CN1320797C - A method for large-scale living broadcast of digital content - Google Patents

A method for large-scale living broadcast of digital content Download PDF

Info

Publication number
CN1320797C
CN1320797C CNB2004100339981A CN200410033998A CN1320797C CN 1320797 C CN1320797 C CN 1320797C CN B2004100339981 A CNB2004100339981 A CN B2004100339981A CN 200410033998 A CN200410033998 A CN 200410033998A CN 1320797 C CN1320797 C CN 1320797C
Authority
CN
China
Prior art keywords
user
digital content
module
unique identifier
licence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2004100339981A
Other languages
Chinese (zh)
Other versions
CN1571331A (en
Inventor
赵黎
李彬
杨士强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tsinghua University
Original Assignee
Tsinghua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tsinghua University filed Critical Tsinghua University
Priority to CNB2004100339981A priority Critical patent/CN1320797C/en
Publication of CN1571331A publication Critical patent/CN1571331A/en
Application granted granted Critical
Publication of CN1320797C publication Critical patent/CN1320797C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention relates to a method for the large-scale living broadcast of digital contents, which belongs to the technical field of information spreading. Firstly, digital contents are received to be encrypted. The personal registration information of a user is received to generate an identity symbol. The user obtains a dispatching module address from an issued module, and the user transmits a dispatching request. A dispatching result is transmitted to a user end by a dispatching module, and the user end selects a living broadcast module and transmits a service request to the living broadcast module. The living broadcast module transmits the digital contents to the user end. The user end requests a licence from a license sign and issue module and reproduces the digital contents according to the licence. The method of the present invention can be used for supplying living broadcast service to the user. The user can not directly obtain original digital contents from the encrypted digital contents by the encryption living broadcast digital contents or in a mode for adding watermarks into the living broadcast digital contents. A content user can control and manage the use of the contents by the user in a license sign and issue mode, and the user is prevented from illegally using the contents.

Description

The extensive live method of a kind of digital content
Technical field
The present invention relates to the extensive live method of a kind of digital content, relate in particular to a kind of extensive live method of the digital rights management of digital content down that is used for, belong to the information dissemination technology field.
Background technology
The appearance of digital technology makes a large amount of contents occur and issue with digitized forms.Digital technology makes that the copy of the digital content speed that becomes is fast, and cost is low, and distortion is little.Be accompanied by Internet development, digital content data is propagated and is become very easy, and a lot of digital content datas are propagated by bootlegging, can not get control and management, thus infringement content owner's interests.Extensive live quick circulation way as a kind of digital content is just obtaining application more and more widely.The control and the management of the digital content under extensive live become a very important problem.Extensive live the interactive relation that participates between the live each side is very complicated because large-scale, and existing certain methods is not suitable for live on a large scale.The traditional encryption or the method for scrambling, can only control transmission course with managing digital content, in case digital content arrives in user's hand, control and management have just been lost to digital content, and the method for traditional encryption or scrambling have only the user to use to the control of content and management and cannot use two kinds may, poor selectivity.
Summary of the invention
The objective of the invention is to propose the extensive live method of a kind of digital content, by encrypting live digital content or the mode of adding watermark in live digital content, make that the user can't be from directly obtaining original digital content through the digital content after the encryption, by signing and issuing the mode of licence, make the content owner can the control and management different user to the use of the different modes of this content, prevent the illegal use of user to this content.
The extensive live method of the digital content that the present invention proposes may further comprise the steps:
(1) digital content processing module receiving digital contents, digital content is carried out encryption, to obtain three road signals, wherein the first via is the digital content after encrypting, be sent to live module, the second the tunnel be digital content brief introduction, digital content unique identifier and with the corresponding scheduler module of this unique identifier address, be sent to release module, Third Road be digital content unique identifier and with this encryption after the corresponding live module's address of digital content, be sent to scheduler module;
(2) Registering modules receives user's individual log-on message, generates this user's unique identifier, and this user identifier is combined with public information in the individual log-on message, generates this user's identification identifier;
(3) user by client from the brief introduction of above-mentioned release module key numbers, and according to digital content brief introduction obtain required digital content unique identifier and with the corresponding scheduler module of this unique identifier address;
(4) user sends dispatch request according to the scheduler module address of above-mentioned steps (3) to this scheduler module, and sends the unique identifier of digital content and user's oneself identification identifier to it;
(5) after scheduler module is received dispatch request, user's identification identifier is sent to Registering modules, Registering modules is verified it, and will be verified that the result is recycled to scheduler module;
(6) scheduler module is checked and verified the result, if the result is not for passing through in checking, scheduler module refusing user's request then, if the result is for passing through in checking, then scheduler module is dispatched according to the unique identifier of the digital content that receives, and will be sent to client with the live module's address at digital content place after the corresponding encryption of the unique identifier of this digital content, preserve scheduling result simultaneously;
(7) client is initiated service request according to above-mentioned live module's address to live module, and the unique identifier with User Identity symbol and digital content is sent to this live module simultaneously, to obtain digital content;
(8) live module is sent to scheduler module with the user's that receives the identification identifier and the unique identifier of digital content, the scheduling result comparison that scheduler module is preserved itself and above-mentioned steps (6), and the result of comparison is back to live module;
(9) comparison result received of live module check, if comparison result is not for passing through, the request of then live module refusal client, if comparison result is for passing through, then the unique identifier of the digital content that receives of basis provides digital content after the encryption to client;
(10) after client receives digital content after the encryption, search corresponding licence with this digital content, if no licence, then the user initiates to sign and issue license request by client to the licensing module, uses the unique identifier of right and digital content to be sent to the licensing module oneself identification identifier, request simultaneously;
(11) the licensing module is sent to Registering modules with the User Identity symbol of receiving, Registering modules is verified it, and will be verified that the result is recycled to the licensing module;
(12) the checking result that receives of licensing module check, if the result is not for passing through in checking, the then request of licensing module refusing user's, if the result is for passing through in checking, then the use right of the identification identifier that sends over according to the user, request and the unique identifier of digital content are signed and issued licence, and the licence copy of signing and issuing is sent to client, preserve this licence simultaneously;
(13) reproduce digital content after the encryption of receiving according to user's actual needs under the client right of in licence, permitting.
Encryption in the said method comprises:
(1) use key seed to generate encryption key sequence;
(2) use the key in the key sequence digital content to be encrypted according to cryptographic algorithm; and after with the encrypt digital content of certain key to a regular length; change another key into the digital content of next regular length is encrypted, to strengthen protection digital content.
Individual log-on message in the said method comprises: name, address, password, Email, fixed telephone number, identification card number, cell-phone number, credit number, wherein name, address, Email, fixed telephone number belong to public information, and password, identification card number, cell-phone number, credit number belong to underground information.
Generate the method for User Identity symbol in the said method, comprise the steps:
(1) from user's individual log-on message, chooses public information;
(2) each user generates a unique identifier;
(3) unique identifier in public information in the step (1) and the step (2) is formed new sequence;
(4) sequence in the use hashing algorithm Hash step (3) obtains a string hashed value;
(5) private key that uses Registering modules to set is encrypted hashed value, obtains ciphertext;
(6) sequence of step (3) and the ciphertext of step (5) are stitched together, obtain the User Identity symbol.
User in the said method uses right to be: watch digital content time, watch digital content number of times, can preserve the digital content received, the digital content of preserving can be duplicated, the digital content of preserving can be copied to another equipment and maybe can distribute any or multiple in the digital content of preservation to other people.
Generate the method for licence in the said method, comprise the steps:
(1) generates and this user-dependent unique watermark information;
(2) with the PKI of licensing module the watermark information of step (1) is encrypted, obtained the watermark ciphertext;
(3) with the unique identifier of user's identification identifier, digital content, be used to generate the key seed of the key sequence of encrypted digital content, user's use right, the term of validity and the above-mentioned watermark ciphertext composition sequence of licence;
(4) sequence of use hashing algorithm Hash step (3) obtains a string hashed value;
(5) the occupancy permit private key of signing and issuing module is encrypted hashed value, obtains ciphertext;
(6) sequence of above-mentioned steps (3) and the ciphertext of step (5) are stitched together, become user license.Can also generate a licence copy, and send to client.The licensing module just is sent to client to the copy of the licence of signing and issuing, the copy of licence and the original of licence have difference, the term of validity of copy may be shorter than the term of validity of original, this use right with the user is relevant, and copy is relevant with client, and the copy that sends to a client can not use on another client.
The extensive live method of the digital content that the present invention proposes, be used for providing direct broadcast service to the user, in service process, live digital content is encrypted, make that the user can't be from directly obtaining original digital content through the digital content after the encryption, by signing and issuing the mode of licence, make the content owner can the control and management user to the use of this content, prevent the illegal use of user to this content.And when the user preserves digital content, add user-dependent unique watermark, in order to follow the tracks of digital content.Use key sequence to encrypt digital content, the digital content anti-attack of robust more after feasible the encryption.The use of licence offers the user and more selects, and can select to buy less right with lower cost, also can select to buy more right with more cost.
Description of drawings
Fig. 1 is the FB(flow block) of the inventive method.
Among the figure, the 1st, digital content is sent to encryption processing module; The 2nd, encryption processing module is handled the original contents of receiving, the content after generate encrypting is sent to live module then, and the brief information etc. that generates content simultaneously is sent to release module and unique identifier is sent to scheduler module; The 3rd, the user to Registering modules enrollment status, identifies this user identification identifier in system to obtain one by client; The 4th, Registering modules returns user's identification identifier to client; The 5th, the user obtains live information by client to release module; The 6th, release module is returned live information to client; The 7th, the user by client to the service of scheduler module request scheduling; The 8th, scheduler module is brought the user by client identification identifier is sent to the Registering modules checking; The 9th, Registering modules is sent back to scheduler module to the result of checking; The 10th, scheduler module is dispatched, and the result of scheduling is returned to client; The 11st, the user serves to live module request by client; The 12nd, live module is investigated this user to scheduler module, sees whether be the result of scheduler module scheduling; The 13rd, scheduler module is returned the result of verification to live module; The 14th, live module provides service to client; The 15th, the user by client to the licensing module card that asks for permission; The 16th, the licensing module is to Registering modules requests verification user's identity; The 17th, Registering modules returns the result of checking to the licensing module; The 18th, the licensing module is signed and issued licence and is given the user; 19 clients are reproduced shielded content according to the licence that the user buys.
Embodiment
The extensive live method of the digital content that the present invention proposes, its FB(flow block) may further comprise the steps as shown in Figure 1:
Encrypt digital content processing module receiving digital contents, digital content is carried out encryption, to obtain three road signals, wherein the first via is the digital content after encrypting, be sent to live module, the second the tunnel be digital content brief introduction, digital content unique identifier and with the corresponding scheduler module of this unique identifier address, be sent to release module, Third Road be digital content unique identifier and with this encryption after the corresponding live module's address of digital content, be sent to scheduler module; The digital content processing module, live module, the number of scheduler module and release module all is extendible, can be one, can be a plurality of, can be according to concrete loading condition decision.The digital content processing module is the mode that adopts key sequence to encrypt to the encryption of digital content, it or not the digital content of using same secret key encryption whole simply, and be to use a series of keys, whole digital content is divided into the section of set time length, and each section uses different keys to encrypt.For example, a digital content A, its length is 1 hour, may just change a secondary key every 10 minutes so, like this, encrypted digital content A needs altogether with 6 keys.Encryption to digital content can be adopted various algorithms neatly, for example, the DC coefficient of the macro block in the image is encrypted with the 3DES cryptographic algorithm.
Registering modules receives user's individual log-on message, generates this user's unique identifier, and this user identifier is combined with public information in the individual log-on message, generates this user's identification identifier.At first between client and Registering modules, set up an escape way, pass through escape way, client is sent to Registering modules with user's individual log-on message, Registering modules generates unique identifier in the system for the user, for the user generates unique identifier is in order to distinguish the user, because different users may have identical public information, thereby cause the user's who signs and issues out identification identifier the same, can't effectively distinguish the user.Individual's log-on message comprises name, address, Email, landline telephone, password, identification card number, cell-phone number, credit number etc.Wherein name, address, Email, landline telephone belong to public information, and password, identification card number, cell-phone number, credit number belong to underground information.For example, the individual log-on message of user A is: name=a, address=b, Email=c, landline telephone=d, password=e, identification card number=f, cell-phone number=g, credit number=h; The public information of user A is a so, b, c, d; Accreditation System is i for the unique identifier that user A generates; The sequence j that public information and unique identifier are formed according to certain form (for example separating with underscore) is: a_b_c_d_i; Use hashing algorithm MD5 hash sequence j, obtaining hashed value k is: 5f5d201f211ff7984814129b80a44ff5, adopt 3DES cryptographic algorithm keyed hash value k to obtain ciphertext 1 with private key, sequence j and ciphertext 1 are stitched together according to certain form (for example separating with underscore), just obtain User Identity symbol j_1.There is certain delay the time that the transmission User Identity accords with to time gap user's registration of the user of registration, will verify the authenticity of user's registration information therebetween, and it is real having only log-on message, and the identification identifier that just generates and sends the user is given the user.
The brief introduction of the digital content that the user search release module is had.The brief introduction of the digital content that release module receiving digital contents encryption processing module passes over, the unique identifier of digital content and with the corresponding scheduler module of this unique identifier address.Directly present to user's the brief introduction of having only digital content.If the user is interested in certain digital content, release module is just sending to client with the unique identifier of the corresponding digital content of this digital content and with the corresponding scheduler module of this unique identifier address so.
Client obtain digital content unique identifier and with the corresponding scheduler module of this unique identifier address after, just initiate dispatch request to this scheduler module, simultaneously the unique identifier of user's identification identifier and digital content is sent to scheduler module, the request scheduling module has the live module of this digital content for its scheduling.
After scheduler module received user's request, it passed to Registering modules, request registration module verification user's identity to the User Identity symbol of receiving.Registering modules checking user's identity, and verifying that the result returns to scheduler module.
The checking result that the scheduler module inspection is received, if the result is not for passing through in checking, illustrate that the user is not a validated user, the then request of scheduler module refusing user's is if the checking result illustrates that for passing through the user is a validated user, then scheduler module is according to the digital content unique identifier of receiving, dispatch according to dispatching algorithm, and the result of scheduling is returned to the user, the result that will dispatch preserves simultaneously.
After client is received scheduling result, just, from scheduling result, select suitable live module, initiate service request to selected live module then, simultaneously user's identification identifier and digital content unique identifier are sent to live module according to choosing algorithm.
After live module was received user's request, it passed to scheduler module to User Identity symbol and the digital content unique identifier received, the request scheduling module verification.The scheduling result comparison of the User Identity symbol of receiving and digital content unique identifier and preservation, if having, then comparison result is for passing through simply for scheduler module, if do not have, then comparison result returns to live module to comparison result then for not passing through.
Live module check comparison result, if comparison result is not for passing through, the then request of refusing user's, if comparison result is for passing through, then live module just sends to client to the digital content after the encryption.
After client is received digital content after the encryption, at first checking to have does not have and the corresponding licence of this digital content, if do not have, then the user sends the request of signing and issuing licence by client to the licensing module, simultaneously user's identification identifier, the use right and the digital content unique identifier of request is sent to the licensing module.
After the licensing module was received user's request, it was sent to Registering modules, request registration module verification user's identity to the User Identity symbol of receiving.Registering modules checking user's identity, and verifying that the result returns to the licensing module.
The checking result that licensing module check is received, if the result is not for passing through in checking, illustrate that the user is not a validated user, the then request of licensing module refusing user's, if the result is for passing through in checking, illustrate that the user is a validated user, then the use right of the identification identifier that sends over according to the user, request and the unique identifier of digital content are signed and issued licence.
The method that generates licence is at first to generate and this user-dependent unique watermark information; PKI with the licensing module is encrypted watermark information, obtains the watermark ciphertext; With the unique identifier of user's identification identifier, digital content, be used to generate the key seed of the key sequence of encrypted digital content, user's use right, the term of validity and the above-mentioned watermark ciphertext composition sequence of licence; Use the above-mentioned sequence of hashing algorithm hash, obtain a string hashed value; Occupancy permit is signed and issued the private key of module hashed value is encrypted, and obtains ciphertext; Sequence and ciphertext are stitched together, become user license.Licence can be original copy and counterpart.
The licence original comprises following content: 1) with the ciphertext of user-dependent unique watermark information; 2) user's identification identifier; 3) unique identifier of digital content; 4) be used for the seed of the key of the digital content behind the enabling decryption of encrypted; 5) user's use right; 6) term of validity of licence; 7) digital signature of above-mentioned six contents.The licence copy is compared with the licence original, a many content---customizing messages of client.The copy of licence is compared with the original of licence, and the term of validity of copy may be shorter than the term of validity of original, and this use right with the user is relevant, and copy is relevant with client, and the copy that sends to a client can not use on another client.Signed and issued after the licence, the licensing module is preserved the original of licence and the copy of licence, simultaneously the copy of licence is returned to client.
After client is received licence, reproduce digital content after the encryption of receiving according to user's actual needs under the right of just in licence, permitting.Under default situations, client is just according to the right of permitting in the licence, and the content after the encryption that decoding is received is shown to the user.If the digital content of customer requirements after to the encryption of receiving done further processing, he must file a request to client.After client was received user's request, it can check whether permit the corresponding right to the user in the licence, if having, then carry out user's request, if do not have, and the then request of refusing user's.For example, the user has a licence, the right that user's right is only watched is given in permission in this licence, if the customer requirements client is preserved digital content so, because permission is not to this right of user in the licence, client is checked this licence after the request of receiving the user, discovery does not have this right, so the request that client will refusing user's.
According to aforesaid method, by encrypting live digital content or the mode of adding watermark in live digital content, make that the user can't be from directly obtaining original digital content through the digital content after the encryption, by signing and issuing the mode of licence, make the content owner can the control and management user to the use of this content, prevent the illegal use of user to this content.

Claims (7)

1, the extensive live method of a kind of digital content is characterized in that this method may further comprise the steps:
(1) digital content processing module receiving digital contents, digital content is carried out encryption, to obtain three road signals, wherein the first via is the digital content after encrypting, be sent to live module, the second the tunnel be digital content brief introduction, digital content unique identifier and with the corresponding scheduler module of this unique identifier address, be sent to release module, Third Road be digital content unique identifier and with this encryption after the corresponding live module's address of digital content, be sent to scheduler module;
(2) Registering modules receives user's individual log-on message, generates this user's unique identifier, and this user identifier is combined with public information in the individual log-on message, generates this user's identification identifier;
(3) user by client from the brief introduction of above-mentioned release module key numbers, and according to digital content brief introduction obtain required digital content unique identifier and with the corresponding scheduler module of this unique identifier address;
(4) user sends dispatch request according to the scheduler module address of above-mentioned steps (3) to this scheduler module, and sends the unique identifier of digital content and user's oneself identification identifier to it;
(5) after scheduler module is received dispatch request, user's identification identifier is sent to Registering modules, Registering modules is verified it, and will be verified that the result is recycled to scheduler module;
(6) scheduler module is checked and verified the result, if the result is not for passing through in checking, scheduler module refusing user's request then, if the result is for passing through in checking, then scheduler module is dispatched according to the unique identifier of the digital content that receives, and will be sent to client with the live module's address at digital content place after the corresponding encryption of the unique identifier of this digital content, preserve scheduling result simultaneously;
(7) client is initiated service request according to above-mentioned live module's address to live module, and the unique identifier with User Identity symbol and digital content is sent to this live module simultaneously, to obtain digital content;
(8) live module is sent to scheduler module with the user's that receives the identification identifier and the unique identifier of digital content, the scheduling result comparison that scheduler module is preserved itself and above-mentioned steps (6), and the result of comparison is back to live module;
(9) comparison result received of live module check, if comparison result is not for passing through, the request of then live module refusal client, if comparison result is for passing through, then the unique identifier of the digital content that receives of basis provides digital content after the encryption to client;
(10) after client receives digital content after the encryption, search corresponding licence with this digital content, if no licence, then the user initiates to sign and issue license request by client to the licensing module, uses the unique identifier of right and digital content to be sent to the licensing module oneself identification identifier, request simultaneously;
(11) the licensing module is sent to Registering modules with the User Identity symbol of receiving, Registering modules is verified it, and will be verified that the result is recycled to the licensing module;
(12) the checking result that receives of licensing module check, if the result is not for passing through in checking, the then request of licensing module refusing user's, if the result is for passing through in checking, then the use right of the identification identifier that sends over according to the user, request and the unique identifier of digital content are signed and issued licence, and the licence copy of signing and issuing is sent to client, preserve this licence simultaneously;
(13) reproduce digital content after the encryption of receiving according to user's actual needs under the client right of in licence, permitting.
2, the method for claim 1 is characterized in that the encryption of step (1) comprising:
2.1 use key seed to generate encryption key sequence;
2.2 the key in the use key sequence is encrypted digital content according to cryptographic algorithm;
3, the method for claim 1 is characterized in that individual log-on message comprises in the step (2): name, address, password, Email, landline telephone, identification card number, cell-phone number, credit number.
4, the method for claim 1 is characterized in that the method that generates the User Identity symbol in the step (2) comprises the steps:
4.1 from user's individual log-on message, choose public information;
4.2 each user generates a unique identifier;
4.3 public information in the step 4.1 and the unique identifier in the step 4.2 are formed new sequence;
4.4 use the sequence in the hashing algorithm Hash step 4.3, obtain a string hashed value;
4.5 the private key that uses Registering modules to set is encrypted hashed value, obtains ciphertext;
4.6 the sequence of step 4.3 and the ciphertext of step 4.5 are stitched together, obtain the User Identity symbol.
5, the method for claim 1 is characterized in that the user in the step (10) uses right to be: watch digital content time, watch digital content number of times, can preserve the digital content received, the digital content of preserving can be duplicated, the digital content of preserving can be copied to another equipment and maybe can distribute any or multiple in the digital content of preservation to other people.
6, the method for claim 1 is characterized in that the method that generates licence in the step (12) comprises the steps:
6.1 generate and this user-dependent unique watermark information;
6.2 the PKI with the licensing module is encrypted the watermark information of step 6.1, obtains the watermark ciphertext;
6.3 with the unique identifier of user's identification identifier, digital content, be used to generate the key seed of the key sequence of encrypted digital content, user's use right, the term of validity and the above-mentioned watermark ciphertext composition sequence of licence;
6.4 use the sequence of hashing algorithm Hash step 6.3, obtain a string hashed value;
6.5 occupancy permit is signed and issued the private key of module hashed value is encrypted, and obtains ciphertext;
6.6 the sequence of above-mentioned steps 6.3 and the ciphertext of step 6.5 are stitched together, become user license.
7, method as claimed in claim 6 is characterized in that also comprising: generate a licence copy, and send to client.
CNB2004100339981A 2004-04-23 2004-04-23 A method for large-scale living broadcast of digital content Expired - Fee Related CN1320797C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2004100339981A CN1320797C (en) 2004-04-23 2004-04-23 A method for large-scale living broadcast of digital content

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2004100339981A CN1320797C (en) 2004-04-23 2004-04-23 A method for large-scale living broadcast of digital content

Publications (2)

Publication Number Publication Date
CN1571331A CN1571331A (en) 2005-01-26
CN1320797C true CN1320797C (en) 2007-06-06

Family

ID=34481443

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004100339981A Expired - Fee Related CN1320797C (en) 2004-04-23 2004-04-23 A method for large-scale living broadcast of digital content

Country Status (1)

Country Link
CN (1) CN1320797C (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1710969A1 (en) * 2005-04-08 2006-10-11 Siemens Aktiengesellschaft A method and system for enabling a first party to provide a second party with personalized digital content
KR100724935B1 (en) * 2005-09-15 2007-06-04 삼성전자주식회사 Apparatus and method of interlock between entities for protecting contents, and the system thereof
CN101207794B (en) * 2006-12-19 2010-06-16 中兴通讯股份有限公司 Method for enciphering and deciphering number copyright management of IPTV system
CN102088443B (en) * 2009-12-02 2015-04-01 北大方正集团有限公司 Method and system for subscribing digital periodical with copyright protection
CN112257038A (en) * 2020-11-19 2021-01-22 创盛视联数码科技(北京)有限公司 Courseware anti-theft method, courseware anti-theft system, electronic equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1335557A (en) * 2000-07-03 2002-02-13 株式会社日立制作所 Data display method and system
WO2003058876A2 (en) * 2002-01-11 2003-07-17 Koninklijke Philips Electronics N.V. Generation of a watermark being unique to a receiver of a multicast transmission of multimedia

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1335557A (en) * 2000-07-03 2002-02-13 株式会社日立制作所 Data display method and system
WO2003058876A2 (en) * 2002-01-11 2003-07-17 Koninklijke Philips Electronics N.V. Generation of a watermark being unique to a receiver of a multicast transmission of multimedia

Also Published As

Publication number Publication date
CN1571331A (en) 2005-01-26

Similar Documents

Publication Publication Date Title
CN1219260C (en) Method for controlling storage and access of security file system
US7287164B2 (en) Method and system for encoding signatures to authenticate files
CN1805337A (en) Secret shared key mechanism based user management method
US20200226233A1 (en) Distributed ledger-based digital content piracy deterrence
EP2109248B1 (en) Method and device for testing consistency of numeric contents
CN100338905C (en) Method of binding digital contents and hardware with hardward adaptive
CN1838163A (en) Universal electronic stamping system based on PKI
CN1933393A (en) Inter-entity coupling method, apparatus and system for content protection
CN1956449A (en) Encipher transmission method and equipment system for preventing cpying data resource
CN1820482A (en) Method for generating and managing a local area network
CN1859086A (en) Content grading access control system and method
CN1771487A (en) Method and apparatus for limiting number of times contents can be accessed using hashing chain
CN1694395A (en) Data authentication method and agent based system
CN101038612A (en) Method for generating licence and method and apparatus for providing contents using the same
CN111405223A (en) Video processing method, device and equipment
CN1645797A (en) Method for optimizing safety data transmission in digital copyright managing system
CN1371059A (en) Data releasing system
JP3917395B2 (en) Content distribution method, content distribution device, content illegal copy inspection method, content illegal copy inspection device, content distribution program, content illegal copy inspection program, and computer-readable recording medium recording these programs
CN1320797C (en) A method for large-scale living broadcast of digital content
CN1741442A (en) Copyright piracy tracking and identifying method in radio digital copyright management system
CN1859149A (en) Method for realizing stream medium business service
Guo et al. (t, n) Threshold secret image sharing scheme with adversary structure
CN1829150A (en) Gateway identification device and method based on CPK
CN114826730B (en) Blockchain covert communication model capable of hiding sensitive document and sender identity
CN1204712C (en) Method for implementing cross-domain file sharing

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20070606

Termination date: 20170423