Font Size: a A A

A New Type Of Internet Content Copyright-protected Computer System

Posted on:2001-01-03Degree:DoctorType:Dissertation
Country:ChinaCandidate:C ZhuangFull Text:PDF
GTID:1118360185995639Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
My research topic is Internet content copyright protection. Many e-commerce systems sell valuable media content products in the Web. With the development of content e-commerce, electronic payment systems have made much progress, but copyright protection problem has still been unsolved. Recently, digital watermarking techniques have received great attention to protect intellectual property of digital content, but many fatal attacks, such as IBM attack make the watermark useless at all. While several e-commerce system for content commercialization have appeared, such as IBM's Cryptolope, InterTrust's Digibox , SoftLock of SoftLock Inc, SoftSeal of Breaker Technologies, e-book technologies, etc. the kernel structure of the technology has not been opened. Some of the same key questions have still been unanswered. Structure: What software structuring principles are appropriate for Internet content copyright protection? Furthermore, which service should be provided by secure kernel? Is it necessary to build a secure kernel? Security: What is the meaning of security for copyright protection? What is the thread model of secure content distribution? What execution guarantees can License Engine provide?In my Ph.D thesis, my objective is to explore the use of public-key cryptography to prevent the distribution of illicit electronic content. In Section 1, we introduce the concept of copyright , and discuss the application of copyright protection for e-commerce. In Section 2, we outline the state of art of copyright protection techology, and explain the encryption-based copyright protection technology and watermark-based copyright protection technology. At last, we analysis the weakness of watermark technology. In Section 3, we mainly introduce the concept of secure kernel. In Section 4, we retrospect the encryption technology and secure authenticate protocol, meanwhile, we present the definition of dual- authenticate- channel-protocol model. In Section 5, we use accountability logic to analyze the copyright protection protocol. In Section 6, we outline of thread model and state some assumptions...
Keywords/Search Tags:Internet, Copyright Protection, Secure Kernel, Security Protocol, Browser, Watermark, Digital Work
PDF Full Text Request
Related items