Font Size: a A A

Strategy Trusted Digital Rights Management

Posted on:2015-01-03Degree:MasterType:Thesis
Country:ChinaCandidate:B L YueFull Text:PDF
GTID:2268330425488130Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet technology, digital products have already entered everyone’s life, meeting the daily needs of people. On the other hand, there are many piracy and infringement issues due to the problem of easily coping or forwarding digital content. In order to protect the interests of copyright holders of digital content, DRM technology came into being. In all areas, the digital rights management system has been playing an active role.This paper described the background and significance and domestic applications of DRM system, followed by the introduction of digital rights management (DRM) system, the basic theory and techniques. Then this paper proposed the security goals in the design. And this paper described a typical DRM system components and a series of key technologies. After a detailed analysis of the basic information of trusted computing and trusted computing platform, this paper proposed digital rights management protection to a combination of hardware, such as TPM. After analyzing the existence of the problem in the DRM system, we put forward a trusted digital rights management model based on trusted computing. And in authentication and the copyright tracing, this paper discussed strategy optimization, and then introduced the basic ideas and processes in detail. Finally, this paper proposed the expansion of the use of DRM systems in the home domain, which allows sharing digital content in the home domain.Trusted Digital Rights Management focuses on the credible attestation and the digital rights management. Along with the management of digital rights, the system or the trusted platform could be attested. After a detailed analysis and careful thinking, this paper put forward a trusted digital rights management model with optimize protection strategy.
Keywords/Search Tags:Digital Rights Management, TPM, trust, authentication, copyright transfer, family domain
PDF Full Text Request
Related items