Copyright protection method and system for media files
A technology for media file and copyright protection, applied in the field of information security, can solve the problems such as the inability to track the illegal transmission of media files, and the inability to guarantee the duplication of media files, so as to achieve the effect of safeguarding legitimate rights and interests and improving security protection capabilities.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0086] Please refer to Figure 2- Figure 5 , the present embodiment provides a copyright protection method for media files, which can effectively prevent the copyrighted media files from being arbitrarily disseminated, ensure that they are circulated within the authorized channels, and at the same time accurately locate the source of illegal ripping.
[0087] The method of the present embodiment may specifically include the following steps:
[0088] S1: According to the user's personal account information, the encryption key and identity identifier unique to the user are randomly generated.
[0089] Specifically, after the user completes the key personal account information in the process of applying for registration with the server, such as a uniquely identified mobile phone number, the server will randomly generate an encryption key uniquely corresponding to the user based on the user's personal account information, which is used to encrypt the media file in the future; This implem...
Embodiment 2
[0150] The present embodiment corresponds to example 1, providing a media file protection system, including the server and the first program; The first program can achieve the following steps when called by the processor on the server side:
[0151] According to the user's personal account information, the encryption key and identity identifier uniquely corresponding to the user are randomly generated;
[0152] After receiving a download instruction triggered by a user to a media file, the media file is encrypted using the corresponding encryption key of the user;
[0153] By steganography the corresponding identity identifier of a user is written to the media file.
[0154] The protection system further comprises a client and a second program, the second program can achieve the following steps when called by the client's processor:
[0155] The client receives an open instruction corresponding to the one media file;
[0156] The client attempts to obtain the encryption key corres...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


