In above-mentioned background of invention, data download is not carried out any copyright protection on the internet, so the user can copy and duplicate, the intellecture property of grievous injury author arbitrarily to the electron reading of being downloaded.The present invention promptly at above-mentioned shortcoming propose a kind of in the internet method of the sub-reading matter of live up and down, in order to overcome the problem that known technology faces.
Disclosed method; utilize numbering unique on the user computer main frame; such as numberings such as hard disk and software product sequence numbers; produce the flag information of electron reading; cooperate the electron reading version information after encrypting; in order to reaching in the internet copyright of protection electron reading, and then reach the purpose of maintenance software creator intellecture property.
When user computer main frame desire is downloaded electron reading, with the flag information that utilizes its hard disk and software product sequence number to be derived for parameter to be sent to server; Server is a key value according to this label information again, does encryption in order to the version to electron reading, and then produces the version information of electron reading; Subsequently this version information is incorporated in the data layout of electron reading, be sent to user side more together.
When the user side desire is carried out electron reading, will produce flag information according to its hard disk and software product sequence number; Utilize the flag information that is produced as key value subsequently again, do deciphering in order to version information to electron reading; When the characteristic that can correctly solve electron reading, and this electron reading then is presented at electron reading on the screen of user side when not shifting out user side.
When electron reading when shifting out user side migration purpose user side, shift out user side and will receive the flag information that comes by the purpose user side, it is that the hard disk and the software product sequence number of utilization purpose user side produces; After electron reading is decrypted with the flag information that shifts out user side, utilize the flag information of purpose user side that electron reading is encrypted again subsequently, in order to produce new electron reading version information; Write down after this electron reading shifted out shifting out user side, electron reading is sent to the purpose user side.
Preferred embodiment of the present invention will be aided with following accompanying drawing and do more detailed the elaboration in comment backward:
Fig. 1 has shown the framework calcspar of preferred embodiment of the present invention, and it is with the media of internet as the transmission electronic reading matter, and any user side that links to each other with the internet 104 can be downloaded data by server 102 by the internet.In fact, disclosed method is not only on the internet available, and the network of any kenel such as frameworks such as LAN or Wide Area Networks, all can utilize method of the present invention to protect its electron reading.In addition, the following live philosophical works is an example, will show interface synoptic diagram as shown in Figure 2 on the user side screen; And when the user use downloaded as e-book the time, shown interface synoptic diagram also can be as shown in Figure 3.
See also Fig. 6, Fig. 6 has shown in the preferred embodiment of the present invention, the workflow diagram when downloading electron reading.At first, in step 602, user side is with the hard disk of its host computer and the product ID of software, in order to produce a flag information; Next in step 604, it is parameter that the host computer of user side will be worked for this flag information, in order to send the request of downloading electron reading to server.Receive the request of user side when server after, the electron reading that will utilize flag information that user side institute desire is downloaded in step 606 is handled (hereinafter can go detailed description) again, and the while also produces the version information of this electron reading; Server will be stored in the version information that is produced in the data layout of electron reading in following step 608; Subsequently will be in step 610, server is sent to user side with the electron reading of finishing dealing with by the internet; User side then receives after the electron reading that this server transmitted in step 612, carries out the operation of stored electrons reading matter.
It should be noted that above-mentioned steps 602 employed hard disks and software product sequence number can be replaced by other " unique " numbering.For example, on PC (PC), can utilize the product ID of central processing unit (CPU) to replace, and (Personal Digital Assistant PDA) in the device, then can get its product ID to handle at personal digital aid (PDA); The software product sequence number then can use operating system, such as the product ID of the Windows 95/98 of Microsoft.In addition, the flag information of server that step 602 is passed to can be the result that hard disk and software product sequence number directly are merged into word string, can also encrypt after being merged into word string; Or above-mentioned two product IDs are carried out sending after the logical process (for example displacement or addition, subtraction operation).Moreover, in above-mentioned steps 606, server can be after receiving the flag information that is transmitted by user side, the characteristic information of utilization electron reading, the for example title of electron reading or information such as author, creation date, merge flag information to carry out cryptographic operation simultaneously, in order to obtain the electron reading flag information.E-book with Fig. 2 to Fig. 4 is an example, promptly can do key value by flag information, " Inventec Ebook Version 1.0 " encrypted, again encrypted result is deposited in subsequently in the data layout of electron reading, to be resent to user side behind the version information as this electron reading.It should be noted that known technology can be modified the preferred embodiment of the invention described above based on spirit of the present invention, but these changes must be included in protection scope of the present invention.
As for the employed electron reading data layout of preferred embodiment of the present invention, then see also synoptic diagram shown in Figure 5.In Fig. 5, the characteristic information of electron reading can leave in the zone 502 as the title of electron reading or author, creation date etc.; And the version information of electron reading and user side flag information then can be stored among regional 504A and the 504B respectively; As for the actual data content of electron reading, then can be stored in the zone 506.In addition, the big I in above-mentioned each zone is decided according to actual application, can come storage data with 128,64,64 bytes (Bytes) respectively such as zone 502,504A, 504B.
It should be noted that above-mentioned data layout only is a usefulness of doing explanation, any change or modification of doing based on above-mentioned form such as adjusting stored interior its amount of capacity etc. that perhaps changes in each zone, must be included within the scope of the present invention.
After finishing the operation of downloading electron reading when user side, just can show or the operation of mobile electron reading matter, and show and the workflow of mobile electron reading matter, then use Fig. 7 and Fig. 8 to represent respectively.At first see also electron reading shown in Figure 7 and show workflow.In step 702, when the user side desire shows (that is use) electron reading, will produce flag information according to the hard disk and the software product sequence number of user side.It should be noted that the flag information of this moment promptly is sent to the parameter of the sub-reading matter of the following live of server.In the following step 704, the user computer main frame will utilize this flag information to be key value, be decrypted in order to version information electron reading, and when correctly solving version information (step 706), execution in step 708 is to read the user side log file, in order to confirm that whether the present electron reading that is read is by the migration elsewhere again.When electron reading is still stayed present user side (step 710), then the user computer main frame will read the data of electron reading and show in step 712.Above-mentioned version information to electron reading do add, the method for decryption oprerations can decide according to the demand of reality.The method that some are known such as methods such as RSA, all can be used in disclosed method.Whether the change as for log file is confirmed, can use hash (Hash) algorithm to produce a proof test value in step 710, be modified in order to the comparison log file.Yun Yong hash algorithm is the MD5 algorithm of standard in the present embodiment.In addition, log file also can promptly be opened after e-file is downloaded, and stores with system file, so the user just is difficult for finding this log file and being difficult for changing.
See also Fig. 8 at last, it has shown in the present invention imitates among the good embodiment workflow diagram of mobile electron reading matter.In step 802, be about to shift out the user side that shifts out of electron reading, with first electron gain reading matter with hard disk on the purpose user side of migration and software product sequence number, in order to produce the flag information of purpose user side.Subsequently in step 804, whether shift out software product sequence number (can get) that user side will compare the purpose user side with own identical by the flag information of purpose user side.When the two product serial not simultaneously, therefore expression uses different laser disc (or magnetic sheet) to come install software between the two, may be different users, so will not carry out the action of mobile electron reading matter.In the following step 806, shifting out user side will be decrypted electron reading according to the flag information of oneself; Again in step 808, utilize and electron reading is encrypted, and change the version information of electron reading simultaneously subsequently at the purpose user side flag information that step 802 obtained; So in following step 810, shift out user side just in log file, write the record that electron reading has been moved out of; Last and in step 812, electron reading is sent to the purpose user side.User's interface required during as for the mobile electron reading matter can be as shown in Figure 4.It should be noted that what Fig. 4 was shown is in dialog box, required path is pointed out, but this embodiment can become according to actual application in the mode of artificial input.
In the judgement of in above-mentioned steps 710 whether electron reading being shifted out, what read promptly is at step 810 recorded data.Moreover, when electron reading by shifting out after user side shifts out, all data that also can directly delete electron reading are in order to save hard drive space; Or stay the data of electron reading, and in case following electron reading is when retracting once more, the direct content of change record file, then just need not carry out network communication transmitting the action of data, but known technology still can change according to the demand of reality.In addition, in step 802, for hard disk and the software product sequence number that makes the purpose user side can correctly be transmitted, can when Network Transmission, carry additionally some data bytes or packet header (Header), as the correctness of confirming that data transmit, all can use in the method for the invention such as circulating duplication check technology such as (CRC).
The workflow diagram of the above-mentioned Fig. 6 to Fig. 7 of foundation significantly, after electron reading is encrypted according to above-mentioned method, only utilizes the flag information of former download host computer to be decrypted, otherwise can't correctly solve the data of electron reading as can be known.In addition, also can learn, after electron reading is moved out of, because the version information of this electron reading was changed, so original host computer just can't be carried out this electron reading again by the flow process of Fig. 8.Therefore can only there be one to download backup during the disclosed method of the present invention can be guaranteed at one time, so reach the purpose of protection electron reading copyright.
Comprehensive the above; disclosed method; utilize numbering unique on the user computer main frame; such as numberings such as hard disk and software product sequence numbers; produce the flag information of electron reading; electron reading version information after cooperate encrypting in order to being implemented in the copyright of protection electron reading in the internet, and then is reached the purpose of maintenance software creator intellecture property.
The above is preferred embodiment of the present invention only, is not in order to limit claim of the present invention; All other waiting of not breaking away under the disclosed spirit to be finished are so change, and such as modifications such as the data storing form of change electron reading or change encryption methods, all should be included in the following claim scope.