CN103971033B - A kind of digital copyright management method tackling illegal copies - Google Patents

A kind of digital copyright management method tackling illegal copies Download PDF

Info

Publication number
CN103971033B
CN103971033B CN201410219153.5A CN201410219153A CN103971033B CN 103971033 B CN103971033 B CN 103971033B CN 201410219153 A CN201410219153 A CN 201410219153A CN 103971033 B CN103971033 B CN 103971033B
Authority
CN
China
Prior art keywords
licence
initial
user
file
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201410219153.5A
Other languages
Chinese (zh)
Other versions
CN103971033A (en
Inventor
郭亚军
蒋鹏
张维
马庆
宋建华
朱欣欣
汪见晗
王唯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huazhong Normal University
Original Assignee
Huazhong Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huazhong Normal University filed Critical Huazhong Normal University
Priority to CN201410219153.5A priority Critical patent/CN103971033B/en
Publication of CN103971033A publication Critical patent/CN103971033A/en
Application granted granted Critical
Publication of CN103971033B publication Critical patent/CN103971033B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/105Arrangements for software license management or administration, e.g. for managing licenses at corporate level
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of digital copyright management method tackling illegal copies, relate to field of information security technology.This method is: 1. content server carries out on-demand encryption, is packaged into treated protection file rear mount to the Internet for user's download initial data;2. user installation client software;3. user uses client software at user terminal, if local verification passes through, then user can use protection file in the case of not networking;4., when local verification failure, user needs to carry out networking checking;5. local verification by or networking be verified after, use initial data.Licence is encrypted and decrypted by the symmetric key that the present invention utilizes the hardware information of user terminal to generate encryption and deciphering, thus realizes local verification, and one is authorized, and user can open file in the case of not networking;User cannot again authorize without networking and normally open, thus effectively coped with illegal copies.

Description

A kind of digital copyright management method tackling illegal copies
Technical field
The present invention relates to field of information security technology, particularly relate to a kind of digital copyright management side tackling illegal copies Method.
Background technology
Digital copyright management (Digital Rights Management is called for short DRM) refers to that content publisher is in order to control The right to use of digital content and the copyright of protection digital document, the comprehensive solution taked based on information security technology.With Developing rapidly and the raising of Streaming Media compress technique of Internet, various digital documents are in a network by extensively, optionally Distribution, makes content publisher suffer huge loss.Use and propagation seems the heaviest thereby it is ensured that digital document is legal Want.
After digital document is bought by user as commodity, we are difficult to control it and are not replicated and propagate, because cannot be real Existing digital document directly bundlees with user's, and the information (user name, password etc.) of user is available for removing as many physical goods Beyond purchaser, other people uses, to this end, the binding relationship that we should additionally find a kind of essence will not directly be tied The digital document tied up links together with user, thus strengthens the management to copyright.
In the workflow of tradition DRM, user must first obtain the licence of correspondence before opening digital document, passes through Legal licence, user could normally open digital document.Wherein, part DRM method requires that user opens numeral literary composition every time Will carry out verifying to get a license by network before part, and at once licence be destroyed after use;And another part DRM method is only required and is obtained licence when using digital document for the first time, is protected with document form by licence after acquisition Deposit, directly from file read when using digital document backward.Previous class DRM method can realize the safest, easily to being permitted The management that can demonstrate,prove, but once user can not network and just can not use shielded digital document, the burden of authorization server simultaneously The heaviest;Latter class DRM method allows user can use shielded digital document under off-line state, carries well Having risen family experience, but the management of licence becomes new problem, once licence is together copied with digital document and propagates, Other undelegated users will be made to could be used that digital document.So, after lifting motility and reliability are as much as possible The key that continuous DRM method can not be ignored.
Summary of the invention
The purpose of the present invention is that the shortcoming and defect overcoming prior art to exist, it is provided that a kind of illegal copies of tackling Digital copyright management method.
The object of the present invention is achieved like this:
A kind of digital copyright management method (abbreviation method) tackling illegal copies
This method comprises the following steps:
1. content server carries out on-demand encryption, is packaged into treated protection file rear mount to interconnection initial data Online for user's download, meanwhile, content server will protect the product information of file, right information and key to send to authorizing clothes Business device, is stored in data base by it;
2. user installation client software, and by the Internet download or copied content server is sent out from other equipment The protection file of cloth is on user terminal;
3. user is when user terminal uses client software to open protection file, and in client software, DRM controller is first First protection file being carried out local verification, if local verification passes through, then user can use protection literary composition in the case of not networking Part;
4., when local verification failure, user needs to carry out networking checking, otherwise can not use protection file, when this locality is tested Demonstrate,prove successful user and want to obtain the right to use of more protection file in limited time, it is also desirable to carry out networking checking;
5. local verification by or networking be verified after, DRM controller is current according to initial right and licence State extracts the initial data in protection file, the right information constraint built-in application journey comprised according to initial right and licence Sequence uses initial data.
The present invention has following advantages and a good effect:
1. utilize user terminal hardware information generate encryption and deciphering symmetric key licence is encrypted and Deciphering, thus realize local verification, one is authorized, and user can open file in the case of not networking;
Even if 2. user will carry the protection file copy of legal licence to other equipment, also cannot be without networking Again authorize and normally open (freely copying within the rule in same terminal), thus effectively coped with illegal copies.
Accompanying drawing explanation
Fig. 1 is the block diagram of system for numeral copyright management;
10 user terminals,
11 protection file data bags,
12 client softwares,
121 DRM controllers, 122 built-in application programs, 123 licensc e data bags;
20 content servers
21 content repository, 22 product information storehouses, 23 DRM packing devices;
30 authorization servers,
31 entitlements database, 32 keys and product database,
33 DRM licence generators, 34 customer data bases.
Fig. 2 is the block diagram of metadata;
Fig. 3 is local verification flow chart;
Fig. 4 is networking checking flow chart.
Detailed description of the invention
Describe in detail with embodiment below in conjunction with the accompanying drawings:
One, system
1, overall
Such as Fig. 1, native system includes interconnective user terminal 10, content server 20 and authorization server 30;
The working mechanism of native system:
Content server 20 is responsible for generating protection file and setting the initial right of protection file;User terminal 10 is from content Server 20 obtains protection file;Product information, right information and key are sent to authorization server 30 by content server 20, Preserved by it;Content server 20 sends authorized application to authorization server 30, after authorization server 30 empirical tests by network To user terminal 10 licensure.
2, functional device
1) user terminal 10
User terminal 10 is the hardware device that user uses protection file, mainly includes all kinds of portable type electronic product, such as: Computer, mobile phone, iPOD (the music player product of Apple) and iPAD (the panel computer product of Apple) etc..
User terminal 10 includes protecting file data bag 11 and client software 12;Client software 12 includes DRM control Device 121, built-in application program 122 and licensc e data bag 123;
Protection file data bag 11 is packed by metadata and encrypted initial data and is formed, and built-in application program 122 is used Open and use protection file in initial data;
Such as Fig. 2, metadata 201 is by authorized address 202, initial right 203, licence 204 and product information 205 4 part Data constitute, licence is made up of Hash identifying code 206, right 207 and key 208 again.
2) content server 20
Content server 20 is the place being encrypted digital content and packing and generate protection file.
Content server 20 includes content repository 21, product information storehouse 22 and DRM packing device 23;
Content repository 21 and product information storehouse 22 are connected with DRM packing device 23 respectively.
3) authorization server 30
Authorization server 30, also known as license server, checking and the digital content of user identity are made by main being responsible for With generation and the distribution of licence.
Authorization server 30 includes entitlements database 31, key and product database 32, DRM licence generator 33 and uses User data storehouse 34;
Entitlements database 31, key and product database 32 and customer data base 34 respectively with DRM licence generator 33 Connect.
Two, this method be embodied as step
1,1. described step is subdivided into following steps:
Original content file is designated as File1 by A, content supplier, then is uploaded to content server together with metadata, unit License field in data is filled by NUL entirely, and initial rights field is then filled according to practical situation, if protection file is permitted Family allowable freely has part authority, then the authority that initial rights field record freely uses, otherwise, initial rights field is also used NUL is filled;
File1 is encrypted by B, content server according to the initial right in metadata, be available for user freely use or The part browsed is not encrypted, and remainder is all encrypted, if initial rights field is sky, and encryptions whole to original content file, The key K that encryption useseWith decruption key KdGenerated by content server temporarily;
Metadata and File1 are packed by the DRM packing device in C, content server, meanwhile, by claim, deciphering Key KdSend to authorization server with product information, be stored in the data base of authorization server;
D, content server, by packed protection file, are designated as File2, under carry to the Internet supplying user freely Carry;
The protection product information of file File2, right information and key are sent to authorization server by E, content server, Be stored in data base by it, for user network checking time.
2, such as Fig. 3,3. described step is subdivided into following steps:
Local verification starts 301;
A, DRM controller reads the metadata fields 302 of protection file File2 head;
Whether b, the license field judged in metadata are existence 303, are then to enter step c, otherwise jump to step g;
License field does not exists, and means that File2 not yet lives through networking and authorizes, otherwise shows that File2 exists this moment Licence;
C, DRM controller extracts the hardware information of user terminal, and according to hardware information by function KeyGeneration Calculate the symmetric key K of licences, meanwhile, DRM controller calculates Kazakhstan according to hardware information by function ConputeHash Uncommon value H 304;
D, DRM controller reads license field, and the license information now read is in encrypted state, it is impossible to directly obtain Get the internal information of licence, the most first use KsThe license field read out is decrypted, obtains the plaintext of licence, Then licence is judged by the mode that detection cryptographic Hash H is the most equal with the Hash identifying code in the license field after deciphering The most legal 305;
E, judge licence the most legal 306, be then entrance step f, otherwise jump to step g;
Cryptographic Hash H is equal with the Hash identifying code in the license field after deciphering, then show that the licence in File2 is true It is that this user terminal verifies the legal licence issued by authorization server by networking in fact, otherwise means to protect file File2 is to copy from other equipment, and the licence comprised in it is illegal;
F, DRM controller extracts the initial rights field 307 in protection file File2 metadata, and step is 5. middle can basis The presence or absence of initial right extracts the initial data in protection file, so far, local verification success, and tests without carrying out networking again Card 308, local verification terminates 313;
G, DRM controller extracts the initial rights field 309 in protection file File2 metadata;
H, judge whether initial right exists 310, be then local verification success, if but user want to obtain more authority, also Being to need to carry out checking 311 of networking, local verification terminates 313;
Otherwise local verification failure, needs to carry out checking 312 of networking further, shows that initial right does not exists, the most also Represent that local verification terminates 313.
3, such as Fig. 4,4. described step is subdivided into following steps:
Networking checking beginning 401;
I, the product information during DRM controller reads protection file File2 metadata, the mandate clothes in authorized address field Business device address and the user profile of client currently logged on user, and extract the hardware information of user terminal, then to authorizing clothes Business device transmission authorized application 402:
II, whether authorization server detection user have purchased the protection file File2 right to use on this user terminal 403;
III, judge whether user buys authority 404, be then to enter step IV, otherwise jump to step VIII;
IV, authorization server uses use authority and the original contents literary composition of protection file File2 in terminal according to user The decruption key K of part File1dGeneration licence 405:
V, authorization server calculates licence according to the hardware information of user terminal by function KeyGeneration Symmetric key Ks, and use key KsLicence is encrypted 406;
VI, the licence after encryption is sent to client 407 by authorization server;
VII, networking is proved to be successful 408, so far, and networking checking end 412;
VIII, authorization server buys authority 409 by Client-Prompt user;
Ⅸ, judge whether user buys authority 410, be, jump to step IV, otherwise enter step Ⅹ;
Ⅹ, authorization server refusal authorizes, authentication failed of networking, so far, and networking checking end 412.
4,5. described step is subdivided into following steps:
1) local verification and networking checking are after one of them passes through, DRM controller according to the request of built-in application program and The state of current initial right and licence extracts initial data in plain text and the possible shape of right information, initial right and licence State has following 3 kinds:
State 1: initial right information does not exists, and licence exists and legal;
State 2: initial right information exists, although licence does not exists or exists but illegal;
State 3: initial right information exists, and licence there is also and legal;
When the state of initial right and licence is state 1: symmetric key K first used by DRM controllersLicence is carried out Deciphering, obtains the right information in licence and the decruption key K of initial datad, the request further according to built-in application program is used Key KdCipher text part corresponding in initial data is decrypted thus obtains the cleartext information of initial data;
When the state of initial right and licence is state 2: DRM controller extracts initial right information, according to initially Right information record unencrypted original data region, then the request extracting directly unencrypted according to built-in application program is original Data clear text, if the original contents of built-in application PROGRAMMED REQUESTS is beyond the region of record, then refusal provides data and points out user Buy corresponding authority;
When the state of initial right and licence is state 3: first DRM controller extracts initial right information, and root According to initial right information record unencrypted original data region, secondly, DRM controller symmetric key KsLicence is carried out Deciphering, obtains the right information in licence and the decruption key K of initial datad, finally, DRM controller is according to built-in application The current desired initial data wanted of program judges whether the initial data in this region is in encrypted state, is recorded if belonging to Unencrypted region, then extracting directly, the most first use key KdIt is decrypted required original data portion to extract again and decrypts Initial data in plain text;
2) the initial data plaintext transmission extracted for it and is operated by DRM controller to built-in application program, with Time, initial data is operated by the right information constraint built-in application program that DRM controller comprises according to initial right and licence.

Claims (1)

1. tackle a digital copyright management method for illegal copies,
1. content server carries out on-demand encryption, is packaged into treated protection file rear mount to the Internet initial data Downloading for user, meanwhile, the protection product information of file, right information and key are sent to authorization service by content server Device, is stored in data base by it;
2. user installation client software, and by the Internet download or copied content server issue from other equipment Protect file to user terminal;
3. user is when user terminal uses client software to open protection file, and in client software, DRM controller is the most right Protection file carries out local verification, if local verification passes through, then user can use protection file in the case of not networking;
4., when local verification failure, user needs to carry out networking checking, otherwise can not use protection file, when local verification becomes The user of merit wants to obtain the right to use of more protection file in limited time, it is also desirable to carry out networking checking;
5. local verification by or after networking is verified, DRM controller is according to the current state of initial right and licence Extract the initial data in protection file, make according to the right information constraint built-in application program that initial right and licence comprise Use initial data;
It is characterized in that:
1. described step is subdivided into following steps:
Original content file is designated as File1 by A, content supplier, then is uploaded to content server, metadata together with metadata In license field entirely with NUL fill, initial rights field then according to practical situation fill, if protection file allow use Family freely has part authority, the then authority that initial rights field record freely uses, and otherwise, initial rights field is also with empty word Symbol is filled;
File1 is encrypted by B, content server according to the initial right in metadata, is available for user and freely uses or browse Part do not encrypt, remainder is all encrypted, if initial rights field is sky, encryptions whole to original content file, encryption The key K usedeWith decruption key KdGenerated by content server temporarily;
Metadata and File1 are packed by the DRM packing device in C, content server, meanwhile, by claim, decruption key KdSend to authorization server with product information, be stored in the data base of authorization server;
D, content server, by packed protection file, are designated as File2, and carry to the Internet is freely downloaded for user;
The protection product information of file File2, right information and key are sent to authorization server, by it by E, content server Be stored in data base, for user network checking time;
3. described step is subdivided into following steps:
Local verification starts (301);
A, DRM controller reads the metadata fields (302) of protection file File2 head;
Whether b, the license field judged in metadata are to there are (303), are then to enter step c, otherwise jump to step g;
License field does not exists, and means that File2 not yet lives through networking and authorizes, otherwise shows that File2 exists license this moment Card;
C, DRM controller extracts the hardware information of user terminal, and is counted by function KeyGeneration according to hardware information Calculate the symmetric key K of licences, meanwhile, DRM controller calculates cryptographic Hash H according to hardware information by function ConputeHash (304);
D, DRM controller reads license field, and the license information now read is in encrypted state, it is impossible to be directly obtained The internal information of licence, the most first uses KsThe license field read out is decrypted, obtains the plaintext of licence, then Whether the mode the most equal with the Hash identifying code in the license field after deciphering by detection cryptographic Hash H judges licence Legal (305);
E, judge licence the most legal (306), be then entrance step f, otherwise jump to step g;
Cryptographic Hash H is equal with the Hash identifying code in the license field after deciphering, then show that the licence in File2 is strictly The legal licence that this user terminal is issued by authorization server by networking checking, otherwise means to protect file File2 Being to copy from other equipment, the licence comprised in it is illegal;
F, DRM controller extracts the initial rights field (307) in protection file File2 metadata, and step is 5. middle can be according to just The presence or absence of beginning right extracts the initial data in protection file, so far, local verification success, and without carrying out networking checking again (308), local verification terminates (313);
G, DRM controller extracts the initial rights field (309) in protection file File2 metadata;
H, judge whether initial right exists (310), be then local verification success, if but user wants to obtain more authority, still Needs carry out networking checking (311), and local verification terminates (313);
Otherwise local verification failure, needs to carry out networking checking (312) further, shows that initial right does not exists, the most also table Show that local verification terminates (313);
5. described step is subdivided into following steps:
1) local verification and networking checking are after one of them passes through, and DRM controller is according to the request of built-in application program and current The state of initial right and licence extracts initial data to be had with the possible state of right information, initial right and licence in plain text Following 3 kinds:
State 1: initial right information does not exists, and licence exists and legal;
State 2: initial right information exists, although licence does not exists or exists but illegal;
State 3: initial right information exists, and licence there is also and legal;
When the state of initial right and licence is state 1: symmetric key K first used by DRM controllersLicence is decrypted, Obtain the right information in licence and the decruption key K of initial datad, further according to the request key K of built-in application programd Cipher text part corresponding in initial data is decrypted thus obtains the cleartext information of initial data;
When the state of initial right and licence is state 2: DRM controller extracts initial right information, according to initial right Information record unencrypted original data region, then according to the request extracting directly unencrypted initial data of built-in application program In plain text, if the original contents of built-in application PROGRAMMED REQUESTS is beyond the region of record, then refusal provides data and points out user to buy Corresponding authority;
When the state of initial right and licence is state 3: first DRM controller extracts initial right information, and according to just Beginning right information record unencrypted original data region, secondly, DRM controller symmetric key KsLicence is solved Close, obtain the right information in licence and the decruption key K of initial datad, finally, DRM controller is according to built-in application journey The current desired initial data wanted of sequence judges whether the initial data in this region is in encrypted state, is recorded not if belonging to The region of encryption, then extracting directly, the most first use key KdRequired original data portion is decrypted what extraction again decrypted Initial data is in plain text;
2) the initial data plaintext transmission extracted for it and is operated by DRM controller to built-in application program, meanwhile, Initial data is operated by the right information constraint built-in application program that DRM controller comprises according to initial right and licence.
CN201410219153.5A 2014-05-23 2014-05-23 A kind of digital copyright management method tackling illegal copies Expired - Fee Related CN103971033B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410219153.5A CN103971033B (en) 2014-05-23 2014-05-23 A kind of digital copyright management method tackling illegal copies

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410219153.5A CN103971033B (en) 2014-05-23 2014-05-23 A kind of digital copyright management method tackling illegal copies

Publications (2)

Publication Number Publication Date
CN103971033A CN103971033A (en) 2014-08-06
CN103971033B true CN103971033B (en) 2016-11-02

Family

ID=51240521

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410219153.5A Expired - Fee Related CN103971033B (en) 2014-05-23 2014-05-23 A kind of digital copyright management method tackling illegal copies

Country Status (1)

Country Link
CN (1) CN103971033B (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102015209714A1 (en) * 2015-05-27 2016-12-01 Siemens Aktiengesellschaft Apparatus and method for adjusting usage of a device
CN105704515A (en) * 2015-06-03 2016-06-22 深圳Tcl数字技术有限公司 Fast playback starting method and device of media file
CN106713224B (en) * 2015-11-12 2019-12-06 福建福昕软件开发股份有限公司 Document authority control method
CN106897584A (en) * 2015-12-21 2017-06-27 上海交通大学 Onboard system digital copyright management method and system based on architectural feature
CN109508516A (en) * 2017-09-15 2019-03-22 中国移动通信有限公司研究院 Document handling method, terminal, server and computer readable storage medium
CN109284615B (en) * 2018-08-10 2022-01-25 广东电网有限责任公司信息中心 Mobile equipment digital resource safety management method
CN109299053B (en) * 2018-09-04 2021-03-02 中国联合网络通信集团有限公司 File operation method, device and computer storage medium
WO2020113371A1 (en) * 2018-12-03 2020-06-11 刘国斌 Implementation method of domestic-abroad integrated services
CN110704812A (en) * 2019-09-30 2020-01-17 展讯半导体(南京)有限公司 DRM file identification method and device, storage medium and terminal
CN111163090A (en) * 2019-12-30 2020-05-15 重庆同汇勘测规划有限公司 Authorization method and system based on server time service equipment
CN111464561B (en) * 2020-04-21 2022-01-04 南京珥仁科技有限公司 Data ferry management system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101174295A (en) * 2008-01-16 2008-05-07 北京飞天诚信科技有限公司 Off-line DRM authentication method and system
CN101923616A (en) * 2010-08-03 2010-12-22 鸿富锦精密工业(深圳)有限公司 Service provision device in copyright protection, user terminal and copyright protection method
CN102024102A (en) * 2010-06-07 2011-04-20 无敌科技(西安)有限公司 Offline DRM certificate management and control method in embedded equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101174295A (en) * 2008-01-16 2008-05-07 北京飞天诚信科技有限公司 Off-line DRM authentication method and system
CN102024102A (en) * 2010-06-07 2011-04-20 无敌科技(西安)有限公司 Offline DRM certificate management and control method in embedded equipment
CN101923616A (en) * 2010-08-03 2010-12-22 鸿富锦精密工业(深圳)有限公司 Service provision device in copyright protection, user terminal and copyright protection method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
数字版权管理DRM协议及应用研究;张俊华;《中国优秀硕士学位论文全文数据库 信息科技辑》;20140315(第03期);第4.3.1节、第4.3.2节,图4-4、图4-6 *

Also Published As

Publication number Publication date
CN103971033A (en) 2014-08-06

Similar Documents

Publication Publication Date Title
CN103971033B (en) A kind of digital copyright management method tackling illegal copies
CN103366102B (en) For content transmission and the system for numeral copyright management of distribution
CN103189872B (en) Safety in networked environment and the effectively method and apparatus of Content Selection
US7975312B2 (en) Token passing technique for media playback devices
CN103942470B (en) A kind of electronic audiovisual product copyright managing method with function of tracing to the source
CN104221023B (en) Methods, devices and systems for digital rights management
WO2016033365A1 (en) Distributing protected content
CN102316378B (en) Digital copyright protection method based on set-top box and system
CN105743903B (en) Digital audio copyright managing method, intelligent terminal, certificate server and system
JPH1040100A (en) Method for preparing cipher envelope
CN105893792B (en) Digital copyright management method, device and system
CN103136459B (en) A kind of copyright method and system of encrypted digital content
CN109547198A (en) The method and system of network transmission video file
US20120036349A1 (en) Datebase server, customer terminal and protection method for digital contents
US20210167955A1 (en) Data transmission
CN107332666A (en) Terminal document encryption method
CN107306254B (en) Digital copyright protection method and system based on double-layer encryption
Hassan et al. A robust computational DRM framework for protecting multimedia contents using AES and ECC
CN104966000A (en) Multimedia copyright protection method based on security engine
KR20220039779A (en) Enhanced security encryption and decryption system
CN111818000B (en) Block chain-based distributed Digital Rights Management (DRM) system
CN109446752B (en) Copyright file management method, system, device and storage medium
CN110572454A (en) Advertisement delivery system for guaranteeing safety of advertisement delivery process
CN107506619B (en) DRM-Q digital copyright protection method and system
US20100077486A1 (en) Method and apparatus for digital content management

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20160825

Address after: 430079 Hubei Province, Wuhan city Hongshan District Luoyu Road No. 152

Applicant after: Huazhong Normal University

Address before: 430074 Hubei city of Wuhan Province, East Lake New Technology Development Zone, Road No. 1 Optics Valley Software Park 4.1 A1 11 storey building No. 02

Applicant before: Wuhan Hua Yaxingtong Information Technology Co., Ltd

C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20161102

Termination date: 20170523