Font Size: a A A

Digital Rights Management Based On Trusted Computing

Posted on:2009-09-05Degree:MasterType:Thesis
Country:ChinaCandidate:Y S WeiFull Text:PDF
GTID:2178360242478194Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the development of digital compression technology, and the increase of storage capacity of digital storage devices and network bandwidth, more and more customers access digital content through wired or wireless network. Digital content has the characteristics of easy to copy, easy to tamper with and easy to transmit, and it relates to the interests of many sides, such as content providers, operators and consumers, so if the digital content and copyright is not effectively protected, there will be huge economic losses to associated obligees. In order to solve this problem, the digital rights management (DRM) technology becomes the key factor of assort with the industrial chain, which not only provides technical solutions for the maintenance of digital rights, but also plays the role of infrastructure in the digital content industry. DRM is designed to protect digital content and make the purchaser of digital content use by authorization in the digital content life cycle. In the existing DRM system, the DRM client are basically disposed in the open computing platforms, such as personal computers and mobile phones, the decryption use of digital content and the verification analysis of related rights is responsible for the DRM applications of the client. For the general devices such as PC, the operating environment of DRM applications of the client is unsafe. Therefore, additional technical means is needed to ensure the trusted implementation procedure of the applications. In recent years, Trusted Computing technology provides a nice technology platform to solve the issue.This paper firstly proposed the background of DRM system and the fignificance of implementation of DRM systems, presented the current status and trends of DRM system. At the same time described the architecture and workflow of DRM, as well as the related technology principles of cryptography, PKI, digital watermarking technology and the digital copyright description language. The basic concepts and ideas of trusted computing are introduced, and its development status and technical overview is analyzed. The software and hardware architecture and key technologies of the Trusted Computing Platform proposed by TCG in October, 2004 is described. The security flaws and shortcomings of the DRM v2 standard established by OMA for mobile network are analyzed. We introduced the idea of Trusted Computing into the system of OMA DRM v2, designed the DRM scheme by combineing TMP and OMA DRM v2, and using the basic download model of Pul model for specific cases, focused on four major procedures: the user identity authentication of CI, the formation of RO and the download of DCF, the obtaining of RO and the analytical of DCF in the DRM terminal. The safety of the DRM model is analyzed in the end..
Keywords/Search Tags:Trusted Computing, DRM, TPM
PDF Full Text Request
Related items