DRM (digital rights management) system based on distributed keys

A security device and mobile terminal technology, applied in the field of DRM system, can solve problems such as performance bottlenecks, achieve the effect of reducing resource requirements, reducing costs, and eliminating performance bottlenecks

Inactive Publication Date: 2012-07-25
潘铁军
View PDF7 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This solution puts the DRM software in the DRM card with relatively limited resources and computing power, which will inevitably cause performance bottlenecks. Under the background of increasingly powerful computing power and abundant resources of smart terminals, especially the advancement of mobile payment technology, how to adapt to mobile payment technology? The new trend of the Internet has become a problem that needs to be solved at present

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • DRM (digital rights management) system based on distributed keys
  • DRM (digital rights management) system based on distributed keys
  • DRM (digital rights management) system based on distributed keys

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] Embodiment 1: a control device for DRM, such as figure 1 Shown, comprise the client terminal 2 that is installed on mobile terminal 6 and communicate with server 1 and be arranged on the safety device 3 that has IC card function and TF card interface in mobile terminal 6, it also includes and carries out communication contact with client terminal 2 The mobile terminal 6 is provided with a TF card interface 4 connected to the security device 3 and a mobile network interface 5 communicating with the server 1 on the mobile terminal 6. The security device 3 adopts the smart TF card of Shenzhen Longsys Electronics Co., Ltd., which supports mobile payment function; when the client 2 connects to the security device 3 and enters the password, it switches to the hardware protection state and monopolizes resources such as SDIO, keyboard, mouse, touch screen and input pen. , to prevent viruses from stealing security information by controlling the operating system application progr...

Embodiment 2

[0028] Embodiment 2: a control device for DRM, such as figure 1 Shown, comprise the client terminal 2 that is installed on mobile terminal 6 and communicate with server 1 and be arranged on the safety equipment 3 that has IC card function and SDIO interface in mobile terminal 6, it also comprises the client terminal 2 that communicates with client terminal 2 The mobile terminal 6 is provided with an SDIO interface 4 connected to the security device 3 and a mobile network interface 5 communicating with the server 1 on the mobile terminal 6; the security device 3 adopts the smart SD card of Shanghai Putian Research Institute and supports mobile payment functions; 2. Switch to the hardware protection state when connecting the security device 3 and entering the password, and monopolize resources such as SDIO, keyboard, mouse, touch screen and stylus to prevent viruses from stealing security information by controlling the operating system application programming interface.

Embodiment 3

[0029] Embodiment three: a kind of security device for DRM system, such as figure 2As shown, the chip ATmega 16L is the control chip of the system, and the security module uses the Z32U-Flash series 32-bit security encryption chip of Shenzhen Zhongxing Integrated Circuit Design Co., Ltd., which conforms to the ISO1786 1-3 protocol, the working voltage is 5V, and is driven by a 3.579545MHz active The crystal oscillator provides the clock, and the reset and I / O ports of the card are controlled by ATmega 16L. The SDIO Combo chip is used as a bridge chip to complete the communication between the Z32UF and the smartphone. The CG100 used is a low-power TF card data communication transceiver chip produced by C-Guys that supports SDIO 1.0. Using its high-speed UART (HS-UART ) interface communicates with the serial port of ATmega 16L. The client sends the information to Z32U-Flash through SDIO Combo to complete data encryption, decryption, digital signature and safe storage. NAND Fl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a DRM controller, which comprises a client which communicates with a server and is installed on a mobile terminal, and a security device capable of communicating with the client. The DRM controller is characterized in that the client is connected to the security device via interfaces, and the security device is a key type device provided with a function of an IC (integrated circuit) card. By the method, resource requirement of hardware is lowered, performance bottleneck is eliminated, and convenience is brought to software update and maintenance. Meanwhile, by integrally combining a mobile payment card with a CMMB (China mobile multimedia broadcasting) card, existing infrastructure is fully utilized, seamless integration with mobile payment is realized, and accordingly, the DRM system based on the distributed key is convenient in implementation and use. Moreover, the security device can support online DRM system by the aid of low-cost communicator, so that uniformity of mobile network and Internet is realized, implementation and management cost is lowered greatly, and evident quality and price advantages are achieved.

Description

technical field [0001] The present invention relates to a DRM system, in particular to a distributed key-based DRM system. Background technique [0002] With the rapid development of the mobile Internet, while benefiting from the rapid development of the Internet, the majority of digital content providers are also suffering from the problem of piracy. Because digital content is easy to copy and disseminate, digital content piracy is rampant on the mobile Internet, legal digital content cannot be effectively protected by copyright, and traditional digital copyright systems are difficult to implement. [0003] Digital content copyright encryption protection DRM (Digital Rights Management) is a technology and related methods used to strengthen the protection of digital content (such as audio and video programs, Word, PDF documents, etc.). The working principle of DRM technology is to establish a digital program authorization center first. The coded and compressed digital prog...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00H04L29/06G06F21/34
Inventor 潘铁军
Owner 潘铁军
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products