US20150067887A1 - Digital content rights management method and system - Google Patents
Digital content rights management method and system Download PDFInfo
- Publication number
- US20150067887A1 US20150067887A1 US14/535,144 US201414535144A US2015067887A1 US 20150067887 A1 US20150067887 A1 US 20150067887A1 US 201414535144 A US201414535144 A US 201414535144A US 2015067887 A1 US2015067887 A1 US 2015067887A1
- Authority
- US
- United States
- Prior art keywords
- time
- digital content
- time stamp
- rights management
- certificate
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000007726 management method Methods 0.000 title claims abstract description 31
- 238000013475 authorization Methods 0.000 claims abstract description 36
- 238000000034 method Methods 0.000 claims abstract description 17
- 239000000284 extract Substances 0.000 claims description 4
- 238000012795 verification Methods 0.000 abstract description 43
- 238000010586 diagram Methods 0.000 description 4
- 238000012937 correction Methods 0.000 description 2
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2151—Time stamp
Definitions
- the present invention relates to the digital content rights management technique field, and particularly relates to a digital content rights management method and a system.
- the digital rights management system should correctly determine the “current time” when a user accesses the digital content: the user can access the digital content if the current time is within the designated time range; otherwise, the digital content is deemed as being expired, and the user cannot access said digital content.
- the first solution realizes time control by combining the system time with a certain algorithm. Since the system time can be modified, and BIOS of the computer device can be cleared, it is unreasonable to determine whether the digital content are expired or not by means of the system time.
- the second solution realizes time control by modifying the certificate through writing the lapsed time into it.
- the disadvantage of this solution is as follows: if the user accesses the initial certificate to overwrite the modified certificate, the expired digital content can be used again.
- the third solution is recording the time difference when the user modifies the time.
- a DRM system performs correction according to the time difference (e.g. see the method of the patent application titled “Digital Rights Management Method And System For Content Copyright Protection” applied by Samsung Electronics Co., Ltd. in February, 2005).
- the disadvantage of this solution is that it is closely combined with the system hardware, for instance, it is hard to be realized a universal PC platform. Additionally, if the time of the device is not accurate, and the user performs correction according to a standard time, the system will consider it as a malicious time modification and record the time difference.
- a registration step in which a device for accessing the digital content registers in a digital content rights management system and generates a system register code and a random key;
- a time stamp verification step the validity of the time stamp is verified when the device for accessing the digital content starts up, if the verification passes, the next step is performed, and if the verification fails, the access of the digital content is not allowed;
- a step of acquiring a certificate of authorization in which the device for accessing the digital content acquires a certificate of authorization for accessing the digital content from a server, and the certificate of authorization specifies the starting time and the ending time of allowing to access the digital content;
- a time verification step in which the time stamp is verified with the time in the certificate of authorization to determine whether or not the device for accessing the digital content is allowed to access the digital content.
- said register code is encrypted by using the random key.
- said time stamp is written in a memory of the device for accessing the digital content.
- Said random key is positioned in said time stamp.
- Said time stamp further includes a version number of the device for accessing the digital content, starting time of the device for accessing the digital content, a verification code, and the latest time of acquiring the certificate of authorization.
- the initial data is encrypted before writing said time stamp into the memory of the device for accessing the digital content.
- the time stamp is verified when the device for accessing the digital content starts up, and a time stamp is reconstructed if there are no time stamps; the information in the time stamp is acquired before verifying the time if the time stamp exists, and if the verification passes, the starting time portion in the time stamp is updated by the current system time, and if the verification fails, the access of the digital content is not allowed.
- a new random key is generated when the time stamp is reconstructed. Since the register code is encrypted by using said random key, the random key in the new time stamp will not correctly decode a register code data, thereby the time stamp cannot be arbitrarily deleted.
- the version number and the verification code are verified when the information in the time stamp is required, thereby the validity of the time stamp is guaranteed.
- step b determining whether or not the current system time is earlier than the latest time for acquiring a certificate of authorization in the time stamp, and if the determination result is yes, the system time is determined as an error, otherwise, going to step b;
- step c determining whether or not the current system time is earlier than the starting time in the time stamp, and if the determination result is yes, the system is determined as an error, and the starting time in the time stamp is updated by using a linear weighted average of both the times, otherwise, going to step c;
- the weighted value is A
- the starting time in the time stamp is T 2
- the weighted value is B
- the linear weighted average is as follows: (A T 1 +B T 2 )/(A+B).
- the purpose of this is to avoid the situation that the user cannot read when the time is set back to a correct time after the time is set to be faster, and when using the average value, the starting time in the time stamp can rapidly recover to the correct time alter starting the digital content rights management system for a limited number of times.
- the device for accessing the digital content writes the starting time field in the certificate of authorization into the time stamp after acquiring the certificate of authorization.
- the device for accessing the digital content verifies the time when accessing the digital content, firstly, the starting time in the time stamp is acquired, and if the current system time is earlier than the starting time, it is determined that the system time has been modified; then, the device for accessing the digital content acquires the latest time for acquiring the certificate of authorization in the time stamp, and if the current system time is earlier than this time, it is determined that the system time has been modified; finally, the device for accessing the digital content randomly extracts starting time fields from a number of certificates of authorization, and if the latest time for acquiring the certificate of authorization in the time stamp is earlier than any starting time, it represents an error of the time stamp.
- Another embodiment of the present invention provides a digital content rights management system including a device for accessing the digital content and a server, and said device for accessing the digital content including:
- a registering module by which the device for accessing the digital content performs system registration, and which generates system register code and random key;
- time stamp generating module for generating a time stamp, and said time stamp servers as a guide for time verification
- a time stamp verification module for verifying the validity of the time stamp when the device for accessing the digital content starts up, if the verification passes, the next step is performed, and if the verification fails, the access of the digital content is not allowed;
- a certificate of authorization acquiring module for acquiring a certificate of authorization for accessing the digital content from the server
- a time verification module for verifying the time stamp with the time in the certificate of authorization to determine whether or not the device for accessing the digital content is allowed to access the digital content.
- said device for accessing the digital content is a local device, and said server is a remote server.
- said server includes a certificate server and a content server.
- said device for accessing the digital content includes a common computer installed with reader software, a handset electronic equipment and a smart phone, and other equipments.
- the device for accessing the digital content connects and communicates with the server through Internet.
- FIG. 1 is a principle diagram of the embodiments in the present invention
- FIG. 2 is a flow chart of a time stamp verification module when the system according to the embodiments of the present invention starts;
- FIG. 3 is a flow chart for verifying the time of the time stamp according to the embodiments of the present invention.
- FIG. 4 is a structural diagram of the digital content rights management system according to the embodiments of the present invention.
- the embodiments of the present invention will be further explained below in detail with reference to the accompanying drawings.
- the present invention can be applied to a digital content rights management systems for electronic books, electro-newspaper, electric journals and digital video and audio and other digital contents.
- An embodiment of the present invention is further explained below by examples of electronic books in a digital library.
- electronic books with the copyright protection can be lent to a reader. After the reader borrows an electronic book, the time period for reading said electronic book has been designated by a server in the digital library, and the time for reading the electronic book is controlled by the reading system of the electronic book.
- two files will be downloaded from the server of the digital library, one is a content file of the electronic book, and the other one is a certificate of authorization of the electronic book.
- the time period controlled by the time is set in the certificate of authorization, wherein the starting time is recorded in the StartTime field.
- FIG. 4 is a structural diagram of the digital content rights management system in the present invention.
- the digital content rights management system in the present invention includes a local device for accessing the digital content S 401 and a remote certificate server S 402 , and a content server S 403 .
- Said device for accessing the digital content S 401 includes the following modules except for CPU, a memory and a display device:
- a registering module by which the device for accessing the digital content S 401 performs system registration, and which generates a system register code and a random key;
- time stamp generating module for generating a time stamp, and said time stamp serves as a guide for time verification
- a verification module for verifying the validity of the time stamp which is used for verifying the validity of the time stamp when the digital content rights management system starts up, if the verification passes, the next step is performed, and if the verification fails, the access of the digital content is not allowed;
- a time validity verification module which is used for verifying the validity of time before accessing digital content, and which accesses the digital content after the verification passes.
- the above certificate server S 402 and content server S 403 are preferably two independent servers.
- the local device for accessing the digital content can be a common computer installed with reader software as well as other handset digital reading devices or smart phones installed with relevant reader software.
- the local device for accessing the digital content can connect and communicate with the remote certificate server and the content server by means of each cable or wireless manner. The implementing method is explained below in detail by taking the electronic books reader software under Windows operating system as an example.
- FIG. 1 is a principle diagram of the embodiments in the present invention.
- the local device for accessing the digital content is a reader, which should register in the server system of the digital library in step S 101 before borrowing the electronic books a register code and a time stamp are generated in step S 102 after the registration, and the register code is encrypted by using a random key which is positioned in the time stamp.
- the register code and the time stamp are both written into a Windows registration table, and the time stamp includes the following information: a version number, the starting time of the reader, a random key, a verification code and the latest time for acquiring the certificate of authorization.
- the random key is used for encrypting the register code, and the verification code takes a constant.
- the initial data are encrypted before writing the time stamp into the registration table.
- verification step S 103 the validity of the time stamp is verified when the device for accessing the digital content starts up. If the verification passes, the next step is performed, and if the verification fails, the access of the digital content is not allowed.
- step S 104 the reader writes the starting time field in the certificate of authorization into the time stamp after downloading the certificate.
- step S 105 the reader acquires the expected electronic book.
- the time verification is performed on the time in step S 106 when the reader acquires the expected electronic book. Firstly, the reader acquires the starting time in the time stamp, if the current system time is earlier than the starting time, it is determined that the system time has been modified; then the reader acquires the latest time for acquiring the certificate in the time stamp, if the current system time is earlier than this time, it is determined that the system time has been modified; finally, the reader randomly extracts StartTime fields from a number of certificates, if the latest time for acquiring the certificate in the time stamp is earlier than any StartTime, it represents an error of the time stamp. The reader cannot open the electronic book for reading if any one of the conditions does not pass the verification. If the verification passes, the digital content can be used in step S 107 .
- step S 201 the reader starts up and performs initialization. Then, the time stamp is verified in step S 202 , if the time stamp does not exist, a time stamp is reconstructed in step S 204 , and if the time stamp exists, the information of the time stamp is acquired in step S 203 . Then, a time verification is performed in step S 205 , if it is correct, the starting time portion in the time stamp is updated by using the current system time in step S 206 , and the time verification is finished in step S 207 , otherwise, a time stamp is reconstructed in step S 204 .
- a new random key is generated when a time stamp is reconstructed in step S 204 . Since the register code is encrypted by using the random key, the random key in the new time stamp cannot correctly decode the register code data, thereby the time stamp cannot be randomly deleted.
- the version number and the verification code are verified when information in the time stamp is acquired in step S 203 , thereby the validity of the time stamp is guaranteed.
- FIG. 3 is a flow chart of performing a time verification for a time stamp in the embodiments of the present invention. As shown in FIG. 3 , the method in step S 301 for acquiring time stamp information and performing a time verification for a time stamp are as follows:
- step S 302 determines whether or not the current system time is earlier than the latest time for acquiring the certificate in the time stamp, and if the determination result is yes, the step S 307 determines an error of the system time, otherwise, going to step b;
- step S 303 determines whether or not the current system time is earlier than the time when the reader starts in the time stamp, and if the determination result is yes, step S 307 determines an error of the system time and updates the starting time in the time stamp by using the average value of two times, otherwise, going to step c;
- step S 304 verifies whether the latest time for acquiring the certificate in the time stamp is valid or not.
- the verification method is randomly extracting StartTime fields from five certificates, and if the latest time for acquiring the certificate in the time stamp is earlier than any StartTime, as shown in step S 305 , it represents an error of the time stamp, otherwise, the step S 306 can determine that the system time is correct.
- the first situation when the reader starts, a time stamp is generated and written into the registration table of the Windows system if there are no time stamps, otherwise, it is determined whether or not the time stamp is valid, an error mark of the time stamp is recorded if it is invalid, and the starting time in the time stamp us updated if it is valid.
- the second situation the system time is modified. For instance, if a user borrows a book with three day validity on Jul. 7, 2006, and the user intends to read this book on Jul. 11, 2006 and sets the system time to Jul. 8, 2006, then the system time is determined as an error if the user started the reader or borrowed other books after Jul. 8, 2006. If a user wants to read an expired book, he or she must guarantee, when this book expires, that the reader is never started or no book is borrowed before the system time is modified.
- the third situation the user directly deletes the time stamp. Since the time stamp includes the encryption key of the system registration information in the digital library, and a new random key is used for constructing a new time stamp after the deletion, the key acquired from the time stamp will not decode the registration information, thereby the electronic book which has been borrowed cannot be read.
- the forth situation the user backups the time stamp in other positions after borrowing the book and covers the current time stamp after the book is expired. At that time, the time stamp verification has no problem, however, the reader compares the current system time with the due date in the certificate for determining that the expired book cannot be read.
- the fifth situation the user backups the time stamp in other positions after borrowing the book, covers the current time stamp after the book is expired and sets the system time within the period of validity. Since the system randomly extracts StartTime fields from five certificates of books which have been borrowed for verification, once it is discovered that the latest time for acquiring the certificate in the time stamp is earlier than any StartTime, an error of the time stamp is determined, and the electronic book which has been borrowed cannot be read.
Abstract
Description
- The present invention relates to the digital content rights management technique field, and particularly relates to a digital content rights management method and a system.
- At present, with the popularization of network, digital contents such as electronic books, electro-newspaper, electric journals and digital video and audio have been accepted by more and more users, and the digital library is widely concerned in colleges, communities and even public networks. Thus, the copyright protection of digital content is becoming more and more important for publication houses, newspaper offices and libraries. The current problem is how to realize the copyright protection of digital content by time control in applications such as security protection of digital libraries and electronic documents. For instance, when a user “borrows” a digital content from the digital library, the digital library only allows the user to access the digital content within a particular time period. Therefore, the digital rights management system should correctly determine the “current time” when a user accesses the digital content: the user can access the digital content if the current time is within the designated time range; otherwise, the digital content is deemed as being expired, and the user cannot access said digital content.
- The key to the realization of the digital content time control depends on the acquisition of a correct “current time” and avoidance of malicious amendments to the “current time”. In order to realize the above purpose, the following solutions are usually adopted:
- (1) The first solution realizes time control by combining the system time with a certain algorithm. Since the system time can be modified, and BIOS of the computer device can be cleared, it is unreasonable to determine whether the digital content are expired or not by means of the system time.
- (2) The second solution realizes time control by modifying the certificate through writing the lapsed time into it. The disadvantage of this solution is as follows: if the user accesses the initial certificate to overwrite the modified certificate, the expired digital content can be used again.
- (3) The third solution is recording the time difference when the user modifies the time. A DRM system performs correction according to the time difference (e.g. see the method of the patent application titled “Digital Rights Management Method And System For Content Copyright Protection” applied by Samsung Electronics Co., Ltd. in February, 2005). The disadvantage of this solution is that it is closely combined with the system hardware, for instance, it is hard to be realized a universal PC platform. Additionally, if the time of the device is not accurate, and the user performs correction according to a standard time, the system will consider it as a malicious time modification and record the time difference.
- The above time control solutions all make it possible that the expired user employs a certain method (and it can be easily done) to access the expired digital content. If the expired digital content can still be used, the copyright protection of the digital content by means of time control cannot be realized.
- Additionally, there are other solutions which record time by designing a special hardware device for achieving the purpose of time control. However, the method of designing a special hardware device is not suitable for a universal device, and it will increase the burden of common users and go against the popularization of digital contents. Therefore, universal devices such as PC require safe, convenient and practical time control methods.
- One embodiment of the present invention provides a digital content rights management method comprising:
- a registration step, in which a device for accessing the digital content registers in a digital content rights management system and generates a system register code and a random key;
- a time stamp generating step of generating a time stamp as a guide for verifying the time;
- a time stamp verification step, the validity of the time stamp is verified when the device for accessing the digital content starts up, if the verification passes, the next step is performed, and if the verification fails, the access of the digital content is not allowed;
- a step of acquiring a certificate of authorization, in which the device for accessing the digital content acquires a certificate of authorization for accessing the digital content from a server, and the certificate of authorization specifies the starting time and the ending time of allowing to access the digital content;
- a time verification step, in which the time stamp is verified with the time in the certificate of authorization to determine whether or not the device for accessing the digital content is allowed to access the digital content.
- Furthermore, in said registration step, said register code is encrypted by using the random key.
- Furthermore, in said time stamp generating step, said time stamp is written in a memory of the device for accessing the digital content. Said random key is positioned in said time stamp. Said time stamp further includes a version number of the device for accessing the digital content, starting time of the device for accessing the digital content, a verification code, and the latest time of acquiring the certificate of authorization.
- Furthermore, the initial data is encrypted before writing said time stamp into the memory of the device for accessing the digital content.
- Furthermore, in the time stamp verification step, the time stamp is verified when the device for accessing the digital content starts up, and a time stamp is reconstructed if there are no time stamps; the information in the time stamp is acquired before verifying the time if the time stamp exists, and if the verification passes, the starting time portion in the time stamp is updated by the current system time, and if the verification fails, the access of the digital content is not allowed.
- Furthermore, a new random key is generated when the time stamp is reconstructed. Since the register code is encrypted by using said random key, the random key in the new time stamp will not correctly decode a register code data, thereby the time stamp cannot be arbitrarily deleted.
- Furthermore, the version number and the verification code are verified when the information in the time stamp is required, thereby the validity of the time stamp is guaranteed.
- Furthermore, the following steps are adopted when performing a time verification for the time stamp:
- a. determining whether or not the current system time is earlier than the latest time for acquiring a certificate of authorization in the time stamp, and if the determination result is yes, the system time is determined as an error, otherwise, going to step b;
- b. determining whether or not the current system time is earlier than the starting time in the time stamp, and if the determination result is yes, the system is determined as an error, and the starting time in the time stamp is updated by using a linear weighted average of both the times, otherwise, going to step c;
- c. the method of verifying whether or not the latest time of acquiring the certificate of authorization in the time stamp is valid by means of following ways: randomly extracting starting time fields from a number of certificates of authorization, and if the latest time of acquiring the certificate of authorization in the time stamp is earlier than any starting time, it represents an error of the time stamp, otherwise, the time verification for the time stamp passes. Wherein suppose the current system time is T1, the weighted value is A, the starting time in the time stamp is T2, and the weighted value is B, then the linear weighted average is as follows: (A T1+B T2)/(A+B). The purpose of this is to avoid the situation that the user cannot read when the time is set back to a correct time after the time is set to be faster, and when using the average value, the starting time in the time stamp can rapidly recover to the correct time alter starting the digital content rights management system for a limited number of times.
- Furthermore, in the step of acquiring a certificate of authorization, the device for accessing the digital content writes the starting time field in the certificate of authorization into the time stamp after acquiring the certificate of authorization.
- Furthermore, in the time verification step, the device for accessing the digital content verifies the time when accessing the digital content, firstly, the starting time in the time stamp is acquired, and if the current system time is earlier than the starting time, it is determined that the system time has been modified; then, the device for accessing the digital content acquires the latest time for acquiring the certificate of authorization in the time stamp, and if the current system time is earlier than this time, it is determined that the system time has been modified; finally, the device for accessing the digital content randomly extracts starting time fields from a number of certificates of authorization, and if the latest time for acquiring the certificate of authorization in the time stamp is earlier than any starting time, it represents an error of the time stamp.
- Another embodiment of the present invention provides a digital content rights management system including a device for accessing the digital content and a server, and said device for accessing the digital content including:
- a registering module by which the device for accessing the digital content performs system registration, and which generates system register code and random key;
- a time stamp generating module for generating a time stamp, and said time stamp servers as a guide for time verification;
- a time stamp verification module for verifying the validity of the time stamp when the device for accessing the digital content starts up, if the verification passes, the next step is performed, and if the verification fails, the access of the digital content is not allowed;
- a certificate of authorization acquiring module for acquiring a certificate of authorization for accessing the digital content from the server; and
- a time verification module for verifying the time stamp with the time in the certificate of authorization to determine whether or not the device for accessing the digital content is allowed to access the digital content.
- Furthermore, said device for accessing the digital content is a local device, and said server is a remote server.
- Furthermore, said server includes a certificate server and a content server.
- Furthermore, said device for accessing the digital content includes a common computer installed with reader software, a handset electronic equipment and a smart phone, and other equipments.
- Furthermore, the device for accessing the digital content connects and communicates with the server through Internet.
- The use of said method and system in the embodiments of the present invention effectively solves the problems that inaccurate reference time exists in the current digital content rights management solution of controlling digital content by time, and the user can still access the expired digital content by using a certain method.
-
FIG. 1 is a principle diagram of the embodiments in the present invention; -
FIG. 2 is a flow chart of a time stamp verification module when the system according to the embodiments of the present invention starts; -
FIG. 3 is a flow chart for verifying the time of the time stamp according to the embodiments of the present invention; and -
FIG. 4 is a structural diagram of the digital content rights management system according to the embodiments of the present invention. - The embodiments of the present invention will be further explained below in detail with reference to the accompanying drawings. The present invention can be applied to a digital content rights management systems for electronic books, electro-newspaper, electric journals and digital video and audio and other digital contents. An embodiment of the present invention is further explained below by examples of electronic books in a digital library.
- In a digital library, electronic books with the copyright protection can be lent to a reader. After the reader borrows an electronic book, the time period for reading said electronic book has been designated by a server in the digital library, and the time for reading the electronic book is controlled by the reading system of the electronic book.
- After the reader submits a borrowing request, two files will be downloaded from the server of the digital library, one is a content file of the electronic book, and the other one is a certificate of authorization of the electronic book. The time period controlled by the time is set in the certificate of authorization, wherein the starting time is recorded in the StartTime field.
-
FIG. 4 is a structural diagram of the digital content rights management system in the present invention. As shown inFIG. 4 , the digital content rights management system in the present invention includes a local device for accessing the digital content S401 and a remote certificate server S402, and a content server S403. Said device for accessing the digital content S401 includes the following modules except for CPU, a memory and a display device: - a registering module by which the device for accessing the digital content S401 performs system registration, and which generates a system register code and a random key;
- a time stamp generating module for generating a time stamp, and said time stamp serves as a guide for time verification;
- a verification module for verifying the validity of the time stamp, which is used for verifying the validity of the time stamp when the digital content rights management system starts up, if the verification passes, the next step is performed, and if the verification fails, the access of the digital content is not allowed;
- a module for acquiring a certificate of authorization for accessing the digital content from the certificate server; and
- a time validity verification module, which is used for verifying the validity of time before accessing digital content, and which accesses the digital content after the verification passes.
- Considering the safety of the system, the above certificate server S402 and content server S403 are preferably two independent servers.
- The local device for accessing the digital content can be a common computer installed with reader software as well as other handset digital reading devices or smart phones installed with relevant reader software. The local device for accessing the digital content can connect and communicate with the remote certificate server and the content server by means of each cable or wireless manner. The implementing method is explained below in detail by taking the electronic books reader software under Windows operating system as an example.
-
FIG. 1 is a principle diagram of the embodiments in the present invention. As shown inFIG. 1 , in the embodiment, the local device for accessing the digital content is a reader, which should register in the server system of the digital library in step S101 before borrowing the electronic books a register code and a time stamp are generated in step S102 after the registration, and the register code is encrypted by using a random key which is positioned in the time stamp. - The register code and the time stamp are both written into a Windows registration table, and the time stamp includes the following information: a version number, the starting time of the reader, a random key, a verification code and the latest time for acquiring the certificate of authorization. The random key is used for encrypting the register code, and the verification code takes a constant. The initial data are encrypted before writing the time stamp into the registration table.
- In verification step S103, the validity of the time stamp is verified when the device for accessing the digital content starts up. If the verification passes, the next step is performed, and if the verification fails, the access of the digital content is not allowed.
- In step S104, the reader writes the starting time field in the certificate of authorization into the time stamp after downloading the certificate.
- In step S105, the reader acquires the expected electronic book. The time verification is performed on the time in step S106 when the reader acquires the expected electronic book. Firstly, the reader acquires the starting time in the time stamp, if the current system time is earlier than the starting time, it is determined that the system time has been modified; then the reader acquires the latest time for acquiring the certificate in the time stamp, if the current system time is earlier than this time, it is determined that the system time has been modified; finally, the reader randomly extracts StartTime fields from a number of certificates, if the latest time for acquiring the certificate in the time stamp is earlier than any StartTime, it represents an error of the time stamp. The reader cannot open the electronic book for reading if any one of the conditions does not pass the verification. If the verification passes, the digital content can be used in step S107.
- The specific flow of the time stamp verification step S103 when the above system starts up is shown in
FIG. 2 . In step S201, the reader starts up and performs initialization. Then, the time stamp is verified in step S202, if the time stamp does not exist, a time stamp is reconstructed in step S204, and if the time stamp exists, the information of the time stamp is acquired in step S203. Then, a time verification is performed in step S205, if it is correct, the starting time portion in the time stamp is updated by using the current system time in step S206, and the time verification is finished in step S207, otherwise, a time stamp is reconstructed in step S204. - A new random key is generated when a time stamp is reconstructed in step S204. Since the register code is encrypted by using the random key, the random key in the new time stamp cannot correctly decode the register code data, thereby the time stamp cannot be randomly deleted.
- The version number and the verification code are verified when information in the time stamp is acquired in step S203, thereby the validity of the time stamp is guaranteed.
-
FIG. 3 is a flow chart of performing a time verification for a time stamp in the embodiments of the present invention. As shown inFIG. 3 , the method in step S301 for acquiring time stamp information and performing a time verification for a time stamp are as follows: - a. preferable step S302 determines whether or not the current system time is earlier than the latest time for acquiring the certificate in the time stamp, and if the determination result is yes, the step S307 determines an error of the system time, otherwise, going to step b;
- b. step S303 determines whether or not the current system time is earlier than the time when the reader starts in the time stamp, and if the determination result is yes, step S307 determines an error of the system time and updates the starting time in the time stamp by using the average value of two times, otherwise, going to step c;
- c. step S304 verifies whether the latest time for acquiring the certificate in the time stamp is valid or not. The verification method is randomly extracting StartTime fields from five certificates, and if the latest time for acquiring the certificate in the time stamp is earlier than any StartTime, as shown in step S305, it represents an error of the time stamp, otherwise, the step S306 can determine that the system time is correct.
- Several special situations in the present invention are further described below with reference to the accompanying drawings. The flows of other situations are shown in the summary of the invention.
- The first situation: when the reader starts, a time stamp is generated and written into the registration table of the Windows system if there are no time stamps, otherwise, it is determined whether or not the time stamp is valid, an error mark of the time stamp is recorded if it is invalid, and the starting time in the time stamp us updated if it is valid.
- The second situation: the system time is modified. For instance, if a user borrows a book with three day validity on Jul. 7, 2006, and the user intends to read this book on Jul. 11, 2006 and sets the system time to Jul. 8, 2006, then the system time is determined as an error if the user started the reader or borrowed other books after Jul. 8, 2006. If a user wants to read an expired book, he or she must guarantee, when this book expires, that the reader is never started or no book is borrowed before the system time is modified.
- The third situation: the user directly deletes the time stamp. Since the time stamp includes the encryption key of the system registration information in the digital library, and a new random key is used for constructing a new time stamp after the deletion, the key acquired from the time stamp will not decode the registration information, thereby the electronic book which has been borrowed cannot be read.
- The forth situation: the user backups the time stamp in other positions after borrowing the book and covers the current time stamp after the book is expired. At that time, the time stamp verification has no problem, however, the reader compares the current system time with the due date in the certificate for determining that the expired book cannot be read.
- The fifth situation: the user backups the time stamp in other positions after borrowing the book, covers the current time stamp after the book is expired and sets the system time within the period of validity. Since the system randomly extracts StartTime fields from five certificates of books which have been borrowed for verification, once it is discovered that the latest time for acquiring the certificate in the time stamp is earlier than any StartTime, an error of the time stamp is determined, and the electronic book which has been borrowed cannot be read.
- The methods stated in the present invention are not limited to the embodiments in the specific implementing manners. A person skilled in the art may obtain other implementing manners which are also within the scope of technical innovation of the present invention according to the technical solutions of the present invention
Claims (15)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/535,144 US20150067887A1 (en) | 2007-01-17 | 2014-11-06 | Digital content rights management method and system |
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2007100627906A CN100452074C (en) | 2007-01-17 | 2007-01-17 | Copyright protection method and system for digital contents controlled by time |
CN200710062790.6 | 2007-01-17 | ||
PCT/CN2007/003528 WO2008089624A1 (en) | 2007-01-17 | 2007-12-11 | Copyright protecting method and system with digital content |
US52298909A | 2009-12-08 | 2009-12-08 | |
US14/535,144 US20150067887A1 (en) | 2007-01-17 | 2014-11-06 | Digital content rights management method and system |
Related Parent Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2007/003528 Continuation WO2008089624A1 (en) | 2007-01-17 | 2007-12-11 | Copyright protecting method and system with digital content |
US12/522,989 Continuation US8887299B2 (en) | 2007-01-17 | 2007-12-11 | Digital content rights management method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
US20150067887A1 true US20150067887A1 (en) | 2015-03-05 |
Family
ID=38692613
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/522,989 Active 2031-10-25 US8887299B2 (en) | 2007-01-17 | 2007-12-11 | Digital content rights management method and system |
US14/535,144 Abandoned US20150067887A1 (en) | 2007-01-17 | 2014-11-06 | Digital content rights management method and system |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/522,989 Active 2031-10-25 US8887299B2 (en) | 2007-01-17 | 2007-12-11 | Digital content rights management method and system |
Country Status (5)
Country | Link |
---|---|
US (2) | US8887299B2 (en) |
EP (1) | EP2116949B1 (en) |
JP (1) | JP5043959B2 (en) |
CN (1) | CN100452074C (en) |
WO (1) | WO2008089624A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9116991B2 (en) * | 2011-08-16 | 2015-08-25 | Google Inc. | Searching encrypted electronic books |
WO2020081722A1 (en) * | 2018-10-16 | 2020-04-23 | Follett Corporation | Method and system for electronic content delivery to a user device through a wireless captive audience device |
WO2022193517A1 (en) * | 2021-03-16 | 2022-09-22 | 公安部第三研究所 | Platform for constructing sample for capability verification of mobile phone forensics, and method |
Families Citing this family (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6765866B1 (en) | 2000-02-29 | 2004-07-20 | Mosaid Technologies, Inc. | Link aggregation |
CN100452074C (en) * | 2007-01-17 | 2009-01-14 | 北京大学 | Copyright protection method and system for digital contents controlled by time |
CN100555299C (en) * | 2007-12-28 | 2009-10-28 | 中国科学院计算技术研究所 | A kind of digital literary property protection method and system |
US8571994B2 (en) * | 2009-06-26 | 2013-10-29 | Disney Enterprises, Inc. | Method and system for allocating access to digital media content |
CN101996386A (en) * | 2009-08-14 | 2011-03-30 | 北大方正集团有限公司 | Method, device and system for lending digital books |
CN101729311B (en) * | 2009-11-18 | 2013-01-09 | 中兴通讯股份有限公司 | Method and device for detecting effectiveness of local active source |
US9535884B1 (en) | 2010-09-30 | 2017-01-03 | Amazon Technologies, Inc. | Finding an end-of-body within content |
CN102592173A (en) * | 2011-01-07 | 2012-07-18 | 北大方正集团有限公司 | Digital content borrowing processing method and system thereof, apparatuses |
US8799363B2 (en) | 2011-03-29 | 2014-08-05 | Amazon Technologies, Inc. | Lending digital items to identified recipients |
US8635277B2 (en) * | 2011-03-29 | 2014-01-21 | Amazon Technologies, Inc. | Mediated lending of digital items |
CN102194071B (en) * | 2011-05-20 | 2013-06-05 | 嘉兴云歌信息科技有限公司 | Time-domain-based data evidence acquisition and cross analysis method |
CN102289610A (en) * | 2011-06-08 | 2011-12-21 | 无敌科技(西安)有限公司 | Offline certificate control and management system and method of digital rights management (DRM) of embedded device |
US10296878B1 (en) | 2011-06-28 | 2019-05-21 | Amazon Technologies, Inc. | Platform for providing generic e-content |
US8612584B2 (en) * | 2011-08-29 | 2013-12-17 | Google Inc. | Using eBook reading data to generate time-based information |
US9654467B1 (en) * | 2013-03-14 | 2017-05-16 | EMC IP Holding Company LLC | Time synchronization solutions for forward-secure one-time authentication tokens |
EP2902940B1 (en) | 2013-09-05 | 2017-04-19 | Huawei Technologies Co., Ltd. | Storage system and method for processing data operation request |
US10218817B2 (en) | 2015-04-28 | 2019-02-26 | Microsoft Technology Licensing, Llc | Digital rights list for device groups |
CN109416709B (en) * | 2016-05-12 | 2023-08-15 | 皇家飞利浦有限公司 | Digital rights management for anonymous digital content sharing |
CN106778085A (en) * | 2016-11-22 | 2017-05-31 | 中铁第五勘察设计院集团有限公司 | A kind of software encryption and protection and the method for automatically renewed |
CN107315929A (en) * | 2017-02-10 | 2017-11-03 | 苏州丞相文化科技有限公司 | A kind of method of Internet picture copyright protection |
KR102488636B1 (en) * | 2017-11-23 | 2023-01-17 | 삼성전자주식회사 | Encryption device encrypting data and timestamp, system on chip including the same, and electronic device |
CN111460393A (en) * | 2020-03-18 | 2020-07-28 | 紫光云技术有限公司 | Method for preventing system from bypassing software license time management and control |
CN112348998B (en) * | 2020-07-24 | 2024-03-12 | 深圳Tcl新技术有限公司 | Method and device for generating one-time password, intelligent door lock and storage medium |
CN112153078B (en) * | 2020-10-26 | 2021-07-27 | 广州欧赛斯信息科技有限公司 | Encryption method and system based on time release |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6233341B1 (en) * | 1998-05-19 | 2001-05-15 | Visto Corporation | System and method for installing and using a temporary certificate at a remote site |
US6625656B2 (en) * | 1999-05-04 | 2003-09-23 | Enounce, Incorporated | Method and apparatus for continuous playback or distribution of information including audio-visual streamed multimedia |
US20040039911A1 (en) * | 2001-09-11 | 2004-02-26 | Makoto Oka | Content usage authority management system and management method |
US6920567B1 (en) * | 1999-04-07 | 2005-07-19 | Viatech Technologies Inc. | System and embedded license control mechanism for the creation and distribution of digital content files and enforcement of licensed use of the digital content files |
US20060080260A1 (en) * | 2004-10-13 | 2006-04-13 | Tien-Fu Chen | System and method for digital content rights management on portable storage devices |
US20080270308A1 (en) * | 2007-04-27 | 2008-10-30 | General Instrument Corporation | Method and Apparatus for Providing a Secure Trick Play |
US7533266B2 (en) * | 2002-02-01 | 2009-05-12 | Civolution B.V. | Watermark-based access control method and device |
US8074083B1 (en) * | 2007-01-09 | 2011-12-06 | Google Inc. | Controlling download and playback of media content |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5978476A (en) * | 1996-09-17 | 1999-11-02 | Altera Corporation | Access restriction to circuit designs |
JP3575210B2 (en) * | 1997-02-04 | 2004-10-13 | 日本ビクター株式会社 | Digital information management system, terminal device, information management center, and digital information management method |
US6865675B1 (en) * | 1998-07-14 | 2005-03-08 | Koninklijke Philips Electronics N.V. | Method and apparatus for use of a watermark and a unique time dependent reference for the purpose of copy protection |
JP2000068953A (en) * | 1998-08-20 | 2000-03-03 | Hitachi Ltd | Encrypted broadcast viewing terminal and its system |
US6970849B1 (en) * | 1999-12-17 | 2005-11-29 | Microsoft Corporation | Inter-server communication using request with encrypted parameter |
CN1343938A (en) * | 2000-09-21 | 2002-04-10 | 优硕资讯科技股份有限公司 | Method and system for controlling lease of electronic file |
JP2003274339A (en) * | 2002-03-13 | 2003-09-26 | Sanyo Electric Co Ltd | Device, method, and medium for information storage |
US20040073789A1 (en) * | 2002-10-15 | 2004-04-15 | Powers John Stephenson | Method for collaborative software licensing of electronically distributed computer programs |
CN1642077B (en) * | 2004-01-13 | 2011-07-06 | 国际商业机器公司 | Credible digital time stamp generating and verifying method and system |
KR100597401B1 (en) * | 2004-02-06 | 2006-07-06 | 삼성전자주식회사 | Digital rights managementDRM base on method and apparatus for content right protection |
US20050289072A1 (en) * | 2004-06-29 | 2005-12-29 | Vinay Sabharwal | System for automatic, secure and large scale software license management over any computer network |
KR100666941B1 (en) * | 2005-01-07 | 2007-01-11 | 삼성전자주식회사 | Method for Managing duplicated downloading the Identical Contents |
CN100452074C (en) * | 2007-01-17 | 2009-01-14 | 北京大学 | Copyright protection method and system for digital contents controlled by time |
EP2260629A1 (en) * | 2008-02-22 | 2010-12-15 | Nokia Corporation | Systems and methods for determining behaviors for live and playback consumption |
CN101425093A (en) * | 2008-12-05 | 2009-05-06 | 腾讯科技(深圳)有限公司 | Contact dynamic content polymerization process and system based on social network relationship chain |
-
2007
- 2007-01-17 CN CNB2007100627906A patent/CN100452074C/en not_active Expired - Fee Related
- 2007-12-11 WO PCT/CN2007/003528 patent/WO2008089624A1/en active Application Filing
- 2007-12-11 US US12/522,989 patent/US8887299B2/en active Active
- 2007-12-11 EP EP07845885.8A patent/EP2116949B1/en active Active
- 2007-12-11 JP JP2009545796A patent/JP5043959B2/en not_active Expired - Fee Related
-
2014
- 2014-11-06 US US14/535,144 patent/US20150067887A1/en not_active Abandoned
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6233341B1 (en) * | 1998-05-19 | 2001-05-15 | Visto Corporation | System and method for installing and using a temporary certificate at a remote site |
US6920567B1 (en) * | 1999-04-07 | 2005-07-19 | Viatech Technologies Inc. | System and embedded license control mechanism for the creation and distribution of digital content files and enforcement of licensed use of the digital content files |
US6625656B2 (en) * | 1999-05-04 | 2003-09-23 | Enounce, Incorporated | Method and apparatus for continuous playback or distribution of information including audio-visual streamed multimedia |
US20040064576A1 (en) * | 1999-05-04 | 2004-04-01 | Enounce Incorporated | Method and apparatus for continuous playback of media |
US20040039911A1 (en) * | 2001-09-11 | 2004-02-26 | Makoto Oka | Content usage authority management system and management method |
US7533266B2 (en) * | 2002-02-01 | 2009-05-12 | Civolution B.V. | Watermark-based access control method and device |
US20060080260A1 (en) * | 2004-10-13 | 2006-04-13 | Tien-Fu Chen | System and method for digital content rights management on portable storage devices |
US8074083B1 (en) * | 2007-01-09 | 2011-12-06 | Google Inc. | Controlling download and playback of media content |
US20080270308A1 (en) * | 2007-04-27 | 2008-10-30 | General Instrument Corporation | Method and Apparatus for Providing a Secure Trick Play |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9116991B2 (en) * | 2011-08-16 | 2015-08-25 | Google Inc. | Searching encrypted electronic books |
WO2020081722A1 (en) * | 2018-10-16 | 2020-04-23 | Follett Corporation | Method and system for electronic content delivery to a user device through a wireless captive audience device |
WO2022193517A1 (en) * | 2021-03-16 | 2022-09-22 | 公安部第三研究所 | Platform for constructing sample for capability verification of mobile phone forensics, and method |
Also Published As
Publication number | Publication date |
---|---|
US8887299B2 (en) | 2014-11-11 |
JP2010517123A (en) | 2010-05-20 |
EP2116949B1 (en) | 2018-02-21 |
CN101000646A (en) | 2007-07-18 |
CN100452074C (en) | 2009-01-14 |
JP5043959B2 (en) | 2012-10-10 |
WO2008089624A1 (en) | 2008-07-31 |
EP2116949A4 (en) | 2013-06-12 |
US20100086130A1 (en) | 2010-04-08 |
EP2116949A1 (en) | 2009-11-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8887299B2 (en) | Digital content rights management method and system | |
US8850594B2 (en) | Digital rights management of captured content based on capture associated locations | |
US11379771B2 (en) | Management of workflows | |
US20090151006A1 (en) | Group registration device, group registration release device, group registration method, license acquisition device, license acquisition method, time setting device, and time setting method | |
US9633183B2 (en) | Modular software protection | |
EP2108146B1 (en) | Controlling distribution and use of digital identity representations | |
AU779310B2 (en) | Digital file management and imaging system and method including secure file marking | |
TWI441039B (en) | Method, system, and program product for digital rights management of streaming captured content | |
JP4878617B2 (en) | Method and apparatus for tracking resource status in a system for managing resource usage | |
RU2500075C2 (en) | Creating and validating cryptographically secured documents | |
CN109376504A (en) | A kind of picture method for secret protection based on block chain technology | |
EP1806678A2 (en) | Program, system and method for managing electronic documents | |
CA2495196A1 (en) | Apparatus, system and method for securing digital documents in a digital appliance | |
US8850563B2 (en) | Portable computer accounts | |
KR100440037B1 (en) | Document security system | |
US7747532B2 (en) | Content use management system, content playback apparatus, content use management method, content playback method, and computer program including system date/time information validation | |
JP4673150B2 (en) | Digital content distribution system and token device | |
JP2004213265A (en) | Electronic document management device, document producer device, document viewer device, and electronic document management method and system | |
KR101315482B1 (en) | Secret information reading service system using by a writer authentication and the control method thereof | |
JP2005346120A (en) | Network multi-access method and electronic device having biological information authentication function for network multi-access | |
JP2002287629A (en) | Electronic device, information update system in electronic device, information update method and program therefor | |
JP2005128960A (en) | Apparatus and method for reproducing content | |
JP2003264540A (en) | Method and system for distributing information | |
JP2005165738A (en) | Electronic content management system, electronic content management method, and its program | |
JP2001282746A (en) | User authentication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: PEKING UNIVERSITY FOUNDER GROUP CO., LTD., CHINA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:WANG, YI;TANG, ZHI;YUAN, DENGSHA;AND OTHERS;SIGNING DATES FROM 20091105 TO 20091106;REEL/FRAME:034129/0774 Owner name: PEKING UNIVERSITY, CHINA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:WANG, YI;TANG, ZHI;YUAN, DENGSHA;AND OTHERS;SIGNING DATES FROM 20091105 TO 20091106;REEL/FRAME:034129/0774 Owner name: BEIJING FOUNDER APABI TECHNOLOGY LTD., CHINA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:WANG, YI;TANG, ZHI;YUAN, DENGSHA;AND OTHERS;SIGNING DATES FROM 20091105 TO 20091106;REEL/FRAME:034129/0774 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |