[go: up one dir, main page]

CN1141678C - Method and system for preventing electronic file piracy - Google Patents

Method and system for preventing electronic file piracy Download PDF

Info

Publication number
CN1141678C
CN1141678C CNB00126088XA CN00126088A CN1141678C CN 1141678 C CN1141678 C CN 1141678C CN B00126088X A CNB00126088X A CN B00126088XA CN 00126088 A CN00126088 A CN 00126088A CN 1141678 C CN1141678 C CN 1141678C
Authority
CN
China
Prior art keywords
terminal
identification code
encryption key
server host
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB00126088XA
Other languages
Chinese (zh)
Other versions
CN1340795A (en
Inventor
杨大广
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Youshuo Information Science And Technology Co ltd
Original Assignee
Youshuo Information Science And Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Youshuo Information Science And Technology Co ltd filed Critical Youshuo Information Science And Technology Co ltd
Priority to CNB00126088XA priority Critical patent/CN1141678C/en
Publication of CN1340795A publication Critical patent/CN1340795A/en
Application granted granted Critical
Publication of CN1141678C publication Critical patent/CN1141678C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

A computer system capable of preventing electronic file piracy and a method used in the computer system are provided. The computer system includes a server host which is connectable to a plurality of terminals via the Internet. The method comprises a registration program and a file acquisition program, wherein the registration program registers the terminal as a legal user in the server host and acquires an encrypted second key from the server host according to a first key in the terminal; the requesting program requests the server host for the encrypted electronic file and decrypts the file with the first key, and then extracts the second key and the terminal identification code therein to determine whether to perform or stop the subsequent decryption.

Description

可防止电子文件盗版的 方法及其系统Method and system for preventing piracy of electronic documents

技术领域technical field

本发明涉及一种使用于电脑系统中可防止电子文件盗版的方法,具体地讲,一种可防止利用网际网下载电子文件至一电子阅读装置,却又非法拷贝到其他电子阅读装置的方法。The invention relates to a method used in a computer system to prevent piracy of electronic files, specifically, a method for preventing electronic files from being downloaded to an electronic reading device from the Internet and illegally copied to other electronic reading devices.

背景技术Background technique

传统上,知识是靠印刷于纸张上的书籍或杂志来加以传播,广播及电视兴起后加快了知识传播的速度,如今电脑通讯及网际网的蓬勃发展,更以惊人的速度将知识与信息传播到世界上的各个角落。由于网际网技术的发展,创造出许多新的商业模式,这些新的商业模式有一个共同的特点,就是利用网际网来做生意,也就是近来通称的电子商务。举例而言,传统上如果要购买书籍必须亲自或请人到书店寻找后购买,由于网际网的兴起,如AMAZON等网络书店可以让使用者在线上搜寻到想要的书籍并可直接下单购买。虽然这使得购买书籍的方式大为简化,然而这还是有一个不方便之处,就是有关书籍的保存,一但书藉购买得愈多愈需要足够的空间来摆放,同时管理上也更加繁杂。Traditionally, knowledge is disseminated by books or magazines printed on paper. The rise of radio and television has accelerated the speed of knowledge dissemination. Today, with the vigorous development of computer communications and the Internet, knowledge and information are disseminated at an astonishing speed. to every corner of the world. Due to the development of Internet technology, many new business models have been created. These new business models have a common feature, which is to use the Internet to do business, which is commonly known as e-commerce recently. For example, traditionally, if you want to buy a book, you have to go to a bookstore to find it in person or ask someone to buy it. Due to the rise of the Internet, online bookstores such as Amazon allow users to search for the books they want online and place an order directly. . Although this greatly simplifies the way of purchasing books, there is still an inconvenience, that is, the preservation of books. Once you buy more books, you need enough space to place them, and the management becomes more complicated. .

有鉴于此,“电子阅读装置”的概念就被提出以满足这种需要,也就是说将原来书籍中的文字或图片数字化,形成电子书籍,消费者只要有一台终端可以连接上网,再加上某些特定的程序软件,就可以很方便地在线购买想要的电子书籍或文件,并将此电子书籍下传到消费者所在的终端即可进行阅读,可以符合这种需求的终端也就是所谓的“电子阅读装置”。曾经有许多出版集团有鉴于这一广大的消费市场而欲投入到电子书店及电子书籍的经营,然而,却因为某些配套的机制尚未建立而临时中途喊停。原因之一是消费者阅读习惯所隐含市场不成熟的忧虑。也就是说,大部分消费者还是习惯从纸本的形式来阅读书籍,想要推动以“电子阅读装置”来阅读电子书籍必须要推翻消费者根深蒂固的阅读习惯,同时也必须经过冗长的教育与适应的过程。然而另一个更重要的因素是低廉的复制成本与简便的传播散发方式,这使得电子书籍的市场面临无法推广的严重威胁。In view of this, the concept of "electronic reading device" was proposed to meet this need, that is to say, to digitize the text or pictures in the original book to form an electronic book. As long as consumers have a terminal that can connect to the Internet, plus Some specific program software can conveniently purchase the desired e-books or files online, and download the e-books to the terminal where the consumer is for reading. The terminal that can meet this demand is the so-called "Electronic Reading Devices". In the past, many publishing groups wanted to invest in the operation of e-bookstores and e-books in view of this vast consumer market. However, they stopped temporarily because some supporting mechanisms have not been established. One reason is the immaturity of the market implied by consumers' reading habits. That is to say, most consumers are still accustomed to reading books in the form of paper. To promote the reading of e-books with "electronic reading devices", consumers' deep-rooted reading habits must be overthrown. process of adaptation. However, another more important factor is the low cost of copying and the easy way of spreading and distributing, which makes the market of e-books face a serious threat that they cannot be promoted.

这个严重威胁来自于从事电子书籍销售的经销商遇到的一个很头痛而难以解决的问题:电子书籍可以很容易多次拷贝分送给非交易双方以外的第三人。电子书籍之所以便利是由于其属于无形的电子文件,相较于有实际形体的传统书籍而言自然发送方便且可以节省大量摆放空间,然而,也就因为其属于无形的电子文件发送方便,使得消费者于合法购买阅读后,却可以非法的任意加以拷贝发送并散发给其他人。也就是说,如果无法设计出一套完善的电子书藉交易机制,以有效防止“合法购买却非法散发”的情况发生,从事电子书籍的经销商每卖出一本电子书籍给某一消费者,就等于将此电子书籍赠送给了所有其他的消费者,在这种情形下,经销商无法维持合理的利润,这种形式的电子商务自然无法生存,这也就是电子书籍至今推广及普及的速度不如预期的重要原因。然而,电子书籍具有无纸化——符合环保概念、效率化——传播速度快速、经济化——不占大量空间等优点,可节省许多珍贵的资源,如果只是因为未能解决上述“合法购买却非法散发”的事情而无法加以推广,实在是经济利益的重大损失。This serious threat comes from a very troublesome and difficult problem encountered by distributors engaged in the sale of e-books: e-books can be easily distributed to third parties other than the parties to the transaction in multiple copies. The reason why e-books are convenient is that they are invisible electronic files. Compared with traditional books with physical form, they are naturally convenient to send and can save a lot of storage space. However, because they are invisible electronic files, they are convenient to send. After consumers legally purchase and read, they can illegally copy and distribute them to others. That is to say, if a complete e-book lending and trading mechanism cannot be designed to effectively prevent the occurrence of "legal purchase but illegal distribution", every time a dealer engaged in e-books sells an e-book to a certain consumer , it is equivalent to giving this e-book to all other consumers. In this case, the dealer cannot maintain a reasonable profit. Naturally, this form of e-commerce cannot survive. This is the reason why e-books have been promoted and popularized so far. A big reason why the speed is not as expected. However, e-books have the advantages of being paperless-conform to the concept of environmental protection, efficiency-fast transmission speed, economy-do not take up a lot of space, etc., and can save many precious resources. However, illegally distributing" things cannot be promoted, which is really a major loss of economic interests.

发明内容Contents of the invention

有鉴于上述问题,本发明的主要目的是提供一种使用于电脑系统中可防止电子文件盗版的方法,具体地讲一种可防止利用网际网下载电子文件至一电子阅读装置,却又非法拷贝至其他电子阅读装置的方法,以解决上述问题。In view of the above problems, the main purpose of the present invention is to provide a method for preventing piracy of electronic files used in computer systems, specifically a method for preventing electronic files from being downloaded to an electronic reading device from the Internet, but illegally copied To other electronic reading devices, to solve the above problems.

按照本发明的一个方面,提供了一种使用于一电脑系统中可防止电子文件盗版的方法,该电脑系统包含一服务器主机,该服务器主机可经由网际网与多个终端相连接,该服务器主机中包含一用户数据库,以记录经由该注册程序所注册的所有合法的使用者及其终端的识别码,该终端还包含一中央处理器、一硬盘以及一网卡,每一终端具有至少一代表该终端的识别码,而该终端的识别码可为该中央处理器的识别码、该硬盘的识别码或是该网卡的识别码,该服务器主机中还包含一公用程序模块,以存放该阅读应用程序并供使用者下载至该终端中储存使用,该终端可经由该网际网向该服务器主机提出索取一电子文件的要求,该服务器主机则可将该电子文件的明文经过加密形成相对应的密文,并经由该网际网发送至该终端,以将该密文解密为原来的明文,该方法包含一注册程序与一文件索取程序,该注册程序包含下列步骤:使用者载入一阅读应用程序于终端中,该阅读应用程序包含一第一加密密钥;使用者利用该阅读应用程序向该服务器主机注册成为合法的终端;该服务器主机在完成该终端的合法注册后,会产生一使用者识别码与一使用者专用的第二加密密钥,该使用者识别码与该第二加密密钥经过加密后发送至该合法注册的终端;以及该终端的阅读应用程序进一步将接收到的使用者识别码与第二加密密钥连同代表该终端的识别码一并加密以形成一终端加密文档,储存于该合法注册的终端中;该文件索取程序包含下列步骤:当一终端向该服务器主机提出索取一电子文件的要求时,该服务器主机将该电子文件的明文经过该第二加密密钥的加密而形成相对应的密文,并将该密文经由该网际网发送至该终端;当该终端的阅读应用程序接收到该密文时,先以该第一加密密钥对该终端加密文档解密,并取得其中的第二加密密钥与该终端的识别码;以及当该阅读应用程序把所取得的终端识别码与目前终端的识别码作比较,若结果相同时,即以该第二加密密钥对该接收到的密文解密,否则停止后续的解密动作,以防止非合法的终端对该电子文件的盗版。According to one aspect of the present invention, a method for preventing piracy of electronic files used in a computer system is provided, the computer system includes a server host, the server host can be connected to a plurality of terminals via the Internet, the server host Contains a user database to record the identification codes of all legal users and their terminals registered through the registration program. The terminal also includes a central processing unit, a hard disk and a network card. Each terminal has at least one representative of the The identification code of the terminal, and the identification code of the terminal can be the identification code of the central processing unit, the identification code of the hard disk or the identification code of the network card, and the server host also includes a public program module to store the reading application The program can be downloaded by the user to the terminal for storage and use. The terminal can request an electronic file from the server host through the Internet, and the server host can encrypt the plaintext of the electronic file to form a corresponding encrypted file. text, and send it to the terminal via the Internet, so as to decrypt the ciphertext into the original plaintext, the method includes a registration procedure and a file request procedure, and the registration procedure includes the following steps: the user loads a reading application program In the terminal, the reading application program includes a first encryption key; the user uses the reading application program to register with the server host to become a legal terminal; after the server host completes the legal registration of the terminal, it will generate a user The identification code and a user-specific second encryption key, the user identification code and the second encryption key are encrypted and then sent to the legally registered terminal; and the reading application program of the terminal further uses the received The operator identification code and the second encryption key are encrypted together with the identification code representing the terminal to form a terminal encryption file, which is stored in the legally registered terminal; the file requesting procedure includes the following steps: when a terminal sends to the server host When requesting an electronic file, the server host encrypts the plaintext of the electronic file with the second encryption key to form a corresponding ciphertext, and sends the ciphertext to the terminal via the Internet; When the reading application program of the terminal receives the ciphertext, it first decrypts the encrypted file of the terminal with the first encryption key, and obtains the second encryption key and the identification code of the terminal; and when the reading application program Compare the obtained terminal identification code with the current terminal identification code, and if the results are the same, use the second encryption key to decrypt the received ciphertext, otherwise stop the subsequent decryption action to prevent illegal Piracy of the electronic file by the terminal.

按照本发明的另一个方面,提供了一种可防止电子文件盗版的电脑系统,该电脑系统包含一服务器主机可经由一网际网与多个终端相连接,该终端包含一中央处理器、一硬盘以及一网卡,每一终端具有至少一代表该终端的识别码,而该终端的识别码可为该中央处理器的识别码、该硬盘的识别码或是该网卡的识别码,该终端可经由该网际网向该服务器主机提出索取一电子文件的要求,该服务器主机则可将该电子文件的明文经过加密形成相对应的密文,并经由该网际网发送至该终端,以将该密文解密为原来的明文,该服务器主机包含:一公用程序模块,以存放包含一第一加密密钥的阅读应用程序,该阅读应用程序可供使用者下载至该终端中储存使用;一注册模块,当使用者利用该终端的阅读应用程序向该服务器主机注册时,该注册模块会产生一使用者识别码并将该终端注册为一合法的终端;一用户数据库,以记录所有合法注册的使用者及其终端的识别码;一加密密钥产生模块,用来产生一使用者专用的第二加密密钥;以及一加密模块,用来将该使用者识别码与该第二加密密钥加密,并发送至该合法注册的终端中;其中该终端的阅读应用程序进一步将接收到的使用者识别码与第二加密密钥连同代表该终端的电脑识别码一并加密以形成一终端加密文档,储存于该合法注册的终端中,而当一终端向该服务器主机提出索取一电子文件的要求时,该加密模块以该第二加密密钥将该电子文件的明文加密而形成相对应的密文,并将该密文经由该网际网发送至该终端,当该终端的阅读应用程序接收到该密文时,会先以该第一加密密钥对该终端加密文档解密,并取得其中的第二加密密钥与该识别码,而当该阅读应用程序比较所取得的识别码与目前终端的识别码为相同时,以该第二加密密钥对该接收到的密文解密,否则停止后续的解密动作,以防止非合法的终端对该电子文件的盗版。According to another aspect of the present invention, a computer system capable of preventing electronic file piracy is provided, the computer system includes a server host that can be connected to a plurality of terminals via an Internet, and the terminal includes a central processing unit, a hard disk And a network card, each terminal has at least one identification code representing the terminal, and the identification code of the terminal can be the identification code of the central processing unit, the identification code of the hard disk or the identification code of the network card, and the terminal can be accessed via The Internet requests the server host to obtain an electronic file, and the server host can encrypt the plaintext of the electronic file to form a corresponding ciphertext, and send it to the terminal via the Internet to obtain the ciphertext To decrypt the original plaintext, the server host includes: a public program module to store a reading application program including a first encryption key, the reading application program can be downloaded by the user to the terminal for storage and use; a registration module, When the user utilizes the reading application program of the terminal to register with the server host, the registration module will generate a user identification code and register the terminal as a legal terminal; a user database to record all legally registered users and the identification code of the terminal; an encryption key generation module, used to generate a user-specific second encryption key; and an encryption module, used to encrypt the user identification code and the second encryption key, and sent to the legally registered terminal; wherein the reading application program of the terminal further encrypts the received user identification code and the second encryption key together with the computer identification code representing the terminal to form a terminal encrypted file, stored in the legally registered terminal, and when a terminal requests the server host for an electronic file, the encryption module encrypts the plaintext of the electronic file with the second encryption key to form a corresponding ciphertext , and send the ciphertext to the terminal via the Internet, when the reading application program of the terminal receives the ciphertext, it will first decrypt the encrypted document of the terminal with the first encryption key, and obtain the first Two encryption keys and the identification code, and when the identification code obtained by the reading application program is the same as the identification code of the current terminal, the received ciphertext is decrypted with the second encryption key, otherwise stop the subsequent The decryption action to prevent unauthorized terminals from piracy of the electronic file.

综上所述,本发明电脑系统提出了一种有效的机制,来防止非经合法注册的终端对电子文件的盗版,因而防止“合法购买却非法散发”的情形,使得电子书籍的经销商因可维持合理的利润而愿意投入于书籍电子化买卖的行列当中,因此使得电子书籍的环保性、效率性、传播性、经济性等多重优点可为全民所共享。To sum up, the computer system of the present invention proposes an effective mechanism to prevent piracy of electronic documents by non-legally registered terminals, thereby preventing the situation of "legal purchase but illegal distribution", which makes electronic book dealers Reasonable profits can be maintained and people are willing to invest in the e-commerce of books. Therefore, the multiple advantages of e-books such as environmental protection, efficiency, dissemination, and economy can be shared by the whole people.

附图说明Description of drawings

图1为本发明可防止电子文件盗版的电脑系统的示意图。FIG. 1 is a schematic diagram of a computer system capable of preventing electronic file piracy according to the present invention.

图2为本发明防盗版电脑系统的服务器主机的功能方块图。Fig. 2 is a functional block diagram of the server host of the anti-piracy computer system of the present invention.

图3为本发明防盗版电脑系统的终端的功能方块图。Fig. 3 is a functional block diagram of a terminal of the anti-piracy computer system of the present invention.

图4为本发明防盗版电脑系统于注册程序时的流程图。FIG. 4 is a flow chart of the anti-piracy computer system of the present invention when registering a program.

图5A为本发明防盗版电脑系统在文件索取程序时于服务器主机端的流程图。FIG. 5A is a flow chart of the anti-piracy computer system of the present invention at the server host side during the file request procedure.

图5B为本发明防盗版电脑系统在文件索取程序时于用户终端的流程图。FIG. 5B is a flow chart of the anti-piracy computer system of the present invention at the user terminal during the file requesting process.

具体实施方式Detailed ways

请参阅图1,图1为本发明可防止电子文件盗版的电脑系统的示意图。本发明防盗版电脑系统100包含一服务器主机102可经由一防火墙装置103连接上网际网104,另有多个使用者也可经由各自的终端106、108、110连接上网际网104。防火墙装置103可用来隔离服务器主机102与其外部的网际网104,其可通过网络讯息包的过滤以及安全策略的订定,让某些特定的网络服务及安全的网络讯息,例如:经过注册的远程登录、电子邮件、文件传输等可以进出防火墙装置103,以确保服务器主机102中的设定及信息不会遭受非法入侵及修改。每一终端106、108、110可为一个人台式电脑、笔记本电脑、个人数字助理(PDA)或是可连接上网的移动电话(WAP cellularphone)等,只要用户的终端是可以连接上网并且传输数字信息的都可以适用于本发明防盗版电脑系统100。Please refer to FIG. 1 . FIG. 1 is a schematic diagram of a computer system capable of preventing electronic file piracy according to the present invention. The anti-piracy computer system 100 of the present invention includes a server host 102 that can connect to the Internet 104 through a firewall device 103 , and multiple users can also connect to the Internet 104 through their respective terminals 106 , 108 , 110 . The firewall device 103 can be used to isolate the server host 102 from the external Internet 104, which can filter network information packets and set security policies to allow certain specific network services and secure network information, such as: registered remote Login, email, file transfer, etc. can enter and exit the firewall device 103 to ensure that the settings and information in the server host 102 will not be subject to illegal intrusion and modification. Each terminal 106, 108, 110 can be a personal desktop computer, notebook computer, personal digital assistant (PDA) or a mobile phone (WAP cellularphone) that can be connected to the Internet, etc., as long as the user's terminal can be connected to the Internet and transmit digital information All can be applied to the anti-piracy computer system 100 of the present invention.

以本发明的优选实施例而言,终端106、108、110为个人台式电脑,其中包含一中央处理器,一硬盘,一网卡,输入装置如键盘、鼠标、操纵杆等,输出装置如屏幕、打印机等。每一终端106、108、110中各自具有至少一电脑识别码,用来代表终端的身份认证,如中央处理器的识别码、硬盘的识别码或是网卡的识别码等皆可成为该终端的电脑识别码,以便服务器主机102在后续电子交易或资料传输时可以确定各终端106、108、110的身份或位置。In the preferred embodiment of the present invention, the terminals 106, 108, and 110 are personal desktop computers, which include a central processing unit, a hard disk, a network card, input devices such as keyboards, mice, joysticks, etc., and output devices such as screens, printer etc. Each terminal 106, 108, 110 has at least one computer identification code, which is used to represent the identity authentication of the terminal, such as the identification code of the central processing unit, the identification code of the hard disk or the identification code of the network card, etc., which can be used as the identification code of the terminal. The computer identification code, so that the server host 102 can determine the identity or location of each terminal 106, 108, 110 during subsequent electronic transactions or data transmission.

请参阅图2,图2为本发明防盗版电脑系统的服务器主机的功能方框图。服务器主机102包含一界面模块210,一公用程序模块220,一注册模块230,一加密密钥产生模块240,一加密模块250,一交易处理及认证模块260,一数据库270,以及一控制中心280。Please refer to FIG. 2, which is a functional block diagram of the server host of the anti-piracy computer system of the present invention. The server host 102 includes an interface module 210, a public program module 220, a registration module 230, an encryption key generation module 240, an encryption module 250, a transaction processing and authentication module 260, a database 270, and a control center 280 .

服务器主机102经由界面模块210与防火墙装置103相连接,并通过防火墙装置103与网际网104进行资料传输与交换,并于必要时对不同规格的资料作适当的资料转换。公用程序模块220中存放有服务器主机102对外公开的各种公用程序,以供使用者免费下载到各自的终端中,其中例如一经过编译的阅读应用程序,以提供使用者一登录、注册、下载、阅读电子书籍的使用者操作界面,阅读应用程序中附加有一第一加密密钥,其功用以后再加详述。注册模块230可接受使用者及其所指定的终端的注册,以便让使用者成为合法登录的使用者,而其所指定的终端也成为合法登录而可合法下载电子书籍的用户终端。加密密钥产生模块240会于使用者进行注册时产生使用者专用的第二加密密钥,也就是说不同的使用者其第二加密密钥都不相同。在此需加以说明,上述的第一及第二加密密钥其实就是一组预定长度位的的序列,例如可以是常用的56bits或128bits,本发明的较佳实施例的钥匙长度是采用128tits或是更高的bits,以增强其安全性。The server host 102 is connected to the firewall device 103 through the interface module 210, and performs data transmission and exchange with the Internet 104 through the firewall device 103, and performs appropriate data conversion for data of different specifications when necessary. Various public programs disclosed by the server host 102 are stored in the public program module 220, so that users can download them to their respective terminals free of charge, such as a compiled reading application program, to provide users with a login, registration, download 1. The user interface for reading electronic books, and a first encryption key is attached to the reading application program, and its function will be described in detail later. The registration module 230 accepts the registration of the user and the designated terminal, so that the user becomes a legally logged-in user, and the designated terminal also becomes a legally logged-in user terminal capable of legally downloading electronic books. The encryption key generation module 240 generates a user-specific second encryption key when the user registers, that is to say, different users have different second encryption keys. It needs to be explained here that the above-mentioned first and second encryption keys are actually a sequence of bits with a predetermined length, such as commonly used 56bits or 128bits. The key length of the preferred embodiment of the present invention is to adopt 128tits or 128tits. are higher bits to enhance its security.

加密模块250则是用来执行各种需要加密的动作,例如:在文件索取程序时,加密模块250会以使用者专用的第二加密密钥对使用者购买的电子书籍加密以便后续发送给使用者。交易处理及认证模块260则用来处理与使用者订单有关的事宜,并对订单的来源及内容进行必要的确认及认证工作。The encryption module 250 is used to perform various actions that require encryption. For example, during the file request process, the encryption module 250 will encrypt the electronic books purchased by the user with the second encryption key dedicated to the user so that they can be sent to the user later. By. The transaction processing and authentication module 260 is used to process matters related to the user's order, and perform necessary confirmation and authentication on the source and content of the order.

数据库270则包含至少有三个子数据库:用户数据库272、密码数据库274、电子文件数据库276。用户数据库272中存放有经过合法注册后所有使用者相关的基本资料及其所指定的终端的基本资料,如:代表某一用户的使用者识别码。密码数据库274则存放使用者识别码及其专用的第二加密密钥之间的对照表,也就是说,每一个使用者在进行注册时,加密密钥产生模块240所产生相对应的专用第二加密密钥就是存放在密码数据库274中。电子文件资料库276则是存放将来要提供给读者的电子书籍的明文,每一本电子书籍有一独特的电子书码以方便查询与建档之用。而控制中心280则是用来控制服务器主机102的操作,以及处理服务器主机102中各个模块或数据库的控制或信息流向。The database 270 includes at least three sub-databases: a user database 272 , a password database 274 , and an electronic file database 276 . The user database 272 stores the basic data related to all users after legal registration and the basic data of the designated terminal, such as the user identification code representing a certain user. The password database 274 stores the comparison table between the user identification code and its special-purpose second encryption key, that is to say, when each user registers, the corresponding special-purpose first encryption key generated by the encryption key generation module 240 The second encryption key is stored in the password database 274. The electronic document database 276 stores the plain text of electronic books to be provided to readers in the future, and each electronic book has a unique electronic book code to facilitate query and file building. The control center 280 is used to control the operation of the server host 102 and process the control or information flow of each module or database in the server host 102 .

请参阅图3,图3为本发明防盗版电脑系统的终端的功能方框图。以终端106为例,本发明终端106的优选实施例为个人电脑,其中包含一中央处理器302,一存储器320,一硬盘304,一网卡306,输入装置如键盘308、鼠标310、操纵杆312等,输出装置如屏幕314、打印机316等。为了能与服务器主机102进行资料交换,终端106必须从服务器主机102的公用程序模块220或网际网104上下载经过编译的阅读应用程序322至终端106的存储器320或硬盘304中储存。阅读应用程序322提供了使用者登录、注册、下载、阅读电子书籍的操作界面,其中附加有可供后续对终端加密文档326进行解密的第一加密密钥324。即使是对于不同使用者而言,其所需要的阅读应用程序322都是相同,因此阅读应用程序322是事先经过编译完成,并可供所有需要的使用者免费任意下载,而其中的第一加密密钥324也不因使用者的不同而有所区别。Please refer to FIG. 3 . FIG. 3 is a functional block diagram of a terminal of the anti-piracy computer system of the present invention. Taking the terminal 106 as an example, the preferred embodiment of the terminal 106 of the present invention is a personal computer, which includes a central processing unit 302, a memory 320, a hard disk 304, a network card 306, input devices such as a keyboard 308, a mouse 310, and a joystick 312 etc., output devices such as screen 314, printer 316, etc. In order to exchange data with the server host 102, the terminal 106 must download the compiled reading application program 322 from the utility module 220 of the server host 102 or the Internet 104 to the terminal 106's memory 320 or hard disk 304 for storage. The reading application 322 provides an operation interface for users to log in, register, download, and read e-books, in which there is a first encryption key 324 for subsequent decryption of the terminal encrypted document 326 . Even for different users, the required reading application program 322 is the same, so the reading application program 322 is compiled in advance and can be freely downloaded by all users who need it. The key 324 also does not differ from user to user.

使用者以终端206的阅读应用程序为界面向远程的服务器主机102进行登录与注册时,其程序包括1)服务器主机102辨识阅读应用程序是否为合法的阅读应用程序。2)服务器主机102运用注册模块230产生使用者识别码与加密密钥产生模块240产生其相对应的第二加密密钥。3)服务器主机102将使用者识别码加入用户数据库272并将第二加密密钥加入密码数据库274。4)终端106的阅读应用程序下载使用者识别码及第二加密密钥。每一终端106、108、110于注册完成后,会产生终端加密文档326,终端加密文档326中包含使用者识别码327、使用者的专用第二加密密钥328与本台终端106的电脑识别码330,终端106将终端加密文档326以第一加密密钥324进行加密,并以加密的形式储存于终端106的存储器320或硬盘304中,以避免使用者不小心更改其中的内容,也可以降低其他人以非法的方式查看并得知其中的内容。当电子书籍下载后并需要进行解密之时,阅读应用程序322会对终端加密文档326以第一加密密钥324进行解密,以撷取出其中的第二加密密钥328与电脑识别码330。When the user logs in and registers with the remote server host 102 using the reading application program of the terminal 206 as an interface, the procedure includes 1) the server host 102 identifies whether the reading application program is a legitimate reading application program. 2) The server host 102 uses the registration module 230 to generate a user ID and the encryption key generation module 240 to generate a corresponding second encryption key. 3) The server host 102 adds the user identification code to the user database 272 and the second encryption key to the password database 274. 4) The reading application program of the terminal 106 downloads the user identification code and the second encryption key. Each terminal 106, 108, 110 will generate a terminal encrypted file 326 after the registration is completed, and the terminal encrypted file 326 includes a user identification code 327, a user's dedicated second encryption key 328 and the computer identification of the terminal 106 code 330, the terminal 106 encrypts the terminal encrypted file 326 with the first encryption key 324, and stores it in the memory 320 or the hard disk 304 of the terminal 106 in an encrypted form, so as to prevent the user from accidentally changing the content therein. Prevent others from viewing and knowing the content in an illegal way. When the electronic book is downloaded and needs to be decrypted, the reader application program 322 will decrypt the terminal encrypted file 326 with the first encryption key 324 to retrieve the second encryption key 328 and the computer identification code 330 therein.

现在针对本发明的方法作一详细说明,配合本发明防盗版电脑系统100的方法包含一注册程序与一文件索取程序。当一使用者想要利用本发明的电脑系统100进行电子书籍的购买之前,首先要从服务器主机102或网际网104上的网络书店下载阅读应用程序322,并于阅读应用程序322中向服务器主机102执行一注册程序以成为一合法登录的使用者或会员,阅读应用程序322中除了包含一般性的界面应用程序之外,还包含上述的第一加密密钥324。在注册的同时,不但使用者需要经过注册,使用者将来所欲下载电子书籍的终端106也需要经过注珊,也就是说在注册的过程中,相关的使用者的基本资料(包括使用者识别码和其相对应的第二加密密钥328)会经过注册而存储在服务器主机102中。而使用者也必须以注册当时所使用的终端106作为将来下载电子书籍的电子阅读装置,否则,电脑系统100会判定所使用来下载电子书籍的电子阅读装置未经过注册,而无法正常开启所下载的电子书籍。Now, the method of the present invention will be described in detail. The method that cooperates with the anti-piracy computer system 100 of the present invention includes a registration program and a file requesting program. Before a user wants to utilize the computer system 100 of the present invention to carry out the purchase of e-books, at first download the reading application program 322 from the server mainframe 102 or the online bookstore on the Internet 104, and in the reading application program 322, send an email to the server mainframe 102 executes a registration procedure to become a legally logged-in user or member, and the reading application program 322 includes the above-mentioned first encryption key 324 in addition to the general interface application program. While registering, not only the user needs to be registered, but also the terminal 106 that the user wants to download electronic books in the future also needs to be registered. That is to say, during the registration process, the relevant basic information of the user (including user identification code and its corresponding second encryption key 328) will be registered and stored in the server host 102. And the user must also register the terminal 106 used at the time as the electronic reading device for downloading electronic books in the future, otherwise, the computer system 100 will determine that the electronic reading device used to download electronic books has not been registered, and cannot normally open the downloaded electronic reading device. of e-books.

当使用者利用终端106中的阅读应用程序322进行注册时,服务器主机102会将使用者识别码储存于用户数据库272中,然后指定一专用的第二加密密钥328给使用者,并且将使用者与其第二加密密钥328之间的一一对应关系储存于密码数据库274中,如此便完成了使用者及其终端106的合法注册。在完成注册后,服务器主机102会以第一加密密钥将使用者识别码327与相对应该使用者的专用第二加密密钥328加密,并发送至终端106,而终端的阅读应用程序在接收到加密后的使用者识别码327与第二加密密钥328后,会先以第一加密密钥将两者进行解密,而后进一步将解密后的使用者识别码与第二加密密钥连同代表该终端的电脑识别码再一并加密以形成一终端加密文档326,并储存于该合法注册的终端中,经过此一注册程序,以后终端106就可合法下载电子书籍并对其正确解密了。When the user utilizes the reading application program 322 in the terminal 106 to register, the server host 102 will store the user identification code in the user database 272, and then assign a dedicated second encryption key 328 to the user, and will use The one-to-one correspondence between the user and the second encryption key 328 is stored in the password database 274, thus completing the legal registration of the user and his terminal 106. After completing the registration, the server host 102 will encrypt the user identification code 327 and the corresponding second encryption key 328 corresponding to the user with the first encryption key, and send them to the terminal 106, and the reading application program of the terminal receives the After receiving the encrypted user identification code 327 and the second encryption key 328, the first encryption key will be used to decrypt the two, and then the decrypted user identification code and the second encryption key together with the representative The computer identification code of the terminal is encrypted together to form a terminal encrypted file 326, and stored in the legally registered terminal. After this registration procedure, the terminal 106 can legally download the electronic book and decrypt it correctly.

请参阅图4,图4为本发明防盗版电脑系统于注册程序时的流程图。将上述注册程序以流程图400表示如下列步骤:Please refer to FIG. 4 . FIG. 4 is a flow chart of the registration program of the anti-piracy computer system of the present invention. The above-mentioned registration procedure is represented by the flow chart 400 as the following steps:

步骤402:开始;Step 402: start;

步骤404:使用者选定一终端106以进行后续注册程序;Step 404: The user selects a terminal 106 for subsequent registration procedures;

步骤406:从网际网104上下载阅读应用程序322到选定的终端106;Step 406: Download the reading application program 322 from the Internet 104 to the selected terminal 106;

步骤408:由终端106的阅读应用程序322连接服务器主机102进行注册;Step 408: The reading application program 322 of the terminal 106 connects to the server host 102 to register;

步骤410:服务器主机102产生使用者识别码及专用的第二加密密钥328并分别储存于用户数据库272与密码数据库274中;Step 410: the server host 102 generates the user identification code and the dedicated second encryption key 328 and stores them in the user database 272 and the password database 274 respectively;

步骤412:服务器主机102将产生的使用者识别码327及其专用的第二加密密钥328以第一加密密钥324加密后传送至终端106;Step 412: The server host 102 encrypts the generated user identification code 327 and its dedicated second encryption key 328 with the first encryption key 324 and sends it to the terminal 106;

步骤414:终端106的阅读应用程序以第一加密密钥将接收到加密的使用者识别码327与第二加密密钥328进行解密;Step 414: The reading application program of the terminal 106 decrypts the received encrypted user identification code 327 and the second encryption key 328 with the first encryption key;

步骤416:终端106的阅读应用程序将解密后的使用者识别码327与第二加密密钥328连同代表终端106的电脑识别码330再一并加密以形成一终端加密文档326;Step 416: The reading application program of the terminal 106 encrypts the decrypted user identification code 327 and the second encryption key 328 together with the computer identification code 330 representing the terminal 106 to form a terminal encrypted file 326;

步骤418:终端106的阅读应用程序将终端加密文档326储存于其硬盘中;Step 418: the reading application program of the terminal 106 stores the terminal encrypted file 326 in its hard disk;

步骤420:结束。Step 420: end.

当使用者及其终端106于服务器主机102端完成注册后,就可以依其个人意愿于任何时候上网付费购买特定的电子书籍,并且将其下载至终端106,这一部分也就是本发明方法所称的文件索取程序。使用者可从经过注册的终端于网际网104中浏览网络书店或相关网站,进行搜寻并且决定购买某一本电子书籍,而将购买订单发送至服务器主机102,服务器主机102在进行必要的确认及认证后,会于电子文件数据库276中调出使用者想购买的电子书籍的明文,并且于密码数据库274中调出使用者专用的第二加密密钥328,之后以此第二加密密钥328对电子书籍的明文加密而形成相对应的密文,再将密文经由网际网104发送至终端106。After the user and his terminal 106 complete the registration at the server host 102, he can pay to purchase specific e-books online at any time according to his personal wishes, and download them to the terminal 106. This part is what the method of the present invention refers to. document request procedure. Users can browse online bookstores or related websites in the Internet 104 from a registered terminal, search and decide to purchase a certain e-book, and send the purchase order to the server host 102, and the server host 102 is performing necessary confirmation and After authentication, the plaintext of the electronic book that the user wants to buy will be called out in the electronic document database 276, and the second encryption key 328 dedicated to the user will be called out in the password database 274, and then the second encryption key 328 will be used to The plaintext of the electronic book is encrypted to form a corresponding ciphertext, and then the ciphertext is sent to the terminal 106 via the Internet 104 .

当终端106的阅读应用程序322接收到所购买电子书籍的密文时,会先以阅读应用程序322中附属的第一加密密钥324对终端加密文档326解密,以取得其中之第二加密密钥328与电脑识别码330,然后阅读应用程序322会对解密所取得的电脑识别码330与目前终端106的电脑识别码318进行对比。当对比结果相同时,代表目前终端106为经过合法注册的终端,阅读应用程序322会继续以解密所取得的第二加密密钥328对接收到的密文解密,使用者就可以在阅读应用程序322所提供的界面下阅读解密过后的电子书籍。When the reading application program 322 of the terminal 106 receives the ciphertext of the purchased e-book, it will first decrypt the terminal encrypted file 326 with the first encryption key 324 attached to the reading application program 322 to obtain the second encryption key. The key 328 and the computer identification code 330 , and then the reading application program 322 will compare the decrypted computer identification code 330 with the current computer identification code 318 of the terminal 106 . When the comparison results are the same, it means that the current terminal 106 is a legally registered terminal, and the reading application program 322 will continue to decrypt the received ciphertext with the second encryption key 328 obtained by decryption, and the user can read the application program 322 to read the decrypted e-books under the interface provided.

当阅读应用程序322对解密所取得的电脑识别码330与目前终端106的电脑识别码318进行对比后发现对比结果不相同时,代表目前终端106并未经过合法注册,阅读应用程序322即停止后续动作,也不会如正常情形般以第二加密密钥328对收到的密文解密,因此使用者也就无法阅读电子书籍。这种情形会发生的最大原因,是一个合法使用者于合法注册的终端下载电子书籍后,却将阅读应用程序322连同其购买的电子书籍以及于注册时所产生的终端加密文档326一并拷贝至另一台电脑上,以便给其他电脑上的第三人阅读,也就是所谓的“合法购买却非法散发”。When the reading application 322 compares the computer identification code 330 obtained by decryption with the computer identification code 318 of the current terminal 106 and finds that the comparison results are not the same, it means that the current terminal 106 has not been legally registered, and the reading application 322 stops the follow-up action, the received ciphertext will not be decrypted with the second encryption key 328 as normal, so the user will not be able to read the electronic book. The biggest reason for this situation to happen is that after a legal user downloads an e-book on a legally registered terminal, he copies the reading application 322 together with the e-book he purchased and the terminal encrypted file 326 generated during registration. to another computer so that it can be read by a third person on another computer, which is the so-called "legal purchase but illegal distribution".

然而,由于本发明的阅读应用程序322对电子书籍解密前,会先对终端加密文档326中所取得的电脑识别码330与目前解密工作所在电脑的电脑识别码318进行对比,而取得一个对比的结果。如果目前解密工作所在电脑与注册当时的终端是同一电脑,此一对比结果自然会相同,即表示代表目前解密工作所在电脑为经过合法注册的终端,电子书籍并未被非法散发至其他未经合法注册的电脑中,于是阅读应用程序322会继续以解密让使用者可以阅读解密过后的电子书籍。如果目前解密工作所在电脑与注册当时的终端不相同时,此一对比结果自然不相同,即表示代表目前解密工作所在电脑并未经过合法注册,也就是说,电子书籍已经被非法散发至其他未经合法注册的电脑中,于是阅读应用程序322会停止解密的步骤,使用者即使使得非法散发的电子书籍也无法进行解密阅读。However, before the reading application program 322 of the present invention decrypts the electronic book, it first compares the computer identification code 330 obtained in the terminal encrypted file 326 with the computer identification code 318 of the computer where the decryption work is currently performed, and obtains a comparison result. If the computer where the current decryption work is performed is the same computer as the terminal at the time of registration, the comparison result will naturally be the same, which means that the computer where the current decryption work is performed is a legally registered terminal, and the e-books have not been illegally distributed to other unauthorized In the registered computer, the reading application program 322 will continue to decrypt the decrypted electronic book so that the user can read it. If the computer where the current decryption work is performed is not the same as the terminal at the time of registration, the result of this comparison is naturally different, which means that the computer where the current decryption work is performed has not been legally registered, that is to say, the e-book has been illegally distributed to other unregistered users. In the legally registered computer, the reading application program 322 will stop the decryption step, even if the user makes the illegally distributed electronic books unable to decrypt and read.

请参阅图5,图5A为本发明防盗版电脑系统在文件索取程序时于服务器主机端的流程图,图5B为本发明防盗版电脑系统在文件索取程序时于终端的流程图。将上述文件索取程序以流程图500表示如下列步骤:Please refer to FIG. 5 . FIG. 5A is a flow chart of the anti-piracy computer system of the present invention at the server host during the file request process, and FIG. 5B is a flow chart of the anti-piracy computer system of the present invention at the terminal during the file request process. The above-mentioned file request procedure is represented by the flow chart 500 as the following steps:

步骤502:开始;Step 502: start;

步骤504:使用者于网络书店中决定购买某一本电子书籍;Step 504: the user decides to purchase a certain e-book in the online bookstore;

步骤506:服务器主机102处理购买订单并进行必要的确认及认证;Step 506: The server host 102 processes the purchase order and performs necessary confirmation and authentication;

步骤508:订单是否通过查证?是,到步骤512;否,到步骤510;Step 508: Does the order pass verification? Yes, go to step 512; No, go to step 510;

步骤510:拒绝接受此次订单并立即停止交易;到步骤540;Step 510: refuse to accept this order and immediately stop trading; go to step 540;

步骤512:于电子文件数据库276中调出购买的电子书籍的明文;Step 512: Call out the plaintext of the purchased electronic book in the electronic file database 276;

步骤514:于密码数据库274中调出使用者专用的第二加密密钥328;Step 514: Call out the user-specific second encryption key 328 from the password database 274;

步骤516:以此第二加密密钥328对电子书籍的明文加密以形成相对应的密文;Step 516: Encrypt the plaintext of the electronic book with the second encryption key 328 to form a corresponding ciphertext;

步骤518:将密文经由网际网104发送至终端106;Step 518: Send the ciphertext to the terminal 106 via the Internet 104;

步骤520:终端106的阅读应用程序322以第一加密密钥324对终端加密文档326解密;Step 520: the reader application program 322 of the terminal 106 decrypts the terminal encrypted document 326 with the first encryption key 324;

步骤522:解密后取得第二加密密钥328与电脑识别码330;Step 522: obtain the second encryption key 328 and the computer identification code 330 after decryption;

步骤524:取得目前工作所在电脑的电脑识别码318;Step 524: Obtain the computer identification code 318 of the computer where the current work is located;

步骤526:阅读应用程序322对解密所取得的电脑识别码330与目前电脑的电脑识别码318进行对比;Step 526: The reading application program 322 compares the computer identification code 330 obtained by decryption with the computer identification code 318 of the current computer;

步骤528:对比结果是否相同?是,到步骤530;否,到步骤536;Step 528: Are the comparison results the same? Yes, go to step 530; No, go to step 536;

步骤530:目前终端106已确认经过合法注册;Step 530: currently the terminal 106 has confirmed that it has been legally registered;

步骤532:阅读应用程序322以第二加密密钥328对接收到的电子书籍密文解密;Step 532: The reading application program 322 decrypts the received e-book ciphertext with the second encryption key 328;

步骤534:使用者可以阅读解密过后的电子书籍;到步骤540:Step 534: the user can read the decrypted electronic book; to step 540:

步骤536:目前终端未经过合法注册;Step 536: the current terminal has not been legally registered;

步骤538:阅读应用程序322停止解密动作;Step 538: the reading application program 322 stops the decryption action;

步骤540:结束。Step 540: end.

本发明上述的较佳实施例是以私钥密码系统为例加以说明,也就是说对电子书籍加密解密用的是同一把加密密钥,除了资料传输的双方外,其他第三人并不知道加密密钥的内容为何,因此也称为对称型的密码系统,如美国国家标准局所公布的DES演算法,或是Lai及Massey所设计的IDEA演算法,其安全性较强,加解密时运算速度也较快。然而,本发明的电脑系统100同样也可采用公开万用密钥密码系统来对电子书籍加密与解密,也就是说每一个使用者会拥有一把可以公布出来的公开万用密钥,与一把自己保留不能泄漏的私有万用密钥,当服务器主机102的加密模块250对电子书籍加密时,用的是使用者的公开万用密钥,而当阅读应用程序322对接收到的电子书籍密文进行解密时,用的是使用者的私有万用密钥。The above-mentioned preferred embodiment of the present invention is explained by taking the private key cryptosystem as an example, that is to say, the same encryption key is used for encryption and decryption of electronic books, and other third parties do not know it except the two parties of the data transmission. What is the content of the encryption key, so it is also called a symmetric cryptographic system, such as the DES algorithm announced by the National Bureau of Standards, or the IDEA algorithm designed by Lai and Massey, which has strong security and operates during encryption and decryption The speed is also faster. However, the computer system 100 of the present invention can also use the public universal key cryptography system to encrypt and decrypt electronic books, that is to say, each user will have a public universal key that can be published, and a Keep yourself a private universal key that cannot be leaked. When the encryption module 250 of the server mainframe 102 encrypts the electronic book, it uses the user's public universal key, and when the reading application program 322 encrypts the received electronic book When the ciphertext is decrypted, the user's private master key is used.

与现有技术相比较,本发明防盗版电脑系统100的优点在于:Compared with the prior art, the advantages of the anti-piracy computer system 100 of the present invention are:

一、不同使用者或终端所需要的阅读操作平台都是相同的。由于所有使用者都是经由阅读应用程序322与服务器主机102进行注册及文件索取的程序,阅读应用程序322则成为一阅读操作平台,以提供使用者与服务器主机102沟通的桥梁,阅读应用程序322及其中的第一加密密钥324都是事先经过编译完成而可供使用者免费下载或拷贝至任何机器上。由于本发明电脑系统的目的之一在于防止电子书籍推广时所可能造成的盗版现象,也就是防止电子书籍的非法散发,而不在于防止阅读应用程序322本身的散发,同时由于本发明防止电子书籍非法散发的机制主要并不在于阅读应用程序322本身,因此,阅读应用程序322经由使用者大量的下载、拷贝或散发不但不会影响本发明的目的,反而有助于推销电子书籍的概念给使用者,使电子书籍的使用能加速普及。1. The reading operation platforms required by different users or terminals are the same. Since all users register and request documents with the server host 102 through the reading application program 322, the reading application program 322 becomes a reading operation platform to provide a bridge for users to communicate with the server host computer 102, and the reading application program 322 And the first encryption key 324 therein is all completed in advance through compilation and can be downloaded or copied to any machine for free by the user. Because one of the purposes of the computer system of the present invention is to prevent the piracy phenomenon that may be caused when e-books are promoted, that is, to prevent the illegal distribution of e-books, not to prevent the distribution of the reading application program 322 itself, at the same time, because the present invention prevents e-books from The mechanism of illegal distribution is not mainly in the reading application program 322 itself. Therefore, a large number of downloading, copying or distributing of the reading application program 322 by users will not affect the purpose of the present invention, but will help promote the concept of electronic books to users. Those who make the use of e-books can accelerate popularization.

二、使用者在为其所指定的终端注册时,服务器主机102的加密密钥产生模块240会产生一专用于使用者的第二加密密钥。当使用者购买某一本电子书籍时,加密模块250会以此第二加密密钥328对电子书籍的明文加密以形成相对应的密文,发送至使用者所在的终端上,而终端上的阅读应用程序322在确认目前终端经过合法注册后,再以第二加密密钥328对接收到的电子书籍密文解密。由于某些先前技术对不同使用者购买的电子书籍都以相同的加密密钥作加解密,一旦此一加密密钥被破解,则所有电子书籍的密文都可以正确被还原成明文;然而本发明针对每一使用者都有专用的第二加密密钥,因此即使某一使用者的第二加密密钥被破解,仍然无法阅读其他使用者所购买的电子书籍,因此可提高系统的安全性。2. When the user registers on the designated terminal, the encryption key generation module 240 of the server host 102 will generate a second encryption key dedicated to the user. When a user purchases a certain electronic book, the encryption module 250 will encrypt the plaintext of the electronic book with the second encryption key 328 to form a corresponding ciphertext, and send it to the terminal where the user is located, and the The reading application program 322 decrypts the received e-book ciphertext with the second encryption key 328 after confirming that the current terminal is legally registered. Since some prior technologies use the same encryption key to encrypt and decrypt e-books purchased by different users, once the encryption key is cracked, the ciphertext of all e-books can be correctly restored to plaintext; however, this The invention has a dedicated second encryption key for each user, so even if the second encryption key of a certain user is cracked, the e-books purchased by other users cannot be read, so the security of the system can be improved .

三、终端加密文档以加密的形式储存于终端中,可避免使用者不小心更改其中的内容,也可以降低其他人以非法的方式查看并得知其中的内容。3. Terminal encrypted files are stored in the terminal in an encrypted form, which can prevent users from accidentally changing the content, and can also prevent others from viewing and knowing the content in an illegal way.

四、终端加密文档储存于终端,有助于简化因电脑识别码上传所带来的隐私权公开时需使用者同意的复杂程序。由于本发明在认证终端是否经合法注册时所需要的电脑识别码,是借用其中中央处理器的识别码、硬盘的识别码或是网卡的识别码等进行的,而这些识别码的资料依法被视为使用者个人隐私资料之一部分,服务器主机102对于使用者所提出任何这类识别码的取得都要经过使用者的同意,因此,只要服务器主机102想取得终端的电脑识别码都无法规避使用者同意的程序,于是在认证终端是否经合法注册的程序上原本应该会变得较为复杂。然而,依据本发明的设计,当使用者在为其所指定的终端注册时,下传的使用者识别码与第二加密密钥在解密后,会连同代表该终端的电脑识别码会以第一加密密钥加密而产生相对应的终端加密文档,因此在注册程序进行过程中,并不需将电脑识别码上传给服务器主机102。因此当终端接收到使用者所购买电子书籍的密文时,其所执行的后续认证程序所需的电脑识别码是注册时就直接储存于终端中,因此目前工作终端的电脑识别码自然也不必上传至服务器主机102,而可以直接在终端中进行比较及认证的工作,自然简化了因电脑识别码上传所会带来的隐私权公开需要使用者同意的复杂程序及可能的争议。4. The terminal encrypted files are stored in the terminal, which helps to simplify the complicated procedures that require the user's consent when the privacy right is disclosed due to the upload of the computer identification code. Because the computer identification code required by the present invention when verifying whether the terminal is legally registered is carried out by borrowing the identification code of the central processing unit, the identification code of the hard disk or the identification code of the network card, etc., and the data of these identification codes are legally obtained. As part of the user's personal privacy information, the server host 102 must obtain the user's consent for any such identification code proposed by the user. Therefore, as long as the server host 102 wants to obtain the computer identification code of the terminal, it cannot be avoided. Therefore, the procedure for verifying whether the terminal is legally registered should have become more complicated. However, according to the design of the present invention, when a user registers at a terminal designated by the user, after decryption, the user identification code and the second encryption key will be deciphered together with the computer identification code representing the terminal in the form of the first encryption key. An encryption key is encrypted to generate a corresponding terminal encrypted file, so the computer identification code does not need to be uploaded to the server host 102 during the registration process. Therefore, when the terminal receives the ciphertext of the electronic book purchased by the user, the computer identification code required for the subsequent authentication procedure it executes is directly stored in the terminal when it is registered. Therefore, the computer identification code of the current working terminal is naturally unnecessary. Uploading to the server host 102 allows direct comparison and authentication in the terminal, which naturally simplifies the complicated procedures and possible disputes that require the consent of the user due to the disclosure of the privacy right brought about by the uploading of the computer identification code.

五、利用终端加密文档326中所取得的电脑识别码330与目前解密工作所在电脑的电脑识别码318进行对比,可防止“合法购买却非法散发”的情况发生。由于本发明的阅读应用程序322对电子书籍解密前,会先对终端加密文档326中所取得的电脑识别码330与目前解密工作所在电脑的电脑识别码318进行对比,以确认目前解密工作所在电脑与注册当时的终端是同一电脑,其次再决定并阅读应用程序322是否会继续进行电子书籍密文的解密工作。因此,即使电子书籍的密文被非法散发至其他未经合法注册的电脑中,阅读应用程序322会停止解密的步骤,使非法散发的电子书籍无法正确解密而无法进行阅读。5. Using the computer identification code 330 obtained in the terminal encrypted file 326 to compare with the computer identification code 318 of the computer where the current decryption work is performed can prevent the occurrence of "legal purchase but illegal distribution". Before the reading application program 322 of the present invention decrypts the electronic book, it will first compare the computer identification code 330 obtained in the terminal encrypted file 326 with the computer identification code 318 of the computer where the decryption work is currently performed, so as to confirm the computer where the current decryption work is performed. It is the same computer as the terminal at the time of registration, and then it is decided and whether the reading application program 322 will continue to decrypt the ciphertext of the e-book. Therefore, even if the ciphertext of the electronic book is illegally distributed to other computers that are not legally registered, the reading application program 322 will stop the decryption step, so that the illegally distributed electronic book cannot be decrypted correctly and cannot be read.

综上所述,本发明电脑系统提出了一种有效的机制,来防止非经合法注册的终端对电子文件的盗版,因而防止“合法购买却非法散发”的情形,使得电子书籍的经销商因可维持合理的利润而愿意投入于书籍电子化买卖的行列当中,因此使得电子书籍的环保性、效率性、传播性、经济性等多重优点可为全民所共享。To sum up, the computer system of the present invention proposes an effective mechanism to prevent piracy of electronic documents by non-legally registered terminals, thereby preventing the situation of "legal purchase but illegal distribution", which makes electronic book dealers Reasonable profits can be maintained and people are willing to invest in the e-commerce of books. Therefore, the multiple advantages of e-books such as environmental protection, efficiency, dissemination, and economy can be shared by the whole people.

以上所述仅为本发明的较佳实施例,凡依本发明权利要求所做的类似变化与修饰,皆应属本发明专利的涵盖范围。The above descriptions are only preferred embodiments of the present invention, and all similar changes and modifications made according to the claims of the present invention shall fall within the scope of the patent of the present invention.

Claims (10)

1.一种使用于一电脑系统中可防止电子文件盗版的方法,该电脑系统包含一服务器主机,该服务器主机可经由网际网与多个终端相连接,该服务器主机中包含一用户数据库,以记录经由该注册程序所注册的所有合法的使用者及其终端的识别码,该终端还包含一中央处理器、一硬盘以及一网卡,每一终端具有至少一代表该终端的识别码,而该终端的识别码可为该中央处理器的识别码、该硬盘的识别码或是该网卡的识别码,该服务器主机中还包含一公用程序模块,以存放该阅读应用程序并供使用者下载至该终端中储存使用,该终端可经由该网际网向该服务器主机提出索取一电子文件的要求,该服务器主机则可将该电子文件的明文经过加密形成相对应的密文,并经由该网际网发送至该终端,以将该密文解密为原来的明文,该方法包含一注册程序与一文件索取程序,该注册程序包含下列步骤:1. A method for preventing piracy of electronic files used in a computer system, the computer system comprising a server host, the server host can be connected to a plurality of terminals via the Internet, the server host includes a user database, and Record the identification codes of all legal users and their terminals registered through the registration program, the terminal also includes a central processing unit, a hard disk and a network card, each terminal has at least one identification code representing the terminal, and the The identification code of the terminal can be the identification code of the central processing unit, the identification code of the hard disk or the identification code of the network card. The server host also includes a public program module to store the reading application program and download it to the Stored and used in the terminal, the terminal can request an electronic file from the server host through the Internet, and the server host can encrypt the plaintext of the electronic file to form a corresponding ciphertext, and send the electronic file through the Internet sending to the terminal to decrypt the ciphertext into the original plaintext, the method includes a registration procedure and a file request procedure, the registration procedure includes the following steps: 使用者载入一阅读应用程序于终端中,该阅读应用程序包含一第一加密密钥;The user loads a reading application program into the terminal, and the reading application program includes a first encryption key; 使用者利用该阅读应用程序向该服务器主机注册成为合法的终端;The user uses the reading application to register with the server host as a legal terminal; 该服务器主机在完成该终端的合法注册后,会产生一使用者识别码与一使用者专用的第二加密密钥,该使用者识别码与该第二加密密钥经过加密后发送至该合法注册的终端;以及After the server mainframe completes the legal registration of the terminal, it will generate a user identification code and a user-specific second encryption key, and the user identification code and the second encryption key will be encrypted and sent to the legal Registered Terminals; and 该终端的阅读应用程序进一步将接收到的使用者识别码与第二加密密钥连同代表该终端的识别码一并加密以形成一终端加密文档,储存于该合法注册的终端中;The reading application program of the terminal further encrypts the received user identification code and the second encryption key together with the identification code representing the terminal to form a terminal encrypted file, which is stored in the legally registered terminal; 该文件索取程序包含下列步骤:The document request procedure consists of the following steps: 当一终端向该服务器主机提出索取一电子文件的要求时,该服务器主机将该电子文件的明文经过该第二加密密钥的加密而形成相对应的密文,并将该密文经由该网际网发送至该终端;When a terminal requests the server host for an electronic file, the server host encrypts the plaintext of the electronic file with the second encryption key to form a corresponding ciphertext, and transmits the ciphertext through the Internet The network is sent to the terminal; 当该终端的阅读应用程序接收到该密文时,先以该第一加密密钥对该终端加密文档解密,并取得其中的第二加密密钥与该终端的识别码;以及When the reading application program of the terminal receives the ciphertext, it first decrypts the encrypted file of the terminal with the first encryption key, and obtains the second encryption key and the identification code of the terminal; and 当该阅读应用程序把所取得的终端识别码与目前终端的识别码作比较,若结果相同时,即以该第二加密密钥对该接收到的密文解密,否则停止后续的解密动作,以防止非合法的终端对该电子文件的盗版。When the reading application program compares the obtained terminal identification code with the current terminal identification code, if the result is the same, then use the second encryption key to decrypt the received ciphertext, otherwise stop the subsequent decryption action, To prevent piracy of the electronic file by non-legal terminals. 2.如权利要求1的方法,其中该服务器主机中包含一加密密钥产生模块,该加密密钥产生模块会为该用户数据库中所注册的不同使用者分别产生该使用者专用的第二加密密钥。2. The method according to claim 1, wherein the server host includes an encryption key generation module, and the encryption key generation module will generate the user-specific second encryption for different users registered in the user database. key. 3.如权利要求2的方法,其中该服务器主机中包含一密码数据库,该密码数据库中储存有所有经过注册的使用者资料及其专用的第二加密密钥。3. The method according to claim 2, wherein the server host includes a password database, and all registered user data and their specific second encryption keys are stored in the password database. 4.如权利要求1的方法,其中该服务器主机中包含一电子文件数据库以储存多个电子文件的明文资料,以及一控制中心,用来控制该服务器主机的操作。4. The method according to claim 1, wherein the server host includes an electronic file database for storing plaintext data of a plurality of electronic files, and a control center for controlling the operation of the server host. 5.如权利要求4的方法,其中当该服务器主机收到索取该电子文件的要求时,该控制中心会从该电子文件数据库调出该电子文件的明文资料,而该加密模块会以该第二加密密钥对该电子文件的明文加密,以形成相对应的密文。5. The method according to claim 4, wherein when the server host receives a request for the electronic file, the control center will retrieve the plaintext information of the electronic file from the electronic file database, and the encryption module will use the first The second encryption key encrypts the plaintext of the electronic file to form a corresponding ciphertext. 6.如权利要求1的方法,其中该第一加密密钥与该第二加密密钥皆为具有128位的序列。6. The method of claim 1, wherein both the first encryption key and the second encryption key are sequences of 128 bits. 7.一种可防止电子文件盗版的电脑系统,该电脑系统包含一服务器主机可经由一网际网与多个终端相连接,该终端包含一中央处理器、一硬盘以及一网卡,每一终端具有至少一代表该终端的识别码,而该终端的识别码可为该中央处理器的识别码、该硬盘的识别码或是该网卡的识别码,该终端可经由该网际网向该服务器主机提出索取一电子文件的要求,该服务器主机则可将该电子文件的明文经过加密形成相对应的密文,并经由该网际网发送至该终端,以将该密文解密为原来的明文,该服务器主机包含:7. A computer system capable of preventing piracy of electronic files, the computer system comprising a server host that can be connected to a plurality of terminals via the Internet, the terminals comprising a central processing unit, a hard disk and a network card, each terminal having At least one identification code representing the terminal, and the identification code of the terminal can be the identification code of the central processing unit, the identification code of the hard disk or the identification code of the network card, and the terminal can propose to the server host via the Internet Request for an electronic file, the server host can encrypt the plaintext of the electronic file to form a corresponding ciphertext, and send it to the terminal via the Internet to decrypt the ciphertext into the original plaintext, the server The host contains: 一公用程序模块,以存放包含一第一加密密钥的阅读应用程序,该阅读应用程序可供使用者下载至该终端中储存使用;A public program module for storing a reading application program including a first encryption key, the reading application program can be downloaded by the user to the terminal for storage and use; 一注册模块,当使用者利用该终端的阅读应用程序向该服务器主机注册时,该注册模块会产生一使用者识别码并将该终端注册为一合法的终端;A registration module, when the user registers with the server host using the reading application program of the terminal, the registration module will generate a user identification code and register the terminal as a legal terminal; 一用户数据库,以记录所有合法注册的使用者及其终端的识别码;A user database to record all legally registered users and their terminal identification codes; 一加密密钥产生模块,用来产生一使用者专用的第二加密密钥;以及an encryption key generation module, used to generate a user-specific second encryption key; and 一加密模块,用来将该使用者识别码与该第二加密密钥加密,并发送至该合法注册的终端中;An encryption module, used to encrypt the user identification code and the second encryption key, and send them to the legally registered terminal; 其中该终端的阅读应用程序进一步将接收到的使用者识别码与第二加密密钥连同代表该终端的电脑识别码一并加密以形成一终端加密文档,储存于该合法注册的终端中,而当一终端向该服务器主机提出索取一电子文件的要求时,该加密模块以该第二加密密钥将该电子文件的明文加密而形成相对应的密文,并将该密文经由该网际网发送至该终端,当该终端的阅读应用程序接收到该密文时,会先以该第一加密密钥对该终端加密文档解密,并取得其中的第二加密密钥与该识别码,而当该阅读应用程序比较所取得的识别码与目前终端的识别码为相同时,以该第二加密密钥对该接收到的密文解密,否则停止后续的解密动作,以防止非合法的终端对该电子文件的盗版。Wherein the reading application program of the terminal further encrypts the received user identification code and the second encryption key together with the computer identification code representing the terminal to form a terminal encrypted file, which is stored in the legally registered terminal, and When a terminal requests the server host for an electronic file, the encryption module encrypts the plaintext of the electronic file with the second encryption key to form a corresponding ciphertext, and transmits the ciphertext through the Internet sent to the terminal, when the reading application program of the terminal receives the ciphertext, it will first decrypt the encrypted document of the terminal with the first encryption key, and obtain the second encryption key and the identification code, and When the identification code obtained by the reading application program is the same as the identification code of the current terminal, the received ciphertext is decrypted with the second encryption key, otherwise the subsequent decryption action is stopped to prevent illegal terminals Piracy of the electronic document. 8.如权利要求7的电脑系统,其中该服务器主机中包含一密码数据库,该密码数据库中储存有所有经过注册的使用者资料及其专用的第二加密密钥。8. The computer system according to claim 7, wherein the server host includes a password database, and all registered user information and their specific second encryption keys are stored in the password database. 9.如权利要求7的电脑系统,其中该服务器主机中包含一电子文件数据库以储存多个电子文件的明文资料,以及一控制中心,用来控制该服务器主机的操作。9. The computer system according to claim 7, wherein the server host includes an electronic file database for storing plaintext data of a plurality of electronic files, and a control center for controlling the operation of the server host. 10.如权利要求7的电脑系统,其中该第一加密密钥与该第二加密密钥皆为具有128位的序列。10. The computer system of claim 7, wherein both the first encryption key and the second encryption key are sequences with 128 bits.
CNB00126088XA 2000-08-31 2000-08-31 Method and system for preventing electronic file piracy Expired - Fee Related CN1141678C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB00126088XA CN1141678C (en) 2000-08-31 2000-08-31 Method and system for preventing electronic file piracy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB00126088XA CN1141678C (en) 2000-08-31 2000-08-31 Method and system for preventing electronic file piracy

Publications (2)

Publication Number Publication Date
CN1340795A CN1340795A (en) 2002-03-20
CN1141678C true CN1141678C (en) 2004-03-10

Family

ID=4591737

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB00126088XA Expired - Fee Related CN1141678C (en) 2000-08-31 2000-08-31 Method and system for preventing electronic file piracy

Country Status (1)

Country Link
CN (1) CN1141678C (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI676115B (en) * 2018-07-13 2019-11-01 優碩資訊科技股份有限公司 System and method for managing certification for cloud service system

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1956449B (en) 2005-10-28 2011-05-18 北京书生国际信息技术有限公司 Data resource anti-duplication encryption transmission method and equipment system
CN101841411B (en) * 2005-10-28 2012-01-18 北京书生国际信息技术有限公司 Data resource anti-copying encrypted transmission method and device system
US7493494B2 (en) * 2005-11-03 2009-02-17 Prostor Systems, Inc. Secure data cartridge
CN102347836A (en) * 2010-04-30 2012-02-08 龚华清 Electronic document protected view system and method
CN102118685A (en) * 2011-01-20 2011-07-06 中国联合网络通信集团有限公司 Method and system for pushing electronic book, and server
CN105100228B (en) * 2012-07-03 2020-06-26 厦门润丰投资有限公司 Cloud server and copy system of digital resources
CN110008654B (en) * 2018-01-04 2021-04-09 北大方正集团有限公司 Electronic document processing method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI676115B (en) * 2018-07-13 2019-11-01 優碩資訊科技股份有限公司 System and method for managing certification for cloud service system

Also Published As

Publication number Publication date
CN1340795A (en) 2002-03-20

Similar Documents

Publication Publication Date Title
TW486902B (en) Method capable of preventing electronic documents from being illegally copied and its system
Choudhury et al. Copyright protection for electronic publishing over computer networks
JP4750352B2 (en) How to get a digital license for digital content
EP1376980B1 (en) Secure server plug-in architecture for digital rights management systems
US8660961B2 (en) Method, system, and device for license-centric content consumption
JP4847701B2 (en) Obtaining digital content signed rights labels (SRLs) using flexible rights templates in a rights management system
JP4418648B2 (en) System and method for issuing licenses for use of digital content and services
CN100576148C (en) Systems and methods for providing secure server key operations
EP1460511B1 (en) Reviewing cached user-group information in connection with issuing a digital rights management (DRM) license for content
CN100338905C (en) Method of binding digital contents and hardware with hardward adaptive
JP2005536951A (en) Apparatus, system, and method for securing digital documents in a digital device
US20060106726A1 (en) Method, system, and device for license-centric content consumption
US20040158709A1 (en) Publishing digital content within a defined universe such as an organization in accordance with a digital rights management (DRM) system
US20120066494A1 (en) Controlling Download and Playback of Media Content
CN1191643A (en) System and method for access control of data storage media
JP2002527009A (en) Method and system for distributing access to data items
CN1822018A (en) Flexible licensing architecture in content rights management systems
WO2020156400A1 (en) Digital artwork display device, management method, and electronic device
EP1829270A2 (en) Method, system, and device for license-centric content consumption
US20250284609A1 (en) System and Method for Secure Internet Communications
CN1141678C (en) Method and system for preventing electronic file piracy
WO2006054987A1 (en) Method, system, and device for license-centric content consumption
CN1759363A (en) Distribution and rights management of digital content
CN106453273B (en) A kind of information insurance management system and method based on cloud
CN1343938A (en) Method and system for controlling lease validity period of electronic files

Legal Events

Date Code Title Description
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C06 Publication
PB01 Publication
C14 Grant of patent or utility model
GR01 Patent grant
C19 Lapse of patent right due to non-payment of the annual fee
CF01 Termination of patent right due to non-payment of annual fee