WO2008082209A1 - Method for restricting use of harmful multimedia file - Google Patents
Method for restricting use of harmful multimedia file Download PDFInfo
- Publication number
- WO2008082209A1 WO2008082209A1 PCT/KR2007/006975 KR2007006975W WO2008082209A1 WO 2008082209 A1 WO2008082209 A1 WO 2008082209A1 KR 2007006975 W KR2007006975 W KR 2007006975W WO 2008082209 A1 WO2008082209 A1 WO 2008082209A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- harmful
- multimedia file
- file
- user
- harmful multimedia
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 75
- 238000010276 construction Methods 0.000 claims abstract description 34
- 230000000903 blocking effect Effects 0.000 claims abstract description 33
- 230000005540 biological transmission Effects 0.000 claims abstract description 17
- 238000012795 verification Methods 0.000 claims description 20
- 238000005516 engineering process Methods 0.000 description 5
- 238000007796 conventional method Methods 0.000 description 3
- 238000007792 addition Methods 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 239000000284 extract Substances 0.000 description 2
- 230000015556 catabolic process Effects 0.000 description 1
- 238000006731 degradation reaction Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
- H04N21/4408—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/835—Generation of protective data, e.g. certificates
- H04N21/8352—Generation of protective data, e.g. certificates involving content or source identification data, e.g. Unique Material Identifier [UMID]
Abstract
Disclosed is a method for restricting use of a harmful multimedia file, the method including: a harmful multimedia DB construction step of verifying if each multimedia file collected via Internet corresponds to a harmful multimedia file, extracting identifiers and meta-information for identifying harmful multimedia files, and storing the extracted identifiers and meta-information in a DB of a server; a harmful multimedia DB transmission step of transmitting the harmful multimedia DB constructed in the harmful multimedia DB construction step to a user computer; a user-by-user blacklist construction step of searching multimedia files in the user computer, comparing the searched multimedia files with the harmful multimedia DB, and constructing a blacklist, which is a list of harmful multimedia files; and a harmful multimedia file use blocking step of comparing a multimedia file to be used in the user computer by a user with the user- by-user blacklist and the harmful multimedia DB in sequence, and blocking the use of the multimedia file when the multimedia file corresponds to a harmful multimedia file, wherein a harmful multimedia file encryption step of encrypting and storing the harmful multimedia file in the user computer is further performed.
Description
Description
METHOD FOR RESTRICTING USE OF HARMFUL
MULTIMEDIA FILE
Technical Field
[1] The present invention relates to a method for restricting the use of harmful multimedia files (e.g. harmful moving picture files), and more particularly to a method for enabling a harmless moving picture to be more quickly used (e.g. reproduced) and enabling a harmful moving picture to be accurately restricted from being used, through a search of a pre-constructed harmful moving picture DB, a user-by-user blacklist, and/ or a user-by-user whitelist when a moving picture file in a user computer is to be used, and for encrypting harmful moving picture files registered in the blacklist so that the harmful moving picture files cannot be used in other user computers where a system according to the present invention has not been installed, thereby preventing the harmful moving picture files from being redistributed. Background Art
[2] A conventional method widely used to restrict the use of harmful multimedia files in a user computer is implemented in such a manner that a specific provider or system constructs a harmful multimedia DB by collecting harmful multimedia files distributed on the Internet and extracting eigenvalues from the harmful multimedia files, the constructed harmful multimedia DB is installed in a user computer, and when it is determined that a file to be used in the user computer corresponds to a file registered in the installed harmful multimedia DB, the use of the file is restricted. According to such a conventional method, since it is possible to construct a DB for only harmful multimedia files distributed on the Internet, there is a problem in that harmful multimedia files which are not distributed on the Internet or which are difficult to collect can be still used without restriction.
[3] Meanwhile, another conventional method for blocking harmful moving pictures, for example, a method disclosed in Korean Patent Registration Publication No. 10-0517645, is implemented in such a manner as to search for harmful contents distributed on the Internet, to extract hash values of harmful contents from all or a part of the searched harmful contents, to construct a harmful contents DB, to send the constructed harmful contents DB to a user computer, to extract a hash value from all or a part of a file to be transmitted, edited, and/or reproduced (executed) in the user computer, to compare the hash value of the file with the hash values of harmful contents in the harmful contents DB, and when the file corresponds to harmful contents, to stop transmitting or executing the file and/or to delete the file. According
to such a conventional technology, whenever the user computer is to reproduce, for example, a moving picture file by driving an execution program, such as a moving picture reproduction program, it is necessary to extract, from the file, a hash value regarded as a peculiar value of the file, to compare the extracted hash value with all hash values in the harmful contents DB, and to determine if the file corresponds to a file registered in the harmful contents DB. In addition, according to the conventional technology, even a harmless moving picture must always wait a predetermined period of time before it is normally reproduced. Generally, moving picture files reproduced in a user computer include much more harmless moving picture files than harmful moving picture files, and the reproduction frequency of harmless moving picture files is much higher than that of harmful moving picture files. Therefore, it is very inefficient to search the entire harmful moving picture DB whenever a moving picture file is to be reproduced.
[4] As described above, according to the conventional technology, when a harmful moving picture file is used, either a method of forcibly terminating a process, such as a moving picture reproduction program using the file, or a method of deleting the file, is used. When a harmful moving picture blocking technology is implemented in the form of commercial service, the method of forcibly terminating a corresponding process is mainly used. In this case, generally, a harmful moving picture file is permitted to be used when an appropriate authentication procedure has been successfully completed (e.g. a guardian mode or supervisor mode) in order to check a record of access to the harmful moving picture file. However, in this case, although a harmful moving picture file is verified, the harmful moving picture file is not deleted from the user computer and remains therein as it is. Therefore, when such a harmful moving picture file, which is not deleted and is remained, is transferred through disc copy or the like to another computer not equipped with a harmful moving picture blocking function, the harmful moving picture file can be used without any restriction, so that there is a limit in actively blocking even a file verified as a harmful moving picture file from being redistributed.
Disclosure of Invention Technical Problem
[5] Accordingly, the present invention has been made to solve the above-mentioned problems occurring in the prior art, and the present invention provides a verification method for more quickly blocking a file from being used in a user computer when the file corresponds to a harmful multimedia file, and for enabling a file to be used in the user computer as quickly as possible without an excessive time delay for verifying if the file is a harmful multimedia file when the file corresponds to a harmless
multimedia file. Also, the present invention provides a method for enabling a central blocking system to actively collect harmful multimedia files which are not distributed through the Internet, but exist in a user computer. In addition, the present invention provides a method for, when the multimedia file is once verified as a harmful multimedia file in a user computer, not only restricting or blocking the use of a multimedia file in the user computer, but also making it impossible to normally use the file even in another computer even if the file has been transferred to another computer, so that the harmful multimedia file is prevented from being redistributed or spread through the Internet, thereby providing a safe Internet environment. Technical Solution
[6] In accordance with an aspect of the present invention, in order to restrict the use of harmful multimedia files in a user computer connected with the Internet, there is provided a method for restricting use of a harmful multimedia file, the method including:
[7] a harmful multimedia DB construction step of verifying if each multimedia file collected via Internet corresponds to a harmful multimedia file, extracting identifiers and meta- information for identifying harmful multimedia files, and storing the extracted identifiers and meta- information in a DB of a server;
[8] a harmful multimedia DB transmission step of transmitting the harmful multimedia
DB constructed in the harmful multimedia DB construction step to a user computer; a user-by-user blacklist construction step of searching multimedia files in the user computer, comparing the searched multimedia files with the harmful multimedia DB, and
[9] constructing a blacklist, which is a list of harmful multimedia files; and a harmful multimedia file use blocking step of comparing a multimedia file to be used in the user computer by a user with the user-by-user blacklist and the harmful multimedia DB in sequence, and blocking the use of the multimedia file when the multimedia file corresponds to a harmful multimedia file,
[10] in which at least one step of the user-by-user blacklist construction step and harmful multimedia file use blocking step includes a harmful multimedia file encryption step of encrypting and storing the harmful multimedia file in the user computer so as to prevent the harmful multimedia file from being distributed to or used by a different user.
[11] In accordance with another aspect of the present invention, the method further includes a step of, after the harmful multimedia file encryption step, decrypting and reproducing the encrypted harmful multimedia file, when the encrypted harmful multimedia file is to be reproduced in an administrator mode, having passed an au-
thentication procedure in the user computer.
[12] In accordance with still another aspect of the present invention, the method further includes: a user-by-user whitelist construction step of constructing a whitelist, which is a list of harmless multimedia files, through a search of multimedia files in the user computer, as well as the user-by-user blacklist construction step; and a harmless multimedia file use instant permission step in which use of a multimedia file to be used in the user computer is immediately permitted when the multimedia file has been determined to be a harmless multimedia file, through a search of the user-by-user whitelist before the user-by-user blacklist construction step is performed.
[13] In accordance with still another aspect of the present invention, the method further includes: a verification data generation and transmission step of extracting, by the user computer, an identifier for file identification from each multimedia file stored in the user computer, extracting at least one of a screen frame and meta- information from each of the stored multimedia file, and transmitting the extracted identifier and at least one of a screen frame and meta- information to the server; and
[14] a harmful multimedia DB and user computer update step of verifying if each multimedia file stored in the user computer corresponds to a harmful multimedia file by means of verification data of the multimedia file, which has been transmitted from the user computer through the verification data generation and transmission step, and updating either the harmful multimedia DB stored in the server or the whitelist stored in the user computer according to whether each multimedia file corresponds to a harmful multimedia file.
Advantageous Effects
[15] According to the present invention, the limit of the conventional harmful multimedia file collecting technology is overcome, and the harmful multimedia DB is additionally updated, even with respect to harmful multimedia files which have not been circulated through the Internet and have been stored only in a user computer, so that it is possible to provide a function of more efficiently restricting the use of harmful multimedia files.
[16] Also, according to the present invention, by constructing and operating a blacklist and a whitelist according to each user computer, it is possible to minimize a user computer's performance degradation phenomenon due to the installed harmful multimedia file use restricting system. Furthermore, since a harmful multimedia file identified by a user computer is encrypted, it becomes impossible to use the harmful multimedia file, even if the harmful multimedia file is redistributed to another computer through the Internet or another physical means, thereby preventing the harmful multimedia file from being spread. Also, by inserting a predetermined iden-
tification code upon the encryption, it is possible to actively control transmission of such an encrypted file through Internet communication lines.
[17] With the aforementioned effects, parents can allow their minor sons and daughters to use the Internet with an easy mind, and young boys and girls can avoid harm due to the indiscreet use of harmful multimedia contents and can have a sound and healthy idea. In addition, traffic of harmful multimedia files occupying a large amount of network band can be reduced, so that it is possible to secure an efficient and productive network infrastructure nationwide. Brief Description of the Drawings
[18] The above and other objects, features and advantages of the present invention will be more apparent from the following detailed description taken in conjunction with the accompanying drawings, in which:
[19] FIG. 1 is a flowchart illustrating steps of a method according to an exemplary embodiment of the present invention;
[20] FIG. 2 is a flowchart illustrating steps of a method including a decryption/reproduction step, in addition to the steps of FIG. 1, according to an exemplary embodiment of the present invention;
[21] FIG. 3 is a flowchart illustrating a method including a whitelist construction step according to an exemplary embodiment of the present invention;
[22] FIG. 4 is a block diagram illustrating the configuration of a system in which a server (i.e. a remote system) constructs and updates a harmful multimedia DB and a user computer constructs a blacklist and a whitelist according to an exemplary embodiment of the present invention;
[23] FIG. 5 is a flowchart illustrating a procedure of determining if a multimedia file used in a user computer corresponds to a harmful multimedia file; and
[24] FIG. 6 is a flowchart systematically illustrating methods according to various exemplary embodiments of the present invention. Mode for the Invention
[25] Hereinafter, an exemplary embodiment of the present invention will be described with reference to the accompanying drawings.
[26] First, the entire construction of the method according to an exemplary embodiment of the present invention will be described step by step with reference to FIG. 1. According to an exemplary embodiment of the present invention, there is a method for restricting use of a harmful multimedia file, the method includes: a harmful multimedia DB construction step 100 of verifying if each multimedia file collected via Internet corresponds to a harmful multimedia file, extracting identifiers and meta-information for identifying harmful multimedia files, and storing the extracted identifiers and meta-
information in a DB of a server; a harmful multimedia DB transmission step 200 of transmitting the harmful multimedia DB constructed in the harmful multimedia DB construction step to a user computer; a user-by-user blacklist construction step 300 of searching multimedia files in the user computer, comparing the searched multimedia files with the harmful multimedia DB, and constructing a blacklist, which is a list of harmful multimedia files; and a harmful multimedia file use blocking step 400 of comparing a multimedia file to be used in the user computer by a user with the user- by-user blacklist and the harmful multimedia DB in sequence, and blocking the use of the multimedia file when the multimedia file corresponds to the harmful multimedia file, in which at least one step of the user-by-user blacklist construction step 300 and harmful multimedia file use blocking step includes a harmful multimedia file encryption step 500 of encrypting and storing the harmful multimedia file in the user computer so as to prevent the harmful multimedia file from being distributed to or used by a different user.
[27] Preferably, as shown in FIG. 2, the method may further include a harmful multimedia file decryption/reproduction step 600 of, after the harmful multimedia file encryption step 500, decrypting and reproducing the encrypted harmful multimedia file, when the encrypted harmful multimedia file is to be reproduced in an administrator mode, having passed an authentication procedure in the user computer.
[28] More preferably, as shown in FIG. 3, the method may further include: a user- by-user whitelist construction step 300W of constructing a whitelist, which is a list of harmless multimedia files, through a search of multimedia files in the user computer, as well as the user-by-user blacklist construction step 300; and a harmless multimedia file use instant permission step 400W in which use of a multimedia file to be used in the user computer is immediately permitted when the multimedia file has been determined to be a harmless multimedia file, through a search of the user-by-user whitelist before the user-by-user blacklist construction step is performed.
[29] Hereinafter, exemplary embodiments of each step included in the methods according to the present invention will be described in more detail with reference to FIGs. 4 to 6.
[30] First, a computer software program, which can be a general means for actually implementing the methods of the present invention through a user computer, is provided to the user computer. In step 100 of constructing a harmful multimedia DB by a server (a remote system from the viewpoint of the user computer) operated by a provider, who constructs and provides the harmful multimedia DB to the user computer, the server may directly collect harmful multimedia files circulated through the Internet in an automatic collection or a manual collection scheme, create (or extract) verification data from the collected multimedia files, and check the verification data, thereby con-
structing the harmful multimedia DB, as shown in FIG. 4. In this case, a key value of each file stored in the harmful multimedia DB includes a message digest value extracted from the file, and an identifier is extracted from an appropriate file region so as to minimize collision and to achieve accurate identification. The message digest is a peculiar value of a fixed length, which is obtained by applying a one-way hash function to a given input data, and is a kind of checksum which can be used to check if an original file has been forged. The present invention uses such a message digest value as an identifier of a file, and MD5, SHA-I, HAS-160, etc., are widely known as message digest hash functions, wherein any one of the hash functions can be used for the present invention.
[31] In addition to the method in which the server directly collects harmful multimedia files circulated through the Internet, as described above, step 100 of constructing a harmful multimedia DB according to the method of the present invention may include a method in which, when a specific program implemented according to the method of the present invention is executed in a user computer (e.g. a PC), the specific program creates (e.g. extracts) verification data, such as an identifier or meta-information, from multimedia files (i.e. multimedia files which are not verified as harmful multimedia files) stored in the user computer, and transmits the verification data through the Internet and so on in real time, and the server verifies the verification data, thereby verifying if multimedia files potentially determined to be harmless multimedia files in the user computer actually are harmless, as shown in FIG. 4.
[32] When a multimedia file, which has been classified as a harmless multimedia file through the harmful multimedia DB in the user computer, is verified as a harmful multimedia file according to a result of the verification, the server can update the current harmful multimedia DB to a higher reliability level. This can be implemented by additionally including a step of recording additional data of harmful multimedia files extracted from the user computer in the harmful multimedia DB so as to update the harmful multimedia DB, in the steps of each method according to the embodiments of the present invention. That is, such a step may include a file use permission and verification data transmission step 700, and a harmful multimedia DB and user computer update step 800, as shown in FIG. 6. In the file use permission and verification data transmission step 700, the user computer generates verification data from multimedia files determined to be harmless multimedia files in the user computer, and transmits the generated verification data to the server. In the harmful multimedia DB and user computer update step 800, the server verifies the received verification data, updates a whitelist of the user computer when a multimedia file corresponding to verification data is determined to be a harmless multimedia file, updates the harmful multimedia DB by adding corresponding information to the harmful multimedia DB when a
multimedia file corresponding to verification data is determined to be a harmful multimedia file, and transmits the updated harmful multimedia DB to the user computer so that the updated harmful multimedia DB can be downloaded by the user computer. With this, even harmful multimedia files which are not circulated through the Internet can be recorded in the harmful multimedia DB.
[33] According to an exemplary embodiment of the present invention, steps 300 and
300W of constructing a blacklist (BL) and a whitelist (WL) according to each user computer, as shown in FIG. 3, may be implemented, for example, in a caching scheme. Here, the blacklist (BL) represents a list of harmful multimedia files existing in the user computer, and the whitelist (WL) represents a list of harmless multimedia files existing in the user computer, and it is preferred that these lists are formed in a data structure of a hash table. Based on the fact that the number of harmful multimedia files is relatively very small when compared to the total number of multimedia files existing in a user computer, the present invention provides a method of constructing a blacklist for harmful multimedia files, constructing a whitelist for harmless multimedia files, and using these lists before searching the harmful multimedia DB.
[34] As shown in FIGs. 5 and 6, when a multimedia file is to be used in a user computer, first, a whitelist (WL) search step (see reference numeral '400W in FIG. 6) is performed. In this case, when the multimedia file is determined to be a harmless multimedia file included in the whitelist (WL), the use of the multimedia file is immediately permitted while the harmful multimedia file use blocking process is terminated, thereby enabling the harmless multimedia file to be more quickly used. In contrast, regarding a multimedia file which is not included in the whitelist, harmfulness of the multimedia file is verified through a separate systematic process, that is, by sequentially performing a blacklist search step (see reference numeral '410' in FIG. 6) of determining if a target file corresponds to a file included in the blacklist (BL), a file encryption checking step (see reference numeral '420' in FIG. 6) of checking the target file itself has been encrypted by a secret key, and a harmful multimedia DB search step (see reference numeral '430' in FIG. 6) of determining if the target file corresponds to a file included in the harmful multimedia DB. When the target file has been determined to be a harmful multimedia file, the use of the target file is blocked, and more preferably, such a blocking history may be recorded in the user computer so that it is possible to provide a more accurate and efficient harmful multimedia file use blocking function. In addition, when a multimedia file is determined to be a harmful multimedia file in the harmful multimedia DB search step 430, which is the final step, the use of the file by the user is blocked, and simultaneously, the procedure is branched to branch point 'F', as shown in FIG. 6, so that the multimedia file can be subjected to a separate file encryption step 500 because the multimedia file has not yet been encrypted.
[35] Meanwhile, as shown in FIG. 6, it is preferred that after the file encryption step 500 of encrypting the harmful multimedia file, a blacklist addition step 550 of updating the blacklist (BL) by adding data of the harmful multimedia file to the blacklist (BL) separately existing in the user computer is performed so that the use of the harmful multimedia file can be quickly blocked when the harmful multimedia file is again used.
[36] Although FIGs. 5 and 6 shows the case where the whitelist search step 400W and the blacklist search step 410 are sequentially performed, the two steps may be performed at the same time.
[37] In more detail with respect to the file encryption step, it is preferred, immediately after a multimedia file existing in the user computer is determined to be a harmful multimedia file, to encrypt the multimedia file in a kernel mode by means of a file system filter driver (FSFD), which is a driver capable of controlling a file system. More preferably, the corresponding multimedia file may be an encrypted file in a secret key scheme, so that it is impossible to decrypt the corresponding multimedia file in a computer not equipped with the system (including a program) implementing the present invention. In this case, since the encrypted file cannot be used in computers not equipped with the system, it is impossible to use the encrypted file even if the encrypted file has been transferred to a different computer, thereby preventing the corresponding file from being redistributed.
[38] Also, in the computer where the system implementing the method according to the present invention has been installed, the rights of use may be provided through an authentication code. In this case, when a user (e.g. a guardian, such as parents, who have logged- in in an administrator mode), having obtained the rights of use, tries to use an encrypted harmful multimedia file, it is preferred to additionally perform a realtime decryption reproduction step 600, as shown in FIG. 3, so that the user can normally use the corresponding file. Such a function blocks the use of a harmful multimedia file when a young boy or girl tries to use the harmful multimedia file, and records the history of the blocking. Accordingly, when a guardian, such as parents, checks the history of the blocking, the guardian can identify which file has been blocked from being used on account of harmfulness thereof. Such an identification process is achieved through realtime decryption, in which the decryption is performed in the kernel mode using the FSFD, which is a driver capable of controlling the file system, like in the file encryption step.
[39] According to another exemplary embodiment of the present invention, when a harmful multimedia file is encrypted, a predetermined identification code, such as a water mark, may be inserted into the encrypted file. The identification code may be used to determine if a harmful multimedia file has been encrypted in a step of checking the harmful multimedia file. Also, the identification code may be used in such a
manner as to install an identification code determination unit (not shown) not in a user computer, but in a server on a network, so as to identify harmful multimedia files on communication lines and to restrict the use of the harmful multimedia files. Preferably, a plurality of identification codes may be inserted into one harmful multimedia file. In this case, although a harmful multimedia file is divided into multiple segments and is transmitted segment by segment, the identification code determination unit can determine the transmission state of the harmful multimedia file, so that it is possible to provide a superior blocking function.
[40] Although preferred embodiments of the present invention has been described for illustrative purposes, those skilled in the art will appreciate that various modifications, additions and substitutions are possible, without departing from the scope and spirit of the invention as disclosed in the accompanying claims. Therefore, it should be appreciated that the embodiments described above are not limitative, but only illustrative.
[41] Therefore, the spirit and scope of the present invention must be defined not by described embodiments thereof but by the appended claims and equivalents of the appended claims.
Claims
[1] A method for restricting use of a harmful multimedia file, the method comprising: a harmful multimedia DB construction step of verifying if each multimedia file collected via Internet corresponds to a harmful multimedia file, extracting identifiers and meta-information for identifying harmful multimedia files, and storing the extracted identifiers and meta-information in a DB of a server; a harmful multimedia DB transmission step of transmitting the harmful multimedia DB constructed in the harmful multimedia DB construction step to a user computer; a user-by-user blacklist construction step of searching multimedia files in the user computer, comparing the searched multimedia files with the harmful multimedia DB, and constructing a blacklist, which is a list of harmful multimedia files; and a harmful multimedia file use blocking step of comparing a multimedia file to be used in the user computer by a user with the user-by-user blacklist and the harmful multimedia DB in sequence, and blocking the use of the multimedia file when the multimedia file corresponds to a harmful multimedia file, in which at least one step of the user-by-user blacklist construction step and harmful multimedia file use blocking step comprises a harmful multimedia file encryption step of encrypting and storing the harmful multimedia file in the user computer so as to prevent the harmful multimedia file from being distributed to or used by a different user, and a file encryption checking step of checking if a target file has been encrypted is further performed between a blacklist search step and a harmful multimedia DB search step, which are included in the harmful multimedia file use blocking step.
[2] The method as claimed in claim 1, further comprising a step of inserting at least one identification code into the file encrypted in the harmful multimedia file encryption step.
[3] The method as claimed in claim 2, wherein an identification code determination unit capable of determining the at least one identification code is installed on a file transmission line.
[4] The method as claimed in claim 3, wherein the at least one identification code inserted into the file encrypted in the harmful multimedia file encryption step comprises a plurality of the identification codes so that when the encrypted harmful multimedia file is divided into a plurality segments and is transmitted, each divided segment can be identified by the determined code determination
unit.
[5] The method as claimed in any one of claims 1 to 4, further comprising a step of, after the harmful multimedia file encryption step, decrypting and reproducing the encrypted harmful multimedia file when a user, having passed an authentication procedure in the user computer, wants to reproduce the encrypted harmful multimedia file.
[6] The method as claimed in any one of claims 1 to 4, wherein, in the harmful multimedia file encryption step, the harmful multimedia file is encrypted in a kernel mode by a file system filter driver (FSFD), in which a secret key is used for the encryption.
[7] The method as claimed in claim 5, wherein the encryption of the harmful multimedia file in the harmful multimedia file encryption step and the decryption in the harmful multimedia file decryption and reproduction step are performed in a kernel mode by a file system filter driver (FSFD), in which a secret key is used for the encryption and decryption.
[8] A method for restricting use of a harmful multimedia file, the method comprising: a harmful multimedia DB construction step of verifying if each multimedia file collected via Internet corresponds to a harmful multimedia file, extracting identifiers and meta-information for identifying harmful multimedia files, and storing the extracted identifiers and meta-information in a DB of a server; a harmful multimedia DB transmission step of transmitting the harmful multimedia DB constructed in the harmful multimedia DB construction step to a user computer; a user-by-user blacklist construction step of searching multimedia files in the user computer, comparing the searched multimedia files with the harmful multimedia DB, and constructing a blacklist, which is a list of harmful multimedia files; and a harmful multimedia file use blocking step of comparing a multimedia file to be used in the user computer by a user with the user-by-user blacklist and the harmful multimedia DB in sequence, and blocking the use of the multimedia file when the multimedia file corresponds to a harmful multimedia file, wherein at least one step of the user-by-user blacklist construction step and harmful multimedia file use blocking step comprises a harmful multimedia file encryption step of encrypting and storing the harmful multimedia file in the user computer so as to prevent the harmful multimedia file from being distributed to or used by a different user, and wherein the method further comprises: a user-by-user whitelist construction step
of constructing a whitelist, which is a list of harmless multimedia files, through a search of multimedia files in the user computer, as well as the user-by-user blacklist construction step; and a harmless multimedia file use instant permission step in which use of a multimedia file to be used in the user computer is immediately permitted when the multimedia file has been determined to be a harmless multimedia file, through a search of the user-by-user whitelist before the user-by-user blacklist construction step is performed.
[9] The method as claimed in claim 8, wherein a file encryption checking step of checking if a target file has been encrypted is further performed between a blacklist search step and a harmful multimedia DB search step, which are included in the harmful multimedia file use blocking step.
[10] The method as claimed in claim 8, further comprising a step of inserting at least one identification code into the file encrypted in the harmful multimedia file encryption step.
[11] The method as claimed in claim 10, wherein an identification code determination unit capable of determining the at least one identification code is installed on a file transmission line.
[12] The method as claimed in claim 8, further comprising a step of, after the harmful multimedia file encryption step, decrypting and reproducing the encrypted harmful multimedia file, when the encrypted harmful multimedia file is to be reproduced in an administrator mode, having passed an authentication procedure in the user computer.
[13] The method as claimed in any one of claims 8 to 11, wherein, in the harmful multimedia file encryption step, the harmful multimedia file is encrypted in a kernel mode by a file system filter driver (FSFD), in which a secret key is used for the encryption.
[14] The method as claimed in claim 12, wherein the encryption of the harmful multimedia file in the harmful multimedia file encryption step and the decryption in the harmful multimedia file decryption and reproduction step are performed in a kernel mode by a file system filter driver (FSFD), in which a secret key is used for the encryption and decryption.
[15] A method for restricting use of a harmful multimedia file, the method comprising: a harmful multimedia DB construction step of verifying if each multimedia file collected via Internet corresponds to a harmful multimedia file, extracting identifiers and meta-information for identifying harmful multimedia files, and storing the extracted identifiers and meta-information in a DB of a server; a harmful multimedia DB transmission step of transmitting the harmful
multimedia DB constructed in the harmful multimedia DB construction step to a user computer; a user-by-user blacklist construction step of searching multimedia files in the user computer, comparing the searched multimedia files with the harmful multimedia DB, and constructing a blacklist, which is a list of harmful multimedia files; and a harmful multimedia file use blocking step of comparing a multimedia file to be used in the user computer by a user with the user-by-user blacklist and the harmful multimedia DB in sequence, and blocking the use of the multimedia file when the multimedia file corresponds to a harmful multimedia file, wherein at least one step of the user-by-user blacklist construction step and harmful multimedia file use blocking step comprises a harmful multimedia file encryption step of encrypting and storing the harmful multimedia file in the user computer so as to prevent the harmful multimedia file from being distributed to or used by a different user, and wherein the method further comprises: a verification data generation and transmission step of extracting, by the user computer, an identifier for file identification from each multimedia file stored in the user computer, extracting at least one of a screen frame and meta-information from each of the stored multimedia file, and transmitting the extracted identifier and at least one of a screen frame and meta-information to the server; and a harmful multimedia DB and user computer update step of verifying if each multimedia file stored in the user computer corresponds to a harmful multimedia file by means of verification data of the multimedia file, which has been transmitted from the user computer through the verification data generation and transmission step, and updating either the harmful multimedia DB stored in the server or the whitelist stored in the user computer according to whether each multimedia file corresponds to a harmful multimedia file.
[16] The method as claimed in claim 15, wherein a file encryption checking step of checking if a target file has been encrypted is further performed between a blacklist search step and a harmful multimedia DB search step, which are included in the harmful multimedia file use blocking step.
[17] The method as claimed in claim 15, further comprising a step of inserting at least one identification code into the file encrypted in the harmful multimedia file encryption step.
[18] The method as claimed in claim 17, wherein an identification code determination unit capable of determining the at least one identification code is installed on a file transmission line.
[19] The method as claimed in claim 15, further comprising a step of, after the harmful multimedia file encryption step, decrypting and reproducing the encrypted harmful multimedia file, when the encrypted harmful multimedia file is to be reproduced in an administrator mode, having passed an authentication procedure in the user computer.
[20] The method as claimed in any one of claims 15 to 18, wherein, in the harmful multimedia file encryption step, the harmful multimedia file is encrypted in a kernel mode by a file system filter driver (FSFD), in which a secret key is used for the encryption.
[21] The method as claimed in claim 19, wherein the encryption of the harmful multimedia file in the harmful multimedia file encryption step and the decryption in the harmful multimedia file decryption and reproduction step are performed in a kernel mode by a file system filter driver (FSFD), in which a secret key is used for the encryption and decryption.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2007800487260A CN101606148B (en) | 2006-12-29 | 2007-12-28 | Method for restricting use of harmful multimedia file |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2006-0138921 | 2006-12-29 | ||
KR1020060138921A KR100753798B1 (en) | 2006-12-29 | 2006-12-29 | Method for restricting use of harmful multimedia file |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2008082209A1 true WO2008082209A1 (en) | 2008-07-10 |
Family
ID=38615877
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2007/006975 WO2008082209A1 (en) | 2006-12-29 | 2007-12-28 | Method for restricting use of harmful multimedia file |
Country Status (4)
Country | Link |
---|---|
KR (1) | KR100753798B1 (en) |
CN (1) | CN101606148B (en) |
TW (1) | TWI365393B (en) |
WO (1) | WO2008082209A1 (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20020093276A (en) * | 2001-06-07 | 2002-12-16 | 삼성전자 주식회사 | Child-lock apparatus of signal play system and method thereof |
KR20030004475A (en) * | 2001-07-05 | 2003-01-15 | (주)타잔테크놀로지 | System to cut children off from harmfum Internet sites and to search the Internet sites |
KR20030019055A (en) * | 2001-08-29 | 2003-03-06 | 박정수 | Device for blocking access of adult or hurtful web sites |
KR20060028853A (en) * | 2004-09-30 | 2006-04-04 | 한국전자통신연구원 | Method and apparatus for preventing of harmful p2p traffic in network |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7190470B2 (en) * | 2001-04-05 | 2007-03-13 | Hewlett-Packard Development Company, L.P. | System and method for automatic document verification |
CN100367294C (en) * | 2005-06-23 | 2008-02-06 | 复旦大学 | Method for dividing human body skin area from color digital images and video graphs |
-
2006
- 2006-12-29 KR KR1020060138921A patent/KR100753798B1/en active IP Right Grant
-
2007
- 2007-12-28 CN CN2007800487260A patent/CN101606148B/en not_active Expired - Fee Related
- 2007-12-28 TW TW096150878A patent/TWI365393B/en not_active IP Right Cessation
- 2007-12-28 WO PCT/KR2007/006975 patent/WO2008082209A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20020093276A (en) * | 2001-06-07 | 2002-12-16 | 삼성전자 주식회사 | Child-lock apparatus of signal play system and method thereof |
KR20030004475A (en) * | 2001-07-05 | 2003-01-15 | (주)타잔테크놀로지 | System to cut children off from harmfum Internet sites and to search the Internet sites |
KR20030019055A (en) * | 2001-08-29 | 2003-03-06 | 박정수 | Device for blocking access of adult or hurtful web sites |
KR20060028853A (en) * | 2004-09-30 | 2006-04-04 | 한국전자통신연구원 | Method and apparatus for preventing of harmful p2p traffic in network |
Also Published As
Publication number | Publication date |
---|---|
TW200837601A (en) | 2008-09-16 |
CN101606148A (en) | 2009-12-16 |
KR100753798B1 (en) | 2007-08-31 |
TWI365393B (en) | 2012-06-01 |
CN101606148B (en) | 2011-08-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107480555B (en) | Database access authority control method and device based on block chain | |
US20210248207A1 (en) | Content protection | |
US8769296B2 (en) | Software signature tracking | |
KR101189115B1 (en) | server/client system, information processing unit, information processing method, and computer program | |
KR100947152B1 (en) | System and method for controlling the use and duplication of digital content distributed on removable media | |
JP4906854B2 (en) | Information processing apparatus, information recording apparatus, information processing system, program update method, program, and integrated circuit | |
US8370647B2 (en) | Information processing apparatus, information processing method, and program | |
EP1810294B1 (en) | Bonding contents on separate storage media | |
US7650359B2 (en) | Content reproduction apparatus and content reproduction method | |
US8270275B2 (en) | Information processing device, disc, information processing method, and program | |
JP5018494B2 (en) | Information processing apparatus, disk, information processing method, and program | |
WO2008039246A2 (en) | System and method for drm translation | |
KR20030071824A (en) | Recording medium, information processing device, content distribution server, method, program, and its recording medium | |
CN107948235A (en) | Cloud data safety management and audit device based on JAR | |
JP2005027322A (en) | Process and device for authenticating digital data | |
KR100797600B1 (en) | Method for restricting use of harmful multimedia file | |
KR100615620B1 (en) | Control method of portable devices for downloading digital contents by policy management | |
WO2008082209A1 (en) | Method for restricting use of harmful multimedia file | |
KR101265887B1 (en) | Renewable and individualizable elements of a protected computing environment | |
KR20070105599A (en) | Protecting method and system of contents | |
KR101213119B1 (en) | Method and system for blocking improper contents | |
CN117978454A (en) | Vehicle SOA service authentication mechanism | |
CN116249113A (en) | Verification authorization method and device for virtual image of meta-universe, electronic equipment and storage medium | |
KR100899140B1 (en) | Method and device for re-dispatching specifically coded access objects from a server to a mobile terminal device | |
CN116127500A (en) | File management and control method, system and medium for mobile storage medium under Linux |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200780048726.0 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07860753 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 07860753 Country of ref document: EP Kind code of ref document: A1 |