Title of Invention | A SYSTEM FOR PROVIDING DRM LICENSE |
---|---|
Abstract | A system and method for providing a digital rights management (DRM) license are provided. The system includes a sink system which requests a license for content; a source system which generates and provides a first rights token including binding information related to the license, in accordance with the request; and a rights mediator which generates a second rights token on the basis of the first rights token, and transmits the generated second rights token to the sink system; wherein the sink system provides the license for the content on the basis of the second rights token. The method includes receiving a request for a license for content; generating a first rights token including binding information related to the license, in accordance with the request; generating a second rights token; and providing the license for the content on the basis of the generated second rights token. |
Full Text | FORM 2 THE PATENTS ACT, 1970 (39 of 1970) & The Patents Rules, 2003 COMPLETE SPECIFICATION (See section 10, rule 13) "METHOD AND SYSTEM FOR PROVIDING DRM LICENSE" SAMSUNG ELECTRONICS CO., LTD., a Korean company of 416, Maetan- dong, Yeongtong- gu, Suwon-si, Gyeonggi-do, Republic of Korea. The following specification particularly describes the invention and the manner in which it is to be performed. METHOD AND SYSTEM FOR PROVIDING DRM LICENSE CROSS-REFERENCE TO RELATED APPLICATIONS [01] This application claims priority from Korean Patent Application No. 10-2006-0086972 filed on September 8, 2006 in the Korean Intellectual Property Office, and U.S. Provisional Patent Application No. 60/725,664 filed on October 13, 2005 in the United States Patent and Trademark Office, the disclosures of which are incorporated herein by reference in their entirety. BACKGROUND OF THE INVENTION 1. Field of the Invention [02] Methods and systems consistent with the present invention relate to a digital rights management license and, more particularly, to binding a license of digital content using information about a path through which the license is transferred. 2. Description of the Related Art [03] The growth of the Internet and the development of multimedia technology have led to a widespread distribution and accessibility of digital content. However, if there is no viable way to protect the rights of such digital content, the development of multimedia technology would also lead to an authorized distribution of the digital content. [04] In order to more effectively protect the rights of digital content, many research on digital rights management (DRM) are being carried out to be used in commercial services. Here, DRM denotes a software or hardware technology that limits the use of digital content only to a rightful user. Thus far, most DRMs include techniques related to licenses and digital content. The license generally includes a set of rights that can be performed with respect to the digital content and content keys capable of decrypting the related content. -2- [05] Ironically, the need for DRM arises from the versatile and easily manageable characteristics of digital data. It is well known that digital content, unlike analog data, can be readily copied without loss, and reused, processed and distributed to third parties, but a large amount of cost, effort and time are required to produce the digital content. Thus, copying and distribution of digital content without permission hinder the development of the digital content industry in that the potential profits are not being fully realized, which has deterred the business sentiment in the industry. [06] Some efforts have been made to protect digital content. Conventionally, digital content protection has been focused on preventing an access to digital content without permission. For example, only the users who have paid charges are permitted to access the digital content. However, when a user who has paid the charges accesses the digital content and distributes it to a third party, the digital content can be used by the third party without paying the charges, which leads to a number of problems in commercializing the digital content service. [07] DRM attempts to address these problems. With the implementation of DRM, users are allowed to freely access encrypted digital content, but a license is needed to decrypt and execute the encrypted digital content. As a result, the digital content can be more effectively protected by using the DRM. [08] FIG. 1 is a view schematically illustrating a related art DRM. Here, DRM mainly covers digital content protected by encryption or scrambling (hereinafter referred to as "encrypted content" in FIG. 1) and licenses for access to encrypted digital content. [09] In FIG. 1, there are a user 110 desiring to access digital content protected by DRM, a content issuer 120 providing the digital content, a license issuer 130 issuing licenses that include rights to access the digital content, and a certification authority 140 issuing certificates. -3- [10] From the content issuer 120, the user 110 can obtain desired digital content that is encrypted content protected by DRM. The user 110 can obtain a license that can execute the encrypted content from the license issuer 130. The user 110 having the license can execute the encrypted content. [11] The certification authority 140 issues a certificate indicating that the content issuer 120 and the user 110 are rightful users. The certificate can be stored in each device when the device is manufactured. However, the certificates issued from the certification authority 140 may be revoked before they expire. As described above, DRM can protect the profits of digital content producers or issuers to render help in activating the digital content industry. [12] Generally, in order to prevent a license (or digital content) from being used by an illegal device or user, it is bound to the device or user. "Binding" is a concept that limits the playback (or access) of digital content to a specified device or user through an encryption technique so that no device or user, except for the specified device or user, can play (or access) the content. As shown in FIG. 2, most related art DRM schemes bind a license (or digital content) to a content user, a player playing the content, a set of users using the content, a set of players, and others, using binding keys. [13] FIG. 2 illustrates digital content and a content issuer 210 issuing licenses for the digital content. The subject providing digital content and the subject providing licenses may differ. However, for convenience in explanation, it is considered that the same subject provides both digital content and licenses. [14] Referring to FIG. 2, the content issuer 210 may provide a DRM license by encrypting a content encryption key (CEK) using a binding key Ku for a set of users 220 using the content (S201), encrypting the CEK using binding keys Ku_l, Ku_2, Ku_3 and Ku_4 for respective content users 222, 224, 226 and 228 using the content (S202), encrypting the CEK using a binding key Kd for a set of players 230 using the content (S203), or encrypting the 4 CEK using biding keys Kd_l, Kd_2, Kd_3, Kd_4, Kd_5 and Kd_6 for respective players 231, 232, 233, 234, 235 and 236 using the content (S204). In this case, CEK indicates a key for encrypting the digital content. [15] In the above-described binding structure, the content issuer 210 cannot be sufficiently reflected, which will now be explained with reference to FIGS. 3A and 3B. [16] Referring to FIG. 3A, it is assumed that the first to fourth content users 222, 224, 226 and 228 possess the first player 231, third player 233, fourth player 234 and sixth player 236, respectively, and four content users 222, 224, 226 and 228 share the second player 232 and fifth player 235. [17] In this case, if the content issuer 210 intends to limit the use of content 215 through the shared second player 232 and fifth player 235 only to the first content user 222 and second content user 224, such a requirement of the content issuer cannot be satisfied under the above-described binding structure. [18] Specifically, as shown in FIG. 3B, in the case in which the first content user 222 and the second content user 224 are in a single domain 330, and a DRM license is provided by encrypting the CEK using a binding key Ka for this domain S310, the first content user 222 and the second content user 224 can use the content 215 through the first player 231 and the third player 233 since the first content user 222 and the second content user 224 possess the first player 231 and the third player 233, respectively. This is contradictory to the requirement of the content issuer 210. [19] Also, in the case in which the second player 232 and the fifth player 235 are in a single domain 330, and a DRM license is provided by encrypting the CEK using a binding key Kb for this domain S320, the third content user 226 and the fourth content user 228 can use the content 215 through the second player 232 and the fifth player 235 since the third content user 226 and the fourth content user 228 share the second player 232 and the fifth 5 player 235, respectively. In the same manner, this result is contradictory to the requirement of the content issuer 210. [20] As described above, the related art binding method follows a device biding method or a user biding method that considers only the subject using the license (e.g., a content user or a set of users using the content) or the object (e.g., a player playing the content or a set of players), and thus the use range of the digital content is limited. [21] In addition, according to the related art technique, the DRM system issuing DRM licenses on the content issuer side and the DRM system decrypting and playing encrypted content on the player side should be the same DRM system. SUMMARY OF THE INVENTION [22] Exemplary embodiments of the present invention overcome the above disadvantages and other disadvantages not described above. Also, the present invention is not required to overcome the disadvantages described above, and an exemplary embodiment of the present invention may not overcome any of the problems described above. [23] The present invention provides a system and method which provide use ranges of digital content in diverse forms, without binding a license only to subjects using the license or objects, in a DRM environment. [24] The present invention also provides a method capable of using a DRM license even among different DRM systems. [25] According to an aspect of the present invention, there is provided a system for providing a DRM license. The system includes a sink system which requests a license for content; a source system which generates and provides a first rights token including binding information related to the license, in accordance with the request; and a rights mediator which generates a second rights token that is usable in the sink system on the basis of the first rights 6 token, and transmits the generated second rights token to the sink system; wherein the sink system provides the license for the content on the basis of the second rights token. [26] According to another aspect of the present invention, there is provided a method of providing a DRM license. The method includes generating a first rights token including binding information related to a license for content; generating a second rights token, on the basis of the generated first rights token; and providing the license for the content on the basis of the generated second rights token. BRIEF DESCRIPTION OF THE DRAWINGS [27] The above aspects of the present invention will become more apparent by describing in detail certain exemplary embodiments thereof with reference to the attached drawings, in which: [28] FIG. 1 is a conceptual view schematically illustrating a related art DRM; [29] FIG. 2 is a view illustrating a related art biding method; [30] FIGS. 3 A and 3B are views for explaining problems of a related art biding method; [31] FIG. 4 is a view illustrating a system for providing a DRM license according to an exemplary embodiment of the present invention; [32] FIG. 5 is a view illustrating the detailed construction of the DRM license providing system according to an exemplary embodiment of the present invention; [33] FIG. 6 is a flowchart illustrating a method of providing a DRM license according to an exemplary embodiment of the present invention; [34] FIG. 7 is a view illustrating the construction of a web service server according to an exemplary embodiment of the present invention; [35] FIG. 8 is a view illustrating the construction of a client according to an exemplary embodiment of the present invention; and 7 [36] FIGS. 9A and 9B are views illustrating systems for providing a DRM license according to an exemplary embodiment of the present invention. DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS OF THE INVENTION [37] Hereinafter, exemplary embodiments of the present invention will be described in detail with reference to the accompanying drawings. The aspects of the present invention and methods for achieving the aspects will be apparent by referring to exemplary embodiments to be described in detail with reference to the accompanying drawings. However, the present invention is not limited to the exemplary embodiments disclosed hereinafter, but can be implemented in diverse forms. The matters defined in the description, such as the detailed construction and elements, are nothing but specific details provided to assist those of ordinary skill in the art in a comprehensive understanding of the invention, and the present invention is only defined within the scope of the appended claims. In the entire description of exemplary embodiments of the present invention, the same drawing reference numerals are used for the same elements across various figures. [38] The present invention will now be described with reference to the accompanying drawings illustrating block diagrams and flowcharts for explaining a method and system for providing a DRM license according to exemplary embodiments of the present invention. It will be understood that each block of the flowchart illustrations, and combinations of blocks in the flowchart illustrations, can be implemented by computer program instructions. These computer program instructions can be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which are executed via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart block or blocks. These computer program instructions may also be 8 stored in a computer usable or computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer usable or computer-readable memory produce an article of manufacture including instruction means that implement the function specified in the flowchart block or blocks. The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions that are executed on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart block or blocks. [39] Also, each block of the flowchart illustrations may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that in some alternative implementations, the functions noted in the blocks may occur out of the order. For example, two blocks shown in succession may in fact be executed substantially concurrently or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. [40] FIG. 4 is a view illustrating a system for providing a DRM license according to an exemplary embodiment of the present invention. [41] Referring to FIG. 4, the system 400 for providing a DRM license includes a source system 500, a sink system 700, a rights mediator 600, and a network 450 connecting the source system, the sink system and the rights mediator. [42] The source system 500, which is a system that transmits content, generates a DRM license and encrypted content. [43] The sink system 700, which is a system that receives and uses the content from the source system 500, uses the DRM license and decrypts the encrypted content. The sink 9 system 700 may be divided into use subjects using the sink system 700 and use objects such as players. For example, the sink system 700 may be embodied by all audio/video (AV) players belonging to a user's home network, a specified mobile device, or a user's family. Hereinafter, use subjects or use objects that embody the sink system 700 will be called "principals". [44] The principals in the sink system 700 may be differently managed according to a model implementing the sink system 700. For example, information related to a specified user may be stored in a PC, a smart card and a portable phone, or may be managed in the form of an account-password. [45] The rights mediator 600 is a system that converts or re-processes the DRM license provided from the source system 500 into the form of a DRM license that can be understood in the sink system 700. [46] For example, in the case in which the source system 500 is provided with an "A" DRM system and the sink system 700 is provided with a "B" DRM system, the sink system 700 cannot understand the DRM license generated from the source system 500. Accordingly, it is advantageous to have a DRM license that can be understood by both the source system 500 and the sink system 700, and for purposes of description, such a DRM license will be called a "rights token". [47] Specifically, when the source system 500 generates and provides a plurality of rights tokens related to the encrypted content, the rights mediator 600 generates a rights token using the plurality of rights tokens and provides the generated rights token to the sink system 700. In this case, in order to discriminate between types of rights tokens, a rights token provided by the source system 500 is called a "sub-rights token", and a rights token generated by the rights mediator and provided to the sink system 700 is called a "main rights token". 10 [48] FIG. 5 is a view illustrating the detailed construction of the DRM license providing system according to an exemplary embodiment of the present invention. [49] Referring to FIG. 5, the source system 500 manages a plurality of content 501, 502 and 503 and DRM licenses for the respective content, and includes a web service server 550 generating the sub-rights tokens. The sink system 700 includes a plurality of principals 701, 702, 703, 704 and 705 and a client 750 receiving the main rights token through the rights mediator 600. Although the client 750 receives the encrypted content directly from the web service server 550, the client 750 may also receive the content via the rights mediator 600. [50] In this case, the respective principals constituting the sink system 750 may be constructed in the form of a topology that indicates the relations among the principals. For example, referring to FIG. 5, on the assumption that Ul 704 and U2 705 are use subjects and Dl 701, D2 702 and D3 703 are use objects, Ul 704 can play the content through Dl 701 and D2 702. Also, Dl 701, D2 702 and D3 703 are constructed to belong to a domain managed by the client 750. Accordingly, the topology of the principals can be determined by edges connecting the respective principals. When a principal A that indicates use subjects by a single edge is connected to a principal B that indicates use objects, if an arrow of the edge faces the principal A, i.e., "A B", the principal A can also play content in the principal B. [51] The operation of the respective elements illustrated in FIG. 5 will now be explained in detail with reference to a flowchart illustrated in FIG. 6. [52] When the client 750 requests a license for specified content to the web service server 550, the web service server 550 performs an authentication to confirm whether the client 750 is a rightful client using a certificate, content purchase information of the sink system or the client's access information such as an internet protocol (IP) address, an account and a password (S610). 11 [53] If it is confirmed that the client 750 is a rightful client, the web service server 550 generates and provides a sub-rights token for the requested content to the right mediator 600 (S620). The content requested by the client 750 may be encrypted by the web service server 550 to be provided to the client. [54] In this case, the sub-rights token includes binding information of the content requested by the client 750 and rights information of the requested content. Conventionally, such binding information is expressed as a specified principal. In the present invention, the binding information can be expressed as path information among a plurality of principals, not by a single principal. The path information is information about edges connecting the principals. [55] In addition, the web service server 550 can generate and provide a plurality of sub-rights tokens. In this case, each sub-rights token includes the path information among the plurality of principals as the binding information. If the web service server 550 generates and provides the plurality of sub-rights tokens to the rights mediator 600, the rights mediator 600 generates one main rights token by combining the plurality of sub-rights tokens, and then transmits the generated main rights token to the client 750 (S630). In this case, the main rights token includes relational information indicating relationships among binding information or rights information included in the respective sub-rights tokens, and through this relational information, operations among the respective binding information or rights information, such as difference set, set intersection and union, become possible. For example, if the relational information between the first binding information included in the first sub-rights token and the second binding information included in the second sub-rights token indicates the set intersection, it can be understood that content playback rights are given to the principals belonging to a common path of the path information corresponding to the first 12 binding information and the path information corresponding to the second binding information. [56] The relation information may be generated by the web service server 550 and then provided to the rights mediator 600. [57] The client 750 can generates a topology for giving the content playback rights on the basis of the main rights token received from the rights mediator 600 (S640). [58] That is, since the main rights token includes the path information about a plurality of paths and the relation information among the respective path information, a topology, such as a tree structure, can be generated on the basis of the path information and the relation information. The tree structure is only an example. Other topologies are also contemplated. [59] The client 750 can determine whether to access the license bound by principals that comprise the sink system 700 through the topology generated as above (S650). [60] FIG. 7 is a view illustrating the construction of a web service server according to an exemplary embodiment of the present invention. [61] Referring to FIG. 7, the web service server 550 according to an exemplary embodiment of the present invention includes an interface module 552 communicating with the client 750 or the rights mediator 600, a license generation module 551 generating the sub-rights tokens for the content requested by the client 750, a storage module 554 storing the content requested by the client 750 or the binding information for the requested content, and a control module 553 controlling the operation of the respective modules. [62] The modules used in exemplary embodiments of the present invention may include software or hardware elements, such as a field-programmable gate array (FPGA) or an application-specific integrated circuit (ASIC), to perform a specific function. Modules, however, are not defined as software or hardware. Modules may be configured in an addressable storage medium, or configured to reproduce one or more processors. Thus, a 13 module may include, by way of example, components, such as software components, object-oriented software components, class components and task components, processes, functions, attributes, procedures, subroutines, segments of program code, drivers, firmware, microcode, circuitry, data, databases, data structures, tables, arrays, and variables. The functionality provided for in the components and modules may be combined into fewer components and modules or further separated into additional components and modules. [63] When the interface module 552 receives the request for the content, and the license request for the content from the client 750, the control module 553 searches the storage module 554, encrypts the requested content, and transmits the encrypted content to the client 750 through the interface module 552. [64] In addition, the control module 553 provides the binding information stored in the storage module 554 to the license generation module 551, and the license generation module 551 generates the sub-rights tokens by using the binding information and provides the generated sub-rights tokens to the control module. In this case, the binding information may be expressed as the path information that indicates the relations among the plurality of principals. The control module 553 transmits the generated sub-rights tokens to the rights mediator 600 through the interface model 552. [65] FIG. 8 is a view illustrating the construction of a client according to an exemplary embodiment of the present invention. [66] Referring to FIG. 8, the client 750 according to an exemplary embodiment of the present invention includes an interface module 751 communicating with the web service server 550 or the rights mediator 600, a local DRM license generation module 754 converting the main rights token received from the rights mediator 600 into the form of a DRM license installed in the client 750, an external device communication module 753 providing the main 14 rights token to use subjects or use objects that constitute the sink system, and a control module 752 controlling the operation of the respective modules. [67] When, the interface module 751 receives the main rights token from the rights mediator 600, the control module 752 generates a topology for giving the content playback rights on the basis of the main rights token. Then, the control module 752 determines whether to access the license bound by principals that constitute the sink system by using the generated topology, and on the basis of this, controls the local DRM license generation module 754 to generate the license that can be understood by the DRM license system installed in the client 750. [68] In addition, the control module 752 may provide the main rights token received from the rights mediator 600 through the external device communication module 753 to the use subject or the use object, or convert the main rights token into a license form suitable for the use subject or the use object. [69] Although FIG. 4 illustrates the DRM license providing system including one source system 500 and one sink system 700, the present invention is not limited thereto, and the DRM license providing system may include a plurality of source systems and a plurality of sink systems as illustrated in FIGS. 9A and 9B. [70] If a plurality of source systems exist, the rights mediator can generate one main rights token by combining the sub-rights tokens received from the respective source systems, and in this case, the generated main rights token includes information indicating relations among the source systems. [71] As described above, according to exemplary embodiments of the present invention, the use range of the digital content can be provided in diverse forms, and the DRM license can be used among different DRM systems. 15 [72] In addition, the present inventive concept can satisfy the need of the content issuer desiring the use of the digital content in diverse forms. [73] Exemplary embodiments of the present invention have been described with reference to the accompanying drawings. However, those skilled in the art will appreciate that many variations and modifications can be made to the disclosed exemplary embodiments without substantially departing from the principles of the present invention. Therefore, the disclosed exemplary embodiments of the invention are used in a generic and descriptive sense only and not for purposes of limitation. 16 WHAT IS CLAIMED IS: 1. A system for providing a digital rights management (DRM) license, the system comprising: a sink system which requests a license for content; a source system which generates and provides a first rights token including binding information related to the license, in accordance with the request; and a rights mediator which generates a second rights token on the basis of the first rights token, and transmits the generated second rights token to the sink system; wherein the sink system provides the license for the content on the basis of the second rights token. 2. The system of claim 1, wherein the second rights token is usable in the sink system. 3. The system of claim 1, wherein the binding information comprises path information that indicates relationships among a plurality of principals to which the license is provided. 4. The system of claim 3, wherein each principal of the plurality of principals comprises use subjects which use the content and use objects which play the content. 17 5. The system of claim 1, wherein the sink system generates a topology for giving content playback rights on the basis of the second rights token, and provides the license by principals comprising the sink system on the basis of the generated topology. 6. The system of claim 1, wherein when the rights mediator receives first rights tokens from a plurality of source systems, the rights mediator generates the second rights token by combining the first rights tokens received from the respective source systems, and the second rights token includes information indicating relations among the respective source systems. 7. The system of claim 1, wherein the source system comprises a web service server which manages a plurality of content and a plurality of DRM licenses for the respective content, and generates the first rights token. 8. The system of claim 1, wherein the sink system comprises a client which receives the plurality of principals and the second rights token from the rights mediator. 9. A method of providing a digital rights management (DRM) license, the method comprising: generating a first rights token including binding information related to a license for content; 18 generating a second rights token based on the generated first rights token; and providing the license for the content on the basis of the generated second rights token. 10. The method of claim 9, further comprising receiving a request for the license for content, wherein the first rights token is generated in accordance with the request. 11. The method of claim 10, wherein the license for content is received from a sink system. 12. The method of claim 11, wherein the second rights token can be understood in the sink system. 13. The method of claim 9, wherein the binding information comprises path information that indicates relationships among a plurality of principals to which the license is provided. 14. The method of claim 13, wherein each principal of the plurality of principals comprises use subjects which use the content and use objects which play the content. 15. The method of claim 9, wherein the providing the license comprises: 19 generating a topology for granting content playback rights on the basis of the generated second rights token; and providing the license by principals comprising a sink system on the basis of the generated topology. 16. A system and a method for providing a digital rights management (DRM) license substantially as herein described with reference to the accompanying drawings. OMANA RAMAKRISHNAN AGENT FOR THE APPLICANT(S) OF K & S PARTNERS Dated this 10th day of October, 2006 20 ABSTRACT OF THE DISCLOSURE A system and method for providing a digital rights management (DRM) license are provided. The system includes a sink system which requests a license for content; a source system which generates and provides a first rights token including binding information related to the license, in accordance with the request; and a rights mediator which generates a second rights token on the basis of the first rights token, and transmits the generated second rights token to the sink system; wherein the sink system provides the license for the content on the basis of the second rights token. The method includes receiving a request for a license for content; generating a first rights token including binding information related to the license, in accordance with the request; generating a second rights token; and providing the license for the content on the basis of the generated second rights token. 21 |
---|
1675-MUM-2006-ABSTRACT(18-8-2009).pdf
1675-MUM-2006-ABSTRACT(8-1-2010).pdf
1675-mum-2006-abstract(granted)-(28-1-2010).pdf
1675-MUM-2006-CANCELLED PAGES(18-8-2009).pdf
1675-mum-2006-cancelled pages(8-1-2010).pdf
1675-MUM-2006-CLAIMS(18-8-2009).pdf
1675-MUM-2006-CLAIMS(AMENDED)-(8-1-2010).pdf
1675-mum-2006-claims(granted)-(28-1-2010).pdf
1675-mum-2006-correspondance-received.pdf
1675-MUM-2006-CORRESPONDENCE(20-8-2009).pdf
1675-MUM-2006-CORRESPONDENCE(30-11-2009).pdf
1675-mum-2006-correspondence(8-12-2009).pdf
1675-MUM-2006-CORRESPONDENCE(9-10-2009).pdf
1675-mum-2006-correspondence(ipo)-(29-1-2010).pdf
1675-mum-2006-description (complete).pdf
1675-MUM-2006-DESCRIPTION(COMPLETE)-(18-8-2009).pdf
1675-mum-2006-description(granted)-(28-1-2010).pdf
1675-MUM-2006-DRAWING(18-8-2009).pdf
1675-mum-2006-drawing(granted)-(28-1-2010).pdf
1675-MUM-2006-FORM 1(18-8-2009).pdf
1675-mum-2006-form 1(20-3-2007).pdf
1675-MUM-2006-FORM 1(8-1-2010).pdf
1675-MUM-2006-FORM 13(18-8-2009).pdf
1675-mum-2006-form 18(11-10-2006).pdf
1675-mum-2006-form 2(18-8-2009).pdf
1675-mum-2006-form 2(granted)-(28-1-2010).pdf
1675-MUM-2006-FORM 2(TITLE PAGE)-(18-8-2009).pdf
1675-MUM-2006-FORM 2(TITLE PAGE)-(8-1-2010).pdf
1675-mum-2006-form 2(title page)-(granted)-(28-1-2010).pdf
1675-MUM-2006-FORM 3(18-8-2009).pdf
1675-mum-2006-form 3(5-4-2007).pdf
1675-MUM-2006-OTHER DOCUMENT(18-8-2009).pdf
1675-MUM-2006-OTHER DOCUMENT(8-1-2010).pdf
1675-MUM-2006-PETITION UNDER RULE 137(18-8-2009).pdf
1675-MUM-2006-PRIORITY DOUMENT(20-8-2009).pdf
1675-MUM-2006-REPLY TO EXAMINATION REPORT(18-8-2009).pdf
1675-MUM-2006-REPLY TO EXAMINATION REPORT(8-1-2010).pdf
1675-mum-2006-wo international publication report(11-10-2006).pdf
Patent Number | 238342 | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Indian Patent Application Number | 1675/MUM/2006 | ||||||||||||
PG Journal Number | 6/2010 | ||||||||||||
Publication Date | 05-Feb-2010 | ||||||||||||
Grant Date | 28-Jan-2010 | ||||||||||||
Date of Filing | 11-Oct-2006 | ||||||||||||
Name of Patentee | SAMSUNG ELECTRONICS CO.,LTD. | ||||||||||||
Applicant Address | 416,Maetan-dong, Yeongtong-gu, Suwon-si,Gyeonggi-do, | ||||||||||||
Inventors:
|
|||||||||||||
PCT International Classification Number | H04K1/00 | ||||||||||||
PCT International Application Number | N/A | ||||||||||||
PCT International Filing date | |||||||||||||
PCT Conventions:
|