首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 109 毫秒
1.
岳成亮  孟波  姜韬 《电视技术》2024,(3):217-219
在数字化时代,广播电视系统面临着前所未有的内容安全管理挑战。内容盗版问题、数据篡改和安全漏洞、内容分发的透明度和可追溯性问题以及用户隐私保护等问题日益凸显,对行业的可持续发展构成严峻挑战。对此,深入探讨区块链技术如何应对广播电视系统内容安全管理中的关键挑战,分析区块链技术的基本原理和应用案例,阐述区块链技术在广播电视系统中的具体应用方法和潜在价值,提出一套基于区块链技术的广播电视系统内容安全管理方案。  相似文献   

2.
正在"BIRTV产品技术及应用项目评选"活动中,由北京捷成世纪科技股份有限公司与北京博威康技术有限公司联合研发的"播出一致性监测系统"得到了评审组的一致肯定,荣获产品大奖。播出内容一致性监测系统是一种全新的基于"内容一致性比对技术"针对广播电视播出与传输系统的播出品质、传输品质监测的新一代监测系统。内容一致性比对技术是捷成公司与博威康公司提出的一种全新的信号传输品质与  相似文献   

3.
当今在广播电视网络和互联网快速发展的背景下,内容服务运营商拥有大量的、形式多样(实况、离线内容)、不同类别(音乐、视频)的媒体内容。随之而来的问题是,这些不同形式、不同类别的内容需要采用不同的技术方式推送给用户。技术手段的多样性,会使信息传送、用户接收等方面变得复杂,那么如何在不同技术手段背后建立一个统一的平台来展示、使用、观看和接收所有的媒体内容是进一步开展视频内容新服务必须要解决的问题。本文构建出一种视频推送业务模式,详细介绍了该模式的业务架构、技术机构系统接口模型以及系统功能,并在此基础上,提出一个基于网络视频的内容推送技术系统实现了对多样化技术的统一。  相似文献   

4.
基于数据挖掘的个性化智能推荐系统应用研究   总被引:1,自引:0,他引:1  
在当前家庭数字化日趋普及的环境下,为了给用户提供一种智能型、个性化的多媒体内容推荐服务,通过研究协同式信息过滤技术,结合数据挖掘技术,设计并实现了一个智能型、个性化的多媒体推荐系统。系统可以根据用户的使用习惯、使用时间、使用环境以及最近选择的项目进行分析,进行判断后列出最优推荐资源。系统通过研究个人信息的自我学习技术、个性化特征分析技术以及多媒体内容的搜寻技术,将上述技术应用在推荐服务系统中,具有一定的实际意义。  相似文献   

5.
<正> 一、表面组装技术系统概况表面组装技术(SMT)是一门包括元器件、组装设备、焊接方法及组装辅助材料等内容的综合性系统技术。  相似文献   

6.
本系统综合运用J2EE技术、J2ME技术、UML建模技术以及MVC框架技术,提出了一种通用的手机网络游戏系统框架,从而使移动手机网络游戏管理平台和内容分离.文章给出了手机网络游戏系统表单与流程设计.  相似文献   

7.
高级内容访问系统(Advanced Access Content System,简称AACS)是一种为了保护数字内容安全合法被传播使用的基于加密、认证机制的技术.全文从内容保护链、基于录制与预录制介质内容加解密的实现原理两个方面介绍此技术,并分析该技术基于录制和预录制的内容保护的安全性.  相似文献   

8.
王炜 《现代电视技术》2012,(2):140-141,79
一电视台生产系统面临的挑战 IT技术的发展拓展了信息来源的渠道,大规模媒体内容生产和消费的需求出现;与此同时,IT技术的进步也促进了电视台网络化、文件化生产系统的发展,满足了业务需求。当前,AV+IT已经成为了电视台生产系统的主流,而随着全媒体时代的到来.内容消费呈现全新的特点.生产系统也面临着前所未有的挑战。  相似文献   

9.
互联网电视作为一种新兴的传播方式,已逐渐走入普通百姓家庭。本文主要介绍互联网电视内容监管系统的组成、总体功能、软件总体设计及关键技术。该系统的建立为互联网电视内容的监管提供了有力的技术支撑。  相似文献   

10.
现有SDICN(软件定义信息中心网络)技术方案难以支持海量内容分发、交换和缓存组件的分别升级。文章提出一种基于覆盖网络的SDICN系统架构,由网络边缘的缓存节点转发内容请求和缓存内容数据,缓存与交换不再耦合,克服了现有技术方案的上述局限;基于SDN(软件定义网络)的集中式控制,避免了覆盖网络系统的次优控制问题。原型系统实验分析表明,所提系统可直接运行于通常的SDN中,少量的边缘节点即可有效减少内容分发响应时间。研究结果有利于SDN和ICN(信息中心网络)技术的扩展及应用。  相似文献   

11.
This paper presents a digital rights management (DRM) system for digital broadcasting based on home servers (DBHS) using receivers with large-capacity storage devices. DBHS will enable viewers to enjoy 'television anytime/anywhere' by utilizing these storage functions. Our proposed DRM system is suitable for broadcasting, and allows both rights protection and advanced access to content held on home storage devices (in terms of validity, usage and charge conditions, and so on). We developed a prototype DRM system using a Pentium3 personal computer (1 GHz) in order to evaluate the nonlinear playback and 'trick-play' modes of encrypted content on the hard disk drive (HDD). Using this prototype, we confirmed that the nonlinear playback of content encrypted using the proposed DRM system could be processed in real time. The functionality in terms of trick-play modes was equal to that of commercially available hard disk recorders. In addition, we developed a security module for the DRM system in the form of a smart card with a built-in processor. We confirmed that the proposed DRM system utilizing the new smart card could be applied to DBHS.  相似文献   

12.
As the number of digital content service providers increases, a variety of digital rights management (DRM) systems appear without supporting interoperability. The lack of interoperability in DRM systems causes inconvenience to customers, especially when they want to play content through multiple devices manufactured by different vendors. In this letter, we propose a novel method to support interoperability between different DRM systems. The proposed technique aims to build an open framework structure which satisfies DRM vendors' requirements by enhancing the security of intellectual property management and the protection tools.  相似文献   

13.
数字版权管理(DRM)技术是IPTV系统中的一项关键技术,它能有效地保护IPTV系统的安全和媒体内容版权的安全。AVS数字媒体版权管理标准(AVSDRM)致力于保护数字媒体内容的版权,AVSDRM标准针对IPTV平台专门提出了网络电视档。就AVSDRM标准在IPTV中的应用进行分析研究,以AVSDRM网络电视档参考模型为基础结合IPTV的平台特点以及业务特点提出了IPTVDRM系统架构,并详细描述了IPTVDRM系统模块、密钥体系及工作流程。  相似文献   

14.
The widespread use of the Internet has led to the problem of intellectual property and copyright infringement. Digital rights management (DRM) technologies have been developed to protect digital content items. Digital content can be classified into static content (for example, text or media files) and dynamic content (for example, VOD or multicast streams). This paper deals with the protection of a multicast stream on set‐top boxes connected to an IP network. In this paper, we examine the following design and architectural issues to be considered when applying DRM functions to multicast streaming service environments: transparent streaming service and large‐scale user environments. To address the transparency issue, we introduce a ‘selective encryption scheme'. To address the second issue, a ‘key packet insertion scheme’ and ‘hierarchical key management scheme’ are introduced. Based on the above design and architecture, we developed a prototype of a multicasting DRM system. The analysis of our implementation shows that it supports transparent and scalable DRM multicasting service in a large‐scale user environment.  相似文献   

15.
As networks increase and cross‐convergence occurs between various types of devices and communications, there is an increasing demand for interoperable service in the business environment and from end users. In this paper, we investigate interoperability issues in the digital rights management (DRM) and present a practical framework to support interoperability in environments with multiple devices. The proposed architecture enables end users to consume digital content on all their devices without awareness of the underlying DRM schemes or technologies. It also enables DRM service providers to achieve interoperability without costly modification of their DRM schemes.  相似文献   

16.
OMA DRM技术体系研究综述   总被引:1,自引:0,他引:1  
为了对最新发布的开放移动联盟(OMA)数字版权管理(DRM)标准的技术体系结构有一个系统全面的认识,积极推动我国DRM标准的制定和数字内容保护技术的应用研究,该文在深入研究最新发布的OMA DRM2. 0规范的基础上,对OMA DRM技术体系结构:版权对象获取协议(ROAP)、安全模式、体系结构、内容格式和版权描述语言进行了详细分析,然后从综合角度给出一个系统全面的OMA DRM工作机制:OMA DRM 工作流程和原理,最后,对OMA DRM性能做了详细分析:OMA DRM2. 0和OMA DRM1. 0的主要区别,以及OMA DRM2. 0的尚待改进之处。  相似文献   

17.
In this paper, we propose a key management scheme which can provide delivery of the key used to encrypt a digital content from the package server to digital rights management (DRM) clients in a secure manner. The proposed scheme can protect digital content from attacks since an encrypted digital content is sent by a package server and only DRM clients can decrypt the encrypted digital content. It protects the key not only from purchasers but also among the other principals who manage the distribution and license servers.  相似文献   

18.
Digital rights management (DRM) mechanisms, built upon trusted computing platforms, promise to give content providers the ability to impose rules reliably and deterministically on end-user experiences with information resources ranging from literary works and scholarly publications to a vast array of entertainment content. DRM represents just the first wave of a class of technologies that aspire not only to implement copyright-protecting usage controls on computing devices, but increasingly to take on the enforcement of a broader set of organizational and public policies. The paper focuses on policy enforcement in the specific context of content use. It reviews the concepts and architecture of policy specification and enforcement, citing examples from the special case of DRM, and provides a detailed discussion of how usage control policies are evaluated in DRM systems. Since the expression and interpretation of policies is only one "layer" of the general problem of persistent policy enforcement, we consider the role that trusted computing systems can play in ensuring that computing agents interpret policies in reliable and deterministic ways. Finally, we consider the challenges inherent in the construction of technical mechanisms that mimic social policies.  相似文献   

19.
The growing features of multimedia distribution across multiple smart devices have attained significant attention of many industries and users. In this context, digital rights management (DRM) is the system, which tries to ensure authorized content distribution. For much diverse and productive research in content distribution, DRM is paying attention to provide a better DRM protocol according to current requirements. But the violation of copyright protection of digital content (video, audio, and secret documents) still has a significant issue of concern. Not only solely copyright protection but also stolen smart cards which keep the license and more specific information of a user is also an attentive concern of DRM users. In this paper, we introduced an authenticated key agreement protocol which maintains secure and authorized content distribution with successful smart card revocation. Moreover, the proposed scheme has simulated under AVISPA tool, which informally confirms the security of the protocol. The formal proof security is given in the random oracle model and then done the performance evaluation. The comparison with the relevant existing schemes shows the advantage of the proposed scheme. It identified that the proposed protocol achieves all the desirable security and performance attributes with valid smart card revocation.  相似文献   

20.
In the modern world, digital content has been massively produced, distributed, and consumed by human beings; consequently, how to protect the rights and benefits of content consumers, producers, and distributors has become a crucial issue. One promising solution is to design a full‐fledged digital rights management (DRM) system. In this study we introduce a new design on the digital rights management system providing user privacy, usage transparency, and superdistribution. A comprehensive set of DRM processing functions and corresponding mechanisms are developed in our system to support various business process requirements. Superdistribution support is embedded in our system design. A prototype is implemented to verify our system design. To protect consumer privacy, a temporary identity is generated for each consumer using the KryptoKnight protocol. Elliptic curve cryptography‐based encryption scheme is adopted for messages transmitted among servers and client over an unsecure communication channel. For usage transparency, a user‐friendly DRM client package (software) is introduced in the proposed DRM system to achieve content protection and support user convenience in usage.Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号