Unit of Copyrighted Idea Notes (CIN)


Purpose of this File:

This file lists the Kok-Wah Lee @ Xpree Li’s copyrighted idea notes and their unit amount for application of copyright licensing.

To go back to the guide of my personal web space, click here.



To use my copyrighted works, I firstly emphasize on righteous moral, secondly intellectual understanding, thirdly reader trust when concepts are proven from experiments and daily facts, as well as fourthly mutual trust when reader is able to convey the proven hypotheses and facts up to certain degrees of correct percentages, detected and/or corrected errors to the author for further interaction, improvement, refinement, and enhancement.


Copyrighted Idea Note (CIN) Unit:

[1] For full articles, please refer to the Xpree Li’s copyrighted collections [Ref.: http://www.xpreeli.com/personal/kwlee_copyright.htm].

[2] For commercial purpose of Xpree Li’s copyrighted collections, copyright licensing fee of explanatory description of short notes has to be paid to Kok-Wah LEE.

[3] This short note as appendix, explanation, description, operational instruction, or user manual is called as copyrighted idea notes (CIN) here.

[4] A working example of copyright licensing fee to be paid to Kok-Wah LEE the copyright owner:

            Total CIN unit to be included as short notes like appendix into a book or user manual (Total_CIN) = 1.00 CIN unit

            Amount of book or user manual per distribution batch (#copy) = 2000 copies

            Licensing fee per CIN unit (Rate) = USD$1.00 per CIN unit

            Cash Discount (D) = 20%


            Total licensing fee to be paid (P) = Total_CIN * Rate * #copy * (1 – Discount)

            P = 1.00 * USD$1.00 * 2000 * (1 – 0.20) = USD$1,600.00


Assume paper-type book price per selling copy ($copy) = USD$20.00

            Percentage of cash due to copyright owner (%Cash) = P / #copy / $copy

            %Cash = USD$1,600.00 / 2000 / USD$20.00 = 4.00%


List of Copyrighted Idea Note (CIN) Unit:

[1] For developer to estimate the cost of input, one CIN unit is currently set at USD$1.00 per CIN unit per A4 page (or USD$0.50 per CIN unit per A5 page) as at 21 April 2012.

[2] A joke of fact telling: Coins have better actual value due to metal than the currency notes, so do consider coins due to severe inflation and unfair trust over the facial value of currency notes.

[3] Cash discount is negotiable and flexible according to end user’s type and quantity.


Title of Copyrighted Notes

- Online access at www.xpreeli.com

- Online archive at www.archive.org (search keyword: xpreeli)

Copyrighted Idea Notes (CIN)

CIN Unit (negotiable on discount/surcharge)

[1] Memorizable Public-Key Cryptography (MePKC) & Its Applications, First Edition (Versions 1.0-3.0), © 14 March 2009 – 02 May 2011.

[1a] Space-1: Computer system and network(s); computer readable medium.

[1b] Space-2: Some CINs can be in paper memory space.

[1c] Space-3: Some CINs can be in human memory space.

Methods to create big and yet memorizable secrets till 512 bits:

[1.1a] Self-created signature-like Han character of CLPW (Chinese Language Password) and CLPP Chinese Language Passphrase)

[1.1b] Two-dimensional key (2D key)

[1.1c] Multilingual key

[1.1d] Multi-tier geo-image key

[1.1e] Multi-factor multimedia key using software token

[1.1f] Their hybrid combinations (N)


Methods to create multiple slave keys from a master key:

[1.2a] Multihash key (basic)

[1.2b] Multihash key (first variant)

[1.2c] Multihash key (second variant)

[1.2d] Multihash key (third variant)

[1.2e] Multihash key (fourth variant)

[1.2f] Multihash key (fifth variant)


[1.3] Multihash signature

[1.4] Memorizable public-key cryptography (MePKC)

[1.5] Random space steganography

[1.6] Electronic fund transfer using MePKC

[1.7] Electronic software/copyright licensing using MePKC

[1.8] Human-computer authentication using MePKC

[1.9] Digital certificate with more than 1 asymmetric key pair

[1.10] 3-tier MePKC digital certificates for ladder authentication

[1.11] Storing and managing voice and video calls using MePKC

[1.12] Multipartite e-commerce transactions using MePKC

[1.13] Boosting up trust strength of MePKC digital certificate

[1.14] MePKC digital timestamping for idea originality proof

[1.15] Anti-hacking data storage using improved DIP switch






1 + 1




1 * #N

























[2] Chinese Lexeme Prose: The Legend of Nature [中文字汇散文词:道法传奇 / 自然传奇], First Edition (Version 1.0), © 01 May 2009.

[2.1] A story-like prose to speed up the learning process of Chinese language using most frequently used Chinese characters

0.01 * 470 +

0.01 * 228 +

0.01 * 112

[3] Vector Identity with Proof, First Edition (Version 1.0), © 08 May 2009.

[3.1] All the proofs of vector identities


[4] Lease Application Form for Copyright Licensing, Version 1.0, © 30 May 2009.

[4.1] A form template for considerate price estimation


[5] Learning Seed of Chinese Language 1ed-ver3, First Edition (Version 3.0), © 30 May 2009.

[5.1] Learning seed of Chinese language in Chinese-English languages translation


[6] Method and System to Create Chinese Language Seeds from Most Frequently Used Characters and Their Applications, © 04 January 2010.

[6.1] Method to create Chinese language seeds

[6.1a] One of the sentences in Chinese language seeds.

[6.2] Method to created 2D key using sensitive input sequence

[6.3] Chinese input method to computer using Chinese language seeds

[6.4] Chinese poly-alphabetic cipher (中文种子密码) as computer-free cryptography

[6.5] Any variant (N) of Chinese poly-alphabetic cipher

[6.6] Code table of Yongzi Guaxiang (永字卦象输入法) for Chinese language

[6.7] Yongzi Guaxiang input method (永字卦象输入法)

[6.8] Computer cryptography using Chinese poly-alphabetic cipher

[6.9] Chinese poly-alphabetic cipher in hybrid communication network


1 + 0.1 * #char







2 + 0.1 * #N

1 + 0.01 * #char






[7] Artificial Neural Network based Byzantine Agreement Protocol (ANN based BAP), (《用于电脑群的李氏解谣码》), © 25 October 2002.

[7a] Space-1: Computer system and network(s); computer readable medium.

[7.1] Formation method of the message exchange matrix (MEM)

[7.2] Faulty node detection of ANN based BAP

[7.3] Optimal network partitioning into tripartite ANN based BAP

[7.4] Faulty node detection of tripartite ANN based BAP

[7.5] Message exchange matrix (MEM) for oral message communication of small human group








[8] Initial Comments on “Shan Hai Jing” (Book of Mountains & Oceans) (《《山海经》初评》), © 16 August 2009.

[8.1] Introduction notes to begin reading “Shan Hai Jing”

[8.2] Paragraph for each geographical location (N)


0.1 * #N

[9] Short Decision Making (《近打定真假》), © 07 February 2012.

[9.1] Oral cipher using the first sentence of Chinese language seeds.

[9.2] Combination key from 2D key.

[9.3] Categorization into four usages groups for oral cipher using the Book of Changes (Chinese language: 《易经》).





[10] Pure Human Network based Byzantine Agreement Protocol (PHN based BAP), (《用于人群的李氏解谣码》), © 1995, 25 October 2002, 22 January 2011.

[10a] Space-1: Some CINs can be in paper memory space.

[10b] Space-2: Some CINs can be in human memory space.


[Notes-1 (15May2012)] A secret disclosed to public for careful and thoughtful considerations by Kok-Wah Lee on 22 January 2011, in memoir of Baba Vanga the Bulgarian prophetess on her prediction topics of East Japan Disasters (earthquake > tsunami > nuclear plant failure) on 11 March 2011 (verified); and World War III (years 2010 Nov. – 2014 Oct.) (?).


[Hints (16May2012)] In Years 2010-2012: (a) (Dec. 2010 – now in May 2012) Revolutions of Jasmine Flowers in the North Africa and Middle East. (b) (Sep. 2011 – now in May 2012) Demonstration called Occupy in the Europe and USA to show protest to national debt crisis.


