Font Size: a A A

Research And Implementation Of DRM Technology In Distributed Environment

Posted on:2013-03-29Degree:MasterType:Thesis
Country:ChinaCandidate:J J HuangFull Text:PDF
GTID:2248330392457862Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of distributed network, digital videos’ contents arebecoming richer and richer, and the number of digital videos is rising sharply. On the onehand, the convenience of digital videos’ storage, copying and redistribution meetspeople’s demand for learning and entertainment very well, but on the other hand, it bringsincreasingly copyright disputes too. In fact, copyright issue has become an importantbottleneck to the rapid development of digital videos. DRM technology(Digital RightsManagement technology), which is an effective way to solve the problem of digital rightsmanagement, prevents the illegitimate use of digital videos by user identity authentication,video encryption, video watermarking and other technical means and protects thelegitimate rights of authors and publishers of digital videos.This DRM system, which is based on distributed environment, is for a hybridnetwork architecture of CDN(Content Delivery Network) and P2P(Peer-to-Peer), itdivides the digital copyright protection system into a DRM server system and a DRMclient system, and the DRM server system mainly includes a content server module and alicense server module.The function of the content server includes video encryption, video watermarkingand video packing. The video encryption accomplishes encrypting protection for digitalvideos by using symmetric encryption algorithm; The video watermarking accomplishesdetection and tracking for digital videos by embedding copyright information of videos’providers; The video packing writes the key and the license server address into digitalvideo files, and then compresses and distributes these video files.The function of the license server includes user identity authentication and licensemanagement. The user identity authentication checks users by a combined mode ofpassword checking and client hardware unique identity authentication; Licensemanagement generates licenses based on user clients’ information, key information andaccess information, then it distributes licenses to users.
Keywords/Search Tags:digital rights management, distributed, encryption, watermarking
PDF Full Text Request
Related items