CN103036860A - Verification method, verification system, server side, client side and terminal of electronic reading materials - Google Patents

Verification method, verification system, server side, client side and terminal of electronic reading materials Download PDF

Info

Publication number
CN103036860A
CN103036860A CN 201110304153 CN201110304153A CN103036860A CN 103036860 A CN103036860 A CN 103036860A CN 201110304153 CN201110304153 CN 201110304153 CN 201110304153 A CN201110304153 A CN 201110304153A CN 103036860 A CN103036860 A CN 103036860A
Authority
CN
China
Prior art keywords
electron reading
user
client
terminal
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 201110304153
Other languages
Chinese (zh)
Inventor
孟祥增
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI BLACKSPACE INFORMATION TECHNOLOGY Co Ltd
Original Assignee
SHANGHAI BLACKSPACE INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI BLACKSPACE INFORMATION TECHNOLOGY Co Ltd filed Critical SHANGHAI BLACKSPACE INFORMATION TECHNOLOGY Co Ltd
Priority to CN 201110304153 priority Critical patent/CN103036860A/en
Publication of CN103036860A publication Critical patent/CN103036860A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

Provided is a verification method, a verification system, a server side, a client side and a terminal of electronic reading materials. The verification method of the electronic reading materials comprises that the server side generates an encrypt file and a basic authorization file of the electronic reading materials; the client side sends a first request to the server side, the first request comprises information of the electronic reading materials chosen by the client side and user identification and terminal identification which correspond to the client side; the server side generates a user authorization file of the chosen electronic reading materials based on the basic authorization file of the electronic reading materials chosen by the client side; the client side downloads the encrypt file and the user authorization file of the chosen electronic reading materials to the terminal; and the client side verifies the user authorization file of the electronic reading materials appointed by the terminal, and after verification is successfully achieved, the encrypt file of the appointed electronic reading materials is decoded. According to the technical scheme, whether the authority of the electronic reading materials is legal can be efficiently detected in a high-quality mode, and copyright of the electronic reading materials is protected.

Description

The verification method of electron reading and system, server end, client and terminal
Technical field
The present invention relates to electron reading verification technique field, especially a kind of verification method of electron reading and system, server end, client and terminal.
Background technology
Prosperity along with Information technology, popularizing of e-book, panel computer, smart mobile phone, increasing literature author begins paper book is made into electron reading and is uploaded to the Internet for other people, and is corresponding, and people are the more and more widely up and down sub-reading matter reading of live from the Internet also.
Because electron reading exists with the form of data on the internet, and the propagation of the data of electron reading is very quick, therefore for the data of the electron reading downloaded, if the user will the data download of required electron reading after, the action that just can indiscriminately ad. as one wishes copy or copy.Although carried out encipherment protection in the manufacturing process of electron reading, at present decryption software spreads unchecked, and can not play a very good protection to the electron reading of the encryption of downloading.This extremely is unfavorable for the protection of electron reading copyright, has also damaged literature author's interests simultaneously.
Electron reading is downloaded to after the terminal, and the checking of electron reading also is a very problem of puzzlement.The at present checking of electron reading is normally under the condition of networking, server end by network is verified, this checking that requires on the one hand electron reading must be to carry out having under the condition of network, the checking of the server end of network has not only increased the burden of transfer of data on the other hand, and in case the number of users of checking becomes mass data, the situation of generation information obstruction also might cause the situation of system crash to occur when serious easily.
Publication number is the Chinese patent application of CN 1236450A, discloses scheme and an equipment that is used for viewing electronic reading materials, is used for propagating the written information that can read at Portable e-book.Master computer comprises the catalogue of the written information of an electronic format, can be selected in the memory that then downloads to Portable e-book.Master computer is followed the tracks of transaction, and before downloading with the encryption system that comprises the security number that Portable e-book is unique this data of encoding.After receiving enciphered data, Portable e-book is deciphered this data, and can show at it text of screen display original text data.This Portable e-book has the CPU of operating system, is used for the function of control Portable e-book.Nonvolatile memory is arranged in Portable e-book, be used for preserving publication.
But whether the authority of how efficient, high-quality check electron reading is legal, and the copyright of protection electron reading becomes one of present problem demanding prompt solution.
Summary of the invention
The problem that the present invention solves is whether the authority of how efficient, high-quality check electron reading is legal, the copyright of protection electron reading.
For addressing the above problem, technical scheme of the present invention provides a kind of verification method of electron reading, comprising:
Server end generates encrypt file and the basic authority of electron reading;
The user end to server end sends the first request, and described client is loaded in the terminal, and described the first request comprises the information of the electron reading that described client selects and user ID and the terminal iidentification of corresponding described client;
The basic authority of the electron reading that described server end is selected based on described client generates the user authorization file of the electron reading of described selection, and the user authorization file of described electron reading comprises user ID and the terminal iidentification of corresponding described client;
Described client is downloaded to described terminal with encrypt file and the user authorization file of the electron reading of described selection;
The user authorization file of the electron reading of appointment in the described terminal of described client validation, and the encrypt file of electron reading of the described appointment of deciphering after being proved to be successful.
Optionally, the user authorization file of the electron reading of appointment comprises in the described terminal of described client validation: whether the user authorization file of confirming the electron reading of described appointment exists; Whether the user authorization file of electron reading of confirming described appointment is complete and correct.
Optionally, after the failure of the user authorization file of the electron reading of appointment, the verification method of described electron reading also comprises in the described terminal of described client validation:
Described user end to server end sends the second request, and described the second request comprises the information of electron reading of described appointment and user ID and the terminal iidentification of corresponding described client;
Described server end is verified user ID and the terminal iidentification of the corresponding described client that described client sends, and allows described client again to download encrypt file and the user authorization file of the electron reading of described appointment after being proved to be successful.
Optionally, described server end verifies that user ID and the terminal iidentification of the corresponding described client that described client sends comprise: whether checking exists the user authorization file of the electron reading that comprises described appointment, and whether this user authorization file comprises user ID and the terminal iidentification of corresponding described client.
For solving the problems of the technologies described above, technical scheme of the present invention also provides a kind of server end, comprising:
Generation unit is in order to encrypt file and the basic authority that generates electron reading;
Processing unit generates the user authorization file of the electron reading of described selection in order to the basic authority of the electron reading selected based on client, and the user authorization file of described electron reading comprises user ID and the terminal iidentification of corresponding described client.
Optionally, described server end also comprises: authentication unit, in order to verifying user ID and the terminal iidentification of the corresponding described client that described client sends, and after being proved to be successful, allow described client again to download encrypt file and the user authorization file of the electron reading of described appointment.
Optionally, whether described authentication unit checking exists the user authorization file of the electron reading that comprises described appointment, and whether this user authorization file comprises user ID and the terminal iidentification of corresponding described client.
For solving the problems of the technologies described above, technical scheme of the present invention also provides a kind of client, and described client is loaded in the terminal, and described client comprises:
Transmitting element, in order to sending the first request to server end, described the first request comprises the information of the electron reading that described client selects and user ID and the terminal iidentification of corresponding described client;
Download unit is downloaded to described terminal in order to encrypt file and user authorization file with the electron reading of described selection from described server end;
Confirmation unit, in order to verifying the user authorization file of the electron reading of appointment in the described terminal, and after being proved to be successful the encrypt file of the electron reading of the described appointment of deciphering.
Optionally, described confirmation unit confirms whether the user authorization file of the electron reading of described appointment exists; Whether the user authorization file of electron reading of confirming described appointment is complete and correct.
Optionally, after described confirmation unit is verified the user authorization file failure of the electron reading of appointment in the described terminal, described transmitting element also sends the second request to server end, and described the second request comprises the information of electron reading of described appointment and user ID and the terminal iidentification of corresponding described client.
For solving the problems of the technologies described above, technical scheme of the present invention also provides a kind of terminal, is mounted with aforesaid client.
For solving the problems of the technologies described above, technical scheme of the present invention also provides a kind of verification system of electron reading, comprising:
Aforesaid server end;
Aforesaid terminal.
Compared with prior art, the present invention has the following advantages:
Server end generates the encrypt file of electron reading, guarantees that electron reading can not at will be read, and the copyright of electron reading is provided with the first safeguard measure.Server end generates basic authority, and server end adds described basic authority formation user authorization file with user ID and the terminal iidentification of client.Whether the authority that user authorization file becomes the final inspection electron reading legal voucher, and this is the second safeguard measure of electron reading.The twice safeguard measure can further be protected the copyright of electron reading, prevents random propagation.
Whether the authority by client check electron reading is legal, client is loaded on the terminal, client can in the situation of not networking, based on the user authorization file of electron reading, check the current terminal that is mounted with client whether the authority viewing electronic reading materials is arranged.This has alleviated the burden of server on the one hand, and because user's quantity is huge, higher to the performance requirement of server by the server end checking, can reduce requirement to the server end performance by client validation, saving resource and save cost, on the other hand, in the situation of not networking, verify, the scope of application that can extend one's service, unnecessary could viewing electronic reading materials in when networking, and do not network and verify and can also exempt user's expenses of surfing Internet.
Whether the authority by the client validation electron reading is legal, not only can alleviate the burden of server end, the scope of application that extends one's service, and client only verifies whether the authority of local electron reading is legal, and once only verify an electron reading, this has also improved quality and the efficient of the authority of check electron reading.
The current terminal of client check has the authority viewing electronic reading materials, then deciphers the encrypt file of electron reading; The current terminal of client check does not have the authority viewing electronic reading materials, under the condition of networking, user ID and terminal iidentification with the information of electron reading and corresponding client is sent to server end again, whether have authority by the server end checking and read, and can again download the user authorization file of this electron reading.When this guarantees the user in misoperation or loses user authorization file, can again download the user authorization file of this electron reading, avoid user's resource to incur loss.
Description of drawings
Fig. 1 is the flow chart of the verification method of the electron reading that provides of the embodiment of the invention;
Fig. 2 is the operational flowchart of the embodiment of the invention;
Fig. 3 is the file fragment schematic diagram of the basic authority that provides of the embodiment of the invention;
Fig. 4 is the file fragment schematic diagram of the user authorization file that provides of the embodiment of the invention;
Fig. 5 is the structural representation of the server end that provides of the embodiment of the invention;
Fig. 6 is the structural representation of the client that provides of the embodiment of the invention.
Embodiment
For above-mentioned purpose of the present invention, feature and advantage can more be become apparent, below in conjunction with accompanying drawing the specific embodiment of the present invention is described in detail.
Set forth detail in the following description so that fully understand the present invention.But the present invention can be different from alternate manner described here and implements with multiple, and those skilled in the art can do similar popularization in the situation of intension of the present invention.Therefore the present invention is not subjected to the restriction of following public embodiment.
Fig. 1 is the flow chart of the verification method of the electron reading that provides of the embodiment of the invention, describes in detail below in conjunction with Fig. 1.
As shown in Figure 1, the verification method of described electron reading comprises:
Step S1, server end generate encrypt file and the basic authority of electron reading;
Step S2, user end to server end send the first request, and described client is loaded in the terminal, and described the first request comprises the information of the electron reading that described client selects and user ID and the terminal iidentification of corresponding described client;
Step S3, the basic authority of the electron reading that described server end is selected based on described client generates the user authorization file of the electron reading of described selection, and the user authorization file of described electron reading comprises user ID and the terminal iidentification of corresponding described client;
Step S4, described client is downloaded to described terminal with encrypt file and the user authorization file of the electron reading of described selection;
Step S5, the user authorization file of the electron reading of appointment in the described terminal of described client validation, and the encrypt file of electron reading of the described appointment of deciphering after being proved to be successful.
Fig. 2 is the operational flowchart of the embodiment of the invention, and is concrete, and operational flowchart shown in Figure 2 describes technical scheme of the present invention for the operational flowchart of the electron reading of purchase network bookstore in detail below in conjunction with Fig. 1 and Fig. 2.
With reference to figure 1, among the described step S1, server end can be network server end, in order to preserve electron reading and relevant file and information thereof.Electron reading and relevant file and information thereof are stored in server end with the form of database usually, and wherein the information such as the title of electron reading, author, summary, publication time, publishing house can be opened to the user and consult.
The form of described electron reading has many kinds, the electron reading of various forms is referred to as e-file, mainly be divided into text electron-like file and audio-visual electron-like file, commonly used is the e-file of the forms such as txt, doc, docx, ppt, pptx, pdf, MP3/4, warm.Can comprise the data such as literal, picture, animation, sound, video in the described electron reading.Electron reading can be made software development by electron reading commonly used, and for example, xbookmaker software also can be converted into paper book by equipment such as camera, video camera, scanners the e-files such as picture, video and make.
Electron reading is made by the author of electron reading, the related personnel of publishing house usually, and after completing by network, approach such as family broadband, wifi, 2G/3G is with the electron reading of the forms such as above-mentioned txt, doc, docx, ppt, pptx, pdf, MP3/4, the warm end that uploads onto the server.
In the present embodiment, the making of electron reading is with upload can be referring to step S101 among Fig. 2 and step S102.
The electron reading of network bookstore is normally sold on the internet by the operator issue of network bookstore, after the netizen is registered as the user of this network bookstore, buy electron reading in this network bookstore, and can download from the server end of network bookstore the associated documents of the electron reading of buying.
Step S101 shown in Figure 2 makes electron reading.Present publication is mainly published with papery version and two kinds of forms of electronic edition.The electron reading of selling in network bookstore need to have the e-file of downloading this electron reading for the buyer, and therefore need to make it for the publication of papery version can be for the e-file of downloading, namely described making electron reading.If the publication of electronic edition, this publication is published with foregoing form usually, and the publication itself that is to say electronic edition just has can be for the e-file of downloading.
The publication of electronic edition for example, the publication of the books classes such as newspaper, periodical, magazine is published with the form of text electron-like file, the publication of the audio classes such as music, film, foreign language teaching material is published with the form of audio-visual electron-like file, and commonly used is the e-file of the forms such as txt, doc, docx, ppt, pptx, pdf, MP3/4, warm.Also can comprise the data such as picture, animation, sound, video in the electron reading of books class, corresponding, also can comprise the data such as literal in the publication of audio class.The publication of the electronic edition of publishing with above-mentioned form itself is exactly can be for the e-file of downloading.
The publication of papery version can be by manually inputting the e-file that forms the text class, the text electron-like file of forms such as txt, doc, docx, ppt, pptx, pdf, perhaps make software development by electron reading commonly used, for example, xbookmaker software, the e-file of extended formatting is converted into the e-file of text class, perhaps is converted into the audio-visual electron-like file of the MP3/4 such as picture, video, voice, warm form by input equipments such as camera, video camera, scanner, sound pick-up outfits.
For further protecting the copyright of electron reading, the operator of network bookstore also can be made the e-file of the specific format of its company's distribution.In such cases, publication is made into after above-mentioned text electron-like file or the audio-visual electron-like file, also needs the electron reading of the operator oneself by network bookstore to make the e-file that software is converted into above-mentioned text electron-like file or audio-visual electron-like file its special format.
Step S102 shown in Figure 2 uploads electron reading.After electron reading completes, usually can upload the server end of network bookstore, buy for the user.Electron reading can pass through network, and approach such as family broadband, wifi, 2G/3G is with the electron reading of the forms such as above-mentioned txt, doc, docx, ppt, pptx, pdf, MP3/4, the warm end that uploads onto the server.
After server end receives the electron reading of uploading, can do further processing to electron reading.With reference to figure 1, among the described step S1, after server end obtains above-mentioned electron reading, use cryptographic algorithm to generate the encrypt file of electron reading, and generate the basic authority of this electron reading.Generally, a corresponding encrypt file of electron reading and a basic authority.
The algorithm that described server end uses comprises: DES (Data Encryption Standard), symmetry algorithm, 3DES (Triple DES), based on the symmetry algorithm of DES, RC2 and RC4, symmetry algorithm, IDEA (IDEA, International Data Encryption Algorithm), RS A: by the asymmetric arithmetic of RSA company invention, Digital Signature Algorithm (DSA, Digital Signature Algorithm), Advanced Encryption Standard (AES, Advanced Encryption Standard), symmetry algorithm, BLOWFISH, the cryptographic algorithm of elongated key, MD5, digest algorithm scheduling algorithm.The cryptographic algorithm that above-mentioned cryptographic algorithm is commonly used for those skilled in the art can select wherein one or more to be encrypted in the specific implementation as required, also can adopt other cryptographic algorithm, repeats no more herein.
The encrypt file of described electron reading need to just can be opened through deciphering and read original electron reading, described encrypt file has sign usually, described sign can be common numeral or alpha code, also can be the title of electron reading, can also be that encrypt file is in the memory address of server end.Described encrypt file is arranged the storage that sign can convenient service device end and searches.
Described basic authority has recorded the attribute information of this electron reading, such as the title of electron reading, author, summary, number of words, publication time, publishing house etc.Described basic authority has also recorded some default information, such as the user who buys this electron reading, download the terminal of this electron reading etc., after these default information need server end to receive the request of client, request according to client adds, and forms final user authorization file.
Fig. 3 is the file fragment schematic diagram of the basic authority that provides of the embodiment of the invention, file fragment with reference to basic authority shown in Figure 3, the attribute information 1 that has wherein comprised electron reading, for example, the title of electron reading, author, summary, publication time, publishing house etc.Basic authority has also recorded some default information 2, for example, buy this electron reading user ID, download the terminal iidentification of this electron reading etc.These default information 2 are blank in basic authority, need server to receive the request of client after, add according to the request of client, form final user authorization file.
Described basic authority also is the file that generates through cryptographic algorithm usually, mainly is in order to prevent be maliciously tampered wherein information of basic authority.Described basic authority adopts the DSA algorithm to be encrypted usually, if the information in the basic authority is maliciously tampered, original digital signature can change, when carrying out the checking of electron reading, in case finding original digital signature changes, then this basic authority lost efficacy, and the authority of electron reading is not legal, can not fulfil corresponding authority to this electron reading.
Described basic authority also has sign usually.The sign of described basic authority also can be common numeral or alpha code, also can be the title of electron reading, can also be that described basic authority is in the memory address of server end.Described basic authority is arranged the storage that sign can convenient service device end and searches.
The sign of the sign of described encrypt file, basic authority is corresponding with its electron reading.This is to make mistakes in order to prevent from generating user authorization file, when only having the sign of the sign of encrypt file, basic authority consistent with its electron reading, could generate the user authorization file of this electron reading.
The server end of network bookstore will be preserved relevant file and the information of electron reading such as the original upload file, encrypt file of above-mentioned electron reading, basic authority.Electron reading and relevant file and information thereof are stored in server end with the form of database usually, and wherein the information such as the title of electron reading, author, summary, publication time, publishing house can be opened to the user and consult.
The user logins client and enters server end, according to open electron reading information, selects the electron reading that needs, for example, buys the electron reading of liking, perhaps the electron reading of just listing of academic probation etc.Concrete, with reference to step S2 shown in Figure 1, client is loaded in the terminal, and the author of electron reading can be by client with the electron reading end that uploads onto the server.Other user in the situation of networking, sign in to client after, can be connected to server by client, select the electron reading oneself like at server end.The user selects the process of the electron reading oneself like at server end, typically refer to the user buys electron reading or free probation electron reading in network bookstore process.
Client is sent to server end with the information of the electron reading of user selection and user ID and terminal iidentification as request.This request also can be regarded user's purchase request or academic probation request as.The information of described electron reading can comprise title, author, publication time, the publishing house of electron reading, can also be the numbering of electron reading, the sign of the encrypt file of electron reading etc.Described user ID is generally the user when logining client, the user name of use or account number, such as the pet name, name, cell-phone number etc.Described user ID is that the overall situation is unique.Described terminal iidentification is also referred to as device number for the sign of the terminal of loading active client.For example, if terminal is mobile phone, then terminal iidentification is mobile phone string number, if terminal is computer (notebook computer or desktop computer), then terminal iidentification is the sequence number of hard disk, if terminal is panel computer or electronic reader, then terminal iidentification is the device number of panel computer or electronic reader.Described terminal iidentification also is that the overall situation is unique, the corresponding terminal iidentification of terminal.
Client must be in the situation that the user ID login is arranged, and sends above-mentioned information and the user ID of corresponding described client and purchase request or the academic probation request of terminal iidentification that comprises the electron reading of selection to server end.User ID in this request is unique, but information and the terminal iidentification of the electron reading of selecting can be for a plurality of.That is to say, can once select a plurality of electron readings, when sending request (buying the general designation of request and academic probation request), the information of a plurality of electron readings of selection is sent in a request.The electron reading of selecting also can download in a plurality of terminals and use, and therefore when sending request, can carry a plurality of terminal iidentifications in a request, selects electron reading can download in a plurality of terminals and uses.
In specific implementation process, terminal iidentification can be along with above-mentioned request be sent to server end, but when downloading this electron reading, sends current terminal iidentification by the user end to server end.Can make things convenient for like this terminal downloads of user selection needs or the terminal that change is downloaded.
Continuation is with reference to figure 1, among the described step S3, server end obtains that client sends has comprised information and the user ID of corresponding described client and the request of terminal iidentification of the electron reading that client selects, from the information of the electron reading selected, obtain title, the numbering of the electron reading of selection, one or more information wherein such as sign of encrypt file, find the basic authority of the electron reading of selection based on these information.
The user ID of the client during server end will be asked and terminal iidentification add the basic authority of the electron reading of described selection, generate user authorization file.For example, with information default in the basic authority, such as the user who buys this electron reading, download the terminal of this electron reading etc., after these default information receive the request of client at server, request according to client adds, and forms final user authorization file.
As mentioned before, client can be when downloading the electron reading of described selection, identify to the server end transmitting terminal again, accordingly, server end can add user ID first basic authority, then wait for the follow-up transmitting terminal sign of client, again terminal iidentification is added the basic authority that has had user ID, form final user authorization file.
Fig. 4 is the file fragment schematic diagram of the user authorization file that provides of the embodiment of the invention, file fragment with reference to user authorization file shown in Figure 4, user authorization file adds user ID in basic authority and terminal iidentification obtains, therefore among Fig. 3, the part of default information 2 has been filled in the access customer sign and terminal iidentification becomes authorization message 3 (shown in Figure 4).
The difference of the file fragment of the file fragment of basic authority shown in Figure 3 and user authorization file shown in Figure 4 is, user authorization file is to form on the basis of basic authority, writes user ID and terminal iidentification formation user authorization file in basic authority.
Described user authorization file adds user ID and terminal iidentification by cryptographic algorithm that basic authority generates, described user authorization file is the key file of the encrypt file deciphering of electron reading, that is to say, user authorization file is the authority legal voucher whether of check electron reading, only have user authorization file to check successfully, just can open the encrypt file of electron reading.
Server end receives that client sends comprised the request of the user ID of the information of the electron reading that client selects and corresponding described client and terminal iidentification after, generate corresponding user authorization file, then send feedback information to client, the notice client is carried out follow-up work.
Described step S3 and S4, correspondence can with reference to figure 2 described step S103, be bought electron reading.Among the described step S3, client is selected electron reading, typically refer to the electron reading that the user buys or academic probation is selected in network bookstore, client is with information and the user ID of client and the server end that terminal iidentification is sent to network bookstore of the electron reading of user's purchase or academic probation.After the server end of network bookstore receives above-mentioned information, generate the user authorization file of electron reading.
Concrete, for the copyright of protection electron reading, after the reader need to buy the electron reading of network bookstore, could read this electron reading or this electron reading be carried out other operation, such as editor, reprinting, printing etc.
The user installs client in terminal, under the condition of networking, on client, login with user ID (being generally user name, account or the pet name), enter network bookstore by client, the electron reading that selection will be bought, and pay the rights of using that certain expense is bought the electron reading of selecting.The reading authority of electron reading, editing authority, reprinting authority, print right, academic probation authority etc. are referred to as the rights of using of electron reading.
The user can buy the reading authority, editing authority, academic probation authority, print right of electron reading etc., and the expense of different authority payments is different.The user must be under the condition of networking when buying electron reading, and must could buy with the user ID login on client.
The information of the electron reading that the client user that listed user ID is corresponding buys and the terminal iidentification of corresponding described client and this listed user ID are sent to server end as buying request.The information of the electron reading that described user buys comprises the title, author, publication time, publishing house of electron reading etc.
The terminal that client is installed comprises the equipment such as e-book, desktop computer, notebook computer, panel computer, mobile phone.Terminal in the present embodiment is panel computer, and then terminal iidentification is the device number of panel computer.
The server end of network bookstore obtains the information of the electron reading that above-mentioned user buys and user ID and the terminal iidentification of corresponding described client, in database, find encrypt file and the basic authority of the electron reading corresponding with the information of the electron reading of user selection, user ID and terminal iidentification are added in the basic authority of this electron reading and form user authorization file.
In other embodiments, client can be when downloading the electron reading of described purchase, identify to the server end transmitting terminal again, accordingly, server end can add user ID first basic authority, then wait for the follow-up transmitting terminal sign of client, again terminal iidentification is added the basic authority that has had user ID, form final user authorization file.
Server end is after the purchase request of the user ID of the information that receives the electron reading that user that client sends buys and corresponding described client and terminal iidentification, except generating user authorization file, also can record the purchase information of this user ID, for example, terminal iidentification of the title of the electron reading of user ID, purchase, time, which authority of having bought this electron reading, the encrypt file of downloading this electron reading and user authorization file etc.
The user can at least one electron reading of single purchase, and buys at least a authority of an electron reading, can also buy the download authority of the described electron reading of a plurality of terminal downloads.That is to say that user can a plurality of electron readings of single purchase, the multiple authority of an electron reading can also be bought the authority that a plurality of terminals are used this electron reading.
The user can download from server end the associated documents of the electron reading of buying usually after buying electron reading.Continuation is with reference to figure 1, after the execution in step S3, execution in step S4 is among the described step S4, client is downloaded encrypt file and the corresponding user authorization file of the electron reading of selecting from server end behind the feedback information that receives purchase success that server end sends or academic probation request success.If the electron reading of selecting is a plurality of, be downloaded to terminal after the compression of can packing.If comprise a plurality of terminal iidentifications in the request that client is sent, when downloading, can arrange client, allow same user ID to login simultaneously client on a plurality of terminals, and allow client on a plurality of terminals to download simultaneously encrypt file and the corresponding user authorization file of the electron reading of selection.
If client is sent to server end with terminal iidentification at this moment, then server end adds the basic authority that has had user ID with the terminal iidentification that receives this moment, forms final complete user authorization file.
Client is with the encrypt file of electron reading with after user authorization file is downloaded to terminal accordingly, and client will be set up and authorize catalogue, and user authorization file is preserved into the mandate catalogue.Described mandate catalogue can be set up according to user ID ordering, and the lexicographic order ordering of title that also can electron reading is set up.
Concrete, corresponding to step S104 shown in Figure 2, download.After the user finishes the purchase step of S103, can download encrypt file and the user authorization file of the electron reading of purchase.The electron reading of buying is downloaded to terminal, can makes things convenient for the user to consult at any time.
Client is the terminal iidentification of identification terminal automatically, and terminal iidentification can be sent to server end by client when buying electron reading, also can after the user buys, when needing to download, be sent to server end by client again.
Because a plurality of terminals of user's possibility single purchase are to the rights of using of this electron reading, several terminals can be downloaded described electron reading from server end simultaneously, and the time of also can staggering downloads.
If the electron reading of buying is a plurality of, can pack after the compression, be downloaded to terminal.If comprise a plurality of terminal iidentifications in the request that client is sent when buying, when downloading, can arrange client, allow same user ID to login simultaneously client on a plurality of terminals, and allow client on a plurality of terminals to download simultaneously encrypt file and the corresponding user authorization file of the electron reading of selection.
If client is sent to server end with terminal iidentification when downloading, then server end adds the basic authority that has had user ID with the terminal iidentification that receives this moment, forms final complete user authorization file.
Client is the terminal iidentification of identification terminal automatically, but usually can only identify the current terminal iidentification that the terminal of client is installed.If buy the rights of using to electron reading of a plurality of terminals, and when buying during the transmitting terminal sign, then the user needs manually input.Given this plant situation, suggestion only sends the number of user ID and terminal when buying, and transmitting terminal identifies again when downloading.
In the above-described embodiments, advise that a plurality of terminals time of staggering downloads separately, like this during each terminal downloads, by client the terminal iidentification of current user ID and current terminal is sent to server end, downloads the associated documents of the electron reading of buying from server end.
Server end has recorded the purchaser record of user ID and this user ID, the terminal iidentification of current user ID and current terminal is sent to server end, server end can be inquired about this user ID according to user ID and buy those electron readings, and whether this terminal iidentification has permission download.
It should be noted that in the above-mentioned situation that server end need to verify verify whether this user has bought electron reading, and whether this terminal iidentification has permission download after receiving the terminal iidentification of current user ID that client sends and current terminal.If be proved to be successful, then allow the associated documents of client downloads electron reading, otherwise refuse the associated documents of this client downloads electron reading.
For example, user's (user ID is A) has bought electron reading BOOK1, and bought the download authority of three terminals, when client with user's user ID (A) and terminal iidentification (B) when being sent to server end, the user ID A of server end authentication of users exists, bought electron reading BOOK1, the rights of using of three terminals have been bought, therefore and three terminal downloads having used terminal iidentification to be respectively X, Y, Z have been crossed, and current terminal iidentification is that the terminal of B no longer includes permission download.This moment authentication failed, current terminal iidentification is that the terminal of B can not be downloaded, unless again buy.
The user usually can open electron reading in terminal and read; in order to protect the copyright of electron reading; electron reading only can appointment when buying terminal open reading; carry out step S5 shown in Figure 1 this moment; during electron reading on opening a terminal by client; client need to verify that the electron reading of appointment in the described terminal is (namely current on terminal; the electron reading of opening by client) user authorization file; namely this electron reading is carried out the checking of authority; and the encrypt file of electron reading of the described appointment of deciphering after being proved to be successful, realize this electron reading is read; the authorities such as editor.This is in order to prevent the random reprinting of electron reading, do not authorize if this electron reading obtains to reprint that then this electron reading can only use in the terminal of authorizing.
Concrete, the user authorization file of the electron reading of appointment comprises in the described terminal of described client validation: whether the user authorization file of confirming the electron reading of described appointment exists; Whether the user authorization file of electron reading of confirming described appointment is complete and correct.
Whether client checks first the user authorization file of the electron reading of appointment to exist, if the user authorization file of the electron reading of appointment exists, then carries out follow-up check, confirms whether the user authorization file of electron reading of described appointment is complete and correct; If the user authorization file of the electron reading of appointment does not exist, then authentication failed.
The user authorization file of the electron reading of client check appointment exists, and whether client is carried out follow-up checking, check current user authorization file complete and correct.Client is signed by the standard that cryptographic algorithm generates a user authorization file, and whether this standard signs complete and correct in order to the user authorization file of the electron reading of checking current appointment.
User authorization file is formed by basic authority, and basic authority is the file that generates by cryptographic algorithm, if the information in the user authorization file is maliciously tampered, original digital signature can change.Client is compared with the original digital signature of user authorization file by the standard signature that cryptographic algorithm generates, if in full accord, then is proved to be successful, if inconsistent, proves that then user authorization file distorts, and shows authentication failed.
Described authentication failed comprises two kinds: a kind of is that the user authorization file of the electron reading of appointment does not exist; A kind of is user authorization file incompleteness or the mistake that exists.In the process of checking, client verifies at first whether the user authorization file of the electron reading of appointment exists, and on the basis that the user authorization file of the electron reading of appointment exists, verifies whether the user authorization file of electron reading of appointment is correct and complete again.This is in order to improve the efficient of checking, to guarantee to carry out follow-up checking in the situation that user authorization file exists.
In the described terminal of described client validation after the user authorization file of the electron reading of the appointment failure, described user end to server end sends server end checking request, and this server end checking request comprises the information of electron reading of described appointment and user ID and the terminal iidentification of corresponding described client.That is to say that client need to be solved this terminal to the authority of electron reading to server end.This is in order to prevent because misoperation causes the user authorization file disappearance of electron reading or mistake so that the client validation failure is done further check by server end.
Because the user in the process of using electron reading, might delete or mistake is revised user authorization file corresponding to this electron reading by mistake.If the user is because misoperation causes disappearance, damage or the modification of user authorization file, then client can be downloaded again to the server end request, server end allows client again to download the user authorization file of this electron reading or the encrypt file of electron reading after being proved to be successful, and perhaps both again downloads.
After described server end obtains the user ID and terminal iidentification of the information of the electron reading that comprises described appointment that client sends and corresponding described client, verify user ID and the terminal iidentification of the corresponding described client that described client sends, and after being proved to be successful, allow described client again to download encrypt file and the user authorization file of the electron reading of described appointment.
Described server end verifies that user ID and the terminal iidentification of the corresponding described client that described client sends comprise: whether checking exists the user authorization file of the electron reading that comprises described appointment, and whether this user authorization file comprises user ID and the terminal iidentification of corresponding described client.
Preserve the information of each user ID on the server end, such as title, the time of the electron reading of user name, selection, download the terminal iidentification of this electron reading etc.After server end receives the user ID and terminal iidentification of the information of electron reading of the appointment that client sends and corresponding described client, according to this client of Information Authentication of the user ID of preserving newly downloaded user authorization file of freight weight limit of whether having the right.
If server end can not find information and the user ID of corresponding described client and the information of terminal iidentification of the electron reading of the appointment that sends with client, then refuse this client and again download; If server end finds the information of electron reading of the appointment that sends with client and user ID and the consistent information of terminal iidentification of corresponding described client, agree that then this client downloads again.
Concrete, with reference to step S105 and S106 shown in Figure 2.
S105, client validation.After the associated documents of electron reading were downloaded to terminal, the associated documents of described electron reading can only be opened by client.When client is opened electron reading, the user authorization file of the electron reading of appointment in the described terminal of described client validation.Wherein, the user authorization file of the electron reading of appointment comprises in the described terminal of described client validation: whether the user authorization file of confirming the electron reading of described appointment exists; Whether the user authorization file of electron reading of confirming described appointment is complete and correct.
If the user authorization file of the electron reading of appointment is proved to be successful in the described terminal of described client validation, then decipher described appointment electron reading encrypt file and fulfil corresponding authority to this electron reading, if the user authorization file of the electron reading of appointment does not exist or is imperfect or incorrect, the authority that then shows this electron reading is illegal, and this electron reading can not be opened reading.
During client validation, check first the user authorization file of the electron reading of appointment whether to exist, if the user authorization file of the electron reading of appointment exists, then carry out follow-up check, confirm whether the user authorization file of electron reading of described appointment is complete and correct; If the user authorization file of the electron reading of appointment does not exist, then authentication failed.
The user authorization file of the electron reading of client check appointment exists, and whether client is carried out follow-up checking, check current user authorization file complete and correct.Client is signed by the standard that cryptographic algorithm generates a user authorization file, uses this standard signature to compare with the signature of user authorization file.If both are in full accord, then be proved to be successful, if both are inconsistent, prove that then user authorization file distorts, show authentication failed.
From the above, described authentication failed comprises two kinds: a kind of is that the user authorization file of the electron reading of appointment does not exist; A kind of is user authorization file incompleteness or the mistake that exists.In case authentication failed, the authority of this electron reading of client meeting prompting user is illegal, can not open reading, and the server end checking of pointing out client to enter network bookstore, namely enters step S106, the server end checking.
After the failure of the user authorization file of the electron reading of appointment, the user can in the situation of networking, enter the server end checking of network bookstore in the described terminal of described client validation.At this moment, described user end to server end sends server end checking request, and this server end checking request comprises the information of electron reading of described appointment and user ID and the terminal iidentification of corresponding described client.
The user buys electron reading in network bookstore, server end can record the purchase information of this user's user ID, that is to say, after the client validation failure, can further solve this terminal to the authority of electron reading to server end.Because server end has recorded user's purchase information, therefore after client is sent to server end with the user ID of the information of the electron reading of appointment and corresponding described client and terminal iidentification, whether server end is searched this user according to user ID and is existed, if do not exist, then directly feed back the non-existent information of this user ID of client, if exist, the information that then sends based on client is checked the purchaser record of this user ID, if correct, then allow client again to download the file of this electron reading, if wrong, forbid that then client downloads the file of this electron reading again.
Cause the user authorization file of electron reading not exist, imperfect or incorrect reason has two kinds basically: a kind of is that this electron reading is not bought, a kind of be user misoperation cause the user authorization file of electron reading do not exist, imperfect or incorrect.
If this electron reading is not bought, after the client validation failure, according to the information of client, the user can enter the server end of network bookstore and buy this electron reading; If bought in the past, because misoperation causes user authorization file impaired, further verified by the server end of network bookstore, and after being proved to be successful, reappearing and download associated documents.
The user situation that mistake deletion or mistake are revised user authorization file corresponding to this electron reading often occurs in using the process of electron reading, and the user sometimes and do not know that user authorization file changes because of misoperation.For the interests that guarantee the user are without prejudice, if the user authorization file of the electron reading of having bought is because misoperation causes the client validation failure, can prove that by the checking of server end this electron reading buys, and after server end is proved to be successful, again download the associated documents of this electron reading.
Fig. 5 is the structural representation of the server end that provides of the embodiment of the invention, describes in detail below in conjunction with Fig. 5.
Described server end comprises:
Generation unit A1 is in order to encrypt file and the basic authority that generates electron reading;
Processing unit A2, generate the user authorization file of the electron reading of described selection in order to the basic authority of the electron reading selected based on described client, the user authorization file of described electron reading comprises user ID and the terminal iidentification of corresponding described client; Processing unit A2 links to each other with generation unit A1, obtains the basic authority of electron reading from generation unit A1;
Authentication unit A3 in order to verifying user ID and the terminal iidentification of the corresponding described client that described client sends, and allows described client again to download encrypt file and the user authorization file of the electron reading of described appointment after being proved to be successful; Authentication unit A3 links to each other with processing unit A2, obtains user ID and the terminal iidentification of client from processing unit A2.
Specifically, whether authentication unit A3 checking exists the user authorization file of the electron reading that comprises described appointment, and whether this user authorization file comprises user ID and the terminal iidentification of corresponding described client.Verification unit A3 is in order to check processing unit A2 whether to have the user ID of client and the record of terminal iidentification.
Fig. 6 is the structural representation of the client that provides of the embodiment of the invention, describes in detail below in conjunction with Fig. 6.
Described client is loaded on the terminal, and described client comprises:
Transmitting element B1, in order to sending the first request to server end, described the first request comprises the information of the electron reading that described client selects and user ID and the terminal iidentification of corresponding described client;
Download unit B2 is in order to be downloaded to described terminal with the encrypt file of the electron reading of described selection and user authorization file from as shown in Figure 5 server end;
Confirmation unit B3, in order to verifying the user authorization file of the electron reading of appointment in the described terminal, and after being proved to be successful the encrypt file of the electron reading of the described appointment of deciphering; Confirmation unit B3 links to each other with transmitting element B1, obtains the information of electron reading of selection and user ID and the terminal iidentification of corresponding described client from B1, also links to each other with download unit B2, and whether the user authorization file among the check download unit B2 is legal.
Concrete, confirmation unit B3 confirms whether the user authorization file of the electron reading of described appointment exists; Whether the user authorization file of electron reading of confirming described appointment is complete and correct.
In addition, after confirmation unit B3 verifies the user authorization file failure of the electron reading of appointment in the described terminal, transmitting element B1 sends the second request to server end, and described the second request comprises the information of electron reading of described appointment and user ID and the terminal iidentification of corresponding described client.
Technical scheme of the present invention also provides a kind of terminal, as the carrier of above-mentioned client.Described terminal can be the terminals such as desktop computer, notebook computer, panel computer, electronic reader, mobile phone.Above-mentioned client is installed on the described terminal, under the condition of networking, logs in by described client, enter the electron reading that needs was selected and downloaded to described server end encrypt file and user authorization file.During electron reading on opening a terminal by client, under the condition of suspension, whether legal by the user authorization file of this electron reading of client validation, if the legal encrypt file of then deciphering this electron reading, if illegal, then can reconnect network, verified by server end.
Technical scheme of the present invention has following advantage at least:
Server end generates the encrypt file of electron reading, guarantees that electron reading can not at will be read, and the copyright of electron reading is provided with the first safeguard measure.Server end generates basic authority, and server end adds described basic authority formation user authorization file with user ID and the terminal iidentification of client.Whether the authority that user authorization file becomes the final inspection electron reading legal voucher, and this is the second safeguard measure of electron reading.The twice safeguard measure can further be protected the copyright of electron reading, prevents random propagation.
Whether the authority by client check electron reading is legal, client is loaded on the terminal, client can in the situation of not networking, based on the user authorization file of electron reading, check the current terminal that is mounted with client whether the authority viewing electronic reading materials is arranged.This has alleviated the burden of server on the one hand, because user's quantity is huge, higher to the performance requirement of server by the server end checking, can reduce requirement to the server end performance by client validation, saving resource and save cost, on the other hand, in the situation of not networking, verify, the scope of application that can extend one's service, unnecessary could viewing electronic reading materials in when networking, and do not network and verify and can also exempt user's expenses of surfing Internet.
Whether the authority by the client validation electron reading is legal, not only can alleviate the burden of server end, the scope of application that extends one's service, and client only verifies whether the authority of local electron reading is legal, and once only verify an electron reading, this has also improved quality and the efficient of the authority of check electron reading.
The current terminal of client check has the authority viewing electronic reading materials, then deciphers the encrypt file of electron reading; The current terminal of client check does not have the authority viewing electronic reading materials, under the condition of networking, user ID and terminal iidentification with the information of electron reading and corresponding client is sent to server end again, whether have authority by the server end checking and read, and can again download the user authorization file of this electron reading.When this guarantees the user in misoperation or loses user authorization file, can again download the user authorization file of this electron reading, avoid user's resource to incur loss.
Although the present invention with preferred embodiment openly as above; but it is not to limit the present invention; any those skilled in the art without departing from the spirit and scope of the present invention; can utilize method and the technology contents of above-mentioned announcement that technical solution of the present invention is made possible change and modification; therefore; every content that does not break away from technical solution of the present invention; to any simple modification, equivalent variations and modification that above embodiment does, all belong to the protection range of technical solution of the present invention according to technical spirit of the present invention.

Claims (12)

1. the verification method of an electron reading is characterized in that, comprising:
Server end generates encrypt file and the basic authority of electron reading;
The user end to server end sends the first request, and described client is loaded in the terminal, and described the first request comprises the information of the electron reading that described client selects and user ID and the terminal iidentification of corresponding described client;
The basic authority of the electron reading that described server end is selected based on described client generates the user authorization file of the electron reading of described selection, and the user authorization file of described electron reading comprises user ID and the terminal iidentification of corresponding described client;
Described client is downloaded to described terminal with encrypt file and the user authorization file of the electron reading of described selection;
The user authorization file of the electron reading of appointment in the described terminal of described client validation, and the encrypt file of electron reading of the described appointment of deciphering after being proved to be successful.
2. the verification method of electron reading as claimed in claim 1 is characterized in that, the user authorization file of the electron reading of appointment comprises in the described terminal of described client validation: whether the user authorization file of confirming the electron reading of described appointment exists; Whether the user authorization file of electron reading of confirming described appointment is complete and correct.
3. the verification method of electron reading as claimed in claim 1 is characterized in that, after the failure of the user authorization file of the electron reading of appointment, also comprises in the described terminal of described client validation:
Described user end to server end sends the second request, and described the second request comprises the information of electron reading of described appointment and user ID and the terminal iidentification of corresponding described client;
Described server end is verified user ID and the terminal iidentification of the corresponding described client that described client sends, and allows described client again to download encrypt file and the user authorization file of the electron reading of described appointment after being proved to be successful.
4. the verification method of electron reading as claimed in claim 3, it is characterized in that, described server end verifies that user ID and the terminal iidentification of the corresponding described client that described client sends comprise: whether checking exists the user authorization file of the electron reading that comprises described appointment, and whether this user authorization file comprises user ID and the terminal iidentification of corresponding described client.
5. a server end is characterized in that, comprising:
Generation unit is in order to encrypt file and the basic authority that generates electron reading;
Processing unit generates the user authorization file of the electron reading of described selection in order to the basic authority of the electron reading selected based on client, and the user authorization file of described electron reading comprises user ID and the terminal iidentification of corresponding described client.
6. server end as claimed in claim 5, it is characterized in that, also comprise: authentication unit, in order to verifying user ID and the terminal iidentification of the corresponding described client that described client sends, and after being proved to be successful, allow described client again to download encrypt file and the user authorization file of the electron reading of described appointment.
7. server end as claimed in claim 6, it is characterized in that, whether described authentication unit checking exists the user authorization file of the electron reading that comprises described appointment, and whether this user authorization file comprises user ID and the terminal iidentification of corresponding described client.
8. a client is characterized in that, described client is loaded in the terminal, and described client comprises:
Transmitting element, in order to sending the first request to server end, described the first request comprises the information of the electron reading that described client selects and user ID and the terminal iidentification of corresponding described client;
Download unit is downloaded to described terminal in order to encrypt file and user authorization file with the electron reading of described selection from described server end;
Confirmation unit, in order to verifying the user authorization file of the electron reading of appointment in the described terminal, and after being proved to be successful the encrypt file of the electron reading of the described appointment of deciphering.
9. client as claimed in claim 8 is characterized in that, described confirmation unit confirms whether the user authorization file of the electron reading of described appointment exists; Whether the user authorization file of electron reading of confirming described appointment is complete and correct.
10. client as claimed in claim 8, it is characterized in that, after described confirmation unit is verified the user authorization file failure of the electron reading of appointment in the described terminal, described transmitting element also sends the second request to server end, and described the second request comprises the information of electron reading of described appointment and user ID and the terminal iidentification of corresponding described client.
11. a terminal is characterized in that, is mounted with each described client such as claim 8-10.
12. the verification system of an electron reading is characterized in that, comprising:
Such as each described server end of claim 5 to 7;
Terminal as claimed in claim 11.
CN 201110304153 2011-10-10 2011-10-10 Verification method, verification system, server side, client side and terminal of electronic reading materials Pending CN103036860A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201110304153 CN103036860A (en) 2011-10-10 2011-10-10 Verification method, verification system, server side, client side and terminal of electronic reading materials

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201110304153 CN103036860A (en) 2011-10-10 2011-10-10 Verification method, verification system, server side, client side and terminal of electronic reading materials

Publications (1)

Publication Number Publication Date
CN103036860A true CN103036860A (en) 2013-04-10

Family

ID=48023349

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201110304153 Pending CN103036860A (en) 2011-10-10 2011-10-10 Verification method, verification system, server side, client side and terminal of electronic reading materials

Country Status (1)

Country Link
CN (1) CN103036860A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103514384A (en) * 2013-09-25 2014-01-15 汪家祥 Extended electronic copyright management method, client-side, server and system
CN104572662A (en) * 2013-10-15 2015-04-29 镇江雅迅软件有限责任公司 Electronic reading system based on intelligent terminal
CN104573475A (en) * 2014-12-31 2015-04-29 乐视网信息技术(北京)股份有限公司 Method and system for authenticating transcoding service program
CN106534215A (en) * 2016-12-30 2017-03-22 武汉联影医疗科技有限公司 Service installation method and device and service login method and device
CN106911687A (en) * 2017-02-20 2017-06-30 深圳国泰安教育技术股份有限公司 A kind of page makeup control method and device
TWI669627B (en) * 2017-10-18 2019-08-21 東海大學 File protection component and its protection method
CN110276206A (en) * 2019-06-10 2019-09-24 Oppo广东移动通信有限公司 The inspection method of encrypted content and check system
CN113742663A (en) * 2021-11-04 2021-12-03 江苏鲸准数科信息产业发展有限责任公司 Watermark file acquisition method and device and electronic equipment

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103514384A (en) * 2013-09-25 2014-01-15 汪家祥 Extended electronic copyright management method, client-side, server and system
CN103514384B (en) * 2013-09-25 2017-01-25 汪家祥 Extended electronic copyright management method, client-side, server and system
CN104572662A (en) * 2013-10-15 2015-04-29 镇江雅迅软件有限责任公司 Electronic reading system based on intelligent terminal
CN104573475A (en) * 2014-12-31 2015-04-29 乐视网信息技术(北京)股份有限公司 Method and system for authenticating transcoding service program
CN106534215A (en) * 2016-12-30 2017-03-22 武汉联影医疗科技有限公司 Service installation method and device and service login method and device
CN106911687A (en) * 2017-02-20 2017-06-30 深圳国泰安教育技术股份有限公司 A kind of page makeup control method and device
CN106911687B (en) * 2017-02-20 2020-04-10 深圳国泰安教育技术有限公司 Page construction control method and device
TWI669627B (en) * 2017-10-18 2019-08-21 東海大學 File protection component and its protection method
CN110276206A (en) * 2019-06-10 2019-09-24 Oppo广东移动通信有限公司 The inspection method of encrypted content and check system
CN113742663A (en) * 2021-11-04 2021-12-03 江苏鲸准数科信息产业发展有限责任公司 Watermark file acquisition method and device and electronic equipment
CN113742663B (en) * 2021-11-04 2022-05-24 江苏鲸准数科信息产业发展有限责任公司 Watermark file acquisition method and device and electronic equipment

Similar Documents

Publication Publication Date Title
CN103034788A (en) Verification method and system of electronic readings, server, client and terminal
CN103036860A (en) Verification method, verification system, server side, client side and terminal of electronic reading materials
US8417966B1 (en) System and method for measuring and reporting consumption of rights-protected media content
US20040039932A1 (en) Apparatus, system and method for securing digital documents in a digital appliance
US20060168580A1 (en) Software-management system, recording medium, and information-processing device
EP1630998A1 (en) User terminal for receiving license
US20150026456A1 (en) Apparatus and method for managing digital copyright on epub-based content, and apparatus and method for providing epub-based content according to user's right
CN102708314A (en) Digital rights management provision apparatus, system, and method
JPH07295803A (en) Method and equipment to distribute software object
CN102073826A (en) System and method for digital copyright management using lightweight digital watermark adding component
JP5399400B2 (en) Digital content counting system and method
WO2002059894A1 (en) Recording medium, information processing device, content distribution server, method, program, and its recording medium
KR20010052796A (en) Information processing device and method, and providing medium
CN109145617B (en) Block chain-based digital copyright protection method and system
KR20070093712A (en) Method for generating licence and method and apparatus for providing contents using the same
CN105893792A (en) Digital copyright management method, device and system
US20050060544A1 (en) System and method for digital content management and controlling copyright protection
CN101246533A (en) Method and apparatus for managing digital content
WO2007029285A1 (en) Data delivery system, issuance apparatus, terminal apparatus and intermediate node
KR101744697B1 (en) Encoded Package Manufacturing and Transmission System for E-training Contents
JP2003242043A (en) Reproducing device, and content control method in data control system
WO2011043171A1 (en) Copyrighted work redistribution promotion system
WO2011034094A1 (en) Copyrighted work sales method and system
US20040123126A1 (en) Method and apparatus for deterring piracy
KR101575840B1 (en) Protecting system and method for electronic book with supporting individual copy

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130410