Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method for identification of equipment validity

A technology of legality authentication and equipment, applied in the field of information security, it can solve the problems of system paralysis, widespread data dissemination, and inability to modify rights, etc., to achieve the effect of authentication security and increase the difficulty

Inactive Publication Date: 2007-03-07
SICHUAN CHANGHONG ELECTRIC CO LTD
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] (4) After the device obtains the corresponding rights object, it must perform the corresponding tasks according to the rights. It cannot modify the rights, nor can it violate the provisions of the rights object file to decrypt the file and then spread it illegally.
If these behaviors cannot be effectively stopped, these illegal or invalid devices may spread the decrypted data widely, causing the entire system to be paralyzed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for identification of equipment validity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0033] As shown in Figure 1, in order to prevent the information about the device from being falsified, the device legality authentication method that uses the device public key / private key to encrypt the device identity ID information includes the following steps:

[0034] The device side of the terminal:

[0035] 1) The device generates a public / private key pair and sends the public key to the server;

[0036] 2) The device re-encodes its original ID information to generate encoded ID information;

[0037] 3) The device encrypts the encoded ID information with the device private key to generate encrypted ID information and save it in the device memory.

[0038] Server side:

[0039] 1) The authentication center of the server receives the authentication request of the device;

[0040] 2) The server obtains the encrypted identity ID information stored in the device memory;

[0041] 3) The server decrypts the encrypted identity ID information with the device public key to o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention relates to digital copyright management system device legal identification or validation method and provides one device legal identification method, which comprises the following steps: a, device recodes original identification information to generate ID information; b, coding the ID information and then storing device memory; c, servo reading coded ID information to decode ID; d, servo restores codes identification; e, identifying servo ID information.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for device legality authentication or validity authentication of a digital copyright management system. Background technique [0002] With the development of digital media technology and computer network communication technology, the application of digital media is becoming more and more extensive. Digital media can be copied easily without any loss of quality and disseminated quickly and cheaply through the Internet. Securing digital rights for content providers is facing a serious test. How to implement effective copyright protection and information security in the network environment has become an urgent and realistic problem. In this case, a new technology, digital rights management (DRM), has emerged, which technically realizes the effective protection of copyright. [0003] The method of DRM implementation is as follows: [0004] (1) The server encrypts and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 刘贤洪张新法胡敏
Owner SICHUAN CHANGHONG ELECTRIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products