2 / (),, (Claim)(Prior art), ;,,,,,,
( ) 3 ;, :() ( :) (:) (: ) (: ), :,, :(),, :()
4
5 18,,,, I,M,D
6
- 7
- 8 :9,,
- 9 9,,,1:,2:,3: (),
10 US 8,312,290 B2 (country code), /, Kind Code "US 2003/1234567 A1" (A1)2003/1234567, 2003
(Kind codes) 11 - Kind Codes, A1 A2 A9 B1 B2 C1,2,3 E H P S () "",( ),,,USPTO "(reexamination)",b1,b2, (SIR), (SIR),
12
13 http://portal.uspto.gov/pair/publicpair Google serach(upspo Pair)
14
15
16
17
18
19
20 http://twpat3.tipo.gov.tw/tipotwoc/tipotwkm?000fecae000000 0000000000000000A00000001E000000000 Google patent https://www.google.com/?tbm=pts USPTO http://patft.uspto.gov/netahtml/pto/search-bool.html(abtrsact) http://patft.uspto.gov/netahtml/pto/patimg.htm(pdf) IEEE () http://ieeexplore.ieee.org/xplore/home.jsp
21 54 55() 56 57 58 60 70 71 72 73 74 75 76 81 82 84
22
-
Outline 24
-1 25 (DRM) content,content (Encrypted DCF) content,encrypted DCF (Domain) (one domain-one user) Domain,server
26-2 DRM System
27-3 Domain Scenario
-4 28 : 1. /content DCF, 2. Domain Domainmulti-user with multi-device in a domain,drm 3. DomainDRM Domaincontent
-1 29 DRM(Content),(segment),, (DRM Object) ITRIDRM Object (),,DRM Object,(),Server,DRM
30-2
-3 31 Content Segmentation --(content object), (DRM Object) Distinguished DRM Object Delivery --DRM Object,(DRM Vector), ( ),,contentdrm Object User Exclusive and User-Device Identification Mechanism --DRM Object to User-Device,DRM Object
32-1 Content Segmentation --(content object), (DRM Object),DRM ObjectDRM Distinguished DRM Object Delivery --DRM Object,(DRM Vector), ( ),,contentdrm Object,DRM VectorDRM Object, (AESIV,) User Exclusive and User-Device Identification Mechanism --Object to User-Device,DRM Object
33-2 Distinguished DRM Object Delivery + User Exclusive and User-Device Identification Mechanism Distinguished DRM Object Delivery + User Exclusive and User-Device Identification Mechanism Content Segmentation Distinguished DRM Object Delivery + User Exclusive and User-Device Identification Mechanism Content Segmentation
34-1 : : drm encryption data loss protection encryption e-book and encryption : IEEE XPLORE(http://ieeexplore.ieee.org) USPTO(http://www.uspto.gov/) (http://www.tipo.gov.tw)
35-2 (2010/08/23) drm encryption 96,4 data loss protection encryption 26,1 e-book and encryption 1,0 (2010/08/23) drm encryption 12,5 data loss protection encryption 0 e-book and encryption 0 (2010/08/23) drm encryption 47,4 data loss protection encryption 0 e-book and encryption 0 (2010/08/23) drm encryption 70,2 data loss protection encryption 0 e-book and encryption 0,
36-3 An Efficient Key Distribution Method Applying to OMA DRM 2.0 with Device Identifier, Sep,2008. Device Identifier 當對稱式加密的金讑來取 DRM, Extending an OMA-based DRM framework with non-repudiation services, Dec. 2005 DRM,,DRM,
37-4 A New DRM System Based on Graded Contents Sharing and Time- Block Distribution for Home Networks, July, 2007,contentsizeblock, (),key content,, Design of Secure Issue System for Part Page of E-Document in Certified Electronic Document Authority, Nov. 2009,,
38-5 Design and Development of PDF Document Protection System Based on DRM Technology, Dec, 2009 Plug-inPDFDRM, PDF,,Plug-in,, Method for obtaining a black box for performing decryption and encryption functions in a digital rights management (DRM) system, US 7051005, Nov, 2010,DRM,,DRM,,,
39-6 Method and system for digital rights management brokering and digital asset security transcoding, US 7822685, October, 2010,DRM,,, Content encryption schema for integrating digital rights management with encrypted multicast, US 7978848, July, 2011 DRM DRM,
40-7 Content distribution for multiple digital rights management, US 7120250, Oct, 2006 content providerdrm(drm), client,segment, segmentdrm,device,drm content, System and method for processing DRM-enabled files, US 7748044, June, 2010,,,,
