WO2022075519A1 - Procédé de service de distribution de contenu pour gestion de commande d'accès, et appareil informatique et système pour la réalisation de ce procédé - Google Patents
Procédé de service de distribution de contenu pour gestion de commande d'accès, et appareil informatique et système pour la réalisation de ce procédé Download PDFInfo
- Publication number
- WO2022075519A1 WO2022075519A1 PCT/KR2020/016505 KR2020016505W WO2022075519A1 WO 2022075519 A1 WO2022075519 A1 WO 2022075519A1 KR 2020016505 W KR2020016505 W KR 2020016505W WO 2022075519 A1 WO2022075519 A1 WO 2022075519A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- folder
- content
- purchaser
- group
- access restriction
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 28
- 238000004891 communication Methods 0.000 description 10
- 238000010586 diagram Methods 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000014509 gene expression Effects 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Definitions
- An embodiment of the present invention relates to a content distribution service technology capable of access control management.
- the existing content distribution platform all stages except for the content creation stage are managed by the service provider who operates the distribution platform. That is, the existing content distribution platform is managed by a content service provider through a centralized system in which all processes such as registration, distribution, and settlement of content are performed.
- the disclosed embodiment is to provide a content distribution service technique capable of managing access control for each user.
- a content distribution service system encrypts the contents of an author, stores them in a folder tree structure in a distributed file network, and transmits a content registration request including a list of contents stored in the distributed file network to a first user terminal; and receiving the content registration request from the first user terminal, performing content registration, obtaining content purchase-related information, and based on the obtained content purchase-related information, in the folder tree structure for each author of the distributed file network.
- the content management server may include a folder creation module that creates a permission management folder for managing access restrictions in a folder tree structure for each author of the distributed file network based on the content purchase related information.
- the permission management folder includes one or more group folders for each purchaser as a subfolder, and the group folder for each purchaser is a folder for a group of purchasers who have access rights to the same folder and file among contents of the corresponding author, In the folder tree structure of the distributed file network, the purchasers may have symbolic links to folders and files to which they have access rights.
- the folder creation module may encrypt the group folder for each purchaser, re-encrypt the encrypted key for the group folder for each purchaser with the public key of each purchaser, and transmit it to the terminal of each purchaser.
- the content management server may further include an access restriction management module that checks whether an access restriction event occurs and, when the access restriction event occurs, performs access restriction of the purchaser in the folder tree structure of the distributed file network can
- the access restriction management module may check whether an access restriction event occurs based on content usage period information included in the content purchase related information.
- the access restriction management module checks the folder for each purchaser group to which the purchaser belongs in the folder tree structure, deletes the confirmed folder for each purchaser group, and excludes the purchaser from the purchaser group After a new folder is created, the newly created folder for each buyer group is encrypted again, and the newly encrypted key for each buyer group is re-encrypted with the public key of each buyer except for the buyer who is subject to access restriction It can be transmitted to the terminal.
- a content distribution service method is a method performed in a computing device having one or more processors, and a memory for storing one or more programs executed by the one or more processors, in a distributed file network performing content registration by receiving a content registration request including a stored content list; and performing access restriction management on the folder tree structure for each author of the distributed file network based on the content purchase related information.
- the operation of performing the access restriction management may include creating a permission management folder for access restriction management in a folder tree structure for each author of the distributed file network based on the content purchase related information.
- the permission management folder includes one or more group folders for each purchaser as a subfolder, and the group folder for each purchaser is a folder for a group of purchasers who have access rights to the same folder and file among contents of the corresponding author, In the folder tree structure of the distributed file network, the purchasers may have symbolic links to folders and files to which they have access rights.
- the operation of performing the access restriction management may include: encrypting the group folder for each purchaser; and re-encrypting the encrypted key for each purchaser's group folder with each purchaser's public key and transmitting the encrypted key to each purchaser's terminal.
- the operation of performing the access restriction management may include: checking whether an access restriction event occurs; and when the access restriction event occurs, restricting the access of the purchaser in the folder tree structure of the distributed file network.
- the operation of checking whether the access restriction event occurs may check whether the access restriction event occurs based on content usage period information included in the content purchase related information.
- the operation of restricting the access of the purchaser may include, when the access restriction event occurs, checking a folder for each purchaser group to which the purchaser belongs in the folder tree structure; deleting the confirmed folder for each buyer group and then creating a new folder for each buyer group except for the buyer; encrypting the newly created folder for each buyer group; and re-encrypting the newly encrypted key of the folder for each purchaser group with the public key of each purchaser except for the purchaser subject to access restriction, and transmitting the encrypted key to the terminal of each purchaser.
- a computing device includes one or more processors; Memory; and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs comprising: a content registration request comprising a list of content stored in a distributed file network; an instruction for receiving and performing content registration; and a command for performing access restriction management on the folder tree structure for each author of the distributed file network based on the content purchase related information.
- a folder for each buyer group is created for each author in the distributed file network, the folder for each buyer group has a symbolic link to the folder and file to which the buyer has access, and the folder for each buyer group
- the folder for each buyer group By re-encrypting the encrypted key with each buyer's public key and sending it to each buyer, each buyer does not need to have a separate key to decrypt it for each folder and file that he has access to, and the buyer group to which he belongs. Since it is only necessary to decrypt a separate folder, it is possible to minimize the security problem caused by key management.
- the folder for each buyer group is deleted, a folder for each buyer group is created except for the buyer, and the folder for each buyer group is re-encrypted with the newly created key, and the encrypted key is restricted from access.
- the folder for each buyer group is deleted, a folder for each buyer group is created except for the buyer, and the folder for each buyer group is re-encrypted with the newly created key, and the encrypted key is restricted from access.
- FIG. 1 is a view showing a content distribution service system for access control management according to an embodiment of the present invention
- FIG. 2 is a diagram schematically illustrating a structure in which author's content is stored in a distributed file network in an embodiment of the present disclosure
- FIG. 3 is a view showing a state in which the content management server performs access control management in an embodiment to be disclosed;
- FIG. 4 is a view showing a case in which the purchaser has access right through a separate key to the author's folder and file;
- FIG. 5 is a block diagram showing the configuration of a content management server according to an embodiment of the present invention.
- FIG. 6 is a block diagram illustrating and describing a computing environment including a computing device suitable for use in example embodiments;
- the terms "transmission”, “communication”, “transmission”, “reception” and other similar meanings of a signal or information are not only directly transmitted from one component to another component, but also a signal or information This includes passing through other components.
- to “transmit” or “transmit” a signal or information to a component indicates the final destination of the signal or information and does not imply a direct destination. The same is true for “reception” of signals or information.
- first and second may be used to describe various components, but the components should not be limited by the terms. The above terms may be used for the purpose of distinguishing one component from another component.
- a first component may be referred to as a second component, and similarly, a second component may also be referred to as a first component.
- FIG. 1 is a diagram illustrating a content distribution service system for access control management according to an embodiment of the present invention.
- the content distribution service system 100 may include a first user terminal 102 , a content management server 104 , a public key management terminal 106 , and a second user terminal 108 . .
- each component may be communicatively connected to each other through a communication network (not shown).
- a communication network (not shown) is the Internet, one or more local area networks, wide area networks, cellular networks, mobile networks, other types of networks, or such It may include a combination of networks.
- each component may be communicatively connected to the blockchain network 110 and the distributed file network 112 .
- the blockchain network 110 may store content registration details, content distribution details, and content transaction details.
- the distributed file network 112 may store the content of the copyright holder for each copyright holder.
- distributed file network 112 may be, but is not limited to, Inter Planetary File System (IPFS).
- IPFS Inter Planetary File System
- the first user terminal 102 may be a terminal used by the author of the content.
- the present invention is not limited thereto, and the first user terminal 102 may be a terminal of a consumer purchasing content. That is, the author of the content can also be a consumer who consumes the content of other authors.
- the first user terminal 102 will be described as a terminal used by the author of the content.
- the first user terminal 102 may store the author's content in the distributed file network 112 .
- the first user terminal 102 may encrypt the content and store it in the distributed file network 112 .
- the author's content may be stored in the distributed file network 112 in a folder tree structure having a parent folder and subfolders subordinated thereto. In this case, the first user terminal 102 may encrypt each folder with a respective key.
- FIG. 2 is a diagram schematically illustrating a structure in which author's content is stored in the distributed file network 112 in an embodiment of the present disclosure.
- the content of the author may be stored in the distributed file network 112 in a folder tree structure.
- the first user terminal 102 may encrypt each folder based on the user's unique key. Specifically, the first user terminal 102 may receive a key unique to the first user terminal 102 (ie, a user-specific key) from a key issuing server (not shown). For example, the first user terminal 102 transmits the name and password of the user (ie, the author) to the key issuing server (not shown), and may receive a user's unique key from the key issuing server (not shown). there is. In this case, the key issuing server (not shown) may generate a unique user key based on the user's name and password.
- the first user terminal 102 may encrypt the root folder, which is the highest folder, using the user's unique key.
- the first user terminal 102 can encrypt each folder in a way that can infer the key that encrypted the lower folder through the key that encrypted the upper folder.
- the first user terminal 102 uses the data folder, which is a subfolder of root, the user's name and the root folder-encrypted key (that is, the user's unique key) as the encryption key of the data folder, and creates the data folder. can be encrypted.
- the first user terminal 102 uses the movie folder, which is a subfolder of the data folder, the user's name, the key that encrypts the root folder, and the key that encrypts the data folder as the encryption key of the movie folder to encrypt the movie folder.
- the first user terminal 102 converts the movie1.mp4 file contained in the movie folder to the user's name, the key to encrypt the root folder, the key to encrypt the data folder, and the key to encrypt the movie folder to the corresponding movie1.mp4 file. You can encrypt the movie1.mp4 file using the encryption key of the file.
- the first user terminal 102 can encrypt each folder only with the user's unique key of the corresponding user, and there is no need to separately manage the encryption key for each folder.
- the first user terminal 102 may transmit a content registration request to the content management server 104 . That is, the first user terminal 102 may perform content registration by transmitting a content registration request including a content list stored in the distributed file network 112 to the content management server 104 .
- the first user terminal 102 may store content registration details in the block chain network 110 .
- the content management server 104 may receive a content registration request from the first user terminal 102 .
- the content management server 104 may check content registration details for each author based on the content registration request.
- the content management server 104 may perform access control management for the content of each copyright holder stored in the distributed file network 112 .
- the content management server 104 may generate content purchase related information based on the content purchase request received from the second user terminal 108 .
- the content management server 104 may perform access control management based on content purchase related information.
- the content purchase related information may include content identification information, content author information, content purchaser information, and content usage period information.
- the content management server 104 may store content purchase details in the block chain network 110 .
- the content purchase history may include content purchase related information.
- FIG. 3 is a diagram illustrating a state in which the content management server 104 performs access control management in an disclosed embodiment.
- FIG. 3 a state in which access control management is performed for content registered by the author A will be described as an example.
- the content management server 104 may create a separate folder for access control management for the content of the author A stored in the distributed file network 112 .
- the content management server 104 may perform access control management for each purchaser group on the content registered by the author A.
- the content management server 104 may create a permission management folder (eg, group folder) as a subfolder of the root folder of the author A.
- the content management server 104 may create a folder for each buyer group (eg, musician folder, worker folder, etc.) as a subfolder of the permission management folder.
- the folder for each buyer group may be a folder for a group of buyers who have access to the same folder and file for the content of author A.
- the musician folder among the folders for each buyer group may be a folder for the group of buyers who have access to the music folder and the movie2.mp4 file among the contents of author A.
- the worker folder among the folders for each buyer group may be a folder for a group of buyers who have access to the document folder and the movie2.mp4 file and the movie3.mp4 file among the contents of author A.
- the content management server 104 may allocate each buyer to a folder for each buyer group based on content purchase related information. That is, the content management server 104 may check which purchaser purchased which content from which author and by when through content purchase related information.
- a folder for each buyer group may have a symbolic link to a folder and file to which the buyer has access. That is, the musician folder among the folders for each buyer group may have symbolic links to the music folder and the movie2.mp4 file among the contents of author A.
- the worker folder among the folders for each buyer group may have symbolic links to the document folder, the movie2.mp4 file, and the movie3.mp4 file among the contents of the author A. Since the symbolic link is a known technology, a detailed description thereof will be omitted.
- the content management server 104 encrypts a folder for each buyer group, and re-encrypts the encrypted key for each buyer group folder with the public key of each buyer, and transmits it to the second user terminal 108 of each buyer. .
- the content management server 104 may transmit a public key request to the public key management terminal 106 based on content purchaser information among content purchase related information.
- the content management server 104 may receive the public key of the purchaser from the public key management terminal 106 .
- the content management server 104 may check whether an access restriction event has occurred. In an exemplary embodiment, the content management server 104 may check whether an access restriction event occurs based on content usage period information among content purchase related information. For example, if a buyer named B purchases a music folder and a movie2.mp4 file among the content of author A, and the content usage period is 6 months from the content purchase time, the content management server 104 determines the purchase time of the content. When 6 months have elapsed, it can be determined that an access restriction event has occurred in which the access to the content of the purchaser B is restricted.
- the content management server 104 may restrict the purchaser's access to the corresponding content according to the occurrence of an access restriction event.
- the content management server 104 may check a folder (eg, musician folder) for each purchaser group to which the corresponding purchaser belongs.
- the content management server 104 deletes the folder for each buyer group to which the buyer belongs, creates a new folder for each buyer group except for the buyer in the buyer group, and then generates a key for encrypting the newly created folder for each buyer group.
- the content management server 104 may re-encrypt the folder for each buyer group (eg, the musician folder) (ie, the newly created folder for each buyer group) with the newly created key.
- the content management server 104 encrypts the key obtained by encrypting the folder for each purchaser group with the public key of each purchaser except for the purchaser (eg, B) subject to access restriction, and may re-send it to each purchaser.
- the folder for each buyer group is deleted, a new folder for each buyer group is created, the folder for each new buyer group is encrypted using the newly created key, and the encrypted key is used for each buyer except for the restricted access buyer.
- the public key management terminal 106 may receive and store the public key from each second user terminal 108 .
- the public key management terminal 106 may extract the corresponding public key according to the public key request from the content management server 104 and transmit it to the content management server 104 .
- the public key management terminal 106 is provided separately from the content management server 104 , the present invention is not limited thereto, and the public key management terminal 106 may be integrally formed with the content management server 104 .
- the second user terminal 108 may be a terminal of a user (ie, a purchaser) who purchases the content.
- the second user terminal 108 may generate a public key and a private key pair.
- the public key and the private key may be a public key and a private key of a corresponding purchaser.
- the second user terminal 108 may register the public key by transmitting the public key to the public key management terminal 106 .
- the second user terminal 108 may transmit a content purchase request to the content management server 104 .
- the second user terminal 108 may receive from the content management server 104 the double-encrypted key of the folder for each buyer group (that is, the key obtained by re-encrypting the folder for each buyer group with the public key of the buyer). there is.
- the second user terminal 108 may decrypt the double-encrypted key of the folder for each purchaser group with the private key.
- FIG. 5 is a block diagram showing the configuration of the content management server 104 according to an embodiment of the present invention.
- the content management server 104 may include a communication module 111 , a folder creation module 113 , a key management module 115 , and an access restriction management module 117 .
- the communication module 111 may communicate with the first user terminal 102 , the second user terminal 108 , the blockchain network 110 , and the distributed file network 112 , respectively.
- the folder creation module 113 may create a permission management folder in the folder tree structure for each author of the distributed file network 112 .
- the permission management folder may include a folder for each buyer group as a subfolder.
- the folder creation module 113 may acquire content purchase related information and assign each buyer to a folder for each buyer group based on the content purchase related information.
- the folder creation module 113 may connect a symbolic link to a folder and a file to which the purchasers have access rights in the folder tree structure in a folder for each purchaser group.
- the folder creation module 113 may encrypt a folder for each purchaser group, re-encrypt the encrypted key for each purchaser group folder with the public key of each purchaser, and transmit it to each purchaser.
- the folder creation module 113 may obtain the public key of each purchaser from the key management module 115 .
- the key management module 115 may receive and store public keys from the second user terminals 108 , respectively.
- the key management module 115 may extract and deliver the corresponding public key according to the public key request of the folder creation module 113 .
- the access restriction management module 117 may check whether an access restriction event occurs. When an access restriction event occurs, the access restriction management module 117 deletes the folder for each purchaser group to which the purchaser belongs, then creates a folder for each purchaser group except for the purchaser, and encrypts the folder for each new purchaser group. You can create a key.
- the access restriction management module 117 may re-encrypt the folder for each purchaser group with the newly created key.
- the access restriction management module 117 may encrypt the key obtained by encrypting the folder for each group of purchasers with the public key of each purchaser except for the access restriction purchaser, and may re-send it to each purchaser.
- a module may mean a functional and structural combination of hardware for carrying out the technical idea of the present invention and software for driving the hardware.
- the "module” may mean a logical unit of a predetermined code and a hardware resource for executing the predetermined code, and does not necessarily mean physically connected code or a single type of hardware.
- FIG. 6 is a block diagram illustrating and describing a computing environment 10 including a computing device suitable for use in example embodiments.
- each component may have different functions and capabilities other than those described below, and may include additional components in addition to those described below.
- the illustrated computing environment 10 includes a computing device 12 .
- computing device 12 may be first user terminal 102 .
- Computing device 12 may also be content management server 104 .
- the computing device 12 may be a public key management terminal 106 .
- the computing device 12 may be the second user terminal 108 .
- Computing device 12 includes at least one processor 14 , computer readable storage medium 16 , and communication bus 18 .
- the processor 14 may cause the computing device 12 to operate in accordance with the exemplary embodiments discussed above.
- the processor 14 may execute one or more programs stored in the computer-readable storage medium 16 .
- the one or more programs may include one or more computer-executable instructions that, when executed by the processor 14, configure the computing device 12 to perform operations in accordance with the exemplary embodiment. can be
- Computer-readable storage medium 16 is configured to store computer-executable instructions or program code, program data, and/or other suitable form of information.
- the program 20 stored in the computer readable storage medium 16 includes a set of instructions executable by the processor 14 .
- computer-readable storage medium 16 includes memory (volatile memory, such as random access memory, non-volatile memory, or a suitable combination thereof), one or more magnetic disk storage devices, optical disk storage devices, flash It may be memory devices, other forms of storage medium accessed by computing device 12 and capable of storing desired information, or a suitable combination thereof.
- Communication bus 18 interconnects various other components of computing device 12 , including processor 14 and computer readable storage medium 16 .
- Computing device 12 may also include one or more input/output interfaces 22 and one or more network communication interfaces 26 that provide interfaces for one or more input/output devices 24 .
- the input/output interface 22 and the network communication interface 26 are coupled to the communication bus 18 .
- Input/output device 24 may be coupled to other components of computing device 12 via input/output interface 22 .
- Exemplary input/output device 24 may include a pointing device (such as a mouse or trackpad), a keyboard, a touch input device (such as a touchpad or touchscreen), a voice or sound input device, various types of sensor devices, and/or imaging devices. input devices and/or output devices such as display devices, printers, speakers and/or network cards.
- the exemplary input/output device 24 may be included in the computing device 12 as a component constituting the computing device 12 , and may be connected to the computing device 12 as a separate device distinct from the computing device 12 . may be
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Business, Economics & Management (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Tourism & Hospitality (AREA)
- Bioethics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Economics (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Automation & Control Theory (AREA)
- Storage Device Security (AREA)
Abstract
Sont divulgués un procédé de service de distribution de contenu pour gestion de commande d'accès, et un appareil informatique et un système pour la réalisation de ce procédé. Le système pour un service de distribution de contenu selon un mode de réalisation de la divulgation comprend : un premier terminal utilisateur qui chiffre des éléments de contenu d'un auteur, stocke les éléments de contenu chiffré dans une structure arborescente de dossier dans un réseau de fichiers distribué et transmet une requête d'enregistrement de contenu comprenant une liste des éléments de contenu stockés dans le réseau de fichiers distribué ; et un serveur de gestion de contenu qui réalise un enregistrement de contenu en recevant la requête d'enregistrement de contenu du premier terminal utilisateur, acquiert des informations relatives à l'achat de contenu et gère des restrictions d'accès sur la structure d'arbre de dossier pour chaque auteur dans le réseau de fichiers distribué, sur la base des informations relatives à l'achat de contenu acquises.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020200128761A KR102450452B1 (ko) | 2020-10-06 | 2020-10-06 | 접근 제어 관리를 위한 콘텐츠 유통 서비스 방법과 이를 수행하기 위한 컴퓨팅 장치 및 시스템 |
KR10-2020-0128761 | 2020-10-06 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022075519A1 true WO2022075519A1 (fr) | 2022-04-14 |
Family
ID=81126573
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2020/016505 WO2022075519A1 (fr) | 2020-10-06 | 2020-11-20 | Procédé de service de distribution de contenu pour gestion de commande d'accès, et appareil informatique et système pour la réalisation de ce procédé |
Country Status (2)
Country | Link |
---|---|
KR (1) | KR102450452B1 (fr) |
WO (1) | WO2022075519A1 (fr) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20050059346A (ko) * | 2003-12-13 | 2005-06-20 | 주식회사 드림인테크 | 디지털 만화 콘텐츠의 디알엠 압축 암호화 및 복호화 방법 |
KR20160129318A (ko) * | 2015-04-30 | 2016-11-09 | 주식회사 모바일리더 | 블록기반 협업폴더의 콘텐츠 업로드 및 다운로드 방법과 블록기반 협업폴더의 콘텐츠 암호화 시스템 |
KR20190136245A (ko) * | 2018-05-30 | 2019-12-10 | 한국과학기술연구원 | 블록체인 기반 컨텐츠 관리 방법 및 상기 방법을 수행하는 시스템 |
KR102094938B1 (ko) * | 2019-11-08 | 2020-05-26 | (주)피플앤스토리 | 블록체인 기반의 콘텐츠 유통 방법 및 이를 수행하기 위한 장치 |
KR20200099041A (ko) * | 2019-02-13 | 2020-08-21 | 한국전자통신연구원 | 블록체인 기반 콘텐츠 이용 권한 관리 장치 및 방법 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100802110B1 (ko) * | 2005-04-23 | 2008-02-11 | 주식회사 케이티프리텔 | 디지털 컨텐츠의 유통 방법 및 그 장치 |
KR101515587B1 (ko) * | 2008-04-24 | 2015-04-28 | 주식회사 케이티 | 디지털 콘텐츠 서비스를 위한 콘텐츠 관리 시스템 및 그방법 |
KR20130116484A (ko) * | 2012-04-05 | 2013-10-24 | 명지전문대학산학협력단 | 파일 보안 관리 시스템 및 방법 |
KR20130123106A (ko) | 2012-05-02 | 2013-11-12 | 크로시스(주) | 분산파일기반 미디어 스트리밍 서비스 시스템 |
-
2020
- 2020-10-06 KR KR1020200128761A patent/KR102450452B1/ko active IP Right Grant
- 2020-11-20 WO PCT/KR2020/016505 patent/WO2022075519A1/fr active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20050059346A (ko) * | 2003-12-13 | 2005-06-20 | 주식회사 드림인테크 | 디지털 만화 콘텐츠의 디알엠 압축 암호화 및 복호화 방법 |
KR20160129318A (ko) * | 2015-04-30 | 2016-11-09 | 주식회사 모바일리더 | 블록기반 협업폴더의 콘텐츠 업로드 및 다운로드 방법과 블록기반 협업폴더의 콘텐츠 암호화 시스템 |
KR20190136245A (ko) * | 2018-05-30 | 2019-12-10 | 한국과학기술연구원 | 블록체인 기반 컨텐츠 관리 방법 및 상기 방법을 수행하는 시스템 |
KR20200099041A (ko) * | 2019-02-13 | 2020-08-21 | 한국전자통신연구원 | 블록체인 기반 콘텐츠 이용 권한 관리 장치 및 방법 |
KR102094938B1 (ko) * | 2019-11-08 | 2020-05-26 | (주)피플앤스토리 | 블록체인 기반의 콘텐츠 유통 방법 및 이를 수행하기 위한 장치 |
Also Published As
Publication number | Publication date |
---|---|
KR20220045746A (ko) | 2022-04-13 |
KR102450452B1 (ko) | 2022-10-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018135766A1 (fr) | Dispositif et procédé de gestion de données au moyen d'une chaîne de blocs | |
WO2014069787A1 (fr) | Sécurité par le biais d'orchestrateurs de métadonnées | |
WO2012050367A2 (fr) | Procédé et appareil de téléchargement d'un module drm | |
WO2013062352A1 (fr) | Procédé et système de contrôle d'accès dans un service informatique en nuage | |
WO2014069777A1 (fr) | Commande de transit pour des données | |
WO2014185594A1 (fr) | Système et procédé à authentification unique dans un environnement vdi | |
WO2012148227A2 (fr) | Procédé et dispositif de fourniture de service drm | |
WO2014003516A1 (fr) | Procédé et appareil de fourniture de partage de données | |
WO2021256669A1 (fr) | Procédé et système de gestion de sécurité d'accès | |
WO2020071650A1 (fr) | Système de gestion de données de traitement de dépenses basé sur une chaîne de blocs et procédé et programme informatique associé | |
JP6683386B2 (ja) | データ転送システム、及びデータ転送方法 | |
WO2022075519A1 (fr) | Procédé de service de distribution de contenu pour gestion de commande d'accès, et appareil informatique et système pour la réalisation de ce procédé | |
WO2013125883A1 (fr) | Dispositif de services drm/cas et procédé utilisant le contexte de sécurité | |
WO2018212456A1 (fr) | Système de gestion intégré de type à distribution de données | |
WO2017213321A1 (fr) | Procédé et système de protection d'informations de partage | |
EP2705434A2 (fr) | Procédé fournissant des services de gestion des droits numériques (gdn), dispositif et procédé de réception de services de gdn dans un terminal d'utilisateur | |
JP6742847B2 (ja) | サーバ装置、無害化方法、およびプログラム | |
WO2018021864A1 (fr) | Procédé pour fournir un service en nuage | |
WO2021225329A1 (fr) | Procédé et système pour détecter la falsification d'une application mobile en utilisant un identifiant d'utilisateur et une collecte de signature | |
KR20100073183A (ko) | 디지털 홈 도메인 관리 장치 및 방법 | |
WO2009104873A2 (fr) | Procédé et dispositif pour gérer une autorisation d'objet de droit dans une gestion de droits numériques | |
WO2016093380A1 (fr) | Système et procédé pour protéger un livre électronique qui prend en charge une copie privée | |
WO2012011747A2 (fr) | Procédé et appareil de gestion d'un droit de consommation pour un service multimédia | |
WO2012060653A2 (fr) | Procédé et système de gestion de transmission de données | |
WO2018164408A1 (fr) | Procédé de sécurité d'application et système de mise en œuvre associé |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20956834 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20956834 Country of ref document: EP Kind code of ref document: A1 |