Method and system for protecting digital content

A technology of digital content and digital signature, which is applied in digital transmission system, program/content distribution protection, transmission system, etc. It can solve problems such as low difficulty in cracking, difficult for authentication service center to adapt to the development of terminal equipment, and low security.

Active Publication Date: 2011-12-14
ANYKA (GUANGZHOU) MICROELECTRONICS TECH CO LTD
View PDF3 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. Add a unique digital signature to the authorized content, and track the source of the original copy in case of infringement; the disadvantage is that it can only be traced afterwards, and cannot be blocked from the source
[0006] 2. Encrypt the use of authorized content, and bind users online so that users can only use it online; the disadvantage is that users must be online, which is not suitable for local digital content services
[0007] 3. Encrypt the authorized content and distribute it to users by controlling the method of distribution key; the disadvantage is that users deliberately share the key, and the copyright will not be protected
[0008] 4. In the functional application software, add device identification information and bind the device to be used; the disadvantage is that the software has its own identification information, and pirated users can completely track the jump information of memory instructions and crack it
[0009] 5. The encrypt...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for protecting digital content
  • Method and system for protecting digital content
  • Method and system for protecting digital content

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] figure 2 The implementation flow of the digital content protection method provided by the first embodiment of the present invention is shown, and the details are as follows:

[0034] 1. The core processor of the terminal device generates a digital signature, and encrypts the digital signature to obtain an encrypted digital signature.

[0035] The digital signature includes a device identification (Identify Number, ID) number (also called a device identity authentication number) and a local random number. The device ID number is used to mark a unique terminal device core processor. The device ID number consists of binary codes with a length of several bits. When the core processor leaves the factory, it will be programmed and burned into the device ID number at one time. After the core processor leaves the factory, the device ID number will not be changed. The field of the device ID number mainly includes two parts, that is, the device type and the device serial numb...

Embodiment 2

[0059] image 3 The implementation flow of the digital content protection method provided by the second embodiment of the present invention is shown, and the details are as follows:

[0060] In order to further improve the difficulty of deciphering digital signatures including device ID numbers and local random numbers, isolate the communication relationship between the encryption and decryption algorithms between SP and terminal equipment suppliers, reduce the complexity of the encryption algorithm of terminal equipment, and facilitate terminal equipment The upgrade and maintenance of the encryption algorithm reduces the calculation burden of the SP decrypting the digital signature. In the embodiment of the present invention, the digital signature is decrypted through the EAS system.

[0061] Among them, the EAS system is a system with powerful decryption computing capability and security notification capability, which is used to decrypt digital signatures. When the digital ...

Embodiment 3

[0079] Figure 4 The implementation flow of the digital content protection method provided by the third embodiment of the present invention is shown, and the details are as follows:

[0080] 1. The terminal device generates a digital signature through its GCAPU, and encrypts the digital signature to obtain an encrypted digital signature. The specific steps are as described above and will not be repeated here.

[0081] 2. The terminal device sends the encrypted digital signature to the SP, so as to request the SP to download the specified digital content.

[0082] 3. The SP sends the encrypted digital signature to the EAS system, and receives the decrypted digital signature from the EAS system. The decrypted digital signature includes a device ID number and a local random number.

[0083] In another embodiment of the present invention, this step may also be replaced by the SP decrypting the received encrypted digital signature to obtain a digital signature including the devi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is suitable for the field of information safety and provides a method for protecting digital contents. The method comprises the following steps: a core processor of terminal equipment generates a digital signature, encrypts the digital signature and transmits the encrypted digital signature to an SP (Service Processor); the SP decrypts the digital signature, generates an SP random number, constitutes a key with an equipment identification number, a local random number and the SP random number, encrypts digital contents, and adds an encrypted information field comprising an encryption identifier and a key determining algorithm to the engaged head part of the digital contents; the SP separately transmits the digital contents to which the encrypted information field is added and the SP random number to the terminal equipment; and the core processor of the mobile equipment locally searches for a key combination which can be used for decrypting the encrypted digital contents according to the key determining algorithm, and decrypts the encrypted digital contents by adopting the key combination. According to the method and the system, the cracking difficulty of encrypted digital contents can be improved, the security of the digital contents is improved, and the aim of protecting the digital contents is fulfilled.

Description

technical field [0001] The invention belongs to the application field of digital content authorization, and in particular relates to a digital content protection method and system. Background technique [0002] With the rapid development of the Internet and electronic technology, the application of digital content as the subject matter of services is becoming more and more widespread. However, because the duplication of digital content cannot be effectively controlled, how to restrict the use of unauthorized users and protect the copyright rights of digital content providers is an important issue. The main problems of current digital content authorization certification. [0003] Common digital content includes audio and video streaming, e-books, and more. In order to maintain their copyrights, digital content providers have developed various encryption techniques and restricted applications, but none of them have achieved the expected results. [0004] At present, the main...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00H04L9/32H04L9/06H04L9/18G06F21/10
Inventor 蔡宁宁胡胜发
Owner ANYKA (GUANGZHOU) MICROELECTRONICS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products