CN1343938A - Method and system for controlling lease of electronic file - Google Patents

Method and system for controlling lease of electronic file Download PDF

Info

Publication number
CN1343938A
CN1343938A CN 00128780 CN00128780A CN1343938A CN 1343938 A CN1343938 A CN 1343938A CN 00128780 CN00128780 CN 00128780 CN 00128780 A CN00128780 A CN 00128780A CN 1343938 A CN1343938 A CN 1343938A
Authority
CN
China
Prior art keywords
file
read
user
lease
reading
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 00128780
Other languages
Chinese (zh)
Inventor
邓智元
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
YOUSHUO INFORMATION SCIENCE AND TECHNOLOGY Co Ltd
Original Assignee
YOUSHUO INFORMATION SCIENCE AND TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by YOUSHUO INFORMATION SCIENCE AND TECHNOLOGY Co Ltd filed Critical YOUSHUO INFORMATION SCIENCE AND TECHNOLOGY Co Ltd
Priority to CN 00128780 priority Critical patent/CN1343938A/en
Publication of CN1343938A publication Critical patent/CN1343938A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A method and system for controlling the lease of electronic file is disclosed. The said system is composed of server and terminals. The said method includes loading a reading application to the terminals, setting up a fixed position to store an electronic file in the terminals, requesting a lease to the server by a terminal, transmitting the current time, predefined effective period and encrypted electronic file to the terminal by server, and reading the said file. Before reading, the current storing position is compared with the set-up fixed position. If matched, the file is decrypted. The current time is regularly compared with the predefined effective time. If time-out is found, the electronic file is cancelled.

Description

The method and the system thereof of the lease of control e-file
The invention provides a kind of method that is used in the network system with the lease of control e-file, particularly a kind of download from the Internet e-file to an electronic reading device read, when lease after promptly go the method for reading again.
Knowledge is propagated by the books or the magazine that are printed on the paper traditionally, after rising, broadcasting and TV accelerated the speed of knowledge dissemination, nowadays compunlcation and Internet is flourish, more with surprising rapidity knowledge and information is propagated into each corner in the world.Because the development of Internet technology creates many new business models, these new business models have a common characteristic, utilize the Internet to make business exactly, just the ecommerce of common name recently.For example, traditionally if buy books and must in person or ask someone to be bought after bookstore is sought, because the rise of Internet, as can allow the user search the on line books of wanting and the purchase that can directly place an order of network bookstores such as AMAZON.Though this makes the mode of buying books greatly simplify, yet this has an inconvenient part, is exactly the preservation of relevant books, and is in case books are bought to such an extent that the more more need enough spaces to be placed, also complicated more in the management simultaneously.
In view of this, the notion of " electronic reading device " is suggested to then in response to this kind needs, that is to say literal in the original books or picture digitizing, form e-book, as long as the consumer has a station terminal machine can connect online, add some specific program software, just can lease e-book or the file of wanting easily on line, and with pass under this e-book the consumer place terminating machine can the agreement rental period in read, can meet the terminating machine just so-called " electronic reading device " of this demand.An in view of this vast consumption market and desire to devote the operation of electronic bookstore and e-book of many Publishing Groups was once also arranged, yet, but do not cry out temporarily midway and stop because some supporting mechanism sets up as yet.In the reason one, be consumer's reading habit institute jejune worry in implicit market.That is to say, most of consumer still is accustomed to reading books from the form of Hard copy, want to promote to come the reading electronic book nationality must overthrow the inveteracy reading habit of consumer with " electronic reading device ", simultaneously also must be through the tediously long education and the process of adaptation.Yet another prior factor is, ability is scattered in cheap cost of reproduction again and easy propagation, and this makes the market of e-book face the serious threat that can't expand.
This serious threat comes to be engaged in dealer that e-book leases and to meet with some and have a headache and insoluble problem very much, for example: e-book can be easy to repeatedly copy the 3rd people that branch is given nontransaction both sides, perhaps, how to provide an effective supervision mechanism to make the rental period of agreement allow the user can't continue to read when expiring.Why facility is because it belongs to invisible electronic document to e-book, naturally transmit convenience and can save the space of a large amount of placements compared to the conventional book that actual body is arranged, yet, also just, it transmits conveniently because belonging to invisible electronic document, make the consumer legal lease reading after, but can unlawfully be copied arbitrarily and transmit and scatter and give other people.That is to say, if can't design the perfect e-book mechanism of exchange of a cover, effectively to prevent the situation of " the legal but illegal distribution of leasing ", be engaged in the e-book dealer and whenever lease out an e-book, just equal this e-book has been leased to every other consumer to a certain consumer; Simultaneously, after e-book is rented the user, the supplier of e-book rental services just can't supervise the situation that the user reads usually, if can't design perfect mechanism, the user is taken place possibly can alter the contract of leasing and the situation that still can continue to read after lease.If the problems referred to above can't effectively solve, in this case, the dealer can't keep rational profit, and the ecommerce of this pattern can't be survived naturally, this just e-book expand so far and the speed popularized not as the major reason of expection.Yet, e-book have meet with no paper at all environmental protection notion, efficient activity velocity of propagation fast, economization do not account for multiple advantages such as big quantity space, can save the resource of many preciousnesses, if can't be promoted, be the heavy losses of economic interests really for no other reason than that fail to solve the situation of above-mentioned " the legal but illegal distribution of leasing " and " lease still can continue to read later ".
Because the problems referred to above, fundamental purpose of the present invention is to provide a kind of being used in to carry out in the network system that e-book leases, can prevent the method for the illegal pirate of e-file, but refer to a kind of method of Internet download e-book to electronic reading device illegal copies that prevent to utilize especially, to address the above problem to other electronic reading devices.
Another object of the present invention is the mechanism that a timing is provided in an electronic reading device, makes after the lease that e-book plans, can guarantee to cancel automatically and can't continue to read, to address the above problem.
The simple declaration of accompanying drawing
Fig. 1 is the synoptic diagram of the network system of the lease of may command e-file of the present invention.
Fig. 2 is the functional block diagram of the server host of network system of the present invention.
Fig. 3 is the terminal function calcspar of network system of the present invention.
Fig. 4 is the method flow diagram of network system of the present invention when the server host end is leased e-file.
Fig. 5 A, Fig. 5 B, Fig. 5 C are the method flow diagram of network system of the present invention when terminating machine end reading electronic documents.
See also Fig. 1, Fig. 1 is the synoptic diagram of the network system 100 of the lease of may command e-file of the present invention.Network system 100 of the present invention includes a server host 102 can be via a firewall device 103 to connect Internet 104, and other has a plurality of users also can connect upward Internet 104 via terminating machine 106,108,110 separately.Firewall device 103 can be used to separate server 102 Internet 104 outside with it, it can be by the filtration of internet message package and stipulating of security strategy, allow some particular network serve and safe internet message, for example: the far-end login of process registration, Email, document transmission etc. can pass in and out firewall device 103, can not suffer illegal invasion and modification so that guarantee setting and information in the server host 102.Each terminating machine 106,108,110 can be people's desktop computer (desktop computer), notebook computer (notebookcomputer), PDA(Personal Digital Assistant) etc., if user's terminating machine be can connect online and transmitting digital information can be applicable to network system 100 of the present invention.
See also Fig. 2, Fig. 2 is the functional block diagram of the server host 102 of network system 100 of the present invention.Server host 102 comprises an interface module 210, one common program module 220, one encrypting modules, 250, one transaction processing and verification module 260, one databases 270, and one leases control center 280.
Server host 102 is connected with firewall device 103 via interface module 210, and carries out data transmission and exchange by firewall device 103 and Internet 104, and where necessary the data of different size is made suitable data-switching.Deposit the various common programs of server host 102 openings in the common program module 220, for user's free download to the terminating machine separately, wherein for example one through the reading application program that compiling, so that user's operation-interface of user's one login, download, reading electronic documents to be provided.250 of encrypting modules are to be used for carrying out the various actions of encrypting of needing, and for example: lease when finishing at file, e-file that encrypting module 250 can be bought the user and related data are encrypted so that follow-uply send the user to.Transaction processing and 260 of modules of verification are used for handling the matters relevant with user's order, and the source and the content of order are carried out necessary affirmation and verification work.270 of databases comprise and have two subdata bases at least: customer data base 272, electronic document data storehouse 276.Deposit title and relevant master data that the user is arranged to some extent in the customer data base 272.276 in electronic document data storehouse is to deposit the plaintext that will offer reader's e-file in the future, e-file can include e-book, E-News, electronic information, electronics report etc., leased and transmit as long as literal, figure or the form of information computerization can be able to be used as e-file, each this e-file then has the file sign indicating number of a uniqueness with convenient inquiry and the usefulness of filing.Lease control center 280 and then be and be used for the operation of Control Server main frame 102, and the control or the information flow direction of each module or database in the processing server main frame 102.
Please read Fig. 3, Fig. 3 is the functional block diagram of the terminating machine 106 of network system 100 of the present invention.With terminating machine 106 is example, the preferred embodiment of terminating machine 106 of the present invention can be individual desktop computer (PC) or PDA(Personal Digital Assistant), wherein comprise central processing unit 310, memory storage is as: storer 350 and hard disk drive 360, network interface card 320, input media such as keyboard 330, and output unit such as screen 340 etc.In order to carry out exchanges data with server host 102, terminating machine 106 must be stored to the hard disk drive 360 of terminating machine 106 from the reading application program 352 that the process compiling is downloaded in the common program module 220 or the Internet 104 of server host 102, read the operation interface that application program 352 provides user's one login, download, reading electronic documents, when the user wants to operate when reading application program 352 with the action of logining, download, reading, read application program 352 and promptly be written in the storer 350 and carried out by central processing unit 310.Read and comprise three program modules in the application program 352 at least: position detection module 354, time impression module 356 and rental period are checked module 358, add narration again after the function that relevant said procedure module is responsible for carrying out is held.Even for the different users, its needed reading application program 352 all is identical, and therefore reading application program 352 is to finish through compiling in advance, and can download arbitrarily for all users that need are free.
Do an explanation at method of the present invention now.The user must download earlier application program 352 on Internet 104 before leasing e-book or file to server host 102.After reading application program 352 is downloaded to terminating machine 106, can in hard disk drive 360, set a fixing memory location 370 (as: certain track or certain magnetic region), so that the e-file that passes in the future can be stored in this fixing memory location 370.And the position data 372 of this memory location 370 also can go on record for follow-up use when carrying out necessary verification action.The user can search and determine to lease a certain e-book and predetermined effect phase of leasing by reading application program 352 browse network bookstore or related web site in Internet 104 of terminating machine 106 afterwards.Lease can have two kinds of different modes, the one, to decide between the leasehold, for example say that the valid period of leasing e-book is one month, then the user can read the e-book of being leased arbitrarily in one month, yet this this e-book will cease to be in force automatically and can't go reading again after one month.Another kind of mode is that number decides when reading, number is 100 hours when for example saying the effective reading of leasing e-book, then can read the e-book of being leased arbitrarily under user's situation that number is no more than 100 hours when total the reading, will cease to be in force automatically and can't go reading again yet surpass after 100 hours this this e-book.
