TW200533141A - Method and system for session based watermarking of encrypted content - Google Patents

Method and system for session based watermarking of encrypted content Download PDF

Info

Publication number
TW200533141A
TW200533141A TW94100475A TW94100475A TW200533141A TW 200533141 A TW200533141 A TW 200533141A TW 94100475 A TW94100475 A TW 94100475A TW 94100475 A TW94100475 A TW 94100475A TW 200533141 A TW200533141 A TW 200533141A
Authority
TW
Taiwan
Prior art keywords
content
watermark
unencrypted
request
mark
Prior art date
Application number
TW94100475A
Other languages
Chinese (zh)
Other versions
TWI268080B (en
Inventor
Andre Jacobs
Oscar V Zhuk
Glenn A Morten
Eric Bradley Shapiro
Original Assignee
Widevine Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Widevine Technologies Inc filed Critical Widevine Technologies Inc
Publication of TW200533141A publication Critical patent/TW200533141A/en
Application granted granted Critical
Publication of TWI268080B publication Critical patent/TWI268080B/en

Links

Abstract

A method and apparatus applies a variety of session based watermarks in real-time to content that is streamed from a server towards a client. The invention employs content where differing targeted portions are selectively encrypted, such that other portions remain in the clear (unencrypted). Session information, such as an intended client, end-user, operator of a content server, content owner, and the like, may be used to generate the various watermarks. The watermarks may also be digitally signed and/or encrypted. The watermarks may be applied to the portions of the clear content as the content is streamed towards the client. In one embodiment, a bridge server is configured to modify packets of streaming media data files with the variety of watermarks. In another embodiment, the content server for the streaming media data includes a plug-in component that dynamically modifies the packets of streaming media data files with the variety of watermarks.

Description

200533141 九、發明說明: L·. JSb 4支 】 發明的技術領域 本發明係大致有關防止數位盗拷的技術,且更確切來 說,本發明係有關動態地利用水印標記來修改串流目標選 擇性加密内容的技術。200533141 IX. Description of the invention: L ·. JSb 4] Technical Field of the Invention The present invention relates generally to the technology of preventing digital piracy, and more specifically, the present invention relates to dynamically using watermarking to modify stream target selection. Technology for Sexually Encrypted Content.

L· J 曼朋的技術背景 網際網路的發展已為數位資訊的共享製造了彳艮大的機 10會。近年來,已經可在網際網路上廣泛地取得呈串流媒體 形式的音訊與視訊數位資訊,進而提升了網際網路的普遍 性。 串流媒體是一種網際網路資料傳輸技術,其允許終端使 用者能觀看並聆聽音訊與視訊資訊,而不需要冗長的下載 時間。主機或來源將在網際網路上對一接收到内容時便能 存取該内容的終端使用者’’串流〃小型資訊封包。典型地, 以大型串流媒體資料檔案來說,並無法在終端使用者裝置 上產生暫時性檔案。反之,典型地係在終端使用者裝置的 緩衝器中快取小型串流媒體資訊封包,且在已觀看到或聆 20 聽到資訊之後便很快地丟棄該等封包。 許多企業、藝人、以及個人每天以串流媒體形式在網際 網路上張貼受版權保護的資料。實質上來說,任何能使用 個人電腦的人士均可讀取、複製、編輯並且甚至重新張貼 他們從網際網路取得的串流媒體資料檔案。不幸地,每天 200533141 都有未經授權者大量地複製數以千計受版權保護的串流媒 體資料檔案。此種數位媒體盜版問題日益嚴重,進而導致 企業與個人的嚴重損失。 再者,因為可以把未經授權串流媒體資料檔案傳輸給多 5 個網際網路使用者,往往相當難以判定數位媒體問題的原 始來源。因此,便針對上述以及其他考量而揭露本發明。 相關技藝之說明 本發明申請案係根據2004年1月9日提申之美國臨時專 利申請案號60/535,357主張優先權,優先權係依據美國法 ίο 律35U.S.C_§119(e)而主張,該美國案以參考方式併入本發 明中說明。 【發明内容】 發明的概要說明 本發明揭露一種用以在一網路上傳播内容的系統,其包 15 含··經組構以進行下列動作的一客戶機裝置··要求該内容; 以及提供與該請求相關聯的對話資訊;以及經組構以進行 下列動作的一電腦計算裝置:接收與該請求相關聯的該對 話資訊;加密該内容的至少一部分,其中該内容的至少另 一部分維持為未加密的;至少部分地根據該對話資訊來判 20 定一水印標記;以及當對該客戶機裝置串流該内容的該等 已加密與未加密部分時,即時地套用該水印標記到該未加 密内容的至少一部分中。 圖式的簡要說明 200533141 以下將參照圖式來說明本發明不具限制性且並非完整 詳盡的實施例。在圖式中,相同的元件編號係表示相同的 元件,除非特別指明出來。 為了更清楚地了解本發明,以下將參照本發明的詳細說 5 明並且對照圖式來進行說明,在圖式中: 第1圖為一功能性方塊圖,其展示出一種用以實現本發 明環境的一實施例; 第2圖展示出一種伺服器裝置的實施例,其可用於實行 本發明的一種系統中; 10 第3圖展示出在本發明進展之各種不同階段中内容功 能性部件的一實施例;以及 第4圖為一邏輯流程圖,其根據本發明大致地展示出一 種用以管理目標選擇性預先加密内容上對話式水印標記之 程序的一實施例。 15 【實施方式】 較佳實施例的詳細說明 以下將參照形成本發明之一部分的圖式來更完整地說 明本發明,並且將利用展示方來說明可實現本發明的特定 例示實施例。然而,本發明可體現於許多不同的形式中, 20 且不應該被解釋為受限於本發明揭露的實施例;反之,係 為了能更清楚且更完整地說明本發明而提供該等實施例, 且該等實施例將完整地對熟知技藝者傳達本發明的内容。 再者,可把本發明體現為方法或裝置。因此,本發明可為 一種完整的硬體實施例形式,或者可為一種完整的軟體實 7 200533141 施例形式,或者可為結合軟體與硬體的實施例。以下的詳 細說明因此不具限制性。 簡單地來說,本發明係大致有關用以即時地把一對話式 水印標記套用到從一伺服器串流至一客戶機之内容的方法 5 與裝置。本發明應用其不同目標部分已選擇性加密的内 容,以使該内容的其他部分能維持為〃純淨的(in the clear)"(即未加密的)。可使用包括與預期内容伺服器、終端 使用者、内容伺服器操作者、内容所有者等相關聯資訊的 對話資訊來產生至少一獨特水印標記。當對該客戶機串流 ίο 該内容時,可把該水印標記套用到該純淨内容的一部分 中。該水印標記可隨後用來追蹤該内容的來源、該内容的 所有權、該内容的不適切存取方式、該内容的不適切修改 方式等等。在一實施例中,可組構一水印標記橋接器以利 用多種不同對話式水印標記來修改串流内容的封包。在另 15 一實施例中,該串流内容的内容伺服器包括一水印標記外 掛程式部件,其動態地利用至少一對話式水印標記來修改 串流内容封包。此外,該水印標記的至少一部分可為已加 密及/或已取得數位簽章。可在辯論分析過程中進一步致能 水印標記的驗證及/或不可否認性。此外,藉著在一伺服器 20 端對該内容套用水印標記,而非於一客戶機端,本發明可 實際上減少對受信賴水印標記客戶機的需要。 例證環境 第1圖為一功能性方塊圖,其展示出一種用以實現本發 明之作業環境100的一實施例。作業環境1〇〇僅為適當作 200533141 業衣i兄的-實例,且在此並不意圖對本發明使用範圍以及 力月匕f生暗不任何限制性。因此,在不偏離本發明精神或範 圍的條件下,可以使用其他已知環境與組態。 ^圖式中所示,作業環境100包括内容伺服器102、水 5印U己橋接器1〇4、網路1〇5以及客戶機伽至⑽。網 路105係與水印標記橋接器104以及客戶機106至108進 行水印標記橋接器1〇4則另與内容伺服器進行 通訊。 内各伺服器102實質上包括經組構以便由對客戶機裝 1〇置106至108散佈内容之製造者、研發者及/或所有者使用 的任何電月心十算裝置。該種内容包括但不限於動態影片、 電影、視訊、音樂、付費型節目(pay per View、PPV)、隨 選視訊(Video on Demand、v〇D)、互動式媒體音訊靜 態影像、文字、圖形、以及可對客戶機褒置之使用者(例如 15客戶機裝置106至1〇8)散佈的其他形式數位内容。例如, 可利用多種不同串流機制中的任一種來對一請求客戶機裝 置串流該種内容。 亦可組構内容伺服器102以便由從内容所有者取得權 利以複製並且散佈該内容的企業、系統等等來使用。内容 2〇飼服器102可取得用以從一或數個内容所有者複製且散佈 的權利。内容飼服器102可重新包裝、館存、並且排程内 容以對客戶機裝置106至108的其他内容提供者以及使用 者等進行後續銷售、分散並且提供授權。因此,雖然並未 200533141 展示出來,内容伺服器1〇2可接收來自一 〃上行(upstream)〃 裝置的内容。 可把内容伺服器1〇2組構為能接收 (例如客戶機裝請錢8)_對_ —項請求,並 且對該請求客戶機裝置串流該内容。在—實施例中,内容 10 15 20 :器啦爾咖上行㈣目吻性預先加密 式的时’如叮進—錢述般。在另-實施例中,在 =求客戶機裝置串流該内容之前,可把内容伺服器ι〇2 組構成能選擇性加密至少某些該内容,例如客戶機裝置1〇6 在另實⑯财,當正對該請求客戶機裝置串流 内谷時’内容伺服器102可加密該内容。 ,内容飼服謂般運作的裳置包括個人電腦、桌上型 電細、夕處理“統、微處理^或可編 網路PC、伺服器等。 月買 °化P才不。己橋接器104㈣冓成能接收串流内容,例如 從内容伺《1G2接收串流内容,並且藉著使至少一水印 括在該串流内容中來動態地部分修正該串流内容。 _中’水印標記橋接器1〇4將接收該水印標記欲 二的目標選擇性加密内容。水印標記橋接器 104可隨後 ;月匕針對4求客戶機進行水印標記串流内容的連續動 H客戶機106至108。水印標記橋接器1〇4可另接 μ ir^客戶機農置之終端使用者、内容所有者、内容伺服 Γ 、斤有者等貝汛,並且應用至少某些已接收資訊來產 生至少一7^ Ερ 丨私5己。可另把水印標記橋接器104組構為能 10 200533141 一水印標記能包括 應用多财同切標記_以使該至少 在該串流内容中。 己橋接益104般運作的裝置包括晶片式產 駐在個人㈣、桌上型電腦、多處理器系統、微處 或可編&式'性電子、網路Pc、伺服器中的應用 气等等目此,在一實施例中,水印標記橋接器104包 括記憶體、料裝置、收發部H輯成可猜該應用 程式的一處理器。The technical background of L. J. Manpen The development of the Internet has created a great opportunity for the sharing of digital information. In recent years, digital information on audio and video in the form of streaming media has been widely available on the Internet, thereby increasing the universality of the Internet. Streaming media is an Internet data transmission technology that allows end users to view and listen to audio and video information without requiring lengthy download times. The host or source will on the Internet end to the content of an end user who can access the content as soon as it receives the content, 'streaming' small packets of information. Typically, for large streaming media data files, temporary files cannot be generated on the end-user device. Conversely, small packets of streaming media information are typically cached in the buffer of the end-user device, and these packets are discarded quickly after the information has been viewed or heard. Many businesses, entertainers, and individuals post copyright-protected material on the Internet in the form of streaming media every day. Essentially, anyone with a personal computer can read, copy, edit, and even repost streaming media data files they get from the Internet. Unfortunately, every day, 200533141, thousands of copyrighted streaming media files are copied by unauthorized persons. This type of digital media piracy is becoming increasingly serious, leading to serious losses for businesses and individuals. Furthermore, because it is possible to transmit unauthorized streaming media data files to up to 5 more Internet users, it is often quite difficult to determine the original source of digital media problems. Therefore, the present invention is disclosed in view of the above and other considerations. Explanation of Related Skills This application claims priority based on US Provisional Patent Application No. 60 / 535,357 filed on January 9, 2004, and priority is based on US Law 35U.S.C_§119 (e) Instead, it is claimed that the US case is incorporated in the present invention by reference. [Summary of the Invention] SUMMARY OF THE INVENTION The present invention discloses a system for disseminating content on a network, which includes 15 a client device configured to perform the following actions ... requesting the content; and providing and Dialog information associated with the request; and a computer computing device configured to: receive the dialog information associated with the request; encrypt at least a portion of the content, wherein at least another portion of the content remains unopened Encrypted; at least in part based on the conversation information to determine a 20 watermark mark; and when the encrypted and unencrypted portion of the content is streamed to the client device, the watermark mark is immediately applied to the unencrypted At least part of the content. Brief Description of the Drawings 200533141 The following is a description of non-limiting and incomplete embodiments of the present invention with reference to the drawings. In the drawings, the same component numbers refer to the same components unless specifically noted. In order to understand the present invention more clearly, it will be described below with reference to the detailed description of the present invention and with reference to the drawings, in which: Figure 1 is a functional block diagram showing a method for implementing the present invention An embodiment of the environment; FIG. 2 shows an embodiment of a server device that can be used in a system implementing the present invention; 10 FIG. 3 shows the contents of functional components in various stages of the progress of the present invention An embodiment; and FIG. 4 is a logic flow diagram that schematically shows an embodiment of a program for managing a dialog watermark mark on a target selectively pre-encrypted content according to the present invention. 15 [Embodiment] Detailed description of the preferred embodiment The present invention will be explained more fully with reference to the drawings which form a part of the present invention, and a specific exemplary embodiment in which the present invention can be implemented will be described using a presenter. However, the present invention may be embodied in many different forms, and should not be construed as being limited to the embodiments disclosed by the present invention; on the contrary, these embodiments are provided in order to explain the present invention more clearly and completely. And, these embodiments will completely convey the contents of the present invention to those skilled in the art. Furthermore, the present invention may be embodied as a method or an apparatus. Therefore, the present invention may be in the form of a complete hardware embodiment, or may be in the form of a complete software implementation, or may be an embodiment combining software and hardware. The detailed description below is therefore not restrictive. In brief, the present invention relates generally to a method and apparatus for applying a dialog watermark to content streamed from a server to a client in real time. The present invention uses content whose different target portions have been selectively encrypted so that the other portions of the content can be maintained in the clear " (i.e., unencrypted). The dialogue information including information associated with the intended content server, end user, content server operator, content owner, etc. may be used to generate at least one unique watermark. When streaming the content to the client, the watermark can be applied to a portion of the pure content. The watermark can then be used to track the source of the content, ownership of the content, inappropriate access to the content, inappropriate modification of the content, and so on. In one embodiment, a watermark tag bridge can be configured to use multiple different conversational watermark tags to modify packets of streaming content. In another embodiment, the content server of the streaming content includes a watermark tag plugin component, which dynamically uses at least one interactive watermark tag to modify the streaming content packet. In addition, at least a portion of the watermark mark may be encrypted and / or digitally signed. Verification and / or non-repudiation of the watermark can be further enabled during the debate analysis. In addition, by overlaying the content with a watermark on a server 20 rather than a client, the present invention can actually reduce the need for a trusted watermark client. Example Environment Figure 1 is a functional block diagram showing an embodiment of an operating environment 100 for implementing the present invention. The operating environment 100 is only an example suitable for 200533141, and it is not intended to limit the scope of use of the present invention or the force of the moon. Therefore, other known environments and configurations may be used without departing from the spirit or scope of the invention. ^ As shown in the figure, the operating environment 100 includes a content server 102, a watermark U-bridge 1004, a network 105, and a client Gage to Ghost. The network 105 communicates with the watermark tag bridge 104 and the clients 106 to 108. The watermark tag bridge 104 communicates with the content server. Each of the internal servers 102 essentially includes any electronic computing device configured to be used by manufacturers, developers, and / or owners who disseminate content 106 to 108 to clients. This type of content includes, but is not limited to, dynamic videos, movies, videos, music, pay per view (PPV), video on demand (VOD), interactive media audio still images, text, graphics , And other forms of digital content that can be disseminated to users of the client (eg, 15 client devices 106 to 108). For example, any of a number of different streaming mechanisms may be utilized to stream that content to a requesting client device. The content server 102 may also be structured for use by an enterprise, system, etc. that obtains rights from the content owner to copy and distribute the content. Content 20 Feeder 102 may acquire rights to copy and distribute from one or more content owners. The content feeder 102 can be repackaged, stocked, and scheduled for subsequent sales, decentralization, and authorization of other content providers, users, etc. of the client devices 106 to 108. Therefore, although not shown in 200533141, the content server 102 can receive content from an upstream device. The content server 102 may be configured to receive (for example, the client installs money 8) a _pair_ item request, and stream the content to the request client device. In the embodiment, the content 10 15 20: the device is encrypted in a pre-encrypted mode, such as Dingjin-Qianshu. In another embodiment, before the client device is required to stream the content, the content server may be configured to selectively encrypt at least some of the content, such as the client device 10 The content server 102 may encrypt the content while the requesting client device is streaming the inner valley. The content-feeding clothes that work like that include personal computers, desktop computers, computer systems, micro-processors, or programmable network PCs, servers, etc. It does n’t matter if you buy them on a monthly basis. You have a bridge 104 can successfully receive streaming content, such as receiving content from the content server 1G2, and dynamically partially modify the streaming content by including at least one watermark in the streaming content. _ 中 '水印 Token Bridging The device 104 will receive the selectively encrypted content of the second target of the watermark mark. The watermark mark bridge 104 may be followed; the dagger performs continuous watermark marking of the stream content for the client 4 to the H client 106 to 108. Watermark The tag bridge 104 can be additionally connected to the end user, content owner, content server Γ, owner of the client farm, etc., and apply at least some of the received information to generate at least one 7 ^ Ερ 丨 Private 5. It is also possible to configure the watermark tag bridge 104 to be able to 10 200533141. A watermark tag can include the application of multiple financial congruent tags _ to make it at least in the stream content. It works like 104 Device includes wafer-based manufacturing Personal computers, desktop computers, multi-processor systems, micro- or programmable & electronic devices, network PCs, server applications, and so on. In one embodiment, the watermark marks the bridge 104 includes a memory, a device, and a transceiver H, which is a processor that can guess the application program.

再者,雖然在第1圖巾係把水印標記橋接H 1G4展示為 刀離於内谷伺服器1〇2,本發明並不受限於此。例如,水 印^己橋接為1〇4可包含在内容伺服器1〇2中而作為外掛 ^式^件、應用私式、晶片、電路板等。因此,以下將參 照第2圖更詳細地說明伺服器裝置中之水印標記部件的一 15實施例。再者,可把水印標記橋接器104(及/或水印標記外 掛程式)組構為常駐在一種可查核與受信賴環境中。 可把網路105組構為能使一電腦計算裝置耦合於另一 個電腦計算裝置而使它們能進行通訊。將致能網路1〇5以 應用用以把資訊從一電子裝置傳遞到另一裝置的任何形式 電腦可讀媒體。同樣地,網路105包括一無線介面及/或一 有線介面,例如除了區域網路(LAN)與廣域網路(WAN)之外 的網際網路、例如透過通用串列匯流排(USB)通訊埠的直接 連結、其他形式的電腦可讀媒體、或該等的任何組合。在 ~組互連LAN上’包括根據不同架構與協定的LAN,一路 由器將作為LAN之間的一鏈路,進而使訊息能從一 LAN傳 11 200533141 送到另- LAN。同樣地,LAN中的通訊鏈路典型地包括雙 扭線對或同軸電缓,而網路間的通訊鍵路可利用類比電隸 • 、線、包括TI、T2、T3與T4的完整或部分專屬教减路、 、 整體服務數位網路_Ν)、數位用戶線路(DSL)、包括衛| 5鏈路的無線鏈路、根據多種不同標準的連結,包括神 8〇2.lla、8〇2.llg、說llb、或熟知技藝者已知的任何其 他通訊鏈路。再者,遠端電腦與其他相關電子裝置可透過 • 一數據機以及暫時電話鏈路遠端地連接至LAN ^ WAN。本 質上來說,網路1〇5包括用以使資訊在客戶機裝置ι〇6裏 108以及内容伺服器102之間往來傳送的任何通訊機制。 如上所述地,用以在通訊鏈路中傳送資訊的媒體係展承 • 為一種電腦可讀媒體,即通訊媒體。大致上來說,電腦玎 - 讀媒體包括任何可由電腦計算裝置存取的媒體。電腦可讀 媒體包括電腦儲存媒體、通訊媒體、或該等之組合。 15 此外,通訊媒體典型地體現電腦可讀指令、資料結構、 φ 程式模組、或調變資料信號中的其他資料,例如載波、資 料k 5虎或其他傳輸機制’並且包括任何資訊遞送媒體。所 謂u調變資料信號〃與”載波信號〃包括具有一或數個特徵組 的信號,或者可改變以編碼該信號中的資訊、指令、資料 20等等。舉例來說,通訊媒體包括有線媒體,例如絞線對、 同軸電纜、光纖、波導、以及其他有線媒體與無線媒體, 例如聲音、RF、紅外線、以及其他無線媒體。 客戶機裝置106至108實質上包括能夠在網路上(例如 網路105)從另一個電腦計算裝置接收内容的任何電腦計算 12 200533141 裝置,例如從内容伺服器102、水印標記橋接器1〇4等。 客戶機裝置106至108亦包括能夠接收應用其他機制之内 谷的任何電腦計算裝置,其包括但不限於CD、DVD、磁帶、 、 1子記㈣裝置等。«裝置包括典型地利时線通訊媒 5體連結的裝置,例如個人電腦、多處理器系統、微處理器 式或可編程式消費性電子、網路PC等。該種裝置亦包括典 型地利用無線通訊媒體連結的裝置,例如蜂巢式電話、智 • 慧型電話、呼叫器、手提無線發話機、射頻(RF)裝置、紅 外線(IR)裝置、CB、結合一或數個前述裝置的整合式裝置 10 楚 ^ v 。客戶機裝置106至108亦為能夠利用有線或無線通訊 媒體連結的任何裝置,例如PDA、掌上型電腦、穿戴式電 Η似 自、以及任何其他經配備以在有線及/或無線通訊媒體上接 - 收並播放内容的裝置。 15 客戶機裝置106至108包括經組構以使終端使用者能 要求内容、能接收該内容、並且能播放該内容的一客戶機。 ^ 機亦提供其他動作,其包括但不限於:使該客戶機 置的其他部件能執行、致能與另一個部件、裝置、終端 使用者等連通的一介面。 因此’客戶機裝置1〇6至1〇8可應用多種不同裝置中 20的住一_ 土 種來旱受該内容,其包括但不限於:電腦顯示系統、 系統、自動唱機、機上盒(STB)、電視、視訊顯示裝置 ^例如’客戶機裝置106至108可包括經組構以接收串 災内各資料封包的VoD媒體播放器。客戶機裝置1〇6至108 應用該V〇 D媒體播放器(及/或另一個裴置)來處理串流内 13 200533141 容資料封包以把它們轉換為聲音及/或圖像。亦可把客戶機 裝置106至108組構為能把串流内容視為—固定串流而提 • 供給為終端使用者把該内容轉換為聲音或圖片的另— 1固應 . 用程式(未顯示)。 5 客戶機裝置106至108可另接收該内容作為目標選擇 性加密内容,因而必須先解碼内容才能享受内容。因此 在一實施例中’客戶機裝置106至108包括組構成可解密 g 該目標選擇性加密内容的一應用程式。 例證電腦計糞裝詈 10 第2圖根據本發明的一實施例展示出一種電腦計算妒 置的一實施例。除了展示出的部件之外,電腦計算裝置2〇〇 • 可包括更多的部件。然而,已展示的部件已足以揭露用以 實現本發明的例證實施例。例如,電腦計算裝置2〇〇可代 表具有一水印標記外掛程式部件之一内容伺服器的另一個 15 實施例。 • 電腦計算裝置200包括處理單元212、視訊顯示適配器 214以及大型記憶體,其均透過匯流排222彼此連通。該 大型記憶體大致上包括RAM 216、ROM 232、以及一或數 個永久大型儲存裝置,例如硬碟機228、磁帶機、光碟機、 2〇及/或軟碟機。大型記憶體儲存用以控制電腦計算裝置200 運作的作業系統220。可以應用任何一般用途作業系統。 亦備置基本輸入/輸出系統(、、BI〇S")218以控制電腦計算裝 置200的低階運作。如第2圖所展示地,電腦計算裝置2〇〇 亦透過網路介面單元210(其係針對與包括 TCP/IP協定之 14 200533141 各種不同通訊協定結合使用而建構)與網際網路或某些其 他通訊網路(例如展示於第1圖中的網路1〇5)進行通訊。網 路介面單元210有時稱為收發器、收發裝置或網路介面卡 (NIC)。 5 如上所述,該大型記憶體展示出另一類型的電腦可讀媒 體’即電腦儲存媒體。電腦儲存媒體包括可利用任何方法 或技術實行以储存資訊的依電性、非依電性、可移除式、 以及不可移除式媒體,例如電腦可讀指令、資料結構、程 式模組或其他資料。電腦儲存媒體的實例包括RAM、rqm、 10 EEPROM、快閃記憶體或其他記憶體技術、cD_R〇M、數位 多用途光碟(DVD)或其他光學儲存體、磁性卡匣、磁帶、磁 性碟片儲存體或其他磁性儲存裝置、或者可用來儲存所欲 二貝§fl並且可由電腦計算裝置存取的任何其他媒體。 電腦計算裝置200亦包括用以傳送並接收電子郵件的 15 SMTP處理常式應用程式、用以接收且處理Ηπρ請求的 ηγγτρ處理常式應用程式、以及用以處理安全連結的HTTps 處理常式應用程式。該HTTPS處理常式應用程式可利用安 全方式起始與外部應用程式進行的通訊。 電腦計算裝置200亦包括用以與外部裝置進行通訊的 20輸入/輸出介面224,例如滑鼠、鍵盤、掃描器或未顯示在 第2圖的其他輸入裝置。同樣地,電腦計算裝置2〇〇另包 括額外的大型儲存設備,例如CD-R0M/DVD-R0M光碟機 226以及硬碟機228。硬碟機228可用來儲存應用程式、 資料庫、客戶機裝置組態資訊、政策方針等。 15 200533141 記‘_讀雜柄與_。純_或數個應用 Γί 人到A型記憶體中,並且使其在作職統220 5Furthermore, although the watermark mark bridge H 1G4 is shown as being separated from the inner valley server 102 in the first figure, the present invention is not limited to this. For example, the watermark bridged to 104 may be included in the content server 102 as a plug-in type, application type, chip, circuit board, and the like. Therefore, a fifteenth embodiment of the watermark marking unit in the server device will be described in more detail with reference to FIG. Furthermore, the watermark tag bridge 104 (and / or the watermark tag plug-in) can be configured to reside in a verifiable and trusted environment. The network 105 can be configured to enable one computer computing device to be coupled to another computer computing device so that they can communicate. The enabling network 105 is any form of computer-readable medium that is used to transfer information from one electronic device to another. Similarly, the network 105 includes a wireless interface and / or a wired interface, such as an Internet other than a local area network (LAN) and a wide area network (WAN), such as via a universal serial bus (USB) communication port Direct links, other forms of computer-readable media, or any combination of these. On ~ groups of interconnected LANs', including LANs based on different architectures and protocols, a router will act as a link between the LANs, thereby enabling messages to be transmitted from one LAN 11 200533141 to another-LAN. Similarly, the communication link in a LAN typically includes a twisted pair or coaxial cable, and the communication links between the networks can use analog electronics, wires, including all or part of TI, T2, T3, and T4 Dedicated to teach road reduction, overall service digital network _N), digital subscriber line (DSL), wireless link including satellite | 5 links, links according to a variety of different standards, including God 802.lla, 80. 2.llg, say llb, or any other communication link known to those skilled in the art. Furthermore, remote computers and other related electronic devices can be remotely connected to the LAN ^ WAN through a modem and a temporary telephone link. In essence, the network 105 includes any communication mechanism used to transfer information between the client device 108 and the content server 102. As mentioned above, the media used to transmit information in the communication link is a computer-readable medium, ie, communication media. Broadly speaking, computer read media includes any media that can be accessed by computer computing devices. Computer-readable media includes computer storage media, communication media, or a combination of these. 15 In addition, communication media typically embodies computer-readable instructions, data structures, φ program modules, or other data in modulated data signals, such as carrier waves, data k 5 tigers, or other transmission mechanisms' and includes any information delivery media. The so-called u-modulation data signal and "carrier signal" include signals having one or more characteristic groups, or can be changed to encode information, instructions, data 20, etc. in the signal. For example, communication media include cable media , Such as twisted pairs, coaxial cables, optical fibers, waveguides, and other wired and wireless media, such as sound, RF, infrared, and other wireless media. Client devices 106 to 108 essentially include the ability to be on a network (such as a network 105) Any computer computing that receives content from another computer computing device 12 200533141 devices, such as from content server 102, watermark tag bridge 104, etc. Client devices 106 to 108 also include Utani who can receive applications other mechanisms Any computer computing device, including but not limited to CD, DVD, magnetic tape, digital memory device, etc. «devices include devices typically connected to communication media such as personal computers, multiprocessor systems, microcomputers Processor-based or programmable consumer electronics, networked PCs, etc. Such devices also include devices that typically use wireless communication media to connect Devices, such as cellular phones, smart phones, pagers, portable wireless handsets, radio frequency (RF) devices, infrared (IR) devices, CBs, integrated devices combining one or more of the foregoing devices10 v. Client devices 106 to 108 are also any devices that can be connected using wired or wireless communication media, such as PDAs, handheld computers, wearable computers, and any other devices Access-a device that receives and plays content. 15 Client devices 106 to 108 include a client that is structured to enable end users to request content, receive the content, and play the content. ^ The machine also provides other Actions, which include but are not limited to: an interface that enables other components of the client to execute and enable communication with another component, device, end user, etc. Therefore, 'client devices 106 to 108 may The application of 20 live in a variety of different devices _ soil species to receive this content, including but not limited to: computer display system, system, jukebox, set-top box (STB), television, video display Devices ^ For example, the client devices 106 to 108 may include a VoD media player configured to receive various data packets within the disaster. The client devices 106 to 108 apply the VoD media player (and / or another A Pei device) to process the data packets in the stream 13 200533141 to convert them into sound and / or image. The client devices 106 to 108 can also be configured to treat the streaming content as a fixed stream and Provides another option for end-users to convert the content into sound or pictures — 1 application. (Not shown). 5 Client devices 106 to 108 can additionally receive the content as the target selectively encrypted content, so it must be Decode content before you can enjoy it. Therefore, in one embodiment, 'the client devices 106 to 108 include an application that constitutes a group that selectively decrypts the target selectively encrypted content. Exemplary computerized fecal metering. Fig. 2 shows an embodiment of a computer calculating jealousy according to an embodiment of the present invention. In addition to the components shown, the computer computing device 2000 may include more components. However, the components shown are sufficient to disclose an exemplary embodiment for implementing the present invention. For example, the computer computing device 2000 may represent another embodiment of a content server having a watermark tag plugin component. • The computer computing device 200 includes a processing unit 212, a video display adapter 214, and a large memory, all of which are connected to each other through a bus 222. The large memory generally includes RAM 216, ROM 232, and one or more permanent large storage devices such as hard drive 228, tape drive, optical drive, 20 and / or floppy drive. The large memory stores an operating system 220 for controlling the operation of the computer computing device 200. Any general-purpose operating system can be applied. A basic input / output system (,, BIOS ") 218 is also provided to control the low-level operation of the computer computing device 200. As shown in FIG. 2, the computer computing device 200 is also connected to the Internet or some via the network interface unit 210 (which is constructed for use in combination with various different communication protocols including the TCP / IP protocol 14 200533141). Other communication networks (such as network 105 shown in Figure 1) communicate. The network interface unit 210 is sometimes referred to as a transceiver, a transceiver, or a network interface card (NIC). 5 As mentioned above, this large memory exhibits another type of computer-readable media ', namely computer storage media. Computer storage media includes dependent, non-dependent, removable, and non-removable media that can be implemented using any method or technology to store information, such as computer-readable instructions, data structures, program modules, or other data. Examples of computer storage media include RAM, rqm, 10 EEPROM, flash memory or other memory technology, cD_ROM, digital versatile disc (DVD) or other optical storage, magnetic cassette, magnetic tape, magnetic disc storage Mass media or other magnetic storage devices, or any other media that can be used to store a desired device and accessible by a computer computing device. The computer computing device 200 also includes 15 SMTP handler applications to send and receive emails, ηγγτρ handler applications to receive and process Ηπρ requests, and HTTps handler applications to handle secure connections . The HTTPS handler application can use a secure method to initiate communication with external applications. Computer computing device 200 also includes 20 input / output interfaces 224 for communicating with external devices, such as a mouse, keyboard, scanner, or other input devices not shown in FIG. Similarly, the computer computing device 2000 also includes additional large storage devices, such as a CD-ROM / DVD-ROM drive 226 and a hard drive 228. The hard drive 228 can be used to store applications, databases, client device configuration information, policy guidelines, and the like. 15 200533141 ‘_read miscellaneous and _. Pure _ or several applications Γί person into type A memory, and make it work in the office 220 5

仃。應用程式的實例包括但不限於:轉碼程式、排程 程式、日㈣《、資料縣式、文字處理_、Η·程 式、音訊播放器、視訊播放器、v〇D播放器、解碼器、解 密器、PPV播放器、連接到STB的介面程式、連接到電視、 視訊攝影機的介©程式等。A型儲存另包括例如對每管理Alas. Examples of applications include, but are not limited to: transcoding programs, scheduling programs, sundial, data county-style, word processing programs, audio programs, audio players, video players, vOD players, decoders, Decryptor, PPV player, interface program connected to STB, interface program connected to TV, video camera, etc. Type A storage additionally includes

器(SM)252、内錢存處254、以財印標記物程式L 的應用程式。 1〇可把SM 252組構成可管理來自客戶機裝置而針對内容 的一項請求。因此,SM 252可接收該請求、找到該内容、 並且提供該内容給-水印標記部件,例如水印標記外掛程 式256、水印標記橋接器等。Device (SM) 252, internal money depository 254, and an application program for marking the program L with a fortune. 10. The SM 252 group can be configured to manage a request for content from a client device. Therefore, the SM 252 can receive the request, find the content, and provide the content to a watermark tag component, such as a watermark tag plugin 256, a watermark tag bridge, and the like.

SM 252可另接收例如預期客戶機裝置、終端使用者、 15内容伺服器操作者之識別符、内容所有者之内容識別符等 對話資訊。SM 252可隨後提供該對話資訊給該水印標^己部 件以供產生一水印標記。 SM 252亦接收來自一上行提供者的内容。在一實施例 中’已接收内容係目標選擇性地預先加密。SM 252可隨後 20把目標選擇性預先加密内容儲存在内容儲存處254中。在 另一實施例中,可把SM 252組構成可接收未加密内容並且 進行該内容的目標選擇性加密動作。例如,SM 252可檢 視、剖析、並且選擇性加密該内容的不同目標部分。在一 實施例中,當接收到該内容時及/或在對該水印標記部件提 16 200533141 可:2:2種::時選擇性加_容_部 下__二:: 擇性加密,並且實質上在 、"不限於目標選 下,可應用能加密該内容之立 日月精神或範圍的條件 内容儲存處254實質上:任何其他機制。 峰議、資料庫:二=能储存且取回 等)的部件。 *式貝枓夹、文件、目錄 10 15 20 戶機 1=2===私機物求客 程式况的運作實質上相=第水Τ:Γ標記外掛 ⑽的運作。例如21圖之水印標記橋接器 尺N*§己外掛程式256可應用對話資 ::算==多_的對話如^ :十以置200對该請求客戶機串流該内容時,對話式水印 &心括即時地對該内容套用該水印標記。 X PL己外掛程式256可選擇並且對該内容中維持純 淨的部分套用各種不同的水印標記,如以下參照第3圖所 述。再者,水印標記外掛程式256可利用不同於用以加密/ 解密該内容之金輪的一密碼金鍮來另加密及/或數位簽署 咸水印標記。該等水印標記密碼金鑰典型地為該請求客戶 ,未知且不可得的,因此能保護該水印標記受到鼠改或惡 思的攻擊’並且可在對該内容進行辯論分析時致能水印標 =的驗證及/或不可否認性。因此,該客戶機裝置並無法二 卩標記。在—實關巾’該密碼金鑰為__對稱金輪; 17 200533141 亦可使用非 然而’在*偏離本發明精神或_的條件下 對稱金鍮。 ,標言己外掛程式256展示為電聪 计异裝置200的—'、外掛程式"應用程式,本發明並不受阳 於此。例如’水印標記外掛程式况可常駐在電腦計制 置200的一分別卡片、晶片等上。The SM 252 may additionally receive dialog information such as an identifier of a prospective client device, an end user, a content server operator, a content identifier of a content owner, and the like. The SM 252 may then provide the dialog information to the watermark target component for generating a watermark. SM 252 also receives content from an uplink provider. In one embodiment, the 'received content is selectively pre-encrypted by the target. SM 252 may then store target selectively pre-encrypted content in content storage 254. In another embodiment, the SM 252 group may be configured to receive unencrypted content and perform a targeted selective encryption operation for the content. For example, SM 252 can view, parse, and selectively encrypt different target portions of the content. In an embodiment, when the content is received and / or the watermarking component is added, the 20052005141141 may be 2: 2 ::: selectively added to the content_subordinate__two: selective encryption, and In essence, " is not limited to target selection, a conditional content store 254 that can encrypt the spirit or scope of the content can be applied. Essentially: any other mechanism. Summit, database: two = parts that can be stored and retrieved, etc.). * Type folder, file, directory 10 15 20 Client 1 = 2 === Private machine to ask for customers. The operation of the program is essentially the same as the operation of the T: Γ mark plug-in. For example, the watermark marker bridge rule N * §21 of Figure 21 can be used by the plug-in program 256 :: Calculate == more than _ dialogue such as ^: 10 to 200 when the content is streamed to the requesting client. & Immediately apply the watermark to the content. The X PL plug-in program 256 can select and apply various watermark marks to the pure part of the content, as described below with reference to FIG. 3. Furthermore, the watermark tag plug-in 256 may use a cryptographic key different from the golden wheel used to encrypt / decrypt the content to additionally encrypt and / or digitally sign the salt watermark tag. The watermark token key is typically the requesting client, unknown and unavailable, so it can protect the watermark token from rat attacks or bad thoughts' and enable the watermark token when the content is debated and analyzed = Verification and / or non-repudiation. As a result, the client device cannot be tagged. In the "real key", the cryptographic key is a __symmetric golden wheel; 17 200533141 It is also possible to use non- 'symmetric golden keys under conditions that deviate from the spirit of the invention or _. It is shown that the plug-in program 256 is an application program of Dian Cong Jing Yi device 200, the plug-in program, and the present invention is not limited to this. For example, the status of the 'watermark tag plug-in' program may reside on a separate card, chip, etc. of the computer system 200.

10 再者,雖然SM 252、内容儲存處254以及水印標記外 掛程式256係展示為不同的部件,本發明並不受限於此。 例如,可把SM 252與内容儲存處⑸實行為一單一整合 =二水印標記外掛程式况可常駐在另一個電腦 冲异農置巾(例如第1 _水印標記橋接器iQ4),並且不同 於電腦計算裝置200。 水印標記串流媼g10 Furthermore, although the SM 252, the content storage place 254, and the watermark markup plug-in 256 are shown as different components, the present invention is not limited thereto. For example, SM 252 and content storage can be implemented as a single integration = two watermark mark plug-ins can reside on another computer (such as the first _watermark mark bridge iQ4), and different from the computer Computing device 200. Watermark Tag Stream 媪 g

簡單來說,—對話式水印標記包括插人到數位影像、音 15訊及/或視«_案、或串流巾的—數位錢或型樣。因 為已插入數位信號或型樣並未出現在原始資料檔案的未變 更副本中,該數位水印標記可作為已複製資料槽案的―數 位簽章。例如,可使用水印標記來把著作權通知嵌入到該 資料檔案中。對該資料檔案的各個副本來說,一既定水印 20標記可為獨特的以便能識別預期接收者,或者該既定水印 標記對該資料檔案的多個副本可為共同的,以便能識別出 文件來源。再者,對一般觀看者來說,水印標記可能是不 可見的,進而促進所有權的主張、著作權收益的接收、或 能成功地對未經授權使用資料檔案行為提出訴訟。 18 200533141 在對串流媒體資料播案作出 5To put it simply, —conversational watermarks include digital money or patterns inserted into digital images, audio and / or video files, or streaming towels. Because the inserted digital signal or pattern does not appear in the unchanged copy of the original data file, the digital watermark mark can be used as a digital signature for the copied data slot. For example, a watermark can be used to embed a copyright notice in the data file. For each copy of the data file, a given watermark 20 mark may be unique to identify the intended recipient, or the predetermined watermark mark may be common to multiple copies of the data file so that the source of the file can be identified . Furthermore, to the average viewer, the watermark may be invisible, thereby promoting claims of ownership, receiving copyright proceeds, or being able to successfully sue against unauthorized use of data files. 18 200533141 In the case of streaming media data broadcast 5

10 15 須要知道媒體檔案格式。某些傳# ^的傳統方法中’必 縮一串流媒體資料檔案(或其部分Ρ '°己方法需要解廢 隨後重或部分)。然而標記: ㈣體資料檔案格式仍維持為專屬性的,並且 刀辨出來,傳統水印標記方法的價值 今 本發明提供對話式水印標記内容的數種=限制。然而’ 泛地知道資料檔案格式。此外 丨不需要廣 本發明允許預先加_流内容標:::加 該内容的安全性位準。 丨刀,藉此增加 以下為本發明所使用之數種用以產 料稽案產生對話式水印標記的方法。因為 術漸漸地因為不適切構件而受 技 話式水时記方、、m, 倾供多個對 者’運作上來說’本發明可使用二 $種用u對-既定内容流進行數位水印標記的方法。10 15 Need to know the media file format. In some traditional methods, it is necessary to shrink a stream of media data files (or some of its methods need to be decommissioned and then reused or partially). However, the markup: Carcass data file format remains proprietary and discernible. The value of traditional watermarking methods today. The present invention provides several types of conversational watermarking content = restrictions. However, the file format is generally known. In addition, there is no need for the present invention. The present invention allows to add the stream content mark ::: in advance to the security level of the content. The following methods are used in the present invention to generate interactive watermark marks in the production auditing process. Because the technique is gradually being used because of unsuitable components, the water-time recording method, m, and m are provided for multiple counterparts. 'Operationally', the present invention can use two types of U-pairs-digital watermarking of a predetermined content stream. Methods.

20 此方法儲存敎串流_潛在替代 2以供後續替換之用。將掃描欲進行水印標記的串流媒 作、料槽案’並且摘取出選定的訊框。在本發明的一實施 既疋串〃,L媒體資料檔案的各個已摘取訊框係備置 爱序唬邛刀,例如單一數字。該序號可代表文件來源或 預1客戶機接收者的獨特識別符。該序號部分可位於數個 减中以降低在傳輸訊框到客戶機裝置伽至⑽的過程 1920 This method stores 敎 stream_potential replacement 2 for subsequent replacement. The stream media to be watermarked will be scanned, and the selected frame will be extracted. In an implementation of the present invention, each of the extracted frames of the L media data file is provided with a love order knife, such as a single number. The serial number can represent a unique identifier for the source of the file or the recipient of the pre-1 client. The serial number part can be located in several subtractions to reduce the process of transmitting frames to the client device.

15 20 200533141 中發生遺失的困棱。亦口 ^ 別訊框中。 ’、可把该序號的數字依依地附貼到分 當一客戶機要求— 選出的水印標記訊框來流媒體資料檔案時,可使用已 5未標示訊框。 、5亥原始串流媒體資料檔案中的 … 1々潦可用於k 伺服器的系統中二程式常駐在該内 料檔案以找出有關診#、 /可匕括剖析該串流媒體 獨特資訊以在行進=求客戶機的獨特資訊,並且使用 1〇 2_動態媒艚^^生具有水印標記的訊框。 重新_流媒體資:檔解壓縮、修正、並· 包傳送到該請求客戶機’貝,包。將把已修正:細 檔案資料封包。 原始串流媒體資ί| 3_通藤錢:在此種方法中 體視訊資料檔案包括g 、上所有長串流女 “、、巴§fL框。在一眘15 20 200533141 The missing dilemma occurred. Also mouth ^ The farewell box. ’, The serial number can be attached to the distribution one by one. When a client requests—the selected watermark mark frame to stream the media data file, the 5 unmarked frame can be used. , 5 In the original streaming media data file ... 1々 潦 The system can be used in the k server. The second program resides in the content file to find out the relevant information. You can analyze the unique information of the streaming media to On the go = seeking unique information from the client and using 102_dynamic media to generate a frame with a watermark. Re-streaming data: The file is decompressed, modified, and the packet is transmitted to the requesting client's packet. Corrected: fine file data packet. Original streaming media resources | 3_Tondo money: In this method, the stereo video data file includes g, all long-streaming women, and Pakistan §fL boxes.

別出串流媒體視訊資料择 &例中,將利用H 框。在本發明的另1二;中源:!= 時,便利用獨特請求客戶機識別符二:流《 色訊框。當把串流媒體傳送到該請 示出'f 有水印標記的黑色訊框而在行進中置換選定的里f使用肩 4·紐閘道介面遍钮^此種方法:祝框。 器的水印標記能修改可巧㈣㈣=^網路侧 像等。 田案格式或靜態影 20 200533141 B. 產生用於個別訊框的水印標記 1. 影像/音訊水印標記:此種方法提供用以把水印標記 插入到靜態影像資料格式與音訊格式中。 2. 定義資料修改:定義資料提供有關正進行串流之數位 5 資料類型的資訊。例如,定義資料包括有關該串流媒體資 料檔案之訊框率的資訊。在此種方法的一實施例中,將把 未使用資料插入到定義資料中,以便對該串流媒體提供一 獨特水印標記。在此方法的另一實施例中,將利用編碼水 印標記的有效但不自然順序來錄製該定義資料。 10 3.可去除水印標記:此種方法蓄意地把串流媒體資料訊 框丟棄在統計方法辨識為水印標記的一種型樣中。在此種 方法的一實施例中,可在對該串流媒體品質產生最小負面 影響的狀況下,丟棄中間訊框(稱為I-訊框)。 4. 訊框插入:在此實施例中,將把看不到或者聽不到但 15 具有水印標記的資料訊框插入到串流媒體資料檔案中。 5. 附貼無用的資料到封包中:將把額外無用資訊位元組 加入到資料封包末端以表示一水印標記。將把該水印標記 欲入在已加入的外來位元組數量中。 6. 附貼有用的資料到封包中:此實施例將把具有水印標 20 記的有用資料附貼到選定的串流媒體資料封包中。 C. 產生序號以用於插入動作:用以嵌入水印標記的實施例 提供一位獨特接收者之識別符的選定數字、或不同串流媒 21 200533141 體貝料訊框的來源識別符,以使具有水印標記資料訊框的 組合能包括整個獨特識別符。 然而’本發明並不受限於上述的數位對話式水印桿記技 術。例如,在不偏離本發明精神或範圍的條件下,^使 5用傅利葉轉換技術、離散餘弦轉換技術等。 通用運作 鲁 以下將參照第3圖與第4圖來說明本發明某些方面的運 作。第3圖展示出本發明各種不同階段中之内容功能性部 10件的一實施例。第3圖可作為當内容經歷對話式水印標記 機制時,轉換内容的一實例,例如展示於第4圖中的方式。 . 如第3圖所示,内容轉換300包括純淨内容302、目標 • 與選擇性加密内容304、對話式水印標記内容3〇6、以及已 解馬水印;^ e己内谷308。在一實施例中,純淨内容3Q2與 15目標與選擇性加密内容304可常駐在内容所有者管理的一 • 電腦計算裝置中。 純淨内容302包括純淨部分320至323。純淨部分320 至323代表内容302之多個不同部分的任何部分。再者, 、、、屯淨内谷302代表多種不同内容格式。例如,可以利用動 20態圖象專家組(MPEG)格式來格式化純淨内容302。純淨内 各302並不限於MPEG内容格式,且在不偏離本發明精神 或範圍的條件下可以使用其他的内容格式,包括JPEG格 式、MP3格式等。然而,本發明使用的MPEG格式僅為一 實例’且係為了展示方面而使用。 22 200533141 簡單來說,MPEG是一種用於數位傳播内容的編碼與壓 縮標準。MPEG對視訊傳播内容的電視品質傳輸方式提供壓 縮支援。再者,MPEG提供經壓縮音訊、控制,甚至是使用 者傳播内容。 5 MpEG内容流包括封包化基礎串流(PES'),其典型地包括 整數數量之基礎串流(ES)存取單元的固定(或可變大小)區 塊或訊框。ES典型地為MPEG内容流的基本部件,並且包 括數位控制資料、數位音訊、數位視訊以及其他數位内容 (同步的或異步的)。一組緊密耦合的PES封包(其實質上稱 1〇為相同時基)包含MPEG程式串流(PS)。各個PES封包亦可 分成稱為MPEG傳輸串流(TS)而具有固定大小的傳輸封 包,此形成合併一或數個内容流的一種一般用途方法,可 能地包括獨立時基。再者,MPEG訊框包括中間訊框〇_訊 框)、轉送預測訊框(P-訊框)、以及雙向預測訊框(B_訊框)。 15 因此,純淨部分320至323各包括可根據不同準則而 分為多個資料單元的純淨内容302部分。例如,純淨部分 320至323包括從視訊基礎串流(ES)、音訊ES、數位資料 ES、以及内容流之視訊、音訊、資料基礎串流之任何組成 中抽取出的資料部分。例如,純淨部分320至323可由十 20個視訊ES的第二部分組成。再者,純淨部分32〇至323 可不需要包括與純淨内容302相同的長度、密度等。 可把目標與選擇性加密套用到視訊基礎串流(ES)、音訊 ES、數位資料ES以及視訊、音訊、資料基礎串流之任何部 分的任何組成(其包含純淨内容302),以把其轉換為目樑與 23 200533141 選擇性加密内$ 304。目標與選擇性加密另包括選擇性加 密I-訊框、P-訊框、B-訊框的至少一邻八 口丨刀,以及P-訊框、 B-訊框與訊框的任何組合’以產生目標與選擇性加密内 容304。然而,在某些情況中,所欲的是,純淨内容如 的某些部分維持為純淨的’以使請求客戶機I置可進行該 内容的特技播放方式,例如迴轉、重放、智慧式暫倚等In the case of streaming video selection & example, the H box will be used. In another aspect of the present invention, when the source is:! =, It is convenient to use a unique request for the client identifier II: stream "color frame. When streaming media is sent to the black frame with 'f' watermark, please replace the selected one during the travel. Use this button. • This method: wish box. The watermark of the device can be modified. Field format or still image 20 200533141 B. Generate watermarks for individual frames 1. Image / audio watermark: This method is provided to insert watermarks into still image data format and audio format. 2. Define Data Modification: The definition data provides information about the type of digital 5 data being streamed. For example, the definition data includes information about the frame rate of the streaming media file. In one embodiment of this method, unused data will be inserted into the definition data to provide a unique watermark for the streaming media. In another embodiment of this method, the definition data will be recorded using a valid but unnatural sequence of encoded watermark marks. 10 3. Removable watermark marks: This method intentionally discards the streaming media data frame in a pattern that is statistically identified as a watermark mark. In one embodiment of this method, the intermediate frame (referred to as an I-frame) can be discarded with minimal negative impact on the quality of the streaming media. 4. Frame insertion: In this embodiment, a data frame that cannot be seen or heard but has a watermark mark is inserted into the streaming media data file. 5. Attach useless data to the packet: additional unnecessary information bytes will be added to the end of the data packet to indicate a watermark. This watermark will be marked in the number of foreign bytes added. 6. Attach useful data to the packet: This embodiment will attach useful data with 20 watermarks to the selected streaming media data packet. C. Generate a serial number for inserting action: The embodiment for embedding a watermark mark provides a selected number of a unique recipient identifier, or a source identifier of a different streaming media 21 200533141 body frame, so that A combination of watermarked data frames can include the entire unique identifier. However, the present invention is not limited to the digital dialogue watermarking technique described above. For example, without deviating from the spirit or scope of the present invention, using Fourier transform technology, discrete cosine transform technology, and the like. General Operation Lu Hereinafter, the operation of some aspects of the present invention will be described with reference to FIGS. 3 and 4. Fig. 3 shows an embodiment of 10 content functional units in various stages of the present invention. Figure 3 can be used as an example of converting content when the content undergoes a dialogue watermarking mechanism, such as the way shown in Figure 4. As shown in Figure 3, the content conversion 300 includes pure content 302, target • and selectively encrypted content 304, conversational watermarked content 306, and the resolved horse watermark; In one embodiment, the pure content 3Q2 and 15 targets and the selectively encrypted content 304 may reside on a computer computing device managed by the content owner. The pure content 302 includes pure portions 320 to 323. The clean sections 320 to 323 represent any of a number of different sections of the content 302. In addition, the,,,, and inner net valley 302 represent a variety of different content formats. For example, pure content 302 may be formatted using the Motion Picture Experts Group (MPEG) format. Each of the pure contents 302 is not limited to the MPEG content format, and other content formats may be used without departing from the spirit or scope of the present invention, including the JPEG format, the MP3 format, and the like. However, the MPEG format used in the present invention is only an example 'and is used for the purpose of illustration. 22 200533141 In simple terms, MPEG is an encoding and compression standard for digitally transmitted content. MPEG provides compression support for TV-quality transmission of video content. Furthermore, MPEG provides compressed audio, control, and even user dissemination of content. 5 The MpEG content stream includes a packetized elementary stream (PES '), which typically includes an integer number of fixed (or variable size) blocks or frames of elementary stream (ES) access units. The ES is typically the basic component of an MPEG content stream and includes digital control data, digital audio, digital video, and other digital content (synchronous or asynchronous). A set of tightly coupled PES packets (which are essentially called 10 for the same time base) contains MPEG program streams (PS). Individual PES packets can also be divided into fixed-size transport packets called MPEG Transport Streams (TS). This forms a general-purpose method of combining one or more content streams, which may include independent time bases. Furthermore, the MPEG frame includes an intermediate frame (frame_frame), a forward prediction frame (P-frame), and a bidirectional prediction frame (B_frame). 15 Therefore, the clean sections 320 to 323 each include a clean content 302 section that can be divided into multiple data units according to different criteria. For example, the pure parts 320 to 323 include data parts extracted from any component of the video elementary stream (ES), audio ES, digital data ES, and content stream of video, audio, and data elementary streams. For example, the clean parts 320 to 323 may be composed of the second part of the ten video ES. Furthermore, the pure parts 302 to 323 may not need to include the same length, density, etc. as the pure content 302. Targets and selective encryption can be applied to any component of video basic audio (ES), audio ES, digital data ES, and any part of video, audio, data basic streaming (which contains pure content 302) to convert it For the eyesight with 23 200533141 Selective encryption within $ 304. The target and selective encryption also include the selective encryption of at least eight adjacent ports of the I-frame, P-frame, and B-frame, and any combination of P-frame, B-frame, and frame ' To produce a target with selectively encrypted content 304. However, in some cases, it is desirable that the pure content, such as some parts, be kept pure, so that the requesting client can set up special trick play methods for the content, such as revolving, replaying, smart temporary Wait

如第3圖所示,目標與選擇性加密内容3〇4展示出=為已 加密部分(330與332)的二個部分。 … 當目標與選擇性加密内容304串流到第丄圖㈤水印標記 10橋接器104、第2圖的水印標記外掛程式部件256等時, 將如上所述地把至少一對話式水印標記套用到該純淨内容 的至少-部分(331及/或323)中。藉著如以下所述地包括 至少-對話式水印標記,可把目標與選擇性加密内容3〇4 轉換為對話式水印標記内容3〇6。 15 在—實施例中,亦可把目標與選擇性加密套用到-水印 ^票記中。例如,可把水印標記解壓縮為至少二個部分。一 P刀可肊包括客戶機裝置位址的最重要位元。此部分可為 選擇性加密的目標。其他部分可包括該資訊中較不重要的 元例如客戶機名稱等。例如,水印標記的此部分可維 持為純,爭的。因此,水印標記純淨部分341與343另包括 維持為純淨或進_步加密的子部分。然而,此種加密方式 2可&使用不同於用以另外加密已加密部分33Q與332之 费碼金鑰的一密碼金鑰。 24 200533141 當由請求客戶機裝置接收對話式水印標記内容 時,將解密已加密部分330與332以產生已解密水印 1容3〇8。如果已解密水印標記内容308包括已加密二 私圮的活,該水印標記便維持為已加密的。 5然而’纽意的是,本發明並不因此受限於目標選擇性 加密技術。例如,亦可使用選擇性加密技術,有時稱為"軟 性加密部分加密"、或"片段加密"。該種選擇性加密技 術典型地尋求識別出已壓縮位元串流的最小子組,其可能 使解碼器上(例如一客戶機裝置上)的内容降級。然而,選 10出該位兀串流之最小子組的動作可能會降低安全性位準。 因此,利用此方法有一項交換條件。因此,選擇性加密動 作可接收已壓縮内容,並且使用一種加密演算法來加密位 元串流的預定最小數量,這是針對所欲安全位準來平衡降 級問題的關係。 15 在任一種狀況中,本發明可使用多種不同加密機制中的 任何一種來加密該内容及/或該水印標記的至少一部分,包 括非對稱加密機制(例如Diffie-Hellman、RSA、 Merkle-Hellman、POP),以及對稱加密機制(例如高階加密 標準(AES)、RC6、IDEA、DES、RC2、RC5、Skipjack)等。 20 隨後可利用多種不同機制中的任一種對該請求客戶機裝置 提供對應内容解密金鑰,包括頻帶外(〇ut-of_band)方法、 受信賴第三者等。 第4圖為一邏輯流程圖,其大致地展示出一種用以管理 目標選擇性預加密内容上對話式水印標記之程序的實施 25 200533141 例。可在第2圖的電腦計算裝置2〇〇中實行第4圖的程序 400 ’且可在第1圖的内容伺服器102與水印標記橋接器 - 104中實行第4圖的程序4〇〇。 • 如第4圖所示,程序400將在方塊402中接收到内容 5之後開始。可從多種不同來源接收到該内容。例如,可以 從上行内容所有者、提供者等接收到該内容。在方塊402 中,將檢視該内容以判定它是否經過壓縮。若否,便在方 鲁塊402中壓縮δ亥内容。壓縮内容動作可使用適於既定内容 類型之多種壓縮/解壓縮機制的任一種。例如,方塊402可 1〇使用動態圖象專家組(MPEG)、聯合圖形專家小組(jpeg)、 子波、以及用以壓縮已接收内容的其他機制。 . 處理動作將繼續前進至方塊404,其中將針對該已壓縮 内谷疋否已經進行目標選擇性加密來做出一項判定。若 否那麼上述參照第3圖方法的任一種方法便可用來檢 15視、剖析、並且選擇性加密該内容的不同目標部分。在一 • 實施例中,方塊4〇4將運作以即時地進行加密動作。在另 實知例中’將以〃離線〃方式進行加密動作,並且儲存該 目標選擇性加密内容以供後續存取。在另一實施例中,將 使用選擇性加密方法,而不是使用目標選擇性加密。 2 〇 %一 耘序400隨後將前進至決策方塊406,其中將針對是否 已接收到針對該内容的一項請求來做出一項判定。如果並 未接收到針對該内容的請求的話,處理動作將重複執行決 策方塊406,直到接收到一項請求為止。如果已接收到針 對該内容的一項請求的話,處理動作便前進至方塊408, 26 200533141 其中已接收到對話資訊。可從該請求客戶機接收到對話資 訊。例如,該對話資訊包括客戶機獨特識別符、終蠕使用 者識別符、與該内容以及終端使用者相_的數位權利 等。在-實施例中’該客戶機獨特識別符包括一名稱、— 5密碼、一雜凑、一信用卡號、與該客戶機裝置相關聯的— 網際網路蚊(ip)似等。亦可從内容所有者、内容提供 等接收到對話資訊。例如,該資訊包括内容所有者、内容 加密者、内容提供者等的一識別符。 ^ 處理動作將繼續前進到方塊41Q,其中當對該 10機串流該内容時,將使用該對話資訊令至少—對話式水£ 標記能包括到該内容的選擇性部分中。如上所述°, 用各種不同機制來對該串流内容產生多個水印標記。 者,可數位地簽署及/或加密水印標記。處理動作將繼續^ 進至方塊412,其中將持續地對該請求客戶機串流該水印 15標記内容,且當中該請求客戶機將解密該内容。在完成方 塊412時,程序400將返回到呼叫程序以進行其他動作。 可以了解的是,可由電腦程式指令來實行上面展示於流 程圖中各個方塊以及上面展示於流程圖中的方塊組合。可 對-處理器提供該等程式指令以產生-機器,而使在咳處 理器上執行該等指令時,產生用以實行流程圖方塊中之運 作的構件。可由-處理器執行該等電腦程式指令,以使該 處理器能進行一連串運作步驟而產生電腦實行程序,並在 該處理器上執行該等指令時,提供用以實行流程圖方塊中 之動作的步驟。 27 200533141 因此,流程圖的方塊可支援用以進行指出動作的構心 合、用以進行指出動作的步驟組合、以及用以進行指出動 作的程式指令構件。亦可了解的是,可以由特殊用^硬體 式糸統來實行進行指定動作或步驟之流程圖的各個方塊以 5及流程圖的方塊組合,或者特殊用途硬體以及電腦指令的 組合。 上述的說明、實例以及資料提供組成本發明之建構以及 使用方式的完整說明。在不偏離本發明精神與範圍的條件 下,可進行本發明的許多實施例,且本發明係受以下的申 10 請專利範圍界定。 【圖式簡單說明】 第1圖為-功能性方塊圖,其展示出—觀以實現本發 明環境的一實施例; 第2圖展示出一種伺服器裝置的實施例,其可用於實行 15本發明的一種系統中; 第3圖展示出在本發明進展之各種不同階段中内容功 能性部件的一實施例;以及 第4圖為1輯流程圖’其根據本發明大致地展示出- 種用以管理目標選擇性預先加密内容上對話式水印標記之 20程序的一實施例。 【主 要元件符號說明 1 100 作業環境 105 廣域網路/區域網路 102 内容伺服器 106 客戶機裝置 104 水印標記橋接器 107 客戶機裝置 28 200533141As shown in Figure 3, the target and selectively encrypted content 304 shows two parts = encrypted parts (330 and 332). … When the target and the selectively encrypted content 304 are streamed to the first figure ㈤ watermark mark 10 bridge 104, the second figure watermark mark plug-in component 256, etc., at least one dialog watermark mark will be applied to In at least-part (331 and / or 323) of this pure content. By including at least-conversational watermarking as described below, the target and selectively encrypted content 304 can be converted to conversational watermarking content 306. 15 In the embodiment, the target and selective encryption can also be applied to the -watermark ^ ticket. For example, the watermark can be decompressed into at least two parts. A P knife can include the most significant bits of the client device address. This section can be the target of selective encryption. Other parts may include less important elements of the information such as the client name. For example, this part of the watermark can be kept pure and contentious. Therefore, the watermarked clean portions 341 and 343 additionally include sub-portions that are maintained as pure or further encrypted. However, this encryption method 2 can & use a cryptographic key different from the fee code key used to additionally encrypt the encrypted parts 33Q and 332. 24 200533141 When the dialog client watermarked content is received by the requesting client device, the encrypted portions 330 and 332 will be decrypted to generate a decrypted watermark. If the decrypted watermark content 308 includes encrypted private activity, the watermark is maintained as encrypted. 5 However, what's new is that the present invention is not therefore limited to target selective encryption technology. For example, a selective encryption technique can also be used, sometimes called " soft encryption partial encryption ", or " fragment encryption ". This selective encryption technique typically seeks to identify the smallest subset of the compressed bitstream, which may degrade the content on the decoder (e.g., on a client device). However, selecting the smallest subgroup of this bit stream may reduce the security level. Therefore, there is an exchange condition for using this method. Therefore, a selective encryption operation can receive compressed content and use an encryption algorithm to encrypt a predetermined minimum number of bit streams, which is a balance of the problem of degradation against the desired security level. 15 In any case, the present invention may use any of a variety of different encryption mechanisms to encrypt the content and / or at least a portion of the watermark mark, including asymmetric encryption mechanisms (e.g. Diffie-Hellman, RSA, Merkle-Hellman, POP ), And symmetric encryption mechanisms (such as Advanced Encryption Standard (AES), RC6, IDEA, DES, RC2, RC5, Skipjack), etc. 20 The requesting client device may then be provided with a corresponding content decryption key using any of a number of different mechanisms, including out-of-band methods, trusted third parties, and so on. Figure 4 is a logic flow diagram that roughly shows the implementation of a program to manage dialog watermarking on target-selective pre-encrypted content. The program 400 of FIG. 4 can be executed on the computer computing device 2000 of FIG. 2 and the program 400 of FIG. 4 can be executed on the content server 102 and the watermark tag bridge-104 of FIG. • As shown in Figure 4, procedure 400 will begin after content 5 is received in block 402. This content can be received from a number of different sources. For example, the content may be received from upstream content owners, providers, and the like. In block 402, the content is reviewed to determine whether it is compressed. If not, the delta contents are compressed in the square block 402. The compressed content action can use any of a variety of compression / decompression mechanisms suitable for a given content type. For example, block 402 may use Motion Picture Experts Group (MPEG), Joint Graphic Experts Group (jpeg), wavelets, and other mechanisms to compress received content. Processing will continue to block 404 where a determination will be made as to whether the compressed inner valley has been targeted for selective encryption. If not, any of the methods described above with reference to Figure 3 can be used to inspect, analyze, and selectively encrypt different target portions of the content. In one embodiment, block 404 will operate to perform encryption operations in real time. In another known example, 'the encryption operation will be performed offline, and the target selectively encrypted content is stored for subsequent access. In another embodiment, a selective encryption method will be used instead of using target selective encryption. The 200% task 400 will then proceed to decision block 406, where a determination will be made as to whether a request for the content has been received. If a request for the content has not been received, the processing action will repeatedly execute decision block 406 until a request is received. If a request for the content has been received, processing proceeds to block 408, 26 200533141 where the dialog information has been received. Session information can be received from the requesting client. For example, the dialog information includes the client's unique identifier, the end-user identifier, the digital rights associated with the content and the end user, and so on. In the embodiment, the client unique identifier includes a name, a 5-password, a hash, a credit card number, an Internet mosquito (IP), and the like associated with the client device. Dialogue information can also be received from content owners, content providers, etc. For example, the information includes an identifier of a content owner, a content encryptor, a content provider, and the like. ^ The processing action will continue to block 41Q, where when the content is streamed to the 10 machine, the dialogue information will be used to make at least-the conversational watermark mark included in the optional part of the content. As described above, a variety of different mechanisms are used to generate multiple watermarks for the stream content. Alternatively, the watermark can be digitally signed and / or encrypted. Processing will continue to block 412, where the watermark 15 tag content will be continuously streamed to the requesting client, and the requesting client will decrypt the content. Upon completion of block 412, the routine 400 will return to the calling routine for other actions. It can be understood that the blocks shown above in the flowchart and the combination of the blocks shown above in the flowchart can be implemented by computer program instructions. The program instructions may be provided to the processor to generate the machine, so that when the instructions are executed on the cough processor, a component for performing the operations in the flowchart blocks is generated. The computer program instructions can be executed by the processor, so that the processor can perform a series of operation steps to generate a computer execution program, and when the instructions are executed on the processor, the instructions for performing the actions in the flowchart blocks are provided. step. 27 200533141 Therefore, the blocks of the flowchart can support constructive combinations for pointing actions, combinations of steps for pointing actions, and program instruction components for pointing actions. It can also be understood that each block of the flowchart for performing specified actions or steps can be implemented by a special hardware system, or a combination of blocks and flowchart blocks, or a combination of special-purpose hardware and computer instructions. The foregoing description, examples, and materials provide a complete description of the construction and use of the invention. Many embodiments of the present invention can be carried out without departing from the spirit and scope of the present invention, and the present invention is defined by the following application patents. [Brief description of the drawings] FIG. 1 is a functional block diagram showing an embodiment of the environment to realize the present invention; FIG. 2 shows an embodiment of a server device, which can be used to implement 15 books In a system of the invention; FIG. 3 shows an embodiment of the functional components of content in various stages of the progress of the invention; and FIG. 4 is a series of flowcharts' which shows roughly according to the invention- An embodiment of 20 procedures for selectively pre-encrypting conversational watermarks on content with management objectives. [Key component symbol descriptions 1 100 Operating environment 105 WAN / LAN 102 Content server 106 Client device 104 Watermark tag bridge 107 Client device 28 200533141

108 客戶機裝置 256 水印標記外掛程式 200 電腦計算裝置 300 内容轉換 210 網路介面單元 302 純淨内容 212 中央處理單元 304 目標與選擇性加密内 214 視訊顯示適配器 容 216 RAM 306 對話式水印標記内容 218 基本輸入/輸出系統 308 已解碼水印標記内容 (''BIOS") 320 純淨部分 220 作業系統 321 純淨部分 222 匯流排 322 純淨部分 224 輸入/輸出介面 323 純淨部分 226 CD-R0M/DVD-R0M 光 330 已加密部分 碟機 331 純淨部分 228 硬碟機 332 已加密部分 232 ROM 341 水印標記純淨部分 250 應用程式 343 水印標記純淨部分 252 對話管理器(SM) 400 程序 254 内容儲存處 400〜412 步驟方塊 29108 Client device 256 Watermark markup plug-in 200 Computer computing device 300 Content conversion 210 Network interface unit 302 Pure content 212 Central processing unit 304 Target and selective encryption inside 214 Video display adapter capacity 216 RAM 306 Conversational watermark markup content 218 Basic I / O system 308 decoded watermark mark content (`` BIOS ") 320 clean section 220 operating system 321 clean section 222 bus 322 clean section 224 input / output interface 323 clean section 226 CD-R0M / DVD-R0M light 330 has Encrypted Part Drive 331 Pure Part 228 Hard Drive 332 Encrypted Part 232 ROM 341 Watermarked Pure Part 250 Application 343 Watermarked Pure Part 252 Dialogue Manager (SM) 400 Program 254 Content Store 400 ~ 412 Step Block 29

Claims (1)

200533141 十、申請專利範圍·· ι_種用以在一網路上傳播内容的系統,其包含: " 馳構以進行下㈣作的-客戶機裝置: • 要求該内容;以及 5 提供與該請求相關聯的對話資訊;以及 、二、且構以進行下列動作的-電腦計算裝置: 接收與該請求相關聯的該對話資訊; • 加密該内容的至少-部分,其中該内容的至少另— #分維持為未加密的; 10 至J部分地根據朗話資絲判定—水印標記 及 σ ,U 田對違客戶機|置串流該内容的該等已加密 密部分時,即時地套用該水印標記到該未加密口 的至少一部分中。 谷 15200533141 X. Patent application scope. A system for distributing content on a network, which includes: " Client devices that are configured to perform the following operations: • request the content; and 5 provide and Request the associated dialogue information; and-a computer computing device configured to:-receive the dialogue information associated with the request;-encrypt at least-part of the content, where at least another of the content- # 分 Maintenance is unencrypted; 10 to J are determined in part based on the longevity information—watermarks and σ. U Tian applies the encrypted and encrypted part of the content to the client in violation of the content, and applies it immediately The watermark is marked into at least a portion of the unencrypted port. Valley 15 20 2.^請翻範圍第1項之純,其巾加密勒容之至少 八Ρ刀的動作另包含選擇性地挑出該内容的至少該部 分以供加霜。 H请專利範圍第1項之系統,其中套用該水印標記的 ^另包含套用-不同水印標記到該未加密内容的一 不同部分Φ。 項之系統,其中套用該水印標記的 同水印標記到該未加密内容的相 4·如申請專利範圍第1 動作另包含套用一不 同部分中。 30 200533141 .動1:1利範圍第1項之系統’其中套用該水印標記的 L含加密該水印標記之至少—部分以及數位地簽 δΛ水印標記之至少另-部分之二個動作中的至少一 動作。 6_如申請專利範圍第i項之祕,其中該電腦計算裝置使 用一水印標記外掛程式以及一水印標記橋接器中的至 少一個以套用該水印標記。20 2. ^ Please refer to the pureness of item 1 in the scope. The action of the knife at least 8P also includes selectively picking at least that part of the content for worse. H. The system of item 1 of the patent scope, wherein the ^ applied with the watermark mark also includes the application-different watermark marks to a different part of the unencrypted content Φ. The system of item, in which the same watermark mark is applied to the unencrypted content as the watermark mark is applied. 4. If the first action of the patent application scope includes the application of a different part. 30 200533141. The system of the first item in the range of 1: 1 benefit 'wherein the L to which the watermark mark is applied contains at least one part of the watermark mark and at least two other actions of digitally signing the δΛ watermark mark. One action. 6_ As described in item i of the patent application scope, wherein the computer computing device uses at least one of a watermark tag plug-in and a watermark tag bridge to apply the watermark tag. 10 1510 15 20 7·如申請專利範圍第1項之系統,其中係利用不同於用以 加密該内容之該部分之密碼金鍮的一密碼金瑜來加密 該水印標記。 8.如申請專利範圍第1項之系統,其中該客戶機裝置為- 行動裝置。 9·如申請專利範圍第Μ之系統,其中該對話資訊另包含 下列項目中的至少-個:一客戶機裝置識別符、一終端 使用者識別符、與-終端使用者相襲的數位權利、一 終端使用者名稱' 1碼、—雜湊、—信用卡號以及一 網際網路協定(IP)位址。 如申請專利範圍第M之系統,其中判定該水印標記的 動作另包含根據另包含下列項目中之至少一個的額外 對話資訊來判定該水印標記··一内容所有者的一識別 符、-内容加密者的-識別符、—内容提供者的一識別 符、以及該内容的一識別符。 11_一種用以在一網路上傳播内容的系統,其包含: 經組構以進行下列動作的一内容伺服器: 31 200533141 接收來自計料置而針對制容的—請求, 接收與該請求相關聯的該對話資訊; 、 加密該内容的至少一部分’其中該内容的至少另一 4分維持為未加密的;以及 電腦計算裝置串流該内容的該等已加密與未加20 7. The system according to item 1 of the scope of patent application, wherein the watermark mark is encrypted using a password Jin Yu different from the password gold key used to encrypt the part of the content. 8. The system of claim 1, wherein the client device is a mobile device. 9. If the system under the scope of patent application M, the dialogue information further includes at least one of the following items: a client device identifier, an end user identifier, a digital right attacking the-end user, A terminal user name, '1 hash, —hash, —credit card number, and an Internet Protocol (IP) address. For example, in the system of applying for the scope of the patent, the action of determining the watermark mark further includes determining the watermark mark based on additional dialogue information including at least one of the following items: an identifier of a content owner,-content encryption -An identifier of the user, an identifier of the content provider, and an identifier of the content. 11_ A system for disseminating content on a network, comprising: a content server configured to perform the following actions: 31 200533141 Receive a request for capacity from a metering device—a request, and receive a request related to the request Encrypting at least a portion of the content; wherein at least another 4 points of the content remain unencrypted; and the computer computing device streams the encrypted and unencrypted content of the content 經組構以截取該經串流内容並且以進行下列動 水印標記部件: 接收該對話資訊; 10 至少部分地根據朗話資訊來判定—水印標記;以 及 、… 當另對該電腦計算裝置串流該内容的該#已加密與 未加密部分時,即時地套用該水印標記到該未加密 内谷的至少一部分中。 5 12·如申請專利範圍第11項之系統,其中該水印標記部件 為水印標記橋接器以及一水印標記外掛程式部件中 的至少一個。 3·如申凊專利範圍第u項之系統,其中與該請求相關聯 的忒電細汁算裝置另包括用以接收該串流内容的一項 0 無線通訊。 14· 一種用以在一網路上傳播内容的系統,其包含: 與收發器進行通訊的一處理器; 32 200533141 與该處理器進行通訊且用以儲存資料以及機器指令的 一記憶體,該等指令將使該處理例進行下列的多項運 作: — 接收一内容流,其中該内容流的至少一部分為已加 密的,且該内容流的至少另一部分為未加密的; 接收與該内容流相關聯的對話資訊; 至少部分地根據該對話資訊來判定一水印標記;以 10 15Is configured to intercept the streamed content and perform the following dynamic watermark marking components: receiving the dialogue information; 10 based at least in part on the spoken information-watermark marking; and, ... when streaming to the computer computing device When the # encrypted and unencrypted parts of the content, the watermark is applied to at least a part of the unencrypted inner valley in real time. 5 12. The system of claim 11 in which the watermark marking component is at least one of a watermark marking bridge and a watermark marking plug-in component. 3. A system as claimed in item u of the patent scope, wherein the electronic computing device associated with the request further includes a 0 wireless communication for receiving the streaming content. 14. A system for distributing content on a network, comprising: a processor in communication with a transceiver; 32 200533141 a memory in communication with the processor and used to store data and machine instructions, such as The instruction will cause the processing example to perform the following multiple operations:-receiving a content stream, wherein at least a portion of the content stream is encrypted and at least another portion of the content stream is unencrypted; receiving is associated with the content stream Dialogue information; determine a watermark based at least in part on the dialogue information; 20 柯々%吻啊紛工甲流該内容流時、「叮吧 印標記到該未加密内容流的至少一部分中。 15·如申請專利範圍第Η項之裝置,其中該裝置係經㈣ ,可作為—電料算裝置狀—水印標記橋接器以义 一水印標記部件中的至少一個來運作。 如申請專利範圍第14項之裝置,其中係利用一種目稽 選擇性加密鋪來選擇性地加密該内容流。 17·Γ請專利範圍第14項之裝置,其中套用該水印標記 動作另包含套用—不同水印標記到該未加密内容的 一不同部分中。 = ·圍第14項之裝置,其中套用該水印標記 h加密該水印標記之至少—部分以及數位地 水印標記之至少另—部分之二個動作中的至少 33 200533141 19.如申請專利範圍第14項之裝置,其中係利用不同於用 以加密該内容之該部分之密碼金鑰的一密碼金鑰來加 密該水印標記。 20· —種用以在一網路上傳播内容的系統,其包含: 5 接收與針對該内容之一請求相關聯的對話資訊; 加密該内容的至少一部分,其中該内容的至少另一部分 維持為未加密的; 至少部分地根據該對話資訊來判定一水印標記;以及 當對與該請求相關聯的一電腦計算裝置串流該已加密 10 與未加密内容時,即時地套用該水印標記到該未加密内 容的至少一部分中。 21.如申請專利範圍第20項之方法,其中該對話資訊另包 含下列項目中的至少一個:一客戶機裝置識別符、一終 端使用者識別符、與一終端使用者相關聯的數位權利、 15 —終端使用者名稱、一密碼、一雜湊、一信用卡號、一 網際網路協定(IP)位址、一内容所有者的一識別符、一 内容加密者的一識別符、一内容提供者的一識別符、以 及該内容的一識別符。 22_—種用以在一網路上傳播内容的調變資料信號,該調變 20 資料信號包含令一電腦計算裝置進行下列動作的指令: 從一客戶機裝置傳送針對該内容的一項請求; 從該客戶機裝置傳送與該請求相關聯的對話資訊; 34 200533141 在一水印標記部件上接收所串流的該内容,其中該内容 的至少一部分為已加密的,且該内容的至少另一部分為 未加密的; 至少部分地根據該對話資訊來令該水印標記部件能判 5 定一水印標記;以及 當另在該網路上對該客戶機裝置串流該内容時,令該水 印標記部件能即時地套用該水印標記到該未加密内容 的至少一部分中。 23. 如申請專利範圍第22項之調變資料信號,其中該水印 10 標記部件另包含一水印標記橋接器以及一水印標記外 掛程式部件中的至少一個。 24. —種用以在一網路上傳播内容的裝置,其包含: 用以接收針對該内容之一請求的一構件; 用以接收與針對該内容之該請求相關聯之對話資訊的 15 一構件; 用以接收該内容的一構件,其中該内容的至少一部分為 已加密的,且該内容的至少另一部分為未加密的; 用以至少部分地根據該對話資訊來判定一水印標記的 一構件;以及 20 當在該網路上串流該内容時,用以即時地套用該至少一 水印標記到該未加密内容之至少一部分中的一構件。 3520 When the content stream is in the stream, "Ding Bar Stamp is marked on at least a part of the unencrypted content stream. 15. If the device of the scope of the patent application is applied for, the device is a warp, It can be used as an electronic computing device like a watermark marking bridge to operate with at least one of the meaning of a watermark marking component. For example, the device in the scope of patent application No. 14 uses a visual inspection selective encryption to selectively Encrypt the content stream. 17. Please request the device of the scope of patent No. 14, wherein applying the watermark marking action also includes applying—different watermark marking to a different part of the unencrypted content. = · The device surrounding item 14, Among them, the watermark mark h is used to encrypt at least one part of the watermark mark and at least one other part of the digital watermark mark. At least 33 200533141 19. If the device of the scope of application for patent No. 14 is used, it is different from A cryptographic key that is used to encrypt a cryptographic key for that part of the content to encrypt the watermark. 20 · —A system for distributing content on a network It includes: 5 receiving dialog information associated with a request for one of the content; encrypting at least a portion of the content, wherein at least another portion of the content remains unencrypted; determining a watermark based at least in part on the dialog information And when the encrypted 10 and unencrypted content is streamed to a computer computing device associated with the request, the watermark is applied to at least a portion of the unencrypted content in real time. Method, wherein the dialog information further includes at least one of the following items: a client device identifier, an end user identifier, a digital right associated with an end user, 15-end user name, a A password, a hash, a credit card number, an Internet Protocol (IP) address, an identifier of a content owner, an identifier of a content encryptor, an identifier of a content provider, and the content 22_—A modulation data signal used to propagate content on a network, the modulation 20 data signal contains a command A computer computing device instructs the following actions: to transmit a request for the content from a client device; to transmit dialog information associated with the request from the client device; 34 200533141 to receive a string on a watermark marking component The content of the stream, wherein at least a portion of the content is encrypted and at least another portion of the content is unencrypted; enabling the watermark marking component to determine a watermark mark based at least in part on the conversation information; and When the content is streamed to the client device on the network, the watermark marking component can apply the watermark to at least a part of the unencrypted content in real time. Variable data signal, wherein the watermark 10 mark component further includes at least one of a watermark mark bridge and a watermark mark plug-in component. 24. A device for distributing content on a network, comprising: a component for receiving a request for the content; 15 components for receiving dialogue information associated with the request for the content A component to receive the content, wherein at least a portion of the content is encrypted and at least another portion of the content is unencrypted; a component to determine a watermark mark based at least in part on the dialog information ; And 20 when the content is streamed on the network, a component for instantly applying the at least one watermark to at least a portion of the unencrypted content. 35
TW94100475A 2004-01-09 2005-01-07 Method and system for session based watermarking of encrypted content TWI268080B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US53535704P 2004-01-09 2004-01-09

Publications (2)

Publication Number Publication Date
TW200533141A true TW200533141A (en) 2005-10-01
TWI268080B TWI268080B (en) 2006-12-01

Family

ID=38220540

Family Applications (1)

Application Number Title Priority Date Filing Date
TW94100475A TWI268080B (en) 2004-01-09 2005-01-07 Method and system for session based watermarking of encrypted content

Country Status (1)

Country Link
TW (1) TWI268080B (en)

Also Published As

Publication number Publication date
TWI268080B (en) 2006-12-01

Similar Documents

Publication Publication Date Title
US10644884B2 (en) System and methods for permitting open access to data objects and for securing data within the data objects
US20050193205A1 (en) Method and system for session based watermarking of encrypted content
JP4500677B2 (en) How to distribute digital content
US20040199771A1 (en) Method for tracing a security breach in highly distributed content
US7249264B2 (en) Secure IP based streaming in a format independent manner
CN100442835C (en) Digital copyright and digital watermark protecting method for video program
US20100100742A1 (en) Transport Stream Watermarking
CN101022550A (en) Flow media digital watermark information embedding method
WO2021072878A1 (en) Audio/video data encryption and decryption method and apparatus employing rtmp, and readable storage medium
JP2009516457A (en) Perceptual masking for secure watermark embedding
US20090228709A1 (en) Systems and methods for using transport stream splicing for programming information security
US20110280398A1 (en) Secured content distribution system
US7415440B1 (en) Method and system to provide secure key selection using a secure device in a watercrypting environment
TW200533141A (en) Method and system for session based watermarking of encrypted content
KR100635128B1 (en) Apparatus for generating encrypted motion-picture file with iso base media format and apparatus for reconstructing encrypted motion-picture, and method for reconstructing the same
CN115225977B (en) Video sparse asymmetric encryption method
WO2011013196A1 (en) Information processing device
Huang et al. MPEG IPMP concepts and implementation
JP2008048163A (en) Method for receiving content
WO2022140111A1 (en) Live video streaming architecture with real-time frame and subframe level live watermarking
WO2024087208A1 (en) Video playback method and system, and storage medium
CN115622706A (en) Digital watermark adding and extracting method based on FLV video packaging format
WO2003024020A1 (en) Method and computer system to perform on the fly fingerprinting for media content
JP2006129535A (en) Scramble broadcasting system of stream media data
KR20070052120A (en) Broadcasting content protection system and method

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees