TW201115388A - Copyrighted work redistribution promotion system - Google Patents

Copyrighted work redistribution promotion system Download PDF

Info

Publication number
TW201115388A
TW201115388A TW99130033A TW99130033A TW201115388A TW 201115388 A TW201115388 A TW 201115388A TW 99130033 A TW99130033 A TW 99130033A TW 99130033 A TW99130033 A TW 99130033A TW 201115388 A TW201115388 A TW 201115388A
Authority
TW
Taiwan
Prior art keywords
information
work
distribution
client terminal
customer
Prior art date
Application number
TW99130033A
Other languages
Chinese (zh)
Inventor
Noboru Hirano
Hisanobu Yamasaki
Original Assignee
Cs Services Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cs Services Co Ltd filed Critical Cs Services Co Ltd
Publication of TW201115388A publication Critical patent/TW201115388A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising

Landscapes

  • Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Finance (AREA)
  • Economics (AREA)
  • Game Theory and Decision Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Marketing (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

Disclosed is a copyrighted work redistribution promotion system capable of easily generating a copyrighted work file for redistribution use, greatly reducing communication load at that time, improving security, and protecting copyrights while significantly improving convenience of redistribution. The disclosed copyrighted work redistribution promotion system uses ancillary information of a copyrighted work, an executable program, and a management server configured to be connectable through a network to a client terminal; wherein the ancillary information has a data structure having an identification information portion and/or a distributor information portion including sequentially distributed client information, and the executable program causes the client terminal to perform processing of each of an ancillary information transmission step and a redistribution-use copyrighted work generation step.

Description

201115388 六、發明說明: 【發明所屬之技術領域】 本發明係有關著作物再散布促進系統,詳細而言,係 有關簡便性、安全性優異之著作物再散布促進系統。 【先前技術】 近年來,網際網路系統等非常的發達,藉著對該些通 3fl電路與IP (網路通訊協定)通訊機器即電腦或手機終端 等通汛終端的使用,以進行CD或DVD等著作物之販賣、 提供,已呈漸漸普及化之態勢。 在以往’基於防止違法複製以保護著作權的觀點,即 使是在此種利用網際網路之販賣等情形’亦開發出各種技 術以防止著作物的複製。例如,接收裝置透過著作權保護 貝汛而檢測出含有禁止複製之内容時,則在輸出時會增加 資料傳輸率使其無法正常複製之系統(參照日本特開 2003-199023號公報),或者是,即使受到違法複製,但除 了正規購入者以外其餘人不能更新,且在一定期限後就不 此使用之系統(參照曰本特開平8_6784號公報)等。 該種能限制著作物之複製之系、统,從保f蔓著作權的觀 點來看具有一定的效果。然@,各個購入者為了要購入著 作物’必須要通過網際網路而存取至伺服器等而個別的下 載,但近來該類著作物的資料尺寸變非常大,下載所花的 時間變長’通訊負荷變非常大。因此,若是因襲於既有的 方法,有可能使著作物的流通成長受限。 方面在著作權者或製作公司等,懷有使著作物 201115388 、:··、L通的心法。藉由促進該種著作物的流通,而能有 助於文化或產業的發展。為了要實現此種想法,亦有不受 限於習知方法而提出的方牵,办丨^_ 制 刃万案例如’其可許可著作物之複 氣’以终可著作物被依少今太 侬夂政布之方式來達到促進流通的目 的0然而,在此類方沐夕士 、上 頬方法之中,為了要維持著作權的保護, 針對違法複製所採行對策必須有較現在更高的技術,又, 用、進订著作物之再散布的步驟等亦趨於煩雜,因此,要 達到促進流通之想法仍被視為頗有難度。雖然業界期盼有 w保護著作權,又能簡便進行著作物之再散布,以實現 者作物之促進流通的系統,但現在並不存在。 專利文獻1 :曰本特開2003·199〇23號公報 專利文獻2 :曰本特開平8-6784號公報 【發明内容】 本發明係著眼於上揭問題點而姐_ 土 @ 1碭點而揭不者,其目的在於提 供一種著作物再散布促逸备站 ^ 、、,充,月b以喃便的操作產生再散 布用之著作物檔案,可大φ5隊Μ & + — *降低此時的通訊負荷且能提昇 女全性,既能保護著作權 ^忭權又月^ Α幅提昇再散布的便利性。 為解決上述問題,本發明之装从此太 ^ 不發月之者作物再散布促進系統, 係使用與著作物資料建立了關 * 逐立了關連性之附屬資訊、執行程 式、及可透過通訊網路與客戶 ^迷接而構成之管理伺服 裔保護著作權並易於進彳彳$ 進仃者作物之再散布,其特徵在於: 該附屬資訊之資料構诰,1 士 、 構k具有包含著作物資訊之識別 貝Sll部及/或包含經依序散布 欣布之客戶資訊之散布者資訊部; 該執行程式,在客戶終端執行下述各步驟之處理: 201115388 附屬資訊發送步驟,為了在管理伺服器進行著作物之 正當性判斷而發送該附屬資訊;以及 再散布用著作物產生步驟,將取得之客戶資訊追加至 附屬資訊以進行更新,且將著作物資料予以加密。 欠該著作物再散布促進系統,因為使用著作物資料之附 f資訊及執行程式,而可根據於客戶終端所取得之著作物 育料’非常簡便的產生再散布用著作物擋案。此際,在透 過網路連接於客戶終端而構成之管理词服器,由於可進行 該著作物資料的正當性判m,即使是在複數個客戶 終端依序散布著作物資料而使著作物流通之情形時,亦可 確保其安全性。又,在此情形’料判斷著作物的正當性 :用的附屬資m,並不僅限於著作物之資訊等之識別資訊 部’在其資料構造中尚包含經依序散布該 ::有客戶資訊等之散布者資…此,在著作= ;且:斷時具有良好的安全性。再者,由於能使該附屬資 。-有較小的資料大小,gu匕’可大幅降低在上揭之 判斷時、及產生再散布用著作物檔案時所需的通 …了。再者,上揭之附屬資訊係由客戶終端 =器並予以記錄,藉此,㈣理词服器,可易於進; :之流通及散布狀況的管理,因此,可確實的向取得著 著作=戶徵收購入款’並可確實的將著作權報酬分配至 對著作物。又,藉由附屬資訊中之散布者資訊部的記錄, 乍物之依序散布者的散布報酬分配亦成可能。 如所示,依照該著作物再散布促進系統,^大 散布的便利性,因此而可促進著作物的再散布。‘此幵 201115388 既能確保著作權的保 端而依序散布,而能 照該著作物再散布促 作物的促進流通。 4,又能將著作物透過複數個客戶終 實現著作物的促進流通。如所示,依 進系統,可同時實現著作權保護與著 —f該著作物再散布促進系統中,該執行程式進一 行使著作物資料虚在 執 η 為可視聽之可讀取著作物產生步驟,則 為更佳。依該著作物i^ 密資料促㈣統,在取得I作物之加 在貝科(如再散布用著作物檀案等)之客戶 可使該著作物成為可視聽之散 = 槽案。藉此,可谁丰, 冉政布用者作物 而可促進再散布步提昇著作物於再散布時的便利性, 造進一步具= 促進系統中’該附屬資訊之資料構 著作物之散 =飼服器判斷有無受到篡改之關於 料資訊部=接續資訊部及/或關於著作物資料之資 著作物之正當性判斷時依作物再散布促進系統,在 資訊部之核對,而卜檢Ϊ 於識別資訊部或散布者 到篡改,因此而可進:牛提”資訊或著作物資料有無受 護。又,在接續資訊全性,可充實著作權的保 次數之資訊,藉此,可二積散對著作物累積散布 制在此之後的散布,因;累===定值時,限 會之傳料販賣。 避H統被詩俗稱老鼠 :該著作物再散布促進系統中, 端之_之附加元件或外掛程式來達Π 者作物再散布促進系統,可藉由在客戶終端所使用劉覽 201115388 器中的附加元件或外掛程式’來執行上述執行程式之各步 因此,再散布至其他客戶之際,無需再散布該執行程 /藉此可使再散布更為簡便,可進一步提昇再散布的 便利性,可進一步促進再散布。 在該著作物再散布促進系統中,該附屬資訊之資料大 小’以1細以下為佳。由於係將資料大小如此小的附屬資 =戶終端發送至管理飼服器間,以進行著作物之正當 及產生再散布著作物檔案,而能控制在極小的通訊 、何’可進-步提昇著作物之再散布的便利性,可進一步 促進著作物的再分布。 〜里=之著作物散布用電子檔案,係使用客戶終端、 ^構^ 及可將該等客戶終端與管理伺服器加以連接 散布之^通二網路保護著作權並包含易於進行著作物之再 十…… 關連性之附屬資訊及執行程 式’其特徵在於: 該附屬資訊之資料構造,具有 ^ ^ «/,,. 匕3者作物資訊之識別 貝訊邛及/或包含經依序散布之 該執行程式,在客戶終端執行下::散布者資訊部; 、响轨订下述各步驟之虛理: 附屬資訊發送步驟,為了在管 正告性剌斷& n 伺服器進行著作物之 正兩I·生判斷而發送該附屬資訊;以及 再散布用著作物產生步驟,將取 ^ 附屬資邙w、隹—® 于之客戶資訊追加至 附屬貝心進订更新,且將著作物資料予以加密。 该考作物散布用電子擋案,因 程式,% π & $ ’’、吏用附屬資訊及執行 式而了於客戶、终端非常簡便的 樓案產生再散布用著作物電子權案,;=物散布用電子 J大幅降低此時的通 201115388 訊負j,且提昇安全性。依照該著作物散布用電子 可提昇著作物於再散布時之便利性, ..Γ 向了促進再散布。 :之㈣物」,係指將思想或感情表現於外 Π作指屬於文藝、學術、美•、或音樂之範圍,並j 在者作枯方面予以保護之必要者’例如音樂、影 :出版物(雜諸、小說等電子㈣、漫晝、申請書 手冊、小冊子等)。又,所謂「客戶」,係指有意取得: 已取得著作物檔案者。 有意取仵或 如以上說明所示,根據本發明之著作物再散布促 統及著作物散布用電子槽案,能以簡便的操作而產生再散 :用著作物檔案’可大幅降低在此時的通訊負#,且能提 昇安全性。藉此而能大幅提昇再散布時之便利性,能使著 作物之再散布更趨於容易,既能保護著作物,又能實現著 作物的促進流通。 【實施方式】 本發明之著作物再散布促進系統令,著作物之散布用 電子檔案係由〗次客戶終端最先取得,在該終端中產生再 散布用著作物财,然後使其被散布i 2次客戶終端’在 之後同樣藉其他客戶終端予以重複的依序散布而使其流 通。 乂下邊參照適當圖式以詳述本發明之實施形態。首 先j月1人客戶取得著作物之散布用檀案,並產生再散 布用著作物檔案之情形。 圖1之著作物再散布促進系統卜具有著作物資料2、 201115388 附屬資訊3、執行寂z m 式次客戶終端5、網路7、與管理 何月艮'8。1次客戶終端雖亦能存在複數個,作在圖^ 免煩雜㈣定成1個來說明。 為避 在 人客戶終端5所取得之著作物 中,包含著作物資料2、附屬次W者作物政布用電子檔案 資訊藉由連屬…、及執行程式4。附屬 由於包含了執行^式4 料㈣料2建立關連性。又, ^ "即使疋在未安裝含有附加元件或外 掛程式之j劉訾5|的安ό Τ外 尤田· 終端’仍可簡便的取得該著作物勒 布用電子稽案、視聽著作物、及產生再散布用著作::物宰散 1次客户終端5對該著作物散布用電 :、 :各種方絲進行。❹,可在賴等處取得,亦 戶終端5透過網路7而從管理飼服器8下載取:再 Ή次客戶終端5來接收從管理飼服端8寄出之附 加了者作物散布用檔案之電子郵件之方式亦可 舖等處取得之情形時,用以保存該著作物散布用電子槽= 之電子s己錄媒體,有各種型態可供使用。一士田’、 有USB記憶體、SD記憶體、CD-R、DVD-R等。。例如 之著L:次客戶終端5而取得並儲存在其硬碟(未圖示) 之者作物散布用電子檔案中所包含的附屬資訊3及執t =4’在此係以將其移動並保存在t次客戶終端$之記 :之狀態作為說明的前提。著作物資料2、附屬資訊二 ^程式4之儲存或保存的位置並無特別限定,亦可使其 刀別獨立的保存在記憶部6,又,亦可將复位七 '、保存在内設式拽 ^:1次客戶終端5之硬碟等讀取裝置、—記憶體等 電子記憶媒體内。 寺 201115388 著作物資料2係著作物之電子資料。著作物電子資料 之資料形式並無特別限制,可依照著作物的種類、客戶終 端所使用之操作系,統' 及在客戶終端為了視聽著作物而使[Technical Field] The present invention relates to a re-distribution promotion system for a work, and more particularly to a re-distribution promotion system for a work which is excellent in simplicity and safety. [Prior Art] In recent years, the Internet system and the like have been developed very well, by using the 3F circuit and the IP (Network Protocol) communication machine, that is, the use of a terminal such as a computer or a mobile phone terminal for CD or The sale and supply of works such as DVDs have gradually become popular. In the past, various technologies have been developed to prevent the copying of works based on the idea of preventing illegal copying to protect copyrights, even in the case of such use of the Internet. For example, when the receiving device detects the content containing the copy prohibition by copyright protection, the system increases the data transfer rate so that it cannot be copied normally (refer to Japanese Laid-Open Patent Publication No. 2003-199023), or Even if it is illegally copied, the system cannot be updated except for the regular purchaser, and the system is not used after a certain period of time (refer to Sakamoto Kaikai 8_6784). This kind of system and system that can restrict the reproduction of a work has a certain effect from the viewpoint of protecting the copyright of the vine. However, @, in order to purchase the work, each purchaser must access the server through the Internet and download it individually. However, the size of the data of this type of work has become very large, and the time taken for downloading has become longer. 'The communication load is very large. Therefore, if it is due to an existing method, it may limit the growth of the circulation of the work. In the case of the copyright owner or the production company, there is a mindset that makes the work 201115388, :··, and L-pass. By promoting the circulation of such works, it can contribute to the development of culture or industry. In order to realize this kind of thinking, there is also a prescription that is not limited to the conventional method, and the 丨^_ 制 万 例如 例如 例如 例如 例如 例如 例如 例如 例如 例如 例如 例如 例如 例如 例如 例如 例如 以 以 以 以 以Too tactical to achieve the purpose of promoting circulation. However, in such methods, in order to maintain the protection of copyright, the countermeasures against illegal copying must be higher than now. The technology, in addition, the steps of re-dispatching the use of books, etc., tend to be cumbersome. Therefore, the idea of promoting circulation is still considered to be quite difficult. Although the industry is looking forward to the protection of copyrights and the ease of re-distribution of works to realize the system of promoting the circulation of crops, it does not exist now. Patent Document 1: Japanese Patent Application Laid-Open No. Hei. No. Hei. No. Hei. No. Hei. No. Hei. No. Hei. No. 8-6784. SUMMARY OF THE INVENTION The present invention is directed to the problem of the above-mentioned problem. Uncovering, the purpose is to provide a work for re-distribution and facilitation of the station ^,,, charge, month b to create a re-distribution of the archives of the work, which can be reduced by φ5 team amp & + — * At this time, the communication load can enhance the female fullness, which not only protects the copyright, but also improves the convenience of the distribution. In order to solve the above problems, the crop re-distribution promotion system of the present invention has been established, and the use of the information relating to the work has been established. The affiliate information, the execution program, and the communication network are connected. The management of the servo-protected copyright formed by the connection with the customer is easy to enter the re-distribution of the crops of the intruder, which is characterized by: the data of the subsidiary information is structured, and the 1st and the k have the information of the work. Identifying the S1 part and/or the scatterer information department including the customer information that is sequentially distributed by Xinbu; the execution program performs the following steps in the client terminal: 201115388 Affiliate information sending step, in order to perform on the management server The auxiliary information is sent to determine the legitimacy of the work; and the re-distribution work generating step is performed, the obtained customer information is added to the attached information for updating, and the copyrighted material is encrypted. The reliance on the reproduction and promotion system of the work is based on the use of the information and the execution program of the work materials, and the reproduction of the work can be based on the work of the customer terminal. In this case, the management word server that is connected to the client terminal through the network can make the legitimacy judgment of the work material, and even if the plurality of client terminals sequentially distribute the work materials, the book is distributed. In the case of it, it can also ensure its safety. In this case, it is judged that the legitimacy of the work: the subsidiary information m used is not limited to the information of the work, and the identification information section 'is included in the data structure. And so on. In this case, there is good security in writing = ; and: when broken. Furthermore, it is because of the subsidiary assets. - With a smaller data size, gu匕' can greatly reduce the amount of time required for the judgment of the top and the reproduction of the archives. Furthermore, the attached information is uploaded and recorded by the client terminal, whereby (4) the word processor can be easily entered; the management of circulation and distribution status, therefore, the work can be obtained reliably = The household purchases the deposits' and can actually distribute the copyright rewards to the works. Moreover, by means of the records of the distributor's information department in the affiliated information, it is also possible to distribute the distributed rewards of the stolen goods. As shown in the figure, according to the re-distribution promotion system of the work, the convenience of the distribution is greatly promoted, and thus the re-distribution of the work can be promoted. ‘This 幵201115388 can ensure the copyright protection and distribute it in order, and then spread the book to promote the circulation of crops. 4. It is also possible to promote the circulation of works through a plurality of clients. As shown, according to the system, the copyright protection can be simultaneously implemented, and the execution program further implements the steps of generating the readable work of the visually readable work. It is better. According to the author's i^ confidential information, (4), in the acquisition of the I crop, in the Beca (such as the re-distribution of the book Tan, etc.), the customer can make the work visible. In this way, it is possible to promote the re-dispersion of the crops and promote the convenience of the re-distribution of the works, and to further promote the system of the information in the system. The device judges whether or not the tampering information is related to the material information department = the follow-up information department and/or the legal judgment on the copyright of the work material, according to the crop re-distribution promotion system, check in the information department, and the inspection is recognized The information department or the distributor will go to tampering, so it is possible to enter: Niu Tie. The information or the work materials are protected. In addition, in the follow-up information, the information on the number of guarantees of the copyright can be enriched. The distribution of the cumulative distribution of works after this, because; tired === when the value is fixed, the limited material will be sold. The circumstance of the circumstance is called the mouse: the re-distribution of the work promotes the system, the end of the _ The component or plug-in program is used to implement the crop re-distribution promotion system, and the steps of the above-mentioned execution program can be executed by using the add-on component or the plug-in program in the client terminal using the 201115388 device, and then distributing it to the At the time of his client, there is no need to distribute the execution process/by making it easier to distribute the distribution, which further enhances the convenience of re-distribution and further promotes re-distribution. In the work re-distribution promotion system, the subsidiary information The size of the data is preferably less than one. Because it is a small amount of data, the household terminal is sent to the management feeding room to carry out the proper writing of the work and to generate and re-distribute the work file. The mini-communication, the ability to further enhance the re-distribution of the work, can further promote the redistribution of the work. ~里=The electronic file for the distribution of works, using the client terminal, ^ structure and The client terminal and the management server are connected to each other to distribute the copyright and include the easy-to-play tenth of the work... The affiliate information and the execution program of the connection are characterized by: the data structure of the subsidiary information , with the identification of the crop information of ^ ^ «/,,. 匕3, and/or the execution program distributed in sequence, executed at the client terminal:: scatterers The following steps are taken: the sub-information transmission step is to send the sub-information in order to make positive and negative judgments on the server; and to distribute again In the process of creating a book, the customer information of the affiliated asset w, 隹-® is added to the subsidiary, and the copyrighted material is encrypted. The test crop is distributed with electronic files, due to the program. % π & $ '', using the affiliate information and the execution method, and the customer and the terminal are very simple to create a re-distribution of the electronic copyright of the work,; = the electronic distribution of the material J is greatly reduced at this time 201115388 The news is negative, and the security is improved. According to the publication, the use of electrons can enhance the convenience of the work when it is redistributed, and the promotion of redistribution. "(四)物" means a person who expresses thoughts or feelings in a foreign language to the extent of literary, academic, aesthetic, or musical, and who is necessary to protect them in the field of forgiveness, such as music, film: publishing Things (mixed, novels and other electronic (four), comics, application manuals, brochures, etc.). Also, the term "customer" means an intentional acquisition: a person who has obtained a work archive. Deliberately taking the 仵 or as shown in the above description, the electronic trough case for the reproduction and promotion of the work according to the present invention can be re-dispersed by a simple operation: the use of the work file can be greatly reduced at this time. Communication negative #, and can improve security. As a result, the convenience of re-distribution can be greatly improved, and the re-distribution of crops can be made easier, and the preservation of the crop can be achieved while the circulation of the crop can be promoted. [Embodiment] The book re-distribution promotion system of the present invention, the electronic file for the distribution of the work is first obtained by the secondary client terminal, and the re-distribution work is generated in the terminal, and then distributed. The 2nd client terminal's are then distributed by the other client terminals in order to be distributed. The embodiments of the present invention are described in detail below with reference to the appropriate drawings. In the first place, a client of the first month of the month obtained a copy of the use of the book and the use of the archives. Figure 1 The re-distribution promotion system of the book has the work material 2, 201115388 affiliate information 3, the implementation of the silent zm-type client terminal 5, the network 7, and the management of He Yuezhen '8. 1 customer terminal can exist A plurality of copies are made in the figure ^. In order to avoid the work acquired by the client terminal 5, the electronic material information for the crop administration is included in the work of the second party, and the program 4 is executed. Affiliation The establishment of the correlation is due to the inclusion of the material (4). Moreover, ^ " even if you don't install the 訾 · · terminal terminal with the add-on or plug-in program, you can easily obtain the electronic document and audio-visual works of the book. And the production of re-distribution work:: The first time the customer terminal 5 spreads the electricity for the work:: Various kinds of square wires are used. ❹, can be obtained at Lai, etc., and the terminal 5 is downloaded from the management feeder 8 through the network 7: the client terminal 5 is again received to receive the additional crop distribution from the management feeding end 8. When the e-mail of the file is also available, the electronic media used to store the electronic slot of the work can be stored in various forms. One Shishi', has USB memory, SD memory, CD-R, DVD-R, etc. . For example, the subsidiary information 3 and the t=4' included in the crop distribution electronic file acquired and stored in the hard disk (not shown) by the secondary client terminal 5 are moved here and The state stored in the t-th customer terminal $: the premise of the description. The location of the storage and storage of the work material 2 and the attached information 2 is not particularly limited, and the knife may be stored separately in the memory unit 6, or the reset 7' may be stored in the built-in type.拽^: One-time reading device such as a hard disk of the client terminal 5, or an electronic memory medium such as a memory. Temple 201115388 Publications 2 The electronic materials of the works. The information form of the electronic material of the work is not particularly limited, and may be based on the type of the work, the operating system used by the client terminal, and the user terminal to view the work.

PDF 用之應用程式等而妥為選擇。一般而言可使用 (Portable Document Format) ^ JPEG ( j〇int Photographic Experts Group) ' MPEG ( Moving Picture Experts Group ) ^ GIF( Graphic Interchange Format) ^BMP( Bitmap),HTML (HyperText Markup Language) ^ RTF( Rich Text Format) ^ MP3 (MPEG-1 Audio Layer-3)等。在這其巾,基於不會受 限於客戶終端所使用之作業系統的種類、可視聽著作物之 電子資料、檔案大小較小、以及更容易進行再散布用著作 物檔案之散布等觀點來看,α pDF為較佳。在本實施形態 中,由1次客戶終端5所取得之著作物資料2為一般文字, 但亦可為經過加密者。 附屬資訊3,包含與上述著作物檔案相關之各種資訊。 附屬資訊3亦為電子資料。電子資料之形式並無特別限制。 著作物資料2的形式為PDF之情形時,附屬資訊3可被内 嵌於該著作物資料2之中。 圖2表示附屬資訊3之資料構造圖。附屬資訊3具有 識別資訊部13、及散布者資訊部14。 ” 在識別資訊部13之中,包含著作物之資訊,例如著作 物之序號等。由於附屬資訊3具有識別資訊部i 3,在著作 物權案之正當性判斷時,可確認著作物之資訊,並可確保 其安全性。 在散布者資訊部14中,包含了提供該著作物之著作權 10 201115388 者、及對於再散布用著作物構案予以依序散布之客^胃 訊⑽資訊)。客戶之資訊(ID資訊)係指被分配至各客 戶之編號、文字、及記號等’或是其等之組合。如圖2所 不,在1次客戶所取得之著作物散布用槽案中,散布者資 訊部14僅包含著作權者資訊。 及構成散 其資料大 亦即以 在上述附屬資訊3所包含之識別資訊部13 布者資訊部14之著作權者資訊或是各客戶資訊 小並無特別限制,但較佳係分別在128Byte以下…… 封包以下之資料大小為較佳。因為將各個資訊以上述資料 大J來呈現,藉此,客戶終端5可在降低通訊負荷及低成 本的條件下,收發在管理伺服器8供判斷著作物之正當性 時所需之資訊。藉此方式’彳進一步提高著作物於再散布 時之便利性’可促進再散布,可實現著作物進一步的促進 流通。 執仃私式4係用以在!次客戶終端5執行各項處理者。 圖二係該執行程式4之資料構造圖。該執行程式4具有附 屬貝訊發送步驟15,及再散布用著作物產生步驟16。 附屬資訊發送步驟15,係為了在管理伺服器8對!次 客戶終端5所取得之著作物檔案判斷其正當性,而將1次 、〜端5之β玄著作物之附屬資訊3發送給管理伺服器8。 由於具有該步驟,而可簡便的進行著作物資料2之正當性 :斷1屬資訊發送步驟15,亦可等候1次客戶所進行之 ,方進行附屬資訊3的發送,例如,在藉由1次客 5而取得著作物散布用檔案時,即自動地開始進行 …伺服器8間的通訊,自動的進行附屬資訊3的發送。 11 201115388 藉此方式,可大幅提昇著作物 n t M # '丹政布時之便利性。 將仔存Π Γ物產生㈣16,係對於1次客戶終端5, 部6,附屬資訊3之散布者資訊…之 作物資ID貧訊)予以追加以進行更新,並且對著 作物身枓2進行加密。藉此,而 丁有 料、由者作物之加密資 枓更新後之附屬資訊3、及執行 著作物檔宰。由;所構成之再散布用 布用於:驟,而能非常簡單的產生再散 用檔案,因此而能大幅提昇著 性。又,Η , 再散布時的便利 二:由於在附屬資…—步追加客戶資訊,因此, ::散布用著作物槽案之正當性判斷時的安全 確保者作權的保護β 作物終端5具有附屬資訊發送手段9與再散布用著 咖二:q次客戶終端5在系統方面,具備有由 專構成之控制部、R0M、RAM、硬碟、顯示器、及輸 專。附屬資訊發送手段9及再散布用著作物產生手段 ::據執行程式4之附屬資訊傳送步驟15、及再散布 用者作物產生步驟16之各步驟,而由1次客戶終端5之控 ㈣(未圖示)來控制各部以使其發揮功能。i次客戶终端 可:要是可藉由執行程式4而動作者則並無特別偈限,例如 J為仃動電話、攜帶式終端機、及個人電腦等。 網路7之典型用例為網際網路。網路7之傳送媒體可 太網路(註冊商標)、光纖' 或電話線路等各種有 =媒體或無線媒體。網路7可直接連接i次客戶終端5及 管理伺服g 8,亦可透過移動通訊網用之飼服、来 而連接。 圆不; 12 201115388 笞理伺服器8具有正當性判斷 手段12。 钱11與附屬資訊更新 正當性判斷手段U,係為了要判斷由 所取得之著作物散布用檔案 = 戶… 客戶終端5之附屬資訊…錄在而將發自1次 訊予以核對,當兩者内容一致 之附屬資 、s a欲、、, 之障$時’則將正當性確認 通知發迗至1次客戶終端5。 附屬資訊更新手段12,係對於 附屬資訊予以追加已取得著作物^ 官理伺服器8之 一 / 已取仵者作物散布用檔案之丨次客戶的 貪訊(ID資訊)以進行更新。 ^ t . 由於八有該附屬資訊更新手 & m能對於被依序散布之著作物散布用 性判斷。又,藉由在管理伺服号田 J服态8 δ己錄及更新之附屬資訊, 易於進行著作物之管理或散布狀況的掌握。 s里伺服器8在系統方面,係由電腦所構成,其中具 備由CPU等所構成之控制部、卿、RAM、硬碟、顯示器^ 及鍵盤等。正當性判斷手段"及附屬資訊更新手段12,係 根據儲存於管理飼服器8之職、硬碟等之電腦程式,由 控制部(未圖示)來控制各部以使其發揮功能。 以下根據圖4來說明該著作物再散布促進系統1 作。 百先,1次客戶終端5對管理伺服器8進行通訊要求, 在兩者之間確立通訊。此處,在!次客戶終端5及管理飼 服端8之間的通訊,能以一般文字來進行,亦能為了確保 安全性而以加密之通訊方式來進行。以加密通訊之方法而 ° SSL (女王套接層:Secure Socket Layer)或丁LS (傳 13 201115388 輸層安全:Transport Layer Security)為適用之方法。在該 SSL通訊中,附屬資訊3係藉共用金鑰等而被加密發送? 又,在被接收之後係藉共用金鑰等予以解密。在該通訊中, 亦可使用SSL以外的加密通訊方法。 又,在該著作物再散布促進系統丨中,於丨次客戶狄 端5與管理飼服器8之間進行通訊的方法,除了以網路連 接來直接進行資訊之收發之外,亦可採間接式之資訊收發 方法,例如,以電子郵件的附加檔案來收發附屬資訊3或 正當性確認通知之收發之通訊方法亦可。 接著,藉由附屬資訊發送步驟15的處理,丨次客戶终 端5讀取保存在其記憶部6之附屬資訊3,發送至管理飼月艮 器8。 管理飼服器8藉由正當性判斷手段u,對於所接收之 附屬資訊3進行附屬資訊的核對。亦即,判斷記錄在管理 伺服器8之附屬資訊的内容與所接收到之著作物槽案中之 附屬貝讯3之内容是否為一致,若判斷成一致時,則將該 著作物檔案判斷為正規品。由正當性判斷時會有較高安全 ^之觀點看來,用於該核對之附屬資訊3,較佳係採用識別 為訊部13與散布老皆% 貝Λ 14雙方,但亦能僅使用識別資訊 部1 3,亦能僅使用散布者資訊部μ ^ 在上述正當性判斷之後’管理飼服器8對!次客戶終 端5發送正當性確認通知。 1 -人客戶終端5在接收到該正當性確認通知之後,藉由 再散布用者作物產生步騾ί6的處理,對著作物之附屬資訊 追加了儲存在1次客戶終端5之!次客戶資訊(ID資訊) 201115388 以進行更新’且對著作物資料2進行加密。藉此,產生了 由著作物之加密資料、更新後之附屬資訊3、及執行程式4 所構成之2次客戶散布用檔案。在產生之散布用檔案中, 附屬資訊3之構成如圖5所示,除了識別資訊部丨3之外, 散布者資訊部14成為了包含著作權者資訊及1次客戶資訊 之構成。上述附屬資訊3的更新除了上述方法之外,亦可 採用下述方法:將已在管理伺服器8更新之附屬資訊發送 至1次客戶終端5,然後與儲存在記憶部6之附屬資訊3置 換。 上述中,將著作物資料予以加密之方式並無特別限 制,只要是一般所用之將電子資料加密的方式,則可使用。 公鑰加密方式亦可,共用金鑰加密方式亦宜。此類方法可 例舉如下述各方法:AES (高級加密標準:Advanced Encryption System )、DES (資料加密標準:Encrypti〇n Standard )、Triple DES(三重資料加密標準:DaU Encrypti〇n Standard ) 、RSA (非對稱加密演算法:PDF is used for applications such as applications. (Portable Document Format) ^ JPEG ( j〇int Photographic Experts Group) ' MPEG ( Moving Picture Experts Group ) ^ GIF ( Graphic Interchange Format ) ^ BMP ( Bitmap), HTML (HyperText Markup Language) ^ RTF ( Rich Text Format) ^ MP3 (MPEG-1 Audio Layer-3), etc. The towel is based on the fact that it is not limited by the type of operating system used by the client terminal, the electronic material of the visually readable work, the small file size, and the ease of distribution of the re-distributed work file. , α pDF is preferred. In the present embodiment, the work material 2 acquired by the primary client terminal 5 is a general character, but may be an encrypted person. Subsidiary information 3 contains various information related to the above-mentioned works archives. Subsidiary Information 3 is also an electronic material. There is no special restriction on the form of electronic materials. When the form of the work material 2 is PDF, the subsidiary information 3 can be embedded in the work material 2. Fig. 2 shows a data structure diagram of the subsidiary information 3. The affiliate information 3 has an identification information unit 13 and a distributor information unit 14. The identification information unit 13 includes information on the work, such as the serial number of the work, etc. Since the subsidiary information 3 has the identification information unit i 3 , the information of the work can be confirmed when the right of the copyright is determined. In addition, the distributor information unit 14 includes the copyright of the work 10 201115388, and the customer (the stomach information (10) information) for the re-distribution of the structure. The customer's information (ID information) refers to the number, text, and symbol assigned to each customer's or a combination of them. As shown in Figure 2, in the case of the book distribution for the customer The distributor information unit 14 only includes the information of the copyright owner. The information of the distributor is included in the identification information unit 13 included in the subsidiary information 3, and the copyright information of the information unit 14 or the customer information is small. It is particularly limited, but preferably less than 128 Bytes respectively... The size of the data below the packet is preferred. Since the information is presented in the above-mentioned data J, the client terminal 5 can reduce the communication negative. And under the condition of low cost, the information required for the management server 8 to judge the legitimacy of the work is transmitted and received. By means of the method of "further improving the convenience of the work in the re-distribution", the re-distribution can be promoted. The work is further promoted to circulate. The private system 4 is used to execute various processors in the client terminal 5. Fig. 2 is a data structure diagram of the execution program 4. The execution program 4 has an auxiliary broadcast transmission step 15 And the re-distribution work generating step 16. The sub-information transmitting step 15 is for determining the legitimacy of the work file acquired by the management server 8 for the sub-client terminal 5, and the one-time, the end-end 5 The auxiliary information 3 of the β metaphysical work is sent to the management server 8. Because of this step, the legitimacy of the work material 2 can be easily performed: the first information transmission step 15 can be performed, and the customer can also wait for one time. When the attachment information 3 is transmitted, for example, when the file for the distribution of the work is acquired by the first guest 5, the communication between the servers 8 is automatically started, and the transmission of the auxiliary information 3 is automatically performed. 11 201115388 In this way, the convenience of the work nt M # 'Danzheng cloth can be greatly improved. Will be stored in the Γ Γ 产生 产生 产生 产生 16 , , , , , , , , 16 16 16 16 16 16 16 16 1 1 1 1 1 1 1 1 1 1 1 The information...the crop ID is poor), it is added to be updated, and the copyright of the work is encrypted 2, thereby the additional information, the cryptographic assets of the crop, the updated affiliate information 3, and the execution of the work. The re-distribution of the cloth is used for: the sudden, and can be used to generate the re-distributed file very simply, so that the sexuality can be greatly improved. Also, Η, the convenience of the second spread: due to the attachment .............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................. The secondary client terminal 5 has a control unit, a ROM, a RAM, a hard disk, a display, and a transmission dedicated to the system. The affiliate information transmitting means 9 and the re-distribution work generating means are: according to the steps of the auxiliary information transmitting step 15 of the execution program 4 and the re-spreading user crop generating step 16, and are controlled by the first client terminal 5 (4) ( Not shown) to control each part to function. I-client terminal Yes: There is no special limit if the author can be executed by executing the program 4. For example, J is a mobile phone, a portable terminal, and a personal computer. A typical use case for Network 7 is the Internet. The transmission medium of the network 7 can be various media or wireless media such as a network (registered trademark), an optical fiber, or a telephone line. The network 7 can be directly connected to the i-th customer terminal 5 and the management servo g 8, and can also be connected through the mobile communication network. Round no; 12 201115388 The processing server 8 has a justification judging means 12. Money 11 and affiliate information update justification means U, in order to judge the file for distribution of the acquired work = household... The affiliate information of the client terminal 5 is recorded and will be checked from 1 time, when both If the content is the same as the subsidiary, sa, and, the barrier is $, then the validity confirmation notice is sent to the client terminal 5 once. The affiliate information update means 12 updates the affliction (ID information) of the customer who has obtained the work of the official information server 8 / the file of the crop distribution file for the subsidiary information. ^ t . Since the eight-in-one information update hand & m can be used to judge the dissemination of sexuality. In addition, it is easy to grasp the management or distribution of the work by managing the attached information of the servo number field. The server 8 in the s system is composed of a computer, and has a control unit composed of a CPU, a RAM, a hard disk, a display, and a keyboard. The legitimacy determination means " and the affiliate information update means 12 are controlled by a control unit (not shown) to function according to a computer program stored in the management server 8 or a hard disk. The work re-dispersion promoting system 1 will be described below based on Fig. 4 . One hundred times, the client terminal 5 once communicates with the management server 8, and establishes communication between the two. Here, at! The communication between the secondary client terminal 5 and the management terminal 8 can be performed in general text, and can also be performed by encrypted communication in order to ensure security. In the case of encrypted communication, ° SSL (Secure Socket Layer) or Ding LS (Transport 13 Security: Transport Layer Security) is the applicable method. In the SSL communication, the affiliate information 3 is encrypted and transmitted by a shared key or the like. Moreover, after being received, it is decrypted by a shared key or the like. In this communication, an encrypted communication method other than SSL can also be used. In addition, in the work re-distribution promotion system, the method of communication between the customer Dide 5 and the management feeder 8 can be directly transmitted and received by the network connection. The indirect method of transmitting and receiving information, for example, the method of transmitting and receiving the attached information 3 or the sending and receiving of the justification confirmation notification by the attached file of the email may also be used. Then, by the processing of the affiliate information transmitting step 15, the client terminal 5 reads the attached information 3 stored in the memory unit 6 and transmits it to the management fisher 8 . The management feeder 8 checks the affiliate information for the received affiliate information 3 by the justification judging means u. That is, it is judged whether the content of the subsidiary information recorded in the management server 8 is consistent with the content of the attached Beixun 3 in the received work slot, and if it is determined to be the same, the copyright file is determined as Regular product. It is considered that there is a higher security in the judgment of legitimacy. The subsidiary information 3 used for the verification is preferably identified as the information section 13 and the dissemination of the old ones, but only the identification is used. The information unit 1 3 can also use only the distributor information unit μ ^ to manage the pair of feeding machines 8 after the above-mentioned legitimacy judgment! The secondary client terminal 5 sends a confirmation of validity confirmation. After receiving the validity confirmation notification, the 1-person client terminal 5 adds the attachment information of the user to the client terminal 5 by repeating the processing of the user crop generation step 骡6. Secondary customer information (ID information) 201115388 to update' and encrypt the copyright material 2. As a result, a second-time customer distribution file composed of the encrypted data of the work, the updated affiliate information 3, and the execution program 4 is generated. In the generated distribution file, the configuration of the subsidiary information 3 is as shown in Fig. 5. In addition to the identification information unit 3, the distributor information unit 14 is composed of the copyright owner information and the primary customer information. In addition to the above method, the update of the above-mentioned ancillary information 3 may be performed by transmitting the affiliate information that has been updated by the management server 8 to the client terminal 5 once, and then replacing it with the subsidiary information 3 stored in the memory unit 6. . In the above, the method of encrypting the copyrighted material is not particularly limited, and may be used as long as it is generally used to encrypt electronic materials. The public key encryption method is also available, and the shared key encryption method is also suitable. Such methods can be exemplified by the following methods: AES (Advanced Encryption System: Advanced Encryption System), DES (Data Encryption Standard: Encrypti〇n Standard), Triple DES (Triple Data Encryption Standard: DaU Encrypti〇n Standard), RSA (Asymmetric encryption algorithm:

Adleman )、IDEA (對稱數據加密演算法:Intemati〇nai DauAdleman ), IDEA (Symmetric Data Encryption Algorithm: Intemati〇nai Dau

Encryption Algorithm)、FEAL(快速資料加密演算法:Encryption Algorithm), FEAL (Fast Data Encryption Algorithm:

Data Encipherment Algorithm)、Rc ( Rivest Cipher 〇r R〇n,s Code)。 又’將著作物資料予以加密的方法,可使用一般採用 之加密方法。例如,藉執行程式4之再散布用著作物產生 步驟16之處理而予以加冑之方法亦可;使用由㈣飼服器 8連同正當性確認通知一併#來之加密鑰而進行加密之方 法亦可。 15 201115388 ,^ ,由1人客戶終端5對管理伺服器8發出通m狄 止凊求,結束兩者之間的通訊。 ⑬出通訊、,、 可以上述方式產生之2次裳 戶狄端S. 人客戶散布用檔案,由1次客 戶w端5放布至其他的客戶終 限制。例如,可藉由在客戶以布之方法並無特別 r、間之紅外線通訊或Bluet00th (藍穿,註冊商標)等通訊方 SD印愔駚楚+ 飞來進仃,亦可透過USB或 n .¾體4電子記錄媒體來進行。又, 終端間收發之電子郵件内以進行之。’、於在客戶 於再散布用著作物檔荦中, >i W ^ ^ Α βτλ ,、 右疋在耆作物資料2及附 卿斤荦所八Μ式之電子資料時’執行程式4係以由該 山在JavaSeript(註冊商標)語言等所寫成而内 二檔案為佳。當著作物資料2及附屬資訊3為其他 ”!’1以將執行程式4内嵌於其中為較佳。藉此方式, 既此提昇著作物;$ μ & ^ ω "物检案的動作性,亦能大幅提昇再散布之便 利性。 依照該著作物再散布促㈣統卜可簡便的產生再散布 f作物檔案。又’在此際,於j次客戶終端$與管理伺 服益8間之通訊負荷可大幅降低,且能提昇安全性。藉此, 可大幅提昇著作物於再散布時的便利性,因而可促進再散 布依》亥著作物再散布促進系統卜既能保護著作權又可實 現著作物的促進流通。 又,依照此種具以上特徵之包含著作物資料2、附屬資 訊3、及執行程式4之著作物散布用電子檔案,在取得此樓 案之1人客戶終端5中,可簡便的產生再散布用著作物電 檔案又可大幅降低此際之通訊負荷,且能提昇安全 16 201115388 性。藉此而能提昇著 進著作物的再散布。、'散布時的便利性’因而可促 接著使用圖6,說明與圖i ^ 進系統1 7。 、Ί、之著作物再散布促 此處所說明者,係從!次客戶 個以上之客戶終端之依序散布後,由n :2二:布ST得再散布用著作物檔案(此處稱: 谷戶政布用檔案」)之情形。 加密η作物再散布促進系統17中,具有著作物之 ::科二附屬資訊19、執行程式2〇、η次客戶終端21、 •用路7、及官理伺服器23。在以下的說明中,對於 之者作物再散布促進系統丨 …、 以適當省略說明五本 门的構成,係賦與相同符號 指物再散布促㈣統17中, 客戶的:人數^以複數方式存在,又^次 能以複數方式存在。然而,在圖 Ά t 成Η“次客戶終端21來說明。為避免煩雜,係限定 在該再散布用著作物播案中,有包含著作物之加 ^18及附屬資訊19’附屬資訊19係被移動及保存在 :::客戶終端21的記憶部22。又,執行程式2〇係安裝在η ^ 、终端21 ’其被設定成能藉由儲存在記憶部22之瀏覽 器中之附加元件或外掛程式來達成。著作物之加密資料Μ ㈣屬資訊19之儲存或保存的位置,並無特別限^,亦可 分別獨立的保存在記憶部22’又’亦可保存在内設於^欠 客戶終端2i或與其連接之硬碟的讀取袭置、或者是保存在 ㈣記憶體等電子記憶媒體亦可。執行程式加不一定由瀏Data Encipherment Algorithm), Rc ( Rivest Cipher 〇r R〇n, s Code). Further, the method of encrypting the copyrighted material can use the encryption method generally employed. For example, the method of adding the processing by the work generating step 16 by the execution program 4 may be performed by using the method of (4) the feeding device 8 together with the authentication confirmation notification plus the key. Also. 15 201115388 , ^ , the one-person client terminal 5 issues a communication request to the management server 8, and ends the communication between the two. 13 out of communication,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, For example, it can be accessed by the customer in the form of a cloth without special r, infrared communication or Bluet00th (blue wear, registered trademark), etc., or through USB or n. 3⁄4 body 4 electronic recording media to carry out. In addition, the e-mail sent and received between the terminals is carried out. ', in the customer's re-distribution of the file, >i W ^ ^ Α βτλ, right-handed in the crop material 2 and attached to the 荦 荦 Μ Μ 之 电子 ' ' ' ' ' 执行 执行 执行 执行It is better to write the second file in the JavaSeript (registered trademark) language. It is better to embed the execution program 4 in the work material 2 and the affiliate information 3 as the other "!" 1 in this way, thereby enhancing the work; $ μ & ^ ω " The mobility can also greatly enhance the convenience of re-distribution. According to the re-distribution of the work, (4) the system can easily generate and distribute the crop file. In this case, the j-client terminal and the management servo benefit 8 The communication load between the two can be greatly reduced, and the security can be improved. This can greatly enhance the convenience of the re-distribution of the work, thereby facilitating the re-distribution of the copy of the work and the promotion of the system to protect the copyright. The distribution of the work can be realized. In addition, according to the above-mentioned feature, including the work material 2, the affiliate information 3, and the electronic file for the work distribution of the execution program 4, the one-person client terminal 5 of the case is obtained. In this way, it is possible to easily generate the re-distribution of the electronic file of the work, and it can greatly reduce the communication load at this time, and can improve the safety of the work. This can enhance the re-distribution of the work. 'Therefore, it can be promoted to use Figure 6 to illustrate the relationship with the figure i ^ into the system 17. The work of the Ί, 再, 促 促 促 促 促 促 再 再 再 再 再 再 再 再 再 再 再 再 再 再 再 再 再 再 再 再 再 再 再 再 再 再 再 再n : 2 2: The situation in which the cloth ST is re-distributed with the archives of the works (herein referred to as: the archives of the grain management of the grain). The encrypted n crop re-dispatch promotion system 17 has a workbook: Subsidiary information 19, an execution program 2, an n-th customer terminal 21, a use path 7, and a government server 23. In the following description, for the crop re-distribution promotion system 、..., to appropriately omit the description of the five-door structure, the same symbol is used to re-spread the spurt (four) system 17, the customer: the number ^ exists in plural , and ^ can be in multiple ways. However, the figure is shown in the "secondary client terminal 21". In order to avoid cumbersomeness, it is limited to the publication of the re-distribution work, including the addition of the work object 18 and the affiliate information 19' subsidiary information 19 It is moved and stored in the memory unit 22 of the ::: client terminal 21. Further, the execution program 2 is installed at η ^ , and the terminal 21 ' is set to be an additional component that can be stored in the browser of the storage unit 22 Or the plug-in program to achieve. The encrypted data of the work Μ (4) is the location where the information 19 is stored or stored, there is no special limit, and it can also be stored separately in the memory unit 22' and can also be saved in the ^ The reading of the hard disk that is owed to the client terminal 2i or connected thereto, or the electronic memory medium stored in (4) memory may also be used.

17 S 201115388 覽器之附加元件或外掛程式來達成’亦可在該再散布用著 作檔案中包含執行程式20,然後使用其來達成。 著作物之加密資料18,係指著作物資料之被加密者。 將著作物資料予以加密而產生此類加密資料丨8之方式,並 無特別限定,可使用將上述電子資料予以加密時一般所使 用的方式。 圖7係附屬資訊19之資料構造圖。附屬資訊19具有 識別資訊部13、散布者資訊部28、接續資訊部29、及 資訊部3 0。 、’ ,-π , r仍〜苓邛權者、 以及將該著作物散布用檔案依序散布之客戶資訊(ID資 訊)、亦即由U客戶資訊起至㈣)次之客戶資訊。由二 在附屬資訊19具有上述散布者資訊㈣,藉 物 檔案之正當化判斷時,卄τ投 者作物 斷時並不僅只於識別資訊部13,而亦# 對所有將該著作物依庠勒古+分ή t攻 向兀核 — 客戶的貝訊即散布者資訊28 =谷,=此而能進一步提昇安全性,而能確保著作權的 :護由於係將具有該散布者資訊部28之附屬資訊19, 戶終端21發送至管理編23並記錄,:此 r ^ ^ 。進仃散布者資訊的管理,因此,向取 Α ^ 來的購入款之一部分,可確實的作 為者作榷報酬而分配給 貫的作 款的-部分,作為 J Τ將㈣入 u 7, ^ 布報酬而分配給已依序散布之客戶。 碏此,乃對於各客卢 夺广 因,藉此而能進一步仿、:了促使其散布著作物的強烈誘 '促進著作物的流通。 在接續資訊部29中 ^ ,包含了該再散布用著作物檔案經 18 201115388 =覆的散布及取得後,所產生之接 可增加在二著作物權案之正當性判斷之際, 仕附屬貝訊19之核對時所用到 當性判斷時之安 而使付在正 内容可舉例為,,再=在接續資訊部29所包含之 為止之著作物㈣料被散布至目前 ~正 < 各戶之資訊( 又,由於…… 亥接續順序之資訊等。 可對附屬資物檔案之正當性判斷之際, 改,因而可進-步提高安全性。 百否又到表 顯示接續資訊部29所包含的内容尚可舉例為,能 數器。由亥槽案之累積散布次數資訊的散布次數計 時° Μ於具有該種計數11 ’ #累積散布次數達到設定值 二=本發明之著作物再散布促 =::,在俗稱老鼠會之多層次傳銷。再者,在接續資 ° 彳包含客戶之群組化資訊等。由於具有該客戶 以雜且化資訊,例如,可使具有共同1D資訊之複數個客戶 組方式來登錄,並可將其設定成,群組内中的某一個 所取得之再散布用著作物槽案,可在同一群組内之其他 客戶終端範圍内自由的視聽。 ;斗貝訊°卩3〇,包含與著作物之電子資料相關的資 浓次=該貝料資訊部30 ’係藉由連結等而與著作物之加 貝;斗18建立關連性。資料資訊部%的内容可舉例為, 與者作物電子資祖 $ 料資訊部3。,在著作物辦宏小有關的資訊。由於具有該資 作物資料有否受到篡:因當性判斷之際’能檢查著 因而此進一步提昇安全性,可確 201115388 保著作權的保護。 …在上述附屬資訊19内所包含之接續資訊部Μ及資料 資mo ’其各自之f料大小並無特別限制,但基於愈上 述之識別資訊部丨3等相同的理由,分…細沖以下, 亦即1封包以下之資料尺寸為較佳。 又,附屬資訊19之整艚之咨斗立各, + 正媸之資科大小,較佳為12KB以 下。若是超過12KB,將該附屬咨却,0丄 肝成附屬貝訊19由n次客戶終端2 j 發送至管理伺服器23時的通 .^ ^ ^ 町〜m Λ貞何較大,有降低著作物於 再散布時的便利性之虞。資料大小以腺Β以下為較佳在 8ΚΒ以下則更佳,若為6ΚΒ以下尤佳。又,附屬資訊19 整體之資料大小以〇·5ΚΒ以上為較佳。若是未滿〇 5κβ,在 附屬f訊19中之著作物檔案的正當性判斷時,有可能缺乏 必需之資訊而有降低安全性之虞。資料大小以㈣以上為 較佳’ 1 ·5ΚΒ以上則更佳,纟2ΚΒ以上尤佳。再者,附屬 資訊19之資料大小亦可藉由檔案壓縮技術而予降低,而亦 可使通訊負荷更為降低。. 圖8係執行程式2〇之資料構造圖。執行程式2〇具有 附屬資訊發送步驟15、可讀取著作物產生步驟31、及再散 布用著作物產生步驟16。此等步驟被安裝在η次客戶終端 2 1,然後由儲存在記憶部22之瀏覽器之附加元件或外掛程 式來達成。 可讀取著作物產生步驟3 1,係將由η次客戶終端21所 取得之著作物的加密資料18予以解密,而產生可讀取著作 物。由於具有該步驟,在取得著作物加密資料18之11次客 戶終端21中’經正當化判斷之後即可簡便的視聽著作物。 20 201115388 n人客戶終端21具有附屬資訊發送 作物產生手段25、《 ^ 」肩取者 又 及再散布用著作物產生手段10。盥上诚 之1次客戶終端5夕法 上述 之各+驟而^ 形相同,各手段係根據執行程式20 之各步驟而由控制部(未圖示)來控制以發揮功能。 手乂理1服器23具有正當性判斷手段26、附屬資訊更新 手^2、及收款/分配手段^又㈣伺服器u 配送管理資料庫24連接。 ’、訊心 a正當性判斷手段26為了要判斷由η次客戶終端 取得之著作物墙宏θχΑ 斤 案疋否為正規品,而將經由η次客戶終端 之附資訊傳送手段9之處理後發送 …與記錄在管理飼服器23之附屬資訊核對,且 於發送而來之附屬眘_1Q a ' ° 的解析,而檢查該附屬資訊19 =作物:貝料有否受到篡改。在進行核對後判斷成兩者的 内谷一致、且並未受到篡改時,則將正當性確認通知發送 至η次客戶終端2 1。 收执/刀配手段27,係與訊息配送管理資料庫24丘同 動作,能根據著作物之附屬資訊之内容而向購入該著:物 之η:欠客戶徵收著作物購入款’且將上述款項之一部分分 =給著:權者作為著作權報酬。由於具有該收款/分配手 奴’在管理伺服器23可根據所管理的著作物之散布狀況, 確實的進行購入款之徵收及著作權報酬等之分配。 以下根據圖9,以說明在取得η次客戶散布用著作物槽 茶之η次客戶終端21中,進 著作物擋案的步驟。 丁㈣者作物及產生再散布用 首先1次客戶終端21對管理飼服器23進行通訊要 21 201115388 求,確立兩者之間的通訊。 接著,藉由附屬資訊發送步驟 端2!讀取了保存在其記憶部^ 的,理,η次客戶終 管理飼服器23。管理飼服器23 貝訊19’並發送至 對於所接收m訊19進行^/、正當性判斷手段26, 改。在本實施形態中可用於進行核對之且二斷二否有受到篡 別資訊部13、散布者資1 π f屬貝矾19,有識 狀W有貝訊部28、接蟢咨 部30,妒而4- ’資訊。P 29、及資料資 然而,在核對時所使 艰担 ^ 说 貝5凡部可由這當中適去 選擇。又,附屬資訊19有否受到 田Τ過田 的解析來判斷.π .. ,係由接續資訊部29 π阱听木判斷,又,著作物資 眘邙邮^ Λ 又到墓改,係由資料 資訊。Ρ 3 0的解析來判斷當來 次 田來自n次客戶終端21之附屬 資訊1 9與記錄在管理伺服器23 π全丨啦λ、 <附屬貝訊被管理伺服器 23·成-致’且判斷成附屬資訊”及著作物資料未受到 篡改時’乃將η次客戶終端21所取得之著作物檔案判斷成 正規品。 在上述正當性判斷之後,管理伺服器23對η次客戶終 端21發送正當性確認通知。又,管理伺服器23對η次客 戶終端21發出送令,使附屬資訊19之接續資訊部29所具 有之檔案累積散布次數計數器加1。 η次客戶終端21在接收該正當性確認通知之後,藉由 可讀取著作物產生步驟3 1的處理’將著作物之加密資料1 8 予以解密,以產生可讀取著作物。 此處’著作物之加密資料1 8之解密方式,係對應於在 產生上述η次客戶散布用著作物檔案時將著作物資料予以 加密之方式而選擇。又,將之解密之方式尚可例舉為,藉 22 201115388 執仃耘式20之可讀取著作物產 密的方法.W ^ 的“不而予以解 ’或者疋使用來自於管理伺服-? 確認通知-併揸冰A J服益23之連同正當性 併傳來之解密鑰然後將其解密之方法。 又’在π次客戶終端21中,俜蕤 步驟係藉再散布用著作物產生 乂驟16的處理,對附屬資訊 邻、丨v、仓^ " Π -人客戶資訊(ID資 訊)以進行更新,且對著 、 該再力… 于者作物之加被資料18進行再加密。 〇X 雄之加密方式並無特別限定,與上述菩你私κ is: ^ it 1 α, ’、 ^者作物再散布 促進系,統1中之加密情形時相同, 式皆可蚀田^ 文疋版所使用的方 式白了使用。又,對著作物加密資 ^ -r ϋϋ / I 予以再加选之方法 料° ^下m經過解密而產生之可讀取著作物資 二相:或相異於解密時之密碼形式來進行加密;或者 :鑰之::作物之加密資料18 ’以在解密時會用到不同解 松鑰之方式而將資料作變更妙 J解 尺…、後產生再加密資料。 如所示,產生了由著作物之再加密資料 屬資訊所構成之(n+l)次客戶散布 後之附 令尸敢布用檔案。藉此,在 客戶散布用檔案中之附屬資訊 丄y的構成’如圖1 〇所千, 包含了識別資訊部13、由1今g ▲丄 斤不 19 1 -人累計至η次止之作為勒右 資訊部28的客戶資訊、接續資 .·,散布者 按、,只貝现部29、及資料資訊邱 又,在接續資訊部29所1有夕审 》邛30。 ,、有之累積散布次數計數$數 值’乃按照來自管理伺服器23 Τ数器之數 的才日不而增加1次。卷玲斗 數器之數值達到規定值時,亦n w ^ 4 用檔案進一步散布至其他客戶炊山 之丹散邓 各戶終端。其等之附屬資 更新,除上述的方法以外,伽1 貝況19的 J如’亦可將已在管理 23更新之附屬資訊發送至η今令 们服益 s te 苳戶終端21,然後盥儲农右 記憶部22之附屬資訊1 9置換 、存在 23 201115388 在S理飼服盗23,係以由該收款/分配手段27朝訊息 配送管理資料庫24下達指示之方式,進行收款/分配處理。 亦P除了向η次客戶徵收該著作物之購人款外亦將上 述款項之-部分分配給著作權者作為著作權報酬。除此之 外,例如’亦可將該款項之一部分作為散布之報酬,而分 配給依序散布該著作物之客戶 '即記錄在附屬資訊Μ之散 布者資訊部28之由i次至㈣次客戶的全部或一部分。 最後’ ώ η次客戶終端2 i對管理飼服器發送通訊 終止要求,結束兩者之間的通訊。 由上述方式而產生之(n+1)次客戶散布用檔案,可由n 次客戶終端21而被散布至其他客戶終端。 依照該著作物再散布促進系統17,附屬資訊19且有接 續資訊部29及/或資料資訊部3〇,因此,可供判斷附廣資 訊19或著作物資料有無受到篡改,而能進一步提昇著作物 於^當性判斷時之安全Ί對於取得著作物資料已受加密 聽著作物,以及進一步地=:=?非常簡便的視 進一步提昇著作物於再散布時的便利性1而二 步促進著作物的再散布。依照該著作物再散布促進t统 17 ’既此充實者作權的保護’又能輕易地由複數個客戶來 ,序散布著作物檔案而使之流通。因&,可同時實現充實 者作權保護與進—步促進著作物的流通。 又,依照具有上述特徵之著作物散 進-步提昇安全性,既能充實著作權的保護,== 由複數個客戶依序散布著作物散布用電子= 24 201115388 通。因此,可同時實現充實著作權保護與進 物的流通。 心延者作 再者,本發明之著作物再散布促進系統,並不揭限於 上述實施形態,例如,可在執行程式甲進一步具有管理步 驟’以供附屬資訊中之接續資訊部的管理。具體而令,卞 管理步驟係在再散布用著作物檀案之散布及取得之;,; 資訊中之接續資訊部的更新等。由於具有好驟, 中之接續資訊部的管理趨於容易,可確實的伴1 著作物之著作權。 ’保4 如上述,本發明之著作物至 布用電子檔案,可大巾5提#¥作物散 因此,既能保護著作==於再散布時的便利性, 於其促進流通。 b促進者作物的再散布,而有利 【圖式簡單說明】 圖1係本發明之一會絲 的概略方塊圖 圖2係圖 料構造圖。 圖3係圖 ,圖。 ㈣形態之著作物再散布促進系統 之著作物再散布促 风進系統之附屬資訊之資 料構造圖。 圖4係在圖i之著作物再散布促 端與管理㈣Ilf以㈣ 糸統中 ^ 1 ) /驟流程圖。 圖5係在圖i之著作物再散布 再散布用著作物構案之附屬 糸統中 負枓構造圖 之著作物再散布促造 進系統之執行程式之資 在客戶終 所產生之 25 201115388 圖6係與圖1之著作物再散布促進系統不同形態之著 作物再散布促進系統的概略方塊圖。 圖7係圖6之著作物再散布促進***之附屬資訊 料構造圖。 ' 圖8係圖6之著作物再散布促進系統之執行程式 料構造圖。 ' 圖9係在圖6之著作物再散布促進系統中,在客戶终 端與管理伺服器間進行通訊時的步驟流程圖。 ''、 圖10係在圖6之著作物再散布促進系統中,所產生之 再散布用著作物檔案之附屬資訊的資料構造圖。 【主要元件符號說明】 1 者作物再散布促進系統 2 著作物資料 3 附屬資訊 4 執行程式 5 1次客戶終端 6 記憶部 7 網路 8 管理伺服器 9 附屬資訊發送手段 10 再散布用著作物產生手段 11 正當性判斷手段 12 附屬資訊更新手段 13 識別資訊部 26 201115388 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 散布者資訊部 附屬資訊發送步驟 再散布用著作物產生步驟 著作物再散布促進系統 著作物加密資料 附屬資訊 執行程式 η次客戶終端 記憶部 管理伺服器 訊息配送管理資料庫 可讀取著作物產生手段 正當性判斷手段 收款/分配手段 散布者資訊部 接續資訊部 資料資訊部 可讀取著作物產生步驟17 S 201115388 The add-on or plug-in of the browser can be used to achieve the executable program 20 in the re-distribution file, and then use it to achieve. The encrypted material 18 of the work refers to the encrypted person of the work material. The manner in which the copyrighted material is encrypted to generate such encrypted data 丨8 is not particularly limited, and a method generally used when encrypting the above electronic material can be used. Fig. 7 is a data structure diagram of the affiliate information 19. The affiliate information 19 includes an identification information unit 13, a distributor information unit 28, a connection information unit 29, and an information unit 30. , ', -π, r are still ~ 苓邛 right, and the customer information (ID information), that is, the customer information from the U customer information to (4)). When the subsidiary information 19 has the above-mentioned scatterer information (4) and the judgment of the borrowing file is justified, the 卄τ voter crop breaks not only the identification information section 13, but also the 庠 将该 将该 将该 将该 将该古+分ήt attacking the nucleus - the customer's Beixun is the scatterer information 28 = valley, = this can further enhance the security, and can ensure the copyright: the protection will be attached to the scatterer information department 28 Information 19, the terminal 21 is sent to the management editor 23 and recorded, this: r ^ ^. In order to manage the information of the distributors, the part of the purchase money that is taken from the Α^ can be distributed as a reward to the part of the payment, as J Τ (4) into u 7, ^ Remuneration is distributed to customers who have been distributed in order. Therefore, it is possible to further expand the imitation of each guest, and to further promote the circulation of the works. In the connection information unit 29, after the distribution and acquisition of the re-distribution work file is completed by 18 201115388, the resulting connection can be increased in the legitimacy judgment of the two copyrights, In the case of the verification of the 19th, the use of the positive judgment can be exemplified as the positive content, and then the work (4) in the connection information section 29 is distributed to the present ~ positive < The information (in addition, because of the information of the sequence of the continuation of the sequel to the sequel to the order of the stipulations of the stipulations of the stipulations of the stipulations of the stipulations of the stipulations of the stipulations of the stipulations The content included can be exemplified by the energy meter. The number of times of dissemination of the information of the cumulative number of spreads by the sea slot is ° with the count of 11 '# cumulative spread times up to the set value two = the work of the present invention is redistributed Promote =::, in the multi-level pyramid scheme commonly known as the mouse club. In addition, in the follow-up capital 彳 contains the group information of the customer, etc. Because of the customer's mixed information, for example, can have common 1D information Multiple customers The group mode is used to log in, and can be set to be a re-distribution work slot obtained by one of the groups, and can be freely viewed and viewed within the range of other client terminals in the same group. °卩3〇, including the information related to the electronic material of the work = the information of the bedding information department 30' is linked to the work by Jiabei; the cooperation of the bucket 18. The content of the information and information department% For example, it is related to the Crop Electronics Co., Ltd. Information Department. 3. Information related to the work of the macro. Because of the information on the crop material, whether it is due to the fact that it can be checked To further enhance the security, the protection of the copyright of 201115388 can be confirmed. ... The connection information and the information contained in the above-mentioned subsidiary information 19 are not particularly limited, but based on the above identification information. For the same reason, such as Department 3, it is better to divide the following, that is, the size of the data below 1 package is better. Also, the collateral information of the subsidiary information 19 is different, and the size of the book is better. It is 12KB or less. If it is more than 12 KB, the affiliated advisory, 0丄 liver-supplied Beixun 19 is sent from the n-client terminal 2 j to the management server 23. ^ ^ ^ machi ~ m What is larger, there is a reduction in the work The size of the data is better when it is dispersed. The size of the data is preferably less than 8 inches, and more preferably less than 6 inches. Further, the size of the information of the subsidiary information 19 is preferably 〇·5ΚΒ or more. If it is less than κ5κβ, it may lack the necessary information and reduce the security when it is judged by the legitimacy of the copyright file in the affiliated newsletter 19. The size of the data is preferably (4) or more. More preferably, it is better than 2ΚΒ. In addition, the size of the information of the affiliate information 19 can also be reduced by the file compression technology, and the communication load can be further reduced. Figure 8 is a data structure diagram of the execution program. The execution program 2 has an attachment information transmission step 15, a readable work creation step 31, and a re-distribution work creation step 16. These steps are installed at the n-th customer terminal 2 1 and then by an add-on or plug-in of the browser stored in the memory unit 22. The readable book generating step 31 1 decrypts the encrypted material 18 of the work acquired by the n-th customer terminal 21 to produce a readable book. By having this step, it is possible to easily view and listen to the work after the judgment of the 11th client terminal 21 that has acquired the copyrighted material 18. 20 201115388 The n-client terminal 21 has an affiliate information transmission crop generation means 25, a "^" shoulder picker, and a re-distribution work creation means 10.盥上诚 The first client terminal 5 法 method The above-mentioned respective steps are the same, and each means is controlled by a control unit (not shown) in accordance with each step of the execution program 20 to function. The handcuffs 1 server 23 has a legitimacy judging means 26, an affiliate information update hand 2, and a collection/distribution means ^ and (4) a server u distribution management database 24 is connected. ', Xunxin a legitimacy judging means 26 in order to judge whether the book wall macro θ χΑ χΑ 取得 取得 由 由 η η η η η η η η η η η η η η η η η η η η ...check with the subsidiary information recorded in the management food feeder 23, and send it to the analysis of the affiliated caution_1Q a ' °, and check the affiliate information 19 = crop: whether the shell material has been tampered with. When it is judged that the inner valleys of the two are identical and not falsified, the validity confirmation notification is transmitted to the nth client terminal 21. The receipt/knife matching method 27 is operated in conjunction with the message distribution management database 24, and can purchase the item according to the content of the subsidiary information of the work: the item η: owing the customer a purchase of the work' and the above payment Part of the score = give: the right to pay as a copyright. Since the collection/distribution slave is provided, the management server 23 can surely perform the collection of the purchase amount and the payment of the copyright, etc., based on the distribution of the managed work. Next, a procedure for creating a file in the n-th customer terminal 21 of the n-th customer spread can be described with reference to Fig. 9 . Ding (4) Crops and Re-distribution First-time, the client terminal 21 communicates with the management feeder 23 21 201115388, and establishes communication between the two. Then, by the subsidiary information transmitting step terminal 2!, the client-side management feeder 23 stored in the memory unit is read. The feeding machine 23 is sent to the home appliance 19' and sent to the received m message 19 for the ^/, legitimacy determining means 26, which is changed. In the present embodiment, it can be used for checking and the second and second signals are received by the screening information unit 13, the scatterer is 1 π f is a beigu 19, and the sensible W has a beacon portion 28 and a contact portion 30. And 4- 'information. P 29, and the information, however, the difficulty of the checkup ^ said that the Department of the 5 can be selected from among. Also, whether the affiliate information 19 has been judged by Tian Hao’s analysis of the field is .π .. , which is judged by the connection information department 29 π 井 listening wood, and the work material is carefully sent to the tomb, and the data is changed. News. The analysis of Ρ 3 0 determines that the affiliate information from the n-time client terminal 21 of the secondary field is recorded on the management server 23 π 丨 λ, < When it is judged that the subsidiary information "and the copyrighted material has not been tampered with", the copyright file acquired by the client terminal 21 is judged to be a regular product. After the above-described legitimacy determination, the management server 23 pairs the client terminal 21 for n times. Further, the management server 23 issues a delivery order to the n-th customer terminal 21, so that the file cumulative distribution number counter of the attachment information unit 29 of the subsidiary information 19 is incremented by 1. The n-th customer terminal 21 receives the notification. After the validity confirmation notification, the encrypted material 1 8 of the work is decrypted by the process of the readable book generating step 3 1 to generate a readable book. Here, the encrypted material of the work 1 8 The decryption method is selected corresponding to the method of encrypting the work material when the above-mentioned n-time customer distribution work file is generated. Further, the method of decrypting the file may be exemplified as, by 22 201115388 The method of reading the secrets of the tweezer 20 can be read. The WW's "not to solve" or the use of the management servo -? confirmation notice - and the ice AJ benefit 23 together with the legitimacy The method of decrypting the key and then decrypting it. Further, in the π-th order client terminal 21, the 俜蕤 step is to perform the processing of the step 16 by the re-distribution of the work, and the affiliate information, the 丨v, the ^ 人, and the customer information (ID information) are performed. Update, and the opposite, the re-force... The addition of the crop is re-encrypted by the data 18. 〇X 雄's encryption method is not particularly limited, and is the same as the above-mentioned 你 你 私 is is: ^ it 1 α, ', ^, the crop re-distribution promotion system, the encryption case in the system 1, the equation can be etched The way the 疋 version is used is white. Moreover, the method of re-selecting the copyright encryption resource ^ -r ϋϋ / I is to be readable by the decryption of the readable text of the second phase: or different from the cryptographic form at the time of decryption; Or: Key:: The crop's encrypted data 18' will be used to change the data in the way of decryption, and then re-encrypt the data. As shown, an archive of the corpse filed by the (n+l)th customer consisting of the re-encrypted data of the work is generated. In this way, the composition of the affiliate information 丄y in the client distribution file is as shown in Fig. 1. The identification information unit 13 is included, and the current information is added to the η-time. The customer information of the right information department 28, the connection of the company, the distributor, the only part of the current department 29, and the information information Qiu, in the continuation of the information department 29 have a trial "邛30". , and the cumulative number of spreads counts the number of values, which is incremented by one according to the number of the number from the management server 23. When the value of the volume is up to the specified value, it is also distributed to other customers' files. In addition to the above methods, the affiliation of the affiliation, such as the above-mentioned method, can also send the affiliate information that has been updated in the management 23 to the 今 te 苳 te 终端 终端 terminal 21, and then 盥Auxiliary information of the storage of the right memory department of the farmer 1 9 Replacement, existence 23 201115388 In the S-feeding service, the 23 is issued by the payment/distribution means 27 to the message distribution management database 24, and the payment is made/ Distribution processing. In addition to the purchase of the purchaser of the work by the n-time customer, the part of the above-mentioned money is also distributed to the copyright owner as a copyright reward. In addition, for example, 'one part of the money may be used as a distributed payment, and the customer assigned to the book in order to distribute the work' is recorded in the distribution information section 28 of the subsidiary information from i to (four) times. All or part of the customer. Finally, the client terminal 2 i sends a communication termination request to the management feeder to end the communication between the two. The (n+1)-time customer distribution file generated by the above manner can be distributed to other client terminals by the n-time client terminal 21. According to the work re-distribution promotion system 17, the affiliate information 19, and the connection information unit 29 and/or the data information unit 3, it is possible to determine whether the attached information 19 or the work material has been tampered with, and the work can be further improved. The safety of the object when it is judged is that the acquired material has been encrypted and recorded, and further =:=? It is very simple to further enhance the convenience of the work in the redistribution. Re-distribution of objects. According to the re-distribution of the work, the promotion of the protection of the enrichment can be easily carried out by a plurality of clients, and the archives of the works are distributed and distributed. Thanks to &, it is possible to simultaneously enhance the rights of the author and protect the circulation of the work. In addition, according to the above-mentioned features of the book, the security of the book can be enhanced, and the copyright protection can be enriched. == A plurality of customers are sequentially distributed to distribute the electronic use of the work = 24 201115388. Therefore, it is possible to simultaneously enrich the copyright protection and the circulation of the goods. Further, the work re-distribution promotion system of the present invention is not limited to the above embodiment, and for example, the execution program can further have a management step ’ for management of the connection information unit in the attached information. Specifically, the management steps are distributed and acquired in the re-distribution of the book, and the update of the information department. Due to the good results, the management of the connection information department tends to be easy, and the copyright of the 1 work can be confirmed. As described above, the work of the present invention can be used as an electronic file for cloth, and the towel can be used to save the convenience of the book == at the time of re-distribution, thereby promoting circulation. b Promoter re-dispersion of crops, and advantageous [Simplified illustration of the drawings] Fig. 1 is a schematic block diagram of one of the filaments of the present invention. Fig. 2 is a structural diagram of the graph. Figure 3 is a diagram, a diagram. (4) The structure of the re-distribution of the genre of the work, and the distribution of the materials of the promotion system. Figure 4 is a diagram of the re-distribution of the work in Figure i and the management (4) Ilf to (4) ^ ^ ^ ) / flow chart. Figure 5 is a diagram of the execution of the program in the subordinate system of the work of the re-distribution and re-distribution of the work in Figure i. A schematic block diagram of the re-dispatch promotion system of the 6-series and the work of the re-distribution promotion system of FIG. Figure 7 is a diagram showing the structure of the attached material of the work re-dispatch promotion system of Figure 6. Figure 8 is a structural diagram of the execution program of the re-distribution facilitation system of Figure 6. Figure 9 is a flow chart showing the steps in the communication between the client terminal and the management server in the work re-distribution promotion system of Figure 6. '', Fig. 10 is a data structure diagram of the subsidiary information of the re-distribution work file generated in the work re-distribution promotion system of Fig. 6. [Description of main component symbols] 1 Crop re-distribution promotion system 2 Publication data 3 Subsidiary information 4 Execution program 5 1st client terminal 6 Memory unit 7 Network 8 Management server 9 Subsidiary information transmission means 10 Reproduction of works Means 11 Legitimacy Judging Means 12 Subsidiary Information Updating Means 13 Identification Information Unit 26 201115388 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Disseminator Information Department Subsidiary Information Transmission Step Re-distribution Work Generation Step Works re-distribution promotion system works encryption data subsidiary information execution program n times client terminal memory management server information distribution management database can read the work production means justification judgment means collection / distribution means distributor information department connection information Ministry of Information and Information Department can read the steps of producing works

2727

Claims (1)

201115388 七、申請專利範圍: 種著作物再散布促㈣統,係使用與著作物資料建 =關連性之附屬資訊、執行程式、及可透過通訊網路盘 連接而構成之管理飼服器保護著作權並易於進行 者作物之再散布,其特徵在於: :附屬資訊之資料構造,具有包含著作物資 -貝::或包含經依序散布之客户資訊之散布者資訊部; "仃程式,在客戶終端執行下述各步驟之處理·· 附屬資訊發送步驟,為了在管 正當性判斷而發送該附屬資訊;J:及何服益進行著作物之 附眉1 散布用著作物產生步驟,將取得之客戶資訊追加至 屬貝δίι以進行更新’且將著作物資料予以加密。 中,料利範圍第1項之著作物再散布促進系統,其 Μ執仃程式進一步執行使著作物資料成 讀取著作物產生步驟。 視I、之了 :广令請專利範圍第w之著作物再散 中,邊附屬資訊之資料構造進一步具有 :::: 判斷附屬資訊有無受到篡改之關於著作物= 繒資1 β / 士 放布狀況之接 續貝訊邛及/或用以判斷著作物 作物資料之資料資訊部。 又到氣改之關於著 4.如申請專利範圍第i項之著作物再散布 i 中,該執行程式係藉由儲存在客戶終端之潘 ,、、,- 件或外掛程式來達成。 覽盗之附加元 乂如申請專利範圍第i項之著作物再散布促進 盆 中,该附屬資訊之資料大小為12KB以下。 …- 28 201115388 布用電子檔案,係使用客戶終端、管 伺服器、及可將該等安 ^ , 客戶終端與管理伺服器加以連接而槿 成之通訊網路保護著 < 丧向構 之與者作物資料建立 散布 特徵在於: 了關連性訊及執行程式,其 該附屬資訊之資料椹i 資訊部及/或包含經二之=含著作物資訊之識別 該執行程式,在客戶:^:^::::^部; 附屬資訊發送步驟,為 。之處理. 正當性判斷而發$ $ : g王伺服器進行著作物之 赞廷該附屬資訊丨以及 再散布用著作物產生 附屬資訊以進行更新_ 、取得之客戶資訊追加至 進仃更新’且將著作物資料予以加密。 八、圖式·· (如次頁) 29201115388 VII. Scope of application for patents: The dissemination of the works (4) is to use the information related to the construction of the information, the implementation of the program, and the management of the service device that can be connected through the communication network. The re-dispersion of the crops that are easy to carry out, characterized in that: the data structure of the affiliated information has a distributor information department containing the work materials -: or contains the customer information sequentially distributed; "仃 program, at the client terminal The processing of the following steps is performed. · The sub-information transmission step is to send the sub-information in order to judge the legitimacy; J: and what is the benefit of the work-related eyebrows 1 distribution work generation step, and the acquired customer information is added. Go to δ ίι to update 'and encrypt the work material. In the case of the material re-distribution promotion system of the first item of the profit range, the execution program further executes the steps for producing the work material to read the work. I, it is: the order of the patent scope of the patent is re-distributed, and the information structure of the subsidiary information further has:::: Judging whether the affiliated information has been tampered with or not related to the work = 缯 1 1 β / 士放The status of the cloth is continued with the information and information department of the crop material. It is also related to the gas reform. 4. In the re-distribution of the work of the i-th patent of the patent application, the execution program is achieved by a pan, , , - or plug-in stored in the client terminal. Additional information on the piracy of the piracy, such as the publication of the scope of the patent application, the re-distribution promotion of the sub-item, the information size of the sub-information is less than 12KB. ...- 28 201115388 The electronic file for cloth uses the client terminal, the server server, and the communication network that can be connected to the client terminal and the management server to protect the < The distribution of crop data is characterized by: a related information and an executive program, the information of the affiliated information, the information department and/or the identification of the executable information, including the identification of the work, at the customer: ^:^: :::^ Department; Subsidiary information sending steps, as. Handling. Legitimacy judgment is made by the $: g king server for the work of the praise of the affiliated information and the re-distribution of the work to generate subsidiary information for updating _, the obtained customer information is added to the update] Encrypt the work materials. Eight, schema · (such as the next page) 29
TW99130033A 2009-10-07 2010-09-06 Copyrighted work redistribution promotion system TW201115388A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2009233781A JP2011081628A (en) 2009-10-07 2009-10-07 Literary work redistribution promotion system

Publications (1)

Publication Number Publication Date
TW201115388A true TW201115388A (en) 2011-05-01

Family

ID=43856644

Family Applications (1)

Application Number Title Priority Date Filing Date
TW99130033A TW201115388A (en) 2009-10-07 2010-09-06 Copyrighted work redistribution promotion system

Country Status (3)

Country Link
JP (1) JP2011081628A (en)
TW (1) TW201115388A (en)
WO (1) WO2011043171A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI714999B (en) * 2019-03-28 2021-01-01 心統科技有限公司 Multi-level agent-based distribution e-commerce system and method thereof

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP7404662B2 (en) * 2019-06-03 2023-12-26 富士フイルムビジネスイノベーション株式会社 Information processing device and program
WO2023272733A1 (en) * 2021-07-02 2023-01-05 叶立三 Method, apparatus and device for sharing related item numerical quantity of work, and storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH1131130A (en) * 1997-07-10 1999-02-02 Fuji Xerox Co Ltd Service providing device
JP2001236391A (en) * 2000-02-22 2001-08-31 Sony Corp Contents information charging and distribution system
JP2003271831A (en) * 2002-03-15 2003-09-26 Nippon Telegr & Teleph Corp <Ntt> Contents circulation method, contents circulation system and program therefor, and recording medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI714999B (en) * 2019-03-28 2021-01-01 心統科技有限公司 Multi-level agent-based distribution e-commerce system and method thereof

Also Published As

Publication number Publication date
WO2011043171A1 (en) 2011-04-14
JP2011081628A (en) 2011-04-21

Similar Documents

Publication Publication Date Title
USRE47313E1 (en) Securing digital content system and method
Kishigami et al. The blockchain-based digital content distribution system
US20190272513A1 (en) Use of media storage structure with multiple pieces of content in a content-distribution system
TWI220620B (en) Method of protecting and managing digital contents and system for using thereof
CN101043319B (en) Digital content protective system and method
KR100467929B1 (en) System for protecting and managing digital contents
US8949156B2 (en) Digital rights content services architecture
US20220086187A1 (en) Decentralized digital content distribution system and process using block chains and encrypted peer-to-peer network
CN103942470A (en) Electronic audio-visual product copyright management method with source tracing function
KR20210096540A (en) Method and system for content managing on mobile service using block chain network
JP2003304226A (en) Method for providing contents, computer device, program, and method for reproducing contents
TW201115388A (en) Copyrighted work redistribution promotion system
JP7466086B2 (en) NFT information management system and NFT information management program
WO2011034094A1 (en) Copyrighted work sales method and system
CN105046112B (en) A kind of digital literary property protection method
He et al. Digital right management model based on cryptography and digital watermarking
JP2002007912A (en) Digital content rental system and method
Barhoush et al. Requirements for enforcing digital rights management in multicast content distribution
US20110166960A1 (en) Digital content recycling system
Chandra Issues of intellectual property rights
CN100514279C (en) Authenmtication and control method for video-audio multimedium information
Jin et al. Enabling secure digital marketplace
Hanuz Examining the Application of Blockchain Technology as a Solution to and the Enabler of End-User Online Copyright Infringement
Chaudhuri Digital rights management: a technological measure for copyright protection and its possible impacts on libraries
Kerr Technological Protection Measures: Part I-Trends in Technical Protection Measures and Circumvention Technologies