(3.238.173.209) 您好!臺灣時間:2021/05/15 16:03
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

: 
twitterline
研究生:顏志達
研究生(外文):Chich-Ta Yen
論文名稱:以Wrapper-based為基礎建構數位版權管理系統之研究
論文名稱(外文):A Study on Building DRM System Based on Wrapper-based Technology
指導教授:廖鴻圖廖鴻圖引用關係郭明煌郭明煌引用關係
指導教授(外文):Horng-twu LiawMing-huang Guo
學位類別:碩士
校院名稱:世新大學
系所名稱:資訊管理學研究所(含碩專班)
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2008
畢業學年度:96
語文別:中文
論文頁數:106
中文關鍵詞:數位版權管理技術攔截應用程式介面封裝權利描述語言
外文關鍵詞:Digital Rights ManagementAPI HOOKWrapperRights Expression Language
相關次數:
  • 被引用被引用:9
  • 點閱點閱:371
  • 評分評分:
  • 下載下載:58
  • 收藏至我的研究室書目清單書目收藏:0
網際網路的快速發展,文件數位化與電子數位產品的不斷出現,而這些數位化的內容有容易複製和傳遞的特性。這些內容如不受保護,將可以輕易的在電腦上播放,且毫不受限制的複製、散播。但一般使用者對數位文件、著作等沒有自我保護的意識,讓自己的權利受損,而數位內容擁有者關心的就是如何對數位內容的版權做管制。
數位版權管理技術是一種技術的集合,用來保護數位內容擁有者的權利,從對內容加密使未經認證的使用者無法使用、加入標籤進行追蹤及嵌入浮水印進行辨識等都屬於數位版權管理技術使用之技術的一環,且數位版權管理必須可以對著作者任何形式不管有形無形資產進行描述、辨識、交易、保護、監控和追蹤。
Wrapper-based數位版權管理技術係利用封裝的方式將數位內容包裝起來,並利用攔截應用程式介面的技術對檔案進行管控。使用者可以在離線的狀態下透過帳號密碼、機器碼或智慧卡的認證機制來進行認證,且讓使用者可以不須使用額外的數位內容播放器,即可瀏覽受保護的內容。本研究除了建構數位內容防護的方式外,並包含交易、權限轉移、追蹤和改善商業模型等功能的設計,使其更符合數位版權管理技術的定義。
Because the fast development of the Internet, document digitalization, and digital products unceasing appearance. The above digital contents can be easily duplicated and have the characteristic of easy transmission. Those contents can be played in computers, copied and spread without limit until those contents has been protected. To common user, has not Self-Defense of digital contents and works. In addition, the digital content providers take care to how to control the rights of digital contents.
Digital Rights Management is an application that is a technical aggregation for protecting the rights of digital content provider. It will not let unauthorized ones to access digital content by encrypting content; tracking by adding metadata; identifying by adding watermark. Digital Rights Management is description, identifying, trading, protection, monitoring, and tracking of all forms of rights usages over both tangible and intangible assets.
Lin’s Wrapper-based Digital Rights Management System is a study to package digital content by wrapper method, and the digital content be controlled by API HOOK. Moreover, the users can be authenticated by ID-Password, machine code, or smart card on off-line state. Furthermore, the mechanism can let user browse without any plug-in.
This research is to collect the definition of Digital Rights Management, and rethink about Lin’s Wrapper-based Digital Rights Management System that is just protecting the digital content. In a nutshell, the Digital Rights Management must include trading, rights translation, tracking, and improving business model.
摘要 I
Abstract II
目錄 III
圖目錄 V
表目錄 VII
第一章 緒論 1
1.1 研究動機 1
1.2 研究目的 2
1.3 研究範圍 3
1.4 論文架構 3
第二章 文獻探討 4
2.1 數位版權管理技術簡介 4
2.1.1 定義 4
2.1.2 技術架構 5
2.2 相關研究 7
2.2.1 Wrapper-Based數位版權管理機制 8
2.2.2 以XrML為基礎之多媒體數位版權管理機制之研究 21
2.2.3 基於智慧卡改良數位版權管理系統 29
2.2.4 在消費者間發佈安全憑證的群組授權模型 34
2.2.5 數位多媒體的離線經濟結構 37
2.2.6 小結 39
第三章 相關理論與技術 42
3.1 API HOOK 42
3.1.1 API 42
3.1.2 API HOOK原理 42
3.1.3 Detours Tool 43
3.2 Wrapper 45
3.3 權利描述語言 46
3.3.1 MPEG-21 47
3.3.2 XrML 48
3.4 智慧卡 50
3.4.1 智慧卡類型 51
3.4.2 智慧卡的實體結構 53
3.4.3 智慧卡開發套件 54
3.5 商業模型 55
3.6 超傳播 56
3.7 小結 58
第四章 本文研究機制 60
4.1 系統架構 60
4.1.1 DC Management 62
4.1.2 DC Package 62
4.1.3 DC Rights Exchange 63
4.1.4 DC Wrapper 64
4.2 系統流程 65
4.2.1 內容註冊階段 65
4.2.2 使用者下載階段 66
4.2.3 使用階段 67
4.2.4 權利交換階段 69
4.2.5 憑證撤銷階段 70
4.2.6 超傳播階段 71
4.3 系統實作 72
4.3.1 實作環境 72
4.3.2 Package實作 73
4.3.3 監控系統 73
4.3.4 實作流程 74
4.4 範例說明 81
第五章 分析與討論 87
5.1 基本服務 87
5.2 商業模型 88
5.3 實作資訊 88
第六章 結論 89
6.1 結論 89
6.2 未來研究 91
參考文獻 93
[1]2006 CSI/FBI Computer Crime and Security Survey, http://i.cmpnet.com/ gocsi/db_area/pdfs/fbi/FBI2006.pdf
[2]Application Program Interface (API), http://www.atis.org/tg2k/_application _program_interface.html
[3]R. G. Cattelan, S. He and D. Kirovski, “Prototyping a Novel Platform for Free-trade of Digital Content”, Proceedings of the 12th Brazilian Symposium on Multimedia and the Web WebMedia'06, pp. 79-88, 2006.
[4]C, Conrado, M. Petkovic, M. Van Der Veen and W. Van Der Velde, “Controlled Sharing of Personal Content Using Digital Rights Management”, Journal of Research and Practice in Information Technology, Vol. 38, No. 1, 2006.
[5]C. Conrado, F. Kamperman, C. J. Schrijen, and W. Jonker, “Privacy in an Identity-based DRM System”, in Proceedings of the 14th IEEE Int. Workshop on Database and Expert Systems Applications, pp. 389-395, 2003.
[6]K. Coyle, “Rights Expression Languages”, a white paper for the Library of Congress, 2004, http://www.loc.gov/standards/Coylereport_final1single.pdf
[7]E. Damiani and C. Fugazza, “Toward Semantics-aware Management of Intellectual Property Rights”, Online Information Review, Vol. 31, No. 1, pp. 59-72, 2007.
[8]Detours, http://research.microsoft.com/sn/detours/
[9]eXtensible Rights Markup Language (XrML) Example Use Cases, http://www.xrml.org/spec/2001/11/ExampleUseCases.htm
[10]J Erickson, R Iannella, and R Wenning, “Workshop Report”, W3C Workshop on Digital Rights Management for the Web, 2001, http://www.w3.org/ 2000/12/drm-ws/workshop-report.html
[11]H. Galen and B. Doug, “Detours: Binary Interception of Win32 Functions”, Published in Proceedings of the 3rd USENIX Windows NT Symposium. Seattle, WA, pp. 135-144, 1999.
[12]Hook-api, http://www.hook-api.com/
[13]R. Iannella, “Digital Rights Management (DRM) Architectures”, D-Lib Magazine, pp. 207-216, 2001.
[14]International Standards Organization. Information Technology, “ISO/IEC TR 21000-1:2001 Information Technology -- Multimedia. Framework (MPEG-21) -- Part 1: Vision, Technologies and Strategy”, 2001.
[15]Intertrust, http://www.intertrust.com/
[16]P. A. Jamkhedkar, G. L. Heileman and I. Martinez-Ortiz, “Middleware Services for DRM”, Communication Systems Software and Middleware, pp. 1-8, 2007.
[17]Java Application Programming Interface, http://java.sun.com/products/ servlet/2.1/api/API_users_guide.html
[18]Java Card Technology, http://java.sun.com/products/javacard/
[19]D. Joshua and K. Susan, “Understanding DRM Systems”, White Paper, IDC. Technical White Paper, 2001.
[20]G. Kalman and J. Noll, “Right Management Infrastructure for Home Content”, Mobile and Wireless Communications Summit, pp. 1-5, 2007.
[21]D. Kirovski and K. Jain, “Off-line Economies for Digital Media”, ACM International Workshop on Network and Operating Systems Support for Digital Audio and Video, 2006.
[22]R. Mori and M. Kawahara, “Superdistribution: An Electronic Infrastructure for the Economy of the Future”, Transactions of the Information Processing Society of Japan, Vol. 38, No. 7, pp. 1465-1472, 1997.
[23]R. Mori, M. Kawahara, “Superdistribution: The Concept and the Architecture”, Transactions of The Institute of Electronics, Information, and Communication Engineers, Vol. E73, No. 7, pp. 1133-1146, 1990.
[24]R. Mori, “On Software Service --Several Steps for the Micro Electronics Revolution”, Journals of Japan Electronic Computer, pp. 16-26, 1983.
[25]R. Mori, “Software Service Systems”, Journal of the Institute of Electronics and Communication Engineers, Vol. 67, No. 4, pp. 431-436, 1984.
[26]W. Ku and C. H. Chi, “Survey on the Technological Aspects of Digital Rights Management”, Springer Berlin / Heidelberg Information Security, Vol. 3225, pp. 391-403, 2004.
[27]Q. Liu, R. Safavi-Naini and N. P. Sheppard, “Digital Rights Management for Content Distribution”, Australasian Information Security Workshop 2003, Vol. 21, pp. 49-58, 2003.
[28]Z. Liu, B. Wang, B. Lee and M.M. Han, “Security License Distribution Mechanism for Rights Delegation Models of Group Distribution between Consumers”, Computational Science and its Applications, pp. 144-152, 2007.
[29]Microsoft Win32 to Microsoft .NET Framework API Map, http://msdn2. microsoft.com/en-us/library/Aa302340.aspx
[30]R. MORI and M. KAWAHARA, “Superdistribution: the Concept and the Architecture”, Technical Report 7, Inst. of Inf. Sci. & Electron (Japan), Tsukuba Univ, pp. 1133-1146, 1990.
[31]N. Nadah, M. D. Rosnay and B. Bachimont, “Licensing Digital Content with a Generic Ontology: Escaping from the Jungle of Rights Expression Languages”, Proceedings of the 11th International Conference on Artificial Intelligence and Law ICAIL '07, pp. 65-69, 2007.
[32]Y. Nishimoto, A. Baba, T. Kimura, H. Imaizumi and Y. Fujita, “Advanced Conditional Access System for Digital Broadcasting Receivers Using Metadata”, Broadcasting, IEEE Transactions on Vol. 53, Issue 3, pp. 697-702, 2007.
[33]Open Mobile Alliance, http://www.openmobilealliance.org/
[34]A. Osterwalder and Y. Pigneur, “An Ontology for e-business Models, Value Creation from e-business Models”, Elsevier Butterworth-Heinemann, 2004.
[35]S. Petri, “An Introduction to Smart Cards”, http://www.artofconfusion.org/ smartcards/docs/intro.pdf
[36]E. Rodriguez and J. Delgado, “Trust in Event Reporting Mechanisms for DRM”, Consumer Communications and Networking Conference, pp. 1058-1062, 2007.
[37]B Rosenblatt, B Trippe, and S Moonry, “Digital Rights Management: Business and Technology”, John Wiley & Sons, 2001.
[38]H. M. Sun, C. F. Hung, and C. M. Chen, “An Improved Digital Rights Management System Base on Smart Cards”, Digital EcoSystems and Technologies Conference, DEST '07, pp. 308-313, 2007.
[39]N. P. Sheppard and R. Safavi-Naini, “Protecting Privacy with the MPEG-21 IPMP Framework”, 6th Workshop on Privacy Enhancing Technologies, pp. 152-171, 2006.
[40]J. H. Suh, J. H. Jin, S. J. Park, S. Y. Bae and S. C. Park, “U-DRM: A Framework of Digital Rights Management Based on Ubiquitous Computing”, 16th International Conference on Artificial Reality and Telexistence, pp. 570-575, 2006.
[41]The Linux Kernel API, http://kernelbook.sourceforge.net/kernel-api.pdf
[42]B. Wang, and B. Lee, “A Study for License Distribution Mechanism Using Accumulated Device Identifier in DRM System”, Multimedia and Ubiquitous Engineering, pp. 1118 - 1123, 2007.
[43]Windows Media Rights Manager, http://www.microsoft.com/windows/ windowsmedia/tw/drm/features.aspx
[44]WME, “Developing a License Provider Service for Windows Media Encoder”, http://msdn2.microsoft.com/en-us/library/ms867146.aspx
[45]XrML, http://www.xrml.org/
[46]XML台灣資訊網,http://www.xml.org.tw/
[47]M. Zhaofeng, Y. Yixian and N. Xinxin, “Secure and Flexible Digital Rights Management in a Pervasive Usage Mode”, International Conference on Computational Intelligence and Security, pp. 15-19, 2007.
[48]艾克索夫實驗室,http://x-solve.com/
[49]林金龍,“Wrapper-based 數位版權管理機制”,世新大學資訊管理學系碩士論文,2006年。
[50]洪御哲,“行動商務下數位權利交易機制之探討與研究”,世新大學資訊管理學系碩士論文,2006年。
[51]許明陽,“利用攔截API偵測電腦病毒”,逢甲大學資訊工程學系碩士論文,2002年。
[52]智慧卡,http://www.microsoft.com/taiwan/technet/prodtechnol/ windows2000serv/maintain/security/smtcard.aspx
[53]楊佳泰,“以XrML為基礎之多媒體數位版權管理機制之研究”,中正大學資訊工程學系碩士論文,2005年。
[54]詹耀仁,“ IC 智慧卡安全性之探討”,松山工農學報第三期,2003年。
[55]劉淑君,“數位出版品版權發行管理機制”,世新大學資訊管理學系碩士論文,2006年。
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top