CN116418503A - Audio copyright protection method, system and medium - Google Patents
Audio copyright protection method, system and medium Download PDFInfo
- Publication number
- CN116418503A CN116418503A CN202310478570.0A CN202310478570A CN116418503A CN 116418503 A CN116418503 A CN 116418503A CN 202310478570 A CN202310478570 A CN 202310478570A CN 116418503 A CN116418503 A CN 116418503A
- Authority
- CN
- China
- Prior art keywords
- audio
- file
- digital certificate
- result file
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 238000012795 verification Methods 0.000 claims abstract description 44
- 238000005070 sampling Methods 0.000 claims description 16
- 238000004590 computer program Methods 0.000 claims description 12
- 230000005236 sound signal Effects 0.000 claims description 10
- 238000004422 calculation algorithm Methods 0.000 claims description 8
- 230000007274 generation of a signal involved in cell-cell signaling Effects 0.000 claims description 7
- 238000006243 chemical reaction Methods 0.000 claims description 6
- 230000005237 high-frequency sound signal Effects 0.000 claims description 3
- 230000005238 low-frequency sound signal Effects 0.000 claims description 3
- 238000012935 Averaging Methods 0.000 claims description 2
- 230000006870 function Effects 0.000 description 4
- 230000008520 organization Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000012360 testing method Methods 0.000 description 2
- 101100384355 Mus musculus Ctnnbip1 gene Proteins 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 210000005069 ears Anatomy 0.000 description 1
- 229940053973 novocaine Drugs 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- MFDFERRIHVXMIY-UHFFFAOYSA-N procaine Chemical compound CCN(CC)CCOC(=O)C1=CC=C(N)C=C1 MFDFERRIHVXMIY-UHFFFAOYSA-N 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L19/00—Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
- G10L19/018—Audio watermarking, i.e. embedding inaudible data in the audio signal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Computational Linguistics (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- Acoustics & Sound (AREA)
- Multimedia (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to the field of audio encryption, and particularly discloses an audio copyright protection method, an audio copyright protection system and an audio copyright protection medium, wherein the audio copyright protection method, the audio copyright protection system and the audio copyright protection medium comprise the steps of generating a key pair to obtain a public key and a private key; generating an interference signal; adding the interference data into an audio file through audio mixing to generate an intermediate file; calculating a message digest, signing the message digest by using a private key to obtain a digital signature, and generating a digital certificate by using a public key; adding a digital signature on the intermediate file to obtain a result file; uploading a result file and a digital certificate to a server; when the audio file needs to be played, the playing authority of the client is checked, and after the verification is passed, a digital certificate and a result file are obtained from the server; and verifying whether the digital signature in the result file is correct by using the digital certificate. The invention can ensure the integrity and the originality of the record file, and prevent the audio from being tampered or copied through a verification mechanism and anti-dubbing interference; the rights and interests of the copyright holders of audio are protected so that the playback and distribution of audio is controlled.
Description
Technical Field
The present invention relates to the field of audio encryption, and in particular, to a method, a system, and a medium for protecting audio copyrights.
Background
With the development of modern digital technology and internet technology, traditional copyrighted audio files that rely on physical media for distribution have been gradually replaced by digital audio files that rely on the internet for direct distribution.
However, the advent of digitized audio has made the dissemination of audio easier and the copyright protection of audio more difficult. Once the audio is digitized, it can be easily propagated and duplicated over the network without paying or obtaining a license, with very low piracy costs and with difficulty in being battled and protected.
Due to the convenience of audio distribution and the ease of copying, it is difficult for copyright owners to control the distribution and use of audio. Even though the use of audio is limited by digital rights management techniques, hackers and pirates may still break through these techniques to obtain and use copyrighted audio in an improper way.
Disclosure of Invention
In order to solve the problem of difficult copyright protection when the existing audio is transmitted through a digital channel, the invention provides an audio copyright protection method, an audio copyright protection system and a medium.
The invention provides an audio copyright protection method, which is used for protecting the copyright of an audio file during uploading and playing, and comprises the following steps:
generating a key pair to obtain a public key and a private key;
generating an interference signal;
converting the interference signal into corresponding interference data according to the format of the audio file;
adding the interference data into the audio file through audio mixing to generate an intermediate file;
calculating a message abstract of the intermediate file, signing the message abstract by using a private key to obtain a digital signature, and generating a digital certificate by using a public key;
adding the digital signature on the intermediate file to obtain a result file;
uploading the result file and the digital certificate to a server;
when the client requests to play the result file, acquiring the digital certificate and the result file from the server;
verifying, with the digital certificate, whether the digital signature in the result file is correct;
and if so, playing the result file.
Preferably, the interference signal is randomly generated, and is used for not affecting the user to listen to when the audio file is played, but only affecting the low-frequency and/or high-frequency sound signals recorded by the recording device.
Preferably, when the client requests to play the result file, the digital certificate and the result file are obtained from the server, specifically:
the client acquires an encryption time stamp and a one-time key from the server;
randomly combining the local mac address, the encryption time stamp and the one-time key to obtain six combination results;
six combined results are sent to a server for six times of verification;
when the result of six times of verification is that one time succeeds and five times of verification fail, the local verification is successful, and the server sends the digital certificate and the result file to the client;
otherwise, the verification fails, and the server refuses the access of the client.
Preferably, the converting the interference signal into the corresponding interference data according to the format of the audio file specifically includes:
analyzing the audio file, and acquiring sampling frequency, sampling bit depth, sound channel number and total duration of the audio file as format parameters of the interference data;
calculating the sampling number of the interference data;
and sampling the interference signal according to the sampling number, and storing the interference signal as the interference data according to the format parameter.
Preferably, the adding the interference data to the audio file through audio mixing generates an intermediate file, which specifically includes:
respectively weighted averaging each sampling point of the interference signal and the audio signal by adopting a linear mixing algorithm to obtain a mixed signal;
and storing the mixed signals as an intermediate file according to the format parameters.
Preferably, the uploading the result file and the digital certificate to a server specifically includes:
uploading the result file to an audio management server, and uploading the digital certificate to a server of a digital certificate authority.
Preferably, the adding the digital signature to the intermediate file obtains a result file, specifically:
and adding the digital signature on the intermediate file, and encrypting the intermediate file by utilizing the digital signature to obtain a result file.
Preferably, said verifying with said digital certificate whether said digital signature in said result file is correct; if yes, playing the result file; the method comprises the following steps:
verifying, with the digital certificate, whether the digital signature in the result file is correct;
if yes, decrypting the intermediate file by using the digital signature, and playing the decrypted file;
otherwise, feeding back the playing failure information.
The invention also provides an audio copyright protection device, which comprises: the device comprises a secret key module, a signal generation module, a conversion module, a sound mixing module, a signature generation module, a result module, an uploading module, a first verification module and a second verification module;
the key module is used for generating a key pair to obtain a public key and a private key;
the signal generation module is used for generating an interference signal;
the conversion module is used for converting the interference signal into corresponding interference data according to the format of the audio file;
the audio mixing module is used for adding the interference data into the audio file through audio mixing to generate an intermediate file;
the signature generation module is used for calculating a message abstract of the intermediate file, signing the message abstract by using a private key to obtain a digital signature, and generating a digital certificate by using a public key;
the result module is used for adding the digital signature to the intermediate file to obtain a result file;
the uploading module is used for uploading the result file and the digital certificate to a server;
the first verification module is used for acquiring the digital certificate and the result file from the server when the client requests to play the result file;
the second verification module is used for verifying whether the digital signature in the result file is correct or not by utilizing the digital certificate; and if so, playing the result file.
The invention provides a terminal device, which comprises a processor and a storage device, wherein the storage device is used for storing one or more programs; the processor implements the above-described audio copy protection method when the one or more programs are executed by the processor.
The invention provides a computer readable storage medium, which comprises a stored computer program, wherein the computer program is used for controlling equipment where the computer readable storage medium is located to execute the audio copyright protection method.
The beneficial effects of the invention are as follows:
(1) The integrity and the originality of the recorded file can be ensured by creating a digital signature when the audio recording is completed or uploaded, and the audio is prevented from being tampered or copied by a verification mechanism; the rights and interests of the copyright holders of audio are protected so that audio playback and distribution are controllable.
(2) By mixing the interference audio signal preventing the dubbing before uploading the recording file, the recording device is prevented from dubbing while the listening of a listener is not affected.
Drawings
The invention will be further described with reference to the accompanying drawings, in which:
FIG. 1 is a flow chart of a method according to one embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, as one implementation of the present invention, starting from two aspects of audio generation and audio playing, an audio copyright protection method is implemented, which specifically includes the steps of:
s1, generating a key pair to obtain a public key and a private key;
s2, generating an interference signal;
s3, converting the interference signal into corresponding interference data according to the format of the audio file;
s4, adding the interference data into the audio file through audio mixing to generate an intermediate file;
s5, calculating a message abstract of the intermediate file, signing the message abstract by using a private key to obtain a digital signature, and generating a digital certificate by using a public key;
s6, adding a digital signature on the intermediate file to obtain a result file;
s7, uploading the result file and the digital certificate to a server;
s8, when the client requests to play the result file, acquiring the digital certificate and the result file from the server;
s9, verifying whether the digital signature in the result file is correct or not by using the digital certificate;
s10, if so, playing the result file;
s11, if not, feeding back the playing failure information.
Preferably, the disturbing signal is a low-frequency and/or high-frequency sound signal for not affecting the user to listen to the audio signal when the audio file is played, which only affects the recording of the recording device.
Preferably, the public and private keys of the present embodiment are a pair of RSA keys.
Preferably, the step S7 includes the following steps:
s71, uploading a result file to an audio management server;
s72, uploading the digital certificate to a digital certificate authority server.
The key verification of the embodiment is realized by verifying through a digital certificate issuing organization, and the security and the legality of verification are ensured by uploading the digital certificate to a digital certificate issuing organization server.
Preferably, the embodiment also carries out digital encryption and decryption on the audio file through digital signature pair, so as to prevent other software from cracking the file verification process to steal the audio content; the step S6 specifically includes the following steps:
s61, adding a digital signature on the intermediate file, and encrypting the intermediate file by utilizing the digital signature to obtain a result file;
the steps S9 to S11 specifically include:
s91, verifying whether the digital signature in the result file is correct or not by using the digital certificate;
s101, if yes, decrypting the intermediate file by using the digital signature, and playing the decrypted file;
and S111, otherwise, feeding back the playing failure information.
The embodiment also discloses an audio copyright protection system, which comprises: the device comprises a secret key module, a signal generation module, a conversion module, a sound mixing module, a signature generation module, a result module, an uploading module, a first verification module and a second verification module;
the key module is used for generating a key pair to obtain a public key and a private key;
the signal generation module is used for generating an interference signal;
the conversion module is used for converting the interference signal into corresponding interference data according to the format of the audio file;
the audio mixing module is used for adding the interference data into the audio file through audio mixing to generate an intermediate file;
the signature generation module is used for calculating a message abstract of the intermediate file, signing the message abstract by using a private key to obtain a digital signature, and generating a digital certificate by using a public key;
the result module is used for adding a digital signature on the intermediate file to obtain a result file;
the uploading module is used for uploading the result file and the digital certificate to the server;
the first verification module is used for acquiring the digital certificate and the result file from the server when the client requests to play the result file;
the second checking module is used for checking whether the digital signature in the result file is correct or not by using the digital certificate; if so, the result file is played.
In other embodiments, the scheme for verifying whether the local player is legal is not limited to online verification and local verification, but modes of preventing code decompilation, using a secure socket layer proxy, code confusion and the like can be adopted to ensure that the player software is safe and legal.
Wherein the Message Digest (Message Digest) is also called a Digital Digest (Digital Digest); it is a fixed length value that uniquely corresponds to a message or text and is generated by acting on the message with a one-way Hash encryption function. The value generated using the digital digest is not tamperable in order to secure the file or value.
As another embodiment of the present solution, as one of the specific application procedures of the present embodiment, the digital rights management step using digital signatures may be simplified as the following four steps:
a1, generating a digital certificate: firstly, a digital certificate is required to be applied to a digital certificate issuing organization to acquire a public key and certificate information required by digital signature;
a2, signing digital information: signing the audio or other digital information by using a private key to generate a digital signature;
a3, distributing digital information and digital signature: distributing the digital information to the user together with the digital signature;
a4, verifying the digital signature: the user verifies the digital signature using the public key in the digital certificate to ensure the authenticity and integrity of the digital information.
The digital signature process of the file in this embodiment is specifically as follows:
the generated RSA key pair has the public key:
(65537,19480326673824308788388920840664695884000984574095238256561113000594458471459958089017942938195589919416143 77783831315090570726898093860454502546349032921142729389713 69239268907455308586799444274076479533676262774156839324985 385382257114172033050547785147893711760846800013376471794708639541343473526504159);
the private key is:
(11473570301547183340133750196347134565103429077192632098679811129313297433330303281028405257851872918706492678147 07875275515296289941853726919770102433644251343163283505709 82488890932522301550576344221210856471068023736926609844548 995128174143429211745390415224708578865642902160684370066930551506172148371,19480326673824308788388920840664695884000984574095238256561113000594458471459958089017942938195589919 41614377783831315090570726898093860454502546349032921142729 38971369239268907455308586799444274076479533676262774156839 324985385382257114172033050547785147893711760846800013376471794708639541343473526504159)
generating a message digest: before the audio file is saved, the author uses the SHA-256 hash algorithm to calculate a message digest. For example, hash calculation is performed on the sound recording file, so that a message digest is obtained as follows:
"0e7db80309a880d8127f9cc27603abccfba8e1e2d7bb0f983b98e7d31f3b0d1c"。
signing the message abstract by using a private key to obtain a digital signature:
"b47082f1c2d8c7926e940a6f82a6eb75ec6dd8f41b3506c670b6e2e46a8b88835e21c08e50f55075f6b8e6f5543d0eb0e5b5de731d8e4e1d2e4c0c4ee4d8f1051a89a201a153a57df007eab7c29b3f20471ef26ac69a70fa1aaf890b79265c53b6d77a36f09d9200cbfc54f70fc9ca499301cc2b049120c8d”。
the present embodiment uses the crynography library of Python to complete the digital signature and verification process, and the example codes are as follows:
the code uses RSA key pair, SHA-256 hash algorithm and PSS filling scheme to complete the digital signature and verification process.
The interference signal generation and mixing process is realized through a DSP processing technology, specifically, a digital signal of the interference signal is created in a shift and is realized by using an AVAudio mixer, and the steps are simplified as follows:
b1, defining parameters such as sampling rate, bit depth, channel number, duration and the like of an interference signal;
b2, calculating the sampling number of the interference signal;
b3, creating an AVAudio format object for describing the audio format of the interference signal;
b4, creating an AVAudio buffer object for storing audio data of the interference signal;
and B5, generating digital signal data of the interference signals by using a Swift mathematical library or a third party library, such as an accelate framework, a Novocaine library and the like.
Specific application examples of the present embodiment are as follows:
a sine wave of 440Hz is generated using the s in function of Swift:
in practical use, parameters such as frequency, amplitude, waveform and the like of the interference signals can be adjusted as required to generate different interference signals. Meanwhile, care needs to be taken to set format parameters of the interference signal and the audio signal to ensure that the two can be mixed.
Mixing the generated AVAudio buffer object with the audio signal can realize the addition of a specific interference signal while playing the audio signal. In this embodiment, when Mixing an interference signal with an audio signal, a Linear Mixing (Linear Mixing) algorithm is used, which is the most basic Mixing method, and the specific means is to perform weighted average on two signals and then output the mixed signal. The specific implementation of the mixed interference signal and the audio signal of the embodiment adopts the following codes:
the code adds the interference signal to each sampling point of the audio signal to obtain a mixed signal. In this process, it is necessary to ensure that the format parameters (sampling rate, bit depth, number of channels) of the two signals are the same, otherwise anomalies in the mixing result may occur.
In other embodiments, the audio playing can also adopt a manner that a server dynamically joins the DSP at any time to prevent the dubbing.
In other embodiments, the scheme in generating audio is not limited to recording, and other encryption algorithms may be used.
When playing the audio, the procedure of this embodiment is as follows:
c1, installing a designated player, and creating a local key (acquiring the mac address of the current device for encryption, the encryption timestamp of a server and a disposable key, transmitting the encrypted local key to the server for storage, and storing the encrypted timestamp of the server and the disposable key in the local after re-encryption, which is temporarily called as a local key');
when the player plays the protected audio, the first step is to check whether the current player is a legal player (through online verification and local verification);
and C3, after verifying that the player is legal, the player verifies the digital signature of the audio and plays the audio.
In the embodiment, the DSP interference signal is synchronously played during audio playing, so that the audio is prevented from being recorded. Because the interference signal adopts a high-frequency or low-frequency signal outside the listening range of the human ears, only the user is interfered to record, so that the recorded audio is distorted and mixed with noise, and the normal audio playing behavior of the user is not influenced.
The specific local verification algorithm adopted by the verification client in this embodiment is specifically as follows:
encrypting the obtained mac address of the current playing device by adopting a random generation combination algorithm, and simultaneously reading a local key existing locally before to decrypt; and obtaining a server encryption time stamp and a one-time key after decryption. The local mac address, the server encryption timestamp, and the one-time key are randomly combined. Checking the server for 6 times.
In the 6 times of verification, 1 time of success and 5 times of failure must be verified, and then the local verification is successful.
The local mac address (assumed to be a), the server encryption timestamp (assumed to be B), the one-time key (assumed to be C) are randomly combined.
The random combination condition can be deduced through permutation and combination, and comprises the following steps: ABC, ACB, BAC, BCA, CAB, CBA there are six cases. When the result of six times of verification is that one time succeeds and five times of verification fail, the local verification is successful, and the server sends the digital certificate and the result file to the client; otherwise, the verification fails, and the server refuses the access of the client
If the verification information is acquired by other people, a real key cannot be obtained from the current 6 keys.
When the current 6 keys are directly taken to carry out decryption verification on other devices, local verification fails due to mismatching of information such as mac addresses.
In other embodiments, the player also needs to perform online authentication, and uses methods such as user name and password authentication, mailbox authentication, short message authentication or authentication code authentication to authenticate the identity of the user by communicating with the server.
The invention also discloses a terminal device, which comprises a processor and a storage device, wherein the storage device is used for storing one or more programs; the processor implements the audio copy protection method described above when one or more programs are executed by the processor. The processor may be a central processing unit (Central Process ing Unit, CPU), other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Appl icat ion Specific Integrated Circuit, ASIC), off-the-shelf programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like, referred to as a control center for the test equipment, that interfaces and lines to various parts of the overall test equipment.
The storage means may be used for storing computer programs and/or modules, and the processor may implement various functions of the terminal device by running or executing the computer programs and/or modules stored in the storage means, and invoking data stored in the storage means. The storage device may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function, and the like; the storage data area may store data created according to the use of the terminal device, etc. In addition, the storage device may include high-speed random access memory, and may also include non-volatile memory, such as a hard disk, memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash Card (Flash Card), at least one disk storage device, a Flash memory device, or other volatile solid-state storage device.
Wherein the integrated modules/units of the audio rights protection device may be stored in a computer readable storage medium if implemented in the form of software functional units and sold or used as a stand alone product. Based on such understanding, the present invention may implement all or part of the flow of the method of the above-described embodiments, or may be implemented by a computer program to instruct related hardware, and the computer program may be stored in at least one computer readable storage medium, where the computer program, when executed by a processor, may implement the steps of each of the method embodiments described above. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, executable files or in some intermediate form, etc. The computer readable medium may include: any entity or device capable of carrying computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), an electrical carrier signal, a telecommunications signal, a software distribution medium, and so forth.
It should be noted that the embodiments of the apparatus and device described above are only schematic, where the units described as separate units may or may not be physically separated, and units shown as units may or may not be physical units, may be located in one place, or may be distributed over multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
Claims (10)
1. An audio copyright protection method for protecting the copyright of an audio file during uploading and playing, which is characterized by comprising the following steps:
generating a key pair to obtain a public key and a private key;
generating an interference signal;
converting the interference signal into corresponding interference data according to the format of the audio file;
adding the interference data into the audio file through audio mixing to generate an intermediate file;
calculating a message abstract of the intermediate file, signing the message abstract by using a private key to obtain a digital signature, and generating a digital certificate by using a public key;
adding the digital signature on the intermediate file to obtain a result file;
uploading the result file and the digital certificate to a server;
when the client requests to play the result file, acquiring the digital certificate and the result file from the server;
verifying, with the digital certificate, whether the digital signature in the result file is correct;
and if so, playing the result file.
2. An audio copyright protection method according to claim 1, characterized in that said disturbing signals are randomly generated for influencing the playback of said audio file without affecting the user's listening, only the low-frequency and/or high-frequency sound signals recorded by the recording device.
3. The audio copyright protection method according to claim 1, wherein when the client requests to play the result file, the digital certificate and the result file are obtained from the server, specifically:
the client acquires an encryption time stamp and a one-time key from the server;
randomly combining the local mac address, the encryption time stamp and the one-time key to obtain six combination results;
six combined results are sent to a server for six times of verification;
when the result of six times of verification is that one time succeeds and five times of verification fail, the local verification is successful, and the server sends the digital certificate and the result file to the client;
otherwise, the verification fails, and the server refuses the access of the client.
4. The audio copyright protection method according to claim 1, wherein the converting the interference signal into the corresponding interference data according to the format of the audio file is specifically as follows:
analyzing the audio file, and acquiring sampling frequency, sampling bit depth, sound channel number and total duration of the audio file as format parameters of the interference data;
calculating the sampling number of the interference data;
and sampling the interference signal according to the sampling number, and storing the interference signal as the interference data according to the format parameter.
5. The audio copyright protection method according to claim 4, wherein the adding the interference data to the audio file by mixing sound generates an intermediate file, specifically:
respectively weighted averaging each sampling point of the interference signal and the audio signal by adopting a linear mixing algorithm to obtain a mixed signal;
and storing the mixed signals as an intermediate file according to the format parameters.
6. The audio copyright protection method according to claim 1, wherein the uploading the result file and the digital certificate to a server is specifically:
uploading the result file to an audio management server, and uploading the digital certificate to a server of a digital certificate authority.
7. The audio copyright protection method according to claim 1, wherein the adding the digital signature to the intermediate file obtains a result file, specifically:
and adding the digital signature on the intermediate file, and encrypting the intermediate file by utilizing the digital signature to obtain a result file.
8. The audio copyright protection method according to claim 7, wherein said verifying whether said digital signature in said result file is correct using said digital certificate; if yes, playing the result file; the method comprises the following steps:
verifying, with the digital certificate, whether the digital signature in the result file is correct;
if yes, decrypting the intermediate file by using the digital signature, and playing the decrypted file;
otherwise, feeding back the playing failure information.
9. An audio copyright protection system, comprising: the device comprises a secret key module, a signal generation module, a conversion module, a sound mixing module, a signature generation module, a result module, an uploading module, a first verification module and a second verification module;
the key module is used for generating a key pair to obtain a public key and a private key;
the signal generation module is used for generating an interference signal;
the conversion module is used for converting the interference signal into corresponding interference data according to the format of the audio file;
the audio mixing module is used for adding the interference data into the audio file through audio mixing to generate an intermediate file;
the signature generation module is used for calculating a message abstract of the intermediate file, signing the message abstract by using a private key to obtain a digital signature, and generating a digital certificate by using a public key;
the result module is used for adding the digital signature to the intermediate file to obtain a result file;
the uploading module is used for uploading the result file and the digital certificate to a server;
the first verification module is used for acquiring the digital certificate and the result file from the server when the client requests to play the result file;
the second verification module is used for verifying whether the digital signature in the result file is correct or not by utilizing the digital certificate; and if so, playing the result file.
10. A computer readable storage medium, characterized in that the computer readable storage medium comprises a stored computer program, wherein the computer program, when run, controls a device in which the computer readable storage medium is located to perform the audio rights protection method according to any one of claims 1 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310478570.0A CN116418503B (en) | 2023-04-27 | 2023-04-27 | Audio copyright protection method, system and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310478570.0A CN116418503B (en) | 2023-04-27 | 2023-04-27 | Audio copyright protection method, system and medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116418503A true CN116418503A (en) | 2023-07-11 |
CN116418503B CN116418503B (en) | 2024-07-02 |
Family
ID=87059509
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310478570.0A Active CN116418503B (en) | 2023-04-27 | 2023-04-27 | Audio copyright protection method, system and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116418503B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117979051A (en) * | 2024-01-17 | 2024-05-03 | 广东保伦电子股份有限公司 | Audio anti-counterfeiting method, equipment and medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6385596B1 (en) * | 1998-02-06 | 2002-05-07 | Liquid Audio, Inc. | Secure online music distribution system |
US20040006701A1 (en) * | 2002-04-13 | 2004-01-08 | Advanced Decisions Inc. | Method and apparatus for authentication of recorded audio |
US6904153B1 (en) * | 1998-05-04 | 2005-06-07 | Spiro J. Pandelidis High Tech Applications | Anti-copying system for audio signals |
US20170064246A1 (en) * | 2015-08-28 | 2017-03-02 | Pegasus Media Security, Llc | System and method for preventing unauthorized recording, retransmission and misuse of audio and video |
CN112261012A (en) * | 2020-09-30 | 2021-01-22 | 北京鸿联九五信息产业有限公司 | Browser, server and webpage access method |
CN112261040A (en) * | 2020-10-21 | 2021-01-22 | 厦门悦讯信息科技股份有限公司 | Online audio and video anti-theft method and system |
CN113676452A (en) * | 2021-07-15 | 2021-11-19 | 北京思特奇信息技术股份有限公司 | Replay attack resisting method and system based on one-time secret key |
-
2023
- 2023-04-27 CN CN202310478570.0A patent/CN116418503B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6385596B1 (en) * | 1998-02-06 | 2002-05-07 | Liquid Audio, Inc. | Secure online music distribution system |
US6904153B1 (en) * | 1998-05-04 | 2005-06-07 | Spiro J. Pandelidis High Tech Applications | Anti-copying system for audio signals |
US20040006701A1 (en) * | 2002-04-13 | 2004-01-08 | Advanced Decisions Inc. | Method and apparatus for authentication of recorded audio |
US20170064246A1 (en) * | 2015-08-28 | 2017-03-02 | Pegasus Media Security, Llc | System and method for preventing unauthorized recording, retransmission and misuse of audio and video |
CN112261012A (en) * | 2020-09-30 | 2021-01-22 | 北京鸿联九五信息产业有限公司 | Browser, server and webpage access method |
CN112261040A (en) * | 2020-10-21 | 2021-01-22 | 厦门悦讯信息科技股份有限公司 | Online audio and video anti-theft method and system |
CN113676452A (en) * | 2021-07-15 | 2021-11-19 | 北京思特奇信息技术股份有限公司 | Replay attack resisting method and system based on one-time secret key |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117979051A (en) * | 2024-01-17 | 2024-05-03 | 广东保伦电子股份有限公司 | Audio anti-counterfeiting method, equipment and medium |
Also Published As
Publication number | Publication date |
---|---|
CN116418503B (en) | 2024-07-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
RU2375748C2 (en) | Presentation of protected digital content in computer network or similar | |
KR100362219B1 (en) | Method and system for distributing programs using tamper resistant processor | |
US7224805B2 (en) | Consumption of content | |
USRE47730E1 (en) | System and method for controlled copying and moving of content between devices and domains based on conditional encryption of content key depending on usage state | |
JP5330488B2 (en) | Method and apparatus for safely distributing content | |
US7599890B2 (en) | Content data storage | |
US7542568B2 (en) | Encryption device a decrypting device a secret key generation device a copyright protection system and a cipher communication device | |
CN101872399B (en) | Dynamic digital copyright protection method based on dual identity authentication | |
KR101495535B1 (en) | Method and system for transmitting data through checking revocation of contents device and data server thereof | |
RU2504005C2 (en) | Digital rights management apparatus and method | |
WO2017215514A1 (en) | Audio/video encrypted playing method and system thereof | |
EP2287770A2 (en) | Method and system for providing DRM license | |
JP4561146B2 (en) | Content distribution system, encryption apparatus, encryption method, information processing program, and storage medium | |
EP1526430A1 (en) | Encryption and data-protection for content on portable medium | |
US20060161772A1 (en) | Secure authenticated channel | |
JP2004193843A (en) | Content distribution device, content distribution method, content distribution program and content reproduction device, content reproduction method, content reproduction program | |
KR20030027066A (en) | Device arranged for exchanging data, and method of authenticating | |
JP2009530917A (en) | A federated digital rights management mechanism including a trusted system | |
CN101094062A (en) | Method for implementing safe distribution and use of digital content by using memory card | |
US20160043872A1 (en) | A challenge-response method and associated client device | |
KR20090064698A (en) | Drm method and system using trust platform module | |
KR101282972B1 (en) | Authentication between a device and a portable storage | |
CN116418503B (en) | Audio copyright protection method, system and medium | |
CN101136744A (en) | Method and system for safe reading download data | |
GB2404828A (en) | Copyright management where encrypted content and corresponding key are in same file |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant |