KR20170069116A - Copyright tracking and verification system - Google Patents

Copyright tracking and verification system Download PDF

Info

Publication number
KR20170069116A
KR20170069116A KR1020150188007A KR20150188007A KR20170069116A KR 20170069116 A KR20170069116 A KR 20170069116A KR 1020150188007 A KR1020150188007 A KR 1020150188007A KR 20150188007 A KR20150188007 A KR 20150188007A KR 20170069116 A KR20170069116 A KR 20170069116A
Authority
KR
South Korea
Prior art keywords
content
code
information
copyright holder
search
Prior art date
Application number
KR1020150188007A
Other languages
Korean (ko)
Inventor
윤재영
Original Assignee
윤재영
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 윤재영 filed Critical 윤재영
Priority to PCT/KR2015/014385 priority Critical patent/WO2017115885A1/en
Publication of KR20170069116A publication Critical patent/KR20170069116A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services
    • G06Q50/184Intellectual property management
    • G06F17/30038
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • G06Q20/123Shopping for digital content
    • G06Q20/1235Shopping for digital content with control of digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Development Economics (AREA)
  • Tourism & Hospitality (AREA)
  • Software Systems (AREA)
  • Economics (AREA)
  • Primary Health Care (AREA)
  • Human Resources & Organizations (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Operations Research (AREA)
  • Game Theory and Decision Science (AREA)
  • Storage Device Security (AREA)

Abstract

The system comprising: an upload module for receiving content and personal information from a terminal of the original copyright holder; and an original module of the original copyright holder provided from the terminal of the original copyright holder An identification code generation means for generating an identification code from information and meta data, a decoding module for generating an converted content file by inserting the identification code into the original content file, and a virtualization code A virtualization module for generating an identification code, and a virtualization module for generating an identification code, which is generated from the identification code generation means, into the original content and decrypting the generated content file to generate a converted content file and searching for the converted content file using the vhg- Make sure to check.

Description

[0001] COPYRIGHT TRACKING AND VERIFICATION SYSTEM [0002] The present invention relates to a content search and history tracking system,

The present invention relates to a method for confirming distribution of a work by a copyright holder when a content is distributed online and circulated, and specifically, a content file is enclosed And a method of making the information into a separate identification code so as to identify the copyright holder of the content.

Recently, as the creation and distribution of personal contents through the internet or mobile communication network become popular, even if a user puts his or her work on a specific site, the third party is downloaded again as a separate program and redistributed as a third party's ID. I was interested in who I was. Currently, copyright owners or netizens discover and disclose this information to the original copyright holder. However, this is only true for some famous content, and accurate tracking is difficult. There has been a growing interest in how copyrighted content is distributed and how it is distributed by third parties.

Generally, technologies that prevent unauthorized use of digital contents and protect the rights and interests of providers are collectively referred to as DRM (Digital Rights Management). The DRM includes a digital object identifier (DOI) which is a content identification system, an index (INDECS) which is a kind standard for metadata of contents, a rights expression such as an extensible rights mark-up language (XrML) Technology, and encryption technology to prevent illegal copying and tampering. Recently, it includes watermarking technology for authoring and fingerprinting technology for user tracking.

However, the DRM method has an excellent effect in preventing illegal copying of content and discriminating illegality of contents through user restriction, but it is difficult to prevent the distribution and distribution of pirated contents once, .

Recently, various methods for solving such problems have been introduced.

For example, Japanese Patent Application Laid-Open No. 10-70664 discloses a method of inserting and distributing a forensic mark (fingerprinting) for identifying a user in a content and blocking illegal uploading using a forensic mark in a web hard server . However, this method has a problem that it is difficult to check the distribution and distribution of illegally copied contents because the contents can be blocked only when the contents in which the forensic mark is inserted are uploaded to the web hard server equipped with the forensic mark detection module.

Also, in the patent application publication No. 10-2010-48711, a method of inserting and distributing a tracking agent into contents and distributing the information of the execution terminal to the tracking management server by the tracking agent when the contents are executed, Start

. However, since the tracking agent operates at the time of execution of the content, it can not be executed and the content that is in circulation can not be tracked, and the tracking agent is a kind of application program, so that it can be easily removed through the hacking technique.

In addition, Application No. 10-2012-0132673 filed by the applicant provides a method by which a search engine can search a content file by converting a content including a specific identification code into a part of an original content file. This method requires users to generate separate code at specific sites and then convert their content to upload content. In particular, when inserting information in a specific area, it is necessary to insert an identification code through a step of performing a separate conversion. Such a converter is required to input information through a specific site and upload content, Although it is possible to monitor and identify contents by distributing and distributing the contents, when the specific area is the beginning of the contents, the quality of the content itself may be deteriorated, which may cause a considerable trouble in using the contents. I need a way to do it.

Disclosure of Invention Technical Problem [8] Accordingly, the present invention has been made keeping in mind the above problems occurring in the prior art, and it is an object of the present invention to provide an apparatus and method for searching for content distributed on- It has its purpose. In addition, it is easy to check whether the searched contents are circulated through a legitimate route or whether it is an illegal copy, and it is intended to make it easy to know who the original author is.

In order to achieve the above object, in order to achieve the above object, a person who intends to upload content or a content creator (in this document, referred to as a 'content uploader' and more precisely a content creator terminal) If you enter your information at the above site, the site is encoded or encrypted so that the information of the content uploader and the generated content are always the copyrighted work of the user. Coding or encryption is referred to as " decryption ").

The information thus stored is automatically decoded and stored in the generated content created by uploading the content (file) by the content uploader, and the created content can be distributed or distributed directly from the server, The uploader can receive and distribute it again.

At this time, the encryption uses the wired / wireless communication to access the content upload server

(A) The content uploader inputs his / her information from the APP or WEB of the wired / wireless terminal, and this information is stored as a separate personal information,

(B) When uploading contents (hereinafter referred to as original contents in this document) produced or authorized by the copyright owner to the decryption server through the APP or WEB of the wired or wireless terminal, the contents converted through the decryption server Quot; means that the original content is decoded, not the content is converted) is generated.

(C) A separate content identification code is generated for the personal information and the decrypted content, and this information is stored in the content uploader and the server.

(D) The converted content including the content identification code is searched at the search site, and the searched result value is automatically extracted from the server and stored in the content uploader and the present system.

(E) The converted content file including the content identification code may be provided to the search requester by distinguishing the search result for the content file not including the search result and the content identification code.

The content decoding method according to the present invention generates a separate code for assigning codes to the identifiable contents uploader or contents and managing the codes. In the step (c), a method of matching a content uploader with a content identification code includes: storing information through separate decoding of information of the content uploader; A step of assigning a content identification code to the content converted by the decryption server when the content uploader uploads the original content, matching the identification code of the content uploader with the identification code of the content; And a step of providing a content confirmation code (a content uploader identification code + a content identification code).

In the step (b), the content decryption method

(A) an apparatus and system for constructing a decryption header in a content upload system,

(B) The decryption method designates the position determined by the system from among the start and end of the content,

(C) The decryption header is inserted into the content at the designated position.

At this time, the information of the decryption header is composed of a user code, a group code, a category code, a data code, a content event code code, a reserve code, and the like.

(D) When the decryption header is composed, a virtualization code is constituted. The virtualization code is constructed by the content event code value and the copyright holder value among the values of the decryption header, and this value is used for the search for the file distribution and distribution .

(E) In other words, the decryption method inserts the decryption header value and inserts the virtualization code further so that the contents can be distributed and can be confirmed when the distribution is performed.

In the present invention, when a content uploader uploads a content (file), information of the content uploader is matched with information of the original content to give a content identification code, and the provided code is inserted into a specific part of the content The content uploader can download the content again and distribute and distribute the content on the web and APP or upload the content file in which the matched content identification code is inserted to the site of the user in the server of the corresponding system And a method of identifying and decrypting an individual's work that can be performed.

The present invention provides a content uploader identification code generation module including an input module for inputting information of a content uploader and a content uploader identification code generating means for encoding the inputted information in a system so as to be able to be matched;

A content decryption module for encrypting the content when the content is uploaded to construct a decryption header and to generate an identification code for decrypting the decryption header;

A virtualization code module including means for generating a virtualization code that automatically assigns a copyright holder identification code and an event (sequence) value, and means for generating the virtualization code;

A metadata module for converting the content uploader identification code, the content decryption header module, and the virtualization code providing module to decode contents into metadata;

A content download module for downloading the decrypted content and a content association module for directly distributing and distributing the content to another site; Wherein the content uploader has a function of searching for a content file including the identification code, an identification code checking means for confirming the information of the content with the identification code or the content identification code of the principal, A search module including a search engine for a content uploader and a system administrator with a function of searching using input information; And a method and system for decrypting an individual's work through online.

Since the content provider uses the uploader identification code and the content identification code included in the content file to match the information of the content uploader with the information of the content, And the distribution situation can be confirmed conveniently.

In addition, since the retrieval using the identification code, the retrieval using the user input information, and the retrieval using the metadata are performed concurrently as one retrieval request, the distribution status of the contents file can be widely checked.

In addition, distribution situation of contents through information of contents uploader is provided separately, so it is possible to check the distribution status of contents and to make distribution and distribution of individual works that can easily take measures such as reporting by tracking unauthorized distributors .

1 is a schematic diagram of a system according to an embodiment of the present invention;
FIG. 2 is a block diagram of a system for moving a content in a system according to an embodiment of the present invention.
3 is a block diagram of a method of matching a personal identification code and a content identification tod
FIG. 4 is a block diagram showing an entire configuration of a content decoding method
5 is a diagram of a decryption code assigning method
6 is a flowchart illustrating a method of assigning a virtualization code
7 shows an example of a decoding method
FIG. 8 is a configuration example of data that gives virtualization code values. FIG.
FIG. 9 is a configuration example showing a result of decoding after content decoding through an MPEG2 TS packet (a transmission method shared for streaming).
FIG. 10 is an example in which the mpeg2 file is changed after the decryption code is applied; FIG.
Figs. 11 to 13 are diagrams showing still another embodiment

Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the drawings.

1, the system for checking and decrypting personal contents according to an embodiment of the present invention includes a content uploader 100 and a content uploader 100 that communicate with the content uploader 100 through a communication network 200 And a system server 1000.

The content uploader 100 includes a desktop computer, a notebook computer, a smart phone capable of wireless Internet access, a portable terminal such as a tablet PC, and other computer devices capable of data communication.

The type of the communication network 200 is not limited and includes, for example, a wired or wireless Internet network, a mobile communication network, a LAN, a WAN, a wireless LAN, or the like, or an optional combination thereof.

The system server 1000 includes an upload module 1010, a metadata conversion module 1020, a decryption module 1100, a virtualization module 1200, a metadata conversion module 1400, a search module 1020, 1030, a matching module 1500, and the like. A control means for controlling the operation of the system, a storage means for storing programs and the like, a database management system (DBMS), a member management means for performing member authentication and login procedures, a settlement processing means And the like.

The upload module 1010 provides a content upload page to the content uploader 100 to support the content upload procedure.

For convenience of description, a content file uploaded to the system server 1000 will be referred to as 'content' in this specification.

The upload page provides an input window for inputting information on an original content file to be uploaded, and the input information may include, for example, a content owner, an affiliation or a group, a category, and the like.

The upload module 1010 may also provide a metadata input window for inputting metadata of the original content file. The metadata may include content copyright holder, title, running time, file format, price, and the like.

Since the original content file already contains metadata, the upload module 1010 may include a function of checking and adding the metadata. Since the metadata item and structure of the content file are not completely standardized, it is also possible to formulate items and structures and to input them when inputting the input information.

 At this time, the system server initializes the metadata information, and can insert additional metadata defined in the system by forcibly inserting the identification code using the metadata conversion module 1400 to provide information.

The decryption module 1100 is a module for inserting an identification code of a content, and can be executed together with the virtualization module and the meta data conversion module when the content is uploaded, or can be inserted or executed alone. For example, if there is metadata, the system can read it and only decode it without performing metadata conversion. .

The virtualization module 1200 may insert information of the content uploader information and the content event code (event, sequence) value at the time of content upload. It can also be executed together with the decryption module and the metadata conversion module or alone.

In the case of contents with metadata, the metadata conversion module rearranges the metadata in a method required by the system by extracting the metadata, and generates a unique metadata identification code so that the metadata can be used for searching the contents.

The search module 1020 uses the decoded identification code, the virtualization identification code, and the metadata identification code, which are created, to search for the content using one or more of the codes. The search module searches the virtualization identification code decryption identification code and the metadata identification code based on the author information and the content information, and outputs the retrieved result value.

In particular, the search module (1020) relates to a decoding code content retrieval and history inquiry system for on-line distribution status and usage status tracking, and its purpose is to search the usage history of decoded code contents distributed or distributed online In other words, the history retrieved by the retrieval module can be stored in a separate DB, and the retrieval history can be separately stored.

Specific methods for content search and history search are as follows.

When the information of the content uploader 100 and the content file is input or when the content file is matched with the content identification code (if they match), the information input or the matched information together with the content file is transmitted to the upload module 1010), user information (including IP, etc.), user input information and metadata conversion module 1400 generate an identification code converted from the metadata, and the decoded code and the virtualization code The virtualization code is converted from the module 1200 and registered by the content management module 1030 through a matching module that matches the information.

When the converted content file is created by inserting various identification codes (metadata, decoded code, and virtualization code) generated in the original content file, the converted content file is transmitted to the content provider or the terminal of the user.

Then, the search can be performed using one or more of these identification codes inserted above.

At this time, the search is performed in parallel with the search through the identification code and the user input information, and the search module 1020 provides the search result to the search requester. In addition, a search server is separately provided to provide a search result to a user or a content uploader using a search window.

In the present invention, various kinds of codes are generated and included in the original contents, and the history of the codes is continuously managed to understand how the contents are distributed.

Also, even if one code is interpreted, it is possible to grasp the history of the distribution since the distribution history can be grasped by other types of code if the code is not analyzed at one time as long as the distribution is performed by using various codes at once.

The effects of decoded code contents retrieval and history retrieval are as follows.

Distribution and circulation status can be conveniently checked through the search using the identification code included in the content file. That is, since the search using the identification code, the user input information, and the metadata are all performed in parallel, the distribution situation can be widely checked.

Based on the retrieved information, various information such as upload status, download status, distribution status, unauthorized access status, and local information can be accumulated and processed and utilized as Big Data.

The content management module 1030 is a module that can manage the contents of the content uploader, grasps the distribution and distribution route of the content, and provides a pay view or a click number corresponding to the content, and provides information .

The matching module 1500 may match the identification code of the content uploader and the identification code of the content so that the copyright information of the corresponding content can be easily grasped. The matching module 1500 is interlocked with the search module and the affiliate module.

The database area 2000 stores information of the content uploader, information of the content, and information such as cooperation and distribution.

2 shows a content movement path in the system.

When the content uploader uploads the content to the server, the system server decrypts the content and generates it as a decrypted content file. The content is stored in the database and distributed and distributed. After that, And a content movement path for allowing the user to play the content.

FIG. 3 relates to a method of matching personal information and contents information.

The content uploader makes a subscription to the system, and this member information is given a personal identification code designated by the system. The given code is applied at login, and when the content uploader uploads the content, And then generates a content identification code, which is then matched with the personal identification code and the content identification code. That is, it is possible to identify who is the right person of contents. At this time, when the content is uploaded, the content uploader may be stored together to generate the content identification code.

 (Content Decoding Method)

4 illustrates a content decoding method. When a content file is uploaded, the system forms a decryption header. The decryption header value codes and assigns a user code, a group code, a category code, a DATA code, a content event code (event, order, etc.) value and a RESERVED attribute value to the content.

At this time, the decryption header can be inserted into a specific part of the content file requested by the system. For example, the content information can be extracted by inserting at the beginning of the content file. The size of the decryption header has a value of 128 bits. If it is the following value, the default value of the digital value is set, and the setting value can be two digits.

The content event code can be a random number generated according to the order, time, etc. at the time of decryption, and this event code can be used when configuring the virtualization code as the content event value.

In addition, the virtualization code is separately configured. The virtualization code is composed of the content event value and the content uploader value among the decryption header values. The decryption module can configure the decryption module by combining the decryption header and the virtualization code value.

Therefore, the decoded code and the virtualized code are connected by the content event value and can be searched together, and it is possible to check whether or not the decoded code and the virtualized code are modulated even if they are modulated by others.

In particular, since decoded codes can be inserted into each part of a content, it is impossible to remove all the decoded codes from the content.

 (Content Decoding Method)

FIG. 5 illustrates a method of assigning a decryption code, which indicates that a content identification code is made through a user code, a group code, a category code, a data code, a content event code, and an attribute code. At this time, this code value can be added or deleted by the system setting.

FIG. 6 illustrates a method of providing a virtualization code. FIG. 6 illustrates a method of creating and assigning a separate virtualization code value using a content value and an identification code of a content uploader in order to identify a content. In the content uploader and system, The content uploader and the system administrator know the details of the event by transmitting the related information to the content uploader with the identification code of the content uploader. The content event value may be a random number value generated by the system when this situation occurs.

In addition, when a content event code is changed, corrected, deleted, or the like, it is stored in the content uploader and the system, and using the big data via the change history tracking and viewer (user) Can be provided.

7 is an exemplary diagram illustrating a method of assigning, i.e., inserting, a decoded code in a decoding method.

That is, the decoded code is composed of a user code, a group code, a category code, a date code, a sequence code, and Reserved, and these values are inserted into VALUE1 to VALUE6 of the header. The last byte, TCI_INDEX, is the value used in dummy location and minimum unit header modulation.

The decoded code information is divided into information input at the time of encoding in the server and user information input at the time of downloading. The information input to the decryption code at the time of downloading is the user information value.

The size of the decoded code in this example is fixed at 128 bytes, and if all 128 bytes are not filled, the empty value is filled with 00. This may change in size depending on the size and format of the system, user and content.

In this example, the decoded code value is inserted at the beginning of the original file, and a practical example of the added decoded code is as follows.

(Ex: ASCII)

TTP.GRP.SHOW?o..7000TTPG60000001....1111500034321112e ................................. ......................................

(EX: HEX)

54 54 50 00 47 52 50 00 53 48 4F 57 80 F4 03 00 37 30 30 54 54 50 47 36 30 30 30 30 30 31 10 0E 00 00 31 31 31 31 35 30 30 30 33 34 33 32 31 31 31 32 EB B3 F0 BF 86 95 E1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

8 is a configuration example of data for assigning a virtualization code value.

The dummy code is composed of the content event code value and the copyright holder value among the decoded code values, and an example of the configuration of the drawing is an example in which a dummy code value is added to the content. In addition, the values of the minimum unit before and after the change were displayed.

FIG. 9 shows an example of a result of decoding after content decryption through an MPEG2 TS packet (a transmission method shared for streaming).

The following figure shows the structure of the MPEG2 TS packet. The following figure shows the structure of the MPEG2 TS packet after the decryption of the content is applied.

The location of the 2-byte modulation and virtualization code insertion of the virtualization code is determined appropriately by using the reference value generated based on the decoded code data. The header of the TS packet (decoded code is generated in the transmission method shared for streaming For example, avoids the TS header position because content conversion is not meaningful or it can be easily recovered by a general-purpose player. Modulation is performed for each packet. To increase the complexity, a virtualization code is inserted at a new position generated based on the modulation position value. In addition, all TS headers are modulated so as not to recognize the converted content as a TS file.

In this example, the TS header is 4 bytes, and the first 4 bytes of all packets are always modulated.

FIG. 10 is an example in which the mpeg2 file is changed after the decryption code is applied.

11 is an example of constituting a decoded code value.

The decoded code value consists of 8 bytes and is used to specify the insertion position of modulation and virtualization code values.

The decoded code value is assigned as [Random Value] in the first [0 ~ 3], and the random value is set in [4 ~ 6] bytes as the next step.

The [7] bytes of the decoded code value are involved in designating the modulation and dummy data insertion position as a pattern value, and the version of the decoding module can be managed by designating the range of the pattern value. (Library can be created so as not to reproduce contents of a pattern that does not fit in the range)

The pattern value is generated by using a random value among a certain range of values (EX: 0 to 0xFF), and the pattern value generation is calculated by 7 bytes before TCI INDEX. That is, the pattern generation calculation formula is a pattern generation algorithm that only the encoding subject and the decryption subject (TCI player) know only the pattern key as the key value. The pattern value is not input to the decoded code value [7] It is generated dynamically. Since the pattern value is generated dynamically, it is not inserted into the decoded code value [7] and the decoded code value [7] has no value or meaningless value. In decoding, a pattern is generated by a pattern generation algorithm and a position is calculated based on the pattern.

Figure 12 shows a user ' The user  Providing results An example of how  will be.

Specific methods for content search and history search are as follows.

When the information of the content uploader 100 and the content file are inputted or the content ID code is matched with the content uploader 100, the information input with the content file or the matched information is transmitted to the upload module 1010 in the system server 1000, IP, and the like), and generates identification codes converted from the user input information and metadata converted from the metadata conversion module 1400 into meta data, and outputs the decoded codes, which are converted through the decryption module 1100, And a matching module 1500 that matches the virtualization code and the information.

When the various identification codes are inserted into the original content file to generate the converted content file, the converted content file is transmitted to the content provider or the terminal of the user.

Thereafter, a search can be performed using one of these identification codes.

At this time, the search is performed in parallel with the search through the identification code and the user input information, and the search module 1020 provides the search result to the search requestor. In addition, a search server is separately provided to provide a search result to a user or a content uploader using a search window.

At this time, the order of the metadata conversion module, the decryption module, and the virtualization module among the steps after the upload module can be changed by the system administrator, and a separate conversion module can be created and added for content management.

The effects of decoded code contents retrieval and history retrieval are as follows.

Distribution and circulation status can be conveniently checked through the search using the identification code included in the content file. That is, since the search using the identification code, the user input information, and the metadata are all performed in parallel, the distribution situation can be widely checked.

Based on the retrieved information, various information such as upload status, download status, distribution status, unauthorized access status, and local information can be accumulated and processed and utilized as Big Data.

The contents file of this document is the contents file of literary works (poetry, novel, essay, lecture, screenplay, description), musical works, theatrical works, art works (painting, calligraphy, sculpture, Design books, etc.), photographic works, visual works, graphic works, and computer program works.

13 shows the operation of the decryption code player.

100: Content uploader 200: Communication network
1000: System server 1010: Upload module
1100: Decoding module 1020: Search module
1200: virtualization module 1030: content management module
1500: Matching module
2000: Database module

Claims (9)

It is a content search and traceability monitoring system that facilitates searching and tracking by including encryption information in various contents,

An upload module for receiving content and personal information from a terminal of the original copyright holder;
An identification code generating means for generating an identification code from the main information of the original copyright holder provided from the terminal of the original copyright holder,
And a decoding module for inserting the identification code into the original content file to generate the converted content file
The identification code generated by the identification code generating means is inserted into the original content and decoded to generate the converted content file
A content search and a traceability monitoring system which makes it possible to check the distribution and distribution status by searching using the identification code included in the converted content file and to facilitate search and tracking by including encryption information in various contents
The system of claim 1, wherein the metadata in the system is a content copyright holder. Title, runtime, file format, and price, and the metadata conversion module converts metadata into metadata of a format determined by the system when the content includes metadata, so that the original copyright holder is aware of the copyrighted work A content search and a traceability monitoring system in which encryption information is included in various contents so as to facilitate search and tracking,
3. The method of claim 2, further comprising: a virtualization module for generating a virtualization code that is created using a content event value and a copyright holder value that occurs when content code is assigned; A content search and history tracking system
The information processing apparatus according to claim 3, further comprising: a matching module that compares and connects the content with at least one of the generated metadata code, the decoded code, and the virtualization code, and decodes the decoded information so that the original copyright holder can know that the original is the copyrighted work A content search and a traceability monitoring system in which encryption information is included in various contents to facilitate search and tracking, including a method of incorporating the content into a content,
The virtualization module according to claim 4, wherein the virtualization module generates a virtualization code using the content event value and the copyright holder value in the decryption code, and arbitrarily generates and includes a content event value at each moment of the event so that the original copyright holder is the author's own work And deciphering information for allowing the original copyright holder to know that the original copyrighted work is included in the content, and including a method of searching for the content using the decryption information, Content search and traceability monitoring system that facilitates searching and tracking by including encryption information in contents
The system according to claim 5, further comprising: a content uploader and a system in which a content event code is changed, modified, deleted, or the like, A method of providing decryption information to the content to enable the original copyright holder to know that the original copyright holder is the copyrighted work which can provide the content advertisement information and the like and to search for the content using the decryption information, Content search and traceability monitoring system that facilitates searching and tracking by including information
4. The method of claim 3, wherein the decoded code is inserted into a header including a user code, a group code, a category code, a date code, and a content event code, the decoded code index information specifies a position of a virtualized code, A content search and traceability monitoring system which makes it possible to include decryption information for allowing the original copyright holder to know that the original copyright holder is a work,
5. The method of claim 4, wherein, when deciding a modulation position in decrypting the content, the system reference value is determined by summing each byte constituting a decoded code header, modulated using a data operation formula, A method of setting a reference value by using a star unique value, decoding information for allowing the original copyright holder to know that the original copyright is a work, and including a method of searching for the content using the decoded information, Content search and traceability monitoring system that facilitates searching and tracking by including encryption information
The method according to claim 4, further comprising decoding information for allowing the original copyright holder to know that the original copyright holder is a copyrighted work including the metadata code and the matching module for matching the decoded code virtualization code with the generated content, Content search and traceability monitoring system that facilitates searching and tracking by including encryption information in various contents including a method of searching for
KR1020150188007A 2015-12-10 2015-12-29 Copyright tracking and verification system KR20170069116A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/KR2015/014385 WO2017115885A1 (en) 2015-12-29 2015-12-29 Content search and history tracking monitoring system for facilitating searching and tracking by comprising encryption information in various contents

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR20150176388 2015-12-10
KR1020150176388 2015-12-10

Publications (1)

Publication Number Publication Date
KR20170069116A true KR20170069116A (en) 2017-06-20

Family

ID=59281279

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020150188007A KR20170069116A (en) 2015-12-10 2015-12-29 Copyright tracking and verification system

Country Status (1)

Country Link
KR (1) KR20170069116A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020080607A1 (en) * 2018-10-19 2020-04-23 주식회사 산타 Content copyright protection apparatus and method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020080607A1 (en) * 2018-10-19 2020-04-23 주식회사 산타 Content copyright protection apparatus and method

Similar Documents

Publication Publication Date Title
US11366878B2 (en) Method and apparatus for delivering encoded content
US20190080098A1 (en) System and method to protect user privacy in multimedia uploaded to internet sites
US8055899B2 (en) Systems and methods using digital watermarking and identifier extraction to provide promotional opportunities
US20170116693A1 (en) Systems and Methods for Decentralizing Commerce and Rights Management for Digital Assets Using a Blockchain Rights Ledger
KR101379861B1 (en) Apparatus, system and method for providing DRM
CN101271501B (en) Encryption and decryption method and device of digital media file
EP1630998A1 (en) User terminal for receiving license
CN103620609A (en) Method for playing digital contents protected with a DRM (digital right management) scheme and corresponding system
CN101884195A (en) Cryptographic processing of content
Zhang et al. A novel approach to rights sharing-enabling digital rights management for mobile multimedia
Wang et al. CS-DRM: a cloud-based SIM DRM scheme for mobile internet
US9722978B2 (en) System and method for automated licensing identification and verification
JP2012169753A (en) Information processor, information processing method, and program
KR20170069116A (en) Copyright tracking and verification system
JP5350021B2 (en) File generation device, file reproduction device, and computer program
CN107766700A (en) Digital publishing system and method for copyright protection
KR100849639B1 (en) Method for encoding and decoding moving picture file and recording medium having the method embodied program
KR20080103621A (en) Method for user created content service using digital rights management
KR101460410B1 (en) Online contents watching system and method
KR102186901B1 (en) Apparatus and method for encrypting multimedia content files through data modulation
CN117241067B (en) Video security retrieval method and system based on fingerprint watermark
KR100814520B1 (en) Method and Apparatus for providing/playing of Digital Rights Management contents
JP6663489B2 (en) Method and system for providing a user with access to restricted content
Datta et al. An Approach to Achieve Compression Along with Security via a User Assigned Security Key with Possible Lossless Compression
JP5592584B1 (en) Content transmission / reception system, content transmission device, content reception device, and program

Legal Events

Date Code Title Description
E701 Decision to grant or registration of patent right