CN104657629A - Document copyright protection method and device - Google Patents

Document copyright protection method and device Download PDF

Info

Publication number
CN104657629A
CN104657629A CN201310597940.9A CN201310597940A CN104657629A CN 104657629 A CN104657629 A CN 104657629A CN 201310597940 A CN201310597940 A CN 201310597940A CN 104657629 A CN104657629 A CN 104657629A
Authority
CN
China
Prior art keywords
file
fragment
order
source document
terminal side
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310597940.9A
Other languages
Chinese (zh)
Inventor
孟钊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201310597940.9A priority Critical patent/CN104657629A/en
Publication of CN104657629A publication Critical patent/CN104657629A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a document copyright protection method and a document copyright protection device. The document copyright protection method includes: step 1, performing operations on a server side device: performing fragment disorder type processing on an original document, and recording positions of all document fragments of a disordered document obtained after processing the original document in the original document; generating a fragment sequence document, inserting the fragment sequence document into the disordered document according to a preset algorithm, and adding the size of the fragment sequence document in the disordered document; issuing the disordered document to a terminal side device; step 2, performing operations on the terminal side device: receiving the disordered document issued by the server side device; obtaining the corresponding fragment sequence document from the disordered document according to a preset algorithm and the size of the fragment sequence document carried by the disordered document; restoring the disordered document into the original document according to the fragment sequence document, and thereby improving document security.

Description

A kind of file copy right guard method and equipment
Technical field
The present invention relates to communication technical field, particularly relate to a kind of file copy right guard method and equipment.
Background technology
The content of digital copyright protecting is needed mainly to adopt DRM(Digital Right Management, Digital Right Management at present) solution.DRM is and can be called " content digital rights encipherment protection technology ", is current most widely used content copyright protection technology.It, mainly for file copyright protection in use, combats copyright piracy, the legitimate rights and interests of protection copyright owner.
In existing DRM solution, there is following shortcoming:
1, DRM project plan comparison is complicated, needs to dispose more complicated DRM system at server side and end side;
2, DRM encipherment scheme is for the encryption of file entirety, in concurrent high system, have larger efficiency.
Summary of the invention
The invention provides a kind of file copy right guard method and equipment, for improving the security of file.
In order to reach above object, embodiments providing a kind of file copy right guard method, comprising:
Server-side devices carries out the process of fragment out of orderization to source document, and each position of fragment file in source document in out of order file after recording processing;
Described server-side devices generates fragment sequential file, and described fragment sequential file comprises each position of fragment file in source document, source document size in described out of order file, and fragment file size; Wherein, in described out of order file, each fragment file size is identical;
Described fragment sequential file is inserted in described out of order file according to preset algorithm by described server-side devices, and adds the size of described fragment sequential file in described out of order file;
This out of order file is handed down to terminal side equipment by described server-side devices.
The embodiment of the present invention additionally provides a kind of file copy right guard method, comprising:
The out of order file that terminal side equipment reception server end equipment issues;
Described terminal side equipment is according to preset algorithm, and the size of the fragment sequential file carried in described out of order file obtains corresponding fragment sequential file from described out of order file, described order fragment file comprises each position of fragment file in source document, source document size in described out of order file, and fragment file size; Wherein, in described out of order file, each fragment file size is identical;
Described out of order file access pattern is source document according to described fragment sequential file by described terminal side equipment.
The embodiment of the present invention additionally provides a kind of server-side devices, comprising:
First processing module, for carrying out the process of fragment out of orderization to source document;
Logging modle, for the position of fragment file in source document each in the out of order file after recording processing;
Generation module, for generating fragment sequential file, described fragment sequential file comprises each position of fragment file in source document, source document size in described out of order file, and fragment file size; Wherein, in described out of order file, each fragment file size is identical;
Second processing module, for being inserted in described out of order file according to preset algorithm by described fragment sequential file, and adds the size of described fragment sequential file in described out of order file;
Sending module, for being handed down to described terminal side equipment by out of order for correspondence file.
The embodiment of the present invention additionally provides a kind of terminal side equipment, comprising:
Receiver module, for the out of order file that reception server end equipment issues;
Acquisition module, for according to preset algorithm, and the size of the fragment sequential file carried in described out of order file obtains corresponding fragment sequential file from described out of order file, described order fragment file comprises each position of fragment file in source document, source document size in described out of order file, and fragment file size; Wherein, in described out of order file, each fragment file size is identical;
Described out of order file access pattern is source document according to described fragment sequential file by processing module.
In the above embodiment of the present invention, for server-side devices: carry out the process of fragment out of orderization to source document, and record each position of fragment file in source document in out of order file; Generate fragment sequential file, and this fragment sequential file is inserted in out of order file according to preset algorithm, and add the size of this fragment sequential file in this out of order file; Out of order file is handed down to terminal side equipment.For terminal side equipment: the out of order file that reception server end equipment issues; According to preset algorithm, and the size of the fragment sequential file carried in out of order file obtains corresponding fragment sequential file from out of order file; Be source document according to fragment sequential file by out of order file access pattern, scheme realizes more simple, and security is higher.
Accompanying drawing explanation
The schematic flow sheet of a kind of file copy right guard method that Fig. 1 provides for the embodiment of the present invention;
The schematic flow sheet of the another kind of file copy right guard method that Fig. 2 provides for the embodiment of the present invention;
The schematic flow sheet of the another kind of file copy right guard method that Fig. 3 provides for the embodiment of the present invention;
The schematic flow sheet of the another kind of file copy right guard method that Fig. 4 provides for the embodiment of the present invention;
Source document is treated to the schematic diagram of out of order file by a kind of server-side devices that Fig. 5 a provides for the embodiment of the present invention;
Out of order file access pattern is the schematic diagram of source document by a kind of terminal side equipment that Fig. 5 b provides for the embodiment of the present invention;
The structural representation of a kind of server-side devices that Fig. 6 provides for the embodiment of the present invention;
The structural representation of a kind of terminal side equipment that Fig. 7 provides for the embodiment of the present invention.
Embodiment
For above-mentioned problems of the prior art, embodiments provide the technical scheme of a kind of file copy right protection.In this technical scheme, for server-side devices: carry out the process of fragment out of orderization to source document, and each position of fragment file in source document in out of order file after recording processing; Generate fragment sequential file, and this fragment sequential file is inserted in out of order file according to preset algorithm, and add the size of this fragment sequential file in this out of order file; Out of order file is handed down to terminal side equipment.For terminal side equipment: the out of order file that reception server end equipment issues; According to preset algorithm, and the size of the fragment sequential file carried in out of order file obtains corresponding fragment sequential file from out of order file; Be source document according to fragment sequential file by out of order file access pattern.
Wherein, in embodiments of the present invention, each position of fragment file in source document, source document size in out of order file can in fragment sequential file, be comprised, and fragment file size etc.; In out of order file, each fragment file size is identical.
Below in conjunction with the accompanying drawing in the application, carry out clear, complete description to the technical scheme in the application, obviously, described embodiment is a part of embodiment of the application, instead of whole embodiments.Based on the embodiment in the application, the every other embodiment that those of ordinary skill in the art obtain under the prerequisite not making creative work, all belongs to the scope of the application's protection.
Embodiment one
The treatment scheme of technical scheme in server-side devices side of the file copy right protection that this embodiment provides for the embodiment of the present invention.
As shown in Figure 1, be the schematic flow sheet of a kind of file copy right guard method that the embodiment of the present invention provides, can comprise the following steps:
Step 101, server-side devices carry out the process of fragment out of orderization to source document, and each position of fragment file in source document in out of order file after recording processing.
Concrete, consider what file was made up of a series of orderly binary bit stream, often kind of file layout has oneself specific file layout and framework, in embodiments of the present invention, server-side devices can carry out the mode of fragment out of orderization process to source document, source document is one group with N number of byte, and (N can according to file size and server end equipment performance value, as 2K, 4K, 8K etc.), change and be divided into some groups (often group is a fragment file), and the position of these fragment files is upset at random, rearrangement, simultaneously after recording processing (namely fragment out of orderization processes afterwards) file in each position of fragment file in source document.Wherein, in out of order file, the size of each fragment file is identical.
Step 102, server-side devices generate fragment sequential file.Wherein, this fragment sequential file comprises each position of fragment file in source document, source document size in out of order file, and fragment file size.
Concrete, in embodiments of the present invention, after server-side devices carries out the process of fragment out of orderization to source document, can according to source document size, fragment file size, and in out of order file, the position of each fragment file in source document generates fragment sequential file.
Wherein, can with the position of fragment file in source document each in the out of order file of mode record of byte sequence in this fragment sequential file.
Suppose that source document size is 100K byte, when server-side devices carries out the process of fragment out of orderization to this source document, this source document is one group with 4K byte and is divided into 25 fragment files, and the position of each fragment file is upset at random, rearrangement.Then server-side devices generate sequential file fragment in can with the position of fragment file in source document each in the out of order file of byte sequence record of 25 byte lengths.Such as, suppose that the 1st byte in the byte sequence of these 25 byte lengths is for " 00000111 ", to be then the 1st fragment file in 7(and out of order file be in the 1st position of fragment file in source document showing in out of order file, and source document is one group by 4K byte carries out the 7th fragment file after fragment division).
Should be realized that; above by a kind of specific implementation that the mode of the position of fragment file in original in the out of order file of byte sequence record is only in the technical scheme that provides of the embodiment of the present invention; and be not limiting the scope of the present invention; based on the embodiment of the present invention; those skilled in the art are not paying under creative work prerequisite, and the mode of other positions of fragment file in original of recording in out of order file expected all should in protection scope of the present invention.
Fragment sequential file is inserted in out of order file according to preset algorithm by step 103, server-side devices, and adds the size of fragment sequential file in this out of order file.
Concrete, in embodiments of the present invention, the out of order process of fragmentation is being carried out to source document, and after generating fragment sequential file, this fragment sequential file can be inserted in out of order file according to preset algorithm by server-side devices, and adds the size of fragment sequential file in this out of order file.
Wherein, this preset algorithm can be consulted to determine by server-side devices and terminal side equipment.Such as, this preset algorithm can start to insert fragment sequential file for the 20th byte place in out of order file.
This out of order file is handed down to terminal side equipment by step 104, server-side devices.
Concrete, terminal side equipment receive this out of order file after, fragment sequential file can be read out according to the algorithm consulting in advance to determine from out of order file, and be source document according to fragment sequential file by out of order file access pattern.
Embodiment two
In order to improve security further, in this embodiment, server-side devices can be encrypted this fragment sequential file after generating fragment sequential file.Correspondingly, when fragment sequential file is inserted in out of order file by server-side devices, insertion for encryption after fragment sequential file.
As shown in Figure 2, be the schematic flow sheet of the another kind of file copy right guard method that the embodiment of the present invention provides, can comprise the following steps:
