CN1347225A - Safety control method for copyright - Google Patents
Safety control method for copyright Download PDFInfo
- Publication number
- CN1347225A CN1347225A CN 00130659 CN00130659A CN1347225A CN 1347225 A CN1347225 A CN 1347225A CN 00130659 CN00130659 CN 00130659 CN 00130659 A CN00130659 A CN 00130659A CN 1347225 A CN1347225 A CN 1347225A
- Authority
- CN
- China
- Prior art keywords
- electronic publication
- key
- publication
- ground floor
- encrypted electronic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
A high-safety copyright control method for selling original electronic publication over network and preventing piracy on network is characterized by beside encrypting the head and tail of electronic publication, the original electronic publication is divided into multiple data blocks, which are sequentially encryped by RSA algorithm, data encrypt standard (DES) or XOR algorithm.
Description
The present invention relates to a kind of method that prevents bootlegging original electron publication, particularly a kind of bootlegging original electron publication and method of selling the original electron publication of on network, preventing.
In current electronic age; because the network industry is flourish; cause the original electron publication on the network; the 3rd layer of (Moving PicturesExpert Group 1 Layer 3 of for example current most popular motion picture expert group front page; abbreviation MPEG1Layer 3; hereinafter to be referred as MP3) music of form; often through network by bad manufacturer or user's bootlegging; cause the rights and interests of legal MP3 to can not get protection; in the prior art; common the head and tail at the original electron publication adds a password, causes speculating the personage getting final product the full content of this original electron publication of bootlegging as long as decode this coded lock.
For this reason, the objective of the invention is to propose a kind of method of making the power security control, making power method of controlling security of the present invention requires company, sale website to use this method, make that selling the original electron publication on network can carry out smoothly, to reach the original electron publication that company is issued, can only use specific process to play through the user, the user can't duplicate the original electron publication that the clearing house is bought mutually, sell the website and can not duplicate illegal sale privately, intra-company can not duplicate illegal sale arbitrarily privately.
In order to realize above-mentioned purpose of the present invention, first aspect of the method for making power of the present invention security control is that this method may further comprise the steps: a plurality of companies are encrypted as ground floor encrypted electronic publication to the original electron publication, and then this ground floor encrypted electronic publication is encrypted as second layer encrypted electronic publication; A plurality of sale website is ground floor encrypted electronic publication to the deciphering of second layer encrypted electronic publication, and then this ground floor encrypted electronic publication is encrypted as the 3rd infill layer electronic publication; A plurality of users are ground floor encrypted electronic publication to the deciphering of the 3rd infill layer electronic publication, and then the deciphering of ground floor encrypted electronic publication is the original electron publication.
In order to realize above-mentioned purpose of the present invention, second aspect of the method for making power of the present invention security control is that a plurality of companies can prevent bootlegging original electron publication and the method for selling this original electron publication on network, the step of this making power method of controlling security is: each company produces first key and first initial vector at first at random, and then utilize first public-key cryptography that first key and first initial vector are carried out cryptographic calculation, obtain first asymmetry password, then use first key and first initial vector that the original electron publication is carried out cryptographic calculation, obtain ground floor encrypted electronic publication, and then produce second initial vector at random, use second public-key cryptography that the data of the first asymmetry password and second initial vector are carried out cryptographic calculation, obtain the second asymmetry password, use second public-key cryptography and second initial vector that the ground floor encryption key is carried out cryptographic calculation then, obtain second layer encrypted electronic publication.
In order to realize above-mentioned purpose of the present invention, the 3rd aspect of the method for making power of the present invention security control is to sell the website can prevent bootlegging original electron publication and the method for selling the original electron publication on network, this making power method of controlling security may further comprise the steps: utilize second privacy key that the second asymmetry password that is transmitted by company is decrypted computing, obtain the first asymmetry password and second initial vector, with second privacy key and second initial vector second layer encrypted electronic publication that is transmitted by company is decrypted computing, obtain ground floor encrypted electronic publication, produce second key and the 3rd initial vector at random, utilize the 3rd public-key cryptography that second key and the 3rd initial vector are made cryptographic calculation, obtain the 3rd asymmetry password, with second key user's sequence number is done cryptographic calculation, obtain the key that makes a variation, with this variation key the first asymmetry password is carried out cryptographic calculation, obtain the password that makes a variation, with this variation key and the 3rd initial vector ground floor encrypted electronic publication is carried out cryptographic calculation, obtain the 3rd infill layer electronic publication.
In order to realize above-mentioned purpose of the present invention, the 4th aspect of the method for making power of the present invention security control is to prevent user bootlegging original electron publication and the method for selling the original electron publication on network, this making power method of controlling security may further comprise the steps: use the 3rd privacy key to being decrypted computing by selling the 3rd asymmetry password that transmits the website, obtain second key and the 3rd initial vector, utilize second key that user's sequence number is carried out cryptographic calculation, obtain the key that makes a variation, with the variation key variation password that is transmitted by the sale website is decrypted computing, obtain the first asymmetry password, with variation key and the 3rd initial vector the 3rd infill layer electronic publication that is transmitted by the sale website is decrypted computing, obtain ground floor encrypted electronic publication, utilize first privacy key that the first asymmetry password is made decrypt operation, obtain first key and first initial vector, with first key and first initial vector ground floor encrypted electronic publication is decrypted computing, obtains the original electron publication.
Advantage of the present invention is: utilize original electron lpd layer infill layer is reached the original electron publication that company issues, can only could play through the specific process that the user uses, the user can't duplicate the original electron publication that the clearing house is bought mutually, sell the website and can not duplicate illegal sales privately, intra-company can not duplicate illegal sales arbitrarily privately.
For above and other objects of the present invention, feature and advantage can more be become apparent, lead each embodiment of the present invention below in conjunction with Figure of description and be described in detail.Wherein each accompanying drawing is:
Fig. 1 is the schematic block diagram of one embodiment of the present of invention;
Fig. 2 is a flow chart of realizing the inventive method according to the embodiments of the invention of Fig. 1;
Fig. 3 is the schematic block diagram of an alternative embodiment of the invention;
Fig. 4 is a flow chart of realizing method of the present invention according to the embodiments of the invention of Fig. 3;
Fig. 5 is the schematic block diagram of another embodiment of the present invention;
Fig. 6 is a flow chart of realizing method of the present invention according to the embodiments of the invention of Fig. 3 and Fig. 6;
Fig. 7 is the schematic block diagram of an alternative embodiment of the invention;
Fig. 8 is a flow chart of realizing method of the present invention according to the embodiments of the invention of Fig. 5 and Fig. 7;
Fig. 9 is the schematic block diagram of another embodiment more of the present invention;
Figure 10 is a flow chart of realizing method of the present invention according to the embodiments of the invention of Fig. 3 and Fig. 9;
Figure 11 is the schematic block diagram of an alternative embodiment of the invention;
Figure 12 realizes the flow chart of method of the present invention according to the embodiments of the invention of Figure 11;
Figure 13 realizes the flow chart of method of the present invention according to the embodiments of the invention of Fig. 9;
Figure 14 is the schematic block diagram of another embodiment more of the present invention;
Figure 15 realizes the flow chart of method of the present invention according to the embodiments of the invention of Figure 14;
Figure 16 is the schematic block diagram of an alternative embodiment of the invention;
Figure 17 is a flow chart of realizing method of the present invention according to the embodiments of the invention of Figure 16;
Figure 18 is that another realizes the flow chart of method of the present invention according to the embodiments of the invention of Figure 14;
Figure 19 is that another realizes the flow chart of method of the present invention according to the embodiments of the invention of Fig. 5; With
Figure 20 is that another realizes the flow process of method of the present invention according to the embodiments of the invention of Fig. 5.
See figures.1.and.2, express a kind of method of making the power security control according to a preferred embodiment of the present invention among the figure, this method is can prevent bootlegging original electron publication and the method for selling this original electron publication about a plurality of companies and a plurality of sale website on network, this making power method of controlling security comprises: a plurality of companies 100 are arranged in step S200, original electron publication 106 is encrypted as ground floor encrypted electronic publication 108, wherein this original electron publication comprises the waveform music file, mp3 file and image file, and then this ground floor encrypted electronic publication 108 is encrypted as second layer encrypted electronic publication 110; In step S202, a plurality of sale website 102 is arranged, 110 deciphering of second layer encrypted electronic publication are ground floor encrypted electronic publication 108, and then this ground floor encrypted electronic publication 108 is encrypted as the 3rd infill layer electronic publication 116; In step S204, there are a plurality of users 104 that 116 deciphering of the 3rd infill layer electronic publication are ground floor encrypted electronic publication 108, and then 108 deciphering of ground floor encrypted electronic publication are original electron publication 106.
Wherein these companies 100 are encrypted as ground floor encrypted electronic publication 108 to original electron publication 106, the step that ground floor encrypted electronic publication 108 is encrypted as the method for second layer encrypted electronic publication 110 comprises again: produce earlier first key at random by company, and cooperate first public-key cryptography to make first key original electron publication 106 is encrypted as ground floor encrypted electronic publication 108, and then use second public-key cryptography that ground floor encrypted electronic publication 108 is encrypted as second layer encrypted electronic publication 110.
First public-key cryptography that uses in each company 100 is the first identical public-key cryptography, and first key is the first different key, and second public-key cryptography also is the second different public-key cryptography.
Wherein these sale websites 102 are ground floor encrypted electronic publication 108 to 110 deciphering of second layer encrypted electronic publication, and then the method that ground floor encrypted electronic publication 108 is encrypted as the 3rd infill layer electronic publication 116 comprises: second privacy key is used in these sale websites 102, and 110 deciphering are ground floor encrypted electronic publication 108 to second layer encrypted electronic publication, and have second key be by these sell that websites 102 produce at random and with these user's sequence number computings after generation form the variation key, use this variation key to cooperate the 3rd public-key cryptography that ground floor encrypted electronic publication 108 is encrypted as the 3rd infill layer electronic publication 116 then.
Selling second privacy key that uses the website in each family is second public-key cryptography that uses corresponding to each company, be the second different privacy keys, and the 3rd public-key cryptography is the 3rd an identical public-key cryptography, but second key is the second different key.
Wherein user 104 is ground floor encrypted electronic publication 108 to 116 deciphering of the 3rd infill layer electronic publication, and then ground floor encrypted electronic publication 108 deciphering comprised for the method for original electron publication 106: user 104 uses the variation key to cooperate the 3rd privacy key that 116 deciphering of the 3rd infill layer electronic publication are ground floor encrypted electronic publication 108, and re-using that first privacy key deciphers ground floor encrypted electronic publication 108 is original electron publication 106.
Wherein the 3rd privacy key of each user's 104 use is the 3rd identical privacy keys, and first privacy key that each user 104 uses also is the first identical privacy key, but the variation key is different variation key, and first key that each user uses also is the first different key.
With reference to Fig. 3 and Fig. 4, wherein express a kind of method of making the power security control according to a preferred embodiment of the present invention, this method is can prevent bootlegging original electron publication and the method for selling this original electron publication about a plurality of companies on the networking, this making power method of controlling security comprises: in step s400, each company 100 produces earlier first key and first initial vector 300 at random, in step s402, re-use 302 pairs first keys of first public-key cryptography and first initial vector 300 carries out cryptographic calculation 304, obtain the first asymmetry password 306, the cryptographic calculation 304 that is carried out is to utilize a kind of RSA to carry out cryptographic calculation 304 here.Then in step s404, use first key and 300 pairs of original electron publications of first initial vector 106 to carry out cryptographic calculation 308, obtain ground floor encrypted electronic publication 108, the cryptographic calculation 308 that is carried out is to utilize a kind of DES/XOR computing to carry out cryptographic calculation 308 here.Then in step s406, produce second initial vector 310 more at random, in step s408, use the data of the 312 pairs first asymmetry passwords 306 of second public-key cryptography and second initial vector 310 to carry out cryptographic calculation 314, obtain the second asymmetry password 316, the cryptographic calculation 314 that is carried out is to utilize a kind of RSA to carry out cryptographic calculation 314 here.Then in step s410, use second public- key cryptography 312 and 310 pairs of ground floor encrypted electronics of second initial vector publication 108 to carry out cryptographic calculation 318, obtain second layer encryption key 110, the cryptographic calculation 318 that is carried out is to utilize a kind of asymmetry crypto-operation method and XOR to carry out cryptographic calculation 318 here.
With reference to Fig. 3, Fig. 5 and Fig. 6, wherein express a kind of method of making the power security control in accordance with a preferred embodiment of the present invention, wherein utilize DES/XOR to carry out cryptographic calculation 308, the method step that makes each company 100 obtain ground floor encrypted electronic publication 108 comprises: in step s600, original electron publication 106 is divided into multi-group data block 500, then in step s602, utilize first block in the block 500 of first key 504 and 502 pairs of original electron publications 106 of first initial vector to carry out DES/XOR 506, first block in the block 500 of original electron publication 106 is encrypted, in step s604, obtain the first ciphertext block and first initial vector 1 in the ground floor encrypted electronic publication 108 ciphertext blocks 516,508, in step s606, second block in the block 500 of original electron publication 106 is utilized first key 504 and first initial vector 1,508 carry out cryptographic calculation by DES/XOR 510, in step S608, obtain ground floor encryption key 108 ciphertext block 516 the second ciphertext block and obtain first initial vector 2,512, then in step s610, according to original electron publication 106 each follow-up block 500 are carried out cryptographic calculation by DES/XOR, in step s612, obtain the last ciphertext block of corresponding ciphertext block 516.
With reference to Fig. 5, Fig. 7 and Fig. 8, wherein express a kind of method of making the power security control according to a preferred embodiment of the present invention, this method utilizes first key and first initial vector that first block in the block of original electron publication is carried out DES/XOR, the method step that first block of the block of original electron publication is encrypted as the first ciphertext block of ground floor encrypted electronic publication comprises: in step s800, each group data area piece in the block 500 is divided into many group subdata blocks 700, in step s802, the first group of sub-block and first initial vector 502 of each group data area piece are carried out XOR 702 computings, obtain first initial vector 1,508, in step s804, first group of subdata block carried out the DES701 computing with first key 504, obtain first group of sub-ciphertext block of the first ciphertext block 710 in the ciphertext block 516, in step s806, will the follow-up subdata block of the first group data area piece respectively with first initial vector 1,508 make XOR, obtain corresponding sub-ciphertext block 710, in step s808, in the same manner each the group subdata block in the data block 500 is made cryptographic calculation, last subdata block in encrypting subdata block 700 becomes till the last sub-ciphertext block in the sub-ciphertext block 710, carry out the DES/XOR computing according to each group subdata block, obtain corresponding sub-ciphertext block 710 each group data area piece.
With reference to Fig. 3, Fig. 9 and Figure 10, wherein express a kind of method of making the power security control according to a preferred embodiment of the present invention, wherein utilizing asymmetry crypto-operation method and XOR to carry out the method step that cryptographic calculation obtains second layer encrypted electronic publication comprises: in step s1000, ground floor encrypted electronic publication 108 is divided into multi-group data block 900, in step s1002, first block of ground floor encrypted electronic publication 108 is carried out the cryptographic calculation of RSA with second public-key cryptography 312, in step s1004, obtain first ciphertext block of second layer encrypted electronic publication 110 ciphertext blocks 920, in step s1006, second initial vector 310 and first block of ground floor encrypted electronic publication 108 are carried out the XOR computing, in step s1008, obtain second initial vector 1,910, in step s1010, with second initial vector 1,910 carry out the XOR computing with second block of ground floor encrypted electronic publication 108, in step s1012, obtain the second ciphertext block, in step s1014, utilize the XOR computing block 900 of ground floor encrypted electronic publication 108 to be encrypted to the ciphertext block 920 of second layer encrypted electronic publication 110, up in step s1016, ground floor encrypted electronic publication 108 final data blocks are encrypted to till the last ciphertext block of second layer encrypted electronic publication 110.
With reference to Figure 11 and Figure 12, wherein express a kind of method of making the power security control according to a preferred embodiment of the present invention, this method is can prevent bootlegging original electron publication and the method for selling the original electron publication about selling the website on network, the step of this making power method of controlling security comprises: in step s1200, be decrypted computing 1104 with 922 pairs of second asymmetry passwords 316 that transmitted by company 100 of second privacy key, the decrypt operation 1104 that is carried out is to utilize a kind of RSA deciphering here.In step s1202, obtain the first asymmetry password 306 and second initial vector 310, in step s1204, be decrypted computing 1110 with second privacy key 922 and 31 0 pairs of second layer encrypted electronic publications 110 that transmitted by company 100 of second initial vector, the decrypt operation 1110 that is carried out is to utilize a kind of RSA/XOR here.In step s1206, obtain ground floor encrypted electronic publication 108, in step s1208, produce second key 1116 and the 3rd initial vector 1114 at random, in step s1210, utilize 1118 pairs second keys 1116 of the 3rd public-key cryptography and the 3rd initial vector 1114 to carry out cryptographic calculation 1120, the cryptographic calculation 1120 that is carried out is to utilize a kind of RSA to make cryptographic calculation 1120 here.In step s1212, obtain the 3rd asymmetry password 1122, in step s1214, utilize 1116 pairs of user's sequence numbers of second key 1124 to carry out cryptographic calculation 1126, wherein user's sequence number 1124 is that user by user side is imported, and the cryptographic calculation 1126 that is carried out here is to utilize a kind of DES to carry out cryptographic calculation 1126.In step s1216, key 1128 obtains making a variation, in step s1218, utilize 1128 pairs of ground floor encrypted electronics of this variation key publication 108 to carry out cryptographic calculation 1130, the cryptographic calculation 1130 that is carried out is to utilize a kind of DES to carry out cryptographic calculation 1130 here.In step s1220, password 1134 obtains making a variation, in step s1222, carry out cryptographic calculation 1132 with this variation key 1128 and 1114 pairs of ground floor encrypted electronics of the 3rd initial vector publication 108, the cryptographic calculation 1132 that is carried out is to utilize a kind of DES/XOR computing to carry out this cryptographic calculation 1132 here.In step s1224, obtain the 3rd infill layer key 116.
With reference to Fig. 9 and Figure 13, wherein express a kind of method of making the power security control according to a preferred embodiment of the present invention, this method is utilized RSA/XOR deciphering to obtain ground floor method of encrypting step to comprise: in step s1300, utilize second privacy key 922 to be decrypted computing the first ciphertext block in the ciphertext block 920 of second layer encrypted electronic publication by the RSA computing, in step s1302, obtain first block in the ground floor encrypted electronic publication block 936, in step s1304, second initial vector 310 and first block in the ground floor encrypted electronic publication are carried out the XOR computing, in step s1306, obtain corresponding second initial vector 1,910, in step s1308, with the second ciphertext block in the second layer encrypted electronic publication by the XOR and second initial vector 1,910 carry out computing, in step s1310, obtain second block of ground floor encrypted electronic publication, in step s1312, second initial vector 310 and second block of ground floor encrypted electronic publication are carried out computing by XOR, in step s1314, obtain second initial vector 2,916, in step s1316, successively the follow-up ciphertext block of second layer encrypted electronic publication 920 is decrypted computing by XOR, obtain the corresponding block 936 of ground floor encryption key, till the last ciphertext block deciphering with second layer encrypted electronic publication is the final data block of ground floor encrypted electronic publication.
With reference to Figure 14 and Figure 15, wherein express a kind of method of making the power security control according to a preferred embodiment of the present invention, wherein utilizing DES and XOR computing to make to sell the website to carry out the method that cryptographic calculation obtains the 3rd infill layer electronic publication comprises: in step s1500, ground floor encrypted electronic publication is divided into multi-group data block 1400, in step s1502, utilize DES1402 to carry out cryptographic calculation the variation of the first block utilization in the block 1400 of ground floor encrypted electronic publication key 1128, in step s1504, obtain the first ciphertext block of the ciphertext block 1416 of the 3rd infill layer electronic publication, at step s1506, the 3rd initial vector 1114 and first block in the ground floor encrypted electronic publication are carried out computing by XOR 1404, in step s1508, obtain the 3rd initial vector 1,1406, in step s1510, previous three initial vector of remainder data block in the ground floor encrypted electronic publication by xor operation and each block carried out computing, in step s1512, obtain the ciphertext block 1416 of the 3rd infill layer electronic publication.
With reference to Figure 16 and Figure 17, wherein express a kind of method of making the power security control according to a preferred embodiment of the present invention, this method is can prevent from network about the user that bootlegging original electron publication from going forward side by side to exercise method with the original electron publication, this making power method of controlling security step comprises: in step s1700, use 1602 pairs of the 3rd asymmetry passwords 1122 that transmitted by the sale website of the 3rd privacy key to be decrypted computing 1604, the decrypt operation 1604 that is carried out is to utilize RSA Algorithm to be decrypted computing 1604 here.In step s1702, obtain second key 1116 and the 3rd initial vector 1114, in step s1704, utilize 1116 pairs of user's sequence numbers of second key 1124 to carry out cryptographic calculation 1610, the cryptographic calculation 1610 of Shi Yonging is to utilize the DES algorithm to carry out cryptographic calculation 1610 herein.In step s1706, key 1128 obtains making a variation, in step s1708, be decrypted computing 1612 with 1128 pairs of variation passwords 1134 that transmit by the sale website of variation key, the decrypt operation 1612 that is carried out is to utilize the DES algorithm to be decrypted computing 1612 here.In step s1710, obtain the first asymmetry password 306, in step s1712, utilize 1114 pairs of the 3rd infill layer electronic publications 116 that transmitted by the sale website of variation key 1128 and the 3rd initial vector to be decrypted computing 1620, the decrypt operation 1620 that is carried out is to utilize the DES/XOR algorithm to be decrypted computing 1620 here.In step s1714, obtain ground floor encrypted electronic publication 108, in step s1716, be decrypted computing 1616 with 1614 pairs first asymmetry passwords 306 of first privacy key, the decrypt operation 1616 that is carried out is to utilize RSA Algorithm to be decrypted computing 1616 here.In step s1718, obtain first key and first initial vector 300, in step s1720, utilize first key and 300 pairs of ground floor encrypted electronics of first initial vector publication to be decrypted computing 1624, here the decrypt operation 1624 that is carried out is to utilize the DES/XOR algorithm, in step s1722, obtain original electron publication 106.
With reference to Figure 14 and Figure 18, wherein express a kind of method of making the power security control according to a preferred embodiment of the present invention, wherein as follows by the method that the DES/XOR algorithm is decrypted computing: in step s1800 by selling the 3rd infill layer electronic publication that transmits the website, to be decrypted computing by DES algorithm 1418 by the variation of the first ciphertext block utilization in the ciphertext block of selling in the 3rd infill layer electronic publication that transmits the website 1416 key 1128, in step s1802, obtain first block of ground floor encrypted electronic publication block 1428, in step s1804, the block of first in the 3rd initial vector 1114 and the ground floor encrypted electronic publication is carried out computing by XOR algorithm 1402, in step s1806, obtain the 3rd initial vector 1,1406, in step s1808, the second ciphertext block in the 3rd infill layer electronic publication is passed through XOR algorithm 1422 and the 3rd initial vector 1,1406 carry out computing, in step s1810, obtain second block of ground floor encrypted electronic publication, in step s1812, the 3rd initial vector 1114 and second block of ground floor encrypted electronic publication are carried out computing by XOR algorithm 1424, in step s1814, obtain the 3rd initial vector 2,1412, in step s1816, successively subsequent ciphertext block 1416 in follow-up the 3rd initial vector that obtains and the 3rd infill layer electronic publication is carried out computing by the XOR algorithm, in step s1818, obtain the block 1428 in the ground floor encrypted electronic publication.
With reference to Fig. 5 and Figure 19, wherein express a kind of method of making the power security control according to a preferred embodiment of the present invention, wherein the user to utilize the DES/XOR algorithm to obtain the method for original electron publication as follows: in step s1900, the first ciphertext block in the ciphertext block 516 of ground floor encrypted electronic publication is decrypted computing with first key 504 and first initial vector 502 by DES/XOR algorithm 522, in step s1902, obtain first initial vector 1,508 and original electron publication block 500 in first block, in step s1904, the second ciphertext block in the ground floor encrypted electronic publication is utilized first key 504 and first initial vector 1,508 are decrypted computing by DES/XOR algorithm 526, in step s1906, obtain first initial vector 2,512 and second block of original electron publication, in step s1908, successively the follow-up ciphertext block 516 of ground floor encrypted electronic publication is decrypted computing, obtain the block 500 of original electron publication, up in step s1910, the last ciphertext block of ground floor encrypted electronic publication being deciphered to till the final data block of original electron publication.
With reference to Fig. 7 and Figure 20, wherein express a kind of method of making the power security control according to a preferred embodiment of the present invention, wherein the user is decrypted computing to the first ciphertext block in the ground floor encrypted electronic publication by the DES/XOR algorithm, the method step that obtains first initial vector 1 and original electron publication first block comprises: the first sub-ciphertext block of the first ciphertext block of ground floor encrypted electronic publication is decrypted computing with first key 504 by DES algorithm 712, obtain the first subdata block of first block of original electron publication, the first subdata block with first block in the original electron publication, carry out XOR algorithm 714 with first initial vector 502, obtain first initial vector 1,508, with the follow-up sub-ciphertext block 170 and first initial vector 1,508 make XOR 718, obtain the corresponding subdata block 700 of first block, the subsequent ciphertext block of ground floor encrypted electronic publication is decrypted computing, till the last subdata block in obtaining the original electron publication.
Though the present invention has carried out aforesaid description by each preferred embodiment, this is not meant to limit the present invention, and only is for the present invention is described.For those skilled in the art, under the situation that does not break away from the spirit and scope of the present invention, can make various changes and modification.Obviously, these change with revising and all certainly will fall within the protection range that the accompanying Claim book defined.
Claims (41)
1. make the method for weighing security control for one kind, described method is used for a plurality of companies and a plurality of connection and stands in when selling electronic publication on the network and prevent anyone bootlegging original electron publication and sell described original electron publication that described making power method of controlling security comprises:
Company is encrypted as ground floor encrypted electronic publication to the original electron publication, and then described ground floor encrypted electronic publication is encrypted as second layer encrypted electronic publication;
Selling the website is the described second layer encrypted electronic publication deciphering ground floor encrypted electronic publication, more described ground floor encrypted electronic publication is encrypted as the 3rd infill layer electronic publication; And
The user is described ground floor encrypted electronic publication to described the 3rd infill layer electronic publication deciphering, more described ground floor encrypted electronic publication deciphering is the original electron publication.
2. the method for making power as claimed in claim 1 security control, wherein said original electron publication comprises waveform music file, Motion Picture Experts Group's (MP3) music file and image file.
3. the method for making power as claimed in claim 1 security control, wherein a plurality of companies are encrypted as described ground floor encrypted electronic publication to described original electron publication, and the method that described ground floor encrypted electronic publication is encrypted to described second layer encrypted electronic publication comprises again:
Produce first key at random by described these companies;
Use described first key to cooperate first public-key cryptography that described original electron publication is encrypted as described ground floor encrypted electronic publication; And
Use second public-key cryptography that described ground floor encrypted electronic publication is encrypted as described second layer encrypted electronic publication.
4. the method for making power as claimed in claim 3 security control, wherein described first public-key cryptography of each described these companies' use is identical described first public-key cryptography.
5. the method for making power as claimed in claim 3 security control, wherein described first key of each described these companies' use is different described first keys.
6. the method for making power as claimed in claim 3 security control, wherein described second public-key cryptography of each described these companies' use is identical described second public-key cryptography.
7. the method for making power as claimed in claim 1 security control, wherein said these are sold the website described second layer encrypted electronic publication deciphering are described ground floor encrypted electronic publication, and the method that described ground floor encrypted electronic publication is encrypted as described the 3rd infill layer electronic publication comprises again:
More described sale website uses described second privacy key that described second layer encrypted electronic publication deciphering is described ground floor encrypted electronic publication;
Second key sell by described these that websites produce at random and with these users' a sequence number computing after produce a variation key; And
Use described variation key to cooperate the 3rd public-key cryptography that described ground floor encrypted electronic publication is encrypted as described the 3rd infill layer electronic publication.
8. as the method for the described making power of claim 6 and claim 7 security control, it is described second public-key cryptography that corresponding relatively described each a little company use that described second privacy key is used in wherein every described these sale websites, but different described second privacy keys.
9. the method for making power as claimed in claim 7 security control, wherein each described described the 3rd public-key cryptography that these sell the website use is identical described the 3rd public-key cryptography.
10. the method for making power as claimed in claim 7 security control, wherein each described described second key that these sell the website use is different described second keys.
11. method as the security control of the described making power of claim 1 and claim 2, wherein said these users are described ground floor encrypted electronic publication to the deciphering of described the 3rd infill layer electronic publication, again described ground floor encrypted electronic publication deciphering comprising for the method for described original electron publication:
Described these users use described variation key to cooperate the 3rd privacy key that described the 3rd infill layer electronic publication deciphering is described ground floor encrypted electronic publication; And
Use first key to cooperate first privacy key that described ground floor encrypted electronic publication deciphering is described original electron publication.
12. the method for making power as claimed in claim 11 security control, wherein described the 3rd privacy key of each more described user's use is identical described the 3rd privacy key, and described first privacy key that each described these user uses is identical described first privacy key.
13. the method for making power as claimed in claim 11 security control, wherein the described variation key of each described these users' use is different described variation keys, and described first key that each described these user uses also is different described first key.
14. a method of making the power security control, described method is used for preventing when electronic publication is sold by company on network anyone bootlegging original electron publication and the method for selling described original electron publication, and described making power method of controlling security comprises:
Described company produces first key and first initial vector at random;
Use first public-key cryptography that the data of described first key and described first initial vector are carried out cryptographic calculation, obtain the first asymmetry password;
Use described first key and described first initial vector that described original electron publication is carried out described cryptographic calculation, obtain ground floor encrypted electronic publication;
Produce second initial vector at random;
Use second public-key cryptography that the described data of described first asymmetry password and described second initial vector are carried out described cryptographic calculation, obtain the second asymmetry password; And
Use described second public-key cryptography and described second initial vector that described ground floor encrypted electronic publication is carried out described cryptographic calculation, obtain described second layer encrypted electronic publication.
15. the method for making power as claimed in claim 14 security control, wherein use described first public-key cryptography that the described data of described first key and described first initial vector are carried out described cryptographic calculation, obtain the described first asymmetry password, described cryptographic calculation is to utilize asymmetry password algorithm to carry out described cryptographic calculation, obtains the described first asymmetry password.
16. the method for making power as claimed in claim 14 security control, wherein use described second public-key cryptography that the described data of described first asymmetry password and described second initial vector are made described cryptographic calculation, obtain the described second asymmetry password, described cryptographic calculation is to utilize asymmetry password algorithm to carry out described cryptographic calculation, obtains the described second asymmetry password.
17. the method for making power as claimed in claim 14 security control, wherein use described first key and described first initial vector that described original electron publication is carried out described cryptographic calculation, obtain described ground floor encrypted electronic publication, described cryptographic calculation is to utilize symmetry algorithm and XOR method to carry out described cryptographic calculation, obtains described ground floor encrypted electronic publication.
18. the method for making power as claimed in claim 17 security control wherein utilizes described symmetry algorithm and described XOR method to carry out described cryptographic calculation, the method that described company obtains described ground floor encrypted electronic publication comprises:
Described original electron publication is divided into a plurality of block;
Utilize described first key and described first initial vector that first block of described original electron publication is carried out described symmetry algorithm and described XOR, described first block of described original electron publication is encrypted as the first ciphertext block of described ground floor encrypted electronic publication and obtains first initial vector 1;
Second block to described original electron publication is carried out described cryptographic calculation with described first key and described first initial vector 1 by described symmetry algorithm/XOR method, obtains the second ciphertext block of described ground floor encrypted electronic publication and obtains first initial vector 2;
Successively that described original electron publication is follow-up more described block is made the described cryptographic calculation of described symmetry algorithm/XOR method, obtains corresponding a plurality of ciphertext block.
19. the method for making power as claimed in claim 18 security control, wherein utilize described first key and described first initial vector that described first block of described original electron publication is made described symmetry algorithm and described XOR, the method that described first block of described original electron publication is encrypted to the described first ciphertext block of described ground floor encrypted electronic publication comprises:
Each more described block is divided into a plurality of subdata blocks;
The first subdata block and described first initial vector of each more described block are made described XOR, obtain described first initial vector 1;
The described first subdata block is carried out described symmetry algorithm with described first key, obtain the first sub-ciphertext block of the described first ciphertext block;
To carry out described XOR with described first initial vector 1 respectively at follow-up described these subdata blocks of described first block, obtain corresponding a plurality of sub-ciphertext block, till the last subdata block of encryption is last sub-ciphertext block; And
Successively each subdata block of each more described block is carried out the described cryptographic calculation of described symmetry algorithm and described XOR, obtain corresponding described this a little ciphertext block.
20. the method for making power as claimed in claim 14 security control, wherein use described second public-key cryptography that the described data of described ground floor encrypted electronic publication and described second initial vector are carried out described cryptographic calculation, the described cryptographic calculation that obtains described second layer encrypted electronic publication is to utilize asymmetry crypto-operation method and XOR method to carry out described cryptographic calculation.
21. the method for making as claimed in claim 20 power security control is wherein utilized described asymmetry crypto-operation method and described XOR to carry out the method that described cryptographic calculation obtains described second layer encrypted electronic publication and is comprised:
Described ground floor encrypted electronic publication is divided into a plurality of block;
The described cryptographic calculation that first block of described ground floor encrypted electronic publication is carried out described asymmetry password algorithm with described second public-key cryptography obtains the first ciphertext block of described second layer encrypted electronic publication;
Described first block of described second initial vector and described ground floor encrypted electronic publication is carried out described XOR, obtain second initial vector 1;
Described second initial vector 1 is carried out described XOR with described second block of described ground floor encrypted electronic publication, obtain the second ciphertext block; And
Utilize described XOR that described these block of described ground floor encrypted electronic publication are encrypted as a plurality of ciphertext blocks of described second layer encrypted electronic publication successively, be encrypted to up to final data block till the last ciphertext block of described second layer encrypted electronic publication described ground floor encrypted electronic publication.
Stand on the network when selling electronic publication and prevent bootlegging original electron publication and sell described original electron publication that described making power method of controlling security comprises 22. a method of making the power security control, this method are used for connection:
Utilize second privacy key that the second asymmetry password that is transmitted by company is decrypted computing, obtain the first asymmetry password and second initial vector;
Utilize described second privacy key and described second initial vector that the second layer encrypted electronic publication that is transmitted by described company is carried out described decrypt operation, obtain ground floor encrypted electronic publication;
Produce second key and the 3rd initial vector at random;
Utilize the 3rd public-key cryptography that described second key and described the 3rd initial vector are carried out cryptographic calculation, obtain the 3rd asymmetry password;
Utilize described second key that user's sequence number is done and carry out described cryptographic calculation, obtain the key that makes a variation;
Utilize described variation key that the described first asymmetry password is carried out described cryptographic calculation, obtain a variation password; And
Utilize described variation key and described the 3rd initial vector that described ground floor encrypted electronic publication is carried out described cryptographic calculation, obtain the 3rd infill layer electronic publication data.
23. the method for making as claimed in claim 22 power security control, wherein said user's sequence number are by user's input of user side.
24. the method for making power as claimed in claim 22 security control, wherein with described second privacy key described second asymmetry password is carried out described decrypt operation, the described decrypt operation that obtains described first asymmetry password and described second initial vector is to utilize the deciphering of asymmetry password algorithm to obtain described first asymmetry password and described second initial vector.
25. the method for making power as claimed in claim 22 security control, wherein utilize described second privacy key and described second initial vector that second layer encrypted electronic publication is decrypted computing, the described decrypt operation that obtains described ground floor encrypted electronic publication is to utilize asymmetry password algorithm and XOR method to obtain described ground floor encrypted electronic publication.
26. the method for making power as claimed in claim 25 security control, the method for wherein utilizing the deciphering of described asymmetry password algorithm and described XOR method to obtain described ground floor encrypted electronic publication comprises:
Utilize described asymmetry password algorithm to carry out described decrypt operation with described second privacy key first ciphertext block in the described second layer encrypted electronic publication, obtain first block of described ground floor encrypted electronic publication;
Described first block in described second initial vector and the described ground floor encrypted electronic publication with described XOR method, is obtained corresponding second initial vector 1;
The second ciphertext block in the described second layer encrypted electronic publication is carried out computing with described XOR method and described second initial vector 1, obtain second block of described ground floor encrypted electronic publication;
Described second block of described second initial vector and described ground floor encrypted electronic publication is done computing with described XOR method, obtain second initial vector 2;
Successively follow-up described these ciphertext blocks of described second layer encrypted electronic publication are carried out described decrypt operation via described XOR method, obtain corresponding described these a little block of described ground floor encrypted electronic publication, till the last ciphertext block deciphering with described second layer encrypted electronic publication is the final data block of described ground floor encrypted electronic publication.
27. the method for making power as claimed in claim 22 security control, wherein with described the 3rd public-key cryptography described second key and described the 3rd initial vector are carried out described cryptographic calculation, described cryptographic calculation is to utilize asymmetry password algorithm to carry out described cryptographic calculation to obtain described the 3rd asymmetry password.
28. the method for making power as claimed in claim 22 security control, wherein with described second key described user's sequence number is carried out described cryptographic calculation, the described cryptographic calculation that obtains described variation key is to utilize the symmetry algorithm to carry out described cryptographic calculation to obtain described variation key.
29. the method for making power as claimed in claim 22 security control, wherein with described variation key the described first asymmetry password is carried out described cryptographic calculation, the described cryptographic calculation that obtains described variation password is to utilize the symmetry algorithm to carry out described cryptographic calculation to obtain described variation password.
30. the method for making power as claimed in claim 22 security control, wherein utilize described variation key and described the 3rd initial vector that described ground floor encrypted electronic publication is carried out described cryptographic calculation, the described cryptographic calculation that obtains described the 3rd infill layer electronic publication is to utilize symmetry algorithm and XOR method to carry out described cryptographic calculation to obtain described the 3rd infill layer electronic publication.
31. the method for making as claimed in claim 30 power security control is wherein utilized described symmetry algorithm and described XOR method to carry out the method that described cryptographic calculation obtains described the 3rd infill layer electronic publication and is comprised:
Described ground floor encrypted electronic publication is divided into a plurality of block;
Utilize described variation key to carry out described cryptographic calculation first block in the described ground floor encrypted electronic publication, obtain the first ciphertext block of described the 3rd infill layer electronic publication by described symmetry algorithm;
Described first block in described the 3rd initial vector and the described ground floor encrypted electronic publication is carried out computing by described XOR algorithm, obtain the 3rd initial vector 1;
All the other more described block in the described ground floor encrypted electronic publication are carried out computing with previous the 3rd initial vector of described XOR method and each described these block, obtain a plurality of ciphertext blocks of described the 3rd infill layer electronic publication.
32. a method of making the power security control, this method are about preventing user's bootlegging original electron publication and use the method for described original electron publication on network, described making power method of controlling security comprises:
Use the 3rd privacy key to being decrypted computing, obtain second key and the 3rd initial vector by selling the 3rd asymmetry password that transmits the website;
Utilize second key that user's sequence number is carried out cryptographic calculation, obtain the key that makes a variation;
Utilize described variation key that the variation password that is transmitted by described sale website is carried out described decrypt operation, obtain the first asymmetry password;
Utilize described variation key and described the 3rd initial vector that the 3rd infill layer electronic publication that is transmitted by described sale website is carried out described decrypt operation, obtain ground floor encrypted electronic publication;
Utilize first privacy key that the described first asymmetry password is carried out described decrypt operation, obtain one first key and first initial vector;
Utilize described first key and described first initial vector that described ground floor encrypted electronic publication is decrypted computing, obtain described original electron publication.
33. the method for making power as claimed in claim 32 security control, wherein described the 3rd asymmetry password that is transmitted by described sale website is made described decrypt operation with described the 3rd privacy key, obtain described second key and described the 3rd initial vector, described decrypt operation is to utilize asymmetry password algorithm to carry out described decrypt operation to obtain described second key and described the 3rd initial vector.
34. the method for making power as claimed in claim 32 security control, wherein with described second key described user's sequence number is carried out described cryptographic calculation, the described cryptographic calculation that obtains described variation key is to utilize the symmetry algorithm to carry out described cryptographic calculation to obtain described variation key.
35. the method for making power as claimed in claim 32 security control, wherein with described variation key the described variation password that is transmitted by described sale website is carried out described decrypt operation, the described decrypt operation that obtains the described first asymmetry password is to utilize the symmetry algorithm to carry out described decrypt operation to obtain the described first asymmetry password.
36. the method for making power as claimed in claim 32 security control, wherein with described variation key and described the 3rd initial vector described the 3rd infill layer electronic publication that is transmitted by described sale website is carried out described decrypt operation, the described decrypt operation that obtains described ground floor encrypted electronic publication is to utilize symmetry algorithm and XOR method to carry out described decrypt operation to obtain described ground floor encrypted electronic publication.
37. the method for making as claimed in claim 36 power security control, wherein described the 3rd infill layer electronic publication that is transmitted by the described sale website method of making described decrypt operation with described symmetry algorithm and described XOR method is as follows:
The first ciphertext block in described the 3rd infill layer electronic publication that will be transmitted by described sale website carries out described decrypt operation with described variation key by described symmetry algorithm, obtains first block of described ground floor encrypted electronic publication;
The block of described first in described the 3rd initial vector and the described ground floor encrypted electronic publication is carried out computing by described XOR method, obtain the 3rd initial vector 1;
The second ciphertext block in described the 3rd infill layer electronic publication is carried out computing by described XOR method and described the 3rd initial vector 1, obtain second block of described ground floor encrypted electronic publication;
Described second block of described the 3rd initial vector and described ground floor encrypted electronic publication is carried out computing by described XOR method, obtain the 3rd initial vector 2; And
Successively the follow-up a plurality of ciphertext blocks in follow-up described the 3rd initial vector that obtains and described the 3rd infill layer electronic publication are carried out computing by described XOR method, obtain a plurality of block in the described ground floor encrypted electronic publication.
38. the method for making power as claimed in claim 32 security control, wherein with described first privacy key described first asymmetry password is carried out described decrypt operation, the described decrypt operation that obtains described first key and described first initial vector utilizes asymmetry password algorithm to carry out described decrypt operation to obtain described first key and described first initial vector.
39. the method for making power as claimed in claim 32 security control, wherein with described first key and described first initial vector described ground floor encrypted electronic publication is carried out described decrypt operation, the described decrypt operation that obtains described original electron publication is to utilize symmetry algorithm and XOR method to obtain described original electron publication.
40. the method for making power as claimed in claim 39 security control, the method for wherein utilizing described symmetry algorithm and described XOR method to obtain described original electron publication is as follows:
Utilize described first key and described first initial vector to carry out described decrypt operation to the first ciphertext block in the described ground floor encrypted electronic publication, obtain first initial vector 1 and described original electron publication first block by described symmetry algorithm and described XOR method;
Utilize described first key and described first initial vector 1 to carry out described decrypt operation to the second ciphertext block in the described ground floor encrypted electronic publication, obtain second block of first initial vector 2 and described original electron publication by described symmetry algorithm and described XOR method;
Successively the follow-up a plurality of ciphertext blocks of described ground floor encrypted electronic publication are carried out described decrypt operation, obtain a plurality of block of described original electron publication, till the last ciphertext block deciphering with described ground floor encrypted electronic publication is the final data block of described original electron publication.
41. the method for making power as claimed in claim 40 security control, wherein the described first ciphertext block in the described ground floor encrypted electronic publication is carried out described decrypt operation by described symmetry algorithm and described XOR method, the method that obtains described first initial vector 1 and described original electron publication first block comprises:
Utilize described first key to carry out described decrypt operation the first sub-ciphertext block of the described first ciphertext block of described ground floor encrypted electronic publication, obtain the first subdata block of described first block of described original electron publication by the symmetry algorithm;
The described first subdata block with described first block in the described original electron publication carries out described XOR method with described first initial vector, obtains first initial vector 1;
Follow-up a plurality of sub-ciphertext blocks and described first initial vector 1 are carried out described XOR method, obtain the corresponding a plurality of subdata blocks of described first block; And
Follow-up a plurality of ciphertext blocks of described ground floor encrypted electronic publication are carried out described decrypt operation, till the last subdata block in obtaining described original electron publication.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 00130659 CN1347225A (en) | 2000-10-09 | 2000-10-09 | Safety control method for copyright |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 00130659 CN1347225A (en) | 2000-10-09 | 2000-10-09 | Safety control method for copyright |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1347225A true CN1347225A (en) | 2002-05-01 |
Family
ID=4594234
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 00130659 Pending CN1347225A (en) | 2000-10-09 | 2000-10-09 | Safety control method for copyright |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1347225A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100338905C (en) * | 2004-03-03 | 2007-09-19 | 北京北大方正电子有限公司 | Method of binding digital contents and hardware with hardward adaptive |
WO2009086669A1 (en) * | 2007-12-29 | 2009-07-16 | Thomson Licensing | System and method for data transmission |
CN1909443B (en) * | 2005-08-02 | 2011-08-24 | 三菱电机株式会社 | Data distribution apparatus and data communications system |
CN101138194B (en) * | 2005-03-08 | 2011-10-05 | 恩克利普特株式会社 | Data processing apparatus |
CN103593892A (en) * | 2013-11-06 | 2014-02-19 | 天津大学 | Challenge response and symmetrical encryption based electronic lock unlocking method |
US9906500B2 (en) | 2004-10-25 | 2018-02-27 | Security First Corp. | Secure data parser method and system |
US10068103B2 (en) | 2010-03-31 | 2018-09-04 | Security First Corp. | Systems and methods for securing data in motion |
US10402582B2 (en) | 2013-02-13 | 2019-09-03 | Security First Corp. | Systems and methods for a cryptographic file system layer |
CN118468326A (en) * | 2024-07-15 | 2024-08-09 | 成都进托邦互联网信息服务有限公司 | Webpage data encryption method |
US12093412B2 (en) | 2005-11-18 | 2024-09-17 | Security First Innovations, Llc | Secure data parser method and system |
-
2000
- 2000-10-09 CN CN 00130659 patent/CN1347225A/en active Pending
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100338905C (en) * | 2004-03-03 | 2007-09-19 | 北京北大方正电子有限公司 | Method of binding digital contents and hardware with hardward adaptive |
US9992170B2 (en) | 2004-10-25 | 2018-06-05 | Security First Corp. | Secure data parser method and system |
US11178116B2 (en) | 2004-10-25 | 2021-11-16 | Security First Corp. | Secure data parser method and system |
US9906500B2 (en) | 2004-10-25 | 2018-02-27 | Security First Corp. | Secure data parser method and system |
US9935923B2 (en) | 2004-10-25 | 2018-04-03 | Security First Corp. | Secure data parser method and system |
US9985932B2 (en) | 2004-10-25 | 2018-05-29 | Security First Corp. | Secure data parser method and system |
CN101138194B (en) * | 2005-03-08 | 2011-10-05 | 恩克利普特株式会社 | Data processing apparatus |
CN1909443B (en) * | 2005-08-02 | 2011-08-24 | 三菱电机株式会社 | Data distribution apparatus and data communications system |
US12093412B2 (en) | 2005-11-18 | 2024-09-17 | Security First Innovations, Llc | Secure data parser method and system |
US9026781B2 (en) | 2007-12-29 | 2015-05-05 | Thomson Licensing | System and method for data transmission |
WO2009086669A1 (en) * | 2007-12-29 | 2009-07-16 | Thomson Licensing | System and method for data transmission |
US10068103B2 (en) | 2010-03-31 | 2018-09-04 | Security First Corp. | Systems and methods for securing data in motion |
US10402582B2 (en) | 2013-02-13 | 2019-09-03 | Security First Corp. | Systems and methods for a cryptographic file system layer |
CN103593892A (en) * | 2013-11-06 | 2014-02-19 | 天津大学 | Challenge response and symmetrical encryption based electronic lock unlocking method |
CN118468326A (en) * | 2024-07-15 | 2024-08-09 | 成都进托邦互联网信息服务有限公司 | Webpage data encryption method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1312877C (en) | System and method for protecting data streams in hardware components | |
US20180109382A1 (en) | Utilizing data reduction in steganographic and cryptographic systems | |
CN105681025B (en) | A kind of safe whitepack implementation method and device of country password standard algorithm SM4 | |
US5835599A (en) | Muti-cycle non-parallel data encryption engine | |
US7123718B1 (en) | Utilizing data reduction in stegnographic and cryptographic systems | |
US20040202322A1 (en) | Protection of digital content using block cipher crytography | |
WO2003019842A3 (en) | Stream cipher, hash, and pseudo-random number generator | |
CN1347225A (en) | Safety control method for copyright | |
WO2008021145A1 (en) | Encryption method for message authentication | |
CN106059752B (en) | A kind of whitepack password encipher-decipher method based on expansion ciphertext | |
CN1890914B (en) | Block ciphering system, using permutations to hide the core ciphering function of each encryption round | |
CN103593590B (en) | Based on mixing additivity repeatedly watermark embedding method and the coding/decoding method of cloud environment | |
WO2001084766A3 (en) | System and method for encryption using transparent keys | |
CN115412229A (en) | Image encryption coding and decoding method based on random sequence and bit XOR operation | |
JP2008035305A (en) | Encryption method and data concealing method | |
CN1251444A (en) | Efficient block encryption method | |
US20040223609A1 (en) | Data encryption method | |
CN1327322A (en) | High speed copying protection method | |
CN1127240C (en) | Privacy method for multimedium data | |
Mihaljevic et al. | Cryptanalysis of fast encryption algorithm for multimedia FEA-M | |
CN111130755A (en) | Matrix double encryption method based on signature | |
Kartheeswaran et al. | Multi agent based audio steganography | |
CN115150054B (en) | Image encryption method based on quaternary cyclic shift | |
Liao et al. | A Novel Approach for Data Encryption Depending on User Location | |
JP2001211159A (en) | Method and device for decipehring contents information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C06 | Publication | ||
PB01 | Publication | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |