Process threading-based copy-protection system and copy-protection storage medium

A storage medium and anti-copy technology, applied in the direction of preventing unauthorized use of memory, program/content distribution protection, special data processing applications, etc., can solve problems such as complex systems, unsupported output devices and ports, and inability to guarantee document security, etc. , to achieve the effect of solving the security

Active Publication Date: 2012-06-13
CHENGDU QIQIAO SOFTWARE
View PDF6 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

2. Virtual machine technology. Only by entering a specific virtual machine environment can the protected digital content be decrypted and opened. In this virtual environment, all operations and functions related to output are not supported, such as saving and saving. The output devices and ports of the virtual machine, such as network, printing, etc., everything that the user has done disappears after exiting the virtual machine or restarting.
[0006] 1. Simple encryption and hiding technology can only guarantee the security of the document before opening, but cannot guarantee the security of the document during and after opening
[0007] 2. Virtual machine technology has high security, but poor usability
Moreover, the development and maintenance costs of this technology are quite high
[0008] 3. The complete blockade technology makes the computer an "isolated island" and cannot perform other normal work. If there is a "spy" program in the computer before the blockade, the data may be illegally copied and stolen
[0009] 4. Blocking and monitoring technology requires identification and processing of copy-protected documents, recording and managing all input and output operations in the computer, filtering and identifying operations related to copy-protected documents, the workload is heavy, the system is complex, and the documents may be in During the operation process, it has been transformed into many other forms or operations. If there is an omission in the monitoring system, the content of the document may be leaked; similarly, the "spy" program in the computer may also illegally steal and copy the opened digital content.
[0010] Therefore, none of the existing technologies and solutions can fundamentally solve the security issues, usability and ease of use issues and the seamless integration issues with the operating system and storage media in the copy protection technology.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Process threading-based copy-protection system and copy-protection storage medium
  • Process threading-based copy-protection system and copy-protection storage medium
  • Process threading-based copy-protection system and copy-protection storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] The following is attached Figure 1-6 Embodiments of the present invention are further described:

[0065] The present invention provides a process thread-based anti-copy system and method, and the corresponding storage medium technology. Using the method described in this technology can not only protect users in a stand-alone environment, but also in a network environment. The content of files in the copy-proof storage medium cannot be browsed, copied or stolen by unauthorized users, and it can also ensure that the entire storage medium is not illegally copied. This method encrypts the documents and data that the user needs to protect the copyright and content, and stores them in the anti-copy storage medium in a disorderly manner. The rules of encryption and decryption keys are encoded in the code of the anti-copy system protected by the encryption shell, which forms a strong protection for the user's digital copyright content; any process and thread that opens the a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of copy-protection and anti-piracy of computer information security and data security, in particular to a process threading copy-protection system and a copy-protection storage medium. In the system, a copy-protection lead module, a copy-protection core module and a copy-protection loading decryption module are arranged in the copy-protection storage medium, and copy-protection information cannot be copied illegally under an arbitrary condition by virtue of cooperative operation of the three modules. The system is used for solving the problems of security, availability and usability of the information security copy-protection technology, and is applicable in multiple industries and fields, so that digital content is protected from illegal copy, stealing and piracy; the basic unit of the information security copy-protection technology is firstly locked as a process and a thread of a current basic execution unit in an operation system, and is combined with a corresponding copy-protection storage medium technology to expand all security defense lines, so that the aims of protecting data and media assets of users from illegal copy, duplication and piracy are achieved.

Description

technical field [0001] The invention relates to the technical field of anti-copy and anti-piracy of computer information security and data security, in particular to a process-thread-based anti-copy system and an anti-copy storage medium. Background technique [0002] Computers and the Internet constitute an open platform for numerical calculation, information processing, and information exchange. On this platform, any digital resource may be copied, disseminated, or pirated in large quantities, and it is very easy to achieve. On the contrary, whether it is an individual, an enterprise or a publishing organization, it becomes very difficult to protect their own digital content in this open computing environment. They either sacrifice the usability and ease of use of the system and construct their own closed computer environment, or You can only face the risk of being illegally copied or pirated, and continue to publish and use your own digital content. [0003] To sum up, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F17/30G06F12/14G06F21/10G06F21/50
Inventor 张宁军龙祥玲
Owner CHENGDU QIQIAO SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products