共查询到20条相似文献,搜索用时 93 毫秒
1.
DRM数字技术的新发展 总被引:2,自引:1,他引:1
本文综述了近两年来DRM数字技术在全世界范围内的发展,包括正规发射DRM节目的电台越来越多,DRM发射设备的进步,DRM接收机的陡速发展,DRM工作频段将扩展到120MHz(DRMplus)等方面的信息。 相似文献
2.
3.
4.
在我国,DRM的研究正处于快速升温阶段,北京数码视讯科技有限公司适时推出的Digital Media Guard DRM系统能够实现对实时流的版权保护,同时也能完成对库存的数字媒体内容的版权保护,把DRM引入到数字电视和IPTV领域,让DRM和CAS各司其职,提出了DRM+CAS的解决方案。 相似文献
6.
7.
数字版权管理技术的研究现状及在数字电视系统中的应用 总被引:5,自引:0,他引:5
介绍了数字版权管理(DRM)技术的研究现状,讨论了DRM的基本概念及具备的技术特点,研究了DRM在数字电视中的应用方案,最后探讨了其产业的发展和应用。 相似文献
8.
本文介绍了2004年江苏台在Dx10发射机上进行DRM中波数字广播实验的具体情况,包括了对Harris公司的DRM升级包及实验设备和Dx10发射机的DRM改造过程的介绍,并对DRM与普通AM模式下的工作状况和音质及收听效果进行了比较分析,并提出了自己的一些看法。 相似文献
9.
10.
自2003年6月16日在日内瓦进行DRM播出,世界调幅广播真正步入数字调幅广播时代,音频质量发生了质的改善,使广大收听者耳目一新,多种附加信息业务为众多的广播者带来巨大利益。在我国数字调幅广播即将到来之际,本文介绍一套完整的DRM广播链路系统,该方案是Thales公司特别为中波数字广播所推荐使用。 相似文献
11.
主要讨论了DRM在IPTV保障网络信息安全中应用的相关问题,并根据IPTV DRM所具有的特点、运营模式,分析出IPTV DRM保证内容安全的技术手段.针对当前国内IPTV的现状以及未来的发展,讨论了基于模块多键型的IPTV DRM方案的解决标准. 相似文献
12.
随着Internet的普及以及信息检索技术的迅猛发展,网络已经成为人们获得各种数字化产品的重要途径。数字权限管理(DRM)能在利用网络便捷性的同时保证产品提供者和使用者的权益,因此近年来得到越来越广泛的应用。针对现有DRM系统难以适应大规模、开放式环境下的应用,论文提出了一种基于ABE的新型链式ABAC—DRM模型。 相似文献
13.
ERICKSON J.S. MULLIGAN D.K. 《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》2004,92(6):985-996
Digital rights management (DRM) mechanisms, built upon trusted computing platforms, promise to give content providers the ability to impose rules reliably and deterministically on end-user experiences with information resources ranging from literary works and scholarly publications to a vast array of entertainment content. DRM represents just the first wave of a class of technologies that aspire not only to implement copyright-protecting usage controls on computing devices, but increasingly to take on the enforcement of a broader set of organizational and public policies. The paper focuses on policy enforcement in the specific context of content use. It reviews the concepts and architecture of policy specification and enforcement, citing examples from the special case of DRM, and provides a detailed discussion of how usage control policies are evaluated in DRM systems. Since the expression and interpretation of policies is only one "layer" of the general problem of persistent policy enforcement, we consider the role that trusted computing systems can play in ensuring that computing agents interpret policies in reliable and deterministic ways. Finally, we consider the challenges inherent in the construction of technical mechanisms that mimic social policies. 相似文献
14.
The Open Mobile Alliance (OMA) is an industry forum with nearly 400 members representing the entire mobile industry value chain, including the telecommunications, information technology, and content industries. The OMA focuses on developing market-driven, interoperable mobile service enablers for the rapidly converging communications, entertainment, and media worlds. OMA digital rights management (DRM) systems are important examples of such enablers. Although they have been developed for the mobile market, these systems assume network and bearer-agnostic delivery of the content over Internet protocol (IP). This assumption makes OMA DRM systems suitable for use in any environment where the content is delivered over IP, which is true of a very wide array of applications. In this article, we present an overview of the OMA DRM systems and describe their most important features 相似文献
15.
数字版权管理技术的安全性综述 总被引:1,自引:0,他引:1
数字版权管理技术已经成为网络环境下保护数据内容的合法交易、传播和使用的一个重要手段。论文主要阐述了数字版权管理技术在安全性方面的最新进展,给出了数字版权管理标准的发展情况,分析了数字版权管理系统的安全性需求,总结了与数字版权管理有关的安全技术,论述了已有的技术在处理安全性问题上的优势和不足,随后给出了数字版权管理的安全解决方案并探讨了未来的发展方向。 相似文献
16.
The growing features of multimedia distribution across multiple smart devices have attained significant attention of many industries and users. In this context, digital rights management (DRM) is the system, which tries to ensure authorized content distribution. For much diverse and productive research in content distribution, DRM is paying attention to provide a better DRM protocol according to current requirements. But the violation of copyright protection of digital content (video, audio, and secret documents) still has a significant issue of concern. Not only solely copyright protection but also stolen smart cards which keep the license and more specific information of a user is also an attentive concern of DRM users. In this paper, we introduced an authenticated key agreement protocol which maintains secure and authorized content distribution with successful smart card revocation. Moreover, the proposed scheme has simulated under AVISPA tool, which informally confirms the security of the protocol. The formal proof security is given in the random oracle model and then done the performance evaluation. The comparison with the relevant existing schemes shows the advantage of the proposed scheme. It identified that the proposed protocol achieves all the desirable security and performance attributes with valid smart card revocation. 相似文献
17.
18.
The problem of digital content piracy is becoming more and more critical, and major content producers are risking seeing their business being drastically reduced because of the ease by which digital contents can be copied and distributed. This is the reason why digital rights management (DRM) is currently garnering much attention from industry and research. Among the various technologies that can contribute to set up a reliable DRM system, data hiding (watermarking) has found an important place due to its potentiality of persistent attaching some additional information to the content itself. In this article, we analyzed the possible use of data hiding technology in DRM systems. The article also gives a brief survey of the main characteristics of the most common data hiding methods such as proof of ownership, watermark, copyright protection, infringement tracking, copy control, and item identification. The article also investigates the different approaches by highlighting critical points of each approach in particular from the point of view of hostile attacks. 相似文献
19.
Jose A. Onieva Javier Lopez Rodrigo Roman Jianying Zhou Stefanos Gritzalis 《Telecommunication Systems》2007,35(3-4):161-176
In any kind of electronic transaction, it is extremely important to assure that any of the parties involved can not deny their participation in the information exchange. This security property, which is called non-repudiation, becomes more important in Digital Rights Management (DRM) scenarios, where a consumer can freely access to certain contents but needs to obtain the proper Right Object (RO) from a vendor in order to process it. Any breach in this process could result on financial loss for any peer, thus it is necessary to provide a service that allows the creation of trusted evidence. Unfortunately, non-repudiation services has not been included so far in DRM specifications due to practical issues and the type of content distributed. In this paper we analyze how to allow the integration of non-repudiation services to a DRM framework, providing a set of protocols that allows the right objects acquisition to be undeniable, alongside with a proof-of-concept implementation and a validation process. 相似文献
20.
为了提高数据版权管理(DRM)安全性,在DRM中用数字水印技术补充数据加密的不足,加强数字版权保护的最后保障,提高文本的安全性. 相似文献