CN1684407A - Marking data and marked data flow statistics - Google Patents
Marking data and marked data flow statistics Download PDFInfo
- Publication number
- CN1684407A CN1684407A CN 200410155078 CN200410155078A CN1684407A CN 1684407 A CN1684407 A CN 1684407A CN 200410155078 CN200410155078 CN 200410155078 CN 200410155078 A CN200410155078 A CN 200410155078A CN 1684407 A CN1684407 A CN 1684407A
- Authority
- CN
- China
- Prior art keywords
- data
- identification data
- sign
- identification
- circulation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Telephonic Communication Services (AREA)
Abstract
Standard identifications are added on specific data (digital audio, vide, documentations, pictures, short messages, cell phone rings and programs) then are integrated into identification data, which enter into the network for circulation, the monitor system of a related server monitors the identification data according to the identification of the data to calculate the circulation characters of flow, path etc. of said data.
Description
Technical field the present invention relates to the technical method in a kind of digital information field.
Background technology is in today that digital information is popularized day by day, mass data, comprise the data that relate to right owner's interests as: digitized audio, video, document, picture, program etc. circulate arbitrarily by network, and right owner's interests of data are difficult to be guaranteed.Management and rights protection to the data circulation become the problem that needs solution.Existing scheme has plenty of interpolation right owner sign on data, to warn inappropriate usage behavior, plays the effect of proof owner identity when right is subjected to invading.Also have plenty of data done encryption, have only obtain the related right permission after, could normally use enciphered data.These methods all can't get the current intelligence of primary data, thereby can't reach the purpose of management and rights protection by the statistics to current intelligence.
Summary of the invention the objective of the invention is to solve management and the rights protection problem of discussing in the background technology to the data circulation, and a kind of solution is provided.
The objective of the invention is to reach: go up the sign of adding standard at particular data (digitized audio, video, document, picture, communication short message, ringing sound of cell phone, program etc.), be integrated into identification data by following measure.Identification data enters network (the Internet and various communication system) circulation, and the monitoring system of respective server monitors identification data according to the sign of identification data, counts the circulation features such as flow, path of these data.
Identification data has following characteristics: 1, and being identified in the application corresponding of identification data is unique, the data of same sign possess same content.2, identification data is after duplicating, transmitting transmission, and sign still keeps.3, when identification data enters the network circulation, can monitor identification data according to sign.
According to the requirement of using, identification data can also possess such characteristics: have only the process of circulation through the identification data that monitoring system statistics back obtains, just can normally use, otherwise identification data can't normally use.
Appended drawings is an enforcement schematic diagram of the present invention.The 1st, network (the Internet and various communication network) server, the 2nd, fixed network terminal, the 3rd, wireless network terminal.A, B, C are original data (digitized audio, video, document, picture, communication short message, ringing sound of cell phone, program etc.), initial data is added sign in diverse network terminal or webserver place, become identification data Ak, Bk, Ck, when identification data circulates on network, because the sign that self has can be discerned by the webserver, so the current intelligence of these identification datas in network can come out such as flow, path etc.
Embodiment
Embodiment 1
Between mobile telephone equipment, send picture, audio file.In this routine mileage certificate is exactly digitized picture, audio file.On original picture, audio file, add sign with specific encoder, indicated right owner's information (copyright information) and the unique numbering of file in the sign.When sending between mobile telephone equipment, corresponding server monitors the sign of identification data to identification data (being sign picture, identification audio in this example), and the current intelligence statistic record of these identification datas is got off.
In this example, the statistic record of identification data current intelligence can prove the situation that data (picture, music) are used.
As required, encoder has encryption function simultaneously in the sign that picture, audio file are added.Have only the mobile telephone equipment of use to download identification data from server, the server monitoring record is after this process of circulation, and the decoder that server just notifies mobile telephone equipment to carry is deciphered identification data, and could normally use picture or audio file this moment.When mobile telephone equipment when other mobile telephone equipment is transmitted this identification data, identification data is encrypted again, has only the target mobile telephone equipment to receive this identification data, the server monitoring record just repeats the deciphering behavior once more after the process of circulation.
Embodiment 2
Content is subjected to the sending and receiving short messages of rights protection.Sending and receiving short messages is many Wireless Telecom Equipments functions that arrive commonly used.Short message all has certain content, and the welcome short message of content is often transmitted without limit.The content author who has has the right to protect requirement; for example article, news etc.; on such short message, add sign and become identification data; identification data (sign short message) is in repeating process; corresponding server monitors the sign of identification data; the current intelligence of these identification datas (sign short message) is come out, as the record of these short message operating positions.
Claims (3)
1. the statistical method to the network data current intelligence is characterized in that adding sign on data, is integrated into identification data, comes the current intelligence of statistics in network according to the sign of identification data then.
2. the identification data of mentioning according to claim 1 has following characteristics: a, and being identified in the application corresponding of identification data is unique, and the data of same sign possess same content; B, identification data are after duplicating, transmitting transmission, and sign still keeps; When c, identification data enter the network circulation, can monitor identification data according to sign;
3. according to the requirement of using, claim 1,2 identification datas of being mentioned can also possess such characteristics: have only the process of circulation through the identification data that the statistics back obtains, just can normally use, otherwise identification data can't normally use.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200410155078 CN1684407A (en) | 2004-04-13 | 2004-04-13 | Marking data and marked data flow statistics |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200410155078 CN1684407A (en) | 2004-04-13 | 2004-04-13 | Marking data and marked data flow statistics |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1684407A true CN1684407A (en) | 2005-10-19 |
Family
ID=35263551
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200410155078 Pending CN1684407A (en) | 2004-04-13 | 2004-04-13 | Marking data and marked data flow statistics |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1684407A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101340449B (en) * | 2008-08-15 | 2011-09-14 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal and method for obtaining network access information |
-
2004
- 2004-04-13 CN CN 200410155078 patent/CN1684407A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101340449B (en) * | 2008-08-15 | 2011-09-14 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal and method for obtaining network access information |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20050033700A1 (en) | Method and apparatus for creating and rendering an advertisement | |
CN1846426A (en) | Digital content acquisition and distribution in digitial right management enabled communication device and its method | |
CN101491078A (en) | Method, apparatus and system for secure distribution of content | |
CN101444119A (en) | System for implementing security police on mobile communication equipment | |
KR20040106439A (en) | Multimedia messaging method and system using watermarks | |
EP2925007A1 (en) | Information processing device and information processing method | |
US20060080740A1 (en) | Adapting protected content for a receiving terminal | |
CN101227692A (en) | Content management system of synthesis operational management platform and implementing method thereof | |
WO2003040898A1 (en) | An arrangement and a method for content policy control with a trusted environment in a multimedia messaging system | |
AU2010353927B2 (en) | Information Transmission Method, System and Data Card | |
CN1661962A (en) | Information-processing apparatus, information-processing method, and computer program | |
CN1875600A (en) | Method for transferring encrypted useful data objects | |
CN1684407A (en) | Marking data and marked data flow statistics | |
WO2011112048A2 (en) | Method and apparatus for reporting audience measurement in content transmission system | |
EP1724699A1 (en) | Method and system for gradually degrading the quality of digital content in a DRM system | |
US8843980B1 (en) | Network-based video source authentication | |
CN101729750A (en) | Implementation method and device of encryption self-adaptation of various digital copyrights in set top box | |
CN101437198A (en) | Method, system and apparatus for publishing data | |
CN103002322A (en) | Method and device for providing relevant information of non-authorized content for subscribers | |
US20090144832A1 (en) | Method for protecting content and method for processing information | |
Potdar et al. | Visibly invisible: Ciphertext as a steganographic carrier | |
CN101990115A (en) | Method for realizing enhanced mobile phone digital content copyright technology | |
CN103516909A (en) | Call prompt method and mobile terminal | |
EP2263358B1 (en) | Telecommunication system | |
US20080025495A1 (en) | Method and System for Securing Scrambled Data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |