WO2013125783A1 - 전자책 생성 장치 및 방법, 그리고 전자책 무결성 검증 장치 및 방법 - Google Patents
전자책 생성 장치 및 방법, 그리고 전자책 무결성 검증 장치 및 방법 Download PDFInfo
- Publication number
- WO2013125783A1 WO2013125783A1 PCT/KR2012/011580 KR2012011580W WO2013125783A1 WO 2013125783 A1 WO2013125783 A1 WO 2013125783A1 KR 2012011580 W KR2012011580 W KR 2012011580W WO 2013125783 A1 WO2013125783 A1 WO 2013125783A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- book
- digest value
- data
- information
- applying
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 238000012795 verification Methods 0.000 claims description 42
- 230000006870 function Effects 0.000 description 57
- 238000007726 management method Methods 0.000 description 19
- 238000004891 communication Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 8
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 238000013500 data storage Methods 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 239000010409 thin film Substances 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/105—Arrangements for software license management or administration, e.g. for managing licenses at corporate level
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/107—License processing; Key processing
- G06F21/1075—Editing
Definitions
- the present invention relates to an e-book generating device and method, and to an e-book integrity verification device and method, and more particularly, to generate an e-book containing information that can verify the integrity (integrity) of the e-book, An apparatus and method for verifying the integrity of an e-book using information contained in an e-book to determine whether the forgery of the e-book.
- Patent document 1 is a method for encrypting and decrypting an electronic document.
- Patent document 1 includes an XML type encryption for various electronic documents including an XML electronic document.
- Disclosed is a content providing confidentiality for electronic documents exchanged during electronic commerce through a decryption processing procedure.
- Patent Document 2 is an information processing system and method, and a recording medium, and Patent Document 2 allows a user to provide characters or images of a suitable size. Disclosed is a display of contents reflecting the intention of a copyright holder such as a layout, and a user easily constructing a data structure.
- An object of the present invention is to provide an e-book generating apparatus and method for generating an e-book containing information that can verify the integrity of the e-book.
- Another object of the present invention is to provide an e-book integrity verification apparatus and method for verifying the integrity of an e-book through information included in the e-book to determine whether the e-book is forged.
- an electronic book integrity verification apparatus comprising: a fourth digest value (generated by applying a second hash function to basic e-book data including title information of an e-book) digital signature target information including a digest value, a first digest value generated by applying a first hash function to the digital signature target information, and an encryption function using a private key as an encryption key in the first digest value;
- An e-book receiver configured to receive an e-book e-signature data including an electronic signature value and a public key value corresponding to the private key and an e-book data including the basic e-book data; And a fifth digest value generated by applying the encryption function using the public key as a decryption key to the electronic signature value and a sixth digest value generated by applying the first hash function to the electronic signature target information.
- an e-book integrity verification unit that compares a value with the first digest value and verifies the integrity of the e-book data received through the e-book receiving unit.
- an apparatus for generating an e-book generating a fourth digest value by applying a second hash function to basic e-book data including title information of an e-book, and generating the fourth digest value.
- a digest unit configured to generate a first digest value by applying a first hash function to electronic signature target information including a value;
- An electronic signature unit generating an electronic signature value by applying an encryption function having a private key as an encryption key to the first digest value;
- an electronic book integrity verification method includes an electronic signature including a fourth digest value generated by applying a second hash function to basic e-book data including title information of an e-book.
- a first digest value generated by applying a first hash function to the target information, the digital signature target information, an electronic signature value generated by applying an encryption function using a private key as an encryption key to the first digest value, and the private key.
- a method for generating an e-book which includes generating a fourth digest value by applying a second hash function to basic e-book data including title information of the e-book; Generating a first digest value by applying a first hash function to the electronic signature target information including the fourth digest value; Generating an electronic signature value by applying an encryption function having a private key as an encryption key to the first digest value; And generating e-book data including e-book signature data and the e-book basic data including the electronic signature subject information, the first digest value, the electronic signature value, and a public key value corresponding to the private key. It includes;
- the electronic book containing the information that can protect the copyright of the e-book while following the epub standard specification (electronic publication: EPUB)
- EPUB electronic publication
- the electronic signature is performed on the partial data, thereby efficiently performing the electronic signature while reducing the time and overhead required for the electronic signature.
- FIG. 1 is a block diagram illustrating an e-book generating apparatus according to a preferred embodiment of the present invention
- FIGS. 2 to 9 are diagrams for explaining e-book data according to a preferred embodiment of the present invention.
- FIG. 10 is a flowchart illustrating a method of generating an e-book according to a preferred embodiment of the present invention
- FIG. 11 is a block diagram illustrating an electronic book integrity verification apparatus according to a preferred embodiment of the present invention.
- FIG. 12 is a block diagram showing in more detail the configuration of the e-book integrity verification apparatus according to an embodiment of the present invention.
- FIG. 13 is a flowchart illustrating a method for verifying e-book integrity according to an exemplary embodiment of the present invention.
- FIG. 1 is a block diagram illustrating an e-book generating apparatus according to a preferred embodiment of the present invention.
- the e-book generating apparatus 100 generates an e-book including information for verifying the integrity and usage authority of the e-book.
- the e-book generating apparatus 100 generates an e-book conforming to an electronic book (EPUB), which is an e-book standard standard established by the international digital publishing forum (IDPF).
- EUB electronic book
- IDPF international digital publishing forum
- FIGS. 2 to 9 are diagrams for explaining e-book data according to a preferred embodiment of the present invention.
