Font Size: a A A

Research And Design Of PKI System In DRM

Posted on:2015-03-06Degree:MasterType:Thesis
Country:ChinaCandidate:T F YinFull Text:PDF
GTID:2268330425485385Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid popularization of the Internet and the improvement of digital media technology, multimedia content can be spread and shared through network conveniently. The characteristics of digital media those are easy to be copied and transferred, also bring some unprecedented impacts to the management of multimedia’s copyright. If we don’t control the multimedia effectively, it may be copied, modified and distributed illegally, and that will lead the provider of multimedia content to suffer huge losses. In order to control this phenomenon effectively, digital rights management (DRM) technology emergs and becomes the focus of many standardization organizations and manufacturers. Among them. Open Mobile Alliance’s DRM standard is relatively mature and has the most influence. At present, there are three prominent issues restrict DRM’s development:security, standardization and interoperability. Security issue is the most prominent one. OMA DRM uses digital certificate technology as his authentication method, so PKI is the foundation of his security mechanism. But most of the DRM products currently on the market have not been specifically designed or directly use the third-party PKI systems, so there is a big shortage on security and performance.This thesis originates from a famous TV station’s DRM system. We design this PKI system through a combination of software and hardware and we also designed some security mechanisms for this system. The main contributions and research achievements are listed as follow:(1) According to HSM (hardware security module)’s characteristics, we propose two security mechanisms based on HSM and cryptographic algorithms:database tamper detection mechanisms and backup and restore mechanism. And we applied them to the PKI system so that the system can be more strong and security. These two mechanisms can also be used to other types of systems.(2) We have compared and analyzed current mainstream DRM standard, and chose OMA DRM as research object to study its security issues and analyze the importance of PKI in this DRM.(3) We have implemented a Hardware based Special DRM PKI system(HSD-PKI) with HSM technology and JCA technology based on OMA DRM2.1, and this PKI contains database tamper detection mechanism, backup and restore mechanism, key pool mechanism and so on.
Keywords/Search Tags:DRM, PKI, HSM, Database Tamper Detection
PDF Full Text Request
Related items