• Title/Summary/Keyword: content protection and distribution

Search Result 87, Processing Time 0.03 seconds

Design & Implementation of DRM System for End-to-end Content Protection (End-to-end 콘텐츠 보호를 위한 DRM 시스템 설계 및 구현)

  • Jeong Yeon-Jeong;Yoon Ki-Song
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.35-44
    • /
    • 2006
  • Current technologies on digital rights management (DRM) have focused on security and encryption as a means of solving the issue of unauthorized copying, that is, locking the content and limiting its distribution to only purchasers. But, illegal content copy should be protected not only from purchasers but also from other principals such as media distributors and content providers. In this paper, we designed and implemented end-to-end digital lights management system that can cover a content protection on the overall value-chains of content distribution. Proposed system provides content protection and secure management of digital rights in creator, provider, and distributor like in purchaser. Accordingly it can provide an environment protecting each principal's digital rights and prohibiting illegal usage of content.

Design and Implementation of a Protection and Distribution System for Digital Broadcasting Contents (디지털 방송 콘텐츠 보호 유통 시스템 설계 및 구현)

  • Lee Hyejoo;Choi BumSeok;Hong Jinwoo;Seo Jongwon
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.731-738
    • /
    • 2004
  • With the increase of digital content usages, the protection for digital content and intellectual property becomes more important. The DRM(digital rights management) technologies are applicable to protect not only any kind of digital contents but also intellectual property. Besides such techniques are required for recorded digital broadcasting contents due to introduction of digital broadcasting techniques and storage devices such as personal video recorder. The conventional protection scheme for broadcasting content is the CAS(conditional access system) by which the access of viewer is controlled on the specific channels or programs. The CAS prohibits the viewer from delivering the digital broadcasting content to other person, so it results in restriction of superdistribution on the digital broadcasting content. In this paper, for broadcast targeting unspecfic many people, we will design the service model of the protection and distribution of digital broadcasting content using encryption and license by employing the concept of DRM. The results of implementation are also shown to verify some functions of each component. An implemented system of this paper has some advantages that the recording of broadcast content is allowed on set-top-box and superdistribution is available by consumer. Hence it provides content providers and consumers with trustworthy environment for content protection and distribution.

The Construction of distribution test facilities of lightning protection equipment (배전급 내뢰설비 시설효과 분석 실증시험설비 구축에 관한 연구)

  • Kang, Moon-Ho
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2004.11a
    • /
    • pp.301-303
    • /
    • 2004
  • In distribution system about 5% of total outage is due to the lightning stroke. In order to reduce the rate of outage occurrence, distribution lightning protection equipments such as a secondary arrester, arching horn and various ground electrodes are developed and installed in the inside and outside of the county. Therefore it is needed to construct the test facilities to analyze the effect of these equipments. In this paper we describe the main content of the test facilities of lightning protection equipments. We have completed the field test of distribution lightning protection equipments for example lightning arrester, secondary arrester and arching horn etc.

  • PDF

Design & Implementation of License-based Digital Rights Management System (라이센스 기반 디지털 저작권 보호 시스템 설계 및 구현)

  • Jeong, Yeon-Jeong;Yoon, Ki-Song;Ryu, Jae-Cheol
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.55-62
    • /
    • 2004
  • The web-based technology allows anybody who has access to the Internet to get all kinds of information from the World Wide Web. It brings about issues regarding intellectual property and copyright threats. After content is downloaded, no further protection is provided on the content that has been accessed. DRM (Digital Right Management) technologies came out to ensure the protection of copyrighted content and information. In this paper, we propose architecture of license-based digital rights management system for protection of contents and principles' rights such as contents creators, providers, distributors, and uses in contents distribution value-chain over Internet. This system makes on-line processing of all value-chain from creator to purchaser possible, compared with existing DRM products only supporting only limited distribution between distributor and purchaser.

A Cache Privacy Protection Mechanism based on Dynamic Address Mapping in Named Data Networking

  • Zhu, Yi;Kang, Haohao;Huang, Ruhui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.6123-6138
    • /
    • 2018
  • Named data networking (NDN) is a new network architecture designed for next generation Internet. Router-side content caching is one of the key features in NDN, which can reduce redundant transmission, accelerate content distribution and alleviate congestion. However, several security problems are introduced as well. One important security risk is cache privacy leakage. By measuring the content retrieve time, adversary can infer its neighbor users' hobby for privacy content. Focusing on this problem, we propose a cache privacy protection mechanism (named as CPPM-DAM) to identify legitimate user and adversary using Bloom filter. An optimization for storage cost is further provided to make this mechanism more practical. The simulation results of ndnSIM show that CPPM-DAM can effectively protect cache privacy.

Copyright Protection Protocol providing Privacy (프라이버시를 제공하는 저작권 보호 프로토콜)

  • Yoo, Hye-Joung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.2
    • /
    • pp.57-66
    • /
    • 2008
  • There have been proposed various copyright protection protocols in network-based digital multimedia distribution framework. However, most of conventional copyright protection protocols are focused on the stability of copyright information embedding/extracting and the access control to data suitable for user's authority but overlooked the privacy of copyright owner and user in authentication process of copyright and access information. In this paper, we propose a solution that builds a privacy-preserving proof of copyright ownership of digital contents in conjunction with keyword search scheme. The appeal of our proposal is three-fold: (1) content providers maintain stable copyright ownership in the distribution of digital contents; (2) the proof process of digital contents ownership is very secure in the view of preserving privacy; (3) the proposed protocol is the copyright protection protocol added by indexing process but is balanced privacy and efficiency concerns for its practical use.

A Trusted Key Management Scheme for Digital Rights Management

  • Jeong, Yeon-Jeong;Yoon, Ki-Song;Ryou, Jae-Cheol
    • ETRI Journal
    • /
    • v.27 no.1
    • /
    • pp.114-117
    • /
    • 2005
  • In this paper, we propose a key management scheme which can provide delivery of the key used to encrypt a digital content from the package server to digital rights management (DRM) clients in a secure manner. The proposed scheme can protect digital content from attacks since an encrypted digital content is sent by a package server and only DRM clients can decrypt the encrypted digital content. It protects the key not only from purchasers but also among the other principals who manage the distribution and license servers.

  • PDF

Content Protective Multi-Agent Platform for MsMu Service and Pattern-Based Content Management

  • Uhm, Yoon-Sik;Hwang, Zi-On;Lee, Min-Soo;Nah, Jae-Hoon;Song, Hwang-Jun;Park, Se-Hyun
    • ETRI Journal
    • /
    • v.32 no.5
    • /
    • pp.665-675
    • /
    • 2010
  • Recent research on mobile Internet protocol television and digital right management (DRM) interconnections has focused on multimedia technologies designed to enhance content scalability and adaptive content distribution. However, due to the architectural and scalable limitations, recent systems are not flexible and securable with respect to their adaptive content distribution and protective policy management. Therefore, we propose a content protective multi-agent platform that provides secure multimedia services, correlation management, pattern-based management, and multi-source multi-use (MsMu)-based services. Our architecture, supported by DRM, lets us create a rich set of MsMu-based content protection and seamless multimedia services through the extension of one source multi-use (OsMu)-based content services. We have verified our platform, which provides scalable and securable services with a 17% lower service response time by using a testbed.

A Design and Implementation of DRM System by Applying System Authentication Method (시스템 인증기법을 적용한 DRM 시스템 설계 및 구현)

  • Jang, Eun Gyeom;Lee, Bum Suk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.2
    • /
    • pp.177-184
    • /
    • 2009
  • The digital contents distribution system via network provides comfortability, usability, and diversified functions to content's users. However, for the characteristic of easy access of digital contents, the copyright infringements and indiscreet contents distribution are realized in this days. In other words, any users with the authentication key can access to copyright contents with any restrictions. To solve this problems, we proposed a user authentication mechanism which prevent indiscreet access to the digital content by using user system information. Also, to provide safe distribution of digital content, we used user's unique content authentication key.

Effect of Moisture on the Current Density for Optimized Cathodic Protection Condition in RC Structures (RC조 구조물의 최적 음극방식 조건 설정을 위한 함수율의 영향에 대한 평가)

  • Park, Dong-Cheon;Cho, Gyu-hwan;Ahn, Jae-Cheol
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2013.05a
    • /
    • pp.29-30
    • /
    • 2013
  • Steel corrosion is the most serious problem in RC structures. Even though patch repair method is normally applied in repair system, the effectiveness is not enough. Cathodic protection in active repair method to deteriorated RC structures. FEM model was developed to simulate the optimized cathodic protection condition. Iro oxidation, hydrogen evolution and oxygen reduction were considered to expect current distribution. Moisture content in concrete which can affect the electrolyte conductivity was used as initial condition.

  • PDF