共查询到20条相似文献,搜索用时 984 毫秒
1.
介绍数字视频广播(Digital Video Broadcasting,DVB)条件接收系统的系统结构,详细分析了条件接收系统的工作原理,并给出条件接收系统的解扰器工作流程及实现方案。 相似文献
2.
介绍了利用红外线的发射与接收所构成的光束保护系统。红外线的发射与接收形成一“安全网” ,利用其档光性能 ,可以实现安全防范功能。为提高系统抗干扰性能 ,采用调制的红外光线 ,经过信号处理 ,驱动继电器动作 ,从而实现报警和保护。重点阐述了光束保护系统的基本工作原理 ,并给出了主要硬件原理图。 相似文献
3.
本文介绍了下变频的基本原理,以及如何利用下变频器HSP50216对不同的调制信号进行解调,并给出了一个接收系统设计方案,利用HSP50216具有四个独立可编程通道的特点和相位自适应解调原理,实现针对发送端的变化的自动化接收。 相似文献
4.
随着无线互联技术和移动终端技术的发展,手机等移动终端用户对蓝牙产品的功能提出了更高的要求。蓝牙采用推送技术进行数据传输,用户只能选择是否接收,不能对蓝牙发送端的数据进行自主交互浏览。采用J2ME和蓝牙技术实现一种在移动蓝牙终端上使用的交互式系统,有效地利用了J2ME 跨平台的优势,以及蓝牙传送数据易用性和实用性等优点。根据对JSR82规范提供的Java蓝牙无线技术API的研究,给出了蓝牙交互式系统的设计方案和系统结构。通过J2ME的无线应用开发包和MIDlet编程模型,实现了交互式系统。 相似文献
5.
本文在对HOOK技术特点和DRM系统功能需求分析的基础之上,指出了HOOK技术在DRM中的典型应用,找到了防止文件内容复制的新方法,并给出了其实现的方法。 相似文献
6.
介绍了利用红外线的发射与接收所构成的光束保护系统,红外线的发射与接收形成一“安全网”,利用其挡光性能,可以实现安全防范功能,为提高系统抗干扰性能,采用调制的红外光线,经过信号处理,驱动继电器动作,从而实现报警和保护,重点阐述了光束保护系统的基本工作原理,并给出了主要硬件原理图。 相似文献
7.
Push VOD系统的推行和发展给数字内容保护技术带来了更大的挑战,传统的条件接收技术已不能满足Push VOD系统的安全性需求。结合现有数字版权保护技术,提出了一种Push VOD DRM系统的设计方案。该系统将DRM技术与CA技术融合,对整个系统的密钥管理逻辑进行了深入的研究,实现对数字内容整个生命周期的保护,满足了Push VOD系统的安全性需求,也为Push VOD系统提供了付费业务的支撑。 相似文献
8.
9.
为实现磁浮列车间隙传感器的无线在线检测,设计了一种基于蓝牙的无线检测系统.该系统由数据采样、数据接收处理与无线发射模块构成.系统采用成熟的蓝牙传输模块,缩短了设计周期,具有成本低、体积小、可靠性高等特点.检测系统的实际使用表明,系统结构简单,大大降低了传感器检测维护的工作量,从而提高了效率. 相似文献
10.
11.
全球范围的数字广播系统DRM(Digital Radio Mondiale),是一种针对30MHz以下频段的数字声音广播系统。和传统广播系统相比,DRM数字广播系统在声音质量上是模拟调幅广播无法比拟的。这其中的关键之一在于DRM系统引入了新的信源编解码技术——MPEG-4标准的AAC(Advanced Audio Coding,先进音频编码)。在分析符合DRM标准的AAC音频编码器原理基础上,提出了一种改进的离散余弦变换算法,并在PC上实现了基于该算法的AAC音频编码器。实验表明,该软件编码器能够满足DRM系统实时性要求。 相似文献
12.
An attempt to capture software aging and specify when to do preventive maintenance (PM) is presented in this paper. A composite measure termed the DRM, Deteriorating Response Measure, is defined. It is based on the analysis of the deteriorating speed of the software against time and load. This speed is characterized as follows: (1) It decays with increased load. (2) It does not increase again when the load decreases, this indicates loss of elasticity. The DRM is mathematically formulated based on a queueing system model.Specifying when to do preventive maintenance depends on the decision maker's perspective of the manifestation of aging. It is tried here to formalize this dependence. Three degrading performance metrics are defined for a DRM: (1) Decaying restored speed value. (2) Increasing speed offset ratio (recoverability index). (3) Increasing operation interval offset. These metrics can be used singly or aggregately in a DRM to specify when to do preventive maintenance. Results of model testing are also shown.This work can be part of an on-line procedure that calculates performance indexes for a server type software system like a web browser, an operating system, a database, and helps in the decision to do preventive maintenance for aging software. 相似文献
13.
A personal mobile DRM manager for smartphones 总被引:1,自引:0,他引:1
In this paper we report on our experience in building the experimental Personal Digital Rights Manager for Motorola smartphones, an industry first.Digital Rights Management allows producers or owners of digital content to control the manner in which the content is consumed. This may range from simply preventing duplication to finer access policies such as restricting who can use the content, on what devices, and for how long. In most commercial DRM systems, the average end user plays the role of content consumer, using DRM protected content made available by a service. Here we present a personal digital rights system for mobile devices where the end user has the ability to place DRM protection and controls on his or her own personal content.We designed the personal DRM system to allow users of a mobile device to transparently define controls and generate licenses on custom content and securely transfer them to other mobile devices. A user is able to define and restrict the intended audience and ensure expiration of the content as desired. Compatible devices automatically detect each other and exchange credentials. The personal DRM system on each device safely enforces the content usage rules and also handles moving licenses between devices while preventing leakage of content. We implemented a prototype of our system on Motorola E680i smartphones. 相似文献
14.
15.
A flexible and lightweight user‐demand DRM system for multimedia contents over multiple portable device platforms
下载免费PDF全文
![点击此处可从《Software》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Eric Hsiaokuang Wu Shumin Chuang Chen‐Yen Shih Hao‐Che Hsueh Shih‐Syuan Huang Hsiao‐Ping Huang 《Software》2017,47(10):1417-1441
With the rapid development of technology, digital multimedia has been widely utilized. Access of multimedia contents has become a daily routine. Although multimedia brings ease and convenience for content sharing, it also makes piracy more feasible. For example, it is easy to upload a copyrighted video to YouTube without the owners' permission. Authors and merchants are very much in need of protecting their intellectual property and commercial profits. Digital right management (DRM) systems are provided to fulfill this desire. DRM is a collection of techniques used to control access to copyrighted materials. Because current enterprise DRM solutions are not allowed for customized modification, they cannot fit in our considered scenario perfectly. As a result, we propose a secure DRM system with a design based on user demands, where a consumer can access contents only on authenticated devices until the authorization expires. Our DRM scheme involves a series of robust cryptosystems including AES, SHA‐256, and RSA. Applications as DRM agents are implemented on Windows, Mac OS, Android, and iOS platforms. Moreover, we modularized the DRM components for easy extension and integration. For better performance on low‐end devices, parameters of encryption are introduced, namely, the key size and the encryption density. We addressed the mask shift problem caused by random access and implemented the device identifier acquirement. The DRM system also proved to have high security and good performance in our analysis. Copyright © 2017 John Wiley & Sons, Ltd. 相似文献
16.
17.
18.
Much of what modern digital rights management (DRM) systems attempt to accomplish was actually forcefully implemented on videogame consoles beginning with the Nintendo Entertainment System (NES) and SEGA Genesis system in the early 1980s. Examining the links between modern DRM mechanisms and these early production and copy protection systems can help contextualize the future of media production and access. 相似文献
19.
DRM系统的安全性依赖于其信任组件的安全性,该信任组件处于非安全的环境,其安全模型与基于互联网的系统的安全模型有着本质的区别。本文讨论了当前DRM系统的信任组件所采用的安全技术,并着重分析了基于DRM的电子书管理策略和信息组件模型的开发,提出了一个基于机器硬件指纹识别的DRM技术方案,该模型的实现将对数字图书馆的构建具有重要的实际意义。 相似文献
20.