Font Size: a A A

Research On Key Techniques And Applications Of Digital Rights Management

Posted on:2008-10-25Degree:DoctorType:Dissertation
Country:ChinaCandidate:Q Q PeiFull Text:PDF
GTID:1118360242478285Subject:Cryptography
Abstract/Summary:PDF Full Text Request
The object of digital media content protection usually includes text, image, audio, video and other mediums. With the rapid development of digital technologies and the extensive applications, the Internet, mobile networks and other emerging telecommunications modes and mobile phones, set-top boxes, computers and other multimedia terminals have greatly expanded the transmission scope of digital media content.As the digital medium have the characteristics of being lossless reproduced and distributed, the phenomenon of using digital technology and the internet freely to reproduce and distribute the digital media products and the content protected by intellectual property is widespread. If there is no digital media copyright management and content protection, which will lead to serious negative phenomena, breeding massive piracy and the non-standard use would not only have enormou effect on digital media industry, but also greatly injure our economics, sociality and culture.Currently, digital copyright protection issue has caused a common concern from national governments, law, media and industry, and other parties. Practical experience and the study in recent years show that it is not just legal mean to protect the copyright of digital content, and it is extremely important to adopt related technical measures. This paper focuses on the domain management, access authentication, key management, rights management and other issues in DRM system. On the basis of deep analysis of existing technologies, standards and systems, some new ideas and schemes to solve the application problems of DRM system are proposed. The main research results are as follows:1. A new domain management model which can hide components within the domain is proposed, and an authorized devices can purchase the domain license for the domain. License server can verify the device whether it is a member of some certain domain. When an illegal device appeared in the domain, it can also be traced .2. A new DRM device authentication method in the user domain to meet the authentication requirement between the devices in a DRM system, as well as two access authentication schemes suitable for DRM system are all proposed. One scheme is based on PKI, and the other is based on identity.3. A DRM key management method based on secret sharing technology is proposed. It can achieve the reasonable key sharing between the legal devices. Meanwhile, it can improve the survivability of the keys. Even though some keys are damaged, it can also recover the keys correctly. Hence, an identity-based secret sharing scheme and an identity-based identity proving scheme are also proposed.4. A PMI-based DRM scheme on the basis of the architecture of home networks is propose, which can meet the demands of the rights management requirement in home networks by establishing RO-AO chain and the RBAC management mechanism. According to the actual user types in home network, a role hierarchy model is designed.
Keywords/Search Tags:Digital Rights Management, Domain Management, Secure Access, Key Management, Authority Management
PDF Full Text Request
Related items