• Title/Summary/Keyword: Digital Right Management (DRM)

Search Result 68, Processing Time 0.032 seconds

A Protection Protocol for License-based Digital Rights (라이선스 기반 디지털 저작권 보호 방안)

  • Shin Weon
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.6
    • /
    • pp.368-377
    • /
    • 2005
  • The Internet technologies allows anybody who has connect a network to access various multimedia information. But, it brings new issues about the violation of intellectual property and copyright of multimedia contents. Digital right managements have been actively studied as approaches to solve them. In this paper, we propose license-based schemes for the protection of contents and its rights on digital right management. The proposed schemes provide limited distribution and superdistribution of contents, and guarantee to securely use contents by usage rules.

  • PDF

Practical Use of Contents Distribution Models on the Basis of UCI (UCI 기반 콘텐츠유통모형 활용)

  • Park, Sungbum;Baek, Seungik;Lee, Sangwon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.07a
    • /
    • pp.35-37
    • /
    • 2013
  • UCI is contributing to establishing and administrating CMS to improve the quality of contents efficiently and effectively. In these days, enterprises are also making a new try to manage copyrights of digital contents by use of DRM(Digital Right Management). UCI would be a good solution to solve this overburden. The objective of our research is to study on practical uses of various digital contents models on the basis of UCI. We introduce two business cases; one is publishment of digital contents and the other is DB service of digital contents.

  • PDF

Content Protective Multi-Agent Platform for MsMu Service and Pattern-Based Content Management

  • Uhm, Yoon-Sik;Hwang, Zi-On;Lee, Min-Soo;Nah, Jae-Hoon;Song, Hwang-Jun;Park, Se-Hyun
    • ETRI Journal
    • /
    • v.32 no.5
    • /
    • pp.665-675
    • /
    • 2010
  • Recent research on mobile Internet protocol television and digital right management (DRM) interconnections has focused on multimedia technologies designed to enhance content scalability and adaptive content distribution. However, due to the architectural and scalable limitations, recent systems are not flexible and securable with respect to their adaptive content distribution and protective policy management. Therefore, we propose a content protective multi-agent platform that provides secure multimedia services, correlation management, pattern-based management, and multi-source multi-use (MsMu)-based services. Our architecture, supported by DRM, lets us create a rich set of MsMu-based content protection and seamless multimedia services through the extension of one source multi-use (OsMu)-based content services. We have verified our platform, which provides scalable and securable services with a 17% lower service response time by using a testbed.

A Robust Multiple Set-Top Box Authentication Scheme for IPTV Against Smart Card Cloning Attack (IPTV 환경에서 스마트카드 복제에 강건한 다중 셋톱박스 인증기법)

  • Lim, Ji-Hwan;Oh, Hee-Kuck;Kim, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.37-46
    • /
    • 2010
  • In an IPTV system, the rights of the content and service provider can be protected by using Conditional Access System (CAS) and Digital Right Management (DRM). In case of the CAS, only the authorized user who has structured authentication keys can decrypt the encrypted content. However, since the CAS establishes a secure channel only between content provider and Smart Card (SC), it cannot protect the system against McCormac Hack attack which eavesdrops on unsecure channel between SC and Set-Top Box (STB) and SC cloning attack. In this paper, we propose a robust multi-STB assisted SC / STB authentication protocol which can protect the IPTV system against not only McCormac Hack attack, but also SC cloning attack. The previous works which bind a STB and a SC during the SC registration phase against the SC cloning attack does not support multi-STB environments. The proposed system which dynamically updates the STB information in subscriber management system using the bi-directional channel characteristic of IPTV system can support the user's multi-STB device effectively.

Security Policy Proposals through PC Security Solution Log Analysis (Prevention Leakage of Personal Information) (PC보안솔루션 로그분석을 통한 보안정책 제안 (개인정보유출 방지))

  • Chae, Hyun Tak;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.961-968
    • /
    • 2014
  • In order to prevent leakage of personal information by insiders a large number of companies install pc security solutions like DRM(Digital Right Management), DLP(Data Loss Prevention), Personal information filtering software steadily. However, despite these investments anomalies personal information occurred. To establish proper security policy before implementing pc security solutions, companies can prevent personal information leakage. Furthermore by analyzing the log from the solutions, companies verify the policies implemented effectively and modify security policies. In this paper, we define the required security solutions installed on PC to prevent disclosure of personal information in a variety of PC security solution, plan to integrate operations of the solutions in the blocking personal information leakage point of view and propose security policies through PC security solution log analysis.

Design on Protection and Authentication System of IPTV Contents using HSI Watermark (HSI 워터마크를 이용한 IPTV 콘텐츠 보호 및 인증 시스템 설계)

  • Kim, Dae-Jin;Choi, Hong-Sub
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.7
    • /
    • pp.55-62
    • /
    • 2010
  • While the broadband network and multimedia technologies have been developing, the commercial market of digital contents also has been widely spreading with recently starting IPTV. As the IPTV services are getting to be generalized and popularized, the contents illicit copying and distribution of copyright meterials tends to draw more attentions. So we need a right service system that can protect contents and copyright using watermark inserting. Until now, the conventional protection and authentication system is taking advantages of merits both in CAS and DRM. But this system can not protect the contents when acquiring them from TV output using A/D convertor. So we apply watermark method using HSI color space against contents illicit copying. And for distribution of copyright materials. we compound unique settop ID and copyrighter's ID to make new ID that is watermark. When inserting watermark, we use the watermark for copyright protection and authentication. So we can protect copyright and identify last settop's user in illicit distribution. we design download based IPTV contents protection and authentication system using HSI watermark method.

A Study of XrML-based Rights Business Model for Digital Contents Copyright Administration (디지털 컨텐츠 저작권 관리를 위한 XrML 기반의 저작권 비즈니스 모델에 관한 연구)

  • 최지훈;유윤식;임산송;김진수;정회경
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.289-292
    • /
    • 2003
  • Digitalized multimedia contents is changing active digital contents in form passed from manufacturer directly to consumer though digital network of high speed, also face with big problem that is protection of rights to protect digital contents, to protect those and effort to active digital contents process height. Also, in situation that require change to more efficient system, the efficiency of rights document that is basic intermediate to be used in business of digital contents field is emphasized. Therefore, the design of common business model to share contents that have same purpose without depending on specific system to offer contents with another system is required. This paper designed adaptable rights business model to general digital contents, and designed and implemented rights document editing system to editable document for Right management according to designed business model.

  • PDF

Fast Stream Cipher AA32 for Software Implementation (소프트웨어 구현에 적합한 고속 스트림 암호 AA32)

  • Kim, Gil-Ho;Park, Chang-Soo;Kim, Jong-Nam;Cho, Gyeong-Yeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6B
    • /
    • pp.954-961
    • /
    • 2010
  • Stream cipher was worse than block cipher in terms of security, but faster in execution speed as an advantage. However, since so far there have been many algorithm researches about the execution speed of block cipher, these days, there is almost no difference between them in the execution speed of AES. Therefore an secure and fast stream cipher development is urgently needed. In this paper, we propose a 32bit output fast stream cipher, AA32, which is composed of ASR(Arithmetic Shifter Register) and simple logical operation. Proposed algorithm is a cipher algorithm which has been designed to be implemented by software easily. AA32 supports 128bit key and executes operations by word and byte unit. As Linear Feedback Sequencer, ASR 151bit is applied to AA32 and the reduction function is a very simple structure stream cipher, which consists of two major parts, using simple logical operations, instead of S-Box for a non-linear operation. The proposed stream cipher AA32 shows the result that it is faster than SSC2 and Salsa20 and satisfied with the security required for these days. Proposed cipher algorithm is a fast stream cipher algorithm which can be used in the field which requires wireless internet environment such as mobile phone system and real-time processing such as DRM(Digital Right Management) and limited computational environments such as WSN(Wireless Sensor Network).

Scrambling Technology in MPEG Video Environment (MPEG비디오 부호화기 내의 scrambling 기술)

  • Kwon, Goo-Rak;Youn, Joo-Sang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.7
    • /
    • pp.1279-1284
    • /
    • 2009
  • With the advance of multimedia technology, multimedia sharing among multiple devices has become the main issue. This allows users to expect the peer-to-peer distribution of unprotected and protected contents over public network. Inevitably, this situation has caused an incredible piracy activity and Web sites have begun to provide copyrighted A/V data for free. In order to, protect the contents from illegal attacks and distribution, digital right management (DRM) is required. In this paper, we present the minimal cost scrambling scheme for securing the copyrighted multimedia using the data encryption standard (DES) encryption technique. Experimental results indicate that the proposed scrambling techniques achieve a very good compromise between several desirable properties such as speed, security, and file size.

u-GIS National Land Information Providing System (u-GIS 국토정보 제공 시스템)

  • Kim, Jae-Chul;Lee, Kyu-Chul
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.1
    • /
    • pp.1-8
    • /
    • 2009
  • The u-GIS national land information providing technology is the technology which maximizes the application of u- GIS data through the national land information platform technique of the next generation web and provides a user with the on-demand national land information in the ubiquitous environment. Recently, as the environment emphasizing the web as a platform 'Web 2.0' emerges, the where 2.0 which is paradigm is diffused in the spatial information area. And the Geo-spatial Web technology develops in a center. Moreover, it is changed to the open platform of the user participation trend. And the consumer of the geo-spatial information is changed to the end-user center from the public institution. The geo-spatial technique is technologically faced with the new challenge. In this paper, we analyze the technical tendency about a paradigm, And we present the u-GIS national land information platform technique, the u-GIS national land information visualization technology, the u-GIS national land information GeoDRM integrative technique, and the u-GIS national land information mobile application technology as the essential elemental technology for overcoming this.

  • PDF