CN1141678C - Method and system for preventing electronic file pirary - Google Patents

Method and system for preventing electronic file pirary Download PDF

Info

Publication number
CN1141678C
CN1141678C CNB00126088XA CN00126088A CN1141678C CN 1141678 C CN1141678 C CN 1141678C CN B00126088X A CNB00126088X A CN B00126088XA CN 00126088 A CN00126088 A CN 00126088A CN 1141678 C CN1141678 C CN 1141678C
Authority
CN
China
Prior art keywords
terminal
identification code
encryption key
server host
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB00126088XA
Other languages
Chinese (zh)
Other versions
CN1340795A (en
Inventor
杨大广
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
YOUSHUO INFORMATION SCIENCE AND TECHNOLOGY Co Ltd
Original Assignee
YOUSHUO INFORMATION SCIENCE AND TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by YOUSHUO INFORMATION SCIENCE AND TECHNOLOGY Co Ltd filed Critical YOUSHUO INFORMATION SCIENCE AND TECHNOLOGY Co Ltd
Priority to CNB00126088XA priority Critical patent/CN1141678C/en
Publication of CN1340795A publication Critical patent/CN1340795A/en
Application granted granted Critical
Publication of CN1141678C publication Critical patent/CN1141678C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention relates to a computer system for preventing electronic file piracy and a method used in the computer system. The computer system comprises a server host machine which can be connected with a plurality of terminals via the Internet. The method comprises a registration program and a file claim program, wherein the registration program registers the terminals as legal users in the server host machine and acquires encrypted second keys from the server host machine according to first keys in the terminals; the claim program claims encrypted electronic files from the server host machine, decrypts the files with the first keys, and takes out the second keys and terminal identification codes to determine whether subsequent decryption is continued or stopped.

Description

Can prevent the method and the system thereof of e-file piracy
Technical field
The present invention relates to a kind of method that can prevent e-file piracy in the computer system that is used in, specifically, a kind ofly prevent to utilize Internet to download e-file to an electronic reading device, but be illegally copied to the method for other electronic reading devices.
Background technology
Traditionally, knowledge is propagated by the books or the magazine that are printed on the paper, accelerated the speed of knowledge dissemination after broadcasting and TV rise, nowadays dataphone and Internet is flourish, more with surprising rapidity knowledge and information is propagated into each corner in the world.Because the development of Internet technology creates many new business models, these new business models have a common characteristic, utilize Internet to make business exactly, just the ecommerce of common name recently.For example, traditionally if buy the books bookstore that must in person or ask someone and seek the back and buy, because the rise of Internet, as can allow the user search the on line books of wanting and the purchase that can directly place an order of network bookstores such as AMAZON.Though this makes the mode of buying books greatly simplify, yet this has an inconvenient part, be exactly the preservation of relevant books, once it is book is bought to such an extent that the more more need enough spaces to put, also more numerous and diverse in the management simultaneously.
In view of this, the notion of " electronic reading device " just is suggested to address that need, that is to say literal in the original books or picture digitizing, form e-book, as long as the consumer has a station terminal can connect online, add some specific program software, e-book or the file wanted of on-line purchase easily just, and the terminal that passes to the consumer place under this e-book can be read, can meet the terminal just so-called " electronic reading device " of this demand.Once there were many Publishing Groups to desire to put into the operation of electronic bookstore and e-book in view of this vast consumption market, yet, but do not cry out temporarily midway and stop because some supporting mechanism sets up as yet.One of reason is consumer's reading habit institute jejune worry in implicit market.That is to say, most of consumer still is accustomed to reading books from the form of Hard copy, want to promote to come the reading electronic book nationality must overthrow the inveteracy reading habit of consumer with " electronic reading device ", simultaneously also must be through the tediously long education and the process of adaptation.Yet another prior factor is cheap cost of reproduction and easy propagation distributes mode, and this makes the market of e-book face the serious threat that can't promote.
This serious threat comes from be engaged in that dealer that e-book sells runs into one very headache and insoluble problem: e-book can be easy to repeatedly copy branchs and give nontransaction both sides the 3rd people in addition.Why facility is because it belongs to invisible e-file to e-book, naturally send convenience and can save a large amount of placing space compared to the conventional book that actual body is arranged, yet, also just, it sends conveniently because belonging to invisible e-file, make the consumer after legal purchase is read, but can be illegal be copied arbitrarily sends and distributes to other people.That is to say, if can't design the perfect electronics book mechanism of exchange of a cover, take place with the situation that effectively prevents " legal purchase is but illegally distributed ", the dealer who is engaged in e-book whenever sells an e-book and gives a certain consumer, just equal this e-book is given to every other consumer, in this case, the dealer can't keep rational profit, the ecommerce of this form can't be survived naturally, this just the e-book speed promoting so far and popularize not as the major reason of expection.Yet, e-book has with no paper at all, and------velocity of propagation is quick, economization---do not account for advantages such as big quantity space to meet environmental protection notion, efficient activity, can save the resource of many preciousnesses, if can't be promoted, be the heavy losses of economic interests really for no other reason than that fail to solve the thing of above-mentioned " legal purchase is but illegally distributed ".
Summary of the invention
Because the problems referred to above, fundamental purpose of the present invention provides a kind of method that can prevent e-file piracy in the computer system that is used in, a kind ofly specifically prevent to utilize Internet to download e-file to an electronic reading device, but illegal copies are to the method for other electronic reading devices, to address the above problem.
According to one aspect of the present invention, a kind of method that can prevent e-file piracy in the computer system that is used in is provided, this computer system comprises a server host, this server host can be connected with a plurality of terminals via Internet, comprise a customer data base in this server host, all the legal users that registered via this accreditation process with record and the identification code of terminal thereof, this terminal also comprises a central processing unit, one hard disk and a network interface card, each terminal has the identification code of at least one this terminal of representative, and the identification code of this terminal can be the identification code of this central processing unit, the identification code of this hard disk or the identification code of this network interface card, also comprise a common program module in this server host, to deposit this reading application program and to be downloaded to storage use in this terminal for the user, this terminal can propose the requirement of asking for an e-file via this Internet to this server host, this server host then can form corresponding ciphertext through encrypting with the plaintext of this e-file, and be sent to this terminal via this Internet, being original plaintext with this decrypt ciphertext, this method comprises an accreditation process and a file is asked for program, this accreditation process comprises the following step: the user is written into one and reads application program in terminal, and this reading application program comprises one first encryption key; The user utilizes this reading application program to become legal terminal to this server host registration; This server host can produce second encryption key of user's identification code and user's special use after the legal registration of finishing this terminal, this user's identification code and this second encryption key are through being sent to the terminal of this legal registration after encrypting; And the reading application program of this terminal further encrypts the user's identification code and second encryption key that receive to form a terminal encryption document together with the identification code of representing this terminal in the lump, is stored in the terminal of this legal registration; This document program of asking for comprises the following step: when a terminal when this server host proposes to ask for requiring of an e-file, this server host passes through the plaintext of this e-file the encryption of this second encryption key and forms corresponding ciphertext, and this ciphertext is sent to this terminal via this Internet; When the reading application program of this terminal receives this ciphertext, earlier with this first encryption key to this terminal encryption document deciphering, and obtain wherein second encryption key and the identification code of this terminal; And work as this reading application program the obtained terminal recognition sign indicating number and the identification code of present terminal are made comparisons, during if come to the same thing, promptly with this second encryption key to this decrypt ciphertext that receives, otherwise stop follow-up decryption acts, to prevent the piracy of non-legal terminal to this e-file.
According to another aspect of the present invention, a kind of computer system that prevents e-file piracy is provided, this computer system comprises a server host and can be connected with a plurality of terminals via an Internet, this terminal comprises a central processing unit, one hard disk and a network interface card, each terminal has the identification code of at least one this terminal of representative, and the identification code of this terminal can be the identification code of this central processing unit, the identification code of this hard disk or the identification code of this network interface card, this terminal can propose the requirement of asking for an e-file via this Internet to this server host, this server host then can form corresponding ciphertext through encrypting with the plaintext of this e-file, and be sent to this terminal via this Internet, being original plaintext with this decrypt ciphertext, this server host comprises: a common program module, to deposit the reading application program that comprises one first encryption key, this reading application program is available for users to be downloaded to store in this terminal and uses; One Registering modules, the reading application program of utilizing this terminal as the user be during to this server host registration, and this Registering modules can produce user's identification code and be a legal terminal with this endpoint registration; One customer data base is with the user that writes down all legal registrations and the identification code of terminal thereof; One encryption key generation module is used for producing second encryption key of user's special use; And an encrypting module, be used for this user's identification code and this second encryption keys, and be sent in the terminal of this legal registration; Wherein the reading application program of this terminal is further encrypted the user's identification code and second encryption key that receive to form a terminal encryption document together with the computer identification code of representing this terminal in the lump, be stored in the terminal of this legal registration, and when a terminal when this server host proposes to ask for requiring of an e-file, this encrypting module with this second encryption key with the plain text encryption of this e-file and form corresponding ciphertext, and this ciphertext is sent to this terminal via this Internet, when the reading application program of this terminal receives this ciphertext, can decipher this terminal encryption document with this first encryption key earlier, and obtain wherein second encryption key and this identification code, and when the more obtained identification code of this reading application program when the identification code of terminal is identical at present, with this second encryption key to this decrypt ciphertext that receives, otherwise stop follow-up decryption acts, to prevent the piracy of non-legal terminal to this e-file.
In sum, computer system of the present invention has proposed a kind of effective mechanism, prevent the piracy of non-terminal through legal registration to e-file, thereby prevent the situation of " legal purchase is but illegally distributed ", make the dealer of e-book be ready to devote in the middle of the ranks of books electronization dealing, therefore make multiple advantages such as the feature of environmental protection, efficiency of e-book, propagated, economy can be the whole people and share because of keeping rational profit.
Description of drawings
Fig. 1 can prevent the synoptic diagram of the computer system of e-file piracy for the present invention.
Fig. 2 is the functional block diagram of the server host of the anti-piracy computer system of the present invention.
Fig. 3 is the functional block diagram of the terminal of the anti-piracy computer system of the present invention.
Fig. 4 is the process flow diagram of the anti-piracy computer system of the present invention when accreditation process.
Fig. 5 A for the anti-piracy computer system of the present invention when file is asked for program in the process flow diagram of server host end.
Fig. 5 B for the anti-piracy computer system of the present invention when file is asked for program in the process flow diagram of user terminal.
Embodiment
See also Fig. 1, Fig. 1 can prevent the synoptic diagram of the computer system of e-file piracy for the present invention.The anti-piracy computer system 100 of the present invention comprises a server host 102 can connect upward Internet 104 via a firewall device 103, and other has a plurality of users also can connect upward Internet 104 via terminal 106,108,110 separately.Firewall device 103 can be used to Quarantine Server main frame 102 Internet 104 outside with it, it can be by the filtration of network message bag and stipulating of security strategy, allow some particular network serve and safe network message, for example: the Telnet of process registration, Email, file transfer etc. can pass in and out firewall device 103, can not suffer illegal invasion and modification to guarantee setting and information in the server host 102.Each terminal 106,108,110 can be a personal desktop computer, notebook computer, PDA(Personal Digital Assistant) or can connect the mobile phone (WAP cellularphone) etc. of online, if user's terminal be can connect online and transmitting digital information can be applicable to the anti-piracy computer system 100 of the present invention.
With the preferred embodiments of the present invention, terminal 106,108,110 is the personal desktop computer, wherein comprises a central processing unit, a hard disk, a network interface card, input media such as keyboard, mouse, operating rod etc., output unit such as screen, printer etc.Has at least one computer identification code separately in each terminal 106,108,110, be used for the authentication of GC group connector, server host 102 all can become the computer identification code of this terminal as the identification code of central processing unit, the identification code of hard disk or the identification code of network interface card etc., so that can be determined the identity or the position of each terminal 106,108,110 when follow-up electronic transaction or data transmission.
See also Fig. 2, Fig. 2 is the functional-block diagram of the server host of the anti-piracy computer system of the present invention.Server host 102 comprises an interface module 210, one common program module 220, one Registering modules, 230, one encryption key generation module 240, one encrypting modules, 250, one transaction processing and authentication module 260, one databases 270, and a control center 280.
Server host 102 is connected with firewall device 103 via interface module 210, and carries out data transmission and exchange by firewall device 103 and Internet 104, and in case of necessity the data of different size being done suitable data conversion.Server host 102 external disclosed various common programs have been deposited in the common program module 220, for user's free download in terminal separately, wherein for example one through the reading application program that compiling, so that user's operation interface of user's one login, registration, download, reading electronic book nationality to be provided, reading to add in the application program has one first encryption key, and its function adds detailed description later on again.Registering modules 230 can be accepted the registration of user and specified terminal thereof, so that allow the user become the user of legal login, and its specified terminal also becomes legal login and user terminal that can legal download e-book.Encryption key generation module 240 can produce second encryption key of user's special use when the user registers, that is to say that its second encryption key of different users is all inequality.Need be illustrated at this, first and second above-mentioned encryption key be exactly in fact one group of predetermined length position sequence, for example can be 56bits or the 128bits that uses always, the key length of preferred embodiment of the present invention be to adopt 128tits or higher bits, to strengthen its security.
250 of encrypting modules are to be used for carrying out the various actions of encrypting of needing, and for example: when file was asked for program, encrypting module 250 can be encrypted so that follow-uply send to the user with the e-book that second encryption key of user's special use is bought the user.260 of transaction processing and authentication modules are used for handling the matters relevant with user's order, and the source and the content of order are carried out necessary affirmation and certification work.
270 of databases comprise and have three subdata bases at least: customer data base 272, password database 274, electronic document data storehouse 276.Deposit the basic document of the basic document of being correlated with and specified terminal thereof in the customer data base 272 through legal all users of registration back, as: user's identification code of representing a certain user.274 of password databases are deposited the table of comparisons between the user's identification code and special-purpose second encryption key thereof, that is to say, each user is when registering, and encryption key generation module 240 corresponding special-purpose second encryption key that produces leaves in the password database 274 exactly.276 of e-file data bank are to deposit the plaintext that will offer reader's e-book in the future, and each this e-book has the e-book sign indicating number of a uniqueness with convenient inquiry and the usefulness of filing.Control center 280 is used for the operation of Control Server main frame 102, and the control or the information flow direction of each module or database in the processing server main frame 102.
See also Fig. 3, Fig. 3 is the functional-block diagram of the terminal of the anti-piracy computer system of the present invention.With terminal 106 is example, and the preferred embodiment of terminal 106 of the present invention is a PC, wherein comprises a central processing unit 302, one storer, 320, one hard disks, 304, one network interface cards 306, input media such as keyboard 308, mouse 310, operating rod 312 etc., output unit such as screen 314, printer 316 etc.In order to carry out data exchange with server host 102, terminal 106 must be downloaded through the reading application program 322 of compiling from the common program module 220 of server host 102 or Internet 104 and store to the storer 320 of terminal 106 or hard disk 304.Read the operation interface that application program 322 provides user's login, registration, download, reading electronic book nationality, wherein additional have can supply follow-up first encryption key 324 that terminal encryption document 326 is decrypted.Even for the different users, its needed reading application program 322 all is identical, therefore reading application program 322 is to finish through compiling in advance, and can download arbitrarily for all users that need are free, and first encryption key 324 is not wherein distinguished because of user's difference to some extent yet.
The user with the reading application program of terminal 206 be the interface when long-range server host 102 is logined and is registered, its program comprises 1) server host 102 identifications read whether application program is legal reading application program.2) server host 102 utilization Registering modules 230 produce user's identification code and encryption key generation module 240 its corresponding second encryption keys of generation.3) server host 102 adds user's identification code customer data base 272 and second encryption key is added password database 274.4) the reading application program of terminal 106 is downloaded the user's identification code and second encryption key.Each terminal 106,108,110 is after registration is finished, can produce terminal encryption document 326, the computer identification code 330 that comprises special use second encryption key 328 with this station terminal 106 of user's identification code 327, user in the terminal encryption document 326, terminal 106 is encrypted terminal encryption document 326 with first encryption key 324, and be stored in the storer 320 or hard disk 304 of terminal 106 with the form of encrypting, to avoid the careless change of user content wherein, also can reduce other people and check and learn wherein content in illegal mode.After e-book is downloaded and in need being decrypted, reading application program 322 can be decrypted with first encryption key 324 terminal encryption document 326, to capture second encryption key 328 and computer identification code 330 wherein.
Do one at method of the present invention now and describe in detail, the method for the anti-piracy computer system 100 of cooperation the present invention comprises an accreditation process and a file is asked for program.When a user wants to utilize before computer system 100 of the present invention carries out the purchase of e-book, at first to download application program 322 from the network bookstore on server host 102 or the Internet 104, and in reading application program 322, carry out user or the member of an accreditation process to become a legal login to server host 102, except comprising general interface application, also comprise the first above-mentioned encryption key 324 in the reading application program 322.In registration, not only the user need be through registration, the terminal 106 of user's institute's desire download in the future e-book also needs through annotating coral, that is to say that in the process of registration relevant user's basic document (comprising user's identification code and its corresponding second encryption key 328) can be stored in the server host 102 through registration.And the user also must be with the employed at that time terminal 106 of registration as the electronic reading device of downloading in the future e-book, otherwise, computer system 100 can judge that institute makes the electronic reading device that is used for downloading e-book through registration, and can't normally open the e-book of being downloaded.
When the user utilizes reading application program 322 in the terminal 106 to register, server host 102 can be stored in user's identification code in the customer data base 272, specify second encryption key 328 of a special use to give the user then, and the one-to-one relationship between user and its second encryption key 328 is stored in the password database 274, has so just finished the legal registration of user and terminal 106 thereof.After finishing registration, server host 102 can be encrypted user's identification code 327 with first encryption key with corresponding this user's special use second encryption key 328, and be sent to terminal 106, and after the user's identification code 327 and second encryption key 328 of the reading application program of terminal after receiving encryption, can with first encryption key both be decrypted earlier, the user's identification code after then further will deciphering and second encryption key are encrypted to form a terminal encryption document 326 more in the lump together with the computer identification code of representing this terminal, and be stored in the terminal of this legal registration, through this accreditation process, later terminal 106 just can legal download e-book and it has correctly been deciphered.
See also Fig. 4, Fig. 4 is the process flow diagram of the anti-piracy computer system of the present invention when accreditation process.Above-mentioned accreditation process is expressed as follows the row step with process flow diagram 400:
Step 402: beginning;
Step 404: the selected terminal 106 of user is to carry out the subsequent registration program;
Step 406: download application program 322 to selected terminal 106 from Internet 104;
Step 408: the reading application program 322 Connection Service device main frames 102 by terminal 106 are registered;
Step 410: server host 102 produces user's identification code and the second special-purpose encryption key 328 also is stored in customer data base 272 and the password database 274 respectively;
Step 412: server host 102 is sent to terminal 106 after user's identification code 327 of producing and the second special-purpose encryption key 328 thereof are encrypted with first encryption key 324;
Step 414: the reading application program of terminal 106 is decrypted with the user's identification code 327 and second encryption key 328 that first encryption key will receive encryption;
Step 416: the user's identification code 327 after the reading application program of terminal 106 will be deciphered and second encryption key 328 are encrypted to form a terminal encryption document 326 more in the lump together with the computer identification code 330 of GC group connector 106;
Step 418: the reading application program of terminal 106 is stored in terminal encryption document 326 in its hard disk;
Step 420: finish.
When user and terminal 106 thereof after server host 102 ends are finished registration, just can in whenever surf the Net to pay and buy specific e-book according to its personal inclination, and it is downloaded to terminal 106, and this part just alleged file of the inventive method is asked for program.The user can be from terminal browse network bookstore or the related web site in Internet 104 through registration, search and determine to buy a certain e-book, and purchase order is sent to server host 102, server host 102 is after carrying out necessary affirmation and authentication, can in electronic document data storehouse 276, access the user want the plaintext of the e-book bought, and in password database 274, access second encryption key 328 of user's special use, form corresponding ciphertext with the plain text encryption of 328 pairs of e-books of this second encryption key afterwards, again ciphertext is sent to terminal 106 via Internet 104.
When the reading application program 322 of terminal 106 receives the ciphertext of the e-book of buying, can be earlier to read 324 pairs of terminal encryption documents of first encryption key attached in the application program 322,326 deciphering, to obtain second encryption key 328 and computer identification code 330 wherein, reading application program 322 then can compare the computer identification code 318 of deciphering obtained computer identification code 330 and present terminal 106.When comparing result is identical, represent present terminal 106 to be terminal through legal registration, read application program 322 and can continue to decipher obtained 328 pairs of decrypt ciphertext that receive of second encryption key, the user just can read deciphering e-book later under the interface that reading application program 322 is provided.
When after reading the obtained computer identification code 330 of 322 pairs of deciphering of application program and the computer identification code 318 of terminal 106 compares at present, finding that comparing result is inequality, represent present terminal 106 not pass through legal registration, read application program 322 and promptly stop subsequent action, also not can as the normal conditions with 328 pairs of decrypt ciphertext of receiving of second encryption key, so the user also just can't the reading electronic book nationality.The maximum reason that this situation can take place, be that a legal user is behind the terminal downloads e-book of legal registration, but will read application program 322 is copied on another computer in the lump together with the e-book of its purchase and the terminal encryption document 326 that is produced when registering, so that read just so-called " legal purchase is but illegally distributed " for the 3rd people on other computers.
Yet, because before 322 pairs of e-book deciphering of reading application program of the present invention, meeting compare the computer identification code 318 of computer identification code obtained in the terminal encryption document 326 330 with present decryption work place computer earlier, and obtains the result of a contrast.If decryption work place computer is same computer with registration terminal at that time at present, this contrast result naturally can be identical, the present decryption work of i.e. expression representative place computer is the terminal through legal registration, e-book illegally is not distributed in other computers without legal registration, can continue to allow the user can read deciphering e-book later with deciphering so read application program 322.When if decryption work place computer and registration terminal at that time are inequality at present, the result is inequality naturally in this contrast, the present decryption work of i.e. expression representative place computer does not pass through legal registration, that is to say, e-book illegally has been distributed in other computers without legal registration, so read the step that application program 322 can stop to decipher, even the user makes the e-book that illegally distributes also can't be decrypted reading.
See also Fig. 5, Fig. 5 A for the anti-piracy computer system of the present invention when file is asked for program in the process flow diagram of server host end, Fig. 5 B for the anti-piracy computer system of the present invention when file is asked for program in the process flow diagram of terminal.The above-mentioned file program of asking for is expressed as follows the row step with process flow diagram 500:
Step 502: beginning;
Step 504: the user determines to buy a certain e-book in network bookstore;
Step 506: server host 102 is handled purchase order and is carried out necessary affirmation and authentication;
Step 508: whether order by verification? be, to step 512; Not, to step 510;
Step 510: refusal is accepted this order and is shut the book immediately; To step 540;
Step 512: the plaintext that in electronic document data storehouse 276, accesses the e-book of purchase;
Step 514: second encryption key 328 that in password database 274, accesses user's special use;
Step 516: with the plain text encryption of 328 pairs of e-books of this second encryption key to form corresponding ciphertext;
Step 518: ciphertext is sent to terminal 106 via Internet 104;
Step 520: the reading application program 322 of terminal 106 is with 326 deciphering of 324 pairs of terminal encryption documents of first encryption key;
Step 522: obtain second encryption key 328 and computer identification code 330 after the deciphering;
Step 524: the computer identification code 318 that obtains present work place computer;
Step 526: read the obtained computer identification code 330 of 322 pairs of deciphering of application program and the computer identification code 318 of present computer and compare;
Step 528: whether comparing result identical? be, to step 530; Not, to step 536;
Step 530: terminal 106 has been confirmed through legal registration at present;
Step 532: read the e-book decrypt ciphertext that application program 322 receives with 328 pairs of second encryption keys;
Step 534: the user can read deciphering e-book later; Arrive step 540:
Step 536: terminal is not passed through legal registration at present;
Step 538: read application program 322 and stop decryption acts;
Step 540: finish.
The above-mentioned preferred embodiment of the present invention is to be that example is illustrated with the Private Key Cryptosystem, that is to say that what the e-book encrypting and decrypting was used is same as encryption key, except the both sides of data transmission, other the 3rd people and the content of not knowing encryption key are why, therefore be also referred to as the cryptographic system of symmetric form, as the DES algorithm that NBS announced, or Lai and the designed IDEA algorithm of Massey, its security is stronger, and arithmetic speed is also very fast during encryption and decryption.Yet, computer system 100 of the present invention equally also can adopt open general-purpose key cryptographic system to come the e-book encrypt and decrypt, that is to say that each user can have the open general-purpose key that can announce out, the privately owned general-purpose key that can not leak with an own reservation, when 250 pairs of e-books of encrypting module of server host 102 are encrypted, with the person's of being to use open general-purpose key, and when reading e-book ciphertext that 322 pairs of application programs receive when being decrypted, the person's of being to use of usefulness privately owned general-purpose key.
Compared with prior art, the advantage of the anti-piracy computer system 100 of the present invention is:
One, the needed reading operating platform of different users or terminal all is identical.Because all users are via reading application program 322 and server host 102 is registered and file is asked for program, read 322 of application programs and become a reading operating platform, with the bridge that provides user and server host 102 to link up, read application program 322 and first encryption key 324 wherein and all be and finish through compiling in advance and be available for users to free download or be copied on any machine.Since one of purpose of computer system of the present invention be to prevent when e-book from promoting the pirate phenomenon that may cause, just prevent illegally distributing of e-book, do not prevent to read application program 322 distributing own and lie in, simultaneously since the present invention prevent from that mechanism that e-book illegally distributes is main and do not lie in to read application program 322 itself, therefore, read application program 322 via a large amount of download of user, copy or distribute not only and can not influence purpose of the present invention, the notion that helps on the contrary to promote e-book is given the user, makes the use of e-book can quicken to popularize.
Two, the user is when being its specified endpoint registration, and the encryption key generation module 240 meeting generations one of server host 102 are exclusively used in user's second encryption key.When the user buys a certain e-book, encrypting module 250 can be with the plain text encryption of 328 pairs of e-books of this second encryption key to form corresponding ciphertext, be sent on the terminal at user place, and the reading application program 322 on the terminal is being confirmed present terminal through after the legal registration, again the e-book decrypt ciphertext that receives with 328 pairs of second encryption keys.Because some prior art is all made encryption and decryption with identical encryption key to the e-book that the different users buys, in case this encryption key is cracked, then the ciphertext of all e-books can correctly be reduced into expressly; Yet the present invention is directed to each user the second special-purpose encryption key is arranged all,, still can't read the e-book that other users buy, therefore the security that can improve system even therefore a certain user's second encryption key is cracked.
Three, the terminal encryption document is stored in the terminal with the form of encrypting, and can avoid the careless change of user content wherein, also can reduce other people and check and learn wherein content in illegal mode.
Four, the terminal encryption document is stored in terminal, helps to simplify because of the computer identification code to upload the complicated process that the right of privacy of being brought needs the user to agree when open.Because the present invention is in authentication terminal needed computer identification code during whether through legal registration, be to use the wherein identification code of central processing unit, the identification code of hard disk or the identification code of network interface card etc. are carried out, and the data of these identification codes is regarded as the part of user's individual privacy data in accordance with the law, server host 102 proposes obtaining of any this class identification code for the user all will be through user's agreement, therefore, as long as server host 102 is wanted the computer identification code that obtains terminal and all can't be evaded the program that the user agrees, so whether originally should be able to become comparatively complicated in the authentication terminal on the program of legal registration.Yet, according to design of the present invention, when the user when being its specified endpoint registration, the user's identification code of following biography and second encryption key are after deciphering, can can produce corresponding terminal encryption document with first encryption keys together with the computer identification code of representing this terminal, therefore carry out in the process in accreditation process, do not need the computer identification code is uploaded to server host 102.Therefore when terminal receives the ciphertext of e-book that the user buys, when being registration, the required computer identification code of its performed subsequent authentication program just directly is stored in the terminal, therefore at present the computer identification code of the operational terminal main frame 102 that also needn't upload onto the server naturally, and the work that can directly in terminal, compare and authenticate, simplified naturally because of the computer identification code upload the right of privacy that can bring openly need complicated process that the user agrees and possible dispute.
Five, utilize the computer identification code obtained in the terminal encryption document 326 330 and the computer identification code 318 of present decryption work place computer to compare, can prevent that the situation of " legal purchase is but illegally distributed " from taking place.Because before 322 pairs of e-book deciphering of reading application program of the present invention, can compare the computer identification code 318 of computer identification code obtained in the terminal encryption document 326 330 earlier with present decryption work place computer, to confirm that present decryption work place computer and registration terminal at that time are same computers, determine and read the decryption work whether application program 322 can proceed the e-book ciphertext and then.Therefore,, read the step that application program 322 can stop to decipher, make the e-book that illegally distributes correctly to decipher and can't read even the ciphertext of e-book illegally is distributed in other computers without legal registration.
In sum, computer system of the present invention has proposed a kind of effective mechanism, prevent the piracy of non-terminal through legal registration to e-file, thereby prevent the situation of " legal purchase is but illegally distributed ", make the dealer of e-book be ready to devote in the middle of the ranks of books electronization dealing, therefore make multiple advantages such as the feature of environmental protection, efficiency of e-book, propagated, economy can be the whole people and share because of keeping rational profit.
The above only is preferred embodiment of the present invention, and all similar variation and modifications of doing according to claim of the present invention all should belong to the covering scope of patent of the present invention.

Claims (10)

1. one kind is used in the method that can prevent e-file piracy in the computer system, this computer system comprises a server host, this server host can be connected with a plurality of terminals via Internet, comprise a customer data base in this server host, all the legal users that registered via this accreditation process with record and the identification code of terminal thereof, this terminal also comprises a central processing unit, one hard disk and a network interface card, each terminal has the identification code of at least one this terminal of representative, and the identification code of this terminal can be the identification code of this central processing unit, the identification code of this hard disk or the identification code of this network interface card, also comprise a common program module in this server host, to deposit this reading application program and to be downloaded to storage use in this terminal for the user, this terminal can propose the requirement of asking for an e-file via this Internet to this server host, this server host then can form corresponding ciphertext through encrypting with the plaintext of this e-file, and be sent to this terminal via this Internet, being original plaintext with this decrypt ciphertext, this method comprises an accreditation process and a file is asked for program, and this accreditation process comprises the following step:
The user is written into one and reads application program in terminal, and this reading application program comprises one first encryption key;
The user utilizes this reading application program to become legal terminal to this server host registration;
This server host can produce second encryption key of user's identification code and user's special use after the legal registration of finishing this terminal, this user's identification code and this second encryption key are through being sent to the terminal of this legal registration after encrypting; And
The reading application program of this terminal is further encrypted the user's identification code and second encryption key that receive to form a terminal encryption document together with the identification code of representing this terminal in the lump, is stored in the terminal of this legal registration;
This document program of asking for comprises the following step:
When a terminal when this server host proposes to ask for requiring of an e-file, this server host through the encryption of this second encryption key and form corresponding ciphertext, and is sent to this terminal with this ciphertext via this Internet with the plaintext of this e-file;
When the reading application program of this terminal receives this ciphertext, earlier with this first encryption key to this terminal encryption document deciphering, and obtain wherein second encryption key and the identification code of this terminal; And
When this reading application program is made comparisons the obtained terminal recognition sign indicating number and the identification code of present terminal, during if come to the same thing, promptly with this second encryption key to this decrypt ciphertext that receives, otherwise stop follow-up decryption acts, to prevent the piracy of non-legal terminal to this e-file.
2. method as claimed in claim 1 wherein comprises an encryption key generation module in this server host, this encryption key generation module can produce second encryption key of this user's special use for the different users who is registered in this customer data base respectively.
3. method as claimed in claim 2 wherein comprises a password database in this server host, stores all user's data and second special-purpose encryption keys thereof through registration in this password database.
4. method as claimed in claim 1 wherein comprises an electronic document data storehouse storing the plaintext data of a plurality of e-files in this server host, and a control center, is used for controlling the operation of this server host.
5. method as claimed in claim 4, wherein receive when asking for the requiring of this e-file when this server host, this control center can access the plaintext data of this e-file from this electronic document data storehouse, and this encrypting module can be with the plain text encryption of this second encryption key to this e-file, to form corresponding ciphertext.
6. method as claimed in claim 1, wherein this first encryption key and this second encryption key are all and have 128 sequence.
7. computer system that can prevent e-file piracy, this computer system comprises a server host and can be connected with a plurality of terminals via an Internet, this terminal comprises a central processing unit, one hard disk and a network interface card, each terminal has the identification code of at least one this terminal of representative, and the identification code of this terminal can be the identification code of this central processing unit, the identification code of this hard disk or the identification code of this network interface card, this terminal can propose the requirement of asking for an e-file via this Internet to this server host, this server host then can form corresponding ciphertext through encrypting with the plaintext of this e-file, and be sent to this terminal via this Internet, to be original plaintext with this decrypt ciphertext, this server host comprises:
One common program module, to deposit the reading application program that comprises one first encryption key, this reading application program is available for users to be downloaded to store in this terminal and uses;
One Registering modules, the reading application program of utilizing this terminal as the user be during to this server host registration, and this Registering modules can produce user's identification code and be a legal terminal with this endpoint registration;
One customer data base is with the user that writes down all legal registrations and the identification code of terminal thereof;
One encryption key generation module is used for producing second encryption key of user's special use; And
One encrypting module is used for this user's identification code and this second encryption keys, and is sent in the terminal of this legal registration;
Wherein the reading application program of this terminal is further encrypted the user's identification code and second encryption key that receive to form a terminal encryption document together with the computer identification code of representing this terminal in the lump, be stored in the terminal of this legal registration, and when a terminal when this server host proposes to ask for requiring of an e-file, this encrypting module with this second encryption key with the plain text encryption of this e-file and form corresponding ciphertext, and this ciphertext is sent to this terminal via this Internet, when the reading application program of this terminal receives this ciphertext, can decipher this terminal encryption document with this first encryption key earlier, and obtain wherein second encryption key and this identification code, and when the more obtained identification code of this reading application program when the identification code of terminal is identical at present, with this second encryption key to this decrypt ciphertext that receives, otherwise stop follow-up decryption acts, to prevent the piracy of non-legal terminal to this e-file.
8. computer system as claimed in claim 7 wherein comprises a password database in this server host, stores all user's data and second special-purpose encryption keys thereof through registration in this password database.
9. computer system as claimed in claim 7 wherein comprises an electronic document data storehouse storing the plaintext data of a plurality of e-files in this server host, and a control center, is used for controlling the operation of this server host.
10. computer system as claimed in claim 7, wherein this first encryption key and this second encryption key are all and have 128 sequence.
CNB00126088XA 2000-08-31 2000-08-31 Method and system for preventing electronic file pirary Expired - Fee Related CN1141678C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB00126088XA CN1141678C (en) 2000-08-31 2000-08-31 Method and system for preventing electronic file pirary

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB00126088XA CN1141678C (en) 2000-08-31 2000-08-31 Method and system for preventing electronic file pirary

Publications (2)

Publication Number Publication Date
CN1340795A CN1340795A (en) 2002-03-20
CN1141678C true CN1141678C (en) 2004-03-10

Family

ID=4591737

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB00126088XA Expired - Fee Related CN1141678C (en) 2000-08-31 2000-08-31 Method and system for preventing electronic file pirary

Country Status (1)

Country Link
CN (1) CN1141678C (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI676115B (en) * 2018-07-13 2019-11-01 優碩資訊科技股份有限公司 System and method for managing certification for cloud service system

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1956449B (en) * 2005-10-28 2011-05-18 北京书生国际信息技术有限公司 Encipher transmission method and equipment system for preventing copying data resource
CN101841411B (en) * 2005-10-28 2012-01-18 北京书生国际信息技术有限公司 Data resource anti-copying encrypted transmission method and device system
US7493494B2 (en) * 2005-11-03 2009-02-17 Prostor Systems, Inc. Secure data cartridge
CN102347836A (en) * 2010-04-30 2012-02-08 龚华清 Electronic document protected view system and method
CN102118685A (en) * 2011-01-20 2011-07-06 中国联合网络通信集团有限公司 Method and system for pushing electronic book, and server
CN104954498B (en) * 2012-07-03 2019-09-20 厦门简帛信息科技有限公司 A kind of copy method of digital resource
CN110008654B (en) * 2018-01-04 2021-04-09 北大方正集团有限公司 Electronic file processing method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI676115B (en) * 2018-07-13 2019-11-01 優碩資訊科技股份有限公司 System and method for managing certification for cloud service system

Also Published As

Publication number Publication date
CN1340795A (en) 2002-03-20

Similar Documents

Publication Publication Date Title
US11461434B2 (en) Method and system for secure distribution of selected content to be protected
CN109074433B (en) Method and system for verifying digital asset integrity using a distributed hash table and a peer-to-peer distributed ledger
USRE47313E1 (en) Securing digital content system and method
US10924272B2 (en) Method and system for secure distribution of selected content to be protected on an appliance-specific basis with definable permitted associated usage rights for the selected content
Choudhury et al. Copyright protection for electronic publishing over computer networks
CN1822018B (en) Flexible licensing architecture in content rights management systems
JP2005536951A (en) Apparatus, system, and method for securing digital documents in a digital device
US20060080535A1 (en) Apparatus, system and method for securing digital documents in a digital appliance
CN101040275A (en) Contents encryption method, system and method for providing contents through network using the encryption method
CN1391375A (en) Electronic content transmission via network by hybrid disc for verification
NO333104B1 (en) Secure architecture with server plugins for digital rights management systems
CN1761926A (en) User identity privacy in authorization certificates
CN1258359A (en) Method and apparatus for signing and sealing objects
US20080114958A1 (en) Apparatuses for binding content to a separate memory device
EP2410456A1 (en) Methods and apparatuses for binding content to a separate memory device
Peng et al. Secure and traceable copyright management system based on blockchain
CN1141678C (en) Method and system for preventing electronic file pirary
Chen et al. A novel DRM scheme for accommodating expectations of personal use
US20040243815A1 (en) System and method of distributing and controlling rights of digital content
CN1353383A (en) Transaction method and system for electronic files
CN1343938A (en) Method and system for controlling lease of electronic file
CN1399456A (en) Electronic file transmitting system and method
CN101069380A (en) Non-algorithmic vectored steganography

Legal Events

Date Code Title Description
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C06 Publication
PB01 Publication
C14 Grant of patent or utility model
GR01 Patent grant
C19 Lapse of patent right due to non-payment of the annual fee
CF01 Termination of patent right due to non-payment of annual fee