Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Dynamic digital copyright protection method based on dual identity authentication

A technology for digital copyright protection and identity authentication, applied in the field of information security, can solve the problems of not supporting physical space migration, digital home network copyright protection not being extended, and inability to locate the identity of copyright users, and achieve the effect of dynamic

Inactive Publication Date: 2012-08-22
WUHAN UNIV OF TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The purpose of the present invention is to provide a dynamic digital copyright protection method based on dual identity authentication. The PIN code and digital certificate in the USBKEY can solve the problem that the identity of the copyright user cannot be located in the offline state in the copyright management mode proposed by Steve K et al. , the copyright protection system of digital home network proposed by Andreaux JP et al. has not been extended to the scope of wide area network, and the digital rights management scheme designed by Shi Hao et al. for collaborative peer-to-peer network does not support copyright-controlled content The migration of the physical space, and the extension of the digital certificate can correctly restrict the user's use authority and clearly divide the user's authority range in the online state. The PIN code and the digital certificate can authenticate the user's identity in the offline state, avoiding Media works are maliciously tampered with or stolen, effectively preventing offline diffusion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic digital copyright protection method based on dual identity authentication
  • Dynamic digital copyright protection method based on dual identity authentication
  • Dynamic digital copyright protection method based on dual identity authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Embodiments of the present invention will now be described with reference to the drawings, in which like reference numerals represent like elements.

[0027] refer to figure 1 with figure 2 In this embodiment, the dynamic digital copyright protection method based on double identity authentication includes the following steps:

[0028] Step S1, the service provider downloads the user's digital certificate to the USBKEY (smart password key) 500 with a built-in random number generator, and then turns to step S2 or step S3;

[0029] Step S2, when the user logs in, after the USBKEY 500 is placed in the client (user PC) 410, the dynamic identity authentication module activates the USBKEY 500 according to the input PIN code password, and then obtains the digital certificate in the USBKEY 500, when the digital certificate is valid , the random number generator generates a random number sequence, and when the signature information signed by the user on the random number seque...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a dynamic digital copyright protection method based on dual identity authentication, comprising the following steps of: downloading a digital certificate of a user into a USBKEY internally provided with a random number generator; when a user logins, after placing the USBKEY into a client end, activating the USBKEY according to the input PIN code command, acquiring the digital certificate in the USBKEY, when the digital certificate is valid, generating a random number sequence by the random number generator, when the signature information of a signature of the user to the random number sequence is right, playing or downloading media works files on line according to the user right specified by an expansion item of the digital item; and when the user does not login, after placing the USBKEY into the client end, activating the USBKEY according to the input PIN code command, acquiring the digital certificate in the USBKEY, and when the digital certificate is valid, playing media works files off line according to the user right specified by the expansion item of the digital item. The method can restrict the user use right and divide the user right range and is used for authenticating the off-line state user identity to prevent off-line diffusion.

Description

technical field [0001] The invention relates to the field of information security, to digital copyright protection and identity authentication, in particular to a dynamic digital copyright protection method based on double identity authentication. Background technique [0002] With the rapid development of network transmission and communication technology, the distribution, duplication and editing of network multimedia files have become more and more common. more and more attention. The resulting digital rights management technology (Digital Rights Management, hereinafter referred to as DRM) can realize copyright protection. It combines hardware and software access mechanisms to effectively control the access of digital multimedia content within its life cycle. . At present, many scholars have conducted in-depth and extensive research on DRM technology. [0003] Steve K et al. proposed a privacy-preservable copyright management model, which can perform identity authentica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00H04L9/32G06F21/10G06F21/33
Inventor 刘泉江雪梅李雷
Owner WUHAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products