System and method for protecting content data

A content data and database technology, applied in digital transmission systems, transmission systems, usage of multiple keys/algorithms, etc., can solve the problem that copyright owners cannot manage user permissions according to their wishes

Inactive Publication Date: 2003-01-22
SAMSUNG ELECTRONICS CO LTD
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, since the existing content protection system uses a simple encryption method, the cop...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for protecting content data
  • System and method for protecting content data
  • System and method for protecting content data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In the present invention, four keys are used in encrypting and decrypting content data, which will be explained before explaining the present invention in detail.

[0031] First, generate a user key in the master server. The encryption method of the present invention uses an asymmetric encryption.

[0032] The main server generates a public key for encrypting content data and a private key for decrypting encrypted content data.

[0033] The public key is sent to the content providing server to encrypt the content data, while the private key is sent to a user system to decrypt the encrypted content data. A user key is generated in the main server using the registered user's specific information such as ID, password, resident registration number, and the like.

[0034] Second, a master unit key (HUK) is generated in the user system. The HUK is generated using user system-specific information, and each user system has a different HUK. The HUK is generated by combining ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A system and method for protecting content data are provided. In the system and method, by encrypting content data so that the content data is distributed with user privileges managed as the copyright holder wants, illegal copying is prevented and user privileges are managed according to predetermined regulations. The method for providing content data comprising the steps of (a) receiving user keys generated by a combination of unique information assigned uniquely to a user; and (b) encrypting the content data using the user keys and a predetermined encryption algorithm, and transmitting the encrypted content data to a user system. According to the system and method, by encrypting content data so that the content data is distributed with the user privileges managed as the copyright holder wants, illegal copying is prevented and user privileges are managed according to predetermined regulations. Also, because user keys are encrypted using the HUK, the possible exposure of user keys is prevented and content data can be distributed as the copyright holder wants using the DRM database.

Description

technical field [0001] The present invention relates to an encryption system and method, in particular, to a system and method for protecting content data, wherein by encrypting the content data so that the content data is distributed with user rights that the copyright owner wants to manage, preventing Illegal copying and user rights are managed according to predetermined rules. Background technique [0002] When digital content data is easily distributed online with the development of the Internet, many digital content data are illegally copied without copyright protection. In particular, illegal private distribution among individuals that infringes copyright is increasing. [0003] 1 is a block diagram of a prior art content protection system, in which a main server 10 receives member registration information from a user system 10, generates a user key for decrypting encrypted content data, and transfers the user key through a content service pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/14G06F21/10
CPCG06F21/10H04L9/14
Inventor 朱彰南
Owner SAMSUNG ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products