CN110162935A - A kind of charging method of file paid utilization - Google Patents

A kind of charging method of file paid utilization Download PDF

Info

Publication number
CN110162935A
CN110162935A CN201910318946.5A CN201910318946A CN110162935A CN 110162935 A CN110162935 A CN 110162935A CN 201910318946 A CN201910318946 A CN 201910318946A CN 110162935 A CN110162935 A CN 110162935A
Authority
CN
China
Prior art keywords
file
information
user terminal
key
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910318946.5A
Other languages
Chinese (zh)
Inventor
朱小军
肖列
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Lai Bu Technology Co Ltd
Original Assignee
Hangzhou Lai Bu Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Lai Bu Technology Co Ltd filed Critical Hangzhou Lai Bu Technology Co Ltd
Priority to CN201910318946.5A priority Critical patent/CN110162935A/en
Publication of CN110162935A publication Critical patent/CN110162935A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • G06Q20/123Shopping for digital content
    • G06Q20/1235Shopping for digital content with control of digital rights management [DRM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • H04L9/16Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/603Digital right managament [DRM]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Business, Economics & Management (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Accounting & Taxation (AREA)
  • General Engineering & Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Multimedia (AREA)
  • Finance (AREA)
  • Technology Law (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention relates to a kind of charging methods of file paid utilization.Execute following step when user terminal uses file every time in this method: S1, user terminal send Fileview request to management terminal, management terminal check user terminal whether charges paid;S2, if it is not, user terminal show payment channel information, pass through payment channel information complete payment;If S3, user terminal charges paid, management terminal sends the corresponding key of file encryption node to user terminal, and user terminal checks the corresponding file content of encryption node according to key;Wherein file is divided into multiple portions, the corresponding encryption node in each part, and each encryption node is correspondingly arranged key.The present invention handles traditional file; realize user's directly controlling and charging to file; halfpace support is not needed; the permission of management terminal is obtained using file every time; file after duplication and propagation still needs to pay the fees and the permission of management terminal, thus effective protection copyright and raising income.

Description

A kind of charging method of file paid utilization
Technical field
The present invention relates to file copy right toll administration fields, more specifically to a kind of charge of file paid utilization Method.
Background technique
In Internet era, information propagation is more efficient and convenient, also brings copyright pipe in the quick process of circulation of information Manage difficult problem.File of traditional file itself is without attribute and management information, only document content information, thus can not Carry out file management by file itself, can only account number cipher according to platform etc. carry out external management.Pass through account number cipher Way to manage only can be carried out Early postoperative management, and internet is flowed into after file is acquired, and property in copyright people just can not carry out again Limitation, illegal user can random copy propagation, cause damages to copyright holder.
In addition, user's file publishing, such as e-book, news release, picture, video etc. are required in platform in the prior art Upper publication, platform can all collect a certain proportion of service charge, reduce user's income.
Summary of the invention
The technical problem to be solved in the present invention is that in view of the above drawbacks of the prior art, provide a kind of file makes with compensation Charging method.
The technical solution adopted by the present invention to solve the technical problems is: constructing a kind of payment collector of file paid utilization Method, file is all for management terminal, and the file can be used in user terminal, every time using the file when execute following step:
S1, the user terminal send Fileview and request to the management terminal, and the management terminal checks the use Family terminal whether charges paid;
S2, if it is not, the user terminal show payment channel information, pass through the payment channel information complete payment;
If S3, the user terminal charges paid, the management terminal sends the corresponding key of file encryption node to described User terminal, the user terminal check the corresponding file content of the encryption node according to the key;The wherein file It is divided into multiple portions, the corresponding encryption node in each part, each encryption node is correspondingly arranged key.
Further, the charging method of file of the present invention paid utilization, in the user terminal in the step S2 Display payment channel information includes: that the payment channel information for including is shown in the user terminal in the file;Or institute State the payment channel information for showing that the management terminal is sent on user terminal;
The payment channel information is bank account information or Third-party payment platform information.
Further, the charging method of file paid utilization described in the present invention 1, the hair of management terminal described in the step S3 Sending the corresponding key of file encryption node to the user terminal includes: that the management terminal is described close according to payment amount setting Key after setting is sent to the user terminal by the effective degree of key or effective time;
The user terminal checks that the corresponding file content of the encryption node includes: that the user is whole according to the key Hold the key the effective degree or the corresponding file content of the encryption node is checked in effective time.
Further, the charging method of file paid utilization of the present invention, the key are dynamic key, are generated every time Key be different from, include the proving program for verifying the dynamic key in the file;Or
Each corresponding group key of the user terminal, and the key of each user terminal is different.
Further, the charging method of file paid utilization of the present invention, the administrative power of the file of the user terminal For limit to the managing terminal open, the management terminal changes the access right of the file by sending control instruction, described Access right includes that at least one of can be used, be forbidden to use, can replicate, forbidding duplication.
Further, the charging method of file paid utilization of the present invention, after the step S3 further include:
S41, the user terminal recording and sending file use information to the management terminal, the file use information Including user information, receive client information, using temporal information, use location information, modification information, operation note information, synchronization One of audio-frequency information, synchronization video information are a variety of;
S42, the management terminal are judged illegally to use the file according to the file use information and paying information User terminal;
S43, the user terminal for illegally using the file if it exists, the management terminal will illegally use the user of file Terminal pipes off, or sends and be forbidden to use instruction to the user terminal.
Further, the charging method of file paid utilization of the present invention, the key is encryption key, and described User terminal is invisible, and decryption obtains key to the file of the user terminal automatically after receiving encryption key.
Further, the charging method of file paid utilization of the present invention, the file includes body of data and data Chromosome;The body of data is data to be transmitted;The data chromosome is the attribute information of the body of data, the number Include: according to chromosome
For indicating the identity gene of the data cell body identity information;
For indicating the internal feature gene of the data cell body internal data state;
For describing the vital signs gene of the vital signs of the data cell body;
For describing the state characterizing gene of the current state of the data cell body;
System for carrying out system control controls gene.
Further, the charging method of file paid utilization of the present invention, the identity gene includes: that the data are thin The unique ID and MD5 digest information of cell space;
The internal feature gene include: data type, MD5 digest value, character boundary value, text encoding format information, File extension, creation time;
The vital signs gene includes: for limiting the authority information for checking permission of the data cell body, being used for It limits the data cell body and is checked the propagation width information of range, the biography for limiting the data cell body forwarding number of plies Broadcast depth information, the life information of the data cell body and the ownership information for limiting data ownership;
The authority information include owner it is visible and allow search permission, owner visible and do not allow search permission, The data cell body producer and pre-set user are visible and allow search permission, the data cell body producer and default use Family is visible and does not allow search permission;
The state characterizing gene includes: that the current propagation width information of the data cell body and the data are thin The current propagation depth information of cell space;
System control gene includes sequence number for matching the asynchronous protocol command frame of command result and for testing Demonstrate,prove the activation gateway of identification.
Further, the charging method of file paid utilization of the present invention, the file are document files, picture text One or more of part, video file, audio file, web page files.
The charging method for implementing a kind of file paid utilization of the invention, has the advantages that file in this method All for management terminal, file can be used in user terminal, uses execute following step when file every time: S1, user terminal are sent Fileview is requested to management terminal, management terminal check user terminal whether charges paid;S2, if it is not, being shown in user terminal Payment channel information passes through payment channel information and completes payment;If S3, user terminal charges paid, management terminal sends file and adds For the corresponding key of close node to user terminal, user terminal checks the corresponding file content of encryption node according to key;Its Chinese Part is divided into multiple portions, the corresponding encryption node in each part, and each encryption node is correspondingly arranged key.The present invention will be traditional File is handled, and realizes user's directly controlling and charging to file, is not needed halfpace support, is wanted every time using file The permission of management terminal is obtained, the file after duplication and propagation still needs to pay the fees and the permission of management terminal, to effectively protect It protects copyright and improves income.
Detailed description of the invention
Present invention will be further explained below with reference to the attached drawings and examples, in attached drawing:
Fig. 1 is the flow chart of the charging method for the file paid utilization that an embodiment provides;
Fig. 2 is the flow chart of the charging method for the file paid utilization that an embodiment provides;
Fig. 3 is the structural schematic diagram for the file that an embodiment provides.
Specific embodiment
For a clearer understanding of the technical characteristics, objects and effects of the present invention, now control attached drawing is described in detail A specific embodiment of the invention.
Embodiment
With reference to Fig. 1, in the charging method that the file of the present embodiment is used with compensation, management terminal gathers around documentary ownership, File is sent to the user terminal by management terminal, and file can be used in user terminal.Alternatively, the file of the present embodiment include but It is not limited to document files, picture file, video file, audio file, web page files etc..But the file of the present embodiment is distinct from Traditional file, relative to only including content itself in existing file, the file in the present embodiment not only includes data itself, but also Comprising multiple encryption nodes, the corresponding encryption node in each part, each encryption node is correspondingly arranged key.Alternatively, File can be directly generated by management terminal;Or existing file is handled, treated, and file meets the present embodiment to file Requirement.User terminal executes following step when using file every time:
S1, user terminal send Fileview request to management terminal, management terminal check user terminal whether charges paid.
Specifically, file is sent to the user terminal by management terminal, user wants to check file content on the subscriber terminal When, it can double-click or right button shortcut menu issues and opens file instruction, the address for the management terminal that file is stored according to file internal Information sends Fileview automatically and requests to management terminal.And Fileview request further includes the user obtained automatically by file End message, user terminal information include but is not limited to user terminal physical address information, network address information etc., can be unique Identify user terminal, management terminal confirms user terminal identity according to user terminal information.
Management terminal extracts user terminal information after receiving Fileview request, confirms user by user terminal information Terminal identity.It is stored with the information for the user terminal paid the fees in management terminal, checks the use after confirming user terminal identity Whether family terminal has paid.Further, also needing of having paid the fees checks whether the expense paid has run out, if having used It is complete, also think not pay the fees.
Alternatively, management terminal can be arranged by program automatic comparison check user terminal whether charges paid.
If S2, the user terminal are not paid the fees, payment channel information is shown in user terminal, is completed by payment channel information Payment.
Specifically, file itself includes payment channel information in the present embodiment, payment channel information is bank account information Or Third-party payment platform information, such as Third-party payment platform information can be Alipay payment channel, wechat payment channel etc.. Show that payment channel information includes: to show the payment channel information for including, user in the user terminal in file in user terminal It is paid the fees according to payment channel information.
Alternatively, file itself also may not include payment channel information, when to inquire user terminal unpaid for management terminal Time-consuming, the automatic payment channel information that sends is to user terminal, the payment channel letter that display management terminal is sent on the subscriber terminal Breath, user pay the fees according to payment channel information.
Further, payment channel information corresponds to bank or Third-party payment platform is associated with management terminal, by payment information It is sent to management terminal in time.After completing payment, the payment information of the user terminal is saved in management terminal, realizes automation Management.
If S3, user terminal charges paid, management terminal sends the corresponding key of file encryption node to user terminal, user Terminal checks the corresponding file content of encryption node according to key, and wherein file is divided into multiple portions, and each part is one corresponding Encryption node, each encryption node are correspondingly arranged key.
