CN1517827A - Identification mode of contents file producer and its program - Google Patents

Identification mode of contents file producer and its program Download PDF

Info

Publication number
CN1517827A
CN1517827A CNA2004100005020A CN200410000502A CN1517827A CN 1517827 A CN1517827 A CN 1517827A CN A2004100005020 A CNA2004100005020 A CN A2004100005020A CN 200410000502 A CN200410000502 A CN 200410000502A CN 1517827 A CN1517827 A CN 1517827A
Authority
CN
China
Prior art keywords
content file
data
wright
checking
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2004100005020A
Other languages
Chinese (zh)
Other versions
CN1312620C (en
Inventor
酒泽茂之
高木幸一
宫地悟史
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
KDDI Corp
Original Assignee
KDDI Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by KDDI Corp filed Critical KDDI Corp
Publication of CN1517827A publication Critical patent/CN1517827A/en
Application granted granted Critical
Publication of CN1312620C publication Critical patent/CN1312620C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Abstract

Provided is a method and program for authenticating a contents file producer, which offers a predetermined service at a mobile device side only for the contents file produced with the use of a genuine contents production tool, in a service providing a multimedia contents file for the mobile device (for example, a mobile phone). At a contents production side, encryption processing (3) is executed on contents, for example, a music source (1) using a certain hardware key (2) or secret information, to obtain a contents file (4). At the mobile device side, the contents file (4) is downloaded and is temporarily held in a file storage part (11). An inspection part (12) inspects whether the downloaded contents file has been produced with the use of the proper production tool. If it is authenticated, the contents file (4) is registered in a registration part (13), and is provided to users.

Description

Content file wright's authentication mode and program thereof
Technical field
The present invention relates to a kind of content file wright's authentication mode and program thereof, in this authentication mode, towards the providing in the service of the content of multimedia file of portable phone, the portable phone side only provides the regulation service to the content file that uses proper content production tool making.
Background technology
As this prior art, be useful on and judge and to have or not the digital signature technology of distorting the content transmitted, for example contract etc., in addition as other prior art, have receiving between the sender to authenticate the other side, promptly be used to verify whether sender's side holds the inquire response method of correct privacy key.
The summary of this inquire response step shown in Fig. 8.As shown in Figure 8, receiver side generates random number, and this random number is sent to transmitter side (transmission interrogation code).Receiver side and transmitter side use privacy key to carry out certain calculating (Hash (hash) calculating) according to this random number, and transmitter side sends result's (transmission answer codes) of this Hash calculation to receiver side.If the value that value that the receiver side contrast receives and the Hash calculation of self obtain consistent, judges that then transmitter side is for holding correct privacy key person.
In addition, as the document that relates to above-mentioned prior art, for example there is spy to open 2002-334173 communique " コ Application テ Application Star delivery method お I び こ れ To is held last And び To コ Application ピ ユ one プ ロ グ ラ system with い Ru サ one バ and び " (its name is called: the server of content delivery method and use thereof and terminal and computer program) as the open communique of Jap.P..
But above-mentioned prior art must communicate between the reception sender in order to authenticate the other side, in the content release service, exists and carry out the unpractical problem of direct communication between contents producer and recipient.
Summary of the invention
The object of the present invention is to provide a kind ofly provides in the service at the content of multimedia file towards mobile machine (for example portable phone), and mobile pusher side only provides the content file wright authentication mode and the program of regulation service to the content file that uses proper content production tool making.
In addition, another object of the present invention is to provide a kind of and detect the content file that uses improper content production tool making, for example by the content file of pirate tool making, this content file is not provided the content file wright authentication mode and the program of the regulation service in the mobile machine.
And a further object of the present invention is to provide a kind of needn't receive content file wright authentication mode and the program that communicates between the sender in order to authenticate the content file that is to use proper content production tool making.
To achieve these goals, the invention is characterized in that transmitter side possesses with content file tools encrypted content data and makes the unit of content file; And the unit of issue (joining letter The Ru) this content file.In addition, it is characterized in that receiver side possesses the file storage part of the content file that storage obtains; Whether the content file that proof department, its checking are stored in this document storage part is to be made by proper content file tools; With login portion, it is logined this checking and is judged as proper content file.
In addition, feature of the present invention also is, content file is made side extraction unit divided data from content file, give data signature to this partial data, mobile pusher side extracts the partial data identical with described partial data from the described content file that receives, carry out the checking of described data signature, this checking is judged as the service that proper content file provides regulation.
According to these features, but because mobile pusher side authentication content documenting person, so mobile machine can only provide the service of regulation to the content file that uses proper content production tool making.
In addition, of the present invention second the program that provides a kind of content file to make is provided, this program is made of following steps: the data of partly extracting the precalculated position from the data division of unsigned content file; These data that extract are used hash function, obtain cryptographic hash; With this cryptographic hash of secret key encryption, the header of giving described content file; With give public-key cryptography and public key certificate to this header.
According to this feature, but can provide the content file of data with few calculated amount with authentication content documenting person.
In addition, another feature of the present invention is to provide a kind of content file wright authentication procedure of mobile machine, and this program is made of following steps: judge in the content file that receives whether data signature is arranged; Having under the situation of this data signature, using the root certificate to carry out the authentication of public key certificate; Under situation about authenticating, use the disclosure key, decoding is obtained the 1st cryptographic hash by the verify data of secret key encryption; From the data portion of the described content file that receives, extract predetermined partial data; This partial data is used hash function, calculate the 2nd cryptographic hash; Judge whether the described the 1st and the 2nd cryptographic hash is consistent; Under the situation of unanimity, the service of regulation is provided, under inconsistent situation, do not provide the service of this regulation.
According to this feature, even mobile pusher side can not verify that to the making side communication of this content file whether the content file that receives is to be made by proper content file tools, and make this verify that available a spot of calculated amount provides yet.
In addition, another feature of the present invention is that content file wright side direction content file gives the verify data of the information issuing of being known by content file wright only, whether mobile pusher side checking has given described verify data in the content file of obtaining, under the situation that this checking is set up, this content file is provided the service of regulation.
According to this feature, mobile pusher side only provides the service of regulation to proper content file.In addition, even mobile pusher side can not verify to the making side communication of this content file whether the content file that receives is to be made by proper content file tools yet.
Description of drawings
Fig. 1 is the block diagram of expression summary system architecture of the present invention.
Fig. 2 is the key diagram of an example of the data signature in the present invention's the 1st embodiment.
Fig. 3 is the key diagram of the structure example of expression content file.
Fig. 4 is the process flow diagram of expression content file production process.
Fig. 5 is the process flow diagram of the content file wright authentication procedure of the mobile machine of expression.
Fig. 6 is the key diagram of the verify data of the present invention's the 2nd embodiment one example of giving.
Fig. 7 is the process flow diagram of the content file wright authentication procedure of the mobile pusher side of expression.
Fig. 8 is the figure of the existing inquire response step of expression.
Embodiment
Below, describe the present invention in detail with reference to accompanying drawing.Fig. 1 utilizes the content of multimedia file towards portable phone of the present invention that the summary system diagram of service is provided.
The transmitter side of content file (making side) is used a certain hardware keys 2 (only making the secret information that side is held) to content-data, for example music source 1, carries out encryption 3, obtains content file 4.That is, this transmitter side (making side) is made this content file 4 with the content production instrument (comprising hardware keys 2 and encryption 3) of self.
On the other hand, receiver side (mobile pusher side) is downloaded this content file 4, temporarily remains in the file storage part 11.Whether proof department 12 these downloaded contents files of checking are to be made by proper tools, are under the situation that proper tools are made by this in checking, this content file 4 is logined in login portion 13, and offered the user.For example, the playing function with described music source 1 offers the user.On the other hand, not being verified as this downloaded contents file at this proof department 12 is under the situation of being made by proper tools, takes not provide to the user measure of this content file 4.
Below, the 1st embodiment of the present invention is described.In common data signature, to content-data overall calculation cryptographic hash, use secret key encryption, obtain the signature value thus.This is in order to guarantee all distorting Anywhere of content-data.
On the contrary, in the 1st embodiment of the present invention, its purpose is to guarantee that the content file wright holds proper privacy key, or the tools of checking content file have regular privacy key, be indifferent to content-data itself integrality, be whether content-data itself is distorted, in other words, be indifferent to the true and false of content-data itself.
The method of the encryption of being carried out by described encryption 3 at first, is described.As the content-data that is provided, except that described music source 1, also comprise video data, voice data or video and voice data etc.
As shown in Figure 2, from content-data A extraction unit divided data A1, A2, A3 ..., it is used hash function, calculate cryptographic hash.Then, obtain the verify data of this cryptographic hash use privacy key having been implemented data signature.
Then, this verify data is inserted header portion shown in Figure 3 suitable stores location, be suitable field (atom: atom).Here, Fig. 3 represents the form example of described content file 4, and this content file 4 is made of header portion and data division.In addition, also be received in the described atom with the paired public-key cryptography of described privacy key.And the public key certificate that is used for authenticating the legitimacy of the disclosure key also is received in atom.The disclosure key certificate is the certificate that is authenticated by the root certificate that remains on portable phone inside.
Here, data A1, the A2 that extracts from data division, A3 ... the position pre-determine by making side and portable phone.For example, pre-determine to amounting to extraction 5k byte etc. from the 1k byte of Data Start or every 10 byte-extraction, 1 byte.
Fig. 4 is the program of the described making side of explanation (transmitter side) or the process flow diagram of action.In step S1, make unsigned content file, for example described music source 1.In step S2, from data division, partly extract data (for example described data A1, A2, A3).In step S3, the data of this extraction are used hash function, obtain cryptographic hash, in step S4,, form the verify data of having given data signature with this cryptographic hash of secret key encryption, these data are inserted in the described atom.In step S5, will also insert in the atom with the paired public-key cryptography of this privacy key, the public key certificate that will be used for authenticating the legitimacy of the disclosure key is also inserted atom.In step S6, upload on the server.
Below, the program or the processing of portable phone side (mobile pusher side) are described with reference to Fig. 5.Carry out the checking of data signature in the portable phone side.In step S11, judge from the content file of downloaded, whether to bear the signature.That is, whether comprise described verify data in the Authentication Header.Under situation about bearing the signature, enter step S12, use the root certificate that is positioned at portable phone, the public key certificate in the authentication content file (with reference to Fig. 3).In addition, in described content file, do not have to enter step S18 under the situation of signature, the service of regulation is not provided.
Under the correct situation of the authentication of step S12, enter step S13, use the disclosure key, decoding is obtained cryptographic hash with the verify data of described secret key encryption.That is, take out by making the cryptographic hash that side (transmitter side) is calculated.Under the incorrect situation of the authentication of step S12, abort process.In step S14, from the data portion of content file, extract predetermined with make the identical partial data of side position, promptly with make the partial data (for example described data A1, A2, A3) that side is shared.Afterwards, in step S15, the partial data of this extraction is used hash function, calculate cryptographic hash.
In step S16, whether the cryptographic hash of obtaining among determining step S13 and the S15 is consistent.Under the situation of unanimity, the verification msg signature.Under the sure situation of being judged as of step S16, enter step S17, the service of stipulating, for example broadcast of audio frequency.On the other hand, under inconsistent situation, data signature can not enter step S18, the service of not stipulating by checking.
According to above-mentioned the 1st embodiment, because the partial data of content file is carried out data signature, so can carry out data signature with few operand.In addition, the partial data of the content file that receives is carried out the checking of data signature,, just can verify whether this content file is to be made by proper content file tools so do not communicate to content documenting side at mobile pusher side.
In addition, mobile pusher side can only provide the service of regulation to the content file that uses proper content production tool making.On the contrary, can prevent to the content file that uses improper content production tool making, for example to provide the service of regulation by the content file of pirate tool making.In addition, whether be to make even mobile pusher side, also can be verified this content file not to the making side communication of the content file that receives by proper content file tools.
Below, with reference to Fig. 6 and Fig. 7 the 2nd embodiment of the present invention is described.In the present embodiment, mobile pusher side does not use data signature, can verify whether the content file that receives is to be made by proper content file tools, only the content file that uses proper content production tool making is provided the service of regulation yet.
With reference to Fig. 6, the processing of the transmitter side of description file (making side).At first, transmitter side has the secret information 21 and arithmetic expression 22 of the information of knowing as content file wright only in advance, and this secret information 21 is stored in the storage unit of receiver side (mobile pusher side) in advance with arithmetic expression 22.For example, before mobile machine dispatches from the factory, wait in the storer that described secret information 21 is stored in advance mobile machines such as portable phone with arithmetic expression 22 by the fabricator of mobile machine.
As shown in Figure 6, transmitter side uses described secret information 21, and 22 couples of content-data B such as music source carry out regulation computing (for example scrambling (scramble) computing) by described arithmetic expression, obtain verify data.Then, this verify data is stored in the header of content file 23, this content file 23 is published to mobile machines such as portable phone.
Below, the action of the mobile pusher side of portable phone etc. is described with reference to the process flow diagram of Fig. 7.Mobile pusher side at first receives described content file.Then, in step S21, judge in the header of this content file whether have verify data.Be judged as when negating at this, enter step S26, the processing of regulation service is not provided.
On the other hand, under the sure situation of being judged as of described step S21, enter step S22, from the header of content file, extract verify data.Afterwards, enter step S23, use secret information that the data in the content file are carried out the regulation computing, generate verify data.In step S24, whether the verify data that generates among the verify data that extracts among the determining step S22 and the step S23 is consistent, being judged as certainly, promptly under the situation of unanimity, entering step S25, provides the service of regulation.On the other hand, be judged as when negating, enter step S26 at this.
According to this 2nd embodiment, do not use data signature can verify whether to be to use the content file of proper content production tool making yet, mobile pusher side only provides the service of regulation to proper content file.In addition, even mobile pusher side, can verify also whether the content file that receives is to be made by proper content file tools not to the making side communication of this content file.
In the respective embodiments described above, with reference to the flowchart text of Fig. 4, Fig. 5 and Fig. 7 according to program of the present invention or action, but these are handled also and can make computing machine and the microcomputer (CPU) that side and mobile pusher side have by content file and carry out.In addition, obviously, this handling procedure can carry out all changes under the scope that does not break away from spirit of the present invention.

Claims (16)

1, a kind of content file wright authentication mode is characterized in that: possess:
With content file tools encrypted content data and make the unit of content file; With
Issue the unit of this content file.
2, a kind of content file wright authentication mode is characterized in that: possess:
The file storage part of the content file that storage obtains;
Whether the content file that proof department, its checking are stored in this document storage part is to be made by proper content file tools; With
Login portion, it is logined this checking and is judged as proper content file,
The content file of login in this login portion provided the service of regulation.
3, a kind of content file wright authentication mode is characterized in that:
Transmitter side possesses: with content file tools encrypted content data and make the unit of content file; With the unit of this content file of issue,
Receiver side possesses: the file storage part of the content file that storage obtains; Whether the content file that proof department, its checking are stored in this document storage part is to be made by proper content file tools; With login portion, it is logined this checking and is judged as proper content file,
The content file of login in this login portion provided the service of regulation.
4, a kind of content file wright authentication mode is characterized in that:
At mobile pusher side, from the content file of obtaining, extract the partial data of giving advance notice, use this partial data to carry out the checking of data signature, this checking is judged as the service that proper content file provides regulation.
5, a kind of content file wright authentication mode is characterized in that:
Transmitter side is the extraction unit divided data from content file, gives data signature to this partial data,
Mobile pusher side extracts the partial data identical with described partial data from the described content file of obtaining, carry out the checking of described data signature, and this checking is judged as the service that proper content file provides regulation.
6, content file wright authentication mode according to claim 5 is characterized in that:
Described transmitter side and described mobile pusher side are shared the method for extraction unit divided data from described content file.
7, according to claim 5 or 6 described content file wright authentication modes, it is characterized in that:
Described content file has the structure that comprises header and data portion, and the extraction unit divided data applies data signature to it from this data portion, and this data signature is stored in the stores location that is arranged at header.
8, content file wright authentication mode according to claim 7 is characterized in that:
Give public-key cryptography and public key certificate to described header corresponding to data signature.
9, a kind of content file wright authentication procedure is made of following steps:
From the data division of unsigned content file, partly extract the data in precalculated position;
These data that extract are used hash function, obtain cryptographic hash;
With this cryptographic hash of secret key encryption, the header of giving described content file; With
Give public-key cryptography and public key certificate to this header.
10, a kind of content file wright authentication procedure of mobile machine is made of following steps:
Judge in the content file that receives whether data signature is arranged;
Having under the situation of this data signature, using the root certificate to carry out the authentication of public key certificate;
Under the situation of having carried out authentication, use the disclosure key, decoding is obtained the 1st cryptographic hash by the verify data of secret key encryption;
From the data portion of the described content file that receives, extract predetermined partial data;
This partial data is used hash function, calculate the 2nd cryptographic hash;
Judge whether the described the 1st and the 2nd cryptographic hash is consistent; With
Under the situation of unanimity, the service of regulation is provided, under inconsistent situation, do not provide the service of this regulation.
11, a kind of content file wright authentication mode is characterized in that:
At mobile pusher side, whether checking has given the verify data of the information issuing of being known by content file wright only in the content file of obtaining,
Under the situation that this checking is set up, this content file is provided the service of regulation.
12, content file wright authentication mode according to claim 11 is characterized in that:
The information that described only content file wright knows is secret information and arithmetic expression, described mobile pusher side uses this secret information and arithmetic expression, according to the described content file of obtaining, generates verify data, by comparing, carry out described checking with the verify data of giving to this content file.
13, a kind of content file wright authentication mode is characterized in that:
Content file wright side direction content file is given the verify data of the information issuing of being known by content file wright only,
Whether mobile pusher side checking has given described verify data in the content file of obtaining, under the situation that this checking is set up, this content file is provided the service of regulation.
14, content file wright authentication mode according to claim 13 is characterized in that:
The information that described only content file wright knows is secret information and arithmetic expression, described mobile pusher side uses this secret information and arithmetic expression, according to the described content file of obtaining, generates verify data, by comparing, carry out described checking with the verify data of giving to this content file.
15, according to claim 13 or 14 described content file wright authentication modes, it is characterized in that:
The information that mobile pusher side keeps described only content file wright to know in advance.
16, a kind of content file wright authentication procedure of mobile machine is made of following steps:
Whether judgement has given verify data in the content file that receives;
Under the situation of having given this verify data, the secret information that uses content file wright only to know carries out the regulation computing to content file, generates verify data;
Whether judgement gives to the verify data of the described content file that receives consistent with the verify data of described generation; With
Under the situation of unanimity, the service of regulation is provided, under inconsistent situation, do not provide the service of this regulation.
CNB2004100005020A 2003-01-08 2004-01-08 Identification mode of contents file producer and its program Expired - Fee Related CN1312620C (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
JP2135/2003 2003-01-08
JP2003002135 2003-01-08
JP422792/2003 2003-12-19
JP2003422792A JP2004234641A (en) 2003-01-08 2003-12-19 Method for authenticating contents file producer, and program thereof

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN 200510127466 Division CN1783139A (en) 2003-01-08 2004-01-08 Identification modes of content file producer and its method

Publications (2)

Publication Number Publication Date
CN1517827A true CN1517827A (en) 2004-08-04
CN1312620C CN1312620C (en) 2007-04-25

Family

ID=32964612

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004100005020A Expired - Fee Related CN1312620C (en) 2003-01-08 2004-01-08 Identification mode of contents file producer and its program

Country Status (2)

Country Link
JP (1) JP2004234641A (en)
CN (1) CN1312620C (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008151575A1 (en) * 2007-06-14 2008-12-18 Zte Corporation A method and a system for transmitting encrypted control message based on the mobile multimedia broadcast
CN101031923B (en) * 2004-09-30 2010-09-01 诺基亚公司 Method, device and computer program product for activating the right of use of at least one secured content item
CN101296148B (en) * 2008-06-26 2011-01-05 蓝汛网络科技(北京)有限公司 Verification method, system and device for validity of multimedia contents
CN102457380A (en) * 2010-10-15 2012-05-16 英飞凌科技股份有限公司 Data transmitter with a secure and efficient signature
CN103699610A (en) * 2013-12-13 2014-04-02 乐视网信息技术(北京)股份有限公司 Method for generating file verification information, file verifying method and file verifying equipment
CN105429934A (en) * 2014-09-19 2016-03-23 腾讯科技(深圳)有限公司 HTTPS connection verification method and device
CN112513849A (en) * 2018-07-31 2021-03-16 日本电信电话株式会社 Information processing apparatus, authentication method, and authentication program
CN113255008A (en) * 2021-07-01 2021-08-13 支付宝(杭州)信息技术有限公司 Method and system for outputting multimedia file

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4901164B2 (en) * 2005-09-14 2012-03-21 ソニー株式会社 Information processing apparatus, information recording medium, method, and computer program
KR101356736B1 (en) * 2007-01-19 2014-02-06 삼성전자주식회사 Contents providing apparatus and method and contents using apparatus and method for checking integrity of contents, and contents providing apparatus and method for revocating contents using apparatus
WO2013130281A1 (en) 2012-02-29 2013-09-06 Altnet, Inc. Stream recognition and filtering

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH07221751A (en) * 1994-02-07 1995-08-18 Nippon Telegr & Teleph Corp <Ntt> Digital information copying method and its device
FR2717286B1 (en) * 1994-03-09 1996-04-05 Bull Cp8 Method and device for authenticating a data medium intended to allow a transaction or access to a service or a place, and corresponding medium.
JP3540511B2 (en) * 1996-06-18 2004-07-07 株式会社東芝 Electronic signature verification device
JP2915904B2 (en) * 1997-07-07 1999-07-05 松下電器産業株式会社 Data control method, data control information embedding method, data control information detection method, data control information embedding device, data control information detection device, and recording device
JP3492265B2 (en) * 1999-10-29 2004-02-03 ボーダフォン株式会社 Message communication system by digital radio telephone
JP2001307427A (en) * 2000-04-26 2001-11-02 Pioneer Electronic Corp Device and method for information distribution and medium and device for information recording
WO2001084282A2 (en) * 2000-04-28 2001-11-08 Nokia Corporation Method and terminal device for preventing unauthorized use of secured content files
JP2002023769A (en) * 2000-07-03 2002-01-25 Ntt Docomo Inc Method and system for distributing contents
JP2002176403A (en) * 2000-12-06 2002-06-21 Kddi Corp Mobile terminals collecting contents distributed in broadcasting way and system including the terminals
JP2002244552A (en) * 2001-02-13 2002-08-30 Sony Corp Information reproducing device, information reproducing method, and information recording medium and program storage medium
JP4103340B2 (en) * 2001-05-08 2008-06-18 株式会社日立製作所 Digital signature display device
JP3846230B2 (en) * 2001-06-18 2006-11-15 日本ビクター株式会社 Content information authentication playback device

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101031923B (en) * 2004-09-30 2010-09-01 诺基亚公司 Method, device and computer program product for activating the right of use of at least one secured content item
WO2008151575A1 (en) * 2007-06-14 2008-12-18 Zte Corporation A method and a system for transmitting encrypted control message based on the mobile multimedia broadcast
US8306223B2 (en) 2007-06-14 2012-11-06 Zte Corporation Method and a system for transmitting encrypted control message based on mobile multimedia broadcast
CN101296148B (en) * 2008-06-26 2011-01-05 蓝汛网络科技(北京)有限公司 Verification method, system and device for validity of multimedia contents
CN102457380A (en) * 2010-10-15 2012-05-16 英飞凌科技股份有限公司 Data transmitter with a secure and efficient signature
CN103699610A (en) * 2013-12-13 2014-04-02 乐视网信息技术(北京)股份有限公司 Method for generating file verification information, file verifying method and file verifying equipment
CN105429934A (en) * 2014-09-19 2016-03-23 腾讯科技(深圳)有限公司 HTTPS connection verification method and device
CN105429934B (en) * 2014-09-19 2019-07-19 腾讯科技(深圳)有限公司 Method and apparatus, readable storage medium storing program for executing, the terminal of HTTPS connectivity verification
CN112513849A (en) * 2018-07-31 2021-03-16 日本电信电话株式会社 Information processing apparatus, authentication method, and authentication program
CN113255008A (en) * 2021-07-01 2021-08-13 支付宝(杭州)信息技术有限公司 Method and system for outputting multimedia file

Also Published As

Publication number Publication date
CN1312620C (en) 2007-04-25
JP2004234641A (en) 2004-08-19

Similar Documents

Publication Publication Date Title
CN110493197B (en) Login processing method and related equipment
CN109359691B (en) Identity verification method and system based on block chain
US20030126432A1 (en) Content authentication for digital media based recording devices
EP1622301B1 (en) Methods and system for providing a public key fingerprint list in a PK system
US8689300B2 (en) Method and system for generating digital fingerprint
CN111628868A (en) Digital signature generation method and device, computer equipment and storage medium
FR3054905B1 (en) KEY GENERATION METHOD AND ACCESS CONTROL METHOD
CA2555322C (en) One way authentication
CN110719173B (en) Information processing method and device
US20020073310A1 (en) Method and system for a secure binding of a revoked X.509 certificate to its corresponding certificate revocation list
CN1350669A (en) Method and device for authenticating a program code
CN1937492A (en) Information processing device and controlling method thereof
US7606768B2 (en) Voice signature with strong binding
CN109714370B (en) HTTP (hyper text transport protocol) -based cloud security communication implementation method
CN1517827A (en) Identification mode of contents file producer and its program
US20080104403A1 (en) Methods and apparatus for data authentication with multiple keys
US20030221109A1 (en) Method of and apparatus for digital signatures
JP2010068527A (en) Authentication method of content file producer
EP1349346A2 (en) Authenticated file loader
CN109670289B (en) Method and system for identifying legality of background server
CN111770081B (en) Role authentication-based big data confidential file access method
CN115604034A (en) Encryption and decryption method and system for communication connection and electronic equipment
CN112231662B (en) SM2 algorithm-based two-dimensional code registration authentication method and system
CN113872769B (en) Device authentication method and device based on PUF, computer device and storage medium
EP1439662A1 (en) Information processing apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20070425

Termination date: 20130108

CF01 Termination of patent right due to non-payment of annual fee