Font Size: a A A

Research On Digital Rights Management Mechanisms And Key Issues

Posted on:2009-10-03Degree:DoctorType:Dissertation
Country:ChinaCandidate:J TianFull Text:PDF
GTID:1118360275970987Subject:Industrial Engineering
Abstract/Summary:PDF Full Text Request
With the expeditious development of digital network technology, digital media resource could be toillessly reproduced without damnification of quality and might be given away momentarily and extraordinarily inexpensively across the network medium to user-terminals. It becomes a crucial and significant stimulation & requirement to supervise and administer copyright of digital intellectual property rights. Digital rights management,DRM for short, should be considered as a satisfactory scenario to safeguard digital assets, control their distribution and employ and protect the droits of both the service provider and the consumer,and at the same time, digital rights management also might be regarded as a maneuver that accommodates perdure & steady access control.The three critical parts of DRM infrastructure, which should be compared to a three–legged stool which can stand upright only when all three legs are of the selfsame longness. As the case stands, the technologies utilized are dependent on the business models in operation and these, as well as the technologies themselves, build upon the legal system that prevails. DRM infrastructure gives some secure surroundings for the secure treating with content among contracting members. Secure handling involves several functionalities, such as content provision, distribution, purchasing, and the delivery or rendering of digital content. In this dissertation, we introduce an ecumenic configuration for DRM structure independent of content genre and transmission approaches.Generally speaking, The superficial comprehension of digital rights management concept to the multitudinous people is that of a technique that accommodates functions to prevent the occurrence of piracy focus on digital multimedia by means of restricting the means how the protected content should be used by the unauthentic consumer.In most cases, lots of franchisers deem digital rights management as a copyright protection mechanism unilaterally, and consequently generic consumers presume upon a great mount of rights which are empowered by copyright regulation, whereas as a matter of fact that those rights aren't subservient to the DRM protected content. Moreover, digital rights management system shouldn't be deemed as an implementation of copyright legislation, but rather a performance to the licensing permission. Thereby, to a certain extent, there exists some misadvisement in the vendition tactic of DRM protected multimedia resource from the DRM system franchisers, which brings about consumers discontentment and complaint. We suppose that the primary causations for the hodiernal complexion, is that there might not exist any realizing definition about the juristical status and framework, which Safeguards guaranteeing protection of the DRM systems behaving well as its design. In this dissertation, we ravel out this deficiency innovatively, through conceiving and bringing a reasonable juristical framework into our digital rights management system.Imparlance approach should be regarded as the crucial precedure which arrives at the confirmation of several important clauses among the agreement. Now that DRM is the execution of licensing agreements, it's essential to develope some appropriate imparlance protocols for our DRM infrastructure. Imparlances approach enable consumer to possess the capability of requesting satisfactory rights sets, in particular when some proportion of consumers holding excellent individual credit record, could make an additional legitimate request for rights, which are not granted customarily to other ordinary consumers. At the same time, through the imparlances approach could allow the possibility for the Licensers in the pursuit of maximizing commercial profit from the further consumers. For reasons of the above mentioned , the establishment of imparlance processing protocols in DRM framework should be regard as of significance and essential, So in this dissertation, we promote the first imparlance procedure protocols for digital rights management application scene,We also the first testify the robustness and integrity of the imparlance protocols using petri nets, through examining whether there exist any deadlocks and all the conceivable situation of the protocol are accomplishable.Even though the DRM processing scheme could be regarded as some sort of access control archetype, there has been no faithful and particular formal description of DRM as an access control precept. Therefore, the rights expression languages, which could possess the capacity to describe DRM access control management strategy, but there aren't any virtually identical or corresponding accurate formal models in exist available for them. So because of lack of formal definition of these languages, it results in some deficiency that numerous rights hoders and creators have been often complaining of obscurity & confusion manifested almost over masses of explaination and implementation of permissions clause denoted within these languages. Meanwhile, it's widely publicized that standardised electronic contracts are an important building block for compatibility and consequently a basis for cooperation between companies and customers doing electronic commerce, and the structure and the allowed character set of an electronic contract ought to be then defined in RELs schema. So in this dissertation, we promptly construct a formal model and along with the compositive policy Rights Expression Language, which has the capability of contriving to accommodate a mechanism to give precise description of proper access control policies and are also beneficial for juristical contract documents. And at the same time, our formal archetype also analyzes how the access control regulation could be enforced according to predefined policies, and can be sequentially deemed as the first formal archetype for DRM framework utilized availably as the access control mechanism.Under most circumstances,access control procedure may be composed of two part processing functional component: authentication to all kinds of the parties concerned and grant the proper authorization to the parties involed for accessing the DRM protected multimedia resources. Authorisation procedure in DRM system might be confronted with some idiosyncratic conundrums, in other words, there is a demand for accommodating diversiform computer platforms, without mandatorily assurance of usable network connectivity state and minimum trust relationship among all the parties concerned. Due to these causation, the scenario to correlative authentication configuration comprising a large number of complicated factors.Compared with some former access control schemes ,which firmly coupling customer management function with control structure, we have taken a optimize and comprehensive precept, and dissociated customer management module from the kernel DRM framework. Consequently, our authorisation approach asks for a trusted acknowledgement of the credentials of the licit users and then determines whether to grant corresponding rights to the access control request. So in this dissertation, we design customer authentication configuration according as the optimized ticket, which possesses analogical attribute RFC1510 criterion credentials to a certain extent after consideration of the matter above.DRM system also calls for an effective identity management for multimedia resoures. However, the entire current identity function framework for media contents could not provide correlative available verification processing for data uniqure identity. For this reason, so in this dissertation, we constructed coherence-checked digital object identity System, which could settle deficiency properly.To sum up, all the components mentioned above should be integrated together effectively to constuct a compositive infrastructure for digital rights management system to facilitate comprehension, administration and enforcement of DRM compared with method or Settlement Mechanism which are currently deemed with some defects and flaws.
Keywords/Search Tags:Information Security Technique, Digital Rights Management, Access Rights Administration, Principle of Benefit Counterbalance
PDF Full Text Request
Related items