When leasing order and be sent to server host 102, the transaction processing of server host 102 and verification module 260 can be carried out necessary affirmation and verification work earlier, and inspect the user and send the content of leasing order, which e-book will comprises that what lease is? is lease to adopt the mode between the leasehold or the mode of number when reading? if take the mode between the leasehold, its lease during how long have? if the mode of number when taking to read, how long does number have during its reading of desiring to lease? after having determined to lease the content of order, lease control center 280 and can in electronic document data storehouse 276, access the plaintext that the user wants the e-book leased, afterwards with the present time, data encryption such as plaintext of number and e-book according to maybe can read between the leasehold that order contents determined the time and form corresponding ciphertext is sent to terminating machine 106 with this ciphertext via Internet 104 again.After the reading application program 352 of terminating machine 106 receives this ciphertext, ciphertext can be stored in original memory location of setting 370 in the hard disk drive 360, can decipher with person to be used in the future and be read.
That is to say, store position data 372, rental period data 374, time data 376 and e-file 378 in the memory location 370, rental period data 374 are to be used for illustrating that lease is to adopt the mode between the leasehold or the mode of number when reading, and the definite time limit or the length of number when reading between the leasehold, 376 of time datas are used for putting down in writing the transaction time at that time, and position data 372 then is to be used for writing down the definite memory location that above-mentioned data or e-file are stored in hard disk drive 360.Similarly, if the user also wants to lease other e-file 388, then read application program 352 and also can in hard disk drive 360, set another fixing memory location 380, so that relevant rental period data 384, time data 386 and e-file 388 can be stored in this fixing memory location 380, position data 382 then is to be used for writing down the definite memory location that above-mentioned data or e-file are stored in hard disk drive 360.All storage data in memory location 370,380 all are to store with the form of encrypting, and relatively, also must just can restore its original storage data through the program of deciphering when these data of acquisition.
See also Fig. 4, Fig. 4 is the method flow diagram of network system 100 of the present invention when server host 102 ends are leased e-file.Said method is expressed as follows the row step with process flow diagram 400:
Step 402: beginning;
Step 404: 104 download application program 352 to terminating machine 106 from the Internet;
Step 406: the reading application program 352 by terminating machine 106 is connected to network bookstore or server host 102 by Internet 104;
Step 408: the selected e-file of desiring to lease of user;
Step 410: the lease that is adopted by the selected desire of user is to adopt the mode between the leasehold or the mode of number when reading;
Step 412: the user provides the transaction related data to server host 102, as: credit card number, desire to lease the title of e-file or file sign indicating number, the mode etc. of employing lease;
Step 414: transaction processing and verification 260 pairs of transaction of module related data are investigated;
Step 416: under the control of leasing control center 280, data encryption such as plaintext of number and e-book with maybe can read between the leasehold of present time, agreement the time and form corresponding ciphertext;
Step 418: server host 102 is sent to terminating machine 106 with ciphertext;
Step 420: the reading application program 352 of terminating machine 106 is stored in original memory location of setting 370 in the hard disk drive 360 with ciphertext;
Step 422: finish.
And when the user wants the e-file of downloading read, whether read application program 352 is consistent with the previous memory location of noting 370 the present position of storing of contrast e-file earlier, therefore, position detection module 354 can be compared position data 372 with the position data of present memory location, purpose is in order to prevent that the content in the e-file from illegally being altered.That is to say, cause wherein original rental period data 374 of encrypting, time data 376 etc. to be modified even the ciphertext of e-file is cracked by the invador, but but be difficult to make the electronic document data after being modified to be stored in original storage location.Therefore, when the present position of storing of e-file and the previous memory location of noting inconsistent, represent that then data have suffered change, so the decryption acts of follow-up reply e-file 378 then stops and no longer carrying out, otherwise the present position of storing of e-file is consistent with the previous memory location of noting 372, represent that then data are not changed, e-file 378 can be decrypted to be reduced into expressly and to supply the user to read so read application program 352.
Because the user is leasing in the e-file, lease can select to adopt the mode between the leasehold or the mode of number when reading, therefore, whether the expired practice also has corresponding dual mode at the lease of judging e-file, and this part is to check that by the rental period of reading in the application program module 358 is calculated and judgement.When the user begins to read the e-file plaintext of process deciphering, read the 352 meeting opening entry times of application program, that is to say, reading rental period in the application program checks when module 358 can be read the user this this e-file total and counts addition record in the rental period of memory location 370 data 374, simultaneously, time impression module 356 in the reading application program 352 is in the process of user's reading electronic documents, present time data can be additional in the time data 376 of memory location 370, its objective is in order to allow rental period inspection module 358 that the foundation of a judgement is arranged when calculating or the judgement data relevant with time or rental period every a scheduled time slot (for example saying :) every ten minutes.Therefore, when each user began this this e-file read, the rental period checked that module 358 will arrive rental period data 374 and the time data 376 that inspections wherein write down in the memory location 370.
For example say: the user is leasing in the e-file, be to adopt the mode between the leasehold to lease e-file, and lease is one month, then when reading application program 352 when finding between users' leasehold near one month, can send an alert message and will expire between the leasehold, and after surpassing one month, this this e-file be ceased to be in force automatically and can't go reading again to notify the user.For example say again: the user is leasing in the e-file, be to adopt the mode of number when reading to lease e-file, and number is 100 hours during effective reading, when then number is near 100 hours when reading total reading of application program 352 discovery users, number will expire in the time of can sending an alert message and always read to notify the user, and after surpassing 100 hours this this e-file be ceased to be in force automatically and can't go reading again.
Time impression module 356 in the reading application program 352 is in the process of user's reading electronic documents, every a scheduled time slot present time data extra storage there is being another benefit in the practice of time data 376, can preventing that exactly the user is for time limit of prolonging this this e-file and can reading and alter time in the present computer privately.Because the user is leasing to server host 102 in the e-file, server host 102 will be with the e-file that the user desired to lease, lease at that time time with can be between the leasehold of effective reading or when reading data such as number encrypt, and be sent in the terminating machine 106 storage in the predetermined storage location 370, and each user is when reading to read application program 352 unlocking electronic files, rental period checks that module 358 meeting elder generations check the rental period data 374 of storage in the memory location 370, and check that date and time see in the present computer and whether surpassed the predetermined originally lease of this this e-file, or whether number expires when seeing total reading.Yet in order to prolong the time limit that this this e-file can be read, the time that the user takes to alter privately in the present computer possibly makes it in advance, to allow rental period inspection module 358 judge present date or times by accident and to continue to allow user's reading electronic documents.But, because time impression module 356 is will be with present time data extra storage in time data 376 every a scheduled time slot, therefore in case the rental period checks that module 358 captures last stored time data and present computer dates or the time when comparing wherein in time data 376, find that present computer dates or time are unexpectedly early than the time of last stored in time data 376, represent that then present computer dates or time suffered illegal the altering of user, also can stop action and not continue e-file is decoded so read application program 352, thereby the user just can't the normal reading e-file.
See also Fig. 5, Fig. 5 is the method flow diagram of network system of the present invention when terminating machine end reading electronic documents.Said method is expressed as follows step with process flow diagram 500:
Step 502: beginning;
Step 504: the user opens terminating machine 106 and reads certain a specific e-file (E) to read application program 352;
Step 506: read application program 352 to the 370 pairs of storages in corresponding memory location data decryption wherein;
Step 508: position detection module 354 obtains position data (P) 372 wherein;
Step 510: position detection module 354 obtains the position data (Pc) of present memory location 370;
Is step 512: the position data (Pc) of memory location 370 consistent with the position data (P) 372 of deciphering gained at present? be, to step 516; Not, to step 514;
Step 514: data are changed, read application program 352 and stop subsequent action; To step 548;
Step 516: time impression module 356 will be at present by obtained date of terminating machine (Dc) and time (Tc) extra storage in time data (T) 376;
Step 518: is date (Dc) that time impression module 356 deposits in more at present and time (Tc) early than the date (Dp) and the time (Tp) that once deposit in before in the time data (T) 376? be, to step 520; Not, to step 522;
Step 520: the date or time of terminating machine is altered, reads application program 352 and stops subsequent action; To step 548;
Step 522: the rental period checks which kind of lease is module 358 inspection rental period data (R) 374 to determine to adopt;
Is step 524: lease a mode or count mode when reading between the leasehold? adopt between the leasehold, to step 526; Adopt number when reading, to step 532;
Step 526: will expire between the leasehold of rental period inspection module 358 these e-files of inspection? be, to step 528; Not, to step 538;
Step 528: the demonstration alert message notifies the user to expire between the leasehold;
Step 530: read application program 352 and stop subsequent action; To step 548;
Does step 532: the rental period check whether number expires when the reading of module 358 these e-files of inspection is total? be, to step 534; Not, to step 538;
Step 534: show that alert message notifies the user to read that number expires when total;
Step 536: read application program 352 and stop subsequent action; To step 548;
Step 538: read 378 deciphering of 352 pairs of e-files of application program;
Step 540: the user utilizes the e-file of reading after application program 352 is read deciphering;
Step 542: time impression module 356 was incited somebody to action present date obtained by terminating machine and time extra storage in time data 376 every ten minutes;
Does step 544: the rental period check that module 358 checks between the leaseholds or read whether number expires when total? be, to step 548; Not, to step 546;
Does step 546: the user continue to read? be, to step 540; Not, to step 548
Step 548: finish.
Compared with prior art, the advantage of network system 100 of the present invention is:
One, the needed reading operating platform of different users or terminating machine all is identical.Because all users carry out the program that file is leased via reading application program 352 with server host 102, read application program 352 simultaneously and become a reading operating platform, as user during at reading electronic documents, can be by reading the item that application program 352 is carried out various inspections and affirmation, therefore read application program 352 and can finish through compiling in advance and supply user's free download or be copied on any machine.Since one of purpose of network system of the present invention be to prevent when e-file from promoting the but origin of an incident of the resistance that may cause, just prevent the illegal distribution of e-file, and do not lie in the distribution that prevents to read application program 352 itself, simultaneously since the present invention prevent from that the mechanism of e-file illegal distribution is main and do not lie in to read application program 352 itself, therefore, read application program 352 via a large amount of download of user, copy or distribution not only can not influence purpose of the present invention, the notion that helps on the contrary to promote e-file is given the user, makes the use of e-file can quicken to popularize.
Two, the position detection module 354 in the reading application program 352 can effectively prevent the situation of " the legal but illegal distribution of leasing ".Because when the user wants to read certain a e-file 378, position detection module 354 can be found out the position data of corresponding memory location 370 earlier, and access the position data of before being noted 372, compare then to check whether both are consistent, even the data in the memory location 370 suffer invador's pirate to other machines for whole part, but be difficult to make the electronic document data that copied by money can also be stored in the memory location that position data 372 is write down, therefore, when the invador wants when other machines is read this part e-file, position detection module 354 also can be found memory location that the present position of storing of this part e-file and previous position data 372 note and not meet and refuse to carry out subsequent action, even invador's pirate e-file 378 also can't be read, therefore also just can prevent the situation of " but illegal distribution is borrowed in legal resistance ".
Three, the position detection module 354 of reading in the application program 352 can effectively prevent the situation of " tenancy agreement suffers illegal change afterwards ".Because when the user wants to read certain a e-file 378, position detection module 354 can be found out the position data of corresponding memory location 370 earlier, and access the position data of before being noted 372, compare then to check whether both are consistent, therefore, cause the content of tenancy agreements such as wherein original rental period data 374 of encrypting, time data 376 to be modified even the ciphertext of e-file is cracked by the invador, but but be difficult to make the electronic document data after being modified to be stored in original memory location 370.Utilize this method, position detection module 354 also can be found memory location that the present position of storing of this part e-file and previous position data 372 note and not meet and refuse to carry out subsequent action, even the invador has illegally changed the content of tenancy agreement and also can't read, therefore also just can prevent the situation of " tenancy agreement suffers illegal change afterwards ".
Four, the time impression module 356 of reading in the application program 352 checks that with the rental period module 358 can effectively prevent the situation of " illegally changing machine time to scheme to prolong lease ".Because time impression module 356 is in the process of user's reading electronic documents, to just can be in time data 376 with present date, time extra storage every a scheduled time slot.When each user reads to read application program 352 unlocking electronic files, rental period check module 358 just can in time data 376, capture last stored wherein time data and present computer dates or the time compare, if the rental period is checked module 358 and finds that present computer dates or time are unexpectedly early than the time of last stored in time data 376, represent that then present computer dates or time suffered illegal the altering of user, also can stop action so read application program 352, also can't reading electronic documents even the user illegally changes machine time, therefore also just can prevent the situation of " illegally changing machine time " to scheme the prolongation lease.
Five, the data of being stored in the memory location 370 are to store with encrypted form, can avoid the careless change of user content wherein to cause can't normal reading, also can lower other people and check and learn wherein content, can further safeguard user's the right of privacy in illegal mode.
In sum, network system of the present invention has proposed a kind of effective mechanism, the situation that prevents " the legal but illegal distribution of leasing ", " tenancy agreement suffers illegal change afterwards ", " illegally changing machine time to scheme to prolong lease " etc. takes place, make the dealer of e-file be ready to devote in the middle of the ranks that electronic file leases, therefore make multiple advantages such as the feature of environmental protection, efficiency of e-file, propagated, economy can be the whole people and share because of keeping rational profit.
The above only is preferred embodiment of the present invention, and all equalizations of doing according to claim of the present invention change and modify, and all should belong to covering scope of the present invention.

Claims (12)

1. method that is used in the lease of may command e-file in the network system, this network system includes a server host can be via an Internet to be connected with a plurality of terminating machines, one terminating machine can propose the requirement of leasing an e-file via this Internet to this server host, so that in the lease of an agreement, read this e-file, this server host then can be sent to this e-file in one memory storage of this terminating machine and store via this Internet, this method includes the following step:
The user is written into one and reads application program in this terminating machine, and this readings application program is also set the e-file of a fixing memory location with biography under being used for storing in this memory storage;
When this terminating machine when this server host proposes to lease requiring of an e-file, this server host can be with the plain text encryption of present time, effect phase that this is leased and this e-file and is formed corresponding ciphertext, and this ciphertext is sent to this terminating machine via this Internet, in the memory location that is stored in this memory storage, and the data recording of this memory location got off;
When user's desire is read this e-file, whether this reading application program is consistent with the previous memory location of noting the present position of storing of this e-file of contrast earlier, and is that corresponding plaintext is read for the user with the decrypt ciphertext of this e-file when meeting;
When the user read the plaintext of this e-file, this reading application program can be stored in present time data in this memory location leasing the period every one; And
This reading application program can check also whether this time data has surpassed the lease of agreement, and when surpassing this lease this e-file is cancelled, so that the user can't continue to read this e-file.
2. the method for claim 1, wherein the data in this memory location are to store with encrypted form.
3. the method for claim 1, when wherein this terminating machine and this server host are leased this e-file, whether whether this lease effectively be to be as the criterion to check to expire between the leasehold, when this present time of reading Application inspection has reached between this leasehold, this e-file can be cancelled so that the user can't continue to read this e-file.
4. method as claimed in claim 3 when wherein this present time of reading Application inspection reaches between this leasehold, can be sent an alert message and should expire between the leasehold to notify the user.
5. the method for claim 1, when wherein this terminating machine and this server host are leased this e-file, whether this lease effectively is to read to check whether number is as the criterion at the expiration when total, number has reached read time of originally leasing during number when the present reading of this reading Application inspection is total, this e-file can be cancelled so that the user can't continue to read this e-file.
6. method as claimed in claim 5, in number was originally leased at the expiration when wherein the present reading of this reading Application inspection was total read time, can be sent an alert message and expire with the time number of notifying the user to read during number.
7. network system, be used for controlling the lease of e-file, this network system includes a server host can be via an Internet to be connected with a plurality of terminating machines, each terminating machine includes one and reads an application program and a memory storage, this terminating machine also can propose the requirement of leasing an e-file via this Internet to this server host, so that read this e-file in the lease of an agreement, this server host includes:
One leases control center, receiving e-file that this terminating machine proposes when this server host leases when requiring, this leases control center can be with the plain text encryption of present time, effect phase that this is leased and this e-file and form corresponding ciphertext, this ciphertext is sent to this terminating machine via this Internet, so that be stored in the fixed locations in this memory storage, and the data recording of this memory location is got off;
This reading application program includes:
One position detection module, when user's desire is read this e-file, whether this position detection module is consistent with the previous memory location of noting the present position of storing of this e-file of contrast earlier, and is that corresponding plaintext is read for the user with the decrypt ciphertext of this e-file when meeting;
One time impression module, when the user read the plaintext of this e-file, this time impression module can be stored in present time data in this memory location leasing the period every one; And
One rental period was checked module, was used for checking whether this time data has surpassed the lease of agreement, and when surpassing this lease this e-file was cancelled, so that the user can't continue to read this e-file.
8. network system as claimed in claim 7, wherein the data in this memory location are to store with encrypted form.
9. network system as claimed in claim 7, when wherein this terminating machine and this server host are leased this e-file, whether whether this lease effectively be to be as the criterion to check to expire between the leasehold, when this present time of reading Application inspection has reached between this leasehold, this e-file can be cancelled so that the user can't continue to read this e-file.
10. network system as claimed in claim 9 when wherein this present time of reading Application inspection reaches between this leasehold, can be sent an alert message and should expire between the leasehold to notify the user.
11. network system as claimed in claim 7, when wherein this terminating machine and this server host are leased this e-file, whether this lease effectively is to read to check whether number is as the criterion at the expiration when total, number has reached read time of originally leasing during number when the present reading of this reading Application inspection is total, this e-file can be cancelled so that the user can't continue to read this e-file.
12. network system as claimed in claim 11, in number was originally leased at the expiration when wherein the present reading of this reading Application inspection was total read time, can be sent an alert message and expire with the time number of notifying the user to read during number.
CN 00128780 2000-09-21 2000-09-21 Method and system for controlling lease of electronic file Pending CN1343938A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 00128780 CN1343938A (en) 2000-09-21 2000-09-21 Method and system for controlling lease of electronic file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 00128780 CN1343938A (en) 2000-09-21 2000-09-21 Method and system for controlling lease of electronic file

Publications (1)

Publication Number Publication Date
CN1343938A true CN1343938A (en) 2002-04-10

Family

ID=4593216

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 00128780 Pending CN1343938A (en) 2000-09-21 2000-09-21 Method and system for controlling lease of electronic file

Country Status (1)

Country Link
CN (1) CN1343938A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100452074C (en) * 2007-01-17 2009-01-14 北京大学 Copyright protection method and system for digital contents controlled by time
CN1475919B (en) * 2003-07-03 2010-04-21 威盛电子股份有限公司 Data storage privacy method
CN1679102B (en) * 2002-08-28 2010-12-01 松下电器产业株式会社 Key delivery apparatus, terminal apparatus, recording medium and key delivery system
CN103377567A (en) * 2012-04-23 2013-10-30 北大方正集团有限公司 Method and device for reading digital electronic book
CN107133816A (en) * 2017-04-21 2017-09-05 网易(杭州)网络有限公司 A kind of e-book reading control method and device
CN108694632A (en) * 2017-04-06 2018-10-23 北大方正集团有限公司 The reading method of e-book and the reading device of e-book
CN109918356A (en) * 2019-03-15 2019-06-21 深信服科技股份有限公司 File reading, device, equipment and computer readable storage medium

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1679102B (en) * 2002-08-28 2010-12-01 松下电器产业株式会社 Key delivery apparatus, terminal apparatus, recording medium and key delivery system
CN1475919B (en) * 2003-07-03 2010-04-21 威盛电子股份有限公司 Data storage privacy method
CN100452074C (en) * 2007-01-17 2009-01-14 北京大学 Copyright protection method and system for digital contents controlled by time
CN103377567A (en) * 2012-04-23 2013-10-30 北大方正集团有限公司 Method and device for reading digital electronic book
CN108694632A (en) * 2017-04-06 2018-10-23 北大方正集团有限公司 The reading method of e-book and the reading device of e-book
CN107133816A (en) * 2017-04-21 2017-09-05 网易(杭州)网络有限公司 A kind of e-book reading control method and device
CN109918356A (en) * 2019-03-15 2019-06-21 深信服科技股份有限公司 File reading, device, equipment and computer readable storage medium
CN109918356B (en) * 2019-03-15 2023-05-12 深信服科技股份有限公司 File reading method, device, equipment and computer readable storage medium

Similar Documents

Publication Publication Date Title
US7225160B2 (en) Digital works having usage rights and method for creating the same
US5715403A (en) System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar
US6957194B2 (en) Method for printing digital works
US6865551B1 (en) Removable content repositories
CN1343938A (en) Method and system for controlling lease of electronic file
CN1141678C (en) Method and system for preventing electronic file pirary

Legal Events

Date Code Title Description
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C06 Publication
PB01 Publication
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication