Method and system of content protection
A content and content key technology, which is applied in the direction of program/content distribution protection, instruments, electronic digital data processing, etc., can solve the problems of not being able to strictly control copyrights, use terminals, etc., to protect personal interests, improve overall control, and protect benefit effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0038] In order to solve the problem that business operators cannot strictly control the copyright of the content of the business they operate and use various types of terminals for the business they operate. The present invention stores the playback control object and the key in the content protection personal device; or stores the playback control object in the playback terminal, and the content protection personal device only saves the key. The playback terminal or player needs to connect online with the content protection personal device when playing content. After passing the content protection personal device authentication, obtain the key for playing the content from the content protection personal device, use the key to decrypt the downloaded content and follow the playback control The object's request is played.
[0039] The method of the present invention is described in detail below in conjunction with accompanying drawing, referring to Fig. 1, method of the present...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 