A secure DRM interoperability method based on proxy re-encryption
A proxy re-encryption and interoperability technology, applied in the direction of user identity/authority verification, program/content distribution protection, electrical components, etc., can solve the problems of lack of interconnection and interoperability of the DRM system, and achieve the effect of promoting healthy development and protecting interests
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and through specific implementation methods.
[0041] In the secure DRM interoperability framework based on proxy re-encryption, first, content providers, users and domain managers need to register their own information on trusted third-party servers, obtain the initial user name and password for free login, download content, and go to the To play and download the content, you need to purchase the license corresponding to the content and the permission of offline conversion times. When the user completes the payment, the billing system will record the relevant information of the user in the user database and generate the user's ID number, which is generated sequentially to identify the user and retrieve user information.
[0042] figure 1 It is a flowchart of content provider generating content and license in the specific implementation method of...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


