Method and system of content protection
A content and content key technology, which is applied in the direction of program/content distribution protection, instruments, and electronic digital data processing, etc., can solve the problems of using terminals and not being able to strictly control copyright, so as to improve overall control, protect personal interests, and protect benefit effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0036] In order to solve the problem that business operators cannot strictly control the copyright of the content of the business they operate and use various types of terminals for the business they operate. The present invention stores the playback control object and the key in the content protection personal device; or stores the playback control object in the playback terminal, and the content protection personal device only saves the key. The playback terminal or player needs to connect online with the content protection personal device when playing content. After passing the content protection personal device authentication, obtain the key for playing the content from the content protection personal device, use the key to decrypt the downloaded content and follow the playback control The object's request is played.
[0037] The method of the present invention is described in detail below in conjunction with accompanying drawing, see figure 1 , the method of the present ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 