Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Generating method for secret keys with user information

A user information and key technology, which is applied in key distribution, can solve the problems of copyright protection difficulties, digital product anti-counterfeiting and traceability, and difficulty, and achieve the effects of improving copyright protection efficiency, inhibiting use and dissemination, and preventing use and dissemination

Inactive Publication Date: 2014-08-27
HUAZHONG NORMAL UNIV +1
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing encryption technology, because the key does not carry user information or the process of carrying user information is too simple, it is not bound to the user, which makes it easy for illegal users to crack. After cracking, it can be disseminated and used at will. In addition, when Legal users actively or passively leak and disseminate digital products and keys at the same time, and illegal users can use digital products without restriction, which increases the difficulty of anti-counterfeiting and traceability of digital products, and brings difficulties and challenges to copyright protection
[0004] Due to the above-mentioned defects of existing digital copyright protection, it has caused difficulties and challenges in digital copyright protection, and added difficulty to anti-counterfeiting and traceability of digital products

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Generating method for secret keys with user information
  • Generating method for secret keys with user information
  • Generating method for secret keys with user information

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0097] Taking the copyright management of electronic audio and video products as an example, the user registers on the server of the media file provider of the audio and video products, and logs in with the registered account. key is sent to the server. The user browses the media files on the server, pays for the required media files, and the purchased media files can be downloaded and used by the user. The user clicks the media files to download, and the media server extracts the media file ID, user ID and other information to use the media files. The ID is the seed, a random key is generated, and the MD5 information digest is calculated on it to obtain a 128-bit ciphertext, then the user information is extracted, MD5 is also calculated, and a 128-bit ciphertext is also obtained, and the two are packaged. A 256-bit ciphertext is obtained, which is the encryption key of the generated user media file, and the RC4 algorithm is used to symmetrically encrypt the media file.

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a generating method for secret keys with user information. The generating method is characterized in that according to copyright protection of a digitalized product, each encryption key of digitalized product documents is jointly composed of a random information part and a user information port, and a server encrypts the digitalized product documents purchased by different users with the different secret keys so as to bind the user information with the digitalized product documents, so that only the legitimate users can own and use the secrete keys. The generating method comprises the following steps of (1) secret key requesting, (2) secret key generating, (3) secret key distributing, (4) secret key using, (5) counterfeiting prevention and source tracing.

Description

technical field [0001] The invention relates to a network-based software copyright protection technology, in particular to a method for generating a key carrying user information. Background technique [0002] With the rapid development of information technology and the rapid popularization of computer network technology, the difficulty of piracy of digital products (such as audio, video, documents, software, etc.) has been greatly reduced, thus promoting the spread and dissemination of pirated digital product files driven by interests , People can download and copy digital products at will, which brings great difficulties and challenges to the anti-counterfeiting and traceability of digital products. In the process of using digital products, how to protect the rights and interests of legal users, restrain and track illegal users is particularly important. [0003] The copyright protection technologies of existing digital products mainly include watermarking technology and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06G06F21/16
Inventor 刘振东刘延申尤新革徐端全刘怡王维虎
Owner HUAZHONG NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products