CN110162935A - A kind of charging method of file paid utilization - Google Patents
A kind of charging method of file paid utilization Download PDFInfo
- Publication number
- CN110162935A CN110162935A CN201910318946.5A CN201910318946A CN110162935A CN 110162935 A CN110162935 A CN 110162935A CN 201910318946 A CN201910318946 A CN 201910318946A CN 110162935 A CN110162935 A CN 110162935A
- Authority
- CN
- China
- Prior art keywords
- file
- information
- user terminal
- key
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 43
- 210000005056 cell body Anatomy 0.000 claims description 50
- 108090000623 proteins and genes Proteins 0.000 claims description 35
- 210000000349 chromosome Anatomy 0.000 claims description 17
- 230000004048 modification Effects 0.000 claims description 5
- 238000012986 modification Methods 0.000 claims description 5
- 230000004913 activation Effects 0.000 claims description 4
- 230000002123 temporal effect Effects 0.000 claims description 3
- 210000004027 cell Anatomy 0.000 description 5
- 230000008859 change Effects 0.000 description 5
- 230000006870 function Effects 0.000 description 4
- 230000008569 process Effects 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000002759 chromosomal effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000004043 dyeing Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005538 encapsulation Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 230000002980 postoperative effect Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 230000001902 propagating effect Effects 0.000 description 1
- 230000002787 reinforcement Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
- G06Q20/123—Shopping for digital content
- G06Q20/1235—Shopping for digital content with control of digital rights management [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
- H04L9/16—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/603—Digital right managament [DRM]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Business, Economics & Management (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Accounting & Taxation (AREA)
- General Engineering & Computer Science (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Multimedia (AREA)
- Finance (AREA)
- Technology Law (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention relates to a kind of charging methods of file paid utilization.Execute following step when user terminal uses file every time in this method: S1, user terminal send Fileview request to management terminal, management terminal check user terminal whether charges paid;S2, if it is not, user terminal show payment channel information, pass through payment channel information complete payment;If S3, user terminal charges paid, management terminal sends the corresponding key of file encryption node to user terminal, and user terminal checks the corresponding file content of encryption node according to key;Wherein file is divided into multiple portions, the corresponding encryption node in each part, and each encryption node is correspondingly arranged key.The present invention handles traditional file; realize user's directly controlling and charging to file; halfpace support is not needed; the permission of management terminal is obtained using file every time; file after duplication and propagation still needs to pay the fees and the permission of management terminal, thus effective protection copyright and raising income.
Description
Technical field
The present invention relates to file copy right toll administration fields, more specifically to a kind of charge of file paid utilization
Method.
Background technique
In Internet era, information propagation is more efficient and convenient, also brings copyright pipe in the quick process of circulation of information
Manage difficult problem.File of traditional file itself is without attribute and management information, only document content information, thus can not
Carry out file management by file itself, can only account number cipher according to platform etc. carry out external management.Pass through account number cipher
Way to manage only can be carried out Early postoperative management, and internet is flowed into after file is acquired, and property in copyright people just can not carry out again
Limitation, illegal user can random copy propagation, cause damages to copyright holder.
In addition, user's file publishing, such as e-book, news release, picture, video etc. are required in platform in the prior art
Upper publication, platform can all collect a certain proportion of service charge, reduce user's income.
Summary of the invention
The technical problem to be solved in the present invention is that in view of the above drawbacks of the prior art, provide a kind of file makes with compensation
Charging method.
The technical solution adopted by the present invention to solve the technical problems is: constructing a kind of payment collector of file paid utilization
Method, file is all for management terminal, and the file can be used in user terminal, every time using the file when execute following step:
S1, the user terminal send Fileview and request to the management terminal, and the management terminal checks the use
Family terminal whether charges paid;
S2, if it is not, the user terminal show payment channel information, pass through the payment channel information complete payment;
If S3, the user terminal charges paid, the management terminal sends the corresponding key of file encryption node to described
User terminal, the user terminal check the corresponding file content of the encryption node according to the key;The wherein file
It is divided into multiple portions, the corresponding encryption node in each part, each encryption node is correspondingly arranged key.
Further, the charging method of file of the present invention paid utilization, in the user terminal in the step S2
Display payment channel information includes: that the payment channel information for including is shown in the user terminal in the file;Or institute
State the payment channel information for showing that the management terminal is sent on user terminal;
The payment channel information is bank account information or Third-party payment platform information.
Further, the charging method of file paid utilization described in the present invention 1, the hair of management terminal described in the step S3
Sending the corresponding key of file encryption node to the user terminal includes: that the management terminal is described close according to payment amount setting
Key after setting is sent to the user terminal by the effective degree of key or effective time;
The user terminal checks that the corresponding file content of the encryption node includes: that the user is whole according to the key
Hold the key the effective degree or the corresponding file content of the encryption node is checked in effective time.
Further, the charging method of file paid utilization of the present invention, the key are dynamic key, are generated every time
Key be different from, include the proving program for verifying the dynamic key in the file;Or
Each corresponding group key of the user terminal, and the key of each user terminal is different.
Further, the charging method of file paid utilization of the present invention, the administrative power of the file of the user terminal
For limit to the managing terminal open, the management terminal changes the access right of the file by sending control instruction, described
Access right includes that at least one of can be used, be forbidden to use, can replicate, forbidding duplication.
Further, the charging method of file paid utilization of the present invention, after the step S3 further include:
S41, the user terminal recording and sending file use information to the management terminal, the file use information
Including user information, receive client information, using temporal information, use location information, modification information, operation note information, synchronization
One of audio-frequency information, synchronization video information are a variety of;
S42, the management terminal are judged illegally to use the file according to the file use information and paying information
User terminal;
S43, the user terminal for illegally using the file if it exists, the management terminal will illegally use the user of file
Terminal pipes off, or sends and be forbidden to use instruction to the user terminal.
Further, the charging method of file paid utilization of the present invention, the key is encryption key, and described
User terminal is invisible, and decryption obtains key to the file of the user terminal automatically after receiving encryption key.
Further, the charging method of file paid utilization of the present invention, the file includes body of data and data
Chromosome;The body of data is data to be transmitted;The data chromosome is the attribute information of the body of data, the number
Include: according to chromosome
For indicating the identity gene of the data cell body identity information;
For indicating the internal feature gene of the data cell body internal data state;
For describing the vital signs gene of the vital signs of the data cell body;
For describing the state characterizing gene of the current state of the data cell body;
System for carrying out system control controls gene.
Further, the charging method of file paid utilization of the present invention, the identity gene includes: that the data are thin
The unique ID and MD5 digest information of cell space;
The internal feature gene include: data type, MD5 digest value, character boundary value, text encoding format information,
File extension, creation time;
The vital signs gene includes: for limiting the authority information for checking permission of the data cell body, being used for
It limits the data cell body and is checked the propagation width information of range, the biography for limiting the data cell body forwarding number of plies
Broadcast depth information, the life information of the data cell body and the ownership information for limiting data ownership;
The authority information include owner it is visible and allow search permission, owner visible and do not allow search permission,
The data cell body producer and pre-set user are visible and allow search permission, the data cell body producer and default use
Family is visible and does not allow search permission;
The state characterizing gene includes: that the current propagation width information of the data cell body and the data are thin
The current propagation depth information of cell space;
System control gene includes sequence number for matching the asynchronous protocol command frame of command result and for testing
Demonstrate,prove the activation gateway of identification.
Further, the charging method of file paid utilization of the present invention, the file are document files, picture text
One or more of part, video file, audio file, web page files.
The charging method for implementing a kind of file paid utilization of the invention, has the advantages that file in this method
All for management terminal, file can be used in user terminal, uses execute following step when file every time: S1, user terminal are sent
Fileview is requested to management terminal, management terminal check user terminal whether charges paid;S2, if it is not, being shown in user terminal
Payment channel information passes through payment channel information and completes payment;If S3, user terminal charges paid, management terminal sends file and adds
For the corresponding key of close node to user terminal, user terminal checks the corresponding file content of encryption node according to key;Its Chinese
Part is divided into multiple portions, the corresponding encryption node in each part, and each encryption node is correspondingly arranged key.The present invention will be traditional
File is handled, and realizes user's directly controlling and charging to file, is not needed halfpace support, is wanted every time using file
The permission of management terminal is obtained, the file after duplication and propagation still needs to pay the fees and the permission of management terminal, to effectively protect
It protects copyright and improves income.
Detailed description of the invention
Present invention will be further explained below with reference to the attached drawings and examples, in attached drawing:
Fig. 1 is the flow chart of the charging method for the file paid utilization that an embodiment provides;
Fig. 2 is the flow chart of the charging method for the file paid utilization that an embodiment provides;
Fig. 3 is the structural schematic diagram for the file that an embodiment provides.
Specific embodiment
For a clearer understanding of the technical characteristics, objects and effects of the present invention, now control attached drawing is described in detail
A specific embodiment of the invention.
Embodiment
With reference to Fig. 1, in the charging method that the file of the present embodiment is used with compensation, management terminal gathers around documentary ownership,
File is sent to the user terminal by management terminal, and file can be used in user terminal.Alternatively, the file of the present embodiment include but
It is not limited to document files, picture file, video file, audio file, web page files etc..But the file of the present embodiment is distinct from
Traditional file, relative to only including content itself in existing file, the file in the present embodiment not only includes data itself, but also
Comprising multiple encryption nodes, the corresponding encryption node in each part, each encryption node is correspondingly arranged key.Alternatively,
File can be directly generated by management terminal;Or existing file is handled, treated, and file meets the present embodiment to file
Requirement.User terminal executes following step when using file every time:
S1, user terminal send Fileview request to management terminal, management terminal check user terminal whether charges paid.
Specifically, file is sent to the user terminal by management terminal, user wants to check file content on the subscriber terminal
When, it can double-click or right button shortcut menu issues and opens file instruction, the address for the management terminal that file is stored according to file internal
Information sends Fileview automatically and requests to management terminal.And Fileview request further includes the user obtained automatically by file
End message, user terminal information include but is not limited to user terminal physical address information, network address information etc., can be unique
Identify user terminal, management terminal confirms user terminal identity according to user terminal information.
Management terminal extracts user terminal information after receiving Fileview request, confirms user by user terminal information
Terminal identity.It is stored with the information for the user terminal paid the fees in management terminal, checks the use after confirming user terminal identity
Whether family terminal has paid.Further, also needing of having paid the fees checks whether the expense paid has run out, if having used
It is complete, also think not pay the fees.
Alternatively, management terminal can be arranged by program automatic comparison check user terminal whether charges paid.
If S2, the user terminal are not paid the fees, payment channel information is shown in user terminal, is completed by payment channel information
Payment.
Specifically, file itself includes payment channel information in the present embodiment, payment channel information is bank account information
Or Third-party payment platform information, such as Third-party payment platform information can be Alipay payment channel, wechat payment channel etc..
Show that payment channel information includes: to show the payment channel information for including, user in the user terminal in file in user terminal
It is paid the fees according to payment channel information.
Alternatively, file itself also may not include payment channel information, when to inquire user terminal unpaid for management terminal
Time-consuming, the automatic payment channel information that sends is to user terminal, the payment channel letter that display management terminal is sent on the subscriber terminal
Breath, user pay the fees according to payment channel information.
Further, payment channel information corresponds to bank or Third-party payment platform is associated with management terminal, by payment information
It is sent to management terminal in time.After completing payment, the payment information of the user terminal is saved in management terminal, realizes automation
Management.
If S3, user terminal charges paid, management terminal sends the corresponding key of file encryption node to user terminal, user
Terminal checks the corresponding file content of encryption node according to key, and wherein file is divided into multiple portions, and each part is one corresponding
Encryption node, each encryption node are correspondingly arranged key.
Specifically, a part of each encryption node respective file, obtains the key of an encryption node, i.e., it is openable with
A part of the corresponding file of the encryption node.For example, 5 minutes video file, including 5 encryption nodes, difference position
At 0 minute of video playback time point, at 1 minute, at 2 minutes, at 3 minutes, at 4 minutes, then the view is being opened in receiving end
It is corresponding at 0 minute place, 1 minute place, 2 minutes, at 3 minutes, needs are corresponding from transmitting terminal acquisition at 4 minutes when frequency file
Key, one key of every acquisition are then corresponding to open one section of video.After completing to check closing file, file access pattern restores automatically
To encrypted state, need to re-execute the steps S1 when reusing to step S3.
Further, the present embodiment with the file access times of managing user terminal or can use the time, manage in step S3
It includes: management terminal according to payment amount setting key that reason terminal, which sends the corresponding key of file encryption node to user terminal,
Key after setting is sent to the user terminal by effective degree or effective time.User terminal checks encryption node according to key
Corresponding file content includes: user terminal in the effective degree of key or checks the corresponding file of encryption node in effective time
Content.When the effective degree of the key of user terminal or effective time use finish, then this document cannot be checked again.
Further, to reinforce safety, key is set as dynamic in the charging method of the file paid utilization of the present embodiment
Key, the key that management terminal generates every time are different from, and include the proving program for verifying dynamic key in file.As
It selects, the proving program in file, which is also given, to be periodically updated.After dynamic key is set, both make the key formerly sent illegal
User's interception cracks, can not Reusability, need next time using still need to obtain from management terminal when file it is new plus
The corresponding key of close node.
It in some embodiments, is reinforcement safety, the corresponding group key of each user terminal, and each user terminal
Key is all different.That is the attribute information of key and user terminal is corresponding, such as the network address of key and user terminal
Or physical address is corresponding.After so that file is copied to other users terminal in this way, last user terminal cannot be still used
Key, it is desired nonetheless to obtain the corresponding key of new encryption node from management terminal.
Alternatively, in the charging method of the file paid utilization of the present embodiment, key is encryption key, and encryption key exists
Management terminal completes encryption, and decryption obtains key to the file of user terminal automatically after receiving encryption key, and decrypting process exists
Backstage is automatic to be executed, and user terminal is invisible, does not need user and is manually entered key.
The present embodiment handles traditional file, realizes user's directly controlling and charging to file, does not need centre
Platform, will obtain the permission of management terminal using file every time, and the file after duplication and propagation still needs to pay the fees and manage
The permission of terminal is managed, thus effective protection copyright and raising income.After being detached from therefrom, each user can issue oneself
File, and usage charges are directly collected, the creation enthusiasm of user can be improved.
Embodiment
In the charging method of the file paid utilization of the present embodiment, the administration authority of the file of user terminal is to management terminal
Open, management terminal changes the access right of file by sending control instruction, access right include but is not limited to can be used,
Be forbidden to use, can replicate, forbidding duplication etc..It should be understood that user terminal needs to agree to the use when using this document
Jurisdictions mandate, to facilitate the later period to be managed.For example, can be referred to by sending control after management terminal discovery illegal user's terminal
Long-range forbidden user is enabled to reuse this document.
Embodiment
With reference to Fig. 2, on the basis of the above embodiments, used to prevent file to be replicated rear arbitrarily propagate, the present embodiment
File paid utilization charging method in, after step s 3 further include:
S41, user terminal recording and sending file use information to management terminal, file use information include but is not limited to
User information, receive client information, using temporal information, use location information, modification information, operation note information, isochronous audio
Information, synchronization video information etc., above- mentioned information are obtained automatically by file and are sent to management terminal.It should be understood that user is whole
End needs to agree to the access right requirement when using this document.
S42, management terminal judge the user terminal for illegally using file according to file use information and paying information;
S43, the user terminal for illegally using file if it exists, management terminal are included in illegal using the user terminal of file
Blacklist, or send and be forbidden to use instruction to user terminal.
The present embodiment judges whether user is legitimate user by obtaining the use information of user, and to illegal user into
Row limitation uses, and improves file management efficiency.
Embodiment
With reference to Fig. 3, in the charging method that the file of the present embodiment is used with compensation, file includes body of data and data dyeing
Body;Body of data is data to be transmitted;Data chromosome is the attribute information of body of data, and data chromosome determines that data are thin
The attributive character such as the external display form of cell space, shape, life cycle, visible range.Data chromosome is also that the external world finds number
According to the feature entrance of cell body, and data chromosome is made of key-value pair, wherein key as string.Data chromosome can answer
System, modification, conversion, propagation etc..Data chromosomal change is not meant to the change of body of data.Assuming that a video cell,
I.e. video has seen data chromosome of the number of the video as video cell as body of data, with having seen video number
Increase, corresponding data chromosome is changing always, but video itself does not change.
It should be noted that the object of the attribute information of data chromosome meaning is body of data herein, that is, will count
According to the attribute information of ontology as a whole, the particular content of the attribute information and body of data be it is unrelated, can also will
Body of data is interpreted as the flight data recorder of an encapsulation, and the data that the inside is included can be diversified.In addition, data herein
The attribute information of chromosome meaning is different from those attributes for being used to describe file, such as a picture is a file, the figure
The attribute of piece includes size, size, date created, resolution ratio etc., these attributes contribute to the characteristic of description picture itself.And
In the present invention attribute information of data chromosome meaning be by the relevant data of picture all as a whole, and then again to this
The whole attributive character such as external display form, shape, life cycle, visible range that carry out are described.
Data chromosome includes: identity gene, internal feature gene, vital signs gene, state characterizing gene, system control
Gene processed, wherein
Identity gene is for indicating data cell body identity information.Identity gene includes: the unique identification of data cell body
ID and MD5 digest information.In program implement, string class is can be used in the type of unique ID, and MD5 digest information can
Use string class.The generation of MD5 digest information can refer to the prior art.
Internal feature gene is for indicating data cell body internal data state;Internal feature gene include: data type,
MD5 digest value, character boundary value, text encoding format information, file extension, creation time.Wherein, data type is
Text/plan, image/jpg, mp4/video etc., with the content-type in http agreement.In program implement,
String class can be used in data type, and string class can be used in MD5 digest value, and integer class, text can be used in character boundary value
String class can be used in encoding format information, and string class can be used in file extension, and datatime class can be used in creation time.
Vital signs gene is used to describe the vital signs of data cell body;Vital signs gene includes: for limiting number
The propagation width information of range is checked according to the authority information for checking permission of cell body, for limiting data cell body, is used for
Limit the propagation depth information of the data cell body forwarding number of plies, the life information of data cell body and for limiting data institute
The ownership information having the right.Further, authority information include owner it is visible and allow search permission, owner is visible and does not permit
Perhaps search permission, data cell body producer and pre-set user are visible and allow search permission, data cell body producer and pre-
If user is visible and does not allow search permission.In program implement, authority information can be used and enumerate class, such as value can divide
It is not defined as public, private, protected, the permission that wherein public is limited is owner as it can be seen that and allowing to search for;
The permission that private is limited is owner (data creator) and relevant people as it can be seen that not allowing to search for;Protected is owner
As it can be seen that not allowing to search for.It by the setting, defines whether data can be checked, and whether can be searched, accomplish pair
Effective control of data.
In program implement, propagating width information can be used integer class, limits data cell body and is checked range
Limit the quantity that data cell body is allowed to the people seen.By the setting, user can pass through when initially founding data
It is arranged and propagates width information to limit the range that the data cell body is checked, accomplishes effective control to data.Propagate depth
Integer class can be used in information, and propagation depth herein refers to the number of plies that data cell body allows to be forwarded, and forwarding once may be used
It is considered as one layer.
The life information of data cell body is arranged when data cell body generates, after life information is arranged, from data cell
Body starts timing when generating, and after the time reaching preset time, which stops transmission and check.Further, should
Auto-destruct also may be selected in data cell body.
Ownership information can be written when data cell body generates, such as by Termination ID, user name, cell-phone number etc. as use
The authorization code information at family can thus determine all of the data cell body as ownership information according to ownership information
Power and control ownership.
State characterizing gene is used to describe the current state of data cell body;State characterizing gene includes: data cell body
The current propagation depth information of current propagation width information and data cell body.It, can be with data as context information
The state change of cell body and change.In program implement, integer class is can be used in current propagation width information, when
Integer class can be used in preceding propagation depth information.
System control gene is for carrying out system control.System control gene includes the asynchronous association for matching command result
Discuss the sequence number of command frame and the activation gateway for verifying identification.In program implement, the sequence of asynchronous protocol command frame
Integer class can be used in row number, and integer class can be used in activation gateway.
To sum up, data cell body of the invention not only includes data to be transmitted, further includes the attribute information of these data, is led to
Crossing attribute information makes data have vitality, and then achievable more bionical operations.
The present embodiment handles traditional file, so that file itself is had certain management function, and user makes every time
The permission of management terminal must be all obtained with file, the file after duplication and propagation still needs to pay the fees and manage eventually when in use
The permission at end, thus effective protection copyright.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with other
The difference of embodiment, the same or similar parts in each embodiment may refer to each other.For device disclosed in embodiment
For, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place is said referring to method part
It is bright.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure
And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and
The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These
Function is implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Profession
Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered
Think beyond the scope of this invention.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor
The combination of capable software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only deposit
Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology
In any other form of storage medium well known in field.
Above embodiments only technical concepts and features to illustrate the invention, its object is to allow person skilled in the art
Scholar can understand the contents of the present invention and implement accordingly, can not limit the scope of the invention.It is all to be wanted with right of the present invention
The equivalent changes and modifications that range is done are sought, should belong to the covering scope of the claims in the present invention.
Claims (10)
1. a kind of charging method of file paid utilization, which is characterized in that file is all for management terminal, and user terminal can be used
The file, every time using the file when execute following step:
S1, the user terminal send Fileview and request to the management terminal, and the management terminal checks that the user is whole
End whether charges paid;
S2, if it is not, the user terminal show payment channel information, pass through the payment channel information complete payment;
If S3, the user terminal charges paid, the management terminal sends the corresponding key of file encryption node to the user
Terminal, the user terminal check the corresponding file content of the encryption node according to the key;Wherein the file is divided into
Multiple portions, the corresponding encryption node in each part, each encryption node are correspondingly arranged key.
2. the charging method of file paid utilization according to claim 1, which is characterized in that described in the step S2
User terminal display payment channel information includes: that the payment channel letter for including is shown in the user terminal in the file
Breath;Or the payment channel information that the management terminal is sent is shown on the user terminal;
The payment channel information is bank account information or Third-party payment platform information.
3. the charging method of file paid utilization according to claim 1, which is characterized in that managed described in the step S3
It includes: that the management terminal is set according to payment amount that reason terminal, which sends the corresponding key of file encryption node to the user terminal,
Key after setting is sent to the user terminal by effective degree or the effective time for setting the key;
The user terminal checks that the corresponding file content of the encryption node includes: that the user terminal exists according to the key
The effective degree of the key checks the corresponding file content of the encryption node in effective time.
4. the charging method of file paid utilization according to claim 1, which is characterized in that the key is that dynamic is close
Key, the key generated every time are different from, and include the proving program for verifying the dynamic key in the file;Or
Each corresponding group key of the user terminal, and the key of each user terminal is different.
5. the charging method of file paid utilization according to claim 1, which is characterized in that the file of the user terminal
Administration authority to the managing terminal open, the management terminal changes the right to use of the file by sending control instruction
Limit, the access right include that at least one of can be used, be forbidden to use, can replicate, forbidding duplication.
6. the charging method of file paid utilization according to claim 1, which is characterized in that after the step S3 also
Include:
S41, the user terminal recording and sending file use information to the management terminal, the file use information include
User information, receive client information, using temporal information, use location information, modification information, operation note information, isochronous audio
One of information, synchronization video information are a variety of;
S42, the management terminal judge the use for illegally using the file according to the file use information and paying information
Family terminal;
S43, the user terminal for illegally using the file if it exists, the management terminal will illegally use the user terminal of file
It pipes off, or sends and be forbidden to use instruction to the user terminal.
7. the charging method of file paid utilization according to claim 1, which is characterized in that the key is that encryption is close
Key, and invisible in the user terminal, the file of the user terminal after receiving encryption key automatically decryption obtain it is close
Key.
8. the charging method of file paid utilization according to claim 1, which is characterized in that the file includes data sheet
Body and data chromosome;The body of data is data to be transmitted;The data chromosome is that the attribute of the body of data is believed
Breath, the data chromosome include:
For indicating the identity gene of the data cell body identity information;
For indicating the internal feature gene of the data cell body internal data state;
For describing the vital signs gene of the vital signs of the data cell body;
For describing the state characterizing gene of the current state of the data cell body;
System for carrying out system control controls gene.
9. the charging method of file according to claim 8 paid utilization, which is characterized in that the identity gene includes:
The unique ID and MD5 digest information of the data cell body;
The internal feature gene includes: data type, MD5 digest value, character boundary value, text encoding format information, file
Extension name, creation time;
The vital signs gene includes: for limiting the authority information for checking permission of the data cell body, for limiting
The data cell body is checked that the propagation width information of range, the propagation for limiting the data cell body forwarding number of plies are deep
Spend information, the life information of the data cell body and the ownership information for limiting data ownership;
The authority information includes that owner is visible and allow search permission, owner visible and do not allow search permission, described
Data cell body producer and pre-set user are visible and allow search permission, the data cell body producer and pre-set user can
See and does not allow search permission;
The state characterizing gene includes: the current propagation width information of the data cell body and the data cell body
The current propagation depth information;
System control gene includes sequence number for matching the asynchronous protocol command frame of command result and knows for verifying
Other activation gateway.
10. the charging method of file paid utilization according to claim 1, which is characterized in that the file is document text
One or more of part, picture file, video file, audio file, web page files.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910318946.5A CN110162935A (en) | 2019-04-19 | 2019-04-19 | A kind of charging method of file paid utilization |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910318946.5A CN110162935A (en) | 2019-04-19 | 2019-04-19 | A kind of charging method of file paid utilization |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110162935A true CN110162935A (en) | 2019-08-23 |
Family
ID=67639680
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910318946.5A Pending CN110162935A (en) | 2019-04-19 | 2019-04-19 | A kind of charging method of file paid utilization |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110162935A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110727924A (en) * | 2019-09-30 | 2020-01-24 | 维沃移动通信有限公司 | Resource sharing method and first electronic device |
CN110971589A (en) * | 2019-10-31 | 2020-04-07 | 杭州来布科技有限公司 | File management method |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101118634A (en) * | 2007-09-19 | 2008-02-06 | 北京握奇数据系统有限公司 | Process for generating licenses and system thereof |
CN103377567A (en) * | 2012-04-23 | 2013-10-30 | 北大方正集团有限公司 | Method and device for reading digital electronic book |
US20140201526A1 (en) * | 2005-11-16 | 2014-07-17 | Shelia Jean Burgess | System, method, and apparatus for data, data structure, or encryption key cognition incorporating autonomous security protection |
CN104809366A (en) * | 2015-04-29 | 2015-07-29 | 小米科技有限责任公司 | Reading method and device of electronic book |
CN104851033A (en) * | 2015-01-20 | 2015-08-19 | 丁京华 | E-book multiparty transaction system |
CN109347897A (en) * | 2018-08-16 | 2019-02-15 | 朱小军 | A kind of center architected bionic data Transmission system |
-
2019
- 2019-04-19 CN CN201910318946.5A patent/CN110162935A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140201526A1 (en) * | 2005-11-16 | 2014-07-17 | Shelia Jean Burgess | System, method, and apparatus for data, data structure, or encryption key cognition incorporating autonomous security protection |
CN101118634A (en) * | 2007-09-19 | 2008-02-06 | 北京握奇数据系统有限公司 | Process for generating licenses and system thereof |
CN103377567A (en) * | 2012-04-23 | 2013-10-30 | 北大方正集团有限公司 | Method and device for reading digital electronic book |
CN104851033A (en) * | 2015-01-20 | 2015-08-19 | 丁京华 | E-book multiparty transaction system |
CN104809366A (en) * | 2015-04-29 | 2015-07-29 | 小米科技有限责任公司 | Reading method and device of electronic book |
CN109347897A (en) * | 2018-08-16 | 2019-02-15 | 朱小军 | A kind of center architected bionic data Transmission system |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110727924A (en) * | 2019-09-30 | 2020-01-24 | 维沃移动通信有限公司 | Resource sharing method and first electronic device |
CN110727924B (en) * | 2019-09-30 | 2022-03-04 | 维沃移动通信有限公司 | Resource sharing method and first electronic device |
CN110971589A (en) * | 2019-10-31 | 2020-04-07 | 杭州来布科技有限公司 | File management method |
WO2021082996A1 (en) * | 2019-10-31 | 2021-05-06 | 杭州来布科技有限公司 | File management method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7436568B2 (en) | Methods and systems realized by blockchain | |
JP4155393B2 (en) | File exchange apparatus, personal information registration / introduction server, transmission control method, and program | |
US6990684B2 (en) | Person authentication system, person authentication method and program providing medium | |
CN102724204B (en) | Secure and trusted capability opening platform | |
US7096363B2 (en) | Person identification certificate link system, information processing apparatus, information processing method, and program providing medium | |
US20070226811A1 (en) | Processing Rights In Drm Systems | |
US20020026581A1 (en) | Content distribution system, a content distribution method, an information processing apparatus, and a program providing medium | |
US20130275765A1 (en) | Secure digital document distribution with real-time sender control of recipient document content access rights | |
CN114513533A (en) | Classified and graded fitness and health big data sharing system and method | |
JPH08263441A (en) | System for safe distribution and control of digital work andits control method | |
WO2006107185A1 (en) | Domain management method and domain context of users and devices based domain system | |
CN106295330B (en) | Call the control device and method of API | |
JP2003202932A (en) | Method for controlling execution of computer program | |
JPH08272746A (en) | System for control of distribution and use of digital work with charge notification mechanism and charge notification method | |
CN113326541B (en) | Cloud edge collaborative multi-mode private data transfer method based on intelligent contract | |
CN102436562B (en) | Medical image stores safely the method with transmission | |
CN109634619A (en) | Credible performing environment implementation method and device, terminal device, readable storage medium storing program for executing | |
CN101930516B (en) | Method for using license of embedded equipment | |
CN109255210A (en) | The method, apparatus and storage medium of intelligent contract are provided in block chain network | |
CN110619222A (en) | Authorization processing method, device, system and medium based on block chain | |
CN110162935A (en) | A kind of charging method of file paid utilization | |
CN102801704A (en) | Method for providing multimedia data via communication network and playing the multimedia data | |
JP2004530230A (en) | How to manage access and use of resources by checking conditions and conditions used with them | |
JP2004110197A (en) | Information processing method and method of managing access authority for use at center system | |
WO2024093274A1 (en) | Permission control method and apparatus for nft circulation data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190823 |
|
RJ01 | Rejection of invention patent application after publication |