CN102129532B - Method and system for digital copyright protection - Google Patents

Method and system for digital copyright protection Download PDF

Info

Publication number
CN102129532B
CN102129532B CN2011100705367A CN201110070536A CN102129532B CN 102129532 B CN102129532 B CN 102129532B CN 2011100705367 A CN2011100705367 A CN 2011100705367A CN 201110070536 A CN201110070536 A CN 201110070536A CN 102129532 B CN102129532 B CN 102129532B
Authority
CN
China
Prior art keywords
key
protection
data
file
strategy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2011100705367A
Other languages
Chinese (zh)
Other versions
CN102129532A (en
Inventor
阮晓迅
梁金千
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Esafent Technology Development Co., Ltd.
Original Assignee
BEIJING ESAFENT TECHNOLOGY DEVELOPMENT Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING ESAFENT TECHNOLOGY DEVELOPMENT Co Ltd filed Critical BEIJING ESAFENT TECHNOLOGY DEVELOPMENT Co Ltd
Priority to CN2011100705367A priority Critical patent/CN102129532B/en
Publication of CN102129532A publication Critical patent/CN102129532A/en
Application granted granted Critical
Publication of CN102129532B publication Critical patent/CN102129532B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a method and a system for digital copyright protection. According to the method and the system, a copyright protection policy is firstly set through a copyright data protection processing device, a common data file is encrypted by a key and then converted into the data file under copyright protection; an inquiry is then initiated according to copyright data ID of the data file under copyright protection through an authorized file generating device in order to obtain the key and the protection policy, and a user characteristic code is used to encrypt the key and the protection policy to obtain an authorized file; through an authorized file application device, the keys and the protection policy in the authorized file are restored to a key plaintext and a protection policy plaintext which can be directly used by a copyright data protection application device; and in the end, the decrypted and restored copyright data is transmitted to an application system through the copyright data protection application device and an application system interface. By means of the method and the system, the breaking of attackers can be effectively prevented in order to realize the protection for digital copyright.

Description

A kind of digital literary property protection method and system
Technical field
The present invention relates to computer software fields, be specifically related to a kind of digital literary property protection method and system.
Background technology
Digital copyright protecting (Digital Right Management, DRM) is the Main Means that at present copyright of propagating in the network is carried out copyright protection.DRM is defined by Association of American Publishers: " technology of in the digital content process of exchange intellecture property being protected, instrument and processing procedure ".DRM takes the information security technology means at interior system scheme; when guaranteeing that user legal, that have authority normally uses numerical information (such as digital image, audio frequency, video etc.); protection numerical information creator and owner's copyright; obtain legal income according to copyright information, and copyright ownership that can discriminating digit information when copyright is subject to encroaching on and the true and false of copyright information.
Along with infotech, the development of Internet technology, various digital application, such as digital device, computer software, various data files emerge in multitude, and all trades and professions are all by deep the changing of this field information revolution.The enterprises and individuals has also had increasing digital asset, and these digital assets comprise: digital device, and computer software, various data files etc., the in use copyright management of these assets just becomes the problem that will solve.Traditional computer software authorization walk two extreme, namely the rich software developer of customers uses general distribution version, comprises copyright authentication mechanism in the distribution version, the developer uses the mode licensed software of authorization code.This mode very easily is subject to the such mode that cracks of similar register machine, and the assailant analyzes the copyright authentication mechanism in the distribution version, reversely goes out the authorization code calculation, so just can design register machine and realize cracking; The thin developer of customers issues the different release version for each user from the related mode of user characteristics numeral, although such authorization reliably, does not utilize the developer to use the selling software of purchase.
Chinese patent application CN200510012136.5 (publication number CN1710505; open day on Dec 21st, 2005) in " digital literary property protection method and system " a kind of digital literary property protection method and system are disclosed; the method is on the basis that digital contents of media files is encrypted; this document content is cut into n section; the multi-layer security of respectively section being realized again; when deciphering, need to obtain respectively the key of each section, and then combination obtains complete encrypted media file.Although as seen the method has realized a kind of multi-level protection to media file, processing procedure is complicated especially, is unfavorable for that the user is to the use of file.
Summary of the invention
For the defective that exists in the prior art, the object of the present invention is to provide a kind of digital literary property protection method and system, better realize the protection to digital publishing rights.
For achieving the above object, the technical solution used in the present invention is as follows:
A kind of digital literary property protection method may further comprise the steps:
(1) according to the data file class that will protect, copyright protection strategy is set, uses key that the general data file is encrypted, the general data file is converted into data file protected by copyright;
(2) inquiry obtains key or key and protection strategy according to the copyright data I D of data file protected by copyright, and user's condition code is to key or key and protect strategy to be encrypted authorized file;
(3) obtain the user characteristics code, the key of authority or key and protection strategy deciphering reduction are become key plain or the key plain and protection strategy plaintext of direct use;
(4) use key or key and the deciphering of protection strategy data file protected by copyright, the copyright data of deciphering reduction is passed to application system by the application system interface.
Further, aforesaid digital literary property protection method, described protection strategy refer to encryption policy information that the data file is used which kind of cryptographic algorithm, key length and which data is encrypted.
Further, aforesaid digital literary property protection method, in the step (1), the described concrete mode that the general data file is converted into data file protected by copyright is:
Judge the file type of the general data file of input, select the copyright protection strategy collection;
The protection strategy is set;
According to the protection strategy, use corresponding related computing and key compose operation generation key K or key to private key K-Pri, PKI K-Pub;
Use the PKI K-Pub of above-mentioned key K or cipher key pair, according to the copyright protection strategy that arranges, the general data file of inputting is carried out all or part of encryption;
General data file after encrypting is added file header or file header and protection strategy;
Use prefabricated private key A to key K or key to or key K and protection strategy carry out digital signature.
Further, aforesaid digital literary property protection method, in the step (2), the concrete mode of described authorized file is:
Use prefabricated PKI A to key K or key to or key K and protection strategy carry out signature verification;
Preserve key K or key to or key K tactful with protection;
Inquire about corresponding key K or PKI K-Pub or key K and protection strategy with copyright data ID as key assignments;
Use prefabricated private key B to unencrypted key K or key to or key K and protection policy data carry out digital signature;
User's condition code to key K or key to or key K and protection strategy encrypt;
The data of above-mentioned encryption are added file header;
Preserve key K or key to or the key K data file tactful with protection, authorized file.
Further, aforesaid digital literary property protection method, described copyright data ID refers to global sequence number or other unique values, global sequence number refers to the sequence number of claimed each application program in the system, and unique value refers to the numeral of unique its complete identity of identification of the application program that each needs protection;
Described user characteristics code refers to application terminal or user's unique code, stablizes identifying user has legal rights of using to protected application program code.
Further, aforesaid digital literary property protection method, in the step (3), described with authority key or the concrete mode of key and the protection strategy deciphering reduction key plain that becomes direct use or key plain and protection strategy plaintext be:
Obtain the user characteristics code;
According to user characteristics code deciphering reduction key K or key to or key K tactful with protection;
Key K after using prefabricated PKI B to deciphering or key to or key K carry out signature verification with the protection strategy, obtain deciphering key plain or the key plain and the tactful plaintext of protection of reduction.
Further again, aforesaid digital literary property protection method, in the step (4), the copyright data that deciphering is reduced by the concrete mode that the application system interface passes to application system is:
Resolve the protection policy data;
Call appointment decipherment algorithm and decipher according to copyright protection strategy, selection partly or total data is used key K or PKI K-Pub or key K and protection is tactful is decrypted data file protected by copyright;
Use the application system interface to pass to application system the copyright data of deciphering reduction.
Further; aforesaid digital literary property protection method; described file header comprise identification document be the magic number of the file that uses of specific program, as the sub-key of encrypting the part key of data after this, identify the version of these file header data so that application program is done the file header version of suitable coupling and the proof test value of depositing verification file integrity digest value after upgrading, also comprise according to application-specific and other data of the data of needs sign.
A kind of digital copyright protection system comprises with lower device:
Copyright data conservation treatment device: be used for according to the data file class that will protect copyright protection strategy being set, use key that the general data file is encrypted, the general data file is converted into data file protected by copyright;
Authority generating apparatus: be used for obtaining key and protection strategy according to the copyright data ID inquiry of data file protected by copyright, and user's condition code is encrypted authorized file to key and protection strategy;
The authority application apparatus: being used for the key of authority or key are become with protection strategy deciphering reduction is key plain or the key plain and the tactful plaintext of protection that copyright data protection application device directly uses;
Copyright data protection application device: be used for and the application system interface, the copyright data that deciphering is reduced sends application system to.
Further, aforesaid digital copyright protection system, described copyright data conservation treatment device comprises following ingredient:
Copyright protection pretreater: to the general data file of input, judge and want the protected data file type, select different copyright protection strategy collection;
Copyright protection strategy manager: copyright protection strategy is set;
Key compositor: according to the protection strategy, use corresponding related computing and key compose operation generation key K or key to private key K-Pri, PKI K-Pub;
Encryption equipment: use the PKI K-Pub of above-mentioned key K or cipher key pair, according to the copyright protection strategy that arranges, the general data file of inputting is carried out all or part of encryption;
The rights file compositor: the general data file after will encrypting adds file header or file header and protection strategy;
Digital autograph device: use prefabricated private key A to key K or key to or key K and protection strategy carry out digital signature.
Further, aforesaid digital copyright protection system, described authority generating apparatus comprises following ingredient:
Signature verifier: use prefabricated PKI A to the key K that sent by copyright data conservation treatment device or key to or key K and protection strategy carry out signature verification;
The key K database: preserve the key K that sent by copyright data conservation treatment device or key to or key K tactful with protection;
Data base querying device: carry out key K or PKI K-Pub or key K and protection policy lookup as key assignments with copyright data ID;
The signature device: use prefabricated private key B to unencrypted key K or key to or key K carry out digital signature with protecting policy data;
Encryption equipment: user's condition code to key K or key to or key K and protection strategy be encrypted;
Authority compositor: the data of above-mentioned encryption are added file header, authorized file.
Further again, aforesaid digital copyright protection system, described authority application apparatus comprises following ingredient:
User characteristics code getter: obtain the user characteristics code;
Decipher: user's condition code deciphering reduction key K or key to or key K tactful with protection;
Signature verifier: the key K after using prefabricated PKI B to deciphering or key to or key K carry out signature verification with protecting strategy;
Key and the tactful safe Transfer pipe of protection: will decipher key plain or the key plain of reduction and protect strategy expressly to pass to the copyright protection application apparatus by safe Transfer pipe.
Further, aforesaid digital copyright protection system, described copyright protection application apparatus comprises following ingredient:
Copyright protection strategy resolver: resolve the protection policy data, and send data to the copyright protection decryption controller.
The copyright protection decryption controller: call appointment decipherment algorithm and decipher according to copyright protection strategy, selection partly or total data is used key K or PKI K-Pub or key K and protection is tactful is decrypted copyright data;
The application system interface: the copyright data that will decipher reduction uses this interface to pass to application system.
Effect of the present invention is: method and system of the present invention at first according to being provided with copyright protection strategy according to the data file class that will protect, is converted into data file protected by copyright by encrypting with the general data file; Then user's condition code is encrypted authorized file to key or key and protection strategy; By double-encryption, make rights file obtain better protection.In addition, the thin developer of customers also need not to issue the different release version for each user, better conveniently comes the developer to use the rights file of purchase.
Description of drawings
Fig. 1 is the structured flowchart of a kind of digital copyright protection system of the present invention;
Fig. 2 is the process flow diagram of a kind of digital literary property protection method of the present invention;
Fig. 3 is the one-piece construction block diagram-model 1 of a kind of digital copyright protection system of the present invention;
Fig. 4 is the one-piece construction block diagram-model 2 of a kind of digital copyright protection system of the present invention.
Embodiment
The present invention is described in further detail below in conjunction with Figure of description and embodiment.
Fig. 1 shows the structured flowchart of a kind of digital copyright protection system of the present invention, and this system comprises with lower device:
Copyright data conservation treatment device 11: be used for according to the data file class that will protect copyright protection strategy being set, use key that the general data file is encrypted, the general data file is converted into data file protected by copyright;
This comprises following ingredient:
Copyright protection pretreater: to the general data file of input, judge and want the protected data file type, select different copyright protection strategy collection;
Copyright protection strategy manager: copyright protection strategy is set;
Key compositor: according to the protection strategy, use corresponding related computing and key compose operation generation key K or key to private key K-Pri, PKI K-Pub;
Encryption equipment: use the PKI K-Pub of above-mentioned key K or cipher key pair, according to the copyright protection strategy that arranges, the general data file of inputting is carried out all or part of encryption;
The rights file compositor: the general data file after will encrypting adds file header or file header and protection strategy;
Digital autograph device: use prefabricated private key A to key K or key to or key K and protection strategy carry out digital signature.
Authority generating apparatus 12: be used for obtaining key and protection strategy according to the copyright data ID inquiry of data file protected by copyright, and user's condition code is encrypted authorized file to key and protection strategy;
This device comprises following ingredient:
Signature verifier: use prefabricated PKI A to the key K that sent by copyright data conservation treatment device or key to or key K and protection strategy carry out signature verification;
The key K database: preserve the key K that sent by copyright data conservation treatment device or key to or key K tactful with protection;
Data base querying device: carry out key K or PKI K-Pub or key K and protection policy lookup as key assignments with copyright data ID;
The signature device: use prefabricated private key B to unencrypted key K or key to or key K carry out digital signature with protecting policy data;
Encryption equipment: user's condition code to key K or key to or key K and protection strategy be encrypted;
Authority compositor: the data of above-mentioned encryption are added file header, authorized file.
Authority application apparatus 13: be used for the key of authority is become key plain or key plain and protection strategy plaintext that copyright data protection application device can directly use with protecting the strategy reduction;
This device comprises following ingredient:
User characteristics code getter: obtain the user characteristics code;
Decipher: user's condition code deciphering reduction key K or key to or key K tactful with protection;
Signature verifier: the key K after using prefabricated PKI B to deciphering or key to or key K carry out signature verification with protecting strategy;
Key and the tactful safe Transfer pipe of protection: will decipher key plain or the key plain of reduction and protect strategy expressly to pass to the copyright protection application apparatus by safe Transfer pipe.
Copyright data protection application device 14: be used for and the application system interface, the copyright data that deciphering is reduced sends application system to.
This device comprises following ingredient:
Copyright protection strategy resolver: resolve the protection policy data, and send data to the copyright protection decryption controller.
The copyright protection decryption controller: call appointment decipherment algorithm and decipher according to copyright protection strategy, selection partly or total data is used key K or PKI K-Pub or key K and protection is tactful is decrypted copyright data;
The application system interface: the copyright data that will decipher reduction uses this interface to pass to application system.
Fig. 3 and Fig. 4 show respectively two model-models 1 and model 2 of the one-piece construction block diagram of a kind of digital copyright protection system of the present invention.Contrast by two figure can be found out, slightly variant with the processing of protection strategy to key in model 1 and the model 2, Fig. 3 is in the model 1, when copyright data treating apparatus 11 sends to authority generating apparatus 12 with data file protected by copyright, use prefabricated private key A that key K has been carried out digital signature, the protection strategy is then with the binding of protected data file, in the processing procedure of back, not again to protecting strategy to carry out relevant treatment; Fig. 4 is in the model 2, uses prefabricated private key A-key K and protection strategy to carry out digital signature.So in the processing procedure of a series of encrypt and decrypt of back.In the end call according to copyright protection strategy and specify decipherment algorithm and decipher, when selecting part or total data to use key K or PKI K that copyright data is decrypted, protection strategy in the model 1 is directly to process in the data file protected by copyright that obtains at copyright data conservation treatment device 1 to obtain, and re-uses that key K or PKI K be decrypted; And the protection strategy in the model 2 is present in whole processing procedure simultaneously with key.Equally, when the general data file after use rights file compositor will be encrypted adds file header, only added file header in the model 1, and added simultaneously file header and protection strategy in the model 2.As seen, when using the present invention to process associated documents, the user can select different system models to carry out the protection of copyright as required.
Fig. 2 shows the process flow diagram based on the digital literary property protection method of a kind of digital copyright protection system among Fig. 1, and the method may further comprise the steps:
Step S21: the general data file is converted into data file protected by copyright
Data file class according to protecting arranges copyright protection strategy, uses key that the general data file is encrypted, and the general data file is converted into data file protected by copyright, and its concrete mode is:
At first judge the file type of the general data file of input, such as digital media file, electronic document files, computer program file etc., select again different copyright protection strategies, and the protection strategy is set;
Then according to protection strategy, use corresponding related computing and key compose operation to generate key K or key to K-Pri, K-Pub, generation public, private key pair when using public key algorithm; Use the PKI K-Pub of above-mentioned key K or cipher key pair, according to the copyright protection strategy that arranges, the general data file of inputting is carried out all or part of encryption;
General data file after will encrypting at last add file header with or file header tactful with protection; Use prefabricated private key A-key K or key K and protection strategy to carry out digital signature.Wherein, the reason that adds file header is because the file header of original is changed after encryption, so the data type of system and this file of application program None-identified; Some parameters in file header, have been identified, for the copyright protection assembly.Comprise in the file header:
The evil spirit number: identification document is the file that specific program uses; Very eurypalynous file, the content of several bytes that it is initial is (or filling intentionally of fixing, or this is just so), just can determine file type according to the content of these several bytes, so the content of these several bytes is called as magic number (magicnumber);
Sub-key: as encrypting the after this part key of data (key participates in certain operations and just can calculate the encryption and decryption key that will use at last in program);
File header version: identify the version of these file header data so that application program is done suitable coupling after upgrading;
Proof test value: deposit verification file integrity digest value;
Other data: as according to application-specific and the data of needs signs.
Prefabricated private key A carries out the private key (encrypt and use) of digital signature to comprising key K and protection strategy in interior data, and the A that uses public-key when certifying signature deciphers this data.
Key K is the key that the original data that will protect are encrypted, this key can use symmetric encipherment algorithm (that is: to only have a key K, encryption and decryption is all used this key), also can use public key algorithm (a pair of public and private key, K-Pri and K-Pub, K-Pri only does to encrypt and uses, and K-Pub only does deciphering and uses), key K, K-Pri and K-Pub all generate at random;
Step S22: according to the authorized file of data file protected by copyright
Inquiry obtains key or key and protection strategy according to the copyright data ID of data file protected by copyright, and user's condition code is to key or key and protect strategy to be encrypted authorized file, and its concrete mode is:
Use prefabricated PKI A to key K or key to or key K and protection strategy carry out signature verification;
Preserve key K or key to or key K tactful with protection;
Inquire about corresponding key K or PKI K-Pub or key K and protection strategy with copyright data ID as key assignments;
Use prefabricated private key B to unencrypted key K or key to or key K and protection policy data carry out digital signature;
User's condition code to key K or key to or key K and protection strategy encrypt;
The data of above-mentioned encryption are added file header;
Preserve key K or key to or the key K data file tactful with protection, authorized file.
So just realize a kind of binding of key and user characteristics code, above-mentioned key only can could be reduced by this user characteristics code.Wherein, described copyright data ID refers to global sequence number or other unique values, global sequence number refers to the sequence number of claimed each application program in the system, unique value refers to the numeral of unique its complete identity of identification of the application program that each needs protection, such as digest value of producing carrying out the MD5 computing etc.;
Described user characteristics code refers to application terminal or user's unique code, stablizes the code that identifying user has legal rights of using to protected application program, such as user ID, and mobile phone IMSI number etc.
Step S23: with key or key and the deciphering of protection strategy of authority
Obtain the user characteristics code, the key of authority or key and protection strategy deciphering reduction are become key plain or the key plain and protection strategy plaintext of direct use, its concrete mode is:
Obtain the user characteristics code;
According to user characteristics code deciphering reduction key K or key to or key K tactful with protection;
Key K after using prefabricated PKI B to deciphering or key to or key K carry out signature verification with the protection strategy, obtain deciphering key plain or the key plain and the tactful plaintext of protection of reduction.
Step S24: decipher data file protected by copyright, and pass to application system
Use key and protection strategy deciphering data file protected by copyright, the copyright data that deciphering is reduced passes to application system by the application system interface, and its concrete mode is:
Resolve the protection policy data;
Call appointment decipherment algorithm and decipher according to copyright protection strategy, selection partly or total data is used key K or PKI K-Pub or key K and protection is tactful is decrypted data file protected by copyright;
Use the application system interface to pass to application system the copyright data of deciphering reduction.
The below carries out simple explanation with the protection to the digital media file copyright to the present invention.
To the protection with digital media file: at first original figure media file A is input to copyright data conservation treatment device 11; This device can produce copyright protection strategy when processing copyright original figure media file, and generates key K according to this strategy, sends these two data (protection strategy and key K) to authority generating apparatus 12 again; Original figure media file A is converted into protected digital rights file A ', and at this moment, encrypting and protecting files is finished; After the user took digital media file A ' protected by copyright after the processing, with its input authority application apparatus 13, this device can be decrypted file A ', the key plain after obtaining deciphering and protection strategy plaintext; Copyright data protection application device 14 will be taken the key K and the protection strategy that are generated by authority application apparatus 13 and untie by the digital media data of copyright protection, obtain deciphering the digital media file A after the reduction.
Obviously, those skilled in the art can carry out various changes and modification to the present invention and not break away from the spirit and scope of the present invention.Like this, if of the present invention these are revised and modification belongs within the scope of claim of the present invention and equivalent technology thereof, then the present invention also is intended to comprise these changes and modification interior.

Claims (9)

1. digital literary property protection method may further comprise the steps:
(1) according to the data file class that will protect, copyright protection strategy is set, uses key that the general data file is encrypted, the general data file is converted into data file protected by copyright; The concrete mode that the general data file is converted into data file protected by copyright is:
Judge the file type of the general data file of input, select the copyright protection strategy collection;
The protection strategy is set;
According to the protection strategy, use corresponding related computing and key compose operation generation key K or key to private key K-Pri, PKI K-Pub;
Use the PKI K-Pub of above-mentioned key K or cipher key pair, according to the copyright protection strategy that arranges, the general data file of inputting is carried out all or part of encryption;
General data file after encrypting is added file header or file header and protection strategy;
Use prefabricated private key A to key K or key to or key K and protection strategy carry out digital signature;
(2) inquiry obtains key or key and protection strategy according to the copyright data ID of data file protected by copyright, and user's condition code is to key or key and protect strategy to be encrypted authorized file; The concrete mode of authorized file is:
Use prefabricated PKI A to key K or key to or key K and protection strategy carry out signature verification;
Preserve key K or key to or key K tactful with protection;
Inquire about corresponding key K or PKI K-Pub or key K and protection strategy with copyright data ID as key assignments;
Use prefabricated private key B to unencrypted key K or key to or key K and protection policy data carry out digital signature;
User's condition code to key K or key to or key K and protection strategy encrypt;
The data of above-mentioned encryption are added file header;
Preserve key K or key to or the key K data file tactful with protection, authorized file;
(3) obtain the user characteristics code, the key of authority or key and protection strategy deciphering reduction are become key plain or the key plain and protection strategy plaintext of direct use;
(4) use key or key and the deciphering of protection strategy data file protected by copyright, the copyright data of deciphering reduction is passed to application system by the application system interface.
2. digital literary property protection method as claimed in claim 1 is characterized in that: described protection strategy refers to encryption policy information that the data file is used which kind of cryptographic algorithm, key length and which data is encrypted.
3. digital literary property protection method as claimed in claim 1, it is characterized in that: described copyright data ID refers to global sequence number or other unique values, global sequence number refers to the sequence number of claimed each application program in the system, and unique value refers to the numeral of unique its complete identity of identification of the application program that each needs protection;
Described user characteristics code refers to application terminal or user's unique code, stablizes identifying user has legal rights of using to protected application program code.
4. digital literary property protection method as claimed in claim 1; it is characterized in that: in the step (3), described with authority key or the concrete mode of key and the protection strategy deciphering reduction key plain that becomes direct use or key plain and protection strategy plaintext be:
Obtain the user characteristics code;
According to user characteristics code deciphering reduction key K or key to or key K tactful with protection;
Key K after using prefabricated PKI B to deciphering or key to or key K carry out signature verification with the protection strategy, obtain deciphering key plain or the key plain and the tactful plaintext of protection of reduction.
5. digital literary property protection method as claimed in claim 1 is characterized in that: in the step (4), with the copyright data of deciphering reduction by the concrete mode that the application system interface passes to application system be:
Resolve the protection policy data;
Call appointment decipherment algorithm and decipher according to copyright protection strategy, selection partly or total data is used key K or PKI K-Pub or key K and protection is tactful is decrypted data file protected by copyright;
Use the application system interface to pass to application system the copyright data of deciphering reduction.
6. digital literary property protection method as claimed in claim 1 is characterized in that: described file header comprise identification document be the magic number of the file that uses of specific program, as the sub-key of encrypting the part key of data after this, identify the version of these file header data so that application program is done the file header version of suitable coupling and the proof test value of depositing verification file integrity digest value after upgrading.
7. digital copyright protection system comprises with lower device:
Copyright data conservation treatment device: be used for according to the data file class that will protect copyright protection strategy being set, use key that the general data file is encrypted, the general data file is converted into data file protected by copyright; Copyright data conservation treatment device comprises following ingredient:
Copyright protection pretreater: to the general data file of input, judge and want the protected data file type, select different copyright protection strategy collection;
Copyright protection strategy manager: copyright protection strategy is set;
Key compositor: according to the protection strategy, use corresponding related computing and key compose operation generation key K or key to private key K-Pri, PKI K-Pub;
Encryption equipment: use the PKI K-Pub of above-mentioned key K or cipher key pair, according to the copyright protection strategy that arranges, the general data file of inputting is carried out all or part of encryption;
The rights file compositor: the general data file after will encrypting adds file header or file header and protection strategy;
Digital autograph device: use prefabricated private key A to key K or key to or key K and protection strategy carry out digital signature;
Authority generating apparatus: be used for obtaining key and protection strategy according to the copyright data ID inquiry of data file protected by copyright, and user's condition code is encrypted authorized file to key and protection strategy; The authority generating apparatus comprises following ingredient:
Signature verifier: use prefabricated PKI A to the key K that sent by copyright data conservation treatment device or key to or key K and protection strategy carry out signature verification;
The key K database: preserve the key K that sent by copyright data conservation treatment device or key to or key K tactful with protection;
Data base querying device: carry out key K or PKI K-Pub or key K and protection policy lookup as key assignments with copyright data ID;
The signature device: use prefabricated private key B to unencrypted key K or key to or key K carry out digital signature with protecting policy data;
Encryption equipment: user's condition code to key K or key to or key K and protection strategy be encrypted;
Authority compositor: the data of above-mentioned encryption are added file header, authorized file;
The authority application apparatus: being used for the key of authority or key are become with protection strategy deciphering reduction is key plain or the key plain and the tactful plaintext of protection that copyright data protection application device directly uses;
Copyright data protection application device: be used for and the application system interface, the copyright data that deciphering is reduced sends application system to.
8. digital copyright protection system as claimed in claim 7, it is characterized in that: described authority application apparatus comprises following ingredient:
User characteristics code getter: obtain the user characteristics code;
Decipher: user's condition code deciphering reduction key K or key to or key K tactful with protection;
Signature verifier: the key K after using prefabricated PKI B to deciphering or key to or key K carry out signature verification with protecting strategy;
Key and the tactful safe Transfer pipe of protection: will decipher key plain or the key plain of reduction and protect strategy expressly to pass to the copyright protection application apparatus by safe Transfer pipe.
9. digital copyright protection system as claimed in claim 7, it is characterized in that: described copyright protection application apparatus comprises following ingredient:
Copyright protection strategy resolver: resolve the protection policy data, and send data to the copyright protection decryption controller;
The copyright protection decryption controller: call appointment decipherment algorithm and decipher according to copyright protection strategy, selection partly or total data is used key K or PKI K-Pub or key K and protection is tactful is decrypted copyright data;
The application system interface: the copyright data that will decipher reduction uses this interface to pass to application system.
CN2011100705367A 2011-03-23 2011-03-23 Method and system for digital copyright protection Active CN102129532B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011100705367A CN102129532B (en) 2011-03-23 2011-03-23 Method and system for digital copyright protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011100705367A CN102129532B (en) 2011-03-23 2011-03-23 Method and system for digital copyright protection

Publications (2)

Publication Number Publication Date
CN102129532A CN102129532A (en) 2011-07-20
CN102129532B true CN102129532B (en) 2013-03-20

Family

ID=44267615

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011100705367A Active CN102129532B (en) 2011-03-23 2011-03-23 Method and system for digital copyright protection

Country Status (1)

Country Link
CN (1) CN102129532B (en)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102724043B (en) * 2012-06-21 2015-04-22 哈尔滨国源火电节能技术有限公司 Single user authoring method for digital rights management
CN103595698B (en) * 2012-08-16 2017-05-03 福建福昕软件开发股份有限公司 Management method for digital rights
CN102932680A (en) * 2012-11-22 2013-02-13 上海文广互动电视有限公司 3D television content digital rights management front-end system
CN103067170B (en) * 2012-12-14 2015-04-15 深圳国微技术有限公司 encrypting method based on EXT2 file system
CN103905187B (en) * 2012-12-26 2018-04-03 厦门雅迅网络股份有限公司 A kind of network service encryption method based on content
CN103177225B (en) * 2013-04-01 2016-04-27 厦门市美亚柏科信息股份有限公司 A kind of data managing method and system
CN103995992A (en) * 2014-05-28 2014-08-20 全联斯泰克科技有限公司 Method and device for protecting software
CN104239755A (en) * 2014-10-11 2014-12-24 浪潮电子信息产业股份有限公司 DRM signature verification method
CN104615944A (en) * 2015-01-09 2015-05-13 天脉聚源(北京)科技有限公司 Method and device for encrypting and decrypting files
CN104966000A (en) * 2015-06-05 2015-10-07 浪潮电子信息产业股份有限公司 Multimedia copyright protection method based on security engine
CN107306254B (en) * 2016-04-21 2021-06-18 北京印刷学院 Digital copyright protection method and system based on double-layer encryption
CN108959982B (en) * 2018-07-06 2021-08-24 江苏北弓智能科技有限公司 Mobile terminal file encryption and decryption system and method based on hardware encryption TF card
CN109117649B (en) * 2018-07-23 2022-10-14 合肥联宝信息技术有限公司 File processing method and device and computer readable storage medium
CN109086063A (en) * 2018-07-27 2018-12-25 中国联合网络通信集团有限公司 Oftware updating method, file encrypting method, device and storage medium
CN109446752B (en) * 2018-12-13 2021-07-13 苏州科达科技股份有限公司 Copyright file management method, system, device and storage medium
CN113472818B (en) * 2021-09-03 2021-11-30 深圳墨世科技有限公司 Copyright audio data processing method, server and mobile terminal
CN115618435B (en) * 2022-10-28 2023-09-15 长江量子(武汉)科技有限公司 File management and control method applied to office equipment and office equipment
CN115828287B (en) * 2023-01-10 2023-05-23 湖州丽天智能科技有限公司 Model encryption method, model decryption method, computer and integrated chip

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101211387A (en) * 2006-12-31 2008-07-02 深圳市酷开网络科技有限公司 File protection method
CN101452553A (en) * 2008-12-22 2009-06-10 武汉大学 Trading method for protecting database copyright based on digital watermarking

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100419680C (en) * 2004-12-21 2008-09-17 中兴通讯股份有限公司 Method and apparatus for loading compatibly equipment software in distributed control system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101211387A (en) * 2006-12-31 2008-07-02 深圳市酷开网络科技有限公司 File protection method
CN101452553A (en) * 2008-12-22 2009-06-10 武汉大学 Trading method for protecting database copyright based on digital watermarking

Also Published As

Publication number Publication date
CN102129532A (en) 2011-07-20

Similar Documents

Publication Publication Date Title
CN102129532B (en) Method and system for digital copyright protection
US8843745B2 (en) Methods of authorizing a computer license
CN103281377B (en) A kind of encrypt data storage and querying method of facing cloud
CN101609495A (en) A kind of electronic document digital rights management method
CN101536398A (en) Cryptographic method for a white-box implementation
KR20070085257A (en) Electronic software distribution method and system using a digital rights management method based on hardware identification
CN103595698B (en) Management method for digital rights
US7805616B1 (en) Generating and interpreting secure and system dependent software license keys
CN1925392A (en) Method for identification of equipment validity
US20100058047A1 (en) Encrypting a unique cryptographic entity
MX2011005255A (en) Method and device for managing digital content.
US20130124849A1 (en) System And Method For Individualizing Content For A Consumer
CN103237010B (en) The server end of digital content is cryptographically provided
CN104135368A (en) A method for protecting data of an electronic chart
CN1645797A (en) Method for optimizing safety data transmission in digital copyright managing system
CN104966000A (en) Multimedia copyright protection method based on security engine
CN110737905B (en) Data authorization method, data authorization device and computer storage medium
CN103186731B (en) The digital literary property protection method of a kind of hybrid mode and system
JP2008506293A (en) How to provide digital authentication functionality
CN110708155A (en) Copyright information protection method, copyright information protection system, copyright confirming method, copyright confirming device, copyright confirming equipment and copyright confirming medium
KR20140071775A (en) Cryptography key management system and method thereof
CN108197438A (en) A kind of digital literary property protection method based on complex encryption technology
KR20090024482A (en) Key management system for using content and method thereof
US9467427B2 (en) Methods and systems for authorizing and deauthorizing a computer license
CN103020492A (en) On-line digital content copyright protection system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: BEIJING E-SAFENET SCIENCE AND TECHNOLOGY DEVELOPME

Free format text: FORMER OWNER: RUAN XIAOXUN

Effective date: 20120629

Free format text: FORMER OWNER: LIANG JINQIAN

Effective date: 20120629

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20120629

Address after: 100085, No. 10, information road, Haidian District, Beijing, No. 101

Applicant after: Beijing Esafent Technology Development Co., Ltd.

Address before: 100085, room 101, Nantian building, 10 information road, Haidian District, Beijing

Applicant before: Ruan Xiaoxun

Co-applicant before: Liang Jinqian

C14 Grant of patent or utility model
GR01 Patent grant