Unlock instant, AI-driven research and patent intelligence for your innovation.

A secure DRM interoperability method based on proxy re-encryption

A proxy re-encryption and interoperability technology, applied in the direction of user identity/authority verification, program/content distribution protection, electrical components, etc., can solve the problems of lack of interconnection and interoperability of the DRM system, and achieve the effect of promoting healthy development and protecting interests

Active Publication Date: 2018-08-24
BEIJING UNIV OF POSTS & TELECOMM +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the lack of interoperability between current DRM systems, the present invention proposes a DRM interoperability architecture based on proxy re-encryption on the basis of various existing single closed DRM technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure DRM interoperability method based on proxy re-encryption
  • A secure DRM interoperability method based on proxy re-encryption
  • A secure DRM interoperability method based on proxy re-encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and through specific implementation methods.

[0041] In the secure DRM interoperability framework based on proxy re-encryption, first, content providers, users and domain managers need to register their own information on trusted third-party servers, obtain the initial user name and password for free login, download content, and go to the To play and download the content, you need to purchase the license corresponding to the content and the permission of offline conversion times. When the user completes the payment, the billing system will record the relevant information of the user in the user database and generate the user's ID number, which is generated sequentially to identify the user and retrieve user information.

[0042] figure 1 It is a flowchart of content provider generating content and license in the specific implementation method of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a proxy re-encryption based secure DRM (digital rights management) interoperation architecture. Firstly, a content provider generates encrypted content and license; secondly, the content provider generates a content conversion key according to a list of other content providers to be interoperated; thirdly, a user downloads the encrypted content and requests the license, and can obtain the license after being verified by the content provider; and fourthly, the user uploads the content and license to a trusted third party, and the content and license are converted into content of a display format meeting target equipment and a license. With the proxy re-encryption based secure DRM interoperation architecture, the user can use the digital content obtained by payment once on different DRM devices.

Description

technical field [0001] The present invention relates to digital rights management technology (Digital Rights Management, DRM). In short, the present invention proposes a DRM interoperability method based on proxy re-encryption without the need for a third party to have a trusted computing unit and on the basis of ensuring security, so that users can use digital content in different media systems, It realizes the interconnection and intercommunication between different devices and protects the interests of users. Background technique [0002] With the popularization of the Internet, the digital content industry and the software industry continue to develop, but the digital content and software industries are facing severe copyright protection problems. Due to the characteristics of digital media that are easy to copy and distribute without loss, it is common to randomly copy and distribute digital media products and contents in batches with the help of digital technology and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/16H04L9/32H04L29/06G06F21/10
Inventor 张维纬张茹刘建毅王一知张梦祎张丞郭琮钮心忻杨义先
Owner BEIJING UNIV OF POSTS & TELECOMM