发明名称 DIGITAL RIGHTS MANAGEMENT METHOD
摘要 The present invention discloses a kind of management method for digital rights, wherein, it comprises the following steps: Step S1: the original electronic file is encrypted on the server-side, and in the meantime, the flow code, the file unique identifier, the authorization locations and verification information is injected; Step S2: obtaining flow codes, file identifier, authorization locations and verification information from the encrypted file, and then conducting integrality verification thereon; step S3: After it is verified that there is no error, the related information is sent to the authorization server; S4: after receiving the injection information about the encrypted file, the authorization server conducting integrality verification firstly, then judging the type of encryption file according to the flow code, and generating an authorization file and sending the same according to the type; Step S5: a decryption tool obtaining the authorization file to conducting integrality verification on the authorization information, and then decrypting, parsing, using same under the right control. By means of the above method of the present invention, a user can self-define the file encryption intensity under the condition of no changing or very little changing of an encryption/decryption tool.
申请公布号 US2015205941(A1) 申请公布日期 2015.07.23
申请号 US201314421297 申请日期 2013.06.14
申请人 Fujian Foxit Software Development Joint Stock Co., Ltd. 发明人 Xiong Yuqian;Wang Guojia
分类号 G06F21/10;G06F21/62;G06F21/60;G06F21/64 主分类号 G06F21/10
代理机构 代理人
主权项 1. A kind of digital rights management method comprising:5 Step S1: encrypting an original electronic file on the server-side, and in the meantime, injecting a flow code, a file unique identifier, an authorization location and a verification information; Step S2: obtaining the flow code, the file identifier, the authorization location and the verification information from the encrypted file, then conducting integrality verification; Step S3: after being proven to be accurate, sending the relevant information to an authorization server; Step S4: when the authorization server receives the injected information of the encrypted file, it the authorization server verifies the integrality first, and then estimates the type of the encrypted file according to the flow code, conducts the verification process depending on the type requirement, after the verification flow is complete, and combines the available information plus an encrypted file key into an authorization document, sends and feedbacks the authorization document to the a decryption terminal; Step S5: a decryption tool receives the authorization file, conducts the integrality verification of the authorization information, and then decrypts, parses and uses same under the right control.
地址 Fuzhou CN