Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

File encryption method

A technology of file encryption and encryption algorithm, which is applied in the direction of instruments, electronic digital data processing, digital data protection, etc., can solve the problems of not being able to prevent piracy, unfriendliness, etc., and achieve the effect of eliminating illegal copying and piracy

Inactive Publication Date: 2010-10-06
林伟波
View PDF0 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] This technology has unavoidable disadvantages, which brings great inconvenience to normal users, because every time it is opened, the network must be guaranteed, and it is very unfriendly to use; and it does not achieve the purpose of preventing piracy, because the same Files can still be copied multiple times to obtain the key through the network, so they are gradually being abandoned by users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File encryption method
  • File encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] A specific embodiment is listed below, which is only a specific application of the above principles.

[0014] The present invention is composed of terminal, Internet, server, encryption program, source file, downloading and copying tool. Its specific workflow is:

[0015] Such as figure 1 As shown, the user using the terminal directly sends a request for the permission to use the source file (including the use time and frequency, etc.) through the Internet, and pays the corresponding fee (see figure ①). After the network server confirms the above information, the authorization permission is encrypted. The program is directly written into the source file (see figure ②), and provided to the user to download to the terminal.

[0016] After the encrypted file is downloaded to the terminal (see figure ③), the encryption program will automatically calculate the hardware information of the terminal, generate a unique machine code, and register it in the encrypted file (see f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a file encryption method. The method comprises the following steps: when a user downloads contents relevant to copyright protection from the Internet, he needs to prepay for the permission authorization for the file; after the user pays corresponding expense, a network server system generates the limits of authority, loads the limits of authority to the file, and writes the limits of authority for the file by using encryption algorithm; when the user downloads the file to the computer terminal, the encrypted file attached to the file automatically records the hardware devices of a user computer and generates a machine code; the generated machine code is directly written into the file through the encryption algorithm; and a file decryption key is also generated, so that the file can be use freely on the terminal. In the invention, the user acquires use limits of authority and uses the hardware information of the terminal as the decryption key for the file, thereby fundamentally preventing the generations of unauthorized copying and pirating.

Description

technical field [0001] The present invention relates to file encryption technology, especially file download and restriction encryption technology applied to the Internet. It is an original encryption technology for file loading and using terminal hardware information. Technology. Background technique [0002] The current file encryption technology is DRM represented by Microsoft. The full English name is Digital Rights Management, which can be translated as: content digital rights encryption protection technology. This technology is to add a key after encoding the source file, and distribute the corresponding decrypted key to the verification station on the Internet. When the user wants to open and use the relevant file, the encrypted file will send a request to the key The stored verification station obtains the corresponding key for decryption, and the file can be used normally only after the key is successfully obtained. [0003] This technology has unavoidable disadva...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/24G06F21/62
Inventor 林伟波
Owner 林伟波
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products