WO2022075519A1 - Procédé de service de distribution de contenu pour gestion de commande d'accès, et appareil informatique et système pour la réalisation de ce procédé - Google Patents

Procédé de service de distribution de contenu pour gestion de commande d'accès, et appareil informatique et système pour la réalisation de ce procédé Download PDF

Info

Publication number
WO2022075519A1
WO2022075519A1 PCT/KR2020/016505 KR2020016505W WO2022075519A1 WO 2022075519 A1 WO2022075519 A1 WO 2022075519A1 KR 2020016505 W KR2020016505 W KR 2020016505W WO 2022075519 A1 WO2022075519 A1 WO 2022075519A1
Authority
WO
WIPO (PCT)
Prior art keywords
folder
content
purchaser
group
access restriction
Prior art date
Application number
PCT/KR2020/016505
Other languages
English (en)
Korean (ko)
Inventor
김현태
김경순
정신영
Original Assignee
테크온미디어(주)
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 테크온미디어(주) filed Critical 테크온미디어(주)
Publication of WO2022075519A1 publication Critical patent/WO2022075519A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Definitions

  • An embodiment of the present invention relates to a content distribution service technology capable of access control management.
  • the existing content distribution platform all stages except for the content creation stage are managed by the service provider who operates the distribution platform. That is, the existing content distribution platform is managed by a content service provider through a centralized system in which all processes such as registration, distribution, and settlement of content are performed.
  • the disclosed embodiment is to provide a content distribution service technique capable of managing access control for each user.
  • a content distribution service system encrypts the contents of an author, stores them in a folder tree structure in a distributed file network, and transmits a content registration request including a list of contents stored in the distributed file network to a first user terminal; and receiving the content registration request from the first user terminal, performing content registration, obtaining content purchase-related information, and based on the obtained content purchase-related information, in the folder tree structure for each author of the distributed file network.
  • the content management server may include a folder creation module that creates a permission management folder for managing access restrictions in a folder tree structure for each author of the distributed file network based on the content purchase related information.
  • the permission management folder includes one or more group folders for each purchaser as a subfolder, and the group folder for each purchaser is a folder for a group of purchasers who have access rights to the same folder and file among contents of the corresponding author, In the folder tree structure of the distributed file network, the purchasers may have symbolic links to folders and files to which they have access rights.
  • the folder creation module may encrypt the group folder for each purchaser, re-encrypt the encrypted key for the group folder for each purchaser with the public key of each purchaser, and transmit it to the terminal of each purchaser.
  • the content management server may further include an access restriction management module that checks whether an access restriction event occurs and, when the access restriction event occurs, performs access restriction of the purchaser in the folder tree structure of the distributed file network can
  • the access restriction management module may check whether an access restriction event occurs based on content usage period information included in the content purchase related information.
  • the access restriction management module checks the folder for each purchaser group to which the purchaser belongs in the folder tree structure, deletes the confirmed folder for each purchaser group, and excludes the purchaser from the purchaser group After a new folder is created, the newly created folder for each buyer group is encrypted again, and the newly encrypted key for each buyer group is re-encrypted with the public key of each buyer except for the buyer who is subject to access restriction It can be transmitted to the terminal.
  • a content distribution service method is a method performed in a computing device having one or more processors, and a memory for storing one or more programs executed by the one or more processors, in a distributed file network performing content registration by receiving a content registration request including a stored content list; and performing access restriction management on the folder tree structure for each author of the distributed file network based on the content purchase related information.
  • the operation of performing the access restriction management may include creating a permission management folder for access restriction management in a folder tree structure for each author of the distributed file network based on the content purchase related information.
  • the permission management folder includes one or more group folders for each purchaser as a subfolder, and the group folder for each purchaser is a folder for a group of purchasers who have access rights to the same folder and file among contents of the corresponding author, In the folder tree structure of the distributed file network, the purchasers may have symbolic links to folders and files to which they have access rights.
  • the operation of performing the access restriction management may include: encrypting the group folder for each purchaser; and re-encrypting the encrypted key for each purchaser's group folder with each purchaser's public key and transmitting the encrypted key to each purchaser's terminal.
  • the operation of performing the access restriction management may include: checking whether an access restriction event occurs; and when the access restriction event occurs, restricting the access of the purchaser in the folder tree structure of the distributed file network.
  • the operation of checking whether the access restriction event occurs may check whether the access restriction event occurs based on content usage period information included in the content purchase related information.
  • the operation of restricting the access of the purchaser may include, when the access restriction event occurs, checking a folder for each purchaser group to which the purchaser belongs in the folder tree structure; deleting the confirmed folder for each buyer group and then creating a new folder for each buyer group except for the buyer; encrypting the newly created folder for each buyer group; and re-encrypting the newly encrypted key of the folder for each purchaser group with the public key of each purchaser except for the purchaser subject to access restriction, and transmitting the encrypted key to the terminal of each purchaser.
  • a computing device includes one or more processors; Memory; and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs comprising: a content registration request comprising a list of content stored in a distributed file network; an instruction for receiving and performing content registration; and a command for performing access restriction management on the folder tree structure for each author of the distributed file network based on the content purchase related information.
  • a folder for each buyer group is created for each author in the distributed file network, the folder for each buyer group has a symbolic link to the folder and file to which the buyer has access, and the folder for each buyer group
  • the folder for each buyer group By re-encrypting the encrypted key with each buyer's public key and sending it to each buyer, each buyer does not need to have a separate key to decrypt it for each folder and file that he has access to, and the buyer group to which he belongs. Since it is only necessary to decrypt a separate folder, it is possible to minimize the security problem caused by key management.
  • the folder for each buyer group is deleted, a folder for each buyer group is created except for the buyer, and the folder for each buyer group is re-encrypted with the newly created key, and the encrypted key is restricted from access.
  • the folder for each buyer group is deleted, a folder for each buyer group is created except for the buyer, and the folder for each buyer group is re-encrypted with the newly created key, and the encrypted key is restricted from access.
  • FIG. 1 is a view showing a content distribution service system for access control management according to an embodiment of the present invention
  • FIG. 2 is a diagram schematically illustrating a structure in which author's content is stored in a distributed file network in an embodiment of the present disclosure
  • FIG. 3 is a view showing a state in which the content management server performs access control management in an embodiment to be disclosed;
  • FIG. 4 is a view showing a case in which the purchaser has access right through a separate key to the author's folder and file;
  • FIG. 5 is a block diagram showing the configuration of a content management server according to an embodiment of the present invention.
  • FIG. 6 is a block diagram illustrating and describing a computing environment including a computing device suitable for use in example embodiments;
  • the terms "transmission”, “communication”, “transmission”, “reception” and other similar meanings of a signal or information are not only directly transmitted from one component to another component, but also a signal or information This includes passing through other components.
  • to “transmit” or “transmit” a signal or information to a component indicates the final destination of the signal or information and does not imply a direct destination. The same is true for “reception” of signals or information.
  • first and second may be used to describe various components, but the components should not be limited by the terms. The above terms may be used for the purpose of distinguishing one component from another component.
  • a first component may be referred to as a second component, and similarly, a second component may also be referred to as a first component.
  • FIG. 1 is a diagram illustrating a content distribution service system for access control management according to an embodiment of the present invention.
  • the content distribution service system 100 may include a first user terminal 102 , a content management server 104 , a public key management terminal 106 , and a second user terminal 108 . .
  • each component may be communicatively connected to each other through a communication network (not shown).
  • a communication network (not shown) is the Internet, one or more local area networks, wide area networks, cellular networks, mobile networks, other types of networks, or such It may include a combination of networks.
  • each component may be communicatively connected to the blockchain network 110 and the distributed file network 112 .
  • the blockchain network 110 may store content registration details, content distribution details, and content transaction details.
  • the distributed file network 112 may store the content of the copyright holder for each copyright holder.
  • distributed file network 112 may be, but is not limited to, Inter Planetary File System (IPFS).
  • IPFS Inter Planetary File System
  • the first user terminal 102 may be a terminal used by the author of the content.
  • the present invention is not limited thereto, and the first user terminal 102 may be a terminal of a consumer purchasing content. That is, the author of the content can also be a consumer who consumes the content of other authors.
  • the first user terminal 102 will be described as a terminal used by the author of the content.
  • the first user terminal 102 may store the author's content in the distributed file network 112 .
  • the first user terminal 102 may encrypt the content and store it in the distributed file network 112 .
  • the author's content may be stored in the distributed file network 112 in a folder tree structure having a parent folder and subfolders subordinated thereto. In this case, the first user terminal 102 may encrypt each folder with a respective key.
  • FIG. 2 is a diagram schematically illustrating a structure in which author's content is stored in the distributed file network 112 in an embodiment of the present disclosure.
  • the content of the author may be stored in the distributed file network 112 in a folder tree structure.
  • the first user terminal 102 may encrypt each folder based on the user's unique key. Specifically, the first user terminal 102 may receive a key unique to the first user terminal 102 (ie, a user-specific key) from a key issuing server (not shown). For example, the first user terminal 102 transmits the name and password of the user (ie, the author) to the key issuing server (not shown), and may receive a user's unique key from the key issuing server (not shown). there is. In this case, the key issuing server (not shown) may generate a unique user key based on the user's name and password.
  • the first user terminal 102 may encrypt the root folder, which is the highest folder, using the user's unique key.
  • the first user terminal 102 can encrypt each folder in a way that can infer the key that encrypted the lower folder through the key that encrypted the upper folder.
  • the first user terminal 102 uses the data folder, which is a subfolder of root, the user's name and the root folder-encrypted key (that is, the user's unique key) as the encryption key of the data folder, and creates the data folder. can be encrypted.
  • the first user terminal 102 uses the movie folder, which is a subfolder of the data folder, the user's name, the key that encrypts the root folder, and the key that encrypts the data folder as the encryption key of the movie folder to encrypt the movie folder.
  • the first user terminal 102 converts the movie1.mp4 file contained in the movie folder to the user's name, the key to encrypt the root folder, the key to encrypt the data folder, and the key to encrypt the movie folder to the corresponding movie1.mp4 file. You can encrypt the movie1.mp4 file using the encryption key of the file.
  • the first user terminal 102 can encrypt each folder only with the user's unique key of the corresponding user, and there is no need to separately manage the encryption key for each folder.
  • the first user terminal 102 may transmit a content registration request to the content management server 104 . That is, the first user terminal 102 may perform content registration by transmitting a content registration request including a content list stored in the distributed file network 112 to the content management server 104 .
  • the first user terminal 102 may store content registration details in the block chain network 110 .
  • the content management server 104 may receive a content registration request from the first user terminal 102 .
  • the content management server 104 may check content registration details for each author based on the content registration request.
  • the content management server 104 may perform access control management for the content of each copyright holder stored in the distributed file network 112 .
  • the content management server 104 may generate content purchase related information based on the content purchase request received from the second user terminal 108 .
  • the content management server 104 may perform access control management based on content purchase related information.
  • the content purchase related information may include content identification information, content author information, content purchaser information, and content usage period information.
  • the content management server 104 may store content purchase details in the block chain network 110 .
  • the content purchase history may include content purchase related information.
  • FIG. 3 is a diagram illustrating a state in which the content management server 104 performs access control management in an disclosed embodiment.
  • FIG. 3 a state in which access control management is performed for content registered by the author A will be described as an example.
  • the content management server 104 may create a separate folder for access control management for the content of the author A stored in the distributed file network 112 .
  • the content management server 104 may perform access control management for each purchaser group on the content registered by the author A.
  • the content management server 104 may create a permission management folder (eg, group folder) as a subfolder of the root folder of the author A.
  • the content management server 104 may create a folder for each buyer group (eg, musician folder, worker folder, etc.) as a subfolder of the permission management folder.
  • the folder for each buyer group may be a folder for a group of buyers who have access to the same folder and file for the content of author A.
