首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
As the number of digital content service providers increases, a variety of digital rights management (DRM) systems appear without supporting interoperability. The lack of interoperability in DRM systems causes inconvenience to customers, especially when they want to play content through multiple devices manufactured by different vendors. In this letter, we propose a novel method to support interoperability between different DRM systems. The proposed technique aims to build an open framework structure which satisfies DRM vendors' requirements by enhancing the security of intellectual property management and the protection tools.  相似文献   

2.
The long march to interoperable digital rights management   总被引:8,自引:0,他引:8  
This paper discusses interoperability of digital rights management (DRM) systems. We start by describing a basic reference model for DRM. The cause of interoperability is served by understanding and circumscribing what DRM is "in the whole." Then we outline and contrast three different approaches to achieving interoperability. One approach relies on flexible network services to provide functionality where it is needed, perhaps by bridging different systems. We describe an experimental service orchestration system (NEMO) that enables such an approach.  相似文献   

3.
李吟虹  毛敏 《信息技术》2007,(10):157-160
数字版权管理技术可以使内容提供商有效地控制他们的数字媒体对象的发布。它可以限制用户的操作,用户的使用次数,规定用户使用的起止时间或者提供预览功能等等。从介绍DRM的基本原理及功能出发,阐述了DRM的架构及其核心技术,最后介绍了如何把它运用在移动增值业务上的实现步骤。  相似文献   

4.
In order to achieve fine-grained access control in cloud computing,existing digital rights management(DRM) schemes adopt attribute-based encryption as the main encryption primitive.However,these schemes suffer from inefficiency and cannot support dynamic updating of usage rights stored in the cloud.In this paper,we propose a novel DRM scheme with secure key management and dynamic usage control in cloud computing.We present a secure key management mechanism based on attribute-based encryption and proxy re-encryption.Only the users whose attributes satisfy the access policy of the encrypted content and who have effective usage rights can be able to recover the content encryption key and further decrypt the content.The attribute based mechanism allows the content provider to selectively provide fine-grained access control of contents among a set of users,and also enables the license server to implement immediate attribute and user revocation.Moreover,our scheme supports privacy-preserving dynamic usage control based on additive homomorphic encryption,which allows the license server in the cloud to update the users' usage rights dynamically without disclosing the plaintext.Extensive analytical results indicate that our proposed scheme is secure and efficient.  相似文献   

5.
The growing features of multimedia distribution across multiple smart devices have attained significant attention of many industries and users. In this context, digital rights management (DRM) is the system, which tries to ensure authorized content distribution. For much diverse and productive research in content distribution, DRM is paying attention to provide a better DRM protocol according to current requirements. But the violation of copyright protection of digital content (video, audio, and secret documents) still has a significant issue of concern. Not only solely copyright protection but also stolen smart cards which keep the license and more specific information of a user is also an attentive concern of DRM users. In this paper, we introduced an authenticated key agreement protocol which maintains secure and authorized content distribution with successful smart card revocation. Moreover, the proposed scheme has simulated under AVISPA tool, which informally confirms the security of the protocol. The formal proof security is given in the random oracle model and then done the performance evaluation. The comparison with the relevant existing schemes shows the advantage of the proposed scheme. It identified that the proposed protocol achieves all the desirable security and performance attributes with valid smart card revocation.  相似文献   

6.
We propose a new service for digital mobile communication systems. The service enables two or more users to hold a secure conference. Two requirements must be considered: privacy and authentication. Privacy involves ensuring that an eavesdropper cannot intercept the conversations of the parties holding the conference. Authentication involves ensuring that service is not obtained fraudulently in order to avoid usage charges. We present two new conference key distribution schemes for digital mobile communication systems. In these schemes, a group of users can generate a common secret keg over a public channel so that they may hold a secure conference  相似文献   

7.
针对云计算环境中数字内容安全和用户隐私保护的需求,提出了一种云计算环境中支持隐私保护的数字版权保护方案。设计了云计算环境中数字内容版权全生命周期保护和用户隐私保护的框架,包括系统初始化、内容加密、许可授权和内容解密4个主要协议;采用基于属性基加密和加法同态加密算法的内容加密密钥保护和分发机制,保证内容加密密钥的安全性;允许用户匿名向云服务提供商订购内容和申请授权,保护用户的隐私,并且防止云服务提供商、授权服务器和密钥服务器等收集用户使用习惯等敏感信息。与现有的云计算环境中数字版权保护方案相比,该方案在保护内容安全和用户隐私的同时,支持灵活的访问控制,并且支持在线和超级分发应用模式,在云计算环境中具有较好的实用性。  相似文献   

8.
周岩  沈钊  张志恒  张青春 《电视技术》2006,(10):88-90,96
通过分析当今流媒体数字版权管理(DRM)的发展现状,提出了流媒体DRM系统存在的互操作性问题及解决主要途径.结合国外对流媒体DRM系统互操作性的研究,对如何构建一个互操作性体系平台进行了探讨.  相似文献   

9.
数字电视版权管理体系结构研究   总被引:2,自引:2,他引:0  
通过对数字版权管理(Digital Rights Management,DRM)系统参考模型、密钥管理体系的研究分析,总结出数字电视版权管理的分层体系结构,将数字版权管理系统前端和终端各分为6层:应用层、会话层、权利描述层、权利实施层、底层资源层和硬件层,并对每一层进行了分析;通过建立抽象的数字电视版权管理分层模型,分析分层模型的各层及层间交互协议,找到实现DRM系统互操作的途经;不同层次的标准化将实现不同程度上的互操作.  相似文献   

10.
The online social networks(OSNs) offer attractive means for social interactions and data sharing, as well as raise a number of security and privacy issues. Although current solutions propose to encrypt data before sharing, the access control of encrypted data has become a challenging task. Moreover, multiple owners may enforce different access policy to the same data because of their different privacy concerns. A digital rights management(DRM) scheme is proposed for encrypted data in OSNs. In order to protect users' sensitive data, the scheme allows users outsource encrypted data to the OSNs service provider for sharing and customize the access policy of their data based on ciphertext-policy attribute-based encryption. Furthermore, the scheme presents a multiparty access control model based on identity-based broadcast encryption and ciphertext-policy attribute-based proxy re-encryption, which enables multiple owners, such as tagged users who appear in a single data, customize the access policy collaboratively, and also allows the disseminators update the access policy if their attributes satisfy the existing access policy. Security analysis and comparison indicate that the proposed scheme is secure and efficient.  相似文献   

11.
This article introduces a novel, open, and scalable service architecture for context-aware personal communication. In contrast to the network-centric open service access in third-generation mobile networks, this architecture moves the point of integration for user services out to the mobile devices, where we can create support for context-aware computing and communication. Support for peer-to-peer service negotiation with minimal a priori shared knowledge, context representation, and reasoning about context enables the mobile agents (that represent users and other entities) to be aware of and react to any event and thus context. Hence, the delivery of context-aware applications to users intertwining digital and physical objects in mobile interactive spaces leverages events from sensors, mobility support, and digital entities. Finally, a presentation of our prototype and experiences from the HotTown project demonstrates the feasibility of the approach and provides some examples of the enabled user communication for large-scale mobile networks.  相似文献   

12.
Mobility offers a great deal of advantages. However, mobile users are currently restricted by the network coverage of providers, their access network technologies and the networking capabilities of mobile devices. Moreover, mobile users have to be involved in time consuming and inflexible manual interactions with internet access service providers in order to sign long term contracts. In this paper, a novel framework, which liberates mobile users from predefined, long-term contracts, is presented. This framework enables mobile users to dynamically acquire any kind of Internet Service, irrespectively of their location and the mobile device used. This is based on the automation of the service acquisition process and the collaboration of providers that is required to satisfy end-users’ requests. The flexible communication and negotiation framework that was defined enables automated negotiations between all parties and can be used as basis towards automated service acquisition for mobile users in future internet.  相似文献   

13.
Nowadays, Instant Messaging is a very successful service thanks to its versatility and simplicity in the communication offered to users, which is a key feature for the demanding environment of connectivity and mobility that modern society requires. With the success of mobile telephony, new alternatives for this kind of services appear however, an environment of low and complex interoperability was the result of protocols and transport technologies diversity. This article describes PAUMIN (Universal Access Platform to Mobile Instant Messaging), a universal platform that enables the communication between different instant messaging providers using mobile devices. This project was performed by the Mobile and Wireless Applications Development Interest Group (W@PColombia), assigned to Telematics Engineering Group, University of Cauca, Colombia.  相似文献   

14.
At present, most mobile terminals do not have any functions of rights management, and the cryptology-based method cannot resolve all the copyright problems in the mobile digital distribution service. With the urgent demand of digital rights management in digital distribution service, a scheme independent of terminals is proposed in this article. It integrates the watermark and signature techniques. In this article the scheme theory, architecture, service process, and performance are mainly discussed. In the end, the functional relationship between the proposed digital rights management (DRM) and the cryptology-based open mobile alliance digital rights management (OMA-DRM) is given. The analysis shows that the scheme is feasible and secure.  相似文献   

15.
本文分析了移动数字内容分发业务版权管理的必要性,版权管理国际标准、解决方案及存在的问题.  相似文献   

16.
17.
富媒体技术研究及在IPTV增值业务中的应用   总被引:1,自引:0,他引:1  
本文介绍了富媒体技术在IPTV增值业务中的实现方案,并根据IPTV增值业务的场景需求,详细描述了三网融合下的新型业务展现方式和互动使用方式,并介绍了现有IPTV平台平滑改造升级,支持富媒体技术的建设思路和方案。  相似文献   

18.
Can digital rights management be standardized?   总被引:1,自引:0,他引:1  
With increasing use of the Internet as a content-distribution platform, mere interoperability of the codec is no longer sufficient if content owners are not prepared to distribute their content online for fear of piracy. Therefore, one also needs interoperability in the area of managing and protecting related intellectual property rights. To provide interoperability of digital rights management (DRM) systems to protect the content rather than the distribution channel, MPEG has embarked on developing intellectual property management and protection (IPMP) specifications targeted at the content itself that are natively built into its standards. It is the hope that such standards will allow for interoperability of content commerce systems, giving consumers more choice, while providing rights holders with the tools to effectively protect their assets and to develop complex and attractive business offering to tempt consumers. While it remains uncertain whether standardization is in fact the right vehicle to provide the e-content market with an impetus to grow, it appears that MPEG is working on a set of specifications with relatively good chances of helping to achieve this goal.  相似文献   

19.
《Multimedia, IEEE》2002,9(4):76-81
We need a robust method to assure secure storage, retrieval, and transmission of such digital data, especially for mobile devices. This has become more apparent after hearing the high-profile story of Napster. This new type of music delivery service brought up issues of how to protect copyrighted data, particularly in the new generation of peer-to-peer distribution schemes. Furthermore, the rapid penetration of mobile phones worldwide suggests that downloading copyrighted data onto these portable devices is possible around the clock at any place. I primarily focus on the copyright management of Secure MultiMediaCards (SecureMMCs) to handle users' access to digital copyrighted data in a unique scheme called Super Distribution. Using SecureMMCs, Super Distribution technology can build legitimate peer-to-peer systems where copyrighted data are freely copied and exchanged, but users must obtain the right to use the data. Users may then be charged to reimburse the copyright holders. I also discuss Keltaide-Music, a mobile phone music distribution service using SecureMMCs  相似文献   

20.
王广义 《信息通信》2007,20(4):45-47
文章首先介绍了数字版权管理的基本原理,然后描述了DRM的三种内容分发方式,并讨论了专用于移动网络流媒体DRM的内容格式及相关的业务流程,最后对OMA DRM的发展趋势作了简要分析.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号