CN1347225A - Safety control method for copyright - Google Patents

Safety control method for copyright Download PDF

Info

Publication number
CN1347225A
CN1347225A CN 00130659 CN00130659A CN1347225A CN 1347225 A CN1347225 A CN 1347225A CN 00130659 CN00130659 CN 00130659 CN 00130659 A CN00130659 A CN 00130659A CN 1347225 A CN1347225 A CN 1347225A
Authority
CN
China
Prior art keywords
layer
key
operation
method
obtain
Prior art date
Application number
CN 00130659
Other languages
Chinese (zh)
Inventor
杨高雄
Original Assignee
杨高雄
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 杨高雄 filed Critical 杨高雄
Priority to CN 00130659 priority Critical patent/CN1347225A/en
Publication of CN1347225A publication Critical patent/CN1347225A/en

Links

Abstract

A high-safety copyright control method for selling original electronic publication over network and preventing piracy on network is characterized by beside encrypting the head and tail of electronic publication, the original electronic publication is divided into multiple data blocks, which are sequentially encryped by RSA algorithm, data encrypt standard (DES) or XOR algorithm.

Description

制作权安全控制的方法 The method of making the right security controls

本发明涉及一种防止非法复制原始电子出版物的方法,特别是一种在网络上防止非法复制原始电子出版物和销售原始电子出版物的方法。 The present invention relates to a method for preventing illegal copy of the original electronic publications method, particularly a method of illegal copy of the original sale of the original electronic publications and electronic publications prevented on the network.

在当前电子时代中,由于网络产业蓬勃发展,导致网络上的原始电子出版物,例如当今最流行的运动图象专家组第一版第三层(Moving PicturesExpert Group 1 Layer 3,缩写MPEG1Layer 3,以下简称MP3)格式的音乐,时常经网络被不良厂商或使用者非法复制,致使正版的MP3的权益得不到保护,在现有技术中,通常只在原始电子出版物的头和尾加上一个密码,导致投机人士只要破译这种密码锁,即可非法复制该原始电子出版物的全部内容。 In the current electronic age, because the network industry to flourish, leading to the original electronic publication on the network, such as the most popular first edition of the Moving Picture Experts Group Layer (Moving PicturesExpert Group 1 Layer 3, the abbreviation MPEG1Layer 3, the following referred to as MP3) format music, often being illegally copied by manufacturers or bad network users, resulting MP3 genuine rights and interests are not protected, in the prior art, usually only add one at the head and tail of the original electronic publications passwords, leading speculators to decipher this long locks, you can copy the entire contents of the original illegal electronic publications.

为此,本发明的目的是提出一种制作权安全控制的方法,本发明的制作权安全控制方法要求公司、销售网站使用该方法,使得在网络上销售原始电子出版物可以顺利进行,以达到公司所发行的原始电子出版物,只能经使用者使用特殊方法才能播放,使用者无法互相复制交换所购买的原始电子出版物,销售网站也不能私自复制非法销售,公司内部也不能任意私自复制非法销售。 To this end, the present invention is to provide a method for making the right security control, security control method of the present invention to make the right to require the company, sales sites use this method, so that the original sale of electronic publications on the network can be carried out smoothly, in order to achieve the company issued the original electronic publications, only by the user to use a special method to play, users can not copy another original electronic publications exchange purchase and sale of the site can not be copied without permission illegal sales, the company can not be any unauthorized copying illegal sales.

为了实现本发明的上述目的,本发明的制作权安全控制的方法的第一个方面是该方法包括以下步骤:多个公司把原始电子出版物加密为第一层加密电子出版物,然后再把该第一层加密电子出版物加密为第二层加密电子出版物;多个销售网站把第二层加密电子出版物解密为第一层加密电子出版物,然后再把该第一层加密电子出版物加密为第三层加密电子出版物;多个使用者把第三层加密电子出版物解密为第一层加密电子出版物,然后再把第一层加密电子出版物解密为原始电子出版物。 To achieve the above object of the present invention, a first aspect of the present invention is a method of making the right is that the safety control method comprising the steps of: a plurality of original electronic publication companies to encrypted into a first encrypted electronic publications layer, and then the first layer encryption to encrypt electronic publication as a second layer of encryption and electronic publications; more sales site to the second layer encryption decryption of electronic publications and electronic publications for the first layer of encryption, then put the first layer encryption of electronic publishing the third layer was encrypted into encrypted electronic publication; the third layer of a plurality of users to decrypt the encrypted electronic publications encrypted electronic publications first layer, a first layer and then decrypt the encrypted electronic publications original electronic publication.

为了实现本发明的上述目的,本发明的制作权安全控制的方法的第二个方面是多个公司可以在网络上防止非法复制原始电子出版物和销售该原始电子出版物的方法,该制作权安全控制方法的步骤是:每一个公司首先随机产生第一密钥和第一初始向量,然后再利用第一公开密钥对第一密钥及第一初始向量进行加密运算,得到第一个非对称性密码,接着使用第一密钥和第一初始向量对原始电子出版物进行加密运算,得到第一层加密电子出版物,然后再随机产生第二初始向量,使用第二公开密钥对第一非对称性密码及第二初始向量的数据进行加密运算,得到第二非对称性密码,然后使用第二公开密钥和第二初始向量对第一层加密密钥进行加密运算,得到第二层加密电子出版物。 To achieve the above object of the present invention, a second aspect of the present invention is a method of making the right security companies can control a plurality of original electronic publications to prevent illegal copying of the original method of electronic publication and distribution on the network, making the right step safety control method is: first randomly every company, the first key and a first initialization vector, then use the first public key of the first key and a first initialization vector for encryption operation, to obtain a first non- symmetry password, and then using the first key and the first initial vector for encryption operation original electronic publications, to give a first layer encrypted electronic publications, and then a second random initial vector generated using the second public key of asymmetric cryptographic data and a second initial vector for encryption operation, to obtain a second asymmetry password, and then using the second public key and a second initial vector of the first layer of encryption key cryptographic operations to obtain a second layer encryption electronic publications.

为了实现本发明的上述目的,本发明的制作权安全控制的方法的第三个方面是销售网站可以在网络上防止非法复制原始电子出版物和销售原始电子出版物的方法,该制作权安全控制方法包括以下步骤:利用第二秘密密钥对由公司传来的第二非对称性密码进行解密运算,得到第一非对称性密码和第二初始向量,用第二秘密密钥和第二初始向量对由公司传来的第二层加密电子出版物进行解密运算,得到第一层加密电子出版物,随机产生第二密钥和第三初始向量,利用第三公开密钥对第二密钥和第三初始向量作加密运算,得到第三非对称性密码,用第二密钥对使用者序号做加密运算,得到变异密钥,用该变异密钥对第一非对称性密码进行加密运算,得到变异密码,用该变异密钥和第三初始向量对第一层加密电子出版物进行加密运算,得到第三层加密电子 To achieve the object of the present invention, a third aspect of the method of the present invention to make the right security controls is to sell the site to copy the original method of electronic publications and illegal sales of original electronic publications can be prevented on the network, making the right security controls the method comprises the steps of: asymmetry second password transmitted by the company to decrypt the secret key using the second operation, to obtain first and second asymmetric cryptographic initialization vector, using a second secret key and a second initial vector of the second layer coming from the company encrypted electronic publications decryption operation is performed to obtain a first layer encrypted electronic publications, randomly generated second key and the third initial vector, the third public key using the second key and a third initial vector for encryption algorithm to obtain a third password asymmetry, with the user ID to make the second key encryption algorithm, to obtain variation key for cryptographic operations using a first asymmetric cryptographic key that variation to give variation passwords, cryptographic operations on the first layer with the electronic publication encryption key and a third initial vector variation, to give a third encrypted electronic layer 版物。 Publications.

为了实现本发明的上述目的,本发明的制作权安全控制的方法的第四个方面是防止使用者在网络上非法复制原始电子出版物和销售原始电子出版物的方法,该制作权安全控制方法包括以下步骤:使用第三秘密密钥对由销售网站传来的第三非对称性密码进行解密运算,得到第二密钥和第三初始向量,利用第二密钥对使用者序号进行加密运算,得到变异密钥,用变异密钥对由销售网站传来的变异密码进行解密运算,得到第一非对称性密码,用变异密钥和第三初始向量对由销售网站传来的第三层加密电子出版物进行解密运算,得到第一层加密电子出版物,利用第一秘密密钥对第一非对称性密码作解密运算,得到第一密钥和第一初始向量,用第一密钥和第一初始向量对第一层加密电子出版物进行解密运算,得到原始电子出版物。 To achieve the above object of the present invention, a fourth aspect of the present invention is a method of making the right safety control method is to prevent illegal copying of the original user electronic publications and the original sale of electronic publications on the network, making the right of the safety control method comprising the steps of: using the third secret key to a third asymmetric cryptographic transmitted by the sales site decryption operation to obtain the second key and the third initial vector, a user ID of the cryptographic operations using a second key to give the key variation, variation of the password transmitted from the sale site with variation decryption key to obtain a first password asymmetry, variation with the key and the third initial vector of the third layer came from the sale site decrypting the encrypted electronic publications calculation to obtain a first layer encrypted electronic publication, using a first secret key for the first cryptographic asymmetric decryption operation to obtain the first key and the first initial vector, with a first key and first initial vector for decryption of the encrypted electronic publications first layer, to obtain the original electronic publications.

本发明的优点是:利用对原始电子出版物层层加密达到公司所发行的原始电子出版物,只能经使用者使用的特殊方法才能播放,使用者无法互相复制交换所购买的原始电子出版物,销售网站也不能私自复制非法贩售,公司内部也不能任意私自复制非法贩售。 Advantage of the present invention are: the use of the original electronic publication layers of encryption to achieve the original electronic publication issued by the company, the user can only use a special method to play, users can not copy another original electronic publications exchange purchase sales website can not be copied without permission illegal to sell, the company can not sell any illegal copy without permission.

为使本发明的上述和其它目的、特征、和优点能更为明显易懂,下面将结合说明书附图导本发明的各个实施例进行详细描述。 The above and other objects of the present invention, features, and advantages can be more fully understood, the following description in conjunction with the accompanying drawings of various embodiments of the present invention, the guide will be described in detail. 其中各附图为:图1是本发明的一个实施例的示意性方框图;图2是按照图1的本发明的实施例实现本发明方法的流程图;图3是本发明的另一个实施例的示意性方框图;图4是按照图3的本发明的实施例实现本发明的方法的流程图;图5是本发明的再一个实施例的示意性方框图;图6是按照图3和图6的本发明的实施例实现本发明的方法的流程图;图7是本发明的另一个实施例的示意性方框图;图8是按照图5和图7的本发明的实施例实现本发明的方法的流程图;图9是本发明的再另一个实施例的示意性方框图;图10是按照图3和图9的本发明的实施例实现本发明的方法的流程图;图11是本发明的另一个实施例的示意性方框图;图12按照图11的本发明的实施例实现本发明的方法的流程图;图13按照图9的本发明的实施例实现本发明的方法的流程图;图14是本发明的再另一个实 Wherein each of the drawings is: FIG. 1 is a schematic block diagram of the present invention embodiment; FIG. 2 is a flowchart of an implementation method of the present invention according to an embodiment of the present invention, FIG. 1; FIG. 3 is another embodiment of the present invention the schematic block diagram; FIG. 4 is a flowchart of a method for implementing the present invention according to an embodiment of the present invention. FIG. 3; FIG. 5 is a schematic block diagram of a further embodiment of the present invention; FIG. 6 is a 6 in FIG. 3 and FIG. Example embodiments of the present invention achieves a flowchart of a method of the present invention; FIG. 7 is a schematic block diagram of another embodiment of the present invention; FIG. 8 is a method of carrying out the invention according to an embodiment of the present invention, FIGS. 5 and 7 flowchart; FIG. 9 is a schematic block diagram of another embodiment of the present invention of another embodiment; FIG. 10 is a flowchart of an implementation method of the present invention according to an embodiment of the present invention in FIG. 3 and FIG. 9; FIG. 11 is the present invention. schematic block diagram of another embodiment of; the present invention is a method flowchart of FIG. 12 according to an embodiment of the present invention is implemented in FIG. 11; the present invention a method flowchart of FIG 13 according to an embodiment of the present invention is implemented in FIG. 9; FIG. 14 is yet another embodiments of the present invention 例的示意性方框图;图15按照图14的本发明的实施例实现本发明的方法的流程图;图16是本发明的另一个实施例的示意性方框图;图17是按照图16的本发明的实施例实现本发明的方法的流程图;图18是按照图14的本发明的实施例另一个实现本发明的方法的流程图;图19是按照图5的本发明的实施例另一个实现本发明的方法的流程图;和图20是按照图5的本发明的实施例另一个实现本发明的方法的流程。 Schematic block diagram of the embodiment; FIG. 15 a flowchart of a method according to an embodiment of the present invention. FIG. 14 of the present invention is implemented; FIG. 16 is a schematic block diagram of another embodiment of the present invention; FIG. 17 is the invention according to FIG. 16 a flowchart of a method embodiment of the present invention is implemented; FIG. 18 is a flowchart according to an embodiment of the present invention, FIG 14 another implementation of the method according to the present invention; FIG. 19 is implemented in accordance with another embodiment of the present invention. FIG. 5 a flowchart of a method according to the invention; and 20 in accordance with an embodiment of the present invention FIG 5 is a further implementation of the present invention, a flow of FIG.

参照图1和图2,图中表示出根据本发明的一个优选实施例的一种制作权安全控制的方法,该方法是关于多个公司和多个销售网站可以在网络上防止非法复制原始电子出版物和销售该原始电子出版物的方法,该制作权安全控制方法包括:在步骤S200中有多个公司100,把原始电子出版物106加密为第一层加密电子出版物108,其中该原始电子出版物包括波形音乐文件、MP3文件及影像文件,然后再把该第一层加密电子出版物108加密为第二层加密电子出版物110;在步骤S202中,有多个销售网站102,把第二层加密电子出版物110解密为第一层加密电子出版物108,然后再把该第一层加密电子出版物108加密为第三层加密电子出版物116;在步骤S204中,有多个使用者104把第三层加密电子出版物116解密为第一层加密电子出版物108,然后再把第一层加密电子出版物108解密为原始电 Referring to FIG. 1 and FIG. 2, FIG embodiment shows a method of making the right security controls in accordance with a preferred embodiment of the present invention, the process is concerning a plurality of companies and a plurality of sales sites on the network can be prevented from an illegal copy of the original electronic the publication and distribution of electronic original publication method, the right of making the safety control method comprising: a plurality of company 100 in step S200, the electronic publications 106 of the original encrypted into encrypted electronic publications 108 of the first layer, wherein the original electronic publications including waveforms music files, MP3 files and image files, 108 and then encrypting the encrypted electronic publication as the first layer a second layer encrypted electronic publication 110; in step S202, a plurality of sales site 102, the the second layer 110 decrypts encrypted electronic publication encrypted electronic publications 108 of the first layer, and then the first layer is encrypted into encrypted electronic publications 108 encrypted electronic publications 116 of the third layer; and in step S204, a plurality of user layer 104 116 decrypts encrypted electronic publication encrypted electronic publications 108 of the first layer, and then a first layer 108 decrypts encrypted electronic publications original electrical 出版物106。 Publication 106.

其中这些公司100把原始电子出版物106加密为第一层加密电子出版物108,再把第一层加密电子出版物108加密为第二层加密电子出版物110的方法的步骤包括:由公司先随机产生第一密钥,且将第一密钥配合第一公开密钥使得将原始电子出版物106加密为第一层加密电子出版物108,然后再使用第二公开密钥将第一层加密电子出版物108加密为第二层加密电子出版物110。 Wherein the original electronic publication companies 100 106 encrypted into encrypted electronic publications 108 of the first layer, the first layer and then encrypted into encrypted electronic publications 108 of the second layer of the encrypted electronic publications method 110 comprises: first by the company generating a first random key, the first key and the first public key with the electronic publications 106 such that the original encrypted into encrypted electronic publications 108 of the first layer, and then using the second public key and the first encryption layer electronic publications 108 encrypts encrypted electronic publications 110 of the second layer.

在每一家公司100中使用的第一公开密钥是相同的第一公开密钥,而第一密钥是不同的第一密钥,而第二公开密钥也是不同的第二公开密钥。 A first public key used in each company 100 is the same as the first public key and the first key is different from the first key, the second public key and the second public key are different.

其中这些销售网站102把第二层加密电子出版物110解密为第一层加密电子出版物108,然后再把第一层加密电子出版物108加密为第三层加密电子出版物116的方法包括:这些销售网站102使用第二秘密密钥对第二层加密电子出版物110解密为第一层加密电子出版物108,而有第二密钥是由这些销售网站102随机产生的并与这些使用者序号运算后产生而成变异密钥,然后使用该变异密钥配合第三公开密钥对第一层加密电子出版物108加密为第三层加密电子出版物116。 These sales site 102 wherein the second layer 110 decrypts encrypted electronic publication encrypted electronic publications 108 of the first layer, and then a first layer of encryption 108 encryption method of electronic publication as a third layer 116 comprises encrypted electronic publications: these sales site 102 using the second secret key of the second layer 110 decrypts encrypted electronic publications encrypted electronic publications 108 of the first layer, while the second key is a randomly generated by the sale of these sites, and these users 102 Reference is made to produce variation after operation key, and then use the key with variation of the third public key 108 encrypted first encryption layer to the third layer electronic publications 116 encrypted electronic publications.

在每一家销售网站使用的第二秘密密钥是对应于每一家公司使用的第二公开密钥,是不同的第二秘密密钥,而第三公开密钥为相同的第三公开密钥,但第二密钥为不同的第二密钥。 In the second secret key every sales site using the public key corresponding to the second use of each company is different from a second secret key, and a third public key to the same third public key, but the second key to the second key different.

其中使用者104把第三层加密电子出版物116解密为第一层加密电子出版物108,然后再把第一层加密电子出版物108解密为原始电子出版物106的方法包括:使用者104使用变异密钥配合第三秘密密钥将第三层加密电子出版物116解密为第一层加密电子出版物108,再使用第一秘密密钥对第一层加密电子出版物108解密为原始电子出版物106。 Wherein the third layer of the user 104 decrypts encrypted electronic publications 116 encrypted electronic publications 108 of the first layer, and then a first layer 108 decrypts encrypted electronic publications 106 of the original electronic publications method comprising: using a user 104 variation third key with a secret key encrypted electronic publications, a third layer 116 decrypts encrypted electronic publications 108 of the first layer, then using a first layer of a first secret key to decrypt the encrypted electronic publications 108 of the original electronic publishing 106.

其中每一个使用者104使用的第三秘密密钥是相同的第三秘密密钥,且每一个使用者104使用的第一秘密密钥也是相同的第一秘密密钥,但变异密钥是不同的变异密钥,且每一个使用者使用的第一密钥也是不同的第一密钥。 Wherein the third secret key for each user 104 uses the same secret key to a third, and a first secret key for each user 104 using a first secret key is the same, but the keys are different variation variation keys, and each user uses a first key of the first key is different.

参照图3及图4,其中表示出根据本发明的一个优选实施例的一种制作权安全控制的方法,该方法是关于多个公司可以在网路上防止非法复制原始电子出版物和销售该原始电子出版物的方法,该制作权安全控制方法包括:在步骤s400中,每一公司100先随机产生第一密钥和第一初始向量300,在步骤s402中,再使用第一公开密钥302对第一密钥和第一初始向量300进行加密运算304,得到第一非对称性密码306,这里所进行的加密运算304是利用一种RSA进行加密运算304。 Referring to FIG. 3 and FIG. 4, there is shown an example of a method of making the right security controls in accordance with a preferred embodiment of the present invention, which relates a plurality of companies can prevent illegal copying and distribution of the original electronic original publication on the web the method of electronic publication, the right to produce the safety control method comprising: in step s400, each company 100 to generate a first random key and a first initialization vector 300, in step s402, and then using the first public key 302 first key and a first initialization vector for encryption operation 300 304, to obtain a first asymmetry password 306, where the encryption operation 304 is performed using one 304 RSA cryptographic operations. 接着在步骤s404中,使用第一密钥和第一初始向量300对原始电子出版物106进行加密运算308,得到第一层加密电子出版物108,这里所进行的加密运算308是利用一种DES/XOR运算进行加密运算308。 Next, at step s404, a first key and a first initialization vector 300 pairs of the original electronic publications 106 308 encrypt operation to obtain encrypted electronic publications 108 of the first layer, where encryption is performed using one DES operation 308 / XOR operation for encryption operation 308. 然后在步骤s406中,再随机产生第二初始向量310,在步骤s408中,使用第二公开密钥312对第一非对称性密码306和第二初始向量310的数据进行加密运算314,得到第二非对称性密码316,这里所进行的加密运算314是利用一种RSA进行加密运算314。 Then in step s406, and then randomly generating a second initialization vector 310, in a step s408 using a second public key data of the first 312 pairs of asymmetry password 306 and a second initial vector for encryption operation 310, 314, to give first two asymmetric password 316, where the encryption operation 314 is performed using one 314 RSA cryptographic operations. 然后在步骤s410中,使用第二公开密钥312和第二初始向量310对第一层加密电子出版物108进行加密运算318,得到第二层加密密钥110,这里所进行的加密运算318是利用一种非对称性密码运算法与XOR进行加密运算318。 Then in step s410, a second public key 312 and second 310 pairs of the initial vector of the first layer encryption operation encrypts electronic publications 108 318, 110 encryption key to obtain a second layer, where the encryption operation 318 is performed using a cryptographic asymmetric algorithms for encryption 318 and the XOR operation.

参照图3、图5和图6,其中表示出根据本发明一个优选实施例的一种制作权安全控制的方法,其中利用DES/XOR进行加密运算308,使每一家公司100得到第一层加密电子出版物108的方法步骤包括:在步骤s600中,将原始电子出版物106分割为多组数据区块500,然后在步骤s602中,利用第一密钥504与第一初始向量502对原始电子出版物106的数据区块500中的第一数据区块进行DES/XOR 506,将原始电子出版物106的数据区块500中的第一数据区块加密,在步骤s604中,得到第一层加密电子出版物108密文区块516中的第一密文区块与第一初始向量1,508,在步骤s606中,对原始电子出版物106的数据区块500中的第二数据区块利用第一密钥504与第一初始向量1,508按DES/XOR 510进行加密运算,在步骤S608中,得到第一层加密密钥108的密文区块516的第二密文区块并得到第一初始向量2,512,然后在步骤s61 Referring to FIG 3, FIG 5 and FIG 6, there is shown a method of making the right according to an embodiment of the present invention is preferably a security control, wherein using DES / XOR operation is encrypted 308, so that each company to obtain a first layer of encryption 100 the method comprises the step of electronic publications 108: in step s600, the original electronic publications 106 is divided into a plurality of groups of data block 500, then at step s602, the 504 using the first key and the first initial vector 502 pairs of the original electronic publication data block 106 is a first data block 500 for DES / XOR 506, the original data block 106 of the electronic publications 500 of the first encrypted data block, at step s604, the first layer to give encrypted electronic publications 108 cipher block 516 of the first ciphertext block and the first 1,508 initial vector, in step s606, the second data block of data blocks 500 of the original 106 by the first electronic publication a first key and an initial vector 504 1,508 cryptographic operations by DES / XOR 510, in step S608, the encryption key to obtain a first layer of a second ciphertext block of ciphertext blocks 108 and 516 to obtain the first initial 2,512 vector, then at step s61 0中,根据将原始电子出版物106后续的各个数据区块500按DES/XOR进行加密运算,在步骤s612中,得到对应的密文区块516的最后密文区块。 0 in accordance with the original electronic publication 106 500 each subsequent data block cryptographic operations by DES / XOR, at step s612, the resulting ciphertext block corresponding to the last ciphertext block 516.

参照图5、图7及图8,其中表示出根据本发明的一个优选实施例的一种制作权安全控制的方法,该方法利用第一密钥与第一初始向量对原始电子出版物的数据区块中的第一数据区块进行DES/XOR,将原始电子出版物的数据区块的第一数据区块加密为第一层加密电子出版物的第一密文区块的方法步骤包括:在步骤s800中,将数据区块500中的每一组数据区块分割为多组子数据区块700,在步骤s802中,将每一组数据区块的第一组子区块与第一初始向量502进行XOR 702运算,得到第一初始向量1,508,在步骤s804中,将第一组子数据区块用第一密钥504进行DES701运算,得到密文区块516中的第一密文区块710的第一组子密文区块,在步骤s806中,将在第一组数据区块后续的子数据区块分别与第一初始向量1,508作XOR,得到对应的子密文区块710,在步骤s808中,以相同方式对数据区块500 Referring to FIGS. 5, 7 and 8, a method of making the right embodiment is shown wherein the safety control in accordance with a preferred embodiment of the present invention, the method using the first key and a first initialization vector data of the original electronic publication method step the first data block in the block is DES / XOR, the original data block a first data block of the electronic publication is a first layer of a first encrypted ciphertext blocks encrypted electronic publications include: in step s800, the data blocks of each set of data block 500 is divided into a plurality of sets of sub data blocks 700, at step s802, the first set of sub-blocks of each set of the first data block initial vector operation 502 XOR 702, a first initial vector to obtain 1,508, at step s804, the first set of sub-blocks of data using a first key for DES701 operation 504, a first ciphertext obtained ciphertext blocks 516 a first set of sub-blocks of ciphertext blocks 710, at step s806, a subsequent sub block data with the first initial vector for 1,508 XOR data block in the first set, to give the corresponding sub-block of ciphertext 710, at step s808, in the same manner as for the data blocks 500 的每一组子数据区块作加密运算,直到加密子数据区块700中的最后子数据区块成为子密文区块710中的最后子密文区块为止,根据将每一组数据区块的每一组子数据区块进行DES/XOR运算,得到对应的子密文区块710。 Each set of sub-blocks of data for cryptographic operations, until the last sub-block of the encrypted data block 700 in the sub data reaches a sub-block 710 in the ciphertext last sub-block of ciphertext, each set of data according to the area each set of sub-block data block is DES / XOR operation to obtain the corresponding sub-block of ciphertext 710.

参照图3、图9及图10,其中表示出根据本发明的一个优选实施例的一种制作权安全控制的方法,其中利用非对称性密码运算法与XOR进行加密运算得到第二层加密电子出版物的方法步骤包括:在步骤s1000中,将第一层加密电子出版物108分割成多组数据区块900,在步骤s1002中,将第一层加密电子出版物108的第一数据区块用第二公开密钥312进行RSA的加密运算,在步骤s1004中,得到第二层加密电子出版物110密文区块920的第一块密文区块,在步骤s1006中,将第二初始向量310与第一层加密电子出版物108的第一数据区块进行XOR运算,在步骤s1008中,得到第二初始向量1,910,在步骤s1010中,将第二初始向量1,910与第一层加密电子出版物108的第二数据区块进行XOR运算,在步骤s1012中,得到第二密文区块,在步骤s1014中,利用XOR运算将第一层加密电子出版物108的数据区块900加密 Referring to FIG. 3, FIG. 9 and FIG. 10, a method of making the right embodiment is shown wherein the safety control in accordance with a preferred embodiment of the present invention, wherein the use of asymmetric cryptographic algorithms and cryptographic operations to obtain a second XOR encrypted electronic layer the method comprises the step of publications: in step s1000, the first layer 108 encrypted electronic publications divided into groups of data blocks 900, in step s1002, the first layer of a first data block encrypted electronic publications 108 RSA encryption operation performed by the second public key 312, in step s1004, the encrypted electronic publications give a second layer 110 of a cipher block cipher block 920, at step s1006, the second initial vector XOR operation 310 with the first data block of the first layer 108 is encrypted electronic publications, in step S1008, a second initial vector to obtain 1,910, in step s1010, the second layer of the first initial vector and the encrypted electronic 1,910 publications second data block 108 performs the XOR operation, in step s1012, the second ciphertext block obtained in the step s1014, an XOR operation using the first layer 900 encrypted data block encrypted electronic publications 108 第二层加密电子出版物110的密文区块920,直到在步骤s1016中,将第一层加密电子出版物108最后数据区块加密成第二层加密电子出版物110的最后密文区块为止。 The second layer ciphertext encrypted electronic publications 920 of block 110, until in step s1016, the first layer 108 encrypted electronic publications last layer data block into a second encrypted encrypted electronic publications in the last ciphertext block of 110 until.

参照图11和图12,其中表示出根据本发明的一个优选实施例的一种制作权安全控制的方法,该方法是关于销售网站可以在网络上防止非法复制原始电子出版物和销售原始电子出版物的方法,该制作权安全控制方法的步骤包括:在步骤s1200中,用第二秘密密钥922对由公司100传来的第二非对称性密码316进行解密运算1104,这里所进行的解密运算1104是利用一种RSA解密。 Referring to FIGS. 11 and 12, a method of making the right embodiment is shown wherein the safety control in accordance with a preferred embodiment of the present invention, the process is on sale site can prevent illegal copying of the original electronic publication and distribution of electronic original publication on the web the method thereof, the step of making the weight of the safety control method comprising: in step s1200, the 922 pairs of the second password transmitted by the asymmetry of its 100 1104 316 with a second secret decryption key, the decryption carried out herein 1104 is a calculation using one RSA decryption. 在步骤s1202中,得到第一非对称性密码306和第二初始向量310,在步骤s1204中,用第二秘密密钥922和第二初始向量31 0对由公司100传来的第二层加密电子出版物110进行解密运算1110,这里所进行的解密运算1110是利用一种RSA/XOR。 In step s1202, the first asymmetric cryptographic give 306 310 and a second initial vector, in step s1204, the secret key 922 with the second vector 310 and the second initial welcome the sound by the company 100 2nd layer electronic publications 110 decryption operation 1110, where decryption operation 1110 is performed using one RSA / XOR. 在步骤s1206中,得到第一层加密电子出版物108,在步骤s1208中,随机产生第二密钥1116和第三初始向量1114,在步骤s1210中,利用第三公开密钥1118对第二密钥1116和第三初始向量1114进行加密运算1120,这里所进行的加密运算1120是利用一种RSA作加密运算1120。 In step s1206, the obtained encrypted electronic publications 108 of the first layer, in step s1208, the randomly generated second key 1116 and a third initial vector 1114, in step s1210, the third public key using a second secret 1118 pairs key 1116 and a third initial vector for encryption operation 1114 1120, where encryption operation 1120 is performed using one as RSA encryption operation 1120. 在步骤s1212中,得到第三非对称性密码1122,在步骤s1214中,利用第二密钥1116对使用者序号1124进行加密运算1126,其中使用者序号1124是由用户端的使用者所输入,而这里所进行的加密运算1126是利用一种DES进行加密运算1126。 In step s1212, the code 1122 to obtain a third asymmetry, in step s1214, the second key using the user ID 1124 1116 pairs encryption operation 1126, where 1124 is the user ID input by the user of the user terminal, and encryption operation 1126 is performed here utilizes a DES encryption operation 1126 performed. 在步骤s1216中,得到变异密钥1128,在步骤s1218中,利用该变异密钥1128对第一层加密电子出版物108进行加密运算1130,这里所进行的加密运算1130是利用一种DES进行加密运算1130。 In step s1216, the resulting variant key 1128, at step s1218, the first layer by using the variant key encrypted electronic publications cryptographic operations 108 1128 1130, where encryption operation 1130 is performed using one DES encrypting 1130 operation. 在步骤s1220中,得到变异密码1134,在步骤s1222中,用该变异密钥1128和第三初始向量1114对第一层加密电子出版物108进行加密运算1132,这里所进行的加密运算1132是利用一种DES/XOR运算进行该加密运算1132。 In step s1220, the obtained variation password 1134, in step s1222, the variation with the key and the third initial vector 1128 1114 Publications first layer 108 encrypted electronic cryptographic operations 1132, the encryption operation 1132 is performed here using one kind DES / XOR operation for the encryption operation 1132. 在步骤s1224中,得到第三层加密密钥116。 In step s1224, the encryption key 116 to obtain the third layer.

参照图9和图13,其中表示出根据本发明的一个优选实施例的一种制作权安全控制的方法,该方法利用RSA/XOR解密得到第一层加密的方法步骤包括:在步骤s1300中,将第二层加密电子出版物的密文区块920中的第一密文区块利用第二秘密密钥922通过RSA运算进行解密运算,在步骤s1302中,得到第一层加密电子出版物数据区块936中的第一数据区块,在步骤s1304中,将第二初始向量310与第一层加密电子出版物中的第一数据区块进行XOR运算,在步骤s1306中,得到相对应的第二初始向量1,910,在步骤s1308中,将第二层加密电子出版物中的第二密文区块通过XOR与第二初始向量1,910进行运算,在步骤s1310中,得到第一层加密电子出版物的第二数据区块,在步骤s1312中,将第二初始向量310与第一层加密电子出版物的第二数据区块通过XOR进行运算,在步骤s1314中,得到第二初始向 Referring to FIGS. 9 and 13, a method of making the right embodiment is shown wherein the safety control in accordance with a preferred embodiment of the present invention, the method utilizes the method steps RSA / XOR of the decrypted first encryption layer comprises: in step S1300, the ciphertext blocks encrypted electronic publications 920 of the second layer in the first ciphertext block using a second secret key decryption operations 922 through RSA operation, in step s1302, the first layer obtained encrypted electronic data publications the first data block in block 936, in step s1304, the initial vector 310 of the second XOR operation is performed with a first layer of a first data block encrypted electronic publications, in step s1306 to give the corresponding 1,910 second initial vector, in step S1308, the second layer encrypted electronic publication second ciphertext block and a second XOR by performing calculation 1,910 initial vector, in step s1310, the first layer obtained encrypted electronic publishing the second object data block, at step s1312, the second initial vector with the first layer 310 a second data block encrypted electronic publications by the XOR operation performed in step s1314, the initial vector to obtain a second 2,916,在步骤s1316中,依次对第二层加密电子出版物后续的密文区块920通过XOR进行解密运算,得到第一层加密密钥相对应的数据区块936,直到将第二层加密电子出版物的最后密文区块解密为第一层加密电子出版物的最后数据区块为止。 2,916, at step s1316, the second layer is sequentially encrypted electronic publications subsequent ciphertext block is decrypted 920 by the XOR operation, to obtain a first layer corresponding to the encryption key data block 936, until the second layer of encryption the last ciphertext block is decrypted electronic publications first layer last encrypted data block until the electronic publication.

参照图14及图15,其中表示出根据本发明的一个优选实施例的一种制作权安全控制的方法,其中利用DES和XOR运算使销售网站进行加密运算得到第三层加密电子出版物的方法包括:在步骤s1500中,将第一层加密电子出版物分割为多组数据区块1400,在步骤s1502中,将第一层加密电子出版物的数据区块1400中的第一数据区块利用变异密钥1128利用DES1402进行加密运算,在步骤s1504中,得到第三层加密电子出版物的密文区块1416的第一密文区块,在步骤s1506,将第三初始向量1114与第一层加密电子出版物中的第一数据区块通过XOR 1404进行运算,在步骤s1508中,得到第三初始向量1,1406,在步骤s1510中,将第一层加密电子出版物中其余数据区块通过XOR操作与每一数据区块之前一个第三初始向量进行运算,在步骤s1512中,得到第三层加密电子出版物的密文区块1416。 Referring to Method 14 and 15, a method of making the right embodiment is shown wherein the safety control in accordance with a preferred embodiment of the present invention, wherein the DES and XOR operations sales site so that cryptographic operations to obtain a third layer encrypted electronic publications comprising: a step s1500, the first layer is divided into a plurality of electronic publications encrypted data block 1400 sets, in step s1502, the first data block of encrypted data block of the first layer of the electronic publication using 1400 variation of the key 1128 is encrypted using DES1402 operation, in step s1504, the third layer obtained ciphertext blocks encrypted electronic publications first ciphertext block 1416, at step S1506, the first and third initial vector 1114 a first layer data block encrypted electronic publication by performing calculation XOR 1404, in step s1508, the initial vector to obtain a third 1,1406, in step s1510, the first layer remaining encrypted electronic data blocks publications a third operation performed through an XOR operation with an initial vector before each data block, at step s1512, the third layer to give a ciphertext encrypted electronic publications block 1416.

参照图16和图17,其中表示出根据本发明的一个优选实施例的一种制作权安全控制的方法,该方法是关于使用者可以在网络上防止非法复制原始电子出版物并进行使用原始电子出版物的方法,该制作权安全控制方法步骤包括:在步骤s1700中,使用第三秘密密钥1602对由销售网站传来的第三非对称性密码1122进行解密运算1604,这里所进行的解密运算1604是利用RSA算法进行解密运算1604。 Referring to FIGS. 16 and 17, there is shown a method of making the right security controls embodiment in accordance with a preferred embodiment of the present invention, the process is on the user can prevent illegal copying of the original and the original electronic publications on an electronic network methods publication, which make the right security control method comprises: in step s1700, a third secret key 1602 pairs of asymmetric cryptographic third came from the sale of the site 1122 decrypts the 1604 operation, decryption performed here 1604 operation is the use of RSA algorithm decryption operation 1604. 在步骤s1702中,得到第二密钥1116和第三初始向量1114,在步骤s1704中,利用第二密钥1116对使用者序号1124进行加密运算1610,此处使用的加密运算1610是利用DES算法进行加密运算1610。 In step s1702, the second key to obtain a third initial vector 1116 and 1114, in step s1704, the second key using the user ID 1116 1124 1610 encryption operation, an encryption operation as used herein is the use of the DES algorithm 1610 1610 cryptographic operations. 在步骤s1706中,得到变异密钥1128,在步骤s1708中,用变异密钥1128对由销售网站传来的变异密码1134进行解密运算1612,这里所进行的解密运算1612是利用DES算法进行解密运算1612。 In step s1706 to obtain a variation key 1128, in step s1708, the key 1128 with a variation variability password 1134 came from the sale of the site to decrypt operation 1612, where decryption operation carried out by 1612 and decryption operations are performed using the DES algorithm 1612. 在步骤s1710中,得到第一非对称性密码306,在步骤s1712中,利用变异密钥1128和第三初始向量1114对由销售网站传来的第三层加密电子出版物116进行解密运算1620,这里所进行的解密运算1620是利用DES/XOR算法进行解密运算1620。 In step s1710, the password to obtain a first asymmetry 306, in step S1712, using a variation of the key and a third initial vector 1128 1114 pairs transmitted by the sales site third layer 116 to decrypt the encrypted electronic publications operation 1620, decryption operation 1620 is performed here decryption operation 1620 using DES / XOR algorithm. 在步骤s1714中,得到第一层加密电子出版物108,在步骤s1716中,用第一秘密密钥1614对第一非对称性密码306进行解密运算1616,这里所进行的解密运算1616是利用RSA算法进行解密运算1616。 In step s1714, the obtained encrypted electronic publications 108 of the first layer, in step s1716, the operation 1616 to decrypt the first asymmetric cryptographic key 306 with a first secret 1614, where decryption operations are performed using the RSA 1616 decryption algorithm 1616. 在步骤s1718中,得到第一密钥和第一初始向量300,在步骤s1720中,利用第一密钥和第一初始向量300对第一层加密电子出版物进行解密运算1624,这里所进行的解密运算1624是利用DES/XOR算法,在步骤s1722中,得到原始电子出版物106。 In step s1718, the obtained first key and a first initialization vector 300, in step s1720, the use of a first key and the first initial vector of the first layer 300 performs encryption electronic publications decryption operation 1624, here carried out decryption operation 1624 using DES / XOR algorithm, in step s1722, the electronic publications 106 to obtain the original.

参照图14和图18,其中表示出根据本发明的一个优选实施例的一种制作权安全控制的方法,其中由销售网站传来的第三层加密电子出版物通过DES/XOR算法进行解密运算的方法如下:在步骤s1800中,将由销售网站传来的第三层加密电子出版物中的密文区块1416中的第一密文区块利用变异密钥1128通过DES算法1418进行解密运算,在步骤s1802中,得到第一层加密电子出版物数据区块1428的第一数据区块,在步骤s1804中,将第三初始向量1114与第一层加密电子出版物中的第一的数据区块通过XOR算法1402进行运算,在步骤s1806中,得到第三初始向量1,1406,在步骤s1808中,将第三层加密电子出版物中的第二密文区块通过XOR算法1422与第三初始向量1,1406进行运算,在步骤s1810中,得到第一层加密电子出版物的第二数据区块,在步骤s1812中,将第三初始向量1114与第一层加密电子出版 Referring to FIGS. 14 and 18, there is shown a method of making the right security controls embodiment in accordance with a preferred embodiment of the present invention, which came from the sale site for the third layer encryption and decryption of electronic publications by DES / XOR algorithm the method is as follows: in step S1800, the third layer encrypted electronic publication sales site transmitted by the ciphertext block 1416 the first ciphertext block using a key 1128 to decrypt the variation calculation 1418 by the DES algorithm, in step s1802, the first layer obtained encrypted electronic publication data block the first data block 1428, at step s1804, the third initial vector 1114 with a first layer of a first encrypted electronic publication data area with XOR algorithm block 1402 calculates, in step s1806, the initial vector to obtain a third 1,1406, in step s1808, the third layer encrypted electronic publications by the second ciphertext block and a third XOR algorithm 1422 1,1406 calculates initial vector, in step s1810, the first layer to give a second encrypted electronic publication data block, at step S1812, the third initial vector of the first layer 1114 and the encrypted electronic publishing 的第二数据区块通过XOR算法1424进行运算,在步骤s1814中,得到第三初始向量2,1412,在步骤s1816中,依次将后续得到的第三初始向量与第三层加密电子出版物中后续密文区块1416通过XOR算法进行运算,在步骤s1818中,得到第一层加密电子出版物中的数据区块1428。 A second data block through the XOR algorithm 1424 calculates, in step s1814, the initial vector to obtain a third 2,1412, the third initial vector and the third layer in step s1816 encrypted electronic publications sequentially obtained in the subsequent subsequent ciphertext blocks 1416 through XOR algorithm calculates, in step s1818, the block 1428 to obtain the data encrypted electronic publications in the first layer.

参照图5和图19,其中表示出根据本发明的一个优选实施例的一种制作权安全控制的方法,其中使用者利用DES/XOR算法得到原始电子出版物的方法如下:在步骤s1900中,对第一层加密电子出版物的密文区块516中的第一密文区块用第一密钥504和第一初始向量502通过DES/XOR算法522进行解密运算,在步骤s1902中,得到第一初始向量1,508和原始电子出版物数据区块500中的第一数据区块,在步骤s1904中,对第一层加密电子出版物中的第二密文区块利用第一密钥504和第一初始向量1,508通过DES/XOR算法526进行解密运算,在步骤s1906中,得到第一初始向量2,512和原始电子出版物的第二数据区块,在步骤s1908中,依次对第一层加密电子出版物后续的密文区块516进行解密运算,得到原始电子出版物的数据区块500,直到在步骤s1910中将第一层加密电子出版物的最后密文区块解密为原始 Referring to FIGS. 5 and 19, a method of making the right embodiment is shown wherein the safety control in accordance with a preferred embodiment of the present invention, wherein a user using DES / XOR algorithm original electronic publications as follows: In the step s1900, ciphertext blocks encrypted electronic publications 516 of the first layer in the first ciphertext block using a first key 504 and the first initial vector for decryption 502 by DES / XOR algorithm 522, in a step s1902 to give the first initial vector and the original electronic publications 1,508 data block the first data block 500, in step s1904, the first layer encrypted electronic publication second ciphertext block using the first key 504 and 1,508 first initial vector for decryption by DES / XOR algorithm 526, at step s1906, the initial vector to obtain a first and a second data block of the original 2,512 electronic publication, in step s1908, the first layer are sequentially encrypted electronic publications subsequent ciphertext block decryption operation 516 to obtain the original data block 500 of the electronic publication, the original decrypted until the last layer of the first ciphertext block of the encrypted electronic publications in step s1910 子出版物的最后数据区块为止。 Until the last data sub-block publication.

参照图7及图20,其中表示出根据本发明的一个优选实施例的一种制作权安全控制的方法,其中使用者对第一层加密电子出版物中的第一密文区块通过DES/XOR算法进行解密运算,得到第一初始向量1及原始电子出版物第一数据区块的方法步骤包括:将第一层加密电子出版物的第一密文区块的第一子密文区块用第一密钥504通过DES算法712进行解密运算,得到原始电子出版物的第一数据区块的第一子数据区块,将原始电子出版物中的第一数据区块的第一子数据区块,与第一初始向量502进行XOR算法714,得到第一初始向量1,508,将后续子密文区块170与第一初始向量1,508作XOR 718,得到第一数据区块相对应的子数据区块700,将第一层加密电子出版物的后续密文区块进行解密运算,直到得到原始电子出版物中的最后子数据区块为止。 Referring to FIGS. 7 and 20, wherein the safety control method of making the right shows a preferred embodiment of the present invention, wherein the first layer of the user encrypted electronic publications first ciphertext block by DES / method step XOR algorithm decryption operation, an initial vector to obtain a first original electronic publications and the first data block comprises: a first layer of a first block of ciphertext encrypted electronic publications first sub-block of ciphertext performed with the first key 504 through the DES algorithm decryption operation 712 to obtain a first data block of the first sub-block of the original data of the electronic publication, the first sub-data of the first data block of the original electronic publication blocks, with the first initial vector 502 XOR algorithm 714, a first initial vector to obtain 1,508, the subsequent sub block 170 in the first ciphertext initial vector for 1,508 XOR 718, to obtain a first sub-data corresponding to the data block block 700, subsequent ciphertext block of the first layer to decrypt the encrypted electronic publications operation, until the last sub-block of the original data of the electronic publication date.

虽然本发明已经通过各优选实施例进行了如上所述的描述,但这并不是为了限制本发明,而仅仅是为了说明本发明。 While the invention has been described above, the embodiment described by way of respective preferably, but not to limit the invention, but merely to illustrate the present invention. 对于本技术领域的技术人员而言,在不脱离本发明的精神和范围的情况下,可以作出各种改变与修改。 For those skilled in the art, without departing from the spirit and scope of the present invention, various changes and modifications may be made. 显然,这些改变与修改都势必落入后附的权利要求书所界定的保护范围之内。 Obviously, these changes and modifications are intended to fall within the appended claim bound scope of protection as defined in claim within.

Claims (41)

1.一种制作权安全控制的方法,所述方法用于多个公司和多个销售网站在网络上销售电子出版物时防止任何人非法复制原始电子出版物并销售所述原始电子出版物,所述制作权安全控制方法包括:公司把原始电子出版物加密为第一层加密电子出版物,然后再把所述第一层加密电子出版物加密为第二层加密电子出版物;销售网站把所述第二层加密电子出版物解密为第一层加密电子出版物,再把所述第一层加密电子出版物加密为第三层加密电子出版物;以及使用者把所述第三层加密电子出版物解密为所述第一层加密电子出版物,再把所述第一层加密电子出版物解密为原始电子出版物。 1. A method of making the right security control, the method for multiple companies and multiple sales site to prevent any illegal copy of the original electronic publication and sales of the original electronic publication while sales of electronic publications on the web, the method of making a security control right comprises: the original electronic publication company encrypted into encrypted electronic publications first layer, and then encrypting the encrypted electronic publication first layer is a second layer of encryption electronic publication; the sales site the second layer decrypts encrypted electronic publication encrypted electronic publication of the first layer, and then encrypting the encrypted electronic publication third layer is a layer of a first encrypted electronic publications; the third layer and the encrypted user electronic publication decrypts encrypted electronic publication of the first layer, the first layer then decrypts encrypted electronic publications original electronic publications.
2.如权利要求1所述的制作权安全控制的方法,其中所述原始电子出版物包括波形音乐文件、运动图像专家组(MP3)音乐文件和图像文件。 The method of making the weight of a safety control as claimed in claim 2, wherein the original electronic publication includes a waveform of music files, Moving Picture Experts Group (MP3) music files and image files.
3.如权利要求1所述的制作权安全控制的方法,其中多个公司把所述原始电子出版物加密为所述第一层加密电子出版物,再把所述第一层加密电子出版物加密成所述第二层加密电子出版物的方法包括:由所述这些公司随机产生第一密钥;使用所述第一密钥配合第一公开密钥将所述原始电子出版物加密为所述第一层加密电子出版物;以及使用第二公开密钥将所述第一层加密电子出版物加密为所述第二层加密电子出版物。 3. The method of making a security control rights according to claim 1, wherein said plurality of original electronic publication company encrypted into encrypted electronic publication of the first layer, the first layer is then encrypted electronic publications the method of the second layer is encrypted into encrypted electronic publications comprises: randomly generating companies by the first key; using the first key with the first public key to encrypt the original electronic publication a first layer of said encrypted electronic publication; and using a second public key of the encrypted electronic publication first layer to the second layer of encryption to encrypt electronic publications.
4.如权利要求3所述的制作权安全控制的方法,其中每个所述这些公司使用的所述第一公开密钥为相同的所述第一公开密钥。 4. A method of making a security control rights according to claim 3, wherein said each of said first these companies use the same public key of the first public key.
5.如权利要求3所述的制作权安全控制的方法,其中每个所述这些公司使用的所述第一密钥为不同的所述第一密钥。 Produced as claimed in claim 3 weight security control method of claim, wherein each of said first key used by these companies is different from the first key.
6.如权利要求3所述的制作权安全控制的方法,其中每个所述这些公司使用的所述第二公开密钥为相同的所述第二公开密钥。 Produced as claimed in claim 3 weight security control method of claim, wherein each of said second of these companies use the same public key of the second public key.
7.如权利要求1所述的制作权安全控制的方法,其中所述这些销售网站把所述第二层加密电子出版物解密为所述第一层加密电子出版物,再把所述第一层加密电子出版物加密为所述第三层加密电子出版物的方法包括:所述些销售网站使用所述第二秘密密钥对所述第二层加密电子出版物解密为所述第一层加密电子出版物;第二密钥由所述这些销售网站随机产生并与这些使用者的一个序号运算后产生一个变异密钥;以及使用所述变异密钥配合第三公开密钥对所述第一层加密电子出版物加密为所述第三层加密电子出版物。 7. A method of making a security control rights according to claim 1, wherein the said second layer of said sales site encrypted electronic publication decrypts encrypted electronic publication of the first layer, then the first layer encryption to the encryption method of electronic publication encrypted electronic publication third layer comprises: the second of these sales site using the secret key of the second layer decrypts encrypted electronic publication of the first layer encrypted electronic publications; second key randomly generated by the sale of these sites and generate a variant key with a serial number after the user operation; and using the key with the third variation of the first public key a layer of encryption for encrypting electronic publications encrypted electronic publications, the third layer.
8.如权利要求6与权利要求7所述的制作权安全控制的方法,其中每所述这些销售网站使用所述第二秘密密钥是相对对应所述每个些公司使用的所述第二公开密钥,而是不同的所述第二秘密密钥。 8. The method of making the weight of the safety control 7 6 claims, wherein each of the said sales site using the second secret key corresponding to said each of said relatively few companies use a second the public key, but different from the second secret key.
9.如权利要求7所述的制作权安全控制的方法,其中每个所述这些销售网站使用的所述第三公开密钥为相同的所述第三公开密钥。 9. The method of making the weight of the safety control of claim 7, wherein each of the third of these sales site using the same public key as the third public key.
10.如权利要求7所述的制作权安全控制的方法,其中每个所述这些销售网站使用的所述第二密钥为不同的所述第二密钥。 10. The method of making the weight of the safety control of claim 7, wherein said second key for each of said sales site using these different second key.
11.如权利要求1与权利要求2所述的制作权安全控制的方法,其中所述这些使用者把所述第三层加密电子出版物解密为所述第一层加密电子出版物,再把所述第一层加密电子出版物解密为所述原始电子出版物的方法的包括:所述这些使用者使用所述变异密钥配合第三秘密密钥将所述第三层加密电子出版物解密为所述第一层加密电子出版物;以及使用第一密钥配合第一秘密密钥对所述第一层加密电子出版物解密为所述原始电子出版物。 According to claim 1 and claim the production method of security control rights of claim 2, wherein the third layer of the user to the encrypted electronic publication decrypts the encrypted electronic publications first layer, then the first layer decrypting encrypted electronic publication to the original method of electronic publication includes: the user uses the key with the third variation of the third layer is a secret key encrypted electronic publications decrypting the first layer is the encrypted electronic publication; and using the first key with a first layer of the first secret key encrypted electronic publication decrypts the original electronic publication.
12.如权利要求11所述的制作权安全控制的方法,其中每个所述些使用者使用的所述第三秘密密钥为相同的所述第三秘密密钥,且每个所述这些使用者使用的所述第一秘密密钥为相同的所述第一秘密密钥。 12. The manufacturing method of claim 11 weight safety control claim, wherein each of said some of said third user uses the same secret key to the third secret key, and each of these the first user uses the same secret key as the first secret key.
13.如权利要求11所述的制作权安全控制的方法,其中每个所述这些使用者使用的所述变异密钥为不同的所述变异密钥,且每个所述这些使用者使用的所述第一密钥也是不同的所述第一密钥。 13. The method of making the security control 11 weight claim, wherein each of the variation of these different user uses keys of the key mutation, and each of these users use the the first key is different from the first key.
14.一种制作权安全控制的方法,所述方法用于公司在网络上销售电子出版物时防止任何人非法复制原始电子出版物并销售所述原始电子出版物的方法,所述制作权安全控制方法包括:所述公司随机产生第一密钥和第一初始向量;使用第一公开密钥对所述第一密钥和所述第一初始向量的数据进行加密运算,得到第一非对称性密码;使用所述第一密钥和所述第一初始向量对所述原始电子出版物进行所述加密运算,得到第一层加密电子出版物;随机产生第二初始向量;使用第二公开密钥对所述第一非对称性密码和所述第二初始向量的所述数据进行所述加密运算,得到第二非对称性密码;以及使用所述第二公开密钥和所述第二初始向量对所述第一层加密电子出版物进行所述加密运算,得到所述第二层加密电子出版物。 14. A method of making the right security control, the method for companies to prevent any illegal copy of the original electronic publications and electronic publications of the original sales approach in the sale of electronic publications on the Internet, making the right security the control method comprising: generating a first random key of the company and a first initialization vector; using a first public key of the first key and the first vector data initial cryptographic operations to obtain a first asymmetric password; using the first key and the first initial vector of the original electronic publication of the cryptographic operation, a first layer to obtain encrypted electronic publications; generating a second random initial vector; discloses the use of a second key data for the first and second asymmetric cryptographic initialization vector of the cryptographic calculation, to obtain a second asymmetry password; and using the second public key and the second the initial vector of the first layer of the encrypted electronic publications encryption operation, said second layer to obtain encrypted electronic publications.
15.如权利要求14所述的制作权安全控制的方法,其中使用所述第一公开密钥对所述第一密钥和所述第一初始向量的所述数据进行所述加密运算,得到所述第一非对称性密码,所述加密运算是利用非对称性密码演算法进行所述加密运算,得到所述第一非对称性密码。 15. The method of claim 14 weight making security control claim, wherein said first public key using the first key and the first initial vector data of the cryptographic operation, to give the first asymmetry password, the encryption operation is a cryptographic algorithm utilizing the asymmetry of the cryptographic calculation, to obtain a first password asymmetry.
16.如权利要求14所述的制作权安全控制的方法,其中使用所述第二公开密钥对所述第一非对称性密码和所述第二初始向量的所述数据作所述加密运算,得到所述第二非对称性密码,所述加密运算是利用非对称性密码演算法进行所述加密运算,得到所述第二非对称性密码。 16. The method of making the weight of the safety control of claim 14, wherein said using said second public key data of the first and second asymmetric cryptographic initialization vector for the encryption operation to give a second asymmetry password, the encryption operation is a cryptographic algorithm utilizing the asymmetry of the cryptographic calculation, to obtain a second asymmetry password.
17.如权利要求14所述的制作权安全控制的方法,其中使用所述第一密钥和所述第一初始向量对所述原始电子出版物进行所述加密运算,得到所述第一层加密电子出版物,所述加密运算是利用对称性演算法和异或运算法进行所述加密运算,得到所述第一层加密电子出版物。 17. The manufacturing method of claim 14 weight security control claim, wherein said first key and said first initial vector of the original electronic publication of the cryptographic operation, to obtain said first layer encrypted electronic publication, the cryptographic operation is a symmetric algorithm using the encryption operation, and XOR operation method, the first layer to obtain encrypted electronic publications.
18.如权利要求17所述的制作权安全控制的方法,其中利用所述对称性演算法与所述异或运算法进行所述加密运算,所述公司得到所述第一层加密电子出版物的方法包括:将所述原始电子出版物分割为多个数据区块;利用所述第一密钥与所述第一初始向量对所述原始电子出版物的第一数据区块进行所述对称性演算法与所述异或运算,将所述原始电子出版物的所述第一数据区块加密为所述第一层加密电子出版物的第一密文区块并得到第一初始向量1;对所述原始电子出版物的第二数据区块用所述第一密钥与所述第一初始向量1通过所述对称性演算法/异或运算法进行所述加密运算,得到所述第一层加密电子出版物的第二密文区块并得到第一初始向量2;依次将所述原始电子出版物后续的所述些数据区块作所述对称性演算法/异或运算法的所述加密运算,得到相 18. The method of claim 17 weight making security control claim, wherein using the symmetric algorithm of the cryptographic operation with the exclusive OR operation method, the first layer of the company to obtain encrypted electronic publications the method comprising: the electronic publication is divided into a plurality of original data blocks; using the first key and the first initial vector of the first data block of the symmetry of the original electronic publication algorithm of the exclusive oR operation, the electronic publication of the original data block a first encrypting said first layer of the first ciphertext block and the encrypted electronic publications 1 to give a first initial vector ; of the cryptographic operation on the second data block of the original electronic publication using the first key and the first initial vector 1 through the symmetric algorithm / method XOR operation, to give the the first layer of the second ciphertext block and the encrypted electronic publications 2 to give a first initial vector; the original electronic publication sequentially follow the data block for the more symmetric algorithm / algorithms XOR the encryption operation to obtain phase 对应的多个密文区块。 A corresponding plurality of ciphertext blocks.
19.如权利要求18所述的制作权安全控制的方法,其中利用所述第一密钥与所述第一初始向量对所述原始电子出版物的所述第一数据区块作所述对称性演算法和所述异或运算,将所述原始电子出版物的所述第一数据区块加密成所述第一层加密电子出版物的所述第一密文区块的方法包括:将每个所述些数据区块分割为多个子数据区块;将每个所述些数据区块的第一子数据区块与所述第一初始向量作所述异或运算,得到所述第一初始向量1;将所述第一子数据区块用所述第一密钥进行所述对称性演算法,得到所述第一密文区块的第一子密文区块;将在所述第一数据区块后续的所述这些子数据区块分别与所述第一初始向量1进行所述异或运算,得到相对应的多个子密文区块,直到加密最后子数据区块为最后子密文区块为止;以及依次将每个所述些数据区块的每 19. The method of making the weight of the safety control of claim 18, wherein using the first key and the first initial vector of the original electronic publication of the first data block as the symmetry and algorithms of the exclusive oR operation, the electronic publication of the original first data block cipher to the encrypted electronic publication the first layer of the first ciphertext block method comprising: these data blocks of each of said sub-divided into a plurality of blocks of data; such data blocks of each said first data block with the first sub-vector for the initial XOR operation to obtain the second 1 an initial vector; the first data sub-block for the algorithm symmetry with the first key, the first ciphertext block to obtain a first sub-block of ciphertext; and in the the first of said subsequent data sub-block of the data block respectively the first exclusive oR operation with an initial vector to obtain a plurality of corresponding sub ciphertext block data until the last sub-block is encrypted until the last sub-block of ciphertext; and sequentially each said data block for each of these 个子数据区块进行所述对称性演算法和所述异或运算的所述加密运算,得到相对应的所述这些子密文区块。 The symmetry of sub data blocks for the encryption algorithm, and calculating the exclusive OR operation to obtain the corresponding sub-block of ciphertext.
20.如权利要求14所述的制作权安全控制的方法,其中使用所述第二公开密钥对所述第一层加密电子出版物及所述第二初始向量的所述数据进行所述加密运算,得到所述第二层加密电子出版物的所述加密运算是利用非对称性密码运算法与异或运算法进行所述加密运算。 20. The method of making the weight of the security control 14, wherein the second public key using the first encryption layer electronic publications and the initial data of the second vector of the cryptographic the encryption arithmetic operation to obtain the second layer encrypted electronic publication encryption operation is the exclusive-oR operation method using asymmetric cryptographic algorithms.
21.如权利要求20所述的制作权安全控制的方法,其中利用所述非对称性密码运算法与所述异或运算进行所述加密运算得到所述第二层加密电子出版物的方法包括:将所述第一层加密电子出版物分割为多个数据区块;将所述第一层加密电子出版物的第一数据区块用所述第二公开密钥进行所述非对称性密码演算法的所述加密运算得到所述第二层加密电子出版物的第一密文区块;将所述第二初始向量与所述第一层加密电子出版物的所述第一数据区块进行所述异或运算,得到第二初始向量1;将所述第二初始向量1与所述第一层加密电子出版物的所述第二数据区块进行所述异或运算,得到第二密文区块;以及依次利用所述异或运算将所述第一层加密电子出版物的所述这些数据区块加密为所述第二层加密电子出版物的多个密文区块,直到将所述第一层加密电子出 21. The method of making the weight of the security control method of the claim 20, wherein said asymmetric cryptographic computation using the exclusive OR operation method for the encryption operation to obtain the second layer comprises an encrypted electronic publications : the first layer is divided into a plurality of encrypted electronic publication data block; the first layer of the first data block is encrypted electronic publications with the public key of the second asymmetric cryptographic the encryption algorithm of the calculation to obtain the second layer encrypted electronic publications first ciphertext block; the second initial vector of the first layer and the first encrypted data block of electronic publications performing the XOR operation, the second initial vector to obtain 1; 1 to the second initial vector for the exclusive oR operation with the encrypted electronic publication of the first layer of the second data block, to obtain a second ciphertext block; and the sequence of the exclusive oR operation using said first layer encrypted electronic publications encryption for data blocks of the plurality of second layer ciphertext blocks encrypted electronic publications, until a first layer of an encrypted electronic 版物的最后数据区块加密成所述第二层加密电子出版物的最后密文区块为止。 Finally, the encrypted data block version thereof to the second layer until the final block of ciphertext encrypted electronic publication.
22.一种制作权安全控制的方法,该方法用于销售网站在网络上销售电子出版物时防止非法复制原始电子出版物并销售所述原始电子出版物,所述制作权安全控制方法包括:利用第二秘密密钥对由公司传来的第二非对称性密码进行解密运算,得到第一非对称性密码和第二初始向量;利用所述第二秘密密钥和所述第二初始向量对由所述公司传来的第二层加密电子出版物进行所述解密运算,得到第一层加密电子出版物;随机产生第二密钥和第三初始向量;利用第三公开密钥对所述第二密钥和所述第三初始向量进行加密运算,得到第三非对称性密码;利用所述第二密钥对使用者序号做进行所述加密运算,得到变异密钥;利用所述变异密钥对所述第一非对称性密码进行所述加密运算,得到一变异密码;以及利用所述变异密钥和所述第三初始向量对所述第一层 22. A method of making the right security controls, the method for selling the site to prevent illegal copying of the original electronic publication and sales of electronic publications at the time of the original sale of electronic publications on the Internet, making the right security control method comprising: a second secret key using the second password asymmetry coming from the company performs decryption operation, to obtain a first and a second asymmetric cryptographic initialization vector; using the second secret key and the second initial vector the second layer of the transmitted encrypted electronic publications by the firms of the decryption operation to obtain a first layer encrypted electronic publications; randomly generating a second key and a third initial vector; using the public key of the third for said second and said third initial vector key encryption algorithm to obtain a third password asymmetry; using the second key to make a user ID of the cryptographic operation, the key variation obtained; with the variation of the first asymmetric key pair for the password encryption operation, to obtain a variation code; and using the key and the third initial variation vector of the first layer 密电子出版物进行所述加密运算,得到第三层加密电子出版物数据。 The secret encryption operation electronic publications, to give the third layer data encrypted electronic publications.
23.如权利要求22所述的制作权安全控制的方法,其中所述使用者序号是由用户端的使用者输入的。 The method of claim 22 weight making safety control as claimed in claim 23, wherein the user ID is input by the user of the user terminal.
24.如权利要求22所述的制作权安全控制的方法,其中用所述第二秘密密钥对所述第二非对称性密码进行所述解密运算,得到所述第一非对称性密码和所述第二初始向量的所述解密运算是利用非对称性密码演算法解密得到所述第一非对称性密码和所述第二初始向量。 24. The method of making security control rights claimed in claim 22, wherein said decryption operations performed by the second secret key of the second asymmetric cryptographic obtain the first password and asymmetry the decryption operation of the second initial vector using asymmetric cryptographic algorithm decryption to obtain the first and second asymmetric cryptographic initialization vector.
25.如权利要求22所述的制作权安全控制的方法,其中利用所述第二秘密密钥和所述第二初始向量对第二层加密电子出版物作进行解密运算,得到所述第一层加密电子出版物的所述解密运算是利用非对称性密码演算法与异或运算法得到所述第一层加密电子出版物。 25. A method of making a security control rights according to claim 22, wherein said using a second secret key and the second initial vector to the second layer for decrypting encrypted electronic publications calculation to obtain the first the layer encryption and decryption operations of the electronic publication is to obtain an exclusive oR operation process of the first layer using asymmetric encryption electronic publications password algorithm.
26.如权利要求25所述的制作权安全控制的方法,其中利用所述非对称性密码演算法与所述异或运算法解密得到所述第一层加密电子出版物的方法包括:将所述第二层加密电子出版物中的第一密文区块用所述第二秘密密钥利用所述非对称性密码演算法进行所述解密运算,得到所述第一层加密电子出版物的第一数据区块;将所述第二初始向量与所述第一层加密电子出版物中的所述第一数据区块用所述异或运算法,得到相对应的第二初始向量1;将所述第二层加密电子出版物中的第二密文区块用所述异或运算法与所述第二初始向量1进行运算,得到所述第一层加密电子出版物的第二数据区块;将所述第二初始向量与所述第一层加密电子出版物的所述第二数据区块用所述异或运算法作运算,得到第二初始向量2;依次对所述第二层加密电子出版物后续的所述这 26. The method of making a security control rights according to claim 25, wherein said asymmetric cryptographic algorithm using the exclusive OR operation process of the first layer is decrypted encrypted electronic publications include: The said first ciphertext block of the second layer encrypted electronic publication with the second secret key cryptographic algorithm using the asymmetry for the decryption operation to obtain the first layer encrypted electronic publications a first data block; the initial vector and the second layer of the first encrypted electronic publications with the first data block XOR operation method, to obtain an initial vector corresponding to 1 second; the second layer of the second data encrypted electronic publication second ciphertext block XOR operation with the calculation method 1 and the second initial vector to obtain said encrypted electronic publications first layer block; the second initial vector of the first layer and the second electronic publication encrypted data block for calculating an exclusive oR operation with the method, an initial vector to obtain a second 2; the second sequence subsequent publications that the encrypted electronic Layer 密文区块经由所述异或运算法进行所述解密运算,得到所述第一层加密电子出版物相对应的所述这个些数据区块,直到将所述第二层加密电子出版物的最后密文区块解密为所述第一层加密电子出版物的最后数据区块为止。 Decrypting the ciphertext block for calculating an exclusive OR operation via the method to obtain the first layer corresponding to the encrypted electronic publication that some of the data block, until the second layer of the encrypted electronic publications Finally, the decrypted ciphertext block is the last data block of the first layer until the encrypted electronic publications.
27.如权利要求22所述的制作权安全控制的方法,其中用所述第三公开密钥对所述第二密钥和所述第三初始向量进行所述加密运算,所述加密运算是利用非对称性密码演算法进行所述加密运算得到所述第三非对称性密码。 The method of making security control 27. The right claim 22, wherein performing the operation on the encrypted second key and the third initial vector with the third public key, the encryption operation is asymmetric cryptographic algorithm using the cryptographic operation performed to obtain a third password asymmetry.
28.如权利要求22所述的制作权安全控制的方法,其中用所述第二密钥对所述使用者序号进行所述加密运算,得到所述变异密钥的所述加密运算是利用对称性演算法进行所述加密运算得到所述变异密钥。 28. The method of making security control rights according to claim 22, wherein said second key by said encryption operation on the user ID, to obtain the cryptographic operation is a symmetric key mutation algorithm for calculation of the encrypted key to obtain the variation.
29.如权利要求22所述的制作权安全控制的方法,其中用所述变异密钥对所述第一非对称性密码进行所述加密运算,得到所述变异密码的所述加密运算是利用对称性演算法进行所述加密运算得到所述变异密码。 29. The method of making a security control rights according to claim 22, wherein the variation with the cryptographic key operation on the first password asymmetry, variation of the operation to obtain the encrypted password using symmetry of the cryptographic algorithm calculation to obtain the variation code.
30.如权利要求22所述的制作权安全控制的方法,其中利用所述变异密钥和所述第三初始向量对所述第一层加密电子出版物进行所述加密运算,得到所述第三层加密电子出版物的所述加密运算是利用对称性演算法与异或运算法进行所述加密运算得到所述第三层加密电子出版物。 30. A method of making a security control rights according to claim 22, wherein the mutation using the key and the third initial vector of the first layer of the encrypted electronic publications encryption operation, the first obtained the three encryption operation using an encryption symmetric electronic publication with exclusive oR operation algorithm of the cryptographic calculation process to obtain the third layer encrypted electronic publications.
31.如权利要求30所述的制作权安全控制的方法,其中利用所述对称性演算法与所述异或运算法进行所述加密运算得到所述第三层加密电子出版物的方法包括:将所述第一层加密电子出版物分割为多个数据区块;将所述第一层加密电子出版物中的第一数据区块利用所述变异密钥通过所述对称性演算法进行所述加密运算,得到所述第三层加密电子出版物的第一密文区块;将所述第三初始向量与所述第一层加密电子出版物中的所述第一数据区块通过所述异或算法进行运算,得到第三初始向量1;将所述第一层加密电子出版物中其余所述些数据区块以所述异或运算法与每个所述这些数据区块的前一个第三初始向量进行运算,得到所述第三层加密电子出版物的多个密文区块。 31. The method of method of making a security control rights according to claim 30, wherein the symmetric algorithm using the exclusive OR operation with the encryption computation method to obtain the encrypted electronic publications, the third layer comprises: the publication of the first layer is divided into a plurality of encrypted electronic data block; the first data block of the first layer of encryption using the electronic publications by the variation of the symmetry key algorithm said encryption operation, to give the third layer of the first ciphertext block of the encrypted electronic publication; and said third initial vector with said first layer encrypted electronic publications via the first data block calculates said XOR algorithm to obtain a third initial vector; the first layer remaining in the encrypted electronic publications such data blocks to the exclusive oR operation with each of the process before the data block calculating a third initial vector to obtain a plurality of third layer ciphertext blocks encrypted electronic publication.
32.一种制作权安全控制的方法,该方法是关于防止使用者在网络上非法复制原始电子出版物并使用所述原始电子出版物的方法,所述制作权安全控制方法包括:使用第三秘密密钥对由销售网站传来的第三非对称性密码进行解密运算,得到第二密钥和第三初始向量;利用第二密钥对使用者序号进行加密运算,得到变异密钥;利用所述变异密钥对由所述销售网站传来的变异密码进行所述解密运算,得到第一非对称性密码;利用所述变异密钥和所述第三初始向量对由所述销售网站传来的第三层加密电子出版物进行所述解密运算,得到第一层加密电子出版物;利用第一秘密密钥对所述第一非对称性密码进行所述解密运算,得到一第一密钥和第一初始向量;利用所述第一密钥和所述第一初始向量对所述第一层加密电子出版物进行解密运算,得到所述原始电子 32. A method of making security control rights, the user is on the prevention of illegal copy of the original electronic publications on the network and use the original electronic publication, the safety control method comprising making right: using a third a third secret key code transmitted by the asymmetry sales site decryption operation to obtain the second key and the third initial vector; cryptographic operations on user ID, using the key to obtain a second variant key; using the variant key cryptographic variability of the sales coming from the decryption operation site, to obtain a first password asymmetry; variant using the key and the third initial vector transmitted by said sales site to the third layer of the encrypted electronic publications decryption operation, to obtain a first layer encrypted electronic publications; first secret key using the password to the first asymmetric decryption operation, to obtain a first adhesion a first key and an initialization vector; using the first key and the first initial vector of the first layer to decrypt the encrypted electronic publications calculation, to obtain the original electronic 版物。 Publications.
33.如权利要求32所述的制作权安全控制的方法,其中用所述第三秘密密钥对由所述销售网站传来的所述第三非对称性密码作所述解密运算,得到所述第二密钥和所述第三初始向量,所述解密运算是利用非对称性密码演算法进行所述解密运算以得到所述第二密钥和所述第三初始向量。 33. A method of making a security control rights according to claim 32, wherein with the third secret key for the decryption operation on the third asymmetry password transmitted by the sales site, to give the said second key and the third initial vector, the decryption operation is performed utilizing the asymmetric cryptographic algorithm decryption operation to obtain the second key and the third initial vector.
34.如权利要求32所述的制作权安全控制的方法,其中用所述第二密钥对所述使用者序号进行所述加密运算,得到所述变异密钥的所述加密运算是利用对称性演算法进行所述加密运算以得到所述变异密钥。 34. The method of making security control rights according to claim 32, wherein said second key by said encryption operation on the user ID, to obtain the cryptographic operation is a symmetric key mutation algorithm for calculation of the encrypted key to obtain the variation.
35.如权利要求32所述的制作权安全控制的方法,其中用所述变异密钥对由所述销售网站传来的所述变异密码进行所述解密运算,得到所述第一非对称性密码的所述解密运算是利用对称性演算法进行所述解密运算以得到所述第一非对称性密码。 35. The method of making the weight of the security control 32, wherein the variation with the variation cryptographic key transmitted by said sales site for the decryption operation to obtain the first asymmetry the decrypted password calculation algorithm is performed by using the symmetry of the decryption operation to obtain said first asymmetry password.
36.如权利要求32所述的制作权安全控制的方法,其中用所述变异密钥和所述第三初始向量对由所述销售网站传来的所述第三层加密电子出版物进行所述解密运算,得到所述第一层加密电子出版物的所述解密运算是利用对称性演算法与异或运算法进行所述解密运算以得到所述第一层加密电子出版物。 36. The method of making a security control rights according to claim 32, wherein for the said sales site transmitted by the third layer of the encrypted electronic publications variant key and the third initial vector said decryption operations, to obtain the encrypted decryption operations of the first layer of the electronic publication is symmetric decryption algorithm using the exclusive-oR operation to obtain the first layer process encrypted electronic publications.
37.如权利要求36所述的制作权安全控制的方法,其中由所述销售网站传来的所述第三层加密电子出版物以所述对称性演算法和所述异或运算法作所述解密运算的方法如下:将由所述销售网站传来的所述第三层加密电子出版物中的第一密文区块用所述变异密钥通过所述对称性演算法进行所述解密运算,得到所述第一层加密电子出版物的第一数据区块;将所述第三初始向量与所述第一层加密电子出版物中的所述第一的数据区块通过所述异或运算法进行运算,得到第三初始向量1;将所述第三层加密电子出版物中的第二密文区块通过所述异或运算法与所述第三初始向量1进行运算,得到所述第一层加密电子出版物的第二数据区块;将所述第三初始向量与所述第一层加密电子出版物的所述第二数据区块通过所述异或运算法进行运算,得到第三初始向量2;以及 37. The method of making a security control rights according to claim 36, wherein said sales site transmitted by the third layer of the symmetry encryption algorithm to the electronic publication and the method for the exclusive-OR operation the method of decryption operations described as follows: the sales site transmitted by the third layer of the encrypted electronic publications first ciphertext block using the decryption key of the variation calculation algorithm by the symmetry to give the first layer of the first data block is encrypted electronic publication; the initial vector and the third layer of the first encrypted electronic publications via the first data block XOR calculating method calculates, to obtain a third initial vector; the third layer encrypted electronic publication second ciphertext block calculates the exclusive oR operation by the third initial vector method 1 to give the a first layer of said second data block encrypted electronic publication; the third initial vector of the first layer and the second encrypted data block electronic publication calculates the exclusive oR operation by law, 2 to obtain a third initial vector; and 次将后续得到的所述第三初始向量与所述第三层加密电子出版物中的后续多个密文区块通过所述异或运算法进行运算,得到所述第一层加密电子出版物中的多个数据区块。 Said third initial vector subsequent times obtained with the third layer subsequent encrypted electronic publications plurality of ciphertext blocks by performing calculation of the exclusive-OR operation method, the first layer to obtain encrypted electronic publications a plurality of data blocks.
38.如权利要求32所述的制作权安全控制的方法,其中用所述第一秘密密钥对所述第一非对称性密码进行所述解密运算,得到所述第一密钥和所述第一初始向量的所述解密运算利用非对称性密码演算法进行所述解密运算以得到所述第一密钥和所述第一初始向量。 38. claimed in making the right security control method of claim 32, wherein the first secret key using the decryption operation on the first asymmetry password, and the first key to obtain the the first initial vector decryption algorithm using the password for the asymmetric decryption operation to obtain the first key and the first initial vector.
39.如权利要求32所述的制作权安全控制的方法,其中用所述第一密钥和所述第一初始向量对所述第一层加密电子出版物进行所述解密运算,得到所述原始电子出版物的所述解密运算是利用对称性演算法与异或运算法得到所述原始电子出版物。 39. The method of making the right security control 32 according to the requirements, wherein with the first key and the first initial vector of the first layer of the encrypted decryption operation of electronic publications, to give the the decryption operation of the original electronic publication that the electronic publication to obtain the original algorithm utilizing symmetries exclusive oR operation process.
40.如权利要求39所述的制作权安全控制的方法,其中利用所述对称性演算法与所述异或运算法得到所述原始电子出版物的方法如下:对所述第一层加密电子出版物中的第一密文区块利用所述第一密钥和所述第一初始向量通过所述对称性演算法与所述异或运算法进行所述解密运算,得到第一初始向量1和所述原始电子出版物第一数据区块;对所述第一层加密电子出版物中的第二密文区块利用所述第一密钥及所述第一初始向量1通过所述对称性演算法与所述异或运算法进行所述解密运算,得到第一初始向量2和所述原始电子出版物的第二数据区块;依次对所述第一层加密电子出版物后续的多个密文区块进行所述解密运算,得到所述原始电子出版物的多个数据区块,直到将所述第一层加密电子出版物的最后密文区块解密为所述原始电子出版物的最后数据区块 40. The method of making a security control rights according to claim 39, wherein the symmetric algorithm and method using the exclusive OR operation method to obtain the original electronic publications as follows: the first layer encrypted electronic publication first ciphertext block using the first key and said first initial vector calculation by the decryption algorithm of the symmetry of the exclusive oR operation process, an initial vector to obtain a first and the original data block a first electronic publication; using the first key and the first initial vector of the first layer encrypted electronic publication second ciphertext block 1 through the symmetric progressive algorithm exclusive oR operation with the decryption operation of the method, an initial vector to obtain a first 2 and a second data block of the original electronic publication; sequentially subsequent to said first plurality of encrypted electronic publications layer ciphertext blocks for the decryption operation to obtain a plurality of data blocks of the original electronic publication, the first layer until the final block of ciphertext decrypting encrypted electronic publication to the original electronic publication the last data block 止。 Only.
41.如权利要求40所述的制作权安全控制的方法,其中对所述第一层加密电子出版物中的所述第一密文区块通过所述对称性演算法与所述异或运算法进行所述解密运算,得到所述第一初始向量1和所述原始电子出版物第一数据区块的方法包括:将所述第一层加密电子出版物的所述第一密文区块的第一子密文区块利用所述第一密钥通过对称性演算法进行所述解密运算,得到所述原始电子出版物的所述第一数据区块的第一子数据区块;将所述原始电子出版物中的所述第一数据区块的所述第一子数据区块,与所述第一初始向量进行所述异或运算法,得到第一初始向量1;将后续多个子密文区块与所述第一初始向量1进行所述异或运算法,得到所述第一数据区块相对应的多个子数据区块;以及将所述第一层加密电子出版物的后续多个密文区块进行所述解密运算, 41. The method of making a security control rights according to claim 40, wherein said first layer of said encrypted electronic publications first ciphertext block by the symmetry of the exclusive OR operation algorithm a method for the decryption process operation, the first initial vector to obtain an electronic publication and the original first data block comprises: a first layer of the electronic publication encrypted first ciphertext block a first sub-block of ciphertext using the first key by the decryption algorithm of symmetry, a first sub-block of data to obtain the original electronic publication of the first data block; and the electronic publication of the original data block of the first block of the first sub-data, performing the exclusive oR operation of the first method and the initial vector to obtain a first initial vector; subsequent plurality th ciphertext block with said first initial vector of the XOR operation method to obtain the first data block corresponding to a plurality of sub-data blocks; the first layer and encrypted electronic publications subsequent blocks for the plurality of ciphertext decryption operation, 到得到所述原始电子出版物中的最后子数据区块为止。 To give up to the last sub-block of the original data of the electronic publication.
CN 00130659 2000-10-09 2000-10-09 Safety control method for copyright CN1347225A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 00130659 CN1347225A (en) 2000-10-09 2000-10-09 Safety control method for copyright

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 00130659 CN1347225A (en) 2000-10-09 2000-10-09 Safety control method for copyright

Publications (1)

Publication Number Publication Date
CN1347225A true CN1347225A (en) 2002-05-01

Family

ID=4594234

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 00130659 CN1347225A (en) 2000-10-09 2000-10-09 Safety control method for copyright

Country Status (1)

Country Link
CN (1) CN1347225A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009086669A1 (en) * 2007-12-29 2009-07-16 Thomson Licensing System and method for data transmission
CN100591007C (en) 2007-10-30 2010-02-17 威盛电子股份有限公司 Encryption and decryption method
CN1909443B (en) 2005-08-02 2011-08-24 三菱电机株式会社 Data distribution apparatus and data communications system
CN101138194B (en) 2005-03-08 2011-10-05 恩克利普特株式会社 Data processing apparatus
CN103593892A (en) * 2013-11-06 2014-02-19 天津大学 Challenge response and symmetrical encryption based electronic lock unlocking method
US9906500B2 (en) 2004-10-25 2018-02-27 Security First Corp. Secure data parser method and system
US10068103B2 (en) 2010-03-31 2018-09-04 Security First Corp. Systems and methods for securing data in motion
US10402582B2 (en) 2013-02-13 2019-09-03 Security First Corp. Systems and methods for a cryptographic file system layer

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9906500B2 (en) 2004-10-25 2018-02-27 Security First Corp. Secure data parser method and system
US9935923B2 (en) 2004-10-25 2018-04-03 Security First Corp. Secure data parser method and system
US9985932B2 (en) 2004-10-25 2018-05-29 Security First Corp. Secure data parser method and system
US9992170B2 (en) 2004-10-25 2018-06-05 Security First Corp. Secure data parser method and system
CN101138194B (en) 2005-03-08 2011-10-05 恩克利普特株式会社 Data processing apparatus
CN1909443B (en) 2005-08-02 2011-08-24 三菱电机株式会社 Data distribution apparatus and data communications system
CN100591007C (en) 2007-10-30 2010-02-17 威盛电子股份有限公司 Encryption and decryption method
US9026781B2 (en) 2007-12-29 2015-05-05 Thomson Licensing System and method for data transmission
WO2009086669A1 (en) * 2007-12-29 2009-07-16 Thomson Licensing System and method for data transmission
US10068103B2 (en) 2010-03-31 2018-09-04 Security First Corp. Systems and methods for securing data in motion
US10402582B2 (en) 2013-02-13 2019-09-03 Security First Corp. Systems and methods for a cryptographic file system layer
CN103593892A (en) * 2013-11-06 2014-02-19 天津大学 Challenge response and symmetrical encryption based electronic lock unlocking method

Similar Documents

Publication Publication Date Title
US7260215B2 (en) Method for encryption in an un-trusted environment
US5835599A (en) Muti-cycle non-parallel data encryption engine
CN100480947C (en) Conditional access to digital rights management conversion
US6058478A (en) Apparatus and method for a vetted field upgrade
RU2213991C2 (en) Copy protection system and method
CN1190033C (en) Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method
US7068787B1 (en) System and method for protection of digital works
CN1326352C (en) Data distribution system and recorder for use therein
US7769174B2 (en) Digital data file encryption apparatus and method
US7313828B2 (en) Method and apparatus for protecting software against unauthorized use
CN1222855C (en) System for ensuring digital data allocation and playback security
KR100818992B1 (en) Apparatus and method for sending and receiving digital right objects in a transfomred format between device and portable storage
EP1146714A1 (en) System and method for protection of digital works
US7224805B2 (en) Consumption of content
US6975730B1 (en) Method and apparatus for contents information
US6801999B1 (en) Passive and active software objects containing bore resistant watermarking
US6367019B1 (en) Copy security for portable music players
US7243242B2 (en) Data terminal device capable of continuing to download encrypted content data and a license or reproduce encrypted content data with its casing in the form of a shell closed
JP4042571B2 (en) Contents providing method and apparatus
US7298845B2 (en) Digital content protection system
CN1934819B (en) System and method for digital rights management of electronic content
CN1871568B (en) Program execution device
EP1271875A1 (en) Device arranged for exchanging data, and method of manufacturing
CN100471108C (en) Data distribution system and recorder for use therein
JP4916512B2 (en) Copy digital content between content protection systems

Legal Events

Date Code Title Description
C10 Request of examination as to substance
C06 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)