TWI220354B - The system and method for protecting digital content - Google Patents

The system and method for protecting digital content Download PDF

Info

Publication number
TWI220354B
TWI220354B TW92126517A TW92126517A TWI220354B TW I220354 B TWI220354 B TW I220354B TW 92126517 A TW92126517 A TW 92126517A TW 92126517 A TW92126517 A TW 92126517A TW I220354 B TWI220354 B TW I220354B
Authority
TW
Taiwan
Prior art keywords
digital content
login
protection
decryption
permission
Prior art date
Application number
TW92126517A
Other languages
Chinese (zh)
Other versions
TW200513088A (en
Inventor
Liu-Wei Chen
Original Assignee
Xicco Information Netwodk Tech
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xicco Information Netwodk Tech filed Critical Xicco Information Netwodk Tech
Priority to TW92126517A priority Critical patent/TWI220354B/en
Application granted granted Critical
Publication of TWI220354B publication Critical patent/TWI220354B/en
Publication of TW200513088A publication Critical patent/TW200513088A/en

Links

Landscapes

  • Storage Device Security (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The present invent provides a system and method for protecting digital content. The system includes an authorization library, a protection function and a decoding function. The authorization library is for storing a plural of authorization data. The protection function is for obtaining a decoding permit respect to a digital content by selecting an authorization data respect to the decoding permit from the authorization library based on a login permit. The decoding function is for decoding the digital content to generate a decoded digital content according to the decoding permit.

Description

1220354 五、發明說明(1) 發明所屬之技術領域 本發明係 密的數位内 先前技術 數位内容 義,其除可 值產業,亦 國如英、日 以,數位内 產業。而上 書和一電腦 只是,近 更是加深了 紛提出許多 硬體兩種保 安裝或撥放 免未經授權 大多藉著人 料儲存方式 碟媒體。 關於一種數 容必在取得 產業具有發 促進傳統產 是提升我國 、韓等更是 谷產業不論 述數位内容 遊戲這幾大 年來,燒錄 數位内容的 防止盜版的 護方法。其 前要求使用 透過網路互 為修改儲存 ’而避免使 位内容之保 一解密許可 展知識經濟 業提升知識 整體產業競 皆以整體國 事現在或未 可大致區分 類。 設備的普及 盜版問題。 保護方法, 中,最常見 者輸入一組 相傳遞數位 數位内容的 用者私自利 護糸統,尤 後才得以被 與數位經濟 含量而轉型 爭力之基礎 家力量在積 來都會是一 成影音多媒 化和網際網 所以,數位 大體上可區 的軟體保護 序號或帳號 内容。而硬 光碟媒體實 用燒錄設備 指已預先加 解密° 之指標意 成高附加價 ,而世界各 極推動’所 個很重要的 體檔、電子 路的寬頻化 内容產業紛 分為軟體和 方法就是在 ,而達到避 體保護方法 體結構或資 非法複製光1220354 V. Description of the invention (1) The technical field to which the invention belongs The present invention is in the digital domain. The prior art digital content means that in addition to the value industries, it is also a national industry such as the United Kingdom, Japan, and Japan. But the book and a computer are only a little bit deeper. Many hardware and two types of protection are installed or released. Unauthorized, mostly by means of data storage. Regarding a type of digital content that must be obtained in the industry, the promotion of traditional production is to improve our country, Korea, and so on. Regardless of the digital content games, these years, the digital content has been burned to prevent piracy. In the past, it was required to use the mutual modification and storage through the Internet to avoid the protection of the content. A decryption license is required to develop the knowledge economy and improve the knowledge of the industry. The overall industry competition is based on the overall state of affairs. Popularization of equipment Piracy issues. In the protection method, the most common users input a set of digital content to protect the system for themselves, and only later can they be transformed with the digital economic content. The strength of the foundational family will always be a movie. Multimedia and the Internet So, digitally largely software protects serial numbers or account content. The hard disk media practical burning device refers to the index that has been encrypted and decrypted in advance, which means a high additional price, and the world ’s poles are promoting the important content files, electronic broadband content industry is divided into software and methods At the same time, the structure of the body is protected or the material is copied illegally.

IZZUJD4IZZUJD4

由於",/[塞达 本身或是儲存數::f軟體保護機制均外加在數位内容的 要利用—些 ^内谷的光碟媒體上。然而,有心人士只 到破解保護的目的P可跳過或閃避這些外加的保護機制而達 因此,對於數位內& $ 'ft ΛΑ να ^ ^ 位内谷產業的業者來說,是需要一種無法跳 過的保護機制之方法。 發明内容 本發明之主要目的在提供一種無法跳過或閃避保護機制 的數位内容之保護系統和其方法。 基於上述目的,本發明係揭露了一種數位内容之保護系 統與方法。此保護系統係使預先加密的數位内容在取得解 松許可後才得以被解密,並於解密後以相對應於此數位内 容的應用程式安裝或播放。 本發明所揭露的數位内容之保護系統係至少包含認證資 料庫、保羞機制和解也、機制。而認證資料庫係用以儲存複 數筆$忍證資料。保濩機制則是用以在取得登入許可後,藉 著登入許可從認證資料庫中些認證資料中獲得相對應於數 位内容的解密許可。解密機制係依據保護機制所獲5的解 密許可解密預先加密的數位内容,而獲得已解密的數位内Because ", / [Zeda itself or the storage number :: f software protection mechanisms are added to the digital content to be used-some ^ inner valley of the disc media. However, those who are interested in it can only bypass the protection mechanism by defeating or avoiding these additional protection mechanisms. Therefore, for the digital & $ 'ft ΛΑ να ^ ^ industry players, there is a need for Method of skipping protection mechanism. SUMMARY OF THE INVENTION The main object of the present invention is to provide a system and method for protecting digital content that cannot skip or evade protection mechanisms. Based on the above objectives, the present invention discloses a system and method for protecting digital content. This protection system enables pre-encrypted digital content to be decrypted after obtaining the release permission, and after decryption, it is installed or played with an application corresponding to the digital content. The digital content protection system disclosed in the present invention includes at least an authentication database, a shy mechanism, a reconciliation mechanism, and a mechanism. The certification database is used to store multiple pieces of $ tolerance data. The security mechanism is used to obtain the decryption permission corresponding to the digital content from the authentication data in the authentication database by the login permission after obtaining the login permission. The decryption mechanism decrypts the pre-encrypted digital content according to the 5 decryption permission obtained by the protection mechanism, and obtains the decrypted digital content.

藉由本發明所揭露的數位 雖然仍可以私自禮赤W 之保遵糸統,使得使用者 本系統架構下,此周路非法流傳數位内容。但在 系統的授權解密,f尤曾非:係已事先被加密’若非獲得本 播放於本系^構;::::;數位内容仍,法安裝或 護數位内容的目的。 谷本發明正疋藉此達到保 關於本發明之優點盘籍沾 # 附圖式得到進一步的瞭:神可以猎由以下的發明詳述及所 實施方法 〈第一實施例〉 =f閱第1圖,第1圖為本發明第一實施例的數位内容之 保護ί統之示意圖。如第1圖所示,本發明第一實施例之 保護^係由飼服H端電腦1G和用戶端電冑12所構成。於 此架才下’使用者1 4係透過網路分別與伺服器端電腦1 〇和 用戶端電1 2產生互動’進而使祠服器端電腦i 〇和用戶端 電細1 2之間產生互動’最後完成使用者丨4對於觀看用戶端 電腩1 2中的數位内容的要求。底下將進一步說明伺服器端 電細1 0和用戶端電腦1 2各自所包含的元件,以及這些元件Although the digital data disclosed by the present invention can still be used to privately guarantee the security and compliance of the system, the user can illegally circulate digital content under this system architecture. However, in the system's authorized decryption, f especially wrong: the system has been encrypted in advance. 'If it has not been obtained, it will be played in this system; ::::; the digital content is still unable to install or protect the digital content. The present invention is hereby used to achieve the advantages of the present invention. Pan Jizhan # The drawing has been further improved: God can hunt the following detailed description of the invention and the method of implementation <First Embodiment> = fsee Figure 1 FIG. 1 is a schematic diagram of digital content protection in the first embodiment of the present invention. As shown in Fig. 1, the protection of the first embodiment of the present invention is constituted by a feeding H-terminal computer 1G and a client terminal 12. Only under this shelf is 'User 1 4 Series interacts with server-side computer 1 0 and client-side power 12 respectively through the network', so that the server-side computer i 0 and client-side power 1 12 are generated. Interaction 'finally completes the user's request for viewing the digital content in the user terminal 12. The following will further explain the components included in the server terminal 10 and the client computer 12, and these components

第8頁 1220354Page 8 1220354

如何互動而達成本發明的目的。 如第 1 8、使 係用以 應個別 的加密 式。而 入機制 (例如 者資料 法的情 般慣稱 1圖所示,伺服器端電腦1 〇係包含了認證資料庫 用者資料庫28和登入機制24。其中,認證資料庫 儲存複數筆認證資料,而這些認證資料係分別地 的數位内容。換句話說,每一數位内容均具有 = 方法,而需要以不同的認證資料儲存其解密方洙 使用者資料庫28係用以儲存複數筆使用者^料。 24則是藉著登入表單26接收使用者丨4的登入;資登 .帳號/密碼),並依據使用者資料庫2 8内含、/ 驗證使用者14的登入資料是否屬於合法,、使用 況下登入機制24則發出登入許可,μ八於合 此登入許可g口 的工作期間(s e s s i ο η )。 ~ 如第1圖所示,於用戶端電腦12中包。 ^ 解密機制22、自動執行機制30和數位内容j 制20 機制2 0係用以於使用者1 4取得登入許可租^ ’保 藉著登入許可從認證資料庫中丨8所儲存二^,制2 0 相對應於數位内容16的解密許可,此解料中獲: 述包含使用者14欲安裝或執行的數位内容的 而解密機制22則是依據解密許可解密預 二方式 回應一使用者對於觀看數位内容丨6的要求,而 糸用 保護機制20和解密機制22獲得已解密的數位内容地,How to interact to achieve the purpose of the invention. Such as Section 18, the system is used to respond to individual encryption. The access mechanism (for example, as shown in Figure 1), the server computer 10 includes an authentication database user database 28 and a login mechanism 24. Among them, the authentication database stores a plurality of authentication data And these authentication data are separate digital contents. In other words, each digital content has = method, and it needs to store its decryption party with different authentication data. The user database 28 is used to store multiple users. ^ 料. 24 is to receive the login of the user through the login form 26; 4 login; account / password), and according to the user database 28, verify that the login information of the user 14 is legal, 2. In the use case, the login mechanism 24 issues a login permission, and the working period (sesi ο η) of the μ-Ya login permission g port. ~ As shown in Figure 1, included in the client computer 12. ^ Decryption mechanism 22, automatic execution mechanism 30, and digital content system 20 mechanism 2 0 is used to obtain login permission rent from user 14 ^ 'guaranteed to store 2 of the authentication database from the login database by login permission. 2 0 Corresponds to the decryption permission of the digital content 16, which is obtained in this solution: The decryption mechanism 22 that contains the digital content that the user 14 wants to install or execute, and the decryption mechanism 22 responds to a user ’s viewing in accordance with the decryption permission. Digital content 6 requirements, and using the protection mechanism 20 and decryption mechanism 22 to obtain the decrypted digital content,

12203541220354

五、發明說明(5) 放已解密的數位内容1 6。數位内容丨6則於解密機制2 2解密 前為一預先加密的數位内容16,而於解密機制2 2解密後為 一已解密的數位内容1 6。接著,底下將說明第一實施例; 的數位内容之保護系統的運作方式。 於本發明的第一實施例的系統架構下,當使用者丨4透 用戶端電腦1 2的光碟儲存媒體(未顯示)而取得預先加密 的數位内容1 6時,,使用者丨4是需要先透過本發明所揭露的 數位内容之保護系統將此數位内容丨6解密,而於數位内办 解密後使用者14才得以安裝或播放數位内容16。另外,ς 用者1 4也可於本發明所揭露的系統下透過網路從伺服器 電腦1 0取得預先加密的數位内容1 6。但使用者丨4不論: 種方式取得數位内$ 16,預先加密的數位内容 序均是在用戶端電腦1 2進行。 111 1 6時,本 保護機制 統才會開 機制3 0可 也可以透 從伺服器 用戶端電 制2 2和自 當使用者 的數位内容 電腦1 2安裝 本發明的系 和自動執行 存媒體中, 位内容1 6係 地也會要求 20、解密機 或安裝於光 發明所揭露 20、解密機 始運作。而 預先儲存於 過網路從伺 端電腦1 0下 腦1 2先透過 動執行機制 的系統會首先要求甩戶端 制22和自動執行機制30, 保護機制20、解密機制 含有數位内容16的光碟儲 服器端電腦丨〇下載。若 載時,本發明的 網路取得並安裝保護機制 30。此外,若已曾安裝過V. Description of the invention (5) Put the decrypted digital content 16. The digital content 6 is a pre-encrypted digital content 16 before being decrypted by the decryption mechanism 22, and it is a decrypted digital content 16 after being decrypted by the decryption mechanism 22. Next, the operation of the digital content protection system according to the first embodiment will be described below. Under the system architecture of the first embodiment of the present invention, when the user 丨 passes through the optical disc storage medium (not shown) of the client computer 12 to obtain the pre-encrypted digital content 16, the user 丨 4 needs The digital content 6 is first decrypted by the digital content protection system disclosed in the present invention, and the user 14 can install or play the digital content 16 only after decryption is performed in the digital. In addition, users 14 can also obtain pre-encrypted digital content 16 from the server computer 10 through the network under the system disclosed in the present invention. However, the user does not need to: Obtain the digital content of $ 16 in a digital way. The pre-encrypted digital content is performed on the client computer 1 2. 111 16:00, this protection mechanism will only open the mechanism 3 0 can also be through the server user system 2 2 and the user's digital content computer 1 2 install the system of the present invention and automatic execution storage media The 16-bit content will also require 20, the decryption machine or the 20 installed on the light invention to expose the decryption machine to operate. And the system stored in advance on the network from the server computer 10 to the brain 1 2 first through the execution mechanism will first require the client 22 and the automatic execution mechanism 30, the protection mechanism 20, and the decryption mechanism to contain the digital content of the 16 discs Download from the server computer. When loaded, the network of the present invention acquires and installs a protection mechanism 30. In addition, if you have installed

12203541220354

行機制3 0,本發明的系 ’本發明的系統直接開 保護機制20、解密機制22和自動執 統則會跳過要求使用者安裝的步驟 始運作。 兩τ ’本發明系統的運作方式,使用者14首先 =ί =人機㈣24所具有料人表$26填人合法的登入 貝1 ^ 1 ^入機制24藉著使用者資料庫2純認使用者的登 入:、、、二/ %,登入機制2 4會產生一登入許可。在此特明聲 明+,本=明系統的運作方式也可要求使用者h在取得此登 入許H:才得以下載並安裝保護機制2 〇、解密機制2 2和 自動執行機制3 〇。〇基,八X &lt; -η 1 ^ , 〇 ,、疋 且入终可主要係用於後續從認證 資料庫1 8取得認證資料的依據。 上述使用者資料庫28的資料建立係依據商業模式而定。 也就疋发業者事先向使用者1 4收取一定費用後,依其商 業模式使用者14將以si m使用本系统或其他計費方式 而獲得相對應的登入資料。或是,使用者14再合法取得數 位内容1 6的同時獲得不具時效限制但限制同一時間單一使 用者14播放或操作數位内容16的登入資料。總而言之使 用者資料庫28的資料建立並沒有一定的依據,在此僅簡單 的舉例說明。底下繼續說明用戶端電腦12中的元件如何彼 此互動而向伺服器電腦丨〇的認證資料庫丨8取得認證資料。 當使用者3 0透過一個使用者介面(未顯示)點選特定的數Running mechanism 30, the system of the present invention ′ The system of the present invention directly opens the protection mechanism 20, the decryption mechanism 22, and the automatic execution system, and then skips the steps requiring the user to install before starting operation. Two τ 'The operation mode of the system of the present invention, the user 14 first = ί = man-machine ㈣ 24 has a person table $ 26 fill in the legal login 1 1 ^ 1 ^ entry mechanism 24 through the user database 2 to identify the user Login: 、、、 二 /%, login mechanism 2 4 will generate a login permission. It is hereby stated that the operation mode of the system can also require the user h to download and install the protection mechanism 2 0, the decryption mechanism 2 2 and the automatic execution mechanism 3 0 after obtaining this login license H :. 〇, X X &lt; -η 1 ^, 〇, 疋, and 入, and finally can be used as the basis for subsequent acquisition of certification data from the certification database 18. The establishment of the above-mentioned user database 28 is based on the business model. That is to say, after the publisher charges the user 14 a certain fee in advance, the user 14 according to his business model will use the system or other billing methods to obtain the corresponding login information. Or, the user 14 legally obtains the digital content 16 and simultaneously obtains the login data without limitation of time limitation but restricting the single user 14 from playing or operating the digital content 16 at the same time. All in all, there is no certain basis for the establishment of the user database 28, and only a simple example will be given here. The following continues to explain how the components in the client computer 12 interact with each other to obtain authentication data from the authentication database 丨 0 of the server computer 丨 〇. When user 30 clicks a specific number through a user interface (not shown)

第11頁 1220354 五、發明說明(7) ' 位内容1 6而欲安裝、執行或播放時,係均透過自動執行機· 制自動地元成本發明糸統所有必要的執行步驟,使用者 1 4並不需要考慮如何操作本發明所揭露的系統。此外,使 用者也可透過於如Wind〇ws系統下直接點擊數位内容16的 執行檔而啟動本系統的運作,但同樣地都會是透過自動執 打機制30自動地完成本發明系統所有必要的執行步驟。 當自動執行機制30接獲播放、安裝或執行特定數位内容 16的要求時,自動執行機制3〇會要求保護機制2〇藉著先前 取=的登入許可向認證資料庫丨8取得中獲得相對應於數1 内容1 6的解密許可。接著,自動執行機制3 〇在確定保護機 制2 0順利取得解密許可時,會要求解密機制2 2依據解密許 可所内含的解密方式進行此數位内容丨6的解密動作。於解 密機制2 2完成解密後,用戶端電腦丨2將獲得一已解密的數 位内容。最後,自動執行機制3〇將藉著如Wind〇ws内定的 播放或執行應用程式播放或執行此數位内容16。不過,由 於為避免使用者1 4私自將已解密的數位内容丨6非法燒錄或 傳播,因此,此已解密的數位内容將只存在於用戶端電腦 1 2的記憶體中,並沒辦法還原成實體槽案。 綜上所述,於本發明所揭露的數位内容之保護系統與方 法之下,使得使用者14無法取得已解密的數位内容'16/的實 體檔案,而達到本發明的保護數位内容的目的。再者,使 用者1 4在此系統的架構下,也只能私自複製或透過網路非Page 11 1220354 V. Description of the invention (7) When the content 16 is to be installed, executed, or played, all necessary execution steps of the invention are automatically implemented by the automatic execution mechanism and the user. There is no need to consider how to operate the system disclosed by the present invention. In addition, the user can also start the operation of the system by directly clicking the execution file of the digital content 16 under the Windows system, but the same will automatically complete all necessary executions of the system of the present invention through the automatic execution mechanism 30. step. When the automatic execution mechanism 30 receives a request to play, install or execute a specific digital content 16, the automatic execution mechanism 30 will require the protection mechanism 20 to obtain a corresponding response from the authentication database with the previously obtained login permission. Decryption permission for number 1 content 16. Next, when the automatic execution mechanism 30 determines that the protection mechanism 20 has successfully obtained the decryption permission, it will request the decryption mechanism 22 to perform the decryption action of this digital content according to the decryption method included in the decryption permission. After the decryption mechanism 22 completes decryption, the client computer 2 will obtain a decrypted digital content. Finally, the automatic execution mechanism 30 will play or execute the digital content 16 through a playback or execution application as defined by Windows16. However, in order to prevent the user from illegally burning or transmitting the decrypted digital content 丨 6, the decrypted digital content will only exist in the memory of the client computer 12 and there is no way to restore it Into a solid slot case. In summary, under the digital content protection system and method disclosed by the present invention, the user 14 cannot obtain the physical file of the decrypted digital content '16 /, and thus achieves the purpose of protecting the digital content of the present invention. Moreover, under the framework of this system, users 1 and 4 can only copy it privately or through the Internet.

1220354 五、發明說明(8)^ &quot; &quot;一&quot; 法流傳預先加密的數位内容1 6,但使用者1 4若欲安梦或播 ^此預先加密的數位内容1 6時,仍是需要取得合法^授 權’本發明正是藉此達到保護數位内容的目的。 例〉 〈第二實 請參閱第2圖,第2圖為本發明第二實施例的數位内容之 保護系,之示意圖。如第2圖所示,本發明第二實施例的 數位内容之保護系統,即一般所熟知的分散式架構,於此 架構下增加了具有保護機制20的中介電腦32。因此,於此 架構下,可允許複數個用戶端電腦12和36不在需要安裝保 護機制2 0 ’將部分執行本系統的負荷分攤出去。於此架構 下’也可藉由中介電腦3 2控管用戶端電腦1 2和3 6。 如同第一實施例的方法,當使 發於用戶端電腦1 2中的自動執行 自動執行機制3 8而播放或執行特 時,自動執行機制3 0和3 8會分別 護機制20藉著使用者1 4和34分別 認證資料庫1 8取得中獲得相對應 許可。接著,自動執行機制3 0和 2 0順利取得相對應於用戶端電腦 要求解密機制2 2和4 0分別地依據 式進行此數位内容1 6和4 2的解密 用者14和 機制3 0和 定數位内 地要求於 地預前取 於數位内 3 8分別地 1 2和3 6的 解密許可 動作。於 3 4分別 用戶端 容16和 中介電 得的登 容1 6和 在確定 解密許 所内含 解密機 地藉由觸 電腦3 6的 4 2的要求 腦3 2的保 入許可向 4 2的解密 保護機制 可時,會 的解密方 制2 2和4 01220354 V. Description of the invention (8) ^ &quot; &quot; 一 &quot; Method to circulate the pre-encrypted digital content 16, but if the user 14 wants to sleep or play ^ this pre-encrypted digital content 16 is still Need to obtain a legal license 'This invention is precisely to achieve the purpose of protecting digital content. Example> <Second Embodiment Please refer to FIG. 2. FIG. 2 is a schematic diagram of a digital content protection system according to a second embodiment of the present invention. As shown in FIG. 2, the digital content protection system according to the second embodiment of the present invention is a generally known decentralized architecture, and an intermediary computer 32 having a protection mechanism 20 is added under this architecture. Therefore, under this architecture, multiple client computers 12 and 36 can be allowed to no longer need to install a protection mechanism 2 0 ′ to share the load of partially executing the system. Under this framework, the client computers 12 and 36 can also be controlled by the intermediary computer 3 2. As with the method of the first embodiment, when the automatic execution mechanism 3 8 sent to the client computer 12 is played or executed, the automatic execution mechanisms 30 and 38 respectively protect the mechanism 20 by the user. 14 and 34 respectively obtained corresponding certifications in the certification database. Next, the automatic execution mechanisms 30 and 20 successfully obtained the decryption mechanisms 22 and 40 corresponding to the client computer's request for decryption of this digital content 16 and 42 respectively according to the formula. The digital mainland requires the decryption permission to be fetched in advance from the digital 3, 12, and 36 respectively. At 3 4 respectively, the client terminal 16 and the intermediary Deng Rong 16 and the deciphering license contained in the decryption license are determined by touching the computer 3 6 4 2 to request the brain 3 2 security permission to 4 2 When the decryption protection mechanism is available, the decryption system will be 2 2 and 4 0

第13頁 1220354 五、發明說明(9) 完成解密後,用戶*。 ^ 數位内容。最後,^電腦1 2和36將分別地獲得一已解密的 Windows内定的播勒執行機制30和38將分別地藉著 16和42。 播放或執仃應用程式播放或執行數位内容 藉由以上較佳具體實施例之詳述 述本發明之特徵與精神,而並非以=希望此更加清楚描 實施例來對本發明之範疇加以限制。’L所揭露的較佳具體 望能涵蓋各種改變及具相等性的容M二反地,其目的是希 專利範圍的範疇内。 幻女排於本發明所欲申請之Page 13 1220354 V. Description of the invention (9) After the decryption is completed, the user *. ^ Digital content. In the end, computers 12 and 36 will get a decrypted Windows built-in podcast execution mechanism 30 and 38 respectively by 16 and 42. Play or execute applications to play or execute digital content. The features and spirit of the present invention will be described by the detailed description of the preferred embodiments above, rather than limiting the scope of the present invention with the hope that the embodiments will be described more clearly. The better specifics disclosed by 'L are expected to cover various changes and equivalences. The purpose is to lie within the scope of the patent. Wonder Woman Volleyball Team

第14頁 1220354 圖式簡單說明 圖式簡單說明 第1圖為本發明第一實施例的 圖。 第2圖為本發明第二實施例的 圖。 圖式符號說明 1 0伺服器端電腦 1 4、3 4使用者 1 8認證資料庫 2 2、4 0解密機制 26登入表單 3 0自動執行機制 數位内容之保護系統之示意 數位内容之保護系統之示意 1 2用戶端電腦 1 6、4 2數位内容 2 0保護機制 2 4登入機制 2 8使用者資料庫 3 2中介電腦Page 14 1220354 Brief description of the drawings Brief description of the drawings Figure 1 is a diagram of the first embodiment of the present invention. Fig. 2 is a diagram of a second embodiment of the present invention. Explanation of graphical symbols 1 0 Server-side computer 1 4, 3 4 Users 1 8 Authentication database 2 2, 4 0 Decryption mechanism 26 Login form 3 0 Automatic execution mechanism Digital content protection system Schematic of digital content protection system Diagram 1 2 Client computer 1 6, 4 2 Digital content 2 0 Protection mechanism 2 4 Login mechanism 2 8 User database 3 2 Intermediate computer

第15頁Page 15

Claims (1)

1220354 六、申請專利範圍 卜一種數位内容之保護系統,該保護系統係使一預先加 密的數位内容在取得一解密許可後才得以被解密,該系統 至少包含: 一認證資料庫,該認證資料庫係用以儲存複數筆認證 資料; 一保護機制,該保護機制係用以在取得一登入許可 後,藉著該登入許可從該認證資料庫中該些認證資料中獲 得相對應於該數位内容的該解密許可;以及 一解密機制,該解密機制係依據該保護機制所獲得的 該解密許可解密該預先加密的數位内容,而獲得一已解密 的數位内容。 2、如申請專利範圍第1項所述之保護系統,其中該數位内 容係選自一影音多媒體檔、一電子書和一電腦遊戲其中之 3、如申請專利範圍第1項所述之保護系統,其中該保護系 統進一步具有: 一登入機制,該登入機制係藉著一登入表單接收一使 用者的登入資料,並依據一使用者資料庫驗證該使用者的1220354 6. Scope of patent application: A digital content protection system. The protection system enables a pre-encrypted digital content to be decrypted after obtaining a decryption permission. The system includes at least: a certification database, the certification database It is used to store a plurality of authentication data; a protection mechanism is used to obtain the corresponding digital content from the authentication data in the authentication database through the login permission after obtaining a login permission. The decryption permission; and a decryption mechanism, which decrypts the pre-encrypted digital content according to the decryption permission obtained by the protection mechanism to obtain a decrypted digital content. 2. The protection system described in item 1 of the scope of patent application, wherein the digital content is selected from the group consisting of an audiovisual multimedia file, an e-book, and a computer game 3. The protection system described in item 1 of the scope of patent application , Wherein the protection system further has: a login mechanism, the login mechanism receives a user's login data through a login form, and verifies the user's 第16頁 1220354 六、申請專利範圍 登入資料而發出該登入許可。 4、 如申請專利範圍第1項所述之保護系統,其中該保護系 統進一步具有: 一自動執行機制,該自動執行機制係用以回應一使用 者對於觀看該數位内容的要求,而自動地藉著該保護機制 和該解密機制獲得該已解密的數位内容,並播放該已解密 的數位内容。 5、 如申請專利範圍第4項所述之保護系統,其中該保護系 統進一步具有: 一用戶端電腦,該用戶端電腦係至少包含該保護機 制、該解密機制、該自動執行機制和該數位内容。 6、 如申請專利範圍第4項所述之保護系統,其中該保護系 統進一步具有: 複數個用戶端電腦,該些用戶端電腦係至少包含該解 密機制和該自動執行機制和該數位内容;以及 一中介電腦,該中介電腦係至少包含該保護機制。 7、 如申請專利範圍第3項所述之保護系統,其中該保護系Page 16 1220354 VI. Scope of patent application Login information is issued and the login permission is issued. 4. The protection system described in item 1 of the scope of patent application, wherein the protection system further has: an automatic execution mechanism, which is used to respond to a user's request for viewing the digital content and automatically borrow With the protection mechanism and the decryption mechanism, the decrypted digital content is obtained, and the decrypted digital content is played. 5. The protection system described in item 4 of the scope of patent application, wherein the protection system further includes: a client computer, the client computer includes at least the protection mechanism, the decryption mechanism, the automatic execution mechanism and the digital content . 6. The protection system as described in item 4 of the scope of patent application, wherein the protection system further comprises: a plurality of client computers, the client computers including at least the decryption mechanism, the automatic execution mechanism and the digital content; and An intermediary computer. The intermediary computer includes at least the protection mechanism. 7. The protection system described in item 3 of the scope of patent application, wherein the protection is 第17頁 1220354 六、申請專利範圍 統進一步具有: 一伺服器端電腦,該伺服器端電腦至少包含該認證資 料庫、該登入機制和該使用者資料庫。 8、 一種數位内容之保護方法,該保護方法係使一預先加 密的數位内容在取得一解密許可後才得以被解密,該方法 至少包含下列步驟: 提供一認證資料庫,該認證資料庫係用以儲存複數筆 認證貢料, 取得一登入許可後,藉著該登入許可從該認證資料庫 中該些認證資料中獲得相對應於該數位内容的該解密許 可;以及 依據該解密許可解密該預先加密的數位内容,而獲得 一已解密的數位内容。 9、 如申請專利範圍第8項所述之保護方法,其中該數位内 容係選自一影音多媒體檔、一電子書和一電腦遊戲其中之 1 0、如申請專利範圍第8項所述之保護方法,其中該登入Page 17 1220354 6. Scope of patent application The system further has: a server-side computer, the server-side computer includes at least the authentication database, the login mechanism and the user database. 8. A method for protecting digital content. The protection method enables a pre-encrypted digital content to be decrypted after obtaining a decryption permission. The method includes at least the following steps: Provide a certification database, which is used for After storing a plurality of authentication materials, after obtaining a login permission, the decryption permission corresponding to the digital content is obtained from the authentication materials in the authentication database by the login permission; and the pre-decryption is performed according to the decryption permission Encrypted digital content to obtain a decrypted digital content. 9. The protection method described in item 8 of the scope of patent application, wherein the digital content is selected from the group consisting of an audiovisual multimedia file, an e-book, and a computer game, and the protection described in item 8 of the scope of patent application. Method where the login 第18頁 1220354 六、申請專利範圍 許可係透過一登入機制而獲得,該登入機制係藉著一登入 表單接收一使用者的登入資料,並依據一使用者資料庫驗 證該使用者的登入資料而發出該登入許可。 1 1、如申請專利範圍第8項所述之保護方法,其中該已解 密的數位内容係藉著一自動執行機制而自動地完成播放。Page 18 1220354 VI. The scope of patent application permission is obtained through a login mechanism. The login mechanism receives a user's login information through a login form and verifies the user's login information based on a user database. Issue the login permission. 11 1. The protection method as described in item 8 of the scope of patent application, wherein the decrypted digital content is automatically played through an automatic execution mechanism. 第19頁Page 19
TW92126517A 2003-09-25 2003-09-25 The system and method for protecting digital content TWI220354B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW92126517A TWI220354B (en) 2003-09-25 2003-09-25 The system and method for protecting digital content

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW92126517A TWI220354B (en) 2003-09-25 2003-09-25 The system and method for protecting digital content

Publications (2)

Publication Number Publication Date
TWI220354B true TWI220354B (en) 2004-08-11
TW200513088A TW200513088A (en) 2005-04-01

Family

ID=34076619

Family Applications (1)

Application Number Title Priority Date Filing Date
TW92126517A TWI220354B (en) 2003-09-25 2003-09-25 The system and method for protecting digital content

Country Status (1)

Country Link
TW (1) TWI220354B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102035799A (en) * 2009-09-28 2011-04-27 广颖电通股份有限公司 Method and system for downloading servo data and portable storage device
TWI617938B (en) * 2013-07-02 2018-03-11 博世尼克資訊股份有限公司 Device of licensing program, device of purchasing program and method of licensing program thereof

Also Published As

Publication number Publication date
TW200513088A (en) 2005-04-01

Similar Documents

Publication Publication Date Title
US7908477B2 (en) System and method for enabling device dependent rights protection
US8612355B2 (en) Digital rights management provision apparatus, system, and method
Bechtold Digital rights management in the United States and Europe
US8533860B1 (en) Personalized digital media access system—PDMAS part II
US20090271319A1 (en) Embedded Licenses for Content
US20080271165A1 (en) Parameter-based interpretation of drm license policy
KR102617151B1 (en) Contents blockchain platform
US20120109784A1 (en) Method and system for automating protection of media files for download
US9239933B2 (en) Piracy prevention and usage control system using access-controlled encrypted data containers
JP4634392B2 (en) Content distribution program, method, server, content utilization apparatus and system
Hinkes Access controls in the digital era and the fair use/first sale doctrines
US20230245102A1 (en) Non Fungible Token (NFT) Based Licensing and Digital Rights Management (DRM) for Software and Other Digital Assets
TWI220354B (en) The system and method for protecting digital content
CN1759363A (en) Distribution and rights management of digital content
US20040015519A1 (en) Content delivery server and content delivery system having the same
KR20040031827A (en) Sysytem for authenticating a packaged digital contents and method thereof
Dekeyser et al. Digital archiving and copyright law: a comparative analysis
JP2004199180A (en) Auditing function associated with copyrighted matter reproduction on distribution system of electronic copyrighted matter
Pattrick et al. A secure digital asset managment network for game development and education
Schmucker Possibilities, Limitations, and the Future of Audiovisual Content Protection
Yadav Digital Right Management
KR20070032083A (en) System and method for enhancing device dependent rights protection
JP2008187419A (en) Content circulation system by utilizing track-back information

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees