CN101763469A - Digital copyright management system and implementation method thereof - Google Patents

Digital copyright management system and implementation method thereof Download PDF

Info

Publication number
CN101763469A
CN101763469A CN200810044171.9A CN200810044171A CN101763469A CN 101763469 A CN101763469 A CN 101763469A CN 200810044171 A CN200810044171 A CN 200810044171A CN 101763469 A CN101763469 A CN 101763469A
Authority
CN
China
Prior art keywords
electric terminal
data
server
electronic bits
dynamic password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN200810044171.9A
Other languages
Chinese (zh)
Other versions
CN101763469B (en
Inventor
王立
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Lianshang Network Technology Co Ltd
Original Assignee
Shanda Computer Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanda Computer Shanghai Co Ltd filed Critical Shanda Computer Shanghai Co Ltd
Priority to CN200810044171.9A priority Critical patent/CN101763469B/en
Priority to PCT/CN2009/000654 priority patent/WO2010072041A1/en
Publication of CN101763469A publication Critical patent/CN101763469A/en
Application granted granted Critical
Publication of CN101763469B publication Critical patent/CN101763469B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a digital copyright management system, which comprises one or a plurality of electronic terminals and at least a server; wherein, the electronic terminal comprises a dynamic password generating module and a storage module; wherein, a database is built in or connected with the server, and the database stores electronic data and all serial numbers for the dynamic password generating module; the server stores a dynamic password generating algorithm and at least an asymmetrical encryption algorithm. The invention also discloses an implementation method for the digital copyright management system, which includes a process that the electronic terminal registers to the server, a process that the electronic terminal downloads electronic data from the server, and a process that the electronic terminal access the downloaded electronic data. The digital copyright management system and the implementation method in the invention can effectively ensure the security of the electronic data during the downloading and access processes.

Description

System for numeral copyright management and its implementation
Technical field
The present invention relates to a kind of system and method for digital copyright management.
Background technology
Along with the development of electronic medium, the user only can not meet the demands by access to netwoks electronic bits of data (as viewing electronic reading materials etc.).Commonplace electronic bits of data access method is the network online access now, but it is subject to network, and the reader reads before need being sitting in computer simultaneously, is not easy to carry out whenever and wherever possible.Also have some terminal devices now; such as mobile phone, PDA etc.; can carry; the electronic bits of data that visit is relevant; but electronic bits of data can be downloaded and visit to the general direct interconnection network of this electron-like terminal; belong to read state freely, can not effectively protect and manage for the copyright of electronic bits of data.
Digital copyright management (Digital Rights Management, notion DRM) have appearred in this case.Present digital copyright management is applied to the application of stream media broadcast and security product more, in the time of can not satisfying single hardware terminal (as electronic reading device) and download and visit all kinds of electronic bits of datas (as books, picture etc.) to the protection and the regulatory requirement of copyright.
Electronic bits of data supplier of today and copyright owner do not have own efficient ways, and be stolen with the electronic bits of data that guarantees oneself, therefore needs a kind of system and method for digital copyright management badly.
Summary of the invention
Technical matters to be solved by this invention provides a kind of system for numeral copyright management, this system can be when terminal device be downloaded and use electronic bits of data, terminal device is carried out authentication, thereby make electronic bits of data only limit to download and visit by licensed terminal device.For this reason, the present invention also provides the implementation method of above-mentioned system for numeral copyright management.
For solving the problems of the technologies described above, system for numeral copyright management of the present invention comprises one or more electric terminals and at least one server;
Wherein, described electric terminal comprises:
Dynamic password generation modules, built-in dynamic password generating algorithm, the computation rule between input that described dynamic password generating algorithm is a dynamic password generation modules and the output; Each dynamic password generation modules has the sequence number that has nothing in common with each other, but has identical dynamic password generating algorithm;
Memory module comprises common storage area that allows user capture and the restriction memory block of forbidding user capture;
Wherein, described server is built-in or connect database, and described database comprises a plurality of electronic bits of datas, and described electronic bits of data comprises books, picture, animation, audio frequency and/or the video of electronic form, and each electronic bits of data has the numbering that has nothing in common with each other;
Described database also comprises the sequence number of all dynamic password generation modules;
Have described dynamic password generating algorithm and at least a rivest, shamir, adelman in the described server.
System for numeral copyright management of the present invention and its implementation can be protected the safety of electronic bits of data in download and access process effectively.
Description of drawings
The present invention is further detailed explanation below in conjunction with drawings and Examples:
Fig. 1 is the synoptic diagram of system for numeral copyright management of the present invention;
Fig. 2 is the synoptic diagram one of the implementation method of system for numeral copyright management of the present invention;
Fig. 3 is the synoptic diagram two of the implementation method of system for numeral copyright management of the present invention;
Fig. 4 is the synoptic diagram three of the implementation method of system for numeral copyright management of the present invention.
Embodiment
See also Fig. 1, system for numeral copyright management of the present invention comprises a plurality of electric terminals and a server.(electric terminal is one or more, and server is at least one)
Wherein, described electric terminal comprises:
Dynamic password generation modules, built-in dynamic password generating algorithm.Computation rule between input that described dynamic password generating algorithm is a dynamic password generation modules and the output.Each dynamic password generation modules all has sequence number, and the sequence number of different dynamic password generation modules has nothing in common with each other, but has identical dynamic password generating algorithm.
Memory module is similar to the hard disk of computer system, and the memory module of electric terminal can adopt storage mediums such as SD card, Flash.Described memory module comprises common storage area that allows user capture and the restriction memory block of forbidding user capture.The division of common storage area and restriction memory block can be realized that perhaps the software systems by electric terminal realize by the firmware of electric terminal.Described restriction memory block is meant that the firmware of electric terminal or software systems neither provide the means of visiting by file/file to the user, also do not provide login/debugging method of exempting from password to the user.
Wherein, described server connects database (also can be the server internal database).Described database comprises a plurality of electronic bits of datas (electronic bits of data is at least), and described electronic bits of data comprises books, picture, animation, audio frequency and/or the video of electronic form, and each electronic bits of data has the numbering that has nothing in common with each other.
Described database also comprises the sequence number of all dynamic password generation modules.
Have described dynamic password generating algorithm and at least a rivest, shamir, adelman in the described server.
In addition, described electric terminal also includes internal memory, is similar to the internal memory of computer system.In the internal memory of electric terminal, can't visit the internal memory of other processes between the different processes, therefore can think that the internal memory that is using is safe and reliable.
Described electric terminal also includes software systems, for example can adopt the embedded OS of class Linux.These software systems are responsible for the each side of electric terminal and are used, operate.
The implementation method of above-mentioned system for numeral copyright management comprises three aspects, the one, and electric terminal is to server registration, and the 2nd, electric terminal is from the downloaded electronic bits of data, and the 3rd, the electronic bits of data that the electric terminal visit has been downloaded.Described electric terminal could be from the downloaded electronic bits of data only after server registration.Described electric terminal has only after the downloaded electronic bits of data, the electronic bits of data that could download at this accessing of electric terminal.
See also Fig. 2, described electric terminal comprises the steps: at server registration
In the 1st step, electric terminal sends register requirement to server, comprises the sequence number of the dynamic password generation modules of this electric terminal in the described register requirement.Described sequence number is the combination of string number.For example, this sequence number can adopt 9 decimal numbers.
In the 2nd step, server receives described register requirement, and inquires about the sequence number in the described register requirement in described database.
As this sequence number is arranged in the database, server produces a challenge code at random, and sends this challenge code to this electric terminal.
Described challenge code is the combination of the server string number, letter and/or the symbol that generate at random.For example, challenge code can adopt 64 binary number.
As not having this sequence number, server shut-down operation in the database.
In the 3rd step, this electric terminal receives this challenge code, and as input back output password as calculated, this electric terminal sends this password to server to the dynamic password generation modules of this electric terminal with the sequence number of this challenge code and/or this dynamic password generation modules.
Described password is the combination that dynamic password generation modules is calculated the string number that generates.For example, password can adopt 64 binary number.
The sequence number difference of different dynamic password generation modules, and sequence number is one of input item of dynamic password generating algorithm, so the password that different dynamic password generation modules is exported as calculated is always different.For same dynamic password generation modules, because the challenge code that server produces is at random, and challenge code also is one of input item of dynamic password generating algorithm, so the password that same dynamic password generation modules is exported as calculated is also always different.
In the 4th step, server receives this password, and according to described dynamic password generating algorithm described challenge code and/or sequence number is carried out result calculated as input with server self and compare.
Result of calculation as this password and server is identical, and server adopts rivest, shamir, adelman to generate a pair of unsymmetrical key, and described unsymmetrical key comprises a private key and a PKI.Server is stored in described database with private key, and PKI is issued this electric terminal.
Result of calculation as this password and server is different, the server shut-down operation.
In the 5th step, this electric terminal receives described PKI, and described PKI is stored in the restriction memory block.
Above-mentioned electric terminal specifically can be in the following way in the process of server registration: one, electric terminal is by https agreement Connection Service device, and carries out communication with server.Two, described register requirement, challenge code, password, PKI all transmit between electric terminal and server with the XML form.Three, described rivest, shamir, adelman adopts RSA Algorithm.
See also Fig. 3, described electric terminal comprises the steps: from the downloaded electronic bits of data
In the 1st step, electric terminal sends download request to server, comprises the sequence number of the dynamic password generation modules of this electric terminal in the described download request.
In the 2nd step, server receives described download request, and inquires about the sequence number in the described download request in described database.
As this sequence number is arranged in the database, server produces a challenge code at random, and sends this challenge code to this electric terminal.
As not having this sequence number, server shut-down operation in the database.
The 3rd step, this electric terminal receives this challenge code, as input back output password as calculated, this electric terminal sends the numbering of the electronic bits of data that this password and request download to the dynamic password generation modules of this electric terminal to server with the sequence number of this challenge code and/or this dynamic password generation modules.
In the 4th step, server receives the numbering of the electronic bits of data of this password and request download, and this password and server self is carried out result calculated with described challenge code as input according to described dynamic password generating algorithm compare.
Identical as both, server is inquired about the electronic bits of data that described request is downloaded according to the numbering of the electronic bits of data that described request is downloaded in database.When server was inquired about the electronic bits of data of downloading less than described request according to the numbering of the electronic bits of data of described request download in database, server returned error message to this electric terminal.
Server is also inquired about the private key of this electric terminal correspondence according to the sequence number of the dynamic password generation modules of this electric terminal in database.When server was inquired about private key less than this electric terminal correspondence in database according to the sequence number of the dynamic password generation modules of this electric terminal, server returned the information of " prompting registration " or " more new authentication " to this electric terminal.
Server is with the electronic bits of data compression and the encryption (can be the encryption again of compression earlier, also can be that compression and encryption are carried out simultaneously) of described request download then.During compression, server produces an access certificate at random.Described access certificate is the combination of the string number that generates at random of server.For example, access certificate can adopt the binary number of 2080 bytes.
Described encryption comprises with the access certificate being that the electronic bits of data that key is downloaded described request is encrypted, and comprises that also the private key with this electric terminal correspondence is that key is encrypted described access certificate.Electronic bits of data and access certificate after server will be encrypted are issued this electric terminal.
As both differences, the server shut-down operation.
In the 5th step, this electric terminal receives electronic bits of data and the access certificate after encrypting, and the access certificate after will encrypting is stored in the restriction memory block, and the electronic bits of data after the encryption can be stored in common storage area and/or limit the memory block.
Above-mentioned electric terminal is from the process of downloaded electronic bits of data, and specifically can be in the following way: one, electric terminal be connected and communication with server by the https agreement.Two, the numbering of the electronic bits of data of described download request, challenge code, password and request download, error message, " prompting registration " or the information of " more new authentication ", electronic bits of data and the access certificate after the encryption are all transmitted between electric terminal and server with the XML form.Three, electronic bits of data is generally a file or catalogue, if server is Linux/Unix or similar system, compression and compression to electronic bits of data can be ordered electronic bits of data boil down to cramfs file system with mkcramfs earlier, use loop-aes block device (block device again, be a kind of software) this cramfs file system is encrypted, thereby compressed and encrypt after electronic bits of data.The loop-aes block device can adopt AES128, multikey-v3 mode to encrypt, and the encryption key (encryption key) that the loop-aes block device uses is exactly described access certificate.Then server is encrypted described access certificate with the private key in the RSA Algorithm again.
See also Fig. 4, the electronic bits of data that described electric terminal visit has been downloaded comprises the steps:
In the 1st step, electric terminal is asked the electronic bits of data of visiting according to the user, seeks the access certificate of this electronic bits of data correspondence in the restriction memory block of this electric terminal.When electric terminal was sought the access certificate of the electronic bits of data correspondence of visiting less than this request in the restriction memory block, this electric terminal showed error message to the user.
In the 2nd step, this electric terminal uses the PKI in the restriction memory block that described access certificate is deciphered.Access certificate after the deciphering is only at internal memory, and the access certificate after the back electric terminal of finishing using will be deciphered is erased from internal memory.
The 3rd step, this electric terminal is the electronic bits of data that key loads the described request visit with the access certificate after deciphering, load(ing) point is in the restriction memory block, electric terminal is decrypted the electronic bits of data of described request visit automatically and decompresses, deciphering and decompress after electronic bits of data expressly only carry in the memory field.
Described loading, be with equipment, file or folder as a file system, and this document system hung under certain catalogue, the content of this catalogue is exactly the content of this document system after the loading.Load(ing) point just is meant that the catalogue that this document system is hung is in the catalogue that limits the memory block in the restriction memory block.
In the 4th step, the user uses the electronic bits of data plaintext after this electric terminal access decryption and the decompression.
In the 5th step, the user withdraws from the visit electronic bits of data, and the electronic bits of data after this electric terminal will be deciphered is expressly erased from the memory field, and the electronic bits of data of unloading described request visit from the restriction memory block.
Described unloading is that certain file system is removed under certain catalogue, and the content of this catalogue does not comprise the content of this document system after the unloading.
In the process of the electronic bits of data that the visit of above-mentioned electric terminal has been downloaded, specifically can be in the following way: one, between electronic bits of data and the corresponding access certificate with verification and mode be associated, for example adopt the SHA1 verification and.May store a plurality of electronic bits of datas and a plurality of access certificate in the electric terminal.Electronic bits of data behind receiving and deciphering and encrypt after access certificate the time, electronic bits of data calculation check after electric terminal is encrypted each earlier and, and with this verification with corresponding with the access certificate after the encryption of electronic bits of data after this is encrypted, and be stored in together in the restriction memory block.When electric terminal need be sought corresponding access certificate according to electronic bits of data, calculate earlier this request visit electronic bits of data (encrypted state) verification and, again from the restriction memory block according to verification with seek corresponding access certificate.If the electronic bits of data after two encryptions is the cramfs file system of encrypting with the loop-aes block device in Linux/Unix or the similar system, so only need a mount order that this cramfs file system is loaded, this Linux/Unix or similar system can be decrypted the file system after loading and decompress automatically.If three electric terminals are Linux/Unix or similar system, deciphering and decompress after electronic bits of data expressly only carry in the ramfs of electric terminal (memory file system) file system.
The advantage of above-mentioned system for numeral copyright management and its implementation comprises: one, electronic bits of data is encrypted with access certificate, to access certificate with encrypted private key, thereby realize double-encryption to electronic bits of data, strengthened the security of electronic bits of data.Two, the encryption and decryption key of electronic bits of data is an access certificate, and access certificate is long more a lot of than password usually, and long access certificate helps strengthening the security of electronic bits of data.Three, the encryption and decryption key of access certificate is a unsymmetrical key, and electric terminal only has PKI, and key only in database, has been strengthened the security of access certificate.Four, electronic bits of data is more much bigger than access certificate usually, and the restriction memory block of electric terminal is less usually in memory module.The present invention is stored in the restriction memory block with access certificate, by the protection of less access certificate being realized the protection to bigger electronic bits of data, has improved the utilization factor of restriction memory block, and can reduce the size of restriction memory block.Five, by adopting suitable electronic bits of data compression and cryptographic means, can to the decompression of electronic bits of data and deciphering the time, only need an order, improved access speed to electronic bits of data.Six, deciphering and decompress after access certificate and electronic bits of data expressly only carry in internal memory, the access certificate of promptly erasing from internal memory after the user uses or visit finishes plaintext and electronic bits of data are expressly, can on memory module, not leave any access certificate and electronic bits of data expressly, thus the security that has further improved electronic bits of data.

Claims (9)

1. system for numeral copyright management is characterized in that: described system for numeral copyright management comprises one or more electric terminals and at least one server;
Wherein, described electric terminal comprises:
Dynamic password generation modules, built-in dynamic password generating algorithm, the computation rule between input that described dynamic password generating algorithm is a dynamic password generation modules and the output; Each dynamic password generation modules has the sequence number that has nothing in common with each other, but has identical dynamic password generating algorithm;
Memory module comprises common storage area that allows user capture and the restriction memory block of forbidding user capture;
Wherein, described server is built-in or connect database, and described database comprises a plurality of electronic bits of datas, and described electronic bits of data comprises books, picture, animation, audio frequency and/or the video of electronic form, and each electronic bits of data has the numbering that has nothing in common with each other;
Described database also comprises the sequence number of all dynamic password generation modules;
Have described dynamic password generating algorithm and at least a rivest, shamir, adelman in the described server.
2. the implementation method of system for numeral copyright management as claimed in claim 1 is characterized in that: described electric terminal could be from the downloaded electronic bits of data only after server registration;
Described electric terminal comprises the steps: at server registration
In the 1st step, electric terminal sends register requirement to server, comprises the sequence number of the dynamic password generation modules of this electric terminal in the described register requirement;
In the 2nd step, server receives described register requirement, and inquires about the sequence number in the described register requirement in described database;
As this sequence number is arranged in the database, server produces a challenge code at random, and sends this challenge code to this electric terminal;
As not having this sequence number, server shut-down operation in the database;
In the 3rd step, this electric terminal receives this challenge code, and as input back output password as calculated, this electric terminal sends this password to server to the dynamic password generation modules of this electric terminal with the sequence number of this challenge code and/or this dynamic password generation modules;
In the 4th step, server receives this password, and compares according to described dynamic password generating algorithm result calculated with server self;
Identical as both, server adopts rivest, shamir, adelman to generate a pair of unsymmetrical key, and private key is stored in described database, and PKI is issued this electric terminal;
As both differences, the server shut-down operation;
In the 5th step, this electric terminal receives described PKI, and described PKI is stored in the restriction memory block.
3. the implementation method of system for numeral copyright management as claimed in claim 1, it is characterized in that: described electric terminal comprises the steps: from the downloaded electronic bits of data
In the 1st step, electric terminal sends download request to server, comprises the sequence number of the dynamic password generation modules of this electric terminal in the described download request;
In the 2nd step, server receives described download request, and inquires about the sequence number in the described download request in described database;
As this sequence number is arranged in the database, server produces a challenge code at random, and sends this challenge code to this electric terminal;
As not having this sequence number, server shut-down operation in the database;
The 3rd step, this electric terminal receives this challenge code, as input back output password as calculated, this electric terminal sends the numbering of the electronic bits of data that this password and request download to the dynamic password generation modules of this electric terminal to server with the sequence number of this challenge code and/or this dynamic password generation modules;
In the 4th step, server receives the numbering of the electronic bits of data of this password and request download, and this password and server self compared according to described dynamic password generating algorithm result calculated;
Identical as both, server is inquired about the electronic bits of data that described request is downloaded according to the numbering of the electronic bits of data that described request is downloaded in database, server is also inquired about the private key of this electric terminal correspondence according to the sequence number of the dynamic password generation modules of this electric terminal in database, and the electronic bits of data compression that described request is downloaded and encrypting; Server produces an access certificate at random during encryption, and described encryption comprises with the access certificate being that the electronic bits of data that key is downloaded described request is encrypted, and comprises that also the private key with this electric terminal correspondence is that key is encrypted described access certificate; Electronic bits of data and access certificate after server will be encrypted are issued this electric terminal;
As both differences, the server shut-down operation;
In the 5th step, this electric terminal receives electronic bits of data and the access certificate after encrypting, and the access certificate after will encrypting is stored in the restriction memory block.
4. the implementation method of system for numeral copyright management as claimed in claim 1 is characterized in that: the electronic bits of data that described electric terminal visit has been downloaded comprises the steps:
In the 1st step, electric terminal is asked the electronic bits of data of visiting according to the user, seeks the access certificate of this electronic bits of data correspondence in the restriction memory block of this electric terminal;
In the 2nd step, this electric terminal uses the PKI in the restriction memory block that described access certificate is deciphered;
The 3rd step, this electric terminal uses the access certificate after the deciphering to load the electronic bits of data of described request visit as key, load(ing) point is in the restriction memory block, electric terminal is decrypted the electronic bits of data of described request visit automatically and decompresses, deciphering and decompress after electronic bits of data expressly only carry in the memory field;
In the 4th step, the user uses this electric terminal to visit described electronic bits of data expressly;
In the 5th step, the user withdraws from the visit electronic bits of data, and this electric terminal is expressly erased described electronic bits of data from the memory field, and the electronic bits of data of unloading described request visit from the restriction memory block.
5. the implementation method of system for numeral copyright management according to claim 3, it is characterized in that: described electric terminal is from the 4th step of downloaded electronic bits of data, when server was inquired about the electronic bits of data of downloading less than described request according to the numbering of the electronic bits of data of described request download in database, server returned error message to this electric terminal; When server was inquired about private key less than this electric terminal correspondence in database according to the sequence number of the dynamic password generation modules of this electric terminal, server returned the information of " more new authentication " to this electric terminal.
6. the implementation method of system for numeral copyright management according to claim 4, it is characterized in that: in the 1st step of the electronic bits of data that described electric terminal visit has been downloaded, when electric terminal was sought the access certificate of the electronic bits of data correspondence of visiting less than this request in the restriction memory block, this electric terminal showed error message to the user.
7. the implementation method of system for numeral copyright management according to claim 3, it is characterized in that: described electric terminal is from the 5th step of downloaded electronic bits of data, the verification of the electronic bits of data after electric terminal calculate to be encrypted and, and with this verification with corresponding with the access certificate after the corresponding encryption of electronic bits of data after this is encrypted, and be stored in the restriction memory block together.
8. according to the implementation method of claim 4 or 7 described system for numeral copyright management, it is characterized in that: in the 1st step of the electronic bits of data that described electric terminal visit has been downloaded, the verification of the electronic bits of data of electric terminal elder generation computation requests visit and, seek corresponding access certificate according to this verification with in the restriction memory block again.
9. the implementation method of system for numeral copyright management according to claim 4, it is characterized in that: in the 2nd step of the electronic bits of data that described electric terminal visit has been downloaded, access certificate after the deciphering only in internal memory, erase from internal memory by the access certificate after the described electric terminal in back of finishing using will be deciphered.
CN200810044171.9A 2008-12-24 2008-12-24 Digital copyright management system and implementation method thereof Active CN101763469B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN200810044171.9A CN101763469B (en) 2008-12-24 2008-12-24 Digital copyright management system and implementation method thereof
PCT/CN2009/000654 WO2010072041A1 (en) 2008-12-24 2009-06-15 Management system of digital copyright and achieving method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200810044171.9A CN101763469B (en) 2008-12-24 2008-12-24 Digital copyright management system and implementation method thereof

Publications (2)

Publication Number Publication Date
CN101763469A true CN101763469A (en) 2010-06-30
CN101763469B CN101763469B (en) 2014-06-25

Family

ID=42286857

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200810044171.9A Active CN101763469B (en) 2008-12-24 2008-12-24 Digital copyright management system and implementation method thereof

Country Status (2)

Country Link
CN (1) CN101763469B (en)
WO (1) WO2010072041A1 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102693377A (en) * 2011-03-23 2012-09-26 株式会社东芝 Content data reproduction system and collection system of use history thereof
CN102957708A (en) * 2012-11-19 2013-03-06 中国联合网络通信集团有限公司 Application encrypting and decrypting method, server and terminal
CN103218731A (en) * 2013-03-25 2013-07-24 深圳市精彩明天科技有限公司 Method and system utilizing two-dimension code to advertise
CN103391194A (en) * 2012-05-10 2013-11-13 航天信息股份有限公司 Method and system for unlocking safety equipment of user
CN104378199A (en) * 2014-12-05 2015-02-25 珠海格力电器股份有限公司 Method and system for generating unit dynamic password and dynamic password generator
WO2018032373A1 (en) * 2016-08-13 2018-02-22 深圳市樊溪电子有限公司 Security network attachment device and method for block chain
CN108055265A (en) * 2017-12-13 2018-05-18 常州卡灵克软件有限公司 Vehicle-mounted appStore downloads authentication mechanism and system
CN109035499A (en) * 2018-06-30 2018-12-18 恒宝股份有限公司 A kind of electronic password lock authentication method based on dynamic password
CN112700330A (en) * 2020-12-30 2021-04-23 珠海横琴井通容智科技信息有限公司 Intelligent contract construction method and device based on copyright transaction and copyright transaction method

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114499902B (en) * 2020-11-11 2024-02-23 北京一砂信息技术有限公司 Safety camera system based on digital watermarking technology and application method thereof

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8812850B2 (en) * 2000-03-02 2014-08-19 Tivo Inc. Secure multimedia transfer system
CN1992590A (en) * 2005-12-29 2007-07-04 盛大计算机(上海)有限公司 Identity authentication system of network user and method
CN201044453Y (en) * 2007-04-04 2008-04-02 朱明程 Digital copyright management system and hand-hold terminal thereof
CN101163072A (en) * 2007-08-10 2008-04-16 林明辉 Automatic selection optimized routing logon communication method of login server

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102693377A (en) * 2011-03-23 2012-09-26 株式会社东芝 Content data reproduction system and collection system of use history thereof
CN102693377B (en) * 2011-03-23 2015-03-18 株式会社东芝 Content data reproduction system and collection system of use history thereof
US8929547B2 (en) 2011-03-23 2015-01-06 Kabushiki Kaisha Toshiba Content data reproduction system and collection system of use history thereof
CN103391194A (en) * 2012-05-10 2013-11-13 航天信息股份有限公司 Method and system for unlocking safety equipment of user
CN103391194B (en) * 2012-05-10 2016-08-31 航天信息股份有限公司 The method and system that the safety equipment of user are unlocked
CN102957708A (en) * 2012-11-19 2013-03-06 中国联合网络通信集团有限公司 Application encrypting and decrypting method, server and terminal
CN102957708B (en) * 2012-11-19 2015-07-08 中国联合网络通信集团有限公司 Application encrypting and decrypting method, server and terminal
CN103218731A (en) * 2013-03-25 2013-07-24 深圳市精彩明天科技有限公司 Method and system utilizing two-dimension code to advertise
CN104378199A (en) * 2014-12-05 2015-02-25 珠海格力电器股份有限公司 Method and system for generating unit dynamic password and dynamic password generator
CN104378199B (en) * 2014-12-05 2018-05-25 珠海格力电器股份有限公司 Method and system for generating unit dynamic password and dynamic password generator
WO2018032373A1 (en) * 2016-08-13 2018-02-22 深圳市樊溪电子有限公司 Security network attachment device and method for block chain
CN108055265A (en) * 2017-12-13 2018-05-18 常州卡灵克软件有限公司 Vehicle-mounted appStore downloads authentication mechanism and system
CN109035499A (en) * 2018-06-30 2018-12-18 恒宝股份有限公司 A kind of electronic password lock authentication method based on dynamic password
CN112700330A (en) * 2020-12-30 2021-04-23 珠海横琴井通容智科技信息有限公司 Intelligent contract construction method and device based on copyright transaction and copyright transaction method

Also Published As

Publication number Publication date
CN101763469B (en) 2014-06-25
WO2010072041A1 (en) 2010-07-01

Similar Documents

Publication Publication Date Title
CN101763469B (en) Digital copyright management system and implementation method thereof
CN100487715C (en) Date safety storing system, device and method
EP2267628B1 (en) Token passing technique for media playback devices
CN1997953B (en) Method and device for protecting digital content in mobile applications
KR20210066867A (en) An encrypted asset encryption key portion that allows assembly of an asset encryption key using a subset of the encrypted asset encryption key portion.
CN102156843B (en) Data encryption method and system as well as data decryption method
JP2005536951A (en) Apparatus, system, and method for securing digital documents in a digital device
MX2007014237A (en) Implementation of an integrity-protected secure storage.
US20120101623A1 (en) Encryption Method of Digital Data, Decryption Method of Encrypted Digital Data, Manufacturing System of Storage Apparatus and Manufacturing Method Thereof
CN101443744A (en) Method and electric device for transmitting rights object
CN102737180A (en) Integrated circuit for digital rights management
CN110868291B (en) Data encryption transmission method, device, system and storage medium
US20100095132A1 (en) Protecting secrets in an untrusted recipient
CN103294969B (en) File system mounted method and device
CN101719205A (en) Digital copyright management method and system
US10103884B2 (en) Information processing device and information processing method
CN101286994A (en) Digital literary property management method, server and system for content sharing within multiple devices
CN101159754A (en) Internet application management system operating on intelligent mobile terminal
CN104615929A (en) Security key device for secure cloud services, and system and method of providing security cloud services
US8774407B2 (en) System and method for executing encrypted binaries in a cryptographic processor
CN102726028A (en) Encryption method, decryption method, and corresponding device and system
JP2012065123A (en) Ic card system, communication terminal therefor and portable terminal therefor
CN112507296A (en) User login verification method and system based on block chain
CN111970114A (en) File encryption method, system, server and storage medium
KR20070059891A (en) Application authentication security system and method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: SHANGHAI GUOKE ELECTRONIC CO., LTD.

Free format text: FORMER OWNER: SHANDA COMPUTER (SHANGHAI) CO., LTD.

Effective date: 20120706

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20120706

Address after: Shanghai city Pudong New Area 201203 GuoShouJing Road No. 356

Applicant after: Shanghai Guoke Electronic Co., Ltd.

Address before: Shanghai city Pudong New Area 201203 GuoShouJing Road No. 356

Applicant before: Shanda computer (Shanghai) Co., Ltd.

ASS Succession or assignment of patent right

Owner name: SHANGHAI SHENGXUAN NETWORK TECHNOLOGY CO., LTD.

Free format text: FORMER OWNER: SHANGHAI GUOKE ELECTRONIC CO., LTD.

Effective date: 20130301

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20130301

Address after: 201203 Shanghai Guo Shou Jing Road, Zhangjiang hi tech Park No. 356 building 3 room 126

Applicant after: Shanghai Shengxuan Network Technology Co., Ltd.

Address before: Shanghai city Pudong New Area 201203 GuoShouJing Road No. 356

Applicant before: Shanghai Guoke Electronic Co., Ltd.

C14 Grant of patent or utility model
GR01 Patent grant
C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20160621

Address after: 201203 Shanghai Zhang Heng Road, Lane 666, No. 7, building 1, Pudong New Area

Patentee after: SHANGHAI ZHANGMEN TECHNOLOGY CO., LTD.

Address before: 201203 Shanghai Guo Shou Jing Road, Zhangjiang hi tech Park No. 356 building 3 room 126

Patentee before: Shanghai Shengxuan Network Technology Co., Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20170315

Address after: 200000 room N2025, building 2, Xincheng Road, mud town, Shanghai,

Patentee after: Shanghai Lian Shang network technology Co., Ltd

Address before: 201203 Shanghai Zhang Heng Road, Lane 666, No. 7, building 1, Pudong New Area

Patentee before: SHANGHAI ZHANGMEN TECHNOLOGY CO., LTD.