CN106603230A - DRM secret key preserving and reading method and preserving and reading system - Google Patents
DRM secret key preserving and reading method and preserving and reading system Download PDFInfo
- Publication number
- CN106603230A CN106603230A CN201611264007.XA CN201611264007A CN106603230A CN 106603230 A CN106603230 A CN 106603230A CN 201611264007 A CN201611264007 A CN 201611264007A CN 106603230 A CN106603230 A CN 106603230A
- Authority
- CN
- China
- Prior art keywords
- drm key
- key
- drm
- reading
- verification code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/603—Digital right managament [DRM]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the invention provides a DRM secret key preserving and reading method and a preserving and reading system; the DRM secret key preserving comprises the following steps: storing a protected DRM secret key into a distributed dynamic storage zone, and preserving the DRM secret key dynamic storage address and data length information; forming a reading authority identifying code and storing same according to the stored protected DRM secret key; encrypting the DRM secret key dynamic storage zone according to the reading authority identifying code, and forming a corresponding decryption secret key and storing same. The method and system use the reading authority identifying code to verify IDs reading the DRM secret key, can encrypt the DRM secret key dynamic storage zone, and can employ dynamic addresses and monitor invalid debugs, thus increasing DRM secret key reading difficulty, effectively preventing generation of invalid DRM secret key stealing, and further protecting interests of the video copyright owner.
Description
Technical field
The present invention relates to DRM key resist technology field, more particularly to a kind of DRM key store method, a kind of DRM are close
Key read method, a kind of DRM key preserve system and a kind of DRM key reads system.
Background technology
In video copyright protecting, generally using DRM (Digital Rights Management, digital copyright management)
Key is encrypted to video, for preventing unauthorized user from illegally obtaining video file.When video is played, DRM key is needed
Reusability is wanted, so be generally held in internal memory preserve, it is convenient to read.But in the prior art, DRM key holds in internal memory
Easily by other people unauthorized thefts, and then video copy is invaded, damaged the interests of video copyright owners.
The content of the invention
Embodiment of the present invention technical problem to be solved is to provide a kind of DRM key store method and a kind of DRM key
Read method, with DRM key in the video-encryption process for solving the problems, such as prior art easily by other people unauthorized thefts.
Accordingly, the embodiment of the present invention additionally provides a kind of DRM key and preserves system and a kind of DRM key reading system,
To the realization and application that ensure said method.
In order to solve the above problems, the invention discloses a kind of DRM key store method, including:
The DRM key for being intended to protect is stored in the dynamic area of distribution, and preserves the dynamic memory ground of the DRM key
Location and data length information;
Based on the DRM key to be protected being stored in, generate and read Authority Verification code and preserved;
Based on the reading Authority Verification code, the dynamic area of the DRM key is encrypted, and is generated corresponding
Decruption key is simultaneously preserved.
Preferably, methods described also includes:
The dynamic memory address of the DRM key, the data length information of the DRM key, the reading authority are tested
Card code and the decruption key are preserved into metamessage data set.
Preferably, methods described also includes:
If the DRM key reads successfully, distribute new dynamic area for the DRM key, again by the DRM
Key is stored in the new dynamic area.
Preferably, methods described also includes:
Detect that the dynamic area of the DRM key, whether in debugging mode, if so, then terminates the DRM key
Preservation process.
The embodiment of the present invention also disclosed a kind of DRM key read method, including:
The reading Authority Verification code of reception is matched with default reading Authority Verification code;
If the match is successful, dynamic memory address, the data length information of DRM key and the decryption of DRM key is read
Key;
It is close based on the dynamic memory address of the DRM key of the reading, the data length information of DRM key and decryption
Key, is decrypted to the dynamic area of the DRM key, obtains the DRM key.
Preferably, it is described by the step that Authority Verification code is matched with default reading Authority Verification code that reads for receiving
Suddenly, including:
Based on the storage address of metamessage data set, the described default reading stored in the metamessage data set is obtained
Authority Verification code;The Authority Verification code that reads of the storage is used to be matched with the reading Authority Verification code of the reception;
The metamessage data set includes:The dynamic memory address of the DRM key, the data of the DRM key are long
Degree information, the reading Authority Verification code and the decruption key.
Preferably, a kind of DRM key read method also includes:
Detect that the dynamic area of the DRM key, whether in debugging mode, if so, then terminates the DRM key
Reading process.
The embodiment of the present invention also disclosed a kind of DRM key and preserve system, including:
DRM key preserving module, is stored in the dynamic area of distribution for being intended to the DRM key protected, and preserves institute
State dynamic memory address and the data length information of DRM key;
Authority Verification code generation module is read, for based on the DRM key to be protected being stored in, generating and reading authority
Identifying code is simultaneously preserved;
Memory block encrypting module, for based on the reading Authority Verification code, entering to the dynamic area of the DRM key
Row encryption, and generate corresponding decruption key and preserved.
Preferably, the DRM key preserving module includes:
DRM key dynamical save unit, if reading successfully for the DRM key, distributes new for the DRM key
Dynamic area, is again stored in the DRM key in the new dynamic area.
The embodiment of the present invention also disclosed a kind of DRM key and read system, including:
An identifying code matching module, for the reading Authority Verification code of reception and default reading Authority Verification code to be carried out
Match somebody with somebody;
Storage address read module, if for the match is successful, reading the dynamic memory address of DRM key, DRM key
Data length information and decruption key;
Memory block deciphering module, for the data based on the dynamic memory address of the DRM key of the reading, DRM key
Length information and decruption key, are decrypted to the dynamic area of the DRM key, obtain the DRM key
Compared with prior art, the embodiment of the present invention includes advantages below:
The embodiment of the present invention reads Authority Verification code by arranging, and the identity of DRM key to be read is verified, and right
The dynamic area of DRM key is encrypted, and applies dynamic address and the monitoring to illegal debugging, increases reading
DRM key difficulty is taken, so as to effectively prevent the generation of unauthorized theft key behavior, and then the profit of video copyright owners is protected
Benefit.
Description of the drawings
The step of Fig. 1 is a kind of DRM key store method embodiment one of present invention flow chart;
The step of Fig. 2 is a kind of DRM key store method embodiment two of present invention flow chart;
The step of Fig. 3 is a kind of DRM key read method embodiment one of present invention flow chart;
The step of Fig. 4 is a kind of DRM key read method embodiment two of present invention flow chart;
Fig. 5 is the structured flowchart that a kind of DRM key of the present invention preserves system embodiment;
Fig. 6 is the structured flowchart that a kind of DRM key of the present invention reads system embodiment.
Specific embodiment
It is understandable to enable the above objects, features and advantages of the present invention to become apparent from, it is below in conjunction with the accompanying drawings and concrete real
The present invention is further detailed explanation to apply mode.
One of the core concepts of the embodiments of the present invention is, when DRM key is preserved, generating reading Authority Verification code is used for
The checking of identity during reading, and the dynamic area to DRM key is encrypted;DRM key has been read every time, can be close for DRM
Key redistributes storage address, enhances the security performance of DRM key.
With reference to Fig. 1, flow chart the step of show a kind of DRM key store method embodiment one of the present invention specifically may be used
To comprise the steps:
Step 101, the DRM key for being intended to protect is stored in the dynamic area of distribution, and preserves the dynamic of the DRM key
State storage address and data length information;
Step 102, based on the DRM key to be protected being stored in, generates and reads Authority Verification code and preserved;
Step 103, based on the reading Authority Verification code, is encrypted to the dynamic area of the DRM key, and raw
Into corresponding decruption key and preserved.
With reference to Fig. 2, flow chart the step of show a kind of DRM key store method embodiment two of the present invention specifically may be used
To comprise the steps:
Whether step 201, the dynamic area for detecting the DRM key is in debugging mode, if so, then terminates described
The preservation process of DRM key.
Manager or unauthorized person come trace analysises or can change being saved into for DRM key in the way of using program debugging
Journey.If other managers are debugging the preservation process of the DRM key.Then stop, it is ensured that the preservation process of DRM key
It is normally carried out.Unauthorized person may pass through the preservation process of the trace analysises DRM key, steal DRM key.So by exchanging
The detection of examination state, can prevent DRM key to be stolen.
Step 202, the DRM key for being intended to protect is stored in the dynamic area of distribution, and preserves the dynamic of the DRM key
State storage address and data length information.
The dynamic memory address of the DRM key and data length information, for reading during DRM key, can quickly from interior
DRM key is found in depositing.
In implementing, specifically can include before the step 202:
Sub-step 11, is one piece of dynamic area of DRM key data distribution according to the size of DRM key data;
Sub-step 12, the priority assignation for being intended to be stored in the dynamic area of DRM key is writeable unreadable.
In a kind of preferred exemplary of the embodiment of the present invention, the step 202 can include:
If the DRM key reads successfully, distribute new dynamic area for the DRM key, again by the DRM
Key is stored in the new dynamic area.
In implementing, whenever DRM key is read successfully, DRM key is stored in into new storage address.Update every time
After storage address, the data on original memory block are discharged, and old storage address is override using new storage address.It is this
Dynamic memory mode can effective protection DRM key be not stolen.
Step 203, based on the DRM key to be protected being stored in, generates and reads Authority Verification code and preserved.
After being stored in DRM key, system generate at random a string it is digital, using the number as read Authority Verification code, for reading
Take authentication during DRM key.
Step 204, based on the reading Authority Verification code, is encrypted to the dynamic area of the DRM key, and raw
Into corresponding decruption key and preserved.
In a kind of preferred exemplary of the embodiment of the present invention, by dynamic memory of the stream encryption algorithm to DRM key
Area is encrypted.
The decruption key, for reading during DRM key, the dynamic area of the DRM key to encrypting is decrypted, so as to
Obtain DRM key.
In implementing, also include after the step 204:
Sub-step 21, is use state by the status indication of the dynamic area of DRM key.
Because internal memory can periodically reclaim untapped region of memory, need the shape of the dynamic area of DRM key
State is labeled as use state, and the dynamic area for preventing the DRM key is recovered.
Sub-step 22, is unreadable not writeable by the priority assignation of the dynamic area of DRM key.
In embodiments of the present invention, the dynamic memory address of above-mentioned DRM key, the data length information of DRM key, reading
The status information of weighting limit identifying code, decruption key and DRM key dynamic area is the metamessage of DRM key.The DRM is close
The metamessage of key can be preserved into metamessage data set.Metamessage data set can be unified to the metamessage of DRM key
Management, it is also possible to the metamessage of easy-to-look-up each DRM key.
Multiple DRM keys, metamessage one metamessage data set of correspondence of each DRM key can be preserved in internal memory.And
The storage address of the corresponding metamessage data set of each DRM key is preserved, for reading DRM key.
In embodiments of the present invention, if DRM key reads successfully, again after DRM key described in dynamic memory, to authority
Identifying code is updated, and the dynamic area of the DRM key is encrypted again.
With reference to Fig. 3, flow chart the step of show a kind of DRM key read method embodiment one of the present invention specifically may be used
To comprise the steps:
Step 301, the reading Authority Verification code of reception is matched with default reading Authority Verification code;
Step 302, if the match is successful, reads dynamic memory address, the data length information of DRM key of DRM key
And decruption key;
Step 303, based on the dynamic memory address of the DRM key of the reading, the data length information of DRM key and
Decruption key, is decrypted to the dynamic area of the DRM key, obtains the DRM key.
With reference to Fig. 4, flow chart the step of show a kind of DRM key read method embodiment two of the present invention specifically may be used
To comprise the steps:
Whether step 401, the dynamic area for detecting the DRM key is in debugging mode, if so, then terminates described
The reading process of DRM key.
Step 402, the reading Authority Verification code of reception is matched with default reading Authority Verification code.
In embodiments of the present invention, after the reading Authority Verification code for sending over when DRM key to be read is received, can
With the storage address based on metamessage data set, the reading Authority Verification code stored in metamessage data set is obtained.By what is received
Read Authority Verification code to be matched with the reading Authority Verification code of storage.
Step 403, if the match is successful, reads dynamic memory address, the data length information of DRM key of DRM key
And decruption key.
In embodiments of the present invention, if the match is successful, the dynamic memory ground of DRM key is read from metamessage data set
Location, the data length information of DRM key and decruption key.
Step 404, based on the dynamic memory address of the DRM key of the reading, the data length information of DRM key and
Decruption key, is decrypted to the DRM key, obtains the DRM key.
Specifically, step 404 can include:
Sub-step 31, the dynamic memory address and data length information based on the DRM key for reading, finds from internal memory
Corresponding DRM key;
Sub-step 32, is readable not writeable by the priority assignation of the dynamic area of DRM key;
Sub-step 33, is decrypted based on decruption key to the dynamic area of DRM key, reads DRM key.
In sum, the embodiment of the present invention reads Authority Verification code by arranging, and the identity of DRM key to be read is carried out
Verify, and the dynamic area to DRM key is encrypted, and apply dynamic address and the prison to illegal debugging
Control, increases reading DRM key difficulty, so as to effectively prevent the generation of unauthorized theft key behavior, and then protects video version
Weigh possessory interests.
It should be noted that for embodiment of the method, in order to be briefly described, therefore it to be all expressed as a series of action group
Close, but those skilled in the art should know, and the embodiment of the present invention is not limited by described sequence of movement, because according to
According to the embodiment of the present invention, some steps can adopt other orders or while carry out.Secondly, those skilled in the art also should
Know, embodiment described in this description belongs to preferred embodiment, the involved action not necessarily present invention is implemented
Example is necessary.
With reference to Fig. 5, show that a kind of DRM key of the invention preserves the structured flowchart of system embodiment, specifically can include:
First debugging mode detection module 501, for detecting the dynamic area of the DRM key whether in debugging shape
State, if so, then terminates the preservation process of the DRM key.
DRM key preserving module 502, is stored in the dynamic area of distribution for being intended to the DRM key protected, and preserves
The dynamic memory address of the DRM key and data length information.
In a kind of preferred exemplary of the embodiment of the present invention, the DRM key preserving module 502 can include:
Memory Allocation unit, for according to the size of DRM key data, being one piece of dynamic memory of DRM key data distribution
Area;
First priority assignation unit, for be intended to be stored in the priority assignation of the dynamic area of DRM key for it is writeable can not
Read.
DRM key dynamical save unit, if reading successfully for the DRM key, distributes new for the DRM key
Dynamic area, is again stored in the DRM key in the new dynamic area.
Authority Verification code generation module 503 is read, for based on the DRM key to be protected being stored in, generating and reading
Authority Verification code is simultaneously preserved;
Memory block encrypting module 504, for based on the reading Authority Verification code, the dynamic memory to the DRM key
Area is encrypted, and generates corresponding decruption key and preserved.
In a kind of preferred exemplary of the embodiment of the present invention, the memory block encrypting module 504 can include:
Dry state symbol unit, for by the status indication of the dynamic area of DRM key be use state;
Second priority assignation unit, for by the priority assignation of the dynamic area of DRM key for unreadable not writeable.
With reference to Fig. 6, show that a kind of DRM key of the invention reads the structured flowchart of system embodiment, specifically can include:
Second debugging mode detection module 601, for detecting the dynamic area of the DRM key whether in debugging shape
State, if so, then terminates the reading process of the DRM key.
Identifying code matching module 602, for the reading Authority Verification code of reception to be entered with default reading Authority Verification code
Row matching;
Storage address read module 603, if for the match is successful, the dynamic memory address of the DRM key for reading, DRM
The data length information and decruption key of key;
Memory block deciphering module 604, for the number based on the dynamic memory address of the DRM key of the reading, DRM key
According to length information and decruption key, the dynamic area of the DRM key is decrypted, obtains the DRM key.
In a kind of preferred exemplary of the embodiment of the present invention, the memory block deciphering module 604 can include:
Searching unit, for the dynamic memory address based on the DRM key for reading and data length information, looks into from internal memory
Find corresponding DRM key;
3rd priority assignation unit, is readable not writeable by the priority assignation of the dynamic area of DRM key;
Decryption unit, is decrypted based on decruption key to the dynamic area of DRM key, reads DRM key.
For device embodiment, due to itself and embodiment of the method basic simlarity, so description is fairly simple, it is related
Part is illustrated referring to the part of embodiment of the method.
It is close to a kind of DRM key store method provided by the present invention, a kind of DRM key read method, a kind of DRM above
Key preserves system and a kind of DRM key and reads system, is described in detail, and specific case used herein is to the present invention's
Principle and embodiment are set forth, and the explanation of above example is only intended to help and understands the method for the present invention and its core
Thought;Simultaneously for one of ordinary skill in the art, according to the thought of the present invention, in specific embodiment and range of application
On will change, in sum, this specification content should not be construed as limiting the invention.
Each embodiment in this specification is described by the way of progressive, what each embodiment was stressed be with
The difference of other embodiment, between each embodiment identical similar part mutually referring to.
Those skilled in the art are it should be appreciated that the embodiment of the embodiment of the present invention can be provided as method, device or calculate
Machine program product.Therefore, the embodiment of the present invention can using complete hardware embodiment, complete software embodiment or with reference to software and
The form of the embodiment of hardware aspect.And, the embodiment of the present invention can using wherein include computer at one or more can
With in the computer-usable storage medium (including but not limited to disk memory, CD-ROM, optical memory etc.) of program code
The form of the computer program of enforcement.
The embodiment of the present invention is with reference to method according to embodiments of the present invention, terminal unit (system) and computer program
The flow chart and/or block diagram of product is describing.It should be understood that can be by computer program instructions flowchart and/or block diagram
In each flow process and/or square frame and flow chart and/or the flow process in block diagram and/or square frame combination.These can be provided
Computer program instructions to general purpose computer, special-purpose computer, Embedded Processor or other programmable data processing terminals set
Standby processor is producing a machine so that held by the processor of computer or other programmable data processing terminal equipments
Capable instruction is produced for realizing in one flow process of flow chart or one square frame of multiple flow processs and/or block diagram or multiple square frames
The device of the function of specifying.
These computer program instructions may be alternatively stored in can guide computer or other programmable data processing terminal equipments
In the computer-readable memory for working in a specific way so that the instruction being stored in the computer-readable memory produces bag
The manufacture of command device is included, the command device is realized in one side of one flow process of flow chart or multiple flow processs and/or block diagram
The function of specifying in frame or multiple square frames.
These computer program instructions also can be loaded in computer or other programmable data processing terminal equipments so that
On computer or other programmable terminal equipments perform series of operation steps to produce computer implemented process, so as to
The instruction performed on computer or other programmable terminal equipments is provided for realizing in one flow process of flow chart or multiple flow processs
And/or specify in one square frame of block diagram or multiple square frames function the step of.
Although having been described for the preferred embodiment of the embodiment of the present invention, those skilled in the art once know base
This creative concept, then can make other change and modification to these embodiments.So, claims are intended to be construed to
Including preferred embodiment and fall into having altered and changing for range of embodiment of the invention.
Finally, in addition it is also necessary to explanation, herein, such as first and second or the like relational terms be used merely to by
One entity or operation make a distinction with another entity or operation, and not necessarily require or imply these entities or operation
Between there is any this actual relation or order.And, term " including ", "comprising" or its any other variant meaning
Covering including for nonexcludability, so that a series of process, method, article or terminal unit including key elements is not only wrapped
Those key elements are included, but also including other key elements being not expressly set out, or also include for this process, method, article
Or the key element that terminal unit is intrinsic.In the absence of more restrictions, by wanting that sentence "including a ..." is limited
Element, it is not excluded that also there is other identical element in the process including the key element, method, article or terminal unit.
Claims (10)
1. a kind of DRM key store method, it is characterised in that include:
Be intended to protect DRM key be stored in the dynamic area of distribution, and preserve the DRM key dynamic memory address and
Data length information;
Based on the DRM key to be protected being stored in, generate and read Authority Verification code and preserved;
Based on the reading Authority Verification code, the dynamic area of the DRM key is encrypted, and generates corresponding decryption
Key is simultaneously preserved.
2. method according to claim 1, it is characterised in that also include:
By the dynamic memory address of the DRM key, the data length information of the DRM key, the reading Authority Verification code
And the decruption key is preserved into metamessage data set.
3. method according to claim 1, it is characterised in that also include:
If the DRM key reads successfully, distribute new dynamic area for the DRM key, again by the DRM key
In being stored in the new dynamic area.
4. method according to claim 1, it is characterised in that also include:
Detect that the dynamic area of the DRM key, whether in debugging mode, if so, then terminates the preservation of the DRM key
Process.
5. a kind of DRM key read method, it is characterised in that include:
The reading Authority Verification code of reception is matched with default reading Authority Verification code;
If the match is successful, dynamic memory address, the data length information of DRM key and the decruption key of DRM key is read;
It is right based on the dynamic memory address of the DRM key of the reading, the data length information of DRM key and decruption key
The dynamic area of the DRM key is decrypted, and obtains the DRM key.
6. method according to claim 5, it is characterised in that described by the reading Authority Verification code for receiving and default reading
The step of weighting limit identifying code is matched, including:
Based on the storage address of metamessage data set, the described default reading authority stored in the metamessage data set is obtained
Identifying code;The Authority Verification code that reads of the storage is used to be matched with the reading Authority Verification code of the reception;
The metamessage data set includes:The dynamic memory address of the DRM key, the data length letter of the DRM key
Breath, the reading Authority Verification code and the decruption key.
7. method according to claim 5, it is characterised in that also include:
Detect that the dynamic area of the DRM key, whether in debugging mode, if so, then terminates the reading of the DRM key
Process.
8. a kind of DRM key preserves system, it is characterised in that include:
DRM key preserving module, is stored in the dynamic area of distribution for being intended to the DRM key protected, and preserves the DRM
The dynamic memory address of key and data length information;
Authority Verification code generation module is read, for based on the DRM key to be protected being stored in, generating and reading Authority Verification
Code is simultaneously preserved;
Memory block encrypting module, for based on the reading Authority Verification code, carrying out adding to the dynamic area of the DRM key
It is close, and generate corresponding decruption key and preserved.
9. system according to claim 8, it is characterised in that the DRM key preserving module includes:
DRM key dynamical save unit, if reading successfully for the DRM key, for the DRM key new dynamic is distributed
Memory block, is again stored in the DRM key in the new dynamic area.
10. a kind of DRM key reads system, it is characterised in that include:
Identifying code matching module, for the reading Authority Verification code of reception to be matched with default reading Authority Verification code;
Storage address read module, if for the match is successful, reading dynamic memory address, the data of DRM key of DRM key
Length information and decruption key;
Memory block deciphering module, for the data length based on the dynamic memory address of the DRM key of the reading, DRM key
Information and decruption key, are decrypted to the dynamic area of the DRM key, obtain the DRM key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611264007.XA CN106603230B (en) | 2016-12-30 | 2016-12-30 | A kind of DRM key saves, read method and preservation, reads system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611264007.XA CN106603230B (en) | 2016-12-30 | 2016-12-30 | A kind of DRM key saves, read method and preservation, reads system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106603230A true CN106603230A (en) | 2017-04-26 |
CN106603230B CN106603230B (en) | 2019-09-27 |
Family
ID=58581650
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611264007.XA Active CN106603230B (en) | 2016-12-30 | 2016-12-30 | A kind of DRM key saves, read method and preservation, reads system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106603230B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019153432A1 (en) * | 2018-02-09 | 2019-08-15 | 网宿科技股份有限公司 | Method and terminal for playbacking video file |
CN110752929A (en) * | 2019-09-29 | 2020-02-04 | 华为终端有限公司 | Application program processing method and related product |
CN113724424A (en) * | 2021-10-28 | 2021-11-30 | 云丁网络技术(北京)有限公司 | Control method and device for equipment |
CN115209220A (en) * | 2022-06-08 | 2022-10-18 | 阿里巴巴(中国)有限公司 | Video file processing method and device, storage medium and electronic equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090077381A1 (en) * | 2002-03-14 | 2009-03-19 | Rajesh Kanungo | Systems and method for the transparent management of document rights |
CN103246850A (en) * | 2013-05-23 | 2013-08-14 | 福建伊时代信息科技股份有限公司 | Method and device for processing file |
CN103558994A (en) * | 2013-09-29 | 2014-02-05 | 记忆科技(深圳)有限公司 | Method for encrypting solid state disk partitions and solid state disk |
CN104010296A (en) * | 2014-06-19 | 2014-08-27 | 江苏威盾网络科技有限公司 | Mobile terminal network protection system and method based on SD card |
-
2016
- 2016-12-30 CN CN201611264007.XA patent/CN106603230B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090077381A1 (en) * | 2002-03-14 | 2009-03-19 | Rajesh Kanungo | Systems and method for the transparent management of document rights |
CN103246850A (en) * | 2013-05-23 | 2013-08-14 | 福建伊时代信息科技股份有限公司 | Method and device for processing file |
CN103558994A (en) * | 2013-09-29 | 2014-02-05 | 记忆科技(深圳)有限公司 | Method for encrypting solid state disk partitions and solid state disk |
CN104010296A (en) * | 2014-06-19 | 2014-08-27 | 江苏威盾网络科技有限公司 | Mobile terminal network protection system and method based on SD card |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019153432A1 (en) * | 2018-02-09 | 2019-08-15 | 网宿科技股份有限公司 | Method and terminal for playbacking video file |
CN110752929A (en) * | 2019-09-29 | 2020-02-04 | 华为终端有限公司 | Application program processing method and related product |
CN110752929B (en) * | 2019-09-29 | 2022-04-22 | 华为终端有限公司 | Application program processing method and related product |
CN113724424A (en) * | 2021-10-28 | 2021-11-30 | 云丁网络技术(北京)有限公司 | Control method and device for equipment |
CN115209220A (en) * | 2022-06-08 | 2022-10-18 | 阿里巴巴(中国)有限公司 | Video file processing method and device, storage medium and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN106603230B (en) | 2019-09-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112074836B (en) | Apparatus and method for protecting data through trusted execution environment | |
Dwoskin et al. | Hardware-rooted trust for secure key management and transient trust | |
US8769675B2 (en) | Clock roll forward detection | |
US9811478B2 (en) | Self-encrypting flash drive | |
US9240889B2 (en) | Method and system for secure data access among two devices | |
US9317708B2 (en) | Hardware trust anchors in SP-enabled processors | |
US20080297326A1 (en) | Low Cost RFID Tag Security And Privacy System And Method | |
CN106022154B (en) | Database encryption method and database server | |
US20120151219A1 (en) | Security usb storage medium generation and decryption method, and medium recorded with program for generating security usb storage medium | |
CN106603230A (en) | DRM secret key preserving and reading method and preserving and reading system | |
WO2017000648A1 (en) | Authentication method and apparatus for reinforced software | |
JP2000151583A (en) | Access capability authentication method, device, and method and device for generating certification auxiliary information | |
CN101802833A (en) | Providing local storage service to applications that run in an application execution environment | |
WO2006087784A1 (en) | Authentication method, authentication system, and tag device thereof, information reference client, authentication server, and information server | |
JP2006295872A (en) | Formation method of device-dependent key, confidential information lsi equipped with secret information function using the method, host equipment using the lsi, record medium with authentication function used for the host equipment, and mobile terminal with recording medium equipped with authentication function | |
US20120096280A1 (en) | Secured storage device with two-stage symmetric-key algorithm | |
CN105740725A (en) | File protection method and system | |
US20060253714A1 (en) | Information processor, tamper-proof method, and tamper-proof program | |
US20070239617A1 (en) | Method and apparatus for temporarily accessing content using temporary license | |
US20170046530A1 (en) | Distributed Cloud Storage System (DCSS) for secure, reliable storage and retrieval of data and computing objects | |
CN1774688A (en) | Method and system for managing digital rights | |
KR20060030164A (en) | A digital management system with shared key pool for video data protection | |
CN101692266A (en) | Method of intensively encrypting and protecting files by using hidden partition (HPA) and CPU ID | |
US20080104396A1 (en) | Authentication Method | |
CN108345804B (en) | Storage method and device in trusted computing environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |