Font Size: a A A

A Trusted Computing Based Digital Rights Management Scheme

Posted on:2013-02-12Degree:MasterType:Thesis
Country:ChinaCandidate:G D WangFull Text:PDF
GTID:2248330371970918Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the popularity of the network and improvement of digital compression technology, more and more digital contents transmitted over the network, facilitating people’s daily lives, at the same time, it also brings some problems such as non-authorized access to digital contents, which are commonly said, piracy. Piracy of digital content appears mainly because of the lack of effective rights management of digital content security measures. Now digital content rights management mostly depends on the incomplete the third authentication mode, and malicious unlawful attacks can still attack the third certification to obtain unauthorized digital media content. Therefore, the establishment of a trusted computing-based digital rights management technology is very important.This paper presents a scheme based on Trusted Computing DRM mode, which provides the specific protocol among content issuer, the rights issuer, and the user client process. This paper gives a detailed digital media content encryption calculation in the communication.This paper presents an improved digital rights management encryption algorithm. Using Lagrange Interpolation formula, rounded cyclic group and the problem of elliptic curve discrete logarithm, a low resource consumption, high security, digital rights management encryption algorithm is processed. The analysis shows that the algorithm can resist replay attacks and illegal collusion user collusion attacks.The Trusted Computing Based DRM is implemented by C# programming language. This scheme use android simulation platform to analyze the feasibility.Analysis of experimental results that this program can be a good implementation of the OMA DRM standards required to forward-lock, group-distribution, super-distribution, access control.The occupancy rate in the resources and network can also be accepted.
Keywords/Search Tags:Trusted Computing, Digital Rights Management, Encryption
PDF Full Text Request
Related items