CN106096335A - Copyright information detection method, copyright information detection device and electronic equipment - Google Patents
Copyright information detection method, copyright information detection device and electronic equipment Download PDFInfo
- Publication number
- CN106096335A CN106096335A CN201610405542.6A CN201610405542A CN106096335A CN 106096335 A CN106096335 A CN 106096335A CN 201610405542 A CN201610405542 A CN 201610405542A CN 106096335 A CN106096335 A CN 106096335A
- Authority
- CN
- China
- Prior art keywords
- identity
- file destination
- information
- file
- identification information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000001514 detection method Methods 0.000 title claims abstract description 61
- 230000005540 biological transmission Effects 0.000 claims description 15
- 239000000203 mixture Substances 0.000 claims description 5
- 108010001267 Protein Subunits Proteins 0.000 claims description 2
- 238000000034 method Methods 0.000 description 21
- 238000010586 diagram Methods 0.000 description 13
- 230000008859 change Effects 0.000 description 11
- 238000004891 communication Methods 0.000 description 10
- 238000005516 engineering process Methods 0.000 description 10
- 230000008569 process Effects 0.000 description 8
- 230000003287 optical effect Effects 0.000 description 4
- 230000005236 sound signal Effects 0.000 description 4
- 238000013478 data encryption standard Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000001133 acceleration Effects 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 2
- 230000000712 assembly Effects 0.000 description 2
- 238000000429 assembly Methods 0.000 description 2
- 238000000605 extraction Methods 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- KLDZYURQCUYZBL-UHFFFAOYSA-N 2-[3-[(2-hydroxyphenyl)methylideneamino]propyliminomethyl]phenol Chemical compound OC1=CC=CC=C1C=NCCCN=CC1=CC=CC=C1O KLDZYURQCUYZBL-UHFFFAOYSA-N 0.000 description 1
- 241000209140 Triticum Species 0.000 description 1
- 235000021307 Triticum Nutrition 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000006837 decompression Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 201000001098 delayed sleep phase syndrome Diseases 0.000 description 1
- 208000033921 delayed sleep phase type circadian rhythm sleep disease Diseases 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000004807 localization Effects 0.000 description 1
- 239000012092 media component Substances 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 230000029058 respiratory gaseous exchange Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The disclosure is directed to a kind of copyright information detection method, copyright information detection device and electronic equipment, this copyright information detection method includes: when receiving file destination and the copyright to described file destination requires, obtain the identity of described file destination, from the content file of described file destination, obtain identification information;Determining whether described identity is consistent with described identification information, if not corresponding, refusing described copyright requirement.By the technical scheme of the disclosure, may determine that whether the identity of file destination is consistent with the identification information in content file, if not corresponding, identification information in description file is modified, then can refuse this copyright requirement, thus avoid the lawless person that the copyright information of file destination is modified to obtain the copyright of file destination.
Description
Technical field
It relates to digital copyright technology field, particularly relate to a kind of copyright information detection method, a kind of copyright information
Detection device and a kind of electronic equipment.
Background technology
First information technology is growing instantly, and along with being skyrocketed through of digital product quantity, digital publishing rights is the most more subject to
Concern to people.
Lawless person, in order to obtain the copyright of copyright, typically can revise the copyright information in copyright so that repair
Copyright information after changing is consistent with the information of oneself, in order to after being uploaded onto the server by amended copyright, server
According to amended copyright information, the copyright of copyright can be regarded as to one's name.In order to avoid lawless person revises number
Copyright information in word works, pretends to be the creator of copyright to claim the copyright having copyright, uses in correlation technique
To modes such as copyright encryptions, but this mode is for lawless person, is still relatively easy to crack, so being difficult to
Play good effect.
Summary of the invention
The disclosure provides a kind of copyright information detection method, copyright information detection device and electronic equipment, relevant to solve
Deficiency in technology.
First aspect according to disclosure embodiment, it is provided that a kind of copyright information detection method, including:
When receiving file destination and the copyright to described file destination requires, obtain the identity of described file destination
Mark, obtains identification information from the content file of described file destination;
Determining whether described identity is consistent with described identification information, if not corresponding, refusing described copyright requirement.
Alternatively, in the case of described identity is consistent with described identification information, also include:
Obtain the digital signature of content file in the file destination being associated with described identity;
Determine whether described identification information is associated with described digital signature, if unconnected, refuse described copyright
Requirement.
Alternatively, the listed files of described identification information is positioned in listing file, in described identity with described
In the case of identification information is consistent, also include:
Obtain the digital signature of listing file in the file destination being associated with described identity;
Determine whether described listed files is associated with described digital signature, if unconnected, refuse described copyright requirement.
Alternatively, before obtaining the identity of described file destination, also include:
Determine in described file destination and whether there is copyright information;
If described file destination exists copyright information, obtain the identity of described file destination;
If described file destination does not exist copyright information, generate identity according to the source-information of described file destination
And digital signature;
The digital signature generated is associated storage with the identity of generation;
The identity of described generation is embedded in the content file of described file destination to form identification information.
Alternatively, described identification information includes the digital watermarking of described identity.
Alternatively, above-mentioned copyright information detection method also includes:
Encryption information association storage by the identity of described generation with described file destination;
When receiving the acquisition request that described file destination is added confidential information, according to the identity mark of described file destination
Know inquiry and add confidential information, add confidential information transmission to sending the described terminal obtaining request by inquire.
Alternatively, the described identity by described generation is associated storage bag with the confidential information that adds of described file destination
Include:
Generate corresponding PKI and private key, by described private key, described file destination is encrypted;
The identity of described generation is associated storage with described PKI;
After receiving the request of the purchase to described file destination, by the transmission of described PKI to sending described purchase request
Terminal.
Second aspect according to disclosure embodiment, it is provided that a kind of copyright information detection device, including:
First acquiring unit, when receiving file destination and the copyright to described file destination requires, obtains described
The identity of file destination, obtains identification information from the content file of described file destination;
First determines unit, determines whether described identity is consistent with described identification information, if not corresponding, and refusal
Described copyright requirement.
Alternatively, above-mentioned copyright information detection device also includes:
Second acquisition unit, in the case of described identity is consistent with described identification information, obtains with described
The digital signature of content file in the file destination that identity is associated;
Second determines unit, determines whether described identification information is associated with described digital signature, if unconnected,
Refuse described copyright requirement.
Alternatively, above-mentioned copyright information detection device also includes:
3rd acquiring unit, in the case of described identity is consistent with described identification information, obtains with described
The digital signature of listing file in the file destination that identity is associated,
Wherein, the listed files of described identification information is positioned in listing file;
3rd determines unit, determines whether described listed files is associated with described digital signature, if unconnected, refusal
Described copyright requirement.
Alternatively, above-mentioned copyright information detection device also includes:
4th determines unit, determines in described file destination whether there is copyright information,
Wherein, in the case of described first acquiring unit exists copyright information in described file destination, described mesh is obtained
The identity of mark file;
Signal generating unit, in the case of there is not copyright information in described file destination, coming according to described file destination
Source information generates identity and digital signature;
First memory element, associates storage by the digital signature generated with the identity of generation;
Embedded unit, embeds the identity of described generation in the content file of described file destination to form identity mark
Knowledge information.
Alternatively, described identification information includes the digital watermarking of described identity.
Alternatively, above-mentioned copyright information detection device also includes:
Second memory element, by the encryption information association storage of the identity of described generation with described file destination;
Query unit, when receiving the acquisition request that described file destination adds confidential information, according to described target literary composition
The identity inquiry of part adds confidential information, adds confidential information transmission to sending the described terminal obtaining request by inquire.
Alternatively, described second memory element includes:
Encryption sub-unit operable, generates corresponding PKI and private key, is encrypted described file destination by described private key;
Association storing sub-units, associates storage by the identity of described generation with described PKI;
Transmission subelement, after receiving the request of the purchase to described file destination, transmits described PKI to sending
State the terminal of the request of purchase.
The third aspect according to disclosure embodiment, it is provided that a kind of electronic equipment, including:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
When receiving file destination and the copyright to described file destination requires, obtain the identity of described file destination
Mark, obtains identification information from the content file of described file destination;
Determining whether described identity is consistent with described identification information, if not corresponding, refusing described copyright requirement.
Embodiment of the disclosure that the technical scheme of offer can include following beneficial effect:
From above-described embodiment, the disclosure may determine that identity and the identity mark in content file of file destination
Whether knowledge information is consistent, if not corresponding, the identification information in description file is modified, then can refuse this copyright
Requirement, thus avoid the lawless person that the copyright information of file destination is modified to obtain the copyright of file destination.
It should be appreciated that it is only exemplary and explanatory, not that above general description and details hereinafter describe
The disclosure can be limited.
Accompanying drawing explanation
Accompanying drawing herein is merged in description and constitutes the part of this specification, it is shown that meet the enforcement of the disclosure
Example, and for explaining the principle of the disclosure together with description.
Fig. 1 is the flow chart according to a kind of copyright information detection method shown in an exemplary embodiment.
Fig. 2 is the flow chart according to the another kind of copyright information detection method shown in an exemplary embodiment.
Fig. 3 is the flow chart according to another the copyright information detection method shown in an exemplary embodiment.
Fig. 4 is the flow chart according to another the copyright information detection method shown in an exemplary embodiment.
Fig. 5 is the flow chart according to another the copyright information detection method shown in an exemplary embodiment.
Fig. 6 is the flow chart according to another the copyright information detection method shown in an exemplary embodiment.
Fig. 7 is to detect device block diagram according to a kind of copyright information shown in an exemplary embodiment.
Fig. 8 is to detect device block diagram according to the another kind of copyright information shown in an exemplary embodiment.
Fig. 9 is to detect device block diagram according to another copyright information shown in an exemplary embodiment.
Figure 10 is to detect device block diagram according to another copyright information shown in an exemplary embodiment.
Figure 11 is to detect device block diagram according to another copyright information shown in an exemplary embodiment.
Figure 12 is to detect device block diagram according to another copyright information shown in an exemplary embodiment.
Figure 13 is the structural representation according to a kind of device for copyright information detection shown in an exemplary embodiment.
Detailed description of the invention
Here will illustrate exemplary embodiment in detail, its example represents in the accompanying drawings.Explained below relates to
During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represents same or analogous key element.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with the disclosure.On the contrary, they are only with the most appended
The example of the apparatus and method that some aspects that described in detail in claims, the disclosure are consistent.
Fig. 1 is the flow chart according to a kind of copyright information detection method shown in an exemplary embodiment, this copyright information
Detection method can apply in server, as it is shown in figure 1, this copyright information detection method may comprise steps of.
In step s 11, when receiving file destination and the copyright to described file destination requires, described mesh is obtained
The identity of mark file, obtains identification information from the content file of described file destination.
In the present embodiment, file destination can be the digital product possessing copyright information, and content file can be numeral
Product comprises the subfile of particular content.Such as mobile phone, file destination can be application bag, main body bag etc., with
As a example by theme bag, it can include that multiple content file, content file therein can be picture files.Identity can be
The identity of file destination creator, such as, can be provided in a string character of the file header of file destination.Identity
Information can be the information being generated and embedded in the content file of file destination according to identity.
Such as, identity can be GUID (Globally Unique Identifier, GUID).
GUID be a kind of binary length generated by algorithm be the numeric identifier of 128, sum has reached 2^128, thus with
The probability that machine generates two identical GUID is the least, therefore can largely avoid non-wound person to generate and creator
Identical GUID.
Such as, identification information can be the digital watermarking of identity of the content file embedding file destination.Number
Word watermark (Digital Watermarking) be some identification informations are directly embedded into copyright (such as multimedia, document,
Application etc.) content file in or in the content file of copyright, carry out secondary indication (in such as amendment copyright
Hold subregional structure in the middle part of file).
In step s 12, determining whether described identity is consistent with described identification information, if not corresponding, performing
Step S13;
In step s 13, described copyright requirement is refused.
Lawless person, in order to obtain the digital publishing rights of file destination, typically can revise the copyright information of file destination, such as
The identification information in content file can be revised, so that amended copyright information is consistent with the information of oneself, in order to rear
When continuing the creator's information determining file destination according to identity and/or identification information, it is possible to obtain the letter with oneself
Creator's information of manner of breathing symbol, thus successfully require copyright.According to this embodiment, it can judge the identity of file destination
Whether be consistent with the identification information in content file, if not corresponding, the identification information in description file by
Amendment, then can refuse this copyright requirement, thus avoid the lawless person modifying the copyright information of file destination to obtain
The copyright of file destination.
If described identity is consistent with described identification information, perform step S14;
In step S14, determine the wound of described file destination according to described identity and/or described identification information
Author information;
In step S15, determine whether the source-information that described copyright requires is consistent with described creator's information, if phase
Symbol, performs step S16, otherwise, performs step 13;
In step s 16, it is allowed to described copyright requirement.
In the case of described identity is consistent with described identification information, the copyright information in file destination is described
Revised, therefore can correctly be determined creator's information according to copyright information therein, in creator's information and copyright
In the case of the source-information (such as user name, terminal IP etc.) required is consistent, it may be determined that this copyright requires as file destination
Creator propose, thus allow copyright requirement, otherwise, it may be determined that this copyright requires it is not that the creator of file destination carries
Go out.
In the present embodiment, enter as a example by identification information using GUID as identity, the digital watermarking of GUID
Row explanation.
GUID belongs to the one of copyright information, when the file destination received comprises copyright information, and can be from target literary composition
Obtain the GUID of creator in part, such as when file destination being generated copyright information, the primary importance at file destination head generates
GUID, then the numeric identifier of a length of 128 can be extracted in the present embodiment from this primary importance.
The digital watermarking of GUID is to be embedded in the content file of file destination when file destination is generated copyright information
The data relevant to GUID, such as second in the content file of file destination when file destination being generated copyright information
Put the digital watermarking that embedded in GUID, then the character conduct of certain length can be extracted in the present embodiment from this second position
Identification information.
If from the second position extract character be consistent with the numeric identifier extracted from primary importance, such as with from first
Put certain section of continuation character in the numeric identifier of extraction identical with the character extracted from the second position, then may determine that identity
Mark is consistent with identification information, illustrates that the copyright information in file destination is revised, therefore can be according to therein
Copyright information correctly determines creator's information, in the case of the source-information required with copyright in creator's information is consistent, and can
To determine that this copyright requires what the creator as file destination proposed, thus allow copyright requirement, such as, transmit to source terminal
Detection pass through information, it is also possible to for this source terminal person's opening section authority (such as obtain file destination relevant benefit authority,
Authority etc. to file destination amendment).
Correspondingly, if not corresponding with the numeric identifier extracted from primary importance from the character of second position extraction, then
May determine that identity does not corresponds with identification information, and then may determine that the presenter that this copyright requires is not this target
The creator of file, therefore can refuse its copyright requirement to this file destination, such as, not lead to source terminal transmission detection
Cross information, it is also possible to transmit information to the creator of this file destination, in order to the creator of this file destination learns in time
There is lawless person to be intended to the copyright of this file destination of requirement, thus take suitable counter-measure.
Alternatively, described determine whether described identity is consistent with described identification information and include:
Determine whether described identity is consistent with described identification information according to similarity algorithm.
Owing to being probably discontinuous in the identification information embedded in content file, therefore carry from content file
The identification information taken, may comprise multistage and belong to and belong to tool between character and adjacent two sections of characters of identification information
The character of body file content, even if causing the identification information extracted not revised, it is the completeest with identity
Entirely it is consistent.
According to this embodiment, it can compared the similarity of identity and identification information by similarity algorithm, only
Want both similarities more than predetermined threshold value (such as 70%), then i.e. to can determine that both are consistent, thus improve the mark that determines one's identity
Know the accuracy whether being consistent with identification information.
Alternatively, in the case of described identity is consistent with described identification information, also include:
Obtain the digital signature of content file in the file destination being associated with described identity;
Determine whether described identification information is associated with described digital signature, if unconnected, refuse described copyright
Requirement.
Alternatively, the listed files of described identification information is positioned in listing file, in described identity with described
In the case of identification information is consistent, also include:
Obtain the digital signature of listing file in the file destination being associated with described identity;
Determine whether described listed files is associated with described digital signature, if unconnected, refuse described copyright requirement.
Alternatively, before obtaining the identity of described file destination, also include:
Determine in described file destination and whether there is copyright information;
If described file destination exists copyright information, obtain the identity of described file destination;
If described file destination does not exist copyright information, generate identity according to the source-information of described file destination
And digital signature;
The digital signature generated is associated storage with the identity of generation;
The identity of described generation is embedded in the content file of described file destination to form identification information.
Alternatively, described identification information includes the digital watermarking of described identity.
Alternatively, above-mentioned copyright information detection method also includes:
Encryption information association storage by the identity of described generation with described file destination;
When receiving the acquisition request that described file destination is added confidential information, according to the identity mark of described file destination
Know inquiry and add confidential information, add confidential information transmission to sending the described terminal obtaining request by inquire.
Alternatively, the described identity by described generation is associated storage bag with the confidential information that adds of described file destination
Include:
Generate corresponding PKI and private key, by described private key, described file destination is encrypted;
The identity of described generation is associated storage with described PKI;
After receiving the request of the purchase to described file destination, by the transmission of described PKI to sending described purchase request
Terminal.
Fig. 2 is the flow chart according to the another kind of copyright information detection method shown in an exemplary embodiment, such as Fig. 2 institute
Show, on the basis of embodiment as shown in Figure 1, in the case of described identity is consistent with described identification information, version
Power information detecting method can also include:
In the step s 21, the digital signature of content file in the file destination being associated with described identity is obtained;
In step S22, determine whether described identification information is associated with described digital signature, if unconnected,
Performing step S13, if being associated, performing step S14.
Due to identity be consistent with identification information be not required in identity comprising complete with identification information
Exactly the same character, such as, determining what whether described identity was consistent with described identification information by similarity algorithm
In the case of, as long as namely identity and identification information similarity i.e. can determine that both are consistent more than predetermined threshold value.This makes
Lawless person amendment part identity identification information in the case of, still ensure that identity is consistent with identification information.
For file, different files has different digital signature, the digital signature before its amendment of text document
It is different with amended digital signature, in the case of therefore the content file at file destination is revised, its content literary composition
The digital signature of part is different from the digital signature of the content file with the identification information not being modified.
According to the present embodiment, in the case of identity is consistent with identification information, can obtain further and body
The digital signature of content file in the file destination that part mark is associated.In the case of identity is not modified, with body
In the file destination that part mark is associated, the digital signature of content file is exactly the digital signature of the content file not being modified.Cause
This, be determined by whether identification information is associated with this digital signature, whether can accurately determine identification information
It is modified.
Such as file destination includes multiple content file, the most corresponding digital signature of each content file, if identity
Identification information is not modified, then the content file at its place does not the most change, therefore the numeral of this content file
Signature does not change, and in this case, identification information is phase with a digital signature in above-mentioned multiple digital signature
(the such as digital signature of the content file at identification information place and a numeral in above-mentioned multiple digital signature of association
Signature is identical);If identification information is modified, then the content file at its place the most just there occurs change, therefore should
The digital signature of content file also can change, and in this case, identification information is equal with above-mentioned multiple digital signature
Unconnected (the such as digital signature of the content file at identification information place and the every number in above-mentioned multiple digital signature
Word signature all differs).
Therefore, whether the present embodiment is associated with digital signature according to identification information and whether determines one's identity identification information
It is modified, in the case of described identity is consistent with described identification information, whether identification information is modified
Further determined that, improve the accuracy rate whether identification information that determines one's identity is modified.
Fig. 3 is the flow chart according to the another kind of copyright information detection method shown in an exemplary embodiment, such as Fig. 3 institute
Showing, on the basis of embodiment as shown in Figure 1, the listed files of described identification information is positioned in listing file, described
In the case of identity is consistent with described identification information, copyright information detection method can also include:
In step S31, obtain the digital signature of listing file in the file destination being associated with described identity;
In step s 32, determine whether described listed files is associated with described digital signature, if unconnected, perform
Step S13, if being associated, performs step S14.
Lawless person is for the amendment of file destination copyright information, except in embodiment as shown in Figure 1 believing identity
The amendment of breath, it is also possible to the listed files of amendment identification information.Listed files may be used for recorded content file and storage
The information such as the corresponding relation of address, once listed files is modified, and the listing file at its place is the most just modified.And for file
For, different files has different digital signature, and digital signature and amended numeral before its amendment of text document are signed
Name be different, in the case of therefore in listing file, listed files is revised, the digital signature of listing file with have
The digital signature of the listing file of the listed files not being modified is different.
According to this embodiment, it can in the case of identity is consistent with identification information, obtain further and body
The digital signature of listing file in the file destination that part mark is associated.In the case of identity is not modified, with body
In the file destination that part mark is associated, the digital signature of content file is exactly the digital signature of the content file not being modified.Cause
This, be determined by whether listed files is associated with digital signature, can accurately determine whether listed files is modified.
If listed files is not modified, then the listing file at its place does not the most change, therefore this list
The digital signature of file does not change, and in this case, listed files is (the such as file being associated with above-mentioned digital signature
The digital signature of the listing file at list place and above-mentioned digital signature are identical);If listed files is modified, then its institute
Listing file the most just there occurs change, therefore the digital signature of this listing file also can change, in this case,
Listed files (the such as digital signature of the listing file at listed files place and above-mentioned numeral unconnected with above-mentioned digital signature
Signature differs).
Therefore, whether whether be associated with digital signature according to the listed files identification information that determines one's identity of the present embodiment is repaiied
Change, in the case of described identity is consistent with described identification information, also whether listed files is modified and carries out
Determine, improve the accuracy rate determining whether the copyright information of file is modified.
Fig. 4 is the flow chart according to another the copyright information detection method shown in an exemplary embodiment, such as Fig. 4 institute
Show, on the basis of embodiment as shown in Figure 1, before obtaining the identity of described file destination, copyright information detection side
Method also includes:
In step S41, determine in described file destination whether there is copyright information;If there is version in described file destination
Power information, performs step S11, if there is not copyright information in described file destination, performs step S42.Determine in file destination
The mode that whether there is copyright information can have multiple, such as, according to whether there is identity in file destination can come really
Fixed, or according to whether file destination exists digital signature determine.
In step S42, generate identity and digital signature according to the source-information of described file destination;
In step S43, the digital signature generated is associated storage with the identity of generation;
In step S44, the identity of described generation is embedded in the content file of described file destination to form body
Part identification information.Such as in the case of identification information is digital watermarking, then can be by digital watermark technology by body
Part mark is embedded in the content file of file destination, and the i.e. identity of data relevant to identity in file destination is believed
Breath, this process can use air space algorithm, Patchwork algorithm, transform-domain algorithm scheduling algorithm to realize.
In the present embodiment, whether can first determine in file destination before obtaining the identity of described file destination
There is copyright information.
If file destination having existed copyright information, then may determine that file destination is uploaded the most for the first time, therefore exist
Non-creator requires the situation of its copyright, and then can be by the embodiment shown in Fig. 1 to Fig. 3 by detection file destination
Whether copyright information is modified to determine that the copyright to file destination requires whether to pass through.
If file destination does not exist copyright information, then may determine that file destination is that creator uploads for the first time, this
In the case of copyright require as the first copyright requirement of creator.Require to believe according to the source of file destination for this copyright
Breath adds copyright information in file destination, and wherein source-information can be the account information in source, the end message etc. in source.
Further, the present embodiment generates identity by the source-information according to described file destination and numeral is signed
Name, can accurately generate the copyright information relevant to creator.And the follow-up identity mark by the digital signature and the generation that generate
(digital signature therein includes the digital signature of content file of file destination, the file of identification information to know association storage
The digital signature of listing file residing for list), it is simple to during copyright information is detected, obtain according to identity
The digital signature of content file and the digital signature of listing file in file destination in the file destination being associated, it is ensured that accurate
Really determine whether described identification information is associated with described digital signature, and determine described listed files and described number
Whether word signature is associated.Identity according to described generation generates identity in the content file of described file destination
Information, it is simple to during detecting copyright information, obtains identity from the content file of described file destination
After information, it is possible to accurately determine whether described identity is consistent with described identification information.
Alternatively, described identification information includes the digital watermarking of described identity.
According to the present embodiment, embedding the digital watermarking in the content file of file destination does not affect the use of file destination,
It is not easy to be ascertained and again revises, but digital watermarking one side can be embedded into and identify and identification.Identity letter can be improved
The difficulty that breath is revised by lawless person, improves the safety of copyright information.
Fig. 5 is the flow chart according to another the copyright information detection method shown in an exemplary embodiment, such as Fig. 5 institute
Showing, on the basis of embodiment as shown in Figure 4, copyright information detection method also includes:
In step s 51, the confidential information that adds of the identity of described generation with described file destination is associated storage;
In step S52, when receiving the acquisition request that described file destination is added confidential information, according to described target
The identity inquiry of file adds confidential information, adds confidential information transmission to sending the described terminal obtaining request by inquire.
In the present embodiment, add confidential information and may be used for encryption and deciphering file destination, such as file destination for compression literary composition
Part, then adding confidential information can be decompression password.
According to the present embodiment, stored, follow-up by the encryption information association of the identity that will generate and file destination
When receiving the acquisition request that file destination is added confidential information, can inquire about according to the identity of file destination and add secret letter
Breath.Owing to the identity of file destination is associated with the confidential information that adds of file destination, therefore in the identity of file destination
Situation about being revised, adds confidential information according to what amended identity inquired, it is impossible to deciphering file destination, also cannot beat
Open file destination, more other copyright informations of file destination cannot be modified.
Accordingly, can avoid lawless person in the case of the copyright information of amendment file destination, then revise file destination
The copyright information such as identification information, listed files.
The most in the embodiment shown in fig. 1, if the identification information of content file is modified, then target is described
File is the most decrypted, it may be determined that identity is not modified, and therefore can determine one's identity according to identity identifies letter
Whether breath is modified.And in the case of identity is modified, according to amended identity obtain add confidential information without
Method deciphering file destination, the most just cannot modify to the identification information in the content file of file destination.
The most in the embodiment shown in fig. 3, if the listed files of file destination is modified, then file destination is described
The most decrypted, it may be determined that identity is not modified, listing file in the file destination therefore associated with identity
Digital signature the most do not change, such that it is able to using this digital signature as the base determining whether listed files is modified
Accurate.And in the case of identity is modified, adds confidential information cannot decipher target according to what amended identity obtained
File, the most just cannot modify to the listed files in the listing file of file destination.
Fig. 6 is the flow chart according to another the copyright information detection method shown in an exemplary embodiment, as shown in Figure 6
(wherein part steps is not shown, simplifies and shows step S44 and S52), on the basis of embodiment as shown in Figure 5, described general
The confidential information that adds of the identity of described generation and described file destination is associated storage and includes:
In step S511, generate corresponding PKI and private key, by described private key, described file destination is encrypted, raw
Become PKI and private key;
In step S512, the identity of described generation is associated storage with described PKI;
In step S513, after receiving the request of the purchase to described file destination, described PKI is transmitted to sending
The described terminal buying request.
The present embodiment, for the addition of the file destination of copyright information, can use asymmetrical encryption algorithm (also to become non-
Symmetric encipherment algorithm) it is encrypted, such as in the case of this copyright information detection method is applied to server, server is permissible
Generate PKI and corresponding private key, and by private key, file destination is encrypted, then PKI is transmitted to sending purchase
The terminal of request.By asymmetrical encryption algorithm file destination is encrypted the safety that can improve file destination, wherein
Asymmetrical encryption algorithm can include DES (Data Encryption Standard, data encryption standards), AES (Advanced
Encryption Standard, Advanced Encryption Standard) scheduling algorithm.
Remain with PKI owing to have purchased the terminal of file destination, therefore can use public key decryptions at any time and use target
File, it is not necessary to all verify to server for authentication when using file destination every time, it is ensured that terminal is being not connected to mutually
It also is able in the case of networking normally use file destination, improves terminal and use the comfort level of file destination.
Corresponding with the embodiment of aforesaid method for information display, the disclosure additionally provides the enforcement of information display device
Example.
Fig. 7 is to detect device block diagram according to a kind of copyright information shown in an exemplary embodiment.With reference to Fig. 7, this device
Including:
First acquiring unit 701, is configured to receiving file destination and the copyright requirement to described file destination
Time, obtain the identity of described file destination, from the content file of described file destination, obtain identification information;
First determines unit 702, is configured to determine that whether described identity is consistent with described identification information, if
Do not correspond, refuse described copyright requirement.
Fig. 8 is to detect device block diagram according to the another kind of copyright information shown in an exemplary embodiment.With reference to Fig. 8, at Fig. 7
On the basis of illustrated embodiment, copyright information detection device also includes:
Second acquisition unit 703, is configured in the case of described identity is consistent with described identification information,
Obtain the digital signature of content file in the file destination being associated with described identity;
Second determines unit 704, is configured to determine that whether described identification information is associated with described digital signature,
If unconnected, refuse described copyright requirement.
Fig. 9 is to detect device block diagram according to another copyright information shown in an exemplary embodiment.With reference to Fig. 9, at Fig. 7
On the basis of illustrated embodiment, copyright information detection device also includes:
3rd acquiring unit 705, is configured in the case of described identity is consistent with described identification information,
Obtain the digital signature of listing file in the file destination being associated with described identity,
Wherein, the listed files of described identification information is positioned in listing file;
3rd determines unit 706, is configured to determine that whether described listed files is associated with described digital signature, if not
It is associated, refuses described copyright requirement.
It should be noted that the 3rd acquiring unit 705 and the 3rd in the device embodiment shown in above-mentioned Fig. 9 determines unit
The structure of 706 can also be included in the device embodiment of earlier figures 8, does not limits this disclosure.In this case,
The 3rd acquiring unit 705 in the present embodiment can be same unit with the second acquisition unit 703 in embodiment illustrated in fig. 8;
In implementing shown in Fig. 7 to Fig. 9 first determines unit 702, second determines that unit 704 and the 3rd determines that unit 706 can be together
Unit one;First acquiring unit 701, second acquisition unit the 703, the 3rd acquiring unit 705 can be same unit.
Figure 10 is to detect device block diagram according to another copyright information shown in an exemplary embodiment.Reference Figure 10,
On the basis of embodiment illustrated in fig. 7, copyright information detection device also includes:
4th determines unit 707, is configured to determine that in described file destination whether there is copyright information,
Wherein, in the case of described first acquiring unit exists copyright information in described file destination, described mesh is obtained
The identity of mark file;
Signal generating unit 708, in the case of being configured to there is not copyright information in described file destination, according to described mesh
The source-information of mark file generates identity and digital signature;
First memory element 709, is configured to the identity of generation, the digital signature generated is associated storage;
Embedded unit 710, is configured in the content file of the identity described file destination of embedding of described generation
To form identification information.
Alternatively, described identification information includes the digital watermarking of described identity.
Figure 11 is to detect device block diagram according to another copyright information shown in an exemplary embodiment.Reference Figure 11,
On the basis of embodiment illustrated in fig. 10, copyright information detection device also includes:
Second memory element 711, is configured to the identity of described generation and described file destination are added confidential information
Association storage;
Query unit 712, is configured to when receiving the acquisition request that described file destination adds confidential information, according to
The identity inquiry of described file destination adds confidential information, adds confidential information transmission to sending described acquisition request by inquire
Terminal.
The second memory element 711 in the present embodiment with the first memory element 709 in embodiment illustrated in fig. 10 can be
Same unit.
Figure 12 is to detect device block diagram according to another copyright information shown in an exemplary embodiment.With reference to Figure 12 (its
Middle unit is not shown), on the basis of embodiment illustrated in fig. 11, described second memory element 711 includes:
Encryption sub-unit operable 7111, is configurable to generate corresponding PKI and private key, by described private key to described target
File encryption;
Association storing sub-units 7112, is configured to described PKI, the identity of described generation is associated storage;
Transmission subelement 7113, is configured to after receiving the request of the purchase to described file destination, by described PKI
Transmit to sending the described terminal buying request.
About the device in above-described embodiment, wherein modules performs the concrete mode of operation in relevant the method
Embodiment in be described in detail, explanation will be not set forth in detail herein.
For device embodiment, owing to it corresponds essentially to embodiment of the method, so relevant part sees method in fact
The part executing example illustrates.Device embodiment described above is only schematically, wherein said as separating component
The unit illustrated can be or may not be physically separate, and the parts shown as unit can be or can also
It not physical location, i.e. may be located at a place, or can also be distributed on multiple NE.Can be according to reality
Need to select some or all of module therein to realize the purpose of disclosure scheme.Those of ordinary skill in the art are not paying
In the case of going out creative work, i.e. it is appreciated that and implements.
Accordingly, the disclosure also provides for a kind of information display device, including: processor;Can perform for storing processor
The memorizer of instruction;Wherein, described processor is configured to:
Accordingly, the disclosure also provides for a kind of terminal, and described terminal includes memorizer, and one or more than one
Program, one of them or more than one program is stored in memorizer, and be configured to by one or more than one
Reason device performs one or more than one program and comprises the instruction for carrying out following operation:
Figure 13 is the block diagram according to a kind of device 1300 for copyright information detection shown in an exemplary embodiment.Example
As, device 1300 can be mobile phone, computer, digital broadcast terminal, messaging devices, game console, and flat board sets
Standby, armarium, body-building equipment, personal digital assistant etc..
With reference to Figure 13, device 1300 can include following one or more assembly: processes assembly 1302, memorizer 1304,
Power supply module 1306, multimedia groupware 1308, audio-frequency assembly 1310, the interface 1312 of input/output (I/O), sensor cluster
1314, and communications component 1316.
Process assembly 1302 and generally control the integrated operation of device 1300, such as with display, call, data communication,
The operation that camera operation and record operation are associated.Process assembly 1302 and can include that one or more processor 1320 performs
Instruction, to complete all or part of step of above-mentioned method.Additionally, process assembly 1302 can include one or more mould
Block, it is simple to process between assembly 1302 and other assemblies is mutual.Such as, process assembly 1302 and can include multi-media module,
With facilitate multimedia groupware 1308 and process between assembly 1302 mutual.
Memorizer 1304 is configured to store various types of data to support the operation at device 1300.These data
Example include on device 1300 operation any application program or the instruction of method, contact data, telephone book data,
Message, picture, video etc..Memorizer 1304 can by any kind of volatibility or non-volatile memory device or they
Combination realizes, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), erasable can
Program read-only memory (EPROM), programmable read only memory (PROM), read only memory (ROM), magnetic memory, flash memory
Reservoir, disk or CD.
The various assemblies that power supply module 1306 is device 1300 provide electric power.Power supply module 1306 can include power management
System, one or more power supplys, and other generate, manage and distribute, with for device 1300, the assembly that electric power is associated.
The screen of one output interface of offer that multimedia groupware 1308 is included between described device 1300 and user.?
In some embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel,
Screen may be implemented as touch screen, to receive the input signal from user.Touch panel includes that one or more touch passes
Sensor is with the gesture on sensing touch, slip and touch panel.Described touch sensor can not only sense touch or slide dynamic
The border made, but also detect the persistent period relevant to described touch or slide and pressure.In certain embodiments, many
Media component 1308 includes a front-facing camera and/or post-positioned pick-up head.When device 1300 is in operator scheme, such as shooting mould
When formula or video mode, front-facing camera and/or post-positioned pick-up head can receive the multi-medium data of outside.Each preposition shooting
Head and post-positioned pick-up head can be a fixing optical lens system or have focal length and optical zoom ability.
Audio-frequency assembly 1310 is configured to output and/or input audio signal.Such as, audio-frequency assembly 1310 includes a wheat
Gram wind (MIC), when device 1300 is in operator scheme, during such as call model, logging mode and speech recognition mode, mike quilt
It is configured to receive external audio signal.The audio signal received can be further stored at memorizer 1304 or via communication
Assembly 1316 sends.In certain embodiments, audio-frequency assembly 1310 also includes a speaker, is used for exporting audio signal.
I/O interface 1312 provides interface, above-mentioned peripheral interface module for processing between assembly 1302 and peripheral interface module
Can be keyboard, put striking wheel, button etc..These buttons may include but be not limited to: home button, volume button, start button and
Locking press button.
Sensor cluster 1314 includes one or more sensor, for providing the state of various aspects to comment for device 1300
Estimate.Such as, what sensor cluster 1314 can detect device 1300 opens/closed mode, the relative localization of assembly, such as institute
Stating display and keypad that assembly is device 1300, sensor cluster 1314 can also detect device 1300 or device 1,300 1
The position change of individual assembly, the presence or absence that user contacts with device 1300, device 1300 orientation or acceleration/deceleration and dress
Put the variations in temperature of 1300.Sensor cluster 1314 can include proximity transducer, is configured to do not having any physics
The existence of object near detection during contact.Sensor cluster 1314 can also include optical sensor, as CMOS or ccd image sense
Device, for using in imaging applications.In certain embodiments, this sensor cluster 1314 can also include acceleration sensing
Device, gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communications component 1316 is configured to facilitate the communication of wired or wireless mode between device 1300 and other equipment.Dress
Put 1300 and can access wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.Exemplary at one
In embodiment, broadcast singal or broadcast that communications component 1316 receives from external broadcasting management system via broadcast channel are relevant
Information.In one exemplary embodiment, described communications component 1316 also includes near-field communication (NFC) module, to promote short distance
Communication.Such as, can be based on RF identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband
(UWB) technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 1300 can be by one or more application specific integrated circuits (ASIC), numeral
Signal processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components realize, be used for performing said method.
In the exemplary embodiment, a kind of non-transitory computer-readable recording medium including instruction, example are additionally provided
As included the memorizer 1304 of instruction, above-mentioned instruction can have been performed said method by the processor 1320 of device 1300.Example
If, described non-transitory computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, soft
Dish and optical data storage devices etc..
Those skilled in the art, after considering description and putting into practice disclosure disclosed herein, will readily occur to its of the disclosure
Its embodiment.The application is intended to any modification, purposes or the adaptations of the disclosure, these modification, purposes or
Person's adaptations is followed the general principle of the disclosure and includes the undocumented common knowledge in the art of the disclosure
Or conventional techniques means.Description and embodiments is considered only as exemplary, and the true scope of the disclosure and spirit are by following
Claim is pointed out.
It should be appreciated that the disclosure is not limited to precision architecture described above and illustrated in the accompanying drawings, and
And various modifications and changes can carried out without departing from the scope.The scope of the present disclosure is only limited by appended claim.
Claims (15)
1. a copyright information detection method, it is characterised in that including:
When receiving file destination and the copyright to described file destination requires, obtain the identity mark of described file destination
Know, from the content file of described file destination, obtain identification information;
Determining whether described identity is consistent with described identification information, if not corresponding, refusing described copyright requirement.
Copyright information detection method the most according to claim 1, it is characterised in that in described identity and described identity
In the case of identification information is consistent, also include:
Obtain the digital signature of content file in the file destination being associated with described identity;
Determine whether described identification information is associated with described digital signature, if unconnected, refuse described copyright requirement.
Copyright information detection method the most according to claim 1, it is characterised in that the file row of described identification information
Epi-position, in listing file, in the case of described identity is consistent with described identification information, also includes:
Obtain the digital signature of listing file in the file destination being associated with described identity;
Determine whether described listed files is associated with described digital signature, if unconnected, refuse described copyright requirement.
Copyright information detection method the most according to claim 1, it is characterised in that in the identity obtaining described file destination
Before mark, also include:
Determine in described file destination and whether there is copyright information;
If described file destination exists copyright information, obtain the identity of described file destination;
If described file destination does not exist copyright information, generate identity sum according to the source-information of described file destination
Word is signed;
The digital signature generated is associated storage with the identity of generation;
The identity of described generation is embedded in the content file of described file destination to form identification information.
Copyright information detection method the most according to claim 4, it is characterised in that described identification information includes described
The digital watermarking of identity.
Copyright information detection method the most according to claim 4, it is characterised in that also include:
Encryption information association storage by the identity of described generation with described file destination;
When receiving the acquisition request that described file destination is added confidential information, look into according to the identity of described file destination
Inquiry adds confidential information, adds confidential information transmission to sending the described terminal obtaining request by inquire.
Copyright information detection method the most according to claim 6, it is characterised in that the described identity by described generation
It is associated storage includes with the confidential information that adds of described file destination:
Generate corresponding PKI and private key, by described private key, described file destination is encrypted;
The identity of described generation is associated storage with described PKI;
After receiving the request of the purchase to described file destination, by the transmission of described PKI to sending the described end buying request
End.
8. a copyright information detection device, it is characterised in that including:
First acquiring unit, when receiving file destination and the copyright to described file destination requires, obtains described target
The identity of file, obtains identification information from the content file of described file destination;
First determines unit, determines whether described identity is consistent with described identification information, if not corresponding, refusal is described
Copyright requirement.
Copyright information the most according to claim 8 detection device, it is characterised in that also include:
Second acquisition unit, in the case of described identity is consistent with described identification information, obtains and described identity
The digital signature of content file in the file destination that mark is associated;
Second determines unit, determines whether described identification information is associated with described digital signature, if unconnected, refusal
Described copyright requirement.
Copyright information the most according to claim 8 detection device, it is characterised in that also include:
3rd acquiring unit, in the case of described identity is consistent with described identification information, obtains and described identity
The digital signature of listing file in the file destination that mark is associated,
Wherein, the listed files of described identification information is positioned in listing file;
3rd determines unit, determines whether described listed files is associated with described digital signature, if unconnected, refusal is described
Copyright requirement.
11. copyright information according to claim 8 detection devices, it is characterised in that also include:
4th determines unit, determines in described file destination whether there is copyright information,
Wherein, in the case of described first acquiring unit exists copyright information in described file destination, obtain described target literary composition
The identity of part;
Signal generating unit, in the case of there is not copyright information, believes according to the source of described file destination in described file destination
Breath generates identity and digital signature;
First memory element, associates storage by the digital signature generated with the identity of generation;
Embedded unit, embeds the identity of described generation in the content file of described file destination to form identity letter
Breath.
12. copyright information according to claim 11 detection devices, it is characterised in that described identification information includes institute
State the digital watermarking of identity.
13. copyright information according to claim 11 detection devices, it is characterised in that also include:
Second memory element, by the encryption information association storage of the identity of described generation with described file destination;
Query unit, when receiving the acquisition request that described file destination adds confidential information, according to described file destination
Identity inquiry adds confidential information, adds confidential information transmission to sending the described terminal obtaining request by inquire.
14. copyright information according to claim 13 detection devices, it is characterised in that described second memory element includes:
Encryption sub-unit operable, generates corresponding PKI and private key, is encrypted described file destination by described private key;
Association storing sub-units, associates storage by the identity of described generation with described PKI;
Transmission subelement, after receiving the request of the purchase to described file destination, purchases the transmission of described PKI described in sending
Buy the terminal of request.
15. 1 kinds of electronic equipments, it is characterised in that including:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
When receiving file destination and the copyright to described file destination requires, obtain the identity mark of described file destination
Know, from the content file of described file destination, obtain identification information;
Determining whether described identity is consistent with described identification information, if not corresponding, refusing described copyright requirement.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610405542.6A CN106096335A (en) | 2016-06-08 | 2016-06-08 | Copyright information detection method, copyright information detection device and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610405542.6A CN106096335A (en) | 2016-06-08 | 2016-06-08 | Copyright information detection method, copyright information detection device and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106096335A true CN106096335A (en) | 2016-11-09 |
Family
ID=57227701
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610405542.6A Pending CN106096335A (en) | 2016-06-08 | 2016-06-08 | Copyright information detection method, copyright information detection device and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106096335A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109218014A (en) * | 2017-06-30 | 2019-01-15 | 北京国双科技有限公司 | The processing method of video/audio, apparatus and system |
CN109614776A (en) * | 2018-12-27 | 2019-04-12 | 北京三未信安科技发展有限公司 | A kind of data source tracing method and system based on digital watermark technology |
CN110809763A (en) * | 2019-05-20 | 2020-02-18 | 阿里巴巴集团控股有限公司 | Identifying copyrighted material using time-stamped embedded copyright information |
CN111079155A (en) * | 2019-11-13 | 2020-04-28 | 北京海益同展信息科技有限公司 | Data processing method and device, electronic equipment and computer storage medium |
CN111209540A (en) * | 2020-01-03 | 2020-05-29 | 腾讯科技(深圳)有限公司 | Information verification method, device and storage medium |
CN112115422A (en) * | 2020-08-10 | 2020-12-22 | 北京华雨天成文化传播有限公司 | Method, device and equipment for detecting copyright file modification |
CN113255008A (en) * | 2021-07-01 | 2021-08-13 | 支付宝(杭州)信息技术有限公司 | Method and system for outputting multimedia file |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1558595A (en) * | 2004-01-18 | 2004-12-29 | 哈尔滨工业大学 | Method for making and verifying digital signature and digital watermark bar code |
CN1558303A (en) * | 2004-02-11 | 2004-12-29 | 北京邮电大学 | Digital watermarking infrastructure |
CN101398870A (en) * | 2007-09-24 | 2009-04-01 | 广州市百成科技有限公司 | Electronic stamp system based on password layered system |
CN101729256A (en) * | 2008-10-24 | 2010-06-09 | 深圳宝嘉电子设备有限公司 | Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark |
CN102567657A (en) * | 2010-12-15 | 2012-07-11 | 黄铁军 | Digital work ownership authentication system and digital work ownership authentication method |
CN102594563A (en) * | 2012-02-20 | 2012-07-18 | 南京中通电气有限公司 | Source authentication method for secure multicast |
CN103123673A (en) * | 2013-03-12 | 2013-05-29 | 山东省计算中心 | Effective protective method of digital media copyright in web environment |
CN103902925A (en) * | 2012-12-31 | 2014-07-02 | 中国银联股份有限公司 | Method and equipment for digital document signature |
CN104636659A (en) * | 2014-12-31 | 2015-05-20 | 株洲南车时代电气股份有限公司 | Register data generation method and device |
-
2016
- 2016-06-08 CN CN201610405542.6A patent/CN106096335A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1558595A (en) * | 2004-01-18 | 2004-12-29 | 哈尔滨工业大学 | Method for making and verifying digital signature and digital watermark bar code |
CN1558303A (en) * | 2004-02-11 | 2004-12-29 | 北京邮电大学 | Digital watermarking infrastructure |
CN101398870A (en) * | 2007-09-24 | 2009-04-01 | 广州市百成科技有限公司 | Electronic stamp system based on password layered system |
CN101729256A (en) * | 2008-10-24 | 2010-06-09 | 深圳宝嘉电子设备有限公司 | Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark |
CN102567657A (en) * | 2010-12-15 | 2012-07-11 | 黄铁军 | Digital work ownership authentication system and digital work ownership authentication method |
CN102594563A (en) * | 2012-02-20 | 2012-07-18 | 南京中通电气有限公司 | Source authentication method for secure multicast |
CN103902925A (en) * | 2012-12-31 | 2014-07-02 | 中国银联股份有限公司 | Method and equipment for digital document signature |
CN103123673A (en) * | 2013-03-12 | 2013-05-29 | 山东省计算中心 | Effective protective method of digital media copyright in web environment |
CN104636659A (en) * | 2014-12-31 | 2015-05-20 | 株洲南车时代电气股份有限公司 | Register data generation method and device |
Non-Patent Citations (1)
Title |
---|
肖芸: ""DRM技术在数字出版中的应用研究"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109218014A (en) * | 2017-06-30 | 2019-01-15 | 北京国双科技有限公司 | The processing method of video/audio, apparatus and system |
CN109614776A (en) * | 2018-12-27 | 2019-04-12 | 北京三未信安科技发展有限公司 | A kind of data source tracing method and system based on digital watermark technology |
CN109614776B (en) * | 2018-12-27 | 2020-09-22 | 北京三未信安科技发展有限公司 | Data tracing method and system based on digital watermarking technology |
CN110809763A (en) * | 2019-05-20 | 2020-02-18 | 阿里巴巴集团控股有限公司 | Identifying copyrighted material using time-stamped embedded copyright information |
CN111079155A (en) * | 2019-11-13 | 2020-04-28 | 北京海益同展信息科技有限公司 | Data processing method and device, electronic equipment and computer storage medium |
CN111209540A (en) * | 2020-01-03 | 2020-05-29 | 腾讯科技(深圳)有限公司 | Information verification method, device and storage medium |
CN112115422A (en) * | 2020-08-10 | 2020-12-22 | 北京华雨天成文化传播有限公司 | Method, device and equipment for detecting copyright file modification |
CN113255008A (en) * | 2021-07-01 | 2021-08-13 | 支付宝(杭州)信息技术有限公司 | Method and system for outputting multimedia file |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106096335A (en) | Copyright information detection method, copyright information detection device and electronic equipment | |
CN104391870B (en) | Logistics information acquisition methods and device | |
US8572375B2 (en) | Device pairing based on graphically encoded data | |
JP6814147B2 (en) | Terminals, methods, non-volatile storage media | |
CN103916233A (en) | Information encryption method and device | |
CN105307137A (en) | Short message reading method and device | |
CN104955031A (en) | Information transmission method and device | |
CN105243318A (en) | User equipment control right determining method and apparatus and terminal device | |
CN104125055A (en) | Encryption and decryption method and electronic device | |
CN103914541B (en) | The method and device of information search | |
CN104993936A (en) | Anti-counterfeiting validation method and device for filter element of water purifier and electronic equipment | |
KR101688182B1 (en) | Anti-counterfeiting verification method, device and system, program and recording medium | |
CN104639972B (en) | The method, apparatus and equipment of a kind of sharing contents | |
CN106211159A (en) | Personal identification method based on bluetooth and device | |
CN104093119B (en) | unlocking method and device | |
CN104780045B (en) | The management method and device of smart machine | |
CN105049213A (en) | File signature method and device | |
CN105468767A (en) | Method and device for acquiring calling card information | |
CN105791309A (en) | Method, device and system for executing business processing | |
CN106372517A (en) | File encryption method, file decryption method, file encryption device and equipment | |
KR20140094878A (en) | User termial and method for image processing by using recognition of user in the user terminal | |
CN105450662A (en) | Encryption method and device | |
CN103914520A (en) | Data query method, terminal equipment and server | |
CN106534876A (en) | Target user determining method and target user determining device | |
CN106060098A (en) | Processing method, processing device and processing system for verification codes |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161109 |