Font Size: a A A

Research On Digital Copyright Legal Notarization Model

Posted on:2005-04-28Degree:MasterType:Thesis
Country:ChinaCandidate:Y HuFull Text:PDF
GTID:2168360152969134Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the rapid development of computer network technology, digital works replaces traditional media services gradually. Since the digital works can be modified and copied easily,a lot of copyright trouble came into being. How to use technique to provide some juridical evidence and solve the digital copyright legal notarization has become one of the most significant and challenging problems in the area of digital copyright. Digital Watermarking schemes however, are threatened by counterfeit attacks, which primarily use the freedom available in the choice of signature or watermarking method. The traditional cryptography method did not work well in copyright protection, too. DCLNM(Digital Copyright Legal Notarization Model)was presented on comprehensive analysis of digital copyright protect techniques. Digital watermarking is the core of this model, and PKI(Public Key Infrastructure) and trusted third party are also used in this model. Time stamping mechanism and digital certificate of PKI was used to improve the security and availability of DCLNM. Time stamping mechanism was used to resist interpretation attack, and cryptography method can be used to assure the security and traceability of this model. The trust third party was the key part in DCLNM, it can supply the services of notarization, registration and times tamping. Certification Authority and Time Stamping Authority are trust third parties in DCLNM. The trusted third party is able to guarantee the registration and notarization mechanisms, which are based on private-key cryptosystems or public-key cryptosystems. The trusted third party supplies the services of time-stamping, non-repudiation tokens, digital signature, and digital Watermarking, etc. Once the unauthorized access happens, we could easily obtain the evidences, so that corresponding legal agencies can accept them by means of these mechanisms.
Keywords/Search Tags:Digital watermarking, Digital copyright protection, Public Key Infrastructure, Time stamping, Digital Certificate, Digital signature
PDF Full Text Request
Related items