Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for protecting terminal reading contents

A reading content and terminal technology, applied in the protection method and system field of terminal reading content, can solve the problems of harming the legitimate rights and interests of content providers, creators, imperfect protection mechanisms, complex and complicated calculation methods, etc., to improve user-friendly experience , improve user experience, and save local resources

Active Publication Date: 2010-12-15
CHINA TELECOM CORP LTD
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The core of the reading business is to provide rich reading content, but at present, for example, the existing mobile phone reading content protection mechanism is not perfect, and the simple encryption method cannot protect the content well, and the content provided by the content provider can be copied at will. Downloading, the copyright of the creator cannot be effectively protected, which seriously damages the interests of the content provider and the legitimate rights and interests of the creator, and is not conducive to the sustainable development of the reading business; Or occupy the processing power of the mobile terminal, reduce the user experience effect, and even cause the performance of the mobile phone to be unbearable
[0004] For the current rapid development of mobile terminal reading services, the imperfect protection of mobile terminal content hinders the development of the reading industry and user experience; in addition, for institutions with legal copyrights and users who purchase paid copyrights, content protection is not sufficient. It should become the bottleneck of its use; it can be seen that whether the content can be fully protected has become a key factor in mobile terminal reading, and it should be improved and protected to the greatest extent.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for protecting terminal reading contents
  • Method and system for protecting terminal reading contents
  • Method and system for protecting terminal reading contents

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention will be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments of the invention are illustrated.

[0029] figure 1 A flowchart showing a method for protecting content read by a terminal provided by an embodiment of the present invention.

[0030] Such as figure 1 As shown, the method 100 for protecting content read by a terminal includes: step 102, obtaining the client key ClientKey according to the client software, and obtaining the client activation code RegCode according to the user ID UserID. For example, in one embodiment of the protection method for terminal reading content provided by the present invention, the client key is pre-agreed when the client software is developed, and different versions of the client use different ClientKeys (i.e., the client key is the same as the client key). corresponding to the software version). Further, in the present invention, the ClientKey can be mut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for protecting terminal reading contents. The method comprises the following steps of: acquiring a client key according to client software and acquiring a client reg code according to a user ID; acquiring a right encryption key (REK) through Hash mapping according to the client key, the user ID and the client reg code; encrypting a reading certification by using the REK and transmitting the encrypted certification to a client; decrypting the encrypted certification according to the REK by using the client to obtain a content encryption key (CEK); and decrypting downloaded encrypted contents to be read through the CEK. The development of a terminal reading service is ensured through a provided content protection mechanism, so that the interest requirement of a content provider is met and the personal benefit of a creator is protected.

Description

technical field [0001] The invention relates to the technical field of mobile applications, in particular to a method and system for protecting content read by a terminal. Background technique [0002] With the development of mobile communication services, especially the development of third-generation mobile communication service technology, mobile communication and the Internet are becoming more and more closely integrated, and mobile value-added services are becoming more and more abundant. With the rapid development of mobile communication services, all operators are making great efforts to enter the field of value-added services, trying to establish various mobile communication value-added service platforms. [0003] The reading business of mobile terminals has become a very promising business in the current mobile business. Reading products continue to emerge, and the competition between products is fierce. The core of the reading business is to provide rich reading c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/24G06F21/62
Inventor 顾健薛立宏张明杰孟建亭
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products