Media file copyright protection method and system

A technology for media file and copyright protection, applied in the field of information security, can solve the problems such as the inability to track the illegal transmission of media files, and the inability to guarantee the duplication of media files, so as to achieve the effect of safeguarding legitimate rights and interests and improving security protection capabilities.

Active Publication Date: 2019-10-18
福建省天奕网络科技有限公司
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This technology ensures secure distribution of encrypted multimedia content between users' devices without compromising their privacy or being able to access them freely for legitimate purposes. It uses an algorithm called Chaumie (which allows anyone else) to decrypt any sensitive data from those protected documents on other computers. Additionally, this system prevents unauthorised copying of these images during downloading while still allowing licensed individuals to open up certain types of digital photos they have been given permission to view.

Problems solved by technology

Technological Problem: Current Digital Rights Management systems lack effective ways to securely guard against piracy attempts made over digital communication networks like internet streaming services. Additionally, current solutions require users to pay fees or purchase licenses before accessing their content they shouldn’t compromise privacy concerns associated therewith.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Media file copyright protection method and system
  • Media file copyright protection method and system
  • Media file copyright protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0086] Please refer to Figure 2-Figure 5 , the present embodiment provides a method for copyright protection of media files, which can effectively prevent copyright-protected media files from being disseminated indiscriminately, ensure that they are circulated in authorized channels, and at the same time accurately locate the source of illegal duplication.

[0087] The method of this embodiment may specifically include the following steps:

[0088] S1: Randomly generate an encryption key and an identity identifier uniquely corresponding to the user according to the user's personal account information.

[0089] Specifically, when a user applies for registration with the server, after filling in key personal account information, such as a mobile phone number with a unique identifier, the server will randomly generate a uniquely corresponding account number based on the user's personal account information. The encryption key is used for subsequent encryption of media files; in thi

Embodiment 2

[0150] This embodiment corresponds to Embodiment 1, and provides a protection system for media files, including a server and a first program; the first program can implement the following steps when called by a processor at the server:

[0151] Randomly generate an encryption key and an identity identifier uniquely corresponding to the user according to the user's personal account information;

[0152] After receiving a user-triggered download instruction for a media file, encrypting the media file using an encryption key corresponding to the user;

[0153] Writing the identity identifier corresponding to the user into the media file through steganography.

[0154] The protection system also includes a client and a second program, the second program can implement the following steps when called by the processor of the client:

[0155] The client receives an open instruction corresponding to the one media file;

[0156] The client tries to obtain the encryption key corresponding

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a media file copyright protection method and a media file copyright protection system. The method comprises the following steps: randomly generating an encryption key and an identity identifier uniquely corresponding to a user respectively according to personal account information of the user; triggering a downloading instruction for a media file by a user; encrypting the media file by the server by using the encryption key corresponding to the user; and writing the identity identifier corresponding to the user into the media file through steganography. Locally, only anauthorized user downloading the media file can open the media file by utilizing the encryption key, so that the limitation of a propagation path is realized. The tracking of a propagation path is realized by writing the identity identifier of the downloading user into the to-be-downloaded file through steganography.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner 福建省天奕网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products