  • the musician folder among the folders for each buyer group may be a folder for the group of buyers who have access to the music folder and the movie2.mp4 file among the contents of author A.
  • the worker folder among the folders for each buyer group may be a folder for a group of buyers who have access to the document folder and the movie2.mp4 file and the movie3.mp4 file among the contents of author A.
  • the content management server 104 may allocate each buyer to a folder for each buyer group based on content purchase related information. That is, the content management server 104 may check which purchaser purchased which content from which author and by when through content purchase related information.
  • a folder for each buyer group may have a symbolic link to a folder and file to which the buyer has access. That is, the musician folder among the folders for each buyer group may have symbolic links to the music folder and the movie2.mp4 file among the contents of author A.
  • the worker folder among the folders for each buyer group may have symbolic links to the document folder, the movie2.mp4 file, and the movie3.mp4 file among the contents of the author A. Since the symbolic link is a known technology, a detailed description thereof will be omitted.
  • the content management server 104 encrypts a folder for each buyer group, and re-encrypts the encrypted key for each buyer group folder with the public key of each buyer, and transmits it to the second user terminal 108 of each buyer. .
  • the content management server 104 may transmit a public key request to the public key management terminal 106 based on content purchaser information among content purchase related information.
  • the content management server 104 may receive the public key of the purchaser from the public key management terminal 106 .
  • the content management server 104 may check whether an access restriction event has occurred. In an exemplary embodiment, the content management server 104 may check whether an access restriction event occurs based on content usage period information among content purchase related information. For example, if a buyer named B purchases a music folder and a movie2.mp4 file among the content of author A, and the content usage period is 6 months from the content purchase time, the content management server 104 determines the purchase time of the content. When 6 months have elapsed, it can be determined that an access restriction event has occurred in which the access to the content of the purchaser B is restricted.
  • the content management server 104 may restrict the purchaser's access to the corresponding content according to the occurrence of an access restriction event.
  • the content management server 104 may check a folder (eg, musician folder) for each purchaser group to which the corresponding purchaser belongs.
  • the content management server 104 deletes the folder for each buyer group to which the buyer belongs, creates a new folder for each buyer group except for the buyer in the buyer group, and then generates a key for encrypting the newly created folder for each buyer group.
  • the content management server 104 may re-encrypt the folder for each buyer group (eg, the musician folder) (ie, the newly created folder for each buyer group) with the newly created key.
  • the content management server 104 encrypts the key obtained by encrypting the folder for each purchaser group with the public key of each purchaser except for the purchaser (eg, B) subject to access restriction, and may re-send it to each purchaser.
  • the folder for each buyer group is deleted, a new folder for each buyer group is created, the folder for each new buyer group is encrypted using the newly created key, and the encrypted key is used for each buyer except for the restricted access buyer.
  • the public key management terminal 106 may receive and store the public key from each second user terminal 108 .
  • the public key management terminal 106 may extract the corresponding public key according to the public key request from the content management server 104 and transmit it to the content management server 104 .
  • the public key management terminal 106 is provided separately from the content management server 104 , the present invention is not limited thereto, and the public key management terminal 106 may be integrally formed with the content management server 104 .
  • the second user terminal 108 may be a terminal of a user (ie, a purchaser) who purchases the content.
  • the second user terminal 108 may generate a public key and a private key pair.
  • the public key and the private key may be a public key and a private key of a corresponding purchaser.
  • the second user terminal 108 may register the public key by transmitting the public key to the public key management terminal 106 .
  • the second user terminal 108 may transmit a content purchase request to the content management server 104 .
  • the second user terminal 108 may receive from the content management server 104 the double-encrypted key of the folder for each buyer group (that is, the key obtained by re-encrypting the folder for each buyer group with the public key of the buyer). there is.
  • the second user terminal 108 may decrypt the double-encrypted key of the folder for each purchaser group with the private key.
  • FIG. 5 is a block diagram showing the configuration of the content management server 104 according to an embodiment of the present invention.
  • the content management server 104 may include a communication module 111 , a folder creation module 113 , a key management module 115 , and an access restriction management module 117 .
  • the communication module 111 may communicate with the first user terminal 102 , the second user terminal 108 , the blockchain network 110 , and the distributed file network 112 , respectively.
  • the folder creation module 113 may create a permission management folder in the folder tree structure for each author of the distributed file network 112 .
  • the permission management folder may include a folder for each buyer group as a subfolder.
  • the folder creation module 113 may acquire content purchase related information and assign each buyer to a folder for each buyer group based on the content purchase related information.
  • the folder creation module 113 may connect a symbolic link to a folder and a file to which the purchasers have access rights in the folder tree structure in a folder for each purchaser group.
  • the folder creation module 113 may encrypt a folder for each purchaser group, re-encrypt the encrypted key for each purchaser group folder with the public key of each purchaser, and transmit it to each purchaser.
  • the folder creation module 113 may obtain the public key of each purchaser from the key management module 115 .
  • the key management module 115 may receive and store public keys from the second user terminals 108 , respectively.
  • the key management module 115 may extract and deliver the corresponding public key according to the public key request of the folder creation module 113 .
  • the access restriction management module 117 may check whether an access restriction event occurs. When an access restriction event occurs, the access restriction management module 117 deletes the folder for each purchaser group to which the purchaser belongs, then creates a folder for each purchaser group except for the purchaser, and encrypts the folder for each new purchaser group. You can create a key.
  • the access restriction management module 117 may re-encrypt the folder for each purchaser group with the newly created key.
  • the access restriction management module 117 may encrypt the key obtained by encrypting the folder for each group of purchasers with the public key of each purchaser except for the access restriction purchaser, and may re-send it to each purchaser.
  • a module may mean a functional and structural combination of hardware for carrying out the technical idea of the present invention and software for driving the hardware.
  • the "module” may mean a logical unit of a predetermined code and a hardware resource for executing the predetermined code, and does not necessarily mean physically connected code or a single type of hardware.
  • FIG. 6 is a block diagram illustrating and describing a computing environment 10 including a computing device suitable for use in example embodiments.
  • each component may have different functions and capabilities other than those described below, and may include additional components in addition to those described below.
  • the illustrated computing environment 10 includes a computing device 12 .
  • computing device 12 may be first user terminal 102 .
  • Computing device 12 may also be content management server 104 .
  • the computing device 12 may be a public key management terminal 106 .
  • the computing device 12 may be the second user terminal 108 .
  • Computing device 12 includes at least one processor 14 , computer readable storage medium 16 , and communication bus 18 .
  • the processor 14 may cause the computing device 12 to operate in accordance with the exemplary embodiments discussed above.
  • the processor 14 may execute one or more programs stored in the computer-readable storage medium 16 .
  • the one or more programs may include one or more computer-executable instructions that, when executed by the processor 14, configure the computing device 12 to perform operations in accordance with the exemplary embodiment. can be
  • Computer-readable storage medium 16 is configured to store computer-executable instructions or program code, program data, and/or other suitable form of information.
  • the program 20 stored in the computer readable storage medium 16 includes a set of instructions executable by the processor 14 .
  • computer-readable storage medium 16 includes memory (volatile memory, such as random access memory, non-volatile memory, or a suitable combination thereof), one or more magnetic disk storage devices, optical disk storage devices, flash It may be memory devices, other forms of storage medium accessed by computing device 12 and capable of storing desired information, or a suitable combination thereof.
  • Communication bus 18 interconnects various other components of computing device 12 , including processor 14 and computer readable storage medium 16 .
  • Computing device 12 may also include one or more input/output interfaces 22 and one or more network communication interfaces 26 that provide interfaces for one or more input/output devices 24 .
  • the input/output interface 22 and the network communication interface 26 are coupled to the communication bus 18 .
  • Input/output device 24 may be coupled to other components of computing device 12 via input/output interface 22 .
  • Exemplary input/output device 24 may include a pointing device (such as a mouse or trackpad), a keyboard, a touch input device (such as a touchpad or touchscreen), a voice or sound input device, various types of sensor devices, and/or imaging devices. input devices and/or output devices such as display devices, printers, speakers and/or network cards.
  • the exemplary input/output device 24 may be included in the computing device 12 as a component constituting the computing device 12 , and may be connected to the computing device 12 as a separate device distinct from the computing device 12 . may be

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Tourism & Hospitality (AREA)
  • Bioethics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Automation & Control Theory (AREA)
  • Storage Device Security (AREA)

Abstract

Sont divulgués un procédé de service de distribution de contenu pour gestion de commande d'accès, et un appareil informatique et un système pour la réalisation de ce procédé. Le système pour un service de distribution de contenu selon un mode de réalisation de la divulgation comprend : un premier terminal utilisateur qui chiffre des éléments de contenu d'un auteur, stocke les éléments de contenu chiffré dans une structure arborescente de dossier dans un réseau de fichiers distribué et transmet une requête d'enregistrement de contenu comprenant une liste des éléments de contenu stockés dans le réseau de fichiers distribué ; et un serveur de gestion de contenu qui réalise un enregistrement de contenu en recevant la requête d'enregistrement de contenu du premier terminal utilisateur, acquiert des informations relatives à l'achat de contenu et gère des restrictions d'accès sur la structure d'arbre de dossier pour chaque auteur dans le réseau de fichiers distribué, sur la base des informations relatives à l'achat de contenu acquises.
PCT/KR2020/016505 2020-10-06 2020-11-20 Procédé de service de distribution de contenu pour gestion de commande d'accès, et appareil informatique et système pour la réalisation de ce procédé WO2022075519A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR1020200128761A KR102450452B1 (ko) 2020-10-06 2020-10-06 접근 제어 관리를 위한 콘텐츠 유통 서비스 방법과 이를 수행하기 위한 컴퓨팅 장치 및 시스템
KR10-2020-0128761 2020-10-06

Publications (1)

Publication Number Publication Date
WO2022075519A1 true WO2022075519A1 (fr) 2022-04-14

Family

ID=81126573

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2020/016505 WO2022075519A1 (fr) 2020-10-06 2020-11-20 Procédé de service de distribution de contenu pour gestion de commande d'accès, et appareil informatique et système pour la réalisation de ce procédé

Country Status (2)

Country Link
KR (1) KR102450452B1 (fr)
WO (1) WO2022075519A1 (fr)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050059346A (ko) * 2003-12-13 2005-06-20 주식회사 드림인테크 디지털 만화 콘텐츠의 디알엠 압축 암호화 및 복호화 방법
KR20160129318A (ko) * 2015-04-30 2016-11-09 주식회사 모바일리더 블록기반 협업폴더의 콘텐츠 업로드 및 다운로드 방법과 블록기반 협업폴더의 콘텐츠 암호화 시스템
KR20190136245A (ko) * 2018-05-30 2019-12-10 한국과학기술연구원 블록체인 기반 컨텐츠 관리 방법 및 상기 방법을 수행하는 시스템
KR102094938B1 (ko) * 2019-11-08 2020-05-26 (주)피플앤스토리 블록체인 기반의 콘텐츠 유통 방법 및 이를 수행하기 위한 장치
KR20200099041A (ko) * 2019-02-13 2020-08-21 한국전자통신연구원 블록체인 기반 콘텐츠 이용 권한 관리 장치 및 방법

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100802110B1 (ko) * 2005-04-23 2008-02-11 주식회사 케이티프리텔 디지털 컨텐츠의 유통 방법 및 그 장치
KR101515587B1 (ko) * 2008-04-24 2015-04-28 주식회사 케이티 디지털 콘텐츠 서비스를 위한 콘텐츠 관리 시스템 및 그방법
KR20130116484A (ko) * 2012-04-05 2013-10-24 명지전문대학산학협력단 파일 보안 관리 시스템 및 방법
KR20130123106A (ko) 2012-05-02 2013-11-12 크로시스(주) 분산파일기반 미디어 스트리밍 서비스 시스템

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050059346A (ko) * 2003-12-13 2005-06-20 주식회사 드림인테크 디지털 만화 콘텐츠의 디알엠 압축 암호화 및 복호화 방법
KR20160129318A (ko) * 2015-04-30 2016-11-09 주식회사 모바일리더 블록기반 협업폴더의 콘텐츠 업로드 및 다운로드 방법과 블록기반 협업폴더의 콘텐츠 암호화 시스템
KR20190136245A (ko) * 2018-05-30 2019-12-10 한국과학기술연구원 블록체인 기반 컨텐츠 관리 방법 및 상기 방법을 수행하는 시스템
KR20200099041A (ko) * 2019-02-13 2020-08-21 한국전자통신연구원 블록체인 기반 콘텐츠 이용 권한 관리 장치 및 방법
KR102094938B1 (ko) * 2019-11-08 2020-05-26 (주)피플앤스토리 블록체인 기반의 콘텐츠 유통 방법 및 이를 수행하기 위한 장치

Also Published As

Publication number Publication date
KR20220045746A (ko) 2022-04-13
KR102450452B1 (ko) 2022-10-04

Similar Documents

Publication Publication Date Title
WO2018135766A1 (fr) Dispositif et procédé de gestion de données au moyen d'une chaîne de blocs
WO2014069787A1 (fr) Sécurité par le biais d'orchestrateurs de métadonnées
WO2012050367A2 (fr) Procédé et appareil de téléchargement d'un module drm
WO2013062352A1 (fr) Procédé et système de contrôle d'accès dans un service informatique en nuage
WO2014069777A1 (fr) Commande de transit pour des données
WO2014185594A1 (fr) Système et procédé à authentification unique dans un environnement vdi
WO2012148227A2 (fr) Procédé et dispositif de fourniture de service drm
WO2014003516A1 (fr) Procédé et appareil de fourniture de partage de données
WO2021256669A1 (fr) Procédé et système de gestion de sécurité d'accès
WO2020071650A1 (fr) Système de gestion de données de traitement de dépenses basé sur une chaîne de blocs et procédé et programme informatique associé
JP6683386B2 (ja) データ転送システム、及びデータ転送方法
WO2022075519A1 (fr) Procédé de service de distribution de contenu pour gestion de commande d'accès, et appareil informatique et système pour la réalisation de ce procédé
WO2013125883A1 (fr) Dispositif de services drm/cas et procédé utilisant le contexte de sécurité
WO2018212456A1 (fr) Système de gestion intégré de type à distribution de données
WO2017213321A1 (fr) Procédé et système de protection d'informations de partage
EP2705434A2 (fr) Procédé fournissant des services de gestion des droits numériques (gdn), dispositif et procédé de réception de services de gdn dans un terminal d'utilisateur
JP6742847B2 (ja) サーバ装置、無害化方法、およびプログラム
WO2018021864A1 (fr) Procédé pour fournir un service en nuage
WO2021225329A1 (fr) Procédé et système pour détecter la falsification d'une application mobile en utilisant un identifiant d'utilisateur et une collecte de signature
KR20100073183A (ko) 디지털 홈 도메인 관리 장치 및 방법
WO2009104873A2 (fr) Procédé et dispositif pour gérer une autorisation d'objet de droit dans une gestion de droits numériques
WO2016093380A1 (fr) Système et procédé pour protéger un livre électronique qui prend en charge une copie privée
WO2012011747A2 (fr) Procédé et appareil de gestion d'un droit de consommation pour un service multimédia
WO2012060653A2 (fr) Procédé et système de gestion de transmission de données
WO2018164408A1 (fr) Procédé de sécurité d'application et système de mise en œuvre associé

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20956834

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20956834

Country of ref document: EP

Kind code of ref document: A1