- the e-book data EB includes e-book basic data EB_BD, e-book contents data EB_CD, e-book usage authority data EB_RD, e-book encrypted data EB_ED, and the like.
- E-book digital signature data (EB_SD) is included.
- the e-book basic data EB_BD includes basic information about the e-book such as a title, author, publisher, and the like.
- the e-book basic data EB_BD may further include access information of the copyright management device used when checking the use right of the e-book.
- access information of the copyright management device used when checking the use right of the e-book Referring to FIG. 3, at least one of a digital rights management (DRM) solution provider, a domain code used to manage a content provider, and information on a uniform resource locator (URL) of a copyright management device.
- DRM digital rights management
- the copyright management device access information EB_BD_1 including one may be included in the e-book basic data EB_BD.
- the e-book content data EB_CD includes actual content information about the e-book such as a text and a picture.
- the e-book use right data includes information on the use right of the e-book, such as usage period information for the e-book, legitimate user information, and the like.
- the e-book usage right data EB_RD includes usage period information EB_RD_1 and legitimate user information EB_RD_2 for the e-book.
- the e-book encrypted data EB_ED is used to decrypt a part of a part of the e-book data EB, and includes information on the encryption of the e-book.
- the electronic book electronic signature data EB_SD is used to verify the integrity of the electronic book, and includes electronic signature information, electronic signature values, decryption key information, electronic signature subject information, and the like.
- the electronic book electronic signature data EB_SD includes electronic signature information EB_SD_1, electronic signature value EB_SD_2, decryption key information EB_SD_3, electronic signature subject information EB_SD_4, and the like.
- the electronic signature information EB_SD_1 may include a first digest value EB_SD_1_3 and a first digest value EB_SD_1_3 obtained from the electronic signature target information EB_SD_4 through a first hash function.
- Information EB_SD_1_2 that can identify the first hash function used to obtain the information
- information EB_SD_1_1 that identifies the encryption function used to obtain the digital signature value EB_SD_2, and the like. .
- an electronic signature value EB_SD_2 is obtained from a first digest value EB_SD_1_3 included in the electronic signature information and a private key provided by a trusted verification authority through an encryption function.
- the decryption key information EB_SD_3 includes a public key value EB_SD_3_1 corresponding to a private key used to obtain an electronic signature value EB_SD_2.
- the electronic signature subject information EB_SD_4 indicates the subject of the electronic signature used to confirm whether or not the electronic book data EB is forged.
- the first electronic signature subject information (EB_SD_4_1) is a second hash function (hash) used to obtain a second digest value and a second digest value obtained from the e-book encrypted data (EB_ED) through a second hash function. information for identifying a function).
- the second electronic signature subject information EB_SD_4_2 is a second hash function (e.g., a second hash function used to obtain a third digest value and a third digest value obtained from the e-book usage authority data EB_RD through a second hash function). information to identify the hash function).
- the third electronic signature subject information EB_SD_4_3 is a second hash function (hash) used to obtain a fourth digest value and a fourth digest value obtained from the e-book basic data EB_BD through a second hash function. information for identifying a function).
- information that should not be forged in an e-book basically includes the content (text) of the e-book.
- the content (text) of an e-book is generally encrypted, and a lot of overhead is involved in electronically signing the entire content (text) of the e-book. Therefore, the electronic signature is performed on only the minimum information necessary to determine whether the electronic book is forged or not.
- the reason for setting the e-book encrypted data EB_ED as one of the targets of the electronic signature in the present invention is that when the e-book encrypted data EB_ED is encrypted with the e-book contents data EB_CD, information about the decryption key or encryption algorithm is provided. This is because when the e-book encrypted data EB_ED is not forged, the integrity of the encrypted e-book contents data EB_CD can be verified.
- the reason why the e-book permission data (EB_RD) is set as one of the targets of the e-signature is that the e-book permission data (EB_RD) includes information on the permission of the e-book, so the e-book permission data (EB_RD) This ensures that the integrity of the e-book's permissions can be verified by verifying that is not forged.
- the reason for setting the e-book basic data (EB_BD) is that the e-book basic data (EB_BD) contains the basic information of the e-book and copyright management device access information, so that the e-book basic data (EB_BD) was not forged. This is because the integrity of the subject that encrypted the e-book contents data (EB_CD) can be verified.
- the e-book generating apparatus 100 includes a digest unit 110, an electronic signature unit 130, and an e-book generating unit 150.
- the digest unit 110 obtains a digest value from each of the e-book encrypted data EB_ED, the e-book use authority data EB_RD, and the e-book basic data EB_BD through a second hash function. That is, the digest unit 110 applies the second hash function to each of the e-book encrypted data EB_ED, the e-book use authority data EB_RD, and the e-book basic data EB_BD, thereby providing the second to fourth operations. Generate a digest value.
- the digest unit 110 obtains the first digest value EB_SD_1_3 from the electronic signature target information EB_SD_4 through a first hash function. That is, the digest unit 110 generates a first digest value EB_SD_1_3 by applying a first hash function to the electronic signature target information EB_SD_4.
- the digital signature unit 130 obtains the digital signature value EB_SD_2 from the first digest value EB_SD_1_3 obtained from the electronic signature target information EB_SD_4 through a cryptographic function and a private key provided by a trusted verification authority. Acquire. That is, the electronic signature unit 130 generates an electronic signature value EB_SD_2 by applying an encryption function using a private key as an encryption key to the first digest value EB_SD_1_3 obtained from the electronic signature subject information EB_SD_4. .
- the e-book generating unit 150 generates the e-book data EB based on the plurality of digest values obtained by the digest unit 110 and the electronic signature values obtained by the electronic signature unit 130.
- the e-book generating unit 150 may include the second to fourth digest values generated from the e-book encrypted data EB_ED, the e-book use authority data EB_RD, and the e-book basic data EB_BD, and the second to fourth.
- Electronic signature subject information EB_SD_4 is generated that includes information for identifying a second hash function used to generate the digest value, and the like.
- the e-book generating unit 150 may generate a first hash function (hash function) used to generate the first digest value EB_SD_1_3 and the first digest value EB_SD_1_3 generated from the electronic signature target information EB_SD_4.
- Digital signature information EB_SD_1 is generated including information EB_SD_1_2 that can be identified), information EB_SD_1_1 that identifies the encryption function used to generate the electronic signature value EB_SD_2, and the like.
- the e-book generating unit 150 decrypts key information EB_SD_3 including a public key value EB_SD_3_1 and the like corresponding to the private key used to generate the electronic signature value EB_SD_2.
- the electronic book generating unit 150 includes electronic signature information EB_SD_1, electronic signature value EB_SD_2, decryption key information EB_SD_3, electronic signature target information EB_SD_4, and the like. Create
- the e-book generation unit 150 includes an e-book basic data including the copyright management device access information (EB_BD_1), a usage period information (EB_RD_1), and legitimate user information (EB_RD_2) for the e-book. Generate data EB_RD.
- EB_BD_1 copyright management device access information
- EB_RD_1 usage period information
- EB_RD_2 legitimate user information
- the e-book generating unit 150 may include the e-book basic data EB_BD, the e-book contents data EB_CD, the e-book usage authority data EB_RD, the e-book encryption data EB_ED, and the e-book electronic signature data ( E-book data EB including EB_SD) is generated.
- FIG. 10 is a flowchart illustrating a method of generating an e-book according to a preferred embodiment of the present invention.
- the e-book generating apparatus 100 uses the second hash function to generate the second through fourth digest values from the e-book encrypted data EB_ED, the e-book usage authority data EB_RD, and the e-book basic data EB_BD. To obtain (S1010). That is, the e-book generating apparatus 100 applies a hash function to each of the e-book encrypted data EB_ED, the e-book usage authority data EB_RD, and the e-book basic data EB_BD, thereby providing the second to fourth operations. Generate a digest value.
- the e-book generating apparatus 100 obtains the first digest value EB_SD_1_3 from the electronic signature target information EB_SD_4 including the second to fourth digest values through a first hash function (S1020). ). That is, the e-book generating apparatus 100 generates a first digest value EB_SD_1_3 by applying a first hash function to the electronic signature target information EB_SD_4.
- the e-book generating apparatus 100 obtains the electronic signature value EB_SD_2 from the first digest value EB_SD_1_3 and the private key obtained from the electronic signature subject information EB_SD_4 through an encryption function (S1030). ). That is, the e-book generating apparatus 100 generates an electronic signature value EB_SD_2 by applying an encryption function having a private key as an encryption key to the electronic signature target information EB_SD_4. Then, the e-book generating apparatus 100 generates the e-book data EB based on the obtained plurality of digest values and the electronic signature value (S1040).
- FIG. 11 is a block diagram illustrating an electronic book integrity verification apparatus according to a preferred embodiment of the present invention.
- the e-book integrity verification device 1100 is connected to the copyright management device 1200 through a communication network 1300.
- the e-book integrity verification device 1100 receives the e-book data EB from a user terminal (not shown) connected through the communication network 1300 or directly connected by wire or wireless.
- the e-book integrity verification device 1100 verifies the integrity of the e-book through information included in the e-book in order to confirm whether the e-book is forged.
- the electronic book integrity verification device 1100 may verify the usage rights of the e-book by accessing the copyright management apparatus 1200 through the information included in the e-book in order to confirm the usage rights of the e-book.
- the copyright management apparatus 1200 is a device that manages copyright of an e-book such as legitimate user management, legitimate use period, and the like.
- the copyright management apparatus 1200 verifies the use rights of the e-book, etc., at the request of the e-book integrity verification apparatus 1100.
- the user terminal refers to a device having a computing power by including a memory means and a microprocessor.
- User terminals include desktop computers, notebook computers, workstations, palmtop computers, ultra mobile personal computers (UMPCs), tablet PCs, personal digital assistants (PDAs), web pads, mobile phones, and smart phones ( smart phone).
- UMPCs ultra mobile personal computers
- PDAs personal digital assistants
- the communication network 1300 may include a broadcasting network, a telephone network, as well as a data communication network including a local area network (LAN), a metropolitan area network (MAN), a wide area network (WAN), and the Internet. It can include, wire and wireless, any communication method may be used.
- LAN local area network
- MAN metropolitan area network
- WAN wide area network
- Internet the Internet
- the e-book integrity verification device 1100 has been described as a separate device independent of the user terminal, but the present invention is not limited thereto, and according to the embodiment, the e-book integrity verification device 1100 may be integrated with the user terminal. It may be implemented in the form. Of course, the e-book integrity verification device 1100 may be implemented in an integrated form with the copyright management device 1200.
- FIG. 12 is a block diagram showing in more detail the configuration of the e-book integrity verification apparatus according to an embodiment of the present invention.
- the e-book integrity verification device 1100 includes an e-book receiving unit 1110, an e-book integrity verification unit 1130, an e-book usage authority verification unit 1150, and an e-book output unit 1170. do.
- the e-book receiving unit 1110 receives the e-book data EB from the user terminal.
- the e-book data (EB) follows the e-pub (EPUB), the e-book standard as described above, the e-book basic data (EB_BD), e-book content data (EB_CD), e-book usage rights data (EB_RD), E-book encrypted data EB_ED and e-book electronic signature data EB_SD.
- the e-book basic data EB_BD includes basic information about the e-book, copyright management device access information EB_BD_1, and the like.
- the e-book usage right data EB_RD includes usage period information EB_RD_1, legitimate user information EB_RD_2, and the like for the e-book.
- the electronic book electronic signature data EB_SD includes electronic signature information EB_SD_1, electronic signature value EB_SD_2, decryption key information EB_SD_3, electronic signature subject information EB_SD_4, and the like.
- the electronic signature subject information EB_SD_4 includes first to third electronic signature subject information EB_SD_4_1, EB_SD_4_2 and EB_SD_4_3, which are information for identifying the subject of the electronic signature.
- the e-book integrity verification unit 1130 verifies the integrity of the e-book data EB in order to confirm whether the e-book data EB received through the e-book receiving unit 1110 is forged.
- the e-book integrity verification unit 1130 may use an encryption function based on the encryption function identification information EB_SD_1_1 included in the electronic signature information EB_SD_1 whose public key included in the decryption key information EB_SD_3 is the decryption key. Is applied to the digital signature value information (EB_SD_4) based on the fifth digest value generated by applying the digital signature value (EB_SD_2) and the hash function identification information (EB_SD_1_2) included in the electronic signature object information (EB_SD_1). The integrity of the e-book data EB is verified by comparing at least one of the sixth digest values generated with the first digest value EB_SD_1_3 included in the electronic signature information EB_SD_1.
- the e-book integrity verification unit 1130 may generate a seventh digest value generated by applying the second hash function based on the hash function identification information included in the first electronic signature subject information EB_SD_4_1 to the e-book encryption data EB_ED.
- the integrity of the e-book data EB is verified by comparing the third digest value included in the second electronic signature subject information EB_SD_4_2 and the fourth digest value included in the third electronic signature subject information EB_SD_4_3.
- the e-book usage authority verification unit 1150 may use at least one of information about a digital rights management (DRM) solution provider, a domain code, and a URL of the copyright management device included in the copyright management device access information EB_BD_1. Access to the copyright management device 1200 to verify the usage rights of the e-book.
- DRM digital rights management
- the e-book output unit 1170 includes a display module (not shown), and when the e-book data EB is determined not to be forged by the e-book integrity verification unit 1130, the e-book data EB is read. Output through the display module.
- the display module includes a liquid crystal display (LCD), a thin film transistor liquid crystal display (TFTLCD), an organic light emitting diode (OLED), a flexible display, 3 3D display and the like.
- FIG. 13 is a flowchart illustrating a method for verifying e-book integrity according to an exemplary embodiment of the present invention.
- the e-book integrity verification device 1100 receives the e-book data EB from the user terminal (S1310). Thereafter, the e-book integrity verification device 1100 verifies the integrity of the e-book data EB based on the information included in the e-book data EB to check whether the received e-book data EB is forged. (S1320).
- the e-book integrity verification device 1100 generates a fifth digest value generated by using encryption function identification information EB_SD_1_1, decryption key information EB_SD_3, and electronic signature value EB_SD_2 included in the electronic signature information EB_SD_1. Or the sixth digest value generated by using the hash function identification information EB_SD_1_2 and the signature target information EB_SD_4 included in the electronic signature target information EB_SD_1, and the first digest value EB_SD_1_3 included in the electronic signature information EB_SD_1. ) To verify the integrity of the e-book data (EB).
- EB e-book data
- the electronic book integrity verification apparatus 1100 may include the seventh to ninth generated using the first electronic signature subject information EB_SD_4_1, the second electronic signature subject information EB_SD_4_2, and the third electronic signature subject information EB_SD_4_3.
- the integrity of the e-book data EB is compared by comparing the digest value with the second through fourth digest values included in the first electronic signature subject information EB_SD_4_1, the second electronic signature subject information EB_SD_4_2, and the third electronic signature subject information. Verify
- the e-book integrity verification device 1100 verifies the use authority of the e-book (S1330). That is, the e-book integrity verification device 1100 accesses the copyright management device 1200 by using the copyright management device access information EB_BD_1 and verifies the use rights of the e-book. Then, when it is determined that the e-book data EB is not forged, the e-book integrity verification device 1100 outputs the e-book data EB (S1340).
- the invention can also be embodied as computer readable code on a computer readable recording medium.
- the computer-readable recording medium includes all kinds of recording devices in which data that can be read by a computer device is stored. Examples of computer-readable recording media include ROM, RAM, CD-ROM, magnetic tape, floppy disk, optical data storage, and also in the form of carrier wave (transfer over the Internet). It includes what is implemented.
- the computer-readable recording medium can also be distributed over computer devices connected over a wired or wireless communication network so that the computer-readable code is stored and executed in a distributed fashion.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (12)
- 전자책의 제목 정보를 포함하는 전자책 기본 데이터에 제2해쉬 함수(hash function)를 적용하여 생성된 제4다이제스트 값(digest value)을 포함하는 전자 서명 대상 정보, 상기 전자 서명 대상 정보에 제1해쉬 함수를 적용하여 생성된 제1다이제스트 값, 상기 제1다이제스트 값에 개인키(private key)를 암호화 키로 하는 암호화 함수를 적용하여 생성된 전자 서명 값 및 상기 개인키에 대응되는 공개키(public key) 값을 포함하는 전자책 전자 서명 데이터와 상기 전자책 기본 데이터를 포함하는 전자책 데이터를 수신하는 전자책 수신부; 및상기 전자 서명 값에 상기 공개키를 복호화 키로 하는 상기 암호화 함수를 적용하여 생성된 제5다이제스트 값 및 상기 전자 서명 대상 정보에 상기 제1해쉬 함수를 적용하여 생성된 제6다이제스트 값 중 적어도 하나의 값과 상기 제1다이제스트 값을 비교하여 상기 전자책 수신부를 통해 수신한 상기 전자책 데이터의 무결성(integrity)을 검증하는 전자책 무결성 검증부;를 포함하는 것을 특징으로 하는 전자책 무결성 검증 장치.
- 제 1항에 있어서,상기 전자책 데이터는 상기 전자책에 대한 사용 기간 정보와 정당한 사용자 정보를 포함하는 전자책 사용 권한 데이터 및 상기 전자책의 암호화에 대한 정보를 포함하는 전자책 암호화 데이터 중 적어도 하나를 더 포함하며,상기 전자 서명 대상 정보는 상기 전자책 사용 권한 데이터에 상기 제2해쉬 함수를 적용하여 생성된 제3다이제스트 값 및 상기 전자책 암호화 데이터에 상기 제2해쉬 함수를 적용하여 생성된 제2다이제스트 값 중 적어도 하나를 더 포함하고,상기 전자책 무결성 검증부는 상기 전자책 기본 데이터에 상기 제2해쉬 함수를 적용하여 생성된 제9다이제스트 값을 상기 제4다이제스트 값과 비교하고, 상기 전자책 사용 권한 데이터에 상기 제2해쉬 함수를 적용하여 생성된 제8다이제스트 값을 상기 제3다이제스트 값과 비교하거나 상기 전자책 암호화 데이터에 상기 제2해쉬 함수를 적용하여 생성된 제7다이제스트 값을 상기 제2다이제스트 값과 비교하여 상기 전자책 데이터의 무결성을 검증하는 것을 특징으로 하는 전자책 무결성 검증 장치.
- 제 1항 또는 제 2항에 있어서,상기 전자책 기본 데이터는 저작권 관리 장치의 접근 정보를 더 포함하며,상기 저작권 관리 장치 접근 정보를 기초로 상기 저작권 관리 장치에 접속하여 상기 전자책의 사용 권한을 검증하는 전자책 사용 권한 검증부를 더 포함하는 전자책 무결성 검증 장치.
- 제 1항 또는 제 2항에 있어서,상기 전자책 무결성 검증부에 의해 상기 수신한 전자책 데이터가 위변조되지 않은 것으로 판단된 경우, 상기 전자책 데이터를 출력하는 전자책 출력부를 더 포함하는 전자책 무결성 검증 장치.
- 전자책의 제목 정보를 포함하는 전자책 기본 데이터에 제2해쉬 함수를 적용하여 제4다이제스트 값을 생성하고, 상기 제4다이제스트 값을 포함하는 전자 서명 대상 정보에 제1해쉬 함수를 적용하여 제1다이제스트 값을 생성하는 다이제스트부;상기 제1다이제스트 값에 개인키를 암호화 키로 하는 암호화 함수를 적용하여 전자 서명 값을 생성하는 전자 서명부; 및상기 전자 서명 대상 정보, 상기 제1다이제스트 값, 상기 전자 서명 값 및 상기 개인키에 대응되는 공개키 값을 포함하는 전자책 서명 데이터와 상기 전자책 기본 데이터를 포함하는 전자책 데이터를 생성하는 전자책 생성부;를 포함하는 것을 특징으로 하는 전자책 생성 장치.
- 제 5항에 있어서,상기 다이제스트부는 상기 전자책에 대한 사용 기간 정보와 정당한 사용자 정보를 포함하는 전자책 사용 권한 데이터에 상기 제2해쉬 함수를 적용하여 제3다이제스트 값을 생성하고, 상기 전자책의 암호화에 대한 정보를 포함하는 전자책 암호화 데이터에 상기 제2해쉬 함수를 적용하여 제2다이제스트 값을 생성하며, 상기 제4다이제스트 값을 포함하고 상기 제3다이제스트 값 및 상기 제2다이제스트 값 중 적어도 하나를 더 포함하는 상기 전자 서명 대상 정보에 상기 제1해쉬 함수를 적용하여 상기 제1다이제스트 값을 생성하고,상기 전자책 생성부는 상기 전자책 서명 데이터를 포함하고 상기 전자책 사용 권한 데이터 및 상기 전자책 암호화 데이터 중 적어도 하나를 더 포함하는 상기 전자책 데이터를 생성하는 것을 특징으로 하는 전자책 생성 장치.
- 전자책의 제목 정보를 포함하는 전자책 기본 데이터에 제2해쉬 함수를 적용하여 생성된 제4다이제스트 값을 포함하는 전자 서명 대상 정보, 상기 전자 서명 대상 정보에 제1해쉬 함수를 적용하여 생성된 제1다이제스트 값, 상기 제1다이제스트 값에 개인키를 암호화 키로 하는 암호화 함수를 적용하여 생성된 전자 서명 값 및 상기 개인키에 대응되는 공개키 값을 포함하는 전자책 전자 서명 데이터와 상기 전자책 기본 데이터를 포함하는 전자책 데이터를 수신하는 단계; 및상기 전자 서명 값에 상기 공개키를 복호화 키로 하는 상기 암호화 함수를 적용하여 생성된 제5다이제스트 값 및 상기 전자 서명 대상 정보에 상기 제1해쉬 함수를 적용하여 생성된 제6다이제스트 값 중 적어도 하나의 값과 상기 제1다이제스트 값을 비교하여 수신한 상기 전자책 데이터의 무결성을 검증하는 단계;를 포함하는 것을 특징으로 하는 전자책 무결성 검증 방법.
- 제 7항에 있어서,상기 전자책 데이터는 상기 전자책에 대한 사용 기간 정보와 정당한 사용자 정보를 포함하는 전자책 사용 권한 데이터 및 상기 전자책의 암호화에 대한 정보를 포함하는 전자책 암호화 데이터 중 적어도 하나를 더 포함하며,상기 전자 서명 대상 정보는 상기 전자책 사용 권한 데이터에 상기 제2해쉬 함수를 적용하여 생성된 제3다이제스트 값 및 상기 전자책 암호화 데이터에 상기 제2해쉬 함수를 적용하여 생성된 제2다이제스트 값 중 적어도 하나를 더 포함하고,상기 전자책 기본 데이터에 상기 제2해쉬 함수를 적용하여 생성된 제9다이제스트 값을 상기 제4다이제스트 값과 비교하고, 상기 전자책 사용 권한 데이터에 상기 제2해쉬 함수를 적용하여 생성된 제8다이제스트 값을 상기 제3다이제스트 값과 비교하거나 상기 전자책 암호화 데이터에 상기 제2해쉬 함수를 적용하여 생성된 제7다이제스트 값을 상기 제2다이제스트 값과 비교하여 상기 전자책 데이터의 무결성을 검증하는 단계를 더 포함하는 것을 특징으로 하는 전자책 무결성 검증 방법.
- 제 7항 또는 제 8항에 있어서,상기 전자책 기본 데이터는 저작권 관리 장치의 접근 정보를 더 포함하며,상기 저작권 관리 장치 접근 정보를 기초로 상기 저작권 관리 장치에 접속하여 상기 전자책의 사용 권한을 검증하는 단계를 더 포함하는 것을 특징으로 하는 전자책 무결성 검증 방법.
- 제 7항 또는 제 8항에 있어서,상기 수신한 전자책 데이터가 위변조되지 않은 것으로 판단된 경우, 상기 전자책 데이터를 출력하는 단계를 더 포함하는 전자책 무결성 검증 방법.
- 전자책의 제목 정보를 포함하는 전자책 기본 데이터에 제2해쉬 함수를 적용하여 제4다이제스트 값을 생성하는 단계;상기 제4다이제스트 값을 포함하는 전자 서명 대상 정보에 제1해쉬 함수를 적용하여 제1다이제스트 값을 생성하는 단계;상기 제1다이제스트 값에 개인키를 암호화 키로 하는 암호화 함수를 적용하여 전자 서명 값을 생성하는 단계; 및상기 전자 서명 대상 정보, 상기 제1다이제스트 값, 상기 전자 서명 값 및 상기 개인키에 대응되는 공개키 값을 포함하는 전자책 서명 데이터와 상기 전자책 기본 데이터를 포함하는 전자책 데이터를 생성하는 단계;를 포함하는 것을 특징으로 하는 전자책 생성 방법.
- 제 11항에 있어서,상기 전자책에 대한 사용 기간 정보와 정당한 사용자 정보를 포함하는 전자책 사용 권한 데이터에 상기 제2해쉬 함수를 적용하여 제3다이제스트 값을 생성하는 단계; 및상기 전자책의 암호화에 대한 정보를 포함하는 전자책 암호화 데이터에 상기 제2해쉬 함수를 적용하여 제2다이제스트 값을 생성하는 단계;를 더 포함하며,상기 제1다이제스트 값 획득 단계에서, 상기 제4다이제스트 값을 포함하고 상기 제3다이제스트 값 및 상기 제2다이제스트 값 중 적어도 하나를 더 포함하는 상기 전자 서명 대상 정보에 상기 제1해쉬 함수를 적용하여 상기 제1다이제스트 값을 생성하고,상기 전자책 데이터 생성 단계에서, 상기 전자책 서명 데이터를 포함하고 상기 전자책 사용 권한 데이터 및 상기 전자책 암호화 데이터 중 적어도 하나를 더 포함하는 상기 전자책 데이터를 생성하는 것을 특징으로 하는 전자책 생성 방법.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/378,423 US20150019874A1 (en) | 2012-02-21 | 2012-12-27 | Apparatus and method for generating electronic book, and apparatus and method for verifying integrity of electronic book |
JP2014556468A JP5905975B2 (ja) | 2012-02-21 | 2012-12-27 | 電子書籍生成装置及び方法、並びに電子書籍の無欠性検証装置及び方法 |
EP12868976.7A EP2819046B1 (en) | 2012-02-21 | 2012-12-27 | Apparatus and method for verifying electronic book integrity |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020120017454A KR101311287B1 (ko) | 2012-02-21 | 2012-02-21 | 전자책 생성 장치 및 방법, 그리고 전자책 무결성 검증 장치 및 방법 |
KR10-2012-0017454 | 2012-02-21 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013125783A1 true WO2013125783A1 (ko) | 2013-08-29 |
Family
ID=49005932
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2012/011580 WO2013125783A1 (ko) | 2012-02-21 | 2012-12-27 | 전자책 생성 장치 및 방법, 그리고 전자책 무결성 검증 장치 및 방법 |
Country Status (5)
Country | Link |
---|---|
US (1) | US20150019874A1 (ko) |
EP (1) | EP2819046B1 (ko) |
JP (1) | JP5905975B2 (ko) |
KR (1) | KR101311287B1 (ko) |
WO (1) | WO2013125783A1 (ko) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101575840B1 (ko) * | 2014-12-08 | 2015-12-08 | 주식회사 디알엠인사이드 | 사적복제 지원 전자책 보호 시스템 및 방법 |
US10083672B1 (en) | 2016-04-29 | 2018-09-25 | Rich Media Ventures, Llc | Automatic customization of e-books based on reader specifications |
US9886172B1 (en) * | 2016-04-29 | 2018-02-06 | Rich Media Ventures, Llc | Social media-based publishing and feedback |
US9864737B1 (en) | 2016-04-29 | 2018-01-09 | Rich Media Ventures, Llc | Crowd sourcing-assisted self-publishing |
US10015244B1 (en) | 2016-04-29 | 2018-07-03 | Rich Media Ventures, Llc | Self-publishing workflow |
WO2018124330A1 (ko) * | 2016-12-28 | 2018-07-05 | 주식회사 파수닷컴 | 페이지 정보를 이용한 전자책 제공 방법 |
KR20190018371A (ko) | 2017-08-14 | 2019-02-22 | 선은미 | 전자책 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20030027181A (ko) | 2001-09-14 | 2003-04-07 | 한국전자통신연구원 | 전자 문서의 암호화 및 복호화 방법 |
KR20030040427A (ko) * | 2000-08-28 | 2003-05-22 | 콘텐트가드 홀딩즈 인코포레이티드 | 콘텐트 소비 환경의 무결성 보증 및 검증 시스템 및 방법 |
KR20050088413A (ko) * | 2002-12-10 | 2005-09-06 | 인텔 코오퍼레이션 | 공개 키 방식의 매체 키 블록 |
US20070049250A1 (en) * | 2005-08-23 | 2007-03-01 | Agere Systems, Inc. | Authenticating data units of a mobile communications device |
US20090327737A1 (en) * | 2008-06-26 | 2009-12-31 | Microsoft Corporation | Techniques for ensuring authentication and integrity of communications |
KR101085283B1 (ko) | 2003-08-01 | 2011-11-22 | 아드레아 엘엘씨 | 정보 처리 시스템 및 방법, 및 기록 매체 |
Family Cites Families (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2203779C (en) * | 1994-10-28 | 2001-11-20 | Stuart A. Haber | Digital document authentication system for providing a certificate which authenticates and uniquely identifies a document |
JPH1011509A (ja) * | 1996-06-26 | 1998-01-16 | Wacom Co Ltd | 電子書類セキュリティシステム、電子押印セキュリティシステムおよび電子署名セキュリティシステム |
US5958051A (en) * | 1996-11-27 | 1999-09-28 | Sun Microsystems, Inc. | Implementing digital signatures for data streams and data archives |
US6021202A (en) * | 1996-12-20 | 2000-02-01 | Financial Services Technology Consortium | Method and system for processing electronic documents |
AU6620000A (en) * | 1999-08-06 | 2001-03-05 | Frank W Sudia | Blocked tree authorization and status systems |
US6891953B1 (en) * | 2000-06-27 | 2005-05-10 | Microsoft Corporation | Method and system for binding enhanced software features to a persona |
US6915425B2 (en) * | 2000-12-13 | 2005-07-05 | Aladdin Knowledge Systems, Ltd. | System for permitting off-line playback of digital content, and for managing content rights |
US7478243B2 (en) * | 2001-03-21 | 2009-01-13 | Microsoft Corporation | On-disk file format for serverless distributed file system with signed manifest of file modifications |
US7020645B2 (en) * | 2001-04-19 | 2006-03-28 | Eoriginal, Inc. | Systems and methods for state-less authentication |
US7239708B2 (en) * | 2001-06-27 | 2007-07-03 | Microsoft Corporation | Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client |
US20040003248A1 (en) * | 2002-06-26 | 2004-01-01 | Microsoft Corporation | Protection of web pages using digital signatures |
JP2004045607A (ja) | 2002-07-10 | 2004-02-12 | Taketoshi Okamoto | 電子化証明書、電子化証明書を記録した記録媒体、および、電子化証明書を発行する方法、装置、プログラム、および、電子化証明書を表示する方法、装置、プログラム |
US7287164B2 (en) * | 2002-09-12 | 2007-10-23 | International Business Machines Corporation | Method and system for encoding signatures to authenticate files |
US7278168B1 (en) * | 2002-11-27 | 2007-10-02 | Adobe Systems Incorporated | Dynamic enabling of functionality in electronic document readers |
GB0229894D0 (en) * | 2002-12-21 | 2003-01-29 | Ibm | Methods, apparatus and computer programs for generating and/or using conditional electronic signatures and/or for reporting status changes |
US8132024B2 (en) * | 2003-03-11 | 2012-03-06 | Panasonic Corporation | Digital work protection system, recording apparatus, reproduction apparatus, and recording medium |
JP2004364070A (ja) * | 2003-06-06 | 2004-12-24 | Hitachi Ltd | マスキング可能な署名技術を用いた電子文書管理システム |
US7519822B2 (en) * | 2004-03-10 | 2009-04-14 | Hewlett-Packard Development Company, L.P. | Method and apparatus for processing descriptive statements |
US7707427B1 (en) * | 2004-07-19 | 2010-04-27 | Michael Frederick Kenrich | Multi-level file digests |
JP4306651B2 (ja) * | 2005-07-12 | 2009-08-05 | ソニー株式会社 | ライセンス提供装置および方法、コンテンツ提供装置、サブスクリプションサービス提供システム、並びに、再生装置および再生方法 |
KR20090122657A (ko) * | 2008-05-26 | 2009-12-01 | 동명대학교산학협력단 | 문자 인식을 통한 공개키 기반의 문서위조 방지 방법 |
US9112862B2 (en) * | 2009-02-02 | 2015-08-18 | Adobe Systems Incorporated | System and method for parts-based digital rights management |
JP5511270B2 (ja) * | 2009-09-02 | 2014-06-04 | キヤノン株式会社 | 情報処理装置、及び情報処理方法 |
US8826036B1 (en) * | 2009-10-29 | 2014-09-02 | Amazon Technologies, Inc. | Ebook encryption using variable keys |
-
2012
- 2012-02-21 KR KR1020120017454A patent/KR101311287B1/ko active IP Right Grant
- 2012-12-27 WO PCT/KR2012/011580 patent/WO2013125783A1/ko active Application Filing
- 2012-12-27 JP JP2014556468A patent/JP5905975B2/ja active Active
- 2012-12-27 EP EP12868976.7A patent/EP2819046B1/en active Active
- 2012-12-27 US US14/378,423 patent/US20150019874A1/en not_active Abandoned
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20030040427A (ko) * | 2000-08-28 | 2003-05-22 | 콘텐트가드 홀딩즈 인코포레이티드 | 콘텐트 소비 환경의 무결성 보증 및 검증 시스템 및 방법 |
KR20030027181A (ko) | 2001-09-14 | 2003-04-07 | 한국전자통신연구원 | 전자 문서의 암호화 및 복호화 방법 |
KR20050088413A (ko) * | 2002-12-10 | 2005-09-06 | 인텔 코오퍼레이션 | 공개 키 방식의 매체 키 블록 |
KR101085283B1 (ko) | 2003-08-01 | 2011-11-22 | 아드레아 엘엘씨 | 정보 처리 시스템 및 방법, 및 기록 매체 |
US20070049250A1 (en) * | 2005-08-23 | 2007-03-01 | Agere Systems, Inc. | Authenticating data units of a mobile communications device |
US20090327737A1 (en) * | 2008-06-26 | 2009-12-31 | Microsoft Corporation | Techniques for ensuring authentication and integrity of communications |
Also Published As
Publication number | Publication date |
---|---|
EP2819046B1 (en) | 2020-06-03 |
EP2819046A4 (en) | 2015-11-04 |
KR101311287B1 (ko) | 2013-09-25 |
JP2015507441A (ja) | 2015-03-05 |
KR20130097250A (ko) | 2013-09-03 |
EP2819046A1 (en) | 2014-12-31 |
US20150019874A1 (en) | 2015-01-15 |
JP5905975B2 (ja) | 2016-04-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2013125783A1 (ko) | 전자책 생성 장치 및 방법, 그리고 전자책 무결성 검증 장치 및 방법 | |
EP3175575B1 (en) | Secure content packaging using multiple trusted execution environments | |
US8924727B2 (en) | Technologies labeling diverse content | |
AU2006200096B2 (en) | Flexible licensing architecture in content rights management systems | |
US20150304736A1 (en) | Technologies for hardening the security of digital information on client platforms | |
CN106452775A (zh) | 实现电子签章的方法、装置及签章服务器 | |
CN107480519A (zh) | 一种识别风险应用的方法及服务器 | |
WO2012050367A2 (en) | Method and apparatus for downloading drm module | |
US9608811B2 (en) | Managing access to a secure digital document | |
JP2004348710A (ja) | 固有番号を用いたプログラムの耐タンパ手法、及び難読化されたプログラムアップグレード方法、並びにこれらの方法のための装置 | |
WO2019139200A1 (ko) | 익명성 보장 및 시빌 공격 방지가 가능한, 블록 체인을 이용한 의사 표시 확인 방법 | |
KR101403626B1 (ko) | 클라우드 컴퓨팅 환경에서의 스마트 단말 통합 보안 관리 방법 | |
WO2016064041A1 (ko) | 해쉬값을 이용하여 응용 프로그램의 위변조 여부를 탐지하는 사용자 단말기 및 그것을 이용한 위변조 탐지 방법 | |
US8972747B2 (en) | Managing information in a document serialization | |
CN111245811A (zh) | 信息加密方法、装置及电子设备 | |
WO2011065768A2 (en) | Method for protecting application and method for executing application using the same | |
WO2016093380A1 (ko) | 사적복제 지원 전자책 보호 시스템 및 방법 | |
EP2817756A1 (en) | Drm/cas service device and method using security context | |
Zou et al. | A cloud based SIM DRM scheme for the mobile internet | |
CN101404573A (zh) | 一种授权方法、系统及装置 | |
CN101833615A (zh) | 基于身份联合的数字资源权限控制方法 | |
US20120008777A1 (en) | Method and apparatus for a content protecting and packaging system for protecting a content package | |
WO2016114420A1 (ko) | 단방향 접근키 생성을 통한 개인정보 보안 시스템 및 그 보안방법 | |
Hsieh | Towards self-protecting security for e-Health CDA documents | |
WO2013100335A1 (ko) | 공통 키 관리 시스템 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12868976 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2014556468 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 14378423 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2012868976 Country of ref document: EP |