CN101606148A - Be used to limit the method for using harmful multimedia file - Google Patents

Be used to limit the method for using harmful multimedia file Download PDF

Info

Publication number
CN101606148A
CN101606148A CNA2007800487260A CN200780048726A CN101606148A CN 101606148 A CN101606148 A CN 101606148A CN A2007800487260 A CNA2007800487260 A CN A2007800487260A CN 200780048726 A CN200780048726 A CN 200780048726A CN 101606148 A CN101606148 A CN 101606148A
Authority
CN
China
Prior art keywords
multimedia file
harmful
file
harmful multimedia
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2007800487260A
Other languages
Chinese (zh)
Other versions
CN101606148B (en
Inventor
李奇铉
申政勋
丁相权
金相完
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
PLANTY-NET Ltd
Planty Net Co Ltd
Original Assignee
PLANTY-NET Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by PLANTY-NET Ltd filed Critical PLANTY-NET Ltd
Publication of CN101606148A publication Critical patent/CN101606148A/en
Application granted granted Critical
Publication of CN101606148B publication Critical patent/CN101606148B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8352Generation of protective data, e.g. certificates involving content or source identification data, e.g. Unique Material Identifier [UMID]

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Tourism & Hospitality (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • General Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention discloses a kind of method of using harmful multimedia file that limits, described method comprises: harmful multimedia DB construction step, whether each multimedia file that checking is collected via the Internet is corresponding to harmful multimedia file, extraction is used to identify the identifier and the metamessage of harmful multimedia file, and the described identifier that will extract and metamessage be stored in server DB in; Harmful multimedia DB transmitting step, the described harmful multimedia DB that will construct in harmful multimedia DB construction step is transferred to subscriber computer; The user connects user's blacklist constitution step, and searching multimedia files in described subscriber computer compares described multimedia file and the described harmful multimedia DB that searches, and structure is the blacklist of the list of harmful multimedia file; And stop harmful multimedia file to use step, the user will be used in blacklist and the described harmful multimedia DB that multimedia file in the described subscriber computer and described user meet the user to be compared in turn, and stop the use of described multimedia file during corresponding to harmful multimedia file at described multimedia file, wherein, also carry out the harmful multimedia file encrypting step of described harmful multimedia file being encrypted and being stored in the described subscriber computer.

Description

Be used to limit the method for using harmful multimedia file
Technical field
[1] the present invention relates to a kind ofly be used for restriction and use harmful multimedia file (for example, harmful movie file) method, relate in particular to a kind of like this method: the harmful film DB that when the movie file that will use in subscriber computer, constructs in advance by search, the user connects user's blacklist and/or the white list that the user meets the user, (for example make it possible to use more quickly, reappear) harmless film and make it possible to limit more accurately and use harmful film, and be encrypted in harmful movie file of registering in the blacklist so that harmful movie file can not be used in other subscriber computers of also not installing according to system of the present invention, distributed again thereby prevent to be harmful to movie file.
Background technology
[2] a kind of conventional method of using in subscriber computer of restriction harmful multimedia file that is widely used in is carried out as follows: specific supplier or system are distributed in the harmful multimedia file on the Internet by collection and extract eigenvalue and construct harmful multimedia DB from harmful multimedia file, the harmful multimedia DB that constructs is installed in the subscriber computer, and, limit the use of described file when determining when being used in file in the subscriber computer corresponding to the file of in the harmful multimedia DB that installs, registering.According to described conventional method, owing to can construct the DB that only is used to be distributed in the harmful multimedia file on the Internet, therefore there are the following problems: be not distributed on the Internet or the harmful multimedia file that is difficult to collect still can be used without restriction.
[3] simultaneously, another kind is used to stop the conventional method of harmful film, for example, a kind of is disclosed method in the Korean Patent of 10-0517645 at the registration publication number, carry out as follows: search is distributed in the harmful content on the Internet, from all or part of of harmful content of searching, extract the hashed value of harmful content, the harmful content DB of structure, the harmful content DB that constructs is sent to subscriber computer, to be transmitted from subscriber computer, extract hashed value in all or part of of the file of editor and/or reproduction (execution), the hashed value of file and the hashed value of the harmful content among harmful content DB are compared, and, stop transmission or carry out this document and/or deletion this document when described file during corresponding to harmful content.According to described routine techniques, no matter when when subscriber computer will be when driving executive routine such as the film reproduction program and for example reappear movie file, all need from file, to extract the hashed value of the peculiar value that is regarded as this document, the hashed value extracted and all hashed values among harmful content DB are compared, and judge that whether file is corresponding to the file of registering in harmful content DB.In addition, according to routine techniques, even harmful film also must always be waited for the preset time section before by normal reproduction.Usually, the movie file that is reproduced in subscriber computer comprises than the more harmless movie file of harmful movie file, and the recurrent frequency of harmless movie file is more much higher than the recurrent frequency of harmful movie file.Therefore, searching for whole harmful film DB when movie file will be reproduced is unusual poor efficiency.
[4] as mentioned above,, when use is harmful to movie file, use the method for forced termination such as the process of the film reproduction program of using described file according to routine techniques, or the method for deleting described file.When carrying out harmful film prevention technology in the mode of commerce services, mainly use the method for the corresponding process of forced termination.In this case, usually, (for example guard pattern or management mode) when successfully finishing the appropriate authentication process, the harmful movie file of permission to use is so that check the record of the harmful movie file of visit.Yet in this case, although verified harmful movie file, harmful movie file is not deleted from subscriber computer and is still stayed put.Therefore, when described harmful movie file not deleted and that stay is sent to another computing machine that harmful film prevention function is not installed by laser disc copy or the like, therefore harmful movie file can be used without restriction, still has restriction at the file that stops on one's own initiative even be verified as harmful movie file aspect distribution again.
Summary of the invention
Technical matters
[5] therefore, the present invention is intended to solve the problems referred to above that occur in the prior art, and the invention provides a kind of verification method, this method is used for stoping the use of this document at subscriber computer during corresponding to harmful multimedia file more quickly at file, and be used for making that as soon as possible this document uses at subscriber computer during corresponding to harmless multimedia file, and can whether be not the time delay of harmful multimedia file overspending at authenticating documents at file.In addition, the invention provides and a kind ofly be used for making central prevention system to collect on one's own initiative not distributing but be present in the method for the harmful multimedia file of subscriber computer by the Internet.In addition, the invention provides a kind of like this method: when multimedia file once was verified as harmful multimedia file in subscriber computer, not only restriction or the use of prevention multimedia file in subscriber computer, if being transferred to another computing machine, file extremely in another computing machine, can not normally use this document, thereby the prevention harmful multimedia file is distributed or is propagated by the Internet, and safe internet environment is provided thus.
Technical scheme
[6] according to a scheme of the present invention, for limit harmful multimedia file with subscriber computer that the Internet is connected in use, a kind of method of using harmful multimedia file that limits is provided, described method comprises:
[7] harmful multimedia DB construction step, whether each multimedia file that checking is collected via the Internet is corresponding to harmful multimedia file, extraction is used to identify the identifier and the metamessage of harmful multimedia file, and the described identifier that will extract and metamessage be stored in server DB in;
[8] harmful multimedia DB transmitting step, the described harmful multimedia DB that will construct in described harmful multimedia DB construction step is transferred to subscriber computer; The user connects user's blacklist constitution step, and searching multimedia files in described subscriber computer compares described multimedia file and the described harmful multimedia DB that searches, and
[9] structure blacklist, described blacklist is the list of harmful multimedia file; And stop harmful multimedia file to use step, the user will be used in blacklist and the described harmful multimedia DB that multimedia file in the described subscriber computer and described user meet the user to be compared in turn, and when being equivalent to harmful multimedia file, described multimedia file stops the use of described multimedia file
[10] wherein, the described user blacklist constitution step that meets the user with stop harmful multimedia file use at least one step in the step comprise with described harmful multimedia file encrypt be stored in described subscriber computer in so that prevent the harmful multimedia file encrypting step that described harmful multimedia file is distributed to different users or is used by different users.
[11] according to another aspect of the present invention, described method further comprises the steps: after described harmful multimedia file encrypting step, deciphering and reappear encrypted described harmful multimedia file when encrypted described harmful multimedia file will be reproduced with the administrator mode that has passed through verification process in described subscriber computer.
[12] in accordance with yet a further aspect of the invention, described method further comprises: the user connects user's white list constitution step, the blacklist constitution step that meets the user with described user is identical, construct white list by searching multimedia files in described subscriber computer, described white list is the list of harmless multimedia file; And harmless multimedia file uses instant permission step, wherein, by searching for the white list that described user meets the user before the blacklist constitution step that meets the user the described user of execution, when being judged as harmless multimedia file, the multimedia file in will being used in described subscriber computer permits the use of described multimedia file immediately.
[13] according to another aspect of the present invention, described method further comprises: verification msg produces and transmitting step, extract the identifier that is used for file identification in described subscriber computer each multimedia file from be stored in described subscriber computer, extract screen frame and metamessage in from the described multimedia file of storage each, and the described identifier that will extract and at least one in screen frame and the metamessage are transferred to described server; And
[14] harmful multimedia DB and subscriber computer step of updating, by producing and whether transmitting step verifies described multimedia file corresponding to harmful multimedia file from the verification msg that is stored in each multimedia file the described subscriber computer that described subscriber computer transmits, and whether update stored in the described harmful multimedia DB in the described server or be stored in described white list in the described subscriber computer corresponding to harmful multimedia file according to each multimedia file by described verification msg.
Beneficial effect
[15] according to the present invention, overcome the restriction of conventional harmful multimedia file collection technique, and even also upgraded harmful multimedia DB, thereby can provide the function of the use that more effectively limits harmful multimedia file for the harmful multimedia file of also not propagating and only being stored in the subscriber computer by the Internet.
[16] equally, according to the present invention,, the performance reduction phenomenon of the subscriber computer that causes owing to the harmful multimedia file use restriction system of installing is minimized by according to every subscriber computer structure and operation blacklist and white list.In addition, because the harmful multimedia file by the subscriber computer sign is encrypted, therefore, can not use harmful multimedia file, thereby prevent that harmful multimedia file from being propagated even harmful multimedia file is distributed to another computing machine again by the Internet or other physical instrument.Equally, by insert predetermined identification code based on encryption, can control of the transmission of described encrypted file on one's own initiative by the Internet traffic circuit.
[17] utilize above-mentioned effect, father and mother can allow their minor children to use the Internet, and young boy and girl can avoid owing to the rashness of harmful multimedia content is used the injury that causes and can be had correct and healthy thought.In addition, the circulation of the harmful multimedia file that occupies a large amount of network bandwidths can be reduced, thereby effective and useful network infrastructure can be guaranteed in China.
Description of drawings
[18] following detailed description in conjunction with the drawings, above and other objects of the present invention, feature and advantage will become obviously, wherein:
[19] Fig. 1 is the process flow diagram that shows according to the step of the method for an exemplary embodiment of the present invention;
[20] Fig. 2 is the process flow diagram that shows according to the step of the method that also comprises decryption/reproduction step except that the step of Fig. 1 of an exemplary embodiment of the present invention;
[21] Fig. 3 is the process flow diagram that shows according to the method that comprises the white list constitution step of an exemplary embodiment of the present invention;
[22] Fig. 4 is the block scheme that shows according to the configuration of the system of an exemplary embodiment of the present invention, server in described system (that is remote system) structure and upgrade harmful multimedia DB and subscriber computer structure blacklist and white list;
[23] Fig. 5 shows to judge that the multimedia file that uses in the subscriber computer is whether corresponding to the process flow diagram of the process of harmful multimedia file; And
[24] Fig. 6 is for systematically showing the process flow diagram according to the method for various exemplary embodiment of the present invention.
Embodiment
[25] below, exemplary embodiment of the present invention will be described in conjunction with the accompanying drawings.
[26] at first, will whole structure according to the method for an exemplary embodiment of the present invention be described step by step in conjunction with Fig. 1.According to an exemplary embodiment of the present invention, there is a kind of method of using harmful multimedia file that is used to limit, described method comprises: harmful multimedia DB construction step 100, whether each multimedia file that checking is collected via the Internet is corresponding to harmful multimedia file, extraction is used to identify the identifier and the metamessage of harmful multimedia file, and among the DB that the identifier that extracts and metamessage are stored in server; Harmful multimedia DB transmitting step 200, the harmful multimedia DB that will construct in harmful multimedia DB construction step is transferred to subscriber computer; The user connects user's blacklist constitution step 300, and searching multimedia files in subscriber computer compares multimedia file and the harmful multimedia DB that searches, and the structure blacklist, and this blacklist is the list of harmful multimedia file; And stop harmful multimedia file to use step 400, the user will be used in blacklist and the harmful multimedia DB that multimedia file in the subscriber computer and user meet the user to be compared in turn, and stop the use of multimedia file during corresponding to harmful multimedia file at multimedia file, wherein, the user connects user's blacklist constitution step 300 and stops harmful multimedia file to use at least one step in the step to comprise harmful multimedia file encrypting step 500, harmful multimedia file is encrypted and is stored in the subscriber computer so that prevent harmful multimedia file to be distributed to different users or to be used by different users.
[27] preferably, as shown in Figure 2, described method may further include harmful multimedia file decryption/reproduction step 600, after harmful multimedia file encrypting step 500, when in encrypted harmful multimedia file will be with the administrator mode that has passed through authentication procedure in subscriber computer, being reproduced, deciphering and reappear encrypted harmful multimedia file.
[28] more preferably, as shown in Figure 3, described method may further include: the user meets user's white list constitution step 300W, the blacklist constitution step 300 that meets the user with the user is identical, construct white list by searching multimedia files in subscriber computer, white list is the list of harmless multimedia file; And harmless multimedia file uses instant permission step 400W, wherein, connect user's white list by search subscriber before carrying out the blacklist constitution step that the user meets the user, when the multimedia file that will use is judged to be harmless multimedia file, permit the use of described multimedia file immediately in subscriber computer.
[29] below, will describe the exemplary embodiment of each step that comprises in the method according to this invention in detail in conjunction with Fig. 4 to Fig. 6.
[30] at first, provide a kind of computer software programs to subscriber computer, described program can be in fact to carry out the conventional method of method of the present invention by subscriber computer.As shown in Figure 4, in step 100 by the server of supplier operation (away from the remote system of the viewpoint of subscriber computer) structure harmful multimedia DB, supplier constructs harmful multimedia DB and harmful multimedia DB is offered subscriber computer, server can be collected automatically or the manual collection pattern is directly collected the harmful multimedia file of propagating by the Internet, from the multimedia file of collecting, produce (or extraction) verification msg, and check and verify data, thereby structure harmful multimedia DB.In this case, the key value that is stored in each file among the harmful multimedia DB comprises the message digest value of extracting from this document, and extracts identifier so that contention is minimized and realize accurate identification from suitable file area.Eap-message digest is by given input data being applied the peculiar value (peculiar value) of the regular length that unidirectional hash function obtains, and be a kind of can be used to check whether pseudo-check of producing source document and.As the identifier of file, and MD5, SHA-1, HAS-160 etc. are known as the eap-message digest hash function widely with described message digest value in the present invention, and wherein, the present invention can use any one in the hash function.
[31] as shown in Figure 4, except aforesaid server is directly collected the method for the harmful multimedia file of propagating by the Internet, the step 100 of the structure harmful multimedia DB of the method according to this invention can comprise following method: when carrying out the specific program of the method according to this invention realization in subscriber computer (for example PC), the multimedia file of specific program from be stored in subscriber computer (promptly, be not verified as the multimedia file of harmful multimedia file) in produce the verification msg of (for example extracting) such as identifier or metamessage, and by real-time Transmission verification msgs such as the Internets, and the described verification msg of server authentication, thereby whether the multimedia file that is judged as harmless multimedia file in the checking subscriber computer potentially is harmless.
[32] when the multimedia file that will be according to the checking result be classified as harmless multimedia file by harmful multimedia DB in subscriber computer was verified as harmless multimedia file, server can be updated to higher reliability class with current harmful multimedia DB.In the step of according to the embodiment of the present invention every kind of method, this can be recorded in by the excessive data that comprises the harmful multimedia file that will extract extraly from subscriber computer among the harmful multimedia DB and realize so that upgrade the step of harmful multimedia DB.That is to say that as shown in Figure 6, described step can comprise the file usage license and validate data transmissions step 700, and harmful multimedia DB and subscriber computer step of updating 800.In the file usage license and validate data transmissions step 700, subscriber computer produces verification msg from the multimedia file that is judged to be harmless multimedia file subscriber computer, and the validate data transmissions that is produced is arrived server.In harmful multimedia DB and subscriber computer step of updating 800, the verification msg that server authentication receives, in the time will being judged to be harmless multimedia file, upgrade the white list of subscriber computer with the corresponding multimedia file of verification msg, in the time will being judged to be harmful multimedia file with the corresponding multimedia file of verification msg, upgrade harmful multimedia DB by adding corresponding information to harmful multimedia DB, and the harmful multimedia DB after will upgrading is transferred to subscriber computer, thus the harmful multimedia DB of subscriber computer after can down loading updating.Like this, even the harmful multimedia file of propagating by the Internet can not be recorded among the harmful multimedia DB yet.
[33], as shown in Figure 3, can for example realize constructing the step 300 and the 300W of blacklist (BL) and white list (WL) according to every subscriber computer with cache scheme according to an exemplary embodiment of the present invention.Here, blacklist (BL) expression is present in the list of the harmful multimedia file in the subscriber computer, and white list (WL) expression is present in the list of the harmless multimedia file in the subscriber computer, and preferably these lists form with the data structure of hash table.Based on the quantity of harmful multimedia file be present in subscriber computer in the entire quantity of the multimedia file relative very little fact when comparing, the invention provides a kind of blacklist that is configured to harmful multimedia file, be configured to the white list of harmless multimedia file and before search harmful multimedia DB, use the method for these lists.
[34] as shown in Figure 5 and Figure 6, when multimedia file will be used in the subscriber computer, at first carry out white list (WL) search step (referring to the Reference numeral among Fig. 6 ' 400W ').In this case, when multimedia file is judged as the harmless multimedia file that is included in the white list (WL), permit the use of multimedia file immediately, stop stoping harmful multimedia file to use process simultaneously, thereby make harmless multimedia file to be used more quickly.In contrast, consider not to be included in the multimedia file in the white list, by independent system process, that is to say, judge that by sequentially carrying out whether file destination is corresponding to the blacklist search step that is included in the file in the blacklist (BL) (referring to the Reference numeral among Fig. 6 ' 410 '), check with the file encryption of the file destination of secret key encryption itself and check step (referring to the Reference numeral among Fig. 6 ' 420 '), and judge that whether file destination verify the harm of multimedia file corresponding to the harmful multimedia DB search step (referring to the Reference numeral among Fig. 6 ' 430 ') that is included in the file among the harmful multimedia DB.When judging that file destination is harmful multimedia file, stop the use of file destination, and more preferably, thus described prevention history can be recorded in and can provide more accurate in the subscriber computer and effectively stop the harmful multimedia file functions of use.In addition, as shown in Figure 6, when in harmful multimedia DB search step 430 (it is last step), judging that multimedia file is harmful multimedia file, stop the user to use described file quilt, and simultaneously, program is branched to take-off point ' F ', because multimedia file is also not encrypted, so multimedia file can pass through independent file encryption step 500.
[35] simultaneously, as shown in Figure 6, preferably, after the file encryption step 500 of encrypting harmful multimedia file, execution is upgraded the blacklist interpolation step 550 of blacklist (BL) by the data of harmful multimedia file being added to the blacklist (BL) that separately exists in the subscriber computer, thereby can stop the use of harmful multimedia file when reusing harmful multimedia file apace.
[36] although Fig. 5 and Fig. 6 show the situation of sequentially carrying out white list search step 400W and blacklist search step 410, described two steps can be carried out simultaneously.
[37] in more detail, for file encryption step, preferably, multimedia file in being present in subscriber computer is judged as after the harmful multimedia file, come the ciphering multimedia file by file system screening driver (FSFD) with core schema immediately, the file system screening sequence be can the control documents system driver.More preferably, corresponding multimedia file can be to use the encrypt file of cipher key mode, thereby can not the corresponding multimedia file of deciphering in the computing machine that realize system of the present invention (comprising program) be installed not.In this case, owing to can in the computing machine of described system is installed, use encrypt file,, thereby prevent that corresponding file from being distributed again even therefore encrypt file has been sent on the different computing machines and can not uses encrypt file.
[38] same, in the computing machine that the system that realizes the method according to this invention is installed, the authority of use can be set by authentication code.In this case, when the user who obtains rights of using (for example, with the guardian of administrator mode login, such as father and mother) when attempting to use encrypted harmful multimedia file, as shown in Figure 3, it is preferred carrying out real time decrypting reproduction step 600 extraly, thereby the user can normally use corresponding file.Described function has stoped the use of harmful multimedia file when young boy or girl attempt to use harmful multimedia file, and has write down the history that stops.Therefore, when the guardian such as father and mother checked prevention historical, the guardian can endanger to identify to stop and use which file based on it.Realize described identification process by real time decrypting, similar to file encryption step in real time decrypting, use FSFD to carry out deciphering with core schema, FSFD be can the control documents system driver.
[39], when encrypting harmful multimedia file, the predetermined identification code such as watermark can be inserted in the encrypt file according to another exemplary embodiment of the present invention.Identification code can be used for judging whether harmful multimedia file is encrypted in the step of checking harmful multimedia file.Equally, the mode that the identification code determination unit (not shown) can be installed in the subscriber computer and be mounted in the server on the network is used identification code, so that the use of sign harmful multimedia file and restriction harmful multimedia file on communication line.Preferably, a plurality of identification codes can be inserted in the harmful multimedia file.In this case, although harmful multimedia file is divided into a plurality of sections and the ground transmission of the quilt section section of connecing, identification code determination unit can be judged the transmission state of harmful multimedia file, thereby higher prevention function can be provided.
[40] although described preferred implementation of the present invention for illustrative purposes, but one of skill in the art will appreciate that and under the situation that does not deviate from disclosed scope and spirit of the present invention in claims, to carry out various improvement, interpolation and replacement.Therefore, should be appreciated that above-mentioned embodiment is not restrictive, but illustrative.
[41] therefore, the spirit and scope of the present invention must not be to be limited by its described embodiment but limited by the equivalent of its claims and claims.

Claims (21)

1, a kind of being used to limited the method for using harmful multimedia file, and described method comprises:
Harmful multimedia DB construction step, whether each multimedia file that checking is collected via the Internet is corresponding to harmful multimedia file, extraction is used to identify the identifier and the metamessage of harmful multimedia file, and the described identifier that will extract and metamessage be stored in server DB in;
Harmful multimedia DB transmitting step, the described harmful multimedia DB that will construct in described harmful multimedia DB construction step is transferred to subscriber computer;
The user connects user's blacklist constitution step, and searching multimedia files in described subscriber computer compares multimedia file and the described harmful multimedia DB that searches, and the structure blacklist, and described blacklist is the list of harmful multimedia file; And
Stop harmful multimedia file to use step, the user will be used in blacklist and the described harmful multimedia DB that multimedia file in the described subscriber computer and described user meet the user to be compared in turn, and stop the use of described multimedia file during corresponding to harmful multimedia file at described multimedia file
Wherein, the blacklist constitution step that described user meets the user with stop harmful multimedia file to use at least one step in the step to comprise described harmful multimedia file encrypted and be stored in the described subscriber computer so that prevent the harmful multimedia file encrypting step that described harmful multimedia file is distributed to different users or is used by different users, and use and also carry out the file encryption inspection step of checking that file destination is whether encrypted between the blacklist search step that stops in the step and the harmful multimedia DB search step being included in described harmful multimedia file.
2, method according to claim 1 further comprises at least one identification code is inserted into step in the described file encrypted in described harmful multimedia file encrypting step.
3, method according to claim 2 wherein, can judge that the identification code determination unit of described at least one identification code is installed on the file transfer circuit.
4, method according to claim 3, wherein, at least one identification code that is inserted in the file encrypted in described harmful multimedia file encrypting step comprises a plurality of described identification codes, thereby encrypted harmful multimedia file is being divided into a plurality of sections and when transmission, each segmentation can be identified by described identification code determination unit.
5, according to each described method in the claim 1 to 4, further comprise the steps: after described harmful multimedia file encrypting step deciphering and reappear encrypted harmful multimedia file when the user who has passed through verification process in described subscriber computer wishes to reappear encrypted harmful multimedia file.
6, according to each described method in the claim 1 to 4, wherein, in described harmful multimedia file encrypting step, described harmful multimedia file screens driver (FSFD) by file system and encrypts with core schema, wherein, key is used for described encryption.
7, method according to claim 5, wherein, described encryption and the described deciphering in described harmful multimedia file deciphering and reproduction step of described harmful multimedia file in described harmful multimedia file encrypting step screened driver (FSFD) by file system and carried out with core schema, wherein, key is used for described encryption and decryption.
8, a kind of being used to limited the method for using harmful multimedia file, and described method comprises:
Harmful multimedia DB construction step, whether each multimedia file that checking is collected via the Internet is corresponding to harmful multimedia file, extraction is used to identify the identifier and the metamessage of harmful multimedia file, and the described identifier that will extract and metamessage be stored in server DB in;
Harmful multimedia DB transmitting step, the described harmful multimedia DB that will construct in described harmful multimedia DB construction step is transferred to subscriber computer;
The user connects user's blacklist constitution step, and searching multimedia files in described subscriber computer compares multimedia file and the described harmful multimedia DB that searches, and the structure blacklist, and described blacklist is the list of harmful multimedia file; And
Stop harmful multimedia file to use step, the user will be used in blacklist and the described harmful multimedia DB that multimedia file in the described subscriber computer and described user meet the user to be compared in turn, and stop the use of described multimedia file during corresponding to harmful multimedia file at described multimedia file
Wherein, described user connects user's blacklist constitution step and stops harmful multimedia file to use at least one step in the step to comprise the harmful multimedia file encrypting step, this harmful multimedia file encrypting step is encrypted described harmful multimedia file and be stored in the described subscriber computer so that preventing described harmful multimedia file is distributed to different users or is used by different users, and
Wherein, described method further comprises: the user connects user's white list constitution step, the blacklist constitution step that meets the user with described user is identical, constructs white list by searching multimedia files in described subscriber computer, and described white list is the list of harmless multimedia file; And harmless multimedia file uses instant permission step, wherein, connect user's white list by the described user of search before carrying out the blacklist constitution step that described user meets the user, will be used in the use of permitting described multimedia file when multimedia file in the described subscriber computer is judged to be harmless multimedia file immediately.
9, method according to claim 8, wherein, whether encrypted file encryption is checked step also to carry out the inspection file destination between blacklist search step in being included in the described harmful multimedia file use of prevention step and the harmful multimedia DB search step.
10, method according to claim 8 further comprises at least one identification code is inserted into step in the file encrypted in described harmful multimedia file encrypting step.
11, method according to claim 10 wherein, can judge that the identification code determination unit of described at least one identification code is installed on the file transfer circuit.
12, method according to claim 8, further comprise the steps: after described harmful multimedia file encrypting step deciphering and reappear encrypted described harmful multimedia file when encrypted described harmful multimedia file will be reproduced with the administrator mode that has passed through verification process in described subscriber computer.
13, each described method in 11 according to Claim 8, wherein, in described harmful multimedia file encrypting step, described harmful multimedia file screens driver (FSFD) by file system and encrypts with core schema, wherein, key is used for described encryption.
14, method according to claim 12, wherein, described encryption and the described deciphering in described harmful multimedia file deciphering and reproduction step of described harmful multimedia file in described harmful multimedia file encrypting step screened driver (FSFD) by file system and carried out with core schema, wherein, key is used for described encryption and decryption.
15, a kind of being used to limited the method for using harmful multimedia file, and described method comprises:
Harmful multimedia DB construction step, whether each multimedia file that checking is collected via the Internet is corresponding to harmful multimedia file, extraction is used to identify the identifier and the metamessage of harmful multimedia file, and the described identifier that will extract and metamessage be stored in server DB in;
Harmful multimedia DB transmitting step, the described harmful multimedia DB that will construct in described harmful multimedia DB construction step is transferred to subscriber computer;
The user connects user's blacklist constitution step, searching multimedia files in described subscriber computer, the described multimedia file and the described harmful multimedia DB that search are compared, and the structure blacklist, described blacklist is the list of harmful multimedia file; And
Stop harmful multimedia file to use step, the user will be used in blacklist and the described harmful multimedia DB that multimedia file in the described subscriber computer and described user meet the user to be compared in turn, and stop the use of described multimedia file during corresponding to harmful multimedia file at described multimedia file
Wherein, the blacklist constitution step that described user meets the user with stop harmful multimedia file to use at least one step in the step to comprise described harmful multimedia file encrypted and be stored in the described subscriber computer so that prevent the harmful multimedia file encrypting step that described harmful multimedia file is distributed to different users or is used by different users, and
Wherein, described method further comprises:
Verification msg produces and transmitting step, extract the identifier that is used for file identification in described subscriber computer each multimedia file from be stored in subscriber computer, extract screen frame and metamessage in from the multimedia file of storage each, and the described identifier that will extract and at least one in screen frame and the metamessage are transferred to described server; And
Harmful multimedia DB and subscriber computer step of updating, by producing and whether transmitting step verifies described multimedia file corresponding to harmful multimedia file from the verification msg that is stored in each multimedia file the described subscriber computer that described subscriber computer transmits, and whether update stored in the harmful multimedia DB in the described server or be stored in white list in the described subscriber computer corresponding to harmful multimedia file according to each multimedia file by described verification msg.
16, method according to claim 15, wherein, whether encrypted file encryption is checked step also to carry out the inspection file destination between blacklist search step in being included in described prevention harmful multimedia file use step and the harmful multimedia DB search step.
17, method according to claim 15 further comprises at least one identification code is inserted into step in the file encrypted in described harmful multimedia file encrypting step.
18, method according to claim 17 wherein, can judge that the identification code determination unit of described at least one identification code is installed on the file transfer circuit.
19, method according to claim 15, further comprise the steps: after described harmful multimedia file encrypting step deciphering and reappear encrypted described harmful multimedia file when encrypted described harmful multimedia file will be reproduced with the administrator mode that has passed through verification process in described subscriber computer.
20, according to each described method in the claim 15 to 18, wherein, in described harmful multimedia file encrypting step, described harmful multimedia file screens driver (FSFD) by file system and encrypts with core schema, wherein, key is used for described encryption.
21, method according to claim 19, wherein, described encryption and the described deciphering in described harmful multimedia file deciphering and reproduction step of described harmful multimedia file in described harmful multimedia file encrypting step screened driver (FSFD) by file system and carried out with core schema, wherein, key is used for described encryption and decryption.
CN2007800487260A 2006-12-29 2007-12-28 Method for restricting use of harmful multimedia file Expired - Fee Related CN101606148B (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
KR10-2006-0138921 2006-12-29
KR1020060138921 2006-12-29
KR1020060138921A KR100753798B1 (en) 2006-12-29 2006-12-29 Method for restricting use of harmful multimedia file
PCT/KR2007/006975 WO2008082209A1 (en) 2006-12-29 2007-12-28 Method for restricting use of harmful multimedia file

Publications (2)

Publication Number Publication Date
CN101606148A true CN101606148A (en) 2009-12-16
CN101606148B CN101606148B (en) 2011-08-03

Family

ID=38615877

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2007800487260A Expired - Fee Related CN101606148B (en) 2006-12-29 2007-12-28 Method for restricting use of harmful multimedia file

Country Status (4)

Country Link
KR (1) KR100753798B1 (en)
CN (1) CN101606148B (en)
TW (1) TWI365393B (en)
WO (1) WO2008082209A1 (en)

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7190470B2 (en) * 2001-04-05 2007-03-13 Hewlett-Packard Development Company, L.P. System and method for automatic document verification
KR20020093276A (en) * 2001-06-07 2002-12-16 삼성전자 주식회사 Child-lock apparatus of signal play system and method thereof
KR20030004475A (en) * 2001-07-05 2003-01-15 (주)타잔테크놀로지 System to cut children off from harmfum Internet sites and to search the Internet sites
KR20030019055A (en) * 2001-08-29 2003-03-06 박정수 Device for blocking access of adult or hurtful web sites
KR100628306B1 (en) * 2004-09-30 2006-09-27 한국전자통신연구원 Method and apparatus for preventing of harmful P2P traffic in network
CN100367294C (en) * 2005-06-23 2008-02-06 复旦大学 Method for dividing human body skin area from color digital images and video graphs

Also Published As

Publication number Publication date
TW200837601A (en) 2008-09-16
KR100753798B1 (en) 2007-08-31
WO2008082209A1 (en) 2008-07-10
TWI365393B (en) 2012-06-01
CN101606148B (en) 2011-08-03

Similar Documents

Publication Publication Date Title
CN107480555B (en) Database access authority control method and device based on block chain
US20070255659A1 (en) System and method for DRM translation
CN109344631B (en) Data modification and block verification method, device, equipment and medium for block chain
CN110619520B (en) Block chain system and routing method applied to routing nodes of block chain system
CN104113534A (en) System and method for logging in applications (APPs)
CN110099064A (en) A kind of document handling method based on Internet of Things, device, equipment and storage medium
CN110309197B (en) Project data verification method and device
JP4619046B2 (en) Original content generation device and derivative content generation device
CN104683299A (en) Control method for software registration, authentication server and terminal
KR101447194B1 (en) Apparatus and method for Sharing DRM Agents
CN107948235A (en) Cloud data safety management and audit device based on JAR
CN111339201A (en) Evaluation method and system based on block chain
CN113395282A (en) Method and system for preventing third party from accessing server resources
CN115129332A (en) Firmware burning method, computer equipment and readable storage medium
EP1632943B1 (en) Method of preventing multimedia copy
US11233844B2 (en) Distribution network providing customized content at delivery
CN104104650A (en) Data file visit method and terminal equipment
CN109918451B (en) Database management method and system based on block chain
KR101649528B1 (en) Method and device for upgrading rights object that was stored in memory card
CN113591121A (en) Resource access authority configuration method, device, equipment and storage medium
KR100797600B1 (en) Method for restricting use of harmful multimedia file
CN101606148B (en) Method for restricting use of harmful multimedia file
KR20130125245A (en) Method and system for maintaining integrity of software installed in mobile device
KR102546157B1 (en) Method for managing rooting information using blockchain
KR101693085B1 (en) Device and method for approval of file export

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20110803

Termination date: 20161228