student has lost any necessary information, the song will be placed in the manual wiper input program. If the product waits for action/Bei private order 8G1 (4), any work is waiting for this information to get 2 information, 'update the working status, so as to indicate that it is no longer necessary to wait for the shell. ° If the child does not have any unresolved Demand, then put the work into the next defined queue. 4. Manual mediation data input program 8〇4 Manual mediation data input program 8G4 provides a way for the operator to input lost information. The program is not dependent. Once all the hearts A and Bessie have been specified, the work is placed in the conditional program (10)$. 5. Use condition program 805 Use the condition program 8〇5 to specify the specifications for product use and restrictions. The use of conditional program 805 may require some intermediary material. When the condition specification is completed, 'unless the required release 8 () 6 option is required, or the monitored issuer 8 0 6 option is set to the workflow management program 预 $4 rule in the pre-option' The job is eligible to be placed in the intermediary information ^ (4) to generate the program, the illusion in this 6 shape, the work is placed in the queue of the monitored route. The workflow management program 154 will first ensure that the program has been satisfied before placing it in the mediation data%(4)
O:\85\85156 分割.DOC -104- 1255443 有相純(請參閱下文)。#果並非如a,則將該工作放到 產品等候動作/資訊程序8〇1之佇列中。 6_受監控的發行程序8〇6 受監控的發行程序806可對數位内容產品指定的資訊進 行品質檢查及確認。該程序並無任何相依性。監控者可審 查先可在該產品的任何處理階段中附加到該工作之註釋, 並採取適當的動作。在審查了所有的資訊及註釋之後,監 控者可以有下列的選項: 核准發仃,並將該產品放到中介資料%⑷產生程序⑽7 之佇列中。 C改及(或)加入貪訊,並將該產品放到中介資料^⑷產 生程序807之佇列中。 字、釋加入4工作中,並將該工作重新放到手動式中介 資料輸入程序804之佇列中。 加入狂釋’並將該工作放到產品等候動作/資訊程序咖 之佇列中。 7·中介資料SC(s)產生程序8〇7 中A〜料SC(s)產生程序8〇7將先前收集的所有資訊及中 介資料SC⑷620所需的其他資訊蒐集在—起,並彳叫sc⑷ 包封程序,以便產生中介資料sc(s)62g。該工具程式需要 下列資訊作為輸入·· 必須的中介資料 使用條件 在該產品的所有品質等級的 加密階段中使用之加 密金O:\85\85156 Split.DOC -104- 1255443 is pure (see below). #果不如如, put the work in the queue of the product waiting action/information program 8〇1. 6_Monitored Issuer 8〇6 The Monitored Issuer 806 can perform quality checks and confirmations on information specified by digital content products. The program does not have any dependencies. The monitor can review the comments that can be attached to the work at any stage of the processing of the product and take appropriate action. After reviewing all the information and comments, the supervisor can have the following options: Approve the issue and place the product in the queue of the mediation data %(4) generation program (10)7. C changes and/or joins the greed and places the product in the list of intermediary data^(4) production program 807. The word and release are added to the 4 job, and the job is placed back into the queue of the manual mediation data input program 804. Join the madness and put the job in the queue of product waiting actions/information programs. 7. Intermediary information SC(s) generation procedure 8〇7 A~ material SC(s) generation procedure 8〇7 Collect all the information collected previously and other information required by the intermediary information SC(4)620, and call it sc(4) The program is encapsulated to generate the intermediary material sc(s) 62g. The utility requires the following information as input. · Required Intermediary Materials Conditions of Use The cryptographic keys used in the encryption phase of all quality levels of the product.
〇:\85\85 〗56 分割.DOC 105- 1255443 鑰 藏最後一個相依性要求:相關聯的音訊物件先完成音訊 處理階段’然後才可產生中介資料SC(s) 62〇。在完成中介 資料SC(s)產生程序8〇7時,將根據所指定的工作流程規 則’而將該工作放到最後品質保證程序8丨3之佇列、或内容 傳播程序814之侍列。 8·加入浮水印程序808 加入浮水印程序8〇8將著作權及其他資訊加入内容 113。在内容Π3是一首歌曲的一實施例中,該工具程式需 要下列資訊作為輸入: 歌曲檔案名稱(在專輯的情形中為多個檔案名稱) 浮水印指令 浮水印參數(將包含在浮水印的資訊) 於完成加入浮水印程序8〇8時,如果可取得預先處理及 壓縮程序809所需的輸入,則將該工作放到預先處理及壓縮 程序809之佇列,否則將該工作放到產品等候動作/資訊程 序801之仵列。 9·預先處理及壓縮程序8〇9 、預先處理及壓縮程序809將内容113編碼成指定的壓縮 等級,以便先執行任何必需的預先處理。將一工作放到核 仔列時’實際上產生了多個件列資料項。係針對所需產品 的每^壓縮等級而產生一工作。可以平行方式在多個系統 上執行該編碼程序。該工具程式需要下列的輸入:、、 加入子水印白勺内容之構案名冑(在專輯的情形中為多個〇:\85\85 〗 56 Segmentation. DOC 105- 1255443 The last dependency requirement of the key: the associated audio object completes the audio processing phase first, and then the mediation data SC(s) is generated. Upon completion of the intermediary material SC(s) generation program 8〇7, the job will be placed in the queue of the final quality assurance program 8丨3 or the content distribution program 814 according to the specified workflow rule'. 8. Adding a watermarking program 808 Adding a watermarking program 8〇8 adds copyright and other information to the content 113. In an embodiment where the content Π3 is a song, the utility requires the following information as input: song file name (multiple file names in the case of an album) watermark instruction watermark parameters (to be included in the watermark Information) When the watermarking program 8〇8 is completed, if the input required for the pre-processing and compression program 809 can be obtained, the work is placed in the queue of the pre-processing and compression program 809, otherwise the work is placed on the product. Waiting for the action/information program 801. 9. Pre-Processing and Compression Procedure 8〇9, Pre-Processing and Compression Procedure 809 encodes the content 113 into a specified compression level to perform any necessary pre-processing first. When a job is placed in the checklist, it actually produces multiple items. A job is generated for each compression level of the desired product. This encoding can be executed on multiple systems in parallel. The utility requires the following input: , , the name of the content to which the sub-watermark is added (in the case of an album, multiple
O:\85\85156 分割.DOC -106- 1255443 檔案名稱) 產品的品質等級(可預先設定該品質等級) 壓縮演算法(可預先設定該壓縮演算法) 產品類型(在預先處理器需要的情形下) 於完成該編碼程序時,如果工作流程規則已有設定,則 將工作放到内容品質管制程序81〇之佇列。如果並非如此, 則將這些工作放到加密程序8丨丨之佇列。 如果編碼工具程式的協力供應商並未提供一種顯示諸 如音訊的内容113中已被處理的百分率之方法,或者並未提 供一種指示所選擇的内容113的整個選擇中已被編碼的百 分率 < 万法,則在圖1 1中示出一種決定圖8所示内容預先處 理及壓縮工具程式對數位内容之編碼率。該方法開始時係 在步驟1101中選擇所需的編碼演算法及位元傳輸速率。然 後在步驟1102中進行查詢,以便決定該演算法及編碼速率 疋否具有一預先計算的速率因數。該速率因數是用來決定 對一特定編碼演算法及一特定位元傳輸速率而進行壓縮的 速率之因數。如果並未儲存任何先前計算的速率因數,則 在一段預定的時間中將内容113的一樣本編碼。在較佳實施 例中,該段預定的時間是幾秒鐘。在一段預定的時間中之 該編碼速率是用來計算一個新的速率因數Rnew。在步騾 1108中,於已知時間長度及所編碼的内容113量時,一新的 速率因數RNEW的计算為rnew = (所編碼的數位内容長 度)/(時間長度)。在步驟1109中,將内容113編碼,並利用 先則叶算的速率因數RNEW顯示該編碼狀態。然後在步驟O:\85\85156 Split.DOC -106- 1255443 File name) Product quality level (this quality level can be preset) Compression algorithm (this compression algorithm can be preset) Product type (in case of preprocessor required) Next) When the encoding process is completed, if the workflow rules have been set, the work is placed in the content quality control program 81. If this is not the case, put these tasks in the queue of the encryption program. If the cooperating provider of the encoding tool program does not provide a method of displaying the percentage of content 113 that has been processed, such as audio, or does not provide a percentage of the entire selection indicating the selected content 113, < In the method, a coding rate for determining the content of the pre-processing and compression tool program for the digital content shown in FIG. 8 is shown in FIG. The method begins by selecting the desired encoding algorithm and bit transfer rate in step 1101. A query is then made in step 1102 to determine if the algorithm and encoding rate have a pre-calculated rate factor. The rate factor is a factor used to determine the rate at which a particular coding algorithm and a particular bit transmission rate are compressed. If no previously calculated rate factor is stored, the same version of the content 113 is encoded for a predetermined period of time. In the preferred embodiment, the predetermined period of time is a few seconds. The encoding rate is used to calculate a new rate factor Rnew for a predetermined period of time. In step 1108, a new rate factor RNEW is calculated as rnew = (encoded digital content length) / (time length) for a known length of time and the amount of content 113 encoded. In step 1109, the content 113 is encoded and the encoding state is displayed using a rate factor RNEW calculated by the first leaf. Then at the steps
〇Λ85\85156 分割.DOC -107- 1255443 1107中儲存該編碼速率因數Rnew,以供未來用於該編碼演 算法及編碼位元傳輸速率。在步驟丨丨〇3中,如果所選擇的 演算法具有一個先前計算的速率因數Rstored,則在步驟 1 1 04中將内容11 3編碼,並利用該先前計算的速率因數 Rstored顯π進度。在此同時,在步驟11〇5中為所選擇的該 演算法及位元傳輸速率計算一現行速率因數Rcurrent。在 步驟1106中,利用該現行速率因數11⑽·r來更新所餘存 、速率Q數RNEW 之平均值。速率因數〇Λ85\85156 Segmentation. DOC-107-1255443 1107 stores the coding rate factor Rnew for future use in the coding algorithm and coding bit transmission rate. In step 3, if the selected algorithm has a previously calculated rate factor Rstored, the content 11 is encoded in step 1 104 and the progress rate is plotted using the previously calculated rate factor Rstored. At the same time, an active rate factor Rcurrent is calculated in step 11〇5 for the selected algorithm and bit rate. In step 1106, the current rate factor 11(10)·r is used to update the average of the remaining and rate Q numbers RNEW. Rate factor
的此種反覆更新在每一次持續使用一特定編碼演算法及位 一專輸速率時可使編碼速率的決定變得愈來愈精確。然 後在步驟11G7中儲存該新的速率Rnew,以供未來使用。如 果現行速率因數Rcurrent超出先前儲存的速率因數 到一特定範園或臨界值,則可以不更新Rst〇red。 RED 乂後可k供編碼狀態的顯示。該編碼狀態包括:在現行 的、扁碼速率下,根據編碼速率、及内容113的總檔案長度, =將全邵内容113的百分率顯示為百分率長條。該編碼狀態 Γ Γ包括剩餘的編碼時間。將内容113之總檔案長度除以所 卩十弃的編碼速率Rgurrent,即可計算出其餘的編碼時間。 J將該編碼狀態傳送到另一個可能用Μ該呼叫程序之程 ^此種万式可協助監督程式對各相依程式進行編碼及批 /人余理,以便得到更有效率的處理。我們當了解,在一扶 弋焉施例中,編碼可包含加入浮水印的步驟。 1〇’内各品質管制程序8 10 内容品質管制程序81〇在功能上類似於受監控的發行程This repeated update makes the decision of the coding rate more and more accurate each time a specific coding algorithm and a bit rate are continuously used. The new rate Rnew is then stored in step 11G7 for future use. If the current rate factor Rcurrent exceeds a previously stored rate factor to a particular range or threshold, Rst〇red may not be updated. RED can be used to display the encoding status. The encoding status includes, at the current, flat code rate, based on the encoding rate, and the total file length of the content 113, = the percentage of the full-shortage content 113 is displayed as a percentage bar. The encoding status Γ Γ includes the remaining encoding time. By dividing the total file length of the content 113 by the code rate Rgurrent discarded, the remaining encoding time can be calculated. J transfers the encoding status to another process that may be used for the calling program. This type of program assists the supervisor in encoding and batching the dependent programs for more efficient processing. We understand that in a supportive example, the encoding can include the step of adding a watermark. 1〇's quality control procedures 8 10 Content quality control procedures 81〇 functionally similar to monitored transmissions
〇慨85丨56分割.DOC -108- 1255443 ㈣6。該程序是-可供選用的步驟,可讓使用者確認至目 則為止所執行的内容處理之品質。該程序除了加入浮水印 程序808及預先處理及壓縮程序8()9的編碼部分的完成之 外,對其他程序並無相依性。於完成内容品質管制程序㈣ 時,可以有下列的選項: 可釋出工作,並將這些工作放到加密程序811的件列。 可附加註釋,並可將-個或多個工作重新放到預先處理 及壓縮程序809的佇列。 最後一個選項要求歌曲檔的未編碼但加有浮水印之版 本保持在可使用的狀態,直到執行過内容品質管制程序8〇 後為止。 11·加密程序811 加飨程序811呼叫適當的安全數位内容電子式配送權利 管理功能,以便將每一個加上浮水印的/編碼的歌曲檔加 密。該程序除了所有其他音訊處理的完成之外,對其他程 序並無相依性。於完成加密程序8丨丨時,將該工作放到内容 SC(s)產生程序812的佇列。 12·内容SC(s)產生程序812 内各SC(s)產生程序812可能需要將某些中介資料檔案包 含在内容SC(s) 630中。如果需要内容n3以外的檔案,則 收集該等檔案,並呼叫SC(s)包封程序,以便為所產生内容 113(例如一首歌)的每一壓縮等級產生一内容sc(s) 63〇。於 元成内容SC(s)產生程序8 12時,將根據規定的工作流程規 則,而將該首歌放到最後品質保證程序8丨3的佇列或内容傳 〇:\85\85丨56 分割.D〇c -109- 1255443 播程序8 1 4的佇列。 13 ·取後品質保證程序8 1 3 最後品質保證程序8 1 3是一可供選用的步驟,可在相關 聯的中介資料與内容SC(s) 630之間進行一交互對照檢 查’以便驗證上述兩者之間正確地匹配,並驗證内含的所 有貝訊及内谷11 3都是正確的。於芫成最後品質保證程序 8 1 3時’將工作放到内容傳播程序$ 14的仔列。如果發現了 一問題,則在大多數的情形中將把工作重新放到缺點階段 的佇列。在該階段的重作在成本上是高出許多,這是因為 除了修正問題所需的重新處理之外,該產品還必須經過整 個的重新加密及重新包封程序。我們強烈建議利用先前的 各品質保證階段來保證内容113之品質、以及資訊的正確性 及完整性。 14. 内容傳播程序814 内容傳播程序814負責將SC(s)傳送到適當的代管網站。 在成功地傳送SC(s)之後,記錄工作完成狀態,並自侍列中 刪除該工作。如果在傳送sc⑷時發生問題,則在一指定次 數的重新嘗試之後,在工作流程管理程式154中以旗標將該 工作標示為失敗及發生的錯誤。 15. 工作流程規則 圖8所示的工作流程規則係依照下文所述的三種主要系 統而作業: A :工作流程管理程式154 1·新内容要求程序802 ΟΛ85\85156 分刮 DOC -110- 1255443 2 ·產品等候動作/資訊程序8 〇 1 3 ·最後品質保證程序8 i 3 4 ·内容傳播(及通知)程序8 ! 4 B :中介資料同化及輸入工具程式161 1·自動中介資料取得程序803 2·手動式中介資料輸入程序8〇4 3·受監控的發行程序8〇6 4·中介資料SC(s)產生程序8〇7 c ··内容處理工具程式155 1.加入浮水印程序8〇8(需要著作權資料) 2 ·預先處理及壓縮程序8 〇 9 3 ·内容品質管制程序§ 1 〇 4.加密程序811 5·内容SC(s)產生程序812 工作流程 内容113選擇操作者輸入一新產品及, 放到A1的佇列。(新内容要求程序8〇2) ,作開士 A1:當内容⑴選擇操作者將該工作釋出到工作流程管翌 程式154時,則將該將工作放到叫自動中介資料取擇 程序8 0 3)的任列。 A2··來自步驟B1(自動中介資料取得程序8〇3), 或步驟B2(手動式中介資料輸入程序8〇4), 或步驟B3(受監控的發行程序8〇6) 在至步驟Bef〇re(中介資料SC(s)產生程序807)的途Generous 85丨56 split.DOC-108- 1255443 (four) 6. The program is an optional step that allows the user to confirm the quality of the content processing performed up to the point of view. This program has no dependency on other programs except the addition of the watermarking program 808 and the pre-processing and compression of the encoding portion of the program 8()9. When the content quality control program (4) is completed, the following options are available: The work can be released and placed in the item list of the encryption program 811. Comments can be attached and one or more jobs can be relocated to the queue of pre-processing and compression programs 809. The last option requires that the unencoded but watermarked version of the song file remain in a usable state until after the content quality control program has been executed. 11. Encryption Procedure 811 The addition procedure 811 calls the appropriate secure digital content electronic distribution rights management function to encrypt each watermarked/encoded song file. This program has no dependencies on other programs except for the completion of all other audio processing. When the encryption process is completed, the job is placed in the queue of the content SC(s) generation program 812. 12. The SC(s) generation program 812 within the content SC(s) generation program 812 may need to include certain intermediary material files in the content SC(s) 630. If files other than content n3 are needed, the files are collected and the SC(s) encapsulation process is called to generate a content sc(s) for each compression level of the generated content 113 (e.g., a song). . When Yu Yuancheng's content SC(s) generates the program 8 12, the song will be placed in the final quality assurance program 8丨3 according to the specified workflow rules: \85\85丨56 Split .D〇c -109- 1255443 Broadcast program 8 1 4 queue. 13 · Post-Quality Assurance Procedure 8 1 3 Final Quality Assurance Procedure 8 1 3 is an optional step to perform an interactive check between the associated intermediary material and the content SC(s) 630 to verify the above Match the two correctly and verify that all of the included Besun and Neigu 11 3 are correct. Yu Yucheng's final quality assurance program 8 1 3 o's put the work into the content distribution program $ 14. If a problem is found, in most cases the work will be put back into the queue of the shortcomings. The rework at this stage is much more costly because the product must undergo an entire re-encryption and re-encapsulation process in addition to the reprocessing required to correct the problem. We strongly recommend using the previous quality assurance phases to ensure the quality of the Content 113 and the correctness and completeness of the information. 14. Content Delivery Program 814 The Content Delivery Program 814 is responsible for transmitting the SC(s) to the appropriate hosting website. After the SC(s) is successfully transmitted, the work completion status is recorded and the job is deleted from the queue. If a problem occurs while transmitting sc(4), the job is flagged as a failure and an error in the workflow manager 154 after a specified number of retries. 15. Workflow Rules The workflow rules shown in Figure 8 operate in accordance with the three main systems described below: A: Workflow Management Program 154 1·New Content Requirements Program 802 ΟΛ85\85156 Scratch DOC -110- 1255443 2 ·Product waiting action/information program 8 〇1 3 ·Final quality assurance program 8 i 3 4 ·Content distribution (and notification) program 8 ! 4 B : Intermediary data assimilation and input tool program 161 1·Automatic mediation data acquisition program 803 2 ·Manual mediation data input program 8〇4 3·Monitored distribution program 8〇6 4·Intermediary data SC(s) generation program 8〇7 c ··Content processing tool program 155 1. Add watermark program 8〇8 (Requires copyright information) 2 · Pre-processing and compression program 8 〇9 3 · Content quality control program § 1 〇 4. Encryption program 811 5·Content SC(s) generation program 812 Workflow content 113 Select operator to input a new product And, put it in the queue of A1. (New content request program 8〇2), for the player A1: When the content (1) selects the operator to release the work to the workflow management program 154, the work is placed in the automatic mediation data selection program 8 0 3). A2··From step B1 (automatic mediation data acquisition program 8〇3), or step B2 (manual mediation data input program 8〇4), or step B3 (monitored distribution program 8〇6) to step Bef〇 Re (intermediary data SC(s) generation program 807)
0_\狀85i56&;^.DOC '111 - 1255443 中 [需要加密金输]。 來自步驟Before(中介資料SC(s)產生程序807) 在至步驟A3 (取後品質保證程序8 13)或步驟A4(内 容傳播程序814)的途中 [需要内容SC(s) 630]。 來自步驟C1(加入浮水印程序808) 在至步驟C2(預先處理及壓縮程序8〇9)的途中 [需要預先處理及壓縮程序809之中介資料]。 來自步驟CM(加密程序811) 在至步驟C5(内容SC(s)產生程序812)的途中 [需要内容SC(s) 630包封的中介資料]。 來自步騾C5(内容SC(s)產生程序812) 在至步騾A3(最後品質保證程序813)或步驟八4(内 容傳播程序8 14)的途中 [需要中介資料SC⑷62(η。 A3: A4:0_\8i56&;^.DOC '111 - 1255443 [Requires encrypted gold input]. From the step Before (intermediary material SC(s) generation program 807), the process proceeds to step A3 (after the quality assurance program 8 13) or step A4 (content propagation program 814) [requires content SC(s) 630]. From step C1 (adding the watermarking program 808) on the way to step C2 (pre-processing and compression procedure 8〇9) [intermediary data of the pre-processing and compression program 809 is required]. From step CM (encryption program 811) on the way to step C5 (content SC(s) generation program 812) [intermediary material requiring content SC(s) 630 envelope]. From step C5 (content SC(s) generation program 812) on the way to step A3 (final quality assurance program 813) or step eight 4 (content propagation program 8 14) [requires intermediary data SC(4) 62 (η. A3: A4 :
Bl: 在步驟Α3(最後品質保證程序813)之後, 放到佇列Β2(手動式中介資料輸入程序8〇4), 或放到佇列Β3(受監控的發行程序8〇6), 或放到品質保證作業員所要求的佇列。 在步驟Α4(内容傳播程序814)之後, 針對汸產w而執行工作流程管理程式1 5 4。 在步驟B1(自動中介資料取得程序8〇3)之後,Bl: After step Α3 (final quality assurance program 813), put it in the queue 2 (manual mediation data input program 8〇4), or put it in the queue Β3 (monitored release program 8〇6), or put To the ranks required by the quality assurance operator. After the step 4 (content distribution program 814), the workflow management program 1 5 4 is executed for the production of w. After step B1 (automatic mediation data acquisition program 8〇3),
O:\85\85156 分刮.D0C -112- 1255443 如果有步驟c 1 (加入浮水印程序8〇8)所需的中介資 料,則將代表該產品的一資料項放到佇列山。 (亦執行下列邏輯) 如果失掉了任何必須的中介資料,或者如果有指定 給人工中介資料提供者的註釋,則亦將該產品放 到仵列B2(手動式中介資料輸入程序8〇4), 否則如果向該產品要求受監控的發行,則將該產品 放到佇列B3(受監控的發行程序8〇6)。 否則如果該產品針對所有要求的品質等級有來自 内谷處理工具程式丨55的所有資訊,則將該產品 放到佇列Before(中介資料sc⑷產生程序8〇7), σ則將產品的旗標標示為需要加密金鑰,並將該產 品放到佇列Α2(產品等候動作/資訊程序80丨)。 B2: 在ν驟Β2(手動式中介資料輸入程序8〇4)的過程中, 如果尚未執行步騾ci(加入浮水印程序808),且有步 驟C1所需的中介資料,則將一個代表該產品的資 料項放到佇列c 1。 (亦執行下列邏輯) 如果已提供了步驟C2(預先處理及壓縮程序8〇9)所 需的中介資料,貝,J (亦執行下列邏輯) 如果有中介資料同化及輸入工具程式1 6 1可收集的 所有中介資料,則 如果要求該產品的受監控之發行’則將該產品放到O:\85\85156 Scratch. D0C -112- 1255443 If there is a mediation required for step c 1 (adding the watermarking program 8〇8), a data item representing the product is placed on the mountain. (The following logic is also executed.) If any necessary intermediary information is lost, or if there is a comment assigned to the manual intermediary data provider, the product is also placed in queue B2 (manual intermediary data entry program 8〇4). Otherwise, if a monitored release is required for the product, the product is placed in queue B3 (monitored release program 8〇6). Otherwise, if the product has all the information from the Neigu processing tool program 针对55 for all required quality levels, then put the product in the queue (intermediary data sc(4) generation program 8〇7), σ will mark the product Indicated that the encryption key is required and the product is placed in the queue 产品 2 (product waiting action / information program 80 丨). B2: In the process of ν Β 2 (manual mediation data input program 8〇4), if step ci (joining watermarking program 808) has not been executed, and there is mediation data required for step C1, one will represent The item of the product is placed in queue c1. (The following logic is also executed.) If the mediation data required for step C2 (pre-processing and compression program 8〇9) has been provided, Baye, J (also performs the following logic). If there is mediation data assimilation and input tool program 1 6 1 All intermediaries collected, if the required distribution of the product is required, then the product is placed
O:\85\85156 分剖.D〇C -113 - 1255443 仔列B3(受監控的發行程序806) 否則 如果有來自内容處理工具程式155的步驟C4(加 密程序8 11)之所有資訊,則將該產品放到许 列Before(中介資料sc(s)產生程序807 否則將該產品的旗標標示為需要加密金鑰,並將 β產ρα放到彳τ列A2 (產品等候動作/資訊程序 801)。 否則 · 如果中介資料提供者要求一強制性受監控的發 行,則將該產品放到佇列Β3(自動中介資料取得 程序806) 否則不執行任何事項(將該產品保留在佇列Β2(手動 式中介資料輸入程序804)。 B3: 在步驟Β3(^:監控的發行程序8〇6)的過程中, 如果忒作業員正將該產品傳送回步驟Β2(手動式中 _ 介資料輸入程序804),則將該產品放到佇列Β2。 否則如果該作業員釋出該產品,則 ·· 如果有來自内容處理工具程式155的步驟c4(加 密程序811)之所有資訊,則將該產品放到件 列Before(中介資料Sc(s:^生程序) 否則將該產品的旗標標示為需要加密金鑰,並將 該產品放到佇列A2(產品等候動作/資訊程序 801)。 Ί14 -O:\85\85156 Sectional.D〇C -113 - 1255443 A list of B3 (monitored issuer 806) Otherwise, if there is all information from step C4 (encryption procedure 8 11) of the content processing tool 155, then Put the product in the Before (the intermediary data sc(s) generation program 807. Otherwise, mark the product as the encryption key required, and put the β production ρα into the 彳τ column A2 (product waiting action/information program) 801) Otherwise Otherwise, if the intermediary data provider requests a mandatory monitored release, the product is placed in the queue 3 (automatic intermediary data acquisition program 806), otherwise no matter is performed (the product is retained in the queue Β 2 (Manual mediation data input program 804) B3: In the process of step Β3 (^: monitoring release program 8〇6), if the operator is transferring the product back to step Β2 (manual type _ data input) Program 804), the product is placed in the queue 。 2. Otherwise, if the operator releases the product, if there is all information from step c4 (encryption program 811) of the content processing tool 155, then Product placed in the item Before (intermediary data S c(s:^sheng program) Otherwise, the flag of the product is marked as requiring an encryption key, and the product is placed in queue A2 (product waiting action/information program 801). Ί14 -
〇:\85\85丨 56 分:切 D0C 1255443 口則將该產品保留在佇列B3(受監控的發行程序 806) 〇〇:\85\85丨 56 points: Cut D0C 1255443 and keep the product in queue B3 (monitored issuer 806) 〇
Before·在步驟Bef〇re(中介資料%⑷產生程序術)之後, 將居產品的旗標標示為已包封中介資料。 果已G封所有的(產品/品質等級)關係(t叩卜),則 如果内谷提供者101的組態規定要對SC(s)進行品 保,則將该產品放到佇列A3(最後品質保證程 序 813) 否則將該產品放到佇列A4(内容傳播程序814)。 否則將該產品的旗標標示為需要内容113 Sc(s),並 將該產品放到佇列A2(產品等候動作/資訊程序 801) 〇 C1:在步驟C1(加入浮水印程序8〇8)之後, 如果有步騾C2(預先處理及壓縮程序8〇9)所需的中 介資料,則為每一(產品/品質等級)關係產生一資 料項’並將這些資料項放到佇列C2, 否則將該產品的旗標標示為需要預先處理/壓縮之 中介資料,並將該產品放到佇列A2(產品等候動 作/資訊程序801)。 C2··在步驟C2(預先處理及壓縮程序8〇9)之後, 如果内容提供者1〇1的組態規定要進行内容品質管 制程序8 1 0 ’則將該(產品/品質等級)關係放到件 列C3(内容品質控制程序8 1 〇), 否則將該(產品/品質等級)關係放到佇列C4(加密程 O:\85\85I56 分制.DOC -115 - 1255443 序 81 1) 〇 C3:在步驟C3(内容品質管制程序8ι〇)之後,將該(產品/ 品質等級)關係放到佇列C4(加密程序8 1 1)。 C 4:在步驟C 4 (加密程序8 11)之後, 將所需的資訊(亦即程序所產生且用來將内容u 3加 密的對稱金鑰623提供給中介資料同化及輸入工 具程式1 61。 如果有内容SC(s) 630所需的所有中介資料,則將該 (產品/品質等級)關係放到佇列C5(内容sc(s)產生 程序812), 否則將藏產品的旗標標示為需要用於内容Sc(s) 630包封4中介資料,並將該(產品/品質等級)關 係放到仔列A2(產品等候動作/資訊程序8〇 1)。 C5·在步驟C5(内容SC(s)產生程序812)之後, 將品質等、級的旗標標示為已在# 口口口質等級上將内 容113包封。 如果已包封該(產品/品質等級)關係,則 如果將該產品的旗標標示為已包封中介資料,則 如果内容提供者1 〇丨的組態規定要對sc⑷進行 品保,則將該產品放到佇列A3(最後品質保 證程序813) 否則將該產品放輕列A4(内容傳播程序814) 否則將該產品的旗標標示為需要中介資料Sc(s) 620 ’並將該產品放财賴(產品等候動作/Before·Before the step Bef〇re (intermediary data%(4) generation procedure), the flag of the product is marked as the encapsulated intermediary data. If all the (product/quality level) relationships have been sealed, then if the configuration of the Neigu provider 101 requires the SC(s) to be warranted, the product will be placed in the queue A3 ( The final quality assurance program 813) otherwise places the product in queue A4 (content propagation program 814). Otherwise, the flag of the product is marked as the required content 113 Sc(s), and the product is placed in the queue A2 (product waiting action/information program 801) 〇C1: in step C1 (adding the watermarking program 8〇8) Then, if there is an intermediary data required by step C2 (pre-processing and compression program 8〇9), a data item is generated for each (product/quality level) relationship and these items are placed in queue C2. Otherwise, the flag of the product is marked as mediation data that needs to be processed/compressed in advance, and the product is placed in queue A2 (product waiting action/information program 801). C2·· After step C2 (pre-processing and compression program 8〇9), if the content provider 1〇1 configuration specifies that the content quality control program 8 1 0 'to be placed, the (product/quality level) relationship is placed. Go to the column C3 (content quality control program 8 1 〇), otherwise put the (product/quality level) relationship into the queue C4 (encryption procedure O:\85\85I56. DOC -115 - 1255443, order 81 1) 〇C3: After the step C3 (content quality control program 8 〇), the (product/quality level) relationship is placed in the queue C4 (encryption program 8 1 1). C 4: After step C 4 (encryption procedure 8 11), the required information (i.e., the symmetric key 623 generated by the program and used to encrypt the content u 3 is supplied to the mediation data assimilation and input tool program 1 61) If there is all the mediation data required by the content SC(s) 630, then the (product/quality level) relationship is placed in the queue C5 (content sc(s) generation program 812), otherwise the flag of the hidden product is marked For the need to use the content Sc(s) 630 to enclose 4 mediation materials, and put the (product/quality level) relationship into the A2 (product waiting action/information program 8〇1). C5· in step C5 (content After the SC(s) generation program 812), the flag of the quality level is marked as having encapsulated the content 113 on the #口口质质级. If the (product/quality level) relationship is already encapsulated, If the flag of the product is marked as encapsulated intermediary data, if the content provider 1 〇丨 configuration stipulates that the sc(4) is to be warranted, the product is placed in queue A3 (final quality assurance program 813). Put the product in column A4 (content propagation program 814) otherwise mark the product as required Intermediary information Sc(s) 620 ’ and put the product on the money (product waiting action /
O:\85\85i56 ^IJ.DOC -116- 1255443 資訊程序801)。 否 則(尚未包封所有的(產品/品質等級)關係)不執行 任何事項(另一(產品/品質等級)關係觸發—行 動)。 C.中介資料同化及輸入工具程式 影、及等效物等的其他内容類型也是在本發明的適用範圍 及意義内。 中介資料包含用來描述内容113的資料,例如在音樂的 例子中,包含錄音的名稱、藝人、作者/作曲者、製作人、 及錄音長度。下列說明係基於内容113為音樂的情形,但是 熟悉本門技術者當可了解,諸如視訊、程式、多媒體、電 、該子系統整合下列資料:内容提供者1〇1提供給電子數 位内客商店103以便有助於促銷該產品之資料(例如,對於 音樂而言,為該藝人之音樂段落樣本、該藝人之歷史、該 錄音出現的專輯清單、與該藝人及(或)產品相關聯的類 土)内容提供者1 〇 1針對所購買的產品而提供給最終使用 者的資料(例如藝人、製作人、專輯封面、音樂長度)、以 及内么#疋供者1 〇 1想要提供給最終使用者的不同購買選項 (使用^、件5 1 7)。將該等資料包封到一中介資料sc(s) 620, 並使電子數位内容商店103可取得該等資料。為了達到此一 目的,提供了下列的工具程式: 自動中介資料取得工具程式 手動式中介資料輸入工具程式 使用條件工具程式 〇Λ85\85 丨 56 分别 D〇< -117- 1255443 受監控的發行工具程式 這些工具程式使内容提供者1G1得以執行前文所述工作 :::Γ呈式Γ之各程序。在較佳實施例中,本文所述的 :c:二係广人於/:的-工具程式套件,但是亦可使用諸 17 ”’且“吾舌及等效程式語言等的其他程式語言。 1 ·自動中介資料取得工具程式 ^ 口 自動中介資料取得工具程式讓使用者能夠執行前文所 述的自動中介資料取得程序803。該自動中介資科取得工且 程式係用來存取内容提供者101之資料庫160,並在沒有作 業員協助的情形下儘量掏取最多的資料。可以使用組態設 定万法將練序自動化。内容提供者⑻可修改系統預設的 中介資料樣板’以便識助容提供者m想要提供給最終使 用者的資料類型(例如作曲家、製作人、伴奏者、音樂長 度)、以及内容提供者⑻提供給電子數㈣容商店1〇3的促 銷資料⑼如’在-音樂的例子中,為該藝人之音樂段落樣 本、孩藝人之歷史、該錄音出現的專輯清單、與該藝人相 關聯的類型)。系統預設的中介資料樣板包括:最終使用者 裝置109所需的資料攔位、可選擇提供給最終使用者裝置 109的資料欄位、以及目標針對電子數位内容商店⑻且係 用來促銷蟄人、專輯、及(或)單曲的一組樣本資料欄位。 為了自内容提供者101的資料庫16〇提取該等樣板資料 欄位’自動中介資料取得工具程式使用—個將該類資料(例 如作曲者、製作人、蟄人的傳記)映射到該資料庫内可找到 該資料的位置之映射表。每一内容提供者101都協助指定其 O:\85\85156 分;tflj.DOC -118- 1255443 環境中之該映射表。 自動中介資料取得工具程式利用内容提供者丨 及映射表自内容提供者1〇1 ” ㈣任何資料。以自動中介資料取得程細的結 果更新母-產品的狀態。失掉任何必須資料的_產品被放 =手動式中介資料輸人程序_的仵列,否則可將該產品包 封到一中介資料sC(s)62()。O:\85\85i56 ^IJ.DOC -116- 1255443 Information program 801). Otherwise (all (product/quality level) relationships are not encapsulated) Nothing is done (another (product/quality level) relationship trigger-action). C. Intermediary data assimilation and input tool programs, and other content types of equivalents are also within the scope and meaning of the present invention. The mediation material contains material used to describe the content 113, such as in the music example, including the name of the recording, the artist, the author/composer, the producer, and the length of the recording. The following description is based on the case where the content 113 is music, but those familiar with the art can understand that the following materials are integrated: the content provider 1.1 provides the electronic digital guest store. 103 to facilitate the promotion of the product's material (eg, for music, a sample of the artist's music passage, the artist's history, a list of albums that the recording appears, a class associated with the artist and/or product) Content provider 1 〇1 Information provided to the end user for the purchased product (eg artist, producer, album cover, length of music), and inside #疋 donor 1 〇1 want to provide to the final Different purchase options for the user (use ^, piece 5 1 7). The data is encapsulated into an intermediary material sc(s) 620 and made available to the electronic digital content store 103. In order to achieve this goal, the following tools are provided: Automatic mediation data acquisition tool manual manual data input tool program using condition tool program \85\85 丨56 respectively D〇<-117- 1255443 Monitored distribution tool Programs These utilities enable Content Provider 1G1 to perform the work described above::: Programs for presentations. In the preferred embodiment, the :c: is a two-in-one-toolkit, but other programming languages such as 17" and "equivalent language" can also be used. 1 • Automatic mediation data acquisition tool program ^ Port The automatic mediation data acquisition tool program allows the user to execute the automatic mediation material acquisition program 803 described above. The automated intermediaries are acquired and the program is used to access the database 160 of the content provider 101 and to maximize the amount of data without the assistance of the operator. You can use the configuration settings to automate the training. The content provider (8) can modify the system default mediation template 'to identify the type of data that the provider Provider wants to provide to the end user (eg, composer, producer, accompanist, length of music), and content provider (8) Promotional information provided to the number of electronic (4) stores 1 (3), such as in the example of 'in-music, a sample of the artist's music passage, the history of the child, the list of albums that appear in the recording, and the artist's associated with the artist. Types of). The system preset mediation data template includes: a data block required by the end user device 109, a data field selectable for the end user device 109, and a target for the electronic digital content store (8) and used to promote the deaf person. A set of sample data fields for albums, albums, and/or tracks. In order to extract the template data fields from the database 16 of the content provider 101, the automatic mediation data acquisition tool program maps the data (such as a biography of a composer, producer, or monk) to the database. A mapping table of the location of the material can be found. Each content provider 101 assists in specifying its mapping table in the O:\85\85156 points; tflj.DOC -118- 1255443 environment. The automatic mediation data acquisition tool program uses the content provider and the mapping table from the content provider 1〇1" (4) any data. The status of the parent-product is updated by the automatic mediation data. The product that has lost any necessary information is Put = manual intermediary data input program _ the queue, otherwise the product can be enclosed in an intermediary data sC (s) 62 ().
2·手動式中介資料輸入工具程式2·Manual mediation data input tool program
手動式中介資料輸入工具程式讓一使用者能夠執行前 =所述的手動式中介資料輸人程序齡該手動式中介資料 =工具程式可讓任何經過適當授權的作業員提供失掉的 料。如果該作業貞決定無法取得失掉的資料,則該作業 =可將-ϋ釋附加到該產品,並要求受監控的發行。内容 4疋供者1G1可基^品質保證的理由而要求該產品進行受監 拴的發仃。一旦已有所有必須的資料,且並未要求受監控 的發行,則可將該產品包封到一中介資料sc⑷62〇。 3 ·使用條件工具程式 使用I件工具程式讓一使用者能夠執行前文所述的使 用备、件私序8〇5。利用電子式配送之方式提供内容11 3以供 銷售或租用(有限制的使用)之程序涉及一系列的商業決 策内谷&供者1 0 1決定在何種壓縮等級下提供内容11 3。 /、、:後針對内谷Π 3的每一壓縮後編碼版本,規定一個或多個 使用條件。每一使用條件針對内容U3的使用而規定最終使 用者的權力、及對最終使用者的任何限制。The manual mediation data input tool program allows a user to execute the manual mediation data input method described above. The manual mediation data = tool program allows any appropriately authorized operator to provide the lost material. If the job determines that the lost material cannot be obtained, the job = the - release can be attached to the product and the monitored release is required. Content 4 疋 The supplier 1G1 can base the quality assurance on the grounds that the product is required to be monitored. Once all the necessary information is available and the monitored release is not required, the product can be packaged into an intermediary material sc(4)62〇. 3 • Using the conditional tool program Use the I-piece tool to enable a user to perform the use of the device and the private program 8〇5 described above. The process of providing content 11 3 for sale or lease (restricted use) by means of electronic distribution involves a series of commercial decisions within the valley & donor 1 0 1 determines at what level of compression the content 11 3 . /, ,: After specifying one or more conditions of use for each compressed coded version of the inner valley 3 . Each use condition specifies the ultimate user's authority and any restrictions on the end user for the use of content U3.
O:\85\85 156 分Wj.DOC -119- 1255443 條件(最終 將一部分的内容處理工具程式155及—組使用 使用者的權利及限制)附加到該產品。 —使用條件規定: 1·該使用條件適用的内容113之壓縮編碼版本。 2·該使用條件所涵蓋的使用者類型(例如企業、私人 者)。 /費 3·該使用條件係適用於内容113的購買或租用。 對於租用而言:O:\85\85 156 points Wj.DOC -119- 1255443 conditions (finally part of the content processing tool 155 and the group use user rights and restrictions) are attached to the product. - Conditions of use: 1. The compression-encoded version of the content 113 to which the conditions of use apply. 2. The type of user (eg, business, private) covered by the conditions of use. / fee 3 · The conditions of use apply to the purchase or lease of content 113. For renting:
用來限制租用條件的量度單位(例如天數、播放次數)。 超過之後即無法再播放内容113的上述量度單位數。 對於購買而言: 容許最終使用者製作可播放拷貝的份數。 最、,使用者可用來製作這些拷貝的媒體種類(例如可 知製CD(CD-R)、MD、個人電腦)。 4.可進行購買/租用交易的一段時間(亦即一最終使用者只The unit of measure used to limit the rental condition (for example, number of days, number of plays). The above-mentioned metric unit of the content 113 cannot be played again after the lapse. For purchase: Allow the end user to make copies of the playable copy. Most, the type of media that the user can use to make these copies (for example, CD-R, MD, PC). 4. A period of time during which a purchase/rental transaction can be made (ie an end user only
有在開始供應日之後且在最後供應日之前才能在該使用 條件的條款下購買/租用)。 5·最終使用者可進行該交易(或租用)的國家。 6·在此使用條件下的購買/租用交易價格。 7 ·浮水印參數。 8 ·須通知清算所1 05的事件類型。 一組使用條件的例子 内谷棱供者1 〇 1可決定在丨997年第四季測試北美市場對 重新發仃一著名重謠歌者所演唱童謠之接受性。該試銷將It can only be purchased/rented under the terms of the conditions of use after the start of the supply date and before the last supply date. 5. The country in which the end user can conduct the transaction (or lease). 6. The purchase/rental transaction price under this condition of use. 7 · Watermark parameters. 8 • The type of event of the clearing house 156 must be notified. An example of a set of conditions of use The Inner Mongolian donor 1 〇 1 can decide to test the North American market in the fourth quarter of 997 to re-send the acceptance of a famous singer who sang a child. The trial will be
〇:奶\85丨56分削DOC -120- 1255443 以兩種不同的壓縮編碼版本供應該童謠:384Kbps(每秒384 千位元)及56Kbps。可購買(可在乂〇上製作一份拷貝)或租 用(二星期)該384Kbps的版本,而只能購買(不得製作拷貝) 該56Kbps的版本。任何購買/租用都具有; 令,且内容提供者1〇1要求清算所1〇5記錄 拷貝之份數。因而將產生下文所示之使用 ----隻用條t 1 使用條件2 相同的浮水印指 所製作的每一份 條件: 使用條件3 壓縮編碼版本3 84Kbps 3 84Kbps 56Kbps 使用者類型 私人消費者 私人消費者 私人消費者 交易類型 購買 租用 購買 供應曰期 1 Oct 1997-31 1 Oct 1997 -31 1 Oct 1997 -31 Dec 1997 Dec 1997 Dec 1997 國家 美國及加拿大美國及加拿大美國及加拿 浮水印 標準 標準 標準 通知事件 拷貝動作 A …、 A 拷貝次數 1 0 0 拷貝媒體 MD 不適用 不適用 租用時間 不適用 14天 不適用 價格 價格1 價格2 價格3 4.中介資料SC(s) 620之各組成部分 下文所述是中介資料同化及輸入工具程式161所收集而 供包含在中介資料Sc(s) 620中的某些種類的資料。嘗2 O:\85\85156 分剂 DOC -121 - 1255443 '、、力此及目標將資料分類成各sc⑷組成部分。 產品識別碼 .〇: Milk\85丨56 minutes cutting DOC-120- 1255443 The nursery rhymes are supplied in two different compression-encoded versions: 384Kbps (384 kilobits per second) and 56Kbps. You can purchase (you can make a copy on 乂〇) or rent (two weeks) the 384Kbps version, but only purchase (can not make a copy) the 56Kbps version. Any purchase/rental has; order, and the content provider 1.1 requires the clearing house to record the number of copies. Thus each of the conditions produced using the same watermark fingering using only the condition t2 of the condition t2 is used: Usage condition 3 Compression coding version 3 84Kbps 3 84Kbps 56Kbps User type private consumer Private consumer private consumer transaction type purchase lease purchase supply period 1 Oct 1997-31 1 Oct 1997 -31 1 Oct 1997 -31 Dec 1997 Dec 1997 Dec 1997 National United States and Canada United States and Canada United States and Canada watermark standard Standard notification event copy action A ..., A copy number 1 0 0 copy media MD not applicable not applicable rental time not applicable 14 days not applicable price price 1 price 2 price 3 4. intermediary information SC(s) 620 components below The mediation data assimilation and input tool 161 collects certain types of data contained in the intermediary material Sc(s) 620. Taste 2 O:\85\85156 Dispensing DOC -121 - 1255443 ', and force the target to classify the data into components of each sc(4). Product ID .
[src:content provider;] [dest:everybody;] [dest:EMS;end-user;] [dest:EMS;end-user;] [dest [everybody;] [dest:everybody;] 授權者品牌公司 被授權者品牌公司 該物件(被轉授權者品牌公司) 之來源(發行人) 物件類型(亦即一單一物件或一 陣列的物件)物件識別碼 國際標準錄音碼(ISRC) 國際標準音樂編號(ISMN) 使用條件(來源:内客提供者;目標:EMS、最終使用者、 清算所105) 購貝使用條件(來源:EMS ;目標:最終使用者、清算所 105) 使用該物件(錄音)的該組使用條件(消費者的限制及 權利) 該陣列的使用條件中之一個別資料項 該使用條件適用的内容丨13之壓縮編碼版本 該使用條件係適用於内容丨丨3的購買或租用 對於租用而言: 用來限制租用條件的量度單位(例如天數、 播放次數)。 超過之後即無法再播放内容113的上述量度 O:\85\85156 分剤 DOC -122- 1255443 單位數。 對於購買而言: 容許最終❹者製作可播放拷貝的份數。 最終使用者可用來製作這些拷貝的媒體種 類(例如可綠製CD(CD_R)、MD、個人電 月i)。 可進行購只/租用交易的一段時間(亦即一最 終使用者只有在開始供應日之後且在最 後供應日之前才能在該使用條件的條款 下購買/租用) 最終使用者可進行該交易(或租用)的國家之 一指標 在此使用條件下的購買/租用交易價格 加密浮水印指令及參數之一指標 須通知清算所105的事件類型之一指標 購買資料(經過加密;可選用的資訊;來源:EMS ;目標: 最終使用者、清算所105) 購買曰期 購買價格 帳單開立名稱及地址 消費者名稱及地址 消費者的國家(最佳推測) 中介資料1(來源:内容提供者;目標:EMS、最終使用者) 一陣列的{ O:\85\S5156 分:讯D0C -123 - 1255443 著作權資訊 屬於作曲的 屬於錄音的 歌曲名稱 主要藝人 } 下列事項的一指標{ 美術品(例如專輯封面); 馨 美術品的格式(例如GIF、JPEG); } 可選用的資訊: 一陣列的額外資訊{ 作曲者 發行人 製作人 伴奏者 ♦ 錄音曰期 發行曰期 歌詞 歌曲名稱(說明)/歌曲長度 該錄音出現的專輯清單 類型 } 中介資料2(來源:内容提供者;目標:EMS) 0 \85\85156 分;别 DOC -124- 1255443 的結構,每一結構代本 '表同一錄立h 球曰的不同品質等 陣列的 級{ 該錄音, 該錄音的品質等級; 過壓縮的)該綠音 又長度(以位元组為單 (可能經位) 中介資料3 (來源·内各提供者 者) 可選用的資訊:[src:content provider;] [dest:everybody;] [dest:EMS;end-user;] [dest:EMS;end-user;] [dest [everybody;] [dest:everybody;] Authorized brand company Authorizer Brand Company Source of the object (transfer of the licensee brand company) (issuer) Object type (ie a single object or an array of objects) Object identification code International Standard Recording Code (ISRC) International Standard Music Number (ISMN) Conditions of use (Source: Inner Provider; Target: EMS, End User, Clearing House 105) Conditions for purchase of Bay (Source: EMS; Target: End User, Clearing House 105) Use this object (recording) Group use conditions (consumer's restrictions and rights) One of the conditions of use of the array of individual data items The conditions of use of the applicable conditions 丨13 compression-encoded version The conditions of use apply to the purchase of content 丨丨3 or lease for hire For: The unit of measure used to limit the rental condition (for example, number of days, number of plays). The above measure of content 113 can no longer be played after the O:\85\85156 minutes DOC -122- 1255443 units. For purchase: Allow the final reader to make copies of the playable copy. The type of media that the end user can use to make these copies (eg, Green CD (CD_R), MD, Personal Power i). The period during which the purchase/rental transaction can be made (ie, an end user can only purchase/lease under the terms of the conditions of use after the start of the supply date and before the last supply date) the end user can make the transaction (or One of the countries in the leased state is the purchase/rental transaction price under this condition. The encryption watermark instruction and one of the parameters must inform the clearing house 105 of one of the event types of the indicator purchase data (encrypted; optional information; source) :EMS ;Target : End User , Clearing House 105 ) Purchase of Purchasing Price Bills Opening Name and Address Consumer Name and Address of Consumer Country (Best Speculation ) Intermediary Information 1 (Source: Content Provider; Target :EMS, end user) An array of { O:\85\S5156 points: News D0C -123 - 1255443 Copyright information belongs to the composed song title of the song composed by the main artist} An indicator of the following items {articles (such as album cover) ); format of the scented art (eg GIF, JPEG); } Optional information: Additional information on an array { Composer issuer Accompaniment ♦ Recording 曰 曰 歌词 lyrics song name (description) / song length The album list type that appears in the recording } Intermediary data 2 (Source: content provider; target: EMS) 0 \85\85156 points; The structure of DOC-124- 1255443, each structure represents the level of the array of the same quality of the same h-balls {the recording, the quality level of the recording; over-compressed) the green tone length (in bits) The tuple is a single (possible position) intermediary data 3 (sources, providers) optional information:
目標:EMS 最終使用 促銷材料: 下列藝人促銷材料的一指才^ 該藝人網站的一網址; 該藝人的的背景描述; 與藝人有關的詩問(連 字、音訊、視訊; 同該訪問的格式(例如文 評論(連同評論的格式(例如文字、音訊 樣本片段(及其格式及壓縮等級); Λ視訊;)); 最近及即將來臨的音樂备雲 曰木曰/路面/事件·其日期及 位置; 下列專輯促銷材料之一指標{ 樣本片段(及其格式及壓縮等級); 製作人、及(或)作曲者、及(或)電影/戲劇/演員班底Goal: EMS Final use of promotional materials: One finger of the following artist's promotional materials ^ A website of the artist's website; Background description of the artist; Poetry related to the artist (ligature, audio, video; format with the visit) (eg text comments (along with the format of the comments (eg text, audio sample segments (and their format and compression level); Λ video;)); recent and upcoming music preparations, rafts, events, dates and Position; one of the following promotional materials for the album {sample segment (and its format and compression level); producer, and/or composer, and/or movie/drama/actor
O:\85\85I56 分剂 D0C -125- 1255443 及(或)專輯的製作等的背景說明; 與非藝人有關的詩問(連同該訪問的格式 晋訊、視訊)); 子 評論(連同評論的格式(例如文字、音訊 類型; 單曲促銷: 樣本片段(及其格式及壓縮等級) 製作人、及(或)作曲者、及(或)電影/戲劇/演員班底、 及(或)單曲的製作等的背景說明。 —評論(連同評論的格灿如文字、音訊、視 5 _ f監控的發行工具程式 .受監控的發行工具程式讓使用者能夠執行前文所述之 文監控的發行程序8G6。被内容提供者⑻指 控的發行授權之個人可召集-個等候受監㈣發行之一 I ,(亦即在受監控的發行程序806的仵列上等候之一產 品),檢查其内容113及其附加的註釋,並且 核准其内容U3,並釋出該產品,以便包封在 料 SC(s) 620, 或 作任何必需的更正,並釋出該產品,以便包封在一中介 貝料SC(s) 620,或 附加-個規定所要採取的更正行動之輯,並重新將該 產品提又到手動式中介資料輸入程序7 〇 4。O:\85\85I56 Sub-agent D0C -125- 1255443 and/or background description of the production of the album; poetry related to non-artists (along with the format of the interview, Jinxun, video)); sub-comment (with comments Format (eg text, audio type; single promotion: sample segment (and its format and compression level) producer, and/or composer, and/or movie/drama/actor team, and/or single Background description of the production, etc. - Comments (along with the comments of the text can be like text, audio, 5 _ f monitoring of the distribution tool program. The monitored distribution tool program allows the user to perform the distribution process as described above) 8G6. Individuals authorized by the content provider (8) to issue a license may convene - one waiting for the supervisor (4) to issue one of the I, (that is, waiting for one of the products on the queue of the monitored issuing program 806) to check the contents 113 And its attached notes, and approve its content U3, and release the product to enclose the material SC(s) 620, or make any necessary corrections, and release the product to enclose an intermediate shell SC(s) 620 Or additional - a series of provisions corrective action to be taken, and the product re-mention went to mediation manual data entry program 7 billion 4.
O:\85\85156 分;tflj.DOC -126- 1255443 2另-貫施例中,在產±sc⑷之後,有另—個可選 品質保證步驟,此時可 、、 容⑴的… 容113,並檢查該内 、疋正及正確性,而且在此同時,可對是否要將嚅 產品釋出料㈣路作出最後的核准或拒絕的決定。“ D.内客處理工具程式 内容處理工具程式155實際上是用來處理數位内容檔案 而產生加上浮水印@、編碼的、及加密的内容之一組軟體 工具私式。料工具程式利用工業標準的數位内容處理工 具程式’而在技術有所進展時,可以外掛方式更換加上浮 水印、、編碼、及加密技術。如果可經由一命令行系統呼叫 介面載人所選擇的該工業標準工具程式’並將參數傳送到 孩工具程式,或提供一可經由一DLL介面而呼叫函式之工 具程式套件,則可將内容處理自動化到相當的程度。每一 工具程式的一前端應用程式查詢内容處理工具程式155中 =當佇列中是否有下一個可進行的工作,並擷取所需的 檔案及參數,然後載入該工業標準的内容處理工具程式, 以便執行所需的功能。於完成該工作時,如果該工具程式 並未回報終止狀態,則可能需要以人工方式更新該佇列。 現在將說明内容處理工具程式155的一般性版本,但是 吏用者自w丁的版本也是可能的。可以Java、C/C++、或任何 等效軟體來撰寫内容處理工具程式155。可利用其中包括軟 碟光碟等任何電腦可讀取的裝置或經由一網站而配送内 各處理工具程式155。 1 ·浮水印工具程式O:\85\85156 points; tflj.DOC -126- 1255443 2 In another example, after the production ±sc(4), there is another optional quality assurance step, at this time, the capacity (1)... And check the internal, corrective and correctness, and at the same time, may make a final approval or rejection decision on whether or not to release the product. "D. The inbound processing tool program content processing tool 155 is actually used to process digital content files to generate a set of software tools plus watermark @, encoded, and encrypted content. The tool utility utilizes industry standards. The digital content processing tool program's, when the technology is progressing, can be replaced by plug-in, watermarking, encoding, and encryption technology. If the system can be called via a command line system, the industry standard tool selected by the manned interface' And transfer the parameters to the child tool, or provide a toolkit that can call the function via a DLL interface, to automate the content processing to a considerable extent. A front-end application query processing content processing tool for each tool In program 155, if there is any next work available in the queue, and the required files and parameters are retrieved, then the industry standard content processing tool is loaded to perform the required functions. If the tool does not report a termination status, you may need to manually update the queue. A general version of the content processing tool 155 will now be described, but a version from the user is also possible. The content processing tool 155 can be written in Java, C/C++, or any equivalent software. Any computer-readable device such as a floppy disk or a processing tool 155 distributed through a website. 1 · Watermarking tool program
O:\85\85156 分;别 DOC -127 - 1255443 卜浮,印工具程式讓使用者能_行前文所述的加入浮 7印私序咖。=工具程式利用音訊浮水印技術,將内容⑴ 有人的著作權貝3凡施加到歌曲權。内容提供者】及特定 的浮水印技術決定了將要被寫出的實際資訊。前端的浮水 Ρ工具程式可取得該資訊,因而該浮水印工具程式可適當 貝㈣送到加上浮水印函式。此種方式料介資料 同化及輸入工具程才1 A〗女 、 有了同步的要求,以便保證該中介 =同=及輸入工具程式161先取得該資訊,然後才容許該 歌曲的音訊檔被處理。左去 法對該歌曲咐訊處^^㈣印資訊之前,將無 :::施加是音訊處理的第—步驟,這是因為該步驟 U斤創作歌曲的所有編碼之共同步驟。只要該浮水印能 夠丄過編碼技術的考驗,口 浮水印程ρ Μ山、4母—輕進行-次的加 各f加浮切技術都是習知的且可在市場上取得的。然 而且可端的浮切H切幻m㈣準 工具程式。 | 2·預先處理及壓縮工具程式 、二處:里及壓縮工具程式可讓使用者能夠執行前文所 i其I 及壓縮程序謝。音訊編碼涉及兩個程序。編 有以上是對(―音樂内容例子中之)—PCM音訊流施行一 的音=算法。通常可調整編碼器,以便根據所需 級’而產生各種播放位元流傳輸速率。車η 的-質將會造成較大的樓案容量’而且因為高品質的二O:\85\85156 points; don't DOC -127 - 1255443 Bu float, the printing tool program allows the user to add the floating 7-print private order coffee as described above. = The utility program uses the audio watermarking technology to apply the content (1) to someone else's copyright. The content provider] and the specific watermarking technology determine the actual information to be written. The front-end floating water Ρ tool can obtain this information, so the watermarking tool program can be sent to the floating watermark function. In this way, the data assimilation and input tool procedures are only 1 A female, with synchronization requirements, in order to ensure that the intermediary = the same = and the input tool program 161 first obtain the information, and then allow the audio file of the song to be processed. . Before going to the song, the ^^(4) printing information will be the first step of the audio processing, because this step is the common step of all the encoding of the song. As long as the watermark can overcome the test of the coding technology, the port watermarking process ρ Μ 、, 4 mothers - lightly performing - times plus each of the f plus floating cutting techniques are well known and available on the market. However, it can also be used to float the H-cut m(4) quasi-tool. 2) Pre-processing and compression tool program, two: and the compression tool program allows the user to execute the I and the compression program. Audio coding involves two programs. The above is the implementation of the PCM audio stream (in the music content example) - the sound = algorithm. The encoder can typically be adjusted to produce various play bit stream transmission rates depending on the desired level'. The quality of the car η will cause a larger capacity for the building’ and because of the high quality
ΟΛ85\8515ό 分刮 DOC -128- 1255443 1131檔案答量可能會變得太大,所以高品質内容η〗的下 載時間可能變得太長,目而有時會禁止使用標準㈣,綱 bps的數據機。 因此内各&仏者1 0 1可能提供各種數位内容品質以供 下載’以便能夠滿足沒有耐心且使用窄頻網路之客戶,這 些客戶不想耗用幾個小時等候下載;料能夠滿足音響迷 或使用寬頻網路的客戶,這些客戶或者是只購買高品質的 内容113,或具有較高速度的連線。ΟΛ85\8515ό The scraping DOC-128- 1255443 1131 file size may become too large, so the download time of high-quality content η may become too long, and sometimes the standard (4), bps data is prohibited. machine. Therefore, each & 1 1 1 1 may provide a variety of digital content quality for downloading 'to meet the impatient and narrow-band network customers who do not want to spend hours waiting for download; Or customers who use broadband networks, which either buy high-quality content 113 or have a higher speed connection.
,壓縮演算法在其技術上有所變化,以便產生内容 較低位元傳輸速率之再生。可以演算法(亦即MPEG、AC3 ATRAC)及壓料級來改變該技術。為了獲得較高的壓紹 等級,在將資料傳送到壓縮演算法之前,通常先以最低^ 抽樣率將該資料重❹樣。為了在傳真度_損較小的惰 形下得到更有效率的壓縮,或者為了避免某些頻率範園有 極端的信號失落,數位内容有時可能需要對某些頻率的等 化位準進行調整,或對錄音的動態範圍進行調整。内容預 先處理的要求與壓縮演算法及所需的壓縮等級有直接的相 關性。在某些情形中,可成功地利用内容U3的型態(例如 作為決定預先處理要求的—基礎,這是因為同_ _型内的歌曲通常具有類似的動態範圍。使用某歧壓 %工具程式時,這些預先處理的功能是編碼程序的—部 分。使用其他的壓縮工具程式時,係在執行壓縮之前 執行所需的預先處理。 除了供銷售的可下載音訊樓之外,每—首歌曲也具有—The compression algorithm has changed in its technology to produce a reproduction of the lower bit rate of the content. The technique can be changed by algorithm (ie MPEG, AC3 ATRAC) and binder level. In order to obtain a higher compression level, the data is usually resampled at the lowest sampling rate before the data is transferred to the compression algorithm. In order to obtain more efficient compression under the facsimile_loss less inert shape, or to avoid extreme signal loss in some frequency range, digital content may sometimes need to adjust the equalization level of certain frequencies. , or adjust the dynamic range of the recording. The content pre-processing requirements are directly related to the compression algorithm and the level of compression required. In some cases, the type of content U3 can be successfully utilized (e.g., as a basis for determining pre-processing requirements) because songs within the same _-type typically have similar dynamic ranges. Using a certain % solution When these pre-processing functions are part of the encoding program, when using other compression tools, the required pre-processing is performed before the compression is performed. In addition to the downloadable audio building for sale, each song is also have-
〇 \85\85丨56 分削 DOC -129- 1255443 低位元傳輸速率(L〇wBitRate;簡稱lbr)編碼片段,可利 LBR位元流協定而將該首歌曲抽樣。該咖編碼也是 内容處理王具程式155的責任。心提供者⑻提供該片段 作為-獨立㈣職,或作為偏移量及長度之參數。 與加浮水印的情形相同,我們希望可經由—咖或命令 行系統呼叫介面而載入編碼工具程式,並傳送所有必須的 參數到該等編碼工具程式,以供預先處理及壓縮。例如, 如果内容是音樂,且如果決定在執行任何音訊處理之前先 自内容提供者的資料庫160取得該歌曲的類型,則可能要求 广碼工具程式與中介資料同化及輸入工具程式161同 ”上述情形係取決於所選擇的編碼工具程式、及該歌曲 類,的^找性。如果内容提供者⑼對每首歌曲都改變編 貝等,,及的選擇,則也在編碼步驟之前先提供該資訊, 且該資訊與中介資料同化及輸入工具程式i6i所產生的中 介資料一致。 目:已知有各種高品質的編碼演算法及工具程式。然 而,前端編碼工具程式可支援各種工業標準的編碼工具程 式。 、同多閱圖12 ’圖中不出根據本發明的圖8所示自動 中I ,、料取传工具程式的一實施例之流程圖。本程序開始 時係自内容提供者⑻正在檢查的媒體讀取—識別碼。内容 的一個例子即是-音樂⑶實施例。在—音樂⑶實施例 中,可,得下列的代碼··通用價格碼(universai pHce % UPC) ^ (International Standard〇 \85\85丨56 Dividing DOC -129- 1255443 Low bit transfer rate (L〇wBitRate; referred to as lbr) code segment, which can be sampled by the LBR bit stream protocol. This coffee code is also the responsibility of the content processing program 155. The heart provider (8) provides the segment as an independent (four) job, or as a parameter of offset and length. As in the case of watermarking, we hope that the encoding tool can be loaded via the coffee or command line system call interface and all necessary parameters can be transferred to the encoding tools for pre-processing and compression. For example, if the content is music, and if it is decided to retrieve the type of the song from the content provider's database 160 prior to performing any audio processing, then the wide code utility and the intermediary data assimilation and input utility 161 may be required to be the same as above. The situation depends on the selected coding tool and the song type. If the content provider (9) changes the selection of each song, etc., the selection is also provided before the encoding step. Information, and the information is consistent with the mediation data and the mediation data generated by the input tool program i6i. Objective: Various high-quality code algorithms and tools are known. However, the front-end coding tool can support various industry standard codes. The utility model is the same as the multi-image 12'. The figure shows a flow chart of an embodiment of the automatic I, material transfer tool according to the present invention. The program starts from the content provider (8). The media read-identification code being checked. An example of the content is the music (3) embodiment. In the - music (3) embodiment, yes, the next Column code · · universal price code (universai pHce % UPC) ^ (International Standard
O:\85\85l 56 分刮 DOC -130- 1255443O:\85\85l 56 points scraping DOC -130- 1255443
Recording Code ;簡稱ISRC)、國際標準音樂編號 anteniational Standard Music Number ;簡稱ISMN)。在步 馼“0 1 T,杜適當的播放裝置(例如,對音樂CD而言是音 樂CD唱盤9對DVD電影而言是DVD影碟機、對dat數位式 錄音帶或等效物而言是DAT錄音機)中讀取内容的識別 碼。然後在步驟1 202中,利用該識別碼作為索引而搜尋内 容提供者ιοί之資料庫160。在步驟12〇3中,於資料庫16〇 及任何其他相關的資源中擷取圖8所示工作流程管理程序 所需的資訊之全部或部分。該資訊可包括内容113及與内容 1 1 3相關的中介資料。在步驟丨204中,利用所擴取的額外資 訊來啟動工作流程管理程式丨54,以便產生電子内容11 3。 我們〶了解,可將諸如數片晋樂CD等的數個所選擇媒體放 到佇列中,使自動中介資料取得工具程式得以產生一系列 的内容,以供電子式配送。例如,可自一系列的cd中產生 所有的内容113,或者甚至可自内容提供者1〇1檢視的一片 或多片CD的所選出之一些歌曲中產生所有的内容ιΐ3。 在一替代實施例中,可自動自内容提供者的資料庫16〇 擷取預先處理參數。現在請參閱圖13,圖中示出一種自動 設足根據本發明的圖8所示預先處理及壓縮工具程式的預 先處理及壓縮參數之方法。在該實施例中,内容是音 樂。在步驟1301中,選擇要在内容處理工具程式155中編碼 的音樂(内容113)。在步驟1302中,決定所選擇音樂的類 型。可以人工方式輸入該音樂類型’或利用諸如自圖Η 所示程序擷取的額外資料等的其他可用中介資料來決定立 O:\85\85156 ·;>,φΐΌ0Γ 1255443 ;類;。然後在步驟1303中檢查所選擇的音訊壓縮等級及 曰訊壓縮演算法。然後在步驟13辦,以音樂類型、壓縮 设足值、及壓縮演算法來查詢應 在尤、先處理及壓縮程序809 中使用哪些壓縮參數。 3 ·内容品質管制工具程式 内容品質管制工具程式讓使用者能夠執行前文所述之 内客品質管制程序810。該工具程式是一種可供選用的内容 處理工具程式’且使品質管制技術員能有機會重新檢查經 過編碼及加上浮水印的内容樓案,並根據品質衡量標準而 核准或拒絕該等内容樓案。品質管制技術員可將該内容重 新編碼’而以人工方式進行預先處理的調整,直到得到適 當的品質為止’或者將該歌曲的旗標標示為需要重新處 理,並附加一個說明問題的註釋。 内谷k供者101可將該程序步驟設定為内容處理工作流 私的個可供選用的步驟或必須的步驟。在包封該内容的 斤有SC(s)(例如- CD上的各首歌曲之每一 ⑷)之後,提 供了個_外的可供選用之最後品質保證程序⑴步驟,此 時可測試内容編碼的品質,但是能夠在加密及包封之前早 二發現問過才旎更有效率地進行内容處理。因此,非常 希望也在该步驟中γ 甲保a内合的品質,而不是等到最後才完 成所有的處理。 4·加密工具程式 加密工具程式讓使用者能夠執行前文所述的加密程序 11内各加去疋内谷處理工具程式i 5 5的最後一個步驟。Recording Code; referred to as ISRC), international standard music number anteniational Standard Music Number; referred to as ISMN). In step 馼 "0 1 T, Du appropriate playback device (for example, for music CDs, music CDs 9 for DVD movies, DVD players, for dat digital tapes or equivalents for DAT recorders) The identification code of the content is read in. Then, in step 1202, the content provider ιοί's database 160 is searched using the identification code as an index. In step 12〇3, in the database 16 and any other related The resource retrieves all or part of the information required by the workflow management program shown in Figure 8. The information may include the content 113 and the intermediary material associated with the content 112. In step 204, the expanded additional is utilized. Information to start the workflow management program 54 to generate electronic content 11 3. We know that several selected media such as several CDs can be placed in the queue, so that the automatic mediation data acquisition tool can be generated. A series of content for electronic distribution. For example, all of the content 113 can be generated from a series of cds, or even one of a selected one or more CDs that can be viewed from the content provider 101. All of the content is generated in the song ι ΐ 3. In an alternative embodiment, the pre-processing parameters can be automatically retrieved from the content provider's database 16 . Referring now to Figure 13, an automatic setting is illustrated in accordance with the present invention. The method of pre-processing and compressing the parameters of the pre-processing and compression tool is shown in Fig. 8. In this embodiment, the content is music. In step 1301, the music to be encoded in the content processing tool 155 is selected (content 113). In step 1302, the type of the selected music is determined. The music type can be manually entered or other available mediation information such as additional information retrieved from the program shown in the figure can be used to determine the O:\85\85156 ·;>, φΐΌ0Γ 1255443; class; then check the selected audio compression level and the compression algorithm in step 1303. Then in step 13, the music type, the compression set value, and the compression algorithm Query which compression parameters should be used in the special, first processing and compression program 809. 3 · Content quality control tool program content quality control tool program allows users Enough to implement the internal quality control program 810 described above. The utility is an optional content processing tool' and allows the quality control technician to have the opportunity to re-examine the encoded and watermarked content and based on Quality metrics approve or reject such content. The quality control technician can re-encode the content and manually perform pre-processed adjustments until the appropriate quality is obtained' or mark the song's flag as needed Reprocess and attach a comment explaining the problem. The inner valley k provider 101 can set the program step as an optional step or a necessary step for the content processing workflow. In the case of encapsulating the content, there is SC (s) (for example - each of the songs on the CD (4)), after providing an optional final quality assurance program (1), the quality of the content encoding can be tested, but can be encrypted and Before the envelop, I found out that I had to ask for more efficient content processing. Therefore, it is highly desirable to also have the quality of the gamma in this step, rather than waiting until the end to complete all the processing. 4. Encryption Tool The encryption tool allows the user to perform the last step of the encryption process 11 described above.
ΟΛ85\85156 分割.D0C -132· 1255443 現在要將先前利用編碼工具程式產生的内容之每一版本加 密。加密工具程式是Sc(s)包封工具程式的一種功能。呼叫 孩SC(s)包封工具程式而將歌曲加密,並送回所產生的加密 金餘。隨後將該金鑰放入SC(S)包封工具程式,以便用來產 生中介資料SC(s) 620。 E·内容SC(s)產生工具程式 一旦收集了所有的中介資料之後,内容SC(s)產生工具程 式根據中介資料的預定用途而將中介資料分成若干類型。 這些組的中介資料被寫入檔案中,而放到sc包封工具程式 作為中介資料SC(s) 620的中介資料部分。每一組成部分(檔 案)都有特有的處理要求。一旦對相關聯的歌曲進行處理及 加密,且決定了目的地(代管内容網站lu的網址)之後,即 卞備產生内各113的内容SC(s) 630。已完成處理且符合所 有前文所述要求的内容113係在佇列中等候,以便包封到工 作流程管理程式154的包封工具程式之佇列中。 内容SC(s)產生工具程式現在擷取中介資料同化及輸入 工具程式161的各先前步驟所產生的所有必須檔案,並呼叫 以便產生中介資料SC(s) 620ΟΛ85\85156 Split.D0C -132· 1255443 Now it is necessary to encrypt each version of the content previously generated by the encoding tool. The encryption utility is a function of the Sc(s) encapsulation utility. Call the child SC(s) encapsulation utility to encrypt the song and return the resulting encryption. The key is then placed in the SC(S) encapsulation utility for use in generating the intermediary material SC(s) 620. E. Content SC(s) Generation Tool Once the mediation data has been collected, the content SC(s) generation tool program divides the mediation data into several types according to the intended use of the intermediary material. The mediation data of these groups is written into the archive, and is placed in the sc-encapsulation tool program as the mediation data portion of the mediation material SC(s) 620. Each component (file) has unique processing requirements. Once the associated song is processed and encrypted, and the destination (the web address hosting the content website lu) is determined, the content SC(s) 630 of each 113 is generated. The content 113 that has been processed and meets all of the foregoing requirements is queued in the queue for inclusion in the queue of the package utility of the workflow manager 154. The content SC(s) generation tool now retrieves all necessary files generated by the mediation data assimilation and inputting the previous steps of the tool 161 and calls to generate the intermediary material SC(s) 620.
含的中介資料檔。 各SC(s)包封工具程式函式,以便產 及内容SC(s) 630。該程序為每一首| 料SC(s) 620及多個内容sc(s) 630。 樂’則將在針對替舌Iff Λ 女总:σ #Contains the intermediary data file. Each SC(s) encloses a tool utility to produce the content SC(s) 630. The program is for each of the SC(s) 620 and the plurality of contents sc(s) 630. Le' will be in the case of the substitute Iff Λ female total: σ #
ΟΛ85\85156 分剤 DOC -133 - 1255443 F ·最後品質保證工具程式 最後品質保證工具程式讓使用者能夠執行前文所述的 最後品質保證程序813。—旦已為—内容構案建立了所有的 SC(s)之後,即可對該内容進行最後的品質保證檢查。可在 内容113準備程序的各階段上執行品質絲。内容提供者 1〇1可選擇在完成每一主要步驟時執行品質保證,以避免未 來的里重作,或者可選擇等候到所有的音訊準備程序完 成4後,立刻對每—項目執行品質保證。如果選擇後者, 則在完成SC(s)產生的時點上執行品質保證。該工具程式可 對該首歌曲的每一SC⑷進行開啟、檢查、及音樂播放。 發現任何問題時,縱使是很小的文字改變也要求因sc(0 的内部安全特性而重新S立該Sc(s)e4 了避免不必要的重 新處理時間,我們強烈建議利用中間的品質保證步驟來保 證中介資料的精確性,我們並建議預留該特定的品質保證 步驟,用來確認與該歌曲的各Sc(s)間之交互參照。如果發 現了問題,則品保人員可輸入一個附加到該首歌曲的一問 題描述,並將孩首歌曲重新放到適當的處理佇列,以供重 新處理。在工作流程管理程式154中適當地更新狀態,以便 指示該歌曲的所有相關組成部分之狀態。如並未發現任何 問題’則將内容113標示為可準備發行。 G·内容傳播工具程式 内容傳播工具程式讓使用者能夠執行前文所述的内容 傳播程序814。一旦已核准内容113的發行,則將内容ιΐ3 的SC(s)放到内谷傳播程序之佇列。内容傳播工具程式監督 O:\85\85156 分割 DOC -134- 1255443 該仵列,並根據内容提供者⑻所提供的組態設定,而執行 sc⑷樓案的立即傳輸、或一組sc⑷樓案的批次傳輸。内 容提供者ΠΗ亦可選擇設定内容傳播工具程式的组態’以便 自動將所有的SC(s)保存在該仵列中,直5彳以人工方式將該 等SC⑷標示為可發行為止。此種方式可讓内容提供者⑻ 在内容的預定發行日之前先準備該内容,並保存這些内 容,直到内容提供者想要發行諸如新歌、電影、或電玩等 的内客為止。SC(s)亦可根據一指定發行日而控制對内容 ⑴之存取’因而内容提供者⑻實際上無須抑制sc⑷的配 运’但是此種人工方式的發行選項亦可用來管理傳輸較大 檔案所需的網路頻寬。 當被標示為可發行時,内容113之内容Sc(s) 630係經由 FTP而傳送到指定的代管内容網站ii。中介資料sc⑷㈣ 係經由FTP而傳送到内容促銷網站156。此時sc(s)逐步進入 新的内容113目錄,直到可處理這些Sc(s),並將這些sc(s) 整合到内容促銷網站156為止。 圖17是自動擷取根據本發明的圖8所示自動中介資料取 得工具程式的額外資訊的一替代實施例之流程圖。該程序 類似於前文中參照圖8所述之程序。然而,對受監控的發行 程序806的品質檢查及内容品質管制程序8〇9係結合成一個 被稱為品質管制1704的品質檢查。在中介資料3(:產生程序 807及内容SC產生程序812之前執行品質檢查。在sc產生之 前執行品質檢查時’無須打開内容u 3及相關聯的中介資料 SC(s) 620之步驟。此外,在本實施例中,已取消了產品等 O:\85\85156 分剖.DOC •135- 1255443ΟΛ85\85156 minutes DOC -133 - 1255443 F · Final Quality Assurance Tool The final quality assurance tool allows the user to perform the final quality assurance program 813 described above. Once all the SC(s) have been created for the content structure, the final quality assurance check can be performed on the content. The quality yarn can be executed at each stage of the content 113 preparation program. The content provider 1〇1 can choose to perform quality assurance when completing each major step to avoid future work, or can choose to wait until all the audio preparation procedures are completed, and immediately perform quality assurance for each item. If the latter is selected, quality assurance is performed at the point in time when SC(s) generation is completed. The utility can open, check, and play music for each SC (4) of the first song. When any problem is found, even a small text change requires re-establishing the Sc(s)e4 due to sc's internal security features to avoid unnecessary reprocessing time. We strongly recommend using intermediate quality assurance steps. To ensure the accuracy of the mediation data, we also recommend to reserve this specific quality assurance step to confirm the cross-reference between each Sc(s) of the song. If a problem is found, the quality assurance personnel can enter an additional A description of the problem to the song and re-posting the child's song to the appropriate processing queue for reprocessing. The status is updated appropriately in the workflow manager 154 to indicate all relevant components of the song. Status. If no problem is found, the content 113 is marked as ready for distribution. G. Content Communication Tool The program content distribution tool program enables the user to execute the content distribution program 814 described above. Once the content 113 has been approved for distribution , put the SC(s) of the content ιΐ3 into the queue of the inner valley communication program. The content communication tool program supervision O:\85\85156 split DOC-134- 12 55443 This queue, and according to the configuration settings provided by the content provider (8), performs the immediate transmission of the sc(4) case, or the batch transmission of a set of sc(4) buildings. The content provider can also choose to set the content distribution tool. The configuration 'in order to automatically save all SC(s) in the queue, manually marking the SC(4) as releaseable. This way allows the content provider (8) to publish the content at the scheduled time. Prepare the content before the day and save the content until the content provider wants to release an internal user such as a new song, movie, or video game. SC(s) can also control the storage of the content (1) according to a specified issue date. Therefore, the content provider (8) does not actually need to suppress the distribution of sc(4), but such manual distribution options can also be used to manage the network bandwidth required to transfer larger files. When marked as publishable, content 113 The content Sc(s) 630 is transmitted to the designated escrow content website ii via FTP. The mediation material sc(4)(4) is transmitted to the content promotion website 156 via FTP. At this time, sc(s) gradually enters the new content 113. Directory, until these Sc(s) can be processed, and these sc(s) are integrated into the content promotion website 156. Figure 17 is an automatic capture of additional information of the automatic mediation data acquisition tool shown in Figure 8 in accordance with the present invention. A flowchart of an alternative embodiment. The procedure is similar to the procedure described above with reference to Figure 8. However, the quality check and content quality control procedures of the monitored distribution program 806 are combined into one called quality. The quality check of the control 1704. The quality check is performed before the mediation material 3 (the generation program 807 and the content SC generation program 812. When the quality check is performed before the sc generation), it is not necessary to open the content u 3 and the associated mediation material SC(s). Step 620. In addition, in this embodiment, the product, etc. has been cancelled. O:\85\85156 sectioning. DOC • 135- 1255443
X 候動作/資訊程序8〇1的作 根據要求何種行動,而將丄 作放到特疋的程序佇列。 J ^ 如果工作要求人工的中介 資料,則輸入額外的中介資料,並將該工作放到人工中介The operation of the X-action/information program 8〇1 is based on what kind of action is required, and the action is placed in a special program queue. J ^ If the job requires manual mediation, enter additional mediation data and place the work in a manual intermediary
資㈣入㈣。此外,也將自動中介資料取得程序_及新 内令要求程序合併’以便在中介資料同化及輸人工具程式 161及内谷處理工具程式155之前發生。最後,重要的是要 指出:係在自動中介資料取得程序咖時及自動中介資料取 得程序803時輸人使用條件8(M。這是因為可在自動中介資 料取得程序8〇3步驟中自動獻許多使用條件。 H.内容促銷網站Capital (four) into (four). In addition, the automatic mediation data acquisition program_and the new internal order request program are merged to occur before the intermediary data assimilation and input tool program 161 and the inner valley processing tool program 155. Finally, it is important to point out that the user is using the condition 8 (M) when the automatic mediation data acquisition program is used and the automatic mediation data acquisition program 803. This is because the automatic mediation data acquisition program can be automatically provided in the step 8〇3. Many conditions of use. H. Content promotion website
為了經由數位下載而最有效地傳播内容提供者101為銷 售而提供的資訊,並為了使電子數位内容商店ι〇3取得必要 的檔案而得以提供將内容113下載到其客戶,每一内容提供 者101應有一個代管此類資訊的網站。此種方式類似於目前 木些内谷提供者101使其零售商及其他需要此類資訊的夥 伴取彳于促銷内容所用的方法。在此類服務業已存在的情形 中’可將一額外的部分加入網站中,此時電子數位内容商 店103可經由下載而看到一份可供銷售的内容清單。 内容提供者1 〇 1可完全控制該網站的設計及配置’或者 可選擇利用作為安全數位内容電子式配送系統100的工具 私式套件的一部分而提供的一組裝完備可立即啟用的網路 词服器解決方案。為了針對該服務而實施其本身的設計, 内容提供者101只需要將到中介資料SC(s) 620的連結提供 矣口連線到其網站的電子數位内容商店丨〇3。利用安全數位内In order to most effectively disseminate information provided by the content provider 101 for sale via digital downloading, and to enable the electronic digital content store to obtain the necessary files, the content 113 is provided for download to its customers, each content provider 101 should have a website that hosts such information. This approach is similar to the way that the current Google Valley Provider 101 has its retailers and other partners who need such information to take advantage of promotional content. In the case where such a service already exists, an additional portion may be added to the website, at which point the electronic digital content store 103 may see a list of content available for sale via download. The content provider 1 可1 has full control over the design and configuration of the website' or may choose to use an assembled, ready-to-use web service provided as part of the tool private suite of secure digital content electronic distribution system 100. Solution. In order to implement its own design for the service, the content provider 101 only needs to connect the link to the intermediary material SC(s) 620 to the electronic digital content store 丨〇3 of its website. Use safe digital
O:\85\85156 分割.DOC •136- 1255443 容電子式配送系統1 Ο 0的工具程式套件即可達到上述目 的。内容提供者101將自行決定該選擇程序及所要顯示的資 訊。 内容促銷網站156處理經由FTP而自内容傳播工具程式 接到一新内容目錄的中介資料Sc(s) 620。可利用Sc(s)預覽 工具程式開啟容器物件,以便顯示或提取容器物件的資 訊。然後可利用該資訊更新HTML·網頁及(或)將資訊加到一 個由該服務所維護的可搜尋資料庫。該SC(s)預覽工具程式 實際上是電子數位内容商店1〇3用來開啟及處理中介資料 SC(s) 620的内谷取传工具程式之一子集。然後應將中介資 料SC(s) 620檔案移到一個由内容促銷網站156維護的永久 性目錄。 旦將中介資料SC(s) 620整合到内容促銷網站1 56之 後’即可公告可取得該中介資料SC(s) 620。當將一個新的 中介資料SC(s) 620加入網站時,内容提供者1〇1可將一通 知傳送到所有的訂閱電子數位内容商店1〇3,或者内容提供 者101可每天(或指定的定期)將這一天(或這段期間)中加入 的所有中介貪料SC(s) 620作單一的通知。係傳送一包含對 照到所加入中介資料SC(s) 620的參數之指定CGI訊息串, 而經由一個與電子數位内容商店103網路伺服器的標準 HTTP X換而執行該通知。電子數位内容商店i 〇3的通知介 面模組(將於下文中說明)處理該訊息。 I·内容代管 演藝事業每年產生幾千個諸如CD、電影、及電玩等的内 O:\85\85 丨 5δ 分观D〇c -137- 1255443 奋即目,再加上現有的以萬為單位的内容節目。安全數位 =容電子式配送系統100被設計成可支援目前可自商店取 得的所有内容節目。 安全數位内容電子式配送系統100最後每天可下載到客 戶—的内容節目之數目係以千或萬為單位。對於大量的内容 即目而言,需要大量的頻寬1腦硬碟儲存空間及頻寬都 需要對多㈣管内容網站⑴進行分散式且可擴展的配 置。該系統也支援世界各地的客戶。因而需要海外的網站 來加速對全球性客戶的配送。 安全數位内容電子式配送系統100上的内容代管被設計 成:可讓内容提供者101管理其本身的内容,或共用一組共 同的设施或一組設施。 安全數位内容電子式配送系統100上的内容代管包含: 多個代管内容網站m,這些代管内容網站lu合而包^安 全數位内容電子式配送系統丨00提供的所有内容113 ;以及 數個輔助内容網站(圖中未示出),這些輔助内容網站包含 内容提供者101提供的若干現行熱賣產品。代管内容網站 目而改變。輔 111的數目係根據使用該系統的最終使用者數 助内容網站只存有數目有限的歌曲,但是這些網站代表了 該系統上所使用的-個相當大百分率的頻寬。當主要網站 的容量增加到最大客量點時,即將該等辅助網站上線。輔 助網站可位於接近網路接取點(Netw〇rk Access p〇int;簡稱 NAP)處,以便有助於加速下載時間。亦可將輔助網站置於 世界上的不同地理區域,以便加速下載時間。 O:\85\85156 分割.D0C -138 - 1255443 如果内容提供者101選擇將所有其内容⑴放在農自身 的系統’則可將該網站視為具有或未具有額外輔助内容網 站的單-代管内容網站⑴。此種方式可讓内容提供者建立 其本身的可擴展之分散式系、统。在另—實施例中,電子數 位内容商店⑼亦可作為某些内容113的代管内容網站 U1 ◦該實施㈣求在電子數位内容商店1()3與内容提供者 101之間有特殊的金融協定。 1 ·代管内容網站 本說明書的内容提供者一節說明的内容傳播工具程式 經由FTP或HTTP將内容113加入代管内容網站m,或經由 諸如在磁帶、CD-ROM、快閃記憶體、或其他電腦可讀取 的媒體上配送内容等的離線裝置而將内容丨丨3加入代管内 容網站111。内容提供者1〇1產生的中介資料SC(s) 620包含 一攔位,用以指示找出内容113的内容SC(s) 630之網址。 該網址對應於一代管内容網站111。電子數位内容商店i 〇3 如果得到内容提供者101在報價SC(S) 641中的許可,則可 越過該網址。當最終使用者裝置109想要下載内容Sc(s) 630時,最終使用者裝置1〇9即連線到代管内容網站lu。 最終使用者裝置109將授權許可SC(s) 660傳送到代管内 容網站111,而提出對内容SC(s) 630的要求。該授權許可 SC(s) 660是清算所105所傳送回的相同授權許可sc(s) 660。可驗證授權許可sc(s) 660的數位簽名,以便決定該 授權許可SC(s) 660是否為一有效的授權許可SC(s)。如果該 授權許可SC(s)是一有效的授權許可SC(s),則開始下載, O:\85\85156 分割 DOC -139- 1255443 或可將下載要求轉向到另一代管内容網站1 1 1。 2·安全數位内容電子式配送系統1〇〇提供的代管内容網站 111 ^ 對於安全數位内容電子式配送系統丨〇〇而言,接收對一 内容SC(S) 630的起始要求之主要内容網站決定應利用哪 一個網站來下載内容丨丨3。該網站利用下列資訊作出上、十、 定: 逑決 是否有存放所要求内容113之輔助内容網站?(安全數 位内容電子式配送系m。。所提供的内容113之二 係只存放在主要網站); 最終使用者裝置109位於哪一地理區?(當最終使用者 裝置109提出該要求時,可自該最終使用者裝置得到 此一資訊,並將該資訊放到訂單80(〇 65〇中而傳送到清 算所105) ; ^ 是否有適當的辅助網站且在工作中?(辅助網站有時可 能是離線的); 輔助網站的負載為何?(在一輔助網站忙於處理存取活 動的某些情形中,可選擇較不忙碌的另_網站。 在將内容SC(s) 630傳送到最終使用者裝置1〇9之前,先 對最終使用者的要求執行分析及驗證。一資料庫存放了曾 用來下載内容113的所有授權許可%⑷之識別碼。可檢查 該資料庫,以便確保最終使用者裝置1〇9只對所購買的每— 件内容113提出一個要求。此種方式可避免惡意的使用者重 複存取代管内容網站111而嘗試減緩代管内容網站丨n的存 O:\85\85 丨 56 分别.DOC •140- 1255443 取速度,並防止對内容Sc(s) 63〇作未經授權的下載。 係根據客戶對個別件的内宠 μ卞日7円谷113足需求,而疋期執行增 加或減少將内容113放到辅助内容網站。 内容代管路由器 内谷代官路由器(圖中未示出)係設於代管内容網站⑴ :,且接收最終使用者想要下載内容⑴的所有要求。該内 容代管路由ϋ執行對最終使用者要求的驗證檢查,以便確 保最終使用者確實已購買了内容Uh在-資料庫中維護了 各輔助内容網站的狀態,該狀態包括哪些内容113係存放在 延些辅助内容網站、及這些辅助内容網站的現行狀態。該 現行狀悲包括網站上的存取活動量、及一網站是否因維護 作業而關閉。 β内谷代管路由器的唯一介面是當要求下載内容113時 最終使用者裝置1〇9所傳送的授權許可Sc(s) 66〇。授權許 可SC(s) 660包含用來指示該使用者被容許下載内容113的 資訊。 辅助内容網站 辅助内容網站(圖中未示出)存有安全數位内容電子式配 送系統1 00的熱門内容丨丨3。這些網站在地理上係分佈在世 界各地’且設於接近網路接取點(NAP)處,以便縮短下載 時間。當對主要代管内容網站1丨1的需求接近最大容量時, 即將這些辅助内容網站加入系統中。 ίΧ.電子數位内容商店 Α·概述-對多個電子數位内容商店1〇3之支援 ⑽5\85156 分别 D〇c -141 - 1255443 電子數位内容商店103本質上是零售商。這些電子數位 内容商店是行銷内容1 1 3以便將内容1 i 3配送到客戶之實 體。對於内容Π 3的配送而言,該系統將包含數位内容零售 網站、數位内容零售店、或想要涉入將電子内容1 1 3配送到 消費者的任何企業。這企業可以只行銷電子内容1 1 3,或者 可選擇將電子式貨品的銷售加入其目前用來銷售的其他行 銷管道中。經由為電子數位内容商店1 〇3開發而為安全數位 内容電子式配送系統1 0 0的一部分之一組工具程式,即可完 成將可下載的電子式 <貝品導入電子數位内容商店103的服 務提供中。 電子數位内容商店103利用這些工具程式來進行下列事 項: 取得内容提供者101所包封的中介資料Sc(s) 62〇。 自i^gSC(s)提取内容113,而用來作為建立其服務提供 之輸入。 產生用來描述其提供銷售的可下載内容113之報價sc(s) 641 ° 精由X易SC(s) 640的產生並將該交易sc⑷64〇傳送到 f終使用者裝置1〇9,而處理銷售的確認及下載的啟動。 吕里可下載内谷1 13的銷售之交易記錄、及每一次下 的狀態。 處理狀態通知及交易確證要求。 執行帳戶一致性確認。 逞些工具程式被設計成可容許電子數位内容商店1〇3希 O:\85\85156 分剂.D(X; 1255443 :將可下載電子内容113的銷售整合到其服務的方式之彈 Γ。可以^的方式使料些工具程式:縱使不是必要的, 要求清异所1 〇 5處理所講買 結算。這些工具程式也二=内容113之所有金融 甘、匕 」凌兒子數位内容商店103完全服務 :客.,’並自行處理金融交易,其中包括提供促銷及特價 、應。廷些工具程式可讓電子數位内容商店H)3迅速地將可 下載内答113的銷售整合到其現有的服務中。此外,電子數O:\85\85156 Split.DOC •136- 1255443 The electronic tool distribution system 1 Ο 0 tool kit can achieve the above purpose. The content provider 101 will determine the selection process and the information to be displayed. The content promotion website 156 processes the mediation material Sc(s) 620 received from the content distribution tool program via a FTP to a new content directory. The container object can be opened using the Sc(s) preview utility to display or extract information about the container object. This information can then be used to update the HTML web page and/or to add information to a searchable database maintained by the service. The SC(s) preview utility is actually a subset of the electronic content store 1〇3 used to open and process the mediation data SC(s) 620. The mediation SC(s) 620 file should then be moved to a permanent directory maintained by the content promotion website 156. Once the intermediary material SC(s) 620 is integrated into the content promotion website 1 56, the intermediary information SC(s) 620 can be obtained. When a new intermediary material SC(s) 620 is added to the website, the content provider 1.1 can transmit a notification to all of the subscribed electronic digital content stores 1-3, or the content provider 101 can be daily (or specified) Periodically) make a single notification for all intermediary scams SC(s) 620 added during this day (or during this period). The system transmits a designated CGI message string containing parameters to the joined mediation material SC(s) 620, and the notification is performed via a standard HTTP X exchange with the electronic digital content store 103 web server. The notification interface module of the electronic digital content store i 〇3 (described below) processes the message. I. Content escrow performing arts business produces thousands of CDs, movies, and video games every year. O:\85\85 丨5δ Perimeter D〇c -137- 1255443 Exciting, plus the existing ten thousand Content program for the unit. Secure Digital = The electronic dispensing system 100 is designed to support all content programs currently available from the store. The number of content programs that the secure digital content electronic distribution system 100 can download to the customer each day is in thousands or tens of thousands. For a large amount of content, a large amount of bandwidth 1 brain hard disk storage space and bandwidth are required to be distributed and scalable for the multi-(4) pipe content website (1). The system also supports customers around the world. Therefore, overseas websites are needed to accelerate the distribution to global customers. Content hosting on secure digital content electronic distribution system 100 is designed to allow content provider 101 to manage its own content or to share a common set of facilities or a group of facilities. Content escrow on the secure digital content electronic distribution system 100 includes: a plurality of escrow content websites m, all of which are provided by the secure digital content electronic distribution system 丨00; A secondary content website (not shown) containing a number of current hot products provided by the content provider 101. The escrow content website has changed. The number of secondary 111s is based on the number of end users using the system. The content site only has a limited number of songs, but these sites represent a significant percentage of the bandwidth used on the system. When the capacity of the main website increases to the maximum number of passengers, these auxiliary websites will be online. The assisted website can be located close to the Netw〇rk Access p〇int (NAP) to help speed up the download time. You can also place secondary sites in different geographic regions of the world to speed up downloads. O:\85\85156 Split.D0C -138 - 1255443 If the content provider 101 chooses to place all its content (1) on the farm's own system', then the website can be considered as a single-generation with or without additional ancillary content sites. Manage content website (1). This approach allows content providers to build their own scalable, decentralized systems. In another embodiment, the electronic digital content store (9) may also serve as the hosted content website U1 of some content 113. The implementation (4) seeks special financial between the electronic digital content store 1 () 3 and the content provider 101. agreement. 1 · Hosted Content Website The content distribution tool described in the Content Provider section of this manual adds content 113 to the hosted content website m via FTP or HTTP, or via such as on tape, CD-ROM, flash memory, or other The offline device of the delivery content and the like on the computer readable medium adds the content 丨丨3 to the escrow content website 111. The mediation material SC(s) 620 generated by the content provider 111 includes a bar to indicate the URL of the content SC(s) 630 of the content 113. This web address corresponds to a hosted content website 111. Electronic Digital Content Store i 〇3 If the content provider 101 is permitted in the quotation SC(S) 641, the website address can be crossed. When the end user device 109 wants to download the content Sc(s) 630, the end user device 1〇9 is connected to the escrow content website lu. The end user device 109 transmits the license SC(s) 660 to the escrow content website 111 and requests the content SC(s) 630. The license SC(s) 660 is the same license sc(s) 660 sent back by the clearinghouse 105. The digital signature of the license sc(s) 660 can be verified to determine if the license SC(s) 660 is a valid license SC(s). If the license SC(s) is a valid license SC(s), start the download, O:\85\85156 split DOC -139-1255443 or transfer the download request to another hosting content site 1 1 1 . 2. Secure Digital Content Electronic Distribution System 1〇〇 escrow content website 111 ^ For secure digital content electronic distribution system ,, receive the main content of the initial requirement for a content SC(S) 630 The website decides which website should be used to download content丨丨3. The website uses the following information to make the above, ten, and decide: Is there a supplementary content website that stores the required content 113? (The secure digital content electronic distribution system m. The provided content 113 is only stored on the main website); Which geographic area is the end user device 109 located in? (When the end user device 109 makes the request, the information can be obtained from the end user device and the information is placed on the order 80 (〇65〇 and transmitted to the clearing house 105); ^ Is there an appropriate Auxiliary website and at work? (The secondary website may sometimes be offline); What is the load of the secondary website? (In some cases where the secondary website is busy handling access activities, you can choose a less busy website. Before the content SC(s) 630 is transmitted to the end user device 1 , 9, the analysis and verification of the requirements of the end user are performed first. The identification of a license (%) of all licenses used to download the content 113 is placed in a data repository. The database can be checked to ensure that the end user device 1 〇 9 only makes a request for each piece of content 113 purchased. This way, it is possible to prevent malicious users from repeatedly storing the content of the website 111 instead of trying. Slow down the escrow content website 丨n save O:\85\85 丨56 respectively. DOC • 140-1255443 take the speed and prevent unauthorized downloading of the content Sc(s) 63. Within卞 円 7 7 円 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 113 And receive all the requirements that the end user wants to download the content (1). The content escrow route performs the verification check required by the end user to ensure that the end user has actually purchased the content Uh and maintains the auxiliary in the database. The status of the content website, which includes the content 113 is stored in the extended auxiliary content website, and the current status of the auxiliary content website. The current status includes the amount of access activity on the website, and whether a website is due to maintenance work. The only interface of the beta intranet router is the license Sc(s) 66 transmitted by the end user device 1〇9 when the content 113 is requested to be downloaded. The license SC(s) 660 is included to indicate the use. The user is allowed to download the information of the content 113. The auxiliary content website auxiliary content website (not shown) stores the hot digital content electronic distribution system 1 00 hot Content 丨丨 3. These sites are geographically distributed around the world's and are located close to the Network Access Point (NAP) in order to shorten the download time. When the demand for the main escrow content site 丨1 is close to the maximum capacity At the time, these supplementary content websites will be added to the system. Χ. Electronic digital content store Α·Overview-Support for multiple electronic digital content stores 1〇3 (10)5\85156 respectively D〇c -141 - 1255443 Electronic digital content store 103 essence The top is the retailer. These electronic digital content stores are the marketing content 1 1 3 to deliver the content 1 i 3 to the customer's entity. For the content Π 3 delivery, the system will contain digital content retail sites, digital content retail stores Or want to be involved in any business that distributes electronic content 1 1 3 to consumers. This company can only market electronic content 1 1 3, or it can choose to add sales of electronic goods to other marketing channels it currently sells. The download of the downloadable electronic <beibei product into the electronic digital content store 103 can be accomplished by developing a tool for the electronic digital content store 1 〇 3 as part of the secure digital content electronic distribution system 100 Service is available. The electronic digital content store 103 uses these tools to perform the following items: Obtain the intermediary material Sc(s) 62 enclosed by the content provider 101. Content 113 is extracted from i^gSC(s) and used as input to establish its service offering. Producing a quote sc(s) 641 ° used to describe the downloadable content 113 for which it is offered for sale, and generating the sc(4) 64 该 to the f end user device 1〇9, and processing Confirmation of sales and launch of the download. Lüli can download the transaction records of the sales of Neigu 1 13 and the status of each time. Handling status notifications and transaction confirmation requirements. Perform account consistency confirmation. These tools are designed to allow the electronic digital content store to 〇3希O:\85\85156 分.D(X; 1255443: the impeachment of the way in which the sale of downloadable electronic content 113 is integrated into its services. You can use the ^ method to make some tool programs: even if it is not necessary, you need to clear the difference between the 1 and 5 processing of the settlement. These tools are also two = content 113 of all financial Gan, 匕" Ling son digital content store 103 completely Service: Customer., 'And handle financial transactions on its own, including providing promotions and special offers, and the tools can allow the electronic digital content store H)3 to quickly integrate the sales of the downloadable internal answer 113 into its existing services. in. In addition, the number of electrons
仅内^商店U)3無須設有可下載内容ιΐ3的網站,且無須管 理内容113的傳送。係由内容提供者101所選擇的代管内容 網站111執行上述的功能。Only the internal store U) 3 does not need to have a website that can download the content ιΐ3, and there is no need to manage the transfer of the content 113. The managed content website 111 selected by the content provider 101 performs the functions described above.
