CN106603230A - DRM secret key preserving and reading method and preserving and reading system - Google Patents

DRM secret key preserving and reading method and preserving and reading system Download PDF

Info

Publication number
CN106603230A
CN106603230A CN201611264007.XA CN201611264007A CN106603230A CN 106603230 A CN106603230 A CN 106603230A CN 201611264007 A CN201611264007 A CN 201611264007A CN 106603230 A CN106603230 A CN 106603230A
Authority
CN
China
Prior art keywords
drm key
key
drm
reading
verification code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611264007.XA
Other languages
Chinese (zh)
Other versions
CN106603230B (en
Inventor
陈钢
陈赫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing QIYI Century Science and Technology Co Ltd
Original Assignee
Beijing QIYI Century Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing QIYI Century Science and Technology Co Ltd filed Critical Beijing QIYI Century Science and Technology Co Ltd
Priority to CN201611264007.XA priority Critical patent/CN106603230B/en
Publication of CN106603230A publication Critical patent/CN106603230A/en
Application granted granted Critical
Publication of CN106603230B publication Critical patent/CN106603230B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/603Digital right managament [DRM]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention provides a DRM secret key preserving and reading method and a preserving and reading system; the DRM secret key preserving comprises the following steps: storing a protected DRM secret key into a distributed dynamic storage zone, and preserving the DRM secret key dynamic storage address and data length information; forming a reading authority identifying code and storing same according to the stored protected DRM secret key; encrypting the DRM secret key dynamic storage zone according to the reading authority identifying code, and forming a corresponding decryption secret key and storing same. The method and system use the reading authority identifying code to verify IDs reading the DRM secret key, can encrypt the DRM secret key dynamic storage zone, and can employ dynamic addresses and monitor invalid debugs, thus increasing DRM secret key reading difficulty, effectively preventing generation of invalid DRM secret key stealing, and further protecting interests of the video copyright owner.

Description

A kind of DRM key preservation, read method and preservation, reading system
Technical field
The present invention relates to DRM key resist technology field, more particularly to a kind of DRM key store method, a kind of DRM are close Key read method, a kind of DRM key preserve system and a kind of DRM key reads system.
Background technology
In video copyright protecting, generally using DRM (Digital Rights Management, digital copyright management) Key is encrypted to video, for preventing unauthorized user from illegally obtaining video file.When video is played, DRM key is needed Reusability is wanted, so be generally held in internal memory preserve, it is convenient to read.But in the prior art, DRM key holds in internal memory Easily by other people unauthorized thefts, and then video copy is invaded, damaged the interests of video copyright owners.
The content of the invention
Embodiment of the present invention technical problem to be solved is to provide a kind of DRM key store method and a kind of DRM key Read method, with DRM key in the video-encryption process for solving the problems, such as prior art easily by other people unauthorized thefts.
Accordingly, the embodiment of the present invention additionally provides a kind of DRM key and preserves system and a kind of DRM key reading system, To the realization and application that ensure said method.
In order to solve the above problems, the invention discloses a kind of DRM key store method, including:
The DRM key for being intended to protect is stored in the dynamic area of distribution, and preserves the dynamic memory ground of the DRM key Location and data length information;
Based on the DRM key to be protected being stored in, generate and read Authority Verification code and preserved;
Based on the reading Authority Verification code, the dynamic area of the DRM key is encrypted, and is generated corresponding Decruption key is simultaneously preserved.
Preferably, methods described also includes:
The dynamic memory address of the DRM key, the data length information of the DRM key, the reading authority are tested Card code and the decruption key are preserved into metamessage data set.
Preferably, methods described also includes:
If the DRM key reads successfully, distribute new dynamic area for the DRM key, again by the DRM Key is stored in the new dynamic area.
Preferably, methods described also includes:
Detect that the dynamic area of the DRM key, whether in debugging mode, if so, then terminates the DRM key Preservation process.
The embodiment of the present invention also disclosed a kind of DRM key read method, including:
The reading Authority Verification code of reception is matched with default reading Authority Verification code;
If the match is successful, dynamic memory address, the data length information of DRM key and the decryption of DRM key is read Key;
It is close based on the dynamic memory address of the DRM key of the reading, the data length information of DRM key and decryption Key, is decrypted to the dynamic area of the DRM key, obtains the DRM key.
Preferably, it is described by the step that Authority Verification code is matched with default reading Authority Verification code that reads for receiving Suddenly, including:
Based on the storage address of metamessage data set, the described default reading stored in the metamessage data set is obtained Authority Verification code;The Authority Verification code that reads of the storage is used to be matched with the reading Authority Verification code of the reception;
The metamessage data set includes:The dynamic memory address of the DRM key, the data of the DRM key are long Degree information, the reading Authority Verification code and the decruption key.
Preferably, a kind of DRM key read method also includes:
Detect that the dynamic area of the DRM key, whether in debugging mode, if so, then terminates the DRM key Reading process.
The embodiment of the present invention also disclosed a kind of DRM key and preserve system, including:
DRM key preserving module, is stored in the dynamic area of distribution for being intended to the DRM key protected, and preserves institute State dynamic memory address and the data length information of DRM key;
Authority Verification code generation module is read, for based on the DRM key to be protected being stored in, generating and reading authority Identifying code is simultaneously preserved;
Memory block encrypting module, for based on the reading Authority Verification code, entering to the dynamic area of the DRM key Row encryption, and generate corresponding decruption key and preserved.
Preferably, the DRM key preserving module includes:
DRM key dynamical save unit, if reading successfully for the DRM key, distributes new for the DRM key Dynamic area, is again stored in the DRM key in the new dynamic area.
The embodiment of the present invention also disclosed a kind of DRM key and read system, including:
An identifying code matching module, for the reading Authority Verification code of reception and default reading Authority Verification code to be carried out Match somebody with somebody;
Storage address read module, if for the match is successful, reading the dynamic memory address of DRM key, DRM key Data length information and decruption key;
Memory block deciphering module, for the data based on the dynamic memory address of the DRM key of the reading, DRM key Length information and decruption key, are decrypted to the dynamic area of the DRM key, obtain the DRM key
Compared with prior art, the embodiment of the present invention includes advantages below:
The embodiment of the present invention reads Authority Verification code by arranging, and the identity of DRM key to be read is verified, and right The dynamic area of DRM key is encrypted, and applies dynamic address and the monitoring to illegal debugging, increases reading DRM key difficulty is taken, so as to effectively prevent the generation of unauthorized theft key behavior, and then the profit of video copyright owners is protected Benefit.
Description of the drawings
The step of Fig. 1 is a kind of DRM key store method embodiment one of present invention flow chart;
The step of Fig. 2 is a kind of DRM key store method embodiment two of present invention flow chart;
The step of Fig. 3 is a kind of DRM key read method embodiment one of present invention flow chart;
The step of Fig. 4 is a kind of DRM key read method embodiment two of present invention flow chart;
Fig. 5 is the structured flowchart that a kind of DRM key of the present invention preserves system embodiment;
Fig. 6 is the structured flowchart that a kind of DRM key of the present invention reads system embodiment.
Specific embodiment
It is understandable to enable the above objects, features and advantages of the present invention to become apparent from, it is below in conjunction with the accompanying drawings and concrete real The present invention is further detailed explanation to apply mode.
One of the core concepts of the embodiments of the present invention is, when DRM key is preserved, generating reading Authority Verification code is used for The checking of identity during reading, and the dynamic area to DRM key is encrypted;DRM key has been read every time, can be close for DRM Key redistributes storage address, enhances the security performance of DRM key.
With reference to Fig. 1, flow chart the step of show a kind of DRM key store method embodiment one of the present invention specifically may be used To comprise the steps:
Step 101, the DRM key for being intended to protect is stored in the dynamic area of distribution, and preserves the dynamic of the DRM key State storage address and data length information;
Step 102, based on the DRM key to be protected being stored in, generates and reads Authority Verification code and preserved;
Step 103, based on the reading Authority Verification code, is encrypted to the dynamic area of the DRM key, and raw Into corresponding decruption key and preserved.
With reference to Fig. 2, flow chart the step of show a kind of DRM key store method embodiment two of the present invention specifically may be used To comprise the steps:
Whether step 201, the dynamic area for detecting the DRM key is in debugging mode, if so, then terminates described The preservation process of DRM key.
Manager or unauthorized person come trace analysises or can change being saved into for DRM key in the way of using program debugging Journey.If other managers are debugging the preservation process of the DRM key.Then stop, it is ensured that the preservation process of DRM key It is normally carried out.Unauthorized person may pass through the preservation process of the trace analysises DRM key, steal DRM key.So by exchanging The detection of examination state, can prevent DRM key to be stolen.
Step 202, the DRM key for being intended to protect is stored in the dynamic area of distribution, and preserves the dynamic of the DRM key State storage address and data length information.
The dynamic memory address of the DRM key and data length information, for reading during DRM key, can quickly from interior DRM key is found in depositing.
In implementing, specifically can include before the step 202:
Sub-step 11, is one piece of dynamic area of DRM key data distribution according to the size of DRM key data;
Sub-step 12, the priority assignation for being intended to be stored in the dynamic area of DRM key is writeable unreadable.
In a kind of preferred exemplary of the embodiment of the present invention, the step 202 can include:
If the DRM key reads successfully, distribute new dynamic area for the DRM key, again by the DRM Key is stored in the new dynamic area.
In implementing, whenever DRM key is read successfully, DRM key is stored in into new storage address.Update every time After storage address, the data on original memory block are discharged, and old storage address is override using new storage address.It is this Dynamic memory mode can effective protection DRM key be not stolen.
Step 203, based on the DRM key to be protected being stored in, generates and reads Authority Verification code and preserved.
After being stored in DRM key, system generate at random a string it is digital, using the number as read Authority Verification code, for reading Take authentication during DRM key.
Step 204, based on the reading Authority Verification code, is encrypted to the dynamic area of the DRM key, and raw Into corresponding decruption key and preserved.
In a kind of preferred exemplary of the embodiment of the present invention, by dynamic memory of the stream encryption algorithm to DRM key Area is encrypted.
The decruption key, for reading during DRM key, the dynamic area of the DRM key to encrypting is decrypted, so as to Obtain DRM key.
In implementing, also include after the step 204:
Sub-step 21, is use state by the status indication of the dynamic area of DRM key.
Because internal memory can periodically reclaim untapped region of memory, need the shape of the dynamic area of DRM key State is labeled as use state, and the dynamic area for preventing the DRM key is recovered.
Sub-step 22, is unreadable not writeable by the priority assignation of the dynamic area of DRM key.
In embodiments of the present invention, the dynamic memory address of above-mentioned DRM key, the data length information of DRM key, reading The status information of weighting limit identifying code, decruption key and DRM key dynamic area is the metamessage of DRM key.The DRM is close The metamessage of key can be preserved into metamessage data set.Metamessage data set can be unified to the metamessage of DRM key Management, it is also possible to the metamessage of easy-to-look-up each DRM key.
Multiple DRM keys, metamessage one metamessage data set of correspondence of each DRM key can be preserved in internal memory.And The storage address of the corresponding metamessage data set of each DRM key is preserved, for reading DRM key.
In embodiments of the present invention, if DRM key reads successfully, again after DRM key described in dynamic memory, to authority Identifying code is updated, and the dynamic area of the DRM key is encrypted again.
With reference to Fig. 3, flow chart the step of show a kind of DRM key read method embodiment one of the present invention specifically may be used To comprise the steps:
Step 301, the reading Authority Verification code of reception is matched with default reading Authority Verification code;
Step 302, if the match is successful, reads dynamic memory address, the data length information of DRM key of DRM key And decruption key;
Step 303, based on the dynamic memory address of the DRM key of the reading, the data length information of DRM key and Decruption key, is decrypted to the dynamic area of the DRM key, obtains the DRM key.
With reference to Fig. 4, flow chart the step of show a kind of DRM key read method embodiment two of the present invention specifically may be used To comprise the steps:
Whether step 401, the dynamic area for detecting the DRM key is in debugging mode, if so, then terminates described The reading process of DRM key.
Step 402, the reading Authority Verification code of reception is matched with default reading Authority Verification code.
In embodiments of the present invention, after the reading Authority Verification code for sending over when DRM key to be read is received, can With the storage address based on metamessage data set, the reading Authority Verification code stored in metamessage data set is obtained.By what is received Read Authority Verification code to be matched with the reading Authority Verification code of storage.
Step 403, if the match is successful, reads dynamic memory address, the data length information of DRM key of DRM key And decruption key.
In embodiments of the present invention, if the match is successful, the dynamic memory ground of DRM key is read from metamessage data set Location, the data length information of DRM key and decruption key.
Step 404, based on the dynamic memory address of the DRM key of the reading, the data length information of DRM key and Decruption key, is decrypted to the DRM key, obtains the DRM key.
Specifically, step 404 can include:
Sub-step 31, the dynamic memory address and data length information based on the DRM key for reading, finds from internal memory Corresponding DRM key;
Sub-step 32, is readable not writeable by the priority assignation of the dynamic area of DRM key;
Sub-step 33, is decrypted based on decruption key to the dynamic area of DRM key, reads DRM key.
In sum, the embodiment of the present invention reads Authority Verification code by arranging, and the identity of DRM key to be read is carried out Verify, and the dynamic area to DRM key is encrypted, and apply dynamic address and the prison to illegal debugging Control, increases reading DRM key difficulty, so as to effectively prevent the generation of unauthorized theft key behavior, and then protects video version Weigh possessory interests.
It should be noted that for embodiment of the method, in order to be briefly described, therefore it to be all expressed as a series of action group Close, but those skilled in the art should know, and the embodiment of the present invention is not limited by described sequence of movement, because according to According to the embodiment of the present invention, some steps can adopt other orders or while carry out.Secondly, those skilled in the art also should Know, embodiment described in this description belongs to preferred embodiment, the involved action not necessarily present invention is implemented Example is necessary.
With reference to Fig. 5, show that a kind of DRM key of the invention preserves the structured flowchart of system embodiment, specifically can include:
First debugging mode detection module 501, for detecting the dynamic area of the DRM key whether in debugging shape State, if so, then terminates the preservation process of the DRM key.
DRM key preserving module 502, is stored in the dynamic area of distribution for being intended to the DRM key protected, and preserves The dynamic memory address of the DRM key and data length information.
In a kind of preferred exemplary of the embodiment of the present invention, the DRM key preserving module 502 can include:
Memory Allocation unit, for according to the size of DRM key data, being one piece of dynamic memory of DRM key data distribution Area;
First priority assignation unit, for be intended to be stored in the priority assignation of the dynamic area of DRM key for it is writeable can not Read.
DRM key dynamical save unit, if reading successfully for the DRM key, distributes new for the DRM key Dynamic area, is again stored in the DRM key in the new dynamic area.
Authority Verification code generation module 503 is read, for based on the DRM key to be protected being stored in, generating and reading Authority Verification code is simultaneously preserved;
Memory block encrypting module 504, for based on the reading Authority Verification code, the dynamic memory to the DRM key Area is encrypted, and generates corresponding decruption key and preserved.
In a kind of preferred exemplary of the embodiment of the present invention, the memory block encrypting module 504 can include:
Dry state symbol unit, for by the status indication of the dynamic area of DRM key be use state;
Second priority assignation unit, for by the priority assignation of the dynamic area of DRM key for unreadable not writeable.
With reference to Fig. 6, show that a kind of DRM key of the invention reads the structured flowchart of system embodiment, specifically can include:
Second debugging mode detection module 601, for detecting the dynamic area of the DRM key whether in debugging shape State, if so, then terminates the reading process of the DRM key.
Identifying code matching module 602, for the reading Authority Verification code of reception to be entered with default reading Authority Verification code Row matching;
Storage address read module 603, if for the match is successful, the dynamic memory address of the DRM key for reading, DRM The data length information and decruption key of key;
Memory block deciphering module 604, for the number based on the dynamic memory address of the DRM key of the reading, DRM key According to length information and decruption key, the dynamic area of the DRM key is decrypted, obtains the DRM key.
In a kind of preferred exemplary of the embodiment of the present invention, the memory block deciphering module 604 can include:
Searching unit, for the dynamic memory address based on the DRM key for reading and data length information, looks into from internal memory Find corresponding DRM key;
3rd priority assignation unit, is readable not writeable by the priority assignation of the dynamic area of DRM key;
Decryption unit, is decrypted based on decruption key to the dynamic area of DRM key, reads DRM key.
For device embodiment, due to itself and embodiment of the method basic simlarity, so description is fairly simple, it is related Part is illustrated referring to the part of embodiment of the method.
It is close to a kind of DRM key store method provided by the present invention, a kind of DRM key read method, a kind of DRM above Key preserves system and a kind of DRM key and reads system, is described in detail, and specific case used herein is to the present invention's Principle and embodiment are set forth, and the explanation of above example is only intended to help and understands the method for the present invention and its core Thought;Simultaneously for one of ordinary skill in the art, according to the thought of the present invention, in specific embodiment and range of application On will change, in sum, this specification content should not be construed as limiting the invention.
Each embodiment in this specification is described by the way of progressive, what each embodiment was stressed be with The difference of other embodiment, between each embodiment identical similar part mutually referring to.
Those skilled in the art are it should be appreciated that the embodiment of the embodiment of the present invention can be provided as method, device or calculate Machine program product.Therefore, the embodiment of the present invention can using complete hardware embodiment, complete software embodiment or with reference to software and The form of the embodiment of hardware aspect.And, the embodiment of the present invention can using wherein include computer at one or more can With in the computer-usable storage medium (including but not limited to disk memory, CD-ROM, optical memory etc.) of program code The form of the computer program of enforcement.
The embodiment of the present invention is with reference to method according to embodiments of the present invention, terminal unit (system) and computer program The flow chart and/or block diagram of product is describing.It should be understood that can be by computer program instructions flowchart and/or block diagram In each flow process and/or square frame and flow chart and/or the flow process in block diagram and/or square frame combination.These can be provided Computer program instructions to general purpose computer, special-purpose computer, Embedded Processor or other programmable data processing terminals set Standby processor is producing a machine so that held by the processor of computer or other programmable data processing terminal equipments Capable instruction is produced for realizing in one flow process of flow chart or one square frame of multiple flow processs and/or block diagram or multiple square frames The device of the function of specifying.
These computer program instructions may be alternatively stored in can guide computer or other programmable data processing terminal equipments In the computer-readable memory for working in a specific way so that the instruction being stored in the computer-readable memory produces bag The manufacture of command device is included, the command device is realized in one side of one flow process of flow chart or multiple flow processs and/or block diagram The function of specifying in frame or multiple square frames.
These computer program instructions also can be loaded in computer or other programmable data processing terminal equipments so that On computer or other programmable terminal equipments perform series of operation steps to produce computer implemented process, so as to The instruction performed on computer or other programmable terminal equipments is provided for realizing in one flow process of flow chart or multiple flow processs And/or specify in one square frame of block diagram or multiple square frames function the step of.
Although having been described for the preferred embodiment of the embodiment of the present invention, those skilled in the art once know base This creative concept, then can make other change and modification to these embodiments.So, claims are intended to be construed to Including preferred embodiment and fall into having altered and changing for range of embodiment of the invention.
Finally, in addition it is also necessary to explanation, herein, such as first and second or the like relational terms be used merely to by One entity or operation make a distinction with another entity or operation, and not necessarily require or imply these entities or operation Between there is any this actual relation or order.And, term " including ", "comprising" or its any other variant meaning Covering including for nonexcludability, so that a series of process, method, article or terminal unit including key elements is not only wrapped Those key elements are included, but also including other key elements being not expressly set out, or also include for this process, method, article Or the key element that terminal unit is intrinsic.In the absence of more restrictions, by wanting that sentence "including a ..." is limited Element, it is not excluded that also there is other identical element in the process including the key element, method, article or terminal unit.

Claims (10)

1. a kind of DRM key store method, it is characterised in that include:
Be intended to protect DRM key be stored in the dynamic area of distribution, and preserve the DRM key dynamic memory address and Data length information;
Based on the DRM key to be protected being stored in, generate and read Authority Verification code and preserved;
Based on the reading Authority Verification code, the dynamic area of the DRM key is encrypted, and generates corresponding decryption Key is simultaneously preserved.
2. method according to claim 1, it is characterised in that also include:
By the dynamic memory address of the DRM key, the data length information of the DRM key, the reading Authority Verification code And the decruption key is preserved into metamessage data set.
3. method according to claim 1, it is characterised in that also include:
If the DRM key reads successfully, distribute new dynamic area for the DRM key, again by the DRM key In being stored in the new dynamic area.
4. method according to claim 1, it is characterised in that also include:
Detect that the dynamic area of the DRM key, whether in debugging mode, if so, then terminates the preservation of the DRM key Process.
5. a kind of DRM key read method, it is characterised in that include:
The reading Authority Verification code of reception is matched with default reading Authority Verification code;
If the match is successful, dynamic memory address, the data length information of DRM key and the decruption key of DRM key is read;
It is right based on the dynamic memory address of the DRM key of the reading, the data length information of DRM key and decruption key The dynamic area of the DRM key is decrypted, and obtains the DRM key.
6. method according to claim 5, it is characterised in that described by the reading Authority Verification code for receiving and default reading The step of weighting limit identifying code is matched, including:
Based on the storage address of metamessage data set, the described default reading authority stored in the metamessage data set is obtained Identifying code;The Authority Verification code that reads of the storage is used to be matched with the reading Authority Verification code of the reception;
The metamessage data set includes:The dynamic memory address of the DRM key, the data length letter of the DRM key Breath, the reading Authority Verification code and the decruption key.
7. method according to claim 5, it is characterised in that also include:
Detect that the dynamic area of the DRM key, whether in debugging mode, if so, then terminates the reading of the DRM key Process.
8. a kind of DRM key preserves system, it is characterised in that include:
DRM key preserving module, is stored in the dynamic area of distribution for being intended to the DRM key protected, and preserves the DRM The dynamic memory address of key and data length information;
Authority Verification code generation module is read, for based on the DRM key to be protected being stored in, generating and reading Authority Verification Code is simultaneously preserved;
Memory block encrypting module, for based on the reading Authority Verification code, carrying out adding to the dynamic area of the DRM key It is close, and generate corresponding decruption key and preserved.
9. system according to claim 8, it is characterised in that the DRM key preserving module includes:
DRM key dynamical save unit, if reading successfully for the DRM key, for the DRM key new dynamic is distributed Memory block, is again stored in the DRM key in the new dynamic area.
10. a kind of DRM key reads system, it is characterised in that include:
Identifying code matching module, for the reading Authority Verification code of reception to be matched with default reading Authority Verification code;
Storage address read module, if for the match is successful, reading dynamic memory address, the data of DRM key of DRM key Length information and decruption key;
Memory block deciphering module, for the data length based on the dynamic memory address of the DRM key of the reading, DRM key Information and decruption key, are decrypted to the dynamic area of the DRM key, obtain the DRM key.
CN201611264007.XA 2016-12-30 2016-12-30 A kind of DRM key saves, read method and preservation, reads system Active CN106603230B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611264007.XA CN106603230B (en) 2016-12-30 2016-12-30 A kind of DRM key saves, read method and preservation, reads system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611264007.XA CN106603230B (en) 2016-12-30 2016-12-30 A kind of DRM key saves, read method and preservation, reads system

Publications (2)

Publication Number Publication Date
CN106603230A true CN106603230A (en) 2017-04-26
CN106603230B CN106603230B (en) 2019-09-27

Family

ID=58581650

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611264007.XA Active CN106603230B (en) 2016-12-30 2016-12-30 A kind of DRM key saves, read method and preservation, reads system

Country Status (1)

Country Link
CN (1) CN106603230B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019153432A1 (en) * 2018-02-09 2019-08-15 网宿科技股份有限公司 Method and terminal for playbacking video file
CN110752929A (en) * 2019-09-29 2020-02-04 华为终端有限公司 Application program processing method and related product
CN113724424A (en) * 2021-10-28 2021-11-30 云丁网络技术(北京)有限公司 Control method and device for equipment
CN115209220A (en) * 2022-06-08 2022-10-18 阿里巴巴(中国)有限公司 Video file processing method and device, storage medium and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090077381A1 (en) * 2002-03-14 2009-03-19 Rajesh Kanungo Systems and method for the transparent management of document rights
CN103246850A (en) * 2013-05-23 2013-08-14 福建伊时代信息科技股份有限公司 Method and device for processing file
CN103558994A (en) * 2013-09-29 2014-02-05 记忆科技(深圳)有限公司 Method for encrypting solid state disk partitions and solid state disk
CN104010296A (en) * 2014-06-19 2014-08-27 江苏威盾网络科技有限公司 Mobile terminal network protection system and method based on SD card

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090077381A1 (en) * 2002-03-14 2009-03-19 Rajesh Kanungo Systems and method for the transparent management of document rights
CN103246850A (en) * 2013-05-23 2013-08-14 福建伊时代信息科技股份有限公司 Method and device for processing file
CN103558994A (en) * 2013-09-29 2014-02-05 记忆科技(深圳)有限公司 Method for encrypting solid state disk partitions and solid state disk
CN104010296A (en) * 2014-06-19 2014-08-27 江苏威盾网络科技有限公司 Mobile terminal network protection system and method based on SD card

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019153432A1 (en) * 2018-02-09 2019-08-15 网宿科技股份有限公司 Method and terminal for playbacking video file
CN110752929A (en) * 2019-09-29 2020-02-04 华为终端有限公司 Application program processing method and related product
CN110752929B (en) * 2019-09-29 2022-04-22 华为终端有限公司 Application program processing method and related product
CN113724424A (en) * 2021-10-28 2021-11-30 云丁网络技术(北京)有限公司 Control method and device for equipment
CN115209220A (en) * 2022-06-08 2022-10-18 阿里巴巴(中国)有限公司 Video file processing method and device, storage medium and electronic equipment

Also Published As

Publication number Publication date
CN106603230B (en) 2019-09-27

Similar Documents

Publication Publication Date Title
CN112074836B (en) Apparatus and method for protecting data through trusted execution environment
Dwoskin et al. Hardware-rooted trust for secure key management and transient trust
US8769675B2 (en) Clock roll forward detection
US9811478B2 (en) Self-encrypting flash drive
US9240889B2 (en) Method and system for secure data access among two devices
US9317708B2 (en) Hardware trust anchors in SP-enabled processors
US20080297326A1 (en) Low Cost RFID Tag Security And Privacy System And Method
CN106022154B (en) Database encryption method and database server
US20120151219A1 (en) Security usb storage medium generation and decryption method, and medium recorded with program for generating security usb storage medium
CN106603230A (en) DRM secret key preserving and reading method and preserving and reading system
WO2017000648A1 (en) Authentication method and apparatus for reinforced software
JP2000151583A (en) Access capability authentication method, device, and method and device for generating certification auxiliary information
CN101802833A (en) Providing local storage service to applications that run in an application execution environment
WO2006087784A1 (en) Authentication method, authentication system, and tag device thereof, information reference client, authentication server, and information server
JP2006295872A (en) Formation method of device-dependent key, confidential information lsi equipped with secret information function using the method, host equipment using the lsi, record medium with authentication function used for the host equipment, and mobile terminal with recording medium equipped with authentication function
US20120096280A1 (en) Secured storage device with two-stage symmetric-key algorithm
CN105740725A (en) File protection method and system
US20060253714A1 (en) Information processor, tamper-proof method, and tamper-proof program
US20070239617A1 (en) Method and apparatus for temporarily accessing content using temporary license
US20170046530A1 (en) Distributed Cloud Storage System (DCSS) for secure, reliable storage and retrieval of data and computing objects
CN1774688A (en) Method and system for managing digital rights
KR20060030164A (en) A digital management system with shared key pool for video data protection
CN101692266A (en) Method of intensively encrypting and protecting files by using hidden partition (HPA) and CPU ID
US20080104396A1 (en) Authentication Method
CN108345804B (en) Storage method and device in trusted computing environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant