CN109558703A - A kind of copyright managing method, server and user terminal - Google Patents
A kind of copyright managing method, server and user terminal Download PDFInfo
- Publication number
- CN109558703A CN109558703A CN201811418981.6A CN201811418981A CN109558703A CN 109558703 A CN109558703 A CN 109558703A CN 201811418981 A CN201811418981 A CN 201811418981A CN 109558703 A CN109558703 A CN 109558703A
- Authority
- CN
- China
- Prior art keywords
- information
- credential
- identity
- credential information
- check
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 54
- 238000012795 verification Methods 0.000 claims abstract description 83
- 238000013475 authorization Methods 0.000 abstract description 4
- 238000012545 processing Methods 0.000 description 16
- 238000012937 correction Methods 0.000 description 7
- 238000007726 management method Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
Abstract
This application involves a kind of copyright managing methods, which comprises obtains the first credential information and the first identity information;First credential information and the first identity information are subjected to binding and form check information;Verification information is obtained, includes the second credential information and the second identity information in the verification information;The check information and verification information are subjected to matching verifying, when the first credential information and the matching of the second credential information are consistent, and the first identity information and the second identity information match consistent, send encrypted information needed.The application also proposed a kind of server and user terminal.The embodiment of the present application guarantees the safety of content by the verifying of credential information between server and user terminal, and a kind of downloading of content and the management function of copyright are realized for member user.To provide good experience between publisher and user, under authorization conditions, content of copyright is downloaded and used.
Description
Technical field
This application involves copyright protection field more particularly to a kind of copyright managing methods, server and user terminal.
Background technique
With the development of internet, various information are propagated in a network.People can get certainly in a network daily
Oneself required relevant information.But wherein the copyrighted digitized content of the tool such as music, books is faced with copyright guarantor in distribution
The problem of shield and use scope limitation.Current, digitized content be all in a manner of server distribution etc. with guarantee copyright
It can just be further used after to payment, and individually content is distributed, it is easy to is illegally copied and propagated.
Summary of the invention
In order to solve the above-mentioned technical problem or it at least is partially solved above-mentioned technical problem, this application provides a kind of versions
Weigh management method, server and user terminal.
In a first aspect, this application provides a kind of copyright managing methods, which comprises
Obtain the first credential information and the first identity information;
First credential information and the first identity information are subjected to binding and form check information;
Verification information is obtained, includes the second credential information and the second identity information in the verification information;
The check information and verification information are subjected to matching verifying, when the first credential information and the second credential information match
Unanimously, when and the first identity information and the second identity information match consistent, encrypted information needed is sent.
Preferably, the method also includes:
Check information library is established according to the check information;
After obtaining verification information, by the second credential information for including in the verification information and the check information library Zhong Bao
The first credential information contained is matched;
After second credential information is matched to identical first credential information in check information library, then to described
First identity information bound in two identity informations the first credential information identical with the second credential information is matched;
When the first identity information and consistent the second identity information matching, encrypted information needed is sent.
Preferably, first credential information and the second credential information are phone card number, storage card number or telephone number.
Preferably, the information needed is encrypted using asymmetric encryption mode.
Second aspect, this application provides a kind of copy-right protection methods, which comprises
It obtains and sends the second credential information and the second identity information;
The required content of encryption is received, and the required content of the encryption is decrypted.
Preferably, the method also includes: send the first credential information and the first identity information.
Preferably, first credential information and the second credential information are phone card number, storage card number or telephone number.
Preferably, the information needed of the encryption is decrypted using asymmetric encryption mode.
The third aspect, this application provides a kind of server, the server includes processor, is configured with processor
Executable operational order, to execute method described in the application first aspect.
Fourth aspect, this application provides a kind of user terminal, the user terminal includes processor, is configured with place
The executable operational order of device is managed, to execute method described in the application second aspect.
Above-mentioned technical proposal provided by the embodiments of the present application has the advantages that compared with prior art
This method provided by the embodiments of the present application is protected by the verifying of the credential information between server and user terminal
The safety of content is demonstrate,proved, a kind of downloading of content and the management function of copyright are realized for member user.So as to publisher and use
Good experience is provided between family, under authorization conditions, downloads and use content of copyright.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention
Example, and be used to explain the principle of the present invention together with specification.
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, for those of ordinary skill in the art
Speech, without any creative labor, is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of flow chart for copyright managing method that the embodiment of the present application 1 provides;
A kind of flow chart for copyright managing method that the position Fig. 2 the embodiment of the present application 2 provides.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application
In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the application, instead of all the embodiments.Based on the embodiment in the application, ordinary skill people
Member's every other embodiment obtained without making creative work, shall fall in the protection scope of this application.
Embodiment 1
Fig. 1 is a kind of flow chart of copyright managing method provided by the embodiments of the present application, this method comprises:
S101, the first credential information and the first identity information are obtained;
S102, by first credential information and the first identity information carry out binding form check information;
S103, verification information is obtained, includes the second credential information and the second identity information in the verification information;
S104, the check information and verification information are subjected to matching verifying, when the first credential information and the second voucher are believed
Breath matching is consistent, and when the first identity information and consistent the second identity information matching, sends encrypted information needed.
Specifically, the method that the present embodiment is proposed, suitable for server, which can be internet backstage,
It can be the service routine operated in any equipment, the present embodiment does not do particular determination.Method detailed process is as follows:
Credential information and identity information are obtained first, and the credential information and identity information are to send to obtain by user terminal
's.Credential information can be phonecard number, storage card number or telephone number.Identity information may include the name of user, property
Not, the relevant informations such as identification card number.Such as credential information is telephone number 13012345678, identity information is Zhang San.Then will
The credential information and identity information carry out binding to formed check information store it is spare.Then verification information is received.It should
Verification information sends acquisition again by user terminal.Credential information is equally contained in the verification information and identity is believed
Breath, but credential information included in the verification information and identity information might not be with the check informations that store in server
In credential information it is identical with identity information.Therefore, it after obtaining verification information, needs to included in the verification information
Credential information and identity information and server in credential information in the check information that stores carry out check and correction with identity information and test
Card.Specific check and correction verification process is as follows:
The credential information in verification information is matched with the credential information in check information first, or is believed with voucher
Breath be telephone number 13012345678, identity information be Zhang San for, if the credential information in verification information is not phone number
Code 13012345678, it means that verification information transmitted by user terminal is illegal either mistake.It can do
Warning processing or without any processing out.If the credential information in verification information is equally telephone number 13012345678,
So just then credential information in the identity information and check information in verification information is tied up by telephone number 13012345678
Fixed identity information is matched, if the identity information in verification information is not Zhang San, can similarly make warning
Processing is without any processing.It, can be by the use of encryption if the identity information in verification information is equally Zhang San
During information needed for family is sent to the user terminal.Information needed for the user can be used asymmetric encryption mode and encrypt.
It is worth noting that, the check information stored in server does not only have one group, it is likely that have much even
It is thousands of groups.Therefore, it after receiving verification information, needs to be matched to and verify first in thousands of groups of check informations
Then the identical one group of check information of credential information in information just can be carried out subsequent identity information matching.In this process,
The thousands of groups of check informations can be formed check information libraries will be in verification information then after getting verification information
Credential information matched with the credential information in check information library in each group of check information after find identical voucher letter
Breath.
Embodiment 2
Copyright managing method described in corresponding embodiment 1, the present embodiment propose a kind of server, and the server includes
Processor is configured with the executable operational order of processor, to perform the following operations:
Obtain the first credential information and the first identity information;
First credential information and the first identity information are subjected to binding and form check information;
Verification information is obtained, includes the second credential information and the second identity information in the verification information;
The check information and verification information are subjected to matching verifying, when the first credential information and the second credential information match
Unanimously, when and the first identity information and the second identity information match consistent, encrypted information needed is sent.
Specifically, the server that the present embodiment is proposed can be internet backstage, it is also possible to operate in any equipment
On service routine, the present embodiment do not do particular determination.Specific copyright management process is as follows:
Credential information and identity information are obtained first, and the credential information and identity information are to send to obtain by user terminal
's.Credential information can be phonecard number, storage card number or telephone number.Identity information may include the name of user, property
Not, the relevant informations such as identification card number.Such as credential information is telephone number 13012345678, identity information is Zhang San.Then will
The credential information and identity information carry out binding to formed check information store it is spare.Then verification information is received.It should
Verification information sends acquisition again by user terminal.Credential information is equally contained in the verification information and identity is believed
Breath, but credential information included in the verification information and identity information might not be with the check informations that store in server
In credential information it is identical with identity information.Therefore, it after obtaining verification information, needs to included in the verification information
Credential information and identity information and server in credential information in the check information that stores carry out check and correction with identity information and test
Card.Specific check and correction verification process is as follows:
The credential information in verification information is matched with the credential information in check information first, or is believed with voucher
Breath be telephone number 13012345678, identity information be Zhang San for, if the credential information in verification information is not phone number
Code 13012345678, it means that verification information transmitted by user terminal is illegal either mistake.It can do
Warning processing or without any processing out.If the credential information in verification information is equally telephone number 13012345678,
So just then credential information in the identity information and check information in verification information is tied up by telephone number 13012345678
Fixed identity information is matched, if the identity information in verification information is not Zhang San, can similarly make warning
Processing is without any processing.It, can be by the use of encryption if the identity information in verification information is equally Zhang San
During information needed for family is sent to the user terminal.Information needed for the user can be used asymmetric encryption mode and encrypt.
It is worth noting that, the check information stored in server does not only have one group, it is likely that have much even
It is thousands of groups.Therefore, it after receiving verification information, needs to be matched to and verify first in thousands of groups of check informations
Then the identical one group of check information of credential information in information just can be carried out subsequent identity information matching.In this process,
The thousands of groups of check informations can be formed check information libraries will be in verification information then after getting verification information
Credential information matched with the credential information in check information library in each group of check information after find identical voucher letter
Breath.
Embodiment 3
Fig. 2 is a kind of flow chart of copyright managing method provided by the embodiments of the present application, this method comprises:
S201, acquisition simultaneously send the second credential information and the second identity information;
S202, the required content for receiving encryption, and the required content of the encryption is decrypted.
Specifically, the method that the present embodiment is proposed can be applicable in user terminal, the user terminal can for mobile phone or
The terminal devices such as plate, can loading procedure software in the terminal device.The program software can read the electricity of user terminal
Card number, storage card number or telephone number are talked about as credential information, and obtains the identity information of user's input, then believes the voucher
Breath and identity information are sent in server.After server obtains the credential information and identity information, to institute in the verification information
The credential information in check information stored in the credential information and identity information and server for including carries out school with identity information
To verifying.Specific check and correction verification process is as follows:
The credential information in verification information is matched with the credential information in check information first, or is believed with voucher
Breath be telephone number 13012345678, identity information be Zhang San for, if the credential information in verification information is not phone number
Code 13012345678, it means that verification information transmitted by user terminal is illegal either mistake.It can do
Warning processing or without any processing out.If the credential information in verification information is equally telephone number 13012345678,
So just then credential information in the identity information and check information in verification information is tied up by telephone number 13012345678
Fixed identity information is matched, if the identity information in verification information is not Zhang San, can similarly make warning
Processing is without any processing.It, can be by the use of encryption if the identity information in verification information is equally Zhang San
During information needed for family is sent to the user terminal.Information needed for the user can be used asymmetric encryption mode and encrypt.
It is worth noting that, user terminal to server send verification information before, server will before by with
Other credential informations and identity information transmitted by the terminal of family form check information and are stored after being bound.Therefore,
The check information stored in server does not only have one group, it is likely that has even thousands of groups very much.Therefore, work as receipts
To after verification information, need to be matched to identical with credential information in verification information one first in thousands of groups of check informations
Then group check information just can be carried out subsequent identity information matching.It in this process, can be by the thousands of groups of verifications
Information form check information library, then after getting verification information, by verification information credential information and check information library
In credential information in each group of check information matched after find identical credential information.
User terminal adds this after receiving the required content of encryption of server transmission, then using asymmetric encryption mode
Close required content is presented to the user after being decrypted.
In method described in the present embodiment, in user terminal and server interaction matching, the authorization downloading of content is realized
Later, even if user terminal cannot network, can also be believed by reading phone card number, storage card number or telephone number as voucher
Breath, is decrypted use to the content being locally stored.Encrypted content, will the case where leaving user terminal and corresponding phonecard
It cannot use, to effectively control the illegal copies of content copyright.
Embodiment 4
Copyright managing method described in corresponding embodiment 3 present embodiments provides a kind of user terminal;The user terminal
Including processor, it is configured with the executable operational order of processor, to perform the following operations instruction:
It obtains and sends the second credential information and the second identity information;
The required content of encryption is received, and the required content of the encryption is decrypted.
Specifically, the user terminal that the present embodiment is proposed can be the terminal devices such as mobile phone or plate, set in the terminal
It can loading procedure software in standby.The program software can read the phone card number, storage card number or telephone number of user terminal
As credential information, and the identity information of user's input is obtained, the credential information and identity information are then sent to server
In.After server obtains the credential information and identity information, to credential information included in the verification information and identity information
With in the check information that is stored in server credential information and identity information carry out check and correction verifying.Specific check and correction verification process
It is as follows:
The credential information in verification information is matched with the credential information in check information first, or is believed with voucher
Breath be telephone number 13012345678, identity information be Zhang San for, if the credential information in verification information is not phone number
Code 13012345678, it means that verification information transmitted by user terminal is illegal either mistake.It can do
Warning processing or without any processing out.If the credential information in verification information is equally telephone number 13012345678,
So just then credential information in the identity information and check information in verification information is tied up by telephone number 13012345678
Fixed identity information is matched, if the identity information in verification information is not Zhang San, can similarly make warning
Processing is without any processing.It, can be by the use of encryption if the identity information in verification information is equally Zhang San
During information needed for family is sent to the user terminal.Information needed for the user can be used asymmetric encryption mode and encrypt.
It is worth noting that, user terminal to server send verification information before, server will before by with
Other credential informations and identity information transmitted by the terminal of family form check information and are stored after being bound.Therefore,
The check information stored in server does not only have one group, it is likely that has even thousands of groups very much.Therefore, work as receipts
To after verification information, need to be matched to identical with credential information in verification information one first in thousands of groups of check informations
Then group check information just can be carried out subsequent identity information matching.It in this process, can be by the thousands of groups of verifications
Information form check information library, then after getting verification information, by verification information credential information and check information library
In credential information in each group of check information matched after find identical credential information.
User terminal adds this after receiving the required content of encryption of server transmission, then using asymmetric encryption mode
Close required content is presented to the user after being decrypted.
After user terminal and server interaction matching, the authorization downloading for realizing content, even if user terminal cannot join
Net can also carry out the content being locally stored by reading phone card number, storage card number or telephone number as credential information
Decryption uses.Encrypted content is the case where leaving user terminal and corresponding phonecard, it is impossible to use, to effectively control
The illegal copies of content copyright.
It should be noted that, in this document, the relational terms of such as " first " and " second " or the like are used merely to one
A entity or operation with another entity or operate distinguish, without necessarily requiring or implying these entities or operation it
Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant are intended to
Cover non-exclusive inclusion, so that the process, method, article or equipment for including a series of elements not only includes those
Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or setting
Standby intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
There is also other identical elements in the process, method, article or apparatus that includes the element.
The above is only a specific embodiment of the invention, is made skilled artisans appreciate that or realizing this hair
It is bright.Various modifications to these embodiments will be apparent to one skilled in the art, as defined herein
General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, of the invention
It is not intended to be limited to the embodiments shown herein, and is to fit to and applied principle and features of novelty phase one herein
The widest scope of cause.
Claims (10)
1. a kind of copyright managing method, which is characterized in that the described method includes:
Obtain the first credential information and the first identity information;
First credential information and the first identity information are subjected to binding and form check information;
Verification information is obtained, includes the second credential information and the second identity information in the verification information;
The check information and verification information are subjected to matching verifying, when the first credential information and the second credential information matching one
It causes, and when the first identity information and consistent the second identity information matching, sends encrypted information needed.
2. the method according to claim 1, wherein the method also includes:
Check information library is established according to the check information;
After obtaining verification information, will include in the second credential information for including in the verification information and the check information library
First credential information is matched;
After second credential information is matched to identical first credential information in check information library, then to second body
First identity information bound in part information the first credential information identical with the second credential information is matched;
When the first identity information and consistent the second identity information matching, encrypted information needed is sent.
3. the method according to claim 1, wherein first credential information and the second credential information are phone
Card number, storage card number or telephone number.
4. the method according to claim 1, wherein the information needed is added using asymmetric encryption mode
It is close.
5. a kind of copyright managing method, which is characterized in that the described method includes:
It obtains and sends the second credential information and the second identity information;
The required content of encryption is received, and the required content of the encryption is decrypted.
6. according to the method described in claim 5, it is characterized in that, the method also includes: send the first credential information and the
One identity information.
7. according to the method described in claim 6, it is characterized in that, first credential information and the second credential information are phone
Card number, storage card number or telephone number.
8. according to the method described in claim 5, it is characterized in that, the information needed of the encryption uses asymmetric encryption mode
It is decrypted.
9. a kind of server, which is characterized in that the server includes processor, is configured with the executable operation of processor
Instruction requires 1 to 4 described in any item methods with perform claim.
10. a kind of user terminal, which is characterized in that the user terminal includes processor, and it is executable to be configured with processor
Operational order, with perform claim require 5 to 8 described in any item methods.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811418981.6A CN109558703A (en) | 2018-11-26 | 2018-11-26 | A kind of copyright managing method, server and user terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811418981.6A CN109558703A (en) | 2018-11-26 | 2018-11-26 | A kind of copyright managing method, server and user terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109558703A true CN109558703A (en) | 2019-04-02 |
Family
ID=65867583
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811418981.6A Pending CN109558703A (en) | 2018-11-26 | 2018-11-26 | A kind of copyright managing method, server and user terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109558703A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111556012A (en) * | 2020-03-24 | 2020-08-18 | 福建星网视易信息系统有限公司 | Pirate detection and remote control method, device, equipment and medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101419653A (en) * | 2008-12-08 | 2009-04-29 | 上海全景数字技术有限公司 | File copyright management method for distributed system |
CN101282326B (en) * | 2007-04-04 | 2011-07-20 | 朱明程 | Method, system and hand-hold terminal for management of digital copyright with binding terminal |
CN104361266A (en) * | 2014-11-25 | 2015-02-18 | 上海精灵天下数字技术有限公司 | Copyright protection method and system of digital contents |
CN105933296A (en) * | 2016-04-12 | 2016-09-07 | 北京奇虎科技有限公司 | Copyright registration method and system |
-
2018
- 2018-11-26 CN CN201811418981.6A patent/CN109558703A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101282326B (en) * | 2007-04-04 | 2011-07-20 | 朱明程 | Method, system and hand-hold terminal for management of digital copyright with binding terminal |
CN101419653A (en) * | 2008-12-08 | 2009-04-29 | 上海全景数字技术有限公司 | File copyright management method for distributed system |
CN104361266A (en) * | 2014-11-25 | 2015-02-18 | 上海精灵天下数字技术有限公司 | Copyright protection method and system of digital contents |
CN105933296A (en) * | 2016-04-12 | 2016-09-07 | 北京奇虎科技有限公司 | Copyright registration method and system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111556012A (en) * | 2020-03-24 | 2020-08-18 | 福建星网视易信息系统有限公司 | Pirate detection and remote control method, device, equipment and medium |
CN111556012B (en) * | 2020-03-24 | 2023-08-29 | 福建星网视易信息系统有限公司 | Piracy detection and remote control method, device, equipment and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DK1479187T4 (en) | MANAGEMENT OF ACCESS LEVELS IN PHONES USING CERTIFICATES | |
CN101305545B (en) | Method and apparatus for managing digital rights of secure removable media | |
CN101689237B (en) | Activation system architecture | |
US20040039932A1 (en) | Apparatus, system and method for securing digital documents in a digital appliance | |
CN101206696A (en) | Apparatus, method and system for protecting personal information | |
CN100472550C (en) | Method for generating licence and method and apparatus for providing contents using the same | |
US8353055B2 (en) | Method and apparatus for processing rights object | |
KR19990022620A (en) | Access control system and method for data storage media | |
CN108734018B (en) | Authentication method, device, system and computer readable storage medium | |
FR2854303A1 (en) | METHOD FOR SECURING A MOBILE TERMINAL AND METHOD APPLICATIONS, THE EXECUTION OF APPLICATIONS REQUIRING A HIGH SECURITY LEVEL | |
CN111164593A (en) | Registration authorization method and system | |
US9942047B2 (en) | Controlling application access to mobile device functions | |
CN103366304B (en) | A kind of usufructuary assignment method of virtual goods, device and equipment | |
CN110708162B (en) | Resource acquisition method and device, computer readable medium and electronic equipment | |
CN104361266A (en) | Copyright protection method and system of digital contents | |
CN108418833B (en) | Software management method, cloud server and terminal | |
CN103973646A (en) | Method, client device and system for storing services by aid of public cloud | |
CN101252432B (en) | Field managing server and system, digital authority managing method based on field | |
KR20130082948A (en) | Payment agency system, user terminal and market server | |
CN109818965B (en) | Personal identity verification device and method | |
CN103023915A (en) | Method and system for protecting copyrights of downloaded books for mobile terminal | |
CN109558703A (en) | A kind of copyright managing method, server and user terminal | |
CN105099680A (en) | Method of authenticating user identity according to digital certificate and device | |
CN104182660B (en) | For the customer equipment identification management method and system of digital copyright protecting | |
CN108268756A (en) | Copyright and transaction processing system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190402 |