Font Size: a A A

Analysis And Design Of The Digital Right Management System

Posted on:2009-04-16Degree:MasterType:Thesis
Country:ChinaCandidate:Y ChenFull Text:PDF
GTID:2178360245969625Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The Digital Rights Management is new technology that develops by the digital multimedia with the World Wide Web. The Digital Rights Management attempt to protect copyright and the business rights of the digital multimedia. The Digital Rights Management technologies control use of digital media by preventing access, copying or conversion by end user to other formats. The Digital Rights Management deals it with PKI and XML technologies.This thesis is exactly directed against the standard of the Digital Rights Management, do researching, analyzing, and designing to a Digital Rights Management system.A DRM Agent embodies a trusted entity in a device. This trusted entity is responsible for enforcing permissions and constraints associated with DRM Content, controlling access to DRM Content, etc. DRM management the user identity and cryptograph key with PKI technologies, and use protect the digital content against unlicensed copying by encrypt it. So it is the most pivotal that DRM Agent decrypt the digital content and protect the secret decryption key.The usual DRM agent designs is realizes based on the pure software, the user private key saves in this locality machine, and carries on the decipher computation in this locality machine. As a result of the software system document easy aggressivity, to make the user private key to be very easy to track encounters explains. Therefore designs a safe user private key memory and the decipher computation credible environment becomes the DRM system safety design the important content. In this topic, the DRM agent is by the DRM control resolver, the safe service routine and the intelligent password key (USBKEY) three parts is composed. Saves the user private key in USBKEY, and will decipher the computation to realize in USBKEY, causes user private key the entire life cycle to be in a security credible environment.The author the prime task is as follows in this topic:1. Introduces the DRM system background and the development present situation;2. Analyzed the DRM system architecture;3. Analyzed the content object model and the right object model, as well as model element composition and definition;4. Analyzed the right object gain mechanism, as well as in right object gain agreement element composition and definition;5. Designed in this system safety mechanism, including the key system design, how as well as unifies the smart card technical design one kind of safe DRM Agent;6. Designed the DRM system frame as well as the main function module connection in detail.
Keywords/Search Tags:digital right management, protected content, encrypt technique, user agent
PDF Full Text Request
Related items