Specifically, a part of each encryption node respective file, obtains the key of an encryption node, i.e., it is openable with A part of the corresponding file of the encryption node.For example, 5 minutes video file, including 5 encryption nodes, difference position At 0 minute of video playback time point, at 1 minute, at 2 minutes, at 3 minutes, at 4 minutes, then the view is being opened in receiving end It is corresponding at 0 minute place, 1 minute place, 2 minutes, at 3 minutes, needs are corresponding from transmitting terminal acquisition at 4 minutes when frequency file Key, one key of every acquisition are then corresponding to open one section of video.After completing to check closing file, file access pattern restores automatically To encrypted state, need to re-execute the steps S1 when reusing to step S3.
Further, the present embodiment with the file access times of managing user terminal or can use the time, manage in step S3 It includes: management terminal according to payment amount setting key that reason terminal, which sends the corresponding key of file encryption node to user terminal, Key after setting is sent to the user terminal by effective degree or effective time.User terminal checks encryption node according to key Corresponding file content includes: user terminal in the effective degree of key or checks the corresponding file of encryption node in effective time Content.When the effective degree of the key of user terminal or effective time use finish, then this document cannot be checked again.
Further, to reinforce safety, key is set as dynamic in the charging method of the file paid utilization of the present embodiment Key, the key that management terminal generates every time are different from, and include the proving program for verifying dynamic key in file.As It selects, the proving program in file, which is also given, to be periodically updated.After dynamic key is set, both make the key formerly sent illegal User's interception cracks, can not Reusability, need next time using still need to obtain from management terminal when file it is new plus The corresponding key of close node.
It in some embodiments, is reinforcement safety, the corresponding group key of each user terminal, and each user terminal Key is all different.That is the attribute information of key and user terminal is corresponding, such as the network address of key and user terminal Or physical address is corresponding.After so that file is copied to other users terminal in this way, last user terminal cannot be still used Key, it is desired nonetheless to obtain the corresponding key of new encryption node from management terminal.
Alternatively, in the charging method of the file paid utilization of the present embodiment, key is encryption key, and encryption key exists Management terminal completes encryption, and decryption obtains key to the file of user terminal automatically after receiving encryption key, and decrypting process exists Backstage is automatic to be executed, and user terminal is invisible, does not need user and is manually entered key.
The present embodiment handles traditional file, realizes user's directly controlling and charging to file, does not need centre Platform, will obtain the permission of management terminal using file every time, and the file after duplication and propagation still needs to pay the fees and manage The permission of terminal is managed, thus effective protection copyright and raising income.After being detached from therefrom, each user can issue oneself File, and usage charges are directly collected, the creation enthusiasm of user can be improved.
Embodiment
In the charging method of the file paid utilization of the present embodiment, the administration authority of the file of user terminal is to management terminal Open, management terminal changes the access right of file by sending control instruction, access right include but is not limited to can be used, Be forbidden to use, can replicate, forbidding duplication etc..It should be understood that user terminal needs to agree to the use when using this document Jurisdictions mandate, to facilitate the later period to be managed.For example, can be referred to by sending control after management terminal discovery illegal user's terminal Long-range forbidden user is enabled to reuse this document.
Embodiment
With reference to Fig. 2, on the basis of the above embodiments, used to prevent file to be replicated rear arbitrarily propagate, the present embodiment File paid utilization charging method in, after step s 3 further include:
S41, user terminal recording and sending file use information to management terminal, file use information include but is not limited to User information, receive client information, using temporal information, use location information, modification information, operation note information, isochronous audio Information, synchronization video information etc., above- mentioned information are obtained automatically by file and are sent to management terminal.It should be understood that user is whole End needs to agree to the access right requirement when using this document.
S42, management terminal judge the user terminal for illegally using file according to file use information and paying information;
S43, the user terminal for illegally using file if it exists, management terminal are included in illegal using the user terminal of file Blacklist, or send and be forbidden to use instruction to user terminal.
The present embodiment judges whether user is legitimate user by obtaining the use information of user, and to illegal user into Row limitation uses, and improves file management efficiency.
Embodiment
With reference to Fig. 3, in the charging method that the file of the present embodiment is used with compensation, file includes body of data and data dyeing Body;Body of data is data to be transmitted;Data chromosome is the attribute information of body of data, and data chromosome determines that data are thin The attributive character such as the external display form of cell space, shape, life cycle, visible range.Data chromosome is also that the external world finds number According to the feature entrance of cell body, and data chromosome is made of key-value pair, wherein key as string.Data chromosome can answer System, modification, conversion, propagation etc..Data chromosomal change is not meant to the change of body of data.Assuming that a video cell, I.e. video has seen data chromosome of the number of the video as video cell as body of data, with having seen video number Increase, corresponding data chromosome is changing always, but video itself does not change.
It should be noted that the object of the attribute information of data chromosome meaning is body of data herein, that is, will count According to the attribute information of ontology as a whole, the particular content of the attribute information and body of data be it is unrelated, can also will Body of data is interpreted as the flight data recorder of an encapsulation, and the data that the inside is included can be diversified.In addition, data herein The attribute information of chromosome meaning is different from those attributes for being used to describe file, such as a picture is a file, the figure The attribute of piece includes size, size, date created, resolution ratio etc., these attributes contribute to the characteristic of description picture itself.And In the present invention attribute information of data chromosome meaning be by the relevant data of picture all as a whole, and then again to this The whole attributive character such as external display form, shape, life cycle, visible range that carry out are described.
Data chromosome includes: identity gene, internal feature gene, vital signs gene, state characterizing gene, system control Gene processed, wherein
Identity gene is for indicating data cell body identity information.Identity gene includes: the unique identification of data cell body ID and MD5 digest information.In program implement, string class is can be used in the type of unique ID, and MD5 digest information can Use string class.The generation of MD5 digest information can refer to the prior art.
Internal feature gene is for indicating data cell body internal data state;Internal feature gene include: data type, MD5 digest value, character boundary value, text encoding format information, file extension, creation time.Wherein, data type is Text/plan, image/jpg, mp4/video etc., with the content-type in http agreement.In program implement, String class can be used in data type, and string class can be used in MD5 digest value, and integer class, text can be used in character boundary value String class can be used in encoding format information, and string class can be used in file extension, and datatime class can be used in creation time.
Vital signs gene is used to describe the vital signs of data cell body;Vital signs gene includes: for limiting number The propagation width information of range is checked according to the authority information for checking permission of cell body, for limiting data cell body, is used for Limit the propagation depth information of the data cell body forwarding number of plies, the life information of data cell body and for limiting data institute The ownership information having the right.Further, authority information include owner it is visible and allow search permission, owner is visible and does not permit Perhaps search permission, data cell body producer and pre-set user are visible and allow search permission, data cell body producer and pre- If user is visible and does not allow search permission.In program implement, authority information can be used and enumerate class, such as value can divide It is not defined as public, private, protected, the permission that wherein public is limited is owner as it can be seen that and allowing to search for; The permission that private is limited is owner (data creator) and relevant people as it can be seen that not allowing to search for;Protected is owner As it can be seen that not allowing to search for.It by the setting, defines whether data can be checked, and whether can be searched, accomplish pair Effective control of data.
In program implement, propagating width information can be used integer class, limits data cell body and is checked range Limit the quantity that data cell body is allowed to the people seen.By the setting, user can pass through when initially founding data It is arranged and propagates width information to limit the range that the data cell body is checked, accomplishes effective control to data.Propagate depth Integer class can be used in information, and propagation depth herein refers to the number of plies that data cell body allows to be forwarded, and forwarding once may be used It is considered as one layer.
The life information of data cell body is arranged when data cell body generates, after life information is arranged, from data cell Body starts timing when generating, and after the time reaching preset time, which stops transmission and check.Further, should Auto-destruct also may be selected in data cell body.
Ownership information can be written when data cell body generates, such as by Termination ID, user name, cell-phone number etc. as use The authorization code information at family can thus determine all of the data cell body as ownership information according to ownership information Power and control ownership.
State characterizing gene is used to describe the current state of data cell body;State characterizing gene includes: data cell body The current propagation depth information of current propagation width information and data cell body.It, can be with data as context information The state change of cell body and change.In program implement, integer class is can be used in current propagation width information, when Integer class can be used in preceding propagation depth information.
System control gene is for carrying out system control.System control gene includes the asynchronous association for matching command result Discuss the sequence number of command frame and the activation gateway for verifying identification.In program implement, the sequence of asynchronous protocol command frame Integer class can be used in row number, and integer class can be used in activation gateway.
To sum up, data cell body of the invention not only includes data to be transmitted, further includes the attribute information of these data, is led to Crossing attribute information makes data have vitality, and then achievable more bionical operations.
The present embodiment handles traditional file, so that file itself is had certain management function, and user makes every time The permission of management terminal must be all obtained with file, the file after duplication and propagation still needs to pay the fees and manage eventually when in use The permission at end, thus effective protection copyright.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with other The difference of embodiment, the same or similar parts in each embodiment may refer to each other.For device disclosed in embodiment For, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place is said referring to method part It is bright.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These Function is implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Profession Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered Think beyond the scope of this invention.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor The combination of capable software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only deposit Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology In any other form of storage medium well known in field.
Above embodiments only technical concepts and features to illustrate the invention, its object is to allow person skilled in the art Scholar can understand the contents of the present invention and implement accordingly, can not limit the scope of the invention.It is all to be wanted with right of the present invention The equivalent changes and modifications that range is done are sought, should belong to the covering scope of the claims in the present invention.

Claims (10)

1. a kind of charging method of file paid utilization, which is characterized in that file is all for management terminal, and user terminal can be used The file, every time using the file when execute following step:
S1, the user terminal send Fileview and request to the management terminal, and the management terminal checks that the user is whole End whether charges paid;
S2, if it is not, the user terminal show payment channel information, pass through the payment channel information complete payment;
If S3, the user terminal charges paid, the management terminal sends the corresponding key of file encryption node to the user Terminal, the user terminal check the corresponding file content of the encryption node according to the key;Wherein the file is divided into Multiple portions, the corresponding encryption node in each part, each encryption node are correspondingly arranged key.
2. the charging method of file paid utilization according to claim 1, which is characterized in that described in the step S2 User terminal display payment channel information includes: that the payment channel letter for including is shown in the user terminal in the file Breath;Or the payment channel information that the management terminal is sent is shown on the user terminal;
The payment channel information is bank account information or Third-party payment platform information.
3. the charging method of file paid utilization according to claim 1, which is characterized in that managed described in the step S3 It includes: that the management terminal is set according to payment amount that reason terminal, which sends the corresponding key of file encryption node to the user terminal, Key after setting is sent to the user terminal by effective degree or the effective time for setting the key;
The user terminal checks that the corresponding file content of the encryption node includes: that the user terminal exists according to the key The effective degree of the key checks the corresponding file content of the encryption node in effective time.
4. the charging method of file paid utilization according to claim 1, which is characterized in that the key is that dynamic is close Key, the key generated every time are different from, and include the proving program for verifying the dynamic key in the file;Or
Each corresponding group key of the user terminal, and the key of each user terminal is different.
5. the charging method of file paid utilization according to claim 1, which is characterized in that the file of the user terminal Administration authority to the managing terminal open, the management terminal changes the right to use of the file by sending control instruction Limit, the access right include that at least one of can be used, be forbidden to use, can replicate, forbidding duplication.
6. the charging method of file paid utilization according to claim 1, which is characterized in that after the step S3 also Include:
S41, the user terminal recording and sending file use information to the management terminal, the file use information include User information, receive client information, using temporal information, use location information, modification information, operation note information, isochronous audio One of information, synchronization video information are a variety of;
S42, the management terminal judge the use for illegally using the file according to the file use information and paying information Family terminal;
S43, the user terminal for illegally using the file if it exists, the management terminal will illegally use the user terminal of file It pipes off, or sends and be forbidden to use instruction to the user terminal.
7. the charging method of file paid utilization according to claim 1, which is characterized in that the key is that encryption is close Key, and invisible in the user terminal, the file of the user terminal after receiving encryption key automatically decryption obtain it is close Key.
8. the charging method of file paid utilization according to claim 1, which is characterized in that the file includes data sheet Body and data chromosome;The body of data is data to be transmitted;The data chromosome is that the attribute of the body of data is believed Breath, the data chromosome include:
For indicating the identity gene of the data cell body identity information;
For indicating the internal feature gene of the data cell body internal data state;
For describing the vital signs gene of the vital signs of the data cell body;
For describing the state characterizing gene of the current state of the data cell body;
System for carrying out system control controls gene.
9. the charging method of file according to claim 8 paid utilization, which is characterized in that the identity gene includes: The unique ID and MD5 digest information of the data cell body;
The internal feature gene includes: data type, MD5 digest value, character boundary value, text encoding format information, file Extension name, creation time;
The vital signs gene includes: for limiting the authority information for checking permission of the data cell body, for limiting The data cell body is checked that the propagation width information of range, the propagation for limiting the data cell body forwarding number of plies are deep Spend information, the life information of the data cell body and the ownership information for limiting data ownership;
The authority information includes that owner is visible and allow search permission, owner visible and do not allow search permission, described Data cell body producer and pre-set user are visible and allow search permission, the data cell body producer and pre-set user can See and does not allow search permission;
The state characterizing gene includes: the current propagation width information of the data cell body and the data cell body The current propagation depth information;
System control gene includes sequence number for matching the asynchronous protocol command frame of command result and knows for verifying Other activation gateway.
10. the charging method of file paid utilization according to claim 1, which is characterized in that the file is document text One or more of part, picture file, video file, audio file, web page files.
CN201910318946.5A 2019-04-19 2019-04-19 A kind of charging method of file paid utilization Pending CN110162935A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910318946.5A CN110162935A (en) 2019-04-19 2019-04-19 A kind of charging method of file paid utilization

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910318946.5A CN110162935A (en) 2019-04-19 2019-04-19 A kind of charging method of file paid utilization

Publications (1)

Publication Number Publication Date
CN110162935A true CN110162935A (en) 2019-08-23

Family

ID=67639680

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910318946.5A Pending CN110162935A (en) 2019-04-19 2019-04-19 A kind of charging method of file paid utilization

Country Status (1)

Country Link
CN (1) CN110162935A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110727924A (en) * 2019-09-30 2020-01-24 维沃移动通信有限公司 Resource sharing method and first electronic device
CN110971589A (en) * 2019-10-31 2020-04-07 杭州来布科技有限公司 File management method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101118634A (en) * 2007-09-19 2008-02-06 北京握奇数据系统有限公司 Process for generating licenses and system thereof
CN103377567A (en) * 2012-04-23 2013-10-30 北大方正集团有限公司 Method and device for reading digital electronic book
US20140201526A1 (en) * 2005-11-16 2014-07-17 Shelia Jean Burgess System, method, and apparatus for data, data structure, or encryption key cognition incorporating autonomous security protection
CN104809366A (en) * 2015-04-29 2015-07-29 小米科技有限责任公司 Reading method and device of electronic book
CN104851033A (en) * 2015-01-20 2015-08-19 丁京华 E-book multiparty transaction system
CN109347897A (en) * 2018-08-16 2019-02-15 朱小军 A kind of center architected bionic data Transmission system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140201526A1 (en) * 2005-11-16 2014-07-17 Shelia Jean Burgess System, method, and apparatus for data, data structure, or encryption key cognition incorporating autonomous security protection
CN101118634A (en) * 2007-09-19 2008-02-06 北京握奇数据系统有限公司 Process for generating licenses and system thereof
CN103377567A (en) * 2012-04-23 2013-10-30 北大方正集团有限公司 Method and device for reading digital electronic book
CN104851033A (en) * 2015-01-20 2015-08-19 丁京华 E-book multiparty transaction system
CN104809366A (en) * 2015-04-29 2015-07-29 小米科技有限责任公司 Reading method and device of electronic book
CN109347897A (en) * 2018-08-16 2019-02-15 朱小军 A kind of center architected bionic data Transmission system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110727924A (en) * 2019-09-30 2020-01-24 维沃移动通信有限公司 Resource sharing method and first electronic device
CN110727924B (en) * 2019-09-30 2022-03-04 维沃移动通信有限公司 Resource sharing method and first electronic device
CN110971589A (en) * 2019-10-31 2020-04-07 杭州来布科技有限公司 File management method
WO2021082996A1 (en) * 2019-10-31 2021-05-06 杭州来布科技有限公司 File management method

Similar Documents

Publication Publication Date Title
JP7436568B2 (en) Methods and systems realized by blockchain
JP4155393B2 (en) File exchange apparatus, personal information registration / introduction server, transmission control method, and program
US6990684B2 (en) Person authentication system, person authentication method and program providing medium
CN102724204B (en) Secure and trusted capability opening platform
US7096363B2 (en) Person identification certificate link system, information processing apparatus, information processing method, and program providing medium
US20070226811A1 (en) Processing Rights In Drm Systems
US20020026581A1 (en) Content distribution system, a content distribution method, an information processing apparatus, and a program providing medium
US20130275765A1 (en) Secure digital document distribution with real-time sender control of recipient document content access rights
CN114513533A (en) Classified and graded fitness and health big data sharing system and method
JPH08263441A (en) System for safe distribution and control of digital work andits control method
WO2006107185A1 (en) Domain management method and domain context of users and devices based domain system
CN106295330B (en) Call the control device and method of API
JP2003202932A (en) Method for controlling execution of computer program
JPH08272746A (en) System for control of distribution and use of digital work with charge notification mechanism and charge notification method
CN113326541B (en) Cloud edge collaborative multi-mode private data transfer method based on intelligent contract
CN102436562B (en) Medical image stores safely the method with transmission
CN109634619A (en) Credible performing environment implementation method and device, terminal device, readable storage medium storing program for executing
CN101930516B (en) Method for using license of embedded equipment
CN109255210A (en) The method, apparatus and storage medium of intelligent contract are provided in block chain network
CN110619222A (en) Authorization processing method, device, system and medium based on block chain
CN110162935A (en) A kind of charging method of file paid utilization
CN102801704A (en) Method for providing multimedia data via communication network and playing the multimedia data
JP2004530230A (en) How to manage access and use of resources by checking conditions and conditions used with them
JP2004110197A (en) Information processing method and method of managing access authority for use at center system
WO2024093274A1 (en) Permission control method and apparatus for nft circulation data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190823

RJ01 Rejection of invention patent application after publication