TW201117023A - Method and system for compiling a unique sample code for a digital sample - Google Patents

Method and system for compiling a unique sample code for a digital sample Download PDF

Info

Publication number
TW201117023A
TW201117023A TW099121009A TW99121009A TW201117023A TW 201117023 A TW201117023 A TW 201117023A TW 099121009 A TW099121009 A TW 099121009A TW 99121009 A TW99121009 A TW 99121009A TW 201117023 A TW201117023 A TW 201117023A
Authority
TW
Taiwan
Prior art keywords
code
sample
digital
sampling
user
Prior art date
Application number
TW099121009A
Other languages
Chinese (zh)
Inventor
Megchelen Oedses Klaas Van
Original Assignee
Greenflower Intercode Holding B V
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from NL2003447A external-priority patent/NL2003447C2/en
Application filed by Greenflower Intercode Holding B V filed Critical Greenflower Intercode Holding B V
Publication of TW201117023A publication Critical patent/TW201117023A/en

Links

Landscapes

  • Information Transfer Between Computers (AREA)
  • Devices For Executing Special Programs (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)

Abstract

Methods for providing a digital sample with a unique sample code. Method for gaining access to a digital sample provided with a unique sample code. Computer-readable media with computer-executable instructions and compiled sample codes for accessing digital samples, including physical embodiment of codes such as bar codes or other visually perceptible, radio frequency identification (RFID) codes. Databases comprising one or multiple of such sample codes. Systems for compiling a unique sample code and systems for handling a user's request for gaining access to a digital sample provided with a sample code. User devices with resources to use sample codes and obtain access to corresponding digital samples.

