WO2008082209A1 - Method for restricting use of harmful multimedia file - Google Patents

Method for restricting use of harmful multimedia file Download PDF

Info

Publication number
WO2008082209A1
WO2008082209A1 PCT/KR2007/006975 KR2007006975W WO2008082209A1 WO 2008082209 A1 WO2008082209 A1 WO 2008082209A1 KR 2007006975 W KR2007006975 W KR 2007006975W WO 2008082209 A1 WO2008082209 A1 WO 2008082209A1
Authority
WO
WIPO (PCT)
Prior art keywords
harmful
multimedia file
file
user
harmful multimedia
Prior art date
Application number
PCT/KR2007/006975
Other languages
French (fr)
Inventor
Ki-Hyun Lee
Jung-Hoon Shin
Sang-Kwon Jung
Sang-Wan Kim
Original Assignee
Planty-Net Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Planty-Net Co., Ltd. filed Critical Planty-Net Co., Ltd.
Priority to CN2007800487260A priority Critical patent/CN101606148B/en
Publication of WO2008082209A1 publication Critical patent/WO2008082209A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8352Generation of protective data, e.g. certificates involving content or source identification data, e.g. Unique Material Identifier [UMID]

Abstract

Disclosed is a method for restricting use of a harmful multimedia file, the method including: a harmful multimedia DB construction step of verifying if each multimedia file collected via Internet corresponds to a harmful multimedia file, extracting identifiers and meta-information for identifying harmful multimedia files, and storing the extracted identifiers and meta-information in a DB of a server; a harmful multimedia DB transmission step of transmitting the harmful multimedia DB constructed in the harmful multimedia DB construction step to a user computer; a user-by-user blacklist construction step of searching multimedia files in the user computer, comparing the searched multimedia files with the harmful multimedia DB, and constructing a blacklist, which is a list of harmful multimedia files; and a harmful multimedia file use blocking step of comparing a multimedia file to be used in the user computer by a user with the user- by-user blacklist and the harmful multimedia DB in sequence, and blocking the use of the multimedia file when the multimedia file corresponds to a harmful multimedia file, wherein a harmful multimedia file encryption step of encrypting and storing the harmful multimedia file in the user computer is further performed.

Description

Description
METHOD FOR RESTRICTING USE OF HARMFUL
MULTIMEDIA FILE
Technical Field
[1] The present invention relates to a method for restricting the use of harmful multimedia files (e.g. harmful moving picture files), and more particularly to a method for enabling a harmless moving picture to be more quickly used (e.g. reproduced) and enabling a harmful moving picture to be accurately restricted from being used, through a search of a pre-constructed harmful moving picture DB, a user-by-user blacklist, and/ or a user-by-user whitelist when a moving picture file in a user computer is to be used, and for encrypting harmful moving picture files registered in the blacklist so that the harmful moving picture files cannot be used in other user computers where a system according to the present invention has not been installed, thereby preventing the harmful moving picture files from being redistributed. Background Art
[2] A conventional method widely used to restrict the use of harmful multimedia files in a user computer is implemented in such a manner that a specific provider or system constructs a harmful multimedia DB by collecting harmful multimedia files distributed on the Internet and extracting eigenvalues from the harmful multimedia files, the constructed harmful multimedia DB is installed in a user computer, and when it is determined that a file to be used in the user computer corresponds to a file registered in the installed harmful multimedia DB, the use of the file is restricted. According to such a conventional method, since it is possible to construct a DB for only harmful multimedia files distributed on the Internet, there is a problem in that harmful multimedia files which are not distributed on the Internet or which are difficult to collect can be still used without restriction.
[3] Meanwhile, another conventional method for blocking harmful moving pictures, for example, a method disclosed in Korean Patent Registration Publication No. 10-0517645, is implemented in such a manner as to search for harmful contents distributed on the Internet, to extract hash values of harmful contents from all or a part of the searched harmful contents, to construct a harmful contents DB, to send the constructed harmful contents DB to a user computer, to extract a hash value from all or a part of a file to be transmitted, edited, and/or reproduced (executed) in the user computer, to compare the hash value of the file with the hash values of harmful contents in the harmful contents DB, and when the file corresponds to harmful contents, to stop transmitting or executing the file and/or to delete the file. According to such a conventional technology, whenever the user computer is to reproduce, for example, a moving picture file by driving an execution program, such as a moving picture reproduction program, it is necessary to extract, from the file, a hash value regarded as a peculiar value of the file, to compare the extracted hash value with all hash values in the harmful contents DB, and to determine if the file corresponds to a file registered in the harmful contents DB. In addition, according to the conventional technology, even a harmless moving picture must always wait a predetermined period of time before it is normally reproduced. Generally, moving picture files reproduced in a user computer include much more harmless moving picture files than harmful moving picture files, and the reproduction frequency of harmless moving picture files is much higher than that of harmful moving picture files. Therefore, it is very inefficient to search the entire harmful moving picture DB whenever a moving picture file is to be reproduced.
[4] As described above, according to the conventional technology, when a harmful moving picture file is used, either a method of forcibly terminating a process, such as a moving picture reproduction program using the file, or a method of deleting the file, is used. When a harmful moving picture blocking technology is implemented in the form of commercial service, the method of forcibly terminating a corresponding process is mainly used. In this case, generally, a harmful moving picture file is permitted to be used when an appropriate authentication procedure has been successfully completed (e.g. a guardian mode or supervisor mode) in order to check a record of access to the harmful moving picture file. However, in this case, although a harmful moving picture file is verified, the harmful moving picture file is not deleted from the user computer and remains therein as it is. Therefore, when such a harmful moving picture file, which is not deleted and is remained, is transferred through disc copy or the like to another computer not equipped with a harmful moving picture blocking function, the harmful moving picture file can be used without any restriction, so that there is a limit in actively blocking even a file verified as a harmful moving picture file from being redistributed.
Disclosure of Invention Technical Problem
[5] Accordingly, the present invention has been made to solve the above-mentioned problems occurring in the prior art, and the present invention provides a verification method for more quickly blocking a file from being used in a user computer when the file corresponds to a harmful multimedia file, and for enabling a file to be used in the user computer as quickly as possible without an excessive time delay for verifying if the file is a harmful multimedia file when the file corresponds to a harmless multimedia file. Also, the present invention provides a method for enabling a central blocking system to actively collect harmful multimedia files which are not distributed through the Internet, but exist in a user computer. In addition, the present invention provides a method for, when the multimedia file is once verified as a harmful multimedia file in a user computer, not only restricting or blocking the use of a multimedia file in the user computer, but also making it impossible to normally use the file even in another computer even if the file has been transferred to another computer, so that the harmful multimedia file is prevented from being redistributed or spread through the Internet, thereby providing a safe Internet environment. Technical Solution
[6] In accordance with an aspect of the present invention, in order to restrict the use of harmful multimedia files in a user computer connected with the Internet, there is provided a method for restricting use of a harmful multimedia file, the method including:
[7] a harmful multimedia DB construction step of verifying if each multimedia file collected via Internet corresponds to a harmful multimedia file, extracting identifiers and meta- information for identifying harmful multimedia files, and storing the extracted identifiers and meta- information in a DB of a server;
