CN101046835A - Digital content protection method based on bonded with hardware equipment - Google Patents

Digital content protection method based on bonded with hardware equipment Download PDF

Info

Publication number
CN101046835A
CN101046835A CNA2006100663096A CN200610066309A CN101046835A CN 101046835 A CN101046835 A CN 101046835A CN A2006100663096 A CNA2006100663096 A CN A2006100663096A CN 200610066309 A CN200610066309 A CN 200610066309A CN 101046835 A CN101046835 A CN 101046835A
Authority
CN
China
Prior art keywords
content
licence
user
terminal
account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2006100663096A
Other languages
Chinese (zh)
Inventor
周莉
马涛
陈杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Microelectronics of CAS
Original Assignee
Institute of Microelectronics of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Microelectronics of CAS filed Critical Institute of Microelectronics of CAS
Priority to CNA2006100663096A priority Critical patent/CN101046835A/en
Publication of CN101046835A publication Critical patent/CN101046835A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention relates to the field of digital contents protection technology; in particular, it relates to a digital contents protection method based on binding with hardware equipment. Said method includes the following steps:(1), creating digital contents authorization centre, it is used for creating digital contents, managing digital contents and controlling application of digital contents; (2), creating license authorization centre, it is used for creating license, verifying license and modifying license; and (3), creating system server, it is used for managing account and generating implicit identification. Said invention can be extensively used for protection of various digital media (such as JPEG, MP3 MPEG2, MPEG4 and H.264,etc.).

Description

A kind of based on the digital content protection method of hardware device binding
Technical field
The present invention relates to the digital content protection technical field, particularly a kind of based on the digital content protection method of hardware device binding.
Background technology
Along with communication, Development of Multimedia Technology, the internet is more and more universal.Contents such as some films, record company or retailer provide and sell content of multimedia such as film, music by Online Store.Digital media file is easy to duplicate and distribute, and also can not reduce quality simultaneously.Therefore, digital media file obtains wide-scale distribution by this platform of Internet by mandate and undelegated distribution channel now.When lacking safety practice and protect content, problem of piracy just occurs inevitably, thereby causes damage to content supplier.The vital interests of digital copyright management (DRM) technical protection content supplier make them that colourful content is provided, the content that the consumer understands so obtain more easily oneself to like.The DRM technology will be started the business model of contents marketplace.
Summary of the invention
The objective of the invention is to, comply with the requirement of digital copyright management technology, seek a kind of based on hardware binding, security enhanced digital copyright management system structure.It is characterized in that this system can finish the establishment of digital content, the management of digital content, the use of digital content, the establishment of licence, the checking of licence, modification, content access function, content business function, License Management, tracing management and the account management of licence.
Sign at each terminal device is divided into explicit and implicit expression two parts.Explicit identification, exactly can be by other system element visit beyond DRM (the Digital Rights Management) chip and the sign that can make amendment, generally, explicit identification then is significant character string or other symbol, is convenient to user's name and use.Implicit identification then is the special identifier that is solidificated in the DRM chip internal, except the DRM chip of the account management system of server end and this equipment, any other system element can not have access to this sign, and the DRM chip can be revealed this sign to the outside at no time by any way.Implicit identification is the key that guarantees terminal Lawful access protected content, and system algorithm design assurance server and terminal are carried out the checking of identity under the situation of directly not transmitting this sign.The present invention " based on the digital copyright management of hardware binding ", can be widely used in the protection of all kinds of Digital Medias (for example JPEG, MP3, MPEG2, MPEG4, H.264 wait).
Based on the digital copyright management structure of hardware binding, comprising:
One digital content authorization center is used to create the use of digital content, managing digital content and control figure content;
One licence authorization center is used to create licence, checking licence and revises licence;
One system server is used for account executive and generates implicit identification.
A kind of based on the digital publishing rights of hardware binding, wherein the digital content authorization center is characterised in that, comprising:
The establishment of one digital content, main effect is to create the content of concluding the business easily.Here implying creating or reusing this content, will state the right of this content when perhaps existing content rights being expanded;
The transaction of content is managed and carried out to the management of one digital content how.This comprises that receiving a content from the founder deposits content library in, and transaction system will be carried out the management of the metadata of content description and right expression;
The use of one digital content, the how use of organize content, this needs software to conduct interviews to content according to constraint;
One content access function be used for making the user can be from the database that distributes accessed content and metadata, metadata can be used for describing user, right and content;
One content business function is to be used for issuing license to those users that obtain right by transaction system.Under many circumstances, content need just can meet the licence requirement through multi-pass operations.For example under some desktop application environment, need content is encrypted or packed.
A kind of based on the digital publishing rights of hardware binding, wherein the licence authorization center is characterised in that, comprising:
The establishment of one licence allows right is invested on the content of new establishment, describes the right owner of this content and the operation of permission;
The checking of one licence is to be used for guaranteeing that content is based on the basis that has corresponding right creates;
The modification of one licence is the transaction situation that is used for allowing according to different, to the operation of making amendment of user's vested in possession;
One License Management guarantees the validity of the right stipulation that environment for use is relevant with content.For example, if the user only is awarded the right of browsing, it just can not print so, and the management of licence comprises that a plurality of terminals share the storage with merging and licence cut apart of a permission, licence;
One tracing management is under the situation that right needs restraint, the operating position of keeping track of content.For example certain licence stipulates that at this moment the user can only just need tracing management with this content play ten times.When each use all was accompanied by the generation of transaction, this function also will be carried out with transaction system alternately.
A kind of based on the digital publishing rights of hardware binding, wherein system server is characterised in that, comprising:
One account management, it comprises terminal user's the account management and the account management of content supplier;
1) each terminal user only just can enjoy various services after the registration in system.All terminals all have to register in the corresponding user account number and can use.Terminal user's account number has comprised this user's essential information, transactions history, the terminal situation that has etc.Each user is the account of (for example Email, Fax, Tel, over-network registration etc.) registration oneself through various channels.After a user registration success, server end just generates a personal air for this user, and the username and password that the user distributed by when registration just can land this space, checks and manage the transaction situation of oneself.
As a typical application, should provide following function in user's the personal space:
A) browsing of userspersonal information, for example user's name, the rights of using that had, registration date, transaction record etc.
B) registration of user terminal and management.This part is used for recording user in the terminal of server end registration, and the user can increase, sweep equipment.The user can only just can obtain licence with the terminal of registering here.
C) backup of user's licence and management.In order to prevent that the licence on the terminal from losing, licence of the every application of terminal all can back up at server, in case the licence on the terminal device meets accident, can download the backup permission here.
2) account management of content supplier, the commercial city that provides in each system will be registered at DRM management service end, server distributes an account can for each content supplier, has comprised among this account that content supplier offers the content registration information of DRM system.Each content supplier will carry out encipherment protection to content by the encryption software of special use earlier before content distributed, and the cryptographic algorithm in the encryption software all should be that the DRM chip of terminal is supported.After content was encrypted, content supplier registered this content in the account of DRM service end, generally comprised the DOI of content, encryption method, encryption key etc.When a user's download protected content and desire when it is conducted interviews, corresponding terminal device can read its DOI in the header information of protected content, then according to this DOI to the service end licensing.The information that service end can find the corresponding account of content supplier to provide by this DOI, confirming under the prerequisite of the corresponding fund of the paid mistake of this user with this content supplier, these information package are become licence and utilize the implicit identification of terminal to encrypt, send terminal at last to.
The generation of one implicit identification, it is in order to guarantee the overall uniqueness and the security of implicit identification, the DRM server will have special implicit identification maker for use.Perhaps generate implicit identification and be cured in the chip, tell server end by legal means then by production firm oneself.Here only enumerate the process that generates implicit identification by special implicit identification maker.Production firm will keep being connected when producing chip with this maker, for each chip block, generate the explicit identification of this chip earlier by the used special software of manufacturer, software sends this explicit identification to the implicit identification maker then, maker can generate a corresponding implicit identification for it, and being returned to manufacturer end again with secured fashion, this implicit identification at last is written into chip.In the DRM system.All there is the unique label of oneself in each chip production manufacturer, and the explicit identification of the chip that it is produced promptly is by this label, adds the date of manufacture, and serial number etc. constitute.For the security of the implicit identification that guarantees chip, after implicit identification is generated, must send back production firm with the form of maintaining secrecy.Can utilize PKI, distribute a digital certificate for each production firm, the form of certificate can adopt X.509 standard, has comprised a PKI in certificate.Before implicit identification was transmitted, the DRM service end is found out PKI correspondence in this manufacturer's certificate earlier according to explicit identification private key utilized this private key that implicit identification is encrypted, and sends manufacturer terminal then to.For security, digital certificate should not propagated with the form of network, should pay in aspectant mode, and just should upgrade at set intervals.Because production firm can't be too many, and the amount of production chip can be enough big, and therefore the mode of this face-to-face payment is feasible.Implicit identification after the encryption can transmit on http protocol, also can adopt the HTTPS agreement to transmit.The used software of production firm should be provided by DRM administrative center, and its basic function is for chip generates explicit identification, communicates by letter with server end and obtains implicit identification, can therefrom extract decruption key by the resolution digital certificate, and the implicit identification of encrypting is decrypted.The generation of implicit identification, transmit and be cured to flow process in the chip shown in Fig. 1 and 2.The relation of explicit identification and implicit identification is as shown in table 1, is one to one.Or explicit identification adds that user account number and implicit identification are one to one, or explicit identification adds that out of Memory and implicit identification are one to one or the like.But the implicit identification of generation definitely is unique.
3) registration and unregistration of terminal, the registration of terminal are the functions in user's the account management.The same with user's registration, the registration of terminal also can adopt multiple mode to carry out (for example Email, Fax, Tel, over-network registration etc.).Wherein during the over-network registration terminal, typical operating process is as follows:
A) user is connected to network with terminal, and starts from registering functional.
B) account ID of terminal notifying user input and affirmation oneself.
C) terminal Connection Service device sends to server with account ID, password and the explicit ID of self.
D) server with this endpoint registration in corresponding account.
This benefit from registration is exactly the demonstration ID that does not need consumer recording equipment, and is simple to operate.Perhaps the demonstration ID of the own recording unit of user sends to server with account number ID, password and the explicit ID of self.
In a single day terminal is registered, and its all behaviors all will be associated with the account under this terminal.Each terminal to apply licence, server earlier will the account under it in the access rights of the protected content bought of retrieval user, generate corresponding licence according to the authority that the user bought then.Therefore, a terminal of not registering can not be applied for licence.
Owing to exist the possibility that terminal shifts between the account, so the user should nullify terminal from its account.The process of nullifying and the process of registration are similarly, no longer repeat.
A kind of based on the digital publishing rights of hardware binding, wherein the licence authorization center is characterised in that, it is characterized in that: the form of licence is made up of following 5 parts with definition.
1) essential information, this part have been described the DOI of the protected content of this licence correspondence, the user profile of applying for this permission, the date of formation of licence, the essential information etc. of applying for the terminal device of this licence.
2) right expression, this part has been described the right of the visit protected content that the user bought.As broadcasting time, the effective date of licence, Expiration Date of licence or the like.
Employed encryption method and encryption key when 3) decryption information, this part have been described protected content that should licence encrypted.
4) share information, this part has been described this licence can share use between those equipment.License the equipment of this permission for each, all comprised a condition code in the shared information corresponding, also have the key of a service end according to the implicit identification generation of this condition code and relevant device.The sender sends corresponding reciever to after can encrypting according to this information licence.This part is optional.
5) residual information, this part have comprised the residual information in the protected content, for those contents of having used the residual error cryptographic algorithm, have only the information that provides in conjunction with this part just can carry out complete visit.This part is optional.
A kind of based on the digital publishing rights of hardware binding, wherein the licence authorization center is characterised in that, it is characterized in that: the generation of licence and backup.
1) user need use the username and password login user of oneself, selects oneself to want film or other medium downloaded, this document is downloaded finish.Then the user need oneself want the right bought according to the prompting definition of DRM administration web page, as playing on which equipment, how many days sees that it is inferior what are play.
2) Fare Collection System can generate a licence that comprises content noted earlier at user's selection, and according to the implicit identification of this terminal licence is encrypted, and sends user terminal to.At last, the user just can utilize licence that digital content has been conducted interviews.
3) licence of terminal is damaged or when losing, server will be backed up the licence of this generation, in case the permission storehouse on the terminal is impaired, the user can recover corresponding permission by game server.In this course, a kind of special circumstances are arranged, if previous exactly licence has been stipulated the broadcasting time of this terminal, if licence is lost, server end can't judge that this terminal play several times.Again in this case, can judge whether to accept the request that the user asks for this licence again according to the business rule of content supplier's definition.For simplicity, in the system of initial definition, do not allow the number of times that definition is play in the licence that a plurality of equipment are shared.
The subordinate list explanation
Table 1 is the mapping table of explicit identification and implicit identification.
The explanation of form
As shown in table 1, the explicit identification ID and the implicit identification ID of terminal are one to one.An equipment will possess a unique implicit identification in the whole world.Wherein, explicit identification ID is can be by other system element visit beyond the DRM chip and the sign that can make amendment.Generally, explicit identification can be significant character string or other symbol, is convenient to user's name and use, is perhaps freely defined by manufacturer.Implicit identification then is the special identifier that is solidificated in the DRM chip internal, except the DRM chip of the account management system of server end and this equipment, any other system element can not have access to this sign, and the DRM chip can be revealed this sign to the outside at no time by any way.
The relation table of table 1 explicit identification ID and implicit identification ID
Figure A20061006630900121
Description of drawings
Fig. 1 is the process flow diagram that transmits implicit identification;
Fig. 2 is cured to process flow diagram in the chip to implicit identification;
Fig. 3 is the process flow diagram of endpoint registration;
Fig. 4 is the process flow diagram that obtains the encrypted permission card.
Embodiment
Below in conjunction with accompanying drawing data flow of the present invention is further described.
Fig. 1 is the process flow diagram that implicit identification produces and transmits, for each chip block, generate the explicit identification of this chip earlier by the used special software of manufacturer, software sends this explicit identification to the implicit identification maker then, maker can generate a corresponding implicit identification for it, with private key implicit identification is encrypted, the implicit identification after the encryption can transmit on http protocol, also can adopt the HTTPS agreement to send manufacturer's end to.
Fig. 2 solidifies the process flow diagram of implicit identification in the chip, and the implicit identification that manufacturer will encrypt with the PKI of the used private key correspondence of Fig. 1 is decrypted, and then implicit identification is cured in the chip.
Fig. 3 is to use the process flow diagram of the endpoint registration of the method for the invention, and terminal to server sends the request of registration account number, and server receives that terminal is replied in this request back and prompt terminal is imported information such as user account number ID, password and explicit identification.Terminal sends to server with these information, and server in corresponding account, and sends out the information that succeeds in registration with this endpoint registration to terminal.
Fig. 4 is the process flow diagram that obtains encrypted permission card, and terminal to server sends out the request of licensing, and server receives that this request back replys the explicit identification that terminal and prompt terminal are imported this equipment.Terminal sends to server with explicit identification, and server finds the implicit identification of this explicit identification correspondence, with this implicit identification and condition code license passport is encrypted.At last, server with condition code and the license passport after encrypting send to terminal.
The management of licence comprises that a plurality of terminals share the storage with merging and licence cut apart of a permission, licence.

Claims (7)

  1. One kind based on the digital content protection method of hardware device binding, may further comprise the steps:
    1) creates the digital content authorization center, be used to create the use of digital content, managing digital content and control figure content;
    2) create the licence authorization center, be used to create licence, checking licence and revise licence;
    3) create system server, be used for account executive and generate implicit identification.
  2. 2. according to claim 1 based on the digital content protection method of hardware device binding, wherein 1) create the digital content authorization center, comprising:
    The establishment of one digital content, main effect is to create the content of concluding the business easily, is implying here creating or reusing this content, will state the right of this content when perhaps existing content rights being expanded;
    The transaction of content is managed and carried out to the management of one digital content how, and this comprises that receiving a content from the founder deposits content library in, and transaction system will be carried out the management of the metadata of content description and right expression;
    The use of one digital content, the how use of organize content, this needs software according to constraint content to be conducted interviews;
    One content access function be used for making the user can be from the database that distributes accessed content and metadata, metadata can be used for describing user, right and content;
    One content business function is to be used for issuing license to those users that obtain right by transaction system, under many circumstances, content need just can meet the licence requirement through multi-pass operations, needs content is encrypted or packed under some desktop application environment.
  3. 3. according to claim 1 based on the digital content protection method of hardware device binding, wherein 2) create the licence authorization center, comprising:
    The establishment of one licence allows right is invested on the content of new establishment, describes the right owner of this content and the operation of permission;
    The checking of one licence is to be used for guaranteeing that content is based on the basis that has corresponding right creates;
    The modification of one licence is the transaction situation that is used for allowing according to different, to the operation of making amendment of user's vested in possession;
    The management of one licence guarantees the validity of the right stipulation that environment for use is relevant with content, if the user only is awarded the right of browsing, it just can not print so, and the management of licence comprises that a plurality of terminals share the storage with merging and licence cut apart of a permission, licence;
    One tracing management is under the situation that right needs restraint, the operating position of keeping track of content, and when each use all was accompanied by the generation of transaction, this function also will be carried out with transaction system alternately.
  4. 4. according to claim 1 based on the digital content protection method of hardware device binding, it is characterized in that: 3) create system server, the system server of whole DRM is made up of one group of relevant service, comprising:
    One account management, it comprises terminal user's the account management and the account management of content supplier
    1) each terminal user only just can enjoy various services after the registration in system,
    All terminals all have to register in the corresponding user account number and can use, terminal user's account number has comprised this user's essential information, transactions history, the terminal situation that has, each user can register the account of oneself through various channels, after a user registration success, server end just generates a personal air for this user, the username and password that the user distributed by when registration just can land this space, checks and manage the transaction situation of oneself
    2) account management of content supplier; the commercial city that provides in each system will be registered at the DRM management server; server distributes an account can for each content supplier; comprised among this account that content supplier offers the content registration information of DRM system; each content supplier is before content distributed; to carry out encipherment protection to content by the encryption software of special use earlier; cryptographic algorithm in the encryption software all should be that the DRM chip of terminal is supported; after content is encrypted; content supplier registers this content in the account of DRM service end; generally comprise the DOI digital object sign of content; encryption method and encryption key; when a user's download protected content and desire when it is conducted interviews; corresponding terminal device can read its DOI in the header information of protected content; then according to this DOI to the service end licensing; the information that service end can find the corresponding account of content supplier to provide by this DOI; confirming under the prerequisite of the corresponding fund of the paid mistake of this user with this content supplier; these information package are become licence and utilize the implicit identification of terminal to encrypt; send terminal at last to
    The generation of one implicit identification, it is in order to guarantee the overall uniqueness and the security of implicit identification, the DRM server will have special implicit identification maker for use, production firm will keep being connected when producing chip with this maker, for each chip block, generate the explicit identification of this chip earlier by the used special software of manufacturer, software sends this explicit identification to the implicit identification maker then, maker can generate a corresponding implicit identification for it, and be returned to manufacturer end again with secured fashion, this implicit identification at last is written into chip, in addition, manufacturer also can generate implicit identification and write in the chip by other legal method, and safety tells server end then
    3) registration and unregistration of terminal, the registration of terminal are the functions in user's the account management, and the same with user's registration, the registration of terminal also can adopt multiple mode to carry out, and wherein during the over-network registration terminal, typical operating process is as follows:
    A) user is connected to network with terminal, and starts from registering functional;
    B) the account number ID of terminal notifying user input and affirmation oneself;
    C) terminal Connection Service device sends to server with account number ID, password and the explicit ID of self;
    D) server with this endpoint registration in corresponding account;
    This benefit from registration is exactly the demonstration ID that does not need consumer recording equipment, and simple to operate, perhaps the demonstration ID of the own recording unit of user sends to server with account number ID, password and the explicit ID of self,
    In a single day terminal is registered; its all behaviors all will be associated with the account under this terminal; each terminal to apply licence, server earlier will the account under it in the access rights of the protected content bought of retrieval user, generate corresponding licence according to the authority that the user bought then.Therefore, a terminal of not registering can not be applied for licence,
    Owing to exist the possibility that terminal shifts between the account, so the user should nullify terminal from its account.
  5. 5. according to claim 1 based on the digital content protection method of hardware device binding, it is characterized in that: the form of licence is made up of following 5 parts with definition,
    1) essential information, this part have been described the DOI of the protected content of this licence correspondence, the user profile of applying for this permission, the date of formation of licence, the essential information of applying for the terminal device of this licence;
    2) right expression, this part has been described the right of the visit protected content that the user bought;
    Employed encryption method and encryption key when 3) decryption information, this part have been described protected content that should licence encrypted;
    4) share information, this part has been described this licence and can have been shared between which equipment
    Use, license the equipment of this permission for each, all comprised a condition code in the shared information corresponding, also have the key of a server end according to the implicit identification generation of this condition code and relevant device, the sender sends corresponding reciever to after can encrypting licence according to this information;
    5) residual information, this part have comprised the residual information in the protected content, for that
    Use the content of residual error cryptographic algorithm a bit, had only the information that provides in conjunction with this part just can carry out complete visit.
  6. 6. according to claim 1 based on the digital content protection method of hardware device binding, it is characterized in that: the generation of licence and backup,
    1) user need use account number ID and the password login user of oneself, selects oneself to want
    Film or other medium downloaded are downloaded this document and are finished, and then the user need oneself want the right bought according to the prompting definition of DRM administration web page, as playing on which equipment, how many days sees, plays how many times;
    2) Fare Collection System can generate a licence that comprises content noted earlier at user's selection, and according to the implicit identification of this terminal licence is encrypted, and sends user terminal to, and last, the user just can utilize licence that digital content is conducted interviews;
    3) licence of terminal is damaged or when losing, server will being permitted this generation
    Can demonstrate,prove and be backed up, in case the licence on the terminal is impaired, the user can recover corresponding permission by game server, in this course, a kind of special circumstances are arranged, if previous exactly licence has been stipulated the broadcasting time of this terminal, if licence is lost, server end can't judge that this terminal play several times, in this case, and can be according to the business rule of content supplier's definition, judge whether to accept the request that the user asks for this licence again, for simplicity, in the system of initial definition, do not allow the number of times that definition is play in the licence that a plurality of equipment are shared.
  7. 7. according to claim 1 based on the digital content protection method of hardware device binding, it is characterized in that: the management of licence comprises that a plurality of terminals share the storage with merging and licence cut apart of a permission, licence.
CNA2006100663096A 2006-03-28 2006-03-28 Digital content protection method based on bonded with hardware equipment Pending CN101046835A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2006100663096A CN101046835A (en) 2006-03-28 2006-03-28 Digital content protection method based on bonded with hardware equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2006100663096A CN101046835A (en) 2006-03-28 2006-03-28 Digital content protection method based on bonded with hardware equipment

Publications (1)

Publication Number Publication Date
CN101046835A true CN101046835A (en) 2007-10-03

Family

ID=38771439

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2006100663096A Pending CN101046835A (en) 2006-03-28 2006-03-28 Digital content protection method based on bonded with hardware equipment

Country Status (1)

Country Link
CN (1) CN101046835A (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101425112B (en) * 2008-11-18 2010-09-08 北京大学 Digital exequatur sending system and digital work decipher operation method
CN101964033A (en) * 2010-09-29 2011-02-02 江苏康众数字医疗设备有限公司 Method for generating machine identification code of flat panel detector and extended application method
CN102547473A (en) * 2011-12-14 2012-07-04 深圳市同洲视讯传媒有限公司 Registration method and system of digital television service
CN102855446A (en) * 2011-06-27 2013-01-02 Nxp股份有限公司 Resource management system and corresponding method
CN102957666A (en) * 2011-08-19 2013-03-06 中兴通讯股份有限公司 License control method and license control system
CN103200010A (en) * 2013-04-22 2013-07-10 山东省计算中心 License management method based on text watermarks
CN103237010A (en) * 2010-10-25 2013-08-07 北京中科联众科技股份有限公司 Server side for providing digital content in encryption mode
CN103345598A (en) * 2013-07-03 2013-10-09 山东省计算中心 Multiple-business-software License management method based on super-calculation Cloud service
CN104182660A (en) * 2013-05-22 2014-12-03 北大方正集团有限公司 User equipment identification management method and system for digital right management
CN104361266A (en) * 2014-11-25 2015-02-18 上海精灵天下数字技术有限公司 Copyright protection method and system of digital contents
CN104394170A (en) * 2014-12-11 2015-03-04 大唐微电子技术有限公司 Security account using method, safety device, server and system
CN105224374A (en) * 2015-11-11 2016-01-06 深圳市捷顺科技实业股份有限公司 A kind of guard method of target execute file, Apparatus and system
CN103902879B (en) * 2012-12-26 2017-04-26 歌乐株式会社 Service management apparatus and service management method
WO2018072471A1 (en) * 2016-10-19 2018-04-26 华为技术有限公司 Detection method, device and system for copyright protection
CN108140073A (en) * 2015-07-08 2018-06-08 Ipra科技有限公司 For providing a user the method and system for the access right for accessing limitation content
CN111597545A (en) * 2020-05-19 2020-08-28 北京海泰方圆科技股份有限公司 Authorization management method and device
CN111815181A (en) * 2020-07-12 2020-10-23 成都信息工程大学 Agricultural product quality safety detection management system
US11500968B2 (en) 2014-01-08 2022-11-15 Lauri Valjakka Method of and system for providing access to access restricted content to a user
CN117349822A (en) * 2023-12-04 2024-01-05 腾讯科技(深圳)有限公司 Data processing method, device, computer equipment, storage medium and program product

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101425112B (en) * 2008-11-18 2010-09-08 北京大学 Digital exequatur sending system and digital work decipher operation method
CN101964033A (en) * 2010-09-29 2011-02-02 江苏康众数字医疗设备有限公司 Method for generating machine identification code of flat panel detector and extended application method
CN101964033B (en) * 2010-09-29 2013-01-16 江苏康众数字医疗设备有限公司 Method for generating machine identification code of flat panel detector and extended application method
CN103237010A (en) * 2010-10-25 2013-08-07 北京中科联众科技股份有限公司 Server side for providing digital content in encryption mode
CN103237010B (en) * 2010-10-25 2016-12-28 北京中科联众科技股份有限公司 The server end of digital content is cryptographically provided
CN102855446B (en) * 2011-06-27 2015-06-10 Nxp股份有限公司 Resource management system and corresponding method
CN102855446A (en) * 2011-06-27 2013-01-02 Nxp股份有限公司 Resource management system and corresponding method
CN102957666A (en) * 2011-08-19 2013-03-06 中兴通讯股份有限公司 License control method and license control system
CN102547473A (en) * 2011-12-14 2012-07-04 深圳市同洲视讯传媒有限公司 Registration method and system of digital television service
CN103902879B (en) * 2012-12-26 2017-04-26 歌乐株式会社 Service management apparatus and service management method
CN103200010A (en) * 2013-04-22 2013-07-10 山东省计算中心 License management method based on text watermarks
CN103200010B (en) * 2013-04-22 2015-08-12 山东省计算中心 A kind of License Management method based on Text Watermarking
CN104182660A (en) * 2013-05-22 2014-12-03 北大方正集团有限公司 User equipment identification management method and system for digital right management
CN103345598B (en) * 2013-07-03 2015-11-18 山东省计算中心 Based on many business softwares License Management method of super calculation cloud service
CN103345598A (en) * 2013-07-03 2013-10-09 山东省计算中心 Multiple-business-software License management method based on super-calculation Cloud service
US11500968B2 (en) 2014-01-08 2022-11-15 Lauri Valjakka Method of and system for providing access to access restricted content to a user
CN104361266A (en) * 2014-11-25 2015-02-18 上海精灵天下数字技术有限公司 Copyright protection method and system of digital contents
CN104394170A (en) * 2014-12-11 2015-03-04 大唐微电子技术有限公司 Security account using method, safety device, server and system
CN108140073A (en) * 2015-07-08 2018-06-08 Ipra科技有限公司 For providing a user the method and system for the access right for accessing limitation content
CN105224374A (en) * 2015-11-11 2016-01-06 深圳市捷顺科技实业股份有限公司 A kind of guard method of target execute file, Apparatus and system
WO2018072471A1 (en) * 2016-10-19 2018-04-26 华为技术有限公司 Detection method, device and system for copyright protection
US11127097B2 (en) 2016-10-19 2021-09-21 Huawei Technologies Co., Ltd. Method, apparatus, and system for copyright rights defense detection
CN111597545A (en) * 2020-05-19 2020-08-28 北京海泰方圆科技股份有限公司 Authorization management method and device
CN111815181A (en) * 2020-07-12 2020-10-23 成都信息工程大学 Agricultural product quality safety detection management system
CN111815181B (en) * 2020-07-12 2023-11-10 成都信息工程大学 Agricultural product quality safety detection management system
CN117349822A (en) * 2023-12-04 2024-01-05 腾讯科技(深圳)有限公司 Data processing method, device, computer equipment, storage medium and program product
CN117349822B (en) * 2023-12-04 2024-04-09 腾讯科技(深圳)有限公司 Data processing method, device, computer equipment, storage medium and program product

Similar Documents

Publication Publication Date Title
CN101046835A (en) Digital content protection method based on bonded with hardware equipment
CN1292376C (en) Method and system for digital rights management in content distribution applications
CN100421102C (en) Digital rights management structure, portable storage device, and contents management method using the portable storage device
EP1942430B1 (en) Token Passing Technique for Media Playback Devices
CN100517297C (en) Method and apparatus for digital rights management using certificate revocation list
CN1937495B (en) Digital copyright protection method and system for media network application
CN101951360B (en) Interoperable keychest
CN101518029B (en) Method for single sign-on when using a set-top box
US20030220880A1 (en) Networked services licensing system and method
CN1391375A (en) Electronic content transmission via network by hybrid disc for verification
US20060080526A1 (en) Login system and method
CN101286994B (en) Digital literary property management method, server and system for content sharing within multiple devices
CN1658111A (en) Binding content to an entity
CN101546366B (en) Digital copyright management system and management method
CN1914578A (en) Digital rights management
CN101107611A (en) Private and controlled ownership sharing
JPH11507774A (en) Access control system and method for data storage medium
WO2006109982A1 (en) License data structure and license issuing method
WO2005116794A1 (en) License management in a privacy preserving information distribution system
WO2007010427A1 (en) Digital inheritance
TW200949607A (en) Binding content licenses to portable storage devices
CN101390134A (en) Method for redistributing DRM protected content
WO2007045257A1 (en) A method for controlling access to file systems, related system, sim card and computer program product for use therein
US7770001B2 (en) Process and method to distribute software product keys electronically to manufacturing entities
CN101118634B (en) Process for generating licenses and system thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication