CN109558703A - A kind of copyright managing method, server and user terminal - Google Patents

A kind of copyright managing method, server and user terminal Download PDF

Info

Publication number
CN109558703A
CN109558703A CN201811418981.6A CN201811418981A CN109558703A CN 109558703 A CN109558703 A CN 109558703A CN 201811418981 A CN201811418981 A CN 201811418981A CN 109558703 A CN109558703 A CN 109558703A
Authority
CN
China
Prior art keywords
information
credential
identity
credential information
check
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811418981.6A
Other languages
Chinese (zh)
Inventor
张光强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ziyou Technology (shenzhen) Co Ltd
Original Assignee
Ziyou Technology (shenzhen) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ziyou Technology (shenzhen) Co Ltd filed Critical Ziyou Technology (shenzhen) Co Ltd
Priority to CN201811418981.6A priority Critical patent/CN109558703A/en
Publication of CN109558703A publication Critical patent/CN109558703A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)

Abstract

This application involves a kind of copyright managing methods, which comprises obtains the first credential information and the first identity information;First credential information and the first identity information are subjected to binding and form check information;Verification information is obtained, includes the second credential information and the second identity information in the verification information;The check information and verification information are subjected to matching verifying, when the first credential information and the matching of the second credential information are consistent, and the first identity information and the second identity information match consistent, send encrypted information needed.The application also proposed a kind of server and user terminal.The embodiment of the present application guarantees the safety of content by the verifying of credential information between server and user terminal, and a kind of downloading of content and the management function of copyright are realized for member user.To provide good experience between publisher and user, under authorization conditions, content of copyright is downloaded and used.

Description

A kind of copyright managing method, server and user terminal
Technical field
This application involves copyright protection field more particularly to a kind of copyright managing methods, server and user terminal.
Background technique
With the development of internet, various information are propagated in a network.People can get certainly in a network daily Oneself required relevant information.But wherein the copyrighted digitized content of the tool such as music, books is faced with copyright guarantor in distribution The problem of shield and use scope limitation.Current, digitized content be all in a manner of server distribution etc. with guarantee copyright It can just be further used after to payment, and individually content is distributed, it is easy to is illegally copied and propagated.
Summary of the invention
In order to solve the above-mentioned technical problem or it at least is partially solved above-mentioned technical problem, this application provides a kind of versions Weigh management method, server and user terminal.
In a first aspect, this application provides a kind of copyright managing methods, which comprises
Obtain the first credential information and the first identity information;
First credential information and the first identity information are subjected to binding and form check information;
Verification information is obtained, includes the second credential information and the second identity information in the verification information;
The check information and verification information are subjected to matching verifying, when the first credential information and the second credential information match Unanimously, when and the first identity information and the second identity information match consistent, encrypted information needed is sent.
Preferably, the method also includes:
Check information library is established according to the check information;
After obtaining verification information, by the second credential information for including in the verification information and the check information library Zhong Bao The first credential information contained is matched;
After second credential information is matched to identical first credential information in check information library, then to described First identity information bound in two identity informations the first credential information identical with the second credential information is matched;
When the first identity information and consistent the second identity information matching, encrypted information needed is sent.
Preferably, first credential information and the second credential information are phone card number, storage card number or telephone number.
Preferably, the information needed is encrypted using asymmetric encryption mode.
Second aspect, this application provides a kind of copy-right protection methods, which comprises
It obtains and sends the second credential information and the second identity information;
The required content of encryption is received, and the required content of the encryption is decrypted.
Preferably, the method also includes: send the first credential information and the first identity information.
Preferably, first credential information and the second credential information are phone card number, storage card number or telephone number.
Preferably, the information needed of the encryption is decrypted using asymmetric encryption mode.
The third aspect, this application provides a kind of server, the server includes processor, is configured with processor Executable operational order, to execute method described in the application first aspect.
Fourth aspect, this application provides a kind of user terminal, the user terminal includes processor, is configured with place The executable operational order of device is managed, to execute method described in the application second aspect.
Above-mentioned technical proposal provided by the embodiments of the present application has the advantages that compared with prior art
This method provided by the embodiments of the present application is protected by the verifying of the credential information between server and user terminal The safety of content is demonstrate,proved, a kind of downloading of content and the management function of copyright are realized for member user.So as to publisher and use Good experience is provided between family, under authorization conditions, downloads and use content of copyright.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention Example, and be used to explain the principle of the present invention together with specification.
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, for those of ordinary skill in the art Speech, without any creative labor, is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of flow chart for copyright managing method that the embodiment of the present application 1 provides;
A kind of flow chart for copyright managing method that the position Fig. 2 the embodiment of the present application 2 provides.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the application, instead of all the embodiments.Based on the embodiment in the application, ordinary skill people Member's every other embodiment obtained without making creative work, shall fall in the protection scope of this application.
Embodiment 1
Fig. 1 is a kind of flow chart of copyright managing method provided by the embodiments of the present application, this method comprises:
S101, the first credential information and the first identity information are obtained;
S102, by first credential information and the first identity information carry out binding form check information;
S103, verification information is obtained, includes the second credential information and the second identity information in the verification information;
S104, the check information and verification information are subjected to matching verifying, when the first credential information and the second voucher are believed Breath matching is consistent, and when the first identity information and consistent the second identity information matching, sends encrypted information needed.
Specifically, the method that the present embodiment is proposed, suitable for server, which can be internet backstage, It can be the service routine operated in any equipment, the present embodiment does not do particular determination.Method detailed process is as follows:
Credential information and identity information are obtained first, and the credential information and identity information are to send to obtain by user terminal 's.Credential information can be phonecard number, storage card number or telephone number.Identity information may include the name of user, property Not, the relevant informations such as identification card number.Such as credential information is telephone number 13012345678, identity information is Zhang San.Then will The credential information and identity information carry out binding to formed check information store it is spare.Then verification information is received.It should Verification information sends acquisition again by user terminal.Credential information is equally contained in the verification information and identity is believed Breath, but credential information included in the verification information and identity information might not be with the check informations that store in server In credential information it is identical with identity information.Therefore, it after obtaining verification information, needs to included in the verification information Credential information and identity information and server in credential information in the check information that stores carry out check and correction with identity information and test Card.Specific check and correction verification process is as follows:
The credential information in verification information is matched with the credential information in check information first, or is believed with voucher Breath be telephone number 13012345678, identity information be Zhang San for, if the credential information in verification information is not phone number Code 13012345678, it means that verification information transmitted by user terminal is illegal either mistake.It can do Warning processing or without any processing out.If the credential information in verification information is equally telephone number 13012345678, So just then credential information in the identity information and check information in verification information is tied up by telephone number 13012345678 Fixed identity information is matched, if the identity information in verification information is not Zhang San, can similarly make warning Processing is without any processing.It, can be by the use of encryption if the identity information in verification information is equally Zhang San During information needed for family is sent to the user terminal.Information needed for the user can be used asymmetric encryption mode and encrypt.
It is worth noting that, the check information stored in server does not only have one group, it is likely that have much even It is thousands of groups.Therefore, it after receiving verification information, needs to be matched to and verify first in thousands of groups of check informations Then the identical one group of check information of credential information in information just can be carried out subsequent identity information matching.In this process, The thousands of groups of check informations can be formed check information libraries will be in verification information then after getting verification information Credential information matched with the credential information in check information library in each group of check information after find identical voucher letter Breath.
Embodiment 2
Copyright managing method described in corresponding embodiment 1, the present embodiment propose a kind of server, and the server includes Processor is configured with the executable operational order of processor, to perform the following operations:
Obtain the first credential information and the first identity information;
First credential information and the first identity information are subjected to binding and form check information;
Verification information is obtained, includes the second credential information and the second identity information in the verification information;
The check information and verification information are subjected to matching verifying, when the first credential information and the second credential information match Unanimously, when and the first identity information and the second identity information match consistent, encrypted information needed is sent.
Specifically, the server that the present embodiment is proposed can be internet backstage, it is also possible to operate in any equipment On service routine, the present embodiment do not do particular determination.Specific copyright management process is as follows:
Credential information and identity information are obtained first, and the credential information and identity information are to send to obtain by user terminal 's.Credential information can be phonecard number, storage card number or telephone number.Identity information may include the name of user, property Not, the relevant informations such as identification card number.Such as credential information is telephone number 13012345678, identity information is Zhang San.Then will The credential information and identity information carry out binding to formed check information store it is spare.Then verification information is received.It should Verification information sends acquisition again by user terminal.Credential information is equally contained in the verification information and identity is believed Breath, but credential information included in the verification information and identity information might not be with the check informations that store in server In credential information it is identical with identity information.Therefore, it after obtaining verification information, needs to included in the verification information Credential information and identity information and server in credential information in the check information that stores carry out check and correction with identity information and test Card.Specific check and correction verification process is as follows:
The credential information in verification information is matched with the credential information in check information first, or is believed with voucher Breath be telephone number 13012345678, identity information be Zhang San for, if the credential information in verification information is not phone number Code 13012345678, it means that verification information transmitted by user terminal is illegal either mistake.It can do Warning processing or without any processing out.If the credential information in verification information is equally telephone number 13012345678, So just then credential information in the identity information and check information in verification information is tied up by telephone number 13012345678 Fixed identity information is matched, if the identity information in verification information is not Zhang San, can similarly make warning Processing is without any processing.It, can be by the use of encryption if the identity information in verification information is equally Zhang San During information needed for family is sent to the user terminal.Information needed for the user can be used asymmetric encryption mode and encrypt.
It is worth noting that, the check information stored in server does not only have one group, it is likely that have much even It is thousands of groups.Therefore, it after receiving verification information, needs to be matched to and verify first in thousands of groups of check informations Then the identical one group of check information of credential information in information just can be carried out subsequent identity information matching.In this process, The thousands of groups of check informations can be formed check information libraries will be in verification information then after getting verification information Credential information matched with the credential information in check information library in each group of check information after find identical voucher letter Breath.
Embodiment 3
Fig. 2 is a kind of flow chart of copyright managing method provided by the embodiments of the present application, this method comprises:
S201, acquisition simultaneously send the second credential information and the second identity information;
S202, the required content for receiving encryption, and the required content of the encryption is decrypted.
Specifically, the method that the present embodiment is proposed can be applicable in user terminal, the user terminal can for mobile phone or The terminal devices such as plate, can loading procedure software in the terminal device.The program software can read the electricity of user terminal Card number, storage card number or telephone number are talked about as credential information, and obtains the identity information of user's input, then believes the voucher Breath and identity information are sent in server.After server obtains the credential information and identity information, to institute in the verification information The credential information in check information stored in the credential information and identity information and server for including carries out school with identity information To verifying.Specific check and correction verification process is as follows:
The credential information in verification information is matched with the credential information in check information first, or is believed with voucher Breath be telephone number 13012345678, identity information be Zhang San for, if the credential information in verification information is not phone number Code 13012345678, it means that verification information transmitted by user terminal is illegal either mistake.It can do Warning processing or without any processing out.If the credential information in verification information is equally telephone number 13012345678, So just then credential information in the identity information and check information in verification information is tied up by telephone number 13012345678 Fixed identity information is matched, if the identity information in verification information is not Zhang San, can similarly make warning Processing is without any processing.It, can be by the use of encryption if the identity information in verification information is equally Zhang San During information needed for family is sent to the user terminal.Information needed for the user can be used asymmetric encryption mode and encrypt.
It is worth noting that, user terminal to server send verification information before, server will before by with Other credential informations and identity information transmitted by the terminal of family form check information and are stored after being bound.Therefore, The check information stored in server does not only have one group, it is likely that has even thousands of groups very much.Therefore, work as receipts To after verification information, need to be matched to identical with credential information in verification information one first in thousands of groups of check informations Then group check information just can be carried out subsequent identity information matching.It in this process, can be by the thousands of groups of verifications Information form check information library, then after getting verification information, by verification information credential information and check information library In credential information in each group of check information matched after find identical credential information.
User terminal adds this after receiving the required content of encryption of server transmission, then using asymmetric encryption mode Close required content is presented to the user after being decrypted.
In method described in the present embodiment, in user terminal and server interaction matching, the authorization downloading of content is realized Later, even if user terminal cannot network, can also be believed by reading phone card number, storage card number or telephone number as voucher Breath, is decrypted use to the content being locally stored.Encrypted content, will the case where leaving user terminal and corresponding phonecard It cannot use, to effectively control the illegal copies of content copyright.
Embodiment 4
Copyright managing method described in corresponding embodiment 3 present embodiments provides a kind of user terminal;The user terminal Including processor, it is configured with the executable operational order of processor, to perform the following operations instruction:
It obtains and sends the second credential information and the second identity information;
The required content of encryption is received, and the required content of the encryption is decrypted.
Specifically, the user terminal that the present embodiment is proposed can be the terminal devices such as mobile phone or plate, set in the terminal It can loading procedure software in standby.The program software can read the phone card number, storage card number or telephone number of user terminal As credential information, and the identity information of user's input is obtained, the credential information and identity information are then sent to server In.After server obtains the credential information and identity information, to credential information included in the verification information and identity information With in the check information that is stored in server credential information and identity information carry out check and correction verifying.Specific check and correction verification process It is as follows:
The credential information in verification information is matched with the credential information in check information first, or is believed with voucher Breath be telephone number 13012345678, identity information be Zhang San for, if the credential information in verification information is not phone number Code 13012345678, it means that verification information transmitted by user terminal is illegal either mistake.It can do Warning processing or without any processing out.If the credential information in verification information is equally telephone number 13012345678, So just then credential information in the identity information and check information in verification information is tied up by telephone number 13012345678 Fixed identity information is matched, if the identity information in verification information is not Zhang San, can similarly make warning Processing is without any processing.It, can be by the use of encryption if the identity information in verification information is equally Zhang San During information needed for family is sent to the user terminal.Information needed for the user can be used asymmetric encryption mode and encrypt.
It is worth noting that, user terminal to server send verification information before, server will before by with Other credential informations and identity information transmitted by the terminal of family form check information and are stored after being bound.Therefore, The check information stored in server does not only have one group, it is likely that has even thousands of groups very much.Therefore, work as receipts To after verification information, need to be matched to identical with credential information in verification information one first in thousands of groups of check informations Then group check information just can be carried out subsequent identity information matching.It in this process, can be by the thousands of groups of verifications Information form check information library, then after getting verification information, by verification information credential information and check information library In credential information in each group of check information matched after find identical credential information.
User terminal adds this after receiving the required content of encryption of server transmission, then using asymmetric encryption mode Close required content is presented to the user after being decrypted.
After user terminal and server interaction matching, the authorization downloading for realizing content, even if user terminal cannot join Net can also carry out the content being locally stored by reading phone card number, storage card number or telephone number as credential information Decryption uses.Encrypted content is the case where leaving user terminal and corresponding phonecard, it is impossible to use, to effectively control The illegal copies of content copyright.
It should be noted that, in this document, the relational terms of such as " first " and " second " or the like are used merely to one A entity or operation with another entity or operate distinguish, without necessarily requiring or implying these entities or operation it Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant are intended to Cover non-exclusive inclusion, so that the process, method, article or equipment for including a series of elements not only includes those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or setting Standby intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in the process, method, article or apparatus that includes the element.
The above is only a specific embodiment of the invention, is made skilled artisans appreciate that or realizing this hair It is bright.Various modifications to these embodiments will be apparent to one skilled in the art, as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, of the invention It is not intended to be limited to the embodiments shown herein, and is to fit to and applied principle and features of novelty phase one herein The widest scope of cause.

Claims (10)

1. a kind of copyright managing method, which is characterized in that the described method includes:
Obtain the first credential information and the first identity information;
First credential information and the first identity information are subjected to binding and form check information;
Verification information is obtained, includes the second credential information and the second identity information in the verification information;
The check information and verification information are subjected to matching verifying, when the first credential information and the second credential information matching one It causes, and when the first identity information and consistent the second identity information matching, sends encrypted information needed.
2. the method according to claim 1, wherein the method also includes:
Check information library is established according to the check information;
After obtaining verification information, will include in the second credential information for including in the verification information and the check information library First credential information is matched;
After second credential information is matched to identical first credential information in check information library, then to second body First identity information bound in part information the first credential information identical with the second credential information is matched;
When the first identity information and consistent the second identity information matching, encrypted information needed is sent.
3. the method according to claim 1, wherein first credential information and the second credential information are phone Card number, storage card number or telephone number.
4. the method according to claim 1, wherein the information needed is added using asymmetric encryption mode It is close.
5. a kind of copyright managing method, which is characterized in that the described method includes:
It obtains and sends the second credential information and the second identity information;
The required content of encryption is received, and the required content of the encryption is decrypted.
6. according to the method described in claim 5, it is characterized in that, the method also includes: send the first credential information and the One identity information.
7. according to the method described in claim 6, it is characterized in that, first credential information and the second credential information are phone Card number, storage card number or telephone number.
8. according to the method described in claim 5, it is characterized in that, the information needed of the encryption uses asymmetric encryption mode It is decrypted.
9. a kind of server, which is characterized in that the server includes processor, is configured with the executable operation of processor Instruction requires 1 to 4 described in any item methods with perform claim.
10. a kind of user terminal, which is characterized in that the user terminal includes processor, and it is executable to be configured with processor Operational order, with perform claim require 5 to 8 described in any item methods.
CN201811418981.6A 2018-11-26 2018-11-26 A kind of copyright managing method, server and user terminal Pending CN109558703A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811418981.6A CN109558703A (en) 2018-11-26 2018-11-26 A kind of copyright managing method, server and user terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811418981.6A CN109558703A (en) 2018-11-26 2018-11-26 A kind of copyright managing method, server and user terminal

Publications (1)

Publication Number Publication Date
CN109558703A true CN109558703A (en) 2019-04-02

Family

ID=65867583

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811418981.6A Pending CN109558703A (en) 2018-11-26 2018-11-26 A kind of copyright managing method, server and user terminal

Country Status (1)

Country Link
CN (1) CN109558703A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111556012A (en) * 2020-03-24 2020-08-18 福建星网视易信息系统有限公司 Pirate detection and remote control method, device, equipment and medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101419653A (en) * 2008-12-08 2009-04-29 上海全景数字技术有限公司 File copyright management method for distributed system
CN101282326B (en) * 2007-04-04 2011-07-20 朱明程 Method, system and hand-hold terminal for management of digital copyright with binding terminal
CN104361266A (en) * 2014-11-25 2015-02-18 上海精灵天下数字技术有限公司 Copyright protection method and system of digital contents
CN105933296A (en) * 2016-04-12 2016-09-07 北京奇虎科技有限公司 Copyright registration method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101282326B (en) * 2007-04-04 2011-07-20 朱明程 Method, system and hand-hold terminal for management of digital copyright with binding terminal
CN101419653A (en) * 2008-12-08 2009-04-29 上海全景数字技术有限公司 File copyright management method for distributed system
CN104361266A (en) * 2014-11-25 2015-02-18 上海精灵天下数字技术有限公司 Copyright protection method and system of digital contents
CN105933296A (en) * 2016-04-12 2016-09-07 北京奇虎科技有限公司 Copyright registration method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111556012A (en) * 2020-03-24 2020-08-18 福建星网视易信息系统有限公司 Pirate detection and remote control method, device, equipment and medium
CN111556012B (en) * 2020-03-24 2023-08-29 福建星网视易信息系统有限公司 Piracy detection and remote control method, device, equipment and medium

Similar Documents

Publication Publication Date Title
DK1479187T4 (en) MANAGEMENT OF ACCESS LEVELS IN PHONES USING CERTIFICATES
CN101305545B (en) Method and apparatus for managing digital rights of secure removable media
CN101689237B (en) Activation system architecture
US20040039932A1 (en) Apparatus, system and method for securing digital documents in a digital appliance
CN101206696A (en) Apparatus, method and system for protecting personal information
CN100472550C (en) Method for generating licence and method and apparatus for providing contents using the same
US8353055B2 (en) Method and apparatus for processing rights object
KR19990022620A (en) Access control system and method for data storage media
CN108734018B (en) Authentication method, device, system and computer readable storage medium
FR2854303A1 (en) METHOD FOR SECURING A MOBILE TERMINAL AND METHOD APPLICATIONS, THE EXECUTION OF APPLICATIONS REQUIRING A HIGH SECURITY LEVEL
CN111164593A (en) Registration authorization method and system
US9942047B2 (en) Controlling application access to mobile device functions
CN103366304B (en) A kind of usufructuary assignment method of virtual goods, device and equipment
CN110708162B (en) Resource acquisition method and device, computer readable medium and electronic equipment
CN104361266A (en) Copyright protection method and system of digital contents
CN108418833B (en) Software management method, cloud server and terminal
CN103973646A (en) Method, client device and system for storing services by aid of public cloud
CN101252432B (en) Field managing server and system, digital authority managing method based on field
KR20130082948A (en) Payment agency system, user terminal and market server
CN109818965B (en) Personal identity verification device and method
CN103023915A (en) Method and system for protecting copyrights of downloaded books for mobile terminal
CN109558703A (en) A kind of copyright managing method, server and user terminal
CN105099680A (en) Method of authenticating user identity according to digital certificate and device
CN104182660B (en) For the customer equipment identification management method and system of digital copyright protecting
CN108268756A (en) Copyright and transaction processing system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190402