[Notes-2 (16May2012)] For the triggering of World War I (28 July 1914 – 11 November 1918), one can imagine well the originating cause by referring to a game rule called stalemate situation for western chess the board game, where the heir to the throne of Austria-Hungary Empire was assassinated on 28 June 1914.


[Notes-3 (16May2012)] Euphony of words in English language and Chinese language (Cantonese + Mandarin dialects):

(a) Apocrypha (English): those books in false contents. Chinese euphony: grandma is blossoming (粤语后华语的谐音“阿婆开花”).

(b) Apocalypse (English): situations for end of the world. Chinese euphony: grandma adding the Lee Four (粤语谐音“阿婆加李四”).

(c) first (English): numbered one. Chinese language euphony means “to be punishable” (粤语谐音“罚得”).

(d) second (English): numbered two. Chinese language euphony means “knowing fright” (粤语谐音“识惊”).

(e) third (English): numbered three. Chinese language euphony “de” means “getting away”, “virtues”, “belongings”, “land”, “baseline” (粤语和华语的谐音“得”、“德”、“的”、“地”、“底”).

(f) fourth (English): numbered four. Chinese language euphony “fo” or “fou”.

(g) Suspects under K.-W. Lee’s name list <check here>.


[10.1] Formation method of the message exchange matrix (MEM)

[10.2] Faulty node detection of PHN based BAP

[10.3] Optimal network partitioning into tripartite PHN based BAP

[10.4] Faulty node detection of tripartite PHN based BAP

[10.5] Message exchange matrix (MEM) for oral message communication of small human group

[10.6] Benzene-like ring structure for a pure human network [(C) Year 1995. Kok-Wah Lee.]

[10.7] Human network structure, alike a carbon compound, being hydrocarbons (alkanes, alkenes, alkynes, dienes/alkadienes; cyclo-alkanes, cyclo-alkenes, cyclo-alkynes; arenes/aromatic hydrocarbons), alcohols, carboxylic acids, esters; in the organic chemistry

[10.8] A few simplest typical models of master-apprentice human network structure for the inheritance of copyrights and secrets, generations after generations, alike methane, ethylene, ethyne; methanol, methanoic acid, methyl methanoate; carbon dioxide, nitrogen dioxide, oxygen gas ( O2 ), nitrogen gas ( N2 ).

[10.9] A human consortium network structure formed from allied family units, alike circulenes.











2 * #structure





2 * #network






2 * #baseRing ?




Condition for Commercial Usages:

[1] Commercial usages include copyright licensing, sales, distribution hosting, etc.

[2] 李国华注于民国一百年辛卯年正月十五日(公元2011217日)。更新于公元2012115日。


[2] English translation: Written by Kok-Wah LEE on 17 February 2011. Updated on 15 January 2012.

There is a principle to share and use the owner’s goods of product and service. This principle states that for the person with bad deed type called yinzei, nianshou, or xiaoren, please accept the owner’s apology that the owner of goods does not want to earn a profit by sharing the goods. If in case there is any offender of this principle, the Sky and Earth will not endure such a person to have cheated to buy and use the goods.


淫贼 (yinzei): A bad person, who cheats a female’s heart and body for oneself or other(s) by using gossips. Baby may have also been conceived before the female is released.

年兽 (nianshou): A bad person, who hides oneself without clear affirmation or oath, especially one’s falsified or irrational identity and role, to cheat or disturb another person’s mind by using sound as if it were that person’s own sleeping dream or thought.

小人 (xiaoren): A bad person, who begins as a small figure and grows to become a cheating big “giant” by wrongly using other’s name, via techniques like name swapping, name changing, name replacement to take over other’s property, etc. Beginning from the misuse of name, xiaoren will normally fall into a snowball avalanche of bad deed series.


[3] For more information on the ins and outs of this sales condition, please refer to another online article entitled “The Four Basic Principles/Apogees in Chinese Culture” <Read Here> by Kok-Wah Lee the Nanyang author in Chinese language.


Contact Info:

For enquiry, please use one or many of the contact info. <Click here>


This page contains Chinese characters.

E. & O. E. = Errors and Omissions Exempted

E. & O. E., + E. = Errors and Omissions Exempted, plus Estimations


Created on 29 May 2009

Updated on 17 May 2012