WO2017115885A1 - Content search and history tracking monitoring system for facilitating searching and tracking by comprising encryption information in various contents - Google Patents

Content search and history tracking monitoring system for facilitating searching and tracking by comprising encryption information in various contents Download PDF

Info

Publication number
WO2017115885A1
WO2017115885A1 PCT/KR2015/014385 KR2015014385W WO2017115885A1 WO 2017115885 A1 WO2017115885 A1 WO 2017115885A1 KR 2015014385 W KR2015014385 W KR 2015014385W WO 2017115885 A1 WO2017115885 A1 WO 2017115885A1
Authority
WO
WIPO (PCT)
Prior art keywords
content
code
information
decryption
search
Prior art date
Application number
PCT/KR2015/014385
Other languages
French (fr)
Korean (ko)
Inventor
윤재영
Original Assignee
윤재영
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 윤재영 filed Critical 윤재영
Priority claimed from KR1020150188007A external-priority patent/KR20170069116A/en
Publication of WO2017115885A1 publication Critical patent/WO2017115885A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data

Definitions

  • the present invention is a method for distributing content and distributing it online, in which the original copyright holder checks that his / her copyrighted work is distributed.
  • the content file includes a certain area or the whole (around) the content file in a package form.
  • the present invention relates to a method of identifying information copyright holders by making information into a separate identification code.
  • DRM Digital Rights Management
  • DOI Digital Object Identifier
  • INDECS content identification system
  • XrML extensible rights mark-up language
  • Technology encryption technology to prevent illegal copying and tampering. Recently, a watermarking technique for attribution and a fingerprinting technique for tracking a user may be included.
  • the DRM method has an excellent effect in preventing illegal copying of contents and determining illegality of contents through user restriction, but is limited in preventing the distribution, distribution of illegally copied contents, or tracking and searching of distributed contents. There is.
  • Korean Patent Application Publication No. 10-2012-70664 discloses a method of inserting and distributing forensic marks (pinker printing) for user identification in content and blocking illegal uploads using forensic marks in a web hard server. .
  • this method can block only when forensic mark-embedded content is uploaded to a web hard server having a forensic mark detection module. Therefore, it is difficult to check the overall distribution and distribution of illegally copied content.
  • Korean Patent Application Publication No. 10-2010-48711 discloses a method of inserting and distributing a tracking agent to a content, and when the content is executed, a tracking agent transmits information of an execution terminal to a tracking management server to track and manage the distribution of the content. Initiate
  • the tracking agent since the tracking agent is operated at the time of execution of the content, it cannot be executed and simply cannot track the contents in circulation, and since the tracking agent is a kind of application, there is a problem that can be easily removed through hacking technology.
  • Korean Patent Application No. 10-2012-0132673 filed by the applicant provides a method for the search engine to search the content file by converting the content by including a specific identification code in a portion of the original content file.
  • This method requires the user to generate a separate code on a specific site and then upload the content by converting their content.
  • the identification code when inserting information into a specific area, the identification code must be put through a separate conversion step.
  • the content is converted into the converter by inputting information through a specific site and uploading the content.
  • the distribution and distribution of the content requires monitoring and identification. However, if a specific area is the beginning of the content, the content itself may be degraded, which may cause a significant obstacle in using the content. I need a way to do it.
  • the present invention is to solve the problems of the prior art, by matching the identification code of the individual with the identification code of the content to be able to search the content distributed or distributed on-line extensively, and also to ensure that the quality is not degraded Its purpose is. In addition, it is possible to easily check whether the searched content is distributed through a legitimate channel or an illegal copy, and to make it easy to know who the original author is.
  • the present invention provides a service for a user who wants to upload a content or a content creator (hereinafter referred to as a 'content uploader' and more precisely refers to a content creator's terminal). If you connect to a site that communicates via wired or wireless communication and enter your information on the above site, the site will be encoded or encrypted so that the information of the content uploader and the generated content can be identified as your work at any time. Encoding or encryption is called "decryption”.
  • the information stored in this way is automatically decoded and stored in the generated content generated by the content uploader uploading the content (file), and the generated content can be distributed or distributed directly from the server, or It can be received by the uploader for distribution and distribution.
  • the encryption is connected to the content upload server using wired or wireless communication.
  • (A) Content uploader enters his or her information in the APP or WEB of wired and wireless terminals, and this information is stored as separate personal information,
  • the converted content file including the content identification code may be provided to the search requester by dividing the search result for the content file with the content identification code not including the content identification code.
  • the content decoding method generates a separate code for assigning a code to an identifiable content uploader or content and managing the same.
  • the method of matching the content uploader and the content identification code in the step (c) may include storing the information of the content uploader through separate decoding; When the content uploader uploads the original content, the content decoding code is assigned to the converted content by the decryption server; Matching the identification code of the content uploader and the identification code of the content; And providing a content identification code (content uploader identification code + content identification code).
  • the decryption method designates the position determined by the system from the beginning and the end of the content.
  • the information of the decoding header is composed of a user code, a group code, a category code, a data code, a content event code code, a reserved code, and the like, and this code can be changed by addition or deletion at the request of the system.
  • the decryption method inserts a decryption header value and then additionally inserts a virtualization code so that the path through which the content is distributed and distributed can be checked.
  • the content identification code is assigned by matching the information of the content uploader with the information of the original content, and the code is inserted into a specific part of the content.
  • the content uploader can be downloaded again to distribute and distribute the content on the web and APP, or to upload the content file with the matching content identification code to the user's desired site from the server of the system.
  • the present invention relates to a method of identifying and decrypting an individual's work.
  • the present invention includes a content uploader identification code generation module including an input module for inputting information of a content uploader and a content uploader identification code generating means for encoding and matching the inputted information in a system;
  • a content decryption module including means for generating an identification code for encrypting corresponding content upon uploading the content to construct a decryption header, and the decryption header decrypting the content;
  • a virtualization code module including means for generating a virtualization code for automatically assigning a copyright holder identification code and an event (order) value and means for generating the virtualization code;
  • a metadata module for converting and generating decrypted content into metadata including a content uploader identification code, a content decoding header module, and a virtualization code granting module;
  • a content download module for downloading the decrypted content and a content alliance module for distributing and distributing the corresponding content directly to another site; And an identification code confirming means for verifying the information of the corresponding content by the user's identification code or the content identification code, and a function for searching the contents file including the identification code and the contents uploader corresponding to the identification code.
  • a search module having a function of searching using input information, the search module including a search engine for a content uploader and a system administrator; Provides a method and a decryption system for verifying an individual's work online, including
  • the content provider can legally distribute the content file because the search is performed using the uploader identification code and the content identification code included in the content file by matching the information of the content uploader with the content information. And the distribution status can be conveniently checked.
  • the search using the identification code, the search using the user input information, and the search using the metadata are performed in one search request, so that the distribution status of the content file can be confirmed widely.
  • the distribution of contents through the information of the content uploader is provided separately, so that the distribution of contents and distribution of personal works can be legalized to check the distribution of contents and to easily track unauthorized distributors. .
  • FIG. 1 is a schematic structural diagram of a system according to an embodiment of the present invention.
  • FIG. 2 is a flow path of content in a system according to an embodiment of the present invention.
  • FIG. 3 is a block diagram of a matching method of a personal identification code and a content identification tod
  • 5 is a diagram of a decoding code granting method
  • FIG 9 is a configuration example showing a conversion result after content decoding through an MPEG2 TS packet (transmission method commonly used for streaming).
  • FIG. 10 illustrates an example of changing a mpeg2 file after decoding code is applied.
  • the present invention is a content retrieval and traceability monitoring system that includes encryption information in various contents to facilitate searching and tracking, and includes an upload module receiving content and personal information from a terminal of an original copyright holder and an original copyright terminal.
  • Identification code generation means for generating an identification code from the owner's personal information, metadata
  • the identification and distribution status can be checked through the search using the identification code.
  • System for identifying and decrypting personal content communicates with the content uploader 100 through the content uploader 100 and the communication network 200, as shown in the overall system overview of FIG. System server 1000 is included.
  • the content uploader 100 may include a desktop computer, a notebook computer, a portable terminal such as a smart phone and a tablet PC having a wireless Internet connection, and other computer devices capable of data communication.
  • the type of the communication network 200 is not limited, and includes, for example, a wired or wireless Internet network, a mobile communication network, a LAN, a WAN, a wireless LAN, or the like, or an optional combination thereof.
  • the system server 1000 may include an upload module 1010, a metadata conversion module 1020, a decryption module 1100, a virtualization module 1200, a metadata conversion module 1400, a search module 1020, and a content management module ( 1030, a matching module 1500, and the like, and interoperate with the database 2000. Also, although not shown in the drawings, a control means for controlling the operation of the system, a storage means for storing a program, a database management system (DBMS), a member management means for performing member authentication and login procedures, and a payment processing means for performing a payment process And the like.
  • DBMS database management system
  • the upload module 1010 provides a content upload page to the content uploader 100 to support a content upload procedure.
  • the content file uploaded to the system server 1000 will be referred to as 'content'.
  • the upload page provides an input window for inputting information about the original content file to be uploaded, and the input information may include, for example, a content owner, affiliation or group, or category.
  • the upload module 1010 may provide a metadata input window for inputting metadata of the original content file.
  • the metadata may include the content owner, title, running time, file format, price, and the like.
  • the upload module 1010 may include a function for checking and adding metadata in preparation for this case. Since the metadata items and structure of the content file are not completely standardized, the items and structure may be formalized to be input together when the input information is input.
  • the system server may initialize the metadata information and forcibly insert additional identification code determined by the system by using the metadata conversion module 1400 to provide information.
  • Decryption module 1100 is a module for inserting the identification code of the content when the content is uploaded and executed together with the virtualization module and metadata conversion module can be inserted or executed alone. For example, if there is metadata, the system can read it and only decrypt it without performing metadata conversion. .
  • the virtualization module 1200 may insert the content uploader information and the information of the content event code (event, order) value at the time of uploading the content. This can also be done alone or together with the decryption module and metadata conversion module.
  • the metadata conversion module extracts the metadata and rearranges the metadata in a manner required by the system, and generates a unique metadata identification code to use for searching the contents.
  • the search module 1020 is used to search using any one or more of the codes in the contents created using the decryption identification code, the virtualization identification code, and the metadata identification code.
  • the search module may search the virtualization identification code decryption identification code and the metadata identification code based on the author information and the content information and output the searched result.
  • the search module (1020) is a decryption code content search and history lookup system is related to the online distribution status and usage tracking, the purpose is to search a wide range of use history of decrypted code content distributed or distributed online.
  • the information of the searched content is used for various purposes. That is, the history searched by the search module is stored in a separate DB so that the search history can be stored separately.
  • the information inputted or matched with the content file is uploaded in the system module 1000.
  • user information including IP, etc.
  • user input information and the metadata conversion module 1400 generate an identification code converted from metadata, and the decryption code and virtualization converted through the decoding module 1100.
  • the virtualization code converted from the module 1200 is generated and registered by the content management module 1030 through a matching module that matches the information.
  • the converted content file is transmitted to the content provider or the user's terminal.
  • identification codes metadata, decryption code, virtualization code
  • the search can then be performed using one or more of these identification codes inserted above.
  • the search is performed in parallel with the search through the identification code and the search through the user input information, so that the search module 1020 provides the search result to the search requester.
  • a separate search server is used to provide search results to a user or a content uploader using a search box.
  • decryption code content search and history search are as follows.
  • Content management module 1030 is a module that can manage the content of the content uploader to identify the distribution and distribution path of the content, and to provide the pay view or clicks according to the information, and when the revenue such as advertising occurs information Can provide.
  • the matching module 1500 may match the identification code of the content uploader and the identification code of the content so that the copyright information of the corresponding content can be easily grasped, which is linked to the search module and the affiliate module.
  • the database area 2000 stores information of a content uploader, information of a content, and information such as affiliation and distribution.
  • the system server decrypts the content and creates the decrypted content file.
  • the above content is stored in the database, and it is distributed and distributed. Display the content movement path that enables the
  • 3 relates to a method of matching personal information with content information.
  • the content uploader joins the system and this member information is assigned a personal identification code specified by the system.
  • the code is applied at the time of login, and the content identification code is given when the content uploader uploads the content. Afterwards, the content identification code is generated, and then the personal identification code and the content identification code can be matched. That is, it is possible to check who is the owner of the content.
  • the content uploader may be stored together to generate a content identification code.
  • the decryption header value is provided by encoding the user code, group code, category code, data code, content event code (event, sequence, etc.) and RESERVED attribute value so that they can be inserted into the content.
  • the decryption header may be inserted into a specific part of the content file requested by the system. For example, you can insert content at the beginning of a content file to extract content information.
  • the decoding header has a value of 128 bits, and in the case of the following values, the default value of the digital value is set, and this setting value can be two digits.
  • the content event code may use a random number that is generated according to the order, time, etc. at the time of decoding, and this event code may be used when constructing the virtualization code with the content event value.
  • the virtualization code is configured separately.
  • the decryption header value is composed of a content event value and a content uploader value.
  • the decryption module may be configured as a decryption module by combining the decryption header and the virtualization code value.
  • the decryption code and the virtualization code can be connected by the content event value and searched together, and it is possible to check whether the modulation code is modulated by others.
  • FIG. 5 illustrates a method for assigning a decryption code, which illustrates creating a content identification code through a user code, a group code, a category code, a data code, a content event code, and an attribute code. At this time, this code value can be added or deleted by system setting.
  • FIG. 6 illustrates a method of granting a virtualization code, and illustrates a method of creating and assigning a separate virtualization code value using a content value and an identification code of a content uploader for content identification.
  • the virtualization code is a content uploader and a system. If there is an event of the contents of the change and the modification or the cooperation of the contents uploader, the relevant information is transmitted to the contents uploader's identification code so that the contents uploader and the system administrator can know the details.
  • the content event value may be a random value generated by the system when this situation occurs.
  • the content event code is stored in the content uploader and the system when a change, modification, deletion, etc. occurs, and the customized content advertisement information using big data through the change history tracking and the viewer (user) are used. Can be provided.
  • FIG. 7 is an exemplary diagram illustrating a method of assigning, ie, inserting, a decoding code of a decoding method.
  • the decryption code is composed of user code, group code, category code, date code, sequence code, reserved, and so on. These values are inserted into VALUE1 to VALUE6 of the header.
  • the last byte, TCI_INDEX, is used for dummy positioning and minimum unit header modulation.
  • the decryption code information is divided into information input when encoding from the server and user information input when downloading.
  • the information input to the decryption code at the time of download is a user information value.
  • the size of the decryption code in this example is fixed at 128 bytes, and if the 128 bytes are not filled, the empty value is filled with 00.
  • the value may change in size depending on the size or format of the system, user and content.
  • the decryption code value is inserted at the beginning of the original file, and the actual example of the added decryption code is as follows.
  • the dummy code is composed of a content event code value and a value of a copyright holder among the decryption code values.
  • the value of the minimum unit is indicated before and after the change.
  • the figure below shows the structure of MPEG2 TS packet and the following figure shows the structure of MPEG2 TS packet after content decoding is applied.
  • the first 2 bytes of the virtualization code and the position to insert the virtualization code are appropriately determined by using the reference value generated based on the decryption code data.
  • the decoding code is generated in the header of the TS packet. ), For example, is not meant for content conversion or can be easily restored in a general-purpose player, so avoid TS header positions. Modulation is done for each packet. To increase complexity, the virtualization code is inserted at a new location created based on the modulation location value. In addition, all TS headers are modulated so that the converted contents are not recognized as TS files.
  • the TS header is 4 bytes and the first 4 bytes of all packets are always modulated.
  • FIG. 10 illustrates an example in which an mpeg2 file is changed after decoding code is applied.
  • 11 is an example of configuring a decoding code value.
  • the decryption code value consists of 8 bytes and is used to specify the insertion position of the modulation and virtualization code values.
  • the decoding code value is designated as [Random Value] in the first [0 ⁇ 3] bytes and in the subsequent step, [4 ⁇ 6] byte is designated as the Random Value but is set after 0x80 OR operation.
  • [7] byte of the decoding code value is a pattern value, and is involved in modulating and specifying a dummy data insertion position. Version control of the decoding module can be performed by specifying a range of the pattern value. (You can create a library to not play content that does not fit the range.)
  • the pattern value is used by setting a random value out of a specific range of values (EX: 0 ⁇ 0xFF).
  • the pattern value is generated by calculating through 7 bytes before TCI INDEX.
  • the pattern value generation formula is a pattern generation algorithm that only the encoding entity and the decoding entity (TCI player) know to use the pattern as a key value. It is generated dynamically. Since the pattern value is dynamically generated, the pattern value is not inserted into the decoding code value [7] and the decoding code value [7] has no value or a meaningless value.
  • decoding a pattern is generated through a pattern generation algorithm and a position is calculated based on this value.
  • the 12 is a user of content and The user Provide the search results An example of how will be.
  • the information of the content uploader 100 and the content file is input or matched with the content identification code
  • the information or the matched information input together with the content file is transmitted to the upload module 1010 in the system server 1000. IP, etc.
  • the user input information and the metadata generated from the metadata converted from the metadata conversion module 1400 converted into metadata
  • decrypted code and virtualization module 1200 converted through the decryption module 1100
  • the virtualization code is converted from and is registered with the content management module 1030 through the matching module 1500 matching these information.
  • the various content identification codes are inserted into the original content file to generate the converted content file.
  • the converted content file is transmitted to the content provider or the user's terminal.
  • the search can be performed using one of these identification codes.
  • the search is performed in parallel with the search through the identification code and the search through the user input information, so that the search module 1020 provides the search result to the search requester.
  • a separate search server is used to provide search results to a user or a content uploader using a search box.
  • the order of the metadata conversion module, the decoding module, and the virtualization module during the post-upload module may be changed by the system administrator, and a separate conversion module may be generated and added for content management.
  • decryption code content search and history search are as follows.
  • the content files in this document include literary works (poetry, novels, papers, lectures, screenplays, speeches, etc.), music works, theater works, art works (paintings, calligraphy, sculpture, crafts, applied art works), architectural works (architecture, Design work, etc.), photographic works, video works, figure works, computer program works, etc.
  • Fig. 13 shows the operation of the decryption code player.
  • the present invention can be used for the protection of copyright.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The present invention relates to a system for incorporating decryption information into a content so that an original copyright holder can recognize the work of his/her own. When a content code is assigned, a virtualization code is inserted into an original content using a content event value and a copyright holder value, and the content is decrypted to generate a converted content file, and a release and distribution situation can be confirmed through a search using an identification code included in the converted content file.

Description

다양한 콘텐츠에 암호화정보를 포함시켜 검색 및 추적이 용이하도록 한 콘텐츠 검색 및 이력추적 감시시스템Content search and traceability monitoring system that includes encryption information in various contents for easy searching and tracking
본 발명은 온라인상에서 콘텐츠를 배포하고 유통이 될 때 원 저작권자가 본인의 저작물이 유통되어지는 것을 확인 하는 방법으로서 구체적으로는 콘텐츠파일을 패키지형태로 일정영역 혹은 전체를 포함(둘러싸는)하여 저작권자의 정보를 별도의 식별코드로 만들어 콘텐츠의 저작권자를 식별할 수 있도록 하는 방법에 관한 것이다.The present invention is a method for distributing content and distributing it online, in which the original copyright holder checks that his / her copyrighted work is distributed. Specifically, the content file includes a certain area or the whole (around) the content file in a package form. The present invention relates to a method of identifying information copyright holders by making information into a separate identification code.
최근 인터넷이나 이동통신망을 통한 개인의 콘텐츠생성과 배포가 보편대중화 되면서 본인의 저작물을 특정한 사이트에 올려놓아도 이를 제 3자가 다시 별도의 프로그램으로 다운을 받아 제 3자의 아이디로 재배포가 되면서 이에 대한 원저작권자가 누구인지에 대한 것에 관심이 많게 되었다. 현재는 저작권자 본인 혹은 네티즌들이 이를 발견하여 원저작권자에게 알려 주는 사례가 있지만, 이는 일부 유명한 콘텐츠만 그러할 뿐, 이에 대한 정확한 추적은 어려운 것이 사실이다. 이에 저작권자의 콘텐츠가 어떻게 유통되고 제 3자에 의해서 어떻게 유통이 되는지를 알 수 있는 방법에 대한 관심이 높아지게 되었다. Recently, as the creation and distribution of individual contents through the Internet or mobile communication network became popular, even if the user puts his own work on a specific site, the third party downloads it as a separate program and redistributes it as a third party's ID. There is a lot of interest in who is who. Currently, there are cases where the copyright owner or netizens discover and notify the original copyright holder, but this is only true for some famous contents, and it is difficult to accurately track it. Accordingly, interest in how to know how copyrighted contents are distributed and how they are distributed by third parties has increased.
일반적으로 디지털 콘텐츠의 무단사용을 방지하고 제공자의 권리와 이익을 보호하는 기술을 총칭하여DRM (Digital Rights Management)이라고 한다. DRM은 콘텐츠 식별체계인 DOI(Digital Object Identifier), 콘텐츠의 메타데이터에 관한 일종의 표준인 인덱스(INDECS), 콘텐츠의 사용조건이나 사용권한을 정의하는 XrML(extensible rights mark-up language) 등의 권리표현기술, 불법적인 복제와 변조를 방지하기 위한 암호화기술 등에 의해 구현된다. 최근에는 저작자 표시를 위한 워터마킹 기술, 사용자 추적을 위한 핑거프린팅 기술 등을 포함하기도 한다.In general, the technology that prevents unauthorized use of digital content and protects the rights and interests of providers is collectively called Digital Rights Management (DRM). DRM expresses rights such as DOI (Digital Object Identifier), a content identification system, index (INDECS), a standard for metadata of content, and extensible rights mark-up language (XrML) that defines the terms of use or permissions of content. Technology, encryption technology to prevent illegal copying and tampering. Recently, a watermarking technique for attribution and a fingerprinting technique for tracking a user may be included.
그런데 DRM 방식은 사용자 제한을 통해 콘텐츠의 불법 복제를 방지하고 콘텐츠의 불법성을 판별하는 데는 뛰어난 효과를 가지지만, 일단 불법 복제된 콘텐츠의 배포, 유통을 방지하거나 배포된 콘텐츠를 추적 검색하는 데는한계가 있다.However, the DRM method has an excellent effect in preventing illegal copying of contents and determining illegality of contents through user restriction, but is limited in preventing the distribution, distribution of illegally copied contents, or tracking and searching of distributed contents. There is.
최근 이러한 문제를 해결하기 위한 다양한 방법이 소개되고 있다. Recently, various methods for solving these problems have been introduced.
예를 들어 공개특허공보 제10-2012-70664호는 콘텐츠에 사용자식별을 위한 포렌식마크(핑커프린팅)를 삽입하여 배포하고 웹하드서버에서 포렌식마크를 이용하여 불법 업로드를 차단하는 방법을 개시하고 있다. 그러나 이 방법은 포렌식마크가 삽입된 콘텐츠가 포렌식마크 검출 모듈을 구비한 웹하드서버에 업로드될 때만 차단할 수 있으므로 불법 복제된 콘텐츠의 전반적인 유통 및 배포상황을 확인하기 어려운 문제가 있다.For example, Korean Patent Application Publication No. 10-2012-70664 discloses a method of inserting and distributing forensic marks (pinker printing) for user identification in content and blocking illegal uploads using forensic marks in a web hard server. . However, this method can block only when forensic mark-embedded content is uploaded to a web hard server having a forensic mark detection module. Therefore, it is difficult to check the overall distribution and distribution of illegally copied content.
또한 공개특허공보 제10-2010-48711호 는 콘텐츠에 추적에이전트를 삽입하여 배포하고, 콘텐츠 실행 시 추적에이전트가 실행단말의 정보를 추적관리서버로 전송함으로써 콘텐츠의 배포상황을 추적 관리할 수 있는 방법을 개시In addition, Korean Patent Application Publication No. 10-2010-48711 discloses a method of inserting and distributing a tracking agent to a content, and when the content is executed, a tracking agent transmits information of an execution terminal to a tracking management server to track and manage the distribution of the content. Initiate
하고 있다. 그러나 추적에이전트는 콘텐츠 실행 시에 동작하는 것이므로 실행되지 않고 단순히 유통 중인 콘텐츠는 추적할 수 없고 추적에이전트는 일종의 응용프로그램이므로 해킹기술을 통해 쉽게 제거될 수 있는 문제점이있다.Doing. However, since the tracking agent is operated at the time of execution of the content, it cannot be executed and simply cannot track the contents in circulation, and since the tracking agent is a kind of application, there is a problem that can be easily removed through hacking technology.
또한, 출원인이 출원한 출원번호 10-2012-0132673호는 원본콘텐츠파일 일부분에 특정식별코드를 포함하여 콘텐츠를 변환하여 검색엔진이 콘텐츠 파일을 검색할 수 있는 방법을 제공하고 있다. 이 방법은 특정사이트에서 사용자가 별도의 코드를 생성하고 이후 본인의 콘텐츠를 변환하여 콘텐츠를 업로드 해야 한다. 특히, 특정영역이라는 부분에 정보를 삽입을 할 때 별도의 변환을 하는 단계를 거쳐 식별코드를 넣어야 하는데 이러한 변환기를 특정사이트를 통하여 정보를 입력하고 콘텐츠를 업로드하여 변환된 코드가 삽입된 콘텐츠를 가지고 콘텐츠를 유통 및 배포를 해야 감시 및 식별을 할 수 있게 되어 있으나, 특정영역이 콘텐츠의 시작부분일 경우 콘텐츠 자체가 품질이 떨어지는 현상이 발생할 수 있어 콘텐츠를 이용하는데 있어서 상당한 지장을 초래할 수 있어 이를 개선할 방법이 필요하다. In addition, Korean Patent Application No. 10-2012-0132673 filed by the applicant provides a method for the search engine to search the content file by converting the content by including a specific identification code in a portion of the original content file. This method requires the user to generate a separate code on a specific site and then upload the content by converting their content. In particular, when inserting information into a specific area, the identification code must be put through a separate conversion step. The content is converted into the converter by inputting information through a specific site and uploading the content. The distribution and distribution of the content requires monitoring and identification. However, if a specific area is the beginning of the content, the content itself may be degraded, which may cause a significant obstacle in using the content. I need a way to do it.
본 발명은 이러한 종래 기술의 문제점을 해결하기 위한 것으로서, 개인의 식별코드부여와 콘텐츠의 식별코드를 매칭하여 온라인 상에서 배포되거나 유통되는 콘텐츠를 광범위하게 검색할 수 있도록 하며, 또한 그 품질이 떨어지지 않도록 하는데 그 목적이 있다. 또한 검색된 콘텐츠가 정당한 경로를 통해 유통된 것인지 불법 복제품인지 여부를 쉽게 확인할 수 있으며, 원저작자가 누구인지도 알기 쉽도록 하는데 그 목적이 있다.The present invention is to solve the problems of the prior art, by matching the identification code of the individual with the identification code of the content to be able to search the content distributed or distributed on-line extensively, and also to ensure that the quality is not degraded Its purpose is. In addition, it is possible to easily check whether the searched content is distributed through a legitimate channel or an illegal copy, and to make it easy to know who the original author is.
본 발명은 위의 목적을 달성하기 위하여, 콘텐츠업로드를 하려는 자 혹은 콘텐츠 생성자( 본 문서에서는 ‘콘텐츠업로더’ 라고 하며 보다 정확하게는 콘텐츠 생성자의 단말기를 말한다.)는 본인의 정보를 본 서비스를 제공하는 유무선으로 통신이 되는 사이트에 접속을 하고, 상기의 사이트에서 본인의 정보를 입력하면, 해당사이트는 콘텐츠업로더의 정보와 생성콘텐츠가 언제든 본인의 저작물임을 알 수 있도록 코드화 혹은 암호화(본 문서에서는 코드화 혹은 암호화를 “복호화”라 칭함)한다. In order to achieve the above object, the present invention provides a service for a user who wants to upload a content or a content creator (hereinafter referred to as a 'content uploader' and more precisely refers to a content creator's terminal). If you connect to a site that communicates via wired or wireless communication and enter your information on the above site, the site will be encoded or encrypted so that the information of the content uploader and the generated content can be identified as your work at any time. Encoding or encryption is called "decryption".
이렇게 저장된 정보는 콘텐츠업로더가 콘텐츠(파일)을 업로드하여 생성된 생성콘텐츠에 자동으로 정보가 콘텐츠에 복호화되어 저장되어 지게 되며, 이렇게 만들어진 콘텐츠는 서버에서 바로 유통이나 배급이 되도록 할 수 있거나, 콘텐츠업로더가 받아서 다시 배급 및 유통을 할 수 있도록 할 수 있다.The information stored in this way is automatically decoded and stored in the generated content generated by the content uploader uploading the content (file), and the generated content can be distributed or distributed directly from the server, or It can be received by the uploader for distribution and distribution.
이때 암호화는 유무선통신을 이용하여 콘텐츠업로드 서버에 접속을 하고In this case, the encryption is connected to the content upload server using wired or wireless communication.
(가) 콘텐츠업로더는 유무선단말기의 APP혹은 WEB에서 본인의 정보를 입력하며, 이 정보는 별도의 본인정보로 저장이 되며,(A) Content uploader enters his or her information in the APP or WEB of wired and wireless terminals, and this information is stored as separate personal information,
(나) 제작된 혹은 저작권자로부터 위임 또는 권리를 받은 콘텐츠(본 문서에서는 원본콘텐츠라고 칭함.)를 유무선단말기의 APP혹은 WEB을 통하여 복호화서버에 업로드를 하면, 복호화서버를 통하여 변환된 콘텐츠( 본 문서의 변환된 콘텐츠는 콘텐츠가 변환이 되는 것이 아닌 원본콘텐츠가 복호화되었다는 것을 의미함.)가 생성이 된다.(B) If uploaded to the decryption server through the APP or WEB of the wired / wireless terminal, the content (authorized or authorized by the copyright holder) is converted or converted through the decryption server (this document). The converted content of means that the original content is decoded, not the content is converted.) Is generated.
(다) 본인정보와 복호화콘텐츠는 별도의 콘텐츠식별코드가 생성이 되며, 이 정보는 콘텐츠업로더와 서버에 보관이 된다.(C) Separate contents identification code is generated for the personal information and decrypted contents, and this information is stored in the content uploader and the server.
(라) 콘텐츠식별코드를 포함하는 변환된 콘텐츠는 검색사이트에서 검색이 되어지며, 이렇게 검색된 결과값은 서버에서 자동으로 추출하여 콘텐츠업로더와 본 시스템에 보관되어진다.(D) The converted content including the content identification code is searched on the search site, and the searched result value is automatically extracted from the server and stored in the content uploader and the system.
(마) 콘텐츠식별코드를 포함하는 변환된 콘텐츠파일은 대한 검색결과와 콘텐츠 식별코드를 포함하지 않는 콘텐츠파일에 대한 검색결과를 구분하여 검색 요청자에 제공할 수 있다.(E) The converted content file including the content identification code may be provided to the search requester by dividing the search result for the content file with the content identification code not including the content identification code.
본 발명에 따른 콘텐츠 복호화방법은 식별 가능한 콘텐츠업로더 혹은 콘텐츠에 코드를 부여하고 이를 관리할 수 있는 별도의 코드를 생성한다. 상기의 (다) 단계에서 콘텐츠업로더와 콘텐츠식별코드를 매칭하는 방법은 콘텐츠업로더의 정보를 별도의 복호화를 거쳐 정보를 저장하는 단계; 콘텐츠업로더가 원본콘텐츠를 업로드하면 복호화서버에서 변환된 콘텐츠에 콘텐츠식별코드를 부여하는 단계;콘텐츠업로더의 식별코드와 콘텐츠의 식별코드를 매칭하는 단계; 콘텐츠확인코드(콘텐츠업로더식별코드+콘텐츠식별코드)를 부여하는 단계;를 포함하게 된다.The content decoding method according to the present invention generates a separate code for assigning a code to an identifiable content uploader or content and managing the same. The method of matching the content uploader and the content identification code in the step (c) may include storing the information of the content uploader through separate decoding; When the content uploader uploads the original content, the content decoding code is assigned to the converted content by the decryption server; Matching the identification code of the content uploader and the identification code of the content; And providing a content identification code (content uploader identification code + content identification code).
상기의 (나) 단계에서 콘텐츠의 복호화 방법은In the above (b) step, the content decoding method
(가) 콘텐츠업로드시스템에 복호화헤더를 구성하는 장치 및 시스템을 구비하며, (A) an apparatus and a system for configuring a decryption header in a content upload system,
(나) 복호화방법은 콘텐츠의 시작과 끝의 어느 하나 중에서 시스템에서 정하는 위치를 지정하며,(B) The decryption method designates the position determined by the system from the beginning and the end of the content.
(다)지정된 위치에 복호화헤더를 콘텐츠에 삽입을 하게 된다.(C) The decryption header is inserted into the content at the specified position.
이때 복호화헤더의 정보는 유저코드,그룹코드,카테고리코드,데이터코드,콘텐츠이벤트코드코드,리저브드코드 등으로 구성되며, 이 코드는 시스템의 요구에 의해서 추가 또는 삭제 등으로 변경될 수 있다.At this time, the information of the decoding header is composed of a user code, a group code, a category code, a data code, a content event code code, a reserved code, and the like, and this code can be changed by addition or deletion at the request of the system.
(라) 복호화헤더가 구성이 되면, 가상화코드를 구성하게 되는데, 복호화헤더의 값 중 콘텐츠이벤트코드 값과 저작권자 값으로 가상화 코드를 구성하여 생성하며 이 값은 추후 저작권자의 파일 배급과 유통에 관한 검색 시에 사용된다.(D) When the decryption header is configured, the virtualization code is composed, and the virtualization code is composed of the content event code value and the copyright holder value among the decryption header values, and this value is later searched for the distribution and distribution of the copyright holder's file. Used for poetry.
(마) 즉, 복호화 방법은 복호화 헤더값을 삽입한 후 가상화코드를 추가로 삽입하여 콘텐츠가 배급되고 유통될때 어떤 경로로 유통되는 것인지 확인할 수 있도록 한다. (E) In other words, the decryption method inserts a decryption header value and then additionally inserts a virtualization code so that the path through which the content is distributed and distributed can be checked.
본 발명은, 콘텐츠업로더가 콘텐츠(파일)을 업로드를 할 경우 콘텐츠업로더의 정보와 원본콘텐츠의 정보를 매칭하여 콘텐츠식별코드가 부여가 되며, 이 부여된 코드는 콘텐츠의 특정부분에 삽입이되어, 콘텐츠업로더가 다시 내려받아 해당 콘텐츠를 웹과APP상에서 배급 및 유통을 할 수 있거나, 매칭된 콘텐츠식별코드가 삽입된 콘텐츠파일을 해당 시스템의 서버에서 사용자가 원하는 사이트로 업로드가 될 수 있도록 할 수 있는 개인의 저작물의 확인 방법 및 복호화 하는 방법에 관한 것이다.In the present invention, when the content uploader uploads a content (file), the content identification code is assigned by matching the information of the content uploader with the information of the original content, and the code is inserted into a specific part of the content. The content uploader can be downloaded again to distribute and distribute the content on the web and APP, or to upload the content file with the matching content identification code to the user's desired site from the server of the system. The present invention relates to a method of identifying and decrypting an individual's work.
본 발명은, 콘텐츠업로더의 정보를 입력하는 입력모듈과 입력되어진 정보를 시스템에서 코드화하여 매칭할 수 있도록 하는 콘텐츠업로더 식별코드생성수단을 포함하는 콘텐츠업로더식별코드 생성모듈; The present invention includes a content uploader identification code generation module including an input module for inputting information of a content uploader and a content uploader identification code generating means for encoding and matching the inputted information in a system;
콘텐츠를 업로드 시에 해당콘텐츠를 암호화하여 복호화 헤더를 구성하고 상기 복호화헤더는 복호화하는 식별코드를 생성하는 수단을 포함하는 콘텐츠 복호화 모듈;A content decryption module including means for generating an identification code for encrypting corresponding content upon uploading the content to construct a decryption header, and the decryption header decrypting the content;
저작권자 식별코드와 사건(순서)값을 자동으로 부여하는 가상화코드를 생성하는 수단과 상기 가상화코드를 생성하는 수단을 포함하는 가상화코드 모듈;A virtualization code module including means for generating a virtualization code for automatically assigning a copyright holder identification code and an event (order) value and means for generating the virtualization code;
콘텐츠업로더 식별코드와 콘텐츠복호화헤더모듈, 가상화코드부여모듈을 포함하여 복호화 된 콘텐츠를 메타데이터로 변환 및 생성하는 메타데이터모듈;A metadata module for converting and generating decrypted content into metadata, including a content uploader identification code, a content decoding header module, and a virtualization code granting module;
복호화된 콘텐츠를 내려 받을 수 있는 콘텐츠다운로드모듈과 해당 콘텐츠를 다른 사이트로 바로 배급 및 유통을 시킬 수 있는 콘텐츠제휴모듈; 로 구성이 되며, 콘텐츠 업로더가 본인의 식별코드 혹은 콘텐츠식별코드로 해당콘텐츠의 정보를 확인하는 식별코드확인 수단과 상기 식별코드가 포함된 콘텐츠파일을 검색하는 기능과 상기 식별코드에 대응하는 상기 입력정보를 이용하여 검색하는 기능을 구비하여 콘텐츠업로더와 시스템관리자를 위한 검색엔진을 포함하는 검색모듈; 을 포함하여 온라인을 통한 개인의 저작물을 확인하는 방법 및 복호화 시스템을 제공한다A content download module for downloading the decrypted content and a content alliance module for distributing and distributing the corresponding content directly to another site; And an identification code confirming means for verifying the information of the corresponding content by the user's identification code or the content identification code, and a function for searching the contents file including the identification code and the contents uploader corresponding to the identification code. A search module having a function of searching using input information, the search module including a search engine for a content uploader and a system administrator; Provides a method and a decryption system for verifying an individual's work online, including
본 발명에 따른 콘텐츠복호화서비스를 이용하면, 콘텐츠업로더의 정보와 콘텐츠의 정보를 매칭하여 콘텐츠파일에 포함된 업로더식별코드와 콘텐츠식별코드를 이용한 검색이 이루어지므로 콘텐츠제공자는 콘텐츠파일의 적법한 배포 및 유통상황을 편리하게 확인할 수 있다.When the content decryption service according to the present invention is used, the content provider can legally distribute the content file because the search is performed using the uploader identification code and the content identification code included in the content file by matching the information of the content uploader with the content information. And the distribution status can be conveniently checked.
또한 한 번의 검색요청으로 식별코드를 이용한 검색, 사용자 입력정보를 이용한 검색, 메타데이터를 이용한 검색 등이 병행하여 진행되므로 콘텐츠파일의 배포상황을 광범위하게 확인할 수 있다.In addition, the search using the identification code, the search using the user input information, and the search using the metadata are performed in one search request, so that the distribution status of the content file can be confirmed widely.
또한 콘텐츠 업로더의 정보를 통한 콘텐츠의 배포상황이 구분하여 제공되므로 콘텐츠 배포상황을 확인하고, 무단배포자를 쉽게 추적하여 신고 등의 조치를 취할 수 있는 개인저작물의 유통 및 배급을 적법하게 할 수 있다.In addition, the distribution of contents through the information of the content uploader is provided separately, so that the distribution of contents and distribution of personal works can be legalized to check the distribution of contents and to easily track unauthorized distributors. .
도 1은 본 발명의 실시예에 따른 시스템의 개략 구성도1 is a schematic structural diagram of a system according to an embodiment of the present invention;
도 2는 본 발명의 실시예에 따른 시스템내에서의 콘텐츠의 이동경로2 is a flow path of content in a system according to an embodiment of the present invention.
도 3는 개인식별코드와 콘텐츠식별토드의 매칭방법의 구성도3 is a block diagram of a matching method of a personal identification code and a content identification tod
도 4은 콘텐츠 복호화 방법의 전체구성4 is an overall configuration of a content decryption method
도 5는 복호화코드 부여방법의 도면 5 is a diagram of a decoding code granting method
도 6는 가상화코드부여방법6 is a virtual code granting method
도 7은 복호화방법의 예시7 is an example of a decoding method.
도 8은 가상화코드값을 부여하는 데이터의 구성예시.8 shows an example of configuration of data giving a virtualization code value.
도 9는 MPEG2 TS 패킷(스트리밍을 하기 위해 공용화 해놓은 전송방식)을 통해 콘텐츠복호화 후 변환 결과를 보여준 구성예시.9 is a configuration example showing a conversion result after content decoding through an MPEG2 TS packet (transmission method commonly used for streaming).
도 10은 도 10은 복호화코드가 적용된 이후의 mpeg2 파일이 변경된 예시.FIG. 10 illustrates an example of changing a mpeg2 file after decoding code is applied.
도11내지 도13은 또다른 실시예를 도시하는 도면11 to 13 show yet another embodiment
본 발명은 다양한 콘텐츠에 암호화정보를 포함시켜 검색 및 추적이 용이하도록 한 콘텐츠 검색 및 이력추적 감시시스템으로써,원저작권자의 단말기로부터 콘텐츠와 본인정보를 전송받는 업로드모듈과 원저작권자의 단말기로부터 제공받은 원저작권자의 본인정보, 메터데이터로부터 식별코드를 생성하는 식별코드 생성수단과The present invention is a content retrieval and traceability monitoring system that includes encryption information in various contents to facilitate searching and tracking, and includes an upload module receiving content and personal information from a terminal of an original copyright holder and an original copyright terminal. Identification code generation means for generating an identification code from the owner's personal information, metadata
식별코드를 원본 콘텐츠 파일에 삽입하여 변환콘텐츠 파일을 생성하는 복호화 모듈을 포함하여 식별코드생성수단으로부터 생성된 식별코드를 원본콘텐츠에 삽입하여 복호화시켜 변환컨텐츠파일을 생성하여변환된 콘텐츠 파일에 포함된 식별코드를 이용한 검색을 통해 배포 및 배포상황을 확인 가능하도록 한다.Including a decoding module for inserting the identification code into the original content file to generate a converted content file by inserting and decoding the identification code generated from the identification code generating means into the original content to generate a converted content file contained in the converted content file The identification and distribution status can be checked through the search using the identification code.
이하에서는 도면을 참조하여 본 발명의 바람직한 실시예를 상세히 설명한다.Hereinafter, exemplary embodiments of the present invention will be described in detail with reference to the accompanying drawings.
본 발명의 일 실시예에 따른 개인콘텐츠의 확인 및 복호화시스템은 도 1의 전체시스템개요에 나타낸 바와 같이, 콘텐츠업로더(100), 통신망(200)을 통해 상기 콘텐츠업로더(100)과 통신하는 시스템서버(1000)를 포함한다.System for identifying and decrypting personal content according to an embodiment of the present invention communicates with the content uploader 100 through the content uploader 100 and the communication network 200, as shown in the overall system overview of FIG. System server 1000 is included.
콘텐츠업로더(100)은 데스크톱 컴퓨터, 노트북 컴퓨터, 무선 인터넷 접속이 가능한 스마트폰, 태블릿 PC 등의 휴대용 단말, 데이터 통신이 가능한 기타 컴퓨터장치를 포함한다.The content uploader 100 may include a desktop computer, a notebook computer, a portable terminal such as a smart phone and a tablet PC having a wireless Internet connection, and other computer devices capable of data communication.
통신망(200)의 종류는 제한이 없으며, 예를 들어 유선 또는 무선 인터넷망, 이동통신망, LAN, WAN, 무선랜 등을포함하거나 이들의 선택적인 조합으로 구성된다,The type of the communication network 200 is not limited, and includes, for example, a wired or wireless Internet network, a mobile communication network, a LAN, a WAN, a wireless LAN, or the like, or an optional combination thereof.
시스템서버(1000)는 업로드모듈(1010)과 메타데이터변환모듈(1020), 복호화모듈(1100), 가상화모듈(1200), 메타데이터변환모듈(1400), 검색모듈(1020), 콘텐츠관리모듈(1030), 매칭모듈(1500) 등을 포함하며, 데이터베이스(2000)와 연동한다. 또한 도면에는 나타내지 않았지만 시스템의 동작을 제어하는 제어수단, 프로그램 등이 저장되는 저장수단, 데이터베이스관리시스템(DBMS), 회원인증 및 로그인 절차를 수행하는 회원관리수단, 비용결제과정을 수행하는 결제처리수단 등을 포함한다.The system server 1000 may include an upload module 1010, a metadata conversion module 1020, a decryption module 1100, a virtualization module 1200, a metadata conversion module 1400, a search module 1020, and a content management module ( 1030, a matching module 1500, and the like, and interoperate with the database 2000. Also, although not shown in the drawings, a control means for controlling the operation of the system, a storage means for storing a program, a database management system (DBMS), a member management means for performing member authentication and login procedures, and a payment processing means for performing a payment process And the like.
업로드모듈(1010)은 콘텐츠업로더(100)로 콘텐츠 업로드페이지를 제공하여 콘텐츠 업로드 절차를 지원한다.The upload module 1010 provides a content upload page to the content uploader 100 to support a content upload procedure.
본 명세서에서는 설명의 편의를 위해 시스템서버(1000)로 업로드 되는 콘텐츠파일을 '콘텐츠'로 칭하기로 한다.In the present specification, for convenience of description, the content file uploaded to the system server 1000 will be referred to as 'content'.
업로드페이지는 업로드 할 원본콘텐츠파일에 대한 정보를 입력하는 입력창을 제공하며, 입력정보는 예를 들어 콘텐츠 소유자, 소속단체 또는 그룹, 카테고리 등을 포함할 수 있다.The upload page provides an input window for inputting information about the original content file to be uploaded, and the input information may include, for example, a content owner, affiliation or group, or category.
또한 업로드모듈(1010)은 원본콘텐츠 파일의 메타데이터를 입력하는 메타데이터 입력창을 제공할 수도 있다. 메타데이터는 콘텐츠 저작권자, 제목, 러닝타임, 파일포맷, 가격 등을 포함할 수 있다.In addition, the upload module 1010 may provide a metadata input window for inputting metadata of the original content file. The metadata may include the content owner, title, running time, file format, price, and the like.
원본 콘텐츠 파일에는 이미 메타데이터가 포함된 경우도 있으므로 이 경우를 대비하여 업로드모듈(1010)에 메타데이터를 확인하고 추가하는 기능을 포함시킬 수도 있다. 콘텐츠 파일의 메타데이터 항목 및 구조는 완전히 표준화되지 않은 상태이므로 항목 및 구조를 정형화하여 입력정보를 입력할 때 함께 입력하도록 할 수도 있다.Since the original content file may already include metadata, the upload module 1010 may include a function for checking and adding metadata in preparation for this case. Since the metadata items and structure of the content file are not completely standardized, the items and structure may be formalized to be input together when the input information is input.
이때 시스템서버는 메타데이터 정보를 초기화하여 시스템에서 정하는 별도의 메타데이터를 식별코드를 메타데이터변환모듈(1400)을 이용하여 강제적으로 삽입하여 정보를 제공할 수 있다. At this time, the system server may initialize the metadata information and forcibly insert additional identification code determined by the system by using the metadata conversion module 1400 to provide information.
복호화모듈(1100)은 콘텐츠의 식별코드를 삽입하는 모듈로써 콘텐츠를 업로드 할 때에 가상화모듈 및 메타데이변환모듈과 함께 실행되어 삽입되거나 혹은 단독으로 실행 될 수 있다. 예를 들어 메타데이터가 있는 경우 시스템은 이를 판독하여 메타데이터변환을 실시하지 않고 복호화만 하도록 할 수 있다. .Decryption module 1100 is a module for inserting the identification code of the content when the content is uploaded and executed together with the virtualization module and metadata conversion module can be inserted or executed alone. For example, if there is metadata, the system can read it and only decrypt it without performing metadata conversion. .
가상화모듈(1200)은 콘텐츠업로더정보와 콘텐츠 이벤트코드(사건,순서)값의 정보를 콘텐츠업로드 시에 삽입할 수 있다. 이 또한 복호화모듈과 메타데이터변환모듈과 함께 혹은 단독으로 실행 될 수 있다.The virtualization module 1200 may insert the content uploader information and the information of the content event code (event, order) value at the time of uploading the content. This can also be done alone or together with the decryption module and metadata conversion module.
메타데이터변환모듈은 메타데이터가 있는 콘텐츠의 경우는 메타데이터를 추출하여 시스템에서 요구하는 방법으로 재배열하며, 고유의 메타데이터식별코드를 생성하여 콘텐츠의 검색에 이용할 수 있도록 한다.The metadata conversion module extracts the metadata and rearranges the metadata in a manner required by the system, and generates a unique metadata identification code to use for searching the contents.
검색모듈(1020)은 만들어진 복호화식별코드와 가상화식별코드, 메타데이터 식별코드를 이용하여 만들어진 콘텐츠에서 상기 코드들중 어느 하나 이상을 이용하여 검색하기 위하여 사용한다. 검색모듈은 저작자정보 및 콘텐츠정보를 기준으로 하여 가상화 식별코드 복호화 식별코드, 메타데이터 식별코드를 검색하여 검색된 결과값을 출력할 수 있다.The search module 1020 is used to search using any one or more of the codes in the contents created using the decryption identification code, the virtualization identification code, and the metadata identification code. The search module may search the virtualization identification code decryption identification code and the metadata identification code based on the author information and the content information and output the searched result.
특히, 검색모듈은(1020)은 복호화코드 콘텐츠 검색 및 이력조회 시스템은 온라인 배포 현황 및 사용 현황 추적에 관한 것으로써 그 목적은 온라인 상에서 배포되거나 유통되는 복호화코드 콘텐츠의 사용이력을 광범위하게 검색할 수 있도록 하고, 검색된 콘텐츠의 정보를 다양한 용도로 활용하는데 있다.즉, 검색모듈이 검색한 이력은 별도의 DB에 저장되어 검색이력이 따로 저장될 수 있다. In particular, the search module (1020) is a decryption code content search and history lookup system is related to the online distribution status and usage tracking, the purpose is to search a wide range of use history of decrypted code content distributed or distributed online. In other words, the information of the searched content is used for various purposes. That is, the history searched by the search module is stored in a separate DB so that the search history can be stored separately.
콘텐츠 검색 및 이력조회를 위한 구체적인 방법은 아래와 같다.Specific methods for content search and history inquiry are as follows.
콘텐츠업로더(100)와 콘텐츠 파일의 정보를 입력하거나 콘텐츠파일이 콘텐츠식별코드와 매칭이 되면(일치하게 되면) 콘텐츠 파일과 함께 입력한 정보 또는 매칭된 정보가 시스템서버(1000)내의 업로드모듈(1010)으로 전해지면 사용자 정보(IP 등을 포함), 사용자 입력 정보와 메타데이터변환모듈(1400)이 메타데이터로부터 변환된 식별코드를 생성하고, 복호화모듈(1100)을 통하여 변환된 복호화 코드와 가상화모듈(1200)로부터 변환된 가상화 코드를 생성하고 그리고 이들 정보를 매칭하는 매칭모듈을 통하여 콘텐츠관리모듈(1030)에 의하여 등록이 된다.When the information of the content uploader 100 and the content file is input or the content file is matched with the content identification code (when matched), the information inputted or matched with the content file is uploaded in the system module 1000. 1010, user information (including IP, etc.), user input information, and the metadata conversion module 1400 generate an identification code converted from metadata, and the decryption code and virtualization converted through the decoding module 1100. The virtualization code converted from the module 1200 is generated and registered by the content management module 1030 through a matching module that matches the information.
이렇게 생긴 다양한 식별코드(메타데이터, 복호화코드, 가상화코드)를 원본 콘텐츠 파일에 삽입하여 변환 콘텐츠 파일을 생성하면 변환된 콘텐츠 파일을 콘텐츠 제공자나 사용자의 단말로 전송이 된다.When a variety of identification codes (metadata, decryption code, virtualization code) thus generated are inserted into the original content file to generate a converted content file, the converted content file is transmitted to the content provider or the user's terminal.
이후 위에서 삽입된 이러한 식별코드 중의 하나이상을 이용하여 검색을 할 수 있다. The search can then be performed using one or more of these identification codes inserted above.
이때, 검색은 이 식별코드를 통한 검색과 사용자 입력 정보를 통한 검색을 병행하여 수행하여 검색모듈(1020)은 검색결과를 검색 요청자에게 제공하게 된다. 또한, 검색서버를 별도로 하여 검색창을 이용하여 유저나 콘텐츠업로더에 검색결과를 제공하게 된다.At this time, the search is performed in parallel with the search through the identification code and the search through the user input information, so that the search module 1020 provides the search result to the search requester. In addition, a separate search server is used to provide search results to a user or a content uploader using a search box.
본발명에서는 여러가지 종류의 코드를 발생시켜 이것을 원래의 콘텐츠에 포함시키도록 하며 이 코드들의 이력을 계속해서 관리함으로써 콘텐츠가 어떤식으로 유통되고 있는지를 파악하도록 한다. In the present invention, various types of codes are generated and included in the original contents, and the history of these codes is continuously managed to understand how the contents are distributed.
또한 한가지 코드가 해석이 된다고 하더라도 여러가지 코드를 한꺼번에 이용해서 유통시키는한은 한꺼번에 코드를 해석하지 않으면 다른 형태의 코드로 유통이력을 파악할 수 있기 때문에 계속적인 이력파악이 가능하다. In addition, even if one code is interpreted, as long as it is distributed by using various codes at once, it is possible to keep track of the history because the distribution history can be grasped by other codes unless the codes are interpreted at once.
복호화코드 콘텐츠 검색 및 이력 조회의 활용 효과는 아래와 같다.The effects of decryption code content search and history search are as follows.
콘텐츠 파일에 포함된 식별코드를 이용한 검색을 통해 배포 및 유통 상황을 편리하게 확인 가능하다. 즉, 식별코드, 사용자 입력정보, 메타데이터를 이용한 검색이 모두 병행되므로 배포 상황을 광범위하게 확인 가능하게 된다.It is possible to conveniently check the distribution and distribution status through the search using the identification code included in the content file. That is, the search using identification code, user input information, and metadata are all performed in parallel, so that the distribution status can be confirmed widely.
이는 검색 된 정보를 바탕으로 업로드 현황, 다운로드 현황, 배포 상황, 비 허가 접근 상황, 지역 정보 등 다양한 정보를 누적하고 가공하여 빅데이터(Big Data)로써 활용 가능할 수 있다.This can be used as big data by accumulating and processing various information such as upload status, download status, distribution status, unauthorized access status, and local information based on the retrieved information.
콘텐츠관리모듈(1030)은 콘텐츠업로더의 콘텐츠를 관리할 수 있는 모듈로써 콘텐츠의 배급 및 유통경로를 파악하고 그에 따를 페이뷰나 클릭수등을 제공하도록 하며 광고 등의 수익이 발생할 경우 그에 대한 정보를 제공할 수 있다.Content management module 1030 is a module that can manage the content of the content uploader to identify the distribution and distribution path of the content, and to provide the pay view or clicks according to the information, and when the revenue such as advertising occurs information Can provide.
매칭모듈(1500)은 콘텐츠업로더의 식별코드와 콘텐츠의 식별코드를 매칭하여 해당 콘텐츠의 저작권정보를 쉽게 파악할 수 있도록 매칭할 수 있으며, 이는 검색모듈 및 제휴모듈과 연동이 되도록 한다.The matching module 1500 may match the identification code of the content uploader and the identification code of the content so that the copyright information of the corresponding content can be easily grasped, which is linked to the search module and the affiliate module.
데이터베이스영역(2000)은 콘텐츠업로더의 정보 및 콘텐츠의 정보 그리고 제휴 및 배급등의 정보를 저장하게 된다.The database area 2000 stores information of a content uploader, information of a content, and information such as affiliation and distribution.
도 2는 시스템에서의 콘텐츠이동경로를 표시한 것이다.2 shows the content movement path in the system.
콘텐츠업로더가 콘텐츠를 서버로 업로드를 하면 시스템서버는 콘텐츠를 복호화하며 복호화된 콘텐츠파일로 생성을 하며 상기의 콘텐츠는 데이터베이스에 저장되며, 이를 배급 및 유통이 되며, 이후 콘텐츠의 추적 및 정보확인을 할 수 있도록 하는 콘텐츠이동경로를 표시한다.When the content uploader uploads the content to the server, the system server decrypts the content and creates the decrypted content file. The above content is stored in the database, and it is distributed and distributed. Display the content movement path that enables the
도 3은 개인정보와 콘텐츠정보를 매칭하는 방법에 관한 것이다.3 relates to a method of matching personal information with content information.
콘텐츠업로더는 시스템에 회원가입을 하며 이 회원정보는 시스템에서 지정하는 개인식별코드가 부여되며, 이렇게 부여된 코드는 로그인시에 적용이 되어 콘텐츠업로더가 콘텐츠를 업로드 할 경우 콘텐츠식별코드가 부여되며, 이후 콘텐츠식별코드를 생성하며 이후 개인식별코드와 콘텐츠식별코드가 매칭이 될 수 있도록 한다. 즉, 누가 컨텐츠의 권리자인지 확인할 수 있도록 한다. 이때 콘텐츠가 업로드가 될 시 콘텐츠업로더를 함께 저장하여 콘텐츠 식별코드를 생성할 수 있도록 할 수도 있다. The content uploader joins the system and this member information is assigned a personal identification code specified by the system.The code is applied at the time of login, and the content identification code is given when the content uploader uploads the content. Afterwards, the content identification code is generated, and then the personal identification code and the content identification code can be matched. That is, it is possible to check who is the owner of the content. In this case, when the content is uploaded, the content uploader may be stored together to generate a content identification code.
(콘텐츠 복호화 방법) (Content decryption method)
도 4는 콘텐츠 복호화 방법에 관한 것으로 콘텐츠 파일이 업로드가 되면 시스템은 복호화 헤더를 구성하게 된다. 복호화 헤더값은 유저코드, 그룹코드, 카테고리코드,DATA코드,콘텐츠이벤트코드(사건,순서등)값 그리고 RESERVED 속성값을 코드화 하여 부여하여 콘텐츠에 삽입할 수 있도록 한다.4 illustrates a content decoding method. When a content file is uploaded, the system configures a decryption header. The decryption header value is provided by encoding the user code, group code, category code, data code, content event code (event, sequence, etc.) and RESERVED attribute value so that they can be inserted into the content.
이때 복호화헤더는 시스템에서 요청하는 콘텐츠파일의 특정부분에 삽입할 수 있다. 예를 들어 콘텐츠파일의 첫 부분에 삽입을 하여 콘텐츠 정보를 추출 할 수 있도록 하는 것이다. 복호화헤더의 크기는 128비트의 값을 가지게 되며, 이하의 값일 경우 디지털값의 디폴트값을 설정하며, 이 설정값은 두자리로 할 수 있다. In this case, the decryption header may be inserted into a specific part of the content file requested by the system. For example, you can insert content at the beginning of a content file to extract content information. The decoding header has a value of 128 bits, and in the case of the following values, the default value of the digital value is set, and this setting value can be two digits.
콘텐츠 이벤트 코드는 복호화를 시킬당시의 순서, 시간등에 따라 발생되는 난수를 사용할 수 있으며 이 이벤트 코드는 콘텐츠이벤트값으로 하여 가상화코드를 구성할때 사용될 수 있다. The content event code may use a random number that is generated according to the order, time, etc. at the time of decoding, and this event code may be used when constructing the virtualization code with the content event value.
또한 가상화코드를 별도로 구성하게 되는데 복호화헤더값 중에서 콘텐츠이벤트값과 콘텐츠 업로더값으로 구성이 되며 복호화 모듈은 복호화헤더와 가상화코드값을 함께 하여 복호화 모듈로 구성을 할 수 있다.In addition, the virtualization code is configured separately. The decryption header value is composed of a content event value and a content uploader value. The decryption module may be configured as a decryption module by combining the decryption header and the virtualization code value.
따라서, 복호화코드와 가상화코드가 콘텐츠이벤트값에 의하여 연결되도록 하며 같이 검색되도록 할 수 있으며 타인에 의하여 변조되더라도 변조되었는지 여부를 확인할 수 있게 된다. Therefore, the decryption code and the virtualization code can be connected by the content event value and searched together, and it is possible to check whether the modulation code is modulated by others.
특히 복호화코드등은 콘텐츠의 각부분부분에 삽입될 수 있기 때문에 콘텐츠 내부에서 복호화코드등을 모두 제거하는 것은 불가능하다. In particular, since the decryption code and the like can be inserted into each part of the content, it is impossible to remove all the decryption codes and the like in the content.
(콘텐츠 복호화 방법) (Content decryption method)
도 5는 복호화코드 부여 방법을 설명한 것으로 유저코드와 그룹코드 , 카테고리코드,데이터코드,콘텐츠이벤트코드, 속성코드를 통하여 콘텐츠 식별코드를 만드는 것을 나타내는 것이다. 이때 이 코드값은 시스템의 설정에 의하여 추가 혹은 삭제가 될 수 있다.FIG. 5 illustrates a method for assigning a decryption code, which illustrates creating a content identification code through a user code, a group code, a category code, a data code, a content event code, and an attribute code. At this time, this code value can be added or deleted by system setting.
도6은 가상화코드 부여방법을 설명한 것으로 콘텐츠식별을 위하여 콘텐츠값과 콘텐츠업로더의 식별코드를 이용하여 별도의 가상화코드값을 만들어 부여 하는 방법을 도시한 것으로 가상화코드는 콘텐츠 업로더 및 시스템에서 콘텐츠의 변경 및 수정 또는 제휴에 대한 콘텐츠의 이벤트가 있을 경우 콘텐츠 업로더의 식별코드로 관련정보를 전달하여 그 내역을 콘텐츠업로더 및 시스템관리자가 알 수 있도록 한다. 콘텐츠이벤트값은 이러한 상황이 발생할때 시스템이 발생시키는 난수값일 수도 있다. FIG. 6 illustrates a method of granting a virtualization code, and illustrates a method of creating and assigning a separate virtualization code value using a content value and an identification code of a content uploader for content identification. The virtualization code is a content uploader and a system. If there is an event of the contents of the change and the modification or the cooperation of the contents uploader, the relevant information is transmitted to the contents uploader's identification code so that the contents uploader and the system administrator can know the details. The content event value may be a random value generated by the system when this situation occurs.
또한, 콘텐츠이벤트코드가 변경이나 수정, 삭제 등의 상황이 발생할 시에 콘텐츠업로더와 시스템에 저장되며, 이를 이용하여 변경이력추적과 뷰어(사용자)를 통하여 빅데이터를 이용하여 맞춤형 콘텐츠광고정보 등을 제공할 수 있다.In addition, the content event code is stored in the content uploader and the system when a change, modification, deletion, etc. occurs, and the customized content advertisement information using big data through the change history tracking and the viewer (user) are used. Can be provided.
도 7은 복호화방법 중 복호화 코드를 부여, 즉 삽입하는 방법에 관한 예시도이다.7 is an exemplary diagram illustrating a method of assigning, ie, inserting, a decoding code of a decoding method.
즉 복호화코드는 유저코드, 그룹코드, 카테고리코드, Date코드, 시퀀스코드, Reserved 등으로 구성되며 이 값 들은 헤더의 VALUE1 ~ VALUE6 에 삽입된다. 마지막 바이트인 TCI_INDEX는 Dummy 위치 지정과 최소 단위 헤더 변조 시에 사용되는 값으로 이후 페이지에서 설명하도록 한다.That is, the decryption code is composed of user code, group code, category code, date code, sequence code, reserved, and so on. These values are inserted into VALUE1 to VALUE6 of the header. The last byte, TCI_INDEX, is used for dummy positioning and minimum unit header modulation.
복호화 코드정보는 서버에서 인코딩 시 입력되는 정보와 다운로드 시 입력되는 사용자 정보로 구분된다. 다운로드 시 복호화코드에 입력되는 정보는 사용자 정보 값이다.The decryption code information is divided into information input when encoding from the server and user information input when downloading. The information input to the decryption code at the time of download is a user information value.
본 예시의 복호화코드의 크기는 128바이트로 고정되어 있고 128바이트가 모두 채워지지 않을 경우 00 으로 빈 값을 채운다. 이는 시스템, 사용자 및 콘텐츠의 크기나 형식에 따라 값은 크기가 변경될 수 있다.The size of the decryption code in this example is fixed at 128 bytes, and if the 128 bytes are not filled, the empty value is filled with 00. The value may change in size depending on the size or format of the system, user and content.
본 예시에서는 복호화코드값은 원본 파일의 첫 부분에 삽입이 된 경우이고, 추가된 복호화코드의 실제 예제는 아래와 같다.In this example, the decryption code value is inserted at the beginning of the original file, and the actual example of the added decryption code is as follows.
(Ex : ASCII)(Ex: ASCII)
TTP.GRP.SHOW€o..7000TTPG60000001....1111500034321112e ³ð¿†a.....................................................................TTP.GRP.SHOW € o..7000TTPG60000001 .... 1111500034321112e ³ð¿ † a ............................... ......................................
(EX : HEX)(EX: HEX)
54 54 50 00 47 52 50 00 53 48 4F 57 80 F4 03 00 37 30 30 30 54 54 50 47 36 30 30 30 30 30 30 31 10 0E 00 00 31 31 31 31 35 30 30 30 33 34 33 32 31 31 31 32 EB B3 F0 BF 86 95 E1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0054 54 50 00 47 52 50 00 53 48 4F 57 80 F4 03 00 37 30 30 30 54 54 50 47 36 30 30 30 30 30 30 31 10 0E 00 00 31 31 31 31 35 30 30 30 33 34 33 32 31 31 31 32 EB B3 F0 BF 86 95 E1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
도 8은 가상화코드값을 부여하는 데이터의 구성예시이다.8 shows an example of the configuration of data giving a virtualization code value.
더미코드는 복호화 코드값 중 콘텐츠이벤트코드 값과 저작권자의 값으로 구성되며, 도면의 구성예시는 콘텐츠에 더미코드 값을 추가한 예제이다. 추가적으로 최소단위의 값을 변경이전과 이후의 값을 표시하였다.The dummy code is composed of a content event code value and a value of a copyright holder among the decryption code values. In addition, the value of the minimum unit is indicated before and after the change.
도 9는 MPEG2 TS 패킷(스트리밍을 하기 위해 공용화 해놓은 전송방식)을 통해 콘텐츠복호화 후 변환 결과를 예시로 보여준다.9 shows an example of the conversion result after content decoding through an MPEG2 TS packet (transmission method commonly used for streaming).
아래 그림은 MPEG2 TS 패킷의 구조도이며 다음 그림은 콘텐츠의 복호화가 적용된 후의 MPEG2 TS 패킷의 구조도 이다.The figure below shows the structure of MPEG2 TS packet and the following figure shows the structure of MPEG2 TS packet after content decoding is applied.
가상화코드의 앞 2바이트 변조 및 가상화코드를 삽입할 위치는 복호화코드데이터를 기반으로 생성한 기준 값을 활용하여 적절하게 정하게 되는데, TS 패킷의 헤더(스트리밍을 하기 위해 공용화 해놓은 전송방식에 복호화코드생성)를 예를 들면, 콘텐츠변환의 의미가 없거나 범용 플레이어에서 손쉽게 복구가 가능할 수 있으므로 TS 헤더 위치를 피해서 정한다. 변조는 각 패킷 마다 이루어지는데, 복잡도를 높이기 위해 변조 위치 값을 기반으로 생성된 새로운 위치에 가상화 코드를 삽입한다. 또한, 변환 콘텐츠를 TS 파일로 인식하지 못하도록 모든 TS 헤더를 변조한다.The first 2 bytes of the virtualization code and the position to insert the virtualization code are appropriately determined by using the reference value generated based on the decryption code data. The decoding code is generated in the header of the TS packet. ), For example, is not meant for content conversion or can be easily restored in a general-purpose player, so avoid TS header positions. Modulation is done for each packet. To increase complexity, the virtualization code is inserted at a new location created based on the modulation location value. In addition, all TS headers are modulated so that the converted contents are not recognized as TS files.
본 예시에서는 TS 헤더는 4 바이트로 모든 패킷의 첫 4바이트는 항상 변조된다. In this example, the TS header is 4 bytes and the first 4 bytes of all packets are always modulated.
도 10은 복호화코드가 적용된 이후의 mpeg2 파일이 변경된 예시이다.10 illustrates an example in which an mpeg2 file is changed after decoding code is applied.
도 11은 복호화 코드값을 구성하는 일례이다.11 is an example of configuring a decoding code value.
복호화코드 값은 8바이트로 구성되며, 변조 및 가상화코드값의 삽입 위치 지정에 사용된다.The decryption code value consists of 8 bytes and is used to specify the insertion position of the modulation and virtualization code values.
복호화코드값은 첫 번째에서[0~3] 바이트는 Random Value 로 지정되며 이후단계는[4~6] 바이트는 Random Value로 지정하되 0x80 OR 연산 후 설정한다.The decoding code value is designated as [Random Value] in the first [0 ~ 3] bytes and in the subsequent step, [4 ~ 6] byte is designated as the Random Value but is set after 0x80 OR operation.
복호화코드값 중[7] 바이트는 패턴 값으로 변조 및 Dummy 데이터 삽입 위치 지정에 관여하며 패턴 값의 범위 지정을 통해 디코딩 모듈의 버전 관리를 할 수 있다. (범위에 맞지 않는 패턴의 콘텐츠를 재생을 하지 않도록 라이브러리 생성 가능)[7] byte of the decoding code value is a pattern value, and is involved in modulating and specifying a dummy data insertion position. Version control of the decoding module can be performed by specifying a range of the pattern value. (You can create a library to not play content that does not fit the range.)
패턴 값은 특정 범위의 값 (EX : 0~0xFF) 중 랜덤 한 값이 정해져 사용되는데, 패턴 값 생성은 TCI INDEX 앞 7바이트를 통해 계산되어 생성된다. 즉, 패턴 값 생성 계산식은 패턴을 키 값으로 사용하기 위해 인코딩 주체와 복호화 주체(TCI 플레이어) 만 알고 있는 패턴 생성 알고리즘이며 이 패턴 값은 복호화코드값[7]에 입력되지 않고 앞 7바이트를 통해 동적으로 생성된다. 패턴 값은 동적으로 생성되기에 복호화코드값[7]에 삽입되지 않고 복호화코드값[7]에는 값이 존재하지 않거나 의미 없는 값이 존재하게 된다. 복호화 시에는 패턴 생성 알고리즘을 통해 패턴을 생성하고 이 값을 기반으로 위치를 계산한다. The pattern value is used by setting a random value out of a specific range of values (EX: 0 ~ 0xFF). The pattern value is generated by calculating through 7 bytes before TCI INDEX. In other words, the pattern value generation formula is a pattern generation algorithm that only the encoding entity and the decoding entity (TCI player) know to use the pattern as a key value. It is generated dynamically. Since the pattern value is dynamically generated, the pattern value is not inserted into the decoding code value [7] and the decoding code value [7] has no value or a meaningless value. In decoding, a pattern is generated through a pattern generation algorithm and a position is calculated based on this value.
도 12는 콘텐츠의 사용자 및 12 is a user of content and 유저가The user 검색한 결과를 제공하는  Provide the search results 방법에 대한 예시를 한An example of how 것이다. will be.
콘텐츠 검색 및 이력조회를 위한 구체적인 방법은 아래와 같다.Specific methods for content search and history inquiry are as follows.
콘텐츠업로더(100)와 콘텐츠 파일의 정보를 입력 혹은 콘텐츠식별코드와 매칭이 되면 콘텐츠 파일과 함께 입력한 정보 또는 매칭된 정보가 시스템서버(1000)내의 업로드모듈(1010)으로 전해지면 사용자 정보(IP 등을 포함), 사용자 입력 정보와 메타데이터변환모듈(1400)로부터 메타데이터로 변환된 메타데이터로부터 변환된 식별코드를 생성하고, 복호화모듈(1100)을 통하여 변환된 복호화 코드와 가상화모듈(1200)로부터 변환된 가상화 코드 그리고 이들 정보를 매칭하는 매칭모듈(1500)을 통하여 콘텐츠관리모듈(1030)로 등록이 된다.When the information of the content uploader 100 and the content file is input or matched with the content identification code, the information or the matched information input together with the content file is transmitted to the upload module 1010 in the system server 1000. IP, etc.), the user input information and the metadata generated from the metadata converted from the metadata conversion module 1400 converted into metadata, and decrypted code and virtualization module 1200 converted through the decryption module 1100 The virtualization code is converted from and is registered with the content management module 1030 through the matching module 1500 matching these information.
이렇게 생긴 다양한 식별코드를 원본 콘텐츠 파일에 삽입하여 변환 콘텐츠 파일을 생성하면 변환된 콘텐츠 파일을 콘텐츠 제공자나 사용자의 단말로 전송이 된다.The various content identification codes are inserted into the original content file to generate the converted content file. The converted content file is transmitted to the content provider or the user's terminal.
이후 이러한 식별코드 중의 하나를 이용하여 검색을 할 수 있다. After that, the search can be performed using one of these identification codes.
이때, 검색은 이 식별코드를 통한 검색과 사용자 입력 정보를 통한 검색을 병행하여 수행하여 검색모듈(1020)은 검색결과를 검색 요청 자에게 제공하게 된다. 또한, 검색서버를 별도로 하여 검색창을 이용하여 유저나 콘텐츠업로더에 검색결과를 제공하게 된다.At this time, the search is performed in parallel with the search through the identification code and the search through the user input information, so that the search module 1020 provides the search result to the search requester. In addition, a separate search server is used to provide search results to a user or a content uploader using a search box.
이때 업로드모 듈이후의 단계 중 메타데이터변환모듈,복호화모듈,가상화모듈의 순서는 시스템관리자에 의하여 변경될 수 있으며, 콘텐츠관리를 위하여 별도의 변환모듈을 생성하여 추가할 수 있다.At this time, the order of the metadata conversion module, the decoding module, and the virtualization module during the post-upload module may be changed by the system administrator, and a separate conversion module may be generated and added for content management.
복호화코드 콘텐츠 검색 및 이력 조회의 활용 효과는 아래와 같다.The effects of decryption code content search and history search are as follows.
콘텐츠 파일에 포함된 식별코드를 이용한 검색을 통해 배포 및 유통 상황을 편리하게 확인 가능하다. 즉, 식별코드, 사용자 입력정보, 메타데이터를 이용한 검색이 모두 병행되므로 배포 상황을 광범위하게 확인 가능하게 된다.It is possible to conveniently check the distribution and distribution status through the search using the identification code included in the content file. That is, the search using identification code, user input information, and metadata are all performed in parallel, so that the distribution status can be confirmed widely.
이는 검색 된 정보를 바탕으로 업로드 현황, 다운로드 현황, 배포 상황, 비 허가 접근 상황, 지역 정보 등 다양한 정보를 누적하고 가공하여 Big Data로써 활용 가능할 수 있다.This can be used as big data by accumulating and processing various information such as upload status, download status, distribution status, unauthorized access status, and local information based on the retrieved information.
본 문서의 콘텐츠 파일은 어문저작물(시, 소설, 논문, 강연, 각본, 연술 등), 음악저작물, 연극저작물, 미술저작물(회화, 서예, 조각, 공예, 응용미술저작물), 건축저작물(건축물, 설계도서 등), 사진저작물, 영상저작물, 도형저작물, 컴퓨터프로그램저작물 등 한국저작권위원회에서 정의하는 저작물을 의미한다.The content files in this document include literary works (poetry, novels, papers, lectures, screenplays, speeches, etc.), music works, theater works, art works (paintings, calligraphy, sculpture, crafts, applied art works), architectural works (architecture, Design work, etc.), photographic works, video works, figure works, computer program works, etc.
도13은 복호화 코드 플레이어의 작동을 도시한다Fig. 13 shows the operation of the decryption code player.
본 발명은 저작권의 보호를 위해서 사용가능하다.The present invention can be used for the protection of copyright.

Claims (9)

  1. 다양한 콘텐츠에 암호화정보를 포함시켜 검색 및 추적이 용이하도록 한 콘텐츠 검색 및 이력추적 감시시스템으로써,As a content search and traceability monitoring system that includes encryption information in various contents for easy searching and tracking,
    원저작권자의 단말기로부터 콘텐츠와 본인정보를 전송받는 업로드모듈과An upload module for receiving contents and personal information from the original copyright holder's terminal;
    원저작권자의 단말기로부터 제공받은 원저작권자의 본인정보, 메터데이터로부터 식별코드를 생성하는 식별코드 생성수단과Identification code generation means for generating an identification code from the original copyright information and metadata of the original copyright holder provided by the terminal of the original copyright holder;
    식별코드를 원본 콘텐츠 파일에 삽입하여 변환콘텐츠 파일을 생성하는 복호화 모듈을 포함하여Including a decryption module for inserting the identification code into the original content file to generate a converted content file
    식별코드생성수단으로부터 생성된 식별코드를 원본콘텐츠에 삽입하여 복호화시켜 변환컨텐츠파일을 생성하여Insert and decode the identification code generated from the identification code generating means into the original content to generate a converted content file
    변환된 콘텐츠 파일에 포함된 식별코드를 이용한 검색을 통해 배포 및 배포상황을 확인 가능하도록 하는,다양한 콘텐츠에 암호화정보를 포함시켜 검색 및 추적이 용이하도록 한 콘텐츠 검색 및 이력추적 감시시스템Content retrieval and traceability monitoring system that facilitates retrieval and tracking by including encryption information in various contents that enables distribution and distribution status to be identified through retrieval using identification codes included in the converted contents file
  2. 제1항에 있어서, 상기 시스템에서 메타데이터는 콘텐츠저작권자. 제목, 러닝타임, 파일포맷, 가격중 하나 이상의 정보를 포함할 수 있으며 메타데이터변환모듈은 콘텐츠가 메타데이터를 포함하는 경우 시스템이 정한 형식의 메타데이터로 변환하여 원저작권자가 본인의 저작물임을 알 수 있도록 하는 복호화정보를 콘텐츠에 포함시키도록 하는, 다양한 콘텐츠에 암호화정보를 포함시켜 검색 및 추적이 용이하도록 한 콘텐츠 검색 및 이력추적 감시시스템The content copyright holder of claim 1, wherein the metadata in the system is content. It may contain one or more of information such as title, running time, file format, and price. The metadata conversion module converts the content into metadata in the format determined by the system when the content includes metadata so that the original copyright owner is his or her work. Content retrieval and traceability monitoring system that includes encryption information in various contents to facilitate the search and tracking
  3. 제2항에 있어서,콘텐츠 코드 부여 할 때 발생하는 콘텐츠이벤트값과 저작권자 값을 이용하여 만들어지는 가상화코드를 생성하는 가상화모듈을 더 포함하는, 다양한 콘텐츠에 암호화정보를 포함시켜 검색 및 추적이 용이하도록 한 콘텐츠 검색 및 이력추적 감시시스템The method of claim 2, further comprising a virtualization module for generating a virtualization code generated by using a content event value and a copyright holder value generated when a content code is assigned, so as to include encryption information in various contents for easy searching and tracking. Content search and traceability monitoring system
  4. 제3항에 있어서, 생성된 메타데이터코드와 복호화코드, 가상화코드중 어느 하나 이상과 콘텐츠를 비교하여 연결하여 매칭시키는 매칭모듈을 포함하는, 원저작권자가 본인의 저작물임을 알 수 있도록 하는 복호화정보를 콘텐츠에 포함시키며, 이를 이용하여 콘텐츠에 대한 검색을 할 수 있는 방법을 포함하는, 다양한 콘텐츠에 암호화정보를 포함시켜 검색 및 추적이 용이하도록 한 콘텐츠 검색 및 이력추적 감시시스템The decryption information of claim 3, further comprising a matching module that compares and matches any one or more of the generated metadata code, decryption code, and virtualization code with content. Content retrieval and traceability monitoring system that includes encryption information in various contents, including the contents, and a method of searching for the contents by using the same.
  5. 제4항에 있어서, 가상화모듈은 복호화코드 중 콘텐츠이벤트값과 저작권자 값을 이용하여 가상화코드를 생성하는데 콘텐츠이벤트값은 이벤트 순간마다 임의적으로 발생시켜 포함시키도록 하는, , 원저작권자가 본인의 저작물임을 알 수 있도록 하는 복호화정보를 콘텐츠에 포함시키도록 하는, 원저작권자가 본인의 저작물임을 알 수 있도록 하는 복호화정보를 콘텐츠에 포함시키며, 이를 이용하여 콘텐츠에 대한 검색을 할 수 있는 방법을 포함하는, 다양한 콘텐츠에 암호화정보를 포함시켜 검색 및 추적이 용이하도록 한 콘텐츠 검색 및 이력추적 감시시스템The virtual copyright module of claim 4, wherein the virtualization module generates the virtualization code using the content event value and the copyright holder value of the decrypted code, and the content event value is randomly generated and included at the moment of the event. Includes decryption information that allows the original copyright holder to know that it is his or her copyrighted work so that it can be identified in the content, and includes a method for searching for the content using the decryption information. Content retrieval and traceability monitoring system that includes encryption information in content to facilitate search and tracking
  6. 청구항 5항에 있어서, 콘텐츠이벤트코드의 변경이나 수정, 삭제 등의 상황이 발생할 시에 콘텐츠업로더와 시스템에 저장되며, 이를 이용하여 변경이력추적과 뷰어(사용자)를 통하여 빅데이터를 이용하여 맞춤형 콘텐츠광고정보 등을 제공할 수 있는, 원저작권자가 본인의 저작물임을 알 수 있도록 하는, 복호화정보를 콘텐츠에 포함시키며, 이를 이용하여 콘텐츠에 대한 검색을 할 수 있는 방법을 포함하는, 다양한 콘텐츠에 암호화정보를 포함시켜 검색 및 추적이 용이하도록 한 콘텐츠 검색 및 이력추적 감시시스템The method according to claim 5, wherein when a situation such as a change, modification, or deletion of a content event code occurs, the content is stored in a content uploader and a system, and customized using big data through change history tracking and a viewer (user) using the same. Encrypted in various contents, including decryption information in the content, which can provide the content advertising information, so that the original copyright owner knows that it is his or her work, and the method for searching for the content using this content Content search and traceability monitoring system that includes information to facilitate search and tracking
  7. 제3항에 있어서, 복호화 코드는 유저코드 ,그룹코드, 카테고리코드, 데이트코드, 콘텐츠이벤트코드를 포함하여 헤더에 삽입되며 복호화코드 색인정보는 가상화코드의 위치를 지정하고 최소단위헤더 변조 시에 사용하도록 하는, 원저작권자가 본인의 저작물임을 알 수 있도록 하는 복호화정보를 콘텐츠에 포함시키도록 하는, 다양한 콘텐츠에 암호화정보를 포함시켜 검색 및 추적이 용이하도록 한 콘텐츠 검색 및 이력추적 감시시스템The decoding code of claim 3, wherein the decryption code is inserted into a header including a user code, a group code, a category code, a data code, and a content event code, and the decryption code index information designates the location of the virtualization code and is used for the minimum unit header modulation. Content retrieval and traceability monitoring system that includes encryption information in various contents to facilitate the search and tracking, so that the original copyright can include decryption information in the contents so that the original copyright holder can know that it is the copyrighted work.
  8. 제4항에 있어서, 콘텐츠 복호화 시 변조위치를 정할 때 시스템기준값을 계산하는데 복호화코드 헤더를 구성하는 각 바이트의 합으로 결정하고 데이터 연산수식을 이용하여 변조하고 원본데이터 일부의 바이트합과 패턴값 범위별 고유값을 이용하여 기준값을 정하도록 하는, 원저작권자가 본인의 저작물임을 알 수 있도록 하는 복호화정보를 콘텐츠에 포함시키며, 이를 이용하여 콘텐츠에 대한 검색을 할 수 있는 방법을 포함하는, 다양한 콘텐츠에 암호화정보를 포함시켜 검색 및 추적이 용이하도록 한 콘텐츠 검색 및 이력추적 감시시스템5. The method of claim 4, wherein the system reference value is calculated when determining a modulation position in content decoding. The system reference value is determined by the sum of each byte constituting the decoding code header, modulated using a data operation equation, and the byte sum and pattern value range of a part of the original data. Includes decoded information in the content, which allows the original copyright holder to know that it is his or her work, by using the unique value of each star, and includes a method for searching for the content using the content. Content search and traceability monitoring system that includes encrypted information for easy searching and tracking
  9. 제4항에 있어서 생성된 메타데이터코드와 복호화코드 가상화코드와 콘텐츠를 매칭시키는 매칭모듈을 포함하는, 원저작권자가 본인의 저작물임을 알 수 있도록 하는 복호화정보를 콘텐츠에 포함시키며, 이를 이용하여 콘텐츠에 대한 검색을 할 수 있는 방법을 포함하는, 다양한 콘텐츠에 암호화정보를 포함시켜 검색 및 추적이 용이하도록 한 콘텐츠 검색 및 이력추적 감시시스템The content of claim 4 including decryption information that allows the original copyright holder to know that the work is his or her own, including a matching module for matching the generated metadata code with the decryption code virtualization code and the content. Content retrieval and traceability monitoring system that includes encryption information in various contents, including a method for retrieving information, to facilitate retrieval and tracking.
PCT/KR2015/014385 2015-12-29 2015-12-29 Content search and history tracking monitoring system for facilitating searching and tracking by comprising encryption information in various contents WO2017115885A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR10-2015-0188007 2015-12-29
KR1020150188007A KR20170069116A (en) 2015-12-10 2015-12-29 Copyright tracking and verification system

Publications (1)

Publication Number Publication Date
WO2017115885A1 true WO2017115885A1 (en) 2017-07-06

Family

ID=59224876

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2015/014385 WO2017115885A1 (en) 2015-12-29 2015-12-29 Content search and history tracking monitoring system for facilitating searching and tracking by comprising encryption information in various contents

Country Status (1)

Country Link
WO (1) WO2017115885A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112401477A (en) * 2020-09-01 2021-02-26 深圳中时利和科技有限公司 Electronic information intelligent management device based on computer and use method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20080074338A (en) * 2007-02-08 2008-08-13 주식회사 태그스토리 System for providing copyrighted video data and method thereof
KR20080075569A (en) * 2007-01-09 2008-08-19 주식회사 태그스토리 System for providing copyright-verified video data and method thereof
KR20110121405A (en) * 2010-04-30 2011-11-07 주식회사 인큐브테크 Contents unification management system
KR20140065310A (en) * 2012-11-21 2014-05-29 윤재영 Online contents watching system and method
KR20150064822A (en) * 2013-12-04 2015-06-12 주식회사 프라이머스코즈 System for management of electronic documents

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20080075569A (en) * 2007-01-09 2008-08-19 주식회사 태그스토리 System for providing copyright-verified video data and method thereof
KR20080074338A (en) * 2007-02-08 2008-08-13 주식회사 태그스토리 System for providing copyrighted video data and method thereof
KR20110121405A (en) * 2010-04-30 2011-11-07 주식회사 인큐브테크 Contents unification management system
KR20140065310A (en) * 2012-11-21 2014-05-29 윤재영 Online contents watching system and method
KR20150064822A (en) * 2013-12-04 2015-06-12 주식회사 프라이머스코즈 System for management of electronic documents

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112401477A (en) * 2020-09-01 2021-02-26 深圳中时利和科技有限公司 Electronic information intelligent management device based on computer and use method

Similar Documents

Publication Publication Date Title
US20200226233A1 (en) Distributed ledger-based digital content piracy deterrence
WO2012011726A2 (en) Method and apparatus for providing drm service
US7814173B2 (en) Information-processing system, information-processing apparatus and method, recording medium and program
WO2014119936A1 (en) Method of and apparatus for processing software using hash function to secure software, and computer-readable medium storing executable instructions for performing the method
WO2011126280A2 (en) Method for updating advertisement content using drm
KR20080035940A (en) Apparatus, system and method for providing drm
WO2019088687A1 (en) Content distribution management system and method using blockchain technology
WO2014003516A1 (en) Method and apparatus for providing data sharing
CN101271501A (en) Encryption and decryption method and device of digital media file
EP2636217A1 (en) Key rotation in live adaptive streaming
WO2019088686A1 (en) Content distribution management system and method using blockchain technology
JP2004030326A (en) Contents use managing system, information processor or information processing method for using or providing contents and computer program
WO2019088688A1 (en) Content distribution management system and method using blockchain technology
JPH11265317A (en) Copyright protection system
WO2017115885A1 (en) Content search and history tracking monitoring system for facilitating searching and tracking by comprising encryption information in various contents
WO2018004027A1 (en) Web-based electronic document service device capable of authenticating for document editing, and method for operating same
WO2020111517A1 (en) Server and method for identifying integrity of application
WO2011122891A2 (en) Apparatus and method for the compulsory viewing of advertisements
WO2022080547A1 (en) Method for providing service for security of web-browser-based content
WO2014027870A1 (en) Work management method
WO2012153949A2 (en) Method for content use, device for content use, mobile terminal, and recording medium
KR20110085156A (en) Apparatus and method of playing drm contens using usb
WO2016093380A1 (en) System and method for protecting electronic book which supports private copying
KR100467571B1 (en) Security service method for digital content and system therefor
JP2005167987A (en) Method for determining use permission of information and content distribution system using the method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15912121

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 19/10/2018)

122 Ep: pct application non-entry in european phase

Ref document number: 15912121

Country of ref document: EP

Kind code of ref document: A1