Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Implementation method of safety time of client

A realization method and security time technology, applied in the direction of electrical components, transmission system, program/content distribution protection, etc., can solve the problem of loss of control over the use of copyright objects, and achieve fine copyright control, good user experience, and guaranteed benefits.

Inactive Publication Date: 2013-08-14
SHANGHAI XINHUA JIEFANG DIGITAL READING MEDIA
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to provide a method for implementing client security time, which mainly solves the problem that the existing DRM system relies on the terminal time to control the availability of copyright, and for some terminals, the user can modify the terminal time, which is easy to cause damage to The technical problem that the use of copyright objects is out of control, ensuring the reasonable use of network multimedia copyright products

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method of safety time of client
  • Implementation method of safety time of client

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The invention discloses a method for realizing client security time, such as figure 1 Shown: this method is mainly realized at client end, and this client end comprises time acquisition unit, DRM unit and network update unit; Its specific steps (such as figure 2 )yes:

[0022] Step A: When the user turns on the client device, the time acquisition unit acquires the system startup time SystimeStart. After a period of time, when using the client to open the time copyright product, the time acquisition unit acquires the system running time length GetTickCount. At the same time, the time acquisition unit acquires the current system time timeSystimeUsr;

[0023] Step B: If SystimeUsr=SystimeStart+GetTickCount, it means that the system time is correct, and execute step D; if SystimeUsr≠SystimeStart+GetTickCount, it is considered that the user has modified the system time, and execute C;

[0024] Step C: The client network update unit judges whether the client is connected t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an implementation method of safety time of a client. The implementation method includes the steps as follows: step A, when a user opens client equipment, system start time Systime start, a system operating time length Get Tick Count and current system time Systime User are acquired; step B, if system time is correct, the step four is performed, and if the user modifies the system time, the step C is performed; step C, a client network updating unit judges whether the client is connected to the network or not; if the client is connected to network, DRM (Digital Rights Management) time of a time rights product is applied to a server for modification; if the client is not connected to the network, the DRM time of the time rights product is set to be the original DRM time plus Get Tick Count; and step D, whether the rights of the rights product are effective or not is judged, and the product can be normally opened and used if the rights of the rights product are effective. According to the implementation method, the problems that the use of the rights objects is prone to be out of control due to the fact that a conventional DRM system controls the usability of the rights by depending on the time of the terminal, and for certain terminals, the user can modify the time of the terminals are solved, and the reasonable use of a network multimedia rights product is guaranteed.

Description

technical field [0001] The invention relates to a digital multimedia content leasing scheme based on digital multimedia technology and DRM (Digital Rights Management, digital rights management), in particular to a method for realizing client security time. Background technique [0002] Digital multimedia technology: Digital multimedia is a comprehensive interdisciplinary subject that is dominated by information science and digital technology and applies information communication technology to various fields. Digital multimedia includes various forms such as images, texts, audio, and video, as well as digitalization in the form and content of communication, that is, the digitalization process of information collection, access, processing and distribution. Digital multimedia has become the latest information carrier after language, text and electronic technology. The main mode of dissemination of digital multimedia content is Internet dissemination. [0003] DRM technology: ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/10
Inventor 王翼甘泉福熊益群
Owner SHANGHAI XINHUA JIEFANG DIGITAL READING MEDIA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products