CN110401677A - Acquisition methods, device, storage medium and the electronic equipment of digital publishing rights key - Google Patents
Acquisition methods, device, storage medium and the electronic equipment of digital publishing rights key Download PDFInfo
- Publication number
- CN110401677A CN110401677A CN201910782454.1A CN201910782454A CN110401677A CN 110401677 A CN110401677 A CN 110401677A CN 201910782454 A CN201910782454 A CN 201910782454A CN 110401677 A CN110401677 A CN 110401677A
- Authority
- CN
- China
- Prior art keywords
- key
- digital publishing
- publishing rights
- acquisition request
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/103—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for protecting copy right
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
This application discloses acquisition methods, device, electronic equipment and the media of a kind of digital publishing rights key.Wherein, in the application, cipher key acquisition request is sent to server;Wherein, the device identification of the cipher key acquisition request carried terminal equipment;It receives the server and obtains response in response to the key that the cipher key acquisition request is sent;It parses the key acquisition response and obtains the digital publishing rights key, and store the digital publishing rights key.So as to avoid, when terminal device does not carry digital publishing rights key, needing to return on terminal device present in the relevant technologies to the problem of manually rewriting at Xian Xia manufacturer.
Description
Technical field
This application involves copyright protection field more particularly to a kind of acquisition methods of digital publishing rights key, device, storage Jie
Matter and electronic equipment.
Background technique
With communication with society development, smart electronics terminal with more and more people use and it is extensive
Development.
Further, it in order to meet the viewing demands of most users, is usually needed on intelligent terminal preset
Widevine key information.Wherein, widevine is a kind of DRM digital rights management function, can be from manufacturer by the function
On specified server, downloading by manufacturer encryption rights file, such as video, using etc..Widevine encryption technology
Working principle be to establish data grant center.It is encrypted using widevine key, user is playing network video
When, it can be decrypted by sending out relevant key after the verifying authorization at data grant center, content can play.Due to every end
The widevine Key data of end equipment are unique.Therefore it may be implemented that video to be protected is needed to be encrypted, even if by user
Downloading saves, and the verifying authorization for not obtaining data grant center can not also play, to closely protect the copyright of video.
However, in the related technology when smart machine when leaving the factory carelessness etc. due to cause it is not preset in advance
When widevine key, then need for smart machine to be back at manufacturer carry out line under reset widevine key, thus greatly
Expend the time.
Summary of the invention
The embodiment of the present application provides acquisition methods, device, storage medium and the electronic equipment of digital publishing rights key, can be with
Solving the relevant technologies, by the way that bring is written under line, time-consuming and at high cost when digital publishing rights key missing in terminal device
Problem.The technical solution is as follows:
In a first aspect, the embodiment of the present application provides a kind of acquisition methods of digital publishing rights key, which comprises
Cipher key acquisition request is sent to server;Wherein, the device identification of the cipher key acquisition request carried terminal equipment;
It receives the server and obtains response in response to the key that the cipher key acquisition request is sent;Wherein, the key
It obtains response and carries digital publishing rights key;
It parses the key acquisition response and obtains the digital publishing rights key, and store the digital publishing rights key.
Second aspect, the embodiment of the present application provide a kind of acquisition methods of digital publishing rights key, comprising:
Receive the cipher key acquisition request from terminal device;Wherein, the cipher key acquisition request carries setting for the terminal
Standby mark;
It parses the cipher key acquisition request and obtains the device identification, and inquiry and the associated number of the device identification
Copyright key.
Key, which is sent, to the terminal device obtains response;Wherein, the cipher key acquisition request carries the digital publishing rights
Key.
The third aspect, the embodiment of the present application provide a kind of acquisition device of digital publishing rights key, the acquisition device packet
It includes:
Transmit-Receive Unit, for sending cipher key acquisition request to server;Wherein, the cipher key acquisition request carried terminal is set
Standby device identification;
The Transmit-Receive Unit is also used to receive the server and obtains in response to the key that the cipher key acquisition request is sent
Response;Wherein, the key obtains response and carries digital publishing rights key;
Processing unit obtains the digital publishing rights key for parsing the key acquisition response, and storage will be described
Digital publishing rights key.
Fourth aspect, the embodiment of the present application provide a kind of acquisition device of digital publishing rights key, comprising:
Transmit-Receive Unit, for receiving the cipher key acquisition request from terminal device;Wherein, the cipher key acquisition request carries
The device identification of the terminal;
Processing unit obtains the device identification, and inquiry and the equipment for parsing the cipher key acquisition request
Identify associated digital publishing rights key.
The Transmit-Receive Unit is also used to send key acquisition response to the terminal device;Wherein, the key acquisition is asked
It asks and carries the digital publishing rights key.
5th aspect, the embodiment of the present application provide a kind of computer storage medium, and the computer storage medium is stored with
A plurality of instruction, described instruction are suitable for being loaded by processor and executing above-mentioned method and step.
6th aspect, the embodiment of the present application provide a kind of electronic equipment, it may include: processor and memory;Wherein, described
Memory is stored with computer program, and the computer program is suitable for being loaded by the processor and being executed above-mentioned method step
Suddenly.
The technical solution bring beneficial effect that some embodiments of the application provide includes at least:
Terminal to server sends cipher key acquisition request, the device identification of cipher key acquisition request carried terminal equipment, key
Acquisition request is used to request the associated digital publishing rights key of device identification to server, and server is based on key and obtains response to end
End equipment sending device identifies associated digital publishing rights key.It, can be in terminal device by the technical solution of application the application
Portion is there are when digital publishing rights key, and the server of Xiang Yuancheng requests digital publishing rights key, so as to avoid existing in the related technology
In terminal device when digital publishing rights key is not present, need to return to equipment to manually being rewritten at Xian Xia manufacturer
The problem of, the embodiment of the present application can reduce the cost of maintenance digital publishing rights key.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of application for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 is a kind of network architecture diagram provided by the embodiments of the present application;
Fig. 2 is the flow diagram of the acquisition methods of digital publishing rights key provided by the embodiments of the present application;
Fig. 3 is another flow diagram of the acquisition methods of digital publishing rights key provided by the embodiments of the present application;
Fig. 4 is a kind of structural schematic diagram of acquisition device provided by the embodiments of the present application;
Fig. 5 is the structural schematic diagram of a kind of electronic equipment provided by the embodiments of the present application.
Specific embodiment
To keep the purposes, technical schemes and advantages of the application clearer, below in conjunction with attached drawing to the embodiment of the present application
Mode is described in further detail.
Fig. 1 shows the acquisition methods or digital publishing rights key that can apply the digital publishing rights key of the embodiment of the present application
The schematic diagram of the exemplary system architecture 100 of acquisition device.
As shown in Figure 1, system architecture 100 may include one of terminal device 101,102,103 or a variety of, network
104 and server 105.Network 104 between terminal device 101,102,103 and server 105 to provide communication link
Medium.Network 104 may include various types of wired communications links or wireless communication link, such as: wired communications links packet
Optical fiber, twisted pair or coaxial cable are included, wireless communication link includes bluetooth communications link, Wireless Fidelity (WIreless-
FIdelity, Wi-Fi) communication link or microwave communications link etc..
It should be understood that the number of terminal device, network and server in Fig. 1 is only schematical.According to realization need
It wants, can have any number of terminal device, network and server.For example server 105 can be multiple server compositions
Server cluster etc..
User can be used terminal device 101,102,103 and be interacted by network 104 with server 105, to receive or send out
Send message etc..Terminal device 101,102,103 can be the various electronic equipments with display screen, including but not limited to intelligent hand
Machine, tablet computer, portable computer and desktop computer etc..
Terminal device 101,102,103 in the application can be to provide the terminal device of various services.Such as user is logical
Cross terminal device 103 (being also possible to terminal device 101 or 102)
Wherein, various communication customer end applications can be installed on terminal device 101~103, such as: video record is answered
With the application of, video playing, interactive voice application, searching class application, timely means of communication, mailbox client, social platform software
Deng.
Terminal device 101~103 can be the various terminal equipment with display screen, including but not limited to smart phone,
Tablet computer, laptop portable computer and desktop computer etc..Wherein, display screen can be cathode-ray tube display
(cathode ray tubedisplay, abbreviation CR), light emitting diode indicator (light-emitting diode
Display, abbreviation LED), electronic ink screen, liquid crystal display (liquid crystal display, abbreviation LCD), plasma
Display panel (plasma display panel, abbreviation PDP) etc..User can use first terminal equipment 100 and second eventually
Display equipment in end equipment 104, come information such as the texts, picture, video of checking display.
Server 105 can be to provide the server of various services, and server 105 can be hardware, be also possible to software.
When server 105 is hardware, the distributed server cluster of multiple server compositions may be implemented into, list also may be implemented into
A server.When server 105 is software, multiple softwares or software module may be implemented into (such as providing distribution
Service), single software or software module also may be implemented into, be not specifically limited herein.
Wherein, to include: terminal device send key to server to the interactive process in Fig. 1 between terminal device and server
Acquisition request, cipher key acquisition request can be with the device identifications of carried terminal equipment, and cipher key acquisition request is for requesting digital publishing rights
Key, server receive the cipher key acquisition request from terminal device, the equipment that parsing cipher key acquisition request obtains terminal device
Mark, query facility identify associated digital publishing rights key, then send key to terminal device and obtain response, terminal device solution
It analyses the key acquisition response from server and obtains digital publishing rights key, digital publishing rights key is written to memory by terminal device
In.
It should be understood that the number of terminal device, network and server in Fig. 1 is only illustrative.It, can according to needs are realized
To be any number of terminal device, network and server.
Below in conjunction with attached drawing 2- attached drawing 5, to the acquisition methods sum number of digital publishing rights key provided by the embodiments of the present application
The acquisition device of letter power key describes in detail.
Fig. 2 is referred to, a kind of flow diagram of the acquisition methods of digital publishing rights key is provided for the embodiment of the present application.
As shown in Fig. 2, the embodiment of the present application the method may include following steps:
S201, terminal device send cipher key acquisition request to server, and server receives the key from terminal device and obtains
Take request.
Wherein, cipher key acquisition request is used to provide media content for obtaining digital publishing rights key, digital publishing rights key
The media file of person's publication carries out copyright protection, and media file includes but is not limited to audio file, video file or picture etc.;No
Same equipment has different digital publishing rights keys.It can be with the device identification of carried terminal equipment, equipment in cipher key acquisition request
Mark is used for the identity of unique identification terminal device, and different equipment has different device identifications, and device identification can be state
Border mobile device identification code (international mobile equipment identity, IMEI).
In one or more embodiments, digital publishing rights key can be widevine key, wherein widevine is one
Kind DRM digital copyright management solution.At present site for service such as Yutube, Netflix of many video classes, HBO,
Disney video service website and video display company all use this technical protection copyright side from pirate infringement.Google, three
Also there is corresponding hardware supported in the ODM such as star, Intel, SONY, LG, Realme manufacturer.
The working principle of widevine encryption technology is to establish data grant center.It is encrypted, is used using key
Family, according to the KeyID and URL information on video head, can be awarded when playing network video by the verifying at data grant center
Relevant key decryption is sent out after power, content can play.It needs video to be protected to be encrypted, is saved even if being downloaded by user,
The verifying authorization for not obtaining data grant center can not also play, to closely protect the copyright of video.What is used is close
Key has two, and one public key, and one private key;Public key is used for encrypted video content itself, and private key is for decrypting video.
Further, carrying private key information to be preset to the data of terminal device is then widevine Key, and every terminal is set
Standby Key data are unique.Since the encipherment scheme of widevine, domestic market pin are not applied in internal video website
The complete machine sold is not necessarily to preset Key, but the mobile phone for selling on overseas market, then has to preset widevineKey
Video content on the video providers such as energy normal play Yutube, Netflix.Manufacturer can be before factory to need under normal conditions
The mobile phone of export trade is wanted to carry out the preset of widevineKey.
In one or more embodiments, the type of message of cipher key acquisition request can be hypertext transfer protocol
(hypertext transfer protocol), User Datagram Protocol (user datagram protocol, UDP) message,
Transmission control protocol (transmission control protocol, TCP) message.Carried terminal is removed in cipher key acquisition request
Except the device identification of equipment, it can also carry APPID (application program identification and main key), APPID is the mark of application program,
Main key and APPID have a corresponding relationship, and main key can be what APPID obtain after hash algorithm, and APPID and main key can be
What the developer of application program applied on the server in advance, server verifies the legal of application program according to APPID and main key
Property.
In one or more embodiments, terminal device can be encrypted and be signed to device identification, be set for guaranteeing
The safety of standby mark and the legitimacy in source, the method for encryption can be symmetric cryptography and/or asymmetric encryption, the side of signature
Method can use hash algorithm.Such as: terminal using Advanced Encryption Standard (advanced encryption standard,
AES) algorithm and RSA cryptographic algorithms encrypt device identification, and encrypted device identification is sent to server.
In one or more embodiments, before S201, further includes:
Terminal device is detected there is no when digital publishing rights key, sends cipher key acquisition request to server;Or
Terminal device detection digital publishing rights cipher key integrity verification is obstructed out-of-date, sends cipher key acquisition request to server.
Further, terminal device is before sending cipher key acquisition request, can also monitor terminal device and server it
Between network communication quality, when network communication quality meets preset condition, Cai Huixiang server send cipher key acquisition request.Net
Network communication quality includes but is not limited to time delay, packet loss, bandwidth etc..
Such as: when terminal device monitors that the time delay between terminal device and server is less than 5ms, sent to server close
Key acquisition request;
Another example is: when terminal device monitors the packet loss between terminal device and server less than 0.01%, to service
Device sends cipher key acquisition request.
Another example is: being sent when terminal device detects that the band between terminal device and server is wider than 50M to server
Cipher key acquisition request.
S202, server parsing cipher key acquisition request obtain device identification.
In general, cipher key acquisition request includes message header and message body, message header includes message-length, protocol type, IP
The parameters such as five-tuple, include the data for being actually subjected to send in message body, and server can parse in message body to be obtained terminal and set
Standby device identification.
Wherein, the device identification of terminal device be encryption after ciphertext, server can to encrypted device identification into
Row decryption, the process of decryption and the ciphering process of terminal device are opposite processes, and details are not described herein again.
S203, server inquiry and the associated digital publishing rights key of device identification.
Wherein, server is pre-stored with the mapping relations between device identification and digital publishing rights key, different equipment marks
Knowledge is associated with different digital publishing rights keys.Such as: it is deployed with database in server, includes that multiple equipment identifies in database
With the associated digital publishing rights key of each device identification, server is according to the device identification of the terminal device in S201 in database
In inquired, obtain the associated digital publishing rights key of the device identification.
In one or more embodiments, the digital publishing rights key inquired can be encrypted and be signed by server,
To guarantee the legitimacy of safety and source of the digital publishing rights key in transmission process, server can be based on symmetric cryptography
And/or asymmetric encryption encrypts digital publishing rights key to obtain encrypted digital publishing rights key.Server can be used
Hash algorithm signs to encrypted digital publishing rights key, guarantees to distort in data transmission procedure.
S204, server send cipher key acquisition request to terminal device, and terminal device receives the key from server and obtains
Take request.
Wherein, key obtains and carries digital publishing rights key in response, which can be by encryption and signature
Processing, the type of message that key obtains response can be with HTTP message, TCP message or UDP message or other kinds of message, this
Apply for embodiment with no restriction.
When being executed, terminal to server sends cipher key acquisition request, cipher key acquisition request to the scheme of the embodiment of the present application
The device identification of carried terminal equipment, cipher key acquisition request are used for close to the server request associated digital publishing rights of device identification
Key, server are based on key and obtain response to the associated digital publishing rights key of terminal device sending device mark.Originally by application
The technical solution of application, can be in terminal device portion there are when digital publishing rights key, and the server of Xiang Yuancheng requests digital publishing rights
Key needs so as to avoid when digital publishing rights key is not present in terminal device in the middle present in the relevant technologies by equipment weight
Newly be back to the problem of manually being rewritten Xian Xia manufacturer at, the embodiment of the present application can reduce safeguard digital publishing rights key at
This.
Fig. 3 is referred to, a kind of flow diagram of the acquisition methods of digital publishing rights key is provided for the embodiment of the present application.
The present embodiment is applied to come between terminal device and server for example, the digital publishing rights in the method for digital publishing rights key
The acquisition methods of key may comprise steps of:
Digital publishing rights key is not present in S301, terminal device detection.
In one or more embodiments, the designated position inspection that terminal device can be when monitoring booting in memory
It surveys and whether there is digital publishing rights key, if it is, executing the subsequent process to server request digital publishing rights key.
In one or more embodiments, terminal device can receive user and broadcast for the media file of application program
When putting operation, the digital publishing rights key there are the application program is detected whether, different application programs has different digital versions
Key is weighed, the multiple application programs installed on the same terminal device are respectively necessary for distributing different digital publishing rights keys, different
Terminal device have different digital publishing rights keys.
S302, random key is generated.
Wherein, the random key that random algorithm generates a designated length can be used in terminal device, and random key is used for
Progress symmetric cryptography, random key can be disposable key, carry out requiring to generate before symmetric cryptography one every time newly
Random key.
S303, device identification is encrypted using random key to obtain the first ciphertext.
Wherein, terminal device obtains device identification, and device identification can be IMEI, and terminal device is based on symmetric encipherment algorithm
Device identification is encrypted based on random key to obtain the first ciphertext, such as: symmetric encipherment algorithm is AES encryption algorithm, AES
Ciphering process can be mainly divided into following several operations, be byte substitution respectively, row displacement, column obscure and InvAddRoundKey.Decryption
Process is respectively corresponding inverse operation.Since every single stepping is all reversible, being decrypted in a reverse order can be extensive
Recover lost eyesight text.The key of every wheel is extended to obtain by initial key respectively in encryption and decryption.The plaintext of 16 bytes, ciphertext and wheel in algorithm
Key is all indicated with the matrix of a 4x4.Terminal device encrypts device identification using random key to obtain the first ciphertext,
First ciphertext, that is, encrypted device identification.
S304, random key is encrypted using server public key to obtain the second ciphertext.
Wherein, server public key and privacy key are that a pair for asymmetric encryption that server is issued in advance is close
Key, server public key be on network it is disclosed, privacy key cannot disclose, and be retained by server.Terminal device can be
Server public key is obtained in the digital certificate of server publication, or obtains server public key by other means, server public key
With no restriction with generation method the embodiment of the present application of privacy key.Terminal device using server public key in S302 with
Secret key is encrypted to obtain the second ciphertext, the second ciphertext, that is, encrypted random key.Rivest, shamir, adelman can be
RSA, des encryption algorithm (data encryption standard algorithm Data Encryption Standard) and IDEA encryption algorithm are (international
Data encryption algorithm International Data Encryption Algorithm) etc..
S305, device identification and random key are signed to obtain the first signature.
Wherein, terminal device can merge device identification and random key, and combined method may is that equipment
Mark is spliced to behind random key, or random key is spliced to behind device identification, random key and equipment mark
Preset mark position can be used between knowledge to be isolated.Signature is for being converted to fixation for the device identification after merging and random key
The character string of length avoids device identification and random key from distorting in transmission process.The signature of the embodiment of the present application is calculated
Method can not depend on private key, directly by the device identification and random key progress Hash operation after merging, such as: signature algorithm is
MD5 (message-digest algorithm, Message Digest 5).
S306, cipher key acquisition request is generated according to the first ciphertext, the second ciphertext and the first signature.
Wherein, cipher key acquisition request may include message header and message body, and the first ciphertext, the second ciphertext are carried in message body
With the first signature, message header is for carrying the parameters such as length, protocol type, the IP five-tuple of cipher key acquisition request.
In one or more embodiments, cipher key acquisition request further includes APPID and main key, the explanation of APPIID and main key
It can refer to the explanation in the embodiment of Fig. 2, terminal device can sign APPID, random key, device identification and main key
The first signature is obtained, then terminal device is based on the first ciphertext, the second ciphertext, the first signature, APPID and main key and generates key hair
Send request.
S307, terminal device send cipher key acquisition request to server.
In general, terminal device can monitor terminal device and service before sending cipher key acquisition request to server
Communication network quality between device sends cipher key acquisition request to server, leads to when communication network quality meets preset condition
Communication network quality includes one of time delay, bandwidth and packet loss or a variety of.
S308, server parsing cipher key acquisition request obtain the first ciphertext, the second ciphertext and the first signature.
Wherein, server parsing cipher key acquisition request obtains the first ciphertext, the second ciphertext and first is signed, the first ciphertext,
Second ciphertext and the generating process of the first signature can refer to the description of S301~S307.
S309, the second ciphertext is decrypted to obtain random key using privacy key.
Wherein, server is pre-stored with privacy key, and the server public key in privacy key and S304 partners
For the key pair of asymmetric encryption, server is decrypted to obtain random key using privacy key to the second ciphertext.
S310, the first ciphertext is decrypted to obtain device identification using random key.
Wherein, random key obtained in server by utilizing S309 is decrypted to obtain device identification to the first ciphertext, if
Standby mark can be IMEI.
S311, device identification and random key are signed to obtain the second signature.
Wherein, server signs to random key obtained in S309 and S310 and device identification based on hash algorithm
The second signature is obtained, the type of the hash algorithm in S311 is identical with the type of the hash algorithm in S305.Such as: in S305 eventually
End equipment MD5 signs, and server is also signed using MD5 in S311.
S312, the first signature of verifying and the second signature are identical.
Wherein, whether the signature of server authentication first and the second signature are identical, if they are the same, show random key and equipment mark
Knowledge is not distorted in transmission process, executes S313;If server authentication first signature and second signature it is not identical, show with
Secret key and device identification are distorted in transmission process, and server returns to miscue information to terminal device, and mistake mentions
Show information for indicating that random key and/or device identification are distorted, instruction terminal equipment is retransmitted.
S313, inquiry and the associated digital publishing rights key of device identification.
Wherein, server is stored with the mapping relations between device identification and digital publishing rights key, different device identifications
It is mapped with different digital publishing rights keys, such as: it is deployed with database in server, multiple equipment mark is stored in database
With the respective associated digital publishing rights key of each device identification, equipment of the server according to being parsed in cipher key acquisition request
Mark inquires associated digital publishing rights key in the database.
S314, digital publishing rights key and random key are signed to obtain third signature.
Wherein, server merges digital publishing rights key and random key, and combined method may is that digital version
Power key is spliced to random key behind, or random key is spliced to behind digital publishing rights key, random key with
Default indicator can be used between digital publishing rights key to be isolated.Server using signature algorithm by digital publishing rights key and
Random key is signed, and the signature algorithm of the embodiment of the present application can not use private key, will directly be merged using hash algorithm
Digital publishing rights key and random key afterwards carries out Hash budget and obtains the character string of a regular length as third signature.
S315, digital publishing rights key is encrypted using random key to obtain third ciphertext.
Wherein, server uses the random key that parses in cipher key acquisition request to carry out pair digital publishing rights key
Claim encryption, the algorithm of symmetric cryptography can be the symmetric encipherment algorithm of AES encryption algorithm or other forms, and the embodiment of the present application is not
It is restricted.
S316, random key is encrypted using client public key to obtain the 4th ciphertext.
Wherein, client public key and client private key are that a pair that terminal device generates is used for the key of asymmetric encryption
Right, terminal device generates method the embodiment of the present application of the key pair with no restriction, and client public key is disclosed, client private
Key is then the underground key that terminal device retains, the client public key of the available terminal device publication of server, service
Device encrypts the random key parsed in cipher key acquisition request using client public key, obtains third ciphertext.
S317, key acquisition response is generated according to third signature, third ciphertext and the 4th ciphertext.
Wherein, it includes message header and message body that key, which obtains response, may include in message body third signature, third ciphertext and
4th ciphertext.The type of message that key obtains response can be HTTP message, TCP message or UDP message.
S318, server send key to terminal device and obtain response.
S319, parsing key obtain response and obtain third ciphertext, the 4th ciphertext and third signature.
Wherein, server parsing from the message body that key obtains response obtains third ciphertext, the 4th ciphertext and third label
Name.
S320, the 4th ciphertext is decrypted to obtain random key using client private key.
Wherein, terminal device is pre-stored with client private key, and client private key and client public key are a pair of for non-right
Claim the key pair of encryption, terminal device is decrypted to obtain random key using client private key to the 4th ciphertext.
S321, third ciphertext is decrypted using random key to obtain digital publishing rights key.
Wherein, terminal device is decrypted to obtain digital version using the random key decrypted in S320 to third ciphertext
Weigh key.
S322, digital publishing rights key and random key are signed to obtain the 4th signature.
Wherein, terminal device is close to the random key and digital publishing rights decrypted in S320 and S321 using signature algorithm
Key merges, and combined method is identical with merging method used in S314, terminal device using signature algorithm to merging after
Random key and digital publishing rights key signed to obtain the 4th signature, sign used in the type and S314 of signature algorithm
Algorithm is identical.
S323, verifying third signature and the 4th signature are identical.
Wherein, terminal device verifying third signature and the 4th signature it is whether identical, if they are the same, show server send with
Secret key and/or digital publishing rights key are not distorted in transmission process, execute S324;If not identical, show random key
And/or digital publishing rights key is distorted in transmission process, terminal device can send miscue information to server, refer to
Show that server retransmits digital publishing rights key and random key.
S324, storage digital publishing rights key.
Wherein, terminal device verify third signature it is identical with third signature when, the digital version that will be parsed in S321
Power key is written in nonvolatile memory.
When being executed, terminal to server sends cipher key acquisition request, cipher key acquisition request to the scheme of the embodiment of the present application
The device identification of carried terminal equipment, cipher key acquisition request are used for close to the server request associated digital publishing rights of device identification
Key, server are based on key and obtain response to the associated digital publishing rights key of terminal device sending device mark.Originally by application
The technical solution of application, can be in terminal device portion there are when digital publishing rights key, and the server of Xiang Yuancheng requests digital publishing rights
Key needs so as to avoid when digital publishing rights key is not present in terminal device in the middle present in the relevant technologies by equipment weight
Newly be back to the problem of manually being rewritten Xian Xia manufacturer at, the embodiment of the present application can reduce safeguard digital publishing rights key at
This.
Following is the application Installation practice, can be used for executing the application embodiment of the method.It is real for the application device
Undisclosed details in example is applied, the application embodiment of the method is please referred to.
In another embodiment of the application, as shown in figure 4, the application also provides a kind of digital publishing rights key
Acquisition device, the acquisition device include Transmit-Receive Unit 401 and processing unit 402.
Embodiment A:
Transmit-Receive Unit 401, for sending cipher key acquisition request to server;Wherein, the cipher key acquisition request carries eventually
The device identification of end equipment.
The Transmit-Receive Unit 401 is also used to receive the key that the server is sent in response to the cipher key acquisition request
Obtain response;Wherein, the key obtains response and carries digital publishing rights key;
Processing unit 402 obtains the digital publishing rights key for parsing the key acquisition response, and stores institute
State digital publishing rights key.
In one or more embodiments, processing unit 402 is also used to:
The device identification is encrypted, and the device identification based on encryption generates cipher key acquisition request.
In one or more embodiments, described that the device identification is encrypted, and the equipment mark based on encryption
Know and generate cipher key acquisition request, comprising:
Generate random key;
The device identification is encrypted using the random key to obtain the first ciphertext;
The random key is encrypted using server public key to obtain the second ciphertext;
It is signed the random key and the device identification to obtain the first signature;
The cipher key acquisition request is generated according to first ciphertext, second ciphertext and first signature.
It is in one or more embodiments, described to send cipher key acquisition request to server, comprising:
Monitor the network communication quality between the terminal device and the server;
When the network communication quality meets preset condition, by Transmit-Receive Unit 401 to described in server transmission
Cipher key acquisition request.
In one or more embodiments, the parsing key obtains response and obtains the digital publishing rights key, wraps
It includes:
It parses the key acquisition response and obtains third ciphertext, the 4th ciphertext and third signature;
The 4th ciphertext is decrypted to obtain random key using client private key;
The third ciphertext is decrypted using the random key to obtain the digital publishing rights key;
The digital publishing rights key and the random key are signed to obtain the 4th signature;
It is identical for verifying the third signature and the 4th signature.
Embodiment B:
Transmit-Receive Unit 401, for receiving the cipher key acquisition request from terminal device;Wherein, the cipher key acquisition request
Carry the device identification of the terminal.
Processing unit 402 obtains the device identification for parsing the cipher key acquisition request, and inquiry is set with described
It is standby to identify associated digital publishing rights key.
The Transmit-Receive Unit 401 is also used to send key acquisition response to the terminal device;Wherein, the key obtains
Request is taken to carry the digital publishing rights key.
In one or more embodiments, the parsing cipher key acquisition request obtains the device identification and includes:
It parses the cipher key acquisition request and obtains the first ciphertext, the second ciphertext and the first signature;
The second ciphertext is decrypted to obtain random key using privacy key;
Secret is carried out to first ciphertext using the random key and obtains the device identification;
The device identification and the random key are signed to obtain the second signature;
It is identical for verifying first signature and second signature.
In one or more embodiments, processing unit 402 is also used to:
The digital publishing rights key is encrypted, response is obtained based on encrypted digital publishing rights key production key.
In one or more embodiments, described that the digital publishing rights key is encrypted, it is based on encrypted number
Copyright key production key obtains response, comprising:
The digital publishing rights key and the random key are signed to obtain third signature;
The digital publishing rights key is encrypted to obtain third ciphertext using the random key;
The random key is encrypted using client public key to obtain the 4th ciphertext;
Key, which is generated, according to third signature, the third ciphertext and the 4th ciphertext obtains response.
It should be noted that acquisition device 4 provided by the above embodiment execute digital publishing rights key acquisition methods when,
Only the example of the division of the above functional modules, it in practical application, can according to need and by above-mentioned function distribution
It is completed by different functional modules, i.e., the internal structure of equipment is divided into different functional modules, it is described above to complete
All or part of function.In addition, the playback method embodiment of courseware provided by the above embodiment belongs to same design, embody
Realization process is detailed in embodiment of the method, and which is not described herein again.
Above-mentioned the embodiment of the present application serial number is for illustration only, does not represent the advantages or disadvantages of the embodiments.
Fig. 5 is a kind of electronic equipment structural schematic diagram provided by the embodiments of the present application, and electronic equipment can be end above-mentioned
End equipment or server, as shown in figure 5, the device includes: memory 502, processor 501, input unit 503, output device
504 and communication interface.
Memory 502 can be independent physical unit, can with processor 501, input unit 503 and output device 504
To be connected by bus.Together with memory 502, processor 501, input unit 503 also can integrate with output device 504,
Pass through hardware realization etc..
Memory 502 is used to store the program for realizing above method embodiment or Installation practice modules, processing
Device 501 calls the program, executes the method in figure 2 above and the embodiment of Fig. 3.
Input unit 502 includes but is not limited to keyboard, mouse, touch panel, camera and microphone;Output device includes
But it is limited to display screen.
For receiving and dispatching various types of message, communication interface includes but is not limited to wireless interface or wired connects communication interface
Mouthful.
Optionally, when passing through software realization some or all of in the distributed task dispatching method of above-described embodiment,
Device can also only include processor.Memory for storing program is located at except device, processor by circuit/electric wire with
Memory connection, for reading and executing the program stored in memory.
Processor can be central processing unit (central processing unit, CPU), network processing unit
The combination of (network processor, NP) or CPU and NP.
Processor can further include hardware chip.Above-mentioned hardware chip can be specific integrated circuit
(application-specific integrated circuit, ASIC), programmable logic device (programmable
Logic device, PLD) or combinations thereof.Above-mentioned PLD can be Complex Programmable Logic Devices (complex
Programmable logic device, CPLD), field programmable gate array (field-programmable gate
Array, FPGA), Universal Array Logic (generic array logic, GAL) or any combination thereof.
Memory may include volatile memory (volatile memory), such as access memory (random-
Access memory, RAM);Memory also may include nonvolatile memory (non-volatile memory), such as fastly
Flash memory (flash memory), hard disk (hard disk drive, HDD) or solid state hard disk (solid-state drive,
SSD);Memory can also include the combination of the memory of mentioned kind.
Wherein, processor 501 calls the program code in memory 502 for executing following steps:
The embodiment of the present application also provides a kind of computer program products comprising instruction, when it runs on computers
When, so that computer executes the voice data processing method provided by the above embodiment based on Key for Reference.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application
Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more,
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces
The form of product.
The application is referring to method, the process of equipment (system) and computer program product according to the embodiment of the present application
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
Claims (13)
1. a kind of acquisition methods of digital publishing rights key, which is characterized in that the described method includes:
Cipher key acquisition request is sent to server;Wherein, the device identification of the cipher key acquisition request carried terminal equipment;
It receives the server and obtains response in response to the key that the cipher key acquisition request is sent;Wherein, the key obtains
Response carries digital publishing rights key;
It parses the key acquisition response and obtains the digital publishing rights key, and store the digital publishing rights key.
2. the method according to claim 1, wherein the terminal to server send cipher key acquisition request it
Before, further includes:
The device identification is encrypted, and the device identification based on encryption generates cipher key acquisition request.
3. according to the method described in claim 2, it is characterized in that, described encrypt the device identification, and being based on
The device identification of encryption generates cipher key acquisition request, comprising:
Generate random key;
The device identification is encrypted using the random key to obtain the first ciphertext;
The random key is encrypted using server public key to obtain the second ciphertext;
It is signed the random key and the device identification to obtain the first signature;
The cipher key acquisition request is generated according to first ciphertext, second ciphertext and first signature.
4. according to claim 1 to method described in 3 any one, which is characterized in that described to send key acquisition to server
Request, comprising:
Monitor the network communication quality between the terminal device and the server;
When the network communication quality meets preset condition, Xiang Suoshu server sends the cipher key acquisition request.
5. according to the method described in claim 4, it is characterized in that, the parsing key obtains response and obtains the number
Copyright key, comprising:
It parses the key acquisition response and obtains third ciphertext, the 4th ciphertext and third signature;
The 4th ciphertext is decrypted to obtain random key using client private key;
The third ciphertext is decrypted using the random key to obtain the digital publishing rights key;
The digital publishing rights key and the random key are signed to obtain the 4th signature;
It is identical for verifying the third signature and the 4th signature.
6. a kind of acquisition methods of digital publishing rights key characterized by comprising
Receive the cipher key acquisition request from terminal device;Wherein, the cipher key acquisition request carries the equipment mark of the terminal
Know;
It parses the cipher key acquisition request and obtains the device identification, and inquiry and the associated digital publishing rights of the device identification
Key.
Key, which is sent, to the terminal device obtains response;Wherein, the cipher key acquisition request carries the digital publishing rights key.
7. according to the method described in claim 6, it is characterized in that, the parsing cipher key acquisition request obtains the equipment
Mark includes:
It parses the cipher key acquisition request and obtains the first ciphertext, the second ciphertext and the first signature;
The second ciphertext is decrypted to obtain random key using privacy key;
Secret is carried out to first ciphertext using the random key and obtains the device identification;
The device identification and the random key are signed to obtain the second signature;
It is identical for verifying first signature and second signature.
8. the method according to the description of claim 7 is characterized in that described send key acquisition response to the terminal device
Before, further includes:
The digital publishing rights key is encrypted, response is obtained based on encrypted digital publishing rights key production key.
9. according to the method described in claim 8, being based on it is characterized in that, described encrypt the digital publishing rights key
Encrypted digital publishing rights key production key obtains response, comprising:
The digital publishing rights key and the random key are signed to obtain third signature;
The digital publishing rights key is encrypted to obtain third ciphertext using the random key;
The random key is encrypted using client public key to obtain the 4th ciphertext;
Key, which is generated, according to third signature, the third ciphertext and the 4th ciphertext obtains response.
10. a kind of acquisition device of digital publishing rights key, which is characterized in that the acquisition device includes:
Transmit-Receive Unit, for sending cipher key acquisition request to server;Wherein, the cipher key acquisition request carried terminal equipment
Device identification;
The Transmit-Receive Unit is also used to receive the server and obtains in response to the key that the cipher key acquisition request is sent and rings
It answers;Wherein, the key obtains response and carries digital publishing rights key;
Processing unit obtains the digital publishing rights key for parsing the key acquisition response, and stores the number
Copyright key.
11. a kind of acquisition device of digital publishing rights key, which is characterized in that the acquisition device includes:
Transmit-Receive Unit, for receiving the cipher key acquisition request from terminal device;Wherein, described in the cipher key acquisition request carries
The device identification of terminal;
Processing unit obtains the device identification, and inquiry and the device identification for parsing the cipher key acquisition request
Associated digital publishing rights key.
The Transmit-Receive Unit is also used to send key acquisition response to the terminal device;Wherein, the cipher key acquisition request is taken
With the digital publishing rights key.
12. a kind of computer storage medium, which is characterized in that the computer storage medium is stored with a plurality of instruction, the finger
It enables and is suitable for being loaded by processor and being executed the method and step such as claim 1~9 any one.
13. a kind of electronic equipment characterized by comprising processor and memory;Wherein, the memory is stored with calculating
Machine program, the computer program are suitable for being loaded by the processor and being executed the method step such as claim 1~9 any one
Suddenly.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910782454.1A CN110401677B (en) | 2019-08-23 | 2019-08-23 | Method and device for acquiring digital copyright key, storage medium and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910782454.1A CN110401677B (en) | 2019-08-23 | 2019-08-23 | Method and device for acquiring digital copyright key, storage medium and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110401677A true CN110401677A (en) | 2019-11-01 |
CN110401677B CN110401677B (en) | 2022-05-17 |
Family
ID=68328897
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910782454.1A Active CN110401677B (en) | 2019-08-23 | 2019-08-23 | Method and device for acquiring digital copyright key, storage medium and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110401677B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111030827A (en) * | 2019-12-06 | 2020-04-17 | 深圳乐信软件技术有限公司 | Information interaction method and device, electronic equipment and storage medium |
CN111339501A (en) * | 2020-02-20 | 2020-06-26 | 百度在线网络技术(北京)有限公司 | Copyright protection method, device, equipment and medium based on block chain |
CN111741268A (en) * | 2020-06-30 | 2020-10-02 | 中国建设银行股份有限公司 | Video transmission method, device, server, equipment and medium |
CN112187726A (en) * | 2020-09-04 | 2021-01-05 | 宇龙计算机通信科技(深圳)有限公司 | Data transmission method, device, storage medium and terminal |
CN112235103A (en) * | 2020-09-30 | 2021-01-15 | 银盛支付服务股份有限公司 | Secure network communication method for dynamically generating secret key |
CN113572763A (en) * | 2021-07-22 | 2021-10-29 | 中国工商银行股份有限公司 | Data processing method and device, electronic equipment and storage medium |
CN114584299A (en) * | 2022-03-02 | 2022-06-03 | 中国建设银行股份有限公司 | Data processing method and device, electronic equipment and storage medium |
CN114584299B (en) * | 2022-03-02 | 2024-04-26 | 中国建设银行股份有限公司 | Data processing method, device, electronic equipment and storage medium |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101425898A (en) * | 2007-10-31 | 2009-05-06 | 上海交通大学 | Digital signature, method, system, device and generator for digital signature verification |
CN101958793A (en) * | 2010-03-03 | 2011-01-26 | 北京唐朝科技股份有限公司 | Double public key cryptograph identity identification, secrete key verification and digital signing integrated solution |
CN102281300A (en) * | 2011-08-24 | 2011-12-14 | 中国联合网络通信集团有限公司 | digital rights management license distribution method and system, server and terminal |
CN103218570A (en) * | 2011-11-08 | 2013-07-24 | 三星电子株式会社 | Apparatus and method of portable terminal for application data protection |
CN103649962A (en) * | 2011-05-02 | 2014-03-19 | 英赛瑟库尔公司 | System and method for protecting digital contents with digital rights management (DRM) |
CN104426649A (en) * | 2013-08-22 | 2015-03-18 | 中国电信股份有限公司 | Automatic secret key synchronization method and system, and secret key management platform |
CN105227300A (en) * | 2015-08-27 | 2016-01-06 | 北京百度网讯科技有限公司 | A kind of acquisition methods of key and system |
CN106033503A (en) * | 2015-03-19 | 2016-10-19 | 阿里巴巴集团控股有限公司 | Method, device and system of online writing application secret key into digital content equipment |
CN106535184A (en) * | 2016-10-18 | 2017-03-22 | 深圳市金立通信设备有限公司 | Key management method and system |
CN106603485A (en) * | 2016-10-31 | 2017-04-26 | 美的智慧家居科技有限公司 | Secret key negotiation method and device |
CN106941406A (en) * | 2017-05-02 | 2017-07-11 | 深圳奥联信息安全技术有限公司 | Identify-based encryption endorsement method, decryption sign test method and its device |
CN107070909A (en) * | 2017-04-01 | 2017-08-18 | 广东欧珀移动通信有限公司 | Method for sending information, message receiving method, apparatus and system |
CN107276756A (en) * | 2017-07-27 | 2017-10-20 | 深圳市金立通信设备有限公司 | A kind of method and server for obtaining root key |
CN107809311A (en) * | 2017-09-30 | 2018-03-16 | 飞天诚信科技股份有限公司 | The method and system that a kind of unsymmetrical key based on mark is signed and issued |
-
2019
- 2019-08-23 CN CN201910782454.1A patent/CN110401677B/en active Active
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101425898A (en) * | 2007-10-31 | 2009-05-06 | 上海交通大学 | Digital signature, method, system, device and generator for digital signature verification |
CN101958793A (en) * | 2010-03-03 | 2011-01-26 | 北京唐朝科技股份有限公司 | Double public key cryptograph identity identification, secrete key verification and digital signing integrated solution |
CN103649962A (en) * | 2011-05-02 | 2014-03-19 | 英赛瑟库尔公司 | System and method for protecting digital contents with digital rights management (DRM) |
CN102281300A (en) * | 2011-08-24 | 2011-12-14 | 中国联合网络通信集团有限公司 | digital rights management license distribution method and system, server and terminal |
CN103218570A (en) * | 2011-11-08 | 2013-07-24 | 三星电子株式会社 | Apparatus and method of portable terminal for application data protection |
CN104426649A (en) * | 2013-08-22 | 2015-03-18 | 中国电信股份有限公司 | Automatic secret key synchronization method and system, and secret key management platform |
CN106033503A (en) * | 2015-03-19 | 2016-10-19 | 阿里巴巴集团控股有限公司 | Method, device and system of online writing application secret key into digital content equipment |
CN105227300A (en) * | 2015-08-27 | 2016-01-06 | 北京百度网讯科技有限公司 | A kind of acquisition methods of key and system |
CN106535184A (en) * | 2016-10-18 | 2017-03-22 | 深圳市金立通信设备有限公司 | Key management method and system |
CN106603485A (en) * | 2016-10-31 | 2017-04-26 | 美的智慧家居科技有限公司 | Secret key negotiation method and device |
CN107070909A (en) * | 2017-04-01 | 2017-08-18 | 广东欧珀移动通信有限公司 | Method for sending information, message receiving method, apparatus and system |
CN106941406A (en) * | 2017-05-02 | 2017-07-11 | 深圳奥联信息安全技术有限公司 | Identify-based encryption endorsement method, decryption sign test method and its device |
CN107276756A (en) * | 2017-07-27 | 2017-10-20 | 深圳市金立通信设备有限公司 | A kind of method and server for obtaining root key |
CN107809311A (en) * | 2017-09-30 | 2018-03-16 | 飞天诚信科技股份有限公司 | The method and system that a kind of unsymmetrical key based on mark is signed and issued |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111030827A (en) * | 2019-12-06 | 2020-04-17 | 深圳乐信软件技术有限公司 | Information interaction method and device, electronic equipment and storage medium |
CN111339501A (en) * | 2020-02-20 | 2020-06-26 | 百度在线网络技术(北京)有限公司 | Copyright protection method, device, equipment and medium based on block chain |
CN111339501B (en) * | 2020-02-20 | 2022-10-14 | 百度在线网络技术(北京)有限公司 | Copyright protection method, device, equipment and medium based on block chain |
CN111741268A (en) * | 2020-06-30 | 2020-10-02 | 中国建设银行股份有限公司 | Video transmission method, device, server, equipment and medium |
CN111741268B (en) * | 2020-06-30 | 2022-07-05 | 中国建设银行股份有限公司 | Video transmission method, device, server, equipment and medium |
CN112187726A (en) * | 2020-09-04 | 2021-01-05 | 宇龙计算机通信科技(深圳)有限公司 | Data transmission method, device, storage medium and terminal |
CN112235103A (en) * | 2020-09-30 | 2021-01-15 | 银盛支付服务股份有限公司 | Secure network communication method for dynamically generating secret key |
CN113572763A (en) * | 2021-07-22 | 2021-10-29 | 中国工商银行股份有限公司 | Data processing method and device, electronic equipment and storage medium |
CN113572763B (en) * | 2021-07-22 | 2022-10-14 | 中国工商银行股份有限公司 | Data processing method and device, electronic equipment and storage medium |
CN114584299A (en) * | 2022-03-02 | 2022-06-03 | 中国建设银行股份有限公司 | Data processing method and device, electronic equipment and storage medium |
CN114584299B (en) * | 2022-03-02 | 2024-04-26 | 中国建设银行股份有限公司 | Data processing method, device, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110401677B (en) | 2022-05-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11750591B2 (en) | Key attestation statement generation providing device anonymity | |
CN110401677A (en) | Acquisition methods, device, storage medium and the electronic equipment of digital publishing rights key | |
US11520912B2 (en) | Methods, media, apparatuses and computing devices of user data authorization based on blockchain | |
CN1985466B (en) | Method of delivering direct proof private keys in signed groups to devices using a distribution CD | |
CN110460439A (en) | Information transferring method, device, client, server-side and storage medium | |
CN105007279A (en) | Authentication method and authentication system | |
US20200374272A1 (en) | Data exchange system, method and device | |
CN110414190B (en) | Signature method of application installation package, related device, storage medium and electronic equipment | |
CN107005407A (en) | Use the TPM of server remote password service | |
CN108600222A (en) | The communication means of client application and trusted application, system and terminal | |
CN107920060A (en) | Data access method and device based on account | |
JP6690346B2 (en) | Security risk management system, server, control method, program | |
CN110414269B (en) | Processing method, related device, storage medium and system of application installation package | |
CN110263563A (en) | By means of the ad click data cochain method and its equipment of block chain | |
US8929555B2 (en) | Data encryption systems and methods | |
CN114124440A (en) | Secure transmission method, device, computer equipment and storage medium | |
CN108958771B (en) | Application program updating method, device, server and storage medium | |
CN113922976A (en) | Equipment log transmission method and device, electronic equipment and storage medium | |
CN113810779B (en) | Code stream signature verification method, device, electronic equipment and computer readable medium | |
JP7468717B2 (en) | Terminal, control method, and program | |
CN114826616B (en) | Data processing method, device, electronic equipment and medium | |
Singh et al. | Performance analysis of middleware distributed and clustered systems (PAMS) concept in mobile communication devices using Android operating system | |
CN110263560A (en) | By means of the ad click data cochain method and its equipment of block chain | |
CN116248662A (en) | Electronic file transmission method and device, storage medium and computer equipment | |
CN115296934A (en) | Information transmission method and device based on industrial control network intrusion and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |