Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authorization method, system and apparatus

An authorization certificate and client-side technology, which is applied to user identity/authority verification and key distribution, can solve the problems that the client cannot use digital content, the client cannot obtain the key, and the user cannot use digital content, etc.

Inactive Publication Date: 2014-11-19
PEKING UNIV +2
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 1. The characteristic information of the client is unique, which may lead to the invalidation of the only digital content authorization method limited by the DRM system, resulting in the problem that the client cannot use the digital content
For example, a certain DRM system binds digital content with the hard disk serial number and network card number of the PC. However, not all hard disks of PC devices can successfully read their own serial numbers. If the PC device does not have a network card or network card number, it cannot be obtained. Then the DRM system will not be applied to the PC device, resulting in the user being unable to use the required digital content
[0007] 2. With the development of digital content applications, users often need a DRM system that can support digital content authorization solutions for multiple clients. However, in the prior art, a DRM system can only implement digital content authorization for one type of client.
For example, for the DRM system of an e-book, after the user purchases the e-book, the user may wish to be able to read the e-book on both the PC device and the mobile phone, but the DRM system of the e-book can only Support digital content authorization for one client device, but cannot support digital content authorization for PC devices and mobile devices at the same time
[0008] To sum up, the existing implementation is not flexible enough for the client to obtain the key for accessing related content, resulting in some clients being unable to obtain the key for accessing related content, and unable to meet the needs of users who wish to share information between multiple clients. The requirement that both endpoints be able to obtain the same key for accessing the same content

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization method, system and apparatus
  • Authorization method, system and apparatus
  • Authorization method, system and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] An e-reader manufacturer needs to pre-install DRM-protected digital content in a batch of readers without expansion memory cards. First, multiple authorization schemes are preset in the universal reader client and the authorization server. The authorization scheme with higher priority is: bind the device number of the e-reader and the card number of the expandable memory card with the digital content at the same time, and the authorization scheme with lower priority is: bind the digital content with the device number only. The authorization server encrypts the protection key of the digital content according to the characteristic information of the batch of clients; and then describes the type of the characteristic information of the batch of clients and the encrypted content key in the authorization certificate. The authorization certificate can be used by the batch of e-readers.

Embodiment 2

[0066]Device feature information types with different priorities and corresponding device feature information are pre-set on an authorization server and multiple PC devices, so that a certain e-book DRM protection system can support these special PC devices. Because on a PC, the hardware usually used for binding, such as graphics card, network card and other devices, may not exist, and the serial number of the hard disk may not be detected, so it is necessary to preset multiple sets on the client software with priority for these characteristics. The feature information extraction scheme. For example, first extract the hard disk, network card, and graphics card, and then extract the motherboard, CPU, and memory, and then use the above-mentioned 6 kinds of device numbers that can be extracted, and use such as "hardware adaptability method" for binding. For example, when a user's PC does not have a network card, the user purchases an e-book through the PC. After obtaining the RO...

Embodiment 3

[0071] When an e-book DRM protection system supports mobile phones in addition to PC devices, after the client obtains the RO certificate issued by the server, it knows that its own device is a mobile phone by detecting the device type, and knows the corresponding IP address of the mobile phone according to the predetermined plan. The type of client feature information, and detect and obtain the corresponding client feature information (such as SIM card number, mobile phone device number, etc.), and send it to the RO authorization server together with the RO certificate. After the RO authorization server judges the validity of the RO credential, it will encrypt the protection key of the digital content according to the client’s characteristic information, add it together with the client’s characteristic information type to the generated authorization certificate, and The certificate is returned to the phone. After the mobile phone obtains the authorization certificate, save it...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authorization method, a system and a device thereof which are used for realizing dynamic authorization to a client side for obtaining a key, causing more client sides to obtain the key for accessing the relevant contents, and satisfying the demand that the clients can obtain the same key at a plurality of the client sides. The authorization method provided by the invention comprises a server which receives a key request from the client side, and obtains the type of the client side characteristic information from the request; the server encrypts the key which is requested by the client side; the server generates a certificate of authorization using the type of the client side characteristic information and the encrypted key, and sends the certificate of authorization to the client side. The invention further provides a method and a device thereof which are used for obtaining the key.

Description

technical field [0001] The invention relates to the technical field of digital copyright protection, in particular to an authorization method, system and device. Background technique [0002] With the development and popularization of network technology, the number of digital content such as audio, video, pictures, and documents is increasing, and the use is becoming more and more extensive. The dissemination and sharing of digital content has become more convenient and faster. However, due to the characteristics of easy copying and dissemination of digital content, it leads to illegal circulation of digital content, which makes digital content produced with a lot of cost and manpower easy to be illegally copied and disseminated without permission, thus damaging digital content. The interests of right holders affect the enthusiasm of digital content creators, thereby hindering the development of the digital content industry. [0003] A technology that appears to effectively...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32
Inventor 汤帜高飞洪献文
Owner PEKING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products