KR20160079505A - Device and Method for protecting Copyright using Certification Information of electronic book - Google Patents

Device and Method for protecting Copyright using Certification Information of electronic book Download PDF

Info

Publication number
KR20160079505A
KR20160079505A KR1020140190981A KR20140190981A KR20160079505A KR 20160079505 A KR20160079505 A KR 20160079505A KR 1020140190981 A KR1020140190981 A KR 1020140190981A KR 20140190981 A KR20140190981 A KR 20140190981A KR 20160079505 A KR20160079505 A KR 20160079505A
Authority
KR
South Korea
Prior art keywords
client
authentication information
authentication
electronic book
server
Prior art date
Application number
KR1020140190981A
Other languages
Korean (ko)
Inventor
장승주
김성진
Original Assignee
동의대학교 산학협력단
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 동의대학교 산학협력단 filed Critical 동의대학교 산학협력단
Priority to KR1020140190981A priority Critical patent/KR20160079505A/en
Publication of KR20160079505A publication Critical patent/KR20160079505A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The apparatus for protecting a copyright by using certification information of an electronic book according to an embodiment of the present invention includes: an electronic book that stores an electronic file which is to be used and stores unique certificate information; a client that is executed as a call function during execution of the electronic book, read certification information of the electronic book, transmits the certificate information to the outside, and receives a comparison result value of the certificate information transmitted to the outside; and a server that compares the certificate information sent by the client and certificate information stored in advance and transmits whether the two certificate information value coincide with each other, to the client. The client can control execution and ending of the electronic book according to the certificate information comparison result value of the server, thereby preventing illegal copy and reading of an electronic book of a malicious user by using certificate information stored through communications between the client inserted into the electronic book and the server.

Description

BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to an electronic book,

The present invention relates to a copyright protection apparatus and method using authentication information of an electronic book, and more particularly, to a copyright protection apparatus and method using authentication information of an electronic book stored in each of a client and a server inserted in an electronic book .

Electronic books are contents that are distributed online through the Internet in the form of digitized publications. Recently, the e-book market is showing signs of success in the e-book service market based on the Kindle of the US Amazon, and is entering full-fledged growth, including the launch of Google's e-book business, Apple's iPad launch, .

As a result, the importance of technical protection measures for copyright protection of e-books has become very high, and security technology is another key technology for e-book security. If security technology issues are not resolved, digital content will lose value as a commodity, making illegal distribution very easy.

Digital rights management (DRM), digital watermarking, and DOI (digital object identifier) are frequently mentioned as security methods in the e-book industry.

First, DRM (Digital Rights Management) is a technology that protects and manages the rights and interests of content-related parties by safely protecting digital contents using encryption technology.

Second, digital watermarking is a technique that can prevent illegal copying, protect intellectual property and copyright, and claim ownership by inserting user's ID, which is called watermark, It is a technique to provide evidence.

Third, DOI (Digital Object Identifier) is designed to solve problems such as "existing identification system (ISBN, ISSN, URL)" and to have an effective management system of digital works, authors and copyright protection. It is possible to manage all of the above intellectual property, link intellectual property rights holders and users (move to the final information location), and realize essential elements and automatic copyright management in the electronic commerce process of digital information.

Although there are techniques and techniques for protecting various e-book copyrights, it is inconvenient or complicated to use, and a lot of additional costs for copyright protection when using e-books can be a factor inhibiting the activation of e-books.

Korean Patent Publication No. 10-2014-0063006

"Management Framework for Preventing Illegal Distribution of PDF Scanned Files", Journal of the Korea Institute of Information Security, Vol.23, No.5, pp.897-907, 2013. 10. "A Study on ePub-based Standard Framework to Support Interoperability of DRM in e-book", Journal of The Institute of Electronics, Information and Communication Engineers, Vol.11, No.6, pp.235-245, 2010. Kim, Kyeong-il, Kim, Tae-hyun, and Cho, Sung-hwan, "A Study on the Partial Viewing Control Method of ePUB-based Electronic Book DRM", The Korean Journal of Internet Broadcasting, Vol.12, No.1, pp.249-256, 2012.

An object of the present invention is to provide a method and system for preventing unauthorized copying and reading of an e-book of a malicious user by using authentication information stored in each of a client and a server inserted in an electronic book, Protection device and method.

An apparatus for copyright protection using authentication information of an electronic book according to a temporary example of the present invention includes an electronic book storing an electronic file to be used and storing unique authentication information; A client which is executed as a calling function when an electronic book is executed and reads the authentication information of the electronic book, transmits the authentication information to the outside when communicating with the outside, and receives a comparison result value of the externally transmitted authentication information; And a server for comparing the authentication information sent from the client with the previously stored authentication information and transmitting to the client whether the two authentication information values are identical to each other, It is possible to control the execution and termination of the e-book.

The client can be inserted into the electronic book by TCP communication with the server.

The authentication information may include at least one of ID authentication, password authentication, IP authentication, and GUID authentication.

When the authentication information includes the ID authentication and the password authentication, the password authentication can be performed when the client performs the ID authentication.

In the case of the IP authentication, IP authentication information must be stored in advance in the server, and the electronic book can be executed when the IP authentication information and the IP of the electronic device connected to the electronic book coincide with each other.

In the case of the GUID authentication, the GUID value is automatically generated when the client is first executed and can be stored in the client.

A copyright protection method using authentication information of an electronic book according to a temporal example of the present invention includes: (a) calling a client when executing an electronic book; (B) the client transmitting authentication information of the electronic book to the server; (C) comparing the authentication information received from the client with the stored authentication information, and transmitting the matching result value to the client; And (d) continuing execution of the electronic book if the client matches the two pieces of authentication information, and controlling termination of the electronic book if the client does not match.

It is possible that the copyright protection method further includes inserting a client into the electronic book before the client calling step.

The authentication information may include at least one of ID authentication, password authentication, IP authentication, and GUID authentication.

When the authentication information includes the ID authentication and the password authentication, the password authentication can be performed when the client performs the ID authentication.

In the case of the IP authentication, IP authentication information must be stored in advance in the server, and the electronic book can be executed when the IP authentication information and the IP of the electronic device connected to the electronic book coincide with each other.

In the case of the GUID authentication, the GUID value is automatically generated when the client is first executed and can be stored in the client.

In the step (d), when the two pieces of authentication information match, the client receives a message that the two pieces of authentication information match from the server, and it is possible to control the subsequent steps of the e-book.

In step (d), when the two pieces of authentication information do not match, the client receives a message that the two pieces of authentication information are inconsistent from the server, and ends the e-book.

The apparatus and method for copyright protection using the authentication information of the electronic book according to the embodiments of the present invention can prevent unauthorized duplication of the malicious user's electronic book by using the authentication information stored in each of the clients and the server, , Viewing and so on.

1 is a block diagram of a copyright protection apparatus using authentication information of an electronic book according to an embodiment of the present invention,
2 is a flowchart of a copyright protection method using authentication information of an electronic book according to an embodiment of the present invention,
3 shows a structure of an e-book (ePub) applied to an embodiment of the present invention,
4 illustrates contents of an authentication information file stored in a server according to an embodiment of the present invention,
FIG. 5 illustrates authentication information input through a client according to an embodiment of the present invention,
FIG. 6 illustrates a message generated in a server when a client is executed according to an embodiment of the present invention,
FIG. 7 illustrates values transmitted to a server by the authentication information input through the client according to an embodiment of the present invention.
8 and 9 illustrate a case where the authentication information transmitted from the client and the authentication information stored in the server coincide with each other according to the embodiment of the present invention,
FIG. 10 shows a screen displaying a message informing that the e-book has ended when the authentication information transmitted from the client and the authentication information stored in the server are inconsistent according to the embodiment of the present invention.

The following embodiments are a combination of elements and features of the present invention in a predetermined form. Each component or characteristic may be considered optional unless otherwise expressly stated. Each component or feature may be implemented in a form that is not combined with other components or features. In addition, some of the elements and / or features may be combined to form an embodiment of the present invention. The order of the operations described in the embodiments of the present invention may be changed. Some configurations or features of certain embodiments may be included in other embodiments, or may be replaced with corresponding configurations or features of other embodiments.

Embodiments of the present invention may be implemented by various means. For example, embodiments of the present invention may be implemented by hardware, firmware, software, or a combination thereof.

For a hardware implementation, the method according to embodiments of the present invention may be implemented in one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs) , Field programmable gate arrays (FPGAs), processors, controllers, microcontrollers, microprocessors, and the like.

In the case of an implementation by firmware or software, the method according to embodiments of the present invention may be implemented in the form of a module, a procedure or a function for performing the functions or operations described above. The software code can be stored in a memory unit and driven by the processor. The memory unit may be located inside or outside the processor, and may exchange data with the processor by various well-known means.

Throughout the specification, when a part is referred to as being "connected" to another part, it includes not only a case directly connected but also a case where the part is electrically connected with another part in between. In addition, when a part includes an element, it means that the element may include other elements, not excluding other elements, unless specifically stated otherwise.

It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory and are intended to provide further explanation of the invention, and are not intended to limit the scope of the invention.

In the present invention, authentication information of an e-book is used to protect e-book copyright. The authentication information is accessed through ID, password, and IP using the information of the electronic book, and the electronic book is identified by GUID authentication. A user who does not satisfy the authentication information condition determines that the e-book can not be used.

Authentication information controls the execution and termination of e-books through server and client communication. Create and manage certificates on the server with TCP socket communication. The client is inserted into the e-book using an e-book production tool, and the client functions together with the e-book call function when the e-book is executed. The executed e-book and the client confirm the authentication information. When the client is executed in the electronic book, the client inputs the authentication information input message, and the client inputs the authentication information to the server. The client authentication information received from the server is compared with the authentication information stored in advance in the server to see whether it matches or is inconsistent. The server receives the result of authentication success or authentication failure as a character, and when a match is found, it sends the matching value back to the client and sends a message that it is available. However, the authentication information sent from the client is compared with the authentication information stored in advance in the server. If the authentication information is inconsistent, the result is sent back to the client, the inconsistency result received from the client is sent to the inconsistent message using the output statement, The ePub and the client are terminated. According to the e-book copyright protection algorithm proposed by the present invention, when an unauthorized user illegally uses an e-book, the operation of executing and terminating the e-book is proceeded so that an illegal user who does not have the right to use the e-book can not read the e-book, Copying, browsing, etc. can be prevented.

Hereinafter, a related art used to implement a copyright protection apparatus and method using authentication information of an electronic book according to an embodiment of the present invention will be briefly described.

Basically, eBook ePub (electronic publication), which is a typical electronic book, is an internal electronic book and document structure using XHTML or DTBook (XML standard created by DAISY consortium), CSS To create the frame and format of the document. Use XML for lists, table forms, and ePub metadata. Controls eBook ePub using TCP socket communication.

TCP Server - The client's operating principle is that the server creates a socket and then waits for the client to connect. At this time, the socket used by the server is combined with a specific port number so that only clients connecting to this port number can receive it. The client then connects to the server. At this time, packet exchange occurs for connection establishment at the TCP protocol level.

When a TCP connection is made, three packets are exchanged and called SYN, SYN / ACK, and ACK, respectively. When the TCP protocol level connection procedure is completed, the server creates a new socket that can be associated with the connecting client. Using this socket, the server sends and receives data to and from the client. Existing sockets continue to use to accommodate new client connections. The state after two clients are connected is used for communicating with a client connecting two sockets with three sockets in the server. TCP Server - When a client communicates in a general form, it can be seen that the server side socket and the client side socket correspond one to one. Like 'TCP client #n', one client can connect to the server using more than one socket.

Hereinafter, an apparatus and method for protecting copyright using authentication information of an electronic book according to an embodiment of the present invention will be described with reference to the accompanying drawings.

FIG. 1 is a block diagram of a copyright protection apparatus using authentication information of an electronic book according to an embodiment of the present invention, and FIG. 2 is a flowchart of a copyright protection method using authentication information of an electronic book according to an embodiment of the present invention .

FIG. 3 shows the structure of an ePub applied to an embodiment of the present invention. FIG. 4 shows contents of an authentication information file stored in a server according to an embodiment of the present invention. FIG. 6 illustrates a message generated in a server when a client is executed according to an embodiment of the present invention, and FIG. 7 illustrates a message generated in a server according to an embodiment of the present invention. 8 and 9 illustrate a case where the authentication information transmitted from the client and the authentication information stored in the server coincide with each other according to the embodiment of the present invention, FIG. 10 is a diagram illustrating an example of a case where the authentication information transmitted from the client and the authentication information stored in the server are inconsistent according to the embodiment of the present invention, It shows a screen displaying the message.

Referring to FIG. 1, a copyright protection apparatus 100 using authentication information of an electronic book according to an embodiment of the present invention includes an electronic book 130 storing an electronic file to be used and storing unique authentication information, A client (120) that is executed by a calling function when an electronic book (130) is executed and acquires authentication information of an electronic book, transmits the authentication information to the outside when communicating with the outside, and receives a comparison result value of the externally transmitted authentication information, And a server 110 for comparing the authentication information sent from the client 120 with the authentication information previously stored in the server 110 and transmitting to the client 120 whether the two authentication information values match.

The client 120 preferably controls execution and termination of the electronic book 130 according to the comparison result of the authentication information of the server 110 and is inserted into the electronic book 130 by TCP communication with the server 120 (S110).

The authentication information may include at least one of ID authentication, password authentication, IP authentication, and GUID authentication.

When the authentication information includes the ID authentication and the password authentication, the password authentication is performed when the client performs the ID authentication.

In the case of the IP authentication, IP authentication information must be stored in advance in the server, and when the IP authentication information and the IP of the electronic device connected to the electronic book coincide with each other, the electronic book is executed. Here, the electronic device may be a PC, a tablet, or the like that executes an electronic book.

In case of the GUID authentication, the GUID value is automatically generated when the client 120 is executed for the first time and is stored in the client 120.

Hereinafter, a copyright protection apparatus and method using authentication information of an electronic book according to an embodiment of the present invention will be described in detail with reference to FIGS. 1 to 10. FIG.

Referring to FIG. 3, the structure of an electronic book (ePub) used in an embodiment of the present invention has a structure similar to that of HTML and proceeds in the order of structure at the time of execution. It consists of DOCTYPE and html tags and has head and body tags in html tags. The head tag contains the title, meta information, and CSS, and the body tag contains the content. In an embodiment of the present invention, client information is called from an ePub and ePub is controlled through authentication information.

In order to protect the copyright of the ePub, a client is inserted into the electronic book using TCP socket communication (S110), and the execution and termination of the electronic book are controlled.

The client 120 transmits data on the authentication information of the electronic book 130 to the server 110 and the server 110 compares the authentication information received from the client 120 with the previously stored authentication information. When the two pieces of authentication information match, the server 110 sends the comparison result to the client 120 again, and the client determines whether the electronic book can be browsed or not based on the comparison result sent from the server.

When the data received from the server and the stored authentication information are inconsistent, the result value is sent back to the client, and the discontinuity function is used to terminate the e-book ePub and terminate the client.

3 is a copyright protection structure diagram using authentication information of an e-book (ePub). The electronic book 130 inserts a client call function to call the client 120. S110 The electronic book 130 accesses the client 120 by calling and the client 120 receives a call and waits State. If the server 110 is ready, the client 120 in the standby state wakes up, and the client 120 and the server 110 communicate with each other (S130).

Then, the server confirms the status of the authentication information stored in the server 110.

Authentication information includes ID authentication, password authentication, IP authentication, and GUID authentication. The file storing the authentication information is opened and compared with the authentication information sent from the client 120 (S140). The server 110 returns the authentication result and the authentication result message is received by the client 120 (S150).

If it is determined in step S160 that the ePub file can be used as a result of the comparison, the client 120 transmits a message " ePub file may be used " to the client 120 in step S170. Quot; file unavailable " to the client 120 (S190). If the value returned from the server 110 is available, the ePub proceeds to the next step (S180). If the value is not available, the e-book 130 displays a message " (S200), and then the program is terminated.

Authentication Information Contents ID authentication And authenticates the ID stored in the server with the client ID of the e-book. Password authentication When the ID authentication is completed on the client, password authentication is performed. IP Authentication The IP authentication information stored in the server must be present, and the ePub ePub and the client program on the PC with the IP will run normally. However, if the IP authentication information stored in the server and the IP of the PC are inconsistent, ePub eBooks will be terminated. GUID Authentication A globally unique identifier (GUID) is a pseudo-random number used in the application software, but there is no guarantee that a GUID will always be unique when it is created, but because the number of all possible values is large, The possibility is very small. In this paper, authentication information is used as a part of GUID, that is, 23 random numbers. The GUID authentication information is automatically generated when the first client is executed, and stored in the client text. If you lose your GUID, you should contact the server or renew it.

[Table 1] List of authentication information

In terms of security, there are password guessing attacks and retransmission attacks. The password guessing attack eavesdrops on the user's message, stores the message in his memory device, guesses the password of the attackee, and verifies the guess using the stored message. A replay attack is an attack in which an attacker saves a message in which a user communicated with the server in a past session, and then retransmits the message in a subsequent session to be authenticated by the server.

In the present invention, authentication information is used as shown in [Table 1] in order to prevent guessing attack. In general, IDs and passwords can be subject to repetitive attacks. However, IP authentication is blocked except for IP registered in the server. If offline, the ePub will be terminated unless an authentication procedure is followed. GUID authentication is a globally unique identifier that is resistant to retransmission attacks. If an attacker eavesdrops on a message sent in the previous login phase on the public network, the user can renew the GUID authentication key value each time he logs in. Because it is GUID authentication that can not be easily memorized, it is saved automatically by the client.

Communication between the server 110 and the client 120 is required for authentication information management. The server 110 needs a file for storing authentication information and transmits the client authentication information of the electronic book 130 to the server via the network 140. [

When a call is received from the client 120 to the server 110, the server 110 opens the authentication information file and compares the authentication information of the previously stored file with the authentication information fetched from the electronic book 130 by the client 120 . If the above two authentication information match, the server 110 transmits a message "ePub e-book file may be used" to the client 120. Conversely, if the two authentication information do not match, the server 110 transmits a message "ePub file unavailable" to the client 120.

4 is a file and a path for storing the authentication information. It is in a text file format and the server 110 reads the file 'authentication.txt' using file I / O. In the implementation of the present invention, ID: 111, password: 222, IP: 127.0.0.1 are set.

FIG. 5 shows a result of inputting authentication information through the client 120. FIG. The client 120 inputs the authentication information to send the authentication information to the server 110. [

When the client 120 is executed, the message shown in FIG. 6 is generated on the server 110 side. The ID, the password and the IP are stored in the server 110, and the GUID information is stored in the client and then transferred to the server 10. Since it is a unique key value, when the loss occurs, the server 110 side must newly update it.

Referring to FIG. 7, authentication information is input to the server 110. Since the authentication information stored in the current server 110 is 'ID: 111' and 'password: 222', it is identical to the information of the server 110, so that the message "ePub e- E-book ePub will be terminated if there is a discrepancy.

8 and 9, the server 110 receives the authentication information transmitted from the client 120 and compares the received authentication information. And the authentication information sent from the client 120 is received from the server 110 and compared with the stored authentication information. The authentication information sent from the client 120 is compared with the authentication information stored in advance in the server 110, and the resultant values for the coincidence and the non-coincidence are shown in FIGS. 8 and 9, respectively.

FIG. 10 shows that when the data comparison between the client 120 and the server 110 is in agreement, the process proceeds to the end, and when the data is inconsistent, the ePub ends.

That is, when the authentication information of the server 110 is compared with the authentication information of the client 120, the e-book 130 (ePub) is terminated when the two authentication information are inconsistent. The ID authentication information stored in the server 110 is '111', but the data sent from the client to the server is '1', which is inconsistent. So "ePub eBook does not match the authentication information." To the client 120, and ends the e-book (ePub). There are passwords, IPs and GUIDs in the same way.

In summary, ePubs are currently used by many people. However, copyright protection problems are increasing every day. Web browsers and viewers themselves do not support digital rights management, which allows copyright holders to control the reproduction and use of content. In order to protect the copyright of the copyright holder, the program developed in this paper developed the client automatically when ePub e-book was executed, and only the authorized user could read the e-book using the authentication information. So that the electronic book can not be carried or distributed in an illegal manner. Currently, web browsers and viewers often do not recognize ePub itself. There are many things that are not yet compatible. In order to solve this problem, the eBook ePub copyright protection program proposed in this paper uses authentication information through server and client, controls ePub eBook, strengthened copyright protection, This makes it possible to protect the copyrights of copyright holders efficiently because it is safe.

It will be apparent to those skilled in the art that various modifications, substitutions and substitutions are possible, without departing from the scope and spirit of the invention as disclosed in the accompanying claims. will be. Therefore, the embodiments disclosed in the present invention and the accompanying drawings are intended to illustrate and not to limit the technical spirit of the present invention, and the scope of the technical idea of the present invention is not limited by these embodiments and the accompanying drawings . The scope of protection of the present invention should be construed according to the following claims, and all technical ideas within the scope of equivalents should be construed as falling within the scope of the present invention. In addition, claims that do not have an explicit citation in the claims may be combined to form an embodiment or included in a new claim by amendment after the application.

110: TCP server
120: Client
130: eBooks
140: Network

Claims (14)

An electronic book storing an electronic file to be used and storing unique authentication information;
A client which is executed as a calling function when an electronic book is executed and reads the authentication information of the electronic book, transmits the authentication information to the outside when communicating with the outside, and receives a comparison result value of the externally transmitted authentication information; And
And a server for comparing the authentication information sent from the client with the previously stored authentication information and transmitting to the client whether the two authentication information values match,
Wherein the client controls execution and termination of the electronic book according to a result of comparison of authentication information of the server.
The method according to claim 1,
Wherein the client is inserted into the electronic book by TCP communication with the server.
The method according to claim 1,
Wherein the authentication information includes at least one of ID authentication, password authentication, IP authentication, and GUID authentication.
The method of claim 3,
Wherein when the authentication information includes the ID authentication and the password authentication, the password authentication is performed when the ID authentication is completed in the client.
The method of claim 3,
Wherein the electronic book is executed when the IP authentication information and the IP of the electronic device connected to the electronic book coincide with each other, The copyright protection device using the authentication information of.
The method of claim 3,
Wherein in the case of the GUID authentication, a GUID value is automatically generated when the client is executed for the first time and is stored in the client.
(A) calling a client when an electronic book is executed;
(B) the client transmitting authentication information of the electronic book to the server;
(C) comparing the authentication information received from the client with the stored authentication information, and transmitting the matching result value to the client; And
(D) continuing execution of the electronic book if the client matches the two pieces of authentication information, and controlling termination of the electronic book in the case of inconsistency;
A copyright protection method using authentication information of an electronic book.
8. The method of claim 7,
Further comprising the step of inserting a client into the electronic book before the step of calling the client.
8. The method of claim 7,
Wherein the authentication information includes at least one of ID authentication, password authentication, IP authentication, and GUID authentication.
10. The method of claim 9,
Wherein when the authentication information includes the ID authentication and the password authentication, the password authentication is performed when the ID authentication is completed in the client.
10. The method of claim 9,
Wherein the electronic book is executed when the IP authentication information and the IP of the electronic device connected to the electronic book coincide with each other, The copyright protection device using the authentication information of.
10. The method of claim 9,
Wherein in the case of the GUID authentication, a GUID value is automatically generated when the client is executed for the first time and is stored in the client.
8. The method of claim 7,
In the step (d)
And if the two pieces of authentication information match, the client receives a message that the two pieces of authentication information match from the server, and controls the subsequent steps of the e-book. .
8. The method of claim 7,
In the step (d)
Wherein if the two pieces of authentication information do not match, the client receives a message indicating that the two pieces of authentication information are inconsistent from the server, and ends the e-book.
KR1020140190981A 2014-12-26 2014-12-26 Device and Method for protecting Copyright using Certification Information of electronic book KR20160079505A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020140190981A KR20160079505A (en) 2014-12-26 2014-12-26 Device and Method for protecting Copyright using Certification Information of electronic book

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020140190981A KR20160079505A (en) 2014-12-26 2014-12-26 Device and Method for protecting Copyright using Certification Information of electronic book

Related Child Applications (1)

Application Number Title Priority Date Filing Date
KR1020170049837A Division KR101793872B1 (en) 2017-04-18 2017-04-18 Device and Method for protecting Copyright using Certification Information of electronic book

Publications (1)

Publication Number Publication Date
KR20160079505A true KR20160079505A (en) 2016-07-06

Family

ID=56502453

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020140190981A KR20160079505A (en) 2014-12-26 2014-12-26 Device and Method for protecting Copyright using Certification Information of electronic book

Country Status (1)

Country Link
KR (1) KR20160079505A (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20140063006A (en) 2012-11-15 2014-05-27 주식회사 디알엠인사이드 Apparatus and method for interoperable compliance test of e-book digital rights management system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20140063006A (en) 2012-11-15 2014-05-27 주식회사 디알엠인사이드 Apparatus and method for interoperable compliance test of e-book digital rights management system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
강호갑, 김태현, 윤희돈, 조성환 "전자책 DRM의 상호호환성을 지원하는 ePub 기반 표준 프레임워크에 관한 연구", 한국인터넷방송통신학회 논문지, Vol.11, No.6, pp.235-245, 2010.
김은범, 김경일, 김태현, 조성환 "ePUB 기반 전자책 DRM의 부분열람 제어 방법에 관한 연구", 한국인터넷방송통신학회 논문지, Vol.12, No.1, pp.249-256, 2012.
이국헌, 정현지, 유대걸, 이상진 "PDF 형식 북스캔 파일 불법 유통 방지를 위한 관리 프레임워크", 정보보호학회논문지, Vol.23, No.5, pp.897-907, 2013. 10.

Similar Documents

Publication Publication Date Title
US10397008B2 (en) Management of secret data items used for server authentication
US10015150B2 (en) Systems and methods for Smartkey information management
US11329962B2 (en) Pluggable cipher suite negotiation
US9973481B1 (en) Envelope-based encryption method
JP6376869B2 (en) Data synchronization system, control method thereof, authorization server, and program thereof
US20190238334A1 (en) Communication system, communication client, communication server, communication method, and program
US20140282840A1 (en) Managing data handling policies
US20140189346A1 (en) License server manager
US20130047264A1 (en) Method and Device for Communicating Digital Content
US10990692B2 (en) Managing data handling policies
US20160315915A1 (en) Method for accessing a data memory of a cloud computer system using a modified domain name system (dns)
JP2010154419A (en) Electronic file transmission method
JP2012137975A (en) Relay processor, control method for the same and program
JP2017152880A (en) Authentication system, key processing coordination method, and key processing coordination program
JP2009060384A (en) System and device for image communication
KR101479290B1 (en) Agent for providing security cloud service, security token device for security cloud service
GB2554082A (en) User sign-in and authentication without passwords
JP2019501592A (en) Improved storage system
KR101793872B1 (en) Device and Method for protecting Copyright using Certification Information of electronic book
CN110807210A (en) Information processing method, platform, system and computer storage medium
KR102288444B1 (en) Firmware updating method, apparatus and program of authentication module
CN112565156B (en) Information registration method, device and system
KR20160079505A (en) Device and Method for protecting Copyright using Certification Information of electronic book
KR101821645B1 (en) Key management method using self-extended certification
US20140282838A1 (en) Managing data handling policies

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
AMND Amendment
E601 Decision to refuse application
E601 Decision to refuse application
E801 Decision on dismissal of amendment
A107 Divisional application of patent