Font Size: a A A

The Study And Implementation Of Man-Tie Data Copyright Protection System Based On The EBX Specification

Posted on:2006-12-11Degree:MasterType:Thesis
Country:ChinaCandidate:L B HouFull Text:PDF
GTID:2168360152975677Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the advent of the digital era, Internet is becoming an important part of the modern life, and e-books also become the inevitable items. Compared with the book is made by paper, the e-book is built upon by the electronic communication use with computer systems to make people enjoy digital source; like such characteristics as bulk storage, the big density of information, facilitative search, the openness of information and so on, which establish good basement for making source hare completely. However e-book is mainly transferred through internet, we have to ensure e-book against danger in store or the process of transmission, because it is crucial to have favorable circumstances to promote the rapid development of e-book.In this paper, through making study of copyright protection, we discuss such several standards for protecting copyright in electronic information as DRM EBX XrML and ODRL, and make ulterior study of authentication and such technologies of information security as SSL, public-key and private-key encryption, Digital Signature, PKI and so on..In this paper, we describe implementation of Man-Tie data system based on the EBX specification and analyze the security of the system.. Man-Tie data system imitates the whole process of lending books made by paper from library, and accomplishes the functions involving limiting the sum of e-books borrowed, limiting the time of using e-books, lending an e-book from one user to another, returning e-books ahead of time and renewing e-books, which is implemented through the operations of application for reading, establishing the identity, authorization to user, watch by Voucher and using of reader. This system consists of four modules such as voucher module, certificate module, e-book module, reader module, and uses technologies of network security to implement that users read e-book in a state without the support of network and effective copyright protection in the whole course from the users' application to users' using.
Keywords/Search Tags:copyright protection, EBX, Voucher, PKI, Encryption technique
PDF Full Text Request
Related items