簡易檢索 / 詳目顯示

研究生: 楊凱丞
Kai-Cheng Yang
論文名稱: 具轉移性數位版權管理系統與其在電子商務應用之研究
The Research of Transferable Digital Rights Management System and Its Applica-tions in Electronic Commerce
指導教授: 孫宏民
Hung-Min Sun
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊系統與應用研究所
Institute of Information Systems and Applications
論文出版年: 2005
畢業學年度: 93
語文別: 英文
論文頁數: 58
中文關鍵詞: 數位版權管理系統電子商務轉移性公平使用安全性信任運算
外文關鍵詞: Digital Rights Management System, Electronic Commerce, Transferability, Fair Use, Security, Trusted Computing
相關次數: 點閱:3下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 隨著科技越來越進步,數位內容的複製和傳播也越來越容易了。特別是p2p軟體的風行,使得檔案的搜尋越來越簡單,下載的速度也越來越快。嚴重危害到數位內容業者的利益,也違反了智慧財產權法,更遏阻了數位內容產業的發展。此時,數位版權管理(Digital Rights Management)系統被提出來解決這些問題。
    數位版權管理系統,雖然提供了基本的權限管控,但很多傳統市場上的使用習慣,例如: 權限的移轉,合法的修改,交易時的隱私權保護 等等, 都還沒有完善的解決方案。這些大大減低了消費者購買受保護的數位內容的意願。
    在本研究中,藉著在伺服器端提供權限轉移的功能,我們解決了其中一個關於”公平使用”(fair use)的爭議,購買的數位內容可以借給朋友。基於這個新功能,我們更提出在電子商務中兩個新的商業模式: 一個是AV (Au-dio/Visual)出租店-消費者可以在線上租用數位內容,另一個是AV二手商店-消費者可以轉賣他們曾經購買的數位內容。這兩個商業模式,使得我們的數位產權管理系統更加合理而且合法。
    再者,我們也對數位產權管理系統作了概括的介紹,從其分類,基本架構,到需要注意的安全性議題。也有對其作一些合法性的探討和市面上一些系統的概況。


    With the improvement of technology, the duplication and distribution of digital contents is getting easier and easier, and the population of peer-to-peer software makes searching easier and downloading faster. This decreases the bene-fits of content providers, violates the copyright laws, and restrains the development of the digital content market. Therefore, DRM (Digital Rights Management) sys-tems are proposed to resolve these problems.
    Although DRM systems prevent digital contents from unauthorized access, it is insufficient to provide the functions which are associated with “personal use” and “fair use”. For example, allowing transfer of rights, allow excerpting and modification, and promoting user’s privacy. These lower the desire of consumer’s demand of purchasing the contents with DRM mechanism.
    In current Digital Rights Management systems, consumers cannot resell copyrighted contents arbitrarily. This violates the common use of property in the real world. In this thesis, we solve this problem which is associated with the fair use issues by providing a new function of changing access right in DRM system. Based on this new function in DRM system, we propose two new business models in Electronic Commerce. One is an AV (Audio/Visual) rental store in which custom-ers can rent audio/visual media on-line. The other one is an AV secondhand store in which customers can resell audio/visual media they purchased to others. These two new business models make our transferable DRM system reasonable and legal.
    In addition, we will introduce the DRM systems from the categories to the security issues and a typical architecture to acquire a basic cognition of DRM systems. Furthermore, we will address the fair use and legal use of DRM systems, and we will show the overview in the current market.

    Chapter 1 Introduction 1 1.1 Motivation of the Research 1 1.2 Organization of the Thesis 3 Chapter 2 Survey of DRM systems 4 2.1 Categories of DRM system 4 2.1.1 Public-key-based DRM v.s. Broadcast- based DRM 4 2.1.2 Classification from distribution channel 5 2.1.3 Off-line DRM v.s. On-line DRM 8 2.1.4 Device-based DRM v.s. Identity-based DRM 9 2.2 A Typical DRM System 10 2.3 Security in DRM 15 2.3.1 Cryptographic Mechanisms 15 2.3.2 Identity verification 16 2.3.3 Digital Watermarking 16 2.3.4 Tamper Resistance 18 Chapter 3 Fair use & Legal use 20 3.1 Viewpoints from Proponents 20 3.2 Viewpoints from Opponents 21 3.3 Viewpoints from Laws 22 3.3.1 Legal Framework for DRM 22 3.3.2 Copyright Law and DRM 23 3.4 Viewpoints of this thesis 25 Chapter 4 Transferable DRM System 26 4.1 Environment Setting 26 4.1.1 Trusted Computing 27 4.1.2 Public Key Infrastructure (PKI) 28 4.1.3 E-cash 28 4.2 Our Architecture 28 4.3 Business Policy 29 4.4 Notations 30 4.5 Registration Phase 31 4.6 Playing Phase 31 4.7 Lending Phase 32 Chapter 5 Two New Business Models-AV Rental Store & AV Secondhand Store 35 5.1 AV Rental Store 35 5.1.1 Business Policy 36 5.1.2 Transaction Protocol 36 5.2 AV Secondhand Store 38 5.2.1 Business Policy 38 5.2.2 Transaction Protocol 39 Chapter 6 Security Analysis 41 6.1 Smart card security 41 6.2 Protocol security 41 Chapter 7 Conclusions 44 7.1 Brief Review of Main Contributions 44 7.2 Further Research Topics 45 Bibliography 46

    [1] M. Barni, F. Bartolini, “Data Hiding for Fighting Piracy,” Signal Processing Magazine, IEEE, Vol.21, No.2, Mar 2004, pp. 28 – 39.
    [2] C. Conrado, F. Kamperman, G.J. Schrijen, W. Jonker, ”Privacy in an Iden-tity-based DRM System,” Database and Expert Systems Applications, 2003, in Proc. 14th Int. Workshop on, Sept. 2003, pp. 389 – 395.
    [3] C. Conrado, M. Petkovic, W. Jonker, “Privacy-Preserving Digital Rights Management”, Secure Data Management, VLDB 2004 Workshop, SDM 2004, pp. 83-99.
    [4] J.S. Erickson, ”Fair use, DRM, and Trusted Computing,” Communication of the ACM, vol.46 No.4, pp. 34-39, April 2003.
    [5] A.M. Eskicioglu, “Multimedia security in group communications: Recent progress in key management, authentication, and watermarking,” ACM Multimedia Syst. J. (Special Issue on Multimedia Security), pp. 239-248, Sep. 2003.
    [6] M. Hendry, Smart Card Security and Applications, 2nd edition, Boston: Artech House, 2001.
    [7] T.P. Jiang, Y.M. Hou, S.B. Zheng, “Secure communication between set-top box and smart card in DTV broadcasting;” Consumer Electronics, IEEE Transactions on Vol.50, No.3, Aug. 2004, pp. 882 – 886.
    [8] W. Jonker, J.-P. Linnartz, “Digital Rights Management in Consumer Elec-tronics products”, Signal Processing Magazine, IEEE, Vol.21, No.2, pp. 82 – 91, Mar 2004.
    [9] S.H. Kwok, S.M. Lui, ”A License Management Model to Support B2C and C2C Music Sharing,” in Proc. Int. WWW Conf.(10), Hong-Kong. (2001)
    [10] D.G. Lee, H.G. Oh, I.Y. Lee, ”A study on contents distribution using electronic cash system,” e-Technology, e-Commerce and e-Service, EEE '04. 2004 IEEE International Conf., March. 2004, pp. 333 – 340.
    [11] E.I. Lin, A.M. Eskicioglu, R.L. Lagendijk, E.J. Delp, “Advances in digital content protection,” in Proc. IEEE, Vol.93, No.1, Jan. 2005, pp. 171 – 183.M. Hendry, Smart Card Security and Applications, 2nd edition, Boston: Artech House, 2001.
    [12] Q. Liu, R. Safavi-Naini, N.P. Sheppard, ”Digital Rights Management for Content Distribution,” in Proc. Australasian information security workshop Conf. on ACSW frontiers 2003, Adelaide, Australia, Vol.21, pp. 49 – 58.
    [13] J. Lotspiech, S. Nusser, F. Pestoni, ”Broadcast encryption's bright future,” Computer, Vol.35, No.8, pp. 57 – 63, Aug 2002.
    [14] J. Lotspiech, S. Nusser, F. Pestoni, “Anonymous trust: digital rights man-agement using broadcast encryption,” in Proc. of the IEEE, Vol.92, No.6, pp. 898–909, June 2004.
    [15] M. Maat, “The economics of e-cash”, Spectrum, IEEE, Vol.34, No.2, pp. 68-73. Feb. 1997.
    [16] M. Mimura, S. Ishida, Y. Seto, “Fingerprint verification system on smart card,” Consumer Electronics, 2002. ICCE. 2002 Digest of Technical Papers. Int. Conf. on June 2002, pp. 182-183.
    [17] D. Mulligan, J. Han, A. J. Burstein, “How DRM-based content delivery sys-tems disrupt expectations of personal use,” in Proc. 2003 ACM workshop on Digital rights management. Washington, DC, USA, October 27, 2003, pp. 77 – 89.
    [18] R. Oppliger, R. Rytz, “Does trusted Computing Remedy Computer Security Problems?”, Security & Privacy Magazine, IEEE, Vol.3, No.2, pp.16 – 19, March-April 2005.
    [19] R. Owens, Executive Director, ”Legal Policy and Digital Rights Manage-ment,” in Proc. IEEE. Vol.92, No.6, June 2004, pp. 997-1003.
    [20] R. Perlman, “An Overview of PKI Trust Models”, Network, IEEE, Vol.13, No.6, pp. 38 – 43, Nov.-Dec. 1999.
    [21] A. Seki, W. Kameyama, “A proposal on open DRM system coping with both benefits of rights-holders and users,” Global Telecommunications Conf., 2003. GLOBECOM '03. IEEE, Vol.7, Dec. 2003, pp. 4111- 4115.
    [22] W. Stallings, Cryptography and Network Security, 2nd edition, New Jersey: Prentice-Hall, Inc. 1995.
    [23] S.J. Vaughan-Nichols, ”How Trustworthy Is Trusted Computing”, Computer, Vol. 36, No.3, pp. 18 – 20, March. 2003, IEEE JNL.
    [24] EIA-679B National Renewable Security Standard, Sep. 1998
    [25] Microsoft DRM solution. [Online]. Available: http://www.microsoft.com/windows/windowmedia/drm/default.aspx
    [26] Digital Rights Management. [Online]. Available: http://en.wikipedia.org/wiki/Digtal_Rights_Management
    [27] RealNetworks DRM solution. [Online]. Available: http://www.realnetworks.com/products/drm/index.html
    [28] Helix device DRM. [Online]. Available: https://devicedrm.helixcommunity.org/
    [29] OMA DRM. [Online]. Available: http://www.openmobilealliance.org/
    [30] Apple’s FairPlay DRM. [Online]. Available: http://www.apple.com/support/itunes/authorization.html
    [31] PressPlay. [Online]. Available: http://www.napster.com/
    [32] MusicNet. [Online]. Available: http://www.musicnet.com/
    [33] Moving Picture Experts Group (MEPG), ISO/IEC 21000-4 Rights Expression Language, 2004.
    [34] Open Digital Rights Language (ORDL) version 1.0, R. Ianella. [On-line]. Available: http://www.w3.org/TR/odrl/
    [35] Content Scramble System. [Online]. Available: http://www.dvdcca.org
    [36] Protection for Prerecorded Media. [Online]. Available: http://www.verance.com
    [37] 4C/Verance Watermark. [Online]. Available: http://www.verance.com
    [38] Content Protection for Recordable Media. [Online]. Available: http://www.4Centity.com
    [39] High Definition Copy Protection. [Online]. Available: http://www.jvc-victor.co.jp/english/products/vcr/D-security.hrml
    [40] Digital Transmission Content Protection. [Online]. Available: http://www.dtcp.com
    [41] High-Bandwidth Digital Content Protection. [Online]. Available: http://www.digital-CP.com
    [42] OpenCable CableCARD Copy Protection System Interface Specification. [Online]. Available: http://www.opencable.com
    [43] ATSC Standard A/70: Conditional Access System for Terrestrial Broadcast. [Online]. Available. http://www.atsc.com
    [44] Proprietary Conditional Access System for DirecTV. [Online]. Available: http://www.directv.com
    [45] Proprietary Conditional Access System. [Online]. Available: http://www.dishnetwork.com
    [46] OpenCable System Security Specification. [Online]. Available: http://www.opencable.com
    [47] Microsoft Windows Media SDK. [Online]. Available: http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnanchor/html/anch_winmedsdk.asp
    [48] Trusted Computing Platform Alliance. [Online]. Available: http://cache-www.intel.com/cd/00/00/01/77/17773_building_a_foundation.pdf
    [49] Trusted Computing Group. [Online]. Available: https://www.trustedcomputinggroup.org/home
    [50] Trusted Platform Module. [Online]. Available: http://www.infineon.com/cgi/ecrm.dll/ecrm/scripts/prod_ov.jsp?oid=29049
    [51] Palladium, Next Generation Secure Computing Base. [Online]. Available: http://www.epic.org/privacy/consumer/microsoft/palladium.html

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE