TWI268080B - Method and system for session based watermarking of encrypted content - Google Patents

Method and system for session based watermarking of encrypted content Download PDF

Info

Publication number
TWI268080B
TWI268080B TW94100475A TW94100475A TWI268080B TW I268080 B TWI268080 B TW I268080B TW 94100475 A TW94100475 A TW 94100475A TW 94100475 A TW94100475 A TW 94100475A TW I268080 B TWI268080 B TW I268080B
Authority
TW
Taiwan
Prior art keywords
content
watermark
unencrypted
mark
encrypted
Prior art date
Application number
TW94100475A
Other languages
Chinese (zh)
Other versions
TW200533141A (en
Inventor
Andre Jacobs
Oscar V Zhuk
Glenn A Morten
Eric Bradley Shapiro
Original Assignee
Widevine Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Widevine Technologies Inc filed Critical Widevine Technologies Inc
Publication of TW200533141A publication Critical patent/TW200533141A/en
Application granted granted Critical
Publication of TWI268080B publication Critical patent/TWI268080B/en

Links

Landscapes

  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Storage Device Security (AREA)

Abstract

A method and apparatus applies a variety of session based watermarks in real-time to content that is streamed from a server towards a client. The invention employs content where differing targeted portions are selectively encrypted, such that other portions remain in the clear (unencrypted). Session information, such as an intended client, end-user, operator of a content server, content owner, and the like, may be used to generate the various watermarks. The watermarks may also be digitally signed and/or encrypted. The watermarks may be applied to the portions of the clear content as the content is streamed towards the client. In one embodiment, a bridge server is configured to modify packets of streaming media data files with the variety of watermarks. In another embodiment, the content server for the streaming media data includes a plug-in component that dynamically modifies the packets of streaming media data files with the variety of watermarks.

Description

1268080 九、發明說明: C韻^明戶斤屬控:娜^貝起^ 2 登明的拮術領Μ 本發明係大致有關防止數位盜拷的技術,且更確切來 5說,本發明係有關動態地利用水印標記來修改串流目標選 擇性加密内容的技術。 ί:先前技術3 登明的技術背景 網際網路的發展已為數位資訊的共享製造了很大的機 10會。近年來,已經可在網際網路上廣泛地取得呈串流媒體 形式的音訊與視訊數位資訊,進而提升了網際網路的普遍 性01268080 IX. Description of the invention: C rhyme ^ Minghu genus control: Na ^ Beiqi ^ 2 Deng Ming's antagonistic scorpion Μ This invention is generally related to the prevention of digital piracy, and more specifically, the invention is Techniques for dynamically utilizing watermark markers to modify serially targeted selective encrypted content. ί: Prior Art 3 The technical background of the Internet The development of the Internet has created a great opportunity for the sharing of digital information. In recent years, audio and video digital information in the form of streaming media has been widely available on the Internet, thereby increasing the popularity of the Internet.

串流媒體是一種網際網路資料傳輸技術,其允許終端使 用者能觀看並聆聽音訊與視訊資訊,而不需要冗長的下載 15日才間。主機或來源將在網際網路上對一接收到内容時便能 存取該内容的終端使用者〃串流〃小型資訊封包。典型地, 20 以大型串流媒體資料檔案來說,並無法在終端使用者裝置 上產生暫時性檔案。反之,典型地係在終端使用者裝置的 缓衝器中快取小型串流媒體資訊封包,且在已觀看到或聆 聽到資訊之後便很快地丟棄該等封包。 許多企業、#人、以及個人每天以串流媒體形式在網際 網路上張貼受版權保護的資料。實質上來說,任何能使用 個人電腦的人士均可讀取、複製、編輯並且甚至重新張貼 他們從網際網路取得的串流媒體資料檔案。不幸地,每 5 1268080 5 10 都料經授權者大量地複製數以千計受版權保護的串 體貧料檔案。此種數位媒體盜版問題日益 ^ 企業與個人的射敎。 重,進而導致 再者,因為可以把未經授權串流媒體資料__ ::使用者’往往相當難以判定數位媒體問題的原 峨紅舰 考里而揭露本發明。 本發明申請案係根據2004年1月9日提φ夕、, 利申請案卿535,357主張優先權,優以^ 律35U.S.C.§li9(e)而主張,該美國案以參方〆法 明中說明。 方式併入本發 【發明内容】 15Streaming media is an Internet data transfer technology that allows end-users to view and listen to audio and video information without the need for lengthy downloads for 15 days. The host or source will stream the small information packets on the Internet to end users who can access the content as soon as they receive the content. Typically, 20 in the case of large streaming media data files, temporary files cannot be generated on the end user device. Conversely, small stream media information packets are typically cached in the buffer of the end user device and are quickly discarded after the information has been viewed or heard. Many businesses, #人, and individuals post copyrighted material on the Internet daily in streaming media. In essence, anyone who can use a personal computer can read, copy, edit, and even repost the streaming media files they have obtained from the Internet. Unfortunately, every 5 1268080 5 10 authorizes a large number of copies of copyright-protected string-poor files. This digital media piracy problem is growing. This, in turn, leads to the disclosure of the present invention because it is possible to unauthorize streaming media material __:users, which are often quite difficult to determine the digital media problem. The application of the present invention is based on the fact that on January 9, 2004, the application of the case 535, 357 claims priority, and the law is 35U.SC §li9(e), the US case is based on the prescription Explain. The method is incorporated into the present invention.

20 含.ttr露—種用以在—網路上傳播内容的系統,其包 、.…且構以進行下列動作的—客戶機裝置. 以及提供與該請求相關聯的對話'X今, 下列動作的-電腦計算裝置:接收與該構以進行 話資訊;加宓兮肉六 /相關聯的該對 -部分維持為未力至少一部分,其中該内容的至少另 定—水:己㈣;至少部分地根據 =以及當對該客戶機裝置串流_ 加讀未加密部分時,㈣地套用該 : 密内容的至少_部分中。 ‘㈣亥未加20 containing .ttr dew - a system for propagating content on a network, its package, ... and configured to perform the following actions - a client device. And providing a dialog associated with the request 'X today, the following actions - a computer computing device: receiving and synthesizing the message; the pair of parts associated with the scorpion 6 is maintained as at least a portion of the content, wherein at least a portion of the content is - water: (four); at least partially According to = and when the unencrypted portion is streamed to the client device, (4) is applied to at least the portion of the secret content. ‘(四)海不加

6 1268080 以下將參照圖式來說明本發明不具限制性且並非完整 详盡的實施例。在圖式中,相同的元件編號係表示相同的 元件’除非特別指明出來。 為了更清楚地了解本發明,以下將參照本發明的詳細說 5明並且對照圖式來進行說明,在圖式中: 第1圖為一功能性方塊圖,其展示出一種用以實現本發 明環境的一實施例; 第2圖展示出一種伺服器裝置的實施例,其可用於實行 本發明的一種系統中; 10 第3圖展示出在本發明進展之各種不同階段中内容功 能性部件的一實施例;以及 第4圖為一邏輯流程圖,其根據本發明大致地展示出一 種用以官理目標選擇性預先加密内容上對話式水印標記之 程序的一實施例。 15 【實施方式】 較佳實施例的蔓細說明 以下將參照形成本發明之一部分的圖式來更完整地說 明本發明,並且將利用展示方來說明可實現本發明的特定 例示實施例。然而,本發明可體現於許多不同的形式中, 2〇且不應該被解釋為受限於本發明揭露的實施例;反之,係 為了此更π楚且更完整地說明本發明而提供該等實施例, 且該等實施例將完整地對熟知技藝者傳達本發明的内容。 再者,可把本發明體現為方法或裝置。因此,本發明可為 種完整的硬體實施例形式,或者可為一種完整的軟體實 7 1268080 例。以下的詳 ^例化式’或者可為結合軟體與硬體的實施 細說明因此不具限制性。 、 二以本發明係大致有關用以即時地把—對話式 己套用到從一伺服器串流至一客戶機之内容的方法 二、。本發明應用其不同目標部分已選擇性加密的内 ,,二使該内容的其他部分能維持為"純淨的(in the C (即未加密的)。可使用包括與預期内容伺服器、終端6 1268080 The following is a non-limiting and not exhaustive embodiment of the invention. In the drawings, the same element numbers indicate the same elements unless otherwise specified. In order to more clearly understand the present invention, the following description of the present invention will be described with reference to the drawings, in which: FIG. 1 is a functional block diagram showing a An embodiment of the environment; Figure 2 illustrates an embodiment of a server device that can be used in a system embodying the present invention; 10 Figure 3 illustrates content functional components in various stages of the progress of the present invention. An embodiment; and FIG. 4 is a logic flow diagram that generally illustrates an embodiment of a program for selectively pre-encrypting a conversational watermark on a content for a government object in accordance with the present invention. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT OF THE INVENTION The present invention will be described more fully hereinafter with reference to the accompanying drawings. However, the present invention may be embodied in many different forms, and should not be construed as being limited to the embodiments disclosed herein. Instead, the present invention is provided to provide a more complete and more complete description of the present invention. The embodiments, and the examples, will convey the subject matter of the present invention to those skilled in the art. Furthermore, the invention can be embodied as a method or apparatus. Thus, the invention can be in the form of a complete hardware embodiment, or can be a complete software embodiment 7 1268080. The following detailed description may be a detailed description of the implementation of the combined software and hardware, and thus is not limiting. The present invention is generally related to a method for instantly applying a conversational style to a content streamed from a server to a client. The invention applies to the fact that different target parts have been selectively encrypted, and the other parts of the content can be maintained as "pure (in the C (ie unencrypted). Included with the intended content server, terminal

10 使=、内容伺服器操作者、内容所有者等相關聯資訊的 :3=來產生至少一獨特水印標記。當對該客戶機串流 相谷時,可把該水印標記套用到該純淨内容的一部分 中。遠水印標記可隨後用來追縱該内容的來源、該内容的 所有權、該内容的不適切存取方式、該内容的不適切修改 方式等等。在一實施例中,可組構一水印標記橋接器以利 用夕種不同對活式水印標記來修改串流内容的封包。在另 1510 Let =, the content server operator, the content owner, etc. associate information: 3 = to generate at least one unique watermark. When the client stream is in phase, the watermark can be applied to a portion of the pure content. The far watermark can then be used to track the source of the content, ownership of the content, unsuitable access to the content, uncomfortable modification of the content, and the like. In one embodiment, a watermark marker bridge can be configured to modify the packets of the streaming content for different types of live watermarks. In another 15

一實施例中,該串流内容的内容伺服器包括一水印標記外 掛程式部件,其動態地利用至少一對話式水印標記來修改 串流内谷封包。此外,該水印標記的至少一部分可為已加 密及/或已取得數位簽章。可在辯論分析過程中進一步致能 水印標記的驗證及/或不可否認性。此外,藉著在一飼服器 端對該内容套用水印標記,而非於一客戶機端,本發明可 實際上減少對受信賴水印標記客戶機的需要。 创證環谙 第1圖為一功能性方塊圖,其展示出一種用以實現本發 明之作業環境100的一實施例。作業環境100僅為適當作 8 1268080 業環境的一實例,且在此並不意圖對本發明使用範圍以及 功旎性暗示任何限制性。因此,在不偏離本發明精神或範 圍的條件下,可以使用其他已知環境與組態。 如圖式中所示,作業環境100包括内容伺服器102、水 印標記橋接器104、網路105以及客戶機106至108。網 路105係與水印標記橋接器104以及客戶機1〇6至1〇8進 行通訊。水印標記橋接器104則另與内容伺服器102進行 通訊。In one embodiment, the content server of the streaming content includes a watermarking tagging component that dynamically utilizes at least one conversational watermark to modify the in-stream valley packet. Additionally, at least a portion of the watermark may be encrypted and/or a digital signature has been obtained. The verification and/or non-repudiation of the watermark can be further enabled during the debate analysis process. Moreover, by applying a watermark to the content at a feeding end, rather than a client, the present invention can actually reduce the need for a trusted watermarking client. CREATIVE CIRCUIT DIAGRAMS Figure 1 is a functional block diagram showing an embodiment of an operating environment 100 for implementing the present invention. The operating environment 100 is only an example of a suitable environment for the environment, and is not intended to imply any limitation as to the scope of the invention and its merits. Accordingly, other known environments and configurations may be utilized without departing from the spirit or scope of the invention. As shown in the figure, the work environment 100 includes a content server 102, a watermarked bridge 104, a network 105, and clients 106-108. The network 105 communicates with the watermark marker bridge 104 and the clients 1〇6 to 1〇8. Watermark tag bridge 104 is in turn in communication with content server 102.

内谷伺服102實質上包括經組構以便由對客戶機裝 1〇置106至108散佈内容之製造者、研發者及/或所有者使用 的任何電腦計算裝置。該種内容包括但不限於動態影片、 %〜、視汛、音樂、付費型節目(pay pe「V|ew、ppv)、隨 選視訊(Video on Demand、voD)、互動式媒體、音訊、靜 態影像、文字、圖形、以及可對客戶機裝置之使用者(例如 15客戶機裝置106至108)散佈的其他形式數位内容。例如, 可利用多種不同串流機制中的任一種來對一請求客戶機裝 置串流該種内容。 亦可組構内容祠服器102以便由從内容所有者取得權 利以複製並且散佈該内容的企業、系統等等來使用。内容 伺服器1G2可取得用以從—或數_容所有者複製且散佈 的權利。内容飼服器102可重新包裝、儲存、並且排程内 容以對客戶機裝置伽至⑽的其他内容提供者 者等進行後_售、分散並且提供授權。因此,雖心未 20 9 ^68080 ,來’内容飼服器1〇2可接收來自一"上行(upstream)〃 衷置的内容。 5 10 15 20 可把内容伺服11 1G2組構為能接收來自—客戶機裝置 ^歹^客戶機打⑽至1G8)而針對内容的_項請求,並 :該請求客戶機裝置串流該内容。在一實施例中,内容 =取可減咖讀川目標她預先加密 ’如^進—步所述般。在另—實施例中,在 电播占客戶機裝置串流㈣容之前,可把内容伺服器102 能選擇性加密至少某些該内容,例如客戶機裝置ι〇6 兮内、*在^ “例巾’當正對該請求客戶機裝置串流 邊内病,内容伺服器1Q2可加密該内容。 …如内容飼服器⑽般運作的裝置包括個人電腦、桌上型 電腦、多處理器系統、微處理器式或可編程式消費性電子、 網路PC、伺服器等。 、 從内^ 1 °己橋接益104組構成能接收串流内容,例如 服器102接收串流内容,並且藉著使至少-水印 細串流内容中來動態地部分修正該串流内容。 套用二Γ中水印標記橋接器104將接收該水印標記欲 _擇性加密内容。水印標記橋接器104可隨後 求客戶機進行水印標記串流内容的連續動 右^各戶機106至108 °水印標記橋接器104可另接 哭102所女…一〜鈿使用者、内容所有者、内容伺服 :$ —者等資訊’並且應用至少某些已接收資訊來產 X印^6己。可另把水印標記橋接器1G4組構為能 10 1268080 應用多種不同水印標記機制以使該至少一水印標記能包括 在該串流内容中。 口如a水印標記橋接器1()4般運作的裝置包括晶片式產 ^^在個人4、桌上型電腦、多處理器系統、微處 5理益式或可編程式消f性電子、網路%、健器中的應用 程式等等。因此,在-實施例中,水印標記橋接器1〇4包 1記憶體、儲存裝置、收發部件以及組構成可執行該應用 程式的一處理器。 再者,雖然在第1圖中係把水印標記橋接器1〇4展示為 ίο分離於内容伺服器102,本發明並不受限於此。例如,水 印以橋接器1G4可包含在内容伺服器1()2中而作為外掛 耘式。|^牛、應用程式、晶片、電路板等。因此,以下將參 Μ 2圖更詳細地朗健器裝置中之水印標記部件的一 貫施例。再者,可把水印標記橋接器、1〇4(及/或水印標記外 15掛耘式)組構為常駐在一種可查核與受信賴環境中。 可把網路1G5組構為能使—f腦計算裝置_合於另一 個计异裝置而使它們能進行通訊。將致能網路W5以 應用用以把資訊從-電子裝置傳遞到另一裳置的任何形式 電腦可讀媒體。同樣地,網路1〇5包括一無線介面及/或一 20有線介面,例如除了區域網路(LAN)與廣域網路(WAN)之外 的網際網路、例如透過通用串列匯流排(u s B)通訊埠的直接 連結、其他形式的電腦可讀媒體、或該等的任何組合。在 一組互連LAN上,包括根據不同架構與協定的UN,一路 由1§將作為LAN之間的—鏈路,進而使訊息能從一 an傳 11 1268080 5 10 15 20 送到另一 LAN。同樣地,LAN中的通訊鏈路典型地包括雙 扭線對或同軸電纜,而網路間的通訊鏈路可利用類比電話 線、包括ΤΙ、T2、T3與T4的完整或部分專屬數位線路、 整體服務數位網路(ISDN)、數位用戶線路(DSL)、包括衛星 鏈路的無線鏈路、根據多種不同標準的連結,包括IEEE 8〇2.1ia、802.llg、說Ub、或熟知技藝者已知的任何其 他通Λ鏈路。再者,遠端電腦與其他相關電子裝置可透過 :數據機以及暫時餘祕遠端地連接至_或咖。本 質上來說,網路105包括用以使資訊在客戶機裝置106至 108以及内容伺服器1〇2之間往來傳送的任何通訊機制。 如上所述地,心在軌鱗巾騎_㈣體係展示 ί二线Γ讀媒體’即通訊媒體。大致上來說,電腦可 匕括任何可由電腦計算裝置存取的媒體。電腦可續 媒體包括電腦儲存媒體、通訊媒體、«等之組合貝 典型地體現電腦可讀指令、資料結構、 4或調變資料信號令的其他資料,例如載波、次 ==傳輸機制,並且包括任何資訊遞; …… 心唬包括具有-或數個特徵组 等γ^γ改變以編糊#號中的資訊、指令、資料 =Γ,通訊媒體包括有線媒體,例如絞線對、 H域、料、以及其財 例如料务紅外線、以及其他無編/、線媒肢, 網路1()8#f上包括㈣在網路上(例如 路降另―個辑她接收㈣任何電腦計算 12 1268080 裝置,例如從内容伺服器l〇2、水印標記橋接器104等。 客戶機裝置至1〇8亦包括能夠接收應用其他機制之内 容的任何電腦計算裝置,其包括但不限於CD、DVD、磁帶、 電子記憶體裝置等。該等裝置包括典型地利用有線通訊媒 5體連結的裝置,例如個人電腦、多處理器系統、微處理器 式或可編程式肖費性電子、網路PC等。該種裝置亦包括典 型地利用無線通訊媒體連結的裝置,例如蜂巢式電与、知 慧型電話、呼叫态、手提無線發話機、射頻(RP:)裝置、矣 外線(IR)裝置、CB、結合一或數個前述裝置的整合式裝置 10等。客戶機裝置106至108亦為能夠利用有線或無線通訊 媒體連結的任何裝置,例如PDA、掌上型電腦、穿戴气带 腦、以及任何其他經配備以在有線及/或無線通訊媒體 收並播放内容的裝置。 15The inner valley servo 102 essentially includes any computer computing device that is configured for use by the manufacturer, developer, and/or owner of the content of the client device 106 to 108. Such content includes but is not limited to dynamic movies, %~, video, music, paid programs (pay pe "V|ew, ppv", video on demand (voD), interactive media, audio, static Images, text, graphics, and other forms of digital content that may be distributed to users of client devices (e.g., 15 client devices 106-108). For example, one of a plurality of different streaming mechanisms may be utilized to authenticate a requesting client. The device device streams the content. The content server 102 can also be configured for use by a company, system, etc. that obtains rights from the content owner to copy and distribute the content. The content server 1G2 can be obtained from - Or the right of the owner to copy and distribute. The content feeder 102 can repackage, store, and schedule the content to post-sell, distribute, and provide other content providers or the like to the client device gamma (10). Authorization. Therefore, although the heart is not 20 9 ^68080, the content server 1〇2 can receive content from one "upstream.” 5 10 15 20 The content servo 11 1G2 can be configured as Can receive From the client device (10) to 1G8), the request for the content is requested, and the requesting client device streams the content. In an embodiment, the content = the decrementable target She pre-encrypts the 'step as described.' In another embodiment, the content server 102 can selectively encrypt at least some of the content, such as a client, before the broadcaster occupies the client device stream (4). The device ι 〇 6 * * * * 例 例 例 例 例 例 例 例 例 当 当 当 当 当 当 当 当 当 当 当 当 当 当 当 当 当 当 当 当 当 内容 内容... devices that operate like a content server (10) include personal computers, desktop computers, multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, servers, and the like. The set of 104 packets can receive the stream content, for example, the server 102 receives the stream content, and dynamically corrects the stream content by causing at least the watermark stream content to be partially modified. The watermark marker bridge 104 is applied to receive the watermark to selectively encrypt the content. The watermark marker bridge 104 can then request the client to perform a watermark to mark the streamed content of the stream. The households 106 to 108. The watermark marker bridge 104 can additionally cry 102 women... a user, content owner , content server: $ - person and other information ' and apply at least some of the received information to produce X printing ^ 6 own. The watermarking bridge 1G4 can be further configured to apply a plurality of different watermarking mechanisms to enable the at least one watermark to be included in the streaming content. The device functions as a watermark marker bridge 1 () 4, including a wafer type production system, a personal computer 4, a desktop computer, a multi-processor system, a micro-location, or a programmable electronic device. Network %, applications in the health device, and more. Thus, in an embodiment, the watermark marker bridge 1 〇 4 pack 1 memory, storage device, transceiver component, and group constitute a processor that can execute the application. Furthermore, although the watermark mark bridge 1〇4 is shown as being separate from the content server 102 in Fig. 1, the present invention is not limited thereto. For example, the watermarked bridge 1G4 can be included in the content server 1() 2 as an external plug. |^牛, application, chip, board, etc. Therefore, a more detailed description of the watermarking component in the Langer device will be described in more detail below. Furthermore, the watermarking bridge, 1〇4 (and/or watermarking) can be configured to reside in a checkable and trusted environment. The network 1G5 can be configured to enable the -f brain computing device to be combined with another metering device to enable them to communicate. The network W5 will be enabled to apply any form of computer readable media for transferring information from the electronic device to another shelf. Similarly, the network 1〇5 includes a wireless interface and/or a 20 wired interface, such as an Internet other than a local area network (LAN) and a wide area network (WAN), such as through a universal serial bus (us) B) Direct link to the communication port, other forms of computer readable media, or any combination of these. On a set of interconnected LANs, including UN according to different architectures and protocols, a route 1 § will act as a link between the LANs, thereby enabling messages to be sent from one pass 11 1268080 5 10 15 20 to another LAN. . Similarly, communication links in a LAN typically include twisted pair or coaxial cable, and communication links between the networks can utilize analog telephone lines, complete or partial dedicated digital lines including ΤΙ, T2, T3, and T4, Integrated Services Digital Network (ISDN), Digital Subscriber Line (DSL), wireless links including satellite links, links to a variety of different standards, including IEEE 8〇2.1ia, 802.11g, Ub, or well-known artisans Any other wanted links known. Furthermore, the remote computer and other related electronic devices can be connected to the _ or coffee via the data machine and the temporary secret. Essentially, network 105 includes any communication mechanism for communicating information between client devices 106-108 and content server 102. As mentioned above, the heart-in-the-scale scale towel ride _ (four) system shows ί second-line reading media 'that is communication media. In general, a computer can include any medium that can be accessed by a computer computing device. Computer-renewable media, including computer storage media, communication media, etc., typically embody computer readable instructions, data structures, 4 or other information that modulates data signals, such as carrier, secondary == transmission mechanisms, and includes Any information delivery; ...... 唬 唬 includes γ γ changes with - or several feature groups to compile the information, instructions, data = Γ in #, communication media including wired media, such as twisted pair, H domain, Materials, as well as its wealth, such as infrared, and other non-linear / line media, network 1 () 8 # f includes (four) on the network (such as road drop another - she receives (four) any computer computing 12 1268080 Devices, such as from content server 102, watermark flag bridge 104, etc. Client devices to port 8 also include any computer computing device capable of receiving content for other mechanisms of application, including but not limited to CD, DVD, tape Electronic memory devices, etc. These devices include devices that are typically connected by a wired communication medium, such as a personal computer, a multi-processor system, a microprocessor or a programmable device, or a network. PCs, etc. Such devices also include devices that are typically connected using wireless communication media, such as cellular and personal, telepresence phones, call states, portable wireless transmitters, radio frequency (RP:) devices, and infrared (IR) devices. , CB, integrated device 10 incorporating one or more of the aforementioned devices, etc. Client devices 106-108 are also any devices that can be connected using wired or wireless communication media, such as PDAs, palmtop computers, wearable air brains, and Any other device that is equipped to receive and play content on wired and/or wireless communication media. 15

20 、 、衣一——二丄…-吼傅μ使終端使用者能 要求内容、能接收該内容、並且能播放該内容的_客戶機。 =客戶機亦提供其他動作,其包括但不限於:使該客戶機 衣置的其他部件能執行、致能與另一個 使用者等連介面。 *置、終端 因此’客戶機裝置106至108可應用多種不同裝置中 :任-種來享受該内容’其包括但不限於:電腦顯示系统、 :訊系統、自動唱機、機上盒(STB)、電視、視訊顯示裝置 :。:如’客戶機裝置106至108可包括經組構以接收串 机内谷育料封包的voD媒體播放器。客戶機裝置伽至1〇8 可應用該VoD媒體播放器(及/或另—個裳置)來處理串流内 13 1268080 合貝料封包以把它們轉換為聲音及/或圖像。亦可把客戶ι 裝置106至108組構為能把串流内容視為一固定串流而= 供給為終端使用者把該内容轉換為聲音或圖片的 ^ 用程式(未顯示)。 應 5 *戶機裝置1%至1(38可另接收該内容作為目標選擇 性加进内容,因而必須先解碼内容才能享受内容。因此, 在一實施例中,客戶機裝置1〇6至1〇8包括組構成可 該目標選擇性加密内容的一應用程式。 ⑴20, 衣一——二丄...-吼傅μ enables the end user to request content, a client that can receive the content, and can play the content. The client also provides other actions, including but not limited to: enabling other components of the client to perform, enabling the interface with another user. *Setting, terminal, therefore, 'client devices 106 to 108 can apply a variety of different devices: any kind of enjoy the content' including but not limited to: computer display system, : communication system, jukebox, set-top box (STB) , TV, video display device:. The 'client devices 106-108 may include a voD media player that is configured to receive the in-line nurturing packets. The client device homing to 1 〇 8 can apply the VoD media player (and/or another slap) to process the 13 1268080 hex packet in the stream to convert them into sound and/or images. Clients ι devices 106 through 108 can also be configured to treat streaming content as a fixed stream = supply a program (not shown) for the end user to convert the content into a sound or picture. 5* household equipment 1% to 1 (38 may additionally receive the content as a target selective addition content, and thus the content must be decoded first to enjoy the content. Therefore, in an embodiment, the client device 1〇6 to 1 〇8 includes an application that constitutes a selectively encrypted content for the target. (1)

Mil复腦計算裝置 10 第2圖根據本發明的一實施例展示出一種電腦計算裝 置的—實施例。除了展示出的部件之外,電腦計算裝置2卯 可包括更多的部件。然而,已展示的部件已足以揭露用以 實現本發明的例證實施例。例如,電腦計算裝置2〇〇可代 表具有一水印標記外掛程式部件之一内容伺服器的另一個 15 實施例。 电腦计异裝置200包括處理單元212、視訊顯示適配器 214以及大型記憶體,其均透過匯流排222彼此連通。該 大型記憶體大致上包括RAM 216、ROM 232、以及一或數 個永久大型儲存裝置,例如硬碟機228、磁帶機、光碟機、 2〇及/或軟碟機。大型記憶體儲存用以控制電腦計算裝置2〇〇 運作的作業系統220。可以應用任何一般用途作業系統。 亦備置基本輸入/輸出系統(、'Bi〇s〃)218以控制電腦計算裝 置200的低階運作。如第2圖所展示地,電腦計算裝置2Q0 亦透過網路介面單元21〇(其係針對與包括Tcp/Ip協定之 14 1268080 α種不同通喊定結合使用而建構)與網際網路或某些其 他通訊網路(例如展示於第1圖中的網路105)進行通訊^網 :)面單元210有時稱為收發器、收發裝置或網路介面卡 5如上所述’該大型記憶體展示出另-類型的電腦可讀媒 體,即電腦儲存媒體。電腦健存媒體包括可利用任何方法 或技術實行以儲存資訊的依電性、非依電性、可移除式/、 以及不可移除式媒體,例如電腦可讀指令、資料結構、程 式模組或其他資料。電腦儲存媒體的實例包括_、咖、 10 EEPR0M、快閃記憶體或其他記憶體技術、cd_r〇m、數位 多用途光碟(DVD)或其他光學儲存體、磁性卡匠、磁帶、磁 性碟片儲存體或其他磁性儲存裝置、或者可用來儲存所欲 資訊並且可由電腦計算裝置存取的任何其他媒體。 電腦計算裝置2GG亦包括用以傳送並接收電子郵件的 15 SMTP處理常式應用程式、用以接收且處理Ηπρ請求的 ΗΠΤΡ處理常式應用程式、以及用以處理安全連結的 處理常式應用程式。該HTTPS處理常式應用程式可利用安 全方式起始與外部應用程式進行的通訊。 電腦計异裝置200亦包括用以與外部裝置進行通訊的 2〇輸入/輸出介面224,例如滑鼠、鍵盤、掃描器或未顯示在 第2圖的其他輸入裝置。同樣地,電腦計算裝置2〇〇另包 括額外的大型儲存設備,例如CD-ROM/DVD-ROM光碟機 226以及硬碟機228。硬碟機228可用來儲存應用程式、 資料庫、客戶機裝置組態資訊、政策方針等。 15 1268080 該大型記憶體亦料程式碼與資料。將把-或數個應用 程式250載入到大型記憶體中,並且使其在作業系統22〇 中執订。應用程式的實例包括但不限於··轉碼程式、排程 程式、日程表程式、資料庫程式、文字處理程式、Ηπρ程 5式、音訊播放器、視訊播放器、V〇D播放器、解碼器、解 密器、PPV播放器、連接到STB的介面程式、連接到電視、 視訊攝影機的介面程式等。大型儲存另包括例如對話管理 器(SM)252、内容儲存處254、以及水印標記外掛程式256 的應用程式。 1〇 可把SM 252組構成可管理來自客戶機裝置而針對内容 的一項請求。因此,SM 252可接收該請求、找到該内容、 並且提供該内容給一水印標記部件,例如水印標記外掛程 式256、水印標記橋接器等。 SM 252可另接收例如預期客戶機裝置、終端使用者、 15内容伺服器操作者之識別符、内容所有者之内容識別符等 對話資訊。SM 252可隨後提供該對話資訊給該水印標記部 件以供產生一水印標記。 SM 252亦接收來自一上行提供者的内容。在一實施例 中,已接收内容係目標選擇性地預先加密。SM 252可隨後 2〇把目標選擇性預先加密内容儲存在内容儲存處254中。在 另一實施例中,可把SM 252組構成可接收未加密内容並且 進行該内容的目標選擇性加密動作。例如,S(Vj 252可檢 視、剖析、並且選擇性加密該内容的不同目標部分。在一 實施例中,當接收到該内容時及/或在對該水印標記部件提 16 1268080 供該内容時’ SM 252可即時選擇性加密該内容的目 性σ所达的方案。然而,心52並不限於目標選 擇十加雄,亚且實質上在不偏離本發明精神或範圍的停件 下,可應用能加密該内容之部分的任何其他機制。 一内容儲存處254實質上包括任何組構成能儲存且取回 内容(包括檔案、資料庫、應用程式、資料失 等)的部件。 錄 10 15 20 可把水印標記外掛程式256組構成在傳輸到 戶機之前謂㈣串⑼錢供水印標記。水特記 程…運作實質上相似 = 1〇4的運作。例如,水印 己橋接益 己外掛程式256可應用對話資 訊末對_容套用多種不 ' 計算裝置200對該請求客戶機^式水印心電腦 各戶機串流該内容時,對話式水印 錢包括即時地對該内容套用該水印標記。 一尺印己外掛程式256可選擇並且對該内容中維持純 淨的部分套用各種不同的水印標記,如以下參照第3圖所 返再者,水印標記外掛程式256可利用不同於用以加密/ 解铪该内容之金鑰的一密螞金鑰來另加密及/或數位簽署 忒水印標記。該等水印標記密碼金鑰典型地為該請求客戶 機未知且不可得的,因此能保護該水印標記受到竄改或惡 思的攻擊,並且可在對該内容進行辯論分析時致能水印標 5己的驗證及/或不可否認性。因此,該客戶機裝置並無法解 岔該水印標記。在一實施例中,該密碼金鑰為一對稱金鑰; 17 1268080 的條件下,亦可使用非 然而,在不偏離本發明精神或範圍 對稱金鑰。 5 10 極官在弟谢係把水印標記外掛程式况展示為電腦 ^异裝置200的-'、外掛程式"應用程式本發明並不受限 署彳纟P才不°己外掛程式256可常駐在電腦計算裝 置200的一分別卡片、晶片等上。 再者’雖然SM 252、内容儲存處⑸以及水印標記外 卜程式256係展示為不_部件,本發明並不受限於此。 例如,可把SM 252與内容儲存處⑸實行為—單一整合 2。再者’水印標記外掛程式256可常駐在另—個電腦 计异裝置中(例如第1圖的水印標記橋接器⑽),並且不 於電腦計算裝置200。 主逆標記串流媼體 簡單來說,-對話式水印標記包括插人職位影像、音 15訊及/或視訊資料檔案、或串流中的—數位信號或型樣。因 為已插入數位信號或型樣並未出現在原始資料播案的未變 更副本中,該數位水印標記可作為已複製資料楷案的一數 位簽章。例如,可使用水印標記來把著作權通知嵌入到該 資料檔案中。對該資料槽案的各個副本來說,一既定水印 20標記可為獨特的以便能識別預期接收者,或者該既定水印 標記對該資料檔案的多個副本可為共同的,以便能識別出 文件來源。再者,對一般觀看者來說,水印標記 可見的,進而促進所有權的主張、著作權收益的接收匕疋或 能成功地對未經授權使用資料檔案行為提出訴訟。 18 1268080 在對串流媒體資料檔 須要知道媒體槽索格式。某^ p標記的傳統方法尹,必 縮-串流媒體資料檔案(或_、=水印標記方法需要解壓 隨後重新壓’縮該槽案(或部 加入。亥水印標記’互 流媒體資料襠案格式仍维持刀:而’因為許多目前的串 分辨出來,傳統水印伊方:f生的,並且無法容易地 本發明提供對話式水:標二=到限制,’ 泛地知道諸_袼心此外續種枝’其不需要廣 本發明允許預先加密該串流包括-水印標記之前, 10 15 該内容的安全性位準。 纟至〉'—部分,藉此增加 料/孝HttTT用之數種用以產生針對串流媒體資 低案產生對封水印標記的方法。因為單_ 術漸漸地因為不適切構件而受 ^ 限制,本發明提供多個對 仏記方法。再者,運作上來說,本發日月可使用二 種或數_崎-既以容錢賴财印標記的方法r A_產生替代訊括 難现歷此方法儲存選定Μ_潛在替代 訊框以供後續替換之用。將掃描欲進行水印標記的串流媒 2〇體貧料檔案,並且摘取出選定的訊框。在本發明的-實施 例中,-既定串流媒體資料檔案的各個已摘取訊框係備置 有-序號部分’例如單一數字。該序號可代表文件 預期客戶機接收者的獨特識別符。該序號部分可位於_ 讯框中以降低在傳輸訊框到客戶機裝置1〇6 i 1〇8的過程 19 1268080 中發生遺失的困擾。亦可把該序號的數字依依地附貼到分 別訊框中。 當一客戶機要求一特定串流媒體資料檔案時,可使用已 選出的水印標記訊框來置換該原始串流媒體資料檔案中的 5 未標示訊框。 例如,此種方法可用於水印標記外掛程式常駐在該内容 伺服器的系統中。使用此種方法可包括剖析該串流媒體資 料檔案以找出有關該請求客戶機的獨特資訊,並且使用該 獨特資訊以在行進中產生具有水印標記的訊框。 10 2.動態媒體資料修正:此種方法將解壓縮、修正、並且 重新壓縮串流媒體資料檔案資料封包。將把已修正資料封 包傳送到該請求客戶機,而不是傳送到原始串流媒體資料 檔案資料封包。 3. 黑暗訊框置換:在此種方法中,實質上所有長串流媒 15 體視訊資料檔案包括黑色訊框。在一實施例中,將利用識 別出串流媒體視訊資料檔案來源的水印標記來儲存黑色訊 框。在本發明的另一實施例中,當一客戶機要求串流媒體 時,便利用獨特請求客戶機識別符而以水印標記標示出黑 色訊框。當把串流媒體傳送到該請求客戶機時,將使用具 20 有水印標記的黑色訊框而在行進中置換選定的黑色訊框。 4. 共同閘道介面應用程式:此種方法可令用於網路伺服 器的水印標記能修改可下載的媒體資料檔案格式或靜態影 像等。 20 1268080 此财讀制Μ水印 插入到靜態影像資料格式與音訊格式卜 ' 5 10 15 20 倾供錢正崎技之數位 =型的資訊。例如,定義資料包括有關該串流媒體資 料檔案之訊框率㈣訊。在此财法的—實施财,將把 未使用資料插入到定義資斜由 _ H ㈣中,以便對該串流媒體提供_Mil Compound Brain Computing Device 10 FIG. 2 shows an embodiment of a computer computing device in accordance with an embodiment of the present invention. In addition to the components shown, computer computing device 2A can include more components. However, the components that have been shown are sufficient to disclose illustrative embodiments for implementing the invention. For example, computer computing device 2 can represent another 15 embodiment of a content server having one of the watermark tag plug-in components. The computer-counting device 200 includes a processing unit 212, a video display adapter 214, and a large memory that are all in communication with each other through the bus bar 222. The large memory generally includes a RAM 216, a ROM 232, and one or more permanent large storage devices such as a hard disk drive 228, a tape drive, a compact disc drive, and a floppy disk drive. The large memory stores an operating system 220 for controlling the operation of the computer computing device 2 . Any general purpose operating system can be applied. A basic input/output system ('Bi〇s〃) 218 is also provided to control the low-level operation of the computer computing device 200. As shown in Fig. 2, the computer computing device 2Q0 is also configured through the network interface unit 21 (which is constructed in conjunction with the 14 1268080 alpha different combinations including the Tcp/Ip protocol) and the Internet or a certain Some other communication networks (such as the network 105 shown in FIG. 1) are used to communicate: the face unit 210 is sometimes referred to as a transceiver, transceiver, or network interface card 5 as described above. Another type of computer readable medium, namely a computer storage medium. Computer-based media includes power-dependent, non-electrical, removable/, and non-removable media that can be stored by any method or technology, such as computer readable instructions, data structures, and program modules. Or other information. Examples of computer storage media include _, coffee, 10 EEPR0M, flash memory or other memory technology, cd_r〇m, digital versatile disc (DVD) or other optical storage, magnetic card maker, tape, magnetic disc storage Body or other magnetic storage device, or any other medium that can be used to store the desired information and can be accessed by a computer computing device. The computer computing device 2GG also includes a 15 SMTP processing routine application for transmitting and receiving emails, a processing routine application for receiving and processing Ηπρ requests, and a processing routine application for processing secure links. The HTTPS processing routine application can initiate communication with external applications in a secure manner. The computer-counting device 200 also includes a 2-inch input/output interface 224 for communicating with external devices, such as a mouse, keyboard, scanner, or other input device not shown in FIG. Similarly, computer computing device 2 includes additional large storage devices such as CD-ROM/DVD-ROM drive 226 and hard drive 228. The hard disk drive 228 can be used to store applications, databases, client device configuration information, policy guidelines, and the like. 15 1268080 This large memory also contains code and data. The - or several applications 250 will be loaded into the large memory and bound in the operating system 22A. Examples of applications include, but are not limited to, transcoding programs, scheduling programs, calendar programs, database programs, word processing programs, Ηπρ程5, audio players, video players, V〇D players, decoding Device, decryptor, PPV player, interface program connected to STB, interface program connected to TV, video camera, etc. The large storage also includes applications such as a dialog manager (SM) 252, a content store 254, and a watermark tag plugin 256. 1 The SM 252 group can be configured to manage a request for content from a client device. Accordingly, the SM 252 can receive the request, find the content, and provide the content to a watermarking component, such as a watermarking tag 256, a watermarking bridge, and the like. The SM 252 may additionally receive dialog information such as an expected client device, an end user, an identifier of the 15 content server operator, a content identifier of the content owner, and the like. The SM 252 can then provide the dialog information to the watermarking component for generating a watermark. The SM 252 also receives content from an upstream provider. In an embodiment, the received content is selectively pre-encrypted. The SM 252 can then store the target selective pre-encrypted content in the content store 254. In another embodiment, the SM 252 group can be configured to receive unencrypted content and perform targeted selective encryption of the content. For example, S (Vj 252 can view, parse, and selectively encrypt different target portions of the content. In an embodiment, when the content is received and/or when the content is provided for the watermarked component 16 1268080 The SM 252 can instantly selectively encrypt the scheme of the content σ of the content. However, the heart 52 is not limited to the target selection of the ten-plus, and substantially, without substantially departing from the spirit or scope of the present invention, The application applies any other mechanism that can encrypt portions of the content. A content store 254 essentially includes any group of components that can store and retrieve content (including files, databases, applications, data, etc.). Record 10 15 20 The 256 sets of watermark mark plug-in programs can be formed before the transfer to the household machine (4) string (9) money for watermark mark. Water special record... operation is substantially similar = 1〇4 operation. For example, the watermark has been bridged to the external plug-in 256 When the application dialog information is used to stream the content to the request client, the dialog watermark includes the instant The watermark is marked with the watermark. The one-foot print plug-in 256 can select and apply various watermark marks to the purely clean portion of the content. As will be described below with reference to FIG. 3, the watermark mark plug-in 256 can utilize different Encrypting and/or digitally signing a watermark in a secret key used to encrypt/undo the key of the content. The watermarking cryptographic keys are typically unknown and unavailable to the requesting client, Therefore, the watermark mark can be protected from tampering or swearing attack, and the verification and/or non-repudiation of the watermark mark can be enabled when the content is debated and analyzed. Therefore, the client device cannot solve the problem. Watermark mark. In an embodiment, the cryptographic key is a symmetric key; under the condition of 12 1268080, it can also be used without symmetrical key without departing from the spirit or scope of the present invention. The watermark mark plug-in program is displayed as a computer-isolator 200-', plug-in program" application program, the invention is not limited, the system is not limited to the plug-in program 256 can be resident in the computer A separate card, wafer, etc. of the computing device 200. Further, although the SM 252, the content storage (5), and the watermarking external program 256 are shown as non-components, the present invention is not limited thereto. For example, The SM 252 and the content storage (5) are implemented as a single integration 2. Furthermore, the 'watermark tag plug-in 256 can be resident in another computer-counting device (for example, the watermark marker bridge (10) of Figure 1), and is not computer Computing device 200. Main reverse tag stream body In a nutshell, a dialog watermark includes a position image, a sound 15 and/or a video data file, or a digital signal or pattern in a stream. The inserted digital signal or pattern does not appear in the unaltered copy of the original material broadcast, and the digital watermark can be used as a digital signature for the copied data file. For example, a watermark can be used to embed a copyright notice into the data archive. For each copy of the data slot case, a predetermined watermark 20 tag can be unique to identify the intended recipient, or the predetermined watermark can be common to multiple copies of the data file so that the file can be identified source. Furthermore, for the average viewer, the watermark is visible, thereby promoting the claim of ownership, the receipt of copyright proceeds, or the successful prosecution of unauthorized use of the data file. 18 1268080 In the streaming media data file, you need to know the media slot format. The traditional method of a ^ p mark Yin, must shrink - streaming media data file (or _, = watermark mark method needs to be decompressed and then repressed 'shrink the groove case (or part added. Hai watermark mark 'interflow media data file The format still maintains the knife: and 'because many of the current strings are distinguished, the traditional watermark is: and can't easily provide the conversational water of the invention: the standard two = to the limit, 'the general knowledge of the _ heart is continued It is not necessary to broaden the invention to allow pre-encryption of the stream including - before the watermark is marked, 10 15 the security level of the content. 纟 to > '- part, thereby increasing the material / filial HttTT for several uses In order to generate a method for marking a watermark for a streaming media asset case, the present invention provides a plurality of methods for recording watermarks because the single-process is gradually limited by the unsuitable component. Furthermore, in operation, this is The sun and the moon can use two or several _ saki - the method of using the mark of the money to print the mark r A_ to generate a substitute message, this method is used to store the selected Μ _ potential replacement frame for subsequent replacement. Scan for watermarking The media 2 is in a lean file and the selected frame is extracted. In the embodiment of the present invention, each of the extracted frames of the predetermined streaming media data file is provided with a - serial number portion such as a single The serial number represents the unique identifier of the intended recipient of the file. The serial number portion can be located in the frame to reduce the loss in the process of transmitting the frame to the client device 1〇6 i 1〇8 19 1268080 Trouble. The number of the serial number can also be attached to the different frames. When a client requests a specific streaming media data file, the selected watermarking frame can be used to replace the original streaming media. 5 unmarked frames in the data file. For example, this method can be used in a watermark tag plugin resident in the content server system. Using this method can include parsing the stream media data file to find out the request. Unique information of the client, and use this unique information to generate a frame with watermark mark on the move. 10 2. Dynamic media data correction: This method will decompress, correct, And recompressing the streaming media data archive data packet, the corrected data packet will be transmitted to the requesting client instead of being transmitted to the original streaming media data archive data packet. 3. Dark frame replacement: In this method, In essence, all of the long stream media 15 video data files include a black frame. In one embodiment, the black frame will be stored using a watermark that identifies the source of the streaming media video file. Another implementation of the present invention In an example, when a client requests streaming media, it is convenient to use a unique request client identifier to mark a black frame with a watermark. When the streaming media is delivered to the requesting client, a watermark of 20 will be used. Mark the black frame and replace the selected black frame while traveling. 4. Common Gateway Interface Application: This method allows the watermark tag used for the web server to modify the downloadable media data file format or static. Imagery, etc. 20 1268080 This financial system reads the watermark and inserts it into the static image data format and audio format. ' 5 10 15 20 The price of the money is positive. For example, the definition information includes the frame rate (four) of the streaming media data file. In this financial law-implementation, the unused data will be inserted into the definition of _H (4) in order to provide the streaming media _

獨特水印標記。在此方法的 A ☆的另一貫施例中,將利用編碼水 印標記的有效但不自然順序來錄製該定義資料。 3_狂缝此種方法蓄意地把串㈣體資料π 框丢棄在統計方法賴為切標記的—種魏中。在此種 方法的-實麵中,可在龍串流制品質產生最小負面 影響的狀況下,丢棄中間訊框(稱為ρ訊框卜 4_縫私:在此實施例中,將把看不到或者聽不到但 -有水印;^的資料訊框插人到串流媒體資料檀案中。 料到封包土:將把額外無用資訊位元組 力山口入到資料封包末端以表示—水印標記。將把該水印標記 甘入入在已加入的外來位元組數量中。 ^ 實料到封包t:此實施例將把具有水印標 記的有用資料附貼到選定的串流媒體資料封包中。 丁 %JL· :用以嵌入水印標記的實施例 提供-位獨特接收者之識別符的選定數字、或不同串流媒 21 1268080 己資料訊框的 體資料訊框的來源識別符,以使具有水印襟t 組合能包括整個獨特識別符。 式水印標記技 件下,可以使 然而,本發明並不受限於上述的數位對話 術。例如,在不偏離本發明精神或範圍的條 5用傅利葉轉換技術、離散餘弦轉換技術等。 通用運作 以下將參照第3®與第4圖來說明本發明某些方面的運 作。第3圖展示出本發明各種不同階段中之内容功能性部 ίο件的一實施例。第3圖可作為當内容經歷對話式水印標記 機制時,轉換内容的一實例,例如展示於第4圖中的方 如第3圖所示,内容轉換3〇〇包括純淨内容3〇2、目栌 與選擇性加密内纟304、對話式水印標記内容3〇6、以及= 解碼水印標記内容308。在一實施例中,純淨内容3〇2與 15目標與選擇性加密内容3〇4可常駐在内容所有者管理的二 電腦計算裝置中。 純淨内容302包括純淨部分320至323。純淨部分32〇 至323代表内容3〇2之多個不同部分的任何部分。再者, ,内容3G2代表多種不同内容格式。例如,可以利用動 0您圖象專家組(MPEG)袼式來格式化純淨内容3〇2。純淨内 容淑並不限於MPEG内容格式,且在不偏離本發明精神 或乾圍的條件下可以使用其他的内容格式 ’包括JPEG格 、 3袼式4。然而,本發明使用的MPEG格式僅為一 具例,且係為了展示方面而使用。 22 !?68080 、間單來說,MPEG是-细於數位傳播内容的編碼與壓 縮標準。MPEG對視訊傳播内容的電視品質傳輸方式提供壓 縮支援。再者,MPEG提供經壓縮音訊、控制,甚至是使用 者傳播内容。 5 MPE(^容流包括封包化基礎^(PES),其典型地包括 整數數量之基礎串流(ES)存取單元的固幻或可變大小)區 塊或訊框。ES典型地為MPEG内容流的基本部件,並且包 • 她位控制貧料、數位音訊、數位視訊以及其他數位内容 (同步的或異步的)。-組緊_合的pES封包(其實質上稱 10為相同時基)包含MPEG程式串流(PS)。各個PES封包亦可 刀成稱為MPEG傳輸串流(TS)而具有固定大小的傳輸封 包,此形成合併一或數個内容流的一種一般用途方法,可 犯地包括獨立時基。再者,mpeg訊框包括中間訊框(丨_訊 框)、轉送預測訊框(p_訊框)、以及雙向預測訊框(B_訊框)。 15 因此,純淨部分320至323各包括可根據不同準則而 鲁 分為多個資料單元的純淨内容302部分。例如,純淨部分 320至323包括從視訊基礎串流(ES)、音訊ES、數位資料 以及内谷流之視訊、音訊、貧料基礎串流之任何組成 中抽取出的資料部分。例如,純淨部分320至323可由十 20 個視訊ES的第二部分組成。再者,純淨部分320至323 可不需要包括與純淨内容302相同的長度、密度等。 可把目標與選擇性加密套用到視訊基礎串流(ES)、音訊 ES、數位資料ES以及視訊、音訊、資料基礎串流之任何部 分的任何組成(其包含純淨内容302),以把其轉換為目標與 23 !268〇8〇 選擇性加密内容304。目標與選擇性加密另包括選擇性加 密I-訊框、P-訊框、B-訊框的至少一部分,以及p_訊框、 1訊框與l·訊框的任何組合’以產生目標與選擇性加密内 容304。然而,在某些情況中,所欲的是,純淨内容3〇2 5 的某些部分維持為純淨的,以使請求客戶機裝置可進行該 内容的特技播放方式,例如迴轉、重放、智慧式暫停等。 如第3圖所示,目標與選擇性加密内容304展示出作為已 加密部分(330與332)的二個部分。 當目標與選擇性加密内容304串流到第1圖的水印標記 10橋接器1〇4、第2圖的水印標記外掛程式部件256等時, 將如上所述地把至少一對話式水印標記套用到該純淨内容 的至少一部分(331及/或323)中。藉著如以下所述地包括 至J/ 一對話式水印標記,可把目標與選擇性加密内容304 轉換為對話式水印標記内容3〇6。 5 在一實施例中,亦可把目標與選擇性加密套用到一水印 軚,己中。例如’可把水印標記解壓縮為至少二個部分。一 吾:分可能包括客戶機裝置位址的最重要位元。此部分可為 選擇性加松的目標。其他部分可包括該資訊中較不重要的 4元例如各戶機名稱等。例如,水印標記的此部分可維 持為純淨的。因此,水印標記純淨部分與另包括 、准持為純淨或進一步加密的子部分。然而,此種加密方式 很可&使用不同於用以另外加密已加密部分33〇與332之 密碼金鑰的一密碼金鑰。 24 1268080 當由請求客戶機裝置接收對話式水印標記内 時’將解密已加密部分330與332以產生已解密水印 内容308。如果已解密水印標記内容3〇8包括已加密= 標記的話,該水印標記便維持為已加密的。Unique watermark mark. In another embodiment of A ☆ of this method, the definition data will be recorded using an effective but unnatural sequence of coded watermarks. 3_ mad seam This method deliberately discards the string (four) volume data π box in the kind of Wei in the statistical method. In the real-world aspect of this method, the intermediate frame can be discarded under the condition that the dragon-stream product has the least negative influence (referred to as the frame frame). In this embodiment, Can not see or hear but there is a watermark; ^ data frame inserted into the streaming media data in the Tan case. Expected to cover the land: the additional useless information tuple Lishankou into the end of the data packet to indicate - Watermark mark. The watermark will be entered into the number of foreign bytes added. ^ Physical to packet t: This embodiment will attach useful data with watermark to the selected streaming media data. In the packet, the embodiment for embedding the watermark mark provides a selected number of the unique identifier of the bit, or a source identifier of the body data frame of the different serial media 21 1268080. In order to have the watermark 襟t combination can include the entire unique identifier. Under the watermarking technique, however, the invention is not limited to the above-described digital dialogue. For example, without departing from the spirit or scope of the present invention 5 using Fourier transform technology, Discrete Cosine Transform Technique, etc. General Operation The operation of certain aspects of the present invention will be described below with reference to Figures 3 and 4. Figure 3 illustrates an embodiment of the content functional portion of the various stages of the present invention. Figure 3 can be used as an example of converting content when the content undergoes a conversational watermarking mechanism. For example, as shown in Figure 4, as shown in Figure 3, the content conversion 3〇〇 includes pure content 3〇2. The target and selective encryption token 304, the conversational watermarking content 3〇6, and the = watermarking marker content 308. In one embodiment, the pure content 3〇2 and 15 target and selectively encrypted content 3〇4 may Residing in a two-computer computing device managed by the content owner. The clean content 302 includes the clean portions 320 to 323. The clean portions 32A to 323 represent any portion of a plurality of different portions of the content 3〇2. Further, the content 3G2 represents A variety of different content formats. For example, you can use the Image Expert Group (MPEG) format to format pure content 3〇2. Pure content is not limited to the MPEG content format, and without departing from the spirit of the present invention Other content formats 'including JPEG, 3 44 can be used under dry conditions. However, the MPEG format used in the present invention is only one example and is used for display aspects. 22 !?68080 In contrast, MPEG is a coding and compression standard that is finer than digitally transmitted content. MPEG provides compression support for TV-quality transmission of video-borne content. Furthermore, MPEG provides compressed audio, control, and even user-spread content. The MPE (packetization base) (PES) typically includes an integer number of base-stream (ES) access unit solid or variable size blocks or frames. The ES is typically MPEG content. The basic components of the flow, and the package • her bit controls lean, digital audio, digital video and other digital content (synchronous or asynchronous). - The compacted pES packet (which is essentially referred to as the same time base) contains the MPEG program stream (PS). Each PES packet may also be formed into a fixed size transport packet, referred to as an MPEG Transport Stream (TS), which forms a general purpose method of combining one or more content streams, optionally including an independent time base. Furthermore, the mpeg frame includes an intermediate frame (丨_frame), a forward prediction frame (p_frame), and a bidirectional prediction frame (B_frame). Thus, the clean portions 320 through 323 each include a portion of the pure content 302 that can be subdivided into a plurality of data units according to different criteria. For example, the clean portions 320 to 323 include portions of data extracted from any of the components of the video base stream (ES), the audio ES, the digital data, and the video, audio, and lean stream of the valley. For example, the clean portions 320 to 323 may be composed of a second portion of ten 20 video ESs. Furthermore, the clean portions 320 through 323 may not need to include the same length, density, etc. as the clean content 302. Target and selective encryption can be applied to any component of the video base stream (ES), audio ES, digital data ES, and any part of the video, audio, and data stream (which contains pure content 302) to convert it. Selectively encrypt content 304 with a target of 23!268〇8〇. The target and selective encryption further includes selectively encrypting the I-frame, the P-frame, at least a portion of the B-frame, and any combination of the p_frame, the 1-frame and the l-frame to generate a target and The content 304 is selectively encrypted. However, in some cases, it is desirable that portions of the pure content 3〇2 5 remain pure so that the requesting client device can perform trick play of the content, such as swivel, replay, wisdom. Pause and so on. As shown in Figure 3, the target and selective encrypted content 304 exhibits two portions as encrypted portions (330 and 332). When the target and selective encrypted content 304 are streamed to the watermark 10 bridge 1 〇 4 of FIG. 1 , the watermark marker plug-in component 256 of FIG. 2 , etc., at least one dialog watermark is applied as described above. To at least a portion (331 and/or 323) of the pure content. The target and selectively encrypted content 304 can be converted to conversational watermarked content 3〇6 by including a J/one conversational watermark as described below. 5 In one embodiment, the target and selective encryption can also be applied to a watermark. For example, the watermark can be decompressed into at least two parts. I: The points may include the most significant bits of the client device address. This section can be a target for selective addition. Other parts may include the less important 4 yuan in the information, such as the name of each household. For example, this portion of the watermark can be kept pure. Thus, the watermark marks the clean portion and the sub-portions that are otherwise included, pre-held as pure or further encrypted. However, this encryption method can & use a cryptographic key different from the cryptographic key used to additionally encrypt the encrypted portions 33A and 332. 24 1268080 When the conversational watermark is received by the requesting client device, the encrypted portions 330 and 332 will be decrypted to produce the decrypted watermark content 308. If the decrypted watermarked content 3〇8 includes an encrypted=mark, the watermark is maintained as encrypted.

5然而’要注意的是,本發明並不因此受限於目標選擇性 加密技術。例如,亦可使用選擇性加密技術,有時稱 性加密"、"部分加密"、或"片段加密"。該種選擇性加密: 術典型地尋求識別出已壓縮位元串流的最小子組,其可能 使解碼器上(例如-客戶機裝置上)的内容降級。然而,= 10出該位兀串流之最小子組的動作可能會降低安全性位準。 因此,利用此方法有-項交換條件。因此,選擇性加密動 作可接收已壓縮内容,並且使用一種加密演算法來加密位 元串流的預定最小數量,這是針對所欲安全位準來平衡降 級問題的關係。 15 在任一種狀況中,本發明可使用多種不同加密機制中的 任何一種來加密該内容及/或該水印標記的至少一部分,包 括非對稱加禮機制(例如Diffie-Hellman、RSA、 Merkle-Hellman、POP),以及對稱加密機制(例如高階加密 標準(AES)、RC6、IDEA、DES、RC2、RC5、Skipjack)等。 20 隨後可利用多種不同機制中的任一種對該請求客戶機裝置 提供對應内容解密金錄,包括頻帶外(〇ut>of-band)方法、 受信賴第三者等。 第4圖為一邏輯流程圖’其大致地展示出一種用以管理 目標選擇性預加密内容上對話式水印標記之程序的實施 25 1268080 例可在。第2圖的電腦計算裝置2〇〇中實行第4圖的程序 4〇0,且可在第1圖的内容伺服器1G2與水印標記橋接器 104中貫行第4圖的程序4QQ。 如第4圖所示,程序400將在方塊402中接收到内容 5之後開始。可從多種不同來源接收到該内容。例如,可以 從上行内容所有者、提供者等接收到該内容。在方塊402 中,將檢視該内容以判定它是否經過壓縮。若否,便在方 塊402中壓縮該内容。壓縮内容動作可使用適於既定内容 類型之多種壓縮/解壓縮機制的任一種。例如,方塊4〇2可 10使用動態圖象專家組(MPEG)、聯合圖形專家小組(JPEG)、 子波、以及用以壓縮已接收内容的其他機制。 處理動作將繼續前進至方塊404,其中將針對該已壓縮 内谷疋否已經進行目標選擇性加密來做出一項判定。若 否那麼上述參照第3圖方法的任一種方法便可用來檢 15視、剖析、並且選擇性加密該内容的不同目標部分。在一 實施例中,方塊4〇4將運作以即時地進行加密動作。在另 一貝%例中,將以’’離線’’方式進行加密動作,並且儲存該 目標選擇性加密内容以供後續存取。在另一實施例中,將 使用選擇性加密方法,而不是使用目標選擇性加密。 20 程序40〇隨後將前進至決策方塊406,其中將針對是否 已接收到針對該内容的一項請求來做出一項判定。如果並 未接收到針對該内容的請求的話,處理動作將重複執行決 策方塊406,直到接收到一項請求為止。如果已接收到針 對該内容的一項請求的話,處理動作便前進至方塊408, 26 1268080 其中已接收到對話資訊。可從該請求客戶機接收到對話資 訊。例如,該對話資訊包括客戶機獨特識別符、終端使用 者識別符、與該内容以及終端使用者相關聯的數位權利 等。在一實施例中,該客戶機獨特識別符包括一名稱、— 5密碼、一雜湊、一信用卡號、與該客戶機裝置相關聯的— • 網際網路協定(IP)位址等。亦可從内容所有者、内容提供者 等接收到對話資訊。例如’該資訊包括内容所有者、内容 加密者、内容提供者等的一識別符。 ® 處理動作將繼續前進到方塊410,其中當對該請求客戶 1〇 機串流該内容時,將使用該對話資訊令至少一對話式水印 標記能包括到該内容的選擇性部分中。如上所述,可以使 用各種不同機制來對該串流内容產生多個水印標記。再 者,可數位地簽署及/或加密水印標記。處理動作將繼續前 • 進至方塊412,其中將持續地對該請求客戶機串流該^ 15標記内容,且當中該請求客戶機將解密該内容。在完成方 • 塊412時,程序400將返回到呼叫程序以進行其他動作。 。可以了解的是,可由電腦程式指令來實行上面展示於流 程圖中各個方塊以及上面展示於流程圖中的方塊組合。可 對一處理器提供該等程式指令以產生一機器,而使在該處 如理器上執行該等指令時,產生用以實行流程圖方塊中之運 作的構件。可由-處理器執行該等電腦程式指令,以使該 處理器能進行-連串運作步驟而產生電腦實行輕序,並^ 该處理器上執行該等指令時,提供用以實行流程圖方塊中 之動作的步驟。 27 !268〇8〇 因此,流程圖的方塊可支援用以進行 合、用以進行指出動作的步驟組合、以⑽以作的構件組 作的程式指令構件。亦可了解的是,可進仃指出動 式系統來實行進行減動作❹驟之 途硬體 π 土土 各個方塊以 ^程圖的方塊組合,或者特殊用途硬體以及電腦指令的5 However, it should be noted that the present invention is not thus limited by the target selective encryption technique. For example, selective encryption techniques can also be used, sometimes referred to as ", "partial encryption", or "fragment encryption". This type of selective encryption typically seeks to identify the smallest subset of compressed bitstreams that may degrade the content on the decoder (e.g., on a client device). However, the action of = 10 out of this bit, the smallest subset of streams, may reduce the level of security. Therefore, this method has a - item exchange condition. Thus, the selective encryption action can receive the compressed content and use a cryptographic algorithm to encrypt the predetermined minimum number of bitstreams, which is a relationship that balances the degradation problem for the desired level of security. In either case, the present invention may encrypt the content and/or at least a portion of the watermark using any of a number of different encryption mechanisms, including asymmetric gifting mechanisms (eg, Diffie-Hellman, RSA, Merkle-Hellman, POP), as well as symmetric encryption mechanisms (such as Advanced Encryption Standard (AES), RC6, IDEA, DES, RC2, RC5, Skipjack). 20 The requesting client device can then be provided with a corresponding content decryption record using any of a number of different mechanisms, including an out-of-band method, a trusted third party, and the like. Figure 4 is a logic flow diagram which generally demonstrates an implementation of a program for managing conversational watermarking on a target selectively pre-encrypted content 25 1268080. The computer computing device 2 of Fig. 2 executes the program 4〇0 of Fig. 4, and the program 4QQ of Fig. 4 can be carried out in the content server 1G2 and the watermark flag bridge 104 of Fig. 1 . As shown in FIG. 4, the routine 400 will begin after the content 5 is received in block 402. This content can be received from a variety of different sources. For example, the content can be received from an upstream content owner, provider, or the like. In block 402, the content is reviewed to determine if it has been compressed. If not, the content is compressed in block 402. The compressed content action can use any of a variety of compression/decompression mechanisms suitable for a given content type. For example, block 4〇2 may use Dynamic Picture Experts Group (MPEG), Joint Graphics Experts Group (JPEG), wavelets, and other mechanisms to compress received content. Processing action will proceed to block 404 where a determination will be made that the target has been selectively encrypted for the compressed inner valley. If not then any of the methods described above with reference to Figure 3 can be used to examine, profile, and selectively encrypt different target portions of the content. In one embodiment, block 4〇4 will operate to perform an encryption action on the fly. In another example, the encryption action will be performed in an 'offline' manner and the target selectively encrypted content will be stored for subsequent access. In another embodiment, a selective encryption method will be used instead of using target selective encryption. The program 40 will then proceed to decision block 406 where a determination will be made as to whether a request for the content has been received. If a request for the content is not received, the processing action will repeat the decision block 406 until a request is received. If a request for the content has been received, then processing proceeds to block 408, 26 1268080 where the dialog information has been received. The session information can be received from the requesting client. For example, the dialog information includes a client unique identifier, a terminal user identifier, a digital right associated with the content and the end user, and the like. In one embodiment, the client unique identifier includes a name, a -5 password, a hash, a credit card number, an Internet Protocol (IP) address associated with the client device, and the like. You can also receive conversations from content owners, content providers, and more. For example, the information includes an identifier of the content owner, the content encrypter, the content provider, and the like. The processing action will proceed to block 410 where the conversation information will be used to cause at least one conversational watermark to be included in the selective portion of the content when the content is streamed to the requesting client. As described above, a variety of different mechanisms can be used to generate multiple watermarks for the streamed content. Furthermore, the watermark can be signed and/or encrypted digitally. The processing action will continue before proceeding to block 412 where the content of the tag will be continuously streamed to the requesting client, and wherein the requesting client will decrypt the content. Upon completion of block 412, routine 400 will return to the calling program for other actions. . It will be appreciated that the blocks shown above in the flowchart and the combinations of blocks shown above in the flowchart can be implemented by computer program instructions. The program instructions can be provided to a processor to produce a machine that, when executed on the processor, generates means for performing the operations in the flowchart block. The computer program instructions can be executed by the processor to enable the processor to perform a series of operational steps to generate a computer-implemented light sequence, and to provide execution of the instructions on the processor for execution in the flowchart block The steps of the action. 27!268〇8〇 Therefore, the block of the flowchart can support the program command means for performing the combination of the steps for indicating the action and the component for the (10). It can also be understood that the dynamic system can be used to implement the process of reducing the action. The hardware of the π soil is combined with the square of the block diagram, or the special purpose hardware and computer instructions.

上述的說明、實例以及資料提供組成本發明之建構 使用方式的完整說明。在不偏離本發明精神與範圍的 下’可進行本發明的許多實施例,且本發明係受以下 10請專利範圍界定。 、 【圖式簡明】 第1圖為一功能性方塊圖,其展示出一種用以實現本發 明環境的一實施例; 第2圖展示出一種伺服器裝置的實施例,其可用於實行 15本發明的一種系統中; 第3圖展示出在本發明進展之各種不同階段中内容功 能性部件的一實施例;以及 第4圖為一邏輯流程圖,其根據本發明大致地展示出— 種用以管理目標選擇性預先加密内容上對話式水印標記之 20程序的一實施例。 【主要元件符號說明】 100 作業環境 105 廣域網路/區域網路 102 内容伺服器 106 客戶機裝置 104 水印標記橋接器 107 客戶機裝置 28 1268080The above description, examples and materials provide a complete description of the constructional use of the invention. Many embodiments of the invention can be made without departing from the spirit and scope of the invention, and the invention is defined by the following claims. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a functional block diagram showing an embodiment for implementing the environment of the present invention; FIG. 2 is a diagram showing an embodiment of a server device which can be used to implement 15 books. In a system of the invention; FIG. 3 shows an embodiment of the content functional component in various stages of the progress of the invention; and FIG. 4 is a logic flow diagram which is generally shown in accordance with the present invention. An embodiment of the 20 program for pre-encrypting the conversational watermark on content with a management target. [Main component symbol description] 100 Operating environment 105 WAN/LAN network 102 Content server 106 Client device 104 Watermark marker bridge 107 Client device 28 1268080

108 客戶機裝置 200 電腦計算裝置 210 網路介面單元 212 中央處理單元 214 視訊顯示適配器108 Client Device 200 Computer Computing Device 210 Network Interface Unit 212 Central Processing Unit 214 Video Display Adapter

216 RAM 218 基本輸入/輸出系統 CBIOSO 220 作業系統 222 匯流排 224 輸入/輸出介面 226 CD_ROM/DVD-ROM 光 碟機216 RAM 218 Basic Input/Output System CBIOSO 220 Operating System 222 Bus 224 Input/Output Interface 226 CD_ROM/DVD-ROM CD Player

228 硬碟機 232 ROM 250 應用程式 252 對話管理器(SM) 254 内容儲存處 256 水印標記外掛程式 300 内容轉換 302 純淨内容 304 目標與選擇性加密内 容 306 對話式水印標記内容 308 已解碼水印標記内容 320 純淨部分 321 純淨部分 322 純淨部分 323 純淨部分 330 已加密部分 331 純淨部分 332 已加密部分 341 水印標記純淨部分 343 水印標記純淨部分 400 程序 400〜412 步驟方塊 29228 Hard Disk Drive 232 ROM 250 Application 252 Session Manager (SM) 254 Content Store 256 Watermark Marker Plugin 300 Content Conversion 302 Pure Content 304 Target and Selective Encrypted Content 306 Conversational Watermark Content 308 Decoded Watermark Content 320 Pure part 321 Pure part 322 Pure part 323 Pure part 330 Encrypted part 331 Pure part 332 Encrypted part 341 Watermark mark Pure part 343 Watermark mark Pure part 400 Procedure 400~412 Step block 29

Claims (1)

1268080 kr ^ r: Ί 卜月^甘修(更)正替換頁I 十、申請專利範圍 第94100475號申請案申請專利範圍修正本95 〇請 1. -種用以在-網路上傳播内容的系統,其包含·· 經組構以進行下列動作的一客戶機裝置: 要求該内容;以及 提供與該請求相關聯的對話資訊;以及 I組構以進彳τ下肋作的-電腦計算裝置: 接收與該請求相關聯的該對話資訊; 加密該内容的至少_部分,其中該内容的至少另一 部分維持為未加密的,· 至少部分地根據該對話資訊來判定—水印標記;以 及 當對該客戶難置串流該内容的該等已加密與未加 密部分時’即時地套用該水印標記到該未加密内容 的至少一部分中。 專利範圍第1項之系統,其中加密該内容之至少 —部分的動作另包含選擇性地挑出制容的至少該部 刀以供加密。 申請專魏圍第i項之純,其中套用該水印標記的 作另包含套用—不同水印標記到該未加密内容的一 不同部分中。 申月專利範圍第1項之系、统,其中套用該水印標記的 動作另包含套用一不同水印標記到豸未加密内容的相 同部分中。 30 1268080 D. =專利範圍第i項之系統’其中套用該水印標記的 乍匕含加密該水印標記之至少—部分以及數位地簽 μ水印標記之至少另—部分之二個 動作。1268080 kr ^ r: Ί 卜 ^ ^ Gan Xiu (more) is replacing page I X. Patent application No. 94100475 Application for patent scope revision 95 〇 1. A system for disseminating content on the Internet a client device that is configured to perform the following actions: requesting the content; and providing dialog information associated with the request; and a computer computing device that is configured to: Receiving the dialog information associated with the request; encrypting at least a portion of the content, wherein at least another portion of the content is maintained unencrypted, at least in part based on the dialog information, determining a watermark; and when When the client is unable to stream the encrypted and unencrypted portions of the content, the watermark is immediately applied to at least a portion of the unencrypted content. The system of claim 1, wherein the act of encrypting at least a portion of the content further comprises selectively picking at least the portion of the tool for encryption. Applying for the pure item i of the Wei Wei, the application of the watermark mark is additionally applied - different watermarks are marked into a different part of the unencrypted content. The system of claim 1 of the scope of the patent application, wherein the action of applying the watermark mark further comprises applying a different watermark to the same part of the unencrypted content. 30 1268080 D. = System of the i-th patent of the patent range wherein the watermark marked with the watermark contains at least a portion of the watermark mark and at least another portion of the digital watermark mark. 10 6·如申請專·圍第1項之祕,其中該電腦計算裝置使 用-水印標記外掛程式以及一水印標記橋接器中的至 夕一個以套用該水印標記。 7.如:請專利範圍第Μ之系統,其中係利用不同於用以 加松該内容之該部分之密碼金鍮的—密碼金錄來加密 該水印標記。 .如申睛專利範圍第1項之系統,其中該客戶機裝置為一 行動裴置。 1510 6· If the application is specific to the secret of item 1, the computer computing device uses a watermark mark plugin and a watermark mark bridge to apply the watermark mark. 7. For example, please refer to the system of the third patent, in which the watermark is encrypted by a password record different from the password used to add the portion of the content. The system of claim 1, wherein the client device is an action device. 15 士申明專利fell第1項之系統,其中該對話資訊另包含 下列項目中的至少_個:一客戶機裝置識別符、一終端 使用者識別符、與-終端使用者相Μ的數位權利、- 終端使用者名稱、1碼、—雜凑、—信用卡號以及一 網際網路協定(IP)位址。 20 10_如申請專利範圍第1項之錢,其悄定該水印標記的 動作另包含根據另包含下列項目中之至少_個的額外 2話資訊來判定該水印標記:-内容所有者的-識別 付、-内容加密者的—識別符、—内容提供者的一識別 符、以及該内容的一識別符。 u· 一種用以在—網路上傳播内容的純,其包含: 經組構以進行下列動作的一内容祠服器: 31 1268080 接收來自一電腦計算裝置而針對該内容的一請求; 接收與該請求相關聯的該對話資訊; 加密該内容的至少一部分,其中該内容的至少另一 部分維持為未加密的;以及 5 對該電腦計算裝置串流該内容的該等已加密與未加 密部分; 經組構以截取該經串流内容並且以進行下列動作的一 水印標記部件: 接收該對話資訊; 10 至少部分地根據該對話資訊來判定一水印標記;以 及 當另對該電腦計算裝置串流該内容的該等已加密與 未加密部分時,即時地套用該水印標記到該未加密 内容的至少一部分中。 15 12_如申請專利範圍第11項之系統,其中該水印標記部件 為一水印標記橋接器以及一水印標記外掛程式部件中 的至少一個。 13.如申請專利範圍第11項之系統,其中與該請求相關聯 的該電腦計算裝置另包括用以接收該串流内容的一項 20 無線通訊。 14· 一種用以在一網路上傳播内容的裝置,其包含: 與收發器進行通訊的一處理器; 32 1268080 與該處理験行通訊且肋儲存f料以及機器指令的 -記憶體’該等指令將使該處理例進行下列的多項運 作: 接收-内容流’其中該内容流的至少—部分為已加 密的,且該内容流的至少另—部分為未加密的; 接收與该内容流相關聯的對話資訊; 至少部分地根據該對話資訊來判定—水印標記;以 及 , 10 田力仕賴路上串流該岐料,即_套用該水 印標記到該未加密内容流的至少一部分中。 15. ^申請專利範圍第14項之裂置,其中歸置係經組構 切作為-電腦計算裝置内之一水印標記橋接器以及 水印標記部件中的至少一個來運作。 15 •如申凊專利範圍第14項之雙署甘士〆 遴裡以 固乐丄4貝之衣置,其中係利用-種目標 加⑨、機制來選擇性地加密該内容流。 如申清專利範圍第14項之梦署 # , 的動竹η 其中套用該水印標記 __ i含套用—不同水印標記到該未加密内容的 ~不同部分中。 20 汝申4專利範圍第14項 的動貞之衣置,其中套用該水印標記 勒作包含加密該水印標記之至少 答^ 4分以及數位地 双署该水印標記之至少 一動作 口 F刀之一個動作中的至少 33 1268080 i . 19·如申請專利範圍第14項之裝置,其中係利用不同於用 以加密該内容之該部分之密碼金输的一密碼金输來加 密該水印標記。 20·—種用以在一網路上傳播内容的方法,其包含下列步 5 驟: 接收與針對該内容之一請求相關聯的對話資訊; 加密該内容的至少一部分,其中該内容的至少另一部分 維持為未加逸、的, 至少部分地根據該對話資訊來判定一水印標記;以及 10 當對與該請求相關聯的一電腦計算裝置串流該已加密 與未加密内容時,即時地套用該水印標記到該未加密内 容的至少一部分中。 21·如申請專利範圍第20項之方法,其中該對話資訊另包 含下列項目中的至少一個:一客戶機裝置識別符、一終 15 端使用者識別符、與一終端使用者相關聯的數位權利、 ^ 一終端使用者名稱、一密碼、一雜湊、一信用卡號、一 網際網路協定(IP)位址、一内容所有者的一識別符、一 内容加密者的一識別符、一内容提供者的一識別符、以 及該内容的一識別符。 20 22. —種儲存有用以在一網路上傳播内容的調變資料信號 之儲存媒體,該調變資料信號包含有使一電腦計算裝置 進行下列動作之指令: 從一客戶機裝置傳送針對該内容的一項請求; 從該客戶機裝置傳送與該請求相關聯的對話資訊; 34 ;1268080 的至^料S己部件上接收所串流的該内容,其中該内容 未加^部分心㈣,蝴跑少另—部分為 ΐ少部分地對話資絲令該水印標記部件能判 疋一水印標記;以及 虽另在該财均該客戶機裝置技勒料,令1水The system of claim 1 of the patent, wherein the dialog information further comprises at least one of the following items: a client device identifier, a terminal user identifier, a digital right opposite the terminal user, End User Name, 1 Code, - Hash, - Credit Card Number and an Internet Protocol (IP) address. 20 10_ As claimed in the first paragraph of the patent scope, the action of quietly determining the watermark mark further comprises determining the watermark mark according to the additional 2 pieces of information including at least _ of the following items: - the content owner's - The identifier of the payment, the content encryptor, the identifier of the content provider, and an identifier of the content are identified. u· A purely content for disseminating content on the network, comprising: a content server configured to perform the following actions: 31 1268080 receiving a request for the content from a computer computing device; receiving and receiving Requesting the associated conversation information; encrypting at least a portion of the content, wherein at least another portion of the content remains unencrypted; and 5 streaming the encrypted and unencrypted portions of the content to the computer computing device; a watermarking component configured to intercept the streamed content and to: receive the dialog information; 10 determine a watermark based at least in part on the dialog information; and when the computing device is further streamed to the computer When the encrypted and unencrypted portions of the content are immediately applied, the watermark is applied to at least a portion of the unencrypted content. The system of claim 11, wherein the watermarking component is at least one of a watermarking bridge and a watermarking plugin component. 13. The system of claim 11, wherein the computer computing device associated with the request further comprises a 20 wireless communication for receiving the streaming content. 14. An apparatus for transmitting content over a network, comprising: a processor in communication with the transceiver; 32 1268080 communicating with the processing and storing the ribs and the memory of the machine instructions. The instructions will cause the processing to perform the following plurality of operations: a receive-content stream where at least a portion of the content stream is encrypted, and at least another portion of the content stream is unencrypted; receiving is associated with the content stream The associated dialogue information; at least in part based on the dialog information, the watermark is determined; and, 10, the data is streamed on the road, ie, the watermark is applied to at least a portion of the unencrypted content stream. 15. ^ The cleavage of claim 14 of the patent scope, wherein the placement is operated as at least one of a watermark marker bridge and a watermark marker component within the computer computing device. 15 • As for the application of the 14th item of the patent scope, the Gansu 遴 遴 以 以 以 以 以 以 以 , , , , , , , , , , , , , , , , , , , , , , 。 。 。 。 。 。 。 For example, in the case of Shenyi, the 14th patent of the patent scope, the mobile bamboo η is applied with the watermark mark __ i, and the different watermarks are marked into different parts of the unencrypted content. 20 The fourth aspect of the patent application scope of claim 4, wherein the watermark mark is used to include at least one of the four points of the watermark mark and one of the at least one action port F of the watermark mark. The apparatus of claim 14, wherein the watermark is encrypted with a cryptographic gold input different from the cryptographic key used to encrypt the portion of the content. 20 - a method for propagating content over a network, comprising the steps of: receiving dialog information associated with a request for one of the content; encrypting at least a portion of the content, wherein at least another portion of the content Maintaining an unsuccessful, determining, based at least in part on the dialog information, a watermark; and 10, when the encrypted and unencrypted content is streamed to a computer computing device associated with the request, applying the The watermark is tagged into at least a portion of the unencrypted content. 21. The method of claim 20, wherein the dialog information further comprises at least one of the following: a client device identifier, a final 15-terminal user identifier, and a digit associated with a terminal user. Entitlement, ^ an end user name, a password, a hash, a credit card number, an internet protocol (IP) address, an identifier of a content owner, an identifier of a content encrypter, a content An identifier of the provider, and an identifier of the content. 20 22. A storage medium storing a modulated data signal for disseminating content over a network, the modulated data signal comprising instructions for causing a computer computing device to: transmit from the client device for the content a request from the client device to transfer the conversation information associated with the request; 34; 1268080 to the material component has received the streamed content, wherein the content is not added to the heart (four), Run less, part of the dialogue, so that the watermarking component can determine a watermark; and although the client device is used in the money, the water is 印標記部件能即時地套用該水印標記到該未加密㈣ 的至少一部分中。 3·,申凊專利範圍第22項之儲存媒體,其中該水印標記 4件另包含-水印標記橋接器以及—水印標記外掛程 式部件中的至少一個。 24·種用以在一網路上傳播内容的裝置,其包含: 用以接收針對該内容之一請求的一構件; 15 用以接收與針對該内容之該請求相關聯之對話資訊的 一構件; 用以接收該内容的-構件,其中該内容的至少_部分為 已加密的,且該内容的至少另一部分為未加密的; 用以至少部分地根據該對話資訊來判定—纟印標記的 一構件;以及 當在該網路上串流該内容時,用以即時地套用該至少一 水印標記到該未加密内容之至少一部分中的一構件。 35The imprinting component can instantly apply the watermark to at least a portion of the unencrypted (four). 3. The storage medium of claim 22, wherein the watermark 4 further comprises at least one of a watermark marker bridge and a watermark marker add-on component. 24. An apparatus for propagating content over a network, comprising: means for receiving a request for one of the content; 15 means for receiving dialog information associated with the request for the content; a means for receiving the content, wherein at least a portion of the content is encrypted, and at least another portion of the content is unencrypted; to determine, at least in part, based on the dialog information - a printed mark And means for immediately applying the at least one watermark to at least a portion of the unencrypted content when the content is streamed over the network. 35
TW94100475A 2004-01-09 2005-01-07 Method and system for session based watermarking of encrypted content TWI268080B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US53535704P 2004-01-09 2004-01-09

Publications (2)

Publication Number Publication Date
TW200533141A TW200533141A (en) 2005-10-01
TWI268080B true TWI268080B (en) 2006-12-01

Family

ID=38220540

Family Applications (1)

Application Number Title Priority Date Filing Date
TW94100475A TWI268080B (en) 2004-01-09 2005-01-07 Method and system for session based watermarking of encrypted content

Country Status (1)

Country Link
TW (1) TWI268080B (en)

Also Published As

Publication number Publication date
TW200533141A (en) 2005-10-01

Similar Documents

Publication Publication Date Title
US20050193205A1 (en) Method and system for session based watermarking of encrypted content
KR101617340B1 (en) System and method for signaling segment encryption and key derivation for adaptive streaming
JP4500677B2 (en) How to distribute digital content
US20040199771A1 (en) Method for tracing a security breach in highly distributed content
US20100100742A1 (en) Transport Stream Watermarking
US20160197939A1 (en) Segment Authentication for Dynamic Adaptive Streaming
US7249264B2 (en) Secure IP based streaming in a format independent manner
US8917899B2 (en) Methods and systems for watermarking digital media
KR20080025207A (en) Preventing illegal distribution of copy protected content
JP2007518294A (en) Video file encryption method and digital copyright management method using the same
JP2012248201A (en) Content distribution for managing multiple digital right
JP2004187230A (en) Streaming distribution system and stream distribution server
KR20040077713A (en) Generation of a watermark being unique to a receiver of a multicast transmission of multimedia
WO2021072878A1 (en) Audio/video data encryption and decryption method and apparatus employing rtmp, and readable storage medium
US20060018465A1 (en) Information-processing system, information-processing apparatus, information-processing method, and program
US8850590B2 (en) Systems and methods for using transport stream splicing for programming information security
US20220224974A1 (en) Distributed media player for digital cinema
JP2005039835A (en) Individual video encryption system and method
TWI268080B (en) Method and system for session based watermarking of encrypted content
CN114175665A (en) Watermarking video segments into two or more variants
KR100725782B1 (en) Broadcasting content protection system and method
US20220201372A1 (en) Live video streaming architecture with real-time frame and subframe level live watermarking
WO2011013196A1 (en) Information processing device
JP2008048163A (en) Method for receiving content
JP2008278392A (en) Content encryption/decryption apparatus, program, and data structure of media data

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees