[go: up one dir, main page]

HK1060196B - Identifying and controlling method of video and audio multimedia information - Google Patents

Identifying and controlling method of video and audio multimedia information Download PDF

Info

Publication number
HK1060196B
HK1060196B HK04103036.6A HK04103036A HK1060196B HK 1060196 B HK1060196 B HK 1060196B HK 04103036 A HK04103036 A HK 04103036A HK 1060196 B HK1060196 B HK 1060196B
Authority
HK
Hong Kong
Prior art keywords
video
audio
computer
server
file
Prior art date
Application number
HK04103036.6A
Other languages
Chinese (zh)
Other versions
HK1060196A1 (en
Inventor
邱复生
赖麒宇
Original Assignee
年代数位媒体股份有限公司
Filing date
Publication date
Priority claimed from CNB02119789XA external-priority patent/CN100514279C/en
Application filed by 年代数位媒体股份有限公司 filed Critical 年代数位媒体股份有限公司
Publication of HK1060196A1 publication Critical patent/HK1060196A1/en
Publication of HK1060196B publication Critical patent/HK1060196B/en

Links

Description

Authentication and control method for video/audio multimedia information
Technical Field
The invention relates to computer network encryption technology, in particular to an authentication and control method for audio and video multimedia information.
Background
According to the recent trend of internet, with the gradual popularization of internet, consumers get various information online, which becomes a trend of information circulation in the future, and this trend not only makes the popular video digital products become the hottest commodities on the network rapidly through the circulation of internet, but also makes the counterfeiting behavior of the video digital products move around in the network world, so how to use the video encryption technology on the video digital products, effectively prevents illegal counterfeiting, protects the property knowledge of the video digital products, and further implements the concept of consumer payment, and makes the online consumption mechanism more perfect when meeting the coming multimedia video era, and becomes an important issue to be solved in the network world.
From the technical aspect, the audio-visual technology has advanced from the multimedia effect of a single computer to the online real-time digital audio-visual service, and has amazing performance no matter on video, sound effect or transmission speed, most importantly, the complete audio-visual software and hardware become the basic equipment of the system, and a more humanized use interface is developed, so that the high-quality online audio-visual information available at hand can undoubtedly become a part of life and work of people, not only for consumers, but also for enterprise owners, the real-time and rich information and entertainment can easily obtain, and for enterprise owners, the internal training management and external marketing business of companies can be helped, and for audio-visual providers, infinite business opportunities can be brought. In particular, in recent years, with the idea of personal privacy and freedom, many people are reluctant to queue in a long way in a theater and crowd in public places with poor air, narrow seats and poor hygiene, and watch movies together with a group of civilized people. On the other hand, the audio-visual equipment and the information products are combined together, so that the audio-visual effect is very good. Based on the above factors, people are more and more willing to enjoy optical disc or online real-time satellite program in their own home, however, most people are unable to get the latest movie (e.g. the movie in the theater) through the internet, so how to establish a mechanism or method to enable the audience to enjoy the movie in their own home by internet payment is an important goal that the video program provider is expected to achieve.
At present, in a network or a television company providing movies or songs for appreciation on a network in a Pay-Per-View (Pay) manner, almost 99% of audio/video files are not encrypted, but in a manner of hiding a URL of the audio/video files, after a consumer on the network pays, the consumer on the network can connect to the audio/video files, however, a method for viewing Pay-free audio/video contents is quite easy, and a movie or a song can be easily stolen and recorded without requiring a deep engineer background or a high programming capability, for example: the popular Audio file compression format (MPEG Audio Layer-3, hereinafter referred to as MP3) in the network nowadays is a serious and enthusiastic attack on the protection of intellectual property rights, because consumers often write the music file into a compact disc after downloading the music file, give it to others, or directly send it to others by e-mail, or even sell it for sale.
In recent years, due to the continuous progress of the encryption technology of network video files, various video program providers (such as television companies or network companies) engaged in watching programs with video paid pay to promote the concept of user pay, and no matter the programs provided are watched or downloaded online, the encryption technology is utilized to encrypt and protect the video contents of the programs, so as to prevent the copyright from being illegally stolen, however, what is called the video file encryption technology? In short, a technology that a password (Key) can be added to a window video File (windows media File) to make the video File openable through a decoding Key (windows media License) is provided, so that, if the ownership of the decoding Key is always held by the video program provider, the video program provider can control the normal circulation of digital multimedia information through controlling the decoding Key, and thus, the rights and interests of the writer and the issuer can be ensured. There are many ways to release the decoding key, for example: however, for multimedia information providers who are engaged in interactive viewing and listening on the internet, the situation that the consumers are most willing to see with eyes is that after the consumers pay for internet, the downloaded information is randomly copied and presented to others or sales figures, so that not only great losses are incurred for the authors and the issuers, but also the efforts of the society on intellectual property protection are greatly attacked. Therefore, if an encryption program or measure is given to the video file related to each video Content, and proper file management, online cash flow, file transfer (including streaming and downloading), etc. are matched, and reasonable charging rules (such as the number of times or time limit for watching the video file at one payment) are defined, a safe, reasonable and stable information transaction environment is supposed to be established between the video program provider and the consumer.
Disclosure of Invention
In view of the above, almost 99% of the video files of the network or tv company providing movie or song appreciation on the network by paying fee are not encrypted, but the URL of the video files is hidden, so after the payment of the online consumer, the video content provided on the network is easily stolen and recorded in large quantities, and the video content is illegally circulated on the network. The inventor develops and designs the authentication and control method of the audio and video multimedia information based on the concept of intellectual property protection and the practical requirement of the network world.
The invention aims to effectively avoid the illegal infringement of the intellectual property right on the network by utilizing the encryption authentication and control mechanism of the method, so that the interests of a writer, a publisher or a video program provider can be protected more perfectly.
Another object of the present invention is to enable the consumer to store the video files in a hard disk of a computer or on a magnetic disk or optical disk for execution by carrying to any computer with internet access function after downloading the video files without immediate appreciation, so that the consumer can enjoy the video files immediately after paying for internet access.
In order to achieve the above object, the present invention provides a method for authenticating and controlling audio-visual multimedia information, which is applied between a server of an audio-visual program provider and at least one computer of a consumer, wherein the computers are connected with the server via a network, wherein an audio-visual file of at least one audio-visual multimedia information provided by the audio-visual program provider needs to be respectively converted into an encrypted audio-visual file by an encryption processing program, and then the encrypted audio-visual file is provided to the consumer via the network, so that the consumer can process the encrypted audio-visual file according to the following steps when using the computer to execute the encrypted audio-visual file: firstly, the computer needs to actively connect with the server through the network and start an authentication mechanism arranged on the server; the computer transmits an identity data inputted by the consumer to the server for the server to authenticate; after the server receives the identity data, the authentication mechanism will judge whether the identity data is correct; if the authentication mechanism judges that the identity data is correct, the server transmits a decryption key back to the computer, and the decryption key is different from the decryption key transmitted back last time; the computer decrypts the encrypted audio/video files by using the decryption key, so that the audio/video encrypted files are restored into unencrypted audio/video files; finally, the computer executes the video files, and the content of the video files is displayed on the picture of the computer for consumers to enjoy.
In the method, when the server does not find the member data matched with the identity data, the server returns a refusal entering information to the computer or returns an application form requesting to join the member to the computer.
The network in the method is a local area network or the Internet.
The invention has the following beneficial effects:
1. the method can effectively prevent the online consumer from randomly copying the downloaded data after paying to surf the internet, giving other people or selling the image interest, and mistakenly touching the legal network, so that the interests of the author, the publisher or the video program provider can be protected more perfectly.
2. After the consumer downloads the video files, if the consumer does not want to enjoy the video files immediately, the video files can be stored in the year, so that long-time downloading waiting can be avoided, the consumer on the network can be given sufficient flexibility in selecting the time for enjoying the film, and the video multimedia information has excellent portability.
Drawings
FIG. 1: the computer of the invention judges the flow chart;
FIG. 2: the present invention is a schematic diagram of encryption and decryption.
Detailed Description
The invention discloses a certification and control method of video-audio multimedia information, which can make a video-audio program supplier convert an original file of video-audio multimedia information, namely a video-audio file, into a ciphered video-audio file through a ciphering processing program, and provide the ciphered video-audio file to a consumer through a local area network, an Internet or other modes, when the consumer obtains the ciphered video-audio file and wants to use a computer to enjoy the content (such as film or song), the method can make the computer actively connect to a server set by the video-audio program supplier through the Internet, and start a certification mechanism set on the server, after the server reads a correct identity data provided by the consumer using the computer, the server can verify the correct identity data, and after no error verification, a deciphering key can be returned to the computer of the consumer, the computer can decrypt the video-audio encrypted file by using the decryption key, and the video-audio encrypted file is restored to the original unencrypted video-audio file, so that the computer can present the content of the video-audio multimedia information for consumers to enjoy. In addition, after downloading the video and audio file, if the consumer does not want to immediately enjoy the file, the file can be stored in a hard disk of a computer, so that when the consumer wants to enjoy the file in the future, the consumer can immediately enjoy the file only after paying for the internet without additionally accessing the internet and downloading the file, or the file can be stored in a magnetic disk or an optical disk and carried to any computer with internet access function for execution, and the video and audio file can be immediately enjoyed after paying for the internet, so that the video and audio program provider can control the use situation of the video and audio multimedia information, and the video and audio multimedia information has excellent portability.
In the present invention, the decryption key issued by the server is Unique (Unique) and is recorded in a database (Date Base) provided in the server, so that the av program provider will have detailed records for the case that the av files are used, and therefore, how the consumer obtains the av files (even if illegal recording) is not important for the av provider, because anyone who wants to enjoy the contents of the av files must pay for the av program provider.
The method of the invention is applied to a server of a video program provider and at least one computer of a consumer, the computers can be connected with the server through a network, so that a video file of at least one video multimedia information provided by the video program provider can be respectively converted into an encrypted video file through an encryption processing program and is supplied to the consumer through the network (regional network, Internet) or other modes, when the consumer obtains the encrypted video file and wants to use the computer to enjoy the content (such as film or song), please refer to the drawing 1, the method can be processed according to the following steps:
(101) firstly, the computer needs to actively connect with the server through the network and start an authentication mechanism arranged on the server;
(102) the computer transmits an identity data inputted by the consumer to the server for the server to authenticate;
(103) then, after receiving the identity data, the server will judge whether the identity data is correct; if yes, performing step (104); otherwise, go to step (107);
(104) if the identity data is correct, the server will send back a decryption key to the computer;
(105) the computer decrypts the encrypted audio/video files by using the decryption key, so that the audio/video encrypted files are restored into unencrypted audio/video files;
(106) then, the computer executes the video files and displays the contents of the video files on the picture for consumers to enjoy;
(107) when the server does not find the member data matched with the identity data, the server will return a message of refusing to enter or an application form requesting to join the member to the computer.
From the above detailed description, it is not necessary to understand that the present invention has an excellent contribution to the protection of intellectual property rights, and the gist of the present invention will be described below in another way and in consideration of the following thinking:
the technical idea of the present invention is to put the video file 10 into a box (the video file 10 is applied with an encryption processing program 11) and lock the box (the video file 10 is converted into the encrypted video file 12), then to specify a game rule to determine what one can unlock the box, and the one who sets the game rule is the video program provider, so that anyone who obtains the box must follow the game rule specified by the video program provider (such as internet payment, questionnaire, join as a dedicated member, etc.), so that the video program provider will send back a Key (i.e. the "decryption Key" 13 mentioned in the foregoing text) to the consumer who follows the game rule, so that the consumer can unlock the locked box, to obtain the video file 10 (restore the encrypted video-audio file 12 to the unencrypted video-audio file 10).
In the invention, in the process of encrypting the video-audio files, the video-audio program supplier can set the limit of opening the encrypted video-audio file, for example, if the video-audio file is assumed to be a film, the video-audio supplier can stipulate that the film can be played only a few times or only a few days, once the limit is reached, the box will be automatically locked, the consumer must follow the game rules appointed by the video-audio program supplier again to get a new Key again, and the Key (Key) sent by the server each time is Unique (Unique) and is recorded in a database (Date Base) set by the server, so the video-audio program supplier will have detailed records for the situation that the encrypted video-audio file is used, therefore, it is irrelevant whether the consumer obtains the video-audio files in any way, because anyone who wants to use the video files must pay the video program provider.
To further the appreciation and appreciation of the present invention by the noble review board, a life-saving example is illustrated below:
mr. Ling who live in Taipei logs in and joins into the web page set by the video program provider to become the exclusive member of the video program provider, and buys 100 points of ' film appreciation points ', the video program provider stipulates ' 10 points of point deduction for each viewing of the film ', when Mr Ling knows that a newest film is available for downloading from the web page of the video program provider, Mr Ling immediately downloads and stores the video file of the film into the computer, when Mr Ling wants to view the film and execute the video file, the computer will connect to the web page of the video program provider and appear a dialog box requiring to input member data, after Mr Ling inputs correct member data, the video program provider immediately gives 1234's group of passwords to Mr Ling, Mr Ling must correctly input the group of passwords to the computer, the computer can execute the file, and at this time, the forest can watch the film first, and the watching points of the film are deducted for 10 points.
In this embodiment, since the video program provider provides a video file with 10 credits for each viewing of a video, the computer is similarly connected to the web page of the video program provider when mr _ lin executes the video file after he first enjoys the video and wants to watch the video for the second time, and the video program provider immediately gives mr _ lin another set of password "6543" (note that this set of password is different from the previous set of password) after mr _ lin inputs the correct member authentication data, and then the computer can execute the video file again to enjoy the video after mr _ lin has to correctly input the set of password into the computer, at this time, 80 credits remain for enjoying the video of mr _ lin's video.
If Mr. Ling writes the film into CD, or directly transmits the video file to Mr. King who executes the file on his computer, he will also connect to the web page of the video program provider, but since Mr. King is not the exclusive member of the video program provider, a dialog box will appear on the web page requesting to join the member or refusing to enter, when Mr. King joins the member and purchases points, he can obtain a set of password, such as "9876", and can enjoy the film after inputting the set of password to the computer, assuming that after Mr. King enjoys the film, he will transmit the CD or the electronic file to others, because the obtained passwords are different each time, no matter how the film is copied and transmitted, for the video provider, it will not be infringed by copyright at all, since anyone is charged for surfing the internet as long as he wants to watch the movie.
In this embodiment, mr. Lin can store the film in a hard disk after downloading it, so that he does not need to download again at the future, and can enjoy the video file immediately after paying for internet access, or mr. Wang can store the file in a magnetic disk or record the file on a compact disk, and can carry it to any computer with internet access function to be executed, and can enjoy the video file immediately after paying for internet access, so that the video program provider can control and manage the use situation of the video file, and the video file has excellent portability.
In this embodiment, the encryption technology mentioned above may be a Digital Rights Management (DRM) mechanism of microsoft corporation, which is a technology for encrypting and managing Rights for microsoft audio-visual format files, and is a server software for ensuring the secure transmission of Rights information or preventing illegal transmission, DRM protected objects, information and contents that must be paid on the network to prevent them from various piracy, because piracy is rampant on the network, DRM is the first task to prevent them from being stolen, DRM products including server software and plug-in program elements achieve the purpose in ways of encryption, authentication, obtaining administrator's consent, and setting access restrictions.
The above-mentioned embodiments are merely illustrative of the technical spirit and features of the present invention, and the purpose thereof is to enable those skilled in the art to understand the content of the present invention and to implement the same, so that the scope of the present invention should not be limited by the above-mentioned embodiments, and all equivalent changes and modifications made in the spirit of the present invention should be covered by the scope of the claims.

Claims (5)

1. A method for authenticating and controlling video multimedia information is characterized in that: the method is applied to a server of an audio-visual program provider and a computer of at least one consumer, the computer is connected with the server through a network, wherein, the audio-visual file of at least one audio-visual multimedia information provided by the audio-visual program provider is respectively converted into an encrypted audio-visual file through an encryption processing program, and then the encrypted audio-visual file is provided to the consumer through the network, so that the consumer can process the encrypted audio-visual file according to the following steps when using the computer to execute the encrypted audio-visual file:
firstly, the computer needs to actively connect with the server through the network and start an authentication mechanism arranged on the server;
the computer transmits an identity data input by the consumer to the server for the server to authenticate;
after the server receives the identity data, the authentication mechanism judges whether the identity data is correct or not;
if the authentication mechanism judges that the identity data is correct, the server transmits a decryption key back to the computer, and the decryption key is different from the decryption key transmitted back last time;
the computer decrypts the encrypted video-audio file by using the decryption key so that the video-audio encrypted file is restored into an unencrypted video-audio file;
and finally, the computer executes the video file again, and the content of the video file is displayed on the picture of the computer.
2. The method for authentication and control of video/audio multimedia information as claimed in claim 1, wherein: when the server does not find the member data matched with the identity data, the server transmits a message of refusing to enter back to the computer.
3. The method for authentication and control of video/audio multimedia information as claimed in claim 1, wherein: when the server does not find the member data matched with the identity data, the server will return an application form requesting to join the member to the computer.
4. The method for authentication and control of video/audio multimedia information as claimed in claim 1, wherein: the network is a local area network.
5. The method for authentication and control of video/audio multimedia information as claimed in claim 1, wherein: the network is the internet.
HK04103036.6A 2004-04-29 Identifying and controlling method of video and audio multimedia information HK1060196B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB02119789XA CN100514279C (en) 2002-05-16 2002-05-16 Authentication and control method for video/audio multimedia information

Publications (2)

Publication Number Publication Date
HK1060196A1 HK1060196A1 (en) 2004-07-30
HK1060196B true HK1060196B (en) 2010-01-22

Family

ID=

Similar Documents

Publication Publication Date Title
US7845014B2 (en) Method and apparatus for implementing digital rights management
US8291219B2 (en) System and method for enabling device dependent rights protection
US7496540B2 (en) System and method for securing digital content
US20060212370A1 (en) Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances
US20100174652A1 (en) Cryptographic methods, apparatus and systems for storage media electronic right management in closed and connected appliances
US20120275592A1 (en) Decoupling rights in a digital content unit from download
US20080065911A1 (en) Apparatus for Transferring Licensed Digital Content Between Users
KR20020083851A (en) Method of protecting and managing digital contents and system for using thereof
Kerr et al. Technical protection measures: tilting at copyright's windmill
US20030208678A1 (en) Media and multimedia data authentication and control method
WO2005122149A1 (en) License management system and license management method
Marks et al. Technical protection measures: The intersection of technology, law and commercial licenses
Cherry Making music pay [digital music distribution]
McWane Hollywood vs. Silicon Valley: DeCSS Down, Napster to Go
KR20030075948A (en) Method and System for Providing a Universal Solution for Flash Contents by Using The DRM
KR100768501B1 (en) Digital contents electronic commerce system and method for protecting digital copyrights and recording media recording program for executing them
HK1060196B (en) Identifying and controlling method of video and audio multimedia information
HK1060196A1 (en) Identifying and controlling method of video and audio multimedia information
GB2389928A (en) Data stored in encrypted form on a data carrier may be accessed by a user when a remote server provides permission
JP2002288045A (en) Content providing method and apparatus, content providing program, and storage medium storing content providing program
WO2004028230A2 (en) System for protecting both copyrights and fair-use rights at the same time
山崎哲也 et al. Digital Content Distribution and Copyright Management Technology in the Broadband Age
Fisher iTunes: How Copyright, Contract, and Technology Shape the Business of Digital Media
Furht Pallavi Shah 2
Schneck Restricting Anti-Circumvention Devices