WO2013053078A1 - Encryption method - Google Patents
Encryption method Download PDFInfo
- Publication number
- WO2013053078A1 WO2013053078A1 PCT/CN2011/001694 CN2011001694W WO2013053078A1 WO 2013053078 A1 WO2013053078 A1 WO 2013053078A1 CN 2011001694 W CN2011001694 W CN 2011001694W WO 2013053078 A1 WO2013053078 A1 WO 2013053078A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- content
- key
- digital document
- encryption
- generated
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Definitions
- the present invention relates to the field of network information security technologies, and in particular, to an encryption method.
- BACKGROUND OF THE INVENTION In the current era of Internet information, people are increasingly demanding information.
- digital documents As a carrier of digital information, digital documents have become an indispensable part of modern people's reading habits.
- the existing digital document encryption methods always have many shortcomings, which are easy to be cracked, and the interests of the digital document provider and the copyright owner are damaged. Therefore, it is necessary to provide a more secure encryption method.
- the present invention provides an encryption method that is not easily cracked and increases the security of digital documents.
- the invention discloses an encryption method, which comprises:
- Fragment encryption of the content of the specified digital document, and the key used for encrypting each piece of content is part of the generated key
- the client used by the user downloads the encrypted digital document, it decrypts according to the key and the corresponding decryption process.
- the content of the specified digital document is segment-encrypted, and the key used for encrypting each piece of content is part of the generated key, and the following steps are included:
- Ni is determined by information related to the specified digital document.
- Mi is equal to the number of bits of the identification of the specified digital document.
- the obtaining the content of a certain number of bits from the generated key in the step B as the current key includes:
- the information related to the designated digital document comprises: one or more of the inherent information of the specified digital document.
- FIG. 1 is a flow chart of an encryption method in an embodiment of the present invention.
- FIG. 1 is a flow chart of an encryption method in an embodiment of the present invention. As shown in Figure 1, the method includes the following steps:
- Step 101 When a user requests to download the specified digital document, the key is generated in real time.
- the key may be generated in real time according to the existing key generation method.
- the specific key generation method is not limited in the present invention. Real time here means that the key is generated at the time of the user's request, rather than being generated beforehand.
- Step 102 Perform segmentation encryption on the content of the specified digital document, and use a key used for encrypting each piece of content as part of the generated key.
- Step 103 After downloading the encrypted digital document by the client used by the user, decrypting according to the key and the corresponding decryption process.
- the encryption method described in Figure 1 is not easily cracked, increasing the security of digital documents.
- the step of encrypting the digital document content in step 102 in the method shown in FIG. 1 and the key used for encrypting each piece of content to be part of the generated key may specifically include the following steps:
- Ni is determined by information related to the specified digital document, wherein the information related to the specified digital document comprises: one or more of inherent information of the specified digital document; Mi is equal to the specified digital document according to the specified digital document The fixed number of bits dynamically generated by the inherent information; if the content of the zero bit is acquired from the generated key in the step B, the binary content read this time is not encrypted.
- FIG. 2 is a schematic diagram of encrypting digital document content in an embodiment of the present invention.
- the content of the digital document is represented by a line segment of a certain length, and the content of the skip is displayed below the line segment, and the content on the line segment is encrypted.
- the generated key is 128 bits as an example.
- the file header portion is skipped, the contents of the byte are read, and a part of the generated 128-bit key is acquired, such as 32-bit content as a key pair!
- the content of the byte is encrypted; the content of the Mi bit is skipped, the content of the N 2 byte is read, and a part of the generated 128-bit key is obtained, such as 64-bit content as a key pair 1 ⁇ 2 word
- the content of the section is encrypted; the content of M 2 bits is skipped, the content of N 3 bytes is read, and a part (may be all) is obtained from the generated 128-bit key, such as 128
- the content of the bit is encrypted as the content of the key pair byte; the content of the M 3 bit is skipped, the content of N 4 bytes is read, and the content of 0 bit is obtained from the generated 128-bit key, which is not correct ⁇ 4 bytes of content are encrypted.
- the encryption process ends.
- ⁇ , ⁇ 2 , ⁇ ⁇ 4 are determined by information related to the electronic document, and ⁇ , N 2 , ⁇ ⁇ ⁇ 4 may be equal or unequal.
- the decryption process is the reverse process of the encryption process, and will not be described here.
- the present invention generates a key when a user requests to download a specified digital document; performs segmentation encryption on the content of the specified digital document, and the key used for encrypting each piece of content is the generated key.
- a part of the technical solution of decrypting the encrypted digital document according to the key and the corresponding decryption process, so that the encryption method is not easily cracked, and the security of the digital document is increased.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
Disclosed is an encryption method. The method comprises: when a user requests to download a designated digital file, generating in real time an encryption key; encrypting segments of the content of the designated digital file, where the encryption key used for the encryption of each segment of the content is a part of the encryption key generated, and, when the encrypted electronic file is downloaded by a client terminal that is used by the user, decrypting on the basis of the encryption key and of a corresponding decryption process. The encryption method of the present invention cannot be cracked easily, thus improving the security of the digital file.
Description
说 明 书 一种加密方法 技术领域 本发明涉及网络信息安全技术领域, 特别是涉及一种加密方 法。 背景技术 在当前的互联网信息时代, 人们对信息的需求越来越大。 而数 字文档作为一种数字信息的载体,也成为了现代人们阅读习惯中不 可或缺的一份。 TECHNICAL FIELD The present invention relates to the field of network information security technologies, and in particular, to an encryption method. BACKGROUND OF THE INVENTION In the current era of Internet information, people are increasingly demanding information. As a carrier of digital information, digital documents have become an indispensable part of modern people's reading habits.
而现有的数字文档加密方法总是存在很多不足, 容易被破解, 使得数字文档的提供商和版权所有者的利益受到损害。因此需要提 供一种更安全的加密方法。 发明内容 本发明提供了一种加密方法, 该加密方法不易被破解, 增加了 数字文档的安全性。 The existing digital document encryption methods always have many shortcomings, which are easy to be cracked, and the interests of the digital document provider and the copyright owner are damaged. Therefore, it is necessary to provide a more secure encryption method. SUMMARY OF THE INVENTION The present invention provides an encryption method that is not easily cracked and increases the security of digital documents.
为达到上述目的, 本发明的技术方案是这样实现的: In order to achieve the above object, the technical solution of the present invention is achieved as follows:
本发明公开了一种加密方法, 该方法包括: The invention discloses an encryption method, which comprises:
当有用户请求下载指定数字文档时, 生成密钥; Generate a key when a user requests to download a specified digital document;
对指定数字文档的内容进行分段加密,且每段内容加密所使用 的密钥为所述生成密钥的一部分; Fragment encryption of the content of the specified digital document, and the key used for encrypting each piece of content is part of the generated key;
用户所使用的客户端下载所述加密的数字文档后,根据所述密 钥和对应的解密过程进行解密。 After the client used by the user downloads the encrypted digital document, it decrypts according to the key and the corresponding decryption process.
在上述方法中, 所述对指定数字文档的内容进行分段加密, 且 每段内容加密所使用的密钥为所述生成密钥的一部分包括以下步 骤: In the above method, the content of the specified digital document is segment-encrypted, and the key used for encrypting each piece of content is part of the generated key, and the following steps are included:
A、 跳过数字文档内容的文件头部分; 令 i = l ; A. Skip the header portion of the digital document content; let i = l ;
B、 从所跳过的内容之后按顺序读取 Ni字节的二进制内容, 从 所述生成密钥获取一定位数的内容作为本次密钥,用本次密钥对读
取的二进制内容进行加密; B. Read the binary content of the Ni byte in order from the skipped content, obtain a certain number of bits from the generated key as the current key, and use the current key pair to read The extracted binary content is encrypted;
C , 跳过 Mi位的二进制内容; C , skip the binary content of the Mi bit;
D、 判断对数字文档内容的加密是否完成, 是则结束流程, 否 则令 i = i + l, 返回步骤8。 D. Determine whether the encryption of the digital document content is completed. If yes, end the process. Otherwise, let i = i + l and return to step 8.
在上述方法中, Ni由与所述指定数字文档相关的信息确定。 在上述方法中, Mi等于所述指定数字文档的标识的位数。 In the above method, Ni is determined by information related to the specified digital document. In the above method, Mi is equal to the number of bits of the identification of the specified digital document.
在上述方法中, 所述步骤 B中的从所述生成密钥获取一定位数 的内容作为本次密钥包括: In the above method, the obtaining the content of a certain number of bits from the generated key in the step B as the current key includes:
如果从所述生成密钥获取到零位的内容, 则不对本次所读取的 二进制内容进行加密。 If the content of the zero bit is acquired from the generated key, the binary content read this time is not encrypted.
在上述方法中, 所述与指定数字文档相关的信息包括: 所述指 定数字文档的固有信息的一种或多种。 In the above method, the information related to the designated digital document comprises: one or more of the inherent information of the specified digital document.
由上述可见, 本发明这种当有用户请求下载指定数字文档时, 生成密钥; 对指定数字文档的内容进行分段加密, 且每段内容加密 所使用的密钥为所述生成密钥的一部分; 用户在客户端下载所述加 密的数字文档后,根据所述密钥和对应的解密过程进行解密的技术 方案, 使得该加密方法不易被破解, 增加了数字文档的安全性。 附图说明 图 1是本发明实施例中的一种加密方法的流程图。 It can be seen from the above that the present invention generates a key when a user requests to download a specified digital document; performs segmentation encryption on the content of the specified digital document, and the key used for encrypting each piece of content is the generated key. A part of the technical solution that the user decrypts the encrypted digital document according to the key and the corresponding decryption process, so that the encryption method is not easily cracked, and the security of the digital document is increased. BRIEF DESCRIPTION OF DRAWINGS FIG. 1 is a flow chart of an encryption method in an embodiment of the present invention.
图 2是本发明实施例中的对数字文档内容进行加密的示意图。 具体实施方式 为了使本发明的目的、 技术方案和优点更加清楚, 下面结合附 图和具体实施例对本发明进行详细描述。 2 is a schematic diagram of encrypting digital document content in an embodiment of the present invention. DETAILED DESCRIPTION OF THE EMBODIMENTS In order to make the objects, technical solutions and advantages of the present invention more comprehensible, the present invention will be described in detail below with reference to the accompanying drawings.
图 1是本发明实施例中的一种加密方法的流程图。 如图 1所示, 该方法包括以下步骤: 1 is a flow chart of an encryption method in an embodiment of the present invention. As shown in Figure 1, the method includes the following steps:
步骤 101, 当有用户请求下载指定数字文档时, 实时生成密钥。 本步骤当中, 具体可以根据现有的密钥生成方式实时生成密 钥, 具体的密钥生成方法本发明中不予限定。 这里实时是指在有用 户请求的当时生成密钥, 而不是事前生成好的。
步骤 102, 对指定数字文档的内容进行分段加密, 且每段内容 加密所使用的密钥为所述生成密钥的一部分。 Step 101: When a user requests to download the specified digital document, the key is generated in real time. In this step, the key may be generated in real time according to the existing key generation method. The specific key generation method is not limited in the present invention. Real time here means that the key is generated at the time of the user's request, rather than being generated beforehand. Step 102: Perform segmentation encryption on the content of the specified digital document, and use a key used for encrypting each piece of content as part of the generated key.
步骤 103, 用户所使用的客户端下载所述加密的数字文档后, 根据所述密钥和对应的解密过程进行解密。 Step 103: After downloading the encrypted digital document by the client used by the user, decrypting according to the key and the corresponding decryption process.
图 1所述的加密方法不易被破解, 增加了数字文档的安全性。 图 1所示方法中的步骤 102所述的对数字文档内容进行分段加 密,且每段内容加密所使用的密钥为所述生成密钥的一部分具体可 以包括以下步骤: The encryption method described in Figure 1 is not easily cracked, increasing the security of digital documents. The step of encrypting the digital document content in step 102 in the method shown in FIG. 1 and the key used for encrypting each piece of content to be part of the generated key may specifically include the following steps:
A、 跳过数字文档内容的文件头部分; 令 i = l ; A. Skip the header portion of the digital document content; let i = l ;
B、 从所跳过的内容之后按顺序读取 字节的二进制内容, 从 所述生成密钥获取一定位数的内容作为本次密钥,用本次密钥对读 取的二进制内容进行加密; B. Read the binary content of the byte in order from the skipped content, obtain a certain number of contents from the generated key as the current key, and encrypt the binary content read by the current key. ;
C、 跳过 Mi位的二进制内容; C. Skip the binary content of the Mi bit;
D、 判断对数字文档内容的加密是否完成, 是则结束流程, 否 则令 i = i + l, 返回步骤8。 D. Determine whether the encryption of the digital document content is completed. If yes, end the process. Otherwise, let i = i + l and return to step 8.
其中, Ni由与所述指定数字文档相关的信息确定, 其中所述与 指定数字文档相关的信息包括:所述指定数字文档的固有信息的一 种或多种; Mi等于根据所述指定数字文档的固有信息动态生成的固 定位数,; 所述步骤 B中如果从所述生成密钥获取到零位的内容, 则 不对本次所读取的二进制内容进行加密。 Wherein Ni is determined by information related to the specified digital document, wherein the information related to the specified digital document comprises: one or more of inherent information of the specified digital document; Mi is equal to the specified digital document according to the specified digital document The fixed number of bits dynamically generated by the inherent information; if the content of the zero bit is acquired from the generated key in the step B, the binary content read this time is not encrypted.
图 2是本发明实施例中的对数字文档内容进行加密的示意图。 如图 2所示, 用一定长度的线段表示数字文档的内容, 标示在线段 下面的是跳过的内容, 标示在线段上面的是进行加密的内容。 这里 以生成的密钥为 128位为例进行说明。 2 is a schematic diagram of encrypting digital document content in an embodiment of the present invention. As shown in Figure 2, the content of the digital document is represented by a line segment of a certain length, and the content of the skip is displayed below the line segment, and the content on the line segment is encrypted. Here, the generated key is 128 bits as an example.
在图 2所示的实施例中: 首先跳过文件头部分, 读取 字节的 内容, 从所生成的 128位的密钥中获取一部分, 如 32位的内容作为 密钥对!^字节的内容进行加密; 跳过 Mi位的内容, 读取 N2字节的 内容, 从所生成的 128位的密钥中获取一部分, 如 64位的内容作为 密钥对 1^2字节的内容进行加密; 跳过 M2位的内容, 读取 N3字节的 内容, 从所生成的 128位的密钥中获取一部分(可以是全部), 如 128
位的内容作为密钥对 字节的内容进行加密; 跳过 M3位的内容, 读取 N4字节的内容, 从所生成的 128位的密钥中获取 0位的内容, 则 不对 1^4字节的内容进行加密。 加密过程结束。 In the embodiment shown in FIG. 2: First, the file header portion is skipped, the contents of the byte are read, and a part of the generated 128-bit key is acquired, such as 32-bit content as a key pair! The content of the byte is encrypted; the content of the Mi bit is skipped, the content of the N 2 byte is read, and a part of the generated 128-bit key is obtained, such as 64-bit content as a key pair 1^ 2 word The content of the section is encrypted; the content of M 2 bits is skipped, the content of N 3 bytes is read, and a part (may be all) is obtained from the generated 128-bit key, such as 128 The content of the bit is encrypted as the content of the key pair byte; the content of the M 3 bit is skipped, the content of N 4 bytes is read, and the content of 0 bit is obtained from the generated 128-bit key, which is not correct ^ 4 bytes of content are encrypted. The encryption process ends.
在图 2所示的实施例中, Ν,、 Ν2、 Ν^Π Ν4是由与电子文档相关 的信息确定的, Ν,、 N2、 Ν^Β Ν4可以相等也可以不相等。 In the embodiment shown in FIG. 2, Ν, Ν 2 , Ν^Π Ν 4 are determined by information related to the electronic document, and Ν, N 2 , Ν Β Ν 4 may be equal or unequal.
解密过程是加密过程的逆过程, 这里不再赘述。 The decryption process is the reverse process of the encryption process, and will not be described here.
由上述可见, 本发明这种当有用户请求下载指定数字文档时, 生成密钥; 对指定数字文档的内容进行分段加密, 且每段内容加密 所使用的密钥为所述生成密钥的一部分; 用户所使用的客户端下载 所述加密的数字文档后,根据所述密钥和对应的解密过程进行解密 的技术方案, 使得该加密方法不易被破解, 增加了数字文档的安全 性。 It can be seen from the above that the present invention generates a key when a user requests to download a specified digital document; performs segmentation encryption on the content of the specified digital document, and the key used for encrypting each piece of content is the generated key. A part of the technical solution of decrypting the encrypted digital document according to the key and the corresponding decryption process, so that the encryption method is not easily cracked, and the security of the digital document is increased.
以上所述仅为本发明的较佳实例而己, 并不用以限制本发明, 凡在本发明的精神和原则之内, 所做的任何修改、 等同替换、 改进 等, 均应包含在本发明保护的范围之内。
The above description is only a preferred embodiment of the present invention, and is not intended to limit the present invention. Any modifications, equivalents, improvements, etc., which are made within the spirit and principles of the present invention, should be included in the present invention. Within the scope of protection.
Claims
1、 一种加密方法, 其特征在于, 该方法包括: An encryption method, the method comprising:
当有用户请求下载指定数字文档时, 实时生成密钥; When a user requests to download a specified digital document, the key is generated in real time;
对指定数字文档的内容进行分段加密,且每段内容加密所使用 的密钥为所述生成密钥的一部分; Fragment encryption of the content of the specified digital document, and the key used for encrypting each piece of content is part of the generated key;
用户所使用的客户端下载所述加密的数字文档后,根据所述密 钥和对应的解密过程进行解密。 After the client used by the user downloads the encrypted digital document, it decrypts according to the key and the corresponding decryption process.
2、 根据权利要求 1所述的方法, 其特征在于, 所述对指定数字 文档的内容进行分段加密,且每段内容加密所使用的密钥为所述生 成密钥的一部分包括以下步骤: 2. The method according to claim 1, wherein the segmenting and encrypting the content of the specified digital document, and the key used for encrypting each piece of content is a part of the generated key comprises the following steps:
A、 跳过数字文档内容的文件头部分; 令 i = l ; A. Skip the header portion of the digital document content; let i = l ;
B、 从所跳过的内容之后按顺序读取 Ni字节的二进制内容, 从 所述生成密钥获取一定位数的内容作为本次密钥,用本次密钥对读 取的二进制内容进行加密; B. The binary content of the Ni byte is sequentially read from the skipped content, and a certain number of bits of content is obtained from the generated key as the current key, and the binary content read by the current key is used. Encryption
C、 跳过 Mi位的二进制内容; C. Skip the binary content of the Mi bit;
D、 判断对数字文档内容的加密是否完成, 是则结束流程, 否 则令 i = i + l, 返回步骤8。 D. Determine whether the encryption of the digital document content is completed. If yes, end the process. Otherwise, let i = i + l and return to step 8.
3、 根据权利要求 2所述的方法, 其特征在于, 3. The method of claim 2, wherein
Ni由与所述指定数字文档相关的信息确定。 Ni is determined by information associated with the specified digital document.
4、 根据权利要求 2所述的方法, 其特征在于, 4. The method of claim 2, wherein
Mi等于所述指定数字文档的标识的位数。 Mi is equal to the number of bits of the identification of the specified digital document.
5、 根据权利要求 2所述的方法, 其特征在于, 所述步骤 B中的 从所述生成密钥获取一定位数的内容作为本次密钥包括- 如果从所述生成密钥获取到零位的内容, 则不对本次所读取的 二进制内容进行加密。 The method according to claim 2, wherein the content of obtaining a certain number of bits from the generated key in the step B is included as a current key - if the zero is acquired from the generated key The content of the bit does not encrypt the binary content read this time.
6、 根据权利要求 3所述的方法, 其特征在于, 6. The method of claim 3, wherein
所述与指定数字文档相关的信息包括:所述指定数字文档的固 有信息的一种或多种。 The information related to the specified digital document includes one or more of the unique information of the specified digital document.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2011/001694 WO2013053078A1 (en) | 2011-10-10 | 2011-10-10 | Encryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2011/001694 WO2013053078A1 (en) | 2011-10-10 | 2011-10-10 | Encryption method |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013053078A1 true WO2013053078A1 (en) | 2013-04-18 |
Family
ID=48081327
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2011/001694 WO2013053078A1 (en) | 2011-10-10 | 2011-10-10 | Encryption method |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2013053078A1 (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6490353B1 (en) * | 1998-11-23 | 2002-12-03 | Tan Daniel Tiong Hok | Data encrypting and decrypting apparatus and method |
CN102143175A (en) * | 2011-03-25 | 2011-08-03 | 北京百纳威尔科技有限公司 | Method for distributing DRM (Data Rights Management) document, mobile terminal and application server |
CN102377561A (en) * | 2011-10-10 | 2012-03-14 | 厦门简帛信息科技有限公司 | Encryption method |
CN102402670A (en) * | 2011-08-03 | 2012-04-04 | 广东欧珀移动通信有限公司 | File encryption and decryption method |
-
2011
- 2011-10-10 WO PCT/CN2011/001694 patent/WO2013053078A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6490353B1 (en) * | 1998-11-23 | 2002-12-03 | Tan Daniel Tiong Hok | Data encrypting and decrypting apparatus and method |
CN102143175A (en) * | 2011-03-25 | 2011-08-03 | 北京百纳威尔科技有限公司 | Method for distributing DRM (Data Rights Management) document, mobile terminal and application server |
CN102402670A (en) * | 2011-08-03 | 2012-04-04 | 广东欧珀移动通信有限公司 | File encryption and decryption method |
CN102377561A (en) * | 2011-10-10 | 2012-03-14 | 厦门简帛信息科技有限公司 | Encryption method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8806193B2 (en) | Methods and apparatus for integrating digital rights management (DRM) systems with native HTTP live streaming | |
US8983076B2 (en) | Methods and apparatus for key delivery in HTTP live streaming | |
CN102355463B (en) | Digital document encryption method | |
US8700897B2 (en) | Method and terminal equipment for applying digital rights management | |
CN101977190B (en) | Digital content encryption transmission method and server side | |
KR101284676B1 (en) | Cryptography-based copy protection system and method for android apps | |
JP2009505506A5 (en) | ||
CN103595698B (en) | Management method for digital rights | |
WO2013178019A1 (en) | Method, device and system for implementing media data processing | |
CN113688399A (en) | Firmware digital signature protection method and device, computer equipment and storage medium | |
US10127396B2 (en) | System and method for local generation of streaming content with a hint track | |
CN108431819A (en) | Client is protected to access the method and system of the service of the DRM agent of video player | |
TWI626553B (en) | Method and device for processing multimedia file | |
WO2012126257A1 (en) | Media data processing method and device thereof | |
KR101579696B1 (en) | System and method for obfuscating initiation values of a cryptography protocol | |
CN103237011A (en) | Digital-content encryption transmission method and server side | |
CN101707521B (en) | Encryption method based on DES | |
JP5601382B2 (en) | Information processing apparatus, information processing method, and information processing program in embedded device | |
WO2013053079A1 (en) | Digital file encryption method | |
CN109343971B (en) | Browser data transmission method and device based on cache technology | |
US10939163B2 (en) | Method for watermarking encrypted digital content, method and device for retrieving a unique identifier from watermarked content and content distribution network | |
WO2013053078A1 (en) | Encryption method | |
CN105306440B (en) | A kind of key generation and distribution method based on figure identification | |
CN115766244A (en) | Internet of vehicles information encryption method and device, computer equipment and storage medium | |
CN115277064A (en) | Data encryption method, data decryption method, data encryption device, data decryption device, electronic equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11873865 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 11873865 Country of ref document: EP Kind code of ref document: A1 |