移动DRM系统研究与设计
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
移动通信技术日新月异,移动用户数量也与日俱增,随着第三代移动通信技术的发展与商用,无线增值业务也逐渐成为移动通信业务发展的重点。但目前网络环境下的版权侵权案件屡禁不止,而3G的运用则加大了版权侵权的便宜性。我们在向广大的移动用户提供这些数字内容服务的同时,如何保护数字内容提供者的权利,保证整个市场合法健康地发展,已经成为无线增值业务快速发展过程中不得不面对的问题。因此需要行之有效的DRM (Digital Right Management,数字版权管理)技术来解决上述问题。
     本文将WPKI技术以及数字水印技术相结合,提出了适合于移动通信中应用的数字版权管理解决方案。论文设计了该方案功能框架,并对数字内容和数字版权的封装格式、业务流程进行设计。本方案在客户端的设计上增加了AES、ECC、SHA-1密码协处理器及保护单元等硬件模块,可以为终端创造可信的安全环境,加强系统安全性的同时也提高了可用性。身份认证方面,本方案采用了WPKI认证、智能卡认证、多级口令限制的综合身份认证技术。
     由于实际环境的限制,本文在仿真测试中主要针对数字水印技术进行相关测试。经测试可知,添加数字水印对数字的内容的影响很小,可以在当前条件下实际应用。
With the mobile communication technology developing and the number of mobile users growing, wireless value-added services is becoming the focus of the development of mobile communication business. However, under the current network environment, copyright infringement cases often occur.3G increases the convenience of copyright infringement. While we provide these services, we have to face the problem which how to protect the rights of digital products providers,how to ensure the market healthy development. Therefore, we need effective DRM (Digital Right Management) technology to solve the above problems.
     We combine the WPKI technology and digital watermark technology and propose the solutions for the digital rights management in mobile communications.This article detailed design the functional blocks which system is required.Research and design the business processes and packaging formats of the digital content and digital rights.In this program, we add the AES, ECC, SHA-1 cryptographic coprocessor and the protection unit and other hardware modules in the client part,it create a credible security environment, enhance system security and improving the availability.The program uses WPKI authentication, smart card authentication, password restricted multi-level integrated authentication technology.
     Given the current physical limitations, this article used the digital watermarking technology in the simulation tests. From the tested result,we can see that digital watermark has little effect for the digital content, digital watermark can be used in practical applications under the present conditions.
引文
[1]Friedhelm Ramme,Frank Hartung, Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications,Ericsson Research IEEE,2000 32-34
    [2]Fehmi Chebil,Mejdi Trimeche, Digital Rights Management for visual Content in Mobile Applications,Nokia Research Center IEEE,2004 21-24
    [3]Sonera Plaza Ltd MediaLab, Digital Rights Management White Paper,2002
    [4]Qiong Liu,Reihaneh Safa-vi-Naini and Nicholas Paul. Digital Rights Management for Content Distribution.AISW2003 Sheppard,2003 87-102
    [5][美]斯托林斯著、刘玉珍等译密码编码学与网络安全电子工业出版社2004
    [6]李涛编著 网络安全概论电子工业出版社200491-99页
    [7][美]Merike Kaeo著、吴中福等译 网络安全性设计(第二版)人民邮电出版社20053-14页
    [8]关振胜编著 公钥基础设施PKI与认证机构CA电子工业出版社20022-17页27-54页
    [9][美]Harold F.Tipton, Micki Krause著王顺满 陶然 杨鼎才 郭守则等译信息安全管理手册(卷Ⅱ)(第四版) 电子工业出版社2004
    [10]杨义先.信息安全新技术.北京邮电大学出版社,2002.
    [11]牛少彰.信息安全概论.北京邮电大学出版社,2004
    [12]先强,基于WPKI的移动电子商务安全研究,商场现代化200672页
    [13]钮心忻杨义先信息隐藏与数字水印北京邮电大学出版2004.
    [14杨义先钮心忻数字水印理论与技术高等教育出版社2006.03
    [15]刘红梅黄继武肖自美一种小波变换域的自适应视频水印算法电子学报2001年第29卷第12期1656-1660页
    [16]杨志强,移动改变生活,物联网推动信息化的发展,2009移动互联网研讨会
    [17]陈汗青 产品设计 华中科技大学出版社,2005
    [18]OMA, DRM Specification V2.1, OMA-TS-DRM-DRM-V2_1, http://www.openmobilealliance.org/,2008
    [19]Mitchell D.Swanson,Bin Zhu,Ahmed H.Tewfik,Robust data hiding for images, IEEE,199637-40
    [20]Bo Tao, Bradley Dickinson.Adaptive watermarking in the DCT domain. IEEE,1997 2985-2988
    [21]Christine I. Podilchuk, Wenjun Zeng Image-Adaptive Watermarking Using Visual Models,IEEE,1998 525-539
    [22]F.M.Boland,O.Ruanaidh,C.Dautzenberg,Watermarking digital images for copyright protection,IEEE,1995.326-330
    [23]邹复好 卢正鼎[学位论文]鲁棒视频水印算法及相关技术研究华中科技大学2006.5
    [24]OMA,DRM Content Format V2.1, OMA-TS-DRM-DCF-V2_1, http://www.openmobilealliance.org/,2008
    [25]冯明 唐宏 陈戈,数字版权管理技术原理与应用,人民邮电出版社,2009
    [26]OMA,DRM Rights Expression Language V2.1, OMA-TS-DRM-REL-V2_1, http://www.openmobilealliance.org/,2008
    [27]邵建平著 智能卡开发者指南 电子工业出版社2005 8-13
    [28]Daniel Thull、Roberto Sannino, Performance considerations for an embedded implementation of OMA DRM, Design, Automation and Test in Europe,2005
    [29]Yehua GU, Xiaoyang ZENG, Jun HAN A Low-cost and High-performance SoC Design for OMA DRM2 Applications China IEEE,2007 3510-3513
    [30]G. Bertoni, J. Guajardo, and C. Paar,2004, "Architecture for Advanced Cryptographic System" in Information Security, Policies and Actions inModern Integrated Systems, eds M. Fugini and C. Belletini, Idea Group Publishing,2004, Hershey (PA), USA.
    [31]Ciaran McIvor, Miire McLoone, John V McCanny,Fast Montgomery Modular Multiplication and RSA Cryptographic Processor Architectures, Proc. of Asilomar Conference on Signals, Systems, and Computers 2003;
    [32]V. Gupta, S. Gupta, S. Chang, "Performance Analysis of EllipticCurve Cryptography for SSL", Proc. of the ACM Workshop on Wireless Security, Atlanta (GA), USA, ACMPress,2002

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700