TW583568B - A secure access method and system - Google Patents

A secure access method and system Download PDF

Info

Publication number
TW583568B
TW583568B TW91119311A TW91119311A TW583568B TW 583568 B TW583568 B TW 583568B TW 91119311 A TW91119311 A TW 91119311A TW 91119311 A TW91119311 A TW 91119311A TW 583568 B TW583568 B TW 583568B
Authority
TW
Taiwan
Prior art keywords
content
scope
item
patent application
host
Prior art date
Application number
TW91119311A
Other languages
Chinese (zh)
Inventor
Timothy R Feldman
Lane W Lee
Michael F Braitberg
Douglas M Rayburn
Gary G Kiwimagi
Original Assignee
Dataplay Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US09/940,035 external-priority patent/US20030188183A1/en
Priority claimed from US09/940,174 external-priority patent/US7729495B2/en
Priority claimed from US09/940,025 external-priority patent/US20030188175A1/en
Priority claimed from US09/940,026 external-priority patent/US7310821B2/en
Priority claimed from US09/940,083 external-priority patent/US7110982B2/en
Application filed by Dataplay Inc filed Critical Dataplay Inc
Application granted granted Critical
Publication of TW583568B publication Critical patent/TW583568B/en

Links

Abstract

A secure electronic content system and method is provided. The system includes a controller including an interface component, a host system coupled to the controller, the host system configured to present content under predetermined conditions, the host system operable with a navigation protocol, the host system further including a system manager operable with an associations component configured to be at least partially run by the host system, a translator configured to provide meanings and generate commands within the host system at least a first digital rights management (DRM) component configured to provide encoding and access rules for the content; and a file system component including a file system application programming interface (API) configured to provide a logical interface between a plurality of components.

Description

583568 [(ΦΗ 五、發明說明(1) 發明領域 本發明是有關於數位權利管理 有關於資料保全,以及在一個雷1。特別是,本發明是 全方式存取、複製、及控制内環境中、能夠確保以安 相關技藝的說明 、系統及方法。 自仗網際網路(I n t e r n e t )及弈、 後,各種實體(包括:人們、^技術的電子裝置問世 行資二4輪及以1583568 [(ΦΗ V. Description of the invention (1) Field of the invention The present invention is related to digital rights management and data preservation, and in a Thunder 1. In particular, the present invention is a full-mode access, copying, and control of the internal environment It can ensure the description, system and method of related technologies. Since the Internet and the game, various entities (including: people, electronic devices, technology, etc.) have been introduced to the world.

功能的個人數位助理(PDA、)及?:電= 二:貝訊的快速傳輸並不是全然沒有缺點的。數位Functional Personal Digital Assistant (PDA,) and? : Electric = 2: The fast transmission of Bexun is not completely without disadvantages. digit

m雖然能夠輕易地進行傳輸,但是亦可能會被較以 在更夕的許多實體輕易地存取獲得。所謂的,,駭客 (Hacker ) ”便是經由,在被偵測發現以前,快速擷取電 腦糸統的資訊而受到廣泛矚目。同樣地,全球資訊網 (www )的網頁亦可能在網際網路(Interne㈠上快速散 播電子内谷,諸如:包含著作權内容的音樂(Mp3)資 料。因此’電子内容便可能會因各種原因而被傳送到不意 傳送的,體。有鑑於此,電子内容提供者(無論是公司^ 號乃至單獨市民)乃逐漸重視電子内容的資料保全議題。 目前,與電子内容的資料保全及網際網路(Internet )相 關的議題正適時地且熱烈地爭論不休。舉例來說,艾拉妮 絲•莫莉塞特(A1 a n i s Μ 〇 r i s s e 11 e )便曾經在一場名為”Although m can be easily transmitted, it may also be easily accessed by many entities later. The so-called "Hacker" is widely noticed by quickly retrieving computer system information before being detected. Similarly, the website of the World Wide Web (www) may also be on the Internet Road (Interne) quickly disseminates electronic valleys, such as: music (Mp3) materials that contain copyrighted content. Therefore, 'electronic content may be transmitted to unintentional bodies for various reasons. In view of this, electronic content providers (Whether it is the company ^ number or even a single citizen) is gradually paying attention to the issue of data preservation of electronic content. At present, issues related to the preservation of electronic content and the Internet are being debated in a timely and lively manner. For example , Alanis Morissette (A1 anis Μ 〇risse 11 e) was once called "

第7頁 583568 五 發明說明(2)Page 7 583568 5 Description of the invention (2)

線上娛樂及著作權法··即將進入一個周遭的數位裳置中 (Online Entertainment and Copyright Law : Coming Soon T〇 a Digital Device Near You)·’ 的聽證會上,白 奥林•海屈(〇rrin Hatch )所領導的一個美國參議院司° 法委員會具體指出有關著作權及權利金的議題。在她 祝中,艾拉妮絲(A1 an i s )明確指出内容創作者、内容= 供者、及内容使用者間的目標歧異。其中,商業内容 ^ 者大多冀望能夠獲取電子内容的報酬。這些内容提供 “ 關注的是無法獲取任何報酬的普遍性内容複製議了所 =.音樂光碟(CD )及數位影音光碟(DVD )。另= u使用者則往往抱持著與内容提供者相左的目的,发 二二望能夠無需授權地複製内包括:數位 ; ,式、電影、數位書#、及諸如此類。垩軟 提供者及個體内容使用纟,内容創者 曾:J内容 儘可能多數的聽眾,並且往往I- &者、疋冀望此夠擁有 標之間。 會撕裂在散播目標及報酬目 衣置、電腦、及諸如此類散播雷 雜資料保全技術的增加主因。之此…谷的速度乃是導致複 要試圖確保内容及交易的料;=資料保全技術均是 保全技術便是利用一個時間戳,^ ♦例來况,一種資料 數器(counter)以判定一個"V^(Btlmesta帅)或一個計 護電子交易及内容的安全。另一否可以鑑別,藉以保 在密碼學及數學演算法。 貝料保全技術則是著重 密喝學手段不僅能夠提供 交易及内容的機密性 並且亦可Online Entertainment and Copyright Law ·· About to enter a nearby Digital Entertainment (Online Entertainment and Copyright Law: Coming Soon Toa Digital Device Near You) · 'At a hearing, Bai Olin Haiku (〇rrin Hatch A US Senate Divisional Law Committee led by) specifically pointed out issues related to copyright and royalties. In her congratulations, Alanis (A1 an is s) clearly pointed out that the goals of content creators, content = donors, and content users are different. Among them, most of the commercial content owners are expecting to be paid for electronic content. These contents provide "concerned about the universal content reproduction without any remuneration. = Music CD (CD) and Digital Audio-Visual Disc (DVD). In addition, u users tend to hold the opposite of content providers For the purpose, Fa Erwang can reproduce without authorization including: digital; digital, movies, digital books #, and the like. Chalk soft providers and individual content use 纟, content creators have: J content as many listeners as possible And often I- & hopes that this is enough to own the target. It will tear up the main reasons for the increase in the dissemination of targets and rewards, computers, and other technologies for dissemination of miscellaneous data. This ... valley speed It is the material that leads to trying to ensure the content and transaction; = data preservation technology is the preservation technology is to use a time stamp, ^ ♦ For example, a data counter (counter) to determine a " V ^ (Btlmesta Shuai) or one to protect the security of electronic transactions and content. The other can be identified to ensure cryptography and mathematical algorithms. The material security technology is focused on learning methods. We can provide content and transaction confidentiality and also

583568 五、發明說明(3) =提供鑑別、完整性(例如:確認一個訊息在傳輸中 ir多fi二及不可否認性(避免交易的不正確拒絕)的 依痒-,°p为密碼學手段係稱為,限制性演算法”,其通常為 取pc的應用所採用。最近,密碼學金鑰乃是同時 2传内,加:及内容解密的一把金鑰,藉以保護内容的安 =。如&,基於金鑰的密碼學手段便可以散播一種演算 ί料:::承擔因為資料保全義務即在金鑰本身、所導致 貝科保全缺口的風險。 ί ί二! f已經有許多種密碼學金鍮手段。其中,-種類 密金::充ί鑰手段’在這種系統金鑰手段中,-個加 :卜=”:解密金鑰計算得到、反之亦然。另 系統手段)這種公開:2=公開金錄手段(或非 用以解密的金鑰並不相同:加密的金錄與 分。特別是,這稱為x.509協定…^ 於跨網路間,•如:網際η獒供-個框架以適用 地,這些協定乃是著n 定的演算法。相反 格下,各個使用者均會具有,ff憑證的利用。*這種規 有一個簽章憑證(其分別^蜀特的,名稱、並且亦會具 證管理中心(ca )所簽發的—個:3:,一個可信任憑 X.509憑證中,典型的攔 個 '開金鑰)。在-個 識別碼、簽發者、有效 括有.版本、序號、演算法 ,政d間、主題、主題公鑰、及簽章。 $ 9頁 邡3568 、--- —_______ 五、發明說明(4) 特別是,一個版本欄位乃是用來識別這個憑證的一種格 式。一個序號乃是這個憑證管理中心(CA )所專有。這個 演算法攔位乃是用來識別簽章這個憑證的演算法類型、並 且包括有執行這個演算法所需要的參數。這個簽發者攔位 乃是用來識別這個憑證管理中心(CA )的名稱。這個有效 期限攔位乃是用來提供這個憑證的有效期間。這個主題攔 位乃是用來識別這個使用者的名稱。這個主題公開金鑰攔 位乃是用來提供與這個公開金鑰相關的這個演算法名稱、 參數、及此類資訊。 利用根據這個X· 509協定所架構的憑證進行通信乃是習知 此技藝者所已知。一個冀望與其他人進行通信的使用者乃 是經由一個資料庫接收這個目的地憑證、並且確認這個鑑 別動作。確認這個鑑別動作通常會關連複數個憑證管理中 心(CA ),倘若在這個使用者的憑證管理中心(CA )及這 個目的地憑證管理中心(CA )間存在一個階層關係。確認 完成後’通彳s動作便得以開始進行。通常,時間戳記 (timestamp)乃是用來確認訊息的流通性。已知,一種 三向(three — way )協定便是不需要使用時槽戳記 (timestamp)的一種鑑別協定,然而,這種鑑別協定卻 需要利用這個使用者檢查一個隨機數目,其乃是由這個使 用者最初產生、回傳至這個目的地、再由這個目的地接收 回來。同樣地,這個目的地亦需要檢查由這個使用者接收 的一個隨機數目,其最初乃是在這個目的地產生。 另一種已知的資料保全技術乃是利用指紋訊息。通常,指 ^3568 五、發明說明(5) 目义:乃疋利用一個雜凑(hash )函數加以達成。已知、 的雜…h)函數。一種常見的 ( · ^數乃疋在操作一個任意長度的前置影像 r^mage )訊息後,提供一個固定長度雜湊 值’h,的诘錄爱a, 、 數 個雜、、泰二\ e—Way )雜湊(haSh)函數。這 右二2 )數值,h,乃是與其關連的這個訊息所喜 跑;、=這個雜湊(hash )數值,h,的資料保全乃| ^於廷個雜凑(hash )函數的位元數目。目前583568 V. Description of the invention (3) = Provide authentication, completeness (for example: confirming the transmission of a message, ir more fi, and non-repudiation (to avoid incorrect rejection of transactions)--° p is cryptographic means It is called "restrictive algorithm", which is usually used in the application of pc. Recently, the cryptographic key is a key that is used to simultaneously encrypt the content and decrypt the content to protect the security of the content = .For example, & key-based cryptography can disseminate an algorithm :: assume the risk of Beco's security gap caused by the data retention obligation in the key itself. Ί Two! F There are already many A kind of cryptographic golden means. Among them,-the type of cryptographic key :: the key means of replenishment "In this kind of system key means, one plus: Bu =": the decryption key is calculated, and vice versa. Another system means ) This kind of publicity: 2 = public gold record means (or keys not used for decryption are not the same: encrypted gold records and points. In particular, this is called the x.509 protocol ... For example, the Internet provides a framework for applying these agreements. Is an algorithm determined by n. On the contrary, each user will have the use of the ff certificate. * This rule has a signature certificate (which is ^ Shute ’s name, and will also have a certificate management center ( ca) issued: a: 3: a trusted X.509 certificate, typically block the 'open key). in an identification code, issuer, valid including. version, serial number, algorithm , Government, subject, subject public key, and signature. $ 9 pages 邡 3568 、 --- — _______ 5. Description of the invention (4) In particular, a version field is a format used to identify this certificate A serial number is proprietary to the Certificate Management Center (CA). The algorithm block is used to identify the type of algorithm used to sign the certificate and includes the parameters needed to execute the algorithm. The issuer The block is used to identify the name of the certificate management center (CA). The validity period block is used to provide the validity period of the certificate. The topic block is used to identify the user's name. This topic Public key block It is used to provide the algorithm name, parameters, and such information related to the public key. Communication using certificates based on the X.509 protocol is known to those skilled in the art. The user communicating with others receives the destination certificate through a database and confirms the authentication action. Confirming this authentication action usually involves multiple certificate management centers (CAs). There is a hierarchical relationship between (CA) and the destination certificate management center (CA). After the confirmation is completed, the 'pass' action can be started. Usually, a timestamp is used to confirm the flowability of the message. It is known that a three-way protocol is an authentication protocol that does not require the use of timestamps. However, this authentication protocol requires the user to check a random number. The user initially generates, sends back to this destination, and then receives it back from this destination. Similarly, this destination also needs to check a random number received by this user, which was originally generated at this destination. Another known data security technology is the use of fingerprint information. Generally, it refers to ^ 3568 5. Invention Description (5) Purpose: Naaru uses a hash function to achieve it. Known, miscellaneous ... h) functions. A common type of message is to provide a fixed-length hash value 'h, after a manipulating a pre-image of any length r ^ mage), a record of a, a few, a few, and two. —Way) The hash function (haSh). The second right 2) The value, h, is the message that is related to this message; = The data preservation of this hash value, h, is the number of bits in Yuting ’s hash function . Currently

個實際大小乃是一百二十八個位元…,目;J f複數種不同類型的雜湊(hash)演算法,包括:訊東抵 4 (MD4 )演算法、及遠較訊息摘要4 (〇4 )演算法^ 複雜的訊息摘要5⑽5)演算法。另一種類型的雜凑為 mi函數乃是11階雜湊(n—hash)演算法。遠較這種 湊(one—way hash)更為複雜的一種雜湊(hash 演算法,一種n階雜湊(n—hash )演算法乃是實施一 Ik 機函數(rand〇mizing functi〇n)、雜湊函數 (hashing)、及邏輯互斥函數(x〇r functi〇n)。The actual size is one hundred and twenty-eight bits ..., head; J f plural types of different types of hash algorithms, including: Xundong arrived 4 (MD4) algorithm, and far more than the message summary 4 ( 〇4) Algorithm ^ Complex message digest 5⑽5) Algorithm. Another type of hash is the mi function, which is an 11th-order hash (n-hash) algorithm. A hash algorithm that is far more complicated than this one-way hash. An n-hash algorithm is an implementation of an Ik machine function (randomizing functi〇n), hashing. Functions (hashing) and logical mutex functions (x〇r functiOn).

上述密碼學手段的說明乃是表示已知數位資料保全系統 一個取樣。電子内容資料保全的另一個特徵乃是關注在赵 位權利管理(DRM )。數位權利管理(DRM )乃是用來限^ 各種權利的建立及管理及數位内容的同意、並且是用來2 援數位内容的散佈。數位權利管理(DRM )乃是在教育内 谷專業内谷、父易内谷、以及娛樂内容的數位散佈時, 不可或缺的^一部分。The above description of cryptographic means is a sample of a known digital data security system. Another feature of electronic content data preservation is the focus on Zhao-Rights Management (DRM). Digital Rights Management (DRM) is used to restrict the establishment and management of various rights and the consent of digital content, and is used to support the distribution of digital content. Digital Rights Management (DRM) is an indispensable part of the digital distribution of professional education, education, education, and entertainment.

第11頁 583568 五、發明說明(6) 部分已知的數位權利管理(DKM )乃是利用延伸式 記語:(m)以實施存取動作、並且 )= 安全數位内容的交易。通常,標記語言乃達成 標記語言(SGML)。標準通用標記語言 ' 通用 標準語言,藉以在-個文字文件中定義其格式ί:::種 硬體,作業系統架構。標記語言檔案乃是使,f =二那種 合的程式碼標籤,並將其内嵌在描述一個文件元件二準組 中間。網頁劉覽器則是用來解譯這些程;=件”字 ^有其獨特硬體及軟體功能的各能 ^ Μ使 件、並且同時保留這個文件的原始格式; 記語言(SGML)的文件乃是使 =通用標 (DTD )檔案,藉以定羞 刀離的文件類型定義 直他的數彳i 剎一義内肷其間的格式程式碼標籤。 其他的數位杻利官理(DRM) 織 已 Ά 式語言、及其他已知的程二=式二、 知的系統係包括有:InteFl \。口5加以只施=Page 11 583568 V. Description of the Invention (6) Digital Rights Management (DKM), which is known in part, uses extended notation: (m) to implement access actions, and) = secure digital content transactions. In general, markup language is Achievement Markup Language (SGML). Standard Universal Markup Language 'Universal Standard Language, which defines its format in a text file ί ::: hardware, operating system architecture. The markup language file is such that f = two kinds of combined code tags, and it is embedded in the middle of describing a document element binary set. The webpage browser is used to interpret these programs; = "characters" have their own unique hardware and software functions ^ M courier, while retaining the original format of this document; SGML documents It is the DTD file, which is used to define the file type of the file type. The format code label is defined in the same meaning. Other digital DRM (weaving) Language, and other known Cheng II = Equation II, known systems include: InteFl \. 5 only added =

TexCeUj。 merleaf 糸統、Arb0rText 系統 =上所述,内谷提供者、内容創作者、 處於衝突散態。在這個電子内容 内今使用者乃是 利管理(DRM)系統並無法解 1中’已知的數位相 利管理(圆),其能夠滿足内容“月乃^供一種數位相 允許内容的一個消f者合理使用者望胃,包括: 括:内容所有者及製造者彳 卜,内谷提供者(台 夂者)亦需要一種數位權利管理 583568 五、發明說明(7) (DRM ),其能夠維護内容資料保全、支援新穎且擴充性 的商業模式、並創造内容市場的高度價值。有鑑於此,本 發明便針對下列領域進行改良,亦即:如何將内容使用者 指向網際網路(Internet )位置的一個領域。 【發明概述】TexCeUj. Merleaf system, Arb0rText system = As mentioned above, the inner valley provider, content creator, are in conflict dispersal. In this electronic content, today's users are profit management (DRM) systems and cannot understand the "known digital profit management (circle) in 1", which can meet the content "monthly ^ for a digital phase allowable content a consumer Those who are reasonable users look at the stomach, including: Including: content owners and producers, the inner valley provider (Taiwan) also needs a digital rights management 583568 5. Invention Description (7) (DRM), which can Maintain content data preservation, support novel and scalable business models, and create high value in the content market. In view of this, the present invention improves the following areas, namely: how to point content users to the Internet A field of location. [Invention Summary]

有鐘於此,本發明乃提供一種安全電子内容的系統及方 法。這個系統主要包括有··一個控制器,包括有一個界面 70件、一個主機系統,耦接到這個控制器,其中,這個主 機,統乃是架構以在預定條件下呈現内容,這個主機系統 =疋利用一個導覽協定以進行操作,另外,這個主機系統 π 2括有·一個系統管理裝置,利用一個關連元件以進行 = 其中,這個關連元件乃是架構以利用這個主機系統 餅ϋ部分動作、—個轉課11,其架構以在這個主機系 、(二、意義並產生命令、至少-個第-數位權利管理 -個檔案系統元:構?括供右内容的編碼及存取規則、以及 羊椹以這個檔案系統應用程式界面(API )乃是 木構以在複數個元件間提 疋 根據本發明的一個實 ’、 匕輯界 括:界面-個控制二:,一種保全電子内容的方法係包 主機系統至這個和制ίί提供資料的輸入及輸出’輕接—個 下呈現内容,刹田态,架構這個主機系統以在預定條件 及在這個主機系統覽協定以操作這個主機系統,以 統更操作以:架構作一個系統管理裝置。這個主機系 /、 個關連元件以利用這個主機系統執行With this in mind, the present invention provides a system and method for secure electronic content. This system mainly includes a controller, which includes an interface of 70 pieces, and a host system that is coupled to the controller. The host system is structured to present content under predetermined conditions. This host system = 主机Use a navigation protocol for operation. In addition, the host system π 2 includes a system management device, which uses a related component to perform = Among them, this related component is a framework to use the host system cake part action,- A transfer lesson 11, whose structure is based on this host system, (two, meaning and generating commands, at least-the first-digital rights management-a file system element: structure? Including encoding and access rules for the right content, and sheep椹 This file system application program interface (API) is a wooden structure to provide a plurality of components. According to an embodiment of the present invention, the interface includes: interface-a control 2: a method of preserving electronic content Include the host system to this system to provide input and output of the data. 'Fast access — present the content, the state of the field, and structure this host system to In this given conditions, and a host operating system to view the agreements host system to the system to operate more: a system architecture for the host system management apparatus / member connected to a host system using the execution

583568 澤為以在這個主機糸統内部提 少一 馇一鉍a描4丨丨总抑 五、發明說明(8) 至少:P为動作、架構一個轉碎 ,二^義、及-產生命令、架構至少-個第-數位權利管理 伽於安γ70件以提供内容的編碼及存取規則、以及架構一 糸統元件,其包括—個檔案系統應用程式界面 以在複數個元件間提供-個邏輯界面。 體碑片ii ^亦提供—種系統及方法’藉以债測在-個媒 碟片包括有:一個第八:杈推動作,纟中’這個媒體 的寫入内容。這種方法係二,:容、及-個第二部分 位於這個第-部分的預:内:'括有-個或更多個區段, 内容、亦或是同時位於這這個第二部分的寫入 是位在這個第_ =疋廷個識別碼是否具有第 匕種預定類型的識 比孝=識別碼與 碼均是位在這個第二部;二,這些預定類型 型中的及2若這個識別碼的類型是屬ί、内:t的一個區域 另的=種,則判定是谓測到一 廷種或這些預定類 ,本發明亦提供一種 非授權動作。 、 ^多個製造商的方法。;個媒體碟片闕連 個主:指♦,在這個媒體碟片把ί係包括:提供這個婢】 固主機的期間、安裝=據這些指令首次固J體 生^個獨特的識別媽必須=别碼在這個媒體碟至-產-個媒體碟片的製造商式碼,藉:;别 在傳輪資料至-個匈^ 五、發明說明(9) 為後’讀取這個 一個位置。另— 片以識別一個位 至少一個可寫入 括··將這個位置 媒體碟片至一個 連的位置至這個 片的一個回覆時 另外,本發明亦 存媒體上的保全 一個安全對話、 對利用複數個内 保全資料解除鎖 中,這個命令乃 識別碼乃是架構 儲存模型中的至 置。另外,一個 這個儲存媒體上 資料解除鎖定, 體上的資料屬性 根據一個内容儲 另外’本發明亦 種方法係包括: 書登必須包括有複 獨特的識 個貫施例 置的方法 部分及一 寫入這個 或更多個 或更多個 ,則根據 提供一種 資料。這 經由一個 各儲存模 定、以及 是對應於 以管理這 少一個模 糸統係包 的鎖定資 其中,這 ,藉以因 存模型對 別碼以 乃是有 ,其中 個非重 可寫入 實體, 實體、 預定條 糸統及 種方法 通信通 型中的 對這些 這個媒 些保全 型乃是 括:複 料、以 個引擎 找到與這個製造 關於一種經由一 ,這個 寫部分 部分、 並散佈 以及倘 件改變 方法, 係包括 媒體碟片 。這種方 散佈一個 與這些媒 若發生這 运個位置 藉以改變 •與一個 道以接收一個命 至少一個模型進 保全資料解除鎖 體上的一個識別 資料的存取,且 一個安全的内容 數個内容儲存模 及一個引擎,用 來調整這 解除鎖定 乃是用 應一個資料的 全資料解除鎖定 這些保 提供一種系統及 置接收 且至少包括有一個欄位 由這個裝 數個搁位 方法以鑑別一個 一個憑證(其中 商關連的 個媒體磲 必須具有 法係包 或更多個 體碟片關 些媒體碟 〇 在一個儲 主機建立 令,藉以 行管理的 定,其 石馬,這個 這些内容 管理裝 型,用於 以對保全 個儲存媒 命令,並 〇 裝置。一 ’這個憑 ,藉以保583568 Ze is to reduce the amount of bismuth a within the host system 4 丨 丨 Fifth, the description of the invention (8) At least: P is the action, the structure is broken, the meaning, and-generate the command, Architecting at least one-70th digital rights management GAUAN to provide coding and access rules for content, as well as constructing a unified system element, including a file system application program interface to provide a logical interface between multiple elements . The body tablet ii ^ also provides a system and method through which the debt is measured in a medium. The disc includes: an eighth: the push action, the middle of the writing content of this medium. This method consists of two parts: content and a second part located in the pre-: part of this part: 'encloses one or more sections, content, or both in this second part. It is written in this _ = whether the identification code has the predetermined type of identification. = The identification code and code are located in this second part; two, and 2 of these predetermined types The type of this identification code is ί, inside: a region of t and other = species, it is determined that one species or these predetermined classes are detected. The present invention also provides an unauthorized action. , ^ Multiple manufacturer methods. ; A media disc with a master: refers to ♦, in this media disc includes: provide this 婢] period of the host, installation = according to these instructions for the first time to solidify a unique identification mother must = Do n’t code in this media disc to-produce-manufacturer-style code of the media disc, borrow :; Do n’t pass the wheel data to a Hungarian ^ V. Description of the invention (9) for 'Read this one position'. In addition, the film can identify at least one bit that can be written. When the media disc at this position is connected to a connected position to a reply to the film, the present invention also preserves a secure conversation on the media, In the unlocking of the internal security data, this command is the identification code and is the default setting in the architecture storage model. In addition, the data on this storage medium is unlocked, and the physical data attributes are stored according to a content. In addition, the method of the present invention includes: The book must include a unique method to identify the method and a write Entering this or more or more, according to the information provided. This is determined by a storage model and a lock data corresponding to the management of this one less system package, which is based on the existence of the model to the code, one of which is a non-rewriteable entity, The entities, reservation systems, and methods of communication are the types of security for these media. These are: compound materials, engine to find and manufacture with regard to a via, the written part, and the distribution and if the Changing methods include media discs. This party disseminates this media to change the location if this happens. • A channel to receive a life at least one model into the security data to unlock access to an identification data on the lock body, and a secure content several content. Storage mode and an engine that are used to adjust this unlocking by unlocking with the full data corresponding to a data. These guarantees provide a system and set to receive and include at least one field. This method is used to identify several ones. Voucher (in which the media related to the business must have a legal system package or more individual discs related to some media discs. ○ Establish an order on a storage host to manage the rules, the stone horse, these content management types, and In order to secure a storage media order, and 〇 device. 1 'This voucher to protect

583568 五、發明說明(10) 留來自一個憑證管理中心(C A )的一個 數位簽章 這個憑 下列兩 鑰以確 個裝置 源的有 用以識 )、以 一把對 另外, 置。一 這個憑 棚位, 來源接 別這個 且,這 若在一 更多個 把對話 _£l 一 另外, 體上的 (其中 架構這 證中的 個動作 認這個 公開金 效資料 別這個 及倘若 話金餘本發明 種方法 證必須 之 :利 憑證管理 鑰以確認 ,其中, 憑證的一 (其中,這個確 用這個憑證管理 中心(CA )數位 一個裝置數位簽 這個有效資料乃 個或更多個資料 簽章經確認後確 這些數位 至這個裝置,藉以建立一 亦提供 種系統及方法, 由這個裝置接收 個或更多個攔位 精以保留一個簽章)、嘗試確認 收一個廢除表列(其中,這個廢 一個或更多個資料是有效 係包括: 包括有一 留一個簽 數位簽章 $忍動作至 中心(CA 簽章;以 章、並接 是根據預 是有效或 κ為有效 個安全通 )、確認 少包括有 )公開金 及利用一 收一個來 定條件, 是無效的 時,傳輸 信通道。 猎以廢除一個裝 一個憑證(其中, 憑證的 些資料 個或更 資料中 金鑰傳 個安全 本發明 内容。 ,這些 個媒體 至少包括有這個憑證的 多個標示 有任何一 輸至這個 通信通道 亦提供一 一種方法 特權係管 以根據這 為未成功確認的 項被確認為無效 裝置(其中,這 時所需要的金鑰 種系統及方法, 係包括·附加内 理複數個階層的 些内容特權及預 且至少包 這個簽章 除表列乃 或是無效 個欄位) 簽章中或 的時候, 個對話金 )° 藉以保全 容特權給 存取動作 定條件來 括有一個 、由一個 是用來識 的,並 、以及倘 在一個或 避免將一 餘乃是在 儲存在媒 這個媒體 )、以及 同意這個 583568 五、發明說明(11) ' ---- 内容的存取動作。另外,一種用來保全媒體上儲存内容的 裝置係包括:至少一個工具,藉以傳輸内容至這個媒體 上,其中,這個工具係架構以附加複數個階層的存取動 作,其中,内容特權及預定條件乃是用來管理這個内容的 存取動作。 【圖式的簡單說明】 為使熟習本發明技藝者能夠更加容易地瞭解本發明,包括 本發明的各種目的、特徵、及優,點,本發明係配合圖式說583568 V. Description of the invention (10) A digital signature from a certificate management center (CA) is reserved. The following two keys are used to identify the source of the device), and one pair is set. This one stands, the source says this, and if there is more than one conversation _ £ l, in addition, the physical (where the action in the structure of this certificate recognizes this public financial information, and if so Jin Yu's method of the present invention must be verified by using a certificate management key to confirm. Among them, one of the certificates (where this is confirmed with the certificate management center (CA) digitally, a device, digitally signed this valid data is one or more data. After the signature is confirmed, the digits are confirmed to this device, so as to establish a system and method, which receives one or more stoppers to keep a signature, and tries to confirm the receipt of an abolition list (among them The invalidation of one or more documents is valid. Includes: One signature with a digital signature $ Ninja action to the center (CA signature; the chapter, the concatenation is based on the pre-validation or κ is a valid security pass) (Confirmation is included) Open money and the use of one-to-one to determine the conditions, when it is invalid, the transmission of the signal channel. Hunting to abolish one to one voucher ( The key of the certificate or some of the information in the certificate is secure. The media includes at least a plurality of tags of the certificate, and any of them is input to the communication channel. A method of privilege management is also provided. The items that are not successfully confirmed according to this are confirmed as invalid devices (wherein the key system and method required at this time, they include: additional content, multiple levels of content privileges, and at least including this signature except The list is or is not a valid field.) During the signing or during the seal, a dialogue fee) ° By means of preserving privileges, conditions for access actions include one, one is used to identify, and if One or avoid storing more than one piece of media in the media), and agree to this 583568 V. Invention Description (11) '---- Content access operation. In addition, a device for securing content stored on a medium includes: at least one tool for transmitting content to the medium, wherein the tool is structured to add a plurality of levels of access actions, wherein content privileges and predetermined conditions Is used to manage access to this content. [Brief description of the drawings] In order to enable those skilled in the art to understand the present invention more easily, including various objects, features, advantages and advantages of the present invention, the present invention is described in conjunction with the drawings.

明如後。在下列圖式中,相同的編號係用來表示類似或相 同的元件。 ,1圖係根據本發明的一個實施例、介紹這個安全電子内 容(SEC)系統内數位權利管理(DRM)系統的交互運 第2圖係根據本發明的一個實施例、介紹一個内容流 圖。 第3圖係根據本發明的一個實施例、介紹一個安全電子 容(SEC )系統所支援的方法。 f 4圖係根據本發明的一個實施例、介紹一個安全電子内 ,(SECj系統架構的一個開放系統互連(〇SI )模型。Ming as later. In the following drawings, the same numbers are used to indicate similar or identical elements. Fig. 1 is a diagram illustrating the interactive operation of a digital rights management (DRM) system in the secure electronic content (SEC) system according to an embodiment of the present invention. Fig. 2 is a content flow diagram according to an embodiment of the present invention. FIG. 3 illustrates a method supported by a secure electronic content (SEC) system according to an embodiment of the present invention. Figure 4 is an Open System Interconnection (OSI) model of the SECj system architecture according to an embodiment of the present invention.

第5 A圖係根據本發明的一個實施例、介紹安全及不安全 資料的内容流向。 第5B圖係根據本發明的一個實施例、彳紹由媒體擷 的一種安全方法。 貝斤叶 第5C圖係根據本發明的一個實施例、介紹一個憑證程 第6圖係根據本發明的一個實施例、介紹使用一個憑證以Figure 5A illustrates the content flow of secure and unsecured materials according to one embodiment of the present invention. Figure 5B is a security method retrieved by the media according to an embodiment of the present invention. Beijinye Figure 5C is an introduction to a voucher according to an embodiment of the present invention Figure 6C is an introduction to the use of a voucher according to an embodiment of the present invention

第17頁 583568 五、發明說明(12) 建立一個安全鐘別通道的一個程序。 第7 A圖係根據本發明的一個實施例、介紹執行一個確認程 序的一個裝置。 第7B圖係根據本發明的一個實施例、利用流程圖介紹在一 個通道上安全傳送資料的一種方法。 第7C圖係根據本發明的一個實施例、介紹廢除一個内容表 現裝置的一種方法。 第7D圖係根據本發明的一個實施例、介紹評鑑一個廢除表 列的一個流程圖。 第7E圖係根據本發明的一個實施例、介紹一個引擎在呈現 有一個廢除表列時所執行的一種方法。 第7F圖係根據本發明的一個實施例、彳紹廢除表列結果的Page 17 583568 V. Description of the invention (12) A procedure for establishing a safe bell channel. Fig. 7A illustrates an apparatus for performing a confirmation procedure according to an embodiment of the present invention. Figure 7B illustrates a method for securely transmitting data on a channel using a flowchart according to an embodiment of the present invention. Fig. 7C illustrates a method for abolishing a content presentation device according to an embodiment of the present invention. Fig. 7D is a flowchart illustrating the evaluation of a revocation list according to an embodiment of the present invention. Figure 7E illustrates a method performed by an engine when presenting a revocation list according to an embodiment of the present invention. FIG. 7F is an example of the results of the abolition of the listed results according to an embodiment of the present invention.

第7 G圖係根據本發明 方法。 的一個實施例、介紹組織内容的一種 第7 Η圖係介紹一個程序流程圖 不Figure 7G is the method according to the invention. An example of the organization, a kind of introduction to the content of the organization.

個實施例 = 紹一個程序流程圖,以表示創作套裝軟體 术、套裝軟體廣告、及庫存單位(SKU) 個實施例。 丨U狂/r W 第8圖係根&據本發明的一個實施例、介紹這個 數位權利管理(CKDRM )播放功能的應用程式界面(AP J ) 的一個流程圖。Embodiments = A flow chart is provided to illustrate the embodiment of the creative software package, package advertisement, and storage unit (SKU).丨 U 狂 / r W FIG. 8 is a flowchart of an application program interface (AP J) introducing the digital rights management (CKDRM) playback function according to an embodiment of the present invention.

第9圖係根據本發明的一個實施例、介紹這個C〇ntentKeyOFIG. 9 is an illustration of the ConntentKeyO according to an embodiment of the present invention.

第18頁 583568 五、發明說明(13) 數位權利管理(CKDRM )複製應用程式界面UPI )協定的 一種方法。 第1 0圖係根據本發明的一個實施例、介紹一種第三者數位 權利管理(TPDRM )複製方法。 第11圖係根據本發明的一個實施例、介紹利用這個 ContentKeyO數位權利管理(CKDRM)記錄内容的一種方 法。 第1 2圖係根據本發明的一個實施例、介紹解除内容鎖定的 一種方法。Page 18 583568 V. Description of the invention (13) Digital Rights Management (CKDRM) A method for duplicating the application program interface (UPI) agreement. Fig. 10 illustrates a third-party digital rights management (TPDRM) copy method according to an embodiment of the present invention. Figure 11 illustrates a method for recording content using this ContentKeyO digital rights management (CKDRM) according to an embodiment of the present invention. Figure 12 illustrates a method for unlocking content according to an embodiment of the present invention.

第1 3圖係根據本發明的一個實施例、介紹這個 ContentKeyO數位權利管理(CKDRM)複製應用程式界面 (API)協定的一種方法。 第1 4圖係根據本發明的一個實施例、介紹執行一個 ContentKeyO數位權利管理(CKDRM)複製方法,藉以在這 個ContentKeyO數位權利管理(CKDRM)網域内複製内容的 一個引擎。 ,1 5圖係根據本發明的一個實施例、介紹一種記錄方案。 第1 6圖係根據本發明的一個實施例、介紹播放Figure 13 illustrates a method for copying an Application Program Interface (API) agreement of the ContentKeyO digital rights management (CKDRM) according to an embodiment of the present invention. Figure 14 illustrates an engine that executes a ContentKeyO digital rights management (CKDRM) replication method to replicate content in this ContentKeyO digital rights management (CKDRM) domain according to an embodiment of the present invention. Figure 15 illustrates a recording scheme according to an embodiment of the present invention. Figure 16 is an introduction to playback according to an embodiment of the present invention.

ContentKeyO數位權利管理(CKDRM)所管理内容的一種方 法。 第1 7圖係根據本發明的一個實施例、介紹使用命令的一種 更詳細的播放方法。 第18圖,根據本發明的一個實施例、介紹以肘⑼七以叫數 位杻利管理(CKDRM )的一個解除鎖定步驟的一個流程ContentKeyO A method of content managed by Digital Rights Management (CKDRM). Figure 17 shows a more detailed playback method using commands according to an embodiment of the present invention. FIG. 18 is a flow chart showing an unlocking step of the digital profit management (CKDRM) according to an embodiment of the present invention.

第19頁 583568 五、發明說明(14) " "~ ---- 圖。 第1 9圖係根據本發明的一倔 筐m二: 貫施例、矛J用流程圖介紹-個 弟二者數位榷利管理(TPDRM)複製協定。 第2 0圖係根據本發明的一徊 人& — 管理α_)複製:―:方=一以^ 據^ 第2 2 Α圖係根據本發明的_ 盆泣入士次企丨 個貫施例、介紹一個主機寫入 ’:王貝料的一個協定的一個流程圖。Page 19 583568 V. Description of Invention (14) " " ~ ---- Figure. Fig. 19 is a block diagram of the present invention according to the present invention: the implementation example, the spear J is introduced with a flow chart-a digital copy management agreement (TPDRM) copy agreement between the two. Fig. 20 is a figure of a man & — management α_) copying according to the present invention: :: Fang = Yi Yi ^ According to ^ Fig. 2 A is a picture of a _ pen crying into a subordinate enterprise according to the present invention For example, a flowchart of a protocol written by a host: 'Wang Bei'.

第2 2 B圖係根據本發明的一 的一種方沬μ … 個只施例、介紹偵測偽造媒體 的種方法的一個流程圖。 用以提供伺服器、主機、及 ,用以表示一個編寫程序。 用以表示設立一個安全資料庫 第2 3 Α圖係介紹一個架構圖 引擎間互動的一個實施例< 第2 3B圖係介紹一個流程圖 第2 4圖係介紹一個流程圖 及安全元資料的一個程序 第25圖係介紹設立一個電子 第26圖係根據本發明的一 调轾序。 ,裎徂, ^個貫施例、由—個消費者的觀 ^ ^供一個交易解除内容鎖定的一個流程巴: 界面,用以由一個』Ϊ者::㈣匕介紹-個範例使用者 除内容的鎖定。 、'規點’"紹-個交易是如何解 第2 8圖係根據本發明的一個 入妨丄 内容(SEC )夺統中啟動, ;|、、Ό在這個安全電子 糸、、先中啟動一料除鎖$程序的元件的一個Fig. 22B is a flowchart of a method according to the first aspect of the present invention, which only introduces a method for detecting forged media. Used to provide a server, host, and to represent a writing program. Used to indicate the establishment of a security database. Figure 2 3A illustrates an embodiment of an architecture diagram engine interaction < Figure 2 3B illustrates a flowchart. Figure 2 4 illustrates a flowchart and security metadata. Figure 25 of a program is an introduction to setting up an electronic chart of 26 according to the invention. , 裎 徂, ^ a consistent example, a consumer's view ^ ^ a process for unlocking the content lock of a transaction: interface, used by a Ϊ ::: ㈣ introduction-a sample user Content lock. "Regulations" " How to solve a transaction Figure 2 8 is launched in accordance with the SEC content of the present invention ;; ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, the, the SEC, the content of the SEC, in this security electronics One of the components that start a material removal lock program

第20頁 583568 五、發明說明(15) 流程圖。 第2 9圖係根據本發明的一個實施例、介紹—入 容(SEC )流程圖。 女王電子内 第3 0圖係根據本發明的一個實施例、介紹可 得的内容類型。 在媒體上取 第31A圖係根據本發明的一個實施例、介紹 個流程圖。 乂易類型的一 第31B圖係根據本發明的施例、^ 面的一種方法,這個使用者界面係包括一個使'者界 置與一個媒體碟片_的全球資源、定位1 (URL),精以設 第31C圖係根據本發明的一個實施例、介Page 20 583568 V. Description of Invention (15) Flow chart. Fig. 29 is an introduction-capacity (SEC) flow chart according to an embodiment of the present invention. Figure 30 in Queen's Electronics is a description of the types of content available according to one embodiment of the present invention. Taking FIG. 31A in the media is a flowchart according to an embodiment of the present invention. Figure 31B of the easy type is a method according to an embodiment of the present invention. This user interface includes a global resource, location 1 (URL), which enables a user to place a media disc, It is assumed that FIG. 31C is a diagram according to an embodiment of the present invention.

伺服器的一種方法。 逆接至一個CKU 第32圖係根據本發明的一個實施例、介紹_ 個連結後被一個用戶端請求的一種方法。 的在一 第33圖係根據本發明的一個實施例、介紹 所執行的一種方法。 1固王控伺服器 介紹一個網頁及 個 由-個系統的觀點, 由一個引擎的觀點, 第3 4圖係根據本發明的一個實施例 CJU用戶端伺服器的一種方法。 第3 5圖係根據本發明的一個實施例 介紹解除内容鎖定的一種方法。 第3 6圖係根據本發明的一個實施例 =紹解除内容鎖定的一種方法。 第3 7圖係根據本發明施例、介紹 鎖定的一個程序流程圖。 疋正解除交易A method of server. Reverse connection to a CKU FIG. 32 is a method for introducing a connection and being requested by a client according to an embodiment of the present invention. FIG. 33 illustrates a method performed according to an embodiment of the present invention. 1Guo Wang Control Server Introduce a web page and a system perspective, and an engine perspective. Figure 34 is a method of a CJU client server according to an embodiment of the present invention. Figure 35 is a method for unlocking content according to an embodiment of the present invention. Figure 36 is a method for unlocking content according to an embodiment of the present invention. Figures 37 and 7 are flowcharts of a procedure for introducing locking according to an embodiment of the present invention.疋 Releasing transaction

第21頁 583568Page 583568

第38圖係介紹—個流程圖 除内谷鎖定的一種方法。 第3 9圖係介紹一個流程圖 動。 、表示根據一個實施例以解 用以介紹元件間的一個物件互 介紹一個解除交易鎖 元件間的物件互動。 第4 0圖係根據本發明的一個實施例、 定的一個流程圖。 第41圖係介紹一個方塊圖,用以表示 【較佳實施例的詳細說明】 發明概要 是例’ 一…電子内容(SEC)系統乃 作者 提供者、内容擁有者、及内 Λ子内容關注的—種解決方案。這個安全電 ξ入等存取動作、力°密及存取規則、編碼、、 解碼、思義、關連、導覽、及呈現的—個引擎,其中, ^動作的標準均I要提供電子内$的一個無接缝保全 統0 ^本發明實施例中所揭露的這些加密及存取規則乃是提供 一個不可見且無接縫的C〇n tent Key 0數位權利管理(ckdrm )系統’藉以對内容進行資料保全、並使這些内容能夠經 由適當的電子裝置加以攜帶及交互運作。這個 ContentKeyO數位權利管理(CKDRM)可以支援内容購買者 及使用者的合理使用,其乃是利用這個C〇ntentKeyO數位 權利管理(CKDRM )直接支援電子内容的個人用途複製、Figure 38 introduces a flowchart of a method for removing inner valley locks. Figure 39 shows a flowchart. , Means according to an embodiment to introduce an object interaction between components to introduce a transaction lock release object interaction between components. Figure 40 is a fixed flowchart according to an embodiment of the present invention. Figure 41 is a block diagram showing the [detailed description of the preferred embodiment] The summary of the invention is an example. One ... The electronic content (SEC) system is the focus of the author provider, content owner, and internal content — A solution. This secure electronic access engine, access control, access control rules, encoding, decoding, meaning, connection, navigation, and presentation-an engine, in which the standard of action must provide electronic internal A seamless security system of $ ^ The encryption and access rules disclosed in the embodiments of the present invention are to provide an invisible and seamless Joint Key 0 digital rights management (ckdrm) system. Data preservation of content and enabling the content to be carried and interacted with via appropriate electronic devices. The ContentKeyO Digital Rights Management (CKDRM) can support the reasonable use of content purchasers and users. It uses the ConntentKeyO Digital Rights Management (CKDRM) to directly support the personal use of electronic content,

第22頁 583568 五、發明說明(17) 並同意對這些内容進行匯入及匯出的動作。根據本發明 揭露的實施例,在媒體上預先錄製及解除鎖定的内六 其銷售出去後,便可以透過一個裝置加以播放,其^ 個裝置乃是設計用來表現這個c〇ntentKey0數位權利& (CKMM)或其他第三者數位權利管理(TpDRM) s 1 護的内容。為方便本發明的揭露,在這份說明書 /箱' 錄内容,,這個用語亦同時包括有主控内容。 曰 預 再者,在媒體上預先錄製的鎖定内容亦可以透過一 /播放器加以解除鎖定,其中,這個裝置/播放器乃: 接到一個情報交換所’並根據本發明的一個實施例進^運 作。根據媒體上授與的同意、f訊,任何播放器均 解除鎖定後的内容。再者’解除鎖定的内容亦 = 關連ContentKeyO數位權利管理(CKDRM)的 過一個播放器加以表現。這此f ' 上並透 個媒體亦可以J行寫入的動作,並且不會 :: 以表現的内容。根據本發明的一個實施例,舉 ς斤^ 個ContentKeyO數位權利管理(ckdrm)僅個^ 數目的預先錄製及解除鎖定内:個預疋 者、授權合約、及諸如此類戶=:,其乃…容提供 再者w個C〇ntentKey0數位權利管理(CKDRM )亦可以提 供-種對内容解除鎖定及對内容進 援各種新穎的内容消費者經 去一錯以支Page 22 583568 5. Description of the invention (17) and agree to import and export these contents. According to the disclosed embodiment of the present invention, after the Nei Liu which is recorded and unlocked in the media is sold in advance, it can be played through a device whose ^ devices are designed to express this digital key 0 & (CKMM) or other third party digital rights management (TpDRM) s 1 content. In order to facilitate the disclosure of the present invention, the content is recorded in this manual / box, and this term also includes the main control content. In other words, the locked content pre-recorded on the media can also be unlocked through a player / player, where the device / player: receives a clearinghouse 'and performs the update according to an embodiment of the present invention ^ Operation. According to the consent and f news granted in the media, the content of any player is unlocked. What's more, the unlocked content is also expressed by a player related to ContentKeyO Digital Rights Management (CKDRM). This f 'can also be written in line J through the media, and it will not be: to express the content. According to an embodiment of the present invention, for ς pounds ^ a ContentKeyO digital rights management (ckdrm) only a ^ number of pre-recorded and unlock the: pre Cloth who license agreement, and the like household = :, which is the ... receiving Provides W ConntentKey0 Digital Rights Management (CKDRM) can also provide-a variety of content unlocking and content assistance for a variety of novel content consumers go wrong to support

ContentKeyO數位權利管理(°曰 路的這種 隹〜s理(CKDRM )乃是利用可以表現電 583568ContentKeyO digital rights management (° ~ the way this s ~ s reason (CKDRM) is the use of can express electricity 583568

子内容的裝置(,說明書中係稱為"播放器,,)加以奋施。 播放器乃是用來貫施這種C〇ntent KeyC)數位權利管理Λ (CKDRM )、並與伺服器、資訊站、複製器、及諸如此類 的裝置形成界面。播放器或者可以内嵌有一個引擎,其搭 配這個ContentKeyO數位權利管理(c〇RM)以提供資料^ 全、亦或可以麵接到這個引擎,舉例來說:一台個人電腦 (PC)。再者,播放器亦可以表現數位媒冑(諸如:碟片 )上的内容。在另一個實施例中,一台個人電腦(pc)亦 可以用來實施一個播放器。The sub-content device (referred to as " player, " in the description). The player is used to implement this Conntent KeyC digital rights management Λ (CKDRM) and form an interface with servers, information stations, duplicators, and the like. The player may have an engine built-in, which is matched with the ContentKeyO digital rights management (cRM) to provide data ^ full, or it can be connected to this engine, for example: a personal computer (PC). Furthermore, the player can also represent content on digital media (such as: discs). In another embodiment, a personal computer (pc) can also be used to implement a player.

這種ContentKeyO數位權利管理(CKDRM)亦可以(部分地 )透過··提供一種彈性的解除鎖定方法、並且支援轉移内 容及規則,其,數位權利管理(DRM)實施,進而加以擴 充。特別是,貫施ContentKeyO數位權利管理(CKDRM)的 一個播放Is更可以進一步實施第三者數位權利管理 (TPDRM )。在一個實施例中,具有一個内嵌引擎的一個 播放器不僅可以實施ContentKeyO數位權利管理(CKDRM .)、並且可以透過一般用途的界面以呈現一個檔案系統及 一個ContentKeyO數位權利管理(CKDRM)的應用程式界面 (八卩1)。這種(:〇1^6111;1^7〇數位權利管理((::1(1)1^)亦可 以有利地提供有許多種功能,包括:解除鎖定、播放、計 數複製數目、由憑證來源匯入、匯出至憑證目的地、以及 對儲存元資料進行資料保全。 一個安全電子内容系統 這個ContentKeyO數位權利管理(CKDRM)系統同時包括有This ContentKeyO Digital Rights Management (CKDRM) can also (partly) provide a flexible unlocking method and support transfer of content and rules. The Digital Rights Management (DRM) is implemented and further expanded. In particular, a broadcast Is that implements ContentKeyO Digital Rights Management (CKDRM) can further implement third party digital rights management (TPDRM). In one embodiment, a player with an embedded engine can not only implement ContentKeyO digital rights management (CKDRM.), But also present a file system and a ContentKeyO digital rights management (CKDRM) application through a general-purpose interface. Program interface (Hachiman 1). This (: 〇1 ^ 6111; 1 ^ 70) digital rights management ((:: 1 (1) 1 ^) can also be advantageously provided with many functions, including: unlocking, playback, counting the number of copies, Source import, export to voucher destination, and data preservation of stored metadata. A secure electronic content system. The ContentKeyO digital rights management (CKDRM) system also includes

第24頁 583568 五、發明說明(19) 資料保全及存取規則,藉以做為這個安全電子内容(SEC )系統的部分。 為方便討論這個安全電子内容(SEC )系統,本說明書所 採用的術語皆列明如下: P KI :公開金鍮基礎建設。 AES :先進加密標準。 API :應用程式界面。應用程式界面(Αρι )這個用語乃是 指不同元件間的邏輯界面。 CA :憑證管理中心。憑證管理中心(CA )這個用語乃是指 簽發憑證的實體。Page 24 583568 V. Description of the invention (19) Data preservation and access rules as part of this secure electronic content (SEC) system. In order to facilitate the discussion of this secure electronic content (SEC) system, the terms used in this specification are listed as follows: P KI: Public gold infrastructure. AES: Advanced Encryption Standard. API: Application Programming Interface. The term application programming interface (Αρι) refers to the logical interface between different components. CA: Credential Management Center. The term Certificate Management Center (CA) refers to the entity that issues the certificate.

Content Provider :内容提供者。内容提供者(c〇ntentContent Provider: Content provider. Content provider

Provider )這個用語乃是指擁有内容權利、並參與將内容 傳送到市場的實體。 :DataPlay播案系統。在本發明的至少—個實施例Provider) refers to the entity that owns the rights to the content and participates in delivering the content to the market. : DataPlay broadcast case system. In at least one embodiment of the invention

DataPlay檔案系統(DFS)這個用語乃是指三個開放 的應用程式界面(API ) 來提供數位媒體的讀取及The term DataPlay File System (DFS) refers to three open application programming interfaces (APIs) to provide access to digital media and

Engine :引擎。這個元件乃是用 寫入存取。 弓丨擎。 戶端個人電腦Engine: Engine. This component is accessed using write. Bow 丨 engine. Client PC

Host :主機。這個裝置乃是用來控制這個 USB :萬用序列埠。這個裝置乃是指這個用 (PC )與一個連結引擎間的物理連結。 MAC :訊息鑑別碼。訊息鑑別碼(M AC )這個用笋窃 Message Authentication Code 的縮寫。Host: The host. This device is used to control this USB: Universal Serial Port. This device refers to the physical connection between this user (PC) and a link engine. MAC: Message Authentication Code. Message Authentication Code (M AC) is an abbreviation for Message Authentication Code.

第25頁 583568 五、發明說明(20) 是Secure Hash A1 gor i thm的縮寫,其乃是由美國國家技 術標準局(NIST)的聯邦資訊處理標準第186號公告文件 (FIPS PUB 186 )所定義。P.25 583568 V. Invention Description (20) is the abbreviation of Secure Hash A1 gor i thm, which is defined by the Federal Information Processing Standards No. 186 Announcement Document (FIPS PUB 186) of the National Institute of Standards and Technology (NIST) .

Protected Content :保護内容 ° 保護内容(Protected Con tent )這個用語乃是在Con ten t Key 0數位權利管理 . (CKDRM )的管理下、以一種加密形式儲存在數位媒體上 的内容。Protected Content ° The term Protected Content is the content stored on digital media in an encrypted form under the management of Con Tent Key 0 Digital Rights Management. (CKDRM).

Unlocked Content :解除鎖定内容。解除鎖定内容 (Unlocked Content)這個用語乃是指可以在任意簽發憑 證裝置(其係可以表現内容)進行表現的保護内容。在這 J 種狀況下、這個媒體上預先錄製的解除鎖定内容亦可以稱 ® 為主要内容(Primary Content )。Unlocked Content: Unlocked content. The term “Unlocked Content” refers to protected content that can be expressed on any certificate-issuing device (which can express content). In these J situations, the unlocked content pre-recorded on this media can also be referred to as ® Primary Content.

Locked Content :鎖定内容。鎖定内容(Locked Content )這個用語乃是指在一個ContentKeyO數位權利管理 (CKDRM)的解除鎖定交易發生前(其係用以將内容改變 為解除鎖定内容),無法進行表現的保護内容。鎖定内容 亦可以稱為次要内容(Secondary Content )。Locked Content: Locked content. The term Locked Content refers to protected content that cannot be expressed before a ContentKeyO Digital Rights Management (CKDRM) unlocking transaction occurs (it is used to change content to unlocked content). Locked content can also be referred to as Secondary Content.

Key Complement :金鍮補數。這個資訊乃是用來完成一組 解密金鑰,藉以將鎖定内容啟動變成解除鎖定。 | 請參考第1A表,其係表示這個安全電子内容(SEC )系統 ¥ 中各個部分的交互運作。 第1A表:交互運作堆疊 101使用者界面 1 0 2呈現Key Complement: Golden complement. This information is used to complete a set of decryption keys to enable the locked content to become unlocked. Please refer to Table 1A, which shows the interactive operation of various parts of this secure electronic content (SEC) system. Table 1A: Interactive Operation Stack 101 User Interface 1 0 2 Presentation

第26頁 583568Page 583568

103導覽 1 0 4關連 105意義 1 0 6編碼 1 〇 7存取規則 1 0 8加密 I 〇 9檔案系統 II 0媒體 第1A表係提供一個交互運作堆疊,其乃是用 上103 Navigation 1 0 4 Connected 105 Meaning 1 0 6 Coding 1 〇 7 Access Rules 1 0 8 Encryption I 〇 9 File System II 0 Media Table 1A provides an interactive operation stack, which is used

ContentKeyO數位權利管理(CKDRM )運作 不廷個 資料層(layer )。這個堆疊更進一步地包括^采用的各個 者數位權利管理(TPDRM )所供應的資料層(1八他第二 嵌有一個適當引擎的播放器、以及耦接到這類=er L、内 放器。在本說明書中,"引擎"這個用語乃是指—:的播 數位媒體提供讀取及寫入存取的元件。如此,曰 ,夠對 不發明的每 施例便可以包括有一個或更多個實施,諸如:一只 11¾ ^ 擎 ΛΑ 早刃體、軟體、硬體、或其任何組合的實施。這種 、ContentKeyO's Digital Rights Management (CKDRM) operates in multiple layers. This stack further includes the data layers provided by each of the digital rights management (TPDRM) providers (the second is a player with an appropriate engine embedded in it, and the type is coupled to the Ler, the internal amplifier In this specification, the term " engine " refers to the component of the digital media that provides read and write access. In this way, it is sufficient to include one for each embodiment that is not invented. Or more, such as: an 11¾ ^ ΛΛ early blade, software, hardware, or any combination thereof. This,

ContentKeyO數位權利管理(CKDRM)乃是著重在這個六 運作堆疊的資料層107及1〇8。 ^ 父互 請參考資料層110,預先錄製或寫入的電子内容乃是钟人 在這個媒體上、並且無法駐在一個播放或一個引擎上~ 這個系統可以啟動複數種方法,藉以將資料儲存在一個媒 體碟片上。舉例來說,根據本發明的一個實施例,— 'ContentKeyO Digital Rights Management (CKDRM) is focused on these six operationally stacked data layers 107 and 108. ^ Please refer to the data layer 110 for the parent's mutual information. The pre-recorded or written electronic content is Zhongren on this media and cannot reside on a playback or an engine ~ This system can start multiple methods to store data in one Media disc. For example, according to one embodiment of the present invention,-'

第27頁 583568 五、發明說明(22) 片便可以在相同的碟片上容納安 ~~~~ 内容、或同時容納預先錄製 .、錄製内容、寫入 資料亦可以利用大區塊或小區;另外,各項 片上。 卄的形式儲存在這個碟 請參考資料層109,這個系統可以 的階層式目錄結構。如此,透過這:-種具有檔案資料 (writes) ”所寫入及透過檔案系 寫入 回的資料便可以儲存做為檔案資/料。^ ( reads )"所返 施例,僅有儲存為檔案的資才斗才处 x、本發明的一個實 應用程式界面(API )加以在此勺透過這個檔案系統的 r 及;丄 播案的;實施例 ⑽)加以存取資二==:應用程式界* 及寫入命令對元資 曰 w…法透過檔案系統的讀取 p ^对兀貝枓進仃完整的存取動作。 :+:能固引擎支援這個槽案系… : 資料便可以透過主機㈣見,諸如 及二T :月匕網際,路郵件延伸(MIME )類型、A小、以Page 27 583568 V. Description of the invention (22) The movie can hold the contents of the same ~~~~ on the same disc, or it can accommodate the pre-recorded at the same time. The recorded content and written data can also use large blocks or communities; In addition, each on-chip. The form of 卄 is stored on this disc. Please refer to the data layer 109, this system can have a hierarchical directory structure. In this way, through this:-A kind of data written with "writes" and written back through the file system can be stored as file data / materials. ^ (Reads) " Returned examples, only stored For the talents of the file, x, a real application programming interface (API) of the present invention is added here through the file system r and; (broadcasting; embodiment ;) to access the data ==: The application world * and the write command can be used to read the resource information w ... the file can be read through the file system. ^ The complete access action to the woodpecker.: +: Nengu engine supports this slot system ... : Data will be Can be seen through the host, such as two T: Moon Dagger Internet, mail extension (MIME) type, A small, to

. 八他的70貧料則僅僅能夠透過這個ContentKeyO ,位推利管理(CKDRM)的應用程式界面(ApI)加以揭 ^。^者,其他的元資料則僅僅可以透過一個引擎加以窺 ♦例來祝,根據本發明的一個實施例,秘密的媒體識 第28頁 ^^568 五、發明說明(23) _ ^馬及私密的元資料便僅能 料可能是關連於一個碟H 似5丨擎加以窺見。資 以改變及管理這個元資料,m廷個引擎便可 的碟片容量。 、’ 9 ’斤消費以少於可供應 根據本發明的一個膏絲加 一 引擎上,而不是儲存在 '疋的兀貝料乃是連結在這個 ,料通常是無法透過這個檔案系丄;:預,的元· :用及私密的金餘對。這組金錄對乃是在以及 ;一種安全製程加以產生。根據本發明的—:i=、根 擎私密儲存的欄位更新乃是透過一種安 例,引 (CKDRM) ⑽RM)的元資料與各個檔案儲存:::數: 右有需要的話。, 你起,倘 別檔案亦::星Π赵根;本發明的一個實施你丨,任何個 的元資料。第」I;數個弟三者數位權利管理(〜) 包括有一個Ϊ利管理(TPDRM)的元資料可以 ,個擁有柘識別碼,其係匹配於一個接收到&Eighty of his 70 poor materials can only be exposed through this ContentKeyO, the application programming interface (ApI) of CKDRM ^. ^ Other metadata can only be viewed through an engine. ♦ For example, according to an embodiment of the present invention, the secret media knows page 28 ^^ 568 5. Description of the invention (23) _ ^ Horse and private The metadata can only be expected to be related to a disc H like 5 丨 engine to see. By changing and managing this metadata, the disk capacity of each engine can be changed. The consumption of '9' catty is less than that of a paste and an engine that can be supplied according to the present invention, instead of being stored in the '疋 料, the raw material is linked to this, and the material is usually not able to be tied through this file ;: Yuan, Yuan ·: Use and private Jin Yu pairs. This set of gold records is produced in a well; a secure process. According to the present invention: the field update of the private storage of i =, root engine is through an example, (CKDRM) (RM) metadata and various files are stored ::: number: if necessary on the right. , You, if the other files are also :: Xing 赵 Zhao Gen; an implementation of this invention you, any metadata. Article "I; several young people and three digital rights management (~) includes a metadata management (TPDRM) metadata, each has an identification code, which matches a received &

or^^tKeyO數位權利管理(CKDRM )憑證(其— 六士 兄月玲中),精以對這個元資料進行存取。 )的!施例中,第三者數位權利管理(τρ_ 70貝科乃疋與各個檔案儲存在一起,且因此, —個適當檔案系統中已經使用過的元資料系統,^or ^^ tKeyO Digital Rights Management (CKDRM) certificate (which-Six Brother Yue Lingzhong), to access this metadata. )of! In the embodiment, a third-party digital rights management (τρ_ 70 Bekonai is stored with each file, and therefore, a metadata system that has been used in an appropriate file system, ^

第29頁 583568 五、發明說明(24) 如·· DataPlay檔案系統(DFS)。第三者數位權利管理 (TPDRM )的元資料節點可以在一個擋案系統旗標定義中 設定有一個位元,藉以將這些資料識別為第三者數位權利 管理(TPDRM )的元資料。 一個元資料封包可以如第1 B表所示。其中,表示為π ΙΓ並 跟隨著一個數目的各個符號乃是用來表示一個未加符號的 數值及這個數值的一個位元長度。 第1Β表 類型名稱說明/用途Page 29 583568 V. Description of Invention (24) Such as: · DataPlay File System (DFS). The third-party digital rights management (TPDRM) metadata node can have a bit set in a file system flag definition to identify these data as third-party digital rights management (TPDRM) metadata. A metadata packet can be as shown in Table 1B. Among them, each symbol represented by π Γ followed by a number is used to represent an unsigned value and a bit length of the value. Table 1B Type name description / use

struct META*psN ext連結表列的内部指標。 DFSIDDf sld附加這個元資料的檔案處置。 DFSFLAGFlags内部用途的旗標—包括一個位元以定義這個 物件(如數位權利管理的元資料)必須設定。 U1 6Metadata〇wner必須與這個接收到的c〇ntentKey憑證的 元資料擁有者匹配以建立這個元資料擁有權的識別碼。 SYMMETRIC —KEYMe tad at aKey用來加密這些資料的金鑰 U16ByteC〇Unt元資料中的位元組數目 、 U8〔〕Metadata這個數位權利管理(DRM )的元資料本身 在本發明的一個實施例中, )的元資料乃是儲存在隨機 十思體中。然而,倘若第三者 資料過大,以致於無法完全 )中,則本發明便可以利用 第三者數位權利管理(TPDRM 存取記憶體(RAM )類型的記 數位權利管理(TPDRM )的元 儲存在隨機存取記憶體(RAM 一個查表系統以輔助這個元資struct META * psN ext internal index of linked lists. DFSIDDf sld file disposal with this metadata attached. DFSFLAGFlags Flags for internal use—including a bit to define this object (such as digital rights management metadata) must be set. U1 6Metadata〇wner must match the metadata owner of the received keyKey certificate to establish the identifier of the metadata ownership. SYMMETRIC —KEYMe tad at aKey is the key U16ByteCUnt metadata used to encrypt these data, U8 [] Metadata, a digital rights management (DRM) metadata itself, in one embodiment of the present invention, The metadata of) is stored in random ten thoughts. However, if the data of the third party is too large to be complete, then the present invention can use the third party digital rights management (TPDRM access memory (RAM) type of digital rights management (TPDRM) meta) to be stored in Random access memory (RAM)

583568 五、發明說明(25)583568 V. Description of Invention (25)

料的儲存,其中,第三者數位權利管理(TpDRM )的元資 料乃是利用這個元資料物件所對應的儲存位置加以取代。 另外,特疋資料也僅能夠透過這個C 〇 n t e n t K e y 〇數位權利 管理(CKDRM )的應用程式界面(API )加以存取,其包括 有:這個引擎所管理的資料,其包括有提供播放金鑰及保 留複製计數的元資料。根據本發明的部分實施例,能夠透 過這個ContentKeyO數位權利管理(CKDRM)的應用程式界 面(AP I )加以存取的資料包括有:一個第二第三者數位 權利管理(TPDRM )所管理的資料,在這個例子中,資料 格式乃是利用這個第三者數位權利管理(TpDRM )加以定 義。The storage of materials, of which the third party digital rights management (TpDRM) metadata is replaced with the storage location corresponding to this metadata object. In addition, the special data can only be accessed through the application program interface (API) of the Cntent Key Digital Rights Management (CKDRM), which includes: the data managed by this engine, including the Key and metadata to keep the copy count. According to some embodiments of the present invention, the data that can be accessed through the ContentKeyO digital rights management (CKDRM) application program interface (AP I) includes: a data managed by a second third party digital rights management (TPDRM) In this example, the data format is defined using this third party digital rights management (TpDRM).

現在請參考第1圖,其乃是利用一個方塊圖以介紹電子内 谷的一個内容儲存模型。如圖中所示,這個電子内容總共 可以根據五種基本模型加以儲存與管理。其中,一種類型 係表示為π僅利用檔案系統方法的未管理内容”丨2 〇。未管 理内容120包括有基本資訊,諸如··本文(cleartext )資 料’如同一般電腦的儲存模型。另外,第1圖中亦表示有,, 第三者數位權利管理(TpDRM )管理内容” 13〇。這類内容 可以採用與未管理内容1 2 0相同的方法與手段。這類内容 包括有π僅利用檔案系統方法的第三者數位權利管理 (TPDRM )管理内容” 18〇。在這個模型18〇中,這種第三者 數位權利管理(TPDRM )必須對内容及元資料負起資料保 全的責任。模型180並不需要利用這種這種c〇ntentKey〇數 位權利管理(CKDRM )對這種第三者數位權利管理(TPDRMNow refer to Figure 1, which uses a block diagram to introduce a content storage model of the electronic valley. As shown in the figure, this electronic content can be stored and managed according to a total of five basic models. Among them, one type is expressed as π unmanaged content using only the file system method. "2. Unmanaged content 120 includes basic information, such as" cleartext "data, which is like a general computer storage model. In addition, the first Figure 1 also shows that there is a third party digital rights management (TpDRM) management content "13〇. This kind of content can use the same methods and means as the unmanaged content 120. This type of content includes a third-party digital rights management (TPDRM) management content using only a file system approach. "18. In this model, this third-party digital rights management (TPDRM) must be Data is responsible for data preservation. Model 180 does not need to use this kind of CntentKey digital rights management (CKDRM) to this third party digital rights management (TPDRM

第31頁 583568Page 583568

)進行預先認證,因此,任何類型的第三者數位權利管 (TPDRM )均能夠操作這個模型的管理内容。這個模型係 匹配於儲存第三者數位權利管理(TpDRM )管理内容槿 型,但卻沒有資料保全的手段。 、 在另一種類型的電子内容儲存中,第三者數位權利管理 (TPDRM)管理内容乃是利用檔案系統方法加以存取,但 是元資料的存取動作卻是利ffiC〇ntentKey〇數位權利管理 (CKDRM)手段,誠如這個c〇ntentKey〇數位權利管理 (CKDRM)的應用程式界面(Αρι ) 182。根據這個實施 例,一個内容儲存模型便可以針對元資料及加密金鑰提供 一個,高水準的資料保全。方塊184係有關於一個模型,、 其乃疋利用ContentKeyO數位權利管理(CKDRM)的元資料 規則及一個第三者數位權利管理(TpDRM )的應用程式界 面(API )以管理内容,其中,這個第三者數位權利管理 (TPDRM)的應用程式界面(Αρι)乃是用來管理電子内容 的表現。這個模型可以針對内容本身提供一個高水準的資 料保全’而其他資料層的加密則是利用一個引擎加以實 施0 另一個内,儲存模型14〇乃是用來表示:内容(内容及元 育料)乃是同時利用一個第三者數位權利管理(TPDRM) U 及利用ContentKeyO數位權利管理(CKDRM)規則加以管 理。11個模型140能夠容數位權利管理 (CKDRM)官理内容及第三者數位權利管理(TpDRM)管理 内容間存有一個重疊部分。因此,這個系統亦能夠支援透) Is pre-certified, so any type of third party digital rights management (TPDRM) can operate the management content of this model. This model is suitable for storing third-party digital rights management (TpDRM) management content, but there is no data retention method. In another type of electronic content storage, the third party digital rights management (TPDRM) manages the content to be accessed using the file system method, but the access action of the metadata is profitable. CKDRM) means, just like this application key interface (CKDRM) application program interface (Αρι) 182. According to this embodiment, a content storage model can provide a high level of data security for metadata and encryption keys. Block 184 is about a model that uses the metadata rules of ContentKeyO Digital Rights Management (CKDRM) and an application programming interface (API) for third-party digital rights management (TpDRM) to manage content. The three digital rights management (TPDRM) application program interfaces (Αρι) are used to manage the performance of electronic content. This model can provide a high level of data security for the content itself, while the encryption of other data layers is implemented using an engine. 0 Within the other, the storage model 14 is used to represent: content (content and meta-feed) It is managed by a third-party digital rights management (TPDRM) U and ContentKeyO digital rights management (CKDRM) rules at the same time. The eleven models 140 can accommodate an overlap between digital rights management (CKDRM) official content and third-party digital rights management (TpDRM) management content. Therefore, this system can also support transparent

第32頁 583568Page 583568

Ϊ了數位權利管理(CKD·)的應用程式界 (^ΤΡΤ^ΡΜ \進仃存取、並利用一個第三者數位權利管理 (TPDRM)進行管理的内容。 存:杈? 1 50乃是用來表示··内容及元資料乃是利用這個 Cor^tentKeyO數位權利管理(CKDRM)加以管理。模型15〇 2透過絕對不讓元資料離開這個引擎,藉以針對這個内 今窃供個較尚水準的資料保全。一種類型的内容(其適 用於這個模型)即是預先錄製内容。Access to the application world of Digital Rights Management (CKD ·) (^ ΤΡΤ ^ PM \) to access and use a third-party digital rights management (TPDRM) to manage content. Storage: Fork? 1 50 is for To show that the content and metadata are managed using this Cor ^ tentKeyO Digital Rights Management (CKDRM). Model 1502 does not allow the metadata to leave the engine, so as to provide a relatively high standard for this theft. Data preservation. One type of content (which applies to this model) is pre-recorded content.

一個控制内容的第三者數位權利管理(TpDRM )可以選擇 欲使用的模型,藉以將内容移動至—㈣片上。誠如熟習 此技藝者所明#,管理這個内容的規則可能會對欲採用模 型的選擇造成限制。再者,欲滿足的資料保全需求亦可能 曰改後:採用模型的選擇,其中,C〇ntentKey〇數位權利管 理(CKDRM)模型通常可以提供較高水準的資料保全。再 者i這些ContentKeyO數位權利管理(CKDRM )模型,在足 夠官理這個内容的必要許可時,亦可以對消費者及内容提 供者提供更為有效且具有附件價值的利益。A third party digital rights management (TpDRM) controlling the content can select the model to be used to move the content to the cymbal. As familiar to this artist #, the rules governing this content may limit the choice of models to be adopted. In addition, the data preservation needs to be met may also be changed afterwards: the choice of model is adopted. Among them, the ConntentKey〇 Digital Rights Management (CKDRM) model can usually provide a higher level of data preservation. Furthermore, these ContentKeyO digital rights management (CKDRM) models can provide consumers and content providers with more effective and valuable benefits when they are sufficient to manage the necessary permissions for this content.

第1圖更進一步表示:這個系統至少提供有兩種類型的内 容存取動作。特別是,存取動作16〇乃是表示:内容是可 以直接存取的,倘若這個内容是利用一個檔案系統存取動 作而未加管理的。在這個例子中,保護内容可以透過這個 檔案系統的應用程式界面(API)、透過這個存取動作16〇 加以存取。存取動作1 7 〇乃是表示··保護内容可以透過這 個(:〇1^6111:1^7〇數位權利管理((:01^)加以存取。Figure 1 further shows that this system provides at least two types of content access actions. In particular, the access action 160 means that the content can be directly accessed if the content is accessed using a file system and is not managed. In this example, protected content can be accessed through the file system's application programming interface (API) through this access action 16. The access action 1 7 〇 means that the protected content can be accessed through this (: 〇1 ^ 6111: 1 ^ 70 digital rights management ((: 01 ^)).

第33頁 五、發明說明(28) =1:: f2媒V其乃是利用-個内容流程圖2〇。以介紹 ΐ (SEC)系統中進行流動。如圖中所 :二供者202首先要決定係符合第1圖所示模型 =二?體上產生一個原版製作影片時,-個複製 上产,數個複製以用於傳播。符合這個内容流 ί (奕二包括有:音樂光碟(cd)、數位影音光 妒i81>1叼傾光碟的光學碟片、以及諸如 軟碟或磁帶的磁性媒體。這個複製器2〇4乃是一個製造Page 33 V. Description of the invention (28) = 1 :: f2 Media V It is a content flow chart 20. To introduce the flow in the ΐ (SEC) system. As shown in the figure: The second donor 202 must first decide whether it conforms to the model shown in Figure 1 = two? When an original production film is produced in vivo, one copy is produced and several copies are used for dissemination. In line with this content stream (Yi Er includes: music CD (cd), digital video optical i81> 1 叼 tilt disc optical discs, and magnetic media such as floppy disks or magnetic tapes. This duplicator 204 is One made

^其可以在任何媒體上加入任何必要的資料,藉以啟動 =個内容的資料保全功能,誠如第!圖所述。根據本發明 的另-個實施例,這個内容乃是由一個内容提供者流動至 :個伺服11206。在本發明的—個實施例中.,伺服器2〇6乃 疋用來將這個女全内谷轉移至一個或更多個資訊站2〇7、 直接轉移至一個引擎208 ( 3 )以接收安全資料、亦或轉移 至一個連結主機210,其耦接至一個引擎2〇8 (3 )。在本 發明的一個實施例中,這個連接主機21()乃是一台個人電 月b (PC),其可以啟動ContentKeyO數位權利管理(CKDRM )、第三者數位權利管理(TPDRM)、及檔案系統規則。 同時,内容亦會由一個引擎2〇8 (3 )流動至一個内嵌裝置 211。在本發明的一個實施例中,這個内嵌裝置2丨1可以啟 動ContentKeyO數位權利管理(CKDRM)及第三者數位權利 管理(TPDRM )。 另外,如第2圖所示,内容流動亦包括由一個引擎流動至^ It can add any necessary information to any media to activate the data security function of this content, as always! Pictured. According to another embodiment of the present invention, this content is flowed from a content provider to a server 11206. In one embodiment of the present invention, the server 206 is used to transfer the female whole inner valley to one or more information stations 207, and directly to an engine 208 (3) to receive The safety data is also transferred to a linked host 210, which is coupled to an engine 208 (3). In an embodiment of the present invention, the connection host 21 () is a personal electric month b (PC), which can start ContentKeyO digital rights management (CKDRM), third party digital rights management (TPDRM), and files System rules. At the same time, the content will also flow from an engine 208 (3) to an embedded device 211. In one embodiment of the present invention, the embedded device 2 丨 1 can start ContentKeyO digital rights management (CKDRM) and third party digital rights management (TPDRM). In addition, as shown in Figure 2, content flow also includes flow from one engine to

第34頁 583568Page 583568

五、發明說明(29) 引擎208 ( 2 )及208 ( 3 )間的另一個引擎。這類内容流 乃是發生在一個複製功能期間,其將進一步說明如後。 系統架構概要 這個ContentKeyO數位權利管理(c〇RM)乃是操作在這 安全電子内容(SEC )系統的脈絡中。第3圖乃是利用方 圖介紹這個安全電子内容(SEC )系統所支援的方法。這 些元件包括有:一個内容提供者30 2、產生預先錄製内^ 的工具及處理304、適當媒體(諸如:一個碟片)3〇6 個引擎308、先前討論的這些播放器31〇及這些數位權利总 理(DRM ) 312 。 官V. Invention Description (29) Another engine between 208 (2) and 208 (3). This type of content flow occurs during a copy function and will be explained further below. System Architecture Overview This ContentKeyO Digital Rights Management (CORM) operates in the context of this secure electronic content (SEC) system. Figure 3 is a diagram illustrating the methods supported by this secure electronic content (SEC) system. These components include: a content provider 30 2. tools and processing to generate pre-recorded content 304, appropriate media (such as a disc) 306 engines 308, the players 31 previously discussed, and these digital Right of Prime Minister (DRM) 312. official

根據本發明的一個實施例,這些元件會組織成一個系統架 構,藉以分割這個安全電子内容(SEC )系統、並指派其' 責任。舉例來說,一個内容提供者302便是負責帶入原始 内容、並執行與所有可變質量相關的決定。這些決定包括 有:那些檔案必須首先鎖定及解除鎖定;這個檔案應該在 什麼時候解除鎖定;這個内容是否可以採用執行 ContentKeyO數位權利管理(CKDRM)或第三者數位權利管 理(TPDRM)的播放器進行播放;根據ContentKey〇數位權 利管理(CKDRM )或第三者數位權利管理(TPDRM )規則可 以進行多少次複製;以及在C ο n t e n t K e y 0數位權利管理 (CKDRM)及第三者數位權利管理(TPDRM)領域中應該管 理什麼規則。 在本發明的一個實施例中,這個電子内容系統可以支援全 域的第二者數位權利管理(T P D R Μ )規則,藉以限制一個According to one embodiment of the invention, these elements are organized into a system architecture whereby the secure electronic content (SEC) system is divided and assigned its responsibilities. For example, a content provider 302 is responsible for bringing in the original content and performing all variable quality related decisions. These decisions include: those files must first be locked and unlocked; when should this file be unlocked; whether this content can be performed using a player that implements ContentKeyO Digital Rights Management (CKDRM) or a third party digital rights management (TPDRM) Playback; how many times can be copied according to ContentKey 0 digital rights management (CKDRM) or third party digital rights management (TPDRM) rules; and C ο ntent K ey 0 digital rights management (CKDRM) and third party digital rights management ( TPDRM) what rules should be managed in the field. In one embodiment of the present invention, the electronic content system can support global second-party digital rights management (TPRM) rules to limit one

第35頁 583568 五、發明說明(30) -- 第三者數位權利管理(TpDRM )同意進行的後續複製數 目。在本發明的其他實施例中,這個電子内容系統則是可 以支援特定的第三者數位權利管理(TpDRM )。 產ΐ予f先錄製内容304的這些工具及程序304乃是擷取一個 内容提供者3〇2的所有輸入、並產生適當的數位媒體3〇6以 與預,錄製内容的所有要件相符。隨後,這個内容便會編 馬成複數種格式中的一種,倘若尚未編碼的話。這個内容 乃疋利用預定方法(如說明書所述)所產生及儲存的金 餘進而加岔在加密層中。這個ContentKeyO數位權利管Page 35 583568 V. Description of the invention (30)-The number of subsequent copies agreed by the third party digital rights management (TpDRM). In other embodiments of the invention, the electronic content system can support specific third-party digital rights management (TpDRM). The tools and programs 304 that produce the first recorded content 304 are to take all the input from a content provider 302 and generate the appropriate digital media 306 to match all the pre-recorded content requirements. This content will then be compiled into one of a plurality of formats, if not yet encoded. This content is added to the encryption layer using the funds generated and stored by a predetermined method (as described in the specification). This ContentKeyO digital rights tube

理(CKDfM )的元資料及這個第三者數位權利管理(TPDRM )的7L資料,倘若存在的話,則是根據說明書所述方法加 以儲存。 ,,本發明的一個實施例,數位媒體306包括有:支援全 部^木用模型及内容提供者302指定許可所需要的全部資 訊0 、 根據本發明的一個實施例,一個播放器31 0乃是一個憑證 主機3 1 6 ’藉以接收來自一個憑證管理中心(C A ) 3 2 0的一 $憑證31 8。憑證31 8乃是用來提供這些協定的一個鑑別部The metadata of the management (CKDfM) and the 7L data of this third party digital rights management (TPDRM), if any, are stored according to the method described in the instruction manual. According to an embodiment of the present invention, the digital media 306 includes: all information required to support all the wood models and content providers 302 to specify the license 0. According to an embodiment of the present invention, a player 3 10 is A credential host 3 1 6 'receives a $ credential 31 8 from a credential management center (CA) 3 2 0. Credential 31.8 is an authentication department used to provide these agreements

=、亚建立一個鑑別通道以存取安全應用程式界面(API )° 3擎308對這些播放器310呈現有應用程式界面(API)、 二且呈現有第三者數位權利管理(TPDRM)及ContentKeyO 々 權利管理(CKDRM )以支援複數種採用的模型。在本 的一個實施例中,引擎3 0 8乃是透過硬體及韌體的實= 、 Asia establishes an authentication channel to access the secure application programming interface (API) ° 3 engine 308 presents an application programming interface (API) to these players 310, and presents a third party digital rights management (TPDRM) and ContentKeyO 々 Rights Management (CKDRM) to support multiple adopted models. In one embodiment, the engine 308 is implemented through hardware and firmware.

583568 五 發明說明(31) 施方法、並且亦透過加密金鑰 資料保全。在本發明的一個實於彳用,進而支援本發明的 各個引擎所專有,並且,部二力=,中,這些加密金餘乃是 用。舉例來說,各個引擎可^勺°铪金鑰乃是所有引擎所共 以儲存一個簽章金鑰表列。在太=有非揮發性纪憶體,藉 個表列可以是一個陣列的公開么^明的一個實施例中,這 心(CA )的簽章。 金鑰,藉以認證憑證管理中 在本發明的一個實施例中, (API),這個引_8乃是在的應用程式界面 點。這個引擎308乃是用來對播放鑑制別連接的一個端 的各個加密層進行解密及加密動作値、及1遞功能中 這個碟片層執行基本的解除Λ引擎可以在 乃是用來管理播放及複製Λ解w.m個引擎_ 上的複製數目。 卞J己括.遞減廷個碟片306 的一個實施例中,這個引擎308乃是利用—個萬 (CKDM彳(USB )或是與這些C〇ntentKey〇數位權利管理 及DataPlay檔案系統(DFS)應用程式界面 (API )所採用應用程式界面(Αρι )相符的 程式進行運作。這個驅動程式,纟本發明的—個範;^動 此夠讓這個引擎與其他主機(其包括有播放器,諸如: 人包恥)進行通彳§,無淪這個主機的硬體製造商或 為何。這個作業系統可以利用一個視窗註冊檔 八焉 (WmdowsTM Register)或是.inf檔案進行通信, 在複數個引擎連接至一個主機時,決定這個驅動程式9在一 M3568 五、發明說明(32) 個系統中的位置。 参c5U8的一個裝置的一伽583568 5 Invention description (31) Application method, and also data encryption through encryption key. In a practical application of the present invention, the engines that support the present invention are exclusive to each engine, and, the second force =, these encryption funds are used. For example, each engine can store a list of signature keys shared by all engines. In one embodiment where there is a non-volatile memory, it can be an array of public disclosure. This is the signature of the heart (CA). The key is used for authentication certificate management. In one embodiment of the present invention, (API), this reference is the application program interface point. This engine 308 is used to perform decryption and encryption operations on the various encryption layers on one end of the playback authentication connection, and the disc layer in the 1-pass function performs basic deactivation. The engine can be used to manage playback and The number of copies on the Λ solution wm engines_. In an embodiment of the decrementing disc 306, the engine 308 uses a CKDM (USB) or a digital rights management and DataPlay file system (DFS) with these ConntentKeys. The application program interface (API) adopts an application program interface (Αρι) -compliant program to operate. This driver program is based on the present invention—a model; ^ This is enough to make this engine and other hosts (which include players, such as : Human package shame) carry out communication, without any hardware manufacturer of this host or why. This operating system can use a Windows registration file (WmdowsTM Register) or .inf file to communicate and connect to multiple engines When it comes to a host, determine the position of this driver 9 in a M3568 V. Invention description (32) systems. See a device of a device in c5U8

亦可以是-個平二上面/機°P刀。或者’一個播放器310 有一個引擎mm㈣W 31。均是利用這個引以8所=在,個例子中’播放器 r ΔΡΤ , ^ Ή拏308所呈現出來的應用程式界面 加Μ ^ /藉以存取一個碟片3〇6上的内容及呈現資訊。這 >、器31 乃是利用這個資訊以呈現資料給一個使用 、並表現這個内容。為存取安全内容,播放器3iq乃是 安全應用程式界面(Api ) 3G9中已建立鑑別連接的 一個端點。再者,為播放内容,根據本發明的一個實施 例,一個播放器31 〇亦必須在一個管理中心3 2 〇簽發憑證給 =個播放器31 0後,.要求一個鑑別通道。這個憑證簽發的 程序包括有:簽發一個公開金鑰及私密金鑰對、以及一個 憑證3 1 8給播放器31 〇。這個鑑別通道可以同意對於一個安 全應用程式界面(API) 309的存取動作。 如先前所述,Con tent KeyO數位權利管理(CKDRM )以及一 個或更多個第三者數位權利管理(TPDRM ),倘若媒體係It can also be a flat two top / machine ° P knife. Or, 'A player 310 has an engine mm㈣W 31. All use this to refer to 8 = In the example, 'player r ΔΡΤ, ^ Ή take the application program interface presented by 308 plus M ^ / to access the content and presentation information on a disc 3 06 . This > device 31 is using this information to present the data to a use and to express this content. In order to access secure content, the player 3iq is an endpoint of the authenticated connection established in the secure application programming interface (Api) 3G9. Furthermore, in order to play the content, according to an embodiment of the present invention, a player 3100 must also issue a voucher to a player 3120 at a management center 3200 and require an authentication channel. The procedure for issuing this certificate includes: issuing a public key and a private key pair, and a certificate 3 1 8 to the player 31 0. This authentication channel may agree on access to a secure application programming interface (API) 309. As mentioned earlier, Content KeyO digital rights management (CKDRM) and one or more third party digital rights management (TPDRM), if the media is

架構以利用第三者數位權利管理(TPDRM ),乃是用來管 理權利及管理安全内容的運作。C ο n t e n t K e y 0數位權利管 理(CKDRM)及/或第三者數位權利管理(TPDRM)乃是用 來實施這個内容提供者302所指定且儲存在這個碟片306上 的規則。為存取安全内容,這個ContentKeyO數位權利管 理(CKDRM)或是一個第三者數位權利管理(TPDRM)乃是The framework uses third party digital rights management (TPDRM) to manage rights and manage the operation of secure content. C n t e n t K e y 0 Digital Rights Management (CKDRM) and / or Third Party Digital Rights Management (TPDRM) are used to implement the rules specified by the content provider 302 and stored on the disc 306. To access secure content, the ContentKeyO Digital Rights Management (CKDRM) or a Third Party Digital Rights Management (TPDRM) is

第38頁 583568 五、發明說明(33)Page 38 583568 V. Description of the invention (33)

在這個安全應用程式界面(API ) 309中已建立鑑別連接的 一個端點。這個第三者數位權利管理(TPDRM )的實施乃 是在這個引擎308以外。並且,這個引擎308乃是透過一個 安全應用程式界面(AP 1)309,藉以提供媒體3 06上的安 全儲存。再者,倘若媒體係架構以利用第三者數位權利管 理(TPDRM),則這些第三者數位權利管理(TPDRM)便需 要與已揭露的安全電子内容(SEC )系統相符。特別是, 一個相符的第三者數位權利管理(TPDRM )必須,在存取 内容及安全資料前,要求一個鑑別通道。根據本發明的一 個實施例,這個鑑別通道乃是透過:首先簽發憑證給這個 第二者數位權利管理(T P D R Μ )、並且簽發一對公開金鑰 及私密金鍮及一個ContentKeyO數位權利管理(CKDRM )憑 證,進而加以產生。這個C ο n t e n t K e y 0數位權利管理 (CKDRM )憑證可以包括有一個憑證管理中心簽章公開金 鑰識別號碼(CA Signature Public Key ID)或公開金鑰 識別碼,藉以作為一個引擎3 0 8中一個認證簽章金鑰表列 的一個索引,用於複數種不同的用途中,其將進一步說明 如後。這個鑑別通道的產生乃是用來進一步存取一個安全 的應用程式界面(API )。 現在請參考第4圖,其係表示這個安全電子内容(SEC )系 統的一種開放系統互連模型(0SI M〇del ) 40〇,藉以提供 這個架構的一個概觀’進而支援參考第2圖所述的功能及 其他功能。 在第4圖中,這個層積式開啟系統互連(I )模型4 0 0乃An endpoint of an authenticated connection has been established in this secure application programming interface (API) 309. This third party digital rights management (TPDRM) implementation is outside of this engine 308. In addition, the engine 308 provides secure storage on the media 306 through a secure application programming interface (AP 1) 309. Furthermore, if the media system is structured to take advantage of third party digital rights management (TPDRM), then these third party digital rights management (TPDRM) need to be consistent with the disclosed secure electronic content (SEC) system. In particular, a conforming third-party digital rights management (TPDRM) must require an authentication channel before accessing content and security data. According to an embodiment of the present invention, the authentication channel is through: firstly issuing a certificate to the second party digital rights management (TPDR M), and issuing a pair of public key and private key and a ContentKeyO digital rights management (CKDRM ) Credentials, which are then generated. The C ο ntent K ey 0 digital rights management (CKDRM) certificate may include a certificate management center signature public key identification number (CA Signature Public Key ID) or public key identification code, as an engine 3 0 8 An index of a list of authentication signature keys is used in a number of different applications, which will be explained further below. This authentication channel is created for further access to a secure application programming interface (API). Please refer now to FIG. 4, which represents an open system interconnection model (0SI M0del) of the secure electronic content (SEC) system 40, so as to provide an overview of the architecture 'and to support the reference to FIG. 2 And other functions. In Figure 4, this layered open system interconnection (I) model 4 0 0 is

第39頁 583568 五、發明說明(34) 是用來表示在這些主機31〇、弓丨擎3〇8、及媒體3〇6中所支 援的路徑。如圖中所示,第4圖係包括有—個實體層41〇、 -個命令資料層4〇6、一個資料連結層4〇8、一個對話声 4〇4、及-個應用程式層4()2。第4圖乃是參考—個主機曰、 一個引擎308、及數位媒體3〇6間的互連元件,藉以說 個貧料層的用途。再者,主機31〇、引擎3〇8、及數 306以外的互連亦應該屬於本發明的範圍,目此,在第j 中排除這類互連並不是用來限定本發明。 ° 互連(0SI)模型4心是參考第2圖 ?:内谷流動說明如後。一個媒體3〇6 (諸如: ^ ΪI ί A㈣H永久固定在—個引擎308内的媒 以及Γ匕 #案系統檔案資料47〇、檔案系統元資料472、 fntentKey0數位權利管理(CKDRM )的元f > 3:以:乍為實體層4i。的部分。*這個主細及::弓4擎 7中:這些資料乃是透過實體層界面m及448進= k I媒體306的資料乃是透過一個資料 件460中的資料Λ : 光碟實施例中、位於光學元 解譯可能會需要的#明瞭:其他類型媒體的Page 39 583568 V. Description of the Invention (34) is used to indicate the paths supported by these hosts 3110, G3 Engine 3008, and Media 3006. As shown in the figure, the fourth diagram includes an entity layer 410, a command data layer 4 06, a data link layer 4 08, a dialog 4 0, and an application layer 4 ()2. Figure 4 is a reference—interconnected components between a host computer, an engine 308, and digital media 306, to illustrate the use of a lean layer. In addition, interconnections other than the host 308, the engine 308, and the number 306 should also fall within the scope of the present invention. For this reason, excluding such interconnections in j is not intended to limit the present invention. ° Interconnection (0SI) model 4 is referred to Figure 2?: Inner valley flow is explained later. A media 3 06 (such as: ^ ΪI ί A㈣H is permanently fixed in an engine 308 media and file system file data 47, file system metadata 472, fntentKey0 digital rights management (CKDRM) element f > 3: Take: Zha as part of the physical layer 4i. * This main detail and :: bow 4 engine 7: these data are through the physical layer interface m and 448 into = k I media 306 data is through a Data Λ in data file 460: In the optical disc embodiment, located in the optical element interpretation may be needed #Clear: Other types of media

便需要一個磁性 j來”兄磁性媒體 中,一個界面^2乃是;?/機310及這個引擎3〇8 在這個命令資料;:疋用f提供這個資料連結層408。 入動作454以Λ :―個播放器乃是透過讀取/窝 w貝取或寫入這個媒濟q G。尤、士 寫 這個引擎308中,在人人眘粗爲“ 廷個主機308及It requires a magnetic j to "brother magnetic media, an interface ^ 2 is;? / Machine 310 and the engine 3008 in this command data :: Use f to provide this data link layer 408. Enter action 454 to Λ : ―A player reads or writes this media through reading / writing. G. You and Shi wrote this engine 308. In everybody ’s care, it ’s called “the host 308 and

第40頁 在〒令貝枓層406上,這個界面協定乃是 583568 五、發明說明(35) 根據在續取/寫入動作4 5 4讀取的資料,藉以執行一個樓 案系統42〇及/或這個ContentKeyO數位權利管理(CKDRM )4 3 0 特別是’根據本發明的一個實施例,一個主機3 1 0 必須要在這個應用程式層簽發憑證4丨3,藉以執行 ContentKeyO數位權利管理(CKDRM ) 430。這個簽發憑證 的程胃序(其將更詳細地說明如後)乃是用來決定這個主機 310是否為安全的416或是不安全的414。一個憑證主機可 以在這個對話層404中執行加密/解密程序,鑑別一 溷通道(其將進一步說明如後)。一個未經憑證的主機 412則是透過一個開啟檔案系統42〇、在這個對話層4〇4中 執行不安全程序41 4。 ,於不安全的内容而言’這個引擎308乃是在這個應用程 式層上執行檔案及元資料映射動作44〇、並在這個命令資 =層t〇6上執行開放檔案系統42〇。另外’對於安全内容而 ς k個引擎3 08則不僅是在方塊44〇處理檔案及映射元資 =:同時亦會利用這個命令資料層4〇6上的c〇ntentK數 立,利管理(CKDRM)規則430,透過資料保全動作416 (2 匕::密/解密動作418 (2)以在這個對話層中料些安 行加密及解密動作。根據本發明&-個實施例, J個。及這個弓丨擎3。8乃是利用伺1定 …以 C向這個媒體36上、應該在這個對話層綱 即…::内合的:置’藉以與這個媒體同時動作。隨 402’: t安全及二安全的資料便可以在這個應用程式層 402中、利用方塊管理裝置45〇加以管理。Page 40 On the order layer 406, the interface agreement is 583568 V. Description of the invention (35) According to the data read in the fetch / write action 4 5 4 to implement a building case system 42 and / Or the ContentKeyO digital rights management (CKDRM) 4 3 0, especially according to an embodiment of the present invention, a host 3 1 0 must issue a certificate 4 丨 3 at the application layer to perform ContentKeyO digital rights management (CKDRM) ) 430. The sequence of issuing certificates (which will be described in more detail below) is used to determine whether the host 310 is a secure 416 or an insecure 414. A credential host can perform encryption / decryption procedures in this dialog layer 404 to authenticate a channel (which will be explained further below). An uncertified host 412 executes an insecure process 41 4 through an open file system 42 in this dialog layer 404. For insecure content, the engine 308 executes the file and metadata mapping action 44 on the application layer, and executes the open file system 42 on the command layer t06. In addition, for secure content, the k engines 3 08 will not only process the files and mapping resources at block 44〇 =: At the same time, this command will also use the cKntentK on the data layer 406 to manage and benefit (CKDRM ) Rule 430, through data preservation action 416 (2 :: secret / decryption action 418 (2) to include some encryption and decryption actions in this dialog layer. According to the present invention &-embodiments, J. and This bow, engine 3.8, is to use the server ... to C to the media 36, it should be in the dialogue hierarchy ... :: intact: set 'to act simultaneously with this media. With 402': t The secure and two-secure data can be managed in this application layer 402 using the block management device 45.

583568 五、發明說明(36) 第4圖乃是用來表示:未經憑證的主機應用 存取安全對話416⑴、執行資料加密或解密418⑴"、 及執行ContentKeyO數位權利管理(CKDRM)命令43〇 ^30 安第4圖更進一步表憑證主機應用程式413 此夠透過檔案系統420,存取未憑證應用程式所能夠提供 的全部檔案系統方法。583568 5. Description of the invention (36) The fourth figure is used to show: the unauthenticated host application accesses the secure session 416⑴, performs data encryption or decryption 418⑴, and executes ContentKeyO digital rights management (CKDRM) command 43〇 ^ Figure 30 shows the certificate host application 413. This is enough to access all the file system methods provided by uncertified applications through the file system 420.

ContentKeyO數位權利管理資料保全—概觀 現在請參考第5A圖,其乃是用來說明這個c〇ntentKey〇數 位權利管理(CKDRM )資料保全的一個概觀。這個 ContentKeyO數位權利管理(CKDRM)乃是用來實施一種有 效的貧料保全模型,其中,電子内容乃是透過一個應用程 式516加以產生及保全、並且表示為檔案5〇2以及元資料 5 04。隨後,這些内容元件5〇2及5〇4便執行加密動作。因 此,當透過一個開放應用程式界面( Apl )讀取或複製這 個内容檔案5 0 2時,便會返回一種加密形式。當存取内容 以進行播放或傳遞至一個第三者數位權利管理(TPDRm ) 時,便會返回具有一個較高加密形式的這個内容。 安全内容50 2及504的存取分別是透過開放應用程式界面 (API ) 50 6及安全應用程式界面(API ) 5 0 8加以進行。開 放應用程式界面(API ) 5 0 6僅僅容許徹底的擋案讀取及寫 入存取動作512 ;這些安全的元資料及未加密的内容並無 法透過開放應用程式界面(AFM ) 5 〇 6加以供應。再者,無 論是安全應用程式界面(Ap I ) 5 〇 8或是開放應用程式界面 (AP I ) 5 0 6均無法揭露原始内容及對這個媒體進行方塊存ContentKeyO Digital Rights Management Data Preservation-Overview Please refer to Figure 5A, which is an overview of the contnKeyKey Digital Rights Management (CKDRM) data preservation. The ContentKeyO digital rights management (CKDRM) is used to implement an effective lean material preservation model, in which electronic content is generated and preserved through an application 516, and is represented as file 502 and metadata 504. Subsequently, these content elements 502 and 504 perform encryption operations. Therefore, when the content file 502 is read or copied through an open application program interface (Apl), an encrypted form is returned. When content is accessed for playback or passed to a third party digital rights management (TPDRm), the content is returned in a higher encrypted form. The access to the secure content 50 2 and 504 is performed through the open application program interface (API) 50 6 and the secure application program interface (API) 508, respectively. Open Application Programming Interface (API) 5 0 6 only allows complete archival read and write access actions 512; these secure metadata and unencrypted content cannot be accessed through Open Application Programming Interface (AFM) 5 06 supply. Moreover, neither the secure application programming interface (Ap I) 508 nor the open application programming interface (AP I) 506 can reveal the original content and block the media.

第42頁 583568 五、發明說明(37) 取動。這些安全應用程式界面(API) 508對於内容502及 5 0 4的存取動作必須加以限制,如此,僅僅有安全應用程 式界面(API)能夠擷取安全的元資料510 ^再者,這個存 取動作亦會受到廢止方法5 1 8中廢止動作的限制。 這些開放及安全應用程式界面(API ) 506及5 08乃是強調 在一個硬碟界面與一個利用應用程式界面(AP I ) 5 〇 6及 5 0 8的界面間的一個關鍵性差異。根據本發明的一個實施 例,媒體内容的方塊階層存取動作乃是透過具有_個$方^ 驅動程式的韌體加以執行。在一台電腦中,硬碟上内容、A 方塊階層存取動作通常僅僅能夠透過一個方塊驅動程=, 以執行。這個韌體可以透過不支援方塊驅動程式=I 口 取動作,藉以避免開放存取的問題。這個標 Λ = γ是階層式的。在本發明的一個實施例= 片可u具有一個可寫入、寫入一次部分、及具 、-茱 内容的-個唯讀部分。一個媒體識 ;立、先錄製 ::::、並且可以是或可以不是相同的識::: =各 本么月的一個實施例中,這個識別碼乃 再者, 片中碩取、並擷取以應用在一個特殊廷固媒體碟 )及/或韌體中。這個識別碼可以盔—路 ,的一個播種,無論這個加密方塊中 為一個加密方 諸炎去當C: η "万塊。 二,哼弟5Β圖,根據本發明的一個 有關於包括有-個識別碼的媒體,且:::是有一 岔:塊。在本發明的實施例,,這個力:有-個解 二重資料加密標準(trlple—DES)力在方塊可以是一個Page 42 583568 V. Description of Invention (37) Take action. These secure application programming interfaces (APIs) 508 must restrict access to content 502 and 504. In this way, only secure application programming interfaces (APIs) can retrieve secure metadata 510 ^ Furthermore, this access The operation will also be restricted by the abolition operation in the method 5 1 8. These open and secure application programming interfaces (APIs) 506 and 508 emphasize a key difference between a hard disk interface and an interface that utilizes application programming interfaces (AP I) 506 and 508. According to an embodiment of the present invention, the block-level accessing action of the media content is performed through a firmware having a driver. In a computer, the contents of the hard disk, A block level access can usually only be performed through a block driver =. This firmware can avoid the problem of open access by not supporting the box driver = I port. The label Λ = γ is hierarchical. In one embodiment of the present invention, the slice can have a writable, write-once portion, and a read-only portion with the contents of the -Zhu. A media identification; record first ::::, and may or may not be the same identification ::: = In one embodiment of each month, this identification code is another one, which is taken from the film and extracted For use in a special Tinggu media disc) and / or firmware. This identification code can be a seed for helmet-road, regardless of whether the encryption block is an encryption method for C: η " 10,000 yuan. Second, figure 5B, according to the present invention is related to a media including an identification code, and ::: is a fork: block. In the embodiment of the present invention, this force: there is a solution. The double data encryption standard (trlple-DES) force can be a

第43頁 583568 五、發明說明(38) 媒體擷取資料的安全方法。方埗Η ^ % θ $ 牡从六兩缸你 …此杳4:1 π 鬼53 0乃疋透過韋刃體啟動資 科的存取動作。这些貝枓可以儲存在方塊中 過韌體内部的一個方塊驅動裎或冷―女& 4 边Page 43 583568 V. Description of the invention (38) Security method for media retrieval. Fang 埗 Η ^% θ $ From six or two cylinders you… this 杳 4: 1 π 鬼 53 0 Nai 启动 through the Wei blade body to start the asset access action. These shells can be stored in a block driven by a block inside the firmware or cold-female & 4 sides

乃是用來避免這個韌體以外的資料户你也a 兄Z 〜貝料存取動作。在本 一個實施例中,這個早刃體乃是句技i , 疋匕括在一個特殊應用的積艚 電路(ASIC )内部。這個韌體乃$栩1 &粑用扪檟體 利聪及足個特殊應用的積體電路 (AS I C )可以位於一個主機內卹 j领版电格 ^ 戍内邛。在本發明的一個實施例 中,這個韌體可以包括有:一個裳一 I奴从π 1固弟二者數位權利管理 (TPDRM )應用程式界面(API )、一細“ + τ, 、Q」、一個 ContentKeyO 數位 權利管理(CORM)應用程式界面(Αρι )、及/或一個 DataPlay檔案系統(DFS)應用程式界面(Αρι)。 請再度參考第5A圖,這個方塊圖乃是用來進一步表干·这 些安全應用程式界面(API ) 5〇8及安全内容5〇2及5〇4必須 要求一個憑證5 1 4以進一步加以限定。根據第%圖所示的 一個憑證簽發程序,在方塊550中,主機乃是自控制主機 憑證的一個實體中接收一個憑證514。這個憑證514乃是用 來指定一個應用程式516可以存取的這些安全應用程式界 面j AP I ) 5 0 8。在這個實施例中,一個主機可以包括任何 内甘欠有一個引擎、一個第三者數位權利管理(Tpj^M )、 在一個開放計算環境中執行的一個應用程式、或一個情報 交,所伺服器的實體裝置。特別是,contentKey〇數位權 利管理(CKDRM )憑證係能夠利用一把私密金鑰(其乃是 根據一種類別的裝置加以指派)進行簽章動作。在本發明 的一個實施例中,私密金鑰僅僅能夠用於一種類別,並It is used to avoid data users other than this firmware. You can also access the data. In this embodiment, the early blade body is a sentence technique i, which is enclosed in a special application integrated circuit (ASIC). This firmware is $ 1 and amp. 利 Ricong and integrated circuit (AS I C) for a special application can be located in a host shirt j-column version of the power grid ^ 戍 邛 邛. In one embodiment of the present invention, the firmware may include: a digital slave management (TPDRM) application program interface (API), a thin "+ τ,, Q" , A ContentKeyO digital rights management (CORM) application program interface (Αρι), and / or a DataPlay file system (DFS) application program interface (Αρι). Please refer to Figure 5A again. This block diagram is used to further express these security application program interfaces (APIs) 508 and security content 502 and 504 must require a certificate 5 1 4 to further limit . According to a credential issuance procedure shown in Figure%, in block 550, the host receives a credential 514 from an entity that controls the credential of the host. This certificate 514 is used to designate the secure application interfaces j AP I) 5 0 8 that an application 516 can access. In this embodiment, a host may include any engine that owes an engine, a third party digital rights management (Tpj ^ M), an application program running in an open computing environment, or an information exchange server. Device's physical device. In particular, the contentKey0 digital rights management (CKDRM) certificate can use a private key (which is assigned based on a type of device) to perform the signing action. In one embodiment of the invention, the private key can only be used for one category, and

第44頁 583568Page 583568

且,其對應的公開金鑰僅僅屬於一種類別的—此壯 置類別可以包括有:引擎、内後有一;:口; 數位ί/Ο埠的主機裝置、内嵌有一個引擎並 /0埠的主機裝置、以及未内丧一 戎。名太恭Β日ΛΑ加—> ^ 1U引擎的主機應用程 式在本發明的一個貫施例中,引擎可以 置的公開金鑰,並且,這個引擎 别衣 的主機。 1芋刀惶值而要鑑別一個内嵌 請參考第5C圖,在方塊552中,為啟動—個 複製動作,各個引擎必須接收一個憑 擎二引擎的And, its corresponding public key belongs to only one category—this build category can include: engine, one inside; one: port; a host device with digital ί / Ο port, one with embedded engine and / 0 port Host device, and not all lost. The name is too respectful. ^ 1U host application of the 1U engine. In one embodiment of the present invention, the engine can set a public key, and the engine is not a host. 1 Taro value to identify an embedded Please refer to Figure 5C, in block 552, in order to start a copy action, each engine must receive a

要藉著接收-個憑證,•以鐘別未内嵌有—個卜 應用f式。在方塊554中’控制簽發憑證的實體乃a加穷’ 地,章憑證514。這個憑證514乃是用來指出—種類疋別。,-其 乃疋用來指定這個憑證持有者主機用來接收存取命人ς 全”程式界面(ΑΡΙ) 5 0 8。在本發明的—個實施:中“ 憑證5 U乃是用來指出發佈這個憑證5 j 4的公司。心曰 的另一個實施例中,憑證514亦可以指出這些°引擎及&明 主機的一個或更多個類別,其包括有:產品類型、 5 線、模型、修訂版、及序號。 、 ^To receive a voucher, • Do not have a built-in — a type of application. At block 554, 'the entity that controls the issue of the certificate is a plus poor', chapter certificate 514. This voucher 514 is used to indicate-the type of difference. -It is used to specify that the certificate holder host is used to receive access to the full program interface (API) 5 0 8. In one implementation of the present invention: "The certificate 5 U is used to Identify the company that issued this voucher 5 j 4. In another embodiment, the certificate 514 may also indicate one or more categories of these engines and & hosts, including: product type, 5-line, model, revision, and serial number. , ^

以下表示的第2Α表乃是來表示根據本發明—個實施例的 一個憑證。 第2A表 欄位號碼攔位名稱指派任務 1憑證管理中心(CA)識別碼,版本由控制主機凴 動作的實體指派 匕 又又Table 2A shown below is to show a certificate according to an embodiment of the present invention. Table 2A Field No. Block Name Assignment Task 1 Credential Management Center (CA) identification code, version is assigned by the controlling entity 凴 action entity

583568 五、發明說明(40) 2簽章金鑰識別碼(I D )由憑證管理中心(C A )指派 3揭露方法由憑證管理中心(CA )指派以限定主機許可 4公司由憑證管理中心(CA )指派 5模型識別碼(I D ),修訂版由公司指派 6元資料識別碼(ID )由憑證管理中心(C A )設置 7主機簽章金鑰由公司指派以用於主機簽章確認 8憑證管理中心(CA )簽章確認全部的欄位1 一 7 9序號田公司指派 1 0協定金鑰由公司指派以用於安全金鑰交換 11主機簽章由公司指派(主機協定公開金鑰是由對應主機 簽章公開金鑰的私密金鑰進行簽章)確認全部的欄位1 一 10 (CA )簽 應於一個簽 當一個裝置 鑰以對應 章乃是利 章金錄識 通過認證 的三個欄 熟習此技 措者讓錯 個實體以 中,這些 在第2A表中的前八個物件乃是由要求一個憑證的公司供應 至一個憑證管理中心(CA )。一個公司會保留一個私密金 這個主機簽章金鑰。這個憑證管理中 用一個私密金鑰加以產生,其乃是對 別碼(ID )中指定的一個公開金錄 時,這前八個物件便會返回到這個製造商。最後 位,9 — 11,則是由這個製造商加入。 進而啟動一 一個實施例 藝者在瞭解本發明揭露後當明白:這個憑證乃是 誤裝置及具有潛在缺陷的裝置無效, 控制主機及引擎的品質。在本發明的 欄位1 一 8乃是由控制主機及引擎的實體所發佈583568 V. Description of the invention (40) 2 Signature key identification code (ID) is assigned by the certificate management center (CA) 3 Disclosure method is assigned by the certificate management center (CA) to limit the host license 4 The company is authorized by the certificate management center (CA) Assign 5 model identification code (ID), the revised version is assigned by the company 6 meta data identification code (ID) is set by the certificate management center (CA) 7 host signing key is assigned by the company for host signing confirmation 8 certificate management center (CA) Signature confirm all fields 1-7 9 Serial number assigned by Tian company 10 Agreement key assigned by company for secure key exchange 11 Host signature assigned by company (Host agreement public key is assigned by corresponding host Sign the private key of the public key for signing) Confirm all the fields 1-10 (CA) Signed on a device key to correspond to a seal is a three-column accreditation that has been certified and familiar with this technique Let the wrong entity account for these. The first eight items in Table 2A are supplied by a company that requires a certificate to a certificate management center (CA). A company keeps a private key, the host signing key. In the certificate management, a private key is used to generate the public key list specified in the identification code (ID), and the first eight objects are returned to the manufacturer. The last bit, 9-11, was added by this manufacturer. Then, an embodiment is started. After understanding the disclosure of the present invention, the artist should understand that this certificate is a wrong device and a device with potential defects is invalid, and controls the quality of the host and the engine. Fields 1 to 8 in the present invention are issued by entities controlling the host and engine

第46頁 583568 五、發明說明(41) 並且提供給一個裝置製造商。隨後,這個裝置製造商才會 將棚位9 — 11附加上去。 在本赉明的一個貫施例中,這些憑證所 ;馬類別乃 是能夠提供一組能夠揭露的方法,如同:=二:乃 數位權利管理(CKDRM )憑證所指定的方法。任何组合的 方法均可以利用這個憑證格式加以揭露。然而,第2β表所 提供的,則是能夠透過這個憑證類別加以揭露的可能方法 的一個例子。Page 46 583568 V. Description of Invention (41) and provided to a device manufacturer. Later, the device maker will add booths 9-11. In one embodiment of the present invention, these vouchers; the horse class is able to provide a set of methods that can be exposed, as: = 2: is the method specified by the digital rights management (CKDRM) voucher. Any combination of methods can be exposed using this credential format. However, what Table 2β provides is an example of a possible method that can be exposed through this category of credentials.

如表中所示,這些類別可以包括有··一個引擎、一個播放 器、一個第三者數位權利管理(TPDRM )領域、一個 ContentKeyO數位權利管理(CKDRM )的原版影片製作工具 領,、「個資訊站、及一個情報交換所伺服器領域。這些 揭i备方法乃疋弟二者數位權利管理(T p⑽% )及 ContentKeyO數位權利管理(CKDRM )方法。雖然任何特定 類別均可以使用任何組合的揭露方法,第2β表僅表示其中 的一種可能實施例。 第2B表 類別揭露方法As shown in the table, these categories can include an engine, a player, a third-party digital rights management (TPDRM) domain, a ContentKeyO digital rights management (CKDRM) original video production tool leader, "a Information stations, and a clearinghouse server field. These methods are the two methods of digital rights management (TP%) and ContentKeyO digital rights management (CKDRM). Although any combination can be used in any particular category Disclosure method, Table 2β only shows one of the possible embodiments. Table 2B Category Disclosure Method

引擎ContentKeyO數位權利管理(CKDRM )複製 播放HContentKeyO數位權利管理(CKDRM)記錄 ContentKeyO數位權利管理(CKDRM)播放 第二者數位權利管理(T p d r μ ) C ο n t e n t K e y 0數位權利管理 (CKDRM)記錄第三者數位權利管理(TpDRM)複製讀取安 全元資料寫入安全元資料Engine ContentKeyO Digital Rights Management (CKDRM) Copy and Play HContentKeyO Digital Rights Management (CKDRM) Records ContentKeyO Digital Rights Management (CKDRM) Play Second Party Digital Rights Management (T pdr μ) C ο ntent K ey 0 Digital Rights Management (CKDRM) records Third Party Digital Rights Management (TpDRM) Copy Read Security Metadata Write Security Metadata

第47頁 583568 五、發明說明(42) -------- C^i^tentKeyO數位權利管理(CKDRM )原版影片製作工具、 貧,站ContentKeyO數位權利管理(CKDRM)記錄寫入^全 元資料 χ 情報交換所ContentKeyO數位權利管理(CKDRM)呓錄 ContentKeyO數位權利管理(CKDRM )解除鎖定σ〜 請再度參考第5C圖,在本發明的一個實施例中,在方塊 5二中,一個安全電子内,(SEC)系統可以用來提供主機 ^可。特別是,在主機認可中,c〇ntentKey〇數位權利管 ,(CKDRM)安全應用程式界面(Αρι )僅僅能夠透過一個 實體(諸如:DataPlay公司)所正式認可的主機進行存 取。在本發明的一個實施例中,這個授權動作包括有. 方塊556中,由這個實體(諸如:Dataplay公司)發佈— 個憑證,藉以表示可以供應的ContentKey〇數位權^管理 (CKDRM )安全應用程式界面(Αρι )。 以下第2C表則是用來提供一個c〇ntentKey〇數位權利管理 (C K D R Μ )袼式的另一種更確切形式。 第2C表 位元組位移攔位名稱類型數值 0 憑證管理中心識別碼U1 6 (未加符號的丨6位元數值) 由實體(諸如:DataPlay )所指派 2 : 3憑證格式版本u丨6由憑證管理中心(c A )所指派 4 · 5憑證管理中心簽章公開金鑰識別碼u丨6由憑證管理中 心(CA )所指派Page 47 583568 V. Description of the invention (42) -------- C ^ i ^ tentKeyO Digital Rights Management (CKDRM) original video production tool, poor, station ContentKeyO Digital Rights Management (CKDRM) record writing ^ full Metadata χ Clearing House ContentKeyO Digital Rights Management (CKDRM) records ContentKeyO Digital Rights Management (CKDRM) unlock σ ~ Please refer to FIG. 5C again. In one embodiment of the present invention, in block 52, a security Electronically, (SEC) systems can be used to provide the host. In particular, in the approval of the host, the cnntentKey digital security management (CKDRM) security application program interface (Αρι) can only be accessed through a host officially recognized by an entity (such as: DataPlay). In one embodiment of the present invention, this authorization action includes. In block 556, a certificate issued by this entity (such as: Dataplay Corporation) is used to indicate the ContentKey 0 digital rights management (CKDRM) security application that can be provided. Interface (Αρι). Table 2C below is another more precise form for providing a ConntentKey digital rights management (CK DRM) format. 2C epitope byte shift stop name type value 0 Voucher Management Center ID U1 6 (unsigned 丨 6-bit value) Assigned by an entity (such as: DataPlay) 2: 3 voucher format version u 丨 6 by 4 · 5 assigned by the certificate management center (c A) Signed by the certificate management center public key identifier u 丨 6 is assigned by the certificate management center (CA)

583568583568

五、發明說明(43) 6 : 7加密版本u 1 6由憑證管理中心(C A )所指派 8 : 〇揭露方法EXPOSED METHODS :表示第2B # 士丄 ^ — &万法的1 β彻 旗組合由憑證管理中心(C A )所指派。利用_ -, 個指 /fr 凡水平編碼各個方法,藉以識別揭露方法 10 ·· 15 保留 1U16〔 3〕保留 1 6 : 1 7公司U1 6由憑證管理中心(C A )所指派 18 : 19部門U16由公司所指派 2 〇 · 2 1產品線U1 6由公司所指派 2 2 : 2 3模型U1 6由公司所指派V. Description of the invention (43) 6: 7 encrypted version u 1 6 assigned by the certificate management center (CA) 8: 〇 Exposure methods EXPOSED METHODS: Represents 2B # 士 β ^ — & β 1 Assigned by the Certificate Management Center (CA). Use _-, fingers / fr to encode each method horizontally to identify the disclosure method 10 ·· 15 Reserved 1U16 [3] Reserved 1 6: 1 7 Company U1 6 Assigned by the Certificate Management Center (CA) 18: 19 Department U16 Assigned by the company 2 0 · 2 1 Product line U1 6 Assigned by the company 2 2: 2 3 Model U1 6 Assigned by the company

2 4 : 2 5修訂U1 6由公司所指派 26 : 2 7元資料識別碼U16由憑證管理中心(CA )所設置 28 : 31保留2U16〔2〕保留 口又 32/ 77公司簽章公開金鑰公開金鑰(46位元組)由公司所 78 M21憑證管理中心簽章簽章(44位元組)由憑證管理 中〜(C A )所指派。這個數位乃是由憑證管理中心簽章公 開金鑰識別碼對應的私密金鑰所簽章的資料。2 4: 2 5 Revised U1 6 Assigned by the company 26: 2 7 Metadata ID U16 set by the Certificate Management Center (CA) 28: 31 Reserved 2U16 [2] Reserved and 32/77 company signature public key The public key (46 bytes) is signed by the company's 78 M21 certificate management center (44 bytes) and assigned by certificate management ~ (CA). This digit is the information signed by the private key corresponding to the public key identifier signed by the certificate management center.

1 22 : 1 37裝置識別碼U128 ( 16 1 38 : 1 83協定公開金鑰公開金 擎利用,藉以在部分協定步驟 進行公開金輪加密。 位元組)由公司所指派 鑰由公司所指派。由這個引 (諸如:對話金鑰交換)中 / ί司簽章簽章由公司所指派。這個數值乃是主機 早Α开、’鑰對應的私密金鑰所簽章憑證的其餘部分。1 22: 1 37 The device identification code U128 (16 1 38: 1 83 is used by the agreement public key public engine to perform public gold round encryption in some agreement steps. Bytes) assigned by the company The keys are assigned by the company. By this introduction (such as: Dialogue Key Exchange), the company's signature is signed by the company. This value is the remainder of the certificate signed by the host and the private key corresponding to the key.

583568 五、發明說明(44) 在第2 C表中的欄位包括有:憑證管理中心識別碼,用以獨 一無二地識別這個憑證管理中心(CA );憑證格式版本, 用以獨一無二地識別這個C ο n t e η 1: K e y 0數位權利管理 (CKDRM )憑證格式的版本;憑證管理中心簽章公開金餘 識別碼,其乃是由這個憑證管理中心(CA )所選定;加密 版本,用以獨一無二地識別這個憑證所採用的加密方法; 揭露方法,用以識別這個憑證同意存取的Con tent Key 0數 位權利管理(CKDRM )方法。 第2D表乃是用來表示這些揭露方法的欄位(EXPOSED __ METHODS type ) · 第2D表 位元名稱說明 HOST __CKDRM _COPY表示是否同意這個ContentKeyO數位權 利管理(CKDRM )複製方法 HOST _CKDRM _RECORD表示是否同意這個ContentKeyO數位 權利管理(CKDRM )記錄方法 HOST ___CKDRM _PLAY表示是否同意這個ContentKeyO數位權 利管理(CKDRM )播放方法 HOST __CKDRM_UNLOCK表示是否同意這個ContentKeyO數位 權利管理(CKDRM )解除鎖定方法 HOST —DRM —COPY表示是否同意這個第三者數位權利管理 (TPDRM )複製方法 HOST__READ_SECURE_METADATA表示是否同意這個讀取安 全元資料方法583568 V. Description of the invention (44) The fields in Table 2C include: the certificate management center identification code to uniquely identify this certificate management center (CA); the certificate format version to uniquely identify this C ο nte η 1: K ey 0 Version of digital rights management (CKDRM) voucher format; certificate management center signature public balance identification code, which is selected by this certificate management center (CA); encrypted version, unique The encryption method used to identify this certificate is disclosed; the disclosure method is used to identify the Content Key 0 digital rights management (CKDRM) method that this certificate agrees to access. Table 2D is a field used to indicate these disclosure methods (EXPOSED __ METHODS type) · Description of the 2D table name HOST __CKDRM _COPY indicates whether to agree with this ContentKeyO Digital Rights Management (CKDRM) copy method HOST _CKDRM _RECORD indicates whether to agree This ContentKeyO Digital Rights Management (CKDRM) recording method HOST ___CKDRM _PLAY indicates whether to agree with this ContentKeyO Digital Rights Management (CKDRM) playback method HOST __CKDRM_UNLOCK indicates whether to agree to this ContentKeyO Digital Rights Management (CKDRM) unlock method HOST —DRM —COPY indicates whether to agree This third party digital rights management (TPDRM) replication method HOST__READ_SECURE_METADATA indicates whether to agree to this method of reading secure metadata

第50頁 583568 五、發明說明(45) " '"— HOST—WRITE 一 SECURE—ME 丁 ADATA表示是否同意這個寫入 安全元資料方法 ^ 2C表中的攔位更包括有其他欄位,其將進一步說明如 第 後 一個公司可以獨一無二地識 發明的一個實施例中,舉例 6 5 5 3 6個不同的公司。然而, 更大或更小的攔位亦應該屬 中,這個範例攔位的大小乃 證,以每天十個、每年三百 這個公司更玎以供應其選擇 訂數值至這個憑證管理中心 亦可以用來獨一無二地識別 這個憑證管理中心(CA )乃 值。這些數值可以用來獨一 資料及寫入安全元資料方法 一步說明如後。 這個公司亦可以供應這個主 公司保留其對應的私密金鑰 的私密金鑰加以產生、並且 認。 憑證管理中心簽章乃是利用 別碼所指定的公開金鑰所對 別發佈這個憑證的公司。在本 來說,這個欄位大小可以支援 熟習此技藝者當明瞭,一個 於本發明的範圍。在第2C表 是用來支援十八年的有效憑 六十五天的速率記算。 的部門、產品線、模型、及修 (CA )。同時,這個供應資訊 發佈這個憑證的產品設計。 是用來設置元資料識別碼的數 無二地識別在這個讀取安全元 中的安全元資料存取,其將進 機簽章公開金鑰,同時讓這個 。公司簽章乃是利用這個對應 利用公司簽章公開金鑰加以確 憑證管理中心簽章公開金錄識 應的私密金输加以產生。P.50 583568 5. Description of the invention (45) " '"-HOST-WRITE-SECURE-ME D ADATA indicates whether to agree to this method of writing secure metadata ^ The block in Table 2C includes other fields, It will further explain that in an embodiment in which the first company can uniquely identify an invention, for example 6 5 5 3 6 different companies. However, larger or smaller stops should also be included. The size of this example is evidenced by the fact that ten companies per day and three hundred per year are more suitable for the company to supply its option to the voucher management center. To uniquely identify this Certificate Management Center (CA). These values can be used to unique data and write secure metadata. Steps are explained below. This company can also supply the private key that the main company keeps its corresponding private key to generate and recognize it. The certificate of the certificate management center is the company that issued the certificate against the public key specified by the code. In this case, the size of this field can support those skilled in the art. It is within the scope of the present invention. Table 2C is valid for eighteen years and is calculated at a rate of sixty-five days. Department, product line, model, and repair (CA). At the same time, this supply information publishes the product design of this certificate. Is the number used to set the metadata identifier, which uniquely identifies the secure metadata access in this read secure element, which will sign the public key of the machine and let this. The company's signature is generated by using this correspondence. The company's signature public key is used to verify the certificate management center's signature public record.

第51頁 583568 五、發明說明(46) ----- 最後三個欄位可以利用這個公司,以基於一個裝置接著妒 置的方f加入。裝置識別碼乃是一個數值(諸如:一個^ 號),藉以獨一無二地識別這個憑證的發佈裝置。協定公 開金鑰乃疋利用這個公司加以選定;這個對應的 則是内嵌在這個裝置中。 ^ 在本發明的一個實施例中,當利用這個c〇ntentKey〇數位 權利管理(CKDRM )的主機公開金鑰進行加密動作時,本 發明乃是利=協定公開金鑰、而不是使用公司簽章公開金 鑰。公司簽章公開金鑰僅僅能夠透過公司簽章,藉以梦 協定公開金鑰。 m ^ 上述各個欄位均可以呈現做為這個(:〇111:6111:}(”〇數位權利 管理jCKDRM )憑證。再者,這個元資料識別碼攔位亦可 以和這個公司攔位同時用來識別存取安全元資料的一個主 機。這些數值均可以根據來自這個公司的新數值要求,並 利用這個憑證管理中心(CA )加以設置。 在這個憑證中,這些欄位乃是指定用來承載丨63位元橢圓 曲線加密方法的3 2 6位元公開金鑰數值。然而,其他大小 的數值及加密類型亦應該屬於本發明的範圍。 另外,本發明亦可以在複數種情況下,利用這個憑證找到 一個無效的裝置。請參考5A圖,一種廢止方法518包括 有:透過一個通信通道,由這個裝置傳輸一個加密識別 碼;以及接收一個憑證以識別這個裝置為一個鑑別裝置亦 或一個非鑑別裝置。 ^ ^ 在本發明的一個實施例中,廢止方法5 1 8乃是用來廢止妥Page 51 583568 V. Description of the Invention (46) ----- The last three fields can use this company to join based on a device followed by envy. The device identification code is a numerical value (such as a ^), which uniquely identifies the issuing device of this voucher. The agreement's public key was selected by the company; the counterpart was embedded in the device. ^ In one embodiment of the present invention, when the host public key of the digital rights management (CKDRM) is used for cryptographic operations, the present invention is to use the public key of the agreement instead of using the company signature Public key. The company signature public key can only be obtained through the company signature through the dream agreement public key. m ^ Each of the above fields can be presented as this (: 〇111: 6111:} ("〇Digital Rights Management jCKDRM) voucher. In addition, the metadata identifier block can also be used at the same time as the company block. Identifies a host that accesses the security metadata. These values can be set according to new value requirements from this company and are set using this certificate management center (CA). In this certificate, these fields are designated to host 丨3 2 6-bit public key value of the 63-bit elliptic curve encryption method. However, other sizes and encryption types should also belong to the scope of the present invention. In addition, the present invention can also use this certificate in multiple cases. An invalid device was found. Please refer to Figure 5A. An abolition method 518 includes: transmitting an encrypted identification code from the device through a communication channel; and receiving a credential to identify the device as an authentication device or a non-authentication device. ^ ^ In one embodiment of the present invention, the abolition method 5 1 8 is used to abolish the proper

第52頁 583568 五、發明說明(47) 協憑證及加密金鑰。特別 妥協憑證及私密金鑰。々,廢止方法518乃是用來苽止 及/或私密金鑰是否已發明的-個實施例中,與憑證 媒體上。如此,廢止動:廢止有關的資訊乃是戳印在這個 進行。 " 乍便可以在單獨、未連線的環境中 如第5 A圖所示,應用程式 加密動作。再者,内容〕^面(API) 50 6及5〇8可以進行 加密金鑰亦可以進行加密^程ί界面⑽)所使用的 系統便可以對包含内容的:。肖著内容加密’開放檔案 統乃是在沒有解密金鑰閱讀存取。這個檔案系 容。當透過-個安全協^况下§W取及傳送這個加密内 :個式進行傳送。如此,根據本發明的 的二 =住金鑰受到妥協,其亦不會包含足2 密ί作 何開放應用程式界面(ΑΡ"的檔案進行解 根據本發明的另一個實施 — 體上。因A,内容存取便奋跟p::鑰乃是連結在這個媒 亦會限定在一個特定的^者這個媒體、且存取權限 存這個媒體上的金鑰,並且亦會加密婢i ,的那些金鑰…,疑似加密過的内容:當(^體 複製金鑰受到妥協日寺,便無法具有 =些:容進行解密動作。請參彻圖,…利用 二_ ^以表示如何將金鑰連結在這個媒體上。如圖中所 鬼5 2 2乃疋⑨明種對媒體上儲存内容進行資料Page 52 583568 V. Description of the invention (47) Agreement certificate and encryption key. Special compromise certificate and private key. Alas, the revocation method 518 is used to discontinue and / or whether the private key has been invented-in one embodiment, with the voucher medium. Thus, the abolition of action: the abolition of relevant information is stamped here. " At first glance, the application can be encrypted in a separate, disconnected environment, as shown in Figure 5A. In addition, the content] ^ face (API) 50 6 and 508 can be used for encryption keys or encryption (the process interface)) can be used for the system containing the content :. Xiao Zhu ’s Content Encryption ’open file is read and accessed without a decryption key. This archive contains. When passing through a security agreement, §W fetches and transmits this encrypted data: In this way, according to the present invention, the two keys are compromised, and they will not contain the files of the Open Application Program Interface (AP ") to perform the solution according to another implementation of the present invention. As a result, Content access follows the p :: key, which is the key that is linked to this media and will be limited to a specific media, and the access permissions are stored on this media, and it will also encrypt 婢 i. Key…, the content that is suspected to be encrypted: When the (^ body copy key is compromised by Risi Temple, it cannot have = some: content to perform the decryption action. Please refer to the figure, ... use two _ ^ to indicate how to link the key to On this media, as shown in the figure, the ghost 5 2 2 is a kind of data about the content stored on the media.

第53頁 583568 五、發明説明(48) 保全的方法包括有將内容權利附加 _ 將内容權利附加至這個媒體上可以這個媒體上的步驟。 放器或引擎的可能。相反地,—個=内容被载入—個播 操作以表現這個媒體上的儲存内容。敌器或引擎僅僅能夠 意預定條件下的存取動作。這個内☆ $塊554乃是用來同 5 54所述)可以執行一個或更多個下、存取動作(如方塊 内容播放、内容複製、允許一個或 作、—,其包括有: 數目的複製。在方塊5 5 4中,指定从夕個複製或一個有限 有:第6圖所緣示的一個鐘別程序、亦 木牛可以包括 一個通道以進行内容傳送、檢查一個、可以包括有:I監別 容解除鎖定。在本發明的一個實施 |止^列、以及對内 作乃是根據在一個引擎及一個飼服器間執^=:定動 其將進一步說明如後。解除鎖定動作,告一 =方法’ 時,可能會限定於:跟隨一個協定& _二連接一個伺服器 以及利用這個安全金鑰以對這個内容的— 、 進行解除鎖定動作。方塊5 5 6乃是用& \ /古邛分 下列動作’其包括有:鑑別一個通道、檢查一個廢止夕表们 列、及對内容進行解除鎖定動作。 第6圖乃是用來介紹一個鑑別程序6〇〇的一個實施例。根據 這個實施例,簽發憑證所需要的三個元件包括有:媒體 602、引擎604、及主機606。這個主機6〇β乃是用來持有一 個憑證6 1 0,其係具有一個憑證管理中心(〔a )所簽發的 協定公開金鑰。另外,這個主機6〇 6亦持有一個協定私密 金鑰612。這個憑證610乃是利用這個引擎6〇4、經由一個Page 53 583568 5. Description of the invention (48) The method of preservation includes the step of attaching the content rights to the media. Amplifier or engine possible. In contrast, a = content is loaded-a broadcast operation to represent the stored content on this media. Enemies or engines can only access actions under predetermined conditions. Within this ☆ $ block 554 is used as described in 5 54) can perform one or more down, access actions (such as block content playback, content copy, allow one or make,-, including: number of Copy. In box 5 5 4 specify a copy or a limited copy: a minute program shown in Figure 6, Yimuiu can include a channel for content transmission, check one, and can include: I supervise the unlocking. In one implementation of the present invention, the stop sequence and the internal operation are based on the execution between an engine and a feeder. ^ =: It will be further explained as follows. The unlocking action When the report = method is used, it may be limited to: follow a protocol & _2 to connect to a server and use this security key to unlock the content-, block 5 5 6 is to use & / / The following actions are divided into the following actions, which include: identifying a channel, checking a list of discontinued watches, and unlocking the content. Figure 6 is used to introduce an implementation of an authentication program 600. For example, according to this embodiment, the three components required to issue a certificate include: a media 602, an engine 604, and a host 606. The host 60β is used to hold a certificate 6 1 0, which has a certificate The agreement public key issued by the management center ([a). In addition, this host 606 also holds a agreement private key 612. This certificate 610 is using this engine 604 through a

第54頁 583568Page 583568

五、發明說明(49) 通&通道以進行 塊6 1 2進行確認t 兩個步驟進行確 認。在本發明的 所有攔位均是利 證管理中心簽章 适15因此,這些 可以建立。其次 認。在本發明的 早及公司簽章公 是一個雙重確認 接收,並且,這個憑證上的簽章乃是在方 •請參考第2 C表及第6圖,一個憑證乃是以 認。首先,簽章乃是在方塊6 1 2中進行確 一個實施例中,除了最後三個攔位以外, 用欄位憑證管理中心簽章及方塊6丨2中憑 公開金錄識別碼所指定的公開金錄進行確 欄位(包括公司簽章公開金鑰)的鑑別便 ,在方塊6 1 2中,這個主機亦必須加以確 一個實施例中,整個憑證乃是利用公司簽 開金鑰加以確認。因此,這個確認程序 程序。 在方塊614中,這個主機必須在確認後才能進行廢步動 作廢止動作可以應用在這個憑證的所有範圍中,例如. 所有攔位。在本發明的一個實施例中,這個認證動作=邱 分必須要檢查蜞體6 0 2上的一個廢止表列6〇8。這個?丨4 604乃是由這個媒體602上擷取這個廢止表列6〇8。倘若、言 個涊§登私序6 1 4能夠通過方塊6 1 6,則這個引擎6 〇 4便备= 過一個隨機數目產生器618產生一個隨機數目,藉以彳^ = 一個安全對話金鑰620的一個第一部分。隨後,這個引擎 6 04便可以利用這個安全對話金鑰6 2〇的這個第一部分 這個憑證擷取到的一個協定公開金鑰624執行一個公 鑰加密動作622。接著,這個主機6〇6便會擷取這個加"宓' 的對活金鑰、在方塊6 2 6解碼這個加密過的對話金鑰、:k 產生這個安全對話金鑰628。 亚V. Explanation of the invention (49) Pass & channel to proceed Block 6 1 2 Confirmation t Confirmation in two steps. All stops in the present invention are stamped by the Certificate Management Center 15 so these can be established. Secondly acknowledge. In the early days of the present invention, the company's signature is a double confirmation receipt, and the signature on this certificate is on the party. • Please refer to Form 2C and Figure 6 for a certificate. First of all, the signature is confirmed in block 6 12 in one embodiment. In addition to the last three stops, the signature is signed with the field certificate management center signature and the public gold record identification code in block 6 丨 2. The public account records the authentication field (including the company's signature public key), and in block 6 12 this host must also verify it. In one embodiment, the entire certificate is confirmed by the company's signed key. . Therefore, this confirmation procedure is routine. In block 614, the host must perform the abolishment action after confirmation. The abolishment action can be applied to all ranges of this certificate, for example, all blocks. In one embodiment of the present invention, this authentication action = Qiu points must check a revocation list 608 on the carcass 602. This one?丨 4 604 is the revocation list 608 retrieved from the media 602. Provided that the private order 6 1 4 can pass through the block 6 1 6, then the engine 6 0 4 = a random number generated by a random number generator 618, so 彳 ^ = a secure session key 620 A first part. Then, the engine 604 can use the first part of the secure session key 620 to perform a public key encryption action 622 on a protocol public key 624 retrieved from the certificate. Then, the host 606 will retrieve the "宓" paired live key, decode the encrypted session key at block 6 2 6: k to generate the secure session key 628. Asia

第55頁 583568 五、發明說明(50) 現在請參考第7A圖及第3圖,其乃是用來表示執行這個確 認程序的裝置。在本發明的一個實施例中,這 這個引擎3G8的部分。第3圖乃是用來介紹:—個通信 乃是用來將這個引擎308轉接到持有一個憑證318的一個主 機。隨後,迫個憑證318便可以接收,且一個識別碼71〇 (其可以實施做為-個么v開金鑰)#可以利用—個確 數720 在這個=擎内進行比較。特別是,這個碟認函數 720亦同日寸接收&個識別碼、以及來自—個認證引擎wo的 -個輸出。這個認證引擎730乃是用來產生一個全域通過 /失敗指不’其係進一步輸出至這個確認函數72g。這個 確認函數720,倘若由這個認證引擎73〇接收到一個失敗俨 不,便會拒絕進一步地内容存取動作。倘若接收到一個^ 域通過指示,則這個確認函數72〇便會傳送一個通過浐示 ,許可方塊750。許可方塊75〇包括有這個播放器31^複 數個通過/失敗許可,其可以提供給認證引擎。 理這些許可後,這個認證引擎73〇便會輸出一 ^ U0以同意資料傳送。 耵活金鑰 根據本發明的一個實施例,每次當透過一個通信通道 =個裝置時,一個鑑別程序便會啟動。各個裝置必須在每Page 55 583568 V. Description of the invention (50) Please refer to Fig. 7A and Fig. 3, which are means for performing this confirmation procedure. In one embodiment of the invention, this engine is part of 3G8. Figure 3 is used to introduce: a communication is used to transfer this engine 308 to a host holding a credential 318. Subsequently, a credential 318 can be received, and an identification code 71 (which can be implemented as a v key) can be used—an exact number 720 is compared in this engine. In particular, the disc recognition function 720 also receives & identification codes and an output from an authentication engine wo. The authentication engine 730 is used to generate a global pass / fail indication, which is further output to the confirmation function 72g. The confirmation function 720, if a failure is received by the authentication engine 730, it will reject further content access actions. If a ^ field pass indication is received, the confirmation function 72 will send a pass indication to permit block 750. The permission block 750 includes a plurality of pass / fail permissions for the player 31, which can be provided to the authentication engine. After processing these permissions, the authentication engine 73 will output a U0 to agree to the data transfer.耵 Live Key According to one embodiment of the present invention, each time when a communication channel = device is passed, an authentication procedure is started. Each device must be

次接收到這個加密識別碼時進行授權動作。如此,^ 、、匕 给一個裝置的方法包括有:透過-個通信通道:Ϊ :::^的一個加密識別碼、以及接收—個憑證以識別這 7Β圖’其乃是利用程序圖形式以表示:在—個通道上$ fAuthorization is performed when this encrypted identification code is received twice. In this way, the method of giving a device to a device includes: through a communication channel: an encrypted identification code of Ϊ ::: ^, and receiving a credential to identify the 7B diagram. Representation: $ f on a channel

第56頁 583568 發明說明(51) 有 送資料的一種方法。這種鑑別資料目的地的 ··在方塊7 0 2中擷取這個目的地的一個馮 ^ 塊m中,利用-個識別碼以認證這個目二也: 會繼續在方塊70 6中傳送一把對話金鑰。這把對; 這個憑證中的預定條件’進而同意資料的傳送。 =所Ϊ、:”簽發憑證程序乃是用來簽發憑證給主機 擎,&個鑑別耘序乃是用來鑑別主機及引擎。笋別 一個Ϊ體得以對另一個實體進行確認及認證。:個 Π:!體的其他屬成功鑑別亦可以建 “鑑= 全應用程式界面(ΑΡΙ)能夠透過 =據本發明的一個實施例,這個主機乃是下列物件之一, 其包括有:—個播放器、一台個人電腦(PC)中的一個播 放器。、。一個裝置中的一個播放器、一個情報交換所、一個 =服器、以及_個第三者數位權利管理(TPDRM )的應用 紅式。根據本發明的一個實施例,一個廢止表列乃是儲存 在插入個引擎中的媒體上。這個廢止表列乃是用於這個 程序中。目此,倘若-個裝置的-個已知序號乃是有 ^俨個文協的或隨後拒絕的製造商,則這個主機便無法 ‘ jI二3 °在本發明的另一個實施例中,這個廢止表列亦 ^A在各個裝置中,藉以避免這個裝置無法播放、或 k個廢止表列亦可以維持為與媒體相關的。如此,當 、M預先錄製内容發行上市、或當空白碟片製造時,新Page 56 583568 Description of the invention (51) Yes One way to send information. This identification of the destination of the data ... In block 702, a ^^ m of this destination is retrieved, and an identification code is used to authenticate this item. Also: will continue to send one in block 70 6 Conversation key. This pair; the predetermined conditions in this voucher 'in turn agree with the transfer of information. = So ,: "The certificate issuing procedure is used to issue a certificate to the host engine, and an authentication sequence is used to authenticate the host and the engine. One entity can confirm and authenticate another entity .: The other genus of the Π :! body can also be successfully identified. "Authentication = Full Application Programming Interface (API) can pass through = According to an embodiment of the present invention, this host is one of the following objects, including: Player, a player in a personal computer (PC). . One player, one clearing house, one server and one third party digital rights management (TPDRM) application in a device are red. According to one embodiment of the invention, an obsolete list is stored on a medium inserted into an engine. This revocation list is used in this procedure. For this reason, if a known serial number of a device is a manufacturer with a text association or a subsequent rejection, then this host cannot be used. In another embodiment of the present invention, this The revocation list is also ^ A in each device, so as to avoid that this device cannot be played, or k revocation lists can also be maintained as media related. As such, when, M pre-recorded content is released for sale, or when blank discs are manufactured, new

583568 五、發明說明(52) 的,止表列便可以包括在這些碟片上,藉以找到適當的播 放器及主機、並拒絕認證這些播放器及主機。另外, 發明的另-個實施例中,廢止表列亦可以透過一個伺服哭 進行維護,藉以使與一個伺服器進行通信的播放器可以& 改變狀態期間(諸如··解除鎖定及鎖定),直接 的廢止表列至這個引擎上。 、 更’斤 在本發明的另一個實施例中,複數個 ^接f 一賴的方式儲存在媒體上,3 ☆的:個或更多個檔案能夠具有與其關連】體 列。在這個實施例中,這個(此)t 尾止表 =發生在,別程序㈣乂 = = = = :=合=發生在-個鐘別程序及-個檔案 圖,其乃是用來提供一種廢止一個㈣ 、法。第7C圖乃是由方塊712開始,,又衣 表,乃是在一個檑案存取動作時進行-一们廢止 個貫施例中,各個檔案均 本發明的一 實體乃是藉著集中儲個ί列…^ 標給各個檔案,進而加以限另'固,列的識別碼或指 乃是用來參照與廢止資訊相、的田f j識別碼或指標 個廢止資訊(隨後係稱為一 ^、、、田即的一個位置。這 的識別碼隼中放置。久;、、们即”、、占)乃是與一個獨一無二 識別碼,而無須儲存完整的廢擇上=:有表列節點 -個檔案存取及廢止資 量門° :在方塊7“中,當 t平里期間,各個節點的結果便加 第58頁 583568 五、發明說明(53) 以儲存。這個發:g | 舌私批> U t別私序可以包括:讀取評I认田 重新執行一個焊旦么^ 里'、、0果、而不县 曰 ^平里動作,亦即:各個節 甸不疋 置。 勺可以預先評 在本t明的—個實施例中,如方塊7 1 6所示 列乃疋由媒體複製至這個引擎、並且可以、,這個廢止表 以免-個播玫器執行播放動作,倘若這個2 -,毒藥" ㈣”、這個製造商具有缺陷或潛在缺ί ϊ並不適當 類的情形時。當一個嬈 σ ^、或在諸如此 除鎖定時,這個麻本…屈_ 1 j服器以對内容解 718所示。 Ί又_動作,如方塊 必項白妊古,、 脚η谷衣現裝置的廢止至少 須匕括有一個或更多個簽章金鑰的 夕 中,這個4铲此欠立人μ 1 在乂個貫施例 级刺用一彻:二簽早金鑰的廢止亦會在方塊722中廢止一 、、、利用k個或這些金鑰所簽發一 利營理、臣 、、且LontentKeyO數位權 特別是一個簽章金鑰的廢止亦 运冋日守廢止任何對應的簽章。 在本發明的一個實施例中583568 5. In the description of invention (52), the stop list can be included on these discs, so as to find appropriate players and hosts, and refuse to authenticate these players and hosts. In addition, in another embodiment of the invention, the abolition list can also be maintained through a servo cry, so that the player communicating with a server can change the state (such as unlocking and locking), The direct revocation list is listed on this engine. Further, in another embodiment of the present invention, a plurality of files are stored on the media in a manner dependent on each other, and three or more files can be associated with it. In this embodiment, this (this) t-stop list = occurs in other programs ㈣ 乂 = = = =: = 合 = occurs in -one program and one file map, which is used to provide a Abolition of a law, law. Figure 7C starts at block 712, and the table is also taken during a case access action-one is abolished in one embodiment, each file is an entity of the invention by centralized storage Each 列 column ... ^ is marked for each file, and further restricted. The identification code of the column or refers to the revocation information (referred to as a ^ ,,, Tian is a place. This identification code is placed in the 隼. For a long time; ,,, that is, ",, accounting) is a unique identification code, without the need to store the complete waste selection =: there are listed nodes -A file access and abolition of the asset gate °: In block 7 ", the results of each node will be added on page 58 583568 during t-Pingli V. Description of Invention (53) for storage. This post: g | tongue private approval> U t private order can include: read the comment I recognize the field and re-perform a welding process ^ li ',, 0 fruit, but not the county ^ pingli action, that is: All festivals are not set aside. The spoon can be pre-evaluated in one embodiment of the present invention. As shown in block 7 1 6, the column is copied to the engine by the media, and, yes, this revocation list may be used to prevent a broadcaster from performing playback actions. This 2-, Poison " ㈣ ", the manufacturer has a defect or a potential lack of ϊ ϊ is not appropriate. When a 娆 σ ^, or in addition to this lock, this Asamoto ... __ 1 j The server is shown in the content solution 718. Ί and _ actions, such as the block must be white, ancient, and the abolition of the existing clothing must be enclosed at least one or more signature keys, this 4 shovel this insecure μ 1 Use it at the same level of enforcement: the revocation of the early signing of the second signing will also end in block 722 the use of k, or these keys to sign a profit camp. The revocation of the digital rights of the management, minister, and LontentKey, especially the signing key, also means the next day the revocation of any corresponding signing. In one embodiment of the invention

f本發明的一個實施例中,儲存在一個引擎的非揮發性呓 憶體中的這個金鑰簽章表列,並無法在一個製造程序以外 更新,作。在這個實施例中,這個金鑰簽章表列可以 ,著廢止,個C〇ntentKeyO數位權利管理(CKDRM)的憑證 苔理十〜簽早公開金餘識別碼欄位的一個特定索引數值, 在一個根據媒體(per — media )的基礎下加以廢止。 清再度參考第7C圖,廢止表列乃是用來提供一種機制,藉 以避免存取一個給定裝置或一組給定裝置的C〇ntentKeyOf In one embodiment of the present invention, the key signature list stored in the non-volatile memory of an engine cannot be updated outside a manufacturing process. In this embodiment, the list of key signatures can be cancelled, and a certificate index of ConntentKeyO Digital Rights Management (CKDRM) can be used to sign a specific index value in the early public surplus identifier field. One is abolished on a per-media basis. Qing refers again to Figure 7C. The abolition of the list is used to provide a mechanism to avoid access to the ContentKeyO of a given device or a group of given devices.

583568 五、發明說明(54) lCKDRM) ^0 ^ 吕里(CKDRM)廢止方法能夠讓廢止動作發生在這個主 憑證的任何欄位内。因此,廢止可以是如同一個壯、 識別碼或協定公開金输般地明確、或可以如同一個整=八 司的廣泛、或許可以是一個特定的產品線、或 —二 個特定的產品模型,如方塊724所示。 ° 疋— 如先前所述,各個標案可以具有一個關連的廢止 士 個廢止表列乃是在一個產生檔案(create_file ^ 中,關連於這個檔案。這個廢止表列乃是在這個、π卩々 ContentKeyO數位權利管理(CKDRM )583568 V. Description of Invention (54) lCKDRM) ^ 0 ^ Luli (CKDRM) revocation method can make revocation action happen in any field of this master voucher. Therefore, revocation can be as clear as a strong, identification code or agreement, or it can be as broad as a whole = eight divisions, maybe a specific product line, or-two specific product models, such as Block 724 is shown. ° 疋 — As mentioned earlier, each bid can have a related abolition list. The abolition list is related to this file in create file (create_file ^. This abolition list is at this, π 卩 々 ContentKeyO Digital Rights Management (CKDRM)

至這個目的地複製。 )稷衣方法期間,傳送 一個廢止表列可以由一個表列的廢止節點 止節點乃是由一個表列的子句節點及如何㊁廢 ,定該節點廢止與否的-種方法所構成。各:;;:句以 是由一組資料及函數所構成,1 ,子句即點乃 義如何應用這些資料並對這些資料進用來定 作。方塊732乃是在;^明—個廢止表列的評量動 (CKDRM )憑證的内容進 〇ntentKey0數位權利管理 ^ /Λ ; Λ 5 a ^ ^ λ ^^ ^ 由這些子句節點得到的 二即點中的貧料評量。隨後, 個真假結果。倘若在這個猎^付到廷個廢止節點的— 個廢止表列中有任何廢止節點被評 第60頁Copy to this destination. ) During the method of dismantling, transmitting an abolition list can consist of an abolition node of a list. An abolition node is composed of a clause node of a table and how to invalidate the node. Each: ;;: The sentence is composed of a set of data and functions, 1, the clause is the meaning of how to apply these data and use these data to define. Block 732 is: ^ Ming-the content of the abolition of the list of evaluation (CKDRM) vouchers into the tentKey0 digital rights management ^ / Λ; Λ 5 a ^ ^ λ ^ ^ ^ obtained from these clause nodes Poor material evaluation in the spot. Subsequently, there are true and false results. In the event that this remuneration is paid to one revocation node — any revocation node in the revocation list is evaluated Page 60

位凡組位移欄位名稱類型數值說明/用途 0 · 1位元組計數u 1 6 (未加符號的i 6位元數 止表列的位元組數目…這個數: 或寺於4。這個節點計數攔位必須要存在。 、大於 2 ·· 3節點計數耵6 ]·在這個廢止表列中的節點數目,· 4 ·· 1 一1廢上節點表列REVACATION—NODE〔j〕各個]垂 義一個廢止節點 J谷個貝體疋Bit-shift displacement field name type value description / use 0 · 1-byte count u 1 6 (unsigned i 6-bit number to stop the number of bytes in the table ... this number: or si at 4. this The node count stop must exist. ≥ 2 · 3 node count 耵 6] · The number of nodes in this revocation list, 4 · · 1-1 revocation of the node list REVACATION—NODE [j] each] Declaring an abolished node

乃是用來提供一個廢止節點結構的-個實施例。 位元組位移欄位名稱類型數值說明/用途 〇 ·· 1位元組計數U16k&括這個攔位的廢止表 :個數值這二數值必須要大於4。 境個數值Ή小於漏。廢止節點的大小An embodiment is provided to abolish the node structure. Byte shift field name type value description / use 〇 ·· 1 byte count U16k & including the abolition table for this block: The two values must be greater than 4. The value of the environment is less than the leakage. Abolish the size of the node

位元組。 心幻i D UBytes. ID U

2子句計數U81這個廢止表列的子句數目,1。 3子句規則U8定義與評量子句組合關連的規則。請參照子 句規則編碼以得到所需數值。 4 · k 1子句節點表列CL A USE —NODE〔 1〕各個實體定義一 個子句。 'The 2 clause counts the number of clauses in the abolition table U81, 1. The three-clause rule U8 defines the rules related to the evaluation of quantum sentence combinations. Refer to clause rule encoding to get the required value. 4 · k 1 clause node list CL A USE —NODE [1] Each entity defines a clause. '

第61頁 583568Page 583568

第2 G表乃是用來提供一個子句節點結構的一個實施例 其 係用來支援具有一個通用格式之複數函數。 ' 第2G表 位元組位移攔位名稱類型數值說明/用途 〇 : 1位元組計數U1 62m + 4包括這個攔位的廢止表列的位一 組數目,2 m + 4。數值m必須是正的。不允許而厶 + J几汁卫臼函數資料 陣列。 、 2 ·· 3函數U16執行這個廢止子句的函數。噍一中募α f 义我的函數 為匹配函數。 4 : 2m + 3函數資料U1 6〔 m〕利用m個字元的資料以執行、言 個函數。 仃這 第2 Η表乃疋用來提供一個範例子句節點,其係用於一 配函數。 、個匹 第2Η表 位元組位移欄位名稱類型數值說明/用途 0 · 1位元組計數U1 6 2 η + 8包括這個攔位的廢止表列一 組數目,2η +8。這個數值11必須是正的。不允^处占立元 資料陣列。 σ二匹配 2 : 3函數U1 6匹配執行這個廢止子句的函數為匹配函 4 · 5啟始字元U16在這個ContentKeyO數位權利管理 (CKDRM )憑證中、表示匹配函數啟動位置的位移。 583568Table 2G is an embodiment used to provide a clause node structure, which is used to support complex functions with a common format. 'Table 2G Byte displacement block name type value description / use 〇: 1 byte count U1 62m + 4 includes the number of bits in the abolition list of this block, 2 m + 4. The value m must be positive. It is not allowed to 厶 + J a few sigma function data arrays. , 2 · 3 Function U16 executes the function of this abolition clause. Raising α f in Yiyi means that my function is a matching function. 4: 2m + 3 function data U1 6 [m] uses m characters of data to execute a function. This second table is used to provide an example clause node, which is used for a matching function. Table 2 Η Table Byte Shift Field Name Type Value Description / Use 0 · 1 Byte Count U1 6 2 η + 8 Includes a set number of the abolition list for this block, 2η +8. The value 11 must be positive. Do not allow ^ to occupy the Li Yuan data array. σ 2 match 2: 3 function U1 6 match The function that executes the abolition clause is the match function 4.5. The start character U16 represents the displacement of the start position of the match function in the ContentKeyO digital rights management (CKDRM) voucher. 583568

6 · 7字tl計數U 16η在位移啟動字元開始的匹配字元數目n 8 : 2 η + 7匹配資料U1 6〔 η〕匹配的η字元數值 在本發明的一個實施例中,一個引擎乃是在CKCMD — CREATE—FILE或CKCMD—SET—KEYBOX命令期間接收到廢止 表列。複數個檔案的廢止表列亦可以包括已經存在這個 體上的廢止節點。 在這個媒體上,一個廢止表列可以視為這個““^吋檔案6 7 words tl count U 16η The number of matching characters at the beginning of the shift start character n 8: 2 η + 7 matching data U1 6 [η] The number of η characters that are matched. In one embodiment of the present invention, an engine The revocation list was received during the CCKMD — CREATE — FILE or CKCMD — SET — KEYBOX command. The revocation list of multiple files may also include revocation nodes that already exist on this entity. In this media, an abolition list can be regarded as this "^ inch file

糸統(DJS )内部的一個物件、%用一個獨立且不同的處 理(不是一個槽案或目錄)進行维罐 / μ 、 」退<丁隹遵。這個DataPlay檔幸 糸統識別碼(Dfsld )攔位則可以做盔认也h 〜 ^ 又為播案的一個參考數 目,精以用於這個ContentKey元資粗从μ ^ / D χ . _ JT . 、 、料結構的廢止識別碼表 歹,J (RevocationldList)樞1 位中 ° 就這個實施例而言,第2 I表乃是用來 加# 7丨# 點結構。 笊表不一個靶例廢止節 第21表 類型名稱說明/用途 struct META *psNEXT連結表列的内部指_An object in the system (DJS) uses a separate and different process (not a case or directory) to carry out the dimensional tank / μ, "Return & Ding Dingzun. This DataPlay file can be used as a reference for the identification of the Dfsld block. It is also a reference number for broadcasting, and it is used for this ContentKey resource from μ ^ / D χ. _ JT. The abolition identification code table 料, J, Re material list structure, J (RevocationldList) pivot 1 bit. In this embodiment, Table 2I is used to add # 7 丨 # point structure.笊 Indicates the repeal section of a target. Table 21 Type name description / use struct META * psNEXT Internal reference of the linked list _

D F S I D D f s I d這個廢止節點的處置 八 DFSFLAGFlags内部用途旗標一設定將炎 —,^ 竹迫個物件定義為一個 廢止卽點的一個位元。 U8Evaluation Result 表示廢止、不& · ^D F S I D D f s I d Disposal of this abolished node Eight DFSFLAGFlags internal use flag a setting defines Yan —, ^ Zhu Man object is a bit of an abolition point. U8Evaluation Result means abolished, not & ^

At ^ 小廢止、不評量之一個 三態旗標At ^ Abolished, Not Evaluated One Three-state Flag

第63頁 583568 五、發明說明(58) REVOCATION NODERevocation Node 包合 a— 丄 — s在沒個廢止筋f上 中、由主機傳送的實際資料 p二 個引擎在呈現有一 請參考第7E圖,其乃是用來提供: 個 廢止表列時所執行的一種方法。Page 63 583568 V. Description of the invention (58) REVOCATION NODERevocation Node Including a ——— s in each of the abolition bars f, the actual data transmitted by the host, the two engines are presented, please refer to Figure 7E, which It is used to provide: A method to be executed when the list is abolished.

方塊752乃是在這個Con tent Key數位權利管理(c 資料的設置期間,使用這個節點計數數值以產生 M )元 憶體空間,藉以容納一個表列的16位元識別碼,:::: 各個廢止節點。在方塊754中,對於這個廢止表 個節點,這個引擎會比較這個節點及在既存的各 各個節點。在方塊756中’倘若找到—個相同的節點"的 將這個既存節點的DataPlay檔案系統識別碼數目加、 ContentKey數位權利管理(CKDRM)元資料結構的止&個 列中。在方塊758中,倘若無法找到這個節點,則產 有一個獨一無二DataPlay檔案系統識別碼的一個 點、 在方塊762中,這個引擎會將這個新的Datapiay檔P/。 識別碼數值加入這個ContentKey數位權利管理(ckdrm\ 元資料結構中。 9Block 752 is a 16-bit identifier for a table column during the setting of the Conttent Key digital rights management (c data setting, using this node count value to generate M) metaspace, ::: Abolish the node. In block 754, for this deprecated list of nodes, the engine compares this node with each existing node. In block 756, 'if an identical node is found' is added to the number of DataPlay file system identifiers for this existing node, and to the content of the ContentKey Digital Rights Management (CKDRM) metadata structure. In block 758, if the node cannot be found, a point is generated with a unique DataPlay file system identifier. In block 762, the engine will P / the new Datapiay file. The ID value is added to this ContentKey digital rights management (ckdrm \ metadata structure. 9

請參考第7F圖,其乃是用來詳細說明廢止表列結果旦 :法。如圖中所示,在方塊772中,這個廢止表列乃是在里 母次發生這個CKCMD 一 AUTHENTIC ATE命令時、亦或在一 新媒體插入這個引擎時進行評量動作。在方塊^中 個廢止表列乃是對照一個接收的contentKey數位權利^ (CKDRM)的憑證而加以評量。對於這個廢止表列中的各 583568 五、發明說明(59) 個節點,在方塊7 7 6中,這個評量動作可以得到該節點的 一個廢止或不廢止狀態。由於節點是檔案相關的,因此這 些狀態便可以在每次嘗試一個C ο n t e n t K e y數位權利管理 (CKDRM)的操作(其係一個特定檔案所專有)時加以評 量。因此’廢止結果的決定並不是取決於CKCMD __ AUTHENTICATE,而是取決於 CKCMD 一 DRM—PLAY、CKCMD GET 一METADATA、CKCMD 一GET 一PLAY 一KEY、CKCMD— 一 PLAY、CKCMD 一 RECORD 一 APPEND、CKCMD—SET 一 KEYBOX、 CKCMD一SET一METADATA 、及CKCMD UNLOCK FILFS 。 、士此 命令將㈣-步說明如後。在方⑽中,^果:會些 儲存在這個廢止節點結果的一個評量結果攔位中。 原版影片製作程序 這個資料 作程序。 根據第7G 法乃是由 應用程式 中,這個 器鑰,藉 個内嵌隨 )可以當 例中,這 分,而是 室的動態 保王糸統的另一個部分乃是需要一個原版影片 在個範例中,說明書所述的這個媒體碟片乃是 圖所示的方法以組織内容。如圖中所示, 方塊782開始,其中’ β容乃是利用_個 這個媒體上。在本發明的一個實施 =式乃是使用:個附加在—個機械 以執仃一個工具。在這個伺服器鑰内 機金鑰產生器的一個特定用途的 ^二有一Please refer to Figure 7F, which is used to elaborate the abolition of the listed results. As shown in the figure, in block 772, the revocation list is evaluated when the CCKMD-AUTHENTIC ATE command occurs, or when a new media is inserted into the engine. In the box ^, the revocation list is evaluated against a received contentKey digital right ^ (CKDRM) voucher. For each of the 583568 nodes in the revocation list, the (59) nodes of the invention description, in block 7 7 6, this evaluation action can obtain a revocation or non-revocation status of the node. Because nodes are archive-related, these states can be evaluated each time a C nt Digital Kei y Digital Rights Management (CKDRM) operation is attempted, which is proprietary to a particular archive. Therefore, the decision to abolish the result does not depend on CCKMD__AUTHENTICATE, but on CCKMD_DRM_PLAY, CKCMD GET_METADATA, CKCMD_GET_PLAY_KEY, CKCMD__PLAY, CKCMD_RECORD_APPEND, CKCMD_ SET-KEYBOX, CKCMD-SET-METADATA, and CKCMD UNLOCK FILFS. This command will be described in the following steps. In Fang Yi, ^ Fruit: will be stored in an evaluation result block of the result of the abolition node. The original video production process. According to the 7G law, this application key is used in the application, and it can be used as an example. In this case, this part is the dynamic part of the room. The other part of the system is the need for an original movie in the personal computer. In the example, the media disc described in the manual is the method shown in the figure to organize the content. As shown in the figure, block 782 begins, where 'β 容' is used on this medium. In one implementation of the present invention, the formula is to use: one attached to a machine to perform a tool. In this server key, there is a specific use of the machine key generator:

做一個秘密金鑰產生器。在本發明的s 一(AjIC 個應用程式並不是這個原版影片制作 個灵施 至苐二者編寫工具室以做為 連結程式庫(DLL )或程式庫。浐#一者編寫工具 飞厍 4個動態連結程 583568 五、發明說明(60) 3 )*程式庫可能會需要一個第三者編寫工具室 1在產生ContentKey數位權利管理(CKDRM )内容前自行 ί ^ r 11 f明的另一個實施例_,這個伺服器鑰及這個 :能、Π。二共同動作,藉以使這個伺服器鑰不會在一個 外二:2式·(DLL )或程式庫的一個特定註冊版本以 斤運打勤作。 在本發明的一個實施例中,這個應用程式乃是藉著產生一 =Γ丨=識別碼及一個c〇ntentKey數位權利管理(ckdrm ) Π二:塊784所示;在方塊786中,加密這些内容標 m 8中,將引擎管理的複製及播放規則加入作 為适個内容擁有者所指定的;在方塊792中,將第三者數 ==理尸聊)專有規則加入作為這個内容擁有者 二疋、,在方塊794中,加入一個廢止表列,進而 部分、全部、亦或 然而’如熟習此技藝者所明•,這個主 執行的功能亦可以包括有先前提供功能中的 項Make a secret key generator. In the s a (AjIC applications of the present invention are not the original film making skills, the two writing tool rooms are used as linked libraries (DLLs) or libraries. 者 # 一 者 writing tools fly 4 Dynamic link process 583568 5. Invention description (60) 3) * The library may require a third party to write the tool room 1 before generating ContentKey Digital Rights Management (CKDRM) content. Another embodiment _, This server key and this: Yes, Π. The two work together so that this server key does not work in a second two: type 2 (DLL) or a specific registered version of the library to work hard. In one embodiment of the present invention, the application program is implemented by generating an identification code and a ContentKey digital rights management (ckdrm) II: shown in block 784; in block 786, these are encrypted In content m8, the engine-managed copy and playback rules are added as specified by the appropriate content owner; in block 792, the number of third parties == corporal chat) is added as a proprietary rule Second, in block 794, add an abolition list, and then part, all, or, however, 'as the person skilled in the art knows, the functions performed by this master may also include items from the previously provided functions.

以,所述的攻個應用程式可以是一個原版影片製 的-部分。如"例來Γ 製部分 j木況坆個應用程式可以在一個碟 i括有產生鎖定及解除鎖定内容的一種商 甘、 I+這ί ΐ版影片製作程序更跟隨著一個編寫程序,其i V跟隨著一個預先錄製程序。 /、 一個實施例+,在這個碟片上使用原片影片内 合疋用來提供一種將偽造碟片假裝價測為預先錄製碟片Therefore, the described application may be a part of an original movie. For example, for example, a part of the application system can include a kind of commercial content that generates locked and unlocked content on a disc. I + This version of the video production process follows a writing process. V followed a pre-recorded program. / 、 An embodiment +, the original film is used on this disc, and the combination is used to provide a method of pretending the price of a fake disc as a pre-recorded disc

第66頁 583568 五、發明說明(61) 的方法。舉例來說’如下文所述’在本發明的一個實施例 中,預先錄製碟片的一個識別碼至少具有一部分的識^石馬 係預先錄製的。這樣便可以將識別碼假裝偵測為預先錄: 的,如說明書中將進一步說明。 、衣 9 %在請參考第7H圖,其乃是利用-個流程圖以表示—個程 序(其包括有產生媒體及設定一個情報交換類型伺服器的 一個原版影片製作程序)的一個流程圖。這個程序首先w 由方塊7002開始。方塊7004乃是用來提供一種新發表的= 產及資訊採購的流程。方塊7 0 0 6乃是用來使下列資料的二 個或更多個資料能夠轉移至媒體上,其包括:内容槽案、 元資料資訊、保全資訊、及套裝軟體收集資訊。内容檔案 I以包括一個消費者或使用者將會播放的檔案及與特^内 容相關連的任何資產檔案。在本發明的一個實施例中,這 ^权Ϊ.乃是假設··所有檔案均是利用一個適當的媒體編碼 解碼器(codec )加以編碼。這個元資料資訊可以包括有 =:及歌詞。在本發明的一個實施例中,這個資 結構化格式中,其係可能是或可能不是所有内Ϊ 式。在本發明的-個實施例中,這個 二枓乃,基,—個根據軌道(Per—track)或根據媒體 闬來楛:e. ?审1基礎。轉移至這個媒體的安全資訊乃是 則。與内容的互動可=用者:以與内容互動方法的規 諸如:舉例來說,在==、表現、及處理内容, 加上電子重點。 個邊界區域加入註解或為電子書籍Page 66 583568 V. Method of Inventive Explanation (61). For example, 'as described below' In one embodiment of the present invention, an identification code of a pre-recorded disc has at least a part of the identification of a stone horse which is pre-recorded. In this way, the identification code can be pretended to be detected as :, as will be further explained in the instruction manual. Please refer to Figure 7H, which is a flowchart of a procedure (including an original movie production program that generates media and sets up an information exchange type server) using a flowchart. This procedure begins with block 7002. Box 7004 is used to provide a newly published process for production and information procurement. Box 7 0 6 is used to enable two or more of the following data to be transferred to the media, including: content slots, metadata information, security information, and software collection information. The content file I may include a file that a consumer or user will play and any asset files associated with the content. In one embodiment of the present invention, it is assumed that all files are encoded using an appropriate media codec (codec). This metadata information can include =: and lyrics. In one embodiment of the invention, this structured format may or may not be all intrinsic. In one embodiment of the present invention, the two units are based on a track (Per-track) or based on the media: e. Review 1 basis. Security information transferred to this media is. Interaction with content = user: The rules for interacting with content, such as, for example, ==, performance, and processing content, plus electronic emphasis. Annotations or e-books

583568 五 、發明說明(62)583568 V. Description of the invention (62)

在本發明的一個實施例中,這些規則乃是用來提供一個第 二者數位權利管理(TPDRM )方法的一個廢止表列及第三 者數位權利管理(TPDRM )規則。這些第三者數位權利管 理(TPDRM )規則乃是用來提供消費者在播放及複製内容 日寸可能受到限定的規則。這些第三者數位權利管理 (TPDRM )規則更包括有其他細節,藉以使編寫及原版影 片製作程序(如說明書所述)能夠接收與原始鎖定播案相 關的資料。在本發明的一個實施例中,一個廢止表列乃是 =一個内容提供者所定義,並且,這個廢止表列乃是用來 提^ 一個表列的所有播放器裝置、播放器應用程式、及伺 服為,其均已經因為一個廢止實體所決定的某種原因而被 廢止。這個套裝軟體收集資訊乃是用來提供一份規格書, 猎以說明任何次要内容是如何群組的、以及這個套裝軟體 收集育訊應該要如何顯示給一個使用者或消費者。這個套 裝軟體收集資訊必須包括有各個套裝軟體的規格書,諸 如·顯示影像及套裝軟體說明。 方塊7008乃是用來提供—個編寫程序,其中,一個内容提 的”檔案均會根據預定規格進行套裝軟體。 在本發明的一個實施例中In one embodiment of the present invention, these rules are an abolition list and a third party digital rights management (TPDRM) rule used to provide a second digital rights management (TPDRM) method. These third-party digital rights management (TPDRM) rules are used to provide consumers with rules that may limit the daily playback and reproduction of content. These third-party digital rights management (TPDRM) rules also include other details, so that the authoring and original film production procedures (as described in the instructions) can receive information related to the original locked broadcast. In one embodiment of the present invention, a revocation list is defined by a content provider, and the revocation list is used to mention all player devices, player applications, and Servo is that they have been rescinded for some reason determined by a revocation entity. The software collection information is used to provide a specification to explain how any secondary content is grouped and how the software collection information should be displayed to a user or consumer. The information collected by this package must include the specifications of each package, such as the display image and package description. The block 7008 is used to provide a writing program, in which a content file is packaged according to a predetermined specification. In one embodiment of the present invention

, ^ ^ ^些規格書包括:將這些資料 組織為一個目錄結構,諸如· 安Μηητ、《尬α 名如·一個DataPlay大量記憶體播 案(MMF )目錄結構。在一份指玫 曰#甘—u 士· f刀規格書中,這個結構需要有 目餘’其包括有·編碼内客#查 六其柿酤罢 t α合棕案、一個目錄結構、一個内 奋g理裝置、一個aut〇ruri inf捧安 立 ,,, 柃安杜w ^ π· 1ηί檔案、及一個content· ddl 才虽木。特別疋,這個内容營採# 門合&理裝置乃是用來提供檔案,諸, ^ ^ ^ Some specifications include: organize these materials into a directory structure, such as Ann Mηητ, "Amazing α name such as a DataPlay Massive Memory Playback (MMF) directory structure. In a specification book referring to Mei # 甘 —u 士 · 刀 刀, this structure needs to have more than one eye, which includes: • coded internal guest # 查 六 其 Persimmon strike, a catalog structure, a The Nei Fen g-li device, an autóruri inf holding Anri ,,, 柃 Andu w ^ π · 1ηί file, and a content · ddl are only wood. In particular, this content camping # 门 合 & 理 装置 is used to provide files, various

583568 五、發明說明(63) 如·一個可執行檔案、一個微型網站、或一個内容提供者 所疋義的一個所有權或形式,藉以將媒體上的内容呈現給 一,消費者或一個使用者。這個aut〇run. ίηί檔案乃是用 來,供說明書所述自動執行操作裝置的資料及發動這個内 谷官理裝置的互動裝置。這個c〇ntent. ddl檔案可以包括 戋一個套裝軟體收集、廣告、及套裝軟體庫存單位(SKU )。特別是,一個套裝軟體收集可以包括有一個媒體的一 面上的所有次要内容的一個獨特識別碼、亦可以包括有一 個或更多個廣告的一個參照。這些廣告可以群組為一個套 衣並提供一個呈現層使用,藉以顯示這個次要内容 及二,。說明書所述的一個庫存單位(SKU )可以由一個 ^谷,供者疋義、並且可以參照這個媒的一個或更多個檔 :這個大$記憶體檔案(關F )資料描述語言(DDL· )檔 木則包括有描述内容及資產檔案間關連的檔案。 ^ ΐI個編寫程序的部分,一個内容提供者必須選擇是否 使用一種c〇ntentKey數位權利管理(ckdrm)、第三者數583568 V. Description of the Invention (63) Such as an executable file, a micro-site, or a ownership or form as defined by a content provider, to present the content on the media to a consumer or a user. This aut〇run. Ίηί file is used for the data of the automatic operation device described in the instruction manual and the interactive device that launches the Utari official management device. The cone.ddl file can include a software package collection, advertisement, and software package inventory unit (SKU). In particular, a software package collection may include a unique identifier for all secondary content on one side of a medium, and may also include a reference to one or more advertisements. These ads can be grouped into a suit and provide a presentation layer to display this secondary content. A storage unit (SKU) described in the manual can be defined by a supplier, and can refer to one or more files of this medium: the large $ memory file (F) data description language (DDL · ) Files contain files describing the content and the relationships between asset files. ^ For a part of writing a program, a content provider must choose whether to use a kind of digital key management (ckdrm), third party data

=雈=管理(TPDRM)、或兩種數位權利管理(drm)的一 ΐϊΐ二ί選定數位權利管理(DRM)的方式後,根據這 ίίϊϊ (DRM)的方式,内容播案便可以加密方 數位:ίϊ其需要的所有内容及檔案’藉以使這種選定的 來提供S理(_ )能多句適當地動作。方塊70 1 2乃是用 先錄製程序…,一個原版影片檔案組乃 :::體(諸如:一個磁帶)上進行儲存並傳送動 在本^明的一個實施例中,各個檔案組均可以提供一 583568 五、發明說明(64) 個媒體碟片上的-個單面。在這個預先錄製程序中執行的 另一個私序乃是:產生一個di工檔案,藉 以,構一個安全的資料庫,諸如:這個c〇ntentKey數位權 利官理(CKDRM)的安全資料庫。這個keyC〇mplement dH 檔案可以具有一個套裝軟體收集識別碼,纟包括有一個完 整標案路徑、一個標案處置、一個金錄隸,諸如::: 1 28位το數目及一個金鑰版本的一個補數。最後, 先錄製程序則包括有傳送這個c〇ntentinf檔案。預 方塊7022及7026則是用來傳送一個媒體(諸如、:一個磁 L上的适個原版影片檔案組至一個玻璃原版影片,藉以 j造^生一個媒體碟片時(在方塊7〇26中)戳印這個内 合些玻璃原版影片會產生一個或更多個戳印機, 大量產生這些媒體碟片並將其配銷至消費者及1他曰 在伺服器端,方塊7020乃是用來使一個原版影片= 為旎夠接收一個安全資料庫的資料。特別是,一個伺服 有:載入一個金鑰補數及一個金鑰映射資料庫表 :上 ί 具有這些key — . dl 1 及content. dl i 檔:二 扎疋的資訊)的套裝軟體。 茶中 參考第71圖,第7H圖所述的程序亦可以利用另 私序加以執行,其係可以與第”圖所述的程序同種 =是’第71圖乃是用來產生一個套裝軟體收集、套“ 、以及庫存單位(SKU),其將會在第?H 期軟 間&供。方塊7028乃是用來提供這個程序的一個開始動月 作’藉以設定一個網際網路(Internet)定隹商 。= 雈 = Management (TPDRM), or one or two of two digital rights management (drm). After selecting the digital rights management (DRM) method, according to this (DRM) method, the content broadcast can encrypt the digital : Ϊ ϊ All the content and files it needs', so that this selected to provide S reason (_) can act properly. Block 70 1 2 is a pre-recording program ... An original movie file set is stored on a ::: body (such as a tape) and transmitted. In one embodiment of the present invention, each file set can provide 583568 V. Description of the Invention-One side of (64) media discs. Another private sequence performed in this pre-recorded program is: generating a di-file, thereby constructing a secure database, such as the security database of CKDRM digital rights officials (CKDRM). The keyC0mplement dH file can have a set of software collection identifiers, including a complete project path, a project disposal, a gold record, such as: 1: a 28-bit το number and a key version Complement. Finally, the pre-recording procedure includes transmitting the conenf file. Pre-blocks 7022 and 7026 are used to transmit a medium (such as: a suitable original film file set on a magnetic disk to a glass original film, to generate a media disc (in box 7026 ) Stamping this original glass-incorporated film will generate one or more stamping machines, generate a large number of these media discs and distribute them to consumers and 1 on the server side, block 7020 is used to Make an original video = enough to receive the data of a secure database. In particular, a server has: load a key complement and a key mapping database table: on these keys —. Dl 1 and content . dl i file: Erzhang information) software package. Referring to Figure 71 in the tea, the procedure described in Figure 7H can also be executed using another private sequence, which can be the same as the procedure described in Figure "= Yes" Figure 71 is used to generate a software package collection , Set ", and storage unit (SKU), which will be available in the soft room & Block 7028 is used to provide a start-up job for this process, to set up an Internet contractor.

第70頁 583568 五、發明說明(65) (eTailer)。方塊7030乃是讓一個内容提供者能夠執行 一個套裝軟體設定及一個改變程序,,套裝軟體定義"。特別 是’在方塊7032及7034中’内容提供者係供應一個 content, ddl權案7034及套裝軟體顯示圖形及u資料給 這個零售商(eTailer )’其可以做為呈現給二個消^ 或使用者的一個套裝軟體呈現的部分。一般來說,交隹 (eTailer)都會對一個套裝軟體收集庫存單位 文。口 (packageCollectionSKU)感到興趣。零隹商. )可能不會對一個套裝軟體收集識別踢 ° 81 ΐ6ΓPage 70 583568 V. Description of Invention (65) (eTailer). Block 7030 is to enable a content provider to perform a software package configuration and a change procedure, package software definition. In particular, in 'blocks 7032 and 7034', the content provider supplies a content, ddl rights package 7034 and package software to display graphics and u data to this retailer (eTailer), which can be presented to two consumers ^ or used Part of a software package for the developer. Generally, eTailer collects inventory unit text for a software package. Mouth (packageCollectionSKU). Zero quotient.) May not collect recognition kicks for a software package ° 81 ΐ6Γ

(packageCollectionID)感到興趣,复乃 θ 球資源定位器(URL)以傳送至這個零^商1過一個全 -個零售商UTailer)可能會將這個套裝軟體H 碼(PaCkageCollectionID)傳送至一個情報别 器、然後便直接丟棄。 乂換柯服 =塊7036乃是用來讓一個零售商(eTaiUr)能 不為-個内容提供者可以供應的套裝 :據破 改變套裝軟體的定價。在本發明:以建立及 裝㈣定價及套裝軟體呈現以進行的這;套 乃疋由一個零售商(eTailer )完全或貝枓^庫動作 這個架構動作能夠與這個零售商(eTaUer) J丄藉以使 格式(諸如:-個"購物車"或丨,目錄維護"的個既存 ::售:(eTailer)所執行的另一個架構動作)相付。— -Ϊ 2擇指定折扣模型及廣告行銷。這個實扩?:包 令。商(eTailer)能夠根據人口統計及特定消m吏個 583568 五、發明說明(66) 用者以進行廣告行銷。 這個安^電子内容(SEC )系統所提供資料保全的另一個 特徵乃是有關於一個或更多個隨機數目產生器的應用。如 先前所述,在本發明的一個實施例中,一個隨機數目可以 透過一個原版影片製作程序以與這個媒體取得連繫。在本 發明的另一個貫施例中,一個隨機數目產生器亦可以存在 一個引擎内部。舉例來說,各個產生的引擎可以包括持有 一個隨機,目的非揮發性記憶體。一種產生這個隨機數目 的方法乃是藉著使用高品質的產生軟體,諸如:與聯邦 ,處理標準第186號公告文件(Flps—186)相容的軟體。、 ,一個引擎内部的這個隨機數目產生器可以 =技術的播種。舉例來說.,-個種子可以是產生一^ 目衫1個隨機數g;製造這個引擎時的一個隨機數 面識π=·中產生及内嵌的一個隨機數目;-個公開 -目:;Sideld); -個上旋時間數目所產生的 W要文目,一個伺服校正時 個搜尋時間;橋接 ' 個數目;一 隼資料DL 5祖官理中心(BCA)欄位;長期# 术貝科(諸如:上旋計數、讀兰 食J收 類)所產生的—個數目.入W率、或類如此 程序的伺服/讀取/寫丄非揮發性記憶體内、製造 二:二寫入—讀取時序所產生的-個數目心:,計 ,的的輸入所產生的一個數 β頰比數位轉 的函 數的任何數目。 ,乂及可月b疋上述數目 個引擎及一個主機間的函數 五、發明說明(67) 現在請參考第3表,其乃是用來介紹一個引 間交換資訊的函數。這個主機可以是—個播放哭權 利管理⑽M)、資訊站、或伺服器。在—個複製數位榷 中,其將進一步說明如後,一個目的地引擎即是一 ^主 機c 第3表(packageCollectionID) is interested, and the FUN θ sphere resource locator (URL) is transmitted to this retailer (1 through an all-retailer UTailer) may send the package software H code (PaCkageCollectionID) to an intelligence device , Then discard directly.乂 Change Ke service = block 7036 is used to allow a retailer (eTaiUr) to provide a package that a content provider can provide: it is broken to change the pricing of the package software. In the present invention: this is done by creating and installing pricing and package software; the package is operated by a retailer (eTailer) completely or in a library. This architectural action can be used with this retailer (eTaUer) J 丄Make the format (such as: an " shopping cart " or 丨, an existing ::: sale of the catalog maintenance " another architectural action performed by eTailer) pay. — -Ϊ 2 Select the specified discount model and advertising marketing. This real expansion? : Bao Ling. The eTailer can use the demographics and specific consumer information 583568 V. Description of the invention (66) The user can use it for advertising marketing. Another feature of data security provided by this electronic content (SEC) system is the application of one or more random number generators. As mentioned earlier, in one embodiment of the present invention, a random number can be associated with this media through an original film making process. In another embodiment of the present invention, a random number generator may also exist inside an engine. For example, each generated engine may include a non-volatile memory holding a random, destination. One way to generate this random number is through the use of high-quality generation software, such as software compatible with the Federal Processing Standards Bulletin 186 (Flps-186). The random number generator inside an engine can be used as a seeding technique. For example,-a seed can be a random number g that generates a ^ mesh shirt; a random number generated during the manufacture of this engine π = a random number generated and embedded in;-a public-head :; Sideld);-W titles produced by the number of upspin times, one search time during servo correction; the number of bridges; one line of data DL 5 Ancestral Center (BCA) field; long-term # 术 贝科(Such as: up counting, reading blue food, etc.)-a number. Entering the W rate, or servo / read / write like this program, non-volatile memory, manufacturing two: two write -Any number generated by reading the time-series number: the number of functions generated by the input of the number β, the ratio of the cheek to the number of digits.乂 and 月 月 b 疋 The functions between the above number of engines and one host V. Description of the invention (67) Please refer to Table 3, which is a function used to introduce an exchange of information between references. This host can be a broadcast rights management (M), information station, or server. In a copy of the digital question, it will be further explained that a destination engine is a host c. Table 3

ContentKey數位權利管理(CKDRM)函數第三 管理(TPMM)函數DataPlay檔案系統(DFS)函^權利 ContentKey數位權利管理(CKDRM)播放12第三 利管理(TPDRM)播放320檔案系統寫入374 —數位權ContentKey Digital Rights Management (CKDRM) Functions Third Management (TPMM) Functions DataPlay File System (DFS) Functions ^ Rights ContentKey Digital Rights Management (CKDRM) Play 12 Third Rights Management (TPDRM) Play 320 File System Write 374 — Digital Rights

ContentKey數位權利管理(CKDRM)解除鎖定36〇 位權利管理(TPDRM)複製34〇檔案系統讀取372 —者數ContentKey Digital Rights Management (CKDRM) Unlocked 36-Bit Rights Management (TPDRM) Copy 34 File System Read 372 — Number

ContentKey 數位權利管理(CKDRM) f 記錄解除鎖定内容3 6 2 記錄鎖定内容364ContentKey Digital Rights Management (CKDRM) f Record unlocked content 3 6 2 Record locked content 364

ContentKey數位權利管理(CKDRM )記錄35〇 如第3表所示,這些主要函數包括有:數位 利管理(CKDRM)播放312、第三者數位權利管理(TpDRM )插放320、ContentKey數位權利管理(CKDRM )複製 330、第三者數位權利管理(TpDRM )複製34〇、記錄内容 350,其包括有:記錄鎖定内容364、記錄解除鎖定内容 362、及ContentKey數位權利管理(CKDRM)解除鎖定 360。一個媒體可以選擇性地同時持有内容362及364,藉 583568ContentKey Digital Rights Management (CKDRM) record 35. As shown in Table 3, these main functions include: Digital Profit Management (CKDRM) playback 312, Third Party Digital Rights Management (TpDRM) insertion 320, ContentKey Digital Rights Management ( CKDRM) copy 330, third-party digital rights management (TpDRM) copy 34, and record content 350, including: record lock content 364, record unlock content 362, and ContentKey digital rights management (CKDRM) unlock 360. A media can selectively hold both content 362 and 364, borrowing 583568

以做為預先錄製的ContentKey數位權利管理(CKDRM)内 容。這些編寫、預先錄製、及原版影片製作工具分別扮演 一個角色。舉例來說,一個内容提供者可以指定這些/、As pre-recorded ContentKey Digital Rights Management (CKDRM) content. These authoring, pre-recording, and original movie production tools each play a role. For example, a content provider can specify these /,

ContentKey數位權利管理(CKDRM)特性,其包括有—·鎖 定/解除鎖定狀態、播放/不播放狀態、同意c〇ntentK 數位權利管理(CKDRM)複製的數目、同意第三者數位權 利管理(TPDRM)複製的數目、及一個第三者數位權利管 理一(TPDRM )可以由其複製品中取得的複製數目。其他的ContentKey Digital Rights Management (CKDRM) features, which include:-locked / unlocked status, play / unplay status, consent to the number of copies of the ConntentK Digital Rights Management (CKDRM), consent to third party digital rights management (TPDRM) The number of copies, and the number of copies a third party digital rights management one (TPDRM) can obtain from its copies. others

第三者數位權利管理(TPDRM )則可以由特定第三者數位 權利管理(TPDRM )加以指定。 播放函數Third-party digital rights management (TPDRM) can be specified by a specific third-party digital rights management (TPDRM). Play function

特別是,ContentKey數位權利管理(CKDRM)播放函數312 能夠容許解除鎖定、可播放的c〇ntentKey數位權利管理 (CKDRM )内容在任何播放器上進行播放。這個 ContentKey數位權利管理(CKDRM)播放函數可以將電子 内合由個引擎傳送至一個播放器上,並且亦同時伴隨著 解衣及表現這個傳送格式所需要的資訊。這個引擎乃 來管,:是否存有這個播放函數312的許可。在本發明的 =個實施例中,函數3丨2並不會將一個播放計數加以遞 減相反地解除解定及可播放Co n tent Key數位權利管理 (CKDRM )内容的播放許可將不會在計數或時間上進行限 請參考第8圖,其係利用一個流程圖以介紹這個 C〇ntentKey數位權利管理(CKDRM)播放函數312的應用程In particular, the ContentKey Digital Rights Management (CKDRM) playback function 312 can allow unlocked, playable contentKey Digital Rights Management (CKDRM) content to be played on any player. The ContentKey Digital Rights Management (CKDRM) playback function can transfer electronic internal integration from an engine to a player, and it is also accompanied by the information needed to undress and express this transmission format. The engine is responsible for whether or not there is a license for this playback function 312. In the embodiments of the present invention, the function 3 丨 2 does not decrement a play count and instead releases the solution and the play permission of playable Cognitive Key Digital Rights Management (CKDRM) content will not be counted. Please refer to Figure 8 for time limit. It uses a flowchart to introduce the application process of ConntentKey Digital Rights Management (CKDRM) playback function 312.

第74頁 583568 五、發明說明(69) ----Page 74 583568 V. Description of Invention (69) ----

式界面(API )。這個應用程式界面(Αρι )會要求:一個 插放器或主機必須在開啟這個應用程式界面(Ap I )前、 依照一個簽發憑證的程序加以簽發憑證。這個主機並不能 =利用任何允許任何其他實體進行存取的方式儲存這個内 各即使在鐘別這個主機前預先對這個内容進行加密。這 個2用程式界面(API)更不能讓播放器暫時儲存解密的 内容、亦或透過一個不安全通道轉移解密的内容。根據一 個主機鑑別程序810,方塊804乃是用來讓一個主機能夠傳 輸認證一個主機的一個憑證。在方塊8〇6中耦接至這個主 機的一個引擎乃是用來傳輸一把對話金鑰83〇。待鑑別程 序後,這個引擎便會選定一個解密播放對話金鑰83〇。方 塊832乃是用來將一個播放對話金鑰由這個引擎傳送至這 個主機(諸如:一個播放器)。隨後,一個播放器便會接 收這個播放對話的解密金鑰以用於一個特定檔案。方^ 834乃是用來說明:一個主機係利用一個對話金鑰以對這 個播放對話金鑰進行解密動作。方塊84〇乃是用來說明·· 現個播放器係用來接收加密内容。方塊85〇則是用來說 明.在方塊8 3 2接收的這個播放對話解密金鑰乃是用 這個内容進行解密動作。 'Interface (API). The application program interface (Αρι) will require that a player or host must issue a certificate according to a procedure for issuing certificates before opening the application program interface (Ap I). This host cannot = store this content in any way that allows any other entity to access it, even if the content is encrypted in advance before leaving the host. This dual-purpose programming interface (API) does not allow the player to temporarily store the decrypted content or transfer the decrypted content through an unsecured channel. According to a host authentication procedure 810, block 804 is used to enable a host to transmit a credential that authenticates a host. An engine coupled to this host in block 806 is used to transmit a session key 83. After the authentication procedure, the engine will select a decryption playback session key 83. Block 832 is used to transmit a playback session key from this engine to the host (such as a player). A player then receives the decryption key for this playback session for a particular file. Fang 834 is used to explain that a host uses a session key to decrypt the playback session key. Box 84〇 is used to explain that the current player is used to receive encrypted content. Block 85 is used to explain. The decryption key for the playback dialog received at block 8 32 is used to decrypt the content. '

不同於ContentKey數位權利管理(CKDRM )播放函数,、言 個第三者數位權利管理(TPDRM)播放函數32〇能夠讓解1除 鎖定的ContentKey數位權利管理(CKDRM)内容透過一種于、 第三者數位權利管理(TPDRM)進行播放。這個第三 位權利官理(TPDRM)播放函數320乃是用來將電子内容由Different from the ContentKey Digital Rights Management (CKDRM) playback function, a third-party digital rights management (TPDRM) playback function 32 can enable the ContentKey Digital Rights Management (CKDRM) content to be unlocked by one or the third party. Digital Rights Management (TPDRM) for playback. This third-level rights officer (TPDRM) playback function 320 is used to transfer electronic content from

j^568 五、發明說明(70) ' ' 一 ---- 個引擎傳送至這個第三者數位權利管理(TPDRM ),並 尕,^日才伴匕著解密及表現傳送格式所需要的資訊。這個 =婁^是否存在許可的管理動作乃是利用這個第三者數位權 王1官理(TPDRM )加以實施。這個c〇ntentKey數位權利管 (C K D R Μ )並不會將播放計數加以遞減、或是針對時間 一制及任何其他管理規定進行檢查動作。相反地,這個第 :者數位權利管理(TPDRM )亦能夠管理及/或改變其自 的7L資料’藉以做為其播放函數的部分。 複製函數j ^ 568 V. Description of the invention (70) '' ---- One engine transmits to this third party digital rights management (TPDRM), and 尕, only ^ day accompanied by dagger to decrypt and express the information required for the transmission format . This = Lou ^ Whether the management action of permission exists is implemented by using this third party digital authority 1 (TPDRM). The ConntentKey digital rights management (CK DRM) does not decrement the play count, or perform check actions against time systems and any other regulatory requirements. Conversely, this Digital Rights Management (TPDRM) can also manage and / or change its own 7L data 'as part of its playback function. Copy function

另一個函數乃是ContentKey數位權利管理(CKDRM)複製 ^數3 。當保留有複製許可時,函數3 30能夠讓預先錄 2、解除鎖定的内容由一個媒體複製到另一個媒體上。這 個ContentKey數位權利管理(CKDRM)複製函數33〇會將—Another function is ContentKey Digital Rights Management (CKDRM) copy ^ number 3. Function 3 30 enables pre-recording 2 and unlocked content to be copied from one medium to another when copy permission is retained. This ContentKey Digital Rights Management (CKDRM) copy function 33〇 will—

個原始媒體上保留的許可複製數目加以遞減。特別是,在 本發明的一個實施例中,Con tent Key數位權利管理 (CKDRM )乃是用來產生一個有限數目的複製。經由媒體 (其具有個有限數目、利用這個ContentKey數位權利管 理(COJM )複製函數"ο的複製)所執行的任何複製動; ^共享這個原始複製能夠在任何播放器中進行播放的數 置。然而’這些複製本身可能並不會被複製。一個内容提 供者可以選擇性地指定可以由一個原物進行的複製數目。 每當執行一、個複製動作時,這個c〇ntentKey數位權利管理 (CKDRM )複製函數33〇便會將保留的容許複製數目加以 583568 五、發明說明(71) 請參考第9圖,其乃是用來介紹這個c〇nte (CKDRM) (API) 塊9 1 0乃U來提供這個目的地引擎的 = 確認這個目的地確實為-個認證的引擎; 個目的地引擎傳送一個婵㈣別碼万用來讓這 … Α別碼,精以連結這個新的遴 製。方塊930乃是用來傳輸這個目的地的—個^的複 在方塊930中,這個目的地引擎會接收使用這個内 要的金錄。特別是,這些金錄乃是播放這個内容的解穷而 ,。在-個範例中,這些金鑰乃是以預先連結至這個:的 地媒體的方式進行傳送。方塊94〇乃是用來複製這個加穷 内容。DataPUy檔案系統(DFS)命令乃是用來複製這二 内容。在本發明的一個實施例中’這個複製函數33〇乃是 支援在具有一個引擎及足夠緩衝(藉以暫時儲存内容)的 壞境中、亦或是在具有兩個引擎的環境中。 第三者數位權利管理(TPDM)複製函數34〇能夠讓一種 三者數位權利管理(TPDRM)複製解除鎖定内容,倘若保 留有第三者數位權利管理(TPDRM)的複製許可。這個第 三者數位權利管理(TPDRM )複製函數34〇會將一個來源檔 案所保留的許可複製數目加以遞減。不像c〇ntentKey數位 權利管理(CKDRM)複製函數330,第三者數位權利管理 (TPDRM)複製函數340乃是用來產生一個有限數目的複 製。這些得到的複製乃是由這種第三者數位權利管理 (TPDRM)進行管理。一個内容提供者則可以用來指定一The number of licensed copies retained on each of the original media is decremented. In particular, in one embodiment of the present invention, Content Key Digital Rights Management (CKDRM) is used to generate a limited number of copies. Any copying performed by the media (which has a limited number of copies using this ContentKey Digital Rights Management (COJM) copy function "); ^ Share the number of places where this original copy can be played in any player. However, these copies themselves may not be copied. A content provider can optionally specify the number of copies that can be made from one original. Whenever one or one copying actions are performed, this copyKeyKey Digital Rights Management (CKDRM) copying function 33 will add 583568 the number of allowable copies to be kept. Used to introduce the C0nte (CKDRM) (API) block 9 1 0 is U to provide this destination engine = confirm that this destination is indeed an authenticated engine; each destination engine sends a unique code Used to make this ... Α PIN, to link this new selection. Block 930 is used to transmit this destination—a complex copy. In block 930, the destination engine will receive and use this internal gold record. In particular, these golden recordings are the solution to this problem. In one example, these keys are transmitted in advance by linking to this: local media. Box 94O is used to duplicate this plus content. The DataPUy File System (DFS) command is used to copy these two contents. In one embodiment of the present invention, the copy function 33 is supported in an environment with one engine and sufficient buffering (for temporarily storing content), or an environment with two engines. The third-party digital rights management (TPDM) copy function 34 can enable a three-party digital rights management (TPDRM) copy to unlock the content, provided that the third-party digital rights management (TPDRM) copy license is retained. This third-party digital rights management (TPDRM) copy function 34 reduces the number of licensed copies retained by a source file. Unlike the ConnKeyKey digital rights management (CKDRM) copy function 330, the third party digital rights management (TPDRM) copy function 340 is used to generate a limited number of copies. These resulting copies are managed by this third-party digital rights management (TPDRM). A content provider can be used to specify a

583568 五、發明說明(72) 個檔案所能夠執行的複製數目。 =容乃的二個複製,一個憑證的第三者數位權利管理 41 ^ ^ ^ ^ ^ ^ (CKDRM } k们弟二者數位權利管理(Tpdrm )。 =傳這Z送的内容便會加密,且,對應的解密金)鑰亦 :被傳达到接收的那個數位權利管理(drm )。 第1 〇圖乃是用來介紹根據本發明—個實 為姐別耘序。特別是,如第6圖所述,一個引擎乃是用來 確=·· 一個主機乃是一個憑證的數位權利管理(drm)且 以用來接收内容。方塊1〇20乃是讓一個第三者數位 杈利官理(TPDRM )能夠指定這個第三者數位權利管理 ^PDRM )要求接收的内容。一個引擎乃是根據一個内容 提供者所指定的啟始數目及先前傳送的複製數目,藉以管 理卉可的複製數目。在方塊丨〇 3 〇中,一個引擎會藉著傳送 金鑰(這個内容必須利用這些金鑰以進行解密動作)以因 應於有效的請求。金鑰的傳送乃是一個第三者數位權利管 理(TPDRM )的一個必要動作、並且會將保留的許可複製 數目加以遞減。方塊1〇4〇乃是讓這個第三者數位權利管理 (TPDRM )能夠接收這個内容、其乃是利用剛才傳送的金 錄進行加密。 記錄函數 :ιι個ContentKey數位權利管理(CKDRM )所提供的另一個 函數乃是記錄内容350。記錄内容3 62乃是讓内容編寫、預583568 V. Description of the invention The number of copies that (72) files can perform. = Two copies of Rong Nai, a third party digital rights management of a voucher 41 ^ ^ ^ ^ ^ ^ (CKDRM) K brothers digital rights management (Tpdrm). = The content sent by Z will be encrypted, And, the corresponding decryption key) is also transmitted to the received digital rights management (drm). Figure 10 is used to introduce a practical step for the sister according to the present invention. In particular, as shown in Figure 6, an engine is used to ensure that a host is a digital rights management (drm) of a credential and used to receive content. Block 1020 allows a third-party digital authority (TPDRM) to specify the content that this third-party digital rights management (PDRM) requires to receive. An engine manages the number of copies that can be made based on the number of starts specified by a content provider and the number of copies previously transmitted. In block 丨 〇 3〇, an engine will respond to a valid request by transmitting keys (this content must use these keys for decryption). The key transfer is a necessary action of a third party digital rights management (TPDRM), and the number of reserved license copies is decremented. Box 1040 enables this third party digital rights management (TPDRM) to receive the content, which is encrypted using the gold records just transmitted. Record function: Another function provided by the ContentKey Digital Rights Management (CKDRM) is to record the content 350. Record content 3 62

583568 五、發明說明(73) 先錄製、及原版影片製作的内容 容,藉以複製做為解除鎖定的内容J = ”電子内 資料乃是可讀取及加密的。相反地,解除鎖定的 、供電子内容’藉以複製做為 :t:者-夠 法播放的,除非是在解除鎖定以後個,是, 亦可以制這個contentKey數位權利m疋内容 容相同=;。亚且使付到的内容能夠具有與解除鎖定内 (CKDRM) 管理(TPDRM、)匯入f個播放益、或—個第三者數位權利 領域。利用^種/\11怵67數位權利管理(以1)“)的 貝η扪用绝種形式,這個内容便可以在任何 =這括:内Ϊ由電子散佈以取得内容、以及在播放 二圖:^:紹一種記錄内容的方法…幻⑴乃是 ,豆厅精以楗供一個來源、其乃是下列元件 οσ ,、括有,弟三者數位權利管理(TPDRM )、播放 對tf1…方塊112°乃是用來讓這個二 是一種Conte 固右人匯入的内容應用一種系統寫入協定或 種t ntKey數位權利管理(CKDRM )記錚協定。在 方塊⑽中,一個檔案格式中、欲進行加密動:協及〜上 ntenUey數位權利管理(CKDRM)記錄應用程式界583568 V. Description of the invention (73) The content of the original recording and original film production is copied as the unlocked content. J = "electronic data is readable and encrypted. On the contrary, the unlocked, Electronic content 'can be copied as: t: zhe-enough to play, unless it is unlocked, yes, you can also make this contentKey digital rights m. The content content is the same =; and make the paid content available Has the ability to unlock (CKDRM) management (TPDRM,) import f playback benefits, or a third-party digital rights field. Utilize ^ kinds / \ 11 怵 67 digital rights management (with 1) ")绝 In the extinct form, this content can be used in any of the following =: Inner contents are distributed electronically to obtain the content, and the second picture is displayed: ^: This is a way to record the content ... For one source, it is the following components, including the following: Digital Rights Management (TPDRM) of the three brothers, playback of tf1 ... The box 112 ° is used to make this two is a content application imported by Conte. A system write agreement or t ntKey Digital Rights Management (CKDRM) record agreement. In box ⑽, in a file format, you want to perform encryption operations: Concordance ~ on ntenUey Digital Rights Management (CKDRM) record application industry

第79頁 五、發明說明(74) 面(API )進行寫入勤 Con tent Key數位權利总的一刀乃疋根據這種 塊H40中,欲保協定進行傳送。在方 的應用程式界φ (API ) °進=入二是利用這個槽案系統 管理内容可以利用二絲+』撒 f ,1 (CKDRM) 權利管理™M),其係用;:』:::第三者數位 疋建立-㈣服H ’其係用來管理這個内容並方式^ m;數:立權利管理(CKDRM)記 :* frrriL (CKDRM) 資;站、在太:!所有内容貧m。第三種方式則是建立-個 :;二ΐ本發明的一個實施例,,這個資訊站同時且有 數,誠…有-個引擎―。Page 79 V. Description of the invention (74) The API (writing API) is used to write the digital rights of the Con tent Key. The total size is based on this block H40. The agreement is to be transmitted. In the application world φ (API) ° Enter = Enter the second is to use this slot case system to manage the content can use the second wire + "撒 f, 1 (CKDRM) Rights Management ™ M), which is used ;:" :: : Third party digital 疋 establishment-service H 'It is used to manage this content and method ^ m; number: standing rights management (CKDRM) note: * frrriL (CKDRM) resources; standing, in the too: all content is poor m. The third way is to create one: one embodiment of the present invention, this information station is simultaneously and severally, sincerely ... there is an engine.

ContentKey數位權利管理(CKDRM)解除鎖定36〇乃是第3 表所示的另一個函數。在本發明的一個實施例令,這個解 除,定^數360僅僅能夠適用於鎖定的内容。在這個解除 鎖1的父易中需要有能夠連接到一個情報交換所的—個應 用耘式。當操作一個媒體(諸如:一個碟片)的一個使用 者滿足預定的交易需求時,一種安全的方法便會將一個媒 體上的内容狀態由鎖定狀態改變為解除鎖定狀態。 根據本發明的一個實施例,鎖定内容可以透過授權交易而 ^成解除鎖定狀態。這些授權交易包括有:根據一個内容 583568 五、發明說明(75) 提供者所選定規則所執行的那些交易。舉例來說,一個内 容提供者可以控制是否播放内容及能夠透過第三者數位權 利管理(TPDRM)而執行的複製數目。 以一個鎖定狀態預先錄製的内容亦可以解除鎖定。在本發 明的一個實施例中,在這個鎖定狀態中,在這個媒體上的 廷組金鑰並不足以表現這個内容。這種解除鎖定的方法乃 是用來傳輸這些金鑰的補數。在本發明的另—個實施例 ::解除鎖定的方法乃是用來傳送能夠匹配於這個媒ContentKey Digital Rights Management (CKDRM) unlocking 36 is another function shown in Table 3. In one embodiment of the invention, this resolution, the fixed number 360 can only be applied to locked content. An application that can be connected to an information clearing house is required in the parent of the unlock lock 1. When a user operating a medium (such as a disc) meets a predetermined transaction requirement, a secure method will change the state of the content on a medium from a locked state to an unlocked state. According to an embodiment of the present invention, the locked content can be unlocked through an authorized transaction. These authorized transactions include: those executed according to a content 583568 5. Invention Description (75) Rules selected by the provider. For example, a content provider can control whether content is played and the number of copies that can be performed through third-party digital rights management (TPDRM). Pre-recorded content in a locked state can also be unlocked. In one embodiment of the invention, in this locked state, the key set on the media is not sufficient to represent this content. This unlock method is used to transmit the complement of these keys. In another embodiment of the present invention :: The unlocking method is used to transmit information that can match the media

J =二,鑰的資料,藉以證明這個情報交換所的鑑別 陡。每些育料亦可以稱為金鑰補數。 ί用2紹一種對内容進行解除鎖定動作的方 步驟乃是用來提供這種方法中的第—個 乃是用來讓一個來源( 仃乂f41別私序。方法1220 内容所連結的—個媒體,二—13司服器)能夠擷取這個 來源能夠指定欲解除鎖J的:二方塊1220乃是用來讓這個 1 230乃是用來讓這個目 山金鑰的補數。方塊 -個伺服ϋ,根據—個=所:個引擎)能夠透過 個請求的有效性。 棱供者所技供的規格以管理這 r 除鎖定動作的這個飼服=一個實施例中,執行這個解 個媒體(内容係儲在編寫及原版影片製作這 一個正當的解除鎖定守,讓适個内容提供者指定為 檔案系統函數 原。 利管理(咖)的-個預設函數乃是J = Second, the key information is used to prove that the identification of this clearing house is steep. Each breed can also be called a key complement. ί Use 2 to describe a method for unlocking content. This method is used to provide the first of this method. It is used to make a source (仃 乂 f41 do n’t private order. Method 1220 content linked to a The media, 2-13 server) can retrieve this source and can specify that J is to be unlocked: the second block 1220 is used to make the 1 230 the complement of the eye mountain key. Block-a servo, based on the validity of a request. According to the specifications provided by the donor to manage the feeding operation except the locking action = In one embodiment, the solution is executed (the content is stored in the writing and original film production, a proper unlocking guard, so that the appropriate A content provider is designated as the file system function source. A default function for management (coffee) is

第81頁Page 81

ContentKey 數 # 描 & 583568 五、發明說明(76) 利用第3表,如上付、, & 案系統能夠許可檔案階;、们‘系統:74加以官自。這個擋 用程式界* (API )並不V?:動:這個槽产系統的應 這些樓案系統所採用的加密方法。 是,僅有在這個檔;2J::標案ϊ取函收372。特別 案系統、利用任何以置:二㈣::斗才可以透過這個檔 有-個樓案系統:;===開放/架構,其具 要-個鑑別主機的情況=界?面(api),其能夠在不需 施例,這個檔案夺統福取^丁開放。根據本發明的一個實 如:一個播放被任何主機(諸 及不需要使用加密方法(^ =不而要建立—個鑑別連接 下,進行資料的;:動:其係位於-個引擎…情況 :亡:i374At乃是用來▲識別-個槽案系統寫入函數,,以 ),將ί:料過這個檔案系統的應用程式界面(:pi ) 將貝料冩入這個;^宏备从w丄 、八r丄 也/ $条糸統儲存區域中。不闾私、丄加u 案系統的讀取函數372,這 =门於廷個檔 為-個開放式架構的部分個藉寫以 f二進行開放、且這個槽案系統的應用程ί ΓΓ #安皆、可以進仃放,而不需要存在一個鑑別主機。、言 :祂案寫入函數374可以被任何主機使用,藉 不心 =-:鑑=接”需要使用一個引擎 而要 583568 五、發明說明(77) 這個引擎所執行的方法 上述這個ContentKey數位權利管理(CKDRM)的函 用來為這個C〇ntentKey數位權利管理(CKDRM)及函^ 供一個概觀。一個引擎乃是配合這個安全電子 ^ContentKey number # Desc & 583568 V. Description of the invention (76) Using the third table, as shown in the above, the & case system can allow the file level; This API * (API) is not V ?: Dynamic: This slot system should be encrypted using the same method used by these building systems. Yes, it is only in this file; 2J :: Bid Case Letter 372. Special case system, using any of the following settings: Erji :: dou can have a building case system through this file:; === open / architecture, which requires a case of authentication host = interface? (Api) This file can be opened without the need for enforcement. According to a practical example of the present invention: a playback is performed by any host (and does not require the use of encryption methods (^ = instead of establishing an authentication connection to carry out data) :: its system is located in an engine ... case: Death: i374At is used to ▲ identify-a slot system write function, to), will til: past the application program interface (: pi) of this file system to insert shell material into this; ^ 宏 备 from w Shang, Shang also eight r / $ bar system which is not Lu private storage area, a function of reading text Shang u plus system 372, in which the door = ting a file to - an open architecture section to a write by f Second, open, and the application process of this slot system Γ ΓΓ # can be put into play, without the need to have an authentication host. In other words: his case write function 374 can be used by any host, unintentionally = -: Jian = connected "requires an engine and requires 583568 5. Inventory (77) The method executed by this engine The above-mentioned function of ContentKey Digital Rights Management (CKDRM) is used for this CononKeyKey Digital Rights Management (CKDRM) And letters ^ for an overview. An engine is a match The Secure Electronic ^

)系統的其他部分(請彖考第2岡%、 ( SEC 鉍 加Η丨敬, > 亏弟2圖所述)以執行這些函 Ϊ取:=二2書所述’乃是用來對數位媒體提供 項取及寫入存取動作的一個元件。這個引 主機内、亦或是耦接至一個主機,f 存在一個 行這些函數…,這些命=能d 令以執 易明瞭、亦或是根據系統及設計需求:以定j :::能: 一個主機應用程式中,元件及應用程式間的复他 弋屬於本發明的範圍。"主機應用程式"這個用、語可^ 这個引擎所直接連結的那個裝置、在一個連接裝:曰 亡:-台個人電腦(PC))上的一個應用程式、亦=施 數位權利管理(CKDRM)情報交換所的一 f 疋N的各個方法係包括有:C〇ntentKey數位權利管理 (CKDRM)及擋案系統命令的某個或兩個。這歧方法 將說明如下)可以供應給任何憑證實體、並且為這個實體 的憑:登所限定。另夕卜,本發明亦需要有内嵌一個引擎的裝 ,,藉以透過這個裝置所實施的資料丨界面,揭露這些 檔案系統及ContentKey數位權利管理(CKDRM)的應用程 式界面(API )。在本發明的一個實施例中,揭露這些檔 案系統及ContentKey數位權利管理(CKDRM)的應用^式) The other parts of the system (please test the second gang%, (SEC Bismuth PLUS, > Lost brother 2)) to perform these functions: Digital media provides an element for item fetch and write access actions. This leads to the host, or is coupled to a host, f exists a line of these functions ... These commands = can d make it easy to understand, or It is based on system and design requirements: to determine j ::: can: in a host application, the components and other applications belong to the scope of the present invention. &Quot; Host application " The device to which the engines are directly connected, an application on a connected device: a personal computer (PC), and each of the 疋 N of the Digital Rights Management (CKDRM) Clearinghouse. The methods include: one or two of ConntentKey Digital Rights Management (CKDRM) and file system commands. This method will be explained as follows) can be supplied to any voucher entity and is limited by the voucher of this entity. In addition, the present invention also needs to have a built-in engine, so as to expose the file system and ContentKey Digital Rights Management (CKDRM) application program interface (API) through the data interface implemented by this device. In one embodiment of the present invention, the application of these file systems and ContentKey Digital Rights Management (CKDRM) is disclosed.

第83頁 583568Page 83 583568

五、發明說明(78) 界面(AP I )能夠讓内嵌z個引擎的一個裝置能夠用做另 一個實體的一個代替品。5. Description of the Invention (78) The interface (AP I) enables a device with z engines to be used as a substitute for another entity.

根據本發明的一個實施例,利用一個引擎進行通信需要有 一個安全的對話。先前所述的這個鑑別程序可以得到一個 新的安全對話及一個安食的對話金錄。第13圖乃是用來介 紹··透過一個鏗別程序以取得一個安全對話的一個範例。 方塊1 320乃是用來讓這個安全金鑰能夠在不對稱的加密程 序中進行轉移。在這個實施例中,這個對話金鑰乃是一個 對稱金鑰’藉以獲致資料的快速加密及解密。方塊丨3 4 〇乃 是用來詢問是否發生一個主機變動、或媒體是否由一個裝 置彈出。當方塊1 340為真,則這個安全對話便會在方塊、 1 3 5 0中結束。若否,則這個安全對話便會繼續至方塊 1 3 6 0。,因此,一個安全對話乃是獨一無二於一個特定的 體、引擎、及媒體組合。 、 每當建立一個安全對話後,這個引擎便可以執行各種函 數。這個引擎韌體乃是用來共這些Con tent Key數位權利管 理(CKDRM)及第三者數位權利管理(TpDRM)方法的功 月b 其包括有·鎖定/解除鎖定、ContentKey數位權利管According to an embodiment of the present invention, communication using an engine requires a secure conversation. The authentication procedure described earlier results in a new secure conversation and a safe talk conversation record. Figure 13 is an example of how to get a secure conversation through a separate process. Block 1 320 is used to enable this security key to be transferred in an asymmetric encryption process. In this embodiment, the dialog key is a symmetric key 'through which the data is quickly encrypted and decrypted. Block 丨 3 4 〇 is used to ask whether a host change has occurred or whether the media is ejected by a device. When block 1 340 is true, this secure conversation will end in block 1 3500. If not, the secure conversation continues to block 1 3 6 0. Therefore, a secure conversation is unique to a particular entity, engine, and media combination. Every time a secure conversation is established, this engine can execute various functions. This engine firmware is used to share the functions of these Content Key Digital Rights Management (CKDRM) and Third Party Digital Rights Management (TpDRM) methods. B It includes lock / unlock, ContentKey digital rights management

理(CKDRM )播放、ContentKey數位權利管理(CKDRM )複 製許可、以及第三者數位權利管理(TpDRM )複製許可。 對於ContentKey數位權利管理(CKDRM)及第三者數位權 利管理(TPDRM )複製許可而言,這個引擎可以進行下列 動作之一,其包括··自由複製、計數的第一代複製、以及 未限定的第一代複製。Management (CKDRM) playback, ContentKey digital rights management (CKDRM) copy license, and third-party digital rights management (TpDRM) copy license. For ContentKey Digital Rights Management (CKDRM) and Third Party Digital Rights Management (TPDRM) copy licenses, this engine can perform one of the following actions, which include: · free copy, counted first-generation copy, and unlimited First generation copy.

第84頁 583568 五、發明說明(79) 個女全對話可以讓一個引擎能夠進入這個C 〇 n t e n t κ e y數 位權利管理(CKDRM )領域,其包括··執行這些 ContentKey數位權利管理(C〇RM)及第三者數位權利管 理(TPDRM )的函數。一個引擎所執行的這些c〇ntentKey 數位權利管理(CKDRM )函數乃是根據協定以進行。相對 於一個引擎的觀點,各個協定將進一步說明如後。Page 84 583568 V. Description of the invention (79) The women's full dialogue can allow an engine to enter the field of C tent κ ey digital rights management (CKDRM), which includes · implementation of these ContentKey digital rights management (C〇RM) And third-party digital rights management (TPDRM) functions. The cnntentKey Digital Rights Management (CKDRM) functions executed by an engine are performed according to the agreement. With respect to the point of view of an engine, each agreement will be further explained as follows.

ContentKey數位權利管理(CKDRM)複製 第14圖乃是用來介紹一個引擎,藉以執行一 數位權利管理(CKDRM)複製方法,其乃是用來複製這個 ContentKey數位權利管理(CKDRM )領域内部的内容。舉 例來說,請參考第14圖,一個來源引擎141〇乃是用來持有 ^立於這個ContentKey數位權利管理(CKDRM)領域内部的 官理内容。根據本發明的一種實施方式,一個來源檔案 1 420,夠加以指定,藉以使這個來源檔案142〇必須進行解 除鎖疋動作、並且在這個方法繼續前具有保留 數=權利管理(CKDRM)的複製許可。根據本發明的另一 種^施方式,舉例來說,超散佈模型的來源檔案142〇狀態 Zr疋彼此不相關連的。纟這個例子中,這個目的地乃是這 個C⑽tentKey數位權利管理(CKDRM)領域。另外,得到 ^ =衣1^3 0乃疋官理内| ’且這個槽案亦會進行解除鎖定 ^作,其具有c〇ntentKey數位權利管理(CKDRM)播放許 :午可旦::ΐic:ntentKey數位權利管理(CKDRM)複製 鍮盒子U50係進行轉移動作,一個金 q幵秒勃作。根據本發明的一個實施例,ContentKey Digital Rights Management (CKDRM) Copy Figure 14 is used to introduce an engine to perform a Digital Rights Management (CKDRM) copy method, which is used to copy the contents of this ContentKey Digital Rights Management (CKDRM) field. For example, please refer to Figure 14. A source engine 1410 is used to hold official content within the ContentKey Digital Rights Management (CKDRM) field. According to an embodiment of the present invention, a source file 1 420 is sufficient to specify, so that this source file 1420 must perform an unlocking operation, and have a copy permission of retention number = rights management (CKDRM) before this method continues. . According to another embodiment of the present invention, for example, the source file 1420 state Zr 疋 of the hyper-dispersion model is not related to each other.目的地 In this example, the destination is the C⑽tentKey Digital Rights Management (CKDRM) field. In addition, get ^ = 衣 1 ^ 3 0 乃 疋 的 理 理 || and this slot case will also be unlocked ^, which has a ConntentKey Digital Rights Management (CKDRM) broadcast Xu: Wu Kedan :: ΐic: The ntentKey Digital Rights Management (CKDRM) duplication box U50 is used to perform the transfer action. According to one embodiment of the invention,

第85頁 583568 五、發明說明(80) 在轉移這個金鑰盒子1 450的命令執行期間’這個來源檔 1:20將會對:留的c〇ntentKey數位權利管理(ck 複、Page 85 583568 V. Description of the invention (80) During the execution of the command to transfer this key box 1 450 ’, this source file 1:20 will be: the reserved cOntentKey digital rights management (ck,

製許可進行遞減動作。 7 I 根據這個複製協定的一個實施例,舉例來說,一個安全 在兩個引擎(一個來源引擎1410及-個目的地 擎mo乃是用來執行一個安全的應用程式界面= 來)源引 亚且僅僅揭露於具有ContentKey數位權利 機。這個目的地引擎1440則包括二個開放The control permits a decreasing action. 7 I According to an embodiment of this replication agreement, for example, one source engine is in two engines (a source engine 1410 and a destination engine are used to execute a secure application program interface = 来) And only disclosed in digital rights machines with ContentKey. This destination engine 1440 includes two open

::Φ :工夂Γ (AP1)。如此,這種方法便可以揭露給 所有主機。各個引擎均具有一個主機。一個單一裝置可以 :時做為這些來源及目的地引擎的這個主機、或者各個引 擎亦可以具有-個不同的主冑。在後面的例子中,這兩個 主機必須要能夠根據一種主機協定以進行通信。 這種ContentKey數位權利管理(CKDRM)複製協 用熟習此技藝者所明瞭的命令,纟且,這些命令亦提供以 做,5兄明用途。這個協定乃是使用這些c〇ntentKey數位權 利 g 理(CKDRM )命令,其包括有:CKCMD—authenticate:: Φ: 工 夂 Γ (AP1). In this way, this method can be exposed to all hosts. Each engine has a host. A single device can serve as the host for these source and destination engines, or each engine can have a different host. In the latter example, the two hosts must be able to communicate according to a host agreement. This ContentKey Digital Rights Management (CKDRM) duplication command is familiar to those skilled in the art, and these commands are also provided for the purpose. This agreement is to use these keyKey digital rights management (CKDRM) commands, including: CKCMD—authenticate

及CKCMD—GET—CKCMD—COPY 〇 CKCMD 一 AUTHENTIC ATE這個命令乃是用來讓這個目的地引 擎1 440能夠對這個來源引擎141〇自行鑑別,藉以建立這個 來源引擎對於這個目的地引擎的信任,藉以同意 ContentKey數位權利管理(CKDRM)方法的使用。這個來 源主機會在這個命令封包中傳送這個目的地引擎的And CKCMD_GET_CKCMD_COPY 〇 CKCMD-AUTHENTIC ATE This command is used to enable the destination engine 1 440 to authenticate the source engine 141 〇 to establish the trust of the source engine for the destination engine. Consent to the use of the ContentKey Digital Rights Management (CKDRM) method. The source host will send the destination engine in this command packet.

第86頁 583568 五、發明說明(81)Page 86 583568 V. Description of the invention (81)

Con tent Key數位權利管理(CKDRM )憑證。隨後,這個來 源引擎便可以利用這個這個安全對話的對話金鑰以進行回 應。 根據CKCMD 一 GET—CKCMD—COPY這個命令,一個特定權案 或目的地可能會要求一個金鑰盒子。隨後,這個來源引擎 1410便會將這個槽案及這個目的地的這個金錄盒子及一個 廢止表列一併返回。Content Key Digital Rights Management (CKDRM) certificate. The source engine can then use the session key for this secure session to respond. According to the CCKMD-GET-CKCMD-COPY command, a particular case or destination may require a key box. Subsequently, the source engine 1410 will return the slot case, the golden record box and the revocation list of the destination together.

ContentKey數位權利管理(CKDRM)記錄 一個引擎所執行的另一個方法乃是這個ContentKey數位權 利管理(CKDRM )記錄,其乃是用來提供一種將内容帶進 這個ContentKey數位權利管理(CKDRM)領域的方法。這 種方法乃是假設:一個來源乃是在這個C〇ntentKey數位權 利管理(CKDRM )領域以外的管理内容。這個目的地則是 這個(:〇1^6111;1^7數位權利管理((:1(1){^)領域。並且,得 到的複製乃是管理内容。 $ 這種ContentKey數位權利管理(CKDRM)記錄方法首先在 一個引擎及一個主機間建立一個安全對話。因此,這種方 法乃是一個安全的應用程式界面(ΑΡ ί ),其僅僅能夠對 具有ContentKey數位權利管理(CKDRM)記錄許可的主機 進行揭露。在這個記錄協定中包括有下列命令:CKCMd AUTHENTICATE、CKCMD—GET 一CERTIFICATE、CKCMD 〜 CREATE—FILE、CKCMD—RECORD—APPEND。特別是,^κ —AUTHENTICATE這個命令乃是用來該供應内容的主機能 對個引擎進行自我鑑別程序,藉以建立這個引擎對於^ContentKey Digital Rights Management (CKDRM) records Another method performed by an engine is this ContentKey Digital Rights Management (CKDRM) record, which is used to provide a way to bring content into this ContentKey Digital Rights Management (CKDRM) field . This approach is based on the assumption that one source is management content outside the field of ConttentKey Digital Rights Management (CKDRM). The destination is this (: 〇1 ^ 6111; 1 ^ 7 digital rights management ((: 1 (1) {^) field. And, the copy obtained is to manage content. $ This ContentKey digital rights management (CKDRM ) The recording method first establishes a secure conversation between an engine and a host. Therefore, this method is a secure application program interface (ΑΡ ί), which can only be used for hosts with ContentKey Digital Rights Management (CKDRM) recording permission The disclosure includes the following commands in this record agreement: CKCMd AUTHENTICATE, CKCMD_GET_CERTIFICATE, CKCMD ~ CREATE_FILE, CKCMD_RECORD_APPEND. In particular, the command ^ κ --AUTHENTICATE is used to supply the content The host can perform self-authentication on this engine, so as to establish this engine for ^

583568 五、發明說明(82) — 個主機的信任,藉以進行C 〇 n t e n t K e y數位權利管理 (CKDRM )方法的利用。因此,這個主機便會在一個命令 封包中傳送其Con tent Key數位權利管理(CKDRm )憑證, 且這個引擎亦會利用這個安全對話的對話金鑰以進回 應。 CKCMD —GET —CERTIF I CATE這個命令乃是讓供應内容的這 個主機能夠鑑別這個引擎,藉以建立這個主機對於這個引 擎的信任,藉以進行内容的傳送動作。隨後,這個引擎便 會在貧料轉移程序中將自己數位權利管理 (CKDRM)憑證傳送出去。 CKCMD—CREATE—FILE這個命令乃是用來產生一個新的 ContentKey數位權利管理(,CKDRM )檔案。特別是,這個 主機乃是用來指定轉移内容的這個記錄對話金鑰,並且, 這,内容亦可以利用CKCMD —REC〇RD —AppEND這個命令, 由這個主機轉移至這個引擎。 這個主機所傳送的命令封包包括有基本的檔案系 統(DFS)元件(包括有:目錄結構中的位置及檔案名稱 ),其可以在這個命令封包中明白地指定。這個命令封包 更可以明白地指定c〇ntentKey數位權利管理規 則及個廢止表列。在本發明的一個實施例中,這個命令 f其餘部分可以包括有一個檔案的其他物件,其可以 。又疋:、預设值且可以利用DataPlay檔案系統(dfs )命令 力:以凋整。在本發明的一個實施例中,這個接收的内容乃 疋附加在這個檔案的末端。 583568 五、發明說明(83) 由一個主機的觀點,這個記錄函數的動作乃是參考第丨5圖 =以况明。在方塊1 5 1 0中,一個主機應用程式乃是用來決 定欲匯入ContentKey數位權利管理(CKDRM )的檔案及其 目錄路徑。在方塊1 52 0中,這個主機乃是用來決定這個欲 產生指案的屬性’其包括有:目錄路徑、槽案名稱、屬 性、多功此網際網路郵件延伸(Μ I Μ E )類型、[0 n t e n t K e y 數位權利管理(CKDRM)許可、廢止表列 '、許可的 (:〇1^6111:1^;^數位權利管理((:〇1^)複製、及許可的數位 權利管理(DRM )複製。在方塊丨54〇中,這個主機乃是用 來決定這個目的地目錄的DataPlay檔案系統(DFS )處 置。 在方塊1560中,這個主機乃是用來發佈CKCMD 一 AUTHENTICATE這個命令,藉以在這個主機及這個引擎間啟 始一個安全對話。在此,憑證乃是設定為這個主機的583568 V. Description of the invention (82)-Trust of a host computer for the use of the C ot n Ke Ke Digital Digital Rights Management (CKDRM) method. Therefore, the host will send its Content Key Digital Rights Management (CKDRm) certificate in a command packet, and the engine will also use the session key of this secure session to respond. CKCMD —GET —CERTIF I CATE This command enables the host that provides content to identify the engine, so as to establish the host's trust in the engine, so as to perform the content transmission action. The engine then transmits its digital rights management (CKDRM) credentials during the lean transfer process. The CKCMD_CREATE_FILE command is used to generate a new ContentKey Digital Rights Management (, CKDRM) file. In particular, this host is used to specify the record dialogue key for transferring content, and this content can also be transferred from this host to this engine using the command CCKMD —REC〇RD —AppEND. The command packet sent by this host includes basic file system (DFS) components (including: the location in the directory structure and the file name), which can be explicitly specified in this command packet. This command packet can clearly specify the connKeyKey digital rights management rules and an abolition list. In one embodiment of the present invention, the rest of this command f may include other objects of a file, which may be. Also 疋:, the default value and can use the DataPlay file system (dfs) command Force: to trim. In one embodiment of the invention, the received content is appended to the end of the file. 583568 V. Description of the invention (83) From the perspective of a host, the action of this recording function is referred to Figure 5 = to explain. In block 1510, a host application is used to determine the files and their directory paths to be imported into ContentKey Digital Rights Management (CKDRM). In block 1 52 0, this host is used to determine the attributes of the plan to be generated. It includes: directory path, slot name, attributes, multi-functional Internet mail extension (Μ I Μ E) type , [0 ntent Key Digital Rights Management (CKDRM) License, Revocation List ', Licensed (: 〇1 ^ 6111: 1 ^; ^ Digital Rights Management ((: 〇1 ^) Copy, and Licensed Digital Rights Management (DRM) copy. In block 丨 54, this host is used to determine the DataPlay file system (DFS) disposal of this destination directory. In block 1560, this host is used to issue the CKCMD AUTHENTICATE command, In order to initiate a secure conversation between this host and this engine, the credentials are set to this host

Con tent Key數位權利管理(CKDRM )憑證。在方塊15 70 中,這個引擎乃是用來返回這個安全對話金錄,即: ESessionKey欄位。在方塊1 580中,這個主機乃是用來發 佈CKCMD—GET—CERTIFICATE這個命令,藉以鑑別這個引 擎。在此’憑證乃是設定為這個引擎的C〇ntentKey數位權 利管理(CKDRM )憑證。在方塊1 5 9 0中,這個主機乃是用 來確認這個引擎、並擷取其公開金餘。在方塊1592中,這 個主機乃是利用CKCMD—CREATE—FILE這個命令,藉以產 生這個目的地檔案。 在本發明的一個實施例中,這個產生的目的地檔案包括Content Key Digital Rights Management (CKDRM) certificate. In block 15 70, the engine is used to return this secure conversation record, namely: the ESessionKey field. In block 1 580, the host is used to issue the CCKMD_GET_CERTIFICATE command to authenticate the engine. Here, the 'certificate' is a ContentKey digital rights management (CKDRM) credential set for this engine. In block 1590, the host is used to confirm the engine and retrieve its public balance. In block 1592, the host uses the CCKMD_CREATE_FILE command to generate the destination file. In one embodiment of the invention, this generated destination file includes

583568 五、發明說明(84) 有·控制這個檔案利用的資料。舉例來說,這個資料係選 擇性地包括有下列資訊,諸如:這個目的地目錄的處置、 這個廢止表列的長度、這個編碼的Con tent Key數位權利管 理(CKDRM )許可及屬性、這些許可的c〇ntentKey數位權 利官理(CKDRM )複製、這些許可的數位權利管理(dRm ) 複製、這些加密的安全對話金鑰、以及這個引擎為CKCME) —_AUTHENTICATE這個命令所返回的這個ESessionKey數 值。其他的資料則可以包括:這個主機所選擇的加密記錄 對話金鑰、這個主機為這個廢止表列資料所計算的訊息鑑 別碼、這個主機為這個命令封包所計算的訊息鑑別碼、這 個編碼為一個DFSNΑΜΕ資料類型的檔案名稱、以及關連這 個檔案的廢止資料。 在方塊1 594中,這個主機乃是用來發佈一個dfSCMD — GET HANDLE命令,藉以擷取這個新產生檔案的處置。在方 塊1 596中,這個主機乃是用來將這些屬性及多功能網際網 路郵件延伸(MIME )類型設定為正確的狀態。在方塊1598 中,這個主機乃是利用一個或更多個CKCMD —RECORD — APPEND命令,藉以將内容寫入這個檔案。CKCMD —RECORD —APPEND這個命令乃是用來表示下列攔位,其包括有: RecordOpt ion欄位,其可以用來確認RECORD —FOREVER欄 位、RecordFile欄位,其乃是這個欲寫入檔案的DataPlay 檔案系統(DFS )處置及這個引擎為先前CKCMD—CREATE — FILE這個命令所返回的處置欄位、ByteCount欄位,其乃 是在這個檔案中的位元組數目(若在Record選項中確認583568 V. Description of Invention (84) There are materials that control the use of this file. For example, this data optionally includes the following information, such as: the disposition of the destination directory, the length of the revocation list, the coded Content Key Digital Rights Management (CKDRM) licenses and attributes, c〇ntentKey Digital Rights Management (CKDRM) copy, these licensed Digital Rights Management (dRm) copies, these encrypted secure session keys, and the engine is CKCME) — the value of this ESessionKey returned by the command _AUTHENTICATE. Other data may include: the encryption record conversation key selected by the host, the message authentication code calculated by the host for the revocation list data, the message authentication code calculated by the host for the command packet, and the code as a The file name of the DFSNΑΜΕ data type and the revocation data associated with this file. In block 1 594, this host is used to issue a dfSCMD — GET HANDLE command to retrieve the disposal of this newly generated file. In block 1 596, the host is used to set these attributes and the MIME type to the correct state. In block 1598, the host uses one or more CCKMD —RECORD — APPEND commands to write the content to the file. CKCMD —RECORD —APPEND This command is used to indicate the following blocks, including: RecordOpt ion field, which can be used to confirm the RECORD —FOREVER field, RecordFile field, which is the DataPlay to be written to the file File system (DFS) processing and the engine is the disposal field and ByteCount field returned by the previous CCKMD_CREATE_FILE command, which is the number of bytes in this file (if confirmed in the Record option

第90頁 583568Page 583568

RECORD 一 FOREVER欄位,則ByteCount攔位便可以是任何數 值)、ESessionKey欄位,其乃是這個加密的安全對話金 鑰,並且與這個引擎為CKCMD—AUTHENTICATE這個命令所 返回的那個ESessionKey數值具有相同數值、以及 ErecordKey攔位,其乃是這個主機所選定的加密記錄對話 金鍮’且這個ErecordKey攔位乃是在CKCMD 一CREATE F I LE這個命令中由這個主機進行傳送。RECORD a FOREVER field, then the ByteCount block can be any value), ESessionKey field, which is the encrypted secure session key, and it is the same as the ESessionKey value returned by the command CKCMD-AUTHENTICATE The value, and the ErecordKey block, are the encrypted record dialogue key selected by the host, and the ErecordKey block is transmitted by the host in the CCKMD CREATE FI LE command.

在方塊1 5 9 9中,這個主機乃是在這個資料轉移程序中傳送 整個棺案。在本發明的一個實施例中,倘若使用多於一個 的CKCMD 一RECORD 一APPEND 命令,則ErecordKey 襴位便必 須永达相同’且這個資料亦必須是利用單一記錄對話金输 (其表示為單一ERecordKey數值)進行加密動作的内容。 在本發明的另一個實施例中,這個ErecordKey攔位可以隨 著各個CKCMD —RECORD —APPEND命令加以改變。In box 159, the host transmits the entire coffin in this data transfer process. In one embodiment of the present invention, if more than one CCKMD-RECORD-APPEND command is used, the ErecordKey bit must always be the same, and this data must also be used for a single record dialogue gold loss (which is expressed as a single ERecordKey Value) The contents of the encryption operation. In another embodiment of the present invention, the ErecordKey block can be changed with each CCKMD_RECORD_APPEND command.

ContentKey數位權利管理(CKDRM)播放 ContentKey數位權利管理(CKDRM)播放函數乃是一種播 放内容的方法,其中,這個内容乃是由ContentKey數位權 利管理(CKDRM )進行管理。如第1 6圖所示,一個來源乃 是在這個ContentKey數位權利管理(CKDRM)領域内部的 管理内容。根據本發明,這個來源檔案必須解除鎖定、並 且具有ContentKey數位權利管理(CKDRM)播放許可。這 個目的地則是扮演一個播放器的一個主機。 根據第1 6圖所示的協定,這個c 〇 n t e n t K e y數位權利管理 (CKDRM)播放協疋首先要在一個弓丨擎及一個主機間建立ContentKey Digital Rights Management (CKDRM) playback The ContentKey Digital Rights Management (CKDRM) playback function is a method of playing content, where this content is managed by the ContentKey Digital Rights Management (CKDRM). As shown in Figure 16, one source is managing content within this ContentKey Digital Rights Management (CKDRM) area. According to the invention, this source file must be unlocked and have a ContentKey Digital Rights Management (CKDRM) playback license. This destination is a host that acts as a player. According to the agreement shown in Fig. 16, the c o n t e n t K ey digital rights management (CKDRM) playback protocol must first be established between a host and a host.

583568 五、發明說明(86) 一個安全的對話。根據本發明的一個範例,這個 ContentKey數位權利管理(c〇RM)播放方法乃是一個安 全的應用程式界面(API ),且僅僅能夠對具有 ContentKey數位權利管理(CKDRM)播放許;^的主機進行 揭露。這個ContentKey數位權利管理(CKDRM)播放協定 乃是利用下列命令以完成,其包括有·· CKCMD — AUTHENTICATE、CKCMD—GET—CKDRM 一 PLAY—KEY、以及 CKCMD一PLAY 。 — —583568 V. Description of Invention (86) A secure conversation. According to an example of the present invention, the ContentKey digital rights management (cRM) playback method is a secure application programming interface (API), and can only be performed on a host with ContentKey digital rights management (CKDRM) playback permission Expose. The ContentKey Digital Rights Management (CKDRM) playback agreement is completed using the following commands, which include: CKCMD — AUTHENTICATE, CKCMD — GET — CKDRM — PLAY — KEY, and CKCMD — PLAY. — —

在方塊1610中,這個方法首先開始於CKCM1) — AUTHENTICATE這個命令,其乃是用來讓這個主機播放器能 夠對這個引擎進行自我鑑別程序,藉以建立這個引擎對於 這個目的地的信任,藉以進行c〇ntentKey數位權利管理 (CKDRM)方法的利用。在方塊1620中,這個主機乃是用 來在這個命令封包中傳送數位權利管理 (CKDRM )憑證。隨後,這個引擎便可以利用這個安全對 話的對話金錄以進行回應。 接著,在方塊 1 640 中,CKCMD—GET 一 CKDRM—PLAY 一 KEY 這 個命令乃是讓這些Con tent Key數位權利管理(CKDRM )播In block 1610, the method first starts with CKCM1) — the AUTHENTICATE command, which is used to enable the host player to perform self-authentication on the engine, thereby establishing the engine's trust in the destination, and performing 〇 Use of the tentKey Digital Digital Rights Management (CKDRM) method. In block 1620, the host is used to transmit digital rights management (CKDRM) credentials in the command packet. The engine can then use this conversational record of secure conversations to respond. Then, in block 1 640, the command CCKMD_GET_CKDRM_PLAY_KEY is to make these Conttent Key Digital Rights Management (CKDRM) broadcasts

放許可能夠進行檢查動作。在方塊1 650中,建立這個播放 對話,並且返回一個特定檔案的這個播放對話金鑰。在方 塊1660中,CKCMD —PLAY這個命令乃是用來讓這個引擎能 夠返回這個特定檔案的内容。 第17圖乃是用來介紹一種更詳細的播放方法,其係利用先 鈿所述的那些命令。在方塊171〇中,一個播放器首先決定The release permission enables inspection operations. In block 1 650, the playback session is established and the playback session key for a particular file is returned. In block 1660, the CCKMD-PLAY command is used to enable the engine to return the contents of this particular file. Figure 17 is used to introduce a more detailed playback method, which uses the commands described above. In block 1710, a player first decides

第92頁 583568 五、發明說明(87) 名人播放的播案。一個使用者可以會將來源媒體插入這個引 擎中’並且’這個主機會在方塊1 7 20中發佈一個CKC〇 — AUTHENTICATE命令’藉以在這個引擎及這個主機間啟始一 個安全對話。在方塊1 7 2 0中,這個憑證亦同時設定為這個 主機的Content Key數位權利管理(CKDRM )憑證。在方塊 1740中,這個引擎乃是用來返回這個安全對話金鑰,即: E S e s s i ο η K e y 欄位。 在方塊1750中,這個主機乃是用來發佈一個ckco GET CKDRM —PLAY 一KEY命令’藉以建立一個播放對話、並且取 得這個播案的播放對話金鑰。這個ESessionKey乃是這個 加密的安全對話金錄,並且會與這個引擎為 AUTHENTICATE所返回的ESessionKey數值具有相同的數 值。在這個方塊1760中,這個引擎乃是用來返回這個播放 對話金鑰,即·· ESessionKey欄位。在方塊1 770中,這個 主機乃是用來發佈一個或更多個CKCMD —PLAY命令,藉以 擷取對應的内容。對應於這些命令,這個引擎便可以在方 塊1780中返回這些内容。 在本發明的一個實施例中,CKCMD —PLAY這個命令乃是用 來說明:這些内容係進行擷取動作,並且不會因為無法回 復的錯誤而停止擷取動作。特別是,在本發明的一個實施 例中,一個PlayOptions欄位會在確認PLAY—STREAMING後 加以設定,其乃是用來執行串列播放、並且不會因為某個 播放錯誤而停止下來。另外,當確認PLAY —TO —EOF這個 命令後,這個内容便會持續播放至檔案結尾,完全忽略Page 92 583568 V. Description of the invention (87) Announcement broadcast by celebrities. A user can insert source media into this engine 'and' this host will issue a CKC0-AUTHENTICATE command 'in block 1 7 20 to initiate a secure conversation between this engine and this host. In block 1720, this certificate is also set as the Content Key Digital Rights Management (CKDRM) certificate of this host. In block 1740, the engine is used to return the secure conversation key, which is: E S e s s i ο η K e y field. In block 1750, the host is used to issue a ckco GET CKDRM-PLAY-KEY command 'to establish a playback session and obtain the playback session key for this broadcast. The ESessionKey is the encrypted secure conversation record and will have the same value as the ESessionKey value returned by the engine for AUTHENTICATE. In this block 1760, the engine is used to return the playback session key, which is the ESessionKey field. In block 1 770, this host is used to issue one or more CCKMD-PLAY commands to retrieve the corresponding content. Corresponding to these commands, the engine can return these contents in block 1780. In one embodiment of the present invention, the command CKCMD-PLAY is used to explain that these contents are for retrieving actions and do not stop the retrieving actions due to irreversible errors. In particular, in one embodiment of the present invention, a PlayOptions field is set after confirming PLAY_STREAMING, which is used to perform serial playback and does not stop due to a certain playback error. In addition, after confirming the PLAY —TO —EOF command, this content will continue to play to the end of the file, completely ignored

583568 五、發明說明(88)583568 V. Description of Invention (88)

ByteCount這個欄位。ByteCount.

這些播放命令的ContentKey數位權利管理(CKDRM)乃是 配合這個DataPlay檔案系統(DFS)的應用程式界面(API )以進行動作。舉例來說,P1 ay F i丨e這個命令乃是一個 D a t a P 1 a y槽案系統(d f S )命令,其係設定以指定欲播放 播案的DataPlay檔案系統(DFS )處置。誠如這個 ContentKey數位權利管理(CKDRM)所執行的其他方法, 這個播放函數ESessionKey乃是加密的安全對話金錄,並 且與這個引擎為CKCMD—AUTHENTIC ATE所返回的那個 ESessionKey數值具有相同的數值。其他有用的資料攔位 則包括有:ByteOf f set欄位,其乃是設定為零,藉以自標 案的起點開始播放、以及By teCount欄位,其可以設定為 這個主機冀望接收的位元組數目。The ContentKey Digital Rights Management (CKDRM) of these playback commands cooperates with the Application Programming Interface (API) of the DataPlay File System (DFS) to perform actions. For example, the P1 ay F i 丨 e command is a D a t a P 1 a y slot system (d f S) command, which is set to specify the DataPlay file system (DFS) to play the broadcast. Just like the other methods implemented by the ContentKey Digital Rights Management (CKDRM), the playback function ESessionKey is an encrypted secure conversation record and has the same value as the ESessionKey value returned by this engine for CKCMD-AUTHENTIC ATE. Other useful data blocks include: the ByteOf f set field, which is set to zero, to start playback from the beginning of the bid, and the By teCount field, which can be set to the bytes that the host desires to receive number.

ContentKey數位權利管理(CKDRM)解除鎖定 第18圖乃是用來介紹這個ContentKey數位權利管理 (CKDRM)所執行的另一種方法。ContentKey數位權利管 理(CKDRM)解除鎖定乃是將一個ContentKey數位權利管 理(CKDRM )檔案由鎖定狀態改變為解除鎖定狀態的一種 方法。等這個方法成功完成後,這個目標檔案便會進行解 除鎖定的動作。否則,這些許可及元資料便不會加以改 變 〇 第18圖乃是用來介紹c〇ntentKey數位權利管理(CKDRM ) 解除鎖定的協定。在這個協定中使用的命令包括有·· CKCMD一AUTHENTICATE 、CKCMD一GET一CERTIFICATE 、及ContentKey Digital Rights Management (CKDRM) unlocking Figure 18 is another way to introduce this ContentKey Digital Rights Management (CKDRM) implementation. ContentKey Digital Rights Management (CKDRM) unlocking is a method to change a ContentKey Digital Rights Management (CKDRM) file from a locked state to an unlocked state. After this method is successfully completed, the target file will be unlocked. Otherwise, these licenses and metadata will not be changed. Figure 18 is used to introduce the contract key unlocking agreement (CKDRM). The commands used in this protocol include: CKCMD_AUTHENTICATE, CKCMD_GET_CERTIFICATE, and

583568583568

個解除鎖定函數所需要的資料 個主機間存在一個安全對話。 權利管理(CKDRM )解除鎖定 用程式界面(API ),並且僅 位權利管理(CKDRM )解除鎖 CKCMD 一 UNLOCK—FILES。這 保全會要求在一個引擎及一 如此,這個C ο n t e n t K e y數位 方法便可以是一個安全的應 僅能夠對具有C ο n t e η 1: K e y數 定許可的主機進行揭露。 待這個主機在方塊I 860中決定欲解除鎖定的檔案後,這個 主機便可以在方塊1 862中以一個表列方式取得這些鎖定檔 案的處置。在本發明的一個實施例中,這個表列乃是料^ 搜尋這個目錄結構、並留意具有鎖定檔案屬性的所有^ 案,而加以取得。在本發明的另一個實施例中,這個關連 格式^可以用來指定鎖定的内容及與供應套裝軟體有關的 在方塊1 864中,這個主機應用程式乃是用來發佈CKCMD — AUTHENTICATE這個命令,藉以對這個引擎進行自我鑑別一程 序三並開始一個安全對話。在此,憑證乃是設定為一個情 報父換所伺服|§的(:〇1^6111:1(67數位權利管理((;|(01^)憑 证。在方塊1866中,這個引擎乃是用來返回這個安全對話 金鑰’即:E S e s s i ο η K e y攔位。 在方塊1686中,這個主機乃是用來發佈CKCMD —GET 一 CERT I F I CATE這個命令,藉以鑑別這個引擎。在此,憑證 乃是設定為這個引擎的Content Key數位權利管理(CKDRM )憑證。在方塊1 8 7 0中,這個主機乃是用來癌認這個引 擎、並擷取其公開金鑰。接著,在方塊1 872中,CKCM])Information required for unlocking functions There is a secure conversation between hosts. Rights management (CKDRM) unlocking Program interface (API), and only rights management (CKDRM) unlocking CKCMD UNLOCK_FILES. This security conference requires that on one engine and one such, the C ο n t e n t Ke e y digital method can be a secure application. Only hosts with C ο n t e η 1: K e y number licenses can be disclosed. After the host decides the files to be unlocked in block I 860, the host can obtain the disposal of these locked files in a list manner in block 1 862. In one embodiment of the present invention, the list is obtained by searching the directory structure and paying attention to all the cases with locked file attributes. In another embodiment of the present invention, the related format ^ can be used to specify locked content and related to the provisioning software package. In block 1 864, the host application is used to issue the CKCMD-AUTHENTICATE command, whereby Perform self-authentication on the engine, process three, and begin a secure conversation. Here, the credential is set as an intelligence parent exchange server | § (: 〇1 ^ 6111: 1 (67 digital rights management ((; | (01 ^) credential. In block 1866, the engine is It is used to return this secure conversation key ', ie: ES essi ο η Ke ey. In block 1686, the host is used to issue the command CKCMD-GET-CERT IFI CATE to identify the engine. Here, The certificate is set as the Content Key Digital Rights Management (CKDRM) certificate of the engine. In box 1870, the host is used to recognize the engine and retrieve its public key. Then, in box 1 872, CKCM])

第95頁 583568 五、發明說明(90) UNLOCK —F ILES這個命令乃疋用來讓這個主機能夠指定欲 解除鎖定的檔案。欲解除鎖定的檔案數目乃是在資料轉移 時、在一個FileCount攔位中加以指定。這些1 欠解除鎖定 的檔案的DataPlay檔案系統(DFS)處置乃是在資料轉移 時,在這個Fi leSet陣列的Handle攔位中加以指定。在方 塊1874中’這個引擎乃是用來調整這些檔案的[〇以屬性, 其中,這些檔案乃是利用Fi leSet攔位加以指$。 在這種解除鎖定方法有用的其他資料則包括有下列搁位··Page 95 583568 V. Description of the invention (90) UNLOCK —F ILES This command is used to allow this host to specify the file to be unlocked. The number of files to be unlocked is specified in a FileCount stop during data transfer. The DataPlay File System (DFS) disposal of these 1 unlocked files is specified in the Handle block of this FleSet array during data transfer. In block 1874, the engine is used to adjust the properties of these files. Among them, these files are referred to by using the FiLeSet block. Other information useful in this unlocking method includes the following shelves ...

Fi leCount欄位,其乃是設定為欲解除鎖定的槽案數目、Fi leCount field, which is set to the number of slot cases to be unlocked,

EunlockKey欄位,其乃是金鑰補數的加密及解密動作所兩 要的加密解除鎖定金鑰、Emediald攔位,复“ π疋個目的 地媒體的加密媒體識別碼及公開媒體識別碼、F丨1 e $ e t _ 位’其乃是設定為欲解除鎖定的樓案的識別碼表列勺 括:各個實體中檔案的DataPlay檔案系統(DFs )處置i )、以及EkeyComplement欄位,其乃是加密的金输補數 (其中,這個金鑰補數乃是來自適當的資料座、 > 午J 。运個解 除鎖定的金鑰乃是用來對金鑰補數數值進行加密動作。 外,DataMac這個攔位乃是設定為這個資料封句由 另 'fileSet 攔位的雜湊函數。The EunlockKey field, which is the encryption and unlocking key required for the encryption and decryption of the complement of the key, the Emediald block, and the encrypted media identification code and public media identification code of the destination media, F丨 1 e $ et _ bit 'This is the list of identification codes of the building case to be unlocked: DataPlay file system (DFs) disposal of files in each entity i), and EkeyComplement field, which is Encrypted Golden Loss Complement (where the key complement is from the appropriate data base, > noon J. This unlocked key is used to encrypt the key complement value. In addition, DataMac's block is a hash function that sets this data envelope to another 'fileSet' block.

最後,在方塊1876中,這個主機應用程式乃是難 〜稽耆取得欲 解除鎖定的檔案狀態,藉以檢查這個交易是否成功。 第三者數位權利管理(TPDRM )複製 第三者數位權利管理(TPDRM )複製乃是傳送這個 ContentKey數位權利管理(CKDRM)領域的管理内容的一Finally, in block 1876, the host application is difficult. Ji Jiu obtains the status of the file that he wants to unlock to check whether the transaction is successful. Third-Party Digital Rights Management (TPDRM) Copy Third-party Digital Rights Management (TPDRM) copy is one of the transfer of management content in the ContentKey Digital Rights Management (CKDRM) field

第96頁 583568 五、發明說明(91)Page 96 583568 V. Description of the invention (91)

種方法。這個來源乃是在這個Con ten tKey數位權利管理 (CKDRM )領域内部的管理内容。這個源播案必須進行解 除鎖定動作、並且必須具有第三者數位權利管理(TPDRM )複製許可。這些第三者數位權利管理(TPDRM )複製許 可,根據本發明的一個實施例,包括有:一個不是零的第 三者數位權利管理(TPDRM )複製計數數值、一個第三者 數位權利管理(TPDRM )的自由複製狀態、或一個沒有限 制的第一代第三者數位權利管理(TPDRM )複製狀態。這 個目的地乃是一個第三者數位權利管理(TPDRM )的領 域。並且,這個得到的複製乃是利用這個目的地第三者數 位權利管理(TPDRM )所管理的管理内容。在本發明的一 個範例中,這個來源檔案的保留第三者數位權利管理 (TPDRM )複製計數將會在CKCMD—GET—DRM—COPY這個命 令期間加以遞減,倘若有需要的話。Methods. This source is the management content within the Con ten tKey Digital Rights Management (CKDRM) field. This source broadcast must be unlocked and must have a third party digital rights management (TPDRM) copy license. These third party digital rights management (TPDRM) copy licenses, according to an embodiment of the present invention, include: a non-zero third party digital rights management (TPDRM) copy count value, and a third party digital rights management (TPDRM) ) Free copy status, or an unlimited first-generation third-party digital rights management (TPDRM) copy status. This destination is an area of third party digital rights management (TPDRM). And, the obtained copy is the management content managed by the third party digital rights management (TPDRM) of this destination. In one example of the present invention, the reserve third party digital rights management (TPDRM) copy count of this source file will be decremented during the CCKMD_GET_DRM_COPY command, if necessary.

第1 9圖乃是用來介紹這種第三者數位權利管理(TPDRM ) 複製協定。與先前所述的其他方法相同,這種第三者數位 權利管理(TPDRM )複製必須一個引擎及一個主機間建立 一個安全對話。如此,這種第三者數位權利管理(TpDRM )複製方法便可以成為一個安全的應用程式界面(Ap!Figure 19 is used to introduce this third party digital rights management (TPDRM) replication agreement. As with other methods previously described, this third-party digital rights management (TPDRM) replication requires a secure conversation between an engine and a host. In this way, this third-party digital rights management (TpDRM) replication method can become a secure application program interface (Ap!

)、並且僅僅能夠對具有數位權利管理(DRM )複製許可 的主機進行揭露。數位權利管理(DRM )的複製許可乃是 利用下列命令,其包括有·· CKCMD—AUTHENTICATE、CKCMD 〜GET—METADATA、CKCMD—GET 一 DRM—COPY、及 CKCMD — PLAY。 一 — — 583568 五、發明說明(92) " -- ,方塊1910中,CKCMD—AUTHENTICATE這個命令乃是用來 讓這種第二者數位權利管理()能夠對這個引擎進 =自我鑑別程序,藉以建立這個引擎對於這個第三者數位 權=管理(TPDRM)的信任,藉以進行c〇ntentKey數位權 利了理(CKDRM )方法的利用。在方塊192〇中,這個主機 乃是在這個命令封包中,傳送這個第三者數位權利管理 (丁?])1^)的(:〇1^6111:1^¥數位權利管理((::1(1)1^)憑證。在 方塊1 930中,這個引擎乃是利用這個安全對話的對話金鑰 以進行回應。), And can only expose hosts with digital rights management (DRM) copy permissions. Digital Rights Management (DRM) copy permission is to use the following commands, which include: CKCMD_AUTHENTICATE, CKCMD ~ GET_METADATA, CKCMD_GET_DRM_COPY, and CKCMD_PLAY. One — 583568 5. Invention description (92) "-In block 1910, the command CCKMD_AUTHENTICATE is used to enable this second party digital rights management () to enter this engine = self-authentication program, Based on this engine's trust in this third party digital rights = management (TPDRM), the use of the ConntentKey digital rights management (CKDRM) method is performed. In block 1920, the host transmits the third-party digital rights management (ding?]) 1 ^) (: 〇1 ^ 6111: 1 ^ ¥ digital rights management ((:: 1 (1) 1 ^) certificate. In block 1 930, the engine responds with the session key of the secure session.

,方塊1 940中,CKCMD 一 GET—METADATA這個命令乃是用來 $這個第三者數位權利管理(TPDRM)能夠擷取與欲播放 棺案關連安全元資料。在方塊195〇中,這個引擎乃是用來 返回一個金鑰,藉以對這個元資料進行解密動作。另外, 這個引擎亦會在方塊195〇中返回這個加密的元資料。 在方塊1 960中,CKCMD—GET —DRM —COPY這個命令乃是用In block 1 940, the CCKMD_GET_METADATA command is used to $ This third party digital rights management (TPDRM) can retrieve security metadata related to the coffin to be played. In block 1950, the engine is used to return a key to decrypt the metadata. In addition, the engine will also return the encrypted metadata in block 1950. In block 1 960, the command CCKMD—GET —DRM —COPY is used

$讓這個引擎能夠檢查第三者數位權利管理(TpDRM )複 製卉可、建立這個播放對話、以及返回一個特定檔案的這 個播放對話金鑰及廢止表列。在方塊丨97〇中,— COPY —Count這個命令乃是用來遞減這個檔案的數值,倘 若有需要的話。在方塊1980中,CKCMD—PLAY這個命令乃 是用來讓這個引擎能夠返回這個特定檔案的内容。 第20圖乃是用來介紹這種第三者數位權利管理(TpDRM ) 複製的一種範例方法。如圖中所示,這種第三者數位權利 官理(TPDRM )應用程式乃是用來決定欲複製的檔案組。$ Allows this engine to check the third party digital rights management (TpDRM) copy, create the playback session, and return the playback session key and revocation list for a specific file. In box 丨 97, the command — COPY —Count is used to decrement the value of this file, if necessary. In block 1980, the CCKMD-PLAY command was used to enable the engine to return the contents of this particular file. Figure 20 is an example method used to introduce this third party digital rights management (TpDRM) copy. As shown in the figure, this third-party digital rights management (TPDRM) application is used to determine the set of files to be copied.

第98頁 583568 五、發明說明(93)Page 98 583568 V. Description of the invention (93)

在方塊2 0 1 0中’ 一個使用者首先將這個來源媒體插入這個 引擎中。在方塊2020中,這個主機乃是用來發佈一個 CKCMD—AUTHENTICATE命令,藉以在這個引擎及這個主機 間建立一個安全對話。這個憑證乃是設定為這個第三者數 位權利管理(TPDRM)的ContentKey數位權利管理(c〇RM )憑證。在方塊2030中,這個引擎乃是用來返回這個安全 對話金鑰,即:ESessionKey欄位。在本發明的一個範例 中’這個主機第三者數位權利管理(T p j) r μ )的 ContentKey數位權利管理(CKDRM)憑證亦包括有一個 Metadataldentifier欄位。 在方塊2040中’這個主機乃是用來發佈一個ckcmd GET Μ E T A D A T A命令’藉以擷取這個第三者數位權利管理 (TPDRM )的安全元資料’其係關連於這個棺案。這個 AssociatedFile欄位乃是設定為這個關連樓案(即:欲複 製標案)的DataPlay檔案系統(DFS )處置。ESessionKey 欄位乃是這個加密的安全對話金鑰,並且與這個引擎為 CKCMD 一 AUTHENTICATE所返回的那個ESessi⑽Key攔位具有In box 2 10 'a user first inserts the source media into the engine. In block 2020, this host is used to issue a CKCMD-AUTHENTICATE command to establish a secure conversation between this engine and this host. This certificate is a ContentKey digital rights management (cRM) certificate set as the third-party digital rights management (TPDRM). In block 2030, the engine is used to return the secure session key, which is the ESessionKey field. In an example of the present invention, the content key digital rights management (CKDRM) certificate of the host third party digital rights management (T p j) r μ) also includes a Metadataldentifier field. In block 2040, 'this host is used to issue a ckcmd GET ME E T A D A T A command' to retrieve the security metadata of this third party digital rights management (TPDRM) ', which is related to this coffin case. The AssociatedFile field is set by the DataPlay file system (DFS) for this related building case (ie, the project to be copied). The ESessionKey field is the encrypted secure session key, and the ESessi⑽Key bit returned by the engine for CKCMD-AUTHENTICATE has

相同的數值。在方塊2 050中,這個引擎乃是用來返回元資 料,亦即:與AssociatedFi le這個攔位有關連、並且與 CKCMD —AUTHENTICATE這個命令中擷取憑證所指定的第三 者數位權利管理(TPDRM )有關連的元資料。 在本發明的一個範例中,這個第三者數位權利管理 (TPDRM )乃是用來實施第三者數位權利管理()的 管理規則(包括·元資料所指定的規則)、以及決定這個The same value. In block 2 050, this engine is used to return metadata, that is: associated with the AssociatedFile block, and with the third party digital rights management (TPDRM) specified by the certificate retrieved in the CKCMD-AUTHENTICATE command ) Related metadata. In an example of the present invention, the third-party digital rights management (TPDRM) is used to implement the management rules (including the rules specified by the metadata) of the third-party digital rights management () and determine this

第99頁 583568 五、發明說明(94) 括案目雨疋否具有弟二者數位權利管理(Tp⑽μ )的複製 許可。在本發明的一個實施例中,這個第三者數位權利管 理(TPDRM )絕對不能進行内容的複製動作,倘若沒有取 得複製許可的話。Page 99 583568 V. Description of the invention (94) Includes whether the project title Yu Yu has the permission to copy the digital rights management (Tp⑽μ) of the younger brother. In one embodiment of the present invention, the third party digital rights management (TPDRM) must not perform the content copying action unless a copying permission is not obtained.

在方塊2060中’這個主機乃是用來發佈一個ckcmd GET DRM —COPY命令,藉以建立這個播放對話、並取得這個檔 案的播放對話金錄。這個Sour ceFi U攔位乃是欲複製檔案 的DataPlay播案糸統(DFS)處置。在方塊207Q中,這個 引擎乃是用來返回這個播放對話金鑰(即:Esessi〇nKey 欄位)以及這個廢止表列(即欄位)。 在方塊2 0 8 0中’根據本發明的一個實施例,這個主機乃是 用來發佈一個或更多個CKCMD —PLAY命令,藉以擷取對應 的内容。這些播放命令的襴位包括有:?137〇1)1;1〇1^攔 位’其乃是在確認PLAY —STREAM I NG命令(正常播放;在 播放錯誤時停止)及確認PLAY—TO—EOF命令(播放到檔 案結尾;忽略ByteCount這個欄位)後加以設定、 P 1 a y F i 1 e攔位,其乃是設定以指定想要的槽案,其可以是 欲複製檔案的DataPlay稽案系統(DFS )處置、In block 2060, this host is used to issue a ckcmd GET DRM-COPY command to establish this playback dialog and obtain a list of playback dialogs for this file. This Sour ceFi U block is handled by the DataPlay Broadcasting System (DFS) of the file to be copied. In block 207Q, the engine is used to return the playback dialog key (ie, the EsessionKey field) and the revocation list (ie, the field). In block 2 0 0 'according to an embodiment of the present invention, the host is used to issue one or more CCKMD_PLAY commands to retrieve corresponding content. The niches of these playback commands include:? 137〇1) 1; 1〇1 ^ Blocking is to confirm the PLAY — STREAM I NG command (normal playback; stop when playback error) and confirm the PLAY — TO — EOF command (play to the end of the file; ignore ByteCount This field) is set, and the P 1 ay F i 1 e block is set to specify the desired slot. It can be handled by the DataPlay Audit System (DFS) to copy the file,

ByteOffset攔位,其可以設定為任何數值、以及 ESessionKey欄位,其乃是加密的安全對話金錄,並且與 這個引擎為CKCMD—AUTHENTICATE所返回的那個 ESessionKey攔位具有相同的數值。在方塊2090中,這個 引擎乃是用來返回對應的内容。 讀取安全元資料The ByteOffset block can be set to any value and the ESessionKey field, which is an encrypted secure conversation record, and has the same value as the ESessionKey block returned by this engine for CKCMD-AUTHENTICATE. In block 2090, the engine is used to return the corresponding content. Read secure metadata

第100頁 五、發明說明(95) 讀取安全元資料乃是一種存取内容 個ContentKey數位權利管理(CKDR去其乃疋位於這 -個第三者所擁有。在m部、亚且由 標案必須進行解除鎖定動作。=關連 檔案、亚且關連於這個安全對話所指定的主機i 、乂個Page 100 V. Description of the invention (95) Reading secure metadata is a kind of ContentKey digital rights management (CKDR is located in this-a third party owns. In part m, Asia and by the subject The case must be unlocked. = Relevant files, and related to the host i specified by this security conversation, one

誠如利用其他方法,i言棚A 刀次绝個協疋百先必須在一個引擎及一相 主機間建立一個安全對士壬。L + 、工乂 士 们 、 ^ 、、女王對活如此,廷個讀取安全元資料方 法便可忐成為一個安全的應用程式界面(Ap丨)、並且 僅能夠對具有讀取安全元資料許可的主機進行揭露。Just like using other methods, I said that A must be the first one to establish a secure security guard between an engine and a mainframe. L +, workers, ^, and the queen do the same. This method of reading secure metadata can be a secure application program interface (Ap 丨), and can only be used to have permission to read secure metadata. The host is exposed.

第21圖乃是用來介紹這種讀取安全元資料協定。這種讀取 安全元資料協定乃是利用下列命令加以執行,其包括有: CKCMD一AUTHENTICATE 、及CKCMD一GET一METADATA 。如先 前所述,CKCMD—AUTHENTICATE這個命令乃是用來讓這個 主機能夠對這個引擎進行自我鑑別程序,藉以建立這個引 擎對於這個目的地的信任,藉以進行C ο n t e n t K e y數位權利 管理(CKDRM)方法的利用。根據CKCMD—AUTHENTICATE這 個命令,這個主機便會在這個命令封包中傳送其 Con tent Key數位權利管理(CKDRM )憑證。隨後,這個引Figure 21 is used to introduce this read security metadata protocol. This read security metadata protocol is implemented using the following commands, which include: CKCMD_AUTHENTICATE, and CKCMD_GET_METADATA. As mentioned earlier, the CKCMD-AUTHENTICATE command is used to enable the host to perform a self-authentication procedure on the engine, thereby establishing the engine's trust in this destination, and performing C ο ntent K ey digital rights management (CKDRM) Use of methods. According to the CKCMD-AUTHENTICATE command, the host sends its Content Key Digital Rights Management (CKDRM) certificate in this command packet. Subsequently, this quote

擎便可以利用這個安全對話的對話金鑰進行回應動作。 CKCMD —GET —METADATA這個命令乃是用來讓這個主機能夠 讀取與這個檔案關連的那些安全元資料。根據CKCMD —GET —METADATA這個命令,這個引擎便可以返回對這個元資料 進行解密動作的一把金鑰、並且同時返回這個加密的元資 料。The engine can use the conversation key of this secure conversation to respond. CKCMD —GET —METADATA This command is used to enable the host to read the security metadata associated with this file. According to the command CKCMD —GET —METADATA, the engine can return a key for decrypting the metadata and also return the encrypted metadata.

第101頁 583568Page 583568

明參f第2 1圖’在方塊2 u 〇中,這個主機首先決定與欲讀 取兀貧料關連的檔案。因此,這個交易,在方塊212〇中, 係包括有:一個使用者料個來源媒體插人這個引擎中。Mingshen f, Figure 21 'In block 2 u 〇, the host first decides the file associated with the material to be read. Therefore, this transaction, in block 2120, includes: a user inserts a source media into the engine.

在方塊2130中,這個主機乃是用來發佈一個(:1[(^1)— AUTHENTICATE命令,藉以在這個引擎及這個主機間建立一 個安全對話。這個憑證乃是設定為這個主機的c〇ntentKey 數位權利官理(CKDRM )憑證。在方塊21 4〇中,這個引擎 乃是用來返回這個安全對話金鑰,即:ESessi〇nKey欄 位。在方塊2150中,這個主機乃是用來發佈一個以(^1)— GET —METADATA命令,藉以擷取這個主機中、與這個檔^ 關連的安全元資料。AssociatedFi le這個欄位乃是設定為 關連這些元資料的這個檔案的DataPlay檔案系統(DFS ) 處置。ESessionKey這個攔位乃是這個加密的安全對話金 鍮、並且會與這個引擎為CKCMD—AUTHENTICATE所返回的 那個ESessionKey數值具有相同的數值。在方塊216〇中, 這個引擎乃是用來返回Metadata欄位,其即是 AssociatedFi le這個攔位所指定檔案及CKCMD — AUTHENT I CATE這個命令中接收憑證所指定主機所關連的元 資料。In block 2130, this host is used to issue a (: 1 [(^ 1) —AUTHENTICATE command to establish a secure conversation between this engine and this host. This credential is set to the host's coneKey Digital Rights Authority (CKDRM) credentials. In block 21 40, the engine is used to return the secure session key, which is the ESessionKey field. In block 2150, the host is used to issue a Use the (^ 1) — GET —METADATA command to retrieve the security metadata in this host that is associated with this file ^. The AssociatedFile field is the DataPlay file system (DFS) set to the file related to these metadata ) Disposal. The block of ESessionKey is the encrypted secure conversation key and will have the same value as the ESessionKey value returned by the engine for CCKMD_AUTHENTICATE. In block 2160, the engine is used to return Metadata field, which is the file specified by the AssociatedFile block and the CCKMD — AUTHENT I CATE command specified by the receiving certificate Even the metadata off.

寫入安全元資料 這個寫入安全元資料函數乃是用來提供一種轉認内容的方 法’其中,這個内容乃是包含於這個ContentKey數位權利 管理(CKDRM )領域、並且為一個第三者所擁有。在本發 明的一個實施例中,這個關連的來源檔案必須進行解除鎖Write secure metadata This write secure metadata function is used to provide a method for recognizing content. 'This content is included in the ContentKey Digital Rights Management (CKDRM) domain and is owned by a third party. . In one embodiment of the invention, this related source file must be unlocked

第102頁 583568 五、發明說明(97) 定的動作,然而,這個關連檔案的狀態亦可能會隨著設計 要求而加以改變。這個元資料乃是關連於這個檔案、以及 關連於這個安全對話所指定的主機。 這個協定首先會在一個引擎及一個主機間建立一個安全對 話。如此,這個寫入安全元資料的方法便可以成為一個安 全的應用程式界面(API )、並且僅僅能夠對具有寫入安 全元資料許可的主機進行揭露。這個寫入安全元資料的協 定乃是利用下列命令以執行,其包括有:CKCMD _ AUTHENTICATE、CKCMD—GET—CERTIFICATE、及CKCMD — SET—METADATA ° 如先前所述,CKCMD _AUTHENT I CATE這個命令乃是用來讓 一個主機能夠對一個引擎進行自我鑑別程序,藉以建立這 個引擎對於這個目的地的信任,藉以進行Con ten t Key數位 權利管理(CKDRM )方法的利用。根據CKCMD _ AUTHENTICATE這個命令,這個主機便會在這個命令封包中 傳送其ContentKey數位權利管理(CKDRM )憑證。隨後, 這個引擎便會利用這個安全對話的對話金鑰以進行回應動 作。 CKCMD _AUTHENTI CATE這個命令乃是用來讓這個主機能夠 供應鑑別這個引擎的内容,藉以建立這個主機對於這個引 擎的信任,藉以進行内容的傳送動作。隨後,這個引擎便 會在資料轉移的過程中傳送其ContentKey數位權利管理 (CKDRM )憑證。 CKCMD —SET —METADATA這個命令乃是用來讓這個主機能夠P.102 583568 V. Description of the invention (97). However, the status of this related file may also change according to the design requirements. This metadata is associated with this file and with the host specified by this secure conversation. This protocol first establishes a secure session between an engine and a host. In this way, this method of writing secure metadata can become a secure application programming interface (API), and can only expose hosts that have permission to write secure metadata. This protocol for writing secure metadata is implemented using the following commands, including: CKCMD _ AUTHENTICATE, CKCMD_GET_CERTIFICATE, and CKCMD_SET_METADATA ° As mentioned earlier, the CKCMD _AUTHENT I CATE command is It is used to enable a host to perform a self-authentication procedure on an engine, thereby establishing the trust of this engine for this destination, and thereby using the Con Tent Key Digital Rights Management (CKDRM) method. According to the CKCMD _ AUTHENTICATE command, the host will send its ContentKey Digital Rights Management (CKDRM) certificate in this command packet. The engine then uses the conversation key of the secure conversation in response. The CKCMD _AUTHENTI CATE command is used to enable the host to supply and identify the content of the engine, so as to establish the host's trust in the engine, so as to perform the content transfer action. The engine then sends its ContentKey Digital Rights Management (CKDRM) credentials during the data transfer process. CKCMD —SET —METADATA This command is used to enable this host to

第103頁 583568 五、發明說明(98) 寫入與這個檔案有關的安全元資料。根據CKCMD —SET — METADATA這個命令,這個主機便會傳送一把用以對這個元 資料進行解密動作的金鑰、及這個加密的元資料。Page 103 583568 V. Description of Invention (98) Write security metadata related to this file. According to the command CKCMD —SET — METADATA, the host sends a key to decrypt the metadata and the encrypted metadata.

第22A圖乃是用來介紹這個寫入安全元資料方法的協定。 在方塊2210中,這個主機首先會決定與欲寫入元資料有關 的樓案。在方塊2 2 2 0中,一個使用者則會將這個目的地媒 體插入這個引擎中。在方塊2230中,這個主機乃是用來發 佈一個CKCMD _A UT HE NT I CATE命令,藉以在這個引擎及這 個主機間啟始一個安全對話。在此,這個憑證乃是設定為 這個主機的Con tent Key數位權利管理(CKDRM )憑證。在 方塊2240中,這個引擎乃是用來返回這個安全對話金鑰, 即:ESessionKey攔位。在方塊225 0中,這個主機乃是用 來發佈一個CKCMD—GET—CERTIFICATE命令,藉以對這個 引擎進行鑑別程序。在此,這個憑證乃是設定為這個引擎 的ContentKey數位權利管理(CKDRM)憑證。在方塊2260 中,這個主機則是用來確認這個引擎、並擷取其公開金 餘0 在方塊2 270中,這個主機乃是用來發佈一個CKCMI) δΕΤ -- ——Figure 22A is a protocol used to introduce this method of writing secure metadata. In block 2210, the host first determines the building case related to the metadata to be written. In block 2 2 0, a user inserts the destination media into the engine. In block 2230, the host is used to issue a CCKMD_AUT HE NT I CATE command to initiate a secure conversation between the engine and the host. Here, this certificate is set as the Conttent Key Digital Rights Management (CKDRM) certificate of this host. In block 2240, the engine is used to return the secure session key, which is the ESessionKey block. In block 2250, the host is used to issue a CCKMD_GET_CERTIFICATE command to authenticate the engine. Here, this certificate is the ContentKey Digital Rights Management (CKDRM) certificate set as the engine. In block 2260, this host is used to confirm the engine and retrieve its public balance. In block 2 270, this host is used to publish a CKCMI) δΕΤ-——

METADATA命令,藉以傳送這個主機中、與這個檔案相關的 安全元資料。Assoc i a tedFi le這個攔位乃是設定為與這個 元資料相關的那個檔案的DataPlay檔案系統(DFS )處 置。ESessionKey這個攔位乃是加密的安全對話金鑰、並 且與這個引擎為CKCMD—AUTHENTICATE所返回的那個 ESessionKey攔位具有相同的數值。Metadata這個攔位則The METADATA command is used to transmit security metadata related to this file in this host. Assoc i a tedFile This block is set to the DataPlay File System (DFS) location of the file associated with this metadata. The ESessionKey block is an encrypted secure session key and has the same value as the ESessionKey block returned by the engine for CCKMD-AUTHENTICATE. Metadata

第104頁 583568 五、發明說明(99) 是關於Assoc i atedF i 1 e這個欄位所指定的檔案、以及 CKCMD—AUTHENTICATE這個命令中接收憑證所指定的主 機。 請參考下列第4表,其乃是表示上述命令的許可。 第4A表Page 104 583568 V. Description of Invention (99) is about the file specified by the AssocatedFi 1 e field and the host specified by the receipt certificate in the command CKCMD-AUTHENTICATE. Please refer to Table 4 below for permission to the above order. Form 4A

命令目前安全對話鎖定物件主機許可物件許可註解 CKCMD_AUTHENTICATE打斷目前對話,啟始新對話無法應 用有效的CKDRM憑證無法應用CKDRM憑證簽章必須利用公開 金鑰(包括:有效簽章金鑰表列的CA公開金鑰)進行確認 CKCMD—CREATE—FILE需要無法應用CKDRM記錄母目錄: DFS寫入欲產生新檔案的目錄須具DEFENDANTS寫入許可 CKCMD_GET_CERT IF I CATE不需要無法應用無法應用CKDRM 應用程式界面的非安全命令。 CKCMD —GET —CONTENT —KEY —COPY 需要不許可CKDRM 複製 非零CK複製、CK自由複製、或無限制第一代CK複製 CKCMD—GET—CKDRM 一ID不需要無法應用無法應用CKDRM應 用程式界面的非安全命令。Order the current secure session to lock the object host permission object permission annotation Public key) Confirmation CKCMD_CREATE_FILE needs to be unable to apply CKDRM record parent directory: DFS writes the directory to generate new files must have DEFENDANTS write permission CKCMD_GET_CERT IF I CATE is not required can not be applied can not be applied can not apply CKDRM application program interface non- Security order. CKCMD —GET —CONTENT —KEY —COPY Need to disallow CKDRM to copy non-zero CK copy, CK free copy, or unlimited first generation CK copy CKCMD — GET — CKDRM One ID is not required and cannot be applied. Security order.

CKCMD—GET—CKDRM—PLAY _KEY 需要不許可CKDRM 播放 CKDRM播放,DFS讀取 CKCMD—GET—TPDRM—COPY需要不許可TPDRM複製非零 TPDRM複製、TPDRM自由複製、或無限制第一代TPDRM複製 CKCMD —GET —METADATA需要不許可讀取安全元資料檔案須 具有主機的元資料。 CKCMD _PLAY需要不許可CKDRM播放CKDRM播放或TPDRM複CKCMD — GET — CKDRM — PLAY_KEY needs to disallow CKDRM to play CKDRM playback, DFS reads CKCMD — GET — TPDRM — COPY needs to disallow TPDRM to copy non-zero TPDRM copy, TPDRM free copy, or unlimited first-generation TPDRM copy CKCMD — GET —METADATA requires permission to read secure metadata files and must have metadata from the host. CKCMD _PLAY does not allow CKDRM to play CKDRM playback or TPDRM replay

第105頁 583568 五、發明說明(100) 製,DFS讀取 CKCMD —RECORD —APPEND 需要許可CKDRM 記錄CKDRM 記錄, DFS寫入關閉DFS寫入及DFS寫入調整以拒絕進一步的記 錄。 CKCMD_SET_KEYBOX不需要不許可檔案須不具CKDRM元資 料。CKDRM應用程式界面的非安全命令。 CKCMD —SET —METADATA需要不許可寫入安全元資料 CKCMD—UNLOCK—FILES需要許可CKDRM解除鎖定檔案須具 有CKDRM元資料Page 105 583568 V. Description of the invention (100) system, DFS reads CKCMD —RECORD —APPEND CKDRM records need to be licensed CKDRM records, DFS writes off DFS writes and DFS write adjustments to reject further records. CKCMD_SET_KEYBOX does not need to be unlicensed. It must not have CKDRM metadata. Non-secure commands for the CKDRM application program interface. CKCMD —SET —METADATA requires permission to write secure metadata CKCMD—UNLOCK—FILES requires permission to unlock CKDRM files must have CKDRM metadata

請參考第4A表,下列這些命令(包括有·· RECORD _ APPEND 'PLAY、GET—DRM—PLAY—KEY > GET—DRM —Please refer to Table 4A. The following commands (including: · RECORD _ APPEND 'PLAY, GET—DRM—PLAY—KEY > GET—DRM —

COPY 'GET—CKDRM—PLAY—KEY、GET—CKDRM—COPY 及 CREATE _F ILE ),做為其協定的部分,係分別包括有一個 媒體識別碼的一種考量。一個媒體識別碼係一個獨一無二 的識別碼,其乃是在一個媒體的原片影片製作及預先錄製 過程中加以產生。根據不同的設計需求,這個獨一無二的 媒體識別碼可能是對應於一個原片影片或是各個媒體。另 一個媒體識別碼則是一個在媒體的攔位應用中產生、獨一 無二的識別碼。這個獨一無二的媒體識別碼則是對應於各 個媒體,例如··媒體碟片。在各個例子中,然而,這個媒 體識別碼均可以預先錄製在一個碟片上,籍以對應於原片 影片製作、預先錄製、或諸如此類方法所得到的内容。再 者,在各個例子中,這個媒體識別碼亦可以寫入媒體(諸COPY 'GET_CKDRM_PLAY_KEY, GET_CKDRM_COPY, and CREATE_FILE'), as part of their agreement, each includes a consideration that includes a media identification code. A media identification code is a unique identification code that is generated during the production and pre-recording of the original film of a media. According to different design requirements, this unique media identification code may correspond to an original film or each media. The other media identification code is a unique identification code generated in the media's blocking application. This unique media identification number corresponds to each media, such as a media disc. In each case, however, this media identification code can be pre-recorded on a disc, corresponding to the original film production, pre-recording, or the like. Furthermore, in each case, this media identifier can also be written into the media (various

第106頁 583568 製的媒體 錄製内容 會存在寫 乃是用來 的識別碼 )系統總 内容的預 先錄製内 預先錄製 製鎖定内 一個實施 種識別碼 用來表示 第4B表 預先錄製 預先錄製 偽造 入内容 識別碼由安全 五、發明說明(101) 如··一個碟片),藉以對應於 識別碼,因此,僅僅 所屬的媒體部分、而 入資料所屬的媒體部 提供這個安全電子内 類型。如第4B表所示 共具有四種類型的識 先錄製識別碼、寫入 容的寫入識別碼、以 的鎖定内容及隨後將 容僅會利用預先錄製 例中,這個安全電子 中的兩種類型,因此 一個偽造的碟片。 内容寫 的媒體 已寫入的内容。這個預先錄 t存在原片影片製作/預先 這個寫入媒體識別碼則僅僅 分。請參考下列第4B表,其 谷(SEC )系統中可能出現 ’這個安全電子内容(SEC 別,,其包括有:預先錄製 内容的預先錄製識別碼、預 及寫入内容的寫入識別碼。 進行解除鎖定動作的預先錄 的媒體識別碼。在本發明的 内容(SEC )系統會使用四 另外兩種類型的存在便可以 電子内容(SEC )系統利用(The recorded content of the media recording system based on 583568 on page 106 will have an identification code for writing.) The total content of the system is pre-recorded. The pre-recording system is locked. An implementation identification code is used to indicate that the 4B pre-recorded pre-recorded forged content The identification code is provided by Security V. Invention Description (101) (such as a disc), so as to correspond to the identification code. Therefore, only the media part to which the data belongs belongs, and the media department to which the input data belongs provides this secure electronic type. As shown in Table 4B, there are four types of identification first recording identification code, writing identification identification code, locked content, and subsequent recording content. Only two types in this secure electronics are used in the pre-recorded example. Type, so a forged disc. Content written by Content that has been written. This pre-recorded t exists in the original film production / pre-write. This write-in media ID is only divided. Please refer to the following table 4B. The "secure electronic content (SEC)" in the valley (SEC) system may include: a pre-recorded identification code of pre-recorded content, and a write-identification code of pre-recorded content. Pre-recorded media identification code for unlocking operation. In the content (SEC) system of the present invention, there are four other two types of existence that can be used by the electronic content (SEC) system

寫入的媒體識別碼偽造由安全電子内容(SEc)系統利用 請參考第4A表,下列這些命令(包括有:rec〇rd — APPEND、PLAY、GET—DRM—PLAY—KEY、GET—DRM"^ COPY、GET—CKDRM—PLAY—KEY、GET_C0NTE1T—KEY — COPY及CREATE —F ILE ) ’做為其協定的部分,係分別包括The written media identification code forgery is used by the secure electronic content (SEc) system. Please refer to Table 4A. The following commands (including: rec〇rd — APPEND, PLAY, GET — DRM — PLAY — KEY, GET — DRM " ^ COPY, GET_CKDRM_PLAY_KEY, GET_C0NTE1T_KEY_COPY and CREATE_F ILE) 'as part of their agreement, including

第107頁Chapter 107

JOJJOO 五、發明說明(1〇2) 有一個媒體_ -無二的識Li :1 : : f考量。一個媒體識別碼係-個獨 先錄製過程中加wf疋在一個媒體的原片影片製作及預 無二的媒體均^ 生。根據不同的設計需求,這個獨_ 體。在各個:子:可f是對f於一個原片影片或是各個媒 製在一個碑Κ μ ,、而,這個媒體識別碼均可以預先錄 先錄製、或諸U倘若這個内容是利用原片影片製作、預 此,將僅备尸少類的方法以得到。這個媒體識別碼,因 部分。社^在原片影片製作/預先錄製内容所屬的媒體 ^ (sic. 7"if4C^ 示,这彳II A入,、統可能提供的識別碼類型。如第4C表所 識別碼,ΐ:::内容(SEC)系統總共具有四種類型的 先錄製及i入-i.預先錄製、同時具有這些識別碼的預 M,丨踩。々” ·’ 70件的混合識別碼、唯寫識別碼、及偽造識 二乂四種識別碼類型的媒體類型則包括有··持有隨後 〜ί ^疋動作的預先錄製鎖定内容的媒體、僅持有解 二的疋谷的媒體、以及同時持有兩種類型的一種混合内 二Α媒體。根據一種解除鎖定的協定,當對内容進行解除 ,2 t動作時,這個内容的識別碼會預先錄製其識別碼的 =部分預先錄製、並寫入這個識別碼的另一部分。如此, 對於那些持有隨後進行解除鎖定動作的預先錄製鎖定内容 的媒體而a ,這個識別碼便可以永遠具有與其關連的一個 預先錄製識別碼。 一以 第4C表 預先錄製混合寫入偽造 第108頁 583568 五 '發明說明(103) 的媒體 的媒體是否無法得知 將進行解除鎖定動作的預先錄製鎖定内容 在購買時持有預先錄製解除鎖定内容 否 =第4B表及第22B圖,其乃是用來提供一種方法,藉JOJJOO V. Description of the Invention (10 2) There is a media _-Wu Er's knowledge of Li: 1:: f. A media identification code is a unique recording process in which wf is added to the original film production and pre-production of a media. According to different design needs, this singularity. In each: sub: can f be an original film or each media is produced in a tablet κ μ, and this media identification code can be recorded in advance and recorded, or if the content is using the original film The film making and forecasting will only be prepared by a few methods. This media identifier is due to the section. ^ In the media to which the original film production / pre-recorded content belongs (sic. 7 " if4C ^), this is the type of identification code that IIA can enter. As shown in Table 4C, ΐ ::: The content (SEC) system has a total of four types of pre-recording and i-in-i. Pre-recording, pre-M with these identification codes, 丨 step on. 々 "· 70 mixed identification codes, write-only identification codes, The four types of media types for identification and forgery identification include: media that holds pre-recorded locked content of subsequent ~ ^ 疋 actions, media that only holds Jiuya from Jie Er, and media that holds both A type of mixed internal two A media. According to an unlocking agreement, when the content is released, 2 t action, the content's identification code will be pre-recorded = part of its identification code is pre-recorded and written into this identification The other part of the code is this. For those media that holds the pre-recorded locked content that is subsequently unlocked, this identification code can always have a pre-recorded identification code associated with it. Table 4C First record the mixed write forgery, page 108 583568 5 'Invention Description (103) The media cannot know whether the pre-recorded locked content that will be unlocked will have the pre-recorded unlocked content at the time of purchase No = Table 4B And Figure 22B, which is used to provide a way to borrow

:判:内”否為偽造的。這種方法可以根據設計的需 f,在下列9令期間執行,其包括有:rec〇rd AppEND、 PLAY、GET—DRM 一 PLAY—KEY、GET—Drm c〇pY—、GET: Judgment: "Inside" is forged. This method can be executed during the following 9 orders according to the design requirements f, which include: rec〇rd AppEND, PLAY, GET-DRM-PLAY-KEY, GET-Drm c 〇pY—, GET

CKDRM__PLAY__KEY ^GET^CONTENT jeyIcOPY ^ CREATE —FILE、或任何其他命令。方塊22〇2乃是用來執行一個金 鑰盒子的查表動作。方塊2204乃是透過一個檔案,藉以擷 取攻個金鑰盒子。在本發明的一個實施例中,這個金鑰盒 子必須進行加密動作、並且連結於一個位置。在方塊22〇6 中,一個引擎乃是用來決定:根據這個命令所冀望的動 作’這個媒體識別碼是應該寫入、亦或預先錄製。在 =08中,這個金鑰盒子連結識別碼旗標會與一種金鑰盒子 碩取方法進行比較,然而,這種實施亦會取決於選定的命 令。再者’在方塊2208中,根據選定命令的這種方法亦會 與這個命令所關連的媒體識別碼進行比較、及/或是與這 個媒體識別碼所關連的識別碼旗標進行比較。倘若這個識 別碼或識別碼旗標並不是針對那些需要一個預先錄製識別 碼或旗標的識別碼所預先錄製的,則方塊221 2便可以為這 個命令的部分或全部功能提供一個廢止動作。在本發明的CKDRM__PLAY__KEY ^ GET ^ CONTENT jeyIcOPY ^ CREATE —FILE, or any other command. Block 2202 is used to perform a table lookup of a key box. Box 2204 is used to retrieve a key box through a file. In one embodiment of the invention, the key box must be encrypted and linked to a location. In block 2206, an engine is used to decide whether the action expected from this command ', the media identification code, should be written or pre-recorded. In = 08, the key box link identifier flag is compared with a key box mastering method, however, this implementation will also depend on the selected command. Furthermore, in block 2208, this method based on the selected command is also compared with the media identifier associated with the command and / or with the identifier flag associated with the media identifier. If the ID or ID flag is not pre-recorded for those that require a pre-recorded ID or flag, Block 2212 can provide an abort action for some or all of the functions of this command. In the present invention

第109頁 583568 五、發明說明(104) --------- 列中’當這個識別碼實際位於寫入内容的—個碟 ^固邻分時,一個偽造的識別碼便會在一個引擎前, ,己識別為一個預先錄製的識別碼。這個引擎所執行、 識是預先錄製亦或寫入的決定,%是取決於 ^。碼疋如何識別它自己、以及這個識別碼在媒體上 、 。因此,本發明便可以讓偽造媒體碟片無法執行全 部的功能。 下列第5表乃是用來提供Datapiay檔案系統(dfs )命令許 >、括有·預先錄製及C〇ntenfKey數位權利管理 (CKDRM )檔案所建議的狀態。 第5表 檔案類型讀取/調整寫入/調整移動/調整重新 整刪除/調整評註 ’碍 在檔案產生後、記錄完成前開/關開/開關/開關, /開在記錄時保留寫入許可 ΡΊ 在€錄完成後開/關關/關關/開關/開關/關關閉卯$ ,入及DFS寫入調整。拒絕移動、重新命令、及刪除功 能,但允許調整這些許可。 各個項目的第一個部分乃是這個以“^”檔案系統(dfs /許可屬性的狀悲,而第二個部分則是這個DataPlay梓 系統(DFS )中、屬性調整罩幕的攔位狀態。當屬性調田整、 罩幕為關閉時’許可屬性便不能進一步改變。 先前所述的ContentKey數位權利管理(CKDRM)命令乃是Page 109 583568 V. Description of the invention (104) --------- In the column 'When this identification code is actually located in the written content-a disc ^ solid neighbor, a forged identification code will be in Before an engine, has been identified as a pre-recorded identification code. The decision made by this engine, whether pre-recorded or written, depends on ^. How does the code identify itself and the identification code on the media. Therefore, the present invention can prevent the forged media disc from performing all functions. The following table 5 is used to provide the datapiay file system (dfs) command permission, including the pre-recorded and ContenfKey digital rights management (CKDRM) file suggested status. Table 5 File Type Read / Adjust Write / Adjust Move / Adjust Re-Delete / Adjust Comments On / off off / off off / on / off / on / off off after the recording is completed, $, and DFS write adjustments. The move, reorder, and delete functions are denied, but these permissions are allowed to be adjusted. The first part of each project is the status of the "^" file system (dfs / permission attribute), and the second part is the blocking status of the attribute adjustment mask in the DataPlay system (DFS). When the property is adjusted and the cover is closed, the 'permission property cannot be changed further. The ContentKey Digital Rights Management (CKDRM) command described earlier is

第110頁 583568 五、發明說明(105) 這個Con tent Key數位權利管理(CKDRM )的部分、並且會 根據下列表格進行動作: CKDRM—AUTHENTICATE :確認及認證主機鑑別性、並且建 立一個安全對話。 第6表:命令啟動 暫存器名稱數值說明 控制暫存器FUNCTION CODE =011將位元組計數指標重設為 低位元組 位元組計數暫存器CKCMD—AUTHENTICATE—SIZE命令封包 大小 控制暫存器FUNCTION—CODE =001啟動命令 丨第7表:命令封包 |位元組位移欄位名稱類型說明 ^ 0HostCmdU8 命令碼 i lCkSubCmdU8次命令碼 2 : 241 CertificateCKDRM 一CERTIFICATE 主機的CKDRM 憑證 第8表:資料轉移(由引擎至主機) 位元組位移欄位名稱類型說明 〇 ·· 3 7ESessionKeyWRAPPED 一KEY新安全對話的對話金鑰 根據本發明的一個實施例,任何主機均可以存取CKCMD — AUTHENTICATE這個命令。這個主機必須能夠傳送一個有效Page 110 583568 5. Description of the invention (105) This Conttent Key Digital Rights Management (CKDRM) part will act according to the following table: CKDRM-AUTHENTICATE: Confirm and authenticate the authenticity of the host and establish a secure dialog. Table 6: Command startup register name and numerical description Control register FUNCTION CODE = 011 Reset the byte count index to the low byte Byte count register CKCMD—AUTHENTICATE—SIZE command packet size control register FUNCTION—CODE = 001 Start command 丨 Table 7: Command packet | Byte shift field name type description ^ 0HostCmdU8 Command code l CkSubCmdU8 Command code 2: 241 CertificateCKDRM One CERTIFICATE CKDRM certificate of the host Table 8: Data transfer (From the engine to the host) Type description of the byte shift field name .. 3 7ESessionKeyWRAPPED A KEY session key for a new secure session. According to an embodiment of the present invention, any host can access the CKCMD-AUTHENTICATE command. This host must be able to transmit a valid

第111頁 583568 五、發明說明(106) ' "~Page 111 583568 V. Description of Invention (106) '" ~

的ContentKey數位權利管理(CKDRM)憑證,以確保這個 命令能夠成功。任何的目前安全對話均會便中斷。一個成 功的執行動作將會得到一個新的目前安全對話。這個命令 的參數及設定包括有:H〇stCmd設定為DPICMD —CK COMMAND、CkSubCmd 設定為CKCMD 一 AUTHENTICATE、憑證設 定為這個主機的ContentKey數位權利管理(CKDRM)憑 證、及£8638 1〇11£67乃是利用這個主機的(:〇1^6111:1^7數位 權利管理(CKDRM )憑證的協定公開金鑰以進行加密動作 的安全對話金鑰。倘若這個主機能夠攔位 正確地解密,則將會進行一個固有的鏗別動作。 誠如荼考這個引擎所執行的方法中所提到,這個鑑別命令 會使一個主機能夠將其C〇ntentKey數位權利管理(CKDRM )憑證傳送至這個引擎。這個引擎乃是用來確認及認證這 個憑證。另外,這個引擎亦可以用來擷取這些方法許可。 隨後’這個引擎便會產生一個安全對話金鑰、並且將這個 金鑰及這個主機憑證儲存起來。至此,這個主機便可以成 為這個安全對話及隨數位權利管理(CKDRM )命令的目前主機。在本發明的一個範例中,啟始這個鑑 別命令將會使所有既存的安全對話中斷。因此,一個成功 的命令僅會啟始一個新的安全對話。另外,這個 ESessionKey攔位的數值亦可以用來做為這個安全對話識 另1J碼。 CKCMD—GET 一 CERTIFICATE :轉移這個弓丨擎的 ContentKey 數位權利管理(CKDRM )憑證至這個主機。ContentKey Digital Rights Management (CKDRM) credentials to ensure the success of this command. Any current security conversation will be interrupted. A successful execution will result in a new current security conversation. The parameters and settings of this command include: H〇stCmd is set to DPICMD —CK COMMAND, CkSubCmd is set to CKCMD-AUTHENTICATE, the certificate is set to the ContentKey Digital Rights Management (CKDRM) certificate of this host, and £ 8638 1〇11 £ 67 is It is a secure conversation key that uses this host ’s (: 〇1 ^ 6111: 1 ^ 7 digital rights management (CKDRM) agreement public key to perform cryptographic actions. If this host can block the decryption correctly, it will Perform an inherently differentiating action. As mentioned in the method performed by this engine, this authentication command will enable a host to send its ConntentKey Digital Rights Management (CKDRM) credentials to this engine. This engine It is used to confirm and authenticate this certificate. In addition, the engine can also be used to retrieve these method permissions. 'The engine will then generate a secure session key and store this key and this host certificate. So far , This host can become the current host for this secure conversation and the Digital Rights Management (CKDRM) command. In an example of the invention, initiating this authentication command will interrupt all existing security conversations. Therefore, a successful command will only initiate a new security conversation. In addition, the value of the ESessionKey block can also be used to do Identify another 1J code for this secure conversation. CKCMD_GET_CERTIFICATE: Transfer the ContentKey Digital Rights Management (CKDRM) certificate of this bow to this host.

第112頁 583568 五、發明說明(107) 第9表:命令啟始 暫存器名稱數值說明 控制暫存器FUNCTION —CODE =011重設位元組計數指標至 低位元組 位元組計數暫存器CKCMD _GET _CERTIFICATE _SIZE命令 封包大小 控制暫存器FUNCTION —CODE =001啟始命令 第1 0表:命令封包 位元組位移欄位名稱類型說明 〇HostCmdU8 命令碼 lDf sSubCmdU8次命令碼 第11表:命令轉移(由引擎至主機) 位元組位移欄位名稱類型說明Page 112 583568 V. Description of the invention (107) Table 9: Command start register name and value description Control register FUNCTION —CODE = 011 Reset byte count index to low byte byte count temporary register CKCMD _GET _CERTIFICATE _SIZE command packet size control register FUNCTION —CODE = 001 start command table 1 0: Command packet byte shift field name type description HostHost CmdU8 command code lDf sSubCmdU8 subcommand code Table 11: Command Transfer (from engine to host) Byte shift field name type description

0 : 23 9Cert if icateCKDRM—CERTIFICATE 這個引擎的CKDRM 憑證 任何主機均可以對CKCMD —AUTHENTICATE這個命令進行存 取動作。 這個命令所使用的參數包括有:HostCmd,其設定為0: 23 9Cert if icateCKDRM—CERTIFICATE CKDRM credentials for this engine Any host can access the CKCMD —AUTHENTICATE command. The parameters used by this command include: HostCmd, which is set to

DPICMD—CK 一COMMAND 命令、CkSubCmd,其設定為CKCMD 一 GET —CERTIFICATE、Certificate,其亦即這個引擎的 Con tent Key 數位權利管理(CKDRM )憑證。CKCMD —GETDPICMD_CK_COMMAND command, CkSubCmd, which is set to CKCMD_GET_CERTIFICATE, Certificate, which is the Content Key Digital Rights Management (CKDRM) certificate of this engine. CKCMD —GET

第113頁 583568 五、發明說明(108) CERTIFICATE這個命令乃是用來轉移這個引擎的 Conte^itKey數位權利管理(CKDRM)憑證至這個主機,藉 乂使這们主機的憑證可以(透過Ckcmd AUTHENTICATE ) 傳送至另-個引擎,藉以在必要時,做-為 數位榷利管理(CKDRM)複製方法、記錄方法、寫入元資 料方法、及解除鎖定方法的部分。 CKCMD 一CREATE—F ILE :檢查ContentKey 數位權利管理 (CKDRM )記錄許可、在給定的目錄内產生一個新的 ContentKey數位權利管理(c〇RM )檔案物件、並且建立 一個寫入/記錄對話。 第1 2表:命令啟動 暫存器名稱數值說明 控制暫存器FUNCTION—CODE =011重設位元組計數指標為 低位元組 位元組計數暫存器CKCMD —CREATE 一FILE —SIZE —NO — NAME + n命令封包大小 控制暫存HFUNCTI ON—CODE =001啟動命令 弟1 3表:命令封包 位元組位移欄位名稱類型說明 0HostCmdU8 命令碼 lDfsSubCmdU8次命令碼 2 : 3RevocationByteCountU16在廢止表列中預期的位元組 數目Page 113 583568 V. Description of the invention (108) The CERTIFICATE command is used to transfer the Conte ^ itKey Digital Rights Management (CKDRM) certificate of this engine to this host, so that the certificates of these hosts can be made (through Ccmd AUTHENTICATE) It is transmitted to another engine so that if necessary, it is used as part of the CKDRM copying method, recording method, writing metadata method, and unlocking method. CKCMD_CREATE_F ILE: Check the ContentKey Digital Rights Management (CKDRM) record permission, generate a new ContentKey Digital Rights Management (cRM) file object in a given directory, and establish a write / record dialog. Table 12: Command Start Register Name Value Description Control Register FUNCTION_CODE = 011 Reset Byte Count Index to Low Byte Byte Count Register CKCMD —CREATE_FILE —SIZE —NO — NAME + n command packet size control temporary storage HFUNCTI ON_CODE = 001 start command brother 1 3 table: command packet byte shift field name type description 0 HostCmdU8 command code lDfsSubCmdU8 secondary command code 2: 3RevocationByteCountU16 expected in the revocation list Number of bytes

第114頁 583568 五、發明說明(109) 4 : 7ParentDFSHANDLE欲產生槽案的目錄 8 : 9CKDRMStateCKCMD_STA_TE 編碼的CKDRM 屬性及檔案 許可。請參考編碼方法。 10CKDRMCopiesU8同意的CKDRM複製數目 llDrmCopiesU8同意的DRM複製數目 12 : 15ReservedU16 〔2 〕保留 16 : 31ESes si onKey WRAPPED _KEY目對的安全對話金鑰 32 : 4 7ERecordKey WRAPPED _KEY 記錄對話金鑰 48 :67RevocationMacMAC 附加廢止表列的MAC 68 : 8 7CommandMacMAC 訊息鑑別碼 88 :n+87NameDFSNAMEn位元組的槽案名稱 第 14 表:CKDRMState 欄位(CKCMD _STATE 類型) 位元名稱說明 FILE _CKDRM _C0PY _FREELY表示這些CKDRM複製是否可以 無限制的執行 FILE—CKDRM—LOCKEDO =產生一個解除鎖定的檔案1 =產 生一個鎖定的檔案 FILE_CKDRM_PLAY表示是否同意這種CKDRM播放方法 FILE __DRM _C0PY _FREELY表示這些DRM複製是否可以無限 制的執行 FILE _UNLIMITED _FIRST _GENERATION _CK _C0PIES 表示 第一代CKDRM複製是否可以無上限的執行 FILE UNLIMITED FIRST GENERATION _DRM _C0PIES 表Page 114 583568 V. Description of the invention (109) 4: 7ParentDFSHANDLE Directory of slot case 8: 9CKDRMStateCKCMD_STA_TE Encoded CKDRM attribute and file permission. Please refer to the encoding method. 10CKDRMCopiesU8 agrees the number of CKDRM copies llDrmCopiesU8 agrees the number of DRM copies 12: 15ReservedU16 〔2〕 reserves 16: 31ESes si onKey WRAPPED _KEY security dialogue key 32: 4 7ERecordKey WRAPPED _KEY record dialogue key 48: 67RevocationMacMAC MAC 68: 8 7 CommandMacMAC Message Authentication Code 88: n + 87NameDFSNAMEn Byte Case Name Table 14: CKDRMState Field (CKCMD _STATE Type) Bit Name Description FILE _CKDRM _C0PY _FREELY indicates whether these CKDRM can be copied without restriction Execute FILE_CKDRM_LOCKEDO = Generate an unlocked file 1 = Generate a locked file FILE_CKDRM_PLAY indicates whether to agree with this CKDRM playback method FILE __DRM _C0PY _FREELY indicates whether these DRM copies can be performed without restriction FILE _UNLIMITED _FIRST _GENERATION _CK _C0PIES indicates Whether the first generation of CKDRM replication can be performed without limit FILE UNLIMITED FIRST GENERATION _DRM _C0PIES table

第115頁 583568 五、發明說明αιο) —-- 示第一代DRM複製是否可以無上限的執行 第1 5表:資料轉移(由主機至引擎) 位元組位移欄位名稱類型說明 0 : RevocationByteCount — 1廢止表列檔案的廢止表列 CKCMD—CREATE—FILE這個命令可能會要求一個目前安全 對話。因此,僅有具備Con tent Key數位權利管理(ckdrm )記錄方法許可的主機才能夠對CKCMD —CREATE F I LE這 個命令進行存取動作。parent必須指定一個具有寫入許可 的目錄。這個具有設備的命令參數係包括有:H〇stCmd, 其設定為DPICMD 一CK—COMMAND 'CkSubCmd,其設定為 CKCMD 一 CREATE 一 FILE、Rev〇cationByteCount,其即是在 這個命令的資料相中預期的位元組數目、Parent,其則是 寫入播案的目錄處置。 CKDRMState則是這個標案的c〇ntentKey數位權利管理 (CKDRM )屬性及許可。CKDRMStai:e這個欄位的成員攔位 則是利用CKDRMState攔位表格加以指定。CKDRMCopies乃 疋用來指疋這個檔案能夠執行的C 0 n ^ e n t K e y數位權利管理 (CKDRM)複製數目。這個數目乃是這個ContentKey數位 權利管理(CKDRM )複製計數數值的啟始數值。這個 ContentKey數位權利管理(CKDRM)複製方法必須要能夠 使用一個非零的數值。Page 115 583568 V. Description of the invention αιο) --- Shows whether the first-generation DRM copy can be performed without limit Table 15: Data transfer (from host to engine) Byte displacement field name type description 0: RevocationByteCount — 1 Abolition of the list file Abolition of the list CKCMD_CREATE_FILE This command may require a current security dialog. Therefore, only the host with the permission of the Conttent Key digital rights management (ckdrm) recording method can access the CKCMD-CREATE F I LE command. parent must specify a directory with write permissions. This command parameter with equipment includes: HstCmd, which is set to DPICMD_CK_COMMAND 'CkSubCmd, which is set to CKCMD_CREATE_FILE, Rev_cationByteCount, which is expected in the data phase of this command Number of bytes, Parent, which is the directory disposal written in the broadcast. CKDRMState is the contractKey Digital Rights Management (CKDRM) attribute and permission for this project. CKDRMStai: The member block of the e field is specified using the CKDRMState block table. CKDRMCopies is used to refer to the number of C 0 n ^ e n Ke y Digital Rights Management (CKDRM) copies that this file can perform. This number is the starting value of the ContentKey Digital Rights Management (CKDRM) copy count value. This ContentKey Digital Rights Management (CKDRM) replication method must be able to use a non-zero value.

第116頁 583568Page 116 583568

DrmCopies則是用來指定這個檔案所能執行的數位權利管 理(DRM )複製數目。這個數值乃是這個數位權利管理 (DRM )的複製計數數值。這個數位權利管理(⑽% )複製 方法必須要能夠使用一個非零的數值。 ESessionKey乃是目前的安全對話金鑰、並且乃是有關於 這個ContentKey數位權利管理(CKDRM)方法的c〇RM — AUTHENTICATE 命令。 — ERecordKey乃是這個檔案的記錄對話金鑰、並且乃是利用 這個引擎的公開金鑰進行加密動作。這個5:]^£〇1^1^7數值 乃是這個檔案的所有CKDRM 一RECORD —APPEND命令均必須 利用到的數值。這個數值乃是用來暗示··這個檔案的 CKCMD —RECORD —APPEND命令資料乃是利用這個記錄對話 金鑰進行加密。RevocationMac乃是這個資料相的訊息鑑 別碼。CommandMac乃是這個命令封包的訊息鑑別碼。這個 訊息鏗別碼乃是利用這個命令封包的先前欄位加以計算, 其包括有:位元組〇至位元組67。Name乃是這個檔案的DrmCopies is used to specify the number of digital rights management (DRM) copies that this file can perform. This value is the copy count value of this Digital Rights Management (DRM). This digital rights management (⑽%) replication method must be able to use a non-zero value. ESessionKey is the current secure session key, and it is the CORM — AUTHENTICATE command related to this ContentKey Digital Rights Management (CKDRM) method. — ERecordKey is the record conversation key of this file, and it uses the engine's public key to perform encryption operations. This 5:] ^ £ 〇1 ^ 1 ^ 7 value is the value that all CKDRM-RECORD —APPEND commands in this file must use. This value is used to imply that the CKCMD —RECORD —APPEND command data of this file is encrypted using this record conversation key. RevocationMac is the message identification code of this data phase. CommandMac is the message authentication code for this command packet. This message identification code is calculated using the previous field of this command packet and includes: byte 0 to byte 67. Name is for this file

DataPlay 播案糸統(DFS )名稱。Revocati〇nList 乃是這 個槽案的廢止表列。 CKDRM—CREATE—FILE這個命令乃是用來在這個指定的目 錄内產生一個ContentKey數位權利管理(CKDRM)檔案物 件。這個檔案剛開始的檔案長度為零。這個產生檔案的處 置可以利用DFSCMD —GETHANDLE這個命令加以得到。隨 後’這個處置便是應用在接下來的CKCMD —RECORD — append命令中。這些標案屬性及多重網際網路郵件延伸DataPlay Broadcasting System (DFS) name. Revocati〇nList is the abolition list for this slot case. The CKDRM_CREATE_FILE command is used to generate a ContentKey Digital Rights Management (CKDRM) file in this specified directory. This file has zero file length at the beginning. The location of the generated file can be obtained using the command DFSCMD -GETHANDLE. Subsequently, this process is applied to the following CCMMD —RECORD — append command. These project attributes and multiple Internet mail extensions

第117頁 583568 五、發明說明(112) (MIME )類型乃是設定為預設值。另外,這個c〇ntentKey 數位權利管理(CKDRM )的元資料則是設定為 CKDRMState 'CKDRMCopies 、Drmc〇Pies 、及Page 117 583568 V. Description of the Invention (112) (MIME) type is set to the default value. In addition, the metadata of this coontentKey digital rights management (CKDRM) is set to CKDRMState 'CKDRMCopies, Drmc〇Pies, and

RevocationList這些欄位所指定的數值。 CKDRM —GET —CKDRM 一COPY :檢查Con tent Key 數位權利管 理(CKDRM )複製許可、並將一個特定檔案的金鑰盒子及 目的地識別碼轉移出去。另外,這個檔案的c〇ntentKey數 位權利管理(CKDRM )複製計數亦會視需要而加以遞減。 這個轉移動作乃是由這個引擎轉移至這個主機。RevocationList The values specified by these fields. CKDRM — GET — CKDRM COPY: Checks the copy rights of Conttent Key Digital Rights Management (CKDRM), and transfers out the key box and destination ID of a specific file. In addition, the file's copyKey digital rights management (CKDRM) copy count will be decremented as needed. This transfer action is transferred from this engine to this host.

第1 6表··命令啟始 暫存器名稱數值說明 控制暫存器FUNCTION—CODE =011重設位元組計數指標至 低位元組 位元組計數暫存器CKCMD 一GET —CKDRM —COPY —S I ZE命令 封包大小 控制暫存器FUNCTION—CODE =001啟動命令Table 16 ········································ Control register FUNCTION_CODE = 011 resets the byte count index to the low byte byte count register CKCMD GET —CKDRM —COPY — SI ZE command packet size control register FUNCTION_CODE = 001 start command

弟17表·命令封包 位元組位移欄位名稱類型說明 〇HostCmdU8 命令碼 lDfsSubCmdU8次命令碼 2 :3ReservedU16 保留 4 : 7SourceFi leDFSHANDLE取得金鑰盒子的檔案 8 : 39CKDRMIdU2 5 6複製目的地的識別碼Table 17: Command packet Byte shift field name type description 〇 HostCmdU8 command code lDfsSubCmdU8 command code 2: 3ReservedU16 Reserved 4: 7 SourceFi leDFSHANDLE Get file of key box 8: 39CKDRMIdU2 5 6 Copy destination identifier

第118頁 583568 五、發明說明(113) 4〇:5 5£8633:[〇111^”1^??£1)_1(£¥目前安全對話金鑰 第1 8表:資料轉移(由引擎至主機) 位元組位移欄位名稱類型說明 〕:nKeyBoxSorcefile及目的地的金餘盒子 在本發明的一個實施例中,CKCMD —GET 一CKDRM —COPY這 個命令僅僅能夠在一個目前安全對話中進行動作一。另外, 僅有具備ContentKey數位權利管理(CKDRM)複製方法許 可的主機才能夠對CKCMD—GET 一 CKDRM—COPY這個命令進 行存取動作。Sourcefi le必須要具備下列三種狀態之一, 其包括有:不為零的C〇ntentKey數位權利管理(CKDRM) 複製计數數值、一個c 〇 n t e n t K e y數位權利管理(c K D R Μ ) 的自由複製狀態、或一個第一代C〇ntentKey數位權利管理 (C K D R Μ )的無上限複製狀態。在本發明的一個實施例 ^ ’CKCMD—GET—CKDRM 一 COPY乃是用於鎖定的檔案、或 疋複製计數為零的檔案,假使其中的目的地檔案係標示為 鎖定狀態。 在這些表格中所提供欄位參數包括有:H〇stCm(i,其設定 為DPICMD—CK—COMMAND、CkSubCmd,其設定為CKCMD — HT —CKDKM —COPY、SourceFile,其乃是取得這個金鑰盒 子的槽案的DataPlay檔案系統(DFS )處置、以及 CKDRMId ’其乃是這個傳送金鑰盒子隸屬的目的地的識別 碼。這個識別碼必須是一個CKCMD—GET—CKDRM—ID命令Page 118 583568 V. Description of the invention (113) 4〇: 5 5 £ 8633: [〇111 ^ ”1 ^ ?? £ 1) _1 (£ ¥ Current security conversation key Table 18: Data transfer (by engine To host) Byte displacement field name type description]: nKeyBoxSorcefile and destination Jinyu box In one embodiment of the present invention, the command CKCMD — GET — CKDRM — COPY can only operate in a current security dialog. 1. In addition, only hosts that have the ContentKey Digital Rights Management (CKDRM) copy method permission can access the CKCMD_GET_CKDRM_COPY command. Source must have one of the following three states, which include: : Non-zero ConntentKey Digital Rights Management (CKDRM) copy count value, a free copy status of a Connent Key Digital Rights Management (c KDR Μ), or a first generation ConnKeyKey digital rights management ( CKDR Μ) unlimited state of replication. In one embodiment of the present invention ^ 'CKCMD_GET_CKDRM_COPY is used for locked files, or files whose copy count is zero, false The destination file is marked as locked. The field parameters provided in these tables include: H ° stCm (i, which is set to DPICMD_CK_COMMAND, CkSubCmd, which is set to CCKMD_HT_CKDKM_COPY , SourceFile, which is the DataPlay File System (DFS) disposal to obtain the slot of this key box, and CKDRMId 'It is the identification code of the destination to which this transmission key box belongs. This identification code must be a CCKMD— GET-CKDRM-ID command

583568 五、發明說明(114) 對這個目的地引擎的傳送結果。另外,E S e s s i ο η K e y則是 目前的安全對話金鑰。KeyBox乃是利用這個引擎加以產 生。另外,KeyBox則是SourceFi le所指定檔案及CKDRMId 所指定目的地的金鑰及廢止表列。隨後,這個引擎便會將 這個KeyBox返回這個主機。 CKCMD —GET —CKDRM —COPY這個命令乃是在這個 Con tent Key數位權利管理(CKDRM )複製方法中使用,藉 以得到可以傳送至一個目的地的一個金鑰盒子。這個金錄 盒子乃是關連於SourceFi le。另外,這個金鑰盒子乃是用 來提供存取(播放)這個内容所需要的資訊,其係保全在 這個目的地的複製檔案中。倘若S〇urceFiie具有一個 Con tent Key數位權利管理(CKDRm )的自由複製狀態,則 這個得到的複製亦會具有一個C〇ntentKey數位權利管理 (CKDRM )的自由複製狀態。否則,這個得到的複製便會 不具有任何ContentKey數位權利管理(CKDRm)複製許 可 〇 倘若hurceFi le具有一個無上限的第一代contentKey數位 權f官理(CKDRM)複製狀態,則這個c〇ntentKey數位權 f g理(CKDRM )複製計數便可’以維持不變。否則,倘若 =個Cji^tentKey數位權利管理(CKDRM)複製計數並不為 i备利二數位權利管理(CKDRM)複製計數 行遞減、並且在這個命令完成前存回 計數的遞減tM乍。 yBQX㈣㈣會關連於這個複製583568 V. Description of invention (114) Transmission result to this destination engine. In addition, E S e s s i ο η K e y is the current secure conversation key. KeyBox is generated using this engine. In addition, KeyBox is the key and revocation list of the file specified by SourceFile and the destination specified by CKDRMId. The engine then returns the KeyBox to the host. CKCMD — GET — CKDRM — COPY This command is used in the Conttent Key Digital Rights Management (CKDRM) replication method to obtain a key box that can be transmitted to a destination. This golden record box is related to SourceFile. In addition, this key box is used to provide the information needed to access (play) this content, which is kept in the copied file at this destination. If SourFiie has a free copy status of Content Key Digital Rights Management (CKDRm), then the resulting copy will also have a free copy status of ContentKey Digital Rights Management (CKDRM). Otherwise, the obtained copy will not have any ContentKey digital rights management (CKDRm) copy permission. If the hurceFi le has an unlimited first-generation contentKey digital rights f official management (CKDRM) copy status, then the cOntentKey digital The weight fg principle (CKDRM) copy count can then be maintained. Otherwise, if the number of Cji ^ tentKey digital rights management (CKDRM) copy counts is not the same, the value of the backup binary digital rights management (CKDRM) copy counts is decremented, and the countdown tM is stored before the command is completed. yBQX㈣㈣ will be related to this copy

第120頁 583568 五、發明說明(115) "- 倘若SourceFile具有一個ContentKey數位權利管理 (CKDRM )的自由複製狀態,則這個得到的複製亦會具有 一個Con tent Key數位權利管理(CKDRM )的自由複製狀 態。否則,這個得到的複製便會不具備任何數位權利管理 (DRM )的複製許可。另外,Key Box這個欄位亦必須接著 傳送到這個目的地引擎,藉以完成這個C〇n tent Key數位權 利S理(CKDRM)複製交易’誠如先前所述的ContentKey 數位權利管理(CKDRM )複製方法。 CKCMD —GET 一CKCRM — ID :返回目前插入媒體的資訊。 弟19表:命令啟始 暫存器名稱數值說明 控制暫存器FUNCTION —CODE =011重設位元組計數指標至 低位元組 位元組計數暫存器(:1^%0_6£1'_(:1^{^_10_312£命令封 包大小 控制暫存器FUNCTION _C0DE =001啟動命令 弟2 0表··命令封包 位元組位移攔位名稱類型說明 0 Η 〇 s t C m d U 8 (未加符號的八位元數值)命令碼 lDf sSubCmdU8次命令碼 2 : 3ReservedU16 保留 4 : 19SourceFi leWRAPPED _KEY目前的安全對話金鑰Page 120 583568 V. Description of the invention (115) "-If the SourceFile has a ContentKey Digital Rights Management (CKDRM) free copy status, the resulting copy will also have a Content Key Digital Rights Management (CKDRM) freedom Copy status. Otherwise, the obtained copy will not have any digital rights management (DRM) copy permission. In addition, the Key Box field must then be transmitted to the destination engine to complete the Conttent Key Digital Rights Management (CKDRM) copy transaction 'as described previously by the ContentKey Digital Rights Management (CKDRM) copy method . CKCMD —GET —CKCRM — ID: Returns the information of the currently inserted media. Table 19: Command start register name and value description Control register FUNCTION —CODE = 011 Reset byte count index to low byte byte count register (: 1 ^% 0_6 £ 1'_ (: 1 ^ {^ _ 10_312 £ command packet size control register FUNCTION _C0DE = 001 start command brother 2 0 table · command packet byte shift block name type description 0 Η 〇st C md U 8 (unsigned Octet value) command code lDf sSubCmdU8 command code 2: 3ReservedU16 Reserved 4: 19SourceFi leWRAPPED _KEY current secure session key

第121頁 583568 五、發明說明(116) "~ 第21表:資料轉移(由引擎至主機) 位元組位移欄位名稱類型說明 〇〜31<:KDRM —IdU25 6目前插入媒體的CKDRM識別碼 根據本發明的一個實施例,CKCMD —GET —CKDRM — ID這個 命令可以讓任何主機均可以aCKCMD—GET—CKDRM—ID這 個命令進行存取動作。然而,這個引擎亦勿需要事先插入 媒體。 在上述這些表格中所表示的參數包括有:HostCmd,其可 以設定為DPICMD—CK—COMMAND eCkSubCmd,其可以設定 ,CKCMD—GET—CKDRM—ID。另外,Esession 乃是目前的 安全對=金鑰。另外,CKDRM Id乃是用來表示目前插入媒 體及目前安全對話的識別碼。CKCMD 一 get—ckdrm—⑺乃 是用來返回這個媒體專有的資訊、並且可以供應各^種 ContentKey數位權利管理(CKDRM)方法使用,藉以 媒體專有的資訊。另外,其他的識別碼(諸如:9一個公開 媒體識別碼)亦可以透過這個DataPla^案系統(卯广开 的應用程式界面(A P I )加以供應。Page 121 583568 V. Description of the invention (116) " ~ Table 21: Data transfer (from engine to host) Byte displacement field name type description 〇 ~ 31 <: KDRM —IdU25 6 CKDRM identification of currently inserted media According to an embodiment of the present invention, the command CKCMD — GET — CKDRM — ID allows any host to perform the access operation with the command aCKCMD — GET — CKDRM — ID. However, this engine does not need to be inserted into the media in advance. The parameters indicated in the above tables include: HostCmd, which can be set to DPICMD_CK_COMMAND eCkSubCmd, which can be set to CKCMD_GET_CKDRM_ID. In addition, Esession is the current security pair = key. In addition, CKDRM Id is an identification code used to indicate the currently inserted media and the current secure conversation. CKCMD_get_ckdrm_⑺ is used to return the media-specific information and can be used by various ContentKey Digital Rights Management (CKDRM) methods to use the media-specific information. In addition, other identification codes (such as: 9 a public media identification code) can also be supplied through this DataPla system (案 广 开 的 应用 程序 网络 (A P I)).

CKCMD—GET—CKDRM 一 PLAY—KEY :檢查ContentK 利管理(CKDRM )播放許可、並且建立一個播放彳榷 第2 2表··命令啟始 、 暫存器名稱數值說明 控制暫存器FUNCTION—CODE = 0 11重設位元組計數指標至 低位元組 $CKCMD — GET — CKDRM — PLAY — KEY: Check the content license management (CKDRM) playback permission, and establish a playback question Table 2 2 · Command start, register name numerical description control register FUNCTION_CODE = 0 11 Reset the byte count indicator to the low byte $

583568 五、發明說明an) 位元組計數暫存器CKCMD —GET —CKDRM —PLAY —KEY —SIZE 命令封包大小 控制暫存器FUNCTION CODE =001啟動命令 第2 3表:命令封包 位元組位移攔位名稱類型說明 0HostCmdU8 命令碼 lDfsSubCmdU8次命令碼 2 :3ReservedU16保留 4 : 7PlayFileDFSHANDLE需要這把金鑰的檔案處置 8 : 23EssesionKeyWRAPPED—KEY目前的安全對話金鑰 第24表:資料轉移(由引擎至主機) 位元組位移欄位名稱類型說明 0 : 15EPlayKeyAES—KEY特定檔案的播放對話金鑰 根據本發明的一個實施例,這個命令會要求建立一個目寸 安全對話。再者,僅有具備c〇ntentKey數位權利管理則 (CKDRM )播放方法許可的主機才可以對以]^^ —get CKDRM —PLAY 一KEY這個命令進行存取動作。另外,〜 PlayFi le則必須要指定一個解除鎖定的檔案、亦或是1 ContentKey數位權利管理(CKDRM)播放及“饨”捭、有 系統(DFS )讀取的許可。 %案 這個命令所使用的參數包括有:H〇stCmd,其設定為583568 V. Description of the invention an) Byte count register CKCMD —GET —CKDRM —PLAY —KEY —SIZE Command packet size control register FUNCTION CODE = 001 Start command Table 2 : Command packet byte shift block Bit name type description 0 HostCmdU8 command code lDfsSubCmdU 8 times command code 2: 3ReservedU16 reserved 4: 7 PlayFileDFSHANDLE file processing required for this key 8: 23EssesionKeyWRAPPED—KEY current secure session key Table 24: Data transfer (from engine to host) Bit Tuple shift field name type description 0: 15EPlayKeyAES_KEY Play dialog key for a specific file. According to an embodiment of the present invention, this command will require the establishment of a secure session. In addition, only the host that has the permission of the ConntentKey Digital Rights Management Rule (CKDRM) playback method can access the command with the command [^^ —get CKDRM —PLAY_KEY]. In addition, ~ PlayFile must specify an unlocked file, or 1 ContentKey digital rights management (CKDRM) playback and "饨" 捭, with permission to read by the system (DFS). % Case The parameters used in this command include: H ° stCmd, which is set to

第123頁 583568 五、發明說明(118) DPICMD__CK__COMMAND、CkSubCmd,其設定為CKCMD—GET —CKDRM—PLAY—KEY、PlayFile,其乃是欲返回播放對話 金鑰的檔案的DataPlay檔案系統(DFS )處置、Page 123 583568 V. Description of the invention (118) DPICMD__CK__COMMAND, CkSubCmd, which are set to CKCMD_GET—CKDRM—PLAY—KEY, PlayFile, which is the DataPlay file system (DFS) disposal of files that want to return to play the conversation key,

Esession,其乃是目前的安全對話金鑰。另外,EPlayKey 乃是利用這個安全對話金鑰進行加密動作的播放對話金 鑰。這個播放對話金鑰乃是P 1 ay F i 1 e所指定的這個檔案所 專有。特別是,這個播放對話金鑰乃是P 1 ayF i 1 e在後續的 CKCMD —Play命令中、用以對這個檔案進行加密動作的金 输。 另外,CKCMD 一 GET —CKDRM —PLAY —KEY這個命令乃是用來 將一個特定檔案解密金鑰,由這個引擎轉移至這個主機。 再者’這個命令必須在每個C ο n t e n t K e y數位權利管理 (CKDRM )播放對話前加以發佈。這個主機並不能夠假 設:這個媒體上、這個檔案在每次播放時均會具有相同的 金鑰。隨後’這個檔案(其乃是以能夠利用這個播放對話 金餘進行解密動作的形式儲存)的内容便可以利用CKCM^ —PLAY這個命令加以取得。 CKCMD 一GET —DRM —COPY :檢查第三者數位權利管理 (TPDRM )的複製許可、並且建立一個播放對話。另 這=第三者數位權利管理(TPDRM)的複製計數 合 視需要而加以遞減。 」曰 弟25表:命令啟始 暫存器名稱數值說明 控制暫存器FUNCH0N —C0DE =01丨重設位元組計數指標至Esession, which is the current secure conversation key. In addition, EPlayKey is a playback session key that uses this secure session key to perform encryption operations. This playback session key is proprietary to this file designated by P 1 ay F i 1 e. In particular, the play dialogue key is the gold used by P 1 ayF i 1 e in the subsequent CKCMD-Play command to encrypt the file. In addition, the command CKCMD GET —CKDRM —PLAY —KEY is used to decrypt a specific file key from this engine to this host. Moreover, this command must be issued before each C nt n Ke Ky y Digital Rights Management (CKDRM) play dialog. This host cannot assume: the media and the file will have the same key each time it is played. Then the content of this file (which is stored in a form that can be decrypted by using this playback dialog) can be obtained using the command CKCM ^ -PLAY. CKCMD GET —DRM —COPY: Check the copy permission of the third party digital rights management (TPDRM), and establish a playback session. Otherwise this = the third party digital rights management (TPDRM) copy count is decremented as needed. "Table 25: Command Start Value Description of Register Name Control Register FUNCH0N —C0DE = 01 丨 Reset the byte count index to

第124頁 583568 五、發明說明(119) 低位元組 位元組計數暫存器CKCMD —GET —DRM —COPY —SIZE命令封 包大小 控制暫存器FUNCTION _C0DE =001啟動命令 第2 6表:命令封包 位元組位移欄位名稱類型說明 0HostCmdU8 命令碼 lDfsSubCmdU8次命令碼 2 : 3ReservedU16 保留 4 :7SourceFileDFSHANDLE欲取得這把金鑰的檔案 8 : 23EssesionKeyWRAPPED —KEY目前的安全對話金鑰 第27表:資料轉移(由引擎至主機) 位元組位移欄位名稱類型說明 0 : 15EPlayKeyAES—KEY特定檔案的播放對話金鑰 16 : nRevocationList關連這個檔案的CKDRM廢止表列 CKCMD 一GET 一DRM 一COPY這個命令會要求一個目前安全對 話。另外,僅有具備第三者數位權利管理(TPDRM )複製 命令方法許可的主機才能夠對CKCM]) —get 一DRM —COPY這 個命令進行存取動作。隨後,S 〇 u r c e F i丨e必須要指定一個 解除鎖定的檔案。來源檔案必須要具有下列狀態之一,其 包括有:一個不為零的第三者數位權利管理(TPDRM )複Page 124 583568 V. Description of the invention (119) Low byte byte count register CKCMD —GET —DRM —COPY —SIZE command packet size control register FUNCTION _C0DE = 001 start command Table 2 : Command packet Byte shift field name type description 0 HostCmdU8 Command code lDfsSubCmdU8 Command code 2: 3ReservedU16 Reserved 4: 7 SourceFileDFSHANDLE File 8 to obtain this key 8: 23EssesionKeyWRAPPED —KEY Current Security Dial Key Table 27: Data Transfer (by Engine to host) Byte shift field name type description 0: 15EPlayKeyAES—KEY Play session key for a specific file 16: nRevocationList Related to this file CKDRM revocation list CKCMD-GET-DRM-COPY This command will require a current security dialogue. In addition, only hosts that have the third-party digital rights management (TPDRM) copy command method permission can access the CKCM]) —get a DRM —COPY command. Subsequently, S u r c e F i 丨 e must specify an unlocked file. The source file must have one of the following statuses, including: a non-zero third-party digital rights management (TPDRM)

第125頁 583568 五、發明說明(120) 製計數數值、一個第三者數位權利管理(TPDRM )的自由 複製狀態、以及一個沒有上限的第一代第三者數位權利管 理(TPDRM )複製狀態。 CKCMD —GET —DRM —COPY這個命令所要求的參數及設定係 包括有:HostCmd,其設定為DPICMD—CK—COMMAND、 CkSubCmd,其設定為CKCMD—GET 一 DRM 一 COPY、Page 125 583568 V. Description of the invention (120) counts, a free copy status of a third-party digital rights management (TPDRM), and a first-generation third-party digital rights management (TPDRM) copy status without an upper limit. CKCMD —GET —DRM —COPY The parameters and settings required by this command include: HostCmd, which is set to DPICMD_CK_COMMAND, CkSubCmd, which is set to CKCMD_GET_DRM_COPY,

SourceFile,其乃是欲取得金鑰的檔案的DataPiay檔案系 統(DFS )處置、EsessionKey,其乃是目前的安全對話。 Epl ay aKey這個欄位乃是利用這個安全對話金鑰進行加密 動作的播放對話金鑰。這個播放對話金鑰乃是s〇urceFi le 所指定的檔案所專有。亦即,這個播放對話金錄乃是在 SourceFile的後續CKCMD —PLAY命令中、用來加密内容的 金鑰。另外,RevocationList則是這個檔案的廢止表列。 CKCMD —GET —DRM —COPY這個命令乃是用來取得一個檔案 的金鑰。CKCMD—GET—DRM—COPY這個命令乃是應用在數 位權利管理(DRM )的複製方法中。倘若與這個案關連 的數位權利管理(DRM )複製計數數值並不為零,則這個 數位權利管理(DRM)複製計數便會加以遞減、並且在這 個命令完成前重新寫入媒體。CKCMD—GET—DRM COPY這 個命令乃是應用於這個數位權利管理(DRM~)複^方法期 間,藉以取得一個播放對話金鑰,其可以經由一個ckcmd —PLAY命令而與這些内容儲存在一起。另外,這個檔案的 廢止表列亦可以藉此得到、並且必須在内容匯入 ContentKey數位權利管理(CKDRM )時予以傳送。倘若SourceFile, which is the DataPiay File System (DFS) disposition and EsessionKey, of the file to obtain the key, is the current secure dialog. The field Epl ay aKey is the playback session key that uses this secure session key for encryption. This playback session key is exclusive to the file designated by sourceFile. That is, this play dialogue record is the key used to encrypt the content in the subsequent CCKMD-PLAY command of SourceFile. In addition, RevocationList is the revocation list of this file. CKCMD —GET —DRM —COPY This command is used to get the key of a file. The command CKCMD_GET_DRM_COPY is used in the copy method of Digital Rights Management (DRM). If the digital rights management (DRM) copy count value associated with this case is not zero, the digital rights management (DRM) copy count will be decremented and rewritten into the media before the order is completed. The CKCMD_GET_DRM COPY command is applied during the digital rights management (DRM ~) method to obtain a playback session key, which can be stored with these contents via a ckcmd-PLAY command. In addition, the revocation list of this file can also be obtained through this and must be transmitted when the content is imported into ContentKey Digital Rights Management (CKDRM). if

第126頁 583568 五、發明說明(121)Page 126 583568 V. Description of the invention (121)

SourceFi 1 e 具有一個c〇ntentKey 數位權利管理(CKdrm ) 的自由複製狀態,則得到的複製亦會具有一個c〇ntentKey 數位權利管理(CORM)的自由複製狀態。否則,這個得 到的複製便會不具有C〇ntentKey數位權利管理(CKDRΜ ) 複製許可。倘若SourceFiie具有一個第三者數位權利管理 (TPDRM )自由複製狀態或一個沒有上限的第一代SourceFi 1 e has a free copying state of cntentKey digital rights management (CKdrm), and the resulting copy will also have a free copying state of cnntentKey digital rights management (CORM). Otherwise, the obtained copy will not have ConntentKey Digital Rights Management (CKDRM) copy permission. Provided SourceFiie has a third-party digital rights management (TPDRM) free copy status or an unlimited first generation

ContentKey數位權利管理(CKDRM)複製狀態,則這個第 三者數位權利管理(TPDRM)複製計數便會保持不變。否 則,倘若這個第三者數位權利管理(TpDRM )複製計數不 為f」則這個引擎便會將第三者數位權利管理(TPDRm) 複製计數遞減、並且在這個命令完成前將這個第三者數 權利官理(TPDRM )複製計數回儲至媒體上。因此,ContentKey Digital Rights Management (CKDRM) copy status, the third digital rights management (TPDRM) copy count will remain unchanged. Otherwise, if the third party digital rights management (TpDRM) copy count is not f ", the engine will decrement the third party digital rights management (TPDRm) copy count and decrement the third party before the command is completed Digital Rights Management (TPDRM) copies the count back to the media. therefore,

Ep lay Key的傳送均會伴隨著這個第三者數位權利管理 (TPDRM )複製計數的遞減動作。The transmission of the Ep lay Key will be accompanied by the decrement of the third party digital rights management (TPDRM) copy count.

CjCMD—GET—METADATA :檢查讀取安全元資料許可、並將 第二者及主機專有的安全元資料由這個媒體轉移至這二 機上。 ^ 第28表:命令啟始 暫存器名稱數值說明 才工制暫存器F U N C T I 0 N —C 0 D E = 0 11重設位元組計數指標至 低4立元組 位70組計數暫存器CKCMD—GET—METADATA—SIZE命令封勺 大小 ^ 控制暫存器FUNCTION 一CODE =001啟動命令CjCMD_GET_METADATA: Check the permission to read the security metadata, and transfer the security metadata proprietary to the second party and the host from this media to these two machines. ^ Table 28: Command start register name and value description FUNCTI 0 N — C 0 DE = 0 11 Reset the byte count index to 4 low byte and 70 count register CKCMD — GET — METADATA — SIZE command seal size ^ control register FUNCTION a CODE = 001 start command

第127頁 583568 五、發明說明(122) 弟29表:命令封包 位元組位移欄位名稱類型說明 0HostCmdU8 命令碼 lDfsSubCmdU8次命令碼 2 :3ReservedU16保留 4 : 7AssociatedFileDFSHANDLE這個元資料關連的檔案處 置 8 : 23EssesionKeyWRAPPED 一 KEY目前的安全對話金錄 第3 0表:資料轉移(由引擎至主機) 位元組位移欄位名稱類型說明 0 : η — IMetadata關連一個特定檔案及主機的元資料;n個 位元組 CKCMD —GET —MET AD AT A這個命令乃是在一個目前的安全對 話期間進行操作。另外,僅有具備讀取安全元資料方法許 可的主機才可以對CKCMD—GET—METADATA這個命令進行存 取動作。SourceFi le必須要指定一個解除鎖定的播案。 Sour ceF lie必須要指定一個檔案,其具有這個主機的 Metadataldentif ier欄位數值所專有的元資料。 這個命令所需要的參數及設定包括有:H〇stCmd,其設定Page 127 583568 V. Description of the invention (122) Brother 29 Table: Command packet byte shift field name type description 0 HostCmdU8 Command code lDfsSubCmdU8 Subcommand code 2: 3ReservedU16 Reserved 4: 7AssociatedFileDFSHANDLE File processing related to the metadata 8: 23EssesionKeyWRAPPED KEY Current Security Dialogue Table 30: Data Transfer (from Engine to Host) Byte Shift Field Name Type Description 0: η — IMetadata metadata related to a specific file and host; n bytes CKCMD —GET —MET AD AT A This command is operated during a current security session. In addition, only the host that has permission to read the secure metadata method can access the CCKMD_GET_METADATA command. SourceFile must specify an unlocked broadcast. SourceFlie must specify a file with metadata specific to the value of this host's Metadataldentif ier field. The parameters and settings required for this command include: HostCmd, its settings

為DPICMD 一CK 一COMMAND、CkSubCmd,其設定為CKCMDDPICMD-CK-COMMAND, CkSubCmd, which is set to CKCMD

第128頁 583568 五、發明說明(123) 錄。請參閱CKCMD—AUTHENTICATE以得到更多資訊、Page 128 583568 V. Description of the Invention (123). See CKCMD—AUTHENTICATE for more information,

Metadata乃是這個安全儲存檔案的元資料。另外,這個元 資料可以限定為每個主機、每個檔案各丨〇 2 4個位元組。 另外,CKCMD—GET—METADATA這個命令亦可以返回與一個 檔案關連的第三者、主機特定的安全元資料。這個返回的 元資料可以是這個主機及檔案的最後一個CKCMD —SET 一 metadata命令所寫入。倘若尚未發佈有這類命令, 檔案及主機所預先錄製的元資料便會加以返回。 的一個範例中,這個引擎並不會以任何方法解 本么明 料。另外,這個元資料僅僅可以供目前安全對、逞個元資 行存取、並且僅有特定主機的元資料才可以進f的主機進 CKCMD —PLAY :在一個建立的播放對話中,將订入存取。 這個引擎轉移至這個主機。 全内容由 第31表··命令啟始 暫存器名稱數值說明 控制暫存器FUNCTION —CODE = 〇 11重設位元組 低位元組 |指標至 位元組計數暫存器CKCMD—PLAY—SIZE命令封包 控制暫存器FUNCTION—CODE =〇〇1啟動命令 匕大小 第3 2表:命令封包 位元組位移攔位名稱類型說明 OHostCmdU8 命令碼 lDfsSubCmdU8次命令碼Metadata is the metadata of this securely stored file. In addition, this metadata can be limited to each host and each file has 24 bytes. In addition, the command CKCMD_GET_METADATA can also return third-party, host-specific security metadata associated with a file. The returned metadata can be written by the host and the last CKCMD —SET_metadata command of the file. If no such order has been issued, the files and metadata pre-recorded by the host will be returned. In one example, this engine doesn't know the answer in any way. In addition, this metadata can only be accessed by the current security pair, a meta-asset bank, and only the metadata of a specific host can be entered into the host of CKCMD —PLAY: In an established playback dialog, it will be ordered access. The engine is transferred to this host. The entire contents are listed in Table 31. · Command Start Register Name and Value Description Control Register FUNCTION —CODE = 〇11 Reset Byte Low Byte | Index to Byte Count Register CKCMD — PLAY — SIZE Command packet control register FUNCTION_CODE = 〇〇1 Start command size Table 2 : Command packet byte shift block name type description OHostCmdU8 command code lDfsSubCmdU8 command code

第129頁Chapter 129

583568 五、發明說明(124) 2 ·· 3PlayOptionsU16播放選項。請參专編碼程序。 4 :7PlayFileDFSHANDLE 欲播放檔案 8 :15ByteOffsetU64檔案内部欲播放的位元組位移 1 6 ·· 2 3ByteCountU64欲轉移的位元組數目 24:3 9£86 53:1〇111^7¥1^??£0一1(£¥目前的安全對話金餘 40 · 55EP 1 ayKeyAES 一KEY目前的播放對話金餘 、… 第3 3表:播放選項編碼 位元組位移欄位名稱說明 0PLAY—STREAMING0 =播放正常;在播放錯誤時中斷1=序 列播放;在播放錯誤時亦不中斷 1PLAY—TO—EOFO =播放正常;在到達給定位元組計數時 中斷ι=播放至檔案結尾;忽略命令封包中的ByteC〇unt攔 位 2 : 1 5保留 根據本發明的一個實施例,這個命令乃是在一個目前安全 ^話期間進行動作。另外,僅有具備c〇ntentKey數位權利 官理(CKDRM)播放或數位權利管理(DRM)複製方法許可 的主機才可以對CKCMD—PLAY這個命令進行存取動作。 p i ayF 1 1 e必須要指定一個解除鎖定的檔案。另外,583568 V. Description of the invention (124) 2 ·· 3PlayOptionsU16 play options. Please refer to the special coding procedures. 4: 7PlayFileDFSHANDLE File to be played 8: 15ByteOffset U64 Byte shift within the file to be played 1 6 · 2 3ByteCount U64 Number of bytes to be transferred 24: 3 9 £ 86 53: 1〇111 ^ 7 ¥ 1 ^ ?? £ 0-1 (£ ¥ current security dialogue gold 40 · 55EP 1 ayKeyAES-KEY current playback dialogue gold, ... Table 3 3: Play option encoding byte shift field name description 0PLAY-STREAMING0 = normal playback; Interruption 1 = sequence playback when playback error occurs; 1PLAY—TO—EOFO = interruption when playback error occurs; interruption when reaching the positioning tuple count = playback to the end of the file; ByteC〇unt in the command packet is ignored Block 2: 1 5 is reserved according to an embodiment of the present invention, this command is to operate during a current secure conversation. In addition, only digital rights management (CKDRM) playback or digital rights management ( DRM) Only the host permitted by the copy method can access the CCKMD-PLAY command. Pi ayF 1 1 e must specify an unlocked file. In addition,

Pl^Fi l^e亦必須要指定一個具有Datapiay檔案系統(dfs 續取u午可的檔案。再者,p 1 丨1 e亦必須要指定一個具 ContentKey數位權利管理(CKDRM)播放或數位權利管 583568Pl ^ Fi l ^ e must also specify a file with a Datapiay file system (dfs can continue to retrieve files that can be used in the afternoon. In addition, p 1 丨 1 e must also specify a Content Rights digital rights management (CKDRM) playback or digital rights Tube 583568

理(DRM)複製許可的槽案。在這種c〇ntentKey數位權利 I理(CKDRM )播放方法中,這個接收的内容可以不需要 儲存;另外,在這種數位權利管理(DRM )複製方法中, 這個接收的内容則需要加以儲存。 這個命令所需旳參數包括有:HostCmd,其可以設定為Management (DRM) copying a licensed slot. In this method of CKDRM (CKDRM) playback, the received content may not need to be stored; in addition, in this digital rights management (DRM) copy method, the received content needs to be stored. The parameters required for this command include: HostCmd, which can be set to

DPICMD 一 CK 一 COMMAND、CkSubCmd,其可以設定為CKCMD PLAY、Play 〇pt ions,其乃是這個命令的選項。另外,〜 PlayFi le乃是這個欲存取檔案的Datapiay擋案系統(dfs )處置、By t e0 f f se 1:則是這個標案内欲開始進行轉移動作 的位置。 由於這個檔案的加密動作,gyte〇ffset這個數值可以是十 六的倍數。在本發明的一個實施例中,這個數值必須是十 六的倍數。另外,ByteCount則是欲轉移的位元組數目。 倘若?1^丫—了0—£(^這個位元能夠在?1时〇131;1〇115中加以確 認,則這個攔位奇以加以忽略;否則,ByteC〇unt便必須 要是十六的倍數。ESessionKey乃是目前的安全對話金 鑰。請參閱CKCMD—AUTHENTICATE以得到更多資訊。 EplayKey乃是PlayFile指定檔案的播放對話金鑰,其乃是 利用這個安全對話金鑰進行加密動作。這個數值可以與這 個引擎在相同檐案先鈾一個命令的EP 1 ayKey這個攔位所返 回的數值相同。對於這種Con tent Key數位權利管理 (CKDRM )播放方法而言,這個先前命令便是CKC〇—“丁 —CKDRM 一 PLAY—KEY。對於數位權利管理(DRM )複製方 法而言,這個先前命令便是CKCMD—GET—DRM 一 c〇pY。另DPICMD-CK-COMMAND, CkSubCmd, which can be set to CKCMD PLAY, Play 〇ptions, which are options for this command. In addition, ~ PlayFile is the datapiay file system (dfs) for file access, and Byt e0 f f se 1: is the position where you want to start the transfer operation in this project. Due to the encryption action of this file, the value of gyte〇ffset can be a multiple of sixteen. In one embodiment of the invention, this value must be a multiple of sixteen. In addition, ByteCount is the number of bytes to be transferred. if? 1 ^^ — 0— £ (^ This bit can be confirmed in 10: 00131; 10115, then this block is odd to ignore; otherwise, ByteCount must be a multiple of sixteen. ESessionKey is the current secure session key. Please refer to CKCMD-AUTHENTICATE for more information. EplayKey is the playback session key of the file specified by PlayFile, which is used to perform encryption operations using this secure session key. This value can be used with This engine returns the same value in the EP 1 ayKey block of a command before the same eaves. For this Content Key Digital Rights Management (CKDRM) playback method, the previous command is CKC. —CKDRM—PLAY—KEY. For the Digital Rights Management (DRM) copy method, this previous command is CKCMD—GET—DRM—c0pY.

第131頁 583568 五、發明說明(126) 外,這個返回資料即是這個檔案内容,其乃是利用這個播 放對話金鑰進行加密動作。 CKCMD —PLAY乃是用來返回這個檔案的内容,其乃是利用 這個播放對話金錄進行加密動作。除了内容加密以外, CKCMD 一PLAY這個命令在功能上亦等同於DSF —READFILE。 請參考DataPlay檔案系統命令規格書以得到這些選項及檔 案結尾行為的完整說明。 CKCMD 一RECORD —APPEND :檢查ContentKey 數位權利管理 (CKDRM )許可、並且將安全内容由一個主機轉移至一個 檔案的結尾。 第34表:命令啟始 暫存器名稱數值說明 控制暫存器FUNCTION _C0DE =011重設位元組計數指標至 低位元組 位元組計數暫存器CKCMD _REC0RD _APPEND _SIZE命令封 包大小 控制暫存器FUNCTION _C0DE =001啟動命令 第35表:命令封包 位元組位移欄位名稱類型說明 〇HostCmdU8 命令碼 lDfsSubCmdU8次命令碼 2 : 3Record0ptionsU16記錄選項。請參考編碼程序。 4 :7RecordFileDFSHANDLE 欲記錄檔案Page 131 583568 V. Description of the invention (126) In addition, the returned data is the content of the file, which is the encryption action using the playback session key. CKCMD —PLAY is used to return the content of this file, which is used to encrypt the playback dialogue record. In addition to content encryption, the CKCMD-PLAY command is functionally equivalent to DSF-READFILE. Please refer to the DataPlay File System Command Specification for a complete description of these options and end-of-file behavior. CKCMD_RECORD —APPEND: Check the ContentKey Digital Rights Management (CKDRM) license and transfer the secure content from a host to the end of a file. Table 34: Command start register name value description Control register FUNCTION _C0DE = 011 Reset byte count index to low byte byte count register CKCMD _REC0RD _APPEND _SIZE command packet size control register FUNCTION _C0DE = 001 Start Command Table 35: Command Packet Byte Shift Field Name Type Description HostCmdU8 Command Code lDfsSubCmdU8 Command Code 2: 3Record0ptionsU16 recording options. Please refer to the encoding procedure. 4: 7RecordFileDFSHANDLE

第132頁 583568 五、發明說明(127) 8 : 1 5By teCountU64欲轉移的位元組數目 16 : 31ESessionKey WRAPPED—KEY目前的安全對話金鍮 32 :47ERecordKeyWRAPPED 一 KEY目前的記錄對話金錄 第3 6表:記錄選項編碼 位元組位移欄位名稱說明 ORECORD—FOREVERO =記錄正常;轉移ByteCount指定的位 元組數目1 =永遠記錄;忽略B y t e C 〇 u n t這個欄位 1 ·· 1 5保留Page 132 583568 V. Description of the invention (127) 8: 1 5By teCountU64 Number of bytes to be transferred 16: 31ESessionKey WRAPPED—KEY current security dialogue gold 32: 47ERecordKeyWRAPPED KEY current record dialogue gold record Table 3 6 : Record option encoding byte shift field name description ORECORD_FOREVERO = record is normal; transfer the number of bytes specified by ByteCount 1 = always record; ignore Byte C 〇unt this field 1 ·· 1 5 reserved

CKCMD 一RECORD —APPEND這個命令,在本發明的一個實施 例中,會要求一個目前安全對話。另外,僅有具備 ContentKey數位權利管理(CKDRM)記錄方法許可的主機 才可以對CKCMD —RECORD —APPEND這個命令進行存取動 作。另外,Re cor dFile必須要指定一個具有ContentKey數 位權利管理(CKDRM)記錄及DataPlay檔案系統(DFS)寫 入許可的檔案。這個檔案可以是鎖定的、亦或是解除鎖定 的。The command CKCMD_RECORD_APPEND, in one embodiment of the present invention, will require a current secure session. In addition, only the host that has permission of the ContentKey Digital Rights Management (CKDRM) recording method can access the CCKMD —RECORD —APPEND command. In addition, Re dFile must specify a file with ContentKey Digital Rights Management (CKDRM) records and DataPlay File System (DFS) write permission. This file can be locked or unlocked.

這個命令所使用的參數包括有:Host Cmd,其可以設定為 DPICMD—CK—COMMAND、CkSubCmd,其可以設定為CKCMD — RECORD 一APPEND、RecordOptions,其乃是這個命令的選 項且係依照一個R e c 〇 r d 〇 p t i ο n s編碼表格所描述的方式加 以動作、RecordFile,其乃是欲存取槽案的DataPlay槽案 系統(DFS )處置、By teCount,其乃是欲轉移的位元組數The parameters used in this command include: Host Cmd, which can be set to DPICMD_CK_COMMAND, CkSubCmd, which can be set to CKCMD_RECORD_APPEND, RecordOptions, which are options of this command and are based on a Rec. rd 〇pti ο ns code the form described in the action, RecordFile, which is the DataPlay slot system (DFS) to access the slot case, ByteCount, which is the number of bytes to be transferred

第133頁 583568 五、發明說明(128) 目,然而,倘若RECORD _FOREVER這個位元能夠在 R e c 〇 r d 0 p t i ο n s中加以確認,則這個欄位便可予以忽略、 ESessionKey,其乃是目前的安全對話金錄、 ERecordKey,其乃是目前的記錄對話金鑰,並且可以利用 這個引擎的協定金鑰進行加密動作。在本發明的一個實施 例中,這個命令的所有例子均可以使用相同的記錄對話金 鑰,並且,這個記錄對話金鑰必須要與產生這個檔案的 CKCMD —CREATE —FILE這個命令的記錄對話金鑰相互匹 配。另外,這個接收的資料乃是欲加入這個檔案的内容。 再者,這個資料至少會利用這個記錄對話金餘進行加密動 作。 根據本發明的一個實施例,CKCMD —RECORD —APPEND這個 命令乃是用來將内容加入這個指定檔案的結尾。另外, CKCMD _REC0RD _APPEND這個命令的功能恰好與CKCMD _ PLAY這個命令相反。CKCMD _REC0RD _APPEND這個命令的 功能大致上等同於0?80110_?{?1丁£_4??£0,除了資料加 密的方法以外。 CKCMD_SET_KEYBOX :由這個主機轉移一個特定檔案的金 鑰盒子。這個金鑰盒子乃是用來提供對資料進行解除鎖定 動作的金鑰、並且可以連結於這個媒體,倘若内容是預先 錄製的。 第3 7表··命令啟始 暫存器名稱數值說明 控制暫存器FUNCTION _C0DE =011重設位元組計數指標至Page 133 583568 V. Description of Invention (128), however, if the bit RECORD _FOREVER can be confirmed in Rec 0rd 0 pti ο ns, this field can be ignored, ESessionKey, which is the current The secure conversation record, ERecordKey, is the current record conversation key, and can use the engine's protocol key to perform encryption operations. In one embodiment of the present invention, all examples of this command can use the same recording session key, and the recording session key must be the same as the recording session key of the command CCMMD —CREATE —FILE that generated the file. Match each other. In addition, the received information is the content of the file to be added. Furthermore, this data will at least be encrypted using this recorded conversation surplus. According to an embodiment of the present invention, the CCKMD_RECORD_APPEND command is used to add content to the end of the specified file. In addition, the function of the CKCMD _REC0RD _APPEND command is exactly the opposite of the command of CKCMD _ PLAY. The function of the CKCMD _REC0RD _APPEND command is roughly equivalent to 0? 80110 _? {? 1 丁 £ _4 ?? £ 0, except for the method of data encryption. CKCMD_SET_KEYBOX: The key box for transferring a specific file by this host. This key box is used to provide the key to unlock the data, and can be linked to this media if the content is pre-recorded. Table 3 7 ·· Command start Register name value description Control register FUNCTION _C0DE = 011 Reset byte count index to

第134頁 583568 五、發明說明(129) 低位元組 位元組計數暫存器CKCMD —SET —KEYBOX —SIZE命令封包大 小 控制暫存器FUNCTION—CODE =001啟動命令 弟38表:命令封包 位元組位移欄位名稱類型說明 0HostCmdU8 命令碼 lDfsSubCmdU8次命令碼 2 :3ReservedU16保留 4 : 7AssociatedFileDFSHANDLE 關連KEYBOX 的檔案 第3 9表:記錄選項編碼 位元組位移欄位名稱類型說明 0 :nKeyBox槽案的金鑰盒子 這裡一定要具有一個目前安全對話。任何主機均可以對 CKCMD —SET 一KEYBOX這個命令進行存取動作。Page 134 583568 V. Description of the invention (129) Low byte byte count register CKCMD —SET —KEYBOX —SIZE command packet size control register FUNCTION_CODE = 001 Start command younger table 38: Command packet bit Group displacement field name type description 0 HostCmdU8 command code lDfsSubCmdU8 secondary command code 2: 3ReservedU16 reserved 4: 7AssociatedFileDFSHANDLE file related to KEYBOX Table 3 9: Record option encoding byte displacement field name type description 0: nKeyBox slot key The box must have a current secure conversation here. Any host can access the command CKCMD —SET_KEYBOX.

Assoc iat edF i le必須要指定一個解除鎖定的檔案、並且不 能具有一個金鑰盒子或ContentKey數位權利管理(CKDRM )元資料。 這個命令所需要的參數包括有:HostCmd,其設定為Assoc iat edFile must specify an unlocked file and cannot have a key box or ContentKey Digital Rights Management (CKDRM) metadata. The parameters required for this command include: HostCmd, which is set to

DPICMD 一CK 一COMMAND、CkSubCmd,其設定為CKCMD 一SET —KEYBOX、Assoc iatedFUe,其乃是關連KeyB〇x 的 ^ 案的DPICMD-CK-COMMAND, CkSubCmd, which is set to CKCMD-SET-KEYBOX, Assoc iatedFUe, which is related to the KeyB0x case.

第135頁 583568Page 135 583568

DataPlay檔案系統(DFS )處置、KeyB〇x,其乃是 AssociatedFi le所指定檔案及CKDRMId所指定目的地的金 餘盒子。 XI個命令乃是用來說明:這個引擎乃是用來將這個金鑰盒 子寫入這個媒體、並將這個金鑰盒子與特定檔案進行關 連’藉以讓許可ContentKey數位權利管理(CKDRM)方法 的槽案能夠啟動。 CKCMD—SET—METADATA ··檢查寫入安全元資料許可、並且 將第三者、主機特定的安全元資料由這個主機轉移至這個 媒體。 第40表:命令啟始 暫存器名稱數值說明 控制暫存器FUNCTION—CODE =011重設位元組計數指標至 低位元組 位元組計數暫存器CKCMD_SET_METADATA_SIZE命令封包 大小 控制暫存器FUNCTION _C0DE =001啟動命令 弟41表:命令封包 位元組位移欄位名稱類型說明 〇HostCmdU8 命令碼 lDfsSubCmdU8次命令碼 2 :3ReservedU16保留 4 : 7AssociatedFi leDFSHANDLE 元資料關連的檔案DataPlay File System (DFS) disposal, KeyBox, is a spare box for files specified by AssociatedFile and destinations specified by CKDRMId. The XI commands are used to explain: the engine is used to write the key box to the media and associate the key box with a specific file to allow the slot of the ContentKey Digital Rights Management (CKDRM) method to be licensed The case can be launched. CKCMD_SET_METADATA · Check the permission to write secure metadata, and transfer the third party, host-specific security metadata from this host to this medium. Table 40: Command Start Register Name Value Description Control Register FUNCTION_CODE = 011 Reset Byte Count Index to Low Byte Byte Count Register CKCMD_SET_METADATA_SIZE Command Packet Size Control Register FUNCTION _C0DE = 001 Start command brother 41: Command packet byte shift field name type description HostHost CmdU8 command code lDfsSubCmdU8 secondary command code 2: 3ReservedU16 reserved 4: 7AssociatedFi leDFSHANDLE metadata related files

第136頁 583568 五、發明說明(131) 8 : 23ESessionKeyWRAPPED 一KEY目前的安全對話金鑰 第42表:資料轉移(由主機至引擎) 位元組位移欄位名稱類型說明 0 : η — IMetadata與一個特定檔案及主機關連的安全元資 料;η個位元組 這裡一定要具有一個目前安全對話。另外,僅有具備寫入 安全元資料方法許可的主機才可以aCKCMD —SET — METADATA這個命令進行存取動作。assoc iatedFi le必須要 指定一個解除鎖定的擋案。另外,AssociatedFile亦可以 已經具備這個主機的Metadata〗 dent i fier數值所專有的元 資料。 這個命令所需要的參數包括有:H〇stCmd,其設定為Page 136 583568 V. Description of the invention (131) 8: 23ESessionKeyWRAPPED KEY Current secure session key Table 42: Data transfer (from host to engine) Byte displacement field name type description 0: η — IMetadata and a Security metadata associated with a particular file and host; n bytes must have a current security conversation here. In addition, only hosts that have permission to write secure metadata methods can access the command aCKCMD —SET — METADATA. assoc iatedFile must specify an unlocked file. In addition, AssociatedFile may already have metadata specific to the metadata of this host. The parameters required for this command include: HstCmd, which is set to

DPICMD 一CK 一COMMAND、CkSubCmd,其設定為CKCMD 一SET —KEYB0X、AssociatedFile,其乃是這個元資料所關連檔 水的DataPlay槽案糸統(DFS)處置、EsessionKey,其乃 是目前的安全對話金鑰。請參考“]!) —AUTHENTICATE以 得到更多資訊,另外,Metadata則是這個安全儲存的目前 主機中、與這個檐案關連的元資料。 CKCMD 一SET 一MET AD AT A 這個命令乃是 CKCMD GET metadata這個命令的互補函數◦這個命令乃是用來將數位 權利管理(DRM )或主機專有的安全元資料寫入一個特定 才田案的Da taP 1 ay媒體。這個接收的元資料將會在這徊主機DPICMD_CK_COMMAND, CkSubCmd, which is set to CKCMD_SET_KEYB0X, AssociatedFile, which is the DataPlay slot system (DFS) disposal, EsessionKey, which is the current security dialog key. Please refer to "]!) -AUTHENTICATE for more information. In addition, Metadata is the metadata stored in the secure host and related to this eaves. CKCMD-SET-MET AD AT A This command is CKCMD GET Complementary function of the metadata command. This command is used to write digital rights management (DRM) or host-specific security metadata into a Da taP 1 ay media for a specific case. The received metadata will be here. Host

583568 五、發明說明(132) 及播案的後續CKCMD —GET —METADATA命令中進行返回動 的 則這個媒體便 體、並將這個 的主機進行關 個元資料進行 作。偏若AssociatedFile已經具有這個主機 Metadataldentifier數值所專有的元資料, 會利用這個新的元資料進行複寫動作。 這個引擎乃是用來將這個元資料寫入這個媒 元資料與這個指定檔案及這個目前安全對話 連。另外,這個引擎亦不會以任何方法對這 解譯動作。 另外,這個安全元資料僅能夠透過這個目前安全對話、 機ContentKey數位權利管理(CKDRM )憑證中的 ^的主583568 V. Description of the invention (132) and subsequent follow-up of the CKCMD —GET —METADATA command of the broadcast case, the media body is used, and the host computer is responsible for the metadata. If the AssociatedFile already has metadata specific to this host Metadataldentifier value, it will use this new metadata to perform the replication action. This engine is used to write this metadata to this media file and to this specified file and this current secure conversation. In addition, the engine does not interpret this action in any way. In addition, this secure metadata can only be passed through the ^ master in the current secure conversation, machine ContentKey Digital Rights Management (CKDRM) certificate

Metadataldentifier欄位所指定的主機進行存取動作 CKCMD 一UNLOCK 一FILES :檢查Con tent Key 數位權利管 (CKDRM )解除鎖定許可、並且對檐案進行解除鎖里 作。 、、又動 第4 3表··命令啟始 暫存器名稱數值說明 控制暫存器FUNCTION—CODE =011重設位元組計數於辨 低位元組 卞至 位元組計數暫存器CKCMD —UNLOCK —SIZE命令封包大小 控制暫存器FUNCTION—CODE =001啟動命令 第4 4表··命令封包 位元組位移欄位名稱類型說明 〇H〇stCmdU8 命令碼The host specified by the Metadataldentifier field performs an access operation. CKCMD_UNLOCK_FILES: Check the unlock permission of the Content Key Digital Rights Management (CKDRM) and unlock the eaves case. Table 4 3 ... Command Start Register Name Value Description Control Register FUNCTION_CODE = 011 Reset Byte Count to Distinguish Low Byte 卞 to Byte Count Register CKCMD — UNLOCK —SIZE command packet size control register FUNCTION_CODE = 001 start command Table 4 · command packet byte shift field name type description 〇H〇stCmdU8 command code

第138頁 583568Page 138 583568

lDfsSubCmdU8次命令碼 2:3FileC〇untU16欲解除鎖定的檔案數目,η。 4 :7ReservedU16 〔2〕保留 8 :23EunlockKeyWRAPPED一KEYEkeyComplement加密的刀 24 : 39EmediaIdU128公開、獨一無二的媒體識別瑪 40 : 59DataMacMAC資料轉移的訊息鑑別碼 第45表:資料轉移(由主機至引擎) 位元組位移襴位名稱類型說明lDfsSubCmdU8 command code 2: 3FileC〇untU16 The number of files to be unlocked, η. 4: 7ReservedU16 〔2〕 Reserved 8: 23EunlockKeyWRAPPED_KEYEkeyComplement Encrypted Knife 24: 39EmediaIdU128 Public and unique media identification Ma 40: 59DataMacMAC Data transfer message authentication code Table 45: Data transfer (from host to engine) Byte shift Unit name type description

0 .24n—lFileSetFILE—SET〔η〕一個表列的欲解除鎖定 第46表:F ILE —SET資料結構 位元組位移欄位名稱類型說明 〇 : 3HandleDFSHANDLE欲解除鎖定的檔案 4 : 23EKeyComplementU160這個檔案的金鑰組的補數0 .24n — lFileSetFILE — SET [η] A list of columns to be unlocked Table 46: F ILE —SET data structure byte shift field name type description 0: 3HandleDFSHANDLE File to be unlocked 4: 23EKeyComplementU160 of this file Complement of the key set

這裡一定要具有一個目前安全對話。另外,僅有具備 ContentKey數位權利管理(CKDRM )解除鎖定方法許可的 主機才可以對CKCMD —UNLOCK —FILES這個命令進行存取動 作。另外,在這個Fi leSet表列中的Handle攔位亦必須指 定一個檔案、並且必須要具有Con tent Key數位權利管理 (CKDRM)的元資料。There must be a current security dialogue here. In addition, only hosts with ContentKey Digital Rights Management (CKDRM) unlocking method permission can access the CKCMD —UNLOCK —FILES command. In addition, the Handle block in the FileSet list must also specify a file and must have metadata for the Conttent Key Digital Rights Management (CKDRM).

583568 五、發明說明(134) 這個CKCMD—UNLOCK—FILES命令所需要的參數包括有: HostCmd,其設定為DPICMD 一 CK—COMMAND、CkSubCmd,其 設定為CKCMD—UNLOCK—FILES、FileCount,其乃是欲解 除鎖定的播案數目、EunlockKey,其乃是加密的解除鎖定 金錄及加密金瑜補數以形成EkeyComplement數值的金錄、583568 5. Description of the invention (134) The parameters required for the CCKMD_UNLOCK_FILES command include: HostCmd, which is set to DPICMD_CK_COMMAND, CkSubCmd, which is set to CCKMD_UNLOCK_FILES, FileCount, which is the The number of unlocked podcasts and EunlockKey are encrypted records of unlocked gold and encrypted Golden Yu complements to form EkeyComplement values,

Emedia,其乃是加密的媒體識別碼、DataMac,其乃是這 個資料封包的訊息鑑別碼。另外,利用F i 1 eSet這個攔位 進行計算,F i 1 e S e t乃是一個陣列的欲解除鎖定檔案識別 碼,其中,項目數目乃是FileCount所指定的數值,且各 個項目乃是一個FileSet元件、Handle這個欄位乃是欲解 除鎖定檔案的DataPlay檔案系統(DFS )處置、Emedia, which is the encrypted media identification code, and DataMac, which is the message authentication code for this data packet. In addition, F i 1 eSet is used for calculation. F i 1 e Set is an array of unlocked file identifiers. The number of items is the value specified by FileCount, and each item is a FileSet. The component and Handle fields are for the DataPlay File System (DFS) disposal of the files to be unlocked,

EkeyComplement這個欄位乃是這個檔案 即:這個完整的金鑰盒子並不存在這個 位乃是用來提供解密這個檔案的其餘金 EkeyComplement乃是利用這個引擎的公 動作的補數數值。 的金鑰組補數(亦 媒體上、且這個欄 鑰盒子)、且 開金餘以進行加密 CKCMD 一UNLOCK 一FILES這個命令乃是用办 對一組檔案進行解除鎖定動作。這裡,歲二廷個引擎能夠 個安全對話必須要啟動、並且這個主機^這個主機間的一 ContentKey數位權利管理(CKDRM) ’、必須要具有 一個成功的CKCMD 一 UNLOCK—FILES命、八除鎖定許可。在 用來完成各個檔案的金鑰盒子、 :這個引擎乃是 變為解除鎖定狀態。 將其屬性由鎖定狀態改 加密演算法The EkeyComplement field is this file, that is, the complete key box does not exist. This bit is used to provide the rest of the gold for decrypting this file. EkeyComplement is the complement value that uses the engine's public action. The complement of the key group (also on the media, and this key box), and the amount of money used for encryption CKCMD-UNLOCK-FILES This command is used to unlock a group of files. Here, the two engines must be able to start a secure session, and this host must have a ContentKey Digital Rights Management (CKDRM) ', and must have a successful CKCMD, UNLOCK_FILES command, and eight lock permissions. . In the key box used to complete each file, the engine is unlocked. Change its attribute from locked state to encryption algorithm

第140頁 583568 五、發明說明(135) 這些第三者數位權利管理(TPDRM) 、ContentKey數位權 利管理(CKDRM )、及Da taP I ay槽案系統(DFS )的上述方 法乃是利用加密演算法加以實施。這些加密演算法在這些 方法中應用的方式乃是取決於設計的需求。因此,說明書 所述的加密技術乃是用來做為本發明的範例,其中,應用 於加密技術的位元數目乃是與可供應的位元空間及成本效 率有關的一個函數。在本發明的一個實施例中,先進加密 標準(AES )函數可以使用一百二十八個位元的金鑰。這 個公開的金鑰加密可以是橢圓曲線加密、或是另一種 類型的加密方法。 @ 法,金 的金鑰 會要求 明:金 個金鑰 (AES ) (AES ) 方法的 在本發 法乃是 傳輸。 利用先 個先進 茶考agContentKey數位權利管理(CKDRM)方 鑰加始、乃是應用在這些解除鎖定(UNL〇CK )方法中 ^ ί。舉例來說,CKCMD—UNL0CK—FILES這個方法 論ί ί鑰θ因此,本發明的一個實施例乃是用來說 補L可乃疋在^位中進行傳輸。這 進彳/Λ 利用沒個解除鎖定金鑰、以先進加密標準 ==解2作,誠如這個先進加密標準 其他攔位則\括有f這種解除鎖定(UNL〇CK) 明的一個每 ·媒體識別碼及Emed i a I d欄位。 用來說明,:::別2種彳⑽-UNL〇CK -F 1LES方 另外,這此婢體二碼乃疋在EmediaId攔位中進行 進加密標;^別喝亦可以-個安全對話金鑰、 加密標準(AES )金::密及解密動作,誠如這 583568Page 140 583568 V. Description of the invention (135) The above methods of these third party digital rights management (TPDRM), ContentKey digital rights management (CKDRM), and Da taP I ay slot system (DFS) are based on the use of encryption algorithms To implement. The way these cryptographic algorithms are applied in these methods depends on the requirements of the design. Therefore, the encryption technology described in the specification is used as an example of the present invention. The number of bits applied to the encryption technology is a function related to the available bit space and cost efficiency. In one embodiment of the invention, the Advanced Encryption Standard (AES) function can use a 128-bit key. This public key encryption can be elliptic curve encryption, or another type of encryption method. @ 法 , 金 的 's key will ask for clear: The method of golden key (AES) (AES) is transmitted in this method. The use of the first advanced tea test agContentKey digital rights management (CKDRM) key addition is applied in these unlocking (UNLOCK) methods ^. For example, the method of CCKMD_UNL0CK_FILES is discussed. Therefore, one embodiment of the present invention is to use the supplementary L-Kenna to transmit in the ^ bit. This entry / Λ uses no unlocking key and works with an advanced encryption standard == solution 2. As for the other stops of this advanced encryption standard, it includes the unlocked (UNL〇CK) statement. · Media ID and Emedia ID field. It is used to explain :::: Don't have 2 kinds of 彳 ⑽-UNLOCK-F 1LES. In addition, the second code of this body is to be encrypted in the EmediaId block; ^ Don't drink it-a secure dialogue Key, Encryption Standard (AES) Gold: Encryption and decryption action, as this 583568

訊息鑑別碼、CommandMac、DataMac、及Rev〇cati〇nMac 這 些攔位亦可以應用在解除鎖定這種方法中,並且亦可以應 用在CKCMD—CREATED—FILE這種方法中。特別是,訊息鐘 別碼乃是在CommandMac、DataMac、及Revocati〇nMac這些 攔位中進行傳輸動作。另外,這個訊息鑑別碼亦可以利用 安全雜湊演异法一1 ( SHA — 1 )的訊息鑑別碼(MAC )函數 加以產生。再者,這個訊息鑑別碼()函數的金鑰則 是目前的安全對話金鑰。 播放對活内谷加始、乃是應用於這種c 0 n t e n t κ e y數位權利管 理(CKDRM )方法的CKCMD 一PLAY中。特別是,播放對内容 可以在CKCMD —PLAY這種方法的資料轉移相中進行傳輸。 另外這個内谷亦可以這個播放對話金鑰、利用先進加密 標準(AES )進行加密及解密動作,誠如這個先進加密標 準(AES)金錄一樣。 播放對金鍮加密及是應用在這種C〇ntent Key數位權利管理The message authentication code, CommandMac, DataMac, and RevOcatiOnMac can also be applied in the method of unlocking, and can also be applied in the method of CCKMD_CREATED_FILE. In particular, the message clock codes are transmitted in the blocks of CommandMac, DataMac, and RevocatiOnMac. In addition, this message authentication code can also be generated by using a secure hashing algorithm 1 (SHA — 1) message authentication code (MAC) function. Furthermore, the key of this message authentication code () function is the current secure conversation key. Playback is added to the inner valley, and is applied to CCKMD-PLAY of this c 0 n t e n t κ e y Digital Rights Management (CKDRM) method. In particular, the playback pair content can be transmitted in the data transfer phase of the CCKMD-PLAY method. In addition, the inner valley can also play the conversation key, and use the Advanced Encryption Standard (AES) to perform encryption and decryption operations, just like the Advanced Encryption Standard (AES) gold record. Encryption for playing and encryption is applied to this Connent Key digital rights management

(CKDRM)方法的CKCMD 一 GET—CKDRM 一 PLAY 一 KEY、CKCMD 一GET —DRM 一COPY、及 CKCMD —PL AY 中。在本發明的一個 f施例中,播放對話金鑰可以在EplayKey欄位或另一個適 當的攔位中進行傳輸。另外,這個播放對話金鑰亦可以這 個安全對話金鑰、利用先進加密標準(AES )進行加密及 解密動作,誠如這個先進加密標準(AES )金鑰一樣。 對於記錄對話内容加密而言,這個C〇ntentKey數位權利管 理(CKDRM )乃是利用CKCMD 一 RECORD一 APPEND這種方法。 另外,記錄對話内容亦可以在CKCMD —RECORD —APPEND這(CKDRM) of CKCMD-GET-CKDRM-PLAY-KEY, CKCMD-GET-DRM-COPY, and CKCMD-PL AY. In one embodiment of the present invention, the playback session key may be transmitted in the EplayKey field or another appropriate stop. In addition, the playback session key can also use this secure session key to perform encryption and decryption using the Advanced Encryption Standard (AES), just like this Advanced Encryption Standard (AES) key. For the encryption of recorded conversation content, this ConntentKey digital rights management (CKDRM) uses the method CCKMD-RECORD-APPEND. In addition, the recorded conversation content can also be found in CCKMD —RECORD —APPEND

第142頁 583568 五、發明說明(137) 種方法中的資料轉移相中進行傳輸動作。再者,這個内容 亦可以這個安全對話金鑰、利用先進加密標準(AES )進 行加密及解密動作,誠如這個先進加密標準(AES )金鑰 一樣。同樣地,對於記錄對話金鑰加密而言,Page 142 583568 V. Description of the invention (137) The data is transferred in the phase of data transfer. Moreover, this content can also use this secure conversation key to perform encryption and decryption using the Advanced Encryption Standard (AES), just like this Advanced Encryption Standard (AES) key. Similarly, for record conversation key encryption,

ErecordKey,這個ContentKey 數位權利管理(CKDRM)則 是矛》J 用 CKCMD—CREATE—FILE 及 CKCMD 一 RECORD—APPEND 這 種方法。 記錄對話金錄乃是在Ere cor dKey這些襴位中進行傳輸動 作。對於本發明的一個實施例而言,這個記錄對話金餘乃 是以這個引擎的協定公開金鑰做為這個公開金鑰、利用這 個公開金錄加密函數進行加密動作。這個公開金鑰乃是來 自這個引擎的Con tent Key數位權利管理(CKDRM )憑證。 另外,這個加密的記錄對話金鑰則可以這個引擎對應於這 個引擎的協定公開金鑰的私密金鑰、利用這個私密金鑰解 密函數進行解密動作。 對於安全對話金鑰加密而言,E s e s s i ο η K e y這個欄位則是 應用於這些ContentKey數位權利管理(CKDRM)方法,其 包括有:CKCMD—AUTHENTICATE、CKCMD—CREATE—FILE、 CKCMD—GET—CKDRM—COPY、CKCMD —GET—CKDRM—PLAY — KEY、CKCMD—GET—CKDRM—ID、CKCMD—GET—DRM — COPY、CKCMD—GET—METADATA、CKCMD—PLAY、CKCMD 一 RECORD—APPEND、CKCMD—SET—METADATA、以及CKCMD — UNLOCK_FILES。 另外,安全對話金錄可以在E s e s s i ο η K e y欄位中進行傳輸ErecordKey, this ContentKey Digital Rights Management (CKDRM) is a spear. J uses CKCMD_CREATE_FILE and CKCMD_RECORD_APPEND. The gold record of conversations is transmitted in the niches of Ere cor dKey. For an embodiment of the present invention, the record dialogue gold is encrypted with the public key of the engine as the public key and using the public key encryption function. The public key is a Content Key Digital Rights Management (CKDRM) certificate from this engine. In addition, the encrypted record conversation key can be decrypted by using this engine's private key corresponding to the engine's protocol public key and using this private key decryption function. For secure session key encryption, the Essi ο η Ke ey field is applied to these ContentKey digital rights management (CKDRM) methods, which include: CKCMD_AUTHENTICATE, CKCMD_CREATE_FILE, CKCMD_GET_ CKDRM — COPY, CKCMD — GET — CKDRM — PLAY — KEY, CKCMD — GET — CKDRM — ID, CKCMD — GET — DRM — COPY, CKCMD — GET — METADATA, CKCMD — PLAY, CKCMD — RECORD — APPEND, CKCMD — SET — METADATA, and CKCMD — UNLOCK_FILES. In addition, the security dialogue gold record can be transmitted in the E s e s s i ο η K e y field.

第143頁 583568 五、發明說明(138) 動作這個女全對活金餘乃是以這個主機的協定公開金鍮 做為公開金錄、利用這個公開金鑰加密函數以進行加密動 作二這個公開金餘乃是來自這個主機的C〇ntentKey數位權 利官理(CKDRM )憑證,藉以用於目前這個安全對話。另 外’這個加密的安全對話金鑰亦可以這個主機協定公開金 錄所對應的私密金餘、利用這個私密金鑰解密函數以進行 解密動作。Page 143 583568 V. Description of the invention (138) Action This female pair of living gold is based on the agreement public key of this host as the public record, and uses the public key encryption function to perform the encryption action. Yu Nai is the ConttentKey digital rights officer (CKDRM) certificate from this host, which is used for the current secure conversation. In addition, the encrypted secure session key can also use the private key corresponding to the host agreement public record, and use the private key decryption function to perform the decryption operation.

對於解除鎖定加密而言,本發明的一個實施例乃是以這個 ContentKey 數位權利管理(CKDRM)方法的CKCMD—UNL〇CKFor unlocking encryption, an embodiment of the present invention is CCKMD_UNLCK with this ContentKey Digital Rights Management (CKDRM) method

一FILES、利用EunlockKey這些攔位。對於這個方法而 5 ’這些解除鎖定的金餘乃是在Eunl〇ckKey欄位中進行傳 輸動作。對於本發明的一個實施例而言,這個解除鎖定的 金餘乃是以這個引擎的協定公開金鑰做為這個公開金鑰、 利用這個公開金鑰加密函數以進行加密動作。另外,這個 公開金鑰可以來自這個引擎的ContentKey數位權利管理 (CKDRM )憑證。這個加密的解除鎖定金鑰乃是以這個引 擎對應於這個引擎協定公開金鑰的私密金鑰、利用這個私 密金鑰解密函數以進行解密動作。A FILES, using these EunlockKey blocks. For this method, 5 ′ these unlocked gold balances are transmitted in the EulenckKey field. For an embodiment of the present invention, the unlocked golden balance is the public key of the engine as the public key, and the public key encryption function is used to perform the encryption operation. In addition, the public key can come from the ContentKey Digital Rights Management (CKDRM) certificate of the engine. The encrypted unlocking key is a private key of the engine corresponding to the public key of the engine agreement, and a decryption function is performed using the private key to perform a decryption operation.

再者,本發明的一個實施例包括有具備下列程式碼的清楚 常式,並且,熟習此技藝者亦可藉以得到不抵觸的任何其 他程式碼。下列這個清楚常式乃是用來做為不抵觸程^碼 的一個範例。 … / _ _ _ _ _ _ _ __________ / · —— —— ——_ —Simple Type Definition — — _________. ^Furthermore, an embodiment of the present invention includes a clear routine having the following code, and a person skilled in the art can also obtain any other code that does not conflict. The following clear routine is used as an example of non-conflicting codes. … / _ _ _ _ _ _ _ _ __________ / · —— —— ——_ —Simple Type Definition — — _________. ^

第144頁 583568 五、發明說明(139)Page 144 583568 V. Description of the invention (139)

----------------* / // CKDRM standard type definitions and bit mask definitions. // Cer t i com types ( sb — Publickey , sb—SignatureECDSA ) are defined in Cert i com headers.---------------- * / // CKDRM standard type definitions and bit mask definitions. // Cer ti com types (sb — Publickey, sb — SignatureECDSA) are defined in Cert i com headers.

TYPEDEF (U128,AES_KEY ) ; / / a 128 —bit AES key TYPEDEF (U160 ,MAC) ; / / a 160 -bit Message Authentication Code EXPOSED_METHODS definition , methods exposed by CKDRM TYPEDEF # de f i ne Certificate. (U16,EXPOSED—METHODS ); HOST_CKDRM_COPYOXOOO! / / b it 0 # de f i ne HOST. — CKDRM _PLAY0X0002/ / b it 1 # de f i ne HOST. _DRM_ COPY0X0004 / / bit 2 # de f i ne bit 3 # de f i ne bit 4 # de f i ne HOST. —READ 一 —SECURE —METADATA0X00 08 / HOST. —WRITE _SECURE_METADATA 0X0010 HOST. — CKDRM _RECORD0X0020/ / bit 5 # de f i ne HOST. — CKDRM _UNLOCK0X 0 040 / / bit 6 CKDRM_STATE definition, CKDRM permissionTYPEDEF (U128, AES_KEY); // a 128 —bit AES key TYPEDEF (U160, MAC); // a 160 -bit Message Authentication Code EXPOSED_METHODS definition, methods exposed by CKDRM TYPEDEF # de fi ne Certificate. (U16, EXPOSED— METHODS); HOST_CKDRM_COPYOXOOO! / / B it 0 # de fi ne HOST. — CKDRM _PLAY0X0002 / / b it 1 # de fi ne HOST. _DRM_ COPY0X0004 / / bit 2 # de fi ne bit 3 # de fi ne bit 4 # de fi ne HOST. —READ 1 —SECURE —METADATA0X00 08 / HOST. —WRITE _SECURE_METADATA 0X0010 HOST. — CKDRM _RECORD0X0020 / / bit 5 # de fi ne HOST. — CKDRM _UNLOCK0X 0 040 / / bit 6 CKDRM_STATE permission, CKRM

第145頁 583568Page 145 583568

五、發明說明(140) and attribute flags. TYPEDEF (U16 ,CKDRM _STATE ); # de f i ne FILE. _CKDRM —COPY _FREELY0X0001/ / bit # de f i ne FILE. — CKDRM _LOCKED0X0002/ / bit 1 # de f i ne FILE. —CKDRM _PLAY0X0004 / / b i t 2 #def ine FILE. —DRM_ COPY — FREELY0X0 0 0 8 / / b i t 3 # de f i ne FILE. — UNLIMITED — FIRST — 一GENERATION— _CK — COPIESOXOOIO / / bit 4 # de f i ne FILE UNLIMITED FIRST GENERATION DRM CQPIES0X0020 bi 氺5. Description of the invention (140) and attribute flags. TYPEDEF (U16, CKDRM _STATE); # de fi ne FILE. _CKDRM —COPY _FREELY0X0001 / / bit # de fi ne FILE. — CKDRM _LOCKED0X0002 / / bit 1 # de fi ne FILE . —CKDRM _PLAY0X0004 / / bit 2 #def ine FILE. —DRM_ COPY — FREELY0X0 0 0 8 / / bit 3 # de fi ne FILE. — UNLIMITED — FIRST — one GENERATION — _CK — COPIESOXOOIO / / bit 4 # de fi ne FILE UNLIMITED FIRST GENERATION DRM CQPIES0X0020 bi 氺

ConstantsConstants

氺 # def i ne CPICMD. _CK_ _COMMAND0X10 // CKDRM sub — command opcode definitions. # de f i ne CKDRM — _AUTHENTICATE0XF2 # def i ne CKDRM — .CREATE _FILE0XF3 # de f i ne CKDRM — •GET — —CERTIFICATE0XF4 # def i ne CKDRM — GET _ —CKDRM _COPYOXF5 # de f i ne CKDRM — _GET_ —CKDRM _ID0XF6 # de f i ne CKDRM — _GET_ —CKDRM —PLAY —KEY0XF7 # de f i ne CKDRM GET DRM COPYOXF8 第146頁 583568 五、發明說明(141)氺 # def i ne CPICMD. _CK_ _COMMAND0X10 // CKDRM sub — command opcode definitions. # De fi ne CKDRM — _AUTHENTICATE0XF2 # def i ne CKDRM — .CREATE _FILE0XF3 # de fi ne CKDRM — • GET — —CERTIFICATE 0F iXF — GET _ —CKDRM _COPYOXF5 # de fi ne CKDRM — _GET_ —CKDRM _ID0XF6 # de fi ne CKDRM — _GET_ —CKDRM —PLAY —KEY0XF7 # de fi ne CKDRM GET DRM COPYOXF8 Page 146 583568 Description of the invention (141)

# de f i ne CKDRM. —GET _DRM __PLAY _KEY0XF9 # de f i ne CKDRM. —GET—METADATAOXFA # def ine CKDRM— —PLAYOXFB # de f i ne CKDRM— _RECORD_APPENDOXFC # de f i ne CKDRM— _SET _KEYBOXOXFD # de f i ne CKDRM— _SET_METADATAOXFE # de f i ne CKDRM— —UNLOCK FILESOXFF / *------------------General CKDRM Data Structures-------------- --* / // CKDRM Certificate typedef struct { / /Bytes U16CAIdentifier ; / /0 : 1 U16CertificateFormatVersion ; //2 :3 U16CASignaturePublicKeyId ; //4 : 5 U16CryptographyVersion ; //6 :7 EXPOSED_METHODSExposedMethods ; / /8 : 9 U16Reservedl〔3〕; / /10 ·· 15 U16C〇mpany ; //16 : 17 U16Division ; //18 : 19 U16ProductLine ; //20 : 21 U16Model ; / /22 : 23# de fi ne CKDRM. —GET _DRM __PLAY _KEY0XF9 # de fi ne CKDRM. —GET—METADATAOXFA # def ine CKDRM— —PLAYOXFB # de fi ne CKDRM— _RECORD_APPENDOXFC # de fi ne CKDRM— _SET _KEYBOXOXD # de fi ne # de fi ne CKDRM— —UNLOCK FILESOXFF / * ------------------ General CKDRM Data Structures ---------------* // // CKDRM Certificate typedef struct {// Bytes U16CAIdentifier; // 0: 1 U16CertificateFormatVersion; // 2: 3 U16CASignaturePublicKeyId; // 4: 5 U16CryptographyVersion; // 6: 7 EXPOSED_METHODSExposedMethods; / / 8: 9 U16Reservedl 〔3] ; / / 10 ·· 15 U16C〇mpany; // 16: 17 U16Division; // 18: 19 U16ProductLine; // 20: 21 U16Model; / 22: 23

第147頁 583568 五、發明說明(142) U16Revision ; //24 :25 U16MetadataIdentifier ; //26 : 27 U16Reserved2〔2〕; //28 : 31Page 147 583568 V. Description of the invention (142) U16Revision; // 24: 25 U16MetadataIdentifier; // 26: 27 U16Reserved2 〔2〕; // 28: 31

Sb_Pub 1icKeyCompanySignaturePub1icKey ; //32 : 77 Sb_SignatureECDSACASignature ; //78 : 121 U128DeviceIdentif ier ; //122 :137 Sb_Pub 1icKeyProtoco1 Pub 1icKey ; //138 : 183 Sb_SignatureECDSACompanySignature ; / /184 : 227 } CKDRM_CERTIFICATE ; // CKCMD_AUTHENTICATE definitions typedef struct { / /Bytes U8HostCmd//0,value =DPICMD_CK_COMMAND U8CkSubCmd//l,value =CKCMD_AUTHENTICATE CKDRM_CERTIFICATE_C0MMAND_PACKET//2 : 241 } CKCMD —AUTHENTICATE —COMMAND—PACKET ; // CKDRM_CREATE_FILE definitions typedef struct { / /Bytes U8HostCmd ; //0,value =DPICMD_CK_COMMAND U8CkSubCmd ; //1,value =CKCMD_CREATE_FILE U16RevocationByteCount ; / /1 :3 DFSHANDLEParent ; / /4 : 7 CKDRM__STATECKDRMState ; //8 :9Sb_Pub 1icKeyCompanySignaturePub1icKey; // 32: 77 Sb_SignatureECDSACASignature; // 78: 121 U128DeviceIdentif ier; // 122: 137 Sb_Pub 1icKeyProtoco1 Pub 1icKey; // 138: 183 Sb_SignatureECDSACompanySignature; /}: // Bytes U8HostCmd // 0, value = DPICMD_CK_COMMAND U8CkSubCmd // l, value = CKCMD_AUTHENTICATE CKDRM_CERTIFICATE_C0MMAND_PACKET // 2: 241} CKCMD —AUTHENTICATE —COMMAND—PACKET; // REC_MD_Definition value = DPICMD_CK_COMMAND U8CkSubCmd; // 1, value = CKCMD_CREATE_FILE U16RevocationByteCount; // / 1: 3 DFSHANDLEParent; // 4: 7 CKDRM__STATECKDRMState; // 8: 9

第148頁 583568 五、發明說明(143) U8CKDRMCopies ; //10 U8DrmCopies ; //11 U16Reserved〔2〕; //12 : 15 AES_KEYESessionKey ; / /16 : 31 AES—KEYERecordKey ; //32 :47 MACRevocationMac ; / /48 ·· 67 MACCommandMac ; //68 :87 DFSNAMEName ; //88 :n+87 } CKCMD _CREATE _FILE _C0MMAND _PACKET ; / /CKCMD_GET _CERTIFICATE definitions typedef struct { / /Bytes U8HostCmd ; //0,value =DPICMD_CK_COMMAND U8CkSubCmd ; //1,value =CKCMD_GET__CERTIFICATE } CKDRM_GET_CERTIFICATE_COMMAND_PACKET ; / /CKCMD _GET _CKDRM _C0PY definitions typedef struct { / /BytesPage 148 583568 V. Description of the invention (143) U8CKDRMCopies; // 10 U8DrmCopies; // 11 U16Reserved [2]; // 12: 15 AES_KEYESessionKey; // 16: 31 AES-KEYERecordKey; // 32: 47 MACRevocationMac; / / 48 ·· 67 MACCommandMac; // 68: 87 DFSNAMEName; // 88: n + 87} CKCMD _CREATE _FILE _C0MMAND _PACKET; // CKCMD_GET _CERTIFICATE definitions typedef struct {/ / Bytes U8HostCmd; // 0, value = DPICMD_k_COMMANDmd8 // 1, value = CKCMD_GET__CERTIFICATE} CKDRM_GET_CERTIFICATE_COMMAND_PACKET; // CKCMD _GET _CKDRM _C0PY definitions typedef struct {/ / Bytes

U8HostCmd ; //0,value =DPICMD_CK_COMMANDU8HostCmd; // 0, value = DPICMD_CK_COMMAND

U8CkSubCmd ; //1,va 1 ue = CKCMD—GET—CKDRM—COPY U16Reserved ; //2 : 3 DFSHANDLESourceFi le ; //4 : 7 U256CKDRMId ; / /8 : 39 AES_KEYESessionKey ; / /40 : 55U8CkSubCmd; // 1, va 1 ue = CKCMD_GET_CKDRM_COPY U16Reserved; // 2: 3 DFSHANDLESourceFi le; // 4: 7 U256CKDRMId; / / 8: 39 AES_KEYESessionKey; / / 40: 55

第149頁 583568 五、發明說明(144) } CKCMD —GET—CKDRM —COPY —COMMAND —PACKET ; // CKCMD_GET_CKDRM_ID definitions typedef struct { / /Bytes U8HostCmd ; //0,va 1 ue = DP I CMD—CK—COMMAND U8CkSubCmd ; //1,value =CKCMD—GET—CKDRM—ID U16Reserved ; //2 : 3 AES__KEYESessionKey ; //4 : 19 } CKDRM —GET—DKDRM — ID —COMMAND —PACKET ; // CKCMD_GET_CKDRM_PLAY_KEY definitions typedef struct { / /BytesPage 149 583568 V. Description of the invention (144)} CKCMD —GET—CKDRM —COPY —COMMAND —PACKET; // CKCMD_GET_CKDRM_ID definitions typedef struct {/ / Bytes U8HostCmd; // 0, va 1 ue = DP I CMD-CK— COMMAND U8CkSubCmd; // 1, value = CKCMD_GET_CKDRM_ID U16Reserved; // 2: 3 AES__KEYESessionKey; // 4: 19} CKDRM —GET—DKDRM — ID —COMMAND —PACKET; // CKCMD_GET_CKDRM_PLAY_KEY definitions typedef struct { // Bytes

U8HostCmd ; //0,value =DPICMD_CK_COMMAND U8CkSubCmd ; //1,value =CKCMD_GET_CKDRM_PLAY _KEY U16Reserved ; / /2 : 3 DFSHANDLEPlayFile ; / /4 : 7 AES _KEYESessionKey ; //8 :23 } CKCMD_GET_PLAY_COMMAND_PACKET ; // CKCMD_GET_DRM_COPY definitions typedef struct { / /BytesU8HostCmd; // 0, value = DPICMD_CK_COMMAND U8CkSubCmd; // 1, value = CKCMD_GET_CKDRM_PLAY _KEY U16Reserved; / / 2: 3 DFSHANDLEPlayFile; / / 4: 7 AES _KEYESessionKey; // 8: 23} CKCMD__D_________ {/ / Bytes

U8HostCmd ; //0,va1ue = DP ICMD—CK—COMMAND U8CkSubCmd ; //1, value =CKCMD—GET —DRM—COPYU8HostCmd; // 0, va1ue = DP ICMD_CK_COMMAND U8CkSubCmd; // 1, value = CKCMD_GET —DRM_COPY

第150頁 583568Page 583568

五、發明說明(145) U16Reserved ; / /2 : 3 DFSHANDLESourceFile ; //4 : 7 AES—KEYESessionKey ; / /8 : 23 } CKCMD_GET_DRM_COPY_COMMAND_PACKET ; // CKCMD _GET__METADATA definitions typedef struct { / /Bytes U8HostCmd ; //0,value =DPICMD U8CkSubCmd ; //1,value =CKCMD U16Reserved ; //2 : 3 DFSHANDLEAssociatedFile ; //4 : AES__KEYESessionKey ; //8 : 23 } CKCMD _GET _METADATA _C0MMAND / / CKCMD _PLAY definitions typedef struct { / /Bytes U8HostCmd ; //0,value =DPICMD U8CkSubCmd ; //1 , value =CKCMDV. Description of the invention (145) U16Reserved; / / 2: 3 DFSHANDLESourceFile; // 4: 7 AES—KEYESessionKey; / / 8: 23} CKCMD_GET_DRM_COPY_COMMAND_PACKET; // CKCMD _GET__METADATA definitions typedef struct {/ / Bytes U8HostCmd; // 0 value = DPICMD U8CkSubCmd; // 1, value = CKCMD U16Reserved; // 2: 3 DFSHANDLEAssociatedFile; // 4: AES__KEYESessionKey; // 8: 23} CKCMD _GET _METADATA _C0MMAND // // CKCMD _PLAY definitions typedef struct {/ mds UByte // 0, value = DPICMD U8CkSubCmd; // 1, value = CKCMD

_CK_ GET_CK_ GET

COMMAND METADATA PACKET ;COMMAND METADATA PACKET;

CK —COMMAND PLAY « U16Play0pti〇ns ; //2 :3, definitions below DFSHANDLEPlayFi le ; / /4 : 7 U64Byte0ffset ; //8 : 15 U64ByteC〇unt ; / /16 : 23 AES__KEYESessionKey ; / /24 · 39 see bit fieldCK —COMMAND PLAY «U16Play0pti〇ns; // 2: 3, definitions below DFSHANDLEPlayFi le; // 4: 7 U64Byte0ffset; // 8: 15 U64ByteC〇unt; // 16: 23 AES__KEYESessionKey; // 24 · 39 see bit field

第151頁 583568 五、發明說明(146) AES—KEYEPlayKey ; //40 : 55 } CKCMD—PLAY—COMMAND—PACKET ; // P 1 ayOp t ions bit fields. #define PLAY_STREAMING0X0001 / / bit 0 #define PLA Y _TO _EOF 0 X 0 0 0 2 / / bit 1 // CKCMD__RECORD_APPEND definitions typedef struct { / /Bytes U8HostCmd ; //0,value =DPICMD_CK_COMMAND U8CkSubCmd ; //1,value =CKCMD_RECORD_APPEND U16Record0ptions ; //2 :3, see bit field definitions below DFSHANDLERecordFile ; //4 : 7 U64ByteC〇unt ; //8 : 15 AES_KEYESessionKey ; / /16 : 31 AES—KEYERecordKey ; //32 :47 } CKCMD_RECORD_APPEND_COMMAND_PACKET ; // RecordOpt ions bit fields. #define RECORD_FOREVEROXO001 / / bit 0 // CKCMD_SET_KEYBOX definitions typedef struct { / /BytesPage 151 583568 V. Description of the invention (146) AES—KEYEPlayKey; // 40: 55} CKCMD—PLAY—COMMAND—PACKET; // P 1 ayOp t ions bit fields. #Define PLAY_STREAMING0X0001 / / bit 0 #define PLA Y _TO _EOF 0 X 0 0 0 2 / / bit 1 // CKCMD__RECORD_APPEND definitions typedef struct {/ / Bytes U8HostCmd; // 0, value = DPICMD_CK_COMMAND U8CkSubCmd; // 1, value = CKCMD_RECORD_APPEND U16Record0ptions; // 2: 3, see bit field definitions below DFSHANDLERecordFile; // 4: 7 U64ByteC〇unt; // 8: 15 AES_KEYESessionKey; // 16: 31 AES—KEYERecordKey; // 32: 47} CKCMD_RECORD_APPEND_COMMAND_PACKET; // RecordOpt ions bit fields. #define RECORD_ / FOREVEROX001 bit 0 // CKCMD_SET_KEYBOX definitions typedef struct {/ / Bytes

第152頁 583568 五、發明說明(147) U8HostCmd ; //0,value = DP I CMD _CK _COMMAND U8CkSubCmd ; //1,value = CKCMD _SET _KEYBOX U16Reserved ; //2 : 3 DFSHANDLEAssociatedFi le ; //4 :7 } CKCMD—SET—KEYBOX—COMMAND—PACKET ; // CKCMD_SET_METADATA definitions typedef struct { / /Bytes U8HostCmd ; / /0,va1ue = DP ICMD_CK_COMMAND U8CkSubCmd ; //1,value = CKCMD—SET—METADATA U16Reserved ; / /2 ·· 3 DFSHANDLEAssociatedFi le ; //4 :7 AES _KEYESessionKey ; //8 :23 } CKCMD_SET_METADATA_COMMAND_PACKET ; TYPEDEF (CKCMD —SET —METADATA —COMMAND —PACKET, sCKCMD _SET_METADATA _C0MMAND _PACKET ); // CKCMD_UNLOCK_FILES definitions typedef struct { / /Bytes U8HostCmd ; / /0 , value =DPICMD_CK_COMMAND U8CkSubCmd ; //1,value =CKCMD_UNLOCK_FILES U16FileCount ; / /2 : 3 U16Reserved〔2〕; //4 : 7 AES_KEYESessionKey ; //8 : 23Page 152 583568 V. Description of the invention (147) U8HostCmd; // 0, value = DP I CMD _CK _COMMAND U8CkSubCmd; // 1, value = CKCMD _SET _KEYBOX U16Reserved; // 2: 3 DFSHANDLEAssociatedFi le; // 4: 7 } CKCMD_SET_KEYBOX_COMMAND_PACKET; // CKCMD_SET_METADATA definitions typedef struct {/ / Bytes U8HostCmd; // 0, va1ue = DP ICMD_CK_COMMAND U8CkSubCmd; // 1, value = CKCMD_SET_METADATA U16Reserved; / / 2 · · 3 DFSHANDLEAssociatedFi le; // 4: 7 AES _KEYESessionKey; // 8: 23} CKCMD_SET_METADATA_COMMAND_PACKET; TYPEDEF (CKCMD —SET —METADATA —COMMAND —PACKET, sCKCMD _SET_METADATA _C0MMD_FILE_Byte_def_Bytes // Bytes_def_bytes; // Bytes_definition_Parameters} ; / / 0, value = DPICMD_CK_COMMAND U8CkSubCmd; // 1, value = CKCMD_UNLOCK_FILES U16FileCount; / / 2: 3 U16Reserved 〔2〕; // 4: 7 AES_KEYESessionKey; // 8: 23

第153頁 583568Page 153 583568

U128EMediaId ; / /24 : 39 MACDataMac ; //40 : 59U128EMediaId; // 24: 39 MACDataMac; // 40: 59

} CKCMD一UNLOCK一FILES一COMMA ND PACKET 利用一個伺服器執行的方法 一 本發明的另一個實施例乃是有關於伺服器及其他 如:播放器)間的互動。因此,這個安全電子内容(諸 )系統可以包括有伺服器及主機及引擎間的互動,} CKCMD_UNLOCK_FILES_COMMA ND PACKET Method executed by a server 1 Another embodiment of the present invention is related to the interaction between the server and others (such as a player). Therefore, this secure electronic content system can include the interaction between the server and the host and the engine.

安全内容進行解除鎖定及表現等動作。另外,上述胃从對 ConterUKey數位權利管理(CKDRM) 、DatapUy檔幸的 (DFS)、以及第三者數位權利管理(TpDRM)亦田可以糸、/先 互動,藉以在一個安全環境中對内容進行解除鎖定2行 请參考第23A圖,其乃是用來提供伺服器、主機 乍。 間互動的一個實施例的一個系統架構圖。如 ^ ::司服器(諸如一個數位情報交換飼服器2394 )斤:是: 由.、、罔路啟動的通信連線2 3 6〇以與一個電子零售商 、、二 進行互動、並且會同時經由一個、全存取通 <•2334以與連接一個個人電腦(pc ) 2398的一個裝置進行The security contents are unlocked and displayed. In addition, the above mentioned parties can also interact with ConterUKey Digital Rights Management (CKDRM), DatapUy (DFS), and Third Party Digital Rights Management (TpDRM) to perform content in a secure environment. Unlock 2 lines, please refer to Figure 23A, which is used to provide the server and host. A system architecture diagram of an embodiment of the interaction. For example, ^: Serving device (such as a digital information exchange feeding device 2394): It is: a communication connection initiated by. ,, Kushiro, 2 3 60 to interact with an electronic retailer, and, and Will be performed simultaneously via a Full Access < 2334 to a device connected to a personal computer (pc) 2398

接這個個人電腦(pc) 23 98的裝置乃是透過-個 、,罔路劍Λ器2318以自伺服器2394接收通信訊自,直中,一 個CKU用戶端2322乃是用來接收這個通信訊另外,這 ::路丨劉覽器2318更包括有一個電子零售商( — Μ) 2354 I! : t動態網頁,其乃是用來接收一個應用祠服器 54的k號。應用伺服器2354,在本發明的一個實施例 ,更包括有一個標文件標記語言(HTML )及一個圖形化The device connected to this personal computer (pc) 23 98 is to receive communication messages from server 2394 through a computer, Kushiro sword Λ device 2318. In the middle, a CKU client 2322 is used to receive this communication message. In addition, this :: 路 丨 刘 档 器 2318 further includes an electronic retailer (—M) 2354 I!: T dynamic webpage, which is used to receive the k number of an application server 54. The application server 2354, in an embodiment of the present invention, further includes a document markup language (HTML) and a graphic

583568 五、發明說明(149) 使用者界面(GUI)產生器物件、_個 件2338、一個消費者管理物件2344、一個對’、不及1價物 2346、一個信用卡授權物件2348、—個數位官,物件 器(DCS)界面2352、及一個資料庫連接層,;:父換二服 應用伺服器2354輕接至複數個資料庫235 6错此以將=個 2356及這個應用伺服器2354乃是這個電子零個貝枓庫 J子零售商(eTaUer)網路商店店面2:二那以: 2362、及一個對話及交易資 Π。疋價-貝料庫 所瞭解,然而,這個電子;1: 6T4:广如、熟習此技藝者 τ丄- 电于+售商(eTailer)網路商庙迮 面中的貧料庫乃是根據設計需求、並且可 物件及資料庫。請參考連接至 電腦(pc) ^裝置,如上所述,這個連接至這個個人 通道2334以、車Ϊ内的網頁瀏覽器乃是透過一個安全存取 、 至一個伺服器,諸如:數位情報交換伺服 = 2394。廷個網頁劉覽器2318更進一步透過一個安全存取 ^逼2316而連接至一個萬用序列匯流排)驅動程式 济』:亦會根據一個安全存取協定以將這個萬用序列匯 ^ 驅動程式2 31 2連接至一個萬用序列匯流排 敬/B )埠/亚連接至耦接於一個裝置2304内部的一個引 =3 0 6。坆個裝置23〇4乃是耦接至媒體㈡⑽。這個萬用序 、雨匯流排(USB)驅動程式2312並不是僅僅透過安全存取 k逼2316、並且亦可以透過一條信號線2313以耦接至_個 第155頁 583568 五、發明說明(150) 可安裝標案系統(IFS ) 2314。這個可安裝檔案系統(IFS )2314乃是耦接至一個自動執行處置2328 (如說明書所述 )以及一個内容管理裝置232 6。内容管理裝置乃是;來接 收這個可安裝檔案系統(IF S )及這個自動執行處置2 3 2 8 的信號、並且亦可以提供這個内容管理裝置2 3 2 6所管理的 内容至這個網路瀏覽器2 3 1 8。這個伺服器2 3 9 4 (其同時透 過信號線236 0及信號線2334以接收信號)乃是用來利^ ^ 個網路環境中的超文件傳輸協定(HTTp )或其他適當協 定’藉以同時與這個電子零售商(eTailer )網路商^店 面23 9 6及連接這個個人電腦(pc ) 2398的裝置進行通俨動 作。將這個應用伺服器2354耦接至這個數位情報交 二3= Ϊ IS Ϊ號線2360乃是用來接收一個情報交換伺服 為23 9 9中一個電子零售商(eTailer)界面2382的作 =位=交”服器2394係包括有一個情報交換;服 23 99。·另外,t月報交換伺服器23 99包括有這個電子突隹 商(eTailer )界面2382,藉以與複數個資料 令一13 個套裝軟體資料庫2386、一個消費者及電子零售商匕栝一 (eTaUer)資料庫2388、一個消費者資料庫 個對話及交易資料庫2392 )進行通信動作。 情報交換伺服器2399中亦包括有一個备#泣a ^ =。這個情報交換™9乃;: = = 整合心 裝軟體。另外,在整合物件2376中亦包括二== 第156頁 583568 五、發明說明(151) 或應用程式界面(AP I ) 2 3 7 8。通信協定物件乃是耦接至 一個CKU原版影片製作伺服器2368及這個情報交換伺服器 2399内部的套裝軟體資料庫2386。另外,CKU原版影片製 ,伺服器2368乃是位於這個内容金鑰伺服器23 74内部。内 容金,伺服器2374至少包括有一個金鑰補數資料庫237〇及 们又易資料庫2 3 7 2,其分別耦接至這個c κ υ原版影片製 作伺服斋2 3 6 8。再者,CKU原版影片伺服器2 3 6 8更進一步 f接至一個CKU伺服器2366,其乃是透過信號線2334以盥 這個個人電腦(PC ) 23 98的裝置内的這個c〇用戶端 2 3 2 2進行通信動作。 第23B圖乃是以一個創作角度描述一種程583568 5. Description of the invention (149) User interface (GUI) generator object, _piece 2338, a consumer management object 2344, a pair of, less than 1 value 2346, a credit card authorization object 2348, a digital officer , Object server (DCS) interface 2352, and a database connection layer ;: parent to second server application server 2354 lightly connected to a number of databases 235 6 wrong this will be = 2356 and this application server 2354 is This electronic zero-beauty library J e-retailer (eTaUer) online store storefront 2: two and so on: 2362, and a dialogue and transaction information. The price is understood by the shell material warehouse, however, this electron; 1: 6T4: Guang Ru, who is familiar with this skill τ 丄-The poor material warehouse in the e-tail + e-tailer network merchant temple is based on Design requirements, and objects and databases. Please refer to the connection to a computer (pc) ^ device. As mentioned above, the connection to this personal channel 2334, the web browser in the car is through a secure access to a server, such as a digital information exchange server = 2394. This web page browser 2318 further connects to a universal serial bus through a secure access ^ driver 2316) driver: it will also assemble this universal serial ^ driver according to a secure access protocol ^ 2 31 2 is connected to a universal serial bus / B) port / sub-connected to a lead coupled to a device 2304 = 3 0 6. A device 2304 is coupled to the media. This universal sequence, rain bus (USB) driver 2312 is not only for securely accessing k 2323, but also for coupling to a _ page 155 583568 via a signal line 2313. 5. Description of the invention (150) Installable bidding system (IFS) 2314. The installable file system (IFS) 2314 is coupled to an automatic execution process 2328 (as described in the instruction manual) and a content management device 2326. The content management device is; to receive the signal of the installable file system (IF S) and the automatic execution processing 2 3 2 8, and also provide the content managed by the content management device 2 3 2 6 to this web browser器 2 3 1 8. This server 2 3 9 4 (which receives signals through signal line 2360 and signal line 2334 at the same time) is used to facilitate the use of Hyper File Transfer Protocol (HTTp) or other appropriate protocols in the network environment. Communicate with this e-tailer (eTailer) online store ^ 23 6 and a device connected to this personal computer (pc) 2398. The application server 2354 is coupled to the digital information. 3 = Ϊ IS Ϊ Line 2360 is used to receive an information exchange servo for an electronic retailer (eTailer) interface 2382 in 23 9 9 = bit = The server 2394 includes an information exchange server; the server 23 99. In addition, the t-monthly report exchange server 23 99 includes the eTailer interface 2382, so that 13 software packages can be ordered with a plurality of data. Database 2386, a consumer and electronic retailer eTaUer database 2388, a consumer database, a dialogue and transaction database 2392) for communication actions. The information exchange server 2399 also includes a backup # Weep a ^ =. This information exchange ™ 9 is;: = = Integrated heart-worn software. In addition, 2376 is also included in the integrated object 2376 == Page 156 583568 V. Description of the invention (151) or application program interface (AP I ) 2 3 7 8. The communication protocol object is coupled to a CKU original video production server 2368 and the package software database 2386 inside this information exchange server 2399. In addition, the CKU original video production server 2368 is It is located inside this content key server 23 74. The content key, server 2374 includes at least a key complement database 2370 and another easy database 2 3 7 2 which are respectively coupled to the original version of c κ υ Video production server 2 3 6 8. Furthermore, the original CKU video server 2 3 6 8 is further connected to a CKU server 2366, which is connected to the personal computer (PC) 23 98 through a signal line 2334. The co client 2 3 2 2 in the device performs a communication action. Figure 23B depicts a process from a creative perspective.

=,:230。。方塊231〇乃是用來編寫内容曰,藉:利用 項,:谷提供者(其在方塊232〇中具有包括次要内容的選 行解;nt始購買後的某個時點、經由這個消費者進 這個動Γ &媒體上進行原版影片製作動作。倘若 上的解除鎖,^括有次要内容’則方塊2350便會將媒體 容,則=:2谷散佈。倘若這個媒體上包括有次要内 中、在便會包括有—個金鑰,其乃是在方塊2330 鎖定内;進行原版影片製作以得到。㈢此,具有 個金鑰補:!為這個媒體上各個鎖定槽案輸出-裝軟^ Τ)思即,这些金鑰補數(伴隨著關連的供應套 側面二丨::播案系統(DFS)檔案處置、及媒體 加入至)便可以在方塊234G中加以收集及 王金鑰補數貧料庫,其僅僅能夠透過這個 第157頁 583568= ,: 230. . Box 231〇 is used to write content, borrow: use item ,: Valley Provider (which has a choice of solutions including secondary content in box 232; Enter this action to perform the original film production action on the media. If the unlocking on the media includes secondary content, then block 2350 will distribute the media content, then = 2 valleys. If this media includes secondary In the middle, there will be a key, which is locked in the block 2330; the original video production is made to get it. Therefore, there is a key supplement:! Output for each lock slot on this media- Installation software ^ Τ) That is, these key complements (with side two of the associated supply set 丨 :: DFS file processing, and media additions) can be collected in the box 234G and Wang Jin Key complement poor library, which can only pass through this page 157 583568

CKU原版影片t作伺服器進行存取動作。 根據本明的-個實施例,媒 器係設定為-個原版影片製作程序的部;換:”的飼服 施例中做為-個飼服器及媒體的一個設定程t在其他實 考第24圖,其乃是-個流程:特 旎夠付到一個安全資料庫及一個媒體 猎以表示一個 片設定程序。這個情報交換利服4料=媒體碟 圖乃:用來提供一種設定一個情報交換;類:,構流程 法。特別是’這個程序乃是由方塊2402門私服器的方 是用來讓-個内容提供者能夠在一個採』:床Τ塊2404乃 示的"資產及資訊採購"程序)中, ^序(諸如:圖 至這個伺服器。在這個採購程序中Ϊ有=f的—個新版本 内容標案、元資料資訊、有的那些補數包括: 集資料(倘若有所ί要)貝=:訊、以及套裝軟體收 定類型或類別内容連結的檔案。$些内容曰與-個特 的一個實施例中,亦可以包括有一個適田^在本發明 器(⑶dec)。另夕卜,元資料資訊包括有田伴/體—編碼解碼 内容的任何元件說明,諸如:圖形或歌古/。通者一個槽案 個實施例中’這個元資料乃是屬於 明的— 發明的其他實施例中’這種格式則可:構化格式。在本 者加以決定。再者,本發明的-個實施例::的内容提供 (Per—track)或逐片(per—album)二要求以逐執 這個資料保全資訊乃是指消費者與内容;;供元資料。 規則。舉例來說,這枷咨却可„幻虹丄^動方式的管理 583568 五、發明說明(153) 第,者數位權利管理(TPDRM) &c〇ntentKey數位 理(CKDRM)夫見則。另夕卜,這個廢止表列可以由— 提供者加=定義、並且可以包括有一個表列的播放器裝谷 置、播放1§應用程式、及已經廢止的伺服器。另外,^、二 些由-個内容提供者所接收的元件中亦會包 = =理⑽M)規則,藉以對消f者提供有關播放及複^崔内利 谷的限制。另外,這些數位權利管理(DRM )規則亦可以 包括有其他細f,藉以使原版影片製作程序能夠瞭解需要 啟始鎖定的那些構案。另外,在方塊湖中亦包括 軟體U資訊’藉㈣定次要内容應該如何進行群組動' 作、及次要内容應該如何表現給這個使用者。 方,2—408乃是有關於一種編寫程序,其可以透過 或第二者加以完成。特別是,這個編寫程序亦包括有:將 一個内容提供者所接收的所有檔案,根據預定規格加以套 裝軟?的動作。在本發明的一個實施例中’目錄乃是利用 下列貧料加以建立,其包括有:Θ容檔案(編碼過的)、 目錄結構、内容管理裝置、aut〇run inf、及 contents.ddl 〇The original CKU video acts as a server for access. According to one embodiment of the present invention, the media device is set as a part of the original movie production program; change: "in the feeding embodiment, as a setting process of a feeding device and the media, in other practical tests Figure 24, which is a process: can pay a security database and a media hunt to indicate a film setting procedure. This information exchange service 4 material = media disc map is used to provide a setting a Type of information exchange; class: method of construction. In particular, 'this program is used by the 2240 private server to enable a content provider to collect in one': "Block 2404 is the" asset " And information procurement " procedures, ^ sequence (such as: map to this server. In this procurement procedure, there are = f of a new version of the content project, metadata information, and some of the complements include: Data (if required): =, news, and files linked to the type or category of the software package. Some of these contents are described in a specific embodiment, which can also include a Shida ^ In this Inventor (⑶dec). In addition, metadata information Include Arita companion / body-encoding description of any element of the content, such as: graphics or song ancient. In one embodiment, the "this metadata is clear-in other embodiments of the invention" The format can be: a structured format. The decision is made by the author. Furthermore, one embodiment of the present invention: Per-track or per-album is required to perform this data preservation one by one. Information refers to consumers and content; supply metadata. Rules. For example, this service can be managed in a magical way 583568 V. Description of the invention (153) Number one, Digital Rights Management (TPDRM) ) & c〇ntentKey Digital Principles (CKDRM) see the rules. In addition, this revocation list can be defined by —provider plus =, and can include a list of players to install, play, and play 1§ application Programs, and servers that have been discontinued. In addition, ^, two components received by a content provider will also include the == rule ⑽M) rule, in order to provide the relevant players with playback and replay ^ Cui Neli Valley restrictions. In addition, these digital rights management (DRM) rules can also include other details, so that the original film production process can understand the constructions that need to be initially locked. In addition, the cube lake also includes software U-information, 'how to determine the secondary content should be grouped', and how the secondary content should be presented to this user. Fang, 2-408 is about a writing procedure, which can be done by or second party. In particular, this writing procedure also includes: package all files received by a content provider according to a predetermined specification? Actions. In one embodiment of the present invention, the 'directory is created using the following materials, which include: Θ capacity file (encoded), directory structure, content management device, aut〇run inf, and contents.ddl 〇

k個内谷官理裝置包括有:用來將内容或媒體呈現給消費 者的檔案(諸如:一個可執行、it你網站、或這個内容提 供^所定義的某種形式)。這個autommf乃是用來啟 動這個内合,理衣置。這個乃是儲存在一個 公用區域,藉以用於任何數位版管理(DRM )中。另外, 這個c〇ntents.ddi亦可以包括有一個套裝軟體收集、廣The k inner valley official management devices include: files used to present content or media to consumers (such as an executable, it's your website, or some form defined by the content provider ^). The autommf is used to start the internal integration and management. This is stored in a common area for any digital edition management (DRM). In addition, this cnntents.ddi can also include a software package

第159頁Chapter 159

JOJJOO 五、發明說明(154) 告、及庫存單位(SKlJ ) 此 口 一個或更多個檔案。、 壯二庫存早位(SKU )可以參照 實施例中,乃是所有=固套,軟體收集,在本發明的一個 識別碼(PCID )。另二要、内容或媒體一側的一個獨一無二 一個或更多個廣告 _,,套裝軟體收集亦可以包括有 個套裝軟體收集):固、關係(舉例來說,參照於一 編寫程序係包括有提=者,方塊24 1 0則是用來說明··部分 資料描述語言量記憶體檔案(MMF) 擋案間的關係。 檔案的動作,藉以說明内容及資產 另外,方塊2412乃县六a μJOJJOO V. Description of the Invention (154) Notice and Storage Unit (SKlJ) One or more files. The early inventory (ZKU) of Zhuang Er can be referred to in the embodiment, but it is all = fixed, collected by software, an identification code (PCID) in the present invention. Another one, one or more advertisements on the side of the content, or media, packaged software collection can also include a packaged software collection: solid, relationship (for example, referring to a writing program includes Note: Box 24 1 0 is used to explain the relationship between some data description language volume memory files (MMF) files. The actions of the files are used to explain the content and assets. In addition, box 2412 is the county six a μ

),用來開始進行一個編寫程序後(如方塊2408所述 先錄製程序係、包括 預先錄製的程序。特別是,這個預 2414 乃是指二 Ϊ^^Ι2414、2416、及2418。旗標 einenuH1函數’其中,稱為 亦^庫。另★,這俯e —ent.ddi檔案 別石^ / L套裝軟體收集識別碼。這個套裝軟體收集識 個實施例中,係包括有-個完整㈣ 二名私:一個檀案處置、一個金錄補數(其可以是一 制π & ),兀的)、及一個金鑰版本。另外,這個預先錄 ^二序更匕括有:沿著一個檔案傳送⑶ntents. d(H (其乃 、爲寫転序中產生)的一個函數。這個檔案 jents· dd 1 241 6,隨後,係輸入至下一個程序(即: 一 套裝軟體程序)中。這個預先錄製程序2412的另 個部分乃是一個DataPlay媒體原片影片製作程序,其 第160頁 583568 五、發明說明(155) 中’檔案係設定在-個磁帶上。特別是 作檔案設定乃是在方塊2418中產生,其乃B上 進行儲存及傳达動作’根本發明的一個實施例。另外咿在 ,這個原版影片製作槽案亦可以位 於另一種類型的媒體上。各個原版影片製作栌 指一個媒體碟片上的單一側,根據本發明—個與 另外,方塊2420 (如圖中所示)乃是輕接至這個貝也J。 co^knts· fdi 方塊241 6 及這個KeyC〇mp〇nent· 方塊 金論H : - T ^2420特別是指一個原版影片製作伺服器 哭#1 ^疋^ ,其亦可以稱為一個數位情報交換伺服 =又疋壬,y、有關於連結安全資料庫的資料遷移。這個 製作伺服器金餘補數設定程序期乃是用來載入 一個金餘映射資料庫的表格,藉以使這些表格能 三/1:欠迈些1^7(:〇1111)01^1^.(1(11及。〇1^61^.(1(11檔案中指 广& D貝料以進行載入動作。這個方塊2418 (在磁帶上的 原版影片製作標案設定)係搞接至這個預先錄製 2 (如圖中所示)。特別是,在一個磁帶程序2418 ^的這個原版影片製作槽案設定乃是指:產生一個或更多 恭日日^原版影片” ’倘若這個媒體是一個光碟的話.。在本 二個ϋ他實施例中’這個原片影片製作檐案設定將會在 *的媒體類型上進行原版影片製程程序。另外,在 或^夕Γ二個實施例中’玻璃原版影片乃是用來產生一個 二Τ ’娀Γ機。隨後’戳印機便可以用來大量生產媒體 、政佈或供應以進行買賣。在此,這個戰印程序 583568 五、發明說明(156) ' 乃是一個製造程序。 ,在請參考第25圖及第23B圖,其乃是利用一個流程圖以 况明一個設定程序,藉以設定這個電子零售商(eTai ler )。請參考第23B圖,這個電子零售商(eTaUer )網站商 店店面2396,如圖中所示,係包括有一個應用程式伺服器 2354及資料庫2356。第25圖乃是用來說明這個程序的設定 動作。特別是,這個程序乃是由方塊25〇2開始。隨後,方 ,2504乃是用來說明:這個内容提供者套裝軟體係加以設 定、且與一個套裝軟體定義相關的一個改變程序係開始進 行。這個電子零售商(eTailer)通常會需求一個套裝軟 體收集的庫存單位(SKU)以用於稽核目的及其他目的、 並且亦可以不使用一個套裝軟體收集識別碼(如先前所述 )。再者,這個套裝軟體收集識別碼乃是透過一個全球資 源定位器(URL )傳送至一個電子零售商(eTaUer )、並 且這個電子零售商(e T a i 1 e r )亦會繼續持有這個識別 碼’直到其傳送給一個數位情報交換伺服器。在本發明的 一個實施例中,這個電子零售商(eTailer )會拋棄這個 套裝軟體收集識別碼。這個内容提供者(如先前所述)則 會將Contents.ddl (請參考第24圖所述)、並且在方塊 2508及2506中將欲成為套裝軟體呈現一部分的任何圖形, 供應給這個電子零售商(eTailer)。如圖中所示,方塊 2506及2508乃是耦接至方塊2510,其亦即電子零售商 (eTai ler )的套裝軟體及定價設定及改變程序”定價定義 π。特別是’待一個内容提供者供應可利用的套裝軟體), Used to start a writing program (such as the pre-recorded program system described in block 2408, including pre-recorded programs. In particular, this pre-2414 refers to the two ^^ 2414, 2416, and 2418. Flag einenuH1 The function 'of which is also called ^ library. Another ★, this is the e-ent.ddi file 石 / L set of software collection identification code. In this embodiment of the set of software collection identification, including a complete ㈣ two Private: a Tan case disposal, a gold record complement (which can be π &), and a key version. In addition, this pre-recorded second sequence further includes: transmitting a function of CDntents. D (H (which is generated in the writing sequence) along a file. This file jents · dd 1 241 6 and then, Enter to the next program (that is, a software program). The other part of this pre-recorded program 2412 is a DataPlay media original film production program, which is on page 160 583568 V. Description of the invention (155) 'File It is set on a magnetic tape. In particular, the file setting is generated in block 2418, which is an embodiment of the fundamental invention of performing storage and transmission actions on B. In addition, this original film production slot is also Can be located on another type of media. Each original film production refers to a single side on a media disc. According to the present invention—one and another, the block 2420 (shown in the figure) is a light access to this beyer J Co ^ knts · fdi block 2416 and this KeyC〇mp〇nent · block gold theory H:-T ^ 2420 especially refers to an original video production server cry # 1 ^ 疋 ^, which can also be called a digital intelligence cross Servo = again, y, there is data migration about the connection security database. The process of setting up the balance of the server is to load a table of the balance mapping database, so that these tables can / 1: Some 1 ^ 7 (: 〇1111) 01 ^ 1 ^. (1 (11 and .〇1 ^ 61 ^. (1 (11 file refers to Canton & D) for loading action. This Box 2418 (the original film production project setting on the tape) is connected to this pre-recording 2 (as shown in the figure). In particular, the original film production slot setting in a tape program 2418 ^ refers to : Generate one or more congratulations ^ Original movie "" If this media is a CD-ROM ... In this two other embodiments "The setting of this original movie production eaves will be set on the media type * The original film production process. In addition, in the two embodiments, the 'glass original film' is used to generate a two T '娀 Γ machine. Subsequently, the' stamp machine 'can be used to mass produce media, government or Supply for trading. Here, this war-printing program 583568 V. Invention Ming (156) 'is a manufacturing process. Please refer to Figure 25 and Figure 23B, which use a flowchart to explain a setting procedure to set up the e-tailer. Please refer to Figure 23B, the e-retailer (eTaUer) website store storefront 2396, as shown in the figure, includes an application server 2354 and a database 2356. Figure 25 is used to explain the setting action of this process. In particular, the process starts at block 2502. Subsequently, Fang 2504 is used to explain that the content provider package software system is set and a change program system related to the definition of a package software begins. This e-tailer (eTailer) usually requires a storage unit (SKU) collected by the package software for auditing and other purposes, and may also collect the identification code without using a package software (as described earlier). Furthermore, the identification code collected by the software package is transmitted to an e-retailer (eTaUer) through a global resource locator (URL), and the e-retailer (e T ai 1 er) will continue to hold the identification code 'Until it is transmitted to a digital information exchange server. In one embodiment of the invention, the e-tailer (eTailer) will discard the software package to collect the identification code. The content provider (as described earlier) will supply Contents.ddl (see Figure 24) and any graphics that will be part of the package presentation in blocks 2508 and 2506 to this e-retailer (ETailer). As shown in the figure, blocks 2506 and 2508 are coupled to block 2510, which is the e-tailer's software package and pricing setting and change procedure "pricing definition π. In particular, 'to be a content provider Available package software

illill

583568 五 、發明說明(157)583568 V. Description of the invention (157)

後,這個電子零售商(eTai ler )便可以設定其定價角 色。利用套裝軟體、定價、及套裝軟體呈現料以架構一個 資料庫的細節係可以由一個電子零售商(eTailer )完整 地定義、並且亦可以與一個既存的"購物車”及//或這個電 子零售商(eTai ler )的目錄維護功能彼此相符。除了定 價以外,在本發明的一個實施例中,一個電子零售商 (eTailer )亦可以選擇指定扣折模型及廣告規格。舉例 來說’一個客戶可以選擇一個套裝軟體並搭配以適合這個 消費者的一個廣告。如圖中所示,方塊2 5丨〇乃是耦接於資 ,^2512、電子零售商(eTailer)安全資料庫套裝軟體、 定價及呈現表格,即:這個電子零售商(eTai Ur )資料 庫设疋的末端產品。方塊2512所示的這個電子零售商 (eTailer )安全資料庫表格即是第23β圖中的套裝軟體及 =貧料庫2352、並且亦可以進一步包括有消費者資 Ζ 3 5 8 〇 ΐ ^ f乃疋攸一個消費者的觀點,說明對内容進行解除鎖 =個交易。特別是,程序2_乃是在方塊261〇 收、黑立从,供應呈現給一個消費者。方塊2620乃是用來接 鎖定二总么、件以進订解除鎖定動作。舉例來說’一個解除 鎖疋父易的條株可θ ^ τ 2630 7¾ e % 件 疋提供付款及/或統計資料。方塊 金鑰補鉍夺 们女全鐘別通道(SAC) ’藉以傳送這個 這個料寫入這個Jf例來說。隨後個引擎便會將 改變為解除鎖定狀:,以將這個内容的狀態由鎖定狀態Then, the e-tailer (eTailer) can set its pricing role. The details of using a software package, pricing, and software package to structure a database can be fully defined by an e-tailer (eTailer), and can also be used with an existing " shopping cart "and / or the electronic ETailer's catalog maintenance functions are consistent with each other. In addition to pricing, in one embodiment of the present invention, an electronic retailer (eTailer) can also choose to specify discount models and advertising specifications. For example, 'a customer You can choose a package software and match it with an advertisement suitable for this consumer. As shown in the figure, box 2 5 丨 〇 is coupled to the asset, ^ 2512, eTailer security database package software, pricing And the presentation form, that is: the end product of the eTai Ur database. The eTailer security database table shown in box 2512 is the software package and the poor in Figure 23β The material bank 2352, and may further include consumer information. Z 3 5 8 〇 f In addition to lock = a transaction. In particular, program 2_ is received at block 2610, black stand-by, and the supply is presented to a consumer. Block 2620 is used to pick up the two locks and pieces to unlock the action. . For example, 'a unlocked father-ease strain can θ ^ τ 2630 7¾ e% pieces to provide payment and / or statistics. The block key supplements the Bisexual Women ’s All-Party Channel (SAC)' to transmit This material is written into this Jf example. Then the engine will change to unlock state: to change the state of this content from the locked state

發明說明(158) 請參考第27圖, 2700。這自使用者=來表示一個範例的使用者界面 士:以包括有一個使用者網,服器產生、並 決定不要在這個媒、、 稭以讓使用者能夠 倘若這個使用者選擇入時呈現出部分類型的供應。 示,這個使用==需,產生-個註記。如圖中所 個實施例。特別^ 、乃疋用來啟動解除鎖定交易的一 有超連結的:頁諸:個:用者界面27。。亦可以是-個具 以輸入必要資訊以& :使用者指向一個啟動中心、藉 另外,在這個網頁I亦:括的超連結273°。 指示271。,因為這個界面同或解譯的狀態 案。倘若這個媒體上沾一 7可已括有鎖定及解除鎖定的檔 購買2750的超連結便合固檔f係鎖定狀態,則一個指向 的檔案而言,這個$ ^ ^給廷個使用者。對於解除鎖定 以讓使用者能。= = = 個超連結,藉 這個安全電子内容(SEC \體上的-個選取片段。 共同工具元件的—個架構^的料^定部分乃是幾個 版影片製作丄:解;:;::”;具以對次要的原 版影片製作内容乃是儲户—動作,其中,這個次要的原 明的一個實施例,在這=製的媒體上。根據本發 ㈣器平台獲得富定’藉以同時在用戶端及 田有弹性選擇。另外,根據本發明的一個 583568 五、發明說明(159) 實施例,這些通信協定亦可支援各種商業模 鎖定及情報交換動作,苴可以名 :、大以用於解除 、勒具可以在不同的相關元件位琶上旦 有不同的元件。第2δ圖乃是用來表示第2 件、 間連接關係的一個實施例、及這個 口/各個兀件 系統的-個更寬廣觀點 、们…子内容(SEC) 如第28圖所示,這個解除鎖定系包括有一 一個原版影片製作伺服哭的資料瀋.,^ ^ 一 MJ服的貝科庫。在本發明的一個實施 J中’這些麵接至這個原版影片製作飼服器的資料庫包括 有-個金鑰,數資料庫281。、—個交易t料庫m。、及一 ,止表歹J貝料庫2 8 3 0。這個原版影片製作伺服器2 8 4 〇乃 疋耦接至一個網路伺服器285〇,其更進一步 全的CKU伺服器。 CKU原版影片製作伺服器2840可以藉著參照一個廢止表列 的檢查動作,由一個憑證管理中心(CA)或其他負責鑑別 引擎憑證及CKU伺服器憑證的其他實體加以主持。另外,DESCRIPTION OF THE INVENTION (158) Please refer to FIG. 27, 2700. This user = indicates an example user interface: it includes a user network, the server generates, and decides not to use this media, so that the user can present if the user chooses to enter Some types of supply. As shown, this use == required, resulting in a note. As shown in the embodiment. In particular ^, Nai Yi used to start unlocking a transaction with a hyperlink: page Zhu: a: user interface 27. . It can also be-with the necessary information to enter &: The user points to an activation center, borrows In addition, on this webpage I also: enclosed hyperlink 273 °. Indicate 271. , Because the status of this interface is the same or interpreted. If there is a locked and unlocked file on this media, the purchase of a 2750 hyperlink will fix the file f to the locked state. For a file pointed to, this $ ^^ is given to a user. For unlocking so that the user can. = = = A hyperlink, borrowing this secure electronic content (SEC \ body-a selection fragment. The common tool component of a framework ^ The material ^ The fixed part is the production of several versions of the video 解: 解; ::: : "; It is a depositor-action to produce a secondary original video. Among them, an example of this secondary original is on this media. According to this hairpin platform, Fuding 'As a result, you have the flexibility to choose between the client and the field at the same time. In addition, according to a 583568 embodiment of the invention (159), these communication protocols can also support various business model locking and information exchange actions. It is mainly used to release and hold different components on different related components. Figure 2δ is an example of the second component, the connection relationship, and the port / elements. A broader view of the system, we ... Sub-content (SEC) As shown in Figure 28, this unlocking system includes an original movie production server crying information Shen., ^ ^ Beco library of an MJ service. In An implementation of the invention 'J' These faces connected to the database of the original film making feeder includes a key, number database 281., a transaction t database m., And one, only table 歹 J shell database 2 8 3 0. This original video production server 2 8 4 〇 is coupled to a web server 2850, which is further a full CKU server. The CKU original video production server 2840 can refer to a revocation list The check operation of the column is conducted by a certificate management center (CA) or other entity responsible for identifying the engine certificate and the CKU server certificate. In addition,

CKU原版影片製作伺服器2840亦可以負責將金鑰補數由一 個原版影片製作金鑰補數資料庫2 8 i 〇安全地傳送至這些 CKU伺服器2 6 6 0,其係可以將其傳送至引擎289 8。 故個(:〇饲服>器2860可以是一個伺服器側的執行(1^111:11116 )物件’其係與一個網路應用程式伺服器2 8 5 〇及幾個資料 庫2870、2880、及289 0共同工具,藉以管理這個 ContentKey解除鎖定動作的部分。另外,CKU伺服器286〇 亦可以由需要這些能力的任何實體主持,藉以對 ContentKey數位權利管理(CKDRM)的次要内容,諸如:The CKU original video production server 2840 can also be responsible for safely transmitting the key complement from an original video production key complement database 2 8 i 〇 to these CKU servers 2 6 60, which can be transmitted to Engine 289 8. Therefore, a (2) feed server 2860 can be a server-side execution (1 ^ 111: 11116) object 'which is related to a web application server 2 8 5 0 and several databases 2870, 2880 , And 289 0 common tools to manage the part of this ContentKey unlocking action. In addition, the CKU server 2860 can also be hosted by any entity that needs these capabilities to use secondary content of ContentKey Digital Rights Management (CKDRM), such as :

第165頁 583568Page 165 583568

五、發明說明(160) 一個情報交換夥伴(Reciprocal、DWS、Magex等等)、雨 售商網站、或DataPlay進行交易及解除鎖定動作。 ^ 另外,各個CKU伺服器286 0可以發佈一個獨一無二的 ContentKey數位權利管理(CKDRm)憑證及公開—私密的 加密金鑰對,藉以用來與這個引擎2898及這個CKU原^參 片製作伺服器2840建立這些安全鑑別通道(SAC )。再〜 者’這個CKU伺服器2860亦可以搭配有加密功能。舉例來 說,這個CKU伺服器2860可以包括有下列功能,諸如:公 開金鑰基礎建設(PKI )、先進加密標準(AES )、三重資 料加密標準(triple —DES )、及訊息鑑別碼(MAC )演算 法。再者,一個隨機數目產生器(RNG)演算法,諸如與"" 聯邦資訊處理標準第140號文件(FIPS — 14〇 )相符的演算 法’亦可能是適當的。 這個網站伺服器2850乃是根據這系統的要求,耦接至一個 或更多個資料庫,諸如··第三者經銷商的共同品牌元件 2870、供應貧料庫2880、以及一個交易資料庫289〇。這個 CKU伺服器286 0乃是耦接至一個用戶端伺服器2896以及這 個用戶端伺服器2896所主持的一個網頁2892。這個網頁 2892乃是用來提供一個界面給一個使用者,藉以與這個安 王,子内容(SEC )系統中的其他元件進行通信動作。特 別疋,持有一個引擎的一個主機裝置2894亦可以透過這個 網頁2892進行通信動作。這些元件間的通信亦可以透過一 個;^準的TCP / IP協定進行。再者’這個使用者界面亦可 以經由一個瀏覽器、利用一個網路伺服器285〇以呈現給一V. Description of the invention (160) An information exchange partner (Reciprocal, DWS, Magex, etc.), rain seller's website, or DataPlay for trading and unlocking actions. ^ In addition, each CKU server 2860 can issue a unique ContentKey Digital Rights Management (CKDRm) certificate and a public-private encryption key pair, which can be used with this engine 2898 and this CKU original ^ reference production server 2840 Establish these security authentication channels (SAC). Furthermore ~ This CKU server 2860 can also be equipped with encryption function. For example, the CKU server 2860 may include the following functions, such as: Public Key Infrastructure (PKI), Advanced Encryption Standard (AES), Triple Data Encryption Standard (triple — DES), and Message Authentication Code (MAC) Algorithm. Furthermore, a random number generator (RNG) algorithm, such as an algorithm consistent with " Federal Information Processing Standards Document 140 (FIPS-14), " may also be appropriate. This web server 2850 is coupled to one or more databases according to the requirements of the system, such as a common brand component 2870 of a third party dealer, a poor supply database 2880, and a transaction database 289 〇. The CKU server 2860 is coupled to a client server 2896 and a webpage 2892 hosted by the client server 2896. This webpage 2892 is used to provide an interface for a user to communicate with other elements in the King's Sub Content (SEC) system. In particular, a host device 2894 holding an engine can also perform communication actions through this webpage 2892. Communication between these components can also be carried out through a standard TCP / IP protocol. Moreover, the user interface can also be presented to a browser through a browser and a web server 2850.

第166頁 五、發明說明(161) 信1末端使用者。 :熟所瞭解:行政及回報工具亦可能是適當 括# M I疋用來表不一個供應資料庫2880,其可以包 例來:兒勹:先錄製的媒體碟片1、可利用次要内容(舉 ^ 價、片頭、說明等等關的資訊。並 行維^ ^二。办提供者或是零售商均可以對這個資料庫進 供一個中亦包括有交換資料庫2890,其乃是用來提 ;以==鎖定交易的地方。再者,$些收集資料亦 方 “ 疋個參加解除鎖定交易價值鏈的實體的付款 的i;::固交易資料庫2890亦可以儲存與進行中交易有關 2850 ϊτ w ί另外,廷些CKU伺服器2860及網站伺服器 * & 1此會要求對這個暫時資料進行存取動作。 ,廷個使用者界面元件資料庫287〇亦可以 服器2850用來建立自訂品牌網頁或 包括有:在零售商階層進行標記動,、、以“ :供應媒體的特定庫存單位(SKU)以進行個別標記動 庫金鑰補數資料庫2810亦可以包括有:解除鎖定 穴原版影片製作媒體的金錄補數)。另外,每個 =數一個獨一無二的 媒體側面全地傳送、並與這個媒體所對應的 媒體側面内容識別碼(SCID)資訊儲存在一起 583568166 V. Description of the invention (161) The end user of the letter 1. : Familiar with: administrative and reporting tools may also be appropriate to include # MI 疋 to represent a supply database 2880, which can be exemplified by: daughter: the media disc recorded first 1, the secondary content available ( Information such as price, title, description, and so on. Parallel maintenance ^ ^ 2. Both the provider and the retailer can feed this database and include an exchange database 2890, which is used to provide information ; == Place where transactions are locked. In addition, some of the collected data may also be used by "an entity participating in the unlocked transaction value chain for payment of i; :: solid transaction database 2890 can also store transactions in progress 2850 ϊτ w ί In addition, these CKU servers 2860 and web servers * & 1 will request access to this temporary data. A user interface component database 2870 can also be used to create a server 2850 Customized brand web pages may include: tagging at the retailer level, and ": specific inventory units (SKUs) for media supply for individual tagging. The library key complement database 2810 may also include: unlocking Anatomy Film production media). In addition, each = counts a unique media side that is transmitted all over and stored with the media side content identifier (SCID) information corresponding to this media 583568

個貧料庫的存取動作亦需要嚴密地看守。因 :證影片製作伺服器襲才能夠對這個麵 進灯存取動作。 7 # 再者,這個廢止資料庫2830亦可以包括與廢止引 廢止CKU伺服器憑證有關的資訊。這個廢止/ ,本發明的一個實施例中,乃是在每次交易中=°杳動 =確保:僅有授權的參與者才能夠參加這個解除鎖 疋的私序。 f 個父易貧料庫2820亦可以記錄CKU伺服器2860及The access operation of a poor library also needs to be closely guarded. Because: the video production server can only access this area. 7 # Furthermore, this revocation database 2830 may also include information related to the revocation and revocation of CKU server certificates. This revocation /, in an embodiment of the present invention, is to ensure that only authorized participants can participate in this private sequence of unlocking in each transaction. The f father-prone materials warehouse 2820 can also record the CKU server 2860 and

铯個cku原版影片製作伺服器2840間的交易。 在本發明的一個實施例中,cku原版影片製作伺服器284〇 對於,個金鑰補數資料庫係具有排他性的存取權限。另 外,這個CKU原版影片製作伺服器2840亦可能在構造上類 似於這個CKU伺服器2860、並且設定一個啟動的,,聆靜,,插 槽=接收進入的連接狀態。這個插槽乃是用來接受伺 服器2860的連接,其係想要取得金鑰補數以執行解除 的各種操作。A transaction between 2840 original cku video production servers. In one embodiment of the present invention, the cku original video production server 284 has exclusive access rights to each key complement database. In addition, the original CKU video production server 2840 may also be similar in structure to this CKU server 2860 and set an active, listening, and slot = received incoming connection state. This slot is used to accept the connection of the server 2860, and it is used to obtain the key complement to perform various operations for releasing.

第29圖乃是用來表示一種程序的一個實施例(其乃是在一 個媒體碟片透過一台個人電腦(pc ) 295〇插入一個引擎 2952時開始),其中,這種程序乃是透過一個情報交換 網站伺服器2960以呈現一個記錄標籤或零售品牌網站 2910,藉以提供供應2920、交易29 3〇、及解除鎖定内容 2 940 ’並且,這個情報交換所網站伺服器2 96〇係耦接至一 個交易資料庫2980及一個供應資料庫2970。這個媒體如何FIG. 29 is an example of a program (which is started when a media disc is inserted into an engine 2952 through a personal computer (pc) 2950), in which the program is performed The clearinghouse web server 2960 presents a record label or retail brand website 2910 to provide supplies 2920, transactions 29 30, and unlocking content 2 940 'and the clearing house web server 2 96 is coupled to A transaction database 2980 and a supply database 2970. How is this media

第168頁 583568 五、發明說明(163) 將這個引擎指向一個特定的網站乃是根據本發明—個實施 例的一種方法。特別是,請參考第3〇圖,這個媒體(^ 如·· DataPlay碟片3010 )可供購買,其中,使用者可能已 經支付主要内容3020的費用、且次要内容3〇3〇可能备勹括 有紅,内容3(M0。或者,主要及次要内容的一個或;:亦 可以疋鎖定狀態或是解除鎖定狀態,其取決於市場兩 内谷提供者的要求。舉例來說,一個内容提供者可=接 2費:1 ’其具有一個最小數量的解除鎖定内$。因此:、 個最小數量的内容。 便可以啟動,精以僅僅播放- 請參考第3 1 A圖,根據本菸日日α 複數個機構進行買冑,/如的/個實施例,媒體可以在 消費者可以在一個主要二易由在3」2°中所示的那些。-個 並表現這個可利用的内容,購買一個預先錄製的碟片、 個次要交易31 40中,這個消塊31 30所示。另外,在一 連接(其在3140中耦接至1/者則可以透過一個網際網路 的各式各樣供應,藉以透過^引擎)、選擇執行呈現出來 =容31 51進行解除鎖定的動作個安全情報交換所3150而對 請參考第31B圖,這個使用。 使用者界面有關的一個自 ^面,及,特別是,與一個 3〇0〇。這個自動執行處置 仃處置乃是用來執行方法 碟片)插入一個連接一台個疋負責偵測媒體(諸如:一個 當偵測到這個媒體插入i作=電腦(PC)的裝置的時間。 至—個引擎、並且決定這個:,這個自執行處置便會連接 媒體的狀態。這個狀態可以包 583568 五、發明說明(164) 括有:識別這個特定媒體及側面、 供應或販賣給這個消費者。$ = ^、有任何内容可 以檢查這個使用者的系統或;』個自,,行處置亦可 者是否曾要求不必呈現這個碟=何用 用去X而说Z來决 具有鎖定内容可透過一個佔 閛於一鍤古、土 从 不&月的一個貫施例乃是有 二二個::精以使一個使用者界面能夠透過-個引ΐ ::3程序以進行操作、或是搭配這個自動執行處ί 統啟動或使用者選取的時候)以進行操作。 者,i t ί自動執仃處置亦可以呈現選單選項給這個使用 )、括有下列選項:播放(pLAY)、跳出(EJECT 、 貝額外内谷(PURCHASE ADD ITIONAL CONTENT )、 以及離開(Ε χ i τ )。 ,若,在有鎖定内容,則這個界面便會在方塊3 1 3 2中決 f 這個使用者先前是否要求不要再次見到這個媒體的各 二 樣供應。若是,則這個方法便會在方塊3 1 33結束。若 否’則方塊3 1 4 2便會讓這個界面決定這個媒體的侧面内容 哉別碼(Sc I D )及鎖定狀態旗標。方塊3 1 5 2乃是用來連接 口王球寅源定位|§ ( U R L ) ’諸如:一個C ο n t e n t K e y數 位權利管理(CKDRM )相容的解除鎖定伺服器位址或關連 的词服器位址,其可以利用原版影片製作程序以錄製至這 ▲口媒體上並將這個資料傳送至這個伺服器,諸如:透過查 §句,個全球資源定位器(URL )中的字串。在本發明的其 他貫施例中,方塊3丨5 2乃是連接至一個全球資源定位器Page 168 583568 V. Description of the invention (163) Pointing this engine to a specific website is a method according to an embodiment of the present invention. In particular, please refer to Figure 30. This media (such as DataPlay disc 3010) is available for purchase. Among them, the user may have paid for the main content 3020, and the secondary content 3030 may be available. Includes red, content 3 (M0. Or, one of the major and minor content OR; can also be locked or unlocked, which depends on the requirements of the two inner valley providers. For example, a content Provider can receive 2 charges: 1 'It has a minimum amount of unlocked internal $. Therefore :, a minimum amount of content. It can be started to play only-please refer to Figure 3 1 A, according to this cigarette Every day α, a number of institutions make purchases, such as / embodiments, the media can be used in the consumer can be shown in a 3D 2 ° in a main two-way.-And show this available content , Buy a pre-recorded disc, secondary transactions 31 40, shown in this block 31 30. In addition, a connection (which is coupled to 1 / in 3140 can be accessed through a variety of Internet A variety of supplies through which ^ engine), Optional execution is presented = Rong 31 51 performs the unlocking action of a security information clearing house 3150. Please refer to Figure 31B for this use. A user interface related to the user interface, and, in particular, a 3 0 〇. This automatic execution of disposal (disposal is used to execute the method disc) Insert a connection one by one 疋 responsible for detecting the media (such as: when it is detected that the media is inserted into the device = computer (PC) time To an engine and decide this: the state of the media will be connected since this self-executing disposal. This state can include 583568 V. Invention Description (164) includes: identifying the specific media and side, supply or sell to this consumer $. ^, If there is any content, you can check the user ’s system or; "I ’ve asked whether you have requested that you do n’t have to present this disc = why use X and say Z to have locked content. There are two or two examples through a consistent example of the ancient, the soil never & the moon :: refined to enable a user interface to pass through-an introduction :: 3 program for operation (Or when this auto-executing system is activated or selected by the user) to operate. Alternatively, it can also display menu options for this purpose. It includes the following options: play (pLAY), jump out (EJECT, PURCHASE ADD ITIONAL CONTENT), and leave (Ε χ i τ ). If there is locked content, the interface will determine in box 3 1 3 2 whether the user has previously requested not to see the different supplies of this media again. If so, this method will be used in Block 3 1 33 ends. If not, then block 3 1 4 2 will let this interface determine the side content code (Sc ID) and lock status flag of this media. Block 3 1 5 2 is used to connect the port Wang Qiuyinyuan Positioning | § (URL) 'such as: a C ο ntent Ke y Digital Rights Management (CKDRM) compatible unlock server address or associated server address, which can use the original video production process Take the recording to this media and send this information to this server, such as: through a sentence, a string in a global resource locator (URL). In other embodiments of the present invention, box 3丨 5 2 It is connected to a Universal Resource Locator

第170頁 583568 五、發明說明(165) _ ) ”係根據利用原版影片製作程序錄製在這個蛘 = 這個利用原版影片製作程序錄製在二 曰是一個時間戳印(表示這個原版影片的 -;:i號器_關連的 *,舉例來說,這個序糊間纾 製媒體的經鎖商,藉以將媒體 ^;預先錄 『外諸=2乃是用來連接一個全球資;J位器( ^解^定;;mey數位權利管理(c_)相容 原版影片製作程序以錄製至這個媒體 個用 (Γ)ΤΛ^ 係連接至-彳明的其他貫施例中,方塊3152 版影片製作ί: 定位器(URL),其係根據利用原 原版影片製:Di:個=上的-個序號。這個利用 間戳記(; '::;製在爾體上的數目可以是-個時 』饿。己I表不廷個原版影片的日一 ^ (URL) f =:Γ::利於預先錄製媒體的經銷商,藉 有關;方法乃是有關於 方法係包括有:提供這商在ΪΞ 第171頁 五 i發明說明(166) 二有一個全球資源定位器(url)、或者提供與 外,二ί貝源定位器(URL)相關連的一個程式碼。另 間’…ΐ ΐ媒體碟片根據這些指令以安裝在—個主機的期 片上以用來將-個識別碼安裝在這個媒體碟 k個識別碼可以是用來識別這個供應 :★兒並且錄;個媒體碟片乃是由這個供應商所提供;; (包括隱藏内容)❸—個供應商的一個位址,. :找與這個供應商有關的一個位址,#中,這個位鱼 :個媒體碟片的供應商相關4、並且獨立於體磾 片不相關的任何供應商。這個媒體碟片的指令可以=碟 有:識別-個供應商的動作,#中,這個媒 這個供應商購買:舉例來說,這個媒體碟片可以提 列指令’包括有.-個程式碼、一個全球 哭、 (URL)、與這個供應商關連的一個加密金鑰 / 個供應商關連的-個加密金鑰的一部分,其分別可以、二 白或暗示的位4。另外’根據這類方法的一個系;月 包括有這個媒體碟片的指令、及與這個媒體碟片、關連:二 個軟體安裝兀件,其中,這個軟體安裝元件可以士 、 體碟片根據這些指令安裝至一個主機的细 這個媒 別是,這個軟體安裝元件能夠::::期特 這個供應商關連的-個程式碼!在括有與 中,這個識別碼係關連於這個供岸两=.個μ施例 供應商的一個位址,藉以使 583568 五、發明說明(167) 個::J:的:個連接能夠加“操作,“ 鎖疋動作的網頁,並 、碟片儲存内容進行解除 提供選擇性供庫,# 每個網際網路位置更解除 仃貝賣。 八應商月匕夠在_際網路上進 在本發明的另一個實施例中, 別一個位置的方法 種透過一個媒體碟片以钟 個可寫入部分及一個非以片,其至少具有? 種方法係包括有:將這個位二實施例中,這 散佈一個或更多個媒體碟片給一個 =^部分表面、 這個位置係用來將這些媒體碟片關連貫體,其中, 體、以及倘若這些媒體碟片發生一 ^ 或更多個實 疋條件以改變這個位置。這個位置可,=作,則根據預 (URL)、並且這些預定條件可以疋王球資源定位器 些實體一個市場佔有率。改變這個位晉定這個或這 内容提供者完成,為此,這個内容 2動作可以由一個 媒體碟片(包括一個或更多個媒體碟片、首先係接收這個 作完成後,將這些返回的媒體磁蹀散 L亚且在改變動 中的相同或不同實體。舉例來說,這 μ這個或這些實體 媒體碟片的一個租賃合約,並且,ζ固散1動作可以根據 許未售出媒體碟片的返回。 &固租賃合約亦可以允 一般而言,内容提供者乃是透過一 約的規範下,經銷商僅需要支付隹φ π、〇C在這個合 售出媒體確片的貨款)、P.170 583568 V. Description of the invention (165) _) ”is recorded here according to the use of the original film making program 这个 = This recording using the original film making program is a time stamp (indicating-;: i 号 器 _Related *, for example, the lock-up dealer of this order to control the media, so that the media ^; pre-recorded "foreign = 2 is used to connect a global asset; J 位 器 (^ Solve;; mey Digital Rights Management (c_) compatible with the original video production program to record to this media. (Γ) ΤΛ ^ is connected to the other implementation examples of-Ming, block 3152 version video production: The locator (URL) is based on the use of the original original film system: Di: a =-a serial number. This time stamp (; :: ;; the number on the body can be-one hour). I ca n’t say a day of the original movie ^ (URL) f =: Γ :: It is helpful for the distributor of the pre-recorded media to borrow it; the method is related to the method including: Provide this supplier on page 171 Five i invention description (166) two have a global resource locator (url), or provide and external , A code associated with the URL source locator. In addition, '... ΐ ΐ The media disc is installed on a host video according to these instructions to install an identification code on this media. The disc k identification codes can be used to identify this supply: ★ Children and recording; a media disc is provided by this supplier; (including hidden content) ❸ an address of a supplier,: find An address related to this supplier, in #, this bit fish: the supplier of a media disc is 4, and is independent of any vendor that is not related to the media disc. The order for this media disc can be = disc has : Identify the actions of a supplier, # In this media, this vendor purchases: For example, this media disc can be listed with instructions' includes.-A code, a global cry, (URL), and this Vendor-linked one encryption key / Vendor-related-a part of an encryption key, which can be, respectively, or implied bit 4. In addition, a line according to this method; monthly includes this media disc Film instructions, and with this Body disc, related: two software installation elements, of which this software installation component can be installed on a host according to these instructions. This medium is that this software installation component can :::: 期 特-A code associated with this supplier! In the brackets and, this identification code is related to the supply bank == one μ Example address of the supplier, so that 583568 5. Description of the invention (167) :: J :: Each link can add "operation," to lock the web pages, and the disc storage content can be released to provide a selective library. # Each Internet location can also be released. The moon dagger can be accessed on the Internet. In another embodiment of the present invention, the method of another location is to use a media disc to write a part and a non-capable piece. What does it have at least? A method includes: in this second embodiment, this is to distribute one or more media discs to a part of the surface, and this position is used to connect the media discs to a continuum, wherein the volume, and If these media discs occur one or more actual conditions to change this position. This position is available, = work, according to the pre- (URL), and these predetermined conditions can be a market share of these entities. Change this bit to be completed by this or this content provider. To this end, this content 2 action can be performed by a media disc (including one or more media discs. After receiving this operation, the returned media are first The same or different entities that are magnetically dispersed and are changing. For example, this μ or one of these physical media discs is a lease contract, and the ζ solidification 1 action can be based on the unsold media discs. &Amp; The solid lease contract can also allow, in general, the content provider is through a contract, the dealer only needs to pay 隹 φ π, 〇C in this co-sold media to confirm the purchase price),

將持有内容的婼辨 片則會返回給這些内U經銷商。另外,未售出的媒體碟 先錄製的媒體碟^备提供者。在這個實施例中,這個預 内容提供者的全純1以或可以不永遠地識別一個經銷商或 解除鎖定動作。位器(URL) ’藉以對内容進行 “其關連於這:經銷有-個預先錄製媒體碟 現各式各樣的供應資=器(叫以呈 間戳印的媒商可以接收具有序號及/或時The videos that hold the content will be returned to these internal U dealers. In addition, unsold media discs are recorded media providers. In this embodiment, the holiness of the pre-content provider may or may not always identify a dealer or unlock action. URL (URL) 'This is related to this: the distribution of a pre-recorded media disc is now provided with a variety of supply = device (called a media dealer stamped in time can receive a serial number and / Or hour

的經銷商亦ϊίϊίΐΓίΐ11 (URL)。另外,其他 解除鎖定動作的一個入社次=精以識別對内容進行 —:卜扪個全球資源定位器(URL)。在本發明 、一貫靶例中,這個主伺服器的全球資源定位哭( )乃是水遠地利用原版影片製作程序 =隨著一個序號及,或時間戮印。 個經銷商返回一個或更多個媒體碟片至一個内容提供 者以供重新經銷時,與這個序號關連的這個時間戳印便; 以用來更明確地識別一個群組的具有相同序號的媒體碟 片、或這個序號亦可以用來單獨識別這些媒體碟片。^ 後’這些識別的媒體碟片便可以由這個經銷商的全球資源 定位器(URL )重新指向一個第二經銷商的全球資源定位' 虽 服,係接收複數内容提供者及/或授權經銷商的指示 以識別與序號關連的經銷商的全球資源定位器()曰The dealer is also ϊίϊίΐΓίΐ11 (URL). In addition, one of the other times of unlocking action = fine to identify the content — — a global resource locator (URL). In the present invention and the consistent target example, the global resource location cry of this master server () is the use of the original film making process by the water distance = with a serial number and time stamp. When the distributor returns one or more media discs to a content provider for re-distribution, the time stamp associated with the serial number is printed; to more clearly identify a group of media with the same serial number The disc, or this serial number can also be used to identify these media discs individually. ^ "These identified media discs can be redirected to the global resource locator of a second distributor by this distributor's global resource locator (URL)". Although it is accepted, it accepts multiple content providers and / or authorized distributors Instructions to identify the Global Resource Locator of the distributor associated with the serial number () said

器(URL )或指向一個普通的全球資源定位器(URL )。URL (URL) or a generic global resource locator (URL).

583568583568

五、發明說明(169) 2發明的另一個實施例中,各個媒V. Description of the invention (169) 2 In another embodiment of the invention, each medium

主伺服器、並根據一個市場佔有率 =门_ 1U 杜去纪 >, 穷手以進仃重新指向,藉以 使重新私向一個經銷商全球資源定位器(url)的存取數 目能夠正比於這個經銷商所持有的市場佔有率。 在方塊31 60中,倘若這個媒體的綠不具有鎖定内容、或這 個使用者ϋ擇不再見到這個媒體^式供應,則這個界面 便會決定:在這個媒體上是否具有一個編寫的 AUTORUN·INF 檔案。The main server, and according to a market share = door _ 1U Du Quji >, poor hands re-pointing, so that the number of access to a global resource locator (url) of a dealer can be directly proportional to The market share this dealer holds. In block 31 60, if the green of this media does not have locked content, or if the user chooses to no longer see this media ^ supply, this interface will determine whether there is a written AUTORUN · INF on this media file.

倘若,個使用者選擇播放(PLAY)選項,則方塊318〇便會 執仃运個播放(PLAY)方法。這個自動執行處置可以造成 :個全球資源定位器(URL)連接。隨後,一個網站伺服 :亦可以產生一個用戶端的描述語言(script),藉以根 個用戶端物件應用程式界面(Αρι)的變數,内故一 個物件或呼叫一個切入點(Entry p〇int )。再者,這個 物件的f卩令可以包括有··ConnedcwkHIf the user selects the PLAY option, block 318 will execute the PLAY method. This automated execution can result in a Global Resource Locator (URL) connection. Subsequently, a web server can also generate a client-side description language (script), which uses a variable of the client-side object application program interface (Αρι), internally an object or calls an entry point (Entry point). Furthermore, the f command of this object can include · ConnedcwkH

ContentID,UNIT USBDriverlD )。在本發明的一個實施ContentID, UNIT USBDriverlD). In an implementation of the invention

r v e r IP乃疋一個字串變數,其係用以描述這個物 ^王球I源定位器⑶RL) 。?〇忖乃是這個CKU伺服 ,、7 埠號碼。Session ID乃是這個伺服器所指派的一 ^獨無一的識別碼。這個Session ID可以將一個socket 、、,關,於每個特定的網站對話,其必須進行啟始化動作 乂保這個伺服器能夠同步其狀態。另外,這個 ess ionID亦可以儲存做為一個交易資料庫的暫時部分r v e r IP is a string variable, which is used to describe this object (the king ball I source locator (CDRL)). ? 〇 忖 is this CKU servo, 7 port number. The Session ID is a unique identifier assigned by this server. This Session ID can connect a socket,, and, to each specific website conversation, and it must be initialized to ensure that the server can synchronize its state. In addition, this ess ionID can also be stored as a temporary part of a transaction database

第175頁 583568 五、發明說明(170) (諸如:資料庫2890 )中的金錄,如第28 一個網站飼服器2850及這個CKU伺服器286〇間主' 精/在 送。另外,ContentlD乃是這個側面及包括有内貝 供應給一個消費者)的碟片的一個識別碼。 USBDriver則是一個識別碣,藉以讓—個 ’ 夠定位一個光碟驅動器的一個特定瞬間,藉以端2j96能 動插入通知以啟動一個解除鎖定對話。^產生一個自 施例中,這個乃是透過傳送_個詢問^的一個言實 個側面内容識別碼(SC ID )及鎖定狀離旗俨 24 ^^(ORL) 在适個碟片上、由-個使用者指定、或值、衣 以連接至-個CKU伺服器2860。在本發明的—個^值藉 中,這個全球資源定位器(URL)乃是利用"She A e Executing’,進行連接,為此,這個全球資源定位器⑼rl )係在一個使用者系統上啟動一個瀏覽器並連接^ 2860。這個全球資源定位胃(URL)可以選 °… 個⑽入口,其可以是一個智慧型的重新指=地=: :個重新指:器可以根據’舉例來說,媒體識別資訊以決 2廷個用戶端將:連接的網站伺服器。請再度參考第3ΐβ 二,方塊3 182乃是根據這個全球資源定位器 動執行(AURUN )或其他呈現各.枇雍沾德庄丨^ 費者呈現各式各樣的供應。見各式供應的機制,精以對消 二二考第31C圖其乃疋用來表示—種連接CK請服器 的方法。在本發明的一個實施例中,這種方法可以利用一Page 175 583568 V. Gold records in the description of the invention (170) (such as: database 2890), such as the 28th website server 2850 and the CKU server 2860 master's / fine. In addition, ContentlD is an identification code for this side and the disc that includes the Nebe supply to a consumer). The USBDriver is an identification card, so that a single moment can be used to locate a disc drive, so that the terminal 2j96 can insert a notification to start an unlocking session. ^ Generate a self-executing example, this is a true content ID (SC ID) and a lock-off flag 俨 24, which is transmitted by _ inquiry ^ ^^ (ORL) on a suitable disc, by -A user specifies, or values, clothes to connect to-a CKU server 2860. In the present invention, the global resource locator (URL) is connected using "She A e Executing '. To this end, the global resource locator (rl) is attached to a user system. Launch a browser and connect ^ 2860. This Global Resource Locating Stomach (URL) can be selected as a ... entry, which can be a smart re-pointing = ground =:: re-pointing: the device can be based on 'for example, media identification information to determine 2 The client will: the connected web server. Please refer to Section 3ΐβ2 again. Block 3 182 is based on this global resource locator (AURUN) or other presentations. 枇 Yong Zhan De Zhuang 丨 ^ Consumers present a variety of supplies. See the various supply mechanisms, which are illustrated in Figure 31C of the 22nd test. It is used to indicate a method of connecting the CK server. In one embodiment of the invention, this method can utilize a

583568 五、發明說明(171)583568 V. Description of the invention (171)

個用戶端物件所執行的描述語言(S c r i p t )加以呼叫。另 外,方塊3 1 1 4乃是用來設置一個連接裝置的一個驅動程 式。再者,方塊3 124乃是用來連接一個引擎及擷取一個 ContentKey數位版管理(CKDRM)憑證,諸如先前所述的 那些。另外,方塊3 1 2 6乃是利用,舉例來說,一個插槽模 式組(諸如:BSD/WinSock 及 SOCKET—STREAM模式組), 藉以連接一個CKU伺服器2860。另外,方塊3 128乃是用來 等待這個CKU伺服器286 0的確認訊息。再者,方塊3 134則 是用來將這個引擎的Con tent Key數位版管理(CKDRM )憑 證傳送至這個CKU伺服器286 0。另外,方塊3 144乃是用來 接收這個CKU伺服器2660的ContentKey數位版管理(CKDRM )憑證。方塊3 154則是利用CKCMD—AUTHENTICATE、藉以 將這個伺服器憑證傳送至這個引擎2698。再者,方塊3164 乃是用來接收一個ESessionKey、並將其傳送至這個cku伺 服器2860。方塊3 174乃是用來接收這個伺服器2860的解除 鎖定資料、並利用CKCMD—UNLOCK—FILES將其傳送至這個 引擎2898。另外,方塊3184乃是用來回報這個解除鎖定操 作的狀態給這個伺服器286 0。方塊3 194則是用來更新媒體The description language (S c r i p t) executed by each client object is called. In addition, block 3 1 1 4 is a driver for setting a connected device. Furthermore, block 3 124 is used to connect to an engine and retrieve a ContentKey Digital Edition Management (CKDRM) certificate, such as those previously described. In addition, block 3 1 2 6 is used, for example, a slot mode group (such as: BSD / WinSock and SOCKET-STREAM mode group) to connect a CKU server 2860. In addition, block 3 128 is used to wait for a confirmation message from the CKU server 2860. In addition, block 3 134 is used to transmit the Conttent Key Digital Edition Management (CKDRM) certificate of this engine to this CKU server 2860. In addition, block 3 144 is used to receive the ContentKey Digital Edition Management (CKDRM) certificate of this CKU server 2660. Block 3 154 uses CKCMD-AUTHENTICATE to send this server certificate to this engine 2698. Furthermore, block 3164 is used to receive an ESessionKey and send it to the cku server 2860. Block 3 174 is used to receive the unlocked data from this server 2860 and send it to this engine 2898 using CCKMD_UNLOCK_FILES. In addition, block 3184 is used to report the status of the unlock operation to the server 2860. Box 3 194 is used to update the media

上的一個表列,其係耦接至這個引擎2898以包括新解除鎖 定的内容。 現在請參考第32圖及第28圖,這個CKU伺服器28 6 0乃是用 來管理許多同時發生的連接及解除鎖定交易,如先前所述 Y舉例來說:第31圖)。每當一個用戶端要求一個連接κ 時’這個伺服器必須要接收這個連接、並且繼續執行第32A list above is coupled to this engine 2898 to include newly unlocked content. Now refer to Figure 32 and Figure 28. This CKU server 28 6 0 is used to manage many simultaneous connections and unlock transactions, as described earlier Y example: Figure 31). Whenever a client requests a connection κ, this server must accept the connection and continue to execute the 32nd

第177頁 583568 五、發明說明(172) 圖所示的這種方法。如圖中所示,在方塊3 2 〇 2中,這個 CKU伺服器2860乃是用來確認一個用戶端連接。在方塊 3204中,這個CKli伺服器286 0乃是用來自這個用戶端2896 接收一個引擎的C〇n tent Key數位版管理(CKDRM )憑證及 對話識別碼(S e s s i ο η I D )。在方塊3 2 0 6中,這種 ContentKey數位版管理(CKDRM)乃是利用這個對話識別 碼(Session ID )做為指標或金鑰,藉以自這個交易資料 庫2890中接收側面内容識別碼(SCID )及一個表列欲進行 解除鎖定動作的DataPlay檔案系統(DFS)檔案處置。在 方塊3208中,這個CKU伺服器2860乃是連接至這個CKU原版 影片伺服器2840。另外,在方塊32 1 0中,這個CKU伺服器 2860則是用來等待CKU原版影伺服器2840的確認訊息。在 方塊3212中,這個CKU伺服器286 0係傳送一個伺服器的Page 177 583568 V. Description of the Invention (172) This method is shown in the figure. As shown in the figure, in block 3202, the CKU server 2860 is used to confirm a client connection. In block 3204, the CKli server 2860 receives the Engine Key Digital Edition Management (CKDRM) certificate and session identification code (S e s s i ο η I D) from the client 2896 which receives an engine. In block 3 2 06, this ContentKey Digital Edition Management (CKDRM) uses the Session ID as an indicator or key to receive the side content ID (SCID) from the transaction database 2890. ) And a list of DataPlay File System (DFS) files to be unlocked. At block 3208, the CKU server 2860 is connected to the original CKU video server 2840. In addition, in block 32 10, the CKU server 2860 is used to wait for a confirmation message from the CKU original shadow server 2840. In block 3212, the CKU server 286 0 sends a server

ContentKey數位版管理(CKDRM )憑證、這個引擎2898的 (:01^6111:1^丫數位版管理((:1^[^)憑證、媒體側面内容識 別碼(SCID )、及DataPlay檔案系統(DFS )檔案處置至 這個原版影片CKU伺服器2840。另外,在方塊3214中,這 個CKU伺服器則是用來自這個CKlI原版影片伺服器2840中接 收這些金鑰補數。在本發明的一個實施例中,這些金餘乃 是利用這個CKU原版影片伺服器2 8 4 0的公開金鑰進行加密 動作。另外’在方塊3216中,這個CKU伺服器2860則是用 來確認這個CKU原版影片伺服器284 0的接收。在方塊32 18 中,CKU服器2860隨後會中斷與CKU原版影片伺服器2840的 連接。另外,在方塊3220中,CKU伺服器28 60則會將這個ContentKey Digital Edition Management (CKDRM) certificate, this engine 2898's (: 01 ^ 6111: 1 ^ Ya Digital Edition Management ((: 1 ^ [^) certificate, media side content identification code (SCID), and DataPlay file system (DFS ) The files are processed to the original video CKU server 2840. In addition, in block 3214, the CKU server receives these key complements from the CK11 original video server 2840. In one embodiment of the present invention , These Jinyu use the public key of the CKU original video server 2 8 4 0 for encryption. In addition, in box 3216, the CKU server 2860 is used to confirm the CKU original video server 2840 In block 32 18, the CKU server 2860 will then disconnect the connection with the original CKU video server 2840. In addition, in block 3220, the CKU server 28 60 will send this

第178頁 583568 五、發明說明' (173) 伺服器的ContentKey數位版管理(CKDRM)憑證傳送至這 個用戶端2898。在方塊3222中,CKU伺服器2860乃是由這 個用戶端2898接收這個ESessionKey,其可以利用這個CKU 伺服器2860的公開金鑰進行解密動作。在方塊3224中,Page 178 583568 5. Description of the invention '(173) The ContentKey Digital Edition Management (CKDRM) certificate of the server is transmitted to this client 2898. In block 3222, the CKU server 2860 receives the ESessionKey by the client 2898, which can use the public key of the CKU server 2860 to perform the decryption action. In block 3224,

C K U伺服斋2 8 6 0乃是利用一個伺服器的私密金錄、對這個 對話金鑰(Session Key)進行解密動作。另外,在方塊 32 2 6中’ CKU伺服器2 8 6 0乃是,舉例來說,利用公開金鑰 基礎建設(PKI )、以一個伺服器的私密金鑰及加入對話 金錄資訊對金鍮補數進行解密動作。另外,在方塊3 2 2 8 中,CKU伺服器2860乃是,舉例來說,利用先進加密標準 (AES)及/或三重資料加密標(Triple—DES)以產生用 來重新加密金鑰補數的一個隨機金鑰,藉以提供解除鎖定 2能力。再者,方塊323〇乃是用來讓這個CKU伺服器286〇 能夠’舉例來說,利用先進加密標準(AES )及/或三重 資料力Γ谘標(Tripie —DES),藉以利用這個解除鎖定金 鑰對這些金鑰補數進行加密動作。另外,在方塊3232中, CKU伺服器2860乃是,舉例來說,利用公開金鑰基礎架構 j P K I—)、以這個引擎的公開金鑰對這個解除鎖定金鑰進 行加在動作。再者,在方塊3234中,CKU伺服器286〇乃是 用來=立一個CKCMD—UNL〇CK—FILESf料方塊、並將其傳 f、、a這個用戶端2896。在方塊中,伺服器乃 ,用,建立這個方塊的資料部分的一個訊息鑑別碼(MAc 古iί塊3238中,CKU伺服器286 0乃是用來將這個資料C K U Servo Zhai 2 860 is to decrypt the session key by using the private record of a server. In addition, in box 32 2 6 'CKU server 2 8 6 0 is, for example, using public key infrastructure (PKI), using a server's private key and adding dialogue record information to The complement performs the decryption operation. In addition, in block 3 2 2 8, the CKU server 2860 uses, for example, Advanced Encryption Standard (AES) and / or Triple Data Encryption Standard (Triple-DES) to generate the key complement used to re-encrypt the key. A random key to provide Unlock 2 capability. Furthermore, block 323〇 is used to enable this CKU server 2860 to 'use, for example, the Advanced Encryption Standard (AES) and / or the Triple Data Force Γ (Tripie-DES) to utilize this unlocking The key encrypts these key complements. In addition, in block 3232, the CKU server 2860 uses, for example, the public key infrastructure j P K I—) and the engine's public key to add the unlock key to the action. Furthermore, in block 3234, the CKU server 2860 is used to create a CCKMD_UNLOCK_FILESf data block and pass it to the client 2896 as f ,, a. In the box, the server is used to create a message authentication code for the data part of the box (MAc ancient block 3238, CKU server 286 0 is used to send this data

士 、送至這個用戶端2896。另外,在方塊3240中,CKUTaxi to this client 2896. Additionally, in block 3240, the CKU

第179頁 583568 五、發明說明(Π4) 伺服為2860乃是用來自用戶端2896接收解除鎖定的狀態。 並且,在方塊3242中,這個交易狀態亦會在這個交易資料 庫2890中予以標記。最後,在方塊3244中,這個CKU伺服 器2860便會中斷與用戶端的連接。 在本發明的一個實施例中,在方塊3245中,當一個網站伺 服為2 8 50由這個CKU用戶端2 896接收到解除鎖定動作已經 完成的指示後,以這個網站伺服器285〇完成其餘的金融交 易。 請參考第33圖,其乃是用來表示第28圖中這個原版影片伺 服益2840所執行的一種方法。其中,方塊331〇乃是用來讓 這個原版影片伺服器2 8 4 0能夠接受CKU伺服器2 8 6 0的連 接。另外’在方塊3320中,這個原版影片伺服器284〇乃是 用來確認這個連接動作。隨後,在方塊333〇中,原版影片 伺服器2840便可以由這個CKU伺服器286〇接收這個CKU伺服 |§ 28 6 0的(:〇1^6111:1^7數位權利管理((:1(])题)憑證、這個 引擎的Con tent Key數位權利管理(CKDRM )憑證、媒體的 侧面内容識別碼(SCID )、及DataPlay檔案系統(DFS ) 的,案處置。另外,在方塊3334中,原版影片伺服器284〇 乃是利用’舉例來說,訊號鑑別碼(MAC )及公開金鑰基 礎架構(PKI )簽章的檢查動作,藉以確認這兩個憑證的 有效性。再者,在方塊3336中,這個原版影片伺服器2840 係檢查這個廢止資料庫2530,藉以確認沒有廢止憑證的參 與。在方塊3340中,原版影片伺服器2840乃是用來自金鑰 補數資料庫281()中擷取要求的金錄補數。另外Page 179 583568 V. Description of the invention (Π4) The servo is 2860 but it is unlocked by receiving from the client 2896. And, in block 3242, the transaction status is marked in the transaction database 2890. Finally, at block 3244, the CKU server 2860 will disconnect from the client. In one embodiment of the present invention, in block 3245, when a web server is 2 8 50 and the CKU client 2 896 receives an instruction that the unlocking action has been completed, the web server 2850 completes the rest. Financial transactions. Please refer to Figure 33, which is a method used to represent the original movie serving benefit 2840 in Figure 28. Among them, the block 331〇 is used to allow the original video server 2 840 to accept the connection of the CKU server 2 860. In addition, in block 3320, the original video server 2840 is used to confirm the connection action. Then, in block 333〇, the original video server 2840 can receive the CKU server by the CKU server 286. § 28 6 0 (: 〇1 ^ 6111: 1 ^ 7 digital rights management ((: 1 ( ]) Question) Vouchers, Conttent Key Digital Rights Management (CKDRM) vouchers for this engine, media content identification code (SCID), and DataPlay file system (DFS). Cases are also handled. In addition, in box 3334, the original The video server 2840 uses' for example, the signature verification (MAC) and public key infrastructure (PKI) signature check operations to verify the validity of these two certificates. Furthermore, at block 3336 The original video server 2840 checks the revocation database 2530 to confirm that there is no participation in the revocation certificate. In block 3340, the original video server 2840 is retrieved from the key complement database 281 (). The required gold record complement.

第180頁 583568 五、發明說明(175) 33 50中,原版影片伺服器2840乃是利用這個CKU伺服器 2 8 60的公開金鑰,藉以對這些金鑰補數進行加密動作。 又,在方塊3360中,原版影片伺服器2840乃是用來將這個 加密資料傳送至這個CKU伺服器286 0。另外,在方塊3370 中,原版影片伺服器2840則是用來自CKU伺服器2860擷取 一個確認訊息、並且中斷與這個CKU伺服器2860的連接。 用於第2 8圖中伺服器的那些方法乃是由一個用戶端開始, 諸如·· CKU用戶端289 6開始一種方法。請參考第3 4圖,其 乃是用來說明網頁2892及CKU用戶端伺服器2896的方法。 在方塊3410中,一個用戶端2896乃是透過存取一個格式化 的全球資源定位器(URL )(諸如··在一個媒體碟片上的 一個全球資源定位器(URL ),如先前所述)、或是與一 個媒體碟片或其他來源上一個序號關連的一個全球資源定 位器(URL )’藉以開啟這種方法。接著,在方塊W20 中,這個用戶端2896便會呈現一個詢問字串,其包括有這 個側面内容識別碼(sc D )及鎖定内容狀態。另外,在方 塊3 430中,網站伺服器285〇乃是用來建立一個網頁,籍以 利用這個供應資料庫288〇及這個使用者界面元件資料^ 28 7 0,將各式各樣的供應呈現給一個消費者。等到方塊 34 40中的使用者選擇完成、且這個交易的條件亦滿 網站伺服器2850便會將一個"正在進行解除鎖 頁傳送給這個用戶端。在方塊3 4 5 Q中,這個網站m周 2850乃是用來產生—個獨一無二的對話識別㉟们服為 (SeSS10nID),其在這個解除鎖定程序確認後將會用來 第181頁 583568 五、發明說明(176) 進二^個父易。在方塊43 54中,這個網頁2892係内嵌有一 ,S r用戶端2 8: 6物件、並且包括有用戶端的描述語言 ⑽二U t 1,藉以通知這個CKU用戶端2 8 9 6能夠開始這個 二d 疋权序。另外,這個網站伺服器2850亦可以在方塊 =4=儲存這個侧面内容識別* (sgid)及—個表列的 1 (DFS) ^ 在^後#、言話識別碼(SeSSi〇nID)加以索引,藉以 ^ ^ , U伺服Is物件使用。另外,CKU用戶端2896 ==網頁内部的一個内編牛,其係傳送給-個 制項及Netscape P1:個物件可以發展為一個ActiveX控 戶端環请。另认、/ Μ,糟以支援大部分的瀏覽器用 述語言(scri t Y延些物件方法及特性亦可以透過Java描 成或發生笋誤I 2以存取。這個物件乃是在這個交易完 時’傳送-個物件連結嵌入(㈣事件至 當這個網站飼服哭山 y 接收到-個連接;由I :具有媒體資訊的伺服器劉覽器中 的首頁。在部分例^網站飼服11係建立這個供應呈現 鎖定狀態旗標將是決定面内容識別瑪(SCID)及 他的例”,的識Γ)。在其 標籤的-個程式碼、或二=不以輸入這個包裝 應及定價乃是由這個供岸次ς =個碟片的零售商。供 個供應貝科庫中擷取、並且以品牌網頁 第182頁 583568 五、發明說明(177) 呈現給這個消費者。 這個使用者乃是由這些供應中進行選 、, 個交易的所有條件。這些條件展必須滿足這 統計資料’藉以換取這個内容的ς以輸入付款資訊或 一旦這個交易的所有條件均能夠滿足疋、 便可以建立一個”正在進行解 、,廷個網站伺服器 頁係内嵌有-個co用戶端物件的㈣^ 服..方曰暫捋進入运個父易資料庫, 二的對蛞識別碼(Sess i on ID )、側面、肉^ …、 )、仏用卡父易的授權碼、及一個表列欲解除鎖定 DataPlay檔案系統(DFS )檔案處置。 … 、 :5 T : 其乃是以一個系統的觀點說明-種方法, i ?内容進行解除鎖定動作的實施例。其 ρκϋ θ @ %乃疋用來傳送一個網頁至這個用戶端,這個 知物件乃是利用這些對話識別碼(Sessi〇nID)、 側面内容識別碼(SCID)、以及這個CKU饲服器的ιρ : P〇RT =址做為範例並加以啟動。在方塊3512中,這個CKU 用戶立而係包括有這個引擎的C 〇 n t e n t K e y數位權利管理 (CfDRM )憑證。在方塊3516中,隨後,CKU用戶端會建立 與化個CKU飼服器上一個聆聽埠的一個連接(舉例來說: 一=插槽連接)。在方塊3518中,CKU伺服器會由這個用 戶端接受這個輸入連接、並且利用一個確認訊息以確認這 個連接。另外,在方塊3520中,這個CKU用戶端則會利用Page 180 583568 V. Description of the invention (175) 33 50. The original video server 2840 uses the public key of this CKU server 2 8 60 to encrypt the complement of these keys. Also, in block 3360, the original video server 2840 is used to send the encrypted data to the CKU server 2860. In addition, in block 3370, the original video server 2840 retrieves a confirmation message from the CKU server 2860 and terminates the connection with the CKU server 2860. The methods used for the server in Figure 28 are started by a client, such as CKU client 289 6 and a method. Please refer to Figure 34, which illustrates the method of webpage 2892 and CKU client server 2896. In block 3410, a client 2896 accesses a formatted global resource locator (URL) (such as a global resource locator (URL) on a media disc, as previously described) Or a Global Resource Locator (URL) 'associated with a serial number on a media disc or other source to enable this method. Then, in block W20, the client 2896 presents a query string including the side content identification code (sc D) and the locked content status. In addition, in block 3 430, the web server 2850 is used to create a web page, which uses this provisioning database 28800 and this user interface component data ^ 28 7 0 to present a variety of provisioning To a consumer. Wait until the user in box 34 40 chooses to complete and the conditions of this transaction are also fulfilled. The web server 2850 will send a "Unlocking page in progress" to this client. In block 3 4 5 Q, this website m week 2850 is used to generate a unique dialogue identification service (SeSS10nID), which will be used after confirmation of this unlocking process on page 181 583568. DESCRIPTION OF THE INVENTION (176) Entering two parents. In block 43 54, this webpage 2892 is embedded with an S r client 2 8: 6 object and includes the client's description language ⑽ U t 1 to inform the CKU client 2 8 9 6 that it can start this Two d 疋 right order. In addition, this web server 2850 can also be indexed at box = 4 = storing this side content identification * (sgid) and a list of 1 (DFS) ^ after ^ #, speech identification code (SeSSi〇nID) for indexing By using ^ ^, U servo Is object is used. In addition, the CKU client 2896 == an internal editor inside the webpage, which is sent to a system and Netscape P1: an object can be developed into an ActiveX client loop. Another recognition, / Μ, in order to support most browser language (scri t Y extended some object methods and features can also be described through Java or error I 2 to access. This object is completed after this transaction When the 'transmit-an object link is embedded (㈣ event to when this site feeds a crying mountain y received a link; by I: the homepage in the server Liu Lanji with media information. In some examples ^ Website feed 11 The establishment of this supply showing the locked status flag will determine the content identification (SCID) and his example ", the identification of Γ). In its label-a code, or two = not to enter this packaging should be priced It is the retailer who supplies the discs = discs. It is retrieved from the supply becoco and presented to the consumer as a brand webpage on page 182 583568 5. Invention Description (177). This user It is from these supplies that all the conditions of the transaction are selected. These conditions must meet this statistic 'in exchange for this content to enter payment information or once all conditions of this transaction can be met, you can build "A" is being solved. The web server page is embedded with a co client object server .. Fang Yuejian entered the parent database, and the two confrontation identification codes (Sess i on ID), side, meat ^…,), using the authorization code of the card parent, and a list to unlock the DataPlay file system (DFS) file disposal. …,: 5 T: This is an example of a method from a systematic point of view, i? The content performs an unlocking operation. Its ρκϋ θ @% 疋 is used to send a web page to this client. This knowledge object uses these conversation identification codes (Sessinomic ID), side content identification codes (SCID), and ιρ of this CKU feeder: P〇RT = address as an example and start. At block 3512, the CKU user immediately includes a Cont Kent Digital Rights Management (CfDRM) certificate for the engine. At block 3516, the CKU client then establishes a connection to a listening port on the CKU feeder (for example: one = slot connection). In block 3518, the CKU server will accept the incoming connection by the client and use a confirmation message to confirm the connection. In addition, in block 3520, this CKU client will use

第183頁 583568 五、發明說明(178) 一個連接§fl息’藉以將這個引擎的c 〇 n t e n t K e y數位權利管 理(CKDRM)憑證及這個對話識別碼(Sessi〇nID)傳送至 這個CKIM司服器。在方塊3522中,這個CKU伺服器係回應於 一個確認訊息、亦或是一個重新傳送訊息。隨後,在方塊 3534中,CKU伺服器便會藉著索引這個對話的獨一無二的 對話識別碼(Sessi〇n ID ),藉以在這個交易資料庫中設 置對應的記錄。在方塊353 6中,CKU伺服器亦可利用一個 插槽璋,藉以連接至這個CKU原版影片伺服器聆聽埠。在 f塊3538中,CKU原版影片伺服器係接受這個連接、並且 回覆一個確認訊息。在方塊354〇中,CKU伺服器人一 f、封包以要求金鑰、並將其傳送至這個CKU原版影片 權。這個封包亦可以包括一個引擎的c〇ntentKey數位Page 183 583568 V. Description of the invention (178) A connection §fl information 'is used to transmit the cnntent Ke ey digital rights management (CKDRM) certificate of this engine and the session identification code (Sessi〇nID) to the CKIM server Device. In block 3522, the CKU server responds with a confirmation message or a resend message. Then, in block 3534, the CKU server indexes the unique conversation identifier (Sessión ID) of the conversation to set the corresponding record in the transaction database. In box 3536, the CKU server can also use a slot 璋 to connect to this CKU original video server listening port. In fblock 3538, the original CKU video server accepts this connection and responds with a confirmation message. In block 3540, the CKU server f-packs the request key and sends it to the original CKU video rights. This packet can also include an engine key.

Vlri (CKDRM) ' ^^^^^^ContentKey^ (SCinT理(CKDRM)憑證、這個媒體的側面内容識別碼 ΐ ί ί :的一個實施例中,由CKU伺服器傳送至CKU原版影 為第47 ί、用來要求解除鎖定内容所需金餘的訊息係表示 時包括2形式:在這個實施例中,第47表所示的訊息同 憑證、勺=f引擎及C〇ntentKey數位權利管理(CKDRM ) 以及€ = k些檔案的媒體的側面内容識別碼(SC I D )、 (DFS Y _ 、各個欲解除鎖定播案的htaPUy檔案系統 第47表&Vlri (CKDRM) '^^^^^^ ContentKey ^ (SCinT (CKDRM) voucher, the side content identification code of this media ΐ ί: In one embodiment, the CKU server sends the original version of the CKU to the 47th The remaining message used to request unlocked content is displayed in two forms: In this embodiment, the message shown in Table 47 is the same as the certificate, the scoop = f engine, and the ConntentKey digital rights management (CKDRM ), And the media content identifiers (SC ID), (DFS Y _) of each of these files, the htaPUy file system table 47 of each broadcast plan to be unlocked &

第184頁 583568 五、發明說明(179) 位元組位移類型攔位名稱說明 0 : 1 U1 6MessageID = 5 0X00 05 CKU_REQ_KEYS 2 : 3U1 6MessageLength包括表頭的全部位元組長度 4 :7U32Reserved保留以做為未來使用 8:247(:1(一〇芭1^]^1〇人丁£361^61^61*1:(:101祠服器的(:1(憑證 248 :487CK 一CERTIF ICATEEngineCert 引擎的CK 憑證 488 :491U32NumHandlesDFS處置的數目 492:11〇?8_1^01^11&11(1161^3七0?3處置的表列Page 184 583568 V. Description of the invention (179) Byte displacement type Block name description 0: 1 U1 6MessageID = 5 0X00 05 CKU_REQ_KEYS 2: 3U1 6MessageLength includes the entire byte length of the header 4: 7U32Reserved is reserved as Future use of 8: 247 (: 1 (10ba 1 ^) ^ 1〇 people £ 361 ^ 61 ^ 61 * 1 :(: 101 (1) (certificate 248: 487CK-CK of CERTIF ICATEEngineCert engine) Voucher 488: 491 U32 NumHandles DFS number of disposals 492: 11 0? 8_1 ^ 01 ^ 11 & 11 (1161 ^ 3 seven 0? 3 list of disposals

請再度參考第35圖,在方塊3542中,CKU原版影片伺服器 係回應以一個確認訊息、或一個重新傳送封包(倘若發生 任何問題)。Please refer to Figure 35 again. At block 3542, the original CKU video server responds with a confirmation message or a retransmission packet (if any problems occur).

在方塊3544中,CKU原版影片伺服器係認證或拒絕這個引 擎及這個00伺服器的(:〇1^6111:1(67數位權利管理((;1^1^) 憑證。這個認證動作包括有:利用,舉例來說, CerticomTM以確認數位簽章。在方塊3546中,CKU原版影 片伺服裔係檢查這些憑證是否存在這個廢止資料庫中。倘 若這些憑迅係無效或已經廢止的,則這個c κ耵原版影片祠 服器便會在方塊3548中回應以一個錯誤訊息。倘若這些憑 證係有效的,則在方塊3550中,CKU原版影片伺服器便一會^ 自一個關連資料庫中擷取金鑰補數、並且利用(舉例來說 )公開金鑰基礎架構(PKI )、以(舉例來說)一個伺服 器憑證中的一個伺服器公開金鑰對這些金鑰補數進行加密 動作。另外,在方塊3552中,這個CKU原版影片伺服器則In block 3544, the CKU original video server authenticates or rejects the engine and the 00 server ’s (: 〇1 ^ 6111: 1 (67 digital rights management ((; 1 ^ 1 ^) certificate. This authentication action includes: : Use, for example, CerticomTM to confirm the digital signature. In block 3546, the original CKU video server line checks whether these certificates exist in this revocation database. If these vouchers are invalid or have been revoked, this c κ 影片 The original video server will respond with an error message in box 3548. If these credentials are valid, then in box 3550, the CKU original video server will ^ retrieve gold from an associated database Key complements, and encrypts these key complements with, for example, a public key infrastructure (PKI) with a server public key in, for example, a server certificate. Additionally, In block 3552, the original CKU video server then

第185頁 583568 五、發明說明(180) 會將這些金鑰補數傳送至CKU伺服器。 請參考第48表,CKU原版影片伺服器所傳送的這個訊息可 以是一個加密表列、用於要求檔案的金鑰補數,如表中所 示。另外,這些金鑰補數亦可以利用這個CKU伺服器的公 開金输或另一個適當的公開金錄以進行加密動作。 ’ 弟4 8表 位元組位移類型欄位名稱說明 〇 : 1U16Message ID = 60X00 0 6 CKU_KEYS 2 :3U16MessageLength=8包括表頭的全部位元組長度 4 :7U32Reserved保留以供未來使用Page 185 583568 5. The invention description (180) will send these key complements to the CKU server. Please refer to Table 48. The message sent by the original CKU video server can be an encrypted list, used to request the key complement of the file, as shown in the table. In addition, these key complements can also be encrypted using the CKU server's public gold loss or another appropriate public gold record. ‘Brother 4 8 Byte displacement type field name description 〇: 1U16Message ID = 60X00 0 6 CKU_KEYS 2: 3U16MessageLength = 8 including the entire byte length of the header 4: 7U32Reserved reserved for future use

8 : 1 1 U3 2NumKeys表列中的金鑰補數數目 B 12 : nU160EKeyComplimentList加密表列的金錄補數8: 1 1 U3 2 Number of key complements in the NumKeys table B 12: nU160EKeyComplimentList

在方塊3 5 54中,CKU伺服器乃是用來接收這些金鍮補數、 藉著傳送一個確認訊息以確認這個資料的接收、以及中斷 與It個C K U原版影片祠服器的連接。當出現一個資料不匹 配或收到錯誤訊息時,CKU伺服器便會在方塊35 56中回應 以一個重新傳送訊息。在方塊3558中,CKU伺服器乃是利 用一個鑑別訊息’糟以將其C 〇 n t e n t K e y數位權利管理 (CKDRM)憑證傳送給這個CKU用戶端。在方塊3560中, CKU用戶端乃是用來回應以一個確認訊息或是一個重新傳 送訊息。在方塊3 562中,CKU用戶端乃是用來建立一個鑑 別命令封包,藉以透過這個驅動程式傳送至這個引擎。有 鑑於此,在方塊3 5 6 4中,引擎便會回應以一個加密對話金In block 3 5 54, the CKU server is used to receive these golden complements, confirm the receipt of this data by sending a confirmation message, and interrupt the connection with the original CK U server. When a data mismatch occurs or an error message is received, the CKU server responds in boxes 35 56 with a resend message. In block 3558, the CKU server uses an authentication message ′ to send its C o n t k n y Digital Rights Management (CKDRM) certificate to the CKU client. In block 3560, the CKU client is used to respond with a confirmation message or a resend message. In block 3 562, the CKU client is used to create an authentication command packet for transmission to the engine through this driver. For this reason, in block 3 5 6 4 the engine will respond with an encrypted session

第186頁 583568 五、發明說明(181) 鑰,並且’在方塊356 6中,這徊TT A 金錄訊息t,將這個力丄;=、二端會在-個對話 哭。 * 5丁 °古金鑰傳迗至這個CKU伺服 ΪΓΓ68:曹服器乃是用來回應 乃是利用-個私密金鑰,;以2塊3570中,CKU伺服器 補數進行解密動作。隨即、1對話*錄及這些金餘 3572 φ .,徊t ¾個CKU伺服器便會在方塊 3572中產生一個隨機金鑰,舉例來說:一個一 八位 兀的先進加密標準(AES )金鑰,蕤料、山L 行重新加密的動作。另外),金—鎗個對^對:些金鑰補數進 個解除鎖定金鑰、並且』立一來加密-息可以包括有-個解除鎖定訊息 送至這個引擎。在本發明的:封&,其係傳 C2么一加次上丨亦上 個只鉍例中,這個命令亦可 乂為攻個貝料要求這個訊息鑑別碼(MAc)的計 在=塊3574中,CKU伺服器乃是用來傳送一個解鎖 給⑽用戶端。在方塊35 76中,用戶端乃是 心一個確認訊息或是一個重新傳送訊息。在方塊π” σ CKU用戶端乃是利用這個資料以傳’ 鎖定動作的命令,“料Μ個㈣。解除 Φ ΐ ΐ ^ ΐ ΐ? ^ ^^ ^ ^ ^ ^3578 ^ ^ ^ Λ J1 決汛心或疋一個解除鎖定的完成訊息給CKU伺服器。 580中伺服器乃是用來在這個交易資料庫中^方 乂個解除鎖定操作的狀態、並且中斷與這個CKu用戶Z 連接。在方塊35 90中,CKU用戶端乃是在這個網頁中,藉Page 186 583568 V. Description of the invention (181) key, and ′ In block 3566, this will record the message TT A to record the message t, and this will be done; =, the two ends will cry in a conversation. * 5 D ° The ancient key is transmitted to this CKU server ΪΓΓ68: Cao server is used to respond or use a private key; in 2 blocks of 3570, the CKU server complements the decryption operation. Immediately, 1 conversation * record and these gold balances 3572 φ., T ¾ CKU server will generate a random key in block 3572, for example: a one-eight-bit Advanced Encryption Standard (AES) gold Key, data, re-encryption. In addition), a pair of gold and guns: a pair of key complements an unlocking key, and the encryption-information can include an unlocking message sent to this engine. In the present invention: the seal & it is passed C2 plus one time. In the last example of bismuth, this command can also be used to calculate the message authentication code (MAc). In 3574, the CKU server is used to send an unlock to the client. In blocks 35 to 76, the client is either a confirmation message or a resend message. In the box π "σ the CKU client is using this data to pass the command of the‘ locking action ’. Cancel Φ ΐ ΐ ^ ΐ ΐ ΐ? ^ ^^ ^ ^ ^ ^ 3578 ^ ^ ^ ^ J1 A decision message will be sent to the CKU server. The server in 580 is used to make a state of unlocking operation in this transaction database and interrupt the connection with this CKU user Z. In box 35 90, the CKU client is on this page, borrowing

583568 五、發明說明(182) 著傳送一個事件給一個事件處置,藉以將這個交易的狀態 回報給這個網頁。在方塊3 5 9 2中,這個網頁乃是用來顯示 這個交易狀態。 在第3 5圖所示的實施例中,錯誤會出現複數個機會。如第 4 9表所示,在一個訊息中傳送的那些錯誤包括有下列這些 類型。 第49表 錯誤碼名稱說明 0CKU _ —ERR 一 —UNKNOWN發生一個未知或未定義的錯誤 1CKU — —ERR 一 .INVALID _DATA在最後封包中的部分資料是無 效的 2CKU — —ERR 一 —INVALID __MESSAGE無效的訊息識別碼 3CKU _ —ERR — —ECERT — INVALID無效的引擎憑證 4CKU _ —ERR — —SCERT — I N V A L I D無效的伺服器憑證 5CKU _ —ERR 一 —ECERT — REVOKED廢止引擎憑證 6CKU _ —ERR — —SCERT — R E V 0 K E D廢止伺服器憑證 7CKU _ —ERR — —INVALID —MED I A媒體識另丨J碼為無效的 8CKU _ —ERR 一 —INVALID _HANDLE在DFS檔案處置表列中具有 一個無效處置。在ContextData欄位中回報這個壞處置索 引。 9CKU _ERR _SAUTH _FAILED伺服器鑑別失敗(無論是引擎 或是CKU原版影片) 10CKU_ERR_UNLOCK_FAILED為某種原因,這個引擎回報 一個失敗的解除鎖定。在Context Data欄位中回報這個引583568 V. Description of Invention (182) Sends an event to an event disposition to report the status of the transaction to this webpage. In box 3 5 9 2 this page is used to display the status of the transaction. In the embodiment shown in Figures 35, there are multiple opportunities for errors. As shown in Table 49, the errors transmitted in a message include the following types. Table 49 Error code name description 0CKU _ — ERR 1 — UNKNOWN An unknown or undefined error occurred 1 CKU — — ERR 1. INVALID _DATA part of the data in the last packet is invalid 2 CKU — — ERR 1 — INVALID __MESSAGE is invalid Message ID 3CKU _ —ERR — —ECERT — INVALID invalid engine certificate 4CKU _ —ERR — —SCERT — INVALID server certificate 5CKU _ —ERR One —ECERT — REVOKED Revoke engine certificate 6CKU _ —ERR — —SCERT — REV 0 KED revoke server certificate 7CKU _ —ERR — —INVALID —MED IA media identification and 8CKU with invalid J code _ —ERR a —INVALID _HANDLE has an invalid disposition in the DFS file disposal list. Report this bad disposal index in the ContextData field. 9CKU _ERR _SAUTH _FAILED server authentication failed (either engine or original CKU video) 10CKU_ERR_UNLOCK_FAILED For some reason, this engine reports a failed unlock. Report this quote in the Context Data field

583568 五、發明說明(183) 擎的狀態碼。 在本發明的一個或更多個實施例中,這個安全電子内容 (SEC )系統的資料保全乃是利用這個媒體上設置的複數 個識別碼予以加強。這些識別碼可以是公開的、私密的、 或兩者兼具。如先前所述,這些識別碼可以在一個^版影 片製作程序期間、或是在隨後的其他交易期間產生,其完 王取决於糸統的要求,如第5 〇表所示。 第50表 存取動作位置及產生說明583568 V. Description of the invention (183) Engine status code. In one or more embodiments of the present invention, the data security of the secure electronic content (SEC) system is enhanced with a plurality of identification codes set on the medium. These identification codes can be public, private, or both. As mentioned earlier, these identifiers can be generated during a movie production process or during other subsequent transactions, and their completion depends on the requirements of the system, as shown in Table 50. Table 50 Location and description of access action

公開由原版影片 GUID 製作程序產生各個產生戳印原版影片 的 公開識別碼架構。在這個欄位中產生 fi X έΑ I ι 生、統計上獨一無二的識別碼 私始、識別碼架構。由原版影片製The public IDD framework that generates the original stamps is generated by the original video GUID production process. In this field, generate a fi X έΑ I ι unique, statistically unique identification code, private identification, identification code structure. Produced by the original film

ContentKey内容的原版影 ^。各個具有 這個識別碼即是預弈# _ & +、、先计上獨一無二的識別碼。 广密識別碼架構。在這個欄位中:Γ 2… Conten'Key内容的獨立媒體的統J 一 :::寫亡 別碼即是寫入或攔位、 獨 …、一的。這個識 )内容所連結的識別碼么 ^原版影片製作、非預先錄製 私密非揮發性記情 。 生引擎的GU ID ' 這固引擎製造程序產生。各個產Original copy of ContentKey content ^. Each with this identification code is the pre-game # _ & +, first count the unique identification code. Broad ID Code Architecture. In this field: Γ 2 ... Conten'Key's content of independent media. J ::: Write to death The other code is written or blocked, independent ..., one. What is the identification code linked to the content? ^ Original video production, non-pre-recorded, private, non-volatile memory. The GU ID of the engine is generated by this solid engine manufacturing process. Various properties

583568 ---— 五、發明說明(184) ^體上儲存内容進行解除鎖定的方 $用來介紹一種鑑別協定、並且執^一第35圖所示) 定。由一個引擎的觀點,這種解 丁^,解除鎖定協 36圖所示的方法。在方塊3610中,這::乃是包括有第 -個處置、&一個金鑰盒子的一個金=乃是用來接收 子可以連結於一個寫入的識別 J補數。這個金鑰盒 擎乃是用來執行-個金餘盒子查表2塊3620中,這個引 3及63解〇:,這個金鑰盒子内部的那些金餘便;::;方塊 及解岔的動作。隨後,在方塊364〇 ㈢進订解除連結 成、且金餘亦會重新連結、 =個交易便會完 圖所示的方法,這些應用程式界面2疋°由於第35及36 個服器傳送資料時加以保護。由(一Ρ )便能夠在自一 兩個側面上進行的鑑別動作,通,鎖定交易的 以在傳;:隨,這個通信通二 個私密金錄、並且會%解密這=機?持有一 一個秘密對話金錄。這個秘密對話金二错以接收 塊(諸如:一個先進加 、,疋 個加密方 =隨有,1可以是盒)子方塊)進行接收, 鎖定據另;個:施例的:個解除 程序啟動指示3702開始’ jl可=圖37°°乃是由-個 具可以包括有:啟動一個裝置。583568 ----- V. Description of the invention (184) The method of unlocking the contents stored on the system $ is used to introduce an authentication protocol, and is implemented as shown in Figure 35). From an engine point of view, this solution is based on the method shown in Figure 36. In block 3610, this:: is a gold containing the first disposition, & a key box, and is used to receive the identification J complement that the child can link to a write. This key box engine is used to execute a golden money box look-up table 2 block 3620, this quote 3 and 63 solution 0 :, the gold money inside this key money box;: ;; blocks and solutions action. Then, at box 364〇, the order will be unlinked, and the remaining funds will be reconnected, and the transaction will complete the method shown in the figure. These application interfaces are 2 疋 ° because the 35th and 36th servers send data. Protect it when it comes. (1P) will be able to perform authentication actions from one or two sides, and the transaction will be locked; then, this communication will pass through two private gold records, and it will be decrypted. One by one secret dialogue golden record. This secret conversation was received by a receiving block (such as: an advanced plus, a cryptographic party = optional, 1 can be a box) sub-block, and locked according to another; a: Example: a release procedure is started Instruct 3702 to start. 'Jl 可 = 图 37 °° 是 由-A tool can include: start a device.

第190頁 583568Page 190 583568

方 塊 3704 乃 是 用 來 讓 媒 體 ( 透 過 ,舉 例 來 說 一 個 萬 用 插 入 連接 _ 一 台 個 人 電 腦 (PC 方 塊 3 7 0 6 乃 是 用 來 啟 動 一 個 在 本 發明 的 一 個 實 施 例 中 5 服 器 ,其 係 安 裝 在 一 個 光碟 插 入 事件 諸 如 ·· 將 媒 體 插 這 個 自動 執行處 置 後 5 個 案 系 統, 藉 以 接 收 具 有 指 示 動 ^— 個π内容管理裝置” 0 方 理 裝 置, 其 係 用 來 呈 現 鎖 定 例 中 ,這 個 内 容 管 理 裝 置 乃 用 者 能夠 與 其 進 行 互 動 5 藉 這 個 内容 管 理 裝 置 可 以 動 態 利 用 一個 contents • ddl 標 案 對 於 鎖定 内 容 而 5 這 個 内 者 以 一個 連 結 5 猎 以 將 個 解 除 鎖定 内 容 的 位 置 〇 再 者 測 到 一個 内 容 管 理 裝 置 的 不 檔 案 的讀 取 動 作 以 •i-n. 汉 置 全 球 本 發 明的 一 個 實 施 例 中 > 媒 如 在 —個 資 訊 站 或 下 載模 型 有 與 這些 供 應 相 關 連 的 複數 倘 若 存在 複數 個 全 球 資 源 定 =如:一個可攜式碟片)能夠 序列匯流排(USB)埠,進而 )的-個裝置+。這個流程的 自動執行處置,如先前所述。 這個自動執行處置乃是一個伺 驅動器堆®中,藉以等待一個 入一個裝置的事件。一旦啟動 自動執行處置便會穿過這個檔 的一個aut0.inf檔案,進而啟 塊3708乃是有關於這個内容管 的内容。在本發明的一個實施 是一個呈現層,藉以讓一個使 以播放一個媒體碟片的内容。 地建立一個表格的内容,藉以 區別鎖定及解除鎖定的内容。 容管理裝置可以提供這個消費 消費者或使用者指向一個允許 ’自動執行處置3706亦可以積 足、並執行一個contends.ddl 資源定位器(URL )資料。在 體亦可以包括複數個供應(誠 中)、並且亦可以或可以不具 個全球資源定位器(URL )。 位器(URL ),則這個消費者Block 3704 is used for media (through, for example, a universal plug-in connection_ a personal computer (PC box 3 7 0 6 is used to start a server in an embodiment of the invention, which It is installed in a disc insertion event such as ... inserting media into this 5 case system after automatic execution of processing, so as to receive instructions with ^^ π content management device "0 Fang Li device, which is used to present the locking example, this The content management device allows the user to interact with it. 5 By borrowing this content management device, you can dynamically use a contents • ddl tag for locked content and 5 the insider hunts with a link 5 to unlock the location of the content. The reading operation of a file to a content management device starts with • in. In one embodiment of the present invention, the media is in an information station Or the download model has a plurality of devices associated with these supplies. If there are multiple global resources, such as: a portable disc, a device capable of serial bus (USB) port, and then) a device +. This process is automatically executed Disposal, as described previously. This automatic execution of disposal is an event waiting in the drive heap® to wait for an entry into a device. Once the automatic execution of disposal is started, it will pass through an aut0.inf file in this file to start the block. 3708 is related to this content management. One implementation of the present invention is a presentation layer, so that one can play the content of a media disc. The content of a table is created to distinguish locked and unlocked content. The content management device can provide the consumer or user to point to an allowable 'automatic execution of disposal 3706. You can also accumulate and execute a continents.ddl resource locator (URL) data. You can also include multiple supplies (Chengdu (Middle), and may or may not have a global resource locator (URL). URL (URL), then this consumer

583568583568

或使用者便在可以繼續動作選擇其中任何一個。 在方塊3710中的這個内容管理裝置乃是用來為那些 ContentKey數位權利管理(c〇RM)内容檔案提供一 擇性ContentKey數位權利管理(CKDRM )入口。 ^Or the user can continue to choose any one of them. The content management device in block 3710 is used to provide an optional ContentKey Digital Rights Management (CKDRM) entry for those ContentKey Digital Rights Management (CORM) content files. ^

的一個實施例中,一個contentKey數位權利管理明 )的需求僅僅會存在下列情況發生的時候。首 M 一個全球資源定位器(URL)的一個套裝軟體收集識付^於 乃是指向一個套裝軟體或其組合,其可以利用至少5 —,、、 子零售商(eTai ler )進行解除鎖定動作,諸如:由一μ 個電子零售商(eTailer)對一個第二音樂交易進行= 鎖定動作。其次,一個套裝軟體收集識別碼亦可以附加\ 這個全球資源定位器(URL )’其乃是用來指向兩個或 多個可以由一個不同電子零售商(eTaUer)進行解除鎖 疋動作的套裝軟體。無論在那個例子中,選擇性電子震隹 商(eTailer)的存在均會要求一個使用者或消費者在7繼= 續交易前選擇一個電子零售商(eTailer )。 、 另外,方塊3712乃是用來提供數位權利管 理(CKDRM )領域的一個登錄動作。特別是,一個登錄程 序亦可以根據這個特定的電子零售商(eTailer )。因 此,倘若一個消費者或使用者並未具有想要電子零售商 (eTai ler )的一個帳號,則他們便可以在方塊3712中建 立一個帳號、或者根據這個電子零售商(eTaiier)以選 擇一個訪客登錄存取權限及提供有效帳單資料以利用要求 的信用卡授權進行交易處理動作。待一個登錄程序完成 583568 五、發明說明(187) " ---- 後,方塊3714便會對一個消費者或其他使用者提供一個套 裝軟體/定價呈現。隨後,這個消費者或使用者便可以選 擇欲進行解除鎖定的内容、或將這個程序結束,若沒有選 f任何東西。在方塊3714中的一個套裝軟體表列乃是用來 提供一個程序,藉以讓一個消費者能夠選擇欲解除鎖定的 個或更多個套裝軟體。另外,在方塊37丨6中,一個消費 f資訊問卷會在需要或要求輸入帳單或其他資料時,同現 壬現給這個消費者/使用者。再者,方塊3 7丨8乃是,舉例 來說,根據這個問卷中輸入的資料,藉以提供這個交易摘 要的一個呈現。另外,方塊3729則是用來提供信用卡授權 動作,其可能需要或可能不需要,完全取決於系統的要 f。舉例來說,一個程式碼可以允許自由解除鎖定内容, 2以換取這個問卷3716的其他補償、甚至是沒有任何補 領。另外’方塊3 7 2 2則是用來提供這個交易的數位情報交 ,伺服器通知。特別是,一個電子零售商(eTailer )可 能會負責使用一個數位情報交換伺服器所要求的一種協定 以進行通信、並在其中發生一個解除鎖定的交易。在本發 =的一個實施例中,一個電子零售商(eTa i丨er )必須要 提供這個數位情報交換伺服器以這個套裝軟體收集識別碼 及一個消費者/使用者想要/購買的套裝軟體表列。另 外’這個數位情報交換伺服器亦可以要求提供某種特定程 度的消費者資訊。 方塊3 724則是用來將Content Key數位權利管理(CKDRM ) 啟動狀態提供給這個使用者或消費者。另外,方塊3 7 2 6乃In an embodiment, a contentKey digital rights management requirement only exists when the following situations occur. First, a set of software for a global resource locator (URL) collects and recognizes ^ then points to a set of software or a combination thereof, which can be unlocked using at least five, e-tailers (eTai ler), For example: a second music transaction by a μ electronic retailer (eTailer) = lock action. Secondly, a package software collection identifier can also be attached \ This global resource locator (URL) 'is used to point to two or more package software that can be unlocked by a different electronic retailer (eTaUer) . Regardless of the example, the presence of a selective e-tailer (eTailer) will require a user or consumer to select an e-tailer (eTailer) before continuing the transaction. In addition, block 3712 is used to provide a login action in the field of digital rights management (CKDRM). In particular, a login program can also be based on this particular e-tailer. Therefore, if a consumer or user does not have an account for the desired e-tailer, then they can create an account in box 3712 or select a visitor based on the e-tailer Log in to access permissions and provide valid billing information to authorize transactions with the requested credit card authorization. After a registration process is completed 583568 5. Invention Description (187) " ----, block 3714 will provide a packaged software / pricing presentation to a consumer or other user. The consumer or user can then choose what to unlock, or end the process, if nothing is selected. A software package list in block 3714 is used to provide a procedure whereby a consumer can select the software package or software packages to be unlocked. In addition, in box 37 丨 6, a consumption f information questionnaire will be presented to this consumer / user when it is necessary or required to enter bills or other information. Furthermore, blocks 3 7 丨 8 are, for example, based on the data entered in this questionnaire to provide a presentation of the transaction summary. In addition, block 3729 is used to provide credit card authorization actions, which may or may not be required, depending on the system requirements. For example, a code could allow free unlocking of content, 2 in exchange for other compensation for this questionnaire 3716, even without any compensation. In addition, the box 3 7 2 2 is used to provide digital information for this transaction, and the server notifies. In particular, an electronic retailer (eTailer) may be responsible for using a protocol required by a digital information exchange server to communicate, and an unlocked transaction occurs in it. In one embodiment of the present invention, an electronic retailer (eTaier) must provide the digital information exchange server with the software package to collect the identification code and a software package that the consumer / user wants / purchases. Table Column. In addition, the digital information exchange server can also request a certain degree of consumer information. Block 3 724 is used to provide the Content Key Digital Rights Management (CKDRM) activation status to this user or consumer. In addition, blocks 3 7 2 6 are

583568583568

^艮據-個鑑別程序’ #以提供—個引擎及—個伺服器對 、癸叙=外’方塊3728乃疋用來提供—個金鑰補數查表及傳 2作、並將這個金錄補數寫人這個褒置/碟片或需要一 :^錄補凄文以完成加密要求的其他位置。方塊373〇乃是用 來棱供一個contents.ddl檔案的更新動作。另外,方塊 3/32乃是用來提供一種程序,藉以完成解除鎖定内容的這 ,c〇ntentKey數位權利管理(CKDRM)交易。方塊3734乃 是由一個電子零售商(eTailer )(諸如:在網際網路上 零售的一個團體)提供一個交易,藉以完成這個完成交易^ According to-an authentication procedure '# to provide-an engine and-a server pair, hexadecimal = outside' box 3728 is used to provide-a key complement look-up table and pass 2 works, and this gold Write the supplementary number to write this setting / disc or you need one: ^ Record supplementary text to complete other places where encryption is required. Block 373.0 is used to update the contents.ddl file. In addition, Block 3/32 is used to provide a program to complete the unlocking of content. The ConntentKey Digital Rights Management (CKDRM) transaction. Block 3734 is a transaction provided by an eTailer (such as a group that retails on the Internet) to complete the transaction

的通知動作。另外,方塊3736則是對這個使用者或消費者 提供一個選擇性的恭贺呈現。Notification action. In addition, block 3736 provides an optional congratulations presentation to the user or consumer.

請同時參考第38及39圖,第38圖乃是一種方法的一個流程 圖,其乃是根據本發明的一種解除鎖定内容程序的一個實 施例。另外,在這個安全電子内容(SEC )系統中,元件 間的物件互動則表示在第39圖中。特別是,請參考第38 圖’方塊3802乃是用來讓這個數位情報交換伺服器(DCS )4單管理祠服器2 9 0 8能夠將具有或不具有一個媒體識別 碼的記錄DCS —STAGE表格插入第39圖所示的那個DataPlay (DP )資料保全資料庫3914中,如INSERT—INTO—DCS — STAGE 3918 所示。 特別是’請參考這個DataPlay (DP)資料保全資料庫 3 9 1 4,這個資料庫的一個概要的一個實施例係提供在下列 的第51A表至第51D表中。 第51 A表Please refer to FIGS. 38 and 39 at the same time. FIG. 38 is a flowchart of a method, which is an embodiment of a program for unlocking content according to the present invention. In addition, in this secure electronic content (SEC) system, object interactions between components are shown in Figure 39. In particular, please refer to Figure 38. The block 3802 is used to enable this digital information exchange server (DCS) 4 to manage the server 2 9 0 8 to record DCS with or without a media identification code—STAGE The form is inserted into the DataPlay (DP) data security database 3914 shown in Figure 39, as shown in INSERT_INTO_DCS_STAGE 3918. In particular, please refer to this DataPlay (DP) data security database 3 9 1 4. An example of a summary of this database is provided in Tables 51A to 51D below. Form 51 A

第194頁 583568 五、發明說明(189)Page 194 583568 V. Description of the invention (189)

CKDRM—MASTER—KEYCKDRM—MASTER-KEY

HH

MASTER_ITEM_IDNUMERIC (0 ^ 0 ) NOT NULL PC_IDVARCHAR (40 ) NOT NULL ITEM—NAMEVARCHAR ( 400 ) NOT NULL ITEM—HANDLEVARCHAR (8 ) NOT NULL KEY _COMPLEMENTVARCHAR (50 ) NULL KEY—VERSIONNUMERIC (3,0 ) NULL BUSINESS_ENTITY_IDNUMERIC (3 ^ 0 ) NULL CHANGE—IDVARCHAR ( 8 ) NOT NULL CHANGE—DTDATENOT NULL 第5 IB表MASTER_ITEM_IDNUMERIC (0 ^ 0) NOT NULL PC_IDVARCHAR (40) NOT NULL ITEM—NAMEVARCHAR (400) NOT NULL ITEM—HANDLEVARCHAR (8) NOT NULL KEY _COMPLEMENTVARCHAR (50) NULL KEY_VERSIONNUMERIC (3,0) NULL BUSINESS_ENTITYID ) NULL CHANGE—IDVARCHAR (8) NOT NULL CHANGE—DTDATENOT NULL Table 5 IB

CKDRM—MASTER—PKGCKDRM—MASTER—PKG

MASTER_PKG_IDNUMERIC (0 ^ 0 ) NOT NULL PC—IDVARCHAR (40 ) NOT NULL PKG—IDVARCHAR (40 ) NOT NULL CHANGE—IDVARCHAR (8 ) NOT NULL CHANGE DTDATENOT NULL _ 第51C表MASTER_PKG_IDNUMERIC (0 ^ 0) NOT NULL PC—IDVARCHAR (40) NOT NULL PKG—IDVARCHAR (40) NOT NULL CHANGE—IDVARCHAR (8) NOT NULL CHANGE DTDATENOT NULL _ Table 51C

CKDRM —MASTER —PKG —KEYCKDRM —MASTER —PKG —KEY

MASTER—PKG—ID (FK ) NUMERIC (0,0 ) NOT NULL MASTER—ITEM—ID (FK ) NUMERIC (0,0 ) NOT NULL CHANGE—IDVARCHAR (8 ) NOT NULLMASTER—PKG—ID (FK) NUMERIC (0,0) NOT NULL MASTER—ITEM—ID (FK) NUMERIC (0,0) NOT NULL CHANGE—IDVARCHAR (8) NOT NULL

第195頁 183568 五、發明說明(190)Page 195 183568 V. Description of the Invention (190)

CHANGE DTDATENOT NULLCHANGE DTDATENOT NULL

第51D表 DCS _STAGETABLE 51D DCS _STAGE

TRANSACTION_IDVARCHAR ( 2 0 0 ) NOT NULL PCIDVARCHAR (40 ) NOT NULL PKGIDVARCHAR (40 ) NOT NULL MEDIA—IDVARCHAR (36 ) NULL STATUSNUMERIC (1 , 0 ) NOT NULL CREATE—DTDATENOT NULL KEY__REQUEST_DTDATENOT NULL COMPLETE —DTDATENOT NULL CHANGE—IDVARCHAR (8 ) NOT NULL CHANGE DTDATENOT NULLTRANSACTION_IDVARCHAR (2 0 0) NOT NULL PCIDVARCHAR (40) NOT NULL PKGIDVARCHAR (40) NOT NULL MEDIA—IDVARCHAR (36) NULL STATUSNUMERIC (1, 0) NOT NULL CREATE—DTDATENOT NULL KEY__REQUEST_DTDATENOT NULL COMPLETE —DATE ) NOT NULL CHANGE DTDATENOT NULL

請再度參考第38圖,方塊3804乃是用來讓這個數位情報交 換伺服器(DCS )訂單管理伺服器3 908能夠產生一個網 頁,其中,一個用戶端伺服器3 9 0 4乃是利用一個交易識別 碼做為範例。内嵌有CKU用戶端的這個品牌網頁的連接 3916乃是如圖中所示。其中,方塊3806乃是用來讓這個 CKU用戶端3904能夠取得這個引擎3 902的Con ten tKey數位 權利管理(CKDRM)憑證,如CKCMD_GET_CERTIFICATE 命 令連接3920所示。另外,方塊38 06乃是用來讓這個引擎 3 902能夠藉著傳送一個Con ten tKey數位權利管理(CKDRMPlease refer to Figure 38 again. Block 3804 is used to enable this Digital Information Exchange Server (DCS) order management server 3 908 to generate a web page. Among them, a client server 3 904 uses a transaction. The ID is used as an example. The connection 3916 of this brand webpage with the CKU client embedded is shown in the figure. Among them, block 3806 is used to enable the CKU client 3904 to obtain the Con ten tKey Digital Rights Management (CKDRM) certificate of the engine 3 902, as shown in the CKCMD_GET_CERTIFICATE command connection 3920. In addition, block 38 06 is used to enable this engine 3 902 to transmit a Con ten tKey Digital Rights Management (CKDRM

第196頁 583568 五、發明說明(191) )憑證給CKU用戶端39G4,進而完成回應的動作,誠如圖 中的連接3922所示。另外,CKU用戶端39〇4係傳送這個 DFS^CMD—GET—MEDIA—METADAT命令至弓丨擎3902,藉以擷 取這個獨一無二的媒體識別碼。方塊38〇8乃是用來讓這個 CKU用戶端3904能夠取得這個獨—無二的媒體識別碼,如 圖中的連接3 9 1 6所示。在本發明的一個實施例中,倘若未 能建立這個獨一無二媒體識別碼的取得動作,則引擎39〇2 便會取得這個識別碼。Page 196 583568 V. Description of the invention (191)) The certificate is given to the CKU client 39G4, and the response action is completed, as shown in connection 3922 in the figure. In addition, the CKU client 3904 sends the DFS ^ CMD_GET_MEDIA_METADAT command to the Gong Engine 3902 to retrieve this unique media identification code. Block 38008 is used to allow the CKU client 3904 to obtain the unique media identification code, as shown in the connection 3 9 16 in the figure. In one embodiment of the present invention, if the obtaining action of the unique media identification code cannot be established, the engine 3902 will obtain the identification code.

在取得這個獨一無二的媒體識別碼以後,CKU用戶端39〇4 便會將一個超文件傳輸協定(Ηττρ )告示3928、或根據另 一種協定(其適合於用戶端伺服器通信)的一個告示傳送 給CKU伺服器3906。基於這個告示,CKU伺服器39〇6便會利 用一個GetServerCert 程式(Servlet ) 3930 做為範例,其 乃是用來執行一個包括有這個CKU原版影片391()(在本發 明的一個實施例中,這個函數乃是一個Java類別的原版影 片)的GetServerContentKeyCert ()函數3 932、並且操After obtaining this unique media identification number, the CKU client 3904 sends a hyperfile transfer protocol (Ηττρ) notice 3928, or a notice based on another protocol (which is suitable for client server communication) to CKU server 3906. Based on this notice, the CKU server 3906 will use a GetServerCert program (Servlet) 3930 as an example, which is used to execute a CKU original movie 391 () (in one embodiment of the present invention, This function is a Java version of the original movie) GetServerContentKeyCert () function 3 932, and

取要求的字串。CKU原版影片3910乃是透過連接3934將 GetServerContentKeyCert ()函數3 9 32 施加至加密圖書 館(Crypto Library ) 3912,藉以由這個加密圖書館 (Crypto Library ) 3912中取得要求的憑證。 另外,方塊3810乃是用來讓這個CKU用戶端39〇4能夠取得 這個伺服器3906的内容金鑰憑證。如第39圖所示,無論是 一個憑證或是一個錯誤均會由加密圖書館(Crypt〇 Library ) 3912、經由連接3938及3 936而傳回到這個CKU原Take the required string. The original CKU movie 3910 applies the GetServerContentKeyCert () function 3 9 32 to the Crypto Library 3912 through the connection 3934, and obtains the required certificate from the Crypto Library 3912. In addition, block 3810 is used to enable the CKU client 3904 to obtain the content key certificate of the server 3906. As shown in Figure 39, whether it is a credential or an error, it will be returned to the original CKU by the Crypt〇 Library 3912 and the connections 3938 and 3 936.

第197頁 583568 五、發明說明(192) '〜 版影片3910。〇(11用戶端3904乃是利用連接3940中、由這 個用戶端3904傳送至這個引擎3902的這個CKCMD — AUTHENTICATE命令(即:伺服器憑證),藉以要求一個具 有這個接收憑證的對話金錄(E S e s s i ο η K e y )。 、 方塊3812乃是用來讓這個CKU用戶端3904能夠經由連接 3 9 4 0、利用這個C KIM司服器3 9 0 6的C ο n t e n t K e y數位權利管 理(CKDRM )憑證以經由連接3942、自這個引擎39〇2中取 付這個對話金錄(ESessionKey )。 另外’方塊3 814乃是用來讓這個用戶端3904能夠產生一個 解除鎖定的要求,藉以認證及/或更新具有這個媒體識別 碼的一個表格。在本發明的一個實施例中,這個表格乃是 一個DCS —STAGE表格。再者,方塊3814乃是用來讓這個用 戶端3904能夠要求這個引擎39〇2的鑑別動作、取得這個槽 案處置/金鑰補數/版本表列、並且包覆這個檔案組合: 另外,這個CKU用戶端3904,利用連接3944,乃是用來傳 送一個超文件傳輸協定(HTTP)公告至CKU伺服器39 0 6, 其包括有:舉例來說,對話金錄(ESessionKey)、引擎 憑證、媒體識別碼、及交易識別碼。CKU伺服器3906内部 的那些解除鎖定内容程式(gervlet ) 3946乃是經由連接 3 948、利用解除鎖定内容(uni〇ck Con tent )函數(其包 括·對話金錄(ESess i onKey )、引擎憑證、媒體識別 碼、及交易識別碼),藉以發出CKU原版影片3910的解除 鎖定要求。另外,CKU原版影片3910乃是經由連接295 0以 存取這個DataPlay (DP )資料保全資料庫3914、並將將這Page 197 583568 V. Description of the invention (192) '~ Edition video 3910. 〇 (11 The client 3904 uses the CKCMD-AUTHENTICATE command (ie, server certificate) in the connection 3940 and is transmitted from the client 3904 to the engine 3902 to request a conversation record (ES) with the receiving certificate. essi ο η K ey). Block 3812 is used to enable the CKU client 3904 to connect via 3 9 4 0 and use the C KIM server 3 9 0 C ο ntent K ey Digital Rights Management (CKDRM ) The credentials are used to retrieve the ESessionKey from the engine 39002 via the connection 3942. In addition, 'block 3 814 is used to enable the client 3904 to generate a request for unlocking for authentication and / or Update a table with the media identifier. In one embodiment of the invention, the table is a DCS-STAGE table. Furthermore, block 3814 is used to enable the client 3904 to request the engine 3902 The authentication action, obtain the slot disposal / key complement / version list, and wrap the file combination: In addition, the CKU client 3904 uses the connection 39 44 is used to send a Hyper File Transfer Protocol (HTTP) announcement to the CKU server 39 06, which includes: for example, ESessionKey, engine certificate, media identification code, and transaction identification code The CKU server 3906 inside those unlocked content programs (gervlet) 3946 is through the connection 3 948, the use of unlocked content (uniock Content) functions (which includes ESess i onKey), engine credentials , Media identification code, and transaction identification code) to issue an unlock request for the original CKU movie 3910. In addition, the original CKU movie 3910 is connected to 2950 to access the DataPlay (DP) data security database 3914, and Will this

第198頁 583568 五、發明說明(193) 個P 一KEY命令(其包括有··交易識別碼、媒體識別碼、密 碼、結果組合(Re suit Set )輸出)傳送出去。這個 DataPlay (DP)資料保全資料庫3914乃是透過連接3952以 回應一個結果組合(ResultSet)(檔案處置—金鑰—版 本)或一個錯誤。另外,CKU原版影片亦可以經由 WrapFileSet函數(其包括有:對話金鑰(ESessi〇nKey )、引擎憑證、檔案組合字串、金鑰計數、媒體識別碼 )、利用連接至加密圖書館(Crypto Library) 3912的連 接3 9 5 4以要求這個包覆播案組合。 另外,方塊3816乃是用來讓CKU用戶端3904能夠傳送這個 包覆墙案至引擎3902 ’藉以使這個引擎3902可以對這個内 谷進行解除鎖疋動作。特別是,加密圖書館(C r y p七〇Page 198 583568 V. Description of the invention (193) P-KEY commands (including the transaction ID, media ID, password, and result set (Re suit Set) output) are transmitted. The DataPlay (DP) data security database 3914 responds to a ResultSet (File Handling-Key-Version) or an error by connecting 3952. In addition, the original CKU video can also be connected to the encrypted library (Crypto Library) through WrapFileSet functions (which include: ESessi0nKey), engine certificates, file combination strings, key counts, and media identifiers. ) 3912's connection 3 9 5 4 to request this wrap broadcast combination. In addition, the block 3816 is used to enable the CKU client 3904 to transmit the wrapped wall case to the engine 3902 ′, so that the engine 3902 can perform an unlocking action on the inner valley. In particular, the crypto library (C r y p 七 〇

Library ) 3912乃是經由與這個CKU原版影片3910的連接 3 9 6 0,藉以傳送這個包覆槽案組合或是一個錯誤訊息。 CKU原版景^片3910乃是利用連接3958,藉以將傳輸内容傳 送給這個CKU伺服器390 6、然後再利用連接3960以自這個 CKU伺服器3906傳送至這個CKU用戶端3904。另外,CKU用 戶端3 9 0 4乃是利用這個包覆檔案組合、經由連接3 9 6 2以將 一個CKCMD 一UNLOCK —F ILES命令傳送至這個引擎3902。隨 後’引擎3902便會利用連接3964,將一個成功訊息、具備 認證的成功訊息、或失敗訊喼回傳至這個CKlJ用戶端 3904。 方塊3818乃是用來讓CKU用戶端3 9 0 4能夠將一個最終交易 狀悲sfl息傳送至c K U "ί司服器3 9 0 6、並且對一個消費者/使Library) 3912 is connected to the original CKU video 3910 3 9 60 to send the package slot combination or an error message. The original CKU scene 3910 uses the connection 3958 to transmit the transmission content to the CKU server 390 6 and then uses the connection 3960 to transmit from the CKU server 3906 to the CKU client 3904. In addition, the CKU client 3 9 0 4 uses this package file combination to transmit a CCKMD-UNLOCK-F ILES command to the engine 3902 via the connection 3 9 6 2. Subsequently, the engine 3902 will use the connection 3964 to send a success message, a success message with authentication, or a failure message to the CKlJ client 3904. Block 3818 is used to enable the CKU client 3 9 0 4 to transmit a final transaction status message to c K U " server 3 9 0 6 and to a consumer / user

第199頁 583568 五、發明說明(194) 用者顯示以一個父易完成訊息(,’傳輸完成")。特別是, CKU用戶端39 04還會傳送一個超文件傳輸協定(HTTp )公告給C K U祠服器3 9 0 6 ’其包括有:交易識別碼及狀態訊息 3 9 6 6 。 方塊3 8 2 0乃是用來讓這個數位情報交換伺服哭(d c s )訂 單管理伺服器3908能夠收到這個狀態完成通:、並且將那 個交易的DCS —STAGE記錄刪除及更新交易。這個 UpdateStatus 程式(Servlet ) 396 8 乃是利用連接397〇 傳 送UpdateStatus函數(其包括有:交易識別碼及狀態訊息 )至數位情報交換伺服器(DCS)訂單管理伺服器39〇8 ’ 藉以回應於這個公告3966。另外,這個Updatestatus程式 (Servlet ) 3968乃是利用更新SQl語法 識別碼、狀態訊息),藉以與這二二;:广 (DP )貝料保全資料庫3 9 j 4進行連接。 現在請同 圖,藉以 易,並且 中、各個 乃是用來 一個播放 片),其 自動執行 Contents 擎4102傳 日寸參考第40及41圖 表示根據本發明一 ’第41圖乃是在這 元件間物件互動的 接收包括有鎖定内 器或裝置(其耦接 刀別轉接至一個引 處置4104 (或一個 ^己1檔案。請參考 * ,其中 個實施 個安全 昂4 U圖乃是一個流程 例的一個解除鎖定交 電子内容(SEC )系統 一個方塊圖。其中,方塊40 02 體(舉例來說,放置在 容的媒 至一台個人電腦)中的一個碟 擎4 102 内容管 第41圖 個信號至這個磁磁插 方塊4004則是用來讓 理裝置)能夠要求一個 ’這個要求乃是利用引 入事件的自動執行處置Page 199 583568 V. Description of the Invention (194) The user displays a message that the completion is completed with a parent ("Transfer completed"). In particular, the CKU client 39 04 will also send a Hyper File Transfer Protocol (HTTp) announcement to the CK U Temple server 3 9 0 ′, which includes: a transaction identifier and a status message 3 9 6 6. Block 3 8 2 0 is used to make this digital information exchange server cry (d c s) order management server 3908 can receive this status to complete the communication :, and delete the DCS-STAGE record of that transaction and update the transaction. The UpdateStatus program (Servlet) 396 8 sends the UpdateStatus function (which includes: transaction ID and status information) to the digital information exchange server (DCS) order management server 3809 using the connection 3970 'in response to this Bulletin 3966. In addition, the Updatestatus program (Servlet) 3968 uses the updated SQl syntax identifier, status information) to connect with these two two :: guang (DP) materials security database 3 9 j 4. Now please refer to the figure to make it easy, and the middle and each are used for a play movie), which automatically executes the Contents engine 4102. The reference to Figures 40 and 41 shows that according to the present invention, a 'Figure 41 is in this element Receiving interaction between objects includes locking the internal device or device (the coupling tool is transferred to a lead processor 4104 (or a file). Please refer to *, one of which implements a safe Ang 4 U diagram is a process An example of a block diagram of an unlocked electronic content (SEC) system. Among them, a disk engine 4 102 in the body of block 40 02 (for example, placed in a medium to a personal computer) 102 content tube FIG. 41 A signal to this magnetic plug box 4004 is used to allow the device to be able to request a 'this request is to use the automatic execution of the event

583568 五、發明說明 (其表不為連接4 1 1 4 )而加以表示。隨後,這個自動執行 處置4104便會傳送一個1)1^(:〇—(^了—1?1]^8命令至引擎 4102。引擎4102乃是藉著傳送一個^111;6111:3 (^1檔案而加 以回應,如4 11 8所示。 另外,方塊4006乃是用來讓自動執行處置41〇4 (或内容管 理裝置)能夠掃描這個contents ddl檔案,藉以取得一個 或更多個識別石馬,其包括有:套裝軟體收集識別碼 (PaCkageC〇llectionID)、套裝軟體收集庫存單位 (PaCkageC〇llectionSKU)、解除鎖定的全球資源定位器 (UnlockURL)、主要套裝軟體庫存單位(packageSKu) 表列及商業實體識別碼、及一個先前解除鎖定的套裝軟體 庫存單位(PackageSKU)。另外,自動執行處置41〇4亦包 括有内部邏輯電路4120,藉以在返回這個c〇ntents ddl檔 案後進行操作。 另外^方塊4008乃是用來讓這個自動執行處置41〇4或一個 内谷官理裝置能夠將資料附加至一個全球資源定位器 (URL )、並且開啟一個預設瀏覽器以顯示一個電子零售 商(eTai ler )所產生的一個網頁。這個電子零售商 (e T a 1 1 e r )的選擇乃是根據先前所述的一個實施例。 另外,方塊4010乃是用來讓這個電子零售商(eTailer ) 4106能夠將一序列的網頁呈現給使用者/消費者,藉以處 理一個電子商務交易。一個使用者/消費者乃是透過這個 電子零售商(eTai ler ) 41 06的”購物車”網頁4122以進行 互動。583568 V. Description of the invention (not shown for connection 4 1 1 4). Subsequently, this automatic execution process 4104 will send a 1) 1 ^ (: 0 — (^ 了 —1? 1] ^ 8 command to the engine 4102. The engine 4102 sends a ^ 111; 6111: 3 (^ 1 file and respond to it, as shown in 4 11 8. In addition, block 4006 is used to allow the automated execution process 4104 (or content management device) to scan the contents ddl file to obtain one or more identification stones. Horse, which includes: package software collection identification code (PaCkageC〇llectionID), package software collection inventory unit (PaCkageC〇llectionSKU), unlocked global resource locator (UnlockURL), main package software inventory unit (packageSKu) list and Business entity identification code and a previously unlocked Software Package Storage Unit (PackageSKU). In addition, the automated execution process 4104 also includes an internal logic circuit 4120 to operate after returning the conntents ddl file. In addition ^ Block 4008 is used to enable this automatic execution process 4104 or an Inner Valley official device to attach data to a Global Resource Locator (URL) and open a A preset browser to display a web page generated by an e-tailer. The selection of the e-tailer (e Taier) is based on an embodiment described previously. In addition, block 4010 It is used to enable this e-tailer (eTailer) 4106 to present a sequence of web pages to users / consumers to process an e-commerce transaction. A user / consumer is through this e-tailer (eTai ler ) 41 06's "Shopping Cart" page 4122 for interaction.

第201頁 583568 五、發明說明(196) 另外,方塊4 0 1 2乃是用來說明:在一個使用者/消費者, 舉例來說,透過按钮及提示電子零售商(eTaiier)41〇6 以完成這個交易後’隨即應要求這個電子零售商 (eTailer ) 4106將這個ContentKey解除鎖定交易的結果 通知給這個數位情報交換伺服器(DCS )知道。電子^售 商(e T a i 1 e r )係傳送這個P C ID至這個數位情報交換伺服 器(DCS )、並將一個欲解除鎖定的套裝軟體庫存單位表 列’如HTTP公告4124 (PCID、套裝軟體表列)所示,經由 這個電子零售商(eTailer ) 4106傳送至這個數位情報交 換伺服器(DCS )訂單管理伺服器4 1 〇 8。 另外’方塊4 0 1 4乃是用來讓這個數位情報交換伺服器 (DCS )訂單管理元件能夠產生一個獨一無二的交易識別 碼、並且為每個購買的套裝軟體插入一個記錄。這個插入 SQL語法的命令4126 (交易識別碼、PCID、套裝軟體識別 碼)乃是由這個數位情報交換伺服器(Dcs )訂單管理飼 服器4108傳送至這個數位情報交換伺服写( 二 理資料庫川。。此時,這個媒體識別碼;二丁二 其將會包括一個NULL數值。 另外’方塊4016乃是用來說明:這個數位情報交換伺服哭 (D C S )訂單管理飼服器4丨〇 8係將—個失敗訊息或是一個° 全球貢源定位器(URL ) 41 28回應給這個電子零售商 (eTailer ) 4106。隨後,一個使用者/消費者便可以 用這個全球資源定位器(URL )以對内容進行解除鎖定動 作。這個解除鎖定的全球資源定位器(URL )係包括有這Page 201 583568 V. Description of the invention (196) In addition, the box 4 0 12 is used to explain: In a user / consumer, for example, through buttons and prompts eTaiier 41〇6 to Upon completion of this transaction, the e-tailer (eTailer) 4106 should be requested to notify the Digital Information Exchange Server (DCS) of the result of the ContentKey unlocking transaction. The electronic retailer (e T ai 1 er) sends the PC ID to the digital information exchange server (DCS) and lists a software package inventory unit to be unlocked, such as HTTP Bulletin 4124 (PCID, package software As shown in the table), it is transmitted to the digital information exchange server (DCS) order management server 4 108 via the electronic retailer (eTailer) 4106. In addition, block 4 0 1 4 is used to enable this Digital Information Exchange Server (DCS) order management component to generate a unique transaction identification number and insert a record for each software package purchased. The command 4126 (transaction identification code, PCID, package software identification code) inserted into the SQL syntax is transmitted by this digital information exchange server (Dcs) order management feeder 4108 to this digital information exchange servo write (secondary database) Chuan ... At this time, the media identification number; it will include a NULL value. In addition, 'block 4016 is used to explain: this digital information exchange servo cry (DCS) order management feeder 4 丨 〇8 A failure message or a ° Global Tribute Locator (URL) 41 28 responds to this e-tailer (eTailer) 4106. A user / consumer can then use this Global Resource Locator (URL) To unlock content. This unlocked Global Resource Locator (URL) includes this

583568 五、發明說明(197) f又f :戠別碼’其乃是由這個數位情報交換伺服器(DCS )訂早管理伺服器41 〇8所產生。 另外’方塊4 0 1 8乃是用來說明··這個電子零售商 (eTa 1 1 er ) 4 1 0 6乃是用來產生一個最終確認訊息、並且 對包括這個解除鎖定全球資源定位器(url 3〇 網頁進行解除鎖定動作。 #疋 其他實施例 3 : : ί 5者:瞭解··言兒明書所提到的實施例可用軟體程 \曰二μ二,八可以一種或多種程式產品,以各種形式 程式產生)進行散佈。並且,本發明亦可以 S 一 1 ί Μ二ί例中,而不必限定在實施上述散佈行為的 及二t承葡=二儲存媒體或信號承載媒體。程式儲存媒體 ! 2旯體的例子包括有:可記錄類型的媒體(諸 ^ π ^ _ μ*、IR〇M )、及磁帶傳輸類型的媒體(諸如: ι ”、 通化連結)、以及其他的媒體儲存及散佈系 統。 另外:ί:的詳細說明乃是利用方塊圖、流程®、及/或 =子& =以呈現本發明的各種實施例。熟習此技藝者當瞭 解— f塊圖元件、流程圖步驟、以及介紹的操作及/ f70彳,=疋用來做為該等實施例的範例,其可以透過更廣 >硬體、軟體、韌體、或其任何組合)而個別或 :二二;ΐ。$外’全部或部分熟習下列領域(包括:標 二:交後丄Ϊ殊應用積體電路(ASIC))人士在除解本 舍月揭路後^瞭解’本發明可以實施為在一台具有適當硬583568 V. Description of the invention (197) f and f: 戠 different code ’, which is generated by the digital information exchange server (DCS) order management server 41 08. In addition, 'block 4 0 1 8 is used to explain ... This electronic retailer (eTa 1 1 er) 4 1 0 6 is used to generate a final confirmation message, and to include this unlocked global resource locator (url 3〇 The webpage performs the unlocking action. # 实施 Other Embodiment 3:: ί 5: Understand ·· The embodiments mentioned in the book can be used by software programs, which can be one or more program products, Generated in various forms). In addition, the present invention can also be used in the S-1 1M2 example, and is not necessarily limited to the implementation of the above-mentioned dissemination behavior and the two storage media or signal storage media. Program storage media! Examples of 2 types of media include: recordable types of media (such as ^ π ^ _ μ *, IROM), and tape-type media (such as: ι, Tonghua Link), and other Media storage and distribution system. In addition: The detailed description is to use block diagrams, processes ®, and / or = sub & = to present various embodiments of the present invention. Those skilled in the art should understand-f block diagram elements , Flowchart steps, and the operations described and / f70 彳, = 疋 are used as examples of these embodiments, which can be individually or through a wider range of hardware, software, firmware, or any combination thereof). : 22; ΐ. $ 外 'People who are fully or partially familiar with the following fields (including: Standard 2: Post-application Special Application Integrated Circuit (ASIC)) After clearing the road and clearing the road ^ Understand' The invention can Implemented as

第203頁 五、發明說明(198) 體(諸如:一個或争夕& 、, 裎代、:Ι?ι髀、·^甘夕個電腦)的通用機械上執行的電腦 牙王式轫體、或其任音έ人并日,、 ^ ^ ^ ^ -V' μ ^ %、組合,亚且,廷個軟體或韌體的電 路及/或私式撰寫亦應該為熟習此技藝者 雖然本發明已經利用透過特定實施例表 習此技藝者亦應能夠基於說明蚩的於道及况月如上热 範圍及其特徵的前提下,對本二日 、在不偏離本發明 因此,下列申請專利範圍乃是用、行各種調整及變動。 括其調整及變動),並且,這些二包括本發明的範圍(包 發明的範圍。 周iE及變動亦應該視為本 叫568 1式簡單說明 - ^使热習本發明技藝者能夠更加容易地瞭解本發明,包括 ^明的各種目的、特徵、及優點,本發明係配合圖式說 如後。在下列圖式中,相同的編號係用來表示類似 同的元件。 =1圖係根,本發明的一個實施例、介紹這個安全電子内 =(SEC )系統内數位權利管理(DRM )系統 『。圖係根據本發明的一個實施例、介紹一個 紹"個安全電子内 介紹一個安全電子内 =3圖係根據本發明的一個實施例 =(SEC )系統所支援的方法。 筮U糸、、先架構的一個開放系統互連(0SI )模型 =係根據本發明的 貢料的内容流向。 文王及不女全凡 、纟σ由媒體擷取資料 、介紹一個憑證程序。 ;丨紹使用一個憑證以 0 ”紹執行一個確認程 係根據本發明的-個實施例 的一種安全方法。 第5C圖係根據本發明的-個實施例 第6圖係根據本發明沾二只鉍例 建立-個安全上明的一個貫施例、 綱係:i;通道的-個程序 序的-個;ΐ本發明的-個實施例 利用流程圖介紹在一 介紹廢除一個内容肩 ==據本發明的 楚7C圖係迗資料的—種方法 弟7C圖係根據本發明的一個實施例 583568Page 203 Fifth, the invention description (198) body (such as: one or Zheng Xi & ,, 裎 代,: I? Ι 髀, · ^ Gan Xi personal computer) general purpose machine executed on the general machinery , Or any one of them, ^ ^ ^ ^ -V 'μ ^%, combination, sub-software or firmware circuit and / or private writing should also be familiar to those skilled in this art. The invention has been used to practice this skill through a specific embodiment. Those skilled in the art should also be able to explain the scope and characteristics of the above-mentioned thermal range and characteristics on the basis of the description of the above, and without departing from the present invention. Therefore, the following patent application scope is Use and perform various adjustments and changes. Including its adjustments and changes), and these two include the scope of the present invention (including the scope of the invention. Zhou iE and changes should also be regarded as a simple explanation of what is called 568 type 1-^ to make it easier for those skilled in the invention Understand the present invention, including the various purposes, features, and advantages of the present invention. The present invention is described below with reference to the drawings. In the following drawings, the same numbering is used to indicate similar elements. = 1 Figure root, An embodiment of the present invention introduces the digital rights management (DRM) system within the secure electronic = (SEC) system. The diagram is based on an embodiment of the present invention, introduces one, and introduces one secure electronic. Internal = 3 is a method supported by the (SEC) system according to an embodiment of the present invention. 筮 U 筮, an open system interconnection (OSI) model of the prior architecture = is the content flow of the material according to the present invention King Wen and his daughter Quan Fan, 纟 σ retrieved data from the media and introduced a voucher program. 丨 How to use a voucher to execute a confirmation process according to one embodiment of the present invention Method: Figure 5C is an embodiment according to the present invention. Figure 6 is an example according to the present invention with two bismuth immersed in a safe, consistent embodiment. Outline: i; channel-a program -An embodiment of the present invention is described by using a flow chart to introduce the abolition of a content shoulder == a method according to the Chu 7C picture system of the present invention. The 7C picture is an embodiment of the present invention 583568

現裝置的一種方法。 第7 D圖係抱;^ 士文 爆本發明的一個實施例、介紹評鑑一個廢除表 列的一個流程圖。 J ,係根據本發明的一個實施例、介紹一個引擎在呈 二除表列時所執行的二種方法。 ^ μ 1糸根據本發明的一個實施例、介紹廢除表列結果 現 的 一個實施例、介紹組織内容的一種 第7G圖係根據本發明的 方法。 第7 Η圖係介妨 An / y ^ 、、Ό 一個程序流程圖,用以表示一個主控程序的 一個實施例。 =7、Ι I係介紹一個程序流程圖,用以表示創作套裝軟體收 二 裝軟體廣告、及庫存單位(SKU)的一個程序的一 個貫施例。 :°係根據本發明的一個實施例、介紹這個Con ten t Key 0 t位權利官理(CKDRM )播放功能的應用程式界面() 的一個流程圖。 第9图係根據本發明的一個實施例、介紹這個〔〇 n七e n七κ e y 〇 數位權利管理(CKDRM )複製應用程式界面(API )協定的 一種方法。 第1 0圖係根據本發明的一個實施例、介紹一種第三者數位 f利管理(TPDRM)複製方法。 第11圖係根據本發明的一個實施例、介紹利用這個 ContentKeyO數位權利管理(CKDRM)記錄内容的一種方A way to discover the device. Fig. 7D is a hug; ^ Shiwen Explodes an embodiment of the present invention and introduces a flowchart for evaluating a revocation list. J, according to an embodiment of the present invention, introduces two methods performed by an engine when it divides two lists. ^ μ 1 糸 According to an embodiment of the present invention, the results of the abolition of the listing are introduced. An embodiment of the present invention, a kind of organization content is introduced. FIG. 7G is a method according to the present invention. Fig. 7 is a program flow chart showing An / y ^, Ό, which shows an embodiment of a main control program. = 7, ⅠI introduces a process flow chart, which is a consistent example of a process for creating a software package, receiving software advertisements, and a storage unit (SKU). : ° is a flowchart of an application program interface () that introduces the playback function of the Con Tent Key 0 t rights management (CKDRM) according to an embodiment of the present invention. FIG. 9 illustrates a method for copying [CKDRM] application program interface (API) agreement according to one embodiment of the present invention. FIG. 10 illustrates a third-party digital profit management (TPDRM) copy method according to an embodiment of the present invention. FIG. 11 illustrates a method for recording content using the ContentKeyO digital rights management (CKDRM) according to an embodiment of the present invention.

第206頁 583568Page 206 583568

第1 2 ®係根據本發明的-個實施例、彳紹解除内容鎖定的 一種方法。 第1 3圖係根據本發明的一個實施例、介紹這個 ContentKeyO數位權利管理(CKDRM)複製應用程式界面 (API)協定的一種方法。 第14圖係根據本發明的一個實施例、介紹執行一個The 12th ® is a method for releasing content lock according to one embodiment of the present invention. Figure 13 illustrates a method for copying an Application Program Interface (API) agreement of the ContentKeyO digital rights management (CKDRM) according to an embodiment of the present invention. Fig. 14 is a diagram illustrating the implementation of a method according to an embodiment of the present invention.

ContentKeyO數位權利管理(CKDRM)複製方法,藉以在這 個ContentKeyO數位權利管理(CKDRM)網域内複製内容的 一個引擎。 第1 5圖係根據本發明的一個實施例、介紹一種記錄方案。 第1 6圖係根據本發明的一個實施例、介紹播放 '、ContentKeyO Digital Rights Management (CKDRM) replication method, an engine whereby content is copied within this ContentKeyO Digital Rights Management (CKDRM) domain. Figure 15 illustrates a recording scheme according to an embodiment of the present invention. FIG. 16 is an introduction to the playback according to an embodiment of the present invention.

ContentKeyO數位權利管理(CKDRM)所管理内容的一種方 法0 苐1 7圖係根據本發明的一個實施例、介紹使用命令的一種 更詳細的播放方法。 第18圖,根據本發明的一個實施例、介紹c〇ntentKey〇數 位權利官理(CKDRM )的一個解除鎖定步驟的一個流程 圖。 第1 9圖係根據本發明的一個實施例、利用流程圖介紹一個 第三者數位權利管理(TPDRM )複製協定。 第2 0圖係根據本發明的一個實施例、介紹第三者數位權利 管理(TPDRM )複製的一種方法的一個流程圖。 第2 1圖係根據本發明的一個實施例、介紹一種讀取安全元ContentKey0 A method of content managed by Digital Rights Management (CKDRM) 0 苐 17 is a more detailed playback method using commands according to an embodiment of the present invention. Fig. 18 is a flow chart showing an unlocking step of the cnntentKey digital rights officer (CKDRM) according to an embodiment of the present invention. Figure 19 illustrates a third party digital rights management (TPDRM) replication agreement using a flowchart according to an embodiment of the present invention. Figure 20 is a flowchart illustrating a method of third party digital rights management (TPDRM) copying according to an embodiment of the present invention. Figure 21 is an illustration of a read security element according to an embodiment of the present invention.

第207頁 583568 圖式簡單說明 資料(RSM )協定。 第A圖―係根據本發明的一個實施例、介紹一個主 其安全凡資料的一個協定的一個流程圖。 、寫入 第2 2 B 0係根據本發明的一個實施例、介紹摘 的一種方法的一個流程圖。 、、僞^媒體 ’用以誕供伺服器、主 土賤、及 ’用以表示一個編寫程序。 用表不5又立一^ 入 個女全資料庫 第2 3 A圖係介紹一個架構圖 引擎間互動的一個實施例< 第2 3B圖係介紹一個流程圖 第2 4圖係介紹一個流程圖:Page 207 583568 Schematic Brief Information (RSM) Agreement. Figure A-is a flow chart describing an agreement for the security of materials in accordance with one embodiment of the present invention. The writing of 2 2 B 0 is a flow chart describing a method of extracting according to an embodiment of the present invention. "," Pseudo-media "is used for the server, host, and" "to indicate a writing program. Use table 5 to create another one ^ into a women's full database. Figure 2 3 A introduces an embodiment of an architecture diagram engine interaction < Figure 2 3B introduces a flowchart Figure 2 4 illustrates a process Figure:

及安全元資料的一個程序t 第2 5圖係介紹設立一個電子零售商的一個程序。 第2 6圖係根據本發明的一個實施例、由一個消費者、# 點’提供一個交易解除内容鎖定的一個流程圖。的觀 第27圖係根據本發明的一個實施例、介紹一 ^ m u章巳例係田土 界面,用以由一個消費者的觀點,介紹一個交 用者 除内容的鎖定。 勿疋如何解 弟2 8圖係根據本發明的一個實施例、介紹在這個安入一 内容(SEC )系統中啟動一個解除鎖定程序的文王電子 流程圖。 1千的一個And a procedure for security metadata Figure 25 illustrates a procedure for setting up an e-retailer. Figure 26 is a flowchart of unlocking content by a consumer, #point ', according to an embodiment of the present invention. View Fig. 27 is an introduction to a field interface according to an embodiment of the present invention, which is used to introduce a user from the perspective of a consumer in addition to content locking. Don't know how to solve it. Figure 2-8 is a flow chart of the King Wen electronic for initiating an unlocking procedure in this SEC system according to an embodiment of the present invention. One thousand

第2 9圖係根據本發明的一個實施例、介紹_ 容(SEC)流程圖。 固女全電子内 弟3 0圖係根據本發明的一個實施例、介紹可 得的内容類型。 Λ在媒體上取 第3 1 Α圖係根據本發明的一個實施例、介紹交 勿顆型的一Fig. 29 is an introduction (SEC) flowchart according to an embodiment of the present invention. The solid female all electronic brother 30 picture is an introduction to the available content types according to an embodiment of the present invention. Λ is taken on the media. Figure 3 1 Α is an example of a cross-shaped shape according to an embodiment of the present invention.

第31B圖係根據本發 面的一種方法,#伽的一個貫施例、介紹一個使用者界 置與一個媒體碑使用者界面係包括一種方法,藉以設 漦ΉΓ岡尨:碟片關連的全球資源定位器(URL)。Figure 31B is based on a method presented in this article, an example of #Ga, introducing a user interface and a media tablet user interface, including a method to set 漦 Ή 漦 Ή 尨: the world connected by the disc Resource locator (URL).

回’、根據本發明的一個實施例、介紹連 伺服器的一種方法。 咬接至一個CKU 第32圖係根據本發明的一個實施例、介紹—個 ,連結後被一個用戶端請求的一種方法。 叩 第3 3圖係根據本發明的一個實施例、介紹這個主控伺服器 所執行的一種方法。 第34圖係根據本發明的一個實施例、介紹—個網頁及一個 CKU用戶端伺服器的一種方法。 、 第3 5圖係根據本發明的一個實施例、由一個系統的觀點, 介紹解除内容鎖定的一種方法。 ”” 第3 6圖係根據本發明的一個實施例、由一個, 介紹解除内容鎖定的一種方法。 〆 弟3 7圖係根據本發明一個貫施例、介紹一個完整解除交易 鎖定的一個程序流程圖。 第3 8圖係介紹一個流程圖,用以表示根據一個實施例以解 除内谷鎖定的一種方法。 第3 9圖係介紹一個流程圖,用以介紹元件間的一個物件互 動。 第40圖係根據本發明的一個實施例、介紹~個解除交易鎖 定的一個流程圖。Back, according to an embodiment of the present invention, a method of connecting to a server is described. Snap to a CKU Figure 32 is a method according to an embodiment of the present invention, which is requested by a client after connection.叩 Figure 33 illustrates a method performed by the master server according to an embodiment of the present invention. Figure 34 illustrates a method for introducing a web page and a CKU client server according to an embodiment of the present invention. Figures 3 and 5 illustrate a method for unlocking content locks from the perspective of a system according to an embodiment of the present invention. "Figures 3 and 6 show a method for unlocking content lock according to one embodiment of the present invention. 3 Brother 37 is a flow chart of a program that introduces a complete unlocking of transactions in accordance with an embodiment of the present invention. Fig. 38 is a flowchart showing a method for removing the inner valley lock according to an embodiment. Figures 3 and 9 show a flow chart for describing an object interaction between components. Fig. 40 is a flow chart describing the release of a transaction lock according to an embodiment of the present invention.

第209頁 583568Page 209 583568

圖式簡單說明 第4 1圖係介紹一個方塊圖,用以表示元件間的物件互動。 圖式符號·· 第1圖Brief Description of Drawings Figure 41 is a block diagram showing the interaction of objects between components. Schematic symbols · Figure 1

ContentKey Lock access restrictions a ContentKeyContentKey Lock access restrictions a ContentKey

Lock存取限定 100 a 内容儲存模型Lock access limited to 100 a content storage model

120 a僅利用DataPlay檔案系統(DFS)的未管理内容 130 a 非ContentKey數位權利管理(DRM)的管理内容 180 a僅利用DataPlay檔案系統(DFS)的管理内容 182 a DataPlay槽案系統(DFS)及ContentKey元資料應 用程式界面 184 a ContentKey元資料及數位權利管理(DRM)播放應 用程式界面 140 a同時利用ContentKey及另一個數位權利管理(drm )的管理内容 150 a ContentKey應用程式界面 150 a ContentKey 管理内容 160 a DataPlay槽案系統(DFS)存取動作 170 a ContentKey 存取動作120 a Use only unmanaged content of the DataPlay File System (DFS) 130 a Use management content of the Non-ContentKey Digital Rights Management (DRM) 180 a Use only management content of the DataPlay File System (DFS) 182 a DataPlay slot system (DFS) and ContentKey Metadata Application Programming Interface 184 a ContentKey Metadata and Digital Rights Management (DRM) Playback Application Programming Interface 140 a Use ContentKey and another Digital Rights Management (drm) to manage content 150 a ContentKey Application Programming Interface 150 a ContentKey manage content 160 a DataPlay slot system (DFS) access action 170 a ContentKey access action

第2圖 202 a内容提供者 204 a複製器 20 6 a伺服器 2 0 7 a資訊站Figure 2 202 a Content Provider 204 a Replicator 20 6 a Server 2 0 7 a Information Station

第210頁 583568 圖式簡單說明 208 (1) 、208(2) 、208 (3) a 引擎 209 (1) 、209 (2) 、209 (3) a 媒體 2 1 0 a連接主機 Con tent Key數位權利管理 2 11 a 内嵌裝置 Con tent Key數位權利管理 第3圖 3 0 2 a内谷提供者決定資料保全的等級 304 a產生預先錄製内容的工具及程序Page 210 583568 Schematic description of 208 (1), 208 (2), 208 (3) a Engine 209 (1), 209 (2), 209 (3) a Media 2 1 0 a Connect to the host Content Key digital Rights Management 2 11 a Embedded Device Con tent Key Digital Rights Management Figure 3 0 2 a Inner Valley Provider decides the level of data preservation 304 a Tool and program to generate pre-recorded content

306 a包括内容提供者所決定的用途及許可的媒體 308 a 引擎 309 a應用程式界面 310 a播放器 3 1 2 a 數位權利管理 3 1 6 a憑證主機 3 1 8 a憑證 layers a格式編碣加密層306 a Including the media determined by the content provider and its use 308 a Engine 309 a Application program interface 310 a Player 3 1 2 a Digital rights management 3 1 6 a Voucher host 3 1 8 a Voucher layers a Format encoding encryption Floor

320 a憑證管理中心 Foimat encoding encryption 第4圖 3 0 6 a媒體 308 a 引擎 3 1 0 a主機 4 0 2 a應用程式層 4 0 4 a 對話層320 a Certificate Management Center Foimat encoding encryption Figure 4 0 6 a Media 308 a Engine 3 1 0 a Host 4 0 2 a Application layer 4 0 4 a Dialogue layer

第211頁 583568 圖式簡單說明 4 0 6 a 命令資料層 4 0 8 a 資料連結層 410 a實體層 4 1 2 a 未憑證 4 1 3 a 憑證 4 1 4 a 不安全 416(1) 、416 (2 ) a 安全 418(1) 、418(2) a 加密一解密 420 ( 1 ) 、420 ( 2 ) a 檔案系統 430 (1 ) 、430 (2 )a ContentKey 數位權利管理 422 ( 1 ) 、422 ( 2 ) a 協定界面 424 ( 1 ) 、424 ( 2 ) a 實體界面 450 a 方塊管理裝置 4 5 2 a伺服定位動作 454 a讀取/寫入動作 46 0 a 光學元件 470 a檔案系統(FS )檔案資料 472 a檔案系統(FS )元資料 470aContentKey 元資料 第5A圖 502 a檔案 5 0 4 a 元資料 5 0 6 a 開放應用程式界面 508 a安全應用程式界面Page 211 583568 Brief description of the diagram 4 0 6 a Command data layer 4 0 8 a Data link layer 410 a Entity layer 4 1 2 a Uncertified 4 1 3 a Certificate 4 1 4 a Insecure 416 (1), 416 ( 2) a security 418 (1), 418 (2) a encryption-decryption 420 (1), 420 (2) a file system 430 (1), 430 (2) a ContentKey digital rights management 422 (1), 422 (1) 2) a protocol interface 424 (1), 424 (2) a physical interface 450 a block management device 4 5 2 a servo positioning action 454 a read / write action 46 0 a optical element 470 a file system (FS) file Data 472 a File System (FS) Metadata 470aContentKey Metadata Figure 5A Figure 502 File 5 0 4 a Metadata 5 0 6 a Open Application Programming Interface 508 a Security Application Programming Interface

第212頁 583568 圖式簡單說明 510 a 512 a 514 a 516 a 安全元資料 動作 徹底的播案讀取/寫入存取 才曰定安全應用程式的憑證 應用程式 5 1 8 a廢止方法 弟5 B圖 530 a透過韌體啟動資料存取動作 5#32 a避免韌體外部的資料存取動作 弟5 C圖 5 5 0 a主機接收憑證(5丨4 ) 5 5 2 a在媒體上附加内容權利 554 a在預定條件下同意存取動作 5 5 6 a執行下列動作的一個或更多個動作,其包括有··鑑 另J個通道,檢查一個廢止表列;以及對内容進行解除鎖 定動作 μ 第7圖 6 0 2 a媒體 604 a引擎 6 0 6 a主機 6 0 8 a廢止表列 610 a具有DataPlay憑證管理中心(CA)所簽章的協定公 開金錄的Content Key憑證 612 a協定私密金餘 626 a私密金鑰解密Page 212 583568 Brief description of the diagram 510 a 512 a 514 a 516 a Security metadata action Thoroughly broadcast the case Read / write access to the certificate of the secure application 5 1 8 a Abolition method 5 B Figure 530 a Start the data access action through the firmware 5 # 32 a Avoid data access actions outside the firmware 5 C Figure 5 5 0 a Host receives the certificate (5 丨 4) 5 5 2 a Add content rights to the media 554 a Agree to access action under predetermined conditions 5 5 6 a Perform one or more of the following actions, which include: • checking another J channels, checking an abolition list; and unlocking the content μ Figure 7 0 2 a media 604 a engine 6 0 6 a host 6 0 8 a repeal list 610 a Content Key certificate with agreement public key record signed by DataPlay Certificate Management Center (CA) 612 a agreement private money I 626 a private key decryption

第213頁 583568 圖式簡單說明 628 a安全對話金鑰 6 1 2 a確認簽章 6 1 4 a 認證主機 6 1 6 a通過? 6 1 8 a 隨機數目產生器 6 2 0 a安全對話金鑰 6 2 2 a 公開金錄加密 624 a協定公開金鑰 第7A圖 30 8 a引擎 3 1 8 a 憑證 71 0 a識別碼 7 2 0 a確認動作 730 a認證引擎 75 0 a許可方塊決定複數個通過/失敗許可 7 8 0 a對話金餘 pass a 通過 global pass/fail a 全域通道/失敗 第7B圖 7 0 2 a 由目的地接收憑證 7 0 4 a使用識別碼以認證目的地 7 0 6 a傳輸對話金錄 第7C圖 7 1 2 a在檔案存取期間執行廢止表列評量Page 213 583568 Brief description of the diagram 628 a Secure conversation key 6 1 2 a Confirmation signature 6 1 4 a Authentication host 6 1 6 a Pass? 6 1 8 a Random number generator 6 2 0 a Secure session key 6 2 2 a Public record encryption 624 a Agreement public key Figure 7A 8 a Engine 3 1 8 a Certificate 71 0 a Identification code 7 2 0 a Confirmation action 730 a Authentication engine 75 0 a Permit block decides multiple pass / fail permits 7 8 0 a Dialogue gold pass a pass global pass / fail a Global channel / fail Figure 7B Figure 7 0 2 a Destination receives credentials 7 0 4 a Use an identification code to authenticate the destination 7 0 6 a Transferring Dialogue Records 7C Figure 7 1 2a Perform revocation list evaluation during file access

第214頁 583568 圖式簡單說明 714 a在槽案存取及廢止 結果 71 6 a由媒體將廢止表列 有π毒藥’’以避免播放器的 當的播放器、或製造商具 類的情況下 71 8 a當播放器連接伺服 時,更新廢止表列 722 a —個或更多個簽章 個或更多個金鑰簽章的_ (CKDRM )憑證 724 a廢止動作乃是廢止 括·早裝置識別碼或協定 線、特定產品模型 第7D圖 732 a 當對照ContentKey 容進行評量時,根據真假 7 3 4 a根據子句規則以組 736 a若廢止表列中的任 主機 第7E圖 資料評量期間, 儲存各個節點的 複製至引擎上,麻μ主 動作,估#廢止表列可以具 Ζ作倘右延個播放器並 % 有缺陷或潛在缺陷、疋適 或在諸如此 裔以對内容進行解除鎖定動作 金鑰的廢止動作乃是廢止利用一 組ContentKey數位權利管理 下列欄位的一個或更多個,盆勺 公開金鑰、整體公司、特定^ = 數位權利管理(CKDRM )憑證内 函數結構評量子句節點中“的""資料 合子句節點的結果 何廢止節點被評量為真,則廢止Page 214 583568 Brief description of the diagram 714 a Access and repeal results in the slot case 71 6 a The revocation list will be listed by the media as π poison '' to avoid the player's proper player or manufacturer's equipment 71 8 a When the player is connected to the servo, update the revocation list 722 a — One or more signatures or more (_CKDRM) certificates signed by the key 724 a The revocation action is to abolish the early device Identification code or agreement line, specific product model Figure 7D 732 a When evaluating against the ContentKey content, according to the true and false 7 3 4 a According to the clause rules in group 736 a If any of the hosts listed in Figure 7E is abolished During the evaluation period, the replicas of each node are stored on the engine, and the main actions are performed. It is estimated that the revocation list can be used if the player is extended and has a defect or potential defect, is suitable or is The content is unlocked. The key revocation action is to revoke the use of a set of ContentKey digital rights to manage one or more of the following fields. The public key, the entire company, and the specific ^ = Digital Rights Management (CKDRM) certificate Function knot Construction of the """ data in the quantum sentence node The results of the syntactic node Why the abolition node is evaluated as true, then it is abolished

75 2 a 置期間 754 a 在ContentKey數位權利管理(CKDRM)的元 ,使用節點計數數值以產生足夠的記憶體空、。又 對於廢止表列中的各個節點,比較這個節心75 2 a Set period 754 a In the ContentKey Digital Rights Management (CKDRM) element, use the node count value to generate enough memory space. For each node in the abolition list, compare this node

583568583568

存廢止表列中的各個節點 7二相同節點,則將既存節點的DataP1ay檔宰 ί Ϊ =;目加入C〇ntentKey數位權利管理(CK_ ) 兀貝枓結構中的廢止表列 以=有找到節點’則產生具有獨-無二_巧 才田木糸統識別碼的新節點 762 a引擎將新“饨^#檔案系統識別碼數值加入 = ntentKey數位權利管理(CKDRM)元資料結構 弟7 F圖If each node in the revocation list is identical, then the DataP1ay file of the existing node will be killed. Ϊ =; The target is added to the ConnexKey Digital Rights Management (CK_). 'Then generate a new node 762 a with unique-Qiaocai Tianmu system identification code. The engine adds the new "饨 ^ # file system identification code value = ntentKey Digital Rights Management (CKDRM) metadata structure. 7 F Figure

772 a每次發生CKCMD—AUTHENTICATE命令、或當新媒體 插入引擎時,對廢止表列進行評量動作 774 a對照接數位權利管理(ck⑽μ)憑證 以評量廢止表列 a評量動作得到節點的廢止或不廢止狀態 778 a評量結果儲存在廢止節點結構的欄位中 第7G圖772 a Each time a CKCMD-AUTHENTICATE command occurs, or when new media is inserted into the engine, perform an evaluation action on the abolishment list Abolished or not abolished status 778 a Evaluation results are stored in the abolished node structure column Figure 7G

782 a利用預定應用程式以組織媒體上内容 784 a產生公開識別碼及c〇ntentKey數位權利管理 (CKDRM )識別碼 786 a加密内容檔案 7 88 a加入引擎管理内容及播放規則,如内容擁有者所指 定 7 92 a加入第三者數位權利管理(TPDRM)特有規則,如 内容擁有者所指定782 a Use predetermined applications to organize content on the media 784 a Generate public identification code and cnntentKey Digital Rights Management (CKDRM) identification code 786 a Encrypted content file 7 88 a Add engine management content and playback rules, as the content owner Designate 7 92 a to add third party digital rights management (TPDRM) specific rules, as specified by the content owner

第216頁 583568Page 216 583568

加入有效簽章金鑰表 列及廢止表列 794 a 第7H圖 7 0 0 2 a程序開始 資產及資訊採購” 7004 a内容提供者新發表程序 7 0 0 6 a内容檔案(編碼) 元資料資訊 安全資訊 套裝軟體收集資訊 7008 a DataPlay或第三者編寫程序,,編寫,,Add valid signature key list and abolish the list 794 a Figure 7H Figure 7 0 0 2 a Procedure starts asset and information procurement "7004 a Content provider new release procedure 7 0 0 6 a Content file (encoding) Metadata information Security information package software collects information 7008 a DataPlay or third-party writing process, writing ,,

7010 a DataPlay大量記憶體檔案(MMF 7目 DataPlay大量記憶體檔案(MMF) 案 )貝枓描述語言(DDL )檔 安全資訊 7012 a DataPlay預先錄製程序”預先錄製 7014 a keycomp1ement.dd 1 7 016 a content.dd1 7fl8 a DataPlay媒體面一在一個磁帶上的原版影片製作 才當案組 702 0 a DataPlay ContentKey原版影片製作伺服器金鈴7010 a DataPlay large memory file (MMF 7 mesh DataPlay large memory file (MMF) file) Behr description language (DDL) file safety information 7012 a DataPlay pre-recording program "pre-record 7014 a keycomp1ement.dd 1 7 016 a content .dd1 7fl8 a DataPlay media face is the original video production team on a tape 7020 a DataPlay ContentKey original video production server Golden Bell

數設定程序”數位情報交換伺服器設定” 間 7022 a DataPlay玻璃原版影片及戳印程序,,製造,, 7024 a DataPlay安全資料庫一金鑰補數表袼 7026 a DataPlay 媒體 第71圖Data setting procedure "Digital information exchange server setting" 7022 a DataPlay glass original film and stamping process, manufacturing, 7024 a DataPlay security database a key complement table 袼 7026 a DataPlay media Figure 71

583568 圖式簡單說明 7 0 2 8 a程序開始 7 0 3 0 a内容提供者套裝軟體設定及改變程序”套裝軟體定 義,| 7 0 3 2 a套裝軟體顯示圖形及資訊 7 0 3 4 a content.dd1 70 3 6 a 零售商(eTailer)套裝軟體及定價設定及改變程 序”定價定義’’ 70 38 a零售商(eTailer )安全資料庫一套裝軟體、定價 及套裝軟體呈現表格 第8圖 8 1 0 a 主機鑑別 8 0 4 a 主機傳送認證主機的憑證 80 6 a 引擎傳送對話金鑰 830 a 引擎選定播放對話金鑰 8 3 2 a 主機接收加密播放對話金鑰 8 3 4 a 主機利用對話金输以解密播放對話金餘 840 a 主機接收加密内容 8 5 0 a 主機利用播放對話金鑰以解密内容 第9圖 9 1 0 a 目的地引擎開始鑑別程序 9 2 0 a目的地引擎傳送媒體識別碼 93 0 a 傳送這個目的地的金鑰盒子 940 a 傳送這個目的地的加密内容 第10圖583568 Schematic description of 7 0 2 8 a program start 7 0 3 0 a content provider package software setting and change program "package software definition, | 7 0 3 2 a package software displays graphics and information 7 0 3 4 a content. dd1 70 3 6 a Retailer (eTailer) package software and pricing setting and change process "Pricing Definition" 70 38 a Retailer (eTailer) security database-Package software, pricing and package software presentation form 8 Figure 8 1 0 a Host authentication 8 0 4 a Host transmits credentials for authenticating the host 80 6 a Engine transmits a session key 830 a Engine selects a playback session key 8 3 2 a Host receives an encrypted playback session key 8 3 4 a The decryption of the playback session is more than 840 a. The host receives the encrypted content 8 5 0 a The host uses the playback session key to decrypt the content. Figure 9 1 0 a Destination engine starts the authentication process 9 2 0 a The destination engine transmits the media identification code 93 0 a Key box 940 transmitting this destination a Encrypted content transmitting this destination Figure 10

第218頁 583568 圖式簡單說明 '' " --- 1 〇 a鑑別主機 a讓弟二者數位權利管理(T p d r μ )能夠指定第三者 數位權利管理(TPDRM )要求接收的内容 1030 a引擎藉著傳送金鑰而回應於有效請求 1 0 i 0 a第二者數位權利管理(tpdrm )接收内容,其係利 用剛才傳送的金鑰進行加密 ” 第U圖 I 1 ! 0 a鑑別來源(第三者數位權利管理(TpDRM )、播放 器、伺服器、或資訊站) II γ a來源決定要對欲記錄内容應用檔案系統寫入協定 或是ContentKey數位權利管理(CKDRM)記錄協定 1130 a根據ContentKey數位權利管理(CKDRM)協定,傳 輸檔案格式中、欲進行加密動作及欲利用ContentKey數位 權利管理(CKDRM )記錄應用程式界面(API )進行播放動 作的部分 1、1 ± 0 a利用標案系統應用程式界面(ap I ),寫入欲保留 為不加密的部分 弟].2圖 1 2 1 〇 a對來源及目的地進行交互鑑別程序 1 2 2 〇 a來源擷取内容連結的媒體識別碼 123〇 a來源指定欲解除鎖定的内容及加密金鑰的補數 U4〇 a目的地(諸如:弓丨擎)透過伺服器、根據内容提 供者的規格以管理請求的有性 第1 3圖583568 on page 218, "Simple description of the drawing" " --- 1 〇a Authentication host a allows the younger brother's digital rights management (T pdr μ) to specify the third party digital rights management (TPDRM) content required to receive 1030 a The engine responds to the valid request by transmitting the key 1 0 i 0 a. The second digital rights management (tpdrm) receives the content, which is encrypted using the key just sent. Figure I 1! 0 a Third party digital rights management (TpDRM), player, server, or information station II γ a source decides whether to apply the file system writing agreement or ContentKey digital rights management (CKDRM) recording agreement 1130 a to the content to be recorded ContentKey Digital Rights Management (CKDRM) agreement, part 1 of the transmission file format, which is to be encrypted and to use the ContentKey Digital Rights Management (CKDRM) to record the application program interface (API) for playback actions, 1 ± 0 a using the bidding system Application program interface (ap I), write part that you want to keep as unencrypted]. 2 Figure 1 2 1 〇a interactive identification process of source and destination 1 2 2 〇a source extraction The source media ID 123〇a source specifies the content to be unlocked and the complement key of the encryption key. U40a destination (such as Gongyi Engine) manages the request through the server according to the content provider's specifications. Sex Figure 1 3

第219頁Chapter 219

1320 a 1340 利用非對稱加密方法轉 主機變動是否沒有通過 移相同對話金鑰 安全檢查或媒體是否彈 a 出? TRUE a false 1350 a 1360 a 第1 4 圖 141〇 a 1450 a 1420 a 1440 a 1430 a 第15 圖 是 否 結束 繼續 來源引擎 金鑰盒子 具有許可的來源檔案 目的地 複製1320 a 1340 Use asymmetric encryption method to transfer host changes Did not pass the same session key Security check or the media popped out? TRUE a false 1350 a 1360 a Figure 1 4 Figure 141〇 a 1450 a 1420 a 1440 a 1430 a Figure 15 Yes No End Continue Source Engine Key Box Licensed Source File Destination Copy

51 〇 a 主媸處 152〇 機應用程式決定欲匯入的檔案 1540 2主機應用程式決定欲產生播案的屬性 統主機應用程式決定目的地目錄的DataPlay檔案系 FS )處置 1 560 a ic:7n 王機發佈CKCMD—AUTHENTICATE 158〇 Ή擎返全安全對話金鑰 159〇 & 主機發佈CKCMD—GET—CERTIFICATE 1592 =主機確認引擎並擷取公開金鑰 # 1 592 嗎確認引擎並擷取 1504 ^ =機產生目的地檔案 機產生目的地檔案 機發佈DFSCMD—GETHANDLE以擷取新檔案的處置 — — 一 '1 —一 第220頁 583568 圖式簡單說明 1 5 9 6 a主機設定屬性 1598 a主機將内容寫入檔案 1599 a主機在資料轉移程序中傳送檔案 第1 6圖 '、 1610 a主機播放器對引擎進行自我鑑別 1 ί =命令封包中傳送CGn tentKey數位權利管理 1 6 3 0 a引擎利用對話金鑰進行回應 1 640 a檢查播放許可 “ 1 6 5 0 a利用播放對話金鑰以建立播放對每 1 660 a引擎返回内容 … 第17圖 1 Π〇 a播放器決定欲播放的檔案 1 720 a進行引擎及主機鑑別以啟始一 174〇 a引擎返回對話金鑰 個女王對居 1750 a建立播放對話 1760 a引擎返回播放對話金鑰 1770 a 操取内容 / 178〇a引擎返回内容 第18圖 I860 a主機指定欲解除鎖定的槽案 1 862 a主機取得鎖定檔案的處置 ”定為上g機六應用耘式對引擎進行自我鐘別,以及將憑證 汉〜 > 報父換所伺服器的ContentKey數位權利管理51 〇a 1520 machine application decides the file to be imported 1540 2 host application decides the attributes to generate the broadcast system host application determines the destination directory DataPlay file system FS) dispose 1 560 a ic: 7n King Machine releases CKCMD_AUTHENTICATE 158. The engine returns a full security dialogue key 159. The host releases CKCMD_GET_CERTIFICATE 1592. The host confirms the engine and retrieves the public key # 1 592. Does the engine confirm and retrieves 1504? The machine generates the destination file. The machine generates the destination file. It releases DFSCMD_GETHANDLE to retrieve the disposal of the new file.-One'1-one page 220 583568 Brief description of the diagram 1 5 9 6 a host setting properties 1598 a host will Write to file 1599 a Host sends files in the data transfer process Figure 16 ', 1610 a Host player authenticates the engine 1 1 = Command sends CGn tentKey digital rights management in the packet 1 6 3 0 Key to respond 1 640 a to check the playback permission "1 6 5 0 a Use the playback dialog key to establish playback for each 1 660 a engine returns content ... Figure 17 Figure 1 Π〇a playback Determine the file to be played 1 720 a Engine and host identification to start a 174 〇 Engine returns the dialogue key 1 queen to establish a dialogue 1 760 a The engine returns to play the dialogue key 1 770 a Access content / 178 〇 A engine returns the content Figure 18 I860 a host specifies the slot to be unlocked 1 862 a host disposes of the lock file "is determined to be on the machine six applications to identify the engine by itself, and the certificate Han ~ > ContentKey Digital Rights Management for Reporting Parent Exchange Server

第221頁 583568Page 221 583568

圖式簡單說明 (CKDRM )憑證 18 66 a引擎返回伺服器對話金鑰 1868 a主機鑑別引擎 18 7 0 a主機確認引擎並擷取公開金鑰 1872 a主機發佈命令以對檔案進行解除鎖定動作 18 74 a引擎調整檔案的鎖定屬性 1876 a主機應用程式檢查交易成功與否 第1 9圖 =1〇 a第三者數位權利管理(TpDRM )對引擎進行自我鑑 ·· 1 920 a主機傳送第三者數位權利管理(TpDRM)憑證 1 9 3 0 a引擎利用對話金鑰以進行回應 a第二者數位權利管理(TPDRM)擷取安全元資料 1 95〇 a引擎返回解密元資料及加密元資料的金鑰 I 96 0 a第三者數位權利管理(TpDRM )檢查許可、並返回 棺案的播放對話金鑰及廢止表列 1 9 7 〇 a遞減檔案數值 1980 a引擎返回檔案内容 第20圖Schematic Description (CKDRM) certificate 18 66 a engine returns server session key 1868 a host authentication engine 18 7 0 a host confirms the engine and retrieves the public key 1872 a host issues a command to unlock the file 18 74 a The engine adjusts the lock attribute of the file 1876 a Host application checks the success of the transaction Figure 19 Figure 10a a third party digital rights management (TpDRM) self-authenticates the engine ... 1 920 a host transmits a third party digital Rights Management (TpDRM) certificate 1 9 3 0 a The engine uses a conversation key to respond a Second party digital rights management (TPDRM) retrieves secure metadata 1 95a The engine returns a key to decrypt the metadata and encrypt the metadata I 96 0 a Third party digital rights management (TpDRM) checks the permission, and returns the playback dialogue key and revocation list of the coffin case 1 9 7 〇a decrements the file value 1980 a engine returns the file content Figure 20

2010 a使用者將來源媒體插入引擎 20 2 0 a主機發佈一個CKCMD—AUTHENTICATE命令以啟始— 個安全對話 2030 a引擎返回安全對話金鑰 2040 a主機發佈CKCMD—GET—METADATA命令以擷取檔案2010 a user inserts the source media into the engine 20 2 0 a host issues a CKCMD_AUTHENTICATE command to start a secure conversation 2030 a engine returns a secure conversation key 2040 a host issues a CKCMD_GET_METADATA command to retrieve the file

第222頁Chapter 222

583568583568

圖式簡單說明 的第三者數位權利管理(TPDRM )安全元資料 2050 a引擎返回元資料 - 2060 a主機發佈CKCMD—GET—DRM—COPY命令以建立撼妨 對話 2070 a引擎返回播放對話金鑰及廢止表列 2080 a主機擷取對應的内容 2090 a引擎返回對應的内容 第21圖The diagram briefly illustrates the third party digital rights management (TPDRM) security metadata 2050 a engine return metadata-2060 a host issues a CKCMD_GET_DRM_COPY command to establish a powerful dialogue 2070 a engine returns to play the dialogue key and Abolish the list 2080 a host captures the corresponding content 2090 a engine returns the corresponding content Figure 21

2 11 0 a主機決定與欲讀取元資料關連的檔案 2120 a使用者將來源媒體插入引擎中 = 130 a 主機發佈ckcmd—authenticate 以啟始 2140 a引擎返回對話金鑰 于活 ^ 1 ^ & ^機發佈命令以擷取主機中該檔案的安全元資料 & W擎返回元資料 第22A圖 2210 a 2220 a 2230 a 2240 a 2250 a 2 2 6 0 a 2270 a 第22B圖 2202 a ^機決定具有欲寫入元資料的檔案 用者將目的地媒體插入引擎 ==發佈CKCMD —AUTHENTI CATE以啟始安全對話2 11 0 a Host decides the file related to the metadata to be read 2120 a User inserts the source media into the engine = 130 a Host issues ckcmd_authenticate to start 2140 a The engine returns the session key to the active ^ 1 ^ & ^ The machine issues a command to retrieve the security metadata of the file in the host & W Engine returns the metadata. Figure 22A 2210 a 2220 a 2230 a 2240 a 2250 a 2 2 6 0 a 2270 a Figure 22B 2202 a Archival users who want to write metadata insert destination media into the engine == Publish CKCMD —AUTHENTI CATE to start secure conversation

51擎返回安全對話 主機對引擎進行鑑別程序 ^機確認弓丨擎、並擷取公開金鑰 主機傳送檔案的安全元資料 執行一個金鑰盒子查表動作51 Engine returns to the security dialogue. The host authenticates the engine. The machine confirms the engine and retrieves the public key. The host sends the file's security metadata. Performs a key box lookup.

第223頁 583568Page 223 583568

圖式簡單說明 ^ ----- 2204 a擷取檔案的金鑰盒子 2 2 0 6 a引擎決定媒體識別碼為寫入或預先錄製 2 2 0 8 a比較金鑰盒子連結識別碼旗標及金鑰盒子方 2212 a廢止命令的部分或全部功能 第23A圖 2398 a連接個人電腦(PC)的裝置 2 3 0 2 a媒體 2304 a裝置 2306 a引擎 2 308 a萬用序列匯流排(USB)埠 2312 a萬用序列匯流排(USb )驅動程式 2314 a可安裝檔案系統 2316 a安全存取通道(SAC ) 2 3 1 8 a 網路瀏覽器 2322 a CKU用戶端 2 324 a電子零售商(eTailer )所產生的動態網頁 2326a内容管理裝置 、 2328 a自動執行處置 2332 a超文件傳輸協定(HTTP)Brief description of the drawing ^ ----- 2204 a key box for retrieving the file 2 2 6 6 a The engine determines that the media ID is written or pre-recorded 2 2 0 8 a Compares the key box connection ID flag and Key box side 2212 a Some or all functions of the revocation order 23A Figure 2398 a Device connected to a personal computer (PC) 2 3 0 2 a Media 2304 a Device 2306 a Engine 2 308 a Universal Serial Bus (USB) port 2312 a Universal Serial Bus (USb) driver 2314 a Installable file system 2316 a Secure Access Channel (SAC) 2 3 1 8 a Web browser 2322 a CKU client 2 324 a eTailer The generated dynamic webpage 2326a content management device, 2328a automatically performs processing 2332a Hyper File Transfer Protocol (HTTP)

2、334 3超文件傳輸協定(HTTP)上的安全存取通道(SAC 239 6 a 2354 a 網路商店店面 ®子零售商(eTa i 1 er ) 應用伺服器 超文件標記語言(HTML)及圖形化使用者界面2.334 3 Secure Access Channel over Hyper File Transfer Protocol (HTTP) (SAC 239 6 a 2354 a eShop iSub-Retailer (eTa i 1 er) Application Server Hyper Document Markup Language (HTML) and Graphics User interface

第224頁 583568 圖式簡單說明 (GUI )產生器 2338 a套裝軟體顯示及定價 2344 a 消費者管理 2346 a對話管理 2348 a信用卡授權 2342 a數位情報交換伺服器(DCS)界面 2342 a資料庫連接層 2356 a 資料庫 2358 a消費者資料庫 2352 a套裝軟體及定價資料庫 2364 a對話及交易資料庫 2360 a超文件傳輸協定(HTTP) 2394 a數位情報交換伺服器(DCS) 236 6 a CKU伺服器 2 368 a CKU原版影片製作伺服器 2370 a金鑰補數資料庫 2372 a交易資料庫 2374a ContentKey伺服器 2378 a通信協定或應用程式界面(API) 2380 a金鑰映射資料庫的套裝軟體 2376 a整合物件 2399 a情報交換伺服器 2382 a 電子零售商(eTailer)界面 2 3 8 4 a數位情報交換服務Page 224 583568 Graphical Simple Description (GUI) generator 2338 a software package display and pricing 2344 a consumer management 2346 a dialogue management 2348 a credit card authorization 2342 a digital information exchange server (DCS) interface 2342 a database connection layer 2356 a database 2358 a consumer database 2352 a package software and pricing database 2364 a dialogue and transaction database 2360 a hyper file transfer protocol (HTTP) 2394 a digital information exchange server (DCS) 236 6 a CKU server 2 368 a CKU original film production server 2370 a key complement database 2372 a transaction database 2374a ContentKey server 2378 a communication protocol or application programming interface (API) 2380 a key mapping database package software 2376 a integration Object 2399 a Information exchange server 2382 a eTailer interface 2 3 8 4 a Digital information exchange service

第225頁 583568 圖式簡單說明 2386 a套裝軟體資料庫 2388 a消費者及電子零售商(eTaUer )資料庫 2 3 9 0 a消費者資料庫 2392 a對話及交易資料庫 第23B圖 2310 a將内容編寫至媒體上 2320 a包括有次要内容? 2330 a在鎖定内容的媒體上包括金鑰 2340 a將金鑰補數、資料、及供應收集並加入資料庫 2350 a散佈解除鎖定的内容至媒體上 第24圖 2402 a程序啟動 2404 a内容提供者開啟新版本程序"資產及資訊採購 2 4 0 6 a内容檔案(編碼過的)、元資料資訊、資料保全 資訊、套裝軟體收集資訊 、 2408 a DataPlay或第三者編寫程序,,編寫 2410 a DataPlay大量記憶體檔案(MMF )目錄結構、Page 225 583568 Simple illustration 2386 a package software database 2388 a consumer and electronic retailer (eTaUer) database 2 3 9 0 a consumer database 2392 a dialogue and transaction database 23B Figure 2310 a Compiled in the media 2320 a Include secondary content? 2330 a Includes the key on the content-locked media 2340 a Collects and adds the key complement, information, and supply to the database 2350 a Distributes the unlocked content to the media Figure 24 2a Program start 2404 a Content provider Open a new version of the program " Procurement of assets and information 2 4 0 6 a Content files (encoded), metadata information, data security information, packaged software collection information, 2408 a DataPlay or third party writing procedures, write 2410 a DataPlay Mass Memory File (MMF) directory structure,

DataPlay大量記憶體檔案(MMF)資料描述語言(DDL)檔 案、安全資訊 2412 a DataPlay預先錄製程序,,預先錄製n 2414 a KeyComponent.ddl 2416 a Contents.ddl 2418 a DataPlay媒體側一在磁帶上的原版影片製作栌 設定 田 第226頁 583568 圖式簡單說明 2420 a DataPlay ContentKey原版影片製作飼服器金餘補 數設定程序”數位情報交換伺服器設定” 2422 a DataPlay玻璃原版影片製作及戳印程序”製造” 2424 a DataPlay安全資料庫一金餘補數—表格 2426 a DataPlay 媒體 第25圖 程序啟動 谷提供者套裝軟體設定及改變程序,,套裝軟體定 2502 , 内 2504 ; 義丨丨 2 5 0 6 a套裝軟體顯示圖形及資訊 2508 a Contents.ddl 2510 a電子零售商(eTail ) 變程序"定價定義” 奮衣权體及疋價設定及丨 2512 a電子零售商(eTaUer ) ^ 價、及套裝軟體呈現表格 貝,套裝軟體、> 第26圖 ° 2610 a呈現具有解除鎖定的 2620 a接收滿意的解除鎖定條費者 2 630 a傳送金鑰補數至引擎 2640 a引擎藉改變為解除 第2 7圖 弋狀恶以進仃回應 第28圖 2810 a金鑰補數資料庫 2820 a交易資料庫 583568 圖式簡單說明 2830 a廢止表列資料庫 2 84 0 a CKU原版影片製作伺服器 2 8 5 0 a網站伺服器 286 0 a CKU伺服器 28 70 a並同品牌的使用者界面元件資料庫 2880 a供應資料庫 289 0 a交易資料庫 2896 a CKU用戶端 2892 a 網頁 2898 a DataPlay 引擎 2894 a DataPlay 主機裝置 第29圖 2 9 1 0 a記錄標籤/零售品牌網站 2 9 2 0 a供應 2930 a 交易 2940 a解除鎖定 2950 a個人電腦 2952 a DataP1 ay 引擎 2 9 6 0 a情報交換所網站伺服器 2970 a 安全 ContentKey 伺服器(DataPlay) 2980 a 憑證管理中心(LMI ) 2972 a DataPlay安全金錄資料庫 2980 a 交易資料庫 2 9 7 0 a供應資料庫DataPlay Massive Memory File (MMF) Data Description Language (DDL) files, safety information 2412 a DataPlay pre-recording process, pre-recording n 2414 a KeyComponent.ddl 2416 a Contents.ddl 2418 a original version on the tape of DataPlay media side Video production / setup page 226 583568 Schematic description of 2420 a DataPlay ContentKey original video production feeder golden balance setting process "digital information exchange server setting" 2422 a DataPlay glass original video production and stamping process "manufacturing ”2424 a DataPlay Security Database One Gold Complement—Form 2426 a DataPlay Media Figure 25 The program starts the valley provider package software setting and changes the procedure, the package software is set to 2502, within 2504; meaning 丨 丨 2 5 0 6 a Package software display graphics and information 2508 a Contents.ddl 2510 a e-tailer (eTail) change procedure " definition definition " for clothing rights and price setting and 2512 a e-tailer (eTaUer) ^ price and package software Presentation form, software package, > FIG. 26 ° 2610 a Presentation 2620 with unlocking a satisfactory solution Locker 2 630 a sends the key complement to the engine 2640 a. The engine changes to dismiss the picture 2 7 in order to respond to the problem. Figure 2810 a key complement database 2820 a transaction database 583568 Simple description of the formula 2830 a Abolition of the list database 2 84 0 a CKU original video production server 2 8 5 0 a website server 286 0 a CKU server 28 70 a and the same brand user interface component database 2880 a supply Database 289 0 a Transaction database 2896 a CKU client 2892 a Web page 2898 a DataPlay engine 2894 a DataPlay host device Figure 29 9 1 0 a Record label / retail brand website 2 9 2 0 a Supply 2930 a Transaction 2940 a Unlock 2950 a personal computer 2952 a DataP1 ay engine 2 9 6 0 a clearing house website server 2970 a secure ContentKey server (DataPlay) 2980 a certificate management center (LMI) 2972 a DataPlay secure gold record database 2980 a transaction Database 2 9 7 0 a Supply database

第228頁 583568 圖式簡單說明 第30圖 3010 a DataPlay碟片 side A a A 側 s i d e B a B 側 3020 a 主要内容Page 228 583568 Brief description of the drawings Figure 3010 a DataPlay disc side A a A side s i d e B a B side 3020 a Main content

Newest Album a 最新唱片 3030 a次要内容 earlier release a 務早版本 bonus interview a 紅利檢視 video a 視訊 tertiary content a 第三内容 downloaded release a 下載版本 第31A圖 3110 a主要交易 Primary content a 主要内容 Newest Album a 最新唱片 Side A a A 面 S i de B a B 面Newest Album a latest record 3030 a minor content early release a early interview bonus interview a bonus view video a video tertiary content a third content downloaded release a download version 31A Figure 3110 a main transaction Primary content a main content Newest Album a Latest Records Side A a A Side S i de B a B Side

Secondary content a 次要内容 Earlier release a 猶早版本 Bonus interview a 紅利檢視 V i d e o a視訊 3140 a次要交易 3 1 5 0 a安全情報交換所Secondary content a Earlier release a early version Bonus interview a bonus review V i d e o a video 3140 a secondary transaction 3 1 5 0 a Security Clearing House

第229頁Chapter 229

3 1 5 1 a消費者解除鎖定内容 第31B圖 3122 a界面決定是否具 3132 a使用者先前是否:匕=供應給消費者? 應 不再見到這個媒體的各式供 3 1 3 3 a結束 面内容識別碼 (SCID )及鎖定 3142 a界面決定媒體的側 狀態旗標 3152 a根據一個c〇ntentKey數位權利 的解除鎖定伺服器位址及關連的 (以DRM )相谷 =了4 序錄製在媒體上)以連接-個全球資源 +: L 、亚傳送資料至伺服器(諸如:藉著詢問 全球資源定位器(URL )中的字电七、击拉 全球資源定位丄心 接關連錄製序號的 受到拒絕供應的要 3160 a媒體是否不具有鎖定内容或接 求? 3180 a執行播放(play)方法 3182 a呈現各式供應 第31C圖 3 11 4 a設置連接裝置的驅動程式 3124 a連接弓丨擎並榻取ContentKey數位版管理(CKDRM) 憑證 3 1 26 a利用,舉例來說,插槽模式組(諸如:BSD /3 1 5 1 a Consumer unlocked content Figure 31B Figure 3122 a interface determines whether there is 3132 a User previously: Dagger = supply to consumers? Various types of media for this media should no longer be seen. 3 1 3 3 a Ending content identification code (SCID) and lock 3142 a Interface determines the side status flag of the media 3152 a Unlocks the server bit based on a digital key. Address and related (in DRM) Aitani = recorded in 4 sequence on the media) to connect-a global resource +: L, Asia to send data to the server (such as by querying the Global Resource Locator (URL) Words and Telegrams 7. Pulling the global resource positioning 丄 Heart related to the serial number of the rejected supply 3160 a Does the media not have locked content or requests? 3180 a Performs a play method 3182 a Presents various supplies Figure 31C 3 11 4 a Set up the driver of the connected device 3124 a Connect bow and take the ContentKey Digital Edition Management (CKDRM) certificate 3 1 26 a Use, for example, the slot mode group (such as: BSD /

WinSock及SOCKET—STREAM模式組)以連接CKU伺服器WinSock and SOCKET-STREAM mode group) to connect to CKU server

第230頁 583568 圖式簡單說明 3128 a 等待CKU伺服器的確認 3134 a傳送引擎的ContentKey數位版管理(CKDRM)憑證 至CKU伺服器Page 230 583568 Simple illustration of the diagram 3128 a Waiting for confirmation from the CKU server 3134 a ContentKey Digital Edition Management (CKDRM) certificate of the transmission engine to the CKU server

3144 a接收CKU伺服器的ContentKey數位版管理(CKDRM )憑證 3154 a利用CKCMD—AUTHENTICATE傳送伺服器憑證至引擎 3164 a擷取ESessionKey並將其傳送給CKU伺服器3144 a Receive the ContentKey Digital Edition Management (CKDRM) certificate from the CKU server 3154 a Use CKCMD-AUTHENTICATE to send the server certificate to the engine 3164 a Retrieve the ESessionKey and send it to the CKU server

31 74 a由伺服器擷取解除鎖定内容、並利用CKCMD — UNLOCK—FILES將其傳送給引擎 31 8 4 a回報解除鎖定操作的狀態給飼服器 3194 a更新媒體上的播放表列,其係耦接引擎以包括新 解除鎖定的内容 第32圖 3202 a 3204 a 位權利 320 6 a 碼為索 (SCID (DFS ) 3208 a 3210 a 息 3212 a CKU祠服器確認用戶端連接 CKU伺服器由用戶端接收一個引擎的c〇ntentKey數 管理(CKDRM)憑證及對話識別碼(Sessi〇n ID) ContentKey數位權利管理(CKDRM)利用對話識別 引或金鑰、由交易資料庫接收侧面内容識別碼31 74 a The server retrieves the unlocked content and sends it to the engine using CCKMD — UNLOCK — FILES 31 8 4 a Reports the status of the unlock operation to the feeder 3194 a Updates the playlist on the media. Coupling engine to include newly unlocked content Figure 32 3202 a 3204 a bit right 320 6 a code for SCID (DFS) 3208 a 3210 a information 3212 a CKU server confirms that the client is connected to the CKU server by the user The client receives a engine ’s cnntentKey number management (CKDRM) voucher and session identification code (Sessioon ID). ContentKey digital rights management (CKDRM) uses the session to identify the key or key, and receives the side content identification code from the transaction database

)及欲進行解除鎖定動作的])31:3{51吖檔案系统 檔案處置 ' CKU伺服裔連接CKU原版影片伺服器 CKU伺服器等待CKU盾旦/ u h ^ ^ 寸行原版影片伺服器的連接確認訊 CKU伺服器傳送伺服3!的^ ^ 、U服為的Co n tent Key數位權利管理) And want to perform the unlock action]) 31: 3 {51 acridine file system file disposal 'CKU server connection CKU original video server CKU server waits for CKU Dundan / uh ^ ^ inch line original video server connection confirmation CKU server sends ^ ^ of servo 3 !, Co n tent key digital rights management for U server

第231頁 583568 圖式簡單說明Page 231 583568 Simple illustration

(CKDRM)憑證、引擎的ContentKey數位權利管理(CKDRM )憑證、媒體的側面内容識別碼(SCII))、及“饨^”權 案糸統(D F S )樓案處置至原版影片c κ U伺服器 3214 a CKU祠服器由CKU原版影片伺服器接收金錄補數。 在本發明的一個實施例中,金鑰乃是利用伺服器的公開金 鑰進行加密動作。 321 6 a CKU伺服|§確認CKU原版影片伺服器的接收 3218 a CKU伺服器中斷與CKU原版影片伺服器的連接 3220 a CKU伺服器傳送伺服器的c〇ntentKey數位權利管理 (CKDRM)憑證至用戶端 3222 8(]1(11>[司服器由用戶端接你1;?(;! · 川广挪接收bSessionKey,其可以刺 用C K U伺服器的公開金餘進行加密動作 3 224 a CKU伺服器利用私宓厶必"人人 399R。Γ1Π丨π服-m人山金鑰對對活金鑰進行解密動作 3226 a CKU伺服益對金鑰補數進行解密動作 3228 a CKU伺服器產生欲Γ,壬仏 給,莊α接徂紐w蚀 用以重新加密金錄補數的隨機金 鑛^ 耩以供解除鎖定的能力 3 2 3 0 a讓C K U飼服器能銳夺1 句矛J用解除鎖定金錄、對全檢補數 進行加密動作 只〜i編補數 323 2 a CKU伺服器利用 進行加密動作 引擎的公開金錄以對解除鎖定金錄 3234 a CKU伺服器建立CKCM]) 其傳送給用戶端 UNLOCK一FILES 資料、並將 3236 a CKIM司服器建立資津斗 3238 a CKU伺服器傳送資料 部分的訊息鑑別碼 給用戶端 (MAC )(CKDRM) voucher, Engine ’s ContentKey Digital Rights Management (CKDRM) voucher, media side content identification code (SCII)), and “饨 ^” rights case system (DFS) building case are disposed to the original movie c κ U server 3214 a The CKU temple server receives the gold record complement from the CKU original video server. In one embodiment of the present invention, the key is an encryption operation using a public key of the server. 321 6 a CKU server | § Confirm the receipt of the original CKU video server 3218 a The CKU server interrupts the connection with the original CKU video server 3220 a The CKU server sends the server ’s cOntentKey Digital Rights Management (CKDRM) certificate to the user End 3222 8 () 1 (11 > [The server is connected to you by the user 1;? (;! · Chuanguangnuo receives bSessionKey, which can use the public balance of the CKU server to perform encryption operations 3 224 a CKU server The device uses the private key "Renren 399R. Γ1Π 丨 π server-m Renshan key pair to decrypt the live key 3226 a CKU servo benefits decrypt the key complement 3228 a CKU server generates Γ, Ren Jiong, Zhuang α 徂 徂 蚀 蚀 蚀 Random gold ore used to re-encrypt the gold record complement ^ 耩 for unlocking ability 3 2 3 0 a to allow the CKU feeder to win one sentence spear J Encryption operation for unlocking records and performing full inspection only ~ i Compilation number 323 2 a CKU server uses the public records of the encryption operation engine to establish CKCM for unlocking records 3234 a CKU server]) It sends UNLOCK_FILES data to the client and sends 3236 a CKIM server Establish Zijindou 3238 a CKU server sends data part of the message authentication code to the client (MAC)

第232頁 p3568 圖式簡單說明 " ~" " 1 ------ 3 24 0 a CKU伺服器由用戶端接收解除鎖定内容 3 242 a在交易資料庫中標示交易狀態 3244 a CKU伺服器中斷與用戶端的連接 3245 a由fKU用戶端收到解除鎖定已經完成的指示後, 網站"ί司服器完成金融交易 第33圖 3310 a原版影片伺服器接受CKU伺服器的連接 3320 a原版影片伺服器確認這個連接動作 3330 a原版影片伺服器由CKU伺服器中接收CKU伺服器Page 232 p3568 Schematic description " ~ " " 1 ------ 3 24 0 a CKU server receives unlocked content by the client 3 242 a Marks the transaction status in the transaction database 3244 a CKU The server interrupted the connection with the client 3245 a. After the fKU client received the instructions to complete the unlocking, the website " server completes the financial transaction. Figure 33 Figure 3310 a. The original video server accepts the connection to the CKU server 3320 a The original video server confirms this connection action 3330 a The original video server receives the CKU server from the CKU server

ContentKey數位權利管理(CKDRM)憑證、引擎的 σContentKey Digital Rights Management (CKDRM) voucher, engine's σ

ContentKey數位權利管理(CKDRM)憑證、媒體的側面 容識別碼(SCID )、及DataPlay檔案系統(DFS )的檔案 處置 v、 3 3 34 a原版影片伺服器利用,舉例來說,訊息鑑別碼 (MAC)及公開金鑰基礎架構(PKI )簽章的檢查以確認 兩個憑證的有效性 ^ 3 3 3 6 a原版影片伺服器檢查廢止資料庫以確認沒有廢止 憑證懸而未決 3 3 4 0 a原版影片伺服器由金錄補數資料庫中擷取要求的 金錄補數 3350 a原版影片伺服器利用CKU伺服器公開金鑰以對金鑰 補數進行加密動作 3360 a原版影片伺服器將加密資料傳送給cku伺服器 3370 a原版影片伺服器由CKu伺服器接收確認訊息、並且ContentKey Digital Rights Management (CKDRM) voucher, media profile identifier (SCID), and file handling of the DataPlay file system (DFS) v, 3 3 34 a Original video server use, for example, message authentication code (MAC ) And Public Key Infrastructure (PKI) signature check to confirm the validity of the two certificates ^ 3 3 3 6 a The original video server checks the revocation database to confirm that there is no revocation certificate pending 3 3 4 0 a Original video server The device retrieves the requested record complement from the record complement database 3350 a The original video server uses the public key of the CKU server to encrypt the key complement 3360 a The original video server sends the encrypted data to cku server 3370 a original video server receives confirmation message from CKu server, and

第233頁 圖式簡單說明 中斷與CKU伺服器的連接 第34圖 如.在媒體^存取格式化全球資源定位器(URL ),諸 心Ϊ 3 f的全球資源定位器⑽L)、或盘媒· 3420 a㊉戶端呈現句括右::球貝源定位器(狐) 除内容狀態的詢問字串 哉別馬(sc I D )及解 3430 a網站伺服器利用供應及使用 建立網頁,藉以將各式各 |面兀件貝料庫以 3440 a網站伺服咢僂步”下* ☆ y 兄、、、口消費者 用戶端 正在進行解除鎖定動作”網頁至 3 4 5 0 a網站伺服器產生獨一盔— (SessionID),复在轉切能ϋ、子話識別碼 行交易 〃在^忍解除鎖定程序後便可以用來執 3454 a網頁内嵌CKU用戶端物杜 、,^ , 言(scriPt)以通知CKUm^包括有用戶端描述語 3 4 5 6 a網站伺服器儲存這此 卞 本awn + w ^二側面内容識別碼(SCID )及 ^的DataPiay樓案系統(DFS)㈣處置,其乃是 父,資料庫中的對話識別石馬(Sess 以在隨後供CKU伺服器物件使用 51措 第35圖 3=夂傳送-個網頁至用戶端,用戶端乃是以對話識 別碼(SeSS1〇nID)、侧面内容識 服器的IP : PORT位址The diagram on page 233 briefly explains the interruption of the connection with the CKU server. Picture 34: Access to format the global resource locator (URL) in the media, access to the global resource locator (3L), or disk media. · 3420 a㊉ Client presentation sentence includes right:: Ball source locator (fox) Except the content status query string 哉 biema (sc ID) and solution 3430 a web server uses the supply and use to create a web page to Various types | The surface material warehouse is paced with 3440 a web server "down" * ☆ y brother, consumer, client is performing unlocking action "web page to 3 4 5 0 a unique unique web server Helmet — (SessionID), which can be used to re-transform, talk, and ID transactions can be used to execute the 3454a web page embedded CKU client end, ^, yan (scriPt) The notification CKUm ^ includes the client-side descriptor 3 4 5 6 a. The web server stores this copy of the awn + w ^ two side content identification code (SCID) and ^ DataPiay Building Case System (DFS). Is the father, the conversation in the database identifies the stone horse (Sess to the CKU server Object use 51 measures Figure 35 Figure 3 = 夂 Send a web page to the client, the client is based on the session identification code (SeSS10nID), the IP address of the side content server: PORT address

第234頁 583568 圖式簡單說明 3512 a CKU用戶端設置裝置的驅動程式,其包括具有欲供 應内容的媒體 3514 a CKU用戶端取得引擎的CK憑證 3516 a CKU用戶端建立連接 3518 a CKU伺服器接受用戶端的進入連接、並利用確認訊 息以確認連接 3 52 0 a CKU用戶端傳輸引擎的CK憑證及對話識別碼 (SessionID )至CKU 伺服器 3 52 2 a CKU伺服器回應以一個確認或重新傳送訊息 3 5 24 a CKU伺服器在交易資料庫中設置對應記錄 3536 a CKU伺服器連接CKU原版影片伺服器的聆聽埠 3 5 38 a CKU原版影片伺服器接受連接並回應以確認訊息 3 54 0 a CKU伺服器組合訊息封包以要求金鑰並傳送金至 CKU原版影片伺服器 3 54 2 a CKU原版影片伺服器回應以確認訊息或重新傳送訊 息(若發生任何問題) 35 44 a CKU原版影片伺服器認證及拒絕引擎及 的CKDRM憑證 服口口 3546 a CKU原版影片伺服器檢查憑證是否存在廢止資料庫 3548 a若憑證為無效或廢止的,CKU原版影片伺服器回應 以錯誤訊息 w μ 3550 a若憑證為有效的,CKU原版影片伺服器由關連資料 庫擷取金输補數、並對其進行加密動作Page 234 583568 Schematic description of driver for 3512 a CKU client setting device, which includes media with content to be supplied 3514 a CK certificate for CKU client acquisition engine 3516 a CKU client establishment connection 3518 a CKU server accept The client enters the connection and uses a confirmation message to confirm the connection. 3 52 0 a CK certificate and Session ID of the CKU client transmission engine to the CKU server 3 52 2 a The CKU server responds with a confirmation or resend message 3 5 24 a CKU server sets the corresponding record in the transaction database 3536 a CKU server connects to the listening port of the original CKU video server 3 5 38 a The original CKU server accepts the connection and responds with a confirmation message 3 54 0 a CKU The server combines the message packet to request the key and send the money to the original CKU video server 3 54 2 a The original CKU video server responds with a confirmation message or resends the message (if any problems occur) 35 44 a CKU original video server certification And rejection engine and CKDRM certificate service port 3546 a CKU original video server checks whether the certificate exists revocation database 3548 a Certificate is invalid or abolished, CKU original movie server responds with an error message w μ 3550 a certificate if valid, CKU original movie database servers connected by a number of gold lose up to capture and encrypt action

第235頁 583568Page 235 583568

鑰補數至CKU伺服器 確認資料的接收 CKU伺服器回應以重 新 35 52 a CKU原版影片伺服器傳送金 3 5 54 a CKU伺服器擷取金鑰補數、 355 6 a若資料不匹配或接收錯誤, 傳送訊息 以傳送CKDRM憑證至CKU用 3 5 58 a CKIM司服器利用鑑別訊息 戶端 3 56 0 a CKU用戶端回應以確認或重新傳送訊息 3 5 6 2 a C K U用戶鳊建立鑑別命令封包以透過驅動程式傳送 給引擎 3 5 64 a引擎回應以加密的對話金錄 356 6 a CKU用戶端在對話金鑰訊息中傳送對話金鑰給CKu 伺月艮器 35 68 a CKU伺服器回應以伺服器確認或重新傳送訊息 3570 a CKU伺服器利用私密金鑰解密對話金鑰及金鑰補數 3 5 7 2 a C K U伺服器產生隨機金錄 3574 a CKU伺服器傳送解除鎖定訊息至CKU用戶端 3576 a CKU用戶端回應以確認或重新傳送訊息 3 5 78 a CKU用戶端傳送錯誤或解除鎖定的完成訊息給CKU 伺月艮器 3 58 0 a CKU伺服器標示交易資料庫中解除鎖定操作的狀 態、並且中斷與CKU用戶端的連接 3 59 0 a CKU用戶端藉著在網頁中傳送事件給事件處置,進 而將交易狀態回報給網頁 3592 a網頁顯示交易狀態The key complement is received by the CKU server to confirm the receipt of the data. The CKU server responds with a re-request. 35 52 a CKU original video server sends money 3 5 54 a The CKU server retrieves the key complement, 355 6 a if the data does not match or is received Error, send message to send CKDRM certificate to CKU with 3 5 58 a CKIM server uses authentication message client 3 560 0 a CKU client responds to confirm or resend message 3 5 6 2 a CKU user 鳊 creates authentication command packet Send to the engine through the driver 3 5 64 a The engine responds with an encrypted conversation record 356 6 a The CKU client sends the conversation key to the CKU server in the conversation key message 35 68 a The CKU server responds with the server The server confirms or resends the message 3570 a The CKU server uses the private key to decrypt the conversation key and the key complement 3 5 7 2 a The CKU server generates a random gold record 3574 a The CKU server sends an unlock message to the CKU client 3576 a CKU client responds to confirm or resend the message 3 5 78 a CKU client sends an error or unlocked completion message to the CKU server 3 58 0 a CKU server signals the unlocking of the transaction database Operation state, and interrupts the connection with the UE CKU 3 59 0 a CKU page transmitted by UE events to an event handler, and the transaction into the status report to a web page display 3592 a transaction status

第236頁 583568Page 236 583568

第36圖 3 61 0 a引擎接收處置及金鑰盒子的金鑰補數 3620 a引擎執行金鑰盒子查表動作 3630 a金鑰盒子内的金鑰係解除連結及進行解密動作 3 6 4 0 a金錄係重新連結、加密、及鎖定 第37圖 3702 a程序開始 3704 a DataPlay媒體插入DataPlay啟動裝置,其透過萬 用序列匯流排(USB )埠連接至一台個人電腦(pc ) 3706 a自動執行處置 3 708 a鎖定内容的内容管理裝置呈現 3710 a ContentKey 入 〇 (非必要) 3712 a ContentKey 登錄 3 71 4 a套裝軟體/定價呈現—消費者選擇欲解除鎖定的 内容 3 71 6 a輸入帳單及/或消費者資訊問卷 3718 a交易摘要的呈現 3720 a信用卡授權(非必要) 3 7 2 2 a數位情報交換伺服器通知 3724 a ContentKey啟動狀態的呈現 3726 a ContentKey引擎及伺服器鑑別 3728 a金錄補數查表、傳送、及寫入 3730 a Contents.ddl 槽案更新 3732 a ContentKey交易完成事件Figure 36 3 61 0 a The engine receives the key and the key complement of the key box 3620 a The engine performs the key box lookup operation 3630 a The key system in the key box is unlinked and decrypted 3 6 4 0 a Gold Record is reconnected, encrypted, and locked. Figure 37. 3702 a. Program starts. 3704 a. DataPlay media is inserted into the DataPlay boot device. It is connected to a personal computer (pc) through the universal serial bus (USB) port. 3706 a is automatically executed. Dispose of 3 708 a Content-Locked Content Management Device Presentation 3710 a ContentKey Entry 0 (Not Required) 3712 a ContentKey Login 3 71 4 a Set of Software / Pricing Presentation—Consumer selects content to unlock 3 71 6 a Enter bill and / Or Consumer information questionnaire 3718 a Presentation of transaction summary 3720 a Credit card authorization (optional) 3 7 2 2 a Digital information exchange server notification 3724 a Presentation of ContentKey activation status 3726 a ContentKey engine and server identification 3728 a Gold record Complementary table lookup, transmission, and writing 3730 a Contents.ddl slot update 3732 a ContentKey transaction completion event

第237頁 583568 圖式簡單說明 3734 a電子零售商(eTailer)交易完成通知 3 7 3 6 a π恭贺π網頁的呈現 第38圖 380 2 a數位情報交換伺服器(DCS )訂單管理伺服器插入 具有或不具有媒體識別碼的記錄DCS —STAGE表格 38 0 4 a數位情報交換伺服器(DCS )訂單管理伺服器產生 一個網頁,其中,一個CKU用戶端係利用一個交易識別碼 做為範例 3806 a CKU用戶端取得這個引擎的ContentKey數位權利管 理(CKDRM )憑證 3808 a CKU用戶端取得獨一無二的媒體識別碼(若尚未建 立’則由這個引擎執行) 3810 a CKU用戶端取得這個伺服器器的ContentKey數位權 利管理(CKDRM )憑證 3812 ^ CKU用戶端利用這個CKU伺服器的ContentKey數位 權利官理(CKDRM )憑證,藉以由這個引擎取得這個對話 金錄(ESessionKey ) 3814 a CKU用戶端產生最終解除鎖定要求,藉以認證及 或更新這個具有媒體識別碼的DCS STAGE表袼、#別γ伽 引擎、取得這個檔索声罢/人於、;^ / 口 ^ ^別每個 卞、口保累處置/金鑰補數/版本表列、及白爱 這個檔案組合 取〜及包覆 3816 a CKU用戶端 以使這個引擎能夠 3818 a CKU用戶端 傳送這個包覆檔案 對這個内容進行解 傳送這個最終交易 組合至這個引擎,藉 除鎖定動作 狀態訊息至這個伺服Page 237 583568 Schematic description 3734 a Electronic retailer (eTailer) transaction completion notice 3 7 3 6 a π Congratulations π Presentation of the web page Figure 38 380 2a Digital Information Exchange Server (DCS) Order Management Server Insert with Records without or without a media identification code DCS — STAGE form 38 0 4 a The Digital Information Exchange Server (DCS) order management server generates a web page where a CKU client uses a transaction identification code as an example 3806 a CKU The client obtains the Engine ’s ContentKey Digital Rights Management (CKDRM) certificate 3808 a CKU client obtains a unique media identification code (if not already created, then this engine executes) 3810 a CKU client obtains the ContentKey digital rights of this server Management (CKDRM) certificate 3812 ^ The CKU client uses the ContentKey digital rights officer (CKDRM) certificate of the CKU server to obtain this session session record (ESessionKey) 3814 a CKU client generates a final unlock request, thereby Authenticate and / or update this DCS STAGE table with media identification code, # 别 γ 加 引Get this file and ask for it / ren Yu ,; ^ / 口 ^ ^ Don't do it each time, koubao tired disposal / key complement / version list, and Bai Ai this file combination to take ~ and cover 3816 a CKU The client enables the engine to send 3818 a CKU client to send the wrapper file to decode the content. The final transaction combination is sent to the engine, and the lock action status message is sent to the server.

583568583568

裔、亚對消費者/使用者顯出一個"傳輸完成,訊自 (DCS) 故1固狀悲兀成通知、祐日·I私、士加山 曰 亚且删除故個父易的DCS STAGE記錄 及更新交易 — 第39圖 3902 a引擎 3904 a CKU用戶端(暗示瀏覽器) 3906 a CKIM司服器(3 個 java Servlet) 3908 a數位情報交換伺服器(DCS) 3 91 0 a C K U原版影片(j a v a類別) 3912 a 加密圖書館(c ++ Library ) 3914 a DataPlay (DP)資料保全資料庫 3916 a内嵌有CKU用戶端的品牌網頁 3918 a插入DCS —STAGE (交易識別碼、pc id、套裝軟體 庫存單位(PackageSKU )、選擇性媒體識別碼) 3 920 a CKCMD_GET_CERTIFICATE 3922 a引擎憑證 3924 a DFSCMD_GET_MEDIA_METADAT 3 926 a獨一無二的媒體識別碼 3928 a HTTP 主機 3930 a GetServerCert 程式(Servlet) 3932 a 字串GetServerContentKeyCertificate () 3934 a 字串GetServerContentKeyCertificate () 3 9 3 6 a 憑證或錯誤憑證或錯誤And Ya showed a "transmission completed" to the consumer / user, and the message was sent from (DCS), so a solid notice of sadness, Yuri · I, Shijiashan Yueya, and deleted the old DCS STAGE. Record and update transactions-Figure 39. 3902 a engine 3904 a CKU client (implied browser) 3906 a CKIM server (3 java servlets) 3908 a digital information exchange server (DCS) 3 91 0 a CKU original video (Java category) 3912 a C ++ Library 3914 a DataPlay (DP) data security database 3916 a Brand webpage with CKU client embedded 3918 a DCS —STAGE (transaction identification code, pc id, package) Software Stock Unit (PackageSKU), Selective Media Identifier 3 920 a CKCMD_GET_CERTIFICATE 3922 a Engine Certificate 3924 a DFSCMD_GET_MEDIA_METADAT 3 926 a Unique Media Identifier 3928 a HTTP Host 3930 a GetServerCert Program (Servlet) 3932 a String GetServerContentKeyCertificate () 3934 a string GetServerContentKeyCertificate () 3 9 3 6 a certificate or error certificate or error

第239頁 583568 圖式簡單說明 3 9 3 8 a憑證或錯誤 3940 a CKCMD—AUTHENTICATE (祠服器、憑證) 3942 a 對話金鑰(ESessionKey) 3944 a HTTP公告:對話金錄(ESessionKey)、引擎憑 證、媒體識別碼、交易識別碼 3946 a Unlock Content程式(Servlet) 3948 a 字串UnlockContent (對話金錄(ESessionKey )、引擎憑證、媒體識別碼、交易識別碼) 395 0 a P —KEY (交易識別碼、媒體識別碼、密碼、結果 組合輪出) 3952 a結果組合(檀案處置一金鑰一版本)或錯誤 3954 a 合字串 3956 a 3958 a 3960 a 3962 a 3964 a 396 6 a 3968 a 3970 a 3972 a 第40圖 4002 a 字串WrapFi leSet (對話金鑰、引擎憑證、檔案組 、金鑰計數、媒體識別碼) 包覆檔案組合或錯誤 包覆檔案組合或錯誤 包覆檔案組合或錯誤 CKCMD_UNLOCK_FILES (包覆檔案組合) 成功訊息、具認證的成功訊息、或失敗訊息 HTTP公告:交易識別碼及狀態訊息 Update Status 程式(Servlet) 更新SQL語法(交易識別碼、狀態訊息) UpdateStatus (交易識別碼、狀態訊息) 接收包括鎖定内容的媒體Page 239 583568 Simple illustration of the diagram 3 9 3 8 a certificate or error 3940 a CKCMD—AUTHENTICATE (temple server, certificate) 3942 a session key (ESessionKey) 3944 a HTTP announcement: session record (ESessionKey), engine certificate , Media ID, transaction ID 3946 a Unlock Content program (Servlet) 3948 a string UnlockContent (ESessionKey, engine certificate, media ID, transaction ID) 395 0 a P —KEY (transaction ID , Media identification code, password, and result combination rotation) 3952 a result combination (one key and one version of the case) or error 3954 a 3956 a 3958 a 3960 a 3962 a 3964 a 396 6 a 3968 a 3970 a 3972 a Figure 40 4002 a string WrapFi leSet (conversation key, engine certificate, file group, key count, media identifier) Wrapped file combination or wrongly wrapped file combination or wrongly wrapped file combination or error CKCMD_UNLOCK_FILES ( Package file combination) Success message, authentication success message, or failure message HTTP announcement: transaction ID and status message Update Status program (Servlet) Update SQL syntax (transaction ID, status message) UpdateStatus (transaction ID, status message) Receive media including locked content

第240頁 583568 圖式簡單說明 4004 a自動執行處置(或内容管理裝置)要求及取得一 個content.ddl 播案 4006 a自動執行處置(或内容管理裝置)掃描 content· ddl檔案以取取套裝軟體收集識別碼 (PackageCollectionID)、套裝軟體收集庫存單位 (PackageCol lectionSKU )、解除鎖定的全球資源定位器 (UnlockURL)、主要套裝軟體庫存單位(packagesKU) 表列及商業μ體識別碼、及一^固先前解除鎖定的套裝軟體 庫存單位(PackageSKU ) 4008 a自動執行處置(或内容管理裝置)附加資料至這 個王球資源疋位器(URL )、並開啟預設劉覽器以顯示這 個電子零售商(eTailer)所產生的一個網頁 4010 a電子零售商(eTai 1 er )呈現系列網頁給使用者/ 消費者,藉以執行電子商務交易 4012 a待使用者/消費者完成交易(如:按鈕及提示電 子零售商)後,要求電子零售商(eTailer )將 7二解除鎖定交易通知給這個數位情報交換伺服器 σ運,電子零售商(eTailer )係傳送pciD、及一 個表列欲進行解除鎖定動作的套裝軟體庫存單位至 位情報交換伺服器(DCS ) 、個數 4014 a這個數位情報交換伺服器(DCS)訂 生-個獨-無二的交易識別石馬、並 ::里凡件產 體插入-個記錄。&時,這個媒別,貝的套裝軟 有-刪LL值 、個媒體識別碼係未知,故將具P.240 583568 Brief description of the diagram 4004 a Automatic execution of disposal (or content management device) requirements and obtain a content.ddl broadcast 4006 a Automatic execution of disposal (or content management device) Scan content · ddl file to obtain package software collection Identification code (PackageCollectionID), package software collection inventory unit (PackageColectionSKU), unlocked global resource locator (UnlockURL), main package software inventory unit (packagesKU) list and commercial μ body identification code, and a previous release Locked package software inventory unit (PackageSKU) 4008 a Automatically perform processing (or content management device) additional data to this king ball resource locator (URL), and open the default browser to display this e-tailer (eTailer) A generated web page 4010 a e-tailer (eTai 1 er) presents a series of web pages to the user / consumer, so as to perform an e-commerce transaction 4012 a to wait for the user / consumer to complete the transaction (such as a button and prompt the e-retailer) After that, the e-tailer (eTailer) was required to notify this number of the 72 unlock transaction. The e-tailer (eTailer) sends pciD and a set of software inventory units (DCS) that are to be unlocked. The number of digital exchange servers (DCS) is 4014 a. (DCS) subscription-a unique-unique transaction identification Shima, and :: Lifan pieces of production insert-a record. & In this match, Pui ’s suit has-deleted LL value, the media identification code is unknown, so it will have

4 01 6 a這個數位愔丄 或使用者/消費去田乂換伺服器(DCS )將一個失敗訊息 器(URL )回應终、* 解除鎖定内容的一個全球資源定位 鎖定的全球資源^^固電子零售商(eTailer)。這個解除 伺服器(DCS )所漆( URL )包括有這個數位情報交換 4ni〇 」所產生的交易識別碼 4018 a這個電子 息、並對包括有解除W(eTailer)產生一個最終確認訊 網頁進行解除鎖^^全球資源定位11 (飢)的指令 第41圖 4102 a引擎4 01 6 a This digital user or user / consumer goes to the field server (DCS) to respond to a failure message device (URL), and * unlocks the contents of a global resource location locked by a global resource. Retailer (eTailer). The URL (URL) painted by the cancellation server (DCS) includes the transaction ID 4018 a generated by the digital information exchange 4ni0. The electronic information is also released, and a final confirmation page including the cancellation W (eTailer) is released. ^^ Global Resource Locator 11 (Hunger) Instruction 41 Figure 4102 a Engine

4104 a自動執行處置 4106 a電子零售商(暗示瀏覽器) 4108 a數位情報交換伺服器(DCS)訂單管理伺服器 411 〇 a數位情報交換伺服器(DCS )訂單管理資料^ 411 2 a數位情報交換伺服器(DCS )元件 411 4 a發生磁磁插入事件4104 a Automatic execution of disposal 4106 a Electronic retailer (implied browser) 4108 a Digital information exchange server (DCS) order management server 411 〇a Digital information exchange server (DCS) order management information ^ 411 2 a Digital information exchange Magneto-magnetic insertion event of server (DCS) element 411 4 a

4116 a DFSCMD—GET—FILE 4118 a 返回Contents.ddl 稽案 4120 a 内部邏輯電路 4122 a ’’購物車’’網頁 4124 a HTTP公告(PC ID、套裝軟體表列) 4126 a插入SQL語法(交易識別碼、PCID、套裝軟體織別 碼) 4128 a對全球資源定位器(URL)或失敗訊息進行解除鎖4116 a DFSCMD-GET-FILE 4118 a Return to Contents.ddl Audit 4120 a Internal logic circuit 4122 a `` Shopping cart '' web page 4124 a HTTP announcement (PC ID, software package list) 4126 a Insert SQL syntax (transaction identification Code, PCID, package software identification code) 4128 aUnlock the global resource locator (URL) or failure message

第242頁 583568 圖式簡單說明 定動作 4 1 3 0 a π解除鎖定指定”網頁 1Η111ΙPage 242 583568 Simple illustration of the fixed action 4 1 3 0 a π Unlock Designation "Web page 1Η111Ι

第243頁Chapter 243

Claims (1)

583568 六、申請專利範圍 1 ·—種安全電子内容系統,該系統包括: 控制器’其包括一界面元件; 主機系統,其耦接至該控制器,該主機 預定條件下呈現内$,該主機“係可以、構以在 進行操作,該主機系統更包括一系統管理 v二協定以 下列元件以進行操作,包括: ’八可利用 —關連元件,其架構以由該主機系統至少 :轉譯器’其架構以提供意義及產生該主機::執行; 令; 残系統内之命 至少一第一數位權利管理(DRM )元件,复加 内容之編碼及存取規則;以及 ”木構以提供該 檔案系統元件,其包括一檔案系統應用程 ,其架構以在複數元件間提供一邏輯界1 , I ^如申請專利範圍第lJS所述之系統 。去 可利用該主機系統及該控制器以進行/作匕括媒體,其 係以檔案持有該内容,其可經由該第 ^ y亥媒體 *件、該檔案系統元件、 _?利:理 (DRM )元件之至少一者以進行存取。第一數位權利管理583568 6. Scope of patent application 1-A secure electronic content system, the system includes: a controller 'which includes an interface element; a host system which is coupled to the controller, the host presents the internal $ under predetermined conditions, the host "The system can and is configured to operate. The host system further includes a system management v2 protocol to operate with the following elements, including: 'Eight available-related elements whose architecture is controlled by the host system at least: translator' Its structure is to provide meaning and generate the host :: execute; order; order at least one first digital rights management (DRM) element in the residual system, add content coding and access rules; and "timber structure to provide the file A system element, which includes a file system application, is structured to provide a logical boundary between a plurality of elements. The system is as described in Patent Application Scope lJS. The host system and the controller can be used to make / make a media, which is to hold the content in a file, which can be accessed through the first media media, the file system element, and the following: DRM) for access. First digital rights management 3·如申請專利範圍第丨項所述之 用該第一數位權利管理(Dr^ l、j ,、中,该内容係利 以及利用該第二數位用權^一理數管理(_)元件、 元件之一者以進行管理。 元件及忒檔案系統 第244頁 583568 六、申請專利範圍 4 ·如申晴專利範圍第3項所述之系統,其中,> 權利官理(DRM )元件係經由一安全應用程^第一數位 以對—媒體上預先錄製内容之存取動作進面(API ) 5.如申請專利範圍第3項所述之系統,其 s 。 f利:理(DRM )元件係經由與該第—數位權^二數值 儿件關連之一安全應用程式界面(Ap “ Β理(DRM 體上預先錄製内容之存取動作進行管理。,精以對一媒 6·如申請專利範圍第i項所述之系統,i 係可利用—電腦系統以進行操作 主機δ亥主機系統 腦系統以避免該内容之存取動作。機糸統係利用該電 7如申請專利範圍第2項所述之系統, 利用該主機系統以進行操作、制'中n體係可 8.如申請專利範圍第丨項所述之系制器係二媒體碟片。 更包括一引擎亓杜 ' ^ ^、、、、 一中’该主機系統 法在該引擎外進Γ=兀件係包括預定元資料,其無 安全層。 丁子動作,該引擎係架構以提供一加密 9係=U ;範之系統’其中,該主機系統 引該引擎元件係包括預定元資料,其 71羊外進仃存取動作。 10· —種保全電子内容 界面-控制器以提供資料方之法於該方法包括: •接-主機系統輸:及輸出;以及 件下呈現内容,利用#盗,杀構該主機系統以在預定條 ^覽協定以操作該主機系統,在該3. Use the first digital rights management (Dr ^ l, j ,, Chinese, as described in item 丨 of the scope of patent application), the content is profitable, and use the second digital rights to manage the (_) element. One of the components to manage. Components and file system page 244 583568 6. Application for patent scope 4 · The system described in item 3 of Shen Qing's patent scope, where > Rights Management (DRM) component system Through a secure application ^ the first digit to access the access action of the pre-recorded content on the media (API) 5. The system described in item 3 of the scope of patent application, its s. F profit: management (DRM) The components are managed via a security application program interface (Ap "B-priority" (pre-recorded content access on the DRM body) that is associated with the first-numbered-two-valued value. The system described in item i of the patent scope, i is available—a computer system is used to operate the host δ host system ’s brain system to avoid access to the content. The machine system uses the electricity as described in patent application scope 2 The system described in the above, using the host The system can be operated and manufactured in the system. The system can be two media discs as described in item 丨 of the scope of application for patents. It also includes an engine. The systematic approach to the engine is to include the predetermined metadata, which has no security layer. Ding Zi action, the engine is structured to provide an encrypted 9 series = U; Fan's system, where the host system refers to the engine component The system includes pre-determined metadata, which includes 71 access operations. 10 · — A method to secure the electronic content interface-the controller provides the data method. The method includes: • connecting-host system input: and output; and The content is presented below, and the host system is constructed using #Theft to schedule the agreement to operate the host system. 第245頁 583568Page 245 583568 主機系統上操作一主機管理裝置 以: & 1 亥主機系統係可操作 木構一關連元件以由該主機系統至少. 架構一轉譯器以提供意義、並產生該二地執仃, 架構至少一第一數位權利管理(DRI^幾系統内之命令; 之編碼及存取規則;以及 凡件以提供該内容 架構一檔案系統元件,其包括一檔案 (API),藉以在複數元件間提供—邏輯1 應用程式界面 如申請專利範圍第10項所述之方法饵审^二. 主機系統及該控制器以操作一媒體 。括’利用該 其r由該第一數位權:管 及第一数位核利管理(DRM、-件之至少一者以進行存取動作。 Μ )凡 1 2 ·如申請專利範圍第丨〇項所述之方法,复 利用該第一數位權利管理(DRM )元件及二 ==係 管理(DRM)元件、利用該第〆數位權利管理^drm位杻利 件、以及利用該第二數位權利管理(DRM )元件及該7 系統元件之一者以進行管理。 W虽案 1 3·如申請專利範圍第丨2項所述之方法,其中,該第一 位權利管理(DRM )元件係經由一安全應用程式界面 )以對一媒體上預先錄製内容之存取動作進行管理。 1 4·如申請專利範圍第丨2項所述之方法,其中,該第二數 位權利管理(DRM )元件係經由與該第一數位權利管理 (DRM )元件關連之一安全應用程式界面(API ),藉以對A host management device is operated on the host system to: & 1 The host system is operable to construct a related element to be used by the host system at least. Construct a translator to provide meaning and generate the two executions. First digital rights management (commands in DRI ^ system; encoding and access rules; and everything to provide the content framework a file system element, which includes an archive (API) to provide between multiple elements-logic 1 Application program interface as described in item 10 of the scope of patent application ^ Second. The host system and the controller to operate a media. Including 'the use of the r by the first digital rights: the tube and the first digital core Profit management (at least one of DRM, -pieces for access. M) Where 1 2 · Reuse the first digital rights management (DRM) component and == is a management (DRM) element, using the first digital rights management ^ drm bit, and using the second digital rights management (DRM) element and one of the 7 system elements for management. 1 3. The method as described in item 2 of the patent application scope, wherein the first rights management (DRM) component manages access to pre-recorded content on a medium via a secure application program interface) . 1 4. The method as described in item 2 of the patent application scope, wherein the second digital rights management (DRM) component is a secure application programming interface (API) connected to the first digital rights management (DRM) component. ), So right 第246頁 583568 六、申請專利範圍 一媒體上預先錄製内容之存取動作進行管理。 1 5 ·如申請專利範圍第丨〇項所述之方法,其中上 統係可利用一電腦系統以進行操作,該主、 違,主機系 電腦系統以避免該内容之存取動作。 糸、、先係利用該 1 6 ·如申請專利範圍第1 〇項所述之方法,兑 ^ 係可利用一電腦系統以進行操#,該控制器^亥控制器 主機系統以避免該内容之存取動作。 ’、,、可利用該 1 7·如申請專利範圍第丨〇項所述之方法,1 ^ 可利用該主德备於,、,、仓—4口价 〇 ^ 5亥媒體係 片。彡主機糸統^心作、且該控㈣係_媒體碟 1 8.如申請專利範圍第丨〇項所述之方法, 統更包括-引擎元件,該引擎元件係包括預中二,主機系 無法在該引擎外進行存取動作,該引擎::其 密安全層。 $朱構以&供一加 19.如申請專利範圍第1〇項所述之方法,i 統係可以耦接至一伺服琴,直配備 八 DX主機糸 機系統内之一引擎元:,:;整:楗供加密資料至該主 复h : 擎件,该引擎兀件係包括預定元資料, ......法在5亥引擎外進行存取動作。 一種们則一媒體碟片丨加密資料之未授權行動之方 内j媒,碟片係包括預先錄製内容之_第一部分及寫入 ^谷之一第二部分,該方法包括·· ::=體碟片上之一識別碼,纟中,該識別碼係包括至 ς :t:其係位於預先錄製内容之該第一部分、寫入内 奋之名第一部分、以及預先錄製内容之該第一部分及寫入Page 246 583568 6. Scope of Patent Application 1. The access to pre-recorded content on the media is managed. 15 · The method as described in item No. 0 of the scope of patent application, wherein the upper system can use a computer system to perform the operation, and the host computer and the host computer system are computer systems to avoid access to the content.糸 、 Firstly, use the 16 method. As described in item 10 of the scope of patent application, you can use a computer system to perform the operation. The controller ^ controller controller host system to avoid the content. Access action. The method described in item 17 of the scope of patent application can be used, and the main virtue can be used in the media film of the price of 0, 5 and 0.彡 Host system 心 heart work, and the control system _Media Disc 1 8. As described in the scope of the patent application, the system also includes-engine components, the engine components include pre-secondary, host system It is not possible to perform access operations outside of this engine, the engine :: its security layer. $ 朱 筑 以 & for one plus 19. According to the method described in item 10 of the scope of patent application, the i system can be coupled to a servo piano directly equipped with one engine element in the eight DX mainframe system :, :; Integrate: Provide encrypted data to the master and h: engine, the engine components include predetermined metadata, ... method to perform access operations outside the engine. One kind of media is a media disc. Unauthorized action of encrypted data. The disc includes the first part of the pre-recorded content and the second part of the written ^ valley. The method includes ... An identification code on a sports disc. In this case, the identification code includes to: t: it is located in the first part of the pre-recorded content, the first part of the name written in the internal content, and the first part of the pre-recorded content. And write 第247頁 583568 六、申請專利範圍 内容之該第二部分之一者; 决疋該識別碼是否包括一區段,其位於寫入内容一 部分; ^弟一 比車父該識別碼及至少一預定類型之識別喝,其中,一區尸 係位於寫入内容之該第二部分;以及 又 若該識別碼係該等至少一預定類型之識別碼之一者, 測一未授權行動。 、貞 21 ·如申請專利範圍第2 〇項所述之方法,其中,該媒體碟 片上該識別碼之讀取動作係位於一媒體碟片存取操作期、 ’其包括記錄、播放、取得播放金鍮、複製、開啟 、以 >5 漆座命7 /Λγ -V S,丨、_ η 間 關 閉、以及產生動作之至少一者。 2 2.如申請專利範圍第21項所述之方法,其中,該媒體存 取碟片操作之功能係在偵測到該未授權行動後加以廢杜止子 23. 如申請專利範圍第20項所述之方法,其中,該識^ 片卞複數識別碼之一 各個識別碼係與該媒 及寫入内容之二者檔案關連,邊等檔案包括預先錄製内容 24. 如申請專利範圍第2〇項所述之方法,其中, 以ί3錄製内容之一識別碼,且該識別碼係有^於 寫入内合在該媒體碟片上之一位置。 、 25如申請專利範圍第2〇項所述之方法 片係-媒體碟#、一光碟、一數位影音 媒他體碟: 儲存媒體之一者。 畔及其他數位 26.如申請專利範圍第2〇項所述之方法,其中,該識別碼Page 247 583568 VI. One of the second part of the scope of patent application; Determine whether the identification code includes a section, which is located in the written content; ^ Brother one than the vehicle owner, the identification code and at least one reservation Type identification, in which an area is located in the second part of the written content; and if the identification code is one of the at least one predetermined type of identification code, an unauthorized action is detected. Zhen 21 · The method as described in Item 20 of the scope of patent application, wherein the reading action of the identification code on the media disc is during a media disc access operation period, which includes recording, playback, and acquisition Play at least one of Kim Won, copy, open, > 5 lacquer command 7 / Λγ-VS, close between 丨, _ η, and generate action. 2 2. The method as described in item 21 of the scope of patent application, wherein the function of the media access disc operation is to abolish the check after detecting the unauthorized action. 23. If item 20 of the scope of patent application The method, wherein each identification number of the identification number is related to both the media and the written content file, and the side file includes the pre-recorded content 24. Such as the scope of patent application No. 2〇 The method according to the item, wherein an identification code of the content is recorded in 3, and the identification code is written in a position on the media disc. 25. The method as described in item 20 of the scope of the patent application. Film series-media disc #, a disc, a digital video and audio media other disc: one of the storage media. Shore and other digits 26. The method as described in item 20 of the scope of patent application, wherein the identification code 第248頁 583568 ---- 六、申請專利範圍 ί預先錄製在該媒體碟片上,且該媒體碟片係、預先錄製 的〇 =·如申-睛專利範圍第20項所述之方法,其中,該預定類 ,糸二不寫入内容之一識別碼,且該識別碼係有關於該寫 2内谷在該媒體碟片上之一位置,其係該媒體碟片所獨一 無二的。 2 ·_如申胡專利範圍第2 0項所述之方法,其中,該識別碼 係一金鑰產生器之一種子,該金鑰產生器係由一金鑰盒子 擷取至少一金鑰,該等金鑰係用於一媒體碟片上之檔案解 除鎖定及解密動作之至少一者。 2 9 ·如申请專利範圍第2 0項所述之方法,其中,該識別碼 由二媒體碟片擷取並用於一弓丨擎中以進行一認證函數, / ι也函數係執行該識別碼及裏少一預定類型之識別碼之 比較動作、以及偵測一未授權行動。 3 Υ ·如申凊專利範圍第2 0項所述之方法,其中,一未授權 订動之該偵測動作係導致提供,失敗指示之該認證函數。 3 1 ·如申睛專利範圍第2 1項所述之方法,其中,一未授權 仃動之該偵測動作係導致該媒體碟片存取操作之功能廢 止。 3 j ·如申請專利範圍第2 〇項所述之方法,其中,偵測未授 權行動之该方法係發生在一媒體碟片’在一數位權利管理 協定下,利用一引擎進行存取時。 33·如申請專利範圍第2〇項所述之方法,其中,該識別碼 係位於一媒體碟片上,其可以耦接至一主機,該主機係一Page 248 583568 ---- 6. The scope of the patent application ί is pre-recorded on the media disc, and the media disc is pre-recorded 〇 = · As described in the 20th method of Shen-eye patent scope Among them, in the predetermined category, one of the contents does not write an identification code, and the identification code relates to a position of the write 2 inner valley on the media disc, which is unique to the media disc. 2. The method as described in item 20 of the Shenhu patent scope, wherein the identification code is a seed of a key generator, and the key generator retrieves at least one key from a key box, These keys are used for at least one of unlocking and decrypting files on a media disc. 29. The method as described in item 20 of the scope of patent application, wherein the identification code is retrieved by two media discs and used in a bow to perform an authentication function, and the function is to execute the identification code Compare the actions of a predetermined type of identifier and detect an unauthorized action. 3) The method as described in claim 20 of the patent scope, wherein an unauthorized subscription of the detection action results in an authentication function that provides a failure indication. 3 1 · The method as described in item 21 of Shenyan's patent scope, wherein an unauthorized actuation of the detection action causes the function of the media disc access operation to be discontinued. 3 j. The method as described in item 20 of the scope of patent application, wherein the method of detecting unauthorized actions occurs when a media disc 'is accessed under a digital rights management agreement using an engine. 33. The method according to item 20 of the scope of patent application, wherein the identification code is located on a media disc, which can be coupled to a host, the host being a 讀取該I丨 讀取該言 該識別名 583568 六、申請專利範圍 ?丨擎、内嵌-弓丨擎之-裝I、一一 定、一開放計算環境中^ ^ 弟二者數位權利管理協 服器之一者。 w用私式、及一情報交換所我 34·:種偵測一媒體碟片上加 置,该媒體碟片係包括 、科之未授權行動之裝 :;之用-第二部分,該以:;内容之-第-部分及寫入 衣置,用以讀取該媒體磁一 碼係包括至少_ P p 識別碼,其中,該識別 分、寫入内容之=4;位内容之該第-部 :分及寫入内容之該第二u;先錄製内容之該第- 中若哕:二:t该識別碼及至少一預定類型之識別碼,其 區段,其位於寫入内容之該第二部 裝置,用了入内合之该第二部分之一區段係未授權;以及 ^ ^ α 以偵測一未授權行動,若該識別碼係該等至少一 預疋類型之識別碼之一者。 2 ·如申凊專利範圍第3 4項所述之裝置,更包括: 衣置’用以決定該識別碼是否為一預先錄製識別碼、或具 有預先錄製資料及寫入資料組合之一識別碼之一複製 3 6 ·如申凊專利範圍第3 4項所述之裝置,其中,讀取— 別碼之該裝置係包括一媒體碟片存取元件。 37·如申請專利範圍第34項所述之裝置,其中 別碼之該裝置係在一存取操作期間進行操作。 38·如申請專利範圍第34項所述之裝置,其中,該識另 係一媒體碟片上複數識別碼之一者,各個識別碼係與Read the I 丨 Read the speech and the identification name 583568 6. Scope of patent application? 丨 engine, embedded-bow 丨 engine-installation I, a certain, an open computing environment ^ ^ brother digital rights management One of the server. w Use a private type and a clearing house I 34 ·: a type of detection on a media disc, the media disc is included, the section of the unauthorized operation of the equipment :; the use-the second part, the :;-The-part of the content and the writing device for reading the media magnetic code includes at least _ P p identification code, where the identification points, written content = 4; the content of the first -Part: Dividing and writing the second u; Recording the content first-Zhong Ruo 哕: Two: t The identification code and at least one predetermined type of identification code, its section, which is located in the written content The second device uses an unauthorized part of the second part of the second part; and ^ ^ α to detect an unauthorized action, if the identification code is the at least one pre-type identification code One of them. 2 · The device as described in item 34 of the patent application scope, further including: "clothing device" is used to determine whether the identification code is a pre-recorded identification code, or an identification code with a combination of pre-recorded data and written data One copy 3 6 · The device as described in claim 34 of the patent scope, wherein the device of reading-unique code includes a media disc access element. 37. The device according to item 34 of the scope of patent application, wherein the device of another code is operated during an access operation. 38. The device according to item 34 of the scope of patent application, wherein the identification is one of a plurality of identification codes on a media disc, and each identification code is related to 第250頁Chapter 250 583568 --——. 申請專利範圍 體碟片上之至少 檔案關 速’該等檔案包括預先錄製内容 及寫入内容之一者。 … 39·如申請專利範圍第38項所述之裝置,其中,該等識別 碼之至少一者係該媒體碟片所獨一無二的。 40·如申請專利範圍第34項所述之裝置,其中,該識別碼 係一加密金鑰盒子之一種子,該金鑰產生器係利用該識別 碼以擷取至少一金鑰,藉以對一媒體碟片上之檔案進行解 除鎖定動作。 41 · 一種引擎,其架構以偵測一媒體碟片上加密資料之未 授權行動,該媒體碟片係包括預先錄製内容之一第一部分 及寫入内容之一第二部分,該引擎包括·· 一韌體元件,設置於一特殊用途積體電路(AS IC )上,該 韌體元件包括·· 一方塊,其係架構以讀取該媒體碟片上之一識別碼,其 中,該識別碼係包括至少一區段,其係位於預先錄製内容 之該第一部分、寫入内容之該第二部分、以及預先錄製内 容之該第一部分及寫入内容之該第一部分之一者; 一方塊,其係架構以比較該識別碼及至少一預定類型之識 別碼,其中若該識別碼包括一區段,其位於寫入内容之該 第二部分,位於寫入内容之該第二部分之一區段係未授583568 --——. Scope of patent application At least file speed on the disc ’These files include one of pre-recorded content and written content. … 39. The device according to item 38 of the scope of patent application, wherein at least one of the identification codes is unique to the media disc. 40. The device according to item 34 of the scope of application for a patent, wherein the identification code is a seed of an encryption key box, and the key generator uses the identification code to retrieve at least one key to match one Unlock the files on the media disc. 41 · An engine designed to detect unauthorized actions on encrypted data on a media disc, the media disc includes a first part of pre-recorded content and a second part of written content. The engine includes ... A firmware component is disposed on a special-purpose integrated circuit (AS IC). The firmware component includes a block that is structured to read an identification code on the media disc, wherein the identification code Includes at least one section, which is one of the first part of the pre-recorded content, the second part of the written content, and the first part of the pre-recorded content and the first part of the written content; a box, It is structured to compare the identification code with at least one predetermined type of identification code, where if the identification code includes a section, it is located in the second part of the written content and in an area of the second part of the written content Section is not awarded 權;以及 -方塊’其係架構以彳貞測一未授權行動’若該識別碼係該 等至少一預定類型之識別碼之一者。 4 2. —種電腦程式產品,該電腦程式產品包括:Rights; and-a block 'which is structured to detect an unauthorized action' if the identification code is one of the at least one predetermined type of identification code. 4 2. —A kind of computer program product, the computer program product includes: 第251頁 583568 六、申請專利範圍 承載數位資訊之信號承載媒體,用以包括程式,該數位資 訊包括: 一方塊,其係架構以讀取該媒體碟片上之一識別碼,其 中,該識別碼係包括至少一區段,其係位於預先錄製内容 之該第一部分、寫入内容之該第二部分、以及預先錄製内 容之該第一部分及寫入内容之該第二部分之一者;Page 251 583568 6. The patent-bearing signal-bearing media carrying digital information includes programs. The digital information includes: a block that reads an identification code on the media disc, where the identification The code system includes at least one section, which is one of the first part of the pre-recorded content, the second part of the written content, and the first part of the pre-recorded content and the second part of the written content; 一方塊,其係架構以比較該識別碼及至少一預定類型之識 別碼,其中若該識別碼包括一區段,其位於寫入内容之該 第二部分,位於寫入内容之該第二部分之一區段係未授 權;以及 一方塊,其係架構以偵測一未授權行動,若該識別碼係該 等至少一預定類型之識別碼之一者。 4 3 · 一種識別一位置之方法,該位置於與一媒體碟月之一 製造商關連,該媒體碟片係持有内容,該方法包括: 提供該媒體碟片,之指令; 在該媒體碟片根據該等指令以安裝至一主機期間,安裝一 識別碼於該媒體碟片上,該識別碼係包括與該製造商關連 之一程式碼;以及A block that is structured to compare the identification code with at least one predetermined type of identification code, where if the identification code includes a section, it is located in the second part of the written content and in the second part of the written content A section is unauthorized; and a block is structured to detect an unauthorized action if the identification code is one of the at least one predetermined type of identification code. 4 3 A method of identifying a location that is associated with a manufacturer of a media disc, the media disc holds content, the method includes: providing instructions for the media disc; on the media disc During the installation of the film to a host according to the instructions, an identification code is installed on the media disc, the identification code includes a code associated with the manufacturer; and 待傳輪資料至一伺服器後,讀取該識別碼以找到與該製造 商關連之一位置,該位置係關連於該媒體磘片之該製造商 且獨立於與該媒體碟片沒有關連之任何製造商。 44·如申請專利範圍第43項所述之方法,其中,該媒體碟 片之該等指令係包括:識別購買該媒體碟片之一製造商。 4 5 ·如申請專利範圍第4 3項所述之方法,其中,購買該媒After the round data is transmitted to a server, the identification code is read to find a location associated with the manufacturer, the location is related to the manufacturer of the media card and is independent of the manufacturer who is not associated with the media disc. Any manufacturer. 44. The method according to item 43 of the scope of patent application, wherein the instructions for the media disc include: identifying a manufacturer who purchased the media disc. 4 5 · The method described in item 43 of the scope of patent application, wherein the media is purchased 第252頁 583568 六、申請專利範圍 體碟片之該製造商之該識別動作係包括:在該等指令中提 供一程式碼、一全球資源定位器(URL )、與該製造商關 連之一加密金鑰、及與該製造商關連之一加密金鑰之一部 分之一者。 4 6. —種識別一位置之系統,該位置於與一媒體碟片之一 製造商關連,該媒體碟片係持有内容,該系統包括: 該媒體碟片之指令;以及 一軟體安裝元件,其關連於該媒體碟片,該軟體安裝元件 係可在該媒體碟片根據該等指令安裝至一主機期間舉例說 明,該軟體安裝元件係可操作以安裝該媒體碟片上之一識 別碼,該識別碼係包括與該製造商關連之一程式碼,該識 別碼關連該製造商之一位置,藉以使該主機及一伺服器間 之一連接可操作以開啟該位置。 4 7.如申請專利範圍第4 6項所述之系統,其中,該媒體碟 片之該等指令係包括:識別購買該媒體碟片之一製造商。 4 8.如申請專利範圍第46項所述之系統,其中,購買該媒 體碟片之該製造商之該識別動作係包括:在該等指令中提 供一程式碼、一全球資源定位器(URL )、與該製造商關 連之一加密金錄、及與該製造商關連之一加密金錄之一部 分之一者。 49.如申請專利範圍第46項所述之系統,其中,該位置係 一網際網路位置,其包括網頁以對該媒體碟片上的儲存内 容進行解除鎖定動作,該網際網路位置更提供選擇性供 應,藉以讓該製造商能夠在網際網路上購買。Page 252 583568 6. The identification action of the manufacturer of the patent-applied volume disc includes: providing a code, a global resource locator (URL) in these instructions, and an encryption associated with the manufacturer One of the keys and one of the cryptographic keys associated with the manufacturer. 4 6. —A system for identifying a location that is associated with a manufacturer of a media disc that holds content. The system includes: instructions for the media disc; and a software installation component , Which is related to the media disc, the software installation element can be exemplified during the installation of the media disc to a host according to the instructions, and the software installation element is operable to install an identification code on the media disc The identification code includes a code associated with the manufacturer, and the identification code relates to a location of the manufacturer, so that a connection between the host and a server can be operated to open the location. 47. The system as described in item 46 of the scope of patent application, wherein the instructions of the media disc include: identifying a manufacturer who purchased the media disc. 4 8. The system according to item 46 of the scope of patent application, wherein the identifying action of the manufacturer who purchased the media disc includes: providing a code, a global resource locator (URL) in the instructions ), One of the cryptographic records associated with the manufacturer, and one of the cryptographic records associated with the manufacturer. 49. The system according to item 46 of the scope of patent application, wherein the location is an Internet location that includes a webpage to unlock the stored content on the media disc, and the Internet location provides Selective supply to enable the manufacturer to buy on the Internet. 第253頁 583568Page 253 583568 5 〇 ·如、申请專利範圍第4 6項戶斤述之系統’其中,該主機係 一引擎、内嵌一引擎之一裝置、一第三者數位權利管理協 疋以及一開放計算環境中執行之一應用程式之一者。 5 1 · —種經由一媒體碟片識別_位置之方法,該媒體碟片係 包括至少一可寫入部分及一不玎重寫部分,該方法包括: 將該位置寫入該可寫入部分; 散佈至少一媒體碟片給至少〆實體,該位置係關連該等媒 體碟片至該等實體;以及 、50. For example, the system described in Item 46 of the scope of patent application 'wherein the host is an engine, a device embedded with an engine, a third-party digital rights management agreement, and an open computing environment. One of the apps. 5 1 · —A method for identifying a position by a media disc, the media disc including at least a writable part and a rewrite part, the method includes: writing the position to the writable part ; Distribute at least one media disc to at least one entity, the location is related to the media discs to the entities; and, 若發生該等媒體碟片之一返卸,則根據預定條件以改變該 位置。 52·如申請專利範圍第51項所述之方法,其中,該位置係一 全球資源定位器(URL ),且其中,該等預定條件係包括: 決定該等實體之一市場佔有率。 5 3·如申請專利範圍第51項所述之方法,其中,該位置之改 變動作係由一内容提供者執行,該内容提供者係接收該等 媒體碟片,包括至少一媒體碟片、以及在該改變動作後將 該等返回媒體碟片散佈至該等實體之相同或不同實體。’If one of these media discs is unloaded, the location is changed according to predetermined conditions. 52. The method according to item 51 of the scope of patent application, wherein the location is a global resource locator (URL), and wherein the predetermined conditions include: determining a market share of one of these entities. 5 3. The method according to item 51 of the scope of patent application, wherein the change of position is performed by a content provider that receives the media discs, including at least one media disc, and After the change, the returned media discs are distributed to the same or different entities of those entities. ’ 54·如申請專利範圍第53項所述之方法,其中,該散佈動作 係根據該等媒體碟片之一租賃合約,該租賃合約係同咅未 售出媒體碟片之返回。 5 5· —^種識別一位置之系統,該糸統係包括· 一媒體碟片,其具有至少一可寫入部分及一不可重寫部八 該媒體碟片係將該位置寫入該玎寫入部分; …刀’ 散佈至少一媒體碟片給至少〆實體,該位置係關連該等媒54. The method as described in item 53 of the scope of patent application, wherein the distributing operation is based on a lease contract of one of the media discs, and the lease contract is the return of unsold media discs. 5 5 ·· ^ A system for identifying a location, the system includes · a media disc having at least a writable portion and a non-rewritable portion. The media disc is to write the position to the frame. Write part;… knife 'to distribute at least one media disc to at least the entity, this position is related to such media 第254頁 583568 六、申請專利範圍 ----— 體碟片至該等實體;以及 若該4媒體碟片之一返回發生日守’則根據預定條件以微 該位置。 ’、 艾 5 6 ·如申請專利範圍第5 5項所述之系統,其中,該媒體碟片 係一媒體碟片、一光碟、/數位影音光碟、及其他數位 存媒體之一者。 _ 57·如申請專利範圍第55項所述之系統,其中,一識別竭係 預先錄製於該媒體碟片上,且該媒體碟片係預先錄製的’今 識別碼係提供到該位置之/連結。 ’ μ 5 8 · —種電腦程式產品,該電腦程式產品係包括: 信號承載媒體,其具有程式,用以·· 在該信號承載媒體根據指令安裝至一主機期間做為範 以及 ^ 安裝一識別碼至該信號承載媒體上,該識別碼係包括與該 信號承載媒體上隱藏内容之一製造商關連之一裎式碼,該 識別碼係關連於該製造商之一位置,藉以使該主機及二^ 服器間之一連接可操作以開啟該位置。 59· 一種改變一儲存媒體上保全資料之方法,該方法包括· 與一主機建立一安全對話; 匕括· 接收,經由通信通道,對該保全資料進行解除鎖定之一命 令二其係由至少一内容儲存模型進行管理;以及 =Τ王二料進订解除鎖定,其中,該命令係回應於該媒體 ’、 之〒令,該識別碼係架構以管理該保全資料之存 取動作,且至少一内容儲存模型係一安全内容管理裝置。Page 254 583568 6. Scope of patent application -------- body discs to these entities; and if one of the 4 media discs returns to the day guard ', the position will be micro-scaled according to predetermined conditions. ′, Ai 56. The system according to item 55 of the scope of patent application, wherein the media disc is one of a media disc, an optical disc, a digital video disc, and other digital storage media. _ 57. The system as described in item 55 of the scope of patent application, wherein an identification is recorded in advance on the media disc, and the media disc is pre-recorded, and the present identification code is provided to the location / link. 'μ 5 8 · —A computer program product, the computer program product includes: a signal bearing medium, which has a program, is used as a model during the installation of the signal bearing medium to a host according to instructions and ^ install an identification Code to the signal bearing medium, the identification code includes a type code associated with a manufacturer of hidden content on the signal bearing medium, the identification code is associated with a location of the manufacturer, so that the host and the One connection between the two servers is operable to open the position. 59. A method for changing security information on a storage medium, the method includes: establishing a secure conversation with a host; receiving; receiving, through a communication channel, unlocking the security information The content storage model is managed; and = T 王 二 料 进 定 Unlock, where the order is in response to the order of the media ', the identification code is structured to manage the access action of the security data, and at least one The content storage model is a secure content management device. 第255頁 583568 六、申請專利範圍 立一安全對話係包括:經由 通k通道以鏗別該主機 述之方法,其中,與一主機建 6 0 ·如申請專利範圍第5 9項所述之方法,其中,與一主機建 ”〜 叫、〇伯 · ^ CW 6 1 ·如申請專利範圍第5 9項所 立一安全對話係包括:傳輸鑑別資料至該主機。 62·如申請專利範圍第59項所述之方法,更包括:由該主機 接收一指示,藉以表示欲解除鎖定之内容。 6 3 ·如申請專利範圍第5 9項所述之方法,更包括:決定欲解 除鎖疋之内容係透過掃描一目錄結構及注意安全資料以達 到。Page 255 583568 6. The scope of patent application for establishing a secure dialogue system includes the method described by the host through the k channel to distinguish the host. Among them, establishing a 60 with a host · The method described in item 59 of the scope of patent application Among them, it is built with a host "~ called, ○ ·· CW 6 1 · A secure dialogue system as set out in the scope of patent application No. 59 includes: transmitting authentication information to this host. 62 · If the scope of patent application is 59 The method described in the above item further includes: receiving an instruction from the host to indicate the content to be unlocked. 6 3 · The method described in item 59 of the patent application scope further includes: determining the content to be unlocked This is achieved by scanning a directory structure and paying attention to security information. 64·如申請專利範圍第59項所述之方法,其中,該安全内容 管理裝置係一數位權利管理協定。 65·如申請專利範圍第59項所述之方法,其中,該等内容儲 存模型係包括至少二數位權利管理協定。 66·如申请專利範圍第59項所述之方法,其中,該安 管理裝置係一專有及一第三者數位權利管理協定之一者。 67·如申請專利範圍第59項所述之方法,其 取動作係由_稽案系統進行管理。 1枓之存 6:之:Λ架ί以對一儲存媒體上安全資料進行解除鎖定動 作之糸統,该系統係包括: 郭64. The method as described in claim 59, wherein the secure content management device is a digital rights management agreement. 65. The method according to item 59 of the scope of patent application, wherein the content storage model includes at least two digital rights management agreements. 66. The method of claim 59, wherein the security management device is one of a proprietary and a third party digital rights management agreement. 67. The method as described in item 59 of the scope of patent application, whose taking action is managed by the _JiCan system. 1 枓 之 存 6: 之: Λ frame to unlock the security data on a storage medium, the system includes: Guo =内容儲存模型,用於該儲存媒體上儲存之保全資料; 上係能夠對保全資料進行解除鎖定動作,其中兮 料推二=正5亥儲存媒體上該資料之屬性,藉以依攄f+兮二 枓進仃解除鎖定動作 令,根 =該貢 分㈣#槟型以對= Content storage model, used for the security data stored on the storage medium; the system can unlock the security data, among which the material pushes the second = the attribute of the data on the storage medium, which is based on f + xi枓 Into the unlock action, root = 该 贡 分 ㈣ # 槟 型 to right 第256頁 583568 六、申請專利範圍 该保全資料進行解除鎖定動作。 69·如申請專利範圍第68項所述之系統,其中,該弓丨擎係 收該命令以對一訊息中之該資料進行解除鎖定動作,复 邊Λ息係經由一通信通道接收。 ’ 70·如申請專利範圍第69項所述之系統,其中,該通 係一網際網路通道、一衛星通信通道、一無線 。<逼 有線通道之一者。 、及一 71•如申請專利範圍第69項所述之系統,其中,該 密的。 u W係加 72·如申請專利範圍第“項所述之系統,其中,誃 存模型係包括至少二數位權利管理協定。,"内容儲 73·如申睛專利範圍第68項所述之系統,其 模型係一專有及—第三者數位權利管理協定之^一内各儲存 74·如申睛專利範圍第68項所述之系統,其中今次丄 取動作係由—檔案系統進行管理。 …亥貝料之存 7 5 · —種電腦程式產品,其包括: 一儲存媒體; 複數内容儲存模型,用於該儲存媒體上 ::腦裎式,該電腦程式係包括: 存之貝料; 扎、7,其係調整該儲存媒體上該資料之屬性 二a内甘各儲存模型之保全資料進行解除鎖定^朴餅根據至 # a,=係經由一通信通道與一主機進行通作·、’ 曰々,/、係由該主機接收一命令,藉以對 °,以及 除鎖定動作。 對該保全資料進行解Page 256 583568 6. Scope of patent application The security data will be unlocked. 69. The system according to item 68 of the scope of application for a patent, wherein the bow receives the command to perform an unlocking action on the data in a message, and the double edge information is received via a communication channel. 70. The system according to item 69 of the scope of patent application, wherein the system is an Internet channel, a satellite communication channel, and a wireless network. < Force one of the wired channels. And 71. The system described in item 69 of the scope of patent application, wherein the confidential. u W plus 72. The system as described in item “Scope of the patent application”, wherein the storage model includes at least two digit rights management agreements. " Content storage 73. The model of the system is a proprietary and-third party digital rights management agreement. Each one is stored in 74. The system described in item 68 of Shenyan's patent scope, in which the capturing operation is performed by the file system. Management .... Haibei Material Storage 7 5 · A computer program product including: a storage medium; a plurality of content storage models for use on the storage medium :: brain type, the computer program includes: , 7 , It is to adjust the attribute of the data on the storage medium. The security data of each storage model in the a is unlocked. ^ Pu Bing according to # a, = is a communication with a host through a communication channel. ·, 'Said 々, /, is a command received by the host, to °, and to remove the lock action. Solution to the security data 第257頁 Όδ 、申請專彳愧1| , γ 0 士 通·作D申請專利範圍第75項所述之電腦程式產品,其中,該 。、逼係一網際網路通道、一衛星通信通道、一無線通 g、及—有線通道之一者。 專利範圍第75項所述之電腦程式產品,其中,該 伴八一’更包括:指令,其係藉著追蹤一目錄結構及識別 王育料&藉以決定欲解除鎖定之資料。 雷日《如^申〇^專利範圍第75項所述之電腦程式產品,其中,該 70 更包括:指令,用以與該主機建立一安全對話。 雷申4請專利範圍第75項所述之電腦程式產品,其中,該Page 257 Όδ, application for ashamed 1 |, γ 0 Stone · works D. The computer program product described in item 75 of the patent application scope, of which. It is one of an Internet channel, a satellite communication channel, a wireless communication channel, and a wired channel. The computer program product described in the 75th item of the patent scope, wherein the "Pan Bayi" further includes: instructions, which are used to track a directory structure and identify Wang Yumiao & to determine the information to be unlocked. The computer program product described in Lei Sun's "Scope of Patent Application No. 75", wherein the 70 further includes: a command for establishing a secure dialogue with the host. Lei Shen 4 requested the computer program product described in item 75 of the patent scope, wherein the 铛1更包括:指令,用以解密對該安全資料進行解除 鎖疋動作之該命令。 H申利範圍第75項所述之電腦程式產品,其中,該 谷:子模型係包括至少二數位權利管理協定。 81 ·如申凊專利範圍第7 5項所述之電腦程式產品,其中至 =::容儲存模型係_專有及一第三者數位權利管理協定 ΐ.置'係種包對括'儲存媒體上安全資料進行解除鎖定之裝置,該 裝置,用以與一主機建立一安全對話;Clang 1 further includes: an instruction for decrypting the command for unlocking the security data. The computer program product described in item 75 of the H claim range, wherein the valley: submodel includes at least two digital rights management agreements. 81 · The computer program product described in item 75 of the scope of the patent application, where to = :: capacity storage model is _proprietary and a third party digital rights management agreement. A device for unlocking security data on a medium, the device being used to establish a secure conversation with a host; i: ’二接收乂經由一通信通道,對該保全資料進行解除 鎖疋動作之一命今盆由姑瓜入— 于 模型進行管理;:,及貧料係由至少-内容館存 ΐ ϊ ’二二對儲存媒體上該保全資料進行解除鎖定動作 ,、中’該中令係回應於該媒體上之—識別碼,該識別碼係架 II 第258頁 583568i: 'One of the two receivers, through one communication channel, performs one of the unlocking actions on the security data. The basin is managed by the model —: and the poor materials are stored by at least the content library. ϊ' 22 The unlocking of the security data on the storage medium was performed, and the 'the order was in response to the identification code on the medium, the identification code is frame II page 258 583568 六、申請專利範圍 ::以::該保全資料之存取動作,且至少一内容 係一女全内容管理裝置。 hi 83種鑑別一裝置之方法,該方法係包括: 由該裝置接收-憑證,該憑證係包括複數攔位,其 位以持有一憑證管理中心之一數位簽章; 索 確^ A心也中之该專數位簽章,該確認動作係至少包括: 利用孩憑證管理中心之公開金鑰以確認該憑證 數位簽章;以及 Y 之 利用一裝置之公開金鑰以確認一裝置之數位簽章;6. Scope of patent application :::: The access action of the security data, and at least one content is a female full content management device. hi 83 methods of identifying a device, the method includes: receiving by the device-a voucher, the voucher includes a plurality of stops, which are digitally signed by one of the certificate management centers; In the special digital signature, the confirmation action includes at least: using the public key of the child certificate management center to confirm the digital signature of the certificate; and Y using the public key of a device to confirm the digital signature of a device. ; 由^來源接收認證資料,該認證資料係根據預定條件以識 別該憑證中之至少一資料為有效或無效的;以及 w 若該等數位簽章確認為有效的,則傳輸一對話金鑰至該袭 置,藉以建立一安全通信通道。 、 8 4 ·如申請專利範圍第8 3項所述之方法,其中,該來源係一 可攜式媒體及勃體之一者。Receiving authentication information from a source, the authentication information identifying at least one piece of information in the certificate as valid or invalid according to predetermined conditions; and w if the digital signatures are confirmed to be valid, transmitting a conversation key to the Attack to establish a secure communication channel. 8 4 · The method according to item 83 of the scope of patent application, wherein the source is one of a portable media and a body. 8 5 ·如申請專利範圍第8 3項所述之方法,其中,該裝置係一 引擎、内嵌一引擎之一裝置、,第三者數位權利管理協 定、一開放計算環境中執行之/應用程式、及一情報交換 所伺服器之一者,該憑證係用以識別至少一安全應用程式 界面(AP I ),藉此,可利用該装置以進行操作之一應用程 式係可以進行存取動作。 86·如申請專利範圍第83項所述之方法,其中,該憑證係由 根據一裝置類別指派之一私密金輪進行數位簽章,該裝置 類別係包括··引擎、内嵌〆弓丨擎,不具外部數位I /〇埠之8 5 · The method described in item 83 of the scope of patent application, wherein the device is an engine, a device embedded with an engine, a third party digital rights management agreement, and an application / application executed in an open computing environment One of a program and a clearing-house server, the certificate is used to identify at least one secure application program interface (AP I), whereby one device can be accessed by using the device for operation . 86. The method according to item 83 of the scope of patent application, wherein the certificate is digitally signed by a private golden wheel assigned according to a device category, which includes: an engine, an embedded bow, Without external digital I / 〇 port 583568 六、申請專利範圍 裝置、内嵌一引擎、具有ί/O埠之裝置、未内嵌一引擎之 裝置應用程式、第三者數位權利管理協定、及情報交換所 伺服器。 87·如申請專利範圍第83項所述之方法,其中,該裝置之憑 證動作係包括:憑證連接一主機於第二主機安全'"通信通道 之一第二主機,該憑證動作係同意該主機及該第二主機間 之一複製函數。 88·如申請專利範圍第83項所述之方法,其中 ^資料係用來指定該裝置之一產品類別、_’產品一模 型、一修訂、一序號之至少一者。 次%^ /申明專利範圍第8 8項所述之方法’其中,該來源認證 斗係與該憑證中之該資料比較,藉以將該裝置之該產品 j別、該產品線、該模型、該修訂、及該序號之至一 識別為無效的。 如申請專利範圍第83項所述之方法,其中,該憑證係包 、一憑證管理中心識別碼攔位、一版本攔位、一簽章金鑛 馬攔位、一曝露方法攔位、一公司攔位、一模型識別 簽j位、一修訂欄位、一元資料識別碼攔位、一裝置數位 仇早金鑰欄位、一憑證管理中心數位簽章欄位、一序號搁 〜,一協定公開金鑰攔位、及一裝置數位簽章欄位之至少 少〜,其中,該憑證管理中心數位簽章係確認該憑證中之至 ^〜攔位,且該裝置數位簽章係確認該憑證中之至少一搁 如申請專利範圍第83項所述之方法,其中,該憑證管理 583568 六、申請專利範圍 中心係讓一實體接收該憑證,旅透過無效錯誤或具有潛在 缺陷的裝置,藉以控制該裝置之品質。 9 2 ·如申請專利範圍第8 8項所述之方法,其中,該憑證更包 ,一裝置製造商提供之攔位,包括該公司公開金鑰,其中, ^公司公開金鑰係由該憑證管理中心數位簽章。 =·如申請專利範圍第88項所述之方法,其中,該憑證更包 修—裝置製造商提供之攔位,該等攔位包括該裝置公開金 9阳,其中,该裝置公開金錄係由該公司數位簽章。 =·如申請專利範圍第88項所述之方法,其中,該裝置之該 一 ^類別、該產品線、該模塑、該修訂、及該序號之至; 置。係,在該裝置傳送一認證程序後,提供給一憑證產生^ 9^·如申請專利範圍第83項所述之方法,其中,該憑證 ^ =少一憑證類別,該等憑證類別係提供一組方=°复可θ 在傳輪該對話金鍮後加以揭露。 方法’其可以 •如申請專利範圍第95項所述之方法 二括數位權利管理(刚)方法,其包括二:,二方法係 ,元資料方法、及—解除鎖定方法: = 寫入安 利管理⑽)方法係可根據該裝置,一類者型 97如申請專利範圍第96項所述之方法i 該=3::;!、關連於一情報交換所飼服器; 1方法係關連於L及可利用—第二數位 第26〗頁 583568583568 6. Scope of patent application Device, an engine embedded, a device with ί / O port, a device application without an engine embedded, a third party digital rights management agreement, and a clearinghouse server. 87. The method according to item 83 of the scope of application for a patent, wherein the certificate action of the device includes: a certificate connects a host to a second host in the second host secure '" communication channel, and the certificate action agrees to the A copy function between the host and the second host. 88. The method according to item 83 of the scope of patent application, wherein the ^ data is used to specify at least one of a product category of the device, a product model, a revision, and a serial number. % ^ / Declaration of the method described in item 88 of the patent scope 'wherein, the source authentication bucket is compared with the information in the voucher, whereby the device's product category, the product line, the model, the The amendment and the identification of one of the serial numbers are invalid. The method according to item 83 of the scope of patent application, wherein the voucher is a package, a voucher management center identification code stop, a version stop, a signature gold mine horse stop, an exposure method stop, a company Block, a model identification j bit, a revised field, a meta data ID block, a device digital early key field, a certificate management center digital signature field, a serial number ~~, an agreement is disclosed The key block and at least one of the digital signature fields of a device ~, wherein the digital signature of the certificate management center confirms the ^ ~ block in the certificate, and the digital signature of the device confirms the certificate At least one of the methods described in item 83 of the scope of patent application, wherein the certificate management 583568 6. The center of patent application scope allows an entity to receive the certificate, and the brigade controls the device through invalid errors or devices with potential defects. Device quality. 9 2 · The method according to item 88 of the scope of patent application, wherein the certificate is more packaged, and the stop provided by a device manufacturer includes the company's public key, where ^ the company's public key is the certificate Digital signature of management center. = · The method as described in item 88 of the scope of patent application, wherein the voucher is more repairable—the device manufacturer provided a stop, such stops include the device open gold 9 Yang, of which the device open gold record system Digitally signed by the company. = · The method as described in item 88 of the scope of patent application, wherein the ^ category, the product line, the molding, the amendment, and the serial number of the device are set; After the device transmits an authentication procedure, it provides a certificate to generate ^ 9 ^ · The method described in item 83 of the scope of patent application, wherein the certificate ^ = one less certificate type, and these certificate types provide a Organizing party = ° complex can θ revealed after passing the dialogue gold. Method 'It can • The method described in item 95 of the scope of patent application includes digital rights management (rigid) method, which includes two methods: two methods, metadata methods, and-unlock method: = write to Amway Management ⑽) The method can be based on the device, a type 97 method as described in item 96 of the scope of patent application i this = 3 ::;!, Related to a feeder of a clearing house; 1 method related to L and Available-Second Digit Page 26〗 583568 理(DRM )應用程式以進行操作之一第一數位權利管理 (DRM)應用程式之一者;以及 ,記錄方法係關連於一播放器、一原版影片製作工具、-貝訊站、及一情報交換所伺服器之至少一者。 98·如申請專利範圍第83項所述之方法,其中,各個攔位 持有163位元橢圓曲線加密之326位元數位。 ’、 99·如申請專利範圍第83項所述之方法,其中,該憑證其 中心公開金鑰係參照該憑證之一攔位。 兄吕 100·如申請專利範圍第83項所述之方法,其中 中心公開金鑰係位於該韌體元件。 该憑證管理 101· —種憑證一裝置之裝置,該裝置包括: 包括複 至少包 裝置,其係由該裝置接收一憑證要求,該憑證要 數欄位,包括持有一協定公開金鑰之一攔位; π 裝置,用以確認該憑證中之數位簽章,該確認動作係 利用該憑證管理 簽章;以及 中Q Α開金錄以確認該憑證管理中心數位 利用該憑證中之一裝置公開金鑰以確認 裝置,其係由一來源接收認批次 I位簽早; 條件以識別該憑證中之至;:一資料:::二:係根據預定 裝置,其係傳輸一對話金鑰至該〜枓為的;以及 通道,當該等數位簽章係確認為有 的。 安全通信 102· —種引擎,其架構以馮供:又的 ^ 一韌體元件,包括: 心a 機,該引擎係包括·· ^3568 六、申請專利範圍 二方塊,其架構以由該主機接收一憑證,該憑證係包括 攔位,包括持有一協定公開金鑰之一攔位; :=塊’其係架構以確認該憑證中之至少一數位簽章,其 ^包括: 、 =用-憑證管理中心公開金鑰之一憑證管理中心數位 早;以及 H'中一裝置公開金餘之一裝置數位簽章,·以及 奸姑塊,其係架構以由一來源接收認證資料,該認證資料係 ^據預定條件以識別該憑證中之至少料為有效或無= 的,以及One of the first digital rights management (DRM) applications; and the recording method is related to a player, an original video production tool, Bexun Station, and an intelligence At least one of the clearinghouse servers. 98. The method according to item 83 of the scope of patent application, wherein each block holds 326 bits of 163-bit elliptic curve encryption. ', 99. The method according to item 83 of the scope of patent application, wherein the central public key of the certificate refers to one of the certificates. Brother Lu 100. The method as described in claim 83, wherein the central public key system is located on the firmware element. The certificate management 101 · is a device of a certificate and a device. The device includes: a device including at least a package, which receives a certificate request from the device, and the certificate requires a number of fields, including one of holding an agreement public key Stop; π device for confirming the digital signature in the certificate, the confirmation action is to use the certificate to manage the signature; and Q Q A gold record to confirm that the certificate management center digitally uses one of the devices in the certificate to make it public The key is used to confirm the device, which is received by a source to confirm the batch of I digits; the condition is to identify the arrival of the certificate ;: a data ::: two: according to the predetermined device, it is a transmission key to This ~ 枓 is; and the passage, when the digital signatures are confirmed to be there. Secure communication 102 · — an engine with a structure of Feng 供: another ^ a firmware component, including: heart a machine, the engine includes ... ^ 3568 6, the scope of the patent application, the structure of the host by the host Receive a certificate, which includes a block, including a block holding an agreement public key;: = block 'which is structured to confirm at least one digital signature in the certificate, which includes:, = -One of the certificate management center's public keys, the certificate management center is digitally early; and one of the device's public funds, one of the remaining digital signatures, and a gang block, which is structured to receive authentication data from a source, the certificate The information is based on predetermined conditions to identify that at least one of the vouchers is valid or not =, and 一方塊,其係架構以傳輸一對話金鑰至該裝置,藉以建立一 安全通信通道,#該等數位簽章係相為有效:。建 10 3. —種電腦程式產品,該電腦程式產品係包括: 承載數位資訊之信號承载媒體,其持有一韌體元件,該韌體 元件係包括: 一方塊,其係架構以由該裝置接收一憑證,該憑證係包括複 數欄位,包括持有一協定公開金錄之一攔位; 一方塊,其係架構以確認該憑證中之數位簽章,其至少包 括: Φ 利用該憑證管理中心公開金鑰之一憑證管理中心數位簽 章;以及 利用δ玄憑證中一裝置公開金餘之一裝置數位簽章;以及 一方塊,其係架構以由來源接收認證資料,該認證資料係 根據預定條件以識別該憑證中之至少一資料為有效或無效A block, which is structured to transmit a conversation key to the device, thereby establishing a secure communication channel. # These digital signatures are valid :. Build 10 3. — A computer program product, the computer program product includes: a signal bearing medium carrying digital information, which holds a firmware component, the firmware component includes: a block, which is structured by the device Receive a voucher, which includes a plurality of fields, including a block holding an agreed public record; a box, which is structured to confirm the digital signature in the voucher, which includes at least: Φ management using the voucher A digital signature of the certificate management center, one of the public keys of the center; and a digital signature of the remaining one of the devices, using a device in the delta certificate; and a box, which is structured to receive authentication data from a source, which is based on Predetermined conditions to identify at least one piece of information in the voucher as valid or invalid 583568583568 的;以及 一方塊,其係架構以傳一 二通=,當該等數位❺ 該憑♦項:述之電腦程式產品,其中, in, ^ ^ τ A開金錄係參照該憑證之一欄位。 該憑項所述之電腦程式產品,其中, 甲 A開金鑰係位於該韌體元件。 # 二一種廢止一裝置之方法,該方法係包括: γ裝置接收一憑證,該憑證係包括至少一 至少一攔位持有一簽章; 嘗試確認該簽章; ^來源接收-廢止表列,該廢止表列係 至二-貢料為有效或無效的,該資料係包括該憑 J 一攔位;以及 〜&少 一資料係確 該對話金鑰And a block, which is structured to pass one or two links =, when the numbers ❺ should be based on the item ♦: the computer program product described above, where in, ^ ^ τ A refers to a column of the certificate Bit. The computer program product described in the item, wherein the A-A key is located in the firmware component. # Two. A method for revoking a device, the method includes: γ device receives a voucher, the voucher includes at least one stop holding at least one signature; trying to confirm the signature; ^ source receiving-revocation list , The revocation list is valid until the two-tribute material is valid, and the data includes the first stop; and the lesser one is the key to confirm the conversation. f至少一簽章中有一簽章無法成功識別且至少 <為無效的,則避免傳輸一對話金鑰至該裝置, 係建立一安全通信通道所必須。 , 之方法,其中,該廢止表 之方法,其中,該廢止表 1 0 7 ·如申請專利範圍第1 〇 6項所述 列係在檔案存取時加以評量。 1 〇 8 ·如申請專利範圍第丨〇 7項所述 列係在檔案產生時加以儲存。 109·如申請專利範圍第1〇6項所述之方法,其中,各個禾 係具有一廢止表列,並且,具有複數廢止表列之複1 具有重覆項目。 ^f At least one of the signatures cannot be successfully identified and at least < is invalid, avoid transmitting a session key to the device, which is necessary to establish a secure communication channel. The method of the abolition table, wherein the abolition table is 107. As described in item 106 of the scope of patent application, the list is evaluated during file access. 108. The rows as described in item 7 of the scope of patent application are stored when the file is created. 109. The method as described in item 106 of the scope of patent application, wherein each of the grasses has a revocation list and the repetition list having a plurality of revocation lists has duplicate items. ^ 11屯如申請專利範圍第106項所述之方法,其中,該廢止表 列係伴隨該檔案以儲存於媒體。 11 5 ·如申請專利範圍第丨〇 6項所述之方法,其中,該廢止表 列係複製至各個裝置。The method according to item 106 of the scope of patent application, wherein the revocation list is accompanied by the file for storage in the media. 11 5 · The method according to item 6 of the patent application scope, wherein the revocation list is copied to each device. 11 如申請專利範圍第1 0 6項所述之方法,其中,該廢止表 列係^ 一飼服器維護,藉以使與〆伺服器進行通信之内容 表現裝置能夠接收直接傳送至該裝置之更新廢止表列。 117·如申請專利範圍第1〇6項所述之方法,其中,複數廢止 表列係基於逐一檔案以儲存於媒體上,藉以使該媒體上之11 The method as described in item 106 of the scope of patent application, wherein the revocation list is ^ a feeder maintenance so that the content presentation device that communicates with the server can receive updates directly transmitted to the device Repeal of listing. 117. The method according to item 10 of the scope of patent application, wherein the plurality of revocation lists are based on one-by-one files to be stored on the medium, so that the 583568 申請專利範圍 至少一槽案能夠具有與該槽案關連之一廢止表列。 11 8 ·如申請專利範圍第1丨7頊所述之方法,其中,該廢止表 列係在一檔案存取程序、以及/鑑別及一檔案存取程序之 一組合期間進行存取動作。 11 9 ·如申請專利範圍第丨〇 6項所述之方法,其中,該廢止表 列係包括一毒藥以避免一内容表現裝置進行操作。 120·如申請專利範圍第106項所述之方法,其中,該廢止表 列係在該内容表現裝置連接至一彳司服器時進行更新。 1 21 ·如申請專利範圍第丨〇 6項所述之方法,其中,一内容表583568 Scope of patent application At least one case can have an abolition list associated with that case. 11 8 · The method as described in Patent Application Scope Nos. 1 to 7), wherein the revocation list is an access operation performed during a combination of a file access procedure and / or authentication and a file access procedure. 119. The method as described in claim 6 in the patent application scope, wherein the revocation list includes a poison to prevent a content presentation device from operating. 120. The method of claim 106, wherein the revocation list is updated when the content presentation device is connected to a server. 1 21 · The method according to item 6 of the patent application scope, wherein a content table 現裝置之廢止動作係至少包括:至少一公開金錄之廢止動 作,其中,一公開金餘之廢止動作係廢止任何對應之簽章。 1 2 2 ·如申請專利範圍第1 0 6項所述之方法,其中,該廢止表 列係利用一獨特處置以維護成該媒體上該檔案系統内之一 物件。 123·如申請專利範圍第106項所述之方法,其中,該廢止資 訊係集中放置。 、 124·如申請專利範圍第106項所述之方法,其中,該來源係 一可攜式媒體及韌體之一者。 、 125·如申請專利範圍第1〇6項所述之方法,其中,與憑證及The revocation action of the current device includes at least: the revocation action of at least one public gold record, of which the revocation action of one public gold repeal is the revocation of any corresponding signature. 1 2 2 The method as described in item 106 of the scope of patent application, wherein the revocation list uses a unique disposal to maintain an object in the file system on the medium. 123. The method according to item 106 of the scope of patent application, wherein the abolition information is centralized. 124. The method according to item 106 of the scope of patent application, wherein the source is one of portable media and firmware. 125. The method as described in item 106 of the scope of patent application, wherein /或公開金鑰是否已經廢止相關之該資訊係戳印於該媒 體。 ’、 126·如申請專利範圍第1〇6項所述之方法,其中,該裝置係 一引擎、内嵌一引擎之一元件、一第三者數位權利管理協 定、一開放計算環境中執行之一應用程式、及一情報交換Whether the relevant information has been revoked by the public key is stamped on the media. ', 126. The method as described in item 106 of the scope of patent application, wherein the device is an engine, an element embedded in an engine, a third-party digital rights management agreement, and an open computing environment. An application and an exchange of information 第266頁 六、申請專利範圍 斤伺服器之 4API),藉 i以進行存 127 , •如申請 才艮據〜裝置 包括:引擎 内嵌〜擎且 :應用裎式 後如申請 ;讀:料係129 4 Ϊ訂次•如申請 貝料係與該 ΐ別、該產 广別為無效 3〇.如申請 ^括下列攔 馬、版本、 輪識別碼、 識別碼、主 協定金鑰、 一者,該憑證係識別至少一安全應用程式界面 此,可利用該裝置以進行操作之一應用程式係 取動作。 專利範圍第1 06項所述之方法,其中,該憑證係 類別指派之一私密金錄以簽章,該裝置類別係 、内嵌一引擎且沒有外部數位I /〇埠之元件、 具有數位I /〇埠之元件、及未内喪一引擎之主 專利範 指定該 、及一 專利範 憑證中 品線、 的。 專利範 位之至 憑證管 曝露方 機簽章 及主機 圍第106項所述之方法,其中,該憑證中 裝置之一產品類別、一產品線 模 該憑證中之至少 至少一搁位。 1 3 1 ·如申請 序號之至少一者 圍第128項所述之方法,其中,來源認證 之該資料比較,藉以將該裝置之該產品 該模型、該修訂、及該序號之至少一者 圍第129項所述之方法,其中,該憑證係 少一者,其包括:憑證管理中心識別 理中心公開金鑰、憑證管理中心公開金 法、公司、模型識別碼、修訂、元資料 公開金鑰、憑證管理中心簽章、序號、 簽章,其中,該憑證管理中心簽章係確認 欄位,且該主機簽章係確認該憑證中之 專利範圍第106項所述之方法,其中,該憑證係Page 266 VI. Application scope of patents (4API of the server), to save 127 by i. • If the application is based on the device ~ the device includes: engine embedded ~ engine and: after applying the application mode, such as the application; read: material system 129 4 Orders • If the application is related to this category, the property category is invalid. 30. If the application includes the following block, version, wheel identification code, identification code, master agreement key, one, The certificate identifies at least one secure application program interface, and one of the application program operations can be performed by using the device. The method described in item 106 of the patent scope, wherein the certificate is a private gold record assigned by the category for signature, the device category is a component with an embedded engine and no external digital I / 0 port, and a digital I The components of the / 0 port, and the main patent model that does not contain an engine designate this, and a patent model certificate in the product line,. From the patent scope to the certificate management, the method described in item 106 of the machine signature and host, wherein at least one product category of a device and a product line module of the certificate are placed in the certificate. 1 3 1 · The method according to item 128 of at least one of the application serial number, wherein the information of the source certification is compared to thereby at least one of the product, the model, the revision, and the serial number of the device. The method according to item 129, wherein the voucher is one of the less, and includes: the voucher management center identification key public key, the voucher management center public key method, company, model identification code, revision, metadata public key , Certificate management center signature, serial number, signature, of which the certificate management center signature is the confirmation field, and the host signature is the method described in item 106 of the patent scope in the certificate, where the certificate system 第267頁 ^3568 六 '申請專利範圍 - " 只體月匕夠接收該憑證,並葬装么 . 陷之ρg者無效錯誤或具有、、既力处 衣置以控制該裝置之品質。 日在缺 L如申請專利範圍第13〇項所述之 中:裝置製造商提供之欄位,包括該裝 金:'更 13, Μ衣置公開金鑰係由一私密金鑰簽章。 '’鑰,- *如申請專利範圍第丨3〇項所 该產品_如分* ^ ^ ^万汝,其中,該主機之 少-者係/、:產品線、該模型、該修訂、及該序號之至 裂置。係,在該主機傳送—認證程序後,傳送至—憑證產生 1 3 4P.267 ^ 3568 VI 'Scope of patent application-" Is the dagger full enough to receive the voucher and bury it? Whoever trapped ρg is invalid or has clothes that control the quality of the device. The missing part is as described in item 130 of the scope of patent application: the field provided by the device manufacturer, including the installation: 'More 13, the public key of the clothing is signed by a private key. '' Key,-* If the product in the scope of the patent application No. 丨 30 _ this product _ such as points * ^ ^ ^ Wan Ru, of which, the host is small-those are / /: product line, the model, the amendment, and The serial number is split. System, after the host transmits the —authentication procedure, to —the certificate is generated 1 3 4 指C!!i圍第106項所述之方法,其中,該憑證係 c輪該對話金鑰後加以揭露。 方法,其可 ,申請專利範圍第丨%項所述之方 係包括數位權利管,,、干…亥組方法 方法寫入安全元資料、及解除鎖定,且該等 1 3 β 了根據該裝置之一類型以進行操作。 該解::利範圍第13 5項所述,方法,其中, 古亥、I制、疋方法係關連於一情報父換所伺服器;Refers to the method described in item 106 of C !! i, wherein the certificate is disclosed after c round of the conversation key. Method, which can be, the method described in the patent application scope item 丨% includes digital rights management, method, method of writing security metadata, and unlocking, and the 1 3 β according to the device One of the types to operate. The solution: the method described in item 135 of the scope of interest, in which the ancient sea, I system, and method are related to an information exchange server; 理(c係關連於-引擎、及可利用-第二數位權利管 (DRM、 應用程式以進行操作之一第—數位權利管理 )應用程式之一者;以及 ΐ ^入方法係關連於一播放器、一原版影片製作工具、一 7°站、及一情報交換所伺服器之至少一者。 •如申請專利範圍第1〇6項所述之方法,其中,各個欄位Management (c is related to-the engine and one of the second digital rights management (DRM, application to operate-first digital rights management) applications; and ΐ 程式 入 方法 related to a playback At least one of a video camera, an original video production tool, a 7 ° station, and a clearinghouse server. • The method as described in item 106 of the scope of patent application, wherein each field 583568583568 六、申請專利範圍 係持有1 6 3位元橢圓曲線加密之3 2 6位元數值。 138· —種廢止一主機之裝置,該裝置係包括: 裝置,其係由一主機接收一憑證,該憑證係包括複數攔位, 包括持有一憑證管理中心簽章之一協定公開金錄之一攔 位; 裝置,用以確認該憑證上之簽章,該確認動作係包括: 利用該協定公開金鑰以確認該憑證管理中心簽章;以及 利用該憑證上之一主機公開金鑰以確認一主機簽章;6. Scope of patent application: It is a 32-bit value of 16-bit elliptic curve encryption. 138 · — A device for abolishing a host, the device includes: a device that receives a certificate by a host, the certificate includes a plurality of stops, including a publicly recorded record of an agreement signed by a certificate management center A block; a device for confirming the signature on the certificate, the confirmation action includes: using the agreement public key to confirm the certificate management center signature; and using a host public key on the certificate to confirm A host signature; 裝置,其係由一來源接收認證資料,該認證資料係根據一廢 止表列以識別該憑證上之至少一^資料為有效或無效的;以 及 裝置,其係避免傳輸一對話金鑰至該主機以建立一安全通 信通道,若該等簽章係無效的。 1 3 9 · —種引擎,其係架構以廢止一主機,該引擎係包括: 一方塊,其係架構以由一主機接收一憑證,該憑證係包括複 數欄位,包括持有一憑證管理中心簽章之一協定公開金錄 之一棚位; 一方塊,其係架構以確認該憑證上之簽章,該確認動作係包 括··A device that receives authentication data from a source that recognizes at least one of the data on the certificate as valid or invalid according to a revocation list; and a device that avoids transmitting a session key to the host In order to establish a secure communication channel, if the signatures are invalid. 1 3 9 · An engine that is structured to abolish a host. The engine includes: A block that is structured to receive a certificate from a host. The certificate includes multiple fields, including holding a certificate management center. One of the signatures is one of the sheds of the public gold record; a box that is structured to confirm the signature on the voucher, and the confirmation action includes ... 利用該協定公開金鑰以確認該憑證管理中心簽章;以及 利用該憑證上之一主機公開金鑰以確認一主機簽章; 一方塊,其係架構以由一來源接收認證資料,該認證資料係 根據一廢止表列以識別該憑證上之至少一資料為有效或無 效的;以及Using the public key of the agreement to confirm the signature of the certificate management center; and using a public key of the host on the certificate to confirm a signature of the host; a block that is structured to receive authentication information from a source, the authentication information Based on a revocation list to identify at least one piece of information on the voucher as valid or invalid; and 第269頁 583568Page 269 583568 六、申請專利範圍 一方塊,其係架構以避免傳輸一對話金鑰至該主機以 一安全通信通道,若該等簽章係無效的。 建立 WO· —種電腦程式產品,該電腦程式產品係包括: 承載數位資訊之信號承載媒體,其可利用一動體以 作,該數位資訊係包括程式,其包括: — 行操 方塊,其係架構以由一主機接收一憑證,該憑證係勺 數攔位,包括持有一憑證管理中心簽章之一協匕括複 之一攔位; 疋a開金輪 之簽章,該確認動作係勺 一方塊,其係架構以確認該憑證上 括: 利用該協定公開金鑰以確認該憑證管理中心立、 =用该憑證上之一主機公開金鑰以確認一主機簽章^ 係主架構Λ由一來源接收認證資料,該認證資料々 效的;以及 貝枓為有效或為 方塊,其係架構以避免傳 ^ JuL 1安全通信通道,若該等簽章係無效的。 蔣1向二種巧全媒體上儲存資料之方法,該方法包括: 之存取動作;以及 %係管理複數等級 體以根據該等内容特權及預定條件同意該内容之 ^等第141項所述之方法,其中,該内容之 $寻?及之存取動作之_ 5 至夕包括播放、複製、及處理該6. Scope of patent application A block, which is structured to avoid transmitting a conversation key to the host computer through a secure communication channel if the signatures are invalid. Create WO · — a kind of computer program product, the computer program product includes: a signal bearing medium carrying digital information, which can be used as a moving body, the digital information includes a program, which includes: — an operation block, which is structured A host receives a voucher, and the voucher is a number of stops, including holding a voucher of a voucher management center signature; 疋 aThe signature of a gold wheel, the confirmation action is a scoop. A block which is used to confirm the certificate includes: using the public key of the agreement to confirm the certificate management center, = using a public key of the host on the certificate to confirm a host signature ^ The source receives the authentication information, which is not valid; and the frame is valid or block, and the system is structured to avoid transmission of the JuL 1 secure communication channel if the signatures are invalid. Jiang 1 stores data on two types of smart media, including: access operations; and% is the management of plural levels to agree to the content according to the privileges and predetermined conditions of the content described in item 141, etc. The method, where is the content of $ Find? And access actions of _ 5 to evening include playing, copying, and processing the 第270頁 583568 六、申請專利範圍 内容之一者。 143·如申請專利範圍第142項所述之方法, ^ =包括複製一有限數目、或一無限數目之、員定;f製 円谷複製。 1曰請專利範圍第143項所述之方法,其中,該無限數 目之複衣係有關於該内容之一原始來源複製、 原始來源複製之一複製。 145·如申請專利範圍第141項所述之方法 條件係至少包括: ,/、甲,4寺預疋 鑑別一通道以進行該内容之傳送;以及 :ί :ΐΐ表二以’在同意存取前,得到一廢止指標,其中 該尾止h ^之存在係用來排除允許存取。 , 1^6如申睛專利範圍第141項所述之方法, 係可利用-資料管理系統以進行操作:其ΐ附: 谷係儲存於該媒體上該管理; 八,該内 作。 版上,3 &理糸統係官理戎内容之存取動 -^ ^ 控制态中之韌體,該韌體係至少' , 匕全中應用程式界面(API)及一開放應用程式心 用程式界面(API) 統賁料進行存取動作;以及 < 插案系 =全應用又式界面(AP"係根據該媒體上之至少一 ',精以同思對该媒體上之保全資料進行存取動作。識 583568 六、申請專利範圍 明專利範圍第147項所述之方法,其中,該安全應 王工丨、面(ΑΡί )係包括一第一安全應用程式界面(API ^至乂 一額外安全應用程式界面(API ),該第一安全應 】t H面、(AP 1)係可利用至少一該額外安全應用程式 ^ 以進行操作,該至少一額外安全應用程式界面 係提供外加保全層,該第一安全應用程式界面 API )係利用該等外加保全層以控制該内容之存取動 作。 1勺範圍第147項所述之方法,,中,該章刃體係 匕括在特殊應用積體電路(ASIC)中。 150:如申請專利範圍第146項所述之方法,其中,該資 理糸統係經由至少一應用程式界面(Αρι )以管理内容 = 程式界面UPI)係利用—主機以限制㈣ 151.如申請專利範圍第15〇項所述之方法,其中誃 式界面(AP I )係能夠避免該内容之方塊等級存^ 了壬 152·如申請專利範圍第15〇項所述之方法,其子 式界面(AP I )係僅能夠經由一鑑別通道以進二=w用程 作。 延仃存取動 153·如申請專利範圍第14ι項所述之方法 一可攜式媒體,包括一光學碟片,且該内容;j系勺,以媒體係 製㈣容、記錄…複製内容、解除鎖定:;容原 定内容之至少一者。 合及解除 154·如申請專利範圍第147項所述之方法复 ’,、丫,涊識別m 583568 六、申請專利範圍 係提供一金 盒子之一種子,該金餘盒子係提供解除鎖定 内容及解密内容之至少一者之金餘。 155·如申請專利範圍第154項所述之方法,其中,該媒體係 持有原版影片製作内容及記錄内容之至少一者,該原版影 片製作内容及該記錄内容分別關連於一金鑰盒子,且該金 錄盒子係連結於該媒體。 156.如申請專利範圍第155項所述之方法,其中,該原版影 片製作内容及該記錄内容,伴隨其關連金鑰盒子,係分別提 供一完整存取系統。 15 7·如申請專利範圍第155項所述之方法,其中,該金输盒 子可以與一第一媒體解除連結、並重新連結至一第二媒 體,藉以在該苐二媒體上產生一完整存取系統,其同.鱼' 以該金鑰盒子。 158· —種保全媒體上儲存内容之裝置,該裝置包括: ^少二工具,用以傳輸内容至該媒體,該工具係架構以附 複數等級之存取動作,其中,内容特權及預定條件係理 内容之存取動作。 μ s该 1 5 9 ·如申請專利範園第1 5 8項所述之裝置,更包括: 一密碼鎖,其耦接至該工具,該密碼鎖係架構以將一金 子連結至該媒體。 ’ ” ^孟 160·如申請專利範圍第159項所述之裝置,更包括: :特殊應用積體電路(ASIC ),其耦接至該密碼鎖;以及 I隨機金鑰產生器,其内嵌以該特殊應用積體電路(MW ,忒隨機金鑰產生器係至少提供該媒體之一秘密金輸。 583568 六、申請專利範圍 162^巾請專利範圍第161二述處之理心G -内者容複製 包括"复製-限定數目之特定内容複製。 :件範圍第158項所述之裝置,其中,該等預定 進行該内容之傳送動作;以及 松·一 廢止表列以 >ά· Γ51音:vc, 皮中^ t ^ ,,在门心存取動作前,取得一廢土扣柄, ^^曰不之存在係用來排除允許存取動作。 利範圍第158項所述之裝置,#中,㉟等附加 利用一資料管理裂置以進行操作,其中,該内 貝料儲存於該媒體上,該管理系統係經由該特 殊=積體電路(ASIC)上之物體以管理該方塊資料,藉 以避免該韌體外之内容存取動作。 165·如申請專利範圍第164項所述之裝置,其中,該特殊應 用積體電路(ASIC )係放置於一控制器中,該特殊應用積 體電路(ASIC)上之該韌體係至少包括一安全應用程式界 面(API )及一開放應用程式界面(Αρι ),其中: 該開放應用程式界面(API )係同意該媒體上檔案系統資 料之存取動作;以及 j文全應用程式界面(AP丨)係根據該媒體上之至少一識 j 6螞,藉以同意該媒體上保全資料之存取動作。 6·如申請專利範圍第165項所述之裝置,其中,該安全應 程式界面(API )係包括一第一安全應用程式界面(APIPage 270 583568 6. One of the contents of patent application scope. 143. The method as described in item 142 of the scope of patent application, where ^ = includes copying a limited number, or an unlimited number of members; f system Kariya copying. The method described in item 143 of the patent scope is that the unlimited number of coats is one of the original source copy of the content and one of the original source copy. 145. The method conditions described in item 141 of the scope of application for patents include at least: ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, 4.The temple pre-identified a channel to transmit the content; and Previously, an abolition index was obtained, where the existence of the tail end h ^ was used to exclude access allowed. The method described in item 141 of Shenjing's patent scope can be operated by using a data management system: its attachments: Valley system is stored on the media for management; eight is for internal operation. On the version, 3 & management system officials Li Rong content access-^ ^ control state of the firmware, the firmware at least ', application program interface (API) and an open application heart program Interface (API) system to perform access operations; and < Insertion system = full application and interface (AP " is based on at least one of the media's, to save the security information on the media with the same thinking Take action. Recognize 583568 6. The scope of patent application is the method described in item 147 of the patent scope, in which the security response Wang Gong, and the surface (ΑΡί) include a first security application program interface (API ^ to one additional A security application programming interface (API), the first security application], t H plane, (AP 1) can be operated by using at least one additional security application ^, the at least one additional security application programming interface provides an additional security layer The first security application programming interface API) uses the additional security layer to control the access action of the content. The method described in item 147 of the scope, in which the chapter blade system is included in the special application product Body Circuit (A SIC) 150: The method described in item 146 of the scope of patent application, wherein the asset management system uses at least one application program interface (Αρι) to manage content = program interface UPI) is used-host to limit 151. The method described in item 15 of the scope of patent application, wherein the 誃 -style interface (AP I) is able to avoid the block level of the content being stored ^ 152. The method described in item 15 of the scope of patent application, Its sub-interface (AP I) is only capable of performing two = w operations through an authentication channel. Extending access 153. The method described in item 14 of the scope of the patent application-a portable medium, including an optical disc, and the content; j is a spoon-based system that uses the media system to make content, record ... copy content, Unlock: at least one of the original contents. Closing and releasing 154 · The method described in item 147 of the scope of the patent application is replied to "5,568". 6. The scope of the patent application is to provide a seed of a golden box, which provides unlocked content and The balance of at least one of the decrypted content. 155. The method according to item 154 of the scope of patent application, wherein the media holds at least one of the original movie production content and the recorded content, and the original movie production content and the recorded content are respectively related to a key box, And the golden record box is linked to the media. 156. The method according to item 155 of the scope of patent application, wherein the original video production content and the recorded content, along with its associated key box, each provide a complete access system. 15 7. The method according to item 155 of the scope of patent application, wherein the gold loss box can be unlinked from a first medium and reconnected to a second medium to generate a complete deposit on the second medium. Take the system, it's the same as the 'fish' to the key box. 158 · —A device for storing content on a secure medium, the device includes: ^ two tools for transmitting content to the medium, the tool is structured with multiple levels of access actions, wherein the content privileges and predetermined conditions are Manage content access actions. The device described in item 158 of the patent application park further includes: a combination lock coupled to the tool, the combination lock is structured to connect a metal to the media. '' ^ Meng 160. The device described in item 159 of the scope of patent application, further comprising: a special application integrated circuit (ASIC), which is coupled to the combination lock; and a random key generator, which is embedded With this special application integrated circuit (MW, 忒 random key generator is to provide at least one of the media's secret gold loss. 583568 VI. Application for a patent scope 162 ^ please refer to the scope of the patent scope 161 second G-inside The content copy includes " copy-limited number of specific content copies .: The device described in item 158 of the scope, wherein these are scheduled to perform the content transfer operation; and · Γ51 sound: vc, Pizhong ^ t ^, before the door core access action, obtain a waste soil handle, ^^ said that the existence of no is used to exclude the access action. The scope of interest is described in item 158 The device, # 中, ㉟, etc. additionally use a data management split to operate, wherein the inner shell material is stored on the medium, and the management system is managed by the object on the special integrated circuit (ASIC) The box data, to avoid the Content access action. 165. The device described in claim 164, wherein the special application integrated circuit (ASIC) is placed in a controller, and the special application integrated circuit (ASIC) The tough system includes at least a secure application program interface (API) and an open application program interface (Αρι), among which: the open application program interface (API) agrees to the access action of the file system data on the media; and the full-text application The program interface (AP 丨) is based on at least one knowledge of the media, so as to agree to the access to the saved data on the media. 6. The device described in the scope of patent application No. 165, wherein the security The programming interface (API) includes a first secure application programming interface (API) 第274頁 583568 % ^------ — 六、申請專利範圍 - )及至少一額外安全應用程式界面(Αρί ),該第一安全應 =程式界面(API )係可利用該至少一額外安全應用程式 ^面(API )以進行操作,該至少一額外安全應用程式界面 AP I )係提供外加保全層,該第一安全應用程式界面 (AP I )係利用該等外加保全層以控制該内容之存取動 作。 =7·如申請專利範圍第164項所述之裝置,其中,該韌體係 j由至J/ 一應用程式界面(Ap丨)以管理内容存取動作,該 :用秋式界面(AP I )係避免一主機進行該媒體之方等 級存取。 168·如申請專利範圍第167項所述之裝置,其中,該應用程 、界面(API)係避免一主機進行該内容之方塊等級存 取。 ^ 9 ·如申请專利範圍第1 6 7項所述之裝置,其中,該應用程 二、界面(AP I )係僅能夠經由一鑑別通道進行存取動作。 1^0/如申請專利範圍第158項所述之裝置,其中,該媒體係 制可攜式媒體,包括一光學碟片,且該内容係包括原版影片 衣作内容、記錄内容、複製内容、解除鎖定内容、及解除 定内容之至少一者。 ^ :如申請專利範圍第1 6 5項所述之裝置,其中,該識別碼 係j供一金鑰盒子之一種子,該金鑰盒子係提供解除鎖定 内容及解密内容之至少一者之金鑰。 1 ^ 2 ·如申請專利範圍第1 71項所述之裝置,其中,該媒體係 、有原版影片製作内容及記錄内容之至少一者,該原版影Page 274 583568% ^ ------ — VI. Scope of patent application-) and at least one additional security application program interface (Αρί), the first security application = program interface (API) is the use of the at least one additional The security application program (API) is used for operation. The at least one additional security application program interface (AP I) provides additional security layers. The first security application program interface (AP I) uses these additional security layers to control the security layer. Access to content. = 7. The device according to item 164 of the scope of patent application, wherein the flexible system j is from J / an application program interface (Ap 丨) to manage content access actions, which: use the autumn interface (AP I) This is to prevent a host from performing party-level access to the media. 168. The device according to item 167 of the scope of patent application, wherein the application program and interface (API) prevent a host from performing block-level access to the content. ^ 9 The device as described in item 167 of the scope of patent application, wherein the application program II. Interface (AP I) can only access through an authentication channel. 1 ^ 0 / The device according to item 158 of the scope of patent application, wherein the medium is a portable medium, including an optical disc, and the content includes the original film clothing content, recorded content, copied content, At least one of unlocked content and unlocked content. ^: The device according to item 165 of the scope of patent application, wherein the identification code is a seed for a key box, and the key box is provided with at least one of unlocking content and decrypting content key. 1 ^ 2 · The device described in the scope of patent application No. 1 71, wherein the media is at least one of the original video production content and recorded content, the original video 第275頁 583568Page 275 583568 關連金錄盒子,係分別提 片製作内容及該記錄内容,伴隨其 供一完整存取系統。 一 173. 如申請專利範圍第171項所述之襄置,其中該 子可以與一第一媒體解除連結、並重新連結至’_;第,二餘f 以該金鑰盒子。 ^存取系統,其同時連結 174. —種原版影片製作保全預先錄製内容之方法,其包 括·· 加密該預先記錄内容;以及The related golden record box is to separately produce the production content and the recorded content, which together with it provides a complete access system. A 173. As described in item 171 of the scope of patent application, where the child can be unlinked from a first media and reconnected to '_; the second, f is the key box. ^ Access system, which is also linked to 174.-a method for pre-recorded content preservation of original movie production, which includes ... encrypting the pre-recorded content; and 連接一金鑰盒子及至少一識別碼至一媒體碟片,該金鑰盒 子係架構以使用具有該金鑰盒子之該識別碼,其中,該等^ 別碼係包括一完整識別碼及一部分識別碼之至少一者該 部分識別碼係要求,在使用該金鑰盒子前,經由一次要交^ 完成。 175·如申請專利範圍第174項所述之方法,其中,該金輪盒 子係架構以提供操作一三重資料加密標準(t r i p丨e _Connecting a key box and at least one identification code to a media disc, the key box is structured to use the identification code having the key box, wherein the ^ different codes include a complete identification code and a part of the identification The identification code of at least one of the codes is required to be completed through one-time submission before using the key box. 175. The method according to item 174 of the scope of patent application, wherein the golden wheel box subsystem architecture provides operation of a triple data encryption standard (t r i p 丨 e _ )方塊之金鑰,該三重資料加密標準(triple_DES)方塊 係接收一隨機金錄產生器之一輸出,該隨機金鑰產生器係 利用該媒體碟片之該完整識別碼以進行播種,該三重資料 加密標準(triple—DES)方塊係使用具有該金鑰盒子之 該完整識別碼,藉以對該内容進行解密及加密動作。 176·如申請專利範圍第174項所述之方法,其中,該等識別 碼係包括公開及私密識別碼。) The key of the block. The triple data encryption standard (triple_DES) block receives the output of one of the random gold record generators. The random key generator uses the complete identification code of the media disc to seed. The data encryption standard (triple-DES) block uses the complete identification code with the key box to decrypt and encrypt the content. 176. The method according to item 174 of the scope of patent application, wherein the identification codes include public and private identification codes. 第276頁Chapter 276
TW91119311A 2001-08-27 2002-08-26 A secure access method and system TW583568B (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US09/940,035 US20030188183A1 (en) 2001-08-27 2001-08-27 Unlocking method and system for data on media
US09/940,174 US7729495B2 (en) 2001-08-27 2001-08-27 System and method for detecting unauthorized copying of encrypted data
US09/940,025 US20030188175A1 (en) 2001-08-27 2001-08-27 System and method for identifying vendors of hidden content
US09/940,026 US7310821B2 (en) 2001-08-27 2001-08-27 Host certification method and system
US09/940,083 US7110982B2 (en) 2001-08-27 2001-08-27 Secure access method and system

Publications (1)

Publication Number Publication Date
TW583568B true TW583568B (en) 2004-04-11

Family

ID=34069441

Family Applications (1)

Application Number Title Priority Date Filing Date
TW91119311A TW583568B (en) 2001-08-27 2002-08-26 A secure access method and system

Country Status (1)

Country Link
TW (1) TW583568B (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI394059B (en) * 2005-10-20 2013-04-21 Ibm Method, apparatus, and computer program product for securing operations with respect to a set of computational resources in a data processing system
TWI396112B (en) * 2004-08-17 2013-05-11 Google Inc A system, method, service method, and program product for managing entitlement with identity and privacy applications for electronic commerce
US8627092B2 (en) 2006-03-22 2014-01-07 Lg Electronics Inc. Asymmetric cryptography for wireless systems
TWI505124B (en) * 2010-03-25 2015-10-21 Ibm Method, apparatus, computer program product and machine-readable media for scanning secure data
US9202015B2 (en) 2009-12-31 2015-12-01 Intel Corporation Entering a secured computing environment using multiple authenticated code modules
TWI567579B (en) * 2010-11-30 2017-01-21 英特爾公司 Method and apparatus for key provisioning of hardware devices
TWI692704B (en) * 2016-01-04 2020-05-01 美商克萊夫公司 Data security system and method of operating the same
TWI697807B (en) * 2017-12-13 2020-07-01 台達電子工業股份有限公司 Data transmission system with security mechanism and method thereof
US10754992B2 (en) 2007-09-27 2020-08-25 Clevx, Llc Self-encrypting drive
US10778417B2 (en) 2007-09-27 2020-09-15 Clevx, Llc Self-encrypting module with embedded wireless user authentication
US10783232B2 (en) 2007-09-27 2020-09-22 Clevx, Llc Management system for self-encrypting managed devices with embedded wireless user authentication
US11190936B2 (en) 2007-09-27 2021-11-30 Clevx, Llc Wireless authentication system
TWI776404B (en) * 2020-03-23 2022-09-01 大陸商騰訊科技(深圳)有限公司 Method of authenticating biological payment device, apparatus, electronic device, and computer-readable medium
TWI782147B (en) * 2017-12-22 2022-11-01 瑞士商納格維遜股份有限公司 A secure software-defined radio chip
US11971967B2 (en) 2021-08-20 2024-04-30 Clevx, Llc Secure access device with multiple authentication mechanisms

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI396112B (en) * 2004-08-17 2013-05-11 Google Inc A system, method, service method, and program product for managing entitlement with identity and privacy applications for electronic commerce
TWI394059B (en) * 2005-10-20 2013-04-21 Ibm Method, apparatus, and computer program product for securing operations with respect to a set of computational resources in a data processing system
US8627092B2 (en) 2006-03-22 2014-01-07 Lg Electronics Inc. Asymmetric cryptography for wireless systems
US11190936B2 (en) 2007-09-27 2021-11-30 Clevx, Llc Wireless authentication system
US11233630B2 (en) 2007-09-27 2022-01-25 Clevx, Llc Module with embedded wireless user authentication
US11151231B2 (en) 2007-09-27 2021-10-19 Clevx, Llc Secure access device with dual authentication
US10985909B2 (en) 2007-09-27 2021-04-20 Clevx, Llc Door lock control with wireless user authentication
US10783232B2 (en) 2007-09-27 2020-09-22 Clevx, Llc Management system for self-encrypting managed devices with embedded wireless user authentication
US10778417B2 (en) 2007-09-27 2020-09-15 Clevx, Llc Self-encrypting module with embedded wireless user authentication
US10754992B2 (en) 2007-09-27 2020-08-25 Clevx, Llc Self-encrypting drive
TWI582632B (en) * 2009-12-31 2017-05-11 英特爾股份有限公司 Method and system of entering a secured computing environment using multiple authenticated code modules,and processor
US9208292B2 (en) 2009-12-31 2015-12-08 Intel Corporation Entering a secured computing environment using multiple authenticated code modules
US9202015B2 (en) 2009-12-31 2015-12-01 Intel Corporation Entering a secured computing environment using multiple authenticated code modules
TWI505124B (en) * 2010-03-25 2015-10-21 Ibm Method, apparatus, computer program product and machine-readable media for scanning secure data
TWI567579B (en) * 2010-11-30 2017-01-21 英特爾公司 Method and apparatus for key provisioning of hardware devices
TWI692704B (en) * 2016-01-04 2020-05-01 美商克萊夫公司 Data security system and method of operating the same
TWI697807B (en) * 2017-12-13 2020-07-01 台達電子工業股份有限公司 Data transmission system with security mechanism and method thereof
TWI782147B (en) * 2017-12-22 2022-11-01 瑞士商納格維遜股份有限公司 A secure software-defined radio chip
TWI776404B (en) * 2020-03-23 2022-09-01 大陸商騰訊科技(深圳)有限公司 Method of authenticating biological payment device, apparatus, electronic device, and computer-readable medium
US11971967B2 (en) 2021-08-20 2024-04-30 Clevx, Llc Secure access device with multiple authentication mechanisms

Similar Documents

Publication Publication Date Title
TWI716140B (en) Data processing method and device based on blockchain
US7310821B2 (en) Host certification method and system
US7958377B2 (en) Secure access system and method
WO2020119294A1 (en) Data sharing method, apparatus, and system, and electronic device
US7110982B2 (en) Secure access method and system
US7729495B2 (en) System and method for detecting unauthorized copying of encrypted data
Crosby et al. Blockchain technology: Beyond bitcoin
US7672903B2 (en) Revocation method and apparatus for secure content
WO2017148245A1 (en) Rights management method and system
TW563037B (en) Digital content distribution using web broadcasting services
US7814025B2 (en) Methods and apparatus for title protocol, authentication, and sharing
TW583568B (en) A secure access method and system
US20030135465A1 (en) Mastering process and system for secure content
US20050071280A1 (en) System and method for federated rights management
JP2001524233A (en) Virtual property system
US20220366022A1 (en) Non-fungible token (nft) content identifier with split tracking
Raman et al. The world of NFTs (non-fungible tokens): the future of blockchain and asset ownership
US20060224521A1 (en) Verified transfer of media data
US20030188175A1 (en) System and method for identifying vendors of hidden content
KR20210037274A (en) Apparatus and method for managing contents
GB2607026A (en) A smart contract based blockchain application using non-fungible token for authorized asset sharing
EP2833305A1 (en) Protection method and system for distributing digital files whether new, second-hand, for rental, exchange or transfer
US20230222187A1 (en) Media composition using non-fungible token (nft) configurable pieces
CN115456613A (en) Digital collection transaction method and equipment
TW530267B (en) Multimedia player for an electronic content delivery system

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees