CN101256611B - Method for implementing digital copyright management protection in Java application - Google Patents

Method for implementing digital copyright management protection in Java application Download PDF

Info

Publication number
CN101256611B
CN101256611B CN2008100664793A CN200810066479A CN101256611B CN 101256611 B CN101256611 B CN 101256611B CN 2008100664793 A CN2008100664793 A CN 2008100664793A CN 200810066479 A CN200810066479 A CN 200810066479A CN 101256611 B CN101256611 B CN 101256611B
Authority
CN
China
Prior art keywords
java
steps
management information
rights management
digital rights
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2008100664793A
Other languages
Chinese (zh)
Other versions
CN101256611A (en
Inventor
刘轶
仝庆贻
卢忱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN2008100664793A priority Critical patent/CN101256611B/en
Publication of CN101256611A publication Critical patent/CN101256611A/en
Application granted granted Critical
Publication of CN101256611B publication Critical patent/CN101256611B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a method for realizing management and protection for digital copyright in Java application, relating to the field of management and protection for digital copyright in Java application. The method comprises the following steps of: A1, pre-setting a Java application program describer file comprising the management information for the digital copyright; A2, when the application starts up, first of all, analyzing the Java application program describer file to obtain the management information for the digital copyright; then executing the management and protection for digital copyright in Java application. By using above proposal, the invention adds DRM attribute in the JAD file, thus solving the problem about the accomplishment of DRM protection in various Java applications; and for the mobile phones which does not support the DRM function, the invention also realize to control the copyright in the Java application.

Description

A kind of method that in Java uses, realizes digital copyright management protection
Technical field
The present invention relates to the digital copyright management protection that Java uses; in particular; a kind of passing through at JAD (Java Application Descriptor; the java application describer) increases DRM (Digital Rights Management in the file; digital copyright management) attribute, the method for realization digital copyright management protection in Java uses.
Background technology
The Java technology has become the standard of smart mobile phone software platform, writes application program and provide the people of service to be concerned about that the mobile phone of accepting its service adopts is what operating system and chip, as long as go to write a program according to the requirement of Java; Equally, the manufacturer of production mobile phone also needn't worry, and who provides value added service in the future.Therefore, adopt the Java technology, can set up complete, the industrial chain of wireless data value-added service efficiently, thereby for the user provides flexibly, personalized, the various service of content way.
The basic Java platform of Java cell phone software platform employing at present is CLDC (ConnectedLimited Device Configuration, limited connection device disposes) and MIDP (MobileInformation Device Profile, Mobile Information Device Profile), belong to J2ME (Java 2MicroEdition, the pocket edition of Java2 platform, be also referred to as miniature edition or scaled-down version), be commonly called as " Wireless Java " technology, formal name in SUN company is called KVM (The K Virtual Machine, K virtual machine).
KVM, promptly J2ME is the Java software that Sun Microsystems is exclusively used in embedded device, and service routines such as recreation, personal information processing, electronic chart, stock can be provided for the cellphone subscriber.J2ME is a solution of being devoted to consumer products and embedded device, and it divides into two kinds substantially with all embedded equipments: a kind of is the embedded equipment that calculation function is limited, electric power supply is also limited, as PDA, mobile phone etc.; Another be arithmetic capability preferable relatively and in electric power supply relatively sufficient embedded equipment, for example air conditioner, refrigerator etc.Because these two kinds of differentiations, so Java has introduced the notion of Configuration (configuration), the embedded equipment limited above-mentioned calculation function, that electric power is limited is defined among the CLDC specification; And another is installed standard is CDC (ConnectedDevice Configuration, connection device configuration) specification.That is to say that J2ME utilizes the conceptual regions of Configuration to be divided into two kinds of abstract kenels earlier to all embedded equipments.
DRM (Digital Rights Management; digital copyright management) be along with the electronics audio/video program on the internet wide-scale distribution and a kind of technology of growing up; its principle of work is: at first set up the digital program authorization center; the digital program content that coding has compressed; utilize key that content is carried out encipherment protection then; URL (Uniform Resource Location, the URL(uniform resource locator)) address that the digital program head of encrypting is being deposited KeyID and program authorization center.The user according to the KeyID and the URL information of program head, sends relevant secret key decryption after the checking mandate by the digital program authorization center in a sowing time, can broadcast program.In the implementation of DRM, send to the mode of customer mobile terminal according to the download content of right objects and encapsulation, generally can be divided into three kinds of forward-lock (forwarding is forbidden), combined delivery (combination sends) and separate delivery (transmission respectively).
But, during the Java that can download at present uses, much all be to use by the Java that operator promotes on the network of oneself; Therefore, some situation is that present DRM2.0 can't satisfy or be difficult to and realizes; For example, operator offers the Java recreation that the user tries out etc., and perhaps operator is provided with different rights of using etc. according to different paying customers, for various Java use, and perhaps controls using at interval, use Java such as duration, delete property to use.
And present DRM2.0 also requires mobile phone must support the DRM function, otherwise just can't realize the copyright control to the JAVA application.
Therefore, there is defective in prior art, needs to improve.
Summary of the invention
Technical matters to be solved by this invention is in various Java use, how realizes the DRM protection, and, in the mobile phone of not supporting the DRM function, how to realize copyright control that JAVA is used.
Technical scheme of the present invention is as follows:
A kind of method that in Java uses, realizes digital copyright management protection, it may further comprise the steps: A1, pre-set java application describer file, wherein comprise digital rights management information; When A2, Java application start, at first resolve described java application describer file, obtain described digital rights management information, carry out the digital copyright management protection that described Java is used.
Described method, wherein, in the steps A 1, described digital rights management information is set to the digital copyright management attribute list.
Described method, wherein, described digital rights management information comprises one of the following at least: forbid forwarding, access times restriction, use the date to limit, use interval constraint, the restriction of use duration.
Described method; wherein; after steps A 2 is obtained described digital rights management information; also carry out following steps: judge whether described digital rights management information comprises one of the following at least: forbid forwarding, access times restriction, use the date to limit, use interval constraint, the restriction of use duration; be then according to every digital rights management information, carry out the digital copyright management protection that described Java is used.
Described method wherein, when also carrying out following steps: A301, Java application repeated priming after the steps A 2, according to described digital rights management information, judges whether that continuing to carry out described Java uses, otherwise carries out A302; Whether A302, prompting user delete described JAVA application; A303, judging that whether user's feedback information is to agree deletion, is then to delete described JAVA to use.
Described method, wherein, described digital rights management information also comprises automatic deletion information; And, after steps A 2 is obtained described digital rights management information, also carry out following steps: A21, judge that described digital rights management information whether for deleting information automatically, is then to carry out A22; A22, delete described JAVA automatically and use.
Described method, wherein, also carry out following steps before the steps A 22: whether the prompting user deletes described JAVA is used, and judges whether user's feedback information is to agree to delete, and is execution in step A22 then.
Described method wherein, is also carried out following steps: A3 after the steps A 2, according to the result of described digital copyright management protection, judges whether that continuing to carry out described Java uses.
Described method, wherein, steps A 2 is carried out in the equipment that meets limited connection device configuration.
Described method, wherein, steps A 2 is carried out in mobile phone.
Adopt such scheme, the present invention has solved in various Java use by increase the DRM attribute in the JAD file, realizes the problem of DRM protection; And,, also realized the copyright control that JAVA is used for the mobile phone of not supporting the DRM function.
Description of drawings
Fig. 1 is the process flow diagram of the inventive method.
Embodiment
Below in conjunction with the drawings and specific embodiments, the present invention is described in detail.
Purport of the present invention is, by increase the DRM attribute list in the JAD file, provides a kind of in Java uses, and realizes the solution of DRM protection.As shown in Figure 1, the invention provides a kind of method that realizes the DRM protection in Java uses, it may further comprise the steps.
A1, pre-set java application describer file, wherein comprise DRM information; Wherein, described DRM information comprises one of the following at least: forbid forwarding, access times restriction, use the date to limit, use interval constraint, the restriction of use duration.
Generally speaking, can be the DRM attribute list with described DRM information setting, like this, help improving storage and search efficiency.
When A2, Java application start, at first resolve described java application describer file, obtain described DRM information, carry out the DRM protection that described Java is used.Generally speaking, steps A 2 is carried out in the equipment that meets limited connection device configuration.For example, steps A 2 is carried out in mobile phone.
At first need to resolve the DRM attribute list in JAD (Java Application Descriptor, the java application describer) file, comprised size, title, type, installation path, copyright or the like the information of program in the JAD file.
That is to say, when starting the Java application, before carrying out the Java application, AMS (ApplicationManagement System, application program management software), be also referred to as JAM (Java ApplicationManager, java application manager), at first need to resolve corresponding JAD file, and successfully obtain the DRM attribute list that this Java uses.
For example, the DRM attribute list mainly comprises following several: FL (forbidding transmitting), Count (access times restriction), Datetime (using the date restriction), Interval time (use interval constraint), TIME summation (using the duration restriction), Delete (delete property), wherein, delete property generally cooperates other attribute to use, as the access times restriction etc., other DRM attribute arrives the restriction back and whether deletes JAVA automatically according to this determined property and use.
Then, the DRM that carries out Java according to the DRM property value of resolving protects; For example, mobile phone is finished as requested JAVA is used the restriction of using after finishing the DRM attribute of JAD file being resolved, and these restrictions comprise that above-mentioned forbidding transmit, and the date restriction is used in the access times restriction, uses interval constraint and uses duration restriction etc.
An example is, after obtaining described DRM information, can also carry out following steps: judge whether described DRM information comprises one of the following at least: forbid forwarding, access times restriction, use the date to limit, use interval constraint, the restriction of use duration, judge that promptly described Java uses the protection that whether is subjected to digital copyright management; Be then according to every DRM information, carry out the DRM protection that described Java is used.
When because the reason of DRM protection, when causing application on the mobile phone not move once more,, then can provide the prompting of whether deleting to the user according to delete property if the user attempts to use this application.If it is then to delete this application that the user selects.Like this, just can realize that the automatically prompting user deletion is subjected to the function of the protection Java application of digital copyright management protection.
An example is can also carry out following steps after the steps A 2:
When A301, a certain Java use repeated priming,, judge whether that continuing to carry out described Java uses, otherwise carry out A302 according to described DRM information; After promptly resolving described java application describer file, obtain described DRM information,, judge whether that continuing to carry out described Java uses then according to described DRM information.If satisfy DRM information, meet the condition that described Java uses that repeats, then continue to carry out described Java and use.
Whether A302, prompting user delete described JAVA application; In the practical application, also can directly delete described JAVA and use according to different authorities, different priority or the condition that pre-sets from user terminal.
A303, judging that whether user's feedback information is to agree deletion, is then to delete described JAVA to use.A timer can be set here, in the time that pre-sets,, then can handle, for example directly delete or abandon this deletion action according to the mode that pre-sets if do not obtain user's feedback information.
Another example is that described DRM information also comprises automatic deletion information; And, after steps A 2 is obtained described DRM information, also carry out following steps: A21, judge that described DRM information whether for deleting information automatically, is then to carry out A22; A22, delete described JAVA automatically and use.Wherein, also carry out following steps before the steps A 22: whether the prompting user deletes described JAVA is used, and judges whether user's feedback information is to agree to delete, and is execution in step A22 then.
Another example is, also carries out following steps: A3 after the steps A 2, according to the result of described DRM protection, judges whether that continuing to carry out described Java uses.
Provide a complete example below again, the inventive method is specifically described.
Step 1: resolve the DRM attribute list in the JAD file.
Before the Java application start, AMS at first needs to resolve corresponding JAD file, and successfully obtains the DRM attribute list that this Java uses.
Need to add the definition for special key assignments in the JAD file that Java uses, it is as follows to illustrate the JAD file:
MIDlet-Description:This?MIDlet?is?released?by?www.imusic.com.cn
MIDlet-Info-URL:http://www.imusic.com.cn/wapdiyJavalist.php
MIDlet-1:ExtremeAir?Music,icon.png,GameMIDlet
MIDlet-Name:Music
MIDlet-Vendor:VMusic
MIDlet-Version:1.0.1
MIDlet-Jar-Size:66679
MIDlet-Jar-URL:Music.jar
Below/the * be DRM attribute list */
DRM-FL:YES
DRM-Count:5
DRM-datetime:none
DRM-interval?time:none
DRM-TIME?summation:none
Step 2: the DRM that carries out Java according to the DRM property value of resolving protects.
Mobile phone is finished as requested Java is used the restriction of using after finishing the DRM attribute of JAD file being resolved.
DRM-FL is YES, illustrates that this Java uses to forbid transmitting.
DRM-Count:n, it is inferior to illustrate that then this Java application can move n (n is an integer), and after n time, mobile phone forbids that the user moves this application, and the prompting user deletes this application.
DRM-datetime:x x month x day x hour, this Java uses and can move before this date, and mobile phone forbids that the user moves this application after this date, and the prompting user deletes this application.
DRM-interval time:x hour x minute, after this is used in operation, must surpass this time at interval, Java uses and just allows to move once more.
DRM-TIME summation:x hour x minute, it was this time that the user uses the time of this application, and when the time that user's accumulative total is used reached this time, then the user no longer can use this application, and the prompting user deletes this application.
Step 3: automatically prompting user deletion Java uses; Because DRM protection, when causing application on the mobile phone not move once more, when the user attempts to use this application, should provide the prompting of whether deleting to the user.If it is then to delete this application that the user selects.
Adopt the inventive method,, solved in various Java use, realize the problem of DRM protection by in the JAD file, increasing the DRM attribute; And,, also realized the copyright control that JAVA is used for the mobile phone of not supporting the DRM function.
Should be understood that, for those of ordinary skills, can be improved according to the above description or conversion, and all these improvement and conversion all should belong to the protection domain of claims of the present invention.

Claims (8)

1. method that in Java uses, realizes digital copyright management protection, it may further comprise the steps:
A1, pre-set java application describer file, wherein comprise digital rights management information, described digital rights management information comprises one of the following at least: forbid forwarding, access times restriction, use the date to limit, use interval constraint, the restriction of use duration;
When A2, Java application start, at first resolve described java application describer file, obtain described digital rights management information, carry out the digital copyright management protection that described Java is used.
2. method according to claim 1 is characterized in that, in the steps A 1, described digital rights management information is set to the digital copyright management attribute list.
3. method according to claim 1 is characterized in that, after steps A 2 is obtained described digital rights management information, also carries out following steps:
Judge whether described digital rights management information comprises one of the following at least: forbid forwarding, access times restriction, use the date to limit, use interval constraint, the restriction of use duration; be then according to every digital rights management information, carry out the digital copyright management protection that described Java is used.
4. method according to claim 3 is characterized in that, also carries out following steps after the steps A 2:
When A301, Java use repeated priming,, judge whether that continuing to carry out described Java uses, otherwise carry out A302 according to described digital rights management information;
Whether A302, prompting user delete described JAVA application;
A303, judging that whether user's feedback information is to agree deletion, is then to delete described JAVA to use.
5. method according to claim 1 is characterized in that, described digital rights management information also comprises automatic deletion information;
And, after steps A 2 is obtained described digital rights management information, also carry out following steps:
A21, judge that described digital rights management information whether for deleting information automatically, is then to carry out A22;
A22, delete described JAVA automatically and use.
6. method according to claim 5 is characterized in that, also carries out following steps before the steps A 22: whether the prompting user deletes described JAVA is used, and judges whether user's feedback information is to agree to delete, and is execution in step A22 then.
7. method according to claim 1 is characterized in that, also carries out following steps: A3 after the steps A 2, according to the result of described digital copyright management protection, judges whether that continuing to carry out described Java uses.
8. according to the arbitrary described method of claim 1 to 7, it is characterized in that steps A 2 is carried out in mobile phone.
CN2008100664793A 2008-04-03 2008-04-03 Method for implementing digital copyright management protection in Java application Active CN101256611B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008100664793A CN101256611B (en) 2008-04-03 2008-04-03 Method for implementing digital copyright management protection in Java application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008100664793A CN101256611B (en) 2008-04-03 2008-04-03 Method for implementing digital copyright management protection in Java application

Publications (2)

Publication Number Publication Date
CN101256611A CN101256611A (en) 2008-09-03
CN101256611B true CN101256611B (en) 2011-04-20

Family

ID=39891427

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008100664793A Active CN101256611B (en) 2008-04-03 2008-04-03 Method for implementing digital copyright management protection in Java application

Country Status (1)

Country Link
CN (1) CN101256611B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101478599B (en) * 2009-01-20 2011-07-06 华为终端有限公司 JAVA program installation method and device in mobile communication terminal thereof
CN101847103A (en) * 2010-04-21 2010-09-29 华为终端有限公司 Method and device for running JAVA application
CN102194077B (en) * 2011-03-10 2017-02-08 中兴通讯股份有限公司 Application program copyright protection method and digital copyright protection system
CN109255207B (en) * 2017-07-14 2022-07-01 中国电力科学研究院有限公司 Application program authentication system and authentication method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005119396A1 (en) * 2004-06-04 2005-12-15 Nokia Corporation A method and device for determining whether an application should access protected digital content
CN1955971A (en) * 2005-10-27 2007-05-02 北京振戎融通通信技术有限公司 Safety installation method suitable for Java application program

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005119396A1 (en) * 2004-06-04 2005-12-15 Nokia Corporation A method and device for determining whether an application should access protected digital content
CN1955971A (en) * 2005-10-27 2007-05-02 北京振戎融通通信技术有限公司 Safety installation method suitable for Java application program

Also Published As

Publication number Publication date
CN101256611A (en) 2008-09-03

Similar Documents

Publication Publication Date Title
CN100574528C (en) Storage and visit data in mobile device and line module
US8666363B2 (en) System and method for downloading user interface components to wireless devices
TWI311880B (en) Method of providing access to encrypted content to one of a plurality of consumer systems, device for providing access to encrypted content and method of generating a secure content package
JP5688458B2 (en) System and method for securely using multiple subscriber profiles in security components and portable communication devices
CN100343844C (en) Apparatus for data distribution and terminal for data distribution
CN101091156A (en) System and method for providing a multi-credential authentication protocol
CN111741028B (en) Service processing method, device, equipment and system
US20120272072A1 (en) Apparatus and method for processing application package in portable terminal
CN1386385A (en) Method for processing and transmitting data on a mobile telephone network and microchip onboard system
CN103455520A (en) Method and device for accessing Android database
CN103095457A (en) Login and verification method for application program
CN204360381U (en) mobile device
CN101256611B (en) Method for implementing digital copyright management protection in Java application
CN101223757A (en) Content transfer control for wireless devices
CN108418785B (en) Password calling method, server and storage medium
CN107241620B (en) Digital rights management method of media content, DRM client and server
CN101355770B (en) Method and system for virtually spreading capacity of user recognizing module card
EP1507211A1 (en) Communication device
JP4653403B2 (en) Program distribution system and method for permitting use of program
CN1470141A (en) Method for distributing customized data for mobile telephone network
CN106911632B (en) Method and system for packaging calling capability
CN101375543A (en) Apparatus and method for moving rights object from one device to another device via server
CN1984482B (en) Method and mobile terminal for limiting user to medium object operation
CN102279741A (en) Service processing method of smart card and smart card
CN105335673A (en) Information safety processing method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant