CN106611108A - Compact disc copyright protection method - Google Patents

Compact disc copyright protection method Download PDF

Info

Publication number
CN106611108A
CN106611108A CN201611092781.7A CN201611092781A CN106611108A CN 106611108 A CN106611108 A CN 106611108A CN 201611092781 A CN201611092781 A CN 201611092781A CN 106611108 A CN106611108 A CN 106611108A
Authority
CN
China
Prior art keywords
dynamic
verification code
token
dynamic verification
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611092781.7A
Other languages
Chinese (zh)
Other versions
CN106611108B (en
Inventor
于晴
王振伟
徐富豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING TIP TECHNOLOGY CO Ltd
Original Assignee
BEIJING TIP TECHNOLOGY CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING TIP TECHNOLOGY CO Ltd filed Critical BEIJING TIP TECHNOLOGY CO Ltd
Priority to CN201611092781.7A priority Critical patent/CN106611108B/en
Publication of CN106611108A publication Critical patent/CN106611108A/en
Application granted granted Critical
Publication of CN106611108B publication Critical patent/CN106611108B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)
  • Optical Recording Or Reproduction (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a compact disc copyright protection method, relating to the field of computer software. The method comprises the following steps: when a computer reads or records a compact disc, running an authentication program in the compact disc by the computer; firstly reading the first verification information recorded in a primary description volume of the compact disc by using the authentication program, and verifying the first verification information; after successfully verifying the first verification information, continuously reading the second verification information recorded in the primary description volume of the compact disc by using the authentication program, and generating a dynamic verification code of the compact disc according to the second verification information; generating a dynamic verification code of a dynamic token by starting the dynamic token which is issued with the compact disc in a matching mode within the corresponding time; and matching the dynamic verification code of the compact disc with the dynamic verification code of the dynamic token, and continuously running the compact disc or ejecting the compact disc according to the matching result. According to the compact disc copyright protection method disclosed by the invention, the copyright protection of the compact disc can be achieved by using the verification information written in the head of a file system and the non-contact dynamic token.

Description

A kind of CD copy-right protection method
Technical field
The present invention relates to computer software fields, more particularly to a kind of CD copy-right protection method.
Background technology
Common optical disc copy technology includes Cactus Data Shiedld, DiscGuard, Dummyfiles etc..Due to Protection mechanism defect itself, still easily causes CD and is successfully replicated, and the copy of CD can by secondary duplication, so as to Cause file, software arbitrarily to use, do not utilize the protection of intellectual property.
For example, Cactus Data Shiedld are a kind of music protection CD technologies, and it passes through to add in an optical disc electronics certainly It is dynamic to record sector to disturb CD-ROM in the operation of reproduction process.But this technology is compatible with CD technologies (or CDROM CD writers) Property is not good, therefore is not widely used.
And such as DiscGuard, its is right:Carried out using the execution file on CD encrypted, added during CD-ROM tablettings Enter digital signature and be mapped in the sequence of software, software is compareed serial number with digital signature when performing. When DiscGuard is copied using CD writer, still can be replicated.
The content of the invention
A kind of CD copy-right protection method is provided according to embodiments of the present invention, and solving prior art cannot protect CD copyright Problem.
A kind of CD copy-right protection method for providing according to embodiments of the present invention, including:
Authentication procedure when computer reads or imprints CDs, in the computer operation CD;
Using the authentication procedure, first checking information of the record in the main description volume of the CD is read first, and First checking information is verified;
After being proved to be successful to first checking information, using the authentication procedure, continue to read record in the light The second checking information in the main description volume of disk, and according to second checking information, generate the dynamic verification code of the CD;
By starting the dynamic token that distribution is matched with the CD within the corresponding time, the dynamic of the dynamic token is generated State identifying code;
The dynamic verification code of the dynamic verification code of the CD and the dynamic token is matched, and according to matching knot Really, continue to run with the CD or exit the CD.
Preferably, first checking information and second checking information are stored in the routing table ground of the main description volume Before location.
Preferably, first checking information is self-defining checking cipher-text information, and described enters to the first checking information Row checking includes:
The authentication procedure is decrypted process to the self-defining checking cipher-text information, according to decrypted result, it is determined that Whether it is proved to be successful.
Preferably, it is described according to decrypted result, it is determined whether be proved to be successful including:
If the authentication procedure is by the self-defining checking cipher-text information decryption, being verified letter in plain text Cease, and resulting checking cleartext information is matched with the checking information for pre-setting, it is determined that it is proved to be successful, otherwise determines checking Failure.
Preferably, second checking information includes the token code of dynamic token, and the dynamic verification code of the CD includes First dynamic verification code, described according to second checking information, generating the dynamic verification code of the CD includes:
First current time of the token code of the dynamic token and the computer is input into into pseudo-random algorithm, is led to Pseudorandom calculating is crossed, the first dynamic verification code of the CD is obtained.
Preferably, the dynamic verification code of the dynamic token includes the first dynamic verification code of the dynamic token, described By starting the dynamic token that distribution is matched with the CD within the corresponding time, generate the dynamic authentication of the dynamic token The step of code, includes:
After the dynamic token starts, the token code of itself and the second current time are input into into pseudo-random algorithm, are led to Pseudorandom calculating is crossed, the first dynamic verification code of the dynamic token is obtained;
Wherein, the second current time is in the time window centered on the first current time.
Preferably, the described dynamic verification code by the dynamic verification code of the CD and the dynamic token is carried out Match somebody with somebody, and according to matching result, continuing to run with the CD or exiting the CD includes:
First dynamic verification code of the CD is matched with the first dynamic verification code of the dynamic token, if With the CD is then continued to run with, the CD is otherwise exited.
Preferably, also including the key of dynamic token, the dynamic verification code of the CD includes second checking information Second dynamic verification code, described according to second checking information, generating the dynamic verification code of the CD also includes:
3rd current time of the key of the dynamic token and the computer is input into into pseudo-random algorithm, is passed through Pseudorandom is calculated, and obtains the second dynamic verification code of the CD.
Preferably, the dynamic verification code of the dynamic token includes the second dynamic verification code of the dynamic token, described By starting the dynamic token that distribution is matched with the CD within the corresponding time, generate the dynamic authentication of the dynamic token The step of code, also includes:
The dynamic token is input into the key of itself and the 4th current time into pseudo-random algorithm, by pseudorandom meter Calculate, obtain the second dynamic verification code of the dynamic token;
Wherein, the 4th current time is in the time window centered on the 3rd current time.
Preferably, the described dynamic verification code by the dynamic verification code of the CD and the dynamic token is carried out Match somebody with somebody, and according to matching result, continuing to run with the CD or exiting the CD also includes:
Second dynamic verification code of the CD is matched with the second dynamic verification code of the dynamic token, if With the CD is then continued to run with, the CD is otherwise exited.
Technical scheme provided in an embodiment of the present invention has the advantages that:
The embodiment of the present invention from the file system of bottom optical file, using the feature of file system, in file system The head write verification information of system, with reference to noncontact dynamic token technology, so as to realize the protection of CD copyright.
Description of the drawings
Fig. 1 is CD copy-right protection method block diagram provided in an embodiment of the present invention;
Fig. 2 is ISO9660 structure charts provided in an embodiment of the present invention;
Fig. 3 is the contrast schematic diagram of the file header with embodiment of the present invention file header of existing ISO9660 files;
Fig. 4 is three layers of checking information mark figure of the file header of ISO9660 files provided in an embodiment of the present invention;
Fig. 5 is three layers of authentication mechanism flow chart provided in an embodiment of the present invention.
Specific embodiment
Below in conjunction with accompanying drawing to a preferred embodiment of the present invention will be described in detail, it will be appreciated that described below is excellent Select embodiment to be merely to illustrate and explain the present invention, be not intended to limit the present invention.
Fig. 1 is CD copy-right protection method block diagram provided in an embodiment of the present invention, as shown in figure 1, step includes:
Step S101:Disk distribution mechanism is matched CD and dynamic token, and by pairing after the CD and The dynamic token is issued together.
Step S102:When computer reads, runs or imprint CDs, the computer runs first the certification in CD Program.
After CD insertion computer CD ROM, computer operating system opens CD by analytical disc file system, and obtains To the authentication procedure for having bound together and optical disc software to be protected.If computer needs that optical disc software is carried out the behaviour such as to run Make, then first have to be verified using authentication procedure, to determine that user has the lawful authority for operating the optical disc software.
Step S103:Using the authentication procedure, first recorded in the main description volume of the CD is read first and is tested Card information, and first checking information is verified.
Wherein, first checking information is self-defining checking cipher-text information, is stored in the path of the main description volume Before table address.
Computer is decrypted process using the authentication procedure to the self-defining checking cipher-text information, if being tested Cleartext information is demonstrate,proved, and resulting checking cleartext information is matched with the checking information for pre-setting, it is determined that it is proved to be successful;If nothing Method successful decryption, or the checking cleartext information for obtaining and the checking information mismatch for pre-setting, it is determined that authentication failed.
If to the first checking information authentication failed, illustrating that user does not operate the authority of the CD, this computer-chronograph is moved back Go out the CD.
Step S104:After first checking information is proved to be successful, using the authentication procedure, continue to read record The second checking information in the main description volume of the CD, and according to second checking information, generate the dynamic of the CD State identifying code.
Second checking information includes the token code of dynamic token and the key of dynamic token, is stored in the main description Before the path table address of volume.
The dynamic verification code of the CD includes first dynamic verification code and the second dynamic verification code of CD.Wherein, institute The first dynamic verification code for stating CD is worked as the first of the token code of the dynamic token and the computer by authentication procedure The front time is input into pseudo-random algorithm, obtained from carrying out pseudorandom calculating.Second dynamic verification code of the CD is by recognizing Card program is input into the 3rd current time of the key of the dynamic token and the computer to pseudo-random algorithm, carry out it is pseudo- with Obtained from machine is calculated.
Step S105:By starting the dynamic token that distribution is matched with the CD within the corresponding time, generate described dynamic The dynamic verification code of state token.
The dynamic verification code of the dynamic token includes that first dynamic verification code and the second dynamic of the dynamic token is tested Card code.Wherein, the first dynamic verification code of the dynamic token be by dynamic token by the token code of itself and second it is current when Between be input into pseudo-random algorithm, obtained from carrying out pseudorandom calculating.Second dynamic verification code of the dynamic token is by moving State token by it is described itself key and the 4th current time be input into pseudo-random algorithm, obtained from carrying out pseudorandom calculating.
The least unit of above-mentioned first current time, the second current time, the 3rd current time and the 4th current time is Minute, so as to ensure that the first current time and the second current time are the same time as far as possible, the 3rd current time and the 4th work as The front time is the same time.The embodiment of the present invention can arrange the time window centered on the first current time, time window length It is optional, such as 30s, 40s, 50s, 1 minute, the second current time falls in the time window.Likewise it is possible to arrange with Time window centered on three current times, time window length is optional, such as 30s, 40s, 50s, 1 minute, the 4th current time falls In the time window.
Step S106:The dynamic verification code of the dynamic verification code of the CD and the dynamic token is matched, and According to matching result, continue to run with the CD or exit the CD.
First dynamic verification code of the CD is matched with the first dynamic verification code of the dynamic token, if not The CD is exited in matching, is continued to run with if matching, by the second dynamic verification code of the CD and the dynamic token Second dynamic verification code is matched, and if mismatching the CD is exited, and if matching the optical disc software is continued to run with.
For the second checking information, can be being verified using following two modes:
1. authentication procedure reads the token code of dynamic token and the key of dynamic token simultaneously, and according to the order of dynamic token Board code and key, current time (i.e. the first current time and the second current time are the same time), while generating the of CD One dynamic verification code and the second dynamic verification code.Similarly, after dynamic token starts, dynamic token is according to its token code and close Key, current time (i.e. the 3rd current time and the 4th current time are the same time), while generate dynamic token first moves State identifying code and the second dynamic verification code.Then the first dynamic verification code of CD and dynamic token, and matching are matched respectively Two dynamic verification codes of CD and dynamic token, if matching, are proved to be successful, and can now run optical disc software, otherwise test Card failure, now ejects CD.
2. authentication procedure reads first the token code of dynamic token, and (i.e. first works as according to the token code and current time The front time) generate CD the first dynamic verification code.After dynamic token starts, according to its token code, current time, (i.e. second works as The front time), generate the first dynamic verification code of dynamic token.If the first dynamic verification code matching of CD and dynamic token, Authentication procedure continues to read the key of dynamic token, and (lags behind the first current time according to the key and current time 3rd current time) generate CD the second dynamic verification code.Dynamic token (is lagged behind according to its token code and current time 4th current time of the second current time), generate the second dynamic verification code of dynamic token.If the of CD and dynamic token Two dynamic verification codes are matched, then be proved to be successful, and can now run optical disc software, otherwise authentication failed, are now ejected CD.
It will appreciated by the skilled person that realizing that all or part of step in above-described embodiment method can be Related hardware is instructed to complete by program, described program can be stored in computer read/write memory medium, should Upon execution, including step S101 is to step S104 for program.Wherein, described storage medium can be ROM/RAM, magnetic disc, light Disk etc..
The embodiment of the present invention effectively prevents the copy of optical disc software by self-defined checking information and noncontact dynamic token And imprinting.
Fig. 2 is ISO9660 structure charts provided in an embodiment of the present invention, as shown in Fig. 2 the structure of general optical file, can To be divided into three main directory entries, successively based on description volume (Primary Volume Descriptor), routing table (Path Table), bibliographic structure table (Directory Structure).The relation of three is illustrated in fig. 2 shown below, and indicates in main description volume The actual storage address of routing table and bibliographic structure table.The address in each path is housed in routing table, in bibliographic structure In table, the bibliographic structure of whole ISO9660 file system is constructed, and indicate the storage address of each file.Generally imprinting/reading The groundwork of the software of CD be exactly required according to the file system of ISO9660 constructing/parse directory entry.
The situation that as seen from Figure 2 file is deposited, in ISO9660 file system, starting position (address:0x0000- 0x8000) deposit content not require.Require to start to deposit Path Table from 0x8000 in the official document of ISO9660 Address.And on ordinary meaning open CD operation, be because computer operating system read software parsed ISO9660 files The structure of system, finds the store path of file, so as to general terminal use can be immediately seen CD content.And opening CD, Duplication paste operation is carried out, is started from the actual storage path of file.Though this mode reproducible CD content, not The structure of reproducible compact disk file system.General optical disc copy technology, typically carries out the copy of image file, i.e., directly do The backup of whole file system.
In order to realize preventing the copy of CD content and compact disc image files, head of the embodiment of the present invention in file system Add the information of oneself at the 0x0000 of address, in conjunction with dynamic token software is protected.
Fig. 3 is the contrast schematic diagram of the file header with embodiment of the present invention file header of existing ISO9660 files, such as Fig. 3 institutes Show, A show the file header of existing common ISO9660 files, typically automatically write 0x00, and the embodiment of the present invention is transformed ISO9660 file system in, add the information of oneself in top of file, form the file header of self-defined ISO9660 files.
Fig. 4 is three layers of checking information (i.e. self-defined protection of the file header of ISO9660 files provided in an embodiment of the present invention Information) mark figure, as shown in figure 4, the information for being indicated includes:The part A that user's collimation mark is known represents that self-defining checking is close Literary information (i.e. the first checking information), the part B identified using underscore is the token number of dynamic token, is identified using angle brackets C portion be the contactless dynamic token supporting with CD key, the token number and key of dynamic token are above-mentioned Two checking informations.
Dynamic token technology is that one kind allows user cipher to be continually changing according to the time, the skill that each user is used only once Art.It includes that specialized hardware, built-in power, password generate chip and display screen, wherein, password generate chip run it is special close Code algorithm, generates current password and shows on a display screen according to current time.Certification end (the calculating read or imprint CDs Machine) current valid password is calculated using identical algorithm.Only need to when user uses current close by what is shown on dynamic token Code is input in computer, you can realize authentication.Dynamic token has built-in unique seed, and (i.e. dynamic token is close Key), unique seed and current time generate password by pseudo-random algorithm, password change per minute once, Er Qieshi Disposal password, i.e. password use rear failure, it is impossible to reuse.
That is, the embodiment of the present invention ensures the copyright of optical disc software using three layers of defense system.Fig. 5 is this Three layers of authentication mechanism flow chart that bright embodiment is provided, as shown in figure 5, specifically perform flow process including:Program in CD is opened When beginning to run, authentication procedure is performed, authentication procedure reads first the information (part A information in Fig. 4) of the first address of CD, goes forward side by side Row decryption, if part A information is incorrect, program is directly exited;If part A information matches, program reads dynamic token sequence Row number (part B information in Fig. 4), authentication procedure is combined part B information with current time, generates identifying code Y1, in dynamic order Inside board, coupling system time and the sequence number information of oneself generate identifying code Y2, if Y1 is differed with Y2, program is exited; If Y1 is identical with Y2, this dynamic token and this CD are matched, so as to ensure the order of a disk one.After part B Information Authentication success, recognize Dynamic token key (C portion information in Fig. 4) in CD is then combined present system time by card program, generates identifying code Y3, dynamic token generates identifying code Y4 also in relation with token internal key and system time, and Y4 is included in the aobvious of dynamic token In display screen, user needs to be input into Y4 in computer terminal, and authentication procedure compares Y3 with Y4, if identical, software just can be transported OK.
The CD burning of embodiment 1.
Disk distribution mechanism is matched CD and dynamic token, and by pairing after the CD and it is described dynamic order Board is issued together.When imprinting CDs, disk distribution agency qualification program reads first the main description volume recorded in the CD In the first checking information, and first checking information is verified, if the first checking information authentication failed, exits light Disk;If the first checking information is proved to be successful, continue the order for reading dynamic token of the record in the main description volume of the CD Board code, and by the dynamic verification code generated according to the token code and current time and dynamic token according to its token code and it is current when Between generate dynamic verification code matched, if mismatch, eject CD;If matching, continue to read record in the light The key of the dynamic token in the main description volume of disk, and by according to the key and the dynamic verification code of current time generation and dynamic Token is matched according to the dynamic verification code that its seed and current time are generated, if mismatching, is ejected CD, if matching, Then carry out CD burning.
The embodiment of the present invention is initial at zero-address in compact disc image files ISO9660 file system, write protection information (i.e. the first checking information and the second checking information), while using dynamic token technology, optical file and dynamic token are carried out Binding, so as to effectively ensure the protection of optical disc software copyright.
The optical disc software of embodiment 2. runs
Disk distribution mechanism is matched CD and dynamic token, and by pairing after the CD and it is described dynamic order Board is issued together, wherein, authentication procedure is bound with optical disc software to be protected, and an executable program is shown as, preserve In an optical disc.During the software of the CD that insertion CD-ROM drive is read in computer, computer operating system is literary by parsing ISO9660 Part form, opens CD, and makes to show the executable program operation in CD.Authentication procedure is run first, and user is weighed Limit reads or replicates the authority of software and verified.Specifically, authentication procedure reads first record and retouches in the master of the CD The first checking information in volume is stated, and first checking information is verified, after the first checking information is proved to be successful, certification Program continues the token code for reading dynamic token of the record in the main description volume of the CD, and according to the token code and will work as The dynamic verification code that front time generates and dynamic token are carried out according to the dynamic verification code that its token code and current time are generated Match somebody with somebody, after the match is successful, authentication procedure continues the key for reading dynamic token of the record in the main description volume of the CD, and will According to the dynamic that the dynamic verification code that the key and current time are generated is generated with dynamic token according to its seed and current time Identifying code is matched, if matching, allows the operation optical disc software.That is, only three partial informations are verified By when, illustrate user have to optical disc software operation authority.
The optical disc software of embodiment 3. is replicated
In the present embodiment, authentication procedure is bound with optical disc software to be protected, and be shown as an executable program, protected Deposit in an optical disc.Because authentication procedure and optical disc software to be protected have been combined into an executable program, therefore the light for replicating Authentication procedure is certainly existed in disk content.When running the optical disc software of the duplication, authentication procedure is still run first, if cannot Find aforementioned A, B, C portion information or A, B, C portion information errors, then cannot runs software, so as to realize to optical disc software Protection.
In sum, embodiments of the invention have following technique effect:
The embodiment of the present invention utilizes ISO9660 file formats, adds three layers of authentication mechanism with reference to dynamic token, so as to effective The intellectual property of protection CD.
Although being described in detail to the present invention above, the invention is not restricted to this, those skilled in the art of the present technique Various modifications can be carried out with principle of the invention.Therefore, all modifications made according to the principle of the invention, all should be understood to Fall into protection scope of the present invention.

Claims (10)

1. a kind of CD copy-right protection method, it is characterised in that include:
Authentication procedure when computer reads or imprints CDs, in the computer operation CD;
Using the authentication procedure, first checking information of the record in the main description volume of the CD is read first, and to institute State the first checking information to be verified;
After being proved to be successful to first checking information, using the authentication procedure, continue to read record in the CD The second checking information in main description volume, and according to second checking information, generate the dynamic verification code of the CD;
By starting the dynamic token that distribution is matched with the CD within the corresponding time, the dynamic for generating the dynamic token is tested Card code;
The dynamic verification code of the dynamic verification code of the CD and the dynamic token is matched, and according to matching result, Continue to run with the CD or exit the CD.
2. method according to claim 1, it is characterised in that first checking information and second checking information are deposited Before being placed on the path table address of the main description volume.
3. method according to claim 1, it is characterised in that first checking information is self-defining checking ciphertext letter Breath, it is described checking is carried out to the first checking information to include:
The authentication procedure is decrypted process to the self-defining checking cipher-text information, according to decrypted result, it is determined whether It is proved to be successful.
4. method according to claim 3, it is characterised in that described according to decrypted result, it is determined whether to be proved to be successful Including:
If the authentication procedure is by the self-defining checking cipher-text information decryption, being verified cleartext information, and Resulting checking cleartext information is matched with the checking information for pre-setting, it is determined that is proved to be successful, is otherwise determined authentication failed.
5. the method according to claim 1-4 any one, it is characterised in that second checking information includes dynamic order The token code of board, the dynamic verification code of the CD includes the first dynamic verification code, described according to second checking information, Generating the dynamic verification code of the CD includes:
First current time of the token code of the dynamic token and the computer is input into into pseudo-random algorithm, by puppet It is random to calculate, obtain the first dynamic verification code of the CD.
6. method according to claim 5, it is characterised in that the dynamic verification code of the dynamic token includes the dynamic First dynamic verification code of token, the described dynamic token by starting within the corresponding time with CD pairing distribution, The step of dynamic verification code for generating the dynamic token, includes:
After the dynamic token starts, the token code of itself and the second current time are input into into pseudo-random algorithm, by puppet It is random to calculate, obtain the first dynamic verification code of the dynamic token;
Wherein, the second current time is in the time window centered on the first current time.
7. method according to claim 6, it is characterised in that described by the dynamic verification code of the CD and described dynamic The dynamic verification code of state token is matched, and according to matching result, continuing to run with the CD or exiting the CD includes:
First dynamic verification code of the CD is matched with the first dynamic verification code of the dynamic token, if matching The CD is continued to run with, the CD is otherwise exited.
8. method according to claim 7, it is characterised in that second checking information is also including the close of dynamic token Key, the dynamic verification code of the CD includes the second dynamic verification code, described according to second checking information, generates described The dynamic verification code of CD also includes:
3rd current time of the key of the dynamic token and the computer is input into into pseudo-random algorithm, by puppet with Machine is calculated, and obtains the second dynamic verification code of the CD.
9. method according to claim 8, it is characterised in that the dynamic verification code of the dynamic token includes the dynamic Second dynamic verification code of token, the described dynamic token by starting within the corresponding time with CD pairing distribution, The step of dynamic verification code for generating the dynamic token, also includes:
The dynamic token is input into the key of itself and the 4th current time into pseudo-random algorithm, is calculated by pseudorandom, Obtain the second dynamic verification code of the dynamic token;
Wherein, the 4th current time is in the time window centered on the 3rd current time.
10. method according to claim 9, it is characterised in that described by the dynamic verification code of the CD and described The dynamic verification code of dynamic token is matched, and according to matching result, is continued to run with the CD or exited the CD also Including:
Second dynamic verification code of the CD is matched with the second dynamic verification code of the dynamic token, if matching The CD is continued to run with, the CD is otherwise exited.
CN201611092781.7A 2016-12-02 2016-12-02 Optical disk copyright protection method Active CN106611108B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611092781.7A CN106611108B (en) 2016-12-02 2016-12-02 Optical disk copyright protection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611092781.7A CN106611108B (en) 2016-12-02 2016-12-02 Optical disk copyright protection method

Publications (2)

Publication Number Publication Date
CN106611108A true CN106611108A (en) 2017-05-03
CN106611108B CN106611108B (en) 2020-03-31

Family

ID=58636113

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611092781.7A Active CN106611108B (en) 2016-12-02 2016-12-02 Optical disk copyright protection method

Country Status (1)

Country Link
CN (1) CN106611108B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114155885A (en) * 2022-02-08 2022-03-08 成都统信软件技术有限公司 File encryption method, recording method, decryption method, device and computing equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101377804A (en) * 2008-09-28 2009-03-04 北京飞天诚信科技有限公司 Method and system for implementing start-up protection
CN101500232A (en) * 2009-03-13 2009-08-05 北京华大智宝电子***有限公司 Method and system for implementing dynamic identity authentication
CN101777983A (en) * 2010-01-13 2010-07-14 北京飞天诚信科技有限公司 Trading signature method, authentication server and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101377804A (en) * 2008-09-28 2009-03-04 北京飞天诚信科技有限公司 Method and system for implementing start-up protection
CN101500232A (en) * 2009-03-13 2009-08-05 北京华大智宝电子***有限公司 Method and system for implementing dynamic identity authentication
CN101777983A (en) * 2010-01-13 2010-07-14 北京飞天诚信科技有限公司 Trading signature method, authentication server and system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114155885A (en) * 2022-02-08 2022-03-08 成都统信软件技术有限公司 File encryption method, recording method, decryption method, device and computing equipment

Also Published As

Publication number Publication date
CN106611108B (en) 2020-03-31

Similar Documents

Publication Publication Date Title
US9686082B2 (en) Generating and processing an authentication certificate
US8447038B2 (en) Method and systems using identifier tags and authenticity certificates for detecting counterfeited or stolen brand objects
US8166566B2 (en) Controlling the downloading and recording of digital data
TWI244584B (en) Data processing system, data processing method, and program providing medium
EP1855281A2 (en) Apparatus for writing data to a medium
CN107341368A (en) Method and device for verifying valid time of license
CN106031086A (en) Method and system for creating and checking the validity of device certificates
JP2013255261A (en) Key mounting system
CN110363010A (en) A kind of safety startup of system method based on MPSoC chip
CN106611108A (en) Compact disc copyright protection method
JP4091139B2 (en) Data storage device and data storage method
CN113821446A (en) Test verification method and device for transaction system
JP2001195551A (en) Ic card reader and ic card system
EP1335363B1 (en) Valid medium management system
WO2007128418A1 (en) Apparatus for writing data to a medium
JP3868519B2 (en) Apparatus for creating encryption key setting information on information recording medium
EP0745925A2 (en) Encryption key
JP2002183706A (en) Card information protecting method
JPH08255232A (en) Personal identification system and method for managing password number for the system
JP4576809B2 (en) Information processing system and method, information processing device and method, playback device and method, program, and content recording medium
JP3843566B2 (en) User authentication apparatus and method
KR20230099460A (en) Hyperledger fabric-based blockchain ledger design system using graphic user interface
JP2022173697A (en) generator and management system
JP2006054048A (en) Device and method for storing data
JP2004348443A (en) Counterfeit preventing system and method, encryption device and method, decryption device and method, recording medium, software regenerating device, printer cartridge, and printer

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 100086 Beijing Haidian District Dijin Road 9 Courtyard 9 Building 4 Floor 101

Applicant after: Beijing Tip Technology Co ., Ltd.

Address before: 100192 Sixth Floor, B-2 Building, Dongsheng Science Park, Zhongguancun, 66 Xixiaokou Road, Haidian District, Beijing

Applicant before: Beijing Tip Technology Co ., Ltd.

GR01 Patent grant
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20170503

Assignee: CHINA TECHNOLOGY EXCHANGE Co.,Ltd.

Assignor: BEIJING TIP TECHNOLOGY Co.,Ltd.

Contract record no.: X2021980013104

Denomination of invention: An optical disc copyright protection method

Granted publication date: 20200331

License type: Exclusive License

Record date: 20211123

PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: An optical disc copyright protection method

Effective date of registration: 20211125

Granted publication date: 20200331

Pledgee: CHINA TECHNOLOGY EXCHANGE Co.,Ltd.

Pledgor: BEIJING TIP TECHNOLOGY Co.,Ltd.

Registration number: Y2021110000073