TW200837601A - Method for restricting use of harmful multimedia file - Google Patents

Method for restricting use of harmful multimedia file Download PDF

Info

Publication number
TW200837601A
TW200837601A TW096150878A TW96150878A TW200837601A TW 200837601 A TW200837601 A TW 200837601A TW 096150878 A TW096150878 A TW 096150878A TW 96150878 A TW96150878 A TW 96150878A TW 200837601 A TW200837601 A TW 200837601A
Authority
TW
Taiwan
Prior art keywords
harmful
multimedia
user
file
multimedia file
Prior art date
Application number
TW096150878A
Other languages
Chinese (zh)
Other versions
TWI365393B (en
Inventor
Ki-Hyun Lee
Jung-Hoon Shin
Sang-Kwon Jung
Sang-Wan Kim
Original Assignee
Planty Net Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Planty Net Co Ltd filed Critical Planty Net Co Ltd
Publication of TW200837601A publication Critical patent/TW200837601A/en
Application granted granted Critical
Publication of TWI365393B publication Critical patent/TWI365393B/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8352Generation of protective data, e.g. certificates involving content or source identification data, e.g. Unique Material Identifier [UMID]

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Tourism & Hospitality (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • General Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

Disclosed is a method for restricting use of a harmful multimedia file, the method including: a harmful multimedia DB construction step of verifying if each multimedia file collected via Internet corresponds to a harmful multimedia file, extracting identifiers and meta-information for identifying harmful multimedia files, and storing the extracted identifiers and meta-information in a DB of a server; a harmful multimedia DB transmission step of transmitting the harmful multimedia DB constructed in the harmful multimedia DB construction step to a user computer; a user-by-user blacklist construction step of searching multimedia files in the user computer, comparing the searched multimedia files with the harmful multimedia DB, and constructing a blacklist, which is a list of harmful multimedia files; and a harmful multimedia file use blocking step of comparing a multimedia file to be used in the user computer by a user with the user-by-user blacklist and the harmful multimedia DB in sequence, and blocking the use of the multimedia file when the multimedia file corresponds to a harmful multimedia file, wherein a harmful multimedia file encryption step of encrypting and storing the harmful multimedia file in the user computer is further performed.

Description

200837601 九、發明說明: 【發明所屬之技術領域】 本發明係關於一種用以限制有害多媒體檔案(例如有害 動一才田案)之使用之方法,更明確而言係有關一當欲使用 . 纟使用者電财的動畫«時,透過搜尋-預建構的有害 動旦DB、一逐使用者黑名單、及/或-逐使用者電子郵件 住址清單,致能更快使用—無害動畫(例如再生),並致能 丨確限制使用一有害動畫;及用於加密在黑名單中註冊的 有害動畫檔案,以致於有害動畫檔案不能使用未安裝根據 本發明的-系統的其他使用者電腦中,藉此避免有害動畫 檔案重新分佈之方法。 【先前技術】 廣泛用來限制在使用者電腦中有害多媒體檔案之使用之 一習知方法係以下列方式實施··一特定供應者或系統藉由 2集在網際網路上分佈的有害多媒體檔案及從有害多媒體 ( 才田案擷取特徵值以建構一有害多媒體db,言亥建構的有害 多媒體DB係安裝在一使用者電腦中,且當其決定使用在 使用者電腦中的-檔案係對應於在安裝的有害多媒體郎 中注冊的一檔案時’可限制檔案之使用。根據此一習知方 - 〇由於僅針對在網際網路上分佈的有害多媒體檔案建構 一DB,所以存在一未在網際網路上分佈或難以收集的有 口夕媒體檔案在無限制之情況下仍可使用之問題。 同夺用於阻斷有害動畫的另一習知方法(例如,在韓 國專利5主冊第胸川⑷號中揭示的一方法)是以搜尋在網 127849.doc 200837601 際網路上分佈的有宝 容擷取有害内容二谷 式實施,以從搜尋的有害内 之全部或一部分的雜、基伯 . 容DB、傳送建 ’、'、、建構一有害内 者電財從欲傳—使用者電腦、在使用 或一部分輯及/或再生(執行的)的播案之全部 db中有害内容的tr、將檔案的雜凑值與在有害内容 容時,停止傳i^勃、值相比較’且當播案對應於有害内 知技術,每案及/或刪除播案。根據此-習 Κ吏用者電腦藉由驅動例 -執打程式來重製(例如) =:再生私式的 一雜凑值,且1視#㈣枯案時’f要從檔案掏取 值盘在右宝的—特殊值’以將該擷取的雜湊 值與在有害内容〇3中的 的雜養 是否對應於在有害内容D”= =較,並決定檔案 知技術’即使在一無害動畫正常再生:!。:外’根據習 待—預定時間週期P + 之别,其必須始終等 栌幸h 吊’在一使用者電腦令再生的動畫 查田二括比有害動畫槽案更多的無害動畫楷案,且益宝動 -檔案的再生頻率係遠高於… 此,每卷WJ ’U虽案的再生頻率。因 動畫。/。 一動畫檔案時’非常無效率搜尋整個有害 根據習知技術,當使用一有害動畫檔案 吏用強制結束例如使用播案的—動 方法、或刪除檔案之方法。當―有^動壹1的一程序之 業服務形式實施時,主要使用::=阻係以商 法+ 便用強制結束一對應程序的方 在此情況中’通常’當1當認證程序已成功完成 —監護人模式或監督者模式)以便檢查存取有害動晝 127849.doc 200837601 檔案的記錄時,允許使用一有害動畫播案。然而,在此情 況中,雖然驗證-有害動畫標案,但是有害動畫槽案未: 使用者電腦刪除,且仍保留在原處。因此,當此未刪除及 保留的有害動畫檔案透過光碟複製等傳送至不配備有—有 - #動畫阻斷功能的另-電腦時,有害動晝檔案可在益任何 . _之情況下❹,因此存在即使-㈣驗料-有害動 旦檔案主動阻斷重新分佈之一限度。 【發明内容】 因此’本發明已可解決域在先前技術中發生的問題, 且本發明提供-驗證方法,用以當一檔案對應於一有害多 媒體枯案時,可更快阻斷在一使用者電腦中使用該播案, 並盡快允許欲使用在使用者電腦中之一無過度時間延遲之 檔案’而當該檔案對應於一有害多媒體檔案時,驗證該檔 案是否係-無害多媒體檔案。同時,本發明提供一用以致 能-中央阻斷系統可主動收集未透過網際網料佈的有害 1 乡媒體檔案’但是存在'使用者電腦中之方法。此外,本 發明提供--旦多媒體檔案在一使用者電腦中被驗證為一 冑害多媒體㈣時’不僅限制或阻斷在使用者電腦中的多 媒體樓案之使用’並使它不能正常使用甚至在另一電腦中 ㈣案,較檔案已傳送給另一電腦,以致於可避免有害 多媒體播案透過網際網路而重新分佈或散佈,#此提供一 安全的網際網路環境之方法。 根據本發明# -怨樣,為限制在與網際網路連接的使用 者電腦中的有害多媒體槽案之使用,提供一種用以限制使 127849.doc 200837601 用一有害多媒體檔案的方法,該方法包括:一有害多媒體 DB建構步驟,其可驗證經由網際網路收集的每個多媒體 檔案是否對應於一有害多媒體檔案;擷取用以識別有害多 媒體檔案的識別符與元資訊;及將該擷取的識別符與元資 訊儲存在一伺服器的DB ; —有害多媒體1)3傳輸步驟,其 可將在有害多媒體DB建構步驟中建構的有害多媒體DB傳 送至一使用者電腦;一逐使用者黑名單建構步驟,其可搜 哥在使用者電腦中的多媒體檔案;將該搜尋的多媒體檔案 與有害多媒體DB相比較;及建構一黑名單,其係該有害 多媒體檔案的清單;及一有害多媒體檔案使用阻斷步驟, 其可將欲在使用者電腦中由使用者使用的一多媒體檔案依 序與逐使用者黑名單和有害多媒體DB相比較,且當多媒 體檔案對應於一有害多媒體檔案時,可阻斷多媒體檔案之 使用,其中逐使用者黑名單建構步驟與有害多媒體檔案使 用阻斷步驟之至少一步驟包括一有害多媒體檔案加密步 驟,其可將有害多媒體檔案加密及儲存在使用者電腦,以 致於避免有害多媒體檔案由不同使用者進行分佈或使用。 根據本發明的另一態樣,該方法進一步包括一在有害多 媒體檔案加密步驟之後,當該加密的有害多媒體檔案欲在 吕理者模式中重製,且通過使用者電腦的一認證程序 時,解密及再生該加密的有害多媒體檔案之步驟。 根據本發明的又另一態樣,該方法進一步包括:一逐使 用者電子郵件住址清單建構步驟,其可透過在使用者電腦 中的多媒體檔案之一搜尋而建構一電子郵件住址清單,其 127849.doc 200837601 係無害多媒體檔案的清單,以及逐使用者黑名單建構+ 驟;及一無害多媒體檔案使用瞬時允許步驟,其中在執行 逐使用者黑名單建構步驟之前,當透過逐使用者電子郵件 住址清單之一搜尋,決定多媒體檔案係一無害多媒體檔案 時,立即允許欲在使用者電腦中使用的一多媒體檔案之使 用0200837601 IX. INSTRUCTIONS: [Technical field to which the invention pertains] The present invention relates to a method for restricting the use of harmful multimedia files (such as a harmful multimedia file), and more specifically to be used as intended. The animation of electricity money «times, through the search - pre-constructed harmful dynamic DB, one-by-user blacklist, and / or - user-by-user email address list, enabling faster use - harmless animation (such as regeneration) And enabling the use of a harmful animation; and for encrypting harmful animation files registered in the blacklist, so that the harmful animation files cannot be used in other user computers that do not have the system according to the invention installed, thereby Avoid ways to redistribute harmful animation files. [Prior Art] A well-known method widely used to limit the use of harmful multimedia files in a user's computer is implemented in the following manner: • A specific provider or system with 2 sets of harmful multimedia files distributed over the Internet and From the harmful multimedia (the talent case draws the feature value to construct a harmful multimedia db, the harmful multimedia DB system constructed by Yanhai is installed in a user's computer, and when it decides to use it in the user's computer, the file system corresponds to When installing a file registered in a harmful multimedia lang, 'the use of the file can be restricted. According to this idiom- 〇 because only one DB is constructed for harmful multimedia files distributed over the Internet, there is one that is not distributed on the Internet. Or it is difficult to collect the problem that the Japanese-language media file can still be used without restriction. Another common method for blocking harmful animations (for example, in Korean Patent No. 5 Main Book No. 2 (2) One method disclosed is to search for the harmful content in the Internet on the network of 127849.doc 200837601. All or part of the harmful, the basics, the basics, the DB, the transmission of the ', ', the construction of a harmful internal money from the desire to pass - the user's computer, in use or part of the compilation and / or regeneration (executed ) the broadcast of all the harmful content of the db, the hash value of the file and the content of the harmful content, stop the transmission of the value of the comparison, and when the broadcast corresponds to the harmful internal knowledge technology, each case and / or delete the broadcast. According to this - the user computer is reproduced by the driver-execution program (for example) =: a hash value of the regenerative private, and 1 (4) when the case is 'f To retrieve the value of the value in the right-handed-special value from the file, to compare the hash value of the captured with the miscellaneous content in the harmful content 〇3 to the harmful content D”==, and determine the file Technology 'even if a normal animation in a harmless animation:!.: outside 'according to the waiting time - the predetermined time period P + , it must always wait for luck h hang 'in a user computer to reproduce the animation of the investigation of the second More harmful animations in the harmful animation slot, and the regeneration frequency of the Epoch-Files is much higher than Therefore, the regenerative frequency of each roll of WJ 'U. Because of the animation. /. An animation file is 'very inefficient to search the entire harmful according to the conventional technology, when using a harmful animation file to force the end, such as using a broadcast case - Method of moving, or deleting a file. When a service form of a program that has a function of 1 is implemented, the main use is: := The resistance is based on the commercial method + the party that is forced to end a corresponding program in this case' Usually, 'When 1 the authentication procedure has been successfully completed—guardian mode or supervisor mode) to check access to the records of the harmful files 127849.doc 200837601, a harmful animation is allowed. However, in this case, Verification - Harmful animation standard, but the harmful animation slot is not: The user's computer is deleted and remains in place. Therefore, when the unremoved and retained harmful animation files are transferred to a computer that is not equipped with the -# animation blocking function by disc copying, etc., the harmful files can be used in any case. Therefore there is a limit to even the - (four) specimen-hazard dynamic archives that actively block redistribution. SUMMARY OF THE INVENTION Therefore, the present invention has solved the problems that the domain has occurred in the prior art, and the present invention provides a verification method for blocking a use in a file when it corresponds to a harmful multimedia case. The broadcast is used in the computer, and the file to be used in one of the user's computers without excessive time delay is allowed as soon as possible. When the file corresponds to a harmful multimedia file, it is verified whether the file is a harmless multimedia file. At the same time, the present invention provides a method for enabling a central blocking system to actively collect harmful media files that are not transmitted through the internet material, but in a 'user' computer. In addition, the present invention provides that when a multimedia file is verified as a harmful multimedia (4) in a user's computer, 'not only restricts or blocks the use of the multimedia building in the user's computer' and makes it not functioning properly or even In another computer (4) case, the file is transferred to another computer, so that harmful multimedia broadcasts can be avoided from being redistributed or distributed through the Internet. #This provides a secure Internet environment. According to the present invention, a method for restricting the use of a harmful multimedia file for 127849.doc 200837601 is provided for limiting the use of harmful multimedia slots in a user computer connected to the Internet, the method comprising : a harmful multimedia DB construction step for verifying whether each multimedia file collected via the Internet corresponds to a harmful multimedia file; extracting identifiers and meta information for identifying harmful multimedia files; and extracting the captured The identifier and the meta information are stored in a DB of the server; the harmful multimedia 1) 3 transmission step, which can transmit the harmful multimedia DB constructed in the harmful multimedia DB construction step to a user computer; a construction step of searching for a multimedia file in a user's computer; comparing the searched multimedia file with a harmful multimedia DB; and constructing a blacklist, which is a list of the harmful multimedia files; and a harmful multimedia file use a blocking step that sequentially and sequentially causes a multimedia file to be used by the user in the user's computer The blacklist is compared with the harmful multimedia DB, and when the multimedia file corresponds to a harmful multimedia file, the use of the multimedia file can be blocked, wherein the user-by-user blacklist construction step and the harmful multimedia file use blocking step are at least one step A harmful multimedia file encryption step is included, which encrypts and stores the harmful multimedia files on the user's computer, so as to prevent harmful multimedia files from being distributed or used by different users. According to another aspect of the present invention, the method further includes, after the harmful multimedia file encryption step, when the encrypted harmful multimedia file is to be reproduced in the mode of the processor and passed an authentication procedure of the user's computer, The step of decrypting and reproducing the encrypted harmful multimedia file. According to still another aspect of the present invention, the method further includes: a user-by-user email address list construction step of constructing an email address list by searching for one of the multimedia files in the user's computer, 127849 .doc 200837601 is a list of harmless multimedia files, and user-by-user blacklist construction + steps; and a harmless multimedia file using the instantaneous permission step, in which the user-by-user email address is used before the user-by-user blacklist construction step is performed One of the checklists, when the multimedia file is determined to be a harmless multimedia file, immediately allows the use of a multimedia file to be used in the user's computer.

根據本發明又另一態樣,該方法進一步包括:一驗證資 料產生與傳輸步驟,其可藉由使用者電腦,從儲存在使用 者電腦中的每個多媒體檔案擷取用於擋案識別的—識別 符,從儲存多媒體檔案之各個擷取一螢幕訊框與元資訊之 至少一者,及傳送該擷取的識別符與一螢幕訊框和元資訊 之至少-者至伺服器;及一有害多媒魏與使用者電腦 更新步驟,其可經由多媒體檔案的驗證資料而驗證儲存在 使用者電腦中的每個多媒體檔案是否對應於—有害多媒體 檔案’其中該認證資料已透過驗證f料產生與傳輸步驟而 從使用者電腦傳送,並根據每個多媒體檔案是否對應於_ 有害多媒體檔案而更新儲存在伺服器中的有害多媒體加 或在儲存使用者電腦中的電子郵件住址清單。 【實施方式】 以下’本發明的示範性具體實施例將參考附圖說明。 百先’根據本發明的一示範性具體實施例之方法之整個 建構將參相1錢步說明。㈣本發明的-示範性具體實 施例,存在用以限制使用—有害多媒體檔案之方法,該方 法包括.—有害多媒體DB建構步驟1〇〇,#可驗證經由網 127849.doc 200837601 際網路收集的每個多媒體檔案是否對應於一有害多媒體檔 案;擷取識別符與元資訊,用以識別有害多媒體槽案;^ 將該擷取的識別符與元資訊儲存在一伺服器的DB ; 一有 害多媒體DB傳輸步驟200,其可將在有害多媒體db建構步 驟中建構的有害多媒體DB傳送給一使用者電腦;一逐使 用者黑名單建構步驟300,其可搜尋在使用者電腦中的多 媒體檔案、將該搜尋的多媒體檔案與有害多媒體DB相比 較、並建構一黑名單,其係該有害多媒體檔案的清單;及 一有害多媒體檔案使用阻斷步驟400,其欲在使用者電腦 中由使用者使用的一多媒體檔案依序與逐使用者黑名單和 有害多媒體DB相比較;且當多媒體檔案對應於有害多媒 體檔案時,可阻斷多媒體檔案之使用,其中逐使用者黑名 單建構步驟300與有害多媒體檔案使用阻斷步驟之至少一 步驟係包括一有害多媒體檔案加密步驟5〇〇,其將有害多 媒體檔案可加密及儲存在使用者電腦中,如此可避免有害 多媒體槽案被不同的使用者進行分佈或使用。 較佳地,如圖1B所示,該方法可進一步包括一有害多媒 體祂案解密/再生步驟600,其在有害多媒體槽案加密步驟 500之後,當加密有害多媒體檔案欲在一管理者模式中重 製時’可解密及重製加密有害多媒體檔案,其已通過使用 者電腦的一認證程序。 更佳地,如圖2所示,該方法可進一步包括:一逐使用 者電子郵件住址清單建構步驟3〇〇w,其可透過在使用者 電腦中的多媒體檔案之一搜尋來建構一電子郵件住址清 127849.doc -12 - 200837601 單其疋無害多媒體檔案的清單;以及逐使用者黑名單建 構v驟300,& &害多媒體檔案使用瞬時允許步驟 4〇〇W’ I中在執行逐使用者黑名單建構步驟之前,當透 使用者電子郵件住址清單之—搜尋,決定多媒體槽案 係一無害多媒體檔案時,立即允許使用在使用者電腦中使 用的一多媒體檔案。 乂下在根據本發明的方法中包括的每個步驟示範性具 體實施例將圖3至5更詳細描述。 首先’-電腦軟體程式(其可為透過—使用者電腦實際 實施本發明之方法的-般構件)係提供給使用者電腦。在 藉由供應者(其建構及提供有害多媒體DB至使用者電腦)操 作的@服器(從使用者電腦觀點的—遠端系、統)建構一有 害多媒體DB的步驟1〇〇中,伺服器可以自動收集或一手動 收集方案而直接收集透過網際網路流通的有害多媒體檔 案,從收集的多媒體稽案建立(或操取)驗證資料,並檢查田 該驗證資料,藉此建構有害多媒體DB,如圖3所示。在2 情況,儲存在有害多媒體DB中的每個檔案的一鑰值包括 從檔案擷取的訊息摘錄值,且一識別符係從一適當的檔案 區域榻取,以便最小化碰撞及達成正確識別。訊息摘^係 一固定長度的一特殊值,其係藉由將一單向雜湊函數應用 到一給定的輸入值而獲得,且係一種總和檢查碼,其可用 來檢查一原始檔案是否被篡改。當一檔案的一識別符、與 MD5、糧心屬⑽等廣泛已知為訊息摘要雜凑函數 時,本發明可使用此訊息摘錄值,其中該等雜凑函數之任 127849.doc 200837601 何一者可用於本發明。 除了伺服器直接收集透過網 案的方法之外,如上述,根據本發明的方 =:步_可包括一方法,其t當根據本發二 法A的一特殊程式在一使用者電腦(例如-PC)中執行 時’特殊程式可從儲存在使用者 夫,么更用者電細中的多媒體檔案(即 ^為有害夕媒體標案的多媒體權案)建立(例如操取)例 =識別符或元資訊的驗證資料,並以即時透過網際網路 :傳:驗證資料,且伺服器可驗證驗證資料,藉此驗證在 使:者電腦中潛在決定為無害多媒體檔案的多媒體檔案是 否實際上係無害的,如圖3所示。 當透過使用者電腦中的有害多媒體Μ歸類為_無害多 媒體播案之一多媒體檔案係根據驗證結果,而驗證為一有 ”案時,伺服器可將目前有害多媒體DB更新成 Γ7可罪度位帛在匕可藉由額外包括一將從使用者電腦榻 取的有害多媒體播案的額外資料記錄在有害多媒體中 之步驟實施,以便在根據本發明具體實施例的每個方法之 v驟中更新有害多媒體DB。即係,此步驟可包括一檔 案使用許可與驗證資料傳輸步驟700、與-有害多媒體DB 和使用者電腦更新步驟卿,如圖5所示。在㈣使用許可 ^驗證資料傳輸步驟700中,使用者電腦可從在使用者電 腦中决疋係無害多媒體檔案的多媒體檔案產生認證資料, 並將该產生的驗證資料傳送至伺服器。在有害多媒體Db 和使用者電腦更新步•驟8〇〇中,伺服器可驗證該接收的驗 127849.doc -14· 200837601 α貝料,當對應於驗證資料的一多媒體檔案係決定為一無 害多媒體檔案時,更新使用者電腦的一電子郵件住址清 單,當對應於驗證資料的一多媒體檔案係決定為一有害多 媒體播案時,藉由將對應資訊新增至有害多媒體db來更 新該有害多媒體DB,並將更新的有害多媒體〇6傳送至使 - 用者電腦,以致於該更新的有害多媒體DB可藉由使用者 電腦下載。由於此,即使未透過網際網路流通的有害多媒 體檔案可記錄在有害多媒體DB。 ζ 根據本發明的一示範性具體實施例,如圖2所示,根據 每一使用者電腦建構一黑名單(B L)與電子郵件住址清單 (WL)的步驟300和3〇〇w可例如以一快取方案實施。在此, t名單(BL)代表存在於使用者電腦中的有害多媒體播案的 /月單,而電子郵件住址清單(WL)代表存在於使用者電腦中 的無害多媒體檔案的清單,且較佳地係,此些清單係在一 雜湊表的資料結構中形成。基於當相較存在於在一使用者 I 電腦中的多媒體檔案總數時,有害多媒體檔案數量係相對 較】本發明知供一用以建構有害多媒體檔案的一黑名 單;建構無害多媒體檔案的一電子郵件住址清單;及在搜 _ 尋有害多媒體DB之前使用這些清單之方法。 •如在圖4和5所示,當一多媒體檔案用於一使用者電腦 時,首先,執行一電子郵件住址清單(WL)搜尋步驟(參見 圖5的參考數字"400W")。在此情況,當多媒體檔案係決定 為在電子郵件住址清單(WL)中包括的—無害多媒體檔案 時’可立即允許使用多媒體檔案,而終止有害多媒體檔案 127849.doc -15· 200837601 使用阻斷程序,藉此致能更快使用無害多媒體槽案。對照 下,關於在電子郵件住址清單中不包括的—多媒體檔案, 多媒體檔案的有害可透過一分離系統程序驗證,即係,藉 由隨後執行一黑名單搜尋步驟(參見圖5的參考數字 "㈣”)’以決目標檔案是否對應於在黑名單(bl)中包 括的-檔案;一檔案加密檢查步驟(參見圖5的參考數字 "420")’以檢查目標檔案本身是否透過一秘鑰予以加密;According to still another aspect of the present invention, the method further includes: a verification data generation and transmission step, wherein the user computer can retrieve the multimedia file from the user's computer for use in the file identification. - an identifier for capturing at least one of a screen frame and meta information from each of the stored multimedia files, and transmitting at least one of the captured identifier and a screen frame and meta information to the server; and The harmful multimedia and user computer update steps can verify whether each multimedia file stored in the user's computer corresponds to a harmful multimedia file via the verification data of the multimedia file, wherein the authentication data has been generated through verification And transmitting from the user's computer with the transmission step, and updating the harmful multimedia stored in the server or the list of email addresses stored in the user's computer according to whether each multimedia file corresponds to the _ harmful multimedia file. [Embodiment] Hereinafter, exemplary embodiments of the present invention will be described with reference to the accompanying drawings. The entire construction of the method according to an exemplary embodiment of the present invention will be described in the accompanying paragraph. (d) An exemplary embodiment of the present invention, there is a method for restricting the use of a harmful multimedia file, the method comprising: - harmful multimedia DB construction step 1 , # verifiable via network 127849.doc 200837601 Whether each multimedia file corresponds to a harmful multimedia file; extracting the identifier and meta information to identify the harmful multimedia slot; ^ storing the captured identifier and meta information in a server DB; a multimedia DB transmission step 200, which can transmit a harmful multimedia DB constructed in the harmful multimedia db construction step to a user computer; a user-by-user blacklist construction step 300, which can search for multimedia files in the user's computer, Comparing the searched multimedia file with the harmful multimedia DB and constructing a black list, which is a list of the harmful multimedia files; and a harmful multimedia file use blocking step 400, which is intended to be used by the user in the user's computer a multimedia file is sequentially compared with a user-by-user blacklist and a harmful multimedia DB; and when the multimedia file corresponds to harmful In the case of a multimedia file, the use of the multimedia file can be blocked, wherein at least one of the user-by-user blacklist construction step 300 and the harmful multimedia file use blocking step includes a harmful multimedia file encryption step 5, which will delete the harmful multimedia file. It can be encrypted and stored in the user's computer, so that harmful multimedia slots can be prevented from being distributed or used by different users. Preferably, as shown in FIG. 1B, the method may further comprise a harmful multimedia case decryption/regeneration step 600, after the harmful multimedia slot encryption step 500, when encrypting the harmful multimedia file to be heavy in a manager mode The system can 'decrypt and reproduce encrypted harmful multimedia files, which have passed an authentication procedure of the user's computer. More preferably, as shown in FIG. 2, the method may further include: a user-by-user email address list construction step 3〇〇w, which can construct an email by searching for one of the