CN100435162C - Construction and Verification Method of Fingerprint in Digital Product and Digital Product Issuing System - Google Patents
Construction and Verification Method of Fingerprint in Digital Product and Digital Product Issuing System Download PDFInfo
- Publication number
- CN100435162C CN100435162C CNB2006100116997A CN200610011699A CN100435162C CN 100435162 C CN100435162 C CN 100435162C CN B2006100116997 A CNB2006100116997 A CN B2006100116997A CN 200610011699 A CN200610011699 A CN 200610011699A CN 100435162 C CN100435162 C CN 100435162C
- Authority
- CN
- China
- Prior art keywords
- fingerprint
- server
- information
- evidence
- identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 75
- 238000010276 construction Methods 0.000 title claims abstract description 20
- 238000012795 verification Methods 0.000 title abstract description 4
- 238000005516 engineering process Methods 0.000 claims abstract description 32
- 230000004927 fusion Effects 0.000 claims abstract description 11
- 238000013475 authorization Methods 0.000 claims description 16
- 238000001228 spectrum Methods 0.000 claims description 7
- 238000001514 detection method Methods 0.000 claims description 6
- 238000010168 coupling process Methods 0.000 claims description 4
- 239000000284 extract Substances 0.000 claims description 4
- 238000012545 processing Methods 0.000 claims description 4
- 230000008878 coupling Effects 0.000 claims description 3
- 238000005859 coupling reaction Methods 0.000 claims description 3
- NUHSROFQTUXZQQ-UHFFFAOYSA-N isopentenyl diphosphate Chemical compound CC(=C)CCO[P@](O)(=O)OP(O)(O)=O NUHSROFQTUXZQQ-UHFFFAOYSA-N 0.000 claims description 3
- 238000012937 correction Methods 0.000 claims description 2
- 230000004069 differentiation Effects 0.000 claims 1
- 238000012544 monitoring process Methods 0.000 abstract description 8
- 238000012360 testing method Methods 0.000 abstract description 2
- 230000006870 function Effects 0.000 description 24
- 239000003795 chemical substances by application Substances 0.000 description 5
- 230000000873 masking effect Effects 0.000 description 5
- 238000012790 confirmation Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 238000000605 extraction Methods 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 238000009432 framing Methods 0.000 description 2
- 238000007689 inspection Methods 0.000 description 2
- 230000000007 visual effect Effects 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 239000000654 additive Substances 0.000 description 1
- 230000000996 additive effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000000354 decomposition reaction Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000007500 overflow downdraw method Methods 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
Images
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
本发明涉及一种数字产品中指纹的构造和验证方法,该构造方法从购买者获得购买秘密信息并由版权服务器构造出不可伪造的证据指纹,再由版权发行服务器将版权服务器颁发的许可证与销售信息构造出身份指纹,最后采用融合技术构造出含指纹拷贝。验证方法则提取保存于数字产品中的身份指纹检验产品许可权并识别出购买者身份,进而依靠证据指纹的相似性检验确认所属关系。相应地,提供一种数字产品发行系统,包括购买装置、版权发行服务器和版权服务器。本发明为解决产品安全分发、许可权管理和版权监控等问题,提供了一种用户友好且简单易行的方法,大大提高了现有系统安全性和可扩展性。
The invention relates to a method for constructing and verifying fingerprints in digital products. The construction method obtains purchase secret information from purchasers and constructs an unforgeable evidence fingerprint by a copyright server, and then the copyright issuing server combines the license issued by the copyright server with the The sales information is used to construct the identity fingerprint, and finally the fusion technology is used to construct a copy containing the fingerprint. The verification method is to extract the identity fingerprint stored in the digital product to verify the product license and identify the identity of the purchaser, and then rely on the similarity test of the evidence fingerprint to confirm the affiliation. Correspondingly, a digital product distribution system is provided, including a purchasing device, a copyright distribution server and a copyright server. The invention provides a user-friendly and simple and easy method for solving the problems of safe product distribution, permission management and copyright monitoring, and greatly improves the security and scalability of the existing system.
Description
技术领域 technical field
本发明涉及数字指纹的构造和验证方法,尤其涉及一种用于数字产品的指纹的构造和验证方法,以及用于实现该方法的数字产品发行系统,属于软件技术领域。The invention relates to a method for constructing and verifying digital fingerprints, in particular to a method for constructing and verifying fingerprints for digital products, and a digital product issuing system for realizing the method, belonging to the field of software technology.
背景技术 Background technique
随着互联网和数字化技术的应用和普及,以电子商务为基础的传媒产业得到快速发展,但数字化产品易于修改、复制和传播的特点,使得盗版越来越猖獗,版权保护日趋重要。而且,在电子商务中互联网上已有的数字产品销售服务(如MP3、书籍、软件、电影等下载服务)中,通常数字产品的拷贝被直接传送到购买者,使得销售安全无法得到保证,许可证无法监控,更无法对数字产品的版权进行有效控制,致使正版数字产品可以被随处下载和传播,严重损害了数字版权所有者(如发行商)的版权利益。With the application and popularization of Internet and digital technology, the media industry based on e-commerce has developed rapidly. However, the characteristics of digital products that are easy to modify, copy and spread make piracy more and more rampant, and copyright protection is becoming more and more important. Moreover, in the existing digital product sales services on the Internet in e-commerce (such as MP3, books, software, movies, etc. download services), usually the copy of the digital product is directly transmitted to the buyer, so that the sales security cannot be guaranteed. The certificate cannot be monitored, and the copyright of digital products cannot be effectively controlled, so that genuine digital products can be downloaded and disseminated everywhere, which seriously damages the copyright interests of digital copyright owners (such as publishers).
具有版权跟踪、证据获取和低复杂性的版权保护技术是未来数字分发系统的基本要求。已知的现有技术中所采用的数字版权管理技术存在各种问题,还缺乏行之有效的版权保护方法。例如,以密码技术为基础的电子货币、电子交易系统,可保证销售中数据的安全性与保密性,却无法提供版权保护方面支持;以数字水印等方法为基础的版权保护系统,在所有权证明方面是较为有效的,但无法实现盗版者认定从而对盗版形成威慑,也无法提供法庭上的有效证据以及实现电子交易中的公平性与合法性,特别是不可感知性水印存在多重水印嵌入的版权争议问题,限制了它在版权保护方面的应用。Copyright protection techniques with copyright tracking, evidence acquisition, and low complexity are fundamental requirements for future digital distribution systems. There are various problems in the digital rights management technology adopted in the known prior art, and there is still a lack of effective copyright protection methods. For example, electronic currency and electronic transaction systems based on cryptographic technology can guarantee the security and confidentiality of data in sales, but cannot provide support for copyright protection; It is relatively effective, but it cannot be identified by pirates to deter piracy, nor can it provide effective evidence in court and achieve fairness and legitimacy in electronic transactions, especially the imperceptible watermark that has multiple watermark embedded copyrights. Controversial issues, limiting its use in copyright protection.
另一方面,已有的电子商务交易对购买数字产品所使用的设备的计算和存储能力有较高的要求,甚至需要与发行服务器一样的能力,就目前购买者实际使用的设备而言,在实施上有很大的局限性。例如,使用手机通过GPRS+WAP技术从某个网站下载mp3歌曲,购买者手机只能对交易进行简单计算,没有足够的处理能力和存储空间用于复杂的商务和密码协议,可由用户提供的信息也是极为有限的。On the other hand, the existing e-commerce transactions have higher requirements on the computing and storage capabilities of the equipment used to purchase digital products, and even require the same capabilities as the distribution server. As far as the equipment actually used by buyers is concerned, the There are significant limitations in implementation. For example, using a mobile phone to download mp3 songs from a website through GPRS+WAP technology, the buyer's mobile phone can only perform simple calculations on the transaction, and there is not enough processing power and storage space for complex business and password protocols. The information provided by the user It is also extremely limited.
总之,版权保护技术不仅需要实现控制访问许可和版权证明,还需要达到对盗版者的追踪与审判,以及便捷处理等功能要求,而现有的技术目前还无法满足这些要求。In short, copyright protection technology not only needs to achieve control access permission and copyright certification, but also needs to meet functional requirements such as tracking and trial of pirates, and convenient processing, and existing technologies are currently unable to meet these requirements.
发明内容 Contents of the invention
针对上述问题,本发明的目的在于提供一种数字产品中指纹的构造和验证方法,利用混合指纹构造技术,构造出一种包含数字产品的购买者的特征信息、版权许可及可验证信息的数字指纹,将这种指纹融合于数字产品拷贝中然后再发行。因此,当含有这种指纹的可信数字产品遭到非法拷贝与分发时,就可以从非法拷贝产品中提取出用于复制该非法拷贝的可信拷贝的所有者(购买者)信息,通过验证所述的所有者(购买者)信息,从而实现对盗版产品的跟踪和认定。该方法可用于电子商务网站、便携设备(掌上计算机、手机等)、网络浏览器、或媒体播放器中,实现音频、视频、光盘、软件、文本等数字化产品的安全分发,保证数字产品销售中的可跟踪性、不可否认性、不可欺骗性、匿名性等安全性质,并提高数字化产品的分发效率。In view of the above problems, the object of the present invention is to provide a method for constructing and verifying fingerprints in digital products, using hybrid fingerprint construction technology to construct a digital product containing the characteristic information, copyright license and verifiable information of the buyer of the digital product. Fingerprints, which are fused into digital product copies before distribution. Therefore, when a trusted digital product containing such fingerprints is illegally copied and distributed, the owner (purchaser) information of the trusted copy used to reproduce the illegal copy can be extracted from the illegally copied product, and verified Said owner (buyer) information, so as to realize tracking and identification of pirated products. The method can be used in e-commerce websites, portable devices (handheld computers, mobile phones, etc.), web browsers, or media players to realize the safe distribution of digital products such as audio, video, CD, software, text, etc. Security properties such as traceability, non-repudiation, non-deception, anonymity, etc., and improve the distribution efficiency of digital products.
为实现上述目的,本发明首先提供了一种数字指纹的构造方法,用于数字产品中。数字指纹是指一种能够区分相似对象并由计算机处理的、数字化的特征序列。本质上,指纹具有唯一性,因而对同一载体通过添加指纹能起到相互区别的目的。指纹又具有健壮性,通过将其依附于要保护的对象起到保护对象的目的。本发明中所述的指纹的特征在于包括:To achieve the above purpose, the present invention firstly provides a method for constructing digital fingerprints, which is used in digital products. A digital fingerprint is a sequence of digital features that can distinguish similar objects and is processed by a computer. In essence, fingerprints are unique, so adding fingerprints to the same carrier can be used to distinguish them from each other. Fingerprints are also robust, and they serve the purpose of protecting the object by attaching it to the object to be protected. Fingerprint described in the present invention is characterized in that comprising:
A、身份指纹:包含销售、所有权、使用许可等信息,用于标识数字产品版权和识别出购买者的身份;A. Identity fingerprint: contains sales, ownership, license and other information, used to identify the copyright of digital products and identify the identity of the buyer;
B、证据指纹:包含购买者秘密信息和不可伪造的信息,用于提供数字产品销售或分发的证据,从而防止发行商诬陷购买者或者购买者否认所属关系,同时也可以作为确认叛逆用户(即提供非法拷贝的购买者)提供非法拷贝行为的证据。B. Evidence fingerprint: Contains the buyer's secret information and unforgeable information, which is used to provide evidence of digital product sales or distribution, so as to prevent the publisher from framing the buyer or the buyer from denying the affiliation, and can also be used as a confirmation of treasonous users (ie Buyers who provide illegal copies) provide evidence of illegal copying.
上述指纹的构造特征保证指纹既包含产品版权信息又包含购买者的个人信息。在证据指纹是严格保密的情况下,它能起到对非法行为予以可信证明的作用。这两种指纹功能不同,构造要求也不同,证据指纹要求指纹是不可伪造的;身份指纹则进一步需要在指纹中嵌入可提取的信息。The structural features of the above-mentioned fingerprints ensure that the fingerprints contain both product copyright information and the buyer's personal information. In the case that the evidence fingerprint is strictly confidential, it can play a role in credible proof of illegal behavior. These two fingerprints have different functions and different construction requirements. The evidence fingerprint requires that the fingerprint cannot be forged; the identity fingerprint further needs to embed extractable information in the fingerprint.
如图1所示,本发明提供的数字产品中指纹的构造方法包括步骤:As shown in Figure 1, the construction method of fingerprint in the digital product provided by the present invention comprises steps:
1)生成购买秘密信息串:购买装置根据购买者信息,通过摘要函数算法生成购买秘密信息串;其中,购买者信息包括:时间戳、购买者公钥、购买者标识和购买者秘密信息,所述的摘要函数算法可以是杂凑函数、消息认证码、密码单向函数、或随机置换算法其中的任一种。1) Generating a purchase secret information string: the purchase device generates a purchase secret information string through a digest function algorithm according to the purchaser information; wherein, the purchaser information includes: time stamp, purchaser public key, purchaser identification and purchaser secret information, all The above-mentioned digest function algorithm can be any one of hash function, message authentication code, cryptographic one-way function, or random permutation algorithm.
2)构造版权标记序列:版权服务器根据随机选取的指纹种子和数字产品发行商提供的指纹参数,利用指纹生成算法构造版权标记序列;所述的指纹参数包括:指纹类型、指纹长度、取值范围、编码类型、抗攻击强度、检测错误率;所述的指纹生成算法可以是序列扩频、密钥指纹算法、Boneh-Shaw码、代数几何码、IPP码、FP码、TA码、或直接序列扩频中的任一种。2) Constructing a copyright mark sequence: the copyright server uses a fingerprint generation algorithm to construct a copyright mark sequence according to the randomly selected fingerprint seeds and the fingerprint parameters provided by the digital product publisher; the fingerprint parameters include: fingerprint type, fingerprint length, and value range , encoding type, anti-attack strength, detection error rate; the fingerprint generation algorithm can be sequence spread spectrum, key fingerprint algorithm, Boneh-Shaw code, algebraic geometry code, IPP code, FP code, TA code, or direct sequence Any of the spread spectrum.
3)构造购买者证据指纹:版权发行服务器利用购买秘密信息串和版权标记序列通过秘密混合算法构造出购买者的证据指纹;3) Constructing the proof fingerprint of the purchaser: the copyright issuing server constructs the proof fingerprint of the purchaser through a secret mixing algorithm by using the purchase secret information string and the copyright mark sequence;
所述的秘密混合算法可以是数据间的混杂运算(即数据间的模加、异或)、加密密文或承诺间的同态运算、或随机置换中的任一种;所述的证据指纹包含购买者秘密信息和不可伪造的信息,用于提供数字产品销售或分发的证据;所述的指纹种子是具有唯一性的随机数或序列,指纹种子具有短长度、便于激发伪随机数发生器产生任意长度伪随机数序列的特点。The secret mixing algorithm can be any one of a hybrid operation between data (that is, modulo addition and XOR between data), a homomorphic operation between encrypted ciphertexts or commitments, or random permutation; the evidence fingerprint Contains the buyer's secret information and unforgeable information, which is used to provide evidence for the sale or distribution of digital products; the fingerprint seed is a unique random number or sequence, and the fingerprint seed has a short length, which is convenient for exciting the pseudo-random number generator Features that generate sequences of pseudorandom numbers of arbitrary length.
4)构造购买者的身份指纹:版权发行服务器选择指纹种子,根据购买者标识、许可证和版权信息,利用指纹生成算法,构造出购买者的身份指纹;所述的身份指纹包含数字产品的销售信息、所有权信息和使用许可信息,用于标识产品版权和购买者身份;4) Construct the identity fingerprint of the purchaser: the copyright issuing server selects the fingerprint seed, uses the fingerprint generation algorithm to construct the identity fingerprint of the purchaser according to the identity of the purchaser, license and copyright information; the identity fingerprint includes the sales of digital products Information, ownership information and license information used to identify product copyrights and purchaser identities;
5)构造含指纹的数字产品拷贝:版权发行服务器将证据指纹和身份指纹、或者对所述的两种指纹加密后形成的信息,通过融合技术依附于数字产品,生成含有购买者特征的产品拷贝,所述的融合技术可以是视频与音频的数字水印技术、隐秘耦合技术、密钥指纹技术、或DVD的内容加扰技术中的任一种。隐秘耦合技术采用会话秘钥对原作品进行加密,而将会话秘钥用广播加密算法加密并以隐秘形式放置于作品中或是存储介质的隐藏区域(分区)内,用户使用由指纹构造的唯一性解密秘钥实现解密。5) Constructing a digital product copy with fingerprints: the copyright issuing server attaches the evidence fingerprint and identity fingerprint, or the information formed by encrypting the two fingerprints, to the digital product through fusion technology to generate a product copy containing the characteristics of the buyer , the fusion technology may be any one of video and audio digital watermarking technology, stealth coupling technology, key fingerprint technology, or DVD content scrambling technology. The hidden coupling technology uses the session key to encrypt the original work, and the session key is encrypted with the broadcast encryption algorithm and placed in the work or in the hidden area (partition) of the storage medium in a hidden form. decryption key for decryption.
其中,对两种指纹加密的过程可以是:版权发行服务器先对证据指纹进行随机置换,然后根据身份指纹与置换后的证据指纹,组合出含购买者特征的指纹,具体过程是:版权发行服务器先对证据指纹进行随机置换,用以增加指纹隐藏的随机性和安全性,保证不同服务器之间也无法彼此获得信息和防止版权服务器被攻破而引发的危害;然后再根据身份指纹与置换后的证据指纹,组合出完整的含购买者特征的指纹,组合方式既可采用重叠方式混合在一起,也可以非重叠方式链接在一起,如:身份指纹‖证据指纹,其中,“‖”为字符串链接符号。Among them, the process of encrypting the two fingerprints can be: the copyright issuing server first randomly replaces the evidence fingerprints, and then combines the fingerprints containing the characteristics of the purchaser according to the identity fingerprints and the replaced evidence fingerprints. The specific process is: the copyright issuing server Firstly, the evidence fingerprint is randomly replaced to increase the randomness and security of fingerprint hiding, to ensure that different servers cannot obtain information from each other and to prevent the damage caused by the copyright server being breached; then, according to the identity fingerprint and the replaced Evidence fingerprints are combined to form a complete fingerprint containing the characteristics of the purchaser. The combination method can be mixed together in an overlapping manner or linked together in a non-overlapping manner, such as: identity fingerprint‖evidence fingerprint, where "‖" is a character string link symbol.
利用上述方法,可以提供包含有数字产品的购买者信息和产品版权信息的可信拷贝。在可信拷贝的使用中,版权发行服务器可以依据身份指纹中的版权信息与使用许可证约束购买者的行为,例如,控制许可播放次数、产品有效期。此外,身份指纹中的信息也可作为观察产品流通与使用情况的跟踪依据。Using the method above, it is possible to provide a trusted copy containing the buyer information and product copyright information of the digital product. In the use of trusted copies, the copyright issuing server can restrict the purchaser's behavior according to the copyright information in the identity fingerprint and the use license, for example, control the number of times the license is played, and the product validity period. In addition, the information in the identity fingerprint can also be used as a tracking basis for observing product circulation and usage.
本发明的另一个目的在于提供一种数字指纹的验证方法,用于验证数字产品拷贝中的数字指纹,从而实现对数字产品版权的保护和跟踪,该方法包括步骤:Another object of the present invention is to provide a method for verifying digital fingerprints, which is used to verify digital fingerprints in digital product copies, thereby realizing protection and tracking of digital product copyrights. The method includes steps:
1)版权发行服务器从含有购买者身份指纹和证据指纹的数字产品拷贝中提取并解码身份指纹,获取购买者标识,并将查获的证据指纹传送给仲裁服务器,其中,所述的提取和解码算法与指纹构造中使用的算法相对应;1) The copyright issuing server extracts and decodes the identity fingerprint from the copy of the digital product containing the buyer's identity fingerprint and evidence fingerprint, obtains the buyer's identification, and transmits the seized evidence fingerprint to the arbitration server, wherein the extraction and decoding algorithm Corresponds to the algorithm used in the construction of the fingerprint;
2)仲裁服务器向版权服务器请求公布与所述的购买者标识相应的版权标记序列,确认该版权标记序列的真实性,并将其与购买秘密信息串合成出证据指纹;2) The arbitration server requests the copyright server to publish the copyright mark sequence corresponding to the buyer's identification, confirms the authenticity of the copyright mark sequence, and synthesizes it with the purchase secret information to form an evidence fingerprint;
3)仲裁服务器将步骤1)中查获的证据指纹与步骤2)种生成的证据指纹进行比对,如果相似性超过预先设定的可信程度,则确认该数字产品拷贝与原始购买者标识有关。其中,所用到的相似性比对方法可以是信息纠错译码的概率比对、序列相关性比较、Viterbi最优译码、密钥指纹的叛逆者跟踪、基于多项式的指纹向量搜索方法中的任一种;所述的可信程度包括参数:相关度、可信度、区分度、合谋容忍能力。3) The arbitration server compares the evidence fingerprint seized in step 1) with the evidence fingerprint generated in step 2), and if the similarity exceeds the pre-set credibility level, it confirms that the copy of the digital product is related to the identity of the original purchaser . Among them, the similarity comparison method used can be the probability comparison of information error correction decoding, sequence correlation comparison, Viterbi optimal decoding, traitor tracking of key fingerprints, and polynomial-based fingerprint vector search methods. Any one; the credibility level includes parameters: correlation, credibility, discrimination, and collusion tolerance.
在被检验的数字产品拷贝的购买者身份被确认之后,该拷贝的购买者也可以提供购买者秘密信息核实整个指纹构造与跟踪过程,为自己申述。After the identity of the buyer of the verified copy of the digital product is confirmed, the buyer of the copy can also provide the buyer's secret information to verify the entire fingerprint construction and tracking process, and appeal for himself.
上述方法的技术效果在于提供了一种数字指纹的构造方法,该指纹不仅实现了版权证明、使用许可等版权管理功能,而且满足了对侵权行为进行来源确认和可信取证的需要。所述的构造方法采用身份指纹与证据指纹分开的方式,进一步增强了构造灵活性以及指纹安全性与健壮性;在扩展性方面,该构造方法也便于与其它数字水印或隐秘方法相结合,形成对众多媒体的统一管理机制。本发明同时还提供了一种数字指纹的验证方法,为以法律手段解决版权争议、许可权管理和版权监控等问题,提供了一种用户友好并简单易行的数字产品分发、销售、监控系统和方法,同时该方法也能够为法庭仲裁提供一定的证据。The technical effect of the above method is to provide a digital fingerprint construction method, which not only realizes copyright management functions such as copyright certification and license, but also meets the needs of source confirmation and credible evidence collection for infringement. The construction method adopts the method of separating the identity fingerprint and the evidence fingerprint, which further enhances the construction flexibility and the security and robustness of the fingerprint; in terms of scalability, the construction method is also convenient to be combined with other digital watermarking or concealment methods to form a A unified management mechanism for many media. The present invention also provides a verification method for digital fingerprints, and provides a user-friendly and simple digital product distribution, sales, and monitoring system for solving copyright disputes, license management, and copyright monitoring by legal means At the same time, this method can also provide certain evidence for court arbitration.
本发明的又一个目的在于提供一种实现上述方法的数字产品发行系统,包括:Yet another object of the present invention is to provide a digital product distribution system that implements the above method, including:
1)购买装置,部署在与版权发行服务器相连的计算机终端上,所述的计算机终端装载有可实现数字产品购买与播放功能的软件,用于生成购买者秘密信息及购买凭证,所述的购买凭证包括:时间戳、购买者公钥、源IP地址、购买承诺;1) The purchase device is deployed on a computer terminal connected to the copyright issuing server. The computer terminal is loaded with software capable of realizing digital product purchase and playback functions, and is used to generate purchaser secret information and purchase vouchers. The purchase Credentials include: timestamp, purchaser public key, source IP address, purchase commitment;
2)版权发行服务器,用于分发数字产品和管理产品版权,包括:销售模块,用于处理购买请求和发放产品;指纹授权模块,用于证据指纹请求、指纹生成、许可证发放和带指纹拷贝的构造;销售数据库,用于保存包括身份指纹种子、购买者信息和版权信息在内的销售记录,所述的销售记录包括:销售记录号、购买凭证、许可证、身份指纹种子。2) Copyright issuance server, used to distribute digital products and manage product copyrights, including: sales module, used to process purchase requests and issue products; fingerprint authorization module, used for evidence fingerprint request, fingerprint generation, license issuance and copy with fingerprint The structure; the sales database is used to save sales records including identity fingerprint seeds, buyer information and copyright information, and the sales records include: sales record number, purchase voucher, license, identity fingerprint seeds.
3)版权服务器,部署在和版权发行服务器相连的计算机终端上,用于用户认证与许可证颁发,包括:用户管理器,用于身份认证与密钥管理;指纹管理器,用于许可证授权和证据指纹构造;版权数据库,用于版权与指纹授权信息记录,所述的版权与指纹授权信息记录包括:版权记录号、销售商标识、销售记录号、购买凭证、许可证、证据指纹种子、发行商签名。3) The copyright server is deployed on the computer terminal connected to the copyright issuing server for user authentication and license issuance, including: user manager for identity authentication and key management; fingerprint manager for license authorization and evidence fingerprint structure; copyright database, used for copyright and fingerprint authorization information records, described copyright and fingerprint authorization information records include: copyright record number, vendor identification, sales record number, purchase certificate, license, evidence fingerprint seed, Publisher signature.
版权服务器既可以和版权发行服务器一起构建在发行商的设备上,也可以单独构建在一可信第三方仲裁机构的设备上。The copyright server can be built together with the copyright issuing server on the publisher's equipment, or can be built separately on the equipment of a trusted third-party arbitration institution.
进一步地,上述的数字产品发行系统还可以包括:仲裁服务器,部署在与版权服务器相连的计算机终端上,或者由可信的第三方单独提供仲裁设备,包括:仲裁服务单元,用于在出现侵权行为时收集指纹证据;指纹鉴定单元,用于完成指纹信息相似性检测。Further, the above-mentioned digital product distribution system may also include: an arbitration server, deployed on a computer terminal connected to the copyright server, or a trusted third party separately provides an arbitration device, including: an arbitration service unit, used to The fingerprint evidence is collected during the behavior; the fingerprint identification unit is used to complete the similarity detection of fingerprint information.
进一步地,所述的系统还可以包括若干在Internet中部署的版权跟踪代理服务器,用于监视网络数据流并获取盗版产品,内含版权监视软件。Further, the system may also include several copyright tracking proxy servers deployed in the Internet, used to monitor network data flow and obtain pirated products, including copyright monitoring software.
本发明的技术效果在于,所述的指纹构造方法能有效构造出可检测的唯一性指纹序列,达到区分不同用户之目的,并采用随机置乱与相似检测技术,指纹的抗攻击性能与验证的可靠性到达增强;其次,将安全密码运算融入指纹生成之中,增强指纹不可否认与不可诬陷性能;此外,有机地将数字水印与隐秘技术应用于指纹融合技术中,既实现指纹隐蔽性,又实现了对侵权者的追踪;同时,采用证据指纹和身份指纹相结合的双指纹技术,保证叛逆者追踪的准确性和证据的有效性。使用本发明提供的系统,能够为以法律手段解决版权争议、许可权管理和版权监控等问题,提供了一种用户友好并简单易行的数字产品分发、销售、监控系统和方法,同时该方法也能够为法庭仲裁提供一定的证据。The technical effect of the present invention is that the fingerprint construction method can effectively construct a detectable unique fingerprint sequence to achieve the purpose of distinguishing different users, and adopts random scrambling and similarity detection technology, and the anti-attack performance of fingerprints is comparable to that of verification. Reliability is enhanced; secondly, secure cryptographic operations are integrated into fingerprint generation to enhance fingerprint non-repudiation and non-fraud performance; in addition, digital watermarking and stealth technology are organically applied to fingerprint fusion technology, which not only realizes fingerprint concealment, but also The tracking of the infringer is realized; at the same time, the double-fingerprint technology combining the evidence fingerprint and the identity fingerprint is adopted to ensure the accuracy of the traitor tracking and the validity of the evidence. Using the system provided by the present invention can provide a user-friendly and simple digital product distribution, sales, and monitoring system and method for solving copyright disputes, license management, and copyright monitoring by legal means. At the same time, the method It can also provide certain evidence for court arbitration.
上述系统的技术效果在于,提供一种实现便捷、可靠的数字化产品版权保护方法。首先,它实现了透明购买性,即在购买者不知道版权信息存在情况下实现数字产品购买,并使购买者购买代时计算与存储代价最小化;其次,引入版权服务器即满足许可权颁发的独立性要求,又有利于指纹构造与融合中复杂运算的高效实现;配合使用同态密码系统、消息认证与签名方案、伪随机发生器等,保证指纹构造及相应系统的安全和高效。The technical effect of the above system is to provide a convenient and reliable copyright protection method for digital products. First of all, it realizes transparent purchase, that is, realizes the purchase of digital products without the purchaser knowing the existence of copyright information, and minimizes the calculation and storage costs of the purchaser; secondly, the introduction of copyright server satisfies the requirements of licensing rights Independence requirements are also conducive to the efficient realization of complex operations in fingerprint construction and fusion; in conjunction with homomorphic cryptographic systems, message authentication and signature schemes, pseudo-random generators, etc., the security and efficiency of fingerprint construction and corresponding systems are guaranteed.
本发明的又一个特点是提供一种用于安全地拷贝分发和版权保护的方法和系统。在追查出叛逆者的同时,由于融合于产品中的指纹包含有购买者、发行商和版权服务器三者的秘密信息,这些信息都是密码学安全的,保证了发行商对无辜用户不可陷害、非法叛逆者对犯罪事实不可否认、无需被告人参与完成(缺席)审判、以及被告人申诉等功能。Yet another feature of the present invention is to provide a method and system for secure copy distribution and copyright protection. While tracking down the traitors, because the fingerprints fused in the product contain the secret information of the purchaser, the publisher and the copyright server, these information are cryptographically secure, ensuring that the publisher cannot frame innocent users, Illegal traitors have the functions of undeniable criminal facts, complete (absence) trial without the participation of the defendant, and the defendant's appeal.
综上,本发明的方法和系统提供了较好扩展性和适应性,以满足各种应用需要。在受保护的数字产品种类上,本发明不仅涵盖视频、音频等感知性媒体,而且涵盖软件、光盘、文本等表达性媒体的版权保护;在保护形式上,既可以采用基于内容的数据嵌入方法,已可以采用基于结构的数据隐秘耦合方法。在应用环境方面,本发明适用于各种电子商务系统和版权追踪系统的构建,包括基于浏览器的电子交易、基于媒体播放器的视频/音频点播、掌上电脑的产品订购,特别是各种计算、存储受限设备的电子交易(手机铃声/彩信业务)。In summary, the method and system of the present invention provide better scalability and adaptability to meet various application needs. In terms of protected digital product categories, the present invention not only covers perceptual media such as video and audio, but also covers copyright protection of expressive media such as software, CDs, and text; in terms of protection forms, content-based data embedding methods can be used , the data covert coupling method based on structure can be adopted. In terms of application environment, the present invention is applicable to the construction of various e-commerce systems and copyright tracking systems, including electronic transactions based on browsers, video/audio on demand based on media players, product ordering on handheld computers, especially various computing , Electronic transactions of devices with limited storage (mobile phone ringtones/MMS services).
附图说明 Description of drawings
图1表示本发明中数字指纹的构造结构图;Fig. 1 represents the structural structure figure of digital fingerprint among the present invention;
图2表示本发明最佳实施例的数字产品发行系统的结构示意图;Fig. 2 represents the structural representation of the digital product issuing system of the preferred embodiment of the present invention;
图3表示根据本发明方法和系统的数字产品注册、销售和仲裁流程图;Fig. 3 represents the digital product registration, sales and arbitration flow chart according to the method and system of the present invention;
图4表示基于直接序列扩频技术的指纹序列构造示意图;Fig. 4 shows the schematic diagram of fingerprint sequence construction based on direct sequence spread spectrum technique;
图5表示身份指纹与证据指纹的链接与融合示意图;Figure 5 shows a schematic diagram of linking and fusion of identity fingerprints and evidence fingerprints;
图6表示本发明实施例在版权认证与证据提取应用中的流程图。Fig. 6 shows a flow chart of the embodiment of the present invention in the application of copyright authentication and evidence extraction.
具体实施方式 Detailed ways
以下参照附图,详细描述本发明在网络媒体分发系统构建中的一个最佳实施例。A preferred embodiment of the present invention in the construction of a network media distribution system will be described in detail below with reference to the accompanying drawings.
由本实施例构建的网络媒体分发系统中,依靠用户正确提供必要的个人信息,由装载在客户端的购买装置自动执行本发明中的购买行为,包括实现私有信息生成、签名认证、数据下载、产品解密(含格式变换)等功能。一方面能保证用户的购买便捷性和安全购买,在用户全无察觉的情况下实现带有用户特征拷贝的生成;另一方面,可保证发行商的销售安全并实现版权管理,跟踪过程可以在客户端软件播放作品前进行版权检查,检查范围包括:作品版权、使用许可权等,如查获出现侵权行为,即使制止并上报;又可以通过网络关键节点上监视网络流的方式,对异常活动进行截获并获取盗版信息。在此基础上,本实施例构建了具有版权管理功能的支持用户点播、下载、播放和录制数字媒体功能的媒体播放(阅读)器。In the network media distribution system constructed by this embodiment, relying on the correct provision of necessary personal information by the user, the purchase device loaded on the client end automatically executes the purchase behavior in the present invention, including the realization of private information generation, signature authentication, data download, and product decryption. (including format conversion) and other functions. On the one hand, it can ensure the convenience and safety of the user's purchase, and realize the generation of copies with user characteristics without the user's awareness; on the other hand, it can ensure the security of the publisher's sales and realize copyright management. The tracking process can be in The client software conducts a copyright inspection before playing the work. The inspection scope includes: the copyright of the work, the right to use the license, etc. If any infringement is found, it will be stopped and reported; it can also monitor the network flow on the key nodes of the network to monitor abnormal activities. Intercept and obtain pirated information. On this basis, this embodiment constructs a media player (reader) device with copyright management function that supports users' functions of ordering, downloading, playing and recording digital media.
图2表示数字产品发行系统的结构示意图和各部件之间的信息流。所涉及的实体包括:版权发行服务器M、购买装置B、版权服务器FC、版权跟踪代理TA和仲裁服务器A,其中,版权服务器除具有版权服务器功能外,还具有密钥分发与认证功能。购买者通过购买装置201中的产品播放器202从版权发行服务器204的销售模块205中获得商品信息,启动销售终端进程203完成用户信息录入与购买请求打包,该请求被送往版权发行服务器204;在核实请求后销售模块205建立销售事件并转交指纹授权模块206生成指纹,指纹授权模块206首先请求版权服务器208发放版权证书和证据指纹;请求被版权服务器208中的用户管理器210接收后实现版权证书生成并启动指纹管理器209完成证据指纹构造,并与购买装置201交互获得购买者对证据指纹的签名,最后将证书与指纹颁发给版权发行服务器204并存储相关记录于版权数据库211;指纹授权模块206根据证书生成购买者身份指纹并与颁发的证据指纹一起融合于购买产品,最终将带指纹产品发送给购买装置201并存储销售记录于销售服务器207,借此在正常商品购买中达到版权管理与可跟踪指纹生成的目的,详细购买流程见图3。Figure 2 shows a schematic diagram of the structure of the digital product distribution system and the information flow among the various components. The entities involved include: copyright issuing server M, purchase device B, copyright server FC, copyright tracking agent TA and arbitration server A, wherein the copyright server has key distribution and authentication functions in addition to copyright server functions. The buyer obtains commodity information from the
在版权管理与盗版追踪方面,可在互联网212关键节点部署多个版权跟踪代理213用于监视网络流量,对可疑数据送至版权监视服务器214处理,依靠从数据中提取出的版权信息,版权监视服务器214请求相应版权发行服务器204确认版权证书的有效性;如发现非法滥用,则版权发行服务器204依靠身份指纹识别出盗版者,向仲裁服务器215提出仲裁申请,仲裁服务器启动仲裁服务单元216并向版权服务器208索取该盗版者的证据指纹信息,通过指纹鉴定单元217对查获的证据指纹与版权服务器颁发的证据指纹的比对,最终给出盗版者的裁决,借此实现版权监视与盗版者身份确认目的,详细流程见图3。In terms of copyright management and piracy tracking, multiple
为了实现以上功能,实施例采用具有加法同态性质的Paillier密码系统,此外Benaloh密码、Naccache-Stern密码等也可满足设计要求。设n=pq,其中p和q是安全素数,令φ(n)和λ(n)分别表示Euler函数和Carmichael函数,例如,根据定义有φ(n)=(p-1)(q-1)和λ(n)=1cm(p-1,q-1),那么模n2构成的整数乘法群有
E(m,r)=gm·rnmodn2(1)E(m, r) = g m r n mod n 2 (1)
其中,m为明文,r为随机数,且m,r<n,加密公钥为(n,g)。令L(u)=(u-1)/n,依据解密密钥λ,可以由密文c求得明文Wherein, m is the plaintext, r is a random number, and m, r<n, and the encryption public key is (n, g). Let L(u)=(u-1)/n, according to the decryption key λ, the plaintext can be obtained from the ciphertext c
可见,这个密码系统是r与无关的,密码的安全性在于对n分解的安全。对于任意和加密函数在上具有同态性质It can be seen that this cryptographic system is r-independent, and the security of the cryptographic system lies in the security of n decomposition. for any and encryption function exist is homomorphic on
E(m1)·E(m2)modn2=E(m1+m2modn)(3)E(m 1 )·E(m 2 ) mod n 2 =E(m 1 +m 2 mod n )(3)
在Hensel-lifting困难问题假设下,由RSA与Paillier密码相结合构造的RSA-Paillier密码是第一个被证明语义安全RSA型密码系统。由于具有RSA相似的密钥,更加便于加密和签名中的应用,这里采用1024-bits长度密钥。Under the assumption of the Hensel-lifting difficulty problem, the RSA-Paillier cipher constructed by combining RSA and Paillier cipher is the first proven semantically secure RSA-type cryptosystem. Since it has a key similar to RSA, it is more convenient for the application in encryption and signature, and the 1024-bits length key is used here.
实施例中的数字签名采用数字签名标准(DSS),使用大素数p和160-bits素数q,实现对160-bits明文的320-bits签名。杂凑函数(Hash Function)采用安全Hash算法(SHA)求取的160-bits摘要。The digital signature in the embodiment adopts the Digital Signature Standard (DSS), and uses a large prime number p and a 160-bits prime number q to realize a 320-bits signature on a 160-bits plaintext. The hash function (Hash Function) adopts the 160-bits digest obtained by the secure Hash algorithm (SHA).
上述的购买流程如图3所示,整个流程包括用户注册与销售过程两部分:The above purchase process is shown in Figure 3. The whole process includes two parts: user registration and sales process:
在用户注册中,购买模块在购买商品前首先需要向版权服务器发送注册请求(A),由注册中心完成注册,包括对合法购买者的身份认证以及颁发用户密钥(pkp,skp)证书,对各种货币支付手段,如银行帐号、信用卡、手机话费等也需在注册阶段完成,然后,注册中心将颁发的密钥证书传递回购买装置(B)。In user registration, the purchase module first needs to send a registration request (A) to the copyright server before purchasing the product, and the registration center completes the registration, including the identity authentication of the legal purchaser and the issuance of the user key (pk p , sk p ) certificate , for various currency payment methods, such as bank account number, credit card, mobile phone bill, etc., also need to be completed in the registration stage, and then, the registration center will pass the issued key certificate back to the purchase device (B).
在销售过程中,发行商的版权发行服务器205首先向购买装置提供所需的商品信息(C),购买者确定购买后启动销售终端进程203,该进程录入各种用户信息,包括:时间戳、用户标识、秘密信息以及密钥证书等,根据这些生成购买者的秘密明文TextB,再由Hash函数求取160-bits长的购买者秘密明文TextB的摘要STRB,最后对STRB加密与签名SIGS,B得到购买承诺PRMB,该承诺将用于生成证据指纹并作为购买者的申述证明。详细的购买请求表项的结构如下表所示,其中长度单位为字节,每字节g-bits:In the sales process, the
在获得购买承诺PRMB后,销售终端模块将购买凭证REQB、用户标识IDB、购买商品描述Des及它们的签名进行打包形成购买请求报文,其中,购买凭证REQB包括时间戳、购买者公钥、源IP地址、购买承诺等内容。最后,将报文进行加密并发送至版权发行服务器(D),具体购买者的购买请求报文表项结构如下表所示:After obtaining the purchase commitment PRM B , the sales terminal module packs the purchase certificate REQ B , the user identification ID B , the purchased product description Des and their signatures to form a purchase request message, wherein the purchase certificate REQ B includes a time stamp, the buyer Public key, source IP address, purchase commitment, etc. Finally, encrypt the message and send it to the copyright issuing server (D). The structure of the purchase request message entry of the specific purchaser is shown in the following table:
接收购买请求报文后,销售模块对信息格式、时间戳等进行有效性检验,对身份进行确认(必要时可选用可信第三方确认身份或实现匿名性),并对请求和支付信息的正确性进行确认,如核对ESB的签名SIGB等。如果通过验证,通过销售管理模块生成购买记录并获取销售记录号NOM,并组合销售商标识、销售记录号、购买凭证、版权发行服务器签名及指纹参数Params构成发行商请求REQM(其中,Params含指纹构造信息,如指纹长度、取值范围等),版权发行服务器再将指纹构造请求REQM进行打包,并以加密形式送往版权服务器(E)。详细的发行商请求包结构如下:After receiving the purchase request message, the sales module checks the validity of the information format, time stamp, etc., confirms the identity (if necessary, a trusted third party can be used to confirm the identity or achieve anonymity), and check the correctness of the request and payment information. Confirmation, such as checking the signature SIG B of ES B , etc. If verified, generate a purchase record by the sales management module and obtain the sales record number NO M , and combine the seller identification, the sales record number, the purchase certificate, the signature of the copyright issuing server and the fingerprint parameter Params to form the issuer's request REQ M (wherein, Params Including fingerprint structure information, such as fingerprint length, value range, etc.), the copyright issuing server then packs the fingerprint structure request REQ M , and sends it to the copyright server (E) in encrypted form. The detailed publisher request package structure is as follows:
版权服务器在接收到发行商请求后,对请求格式进行有效性检查,再对发行商身份IDM、传送信息等的真实性(通过SIGM,R)进行检验,包括核对ESB的签名SIGB与SIGM,然后按照Params要求生成唯一性指纹FINGB,本例中采用直序扩频(DSSS)技术产生伪随机序列构造指纹序列,所采用的反馈型移位寄存器结构如图4所示,由版权服务器随机选择的种子SEEDFC作为反馈型移位寄存器初始状态控制伪随机PN序列,序列为[0,1]序列,(该序列可直接用于生成指纹密钥),为获得可用于嵌入的正态序列,将此PN序列输入如下函数,如图4所示:After receiving the publisher's request, the copyright server checks the validity of the request format, and then checks the authenticity of the publisher's identity ID M and transmission information (through SIG M, R ), including checking the signature SIG B of ES B and SIG M , and then generate a unique fingerprint FING B according to Params requirements. In this example, direct sequence spread spectrum (DSSS) technology is used to generate a pseudo-random sequence to construct a fingerprint sequence. The structure of the feedback shift register used is shown in Figure 4. The seed SEED FC randomly selected by the copyright server is used as the initial state of the feedback shift register to control the pseudo-random PN sequence. The normal sequence of , input this PN sequence into the following function, as shown in Figure 4:
f(x)=2x-1(4)f(x)=2x-1(4)
使之变为[-1,1]序列,再将此序列与正态序列相乘(图402),该正态序列性质由Params确定,性质包括均值、方差等,相乘结果将获得正态分布指纹序列FINGB。版权服务器再用pkB对FINGB中每一分量进行加密得到密文EFB,使用同态性质计算Make it into a [-1, 1] sequence, and then multiply this sequence with a normal sequence (Figure 402). The properties of the normal sequence are determined by Params, and the properties include mean, variance, etc., and the result of the multiplication will be normal Distribute the fingerprint sequence FING B . The copyright server then uses pk B to encrypt each component in FING B to obtain the ciphertext EF B , which is calculated using the homomorphic property
获得含有购买者特征的指纹
如图3所示版权服务器先使用Hash函数对EWB计算认证码HASHW,并进行签名得到SIGW,FC,按照购买凭证REQB中的购买者地址AddrB将报文(IDFC、HASHW和SIGW,FC)以加密形式发送给购买者,请求购买者对指纹EWB进行签名(F);购买者接收由版权服务器发放的报文后,对购买者身份IDFC及认证码签名HASHW进行有效性和真实性认证,如果通过认证,购买者用私钥对指纹认证码进行签名得到SIGW,B,并将其签名通过安全信道返还回版权服务器(G);版权服务器接收购买者签名后对签名SIGW,B进行检验,如果通过检验,则构造版权证书EMBFC,详细的版权证书结构如下,其中,证据指纹段EWB长度由LENB给出:As shown in Figure 3, the copyright server first uses the Hash function to calculate the authentication code HASH W for EW B , and signs it to obtain SIG W, FC , and sends the message (ID FC , HASH W and SIG W, FC ) to the purchaser in encrypted form, requesting the purchaser to sign the fingerprint EW B (F); after receiving the message issued by the copyright server, the purchaser signs HASH on the purchaser ID FC and authentication code W conducts validity and authenticity authentication. If the authentication is passed, the buyer signs the fingerprint authentication code with the private key to obtain SIG W, B , and returns the signature to the copyright server (G) through a secure channel; the copyright server receives the buyer After signing, check the signature SIG W and B. If it passes the test, construct the copyright certificate EMB FC . The detailed structure of the copyright certificate is as follows, where the length of the evidence fingerprint segment EW B is given by LEN B :
版权服务器将版权证书EMBFC通过安全信道传颁发给发行商的版权发行服务器(H);在接收到版权证书后,指纹授权模块核对版权服务器身份、证书有效性、数据格式完整性,然后为验证EWB真实性,对签名SIGW,B、SIGW,FC进行认证,如通过认证,发行服务器也将对EWB进行签名获得签名SIGW.M,并通过安全信道返还SIGW.M至版权服务器:版权服务器接收并检验版权发行服务器签名后,保存必要的信息形成版权记录RECFC,版权服务器结束本次运行,详细的版权记录结构如下:The copyright server sends the copyright certificate EMB FC to the publisher's copyright issuing server (H) through a secure channel; after receiving the copyright certificate, the fingerprint authorization module checks the identity of the copyright server, the validity of the certificate, and the integrity of the data format, and then verifies The authenticity of EW B is to authenticate the signatures SIG W, B , SIG W, and FC . If the authentication is passed, the issuing server will also sign EW B to obtain the signature SIG WM , and return SIG WM to the copyright server through a secure channel: copyright server After receiving and verifying the signature of the copyright issuing server, save the necessary information to form the copyright record REC FC , and the copyright server ends this operation. The detailed structure of the copyright record is as follows:
图5给出了版权发行服务器的版权标记构造和带指纹拷贝生成过程。在接收到版权服务器的版权证书后,分发服务器将版权信息、本次销售记录号IDB、许可证LICB等信息通过指纹编码构造出身份指纹VB,指纹编码方法有Boneh-Shaw指纹模型、IPP码(IdentifiableParent Property可确认父元码),FP码(Frameproof防诬陷码)、TA码(Tracibility可跟踪码)、直接序列扩频指纹等,这里采用Boneh-Shaw模型中FP码实现身份指纹VB的构造,并使用购买者的公钥pkB对VB和原作品X进行加密得到EVB和EX。Fig. 5 shows the construction of the copyright mark and the generation process of the copy with fingerprint of the copyright issuing server. After receiving the copyright certificate from the copyright server, the distribution server constructs an identity fingerprint V B through fingerprint coding of the copyright information, the record number ID B of this sale, and the license LIC B. The fingerprint coding methods include Boneh-Shaw fingerprint model, IPP code (IdentifiableParent Property can confirm the parent code), FP code (Frameproof anti-framing code), TA code (Tracability traceable code), direct sequence spread spectrum fingerprint, etc. Here, the FP code in the Boneh-Shaw model is used to realize the identity fingerprint V B , and use the buyer's public key pk B to encrypt V B and original work X to obtain EV B and EX.
如图5所示,版权发行服务器将身份指纹EVB(501)与证据指纹EWB(502)进行链接操作,使用链接符号‖表示,将两个序列组合为一个序列(503),并通过随机置换操作得到最终指纹FB的加密形式(504),即EFB=π(EWB‖EVB),该置换π对于某一发行商是唯一指定的,并作为发行商秘密保存,目的是保证采用本发明的不同发行商服务器之间也无法了解彼此的信息,以增强安全性。As shown in Figure 5, the copyright issuing server links the identity fingerprint EV B (501) and the evidence fingerprint EW B (502), using the link symbol ‖ to indicate that the two sequences are combined into one sequence (503), and through random The permutation operation obtains the encrypted form of the final fingerprint F B (504), namely EF B = π(EW B ∥EV B ), the permutation π is uniquely specified for a certain issuer, and is kept as a secret of the issuer to ensure that The servers of different publishers adopting the present invention cannot understand each other's information, so as to enhance security.
对不同媒体采用不同的融合方法,例如,对文本、软件等媒体,可采用一种“密钥指纹”的融合技术,即在媒体头部增加一个“指纹密钥块”,使用一般的加密方法对媒体内容进行加密,其加密密钥可从指纹密钥块求得,并且这种求取方法是由指纹信息决定的(506),如DVD中的内容加扰系统(CSS)、Fiat-Naor的广播加密方法、Chor-Fiat-Naor的叛逆者跟踪(Traitor Tracing)方法等;对视频、音频媒体,可采用数字水印的嵌入方式,即将指纹信息嵌入媒体内容之中(507),如Cox方法、DIM方法、最低比特嵌入等都是较为成型的水印嵌入技术。本实施例以水印方式进行说明,对FB、X的加密形式EFB、EX,根据同态加密性质有Different fusion methods are used for different media. For example, for media such as text and software, a "key fingerprint" fusion technology can be used, that is, a "fingerprint key block" is added to the head of the media, and a general encryption method is used to The media content is encrypted, and its encryption key can be obtained from the fingerprint key block, and this method of obtaining is determined by the fingerprint information (506), such as content scrambling system (CSS) in DVD, Fiat-Naor The broadcast encryption method of Chor-Fiat-Naor, the Traitor Tracing method of Chor-Fiat-Naor, etc.; for video and audio media, the digital watermark embedding method can be used, that is, the fingerprint information is embedded in the media content (507), such as the Cox method , DIM method, lowest bit embedding, etc. are relatively well-established watermark embedding technologies. In this embodiment, watermarking is used for illustration. For the encrypted forms EF B and EX of F B and X, according to the property of homomorphic encryption,
即得到带指纹FB的作品XB的加密形式EXB。利用掩蔽技术提供的掩蔽因子来提高指纹的隐藏能力(可选,掩蔽技术是一种针对人类视觉与听觉的感知特点而将信息隐藏起来的技术,通常是通过人类视觉与听觉掩蔽模型,如Johnston视觉模型,计算出掩蔽因子来控制待隐藏信息的嵌入强度)。That is, the encrypted form EX B of the work X B with the fingerprint F B is obtained. Use the masking factor provided by masking technology to improve the hiding ability of fingerprints (optional, masking technology is a technology that hides information according to the perception characteristics of human vision and hearing, usually through human visual and auditory masking models, such as Johnston The visual model calculates the masking factor to control the embedding strength of the information to be hidden).
版权发行服务器按照购买模块指定的标准格式对EXB进行打包(如各种工业或企业媒体标准),并发放产品许可证,再将打包后拷贝通过安全信道传送到购买者(见图3I)。购买者的销售终端进程接收到从发行服务器传递的拷贝并检查文件格式,然后对文件中许可证进行有效性检验,如果符合许可,则对EXB使用私钥skp获得该用户拷贝XB。The copyright distribution server packs EX B according to the standard format specified by the purchase module (such as various industry or enterprise media standards), and issues a product license, and then sends the packaged copy to the buyer through a secure channel (see Figure 3I). The buyer's point-of-sale terminal process receives the copy delivered from the distribution server and checks the file format, then checks the validity of the license in the file, and if it conforms to the license, uses the private key sk p to EX B to obtain the user's copy X B .
最后,版权发行服务器检查与购买模块的通信是否正常结束,如果通信信道关闭,则认为本次购买已成功完成,并将保留当前销售记录RECM等信息,并结束本次运行。详细的销售记录内容结构如下:Finally, the copyright issuing server checks whether the communication with the purchase module ends normally. If the communication channel is closed, it considers that the purchase has been successfully completed, and will keep information such as the current sales record REC M , and end the operation. The detailed sales record content structure is as follows:
本实施例的一个功能是实现对数字作品的版权控制与盗版者跟踪。One function of this embodiment is to realize the copyright control of digital works and the tracking of pirates.
当部署于Internet网络关键节点、下载服务器、客户端播放软件中的版权跟踪代理发现可疑作品后,依据发行商提供的身份指纹信息(包括在媒体中位置、置换、版权要求等),提取出身份指纹中的许可证内容,如果发现许可证失效,则表明出现非法侵权事件。代理启动相应的叛逆者跟踪流程,如图3所示。首先,代理将这些盗版作品传送给所属版权所有者,由版权发行服务器中的指纹授权模块进一步检查许可证与版权信息的侵权情况,并通过身份指纹找到该商品的销售记录,将提取出的证据指纹与销售凭证SALEM发送给仲裁服务器(a);在仲裁服务器检查销售凭证SALEM中各种签名来确认请求的有效性后,向版权服务器发送证据指纹查询请求(b);版权服务器根据查询命令查找版权记录RECFC,并将记录以安全方式传送回仲裁服务器(c);仲裁服务器综合销售纪录与版权记录检查数据与签名的一致性,进而检测版权服务器颁发的证据指纹与查获盗版物中的证据指纹的一致性,确定该盗版者是否有非法侵害。如果盗版行为被确认,则向这一购买者提出控告和提请申述证据(d);购买者将自己的购买时录入销售终端进程的秘密明文TextB作为申述证据发送给仲裁服务器(e);仲裁服务器依据所有这些信息还原整个销售过程,给出最终的仲裁结果,并将结果发送回发行服务器(f)。When the copyright tracking agent deployed in the key nodes of the Internet network, download servers, and client playback software finds suspicious works, it extracts the identity based on the identity fingerprint information provided by the publisher (including location in the media, replacement, copyright requirements, etc.) The content of the license in the fingerprint, if the license is found to be invalid, it indicates that there has been an illegal infringement event. The agent starts the corresponding traitor tracking process, as shown in Figure 3. First, the agent transmits these pirated works to the copyright owner, and the fingerprint authorization module in the copyright issuance server further checks the infringement of the license and copyright information, and finds the sales record of the product through the identity fingerprint, and extracts the evidence The fingerprint and the sales voucher SALE M are sent to the arbitration server (a); after the arbitration server checks the various signatures in the sales voucher SALE M to confirm the validity of the request, it sends an evidence fingerprint query request to the copyright server (b); the copyright server according to the query Command to find the copyright record REC FC , and send the record back to the arbitration server in a secure manner (c); the arbitration server integrates the sales record and the copyright record to check the consistency of the data and the signature, and then detects the evidence fingerprint issued by the copyright server and the seized pirated product The consistency of the evidence fingerprints determines whether the pirate has illegally infringed. If the piracy is confirmed, then file a complaint with the buyer and submit evidence of appeal (d); the buyer sends the secret plaintext Text B entered into the sales terminal process during purchase to the arbitration server as evidence of appeal (e); arbitration The server restores the entire sales process based on all these information, gives the final arbitration result, and sends the result back to the issuing server (f).
在图6中给出了详细的版权控制与盗版者跟踪流程。版权发行服务器首先将盗版作品X’601和原作品X进行比较,并利用与指纹融合算法相对应的指纹特征提取算法603提取出指纹特征序列F’B 604;再将其拆分为身份指纹V’B 605和证据指纹W’B 614两部分;对身份指纹V’B进行许可证与版权检测606,如授权检测608通过,则认定为许可产品608,结束运行;否则判定出现盗版,并将购买序号NOM 609、销售凭证SALEM与随机逆置换π-1610后的证据指纹W’B 611一起传送给仲裁服务器;在检查销售凭证SALEM有效性后,仲裁服务器向版权服务器发送获取版权标记FINGB的请求,版权服务器根据销售纪录重新构造出版权标记FINGB612,并按照等式(5)与购买者的秘密信息STRB613综合出证据指纹WB 614,并将WB与销售记录中签名通过安全信道传送回仲裁服务器。仲裁服务器使用版权发行服务器的销售记录中的各种签名615验证版权服务器所传送WB的正确性616,如果不一致,说明商品销售中存在错误,控告证据无效617;否则,仲裁服务器对证据指纹WB与盗版中的证据指纹W’B的相似性,如果相似性能够确认,则确认出现盗版620,否则表明发行服务器提供的证据无效619。Figure 6 shows the detailed copyright control and pirate tracking process. The copyright issuing server first compares the pirated work X'601 with the original work X, and uses the fingerprint
Claims (16)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2006100116997A CN100435162C (en) | 2006-04-18 | 2006-04-18 | Construction and Verification Method of Fingerprint in Digital Product and Digital Product Issuing System |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2006100116997A CN100435162C (en) | 2006-04-18 | 2006-04-18 | Construction and Verification Method of Fingerprint in Digital Product and Digital Product Issuing System |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1834973A CN1834973A (en) | 2006-09-20 |
CN100435162C true CN100435162C (en) | 2008-11-19 |
Family
ID=37002717
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2006100116997A Expired - Fee Related CN100435162C (en) | 2006-04-18 | 2006-04-18 | Construction and Verification Method of Fingerprint in Digital Product and Digital Product Issuing System |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100435162C (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103235908A (en) * | 2013-02-22 | 2013-08-07 | 北京密安网络技术股份有限公司 | Digital safety protection algorithm |
Families Citing this family (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100067692A1 (en) * | 2006-12-11 | 2010-03-18 | Mark Alan Schultz | Picture-based visible anti-piracy system and method for digital cinema |
CN102567657A (en) * | 2010-12-15 | 2012-07-11 | 黄铁军 | Digital work ownership authentication system and digital work ownership authentication method |
US20130003963A1 (en) * | 2011-07-01 | 2013-01-03 | Gyan Prakash | Thwarting Unauthorized Content Copying Using Media Tracking Code |
CN102306305B (en) * | 2011-07-06 | 2013-04-17 | 北京航空航天大学 | Method for authenticating safety identity based on organic characteristic watermark |
CN102629901B (en) * | 2012-03-08 | 2014-08-20 | 成都天钥科技有限公司 | Identity authentication method, system thereof, authentication subject and authenticated subject |
CN103632071B (en) * | 2012-08-28 | 2018-04-13 | 北京超图软件股份有限公司 | The copy-right protection method and system of geographical spatial data product |
CN104537538A (en) * | 2014-12-29 | 2015-04-22 | 芜湖乐锐思信息咨询有限公司 | Efficient and safe internet online trading system |
CN108615218B (en) * | 2018-05-02 | 2022-02-15 | 北京印刷学院 | Printed quantum dot watermark detection method based on pseudo-random information spatial modulation |
CN110831102B (en) * | 2018-08-07 | 2023-03-28 | 香港科技大学 | Path construction method and system |
CN109190333A (en) * | 2018-08-22 | 2019-01-11 | 山东超越数控电子股份有限公司 | A kind of high intensity method for protecting software |
CN109190335B (en) * | 2018-09-17 | 2020-05-05 | 北京市计算中心 | Software copyright protection method and system |
CN109523337A (en) * | 2018-09-19 | 2019-03-26 | 平安科技(深圳)有限公司 | Patent transaction method, apparatus, computer equipment and storage medium |
CN110378140B (en) * | 2019-07-26 | 2021-05-18 | 武汉轻工大学 | Method, device and system for verifying attribution of deep neural network model |
CN113159762B (en) * | 2021-01-28 | 2024-04-09 | 武汉天喻信息产业股份有限公司 | Blockchain transaction method based on Paillier and game theory |
CN116192409B (en) * | 2023-03-17 | 2025-05-27 | 矩阵时光数字科技有限公司 | Digital asset issuing method and system |
CN119167336B (en) * | 2024-11-19 | 2025-01-24 | 成都亿橙科技有限公司 | A digital fingerprint hiding method based on document content |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002042970A1 (en) * | 2000-11-21 | 2002-05-30 | Kilseob Yang | Method and system for server to execute electronic commerce in concerted internet site and off-line store |
JP2003256595A (en) * | 2002-02-26 | 2003-09-12 | Ntt Comware Corp | Content distribution authentication system and content distribution authentication method, program for causing computer to execute this method, and recording medium recording this method |
CN1621992A (en) * | 2004-12-20 | 2005-06-01 | 四川大学 | Method for software copyright protection |
WO2006014040A1 (en) * | 2004-08-06 | 2006-02-09 | Electronics And Telecommunications Research Institute | System for distributing digital contents and method thereof |
-
2006
- 2006-04-18 CN CNB2006100116997A patent/CN100435162C/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002042970A1 (en) * | 2000-11-21 | 2002-05-30 | Kilseob Yang | Method and system for server to execute electronic commerce in concerted internet site and off-line store |
JP2003256595A (en) * | 2002-02-26 | 2003-09-12 | Ntt Comware Corp | Content distribution authentication system and content distribution authentication method, program for causing computer to execute this method, and recording medium recording this method |
WO2006014040A1 (en) * | 2004-08-06 | 2006-02-09 | Electronics And Telecommunications Research Institute | System for distributing digital contents and method thereof |
CN1621992A (en) * | 2004-12-20 | 2005-06-01 | 四川大学 | Method for software copyright protection |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103235908A (en) * | 2013-02-22 | 2013-08-07 | 北京密安网络技术股份有限公司 | Digital safety protection algorithm |
Also Published As
Publication number | Publication date |
---|---|
CN1834973A (en) | 2006-09-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100435162C (en) | Construction and Verification Method of Fingerprint in Digital Product and Digital Product Issuing System | |
Lei et al. | An efficient and anonymous buyer-seller watermarking protocol | |
Choi et al. | Does it need trusted third party? design of buyer-seller watermarking protocol without trusted third party | |
US20080092220A1 (en) | Method and system for secure distribution and utilization of data over a network | |
EP1220078B1 (en) | Content distribution system, copyright protection system and content receiving terminal | |
CN102025507B (en) | A Digital Rights Management Method for Protecting the Privacy of Digital Content Consumers | |
CN101206696A (en) | Devices, methods and systems for protecting personal information | |
CN103491098A (en) | Software authorization method based on public key cryptosystem | |
JP2002183633A (en) | Information-recording medium, information processor, information processing method, program recording medium and information processing system | |
Thomas et al. | Joint watermarking scheme for multiparty multilevel DRM architecture | |
CN113837875B (en) | Transaction methods, nodes and media based on blockchain network | |
Chang et al. | An enhanced buyer seller watermarking protocol | |
Frattolillo | A buyer-friendly and mediated watermarking protocol for web context | |
Nair et al. | Enabling DRM-preserving digital content redistribution | |
KR20100114321A (en) | Digital content transaction-breakdown the method thereof | |
Waller et al. | Securing the delivery of digital content over the Internet | |
Yang et al. | Enhanced digital rights management authentication scheme based on smart card | |
CN103186731B (en) | The digital literary property protection method of a kind of hybrid mode and system | |
Cheung et al. | Rights protection for digital contents redistribution over the Internet | |
Chang et al. | An efficient and fair buyer–seller fingerprinting scheme for large scale networks | |
Cheung et al. | The use of digital watermarking for intelligence multimedia document distribution | |
Tomsich et al. | Copyright protection protocols for multimedia distribution based on trusted hardware | |
Eslami et al. | Proxy signatures and buyer–seller watermarking protocols for the protection of multimedia content | |
Hu et al. | A secure and practical buyer-seller watermarking protocol | |
JP2001202452A (en) | Digital content distribution method, its apparatus and program recording medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20081119 Termination date: 20110418 |