2 / (),, (Claim)(Prior art), ;,,,,,,

Similar documents
创业板投资风险提示:本次股票发行后拟在创业板市场上市,该市场具有较高的投资风险

強化信用卡電子交易安全之研究

附3

Mechanical Science and Technology for Aerospace Engineering October Vol No. 10 Web SaaS B /S Web2. 0 Web2. 0 TP315 A

第四章-個案分析.doc

untitled

128 ( ) ( ) [ 1 ] [2] [3] (1) (2) (3) [1] [2] [3] 10 2 ( ) (1997.6) ( ) 64

GTIN EPC GTIN EPC...4 GTIN GTIN GTIN GTIN UCC EAN/UCC EAN/UCC-14.

UDC The Design and Implementation of a Specialized Search Engine Based on Robot Technology 厦门大学博硕士论文摘要库

CH01.indd

Olav Lundström MicroSCADA Pro Marketing & Sales 2005 ABB - 1-1MRS755673

IP TCP/IP PC OS µclinux MPEG4 Blackfin DSP MPEG4 IP UDP Winsock I/O DirectShow Filter DirectShow MPEG4 µclinux TCP/IP IP COM, DirectShow I

科 研 信 息 化 技 术 与 应 用,2015, 6 (1) of identity and the framework of identity management, this paper analyses the development trend of Identity Management

結合IC卡之校園安全網頁系統的設計與實現

OOAD PowerDesigner OOAD Applying PowerDesigner CASE Tool in OOAD PowerDesigner CASE Tool PowerDesigner PowerDesigner CASE To

填 写 要 求 一 以 word 文 档 格 式 如 实 填 写 各 项 二 表 格 文 本 中 外 文 名 词 第 一 次 出 现 时, 要 写 清 全 称 和 缩 写, 再 次 出 现 时 可 以 使 用 缩 写 三 涉 密 内 容 不 填 写, 有 可 能 涉 密 和 不 宜 大 范 围 公

WTO

untitled

Microsoft Word 記錄附件

宏碩-觀光指南coverX.ai

Data Server_new_.doc

untitled

2 3. 1,,,.,., CAD,,,. : 1) :, 1,,. ; 2) :,, ; 3) :,; 4) : Fig. 1 Flowchart of generation and application of 3D2digital2building 2 :.. 3 : 1) :,

IT Data-intensive application,iscsi Middl

1 校 内 专 职 导 师 张 明 军 政 治 学 当 代 中 国 政 党 与 政 治 政 府 理 论 华 东 政 法 大 学 政 治 学 与 公 共 管 理 学 院 教 授 博 士 生 导 师 政 治 学 与 公 共 管 理 学 院 院 长 MPA 教 育 中 心 主 任 学 术 兼 职 教 育

报 告 1: 郑 斌 教 授, 美 国 俄 克 拉 荷 马 大 学 医 学 图 像 特 征 分 析 与 癌 症 风 险 评 估 方 法 摘 要 : 准 确 的 评 估 癌 症 近 期 发 病 风 险 和 预 后 或 者 治 疗 效 果 是 发 展 和 建 立 精 准 医 学 的 一 个 重 要 前

Microsoft Word - MIS.doc

复 变 函 数 与 积 分 变 换 常 微 分 方 程 数 值 分 析 数 值 分 析 课 程 实 习 微 分 方 程 数 值

IDP

声 明 本 人 郑 重 声 明 : 此 处 所 提 交 的 硕 士 学 位 论 文 基 于 等 级 工 鉴 定 的 远 程 考 试 系 统 客 户 端 开 发 与 实 现, 是 本 人 在 中 国 科 学 技 术 大 学 攻 读 硕 士 学 位 期 间, 在 导 师 指 导 下 进 行 的 研 究

ebook140-8

Microsoft Word - A doc


Microsoft PowerPoint - Aqua-Sim.pptx

財金資訊-81期.indd

交流活动

Sep (SCI) 10. Jiann-Ming Wu, Annealing by two sets of interactive dynamics, IEEE Trans. on Systems Man and Cybernetics Part B-Cybernetics 34 (3)

XML SOAP DOM B2B B/S B2B B2B XML SOAP

292 dentity) (e-portfolio (International Federation for Design and Portability) (Repository Learning Education and Training Systems InteroperabilityLE

1 WLAN 接 入 配 置 本 文 中 的 AP 指 的 是 LA3616 无 线 网 关 1.1 WLAN 接 入 简 介 WLAN 接 入 为 用 户 提 供 接 入 网 络 的 服 务 无 线 服 务 的 骨 干 网 通 常 使 用 有 线 电 缆 作 为 线 路 连 接 安 置 在 固 定

北 京 大 学

10 IBM Louis V. Gerstner, Jr. 15 Moore's Law EPC PC 2-2

<4D F736F F D20C9CFBAA3BFC6BCBCB4F3D1A7D0C5CFA2D1A7D4BA C4EAC7EFBCBEC8EBD1A7B2A9CABFD7CAB8F1BFBCCAD4CAB5CAA9CFB8D4F22D C8B7B6A8B8E5>

14-1-人文封面

「人名權威檔」資料庫欄位建置表

<4D F736F F D20B5E7D7D3C9CCCEF1D7A8D2B5C5E0D1F8B7BDB0B8D0DEB6C1D6B8C4CFA3A BCB6A3A92E646F63>

weblogic

基于泛在网的智能交通应用系统总体框架

Microsoft PowerPoint Zhang Guohua.ppt [Compatibility Mode]

Microsoft Word - 46.doc

201523

Microsoft Word - 专论综述1.doc

Outline Speech Signals Processing Dual-Tone Multifrequency Signal Detection 云南大学滇池学院课程 : 数字信号处理 Applications of Digital Signal Processing 2

ebook140-9

27 :OPC 45 [4] (Automation Interface Standard), (Costom Interface Standard), OPC 2,,, VB Delphi OPC, OPC C++, OPC OPC OPC, [1] 1 OPC 1.1 OPC OPC(OLE f

特别关注 图2 视频和音频储存媒体所用DRM技术案例* * 图1 DVD采用的DRM技术和其流程案例 *目标是保护刻录完成的DVD内容 是版权持有者对数字内容复制方 式对策的需求 以终端设备厂家为中心 开发内容加密方式CSS Content Scrambling System 内容加扰系统 引入到D

WTO

USPTO Academic research Corporate needs Global/International Inventors Libraries News Media/Publication Patent Attorney or Agent USPTO e (ebusiness Ce

ebook 145-6

2/80 2

( Version 0.4 ) 1

<4D F736F F F696E74202D20C8EDBCFEBCDCB9B9CAA6D1D0D0DEBDB2D7F92E707074>

) ( ) ( ) ( ) 1. ( ) (1) ( ) End-to- End ( ) ( ) ( ) ( PayPass Paywave Jspeedy) (FISC II) (2) / NFC (Near Field Communication) ( ) NFC TS

4 115,,. : p { ( x ( t), y ( t) ) x R m, y R n, t = 1,2,, p} (1),, x ( t), y ( t),,: F : R m R n.,m, n, u.,, Sigmoid. :,f Sigmoid,f ( x) = ^y k ( t) =

Microsoft PowerPoint - Performance Analysis of Video Streaming over LTE using.pptx

Microsoft Word - 专论综述1.doc

NSTISSC: National Security Telecommunications and Information System Security Committee 2. NSTISSI: National Security Telecommunications and In

F4

AL-MX200 Series

Microsoft PowerPoint ARIS_Platform_en.ppt

Microsoft Word - Westminster 课程信息 25 March 2016.doc

1

标题

2013_6_3.indd

Microsoft Word - 31空中大學校稿檔.doc

a b

Microsoft Word - 1-編者的話

填 表 须 知 一 本 申 报 书 适 用 于 申 报 安 徽 省 高 层 次 科 技 人 才 团 队 填 写 二 申 报 书 中 有 关 栏 目 需 选 择 填 写 的, 请 按 照 填 写 说 明 如 实 并 准 确 填 写 三 申 报 书 内 容 要 逐 项 填 写, 实 际 内 容 不 发

* RRB *

IT 36% Computer Science Teachers Association, CSTA K K-12 CSTA K-12 K-12 K-6 K6-9 K STEM STEM STEM

标题

Ϗ னᒛ ၆ α 第三篇 科技活動與成就 應用研究與技術發展 100 ᎀᙰ ʯஈ ݤ ዘ ʯஈ ᛑ ᑨ ݡ ʇ ιω ݡ ʇ ܯ ᅝ ދ ʯஈ ʴі ʯஈ 圖 數位典藏與數位學習國家型科技計畫組織架構圖 圖片來源 數位典藏與數位學習國家型科技計畫 數位典藏經費 數位學習經費 經費 百萬

WAPOPAC系統設計與行動圖書館通訊技術之探討.PDF

Microsoft Word - sbs.doc

13 A DSS B DSS C DSS D DSS A. B. C. CPU D. 15 A B Cache C Cache D L0 L1 L2 Cache 16 SMP A B. C D 17 A B. C D A B - C - D

ebook 132-2

PowerPoint 演示文稿

穨網經期末報告-WAP.PDF

Microsoft Word - Sameul book 1 and 2.doc

資訊教育總藍圖(公聽會草案)

(Electronic Data Interchange) (Executive Information System) (Economic Order Quantity) (Enterprise Resource Planning) (Flexible Manufacture System) (F

資訊安全管理系統建置初始工作的研究

A dissertation for Master s degree Metro Indoor Coverage Systems Analysis And Design Author s Name: Sheng Hailiang speciality: Supervisor:Prof.Li Hui,

附表2:

01

Oracle Database 10g: SQL (OCE) 的第一堂課

附件1:

标题

Microsoft Word - News Memo doc

Transcription:

2 / (),, (Claim)(Prior art), ;,,,,,,

( ) 3 ;, :() ( :) (:) (: ) (: ), :,, :(),, :()

4

5 18,,,, I,M,D

6

- 7

- 8 :9,,

- 9 9,,,1:,2:,3: (),

10 US 8,312,290 B2 (country code), /, Kind Code "US 2003/1234567 A1" (A1)2003/1234567, 2003

(Kind codes) 11 - Kind Codes, A1 A2 A9 B1 B2 C1,2,3 E H P S () "",( ),,,USPTO "(reexamination)",b1,b2, (SIR), (SIR),

12

13 http://portal.uspto.gov/pair/publicpair Google serach(upspo Pair)

14

15

16

17

18

19

20 http://twpat3.tipo.gov.tw/tipotwoc/tipotwkm?000fecae000000 0000000000000000A00000001E000000000 Google patent https://www.google.com/?tbm=pts USPTO http://patft.uspto.gov/netahtml/pto/search-bool.html(abtrsact) http://patft.uspto.gov/netahtml/pto/patimg.htm(pdf) IEEE () http://ieeexplore.ieee.org/xplore/home.jsp

21 54 55() 56 57 58 60 70 71 72 73 74 75 76 81 82 84

22

-

Outline 24

-1 25 (DRM) content,content (Encrypted DCF) content,encrypted DCF (Domain) (one domain-one user) Domain,server

26-2 DRM System

27-3 Domain Scenario

-4 28 : 1. /content DCF, 2. Domain Domainmulti-user with multi-device in a domain,drm 3. DomainDRM Domaincontent

-1 29 DRM(Content),(segment),, (DRM Object) ITRIDRM Object (),,DRM Object,(),Server,DRM

30-2

-3 31 Content Segmentation --(content object), (DRM Object) Distinguished DRM Object Delivery --DRM Object,(DRM Vector), ( ),,contentdrm Object User Exclusive and User-Device Identification Mechanism --DRM Object to User-Device,DRM Object

32-1 Content Segmentation --(content object), (DRM Object),DRM ObjectDRM Distinguished DRM Object Delivery --DRM Object,(DRM Vector), ( ),,contentdrm Object,DRM VectorDRM Object, (AESIV,) User Exclusive and User-Device Identification Mechanism --Object to User-Device,DRM Object

33-2 Distinguished DRM Object Delivery + User Exclusive and User-Device Identification Mechanism Distinguished DRM Object Delivery + User Exclusive and User-Device Identification Mechanism Content Segmentation Distinguished DRM Object Delivery + User Exclusive and User-Device Identification Mechanism Content Segmentation

34-1 : : drm encryption data loss protection encryption e-book and encryption : IEEE XPLORE(http://ieeexplore.ieee.org) USPTO(http://www.uspto.gov/) (http://www.tipo.gov.tw)

35-2 (2010/08/23) drm encryption 96,4 data loss protection encryption 26,1 e-book and encryption 1,0 (2010/08/23) drm encryption 12,5 data loss protection encryption 0 e-book and encryption 0 (2010/08/23) drm encryption 47,4 data loss protection encryption 0 e-book and encryption 0 (2010/08/23) drm encryption 70,2 data loss protection encryption 0 e-book and encryption 0,

36-3 An Efficient Key Distribution Method Applying to OMA DRM 2.0 with Device Identifier, Sep,2008. Device Identifier 當對稱式加密的金讑來取 DRM, Extending an OMA-based DRM framework with non-repudiation services, Dec. 2005 DRM,,DRM,

37-4 A New DRM System Based on Graded Contents Sharing and Time- Block Distribution for Home Networks, July, 2007,contentsizeblock, (),key content,, Design of Secure Issue System for Part Page of E-Document in Certified Electronic Document Authority, Nov. 2009,,

38-5 Design and Development of PDF Document Protection System Based on DRM Technology, Dec, 2009 Plug-inPDFDRM, PDF,,Plug-in,, Method for obtaining a black box for performing decryption and encryption functions in a digital rights management (DRM) system, US 7051005, Nov, 2010,DRM,,DRM,,,

39-6 Method and system for digital rights management brokering and digital asset security transcoding, US 7822685, October, 2010,DRM,,, Content encryption schema for integrating digital rights management with encrypted multicast, US 7978848, July, 2011 DRM DRM,

40-7 Content distribution for multiple digital rights management, US 7120250, Oct, 2006 content providerdrm(drm), client,segment, segmentdrm,device,drm content, System and method for processing DRM-enabled files, US 7748044, June, 2010,,,,

41-8 Process and apparatus for securing and retrieving digital data with a Portable Data Storage Device (PDSD) and Playback Device (PD), 20080279533, Nov, 2008 (PDSD), (PD)PDSD,, DRM,PDSDPDSD, DIGITAL RIGHTS MANAGEMENT METHOD FOR TERMINAL, 20080163378, July, 2008,,,,,

42-9 Method to protect digital data using the open mobile alliance digital rights management standard, 20070174197, July, 2007 OMA DRM,ID,,ID, ID,, IDID,, Apparatus and method for sending and receiving digital rights objects in converted format between device and portable storage, 20050267845, December, 2005,,,

-10 43 ARCHITECTURE AND METHOD OF MULTILAYERED DRM PROTECTION FOR MULTIMEDIA SERVICE, TW I256212, June, 2006 DRMDRM DRM,, METHOD FOR SHARING RIGHTS OBJECTS BETWEEN USERS, TW I244313, Nov, 2005 :, ;,,,,

-1 44 An Efficient Key Distribution Method Applying to OMA DRM 2.0 with Device Identifier, Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing on Ninth ACIS International Conference,pp 3~7, Sep,2008. Device Identifier 當對稱式加密的金讑 DRM,

-2 45 A New DRM System Based on Graded Contents Sharing and Time-Block Distribution for Home Networks, 6th IEEE/ACIS International Conference on Computer and Information Science, pp. 830~833, July, 2007.,contentsizeblock, (),key content,,

-3 46 Design of Secure Issue System for Part Page of E-Document in Certified Electronic Document Authority, Fourth International Conference on Computer Sciences and Convergence Information Technology, pp 1052 ~ 1056, Nov. 2009,,

47-1 US 20100281262 / 2010.11.04 Method for Digital Rights Management in a Mobile Communications Network US 7222232 2007.05.22 License-based cryptographic technique particularly suited for use in a digital rights management system for controlling access and use of bore resistant software objects in a client computer Vector Rights Vector Rights Vectorclient server

48-2 TW 200746830 TW 200535591 / 2007.12.16 METHOD AND APPARATUS FOR IMPORTING CONTENT HAVING PLURALITY OF PARTS 2005.11.01 MULTI-USER CONDITIONAL ACCESS TO A CONTENT ITEM content,,,

49, ( ) ()

-3 50 / US 7822685 October, 2010 Method and system for digital rights management brokering and digital asset security transcoding US 7978848 July,2011 Content encryption schema for integrating digital rights management with encrypted multicast US 20080163378 July,2008 DIGITAL RIGHTS MANAGEMENT METHOD FOR TERMINAL, DRM DRM,,,,

-1 51 (), Claim: 1., Content Segmentation Encapsulation Module DRM License ServerDRM Packager 2. 1, 3. content segmentation,:,

-2 52 4. Encapsulation Module,DRM Vector 5. Claim 4DRM Vector,, 6. Claim 4DRM Vectorcontent segmentation 7. Claim 4DRM Vectorcontent info database 8. Claim 4DRM VectorDRM License Server 9. DRM Packager,content object keydrm Vector,DRM Objects 10. ClientDRM Objectskey,DRM Vector,,

53 Claim,, : DRM, DRM, DRM Object, DRM Object,,,

54,

55 () Smart phone (DRM)(DLP) DRM Object

56 :(/) / // METHOD AND APPARATUS FOR ENCIPHERING/DECIPHERING DIGITAL RIGHTS MANAGEMENT OBJECT : :(Content); (DRM Vector); : Method and apparatus for enciphering/deciphering digital rights management (DRM) object are disclosed. The enciphering method comprises following steps. A plurality of content objects which are divided from a digital content are received. DRM vectors are generated according to tacit information between the DRM enciphering apparatus and the DRM deciphering apparatus. The content objects are respectively enciphered to generate DRM objects base on the DRM vectors. : ():( 2 ) (): 21~23:,:

57 :,(Digital Rights Management, DRM),, (DRM Object), :(Content); (DRM Vector);

58,,,: 1 23,1,2 (DRM Object),3 (DRM Object)11111 112113, (Content)12 121122 11 (Server)(Client), 12(Client)(Server), 11,12,11, 12 11, :

59 11: 12: 21~23 31~32 231~234 321~324: 111: 112: 113: 121: 122: 1121 1124: 1122: 1123 1223: 1221: 1222 1224: S1: S2: S3: S4: S5: S6: S7: S41 S41 : S42 S42 : S43 S43 : S44 S43 :

60 : 1. (DRM Object),,, : (Content); (DRM Vector); 2. 1,: ; 3. 1,: ; 4. 1,, 5. 4,(XOR) (Hash Function) 6. 4, (Transaction Number) (Request Time) (Last Requested Object ID)

61 vs vs vs vs effort vs?