在車乂佳爲她例中,係利用Java來實施用於電子數位内容 =店103的各工具程式,但是亦可使用諸如C/C++、組合語 言及等效語言等其他的程式語言。我們當了解,可在多種 硬體及軟體平台上執行用於電子數位内容商店103而將於 下又中挽明〈咸等工具程式。可以一電腦可讀取的媒體中 的-應用程式之形式配送作為—完整系統或一完整系統的 、’且成4刀《電子數位内容商店103,該電腦可讀取的媒體包 括(但不限於)諸如網路的電子式配送 '以及軟碟、 CD-ROM、及抽取式硬療機。 在另一實施例中,電子數位内容商店1〇3的各組成部分 疋一程式設計師的軟體工具程式套件的一部分。該工具程 式套件起動將於下文中說明的一般性電子數位内容商店 103組成邵分及工具程式之預定介面。這些預定介面的形式 為應用程式介面(ApI)。使用這些API的開發人員可自一高In the case of Che Yujia, Java is used to implement various programs for electronic digital content = store 103, but other programming languages such as C/C++, combined language, and equivalent language can also be used. We understand that the electronic digital content store 103 can be executed on a variety of hardware and software platforms, and the tools such as salt will be clarified. It can be distributed as a complete system or a complete system in a computer-readable medium, and is a 4-segment electronic digital content store 103, which includes (but is not limited to) ) Electronic distribution such as the Internet, as well as floppy disks, CD-ROMs, and removable hard machines. In another embodiment, the components of the electronic digital content store 1〇3 are part of a programmer's software utility suite. The tool suite starts with the general electronic digital content store 103 described below to form a predetermined interface for the sub-segment and the tool program. These predetermined interfaces are in the form of an application interface (ApI). Developers using these APIs can be self-sufficient
O:\85\85 156 分剖 DOC -143 - 1255443 階應用程式執行該等組成部分之任何功能。由於提供這些 組成部分的API,所以程式設計師可迅速地開發出一自訂 規格的電子數位内容商店丨03,而無須重新設計任何這些組 成邵分的這些功能及資源。 電子數位内容商店1 03並不限於網路型的服務提供。想 要銷售可下載電子内容113的所有電子數位内容商店1〇3都 可使用所提供的該等工具程式,而不必顧及用來將内容u 3 配送到最終使用者的傳輸基礎設施或傳送模式。經由衛星 或、纟覽線基礎設施而提供的廣播服務也利用這些工具程式來 取得、包封、及追蹤電子内容Π3的銷售。供銷售的電子式 <貝品之展現方式及將這些電子式貨品配送到最終使用者的 方法是廣泛型服務提供與點對點互動網路型態服務提供之 間主要的不同點。 B ·點對點電子數位内容配送服務 點對點主要意指電子數位内容商店1 03與最終使用者裝 置109之間的一對一互動式服務。此種方式通常代表一種經 由電話或境線數據機連線而提供的網際網路型服務。在本 模型中也支援網際網路以外的網路’只要這些網路符合網 路伺服器/用戶端瀏覽器的模型即可。圖9是一電子數位内 容商店1 03的主要工具程式、組成部分、及程序之方塊圖。 1.整合要求 安全數位内容電子式配送系統100不只是產生了新的線 上業務’而且也提供了 一種讓現有企業將可下載電子内容 113的銷售整合到其現有銷售管道之方法。提供給電子數位 O:\85\85 156 分;5lj.DOC -144 - 1255443 内容两店103的工具程式套件簡化了此種整合的程序。内容 取得工具程式171及%⑷包封工具程式153提供了 一種方 法給電子數位内容商;j1G3,電子數位内容商店⑻利用該 方法自參與的内容提供者⑻取得其可用來銷售的資訊,並 產生將這些可下載物件對照到其本身庫存中的項目所需之 檔案。可以批次方式驅動該程序,並可將該程序的大:分 自動化’並且只在將新的内容丨丨3整合到網站時才執行該程 序。 用於女全數位内容電子式配送的工具程式已被設計成 可將可下載電子内容⑴的銷售整合到網路型電子數位内 容商店1〇3的典型實施例(例如c〇lumbia H_e 〇ηΐ_、O:\85\85 156 Sectional DOC -143 - 1255443 The application of the order performs any of these components. By providing APIs for these components, programmers can quickly develop a custom-sized electronic digital content store 丨03 without having to redesign any of these features and resources. The electronic digital content store 103 is not limited to a web-based service offering. All electronic digital content stores 1 3 that want to sell downloadable electronic content 113 can use the provided utilities without regard to the transport infrastructure or transfer mode used to deliver content u 3 to the end user. Broadcasting services provided via satellite or cable infrastructure also use these tools to acquire, encapsulate, and track sales of electronic content. The electronic way of selling <beipin's presentation and the way in which these electronic goods are delivered to end users are the main differences between the broad service offering and the peer-to-peer interactive network type service offering. B. Point-to-point electronic digital content distribution service Point-to-point mainly refers to a one-to-one interactive service between the electronic digital content store 103 and the end user device 109. This approach typically represents an Internet-based service provided via a telephone or line-of-line modem. In this model, networks other than the Internet are also supported' as long as they conform to the model of the network server/user browser. Figure 9 is a block diagram of the main utilities, components, and procedures of an electronic digital content store 103. 1. Integration Requirements The secure digital content electronic distribution system 100 not only creates new online business, but also provides a way for existing businesses to integrate sales of downloadable electronic content 113 into their existing sales pipeline. Provided to electronic digits O:\85\85 156 points; 5lj.DOC -144 - 1255443 The two-shop 103 tool suite simplifies this integrated program. The content acquisition tool 171 and the %(4) encapsulation utility 153 provide a method for the electronic digital content quotient; j1G3, the electronic digital content store (8) uses the method to obtain information available for sale from the participating content providers (8), and generate Compare these downloadable items to the files needed for the items in their own inventory. The program can be driven in batch mode, and the program can be automated: and the program is only executed when the new content 丨丨3 is integrated into the website. A tool for electronic distribution of female digital content has been designed to integrate sales of downloadable electronic content (1) into a typical embodiment of a network type electronic digital content store (e.g., c〇lumbia H_e 〇ηΐ_,
Music Boulevard、@T〇wer)及等效實施例,而且只需對其 現仃的内答113零售典範作最小的改變。有數種可行的整合 万法,而且在較佳實施例中,電子數位内容商店ι〇3對全產 口口搜寻、預覽、選擇(購物車)、及購買都提供了支援。每 兒子數位内客商店丨03都要培養其客戶的忠誠度,並以目 則所作的才目同方式持續提供其本身的促銷方案且行銷其產 口口在安全數位内客電子式配送系統工⑻中,只需指示其庫 存中的哪些產品可供電子式下載,並讓其客戶於進行購買 選擇時可選擇電子式下載的選項。在另一實施例中,客戶 的購物車可混合包含電子(内容丨丨3)及實體媒體的選擇。在 客戶結帳之後,電子數位内容商店1〇3已完成了金融結算, 並記錄及通知其出貨及裝卸貨功能,以便處理所購買的實 to貪w,電子數位内容商店} 〇3的商務處理函式然後呼叫交Music Boulevard, @T〇wer) and equivalent embodiments, and only minimal changes to their current internal retail specification. There are several possible integrations, and in the preferred embodiment, the electronic digital content store ι〇3 provides support for full-mouth search, preview, selection (shopping cart), and purchase. Each son's number of in-house shops 丨03 must cultivate the loyalty of its customers, and continue to provide its own promotion plan in the same way as the goal, and market its mouth in the safe digital electronic distribution system In (8), simply indicate which products in the inventory are available for electronic download and have their customers have the option to electronically download when making purchase choices. In another embodiment, the customer's shopping cart may mix selections containing electronic (content 丨丨 3) and physical media. After the customer settles the account, the electronic digital content store 1〇3 has completed the financial settlement, and recorded and notified its shipping and loading and unloading functions, in order to deal with the purchase of the real money, electronic digital content store} 〇 3 business Processing function and then call
O:\85\85I56 ^IJ.DOC -145- 1255443 易處理模組175以處理所有的電子式下載。電子數位内容商 二03只傳送所需的資訊,且自該時點起,將由安全數位内 谷% :式配以統! _工具程式套件處理所有的程序。在 另—貫施例中’如果電子數位内容商店103只希望銷售可下 載的貨品,或希望將實體的及可下載的貨品之金融^算分 開’則研可利用安全數位内容電子式配送系統_的工具程 式而執行其他的交易處理方法,以便處理金融結算。 為了處理貨品的下載,針對自内容提供者HH的内容促 銷網站156取得的每一種可下載產品,將-產品識別碼(圖 ^未不出)提供給電子數位内容商店1〇3。該產品識別碼係 了客戶對-可τ載產品的購買選擇相關聯。電子數位内容 商店103將孩產品識別碼傳送到交易處理模組175,以便識 :使用者所購買的產品。為了描述產品而產生的sc⑷(: hSC(s) 641)係與電子數位内容商店1()3隔離,且係、存放在 一報價資料庫181中’以便簡化對這些物件的管理,並使這 些物件的存在對電子數位内容商店103具有透通性。 提供交易處理模組175及其他額外的函式作為網路伺服 器端的可執行檔(亦即CGI&NSApi、ISApi可呼叫函式), 或:將各AH整合到一說或。物件函式庫中。㈣函式處 理最終使用者互動及與清算所⑽間的或有互動之執行時 程序。這些函式與網路伺服器的客戶服務程式互動,以便 、用來啟動内4 113下載私序所需的檔案,並將該等檔案 下載到最終使用者裝置1G 9。這些函式也處理或有的互動, 以便提供授權及接受活動完成的通知。 O:\85\85 丨 56 分剤.D〇c -146 - 1255443 也提供一對帳工具程式,以便協助電子數位内容商店 103聯繫清算所105,以便根據其本身的交易記錄及清算所 105的交易記錄而對帳。 2 ·内客取得工具程式1 7 1 内容取得工具程式171負責連接到内容促銷網站156,以 便預覽及下載中介資料SC(s) 62〇。因為内容促銷網站是一 才*準網站,所以電子數位内容商店^ 〇3利用一網路瀏覽器來 瀏覽該網站。瀏覽的特性將依據内容提供者1〇1的網站設計 而有所不同。也些網站可能使許多的促銷資訊畫面具有廣 泛的搜尋能力。其他的網站可能只提供簡單的瀏覽器介 面,用以自曲名、演出者、或新發行項目的清單中作選擇。 所有網站都包含中介資料SC(s) 620的選擇,而中介資料 SC(s) 620包含了一首歌曲或一張專輯的所有促銷資訊及 描述性資訊。 此外,電子數位内容商店103可訂閱内容更新,並經由 FTP而自動接收更新。 閱覽中介資料 内容取得工具程式1 7 1是一網路瀏覽器協助應用程式, 而當在内容促銷網站156上選擇一中介資料sc(s) 620連結 時,即啟動該内容取得工具程式171。選擇該Sc(s)時,將 使内容取得工具程式171下載到電子數位内容商店1〇3,並 啟動該協助應用程式。内容取得工具程式171開啟中介資料 SC(s) 620 ’便顯示中介資料Sc(s) 62〇内含的無加密資訊。 在一音樂的例子中,所顯示的資訊包括所提取的中介資料 〇.\85\85 156 分’剤+ DOC -147- 1255443 14歌曲相關聯的圖形影像、及描述該歌曲的資訊,而 、果β歌曲的一試聽片段包含在中介資料^⑷中,則 τ可收聽琢試聽片段。在内容113是音樂的一個例子中,如 果内备k供者1 〇 1有提供,則亦顯示與歌曲或專輯有關的促 專輯名稱、及蟄人。係顯示該資訊作為瀏覽器視 固中的-系列連結HTML網頁。無法自零售内容網站18〇取 得諸如歌曲及歌詞等的可講買内容113、以及内容提供者 1 〇 1想要保護的中介資料。 在另一貫施例中,内容提供者101提供付費下載的可選 用之促銷内谷。在該實施例中,係在中介資料§〔⑷㈣中 將汶促銷内容加岔。當已向電子數位内容商店⑻的帳戶索 取指定的費用時’即可經由清算所1G5而處理因開啟該資料 所發生的金融結算。 提取中介資料 除了預覽的能力之外,該工具程式提供了兩種額外的特 殊功能:中介資料提取、及報價%0)641的準備。選擇中 介資料提取選項時,提示電子數位内容商店103將路徑及檔 案名稱輸人到將要儲存該中彳資料的位£。㈣諸如圖形 及音樂試聽片段等的二進位中介資料儲存成獨立的檔案。 將文字中介資料儲存在一ASCII定界文字檔,零售内容網 站180然後可將該ASCII定界文字檔輸入到其資料庫中。也 在一獨立的TOC檔案中產生用來描述該ASCII定界文字檔 之一表。也有額外的選項,可在其他國家語言支援(Ν^οη1 Language Support ;簡稱NLS)所支援的袼式中進行提取。 〇:\85\85丨56 分’剤 D0C -148- 1255443 所提取的資料中提供的一件重要資訊是產品識別碼。該 產品識別碼是電子數位内容商店103的商務處理函式用來 識別交易處理模組175(若要得知更多的資訊,請參閱交易 處理該節)及使用者所購買的内容Π3之產品識別碼。交易 處理模組1 7 5利用該產品識別碼來適當地自報價資料庫^ 1 擷取週當的報價SC(s)641,以供隨後下載到最終使用者裝 置1 09笔子數位内各商店1 03可完全控制其將可下載内容 113在其網站上展現的方式。電子數位内容商店1们只需要 保留一份報價給該產品識別碼的内容113之交互對照,以便 適當地連接到安全數位内容電子式配送系統1〇〇之工具程 式。在此處提供該資訊時,可讓電子數位内容商店1〇3以與 報價SC(s) 641程序平行之方式,將該產品或内容ιΐ3整合 到其庫存及銷售網頁(資料庫)中,這是因為這兩個程序使 用相同的產品識別碼來對照到該產品。下文中將進一步說 明此種情形。 報價SC(s)產生包封工具程式153 電子數位内容商店1〇3需要產生一報價8(:(3) 641 ’用以 描述供銷售的可下載内容113。係自中介資料Sc(s) 62〇取 得被放入報價SC(s) 641的資料中之大部分。内容取得工具 程式171以下列步驟產生該報價sc(s) 641 : 自中介資料SC(s) 620中移除並不需要被包含在中介資 料SC(s) 620中的報價sc(s)樣板所指定的報價Sc(s) 641 中之各組成部分。 加入電子數位内容商店103的該工具程式組的組態設定 〇Λ85\8515ό 分荆.DOC -149- 1255443 選項所規疋的預設項目指定之額外必須組成部分。 提不中介資料Sc(s) 620的報價Sc(s)樣板指定的額外必 須輸入或選擇。 呼叫SC(s)包封工具程式153,以便將該資訊包封到Sc(s) 格式中。 在中71貝料SC(s) 620中保留將由播放應用程式195在最 終使用者裝置109上顯示的中介資料。自中介資料sc(s) 620中移除只被電子數位内容商店1〇3用來作為其網路服務 資料庫的輸人之其他促射介資料。錄料如浮水印彳旨 寒 令、加密的對稱金鑰623、及指定物件的容許使用的使用條 件517等内容提供者1〇1所提供之權利管理資訊。 後在報饧SC(s) 641中包含該拆開的中介資料Sc(s) 620。電子數位内容商店1Q3也將稱為商店使用條件5i9或講 買選項的其本身之使用條件附加到報價SC(s)641。可以互 動方式完成上述步驟’或經由一組預設的指令而自動完成 上述步驟。如果被設定為以互動方式處理,則以内容提# 者101規定的-組容許之物件使用條件5 ^ · 内容商店心電子數位内容商店職後選擇其想= 給其客戶的選项。這些選項現在變成新的使用條件或商店 使用條件519。為了自動地處理,電子數位内容商店⑻設 组針對所有内容113而提供的預設賭買選項。將這些預 又選-自動比對内客提供者丨Q1規定的容許使用條件5 1 7, 並於兩者並無不—致時,在報價吻)641中設定這些預設O:\85\85I56 ^IJ.DOC -145- 1255443 The easy-to-handle module 175 handles all electronic downloads. The electronic digital content quotient 2 03 only transmits the required information, and from that point on, it will be matched by the security digital range: The _tool suite handles all programs. In another example, if the electronic digital content store 103 only wants to sell downloadable goods, or wants to separate the financial transactions of the physical and downloadable goods, then the research can use the secure digital content electronic distribution system. The tool program executes other transaction processing methods to handle financial settlement. In order to process the download of the goods, the product identification code (Fig. 2) is provided to the electronic digital content store 1〇3 for each downloadable product obtained from the content promotion website 156 of the content provider HH. The product identification code is associated with the customer's choice of purchase of the product. The electronic digital content store 103 transmits the child product identification code to the transaction processing module 175 to identify the product purchased by the user. The sc(4)(: hSC(s) 641) generated to describe the product is isolated from the electronic digital content store 1()3 and stored in a quote database 181' to simplify the management of these objects and to make these The presence of the object is transparent to the electronic digital content store 103. The transaction processing module 175 and other additional functions are provided as executable files on the network server side (ie, CGI & NSApi, ISApi callable functions), or: each AH is integrated into a talk or. In the object library. (4) The function of the end-user interaction and the continuation of the execution time with the clearing house (10). These functions interact with the web server's client service program to enable the download of the files needed for the private sequence and download the files to the end user device 1G 9. These functions also handle contingent interactions to provide authorization and to receive notification of the completion of the event. O:\85\85 丨56 minutes.D〇c -146 - 1255443 A pair of account tools are also provided to assist the electronic digital content store 103 in contacting the clearing house 105 in accordance with its own transaction records and clearing house 105 Reconciliation of transaction records. 2 • Guest access tool 1 7 The content acquisition tool 171 is responsible for connecting to the content promotion website 156 to preview and download the mediation information SC(s) 62〇. Since the content promotion website is a quasi-website, the electronic digital content store ^3 uses a web browser to browse the website. The features of the browsing will vary depending on the website design of the content provider. Some websites may also have a wide range of search information for a wide range of promotional information. Other websites may only provide a simple browser interface to choose from a list of titles, performers, or new releases. All sites contain the selection of the intermediary material SC(s) 620, while the mediation material SC(s) 620 contains all promotional and descriptive information for a song or an album. In addition, the electronic digital content store 103 can subscribe to content updates and automatically receive updates via FTP. Viewing Intermediary Information The content acquisition utility program 1 7 1 is a web browser assistance application, and when an intermediary material sc(s) 620 is selected on the content promotion website 156, the content acquisition tool 171 is launched. When the Sc(s) is selected, the content obtaining tool 171 is downloaded to the electronic digital content store 1〇3, and the assisting application is started. The content acquisition tool 171 opens the intermediary data SC(s) 620 ' to display the unencrypted information contained in the intermediary data Sc(s) 62〇. In the case of a music, the displayed information includes the extracted mediation data \.\85\85 156 points '剤+ DOC -147-1255443 14 graphics image associated with the song, and information describing the song, and If a trial piece of the beta song is included in the mediation data ^(4), then τ can listen to the audition segment. In the case where the content 113 is music, if the internal k supplier 1 〇 1 is provided, the name of the album associated with the song or album, and the swearing person are also displayed. This information is displayed as a series of linked HTML pages in the browser view. It is not possible to retrieve the commercially available content 113 such as songs and lyrics from the retail content website 18, and the mediation information that the content provider 1 想要 1 wants to protect. In another embodiment, the content provider 101 provides an optional promotional valley for paid downloads. In this embodiment, the promotional content is added to the intermediary information § [(4) (4). When the specified fee has been retrieved from the account of the electronic digital content store (8), the financial settlement due to the opening of the material can be handled via the clearing house 1G5. Extracting mediation data In addition to the ability to preview, the utility provides two additional special features: mediation data extraction, and preparation for quote %0)641. When the mediation data extraction option is selected, the electronic digital content store 103 prompts the path and file name to be entered into the bit £ which will store the metadata. (4) Binary mediation materials such as graphics and music audition clips are stored as separate files. The text mediation data is stored in an ASCII delimited text file, and the retail content website 180 can then enter the ASCII delimited text file into its database. A table for describing the ASCII delimited text file is also generated in a separate TOC file. There are also additional options that can be extracted from the shackles supported by language support in other countries (Ν^οη1 Language Support; NLS for short). 〇:\85\85丨56分'剤 D0C -148- 1255443 One of the important information provided in the extracted data is the product identification code. The product identification code is a business processing function of the electronic digital content store 103 for identifying the transaction processing module 175 (for more information, please refer to the transaction processing section) and the content purchased by the user Π3 Identifier. The transaction processing module 157 uses the product identification code to appropriately retrieve the weekly quotation SC(s) 641 from the quotation database ^ 1 for subsequent download to the end user device 1 09 pen number in each store 1 03 has full control over the way it displays the downloadable content 113 on its website. The electronic digital content store 1 only needs to maintain a cross-reference to the content 113 of the product identification code in order to properly connect to the secure digital content electronic distribution system. When this information is provided here, the electronic digital content store can be integrated into its inventory and sales pages (databases) in parallel with the quote SC(s) 641 program. This is because the two programs use the same product identifier to compare to the product. This situation will be further explained below. The quotation SC(s) generates the encapsulation tool program 153. The electronic digital content store 1 〇 3 needs to generate a quotation 8 (: (3) 641 ' to describe the downloadable content 113 for sale. From the intermediary information Sc(s) 62 〇Get most of the information put into the quotation SC(s) 641. The content acquisition tool 171 generates the quotation sc(s) 641 by the following steps: the removal from the intermediary material SC(s) 620 does not need to be Each component in the quotation Sc(s) 641 specified by the quotation sc(s) template included in the intermediary material SC(s) 620. The configuration setting of the utility group added to the electronic digital content store 103 〇Λ85\ 8515ό分分.DOC -149- 1255443 The additional mandatory components specified by the default items specified by the option. The quotation of the Sc(s) 620 quoted by the Sc(s) template must be entered or selected. Call SC (s) Encapsulating the utility program 153 to encapsulate the information in the Sc(s) format. The intermediary in the SC (s) 620 is reserved for display by the playback application 195 on the end user device 109. Information. The removal from the intermediary data sc(s) 620 is only used by the electronic digital content store 1〇3. Other promotional materials for the input of the Internet service database. Content providers such as watermarking, symmetrical key 623, and permitted use conditions of the specified object 517 1 The rights management information provided. The opened intermediary information Sc(s) 620 is included in the newspaper SC(s) 641. The electronic digital content store 1Q3 will also be referred to as the store use condition 5i9 or the buy option. The usage conditions of itself are attached to the quotation SC(s) 641. The above steps can be completed interactively or automatically through a set of preset instructions. If it is set to be processed in an interactive manner, the content is presented as #101 Prescribed - Group Permitted Object Usage Conditions 5 ^ · Content Store Heart Electronic Digital Content Store selects its option to give it to its customers. These options now become new usage conditions or store usage conditions 519. For automatic processing The electronic digital content store (8) sets a preset gambling purchase option provided for all the content 113. These pre-selected-automatic comparisons of the allowable use conditions of the customer provider 丨Q1 5 1 7 Who does not - when activated, these default settings in the quotation kiss) 641
0.\85\85156 分刻.DOC 150- 1255443 一旦產生報價SC(s) 041之後,即將該報價Sc(s) 641儲存 在一報價資料庫181中,並以中介資料5(:(^) 62〇中預先指 足的產品識別碼作為該中介資料Sc(s) 620之索引。當一客 戶稍後連線到報價資料庫1 8 1而擷取報價sc(s) 641,以便 包封並傳送到該最終使用者客戶時,電子數位内容商店i 〇3 利用該產品識別碼來識別該客戶所購買的可下載内容 I 13。若要得知更多的細節,請參閱交易處理模組175的該0.\85\85156 Minutes.DOC 150- 1255443 Once the quotation SC(s) 041 is generated, the quotation Sc(s) 641 is stored in a quotation database 181 with the intermediary material 5 (:(^) The product identification code of the pre-fingered foot in 62〇 is used as the index of the intermediary information Sc(s) 620. When a customer connects to the quotation database 1 8 1 later and draws the quotation sc(s) 641 to enclose and When transmitted to the end user customer, the electronic digital content store i 〇 3 uses the product identification code to identify the downloadable content I 13 purchased by the customer. For more details, please refer to the transaction processing module 175. The
Arfr 即 0 在另一實施例中,電子數位内容商店1〇3將報價Sc(s) 641放在其網站上。該實施例需要改變報價Sc(s) 641,例 如以電子數位内容商店103的網址取代代管内容網站 網址。 3·交易處理模組175 電子數位内容商店103將帳單開立的工作轉送到清算所 105。此外,電子數位内容商店1 〇3亦可直接向清算所i 〇5 要求金融清算。有兩種處理最終使用者對可下載内容113 的購買要求之基本模式。如果電子數位内容商店1〇3並不希 望處理購買的金融結算,且並無將影響到貨品的銷售之特 殊促銷及獎勵辦法,而且並未使用將購買要求批次化的一 購物車圖像,則電子數位内容商店1 〇3可選擇提供將其内容 II 3下載網頁直接連結到報彳貝SC(s) 641。將以中介資料中 包含的零售價格資訊建互這些報價SC(s) 641。展現具有銷 售條款的購買選項之一特殊HTML報價網頁也是包含在報 價SC(s) 641中。係利用建立報價SC(s) 641時所產生的一樣 O:\85\85156 分割 DOC -151 - 1255443 板來建立該網頁。當最終使用者點選到報價Sc(s) 64 1的該 直接連結時,即將該報價S C (s) 6 4 1下載到最終使用者裝置 1⑽之瀏覽器,而啟動一個用來開啟該容器物件並展現該報 價SC(s) 641中包含的報價網頁之協助應用程式。該網頁包 含一個用來收集客戶資訊之表格,該客戶資訊包括信用卡 資訊及購買選項。然後將該表格直接傳送到清算所丨〇5,以 i、至融結异其處理。该表格可選擇包含使用最終使用者的 t用貝Λ或工業標準的區域交易控制常式之欄位。Arfr is 0 In another embodiment, the electronic digital content store 1〇3 places the offer Sc(s) 641 on its website. This embodiment requires a change in the offer Sc(s) 641, for example, replacing the escrow content website URL with the URL of the electronic digital content store 103. 3. Transaction Processing Module 175 The electronic digital content store 103 transfers the work of opening the bill to the clearing house 105. In addition, the electronic digital content store 1 〇 3 can also request financial clearing directly from the clearing house i 〇5. There are two basic modes of processing the end user's purchase requirements for downloadable content 113. If the electronic digital content store does not wish to process the financial settlement of the purchase, and there are no special promotions and incentives that will affect the sale of the goods, and do not use a shopping cart image that will be batched for the purchase request, Then, the electronic digital content store 1 〇 3 can choose to provide its content II 3 download webpage directly to the newspaper SC SC SC(s) 641. These quotes SC(s) 641 will be constructed with the retail price information contained in the intermediary information. A special HTML offer page that presents a purchase option with a sales term is also included in the quote SC(s) 641. This page is created by dividing the DOC -151 - 1255443 board with the same O:\85\85156 generated when the quote SC(s) 641 is created. When the end user clicks on the direct link to the offer Sc(s) 64 1 , the quote SC (s) 6 4 1 is downloaded to the browser of the end user device 1 (10), and a container for opening the container object is started. And the assistance application for the quotation page included in the quotation SC(s) 641 is displayed. This web page contains a form for collecting customer information, including credit card information and purchase options. The form is then sent directly to the clearing house 丨〇5, where i, to melt the difference. The table may select a field containing a regional trading control routine using the end user's t-belly or industry standard.
現在將說明電子數位内容商店1〇3處理帳單開立的一實 施例。處理購買要求的較典型模式可讓電子數位内容商店An embodiment in which the electronic digital content store 1-3 handles billing will now be described. A more typical mode of handling purchase requests for electronic digital content stores
103處理金融結算,然後將下載授權許可傳送到最終使用 者。該方法可讓電子數位内容商店103將可下載内容113 銷售與所提供其他貨品整合,而在其網站上銷售,並可進 仃購員要求的批次處理,只須(經由一購物車圖像)向客戶 乍、人的口併收費,而無須向每一次下載要求作個別的收 費’並且可讓電子數位内容商店103直接追蹤其客戶的購買 模式,且提供特殊的促銷及會Μ惠選項。纟此種環境中, σ下載内各1 1 3的報價係包含在電子數位内容商店⑻的購 物、罔頁中,且當最終使用者選擇該内容⑴時,即將該内容 113放到-購物車中,並以如同電子數位内容商店⑻現有 購物模型之方式進行處理及金融結算。一旦完成該金融結 算《後女王數位内容電子式配送系統1〇〇的商務處理程序 隨:呼叫交易處理模組175,以便完成該交易。 父易處理模組1 7 5103 processes the financial settlement and then transmits the download license to the end user. The method allows the electronic digital content store 103 to integrate the saleable downloadable content 113 with other provided goods, and sell it on its website, and can enter the batch processing required by the purchaser only by (via a shopping cart image) ) to the customer, the person's mouth and charges, without having to make an individual charge for each download request' and allow the electronic digital content store 103 to directly track the purchase mode of its customers, and provide special promotions and benefits options. In this environment, the quotation of each 1 1 3 in the σ download is included in the shopping, title page of the electronic digital content store (8), and when the end user selects the content (1), the content 113 is placed in the shopping cart. And process and financial settlement in the same way as the existing digital shopping model of the electronic digital content store (8). Once the financial settlement is completed, the business process of the Queen Digital Content Electronic Distribution System is followed by a call transaction processing module 175 to complete the transaction. Parent easy to handle module 1 7 5
O:\85\85156 分削 DOC -152- 1255443 交易處理模組1 75的功能在於整合最終使用者裝置! 〇9 所需的資訊,以便啟動並處理所購買内容1 1 3之下載。將該 資訊包封到一交易SC(s) 640,網路伺服器然後回應該購買 成交而將該交易SC(s) 640送回到最終使用者裝置1〇9。交 易處理模組1 75向電子數位内容商店1 〇3的商務處理程序要 求三件資訊:所購買内容11 3之產品識別碼、交易資料642、 及確認該購買結算的一 HTML網頁或CGI網址。O:\85\85156 Dividing DOC -152- 1255443 The function of Transaction Processing Module 1 75 is to integrate the end user device! 〇9 Required information to initiate and process the download of the purchased content 1 1 3 . The information is encapsulated in a transaction SC(s) 640, and the network server then returns to the transaction and sends the transaction SC(s) 640 back to the end user device 1〇9. The transaction processing module 1 75 requests three pieces of information from the business processing program of the electronic digital content store 1 〇 3: the product identification code of the purchased content 113, the transaction data 642, and an HTML web page or CGI website confirming the purchase settlement.
該產品識別碼是在與所銷售内容Π 3相關聯的中介資料 SC(s) 620中而提供給電子數位内容商店ι〇3之值。該產品 識別碼係用來自報價資料庫1 8 1擷取相關聯的報價Sc(s) 641 0 交易資料642是電子數位内容商店1〇3的交易處理函式 所提供的一資訊結構,且隨後利用該交易資料642使清算所 10 5的處理與電子數位内容商店丨〇 3執行的金融結算交易相 關聯,並提供將包含在下載到最終使用者裝置1〇9的内容 113的浮水印之使用者識別資訊。當清算所1〇5接收一有效 的訂單SC(s) 650時,清算所1〇5即記錄—個指示電子數位 内容商店H)3已銷售内容113的交易,並記錄其中包括最終 使用者的名稱及—交易識別碼535之交易資料642。交易識 別碼奶可提供對金融結算交易的—對照。清算所1〇5隨 將兹資訊送回到電子數位内容商店1()3,以便用來核對其, 戶與自内容提供者101(或其代理商)接收的帳單開立報 是否一致。内容提供者⑻可利用清算所交易記錄Μ幻 定其已銷售了哪虺内交1 田 ,一鬥奋113,並使其得以向每一電子數位fThe product identification code is the value provided to the electronic digital content store ι 3 in the intermediary material SC(s) 620 associated with the content Π 3 being sold. The product identification code is obtained from the quotation database 1 8 1 and the associated quotation Sc(s) 641 0. The transaction data 642 is an information structure provided by the transaction processing function of the electronic digital content store 1-3, and then The transaction data 642 is used to associate the processing of the clearinghouse 105 with the financial settlement transaction executed by the electronic digital content store 丨〇3, and to provide the use of the watermark to be included in the content 113 downloaded to the end user device 1〇9. Identify information. When the clearing house 1〇5 receives a valid order SC(s) 650, the clearing house 1〇5 records a transaction indicating the electronic digital content store H)3 sold content 113, and records the end user The name and transaction data 642 of the transaction identifier 535. The transaction identification code milk can provide a comparison of financial settlement transactions. The clearinghouse 1〇5 sends the information back to the electronic digital content store 1()3 to verify whether the account is consistent with the billing report received from the content provider 101 (or its agent). The content provider (8) can use the clearing house transaction record Μ 定 其 其 其 已 已 已 已 虺 虺 , , , , , , , , , , , , , , , 113 113 113 113 113 113 113
0:\85\85丨56 分;利 DOC -153 - 1255443 容商店103開立帳單,以便收取其應得的授權費。亦可替代 性地利用帳單開立以外的其他電子方式來結算内容提供者 101與電子數位内容商店103之間的帳目。 交易SC(s) 640中提供的資訊以及交易SC(s) 640的安全 性及:整性足以使清算所105信賴該購買交易是有效的,且 在清异所105記錄該銷售之前,不需要有進一步的確認。然 電子數位内容商店1()3可選擇在向其帳戶收費之前(清 算所105記錄交易而向内容提供者1G1指示電子數位内容商 店103已,到銷售該内容113的帳款之時),先要求該交易的 確證。交易資料642中的一旗標指示對確證/通知的該要 求。在此種情形中,清算所1〇5聯繫電子數位内容商店⑺), 並在向其帳卢收費且釋出加密金鑰623之前,先自電子數位 内容商店103取得授權。自清算所1〇5將該交易識別碼535 傳送到電子數位内容商店1〇3,作為該確證要求的一部分, 而使電子數位内容商店1〇3得以將該要求與對最終使用者 進行的一先蓟父易相關聯。該交易識別碼535可以是電子數 位内容商店103希望使用且只用於此一功效的任何特有值。 交易資料642亦包含一客戶名稱。該名稱可來自使用者 購買時所填寫的購買表格的使用者名稱欄位,或來自先前 黾子數位内谷商店1 〇 3的某一使用者登錄程序期間所登錄 的資訊’或與用於該交易的信用卡相關聯的信用卡資訊所 得到的正式名稱。隨後將該名稱包含在授權許可浮水印527 中。 父易資料642亦包含最終使用者所購買的商店使用條件0:\85\85丨56 points; profit DOC-153 - 1255443 The store 103 opens a bill to collect the authorization fee it deserves. The account between the content provider 101 and the electronic digital content store 103 can also be settled by alternative electronic means other than billing. The information provided in the transaction SC(s) 640 and the security of the transaction SC(s) 640 and: the integrity is sufficient for the clearing house 105 to rely on the purchase transaction to be valid, and it is not required to record the sale at the clearinghouse 105. There is further confirmation. However, the electronic digital content store 1() 3 may select before charging the account (the clearing house 105 records the transaction and indicates to the content provider 1G1 that the electronic digital content store 103 has been sold to the content 113), first A confirmation of the transaction is required. A flag in the transaction data 642 indicates the request for confirmation/notification. In this case, the clearinghouse 1〇5 contacts the electronic digital content store (7), and obtains authorization from the electronic digital content store 103 before charging the account and releasing the encryption key 623. The clearinghouse 〇5 transmits the transaction identification code 535 to the electronic digital content store 1-3 as part of the verification request, enabling the electronic digital content store 1-3 to make the request and the end user First, the father is easy to associate. The transaction identifier 535 can be any unique value that the electronic digital content store 103 wishes to use and only for this effect. The transaction data 642 also contains a customer name. The name may be from the user name field of the purchase form filled out by the user at the time of purchase, or the information registered during the login process of a user from the previous dice number in the store 1 〇 3 ' or with The official name of the credit card information associated with the transaction's credit card. This name is then included in the license watermark 527. Father Easy Data 642 also contains the conditions of use of the store purchased by the end user.
O:\85\85 丨 56 分刮 DOC -154- 1255443 5 1 9。該資訊係包含在授權許可浮水印527中,且最終使用 者裝置1 09將該資訊用於拷貝及播放控制。 交易處理模組175所需的最後參數是確認該購買結算之 HTML網頁或CGI網址。該參數之目的在於可讓電子數位内 谷商店ί 03回應最終使用者,且電子數位内容商店1 〇3係利 用金融結算的一確認訊息及其想要在其回應訊息中包含的 任何其他資訊來回應該最終使用者。當接收並處理交易 SC(s) 640時,該HTML網頁及CGI網址係包含在交易SC(s) 640中’且係顯示在最終使用者裝置ι〇9的瀏覽器視窗上。 父易SC(s) 640是在處理購買提交之後自電子數位内容 商店103到最終使用者的Ηττρ回應。傳送一 Sc(s)作為直接 HTTP回應時,將強制在最終使用者裝置1〇9上自動載入一 SC(s)處理器協助應用程式,因而可自動完成交易,而無須 依賴進一步由最終使用者啟動的動作。將在後文的最終使 用者裝置109及播放應用程式195的該節中詳述該程序。 當以必須的參數呼叫交易處理模組175時,交易處理模 組175建立一交易sc⑷64〇,該交易Sc(s) 640包含交易資 料642、交易確認HTML網頁或參照網址、及%⑷的其他必 須女全特性,且交易處理模組1 75擷取及嵌入與該購買相關 聯的報價Sc(s) 641。交易處理模組175也記錄與該交易相 關的資訊,以供爾後為通知介面模組1 76及對帳工具程式 1 7 9所使用。 4 ·通知介面模組1 7 6 通知介面模組1 76是一網路伺服器端的可執行常式 O:\85\85156 分刮 D〇c -155 - 1255443 (NSAPI、ISAPI、或等效API可呼叫的CGI或函式)。通知介 面模組176處理來自清算所105、最終使用者裝置1〇9、代管 内容網站111、及内容提供者101之選項要求及通知。電子 數位内谷商店103可選擇要求通知的事件有·· 清算所105對最終使用者裝置1〇9要求一加密金鑰623且 對稱金鑰623正針對指定的内容U3釋出加密金鑰之 通知。可選擇將該通知設定成再將加密金鑰623傳送到 最終使用者裝置109之前先要求來自電子數位内容商店 1 0 3的確註。 代管内容網站m對已將内容Sc(s) 63〇傳送到最終使用 者裝置109之通知。 取終使用者裝置109對已接收到内容Sc(s) 63〇及授權許 可SC(s) 660並成功地利用該等Sc(s)來處理内容ιΐ3或發 現該等SC(s)被篡改之通知。 内客提供者101對已將新的内容113置於内容促銷網站 1 5 6之通知。 廷些通知中的任一通知都不是安全數位内容電子式配 送系統100中的一必須步驟,但是提供這些通知作為使電子 數位内容商店103有機會可關閉其有關成功完成銷售的記 錄。這些通知由於讓電子數位内容商店103得知在交易的金 融結算之後已透露了哪些功能’或得知於嘗試完成銷售的 、’發生了哪些錯誤’而也提供了處理客戶服務要求時可 能需要用到的資訊。此外,可視需要而經由客戶服務介面 184自清算所1〇5得到許多這類狀態。 O:\85\85l56 分削.D〇c 1255443 由内容提供者1 〇丨、,4令i + ^ /夬疋對在内容促銷網站156上可取得 新内容1 13的通知頻戶。 、 4侍 人 了在母^加入新的中介資料、 020時,提供該通知, /、枓SC(s) 介資料sc⑷⑽。母天通知當天所加入的所有新中 所有這些通知都將資料項加人交易記錄178。電予奸 7商广占1G3想要對這些通知執行本身的處理,則電子數: 内谷商㈣3可攔截CGI呼叫,執行其特有的函式,然後可 選擇將兹要求傳送到通知介面模組176。 5·對帳工具程式179 對帳工具程式1 7 9聯黎、、主質%】Λ c 繁/同异所105,以便將交易記錄178 與清算所1〇5的記錄比較。上述程序是一種可供選用的程 序,可用來協助電子數位内容商店103對安全數位内容電子 式配送系統100的會計程序有信心。 在另一實施例中,可更新該工具程式,而提供電子式資 金移轉’以便自動化對内容提供者1()1及清算所1G5的週期 f生^Ί π可將孩工具程式設計成:在與交易記錄i 78對過 帳單之後,於自清异所1 05接收到一電子式帳單時,可自動 處理付款。 c ·廣播電子數位内容配送服務 廣播主要意指一種一對多的傳輸方法,其中在最終使用 者裝置109與電子數位内容商店1〇3之間沒有可隨客戶的需 要而選擇閱覽或收聽的個人化介面。通常經由數位衛星$ 纜線基礎設施而提供廣播,此時係預先設定内容,因而 所有的最終使用者裝置109都接收相同的資訊流。 O:\85\85156 〇〇( -157- 1255443 亦可界定一種混合式模型,使電子數位内容商店1 03可 提供一種數位内容服務,且該數位内容服務的構成方式 為:可經由一網際網路連線而提供一網路配送介面,並可 經由一廣播服務而提供寬頻衛星或纜線配送介面,且與網 站的設計有相當大的共通性。如果IRD反向頻道串列介面 係連接到網路,且該IRD支援網路瀏覽,則最終使用者可 經由該反向頻道串列介面而以一般方式劉覽數位内容服 務’並預覽及選擇所要購買的内容113。使用者可選擇高品 質的可下載内容1 1 3,然後購買這些選擇,並完全經由一網 際網路連線接收必須的授權許可SC(s) 660,然後要求經由 寬頻廣播介面而傳送内容113(内容SC(s) 630)。網路服務可 根據廣播時間表而指示可以此種方式下載哪些内容丨丨3,或 者可完全根據所購買的内容113而建立廣播資訊流。此種方 式可讓一網路型數位内容服務公司與一廣播機構簽約,而 將高品質的内容113提供給配備有適當設備的使用者,因而 每天可以此種高品質方式提供有限數目的特定内容丨13(例 如歌曲或CD),並將經由網路介面而以低品質方式提供可 供下載的完整目錄。 亦可設計出並無通到最終使用者裝置! 〇9的網路介面之 其他廣播模型。在此種模型中,係將促銷内容包封在特殊 才。式的數K流,以便用廣播方式傳送到最終使用者裝置 109(亦即IRD),在最終使用者裝置1〇9上執行特殊的處理, 以便將該數位流解碼,並向最終使用者顯示可用來作購買 選擇的該促銷内容。 Ο.Λ85、85 丨56 分辄D〇c -158- 1255443 仍然係經由自最終使用者裝置! 〇9到清算所^ Μ的反亡 頻道通訊而啟動實際的購買選擇,且將利用Sc(s)來執行所 有的資料交換。提供給電子數位内容商店1〇3的工具程式套 件《架構及開發方式為··大部分的工具程式都同時適用於 點對點網際網路服務提供、及廣播衛星或纜線服務提供。 衛星型電子數位内容商店1〇3也利用數位内容網站型電子 數位内客商店1〇3取得及管理内容113並準備所用之 工具程式來管理並準備内容113,以便在一廣播基礎設施上 配迗。經由一網路服務而配送之Sc(s)與經由一廣播服務而 ⑩ 配送之SC(s)相同。 Χ·最終使用者裝置109 、王數“内容黾子式配送系統1⑼的最終使用者裝置 中之應用程式執行兩個主要功能:第一,sc(s)處理及 拷貝控制,以及第二,加密的内容113之播放。不論最終使 :者裝置109是-個人電腦或一專用白勺消費電子裝置,該最 、’;使用者裝置109都必須可執行這些基本功能。最終使用者 ,置1 09也提供各種額外的特性及功能,例如產生播放清 單$理數位内容資料庫、於播放内容時顯示資訊及影像、 ^及錄IL到外邵媒體裝置。這些功能隨著這些應用程式支 麦勺服而及這些應用程式被設計使用的裝置類型的不同而 有所變化。 A·概述 b ^在叫參閱圖1〇,圖中示出主要組成部分及程序、以及 、使用者裝置1〇9的功能流程。被設計用來支援一個人電 _85丨%分抓D〇c -159 - 1255443 腦型網路介面内容11 3服務的應用程式包含兩個可執行的 軟體應用程式:SC(s)處理器192、及播放應用程4 1〇c 丨工;w汐5。sc(s) 處理器1 9 2是一種可執行的應用程式,該應用程式被配置成 一個放入最終使用者網路瀏覽器191之協助應用程式,用以 處理SC(s)檔案/MIME類型。當自電子數位内容商店Μ) 清算所105、及代管内容網站U1接收到SC(s)時,劉覽器即 啟動該應用程式。該應用程式負責對sc⑷執行所有必^的 處理,並將内容113加入最終使用者的數位内容資料庫196。 播放應用程式195是一獨立的可執行應用程式,最終使 用者載入該播放應用程式195,以便執行其數位内容資料庫 196中之内容丨13,管理其數位内容資料庫196,以及在容許 時產生内容Π3之拷貝。可以Java、c/c++、或任何等效語 吕撰寫播放應用程式195及SC(s)處理器192應用程式。在較 佳實施例中,可自諸如網站等的電腦可讀取的裝置下載該 等應用程式。然而,也可利用其他的配送機制,例如在軟 碟或CD等的電腦可讀取的媒體上配送該等應用程式。 完全係經由最終使用者網路瀏覽器191處理内容ιΐ3資 訊的搜尋及瀏覽、諸如歌曲片段的試聽、以及選擇所要購 貝的歌曲。電子數位内容商店丨〇3以與目前許多内容零 售網站所提供的相同方式來提供購物的體驗。與最終使用 者經由目前的網路型内容113購物之不同處在於:使用者裝 置現在可選擇將可下載的内容113物件加入其購物車中。如 果電子數位内容商店103除了可下載的物件之外,還有其他 可供銷售的貨品,則最終使用者可將實體貨品及電子式可 O:\85\85156 分削.D〇c -160 - 1255443 下載貝口口 口併放到其蹲物車中。在最終使用者結帳並將其 最後的購買授權傳送到電子數位内容商店1〇3之前,安全數 位内容電子式配送的最終使用者裝置⑽並不涉人其間。在 μ寺”占之七係在電子數位内容商店1 的網路伺服器與最 終使用者裝置1()9的_覽器191之間進行所有的五動。這些 互動包括數位内容樣本片段的預覽。數位内容片段並未被 包封到SC(s)中,而是被整合到電子數位内容商店m的網 路服勒中作為可下載的檔案,或是自一争流祠服器傳送該 數位内容片段。本系統架構並未規定内容113片段的格式。 在另貝犯例中’播放應用程式195可與電子數位内容商店 1〇3或清算所1〇5直接互動,或利用促銷cd而進行離線互 動。 B ·應用程式安裝 將播放應用程式195及協助應用程式198被包封到可自 许多網站下載的-自行安裝之可執行程式。清算所Μ係作 為在_ A眾,.罔站上存有主下載網頁的一中央網站。清算所 έ可下載士裝套裝軟體的各網站之連結。可在所有的 代管内容網站111取得該安裝套裝軟體,以便在地理上分散 下載的要纟4-參與的電子數位内容商店⑻亦可使該套 裝軟體可自其網站下載,或者可只提供到清算所⑼的公眾 網站上的主下載網頁之連結。 〜要購貝可下載内容]丨3的任何最終使用者下載及安裝 这套裝軟體。孩安裝係自行包含在該可下載套裝軟體。該 套裝軟體打開及安裝協助應用程式198及播放應用程式 0:\85\85丨56 分;訊〇〇c -161 - 1255443 程式198的組態設定到所安裝的網路 1 9 5,且亦將協助應用 瀏覽器。O:\85\85 丨 56 points scraping DOC -154- 1255443 5 1 9. The information is contained in the license watermark 527, and the end user device 109 uses the information for copy and playback control. The final parameter required by the transaction processing module 175 is an HTML web page or CGI web address that confirms the purchase settlement. The purpose of this parameter is to allow the electronic digital store ί 03 to respond to the end user, and the electronic digital content store 1 〇 3 is a confirmation message using financial settlement and any other information it wants to include in its response message. Should be the end user. When the transaction SC(s) 640 is received and processed, the HTML web page and the CGI web address are included in the transaction SC(s) 640' and are displayed on the browser window of the end user device ι9. The parental SC(s) 640 is a Ηττρ response from the electronic digital content store 103 to the end user after processing the purchase submission. Transmitting a Sc(s) as a direct HTTP response will force an SC(s) processor to assist the application on the end user device 1〇9, thus automatically completing the transaction without further reliance on further use. The action initiated by the person. This procedure will be detailed in this section of the final user device 109 and the playback application 195 which will be described later. When the transaction processing module 175 is called with the necessary parameters, the transaction processing module 175 creates a transaction sc(4) 64, which contains the transaction data 642, the transaction confirmation HTML web page or reference URL, and other necessary for %(4) The female full feature, and the transaction processing module 1 75 retrieves and embeds the offer Sc(s) 641 associated with the purchase. The transaction processing module 175 also records information related to the transaction for later use by the notification interface module 1 76 and the reconciliation utility program 179. 4 · Notification interface module 1 7 6 Notification interface module 1 76 is an executable routine of a network server end O:\85\85156 Scratch D〇c -155 - 1255443 (NSAPI, ISAPI, or equivalent API Callable CGI or function). The notification interface module 176 processes option requests and notifications from the clearinghouse 105, the end user device 〇9, the escrow content website 111, and the content provider 101. The electronic digital intranet store 103 may select an event requesting notification. The clearing house 105 requests the end user device 1 to request an encryption key 623 and the symmetric key 623 is releasing the encryption key for the specified content U3. . The notification can optionally be set to require a confirmation from the electronic digital content store 103 before the encryption key 623 is transmitted to the end user device 109. The hosted content website m notifies that the content Sc(s) 63 has been transmitted to the end user device 109. The end user device 109 has received the content Sc(s) 63 and the license SC(s) 660 and successfully utilized the Sc(s) to process the content ι3 or found that the SC(s) has been tampered with. Notice. The internal provider 101 has placed a notification that the new content 113 has been placed on the content promotion website 156. None of the notifications are a necessary step in the secure digital content electronic distribution system 100, but these notifications are provided as an opportunity for the electronic digital content store 103 to close its record of successful completion of the sale. These notifications may be required by having the electronic digital content store 103 know which functions have been revealed after the financial settlement of the transaction, or knowing what errors have occurred in attempting to complete the sale, and also providing processing customer service requirements. Information to. In addition, many such states are obtained from the clearinghouse 1〇5 via the customer service interface 184 as needed. O:\85\85l56 Subdivision.D〇c 1255443 The content provider 1 〇丨, 4, i + ^ /夬疋 is available to the content promotion website 156 to obtain the new content 1 13 notification frequency. 4, the waiter added the new intermediary information, 020 when the mother ^, provided the notice, /, 枓SC (s) introduction information sc (4) (10). All new notices added to the day of the parent's notice will add the data entry to the transaction record 178. Electric rapist 7 Shang Guangzhan 1G3 wants to perform the processing of these notifications themselves, then the number of electronic: Neigu (4) 3 can intercept CGI calls, execute its unique functions, and then choose to send the request to the notification interface module. 176. 5. Reconciliation tool program 179 Reconciliation tool program 1 7 9 Lian Li, main quality % Λ c 繁 / isomorphic 105, in order to compare the transaction record 178 with the record of the clearing house 1 〇 5. The above procedure is an optional program that can be used to assist the electronic digital content store 103 in having confidence in the accounting procedures of the secure digital content electronic distribution system 100. In another embodiment, the utility can be updated to provide electronic funds transfer 'to automate the cycle of the content provider 1() 1 and the clearing house 1G5. The tool can be designed to: After receiving a bill with the transaction record i 78, the payment can be processed automatically when an electronic bill is received from the clearing station 105. c. Broadcast Electronic Digital Content Delivery Service Broadcasting primarily refers to a one-to-many transmission method in which there is no individual between the end user device 109 and the electronic digital content store 1〇3 that can be selected for viewing or listening as the customer desires. Interface. The broadcast is typically provided via the digital satellite $ cable infrastructure, in which case the content is pre-set so that all end user devices 109 receive the same information stream. O:\85\85156 〇〇( -157- 1255443 can also define a hybrid model, so that the electronic digital content store 103 can provide a digital content service, and the digital content service is constructed by: an internet It provides a network distribution interface and provides a broadband satellite or cable distribution interface via a broadcast service, and has considerable commonality with the design of the website. If the IRD reverse channel serial interface is connected to The network, and the IRD supports web browsing, the end user can view the digital content service in a general manner via the reverse channel serial interface and preview and select the content 113 to be purchased. The user can select high quality. Downloadable content 1 1 3, then purchase these options and receive the necessary license SC(s) 660 via an internet connection, then request that the content 113 be transmitted via the broadband broadcast interface (content SC(s) 630 The network service can indicate which content 丨丨3 can be downloaded in this manner according to the broadcast schedule, or can establish a broadcast information stream based entirely on the purchased content 113. This allows a networked digital content service company to contract with a broadcaster to provide high quality content 113 to users equipped with appropriate equipment, thus providing a limited number of specific content per day in such a high quality manner. (such as songs or CDs), and will provide a complete catalog of downloadable content in a low quality manner via the web interface. Other broadcast models that do not have access to the end user device! 〇9's web interface. In this model, the promotional content is encapsulated in a special K stream for broadcast to the end user device 109 (i.e., IRD), and special operations are performed on the end user device 1〇9. Processing to decode the digit stream and display to the end user the promotional content available for purchase selection. Λ.Λ85, 85 丨56 minutes 辄D〇c -158- 1255443 still via the end user device ! 〇9 to the clearing house ^ Μ anti-death channel communication to start the actual purchase option, and will use Sc (s) to perform all data exchange. Provide the electronic digital content store 1 〇 3 tool The "Building and Development Method" is that most of the tools are available for both peer-to-peer Internet service delivery and broadcast satellite or cable services. The satellite electronic digital content store 1〇3 also utilizes the digital content website type. The electronic digital guest store 1-3 acquires and manages the content 113 and prepares the used utility program to manage and prepare the content 113 for distribution on a broadcast infrastructure. The Sc(s) and via via a network service are distributed. The broadcast service is the same as the SC(s) of the 10 delivery. The end user device 109, the number of applications in the end user device of the content scorpion distribution system 1 (9) performs two main functions: first, sc (s) processing and copy control, and second, playback of the encrypted content 113. Regardless of whether the device 109 is ultimately a personal computer or a dedicated consumer electronic device, the user device 109 must perform these basic functions. The end user, set to 09, also provides a variety of additional features and functions, such as generating a playlist of $1 digits of content, displaying information and images when playing content, and recording IL to the external media device. These features vary depending on the type of application that the application is designed to use and the type of device that the application is designed to use. A. Overview b ^ Referring to Figure 1, the main components and procedures, and the functional flow of the user device 1〇9 are shown. Designed to support a person's power _85丨% points to D〇c -159 - 1255443 Brain-type network interface content 11 3 service application contains two executable software applications: SC(s) processor 192, And the playback application 4 1〇c is completed; w汐5. The sc(s) processor 1 9 2 is an executable application that is configured as a helper application placed in the end user web browser 191 to process the SC(s) file/MIME type. . When the SC(s) is received from the electronic digital content store Μ) clearing house 105 and the escrow content website U1, the browser starts the application. The application is responsible for performing all necessary processing on sc(4) and adding content 113 to the end user's digital content repository 196. The play application 195 is a stand-alone executable application that the end user loads into the play application 195 to execute the content 丨 13 in its digital content repository 196, manage its digital content repository 196, and when allowed A copy of the content Π3 is generated. The Play Application 195 and SC(s) Processor 192 applications can be written in Java, c/c++, or any equivalent. In a preferred embodiment, the applications can be downloaded from a computer readable device such as a website. However, other distribution mechanisms may also be utilized, such as distributing such applications on computer readable media such as floppy disks or CDs. The search and browsing of the content ι 3 information, the audition of the song segment, and the selection of the song to be purchased are handled entirely by the end user web browser 191. The electronic digital content store 丨〇3 provides a shopping experience in the same manner as many of the current content retail websites offer. The difference from the end user shopping via the current web-based content 113 is that the user device can now choose to add the downloadable content 113 item to its shopping cart. If the electronic digital content store 103 has other items for sale in addition to the downloadable items, the end user can cut the physical goods and the electronic type O:\85\85156. D〇c -160 - 1255443 Download the mouth of the mouth and put it in the boot. The end user device (10) for electronically distributing secure digital content is not involved until the end user has settled the bill and transmitted its final purchase authorization to the electronic digital content store 3.1. All of the five movements are performed between the web server of the electronic digital content store 1 and the browser 191 of the end user device 1 () 9 in the Mu Temple. These interactions include a preview of the digital content sample segment. The digital content segment is not encapsulated in the SC(s), but is integrated into the network service of the electronic digital content store m as a downloadable file, or the digital device is transmitted from a content server. Content fragment. The system architecture does not specify the format of the content 113 fragment. In another example, the 'playing application 195 can directly interact with the electronic digital content store 1〇3 or the clearing house 1〇5, or use the promotional cd Offline interaction B. Application installation The playback application 195 and the help application 198 are encapsulated into a self-installed executable program that can be downloaded from many websites. The clearing house is used as a _A public,. A central website that stores the main download page. The clearing house can download the links of the websites of the designer software. The installation software can be obtained on all the hosted content websites 111 to geographically distribute the downloads. 4- Participating electronic digital content store (8) can also make the package software downloadable from its website, or can only provide a link to the main download page on the public website of the clearing house (9). Any end user downloads and installs the software package. The child installation system is included in the downloadable software package. The software package opens and installs the help application 198 and the playback application 0:\85\85丨56 points; 〇c -161 - 1255443 The configuration of program 198 is set to the installed network 1 9 5 and will also assist the application browser.
作為3文裝的一部分,為最終使用者裝置109產生-公 用/秘密金餘⑹對,以便用於處理訂單及授權許可SC(s) 660也產生-隨機對稱金鑰(祕密使用者金瑜),以便用來 保護授權許可資料庫197中之歌曲加密金鑰。將秘密使用者 金鑰(圖:未示出)分散成多個部分,並將該金鑰的各部分 儲存在取終使用者電腦的多個儲存位置,即可彳呆護該金 餘係利用防篡改軟體技術來保護該區域的程式碼,以便 不曰戍漏"衾至鑰的分割方式及儲存位置。P方止包括最終使 用者在内的人存取該金瑜有助於避免内容⑴被其他的電 月®凰用或/、用。右要得知與如何使用這些金鑰的更多細 即’請參閱SC(s)處理器192的該節。As part of the 3 literary installation, a public/secret gold (6) pair is generated for the end user device 109 for processing the order and the license SC(s) 660 also generates a random symmetric key (secret user Jin Yu) In order to protect the song encryption key in the license repository 197. Dispersing the secret user key (not shown) into multiple parts, and storing the parts of the key in a plurality of storage locations of the end user computer, Tamper-resistant software technology to protect the code in the area so that it does not leak the way to the key and storage location. P. The access to the Jinyu by the person including the ultimate user helps to prevent the content (1) from being used by other e-months or phoenixes. Right to know more about how to use these keys, see section on SC(s) processor 192.
防篡改軟體技術是一種防止駭客在未經授權的其形下 一電腦軟體應用程式。駭客通常想要知道及(或)修改 軟體,以便移除對使用的限制。事實上,並沒有無法破解 的私驷私式,這就是不將防篡改的軟稱為“保證無法篡改的 叙把的原因。但是破解一以防篡改技術保護的應用程式所 需的工作量通常將嚇阻大部分的駭客,這是因為所耗用的 工作里超過了可能的收穫。此處的工作將是破解内容i U 的"卩刀之金输,或許是一張CD上的一首歌之金输。 其中類的防篡改軟體技術是來自IBM。導入該程式碼 的種產品是IBM ThinkPad 770膝上型電腦。在該j u 中’防篡改軟體係用來保護電腦中的DVD電影播放機。諸 〇.\85\85丨56分剤.〇〇〇 -162 - 1255443 =好萊塢電影«等的數位内容提供者關心數位電影的到 供以及i作元吴拷貝的容易程度,因而該等數位内容提 去、者堅持放在D V D上的電影必須包含著作權保護的機 1。IBM的防篡改軟體使其難以規避這些著作權保護機 制:這是防篡改軟體非常典型的應用;該軟體係用來強制 執仃内容1 1 3的某些受保護類型的使用。 」BM的防篡改軟體在人侵者的路徑中設置了數種障礙。 弟:’、該防篡改軟體包含可使骇客使用的除錯程式及反組 “王式等払準軟體工具程式失效或至少降低其有效性之技 術。:二’該防篡改軟體包含自我完整性檢查,因而將偵 4到早一修改、甚至小量的修改,並造成不正確的作業。 最後’該防1改軟體包含可誤導骇客有關其確實作業的模 糊點。最後-種技術大都是特別的技術,但是前兩種技術 係根據加密及數位簽名等密碼學中習知的工具程式而建 IL 0 c·安全容器物件處理器192 田最終使用者將其收集在其購物車中的貨品之最後購 買授權傳送到電子數位内容商店103時,該最終使用者的網 路劂覽咨即保持在連線狀態,等候來自網路伺服器的一回 應。電子數位内容商店103上的網路伺服器處理該購買,並 執行金融結异,然後將一交易Sc(s) 640送回到最終使用者 裝置109。網路瀏覽器啟動Sc(s)處理器192(協助應用程式 丄98),以便處理與交易Sc(s) 640相關聯的Sc(s)多媒體網際 網路郵件延伸(MIME)類型。圖14是播放應用程式195根據 0+\85\85丨56 分刻.D〇c -163 - 1255443 本表明而將内容下載到圖i 0所示的一本機資料庫的一使用 者介面畫面實例。 sc(s)處理器192開啟交易Sc(s) 64(),並提取該%⑷内含 的回應HTML網頁及報價Sc(s) 641。係在劉覽器視窗中顯 不回應HTML網頁,用以確認最終使用者的購冒。炊後在 步驟咖中開啟報價SC(s)641,並自這些報攸⑷⑷提 取内容113(例如歌曲或專輯)名稱、及預計下載時間。然後 在步驟1402中利用該資訊顯示一個新的視窗,且將内容 叫例如對於音樂而纟,為歌曲或整張專輯)下載的排定時 程選項提供給最終使用者。最終使用者可選擇立即下載, 或將下載安排在-稍後的時間。如果選擇了—稍後的時 間則將下載排程資訊儲存在一記錄中,而且在最終使用 者裝置1G9於所安排的時間開機的情形下於該安排的時間 開始下載。如果電腦在在所安排的下載時間並未開機,或 通訊鏈路斷線,則在該電腦下一次開機時提示最終使用者 重新安排下載的時間。 當到了所安排的下載_,或要求立即下載時,則%⑷ 處理器192利用交易SC(S) 640、報價Sc(s) 641中的資訊、 以及安裝時所產生的最終使用者公共金鑰661來產生訂單 SC⑷65〇。係經由HTTP要求將該訂單Sc(s) _傳送到清 算所1〇5。當清算所105送回授權許可sc(s)66〇時,重新^ 叫協助應用程式丨98來處理授權許可sc(s)66〇。然後開啟 授權許可SC⑷660,且自所參照的訂單Sc(s) 65〇提取代管 内容網站111之網址。然後經由瀏覽器的Hrrp要求將授 O:\85\85156 分剖.DOC -164- 1255443 =可sc(s) 66轉送到指定的代管内容網站⑴,而要求 ^C(s) 630^ 再度重新呼叫協助應用 普七、 八198°SC(s)處理器192顯示所下 載内客113的名稱、一下 。 所下 各 進度扣不态、及一預估完成時間。 田s理洛192正在接收内容113時, 將資料下載到記悻髀缕徐ρ 1 192 ,, 、爱衝區,以供解密。該緩衝區的容量 :決於峨算法及浮水印技術-的需求,且該容量是可 月巨作到的最小容I,以你、士 曰" 便減v、不加密内容113洩漏給駭客程 '、碼的I。當—緩衝區填滿時’即利用自授權許可SC⑷ 6峨取的最終使用者金鑰623(對應於公共金鑰⑹),將該 犮衝區《内合解⑥’且係先利用秘密金鑰將金鑰⑵本身解 密。然後將解密後的缓衝區内容傳送到加浮水印函式。 加子水印私序193自授權許可sc⑷㈣提取浮水印指 T並利用最終使用者的秘密金鑰將該 自授權許可SC⑷6崎取浮水印資料,該浮水=料= 諸如購買者名稱等的交易資訊,而該購買者名稱可以是登 錄到購買内容113的電子數位内容商店⑻之講買者名稱, 或者在電子數位内容商店103並未提供一登錄功能時可以 是自信用卡登錄資訊得到的名稱。購買日期及交易識別碼 535也係包含在浮水印中,其中係由電子數位内容商店1〇3 指定該交易識別碼5 3 5,以便對照到為該交易記錄的特定記 錄。也包含將為播放應用程式5 19的拷貝控制功能所使用的 商店使用條件1 9 5。 利用防篡改程式碼技術保護加浮水印程序1 9 3,以便不 O:\85\85156 分剖 DOC -165 - 1255443 會、或漏浮水印指令,因而避免骇客發現浮水印的位置及技 術。此種方式可防止駭客移除或修改浮水印。 623,並利用在安裝時所產生及隱藏的祕密使用者金输即新 的SEAL金鑰本身加密。現在將該新的加密㈣从金瑜儲 存在授權許可資料庫1〇7。 在將任何必須的浮水印加到該内容緩衝區之後,將該緩 衝區的内容傳送到亂序加密函式,以便進行重新加密程序 1 94。利用諸如IBM的SEAL加密技術等的一有處理效率之 :全加密演算法’而使用一隨機對稱金鑰將内容"3重新加 密。-旦完成了下載及解密與重新加密程序194之後,現在 即毀掉内容提供者1〇1原先將内容113加密的加密金瑜 與在内容提供者101處執行的來源不同,在最終使用者 裝置109上執行的使用者浮水印程序可能不需要變成一個 有效的工業標準。這些標準仍然在進展中。該技術可讓控 制資訊嵌入音樂中,並可將控制資訊更新若干次。在拷貝 fe制標準更穩足之前,在安全數位内容電子式配送系統⑺〇 中已提供了拷貝控制的替代方法,因而無須依賴拷貝控制 浮水印,即可在消費電子裝置中提供權利管理。利用^接 到最終使用者裝置109的加密之數位内容資料庫196實施儲 存及播放/記錄使用條件的安全性,且係經由防篡改環境而 保?隻茲儲存及播放/記錄使用條件的安全性。當採用標準 時,係利用軟體追蹤點(hook)來支援拷貝控制浮水印。目 前已可支援在各種壓縮等級下的加浮水印AAC及其他編碼 的音訊流,但是此時該技術仍不太成熟,而無法用來作為Tamper-resistant software technology is a computer software application that prevents hackers from gaining unauthorized access. Hackers often want to know and/or modify the software in order to remove restrictions on use. In fact, there is no private smuggling that cannot be cracked. This is why the tamper-proof softness is not called "the reason for guaranteeing that it cannot be falsified. But the amount of work required to crack an application protected against tampering is usually It will frustrate most of the hackers, because the work involved exceeds the possible gains. The work here will be to crack the content i U's gold loss, perhaps on a CD. One of the songs is the gold software. The tamper-resistant software technology from IBM is from IBM. The product that imports the code is the IBM ThinkPad 770 laptop. In this j, the anti-tampering software system is used to protect the DVD in the computer. Movie player. Zhu Yu.\85\85丨56分剤.〇〇〇-162 - 1255443=The digital content provider of the Hollywood movie «etc. cares about the easiness of the digital movie and the copying of the i. The digital content mentioned in the film must be included in the copyright protection machine. IBM's tamper-resistant software makes it difficult to circumvent these copyright protection mechanisms: this is a very typical application of tamper-resistant software; Ding content to enforce certain types of protected use. "Tamper-resistant software BM set up several obstacles in the path of an intruder in the 113's. Brother: 'The tamper-resistant software contains a debugging program that can be used by hackers and a technology that disables or at least reduces the effectiveness of the software program such as Wang. The second tamper-resistant software contains self-completeness. Sex check, so it will detect 4 early modification, even a small amount of modification, and cause incorrect work. Finally, the anti-1 software includes misleading hackers about the ambiguity of their actual work. Finally - most of the technology It is a special technology, but the first two technologies are built according to the well-known tools in cryptography such as encryption and digital signature. The IL 0 c·safe container object processor 192 is collected by the end user in their shopping cart. When the final purchase authorization of the goods is transferred to the electronic digital content store 103, the end user's network browsing protocol remains in the connected state, waiting for a response from the web server. The network on the electronic digital content store 103 The server processes the purchase and performs a financial settlement, and then sends a transaction Sc(s) 640 back to the end user device 109. The web browser launches the Sc(s) processor 192 (assisted application)丄 98) to handle the Sc(s) Multimedia Internet Mail Extension (MIME) type associated with the transaction Sc(s) 640. Figure 14 is a playback application 195 based on 0+\85\85丨56 moments .D〇c -163 - 1255443 This shows an example of a user interface picture that is downloaded to a native repository as shown in Figure i. The sc(s) processor 192 opens the transaction Sc(s) 64() And extract the response HTML page and the quote Sc(s) 641 included in the %(4). It does not respond to the HTML page in the browser window to confirm the purchase of the end user. Then open in the step coffee Quote SC(s) 641, and extract the content 113 (e.g., song or album) name from the newspapers (4) (4), and the estimated download time. Then use the information to display a new window in step 1402, and call the content, for example, for music. And hey, for the song or the entire album) download the schedule options available to the end user. The end user can choose to download immediately, or schedule the download at - later time. If selected - later time Then download the download schedule information in a record, and finally make The device 1G9 starts downloading at the scheduled time when the scheduled time is turned on. If the computer is not turned on at the scheduled download time, or the communication link is disconnected, the next time the computer is turned on, the message is finally displayed. The user reschedules the download. When the scheduled download_ is reached, or when the download is requested, the %(4) processor 192 utilizes the information in the transaction SC(S) 640, the quote Sc(s) 641, and the installation time. The generated end user public key 661 is generated to generate the order SC(4) 65. The order Sc(s)_ is transmitted to the clearing house 1〇5 via HTTP request. When the clearing house 105 returns the license sc(s) 66〇, the helper application 丨98 is re-processed to process the license sc(s) 66〇. The license SC (4) 660 is then opened, and the web address of the hosted content website 111 is extracted from the referenced order Sc(s) 65〇. Then via the browser's Hrrp request, O:\85\85156 will be split. DOC -164 - 1255443 = can be sc(s) 66 forwarded to the specified hosting content website (1), and ^C(s) 630^ will be requested again. The re-call assistance application VII, eight 198 ° SC (s) processor 192 displays the name of the downloaded guest 113, a bit. Each progress is deducted and an estimated completion time. When Tian Sililu 192 is receiving content 113, the data is downloaded to the record ρ ρ 1 192 , , , Ai Chong District for decryption. The capacity of the buffer: depending on the requirements of the algorithm and the watermarking technology, and the capacity is the minimum capacity I can make for the month, and you, the gentry " reduce v, the unencrypted content 113 leaks to 骇Passenger', I of the code. When the buffer is full, the end user key 623 (corresponding to the public key (6)) extracted from the license SC(4) 6 is used, and the buffer is internally combined with 6 and the secret gold is used first. The key decrypts the key (2) itself. The decrypted buffer content is then transferred to the add-on watermark function. Add sub-watermark private sequence 193 from the license sc (4) (four) extract the watermark refers to T and use the secret key of the end user to take the watermark data from the license SC (4) 6 , the float = material = transaction information such as the name of the buyer, The purchaser name may be the name of the buyer who logs in to the electronic digital content store (8) of the purchase content 113, or may be the name obtained from the credit card login information when the electronic digital content store 103 does not provide a login function. The purchase date and transaction identifier 535 are also included in the watermark, wherein the transaction identifier 5 3 5 is specified by the electronic digital content store 1-3 to compare the particular record recorded for the transaction. It also contains the store usage conditions that will be used for the copy control function of the playback application 5 19 . The tamper-proof code technology is used to protect the watermarking program 1 9 3 so that the O-\85\85156 segmentation DOC-165 - 1255443 will or will omit the watermark instruction, thus preventing the hacker from finding the location and technology of the watermark. This way you can prevent hackers from removing or modifying the watermark. 623, and encrypts the secret user user generated and hidden at the time of installation, that is, the new SEAL key itself. Now the new encryption (4) is stored in the license database from Jinyu Storage. After any necessary watermarks are added to the content buffer, the contents of the buffer are transferred to the out-of-order encryption function for re-encryption procedures 1 94. Content "3 is re-encrypted using a random symmetry key using a processing efficiency such as IBM's SEAL encryption technology. Once the download and decryption and re-encryption process 194 is completed, the content provider is now ruined. The encrypted encryption that originally encrypted the content 113 is different from the source executed at the content provider 101, in the end user device. The user watermarking program executed on 109 may not need to become an effective industry standard. These standards are still in progress. This technology allows control information to be embedded in music and can be updated several times. An alternative to copy control has been provided in the secure digital content electronic distribution system (7) prior to the copying of fe standards, so that rights management can be provided in consumer electronics without relying on copy control watermarking. The encrypted digital content database 196 that is connected to the end user device 109 implements the security of storage and playback/recording usage conditions, and is secured by the tamper-resistant environment. Only store and play/record the security of the conditions of use. When the standard is adopted, the software tracking point (hook) is used to support the copy control watermark. At present, it is possible to support the addition of watermarking AAC and other encoded audio streams under various compression levels, but at this time the technology is still not mature enough to be used as
O:\85\85 丨 56 分剂 DOC -166- 1255443 拷貝控制的唯一方法。 解密與重新加密程序194是另一程式碼領域,其中係利 用防篡改程式碼技術保護該程式碼,以便不會戌漏了原始 内容m的加密金输、新的SEAL金瑜、及秘密使用者金瑜, 且其中儲存了各秘密使用者金鍮區段及將該金鑰分段之方 解密與重新加密程序194的程序有兩個用途。儲存利用 類似-演算法的SEAL加密的内容113時,可執行更快速的 即時解密,且只需比諸如DES等更為工業標準類型的涂算 =所需更少的處理器利用率’即可執行解密。此種方式可 讓播放應用程式195對内容113執行—即時且並行的解密_ 解碼-播放,而無須在解碼及播放之前先將内容ιΐ3的整個 檔案解密。該SEAL演算*及—高效铸碼㈣法的效率不 只可進行並行的作業(自加密標案的串流式播…,而W 可在-效能低許多的I统處理器±執行該程序。因此,可 在:諸如效能低至6〇百萬赫Pentium系統或效能更低的系 、先'"的取、、使用者裝置109上支援該應用程式。使最後儲 存内容11 3所用的加密狄式命店d 、 σ Λ,、原七的加密格式分離時,可在 選擇原始内容的加密演算法時有較大的彈性。因此,可使 用被廣泛接受且經過考驗的工業標準演算法,因而進一步 強化了數位内容業界對安全數位内容電子式配送系統100 的接受度。 該解密與重新加密程庠〗94>楚一 斤194又罘二個目的在於:不再需 要將内客提供者ιοί用夹棘如六 术將内奋113加在、的原始主加密金輪O:\85\85 丨 56 minutes DOC -166- 1255443 The only way to copy control. The decryption and re-encryption program 194 is another field of code, in which the code is protected by tamper-resistant code technology so as not to miss the original content m of the encrypted gold, the new SEAL Jin Yu, and the secret user. Jin Yu, and the program in which each secret user is stored and the key segmentation and decryption procedure 194 is used has two purposes. When storing content 113 using a similar-algorithm SEAL encryption, faster instant decryption can be performed and only requires less processor utilization than the more industry standard type of DES such as DES. Perform decryption. This manner allows the playback application 195 to perform content-instant and parallel decryption-decoding-playing on the content 113 without having to decrypt the entire file of the content ι3 prior to decoding and playback. The efficiency of the SEAL calculus* and the efficient casting code (four) method can not only perform parallel operations (streaming of self-encrypting standards... but W can be performed on a system with a much lower performance). The application can be supported on a user device such as a Pentium system with a performance as low as 6 megahertz or a lower performance, and a user device 109. The encrypted content used for the last stored content 11 3 When the encryption format of the original store d, σ Λ, and the original seven is separated, it can be more flexible when selecting the encryption algorithm of the original content. Therefore, a widely accepted and tested industry standard algorithm can be used, thus It further strengthens the digital content industry's acceptance of the secure digital content electronic distribution system 100. The decryption and re-encryption program 94> Chu Yijin 194 has two purposes: no longer need to use the internal provider ιοί The original master encryption gold wheel with the help of the six strokes
O:\85\85156 分割+D0C • 167 - 1255443 623儲存在取得該内容113授權許可的每—個最終使用者裝 置109。只在一段很短的時間中將作為授權許可wo) _ -部分的該主加密金鑰623緩衝儲存在最終使用者裝置⑽ 的硬碟上,而且該主加密金鍮623只在—段很短的時間中儲 在記憶體上。在該執行階段期間,係經由防裏改程式碼技 術保護該金鑰623。一旦完成了該解密與重新加密194階段 之後’就不再需要以任何形式將該金瑜⑵保留在最終使用 者裝置109上,因而大幅降低了骇客進行破解的機率。 -旦將歌曲重新加密之後,即將該歌曲儲存在數位内容 資料庫196中。在步驟1403中,自相關聯的報價SC⑷641 提取播放應用程式195所需的所有中介資料,並也將該等中 介資料儲存在數位内容資料庫196。以前文中針對其他内容 所述的相同方式,將諸如歌詞等的中介資料中之任何加穷 邵分解密並重新加密。用來將内容⑴加密的同-SEal: 鑰係用於需要加密的任何相關聯之中介資料。 D·播放應用程式195 1.概述 安全數位内容電子式配送賴放應歸式195(在本文中 稱為播放應用程式195)類似於CD、DVD、或其他的數位内 容播放機’並類似於CD、DVD、或其他的數位内容儲存管 理系統。在該應用程式最簡單的功能中,係執行内容113, 例如播放歌曲或視訊。在另一層級的功能中’該應用程式 提供最終使用者-種管理該最終使用者的數位内容資料庫 196<工具程式。在另_種同樣重要的功能中,該應用程式O:\85\85156 Split + D0C • 167 - 1255443 623 is stored in each of the end user devices 109 that have obtained the license 113 for this content 113. The primary encryption key 623, which is only authorized for a short period of time, is stored on the hard disk of the end user device (10), and the primary encryption key 623 is only in the short segment. The time is stored in the memory. During this phase of execution, the key 623 is protected via anti-inversion code technology. Once the decryption and re-encryption 194 phase is completed, it is no longer necessary to retain the Golden Yu (2) in the final user device 109 in any form, thereby greatly reducing the chances of the hacker cracking. Once the song is re-encrypted, the song is stored in the digital content repository 196. In step 1403, all of the mediation data required to play the application 195 is extracted from the associated offer SC(4) 641, and the mediation data is also stored in the digital content repository 196. In the same manner as described above for other content, any addendum in the mediation material such as lyrics is decrypted and re-encrypted. The same-SEal: key used to encrypt content (1) is used for any associated mediation material that needs to be encrypted. D.Playing Application 195 1. Overview of Secure Digital Content Electronic Distribution Relying on 195 (referred to herein as playback application 195) is similar to a CD, DVD, or other digital content player' and is similar to a CD. , DVD, or other digital content storage management system. In the simplest function of the application, content 113 is executed, such as playing a song or video. In another level of functionality, the application provides the end user a digital content repository 196 <tool program that manages the end user. In another equally important feature, the app
〇.\85\85丨56 分割,D0C -168- 1255443 才疋供了對诸如歌曲等的内容資料 J門奋貝枓庫(在此例中稱為播放清 單)之編輯及播放。 利用'组可以是經過個別選擇且針對内容提供者101及 電子數位内容商店103的需求而訂製的組成部分組合成該 播放應用程式1 9 5。現在將今日日·4类、/r e ΠΠ 兄在册4明该播放應用程式之一般性版 本,但是使用者自訂的版本也是可行的。 現在請參閱圖15,圖中示出在圖1G所示最終使用者裝置 1 09上執行的播放應用程式丨95的主要組成部分及程序之方 塊圖。 有數組構成播放物件管理程式15〇1的各子系統之元件: 1·最終使用者介面元件1509 2.拷貝/播放管理元件1 504 3·解岔15 05、解壓縮1506、播放元件1507、及可能包括的 記錄元件。 4·資料管理1 502及資料庫存取元件丨5〇3 5·應用程式間通訊元件1508 6·其他雜項(例如安裝等)元件 可根據下列的需求而選擇每一個這類組内之各元件·· 平台(Windows、Unix、或同等的作業系統) 通訊協定(網路、纜線等) 内容提供者101或電子數位内容商店103 硬體(CD、DVD等) 清算所105技術及其他技術。 下列各節將詳述各種元件組。最後一節將詳述如何將這 O:\85\85156 分割.DOC -169- 1255443 些70件整合到該一般性播放應用程式,並說明如何依使用 者的需求而自訂這些元件。 在另一實施例中,播放應用程式195及SC(s)處理器192 的各元件可用來作為程式設計師的軟體工具程式套件之一 部分。该工具程式套件起動前文所述一般性播放應用程式 的各7C件之預定介面。這些預定介面的形式為應用程式介 面(API)。利用這些Αρι的開發人員可自一高階應用程式執 订该等兀件之任何功能。由於提供了這些元件的Αρι,所 以程式设计師可迅速開發一客戶自訂規格的播放應用程式 195,而無須重新產生任何這些元件的函式及資源。 2 ·最終使用者介面元件1 $ 〇 9 該組的各元件合而提供播放應用程式195的螢幕上顯 示。清注意’該設計並未建立這些元件的任何限定性配置。 該一般性播放應用程式中提供了 一個此種配置。可根據内 容提供者101及(或)電子數位内容商店的需求以及其他需 求,而提供替代性的配置。 该組被分成若干次組,第一個次組具有若干元件,用以 展現最終使用者顯示幕1 5 1 0,並處理用於音樂播放低階功 能的稱為最終使用者控制裝置丨5丨丨之控制裝置,以及展現 中介資料。然後再將最終使用者顯示幕元件151〇分成若干 特殊的功能組(播放清單、數位内容資料庫等),然後利用 物件容器元件將這些低階元件分類及放置。 在下文所述的元件清單内,任何提到產生CE)或將内容 1 1 3拷貝到一 CD或其他可記錄媒體之處時,只適用於播放 O:\85\S5156 分剂 D0C -170- 1255443 應用程式195已起動該功能的情形。亦請注意,在前後文中 提及術語⑶時意指總稱的⑶’亦可代表諸如湘或麵等 各種其他的記錄裝置。 圖16是根據本發明的圖15所示播放應用程式195的一例 示使用者介面畫面。最終使用者控制裝置1511的功能包括 (一最終使用者介面的對應晝面係示為16〇i_i6〇5): 執行内容113之控制: 播放/停止按钮 播放按紐 停止按叙 暫停按鈕 快速前轉按紐 快速後轉按钮 音量控制 音軌位置控制/顯示 聲道音量位準顯示及其他功能。 參 颂不與内容113相關聯的中介資料之控制裝置: 封面圖片按鈕 封面圖片物件 勢人照片按紅 蟄人照片物件 音軌表按鈕 骨軌表資訊物件 音軌表選擇器物件(點選播放)〇.\85\85丨56 Division, D0C-168- 1255443 is for the editing and playback of content such as songs. Jmen Fenbei Library (called playlist in this example). The components that are custom-tailored and tailored to the needs of the content provider 101 and the electronic digital content store 103 are combined into the playback application 195. The general version of the application will now be played on today's day 4, /r e ΠΠ 在 4, but a user-defined version is also possible. Referring now to Figure 15, there is shown a block diagram of the main components and procedures of the playback application 丨 95 executed on the end user device 109 shown in Figure 1G. There are arrays of components of each subsystem that constitute the playback object management program 15〇1: 1. End user interface component 1509 2. Copy/play management component 1 504 3·Explanation 15 05, decompression 1506, playback component 1507, and Recording elements that may be included. 4. Data management 1 502 and data inventory taking components 丨 5 〇 3 5 · Inter-application communication components 1508 6 · Other miscellaneous (such as installation, etc.) components can be selected according to the following requirements for each component of this group • Platform (Windows, Unix, or equivalent operating system) Communication protocol (network, cable, etc.) Content provider 101 or electronic digital content store 103 Hardware (CD, DVD, etc.) Clearing house 105 technology and other technologies. The various component groups are detailed in the following sections. The final section will detail how to integrate this O:\85\85156 split .DOC -169-1255443 into the general playback application and explain how to customize these components according to the user's needs. In another embodiment, the components of the playback application 195 and the SC(s) processor 192 can be used as part of a programmer's software utility suite. The utility package starts the predetermined interface of each 7C piece of the general playback application as described above. These predetermined interfaces are in the form of an application interface (API). Developers who use these tools can customize any of these components from a high-level application. By providing these components, the programmer can quickly develop a custom-specific playback application 195 without having to reproduce the functions and resources of any of these components. 2 · End User Interface Component 1 $ 〇 9 The components of the group are combined to provide a screen display of the playback application 195. Note that this design does not establish any limited configuration of these components. One such configuration is provided in the general playback application. Alternative configurations may be provided based on the needs of the content provider 101 and/or the electronic digital content store and other needs. The group is divided into sub-groups, the first sub-group having a number of components for presenting the end user display screen 1 5 1 0, and processing the lower-order functions for music playback called the end user control device 丨5丨Control devices and display mediation information. The end user display screen element 151 is then divided into a number of special functional groups (playlists, digital content databases, etc.), which are then sorted and placed using the object container components. In the list of components described below, any reference to the production of CE) or the copying of the content 1 1 3 to a CD or other recordable media is only applicable to the playback of O:\85\S5156 sub-dot D0C-170- 1255443 The application 195 has activated this feature. Please also note that when the term (3) is mentioned in the context of the text, it means that the general term (3)' may also represent various other recording devices such as Xiang or Dian. Figure 16 is a diagram showing an example of a user interface screen of the playback application 195 shown in Figure 15 in accordance with the present invention. The functions of the end user control device 1511 include: (the corresponding face of the end user interface is shown as 16〇i_i6〇5): Control of the execution content 113: Play/stop button play button stop press the pause button to quickly forward Button quick turn button volume control track position control / display channel volume level display and other functions. Refer to the control device of the mediation data not associated with the content 113: Cover image button Cover image object Touch photo button Red 照片 Photo object Track table button Track table information object Track table selector object (click to play)
O:\85\85 156 分剤 DOC -171 . 1255443 音軌名稱物件 音軌資訊物件 音軌歌詞按鈕 音軌歌詞物件 音軌藝人名稱物件 音軌贷項按紐 音軌贷項物件 CD名稱物件 CD贷項按紐 CD貸項物件 一般性(可設定組態之)中介資料按钮 一般性中介資料物件及其他。 最終使用者顯示幕1 5 1 0的功能包括(一最終使用者介面 的對應畫面係示為1601 -1605): 顯示容器物件之播放清單 播放清單管理按紐 播放清單管理視窗 數位内容搜尋按钮 數位内容搜尋定義物件 數位内容搜尋送出按姐 數位内容搜尋結果物件 播放清單按鈕之拷貝選擇搜尋結果 播放清單物件(可編輯的) 播放清單儲存按鈕 O:\85\85156 分割 DOC -172 - 1255443 播放清單播放按钮 播放清單暫停按鈕 播放清單重新開始按鈕 自播放清單按鈕產生CD及其他。 數位内容資料庫196之顯示 數位内容資料庫按鈕 數位内容資料庫管理視窗 數位内容種類按姐 數位内容種類物件 按照藝人選擇按鈕 按照類型選擇按鈕 按照品牌選擇按鈕 按照種類選擇按鈕 刪除按鈕 增加到播放清單按钮 拷貝到CD按鈕 歌曲清單物件 歌曲清單顯示容器物件及其他 容器物件及雜項 播放機視窗容器物件 音樂控制裝置容器物件 中介資料控制裝置容器物件 中介資料顯示容器物件 工具列容器物件 O:\85\85156 分剤.DOC -173 - 1255443 樣本按鈕 下載按紐 購買按叙 記錄按4丑 播放機名稱物件 品牌/提供者/商店廣告物件 品牌/提供者/商店網址按鈕 蟄人網址按知及其他 3·拷貝/播放管理元件15〇4 這些元件處理加密金鑰、加人浮水印程序、拷貝管理、 序《建乂。也有與清算所1G5通訊的介面、傳輸講 買要求的介面、以及諸如計次付費等特殊服務的介面、或 按照每次對内容113的存取收費的情形之介面。目前係由 SC(s)處理器192處理與清算所1〇5各功能之通訊。 係將最終使用者裝置109上的播放應用程式195對内容 113之使用記錄在一個諸如授權許可資料庫197等的資料 庫。可將播放應用程式195對内容113的每一次使用之追縱 傳送到諸如清算所1 〇5、内容提供者1 〇 1、電子數位内容商 店103、或耦合到傳輸基礎建設1〇7的任何指定網站等的一 個或多個冗錄網站。可將該傳輸安排在一預定時間,以便 將使用資訊上傳到一記錄網站。可考慮的一個時間是傳輸 基礎建設1 07上並無網路塞車現象的清晨之時。利用習知的 技術在一預定時間將播放應用程式1 95唤醒,並將該資訊自 本機的記錄資料庫傳送到該記錄網站。内容提供者〗〇〗檢查 O:\85\85156 分抓DOC -174- 1255443 记錄網站的資訊’即可衡量其内容ιΐ3受歡迎的程度。 在另一實施例中’並不記錄内容⑴的使用,以供爾後 上傳到- c錄網站,而是在每一次使用内容⑴時將内容 ⑴的使用狀況上傳到該記錄網站。例如,當將最終使用者 裝=109中儲存的内容113複製或拷貝到諸如则、數位式 磁π、快閃記憶體、MD '或等效的可讀取/寫入之抽換式 媒體等的-外部裝置時,即在該記錄網站上更新其使用狀 況。上述情形可能是購買内容113時所傳送的使用條件2〇6 中對拷貝内容⑴規定的—先決條件。此種方式確保内容提 t、者101可在其内容113的播放、複製、或對内容⑴的進行 的其他動作時,能夠精確地追縱到其内容113的使用狀況。 上此外,可將與内容113有關的其他資訊上傳到該記錄網 j。例如,上—次執行内容113的時間(日期及小時广已執 仃了内谷113多少次,是否曾將内容】13複製到或拷貝到一 f如DVD、數位式磁帶、或_等的經授權之外部裝置。在 U用者裝置1G9上的-單—播放應用程式195有多個不 同的使用者之情形巾,例如在—個家庭中的不同成員之情 形中’係將内容⑴使用者的識別碼連同使用資訊傳送到該 記錄網站。内容提供者1G1檢查上傳到該記錄網站的使用资 訊’即可根據實際的使用狀況、使用者的身分、及内容ιι3 被執行的次數,而衡量内交彳】1 A > 野里鬥奋113文歡迎的程度。此種實際使 用的量度方式使本系統接近事實的程度優於諸偏_ 對電視收視率的收視記錄器調查或電話抽樣調查等使用抽 樣万法的系統,在此類抽樣方法的系統中,係在任何一個 ㈣5\85156分刮撕 -175- 1255443 時間中只對數目有限的使用者進 %仃抽樣凋查,並以外差法 隹論出結果。在本實施例中,可針 f對屺錄到諸如電子數位 内容商店103或内容提供者10i等的_ 寸J知疋網站之使用者, 而量度實際的使用狀況。O:\85\85 156 minutes DOC -171 . 1255443 Track name object track information object track lyrics button track lyrics object track artist name object track credit button button audio item CD name object CD Credit button button CD credit item general (configurable configuration) intermediary data button general intermediary data object and others. The function of the end user display screen 1 5 1 0 includes (the corresponding picture of the final user interface is shown as 1601 - 1605): Display the play list of the container object play list management button play list management window digital content search button digital content Search for definition object digital content search send sister digital content search result object play list button copy select search result play list object (editable) play list save button O:\85\85156 split DOC -172 - 1255443 playlist play button Playlist Pause Button Playlist Restart Button The CD and other are generated from the playlist button. Digital content database 196 display digital content database button digital content database management window digital content type by sister digital content type object according to the artist selection button according to the type selection button according to the brand selection button according to the category selection button delete button added to the play list button Copy to CD button song list object song list display container object and other container objects and miscellaneous player window container object music control device container object intermediary data control device container object intermediary data display container object tool column container object O: \85\85156 points剤.DOC -173 - 1255443 Sample button download button to buy according to the record by 4 ugly player name object brand / provider / store advertising object brand / provider / store URL button 蛰 people URL by know and other 3 · copy / Playback management components 15〇4 These components handle encryption keys, add watermarking programs, copy management, and ordering. There is also an interface for communicating with the clearing house 1G5, an interface for transmitting the request, and an interface for special services such as pay-per-view, or an interface for charging each time the content 113 is accessed. Currently, the SC(s) processor 192 handles communication with the functions of the clearinghouse. The use of the content 113 by the playback application 195 on the end user device 109 is recorded in a database such as the license database 197. The playback application 195 can transfer the tracking of each use of the content 113 to any designation such as the clearinghouse 1 〇 5, the content provider 1 〇 1, the electronic digital content store 103, or the transmission infrastructure 1 〇 7 One or more redundant sites such as websites. The transmission can be scheduled for a predetermined time to upload usage information to a record website. One time that can be considered is the early morning when there is no network traffic jam on the infrastructure infrastructure. The playback application 1 95 is woken up at a predetermined time using conventional techniques, and the information is transferred from the record database of the local machine to the record website. Content Provider 〇 检查 Check O:\85\85156 Scratch DOC -174- 1255443 Record the information of the website ’ to measure the popularity of its content ιΐ3. In another embodiment, the use of the content (1) is not recorded for later uploading to the -c recording website, but the usage status of the content (1) is uploaded to the recording website each time the content (1) is used. For example, when the content 113 stored in the end user device = 109 is copied or copied to, for example, digital magnetic π, flash memory, MD 'or equivalent readable/writable removable media, etc. - When the external device is installed, the usage status is updated on the record website. The above situation may be a precondition for the copy content (1) specified in the use condition 2〇6 transmitted when the content 113 is purchased. In this manner, it is ensured that the content provider 101 can accurately trace the usage status of the content 113 when the content 113 is played, copied, or otherwise performed on the content (1). In addition, other information related to the content 113 can be uploaded to the recording network j. For example, the time when the content 113 was executed last time (the date and the hour has been executed, how many times the inner valley 113 has been executed, whether the content has been copied] 13 or copied to a f such as a DVD, a digital tape, or a Authorized external device. The single-play application 195 on the U user device 1G9 has a plurality of different user situations, for example, in the case of different members of a family, the user of the content (1) The identification code is transmitted to the recording website together with the usage information. The content provider 1G1 checks the usage information uploaded to the recording website', which can be measured according to the actual usage status, the user's identity, and the number of times the content is executed. Intra-communication] 1 A > The degree of welcome in the wild. The measure of actual use makes the system closer to the facts than the biases _ TV recorder ratings or telephone sample surveys Using a system of sampling methods, in the system of such sampling methods, only a limited number of users are sampled and sampled in any one (4) 5\85156 points of scraping -175 - 1255443. The results of the difference method are used to describe the result. In the present embodiment, the user can be logged to the user of the website, such as the electronic digital content store 103 or the content provider 10i, and the actual usage status is measured. .
4.解密15〇5、解壓縮〗506、及播放元件15〇6 伙這些元件使用拷貝/播放管理元件取得的金鑰將自資料 巨理及貝料庫存取疋件取得的音訊資料解密,然後進行適 當的解壓縮,以便將該資料準備好以供播放,並利用系統 音訊服務程式來播放該資料。在—替代實施例中,可將自 該等資料管理及資料庫存取元件取得的音訊資料拷貝到諸 如CD、軟碟、磁帶、或MD等的抽換式媒體。 5.資料管理15〇2及資料庫存取元件15〇3 這些元件係用來儲存及擴取最終使用者的系統上各種 儲存裝置上之歌曲資料,並用來處理對所儲存歌曲有關的 資訊之要求。 6 ·應用程式間通訊元件1 5 8 k ^ 7L件係用於$全數位内容電子式配送的播放應用 程式與其他應用程式(例如㈣器、協助應用程式、及(或) 外掛應用程式等)間之協調,其中該等其他應用程式可能呼 叫孩播放應用程式195,或者該播放應用程式195與執行其 功能時需要用到該等其他應用程式。例如,當起動一網址 的I制元件時,泫網址的控制元件呼叫適當的瀏覽器,並 指示該瀏覽器載入適當的網頁。 7 ·其他雜項元件4. Decryption 15〇5, decompression 506, and playback component 15〇6 These components use the key obtained by the copy/play management component to decrypt the audio data obtained from the data master and the bedding stock, and then Properly decompress to prepare the material for playback and use the system audio service to play the material. In an alternative embodiment, the audio data obtained from the data management and data inventory components can be copied to a removable medium such as a CD, floppy disk, tape, or MD. 5. Data Management 15〇2 and Data Stock Pickup Components 15〇3 These components are used to store and extend the song data on various storage devices on the end user's system and to process the information related to the stored songs. . 6 · Inter-application communication components 1 5 8 k ^ 7L are used for playback applications and other applications (such as (4), assisting applications, and/or plug-in applications) for electronic distribution of all-digital content. Coordination, where other applications may call the child play application 195, or the play application 195 needs to use the other applications when performing its functions. For example, when launching an I-component of a web address, the control element of the web address calls the appropriate browser and instructs the browser to load the appropriate web page. 7 · Other miscellaneous components
O:\85\85156 分‘剤 DOC -176- 1255443 無法歸_上述各種類的—些個別元件⑽ 類到此種類。 文裝)被歸 8·—般性播放應用程式 =中,將說明如何將上述各元件組合到—個 播放應用程式195。這只是多種不同的可能實例中之—余 例:這是因為播放應用程式195被設計成可根據軟體物件: 自叮規格。 播放物件管理程式⑽是—種整合所有其^件之軟體 架構:如同上述各節所說㈣,在本圖示中在播放物件; 理程式1501之下的各元件是任何播放應用程式中必須的元 件’但是可根據所用的加密或亂序加密形式、音訊壓縮類 型、以及對内容H3資料庫的存取方法等的各種因素,而以 特殊的版本取代該等元件。 在播放物件管理程式1501之上的是若干可變物件1512, 且大部分係自與所播放或所搜尋的内容113相關聯的中介 資料中衍生出該等可變物件1512。最終使用者裝置1〇9利用 最終使用者顯示幕1510及自最終使用者控制裝置1511接收 的輸入,即可取得這些可變物件。所有物件的組態都是可 设足的’且所有容器物件的配置都是可自訂的。可利用 或任何等效的程式語言來實施這些物件。 使用播放應用程式1 9 5 下列貫施例是最終使用者裝置1 〇9上執行的播放應用程 式1 9 5是一音訊播放應用程式且内容π 3是音樂的一個例 子。熟悉本門技術者當可了解,播放應用程式195亦可支援 O:\85\85156 分'剤.DOC -177- 1255443 其他類型的内容113。典型的音樂愛好者都有歌曲⑶的收 ^在安全數位内容電子式配送系統1⑻内可取得所有這此 歌曲CD。係將自電子數位内容^⑻購買的—组歌曲儲 存在這些音樂愛好者系統上的數位内容資料庫196内。係以 播放清單之方式錯存類似於實體⑶的各組歌曲。在 形中,播放清單係完全模擬CD的形式(例如,可自市場上 購得的-CD之所有音軌都可以線上版⑶之方式自一電子 數位内容商店103賭買,並以等同於CD方式之一播放清單 界定該等所有音軌)。但是,多半係由最終使用者整合出播 放清單’以便將其儲存在其系統的數位内容資料庫中的歌 曲㈣。然而’為了便於後續的討論’在提及播放清單的 術扣時’係思指-使用者自行製作的音樂CD之例子。 當最終使用者明確地啟動播放應用程式195,而不是經由 SC(s)處理器192應用程式的呼叫而啟動播放應$㈣⑼ 時,播放應用程式195預先載人被存取的上_個播放清單。 如果數位内容資料庫196中並無任何播放清單,則自動啟動 播放清單編輯器(除非# (非使用者已、㈣偏好設定而關閉了該 =能)。若要得知更多的細節’請參閱下文中之播放清單該 卽0 亦可利用作為一引數的一含4土、 勺首特疋的歌曲來呼叫播放應用 程式195,在此種情形中,該播放應用程式i95立即進入歌 曲播放模式。亦可選擇使歌曲進入已準備好可播放的狀 怨’但是在播放之前須等候最終使用者的動作。若要得知 此種情形的更多資訊,請參閱下文的歌曲播放一節。O:\85\85156 points ‘剤 DOC -176- 1255443 cannot be attributed to the above-mentioned various classes—some individual components (10) to this category. The text file is categorized as a general playback application = in which the above components are combined into a playback application 195. This is just a few different possible examples - the rest: this is because the playback application 195 is designed to be based on software objects: self-definition specifications. The playback object management program (10) is a software architecture that integrates all of its components: as described in the above sections (4), in the illustration, the components under the playback object 1501 are required in any playback application. The component 'but may be replaced with a special version depending on various factors such as the type of encryption or scribble encryption used, the type of audio compression, and the method of accessing the content H3 library. Above the play object management program 1501 are a number of variable objects 1512, and most of which derive the variable objects 1512 from the mediation material associated with the content 113 being played or searched. The end user device 1〇9 can retrieve these variable objects using the end user display 1510 and the input received from the end user control device 1511. All object configurations are configurable' and all container items are customizable. These objects can be implemented using any equivalent programming language. Using the Playback Application 1 9 5 The following example is the playback application executed on the end user device 1 〇 9 is an example of an audio playback application and the content π 3 is music. Those familiar with the art can understand that the playback application 195 can also support O:\85\85156 minutes '剤.DOC -177-1255443 other types of content 113. A typical music lover has a song (3). All of this song CD is available in the secure digital content electronic distribution system 1 (8). The set of songs purchased from the electronic digital content ^(8) is stored in the digital content database 196 on these music enthusiast systems. Each group of songs similar to the entity (3) is stored in the form of a playlist. In the form, the playlist is completely analog CD format (for example, all audio tracks of the CD that can be purchased from the market can be gambling from an electronic digital content store 103 in the online version (3), and equivalent to the CD. One of the ways the playlist defines all of these tracks). However, most of the songs are synthesized by the end user by the playlist' to store them in the digital content repository of their system (4). However, in order to facilitate the subsequent discussion, when referring to the buckle of the playlist, it is an example of a music CD produced by the user himself. When the end user explicitly launches the play application 195 instead of launching the call via the SC(s) processor 192 application call ($) (9), the play application 195 preloads the last _ playlist accessed by the person. . If there is no playlist in the digital content repository 196, the playlist editor is automatically launched (unless # (non-user, (4) preference settings are turned off = can). To learn more details please Referring to the playlist below, the 卽0 can also use the song containing the 4th, scoop-first feature as an argument to call the play application 195, in which case the play application i95 immediately enters the song play. Mode. You can also choose to have the song enter the ready-to-play grievance' but wait for the end user's action before playing. For more information on this situation, please see the song playback section below.
0:\85\85丨56 分削 DOC -178- 1255443 播放清單(一最終使用者介面16〇3之對應晝面): 當最終使用者已呼叫播放清單功能時,有下列可使用的 功能: 開啟播放清單 呼叫數位内容資料庫管理程式顯示所儲存播放清單 之一清單,以供選擇。若要得知更多的資訊,亦請參 閱下文的數位内容資料庫管理程式一節。 編輯播放清單 呼叫播放清單編輯器(請參閱下文),如果已載入了播 放清單,則亦可使用現行的播放清單。否則,該編輯 器將產生一個空的播放清單作為開始。 執行播放清單 自所選擇的歌曲開始(如果並未選擇歌曲,則自該播放 清單的第一首開始),以一次一首之方式播放歌曲。播 放清單編輯器中設定的選項將影響到播放的順序。然 而’可利用控制功能來越過播放清單的這些播放選 項。 播放歌曲 只播放自播放清單選出的歌曲。若要得知更多的資 訊’請參閱下文的歌曲播放一節。 播放清單資訊 與播放清單有關的顯示資訊。 歌曲資訊0:\85\85丨56 Dividing DOC -178- 1255443 Playlist (a corresponding user interface 16〇3): When the end user has called the playlist function, the following functions are available: Open Playlist Call Digital Content Library Manager displays a list of stored playlists for selection. For more information, please also refer to the Digital Content Database Management Program section below. Edit Playlist Calls the Playlist Editor (see below), and if a playlist is loaded, the current playlist can also be used. Otherwise, the editor will generate an empty playlist as a start. Execute playlist Starts with the selected song (if the song is not selected, starting from the first one of the playlist), plays the song one at a time. The options set in the Playlist Editor will affect the order in which they are played. However, the control functions can be used to override these playlists of the playlist. Playing songs Play only the songs selected from the playlist. To find out more information, please see the Song Play section below. Playlist Information Display information related to playlists. Song information
與播放清單内所if遲私AM |堤释灰曲有關的顯示資訊。Display information related to the late-night AM |
O:\85\85 丨 56 分割 DOC 1255443 連線到網站 將與該播放清單相關聯的網站載入瀏覽器中。 資料庫管理程式 開啟數位内容資料庫管理程式視窗。若要得知更多的 頁訊’亦請參閱下文的數位内容資料庫管理程式一 即 ο 播放清單編輯器(一最終使用者介面1603之對應畫面): 當呼叫播放清單編輯器時,有下列的最終使用者選項: 閱覽/載入/删除播放清單 呼叫數位内容資料庫管理程式顯示所儲存播放清單 的一清單,以便選擇一個要載入或刪除的播放清單。 若要得知更多的資訊,亦請參閱下文的數位内容資料 庫管理程式一節。 儲存播放清單 將見行版本的播放清單儲存在數位内容資料庫1 % 中。 刪除歌曲 自播放清單中刪除目前選擇的歌曲。 加入歌曲 在歌曲搜尋模式中啤叫數位内容資料庫管理程式,以 便選擇要加人播放清單之歌曲。若要得知更多的資 讯:^青參閱下文的數位内容資料庫管理程式一節。 設定歌曲資訊 關之資訊,且容許對 顯示與播放清單内所選擇歌曲有O:\85\85 丨 56 Split DOC 1255443 Connect to website Loads the website associated with this playlist into the browser. Database Manager Opens the Digital Content Library Manager window. To find out more pages, please also refer to the digital content database management program below. ο Playlist Editor (a corresponding screen of the final user interface 1603): When calling the playlist editor, the following are available. End User Options: View/Load/Delete Playlist Call Digital Content Library Manager displays a list of saved playlists to select a playlist to load or delete. For more information, please also refer to the Digital Content Database Management Program section below. Save playlists Playlists of the line version are stored in the digital content library 1%. Delete song Deletes the currently selected song from the playlist. Adding songs In the song search mode, the beer is called the digital content database management program, so that you can select the songs to be added to the playlist. To find out more information: ^See the Digital Content Database Management Program section below. Set song information to close the information, and allow for the selected songs in the display and playlist
O:\S5\85 丨 50 分割 D0C -180- 1255443 該資訊的改變。該資訊係儲存在播放清單内,且立不 改變與數位内容資料庫196内儲存的歌曲有關之資 訊。 顯示歌曲名稱 最終使用者加上與歌曲有關的註釋 播放歌曲時的引入延遲 在播放歌曲之後的跟隨延遲 播放時歌曲内的起點 播放時歌曲内的終點 隨機模式的加權 該歌曲的音量調整及其他。 設足播放清單屬性:顯示内容庫的屬性,並容許對該屬 性的改變。可設定的這些屬性有: 播放清單名稱 播放清單模式(隨機、循序等) 重播模式(播放一次、播放完畢後重新開始等) 最終使用者對該播放清單所加上的註釋。 資料庫管理程式(一最終使用者介面1601之對應畫面): 開啟數位内容資料庫管理程式視窗。若要得知更多的資 訊,亦印參閱下文的數位内容資料庫管理程式一節。 歌曲播放 田利用琢歌曲作為引數呼叫播放應用程式195,或自一播 放清單或在數位内容資料庫管理程式内選擇一歌曲以供播 放,而準備該歌曲以供播放時,有下列的最終使用者選項 〇Λ85\85 丨 56 分冽 D〇c 1255443 (一最終使用者介面1601的對應畫面): 播放 暫停 停止 快速後轉 快速前轉 調整音量 調整音軌位置 預覽歌詞 預覽貸項 閱覽CD封面 閱覽藝人照片 閱覽音軌資訊 預覽其他中介資料 連線到網站 播放清單 資料庫管理程式。 數位内容資料庫管理程式 可於選擇歌曲或播放清單時自動呼叫數位内容資料庫 官理程式(請參閱前文),或可在其本身的視窗中開啟數位 内容資料庫管理程式,以便管理最終使用者系統上的歌曲 資料庫。在此種情形中,有下列的最終使用者選項· 對歌曲的操作: 根據藝人、種類、品牌、及其他因素而分麵所有、: O:\85\85156 分割.DOC -182- 1255443O:\S5\85 丨 50 Split D0C -180- 1255443 The change of this information. The information is stored in the playlist and does not change the information associated with the songs stored in the digital content repository 196. Displaying the song name The end user adds a note related to the song. The introduction delay when playing a song The following delay after playing a song The starting point within the song during playback The end point within the song during playback The weighting of the random mode The volume adjustment of the song and others. Set playlist properties: Display the properties of the content library and allow changes to the property. The properties that can be set are: Playlist name Playlist mode (random, sequential, etc.) Replay mode (play once, restart after playback, etc.) The comment that the end user added to the playlist. The database management program (the corresponding screen of the final user interface 1601): Opens the digital content database management program window. To learn more about the information, please also refer to the Digital Content Database Management Program section below. The song playing field uses the 琢 song as the index call playback application 195, or selects a song from a playlist or in the digital content database management program for playback, and prepares the song for playback, the following final use Options \85\85 丨56 minutes 冽D〇c 1255443 (corresponding screen of the final user interface 1601): Play pause stop fast turn fast forward forward adjust volume adjustment track position preview lyrics preview credit review CD cover reading Artist photo viewing audio track information preview other mediation materials connected to the website playlist database management program. The Digital Content Library Manager automatically calls the Digital Content Library Manager when selecting songs or playlists (see above), or you can open the Digital Content Library Manager in its own window to manage end users. A library of songs on the system. In this case, there are the following end-user options: Operation of the song: All faceted by artist, category, brand, and other factors: O:\85\85156 Split.DOC -182- 1255443
Container;簡稱s〇及相關聯的圖形表示法之方塊圖。 “圖3是根據本發明的一安全容器物件(s。的加密程序概 觀之方塊圖。 -圖4是根據本發明的一安全容器物件(sc)的解密程序概 觀之方塊圖。 >圖5是根據本發明的圖丨所示安全數位内容配送系統的 權利管理架構各層概觀之方塊圖。 圖6疋内容配送及授權許可控制於應用於圖5所示授權 泮可控制層時的一概觀之方塊圖。 圖7示出根據本發明的圖丨所示工作流程管理工具程式 之一例示使用者介面。 圖8是對應於根據本發明的圖7所示使用者介面的工作 /瓦程官理私式的主要工具程式、元件、及程序之方塊圖。 圖9是根據本發明的圖丨所示一電子數位内容商店的主 要工具程式、元件、程序之方塊圖。 圖10是根據本發明的圖1所示使用者裝置的主要組件及 程序之方塊圖。 圖11疋计算根據本發明的内容預先處理及壓縮工具程 式的一編碼速率因數的一方法之流程圖。 圖12是自動揭取根據本發明的圖8所示自動中介資料取 得工具程式的額外資訊的一方法之流程圖。 圖13是自動設定根據本發明的圖8所示預先處理及壓縮 工具程式的預先處理及壓縮參數的一方法之流程圖。 圖14示出根據本發明而將内容下載到一個圖丨5所示本 〇:\85\85156 分割.D0C -184- 1255443 機内合庫的播放應用 同ις日士 心式<使用者介面整 圖15疋在根據本發 螢幕。 明的圖9所示使用者 播放應用程式的主要元件及程序之方魏圖。執行的-Container; referred to as s〇 and the associated graphical representation of the block diagram. Figure 3 is a block diagram of an overview of an encryption procedure for a secure container object (s. - Figure 4 is a block diagram of an outline of a decryption procedure for a secure container object (sc) in accordance with the present invention. > Figure 5 It is a block diagram of the layers of the rights management architecture of the secure digital content distribution system according to the present invention. Figure 6 is an overview of the content distribution and license control applied to the authorized control layer shown in Figure 5. Figure 7 is a diagram showing one of the workflow management tool programs shown in the figure according to the present invention. Figure 8 is a work/wattage official private format corresponding to the user interface shown in Figure 7 in accordance with the present invention. Figure 7 is a block diagram of the main tools, components, and programs of an electronic digital content store in accordance with the present invention. Figure 10 is a diagram 1 of the present invention. A block diagram of the main components and procedures of the illustrated user device. Figure 11 is a flow chart of a method for calculating a coding rate factor of a pre-processing and compression tool in accordance with the present invention. Figure 12 is a flow chart of a method for automatically extracting additional information of the automatic mediation data acquisition tool of Figure 8 in accordance with the present invention. Figure 13 is a diagram showing the automatic setting of the pre-processing and compression tool of Figure 8 in accordance with the present invention. A flow chart of a method for pre-processing and compressing parameters. Figure 14 shows the downloading of the content to a playback application shown in Figure 5: \85\85156 split. D0C -184 - 1255443 With the ις日士心式<user interface, the whole picture is shown in Figure 9. According to this screen, the user plays the main components of the application and the program of the program.
圖加出根據本發明的圖15所示播放應用程式之一例 示使用者介面螢幕。 工I _J 7是自動擷取根據本發明的圖8所示自動中介資料取 得工具程式的額外資訊的一替代實施例之流裡圖。 O:\85\85I56 分刮.DOC -185-The figure shows a user interface screen exemplified by one of the playback applications shown in Fig. 15 of the present invention. I_J 7 is a flow diagram of an alternative embodiment of automatically extracting additional information from the automated mediation data acquisition utility of Figure 8 in accordance with the present invention. O:\85\85I56 scraping. DOC -185-
Claims (2)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US09/177,096 US6389538B1 (en) | 1998-08-13 | 1998-10-22 | System for tracking end-user electronic content usage |
| US09/203,306 US6345256B1 (en) | 1998-08-13 | 1998-12-01 | Automated method and apparatus to package digital content for electronic distribution using the identity of the source content |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| TW200304126A TW200304126A (en) | 2003-09-16 |
| TWI255443B true TWI255443B (en) | 2006-05-21 |
Family
ID=34437156
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW92110051A TWI255443B (en) | 1998-10-22 | 1999-10-19 | A method to identify CD content |
| TW88118057A TWI222057B (en) | 1998-10-22 | 1999-10-19 | Method to automatically retrieve information and data, computer readable medium, and method and system of automatically selecting encoding parameters |
Family Applications After (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW88118057A TWI222057B (en) | 1998-10-22 | 1999-10-19 | Method to automatically retrieve information and data, computer readable medium, and method and system of automatically selecting encoding parameters |
Country Status (1)
| Country | Link |
|---|---|
| TW (2) | TWI255443B (en) |
Families Citing this family (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2012034292A1 (en) * | 2010-09-19 | 2012-03-22 | Mediatek Singapore Pte. Ltd. | Method for performing coding resource management, and associated processing circuit |
| TWI445323B (en) | 2010-12-21 | 2014-07-11 | Ind Tech Res Inst | Hybrid codec apparatus and method for data transferring |
| TWI578243B (en) * | 2015-09-21 | 2017-04-11 | Yun Qi | Management Method of Digital Assets Share and Expected Transfer |
| TWI578772B (en) * | 2016-01-26 | 2017-04-11 | 威盛電子股份有限公司 | Play method and play device for multimedia file |
| TWI720521B (en) * | 2018-05-23 | 2021-03-01 | 莊連豪 | Point management platform |
| TWI680414B (en) * | 2018-05-23 | 2019-12-21 | 莊連豪 | Point operation platform and its implementation method |
| TWI699715B (en) * | 2018-11-15 | 2020-07-21 | 旭曜資訊服務有限公司 | An enhanced on-line platform for workforce |
| TWI661322B (en) * | 2018-11-28 | 2019-06-01 | 中華電信股份有限公司 | Database accessing system and database accessing method |
| CN110569329B (en) * | 2019-10-28 | 2022-08-02 | 深圳市商汤科技有限公司 | Data processing method and device, electronic equipment and storage medium |
-
1999
- 1999-10-19 TW TW92110051A patent/TWI255443B/en not_active IP Right Cessation
- 1999-10-19 TW TW88118057A patent/TWI222057B/en not_active IP Right Cessation
Also Published As
| Publication number | Publication date |
|---|---|
| TW200304126A (en) | 2003-09-16 |
| TWI222057B (en) | 2004-10-11 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP4086825B2 (en) | A system that tracks end-user electronic content usage | |
| JP4347508B2 (en) | Method for uniquely identifying digital content on digital content player-Digital content player, computer-readable recording medium including program | |
| TW454132B (en) | Digital content preparation system | |
| JP4549673B2 (en) | Method and system for preventing unauthorized re-recording of multimedia content | |
| KR100374524B1 (en) | Secure electronic content distribution on cds and dvds | |
| TW563037B (en) | Digital content distribution using web broadcasting services | |
| US7487128B2 (en) | Updating usage conditions in lieu of download digital rights management protected content | |
| US7590866B2 (en) | Super-distribution of protected digital content | |
| US7228437B2 (en) | Method and system for securing local database file of local content stored on end-user system | |
| US20060085343A1 (en) | Method and system for preventing unauthorized rerecording of multimedia content | |
| TW530267B (en) | Multimedia player for an electronic content delivery system | |
| TWI255443B (en) | A method to identify CD content |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| MK4A | Expiration of patent term of an invention patent |