Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Digital content distributed authorization method

A digital content, distributed technology, applied in the direction of program/content distribution protection, electrical digital data processing, instruments, etc., can solve the problem of not maintaining the flexibility and high scalability of P2P file sharing systems, high computing and storage overhead, and rights. Manage out-of-control issues to improve scalability, reduce response time, and protect copyrights

Active Publication Date: 2010-11-10
NANJING BEIDA GONGDAO INNOVATION
View PDF4 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this method, the retrieval server needs to calculate and distribute the key in each authorization process, the calculation and storage costs are large, it is easy to become a system bottleneck, and there is a single point of failure problem, which does not maintain the original flexibility and security of the P2P file sharing system. Highly scalable
To realize distributed authorization of digital content in P2P file sharing system, the document "DRM Enabled P2P Architecture" (Jae-Youn Sung; Jeong-Yeon Jeong; Ki-Song Yoon, The 8th International Conference on Advanced Communication Technology, 2006, Volume 1 , Page(s): 487-490) proposed a distributed authorization model that does not require the participation of servers. License issuance rights can be transferred or copied between nodes through transactions, so that any node in the P2P network can issue licenses. But this scheme that allows arbitrary nodes to issue licenses without any effective control is unreliable
Malicious nodes can issue licenses in the network at will after obtaining license issuance rights, or copy license issuance rights without charging fees normally, resulting in out-of-control rights management
In the scheme proposed in the document "Integrated Copyright Protection in Peer-to-Peer Networks" (Xiaosong Lou; Kai Hwang; Runfang Zhou, The 27th International Conference on Distributed Computing Systems Workshops, 2007, Page(s): 28-28), P2P A group of trusted proxy nodes in the network are responsible for disseminating the plaintext of digital content to authorized users and preventing the plaintext of digital content from being transmitted to unauthorized users. However, this scheme can only protect the copyright of digital content within the P2P system, and cannot prevent users from purchasing digital content. The case where the digital content is published in plain text outside the P2P system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital content distributed authorization method
  • Digital content distributed authorization method
  • Digital content distributed authorization method

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0046] This embodiment proposes a digital content distributed authorization method for the application scenario of digital content transactions in a P2P network, which can use a variety of proxy re-encryption algorithms, which are characterized in that the re-encryption key is based on the private key of the principal (server) and the private key of the user (content consumer).

[0047] The following is an example of a proxy re-encryption algorithm based on the El Gamal algorithm proposed by the document "Proxy Cryptography Revisited" (Anca Ivan; Yevgeniy Dodis, Proc. 10th annual Network and Distributed System Security Symposium (NDSS), 2003), to illustrate the implementation method. The re-encryption operation is recorded as RE(r, c), which means that the ciphertext c is re-encrypted with the re-encryption key r.

[0048] see figure 1 , the participants of this system include content owner A, content user B, authorized agent P, retrieval node X and trusted registration / trans...

no. 2 example

[0081] The above-mentioned first embodiment requires the server to know the private key of the content user, and the re-encryption key is generated according to the private key of the server and the private key of the content user. This embodiment proposes a digital content distributed authorization method for the application scenario of digital content transactions in a P2P network, which can use a variety of proxy re-encryption algorithms, which are characterized in that the re-encryption key is based on the private key of the principal (server) and the public key of the user (content consumer). By using this type of algorithm, the server does not need to know the content user's private key, and the re-encryption key is generated based on the server's private key and the content user's public key.

[0082] Below is the literature "Improved proxy re-encryption schemes with applications to secure distributed storage" (Giuseppe Ateniese; Kevin Fu; Matthew Green; Susan Hohenberg...

no. 3 example

[0114] The above-mentioned first and second embodiments require the server to read the database information during the digital content authorization process, and transmit the content key ciphertext and the re-encryption key ciphertext to the authorization agent. In order to further reduce the server's overhead in the authorization process, this embodiment proposes a digital content distributed authorization method for the application scenario of digital content transactions in a P2P network: content key ciphertext and re-encryption key ciphertext are submitted by content users When the authorization request is sent to the authorized agent, there is no need for the server to read the database after the transaction is successfully processed, and then send it to the authorized agent.

[0115] In addition, similar to the first and second embodiments, in order to prevent content users from repeatedly paying for authorizations that have already been paid for when applying for authori...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a digital content distributed authorization method, which belongs to the technical field of digital copyright protection. The method comprises the following steps of: 1) calculating a re-encryption key for a content user by a server during registration; 2) acquiring an agency certificate from the server during the initialization of an authorized agent; and 3) re-encryptinga content key cipher text by the authorized agent with the re-encryption key of the content user during the authorization of the digital content so as to obtain a re-encrypted content key cipher textand establish a digital certificate according to the re-encrypted content key cipher text; and transmitting the agency certificate of the authorized agent per se and the established digital certificate to the content user by the authorized agent. Compared with the prior art, the method has the characteristics of safe and efficient authorization, balanced system overhead and strong extensibility, and expands the approaches for the user to acquire the certificate.

Description

technical field [0001] The invention belongs to the field of digital rights protection technology (Digital Rights Management, DRM), and relates to a digital content distributed authorization method. Background technique [0002] Today, when Internet users have a high level of autonomy and activity, every Internet user may be a creator and user of digital works. P2P file sharing system has become a shared platform among individual users due to its low cost, flexibility and high scalability. A vital avenue for digital content. However, due to the lack of copyright protection mechanism, a large amount of digital content in the P2P file sharing system is illegally disseminated and used, and the demand for introducing DRM function into the P2P file sharing system to protect digital copyright is increasingly strong. [0003] The most common DRM system at this stage includes three modules: content server, license server and security client. The main function of the content server...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08G06F21/00G06F21/10
Inventor 邱勤汤帜俞银燕
Owner NANJING BEIDA GONGDAO INNOVATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products