Description

201117023 六、發明說明: 【發明所屬之技術領域】 本發明係有關於一種用於編譯數位取樣之全球性特有 樣I的方法。本發明亦係有關於—種用於提供具有此種 特有取樣碼的數位取_搞& 士 取樣的方法。本發明更係有關於一種用 於獲得對設有此種特有取樣碼之數位取樣之存取的方法。 本發明更有關於一種具有電腦可執行指令之電腦可讀取媒 體田被載入一電腦系統時提供該電腦系統任一前述方法 之力月b I發明又有關於—種由上述方法編譯而成的取樣 碼。本發明更係有關於—種包含—或多個此種取樣碼的資 料庫。本發明亦係有關於一種使用上述方法編譚特有取樣 碼的系統。本發明亦有關於一種用於處理使用者用以獲得 對數位取樣存取之求的方法,該數位取樣設有依據本發 明之取樣碼。 【先前技術】 產品、通信和技術在全世界的散佈和連結通常簡略地 以1全球化(globalizaticm),稱之。此種散佈涵蓋經濟和文化活 動的交流。全球化在遍及全世界的經濟和文化生活層面連 結已然成長數個世紀。然而,許多人相信目前的情勢與已 往在程度上有基本的不同。通信及交流之速度、涵蓋網路 之複雜及幅度、以及商業、交易、互動和風險上的巨額數 量使我們賦予•全球化,一個具有罕見特殊力量的標籤。曾有 人將全球化形容為世界性社交關係的增強,其連结遙遠相 隔的區域使得區域性的事物被發生於千里外的事件景彡塑 201117023 且是彼此互相影響《此涉及吾人對於地理及區域性在體認 方式上的改變。其一方面提供機會,一方面亦在諸如行銷、 技術變化、氣候變化和企業管控上伴隨相當程度的風險。 因此,全球化在經濟、政治、文化和社會上均具有強 大的影響。生活科學、數位技術及相關方面的發展已然在 產OP和父易上開啟巨大的新願景。諸如網際網路 的創新使其可能接觸遍及全世界的資訊及資源,並即時在 仃動上予以配合。然而,全球化的一個重大陰暗面在於製 造出一個散亂的市場,其中有關產品行銷及需求和供應鏈/ 使用點對點(P2P)技術導致失控的非法複製品數目大量增加 的網路活動變得愈來愈難以管控。有異於商業上的剽竊, 終端使用者的盜版行為之管控更加困難。此等p2p技術的 附加缺點之一係網際網路流量的巨幅增加。據推測指出, 網際網路流量將顯著擴大,導致f料流量及儲存上的壓力 並造成全球網際網路上的頻寬要求日益增長。此外,此網 際網路流量及料量的增加,無論其内容為何,均將需要 、力胍i曰進的硬體、軟體及資料設備。目前網際網路的電能 消耗已然龐大’且預期在未來數年内仍會持續大幅增加。 【發明内容】 本發明-實施例的目的之一在於辅助追縱及追湖合法 的數位產。口°,以針對智慧財產權的侵犯行為保護產品供需 鏈所涵蓋的擁有者及其他參與者,並針料用數位產品的 乍取政佈行為保護擁有者和消費者雙方。 本發明此一實施例或s ^ 0 J次另一實施例之另一目的係在一定 201117023 的程度上減少網際網路流量及儲存負載,此從金融和環境 的觀點上均係視為有助益性的。 本發明之一實施例你斜m ^ ^ 身j乐針對一種用於編譯數位取樣之特 有取樣碼的方法,立句今.Δ、a β ”匕3 . Α)定義至少一取樣碼模板,1 包含多個待使用以針對-數位取樣建立一取樣碼的取樣碼 …该等取樣碼區段至少包含:一取樣擁有者識別碼區 段和一取樣識別碼區段;叫體指定待使用以建立該取樣 碼之取樣碼區段之内容,其令 具體指定為該數位取樣之j =擁有者識別碼區段被 m(擁有者之一網際網路位址,特 定::二位址或一網域名稱(的一部分);c)串連已具體指 ==區段以形成該取樣碼;D)定義-通往-數位位 物取樣二’可以經由其獲得對該數位取樣之存取’·及 ,取:二數位路徑彼此互異,則在步驟〇產生的 該取樣碼和步驟D)定義的數位路徑之間建立一交互參昭 = 實施例係有關於用以識別及存取一特有數:項 契為一數位取樣。數位取樣可包含諸如書籍、 帝引檔:、、:檔案、網頁、網路内容、網際網路 ,、檔案或任何其他數位項目等項目。 依據本發明實施例 轉係利用 此,太續明金- 有取樣碼加以識別及存取。因 舉。實施例中所述的代碼及其使用方式, 舉例而言’在需要正確識別此—數位 '使用方式 或其他數位取樣)時可以有所幫助。=如文件或槽案 溯及確認數位取樣的真實性,以限制==於追 之存取、掘·欲—八對該數位取樣 佈该數位取樣至選定的接收者、販售或交易該 6 201117023 數位取樣或以其他方式輔助該數位取樣之散佈或存取。 例如:可以賦予—音樂檔案一特有取樣碼。依據該取 樣碼,提供使用者對該音樂檔案的存取,且依據該取樣碼 識别肩曰条檔案。此外,該取樣碼可以被嵌入該音樂檔案 之中以辅助該音樂檔案之追蹤及追溯。 本發月斗夕貫施例係有關於各種用於編譯數位取樣之 特有取樣碼的方法。取樣碼可由多個元素或區段之組合編 定而成。該代碼係依據丨)該數位取樣之擁有者之識別和ii) 該數位取樣之識別的組合編譯而成。其可以使用其他更多 額外項目以產生該代碼,諸如a)該數位取樣之中介經銷者 之識別、b)錯誤檢查碼、e)路徑或位址、d)各種形式的證釋 資料(metadata)、以及e)其他資訊。其可以使用-模板以定 義用以建立取樣碼之此等區段。因此,依據一實施例,可 以經由將用以建立取樣碼的多個代碼區段串連在一起以建 立該代碼,而該等區段之組合可以依據—模板加以定義。 依據本發明的許多實施例,其可以基於不同目的定義包含 不同兀素或不同類型元素的不同模板。利用各個模板編譯 的取樣碼從而可以用來識別或存取數位取樣,或執行有關 數位取樣的其他動作。 其可以形成-通往-數位取樣位置之路徑且可以在產 生的代碼和數位取樣之間建立—交互參照。以此種方式, 實施例’該代碼可被用以識別數位取樣及找出數位 =的位置。此外’該取樣碼可以被嵌入數位取樣之中以 輔助该取樣的追蹤及追溯。 201117023 本發明的許多實施例涵蓋許多主題,特別s . 法 ••用於提Μ有特有取樣碼之數位取樣的 用於獲仔對設有特有取樣碼之數位取樣之存取的力 、有電料執行指令之電料㈣㈣, 一電腦系統時提供該電腦系統任-前述方法之功能載 的實體實施^月1所述任方法編譯之取樣碼,包含代碼 的實體實施例,諸如條碼或其 (RFID)碼、及其他代碼,,人中 觉了察覺的射頻辨識 • 、 ·、·匕3队入文件或物件中的此等代碼。 •匕3 —或多個此種取樣碼的資料庫。 •使用本說明書所述任一方法編譯特有取樣碼的系统。 •用:處理使用者用以獲得對設有取樣碼之數位取樣 存取之請求的方法。 八有資源以使用取樣碼及獲得對應數位取 的使用者裝置。 子取 藉由對每一全球性的特有數位取樣標貼上-個做為全 球性特有辨識記號之全球性特有產品取樣碼(如同該取樣的 DNA結構或指紋)’則可追蹤-特定數位取樣並容易且明確 與其他數位取樣有所區分,因此無論其内容為何,均可以 在遍及世界的任-角落識別出每-數位取樣。其藉由加入 數位取樣(目剛或先前)擁有者的可辨認的(可識別的)Ip 位址及/或網域名稱而促成此全球性特有識別機制。此外, 由於數位取樣碼係關聯一條通往儲存該數位取樣,以及與 该數位取樣有關的進一步資訊(詮釋資料),而可被追蹤/找 8 201117023 出之一數位位置,故其可以很容易地確認該數位取樣是否 曾被修改或者是否可靠。此將對該數位取樣可信性之評估 大有助益而因此有助於該數位取樣的追蹤和追溯〇 —般而 言,一旦被儲存於上述的數位位置之後,數位取樣即不再 移動。若數位取樣仍會被移至另一數位或實體位置,則取 樣碼和數位路徑間的交互參照將隨之更新’使得取樣碼將 一直保持在最新狀態並能一直被用以對數位取樣進行存 取。因此,由於通往儲存數位取樣的數位位置的數位路徑 改變所造成的失效連結可以用此種方式加以排除。 一數位取樣,亦被視為單一個別數位實體,因此被定 義為具有一特有識別身分且在其指定規範的範疇内可以與 所有其他數位取樣有所區分(可個別化)而因此可明確地加 以追縱及追溯者。做為個別實體的數位取樣因此不同於數 :產°°系歹卜數位產品目錄、或數位產品種類。在本專利 :曰内文中&位取樣’·一詞的特性及涵義應予以廣義地 解S貝’其可包含一數 擋案 數位本文說明、一數位影 =務:?重數位取樣之數位集合、—數位交易、或一數位 作者”擁有者詞(尤其)涵蓋原創者、發行者、經銷者、 以由取:=:戶者’只要數位取樣的實際或先前擁有權可 田取樣碼本身所用的及可見於盆 /或網域名稱推斷而得。"數位位置"的1p位址及 瑪發行方之擁有者的—電腦置厂何q位於做為代 位於-使用網際網路運算之…然其亦可以是 、咖ng)基礎架射 Υ 7料算㈦_ 個㈣位置,藉以將共用資源、 201117023 軟體及資訊提供予電腦及其他隨選裝置,諸如一公用事業 設施。該等取樣碼可以是儲存於—雲端運算系統之中,而 數位取樣儲存於-與該雲端運算系統分隔的位置其將減 少該雲端系統内的流量負載並在安全性上有所助益。 母一獨特數位檔案被標記以一全球性特有取樣碼。此 取樣碼可代表數位取樣之—㈣名稱及/或被欲人數位取樣 中。依此觀點而t,數位取樣的分享可卩卩純地藉由分享 該取樣碼而達成,其將提供一個通往儲存數位取樣之位置 的導引。由於僅分享取樣碼(大約丨千位元組(ki]〇byte),舉 例而言)即足以應付數位取樣(通常遠超過丨千位元組)的授 權共用,故就此而言將不再需要進行數位取樣的交換,此 可以有助於促使網際網路流量及(多重)資料儲存的降低,就 金融、安全性和環保的觀點而言是極其有利的。 取樣碼區段被選擇性地排序以建立一條識別路徑直接 或間接參照到一個可以找到數位取樣的數位位置,特別是 一網路位置。該數位路徑通常代表一全球資源定位器 (URL),其可以(自動地)由一網頁瀏覽器(web卜⑽如)加入 一前置碼,諸如 http、https、ftp、ftps、mailto、file 等。 在本發明之一實施例中’至少部份之數位路徑係與取樣碼 相同,表示該取樣碼係併入該數位路徑之中。若取樣碼與 數位路徑係大致相同的,則上述步驟E)之建立交互參照可 予以省略。就此點而言,上述的"大致相同',一詞係用以表示 取樣碼與數位路徑之間可以有實際上無關緊要的微小差異 存在。例如’雖然數位路徑通常具有一前置碼,諸如 201117023 "http://”,但此一前 w 碼了不出現於可看見的取樣碼令。缺 而,由於網頁瀏覽器會自 Τ… 义 動在/又有此荨刖置碼的網路位址 别碼,故就此點而言取樣碼可以輕易地被使用 做為網路位址(數位路徑),诵彳$& 預疋之數位取樣所儲存的網 路位置(數位位置)。 在本^明一實施例中,前述之方法包含步驟F),其包 含將取樣碼、數位路捏、 以及该取樣碼和該數位路徑之間 的交互參照儲存於一杳4±由 £ , 存育科庫之中。儲存交互參照做為取樣 碼及數位路徑間的—個連姑 硬、、、。將有助於把取樣碼轉譯成可 找到數位取樣的數位路徑。 此外在為了防止取樣碼與儲 子文位取樣而可以追縱和找到該數位取樣的實際位置的連 結脫離(連結失效)而改變數位路徑的情形下,儲存該等資料 將可輔助交互參照的更新。 方法選擇生地包含步驟G),其包含將步驟⑺產生的 取㈣轉換成-機器可讀取格式。若取樣碼被列印或顯示 於-螢幕上,.則可以藉由例如使用_光學掃描器讀取取樣 碼。藉由應用光學字亓M, 子兀辨的,所拎描的取樣碼將被轉換成 一組等同於取樣碼取樣字串的字元,其可以隨後自動地或 手動地被輸入一網頁劉覽器。該機器可讀取取樣碼亦可以 被表不成數位或實體式的加密圖像(咖挪d丨⑽。⑷ 格式,諸如- 2D/3D條碼及/或一 RFID標籤。其應注意此 4圖像表示方式看起來類似傳統的圖像表示方式,雖然取 樣碼圖像表示方式的内容、意義、和使用與習知的取樣序 列及/或分類代碼的傳統圖像表示方式係完全不同。 11 201117023 此方法亦可進一步包含步驟H),其包含將取樣碼之至 少取樣識別碼區段轉譯成另一種語言及相配的字元。由於 取樣識別碼區段經常包含有關聯結至該取樣碼的數位取樣 的《•全釋資料,違5全釋資料提供關於該數位取樣重要的可辨 認育訊,故以發出該數位取樣碼的位置/國家的語言提供及 顯示此等詮釋資料對使用者而言將更易於使用。併入^列 舉於上述之至少一取樣識別碼區段的可能詮釋資料之一實 例係有關該數位取樣的作者'標題、主體'關鍵字、大小、 版本、建立日期、註解、及/或狀態等資訊。 包含於擁有者識別碼區段中的擁有者Ip位址及/或網 域名稱在步驟H)中通常未加以轉譯而維持原貌。 在本發明一實施例中,定義於步驟A)的取樣碼區段更 包含-使用者相關代碼區段’其可以是靜態或動態的形式 (取決於在時間歷矛呈中改變的-或多個參數)。雖然每一取樣 碼無卿使用者相關代碼區段存在與否,其作用已然3 -全球性特有個人代碼,但納入一使用者相關代碼區:: 優點之-在於儲存於數位位置處的内容對使用者而言可以 更加個人化。只要取得同意,諸如用戶編號、代號及/或個 人許可權限(例如:讀取/寫入許可權限)等客戶端之個人資 訊均可以顯不為數位位置處之内容及/或以言全釋資料的形 式併入使用者相關代碼區段中。此使用者資訊可以是靜態 的,從而產生一靜態的使用者相關代碼區段。其亦可以二 像’使用者相關區段包含使用者相關資訊(證釋資料),幻1' 時間改變’諸如使用者的年齡或使用者信用狀況。= 12 201117023 出之後,取樣碼將不會改變,但發屮夕% m 〜出之取樣碼可以是取決 於可在取樣瑪發出時刻套用之參數。實務上,此通常需要 在諸如名稱、位址等重要使用者資料登錄之後進行產品取 樣碼之最後編譯。其應可以理解’使用者相關代碼區:包 含一使用者識別碼區段。以此方式,諸如使用者名稱之識 別機制可以清楚地得自代碼區段所表示的詮釋資料。 其進-步可以想像,取樣碼字串包含有關中介者識別 身分的至少一中介者識別碼區段,例如,用以製造供應、 支援、散佈、販售、及/或推銷該產品取樣之中介者。中介 者識別碼區段,選擇性地基於該中介者之網域名稱或ιρ位 址,可以包含該中介者之識別身分,但同時亦可以包含該 中者相關的其他詮釋資料,諸如公開以經由其存取數位 取樣之一平台或服務。實例之一係有關於透過一諸如Apple 公司iTunes之音樂發行服務之音樂檔案散佈,其中音樂檔 案可以來自於EMI Music Publishing公司。一關聯一特定數 位取樣之取樣碼可以表示如下·· www.emi.com/itunes c〇m/beatles yesterday i2345",其中 WWW.emi.com”代表擁有者識別碼區段,”iTunesc〇m ”代表 中’丨者識別區丰又’而”beaties_yesterday_ 12345''代表數位取 樣識別區段’包含有關表演者、標題、以及該數位取樣一 特有識別編號之给釋資料。取樣碼亦可以表示成通往一儲 存邊特定音樂檔案之網路連結,或者取樣碼亦可以是對通 往遠特定音樂檔案之另一網路連結之交互參照。在步驟A) 定義至少一標點符號以分隔步驟C)之相鄰代碼區段可以是 13 201117023 有所助益的。許多標點符號可資使用,但因為取樣媽通常 係做為URL,故通常可以使用一斜線(,/,)符號以分隔相鄰之 代碼區段。在一正確的URL語法中,一斜線符號通常亦被 置於最末一個代碼區段之後。除了此等分隔字元之外,諸 如波浪號(·〜,)、句點(,.,)、底線(,_,)、和減號(·_,)等排版符號 亦可使用於代碼區段本身及/或代碼區段之間。 在本發明一實施例中,取樣碼字串包含至少一檢核代 碼區段,代表至少一其他取樣碼區段之一特定數學處理之 結果。用以計算檢核代碼區段數值的演算法將在取樣碼編 澤期間疋義取樣碼結構時予以定義。舉例而言,該演算、去 可使用或類似於眾所皆知的分類代碼系統ISBN(國際標準 圖書編號)代碼檢核。用以產生一 ISBN檢核字元的演算法 運作如下。為產生ISBN檢核字元,每一 ISBN數字均乘以 一特定相關權重因子並將乘積結果加總在一起。前九個數 字的權重因子由10開始而構成遞減序列1 〇、9、8、 、0 因此對於0 9 4 0 0丨6 3 3這九個數字,乘積加總等於 0 + 81+3 2+0 + 0 + 5 + 24 + 9 + 6=157。此總和除以數目 u。(157/u =14餘數為3)。若有餘數,則從n減去該餘數而得到檢核 數字。(11-3 = 8)。若檢核數字等於10,則表示以羅馬數字X。 故此例中的最終ISBN等於0 — 940016-33-8。藉由產生檢核 數子並將其與接收到的檢核數字做比較以核對ISBN的有效 性。如前所述,取樣碼中可以加入類似或相當的檢核。 在本發明另-實施例中,定義於步驟A)的取樣碼區段 更包含一取樣碼安全性識別碼區段。此代碼區段之運用將 14 201117023 對抗意圖不良的參與者濫用取樣碼’因為此安全性識別碼 區段將被做為檢核以決定取樣碼的可信性。舉例而言,在 將取樣碼輸人網頁劉覽器之後,可以執行取樣碼安:性識 別碼區段之有效性檢查。此安全性相關代碼區段可以是與 時間相_的("動態"),意、味該代碼區段僅在一段有限的時間 内有效。若安全性檢查顯示取樣碼不再有效或合法則對 於數位取樣之存取將均以拒絕。該安全識別碼區段因此係 做為一用以獲取數位取樣檔案存取權之互動金鑰。 在步驟A)中不僅可定義用以建立一代碼的代碼區段之 數目和種類,,亦可定義待串連的已定義代碼區段之順序。 此允許一完整取樣碼模板(代碼格式)之產生,其中代碼區段 被以一特定順序進行排序配置。在步驟A)決定代碼區段之 順序可k南數位取樣之取樣碼及相關儲存位置之處理性。 在本發明一實施例中,步驟A)可以一再重複執行以產 生多重取樣碼模板,其中該方法更進—步包含步驟丨),其 包含在執行步驟Β)之前選擇一待套用之代碼模板。產生多 重模板可以允許進一步區分提供給使用者的取樣碼。舉例 而言’一參與者可以直接提供數位取樣予客戶以及透過一 中介者間接提供予客戶。如此的做法可以使用不同的取樣 碼模板’其中的直接客戶可以接收—諸如”www . . c〇m/sampie一id_1234”的代碼,其不使用中介者,而間接客 戶可以接收一諸如,,www . owner . c〇m/intermediary . com/sample一id_5678"的代碼,其使用—中介者。 前述方法可利用一軟體模紙執行,該軟體模組具有一 15 夠產生一全球性特有取樣碼。 有關於一種用於提供具有特有取 包含:J)建立—數位取樣' κ)依據 之一特有取樣碼、L)以至少一已編 樣、Μ)儲存該數位取樣於一數位 及〇)若取樣碼和參照到該數位位 則在該數位路徑和該取樣碼之間 取樣係下載自一安全環境,諸如 路伺服器,則依據步驟L)以數位 该數位取樣之追蹤及追溯。在數 例如,若數位取樣係一音樂檔案 用者可能無法下載該特定取樣, 散佈營控較佳。一數位取樣可以 。該多重特有取樣碼可以是嵌入 的使用者查覺。舉例而言,若數 用者的多媒體檔案,且每一使用 樣碼以存取該數位取樣,則將多 中可以是有助益性的。 ,該方法可以包含步驟Ρ),其包 者,例如該數位取樣的創建者。 該取樣碼的電子郵件給該使用者 郵件的本文中可以是顯示為純文 或者’取樣碼可以是附加至該電 。由於取樣碼通常係表示成包含 201117023 使用者介面以讓使用者能 本發明一實施例亦係 樣碼之數位取樣的方法, 前述方法編譯該數位取樣 譯之取樣碼標記該數位取 位置' N)儲存該取樣碼、 置之URL係彼此互異的, 建立一交互參照。若數位 由擁有者擁有或管理的網 取樣碼標記取樣可以輔助 位取樣内容串流之情況, 或一視訊檔案之時,則使 其可以促使該數位取樣之 被標貼以多重特有取樣碼 數位取樣之中而不被一般 位取樣係一散佈給多重使 者均具有其本身的特有取 重取樣碼嵌入數位取樣之 在本發明一實施例中 含提供該取樣碼予一使用 此可以是藉由傳送一包含 而達成。取樣碼在該電子 字’其包含一超連結。另 子郵件之一獨立附加檔案 16 201117023 有限數目文數字符號和標點符號的字串,故取樣碼基本上 不會超過1千位7C組。因為只有取樣碼而非數位取樣被散 佈,故網際網路流量及儲在自 里及儲存負载可以巨幅地降低。藉由儲 存取樣碼而非取樣檔案於一雲端運算系統之中,可以在雲 端運算環境中提供❹者安全的資訊交換。 β 取樣碼可以代表數位取樣的至少一部份棺案名稱。缺 其亦可以想像且料傾向於絲樣碼㈣料料的形式喪 入數位取樣之中’形成該數位取樣的—個標牌、標記、或 標籤,此有助於該數位取樣之追蹤及追溯。欲入的取樣碼 可以是對-般性使用者維持可看見或不可看見(位於取樣内 部之代碼)。本發明一實施例包含一數位取樣,其具有一依 據本說明書所述任一實施例之取樣碼。 本心明實施例係進一步有關於一種用於獲得對設有 -依據前述方法定義的特有取樣碼之數位取樣之存取的方 法其包3 . Q)提供該取樣碼予一使用者、R)允許該使用 者將該取樣碼輪人—網頁«器、及S)將該使用者重新導 向至該數位取樣所儲存之數位位置。當該使用者被重新導 向該數位位置時即可獲得對該數位權案之存取。重新導向 可被視為參照。舉例而·r,該重新導向可以是直接或間接 式的直接重新導向可以是將該取樣碼以一網路位址之形 式輸入一網頁瀏覽器的位址欄,其中數位取樣係儲存於該 網路位址。相對而纟’間接重新導向可以是將該取樣碼輸 入網頁瀏覽器且利用一交互參照資料庫或對照表將該取樣 碼轉譯成一諸如URL的數位路徑,而後使用者將被導引至 17 201117023 數位取樣所儲存的數位路徑。步驟8)中,於步驟r)輸入的 取樣碼可以與-儲存於資料庫中的對應取樣碼進行比較, 其中該使用者透過該儲存取樣碼之一交互參照被重新導向 至-儲存於資料庫中的數位路徑。間接重新導向之實施可 以是藉由利用一編程腳本自動比較輸入之取樣碼與資料庫 中的取樣碼,並將使用者導向儲存數位取樣的數位位置。 本發明-實施例更有關於一種具有電腦可執行指令之 電腦可讀取㈣,當被載人-電腦系統時提供該電腦系統 用以編擇取樣碼的方法及/或如前所述提供取樣碼予數位取 樣的方法之功能。電腦可讀取媒體之實例包括應隨身 碟内接及外接式硬碟機、磁碟、CD-ROM、DVD-ROM、 及其他類似裝置。 士本發明之一實施例係進一步有關於一種由上述方法編 澤而成的取樣碼。使用一全球性特有取樣碼做為一"指紋" 的優點已然說明於前。 本發明一實施例亦係有關於一種資料庫,包含介於一 康本發月貫施例之取樣碼以及一通往一數位位置的數 路仫之間之至少一交互參照,該數位位置儲存關聯該取 樣碼之一數位取樣。使用此一交互參照表使得取樣碼可以 被轉換成一數位路徑’該數位路徑通往可以見得該數位取 樣之一數位位置。 ^本發明一實施例係進一步有關於一種使用上述方法編 王球丨生特有取樣碼的系統,其包含:至少一取樣碼模 考反生,田 ° 以疋義至少一取樣碼模板,該取樣碼模板包 18 201117023 :多個待使用以針對一數位取樣建立一取樣瑪的取樣碼區 /等取樣碼區段至少包含_取樣擁有者識別碼區段和 樣識別碼區段、至少—取樣碼區段指定模組,連接至 該模板產生3|以呈辦# 座生益以具體指定藉由該取樣碼模板產生器定義之201117023 VI. Description of the Invention: TECHNICAL FIELD OF THE INVENTION The present invention relates to a method for compiling a globally specific I of digital samples. The present invention is also directed to a method for providing digital bit-and-sampling samples having such unique sampling codes. More particularly, the present invention relates to a method for obtaining access to digital samples having such unique sampling codes. More particularly, the present invention relates to a computer readable media field having computer executable instructions that is loaded into a computer system and provides any of the foregoing methods of the computer system. Sample code. The invention further relates to a database comprising - or a plurality of such sampling codes. The present invention is also directed to a system for compiling a unique sampling code using the above method. The present invention also relates to a method for processing a user's request for obtaining a digital sample access having a sample code in accordance with the present invention. [Prior Art] The distribution and linking of products, communications, and technologies around the world is usually referred to as global globalization. Such dissemination covers the exchange of economic and cultural activities. Globalization has grown for centuries in economic and cultural life throughout the world. However, many believe that the current situation is fundamentally different from the extent of the past. The speed of communication and communication, the complexity and magnitude of the network, and the sheer volume of business, transactions, interactions and risks give us globalization, a label with a rare special power. Some people have described globalization as an increase in the social relationship of the world. The connection between the distant areas makes the regional events happen in a thousand miles away from the event 2011-0123 and affect each other. "This involves our geography and region. Sexual change in the way of understanding. On the one hand, it provides opportunities, and on the one hand, it is accompanied by considerable risks such as marketing, technological change, climate change and corporate governance. Therefore, globalization has a strong economic, political, cultural and social impact. The development of life sciences, digital technologies and related aspects has opened up a huge new vision for OP and Father. Innovations such as the Internet have made it possible to reach out to information and resources around the world and to work with it on the fly. However, a major dark side of globalization is the creation of a fragmented market in which online activities related to product marketing and demand and supply chain/peer-to-peer (P2P) technology have led to a significant increase in the number of uncontrolled illegal copies. The more difficult it is to control. Different from commercial plagiarism, it is more difficult to control the piracy of end users. One of the additional shortcomings of these p2p technologies is the dramatic increase in Internet traffic. It is speculated that Internet traffic will increase significantly, resulting in f-flow and storage pressures and increasing bandwidth requirements on the global Internet. In addition, this increase in Internet traffic and throughput, regardless of its content, will require hardware, software and data devices. At present, the power consumption of the Internet is already huge, and it is expected to continue to increase substantially in the next few years. SUMMARY OF THE INVENTION One of the objects of the present invention-embodiment is to assist in the pursuit of digital production of the lawful and chasing lake. The owner and other participants covered by the supply chain of the product are protected by violations of intellectual property rights, and both the owner and the consumer are protected by the political actions of digital products. Another object of this embodiment of the present invention or another embodiment of s ^ 0 J times is to reduce internet traffic and storage load to a certain degree of 201117023, which is regarded as helpful from a financial and environmental point of view. Profitable. In an embodiment of the present invention, you are inclined to m ^ ^ body j music for a method for compiling a unique sampling code for digital sampling, and the current sentence Δ, a β 匕 . 3 . Α) defines at least one sampling code template, 1 Included are a plurality of sample codes to be used to establish a sample code for the -bit samples. The sample code segments include at least: a sample owner identification code segment and a sample identification code segment; the body designation is to be used to establish The content of the sample code segment of the sample code, which is specifically designated as the digital sample of the j = owner identification code segment is m (one of the owner's Internet address, specific: two address or one network Domain name (part of); c) concatenation has specifically referred to == section to form the sample code; D) definition - to - digit bit sample 2 'by which access to the digital sample can be obtained' And, take: the two digit paths are different from each other, and an interaction parameter is established between the sampling code generated in step 和 and the digital path defined in step D). The embodiment is related to identifying and accessing a unique number. : The item is a digital sample. The digital sample can contain, for example, books. Emperor's reference::,: file, webpage, web content, internet, file or any other digital project, etc. According to the embodiment of the present invention, the transfer system uses this, too continuous gold - with sampling code to identify and Access. The code described in the embodiment and its use, for example, can be helpful when it is necessary to correctly identify this-digit use or other digital samples. And confirming the authenticity of the digital sample to limit == access to the chase, digging, and arranging - eight to sample the digits to sample the selected recipient, sell or trade the 6 201117023 digital sampling or otherwise Assisting the distribution or access of the digital sample. For example, the music file can be given a unique sampling code. According to the sampling code, the user is provided with access to the music file, and the shoulder file is identified according to the sampling code. The sample code can be embedded in the music file to assist in tracking and tracing the music file. The monthly application is related to various kinds of samples for compiling digital samples. A method of sampling a code. The sample code can be compiled from a combination of elements or segments. The code is compiled from a combination of the identification of the owner of the digital sample and the identification of the digital sample. Other additional items may be used to generate the code, such as a) identification of the intermediary distributor of the digital sample, b) error check code, e) path or address, d) various forms of metadata, And e) other information. It may use a template to define such segments for establishing a sample code. Thus, according to an embodiment, a plurality of code segments for establishing a sample code may be connected in series by The code is established and the combinations of the sections can be defined in terms of a template. According to many embodiments of the invention, different templates containing different elements or different types of elements can be defined for different purposes. Sample codes compiled with individual templates can be used to identify or access digital samples or perform other actions related to digital sampling. It can form a path to the -to-sampling location and can establish an inter-reference between the generated code and the digital samples. In this manner, the embodiment' code can be used to identify digital samples and find locations for digits =. In addition, the sample code can be embedded in the digital samples to aid in tracking and tracing of the samples. 201117023 Many embodiments of the present invention cover a number of topics, in particular s. • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • The material of the execution instruction (4) (4), the computer system provides a computer system, and the entity carrying the function of the foregoing method implements the sampling code compiled by the method described in the first month, and includes an entity embodiment of the code, such as a barcode or RFID) code, and other codes, people are aware of the radio frequency identification that is detected by the team, and the code in the file or object. • 匕 3 — or a database of multiple such samples. • Compile a system with a unique sample code using any of the methods described in this manual. • Use: A method used by a user to obtain a request for a sample access with a sample code. Eight resources are available to use the sampling code and to obtain the corresponding user device. The sub-sample is labeled as a global unique product sample code (like the sampled DNA structure or fingerprint) for each global unique digital sample tag's traceable-specific digital sampling It is easy and clear to distinguish it from other digital samples, so regardless of its content, every-digit sampling can be identified in any corner of the world. It facilitates this globally unique identification mechanism by adding an identifiable (identifiable) Ip address and/or domain name of the digitally sampled (either just or previously) owner. In addition, since the digital sampling code is associated with a digital sample and further information related to the digital sampling (interpretation data), it can be tracked/find 8 201117023 out of a digital position, so it can be easily Confirm if the digital sample has been modified or is reliable. This will greatly facilitate the evaluation of the digital sample's credibility and thus facilitate tracking and tracing of the digital sample—in general, once stored in the above-described digit position, the digital sample will no longer move. If the digital sample is still moved to another digit or physical location, the cross-reference between the sample code and the digital path will be updated 'so that the sample code will remain up-to-date and can be used to store the digital samples. take. Therefore, the dead link caused by the change of the digital path to the digital position where the digital sample is stored can be excluded in this way. A digital sample is also treated as a single individual digital entity and is therefore defined as having a unique identification identity and can be distinguished from all other digital samples within its specified specification (individualized) and thus can be explicitly Track and trace. Digital sampling as an individual entity is therefore different from the number: production ° ° digital catalogue, or digital product category. In this patent: the characteristics and meaning of the word 'sampling' in the 曰 文 应 应 应 广义 广义 ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' The collection, the digital transaction, or the number of authors "owner's words (especially) cover the originator, issuer, distributor, and the source: =: the household's as long as the actual or previous ownership of the digital sample can be sampled. The used and can be inferred from the basin/or domain name. The 1st address of the "digit position" and the owner of the gamma issuer - the computer factory is located as a generation - using the internet operation In addition, it can also be a basic frame shot 7 (a) _ (4) location to provide shared resources, 201117023 software and information to computers and other on-demand devices, such as a utility. Such sampling The code can be stored in the cloud computing system, and the digital samples are stored in a location separated from the cloud computing system, which will reduce the traffic load in the cloud system and help the security. The bit file is marked with a globally unique sample code. This sample code can represent the number of samples taken—(iv) the name and/or the number of people to be sampled. From this point of view, the sharing of digital samples can be purely By sharing the sample code, it will provide a guide to the location where the digital samples are stored. Since only the sample code (approximately kilobytes (ki) 〇byte), for example) is sufficient for digital sampling Authorization sharing (usually far more than a thousand bytes), so there will be no need to exchange digital samples in this regard, which can help to reduce Internet traffic and (multiple) data storage, in terms of finance, It is extremely advantageous from the point of view of security and environmental protection. The sample code segments are selectively ordered to establish an identification path directly or indirectly to a digital position where a digital sample can be found, in particular a network location. The path usually represents a global resource locator (URL) that can (automatically) be added to a preamble by a web browser (web (10), such as http, https, ftp) , ftps, mailto, file, etc. In one embodiment of the invention 'at least a portion of the digital path is the same as the sample code, indicating that the sample code is incorporated into the digital path. If the sample code and the digital path are approximately Similarly, the establishment of the cross-reference of step E) above may be omitted. In this regard, the above-mentioned "substantially the same" is used to mean that there may be virtually no significant between the sample code and the digital path. The difference exists. For example, although the digital path usually has a preamble, such as 201117023 "http://", this pre-w code does not appear in the visible sampling code order. Missing, because the web browser will be self-defeating... The network address of the code is also available, so the sample code can be easily used as the network address (digit). Path), 诵彳$& The network location (digit position) stored by the digital sample. In an embodiment of the present invention, the foregoing method includes the step F), including storing the sampling code, the digital pinch, and the cross reference between the sampling code and the digital path in a memory value. Among the Yukuku. The storage cross-reference is used as a sample code and a digital path between the two. It will help to translate the sample code into a digital path where the digital samples can be found. In addition, storing the data may assist in the updating of the cross-reference in the event that the sample code is prevented from being sampled by the memory and the location of the digital sample can be tracked and found to be disconnected (link failure) and the digital path is changed. The method of selecting a habitat comprises a step G) comprising converting the (four) produced in step (7) into a machine readable format. If the sample code is printed or displayed on the screen, the sample code can be read, for example, by using an optical scanner. By applying the optical word ,M, the scanned sample code will be converted into a set of characters equivalent to the sample code sample string, which can then be automatically or manually entered into a web page viewer. . The machine can read the sample code and can also be represented as a digital or entity-encrypted image (Care d (10). (4) format, such as - 2D / 3D barcode and / or an RFID tag. It should pay attention to this 4 image The representation appears to be similar to the traditional representation of the image, although the content, meaning, and use of the conventional image representation of the sampled image representation is quite different from the conventional sample representation and/or classification code. 11 201117023 The method may further comprise the step H) comprising translating at least the sample identification code segment of the sample code into another language and matching characters. Since the sample identification code segment often contains the "•full release data" associated with the digital sample of the sample code, the full release data provides an important identifiable information about the digital sample, so the location of the digital sample code is issued. The language provided and displayed in the language of the country will be easier for the user to use. An example of a possible interpretation material incorporated into at least one of the sample identification code segments described above is the author's title, subject name, size, version, date of creation, annotation, and/or status, etc. regarding the digital sample. News. The owner Ip address and/or the domain name contained in the owner identification code section are usually not translated in step H) to maintain the original appearance. In an embodiment of the invention, the sample code segment defined in step A) further comprises a -user-related code segment 'which may be in a static or dynamic form (depending on the change in the time history - or more) Parameters). Although each sample code has no presence or absence of a user-related code section, its role is already 3 - globally unique personal code, but is included in a user-related code area:: The advantage is that the content pair stored at the digit position Users can be more personal. As long as the consent is obtained, the personal information of the client such as the user number, code number and/or personal permission (for example: read/write permission) may not be displayed in the digital position and/or the information is fully explained. The form is incorporated into the user-related code section. This user information can be static, resulting in a static user-related code section. It may also include user-related information (certificate data), such as the user's age or user credit status. = 12 201117023 After the output, the sampling code will not change, but the sampling code of % m ~ out can be based on the parameters that can be applied at the time of sampling. In practice, this usually requires the final compilation of the product sample code after logging in important user data such as name, address, and so on. It should be understood that the 'user-related code area: contains a user identification code section. In this way, the identification mechanism such as the username can be clearly derived from the interpretation data represented by the code section. It is conceivable that the sample code string contains at least one mediator identification code segment associated with the intermediary identifying identity, for example, an intermediary for making supply, support, distribution, sale, and/or marketing of the product sample. By. The mediator identification code segment, optionally based on the mediator name or the IP address of the mediator, may include the identity of the mediator, but may also include other interpretation materials related to the mediator, such as It accesses one of the digital sampling platforms or services. One example is the distribution of music files through a music distribution service such as Apple's iTunes, where the music file can be from EMI Music Publishing. A sample code associated with a particular digit sample can be expressed as follows: www.emi.com/itunes c〇m/beatles yesterday i2345", where WWW.emi.com represents the owner identification code segment, "iTunesc〇m" In the representative, the 'beauties identification area is Feng' and the "beaties_yesterday_ 12345'' represents the digital sample identification section' contains the relevant release information about the performer, the title, and the unique sample number of the digital sample. The sample code can also be represented as a network link to a particular music file on a storage side, or the sample code can be an interactive reference to another network link to a particular music file. It may be helpful to define at least one punctuation in step A) to separate the adjacent code segments of step C) from 13 201117023. Many punctuation marks can be used, but since the sampling mom is usually used as a URL, a slash (, /,) symbol can usually be used to separate adjacent code segments. In a correct URL syntax, a slash is usually placed after the last code segment. In addition to these separator characters, typographic symbols such as tilde (·~,), period (,.,), bottom line (,_,), and minus sign (·_,) can also be used in the code section. Between itself and / or code sections. In one embodiment of the invention, the sampled codeword string includes at least one check code segment representing the result of a particular mathematical process of one of the at least one other sample code segment. The algorithm used to calculate the value of the check code segment will be defined when the sample code structure is deprecated during sample code compilation. For example, the calculus, de-used or similar to the well-known classification code system ISBN (International Standard Book Number) code check. The algorithm used to generate an ISBN check character operates as follows. To generate an ISBN check character, each ISBN number is multiplied by a specific correlation weighting factor and the product results are summed together. The weighting factors of the first nine digits start from 10 and form a decreasing sequence of 1 〇, 9, 8, 0, so for the nine digits of 0 9 4 0 0丨6 3 3 , the product plus is equal to 0 + 81+3 2+ 0 + 0 + 5 + 24 + 9 + 6=157. This sum is divided by the number u. (157/u = 14 remainder is 3). If there is a remainder, the remainder is subtracted from n to obtain a check number. (11-3 = 8). If the check number is equal to 10, it means the Roman numeral X. Therefore, the final ISBN in this example is equal to 0 - 940016-33-8. The effectiveness of the ISBN is checked by generating a checksum and comparing it to the received check digit. As mentioned earlier, similar or comparable checks can be added to the sample code. In another embodiment of the invention, the sample code segment defined in step A) further comprises a sample code security identifier segment. The use of this code section will abuse the sample code against participants with poor intentions because this security identifier section will be used as a check to determine the credibility of the sample code. For example, after the sample code is input to the web page viewer, the validity check of the sample code security section can be performed. This security-related code section can be time-dependent ("dynamic"), meaning that the code section is only valid for a limited period of time. If the security check indicates that the sample code is no longer valid or legal, access to the digital sample will be rejected. The security identifier field is thus used as an interactive key for obtaining access to the digital sample file. In step A), not only the number and type of code segments used to create a code, but also the order of defined code segments to be concatenated may be defined. This allows the generation of a complete sample code template (code format) in which the code segments are sorted in a particular order. In step A), it is determined that the order of the code segments can be k-nanographically sampled by the sampling code and the relevant storage location. In an embodiment of the invention, step A) may be repeated to generate a multi-sample code template, wherein the method further comprises the step of selecting a code template to be applied before performing step Β). Generating multiple templates may allow for further differentiation of the sample code provided to the user. For example, a participant can directly provide digital samples to customers and indirectly to customers through an intermediary. Such an approach can use different sample code templates 'where the direct customer can receive - such as "www . . c〇m / sampie - id_1234" code, which does not use a mediator, and indirect customers can receive a such as, www . owner . c〇m/intermediary . com/sample an id_5678" code that uses the mediator. The foregoing method can be performed using a software molded paper having a 15 to generate a global unique sampling code. Regarding one type for providing a unique inclusion: J) establishing - digital sampling ' κ ) based on one of the unique sampling codes, L) storing at least one sample, Μ) storing the digits in a digit and 〇) if sampling The code and the reference to the digit are then downloaded from the digit path and the sample code from a secure environment, such as a router, and the tracking and tracing of the digit sample is performed in accordance with step L). For example, if the digital sample is a music file user may not be able to download the particular sample, the spread control is better. A digital sample can be used. The multi-specific sampling code can be an embedded user's perception. For example, if the user's multimedia file is counted and each sample is used to access the digital sample, then it can be helpful. The method may comprise a step ,), the package of which, for example, the creator of the digital sample. The sample code email to the user may be displayed as plain text or 'sample code' may be attached to the message. Since the sampling code is usually expressed as a method including the 201117023 user interface to allow the user to sample the digital code of the sample according to an embodiment of the present invention, the method compiles the digital sampled sample code to mark the digits to take the position 'N). The sampling code is stored, and the URLs are different from each other to establish an interactive reference. If the digital sample code tag owned or managed by the owner can assist in the case of the bit stream of the sampled content, or a video file, it can cause the digital sample to be labeled with multiple unique sample code digits. In the embodiment of the present invention, the sample code is provided to be used by transmitting the first one, but not by the general bit sampling system, and the multiple messengers each having its own unique weighting code embedded in the digital sample. Inclusion and achievement. The sample code is in the electronic word 'which contains a hyperlink. One of the sub-mails is a separate attached file. 16 201117023 A limited number of alphanumeric characters and punctuation strings, so the sampling code will basically not exceed 1 kilobit 7C. Since only the sample code, rather than the digital sample, is spread, the Internet traffic and storage and storage load can be greatly reduced. By storing the sample code instead of sampling the file in a cloud computing system, it is possible to provide a secure information exchange in the cloud computing environment. The beta sample code can represent at least a portion of the file name of the digital sample. It can also be imagined and tends to be in the form of a silky code (4) material that is smothered into a digital sample, forming a sign, mark, or label for the digital sample, which facilitates tracking and tracing of the digital sample. The sample code to be entered may be either visible or invisible to the general user (code located inside the sample). An embodiment of the invention includes a digital bit sample having a sample code in accordance with any of the embodiments described herein. The present invention is further directed to a method for obtaining access to a digital sample having a unique sampling code defined in accordance with the foregoing method, wherein the packet is provided to a user, R) The user is allowed to redirect the user to the digital position stored in the digital sample by the sample code wheel - web page, and S. Access to the digital rights is obtained when the user is redirected to the digital location. Redirection can be considered a reference. For example, r, the redirecting may be direct or indirect direct redirecting, or the sampling code may be input into a web browser address bar in the form of a network address, where the digital sampling system is stored in the network. Road address. In contrast, the indirect redirect may be to input the sample code into a web browser and translate the sample code into a digit path such as a URL using an inter-reference database or look-up table, and then the user will be directed to 17 201117023 digit Sample the stored digital path. In step 8), the sampling code input in step r) can be compared with a corresponding sampling code stored in the database, wherein the user is redirected to the data stored in the database through one of the stored sampling codes. The digital path in . Indirect redirection can be accomplished by automatically comparing the input sample code with the sample code in the database using a programming script and directing the user to the digital position where the digital samples are stored. The present invention is further directed to a computer readable (four) computer executable program for providing a method for programming a sample code when being carried in a computer system and/or for providing sampling as previously described. The function of the code to digital sampling method. Examples of computer readable media include internal and external hard drives, disks, CD-ROMs, DVD-ROMs, and the like. An embodiment of the invention is further directed to a sample code encoded by the above method. The advantages of using a globally unique sampling code as a "fingerprint" are already explained. An embodiment of the present invention is also directed to a database comprising at least one cross reference between a sample code of a continuation embodiment and a number of paths leading to a digit position, the digital position storage associated with the One of the sampling codes is sampled. Using this cross-reference table, the sample code can be converted to a digital path. The digital path leads to a digital position where the digital sample can be seen. An embodiment of the present invention further relates to a system for compiling a unique sampling code using the above method, comprising: at least one sampling code test, and at least one sampling code template, the sampling Code template packet 18 201117023: a plurality of sample code regions/equal code segments to be used to establish a sample for one-bit sampling, at least _sample owner identification code segment and sample identification code segment, at least - sample code A section designating module, connected to the template to generate 3|to be represented by the # 座 生 Benefit to specify the definition by the sample code template generator

取樣碼區段之ijV ^4- L t 内谷,其中該取樣擁有者識別碼區段被具體 :定為該數位取樣之-擁有者之-位址、至少-代碼產生 :,連接至該模板產生器及該指定模組,卩串連已具體指 疋之取樣碼區段而形成該全球性特有取樣碼、及至少一資 料庫,用以儲存介於所產生之一取樣碼和通往一數位位置 的數位路僅之間的至少一交互參照,若該取樣碼和該數 位路徑係彼此互異,則可經由其獲得對該數位取樣之存 取舉例而5,取樣碼的一些實施例已然描述於說明書中。 〃在本發明一些實施例中,該系統可以是一(雲端)電腦實 =系統’以在適當設定和初始化後完全自動化,該系統一 只%例可進—步包含至少一服務模組以掌控該系統發出一 取樣碼。依據本發明—實施例’用以控制及維持該模板產 生器、該指定模組、以及該代碼產生器之一數位使用者/管 理者介面係包含於該系統之中。㈣統可以更加包含一取 樣儲存裝置’用以儲存位於一數位位置之—數位取樣其 數位路徑儲存於該資料庫中。一適當之取樣儲存裝置之二 實例係一網路伺服器,選擇性地位於雲端系統中。 ^在本發明一實施例中,該系統進一步包含—散佈/通信 杈組,以將所產生的取樣碼散佈/傳送至多個使用者之—。 本發明一貫施例係有關於一種用於處理獲得對設有一 19 201117023 依據前述方法的取樣碼之數位取樣之存取的請求的系統, 其包含:一網路用戶端,用以允許一使用者輸入該取樣碼、 一處理模組,連接至該網路用戶端,用以對輸入之該取樣 碼與儲存於如前述系統所定義之資料庫中之對應取樣碼進 行比較,其中該使用者被重新導向至一以該儲存取樣碼之 交互參照的方式儲存於該資料庫中之數位路徑,以獲得對 該數位取樣之存取。上述網路用戶端通常由一其上已安裝 網際網路瀏覽器之使用者電腦所構成。 本發明實施例可以允許數位取樣之源頭或來源以及數 位取取樣身之清楚識別。取樣碼區段可以是建構在一起以 允許透過一類似URL方式之數位路徑存取數位取樣,同時The ijV ^4- L t inner valley of the sample code segment, wherein the sample owner identification code segment is specified: the address of the digital sample - the address of the owner, at least - the code generation:, the connection to the template The generator and the designated module are connected to the sample code segment that has been specifically referred to to form the global unique sampling code, and at least one database for storing one of the generated sampling codes and one At least one cross reference between the digital locations of the digital position, if the sample code and the digital path are different from each other, an access example of the digital sample can be obtained via the example 5, some embodiments of the sample code are already Described in the instructions. In some embodiments of the present invention, the system may be a (cloud) computer real system> to be fully automated after proper setup and initialization, and one percent of the system may include at least one service module to control The system sends a sample code. A digital user/manager interface for controlling and maintaining the template generator, the designated module, and the code generator is included in the system in accordance with the present invention. (4) The system may further include a sample storage device for storing a digital sample located at a digit position, and the digital path is stored in the database. An example of a suitable sampling storage device is a network server, optionally located in a cloud system. In an embodiment of the invention, the system further includes a distribution/communication group to spread/transmit the generated sample code to a plurality of users. A consistent embodiment of the present invention relates to a system for processing a request for access to a digital sample having a sample code of 19 201117023 in accordance with the foregoing method, comprising: a network client for allowing a user Inputting the sampling code, a processing module, and connecting to the network client, for comparing the input sampling code with a corresponding sampling code stored in a database as defined in the foregoing system, wherein the user is compared Redirecting to a digital path stored in the database in a cross-reference to the stored sample code to obtain access to the digital sample. The above network client is usually composed of a user computer on which an Internet browser is installed. Embodiments of the present invention may allow for the clear identification of the source or source of the digital samples and the digital sample. The sample code segments can be constructed together to allow digital path access via a similar URL method to access digital samples while

中所述代碼系統可藉由納入外界使 釋資料進行特定取樣之與 若有需要,本發明實施例 使用者無法存取的取樣源 20 201117023 頭或範疇的内部參照而使用於一特定之内部範疇。此外, 一特定公司所使用的代碼系統之一純粹内部指定範疇可藉 由將取樣之源頭或來源整合入該指定範疇而被轉換至一立 他機構或個人可存取之外部範疇。將代碼系統一外部指定 範疇轉換至一内部範疇之範疇變更亦可以類似地藉由移除 一對於取樣源頭或範疇之參照而達成。此外,依據一實施 例之一代碼系統可以被組構成允許存取不同型態之各種取 樣。依據許多實施例’上述其他機構或個人可在—選擇性 基礎上被提供存取權利,舉例而言,使其具有不同等級之 許可權限、不同群組或次群組、不同安全性等級等。 本發明的一些實施例係有關基於各種目的使用代碼產 生'器,包含但不限於產生一特定代碼區段之數值、定義用 以建立一數位取樣之取樣碼之取樣碼模板、或者是將各種 不同的取樣碼區段結合在一起以形成一取樣碼。舉例而 言,一代碼產生器可以藉由利用來自各種資料來源的輸入 數值執行其功能而產生具體指定之區段數值,該等資料來 源包含但不限於對一資料庫之查詢或自數位取樣輸入之詮 釋資料。代碼產生器可用於品質或整體性控制區段,亦^ 用於具有動態數值之區段。 本發明的一些實施例亦允許純粹基於使用者的授權基 礎上管控式地使用给釋資料。舉例而t,代碼取樣^包含 一識別數位取樣擁有權或來源的區段,其伴隨更詳細識別 代碼取樣使用者之使用者指定區&。舉例而言,使用者指 定區段可由-中介者構成,諸如經銷者或零售纟、用戶、 21 201117023 消費者、管制者、訂戶,或可以是使用規定,諸如病患、 從業者、藥劑師、住戶、或其他人員。此一使用者區段可 具體指定有關該取樣的特定詮釋資料僅能由取樣碼之授權 使用者存取,要求使用者授權或核可該取樣的特定存取權。 本發明的一些實施例在已編定代碼之取樣分享其一部 分指定绘釋資料以資識別的情況下’允許藉由—些代碼進 行取樣碼區段數值的部分分享。此可以啟㈣取樣碼的擁 有者,使用者進一步的錯誤檢查或查核選項以決定該代碼 取樣疋否有效,或者可以依據分享之詮釋資料啟用擁有者 或創建者進一步的處理選項。 本發明的-些實施例允許組合—些取樣的取樣碼以依 據介於組合取樣間的-現有關聯性識別-新的取樣。例 取樣之組〇可以保留取樣的源頭以及有關該組合取樣 的中介者的任何指定規範。 【實施方式】 、圖1 A |頁不依據本發明一實施例之一使用數位取樣^ 、 &樣2之特有取樣碼3的内容散佈系統i。系統! 儲存數位取樣並使得數位取樣2可自使用者裝置4存取及 散佈至使用者裝置4。车络 糸統1編澤數位取樣碼3,其識別並 管控對於數位取樣2夕六π 、曰 之存取。依據許多實施例,數位取樣2 " _不同的數位内容項目,諸如文件、音樂檔案、 視汛和其他内谷。此示範性内容散佈系統1包含至少一代 碼編譯引擎5、一 Jii TM i*t. '与_貝料庫6、一數位取樣存取引擎7以 及一數位取樣資料座 厍8。内谷散佈系統1可進一步包含各種 22 201117023 •電腦及電子資源,諸如處理器、記μ 介面、通㈣式碼和電路及網路程式石馬和電路 =擎5編譯取樣碼(經由取樣碼可以存取數位取樣)並將= 了存於代碼貧料庫之中。取樣碼係儲 之中/述之編譯可以利用代碼之模板完成,、;庫6 說,他處詳述。數位取樣存μ擎7料_二= 取樣資料庫8中之數位取樣的存取。數位取 引 f 了以疋一仃動式使用者終端裝置,其可以包含一行動 活、灯動電腦、個人電腦、或其他使用者裝置。使用者 ==用對應至個別數位取樣2的代碼3存取數位 # ^式碼及/或電路。此外,使用者裝置4具有將至 >、部分之數位内容項目傳送至使用者裝置4使 制。該機制可以包含,舉例而 機 顯不器及一音訊梦要 碼3存取數位取樣2的程式碼及/或電路顯示為 圖=取邏輯9。此邏輯9利用對應的代媽 =統1中的數位取樣存取引擎7,提供對數位取樣2的: <用者裝置4提供代碼μ容散料統卜而内容散佈 而^回應以傳送對應的數位取樣2。使用者裝置 :藉:例如顯示-文件於營幕上、播放-音訊楷案於心 益、或利用螢幕及揚聲器播放一視訊以將 内容項目/專送至使用者裝置4的使用者。刀之數位 關% -使用者㈣同使用者裝置4亦可被用來存取— 取樣碼3。舉例而言,一取樣碼3可被傳送至一使用者 23 201117023 電子郵件位址’其先由一諸如行動電腦的使用者裝置4 存取/¾ ¢1樣碼3可隨後由—諸如行動電話的不同使用 存取因此,取樣碼3可被傳送至一特定使用者 裝置,該代碼亦可被傳送給一個可將該取樣碼輸入各種使 用者裝置4的特定使用者。此外,取決於授予使用者的許 可權限’該使用者可以將取樣媽3分享給其他使用者,例 如以系統1傳送取樣碼至其他使用者裝置4,使其他使用者 可在所擁有的使用者裝I 4上存取取樣碼3。數位取樣2可 以是儲存於使用者裝置4之一取樣儲存器10中。 圖1顯不依據本發明一實施例中用於編譯一取樣碼Η 的方法的示意圖。此方法通常係由一代碼(編引擎執行。 在此示範性實施例中,取樣碼η關聯-數位音訊取樣12(參 見圖2),其内容係由披頭四(Beatles)所創作。一音訊取樣可 包含一(純)音執的全球性獨特實體。藉由利用取樣碼n, y使用者可獲知對取樣丨2的存取。因此,取樣碼u可充 當獲得對音訊取樣12存取之―"㈣"。依據—實施例,取 樣碼11被嵌人音訊取樣12中,以在下錢輔助音訊取樣 U之追蹤及追溯。取樣碼n同時可構成音訊取4 12的檔 案名稱。以下說明取樣碼n的編譯。在一第一步驟A)中定 義-代碼模板13,其中不同的代碼區段被定義以建立取樣 碼。在一特定實施例中,代碼區段,,0wner ID(擁有者識別 碼),,和"Sample ID(取樣識別碼)"是必要,但其他代碼區段是 選擇性。必要的代碼區段係用以製做音訊取樣12的源頭(定 義於"Owner ID"代碼區段中)及有關音訊取樣12的重要詮 24 201117023 釋資料’在此實例中之表演者係可直接 者或倍用各蝴口丨山* .焉Η的讀取 ;用者識別出來。音訊取樣12的源頭 之擁有者,其可為一音訊取樣12的目前擁有月者日^ 者卜在此實射,更多可使用的代碼區段包含— 有關特定音訊取樣12 .透過其提供給顧客的中介方 中介者),,代碼區段、-有關特定或個人使用者 14相關資訊的"User ID(使用者識別碼)"代碼區段、及一有 關管控取樣碼U正確性或可靠度的檢核數字的Week叫 MU檢核部分),,代碼區&。接$可決定所選代碼區段的順 序,而後選擇分隔標記的形式以分隔相鄰之代碼區段。由 -分隔標記分隔的所選排序代碼區段將共同構成代碼模板 13。在下一步驟B)中具體指定代碼模板之代碼區段❶如圖 1所示,"Owner ID”代碼區段被具體指定為wwwemic〇m, 指出音訊取樣12係由原始擁有者EMI發行並隸屬於該公 司。其使用蘋果公司的iTunes充當一,,中介者”以公開發行 該音訊取樣。在Emi環境内的音訊取樣12被唯一編碼為 •’BeatleS33433”以指明音訊取樣12代表一彼頭四所作歌 曲。”User ID”的指定内容取決於請求獲取該特定音訊取樣 12存取的使用者的識別身分。"Checking part”的指定内容是 取樣碼11中其他字元的數學處理的結果且通常自動填入。 驟 C) 將此等經具體指定的代碼區段套用至代碼區段模板u(步 將 產 生 取 樣 碼. 11 : www.emi.com/itunes/beatles3 343 3/12345/4 或 是 www.emi.com/itunes.com/beatles33433/12345M。此取樣嫣 25 201117023 具有王球獨特性且可做為—用以取得預定取樣12音軌存 取權之特有而舉世唯一的個人或網路金鑰。在此實例之 中,3 Λ取樣12係儲存於一具有網路位址 I5(itunes.apple.com/23432234292234〇h㈣的網路位置,其 不同於代碼取樣丨2所代表的網路位址 (emi.com/ltunes/beatles33433/12345/4)(步驟 D)。一 網路位址間的交1^ /可儲存於一交互參照資料庫16中 (/驟E)取樣碼! i經由電子郵件被傳送至使用者1 *。 圖2顯不—利用如圖1所示的取樣碼1 1以獲得音訊取 樣之存取的方法的不意圖。使用者^可以手動或自動 地(藉由點擊)將取樣碼1輸入—網頁劉覽器17。此將會把 使用者14重新導向至EMI環境,其巾—腳本將自動地榻取 有關取樣碼1 1的交炎·日3 Μ七/ 1» 父互參照儲存位置,並把使用者14重新 導向至儲存曰Λ取樣12的健存位置。文字或圖形資訊(未顯 示於圖中)可以在可以找到數位音訊取樣12的網路位置顯 不,。使用纟14,其可以與音訊取樣12之内容相關或不相 關。取決於使用者的許可權限,❹者14將能夠下載音訊 取樣12或者是能夠經由網際網路串流音訊取樣…串流係 透過網際網路播放音訊取緙〗? &仏 曰K取樣12的動作,而下載則是將完整 的音訊取樣12傳輪至蚀用| 铷主使用者的電腦,下載之後使用者14 可以自該電腦播放音訊取樣12。 圖3顯示依據本發明一實施例中另一用於編擇—取樣 碼U的方法的示意圖。圖3所顯示方法大致類似圖(所示 方法’其中依據以一預先定義順序串連不同代碼區段而定 26 201117023 義一代碼模板1 9。在此實例中,代碼區段”User iD”被省略 以產生代碼模板 19 : www . host . nl/intermediary/sample/checkdigit 或 www . h〇st nl/intermediary. com/sample/checkdigit。包含於代碼模板 1 9的代碼區段隨後被具體指定並納入代碼模板1 9中而產生 取樣碼 18: www. emi. com/itunes/beatles33433/4 或 www . emi . com/itunes . c〇m/beatIes33433/4 (未顯示於圖中)。此 取樣碼18可被嵌入一關聯取樣碼18之音訊取樣。該音訊 取樣的儲存位置直接由取樣碼18本身所表示。因此,取樣 碼18不僅唯一做為該音訊取樣的代碼,並且表示該音訊取 樣的位置。此實例可省略一交互參照資料庫。然而應可想 像.套用一交互參照資料庫以交互參照取樣碼1 8和其發現 位置,即使二者是相同的,因為如此將可易於在未來修改 通往儲存位置之路徑而不致終了於失效的連結。儲存位置 的U改可在資料庫中處理和更新,其可以致使取樣碼^ 8將 —直通連至該音訊取樣,只要擁有者/販售的一方容許即 可。取樣碼18可以透過電子郵件提供給一使用者2〇。 圖4顯示一流程圖21 ’其定義一用於建立一依據本發 月=取樣碼之取樣碼模板。針對代碼模板之定義,其假設 Μ產生代碼的取樣的1全釋資料係已知,此使得在擁有者 益範:中可具有獨特的識別身分。此等識別言全釋資料將定 出^模板·代碼區段模板之數目及代碼區段模板之意 —疋義開始别必須先選擇代碼型態。代碼型態使其可在 子罔路中循一特定傳輸協定散佈一屬於此代碼型態之 27 201117023 代碼。若有必#,在一代碼存在期間均可提供一個將一特 定代碼型態的代碼轉換成另一種型態之功能。此外代碼 «'決定何種區段㈣被允許建立―此㈣之代碼。代碼 型態亦決定例如允許何種標點符號可做為分段字元及置於 代碼中的何處(置於哪些代碼區段之前、之後、或介於哪些 代碼區段之間)。區段型態以及標點符號選項必須選擇自適 用於所選代碼型嘘的過濾群集。相關應用依據所選代碼型 態進行過濾;一應用管理者必須自過濾選項選擇。此選擇 必須針對模板定義進行;該選擇將套用至該特定模板的所 有代碼。除了該等選擇,模板被給定一名稱。代碼區段模 板的定義關係到代碼結構及每一代碼區段的意義。該結構 係由代碼區段型態、介於區段之間的分隔字元、及區段的 順序所疋義。一代碼型態”http中介”在主機辨識記號需要至 少二個區段以表示擁有者:一中介區段型態、路徑區段型 態、及一品質控制區段型態。區段型態主機辨識記號之區 段係主機名稱、網域名稱伺服器第二層、以及網域名稱伺 服器最高層。區段之順序係決定於所選之編碼形式:例如, 用於網域名稱伺服器第二層之區段在預設形式中係跟在主 機名稱之後的區段;然而其可被調換至區段順序中的第三 個位置而位於網域名稱伺服器最高層之後。在預設形式之 中’網域名稱伺服器最高層排在順序3。預設形式產生例如 appleitunes.emi.com , 而 調換形 式產生 emi.com.appleitunes。除了主機名稱區段的區段型態外,亦 有所謂路徑區段(依據其擁有者範疇中一取樣之識別詮釋資The code system can be used in a specific internal category by incorporating an external reference to the externally-supplied data and, if necessary, the internal reference of the sampling source 20 201117023, which is inaccessible to the user of the embodiment of the present invention. . In addition, one of the code systems used by a particular company can be converted to an external category accessible to another institution or individual by integrating the source or source of the sample into the specified category. A domain change that converts an externally specified category of code systems to an internal category can similarly be achieved by removing a reference to the source or category of the sample. Moreover, a code system in accordance with one embodiment can be grouped into a variety of samples that allow access to different types. According to many embodiments, the other institutions or individuals described above may be provided with access rights on a selective basis, for example, having different levels of permissions, different groups or subgroups, different security levels, and the like. Some embodiments of the present invention relate to the use of code generation for various purposes, including but not limited to generating a value for a particular code segment, defining a sample code template for establishing a sample code for a digital sample, or a variety of different The sample code segments are combined to form a sample code. For example, a code generator can generate a specified segment value by performing an operation using input values from various data sources, including but not limited to queries to a database or self-digit sampling inputs. Interpretation of information. The code generator can be used for quality or integrity control sections, as well as for sections with dynamic values. Some embodiments of the present invention also allow for the controlled use of the release material based solely on the user's authorization. For example, t, the code sample ^ contains a section identifying the ownership or source of the digital sample, which is accompanied by a more detailed identification of the user-specified area & For example, a user-specified section may be constituted by an intermediary, such as a distributor or retailer, a user, 21 201117023 consumer, regulator, subscriber, or may be a usage rule, such as a patient, a practitioner, a pharmacist, Residents, or other people. This user section can specify that the particular interpretation material for the sample can only be accessed by the authorized user of the sample code, requiring the user to authorize or approve the particular access to the sample. Some embodiments of the present invention allow for partial sharing of sample code segment values by some code in the case where a sample of the code has been shared to share a portion of the specified profile data for identification. This enables the owner of the (4) sample code, the user to further check or check the option to determine if the code sample is valid, or to enable the owner or creator to further process options based on the shared interpretation data. Some embodiments of the present invention allow for the combination of some sampled samples to identify new samples based on the existing correlation between the combined samples. Example The group of samples may retain the source of the sample and any specified specifications for the mediator of the combined sample. [Embodiment] FIG. 1A|page does not use the content distribution system i of the unique sampling code 3 of the digital sampling ^, & 2 according to one embodiment of the present invention. The system stores the digital samples and allows the digital samples 2 to be accessed and distributed from the user device 4 to the user device 4. The car system 1 encodes a digital sample code 3, which identifies and controls access to the digital sample for 6 π π , 曰 . According to many embodiments, the digital sample 2 " _ different digital content items, such as files, music files, video files, and other inner valleys. The exemplary content distribution system 1 includes at least one code compilation engine 5, a Jii TM i*t. 'and a _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ The inner valley distribution system 1 can further include various 22 201117023 • computer and electronic resources, such as processor, mem interface, pass (four) code and circuit and network program stone horse and circuit = engine 5 compiled sample code (via sample code can Access digital sampling) and store the = in the code repository. The compilation of the sample code system can be done using the template of the code, and the library 6 says that it is detailed elsewhere. The digital sample storage device 7 _ 2 = the sampling of the digital sample in the sampling database 8. The digital user interface device is a digital user interface device that can include a mobile device, a computer, a personal computer, or other user device. User == accesses the digit #^ code and/or circuit with code 3 corresponding to sample 2 of the individual digit. Further, the user device 4 has a digital content item to > and a portion of the content item is transmitted to the user device 4. The mechanism may include, for example, a computer display and an audio dream code 3 access digital sample 2 code and/or circuit display as picture = take logic 9. This logic 9 utilizes the digital sampling access engine 7 in the corresponding generation mother=system 1 to provide the logarithmic sample 2: <user device 4 provides the code μ content and the content is distributed and the response is transmitted to transmit the corresponding Digital sampling 2. User device: by means of, for example, a display-file on the camp, a play-audio file, or a user who uses a screen and a speaker to play a video to deliver the content item/delivery to the user device 4. The number of the knife is off % - the user (4) and the user device 4 can also be used to access - sample code 3. For example, a sample code 3 can be transmitted to a user 23 201117023 email address 'which is first accessed by a user device 4 such as a mobile computer. 3 can be subsequently used by - for example, a mobile phone Different use accesses Thus, the sample code 3 can be transmitted to a particular user device, and the code can also be transmitted to a particular user who can enter the sample code into the various user devices 4. In addition, depending on the permission granted to the user, the user can share the sampling mom 3 to other users, for example, the system 1 transmits the sampling code to other user devices 4, so that other users can own the user. The sample code 3 is accessed on I 4 . The digital sample 2 can be stored in a sample storage 10 of the user device 4. 1 is a schematic diagram showing a method for compiling a sample code 依据 in accordance with an embodiment of the present invention. This method is typically performed by a code (the engine is executed. In this exemplary embodiment, the sample code η is associated with the digital audio sample 12 (see Figure 2), the content of which is created by Beatles. The sampling may include a globally unique entity of a (pure) tone. By using the sample code n, y the user has access to the sample 丨 2. Thus, the sample code u can serve to gain access to the audio sample 12 ―"(4)". According to the embodiment, the sample code 11 is embedded in the audio sample 12 for tracking and tracing of the auxiliary audio sample U. The sample code n can also constitute the file name of the audio file 4 12 . Compilation of sample code n. A code template 13 is defined in a first step A) in which different code segments are defined to create a sample code. In a particular embodiment, the code section, the 0wner ID (owner identification code), and the "Sample ID" are necessary, but other code sections are optional. The necessary code segments are used to make the source of the audio sample 12 (defined in the " Owner ID" code section) and an important interpretation of the audio sample 12 2011 2011. The information on the performer is in this example. The direct or double use of each butterfly 丨山*.焉Η reading; the user recognizes it. The owner of the source of the audio sample 12, which may be the current occupant of an audio sample 12, is actually fired here, and the more usable code segments contain - for a particular audio sample 12 - through which it is provided The customer's intermediary intermediary), the code section, the "User ID""code section for information about the specific or individual user 14, and a correctness of the control sample code U or The check of the reliability of the number is called the MU check section), the code area & $ is used to determine the order of the selected code segments, and then the form of the separator mark is selected to separate adjacent code segments. The selected sorting code sections separated by a delimited mark will collectively constitute a code template 13. In the next step B), the code section of the code template is specified. As shown in FIG. 1, the "Owner ID" code section is specifically designated as wwwemic〇m, indicating that the audio sample 12 is issued and affiliated by the original owner EMI. For the company. It uses Apple's iTunes as one, the intermediary "to publicly distribute the audio sample. The audio sample 12 in the Emi environment is uniquely coded as 'Beatle S33433' to indicate that the audio sample 12 represents a song made by the other four. The specified content of the "User ID" depends on the user requesting access to the particular audio sample 12 access. The identification of the identity. The specified content of the "Checking part" is the result of the mathematical processing of the other characters in the sample code 11 and is usually automatically filled in. C) Apply these specified code sections to the code section template u (steps will generate the sample code. 11 : www.emi.com/itunes/beatles3 343 3/12345/4 or www.emi. Com/itunes.com/beatles33433/12345M. This sampling 嫣25 201117023 has the uniqueness of the ball and can be used as the unique personal or network key to obtain the unique sampling 12-track access. In this example, the 3 Λ sample 12 is stored in a network location with network address I5 (itunes.apple.com/23432234292234〇h(4), which is different from the network address represented by code sample 丨2 (emi .com/ltunes/beatles33433/12345/4) (Step D). A network address can be stored in an interactive reference database 16 (/E) sample code! i is emailed Transfer to User 1 *. Figure 2 shows - the use of sample code 1 1 as shown in Figure 1 to obtain access to the audio sample. The user ^ can be manually or automatically (by clicking) Sample code 1 input - web browser 17. This will redirect the user 14 to the EMI environment, the towel - script will be The floor is taken with the sampling code 1 1 of the cross-inflammation day 3 / 7 / 1» parent cross-reference storage location, and the user 14 is redirected to the storage location of the storage 曰Λ sample 12. Text or graphic information (not shown) In the figure, it can be displayed at the network location where the digital audio sample 12 can be found. Using 纟14, it can be related or unrelated to the content of the audio sample 12. Depending on the user's permission, the user 14 will be able to Download audio sample 12 or be able to stream audio via the Internet... Streaming through the Internet to listen to audio? & 仏曰K sampling 12, while downloading is to complete the complete audio sampling 12 For the user of the primary user, after downloading, the user 14 can play the audio sample 12 from the computer. Figure 3 shows a schematic diagram of another method for programming the sample code U in accordance with an embodiment of the present invention. The method shown in Figure 3 is generally similar to the figure (the method shown in which the code module 1 9 is in accordance with a series of different code sections in a predefined order. In this example, the code section "User iD" Omitted to generate code template 19: www.host.nl/intermediary/sample/checkdigit or www.h〇st nl/intermediary.com/sample/checkdigit. The code section contained in code template 19 is then specified and Sample code 18 is generated by inclusion in Code Template 19: www.emi.com/itunes/beatles33433/4 or www.emi.com/itunes. c〇m/beatIes33433/4 (not shown). This sample code 18 can be embedded in an audio sample associated with the sample code 18. The storage location of the audio sample is directly represented by the sample code 18 itself. Therefore, the sample code 18 is not only uniquely used as the code for the audio sample, but also indicates the location of the audio sample. This example can omit an interactive reference library. However, it should be conceivable to apply an inter-reference database to cross-reference the sample code 18 and its location, even if the two are identical, as it would be easy to modify the path to the storage location in the future without ending the failure. link. The U-change of the storage location can be processed and updated in the database, which can cause the sample code to be directly connected to the audio sample, as long as the owner/sale party allows it. The sample code 18 can be provided to a user via email. Figure 4 shows a flow chart 21' which defines a sample code template for establishing a code according to the present month. For the definition of the code template, it is assumed that the 1 full release data of the sample from which the code is generated is known, which makes it possible to have a unique identification identity in the owner's benefit. The full-text data of these identifiers will determine the number of templates and code section templates and the meaning of the code section template. You must first select the code type. The code type makes it possible to spread a code belonging to this code type in a sub-network with a specific transport protocol. If there is a #, a function to convert a code of a specific code type into another type can be provided during the existence of a code. In addition the code «'Determines which section (four) is allowed to create the code for this (four). The code type also determines, for example, which punctuation marks are allowed as segmentation characters and where in the code (before, after, or between which code segments). The segment type and punctuation options must be selected for the filter cluster selected for the selected code type. The relevant application filters according to the selected code type; an application manager must choose from the filtering options. This selection must be made for the template definition; this selection will apply to all code for that particular template. In addition to these choices, the template is given a name. The definition of a code section template is related to the code structure and the meaning of each code section. The structure is defined by the code segment type, the separator characters between the segments, and the order of the segments. A code type "http Mediation" requires at least two segments in the host identification token to indicate the owner: an intermediary segment type, a path segment type, and a quality control segment type. The segment type host identification token is the host name, the domain name server second layer, and the domain name server highest layer. The order of the segments is determined by the selected coding form: for example, the segment for the second layer of the domain name server is the segment following the host name in the preset form; however, it can be switched to the zone The third position in the segment order is located after the highest level of the domain name server. In the default form, the top level of the domain name server is in order 3. The default form produces, for example, appleitunes.emi.com, and the swap form produces emi.com.appleitunes. In addition to the segment type of the host name section, there is also a so-called path section (according to the identification of a sample in its owner category)

2S 201117023 料)的區段型態,例如版本年份、作曲者、表演藝人等。區 段的名稱表示該等路徑區段之意義。另外的更多區段型態 包括扣貝控制區段、安全性控制區段、互動使用者區段等。 流程圖的下半部的處理係決定一產生器是否可被定義為適 用於產生遵循模板的所有代碼(區段的數值)、或產生器是否 可被足義為可產生遵循模板的所有代碼的特定區段的數 值。 右其可以疋義至少一此種產生器,則必須決定其是否 存在一現有而可以恰好關聯至模板者做為該適用之產生 器。若不存在現有者,則產生器必須針對適用性加以設計、 編程、測試、及授權’並予以整合入相關應用。 圖5顯示一流程圖22,其具體指定依據圖4所示流程 圖2^所定義的取樣碼模板。定義—代碼始於代碼模板之選 擇。實際上,定義一代碼唯一要做的事情是定義每一代碼 區段的數值。# 一產生器已經被定義為與模板相關,則該 f生器必須被啟動。其有可能許多產生线義於模板層 二人,針對整體代碼以及特定區段皆然。此種情況下’,預定 :產生器必須被選擇(由特定使用者)並啟動。此流程圖同時 ^ 代碼選擇另—個特定之產生器或者開 發一個新的並將苴萼人 妞 〇〇 肘”鳘σ入相關應用中以資使用。每一產生 器均可使用讀取自一檔荦、透 龜田从 透過對—些資源(並未假設其是 應用的一部分)的查詢而得到 的輸入參數’此等參數可以在 成為區段數值之前加以處理, ^者如果方便的話手動地插 八参數。此對於以下參昭其 …具他圖式提及的所有產生器均成 29 201117023 二::ΓΓ每一區段均具有一有效數值之後,即可以 之數值以::由此係藉由以預先定義之順序置敌代碼區段 之數值乂及藉由置放預先定義於模板令的定義 點符號)而達成;此字串產生程序亦遵循模板定義。子4 圖6顯示-流程23,其將一數位路 圖5所示流程…產生之取樣碼。選擇一 碼,此選擇開始於模板的選擇;而後 ;二 -猶後選擇…二=碼將聯繫至(以交互參照) 定的資料亦可案·、此係可以辦得到的’因為特別指 、^、° "^關聯至代碼而不僅是數位取樣。此等且體 心疋之貝料,例如演出藝 '、 包含具有C則歷),可以關聯至所有 取柹I疋“之區段的代碼。若所關聯者是數位取 2樣身,則僅必須選擇一個代碼。流程圓的下—個… J動!定義一數位取樣的選項。此意味數位取樣不一:: 以已經產生的檔案内容· 理—呼1 ㈣式存在,其產生可以是藉由處 异、在—些(分散式)資料來源上的查詢等等,概括而 4是藉由處理-電腦指令,如同本發明此說明*= :圖的:他產生器-般。實例之-係-房間的實際B::r =5之說明,數位取樣產生器的輸人參數可以是取自一 等Γ自資料庫、在輪入前進-步處理、手動地插入等 右數位取樣係”包含於”一檔案之中或者其本身係一檔 謂的·:通/该檔案位置的帶有路徑的檔案名稱被定義為所 4識記號” ’㈣產生器的名稱和 來源辨識記號,其中可以附上一查詢定義或一儲 30 201117023 稱等等。在來源辨識記號選擇之後,其選擇兮㈣辨 . m 若同一來源辨識記號關聯一些代碼 (參見本圖式說明的開頭),則於模板層次選擇區段,=碼Section type of 2S 201117023, such as version year, composer, performer, etc. The name of the segment indicates the meaning of the path segments. Additional segment types include the buckle control section, the security control section, the interactive user section, and the like. The processing of the lower half of the flowchart determines whether a generator can be defined to be suitable for generating all code that follows the template (the value of the segment), or whether the generator can be adequately generated to produce all the code that follows the template. The value of a particular section. Right, at least one such generator can be deprecated, and it must be determined whether there is an existing one that can be associated with the template as the applicable generator. If no existing one exists, the generator must be designed, programmed, tested, and authorized for suitability and integrated into the relevant application. Figure 5 shows a flow chart 22 that specifically specifies the sample code template defined in accordance with the flow shown in Figure 4 of Figure 2. Definition—The code begins with the choice of code template. In fact, the only thing to do to define a code is to define the value of each code section. #一产生器 has been defined to be associated with the template, then the f producer must be started. It is possible for many to generate a line of meaning for the template layer, both for the overall code as well as for specific sections. In this case, the reservation: the generator must be selected (by a specific user) and started. At the same time, the flow code selects another specific generator or develops a new one and puts it into the relevant application for use. Each generator can be read from one. An input parameter obtained from a query through a pair of resources (not assuming that it is part of the application) 'These parameters can be processed before being the segment value, ^ if convenient, manually Insert the eight parameters. This is for the following: all the generators mentioned in his schema are 29 201117023 2:: ΓΓ After each section has a valid value, the value can be :: This is achieved by placing the value of the enemy code section in a predefined order and by placing the defined dot symbol predefined in the template order; this string generation procedure also follows the template definition. Sub 4 Figure 6 shows - flow 23, which will process the sample code generated by the process shown in Figure 5. Select a code, the selection starts from the selection of the template; then; the second - after the selection... the second = the code will be linked to (by cross-reference) data of Can also be the case, this department can do 'because special refers to, ^, ° " ^ associated with the code and not only digital sampling. These and the body of the beard, such as performance art ', including with C Calendar), which can be associated with all the code of the section. If the associated person is a digital one, then only one code must be selected. The bottom of the process circle - a... J move! Define an option for a one-digit sample. This means that the digital sampling is different:: The existing file content, the physical-call 1 (4) exists, and its production can be summarized by divergence, query on some (distributed) data sources, etc. It is by processing - computer instructions, as this description of the invention * = : Figure: his generator - like. Example - the actual B::r =5 description of the room, the input parameters of the digital sampling generator can be taken from the first-class data library, in the round-forward step processing, manual insertion, etc. The sampling system is included in a file or in its own name. The name of the file with the path in the file location is defined as the 4 identifier. '(4) The name of the generator and the source identification mark , which can be accompanied by a query definition or a storage 30 201117023, etc. After the source identification token is selected, its selection 兮 (4) discriminates. m If the same source identification token is associated with some code (see the beginning of this diagram), then Select section at template level, = code

擇特定之代碼區段。接著,該關聯性被儲存於資料庫中!選 圖7顯示一流_矛里|g| A 22所產生之取; '據圖5所示流程圖 模板之圖像表^式。在選擇讀尋-代% 模板並決定該ifi #主_ 。 丨〜% 僅對-特定技/ 應對該模板的所有代碼或 表干方式/施且選擇此特定代碼後,必須選擇圖像 ;形式,例如’此表示方式係遵循一特定演算法 之線性條碼形式、遵循一特定、t 1 ' -特定… 條碼形式、遵循 特疋肩鼻法之RFID形式,等等。 圖8顯示一流程圖2 5,1儲左一 < ^ ,、儲存一 5又有依據圖5所示流 私圖所產生之取樣碼的文件。該過程係圖6流程圖23 二另一種應用;此處針對-文件。此交易為"以SC袼式儲 存,其令'Sc,代表取樣碼。一使用者/ Α太 使用者在其本地端電腦寫入 文件°該使用者決定依據本發明的代碼方式儲存 該文件。此表示予以儲存於一巾π 飞储存 碎廿Κ中央文件伺服器並針對文 產生被視為數位取樣的—代碼。先決條件係該使用者 發明的編碼機器或分別對該編碼機器的一部份之 (Μ)或其另—技術性實現方式具有存取權。此編石馬之實 行包含以下步驟:若文株# 土 > 文件尚未命名則給予該文件一個名 稱、選擇諸如.pdf、.doc、.html、 .xls .odt等之一文件格 式、若之前尚未做過則為相同文件選擇模板(該文件可能剛 剛開啟及更新而非一新文件)、若是一新文件,則必須定義 31 201117023 該文件之檔案名稱,此檔案名稱包含一通往其儲存位置之 路徑(等同於圖6的來源識別記號之定義)。若該文件已然產 生代碼,則在考慮多重使用者環境的並行性協定 (concuirency pr〇t〇c〇i)特性下,儲存該文件或該文件之版 本;使用者得到該文件已被適當儲存的通知。否則,在一 新文件的情形下,以諸如pdf、d〇c、html ' xls ' 等 所選格式建立該文件、在慮及多重使用者環境的並行性協 定特性下儲存該文件、儲存該代碼、儲存通往該文件檔案 之包含檔案名稱(=來源辨識記號)的路徑、儲存代碼和取樣 的關聯性(代碼_來源辨識記號)、以電子郵件或電子郵件附 件之形式冑代碼傳送予使用者(亦包含言亥文件已被適當儲存 的通知)决疋s亥文件的本地端版本是否應予刪除 '若決定 應予刪除則刪除該本地端版本。 圖9顯示一流程圖26 ’其開啟一設有依據圖5所示流 程圖22所產生之取樣碼之文件。該交易稱為"以%格式開 啟’’。首先,使用者決定開啟一已產生代碼的文件。使用者 藉由啟動文件的代碼在本地端取得中央文件的存取權。在 流程圖中假定該文件係_取樣,但並非該文件的每一版本 均是一取樣。此意味使用者取得—系列該文件多個版本的 存取權;其必須選擇想要開啟的版本。開啟該文件之後, ,、可以依據其授權狀態進行讀取或寫入。若該使用者更動 戎文件’貝ij其必須決定是否需要將該文件之更新版本亦儲 存為代碼文件之版本。若決定如此,則必須呼叫顯示於圖8 流程圖25中的交易,|以sc格式儲存,,。 32 201117023 圖10顯示—流程圖27,其處理一使用者用以獲得對— 數位取樣之存取之請求,該數位取樣設有一依據圖5所示 流程圖22所產生的取樣碼。更具體而言,圖1〇例示—使 用者啟動一代碼做為連結之後,存取已產生代碼之文件的 過程。相關應用接收到該請求。其必須決定該請求是否包 含一依據本發明之合法代碼以及相關應用的 悉該代碼。若是如™決定該代碼之使用 ^-登人程序H則必須執行該登人程序^若成功執 行,則必須檢查使用者的存取權利並連結進—步的處理; 進一步的處理係呼叫"以sc格式開啟,,流程。 圖u-15顯不有關為一數位文件建立依據本發明一實 施例之-取樣㉟_的實例的示意圖。在更具體解釋如何 為-數位文件的多重版本建立一辨識記號前,先針對此例 t #市政當局(此處是Amsterdam)處理之建物核 略描述此一核准之提交。 又件概 A)需要-對於某建築工程之核准。其必須 、父-填具該計畫工程相關資料的申請表,並附…諸 如建築圖式及估算的文件。此等 — 智 寻文件假疋係特定創建者的 曰葸財產,例如,建築師或營造 件之由心主於丄 J包含該豐待提交文 之申Μ表係由提交公司(公司八)所擁有。 第-步料定義使得在擁有者的料中的取樣可且有 獨特識別身分的詮釋資料。假 八 疋建省師,arch"繪製建築圖工 且該等圖式係關於公司建物 15 ΟΠΛη , 切尤生產大廳且建立於 5·04_2009。識別詮釋資料係: w ’者’’arch"、公司建築、 33 201117023 生產大樓、圖式編號及圖式的建立日期。此等視為取樣之 圖 式 的 代 碼 : www . arch . nl/company-building/production-hall/drawingl/15042009 及 www . arch · nl/company-building/production-hall/drawing2/1 5 042009 〇 相同原則套用於營造公司的估算及圖式文件產生以下 的 代 碼 : www · BuildingCon tract or . nl/company-building/production-hall/roof/calculatioan 1/200 12008 ' www . BuildingCon tractor . nl/company-building/production-hall/wall-static/calculatioa n2/23012008 及 www . BuildingContractor . nl/company-building/production-hall/wall-static/drawing2/〇 70720089 ° 提交公司A係提交文件的擁有者。視為取樣之文件的 識別f全釋資料係:公司A做為擁有者、主要事項、文件名 稱及k父日期;代碼係 www · companyA · nl/construction-approval-submission/forml2 345B/16 1 12009 。此表格1 2345B包含具有必要文件、圖式及估算等代碼的 列表。Select a specific code section. Then, the association is stored in the database! Figure 7 shows the acquisition of the first-class _ spear |g| A 22; 'According to the flow chart template shown in Figure 5, the image table. Select the Read-Generation % template and decide on the ifi #main_.丨~% Only for the specific technique / All the code or the method of the template should be applied / and after selecting this specific code, the image must be selected; the form, for example, 'this representation follows the linear bar code form of a specific algorithm Follow a specific, t 1 '-specific... bar code form, follow the special shoulder-nose method of RFID, and so on. Fig. 8 shows a flow chart of the flow code generated by the flow chart shown in Fig. 5, in which a flow chart 2 5, 1 stores the left one < ^ , and stores a 5 . This process is shown in Figure 6 of Figure 23, another application; here for - file. This transaction is "stored in SC, which makes 'Sc, which represents the sample code. A user/Α user writes a file on his local computer. The user decides to store the file in accordance with the code of the present invention. This means that it is stored in a towel π fly storage smashing central file server and generates a code that is considered to be digitally sampled. A prerequisite is that the user invents the encoding machine or has access to a portion of the encoding machine or its other technical implementation. The implementation of this stone horse includes the following steps: if the document #土> file has not been named, give the file a name, select a file format such as .pdf, .doc, .html, .xls.odt, etc. If you haven't done so, select the template for the same file (the file may just be opened and updated instead of a new one). If it is a new file, you must define the file name of the file 2011 20112323, which contains a file to its storage location. The path (equivalent to the definition of the source identification mark of Figure 6). If the file already generates the code, the file or the version of the file is stored under the concuirency pr〇t〇c〇i feature of the multi-user environment; the user obtains that the file has been properly stored. Notice. Otherwise, in the case of a new file, the file is created in a selected format such as pdf, d〇c, html 'xls', etc., stored under the parallelity agreement feature of the multi-user environment, and the code is stored. And storing the path to the file file containing the file name (= source identification mark), the storage code and the relevance of the sample (code_source identification mark), and transmitting the code to the user in the form of an email or an email attachment (Also includes a notice that the document has been properly stored.) Whether the local version of the file should be deleted. If the decision should be deleted, delete the local version. Figure 9 shows a flow chart 26' which opens a file having a sample code generated in accordance with the flow chart 22 shown in Figure 5. The transaction is called "opened in % format.' First, the user decides to open a file that has generated the code. The user obtains access to the central file on the local side by the code of the startup file. It is assumed in the flowchart that the file is _sampled, but not every version of the file is a sample. This means that the user has access to multiple versions of the file in the series; it must select the version that you want to open. After the file is opened, it can be read or written according to its authorization status. If the user changes the file, it must decide whether it is necessary to save the updated version of the file as a version of the code file. If so, the transaction shown in Flowchart 25 of Figure 8 must be called, | stored in sc format, . 32 201117023 Figure 10 shows a flow chart 27 for processing a request by a user to obtain access to a digital sample having a sample code generated in accordance with flow chart 22 of Figure 5. More specifically, Figure 1 〇 illustrates the process of accessing a file that has generated code after the user initiates a code as a link. The related application received the request. It must decide whether the request contains a legal code in accordance with the present invention and the associated application. If the TM determines the use of the code ^-the boarding program H, the boarding procedure must be executed. ^ If successful, the user's access rights must be checked and the processing of the step must be checked; further processing is called " Open in sc format, process. Figure u-15 shows a schematic diagram of an example of the creation of a sample 35_ in accordance with an embodiment of the present invention for a digital file. Before more specifically explaining how to create an identification mark for multiple versions of a digital file, the approval of this approved submission is described for the construction of the t # municipality (here Amsterdam). Also, A) need - approval for a construction project. It must be, parent-filled with an application form for the project-related information, and attached to... such as architectural drawings and estimated documents. This is the 曰葸 文件 文件 特定 特定 特定 , , , , , , , , , , , 特定 特定 特定 特定 特定 特定 特定 特定 特定 特定 特定 特定 特定 特定 特定 特定 特定 特定 特定 特定 特定 特定 特定 特定 特定 特定 特定 特定 特定 特定have. The first step definition defines that the sample in the owner's material can have an interpretation data that uniquely identifies the identity. Fake Eight 疋 省 省 , arch arch arch arch arch arch arch arch arch arch arch arch arch arch arch arch arch arch arch arch arch arch arch arch arch arch arch arch arch arch arch 绘制 arch 绘制 绘制 绘制 绘制 绘制 绘制 绘制 绘制Identification and interpretation data: w ’ person’’arch", company building, 33 201117023 Production building, schema number and schema establishment date. These are considered codes for the sampling pattern: www . arch . nl/company-building/production-hall/drawingl/15042009 and www . arch · nl/company-building/production-hall/drawing2/1 5 042009 The set of principles used to create the company's estimates and schemas produces the following code: www.BuildContractor.nl/company-building/production-hall/roof/calculatioan 1/200 12008 ' www . BuildingCon tractor . nl/company-building /production-hall/wall-static/calculatioa n2/23012008 and www . BuildingContractor . nl/company-building/production-hall/wall-static/drawing2/〇70720089 ° Submit the owner of the company A submission. The identification of the document deemed to be the full release of the data is: company A as the owner, the main matter, the file name and the k-parent date; the code is www · companyA · nl/construction-approval-submission/forml2 345B/16 1 12009 . This Form 1 2345B contains a list of the necessary files, schemas, and estimates.

Amsterdam市政當局以www ·⑶叫扣以. nl/constructi on-approval-submission/forml2 3 45 B/l 61 12009 的代碼形式在其專設之公用伺服器上接收該表格。以一連 結形式啟動此代碼將開啟該表格;具有必要文件的列表被 以代碼的形式納入;啟動此等代碼將顯示文件的内容。 34 201117023The Amsterdam municipality receives the form on its dedicated public server in the form of a code of www.(3) called nl/constructi on-approval-submission/forml2 3 45 B/l 61 12009. Launching this code as a link will open the form; a list of necessary files will be included in the code; launching these codes will display the contents of the file. 34 201117023

Amsterdam市政當局設有一部門D以處理此等提交。 其具有專責核准程序以及匯集核准文件的公務員。在最終 核准文件產生之前,有一些前置作業,因為相關專家亦必 須加以審查等等。所有此等專業文件均遵循如圖11所示的 識別證釋資料模板加以編石馬,此處針對建物核准本身,存 在數種版本。圖11的上半部例示有關市政當局管理架構的 詮釋資料如何套用於指定及識別該建物核准文件。備註: Amsterdam市政當局的管理架構與上述實例並未完全相符 且實際的核准程序亦與該實例不同。 .圖11的下半部顯示目前申請一特定核准的辨識記號字 串’擔當的公務員係Bas ;識別於此的是文件版本2。 辨識記號本身不需要分隔字元以隔開各部分,但在各 2之㈣分隔字元可使其更容㈣讀。辨識記號的各部 '分別是所選指;t規範錢料料之數值4個部分在該 辨識S己號内均有其作用.與加 ’具作用.舉例而言’此例中所定義擁有者、 :員資料(諸如負責的部門、專責業務、負責的公 :有㈣:。辨識記號的其他額外部分亦可具體指定 具有特別作用的額外·|全釋;:著祖似_ & 為敌…, 為一擁有者識別部分或做 取樣識別。依據一實施例,擁有者分 或組織架構或者個人或個人組成的二= 財產或實質財產的擁有者或創建者、製作/、、==慧 在其區段之門件版本的取樣碼。該代碼可 W丹(^权t間使用至少一 明確可嘈性。在p ^子70以確保任何讀取的人的 在此貝例中係採用斜線做為分隔字元。 35 201117023 取樣D〇cVersion2之取樣碼係:"www .八喊㈣細. nl/Wonen_MiHeU/SpecConst/Bas/ConstrApproval2345ABCl 23/DocVersl〇n2”。該(數位)文件被標記為該代碼(例如,代 碼字串及諸如2D條碼之圖形影像)。若文件將被儲存於一 中央文件龍器上(選擇性包含於一雲端運算系统中),則依 據一實施例,該代碼更被擴充以做為一資源定位器。 決定過程中所牽涉的每一公務員及專家均可以例如一 電子郵件内的連結形式取得授權代碼,其可於市政當局的 内部網路中使用以存取此例中的文件版本2(參見圖12)。 該代碼可被擴充一區段以定義該代螞的預定使用者, 例如’另-公務員’其係一個有關該核准主題某部份的專 家。假定此專家係Jeroen。則上述擴充代碼將看起來如下: http://www . Amsterdam · nl/Wonen_Milieu/SpecConst/Bas/Jer〇en/C〇nstrApproval234 5 ABC123/DocVersion2。 系統及文件伺服器間的合作將顯示,若經由市政當局 的内部網路接收到此代碼,則其應預期由Jer〇en(且不包括 任何其他人)執行一驗證程序。此擴充代碼僅能由“⑺⑶順 利使用《Bas將需要如下的代碼擴充,即使他是建立該取樣 的責任公務員:httP://www . Amsterdam . nl/Wonen_Milieu/SpecConst/Bas/ConstrApproval2345ABCl 23/D〇CVerSi〇n2/BaS。二種代碼擴充仍均表示對於同一數位 文件合法存取的許可。 使用者區段之順序在上述例舉字串的位置非強制性。 36 201117023 代碼亦可在核准過程正進行的建物本身擴充包含更多 詮釋資料的區段。假定專案名稱和建物工程的位置影響核 准建物的識別,則此等詮釋資料必須是代碼的一部分。該 代碼字串從而將看起來如下:”http://www . Ams⑽dam . nl/Wonen_Milieu/SpecConst/Bas/Project45/V〇ndelPark/Con strApproval2345ABC123/DocVersion2”。 核准已確定後,其中一個文件版本即成為最終文件。 此意味該核准文件本身將做為取樣而其版本正好列出有關 該核准背後決定歷程的資料。 核准文件之辨識記號係:"Municipality Amsterdam Wonen Milieu SpecConstr Bas ConstrApproval2345ABC 123" 其中Municipality Amsterdam代表擁有者而其餘部分則是 該擁有者範疇内的辨識記號。自文件的辨識記號產生一代 碼將變 $ . http://www.Amsterdam.nl/Wonen_Milieu/SpecConst/Bas/Co nstrApproval2345ABC123。 在決定後’可將該代碼提供給申請建物核准的公司(公 司A)及公司A約定的建築師和建物承包商。公司a、建築 師以及建物承包商僅能透過一通信_路或電腦網路(諸如網 際網路)的通信存取被視為取樣的建物核准最終文件 ”ConstructionApproval2345ABC123"。 為啟用透過網路的通信’至少部分之代碼區段可置換 為該擁有者啟用與外界通信之一表示形式,在網際網路的 情況係透過網際網路的"http”協定。來源區段(之一部分)之 37 201117023 一適當表示形式係IP位址或其可被人讀取的形式(主機及 DNS部分的定義),並 4王微及 "、 八中擁有者區段,'Municipality msterdam"被置換為Amsterdam市政當局的網域名稱或π 位址。所產生包含前置網際網路協定的代碼表示方式顯示 上方。該MuniclpalityAmsterdam區段被置換為此 擁有者部分的另—種表示方式,且此種表示方式係http網 際網路協定可以辨認的。 做為決定過程期間的内部使用示範,此代碼可擴充一 互動使用者區段以成為適用於公司A之一代碼,亦可以成 為適用於建築師及建物承包商之另一代碼。每一擴充代碼 均識別同-取樣文件,然、而現在該取樣係公司a、建築師、 和建物承包商存取該文件之許可。市政當局的負責人員將 該特定代碼以電子郵件中的連結形式傳送至公司A、建築 師、以及建物承包商。接收者可以點擊該連結並直接被繞 接至該文件;而在通往市政當局網路的入口,代碼引擎可 以評估所接收到的代碼是否是一現有的代碼,若是如此, 則在此特定案例中每一使用者必須依據文件的性質進行其 本身的認證。認證之後,使用者可以讀取(且終至可以寫入) 该位於市政當局M的中央資料伺服器χ内部的文件。使用 者各自取得其本身的代碼,例如, 'http://www.Amsterdam.nl/Wonen_Milieu/SpecConst/Bas/Co nstrApproval2345ABC123/CompanyA”。 圖14所顯示此例之一擴充意即使用者被賦予在其位置 列印該文件的能力。數位文件本身仍僅可自市政當局的中 38 201117023 央伺服器取得。印出的文件因為與數位文件具有相同代碼 ㈣視為該數位文件的額外存在版本。文件或取樣的存在 版本可以諸如代碼取樣字串及/或—圖形圖示之代碼標記。 圖15顯示另一種情境’其中該文件可被下載至建物承 匕商的電恥。原文的數位複本可被標記為該原文之一複 j ;其可以如此,因&數位複本可基於任何原因加以更新。 錢位文件係—唯讀文件型態,此機制才有可能。然而, 為:持編碼取樣處理的一致性’該複本將依此原則標記且 進步加入該複本的啟用者。複本的啟用者等同於該複本 2來源。因此,取樣複本的編碼係經由複製過程之識別和 4 &過程的來源及經由原文的代碼。此代碼使得建物承 商可將其文件複本傳送至其他參與方(亦透過電子郵件中 的連、”。)’其中承包商區段充當一中介者。該連結將被繞接 至承包商的數位複本。然而,任何存取該數位複本者均將 知悉哪-原始取樣的複本(經由”列印於”文件上的代碼)。圖 16更顯示承包商可用其他方式使用複本文件的一部分,例 如’擴充/更新-些建物圖式以建立—新文件。此例中,與 原文的連結在該新文件的辨識記號/代碼中丟失。若有需 要原文與何生之新原λ間的關聯性可肖由連結彼此的代 =而儲存於代碼引擎中。然而,此關係並無法於文件上察 覺且有賴於建物承包商的合作。若該關聯性被儲存,則其 可从藉由將該關聯性表示成有關二個代碼的具體指定資料 、°卩刀而被找到。此使其從雙方的來源均能夠追溯該關 聯性。當允許特定的使用者下載取樣之一複本至其本地端 39 201117023 電腦之後’原始取樣的來源(市政當局Μ)即應預知此必然的 結果。慮及此等下載的追溯性,市政當局Μ應確保參與者 同意貫施本發明一些實施例中所使用的代碼引擎。否則, 不應β亥允§午在使用者本地端的位置取得該代碼引擎。 圖16和1 7顯示有關如何利用一依據本發明一實施例 之取樣碼獲得對一數位取樣之存取之實例的示意圖,更具 體言之,圖16下方顯示在購得產品Α的使用者權利之後, 使用者所得到的代碼。代碼區段之一包含自使用者的瀏覽 器傳送該代碼的時間戳記。此係一動態代碼區段之實例。 使用者每次套用該代碼時均得到不同的區段數值。使用者 並未看到帶有時間戳記的擴充部分。該動態數值係用於安 全性的用途。該代碼可以包含一或多個其他安全性區段以 確保代碼中的任何内容均未被竄改。該代碼可以在使用者 的灯動通信裝置上使用。其直接被繞接至使用者購得產品 的中介者網站。認證之後,使用者進入其個人環境,於此 處使用者可以存取其播放清單及/或可以使用進一步的功 能,像是搜尋更多資訊、更新其播放清單、購買另外的產 品、以及其他功能。若使用者啟動其播放清單,則原始檔 案被串流至其iPh〇ne,且可以建立日常記錄項目。 圖17例示搜尋引擎如何進一步回應前述情況。若將一 諸如 Janine Jansen & Violin Concerto & Britten 或 JanineThe Amsterdam Municipality has a Department D to handle such submissions. It has a dedicated review process and a civil servant who brings together the approved documents. Before the final approval document is produced, there are some pre-operations, because the relevant experts must also review it and so on. All of these professional documents are compiled in accordance with the identification document template shown in Figure 11, and there are several versions of the construction approval itself. The upper part of Figure 11 illustrates how the interpretation of the municipal management structure is applied to the designation and identification of the construction approval document. Remarks: The management structure of the Amsterdam Municipality is not fully consistent with the above examples and the actual approval process is different from this example. The lower half of Fig. 11 shows the civil servant Bas who is currently applying for a specific approved identification token string; the file version 2 is identified here. The identification token itself does not need to separate the characters to separate the parts, but the 2 (4) separator characters in each can make it more (4) read. The parts of the identification mark are selected fingers respectively; the four parts of the value of the t standard money material have their functions in the identification S number. The function of the addition is. For example, the owner defined in this example , : Personnel information (such as the responsible department, the responsible business, the responsible public: Yes (4):. Other additional parts of the identification mark can also specify additional extras that have a special effect; | Fully _ & ..., identifying a part or identifying a part of an owner. According to an embodiment, the owner or organization structure or the individual or individual of the property or the real property of the owner or the creator of the property, making /, == Hui The sampling code of the version of the door in its section. The code can use at least one explicit decency between the weights of t. In p ^ 70 to ensure that any readers are employed in this case The slash is used as the separator character. 35 201117023 Sampling D〇cVersion2 sampling code system: "www.eight shouting (four) fine. nl/Wonen_MiHeU/SpecConst/Bas/ConstrApproval2345ABCl 23/DocVersl〇n2". The (digit) file is marked For the code (for example, the code string and For example, a 2D barcode graphic image. If the file is to be stored in a central file device (optionally included in a cloud computing system), according to an embodiment, the code is further expanded as a resource locator. Each civil servant and expert involved in the decision process may obtain an authorization code, such as a link within an email, which may be used in the municipality's internal network to access the version 2 of the document in this example (see figure). 12) The code can be expanded into a section to define a predetermined user of the generation, such as 'other-civil servant' who is an expert on a part of the approved subject. Suppose the expert is Jeroen. It will look like this: http://www . Amsterdam · nl/Wonen_Milieu/SpecConst/Bas/Jer〇en/C〇nstrApproval234 5 ABC123/DocVersion2. Cooperation between the system and the file server will show, if via the municipality’s internal When the network receives this code, it should expect to perform a verification procedure by Jer〇en (and not including anyone else). This extension code can only be used smoothly by "(7)(3)" The following code extension is required, even if he is responsible for establishing the sampling: httP://www. Amsterdam.nl/Wonen_Milieu/SpecConst/Bas/ConstrApproval2345ABCl 23/D〇CVerSi〇n2/BaS. Both code extensions still indicate A license to legally access the same digital file. The order of the user segments is not mandatory at the location of the above-mentioned example string. 36 201117023 The code may also expand the section containing more interpretation data in the building itself being carried out during the approval process. Assuming that the project name and the location of the construction project affect the identification of the approved building, such interpretation data must be part of the code. The code string will thus look like this: "http://www.Ams(10)dam.nl/Wonen_Milieu/SpecConst/Bas/Project45/V〇ndelPark/Con strApproval2345ABC123/DocVersion2". Once the approval has been determined, one of the file versions becomes the final file. This means that the approved document itself will be sampled and its version will contain information about the decision process behind the approval. The identification mark of the approved document is: "Municipality Amsterdam Wonen Milieu SpecConstr Bas ConstrApproval2345ABC 123" where Municipality Amsterdam represents the owner and the rest is the identification mark within the owner's category. A code from the identification mark of the file will be changed to $. http://www.Amsterdam.nl/Wonen_Milieu/SpecConst/Bas/Co nstrApproval2345ABC123. After the decision, the code can be provided to the company (company A) applying for construction approval and the architect and construction contractor agreed by company A. Company a, architects, and construction contractors can only access the final document approved by the communication via a communication channel or computer network (such as the Internet). ConstructionApproval2345ABC123". To enable communication over the network. 'At least part of the code section can be replaced with one of the owner's enablement of communication with the outside world, in the case of the Internet through the Internet's "http" agreement. Source section (part of) 37 201117023 A suitable representation is the IP address or its human readable form (the definition of the host and DNS parts), and 4 Wang Wei and ", the eight middle owner section , 'Municipality msterdam' is replaced by the domain name or π address of the Amsterdam Municipality. The resulting code representation of the pre-network protocol is displayed above. The MuniclpalityAmsterdam segment is replaced by another representation of this owner portion, and this representation is identifiable by the http Internet Protocol. As an example of internal use during the decision process, this code can be extended to an interactive user segment to become one of the codes applicable to Company A, or it can be another code for architects and building contractors. Each expansion code identifies the same-sampling file, but now the sampling company a, the architect, and the construction contractor have permission to access the document. The responsible person of the municipality transmits the specific code to Company A, the architect, and the construction contractor in the form of a link in the email. The recipient can click on the link and be directly routed to the file; at the entrance to the municipality network, the code engine can evaluate whether the received code is an existing code, and if so, in this particular case Each user must perform their own certification based on the nature of the document. After authentication, the user can read (and eventually write to) the file located inside the central data server of the municipality M. The users each obtain their own code, for example, 'http://www.Amsterdam.nl/Wonen_Milieu/SpecConst/Bas/Co nstrApproval2345ABC123/CompanyA'. One of the examples shown in Figure 14 is that the user is given The ability to print the file in its place. The digital file itself can only be obtained from the municipality's central server. The printed file is considered to be an additional version of the digital file because it has the same code as the digital file (4). Or the presence version of the sample may be a code tag such as a code sample string and/or a graphical icon. Figure 15 shows another scenario where the file can be downloaded to the builder's electrical shame. The digital copy of the original text can be Marked as one of the original texts; this can be done because the & digital copy can be updated for any reason. The money file is a read-only file type, this mechanism is possible. However, it is: coded sampling processing Consistency' The copy will be marked according to this principle and progressively added to the creator of the copy. The repeller of the copy is equivalent to the source of the duplicate 2. Therefore, the sample is complex This code is based on the identification of the copy process and the source of the 4 & process and the code via the original text. This code allows the building contractor to transfer a copy of its file to other participants (also via the link in the email). 'The contractor sector acts as an intermediary. The link will be routed to a digital copy of the contractor. However, any access to the digital copy will know which copy of the original sample (via the code printed on the file). Figure 16 shows that the contractor can use part of the replica file in other ways, such as 'expand/update- some building schemas to create new files. In this case, the link to the original text is lost in the identification mark/code of the new file. If there is a need for the association between the original text and the new λ of Ho Sheng, it can be stored in the code engine by linking the generations of each other. However, this relationship is not identifiable on the document and depends on the cooperation of the construction contractor. If the association is stored, it can be found by representing the association as a specific specified data about the two codes. This allows it to trace the relevance from both sources. When a particular user is allowed to download a copy of the sample to its local end 39 201117023 Computer The source of the original sample (municipality) should be predictive of this inevitable result. In view of the traceability of such downloads, the municipality should ensure that the participants agree to implement the code engine used in some embodiments of the present invention. Otherwise, the code engine should not be obtained at the local end of the user. 16 and 17 show schematic diagrams of an example of how to obtain access to a digital sample using a sample code in accordance with an embodiment of the present invention. More specifically, the user rights of the purchased product are shown in the lower portion of FIG. After that, the code the user gets. One of the code sections contains a timestamp from which the user's browser transmitted the code. This is an example of a dynamic code section. Each time the user applies the code, they get different segment values. The user did not see an extension with a timestamp. This dynamic value is used for safety purposes. The code can contain one or more additional security sections to ensure that nothing in the code has been tampered with. This code can be used on the user's light communication device. It is directly linked to the mediator's website of the user's purchased product. After authentication, the user enters their personal environment, where the user can access their playlist and/or can use further features such as searching for more information, updating their playlists, purchasing additional products, and other features. . If the user activates their playlist, the original file is streamed to its iPh〇ne and a daily record item can be created. Figure 17 illustrates how the search engine can further respond to the foregoing. If one would be like Janine Jansen & Violin Concerto & Britten or Janine

Jansen & Britten等给釋資料之組合輸入做為搜尋項目,則 將找到(在一些其他有關Janine Jansen演奏的⑶所創 作的vi〇lin concert〇的錄製品外)之網站並將繞接至 40 201117023 位於5法中介者處已產生代碼的音訊檔案且進一步 指定给釋資料。從該處可知悉哪些中介者網站提供該: 標案。使用者將獲得該等網站的連結,且點擊一連^ 被直接連結至提供該音訊檔案的列表中的入口。 σ 圖18-22顯示有關如何利用依據本發明 樣碼保護音訊取樣的實例的示意用取 原則以定義音訊檔牵之抑踽I— Ώ 18不範可套用相同 ^日心案之代碼,如在圖u_l5巾針對 原則同時亦可適用於視訊稽案、遊戲、電: t 樣。其選擇一些指定規範適用以全球性唯 -識別同-來源(其提供該等音訊取樣的合 唯 戶:有其他取樣的範疇中的每一音訊取樣。該等指定規範: 另,取樣的證釋資料。該取樣,或者此 \ :至代:及該取樣的進,釋資料,諸如;Jansen & Britten and other inputs for the release of the data as a search project will be found (in addition to some other recordings of vi〇lin concert〇 created by Janine Jansen (3)) and will be linked to 40 201117023 The audio file of the code that has been generated by the 5th law intermediary and further assigned to the release data. From that location, you can find out which mediators provide this: The standard. The user will get a link to the websites and click on the link to be directly linked to the entry in the list providing the audio file. σ Figure 18-22 shows the schematic principle of how to use the sample code protection audio sample according to the present invention to define the audio file to suppress the I- Ώ 18 can not apply the same ^ day heart code, such as Figure u_l5 towel can also be applied to video auditing, games, electricity: t-like. It selects some of the specified specifications that apply to the global only-identified same-source (which provides the same sample for each audio sample: each audio sample in the category of other samples. These specifications: another, sampled proof Information. The sample, or this \: to the generation: and the incoming and outgoing data of the sample, such as;

軍及音讯取樣的播放時間。先期版本、錄 S 最終版本名稱的識別可以由不同功能的演出曰本及/或 成,例如標籤、作曲者、演出藝 、的名稱所組 及由其他具體指定資料組成,諸如:關;;= (版本完成旬,而將標鐵視為版本之法定實行曰期 參與表演者可用以做為識㈣釋資 /、他功能的 中的指揮者。實務上,所選的識別言全釋資形式音樂 讯内容的種類(例如音樂形式)而有所不同。炒而 於音 是示範使用於本發明_些實施例 …、而’此實例僅 言全釋資料的原則係選擇一個可以在法定實選擇該組識別 全球唯一識別性的最小 貫體的範轉内達成 其將指定给釋資料的其餘部 201117023 分(未被使用為該識縣釋資料的集合t的元素 取樣的辨識記號相關。取樣本 / 一 =:广雙向的關聯性彼此㈣。此關聯性由本發 月貝科庫中的該交互參照機制實現。 然而針對音樂音訊檔案所述之原則亦適用於其他音訊 播案’且基本上亦適用於影月、補 φ 、、知片視成、電子書、及遊戲等 專。吏用者權利和相關價格可隨販售内容而異(可能是影片 或書籍的數目而非放送時間,或是預付的使用方式中的金 錢總量,例如預付100歐元以閱讀書籍(每一書籍均有一,, 閱-貝仏格)等等)。代碼模板 '代碼、記錄哪些資料使用 者可選擇的内容(可以不需要播放清單)等細節可能不同。 此實例係限制於前述做為識別詮釋資料(圖18)的詮釋 資料。圖1 8的左側部分顯示一組可能詮釋資料的實例,預 期該組詮釋資料使得一音訊取樣在法定實體的範疇内可識 別。所選的識別詮釋資料組係一取樣的識別數值的藍圖, 如圖18中央部份所示。該等資料數值係取樣的識別詮釋資 料;此處係Janine jansen演出的BriUen小提琴協奏曲的錄 製作品,完成於2009年6月2曰。做為藍圖的詮釋資料(顯 示於圖18左側)係關於取樣詮釋資料(顯示於圖1 8中央部分) 的詮釋資料。該藍圖詮釋資料係詮釋取樣詮釋資料的資 料。參見圖18的文字列。有關該取樣辨識記號的其他指定 詮釋資料可能不需要其識別該取樣,但可用以具體指定一 取樣,參見圖1 8右側部分© 圖1 9例示本發明一實施例之系統如何處理辨識記號以 42 201117023 建立代碼的原則。識 的資料)將被用以為二,料之藍峰釋取樣给釋資料 分並未具體顯示於圖中^取樣碼定義—代碼模板。此部 产 ,、可以想像該模板將使用如圖1 8 左側部分所顯示的詮鼷口 釋貧料規格。"音樂標籤"可以代表法定 擁有者/來源,或者亦 疋代表法定實體。該法定實體之 Α別將透過其辨键# % ^ °唬套用一特定用途傳輸協定。此協定 決定代碼字串的ϋ、土 . β° ’ ’諸如適用的分隔字元以及必須套用 的法定實體辨識記號之矣- 、 观之表不方式;在此例中使用Ιρ位址 人類可讀取表示方式,田支 因為代碼係使用於網際網路環琦 中。在另外的環境之中 . 、 之中法疋貫體辨識記號的其他表示方 式可月b更為有用’例如,>'#* S*音§* AA £· ^ 忐疋貫體的ftp位址或電子郵件位 址(個人或機關的電子郵件位址)。 我們前述實例的模板其形式如下: www.decca.com/Year/Composer/Title/Edition 該取樣的代碼形式如下: www.decca.com/20〇9/Britten/Vlolinc〇ncerto/JansenJan ine02062009 識別區段中一者(作曲者區段)變成作曲者的姓氏,且空 白自代碼區段的文字内移除。此種轉換並非強制性。其= 用此-轉換使得代碼更加簡潔(以節省透過網際網路傳輸的 位元數)。可採用其他更為有效的轉換規則。訪本視為取 樣的編碼可由Decca起始;或更廣義而言,由依據使用於 本發明一些實施例的方式的法定實體起始。音訊取樣的法 定實體使得音訊楷案提供給中介者’在此實例中係汀时以。 43 201117023 此這成取樣碼的擴充(且在一模板擴充前實際上是套用另一 模板其複製先則的模板並加入中介區段以擴充該複本)如 圖19所示。法定實體可與一些中介者有契約關係。 擴充後的模板其形式如下: www.decca.com/Intermediate/Year/Composer/Title/Edi t1〇xi" ’而對於例如二中介者(iTunes和B〇1)的示範取樣的代 碼的形式如下: www.decca.com/iTunes.com/2009/Britten/ViolinConce rto/JansenJanine02062009"及 ’’www.decca.com/Bol.com/2009/Bmten/ViolinConcerto/ JansenJanine02062009” 。 取樣碼(版本的代碼)被加入音訊檔案中,使得代碼不可 刀離地關聯至該取樣本身。此外,其彼此間的關聯性健存 於應用資料庫中。此例示於下圖中顯示於音訊檔案圖示内 的黑色小方塊。The playing time of military and audio sampling. The identification of the name of the pre-release version and the final version of the S may be composed of different functions of the performance transcript and/or composition, such as labels, composers, performances, names, and other specific designated materials, such as: off; (The version is completed, and the standard is implemented as a version of the statutory implementation. The participating performers can be used as the commander of the (4) release/function. In practice, the selected expression is fully released. The type of music content (such as the form of music) is different. The sound is used to demonstrate the use of the invention in some embodiments... and the principle of this example is only a full version of the data. The group identifies the world's only recognizable minimum cross-section within the scope of the 201117023 points (the identification marks associated with the elements of the set t that are not used for the interpretation of the data). / a =: wide two-way association with each other (four). This correlation is achieved by the cross-reference mechanism in this month's Bayco library. However, the principles described for music audio files also apply to other sounds. The broadcast case 'is basically applicable to the movie month, the supplement φ, the knowledge of the film, the e-book, and the game. The user rights and related prices may vary depending on the content sold (may be film or book) The number, not the delivery time, or the total amount of money in the prepaid usage method, such as prepaid 100 euros to read books (one for each book, read-Becker), etc.) Code template 'code, record which Details such as the data user's choice of content (which may not require a playlist) may vary. This example is limited to the above-mentioned interpretation data for identifying the interpretation data (Figure 18). The left part of Figure 18 shows a set of possible interpretation data. For example, the set of interpretation data is expected to enable an audio sample to be identifiable within the scope of the legal entity. The selected identification interpretation data set is a blueprint of the sampled identification values, as shown in the central portion of Figure 18. The identification of the sampled interpretation; here is the recording of the BriUen Violin Concerto by Janine jansen, completed on June 2, 2009. Interpretation as a blueprint (shown on The left side of Figure 18 is an interpretation of the sample interpretation data (shown in the central part of Figure 18.) The blueprint interpretation data is the interpretation of the sample interpretation data. See the text column of Figure 18. Other specified interpretations of the sample identification mark The data may not need to identify the sample, but may be used to specify a sample, see the right part of Figure 18. Figure 19 illustrates how the system of the present invention handles the identification of the symbol to create a code for 42 201117023. Will be used for the second, the material of the blue peak release sample release data is not specifically shown in the figure ^ sample code definition - code template. This part, can imagine that the template will be used as shown in the left part of Figure 18. The display of the interpretation of the poor specifications. "The music label" can represent the legal owner / source, or also represent the legal entity. The identification of the legal entity will apply a special-purpose transport agreement through its key # % ^ °. This agreement determines the 字, soil. β° ' ' of the code string, such as the applicable separator character and the legal entity identification mark that must be applied - and the way of view; in this case, the Ιρ address is human readable Take the representation, Tian Zhi because the code is used in the Internet ring. In other environments, the other representations of the 疋 疋 辨识 辨识 辨识 辨识 更为 更为 更为 ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' Address or email address (email address of the individual or organization). The template for our previous example is in the form: www.decca.com/Year/Composer/Title/Edition The sample code is as follows: www.decca.com/20〇9/Britten/Vlolinc〇ncerto/JansenJan ine02062009 Identification section The middle one (composer section) becomes the surname of the composer, and the blank is removed from the text of the code section. This conversion is not mandatory. Its = use this to make the code more concise (to save the number of bits transmitted over the Internet). Other more efficient conversion rules can be used. The code that the visit considers to be a sample may be initiated by Decca; or more broadly, by a legal entity that is in a manner that is used in some embodiments of the invention. The legal entity for audio sampling allows the audio file to be provided to the intermediary 'in this instance. 43 201117023 This is an extension of the sample code (and actually copies another template before copying the template and adds the template to the mediation section to expand the copy) as shown in Figure 19. A legal entity may have a contractual relationship with some intermediary. The expanded template has the following form: www.decca.com/Intermediate/Year/Composer/Title/Edi t1〇xi" 'And the code for the exemplary sampling of, for example, two mediators (iTunes and B〇1) is as follows: www.decca.com/iTunes.com/2009/Britten/ViolinConce rto/JansenJanine02062009"and ''www.decca.com/Bol.com/2009/Bmten/ViolinConcerto/ JansenJanine02062009”. The sample code (version code) was added. In the audio file, the code is associated with the sample itself. In addition, its association with each other is stored in the application database. This example is shown in the following figure in the black small square displayed in the audio file icon.

Decca和其他標籤被授權供應音訊取樣,此例中其實際 上係用以串流的音訊檔案。基於此原因,iTunes列出其有 提供的音訊取樣的表列目錄於iTunes網站上;參見圖2〇。 此表列目錄的每一項目均關聯至音訊取樣的代碼,且該代 碼代表該音訊取樣。由於合法擁有者/來源(即音樂標籤)係 代石馬的一部分’故其允許在取樣被提供販售或以其他方式 流通時可以藉由法定實體管控或追溯該取樣。 圖2 1例示由中介者(蘋果)iirunes所採取之後續步驟。 匿名使用者出現於一 iTunes之網站或聽取他人的建議而 201117023 到訪該處。該使用者看見所提供的表列目錄;他可試聽每 一選擇取樣的一部分而留下印象;接著他可能產生興趣並 選擇一些音訊取樣放入一播放清單中。付錢後,使用者才 能龄聽該播放清單。自此之後,該使用者成為一個用戶。 中介者(此例中係iTunes)以取樣方式提供付費服務;經過購 買’用戶可以聆聽其播放清單。在此實例之中,該做為取 樣的付費服務有設定總放送時間,例如,1 〇小時。 使用者的播放清單被視為本申請書所述數位取樣。播 放清單取樣及服務取樣亦遵循本發明一些實施例中所使用 的原則編定代碼。個別播放清單及個別服務取樣亦可具有 一法定實體。在此實例中並非音樂標籤Decca而是iTunes。 iTunes提供定義播放清單取樣的選項且提供能聆聽播故清 單中所選音樂的服務取樣。在此實例中,使用於代碼中的 服務一詞表示個別的服務或一取樣。此處略去此等代碼的 細節描述。僅以”代碼播放清單取樣P"、”代碼服務取樣A”、 以及”代碼音訊取樣B"稱之。播放清單本身僅包含取樣碼而 非所選音訊取樣。在該匿名用戶取得所選服務取樣A(此處 係產品取樣A:在一限定的放送時間内聽取_播放清單取樣 上不同歌曲的權利)存取權的同時,其即成為一用戶,而每 一用戶均得到一獨特之用戶代碼(,,代碼用戶C1")。 可能代碼之實例如下: 服務取樣 A 之 itunes.apple.com/airtiinel0/20100101" (模板:service owner/service/release date sample(服務 擁有者/服務/取樣發行日期)) 45 201117023 ”播 放清單 取樣之 itunes.apple.com/music/playlistO 12345 6" (模板:website owner/website type/playlist(網站擁有者 /網站型態/播放清單)) "用戶之 itunes.apple.com/20100422/FrankKist" (模板:client of/start date/client name(用戶歸屬 /起始 曰期/用戶名稱)) 代 碼 ’’ 代 碼用戶 C1,, (itunes.apple.com/20100422/FrankKist)及代碼"代碼服務取 樣 A"(itunes.apple.com/airtimel0/20100101)將由代碼引擎 與一取樣碼"用戶C1購買服務取樣A"結合,而得到代碼,, 代碼用戶音訊服務 AC1 日期時間 1" (itunes.apple.com/airtime 10/20100101/20100422/FrankKist/ 201004221203)。所顯示的最後一個區段係該用戶購買播放 清單上的服務A的相關存取權利的日期/時間。用戶得到一 個帶有此用戶服務取樣碼的電子郵件或sms(簡訊)。關於付 費(而成為一個用戶)’用戶亦得到用以識別及認證的安全性 資料。若正在購買服務的候選使用者本身已經是一個用 戶’則其亦得到一新的代碼"代碼用戶服務AC 1日期時間 2 。日期/時間區段的數值將異於之前的代碼。其現有之代 碼’’代碼用戶C1"並未改變,因為其仍是同一個人具有同一 身分:用戶。此實例中的區段僅係用以參考;實際的實施 方式可成需要更多區段以得到唯一的識別性。 系統使代碼彼此相關聯並將取樣碼及其關聯性儲存於 46 201117023 -與應用相關的資料庫之中。在資料庫之中,代碼"代碼用 戶服務AC1日期時間i,,表示代碼,、,代碼用戶。"以及代碼” 代碼服務取樣A”’並包含購買的曰期及時間。此外,”代碼 用戶服務AC1曰期時間i,,係以一電子郵件或_中的連結 形式被代碼引擎傳送到用戶的電子郵件/sms位址。 圖22例示在例如行動電話或ip〇d上透過電子郵件或 sms收到代碼之一用戶/使用者運用代碼的步驟。該用戶/使 用者在網頁劉覽器啟用"代碼用戶服務曰期時間卜立 進^汀觸網站;在評估所接收的代碼正確並認證該使用 者後,該使用者進人内古媸说.主„仏, 冷逆八巧有播放清早的個人頁面。在該處可 更新播放清單二個播放清單等等;且可柃聽其播 放清单(的其中之―)。相關應用評估該使用者具有;i夠的餘 額以聽取播放清單並給予建議動作的信號及提議。 在串流或進—步下载期間,代碼引擎產生-記錄’其 中記載有關被串流音訊取樣之代碼、用戶代碼、播放清單 二:樣碼、服務取樣的代碼、及自每一版本開始串流的時 I 6己。3亥記錄和—些使用者資料使得中介者可產生有關 吾好、團體、行為煊 . ’’’、'式、年齡、網路、及其他關於使用者 的有用資訊。此外,直 μ、 ’、允許音汛取樣的法定實體(諸如音樂 才示織)可以在中介者知 甘π 用戶之間交流。在遭遇盜用的情況, 其可以做為何時及何 .., 人在未侍到擁有者合法許可下進行串 >瓜或下載音訊取樣这 _ Α , 的也據。该紀錄可以被加入安全防護以 避免未授權的存取。± . a 田此可以追溯在合法串流開始之後, 何人疋非法散佈 原項°此外’其可以因為其並未紀錄而 201117023 證明音訊取樣未透過一合法的動作接收。 在一實例中’其提供一具有4個樂章的交響樂曲以進 行串流。音訊取樣的實例之一係Beethoven的Erocia中第3 號交響曲。例如,Eroica係由Willem Mengelberg帶領NewDecca and other tags are authorized to supply audio samples, in this case they are actually used for streaming audio files. For this reason, iTunes lists the catalogues of the audio samples it provides on the iTunes website; see Figure 2〇. Each item of this list is associated with the code for the audio sample, and the code represents the audio sample. Since the legal owner/source (i.e., music tag) is part of the stone horse, it allows the sampling to be controlled or traced by the legal entity when the sample is offered for sale or otherwise circulated. Figure 21 illustrates the next steps taken by the mediator (Apple) iirunes. Anonymous users appear on an iTunes website or listen to suggestions from others. 201117023 Visited here. The user sees the list of listings provided; he can listen to a portion of each selected sample to leave an impression; then he may generate interest and select some audio samples to place in a playlist. After paying, the user can listen to the playlist. Since then, the user has become a user. The mediator (in this case, iTunes) provides paid services by sampling; after purchase, users can listen to their playlists. In this example, the paid service that is sampled has a set total delivery time, for example, 1 hour. The user's playlist is considered a digital sample as described in this application. Playlist sampling and service sampling are also coded in accordance with the principles used in some embodiments of the present invention. Individual playlists and individual service samples may also have a legal entity. In this example it is not the music label Decca but iTunes. iTunes provides the option to define a playlist sample and provides a service sample that can listen to the music selected in the playlist. In this example, the term service used in the code indicates an individual service or a sample. A detailed description of these codes is omitted here. Only use "code playlist sampling P", "code service sampling A", and "code audio sampling B&quote". The playlist itself contains only the sample code and not the selected audio sample. When the anonymous user obtains access to the selected service sample A (here, product sample A: the right to listen to different songs on the _ playlist sample within a limited delivery time), it becomes a user, and each A user gets a unique user code (,, code user C1"). Examples of possible codes are as follows: service sample A's itunes.apple.com/airtiinel0/20100101" (template: service owner/service/release date sample) 45 201117023 "Playlist sampling Itunes.apple.com/music/playlistO 12345 6" (template: website owner/website type/playlist) "user's itunes.apple.com/20100422/FrankKist" ( Template: client of/start date/client name) Code '' Code User C1,, (itunes.apple.com/20100422/FrankKist) and Code" Code Service Sampling A&quot (itunes.apple.com/airtimel0/20100101) will be combined with a sample code "user C1 purchase service sample A" to get the code, code user audio service AC1 date time 1" (itunes.apple.com /airtime 10/20100101/20100422/FrankKist/ 201004221203). The last section displayed is the user's access to the service A on the playlist. Date/Time. The user gets an email or sms (sMS) with this user service sample code. About paying (and becoming a user) 'Users also get security information for identification and authentication. If you are purchasing a service The candidate user itself is already a user's and it also gets a new code" code user service AC 1 datetime 2. The date/time section value will be different from the previous code. Its existing code ''code User C1" has not changed since it is still the same person with the same identity: the user. The segments in this example are for reference only; the actual implementation may require more segments to get unique identification. The code is associated with each other and the sample code and its relevance are stored in the 46 201117023 - application-related database. In the database, the code " code user service AC1 date and time i,, the code,,, Code User. " and Code" Code Service Sampling A"' and includes the expiration date and time of purchase. In addition, the code user service AC1 period i is transmitted by the code engine to the user's email/sms address in the form of a link in an email or _. Figure 22 is illustrated, for example, on a mobile phone or ip〇d. The step of receiving the code by the user/user using the code via email or sms. The user/user is enabled in the web browser "code user service time period Bu Lijin ^Ting touches the website; in the evaluation of the received code After correcting and certifying the user, the user enters the inside of the ancient 媸 媸. The main „仏, 冷逆八巧 has a personal page that plays early in the morning. Here, you can update the playlist two playlists, etc.; and you can listen to the playlist (the one of them). The related application evaluates that the user has a sufficient amount to listen to the playlist and give signals and suggestions for suggested actions. During the streaming or progressive download, the code engine generates a record that records the code for the streamed audio sample, the user code, the playlist 2: the code, the code for the service sample, and the stream from each version. When I 6 myself. 3H records and some user data enable the intermediary to generate useful information about the person, group, behavior, ‘’’, 'style, age, network, and other users. In addition, straight μ, ', a legal entity that allows the sampling of the sounds (such as music to show) can be communicated between the mediators. In the case of misappropriation, it can be used as when and how.., the person does not have the legal permission of the owner to carry out the string > melon or download the audio sample this _ Α, according to. This record can be added to security protection to avoid unauthorized access. ± . a This can be traced back to the illegal distribution of the original item after the start of legal streaming. In addition, it can be because it has not been recorded. 201117023 Prove that the audio sampling is not received through a legitimate action. In an example, it provides a symphony with 4 movements for streaming. One example of audio sampling is Symphony No. 3 in Erocia, Beethoven. For example, Eroica is led by Willem Mengelberg.

York Philharmonic Orchestra 於 1930 年 1 月 4 日及 9 日在York Philharmonic Orchestra was on January 4th and 9th, 1930

Victor的標籤下錄製,該標籤已不復存在。在此實例中, Victor的權利由Decca Classics取得。因此,法定實體音樂 標籤係Decca Classics。使用前述的同一模板’輸入辨識記 號將變成"Decca Classics 1930 Beethoven Eroica Willem Mengelberg 0901 1930",而該取樣的代碼字串係: "www.deccacl assies, com/1930/Beethoven/Eroica/Wille mMengelberg0901 1930"。為方便起見,此取樣的代碼字串 在以下說明中將稱為CodeWM。 慮及聽眾的行為,其希望音訊取樣的各個樂章應該可 以分開串流。此表示交響曲的樂章係權利獨立的獨特取樣 而必須分別獨立編碼。其代碼字串如下: ” www . deccaclassics . com/1 93 0/Beethoven/Eroica/WillemMengelberg090 1 1930/A1 legro con brio" ” www . deccaclassics . com/1930/Beethoven/Eroica/WillemMengelberg〇9〇11930/Ma rcia funebre: Adagio assai" "www . deccaclassics . com/1930/Beethoven/Eroica/WillemMengelberg0901 1 930/Sc 48 201117023 herz o: Allegro vivace" deccaclassics "WWW · com/1930/Beethoven/Eroica/WillemMengelberg090 1 1930/Fi nale: Allegro molto" 為方便起見,該等代碼字串在以下說明中將稱為 Code WMMovl 、 Code WMMov2 、 Code WMMov3 及 CodeWMMov4(統稱:樂章取樣碼)》交互參照如下表: 母項 子項 順序 • CodeWM Code WMMov 1 1Recorded under Victor's label, the label no longer exists. In this example, Victor's rights are obtained by Decca Classics. Therefore, the legal entity music label is Decca Classics. Using the same template as described above, the input identification symbol will become "Decca Classics 1930 Beethoven Eroica Willem Mengelberg 0901 1930", and the sample code string will be: "www.deccacl assies, com/1930/Beethoven/Eroica/Wille mMengelberg0901 1930". For convenience, this sampled code string will be referred to as CodeWM in the following description. Taking into account the behavior of the audience, it is hoped that the various movements of the audio sampling should be separated. This means that the movements of the symphony are independent and uniquely sampled and must be independently coded separately. The code string is as follows: " www . deccaclassics . com/1 93 0/Beethoven/Eroica/WillemMengelberg090 1 1930/A1 legro con brio" ” www.deccaclassics . com/1930/Beethoven/Eroica/WillemMengelberg〇9〇11930/Ma Rcia funebre: Adagio assai""www . deccaclassics . com/1930/Beethoven/Eroica/WillemMengelberg0901 1 930/Sc 48 201117023 herz o: Allegro vivace" deccaclassics "WWW · com/1930/Beethoven/Eroica/WillemMengelberg090 1 1930/ Fi nale: Allegro molto" For convenience, these code strings will be referred to as Code WMMovl, Code WMMov2, Code WMMov3, and CodeWMMov4 (collectively: Musical Sample Codes) in the following descriptions. Cross-references are as follows: Parent item Order • CodeWM Code WMMov 1 1

CodeWM CodeWMMov2 2CodeWM CodeWMMov2 2

CodeWM CodeWMMov3 3 CodeWM CodeWMMov4 4 每一子項(一樂章代碼)均關聯至其母項(交響曲代碼)。 代碼引擎使上述四篇樂章關聯至c〇deWM並定義預設之順 序以應付該交響曲整首串流之情況。 么立右套用代碼CodeWM,則引擎知道其表示所有的四篇 樂章,因為此代碼代表整首交響曲。若使用其中一樂章代 則將僅串流單—樂章。此分離亦使得D⑽可以定義 ^ 1 m ^ ^ t ^ ^ 務感興趣的使用者及其友人。 一些母項代碼(例如,交響 (例如,樂章代碼)可以曰一代碼)以及二子項代碼 視為-獨立之取樣&、'且代碼集合之元素;該集合將被 該集合的代碼,則其可能需要產生其代碼。若使用到 其將串流該集合的所有元素。 49 201117023 交又參照標頭將是:集合代碼、元素代碼 '順序。並 且’此處的"順序"係集合創建者/擁有者預定的預設順序。 集合的使用者在其使用期間可以改變順序。 舉例而言’將前述音訊取樣納入集合定義: 集合代碼 元素代碼 順序 CodeS1 Code WMMov 1 1 CodeS 1 CodeWM 2 CodeSl Code Audiofile 1 234 3 CodeS2 CodeWM 1 CodeS2 Code Audiofile2345 2 CodeS2 Code Audiofile3456 3 CodeS2 CodeWMMov3 4 集合代碼可以如下所示: "www.deccaclassics.com/BeethovenBritten/Setl" "www.deccaclassics.com/ClassicRockMix/Set2" 其可以被解讀為預先定義之播放清單,例如,其中的 區段名稱BeethovenBritten表示該集合包含源於以灿〇爾 及Britten音樂的已編碼取樣。 圖22已然顯示使用一集合代碼的原則;其係針對一使 用者定義之集合代碼(意即,一播放清單取樣之代碼)。此部 分亦不限於音訊取樣,而是亦可以套用於視訊取樣(其中之 圖框(frame)或圖框之集合各擁有其自己的代碼),及其他取 樣,諸如書籍、遊戲、及廣義的文件(章節,亦包括主文件 50 201117023 和其附件)、新聞報 ^•等和其他項目。CodeWM CodeWMMov3 3 CodeWM CodeWMMov4 4 Each sub-item (a movement code) is associated with its parent (symphony code). The code engine associates the above four pieces of music to c〇deWM and defines the preset order to cope with the entire stream of the symphony. The right code is CodeWM, and the engine knows that it represents all four pieces of music because this code represents the entire symphony. If you use one of the music rules, you will only stream the single-memory. This separation also allows D(10) to define ^ 1 m ^ ^ t ^ ^ interested users and their friends. Some parent code (for example, symphony (for example, music code) can be a code) and two child code as - independent sampling &, 'and the elements of the code set; the set will be the code of the set, then its It may be necessary to generate its code. If used, it will stream all elements of the collection. 49 201117023 The cross reference header will be: collection code, element code 'order. And 'here"" is the preset order in which the collection creator/owner is scheduled. The users of the collection can change the order during their use. For example, 'Incorporate the above audio sampling into the set definition: Collection code element code sequence CodeS1 Code WMMov 1 1 CodeS 1 CodeWM 2 CodeSl Code Audiofile 1 234 3 CodeS2 CodeWM 1 CodeS2 Code Audiofile2345 2 CodeS2 Code Audiofile3456 3 CodeS2 CodeWMMov3 4 The collection code can be as follows Shown: "www.deccaclassics.com/BeethovenBritten/Setl""www.deccaclassics.com/ClassicRockMix/Set2" It can be interpreted as a predefined playlist, for example, where the section name BeethovenBritten indicates that the collection contains Originated from coded sampling with Candel and Britten music. Figure 22 already shows the principle of using a set of codes; it is for a user-defined set of codes (i.e., a code for a playlist sample). This section is also not limited to audio sampling, but can also be used for video sampling (where the frame or frame collection has its own code), and other sampling, such as books, games, and generalized documents. (Chapters also include the main document 50 201117023 and its annexes), newsletters, etc. and other items.

""戈馬區奴係可觸發顯示已編碼取樣以與使用者 互動的應用的将m π erL ··- °。#又。做為代碼一部分的使用者名稱可 觸發一認證程序,要 专水翰入—通行密碼及/或口語句子;此 程序可基於錯誤的認證資料而拒絕使用者的存取。此 異1在目標網路伺服器接收代碼後使用者必須輸入使用 名稱的做法。在後者情形下,使用者必須先認證他是何 而後再也明该宣稱的正當性。此與代碼無關,無須代 ▲馬π刀的參與。在第―種情況下,代碼包含有關使用者是 、的資料且相關應用對代碼的提交做出回應。代碼的一部 刀參與此流程》互動式代碼區段亦可執行更複雜的功能。 牛例而0,作又疋一個如前所述用戶以如下的代碼登入 itunes.apple.c〇m/FKUser%$#/airtimel 0/20100101/201 〇〇422/FrankKist/201004221203" "FKUser%$#”係使用者名稱,此處是經過加密形式。使 用者將此代碼儲存於行動電話上的一個選單選項 music中。他點擊音訊取樣瑪。該代碼一經iTunes接收到 而立即評估該代碼是否一有效代碼,並要求使用者輸入通 行密碼及對行動電話的麥克風說出顯示句子。使用者的輸 入將被與iTiines DB中的認證數值進行比較。若認證正確, 則個人iTunes網站及/或播放清單被開啟,否則將拒絕其存 取。使用者將見到他已經定義的播放清單以及更多内容。 圖2 3顯示一互動式代碼區段的另一個實例。預計時數 用完前’使用者得到一代碼以購買新的/更多放送時間及/ 51 201117023 或在其播放清單中的新音訊取樣的存取權利。為了讓使用 者易於處理,其已知代碼被複製(此複本相當於另一取樣, 此例中之服務係做為取樣:提供予一特定使用者以購買一 產品取樣或諸如"放送時間,,之一服務)並擴充一互動式區 段,該互動式區段代表購買服務並將最後一個區段置換為 提供該服務的日期。最後一個區段中的日期時間被置換成 知供S玄蹲貝服務的日期時間。此例中,使用者購買與預設 相同之產品。傳送的代碼可以如下所示 i tunes .apple. com/FKUser%$#/B uy/airti me 10/20100101/201 00422/FrankKist/201004251723”。此處"Buy music/airtime" 係增加的互動式代碼區段《最後一區段係代碼產生的日期/ 時間。若使用者啟動此代碼,將在成功登入後觸發購買程 序。部分登入程序可以對於此代碼的產生時間是否仍處於 允許啟動的預定區間内的一個評估。登入程序完成後可呈 現包含所有產品的表列目錄’焦點置於一已經編定代碼的 產品。使用者可直接點擊該產品或選擇另一個產品。 付費後,新的組合代碼(此處係代表另一個具有20小時 放送時間的產品取樣),例 如 : "i tunes. apple.com/FKUser%$#/airtime 2 0/201 00301/2010042 2/FrankKist/20100425523 12"被傳送至使用者或傳送至行動 電話上的一個選單選項"My music"中的列表。 圖24例示一個透過使用互動式代碼區段將一系統之一 服務整合入另一個系統的實例。iTunes使用者個人網站上 可提供一服務’其使得使用者可將播放清單的存取權整合 52 201117023 入另個帳戶,舉例而言,一個諸如臉書(Facebook)帳戶的 、群同路帳戶。可以提供另一種服務而使一播放清單取樣 成為可存取,以透過該帳戶顯示予其他使用者,諸如一社 祠路中的聯絡人或朋友,諸如在臉書中的朋友(參見圖 25;^。在上述二種情況中,使用者每一次購買一新產品時, :〇的用戶-產品代碼安裝至帳戶中(例如,諸如臉書的社 群’罔路帳戶)可能均相當累人。將如下服務代碼安裝至個人 帳 Φ _1_ 中可能 較為省 時 itunes.apple.com/Facebook/FKUser%$#/20100422/FrankKis t/PaeebcK)k201〇〇4252313”。該代碼包含登錄顧客的法定實 體額外中介者、經過編碼的使用者名稱、顧客登錄日期' 顧客名稱和服務的辨識記號加上產生該代碼的日期/時間。 此日期同時亦是提供該服務給特定用戶的日期。此代碼代 表種特定服務(一種做為取樣的服務),藉由在一特定時刻 夺提供予一特定用戶而被個人化。產生後,該代碼緊接 著可被傳送至使用者以將其輸入該使用者的臉書帳户。其 可藉由安裝程序檢查該代碼,使得安裝完成於臉書網站及 使用者的帳戶。該安裝程序可被限制於代碼產生後的一段 寺疋期間。啟用戎等檢查可表示臉書及iTUnes間的合作。 心像出較為簡單的作法’如圖24所示。使用者將所接 收的代碼上傳成為臉書帳戶的内容並自臉書帳戶啟動連 結。iTunes登入程序辨認出該代碼並在第一次啟動期間評 估其效力。此後,iTunes的使用者個人網點處的預設登入 私序使用者可以在其正在使用臉書時啟動該代碼。 53 201117023 圖中的數目字定義動作的順序。 現在’播放清單取樣不再是接收代碼的一部分,且若 使用者具有其提士的有效播放清單取樣碼,則iTunes應用 程式必須擷取該播放清單。此可以輕易完成,因為用戶代 碼關聯至調整後的播放清單取樣碼。若使用者曾購買數個 諸如播放清單的服務取樣,則可用的預計時數係所有有效 播放清單預計.時數的總和。如前所述,使用者亦可決定其 欲自位於其臉書帳戶中的播放清單顯示音樂的標題。 在此情況下’除了用來聆聽其播放清單的代碼外,該 使用者必須取得另一個服務代碼並予以安裝。此另一個代 碼不需要一使用者名稱區段(此例中係FKUser%$#);其不使 用使用者名稱,而是包含一個稱為”朋友,,的互動式區段。 此一代碼的一實例可以是"itunes · apple · com/Facebook/Friends/20100422/FrankKist/FacebookPlaylis t201004290907"。最末一個區段同樣包含服務提供時間,其 可以等於產生曰期/時間。 §亥代碼可被安裝於使用者的臉書帳戶中。若經過啟 動,則將存取Frank Kist個人的播放清單(透過iTunes資料 庫中已知的關聯性)。然而’播放清單中的音樂並未在此代 碼啟動後被串流。僅有版本取樣的一些Ί全釋資料係以表列 目錄形式顯示;若所點擊表列目錄中的版本取樣項目允許 該使用者的音樂與其朋友分享’則可串流該取樣的更多内 容。該表列目錄並非儲存於社群網路帳戶(此例中係臉書) 之中;其係開啟於iTunes網站上的原始位置。如圖25所示, 54 201117023 可提供有諸如成為顧客和複製播放清單之其他服務。啟動 此服務可包含在iTunes網站中開啟一新的個人頁面,蒐隼 2用者識別資料以成為—顧客。此外’敎的播放清單複 係自動產生的;然而,該複本得到—個新的代碼,因為 〃現在是新顧客的播放清單取樣;他可在其個人頁面上對 其進行修改。他只有在自己完成講買產品、接收代碼、啟 動代碼、登入等動作後方能從該播放清單跨聽音樂。 安全性及隱私性的考量 f生帛慮之一係如何適當處理與倜人特別相關的 資料。在-實施例中,.系統針對以不同於使用者預定的用 途=用貝料之前,先取得每一使用者的明確同意。給定的 同意加上該同意的用途將加入文件中。相關應用的存取功 能性輔助確保對個人資料的存取係受到管控。在一實施例 I ’其針對希望特;t個人正在❹代碼完全不予公開的特 ^所有與以代碼(代碼區段)内容的形式有關的個人資 料均可透過加密或別名的形式收送。 代碼的正確性:每一接收代碼均對照資料庫中的代碼 進行鑑定。該鐘定程序只有在接收代碼存在且尚未被刪除 的情況下才會繼續進行。 右一代碼在代碼區段甲含有諸如使用者名稱或機密性 服務名稱的安全性咨# ° 則此等區段可被加密或使用別名 以增進隱私性及安全性。代碼亦可藉由—區段進行擴充, ㈣段包含有效性資料’例如,其餘代碼字率或其一部分 的切細數值(hash vaiue)。在接收代媽並對照資料庫查驗代 55 201117023 碼的存在之後,亦可以對該有效性資料加以管 針對特別的應用开〗能普^ & ^ ^ 一 孓匕、貫施,因為原始的代碼可以被替換点 已經存在資料庫中的形式,例如,被-犯罪的使用者葬由 分析代碼的模式而達成。 曰 使用者識別及認證:其可以依據取樣的特定 使用者隱私性的需要而結合不同形式的控制方 識別身分的管拎玎A # 使用者 幻g控了以透過母次使用者提交代碼以 悉一必要元素或以純文字、加密、 冲π沾—加、 4亿名心式做為該提交 代馬的刀而證明該使用者擁有一必要元素之 供一使用者名稱。使用者識別身分的認證,其實施方式= ^⑴藉由以-通行密物或—問答遊戲、或其他^ 使用者的知悉程度;(Π)藉由證明使用者擁有必 定^ 準,諸如用以值译成饭认壯】疋4示 — 乂傳送代碼的裝置的IP位址及/或具有至少— 疋&段的代碼本身、或其他選項;或㈣藉由透過 丨 檢查使用者的個人辟n . 物機制 個人特倣,诸如聲音、視網膜、及/或指紋 、以電子方式提供手寫簽名、或其他選項。 、 用於公開用途的代碼(例如商業廣告接收者的 不需使用者識別哎切證 ^ α)可 所參訪的者的1?位址遭到 U冓健存,制者可能需要被告知並被级予 該商業網點的機會,此亦可能牵涉到隱私權的考° 量。 ⑽二:諸二防火牆、封包過遽器、阻斷服務攻擊防禦 e ence)及其他技術手段防止目標在濫用 裝成5法實體或中介㈣位址的網際網路協定欺編行為偽 對取樣或取樣的數位表示方式及專門資料的存取:可 56 201117023 以使用最新的功能封裝取樣 關功能之存取。該等功科並僅允昨透過代碼及相 ㈣透過-犯罪的系統;理:=:二^ 控對稽核紀錄的存取。 取樣以及其數位和實體表示方式的追縱及追溯:所有 的實體和數位取樣或者取樣的表示方式可以❹其代碼加 取決於料取樣,代碼的接收者亦同樣可以被編 疋 且此代碼加上取樣的代碼可以列印於取樣上或 實施於取樣中’以顯示哪—個接收者曾處理一取樣、下載 一複本、對其進行列印、或採取其他動作。 所有取樣碼均可包含該取樣的法定實體做為代碼的一 部分》 其應注意前述的實施例係用以例示而非限制本發明, 且白於斯藝之人士應能據以在未脫離後附申請專利範圍涵 蓋的犯疇下設計出許多替代之實施例。動詞,,包含"及其變化 形之使用ϋ未排除指定於巾請專利範圍t外的#件或步驟 之存在。位於一構件前的冠詞"一"並未排除複數此種構件之 存在。特定手段引用於申請專利範圍中彼此互異的附屬請 求項並不表示使用該等手段之組合係沒有助益的。 【圖式簡單說明】 所附圖式例示本發明之非限定實施例,其中: 圖1 - A顯示依據本發明一實施例之一内容散佈系統及 一使用者裝置的功能方塊圖, 57 201117023 圖1顯示依據本發明—實施例中用於編譯取樣碼的方 法的一示意圖, 圖2顯示用於獲得一音樂檔案之存取的方法的一示意 圖’ S玄音樂樓案關聯如圖1所示之取樣碼, 圖3顯示依據本發明—實施例中另一用於編譯取樣碼 的方法的示意圖, 圖4顯示依據本發明一實施例中定義用於建立取樣碼 之一取樣碼模板的一流程圖, 圖5顯示具體指定依據顯示於圖4的流程圖所定義之 取樣碼模板的一流程圖, 圖6顯示將一數位路徑連結至依據圖5所示流程圖所 產生之一取樣碼的一流程圖, 圖7顯示產生依據圖5所示流程圖所產生取樣碼之一 圖像表示方式的一流程圖, 圖8顯示儲存一設有依據圖5所示流程圖所產生取樣 碼之一文件的一流程圖, 圖9顯示開啟一設有依據圖5所示流程圖所產生取樣 碼之文件的一流程圖, 圖10顯示處理一使用者用以獲得一數位取樣存取之請 求的一流程圖’該數位取樣設有依據圖5所示流程圖所產 生的取樣碼, 圖11至15顯示有關如何為一數位文件建立一依據本 發明一實施例之取樣碼的實例的示意圖, 圖16至1 7顯示有關如何利用一依據本發明一實施例 58 201117023 之取樣碼獲得一數位取樣的存取的實例的示意圖,以及 圖1 8至25顯示有關如何利用一依據本發明一實施例 之取樣碼保護音訊取樣的實例的示意圖。 【主要元件符號說明】 1 :内容散佈系統 2 :數位取樣 3 ·特有取樣碼 4 :使用者裝置 5 :代碼編譯引擎 6 :代碼資料庫 7 :存取引擎 8 :數位取樣資料庫 9 :存取邏輯 10 :取樣儲存器 11 :取樣碼 12 :數位音訊取樣 1 3 :代碼模板 14 :使用者 1 5 :不同網路位址 16 :交互參照資料庫 17 :網頁瀏覽器 1 8 :取樣碼 1 9 :代碼模板 20 :使用者 59""Goma District slaves can trigger m π erL ··- ° for applications that have coded samples to interact with the user. #also. A user name that is part of the code can trigger an authentication process that requires a password and/or a spoken statement; this program can deny user access based on the wrong authentication material. This difference 1 must be entered by the user after the target web server receives the code. In the latter case, the user must first authenticate who he is and then justify the claim. This has nothing to do with the code, no need to participate in the ▲ Ma π knife. In the first case, the code contains information about the user, and the application responds to the submission of the code. A part of the code is involved in this process. The interactive code section can also perform more complex functions. For example, the user has the following code to log in to itunes.apple.c〇m/FKUser%$#/airtimel 0/20100101/201 〇〇422/FrankKist/201004221203""FKUser%$#" is the user name, here is the encrypted form. The user stores this code in a menu option music on the mobile phone. He clicks on the audio sample. The code immediately evaluates the code as soon as it is received by iTunes. A valid code, and ask the user to enter the passphrase and say the sentence to the microphone of the mobile phone. The user's input will be compared with the authentication value in iTiines DB. If the authentication is correct, the personal iTunes website and / or play The list is opened, otherwise access will be denied. The user will see the playlist he has defined and more. Figure 2 3 shows another example of an interactive code section. Get a code to purchase new/more delivery time and / 51 201117023 or access rights to new audio samples in its playlist. For the user to handle it easily, The known code is copied (this copy is equivalent to another sample, the service in this case is taken as a sample: provided to a specific user to purchase a product sample or such as "delivery time, one service) and expand one An interactive section that represents the purchase of a service and replaces the last section with the date on which the service was provided. The date and time in the last section is replaced by the date and time of the service for S Xuanbeibei. In the example, the user purchases the same product as the preset. The code transmitted can be as follows: i tunes .apple. com/FKUser%$#/B uy/airti me 10/20100101/201 00422/FrankKist/201004251723". Here "Buy music/airtime" is the added interactive code section "The date/time generated by the last section of the code. If the user activates this code, the purchase will be triggered after a successful login. Partial login procedures can evaluate whether the time at which this code was generated is still within a predetermined interval that is allowed to start. Once the login process is complete, a list of catalogs containing all products will be presented. The focus is placed on a product that has been coded. The user can click on the product directly or select another product. After payment, the new combination code (here represents another product with a 20-hour delivery time), for example: "i tunes. apple.com/FKUser%$#/airtime 2 0/201 00301/2010042 2/ FrankKist/20100425523 12" is sent to the user or to a list of menu options "My music" on the mobile phone. Figure 24 illustrates an example of integrating one service of one system into another by using an interactive code section. A service can be provided on the iTunes user's personal website, which allows the user to integrate the access rights of the playlist into another account, for example, a Facebook account, a group account. Another service can be provided to make a playlist sample accessible for display to other users through the account, such as a contact or friend in a social network, such as a friend in Facebook (see Figure 25; ^ In both cases, each time a user purchases a new product, the user-product code installed into the account (for example, a community account such as Facebook) may be quite tiring. Installing the following service code into the personal account Φ _1_ may be more time-saving itunes.apple.com/Facebook/FKUser%$#/20100422/FrankKis t/PaeebcK)k201〇〇4252313". This code contains the legal entity that logs in to the customer. The mediator, the encoded user name, the customer login date 'customer name and the identification number of the service plus the date/time the code was generated. This date is also the date the service was provided to a specific user. This code represents a specific A service (a service that serves as a sample) is personalized by providing it to a specific user at a particular moment. Once generated, the code can then be transmitted to The user enters the user's Facebook account. The code can be checked by the installer so that the installation is completed on the Facebook website and the user's account. The installer can be restricted to a section after the code is generated. During the temple period, the activation of 戎 and other checks can indicate the cooperation between Facebook and iTUnes. The heart is like a simpler method as shown in Figure 24. The user uploads the received code into the contents of the Facebook account and from the Facebook account. Launch the link. The iTunes login program recognizes the code and evaluates its effectiveness during the first launch. Thereafter, the default login private user at the iTunes user's personal site can launch the code while they are using Facebook. 53 201117023 The number in the figure defines the order of actions. Now the 'playlist sampling is no longer part of the receiving code, and if the user has a valid playlist sample code for his thief, the iTunes app must retrieve the playlist. This can be done easily because the user code is associated with the adjusted playlist sample code. If the user has purchased several such as play For the service sample of the list, the estimated number of hours available is the sum of the expected hours of all valid playlists. As previously mentioned, the user may also decide to display the title of the music from the playlist located in his Facebook account. In this case, in addition to the code used to listen to its playlist, the user must obtain another service code and install it. This other code does not require a username field (in this case, FKUser%$# ); instead of using a username, it contains an interactive section called "Friends,". An example of such a code would be "itunes · apple · com/Facebook/Friends/20100422/FrankKist/FacebookPlaylis t201004290907". The last section also contains the service provision time, which can be equal to the generation period/time. The hai code can be installed in the user's Facebook account. If activated, Frank Kist's personal playlist will be accessed (via the known associations in the iTunes library). However, the music in the playlist is not streamed after this code is launched. Some of the full-release data that is only sampled is displayed in the form of a table of contents; if the version of the sampled item in the list of selected pages allows the user's music to be shared with his friends, then more of the sampled content can be streamed. The list is not stored in the social network account (in this case, Facebook); it is opened in the original location on the iTunes website. As shown in FIG. 25, 54 201117023 may provide other services such as becoming a customer and copying a playlist. Launching this service can include opening a new personal page on the iTunes website and searching for 2 user identification data to become a customer. In addition, the playback of the playlist is automatically generated; however, the copy is given a new code because it is now a sample of the new customer's playlist; he can modify it on his personal page. He can listen to music from the playlist only after he has finished speaking, buying the product, receiving the code, starting the code, logging in, etc. Security and privacy considerations One of the concerns is how to properly handle information that is particularly relevant to deaf people. In an embodiment, the system obtains explicit consent from each user prior to using the bedding material differently than the user's intended use. The given consent plus the use of the consent will be added to the document. The accessibility of related applications assists in ensuring that access to personal data is controlled. In an embodiment I' which is intended to be unobtrusive; all personal data relating to the form of code (code section) content may be received by encryption or alias. The correctness of the code: Each received code is authenticated against the code in the database. This program will only continue if the receiving code exists and has not been deleted. The right code contains a security policy such as the username or confidential service name in code section A. These sections can be encrypted or aliased to enhance privacy and security. The code can also be augmented by a section, which contains the validity data 'e.g., the hash code of the remaining code word rate or part thereof (hash vaiue). After receiving the surrogate and checking the existence of the code 2011 20112323 code, it is also possible to control the validity data for the special application, and the original code is used. The point that can be replaced is already in the form of the database, for example, the sinister user is buried by the pattern of the analysis code.曰 User identification and authentication: It can be combined with different forms of control to identify the identity of the user according to the needs of the specific user's privacy of the sample. ## The user is controlled to submit the code through the parent and child. A necessary element or a plain text, encryption, rushing, adding, and 400 million hearts as the knife for submitting the daisy prove that the user has a necessary element for a user name. User identification identity authentication, implementation method = ^ (1) by - through the secret or - quiz game, or other ^ user's level of knowledge; (Π) by proving that the user has a certain standard, such as The value is translated into a meal. 疋4 shows the IP address of the device transmitting the code and/or the code itself with at least the 疋& segment, or other options; or (d) by checking the user's personal plaque through 丨n. Physical mechanism personal imitations, such as sound, retina, and/or fingerprints, electronically providing handwritten signatures, or other options. The code for public use (for example, the commercial advertisement recipient does not need the user identification certificate ^ α), the 1st address of the person who visited may be saved by the U, and the system may need to be informed and The opportunity to be given to the commercial outlet may also involve the examination of privacy rights. (10) 2: SF2 firewalls, packet filters, blocking service attack defenses, and other technical means to prevent the target from abusing the Internet Protocol Bullying behavior of the 5 law entities or intermediary (4) addresses. Sampling digital representation and access to specialized data: 56 201117023 Encapsulate the sampling off function with the latest features. These merits are only allowed to pass through the code and the (4) through-crime system; rational: =: 2 control access to the audit record. Sampling and tracing and tracing of its digital and physical representation: all entities and digital samples or samples can be represented by their code plus dependent samples, and the recipient of the code can also be compiled and added with this code. The sampled code can be printed on the sample or implemented in the sample to show which recipient has processed a sample, downloaded a copy, printed it, or taken other actions. All sampling codes may contain the legal entity of the sample as part of the code. It should be noted that the foregoing embodiments are intended to illustrate and not to limit the invention, and that the person skilled in the art should be able to Many alternative embodiments have been devised in the context of the patent application. The use of the verb, including "and its variations, does not preclude the existence of a #piece or step specified outside the scope of the patent. The article "quote" in front of a component does not exclude the existence of plural such components. The use of an affiliate request that differs from the scope of the patent application by a particular means does not mean that the use of a combination of such means is not helpful. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 - A shows a functional block diagram of a content distribution system and a user device according to an embodiment of the present invention, 57 201117023 1 shows a schematic diagram of a method for compiling a sample code in accordance with the present invention, and FIG. 2 shows a schematic diagram of a method for obtaining access to a music file. Sample code, FIG. 3 shows a schematic diagram of another method for compiling a sample code in accordance with the present invention, and FIG. 4 shows a flow chart for defining a sample code template for establishing a sample code in accordance with an embodiment of the present invention. FIG. 5 shows a flow chart specifically specifying the sampling code template defined in the flowchart shown in FIG. 4. FIG. 6 shows a flow of linking a digital bit path to one of the sampling codes generated according to the flowchart shown in FIG. FIG. 7 is a flow chart showing an image representation of one of the sampling codes generated according to the flow chart shown in FIG. 5, and FIG. 8 is a storage showing a sampling generated according to the flow chart shown in FIG. A flow chart of one of the code files, FIG. 9 shows a flow chart for opening a file having a sampling code generated according to the flow chart shown in FIG. 5, and FIG. 10 shows a process for processing a user to obtain a digital sample access. A flow chart of the request 'the digital sampling is provided with a sampling code generated according to the flow chart shown in FIG. 5, and FIGS. 11 to 15 show a schematic diagram of how to establish a sampling code according to an embodiment of the present invention for a digital file. Figures 16 through 17 show schematic diagrams of an example of how to obtain a digitally sampled access using a sample code according to an embodiment 58 201117023 of the present invention, and Figures 18 through 25 show how to utilize an implementation in accordance with the present invention. An example of an example of a sample code to protect audio samples. [Main component symbol description] 1 : Content distribution system 2 : Digital sampling 3 · Unique sampling code 4 : User device 5 : Code compilation engine 6 : Code database 7 : Access engine 8 : Digital sampling database 9 : Access Logic 10: Sample Memory 11: Sample Code 12: Digital Audio Sample 1 3: Code Template 14: User 1 5: Different Network Addresses 16: Cross Reference Library 17: Web Browser 1 8 : Sample Code 1 9 : Code Template 20: User 59

Claims (1)

201117023 七、申請專利範圍: 一種用於編譯數位取樣之特有取樣碼的方法,包含: A)定義至少—取樣碼模板,其包含多個待使用以針對 -數位取樣建立—取樣碼的取樣碼區&,該等取樣碼區段 至少包含: 一一取樣擁有者識別碼區段,和 --取樣識別碼區段; —)八體指定待使用以建立該取樣碼之取樣碼區段之内 容’其"玄取樣擁有者識別碼區段被具體指定為該數位取 樣之-擁有者之-網際網路位址’特別是_ ιρ位址及/或一 網域名稱; C) 串連已具體指定之取樣碼區段以形成該取樣碼; D) 定義通往一數位位置之一數位路徑,可透過該數位 位置來獲得對該數位取樣之存取;以及 E) 若該取樣褐和該數位路徑係彼此互異則在步驟^ 所產生的取樣碼和在步冑D)所定義的數位路徑之間建立一 交互參照。 2.依據申請專利範圍第w之方法,其中該數位路徑代 表—全球資源定位器(URL)。 3_依據巾請專利範圍第項之方法,其中該數位路 徑參照所儲存該數位取樣的數位位置,特別是一網路位置。 人4·依據申請專利範圍第1或2項之方法,其中該方法包 3步驟F) ’其包含將該取樣碼、該數位路徑、及介於該取 樣碼和該數位路徑間的交互參照儲存於—資料庫中。 201117023 依據則述申請專利範圍任一項之方法,其中至少一部 分之該數位路徑與該取樣碼係相同的。 6.依據申晴專利範圍第5項之方法其中該取樣碼與該 數位路徑係至少大致相同的。 依據則述申請專利範圍任一項之方法,其中該方法包 含步驟G),並a Λ 丹包含將形成於步驟C)的取樣碼轉換成一機器 可讀取格式。 依據則述申請專利範圍任一項之方法,其中該方法包 步1^ ,盆 、包含將至少該取樣碼的取樣識別碼區段轉譯 成另一語言。 據引述申请專利範圍任一項之方法,其中在步驟 )/取樣哉別碼區段被具體指定為有關該數位取樣之可 識別詮釋資料。 —依據別述申請專利範圍任一項之方法,《中在步驟 A)所疋義之取樣碼區段更包含—使用者相關代碼區段。 依據則述申請專利範圍任一項之方法,纟中在步驟 A)所定義之取樣石馬區段更包含一中介代碼區段。 依據前述申請專利範圍任一項之方法,其中在 增:義之取樣碼區段更包含-檢核代碼區段,其代表至 少一其他取樣碼區段之-預定數學處理之結果。 _ = = =述申請專利範圍任一項之方法,其中在步驟 段。 又更包έ 一取樣碼安全性識別碼區 14·依據前述申請專利範圍任 項之方法 其中在步驟 61 201117023 A)定義至少一標點符號以在步驟c)分隔相鄰之代碼區段。 15‘依據前述申請專利範圍任—項之方法,纟中在步驟 A)定義待串連之已定義代碼區段之—順序。 Μ.依據前述中請專利範圍任—項之方法,其中步驟a) -再重複執行以產生多重取樣碼模板,其中該方法更包含 步驟”’其包含在執行步驟8)前選擇一待套用之代碼模板。 種用於提供具有特有取樣碼之數位取樣的方法, 包含: J) 建立一數位取樣; 16項任一項所述之方法編 K) 依據申請專利範圍第1至 譯該數位取樣之一特有取樣碼; L) 以至少-已編譯取樣碼標記該數位取樣; M) 儲存該數位取樣於—數位位置; N) 儲存該取樣碼;以及 右 > "、、N咏数位位 此互=^路#與該取樣碼之間建二:= 18. 依據申請專利範圍第17 牛ΗΚϋ、 ^ ^ X , 之方/去’其中該方法包含 步驟Ρ),其包含提供該取樣 至°玄數位取樣之一使用去, 特別是該數位取樣之創建者。 者 19. 依據申請專利範圍第丨8 該數位取樣之制麵料Μ該取“的-^Ρ), 20. 依據申請專利範圍第丨 鄄件。 不1 /至19項任一項之方 中該取樣碼代表該數位取樣之—檔案名稱。 忐,其 2 1 ·依據申請專利範圍第丨7 U項任一項之方法,豆 62 201117023 中該取樣碼被嵌入該數位取樣做為詮釋資料。 22.—種用於獲得對數位取樣之存取的方法,該數位取 樣設有依據申請專利範圍第17至21項任一項之一特有取 樣碼,該方法包含: Q) 提供該取樣碼予一使用者; R) 允許該使用者將該取樣碼輸入一網頁瀏覽器;以及 S) 將該使用者重新導向至所健存有該數位取樣之數位 位置。 依龈甲请專利範圍第22項之方法,其中在步驟r), 該取樣碼作為網路位址被輸人該網㈣覽器之位址搁中。 24. 依據申請專利範圍第22或23項之方法,1中在牛 驟S)中’於步驟R)輸人之該取樣㈣轉擇成連結至__ 該數位取樣之該數位位置之數位路徑,㈣是—败。 25. 依據中請專利範圍第24項之方法,其中在步驟s) 嫌於步冑R)輸人之取樣碼與儲存於—㈣庫中的—對應 參昭:進仃比較中該使用者透過該儲存取樣碼之交互 …、“重新導向至所儲存於該資料庫中之—數位路經。 其中Γ:驟據申請專利範圍第22至25項中任-項之方法, 用者,1中二中,遠取樣碼係以超連結之形式提供予該使 自動地輪入兮取I Γ中’該使用者可藉由點擊該超連結而 J八5玄取樣碼至該網頁劉覽器。 腦可2執7行二電腦可執行指令之電腦可讀取媒體,該電 請專利範圍曰;i被載入一電腦系統時提供該電腦系統如申 孕&固第1至Mjg杯 适士 25項任項中所述方法之功能。 63 201117023 28. —種取樣碼,其依據申請專利範圍第1至p項中任 一項之方法所編譯。 29. —種資料庫,其包含介於依據申請專利範圍第μ項 之一取樣碼與通往一數位位置之一數位路徑之間的至少一 交互參照,其中關聯該取樣碼之一數位取樣儲存於該數位 位置。 30. -種用於編譯特有取樣碼之系統,該系統使用依據 申請專利範圍第丨至17項中任一項之方法,該系統包含: —至少一取樣碼模板產生器,用以定義至少一取樣碼 模板,該取樣碼模板包含多個待使用以針對一數位取樣建 立一取樣碼的取樣碼區段,該等取樣碼區段至少包含一取 樣擁有者識別碼區段、和一取樣識別碼區段; -至少-取樣碼區段指定模組,連接至該模板產生器 以用於具體指定藉由該取樣碼模板產生器所定義之取樣碼 區段之内容,纟中該取樣擁有者識別碼區段被具體指定為 該數位取樣之-擁有者之-網際網路位址,特別是一心立 址及/或一網域名稱; -至少-代碼產生器’連接至該模板產生器及該指定 模組以用於串連具體指;t之取樣碼區段而形成該取樣碼; 及 用以儲存介於所產生之一取樣碼和 一至少一資料庫 至少一交互參照,若 則可經由該數位位置 通往一數位位置的一數、位路徑之間的 該取樣碼和該數位路徑係彼此互異, 獲得對該數位取樣之存取。 64 201117023 31.依據申請專利範圍第3〇項之 含-取樣儲存裝置,用以儲存位於」數、中該系統更包 樣,其數位路徑係儲存於該資料庫中。&置之<數位取 统更申請專利範圍第3。或31項之系統,其中㈣ ,洗更。3至>、一服務模組以掌控該系統發出—代碼。 33.依據申請專利範圍第3〇至32項中任一項之系統, 其:該系統更包含-數位使用者介面,用以管控該模板產 生益、該指定模組、和該代碼產生器。 34.依據申請專利範圍第3〇至”項中任一項之系統, ”中-亥系統更包含一通信模組,帛以將所產生之取樣碼傳 送至一使用者。 3 5.種處理用以獲得對數位取樣之存取之請求的系 統,3亥數位取樣設有依據申請專利範圍第28項的取樣碼, 该系統包含: 一網路用戶端’用以允許一使用者輸入該取樣碼;及 一處理模組’連接至該網路用戶端,用以對輸入之取 樣碼與儲存於如申請專利範圍第30項所定義之資料庫中之 一對應取樣碼進行比較,其中該使用者被重新導向至該資 料庫中作為該儲存取樣碼之交互參照所儲存的一數位路 挺,以獲得對該數位取樣之存取。 八、圖式·· (如次頁) 65201117023 VII. Patent Application Range: A method for compiling a unique sampling code for digital sampling, comprising: A) defining at least a sampling code template containing a plurality of sampling code regions to be used for establishing a sampling code for - digital sampling &, the sample code segments include at least: a sample owner identification code segment, and -- a sample identification code segment; -) an eight-body designation to be used to establish the content of the sample code segment of the sample code The 'its" Xuan Sampling Owner ID field is specified as the number of samples - the owner - the Internet address 'especially _ ιρ address and / or a domain name; C) Specifically specifying a sample code segment to form the sample code; D) defining a digital path to a digit position through which access to the digital sample can be obtained; and E) if the sample is brown and The digital paths are mutually different, and an interactive reference is established between the sample code generated in step ^ and the digital path defined in step D). 2. According to the method of patent application scope w, wherein the digital path represents a global resource locator (URL). The method of claim 1, wherein the digit path refers to a digit position where the digit is stored, in particular a network location. The method of claim 1 or 2, wherein the method package 3 step F) 'includes storing the sample code, the digit path, and an inter-reference between the sample code and the digit path In the database. The method of any one of the claims, wherein at least a portion of the digit path is the same as the sample code. 6. The method of claim 5, wherein the sample code is at least substantially identical to the digital path. The method of any of the claims, wherein the method comprises the step G), and the method comprises converting the sample code formed in the step C) into a machine readable format. A method according to any one of the preceding claims, wherein the method comprises the step of translating at least the sample identification code segment of the sample code into another language. The method of any of the claims is recited, wherein the step/sampling code segment is specifically designated as an identifiable interpretation of the digital sample. - According to the method of any one of the claims, the sampling code segment defined in "Step A" further includes a user-related code section. According to the method of any of the claims, the sampling stone horse segment defined in the step A) further comprises an intermediate code segment. A method according to any one of the preceding claims, wherein the incrementing code segment further comprises a check code segment representing the result of a predetermined mathematical process of at least one other sample code segment. _ = = = The method of claiming any one of the scope of the patent, in the step. Still further, a sample code security identification code area is provided. 14. The method according to any of the preceding claims, wherein at step 61 201117023 A) at least one punctuation mark is defined to separate adjacent code segments in step c). 15 'According to the method of the preceding claims, the method of determining the sequence of the defined code segments to be concatenated in step A). The method of any of the preceding claims, wherein the step a) is repeated to generate a multiplexed code template, wherein the method further comprises the step "which comprises performing a step 8" before selecting a to-be-applied A code template for providing a digitally sampled sample having a unique sample code, comprising: J) establishing a digital bit sample; and the method of any one of the sixteenth aspect is K) according to the patent application scope 1 to the digital sample a unique sampling code; L) marking the digital sampling with at least a compiled sampling code; M) storing the digital sampling at the - digit position; N) storing the sampling code; and right >", N咏 digits Mutual = ^ Road # and the sampling code between two: = 18. According to the scope of the patent application, the 17th calf, ^ ^ X, the side / go 'where the method contains the steps Ρ), which includes providing the sample to ° One of the black-digit sampling is used, especially the creator of the digital sampling. 19. According to the scope of the patent application, the number of fabrics sampled by the digital number should be "--Ρ", 20. SoftwareIn the case of any one of no 1 to 19, the sample code represents the file name of the digital sample.忐, its 2 1 · According to the method of claim U7 U of the scope of the patent application, the sample code is embedded in the sample of the bean 62 201117023 as the interpretation data. 22. A method for obtaining access to a digital sample having a unique sampling code according to any one of claims 17 to 21 of the patent application, the method comprising: Q) providing the sampling code to a user; R) allowing the user to enter the sample code into a web browser; and S) redirecting the user to a digital location where the digital sample is stored. According to the method of claim 22, in step r), the sample code is used as a network address to be placed in the address of the network (four) browser. 24. According to the method of claim 22 or 23, the sample (in step 1) of the input in the step S) is selected to be connected to the digital path of the digit position of the digital sample. (4) is - defeat. 25. According to the method of claim 24 of the patent application, wherein in step s), the sampling code of the input of the 胄 胄 ) ) 与 与 与 ) ) ) ) 输 输 输 : : : : : : : : : : The storage sample code interaction..., "redirects to the digital path stored in the database. Among them, the method according to any of the claims 22 to 25, the user, 1 In the second, the far-sampling code is provided in the form of a hyperlink to automatically rotate into the capture file. The user can click on the hyperlink to access the web browser. The brain can hold 2 lines and 7 lines of computer-executable instructions for computer-readable media. The scope of the application is 曰; i is provided when the computer system is loaded into a computer system, such as the pregnancy & 1st to Mjg cups. The function of the method described in the 25 items. 63 201117023 28. A sampling code compiled according to the method of any one of claims 1 to p. 29. A database containing According to one of the μth items of the patent application range, the sampling code and the digital path to one of the digit positions At least one cross reference between the digital samples associated with one of the sample codes stored in the digit position. 30. - A system for compiling a unique sample code, the system is used according to the scope of patent application No. 17 to 17 In one method, the system includes: - at least one sample code template generator for defining at least one sample code template, the sample code template comprising a plurality of sample code segments to be used to establish a sample code for a digital sample The sample code segment includes at least one sample owner identification code segment and a sample identification code segment; at least a sample code segment designation module coupled to the template generator for specific designation by The content of the sample code segment defined by the sample code template generator, wherein the sample owner identification code segment is specifically designated as the address of the digital sample - the Internet address of the owner, especially the center of mind And/or a domain name; - at least - a code generator is coupled to the template generator and the designated module for concatenating the sampling code segment of t; And storing at least one cross reference between the generated one of the sample code and the at least one database, if the number of digits from the digital position to the digit position, the sample code between the bit path and the The digital path is different from each other to obtain access to the digital sample. 64 201117023 31. The inclusion-sampling storage device according to the third aspect of the patent application is for storing the "number", the system is more packaged, The digital path is stored in the database. &<Digital Patent Application No. 3. Or 31 items of the system, of which (four), wash more. 3 to >, a service module to control the system to issue - code. A system according to any one of claims 3 to 32, wherein the system further comprises a digital user interface for controlling the template yield, the designated module, and the code generator. 34. The system according to any one of claims 1-3, wherein the medium-high system further comprises a communication module for transmitting the generated sampling code to a user. 3 5. A system for processing a request for accessing a digital sample, the 3H digital sampling is provided with a sampling code according to the scope of claim 28, the system comprising: a network client 'to allow one The user inputs the sampling code; and a processing module is connected to the network client for performing the sampling code of the input and the corresponding sampling code stored in a database as defined in claim 30 In comparison, wherein the user is redirected to the database as a number of bits stored in the cross-reference of the stored sample code to obtain access to the digital sample. Eight, schema · (such as the next page) 65
TW099121009A 2009-09-07 2010-06-28 Method and system for compiling a unique sample code for a digital sample TW201117023A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
NL2003447A NL2003447C2 (en) 2009-05-20 2009-09-07 METHOD AND SYSTEM FOR CODING AND SPECIFICATING AN OBJECT.
PCT/NL2009/050598 WO2010134802A1 (en) 2009-05-20 2009-10-06 Method and system for coding and specifying an object
PCT/NL2010/050303 WO2010134813A1 (en) 2009-05-20 2010-05-20 Method and system for compiling a unique sample code for a digital sample

Publications (1)

Publication Number Publication Date
TW201117023A true TW201117023A (en) 2011-05-16

Family

ID=44581694

Family Applications (2)

Application Number Title Priority Date Filing Date
TW099121009A TW201117023A (en) 2009-09-07 2010-06-28 Method and system for compiling a unique sample code for a digital sample
TW099121010A TW201113733A (en) 2009-09-07 2010-06-28 Physical product sample provided with at least one product sample code

Family Applications After (1)

Application Number Title Priority Date Filing Date
TW099121010A TW201113733A (en) 2009-09-07 2010-06-28 Physical product sample provided with at least one product sample code

Country Status (2)

Country Link
AR (2) AR077017A1 (en)
TW (2) TW201117023A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI761331B (en) * 2016-03-11 2022-04-21 香港商阿里巴巴集團服務有限公司 Sample serialization method and apparatus

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI761331B (en) * 2016-03-11 2022-04-21 香港商阿里巴巴集團服務有限公司 Sample serialization method and apparatus

Also Published As

Publication number Publication date
TW201113733A (en) 2011-04-16
AR077034A1 (en) 2011-07-27
AR077017A1 (en) 2011-07-27

Similar Documents

Publication Publication Date Title
CN110495132B (en) System and method for generating, uploading and executing code blocks within distributed network nodes
US20110231397A1 (en) Method and system for compiling a unique sample code for a digital sample
CN109792553B (en) Distributed data storage for managing media
US8560840B2 (en) Method and system for authenticating a widget
JP5867875B2 (en) Signature verification program
US9491150B2 (en) Document-authorized access to a shared workspace
CN101304414B (en) Information processing system, information processing apparatus, information processing method and program
KR20200002985A (en) Data sharing methods, clients, servers, computing devices, and storage media
US20130283232A1 (en) User-Friendly Method and System for Compiling a Unique Sample Code for a Digital Sample with the Help of a User Interface
US20050273805A1 (en) Methods and apparatus for a title transaction network
AU2019346668A1 (en) Smart contracts
US20080098325A1 (en) Method and system for facilitating social payment or commercial transactions
Hardjono et al. 4. Empowering Innovation through Data Cooperatives
US9071437B2 (en) Methods for identifying the guarantor of an application
US11281749B2 (en) Method of selective online dissemination of digital assets
WO2018095276A1 (en) Method and apparatus for publishing works on network
US20150020218A1 (en) System and method for providing a permanent data record for a creative work
TW201117023A (en) Method and system for compiling a unique sample code for a digital sample
US11563585B1 (en) Systems and methods for smart contracts including arbitration attributes
JP2009064220A (en) Method and system for permitting access to web site for disclosing related information of printed matter, only to owner of printed matter
KR20090112845A (en) System and Method for Managing Content Copyright and Recording Medium
US20230368186A1 (en) Process for Creation storage retrieval of immutable NFT Non-fungible token based electronic book publishing on a decentralized proof ofstake blockchain
TWI506578B (en) A system of media resource transaction and the method of the same and a computer program product storing media resource transaction program
Eche Criminal Liabilities of Boko Haram in Nigeria
KR20230118304A (en) On-line system and method for issuing and auehtnicating work including web token