CN106096335A - Copyright information detection method, copyright information detection device and electronic equipment - Google Patents

Copyright information detection method, copyright information detection device and electronic equipment Download PDF

Info

Publication number
CN106096335A
CN106096335A CN201610405542.6A CN201610405542A CN106096335A CN 106096335 A CN106096335 A CN 106096335A CN 201610405542 A CN201610405542 A CN 201610405542A CN 106096335 A CN106096335 A CN 106096335A
Authority
CN
China
Prior art keywords
identity
file destination
information
file
identification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610405542.6A
Other languages
Chinese (zh)
Inventor
张朝辉
朱佩宏
霍东海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201610405542.6A priority Critical patent/CN106096335A/en
Publication of CN106096335A publication Critical patent/CN106096335A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The disclosure is directed to a kind of copyright information detection method, copyright information detection device and electronic equipment, this copyright information detection method includes: when receiving file destination and the copyright to described file destination requires, obtain the identity of described file destination, from the content file of described file destination, obtain identification information;Determining whether described identity is consistent with described identification information, if not corresponding, refusing described copyright requirement.By the technical scheme of the disclosure, may determine that whether the identity of file destination is consistent with the identification information in content file, if not corresponding, identification information in description file is modified, then can refuse this copyright requirement, thus avoid the lawless person that the copyright information of file destination is modified to obtain the copyright of file destination.

Description

Copyright information detection method, copyright information detection device and electronic equipment
Technical field
It relates to digital copyright technology field, particularly relate to a kind of copyright information detection method, a kind of copyright information Detection device and a kind of electronic equipment.
Background technology
First information technology is growing instantly, and along with being skyrocketed through of digital product quantity, digital publishing rights is the most more subject to Concern to people.
Lawless person, in order to obtain the copyright of copyright, typically can revise the copyright information in copyright so that repair Copyright information after changing is consistent with the information of oneself, in order to after being uploaded onto the server by amended copyright, server According to amended copyright information, the copyright of copyright can be regarded as to one's name.In order to avoid lawless person revises number Copyright information in word works, pretends to be the creator of copyright to claim the copyright having copyright, uses in correlation technique To modes such as copyright encryptions, but this mode is for lawless person, is still relatively easy to crack, so being difficult to Play good effect.
Summary of the invention
The disclosure provides a kind of copyright information detection method, copyright information detection device and electronic equipment, relevant to solve Deficiency in technology.
First aspect according to disclosure embodiment, it is provided that a kind of copyright information detection method, including:
When receiving file destination and the copyright to described file destination requires, obtain the identity of described file destination Mark, obtains identification information from the content file of described file destination;
Determining whether described identity is consistent with described identification information, if not corresponding, refusing described copyright requirement.
Alternatively, in the case of described identity is consistent with described identification information, also include:
Obtain the digital signature of content file in the file destination being associated with described identity;
Determine whether described identification information is associated with described digital signature, if unconnected, refuse described copyright Requirement.
Alternatively, the listed files of described identification information is positioned in listing file, in described identity with described In the case of identification information is consistent, also include:
Obtain the digital signature of listing file in the file destination being associated with described identity;
Determine whether described listed files is associated with described digital signature, if unconnected, refuse described copyright requirement.
Alternatively, before obtaining the identity of described file destination, also include:
Determine in described file destination and whether there is copyright information;
If described file destination exists copyright information, obtain the identity of described file destination;
If described file destination does not exist copyright information, generate identity according to the source-information of described file destination And digital signature;
The digital signature generated is associated storage with the identity of generation;
The identity of described generation is embedded in the content file of described file destination to form identification information.
Alternatively, described identification information includes the digital watermarking of described identity.
Alternatively, above-mentioned copyright information detection method also includes:
Encryption information association storage by the identity of described generation with described file destination;
When receiving the acquisition request that described file destination is added confidential information, according to the identity mark of described file destination Know inquiry and add confidential information, add confidential information transmission to sending the described terminal obtaining request by inquire.
Alternatively, the described identity by described generation is associated storage bag with the confidential information that adds of described file destination Include:
Generate corresponding PKI and private key, by described private key, described file destination is encrypted;
The identity of described generation is associated storage with described PKI;
After receiving the request of the purchase to described file destination, by the transmission of described PKI to sending described purchase request Terminal.
Second aspect according to disclosure embodiment, it is provided that a kind of copyright information detection device, including:
First acquiring unit, when receiving file destination and the copyright to described file destination requires, obtains described The identity of file destination, obtains identification information from the content file of described file destination;
First determines unit, determines whether described identity is consistent with described identification information, if not corresponding, and refusal Described copyright requirement.
Alternatively, above-mentioned copyright information detection device also includes:
Second acquisition unit, in the case of described identity is consistent with described identification information, obtains with described The digital signature of content file in the file destination that identity is associated;
Second determines unit, determines whether described identification information is associated with described digital signature, if unconnected, Refuse described copyright requirement.
Alternatively, above-mentioned copyright information detection device also includes:
3rd acquiring unit, in the case of described identity is consistent with described identification information, obtains with described The digital signature of listing file in the file destination that identity is associated,
Wherein, the listed files of described identification information is positioned in listing file;
3rd determines unit, determines whether described listed files is associated with described digital signature, if unconnected, refusal Described copyright requirement.
Alternatively, above-mentioned copyright information detection device also includes:
4th determines unit, determines in described file destination whether there is copyright information,
Wherein, in the case of described first acquiring unit exists copyright information in described file destination, described mesh is obtained The identity of mark file;
Signal generating unit, in the case of there is not copyright information in described file destination, coming according to described file destination Source information generates identity and digital signature;
First memory element, associates storage by the digital signature generated with the identity of generation;
Embedded unit, embeds the identity of described generation in the content file of described file destination to form identity mark Knowledge information.
Alternatively, described identification information includes the digital watermarking of described identity.
Alternatively, above-mentioned copyright information detection device also includes:
Second memory element, by the encryption information association storage of the identity of described generation with described file destination;
Query unit, when receiving the acquisition request that described file destination adds confidential information, according to described target literary composition The identity inquiry of part adds confidential information, adds confidential information transmission to sending the described terminal obtaining request by inquire.
Alternatively, described second memory element includes:
Encryption sub-unit operable, generates corresponding PKI and private key, is encrypted described file destination by described private key;
Association storing sub-units, associates storage by the identity of described generation with described PKI;
Transmission subelement, after receiving the request of the purchase to described file destination, transmits described PKI to sending State the terminal of the request of purchase.
The third aspect according to disclosure embodiment, it is provided that a kind of electronic equipment, including:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
When receiving file destination and the copyright to described file destination requires, obtain the identity of described file destination Mark, obtains identification information from the content file of described file destination;
Determining whether described identity is consistent with described identification information, if not corresponding, refusing described copyright requirement.
Embodiment of the disclosure that the technical scheme of offer can include following beneficial effect:
From above-described embodiment, the disclosure may determine that identity and the identity mark in content file of file destination Whether knowledge information is consistent, if not corresponding, the identification information in description file is modified, then can refuse this copyright Requirement, thus avoid the lawless person that the copyright information of file destination is modified to obtain the copyright of file destination.
It should be appreciated that it is only exemplary and explanatory, not that above general description and details hereinafter describe The disclosure can be limited.
Accompanying drawing explanation
Accompanying drawing herein is merged in description and constitutes the part of this specification, it is shown that meet the enforcement of the disclosure Example, and for explaining the principle of the disclosure together with description.
Fig. 1 is the flow chart according to a kind of copyright information detection method shown in an exemplary embodiment.
Fig. 2 is the flow chart according to the another kind of copyright information detection method shown in an exemplary embodiment.
Fig. 3 is the flow chart according to another the copyright information detection method shown in an exemplary embodiment.
Fig. 4 is the flow chart according to another the copyright information detection method shown in an exemplary embodiment.
Fig. 5 is the flow chart according to another the copyright information detection method shown in an exemplary embodiment.
Fig. 6 is the flow chart according to another the copyright information detection method shown in an exemplary embodiment.
Fig. 7 is to detect device block diagram according to a kind of copyright information shown in an exemplary embodiment.
Fig. 8 is to detect device block diagram according to the another kind of copyright information shown in an exemplary embodiment.
Fig. 9 is to detect device block diagram according to another copyright information shown in an exemplary embodiment.
Figure 10 is to detect device block diagram according to another copyright information shown in an exemplary embodiment.
Figure 11 is to detect device block diagram according to another copyright information shown in an exemplary embodiment.
Figure 12 is to detect device block diagram according to another copyright information shown in an exemplary embodiment.
Figure 13 is the structural representation according to a kind of device for copyright information detection shown in an exemplary embodiment.
Detailed description of the invention
Here will illustrate exemplary embodiment in detail, its example represents in the accompanying drawings.Explained below relates to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represents same or analogous key element.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the disclosure.On the contrary, they are only with the most appended The example of the apparatus and method that some aspects that described in detail in claims, the disclosure are consistent.
Fig. 1 is the flow chart according to a kind of copyright information detection method shown in an exemplary embodiment, this copyright information Detection method can apply in server, as it is shown in figure 1, this copyright information detection method may comprise steps of.
In step s 11, when receiving file destination and the copyright to described file destination requires, described mesh is obtained The identity of mark file, obtains identification information from the content file of described file destination.
In the present embodiment, file destination can be the digital product possessing copyright information, and content file can be numeral Product comprises the subfile of particular content.Such as mobile phone, file destination can be application bag, main body bag etc., with As a example by theme bag, it can include that multiple content file, content file therein can be picture files.Identity can be The identity of file destination creator, such as, can be provided in a string character of the file header of file destination.Identity Information can be the information being generated and embedded in the content file of file destination according to identity.
Such as, identity can be GUID (Globally Unique Identifier, GUID). GUID be a kind of binary length generated by algorithm be the numeric identifier of 128, sum has reached 2^128, thus with The probability that machine generates two identical GUID is the least, therefore can largely avoid non-wound person to generate and creator Identical GUID.
Such as, identification information can be the digital watermarking of identity of the content file embedding file destination.Number Word watermark (Digital Watermarking) be some identification informations are directly embedded into copyright (such as multimedia, document, Application etc.) content file in or in the content file of copyright, carry out secondary indication (in such as amendment copyright Hold subregional structure in the middle part of file).
In step s 12, determining whether described identity is consistent with described identification information, if not corresponding, performing Step S13;
In step s 13, described copyright requirement is refused.
Lawless person, in order to obtain the digital publishing rights of file destination, typically can revise the copyright information of file destination, such as The identification information in content file can be revised, so that amended copyright information is consistent with the information of oneself, in order to rear When continuing the creator's information determining file destination according to identity and/or identification information, it is possible to obtain the letter with oneself Creator's information of manner of breathing symbol, thus successfully require copyright.According to this embodiment, it can judge the identity of file destination Whether be consistent with the identification information in content file, if not corresponding, the identification information in description file by Amendment, then can refuse this copyright requirement, thus avoid the lawless person modifying the copyright information of file destination to obtain The copyright of file destination.
If described identity is consistent with described identification information, perform step S14;
In step S14, determine the wound of described file destination according to described identity and/or described identification information Author information;
In step S15, determine whether the source-information that described copyright requires is consistent with described creator's information, if phase Symbol, performs step S16, otherwise, performs step 13;
In step s 16, it is allowed to described copyright requirement.
In the case of described identity is consistent with described identification information, the copyright information in file destination is described Revised, therefore can correctly be determined creator's information according to copyright information therein, in creator's information and copyright In the case of the source-information (such as user name, terminal IP etc.) required is consistent, it may be determined that this copyright requires as file destination Creator propose, thus allow copyright requirement, otherwise, it may be determined that this copyright requires it is not that the creator of file destination carries Go out.
In the present embodiment, enter as a example by identification information using GUID as identity, the digital watermarking of GUID Row explanation.
GUID belongs to the one of copyright information, when the file destination received comprises copyright information, and can be from target literary composition Obtain the GUID of creator in part, such as when file destination being generated copyright information, the primary importance at file destination head generates GUID, then the numeric identifier of a length of 128 can be extracted in the present embodiment from this primary importance.
The digital watermarking of GUID is to be embedded in the content file of file destination when file destination is generated copyright information The data relevant to GUID, such as second in the content file of file destination when file destination being generated copyright information Put the digital watermarking that embedded in GUID, then the character conduct of certain length can be extracted in the present embodiment from this second position Identification information.
If from the second position extract character be consistent with the numeric identifier extracted from primary importance, such as with from first Put certain section of continuation character in the numeric identifier of extraction identical with the character extracted from the second position, then may determine that identity Mark is consistent with identification information, illustrates that the copyright information in file destination is revised, therefore can be according to therein Copyright information correctly determines creator's information, in the case of the source-information required with copyright in creator's information is consistent, and can To determine that this copyright requires what the creator as file destination proposed, thus allow copyright requirement, such as, transmit to source terminal Detection pass through information, it is also possible to for this source terminal person's opening section authority (such as obtain file destination relevant benefit authority, Authority etc. to file destination amendment).
Correspondingly, if not corresponding with the numeric identifier extracted from primary importance from the character of second position extraction, then May determine that identity does not corresponds with identification information, and then may determine that the presenter that this copyright requires is not this target The creator of file, therefore can refuse its copyright requirement to this file destination, such as, not lead to source terminal transmission detection Cross information, it is also possible to transmit information to the creator of this file destination, in order to the creator of this file destination learns in time There is lawless person to be intended to the copyright of this file destination of requirement, thus take suitable counter-measure.
Alternatively, described determine whether described identity is consistent with described identification information and include:
Determine whether described identity is consistent with described identification information according to similarity algorithm.
Owing to being probably discontinuous in the identification information embedded in content file, therefore carry from content file The identification information taken, may comprise multistage and belong to and belong to tool between character and adjacent two sections of characters of identification information The character of body file content, even if causing the identification information extracted not revised, it is the completeest with identity Entirely it is consistent.
According to this embodiment, it can compared the similarity of identity and identification information by similarity algorithm, only Want both similarities more than predetermined threshold value (such as 70%), then i.e. to can determine that both are consistent, thus improve the mark that determines one's identity Know the accuracy whether being consistent with identification information.
Alternatively, in the case of described identity is consistent with described identification information, also include:
Obtain the digital signature of content file in the file destination being associated with described identity;
Determine whether described identification information is associated with described digital signature, if unconnected, refuse described copyright Requirement.
Alternatively, the listed files of described identification information is positioned in listing file, in described identity with described In the case of identification information is consistent, also include:
Obtain the digital signature of listing file in the file destination being associated with described identity;
Determine whether described listed files is associated with described digital signature, if unconnected, refuse described copyright requirement.
Alternatively, before obtaining the identity of described file destination, also include:
Determine in described file destination and whether there is copyright information;
If described file destination exists copyright information, obtain the identity of described file destination;
If described file destination does not exist copyright information, generate identity according to the source-information of described file destination And digital signature;
The digital signature generated is associated storage with the identity of generation;
The identity of described generation is embedded in the content file of described file destination to form identification information.
Alternatively, described identification information includes the digital watermarking of described identity.
Alternatively, above-mentioned copyright information detection method also includes:
Encryption information association storage by the identity of described generation with described file destination;
When receiving the acquisition request that described file destination is added confidential information, according to the identity mark of described file destination Know inquiry and add confidential information, add confidential information transmission to sending the described terminal obtaining request by inquire.
Alternatively, the described identity by described generation is associated storage bag with the confidential information that adds of described file destination Include:
Generate corresponding PKI and private key, by described private key, described file destination is encrypted;
The identity of described generation is associated storage with described PKI;
After receiving the request of the purchase to described file destination, by the transmission of described PKI to sending described purchase request Terminal.
Fig. 2 is the flow chart according to the another kind of copyright information detection method shown in an exemplary embodiment, such as Fig. 2 institute Show, on the basis of embodiment as shown in Figure 1, in the case of described identity is consistent with described identification information, version Power information detecting method can also include:
In the step s 21, the digital signature of content file in the file destination being associated with described identity is obtained;
In step S22, determine whether described identification information is associated with described digital signature, if unconnected, Performing step S13, if being associated, performing step S14.
Due to identity be consistent with identification information be not required in identity comprising complete with identification information Exactly the same character, such as, determining what whether described identity was consistent with described identification information by similarity algorithm In the case of, as long as namely identity and identification information similarity i.e. can determine that both are consistent more than predetermined threshold value.This makes Lawless person amendment part identity identification information in the case of, still ensure that identity is consistent with identification information.
For file, different files has different digital signature, the digital signature before its amendment of text document It is different with amended digital signature, in the case of therefore the content file at file destination is revised, its content literary composition The digital signature of part is different from the digital signature of the content file with the identification information not being modified.
According to the present embodiment, in the case of identity is consistent with identification information, can obtain further and body The digital signature of content file in the file destination that part mark is associated.In the case of identity is not modified, with body In the file destination that part mark is associated, the digital signature of content file is exactly the digital signature of the content file not being modified.Cause This, be determined by whether identification information is associated with this digital signature, whether can accurately determine identification information It is modified.
Such as file destination includes multiple content file, the most corresponding digital signature of each content file, if identity Identification information is not modified, then the content file at its place does not the most change, therefore the numeral of this content file Signature does not change, and in this case, identification information is phase with a digital signature in above-mentioned multiple digital signature (the such as digital signature of the content file at identification information place and a numeral in above-mentioned multiple digital signature of association Signature is identical);If identification information is modified, then the content file at its place the most just there occurs change, therefore should The digital signature of content file also can change, and in this case, identification information is equal with above-mentioned multiple digital signature Unconnected (the such as digital signature of the content file at identification information place and the every number in above-mentioned multiple digital signature Word signature all differs).
Therefore, whether the present embodiment is associated with digital signature according to identification information and whether determines one's identity identification information It is modified, in the case of described identity is consistent with described identification information, whether identification information is modified Further determined that, improve the accuracy rate whether identification information that determines one's identity is modified.
Fig. 3 is the flow chart according to the another kind of copyright information detection method shown in an exemplary embodiment, such as Fig. 3 institute Showing, on the basis of embodiment as shown in Figure 1, the listed files of described identification information is positioned in listing file, described In the case of identity is consistent with described identification information, copyright information detection method can also include:
In step S31, obtain the digital signature of listing file in the file destination being associated with described identity;
In step s 32, determine whether described listed files is associated with described digital signature, if unconnected, perform Step S13, if being associated, performs step S14.
Lawless person is for the amendment of file destination copyright information, except in embodiment as shown in Figure 1 believing identity The amendment of breath, it is also possible to the listed files of amendment identification information.Listed files may be used for recorded content file and storage The information such as the corresponding relation of address, once listed files is modified, and the listing file at its place is the most just modified.And for file For, different files has different digital signature, and digital signature and amended numeral before its amendment of text document are signed Name be different, in the case of therefore in listing file, listed files is revised, the digital signature of listing file with have The digital signature of the listing file of the listed files not being modified is different.
According to this embodiment, it can in the case of identity is consistent with identification information, obtain further and body The digital signature of listing file in the file destination that part mark is associated.In the case of identity is not modified, with body In the file destination that part mark is associated, the digital signature of content file is exactly the digital signature of the content file not being modified.Cause This, be determined by whether listed files is associated with digital signature, can accurately determine whether listed files is modified.
If listed files is not modified, then the listing file at its place does not the most change, therefore this list The digital signature of file does not change, and in this case, listed files is (the such as file being associated with above-mentioned digital signature The digital signature of the listing file at list place and above-mentioned digital signature are identical);If listed files is modified, then its institute Listing file the most just there occurs change, therefore the digital signature of this listing file also can change, in this case, Listed files (the such as digital signature of the listing file at listed files place and above-mentioned numeral unconnected with above-mentioned digital signature Signature differs).
Therefore, whether whether be associated with digital signature according to the listed files identification information that determines one's identity of the present embodiment is repaiied Change, in the case of described identity is consistent with described identification information, also whether listed files is modified and carries out Determine, improve the accuracy rate determining whether the copyright information of file is modified.
Fig. 4 is the flow chart according to another the copyright information detection method shown in an exemplary embodiment, such as Fig. 4 institute Show, on the basis of embodiment as shown in Figure 1, before obtaining the identity of described file destination, copyright information detection side Method also includes:
In step S41, determine in described file destination whether there is copyright information;If there is version in described file destination Power information, performs step S11, if there is not copyright information in described file destination, performs step S42.Determine in file destination The mode that whether there is copyright information can have multiple, such as, according to whether there is identity in file destination can come really Fixed, or according to whether file destination exists digital signature determine.
In step S42, generate identity and digital signature according to the source-information of described file destination;
In step S43, the digital signature generated is associated storage with the identity of generation;
In step S44, the identity of described generation is embedded in the content file of described file destination to form body Part identification information.Such as in the case of identification information is digital watermarking, then can be by digital watermark technology by body Part mark is embedded in the content file of file destination, and the i.e. identity of data relevant to identity in file destination is believed Breath, this process can use air space algorithm, Patchwork algorithm, transform-domain algorithm scheduling algorithm to realize.
In the present embodiment, whether can first determine in file destination before obtaining the identity of described file destination There is copyright information.
If file destination having existed copyright information, then may determine that file destination is uploaded the most for the first time, therefore exist Non-creator requires the situation of its copyright, and then can be by the embodiment shown in Fig. 1 to Fig. 3 by detection file destination Whether copyright information is modified to determine that the copyright to file destination requires whether to pass through.
If file destination does not exist copyright information, then may determine that file destination is that creator uploads for the first time, this In the case of copyright require as the first copyright requirement of creator.Require to believe according to the source of file destination for this copyright Breath adds copyright information in file destination, and wherein source-information can be the account information in source, the end message etc. in source.
Further, the present embodiment generates identity by the source-information according to described file destination and numeral is signed Name, can accurately generate the copyright information relevant to creator.And the follow-up identity mark by the digital signature and the generation that generate (digital signature therein includes the digital signature of content file of file destination, the file of identification information to know association storage The digital signature of listing file residing for list), it is simple to during copyright information is detected, obtain according to identity The digital signature of content file and the digital signature of listing file in file destination in the file destination being associated, it is ensured that accurate Really determine whether described identification information is associated with described digital signature, and determine described listed files and described number Whether word signature is associated.Identity according to described generation generates identity in the content file of described file destination Information, it is simple to during detecting copyright information, obtains identity from the content file of described file destination After information, it is possible to accurately determine whether described identity is consistent with described identification information.
Alternatively, described identification information includes the digital watermarking of described identity.
According to the present embodiment, embedding the digital watermarking in the content file of file destination does not affect the use of file destination, It is not easy to be ascertained and again revises, but digital watermarking one side can be embedded into and identify and identification.Identity letter can be improved The difficulty that breath is revised by lawless person, improves the safety of copyright information.
Fig. 5 is the flow chart according to another the copyright information detection method shown in an exemplary embodiment, such as Fig. 5 institute Showing, on the basis of embodiment as shown in Figure 4, copyright information detection method also includes:
In step s 51, the confidential information that adds of the identity of described generation with described file destination is associated storage;
In step S52, when receiving the acquisition request that described file destination is added confidential information, according to described target The identity inquiry of file adds confidential information, adds confidential information transmission to sending the described terminal obtaining request by inquire.
In the present embodiment, add confidential information and may be used for encryption and deciphering file destination, such as file destination for compression literary composition Part, then adding confidential information can be decompression password.
According to the present embodiment, stored, follow-up by the encryption information association of the identity that will generate and file destination When receiving the acquisition request that file destination is added confidential information, can inquire about according to the identity of file destination and add secret letter Breath.Owing to the identity of file destination is associated with the confidential information that adds of file destination, therefore in the identity of file destination Situation about being revised, adds confidential information according to what amended identity inquired, it is impossible to deciphering file destination, also cannot beat Open file destination, more other copyright informations of file destination cannot be modified.
Accordingly, can avoid lawless person in the case of the copyright information of amendment file destination, then revise file destination The copyright information such as identification information, listed files.
The most in the embodiment shown in fig. 1, if the identification information of content file is modified, then target is described File is the most decrypted, it may be determined that identity is not modified, and therefore can determine one's identity according to identity identifies letter Whether breath is modified.And in the case of identity is modified, according to amended identity obtain add confidential information without Method deciphering file destination, the most just cannot modify to the identification information in the content file of file destination.
The most in the embodiment shown in fig. 3, if the listed files of file destination is modified, then file destination is described The most decrypted, it may be determined that identity is not modified, listing file in the file destination therefore associated with identity Digital signature the most do not change, such that it is able to using this digital signature as the base determining whether listed files is modified Accurate.And in the case of identity is modified, adds confidential information cannot decipher target according to what amended identity obtained File, the most just cannot modify to the listed files in the listing file of file destination.
Fig. 6 is the flow chart according to another the copyright information detection method shown in an exemplary embodiment, as shown in Figure 6 (wherein part steps is not shown, simplifies and shows step S44 and S52), on the basis of embodiment as shown in Figure 5, described general The confidential information that adds of the identity of described generation and described file destination is associated storage and includes:
In step S511, generate corresponding PKI and private key, by described private key, described file destination is encrypted, raw Become PKI and private key;
In step S512, the identity of described generation is associated storage with described PKI;
In step S513, after receiving the request of the purchase to described file destination, described PKI is transmitted to sending The described terminal buying request.
The present embodiment, for the addition of the file destination of copyright information, can use asymmetrical encryption algorithm (also to become non- Symmetric encipherment algorithm) it is encrypted, such as in the case of this copyright information detection method is applied to server, server is permissible Generate PKI and corresponding private key, and by private key, file destination is encrypted, then PKI is transmitted to sending purchase The terminal of request.By asymmetrical encryption algorithm file destination is encrypted the safety that can improve file destination, wherein Asymmetrical encryption algorithm can include DES (Data Encryption Standard, data encryption standards), AES (Advanced Encryption Standard, Advanced Encryption Standard) scheduling algorithm.
Remain with PKI owing to have purchased the terminal of file destination, therefore can use public key decryptions at any time and use target File, it is not necessary to all verify to server for authentication when using file destination every time, it is ensured that terminal is being not connected to mutually It also is able in the case of networking normally use file destination, improves terminal and use the comfort level of file destination.
Corresponding with the embodiment of aforesaid method for information display, the disclosure additionally provides the enforcement of information display device Example.
Fig. 7 is to detect device block diagram according to a kind of copyright information shown in an exemplary embodiment.With reference to Fig. 7, this device Including:
First acquiring unit 701, is configured to receiving file destination and the copyright requirement to described file destination Time, obtain the identity of described file destination, from the content file of described file destination, obtain identification information;
First determines unit 702, is configured to determine that whether described identity is consistent with described identification information, if Do not correspond, refuse described copyright requirement.
Fig. 8 is to detect device block diagram according to the another kind of copyright information shown in an exemplary embodiment.With reference to Fig. 8, at Fig. 7 On the basis of illustrated embodiment, copyright information detection device also includes:
Second acquisition unit 703, is configured in the case of described identity is consistent with described identification information, Obtain the digital signature of content file in the file destination being associated with described identity;
Second determines unit 704, is configured to determine that whether described identification information is associated with described digital signature, If unconnected, refuse described copyright requirement.
Fig. 9 is to detect device block diagram according to another copyright information shown in an exemplary embodiment.With reference to Fig. 9, at Fig. 7 On the basis of illustrated embodiment, copyright information detection device also includes:
3rd acquiring unit 705, is configured in the case of described identity is consistent with described identification information, Obtain the digital signature of listing file in the file destination being associated with described identity,
Wherein, the listed files of described identification information is positioned in listing file;
3rd determines unit 706, is configured to determine that whether described listed files is associated with described digital signature, if not It is associated, refuses described copyright requirement.
It should be noted that the 3rd acquiring unit 705 and the 3rd in the device embodiment shown in above-mentioned Fig. 9 determines unit The structure of 706 can also be included in the device embodiment of earlier figures 8, does not limits this disclosure.In this case, The 3rd acquiring unit 705 in the present embodiment can be same unit with the second acquisition unit 703 in embodiment illustrated in fig. 8; In implementing shown in Fig. 7 to Fig. 9 first determines unit 702, second determines that unit 704 and the 3rd determines that unit 706 can be together Unit one;First acquiring unit 701, second acquisition unit the 703, the 3rd acquiring unit 705 can be same unit.
Figure 10 is to detect device block diagram according to another copyright information shown in an exemplary embodiment.Reference Figure 10, On the basis of embodiment illustrated in fig. 7, copyright information detection device also includes:
4th determines unit 707, is configured to determine that in described file destination whether there is copyright information,
Wherein, in the case of described first acquiring unit exists copyright information in described file destination, described mesh is obtained The identity of mark file;
Signal generating unit 708, in the case of being configured to there is not copyright information in described file destination, according to described mesh The source-information of mark file generates identity and digital signature;
First memory element 709, is configured to the identity of generation, the digital signature generated is associated storage;
Embedded unit 710, is configured in the content file of the identity described file destination of embedding of described generation To form identification information.
Alternatively, described identification information includes the digital watermarking of described identity.
Figure 11 is to detect device block diagram according to another copyright information shown in an exemplary embodiment.Reference Figure 11, On the basis of embodiment illustrated in fig. 10, copyright information detection device also includes:
Second memory element 711, is configured to the identity of described generation and described file destination are added confidential information Association storage;
Query unit 712, is configured to when receiving the acquisition request that described file destination adds confidential information, according to The identity inquiry of described file destination adds confidential information, adds confidential information transmission to sending described acquisition request by inquire Terminal.
The second memory element 711 in the present embodiment with the first memory element 709 in embodiment illustrated in fig. 10 can be Same unit.
Figure 12 is to detect device block diagram according to another copyright information shown in an exemplary embodiment.With reference to Figure 12 (its Middle unit is not shown), on the basis of embodiment illustrated in fig. 11, described second memory element 711 includes:
Encryption sub-unit operable 7111, is configurable to generate corresponding PKI and private key, by described private key to described target File encryption;
Association storing sub-units 7112, is configured to described PKI, the identity of described generation is associated storage;
Transmission subelement 7113, is configured to after receiving the request of the purchase to described file destination, by described PKI Transmit to sending the described terminal buying request.
About the device in above-described embodiment, wherein modules performs the concrete mode of operation in relevant the method Embodiment in be described in detail, explanation will be not set forth in detail herein.
For device embodiment, owing to it corresponds essentially to embodiment of the method, so relevant part sees method in fact The part executing example illustrates.Device embodiment described above is only schematically, wherein said as separating component The unit illustrated can be or may not be physically separate, and the parts shown as unit can be or can also It not physical location, i.e. may be located at a place, or can also be distributed on multiple NE.Can be according to reality Need to select some or all of module therein to realize the purpose of disclosure scheme.Those of ordinary skill in the art are not paying In the case of going out creative work, i.e. it is appreciated that and implements.
Accordingly, the disclosure also provides for a kind of information display device, including: processor;Can perform for storing processor The memorizer of instruction;Wherein, described processor is configured to:
Accordingly, the disclosure also provides for a kind of terminal, and described terminal includes memorizer, and one or more than one Program, one of them or more than one program is stored in memorizer, and be configured to by one or more than one Reason device performs one or more than one program and comprises the instruction for carrying out following operation:
Figure 13 is the block diagram according to a kind of device 1300 for copyright information detection shown in an exemplary embodiment.Example As, device 1300 can be mobile phone, computer, digital broadcast terminal, messaging devices, game console, and flat board sets Standby, armarium, body-building equipment, personal digital assistant etc..
With reference to Figure 13, device 1300 can include following one or more assembly: processes assembly 1302, memorizer 1304, Power supply module 1306, multimedia groupware 1308, audio-frequency assembly 1310, the interface 1312 of input/output (I/O), sensor cluster 1314, and communications component 1316.
Process assembly 1302 and generally control the integrated operation of device 1300, such as with display, call, data communication, The operation that camera operation and record operation are associated.Process assembly 1302 and can include that one or more processor 1320 performs Instruction, to complete all or part of step of above-mentioned method.Additionally, process assembly 1302 can include one or more mould Block, it is simple to process between assembly 1302 and other assemblies is mutual.Such as, process assembly 1302 and can include multi-media module, With facilitate multimedia groupware 1308 and process between assembly 1302 mutual.
Memorizer 1304 is configured to store various types of data to support the operation at device 1300.These data Example include on device 1300 operation any application program or the instruction of method, contact data, telephone book data, Message, picture, video etc..Memorizer 1304 can by any kind of volatibility or non-volatile memory device or they Combination realizes, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), erasable can Program read-only memory (EPROM), programmable read only memory (PROM), read only memory (ROM), magnetic memory, flash memory Reservoir, disk or CD.
The various assemblies that power supply module 1306 is device 1300 provide electric power.Power supply module 1306 can include power management System, one or more power supplys, and other generate, manage and distribute, with for device 1300, the assembly that electric power is associated.
The screen of one output interface of offer that multimedia groupware 1308 is included between described device 1300 and user.? In some embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, Screen may be implemented as touch screen, to receive the input signal from user.Touch panel includes that one or more touch passes Sensor is with the gesture on sensing touch, slip and touch panel.Described touch sensor can not only sense touch or slide dynamic The border made, but also detect the persistent period relevant to described touch or slide and pressure.In certain embodiments, many Media component 1308 includes a front-facing camera and/or post-positioned pick-up head.When device 1300 is in operator scheme, such as shooting mould When formula or video mode, front-facing camera and/or post-positioned pick-up head can receive the multi-medium data of outside.Each preposition shooting Head and post-positioned pick-up head can be a fixing optical lens system or have focal length and optical zoom ability.
Audio-frequency assembly 1310 is configured to output and/or input audio signal.Such as, audio-frequency assembly 1310 includes a wheat Gram wind (MIC), when device 1300 is in operator scheme, during such as call model, logging mode and speech recognition mode, mike quilt It is configured to receive external audio signal.The audio signal received can be further stored at memorizer 1304 or via communication Assembly 1316 sends.In certain embodiments, audio-frequency assembly 1310 also includes a speaker, is used for exporting audio signal.
I/O interface 1312 provides interface, above-mentioned peripheral interface module for processing between assembly 1302 and peripheral interface module Can be keyboard, put striking wheel, button etc..These buttons may include but be not limited to: home button, volume button, start button and Locking press button.
Sensor cluster 1314 includes one or more sensor, for providing the state of various aspects to comment for device 1300 Estimate.Such as, what sensor cluster 1314 can detect device 1300 opens/closed mode, the relative localization of assembly, such as institute Stating display and keypad that assembly is device 1300, sensor cluster 1314 can also detect device 1300 or device 1,300 1 The position change of individual assembly, the presence or absence that user contacts with device 1300, device 1300 orientation or acceleration/deceleration and dress Put the variations in temperature of 1300.Sensor cluster 1314 can include proximity transducer, is configured to do not having any physics The existence of object near detection during contact.Sensor cluster 1314 can also include optical sensor, as CMOS or ccd image sense Device, for using in imaging applications.In certain embodiments, this sensor cluster 1314 can also include acceleration sensing Device, gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communications component 1316 is configured to facilitate the communication of wired or wireless mode between device 1300 and other equipment.Dress Put 1300 and can access wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.Exemplary at one In embodiment, broadcast singal or broadcast that communications component 1316 receives from external broadcasting management system via broadcast channel are relevant Information.In one exemplary embodiment, described communications component 1316 also includes near-field communication (NFC) module, to promote short distance Communication.Such as, can be based on RF identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 1300 can be by one or more application specific integrated circuits (ASIC), numeral Signal processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components realize, be used for performing said method.
In the exemplary embodiment, a kind of non-transitory computer-readable recording medium including instruction, example are additionally provided As included the memorizer 1304 of instruction, above-mentioned instruction can have been performed said method by the processor 1320 of device 1300.Example If, described non-transitory computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, soft Dish and optical data storage devices etc..
Those skilled in the art, after considering description and putting into practice disclosure disclosed herein, will readily occur to its of the disclosure Its embodiment.The application is intended to any modification, purposes or the adaptations of the disclosure, these modification, purposes or Person's adaptations is followed the general principle of the disclosure and includes the undocumented common knowledge in the art of the disclosure Or conventional techniques means.Description and embodiments is considered only as exemplary, and the true scope of the disclosure and spirit are by following Claim is pointed out.
It should be appreciated that the disclosure is not limited to precision architecture described above and illustrated in the accompanying drawings, and And various modifications and changes can carried out without departing from the scope.The scope of the present disclosure is only limited by appended claim.

Claims (15)

1. a copyright information detection method, it is characterised in that including:
When receiving file destination and the copyright to described file destination requires, obtain the identity mark of described file destination Know, from the content file of described file destination, obtain identification information;
Determining whether described identity is consistent with described identification information, if not corresponding, refusing described copyright requirement.
Copyright information detection method the most according to claim 1, it is characterised in that in described identity and described identity In the case of identification information is consistent, also include:
Obtain the digital signature of content file in the file destination being associated with described identity;
Determine whether described identification information is associated with described digital signature, if unconnected, refuse described copyright requirement.
Copyright information detection method the most according to claim 1, it is characterised in that the file row of described identification information Epi-position, in listing file, in the case of described identity is consistent with described identification information, also includes:
Obtain the digital signature of listing file in the file destination being associated with described identity;
Determine whether described listed files is associated with described digital signature, if unconnected, refuse described copyright requirement.
Copyright information detection method the most according to claim 1, it is characterised in that in the identity obtaining described file destination Before mark, also include:
Determine in described file destination and whether there is copyright information;
If described file destination exists copyright information, obtain the identity of described file destination;
If described file destination does not exist copyright information, generate identity sum according to the source-information of described file destination Word is signed;
The digital signature generated is associated storage with the identity of generation;
The identity of described generation is embedded in the content file of described file destination to form identification information.
Copyright information detection method the most according to claim 4, it is characterised in that described identification information includes described The digital watermarking of identity.
Copyright information detection method the most according to claim 4, it is characterised in that also include:
Encryption information association storage by the identity of described generation with described file destination;
When receiving the acquisition request that described file destination is added confidential information, look into according to the identity of described file destination Inquiry adds confidential information, adds confidential information transmission to sending the described terminal obtaining request by inquire.
Copyright information detection method the most according to claim 6, it is characterised in that the described identity by described generation It is associated storage includes with the confidential information that adds of described file destination:
Generate corresponding PKI and private key, by described private key, described file destination is encrypted;
The identity of described generation is associated storage with described PKI;
After receiving the request of the purchase to described file destination, by the transmission of described PKI to sending the described end buying request End.
8. a copyright information detection device, it is characterised in that including:
First acquiring unit, when receiving file destination and the copyright to described file destination requires, obtains described target The identity of file, obtains identification information from the content file of described file destination;
First determines unit, determines whether described identity is consistent with described identification information, if not corresponding, refusal is described Copyright requirement.
Copyright information the most according to claim 8 detection device, it is characterised in that also include:
Second acquisition unit, in the case of described identity is consistent with described identification information, obtains and described identity The digital signature of content file in the file destination that mark is associated;
Second determines unit, determines whether described identification information is associated with described digital signature, if unconnected, refusal Described copyright requirement.
Copyright information the most according to claim 8 detection device, it is characterised in that also include:
3rd acquiring unit, in the case of described identity is consistent with described identification information, obtains and described identity The digital signature of listing file in the file destination that mark is associated,
Wherein, the listed files of described identification information is positioned in listing file;
3rd determines unit, determines whether described listed files is associated with described digital signature, if unconnected, refusal is described Copyright requirement.
11. copyright information according to claim 8 detection devices, it is characterised in that also include:
4th determines unit, determines in described file destination whether there is copyright information,
Wherein, in the case of described first acquiring unit exists copyright information in described file destination, obtain described target literary composition The identity of part;
Signal generating unit, in the case of there is not copyright information, believes according to the source of described file destination in described file destination Breath generates identity and digital signature;
First memory element, associates storage by the digital signature generated with the identity of generation;
Embedded unit, embeds the identity of described generation in the content file of described file destination to form identity letter Breath.
12. copyright information according to claim 11 detection devices, it is characterised in that described identification information includes institute State the digital watermarking of identity.
13. copyright information according to claim 11 detection devices, it is characterised in that also include:
Second memory element, by the encryption information association storage of the identity of described generation with described file destination;
Query unit, when receiving the acquisition request that described file destination adds confidential information, according to described file destination Identity inquiry adds confidential information, adds confidential information transmission to sending the described terminal obtaining request by inquire.
14. copyright information according to claim 13 detection devices, it is characterised in that described second memory element includes:
Encryption sub-unit operable, generates corresponding PKI and private key, is encrypted described file destination by described private key;
Association storing sub-units, associates storage by the identity of described generation with described PKI;
Transmission subelement, after receiving the request of the purchase to described file destination, purchases the transmission of described PKI described in sending Buy the terminal of request.
15. 1 kinds of electronic equipments, it is characterised in that including:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
When receiving file destination and the copyright to described file destination requires, obtain the identity mark of described file destination Know, from the content file of described file destination, obtain identification information;
Determining whether described identity is consistent with described identification information, if not corresponding, refusing described copyright requirement.
CN201610405542.6A 2016-06-08 2016-06-08 Copyright information detection method, copyright information detection device and electronic equipment Pending CN106096335A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610405542.6A CN106096335A (en) 2016-06-08 2016-06-08 Copyright information detection method, copyright information detection device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610405542.6A CN106096335A (en) 2016-06-08 2016-06-08 Copyright information detection method, copyright information detection device and electronic equipment

Publications (1)

Publication Number Publication Date
CN106096335A true CN106096335A (en) 2016-11-09

Family

ID=57227701

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610405542.6A Pending CN106096335A (en) 2016-06-08 2016-06-08 Copyright information detection method, copyright information detection device and electronic equipment

Country Status (1)

Country Link
CN (1) CN106096335A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109218014A (en) * 2017-06-30 2019-01-15 北京国双科技有限公司 The processing method of video/audio, apparatus and system
CN109614776A (en) * 2018-12-27 2019-04-12 北京三未信安科技发展有限公司 A kind of data source tracing method and system based on digital watermark technology
CN110809763A (en) * 2019-05-20 2020-02-18 阿里巴巴集团控股有限公司 Identifying copyrighted material using time-stamped embedded copyright information
CN111079155A (en) * 2019-11-13 2020-04-28 北京海益同展信息科技有限公司 Data processing method and device, electronic equipment and computer storage medium
CN111209540A (en) * 2020-01-03 2020-05-29 腾讯科技(深圳)有限公司 Information verification method, device and storage medium
CN112115422A (en) * 2020-08-10 2020-12-22 北京华雨天成文化传播有限公司 Method, device and equipment for detecting copyright file modification
CN113255008A (en) * 2021-07-01 2021-08-13 支付宝(杭州)信息技术有限公司 Method and system for outputting multimedia file

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1558595A (en) * 2004-01-18 2004-12-29 哈尔滨工业大学 Method for making and verifying digital signature and digital watermark bar code
CN1558303A (en) * 2004-02-11 2004-12-29 北京邮电大学 Digital watermarking infrastructure
CN101398870A (en) * 2007-09-24 2009-04-01 广州市百成科技有限公司 Electronic stamp system based on password layered system
CN101729256A (en) * 2008-10-24 2010-06-09 深圳宝嘉电子设备有限公司 Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark
CN102567657A (en) * 2010-12-15 2012-07-11 黄铁军 Digital work ownership authentication system and digital work ownership authentication method
CN102594563A (en) * 2012-02-20 2012-07-18 南京中通电气有限公司 Source authentication method for secure multicast
CN103123673A (en) * 2013-03-12 2013-05-29 山东省计算中心 Effective protective method of digital media copyright in web environment
CN103902925A (en) * 2012-12-31 2014-07-02 中国银联股份有限公司 Method and equipment for digital document signature
CN104636659A (en) * 2014-12-31 2015-05-20 株洲南车时代电气股份有限公司 Register data generation method and device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1558595A (en) * 2004-01-18 2004-12-29 哈尔滨工业大学 Method for making and verifying digital signature and digital watermark bar code
CN1558303A (en) * 2004-02-11 2004-12-29 北京邮电大学 Digital watermarking infrastructure
CN101398870A (en) * 2007-09-24 2009-04-01 广州市百成科技有限公司 Electronic stamp system based on password layered system
CN101729256A (en) * 2008-10-24 2010-06-09 深圳宝嘉电子设备有限公司 Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark
CN102567657A (en) * 2010-12-15 2012-07-11 黄铁军 Digital work ownership authentication system and digital work ownership authentication method
CN102594563A (en) * 2012-02-20 2012-07-18 南京中通电气有限公司 Source authentication method for secure multicast
CN103902925A (en) * 2012-12-31 2014-07-02 中国银联股份有限公司 Method and equipment for digital document signature
CN103123673A (en) * 2013-03-12 2013-05-29 山东省计算中心 Effective protective method of digital media copyright in web environment
CN104636659A (en) * 2014-12-31 2015-05-20 株洲南车时代电气股份有限公司 Register data generation method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
肖芸: ""DRM技术在数字出版中的应用研究"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109218014A (en) * 2017-06-30 2019-01-15 北京国双科技有限公司 The processing method of video/audio, apparatus and system
CN109614776A (en) * 2018-12-27 2019-04-12 北京三未信安科技发展有限公司 A kind of data source tracing method and system based on digital watermark technology
CN109614776B (en) * 2018-12-27 2020-09-22 北京三未信安科技发展有限公司 Data tracing method and system based on digital watermarking technology
CN110809763A (en) * 2019-05-20 2020-02-18 阿里巴巴集团控股有限公司 Identifying copyrighted material using time-stamped embedded copyright information
CN111079155A (en) * 2019-11-13 2020-04-28 北京海益同展信息科技有限公司 Data processing method and device, electronic equipment and computer storage medium
CN111209540A (en) * 2020-01-03 2020-05-29 腾讯科技(深圳)有限公司 Information verification method, device and storage medium
CN112115422A (en) * 2020-08-10 2020-12-22 北京华雨天成文化传播有限公司 Method, device and equipment for detecting copyright file modification
CN113255008A (en) * 2021-07-01 2021-08-13 支付宝(杭州)信息技术有限公司 Method and system for outputting multimedia file

Similar Documents

Publication Publication Date Title
CN106096335A (en) Copyright information detection method, copyright information detection device and electronic equipment
CN104391870B (en) Logistics information acquisition methods and device
US8572375B2 (en) Device pairing based on graphically encoded data
JP6814147B2 (en) Terminals, methods, non-volatile storage media
CN103916233A (en) Information encryption method and device
CN105307137A (en) Short message reading method and device
CN104955031A (en) Information transmission method and device
CN105243318A (en) User equipment control right determining method and apparatus and terminal device
CN104125055A (en) Encryption and decryption method and electronic device
CN103914541B (en) The method and device of information search
CN104993936A (en) Anti-counterfeiting validation method and device for filter element of water purifier and electronic equipment
KR101688182B1 (en) Anti-counterfeiting verification method, device and system, program and recording medium
CN104639972B (en) The method, apparatus and equipment of a kind of sharing contents
CN106211159A (en) Personal identification method based on bluetooth and device
CN104093119B (en) unlocking method and device
CN104780045B (en) The management method and device of smart machine
CN105049213A (en) File signature method and device
CN105468767A (en) Method and device for acquiring calling card information
CN105791309A (en) Method, device and system for executing business processing
CN106372517A (en) File encryption method, file decryption method, file encryption device and equipment
KR20140094878A (en) User termial and method for image processing by using recognition of user in the user terminal
CN105450662A (en) Encryption method and device
CN103914520A (en) Data query method, terminal equipment and server
CN106534876A (en) Target user determining method and target user determining device
CN106060098A (en) Processing method, processing device and processing system for verification codes

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20161109