KR20170089331A - Method and System for Preventing Illegal Copy and Monitoring of Tracking Transfer - Google Patents

Method and System for Preventing Illegal Copy and Monitoring of Tracking Transfer Download PDF

Info

Publication number
KR20170089331A
KR20170089331A KR1020160009611A KR20160009611A KR20170089331A KR 20170089331 A KR20170089331 A KR 20170089331A KR 1020160009611 A KR1020160009611 A KR 1020160009611A KR 20160009611 A KR20160009611 A KR 20160009611A KR 20170089331 A KR20170089331 A KR 20170089331A
Authority
KR
South Korea
Prior art keywords
log
monitoring
information
file
tracking
Prior art date
Application number
KR1020160009611A
Other languages
Korean (ko)
Inventor
강광석
Original Assignee
(주)다올소프트
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by (주)다올소프트 filed Critical (주)다올소프트
Priority to KR1020160009611A priority Critical patent/KR20170089331A/en
Publication of KR20170089331A publication Critical patent/KR20170089331A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Databases & Information Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

Suggested are a method and system for preventing illegal copy and monitoring and tracking transmission. The method for preventing illegal copy and monitoring and tracking transmission suggested in the present invention includes the steps of: collecting log information through a log collector when an original file is downloaded and searched and a logging event is generated; enabling a log analysis unit to analyze a log by using the collected log information; generating and storing statistical information according to a log analysis result including download performance and logging event occurrence histories; and tracking and monitoring the usage of copyright information about the original file by using the stored statistical information. Accordingly, the present invention can suggest a structure for the optimum performance of a monitoring system database.

Description

TECHNICAL FIELD [0001] The present invention relates to a method and a system for monitoring illegal copying and transmission,

The present invention relates to a UCI-based anti-piracy and transmission tracking monitoring method and system.

In order to protect and track national research reports and R & D output, it is necessary to develop technical elements that can insert, remove and verify identification information (UCI) and distribution information (such as report acquirer and holder information) in PDF / A files , It is necessary to use a watermarking method for protecting the content, tracking the first outflower when the inserted information is exposed to the outside, and tracking a copy of the protected PDF / A document when capturing, printing, or the like occurs .

PDF is a document file format created by Adobe Systems, USA. It can read or print on almost any operating system, including Windows, Mac, and Android, and retains the original font, image, graphics, and document format. It is highly used because it is not dependent on specific software and hardware.

In such a service model, when inserting identification information and distribution information into a national research report (PDF / A), it is the moment the user requests a file download. Therefore, the digital watermarking and fingerprinting techniques have a high time cost because they directly modulate the original, which is not suitable for the required service model. Therefore, it is necessary to use the metadata area of the file in order to insert and hide the required identification information and distribution information.

Metadata is data for data. That is, data for recording additional information on the data. For example, metadata about a photo file stores information such as time, exposure, whether to use the flash, and thumbnail. PDF document files conform to the XMP standard for storing metadata. The technology for XMP is defined as the ISO international standard. Steganography and watermarking techniques, which are hidden from the user, are included in the data inserted at this time. However, watermarking is non-removal, steganography is data non-detection ) Is the goal. In order to apply this technique, the technique was developed by applying a steganography method in which identification information and distribution information need to be hid information through bi-directional encoding without affecting the original data of the PDF / A document .

In addition, the need for analysis capabilities to monitor and provide statistics on the structure and document utilization for optimal performance of anti-piracy and transmission tracking monitoring system databases.

It is an object of the present invention to provide an analysis method and system capable of monitoring the structure and document utilization state and providing statistics for optimal performance of a monitoring system database.

According to an aspect of the present invention, there is provided a method for monitoring piracy prevention and transmission tracing according to the present invention, comprising the steps of: collecting log information through a log collector when downloading and querying a source file and generating a logging event; A step of performing a log analysis additional log analysis, a step of generating and storing statistical information according to a log analysis result including a download result and a log event occurrence history, and using the stored statistical information, And tracking and monitoring.

Wherein the collecting of log information through the log collector when downloading, querying, and logging events of the original text file includes: downloading, querying, and logging logs of the original text file; transmitting the log to the monitoring unit using a JSON method; do.

The log information includes a UCI code, user identification information, a document unique number, an event type, a collection object, a date and time, and a text file.

The step of performing the log analysis by the log analyzer using the collected log information is associated with the database of the corresponding research report metadata of the original document file at the time of log analysis, the key value is linked with the UCI code, and the filtering is performed by DoC. Signature is used as the analysis standard and stored in the collection log database so that users of the monitoring service can analyze the data.

According to another aspect of the present invention, the anti-piracy and transmission trace monitoring system proposed in the present invention includes a log collector for collecting log information when downloading and querying a source file and generating a logging event, A collecting log database for generating and storing statistical information according to a log analysis result of the log analyzing unit including a downloading performance and a logging event generating history, And a monitoring unit for tracking and monitoring the use of the information.

The log collector transmits the logs to the monitoring unit by using the JSON method when downloading, querying, and logging the events to the original text file.

The log analyzer is associated with a database of the corresponding research report metadata in the log file at the time of log analysis, the key value is associated with the UCI code, and the filtering is performed with DoC. Signature is used as the analysis standard and the analysis result is stored in the collection log database so that the monitoring service user can analyze the data.

According to embodiments of the present invention, a structure for optimal performance of a monitoring system database can be proposed, and monitoring of document utilization and statistics can be provided.

1 is a diagram illustrating an outline of a service model for a conflict prevention and infringement prevention technology according to an embodiment of the present invention.
2 is a service configuration diagram of a conflict prevention and infringement prevention technology according to an embodiment of the present invention.
3 is a flowchart illustrating an anti-piracy and transmission tracking monitoring method according to an embodiment of the present invention.
FIG. 4 is a view showing a current state of use of a national research report and a process of tracking a distribution route according to an embodiment of the present invention.
5 is a diagram illustrating an example of downloading a LOG insertion file in a PDF / A file according to an embodiment of the present invention.
6 is a view for explaining a log collection server technology according to an embodiment of the present invention.
FIG. 7 is a diagram illustrating a piracy prevention and transmission tracking monitoring system model according to an embodiment of the present invention.
8 is a diagram for explaining a research report use history monitoring process.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings.

1 is a diagram illustrating an outline of a service model for a conflict prevention and infringement prevention technology according to an embodiment of the present invention.

Prior to describing the proposed anti-piracy and transmission tracking monitoring method, an outline of a service model for anti-conflict and anti-infringement technology according to an embodiment of the present invention will be described with reference to FIG.

The user can upload the research output to the Research Performance Management Department and request download of the output stored in the Research Performance Management Department. In order to provide such a national research report service, it is possible to identify and attach target product trace information (identification information and distribution information) using research report (PDF / A) identification information and distribution information confirmation, insertion and removal module. The user can download the identification information and the output attached with the distribution information.

At this time, the transmission information log can be transmitted in the script embedded system to the transmission log collection server of the monitoring report transmission monitoring section of the research report. In addition, the research report (PDF / A) identification information and distribution information confirmation, insertion and removal module can also transmit the transmission information log to the transmission log collection server of the transmission report monitoring section of the research report.

The collected collection log can be stored in the research result output log management unit. The research result output transmission log management part can analyze using log collection and distributed coordinator and store it in repository.

The information stored through the log analysis is used for the research report transmission monitoring service, and the administrator can use this information to perform transmission information monitoring (analysis and tracking).

Table 1 below shows the service composition diagrams for applying conflict prevention and anti-infringement technology to the national research report based on the above-mentioned research contents. The detailed development technology is UCI and distribution information insertion technology, water A mark insertion API, a password / decryption API, and a PDAF / A exclusive viewer. In this case, the watermark embedding API is not an invisible digital watermarking technique described above, but a watermark embedding in words.

<Table 1>

Figure pat00001

2 is a service configuration diagram of a conflict prevention and infringement prevention technology according to an embodiment of the present invention.

The above diagrams can be broadly categorized according to their functions. They include the performance registration (registration using the performance registration system of the task management agency) and the use of the national research report output (using the national research report copyright portal) (PDF / A) Viewer section, etc. The service composition of conflict prevention and infringement prevention technology can be summarized as shown in FIG.

The general user browses the output through the PDF / A viewer and cites the output. The PDF / A viewer is responsible for decrypting the output, logging in, generating the output viewing log, and generating the output quotation log.

The PDF / A viewer can send output / browse logs to the log collection server. The log collection server categorizes the log and stores the log. Then, the classification log can be retrieved through the search server. The search server is responsible for the search engine and the function of saving the analysis results.

In addition, the general user searches through the national research report copyright portal and downloads the output. The national research report copyright portal is responsible for downloading the output and generating the output download log.

The national research report copyright portal requests and receives the output file from the database of the performance registration management department. Then, it retrieves the output meta information in association with the copyright portal database. In addition, the log download server transmits the output download log to the log collection server.

The copyright portal database manages the output meta information and member information, and can transmit the member information to the PDF / A viewer.

The performance registration management unit database manages the output meta information and member information, and can transmit the output meta information to the copyright portal database.

Researchers and managers upload output to the performance registration system. The performance registration system is responsible for extracting the output meta information and functioning the output file transfer API. Then, the meta information and the file can be transmitted to the performance registration management unit.

The performance registration management department is responsible for the retrieval of similarity of sentences, automatic attachment of quotation marks, UCI registration API, insertion of output watermark, insertion of UCI code and distribution information, and encryption of output data. Then, the output meta information is transmitted to the copyright portal database. Each configuration and function is described in more detail below.

Table 2 below shows the service structure for applying the UCI-based anti-piracy and transmission tracking monitoring technology to the national research report based on the above-mentioned study. The detailed development technologies are developed using dedicated PDF viewer, log collection service (RESTful), log sender (Apache Flume-Hadoop), national research report output file (PDF / A) , es-hadoop).

<Table 2>

Figure pat00002

3 is a flowchart illustrating an anti-piracy and transmission tracking monitoring method according to an embodiment of the present invention.

The proposed anti-piracy and transmission trace monitoring method includes a step 310 of collecting log information through a log collector when downloading and inquiring a text file, and when a logging event occurs, a log analyzing step using the collected log information, Generating and storing statistical information according to a log analysis result including a download event and a log event occurrence history (330), using the stored statistical information, using the copyright information on the original text file (340). &Lt; / RTI &gt;

At step 310, log information is collected via the log collector upon download, lookup, and logging events to the original file. At this time, when downloading, inquiry and logging events of the original text file are generated, the log is transmitted to the monitoring unit using the JSON method and stored. The log information includes UCI code, user identification information, document unique number, event type, collection target, date of occurrence, and original text file.

In step 320, the log analyzer performs log analysis using the collected log information. When analyzing the log, it associates with the database of the corresponding research report metadata in the text file. The key value is associated with the UCI, and the filtering is done with DoC. Signature can be based on analysis. The collected log information is stored in the collection log database so that the monitoring service user can analyze the data.

In step 330, statistical information based on log analysis results including download performance and a log event occurrence history is generated and stored in the collection log database.

At step 340, the stored statistical information is used to track and monitor the use of copyright information on the original file.

FIG. 4 is a view showing a current state of use of a national research report and a process of tracking a distribution route according to an embodiment of the present invention.

First, the management staff / researcher who corresponds to the user uploads the research project to the task management professional institution. The task management specialist sends the research project to the performance management specialist. The performance management specialist applies for the UCI conversion in connection with the UCI general charge and receives the conversion result. After completing the UCI conversion, the performance management agency sends the research index information to the national research report copyright portal. When the management staff / researcher sends encryption for searching and downloading, the national research report copyright portal sends the research report download history to the monitoring server. The management staff / researcher opens the research report through a dedicated viewer and sends the inquiry and event log to the monitoring server.

Table 3 shows the collection log event definitions for transmission tracking monitoring.

<Table 3>

Figure pat00003

The collection log transfer interface transfers the log of the national research report download event to the monitoring server using JSON method and stores it. In addition, when a national research report is inquired and a COPY event occurs, the log is transmitted to the monitoring server by JSON method and stored.

5 is a diagram illustrating an example of downloading a LOG insertion file in a PDF / A file according to an embodiment of the present invention.

5 (a) is a diagram showing an example of downloading a LOG insertion file in a PDF / A file using Apache flume to HDFS.

5B is a diagram showing an example of downloading a LOG insertion file in a PDF / A file using HDFS Indexing.

The PDF / A Viewer collection log stores UCI code + user identification information + document unique number, event type + collection target + date and time + full text.

An example of the PDF / A Viewer collection log format is shown below.

{"uciCode": "G703RA101 + R100000", "userId": "USER-ID"

"reportId": "jksiis.2014.19.5.051", "type": "download",

"time": "YYYYMMDDHHMMSS", "text": "Details"}

At this time, the user identification information may be composed of a character string that can identify the user, and the document unique number may be a character string of the unique number of the national research report. In addition, event types can be classified into download (download), open (national research report inquiry), and copy (national research report COPY). The year, month, day, and hour of the occurrence enter the system time at the time of downloading, and the national research report inquiry and the national research report COPY enter the time of the user PC where the event occurred. The contents of the text shall contain a copy of the contents of the COPY.

6 is a view for explaining a log collection server technology according to an embodiment of the present invention.

6 (a) is a diagram for explaining the operation of a log collection server configured with HTTP.

6B is a diagram for explaining context switching of a log collection server configured with HTTP.

The log collection server is configured with HTTP, and uses the network socket for the function of HTTP. At this time, I / O occurs, and the modern-day web server operates as multi-threaded and shows an implementation form as shown in FIG. 6 (a).

When calling recvfrom (read) from an application, the kernel blocks until data arrives.

When data comes in, the recvfrom (read) function returns, and the program flow returns to the application.

Therefore, the server can not exit the read operation until the client performs a write operation.

There are two problems with the use of this type of I / O. One is that the resources are limited due to the nature of I / O, so in order to process a large number of connections, it is necessary to scale-out the I / O devices inevitably. This consumes not only a large amount of input costs but also an operation cost. The other is implemented as a multi-threaded application by simultaneous concurrency of requests, as in the case of Context Switching shown in FIG. 6 (b) the cost due to the context switching of the CPU is high with respect to the thread, thereby degrading the response performance.

Therefore, in order to process a large amount of responses, I / O must be used in a non-blocking manner.

The method according to the embodiment of the present invention uses Vert.X to implement the non-blocking web application REST API.

FIG. 7 is a diagram illustrating a piracy prevention and transmission tracking monitoring system model according to an embodiment of the present invention.

The anti-piracy and transmission tracking monitoring system model can be represented as shown in FIG. 7, and a functional description thereof is as follows.

Plagiarism testing is performed using the plagiarism search part to determine whether plagiarism of the achievement to be registered is required before the performance management specialist registers the achievement. If a plagiarism sentence is not found, the original text registration process is performed. If a plagiarism section is found, the operation of supporting the automatic attachment of quotation marks is performed.

When a new report original text is registered in the research report database using the achievement registration and management department in the performance management professional institution, the UCI registration application will be made to apply for UCI registration. At this time, the UCI RA management unit transmits the identification metadata to the UCI general department simultaneously with the UCI registration application, and uploads the application metadata together with the metadata. When the UCI registration is approved, the UCI RA management department and the achievement registration and management department are notified of UCI registration. Upon completion of UCI registration, the UCI code and metadata of the research report will be provided to the national research report copyright portal, which will be used in the log analysis and transmission trace monitoring department.

There are two ways to use the national research report: downloading through the national research report copyright portal and downloading through the task management agency. Both of these methods can be used only by registering in advance and registering for the devices to be used. Differentiated public services are provided according to the membership level. All of this usage information can be used in log analysis service. All users will download the output using a dedicated PDF viewer and use the technology that is constructed by applying the UCI-based DRM technique to protect copyright and prevent copyright infringement.

In other words, the proposed anti-piracy and transmission trace monitoring system includes a log collector, a log analysis unit, a collection log database, and a monitoring unit.

The log collector collects log information when downloading, querying, and logging events to the original file. The log collector downloads and retrieves the original text file, and when the logging event occurs, the log is transferred to the monitoring section using the JSON method and stored.

The log analyzer performs log analysis using the collected log information.

The collection log database generates and stores statistical information according to the log analysis results of the log analyzing unit including the downloading performance and the history of the logging events.

The monitoring department tracks and monitors the use of copyright information on the original text file using the stored statistical information.

The log analyzer is associated with the database of the corresponding research report metadata in the log file at the time of log analysis, and the key value is associated with the UCI code. The filtering is done by DoC. Signature is used as the analysis standard. The analysis result is stored in the collection log database so that the monitoring service user can analyze the data.

The plagiarism explorer shall perform a plagiarism check to determine whether the product to be registered is plagiarized before registering the product in the research report database. If the plagiarism is not found by judging whether or not the product to be registered is plagiarized, the original registration process of the report is executed. On the other hand, if plagiarism is found by judging whether or not plagiarism is occurring, the quotation marks are automatically attached.

The article registration and management department shall register the original report of the report of the artifacts to be registered in the research report database after performing the plagiarism inspection.

The UCI registration department performs the UCI registration process for the registered products. The UCI Registration Department is requested to register UCI for the registered products and, when the UCI registration is approved, notifies the UCI management department and the output registration and management department whether the UCI is registered. Upon completion of the UCI registration, the corresponding UCI code and metadata are provided to the national research report copyright portal.

The proposed R & D product copyright dispute prevention system further includes a UCI management department. The UCI registration department submits the UCI registration request, the UCI management department transmits the identification metadata to the UCI general department, and uploads the application metadata together.

The monitoring unit downloads the registered products, and collects logs and tracks usage of the downloaded products. When the monitoring and registration of the terminal is completed before the downloading, the monitoring unit enables the use of the output only and provides the differentiated disclosure service according to the user's level of each member.

In addition, the monitoring department uses the technology that is constructed by applying the UCI-based DRM technique to the registered products to enable the copyright protection measures to prevent infringement and to prevent conflicts.

8 is a diagram for explaining a research report use history monitoring process.

For example, in the download phase, a user can perform a research report search through a national research report portal and click download. Then, the user moves to the original site, and the user can download the original text. At the collection stage, the national research report portal sends the download log to the monitoring site to store download history and event occurrence history.

If you perform an offline file inquiry through the user PDF viewer (Custom PDF Viewer) in the inquiry step, the original file inquiry / logging event will occur.

At this time, the event log can be transmitted by dividing the OS to store download performance and event occurrence in the monitoring site in the collecting step. For example, user PDF viewer PC event log, event log creation, user PDF viewer iOS event log can be divided into.

The monitoring site receiving the log can store the download performance and the event occurrence history, and can generate the statistics.

The apparatus described above may be implemented as a hardware component, a software component, and / or a combination of hardware components and software components. For example, the apparatus and components described in the embodiments may be implemented within a computer system, such as, for example, a processor, a controller, an arithmetic logic unit (ALU), a digital signal processor, a microcomputer, a field programmable array (FPA) A programmable logic unit (PLU), a microprocessor, or any other device capable of executing and responding to instructions. The processing device may execute an operating system (OS) and one or more software applications running on the operating system. The processing device may also access, store, manipulate, process, and generate data in response to execution of the software. For ease of understanding, the processing apparatus may be described as being used singly, but those skilled in the art will recognize that the processing apparatus may have a plurality of processing elements and / As shown in FIG. For example, the processing unit may comprise a plurality of processors or one processor and one controller. Other processing configurations are also possible, such as a parallel processor.

The software may include a computer program, code, instructions, or a combination of one or more of the foregoing, and may be configured to configure the processing device to operate as desired or to process it collectively or collectively Device can be commanded. The software and / or data may be in the form of any type of machine, component, physical device, virtual equipment, computer storage media, or device , Or may be permanently or temporarily embodied in a transmitted signal wave. The software may be distributed over a networked computer system and stored or executed in a distributed manner. The software and data may be stored on one or more computer readable recording media.

The method according to an embodiment may be implemented in the form of a program command that can be executed through various computer means and recorded in a computer-readable medium. The computer-readable medium may include program instructions, data files, data structures, and the like, alone or in combination. The program instructions to be recorded on the medium may be those specially designed and configured for the embodiments or may be available to those skilled in the art of computer software. Examples of computer-readable media include magnetic media such as hard disks, floppy disks and magnetic tape; optical media such as CD-ROMs and DVDs; magnetic media such as floppy disks; Magneto-optical media, and hardware devices specifically configured to store and execute program instructions such as ROM, RAM, flash memory, and the like. Examples of program instructions include machine language code such as those produced by a compiler, as well as high-level language code that can be executed by a computer using an interpreter or the like. The hardware devices described above may be configured to operate as one or more software modules to perform the operations of the embodiments, and vice versa.

While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it is to be understood that the invention is not limited to the disclosed exemplary embodiments. For example, it is to be understood that the techniques described may be performed in a different order than the described methods, and / or that components of the described systems, structures, devices, circuits, Lt; / RTI &gt; or equivalents, even if it is replaced or replaced.

Therefore, other implementations, other embodiments, and equivalents to the claims are also within the scope of the following claims.

Claims (7)

In a method for monitoring piracy prevention and transmission tracking,
Collecting log information through a log collector when downloading, inquiring and logging events to the original file occur;
Performing log analysis on the log analyzer using the collected log information; And
Generating and storing statistical information according to a log analysis result including download performance and a log event occurrence history; And
Tracking and monitoring the use of copyright information on the original text file using the stored statistical information
And a method for monitoring piracy prevention and transmission tracking.
The method according to claim 1,
Collecting log information through a log collector when downloading, inquiring, and logging a log file of the original file,
When downloading, inquiring, and logging events of the original text file are generated, the log is transmitted to the monitoring unit using the JSON method and stored
How to prevent piracy and monitor transmission trace.
The method according to claim 1,
The log information includes:
UCI code, user identification information, document unique number, event type, collection target, date of occurrence, and original text file.
How to prevent piracy and monitor transmission trace.
The method according to claim 1,
Wherein the log analyzer performs the log analysis using the collected log information,
When analyzing the log, it associates with the database of the corresponding research report metadata in the original text file. The key value is associated with the UCI code. Signature is used as the analysis standard and stored in the collection log database so that users of the monitoring service can analyze the data
How to prevent piracy and monitor transmission trace.
In a piracy prevention and transmission tracking monitoring system,
A log collector that collects log information when downloading, querying, and logging events to the original file;
A log analyzer for performing log analysis using the collected log information;
A collection log database for generating and storing statistical information according to a log analysis result of the log analyzer including a download result and a log event occurrence history; And
A monitoring unit for tracking and monitoring the use of copyright information on the original text file by using the stored statistical information;
And a transmission tracking monitoring system.
6. The method of claim 5,
The log collector includes:
When downloading, inquiry and logging of the original text file occur, the log is transmitted to the monitoring unit using the JSON method and stored
Anti-piracy and transmission tracking monitoring system.
The method according to claim 1,
Wherein the log analyzer comprises:
When analyzing the log, it associates with the database of the corresponding research report metadata in the original text file. The key value is associated with the UCI code. Signature is used as the analysis standard and the analysis result is stored in the collection log database so that the monitoring service user can analyze the data
Anti-piracy and transmission tracking monitoring system.
KR1020160009611A 2016-01-26 2016-01-26 Method and System for Preventing Illegal Copy and Monitoring of Tracking Transfer KR20170089331A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020160009611A KR20170089331A (en) 2016-01-26 2016-01-26 Method and System for Preventing Illegal Copy and Monitoring of Tracking Transfer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020160009611A KR20170089331A (en) 2016-01-26 2016-01-26 Method and System for Preventing Illegal Copy and Monitoring of Tracking Transfer

Publications (1)

Publication Number Publication Date
KR20170089331A true KR20170089331A (en) 2017-08-03

Family

ID=59655338

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020160009611A KR20170089331A (en) 2016-01-26 2016-01-26 Method and System for Preventing Illegal Copy and Monitoring of Tracking Transfer

Country Status (1)

Country Link
KR (1) KR20170089331A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102180267B1 (en) * 2019-12-30 2020-11-18 강상구 System for providing online to offline based fashion production matching service connecting client to contractor in clothing industry
KR20210148502A (en) * 2020-05-28 2021-12-08 우석대학교 산학협력단 File access tracking method using window event log and electronic device thereof

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102180267B1 (en) * 2019-12-30 2020-11-18 강상구 System for providing online to offline based fashion production matching service connecting client to contractor in clothing industry
KR20210148502A (en) * 2020-05-28 2021-12-08 우석대학교 산학협력단 File access tracking method using window event log and electronic device thereof

Similar Documents

Publication Publication Date Title
US8259322B2 (en) Printing system, printing program, information collection method, information search method and information search system
US20150178476A1 (en) System and method of monitoring font usage
Garfinkel Lessons learned writing digital forensics tools and managing a 30TB digital evidence corpus
US20190182053A1 (en) Technology validation and ownership
JPH07319691A (en) Resource protective device, privilege protective device, software utilization method controller and software utilization method control system
RU2677368C1 (en) Method and system for automatic determination of fuzzy duplicates of video content
KR101491446B1 (en) Methods for extracting pingerprint of publication, apparatus for extracting pingerprint of publication, system for identifying publication using fingerprint and method for identifying publication using fingerprint
US20130024769A1 (en) Apparatus and method for processing a document
US20090249491A1 (en) Contents Data, and Program, Apparatus and Method for Detecting and Controlling Unauthorized Contents
CN111638908A (en) Interface document generation method and device, electronic equipment and medium
KR101977178B1 (en) Method for file forgery check based on block chain and computer readable recording medium applying the same
CN111797351A (en) Page data management method and device, electronic equipment and medium
US20190354658A1 (en) System, method and program for preventing unauthorized copies of webcomics and tracking replicated webcomics
JP7040800B2 (en) Architecture, methods and equipment for collecting and displaying computer file metadata
KR101888866B1 (en) Method and apparatus for distributing contents using copyright protection
KR20170089331A (en) Method and System for Preventing Illegal Copy and Monitoring of Tracking Transfer
US9682590B1 (en) Printed document security
JP2004287566A (en) Device for concealing part of content and content circulation system using it
JP2012182737A (en) Secret data leakage preventing system, determining apparatus, secret data leakage preventing method and program
Damerow et al. The giles ecosystem–storage, text extraction, and OCR of documents
JP7331391B2 (en) Systems, methods, apparatus, and programs for tracking copies of printed materials owned by rights holders
CN111783119A (en) Form data security control method and device, electronic equipment and storage medium
Ritzdorf et al. Assisted deletion of related content
US20170270204A1 (en) Video inspector
Jeyaraman et al. An empirical study of automatic event reconstruction systems