[go: up one dir, main page]

CN106611108B - Optical disk copyright protection method - Google Patents

Optical disk copyright protection method Download PDF

Info

Publication number
CN106611108B
CN106611108B CN201611092781.7A CN201611092781A CN106611108B CN 106611108 B CN106611108 B CN 106611108B CN 201611092781 A CN201611092781 A CN 201611092781A CN 106611108 B CN106611108 B CN 106611108B
Authority
CN
China
Prior art keywords
optical disc
dynamic
verification
code
token
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611092781.7A
Other languages
Chinese (zh)
Other versions
CN106611108A (en
Inventor
于晴
王振伟
徐富豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING TIP TECHNOLOGY CO Ltd
Original Assignee
BEIJING TIP TECHNOLOGY CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING TIP TECHNOLOGY CO Ltd filed Critical BEIJING TIP TECHNOLOGY CO Ltd
Priority to CN201611092781.7A priority Critical patent/CN106611108B/en
Publication of CN106611108A publication Critical patent/CN106611108A/en
Application granted granted Critical
Publication of CN106611108B publication Critical patent/CN106611108B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)
  • Optical Recording Or Reproduction (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a CD copyright protection method, relating to the field of computer software, comprising the following steps: when the computer reads or writes the optical disc, the computer runs the authentication program in the optical disc; using an authentication program, first reading first verification information recorded in a main description volume of an optical disc, and verifying the first verification information; after the first verification information is successfully verified, continuously reading second verification information recorded in a main description volume of the optical disc by using an authentication program, and generating a dynamic verification code of the optical disc according to the second verification information; generating a dynamic verification code of the dynamic token by starting the dynamic token issued by matching with the optical disc in corresponding time; and matching the dynamic verification code of the optical disc with the dynamic verification code of the dynamic token, and continuing to operate the optical disc or quit the optical disc according to the matching result. The invention realizes the copyright protection of the optical disc by utilizing the verification information and the non-contact dynamic token written in the head part of the file system.

Description

Optical disk copyright protection method
Technical Field
The invention relates to the field of computer software, in particular to a method for protecting the copyright of an optical disk.
Background
Common disc copying techniques include Cactus Data shield, discgouard, Dummyfiles, and the like. Due to the defect of the protection mechanism, the optical disc is easy to be successfully copied, and the copy of the optical disc can be copied for the second time, so that the files and software can be randomly used without the protection of intellectual property rights.
For example, Captus Data Shiedld is a music protected CD technology that interferes with the operation of a CD-ROM in the copying process by adding electronic auto-recording sectors to the disk. However, this technique is not compatible with CD technology (or CDROM recorders) and is therefore not widely used.
Another example is DiscGuard, which is a pair: encrypted using an execution file on the optical disc, a CD-ROM is digitally signed when stamped and mapped into a sequence of software that executes to compare the serial number to the digital signature. The DiscGuard is still copied when copied using an optical disc recorder.
Disclosure of Invention
The embodiment of the invention provides a method for protecting the copyright of an optical disc, which solves the problem that the copyright of the optical disc cannot be protected in the prior art.
The optical disc copyright protection method provided by the embodiment of the invention comprises the following steps:
when a computer reads or writes an optical disc, the computer runs an authentication program in the optical disc;
using the authentication program, first reading first verification information recorded in a main description volume of the optical disc, and verifying the first verification information;
after the first verification information is successfully verified, continuously reading second verification information recorded in a main description volume of the optical disc by using the authentication program, and generating a dynamic verification code of the optical disc according to the second verification information;
generating a dynamic verification code of the dynamic token by starting the dynamic token issued by pairing with the optical disc in corresponding time;
and matching the dynamic verification code of the optical disc with the dynamic verification code of the dynamic token, and continuing to operate the optical disc or quit the optical disc according to a matching result.
Preferably, the first authentication information and the second authentication information are stored before a path table address of the primary description volume.
Preferably, the first verification information is self-defined verification ciphertext information, and the verifying the first verification information includes:
and the authentication program decrypts the self-defined verification ciphertext information and determines whether verification is successful or not according to a decryption result.
Preferably, the determining whether the verification is successful according to the decryption result includes:
if the authentication program can obtain the verification plaintext information by decrypting the self-defined verification ciphertext information, and the obtained verification plaintext information is matched with the preset verification information, the verification is determined to be successful, otherwise, the verification is determined to be failed.
Preferably, the second verification information includes a token code of a dynamic token, the dynamic verification code of the optical disc includes a first dynamic verification code, and the generating the dynamic verification code of the optical disc according to the second verification information includes:
and inputting the token code of the dynamic token and the first current time of the computer into a pseudo-random algorithm, and obtaining a first dynamic verification code of the optical disc through pseudo-random calculation.
Preferably, the dynamic verification code of the dynamic token includes a first dynamic verification code of the dynamic token, and the step of generating the dynamic verification code of the dynamic token by starting the dynamic token issued by pairing with the optical disc within a corresponding time includes:
after the dynamic token is started, inputting a token code of the dynamic token and second current time into a pseudo-random algorithm, and obtaining a first dynamic verification code of the dynamic token through pseudo-random calculation;
wherein the second current time is within a time window centered on the first current time.
Preferably, the matching the dynamic verification code of the optical disc with the dynamic verification code of the dynamic token, and continuing to operate the optical disc or quit the optical disc according to the matching result includes:
and matching the first dynamic verification code of the optical disc with the first dynamic verification code of the dynamic token, if so, continuing to operate the optical disc, otherwise, exiting the optical disc.
Preferably, the second verification information further includes a key of a dynamic token, the dynamic verification code of the optical disc includes a second dynamic verification code, and the generating the dynamic verification code of the optical disc according to the second verification information further includes:
and inputting the key of the dynamic token and the third current time of the computer into a pseudo-random algorithm, and obtaining a second dynamic verification code of the optical disc through pseudo-random calculation.
Preferably, the step of generating the dynamic verification code of the dynamic token by starting the dynamic token issued by pairing with the optical disc within a corresponding time further comprises:
the dynamic token inputs a self secret key and a fourth current time into a pseudo-random algorithm, and a second dynamic verification code of the dynamic token is obtained through pseudo-random calculation;
wherein the fourth current time is within a time window centered on the third current time.
Preferably, the matching the dynamic verification code of the optical disc with the dynamic verification code of the dynamic token, and continuing to operate the optical disc or quit the optical disc according to the matching result further includes:
and matching the second dynamic verification code of the optical disc with the second dynamic verification code of the dynamic token, if so, continuing to operate the optical disc, otherwise, exiting the optical disc.
The technical scheme provided by the embodiment of the invention has the following beneficial effects:
the embodiment of the invention starts from the file system of the bottom layer optical disc file, writes the verification information in the head part of the file system by utilizing the characteristics of the file system, and combines the non-contact dynamic token technology, thereby realizing the protection of the optical disc copyright.
Drawings
Fig. 1 is a block diagram of a method for protecting a copyright of an optical disc according to an embodiment of the present invention;
FIG. 2 is a block diagram of ISO9660 provided by an embodiment of the present invention;
FIG. 3 is a schematic diagram of a comparison of a header of an existing ISO9660 file with a header of an embodiment of the present invention;
fig. 4 is a three-layer authentication information identification diagram of a file header of an ISO9660 file provided by an embodiment of the present invention;
fig. 5 is a flow chart of a three-tier authentication mechanism provided by an embodiment of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings, and it should be understood that the preferred embodiments described below are only for the purpose of illustrating and explaining the present invention, and are not to be construed as limiting the present invention.
Fig. 1 is a block diagram of a method for protecting a copyright of an optical disc according to an embodiment of the present invention, and as shown in fig. 1, the method includes the steps of:
step S101: the optical disc issuing organization pairs the optical disc and the dynamic token and issues the paired optical disc and the dynamic token together.
Step S102: when a computer reads, runs or records an optical disc, the computer firstly runs an authentication program in the optical disc.
After the optical disc is inserted into the optical drive of the computer, the computer operating system opens the optical disc by analyzing the optical disc file system, and obtains the bound authentication program and the optical disc software to be protected. If the computer needs to operate the optical disk software, etc., the computer firstly uses the authentication program to verify so as to determine that the user has the legal authority to operate the optical disk software.
Step S103: first, first verification information recorded in a main description volume of the optical disc is read and verified by the authentication program.
The first verification information is self-defined verification ciphertext information and is stored in front of the path table address of the main description volume.
The computer decrypts the self-defined verification ciphertext information by using the authentication program, and if verification plaintext information is obtained and the obtained verification plaintext information is matched with preset verification information, the verification is determined to be successful; and if the decryption cannot be successfully carried out or the obtained verification plaintext information is not matched with the preset verification information, determining that the verification fails.
If the first verification information fails to verify, the computer quits the optical disk if the user does not have the authority to operate the optical disk.
Step S104: after the first verification information is successfully verified, the authentication program is utilized to continuously read the second verification information recorded in the main description volume of the optical disc, and the dynamic verification code of the optical disc is generated according to the second verification information.
The second verification information comprises a token code of the dynamic token and a key of the dynamic token, and is stored in front of the path table address of the main description volume.
The dynamic verification code of the optical disc comprises a first dynamic verification code and a second dynamic verification code of the optical disc. The first dynamic verification code of the optical disc is obtained by inputting the token code of the dynamic token and the first current time of the computer into a pseudo-random algorithm by an authentication program and performing pseudo-random calculation. The second dynamic verification code of the optical disc is obtained by inputting the key of the dynamic token and the third current time of the computer into a pseudo-random algorithm by an authentication program and performing pseudo-random calculation.
Step S105: and generating a dynamic verification code of the dynamic token by starting the dynamic token issued by pairing with the optical disc in corresponding time.
The dynamic authentication code of the dynamic token comprises a first dynamic authentication code and a second dynamic authentication code of the dynamic token. The first dynamic verification code of the dynamic token is obtained by inputting the token code of the dynamic token and the second current time into a pseudo-random algorithm by the dynamic token and performing pseudo-random calculation. And the second dynamic verification code of the dynamic token is obtained by inputting the self secret key and the fourth current time into a pseudo-random algorithm by the dynamic token and performing pseudo-random calculation.
The minimum unit of the first current time, the second current time, the third current time and the fourth current time is minutes, so that the first current time and the second current time are the same time, and the third current time and the fourth current time are the same time as far as possible. In the embodiment of the present invention, a time window centered on the first current time may be set, the length of the time window may be selectable, for example, 30s, 40s, 50s, and 1 minute, and the second current time may fall within the time window. Likewise, a time window centered on the third current time may be set, and the length of the time window may be selectable, for example, 30s, 40s, 50s, 1 minute, and the fourth current time may fall within the time window.
Step S106: and matching the dynamic verification code of the optical disc with the dynamic verification code of the dynamic token, and continuing to operate the optical disc or quit the optical disc according to a matching result.
And matching the first dynamic verification code of the optical disc with the first dynamic verification code of the dynamic token, exiting the optical disc if the first dynamic verification code of the optical disc is not matched with the first dynamic verification code of the dynamic token, continuing to operate if the first dynamic verification code of the optical disc is not matched with the first dynamic verification code of the dynamic token, matching the second dynamic verification code of the optical disc with the second dynamic verification code of the dynamic token, exiting the optical disc if the second dynamic verification code of the optical disc is not matched with the second dynamic verification code of the.
For the second authentication information, the following two ways may be adopted for authentication:
1. the authentication program reads the token code of the dynamic token and the key of the dynamic token at the same time, and generates the first dynamic verification code and the second dynamic verification code of the optical disc at the same time according to the token code and the key of the dynamic token and the current time (i.e. the first current time and the second current time are the same time). Similarly, after the dynamic token is started, the dynamic token simultaneously generates a first dynamic verification code and a second dynamic verification code of the dynamic token according to the token code, the secret key and the current time (namely, the third current time and the fourth current time are the same time). Then the first dynamic verification code of the optical disc and the dynamic token are respectively matched, and the second dynamic verification code of the optical disc and the dynamic token are matched, if both are matched, the verification is successful, at this moment, the optical disc software can be operated, otherwise, the verification is failed, and at this moment, the optical disc is quitted.
2. The authentication program first reads the token code of the dynamic token and generates a first dynamic verification code of the optical disc according to the token code and the current time (i.e. the first current time). And after the dynamic token is started, generating a first dynamic verification code of the dynamic token according to the token code and the current time (namely, the second current time). If the first dynamic verification code of the optical disc and the dynamic token match, the authentication program continues to read the key of the dynamic token and generates the second dynamic verification code of the optical disc according to the key and the current time (i.e. the third current time lagging the first current time). The dynamic token generates a second dynamic authentication code for the dynamic token based on its token code and the current time (i.e., a fourth current time that lags the second current time). If the second dynamic verification code of the optical disc and the dynamic token are matched, the verification is successful, the optical disc software can be operated at the moment, otherwise, the verification fails, and the optical disc is quitted at the moment.
It will be understood by those skilled in the art that all or part of the steps in the method according to the above embodiments may be implemented by a program, which may be stored in a computer-readable storage medium, and includes steps S101 to S104 when the program is executed. The storage medium may be ROM/RAM, magnetic disk, optical disk, etc.
The embodiment of the invention effectively prevents the copy and burning of the optical disk software by self-defining the verification information and the non-contact dynamic token.
Fig. 2 is a Structure diagram of ISO9660 according to an embodiment of the present invention, and as shown in fig. 2, a Structure of a general optical disc file may be divided into three main Directory entries, which are a Primary description Volume (Primary Volume Descriptor), a path table (PathTable), and a Directory Structure table (Directory Structure) in sequence. The relationship between the three is shown in fig. 2, in which the actual storage addresses of the path table and the directory structure table are indicated in the master description volume. The address of each path is stored in the path table, and in the directory structure table, the directory structure of the entire ISO9660 file system is constructed and the storage address of each file is indicated. The main task of the software that usually writes/reads an optical disc is to construct/parse directory entries according to the file system requirements of ISO 9660.
As can be seen from FIG. 2, in the case of file storage, in the ISO9660 file system, the storage content of the start position (address: 0x0000-0x8000) is not required. The storage of the Path Table address is required in the official document of ISO9660 starting from 0x 8000. The operation of opening the optical disc in the general sense is because the computer operating system reads the software and analyzes the structure of the ISO9660 file system to find the storage path of the file, so that the general end user can directly see the content of the optical disc. Opening the disc and performing the copy and paste operation starts from the actual storage path of the file. Although this method can copy the contents of the optical disc, it cannot copy the structure of the optical disc file system. In general, the optical disc copying technology usually performs copying of an image file, i.e. directly performs backup of the entire file system.
In order to prevent the copy of the optical disc content and the optical disc image file, the embodiment of the present invention adds its own information to the header address 0x0000 of the file system, and then protects the software by combining the dynamic token.
Fig. 3 is a schematic diagram comparing a header of an existing ISO9660 file with a header of an embodiment of the present invention, and as shown in fig. 3, a is a header of an existing normal ISO9660 file, which is generally written automatically at 0x00, whereas in an ISO9660 file system modified according to an embodiment of the present invention, information of the file is added to the header of the file to form a header of a custom ISO9660 file.
Fig. 4 is a three-layer verification information (i.e., custom protection information) identification diagram of a file header of an ISO9660 file provided by an embodiment of the present invention, where, as shown in fig. 4, the identified information includes: part A marked by a square block represents self-defined verification ciphertext information (namely first verification information), part B marked by underlining is a token number of the dynamic token, part C marked by an angle bracket is a secret key of the non-contact dynamic token matched with the optical disc, and the token number and the secret key of the dynamic token are the second verification information.
The dynamic token technology is a technology which enables a user password to change constantly according to time and each user can only use the password once. The password generation device comprises special hardware, a built-in power supply, a password generation chip and a display screen, wherein the password generation chip runs a special password algorithm, generates a current password according to the current time and displays the current password on the display screen. The authentication end (i.e. the computer reading or writing the optical disc) calculates the current valid password by using the same algorithm. When the user uses the system, the user only needs to input the current password displayed on the dynamic token into the computer, and the identity authentication can be realized. The dynamic token is provided with a built-in unique seed (namely a secret key of the dynamic token), the unique seed and the current time generate a password through a pseudo-random algorithm, the password changes once every minute and is a one-time password, and the password is invalid after being used and cannot be reused.
That is to say, the embodiment of the present invention adopts a three-layer defense system to ensure the copyright of the optical disc software. Fig. 5 is a flowchart of a three-layer authentication mechanism provided in an embodiment of the present invention, and as shown in fig. 5, a specific execution flow includes: when the program in the optical disc starts to run, executing an authentication program, wherein the authentication program firstly reads the information (part A information in fig. 4) of the first address of the optical disc and decrypts, and if the part A information is incorrect, the program directly exits; if the information of the part A is matched, the program reads the serial number of the dynamic token (the information of the part B in the figure 4), the authentication program combines the information of the part B with the current time to generate a verification code Y1, the verification code Y2 is generated inside the dynamic token by combining the system time and the serial number information of the dynamic token, and if the Y1 is different from the Y2, the program exits; if Y1 is the same as Y2, the dynamic token matches the optical disc, thereby guaranteeing a disc-one. After the information in part B is successfully verified, the authentication program then combines the dynamic token key (part C information in fig. 4) in the optical disc with the current system time to generate a verification code Y3, the dynamic token also combines the token internal key and the system time to generate a verification code Y4, and Y4 is displayed on the display screen of the dynamic token, the user needs to input Y4 at the computer end, the authentication program compares Y3 with Y4, and if the two are the same, the software can run.
EXAMPLE 1 optical disc recording
The optical disc issuing organization pairs the optical disc and the dynamic token and issues the paired optical disc and the dynamic token together. When recording the optical disc, the certification program of the optical disc issuer firstly reads the first verification information recorded in the main description volume of the optical disc and verifies the first verification information, if the first verification information fails, the optical disc is exited; if the first verification information is verified successfully, continuing to read the token code of the dynamic token recorded in the main description volume of the optical disc, matching the dynamic verification code generated according to the token code and the current time with the dynamic verification code generated by the dynamic token according to the token code and the current time, and if the token code and the current time are not matched, exiting the optical disc; if the dynamic verification code is matched with the seed of the dynamic token, the optical disc is quitted, and if the dynamic verification code is matched with the seed of the dynamic token, the optical disc is recorded.
In the embodiment of the invention, the protection information (namely the first verification information and the second verification information) is written in the optical disc image file ISO9660 file system at the beginning of the zero address, and the optical disc file and the dynamic token are bound by using the dynamic token technology, so that the protection of the copyright of the optical disc software is effectively ensured.
Example 2 optical disc software operation
And the optical disc issuing organization pairs the optical disc and the dynamic token and issues the paired optical disc and the dynamic token together, wherein the authentication program is bound with the optical disc software to be protected, displayed as an executable program and stored in the optical disc. During the reading of the software of the optical disc inserted into the optical disc drive by the computer, the computer operating system parses the ISO9660 file format, opens the optical disc, and causes the executable program to be displayed in the optical disc for execution. The authentication program is first run and verifies the user's right to read or copy the software. Specifically, the authentication program first reads first authentication information recorded in the main description volume of the optical disc and authenticates the first authentication information, after the first authentication information is successfully authenticated, the authentication program continues to read the token code of the dynamic token recorded in the main description volume of the optical disc, matches the dynamic authentication code generated according to the token code and the current time with the dynamic authentication code generated according to the dynamic token according to the token code and the current time, after the matching is successful, the authentication program continues to read the key of the dynamic token recorded in the main description volume of the optical disc, matches the dynamic authentication code generated according to the key and the current time with the dynamic authentication code generated according to the dynamic token according to the seed and the current time, and if the matching is successful, the optical disc software is allowed to run. That is, when only three pieces of information are verified, it is indicated that the user has the right to operate the optical disc software.
EXAMPLE 3 optical disc software replication
In this embodiment, the authentication program is bound with the optical disc software to be protected, and displayed as an executable program, and stored in the optical disc. Since the authentication program and the optical disc software to be protected are combined into an executable program, the authentication program must exist in the copied optical disc content. When the copied optical disk software is operated, the authentication program is still operated firstly, and if the A, B, C part information or A, B, C part information error cannot be found, the software cannot be operated, so that the optical disk software is protected.
In summary, the embodiments of the present invention have the following technical effects:
the embodiment of the invention utilizes an ISO9660 file format and adds a three-layer verification mechanism by combining a dynamic token, thereby effectively protecting the intellectual property of the optical disc.
Although the present invention has been described in detail hereinabove, the present invention is not limited thereto, and various modifications can be made by those skilled in the art in light of the principle of the present invention. Thus, modifications made in accordance with the principles of the present invention should be understood to fall within the scope of the present invention.

Claims (9)

1. A method for protecting a copyright of an optical disc, comprising:
when a computer reads or writes an optical disc, the computer runs an authentication program in the optical disc;
reading the self-defined verification ciphertext information recorded in the main description volume of the optical disc as first verification information by using an authentication program in the optical disc run by a computer when the computer reads or writes the optical disc, and verifying the self-defined verification ciphertext information;
after the user-defined verification ciphertext information in the optical disc main description volume is successfully verified, continuously reading second verification information recorded in the optical disc main description volume by using an authentication program in the optical disc, and generating a dynamic verification code of the optical disc according to the second verification information;
generating a dynamic verification code of the dynamic token by starting the dynamic token issued by pairing with the optical disc in corresponding time;
matching the dynamic verification code of the optical disc with the dynamic verification code of the dynamic token, and continuing to operate the optical disc or quit the optical disc according to the matching result;
wherein, verifying the custom verification ciphertext information comprises: the authentication program in the optical disc decrypts the user-defined verification ciphertext information, and determines whether the verification is successful according to a decryption result;
wherein the second authentication information comprises a token code of the dynamic token and a key of the dynamic token.
2. The method of claim 1, wherein the first authentication information and the second authentication information are stored before a path table address of the primary description volume.
3. The method of claim 2, wherein the determining whether the verification is successful according to the decryption result comprises:
if the authentication program in the optical disc can obtain the verification plaintext information by decrypting the self-defined verification ciphertext information, and the obtained verification plaintext information is matched with the preset verification information, the verification is determined to be successful, otherwise, the verification is determined to be failed.
4. The method according to any one of claims 1-3, wherein the dynamic authentication code of the optical disc comprises a first dynamic authentication code, and the generating the dynamic authentication code of the optical disc according to the second authentication information comprises:
and inputting the token code of the dynamic token and the first current time of the computer into a pseudo-random algorithm, and obtaining a first dynamic verification code of the optical disc through pseudo-random calculation.
5. The method of claim 4, wherein the dynamic authentication code of the dynamic token comprises a first dynamic authentication code of the dynamic token, and the step of generating the dynamic authentication code of the dynamic token by starting the dynamic token issued by pairing with the optical disc within a corresponding time comprises:
after the dynamic token is started, inputting a token code of the dynamic token and second current time into a pseudo-random algorithm, and obtaining a first dynamic verification code of the dynamic token through pseudo-random calculation;
wherein the second current time is within a time window centered on the first current time.
6. The method of claim 5, wherein the matching the dynamic verification code of the optical disc with the dynamic verification code of the dynamic token, and continuing to run the optical disc or quit the optical disc according to the matching result comprises:
and matching the first dynamic verification code of the optical disc with the first dynamic verification code of the dynamic token, if so, continuing to operate the optical disc, otherwise, exiting the optical disc.
7. The method of claim 6, wherein the dynamic authentication code of the optical disc comprises a second dynamic authentication code, and wherein generating the dynamic authentication code of the optical disc according to the authentication information further comprises:
and inputting the key of the dynamic token and the third current time of the computer into a pseudo-random algorithm, and obtaining a second dynamic verification code of the optical disc through pseudo-random calculation.
8. The method of claim 7, wherein the dynamic authentication code of the dynamic token comprises a second dynamic authentication code of the dynamic token, and the step of generating the dynamic authentication code of the dynamic token by starting the dynamic token issued by pairing with the optical disc within a corresponding time further comprises:
the dynamic token inputs a self secret key and a fourth current time into a pseudo-random algorithm, and a second dynamic verification code of the dynamic token is obtained through pseudo-random calculation;
wherein the fourth current time is within a time window centered on the third current time.
9. The method of claim 8, wherein the matching the dynamic verification code of the optical disc with the dynamic verification code of the dynamic token and continuing to run the optical disc or quit the optical disc according to the matching result further comprises:
and matching the second dynamic verification code of the optical disc with the second dynamic verification code of the dynamic token, if so, continuing to operate the optical disc, otherwise, exiting the optical disc.
CN201611092781.7A 2016-12-02 2016-12-02 Optical disk copyright protection method Active CN106611108B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611092781.7A CN106611108B (en) 2016-12-02 2016-12-02 Optical disk copyright protection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611092781.7A CN106611108B (en) 2016-12-02 2016-12-02 Optical disk copyright protection method

Publications (2)

Publication Number Publication Date
CN106611108A CN106611108A (en) 2017-05-03
CN106611108B true CN106611108B (en) 2020-03-31

Family

ID=58636113

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611092781.7A Active CN106611108B (en) 2016-12-02 2016-12-02 Optical disk copyright protection method

Country Status (1)

Country Link
CN (1) CN106611108B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114155885B (en) * 2022-02-08 2022-05-20 成都统信软件技术有限公司 File encryption method, recording method, decryption method, device and computing equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101377804A (en) * 2008-09-28 2009-03-04 北京飞天诚信科技有限公司 Method and system for implementing start-up protection
CN101500232A (en) * 2009-03-13 2009-08-05 北京华大智宝电子系统有限公司 Method and system for implementing dynamic identity authentication
CN101777983A (en) * 2010-01-13 2010-07-14 北京飞天诚信科技有限公司 Trading signature method, authentication server and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101377804A (en) * 2008-09-28 2009-03-04 北京飞天诚信科技有限公司 Method and system for implementing start-up protection
CN101500232A (en) * 2009-03-13 2009-08-05 北京华大智宝电子系统有限公司 Method and system for implementing dynamic identity authentication
CN101777983A (en) * 2010-01-13 2010-07-14 北京飞天诚信科技有限公司 Trading signature method, authentication server and system

Also Published As

Publication number Publication date
CN106611108A (en) 2017-05-03

Similar Documents

Publication Publication Date Title
TW514845B (en) Data storage regenerator and data storage processing method and program providing media
US9490982B2 (en) Method and storage device for protecting content
TW514844B (en) Data processing system, storage device, data processing method and program providing media
JP5793709B2 (en) Key implementation system
EP1855281B1 (en) Apparatus for writing data to a medium
CN101231622B (en) Data storage method and equipment base on flash memory, as well as data fetch method and apparatu
US7831831B2 (en) Authentication communication system, authentication communication apparatus, and authentication communication method
US8635453B2 (en) Controller to be incorporated in storage medium device, storage medium device, system for manufacturing storage medium device, and method for manufacturing storage medium device
US7647646B2 (en) Information input/output system, key management device, and user device
JP2012099100A (en) Trustworthy time stamps on data storage devices
US20110299679A1 (en) Controller, control method, computer program, recording medium for computer program, recording apparatus, and manufacturing method for recording apparatus
TW202036347A (en) Data storage and verification method and device
WO2010015904A2 (en) Backing up digital content that is stored in a secured storage device
US8914646B2 (en) Information processing apparatus and information processing method for determining access permission
US9652624B2 (en) Method, host, storage, and machine-readable storage medium for protecting content
WO2021141622A1 (en) Secure logging of data storage device events
JP2016507196A (en) Methods and devices for authentication and key exchange
JP2007096783A (en) Data transfer method and system
KR20090052199A (en) Storage device, terminal device using the storage device and method thereof
JP2000286839A (en) Information recorder, method for verifying authenticity and computer-readable recording medium storing program to allow computer to execute the method
CN106611108B (en) Optical disk copyright protection method
CN113821446A (en) A test and verification method and device for a transaction system
WO2007128418A1 (en) Apparatus for writing data to a medium
CN114065218B (en) SoC system chip safe starting method
JP2009122923A (en) Copyright protection system, playback device, and playback method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 100086 Beijing Haidian District Dijin Road 9 Courtyard 9 Building 4 Floor 101

Applicant after: Beijing Tip Technology Co ., Ltd.

Address before: 100192 Sixth Floor, B-2 Building, Dongsheng Science Park, Zhongguancun, 66 Xixiaokou Road, Haidian District, Beijing

Applicant before: Beijing Tip Technology Co ., Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20170503

Assignee: CHINA TECHNOLOGY EXCHANGE Co.,Ltd.

Assignor: BEIJING TIP TECHNOLOGY Co.,Ltd.

Contract record no.: X2021980013104

Denomination of invention: An optical disc copyright protection method

Granted publication date: 20200331

License type: Exclusive License

Record date: 20211123

EE01 Entry into force of recordation of patent licensing contract
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: An optical disc copyright protection method

Effective date of registration: 20211125

Granted publication date: 20200331

Pledgee: CHINA TECHNOLOGY EXCHANGE Co.,Ltd.

Pledgor: BEIJING TIP TECHNOLOGY Co.,Ltd.

Registration number: Y2021110000073

PE01 Entry into force of the registration of the contract for pledge of patent right