multimedia files in the user's computer. Address Qing 127849.doc -12 - 200837601 List of harmless multimedia files; and user-by-user blacklist construction v, 300, &&&& multimedia files use instantaneous permission step 4〇〇W' I Before the user blacklist construction step, when the user's email address list is searched for, and the multimedia slot file is determined to be a harmless multimedia file, a multimedia file used in the user's computer is immediately allowed. Exemplary embodiments of each step included in the method according to the present invention will be described in more detail with reference to Figures 3 to 5. First, the computer software program (which may be a general component through which the user computer actually implements the method of the present invention) is provided to the user's computer. In the step 1 of constructing a harmful multimedia DB by the @server (from the perspective of the user's computer - the remote system) operated by the provider (which constructs and provides the harmful multimedia DB to the user's computer), the servo The device can automatically collect or manually collect the harmful multimedia files circulating through the Internet, establish (or fetch) the verification data from the collected multimedia files, and check the verification data to construct the harmful multimedia DB. ,As shown in Figure 3. In the case of 2, a key value of each file stored in the harmful multimedia DB includes the message extract value retrieved from the file, and an identifier is taken from an appropriate file area to minimize collision and achieve correct identification. . A message is a special value of a fixed length obtained by applying a one-way hash function to a given input value, and is a sum check code that can be used to check whether an original file has been tampered with. . When an identifier of a file, MD5, and grain core (10) are widely known as a message digest function, the present invention can use the message excerpt value, wherein the hash function is 127849.doc 200837601 It can be used in the present invention. In addition to the method by which the server directly collects the through-net case, as described above, the method according to the present invention may include a method of a special program according to the second method A of the present invention (for example, -PC) When executing, the special program can be created from the multimedia file stored in the user's user's memory, that is, the multimedia file (ie, the multimedia rights file of the harmful media standard) (for example, fetching). Verification data of the symbol or meta information, and instantly through the Internet: pass: verification data, and the server can verify the verification data, thereby verifying whether the multimedia file in the computer that is potentially determined to be a harmless multimedia file is actually It is harmless, as shown in Figure 3. When the multimedia file classified as _ harmless multimedia broadcast through the harmful multimedia in the user's computer is verified as a case, the server can update the current harmful multimedia DB to 可7 guilty. The method may be implemented by additionally including a step of recording additional data of harmful multimedia broadcasts taken from the user's computer in harmful multimedia in order to facilitate each method in accordance with an embodiment of the present invention. Update the harmful multimedia DB. That is, this step may include a file license and verification data transmission step 700, and - harmful multimedia DB and user computer update step, as shown in Figure 5. In (4) use license ^ verify data transmission In step 700, the user computer can generate authentication data from the multimedia file of the harmless multimedia file in the user computer, and transmit the generated verification data to the server. The harmful multimedia Db and the user computer update step. In step 8〇〇, the server can verify the received test 127849.doc -14· 200837601 α bedding, when corresponding to the verification data When the media file system determines to be a harmless multimedia file, it updates the email address list of the user's computer. When a multimedia file corresponding to the verification data is determined to be a harmful multimedia broadcast, the corresponding information is added to the harmful The multimedia db updates the harmful multimedia DB and transmits the updated harmful multimedia device 6 to the user computer so that the updated harmful multimedia DB can be downloaded by the user computer. Therefore, even if the Internet is not transmitted through the Internet The circulating harmful multimedia files can be recorded in the harmful multimedia DB. ζ According to an exemplary embodiment of the present invention, as shown in FIG. 2, a blacklist (BL) and an email address list (WL) are constructed according to each user computer. Steps 300 and 3 can be implemented, for example, in a cache scheme. Here, the t-list (BL) represents the /monthly list of harmful multimedia broadcasts present on the user's computer, and the email address list (WL) a list of harmless multimedia files present on the user's computer, and preferably such lists are formed in a data structure of a hash table Based on the fact that the number of harmful multimedia files is relatively large compared to the total number of multimedia files existing in a user I computer, the present invention provides a blacklist for constructing harmful multimedia files; an electronic device for constructing harmless multimedia files a list of mail addresses; and a method of using these lists before searching for harmful multimedia DBs. • As shown in Figures 4 and 5, when a multimedia file is used for a user's computer, first, an email address list is executed ( WL) search step (see reference number "400W" in Figure 5). In this case, when the multimedia file system decides to be a harmless multimedia file included in the email address list (WL), the multimedia file can be immediately permitted. And terminate the harmful multimedia file 127849.doc -15· 200837601 Use the blocking program to enable faster use of the harmless multimedia slot. In contrast, regarding the multimedia file not included in the email address list, the harmfulness of the multimedia file can be verified by a separate system program, that is, by subsequently performing a blacklist search step (see the reference numeral of FIG. 5). (d) ")'s whether the target file corresponds to the -file included in the blacklist (bl); an archive encryption check step (see reference numeral "420") of Figure 5 to check whether the target file itself passes through a key Encrypted;

與一有害多媒體DB搜尋步驟(參見圖5的參考數字”43〇”), 以決定目標檔案是否對應於在有害多媒體db中包括的— 檔案。當目標檔案已決^為-有害多媒體檔案時,可阻斷 使用目標檔案,且更佳地係,此阻斷歷史可記錄在使用者 電腦中’所以可提供-更準確與有效率的有害多媒體標案 使用阻斷功能。此外,當-多媒體檔案在為最後步驟的有 害多媒體DB搜尋步驟43〇中係決定為一有害多媒體樓案 時’可阻斷使用者使用擋案’且同時,程序會分路到分支 點"F",如圖5所示’因為多媒體標案尚未加密,以致於多 媒體檔案會經受一分離檔案加密步驟50〇。 同時,如圖5所示’較佳地係,在加密有害多媒體檔案 的檔案加密步驟500之後’ #由將有害多媒體檔案的資料 新增在使用者電腦中個別存在的黑名單(BL),更新黑名單 (BL)的一黑名單新增步驟55〇可執行,以致於當再次使用 有害多媒體檔案時’可报快阻斷使用該有害多媒體槽案。 雖然圖4和5顯示電子郵件住址清單搜尋步驟4〇〇w與里 名單搜尋步驟4H)係連續執行的情況,但是兩步驟可同: 127849.doc -16 - 200837601 執行。 在相對於檔案加密步驟之更多細節中,較佳地係,就在 存在於使用者電腦中的一多媒體檔案係決定為一有害多媒 體槽案之後,藉由一檔案系統過濾驅動器(FSFD)而在一核 心模式中加密多媒體檔案,其中該驅動器係可控制一槽案 系統的一驅動器。更佳地係,對應的多媒體檔案在一秘鑰 方案可為一加密之檔案,以致於在不配備有實施本發明系 統(包括一程式)的一電腦中,不可能解密對應的多媒體檔 案在此h况中,由於加密的槽案不能使用在不配備有系 統的電腦中,所以不可能使用加密的檔案,即使加密的槽 案已傳輸至一不同電腦,藉此避免對應的檔案重新分佈。 同時,在已安裝實施根據本發明之方法的系統之電腦 中,使用權限透過一認證碼而提供。在此情況,當獲得使 用權限的使用者(已在一管理者模式中登入之監護人(例 如,父母))嘗試使用一加密的有害多媒體檔案時,較佳地 係,額外執行一即時解密再生步驟6〇〇,如圖2所示,以致 於使用者可正f使精應㈣案。當少年男孩或女孩嘗試 使用有害多女某體檔案及記錄阻斷的歷纟時,A功能可阻斷 使用一有害多媒體檔案。因此,當像父母之監護人檢查阻 斷的歷史時’ t 4人可識別哪個播案因其有害的原因而阻 斷使用。此識別程序可透過即時解密達成,其中解密係在 使用FSFD的核心模式中執行,其係類似在槽案加密步驟 中可控制檔案系統的驅動器。 根據本發明的另一不範性具體實施例,當加密一有害多 127849.doc 200837601 媒體檔案時,例如一浮 案。識別碼可用來決定一 p的預定識別碼可插入加密的檔 害多媒體檔案的步驟=多媒體播案是否已在檢查有 用,不在一使用 氆。同時,識別碼可以此方式使 顯示),而安I^ 識別碼決疋單元(未在圖 信線上識:有害多二^^ 案。較佳地係,複數個、田’、纟限制使用有害多媒體檔 在此㈣,雖:::::可插入-有害多媒體檔案。 段傳送,但是識糾播係分成多片段,且逐片 輸狀熊 B 、疋早7°可決定有害多媒體檔案的傳 ^ 於其可提供優越的阻斷功能。 且發明,可克服習知有害多媒體收集技術的限度, 。夕媒體DB可額外更新,即使相對於未透過網際網 W的有害多媒體檔案’且只儲存在一使用者電腦,以 其可提供更有效率限制有害多媒體檔案使用的功能。 。s夺才艮據本發明,藉由根據每一使用者電腦來建構及 操作:黑名單與一電子郵件住址清單,由於安裝的有害多 :體檔案使用限制系統’所以可最小化一使用者電腦知性 月b衰減現象。此外’由於一使用者電腦所識別的一有害多 媒體檔案已加密’所以變得不可能使用有害多媒體播案, 即使有害多媒㈣案透過網際網路或另-實體構件重新分 佈至另一電腦,藉使避免有害多媒體檔案散佈。同時,加 始、時,藉由插入一預定識別碼,可透過網際網路通信線主 動地控制傳輸此加密檔案。 隨著前述的結果,父母可准許他們較小的兒子與女兒以 127849.doc -18 · 200837601 平靜心情來使用網際網路,且少年㈣和女孩可避免由於 輕率使用有害多媒體内容的傷害,且具有一健全與健康的 觀念。此外,可減少佔用大量網路的有害多媒體標案的流 量,以致於使一全國性有效率與成效的網路基礎架構更安 全0 雖然本發明的較佳具體實施例是為了說明目的而描述, 但是熟諳此技術者可明白各種修改、添加及替代可達成, 而不致脫離文後申請專利範圍中所說明的本發明之範疇及 精神。因此,應該瞭解上述具體實施例不是限制而:說 明。 因此,本發明的精神與範疇必須不是透過描述的具體實 施例加以定義,而是透過文後申請專利範圍及其類似加以 定義。 【圖式簡單說明】 本發明的上述及其它目標及特徵可從下面連同附圖的詳 細說明而更明白,其中: 圖1A描述根據本發明的一示範性具體實施例之一方法步 驟之流程; 圖1B描述根據本發明的一示範性具體實施例除圖丨步驟 之外,包括一解密/再生步驟之一方法步驟之流程; 圖2描述根據本發明的一示範性具體實施例包括一電子 郵件住址β單建構步驟的一方法之流程; 圖3描述根據本發明的一示範性具體實施例之一系統組 態支方塊圖,其中一伺服器(即一遠端系統)係建構及更新 127849.doc -19- 200837601 一有害多媒體DB,且一使用者電腦係建構一黑名單與一 電子郵件住址清單; 圖4描述決定在一使用者電腦中使用的一多媒體檔案是 否對應於一有害多媒體檔案之一程序之流程;及 圖5示意性描述根據本發明的各種示範性具體實施例方 法之流程。A search step with a harmful multimedia DB (see reference numeral 43 of FIG. 5) is used to determine whether the target file corresponds to the file included in the harmful multimedia db. When the target file has been determined to be a harmful multimedia file, the target file can be blocked and, more preferably, the blocking history can be recorded in the user's computer - so it can be provided - more accurate and efficient harmful multimedia The standard uses the blocking function. In addition, when the multimedia file is determined to be a harmful multimedia building in the harmful multimedia DB search step 43 of the last step, the 'block user can use the file' and at the same time, the program will branch to the branch point "F", as shown in Figure 5, because the multimedia file is not encrypted, so that the multimedia file will undergo a separate file encryption step. At the same time, as shown in FIG. 5, 'preferably, after the file encryption step 500 of encrypting the harmful multimedia files', the information of the harmful multimedia files is newly added to the blacklist (BL) existing in the user's computer, and updated. A blacklist of blacklists (BL) adds a step 55 to be executable, so that when the harmful multimedia file is used again, the use of the harmful multimedia slot can be blocked. Although Figures 4 and 5 show the case where the email address list search step 4〇〇w and the list search step 4H) are continuously performed, the two steps can be performed as follows: 127849.doc -16 - 200837601 Execution. In more detail with respect to the file encryption step, preferably, after a multimedia file stored in the user's computer is determined to be a harmful multimedia slot, a file system filter driver (FSFD) is used. The multimedia file is encrypted in a core mode in which the drive controls a drive of a slot system. More preferably, the corresponding multimedia file can be an encrypted file in a key scheme, so that in a computer not equipped with the system (including a program) for implementing the present invention, it is impossible to decrypt the corresponding multimedia file. In this case, since the encrypted slot cannot be used in a computer that is not equipped with a system, it is impossible to use the encrypted file even if the encrypted slot has been transmitted to a different computer, thereby avoiding the corresponding file redistribution. At the same time, in a computer on which a system embodying the method of the present invention has been installed, usage rights are provided through an authentication code. In this case, when the user who has obtained the usage right (the guardian (for example, the parent) who has logged in in the administrator mode) attempts to use an encrypted harmful multimedia file, it is preferable to additionally perform an instant decryption regeneration step. 6〇〇, as shown in Figure 2, so that the user can make a fine (4) case. The A function blocks the use of a harmful multimedia file when a teenager boy or girl attempts to use a harmful multi-girl file and records the blocked history. Therefore, when the guardian of the parent checks the history of the obstruction, it can be identified which one of the broadcasts is blocked for its harmful reasons. This identification procedure can be achieved by instant decryption, where decryption is performed in a core mode using FSFD, which is similar to the drive that controls the file system in the slot encryption step. According to another non-exclusive embodiment of the present invention, when a harmful media file is encrypted, for example, a buoy. The identification code can be used to determine the step in which a predetermined identification code of a p can be inserted into an encrypted file. If the multimedia broadcast is already in use, it is not used. At the same time, the identification code can be displayed in this way, and the identification code is determined by the unit (not recognized on the line of the letter: harmful more than two ^^ cases. Preferably, multiple, Tian', 纟 restricted use harmful The multimedia file is here (4), although::::: can be inserted - harmful multimedia files. Segment transmission, but the identification and correction system is divided into multiple segments, and the bearer B, the 7° early can determine the transmission of harmful multimedia files. ^ It can provide superior blocking functions. It can be overcome to overcome the limitations of the conventional harmful multimedia collection technology. The media DB can be updated additionally, even if it is stored in the harmful multimedia files that are not transmitted through the Internet. A user computer that provides a more efficient function of limiting the use of harmful multimedia files. According to the present invention, it is constructed and operated according to each user's computer: a blacklist and an email address list. Because the installation is more harmful: the file file usage restriction system' can minimize the user's computer knowledge month b attenuation phenomenon. In addition, because a user's computer recognizes a harmful multimedia file has been added It is impossible to use harmful multimedia broadcasts, even if the harmful multimedia (4) case is redistributed to another computer through the Internet or another physical component, so as to avoid the spread of harmful multimedia files. By inserting a predetermined identification code, the encrypted file can be actively controlled to be transmitted through the Internet communication line. With the foregoing results, the parents can permit their younger son and daughter to calm down with 127849.doc -18 · 200837601 Using the Internet, and teenagers (4) and girls can avoid the harm of using harmful multimedia content rashly, and have a sound and healthy concept. In addition, the traffic of harmful multimedia standards occupying a large number of networks can be reduced, so that one Nationally efficient and effective network infrastructure is more secure. Although the preferred embodiments of the present invention have been described for illustrative purposes, those skilled in the art will appreciate that various modifications, additions and substitutions can be made without departing from the context. The scope and spirit of the invention described in the scope of the following patent application. Therefore, it should be understood that the above specific The scope of the present invention is not limited by the specific embodiments described, but is defined by the scope of the claims and the like. The other objects and features will be more apparent from the following detailed description of the drawings, wherein: FIG. 1A depicts a flow of method steps in accordance with an exemplary embodiment of the present invention; FIG. 1B depicts an exemplary embodiment in accordance with the present invention. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS In addition to the steps of the figure, a flow of one of the method steps of a decryption/regeneration step is included; FIG. 2 depicts a flow of a method including an e-mail address β single construction step in accordance with an exemplary embodiment of the present invention. FIG. 3 depicts a system configuration branch diagram in accordance with an exemplary embodiment of the present invention, wherein a server (ie, a remote system) is constructed and updated 127849.doc -19-200837601 a harmful multimedia DB, And a user computer system constructs a blacklist and an email address list; Figure 4 depicts the decision to use in a user's computer. Whether a multimedia file corresponds to a procedure of a program of a harmful multimedia file; and Figure 5 schematically depicts a flow of various exemplary embodiments of the present invention.

127849.doc -20-127849.doc -20-

Claims (1)

200837601 十、申請專利範圍: 1 · 一種用以限制使用一有害 含: 多媒體檔案之方法 該方法包 一有害多媒體DB建構步驟,其可驗證經由網際網路收 术的母個夕媒體檔案是否對應於一有害多媒體檔案;擷 取用以識別該有害多媒體權案的識別符與元資訊;及將 該等擷取的識別符與元資訊儲存在-伺服ϋ的DB;200837601 X. Patent application scope: 1 · A method for restricting the use of a harmful inclusion: multimedia file The method includes a harmful multimedia DB construction step, which can verify whether the parental media file via the Internet corresponds to a harmful multimedia file; extracting identifiers and meta-information for identifying the harmful multimedia rights; and storing the retrieved identifiers and meta-information in a -serving DB; -有害多媒體DB傳輸步驟,其可將在該有害多媒體 DB建構步驟中建構的該有害多媒體μ傳送至__使用者 電腦; 一逐使用者黑名單建構步驟,其可搜尋在該使用者電 腦中的多媒體樓案、將該搜尋的多媒體檔案與該有害多 媒體DB相比較、並建構_黑名單,其係該有害多媒體播 案的清單;及 一有害多媒體檔案使用阻斷步驟,其可將在該使用者 電細中由使用者使用的一多媒體檔案依序與逐使用者黑 名單與有害多媒體DB相比較,且當該多媒體檔案對應於 一有害多媒體檔案時,可阻斷該多媒體檔案之使用; 其中该逐使用者黑名單建構步驟與該有害多媒體檔案 使用阻斷步驟之至少一者係包含··一有害多媒體檔案加 密步驟’其可將該有害多媒體檔案加密及儲存在該使用 者電腦,以致於避免該有害多媒體檔案由不同使用者進 行分佈或使用,及一槽案加密檢查步驟,其可檢查一加 密的目標檔案是否在一黑名單搜尋步驟與一有害多媒體 127849.doc 200837601 Β搜尋步驟之間進一步執杆 該右金夕 仃,其中該等兩步驟係包括在 ^ 〇夕媒體檔案使用阻斷步驟。 2·如凊求項1之方法,其進_ +勺 在 V3該將至少一識別碼插 在有害多媒體檔案加密舟駿^ 3如二主七 千刀"步驟中加密的檔案之步驟。 •如明求項2之方法,其中_巧 少一 少 識別碼決疋單元可決定該至 為別碼係安裝在一檔案傳輸線。 4·如請求項3之方法,盆中奸λ ‘ ^ ψ . ^ ' ,、插入在有害多媒體檔案加密步 碼,:在的二案的該至少之一識別碼包含複數個識別 及傳二t於當该加密的有害多媒體檔案分成複數個片段 及傳輸時,每個個分開 而識別。 了稭由该決疋的碼決定單元 5 ·如請求項1至4中任一頊夕 乡、 法,其進一步包含該在有害 良认此 田已通過使用者電腦認證程 序的使用者想要重製該加密 及舌制兮丄—士 在頁。夕媒體檔案時,可解密 6. 及重製該加欲有害多媒體檔案之步驟。 如請求項1至4中任一須夕古、土 、 法,其中在有害多媒體檔案 加始、步驟中,該有害多媒 案精由一樓案系統過濾 馬£動裔(FSFD)在一核心模式中 ,^ 、中力山,其中一秘鑰係用於 加密。 8· :請求項5之方法’其中該在有害多媒體檔案加密步驟 :力二有害多t體檔案密及在該有害多媒體檔案解密與 乂驟中解雄、係藉由-檔案系統過濾驅動器(FSFD) 在一核心模式中執行,其中一秘鑰係用於加密及解密。 -種用於限制使用—有害多媒體檔案之方法,該方法包 127849.doc 200837601 含: 一有害多媒體DB建構步驟,其可驗證經由網際網路收 集的每個夕媒體4虽案是否對應於一有害多媒體檔案,·擷 取用於識別有害多媒體檔案的識別符與元資訊;及將該 等擷取的識㈣與元資訊儲存在—储器的別; 有口夕媒體DB傳輸步驟,其可將該有害多媒體dB 建構步驟中建構的該有害多媒體DB傳送至一使用者電 腦; -逐使用者黑名單建構步驟,其可搜尋在該使用者電 細中的,亥多媒體檔案,將該搜尋的多媒體檔案與該有害 多媒體DB相比較,並建構一黑名單,其係該有害多媒體 檔案的清單;及 一有害多媒體檔案使用阻斷步驟,其可將在該使用者 電腦中由使用者使用的一多媒體檔案依序與該逐使用者 黑名單和該有害多媒體DB相比較,且當該多媒體檔案對 應於一有害多媒體檔案時,可阻斷該多媒體檔案之使 用; 其中4逐使用者黑名單建構步驟與有害多媒體槽案使 用阻斷步驟的至少之一步驟包含一有害多媒體檔案加密 步驟,其可將該有害多媒體檔案加密及儲存在該使用者 電腦中,以致於避免該有害多媒體檔案由不同使用者進 行分佈或使用;及 其中該方法進一步包含:一逐使用者電子郵件住址清 單建構步驟,其可透過在該使用者電腦中的該多媒體槽 127849.doc 200837601 案之—搜尋而建構-電子郵件住址清單,其係無害多媒 體檔案的清單、以及該逐使用者黑名單建構步驟;及一 無害多媒體檔案使用瞬時許可步驟,其中在執行該逐使 用者=單建構步驟之前,當透過該逐❹者電子郵件 v月單t搜尋n亥多媒體檔案係—無害多媒體 檔案時’立即允許使用在使用者電腦中所使 體檔案。 呆 f 9.如:求項8之方法,其中一檔案加密檢查步驟,其可檢 查一已加密的目標檔案是否在—黑名單搜尋步驟鱼―: 害多媒體DB搜尋步驟之間進一步執行,其中該等兩步驟 係包括在該有害多媒體檔案使用阻斷步驟。 1如清求項8之方法’其進—步包含將至少_識別碍插入 在該有害多媒體檔案加密步驟中加㈣該播案之 驟。 ’夕 η.如請求項Π)之方法,其中一識別碼決定單元可決定 少一識別碼係安裴在一檔案傳輸線。 χ 12·如:求項8之方法,其進一步包含該在有害多媒 加被步驟之後,當該加密有害多媒體檔案欲在管理者模 式中重製時’解密及重製該加密有害多媒體檔案的—牛 驟,其係通過使用者電腦的一認證程序。 13.如凊求項8至11中任—項之方法,其中該在有害多媒 檔案加密步驟中’該有害多媒體檔案係藉由__檔宰系 過壚驅動器(FSFD)在—核心模式中加密,其中—秘射 用於加密。 1糸 127849.doc 200837601 14 ·如請求項j 2之方, … 长其中在該有害多媒體檔案加密步驟 力—亥有害多女某體槽案及在該冑害多女某體槽案解密與 v驟中解密係、藉由m纟統m動器(fsfd) 在核〜权式中執行,其中一秘输係用於加密及解密。 1 5 · —種用以限制佶 七令办 便用一有害多媒體檔案之方法,該方法包 含: 有《夕媒體DB建構步·驟,其可驗證經由網際網路收 集的每個夕媒體檔案是否對應於一有害多媒體檔案、擷 取用於識別有害多媒體擋案的識別符與元資訊;及將該 榻取的識別符與元資訊儲存在-飼服器的D Β ; 一有害多媒體DB傳輸步驟,其可將在該有害多媒體 DB建構步驟中建構的有害多媒體db傳送給一使用者電 腦; 一逐使用者黑名單建構步驟,其可搜尋在該使用者電 腦中的多媒體檔案;將該搜尋的多媒體檔案與該有害多 媒體DB相比較;及建構一黑名單,其係該有害多媒體槽 案的一清單;及 一有害多媒體檔案使用阻斷步驟,其可欲在使用者電 月®中由使用者使用的一多媒體檔案依序與該逐使用者黑 名單和該有害多媒體DB相比較,且當該多媒體檔案對應 於一有害多媒體檔案時,可阻斷多媒體檔案之使用; 其中4逐使用者黑名單建構步驟、與該有害多媒體檔 案使用阻斷步驟的至少一步驟係包含一有害多媒體槽案 加密步驟,其可將該有害多媒體檔案加密及儲存在使用 127849.doc 200837601 者電腦中,以致於避免有害多媒體檔案由不同使用者進 行流通或使用;及 該方法進一步包含: -驗證資料產生與傳輸步驟,其藉由使用者電腦從 儲存在使用者電腦中的每個多媒體檔㈣取肖⑼_ 別的一識別符;從該儲存多媒體檔案之各個擷取一螢二 訊框與元資訊的至少之-;及傳送該擷取的識別符與— 螢幕訊框和元資訊的至少之—至該伺服器;及 、·,/ ^ 丹1驗證 儲存在使用者電腦中的每個多媒體檔案是否㈣ 擋案的驗證資料而對應於一有害多媒體檔案,其透過認 迅貝料產生與傳輸步驟而從使用者電腦傳送;及根據亇 個多媒體檔案是否對應於—有害多媒體檔案,更新儲: 在伺服器中的有害多媒體DB或儲存在該使用者電腦中的 该電子郵件住址清單。 16. 17. 18. 19. ::求項15之方法’其中一播案加密檢查步驟,其可檢 一-已加密的目標權案是否在一黑名單搜尋步驟斑一有 體DB搜尋步驟之間進一步執行,其中該等兩步驟 糸匕括在有害多媒體檔案阻斷步驟。 Γ::?15之方法,進一步包含將至少-識別碼插入在 :夕媒體檔案加密步驟中加密的該檔案之一步驟。 少Ltr之方法,其卜識別料定單元可決定該至 歲別碼係安裴在一檔案傳輸線。 如叫求们5之方法’其進—步包含該在有害多媒體棺案 127849.doc 200837601 加密步驟之後,當該加密有害多媒體檔案欲在—管理者 模式中重製時,可解密及重製該加密有害多媒體檔案之 一步驟,其已通過在該使用者電腦中的一認證程序9 ” 20.如請求項15至18中任-項之方法,其中該在有害多㈣ 檔案加密步驟中’有害多媒體檔案係藉由一 濾驅動器(FSFD)在一核心模式中加检孫: 於加密。 八T秘鑰係用 2 1 ·如請求項19之士、也 4+丄 彳法’其中該在有害多媒體加密步驟中加 =广媒體檔案密與在有害多媒體檔案 步驟中解密係M 、 ’、错由一檔案系統過濾驅動器(FSFD)在一核 心模式中執杆 ^ ’其中一秘鑰係用於加密及解密。 127849.doca harmful multimedia DB transmission step, which can transmit the harmful multimedia μ constructed in the harmful multimedia DB construction step to the user computer; a user-by-user blacklist construction step, which can be searched in the user computer a multimedia building, comparing the searched multimedia file with the harmful multimedia DB, and constructing a blacklist, which is a list of the harmful multimedia broadcasts; and a harmful multimedia file use blocking step, which can be The multimedia file used by the user in the user's power is sequentially compared with the user-by-user blacklist and the harmful multimedia DB, and when the multimedia file corresponds to a harmful multimedia file, the use of the multimedia file can be blocked; The at least one of the user-by-user blacklist construction step and the harmful multimedia file use blocking step includes a harmful multimedia file encryption step of encrypting and storing the harmful multimedia file on the user computer. To avoid the distribution or use of the harmful multimedia files by different users, and a slot encryption check a step of checking whether an encrypted target file is further engaged between a blacklist search step and a harmful multimedia 127849.doc 200837601 Β search step, wherein the two steps are included in the 〇 〇 The media file uses a blocking step. 2. If the method of requesting item 1 is in the _ + spoon, in V3, the step of inserting at least one identification code into the encrypted file in the harmful multimedia file encryption Zhou Jun ^ 3 such as the two main seven thousand knives " steps. • The method of claim 2, wherein the _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 4. According to the method of claim 3, the traits λ ' ^ ψ . ^ ' , inserted in the harmful multimedia file encryption step code, the at least one of the identification codes in the second case contains a plurality of identification and transmission two t When the encrypted harmful multimedia file is divided into a plurality of segments and transmitted, each is identified separately. The stalk is determined by the code of the decision unit. 5. If any of the claims 1 to 4 is 顼 乡, the law further includes the user who is in the harmful recognition that the field has passed the user computer authentication program wants to be heavy The encryption and tongue-in-law are on the page. In the case of the media archive, you can decrypt 6. and reproduce the steps to add harmful multimedia files. For example, in any of the requirements of items 1 to 4, the ancient, the earth, and the law, in which the harmful multimedia file is added, the harmful multi-media case is filtered by the first-floor system to filter the horses (FSFD) in a core. In the mode, ^, Zhonglishan, one of the keys is used for encryption. 8: The method of claim 5 'The method of encrypting the harmful multimedia files: the second is harmful and the file is encrypted and decrypted in the harmful multimedia file, and the file system is filtered by the file system (FSFD) Executed in a core mode, one of which is used for encryption and decryption. - A method for restricting the use of harmful multimedia files, the method package 127849.doc 200837601 contains: a harmful multimedia DB construction step that verifies whether each of the eve media 4 collected via the Internet corresponds to a harmful a multimedia file, which captures identifiers and meta-information for identifying harmful multimedia files; and stores the extracted knowledge (4) and meta-information in a storage device; The harmful multimedia DB constructed in the harmful multimedia dB construction step is transmitted to a user computer; a user-by-user blacklist construction step, which can search for the multimedia file in the user's power, and the searched multimedia Comparing the file with the harmful multimedia DB, and constructing a black list, which is a list of the harmful multimedia files; and a harmful multimedia file use blocking step, which can use a multimedia used by the user in the user computer The file is sequentially compared with the user-by-user blacklist and the harmful multimedia DB, and when the multimedia file corresponds to a harmful The media file can block the use of the multimedia file; wherein at least one of the step of the user blacklist construction step and the harmful multimedia slot use blocking step comprises a harmful multimedia file encryption step, which can The file is encrypted and stored in the user's computer such that the harmful multimedia file is distributed or used by different users; and the method further comprises: a user-by-user email address list construction step, which is The multimedia slot 127849.doc 200837601 in the user computer - search and construction - an email address list, which is a list of harmless multimedia files, and the user-by-user blacklist construction step; and a useless license for a harmless multimedia file a step in which, after performing the user-by-user=single construction step, when searching for the n-Hui multimedia file system--harmless multimedia file through the e-mailer v-ticket, the user is allowed to use the user in the user's computer immediately. file. For example, the method of claim 8, wherein a file encryption checking step can check whether an encrypted target file is further executed between the blacklist search step and the multimedia multimedia search step, wherein the file is encrypted. The two-step process is included in the blocking step of the harmful multimedia file. 1 The method of claim 8 includes the step of inserting at least the identification into the harmful multimedia file encryption step and adding (4) the broadcast. In the method of the present invention, the identification code determining unit may determine that one less identification code is installed on a file transmission line. Χ12. The method of claim 8, further comprising: after decrypting and re-creating the encrypted harmful multimedia file, when the encrypted harmful multimedia file is to be reproduced in the manager mode after the harmful multimedia addition step - Cattle, which is an authentication procedure through the user's computer. 13. The method of any of clauses 8 to 11, wherein in the harmful multimedia file encryption step, the harmful multimedia file is in a core mode by means of a __ 宰 垆 垆 垆 (FSFD) Encryption, where - secret shots are used for encryption. 1糸127849.doc 200837601 14 ·If the request item j 2 side, ... long in the harmful multimedia file encryption step force - Hai harmful more female body trough case and in the smashing more female body trough case decryption and v The decryption system is executed by the m-system (fsfd) in the core-weight mode, and the secret system is used for encryption and decryption. 1 5 · A method for restricting the use of a harmful multimedia file by the Seventh Order Office. The method includes: "The eve of the media DB construction step, which verifies whether each eve media file collected via the Internet is verified. Corresponding to a harmful multimedia file, extracting identifiers and meta-information for identifying harmful multimedia files; and storing the identifier and meta-information of the couch in the D-Β of the feeding device; a harmful multimedia DB transmission step The user can transmit the harmful multimedia db constructed in the harmful multimedia DB construction step to a user computer; a user-by-user blacklist construction step, which can search for the multimedia file in the user computer; The multimedia file is compared with the harmful multimedia DB; and a blacklist is constructed, which is a list of the harmful multimedia slots; and a harmful multimedia file use blocking step, which can be used by the user in the user's electricity month® a multimedia file used is sequentially compared with the user-by-user blacklist and the harmful multimedia DB, and when the multimedia file corresponds to a harmful multimedia In the case, the use of the multimedia file can be blocked; wherein at least one step of the user-by-user blacklist construction step and the blocking step of the harmful multimedia file includes a harmful multimedia slot encryption step, which can The file is encrypted and stored in a computer using 127849.doc 200837601, so as to prevent harmful multimedia files from being circulated or used by different users; and the method further comprises: - verification data generation and transmission steps, which are performed by the user computer Each multimedia file stored in the user's computer (4) takes Xiao (9)_ another identifier; extracts at least one of the flashing frame and meta information from each of the stored multimedia files; and transmits the captured identification And - at least the screen frame and meta-information - to the server; and, ·, / ^ Dan 1 to verify whether each multimedia file stored in the user's computer (4) the verification data of the file corresponds to a harmful Multimedia file, which is transmitted from the user's computer through the process of generating and transmitting the bet; and based on a multimedia file No corresponds to - harmful multimedia file storage update: harmful multimedia DB or stored on the user's computer list in the e-mail address of the server. 16. 17. 18. 19. :: Method of claim 15 'One of the broadcast encryption check steps, which can be checked - whether the encrypted target right is in a blacklist search step, and the physical DB search step Further execution is performed, wherein the two steps are included in the harmful multimedia file blocking step. The method of Γ::15 further includes the step of inserting at least the identification code into the file encrypted in the eve media file encryption step. In the method of less Ltr, the identification unit can determine that the code is installed in a file transmission line. The method of claim 5, which includes the encryption step of the harmful multimedia file 127849.doc 200837601, can be decrypted and reproduced when the encrypted harmful multimedia file is to be reproduced in the manager mode. A step of encrypting a harmful multimedia file, which has passed an authentication procedure in the user's computer 9" 20. The method of any of claims 15 to 18, wherein the harmful multi (four) file encryption step is 'harmful The multimedia file is checked by a filter driver (FSFD) in a core mode: in encryption. The eight-key key is used in 2 1 · as requested in item 19, also 4 + 丄彳 method, which should be in harmful multimedia In the encryption step, the encryption media is encrypted and the decryption system M, ', and the file system filter driver (FSFD) are executed in a core mode. One of the keys is used for encryption and decryption. 127849.doc
TW096150878A 2006-12-29 2007-12-28 Method for restricting use of harmful multimedia file TWI365393B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020060138921A KR100753798B1 (en) 2006-12-29 2006-12-29 Method for restricting use of harmful multimedia file

Publications (2)

Publication Number Publication Date
TW200837601A true TW200837601A (en) 2008-09-16
TWI365393B TWI365393B (en) 2012-06-01

Family

ID=38615877

Family Applications (1)

Application Number Title Priority Date Filing Date
TW096150878A TWI365393B (en) 2006-12-29 2007-12-28 Method for restricting use of harmful multimedia file

Country Status (4)

Country Link
KR (1) KR100753798B1 (en)
CN (1) CN101606148B (en)
TW (1) TWI365393B (en)
WO (1) WO2008082209A1 (en)

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7190470B2 (en) * 2001-04-05 2007-03-13 Hewlett-Packard Development Company, L.P. System and method for automatic document verification
KR20020093276A (en) * 2001-06-07 2002-12-16 삼성전자 주식회사 Child-lock apparatus of signal play system and method thereof
KR20030004475A (en) * 2001-07-05 2003-01-15 (주)타잔테크놀로지 System to cut children off from harmfum Internet sites and to search the Internet sites
KR20030019055A (en) * 2001-08-29 2003-03-06 박정수 Device for blocking access of adult or hurtful web sites
KR100628306B1 (en) * 2004-09-30 2006-09-27 한국전자통신연구원 Method and apparatus for preventing of harmful P2P traffic in network
CN100367294C (en) * 2005-06-23 2008-02-06 复旦大学 Method for dividing human body skin area from color digital images and video graphs

Also Published As

Publication number Publication date
TWI365393B (en) 2012-06-01
KR100753798B1 (en) 2007-08-31
CN101606148A (en) 2009-12-16
CN101606148B (en) 2011-08-03
WO2008082209A1 (en) 2008-07-10

Similar Documents

Publication Publication Date Title
CN107480555B (en) Database access authority control method and device based on block chain
CA2603460C (en) Media file disbribution system and method
US20020152261A1 (en) Method and system for preventing the infringement of intellectual property rights
US20020152262A1 (en) Method and system for preventing the infringement of intellectual property rights
US7237268B2 (en) Apparatus and method for storing and distributing encrypted digital content and functionality suite associated therewith
US9906509B2 (en) Method for offline DRM authentication and a system thereof
US8112474B2 (en) System, apparatus, and program for distributing incidental content
US20020077986A1 (en) Controlling and managing digital assets
US20090316894A1 (en) Method and apparatus for checking consistency between digital contents
EP2020108A2 (en) System and method for drm translation
JP2013511771A (en) Method and apparatus for document sharing
US20120260096A1 (en) Method and system for monitoring a secure document
CN107528865A (en) The method for down loading and system of file
CN114707043B (en) File management method and system based on meta-universe block chain technology
KR20110102879A (en) Electronic file sending method
JP4619046B2 (en) Original content generation device and derivative content generation device
US20070266155A1 (en) Content Use Management System, Content-Providing System, Content-Using Device and Computer Readable Medium
JP2010250760A (en) File storage system, server device, and program
JP2009524865A (en) Managing electronic documents
KR100797600B1 (en) Method for restricting use of harmful multimedia file
US20080228900A1 (en) Method and system for facilitating the transfer of a computer file
US9825763B2 (en) Systems for automated forensic data capture
TW200837601A (en) Method for restricting use of harmful multimedia file
JP4906739B2 (en) How to protect rights file descriptions
US11977644B2 (en) Systems and methods for remote ownership and content control of media files on untrusted systems

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees