CN102222195A - E-book reading method and system - Google Patents

E-book reading method and system Download PDF

Info

Publication number
CN102222195A
CN102222195A CN201110217167XA CN201110217167A CN102222195A CN 102222195 A CN102222195 A CN 102222195A CN 201110217167X A CN201110217167X A CN 201110217167XA CN 201110217167 A CN201110217167 A CN 201110217167A CN 102222195 A CN102222195 A CN 102222195A
Authority
CN
China
Prior art keywords
book
reader
safety devices
information safety
authorization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201110217167XA
Other languages
Chinese (zh)
Other versions
CN102222195B (en
Inventor
陆舟
于华章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Feitian Technologies Co Ltd
Original Assignee
Feitian Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Feitian Technologies Co Ltd filed Critical Feitian Technologies Co Ltd
Priority to CN201110217167.XA priority Critical patent/CN102222195B/en
Publication of CN102222195A publication Critical patent/CN102222195A/en
Application granted granted Critical
Publication of CN102222195B publication Critical patent/CN102222195B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses an e-book reading method and system, wherein the e-book reading method comprises the steps of: accessing an e-book through an information safety apparatus after a reader is connected with the information safety apparatus; mutually checking legality of the reader and the information safety apparatus, and checking whether the e-book is legal or not by the reader through marked information of the e-book if the reader and the information safety apparatus are all legal; triggering the information safety apparatus by the reader to decipher the e-book if the e-book is legal, and then transforming the deciphered e-book into an image-format e-book by the information safety apparatus; and reading the image format e-book from the information safety apparatus by the reader to provide the image format e-book to users for reading. According to the invention, the problem that the traditional e-book copyright protection mechanism is imperfect is solved, and profits of electronic publishers are protected.

Description

The e-book reading method and system
Technical field
The present invention relates to information security field, in particular to a kind of e-book reading method and system.
Background technology
E-book (also claiming reader) is a kind of portable hand-hold electronic equipments, aim at and read the e-book design, it has the LCD of giant-screen, built-in online chip, can from the internet, buy and download digitized books easily, and have jumbo internal memory can store a large amount of numerical informations, once can store the information of about 30 traditional books, specially designed lcd technology can allow the comfortable long-time read books of people.Portable, the easy use of e-book, jumbo characteristics are fit to the modern life very much, the development of digital publishing rights trade and Internet technology, make the user of e-book buy more books easily, for the popular of e-book laid a good foundation with lower price.
Nowadays, along with the widespread use of e-book, the abuse during e-book is published often takes place, and the e-book Copyright Protection is just put on people's the agenda shrilly.Some does not check mandate existing e-book, and all readers can be opened, and this mode does not realize the protection of e-book copyright; The e-book that has has realized encryption, but needs to rely on specific reader, just can not read if leave specific reader, and this mode has influenced the use of authorized user.As seen, present e-book copyright protection regime is also unsound.
At the unsound problem of e-book copyright protection regime in the correlation technique, effective solution is not proposed as yet at present.
Summary of the invention
Fundamental purpose of the present invention is to provide a kind of e-book reading method and system, to solve the unsound problem of above-mentioned e-book copyright protection regime at least.
According to an aspect of the present invention, provide a kind of e-book reading method, having comprised: after reader and information safety devices connect, by information safety devices visit e-book; Whether reader and information safety devices are checked legal mutually; If reader and information safety devices are all legal, whether reader is legal by the flag information check e-book of e-book; If e-book is legal, reader trigger message safety equipment deciphering e-book; E-book after information safety devices will be deciphered is converted to the e-book of picture format; The e-book of reader reading images form from information safety devices provides the e-book of picture format to the user, so that the user reads.
Above-mentioned e-book is provided with header information, perhaps, is provided with header information in the specific data page or leaf of e-book; Header information comprises flag information.
Above-mentioned flag information be in advance with the title of the server commitment of e-book.
What above-mentioned reader and information safety devices were checked employing mutually is the unsymmetrical key verification mode.
Store the access authority information of e-book correspondence in the above-mentioned information safety devices; After reader determined that information safety devices is authorized to, this method also comprised: can reader be determined visit e-book according to access authority information.
Wherein, access authority information comprises the authorization type and the authorization message of each data page correspondence of e-book, and it is one of following that authorization type comprises at least: time type, number of times type, cut-off date type; Wherein, the authorization message of time type correspondence is excess time, and the authorization message of number of times type correspondence is a residue degree, and the authorization message of cut-off date type correspondence is the cut-off date; Correspondingly, above-mentioned reader determines that according to access authority information can visit e-book comprises: reader reads the authorization type of the data page of current accessed from information safety devices; If the authorization type that reads is the time type, reader checks whether be 0 the excess time of data page, if be not 0, and then can the visit data page or leaf; If the authorization type that reads is the number of times type, reader checks whether the residue degree of data page is 0, if be not 0, and then can the visit data page or leaf; If the authorization type that reads is the cut-off date type, reader is checked current date whether before the cut-off date of data page, if, then can the visit data page or leaf.
Access authority information comprises the authorization type and the authorization message of e-book correspondence, and it is one of following that authorization type comprises at least: time type, number of times type, cut-off date type; Wherein, the authorization message of time type correspondence is excess time, and the authorization message of number of times type correspondence is a residue degree, and the authorization message of cut-off date type correspondence is the cut-off date; Correspondingly, above-mentioned reader determines that according to access authority information can visit e-book comprises: reader reads the authorization type of the e-book of current accessed from information safety devices; If the authorization type that reads is the time type, reader checks whether be 0 the excess time of e-book, if be not 0, then can visit e-book; If the authorization type that reads is the number of times type, reader checks whether the residue degree of e-book is 0, if be not 0, then can visit e-book; If the authorization type that reads is the cut-off date type, reader checks that current date is whether before the cut-off date of e-book, if then can visit e-book.
The corresponding algorithm seed of each data page of e-book, algorithm seed are stored in the header information of each data page of information safety devices or e-book; Information safety devices deciphering e-book comprises: reader trigger message safety equipment obtain the algorithm seed of the data page of current accessed; Information safety devices uses the account form of setting that the algorithm seed is calculated, and obtains decruption key; Information safety devices uses decruption key that the data page of current accessed is decrypted.
Perhaps, the corresponding algorithm seed of e-book, the algorithm seed is stored in the header information of information safety devices or e-book; Information safety devices deciphering e-book comprises: reader trigger message safety equipment obtain the algorithm seed of e-book; Information safety devices uses the account form of setting that the algorithm seed is calculated, and obtains decruption key; Information safety devices uses decruption key that e-book is decrypted.
The e-book that e-book after information safety devices will be deciphered is converted to picture format comprises: the e-book after information safety devices will be deciphered is converted to image, adds watermarking images in image, obtains the e-book with the picture format of watermark.
Perhaps, the e-book that the e-book after information safety devices will be deciphered is converted to picture format comprises: the e-book after information safety devices will be deciphered is converted to image; Information safety devices as clear-text message, calculates according to hashing algorithm the information of making an appointment to clear-text message, generate expressly summary; Information safety devices uses watermarking algorithm to calculate the generation watermark information to expressly making a summary; Information safety devices adds watermark information in image, obtain the image file with watermark.
According to another aspect of the present invention, provide a kind of electronic-book reading system, having comprised: reader, reader disposes information safety devices; Reader comprises: access modules, after being used for connecting, by information safety devices visit e-book with information safety devices; The first authorization check module, whether be used for the authorization information safety equipment legal; The e-book inspection module, after being used for the first authorization check module verification and passing through, whether the check e-book is legal, if legal, the trigger message safety equipment are decrypted; Read module is used for from the e-book of information safety devices reading images form, provides the e-book of picture format to the user, so that the user reads; Information safety devices comprises: the second authorization check module, and whether be used for verification reader legal; Deciphering module after being used to receive the triggering of reader, is decrypted e-book; Format converting module is used for the e-book after the deciphering module deciphering is converted to the e-book of picture format.
By the present invention; information safety devices and e-book are bound in employing; when the visit e-book, need test to information safety devices, information safety devices is by after checking; reader just can be visited e-book; prevent that effectively Malware from destroying the password of e-book, solved the unsound problem of copyright protection regime of existing e-book, strengthened the security of e-book copyright; simultaneously, the interests of electronic publisher have also been safeguarded.
Description of drawings
Accompanying drawing described herein is used to provide further understanding of the present invention, constitutes the application's a part, and illustrative examples of the present invention and explanation thereof are used to explain the present invention, do not constitute improper qualification of the present invention.In the accompanying drawings:
Fig. 1 is the process flow diagram according to the e-book reading method of the embodiment of the invention 1;
Fig. 2 is the process flow diagram according to the e-book reading method of the embodiment of the invention 2;
Fig. 3 is the synoptic diagram according to first kind of header information of the embodiment of the invention 2;
Fig. 4 is the synoptic diagram according to second kind of header information of the embodiment of the invention 2;
Fig. 5 is a synoptic diagram of searching the authorization type of accessed page or leaf according to the SD card of the embodiment of the invention 2;
Fig. 6 is the bitmap synoptic diagram according to the band watermarking images of the embodiment of the invention 2;
Fig. 7 is the bitmap synoptic diagram according to the band literal watermark of the embodiment of the invention 2;
Fig. 8 is the process flow diagram according to the e-book reading method of the embodiment of the invention 3;
Fig. 9 is the structured flowchart according to the electronic-book reading system of the embodiment of the invention 4.
Embodiment
Hereinafter will describe the present invention with reference to the accompanying drawings and in conjunction with the embodiments in detail.Need to prove that under the situation of not conflicting, embodiment and the feature among the embodiment among the application can make up mutually.
The embodiment of the invention provides a kind of e-book reading method and system, in order to strengthen the copyright protection of e-book.
Embodiment 1
Present embodiment provides a kind of e-book reading method, and referring to Fig. 1, this method may further comprise the steps:
Step S102 is after reader and information safety devices connect, by this information safety devices visit e-book;
Wherein, the information safety devices in the present embodiment can be intelligent cipher key equipment or digital memory card etc., and reader need be finished visit to e-book by this equipment;
Step S104, whether reader and information safety devices are checked legal mutually;
Reader and information safety devices are checked mutually and can be passed through the unsymmetrical key verification mode.For example: preset the private key of unsymmetrical key A and the PKI of unsymmetrical key B in information safety devices inside, the corresponding PKI of unsymmetrical key A and the private key of unsymmetrical key B of having preset in reader inside; Public and private key by key A and key B is verified.
Certainly, if security requirement is not too high, also can adopt unidirectional authentication herein, for example only be whether reader authorization information safety equipment are legal, for the ease of whether the information safety devices mandate is tested, can in above-mentioned header information, comprise: the sign ID of e-book number; Simultaneously, the designated storage area of information safety devices stores first registration code that the server of e-book issues; Wherein, first registration code is that server generates according to ID number of e-book and the hardware sequence number of information safety devices; Accordingly, whether reader checking information safety equipment are authorized to comprise: reader obtains ID number of e-book in the information from the head, and reads the hardware sequence number of information safety devices; Reader generates second registration code according to ID number of e-book and the hardware sequence number of information safety devices; Reader reads first registration code in the information safety devices, and relatively whether first registration code is consistent with second registration code, if consistent, determines that information safety devices is authorized to.
Step S106, if reader and described information safety devices are all legal, whether reader is legal by the flag information check e-book of e-book;
Check herein mainly is whether the form of this e-book of check can be supported by this reader, usually, can record the relevant information of this e-book at the desired location of e-book, and reader can determine by this information whether this e-book is legal.For example: above-mentioned e-book is provided with header information, perhaps, is provided with header information in the specific data page or leaf of e-book; This header information comprises flag information; This flag information can in advance with the title of the server commitment of e-book.At this moment, whether this reader check mark information is legal, if legal, determines that e-book is legal.
If e-book is illegal, then this reader only can be opened the expressly e-book of form, for the e-book of ciphertext form, mess code will occur after opening.
Step S108, if above-mentioned e-book is legal, reader trigger message safety equipment deciphering e-book;
Step S110, the e-book after information safety devices will be deciphered is converted to the e-book of picture format;
The e-book of step S112, reader reading images form from information safety devices provides the e-book of picture format to the user, so that the user reads.
Present embodiment is by binding information safety devices and e-book; can prevent effectively that Malware from destroying the password of e-book; solved the unsound problem of copyright protection regime of existing e-book; strengthened the security of e-book copyright; simultaneously, the interests of electronic publisher have been safeguarded.
For the further security of enhanced system, store the access authority information of e-book correspondence in the above-mentioned information safety devices; After reader determined that information safety devices is authorized to, said method also comprised: can reader be determined visit e-book according to access authority information.
Wherein, access authority information comprises the authorization type and the authorization message of each data page correspondence of e-book, and it is one of following that authorization type comprises at least: time type, number of times type, cut-off date type; Wherein, the authorization message of time type correspondence is excess time, and the authorization message of number of times type correspondence is a residue degree, and the authorization message of cut-off date type correspondence is the cut-off date; Accordingly, above-mentioned reader determines that according to access authority information can visit e-book comprises: reader reads the authorization type of the data page of current accessed from information safety devices; Based on the type that reads, can carry out following operation:
1) if the authorization type that reads is the time type, reader checks whether be 0 the excess time of data page, if be not 0, and then can the visit data page or leaf;
2) if the authorization type that reads is the number of times type, reader checks whether the residue degree of data page is 0, if be not 0, and then can the visit data page or leaf;
3) if the authorization type that reads is the cut-off date type, reader is checked current date whether before the cut-off date of data page, if, then can the visit data page or leaf.
In deciphering during e-book, the corresponding algorithm seed of each data page of the e-book of present embodiment, this algorithm seed are stored in the header information of each data page of information safety devices or e-book; Reader comprises by information safety devices deciphering e-book: reader trigger message safety equipment obtain the algorithm seed of the data page of current accessed; Information safety devices uses the account form of setting that the algorithm seed is calculated, and obtains decruption key; Information safety devices uses decruption key that the data page of current accessed is decrypted.
Top mode is all to be provided with cipher mode on each data page of e-book, certainly, consider simple to operateization, also can cryptographic operation only be set one time to an e-book, based on this, the operation of deciphering e-book can be adopted following manner: the corresponding algorithm seed of e-book, and this algorithm seed is stored in the header information of information safety devices or e-book; Based on this, above-mentioned reader comprises by information safety devices deciphering e-book: reader trigger message safety equipment obtain the algorithm seed of e-book; Information safety devices uses the account form of setting that the algorithm seed is calculated, and obtains decruption key; Information safety devices uses decruption key that e-book is decrypted.
In order to prevent that the user to operations such as the file after deciphering duplicate, safeguarding the copyright of e-book, after the above-mentioned reader trigger message safety equipment deciphering e-book, the e-book after information safety devices will be deciphered is converted to picture format; Accordingly, above-mentioned reader provides the e-book of picture format to the user.
Wherein, the e-book that the e-book after above-mentioned information safety devices will be deciphered is converted to picture format comprises: the e-book after information safety devices is just deciphered is converted to image, adds this watermark information in image, obtains the image file with watermark.This watermark information can generate in the following ways: information safety devices as clear-text message, calculates according to hashing algorithm the information of making an appointment to described clear-text message, generates expressly summary; Information safety devices uses watermarking algorithm that described plaintext summary is calculated the generation watermark information;
Present embodiment is by being connected information safety devices with reader, during reader access legal information safety equipment, except that whether the checking information safety equipment possess the legal authorization, also whether the mandate of the electronic book data of visiting that writes of checking information safety equipment is legal, if authorizing, check passes through, then information safety devices is decrypted the row format conversion of going forward side by side to the e-book encrypt data, and send transformation result to reader and read, if check is authorized unsuccessful, then reader can not the visit information safety equipment.Prevent the illegal reading electronic book of malicious user effectively, strengthened the security of e-book copyright.
Embodiment 2
In the present embodiment, with digital memory card (Secure Digital Memory Card, the SD card) comes the present invention is at length introduced for information safety devices, preferably, the SD card is the information safety devices with standard SD card, has unique hardware sequence number, the SD jig has the memory function of safe storage data, also has the encryption lock function of carrying out the encryption and decryption computing, can also lock interior information by the telesecurity upgrade encryption, encryption hardware is supported 512/1024/2048 RSA, DES, 3DES, SHA1, HMAC, MD5 algorithm, the equipment of compatible to SD card have TF (Trans-Flash) card, MMC (MultimediaCard) card, MINI-MMC card etc.Referring to Fig. 2, the process flow diagram of a kind of e-book reading method that provides for present embodiment, this method may further comprise the steps:
Step 201: reader and SD card connect, and send the request of visit electronic book data page or leaf to the SD card;
Preferably, request of access can comprise e-book ID number and the number of pages of visiting;
Electronic book data is stored in the server database with the form of encrypt data, and electronic book data has carried out the paging processing according to the type of reader, electronic book data can be formed by server for encrypting, also can form by inner encryption of SD card, in the process that forms, every page electronic book data has all been added header information, and the electronic book data that leaves in the server database can be downloaded arbitrarily; The electronic book data that the user asks to download can be stored in the SD card, also can be directly downloaded in the reader;
Whether step 202:SD card and reader are verified legal mutually, if all by checking, execution in step 203; If not by authentication (being to have one in SD card and the reader at least), execution in step 211 not by checking;
Concrete, preset the private key of unsymmetrical key A and the PKI of unsymmetrical key B in SD card inside, the corresponding PKI of unsymmetrical key A and the private key of unsymmetrical key B of having preset in reader inside;
The request that reader sends is received in the 202-1:SD clamping, produces random number a, and random number a is sent to reader, and reader is encrypted random number a with the private key of the unsymmetrical key B of storage, and the random number a ' after encrypting is sent to the SD card;
The 202-2:SD card is decrypted with the PKI of unsymmetrical key B of the storage random number a ' after to the encryption that receives, and the random number a of random number after will decipher and generation compares, and judges whether unanimity of comparative result;
If not, then authentication is not passed through, reader prompting mistake; If then carry out 202-3;
202-3: produce random number b in the reader, and random number b is sent to the SD card, the SD card is encrypted random number b with the private key of the unsymmetrical key A of storage, and the random number b ' after encrypting is sent to reader;
202-4: reader is decrypted with the PKI of unsymmetrical key A of the storage random number b ' after to the encryption that receives, and random number after will decipher and generation random number b compare, judge whether unanimity of comparative result;
Wherein, 202-1 to 202-4 is intended to clearly show the sequencing of execution for carrying out the sequence number of action, do not illustrate in the drawings, certainly, the sequencing of this execution is a kind of implementation, when reality realizes, be not limited to this a kind of realization order, following sequence number is similar.
If not, then authentication is not passed through, reader prompting mistake; If, execution in step 203;
Step 203: whether the electronic book data page or leaf that the reader check will be visited is legal, if, execution in step 204; If not, execution in step 205;
Preferably, the header information of electronic book data page or leaf comprises flag information, comprises other information of e-book ID number, can also comprise the algorithm seed; Be the synoptic diagram of the header information of two kinds of forms providing as Fig. 3 and Fig. 4, wherein, comprise in the header information shown in Figure 2: flag information and comprise other information of e-book ID number; Comprise in the header information shown in Figure 3: flag information, comprise e-book ID number other information and algorithm seed.
Preferably, flag information is the sign that server has the lawful authority of electronic book data, can be the title of server commitment or the title of e-book etc., and reader can be discerned this flag information;
Preferably, the algorithm seed can be used for coming the e-book encrypt data is decrypted at the inner key that generates deciphering usefulness of SD card;
Whether SD card check electronic book data page or leaf is legal, and specifically whether the electronic book data page or leaf of being visited by the first authorization check module check of reader has that legal header information realizes;
If electronic book data is stored in the reader, whether the electronic book data page or leaf that the reader Direct Test will be visited has legal header information; If electronic book data is stored in the SD card, then whether the electronic book data page or leaf that will visit in the reader check SD card has legal header information;
Concrete, whether the flag information in the first authorization check module check header information of reader is that electronic book data is applied for the title of the server commitment of authorizing or the title of e-book etc.;
If then execution in step 204; If not or do not search any flag information, then execution in step 205;
Step 204: reader carries out authorization check to the electronic book data page or leaf of being visited and judges whether check is passed through by the SD card; If, execution in step 206; If not, execution in step 212;
There are grant column list and authorization module in the SD card, information in grant column list and the authorization module is from server, after the electronic book data success is downloaded in application, server sends to the SD card with the authentication of the authorization message of this electronic book data, the SD card uses the interior safety upgrade module of SD card that the authentication of the authorization message of server transmission is written in Authorization class table and the authorization module, when visiting electronic book data, all to carry out authorization check to the electronic book data page or leaf of being visited at every turn;
Preferably, deposit e-book sequence number, every page information such as Authorization class model in the grant column list; Deposit the authorization type of corresponding Authorization class model in the authorization module;
Concrete, referring to Fig. 5, the SD card that provides for present embodiment is searched the synoptic diagram of the authorization type of accessed page or leaf; Wherein, behind the reader access SD card,, preserve the ID of each e-book in this tabulation with reading the SD card grant column list of SD card, and the Authorization class model of the number of pages of each ID correspondence and this number of pages; Simultaneously, also store SD card authorization module in this SD card, can know the details of each style number correspondence by this module, for example, the implication of style number representative, the current information such as visit that whether allows.The authorization type of the concrete accessed page or leaf of SD card inquiry comprises:
The request of access that reader sends is received in the 204-1:SD clamping, and searches pairing certain page Authorization class model according to request in grant column list visited e-book ID number;
Preferably, authorization type can be divided into time type, number of times type, cut-off date type etc. or compound; Compound is the combination of any type in the above authorization type;
Whether the 204-2:SD card is searched the pairing authorization type of this Authorization class model according to the Authorization class model of accessed page or leaf in authorization module, judge to authorize and pass through, and judged result is sent to reader;
Preferably, if authorization type is the time type, then the SD card judges whether the mandate time is 0, if be not 0 check authorize and to pass through, continue execution in step 206; If be 0 check authorize and not pass through, the electronic book data page or leaf does not allow accessed;
Accordingly, authorization type is the number of times type, and then the SD card judge to authorize whether number of times is 0, if be not 0 check authorize and pass through, continue execution in step 206; If be 0 check authorize and not pass through, the electronic book data page or leaf does not allow accessed;
Accordingly, authorization type is the cut-off date type, and then the SD card judges whether current date reaches authorization date, if no show, then check is authorized and passed through, and continues execution in step 206; If arrive, then check is authorized and is not passed through, and the electronic book data page or leaf does not allow accessed;
Accordingly, if authorization type is compound, be foundation with minimum authority when then SD card check is authorized, if authorizing, check passes through, continue execution in step 206; Do not pass through if check is authorized, the electronic book data page or leaf does not allow accessed;
Step 205: reader reads and shows electronic book data; Reading in this step mainly indicates the reading of the e-book of civilian form, if not the e-book of plaintext form then the mess code phenomenon can occur;
Concrete, if electronic book data is stored in the reader, reader directly is decrypted electronic book data, and decrypted result is outputed to display; Or reader does not process directly electronic book data it is outputed to display;
If electronic book data is stored in the SD card, then the SD card needs to send electronic book data to reader earlier;
Step 206:SD card obtains the electronic book data page or leaf that will visit, sends it enciphering/deciphering module of SD card to;
Concrete, the SD card can obtain the electronic book data page or leaf that will visit from reader, send the electronic book data page or leaf that will visit to the enciphering/deciphering module again; Can also directly from the memory module of self, send the electronic book data page or leaf that to visit to the enciphering/deciphering module;
Step 207:SD card is decrypted the electronic book data page or leaf that will visit;
Concrete, if the algorithm seed is stored in the SD card in advance, then the SD card reads the algorithm seed, 1 pair of algorithm seed of algorithm according to inside calculates, obtain key 2, and be decrypted, obtain the e-book clear data with 2 pairs of current electronic book data pages or leaves of visiting of key;
If the algorithm seed is stored in the header information of electronic book data, then the SD card reads the algorithm seed in the electronic book data top margin portion information of being visited earlier, 1 pair of algorithm seed of algorithm according to inside calculates, obtain key 2, and be decrypted with 2 pairs of current these electronic book data pages or leaves of visiting of key, obtain the e-book clear data;
Step 208:SD card carries out format conversion with the e-book clear data;
The SD card converts the e-book clear data to picture format, and picture format can be forms such as jpeg image format, tiff image form, GIF picture format or FPX picture format;
Preferably, in the present embodiment, converting the e-book clear data to picture format is that example describes; Concrete, this transfer process comprises:
SD card start-up format converting module as input, is converted to image with the e-book clear data of this page by data conversion module with the e-book clear data of institute's access page; The SD card as host image, and is embedded into this image in the host image with watermarking images according to internal algorithm, obtains image and this image of buffer memory with watermark;
Need to prove that watermarking images can be visual also can hiding, watermarking images in the present embodiment is visual.This transfer process also comprises:
The SD card as clear-text message, calculates according to hashing algorithm the information of representative of consumer identity to clear-text message, generate expressly summary, in the embed watermark algorithm of will expressly making a summary again, generates watermark information;
SD card start-up format converting module with the e-book clear data of institute's access page as input, the e-book clear data of this page is converted to image by data conversion module, and, form image and this image of buffer memory of band watermark with becoming living watermark information to add in the image;
Preferably, the information of representative of consumer identity comprises the hardware sequence number ID of SD card, can also comprise e-book ID number or the authorization code that produces during server authorizes etc., or comprise e-book ID number and the combination of the authorization code that produces during server authorizes; Need to prove that watermark information can be visual also can hiding; The watermark of hiding distributes with latticed form; In the present embodiment, watermark information is visual.
Step 209: reader reads the image of the band watermark that generates in the SD card, and it is outputed to display;
Referring to Fig. 6, the image synoptic diagram of the band watermarking images that provides for present embodiment; Referring to Fig. 7, the bitmap synoptic diagram of the band literal watermark that provides for present embodiment wherein, is handled in this bitmap in the electronic book data page or leaf outside original content, has also increased watermark " Zhang San's special use forbids to duplicate HID:5P007B3921000010 ";
Preferably, after the success of reader access electronic book data page or leaf, the authorization message of opening entry and this electronic book data page or leaf that successively decreases;
Step 210: reader is checked the situation that is connected with the SD card, follows the tracks of the state of visit electronic book data page or leaf;
Preferably, if the authorization type of electronic book data is the time type, then reader is according to beginning to carry out countdown the excess time in the authorization module of SD card, until stopping to visit this page or leaf, and write the authorization module of SD card final excess time;
If the authorization type of electronic book data is the number of times type, then reader judges whether the SD card normally is connected with reader, disconnects being considered as authorizing number of times to reduce once when connecting, and final residue degree is write the authorization module of SD card; If the authorization type of electronic book data is the cut-off date type, then reader with the clock log date and with the SD card in mandate cut-off date in the authorization module compare, until stopping to visit this page or leaf, and final stopping to be visited the authorization module that writes the SD card constantly;
Need to prove that arrive the mandate time as the visit to the electronic book data page or leaf, then reader stops to visit this page or leaf; The image of the band watermark that the SD card generates, only with reader that the SD card normally is connected on the normal image of this band watermark of demonstration; When stopping to visit this page, the SD card discharges the image of this band watermark;
Step 211: reader prompting mistake;
Step 212: the electronic book data page or leaf does not allow accessed.In the foregoing description 1, need to prove that reader access is during to certain page electronic book data, the SD card all only is decrypted and format conversion the e-book encrypt data of this page, to other not access page all do not do deciphering and format conversion.
Step 202 can also be replaced by step 202 ', step 202 ': whether reader check SD card has legal authorization; If, execution in step 203; If not, execution in step 211 then; Wherein, the legal authorization of SD card is from server, specifically comprise: server receives the user by the SD card hardware sequence number ID of client transmission and ID number of institute's applying for electronic book, and according to the registration code generating algorithm of server end with the hardware sequence number ID of the SD card that receives with calculate for e-book ID number, obtain registration code 1, registration code 1 is sent to the SD card by client; Client upgrading tool safe in utilization is written to registration code 1 assigned address of encrypting the zone in the SD card safely;
Preferably, described client is used for being connected and communicating by letter between SD card and the server, can be user's PC, net book, have the browser of function of surfing the Net, the e-book that has function of surfing the Net or a mobile phone etc.;
Need to prove that each e-book all has corresponding different I D number, the hardware sequence number of SD card is stored in the SD card; The safety upgrade module is to be preset at SD card inside in advance, after registration code 1 is written to the success of SD card, and electronic book data application mandate success in the SD card;
Wherein, whether reader check SD card has legal authorization in the step 202, specifically comprises:
202 '-1: the hardware sequence number ID of reader electron gain book ID number and SD card;
Concrete, reader obtains from the header information of any electronic book data page or leaf e-book ID number, and reader also reads its hardware sequence number ID in the SD card, and the hardware sequence number ID of e-book ID and SD card is carried out buffer memory;
202 '-2: reader is encrypted the assigned address search registration code 1 in the zone in the SD card, whether checking registration code 1 is the active registration sign indicating number;
Concrete: reader calculates e-book ID number of obtaining and the hardware sequence number ID of SD card according to the algorithm identical with generating registration code 1, obtains registration code 2, and registration code 2 and registration code 1 are compared, and judges whether unanimity of comparative result;
If not, then execution in step 211 is not passed through in authentication;
If then reader sends check to the SD card and authorizes successful response, continues execution in step 203.
Embodiment 3
Referring to Fig. 8, the process flow diagram of a kind of e-book reading method that provides for present embodiment, this method may further comprise the steps:
Step 801: reader and SD card connect, and send the request of visit electronic book data to the SD card;
Preferably, request of access can comprise e-book ID number;
Electronic book data is stored in the server database with the form of encrypt data, electronic book data can be formed by server for encrypting, also can form by inner encryption of SD card, in the process that forms, electronic book data to integral body adds header information, and according to the type of reader electronic book data is carried out paging and handle, the electronic book data that leaves in the server database can be downloaded arbitrarily; The electronic book data that the user asks to download can be stored in the SD card, also can be directly downloaded in the reader;
Whether step 802:SD card and reader are verified legal mutually, if, execution in step 803, if not, execution in step 812, authentication authorization and accounting does not pass through;
Concrete, preset the private key of unsymmetrical key C and the PKI of unsymmetrical key D in SD card inside, the corresponding PKI of unsymmetrical key C and the private key of unsymmetrical key D of having preset in reader inside; This checking may further comprise the steps:
The request that reader sends is received in the 802-1:SD clamping, produces random number c, and random number c is sent to reader, and reader is encrypted random number c with the private key of the unsymmetrical key D of storage, and the random number c ' after encrypting is sent to the SD card;
The 802-2:SD card is decrypted with the PKI of unsymmetrical key D of the storage random number c ' after to the encryption that receives, and the random number c of random number after will decipher and generation compares, and judges whether unanimity of comparative result;
If not, then execution in step 812 is not passed through in authentication; If then carry out 802-3;
802-3: produce random number d in the reader, and random number d is sent to the SD card, the SD card is encrypted random number d with the private key of the unsymmetrical key C of storage, and the random number d ' after encrypting is sent to reader;
802-4: reader is decrypted with the PKI of unsymmetrical key C of the storage random number d ' after to the encryption that receives, and the random number d of random number after will decipher and generation compares, and judges whether unanimity of comparative result;
If not, then execution in step 812 is not passed through in authentication; If, execution in step 803.
Step 803: whether the electronic book data that the reader check will be visited is legal; If, execution in step 804; If not, execution in step 805;
Preferably, the header information of electronic book data comprises flag information, comprises other information of e-book ID number, can also comprise the algorithm seed;
Preferably, flag information is the sign that server has the lawful authority of electronic book data, can be the title of server commitment or the title of e-book etc., and reader can be discerned this flag information;
Preferably, the algorithm seed can be used for coming the e-book encrypt data is decrypted at the inner key that generates deciphering usefulness of SD card;
Whether SD card check electronic book data is legal, and specifically whether the electronic book data of being visited by the first authorization check module check of reader has that legal header information realizes;
If electronic book data is stored in the reader, whether the electronic book data that the reader Direct Test will be visited has legal header information; If electronic book data is stored in the SD card, then whether the electronic book data that will visit in the reader check SD card has legal header information
Concrete, whether the flag information in the first authorization check module check header information of reader is that electronic book data is applied for the title of the server commitment of authorizing or the title of e-book etc.;
If not or do not search any flag information, then execution in step 805;
If then execution in step 804;
Step 804: reader carries out authorization check to the electronic book data of being visited and judges whether check is passed through by the SD card, if, execution in step 806, if not, execution in step 813;
There are grant column list and authorization module in the SD card, information in grant column list and the authorization module is from server, after the electronic book data success is downloaded in application, server sends to the SD card with the authorization message authentication of this electronic book data, the SD card uses the safety upgrade module in the SD card that the authorization message authentication that server sends is written in Authorization class table and the authorization module, when visiting electronic book data, all to carry out authorization check to the electronic book data of being visited at every turn;
Preferably, deposit information such as e-book sequence number, Authorization class model in the grant column list; Deposit the authorization type of corresponding Authorization class model in the authorization module; This process can comprise:
The request of access that reader sends is received in the 804-1:SD clamping, and searches the e-book ID number pairing Authorization class model of being visited according to request in grant column list;
Preferably, authorization type can be divided into time type, number of times type, cut-off date type etc. or compound; Compound is the combination of any type in the above authorization type;
Whether the 804-2:SD card is searched the pairing authorization type of this Authorization class model according to the Authorization class model of electronic book data in authorization module, judge to authorize and pass through, and judged result is sent to reader;
Preferably, if authorization type is the time type, then the SD card judges whether the mandate time is 0, if be not 0, then check is authorized and passed through, and continues execution in step 806; If be 0, then check is authorized and is not passed through execution in step 813;
Accordingly, authorization type is the number of times type, and then the SD card judge to authorize whether number of times is 0, if be not 0 check authorize and pass through, continue execution in step 806; If be 0, then check is authorized and is not passed through execution in step 813;
Accordingly, authorization type is the cut-off date type, and then the SD card judges whether current date reaches authorization date, if no show, then check is authorized and passed through, and continues execution in step 806; If arrive, then check is authorized and is not passed through execution in step 813;
Accordingly, if authorization type is compound, be foundation with minimum authority when then SD card check is authorized, if authorizing, check passes through, continue execution in step 806; If authorizing, check do not pass through execution in step 813;
Step 805: reader reads and shows electronic book data;
Concrete, if electronic book data is stored in the reader, reader directly is decrypted electronic book data, and decrypted result is outputed to display; Or reader does not process directly electronic book data it is outputed to display;
If electronic book data is stored in the SD card, then the SD card needs to send electronic book data to reader earlier;
Step 806:SD card obtain want the electronic book data of being visited, send it enciphering/deciphering module of SD card to;
Concrete, the SD card can obtain the electronic book data that will visit from reader, send the electronic book data that will visit to the enciphering/deciphering module again; Can also directly from the memory module of self, send the electronic book data that to visit to the enciphering/deciphering module;
Step 807:SD card is decrypted the electronic book data that will visit;
Concrete, if the algorithm seed is stored in the SD card in advance, then the SD card reads the algorithm seed, algorithm 1 ' according to inside calculates the algorithm seed, obtain key 2 ', and current electronic book data of visiting is decrypted, obtain the e-book clear data with key 2 ';
If the algorithm seed is stored in the header information of electronic book data, then the SD card reads the algorithm seed in the electronic book data header information of being visited earlier, algorithm 1 ' according to inside calculates the algorithm seed, obtain key 2 ', and with key 2 ' current this electronic book data of visiting is decrypted, obtain the e-book clear data;
Step 808: reader sends the request of certain page of electronic book data of visit to the SD card;
The request of reader is received in step 809:SD clamping, and institute's visit electronic book data page or leaf is carried out format conversion;
The SD card converts the e-book clear data form of image to, and picture format can be forms such as jpeg image format, tiff image form, GIF picture format or FPX picture format;
Preferably, in the present embodiment, converting the e-book clear data to picture format is that example describes;
Concrete, this conversion comprises:
SD card start-up format converting module as input, is converted to image with the e-book clear data of this page by data conversion module with the e-book clear data of institute's access page; The SD card as host image, and is embedded into this image in the host image with watermarking images according to internal algorithm, obtains image and this image of buffer memory with watermark;
Need to prove that watermarking images can be visual also can hiding, in the present embodiment, watermarking images is visual.
This conversion also comprises: the SD card as clear-text message, calculates according to hashing algorithm the information of representative of consumer identity to clear-text message, generates expressly summary, and the embed watermark algorithm of will expressly making a summary again generates watermark information;
SD card start-up format converting module with the e-book clear data of institute's access page as input, the e-book clear data of this page is converted to image by data conversion module, and, form image and this image of buffer memory of band watermark with becoming living watermark information to add in the image;
Preferably, the information of representative of consumer identity comprises the hardware sequence number ID of SD card, can also comprise e-book ID number or the authorization code that produces during server authorizes etc., or comprise e-book ID number and the combination of the authorization code that produces during server authorizes etc.;
Need to prove that watermark information can be visual also can hiding; The watermark of hiding distributes with latticed form, and watermark information is visual in the present embodiment.
Step 810: reader reads the image of the band watermark that generates in the SD card, and it is outputed to display;
Preferably, the success of reader access electronic book data, the authorization message of opening entry and this electronic book data that successively decreases;
Step 811: reader is checked the situation that is connected with the SD card, follows the tracks of the state of visit electronic book data;
Preferably, if the authorization type of electronic book data is the time type, then reader is according to beginning to carry out countdown the excess time in the authorization module of SD card, until stopping to visit electronic book data, and write the authorization module of SD card final excess time;
If the authorization type of electronic book data is the number of times type, then reader judges whether the SD card normally is connected with reader, disconnects being considered as authorizing number of times to reduce once when connecting, and final residue degree is write the authorization module of SD card;
If the authorization type of electronic book data is the cut-off date type, then reader compares the mandate cut-off date in the authorization module in clock log date and the SD card, until stopping to visit electronic book data, and final stopping to be visited the authorization module that writes the SD card constantly;
Arrive the mandate time as the visit to electronic book data, then reader stops to visit electronic book data; The image of the band watermark that the SD card generates, only with reader that the SD card normally is connected on the normal image of this band watermark of demonstration; When stopping to visit this page, the SD card discharges the image of this band watermark;
Step 812: reader prompting mistake;
Step 813: promptly electronic book data does not allow accessed.
In the foregoing description 2, need to prove, during the reader access electronic book data, be that whole electronic book datas is decrypted, obtain the e-book clear data, when having access to certain page, the SD card all only carries out format conversion to the e-book clear data of this page, to other not access page all do not process.Step 802 can also be replaced by step 802 ', step 802 ': whether reader check SD card has legal authorization, if, execution in step 803, if not, then execution in step 812 is not passed through in authentication;
The legal authorization of SD card is from server, specifically comprise: server receives the user by the SD card hardware sequence number ID of client transmission and ID number of institute's applying for electronic book, and according to the registration code generating algorithm of server end with the hardware sequence number ID of the SD card that receives with calculate for e-book ID number, obtain registration code 1 ', registration code 1 ' is sent to the SD card by client; Client upgrading tool safe in utilization is written to registration code 1 ' assigned address of encrypting the zone in the SD card safely;
Preferably, described client is used for being connected and communicating by letter between SD card and the server, can be user's PC, net book, have the browser of function of surfing the Net, the e-book that has function of surfing the Net or a mobile phone etc.;
Need to prove that each e-book all has corresponding different I D number, the hardware sequence number of SD card is stored in the SD card; The safety upgrade module is to be preset at SD card inside in advance, after registration code 1 ' is written to the success of SD card, and electronic book data application mandate success in the SD card;
Whether reader check SD card has legal authorization, specifically comprises: 802-1: the hardware sequence number ID of reader electron gain book ID number and SD card;
Concrete, reader obtains from the header information of electronic book data e-book ID number, and reader also reads its hardware sequence number ID in the SD card, and the hardware sequence number ID of e-book ID and SD card is carried out buffer memory;
802-2: the assigned address search registration code 1 ' of reader in the encryption zone of SD card, whether checking registration code 1 ' is the active registration sign indicating number;
Concrete: reader obtains registration code 2 ', and registration code 2 ' and registration code 1 ' is compared according to generating registration code 1 ' algorithm e-book ID number of acquisition and the hardware sequence number ID of SD card being calculated, and judges whether comparative result is consistent;
If not, then execution in step 812 is not passed through in authentication;
If then reader sends check to the SD card and authorizes successful response, continues execution in step 803;
Above embodiment 2 and 3 is the description that example is carried out with the SD card all, by SD card and e-book are bound, when the reader reading electronic book, need provide the SD card of mandate, has guaranteed the validated user reading electronic book, and illegal user can't reading electronic book.
Embodiment 4
Present embodiment provides a kind of electronic-book reading system, and referring to Fig. 9, this system comprises: reader 92, and this reader 92 disposes information safety devices 94; Wherein, reader 92 comprises:
Access modules 922 is after being used for connecting with information safety devices, by information safety devices 94 visit e-book;
The first authorization check module 924 links to each other with access modules 922, and whether be used for authorization information safety equipment 94 legal;
Whether e-book inspection module 926 links to each other with the first authorization check module 924, after being used for the checking of the first authorization check module 924 and passing through, check this e-book legal, if legal, trigger message safety equipment 94 are decrypted;
Read module 928 is used for from the e-book of information safety devices 94 reading images forms, provides the e-book of picture format to the user, so that the user reads;
Information safety devices 94 comprises:
The second authorization check module 942, whether be used for verification reader 92 legal;
Deciphering module 944 after being used to receive the triggering of reader 92, is decrypted described e-book;
Format converting module 946 is used for the e-book after deciphering module 944 deciphering is converted to the e-book of picture format.
Wherein, this reader 92 and information safety devices 94 can be carried out the method described in the foregoing description 1-3, and concrete function repeats no more here.
As can be seen from the above description, above embodiment is by when reading electronic book, whether the authorization information safety equipment are authorized to, only allow to hold the user capture e-book of the information safety devices of mandate, prevent disabled user's reading electronic book effectively, safeguarded the security of e-book copyright.
Obviously, those skilled in the art should be understood that, above-mentioned each module of the present invention or each step can realize with the general calculation device, they can concentrate on the single calculation element, perhaps be distributed on the network that a plurality of calculation element forms, alternatively, they can be realized with the executable program code of calculation element, thereby, they can be stored in the memory storage and carry out by calculation element, and in some cases, can carry out step shown or that describe with the order that is different from herein, perhaps they are made into each integrated circuit modules respectively, perhaps a plurality of modules in them or step are made into the single integrated circuit module and realize.Like this, the present invention is not restricted to any specific hardware and software combination.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various changes and variation.Within the spirit and principles in the present invention all, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (12)

1. an e-book reading method is characterized in that, comprising:
After reader and information safety devices connect, by described information safety devices visit e-book;
Whether described reader and described information safety devices are checked mutually legal;
If described reader and described information safety devices are all legal, whether described reader checks described e-book legal by the flag information of described e-book;
If described e-book is legal, described reader triggers described information safety devices and deciphers described e-book;
E-book after described information safety devices will be deciphered is converted to the e-book of picture format;
Described reader reads the e-book of described picture format from described information safety devices, provide the e-book of described picture format to the user, so that described user reads.
2. method according to claim 1 is characterized in that described e-book is provided with header information, perhaps, is provided with header information in the specific data page or leaf of described e-book; Described header information comprises flag information.
3. method according to claim 2 is characterized in that, described flag information be in advance with the title of the server commitment of described e-book.
4. method according to claim 2 is characterized in that, what described reader and described information safety devices were checked employing mutually is the unsymmetrical key verification mode.
5. method according to claim 1 is characterized in that,
Store the access authority information of described e-book correspondence in the described information safety devices;
After described reader determined that described information safety devices is authorized to, described method also comprised: can described reader be determined visit described e-book according to described access authority information.
6. method according to claim 5, it is characterized in that, described access authority information comprises the authorization type and the authorization message of each data page correspondence of described e-book, and it is one of following that described authorization type comprises at least: time type, number of times type, cut-off date type; Wherein, the authorization message of described time type correspondence is excess time, and the authorization message of described number of times type correspondence is a residue degree, and the authorization message of described cut-off date type correspondence is the cut-off date;
Described reader determines that according to described access authority information can visit described e-book comprises:
Described reader reads the authorization type of the data page of current accessed from described information safety devices;
If the described authorization type that reads is the time type, described reader checks whether be 0 the excess time of described data page, if be not 0, then can visit described data page;
If the described authorization type that reads is the number of times type, described reader checks whether the residue degree of described data page is 0, if be not 0, then can visit described data page;
If the described authorization type that reads is the cut-off date type, described reader checks that current date is whether before the cut-off date of described data page, if then can visit described data page.
7. method according to claim 5 is characterized in that, described access authority information comprises the authorization type and the authorization message of described e-book correspondence, and it is one of following that described authorization type comprises at least: time type, number of times type, cut-off date type; Wherein, the authorization message of described time type correspondence is excess time, and the authorization message of described number of times type correspondence is a residue degree, and the authorization message of described cut-off date type correspondence is the cut-off date;
Described reader determines that according to described access authority information can visit described e-book comprises:
Described reader reads the authorization type of the e-book of current accessed from described information safety devices;
If the described authorization type that reads is the time type, described reader checks whether be 0 the excess time of described e-book, if be not 0, then can visit described e-book;
If the described authorization type that reads is the number of times type, described reader checks whether the residue degree of described e-book is 0, if be not 0, then can visit described e-book;
If the described authorization type that reads is the cut-off date type, described reader checks that current date is whether before the cut-off date of described e-book, if then can visit described e-book.
8. method according to claim 1 is characterized in that,
The corresponding algorithm seed of each data page of described e-book, described algorithm seed are stored in the header information of each data page of described information safety devices or described e-book;
Described information safety devices is deciphered described e-book and comprised: described reader triggers the algorithm seed that described information safety devices obtains the data page of current accessed; Described information safety devices uses the account form of setting that described algorithm seed is calculated, and obtains decruption key; Described information safety devices uses described decruption key that the data page of described current accessed is decrypted.
9. method according to claim 1 is characterized in that,
The corresponding algorithm seed of described e-book, described algorithm seed is stored in the header information of described information safety devices or described e-book;
Described information safety devices is deciphered described e-book and comprised: described reader triggers the algorithm seed that described information safety devices obtains described e-book; Described information safety devices uses the account form of setting that described algorithm seed is calculated, and obtains decruption key; Described information safety devices uses described decruption key that described e-book is decrypted.
10. method according to claim 1 is characterized in that, the e-book that the described e-book after described information safety devices will be deciphered is converted to picture format comprises:
Described e-book after described information safety devices will be deciphered is converted to image, adds watermarking images in described image, obtains the e-book with the picture format of watermark.
11. method according to claim 1 is characterized in that, the e-book that the e-book after described information safety devices will be deciphered is converted to picture format comprises:
Described e-book after described information safety devices will be deciphered is converted to image;
Described information safety devices as clear-text message, calculates according to hashing algorithm the information of making an appointment to described clear-text message, generate expressly summary;
Described information safety devices uses watermarking algorithm that described plaintext summary is calculated the generation watermark information;
Described information safety devices adds described watermark information in described image, obtain the image file with watermark.
12. an electronic-book reading system is characterized in that, comprising: reader, described reader disposes information safety devices;
Described reader comprises:
Access modules is after being used for connecting with information safety devices, by described information safety devices visit e-book;
The first authorization check module is used to verify whether described information safety devices is legal;
Whether the e-book inspection module after being used for the described first authorization check module verification and passing through, checks described e-book legal, if legal, trigger described information safety devices and is decrypted;
Read module is used for from the e-book of described information safety devices reading images form, provides the described e-book of picture format to the user, so that described user reads;
Described information safety devices comprises:
The second authorization check module is used to verify whether described reader is legal;
Deciphering module after being used to receive the triggering of described reader, is decrypted described e-book;
Format converting module is used for the e-book after the deciphering of described deciphering module is converted to the e-book of picture format.
CN201110217167.XA 2011-07-29 2011-07-29 E-book reading method and system Expired - Fee Related CN102222195B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110217167.XA CN102222195B (en) 2011-07-29 2011-07-29 E-book reading method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110217167.XA CN102222195B (en) 2011-07-29 2011-07-29 E-book reading method and system

Publications (2)

Publication Number Publication Date
CN102222195A true CN102222195A (en) 2011-10-19
CN102222195B CN102222195B (en) 2014-03-26

Family

ID=44778745

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110217167.XA Expired - Fee Related CN102222195B (en) 2011-07-29 2011-07-29 E-book reading method and system

Country Status (1)

Country Link
CN (1) CN102222195B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103338185A (en) * 2013-05-31 2013-10-02 飞天诚信科技股份有限公司 File sharing method and file sharing system
CN103761461A (en) * 2014-02-20 2014-04-30 联想(北京)有限公司 Control method, control device, processor of electronic equipment and electronic equipment
CN104517045A (en) * 2013-09-26 2015-04-15 上海中移通信技术工程有限公司 Method for creating protected digital file
CN109508518A (en) * 2017-09-15 2019-03-22 北京握奇智能科技有限公司 A kind of document handling method, system and file decryption equipment
CN112927053A (en) * 2021-03-31 2021-06-08 掌阅科技股份有限公司 Book reading right processing method, computing device and computer storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1777851A (en) * 2002-08-23 2006-05-24 桑迪士克防护内容解决公司 Apparatus, system and method for securing digital documents in a digital appliance

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1777851A (en) * 2002-08-23 2006-05-24 桑迪士克防护内容解决公司 Apparatus, system and method for securing digital documents in a digital appliance

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103338185A (en) * 2013-05-31 2013-10-02 飞天诚信科技股份有限公司 File sharing method and file sharing system
CN103338185B (en) * 2013-05-31 2016-02-24 飞天诚信科技股份有限公司 A kind of method and system of file-sharing
CN104517045A (en) * 2013-09-26 2015-04-15 上海中移通信技术工程有限公司 Method for creating protected digital file
CN104517045B (en) * 2013-09-26 2017-10-03 上海中移通信技术工程有限公司 Digital document guard method and system
CN103761461A (en) * 2014-02-20 2014-04-30 联想(北京)有限公司 Control method, control device, processor of electronic equipment and electronic equipment
CN109508518A (en) * 2017-09-15 2019-03-22 北京握奇智能科技有限公司 A kind of document handling method, system and file decryption equipment
CN112927053A (en) * 2021-03-31 2021-06-08 掌阅科技股份有限公司 Book reading right processing method, computing device and computer storage medium
CN112927053B (en) * 2021-03-31 2022-02-22 掌阅科技股份有限公司 Book reading right processing method, computing device and computer storage medium

Also Published As

Publication number Publication date
CN102222195B (en) 2014-03-26

Similar Documents

Publication Publication Date Title
CN101272237B (en) Method and system for automatically generating and filling login information
US8572392B2 (en) Access authentication method, information processing unit, and computer product
US20040039932A1 (en) Apparatus, system and method for securing digital documents in a digital appliance
US20060075259A1 (en) Method and system to generate a session key for a trusted channel within a computer system
US20050044377A1 (en) Method of authenticating user access to network stations
CN104662870A (en) Data security management system
JP2004295271A (en) Card and pass code generator
CN101989988A (en) Copyright protection system and method of ebook online reading
JP2006190175A (en) Rfid-use type authentication control system, authentication control method and authentication control program
JP4833745B2 (en) Data protection method for sensor node, computer system for distributing sensor node, and sensor node
CN109598104A (en) Soft ware authorization based on timestamp and secret authentication file protects system and method
CN102222195B (en) E-book reading method and system
JP2007280393A (en) Device and method for controlling computer login
Chen et al. A novel DRM scheme for accommodating expectations of personal use
JP4135151B2 (en) Method and system for single sign-on using RFID
CN101373503B (en) Printing control method and system based on printing according to necessaries and printing client terminal
CN104010306A (en) Mobile device user identity authentication system and method
CN102855419A (en) Copyright protection method for data files of intelligent terminals
KR100720738B1 (en) A method for providing secrecy, authentication and integrity of information to RFID tag
JP2008131450A (en) Private network connection method
JPWO2011058629A1 (en) Information management system
TWI640887B (en) User verification system implemented along with a mobile device and method thereof
JP2006323691A (en) Authentication device, registration device, registration method and authentication method
KR101619290B1 (en) Method and ic tag for prevention of forgery of documents
JP4811123B2 (en) Access authentication method and access authentication system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20140326