Encrypted Tigers in the remote education website application case detailed explanation

Overview of customer needs:

Business Network is the MBA distance education website of China's most famous higher education institution, providing individual and corporate users with a distance education business specializing in business administration. Individual users can learn through online and CD-ROM, and enterprise users receive teaching content through satellite broadband. The teaching content is distributed in the form of media files or text files. These files are collectively called courseware. Specifically, they include media files (* .ASF, * ASX, etc.), text files (* .HTML), and POWERPOINT files.

For the website, courseware is its most important product and its core value. If no protective measures are taken, legitimate users will be able to copy, copy, and distribute courseware content arbitrarily, and the legal income of the website will be severely damaged. Therefore, the website urgently needs a technical means to protect the copyright of its courseware. Crypto Tiger is the technical solution to meet this demand.

The requirements of Shangxue.com's copyright protection system can be summarized into the following two aspects:

1. Requirements of the certification system

A Courseware cannot be copied arbitrarily.

B The client needs real-time online authentication when playing the courseware. That is to say, if the customer wants to learn the courseware course, he must connect to the website customer certification center through the Internet, and the course can be played only after obtaining the broadcasting permission.

Multimedia files in C courseware and text files in PPT and HTML formats must be encrypted.

2. Database Management System of Certification Center

The certification center management system is responsible for the certification center's system administrators and educational administrators. It is used to manage data information such as customers, courses, courseware delivery, course information, and schedule arrangement.

Crypto Tiger Solution

1. System structure:

Encryption Tiger's entire system consists of three main parts:

Developer Tools: Pack the original files and convert them into packaged files. At the same time, add the corresponding key and other information into the encrypted file database;

Database and registration server: use one server as both registration server and registration server, and process user registration request, connection authentication and administrator management and monitoring at the same time;

Client: It is composed of corresponding client controls and LSO to complete the license management and parsing of packaged files;

The above three parts are divided according to different physical addresses. In addition, the administrator runs the management system on the database server and registration server through the WEB service of the intranet.

2. Operating environment:

Client requirements: Windows95 or above operating system, IE4.0 or Netscape4.0 or above browser, able to connect to the Internet;

Authentication server: Windows 2000 Server, IIS 5.0, Oracale 8i database server and client;

Developer tool operating environment: Windows95 or above operating system, Oracale 8i database client, 1G or more free hard disk space (used to store packaged files), LAN connection with authentication server;

Administrator operating environment: IE4.0 or above browser, LAN connection with authentication server.

3. Working principle (process):

Digital content protection (developer tools): The encryption tiger uses 128-bit super symmetric algorithms to protect text, images, music and other media files; the protected text or images cannot be copied and saved by users Copying, protected media files, even if users copy to other machines, they cannot be used correctly;

Digital content registration (registration server): users can use digital content providers "password", "registration number", SMARTCARD or iKEY (a USB interface identity authentication token product) and other methods on the remote server to own Digital file for registration; after the user ’s legal identity is confirmed, the registration control will extract the hardware fingerprint of the user ’s computer and generate a license file bound to the user ’s computer; The display control "parses the protected digital content; the digital content will be correctly parsed only on computers that have legally obtained licenses.

4. Main features:

(1). Safe and reliable copyright protection design:

Unable to copy: the license is tightly bound to the computer characteristics of the user when it is registered, and the correct analysis of digital content depends entirely on whether the user's registration is legal;

Flexibility: You can use one license to manage multiple files, you can add a valid period to the license, you can use multiple licenses to manage; the authentication method can have one certification, multiple certifications or real-time certification, etc ... a lot of flexibility, Depends entirely on the content provider's application;

License transfer: Through the confirmation of the remote authentication server, users can easily transfer the license locked on one computer to another computer without increasing the cost.

(2). Flexible and diverse file formats:

Static files: text files, image files, etc .;

Media files: RealPlayer, Flash, Microsoft Media, etc.

(3). Information implantation of digital content providers:

While protecting digital content, copyright information such as author, version number, and online publication date can be easily and quickly embedded in the file; other information related to sales can also be implanted.

(4). Use period control:

The encryption tiger system combined with the license method can set the user's use period of digital content, so as to ensure that users can only browse and play digital content within the time period specified by the digital content provider; users cannot remove it by changing the system clock time limit.

Why does the business network choose the encryption tiger

System performance:

In the design of the encryption tiger system, it comprehensively considered the needs of copyright protection and database management. It has clear commitments in various indicators such as system security, stability, operating speed, maintenance and service, and has won the ** Business Network Recognition and trust.

System stability

There is no direct relationship between the components in this protection system, and data is transferred between the modules through the database. This structure ensures that if a problem occurs in one part of the system, it will not affect other parts. And you can easily correct the problem and replace the original module.

This system will not affect the stability of other business network projects.

After problems occurred in the system, Rainbow World promised to propose solutions within 24 hours.

System security

The security of this system includes several guarantees:

The security of the database, the security of the algorithm, the security of the system and the security of the environment are described separately below.

The security of the database requires: different databases must be operated by people with corresponding permissions; the database will not spread; the database will not be destroyed. For the first point, the system will use a database with a security function, and the necessary fields will be converted and stored; for the second point, it is mainly guaranteed by environmental security; for the third point, it is mainly by Business Network Perform redundant protection on the database.

Algorithm security: The system uses the most advanced Rijndael algorithm as the core algorithm, uses a 128-bit key, and has a high encryption strength. Suppose a machine that can find the DES key within one second (for example, try 255 keys per second), if you use it to find the Rijndael key, it will take about 149 trillion years. The system also uses other algorithms and data structures in accordance with cryptography. Rainbow World can ensure that the content protected by this system cannot be cracked within ten years without the user knowing the key.

Since the key is randomly generated by the developer tool at the developer and stored in the database, as long as the internal security of the developer is guaranteed, the security of the key can be guaranteed at the same time. Rainbow World Company also guarantees that the key will not be leaked in this system.

I want to contribute
2020 National Education Equipment Cloud Exhibition
Purchasing QR code

Sweep, welcome attention

Official WeChat of Educational Equipment Procurement Network

Master the latest and most authoritative information in the education equipment industry

Copyright and Disclaimer:

â‘  The copyright of all works on this website that indicate "Source: China Education Equipment Purchasing Network" belongs to China Education Equipment Purchasing Network, and may not be reproduced, edited or used in other ways without authorization from this website. Works that have been authorized by this website should be used within the scope of authorization, and indicate "Source: China Education Equipment Purchase Network". Violators of this website will be held accountable for legal liabilities.

â‘¡ All works on this website that indicate "Source: XXX (non-this website)" are reproduced from other media. The purpose of this reprint is to transmit more information. This does not mean that this website agrees with its views and is responsible for its authenticity. Take direct responsibility and joint liability for infringement of such works. If other media, websites or individuals download and use it from this website, they must keep the "source of the manuscript" indicated on this website, and bear the legal responsibility of copyright and other.

â‘¢ If the content of the work, copyright and other issues are involved, please contact this website within two weeks from the date of publication of the work, otherwise it is deemed to waive the relevant rights.

See-through Gas Logs

ABLE See-through Gas Logs, made of light ceramic raw materials, light weight but strong not easy to break, hand-painted, natural colors and amazing details & realistic shapes, easy turn redness in the fire, can enhance the fireplace flame, all made of inorganic materials, odorless, fire-resistant temperature >900℃, product can be used for a long time, with reasonable price.
ABLE also have advanced molding technology for ceramic log called cast log, it is lighter, stronger, fuller details, and glowing area is larger in the fire.ABLE can supply many kind of log accessories for fireplace, such as pebbles, coals, charcoals, pine cones, maple leaves, aglow ember, top-grade rock wool, stained vermiculite, small coal chips, barks, balls and hollow ball, ceramic pitted pebble and rough Lava rock that won't burst in outdoor fire pit, Pumpkin lamp, Skull and bone for Halloween Decor fire, fireplace log grate etc.
ABLE factory is located in Yixing City, Jiangsu. It is a well-known production base for fire resistant insulation materials and environmental protection products. Yixing is also a city has developed commerce and convenient transportation. Our company sincerely hopes to cooperate with professional customers, and welcome to visit our factory!


See-Through Gas Logs,Double Sided Gas Logs,See Through Gas Log Set,See Through Fireplace Gas Logs

Yixing Able Ceramic Fibre Products Co., Ltd , https://www.ablegaslogs.com