Font Size: a A A

Research And Implementation Of Digital Content Secure Trade System Based On Copyright Protection

Posted on:2006-07-11Degree:MasterType:Thesis
Country:ChinaCandidate:S X PengFull Text:PDF
GTID:2168360155962929Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the development of Internet and electronic commerce, a great deal of pirate and tort exists in Internet content, so it is insistent to protect copyright of digital content. But present technology and system of the digital rights management have a great shortages mainly including legal users's getting the key of digital content easily, digital content's lacking generality and users's doing no anonymous shopping. These questions restrict greatly the development of electronic commerce and business affairs of digital content.Through making researches on the present technology and system of digital rights management, the paper designs relatively integrated rights protection mechanism — a secure trade system of digital content based on rights management . ①The System uses a new rights control method and a new rights management protocol that is based on machine fingerprint and includes identity authentication protocol, content's integrality protocol and rights control protocol, which can eliminates the shortages of the common digital rights management system. ②About rights control, the system uses a new method of structure, distribution and authentication of the licence key, which prevent nonlicet and legal users from getting the licence key. Legal users can only use the content reader to read digital commodity according to the demand of licence, but not get original text of digital content. This protects copyright of digital content. ③About secure trade, digital content is encrypted and turned into digital commodity with the arithmetic and method conforming its type. To ensure that digital content is not be altered and forged, the system creates a key and uses the arithmetic of HMAC to validate the integrality of digital content. ④About identity authentication, the system uses a dissymmetrical authentication of the identity, which separate identity's authentication from right's control and increase agility and expansibility of the system.The production the paper reports makes active significance on the researches of digital content's commercial mode and its security. But the signing and performing of bargain of thedigital content owner and seller on the net is not solved. This is the next job we should do.
Keywords/Search Tags:digital right, secure trade, secure container, copyright protection, authentication
PDF Full Text Request
Related items