[8] a harmful multimedia DB transmission step of transmitting the harmful multimedia
DB constructed in the harmful multimedia DB construction step to a user computer; a user-by-user blacklist construction step of searching multimedia files in the user computer, comparing the searched multimedia files with the harmful multimedia DB, and
[9] constructing a blacklist, which is a list of harmful multimedia files; and a harmful multimedia file use blocking step of comparing a multimedia file to be used in the user computer by a user with the user-by-user blacklist and the harmful multimedia DB in sequence, and blocking the use of the multimedia file when the multimedia file corresponds to a harmful multimedia file,
[10] in which at least one step of the user-by-user blacklist construction step and harmful multimedia file use blocking step includes a harmful multimedia file encryption step of encrypting and storing the harmful multimedia file in the user computer so as to prevent the harmful multimedia file from being distributed to or used by a different user.
[11] In accordance with another aspect of the present invention, the method further includes a step of, after the harmful multimedia file encryption step, decrypting and reproducing the encrypted harmful multimedia file, when the encrypted harmful multimedia file is to be reproduced in an administrator mode, having passed an au- thentication procedure in the user computer.
[12] In accordance with still another aspect of the present invention, the method further includes: a user-by-user whitelist construction step of constructing a whitelist, which is a list of harmless multimedia files, through a search of multimedia files in the user computer, as well as the user-by-user blacklist construction step; and a harmless multimedia file use instant permission step in which use of a multimedia file to be used in the user computer is immediately permitted when the multimedia file has been determined to be a harmless multimedia file, through a search of the user-by-user whitelist before the user-by-user blacklist construction step is performed.
[13] In accordance with still another aspect of the present invention, the method further includes: a verification data generation and transmission step of extracting, by the user computer, an identifier for file identification from each multimedia file stored in the user computer, extracting at least one of a screen frame and meta- information from each of the stored multimedia file, and transmitting the extracted identifier and at least one of a screen frame and meta- information to the server; and
[14] a harmful multimedia DB and user computer update step of verifying if each multimedia file stored in the user computer corresponds to a harmful multimedia file by means of verification data of the multimedia file, which has been transmitted from the user computer through the verification data generation and transmission step, and updating either the harmful multimedia DB stored in the server or the whitelist stored in the user computer according to whether each multimedia file corresponds to a harmful multimedia file.
Advantageous Effects
[15] According to the present invention, the limit of the conventional harmful multimedia file collecting technology is overcome, and the harmful multimedia DB is additionally updated, even with respect to harmful multimedia files which have not been circulated through the Internet and have been stored only in a user computer, so that it is possible to provide a function of more efficiently restricting the use of harmful multimedia files.
[16] Also, according to the present invention, by constructing and operating a blacklist and a whitelist according to each user computer, it is possible to minimize a user computer's performance degradation phenomenon due to the installed harmful multimedia file use restricting system. Furthermore, since a harmful multimedia file identified by a user computer is encrypted, it becomes impossible to use the harmful multimedia file, even if the harmful multimedia file is redistributed to another computer through the Internet or another physical means, thereby preventing the harmful multimedia file from being spread. Also, by inserting a predetermined iden- tification code upon the encryption, it is possible to actively control transmission of such an encrypted file through Internet communication lines.
[17] With the aforementioned effects, parents can allow their minor sons and daughters to use the Internet with an easy mind, and young boys and girls can avoid harm due to the indiscreet use of harmful multimedia contents and can have a sound and healthy idea. In addition, traffic of harmful multimedia files occupying a large amount of network band can be reduced, so that it is possible to secure an efficient and productive network infrastructure nationwide. Brief Description of the Drawings
[18] The above and other objects, features and advantages of the present invention will be more apparent from the following detailed description taken in conjunction with the accompanying drawings, in which:
[19] FIG. 1 is a flowchart illustrating steps of a method according to an exemplary embodiment of the present invention;
[20] FIG. 2 is a flowchart illustrating steps of a method including a decryption/reproduction step, in addition to the steps of FIG. 1, according to an exemplary embodiment of the present invention;
[21] FIG. 3 is a flowchart illustrating a method including a whitelist construction step according to an exemplary embodiment of the present invention;
[22] FIG. 4 is a block diagram illustrating the configuration of a system in which a server (i.e. a remote system) constructs and updates a harmful multimedia DB and a user computer constructs a blacklist and a whitelist according to an exemplary embodiment of the present invention;
[23] FIG. 5 is a flowchart illustrating a procedure of determining if a multimedia file used in a user computer corresponds to a harmful multimedia file; and
[24] FIG. 6 is a flowchart systematically illustrating methods according to various exemplary embodiments of the present invention. Mode for the Invention
[25] Hereinafter, an exemplary embodiment of the present invention will be described with reference to the accompanying drawings.
[26] First, the entire construction of the method according to an exemplary embodiment of the present invention will be described step by step with reference to FIG. 1. According to an exemplary embodiment of the present invention, there is a method for restricting use of a harmful multimedia file, the method includes: a harmful multimedia DB construction step 100 of verifying if each multimedia file collected via Internet corresponds to a harmful multimedia file, extracting identifiers and meta-information for identifying harmful multimedia files, and storing the extracted identifiers and meta- information in a DB of a server; a harmful multimedia DB transmission step 200 of transmitting the harmful multimedia DB constructed in the harmful multimedia DB construction step to a user computer; a user-by-user blacklist construction step 300 of searching multimedia files in the user computer, comparing the searched multimedia files with the harmful multimedia DB, and constructing a blacklist, which is a list of harmful multimedia files; and a harmful multimedia file use blocking step 400 of comparing a multimedia file to be used in the user computer by a user with the user- by-user blacklist and the harmful multimedia DB in sequence, and blocking the use of the multimedia file when the multimedia file corresponds to the harmful multimedia file, in which at least one step of the user-by-user blacklist construction step 300 and harmful multimedia file use blocking step includes a harmful multimedia file encryption step 500 of encrypting and storing the harmful multimedia file in the user computer so as to prevent the harmful multimedia file from being distributed to or used by a different user.
[27] Preferably, as shown in FIG. 2, the method may further include a harmful multimedia file decryption/reproduction step 600 of, after the harmful multimedia file encryption step 500, decrypting and reproducing the encrypted harmful multimedia file, when the encrypted harmful multimedia file is to be reproduced in an administrator mode, having passed an authentication procedure in the user computer.
[28] More preferably, as shown in FIG. 3, the method may further include: a user- by-user whitelist construction step 300W of constructing a whitelist, which is a list of harmless multimedia files, through a search of multimedia files in the user computer, as well as the user-by-user blacklist construction step 300; and a harmless multimedia file use instant permission step 400W in which use of a multimedia file to be used in the user computer is immediately permitted when the multimedia file has been determined to be a harmless multimedia file, through a search of the user-by-user whitelist before the user-by-user blacklist construction step is performed.
[29] Hereinafter, exemplary embodiments of each step included in the methods according to the present invention will be described in more detail with reference to FIGs. 4 to 6.
[30] First, a computer software program, which can be a general means for actually implementing the methods of the present invention through a user computer, is provided to the user computer. In step 100 of constructing a harmful multimedia DB by a server (a remote system from the viewpoint of the user computer) operated by a provider, who constructs and provides the harmful multimedia DB to the user computer, the server may directly collect harmful multimedia files circulated through the Internet in an automatic collection or a manual collection scheme, create (or extract) verification data from the collected multimedia files, and check the verification data, thereby con- structing the harmful multimedia DB, as shown in FIG. 4. In this case, a key value of each file stored in the harmful multimedia DB includes a message digest value extracted from the file, and an identifier is extracted from an appropriate file region so as to minimize collision and to achieve accurate identification. The message digest is a peculiar value of a fixed length, which is obtained by applying a one-way hash function to a given input data, and is a kind of checksum which can be used to check if an original file has been forged. The present invention uses such a message digest value as an identifier of a file, and MD5, SHA-I, HAS-160, etc., are widely known as message digest hash functions, wherein any one of the hash functions can be used for the present invention.
[31] In addition to the method in which the server directly collects harmful multimedia files circulated through the Internet, as described above, step 100 of constructing a harmful multimedia DB according to the method of the present invention may include a method in which, when a specific program implemented according to the method of the present invention is executed in a user computer (e.g. a PC), the specific program creates (e.g. extracts) verification data, such as an identifier or meta-information, from multimedia files (i.e. multimedia files which are not verified as harmful multimedia files) stored in the user computer, and transmits the verification data through the Internet and so on in real time, and the server verifies the verification data, thereby verifying if multimedia files potentially determined to be harmless multimedia files in the user computer actually are harmless, as shown in FIG. 4.
[32] When a multimedia file, which has been classified as a harmless multimedia file through the harmful multimedia DB in the user computer, is verified as a harmful multimedia file according to a result of the verification, the server can update the current harmful multimedia DB to a higher reliability level. This can be implemented by additionally including a step of recording additional data of harmful multimedia files extracted from the user computer in the harmful multimedia DB so as to update the harmful multimedia DB, in the steps of each method according to the embodiments of the present invention. That is, such a step may include a file use permission and verification data transmission step 700, and a harmful multimedia DB and user computer update step 800, as shown in FIG. 6. In the file use permission and verification data transmission step 700, the user computer generates verification data from multimedia files determined to be harmless multimedia files in the user computer, and transmits the generated verification data to the server. In the harmful multimedia DB and user computer update step 800, the server verifies the received verification data, updates a whitelist of the user computer when a multimedia file corresponding to verification data is determined to be a harmless multimedia file, updates the harmful multimedia DB by adding corresponding information to the harmful multimedia DB when a multimedia file corresponding to verification data is determined to be a harmful multimedia file, and transmits the updated harmful multimedia DB to the user computer so that the updated harmful multimedia DB can be downloaded by the user computer. With this, even harmful multimedia files which are not circulated through the Internet can be recorded in the harmful multimedia DB.
[33] According to an exemplary embodiment of the present invention, steps 300 and
300W of constructing a blacklist (BL) and a whitelist (WL) according to each user computer, as shown in FIG. 3, may be implemented, for example, in a caching scheme. Here, the blacklist (BL) represents a list of harmful multimedia files existing in the user computer, and the whitelist (WL) represents a list of harmless multimedia files existing in the user computer, and it is preferred that these lists are formed in a data structure of a hash table. Based on the fact that the number of harmful multimedia files is relatively very small when compared to the total number of multimedia files existing in a user computer, the present invention provides a method of constructing a blacklist for harmful multimedia files, constructing a whitelist for harmless multimedia files, and using these lists before searching the harmful multimedia DB.
[34] As shown in FIGs. 5 and 6, when a multimedia file is to be used in a user computer, first, a whitelist (WL) search step (see reference numeral '400W in FIG. 6) is performed. In this case, when the multimedia file is determined to be a harmless multimedia file included in the whitelist (WL), the use of the multimedia file is immediately permitted while the harmful multimedia file use blocking process is terminated, thereby enabling the harmless multimedia file to be more quickly used. In contrast, regarding a multimedia file which is not included in the whitelist, harmfulness of the multimedia file is verified through a separate systematic process, that is, by sequentially performing a blacklist search step (see reference numeral '410' in FIG. 6) of determining if a target file corresponds to a file included in the blacklist (BL), a file encryption checking step (see reference numeral '420' in FIG. 6) of checking the target file itself has been encrypted by a secret key, and a harmful multimedia DB search step (see reference numeral '430' in FIG. 6) of determining if the target file corresponds to a file included in the harmful multimedia DB. When the target file has been determined to be a harmful multimedia file, the use of the target file is blocked, and more preferably, such a blocking history may be recorded in the user computer so that it is possible to provide a more accurate and efficient harmful multimedia file use blocking function. In addition, when a multimedia file is determined to be a harmful multimedia file in the harmful multimedia DB search step 430, which is the final step, the use of the file by the user is blocked, and simultaneously, the procedure is branched to branch point 'F', as shown in FIG. 6, so that the multimedia file can be subjected to a separate file encryption step 500 because the multimedia file has not yet been encrypted. [35] Meanwhile, as shown in FIG. 6, it is preferred that after the file encryption step 500 of encrypting the harmful multimedia file, a blacklist addition step 550 of updating the blacklist (BL) by adding data of the harmful multimedia file to the blacklist (BL) separately existing in the user computer is performed so that the use of the harmful multimedia file can be quickly blocked when the harmful multimedia file is again used.
[36] Although FIGs. 5 and 6 shows the case where the whitelist search step 400W and the blacklist search step 410 are sequentially performed, the two steps may be performed at the same time.
[37] In more detail with respect to the file encryption step, it is preferred, immediately after a multimedia file existing in the user computer is determined to be a harmful multimedia file, to encrypt the multimedia file in a kernel mode by means of a file system filter driver (FSFD), which is a driver capable of controlling a file system. More preferably, the corresponding multimedia file may be an encrypted file in a secret key scheme, so that it is impossible to decrypt the corresponding multimedia file in a computer not equipped with the system (including a program) implementing the present invention. In this case, since the encrypted file cannot be used in computers not equipped with the system, it is impossible to use the encrypted file even if the encrypted file has been transferred to a different computer, thereby preventing the corresponding file from being redistributed.
[38] Also, in the computer where the system implementing the method according to the present invention has been installed, the rights of use may be provided through an authentication code. In this case, when a user (e.g. a guardian, such as parents, who have logged- in in an administrator mode), having obtained the rights of use, tries to use an encrypted harmful multimedia file, it is preferred to additionally perform a realtime decryption reproduction step 600, as shown in FIG. 3, so that the user can normally use the corresponding file. Such a function blocks the use of a harmful multimedia file when a young boy or girl tries to use the harmful multimedia file, and records the history of the blocking. Accordingly, when a guardian, such as parents, checks the history of the blocking, the guardian can identify which file has been blocked from being used on account of harmfulness thereof. Such an identification process is achieved through realtime decryption, in which the decryption is performed in the kernel mode using the FSFD, which is a driver capable of controlling the file system, like in the file encryption step.
[39] According to another exemplary embodiment of the present invention, when a harmful multimedia file is encrypted, a predetermined identification code, such as a water mark, may be inserted into the encrypted file. The identification code may be used to determine if a harmful multimedia file has been encrypted in a step of checking the harmful multimedia file. Also, the identification code may be used in such a manner as to install an identification code determination unit (not shown) not in a user computer, but in a server on a network, so as to identify harmful multimedia files on communication lines and to restrict the use of the harmful multimedia files. Preferably, a plurality of identification codes may be inserted into one harmful multimedia file. In this case, although a harmful multimedia file is divided into multiple segments and is transmitted segment by segment, the identification code determination unit can determine the transmission state of the harmful multimedia file, so that it is possible to provide a superior blocking function.
[40] Although preferred embodiments of the present invention has been described for illustrative purposes, those skilled in the art will appreciate that various modifications, additions and substitutions are possible, without departing from the scope and spirit of the invention as disclosed in the accompanying claims. Therefore, it should be appreciated that the embodiments described above are not limitative, but only illustrative.
[41] Therefore, the spirit and scope of the present invention must be defined not by described embodiments thereof but by the appended claims and equivalents of the appended claims.

Claims

Claims
[1] A method for restricting use of a harmful multimedia file, the method comprising: a harmful multimedia DB construction step of verifying if each multimedia file collected via Internet corresponds to a harmful multimedia file, extracting identifiers and meta-information for identifying harmful multimedia files, and storing the extracted identifiers and meta-information in a DB of a server; a harmful multimedia DB transmission step of transmitting the harmful multimedia DB constructed in the harmful multimedia DB construction step to a user computer; a user-by-user blacklist construction step of searching multimedia files in the user computer, comparing the searched multimedia files with the harmful multimedia DB, and constructing a blacklist, which is a list of harmful multimedia files; and a harmful multimedia file use blocking step of comparing a multimedia file to be used in the user computer by a user with the user-by-user blacklist and the harmful multimedia DB in sequence, and blocking the use of the multimedia file when the multimedia file corresponds to a harmful multimedia file, in which at least one step of the user-by-user blacklist construction step and harmful multimedia file use blocking step comprises a harmful multimedia file encryption step of encrypting and storing the harmful multimedia file in the user computer so as to prevent the harmful multimedia file from being distributed to or used by a different user, and a file encryption checking step of checking if a target file has been encrypted is further performed between a blacklist search step and a harmful multimedia DB search step, which are included in the harmful multimedia file use blocking step.
[2] The method as claimed in claim 1, further comprising a step of inserting at least one identification code into the file encrypted in the harmful multimedia file encryption step.
[3] The method as claimed in claim 2, wherein an identification code determination unit capable of determining the at least one identification code is installed on a file transmission line.
[4] The method as claimed in claim 3, wherein the at least one identification code inserted into the file encrypted in the harmful multimedia file encryption step comprises a plurality of the identification codes so that when the encrypted harmful multimedia file is divided into a plurality segments and is transmitted, each divided segment can be identified by the determined code determination unit.
[5] The method as claimed in any one of claims 1 to 4, further comprising a step of, after the harmful multimedia file encryption step, decrypting and reproducing the encrypted harmful multimedia file when a user, having passed an authentication procedure in the user computer, wants to reproduce the encrypted harmful multimedia file.
[6] The method as claimed in any one of claims 1 to 4, wherein, in the harmful multimedia file encryption step, the harmful multimedia file is encrypted in a kernel mode by a file system filter driver (FSFD), in which a secret key is used for the encryption.
[7] The method as claimed in claim 5, wherein the encryption of the harmful multimedia file in the harmful multimedia file encryption step and the decryption in the harmful multimedia file decryption and reproduction step are performed in a kernel mode by a file system filter driver (FSFD), in which a secret key is used for the encryption and decryption.
[8] A method for restricting use of a harmful multimedia file, the method comprising: a harmful multimedia DB construction step of verifying if each multimedia file collected via Internet corresponds to a harmful multimedia file, extracting identifiers and meta-information for identifying harmful multimedia files, and storing the extracted identifiers and meta-information in a DB of a server; a harmful multimedia DB transmission step of transmitting the harmful multimedia DB constructed in the harmful multimedia DB construction step to a user computer; a user-by-user blacklist construction step of searching multimedia files in the user computer, comparing the searched multimedia files with the harmful multimedia DB, and constructing a blacklist, which is a list of harmful multimedia files; and a harmful multimedia file use blocking step of comparing a multimedia file to be used in the user computer by a user with the user-by-user blacklist and the harmful multimedia DB in sequence, and blocking the use of the multimedia file when the multimedia file corresponds to a harmful multimedia file, wherein at least one step of the user-by-user blacklist construction step and harmful multimedia file use blocking step comprises a harmful multimedia file encryption step of encrypting and storing the harmful multimedia file in the user computer so as to prevent the harmful multimedia file from being distributed to or used by a different user, and wherein the method further comprises: a user-by-user whitelist construction step of constructing a whitelist, which is a list of harmless multimedia files, through a search of multimedia files in the user computer, as well as the user-by-user blacklist construction step; and a harmless multimedia file use instant permission step in which use of a multimedia file to be used in the user computer is immediately permitted when the multimedia file has been determined to be a harmless multimedia file, through a search of the user-by-user whitelist before the user-by-user blacklist construction step is performed.
[9] The method as claimed in claim 8, wherein a file encryption checking step of checking if a target file has been encrypted is further performed between a blacklist search step and a harmful multimedia DB search step, which are included in the harmful multimedia file use blocking step.
[10] The method as claimed in claim 8, further comprising a step of inserting at least one identification code into the file encrypted in the harmful multimedia file encryption step.
[11] The method as claimed in claim 10, wherein an identification code determination unit capable of determining the at least one identification code is installed on a file transmission line.
[12] The method as claimed in claim 8, further comprising a step of, after the harmful multimedia file encryption step, decrypting and reproducing the encrypted harmful multimedia file, when the encrypted harmful multimedia file is to be reproduced in an administrator mode, having passed an authentication procedure in the user computer.
[13] The method as claimed in any one of claims 8 to 11, wherein, in the harmful multimedia file encryption step, the harmful multimedia file is encrypted in a kernel mode by a file system filter driver (FSFD), in which a secret key is used for the encryption.
[14] The method as claimed in claim 12, wherein the encryption of the harmful multimedia file in the harmful multimedia file encryption step and the decryption in the harmful multimedia file decryption and reproduction step are performed in a kernel mode by a file system filter driver (FSFD), in which a secret key is used for the encryption and decryption.
[15] A method for restricting use of a harmful multimedia file, the method comprising: a harmful multimedia DB construction step of verifying if each multimedia file collected via Internet corresponds to a harmful multimedia file, extracting identifiers and meta-information for identifying harmful multimedia files, and storing the extracted identifiers and meta-information in a DB of a server; a harmful multimedia DB transmission step of transmitting the harmful multimedia DB constructed in the harmful multimedia DB construction step to a user computer; a user-by-user blacklist construction step of searching multimedia files in the user computer, comparing the searched multimedia files with the harmful multimedia DB, and constructing a blacklist, which is a list of harmful multimedia files; and a harmful multimedia file use blocking step of comparing a multimedia file to be used in the user computer by a user with the user-by-user blacklist and the harmful multimedia DB in sequence, and blocking the use of the multimedia file when the multimedia file corresponds to a harmful multimedia file, wherein at least one step of the user-by-user blacklist construction step and harmful multimedia file use blocking step comprises a harmful multimedia file encryption step of encrypting and storing the harmful multimedia file in the user computer so as to prevent the harmful multimedia file from being distributed to or used by a different user, and wherein the method further comprises: a verification data generation and transmission step of extracting, by the user computer, an identifier for file identification from each multimedia file stored in the user computer, extracting at least one of a screen frame and meta-information from each of the stored multimedia file, and transmitting the extracted identifier and at least one of a screen frame and meta-information to the server; and a harmful multimedia DB and user computer update step of verifying if each multimedia file stored in the user computer corresponds to a harmful multimedia file by means of verification data of the multimedia file, which has been transmitted from the user computer through the verification data generation and transmission step, and updating either the harmful multimedia DB stored in the server or the whitelist stored in the user computer according to whether each multimedia file corresponds to a harmful multimedia file.
[16] The method as claimed in claim 15, wherein a file encryption checking step of checking if a target file has been encrypted is further performed between a blacklist search step and a harmful multimedia DB search step, which are included in the harmful multimedia file use blocking step.
[17] The method as claimed in claim 15, further comprising a step of inserting at least one identification code into the file encrypted in the harmful multimedia file encryption step.
[18] The method as claimed in claim 17, wherein an identification code determination unit capable of determining the at least one identification code is installed on a file transmission line.
[19] The method as claimed in claim 15, further comprising a step of, after the harmful multimedia file encryption step, decrypting and reproducing the encrypted harmful multimedia file, when the encrypted harmful multimedia file is to be reproduced in an administrator mode, having passed an authentication procedure in the user computer.
[20] The method as claimed in any one of claims 15 to 18, wherein, in the harmful multimedia file encryption step, the harmful multimedia file is encrypted in a kernel mode by a file system filter driver (FSFD), in which a secret key is used for the encryption.
[21] The method as claimed in claim 19, wherein the encryption of the harmful multimedia file in the harmful multimedia file encryption step and the decryption in the harmful multimedia file decryption and reproduction step are performed in a kernel mode by a file system filter driver (FSFD), in which a secret key is used for the encryption and decryption.
PCT/KR2007/006975 2006-12-29 2007-12-28 Method for restricting use of harmful multimedia file WO2008082209A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2007800487260A CN101606148B (en) 2006-12-29 2007-12-28 Method for restricting use of harmful multimedia file

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR10-2006-0138921 2006-12-29
KR1020060138921A KR100753798B1 (en) 2006-12-29 2006-12-29 Method for restricting use of harmful multimedia file

Publications (1)

Publication Number Publication Date
WO2008082209A1 true WO2008082209A1 (en) 2008-07-10

Family

ID=38615877

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2007/006975 WO2008082209A1 (en) 2006-12-29 2007-12-28 Method for restricting use of harmful multimedia file

Country Status (4)

Country Link
KR (1) KR100753798B1 (en)
CN (1) CN101606148B (en)
TW (1) TWI365393B (en)
WO (1) WO2008082209A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20020093276A (en) * 2001-06-07 2002-12-16 삼성전자 주식회사 Child-lock apparatus of signal play system and method thereof
KR20030004475A (en) * 2001-07-05 2003-01-15 (주)타잔테크놀로지 System to cut children off from harmfum Internet sites and to search the Internet sites
KR20030019055A (en) * 2001-08-29 2003-03-06 박정수 Device for blocking access of adult or hurtful web sites
KR20060028853A (en) * 2004-09-30 2006-04-04 한국전자통신연구원 Method and apparatus for preventing of harmful p2p traffic in network

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7190470B2 (en) * 2001-04-05 2007-03-13 Hewlett-Packard Development Company, L.P. System and method for automatic document verification
CN100367294C (en) * 2005-06-23 2008-02-06 复旦大学 Method for dividing human body skin area from color digital images and video graphs

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20020093276A (en) * 2001-06-07 2002-12-16 삼성전자 주식회사 Child-lock apparatus of signal play system and method thereof
KR20030004475A (en) * 2001-07-05 2003-01-15 (주)타잔테크놀로지 System to cut children off from harmfum Internet sites and to search the Internet sites
KR20030019055A (en) * 2001-08-29 2003-03-06 박정수 Device for blocking access of adult or hurtful web sites
KR20060028853A (en) * 2004-09-30 2006-04-04 한국전자통신연구원 Method and apparatus for preventing of harmful p2p traffic in network

Also Published As

Publication number Publication date
TW200837601A (en) 2008-09-16
CN101606148A (en) 2009-12-16
KR100753798B1 (en) 2007-08-31
TWI365393B (en) 2012-06-01
CN101606148B (en) 2011-08-03

Similar Documents

Publication Publication Date Title
CN107480555B (en) Database access authority control method and device based on block chain
US20210248207A1 (en) Content protection
US8769296B2 (en) Software signature tracking
KR101189115B1 (en) server/client system, information processing unit, information processing method, and computer program
KR100947152B1 (en) System and method for controlling the use and duplication of digital content distributed on removable media
JP4906854B2 (en) Information processing apparatus, information recording apparatus, information processing system, program update method, program, and integrated circuit
US8370647B2 (en) Information processing apparatus, information processing method, and program
EP1810294B1 (en) Bonding contents on separate storage media
US7650359B2 (en) Content reproduction apparatus and content reproduction method
US8270275B2 (en) Information processing device, disc, information processing method, and program
JP5018494B2 (en) Information processing apparatus, disk, information processing method, and program
WO2008039246A2 (en) System and method for drm translation
KR20030071824A (en) Recording medium, information processing device, content distribution server, method, program, and its recording medium
CN107948235A (en) Cloud data safety management and audit device based on JAR
JP2005027322A (en) Process and device for authenticating digital data
KR100797600B1 (en) Method for restricting use of harmful multimedia file
KR100615620B1 (en) Control method of portable devices for downloading digital contents by policy management
WO2008082209A1 (en) Method for restricting use of harmful multimedia file
KR101265887B1 (en) Renewable and individualizable elements of a protected computing environment
KR20070105599A (en) Protecting method and system of contents
KR101213119B1 (en) Method and system for blocking improper contents
CN117978454A (en) Vehicle SOA service authentication mechanism
CN116249113A (en) Verification authorization method and device for virtual image of meta-universe, electronic equipment and storage medium
KR100899140B1 (en) Method and device for re-dispatching specifically coded access objects from a server to a mobile terminal device
CN116127500A (en) File management and control method, system and medium for mobile storage medium under Linux

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200780048726.0

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07860753

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 07860753

Country of ref document: EP

Kind code of ref document: A1