Title of Invention

A SYSTEM FOR PROVIDING DRM LICENSE

Abstract A system and method for providing a digital rights management (DRM) license are provided. The system includes a sink system which requests a license for content; a source system which generates and provides a first rights token including binding information related to the license, in accordance with the request; and a rights mediator which generates a second rights token on the basis of the first rights token, and transmits the generated second rights token to the sink system; wherein the sink system provides the license for the content on the basis of the second rights token. The method includes receiving a request for a license for content; generating a first rights token including binding information related to the license, in accordance with the request; generating a second rights token; and providing the license for the content on the basis of the generated second rights token.
Full Text FORM 2
THE PATENTS ACT, 1970
(39 of 1970) &
The Patents Rules, 2003
COMPLETE SPECIFICATION
(See section 10, rule 13)
"METHOD AND SYSTEM FOR PROVIDING DRM LICENSE"
SAMSUNG ELECTRONICS CO., LTD.,
a Korean company of 416, Maetan- dong, Yeongtong- gu, Suwon-si, Gyeonggi-do, Republic of Korea.
The following specification particularly describes the invention and the manner in which it is to be performed.

METHOD AND SYSTEM FOR PROVIDING DRM LICENSE
CROSS-REFERENCE TO RELATED APPLICATIONS
[01] This application claims priority from Korean Patent Application No. 10-2006-0086972 filed on September 8, 2006 in the Korean Intellectual Property Office, and U.S. Provisional Patent Application No. 60/725,664 filed on October 13, 2005 in the United States Patent and Trademark Office, the disclosures of which are incorporated herein by reference in their entirety.
BACKGROUND OF THE INVENTION
1. Field of the Invention
[02] Methods and systems consistent with the present invention relate to a digital rights management license and, more particularly, to binding a license of digital content using information about a path through which the license is transferred.
2. Description of the Related Art
[03] The growth of the Internet and the development of multimedia technology have led to a widespread distribution and accessibility of digital content. However, if there is no viable way to protect the rights of such digital content, the development of multimedia technology would also lead to an authorized distribution of the digital content.
[04] In order to more effectively protect the rights of digital content, many research on digital rights management (DRM) are being carried out to be used in commercial services. Here, DRM denotes a software or hardware technology that limits the use of digital content only to a rightful user. Thus far, most DRMs include techniques related to licenses and digital content. The license generally includes a set of rights that can be performed with respect to the digital content and content keys capable of decrypting the related content.
-2-
[05] Ironically, the need for DRM arises from the versatile and easily manageable characteristics of digital data. It is well known that digital content, unlike analog data, can be readily copied without loss, and reused, processed and distributed to third parties, but a large amount of cost, effort and time are required to produce the digital content. Thus, copying and distribution of digital content without permission hinder the development of the digital content industry in that the potential profits are not being fully realized, which has deterred the business sentiment in the industry.
[06] Some efforts have been made to protect digital content. Conventionally, digital content protection has been focused on preventing an access to digital content without permission. For example, only the users who have paid charges are permitted to access the digital content. However, when a user who has paid the charges accesses the digital content and distributes it to a third party, the digital content can be used by the third party without paying the charges, which leads to a number of problems in commercializing the digital content service.
[07] DRM attempts to address these problems. With the implementation of DRM, users are allowed to freely access encrypted digital content, but a license is needed to decrypt and execute the encrypted digital content. As a result, the digital content can be more effectively protected by using the DRM.
[08] FIG. 1 is a view schematically illustrating a related art DRM. Here, DRM mainly covers digital content protected by encryption or scrambling (hereinafter referred to as "encrypted content" in FIG. 1) and licenses for access to encrypted digital content. [09] In FIG. 1, there are a user 110 desiring to access digital content protected by DRM, a content issuer 120 providing the digital content, a license issuer 130 issuing licenses that include rights to access the digital content, and a certification authority 140 issuing certificates.
-3-

[10] From the content issuer 120, the user 110 can obtain desired digital content that is encrypted content protected by DRM. The user 110 can obtain a license that can execute the encrypted content from the license issuer 130. The user 110 having the license can execute the encrypted content.
[11] The certification authority 140 issues a certificate indicating that the content issuer 120 and the user 110 are rightful users. The certificate can be stored in each device when the device is manufactured. However, the certificates issued from the certification authority 140 may be revoked before they expire. As described above, DRM can protect the profits of digital content producers or issuers to render help in activating the digital content industry. [12] Generally, in order to prevent a license (or digital content) from being used by an illegal device or user, it is bound to the device or user. "Binding" is a concept that limits the playback (or access) of digital content to a specified device or user through an encryption technique so that no device or user, except for the specified device or user, can play (or access) the content. As shown in FIG. 2, most related art DRM schemes bind a license (or digital content) to a content user, a player playing the content, a set of users using the content, a set of players, and others, using binding keys.
[13] FIG. 2 illustrates digital content and a content issuer 210 issuing licenses for the digital content. The subject providing digital content and the subject providing licenses may differ. However, for convenience in explanation, it is considered that the same subject provides both digital content and licenses.
[14] Referring to FIG. 2, the content issuer 210 may provide a DRM license by encrypting a content encryption key (CEK) using a binding key Ku for a set of users 220 using the content (S201), encrypting the CEK using binding keys Ku_l, Ku_2, Ku_3 and Ku_4 for respective content users 222, 224, 226 and 228 using the content (S202), encrypting the CEK using a binding key Kd for a set of players 230 using the content (S203), or encrypting the
4

CEK using biding keys Kd_l, Kd_2, Kd_3, Kd_4, Kd_5 and Kd_6 for respective players 231,
232, 233, 234, 235 and 236 using the content (S204). In this case, CEK indicates a key for
encrypting the digital content.
[15] In the above-described binding structure, the content issuer 210 cannot be sufficiently
reflected, which will now be explained with reference to FIGS. 3A and 3B.
[16] Referring to FIG. 3A, it is assumed that the first to fourth content users 222, 224, 226
and 228 possess the first player 231, third player 233, fourth player 234 and sixth player 236,
respectively, and four content users 222, 224, 226 and 228 share the second player 232 and
fifth player 235.
[17] In this case, if the content issuer 210 intends to limit the use of content 215 through
the shared second player 232 and fifth player 235 only to the first content user 222 and
second content user 224, such a requirement of the content issuer cannot be satisfied under
the above-described binding structure.
[18] Specifically, as shown in FIG. 3B, in the case in which the first content user 222 and
the second content user 224 are in a single domain 330, and a DRM license is provided by
encrypting the CEK using a binding key Ka for this domain S310, the first content user 222
and the second content user 224 can use the content 215 through the first player 231 and the
third player 233 since the first content user 222 and the second content user 224 possess the
first player 231 and the third player 233, respectively. This is contradictory to the requirement
of the content issuer 210.
[19] Also, in the case in which the second player 232 and the fifth player 235 are in a
single domain 330, and a DRM license is provided by encrypting the CEK using a binding
key Kb for this domain S320, the third content user 226 and the fourth content user 228 can
use the content 215 through the second player 232 and the fifth player 235 since the third
content user 226 and the fourth content user 228 share the second player 232 and the fifth
5
player 235, respectively. In the same manner, this result is contradictory to the requirement of
the content issuer 210.
[20] As described above, the related art binding method follows a device biding method or
a user biding method that considers only the subject using the license (e.g., a content user or a
set of users using the content) or the object (e.g., a player playing the content or a set of
players), and thus the use range of the digital content is limited.
[21] In addition, according to the related art technique, the DRM system issuing DRM
licenses on the content issuer side and the DRM system decrypting and playing encrypted
content on the player side should be the same DRM system.
SUMMARY OF THE INVENTION
[22] Exemplary embodiments of the present invention overcome the above disadvantages
and other disadvantages not described above. Also, the present invention is not required to
overcome the disadvantages described above, and an exemplary embodiment of the present
invention may not overcome any of the problems described above.
[23] The present invention provides a system and method which provide use ranges of
digital content in diverse forms, without binding a license only to subjects using the license or
objects, in a DRM environment.
[24] The present invention also provides a method capable of using a DRM license even
among different DRM systems.
[25] According to an aspect of the present invention, there is provided a system for
providing a DRM license. The system includes a sink system which requests a license for
content; a source system which generates and provides a first rights token including binding
information related to the license, in accordance with the request; and a rights mediator which
generates a second rights token that is usable in the sink system on the basis of the first rights
6

token, and transmits the generated second rights token to the sink system; wherein the sink system provides the license for the content on the basis of the second rights token.
[26] According to another aspect of the present invention, there is provided a method of providing a DRM license. The method includes generating a first rights token including binding information related to a license for content; generating a second rights token, on the basis of the generated first rights token; and providing the license for the content on the basis of the generated second rights token.
BRIEF DESCRIPTION OF THE DRAWINGS
[27] The above aspects of the present invention will become more apparent by describing
in detail certain exemplary embodiments thereof with reference to the attached drawings, in
which:
[28] FIG. 1 is a conceptual view schematically illustrating a related art DRM;
[29] FIG. 2 is a view illustrating a related art biding method;
[30] FIGS. 3 A and 3B are views for explaining problems of a related art biding method;
[31] FIG. 4 is a view illustrating a system for providing a DRM license according to an
exemplary embodiment of the present invention;
[32] FIG. 5 is a view illustrating the detailed construction of the DRM license providing
system according to an exemplary embodiment of the present invention;
[33] FIG. 6 is a flowchart illustrating a method of providing a DRM license according to
an exemplary embodiment of the present invention;
[34] FIG. 7 is a view illustrating the construction of a web service server according to an
exemplary embodiment of the present invention;
[35] FIG. 8 is a view illustrating the construction of a client according to an exemplary
embodiment of the present invention; and
7

[36] FIGS. 9A and 9B are views illustrating systems for providing a DRM license according to an exemplary embodiment of the present invention.
DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS OF THE
INVENTION
[37] Hereinafter, exemplary embodiments of the present invention will be described in
detail with reference to the accompanying drawings. The aspects of the present invention and
methods for achieving the aspects will be apparent by referring to exemplary embodiments to
be described in detail with reference to the accompanying drawings. However, the present
invention is not limited to the exemplary embodiments disclosed hereinafter, but can be
implemented in diverse forms. The matters defined in the description, such as the detailed
construction and elements, are nothing but specific details provided to assist those of ordinary
skill in the art in a comprehensive understanding of the invention, and the present invention is
only defined within the scope of the appended claims. In the entire description of exemplary
embodiments of the present invention, the same drawing reference numerals are used for the
same elements across various figures.
[38] The present invention will now be described with reference to the accompanying
drawings illustrating block diagrams and flowcharts for explaining a method and system for
providing a DRM license according to exemplary embodiments of the present invention. It
will be understood that each block of the flowchart illustrations, and combinations of blocks
in the flowchart illustrations, can be implemented by computer program instructions. These
computer program instructions can be provided to a processor of a general purpose computer,
special purpose computer, or other programmable data processing apparatus to produce a
machine, such that the instructions, which are executed via the processor of the computer or
other programmable data processing apparatus, create means for implementing the functions
specified in the flowchart block or blocks. These computer program instructions may also be
8

stored in a computer usable or computer-readable memory that can direct a computer or other
programmable data processing apparatus to function in a particular manner, such that the
instructions stored in the computer usable or computer-readable memory produce an article of
manufacture including instruction means that implement the function specified in the
flowchart block or blocks. The computer program instructions may also be loaded onto a
computer or other programmable data processing apparatus to cause a series of operational
steps to be performed on the computer or other programmable apparatus to produce a
computer implemented process such that the instructions that are executed on the computer or
other programmable apparatus provide steps for implementing the functions specified in the
flowchart block or blocks.
[39] Also, each block of the flowchart illustrations may represent a module, segment, or
portion of code, which comprises one or more executable instructions for implementing the
specified logical function(s). It should also be noted that in some alternative implementations,
the functions noted in the blocks may occur out of the order. For example, two blocks shown
in succession may in fact be executed substantially concurrently or the blocks may sometimes
be executed in the reverse order, depending upon the functionality involved.
[40] FIG. 4 is a view illustrating a system for providing a DRM license according to an
exemplary embodiment of the present invention.
[41] Referring to FIG. 4, the system 400 for providing a DRM license includes a source
system 500, a sink system 700, a rights mediator 600, and a network 450 connecting the
source system, the sink system and the rights mediator.
[42] The source system 500, which is a system that transmits content, generates a DRM
license and encrypted content.
[43] The sink system 700, which is a system that receives and uses the content from the
source system 500, uses the DRM license and decrypts the encrypted content. The sink
9

system 700 may be divided into use subjects using the sink system 700 and use objects such as players. For example, the sink system 700 may be embodied by all audio/video (AV) players belonging to a user's home network, a specified mobile device, or a user's family. Hereinafter, use subjects or use objects that embody the sink system 700 will be called "principals".
[44] The principals in the sink system 700 may be differently managed according to a model implementing the sink system 700. For example, information related to a specified user may be stored in a PC, a smart card and a portable phone, or may be managed in the form of an account-password.
[45] The rights mediator 600 is a system that converts or re-processes the DRM license provided from the source system 500 into the form of a DRM license that can be understood in the sink system 700.
[46] For example, in the case in which the source system 500 is provided with an "A" DRM system and the sink system 700 is provided with a "B" DRM system, the sink system 700 cannot understand the DRM license generated from the source system 500. Accordingly, it is advantageous to have a DRM license that can be understood by both the source system 500 and the sink system 700, and for purposes of description, such a DRM license will be called a "rights token".
[47] Specifically, when the source system 500 generates and provides a plurality of rights tokens related to the encrypted content, the rights mediator 600 generates a rights token using the plurality of rights tokens and provides the generated rights token to the sink system 700. In this case, in order to discriminate between types of rights tokens, a rights token provided by the source system 500 is called a "sub-rights token", and a rights token generated by the rights mediator and provided to the sink system 700 is called a "main rights token".
10

[48] FIG. 5 is a view illustrating the detailed construction of the DRM license providing system according to an exemplary embodiment of the present invention.
[49] Referring to FIG. 5, the source system 500 manages a plurality of content 501, 502 and 503 and DRM licenses for the respective content, and includes a web service server 550 generating the sub-rights tokens. The sink system 700 includes a plurality of principals 701, 702, 703, 704 and 705 and a client 750 receiving the main rights token through the rights mediator 600. Although the client 750 receives the encrypted content directly from the web service server 550, the client 750 may also receive the content via the rights mediator 600. [50] In this case, the respective principals constituting the sink system 750 may be constructed in the form of a topology that indicates the relations among the principals. For example, referring to FIG. 5, on the assumption that Ul 704 and U2 705 are use subjects and Dl 701, D2 702 and D3 703 are use objects, Ul 704 can play the content through Dl 701 and D2 702. Also, Dl 701, D2 702 and D3 703 are constructed to belong to a domain managed by the client 750. Accordingly, the topology of the principals can be determined by edges connecting the respective principals. When a principal A that indicates use subjects by a single edge is connected to a principal B that indicates use objects, if an arrow of the edge faces the principal A, i.e., "A B", the principal A can also play content in the principal B. [51] The operation of the respective elements illustrated in FIG. 5 will now be explained in detail with reference to a flowchart illustrated in FIG. 6.
[52] When the client 750 requests a license for specified content to the web service server 550, the web service server 550 performs an authentication to confirm whether the client 750 is a rightful client using a certificate, content purchase information of the sink system or the client's access information such as an internet protocol (IP) address, an account and a password (S610).
11

[53] If it is confirmed that the client 750 is a rightful client, the web service server 550 generates and provides a sub-rights token for the requested content to the right mediator 600 (S620). The content requested by the client 750 may be encrypted by the web service server 550 to be provided to the client.
[54] In this case, the sub-rights token includes binding information of the content requested by the client 750 and rights information of the requested content. Conventionally, such binding information is expressed as a specified principal. In the present invention, the binding information can be expressed as path information among a plurality of principals, not by a single principal. The path information is information about edges connecting the principals.
[55] In addition, the web service server 550 can generate and provide a plurality of sub-rights tokens. In this case, each sub-rights token includes the path information among the plurality of principals as the binding information. If the web service server 550 generates and provides the plurality of sub-rights tokens to the rights mediator 600, the rights mediator 600 generates one main rights token by combining the plurality of sub-rights tokens, and then transmits the generated main rights token to the client 750 (S630). In this case, the main rights token includes relational information indicating relationships among binding information or rights information included in the respective sub-rights tokens, and through this relational information, operations among the respective binding information or rights information, such as difference set, set intersection and union, become possible. For example, if the relational information between the first binding information included in the first sub-rights token and the second binding information included in the second sub-rights token indicates the set intersection, it can be understood that content playback rights are given to the principals belonging to a common path of the path information corresponding to the first
12

binding information and the path information corresponding to the second binding information.
[56] The relation information may be generated by the web service server 550 and then provided to the rights mediator 600.
[57] The client 750 can generates a topology for giving the content playback rights on the basis of the main rights token received from the rights mediator 600 (S640).
[58] That is, since the main rights token includes the path information about a plurality of paths and the relation information among the respective path information, a topology, such as a tree structure, can be generated on the basis of the path information and the relation information. The tree structure is only an example. Other topologies are also contemplated. [59] The client 750 can determine whether to access the license bound by principals that comprise the sink system 700 through the topology generated as above (S650).
[60] FIG. 7 is a view illustrating the construction of a web service server according to an exemplary embodiment of the present invention.
[61] Referring to FIG. 7, the web service server 550 according to an exemplary embodiment of the present invention includes an interface module 552 communicating with the client 750 or the rights mediator 600, a license generation module 551 generating the sub-rights tokens for the content requested by the client 750, a storage module 554 storing the content requested by the client 750 or the binding information for the requested content, and a control module 553 controlling the operation of the respective modules.
[62] The modules used in exemplary embodiments of the present invention may include software or hardware elements, such as a field-programmable gate array (FPGA) or an application-specific integrated circuit (ASIC), to perform a specific function. Modules, however, are not defined as software or hardware. Modules may be configured in an addressable storage medium, or configured to reproduce one or more processors. Thus, a
13

module may include, by way of example, components, such as software components, object-oriented software components, class components and task components, processes, functions, attributes, procedures, subroutines, segments of program code, drivers, firmware, microcode, circuitry, data, databases, data structures, tables, arrays, and variables. The functionality provided for in the components and modules may be combined into fewer components and modules or further separated into additional components and modules.
[63] When the interface module 552 receives the request for the content, and the license request for the content from the client 750, the control module 553 searches the storage module 554, encrypts the requested content, and transmits the encrypted content to the client 750 through the interface module 552.
[64] In addition, the control module 553 provides the binding information stored in the storage module 554 to the license generation module 551, and the license generation module 551 generates the sub-rights tokens by using the binding information and provides the generated sub-rights tokens to the control module. In this case, the binding information may be expressed as the path information that indicates the relations among the plurality of principals. The control module 553 transmits the generated sub-rights tokens to the rights mediator 600 through the interface model 552.
[65] FIG. 8 is a view illustrating the construction of a client according to an exemplary embodiment of the present invention.
[66] Referring to FIG. 8, the client 750 according to an exemplary embodiment of the present invention includes an interface module 751 communicating with the web service server 550 or the rights mediator 600, a local DRM license generation module 754 converting the main rights token received from the rights mediator 600 into the form of a DRM license installed in the client 750, an external device communication module 753 providing the main
14

rights token to use subjects or use objects that constitute the sink system, and a control
module 752 controlling the operation of the respective modules.
[67] When, the interface module 751 receives the main rights token from the rights
mediator 600, the control module 752 generates a topology for giving the content playback
rights on the basis of the main rights token. Then, the control module 752 determines whether
to access the license bound by principals that constitute the sink system by using the
generated topology, and on the basis of this, controls the local DRM license generation
module 754 to generate the license that can be understood by the DRM license system
installed in the client 750.
[68] In addition, the control module 752 may provide the main rights token received from
the rights mediator 600 through the external device communication module 753 to the use
subject or the use object, or convert the main rights token into a license form suitable for the
use subject or the use object.
[69] Although FIG. 4 illustrates the DRM license providing system including one source
system 500 and one sink system 700, the present invention is not limited thereto, and the
DRM license providing system may include a plurality of source systems and a plurality of
sink systems as illustrated in FIGS. 9A and 9B.
[70] If a plurality of source systems exist, the rights mediator can generate one main rights
token by combining the sub-rights tokens received from the respective source systems, and in
this case, the generated main rights token includes information indicating relations among the
source systems.
[71] As described above, according to exemplary embodiments of the present invention,
the use range of the digital content can be provided in diverse forms, and the DRM license
can be used among different DRM systems.
15

[72] In addition, the present inventive concept can satisfy the need of the content issuer desiring the use of the digital content in diverse forms.
[73] Exemplary embodiments of the present invention have been described with reference to the accompanying drawings. However, those skilled in the art will appreciate that many variations and modifications can be made to the disclosed exemplary embodiments without substantially departing from the principles of the present invention. Therefore, the disclosed exemplary embodiments of the invention are used in a generic and descriptive sense only and not for purposes of limitation.
16

WHAT IS CLAIMED IS:
1. A system for providing a digital rights management (DRM) license, the
system comprising:
a sink system which requests a license for content;
a source system which generates and provides a first rights token including binding information related to the license, in accordance with the request; and
a rights mediator which generates a second rights token on the basis of the first rights token, and transmits the generated second rights token to the sink system;
wherein the sink system provides the license for the content on the basis of the second rights token.
2. The system of claim 1, wherein the second rights token is usable in the sink system.
3. The system of claim 1, wherein the binding information comprises path information that indicates relationships among a plurality of principals to which the license is provided.
4. The system of claim 3, wherein each principal of the plurality of principals comprises use subjects which use the content and use objects which play the content.
17

5. The system of claim 1, wherein the sink system generates a topology for giving content playback rights on the basis of the second rights token, and provides the license by principals comprising the sink system on the basis of the generated topology.
6. The system of claim 1, wherein when the rights mediator receives first rights tokens from a plurality of source systems, the rights mediator generates the second rights token by combining the first rights tokens received from the respective source systems, and the second rights token includes information indicating relations among the respective source systems.
7. The system of claim 1, wherein the source system comprises a web service server which manages a plurality of content and a plurality of DRM licenses for the respective content, and generates the first rights token.
8. The system of claim 1, wherein the sink system comprises a client which receives the plurality of principals and the second rights token from the rights mediator.
9. A method of providing a digital rights management (DRM) license, the method comprising:
generating a first rights token including binding information related to a license for content;
18

generating a second rights token based on the generated first rights token; and providing the license for the content on the basis of the generated second rights token.
10. The method of claim 9, further comprising receiving a request for the license for content, wherein the first rights token is generated in accordance with the request.
11. The method of claim 10, wherein the license for content is received from a sink system.
12. The method of claim 11, wherein the second rights token can be understood in the sink system.
13. The method of claim 9, wherein the binding information comprises path information that indicates relationships among a plurality of principals to which the license is provided.
14. The method of claim 13, wherein each principal of the plurality of principals comprises use subjects which use the content and use objects which play the content.
15. The method of claim 9, wherein the providing the license comprises:
19

generating a topology for granting content playback rights on the basis of the generated second rights token; and
providing the license by principals comprising a sink system on the basis of the generated topology.
16. A system and a method for providing a digital rights management (DRM) license substantially as herein described with reference to the accompanying drawings.
OMANA RAMAKRISHNAN
AGENT FOR THE APPLICANT(S)
OF K & S PARTNERS
Dated this 10th day of October, 2006
20

ABSTRACT OF THE DISCLOSURE
A system and method for providing a digital rights management (DRM) license are provided. The system includes a sink system which requests a license for content; a source system which generates and provides a first rights token including binding information related to the license, in accordance with the request; and a rights mediator which generates a second rights token on the basis of the first rights token, and transmits the generated second rights token to the sink system; wherein the sink system provides the license for the content on the basis of the second rights token. The method includes receiving a request for a license for content; generating a first rights token including binding information related to the license, in accordance with the request; generating a second rights token; and providing the license for the content on the basis of the generated second rights token.
21

Documents:

1675-MUM-2006-ABSTRACT(18-8-2009).pdf

1675-MUM-2006-ABSTRACT(8-1-2010).pdf

1675-mum-2006-abstract(granted)-(28-1-2010).pdf

1675-mum-2006-abstract.doc

1675-mum-2006-abstract.pdf

1675-MUM-2006-CANCELLED PAGES(18-8-2009).pdf

1675-mum-2006-cancelled pages(8-1-2010).pdf

1675-MUM-2006-CLAIMS(18-8-2009).pdf

1675-MUM-2006-CLAIMS(AMENDED)-(8-1-2010).pdf

1675-mum-2006-claims(granted)-(28-1-2010).pdf

1675-mum-2006-claims.doc

1675-mum-2006-claims.pdf

1675-mum-2006-correspondance-received.pdf

1675-MUM-2006-CORRESPONDENCE(20-8-2009).pdf

1675-MUM-2006-CORRESPONDENCE(30-11-2009).pdf

1675-mum-2006-correspondence(8-12-2009).pdf

1675-MUM-2006-CORRESPONDENCE(9-10-2009).pdf

1675-mum-2006-correspondence(ipo)-(29-1-2010).pdf

1675-mum-2006-description (complete).pdf

1675-MUM-2006-DESCRIPTION(COMPLETE)-(18-8-2009).pdf

1675-mum-2006-description(granted)-(28-1-2010).pdf

1675-MUM-2006-DRAWING(18-8-2009).pdf

1675-mum-2006-drawing(granted)-(28-1-2010).pdf

1675-mum-2006-drawings.pdf

1675-MUM-2006-FORM 1(18-8-2009).pdf

1675-mum-2006-form 1(20-3-2007).pdf

1675-MUM-2006-FORM 1(8-1-2010).pdf

1675-MUM-2006-FORM 13(18-8-2009).pdf

1675-mum-2006-form 18(11-10-2006).pdf

1675-mum-2006-form 2(18-8-2009).pdf

1675-mum-2006-form 2(granted)-(28-1-2010).pdf

1675-MUM-2006-FORM 2(TITLE PAGE)-(18-8-2009).pdf

1675-MUM-2006-FORM 2(TITLE PAGE)-(8-1-2010).pdf

1675-mum-2006-form 2(title page)-(granted)-(28-1-2010).pdf

1675-MUM-2006-FORM 3(18-8-2009).pdf

1675-mum-2006-form 3(5-4-2007).pdf

1675-mum-2006-form-1.pdf

1675-mum-2006-form-2.doc

1675-mum-2006-form-2.pdf

1675-mum-2006-form-26.pdf

1675-mum-2006-form-3.pdf

1675-mum-2006-form-5.pdf

1675-MUM-2006-OTHER DOCUMENT(18-8-2009).pdf

1675-MUM-2006-OTHER DOCUMENT(8-1-2010).pdf

1675-MUM-2006-PETITION UNDER RULE 137(18-8-2009).pdf

1675-MUM-2006-PRIORITY DOUMENT(20-8-2009).pdf

1675-MUM-2006-REPLY TO EXAMINATION REPORT(18-8-2009).pdf

1675-MUM-2006-REPLY TO EXAMINATION REPORT(8-1-2010).pdf

1675-mum-2006-wo international publication report(11-10-2006).pdf


Patent Number 238342
Indian Patent Application Number 1675/MUM/2006
PG Journal Number 6/2010
Publication Date 05-Feb-2010
Grant Date 28-Jan-2010
Date of Filing 11-Oct-2006
Name of Patentee SAMSUNG ELECTRONICS CO.,LTD.
Applicant Address 416,Maetan-dong, Yeongtong-gu, Suwon-si,Gyeonggi-do,
Inventors:
# Inventor's Name Inventor's Address
1 KIM,HYOUNG-SHICK #401 Jeongyeon Youthville 68-19 Changcheon-dong, Seodaemun-gu, Seoul,
PCT International Classification Number H04K1/00
PCT International Application Number N/A
PCT International Filing date
PCT Conventions:
# PCT Application Number Date of Convention Priority Country
1 10-2006-0086972 2006-09-08 U.S.A.
2 60/725,664 2005-10-13 U.S.A.