Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for generating digital watermark of hardware security unit and system therefor

A technology of digital watermarking and hardware security, applied in digital data processing, computer security devices, instruments, etc., can solve the problems of high-definition film sources with large capacity and MP4 with only 4G capacity, etc.

Active Publication Date: 2012-06-06
LENOVO (BEIJING) LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Similarly, the high-definition film source has a huge capacity (30GB to 50GB per film), and cannot be played on all devices of the user
For example, users want to play paid and downloaded movies on their MP4 players, but the user’s MP4 only supports movies in MPGE4 format, and MP4 only has a capacity of 4G

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating digital watermark of hardware security unit and system therefor
  • Method for generating digital watermark of hardware security unit and system therefor
  • Method for generating digital watermark of hardware security unit and system therefor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The invention provides a digital watermark generation method of a hardware security unit, which is used for generating the digital watermark and effectively controlling the user's transcription behavior.

[0048] see figure 1 , which is a flow chart of the first embodiment of the digital watermark generation method of the hardware security unit of the present invention.

[0049] The digital watermark generation method of the hardware security unit described in the first embodiment of the present invention includes:

[0050] S101. Receive a first key from a digital rights management server.

[0051] The user has a hardware security unit based on PC or HomeServer, and the hardware security unit can be TPM\TCM\MTM. A hardware security unit can be used to characterize a platform identity.

[0052] In the initial stage of key authorization, DRMServer will issue the decryption key Key, namely the first key, to the platform where the hardware security unit is located, and a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for generating a digital watermark of a hardware security unit, which comprises the steps of receiving a first key from a digital rights management server, obtaining the platform information of the hardware security unit, and generating the digital watermark according to the first key and the platform information of the hardware security unit. The invention provides the method for generating the digital watermark of the hardware security unit and a system therefor, which are used for generating the digital watermark and effectively identifying the transcribing action of a user.

Description

technical field [0001] The invention relates to a hardware security unit, in particular to a digital watermark generation method and system for a hardware security unit. Background technique [0002] Digital rights management (DRM) refers to the use of various encryption methods to ensure the security of digital objects (including text, images, audio, video, etc.) during transmission and use, and to prevent illegal users from using them through authorization and authentication mechanisms. DRM is used to protect and manage digital resources to protect the interests of copyright owners and disseminators. [0003] Simply put, DRM allows all users to spread ciphertext, but the key is controlled by the DRM authorization system, and only authorized users are allowed to take out the key. When an authorized user wants to read protected media content, he must apply to the DRM center, and the key authorization will only be obtained after approval. In the DRM single-terminal usage mo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00G06F21/10
Inventor 李希喆刘娜
Owner LENOVO (BEIJING) LTD