CN1141678C - Method and system for preventing electronic file piracy - Google Patents
Method and system for preventing electronic file piracy Download PDFInfo
- Publication number
- CN1141678C CN1141678C CNB00126088XA CN00126088A CN1141678C CN 1141678 C CN1141678 C CN 1141678C CN B00126088X A CNB00126088X A CN B00126088XA CN 00126088 A CN00126088 A CN 00126088A CN 1141678 C CN1141678 C CN 1141678C
- Authority
- CN
- China
- Prior art keywords
- terminal
- identification code
- encryption key
- server host
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
Description
技术领域technical field
本发明涉及一种使用于电脑系统中可防止电子文件盗版的方法,具体地讲,一种可防止利用网际网下载电子文件至一电子阅读装置,却又非法拷贝到其他电子阅读装置的方法。The invention relates to a method used in a computer system to prevent piracy of electronic files, specifically, a method for preventing electronic files from being downloaded to an electronic reading device from the Internet and illegally copied to other electronic reading devices.
背景技术Background technique
传统上,知识是靠印刷于纸张上的书籍或杂志来加以传播,广播及电视兴起后加快了知识传播的速度,如今电脑通讯及网际网的蓬勃发展,更以惊人的速度将知识与信息传播到世界上的各个角落。由于网际网技术的发展,创造出许多新的商业模式,这些新的商业模式有一个共同的特点,就是利用网际网来做生意,也就是近来通称的电子商务。举例而言,传统上如果要购买书籍必须亲自或请人到书店寻找后购买,由于网际网的兴起,如AMAZON等网络书店可以让使用者在线上搜寻到想要的书籍并可直接下单购买。虽然这使得购买书籍的方式大为简化,然而这还是有一个不方便之处,就是有关书籍的保存,一但书藉购买得愈多愈需要足够的空间来摆放,同时管理上也更加繁杂。Traditionally, knowledge is disseminated by books or magazines printed on paper. The rise of radio and television has accelerated the speed of knowledge dissemination. Today, with the vigorous development of computer communications and the Internet, knowledge and information are disseminated at an astonishing speed. to every corner of the world. Due to the development of Internet technology, many new business models have been created. These new business models have a common feature, which is to use the Internet to do business, which is commonly known as e-commerce recently. For example, traditionally, if you want to buy a book, you have to go to a bookstore to find it in person or ask someone to buy it. Due to the rise of the Internet, online bookstores such as Amazon allow users to search for the books they want online and place an order directly. . Although this greatly simplifies the way of purchasing books, there is still an inconvenience, that is, the preservation of books. Once you buy more books, you need enough space to place them, and the management becomes more complicated. .
有鉴于此,“电子阅读装置”的概念就被提出以满足这种需要,也就是说将原来书籍中的文字或图片数字化,形成电子书籍,消费者只要有一台终端可以连接上网,再加上某些特定的程序软件,就可以很方便地在线购买想要的电子书籍或文件,并将此电子书籍下传到消费者所在的终端即可进行阅读,可以符合这种需求的终端也就是所谓的“电子阅读装置”。曾经有许多出版集团有鉴于这一广大的消费市场而欲投入到电子书店及电子书籍的经营,然而,却因为某些配套的机制尚未建立而临时中途喊停。原因之一是消费者阅读习惯所隐含市场不成熟的忧虑。也就是说,大部分消费者还是习惯从纸本的形式来阅读书籍,想要推动以“电子阅读装置”来阅读电子书籍必须要推翻消费者根深蒂固的阅读习惯,同时也必须经过冗长的教育与适应的过程。然而另一个更重要的因素是低廉的复制成本与简便的传播散发方式,这使得电子书籍的市场面临无法推广的严重威胁。In view of this, the concept of "electronic reading device" was proposed to meet this need, that is to say, to digitize the text or pictures in the original book to form an electronic book. As long as consumers have a terminal that can connect to the Internet, plus Some specific program software can conveniently purchase the desired e-books or files online, and download the e-books to the terminal where the consumer is for reading. The terminal that can meet this demand is the so-called "Electronic Reading Devices". In the past, many publishing groups wanted to invest in the operation of e-bookstores and e-books in view of this vast consumer market. However, they stopped temporarily because some supporting mechanisms have not been established. One reason is the immaturity of the market implied by consumers' reading habits. That is to say, most consumers are still accustomed to reading books in the form of paper. To promote the reading of e-books with "electronic reading devices", consumers' deep-rooted reading habits must be overthrown. process of adaptation. However, another more important factor is the low cost of copying and the easy way of spreading and distributing, which makes the market of e-books face a serious threat that they cannot be promoted.
这个严重威胁来自于从事电子书籍销售的经销商遇到的一个很头痛而难以解决的问题:电子书籍可以很容易多次拷贝分送给非交易双方以外的第三人。电子书籍之所以便利是由于其属于无形的电子文件,相较于有实际形体的传统书籍而言自然发送方便且可以节省大量摆放空间,然而,也就因为其属于无形的电子文件发送方便,使得消费者于合法购买阅读后,却可以非法的任意加以拷贝发送并散发给其他人。也就是说,如果无法设计出一套完善的电子书藉交易机制,以有效防止“合法购买却非法散发”的情况发生,从事电子书籍的经销商每卖出一本电子书籍给某一消费者,就等于将此电子书籍赠送给了所有其他的消费者,在这种情形下,经销商无法维持合理的利润,这种形式的电子商务自然无法生存,这也就是电子书籍至今推广及普及的速度不如预期的重要原因。然而,电子书籍具有无纸化——符合环保概念、效率化——传播速度快速、经济化——不占大量空间等优点,可节省许多珍贵的资源,如果只是因为未能解决上述“合法购买却非法散发”的事情而无法加以推广,实在是经济利益的重大损失。This serious threat comes from a very troublesome and difficult problem encountered by distributors engaged in the sale of e-books: e-books can be easily distributed to third parties other than the parties to the transaction in multiple copies. The reason why e-books are convenient is that they are invisible electronic files. Compared with traditional books with physical form, they are naturally convenient to send and can save a lot of storage space. However, because they are invisible electronic files, they are convenient to send. After consumers legally purchase and read, they can illegally copy and distribute them to others. That is to say, if a complete e-book lending and trading mechanism cannot be designed to effectively prevent the occurrence of "legal purchase but illegal distribution", every time a dealer engaged in e-books sells an e-book to a certain consumer , it is equivalent to giving this e-book to all other consumers. In this case, the dealer cannot maintain a reasonable profit. Naturally, this form of e-commerce cannot survive. This is the reason why e-books have been promoted and popularized so far. A big reason why the speed is not as expected. However, e-books have the advantages of being paperless-conform to the concept of environmental protection, efficiency-fast transmission speed, economy-do not take up a lot of space, etc., and can save many precious resources. However, illegally distributing" things cannot be promoted, which is really a major loss of economic interests.
发明内容Contents of the invention
有鉴于上述问题,本发明的主要目的是提供一种使用于电脑系统中可防止电子文件盗版的方法,具体地讲一种可防止利用网际网下载电子文件至一电子阅读装置,却又非法拷贝至其他电子阅读装置的方法,以解决上述问题。In view of the above problems, the main purpose of the present invention is to provide a method for preventing piracy of electronic files used in computer systems, specifically a method for preventing electronic files from being downloaded to an electronic reading device from the Internet, but illegally copied To other electronic reading devices, to solve the above problems.
按照本发明的一个方面,提供了一种使用于一电脑系统中可防止电子文件盗版的方法,该电脑系统包含一服务器主机,该服务器主机可经由网际网与多个终端相连接,该服务器主机中包含一用户数据库,以记录经由该注册程序所注册的所有合法的使用者及其终端的识别码,该终端还包含一中央处理器、一硬盘以及一网卡,每一终端具有至少一代表该终端的识别码,而该终端的识别码可为该中央处理器的识别码、该硬盘的识别码或是该网卡的识别码,该服务器主机中还包含一公用程序模块,以存放该阅读应用程序并供使用者下载至该终端中储存使用,该终端可经由该网际网向该服务器主机提出索取一电子文件的要求,该服务器主机则可将该电子文件的明文经过加密形成相对应的密文,并经由该网际网发送至该终端,以将该密文解密为原来的明文,该方法包含一注册程序与一文件索取程序,该注册程序包含下列步骤:使用者载入一阅读应用程序于终端中,该阅读应用程序包含一第一加密密钥;使用者利用该阅读应用程序向该服务器主机注册成为合法的终端;该服务器主机在完成该终端的合法注册后,会产生一使用者识别码与一使用者专用的第二加密密钥,该使用者识别码与该第二加密密钥经过加密后发送至该合法注册的终端;以及该终端的阅读应用程序进一步将接收到的使用者识别码与第二加密密钥连同代表该终端的识别码一并加密以形成一终端加密文档,储存于该合法注册的终端中;该文件索取程序包含下列步骤:当一终端向该服务器主机提出索取一电子文件的要求时,该服务器主机将该电子文件的明文经过该第二加密密钥的加密而形成相对应的密文,并将该密文经由该网际网发送至该终端;当该终端的阅读应用程序接收到该密文时,先以该第一加密密钥对该终端加密文档解密,并取得其中的第二加密密钥与该终端的识别码;以及当该阅读应用程序把所取得的终端识别码与目前终端的识别码作比较,若结果相同时,即以该第二加密密钥对该接收到的密文解密,否则停止后续的解密动作,以防止非合法的终端对该电子文件的盗版。According to one aspect of the present invention, a method for preventing piracy of electronic files used in a computer system is provided, the computer system includes a server host, the server host can be connected to a plurality of terminals via the Internet, the server host Contains a user database to record the identification codes of all legal users and their terminals registered through the registration program. The terminal also includes a central processing unit, a hard disk and a network card. Each terminal has at least one representative of the The identification code of the terminal, and the identification code of the terminal can be the identification code of the central processing unit, the identification code of the hard disk or the identification code of the network card, and the server host also includes a public program module to store the reading application The program can be downloaded by the user to the terminal for storage and use. The terminal can request an electronic file from the server host through the Internet, and the server host can encrypt the plaintext of the electronic file to form a corresponding encrypted file. text, and send it to the terminal via the Internet, so as to decrypt the ciphertext into the original plaintext, the method includes a registration procedure and a file request procedure, and the registration procedure includes the following steps: the user loads a reading application program In the terminal, the reading application program includes a first encryption key; the user uses the reading application program to register with the server host to become a legal terminal; after the server host completes the legal registration of the terminal, it will generate a user The identification code and a user-specific second encryption key, the user identification code and the second encryption key are encrypted and then sent to the legally registered terminal; and the reading application program of the terminal further uses the received The operator identification code and the second encryption key are encrypted together with the identification code representing the terminal to form a terminal encryption file, which is stored in the legally registered terminal; the file requesting procedure includes the following steps: when a terminal sends to the server host When requesting an electronic file, the server host encrypts the plaintext of the electronic file with the second encryption key to form a corresponding ciphertext, and sends the ciphertext to the terminal via the Internet; When the reading application program of the terminal receives the ciphertext, it first decrypts the encrypted file of the terminal with the first encryption key, and obtains the second encryption key and the identification code of the terminal; and when the reading application program Compare the obtained terminal identification code with the current terminal identification code, and if the results are the same, use the second encryption key to decrypt the received ciphertext, otherwise stop the subsequent decryption action to prevent illegal Piracy of the electronic file by the terminal.
按照本发明的另一个方面,提供了一种可防止电子文件盗版的电脑系统,该电脑系统包含一服务器主机可经由一网际网与多个终端相连接,该终端包含一中央处理器、一硬盘以及一网卡,每一终端具有至少一代表该终端的识别码,而该终端的识别码可为该中央处理器的识别码、该硬盘的识别码或是该网卡的识别码,该终端可经由该网际网向该服务器主机提出索取一电子文件的要求,该服务器主机则可将该电子文件的明文经过加密形成相对应的密文,并经由该网际网发送至该终端,以将该密文解密为原来的明文,该服务器主机包含:一公用程序模块,以存放包含一第一加密密钥的阅读应用程序,该阅读应用程序可供使用者下载至该终端中储存使用;一注册模块,当使用者利用该终端的阅读应用程序向该服务器主机注册时,该注册模块会产生一使用者识别码并将该终端注册为一合法的终端;一用户数据库,以记录所有合法注册的使用者及其终端的识别码;一加密密钥产生模块,用来产生一使用者专用的第二加密密钥;以及一加密模块,用来将该使用者识别码与该第二加密密钥加密,并发送至该合法注册的终端中;其中该终端的阅读应用程序进一步将接收到的使用者识别码与第二加密密钥连同代表该终端的电脑识别码一并加密以形成一终端加密文档,储存于该合法注册的终端中,而当一终端向该服务器主机提出索取一电子文件的要求时,该加密模块以该第二加密密钥将该电子文件的明文加密而形成相对应的密文,并将该密文经由该网际网发送至该终端,当该终端的阅读应用程序接收到该密文时,会先以该第一加密密钥对该终端加密文档解密,并取得其中的第二加密密钥与该识别码,而当该阅读应用程序比较所取得的识别码与目前终端的识别码为相同时,以该第二加密密钥对该接收到的密文解密,否则停止后续的解密动作,以防止非合法的终端对该电子文件的盗版。According to another aspect of the present invention, a computer system capable of preventing electronic file piracy is provided, the computer system includes a server host that can be connected to a plurality of terminals via an Internet, and the terminal includes a central processing unit, a hard disk And a network card, each terminal has at least one identification code representing the terminal, and the identification code of the terminal can be the identification code of the central processing unit, the identification code of the hard disk or the identification code of the network card, and the terminal can be accessed via The Internet requests the server host to obtain an electronic file, and the server host can encrypt the plaintext of the electronic file to form a corresponding ciphertext, and send it to the terminal via the Internet to obtain the ciphertext To decrypt the original plaintext, the server host includes: a public program module to store a reading application program including a first encryption key, the reading application program can be downloaded by the user to the terminal for storage and use; a registration module, When the user utilizes the reading application program of the terminal to register with the server host, the registration module will generate a user identification code and register the terminal as a legal terminal; a user database to record all legally registered users and the identification code of the terminal; an encryption key generation module, used to generate a user-specific second encryption key; and an encryption module, used to encrypt the user identification code and the second encryption key, and sent to the legally registered terminal; wherein the reading application program of the terminal further encrypts the received user identification code and the second encryption key together with the computer identification code representing the terminal to form a terminal encrypted file, stored in the legally registered terminal, and when a terminal requests the server host for an electronic file, the encryption module encrypts the plaintext of the electronic file with the second encryption key to form a corresponding ciphertext , and send the ciphertext to the terminal via the Internet, when the reading application program of the terminal receives the ciphertext, it will first decrypt the encrypted document of the terminal with the first encryption key, and obtain the first Two encryption keys and the identification code, and when the identification code obtained by the reading application program is the same as the identification code of the current terminal, the received ciphertext is decrypted with the second encryption key, otherwise stop the subsequent The decryption action to prevent unauthorized terminals from piracy of the electronic file.
综上所述,本发明电脑系统提出了一种有效的机制,来防止非经合法注册的终端对电子文件的盗版,因而防止“合法购买却非法散发”的情形,使得电子书籍的经销商因可维持合理的利润而愿意投入于书籍电子化买卖的行列当中,因此使得电子书籍的环保性、效率性、传播性、经济性等多重优点可为全民所共享。To sum up, the computer system of the present invention proposes an effective mechanism to prevent piracy of electronic documents by non-legally registered terminals, thereby preventing the situation of "legal purchase but illegal distribution", which makes electronic book dealers Reasonable profits can be maintained and people are willing to invest in the e-commerce of books. Therefore, the multiple advantages of e-books such as environmental protection, efficiency, dissemination, and economy can be shared by the whole people.
附图说明Description of drawings
图1为本发明可防止电子文件盗版的电脑系统的示意图。FIG. 1 is a schematic diagram of a computer system capable of preventing electronic file piracy according to the present invention.
图2为本发明防盗版电脑系统的服务器主机的功能方块图。Fig. 2 is a functional block diagram of the server host of the anti-piracy computer system of the present invention.
图3为本发明防盗版电脑系统的终端的功能方块图。Fig. 3 is a functional block diagram of a terminal of the anti-piracy computer system of the present invention.
图4为本发明防盗版电脑系统于注册程序时的流程图。FIG. 4 is a flow chart of the anti-piracy computer system of the present invention when registering a program.
图5A为本发明防盗版电脑系统在文件索取程序时于服务器主机端的流程图。FIG. 5A is a flow chart of the anti-piracy computer system of the present invention at the server host side during the file request procedure.
图5B为本发明防盗版电脑系统在文件索取程序时于用户终端的流程图。FIG. 5B is a flow chart of the anti-piracy computer system of the present invention at the user terminal during the file requesting process.
具体实施方式Detailed ways
请参阅图1,图1为本发明可防止电子文件盗版的电脑系统的示意图。本发明防盗版电脑系统100包含一服务器主机102可经由一防火墙装置103连接上网际网104,另有多个使用者也可经由各自的终端106、108、110连接上网际网104。防火墙装置103可用来隔离服务器主机102与其外部的网际网104,其可通过网络讯息包的过滤以及安全策略的订定,让某些特定的网络服务及安全的网络讯息,例如:经过注册的远程登录、电子邮件、文件传输等可以进出防火墙装置103,以确保服务器主机102中的设定及信息不会遭受非法入侵及修改。每一终端106、108、110可为一个人台式电脑、笔记本电脑、个人数字助理(PDA)或是可连接上网的移动电话(WAP cellularphone)等,只要用户的终端是可以连接上网并且传输数字信息的都可以适用于本发明防盗版电脑系统100。Please refer to FIG. 1 . FIG. 1 is a schematic diagram of a computer system capable of preventing electronic file piracy according to the present invention. The
以本发明的优选实施例而言,终端106、108、110为个人台式电脑,其中包含一中央处理器,一硬盘,一网卡,输入装置如键盘、鼠标、操纵杆等,输出装置如屏幕、打印机等。每一终端106、108、110中各自具有至少一电脑识别码,用来代表终端的身份认证,如中央处理器的识别码、硬盘的识别码或是网卡的识别码等皆可成为该终端的电脑识别码,以便服务器主机102在后续电子交易或资料传输时可以确定各终端106、108、110的身份或位置。In the preferred embodiment of the present invention, the
请参阅图2,图2为本发明防盗版电脑系统的服务器主机的功能方框图。服务器主机102包含一界面模块210,一公用程序模块220,一注册模块230,一加密密钥产生模块240,一加密模块250,一交易处理及认证模块260,一数据库270,以及一控制中心280。Please refer to FIG. 2, which is a functional block diagram of the server host of the anti-piracy computer system of the present invention. The
服务器主机102经由界面模块210与防火墙装置103相连接,并通过防火墙装置103与网际网104进行资料传输与交换,并于必要时对不同规格的资料作适当的资料转换。公用程序模块220中存放有服务器主机102对外公开的各种公用程序,以供使用者免费下载到各自的终端中,其中例如一经过编译的阅读应用程序,以提供使用者一登录、注册、下载、阅读电子书籍的使用者操作界面,阅读应用程序中附加有一第一加密密钥,其功用以后再加详述。注册模块230可接受使用者及其所指定的终端的注册,以便让使用者成为合法登录的使用者,而其所指定的终端也成为合法登录而可合法下载电子书籍的用户终端。加密密钥产生模块240会于使用者进行注册时产生使用者专用的第二加密密钥,也就是说不同的使用者其第二加密密钥都不相同。在此需加以说明,上述的第一及第二加密密钥其实就是一组预定长度位的的序列,例如可以是常用的56bits或128bits,本发明的较佳实施例的钥匙长度是采用128tits或是更高的bits,以增强其安全性。The
加密模块250则是用来执行各种需要加密的动作,例如:在文件索取程序时,加密模块250会以使用者专用的第二加密密钥对使用者购买的电子书籍加密以便后续发送给使用者。交易处理及认证模块260则用来处理与使用者订单有关的事宜,并对订单的来源及内容进行必要的确认及认证工作。The
数据库270则包含至少有三个子数据库:用户数据库272、密码数据库274、电子文件数据库276。用户数据库272中存放有经过合法注册后所有使用者相关的基本资料及其所指定的终端的基本资料,如:代表某一用户的使用者识别码。密码数据库274则存放使用者识别码及其专用的第二加密密钥之间的对照表,也就是说,每一个使用者在进行注册时,加密密钥产生模块240所产生相对应的专用第二加密密钥就是存放在密码数据库274中。电子文件资料库276则是存放将来要提供给读者的电子书籍的明文,每一本电子书籍有一独特的电子书码以方便查询与建档之用。而控制中心280则是用来控制服务器主机102的操作,以及处理服务器主机102中各个模块或数据库的控制或信息流向。The
请参阅图3,图3为本发明防盗版电脑系统的终端的功能方框图。以终端106为例,本发明终端106的优选实施例为个人电脑,其中包含一中央处理器302,一存储器320,一硬盘304,一网卡306,输入装置如键盘308、鼠标310、操纵杆312等,输出装置如屏幕314、打印机316等。为了能与服务器主机102进行资料交换,终端106必须从服务器主机102的公用程序模块220或网际网104上下载经过编译的阅读应用程序322至终端106的存储器320或硬盘304中储存。阅读应用程序322提供了使用者登录、注册、下载、阅读电子书籍的操作界面,其中附加有可供后续对终端加密文档326进行解密的第一加密密钥324。即使是对于不同使用者而言,其所需要的阅读应用程序322都是相同,因此阅读应用程序322是事先经过编译完成,并可供所有需要的使用者免费任意下载,而其中的第一加密密钥324也不因使用者的不同而有所区别。Please refer to FIG. 3 . FIG. 3 is a functional block diagram of a terminal of the anti-piracy computer system of the present invention. Taking the terminal 106 as an example, the preferred embodiment of the
使用者以终端206的阅读应用程序为界面向远程的服务器主机102进行登录与注册时,其程序包括1)服务器主机102辨识阅读应用程序是否为合法的阅读应用程序。2)服务器主机102运用注册模块230产生使用者识别码与加密密钥产生模块240产生其相对应的第二加密密钥。3)服务器主机102将使用者识别码加入用户数据库272并将第二加密密钥加入密码数据库274。4)终端106的阅读应用程序下载使用者识别码及第二加密密钥。每一终端106、108、110于注册完成后,会产生终端加密文档326,终端加密文档326中包含使用者识别码327、使用者的专用第二加密密钥328与本台终端106的电脑识别码330,终端106将终端加密文档326以第一加密密钥324进行加密,并以加密的形式储存于终端106的存储器320或硬盘304中,以避免使用者不小心更改其中的内容,也可以降低其他人以非法的方式查看并得知其中的内容。当电子书籍下载后并需要进行解密之时,阅读应用程序322会对终端加密文档326以第一加密密钥324进行解密,以撷取出其中的第二加密密钥328与电脑识别码330。When the user logs in and registers with the
现在针对本发明的方法作一详细说明,配合本发明防盗版电脑系统100的方法包含一注册程序与一文件索取程序。当一使用者想要利用本发明的电脑系统100进行电子书籍的购买之前,首先要从服务器主机102或网际网104上的网络书店下载阅读应用程序322,并于阅读应用程序322中向服务器主机102执行一注册程序以成为一合法登录的使用者或会员,阅读应用程序322中除了包含一般性的界面应用程序之外,还包含上述的第一加密密钥324。在注册的同时,不但使用者需要经过注册,使用者将来所欲下载电子书籍的终端106也需要经过注珊,也就是说在注册的过程中,相关的使用者的基本资料(包括使用者识别码和其相对应的第二加密密钥328)会经过注册而存储在服务器主机102中。而使用者也必须以注册当时所使用的终端106作为将来下载电子书籍的电子阅读装置,否则,电脑系统100会判定所使用来下载电子书籍的电子阅读装置未经过注册,而无法正常开启所下载的电子书籍。Now, the method of the present invention will be described in detail. The method that cooperates with the
当使用者利用终端106中的阅读应用程序322进行注册时,服务器主机102会将使用者识别码储存于用户数据库272中,然后指定一专用的第二加密密钥328给使用者,并且将使用者与其第二加密密钥328之间的一一对应关系储存于密码数据库274中,如此便完成了使用者及其终端106的合法注册。在完成注册后,服务器主机102会以第一加密密钥将使用者识别码327与相对应该使用者的专用第二加密密钥328加密,并发送至终端106,而终端的阅读应用程序在接收到加密后的使用者识别码327与第二加密密钥328后,会先以第一加密密钥将两者进行解密,而后进一步将解密后的使用者识别码与第二加密密钥连同代表该终端的电脑识别码再一并加密以形成一终端加密文档326,并储存于该合法注册的终端中,经过此一注册程序,以后终端106就可合法下载电子书籍并对其正确解密了。When the user utilizes the reading application program 322 in the terminal 106 to register, the
请参阅图4,图4为本发明防盗版电脑系统于注册程序时的流程图。将上述注册程序以流程图400表示如下列步骤:Please refer to FIG. 4 . FIG. 4 is a flow chart of the registration program of the anti-piracy computer system of the present invention. The above-mentioned registration procedure is represented by the
步骤402:开始;Step 402: start;
步骤404:使用者选定一终端106以进行后续注册程序;Step 404: The user selects a terminal 106 for subsequent registration procedures;
步骤406:从网际网104上下载阅读应用程序322到选定的终端106;Step 406: Download the reading application program 322 from the
步骤408:由终端106的阅读应用程序322连接服务器主机102进行注册;Step 408: The reading application program 322 of the terminal 106 connects to the
步骤410:服务器主机102产生使用者识别码及专用的第二加密密钥328并分别储存于用户数据库272与密码数据库274中;Step 410: the
步骤412:服务器主机102将产生的使用者识别码327及其专用的第二加密密钥328以第一加密密钥324加密后传送至终端106;Step 412: The
步骤414:终端106的阅读应用程序以第一加密密钥将接收到加密的使用者识别码327与第二加密密钥328进行解密;Step 414: The reading application program of the terminal 106 decrypts the received encrypted user identification code 327 and the second encryption key 328 with the first encryption key;
步骤416:终端106的阅读应用程序将解密后的使用者识别码327与第二加密密钥328连同代表终端106的电脑识别码330再一并加密以形成一终端加密文档326;Step 416: The reading application program of the terminal 106 encrypts the decrypted user identification code 327 and the second encryption key 328 together with the computer identification code 330 representing the terminal 106 to form a terminal encrypted file 326;
步骤418:终端106的阅读应用程序将终端加密文档326储存于其硬盘中;Step 418: the reading application program of the terminal 106 stores the terminal encrypted file 326 in its hard disk;
步骤420:结束。Step 420: end.
当使用者及其终端106于服务器主机102端完成注册后,就可以依其个人意愿于任何时候上网付费购买特定的电子书籍,并且将其下载至终端106,这一部分也就是本发明方法所称的文件索取程序。使用者可从经过注册的终端于网际网104中浏览网络书店或相关网站,进行搜寻并且决定购买某一本电子书籍,而将购买订单发送至服务器主机102,服务器主机102在进行必要的确认及认证后,会于电子文件数据库276中调出使用者想购买的电子书籍的明文,并且于密码数据库274中调出使用者专用的第二加密密钥328,之后以此第二加密密钥328对电子书籍的明文加密而形成相对应的密文,再将密文经由网际网104发送至终端106。After the user and his terminal 106 complete the registration at the
当终端106的阅读应用程序322接收到所购买电子书籍的密文时,会先以阅读应用程序322中附属的第一加密密钥324对终端加密文档326解密,以取得其中之第二加密密钥328与电脑识别码330,然后阅读应用程序322会对解密所取得的电脑识别码330与目前终端106的电脑识别码318进行对比。当对比结果相同时,代表目前终端106为经过合法注册的终端,阅读应用程序322会继续以解密所取得的第二加密密钥328对接收到的密文解密,使用者就可以在阅读应用程序322所提供的界面下阅读解密过后的电子书籍。When the reading application program 322 of the terminal 106 receives the ciphertext of the purchased e-book, it will first decrypt the terminal encrypted file 326 with the first encryption key 324 attached to the reading application program 322 to obtain the second encryption key. The key 328 and the computer identification code 330 , and then the reading application program 322 will compare the decrypted computer identification code 330 with the current computer identification code 318 of the terminal 106 . When the comparison results are the same, it means that the
当阅读应用程序322对解密所取得的电脑识别码330与目前终端106的电脑识别码318进行对比后发现对比结果不相同时,代表目前终端106并未经过合法注册,阅读应用程序322即停止后续动作,也不会如正常情形般以第二加密密钥328对收到的密文解密,因此使用者也就无法阅读电子书籍。这种情形会发生的最大原因,是一个合法使用者于合法注册的终端下载电子书籍后,却将阅读应用程序322连同其购买的电子书籍以及于注册时所产生的终端加密文档326一并拷贝至另一台电脑上,以便给其他电脑上的第三人阅读,也就是所谓的“合法购买却非法散发”。When the reading application 322 compares the computer identification code 330 obtained by decryption with the computer identification code 318 of the
然而,由于本发明的阅读应用程序322对电子书籍解密前,会先对终端加密文档326中所取得的电脑识别码330与目前解密工作所在电脑的电脑识别码318进行对比,而取得一个对比的结果。如果目前解密工作所在电脑与注册当时的终端是同一电脑,此一对比结果自然会相同,即表示代表目前解密工作所在电脑为经过合法注册的终端,电子书籍并未被非法散发至其他未经合法注册的电脑中,于是阅读应用程序322会继续以解密让使用者可以阅读解密过后的电子书籍。如果目前解密工作所在电脑与注册当时的终端不相同时,此一对比结果自然不相同,即表示代表目前解密工作所在电脑并未经过合法注册,也就是说,电子书籍已经被非法散发至其他未经合法注册的电脑中,于是阅读应用程序322会停止解密的步骤,使用者即使使得非法散发的电子书籍也无法进行解密阅读。However, before the reading application program 322 of the present invention decrypts the electronic book, it first compares the computer identification code 330 obtained in the terminal encrypted file 326 with the computer identification code 318 of the computer where the decryption work is currently performed, and obtains a comparison result. If the computer where the current decryption work is performed is the same computer as the terminal at the time of registration, the comparison result will naturally be the same, which means that the computer where the current decryption work is performed is a legally registered terminal, and the e-books have not been illegally distributed to other unauthorized In the registered computer, the reading application program 322 will continue to decrypt the decrypted electronic book so that the user can read it. If the computer where the current decryption work is performed is not the same as the terminal at the time of registration, the result of this comparison is naturally different, which means that the computer where the current decryption work is performed has not been legally registered, that is to say, the e-book has been illegally distributed to other unregistered users. In the legally registered computer, the reading application program 322 will stop the decryption step, even if the user makes the illegally distributed electronic books unable to decrypt and read.
请参阅图5,图5A为本发明防盗版电脑系统在文件索取程序时于服务器主机端的流程图,图5B为本发明防盗版电脑系统在文件索取程序时于终端的流程图。将上述文件索取程序以流程图500表示如下列步骤:Please refer to FIG. 5 . FIG. 5A is a flow chart of the anti-piracy computer system of the present invention at the server host during the file request process, and FIG. 5B is a flow chart of the anti-piracy computer system of the present invention at the terminal during the file request process. The above-mentioned file request procedure is represented by the
步骤502:开始;Step 502: start;
步骤504:使用者于网络书店中决定购买某一本电子书籍;Step 504: the user decides to purchase a certain e-book in the online bookstore;
步骤506:服务器主机102处理购买订单并进行必要的确认及认证;Step 506: The
步骤508:订单是否通过查证?是,到步骤512;否,到步骤510;Step 508: Does the order pass verification? Yes, go to step 512; No, go to step 510;
步骤510:拒绝接受此次订单并立即停止交易;到步骤540;Step 510: refuse to accept this order and immediately stop trading; go to step 540;
步骤512:于电子文件数据库276中调出购买的电子书籍的明文;Step 512: Call out the plaintext of the purchased electronic book in the
步骤514:于密码数据库274中调出使用者专用的第二加密密钥328;Step 514: Call out the user-specific second encryption key 328 from the
步骤516:以此第二加密密钥328对电子书籍的明文加密以形成相对应的密文;Step 516: Encrypt the plaintext of the electronic book with the second encryption key 328 to form a corresponding ciphertext;
步骤518:将密文经由网际网104发送至终端106;Step 518: Send the ciphertext to the terminal 106 via the
步骤520:终端106的阅读应用程序322以第一加密密钥324对终端加密文档326解密;Step 520: the reader application program 322 of the terminal 106 decrypts the terminal encrypted document 326 with the first encryption key 324;
步骤522:解密后取得第二加密密钥328与电脑识别码330;Step 522: obtain the second encryption key 328 and the computer identification code 330 after decryption;
步骤524:取得目前工作所在电脑的电脑识别码318;Step 524: Obtain the computer identification code 318 of the computer where the current work is located;
步骤526:阅读应用程序322对解密所取得的电脑识别码330与目前电脑的电脑识别码318进行对比;Step 526: The reading application program 322 compares the computer identification code 330 obtained by decryption with the computer identification code 318 of the current computer;
步骤528:对比结果是否相同?是,到步骤530;否,到步骤536;Step 528: Are the comparison results the same? Yes, go to step 530; No, go to step 536;
步骤530:目前终端106已确认经过合法注册;Step 530: currently the terminal 106 has confirmed that it has been legally registered;
步骤532:阅读应用程序322以第二加密密钥328对接收到的电子书籍密文解密;Step 532: The reading application program 322 decrypts the received e-book ciphertext with the second encryption key 328;
步骤534:使用者可以阅读解密过后的电子书籍;到步骤540:Step 534: the user can read the decrypted electronic book; to step 540:
步骤536:目前终端未经过合法注册;Step 536: the current terminal has not been legally registered;
步骤538:阅读应用程序322停止解密动作;Step 538: the reading application program 322 stops the decryption action;
步骤540:结束。Step 540: end.
本发明上述的较佳实施例是以私钥密码系统为例加以说明,也就是说对电子书籍加密解密用的是同一把加密密钥,除了资料传输的双方外,其他第三人并不知道加密密钥的内容为何,因此也称为对称型的密码系统,如美国国家标准局所公布的DES演算法,或是Lai及Massey所设计的IDEA演算法,其安全性较强,加解密时运算速度也较快。然而,本发明的电脑系统100同样也可采用公开万用密钥密码系统来对电子书籍加密与解密,也就是说每一个使用者会拥有一把可以公布出来的公开万用密钥,与一把自己保留不能泄漏的私有万用密钥,当服务器主机102的加密模块250对电子书籍加密时,用的是使用者的公开万用密钥,而当阅读应用程序322对接收到的电子书籍密文进行解密时,用的是使用者的私有万用密钥。The above-mentioned preferred embodiment of the present invention is explained by taking the private key cryptosystem as an example, that is to say, the same encryption key is used for encryption and decryption of electronic books, and other third parties do not know it except the two parties of the data transmission. What is the content of the encryption key, so it is also called a symmetric cryptographic system, such as the DES algorithm announced by the National Bureau of Standards, or the IDEA algorithm designed by Lai and Massey, which has strong security and operates during encryption and decryption The speed is also faster. However, the
与现有技术相比较,本发明防盗版电脑系统100的优点在于:Compared with the prior art, the advantages of the
一、不同使用者或终端所需要的阅读操作平台都是相同的。由于所有使用者都是经由阅读应用程序322与服务器主机102进行注册及文件索取的程序,阅读应用程序322则成为一阅读操作平台,以提供使用者与服务器主机102沟通的桥梁,阅读应用程序322及其中的第一加密密钥324都是事先经过编译完成而可供使用者免费下载或拷贝至任何机器上。由于本发明电脑系统的目的之一在于防止电子书籍推广时所可能造成的盗版现象,也就是防止电子书籍的非法散发,而不在于防止阅读应用程序322本身的散发,同时由于本发明防止电子书籍非法散发的机制主要并不在于阅读应用程序322本身,因此,阅读应用程序322经由使用者大量的下载、拷贝或散发不但不会影响本发明的目的,反而有助于推销电子书籍的概念给使用者,使电子书籍的使用能加速普及。1. The reading operation platforms required by different users or terminals are the same. Since all users register and request documents with the
二、使用者在为其所指定的终端注册时,服务器主机102的加密密钥产生模块240会产生一专用于使用者的第二加密密钥。当使用者购买某一本电子书籍时,加密模块250会以此第二加密密钥328对电子书籍的明文加密以形成相对应的密文,发送至使用者所在的终端上,而终端上的阅读应用程序322在确认目前终端经过合法注册后,再以第二加密密钥328对接收到的电子书籍密文解密。由于某些先前技术对不同使用者购买的电子书籍都以相同的加密密钥作加解密,一旦此一加密密钥被破解,则所有电子书籍的密文都可以正确被还原成明文;然而本发明针对每一使用者都有专用的第二加密密钥,因此即使某一使用者的第二加密密钥被破解,仍然无法阅读其他使用者所购买的电子书籍,因此可提高系统的安全性。2. When the user registers on the designated terminal, the encryption
三、终端加密文档以加密的形式储存于终端中,可避免使用者不小心更改其中的内容,也可以降低其他人以非法的方式查看并得知其中的内容。3. Terminal encrypted files are stored in the terminal in an encrypted form, which can prevent users from accidentally changing the content, and can also prevent others from viewing and knowing the content in an illegal way.
四、终端加密文档储存于终端,有助于简化因电脑识别码上传所带来的隐私权公开时需使用者同意的复杂程序。由于本发明在认证终端是否经合法注册时所需要的电脑识别码,是借用其中中央处理器的识别码、硬盘的识别码或是网卡的识别码等进行的,而这些识别码的资料依法被视为使用者个人隐私资料之一部分,服务器主机102对于使用者所提出任何这类识别码的取得都要经过使用者的同意,因此,只要服务器主机102想取得终端的电脑识别码都无法规避使用者同意的程序,于是在认证终端是否经合法注册的程序上原本应该会变得较为复杂。然而,依据本发明的设计,当使用者在为其所指定的终端注册时,下传的使用者识别码与第二加密密钥在解密后,会连同代表该终端的电脑识别码会以第一加密密钥加密而产生相对应的终端加密文档,因此在注册程序进行过程中,并不需将电脑识别码上传给服务器主机102。因此当终端接收到使用者所购买电子书籍的密文时,其所执行的后续认证程序所需的电脑识别码是注册时就直接储存于终端中,因此目前工作终端的电脑识别码自然也不必上传至服务器主机102,而可以直接在终端中进行比较及认证的工作,自然简化了因电脑识别码上传所会带来的隐私权公开需要使用者同意的复杂程序及可能的争议。4. The terminal encrypted files are stored in the terminal, which helps to simplify the complicated procedures that require the user's consent when the privacy right is disclosed due to the upload of the computer identification code. Because the computer identification code required by the present invention when verifying whether the terminal is legally registered is carried out by borrowing the identification code of the central processing unit, the identification code of the hard disk or the identification code of the network card, etc., and the data of these identification codes are legally obtained. As part of the user's personal privacy information, the
五、利用终端加密文档326中所取得的电脑识别码330与目前解密工作所在电脑的电脑识别码318进行对比,可防止“合法购买却非法散发”的情况发生。由于本发明的阅读应用程序322对电子书籍解密前,会先对终端加密文档326中所取得的电脑识别码330与目前解密工作所在电脑的电脑识别码318进行对比,以确认目前解密工作所在电脑与注册当时的终端是同一电脑,其次再决定并阅读应用程序322是否会继续进行电子书籍密文的解密工作。因此,即使电子书籍的密文被非法散发至其他未经合法注册的电脑中,阅读应用程序322会停止解密的步骤,使非法散发的电子书籍无法正确解密而无法进行阅读。5. Using the computer identification code 330 obtained in the terminal encrypted file 326 to compare with the computer identification code 318 of the computer where the current decryption work is performed can prevent the occurrence of "legal purchase but illegal distribution". Before the reading application program 322 of the present invention decrypts the electronic book, it will first compare the computer identification code 330 obtained in the terminal encrypted file 326 with the computer identification code 318 of the computer where the decryption work is currently performed, so as to confirm the computer where the current decryption work is performed. It is the same computer as the terminal at the time of registration, and then it is decided and whether the reading application program 322 will continue to decrypt the ciphertext of the e-book. Therefore, even if the ciphertext of the electronic book is illegally distributed to other computers that are not legally registered, the reading application program 322 will stop the decryption step, so that the illegally distributed electronic book cannot be decrypted correctly and cannot be read.
综上所述,本发明电脑系统提出了一种有效的机制,来防止非经合法注册的终端对电子文件的盗版,因而防止“合法购买却非法散发”的情形,使得电子书籍的经销商因可维持合理的利润而愿意投入于书籍电子化买卖的行列当中,因此使得电子书籍的环保性、效率性、传播性、经济性等多重优点可为全民所共享。To sum up, the computer system of the present invention proposes an effective mechanism to prevent piracy of electronic documents by non-legally registered terminals, thereby preventing the situation of "legal purchase but illegal distribution", which makes electronic book dealers Reasonable profits can be maintained and people are willing to invest in the e-commerce of books. Therefore, the multiple advantages of e-books such as environmental protection, efficiency, dissemination, and economy can be shared by the whole people.
以上所述仅为本发明的较佳实施例,凡依本发明权利要求所做的类似变化与修饰,皆应属本发明专利的涵盖范围。The above descriptions are only preferred embodiments of the present invention, and all similar changes and modifications made according to the claims of the present invention shall fall within the scope of the patent of the present invention.
Claims (10)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CNB00126088XA CN1141678C (en) | 2000-08-31 | 2000-08-31 | Method and system for preventing electronic file piracy |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CNB00126088XA CN1141678C (en) | 2000-08-31 | 2000-08-31 | Method and system for preventing electronic file piracy |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN1340795A CN1340795A (en) | 2002-03-20 |
| CN1141678C true CN1141678C (en) | 2004-03-10 |
Family
ID=4591737
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CNB00126088XA Expired - Fee Related CN1141678C (en) | 2000-08-31 | 2000-08-31 | Method and system for preventing electronic file piracy |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN1141678C (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI676115B (en) * | 2018-07-13 | 2019-11-01 | 優碩資訊科技股份有限公司 | System and method for managing certification for cloud service system |
Families Citing this family (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1956449B (en) | 2005-10-28 | 2011-05-18 | 北京书生国际信息技术有限公司 | Data resource anti-duplication encryption transmission method and equipment system |
| CN101841411B (en) * | 2005-10-28 | 2012-01-18 | 北京书生国际信息技术有限公司 | Data resource anti-copying encrypted transmission method and device system |
| US7493494B2 (en) * | 2005-11-03 | 2009-02-17 | Prostor Systems, Inc. | Secure data cartridge |
| CN102347836A (en) * | 2010-04-30 | 2012-02-08 | 龚华清 | Electronic document protected view system and method |
| CN102118685A (en) * | 2011-01-20 | 2011-07-06 | 中国联合网络通信集团有限公司 | Method and system for pushing electronic book, and server |
| CN105100228B (en) * | 2012-07-03 | 2020-06-26 | 厦门润丰投资有限公司 | Cloud server and copy system of digital resources |
| CN110008654B (en) * | 2018-01-04 | 2021-04-09 | 北大方正集团有限公司 | Electronic document processing method and device |
-
2000
- 2000-08-31 CN CNB00126088XA patent/CN1141678C/en not_active Expired - Fee Related
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI676115B (en) * | 2018-07-13 | 2019-11-01 | 優碩資訊科技股份有限公司 | System and method for managing certification for cloud service system |
Also Published As
| Publication number | Publication date |
|---|---|
| CN1340795A (en) | 2002-03-20 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| TW486902B (en) | Method capable of preventing electronic documents from being illegally copied and its system | |
| Choudhury et al. | Copyright protection for electronic publishing over computer networks | |
| JP4750352B2 (en) | How to get a digital license for digital content | |
| EP1376980B1 (en) | Secure server plug-in architecture for digital rights management systems | |
| US8660961B2 (en) | Method, system, and device for license-centric content consumption | |
| JP4847701B2 (en) | Obtaining digital content signed rights labels (SRLs) using flexible rights templates in a rights management system | |
| JP4418648B2 (en) | System and method for issuing licenses for use of digital content and services | |
| CN100576148C (en) | Systems and methods for providing secure server key operations | |
| EP1460511B1 (en) | Reviewing cached user-group information in connection with issuing a digital rights management (DRM) license for content | |
| CN100338905C (en) | Method of binding digital contents and hardware with hardward adaptive | |
| JP2005536951A (en) | Apparatus, system, and method for securing digital documents in a digital device | |
| US20060106726A1 (en) | Method, system, and device for license-centric content consumption | |
| US20040158709A1 (en) | Publishing digital content within a defined universe such as an organization in accordance with a digital rights management (DRM) system | |
| US20120066494A1 (en) | Controlling Download and Playback of Media Content | |
| CN1191643A (en) | System and method for access control of data storage media | |
| JP2002527009A (en) | Method and system for distributing access to data items | |
| CN1822018A (en) | Flexible licensing architecture in content rights management systems | |
| WO2020156400A1 (en) | Digital artwork display device, management method, and electronic device | |
| EP1829270A2 (en) | Method, system, and device for license-centric content consumption | |
| US20250284609A1 (en) | System and Method for Secure Internet Communications | |
| CN1141678C (en) | Method and system for preventing electronic file piracy | |
| WO2006054987A1 (en) | Method, system, and device for license-centric content consumption | |
| CN1759363A (en) | Distribution and rights management of digital content | |
| CN106453273B (en) | A kind of information insurance management system and method based on cloud | |
| CN1343938A (en) | Method and system for controlling lease validity period of electronic files |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C06 | Publication | ||
| PB01 | Publication | ||
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant | ||
| C19 | Lapse of patent right due to non-payment of the annual fee | ||
| CF01 | Termination of patent right due to non-payment of annual fee |