41-8 Process and apparatus for securing and retrieving digital data with a Portable Data Storage Device (PDSD) and Playback Device (PD), 20080279533, Nov, 2008 (PDSD), (PD)PDSD,, DRM,PDSDPDSD, DIGITAL RIGHTS MANAGEMENT METHOD FOR TERMINAL, 20080163378, July, 2008,,,,,
42-9 Method to protect digital data using the open mobile alliance digital rights management standard, 20070174197, July, 2007 OMA DRM,ID,,ID, ID,, IDID,, Apparatus and method for sending and receiving digital rights objects in converted format between device and portable storage, 20050267845, December, 2005,,,
-10 43 ARCHITECTURE AND METHOD OF MULTILAYERED DRM PROTECTION FOR MULTIMEDIA SERVICE, TW I256212, June, 2006 DRMDRM DRM,, METHOD FOR SHARING RIGHTS OBJECTS BETWEEN USERS, TW I244313, Nov, 2005 :, ;,,,,
-1 44 An Efficient Key Distribution Method Applying to OMA DRM 2.0 with Device Identifier, Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing on Ninth ACIS International Conference,pp 3~7, Sep,2008. Device Identifier 當對稱式加密的金讑 DRM,
-2 45 A New DRM System Based on Graded Contents Sharing and Time-Block Distribution for Home Networks, 6th IEEE/ACIS International Conference on Computer and Information Science, pp. 830~833, July, 2007.,contentsizeblock, (),key content,,
-3 46 Design of Secure Issue System for Part Page of E-Document in Certified Electronic Document Authority, Fourth International Conference on Computer Sciences and Convergence Information Technology, pp 1052 ~ 1056, Nov. 2009,,
47-1 US 20100281262 / 2010.11.04 Method for Digital Rights Management in a Mobile Communications Network US 7222232 2007.05.22 License-based cryptographic technique particularly suited for use in a digital rights management system for controlling access and use of bore resistant software objects in a client computer Vector Rights Vector Rights Vectorclient server
48-2 TW 200746830 TW 200535591 / 2007.12.16 METHOD AND APPARATUS FOR IMPORTING CONTENT HAVING PLURALITY OF PARTS 2005.11.01 MULTI-USER CONDITIONAL ACCESS TO A CONTENT ITEM content,,,
49, ( ) ()
-3 50 / US 7822685 October, 2010 Method and system for digital rights management brokering and digital asset security transcoding US 7978848 July,2011 Content encryption schema for integrating digital rights management with encrypted multicast US 20080163378 July,2008 DIGITAL RIGHTS MANAGEMENT METHOD FOR TERMINAL, DRM DRM,,,,
-1 51 (), Claim: 1., Content Segmentation Encapsulation Module DRM License ServerDRM Packager 2. 1, 3. content segmentation,:,
-2 52 4. Encapsulation Module,DRM Vector 5. Claim 4DRM Vector,, 6. Claim 4DRM Vectorcontent segmentation 7. Claim 4DRM Vectorcontent info database 8. Claim 4DRM VectorDRM License Server 9. DRM Packager,content object keydrm Vector,DRM Objects 10. ClientDRM Objectskey,DRM Vector,,
53 Claim,, : DRM, DRM, DRM Object, DRM Object,,,
54,
55 () Smart phone (DRM)(DLP) DRM Object
56 :(/) / // METHOD AND APPARATUS FOR ENCIPHERING/DECIPHERING DIGITAL RIGHTS MANAGEMENT OBJECT : :(Content); (DRM Vector); : Method and apparatus for enciphering/deciphering digital rights management (DRM) object are disclosed. The enciphering method comprises following steps. A plurality of content objects which are divided from a digital content are received. DRM vectors are generated according to tacit information between the DRM enciphering apparatus and the DRM deciphering apparatus. The content objects are respectively enciphered to generate DRM objects base on the DRM vectors. : ():( 2 ) (): 21~23:,:
57 :,(Digital Rights Management, DRM),, (DRM Object), :(Content); (DRM Vector);
58,,,: 1 23,1,2 (DRM Object),3 (DRM Object)11111 112113, (Content)12 121122 11 (Server)(Client), 12(Client)(Server), 11,12,11, 12 11, :
59 11: 12: 21~23 31~32 231~234 321~324: 111: 112: 113: 121: 122: 1121 1124: 1122: 1123 1223: 1221: 1222 1224: S1: S2: S3: S4: S5: S6: S7: S41 S41 : S42 S42 : S43 S43 : S44 S43 :
60 : 1. (DRM Object),,, : (Content); (DRM Vector); 2. 1,: ; 3. 1,: ; 4. 1,, 5. 4,(XOR) (Hash Function) 6. 4, (Transaction Number) (Request Time) (Last Requested Object ID)
61 vs vs vs vs effort vs?