Step 201, server-side devices carry out the process of fragment out of orderization to source document, and each position of fragment file in source document in out of order file after recording processing.
Step 202, server-side devices generate fragment sequential file.Wherein, this fragment sequential file comprises each position of fragment file in source document, source document size in out of order file, and fragment file size.
Step 203, server-side devices are encrypted this fragment sequential file, and be inserted in out of order file according to preset algorithm by the fragment sequential file (also certificate file can be called in embodiments of the present invention) after encryption, and in this out of order file, add the size of the fragment sequential file after encryption.
Concrete, in this embodiment, in order to improve security further, can be encrypted fragment sequential file, the key of this encryption can be that network equipment and terminal side equipment are consulted, in advance as information such as user name, password or Termination ID.
Wherein, for different terminal side equipments (or user), encryption key can be different, also can be identical.
When for different terminal side equipments, when encryption key is different, when server-side devices receives the file download request of terminal side equipment transmission, can determine should the encryption key of terminal side equipment according to the identification information of the terminal side equipment carried in this file download request, and use encryption key corresponding to this terminal side equipment to be encrypted fragment sequential file, and the fragment sequential file after encryption is inserted in out of order file, be handed down to terminal side equipment.Such as, this encryption key can, for the user name used when terminal side equipment is registered, when terminal side equipment wants download file, need the username and password used when first using registration to log in.After server-side devices receives the file download request of the transmission of the terminal side equipment after login, the user name used when using this terminal side equipment to register is encrypted fragment sequential file, and the fragment sequential file after encryption is inserted in out of order file, be handed down to terminal side equipment.
In this case, when file occurring and revealing, the source that this file is revealed can be determined according to used encryption key.
When for different terminal side equipments, when encryption key is identical, server-side devices can process the corresponding fragment of source document out of orderization in advance, generates fragment sequential file, be encrypted fragment sequential file, and is inserted in out of order file by the fragment sequential file after encryption.When receiving the file download request that terminal side equipment sends, out of order file is handed down to terminal side equipment.
Out of order file is handed down to terminal side equipment by step 204, server-side devices.
Embodiment three
The treatment scheme of technical scheme in server-side devices side of the file copy right protection that this embodiment provides for the embodiment of the present invention.
As shown in Figure 3, be the schematic flow sheet of a kind of file copy right guard method that the embodiment of the present invention provides, can comprise the following steps:
The out of order file that step 301, terminal side equipment reception server end equipment issue.
Concrete, when terminal side equipment wants download file, file download request can be sent to server-side devices, and the out of order file that reception server end equipment sends.Wherein, the civilian treatment scheme of server-side devices can see server-side devices treatment scheme in embodiment one or embodiment two.
Step 302, terminal side equipment are according to preset algorithm, and the size of the fragment sequential file carried in out of order file obtains corresponding fragment sequential file from out of order file.Wherein, this order fragment file comprises each position of fragment file in source document, source document size in out of order file, and fragment file size; In out of order file, each fragment file size is identical.
Concrete, after terminal side equipment receives the out of order file that server-side devices issues, can according to the algorithm preset (as read fragment sequential file from K byte), and the size of the fragment sequential file carried in out of order file obtains the fragment sequential file of correspondence from out of order file.
This out of order file access pattern is source document according to fragment sequential file by step 303, terminal side equipment.
Concrete, in this embodiment, after terminal side equipment gets fragment sequential file, if this fragment sequential file is unencrypted file, the then each position of fragment file in source document, source document size in this terminal device out of order file that can directly comprise according to this fragment sequential file, and out of order file access pattern is source document by fragment file size.
If this fragment sequential file is encrypt file, then this terminal device needs first to use the encryption key consulted with server-side devices to be in advance decrypted the fragment sequential file after this encryption, and is source document according to the fragment sequential file after this deciphering by out of order file access pattern.
Embodiment four
Further, in order to verification terminal side apparatus recovers whether obtain source document correct, in this embodiment, source document MD5 hashed value can also be comprised in the fragment sequential file that server-side devices generates, according to this source document MD5 hashed value, the source document recovering to obtain be verified to make terminal side equipment.
As shown in Figure 4, be the schematic flow sheet of the another kind of file copy right guard method that the embodiment of the present invention provides, can comprise the following steps:
The out of order file that step 401, terminal side equipment reception server end equipment issue.
Step 402, terminal side equipment are according to preset algorithm, and the size of the fragment sequential file carried in out of order file obtains corresponding fragment sequential file from out of order file.Wherein, this order fragment file comprises each position of fragment file in source document, source document size, fragment file size in out of order file, and source document MD5 hashed value; In out of order file, each fragment file size is identical.
This out of order file access pattern is source document according to fragment sequential file by step 403, terminal side equipment.
Step 404, terminal side equipment verify this source document according to the source document MD5 hashed value in fragment sequential file.
Wherein, in the embodiment of the present invention, source document is treated to out of order file by server-side devices, and out of order file access pattern is that the schematic diagram of source document can be distinguished as shown in figure 5a and 5b by terminal side equipment.
Can find out, in the technical scheme that the embodiment of the present invention provides, for server-side devices by describing above: the process of fragment out of orderization is carried out to source document, and records each position of fragment file in source document in out of order file; Generate fragment sequential file, and this fragment sequential file is inserted in out of order file according to preset algorithm, and add the size of this fragment sequential file in this out of order file; Out of order file is handed down to terminal side equipment.For terminal side equipment: the out of order file that reception server end equipment issues; According to preset algorithm, and the size of the fragment sequential file carried in out of order file obtains corresponding fragment sequential file from out of order file; Be source document according to fragment sequential file by out of order file access pattern, scheme realizes more simple, and security is higher.
Based on identical technical conceive, the embodiment of the present invention additionally provides a kind of server-side devices, can be applied to said method embodiment.
Embodiment five
As shown in Figure 6, be the structural representation of a kind of server-side devices that the embodiment of the present invention provides, can comprise:
First processing module 61, for carrying out the process of fragment out of orderization to source document;
Logging modle 62, for the position of fragment file in source document each in the out of order file after recording processing;
Generation module 63, for generating fragment sequential file, described fragment sequential file comprises each position of fragment file in source document, source document size in described out of order file, and fragment file size; Wherein, in described out of order file, each fragment file size is identical;
Second processing module 64, for being inserted in described out of order file according to preset algorithm by described fragment sequential file, and adds the size of described fragment sequential file in described out of order file;
Sending module 65, for being handed down to described terminal side equipment by out of order for correspondence file.
Wherein, the server-side devices that the embodiment of the present invention provides also comprises:
Also comprise:
Encrypting module 66, for being encrypted described fragment sequential file;
Described second processing module 64 specifically for, the fragment sequential file after described encryption to be inserted in described out of order file according to preset algorithm, and the size of fragment sequential file add described encryption in described out of order file after.
Wherein, for different terminal side equipments, the encryption key used when described server-side devices is encrypted described fragment sequential file is identical; Or,
For different terminal side equipments, the encryption key used when described server-side devices is encrypted described fragment sequential file is different.
Wherein, when for different terminal side equipments, when the encryption key used when described server-side devices is encrypted described fragment sequential file is different, the server-side devices that the embodiment of the present invention provides also comprises:
Receiver module 67, for the file download request that receiving terminal side apparatus sends, this file download request carries the identification information of terminal side equipment;
Described encrypting module 66 specifically for, determine according to the identification information of described terminal side equipment the encryption key that described terminal side equipment is corresponding, and use this encryption key to be encrypted described fragment sequential file.
Based on identical technical conceive, the embodiment of the present invention additionally provides a kind of terminal side equipment, can be applied to said method embodiment.
Embodiment six
As shown in Figure 7, be the structural representation of a kind of terminal side equipment that the embodiment of the present invention provides, can comprise:
Receiver module 71, for the out of order file that reception server end equipment issues;
Acquisition module 72, for according to preset algorithm, and the size of the fragment sequential file carried in described out of order file obtains corresponding fragment sequential file from described out of order file, described order fragment file comprises each position of fragment file in source document, source document size in described out of order file, and fragment file size; Wherein, in described out of order file, each fragment file size is identical;
Described out of order file access pattern is source document according to described fragment sequential file by processing module 73.
Wherein, the described fragment sequential file got from out of order file is the fragment sequential file after encryption;
The terminal side equipment that the embodiment of the present invention provides also comprises:
Deciphering module 74, for being decrypted the fragment sequential file after described encryption;
Described processing module 73 specifically for, be source document according to the fragment sequential file after described deciphering by described out of order file access pattern.
Wherein, also comprise in described fragment sequential file: source document MD5 hashed value;
Described processing module 73 also for, according to the source document MD5 hashed value in described fragment sequential file, described source document is verified.
Through the above description of the embodiments, those skilled in the art can be well understood to the mode that the present invention can add required general hardware platform by software and realize, and can certainly pass through hardware, but in a lot of situation, the former is better embodiment.Based on such understanding, technical scheme of the present invention can embody with the form of software product the part that prior art contributes in essence in other words, this computer software product is stored in a storage medium, comprising some instructions in order to make a station terminal equipment (can be mobile phone, personal computer, server, or the network equipment etc.) perform method described in each embodiment of the present invention.
The above is only the preferred embodiment of the present invention; it should be pointed out that for those skilled in the art, under the premise without departing from the principles of the invention; can also make some improvements and modifications, these improvements and modifications also should look protection scope of the present invention.

Claims (14)

1. a file copy right guard method, is characterized in that, comprising:
Server-side devices carries out the process of fragment out of orderization to source document, and each position of fragment file in source document in out of order file after recording processing;
Described server-side devices generates fragment sequential file, and described fragment sequential file comprises each position of fragment file in source document, source document size in described out of order file, and fragment file size; Wherein, in described out of order file, each fragment file size is identical;
Described fragment sequential file is inserted in described out of order file according to preset algorithm by described server-side devices, and adds the size of described fragment sequential file in described out of order file;
This out of order file is handed down to terminal side equipment by described server-side devices.
2. the method for claim 1, is characterized in that, described server-side devices also comprises before being inserted in described out of order file by described fragment sequential file according to preset algorithm:
Described server-side devices is encrypted described fragment sequential file;
Described fragment sequential file is inserted in described out of order file according to preset algorithm by described server-side devices, and adds the size of described fragment sequential file in described out of order file, is specially:
Fragment sequential file after described encryption is inserted in described out of order file according to preset algorithm by described server-side devices, and the size of fragment sequential file add described encryption in described out of order file after.
3. method as claimed in claim 2, is characterized in that, for different terminal side equipments, the encryption key used when described server-side devices is encrypted described fragment sequential file is identical; Or,
For different terminal side equipments, the encryption key used when described server-side devices is encrypted described fragment sequential file is different.
4. method as claimed in claim 3, is characterized in that, when for different terminal side equipments, when the encryption key used when described server-side devices is encrypted described fragment sequential file is different,
Described server-side devices also comprises before carrying out the process of fragment out of orderization to source document:
The file download request that described server-side devices receiving terminal side apparatus sends, this file download request carries the identification information of terminal side equipment;
Described server-side devices is encrypted described fragment sequential file, is specially:
Described server-side devices determines according to the identification information of described terminal side equipment the encryption key that described terminal side equipment is corresponding, and uses this encryption key to be encrypted described fragment sequential file.
5. a file copy right guard method, is characterized in that, comprising:
The out of order file that terminal side equipment reception server end equipment issues;
Described terminal side equipment is according to preset algorithm, and the size of the fragment sequential file carried in described out of order file obtains corresponding fragment sequential file from described out of order file, described order fragment file comprises each position of fragment file in source document, source document size in described out of order file, and fragment file size; Wherein, in described out of order file, each fragment file size is identical;
Described out of order file access pattern is source document according to described fragment sequential file by described terminal side equipment.
6. method as claimed in claim 5, is characterized in that, the described fragment sequential file got from out of order file is the fragment sequential file after encryption;
Described terminal side equipment also comprises before according to described fragment sequential file described out of order file access pattern being source document:
Described terminal side equipment is decrypted the fragment sequential file after described encryption;
Described out of order file access pattern is source document according to described fragment sequential file by described terminal side equipment, is specially:
Described out of order file access pattern is source document according to the fragment sequential file after described deciphering by described terminal side equipment.
7. method as claimed in claim 5, is characterized in that, also comprise in described fragment sequential file: source document MD5 hashed value;
Described terminal side equipment also comprises after according to described fragment sequential file described out of order file access pattern being source document:
Described terminal side equipment verifies described source document according to the source document MD5 hashed value in described fragment sequential file.
8. a server-side devices, is characterized in that, comprising:
First processing module, for carrying out the process of fragment out of orderization to source document;
Logging modle, for the position of fragment file in source document each in the out of order file after recording processing;
Generation module, for generating fragment sequential file, described fragment sequential file comprises each position of fragment file in source document, source document size in described out of order file, and fragment file size; Wherein, in described out of order file, each fragment file size is identical;
Second processing module, for being inserted in described out of order file according to preset algorithm by described fragment sequential file, and adds the size of described fragment sequential file in described out of order file;
Sending module, for being handed down to described terminal side equipment by out of order for correspondence file.
9. server-side devices as claimed in claim 8, is characterized in that, also comprise:
Encrypting module, for being encrypted described fragment sequential file;
Described second processing module specifically for, the fragment sequential file after described encryption to be inserted in described out of order file according to preset algorithm, and the size of fragment sequential file add described encryption in described out of order file after.
10. server-side devices as claimed in claim 9, is characterized in that, for different terminal side equipments, the encryption key used when described server-side devices is encrypted described fragment sequential file is identical; Or,
For different terminal side equipments, the encryption key used when described server-side devices is encrypted described fragment sequential file is different.
11. server-side devices as claimed in claim 10, is characterized in that, when for different terminal side equipments, when the encryption key used when described server-side devices is encrypted described fragment sequential file is different, described server-side devices also comprises:
Receiver module, for the file download request that receiving terminal side apparatus sends, this file download request carries the identification information of terminal side equipment;
Described encrypting module specifically for, determine according to the identification information of described terminal side equipment the encryption key that described terminal side equipment is corresponding, and use this encryption key to be encrypted described fragment sequential file.
12. 1 kinds of terminal side equipments, is characterized in that, comprising:
Receiver module, for the out of order file that reception server end equipment issues;
Acquisition module, for according to preset algorithm, and the size of the fragment sequential file carried in described out of order file obtains corresponding fragment sequential file from described out of order file, described order fragment file comprises each position of fragment file in source document, source document size in described out of order file, and fragment file size; Wherein, in described out of order file, each fragment file size is identical;
Described out of order file access pattern is source document according to described fragment sequential file by processing module.
13. terminal side equipments as claimed in claim 12, is characterized in that, the described fragment sequential file got from out of order file is the fragment sequential file after encryption;
Described terminal side equipment also comprises:
Deciphering module, for being decrypted the fragment sequential file after described encryption;
Described processing module specifically for, be source document according to the fragment sequential file after described deciphering by described out of order file access pattern.
14. terminal side equipments as claimed in claim 12, is characterized in that, also comprise in described fragment sequential file: source document MD5 hashed value;
Described processing module also for, according to the source document MD5 hashed value in described fragment sequential file, described source document is verified.
CN201310597940.9A 2013-11-22 2013-11-22 Document copyright protection method and device Pending CN104657629A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310597940.9A CN104657629A (en) 2013-11-22 2013-11-22 Document copyright protection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310597940.9A CN104657629A (en) 2013-11-22 2013-11-22 Document copyright protection method and device

Publications (1)

Publication Number Publication Date
CN104657629A true CN104657629A (en) 2015-05-27

Family

ID=53248743

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310597940.9A Pending CN104657629A (en) 2013-11-22 2013-11-22 Document copyright protection method and device

Country Status (1)

Country Link
CN (1) CN104657629A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106991314A (en) * 2016-01-20 2017-07-28 阿里巴巴集团控股有限公司 A kind of date storage method and device
CN108038075A (en) * 2017-12-07 2018-05-15 湖北三新文化传媒有限公司 Methods of exhibiting, e-book reading device and the readable storage medium storing program for executing of e-book document
WO2019033751A1 (en) * 2017-08-14 2019-02-21 北京奇虎科技有限公司 Method and system for performing security processing on data file
CN111698576A (en) * 2020-06-23 2020-09-22 网易有道信息技术(杭州)有限公司 Information encryption method, decryption method, server, client, and medium
CN113660258A (en) * 2021-08-13 2021-11-16 重庆中科云从科技有限公司 Method, system, medium, and apparatus for preventing file from being tampered during transmission
CN114553503A (en) * 2022-01-29 2022-05-27 新华三云计算技术有限公司 Network file synchronization method, device and equipment
CN116936041A (en) * 2023-09-18 2023-10-24 天河超级计算淮海分中心 Medical image file processing method, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101976317A (en) * 2010-11-05 2011-02-16 北京世纪互联工程技术服务有限公司 Virtual machine image safety method in private cloud computing application
CN102402670A (en) * 2011-08-03 2012-04-04 广东欧珀移动通信有限公司 File encryption and decryption method
CN102594920A (en) * 2012-03-20 2012-07-18 广东凌康科技有限公司 Remote data transmission system
CN102981879A (en) * 2012-12-03 2013-03-20 中国联合网络通信集团有限公司 Supply method, acquisition method, equipment and processing system of application software installation package

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101976317A (en) * 2010-11-05 2011-02-16 北京世纪互联工程技术服务有限公司 Virtual machine image safety method in private cloud computing application
CN102402670A (en) * 2011-08-03 2012-04-04 广东欧珀移动通信有限公司 File encryption and decryption method
CN102594920A (en) * 2012-03-20 2012-07-18 广东凌康科技有限公司 Remote data transmission system
CN102981879A (en) * 2012-12-03 2013-03-20 中国联合网络通信集团有限公司 Supply method, acquisition method, equipment and processing system of application software installation package

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106991314A (en) * 2016-01-20 2017-07-28 阿里巴巴集团控股有限公司 A kind of date storage method and device
WO2019033751A1 (en) * 2017-08-14 2019-02-21 北京奇虎科技有限公司 Method and system for performing security processing on data file
CN108038075A (en) * 2017-12-07 2018-05-15 湖北三新文化传媒有限公司 Methods of exhibiting, e-book reading device and the readable storage medium storing program for executing of e-book document
CN111698576A (en) * 2020-06-23 2020-09-22 网易有道信息技术(杭州)有限公司 Information encryption method, decryption method, server, client, and medium
CN111698576B (en) * 2020-06-23 2022-04-01 网易有道信息技术(杭州)有限公司 Information encryption method, decryption method, server, client, and medium
CN113660258A (en) * 2021-08-13 2021-11-16 重庆中科云从科技有限公司 Method, system, medium, and apparatus for preventing file from being tampered during transmission
CN114553503A (en) * 2022-01-29 2022-05-27 新华三云计算技术有限公司 Network file synchronization method, device and equipment
CN116936041A (en) * 2023-09-18 2023-10-24 天河超级计算淮海分中心 Medical image file processing method, electronic equipment and storage medium
CN116936041B (en) * 2023-09-18 2023-12-22 天河超级计算淮海分中心 Medical image file processing method, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN110324143B (en) Data transmission method, electronic device and storage medium
CN104657629A (en) Document copyright protection method and device
CN105760764B (en) Encryption and decryption method and device for embedded storage device file and terminal
CN102223364B (en) Method and system for accessing e-book data
CN102281300B (en) Digital rights management license distribution method and system, server and terminal
CN101950347B (en) Method and system for encrypting data
CN101977190B (en) Digital content encryption transmission method and server side
CN103457733A (en) Data sharing method and system under cloud computing environment
CN109714176B (en) Password authentication method, device and storage medium
CN1439207A (en) A platform and method for establishing provable identities while maintaining privacy
CN113132099B (en) Method and device for encrypting and decrypting transmission file based on hardware password equipment
CN101286994B (en) Digital literary property management method, server and system for content sharing within multiple devices
CN104065680A (en) Information processing method and apparatus, information retrieval method and apparatus, user terminal and server
CN102802036A (en) System and method for identifying digital television
CN108809633B (en) Identity authentication method, device and system
CN105187389A (en) Webpage access method and system based on digital mixed encryption
CN107454590A (en) A kind of data ciphering method, decryption method and wireless router
CN101425112B (en) Digital exequatur sending system and digital work decipher operation method
CN110225014B (en) Internet of things equipment identity authentication method based on fingerprint centralized issuing mode
CN104660397A (en) Secret key managing method and system
CN105208005A (en) Fingerprint authentication method, connection equipment and terminal equipment
CN104243439A (en) File transfer processing method and system and terminals
CN103237010A (en) Server side for providing digital content in encryption mode
CN103051459A (en) Management method and device of traction secrete key of safety card
CN102135944A (en) Method for safe data storage in mobile communication equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20150527

RJ01 Rejection of invention patent application after publication