• Title/Summary/Keyword: Content IP

Search Result 188, Processing Time 0.023 seconds

Protection of MPEG-2 Multicast Streaming in an IP Set-Top Box Environment

  • Hwang, Seong-Oun;Kim, Jeong-Hyon;Nam, Do-Won;Yoon, Ki-Song
    • ETRI Journal
    • /
    • v.27 no.5
    • /
    • pp.595-607
    • /
    • 2005
  • The widespread use of the Internet has led to the problem of intellectual property and copyright infringement. Digital rights management (DRM) technologies have been developed to protect digital content items. Digital content can be classified into static content (for example, text or media files) and dynamic content (for example, VOD or multicast streams). This paper deals with the protection of a multicast stream on set-top boxes connected to an IP network. In this paper, we examine the following design and architectural issues to be considered when applying DRM functions to multicast streaming service environments: transparent streaming service and large-scale user environments. To address the transparency issue, we introduce a 'selective encryption scheme'. To address the second issue, a 'key packet insertion scheme' and 'hierarchical key management scheme' are introduced. Based on the above design and architecture, we developed a prototype of a multicasting DRM system. The analysis of our implementation shows that it supports transparent and scalable DRM multicasting service in a large-scale user environment.

  • PDF

Research on the Development of One IP(intellectual property) Animation & Game in Chinese Market

  • Pan, Yang;Choi, Chul-Young;Meng, Zilu
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.67-75
    • /
    • 2019
  • "No IP, No Content" has become a phenomenon in the content industry, high-quality IP has a strategic importance. It has become a Trinity in the movie-anime-game basic package, Competition is more intense. However, there is a tremendous amount of know-how hidden behind the use of IP to operate games well. We are worth exploring in detail. The research and analysis of digital IP market, the advantages and disadvantages will be the focus of our pragmatic research. As an emerging market in the digital industry, China has great research value. This paper analyzes the status quo of the current Chinese market by comparing the mature US and Japanese markets. For example, the research of American Disney Company analyzes the mature market structure of Japan. compared with the excellent case of the Chinese market legend of qin. By studying the current situation of China's digital market, analyzing the interest trends of the customer base, discovering existing problems and improving the accuracy of the prediction and judgment of the Chinese digital market in the future.According to the survey, the IP heat is mainly concentrated in six categories of games, animation, TV, variety, movies, and novels. At present, the most popular IP of manufacturers have three major categories. This article will conduct research and analysis on digital IP, and analyze the market status of China, the United States, and Japan and the research on outstanding representative works in the market.

Efficient Content Delivery Method in Wireless Content-Centric Network (무선 Content-Centric Network에서 효과적인 콘텐츠 전달 방식)

  • Park, Chan-Min;Kim, Byung-Seo
    • Journal of Internet Computing and Services
    • /
    • v.18 no.2
    • /
    • pp.13-20
    • /
    • 2017
  • Recently, researches to adopt Content-centric network (CCN), which is one of the promising technologies for replacing TCP/IP-based networks, to wireless networks has actively performed. However, because of erroneous and unreliable channel characteristics, there are many problems to be resolved to adopt CCN to wireless networks. This paper proposes a method to reduce content download time because nodes possess only parts of content chunks. The proposed method enables a node having parts of content chunks to request the rest of parts of content chunks to a provider before a Consumer requests the content. As a consequence, the content download time is reduced.

Effect of Magnetic Force on Rheological and Compressive Properties of Magneto-Rheological Rubber Composites with Iron Particle and Carbon Nanotubes (자기력이 철 분말 및 탄소나노튜브 강화 자기유동 고무 복합재료의 유동 및 압축 특성에 미치는 영향)

  • Ryu, Sang Ryeoul;Lee, Dong Joo
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.37 no.2
    • /
    • pp.153-160
    • /
    • 2013
  • An orthotropic magneto-rheological rubber composite (MRRC) based on a general-purpose rubber can be manufactured by using an electromagnetic device during the curing processes of rubber mixtures. The magnetic transmissivity of MRRCs increases with the iron particle (IP) content, and that of aligned MRRCs with a 2-T magnetic field is 1.8 to 2 times higher as compared to that of randomly dispersed MRRCs. The effect of a 2-T magnetic field on carbon nanotube (CNT) reinforced MRRC has been identified clearly, and the magnetic transmissivity is found to be 3.7%. The compressive stress of MRRC (IP 90 + CNT 5, 2 T alignment) under a magnetic field of 0.49 T is 2.1 times higher as compared to that of the matrix. The MR effect of MRRC increases with the IP content, and that of aligned MRRC with the IP 90 and 2 T magnetic field is 20.4%. It is confirmed that the magnetic field when making the specimen and when performing the compression test greatly impacts the compression characteristics.

A Study on the International Research Trends in Electronic Records Management: InterPARES 3 and ITrust Achievements (전자기록관리에 대한 국제 연구 동향 분석 - InterPARES 3와 ITrust 성과물을 중심으로 -)

  • Park, Ok nam;Park, Heejin
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.16 no.1
    • /
    • pp.89-120
    • /
    • 2016
  • This study aims to understand the concept and changes of the records management of InterPARES based on the analysis of background, main research interests, and major achievements of IP3 and ITrust. To this end, this study conducted a content analysis of IP3 and ITrust to drive main keywords. This study also utilized word clouds from IP project titles. In addition, a comparative analysis of IP3 and ITrust was conducted based on the environment, scope, core research areas, keywords, objectives, and record management life cycle perspectives. The research identified that InterPARES research was widely expanding the content and subject areas of the study: 1) to apply across the life cycle, as well as long-term preservation; 2) to focus on the concept of trust as well as the concept of authenticity; and 3) to include the concept of the Internet, digital forensics, and the open government along with electronic records.

Caching Strategies of Content-Centric Networking for the Performance of TICN Backbone (TICN 백본망 성능향상을 위한 CCN 적용 캐싱전략)

  • Park, Heungsoon;Kwon, Taewook
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.5
    • /
    • pp.637-642
    • /
    • 2014
  • Military communications have limited resources such as poor bandwidth and insufficient link capacity. Numerous hosts in conventional IP networks, including the Tactical Information Communication Network (TICN), the tactical communication system of the Army, focus heavy traffic on a single server via end-to-end connections and in which data delivery latency is caused by exchanging routing information. Content-Centric Networking (CCN), one framework of Information-Centric Networking (ICN), is a novel Internet paradigm in which data can be accessed by the name of the content instead of the location information. This paper provides content caching strategies for applying CCN to military tactical IP networks based on TICN environment.

Implementation of Personalized IP Streaming System (맞춤형 IP 스트리밍 시스템 구현)

  • Yang, Chang-Mo;Kim, Kyung-Won;Lim, Tae-Beom;Kim, Yoon-Sang;Lee, Seok-Pil
    • Proceedings of the KIEE Conference
    • /
    • 2006.10c
    • /
    • pp.515-517
    • /
    • 2006
  • Recently, there is a rapidly growing demand for efficient real-tine playback and transmission of large amounts of multimedia data. But most users' connections are not fast enough to download large chunks of multimedia data. Therefore a streaming technology is needed in which users enable the real-time playback of multimedia date without having to download the whole of the multimedia date. In this paper, we propose a personalized IP streaming system. The proposed IP streaming system enables users to got an intelligent recommendation of multimedia contents based on the user preference information stored on the streaming server or the home media server. Moreover, users are assured of seamless access of streamed content event if they switch to another client device by implementing streaming system based on user identification and device information. We evaluate our approach with simulation results.

  • PDF

A Proposal for Strong Authentication with Multi-Protocol (이종 프로토콜을 활용한 강한 인증 시스템 제안)

  • Park, Jae-Kyung
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.01a
    • /
    • pp.239-240
    • /
    • 2020
  • 본 논문에서는 기존의 TCP/IP 환경에 새로운 프로토콜을 적용하여 외부의 해킹으로부터 보다 안전한 형태의 다중 시스템을 설계하고 이를 이용한 강력한 인증시스템을 제안한다. 기존 네트워크 보안이 차세대 네트워크에 미치는 영향에 대한 연구의 필요성도 매우 높아지고 있다. 또한 IP 주소 기반의 서비스 운용으로, 대형 다수의 통신요구에 대해 서비스 불가 문제점 보유, 최근 대형 통신사 중심으로 탈 TCP/IP 연구가 활발히 진행 중으로 현재 인터넷의 표준으로 사용되고 있는 TCP/IP 프로토콜이 원초적으로 보안에 대한 취약한 문제점 보유하고 있어 이를 해결하기 위한 방안 연구 진행 중에 차세대 네트워크를 활용하여 보다 효율적이고 원활한 서비스 활용 및 기존 TCP/IP가 보유한 근본적인 문제점으로 인해 발생하고 있는 해킹에 대한 방지 방안 모색 필요하다. 따라서 본 논문에서는 조직 및 법·제도 관점에서 효율적인 네트워크 체계의 SW 관리 차원의 발전방향을 제시하기 위해 국내외에서 진행되고 있는 차세대 네트워크의 SW 관리 체계의 현황조사 및 문제점 도출하며 이를 보다 안정하게 활용할 수 있는 새로운 형태의 네트워크를 설계하고 제안하는 것을 나타낸다.

  • PDF

A novel architecture of CCN for better security and applicability (향상된 보안 및 적용 가능성을 위한 컨텐츠 중심 네트워킹(CCN)의 새로운 아키텍처 연구)

  • Sharma, Aashis;Kim, Yun Seon
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.1
    • /
    • pp.21-38
    • /
    • 2017
  • Information Centric Networking is changing the way how content is being transmitted. The shift from IP and host based networking towards content based networking scenario is growing day by day. Many researches have been done about different frameworks of ICN. Caching is an important part of ICN and many researchers have also proposed different ways for caching the data. With caching of data in intermediate devices like the network devices as well the user devices in some cases, the issue of content security as well as the role of the content producer becomes a major concern. A modified ICN architecture based on the current Content Centric Networking (CCN) model is presented in the paper. The architecture mainly focuses on involving the content producer in content delivery in the real time. The proposed architecture provides better security aspects for the CCN architecture. Apart from security the paper will also consider the issue of applicability of CCN architecture to replace the TCP/IP based architecture. The efficiency of the proposed architecture is compared with the previous CCN architecture based on the response time for a content delivery which shows very comparable level of efficiency. The paper than analyzes different beneficial aspects of the proposed architecture over the current architecture.

A Design on Security Model of Domestic Internet-based Broadcasting Service (국내 인터넷기반 방송서비스의 보안 모델 설계)

  • Seo, Hee-Suk;Kim, Sung-Jun;Ahn, Woo-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.6
    • /
    • pp.183-190
    • /
    • 2012
  • Internet Protocol Television(IPTV) is the use of an IP broadband network to deliver television (cable TV type) services to the end user. Traditional telecommunications service providers as well as alternate service providers and Internet service providers can utilize their IP networks (and broadband consumer access) to deliver broadcast TV, Video on Demand (VOD) and other Internet services to the consumer. As digital technologies progress, illegal copy and redistribution of IPTV content become easier and simpler. Therefore it is required to protect IPTV content or service. In this paper, we analyze the security threats and requirements. We also discuss related issues and solutions for IPTV.