Background technology
It is one of important indicator of present information society that mobile communication is used widely.Yet before soon; mobile phone but allows general user can not want to use because of too expensive; and it is limited and communication quality is also not very good at the communication covering scope of base station at that time; and can not receive signal or the very poor situation of reception quality in the area, suburbs, so having only some can bear the mobile communication cost at that time and having the large-scale company of special demands or individual talent conference to use mobile phone mobile communication through regular meeting.Yet, before scientific and technological maturation and capital construction are complete, will have the people that count more than a day can have and use own mobile phone in existing people's expection at that time, and this seems nothing but a simple matter of time.
At present the mobile communication related industry just develops by leaps and bounds, also because the rate of mobile phone has become and traditional wire telephony rate is more or less the same at present, so there are a lot of individuals can have own exclusive mobile phone.In addition according to data presentation, the time that a lot of people use mobile phone is used the length that time of home telephone also comes at home than them usually.Mobile phone is being played the part of the role of a key for the modern business communication, for example: parents can get in touch with its children through mobile phone, people also can utilize mobile phone to require assistance when urgent.In addition, along with the development of portable computer, people also wish to see through the mobile phone communication system (for example: internet usage) transmits data.Mobile phone has changed people's life style far and away, and becomes an indispensable instrument of many people.
On the other hand, become stronger day by day along with mobile phone can provide function, people have been accustomed to receiving and reading information with mobile phone gradually.Traditionally, information is propagated by the books or the magazine that are printed on the paper, and broadcasting and TV have been accelerated the speed that information is propagated after rising, and nowadays dataphone and internet is flourish, and information propagates into each corner in the world more with surprising rapidity.In addition, because the development of Internet technology more creates many new business models, these new business models have a common characteristic, utilize the internet to make business exactly, just the ecommerce of common name recently.For example, traditionally if buy books and must in person or ask someone to be bought after bookstore is sought, because the rise of internet, as can allow the user search the on line books of wanting and the purchase that can directly place an order of network bookstores such as AMAZON.Though this makes the mode of buying books greatly simplify, yet this has an inconvenient part, is exactly the preservation of relevant books, and is once the more healing of books purchase needs enough spaces to be placed, also more numerous and diverse in the management simultaneously.
In view of this, and universal day by day along with mobile phone, the notion of " mobile reading device " is suggested to then in response to this kind needs, that is to say literal in the original books or picture digitizing, form e-book, consumer's mobile phone only need can connect online wirelessly through particular design, add some specific program software, just can on line, buy e-book or the file of wanting easily, and read, and meet the mobile phone just so-called " mobile reading device " of this demand with passing to the employed mobile phone of consumer under this e-book.Though, the e-book or the file that utilize " mobile reading device " online purchase to want are simple and practical notions, but, cost of reproduction again that e-book is cheap and easy propagation distribution ability make e-book must pay special attention to the processing of its information flow when concluding the business, otherwise the consumer is taken place easily after legal purchase is read, but can be illegal be copied arbitrarily transmits and scatters and give other people, therefore when the transaction flow of design e-book, the dispute over copyright that must may take place is considered in the lump, in order to avoid hinder the foundation of e-book trade market.
Embodiment
Please refer to Fig. 1, Fig. 1 is the functional block diagram according to the mobile telephone system 10 of the inventive method enforcement.Mobile telephone system 10 includes a management of electronic documents server 12, a base station and a plurality of user side 16 (being mobile phone).12 of management of electronic documents servers provide the e-file service in mobile telephone system 10, so that allow the user that makes from each mobile phone 16 can utilize management of electronic documents server 12 to subscribe to and download interesting e-file, e-book or news and information.Establish a wireless telecommunications mechanism between base station 14 and each mobile phone 16, mobile phone 16 can see through base station 14 with data transfer to management of electronic documents server 12, and management of electronic documents server 12 also can see through base station 14 with data transfer to mobile phone 16.In addition, management of electronic documents server 12 also can be connected in internet (Internet), user for mobile phone 16 can see through the next and management of electronic documents server 12 mutual Data transmission of other devices (as: PC), and in the present embodiment, the mobile phone of mobile phone 16 for surfing the Net, for example: meet wireless communication applications software agreement (Wireless Application Protocol, WAP) or integrate the service of package wireless transmission (General Packet Radio Service, the mobile phone of specification such as GPRS).
Management of electronic documents server 12 comprises a HTTPS preprocessor 18, a firewall device 20, a registration module 22, a download processing module 24, an encryption module 26, compression module 28, a control center 30 and a database 32.Whether safely be a most important subject under discussion and owing to carry out tool copyright e-file on wireless network if transmitting it, therefore the transmission of data in the present embodiment is to transmit with the ciphered data kenel mostly, and HTTPS is exactly a main protocol standard of encrypted transmission on network, so HTTPS preprocessor 18 carried out preliminary deciphering exactly earlier before the HTTPS enciphered data is being entered management of electronic documents server 12.Firewall device 20 can be used to separate management of electronic documents server 12 Internet users outside with it and holds (comprising mobile phone 16), it can see through the filtration of network message package and stipulating of security strategy, allow some particular network serve and safe network message, for example: through the far-end login of registration, Email, archives transmission etc. can pass in and out firewall device 20, can not suffer illegal invasion and modification so that guarantee setting and information in the management of electronic documents server 12, that is to say, firewall device 20 can be done further filtration with the data decryption that HTTPS preprocessor 18 is transmitted, to prevent hacker's invasion.22 of modules of registration can be accepted the registration of user and specified a certain mobile phone 16 thereof, so that allow the user become the user of legal login, and its specified mobile phone 16 also becomes legal login and device that can legal download e-file.
24 of download process modules are the various correlation step when being used for handling the user and downloading e-file, and download request is carried out necessary affirmation and verification work, in case Du Feifa user.26 of encryption module are to be used for carrying out the various actions that need encryption, for example: after user's e-file downloading request verified, encryption module 26 just can be encrypted so that the follow-up user who sends specific mobile phone 16 to the e-file that user institute desire is downloaded.Compression module 28 then can compress the file or the data of all transmission, and particularly the common data volume of e-file that the user downloaded or books is all very big, can suitably reduce its data volume to shorten the transmission time after overcompression.32 of databases comprise and have two subdata bases at least: user's database 34 and electronic document data storehouse 36.Wherein, deposit the master data 42 of log-on data 38 through legal all users of registration back, corresponding password 40 and specified mobile phone thereof in user's database 34, as: represent the manufacturing sequence number of mobile phone identity etc.36 in electronic document data storehouse be the plaintext 44 of depositing the e-file that will offer in the future the reader with and corresponding e-file identification code 46, e-file identification code 46 is electronic document data storehouse 36 a usefulness that each this e-book or e-file 44 are inquired about and filed for convenience.Control center 30 then is the operation that is used for controlling management of electronic documents server 12, and control or the information flow direction of handling each module in the management of electronic documents server 12 or database.
Do an explanation at method of the present invention now, mobile telephone system 10 is implemented according to method of the present invention as previously mentioned, and method of the present invention includes a registration step and a download step.In registration step, fundamental purpose be allow the user to management of electronic documents server 12 registration become one can legal download e-file the user, the mobile phone that also it will be used for simultaneously downloading e-file in the future register become one can legal reception e-file mobile phone, be that example is illustrated next with mobile phone 16.In registration step, the user at first can directly utilize mobile phone 16 directly to management of electronic documents server 12 registration, also can install in (as: PC) connections the internet by other and register to management of electronic documents server 12.Utilizing mobile phone 16 to be registered as legal user to management of electronic documents server 12 with the user is example, mobile phone 16 can be earlier when management of electronic documents server 12 is downloaded registration required relevant list data, after the user fills in relevant form, the log-on data of being imported 50 can be sent to management of electronic documents server 12 via base station 14, management of electronic documents server 12 can be handled mobile phone 16 users' registration requirement according to received log-on data 50 afterwards.In the present embodiment, log-on data 50 is except the name that includes the user, other includes an identifying information 52, and this identifying information 52 can be the IMEI identification code (International Mobile Equipment Identity) or user's the IMSI identification code (InternationalMobile Subscriber Identity) of mobile phone 16, be mainly used to the employed mobile phone 16 of user be registered as one can legal download e-file 44 mobile phone, and after the legal registration of finishing user and mobile phone 16, control center 30 can increase newly according to the log-on data 50 that mobile phone 16 is transmitted or upgrade data to user's database 34, and these data include log-on data 38, password 40 and mobile phone master data 42 etc., and the password 40 of these data can be through storing in the mobile phone 16 that is sent to legal registration after encrypting, so that the follow-up purposes that can make user's identity validation and declassified document in the download step of e-file, that is password 40 is a kind of authentication information that is used for authenticating mobile phone 16.And after password 40 is stored in mobile phone 16, mobile phone 16 can be sent to management of electronic documents server 12 with recognition data 52 and password 40 again, so that management of electronic documents server 12 utilizes received data to confirm the correctness of the data in user's database 34.
See also Fig. 2, Fig. 2 is the process flow diagram of registration step of the present invention.This registration step includes the following step:
Step 80: beginning;
Step 82: the user operates mobile phone 16 and downloads Registration Forms interface data required when registering;
Step 84: mobile phone 16 is sent to management of electronic documents server 12 in the mode of encrypting with log-on data 50 (comprising recognition data 52);
Step 86: management of electronic documents server 12 sends the password 40 that produced in mobile phone 16 in the mode of short message after legal checking is passed through;
Step 88: mobile phone 16 stores password 40;
Step 90: mobile phone 16 is sent to management of electronic documents server 12 with recognition data 52 and password 40;
Step 92: after management of electronic documents server 12 is checked password 40, send the response of succeeding in registration and give mobile phone 16; And
Step 94: finish.
After finishing registration step, the user can enter the download step of e-file.That is to say that the user can operate mobile phone 16 and connect and enter the e-file 44 of management of electronic documents server 12 to select to download.After having selected the e-file of wanting to download 44, just can propose to download the downloading request 56 of this e-file 44 to management of electronic documents server 12, wherein downloading request 56 includes the selected e-file identification code 58 of user, information such as user's recognition data 52 and password 40, so that management of electronic documents server 12 is able to come e-file 44 in the retrieve electronic document data bank 36 according to e-file identification code 58, and according to recognition data 52 and password 40 judge mobile phone 16 whether logined become can legal download e-file device, if mobile phone 16 recognition data 52 or password 40 mistakes that are provided, management of electronic documents server 12 promptly can be interrupted the line between itself and the mobile phone 16.Before management of electronic documents server passes the selected e-file 44 of user 12 times; management of electronic documents server 12 can be encrypted this e-file 44 to produce an encrypt file 60; and assign a protective emblem 62 to encrypt file 60, so that mobile phone 16 can't export encrypt file 60 or e-file 44 to other device after receiving encrypt file 60.After mobile phone 16 receives encrypt file 60, mobile phone 16 before can utilizing received password 40 encrypt file 60 is decrypted into original e-file 44, if yet password 40 incorrect words, mobile phone 16 can't be successfully with encrypt file 60 deciphering, so password 40 is used for authenticating for a kind of management of electronic documents server 12 whether mobile phone 16 is a legal authentication information of downloading e-file 44 usefulness.Please refer to Fig. 3, Fig. 3 is the process flow diagram of download step of the present invention.This download step includes the following step:
Step 100: beginning;
Step 102: the user operates mobile phone 16 and selects the e-file 44 that will download, and to transmit downloading request 56 to management of electronic documents server 12, wherein downloading request 56 includes information such as e-file identification code 58, recognition data 52 and password 40;
Step 104: the status checking that management of electronic documents server 12 carries out this user according to received recognition data 52 and password 40, as passing through checking, then encrypt the e-file 44 that will descend to pass,, and assign protective emblem 62 to encrypt file 60 with generation encrypt file 60;
Step 106: management of electronic documents server 12 is sent to mobile phone 16 with encrypt file 60;
Step 108: mobile phone 16 utilizes password 40 that encrypt file 60 is decrypted into original e-file 44, simultaneously and check the correctness of institute's data download;
Step 110: mobile phone 16 is handled the e-file 44 of deciphering back gained, for example: e-file 44 is shown in its display device;
Step 112: mobile phone 16 is sent to management of electronic documents server 12 with the treatment state of e-file 44, so that management of electronic documents server 12 is preserved its treatment state; And
Step 114: finish.
Please refer to Fig. 4, Fig. 4 for Fig. 1 the process flow diagram of mobile phone 16 desires when e-file 44 is attached to Email.As shown in Figure 4; the e-file 44 that to be downloaded from management of electronic documents server 12 before when mobile phone 16 desires is attached to an Email; when being sent to the third party (step 120); mobile phone 16 can check earlier whether e-file 44 includes aforesaid protective emblem 62, whether need be subjected to the protection (step 122) of copyright to judge e-file 44.If e-file 44 includes protective emblem 62, that is expression e-file 44 is to be subjected to the protection of copyright and can't to be transferred into the elsewhere from mobile phone 16, so mobile phone 16 additional electron files 44 to the action of Email promptly can be failed (step 128,130); If yet e-file 44 does not include protective emblem 62; this represents that promptly e-file 44 is not to be subjected to the protection of copyright and can be transferred into the elsewhere from mobile phone 16, and mobile phone 16 can be attached to e-file 44 Email (step 124,126,13O) afterwards.
Please refer to Fig. 5, the process flow diagram when Fig. 5 is sent to a PC (not shown) for mobile phone 16 desires of Fig. 1 with e-file 44.As shown in Figure 5; when mobile phone 16 desires are sent to PC with the e-file 44 that be downloaded from management of electronic documents server 12 before (step 140); mobile phone 16 can check earlier whether e-file 44 includes aforesaid protective emblem 62, whether need be subjected to the protection (step 142) of copyright to judge e-file 44.If e-file 44 includes protective emblem 62, that is expression e-file 44 is to be subjected to the protection of copyright and can't to be transferred into the elsewhere from mobile phone 16, so mobile phone 16 transmission e-file 44 to the actions of PC promptly can be failed (step 148,150); If yet e-file 44 does not include protective emblem 62; this represents that promptly e-file 44 is not to be subjected to the protection of copyright and can be transferred into the elsewhere from mobile phone 16, and mobile phone 16 can be sent to e-file 44 PC (step 144,146,150) afterwards.Therefore, by above-mentioned inspection flow process, the e-file 44 with copyright protection demand promptly can't unlawfully be sent to other places.
Can be transferred into the unwarranted third party via mobile phone easily compared to known e-file; can can't scatter via illegal approach so that have the e-file of copyright by method of the present invention; thus; can be when allowing the user enjoy the convenience of e-file, the copyright that the e-file supplier is had also can be subjected to excellent protection.
The above only is preferred embodiment of the present invention, and all equalizations of being done according to the present patent application claim change and modify, and all should belong to the covering scope of patent of the present invention.