200837601 九、發明說明: 【發明所屬之技術領域】 本發明係關於一種用以限制有害多媒體檔案(例如有害 動一才田案)之使用之方法,更明確而言係有關一當欲使用 . 纟使用者電财的動畫«時,透過搜尋-預建構的有害 動旦DB、一逐使用者黑名單、及/或-逐使用者電子郵件 住址清單,致能更快使用—無害動畫(例如再生),並致能 丨確限制使用一有害動畫;及用於加密在黑名單中註冊的 有害動畫檔案,以致於有害動畫檔案不能使用未安裝根據 本發明的-系統的其他使用者電腦中,藉此避免有害動畫 檔案重新分佈之方法。 【先前技術】 廣泛用來限制在使用者電腦中有害多媒體檔案之使用之 一習知方法係以下列方式實施··一特定供應者或系統藉由 2集在網際網路上分佈的有害多媒體檔案及從有害多媒體 ( 才田案擷取特徵值以建構一有害多媒體db,言亥建構的有害 多媒體DB係安裝在一使用者電腦中,且當其決定使用在 使用者電腦中的-檔案係對應於在安裝的有害多媒體郎 中注冊的一檔案時’可限制檔案之使用。根據此一習知方 - 〇由於僅針對在網際網路上分佈的有害多媒體檔案建構 一DB,所以存在一未在網際網路上分佈或難以收集的有 口夕媒體檔案在無限制之情況下仍可使用之問題。 同夺用於阻斷有害動畫的另一習知方法(例如,在韓 國專利5主冊第胸川⑷號中揭示的一方法)是以搜尋在網 127849.doc 200837601 際網路上分佈的有宝 容擷取有害内容二谷 式實施,以從搜尋的有害内 之全部或一部分的雜、基伯 . 容DB、傳送建 ’、'、、建構一有害内 者電財從欲傳—使用者電腦、在使用 或一部分輯及/或再生(執行的)的播案之全部 db中有害内容的tr、將檔案的雜凑值與在有害内容 容時,停止傳i^勃、值相比較’且當播案對應於有害内 知技術,每案及/或刪除播案。根據此-習 Κ吏用者電腦藉由驅動例 -執打程式來重製(例如) =:再生私式的 一雜凑值,且1視#㈣枯案時’f要從檔案掏取 值盘在右宝的—特殊值’以將該擷取的雜湊 值與在有害内容〇3中的 的雜養 是否對應於在有害内容D”= =較,並決定檔案 知技術’即使在一無害動畫正常再生:!。:外’根據習 待—預定時間週期P + 之别,其必須始終等 栌幸h 吊’在一使用者電腦令再生的動畫 查田二括比有害動畫槽案更多的無害動畫楷案,且益宝動 -檔案的再生頻率係遠高於… 此,每卷WJ ’U虽案的再生頻率。因 動畫。/。 一動畫檔案時’非常無效率搜尋整個有害 根據習知技術,當使用一有害動畫檔案 吏用強制結束例如使用播案的—動 方法、或刪除檔案之方法。當―有^動壹1的一程序之 業服務形式實施時,主要使用::=阻係以商 法+ 便用強制結束一對應程序的方 在此情況中’通常’當1當認證程序已成功完成 —監護人模式或監督者模式)以便檢查存取有害動晝 127849.doc 200837601 檔案的記錄時,允許使用一有害動畫播案。然而,在此情 況中,雖然驗證-有害動畫標案,但是有害動畫槽案未: 使用者電腦刪除,且仍保留在原處。因此,當此未刪除及 保留的有害動畫檔案透過光碟複製等傳送至不配備有—有 - #動畫阻斷功能的另-電腦時,有害動晝檔案可在益任何 . _之情況下❹,因此存在即使-㈣驗料-有害動 旦檔案主動阻斷重新分佈之一限度。 【發明内容】 因此’本發明已可解決域在先前技術中發生的問題, 且本發明提供-驗證方法,用以當一檔案對應於一有害多 媒體枯案時,可更快阻斷在一使用者電腦中使用該播案, 並盡快允許欲使用在使用者電腦中之一無過度時間延遲之 檔案’而當該檔案對應於一有害多媒體檔案時,驗證該檔 案是否係-無害多媒體檔案。同時,本發明提供一用以致 能-中央阻斷系統可主動收集未透過網際網料佈的有害 1 乡媒體檔案’但是存在'使用者電腦中之方法。此外,本 發明提供--旦多媒體檔案在一使用者電腦中被驗證為一 冑害多媒體㈣時’不僅限制或阻斷在使用者電腦中的多 媒體樓案之使用’並使它不能正常使用甚至在另一電腦中 ㈣案,較檔案已傳送給另一電腦,以致於可避免有害 多媒體播案透過網際網路而重新分佈或散佈,#此提供一 安全的網際網路環境之方法。 根據本發明# -怨樣,為限制在與網際網路連接的使用 者電腦中的有害多媒體槽案之使用,提供一種用以限制使 127849.doc 200837601 用一有害多媒體檔案的方法,該方法包括:一有害多媒體 DB建構步驟,其可驗證經由網際網路收集的每個多媒體 檔案是否對應於一有害多媒體檔案;擷取用以識別有害多 媒體檔案的識別符與元資訊;及將該擷取的識別符與元資 訊儲存在一伺服器的DB ; —有害多媒體1)3傳輸步驟,其 可將在有害多媒體DB建構步驟中建構的有害多媒體DB傳 送至一使用者電腦;一逐使用者黑名單建構步驟,其可搜 哥在使用者電腦中的多媒體檔案;將該搜尋的多媒體檔案 與有害多媒體DB相比較;及建構一黑名單,其係該有害 多媒體檔案的清單;及一有害多媒體檔案使用阻斷步驟, 其可將欲在使用者電腦中由使用者使用的一多媒體檔案依 序與逐使用者黑名單和有害多媒體DB相比較,且當多媒 體檔案對應於一有害多媒體檔案時,可阻斷多媒體檔案之 使用,其中逐使用者黑名單建構步驟與有害多媒體檔案使 用阻斷步驟之至少一步驟包括一有害多媒體檔案加密步 驟,其可將有害多媒體檔案加密及儲存在使用者電腦,以 致於避免有害多媒體檔案由不同使用者進行分佈或使用。 根據本發明的另一態樣,該方法進一步包括一在有害多 媒體檔案加密步驟之後,當該加密的有害多媒體檔案欲在 吕理者模式中重製,且通過使用者電腦的一認證程序 時,解密及再生該加密的有害多媒體檔案之步驟。 根據本發明的又另一態樣,該方法進一步包括:一逐使 用者電子郵件住址清單建構步驟,其可透過在使用者電腦 中的多媒體檔案之一搜尋而建構一電子郵件住址清單,其 127849.doc 200837601 係無害多媒體檔案的清單,以及逐使用者黑名單建構+ 驟;及一無害多媒體檔案使用瞬時允許步驟,其中在執行 逐使用者黑名單建構步驟之前,當透過逐使用者電子郵件 住址清單之一搜尋,決定多媒體檔案係一無害多媒體檔案 時,立即允許欲在使用者電腦中使用的一多媒體檔案之使 用0200837601 IX. INSTRUCTIONS: [Technical field to which the invention pertains] The present invention relates to a method for restricting the use of harmful multimedia files (such as a harmful multimedia file), and more specifically to be used as intended. The animation of electricity money «times, through the search - pre-constructed harmful dynamic DB, one-by-user blacklist, and / or - user-by-user email address list, enabling faster use - harmless animation (such as regeneration) And enabling the use of a harmful animation; and for encrypting harmful animation files registered in the blacklist, so that the harmful animation files cannot be used in other user computers that do not have the system according to the invention installed, thereby Avoid ways to redistribute harmful animation files. [Prior Art] A well-known method widely used to limit the use of harmful multimedia files in a user's computer is implemented in the following manner: • A specific provider or system with 2 sets of harmful multimedia files distributed over the Internet and From the harmful multimedia (the talent case draws the feature value to construct a harmful multimedia db, the harmful multimedia DB system constructed by Yanhai is installed in a user's computer, and when it decides to use it in the user's computer, the file system corresponds to When installing a file registered in a harmful multimedia lang, 'the use of the file can be restricted. According to this idiom- 〇 because only one DB is constructed for harmful multimedia files distributed over the Internet, there is one that is not distributed on the Internet. Or it is difficult to collect the problem that the Japanese-language media file can still be used without restriction. Another common method for blocking harmful animations (for example, in Korean Patent No. 5 Main Book No. 2 (2) One method disclosed is to search for the harmful content in the Internet on the network of 127849.doc 200837601. All or part of the harmful, the basics, the basics, the DB, the transmission of the ', ', the construction of a harmful internal money from the desire to pass - the user's computer, in use or part of the compilation and / or regeneration (executed ) the broadcast of all the harmful content of the db, the hash value of the file and the content of the harmful content, stop the transmission of the value of the comparison, and when the broadcast corresponds to the harmful internal knowledge technology, each case and / or delete the broadcast. According to this - the user computer is reproduced by the driver-execution program (for example) =: a hash value of the regenerative private, and 1 (4) when the case is 'f To retrieve the value of the value in the right-handed-special value from the file, to compare the hash value of the captured with the miscellaneous content in the harmful content 〇3 to the harmful content D”==, and determine the file Technology 'even if a normal animation in a harmless animation:!.: outside 'according to the waiting time - the predetermined time period P + , it must always wait for luck h hang 'in a user computer to reproduce the animation of the investigation of the second More harmful animations in the harmful animation slot, and the regeneration frequency of the Epoch-Files is much higher than Therefore, the regenerative frequency of each roll of WJ 'U. Because of the animation. /. An animation file is 'very inefficient to search the entire harmful according to the conventional technology, when using a harmful animation file to force the end, such as using a broadcast case - Method of moving, or deleting a file. When a service form of a program that has a function of 1 is implemented, the main use is: := The resistance is based on the commercial method + the party that is forced to end a corresponding program in this case' Usually, 'When 1 the authentication procedure has been successfully completed—guardian mode or supervisor mode) to check access to the records of the harmful files 127849.doc 200837601, a harmful animation is allowed. However, in this case, Verification - Harmful animation standard, but the harmful animation slot is not: The user's computer is deleted and remains in place. Therefore, when the unremoved and retained harmful animation files are transferred to a computer that is not equipped with the -# animation blocking function by disc copying, etc., the harmful files can be used in any case. Therefore there is a limit to even the - (four) specimen-hazard dynamic archives that actively block redistribution. SUMMARY OF THE INVENTION Therefore, the present invention has solved the problems that the domain has occurred in the prior art, and the present invention provides a verification method for blocking a use in a file when it corresponds to a harmful multimedia case. The broadcast is used in the computer, and the file to be used in one of the user's computers without excessive time delay is allowed as soon as possible. When the file corresponds to a harmful multimedia file, it is verified whether the file is a harmless multimedia file. At the same time, the present invention provides a method for enabling a central blocking system to actively collect harmful media files that are not transmitted through the internet material, but in a 'user' computer. In addition, the present invention provides that when a multimedia file is verified as a harmful multimedia (4) in a user's computer, 'not only restricts or blocks the use of the multimedia building in the user's computer' and makes it not functioning properly or even In another computer (4) case, the file is transferred to another computer, so that harmful multimedia broadcasts can be avoided from being redistributed or distributed through the Internet. #This provides a secure Internet environment. According to the present invention, a method for restricting the use of a harmful multimedia file for 127849.doc 200837601 is provided for limiting the use of harmful multimedia slots in a user computer connected to the Internet, the method comprising : a harmful multimedia DB construction step for verifying whether each multimedia file collected via the Internet corresponds to a harmful multimedia file; extracting identifiers and meta information for identifying harmful multimedia files; and extracting the captured The identifier and the meta information are stored in a DB of the server; the harmful multimedia 1) 3 transmission step, which can transmit the harmful multimedia DB constructed in the harmful multimedia DB construction step to a user computer; a construction step of searching for a multimedia file in a user's computer; comparing the searched multimedia file with a harmful multimedia DB; and constructing a blacklist, which is a list of the harmful multimedia files; and a harmful multimedia file use a blocking step that sequentially and sequentially causes a multimedia file to be used by the user in the user's computer The blacklist is compared with the harmful multimedia DB, and when the multimedia file corresponds to a harmful multimedia file, the use of the multimedia file can be blocked, wherein the user-by-user blacklist construction step and the harmful multimedia file use blocking step are at least one step A harmful multimedia file encryption step is included, which encrypts and stores the harmful multimedia files on the user's computer, so as to prevent harmful multimedia files from being distributed or used by different users. According to another aspect of the present invention, the method further includes, after the harmful multimedia file encryption step, when the encrypted harmful multimedia file is to be reproduced in the mode of the processor and passed an authentication procedure of the user's computer, The step of decrypting and reproducing the encrypted harmful multimedia file. According to still another aspect of the present invention, the method further includes: a user-by-user email address list construction step of constructing an email address list by searching for one of the multimedia files in the user's computer, 127849 .doc 200837601 is a list of harmless multimedia files, and user-by-user blacklist construction + steps; and a harmless multimedia file using the instantaneous permission step, in which the user-by-user email address is used before the user-by-user blacklist construction step is performed One of the checklists, when the multimedia file is determined to be a harmless multimedia file, immediately allows the use of a multimedia file to be used in the user's computer.
根據本發明又另一態樣,該方法進一步包括:一驗證資 料產生與傳輸步驟,其可藉由使用者電腦,從儲存在使用 者電腦中的每個多媒體檔案擷取用於擋案識別的—識別 符,從儲存多媒體檔案之各個擷取一螢幕訊框與元資訊之 至少一者,及傳送該擷取的識別符與一螢幕訊框和元資訊 之至少-者至伺服器;及一有害多媒魏與使用者電腦 更新步驟,其可經由多媒體檔案的驗證資料而驗證儲存在 使用者電腦中的每個多媒體檔案是否對應於—有害多媒體 檔案’其中該認證資料已透過驗證f料產生與傳輸步驟而 從使用者電腦傳送,並根據每個多媒體檔案是否對應於_ 有害多媒體檔案而更新儲存在伺服器中的有害多媒體加 或在儲存使用者電腦中的電子郵件住址清單。 【實施方式】 以下’本發明的示範性具體實施例將參考附圖說明。 百先’根據本發明的一示範性具體實施例之方法之整個 建構將參相1錢步說明。㈣本發明的-示範性具體實 施例,存在用以限制使用—有害多媒體檔案之方法,該方 法包括.—有害多媒體DB建構步驟1〇〇,#可驗證經由網 127849.doc 200837601 際網路收集的每個多媒體檔案是否對應於一有害多媒體檔 案;擷取識別符與元資訊,用以識別有害多媒體槽案;^ 將該擷取的識別符與元資訊儲存在一伺服器的DB ; 一有 害多媒體DB傳輸步驟200,其可將在有害多媒體db建構步 驟中建構的有害多媒體DB傳送給一使用者電腦;一逐使 用者黑名單建構步驟300,其可搜尋在使用者電腦中的多 媒體檔案、將該搜尋的多媒體檔案與有害多媒體DB相比 較、並建構一黑名單,其係該有害多媒體檔案的清單;及 一有害多媒體檔案使用阻斷步驟400,其欲在使用者電腦 中由使用者使用的一多媒體檔案依序與逐使用者黑名單和 有害多媒體DB相比較;且當多媒體檔案對應於有害多媒 體檔案時,可阻斷多媒體檔案之使用,其中逐使用者黑名 單建構步驟300與有害多媒體檔案使用阻斷步驟之至少一 步驟係包括一有害多媒體檔案加密步驟5〇〇,其將有害多 媒體檔案可加密及儲存在使用者電腦中,如此可避免有害 多媒體槽案被不同的使用者進行分佈或使用。 較佳地,如圖1B所示,該方法可進一步包括一有害多媒 體祂案解密/再生步驟600,其在有害多媒體槽案加密步驟 500之後,當加密有害多媒體檔案欲在一管理者模式中重 製時’可解密及重製加密有害多媒體檔案,其已通過使用 者電腦的一認證程序。 更佳地,如圖2所示,該方法可進一步包括:一逐使用 者電子郵件住址清單建構步驟3〇〇w,其可透過在使用者 電腦中的多媒體檔案之一搜尋來建構一電子郵件住址清 127849.doc -12 - 200837601 單其疋無害多媒體檔案的清單;以及逐使用者黑名單建 構v驟300,& &害多媒體檔案使用瞬時允許步驟 4〇〇W’ I中在執行逐使用者黑名單建構步驟之前,當透 使用者電子郵件住址清單之—搜尋,決定多媒體槽案 係一無害多媒體檔案時,立即允許使用在使用者電腦中使 用的一多媒體檔案。 乂下在根據本發明的方法中包括的每個步驟示範性具 體實施例將圖3至5更詳細描述。 首先’-電腦軟體程式(其可為透過—使用者電腦實際 實施本發明之方法的-般構件)係提供給使用者電腦。在 藉由供應者(其建構及提供有害多媒體DB至使用者電腦)操 作的@服器(從使用者電腦觀點的—遠端系、統)建構一有 害多媒體DB的步驟1〇〇中,伺服器可以自動收集或一手動 收集方案而直接收集透過網際網路流通的有害多媒體檔 案,從收集的多媒體稽案建立(或操取)驗證資料,並檢查田 該驗證資料,藉此建構有害多媒體DB,如圖3所示。在2 情況,儲存在有害多媒體DB中的每個檔案的一鑰值包括 從檔案擷取的訊息摘錄值,且一識別符係從一適當的檔案 區域榻取,以便最小化碰撞及達成正確識別。訊息摘^係 一固定長度的一特殊值,其係藉由將一單向雜湊函數應用 到一給定的輸入值而獲得,且係一種總和檢查碼,其可用 來檢查一原始檔案是否被篡改。當一檔案的一識別符、與 MD5、糧心屬⑽等廣泛已知為訊息摘要雜凑函數 時,本發明可使用此訊息摘錄值,其中該等雜凑函數之任 127849.doc 200837601 何一者可用於本發明。 除了伺服器直接收集透過網 案的方法之外,如上述,根據本發明的方 =:步_可包括一方法,其t當根據本發二 法A的一特殊程式在一使用者電腦(例如-PC)中執行 時’特殊程式可從儲存在使用者 夫,么更用者電細中的多媒體檔案(即 ^為有害夕媒體標案的多媒體權案)建立(例如操取)例 =識別符或元資訊的驗證資料,並以即時透過網際網路 :傳:驗證資料,且伺服器可驗證驗證資料,藉此驗證在 使:者電腦中潛在決定為無害多媒體檔案的多媒體檔案是 否實際上係無害的,如圖3所示。 當透過使用者電腦中的有害多媒體Μ歸類為_無害多 媒體播案之一多媒體檔案係根據驗證結果,而驗證為一有 ”案時,伺服器可將目前有害多媒體DB更新成 Γ7可罪度位帛在匕可藉由額外包括一將從使用者電腦榻 取的有害多媒體播案的額外資料記錄在有害多媒體中 之步驟實施,以便在根據本發明具體實施例的每個方法之 v驟中更新有害多媒體DB。即係,此步驟可包括一檔 案使用許可與驗證資料傳輸步驟700、與-有害多媒體DB 和使用者電腦更新步驟卿,如圖5所示。在㈣使用許可 ^驗證資料傳輸步驟700中,使用者電腦可從在使用者電 腦中决疋係無害多媒體檔案的多媒體檔案產生認證資料, 並將该產生的驗證資料傳送至伺服器。在有害多媒體Db 和使用者電腦更新步•驟8〇〇中,伺服器可驗證該接收的驗 127849.doc -14· 200837601 α貝料,當對應於驗證資料的一多媒體檔案係決定為一無 害多媒體檔案時,更新使用者電腦的一電子郵件住址清 單,當對應於驗證資料的一多媒體檔案係決定為一有害多 媒體播案時,藉由將對應資訊新增至有害多媒體db來更 新該有害多媒體DB,並將更新的有害多媒體〇6傳送至使 - 用者電腦,以致於該更新的有害多媒體DB可藉由使用者 電腦下載。由於此,即使未透過網際網路流通的有害多媒 體檔案可記錄在有害多媒體DB。 ζ 根據本發明的一示範性具體實施例,如圖2所示,根據 每一使用者電腦建構一黑名單(B L)與電子郵件住址清單 (WL)的步驟300和3〇〇w可例如以一快取方案實施。在此, t名單(BL)代表存在於使用者電腦中的有害多媒體播案的 /月單,而電子郵件住址清單(WL)代表存在於使用者電腦中 的無害多媒體檔案的清單,且較佳地係,此些清單係在一 雜湊表的資料結構中形成。基於當相較存在於在一使用者 I 電腦中的多媒體檔案總數時,有害多媒體檔案數量係相對 較】本發明知供一用以建構有害多媒體檔案的一黑名 單;建構無害多媒體檔案的一電子郵件住址清單;及在搜 _ 尋有害多媒體DB之前使用這些清單之方法。 •如在圖4和5所示,當一多媒體檔案用於一使用者電腦 時,首先,執行一電子郵件住址清單(WL)搜尋步驟(參見 圖5的參考數字"400W")。在此情況,當多媒體檔案係決定 為在電子郵件住址清單(WL)中包括的—無害多媒體檔案 時’可立即允許使用多媒體檔案,而終止有害多媒體檔案 127849.doc -15· 200837601 使用阻斷程序,藉此致能更快使用無害多媒體槽案。對照 下,關於在電子郵件住址清單中不包括的—多媒體檔案, 多媒體檔案的有害可透過一分離系統程序驗證,即係,藉 由隨後執行一黑名單搜尋步驟(參見圖5的參考數字 "㈣”)’以決目標檔案是否對應於在黑名單(bl)中包 括的-檔案;一檔案加密檢查步驟(參見圖5的參考數字 "420")’以檢查目標檔案本身是否透過一秘鑰予以加密;According to still another aspect of the present invention, the method further includes: a verification data generation and transmission step, wherein the user computer can retrieve the multimedia file from the user's computer for use in the file identification. - an identifier for capturing at least one of a screen frame and meta information from each of the stored multimedia files, and transmitting at least one of the captured identifier and a screen frame and meta information to the server; and The harmful multimedia and user computer update steps can verify whether each multimedia file stored in the user's computer corresponds to a harmful multimedia file via the verification data of the multimedia file, wherein the authentication data has been generated through verification And transmitting from the user's computer with the transmission step, and updating the harmful multimedia stored in the server or the list of email addresses stored in the user's computer according to whether each multimedia file corresponds to the _ harmful multimedia file. [Embodiment] Hereinafter, exemplary embodiments of the present invention will be described with reference to the accompanying drawings. The entire construction of the method according to an exemplary embodiment of the present invention will be described in the accompanying paragraph. (d) An exemplary embodiment of the present invention, there is a method for restricting the use of a harmful multimedia file, the method comprising: - harmful multimedia DB construction step 1 , # verifiable via network 127849.doc 200837601 Whether each multimedia file corresponds to a harmful multimedia file; extracting the identifier and meta information to identify the harmful multimedia slot; ^ storing the captured identifier and meta information in a server DB; a multimedia DB transmission step 200, which can transmit a harmful multimedia DB constructed in the harmful multimedia db construction step to a user computer; a user-by-user blacklist construction step 300, which can search for multimedia files in the user's computer, Comparing the searched multimedia file with the harmful multimedia DB and constructing a black list, which is a list of the harmful multimedia files; and a harmful multimedia file use blocking step 400, which is intended to be used by the user in the user's computer a multimedia file is sequentially compared with a user-by-user blacklist and a harmful multimedia DB; and when the multimedia file corresponds to harmful In the case of a multimedia file, the use of the multimedia file can be blocked, wherein at least one of the user-by-user blacklist construction step 300 and the harmful multimedia file use blocking step includes a harmful multimedia file encryption step 5, which will delete the harmful multimedia file. It can be encrypted and stored in the user's computer, so that harmful multimedia slots can be prevented from being distributed or used by different users. Preferably, as shown in FIG. 1B, the method may further comprise a harmful multimedia case decryption/regeneration step 600, after the harmful multimedia slot encryption step 500, when encrypting the harmful multimedia file to be heavy in a manager mode The system can 'decrypt and reproduce encrypted harmful multimedia files, which have passed an authentication procedure of the user's computer. More preferably, as shown in FIG. 2, the method may further include: a user-by-user email address list construction step 3〇〇w, which can construct an email by searching for one of the multimedia files in the user's computer. Address Qing 127849.doc -12 - 200837601 List of harmless multimedia files; and user-by-user blacklist construction v, 300, &&&& multimedia files use instantaneous permission step 4〇〇W' I Before the user blacklist construction step, when the user's email address list is searched for, and the multimedia slot file is determined to be a harmless multimedia file, a multimedia file used in the user's computer is immediately allowed. Exemplary embodiments of each step included in the method according to the present invention will be described in more detail with reference to Figures 3 to 5. First, the computer software program (which may be a general component through which the user computer actually implements the method of the present invention) is provided to the user's computer. In the step 1 of constructing a harmful multimedia DB by the @server (from the perspective of the user's computer - the remote system) operated by the provider (which constructs and provides the harmful multimedia DB to the user's computer), the servo The device can automatically collect or manually collect the harmful multimedia files circulating through the Internet, establish (or fetch) the verification data from the collected multimedia files, and check the verification data to construct the harmful multimedia DB. ,As shown in Figure 3. In the case of 2, a key value of each file stored in the harmful multimedia DB includes the message extract value retrieved from the file, and an identifier is taken from an appropriate file area to minimize collision and achieve correct identification. . A message is a special value of a fixed length obtained by applying a one-way hash function to a given input value, and is a sum check code that can be used to check whether an original file has been tampered with. . When an identifier of a file, MD5, and grain core (10) are widely known as a message digest function, the present invention can use the message excerpt value, wherein the hash function is 127849.doc 200837601 It can be used in the present invention. In addition to the method by which the server directly collects the through-net case, as described above, the method according to the present invention may include a method of a special program according to the second method A of the present invention (for example, -PC) When executing, the special program can be created from the multimedia file stored in the user's user's memory, that is, the multimedia file (ie, the multimedia rights file of the harmful media standard) (for example, fetching). Verification data of the symbol or meta information, and instantly through the Internet: pass: verification data, and the server can verify the verification data, thereby verifying whether the multimedia file in the computer that is potentially determined to be a harmless multimedia file is actually It is harmless, as shown in Figure 3. When the multimedia file classified as _ harmless multimedia broadcast through the harmful multimedia in the user's computer is verified as a case, the server can update the current harmful multimedia DB to 可7 guilty. The method may be implemented by additionally including a step of recording additional data of harmful multimedia broadcasts taken from the user's computer in harmful multimedia in order to facilitate each method in accordance with an embodiment of the present invention. Update the harmful multimedia DB. That is, this step may include a file license and verification data transmission step 700, and - harmful multimedia DB and user computer update step, as shown in Figure 5. In (4) use license ^ verify data transmission In step 700, the user computer can generate authentication data from the multimedia file of the harmless multimedia file in the user computer, and transmit the generated verification data to the server. The harmful multimedia Db and the user computer update step. In step 8〇〇, the server can verify the received test 127849.doc -14· 200837601 α bedding, when corresponding to the verification data When the media file system determines to be a harmless multimedia file, it updates the email address list of the user's computer. When a multimedia file corresponding to the verification data is determined to be a harmful multimedia broadcast, the corresponding information is added to the harmful The multimedia db updates the harmful multimedia DB and transmits the updated harmful multimedia device 6 to the user computer so that the updated harmful multimedia DB can be downloaded by the user computer. Therefore, even if the Internet is not transmitted through the Internet The circulating harmful multimedia files can be recorded in the harmful multimedia DB. ζ According to an exemplary embodiment of the present invention, as shown in FIG. 2, a blacklist (BL) and an email address list (WL) are constructed according to each user computer. Steps 300 and 3 can be implemented, for example, in a cache scheme. Here, the t-list (BL) represents the /monthly list of harmful multimedia broadcasts present on the user's computer, and the email address list (WL) a list of harmless multimedia files present on the user's computer, and preferably such lists are formed in a data structure of a hash table Based on the fact that the number of harmful multimedia files is relatively large compared to the total number of multimedia files existing in a user I computer, the present invention provides a blacklist for constructing harmful multimedia files; an electronic device for constructing harmless multimedia files a list of mail addresses; and a method of using these lists before searching for harmful multimedia DBs. • As shown in Figures 4 and 5, when a multimedia file is used for a user's computer, first, an email address list is executed ( WL) search step (see reference number "400W" in Figure 5). In this case, when the multimedia file system decides to be a harmless multimedia file included in the email address list (WL), the multimedia file can be immediately permitted. And terminate the harmful multimedia file 127849.doc -15· 200837601 Use the blocking program to enable faster use of the harmless multimedia slot. In contrast, regarding the multimedia file not included in the email address list, the harmfulness of the multimedia file can be verified by a separate system program, that is, by subsequently performing a blacklist search step (see the reference numeral of FIG. 5). (d) ")'s whether the target file corresponds to the -file included in the blacklist (bl); an archive encryption check step (see reference numeral "420") of Figure 5 to check whether the target file itself passes through a key Encrypted;
與一有害多媒體DB搜尋步驟(參見圖5的參考數字”43〇”), 以決定目標檔案是否對應於在有害多媒體db中包括的— 檔案。當目標檔案已決^為-有害多媒體檔案時,可阻斷 使用目標檔案,且更佳地係,此阻斷歷史可記錄在使用者 電腦中’所以可提供-更準確與有效率的有害多媒體標案 使用阻斷功能。此外,當-多媒體檔案在為最後步驟的有 害多媒體DB搜尋步驟43〇中係決定為一有害多媒體樓案 時’可阻斷使用者使用擋案’且同時,程序會分路到分支 點"F",如圖5所示’因為多媒體標案尚未加密,以致於多 媒體檔案會經受一分離檔案加密步驟50〇。 同時,如圖5所示’較佳地係,在加密有害多媒體檔案 的檔案加密步驟500之後’ #由將有害多媒體檔案的資料 新增在使用者電腦中個別存在的黑名單(BL),更新黑名單 (BL)的一黑名單新增步驟55〇可執行,以致於當再次使用 有害多媒體檔案時’可报快阻斷使用該有害多媒體槽案。 雖然圖4和5顯示電子郵件住址清單搜尋步驟4〇〇w與里 名單搜尋步驟4H)係連續執行的情況,但是兩步驟可同: 127849.doc -16 - 200837601 執行。 在相對於檔案加密步驟之更多細節中,較佳地係,就在 存在於使用者電腦中的一多媒體檔案係決定為一有害多媒 體槽案之後,藉由一檔案系統過濾驅動器(FSFD)而在一核 心模式中加密多媒體檔案,其中該驅動器係可控制一槽案 系統的一驅動器。更佳地係,對應的多媒體檔案在一秘鑰 方案可為一加密之檔案,以致於在不配備有實施本發明系 統(包括一程式)的一電腦中,不可能解密對應的多媒體檔 案在此h况中,由於加密的槽案不能使用在不配備有系 統的電腦中,所以不可能使用加密的檔案,即使加密的槽 案已傳輸至一不同電腦,藉此避免對應的檔案重新分佈。 同時,在已安裝實施根據本發明之方法的系統之電腦 中,使用權限透過一認證碼而提供。在此情況,當獲得使 用權限的使用者(已在一管理者模式中登入之監護人(例 如,父母))嘗試使用一加密的有害多媒體檔案時,較佳地 係,額外執行一即時解密再生步驟6〇〇,如圖2所示,以致 於使用者可正f使精應㈣案。當少年男孩或女孩嘗試 使用有害多女某體檔案及記錄阻斷的歷纟時,A功能可阻斷 使用一有害多媒體檔案。因此,當像父母之監護人檢查阻 斷的歷史時’ t 4人可識別哪個播案因其有害的原因而阻 斷使用。此識別程序可透過即時解密達成,其中解密係在 使用FSFD的核心模式中執行,其係類似在槽案加密步驟 中可控制檔案系統的驅動器。 根據本發明的另一不範性具體實施例,當加密一有害多 127849.doc 200837601 媒體檔案時,例如一浮 案。識別碼可用來決定一 p的預定識別碼可插入加密的檔 害多媒體檔案的步驟=多媒體播案是否已在檢查有 用,不在一使用 氆。同時,識別碼可以此方式使 顯示),而安I^ 識別碼決疋單元(未在圖 信線上識:有害多二^^ 案。較佳地係,複數個、田’、纟限制使用有害多媒體檔 在此㈣,雖:::::可插入-有害多媒體檔案。 段傳送,但是識糾播係分成多片段,且逐片 輸狀熊 B 、疋早7°可決定有害多媒體檔案的傳 ^ 於其可提供優越的阻斷功能。 且發明,可克服習知有害多媒體收集技術的限度, 。夕媒體DB可額外更新,即使相對於未透過網際網 W的有害多媒體檔案’且只儲存在一使用者電腦,以 其可提供更有效率限制有害多媒體檔案使用的功能。 。s夺才艮據本發明,藉由根據每一使用者電腦來建構及 操作:黑名單與一電子郵件住址清單,由於安裝的有害多 :體檔案使用限制系統’所以可最小化一使用者電腦知性 月b衰減現象。此外’由於一使用者電腦所識別的一有害多 媒體檔案已加密’所以變得不可能使用有害多媒體播案, 即使有害多媒㈣案透過網際網路或另-實體構件重新分 佈至另一電腦,藉使避免有害多媒體檔案散佈。同時,加 始、時,藉由插入一預定識別碼,可透過網際網路通信線主 動地控制傳輸此加密檔案。 隨著前述的結果,父母可准許他們較小的兒子與女兒以 127849.doc -18 · 200837601 平靜心情來使用網際網路,且少年㈣和女孩可避免由於 輕率使用有害多媒體内容的傷害,且具有一健全與健康的 觀念。此外,可減少佔用大量網路的有害多媒體標案的流 量,以致於使一全國性有效率與成效的網路基礎架構更安 全0 雖然本發明的較佳具體實施例是為了說明目的而描述, 但是熟諳此技術者可明白各種修改、添加及替代可達成, 而不致脫離文後申請專利範圍中所說明的本發明之範疇及 精神。因此,應該瞭解上述具體實施例不是限制而:說 明。 因此,本發明的精神與範疇必須不是透過描述的具體實 施例加以定義,而是透過文後申請專利範圍及其類似加以 定義。 【圖式簡單說明】 本發明的上述及其它目標及特徵可從下面連同附圖的詳 細說明而更明白,其中: 圖1A描述根據本發明的一示範性具體實施例之一方法步 驟之流程; 圖1B描述根據本發明的一示範性具體實施例除圖丨步驟 之外,包括一解密/再生步驟之一方法步驟之流程; 圖2描述根據本發明的一示範性具體實施例包括一電子 郵件住址β單建構步驟的一方法之流程; 圖3描述根據本發明的一示範性具體實施例之一系統組 態支方塊圖,其中一伺服器(即一遠端系統)係建構及更新 127849.doc -19- 200837601 一有害多媒體DB,且一使用者電腦係建構一黑名單與一 電子郵件住址清單; 圖4描述決定在一使用者電腦中使用的一多媒體檔案是 否對應於一有害多媒體檔案之一程序之流程;及 圖5示意性描述根據本發明的各種示範性具體實施例方 法之流程。A search step with a harmful multimedia DB (see reference numeral 43 of FIG. 5) is used to determine whether the target file corresponds to the file included in the harmful multimedia db. When the target file has been determined to be a harmful multimedia file, the target file can be blocked and, more preferably, the blocking history can be recorded in the user's computer - so it can be provided - more accurate and efficient harmful multimedia The standard uses the blocking function. In addition, when the multimedia file is determined to be a harmful multimedia building in the harmful multimedia DB search step 43 of the last step, the 'block user can use the file' and at the same time, the program will branch to the branch point "F", as shown in Figure 5, because the multimedia file is not encrypted, so that the multimedia file will undergo a separate file encryption step. At the same time, as shown in FIG. 5, 'preferably, after the file encryption step 500 of encrypting the harmful multimedia files', the information of the harmful multimedia files is newly added to the blacklist (BL) existing in the user's computer, and updated. A blacklist of blacklists (BL) adds a step 55 to be executable, so that when the harmful multimedia file is used again, the use of the harmful multimedia slot can be blocked. Although Figures 4 and 5 show the case where the email address list search step 4〇〇w and the list search step 4H) are continuously performed, the two steps can be performed as follows: 127849.doc -16 - 200837601 Execution. In more detail with respect to the file encryption step, preferably, after a multimedia file stored in the user's computer is determined to be a harmful multimedia slot, a file system filter driver (FSFD) is used. The multimedia file is encrypted in a core mode in which the drive controls a drive of a slot system. More preferably, the corresponding multimedia file can be an encrypted file in a key scheme, so that in a computer not equipped with the system (including a program) for implementing the present invention, it is impossible to decrypt the corresponding multimedia file. In this case, since the encrypted slot cannot be used in a computer that is not equipped with a system, it is impossible to use the encrypted file even if the encrypted slot has been transmitted to a different computer, thereby avoiding the corresponding file redistribution. At the same time, in a computer on which a system embodying the method of the present invention has been installed, usage rights are provided through an authentication code. In this case, when the user who has obtained the usage right (the guardian (for example, the parent) who has logged in in the administrator mode) attempts to use an encrypted harmful multimedia file, it is preferable to additionally perform an instant decryption regeneration step. 6〇〇, as shown in Figure 2, so that the user can make a fine (4) case. The A function blocks the use of a harmful multimedia file when a teenager boy or girl attempts to use a harmful multi-girl file and records the blocked history. Therefore, when the guardian of the parent checks the history of the obstruction, it can be identified which one of the broadcasts is blocked for its harmful reasons. This identification procedure can be achieved by instant decryption, where decryption is performed in a core mode using FSFD, which is similar to the drive that controls the file system in the slot encryption step. According to another non-exclusive embodiment of the present invention, when a harmful media file is encrypted, for example, a buoy. The identification code can be used to determine the step in which a predetermined identification code of a p can be inserted into an encrypted file. If the multimedia broadcast is already in use, it is not used. At the same time, the identification code can be displayed in this way, and the identification code is determined by the unit (not recognized on the line of the letter: harmful more than two ^^ cases. Preferably, multiple, Tian', 纟 restricted use harmful The multimedia file is here (4), although::::: can be inserted - harmful multimedia files. Segment transmission, but the identification and correction system is divided into multiple segments, and the bearer B, the 7° early can determine the transmission of harmful multimedia files. ^ It can provide superior blocking functions. It can be overcome to overcome the limitations of the conventional harmful multimedia collection technology. The media DB can be updated additionally, even if it is stored in the harmful multimedia files that are not transmitted through the Internet. A user computer that provides a more efficient function of limiting the use of harmful multimedia files. According to the present invention, it is constructed and operated according to each user's computer: a blacklist and an email address list. Because the installation is more harmful: the file file usage restriction system' can minimize the user's computer knowledge month b attenuation phenomenon. In addition, because a user's computer recognizes a harmful multimedia file has been added It is impossible to use harmful multimedia broadcasts, even if the harmful multimedia (4) case is redistributed to another computer through the Internet or another physical component, so as to avoid the spread of harmful multimedia files. By inserting a predetermined identification code, the encrypted file can be actively controlled to be transmitted through the Internet communication line. With the foregoing results, the parents can permit their younger son and daughter to calm down with 127849.doc -18 · 200837601 Using the Internet, and teenagers (4) and girls can avoid the harm of using harmful multimedia content rashly, and have a sound and healthy concept. In addition, the traffic of harmful multimedia standards occupying a large number of networks can be reduced, so that one Nationally efficient and effective network infrastructure is more secure. Although the preferred embodiments of the present invention have been described for illustrative purposes, those skilled in the art will appreciate that various modifications, additions and substitutions can be made without departing from the context. The scope and spirit of the invention described in the scope of the following patent application. Therefore, it should be understood that the above specific The scope of the present invention is not limited by the specific embodiments described, but is defined by the scope of the claims and the like. The other objects and features will be more apparent from the following detailed description of the drawings, wherein: FIG. 1A depicts a flow of method steps in accordance with an exemplary embodiment of the present invention; FIG. 1B depicts an exemplary embodiment in accordance with the present invention. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS In addition to the steps of the figure, a flow of one of the method steps of a decryption/regeneration step is included; FIG. 2 depicts a flow of a method including an e-mail address β single construction step in accordance with an exemplary embodiment of the present invention. FIG. 3 depicts a system configuration branch diagram in accordance with an exemplary embodiment of the present invention, wherein a server (ie, a remote system) is constructed and updated 127849.doc -19-200837601 a harmful multimedia DB, And a user computer system constructs a blacklist and an email address list; Figure 4 depicts the decision to use in a user's computer. Whether a multimedia file corresponds to a procedure of a program of a harmful multimedia file; and Figure 5 schematically depicts a flow of various exemplary embodiments of the present invention.
127849.doc -20-127849.doc -20-