数字版权管理系统及其协议研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
近年来,随着因特网和多媒体技术的迅速发展,用户可以方便地制作数字内容并通过网络进行传播。然而,用户对数字内容的任意复制和传播使得网络上的版权侵害问题非常严重。这极大地损害了版权拥有者及相关权利人的合法权益,妨碍了数字化产业的健康有序发展。因此,如何有效保护数字内容的版权已成为业界所面临的一个重要问题。
     数字版权管理DRM(Digital Rights Management)作为一个解决该问题的有效技术,受到越来越多研究者的关注。该技术可用以保证数字内容在整个生命周期内的合法使用,平衡数字内容价值链中各个角色的利益和需求。
     目前,大多数DRM系统都将使用数字内容时必不可少的数字许可证保存在用户端,这会带来一定的安全隐患。此外,现有的DRM系统主要关注权利在版权所有者和普通用户之间的传递,而较少注意权利在普通用户间的二次分发。据此提出一种基于移动代理并支持权利二次分发的DRM系统并对系统的主要工作协议进行了阐述。系统中的移动代理能代表内容服务器的利益,携带数字许可证移动到用户端公正地执行DRM功能,并在执行完毕之后返回发送端,这避免了数字许可证在用户端的存储,而通过将移动代理构建为时限黑箱可保证移动代理自身的安全。系统还提供了对权利二次分发的支持以提高用户购买和使用内容的积极性,减少用户破解DRM系统的可能性。此外,系统还通过在发布的数字内容中嵌入内容服务器的数字水印来进行版权追踪。
     随着电子产品的普及以及通信技术的发展,家庭网络已经成为研究者关注的热点。家庭网络的独特特点使得目前市场上一般的DRM系统对其并非完全适合,如在家庭网络内,用户一般都希望能实现数字内容的方便共享,而大多数DRM系统对此并不支持。通过对现有的一些面向家庭网络的DRM方案的分析,可以发现它们在权利管理模式、管理的灵活性以及安全性等方面存在一些不足。据此提出一种面向家庭网络的DRM系统并对系统的主要工作协议进行了阐述。系统中,家庭网关通过“域”的构建来管理家庭网络内的所有用户设备,并作为它们的代理向因特网上的DRM服务器申请数字内容和许可证。家庭网关所申请的权利基于家庭网络域内所有用户设备,该权利允许合法注册的用户设备通过超级分发模式进行数字内容的共享,而组密钥技术则可以保证加密的数字内容只能被合法用户设备解密使用。此外,系统在其所发布的数字内容中嵌入家庭网关的数字指纹,这样,系统在发现盗版时可根据该数字指纹来定位具体的家庭网络并依法追究其责任。
     当前市场上已有的DRM系统数量众多,而这些DRM系统在发布的数字内容和许可证的格式上以及操作方法上均存在着差异,这给用户的内容使用带来了极大的不便,同时也妨碍了市场的进一步发展。解决该问题最主要的方法是采用互操作技术。通过对现有的一些DRM互操作解决方案的分析,发现它们在用户端负载或安全性等方面存在一些不足。据此提出一种DRM互操作支撑系统并对系统中的主要工作协议进行了阐述。系统可连接不同的DRM系统,并通过格式转换来实现DRM系统之间的数字内容访问。系统由可信的专用服务器承担并采用公钥基础设施机制来保证其安全性。分析表明该系统在安全性和工作效率等方面具有一定优势。
In recent years, with the rapid development of the Internet and multimedia technique, digital contents can be freely produced and then be propagated through the networks. However, the arbitrary copy and redistribution to the digital contents make the copyrights infringement in the networks very serious. The legal rights of the rights holders and relative people are greatly harmed and it obstructs the digitalized industry in developing healthily and orderly. So, how to protect the copyrights of the digital contents is becoming an important problem to the industry.
     As an effective technique to solve the problem, DRM (Digital Rights Management) catches the researchers' more and more attentions. The technique is used to ensure the legal use during the whole life circle of the digital contents, and it can balance the benefits and requirements of each role in the digital content value chain.
     At present, most DRM systems save the digital license which is necessary while using the digital content in the user end. It would bring some security problem. Besides, the existing DRM systems emphasize the distribution of rights between the rights holders and common users, but pay very little attention to rights redistribution between the common users. A DRM system based on mobile agent for digital rights redistribution is proposed and the main protocols of it are analyzed. In the system, the mobile agent is deployed on behalf of content provider. It carries the digital license and arrives in the user end to enforce the DRM functions honestly, and returns to the sender end after execution, this prevents the digital license from saving in the user end. The security of the mobile agent itself can be assured by creating a time limit blackbox out of an original mobile agent. Rights redistribution supported by the system can increase the motivation for users to buy and use contents and decrease the possibility to crack the DRM system. Besides, the digital watermarking is embedded in the digital content issued by the content provider to copyrights pursuit.
     With the popularization of the electronic products and the development of the communication technology, home network is becoming a hotspot to the researchers. The unique properties of the home network make the common DRM systems in the market not suitable for it, for example, in the home network, users usually wish the contents can be conveniently shared, but most DRM systems don't support it. According to the analysis of the existing DRM proposals for home network, we can find that they have some shortages about rights management mode、flexibility of management and security. So a home network oriented DRM system is proposed and the main protocols of it are analyzed. In the system, home gateway manages all the user terminals in the home network by creating a domain, and requires digital content and license from the DRM system in the Internet as their agent. The right required by the home gateway bases on all the user terminals in the home network domain, and it allows the content sharing between the user terminals which have legally registered in the domain through the super distribution mode, and the group key technique can ensure that the encrypted content is only decrypted and used by the legal user terminals. Besides, the system embeds the digital fingerprint of the home gateway. As a result, when the pirated copy of the issued content is found, the digital fingerprint is used in locating the precise home network and investigating it according to law.
     There are many DRM systems in the market now, but the format of the provided contents and licenses and the operation methods of the DRM systems all exist distinct. It brings huge inconvenience to users and disturbs the further development of the market. The main measure to solve the problem is the interoperability technique. Through the analysis to some current schemes to solving DRM interoperability, we can find them lack in user end burden and security etc. So a supporting system for DRM interoperability is proposed and the main protocols of it are analyzed. The system can connect different DRM systems and apply content access between DRM systems through format conversion. The system is applied by the specific convincing server and adopts Public key infrastructure technique to ensure security. The analysis shows the system has some advantage in security and work efficiency.
引文
[1]Sainty Katherine.Digital rights management:Business challenges.Telecommunication Journal of Australia,2004,54(2):37-42
    [2]Bechtold Stefan.The present and future of digital rights management.in:Second International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution,2006:6-7
    [3]Yag(u|¨)e Mariemma I.The digital information war.Online Information Review,2007,31(1):5-9
    [4]Rosenblatt Bill.DRM,law and technology:An American perspective.Online Information Review,2007,31(1):73-84
    [5]Samuelson Pamelal.DRM {and,or,vs.} the law.Communications of the ACM,2003,46(4):41-45
    [6]Poremba Sue Marquette.Take a look at today's vibrant ebook market.EContent,2008,31(2):32-37
    [7]Anon.The year of the eBook:Revolutionizing the publishing industry.Prepress Bulletin,2001,90(5):1-12
    [8]贾代平,范辉.流媒体技术规范及其应用技术研究综述.计算机工程,2005,31(2):5-7
    [9]胡俊.流媒体技术概述.武汉理工大学学报(信息与管理工程版),2005,27(5):120-122
    [10]Bender W.,Gruhl D.,Morimoto N.,et al.Techniques for data hiding.IBM System Journal,1996,35(3-4):313-336
    [11]Siegel Jon.OMG overview:CORBA and the OMA in enterprise computing.Communications of the ACM,1998:41(10):37-43
    [12]魏景芝,杨义先,钮心忻.OMA DRM技术体系研究综述.电子与信息学报,2008,30(3):746-751
    [13]Andreaux Jean-Pierre,Durand Alain,Furon Teddy,et al.Copy protection system for digital home networks.IEEE Signal Processing Magazine,2004,21(2):100-108.
    [14]Liang Chia-Kai,Liu Chia-Chu,Chen Homer H..A robust DRM system on the DVB multimedia home platform.in:2006 3rd IEEE Consumer Communications and Networking Conference,2006:605-609
    [15]Sui Aina,Wang Yongbin,Lu Rui,et al.A trust model based DRM technology on distributed P2P and IPv6 networks.in:Proceedings of the 2007 IEEE Swarm Intelligence Symposium,2007:366-370
    [16]Jae-Youn Sung,Jeong-Yeon Jeong,Ki-Song Yoon.DRM enabled P2P architecture.in:8th International Conference Advanced Communication Technology,2006:487-490
    [17]Chorianopoulos Konstantinos,Barria Javier,Regner Tobias,et al.Cross media digital rights management for online stores.in:Proceedings-First International Conference on Automated Production of Cross Media Content for Multi-channel Distribution,2005:257-260
    [18]Jamkhedkar Pramod A,Heileman Gregory L.DRM as a layered system.DRM 2004:Proceedings of the Fourth ACM Workshop on Digital Rights Management,2004:11-21
    [19]Kramer,Elsa F.Digital rights management:pitfalls and possibilities for people with disabilities,2007,10(1):14-24
    [20]范科峰,莫玮,曹山等.数字版权管理技术及应用研究进展.电子学报,2007,35(6):1139-1147
    [21]俞银燕,汤帜.数字版权保护技术研究综述.计算机学报,2005,28(12):1957-1968
    [22]Dhamija Rachna,Wallenberg Fredrik.A framework for evaluating digit rights management proposals.in:Proceedings of the 1st International Mobile IPR Workshop,2003,13-21
    [23]庄超.一种新型的Internet内容版权保护的计算机制.计算机学报,2000,23(10):1088-1091
    [24]Kwok Sai Ho.Watermark-based copyright protection system security.Communications of the ACM,2003,46(10):98-101
    [25]Ahn Yong-Hak,Han Myung-Mook,Lee Byung-Wook.DRM architecture for mobile VOD services.Lecture Notes in Computer Science,2006:611-618
    [26]Buyens Koen,Michiels Sam,Joosen Wouter.A software architecture to facilitate the creation of DRM systems.in:2007 4th Annual IEEE Consumer Communications and Networking Conference,2007:955-959
    [27] Jamkhedkar Pramod A., Heileman Gregory L.,Martinez-Ortiz Ivan. Middleware services for DRM. in: Proceedings of the 2007 2nd International Conference on Communication System Software and Middleware and Workshops, 2007:1-8
    [28] Jamkhedkar Pramod A., Heileman Gregory L..Digital rights management architectures.Computers and Electrical Engineering, 2009, 35(2):376-394
    [29] Iannella Renato.The open digital rights language: XML for digital rights management.Information Security Technical Report, 2004:47-55
    [30] Mulligan D,Burstein A. Implementing copyright limitations in right expression languages.Digital Rights Management.ACM CCS-9 Workshop, DRM 2002. Revised Papers, 2003:137-154
    [31] Chong Cheun Ngen, Corm Ricardo,Doumen Jeroen,et al.License Script: A logical language for digital rights management.in:Annales des Telecommunications/Annals of Telecommunications,2006,61 (3 -4) :284-3 31
    [32] Wang Xin,Lao Guillermo,DeMartini Thomas,et al.XrML - extensible rights Markup Language.in:Proceedings of the ACM Workshop on XML Security,2003:71-79
    [33] Aura Tuomas,Gollmann Dieter.Software license management with smart cards.in: Proceedings of the USENIX Workshop on Smartcard Technology, 1999:75-85
    [34] Atallah Mikhail J., Jiangtao Li.Enhanced smart-card based license managementin: Proceedings IEEE International Conference on E-Commerce,2003:111-119
    [35] Naumovich Gleb,Memon Nasir.Preventing piracy,reverse engineering,and tampering. Computer, 2003, 36(7):64-71
    [36] Dirk Kuhlmann, Robert A. Gehring.Trusted platforms, DRM, and beyond.Lecture Notes in Computer Science, 2003, 2770:1-28
    [37] Chu C-C., Su X., Prabhu B.S.,et al. Mobile DRM for multimedia content commerce in P2P networks.2006 3rd IEEE Consumer Communications and Networking Conference, 2006:1119-1123
    [38] Lee Jungsoo.P2P based private broadcasting DRM system. International Conference on Advanced Communication Technology, 2009:2337-2339
    [39] Kumar Praveen,Sridhar G., Sridhar V.,et al.DMW-A middleware for digital rights management in peer-to-peer networks.in: Sixteenth International Workshop on Database and Expert Systems Applications, 2005:246-250
    [40] Kalker Ton,Epema Dick H.,Hartel Pieter H.,et al. Music2Share-Copyright compliant music sharing in P2P systems. Proceedings of the IEEE (Enabling Security Technologies for Digital Rights Management), 2004, 92(6):961-970
    [41] Iwata Tetsuya,Abe Takehito,Ueda K.,et al.A DRM system suitable for P2P content delivery and the study on its implementation.in:9th Asia-Pacific Conference on Communications, 2003,2:806-811
    [42] Byers Simonl, Cranor Lorrie, Korman Dave,et al.Analysis of security vulnerabilities in the movie production and distribution process. DRM 2003: Proceedings of the Third ACM Workshop on Digital Rights Management, 2003:1-12
    [43] Chong Daniel J. T., Deng Robert H.. Privacy-enhanced super distribution of layered content with trusted access control.Proceedings of the ACM Workshop On Digital Rights Management, DRM'06.Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06,2006:37-44
    [44] Cheung S.C.,Curreem Hanif.Rights protection for digital contents redistribution over the internet.in: Proceedings 26th Annual International Computer Software and Applications, 2002:105-110
    [45] Kwok S. H., Lui S. M..A License Management Model to Support B2C and C2C Music Sharing.in: Proceedings of the Tenth International World Wide Web Conference, 2001:136-137
    [46] Nair Srijith K., Popescu Bogdan C.,Chandana Gamage,et al. Enabling DRM preserving digital content redistribution.in: Seventh IEEE International Conference on E-Commerce Technology, 2005:151-159
    [47] Paul Koster, Javier Montaner, Najib Koraichi, et al.Introduction of the Domain issuer in OMA DRM.in: The 4th Annual IEEE Consumer Communications and Networking Conference, Las Vegas NV USA, 2007:940-944
    [48] Lee Young Gu , Lee Chang Bo, Kim Jung Jae, et al.A study on secure contents transmission in home domain.in: 2008 International Conference on Convergence and Hybrid Information Technology, 2008:139-144
    [49] Jeong Eun Seok, Sur Chul,Rhee Kyung Hyune.A new DRM system based on graded contents sharing and time-block distribution for home networks.in:6th IEEE/ACIS International Conference on Computer and Information Science; 1st IEEE/ACIS International Workshop on e-Activity, 2007:830-833
    [50] Kalker Ton, Carey Knox, Lacy Jack, et al.The coral DRM interoperability framework.In:2007 4th Annual IEEE Consumer Communications and Networking Conference,2007:930-934
    [51]Filho F.M.F.,de Albuquerque J.P.,de Geus P.L..A service-oriented framework to promote interoperability among DRM systems.in:Autonomic Management of Mobile Multimedia Services.9th IFIP/IEEE International Conference on Management,2006:124-127
    [52]Nam Do-Won,Jeong Yeonjeong,Park Jihyun,et al.DRM content adaptation between different DRM systems for seamless content service.in:Proceedings of the International Symposium on Consumer Electronics,ISCE,2007:867-870
    [53]李平,卢正鼎,邹复好等.一个P2P环境下基于移动代理的DRM方案.计算机科学,2006,33(12.增刊):1-4
    [54]Li Ping,Lu Zhengding,Zou Fuhao,et al.A DRM System Based on Mobile Agent for Digital Rights Redistribution.Wuhan University Journal of Natural Sciences,2008,13(4):475-480
    [55]Seki Akiko,Kameyama Wataru.A proposal on open DRM system coping with both benefits of rights-holders and users.In:IEEE Global Telecommunications Conference,2003,7:4111-4115
    [56]Lin E.I.,Eskicioglu A.M.,Lagendijk R.L,et al.Advances in Digital Video Content Protection.Proceedings of the IEEE,2005,93(1):171-183.
    [57]Perdikeas Menelaos K.,Chatzipapadopoulos Fotis G.,Venieris Iakovos S.,et al.Mobile agent standards and available platforms.Computer Networks,1999,31(19):1999-2016
    [58]Pham Vu Anh,Karmouch Ahmed.Mobile software agents:An overview.IEEE Communications Magazine,1998,36(7):26-37
    [59]Loke Seng Wai.An overview of mobile agents in distributed applications:Possibilities for future enterprises systems.Informatica,2001,25(2):247-260
    [60]Wang Alf Inge,Srensen Carl-Fredrik,Indal Eval.A Mobile Agent Architecture for Heterogeneous Devices.in:Proceedings of the IASTED International Conference on Wireless and Optical Communications,2003,3:584-590
    [61]Zhang Junqi,Wang Yan,Varadharajan Vijay.Mobile agent and Web service integration security architecture.in:Proceedings-IEEE International Conference on Service-Oriented Computing and Applications 2007 172-179
    [62] Hattori Masanori, Ohsuga Akihiko, Honiden Shinichi.Planning mobile agent architecture for realizing mobile intelligence.in:Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2003:1026-1032
    [63] Corradi Antonio,Montanari Rebecca,Stefanelli C. Mobile agents integrity in e-commerce applications.in:19th IEEE International Conference on Distributed Computing Systems,Workshops on Electronic Commerce and Web-based Applications, 2003:59-64
    [64] Mitrovic Nikola,Mena Eduardo.Improving user interface usability using mobile agents.in:Interactive Systems. Design, Specification, and Verification. 10th International Workshop,2003:273-287
    [65] Xu Wei, Cao Jiannong, Beihong Jin,et al.GCS-MA: A group communication system for mobile agents.Journal of Network and Computer Applications,2007,30(3): 1153-1172
    [66] Karjoth Günter,Asokan N.,Gulcu C..Protecting the computation results of free roaming agents. in: Second International Workshop on Mobile Agent, 1998:195-207
    [67] Yee Bennet S..A Sanctuary for mobile agents.Secure Internet programming, Security issues for mobile and distributed objects, 1999:261-273
    [68] Giovanni Vigna, Protecting Mobile Agents Through Tracing, Proceedings of the 3rd ECOOP Workshop on Mobile Object Systems, 1997:137-153
    [69] Esparza Oscar,Fernandez Marcel,Soriano Miguel.Protecting mobile agents by using traceability techniques.in: International Conference on Information Technology: Research and Education, 2003:264-268
    [70] Sander Tomas,Tschudin Christan F..Protecting mobile agents against malicious hosts.Mobile agents and security, 1998:44-60
    [71] Abadi Martin,Feigenbaum Joan. Secure circuit evaluation-a protocol based on hiding information from an oracle, 1990, 2(1): 1-12
    [72] Hohl Fritz, Rothermel Kurt.A Protocol Preventing Blackbox Tests of Mobile Agents.in: Tagangsbandder ITG/VDE Fachtagung Kommunikation in Verteilten Systemen, 1999:170-181
    [73] Hohl Fritz. A Model of Attacks of Malicious Hosts against Mobile Agents. Lecture Notes in computer science.1998,1543:593-608
    [74]Hohl Fritz.Time limited blackbox security:protecting mobile agents from malicious hosts.Mobile agents and security.1998:92-113
    [75]Wright Marie.A.An overview of PKI.Network Security,1999,1999(9):14-17
    [76]Dankers Jozef,Garefalakis Theo,Schaffelhofer Ralfl,et al.Public key infrastructure in mobile systems.in:Electronics and Communication Engineering Journal,2002,14(5):180-190
    [77]江为强,陈波.PKI/CA技术的起源、现状和前景综述.西南科技大学学报,2003,18(4):75-78
    [78]Perlman Radia.Overview of PKI trust models.IEEE Network,1999,13(6):38-43
    [79]Koorn R.,van Walsem P.,Lundin M..Auditing and certification of a public key infrastructure.Information Systems Control Journal,2002,5:28-31
    [80]Leprevost Franck.An Overview of Public-Key Cryptology.IS and T's International Conference on Digital Production Printing and Industrial Applications,2003:127-129
    [81]Jacksch Eric.Public key infrastructure and wireless interoperability.Computer Security Journal,2002,18(2):39-49
    [82]Yasinsac Alec.Dynamic analysis of security protocols.Proceedings New Security Paradigm Workshop,2000:77-87
    [83]冯登国,范红.安全协议形式化分析理论与方法研究综述.中国科学院研究生院学报,2003,20(4):389-406
    [84]唐静,姬东耀.基于LPN问题的RFID安全协议设计与分析.电子与信息学报,2009,31(2):439-443
    [85]Mitchell John C..Security analysis of network protocols:Logical and computational methods.Proceedings of the Seventh ACM SIGPLAN Conference on Principles and Practice of Declarative Programming,2005:151-152
    [86]Marusic Bostjan,Finkst Tomaz,Jere Andraz,et al.Share it!-Content transfer in home-to-home networks.Proceedings of the Mediterranean Electro technical Conference-MELECON,2004,669-672
    [87]White Blake.A new era for content:Protection,potential,and profit in the digital world.SMPTE Motion Imaging Journal,2004,113(4):110-120
    [88]Pei Qingqi,Ma Jianfeng,Dai Jinxiu,et al.Digital rights management for home networks using ID-based public key system and group signature.Chinese Journal of Electronics 2007,16(4):653-659
    [89]Kalman Gy(o|¨)rgy,Noll Josef.Right Management Infrastructure for Home Content.in:2007 16th IST Mobile and Wireless Communications Summit,2007:1-5
    [90]Moid Azfar,Fapojuwo Abraham.O.,Davies Robert J..Secure and scalable video streaming over IEEE 802.11e based home networks.in:2007 Canadian Conference on Electrical and Computer Engineering,2007:445-448
    [91]Kim Heeyoul,Lee Younho,Chung Byungchun,et al.Digital rights management with right delegation for home networks.Lecture Notes in Computer Science,2006:233-245
    [92]Popescu Bogdan C.,Crispo Bruno,Tanenbaum Andrew S.,et al.A DRM Security Architecture for Home Networks.in:Proceedings of the Fourth ACM Workshop on Digital Rights Management,2004:1-10
    [93]Jackson Paul,Silverman Howard.Home networking content protection solutions-Create new revenue opportunities.ABU Technical Review,2007:13-19
    [94]彭海清,冯涛,童登金.家庭网络的关键技术、业务及标准化.研究与设计,2004,(11):5-8
    [95]房胜,钟玉琢.蓝牙-家庭网络中服务的调用和实现.计算机科学,2004,31(2):36-39
    [96]刘思伟,慕德俊.数字版权管理的互操作技术研究.计算机科学,2008,35(5):236-239
    [97]邱罡,王玉磊,周利华.基于可信计算的DRM互操作研究.计算机科学,2009,36(1):77-80
    [98]Taban Gelareh,Cardenas Alvaro A.,Gligor Virgil D.Towards a secure and interoperable DRM architecture.In:Proceedings of the ACM Workshop On Digital Rights Management,DRM'06.Co-located with the 13th ACM Conference on Computer and Communications Security,CCS'06,2006:69-78
    [99]Kalker Ton.On interoperability of DRM.Proceedings of the ACM Workshop On Digital Rights Management,DRM'06.Co-located with the 13th ACM Conference on Computer and Communications Security,CCS'06,2006:45-46
    [100]Nam Do-Won,Lee Jung-Soo,Kim Jeong-Hyun,et al.Interlock system for DRM interoperability of streaming contents.In:2007 IEEE 11th International Symposium on Consumer Electronics, 2007:53-56
    [101]Senoh Takanori,Ueno Takafumi, Kogure Takuyo,et al. DRM renewability & interoperability.in:IEEE Consumer Communications and Networking Conference, 2004:424-429
    [102] Chen Xiaofan, Huang Tiejun. Interoperability issues in DRM and DMP solutions.in: 2007 International Conference on Multimedia & Expo, 2007: 907-910
    [103]Heileman Gregory L.,Jamkhedkar Pramod A.. DRM interoperability analysis from the perspective of a layered framework.DRM'05 - Proceedings of the Fifth ACM Workshop on Digital Rights Management, 2005:17-26
    [104] Hwang Seong Oun,Yoon Ki Song.Interoperable DRM framework for multiple devices environment. ETRI Journal, 2008, 30(4):565-575

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700