CN102855419A - Copyright protection method for data files of intelligent terminals - Google Patents

Copyright protection method for data files of intelligent terminals Download PDF

Info

Publication number
CN102855419A
CN102855419A CN2012102545564A CN201210254556A CN102855419A CN 102855419 A CN102855419 A CN 102855419A CN 2012102545564 A CN2012102545564 A CN 2012102545564A CN 201210254556 A CN201210254556 A CN 201210254556A CN 102855419 A CN102855419 A CN 102855419A
Authority
CN
China
Prior art keywords
data file
user
file
data
intelligent terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012102545564A
Other languages
Chinese (zh)
Other versions
CN102855419B (en
Inventor
阮晓迅
梁金千
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING ESAFENT TECHNOLOGY DEVELOPMENT Co Ltd
Original Assignee
BEIJING ESAFENT TECHNOLOGY DEVELOPMENT Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING ESAFENT TECHNOLOGY DEVELOPMENT Co Ltd filed Critical BEIJING ESAFENT TECHNOLOGY DEVELOPMENT Co Ltd
Priority to CN201210254556.4A priority Critical patent/CN102855419B/en
Publication of CN102855419A publication Critical patent/CN102855419A/en
Application granted granted Critical
Publication of CN102855419B publication Critical patent/CN102855419B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a copyright protection method for data files of intelligent terminals, and belongs to the technical field of digital copyright protection. The method includes setting encipherment protection strategies including adopted encryption algorithm, used key length, generation type of keys and basic limits of authority of users for common data files, wherein the basic limits of authority include whether the data files can be edited and printed and whether user intelligent terminals are permitted to store dedicated authorized data; performing protection process on the common data files to be protected according to the encipherment protection strategies, and applying the protected data files to the user intelligent terminals. According to the copyright protection method, content of the protected data files is encrypted, if a user wants to access the files, he must download authorized data from an authorization server, the encrypted data files cannot be opened without the authorized data, and non-authoritative usage of the protected data can be prevented effectively.

Description

The data file copy-right protection method of intelligent terminal
Technical field
The present invention relates to digital copyright protection technology, relate to the data file copy-right protection method of intelligent terminal.
Background technology
Along with the development of mobile communication, internet and smart mobile phone, also flourish towards the Digital Media business of intelligent terminal.But downloadable music, Online Music foradownloaded video, Online Video, mobile TV, online e-book, and can download the Digital Media such as e-book so that people's life is more rich and varied.
But be accompanied by the flourish of mobile digital media business and what come is the surge of pirate or other unauthorized uses, brought huge economic loss for digital media content provider, also make it postpone the issue of fresh content on smart mobile phone, thereby limited the development of mobile digital publishing, indirectly had influence on smart phone user.
The general data file refers to the All Files except executable program file, comprise media file, document files etc., the data file relevant with concrete application program particularly, such as the data library file, mail document etc., these files often not only need to browse, more need to revise, and because the diversity of file layout is difficult to make general browser or editing machine, can only browses or edit by existing application software.Also there is not at present a kind of effective general copy-right protection method for the general data file.
Summary of the invention
For the defective that exists in the prior art, the purpose of this invention is to provide a kind of data file copy-right protection method of intelligent terminal, be used for realizing the copyright protection of the general data file on the intelligent terminal.
For reaching above purpose, the technical solution used in the present invention is:
A kind of data file copy-right protection method of intelligent terminal may further comprise the steps:
The encipherment protection strategy of general data file is set, comprises: the generating mode of the cryptographic algorithm of employing, used key length, key and user's basic authority; Whether described basic authority comprises that can data file edit and print, and allow user's intelligent terminal to preserve the specific authorisation data; According to described encipherment protection strategy general data file to be protected is carried out conservation treatment, user's intelligent terminal is used described protected data file.
The present invention will access this document to the content-encrypt of protected data file, must download authorization data from authorization server, the with no authorized data, and the data file of encryption can't be opened, and can effectively prevent the unauthorized use of protected data.
Description of drawings
The copy-right protection method process flow diagram of the general data file that Fig. 1 provides for the embodiment of the invention;
Fig. 2 is the method flow diagram that in the embodiment of the invention general data file to be protected is carried out conservation treatment;
Fig. 3 is the method flow diagram that user's intelligent terminal is used the protected data file in the embodiment of the invention.
Embodiment
The invention will be further described below in conjunction with the drawings and specific embodiments.
The data file protection strategy that present embodiment provides is a kind of relatively general protection strategy, protects take file as unit, can effectively prevent uncontrolled diffusion and the unwarranted access of file.
As shown in Figure 1, present embodiment provides a kind of copy-right protection method of general data file, may further comprise the steps:
Step 101, the encipherment protection strategy of general data file is set.Can the encipherment protection strategy comprise the generating mode (as generating at random, user's input arranges etc.) of the cryptographic algorithm (such as AES cryptographic algorithm, 3DES cryptographic algorithm, RC series cryptographic algorithm etc.) of employing, used key length, key, user's basic authority (comprise data file edit and print and whether allow client storage specific authorisation data etc.).
Step 102, generate key according to the key generating mode.Wherein, for the key of user's input, if the discontented used key length of afc algorithm of the key length of input expands to required key length by expansion algorithm, the key character of expansion is from the key character of user's input.
Step 103, the encipherment protection strategy that sets in advance according to the user carry out conservation treatment to general data file to be protected.Detailed process comprises as shown in Figure 2:
The cryptographic algorithm of step 1031, the encryption key of using generation and selection is encrypted pending general data file.
Step 1032, in the general data file of having encrypted, add file header, the proof test value of used cryptographic algorithm, used key length, encryption key and file identification etc. are put into file header, form the protected data file.Wherein file identification is comprised of the cryptographic hash of file name, file content, uniquely identification document.
Step 1033, with the protected data File Upload that forms to the data file Download Server, download for terminal device.
Step 1034, with the encipherment protection strategy, encrypt used key and file identification and send to the data file authorization server; generate generic authorization data by the data file authorization server, comprise described file identification, used encryption key, user's the general informations such as basic authority in the generic authorization data.
Step 104, user's intelligent terminal are used described protected data file.As shown in Figure 3, specifically comprise:
Step 1041, request are downloaded user's intelligent terminal of protected data file and are wanted the link of download data files to obtain the file identification of this document by click, then upload user's unique code of this document sign and this user to the data file authorization server.This unique code can be user ID, local MISI number, SIM card number etc.
Step 1042, data file authorization server use user's unique code that intelligent terminal uploads as authorization key, and Partial encryption information such as (not) encrypt file signs generic authorization data generates the specific authorisation data of this intelligent terminal.Can in this step, the data file authorization server can also add this user specially for the authority information of this document in the specific authorisation data, as opening and editor etc.
Step 1043, user's intelligent terminal are from data file download server protected data file.
Step 1044, when user's intelligent terminal is opened the protected data file, from the protected data file header, obtain the file identification of this document, search the specific authorisation data that whether have this document in this locality according to file identification, if have, then directly obtain the specific authorisation data of this document from this locality; Otherwise the unique code of file identification and this terminal is sent to the data file authorization server together, ask the specific authorisation data of this terminal.
Then the specific authorisation data that the unique code that step 1045, data file authorization server are sent according to terminal and file identification obtain this terminal issue terminal device with these specific authorisation data.
After step 1046, user's intelligent terminal obtain the specific authorisation data from this locality or data file authorization server, in internal memory, decipher this specific authorisation data with user's unique code, from these specific authorisation data, obtain the encryption key of data file to be opened, user's basic authority and authority information.If the user has the authority in this locality storage specific authorisation data, the specific authorisation data before then will deciphering are saved in this locality.
Step 1047, user's intelligent terminal are determined the mode (open or read and write and open as read-only) whether the user has the right to open this document and open this document according to the authority information that obtains, if this user does not have read right, then provide prompting; If read right is arranged, then dynamically decipher the protected data file with the encryption key that obtains, then with the data content delivery of deciphering to general data file access program; If read-write, then general data file access program also can be edited this document.
Step 105, during general data file access routine access protected data file, user's intelligent terminal carries out whole process control to access program, guarantee this program operational character should the user for basic authority and the authority information of this document.As by interception general data file access program to the opening of file, read and write, the operation such as printing controls the access to file; By interception general data file access program the stickup of the operation control file content of clipbook is copied (this control is to prevent the diffusion of plaintext document content, belongs to basic safeguard measure) etc.
The major advantage of said method is:
1, can effectively prevent the unauthorized use of protected data file; because the content of protected data file is encrypted, and access this document, must download authorization data from authorization server; the with no authorized data, the data file of encryption can't normally be accessed.
2; can prevent effectively that the protected data file is by the diffusion of improper approach; because the authorization data of each equipment and user's unique code pass through crypto-binding; the protected data file that device A is downloaded can only normally be accessed on device A; if the user sends to equipment B with the protected data file downloaded by bluetooth etc.; then equipment B can't normally be accessed; because even equipment B can access the authorization data of device A; because the unique code of equipment B is different from device A; therefore equipment B can't the decrypt authorized data, also just can't normally access the protected data file.
3, can carry out to a certain degree control of authority to the protected data file, as the control user can edit, printing etc.
Method and system of the present invention is not limited to the embodiment described in the embodiment, and those skilled in the art's technical scheme according to the present invention draws other embodiment, belongs to equally technological innovation scope of the present invention.

Claims (8)

1. the data file copy-right protection method of an intelligent terminal is characterized in that, may further comprise the steps:
The encipherment protection strategy of general data file is set, comprises: the generating mode of the cryptographic algorithm of employing, used key length, key and user's basic authority; Whether described basic authority comprises that can data file edit and print, and allow user's intelligent terminal to preserve the specific authorisation data;
According to described encipherment protection strategy general data file to be protected is carried out conservation treatment, user's intelligent terminal is used described protected data file.
2. the data file copy-right protection method of intelligent terminal according to claim 1 is characterized in that the method further comprises:
During general data file access routine access protected data file, user's intelligent terminal carries out whole process control to access program, guarantee this program operational character should the user for basic authority and the authority information of this document.
3. the data file copy-right protection method of intelligent terminal according to claim 2 is characterized in that, the generating mode of described key comprises that at random generation or user input setting.
4. the data file copy-right protection method of intelligent terminal according to claim 3 is characterized in that, described the encipherment protection strategy is set after, also further comprise:
Generating mode according to key generates key, when described generating mode arranges for user's input, key for user's input, if the key length of described input is during less than described used key length, then by expansion algorithm the key length of described input is expanded to used key length, the key character of expansion is from the key character of user's input.
5. the data file copy-right protection method of intelligent terminal according to claim 4 is characterized in that, describedly general data file to be protected is carried out conservation treatment specifically comprises:
Encrypt pending general data file with the key of described generation and the cryptographic algorithm of employing;
In the general data file of having encrypted, add file header, form the protected data file; Comprise in the described file header: proof test value and the file identification of the cryptographic algorithm of employing, used key length, key;
Described protected data File Upload is arrived the data file Download Server;
Described encipherment protection strategy, used key and the file identification of encryption are sent to the data file authorization server; generate generic authorization data by the data file authorization server, wherein comprise described file identification, encrypt used key and user's basic authority.
6. the data file copy-right protection method of intelligent terminal according to claim 5 is characterized in that, described file identification is comprised of the cryptographic hash of file name and file content, can identify uniquely this document.
7. according to claim 5 or the data file copy-right protection method of 6 described intelligent terminals, it is characterized in that described application protected data file specifically comprises:
User's intelligent terminal that described protected data file is downloaded in request obtains the file identification of this document by clicking the link of wanting download file, and uploads user's unique code of this document sign and this user to the data file authorization server;
The data file authorization server uses described user's unique code as authorization key, and the Partial encryption generic authorization data generates the specific authorisation data of this user's intelligent terminal;
In the specific authorisation data, add this user for the authority information of this document, comprise and to open and to edit this document;
User's intelligent terminal is from data file download server protected data file;
When user's intelligent terminal is opened the protected data file, from this locality or the data file authorization server obtain the specific authorisation data, in internal memory, decipher this specific authorisation data with described user's unique code, obtain the encryption key of protected data file, user's basic authority and authority information; If the user has the authority of preserving the specific authorisation data in this locality, the specific authorisation data before then will deciphering are saved in this locality;
User's intelligent terminal according to authority information determine whether to have the right to open and/editor this document, if this user does not open authority, then forbid opening and providing prompting; If the authority of opening is then dynamically deciphered the protected data file with encryption key, then with the deciphering data content delivery to general data file access program; If open and editing authority, then general data file access program can also be edited this document.
8. the data file copy-right protection method of intelligent terminal according to claim 7 is characterized in that, described from this locality or the data file authorization server obtain the specific authorisation data and specifically comprise:
User's intelligent terminal obtains the file identification of this document from file header, according to file identification is searched this document in this locality specific authorisation data, if having, then directly obtain described specific authorisation data from this locality; Otherwise described file identification and user's unique code are sent to the data file authorization server, request specific authorisation data;
The data file authorization server obtains the specific authorisation data according to described user's unique code and file identification, and issues user's intelligent terminal.
CN201210254556.4A 2012-07-20 2012-07-20 The data file copyright guard method of intelligent terminal Active CN102855419B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210254556.4A CN102855419B (en) 2012-07-20 2012-07-20 The data file copyright guard method of intelligent terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210254556.4A CN102855419B (en) 2012-07-20 2012-07-20 The data file copyright guard method of intelligent terminal

Publications (2)

Publication Number Publication Date
CN102855419A true CN102855419A (en) 2013-01-02
CN102855419B CN102855419B (en) 2015-09-09

Family

ID=47402002

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210254556.4A Active CN102855419B (en) 2012-07-20 2012-07-20 The data file copyright guard method of intelligent terminal

Country Status (1)

Country Link
CN (1) CN102855419B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106469281A (en) * 2015-08-18 2017-03-01 华为技术有限公司 The management method of data file, cloud management point and system in a kind of cloud
CN111158719A (en) * 2019-12-26 2020-05-15 湖南快乐阳光互动娱乐传媒有限公司 Application software upgrading method and device
WO2021052267A1 (en) * 2019-09-17 2021-03-25 张维加 Cross-device editing system for digital files
CN116545778A (en) * 2023-07-06 2023-08-04 北京安天网络安全技术有限公司 Unauthorized communication equipment position determining method, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020002413A1 (en) * 2000-06-30 2002-01-03 Jun Tokue Contents distribution system, portable terminal player, and contents provider
JP2002073420A (en) * 2000-08-25 2002-03-12 Matsushita Electric Ind Co Ltd Copyright protection system
CN102136048A (en) * 2011-03-28 2011-07-27 东南大学 Mobile phone Bluetooth-based ambient intelligent computer protection device and method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020002413A1 (en) * 2000-06-30 2002-01-03 Jun Tokue Contents distribution system, portable terminal player, and contents provider
JP2002073420A (en) * 2000-08-25 2002-03-12 Matsushita Electric Ind Co Ltd Copyright protection system
CN102136048A (en) * 2011-03-28 2011-07-27 东南大学 Mobile phone Bluetooth-based ambient intelligent computer protection device and method

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106469281A (en) * 2015-08-18 2017-03-01 华为技术有限公司 The management method of data file, cloud management point and system in a kind of cloud
CN106469281B (en) * 2015-08-18 2020-01-17 华为技术有限公司 Management method of data files in cloud, cloud management point and system
WO2021052267A1 (en) * 2019-09-17 2021-03-25 张维加 Cross-device editing system for digital files
CN111158719A (en) * 2019-12-26 2020-05-15 湖南快乐阳光互动娱乐传媒有限公司 Application software upgrading method and device
CN111158719B (en) * 2019-12-26 2023-06-16 湖南快乐阳光互动娱乐传媒有限公司 Application software upgrading method and device
CN116545778A (en) * 2023-07-06 2023-08-04 北京安天网络安全技术有限公司 Unauthorized communication equipment position determining method, electronic equipment and storage medium
CN116545778B (en) * 2023-07-06 2023-09-01 北京安天网络安全技术有限公司 Unauthorized communication equipment position determining method, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN102855419B (en) 2015-09-09

Similar Documents

Publication Publication Date Title
US8918633B2 (en) Information processing device, information processing system, and program
CN102819704B (en) The document copyright protection method of intelligent terminal
CN106022154B (en) Database encryption method and database server
US8826036B1 (en) Ebook encryption using variable keys
US20040039932A1 (en) Apparatus, system and method for securing digital documents in a digital appliance
CN106506159A (en) Encryption method and equipment for key safety
CN107659632A (en) A kind of file encryption-decryption method, device and computer-readable recording medium
WO2006110213A2 (en) Apparatus, system, and method for securing digital documents in a digital appliance
CN101014944A (en) Method and apparatus for digital rights management
CN102799803A (en) Secure removable media and method for managing the same
CN103390026A (en) Mobile intelligent terminal security browser and working method thereof
CN103109510A (en) Resource safety access method and device
CN101578608B (en) Methods and apparatuses for accessing content based on a session ticket
CN103731395A (en) Processing method and system for files
CN101989988A (en) Copyright protection system and method of ebook online reading
CN105117635A (en) Local data security protection system and method
CN112800392A (en) Authorization method and device based on soft certificate and storage medium
CN102855419B (en) The data file copyright guard method of intelligent terminal
CN101174941B (en) Off-line digital copyright protection method and device for mobile terminal document
CN103095482A (en) Program development maintenance system
CN101916350A (en) Method and system for protecting terminal reading contents
CN108768938B (en) A kind of web data encryption and decryption method and device
CN102222195B (en) E-book reading method and system
CN102842002B (en) The digital media copyright protection method of intelligent terminal
CN103532712B (en) digital media file protection method, system and client

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant