CN100349088C - Digital information controlling method - Google Patents

Digital information controlling method Download PDF

Info

Publication number
CN100349088C
CN100349088C CNB2005100871215A CN200510087121A CN100349088C CN 100349088 C CN100349088 C CN 100349088C CN B2005100871215 A CNB2005100871215 A CN B2005100871215A CN 200510087121 A CN200510087121 A CN 200510087121A CN 100349088 C CN100349088 C CN 100349088C
Authority
CN
China
Prior art keywords
threshold value
numerical information
instruction
time limit
subtracted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2005100871215A
Other languages
Chinese (zh)
Other versions
CN1904792A (en
Inventor
李益民
石国欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB2005100871215A priority Critical patent/CN100349088C/en
Publication of CN1904792A publication Critical patent/CN1904792A/en
Application granted granted Critical
Publication of CN100349088C publication Critical patent/CN100349088C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to digital information copyright managing technology and discloses a control method for digital information using authority. One method is according to the total times threshold value, time limitation and the use time threshold value of exceeding carried in RO, controlling the using time below or equal to total threshold value and controlling the using time in certain time span. Another method is according to time limitation, using time threshold value setting in certain time span and use time threshold value of exceeding carried in R0, and taking separating control to user selected using mode. The first mode could use total content and the other mode is short time using mode in setting time. The method could control short time preview times, and is convenient to user.

Description

A kind of digital information controlling method and terminal
Technical field
The present invention relates to DRM (Digital Rights Management, digital copyright management) technology, after being particularly related to the numerical information of encrypting from the released person of network download, method and the terminal of utilizing copyright management proxy module (DRM Agent) on terminal device, the rights of using of numerical information to be controlled.
Background technology
DRM realizes having the precondition of the numerical information product of copyright by network selling, adopts digital copyright protection technology can prevent effectively by network and computing machine bootlegging, copy, transmission numerical information product.The content publisher of numerical information product (rights Issuer, RI) will upload to network after the numerical information encryption, the user downloads to the numerical information of encrypting among the DRM Agent on the terminal device, the user is if use the numerical information of downloading, ask permission object (the Rights Object of this numerical information product again to RI by network, RO), the key that comprises data decryption among the RO, if the product of disposable paying, after DRM Agent software utilizes this secret key decryption numerical information, the user just can use, if desired user's operating right is controlled, the authorization administration information that also comprises this numerical information among the RO, DRMAgent is according to the concrete use of these restrictive condition leading subscribers to numerical information, in the prior art, restriction control to digital product generally comprises: the number of times of use, the preview number of times, the limiting time of each preview and term of life etc., RO generally after finishing authentication and register flow path between terminal and the RI, is carried in the register requirement response message by RI and returns to terminal.
In the existing relevant criterion standard of DRM alliance, defined three parameters: the limiting time of the number of times of use, preview number of times, preview can be carried in the corresponding field of setting among the RO, wherein respectively:
Count: be defined as the total degree that content is authorized to use, value is a positive integer;
Timed-count: be defined as the number of times that content is authorized to use the time that defines above timer;
Timer: be defined as the preview time, be generally the duration of free use, surpassed the value that this duration just reduces timed-count.
In the existing standard standard, DRM Agent carries out control of authority according to above-mentioned three parameters two kinds of methods:
Method one: control content be used number of times
RI sends in the RO object of DRM Agent and includes only the count parameter, and expression only limits the access times of content, and DRM Agent whenever detects the user and uses once, then count is subtracted 1, equals at 0 o'clock to count, and the user can't reuse; Control flow is as shown in Figure 1:
When A1, DRM Agent received user's operational order, for example play instruction, the RO object according to the contents extraction correspondence of user's selection operation only comprised the count parameter in the RO object;
A2, judge whether count equals 0, if be not equal to 0, execution in step A3, otherwise this operational order of execution in step A5 refusing user's uses content to forbid the user;
A3, count is subtracted 1 and carry out corresponding operating according to user's instruction;
A4, permission continue to use content, and stop when receiving user's withdraw from service operational order or stopping automatically when the concluding time arrives;
A5, because count equal 0, so this operational order of refusing user's forbids that the user uses content;
This control method is single, preview number of times in the uncontrollable short time, therefore also can only adopt single way of paying, for example for a short-movie: the user may plan to order short time preview several times earlier, and then whether decision buys the number of times of full content and purchase, if can not select flexibly according to demand, must cause the propagation of using inconvenience and influencing numerical information.
Method two: control surpasses the access times of certain preview time
RI sends in the RO object of DRM Agent and comprises timed-count and two parameters of timer, when DRM Agent whenever detects the user and surpasses the use of timer, timed-count is subtracted 1, equal at 0 o'clock to timed-count, the user can't re-use, control flow as shown in Figure 2:
When B1, DRM Agent receive user's operational order, for example play instruction, and, comprise two parameters of timed-count and timer in the RO object according to the RO object of the contents extraction correspondence of user's selection operation;
B2, carry out the user operational order, play and execution in step B5 as beginning; Otherwise continue step B3;
B3, monitor user ' are used duration, when using duration to equal timer, and execution in step B4;
B4, judge whether timed-count equals 0, if then execution in step B7 stops using; Otherwise execution in step B5;
B5, timed-count is subtracted 1;
B6, permission continue to use and stop when receiving user's withdraw from service operational order or stopping automatically when the use concluding time arrives.
Though this method has been set timer and has been surpassed the access times timed-count of timer, but still have no idea to control the access times in the timer time, the user can not limit time use in the timer official hour, because in the prior art, user's any selection from full content begins the preview reference position each time, like this, the possibility of result that directly causes can be that the timed-count that the user buys is 1 time, but uses whole numerical informations repeatedly by the preview in the timer repeatedly.
Summary of the invention
The present invention discloses a kind of control method and terminal of numerical information rights of using, to solve the problem of uncontrollable short time preview number of times in the prior art.
A kind of digital information controlling method comprises the steps:
A1, reception numerical information are used instruction and are extracted the permission object (RO) of this numerical information, and described RO comprises second threshold value of the access times of prescribing a time limit when the first threshold of total degree, time limit, restriction are used in restriction above this, and described first threshold is greater than second threshold value;
A2, judge whether first threshold equals 0, if then refusal is carried out described use instruction; Otherwise first threshold is subtracted 1, and carry out described use instruction permission and use described numerical information;
Duration is used in a3, monitoring, and judges in limited time whether second threshold value equals 0 when using duration to equal, if then stop this use; Otherwise second threshold value is subtracted 1 also allow to continue to use described numerical information.
The described time limit and second threshold value are many groups, and control respectively by circulation step a3.
Among the described step a3, receive and stop using instruction or used the back to finish fully in numerical information.
A kind of numerical information rights of using control method comprises the steps:
B1, reception numerical information are used instruction and are extracted the permission object (RO) of this numerical information, described RO comprises the time limit, second threshold value of the access times of prescribing a time limit when restriction surpasses this and limit the 3rd threshold value of access times in this time limit, and the model selection instruction is used in the prompting input;
B2, receive to use the model selection instruction, when selecting to surpass execution in step b3 when using of described time limit; When being chosen in this time limit execution in step b4 when using;
B3, judge whether second threshold value equals 0, if then refusal is carried out described use instruction; Otherwise second threshold value is subtracted 1, and carry out described use instruction permission and use described numerical information;
B4, judge whether the 3rd threshold value equals 0, if then refusal is carried out described use instruction; Otherwise the 3rd threshold value is subtracted 1, and carry out described use instruction permission and use described numerical information;
Duration is used in b5, monitoring, and stops this use in limited time when using duration to equal described.
Above-mentioned two kinds of methods can also be used, DRM Agent discerns the parameter group that comprises among the described RO, carries out first method when described parameter group comprises second threshold value of first threshold, the time limit of restriction use total degree, the access times of prescribing a time limit when restriction surpasses this; When described parameter group comprises the time limit, second threshold value of the access times of prescribing a time limit when restriction surpasses this and should be in the time limit carry out second method during the 3rd threshold value of access times and control.
In addition, the present invention also provides a kind of terminal, comprises copyright management proxy module DRM Agent, and described copyright management proxy module comprises:
Receive the submodule that numerical information is used instruction and extracted the permission object RO of this numerical information, described RO comprises that the first threshold of total degree, time limit are used in restriction, the submodule of second threshold value of the access times of prescribing a time limit when restriction surpasses this, and described first threshold is greater than second threshold value;
Judge whether first threshold equals 0,, otherwise first threshold is subtracted 1, and carry out the submodule that described use instruction allows to use described numerical information if then refusal is carried out described use instruction;
Monitoring use duration, and when using duration to equal the second threshold value correspondence, prescribe a time limit, then this threshold value is subtracted 1 and also allow continuation to use the submodule of described numerical information.
In addition, the present invention also provides a kind of terminal, comprises copyright management proxy module DRM Agent, and described copyright management proxy module comprises:
Receive the submodule that numerical information is used instruction and extracted the permission object RO of this numerical information, described RO comprises the time limit, second threshold value of the access times of prescribing a time limit when restriction surpasses this and limit the 3rd threshold value of access times in this time limit; The submodule of model selection instruction is used in the prompting input;
Receive the submodule that uses the model selection instruction, when using above the described time limit, selection judges whether second threshold value equals 0, if then refusal is carried out described use instruction, otherwise second threshold value is subtracted 1, and carry out described use instruction permission and use described numerical information; When being chosen in when using in this time limit to judge whether the 3rd threshold value equals 0, if then refusal is carried out described use instruction; Otherwise the 3rd threshold value is subtracted 1, and carry out described use instruction permission and use described numerical information;
Be used to judge whether second threshold value equals 0, if then refusal is carried out described use instruction; Otherwise second threshold value is subtracted 1, and carry out the submodule that described use instruction allows to use described numerical information;
Be used to judge whether the 3rd threshold value equals 0, if then refusal is carried out described use instruction; Otherwise the 3rd threshold value is subtracted 1, and carry out the submodule that described use instruction allows to use described numerical information;
Duration is used in monitoring, and stops the submodule of this use when using duration to equal described in limited time.
Beneficial effect of the present invention is as follows:
At first, disclose a kind of when portably using the access times threshold value of total degree threshold value, time limit and overstepping the time limit among the RO, total degree that uses content and the method that surpasses the access times of setting the time limit have how been controlled simultaneously, the access times that objectively will set in the time limit are controlled at smaller or equal to the total degree threshold value, reach the purpose of control short time preview number of times; Further, in this method, can also set a plurality of time limits and corresponding access times, make control device more flexible;
Secondly, disclose a kind of according to the time limit of carrying among the RO, set access times threshold value in the time limit, and the access times threshold value of overstepping the time limit, to the method for setting the short time preview number of times in the time limit and controlling respectively above the access times of setting the time limit, at first, set two kinds of control models and carry out according to user's model selection instruction is concrete, first kind of pattern is to use full content, control according to surpassing the access times of setting the time limit, another kind of pattern is for using pattern in short-term in the setting time limit, utilize the access times threshold value and set time limit control short time preview number of times, this method not only can be controlled short time preview number of times, and select the use pattern by the user, convenient for users;
And, above-mentioned two kinds of methods can also be used simultaneously, after extracting corresponding RO, judge the parameter group of carrying among the RO by DRM Agent earlier, when if parameter group is to use the access times threshold value of total degree threshold value, time limit and overstepping the time limit, then use first method to control; If parameter group is the time limit, when setting the access times threshold value of interior access times threshold value of time limit and overstepping the time limit, then uses second method to control, made things convenient for RI to select to use according to difference control purpose;
The invention solves in the numerical information copyright control technology, the blind spot that preview number of times is in short-term controlled not, and implementation is simple and convenient, can better promote the propagation and the use of numerical information.
Description of drawings
Fig. 1 only controls the method flow diagram that uses total degree in the prior art;
Fig. 2 is for only controlling the method flow diagram of access times over time limit in the prior art;
Fig. 3 is the method flow diagram of embodiment one of the present invention;
Fig. 4 is the method flow diagram of embodiment two of the present invention.
Embodiment
The purpose of access times after the objective of the invention is to the numerical information that copyright is arranged realized controlling simultaneously preview number of times in the short time and surpass the short time, the technical conceive of realizing this purpose is: the relevant information of access times after carrying preview number of times in the short time simultaneously and surpass the short time in the permission object RO of numerical information, by operating in DRM Agent on the terminal device, below by following three kinds of embodiments and be described with reference to the accompanying drawings according to these information Control access times.
Embodiment one
In the existing permission object, defined three parameters that same permission produced effect of contraction, i.e. count, timed-count and timer, wherein:
Count: the total degree that is authorized to use;
Timed-count: sign surpasses the number of times that the timer duration can use content;
Timer: the duration that sign limits.
For example: when count:20, timed-count:5, timer:30, expression is 5 times for the operable total degree of content 20 times, above 30 seconds partial content rights of using.
When comprising count and timed-count and timer among the RO that DRMAgent obtains simultaneously, control according to following step, as shown in Figure 3:
S101, DRM Agent receive user's operational order and extract the corresponding RO object that uses content, comprise three parameters of count, timed-count and timer in the RO object simultaneously;
S102, judge whether count equals 0, if, show that then the user has not had rights of using, then execution in step S108 refusal is carried out user's operational order; Otherwise continue step S103;
S103, carry out user's operational order, and count is subtracted 1;
S104, monitor user ' are used duration, and judge and use duration whether to equal timer, and when equaling timer, execution in step S105; If receive user's halt instruction in the period then directly end at timer;
S105, timed-count is subtracted 1;
S106, allow to continue use, and when receiving user's halt instruction, finish or stopping automatically when using concluding time arrival.
Among the embodiment one,, use total degree to reach the purpose of control short time preview number of times, simultaneously, also controlled the access times that surpass limiting time smaller or equal to total degree by restriction though there is not directly to identify the parameter of short time preview number of times.
Based on the foregoing description, can also realize the corresponding different restrictions of access times in short-term of different time restriction, with twice is that example describes, and as in the t1 duration time, corresponding timed-count is Tc1 time, in the time of in the t2 duration, corresponding timed-count is Tc2 time, and t1<t2, Tc1>Tc2, then in RO, carry timer and timed-count with the form of similar following tabulation:
Use duration timer Access times timed-count in this duration
t1 Tc1
t2 Tc2
According to above-mentioned tabulation, DRM Agent is controlled at the access times in the t1 duration scope Tc1 time, the access times in the t2 duration scope is controlled at Tc2 time, wherein t1<t2.Control idea is identical with embodiment 1, when the t1 duration arrives, judges whether Tc1 equals 0 earlier, if then forbid continuing to use, also allows to continue to use otherwise Tc1 is subtracted 1; Continue monitoring and use duration, when arriving, the t2 duration judges whether Tc2 equals 0, continue to use if then forbid, otherwise allow to continue to use, when receiving user's halt instruction, finish or stopping timer and timed-count more than similar approach can be controlled 2 groups automatically when using full content.
This method by DRM Agent according to the access times threshold value that portably uses total degree threshold value, time limit and overstepping the time limit among the RO, control the total degree that uses content simultaneously and surpassed the access times of setting the time limit, the access times that objectively will set in the time limit are controlled at smaller or equal to the total degree threshold value, reach the purpose of control short time preview number of times; Further, in this method, can also set a plurality of time limits and corresponding access times, make control device more flexible.
Embodiment two
Do not utilize the current count field that has defined, but in permission object RO, increase a new field, insidetimed-count, with the content rights of using number of times of insidetimed-count within the sign short time, carry insidetimed-count among the RO simultaneously, when timed-count and timer, DRM Agent uses these three parameters in the control short time and surpass the access times of short time, when specific implementation, at first need to define two kinds of use patterns and according to user's concrete execution of model selection instruction, first kind of pattern is for using full content, control according to timed-count, another kind of pattern is utilized insidetimed-count and timer control short time preview number of times for use pattern in short-term in the setting time limit.
When DRM Agent receives user's operational order, select the use pattern by user interface prompt, if the user selects the short time to use pattern, only reduce the number of times of insidetimed-count, content is used when reaching the short time, automatically stop use, perhaps when the halt instruction of receiving the user, finish content.If the user selects to use fully content, reduce the number of times of timed-count, allow the normal full content that uses.In this case, do not need to carry simultaneously count and timed-count parameter among the RO.For example: when insidetimed-count:10, timed-count:5 and timer:30, expression is tried 30 seconds contents 10 times, and the rights of using that surpass 30 seconds parts are 5 times.
When the RO that DRM Agent extracts comprised insidetimed-count and timed-count and timer simultaneously, control flow comprised the steps: as shown in Figure 4
S201, DRM Agent receive user's operational order and extract the corresponding RO object that uses content, comprise three parameters of insidetimed-count, timed-count and timer in the RO object simultaneously;
S202, prompting user select to use all still short time use content, if the user selects the former, then continue step S203; Otherwise go to step S206;
S203, judge whether timed-count equals 0, if execution in step S210 refusing user's operational order and finishing then, otherwise continue step S204;
S204, carry out user instruction and timed-count is subtracted 1;
S205, permission continue to use, and finish when receiving user's halt instruction or stop automatically when the concluding time reaches;
If S206 user selects the short time to use, judge then whether insidetimed-count equals 0, if then execution in step S209 refusing user's operational order and end; Otherwise continue step S207;
S207, carry out user instruction and insidetimed-count is subtracted 1;
S208, monitor user ' are used duration, judge and use duration whether to equal timer, and when equaling timer, execution in step S209 stops the user being used the continuation of content.
Embodiment two discloses a kind of according to the time limit of carrying among the RO, set access times threshold value in the time limit, and the access times threshold value of overstepping the time limit, to the method for setting the short time preview number of times in the time limit and controlling respectively above the access times of setting the time limit, at first, set two kinds of control models and carry out according to user's model selection instruction is concrete, first kind of pattern is to use full content, control according to surpassing the access times of setting the time limit, another kind of pattern is for using pattern in short-term in the setting time limit, utilize the access times threshold value and set time limit control short time preview number of times, this method not only can be controlled short time preview number of times, and select the use pattern by the user, convenient for users.
Embodiment three
Because the control method that different RI select to use may be different, the limiting parameter group of then carrying among the RO also can be different, the foregoing description one and embodiment two can be used, after DRM Agent extracts corresponding RO, judge the parameter group type that comprises among the RO earlier, if comprise three parameters of count, timed-count and timer among the RO, the control flow of embodiment one is controlled; Implement two control flow and control if comprise three parameters of Insidetimed-count, timed-count and timer among the RO then start.Concrete control method repeats no more as previously mentioned here.
Embodiment three disclosed methods combine embodiment one and embodiment two, by DRM Agent after extracting corresponding RO, judge the parameter group of carrying among the RO earlier, when if parameter group is to use the access times threshold value of total degree threshold value, time limit and overstepping the time limit, then use first method to control; When if parameter group is the access times threshold value of interior access times threshold value of time limit, setting time limit and overstepping the time limit,, then use second method to control, made things convenient for RI to select to use according to difference control purpose.
Obviously, those skilled in the art can carry out various changes and modification to the present invention and not break away from the spirit and scope of the present invention.Like this, if of the present invention these are revised and modification belongs within the scope of claim of the present invention and equivalent technologies thereof, then the present invention also is intended to comprise these changes and modification interior.

Claims (9)

1, a kind of digital information controlling method is applied to it is characterized in that described control method comprises the steps: among the copyright management proxy module DRMAgent on the terminal device
A1, reception numerical information are used instruction and are extracted the permission object RO of this numerical information, and described RO comprises second threshold value of the access times of prescribing a time limit when the first threshold of total degree, time limit, restriction are used in restriction above this, and described first threshold is greater than second threshold value;
A2, judge whether first threshold equals 0, if then refusal is carried out described use instruction; Otherwise first threshold is subtracted 1, and carry out described use instruction permission and use described numerical information;
Duration is used in a3, monitoring, and judges in limited time whether second threshold value equals 0 when using duration to equal, if then stop this use; Otherwise second threshold value is subtracted 1 also allow to continue to use described numerical information.
2, the method for claim 1 is characterized in that, the described time limit and second threshold value are many groups, and controls respectively by circulation step a3.
3, method as claimed in claim 2 is characterized in that, among the described step a3, receives and stops using instruction or used the back to finish fully in numerical information.
4, a kind of numerical information rights of using control method is applied to it is characterized in that described control method comprises the steps: among the copyright management proxy module DRM Agent on the terminal device
B1, reception numerical information are used instruction and are extracted the permission object RO of this numerical information, described RO comprises the time limit, second threshold value of the access times of prescribing a time limit when restriction surpasses this and limit the 3rd threshold value of access times in this time limit, and the model selection instruction is used in the prompting input;
B2, receive to use the model selection instruction, when selecting to surpass execution in step b3 when using of described time limit; When being chosen in this time limit execution in step b4 when using;
B3, judge whether second threshold value equals 0, if then refusal is carried out described use instruction; Otherwise second threshold value is subtracted 1, and carry out described use instruction permission and use described numerical information;
B4, judge whether the 3rd threshold value equals 0, if then refusal is carried out described use instruction; Otherwise the 3rd threshold value is subtracted 1, and carry out described use instruction permission and use described numerical information;
Duration is used in b5, monitoring, and stops this use in limited time when using duration to equal described.
5, a kind of numerical information rights of using control method is applied to it is characterized in that described control method comprises the steps: among the copyright management proxy module DRM Agent on the terminal device
C1, reception numerical information are used instruction and are extracted the permission object RO of this numerical information;
The parameter group that comprises among c2, the described RO of identification, execution in step c3 when described parameter group comprises second threshold value of first threshold, the time limit of restriction use total degree, the access times of prescribing a time limit when restriction surpasses this, described first threshold is greater than second threshold value; When described parameter group comprises the time limit, second threshold value of the access times of prescribing a time limit when restriction surpasses this and should be in the time limit execution in step c5 during the 3rd threshold value of access times;
C3, judge whether first threshold equals 0, if then refusal is carried out described use instruction; Otherwise first threshold is subtracted 1, and carry out described use instruction permission and use described numerical information;
Duration is used in c4, monitoring, and judges in limited time whether second threshold value equals 0 when using duration to equal, if then stop this use; Also allow to continue to use described numerical information otherwise second threshold value is subtracted 1, and prompting input is used the model selection instruction;
C5, receive to use the model selection instruction, when selecting to surpass execution in step c6 when using of described time limit; When being chosen in this time limit execution in step c7 when using;
C6, judge whether second threshold value equals 0, if then refusal is carried out described use instruction; Otherwise second threshold value is subtracted 1, and carry out described use instruction permission and use described numerical information;
C7, judge whether the 3rd threshold value equals 0, if then refusal is carried out described use instruction; Otherwise the 3rd threshold value is subtracted 1, and carry out described use instruction permission and use described numerical information;
Duration is used in c8, monitoring, and stops this use in limited time when using duration to equal described.
6, method as claimed in claim 5 is characterized in that, the described time limit and second threshold value are many groups, and controls respectively by circulation step c4.
7, method as claimed in claim 5 is characterized in that, among the described step c4, receives and stops using instruction or used the back to finish fully in numerical information.
8, a kind of terminal comprises copyright management proxy module DRM Agent, it is characterized in that described copyright management proxy module comprises:
Carry and receive the submodule that numerical information is used instruction and extracted the permission object RO of this numerical information, described RO comprises that the first threshold of total degree, time limit are used in restriction, second threshold value of the access times of prescribing a time limit when restriction surpasses this, and described first threshold is greater than second threshold value;
Judge whether first threshold equals 0,, otherwise first threshold is subtracted 1, and carry out the submodule that described use instruction allows to use described numerical information if then refusal is carried out described use instruction;
Monitoring use duration, and when using duration to equal the second threshold value correspondence, prescribe a time limit, then this threshold value is subtracted 1 and also allow continuation to use the submodule of described numerical information.
9, a kind of terminal comprises copyright management proxy module DRM Agent, it is characterized in that described copyright management proxy module comprises:
Receive the submodule that numerical information is used instruction and extracted this numerical information permission object RO, described RO comprises the time limit, second threshold value of the access times of prescribing a time limit when restriction surpasses this and limit the 3rd threshold value of access times in this time limit;
The submodule of model selection instruction is used in the prompting input;
Receive the submodule that uses the model selection instruction; Judging whether second threshold value equals 0 when select surpassing the described time limit when using,, otherwise second threshold value being subtracted 1, and carry out described use instruction and allow to use described numerical information if then refusal is carried out described use instruction; When being chosen in when using in this time limit to judge whether the 3rd threshold value equals 0, if then refusal is carried out described use instruction; Otherwise the 3rd threshold value is subtracted 1, and carry out described use instruction permission and use described numerical information;
Be used to judge whether second threshold value equals 0, if then refusal is carried out described use instruction; Otherwise second threshold value is subtracted 1, and carry out the submodule that described use instruction allows to use described numerical information;
Be used to judge whether the 3rd threshold value equals 0, if then refusal is carried out described use instruction; Otherwise the 3rd threshold value is subtracted 1, and carry out the submodule that described use instruction allows to use described numerical information;
Duration is used in monitoring, and stops the submodule of this use when using duration to equal described in limited time.
CNB2005100871215A 2005-07-26 2005-07-26 Digital information controlling method Expired - Fee Related CN100349088C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005100871215A CN100349088C (en) 2005-07-26 2005-07-26 Digital information controlling method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005100871215A CN100349088C (en) 2005-07-26 2005-07-26 Digital information controlling method

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN2007101677315A Division CN101183931B (en) 2005-07-26 2005-07-26 Numerical information control method

Publications (2)

Publication Number Publication Date
CN1904792A CN1904792A (en) 2007-01-31
CN100349088C true CN100349088C (en) 2007-11-14

Family

ID=37674065

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005100871215A Expired - Fee Related CN100349088C (en) 2005-07-26 2005-07-26 Digital information controlling method

Country Status (1)

Country Link
CN (1) CN100349088C (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101183931B (en) * 2005-07-26 2012-01-11 华为技术有限公司 Numerical information control method

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102130954A (en) * 2011-03-17 2011-07-20 华为技术有限公司 Method and device for transmitting data resources

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0715244A1 (en) * 1994-11-23 1996-06-05 Xerox Corporation System for controlling the distribution and use of digital works utilizing a usage rights grammar
CN1152841A (en) * 1995-12-18 1997-06-25 联华电子股份有限公司 Software protection method capable of making authorization automatic invalidation
US6236971B1 (en) * 1994-11-23 2001-05-22 Contentguard Holdings, Inc. System for controlling the distribution and use of digital works using digital tickets
JP2002116836A (en) * 2000-10-11 2002-04-19 Soft Support:Kk Storage medium recorded with application program whose trial use period is limited
GB2403382A (en) * 2003-06-23 2004-12-29 Vodafone Plc Digital Rights Management (DRM) system providing licences to use encrypted content only after a predetermined time
CN1561475A (en) * 2001-10-02 2005-01-05 皇家飞利浦电子股份有限公司 New business model for downloadable video games

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0715244A1 (en) * 1994-11-23 1996-06-05 Xerox Corporation System for controlling the distribution and use of digital works utilizing a usage rights grammar
US6236971B1 (en) * 1994-11-23 2001-05-22 Contentguard Holdings, Inc. System for controlling the distribution and use of digital works using digital tickets
CN1152841A (en) * 1995-12-18 1997-06-25 联华电子股份有限公司 Software protection method capable of making authorization automatic invalidation
JP2002116836A (en) * 2000-10-11 2002-04-19 Soft Support:Kk Storage medium recorded with application program whose trial use period is limited
CN1561475A (en) * 2001-10-02 2005-01-05 皇家飞利浦电子股份有限公司 New business model for downloadable video games
GB2403382A (en) * 2003-06-23 2004-12-29 Vodafone Plc Digital Rights Management (DRM) system providing licences to use encrypted content only after a predetermined time

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101183931B (en) * 2005-07-26 2012-01-11 华为技术有限公司 Numerical information control method

Also Published As

Publication number Publication date
CN1904792A (en) 2007-01-31

Similar Documents

Publication Publication Date Title
EP0597599A2 (en) Method for establishing licensor changeable limits on software usage
EP1479187B1 (en) Controlling access levels in phones by certificates
US8544105B2 (en) Method and apparatus for managing policies for time-based licenses on mobile devices
CN1333314C (en) Software execution control system and software execution control program
US5754646A (en) Method for protecting publicly distributed software
EP1659530A1 (en) Method for pay-as-you-go computer and dynamic differential pricing
RU2496144C2 (en) System and method for control over access to people conveyance carrier control system
US8271390B2 (en) Digital rights management (DRM) license manager
CN102855446A (en) Resource management system and corresponding method
WO2005111910A1 (en) System, device, method and computer code product for partially sharing digital media
CN101449274A (en) Electronic device, content reproduction control method, program, storage medium, and integrated circuit
CN102446256A (en) Terminal and application program management method
CN102483786B (en) For recovering the method and system of territory management
CN1076556C (en) Method of activating and executing the protected function in a communication system
CN101291221B (en) Privacy protecting method for identity of customer, and communication system, device
CN1647484B (en) Protocol for entering, disabling and/or erasing scrambled data access rights and the corresponding access control module
CN100349088C (en) Digital information controlling method
CN101686129A (en) Novel method for strong safety service and user resource management
CN101183931B (en) Numerical information control method
CN101241531A (en) Method for controlling software authorized usage time
CN106971097A (en) Software license method
KR100974470B1 (en) System and method for managing arcade game management using smartcard
RU2573258C2 (en) Licence management apparatus and licence management method
CN101194265B (en) Method for controlling a consumption limit date of digital contents
CN101163008B (en) Anti-hacking and anti-number stolen system of online game

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20071114

Termination date: 20170726