簡易檢索 / 詳目顯示

研究生: 王宏達
Hon-Da Wang
論文名稱: 運用Buyer-Seller浮水印協定生物認證技術及Java Card行動商務機制改進cIDf提出的架構
Use Buyer-Seller Watermark Protocol, Biometric Verification and Java Card Mobile-Commerce Payment System to Improve the cIDf Reference Model
指導教授: 許文星 教授
Prof. Wen-Hsing Hsu
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 電機工程學系
Department of Electrical Engineering
論文出版年: 2004
畢業學年度: 92
語文別: 英文
論文頁數: 121
中文關鍵詞: 浮水印協定生物認證技術行動商務機制
外文關鍵詞: Buyer-Seller Watermark Protocol, Biometric Verification, Content ID Forum
相關次數: 點閱:2下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 近年來,因為通訊和網路的發達,使得數位訊息的如同影像、音樂、電影或是其他型態的數位內容在數位世界的傳播更為方便,也造就了數位內容交易的龐大商機。雖然通訊的發達為數位內容的傳播或交易帶來許多的便利,但相對的也產生許多的問題,其中最為重要的就是數位內容的智慧財產權保護的問題和交易的安全性的問題。以數位內容的保護來說,當一件商品被轉換為數位的型式之後,就很容易被隨意的複製,而降低商品的價值。另一方面,如何確保網路上交易安全性,讓交易雙方都能放心的交易數位內容,也是數位世界要蓬勃發展的關鍵因素。
    數位世界的骨幹如果是硬體,那數位世界的血脈就是數位內容,沒有數位內容的硬體是沒有存在的價值的。要數位內容的交易能蓬勃發展,首先就必須先要確保數位內容的價值,亦即建立保護數位內容智慧財產權的觀念和方法,使得數位內容不會被隨意的更改或複製。以前大家並沒有建立起智慧財產權的觀念,導致數位內容被隨意的複製、修改、傳送而導致數位內容所有人的損失,降低了提供數位內容的意願,因此數位世界的發展就受到了阻礙。
    經過政府大力的宣導,不但智慧財產權的觀念已經逐漸成形,而且在數位內容上加入有關所有人的資訊來保護所有人的智慧財產權也漸漸為大家所接受。
    內容身份(Content ID)是一個用來保護數位內容智慧財產權很好的方法,它可以提供一個在數位世界理唯一的身份證明給數位內容,內容身份不但可以對非法使用數位內容的使用者產生威脅,而且可以提供關於數位內容所有人的相關資訊,讓使用者可以輕易要求數位內容的授權。
    討論數位內容身份的組織有很多,內容身份討論會(Content ID forum) 是由Dr. Hiroshi Yasuda博士在東京大學提出的,這個討論會的主要目的是為促進內容身份的商業行為,並且和其他的組織合作提出一套全球通用的標準,他提出了許多參考的數位內容交易模組和後期資料(metadata)的設定,希望能為數位內容的交易定下標準。
    數位內容交易要發展,除了數位內容價值的保護之外,另一個重點就是交易的安全性。傳統的交易方式是買賣雙方面對面的交易,一手交錢一手交貨,但在現今的網路交易,買賣雙方不會實際面對面而是透過虛擬的網路進行交易,因此如何確保交易的安全性是很大的難題。
    有鑑於此,我們運用買方-賣方的浮水印協定和生物認證技術系統及Java Card之消費者導向行動商務付款系統結合cIDf所提出的架構,來架構了一個能保護數位內容所有人智慧財產權且安全有效率的數位內容交易模組。


    In recent years, due to rapid development of the network and communication technologies, the digital content (image, video, music or film) transaction is becoming faster and more convenient so that a huge market for digital content transaction is created. Although the developing communication technologies bring many conveniences, they also introduce two important problems for digital content transaction. The first problem is how to protect intellectual property rights of digital content and the second is how to protect the security of digital content transaction. The first problem derives from when the valued content is transferred to digital form, it can be easily duplicated and freely redistributed without any degradation. These unauthorized transfers of digital content will lead to the economical loss of rights holder. On the other hand, how to ensure digital content transaction is secure and protected so that merchant and purchaser can transact digital content without worrying about is the key point for vigorous development of digital content transaction.
    If hardware is the bone of digital world, then digital content is its blood. The first thing for developing digital content transaction is to protect the value of digital content and hence ensure its intellectual property rights. These can prevent the digital content from duplicating and redistributing by illegal user.
    Since the government to publicize the importance of intellectual property rights, the concept of embedding an identifier in digital content has gradually become accepted. Content ID is a new idea for protect intellectual property rights, in order to achieve safe distribution of digital content requirement that content should be persistently associated with unique identifiers (Ids). With the persistent association of Ids with digital content, Content ID can be used to prevent copy. Content ID can guarantee digital content identification over the world, thus can provide protection to intellectual property rights. The Content ID can help to reduce the concern that rights owners distribute their digital content over the digital environment that can foster a new type commerce-“digital content commerce”.
    Now day, have many organization discuss with Content ID. The cIDf (Content ID Forum) was established by Professor Dr. Hiroshi Yasuda at the University of Tokyo for the purpose of providing guard for copyright management. The main object of this forum is to standardize the “Content ID,” which is a set of well-defined metadata including a unique code embedded in each digital content for the purpose of copyright verification.
    The digital content transaction not only have rights problem but also have security problem. In the digital transaction environment (as internet), merchant and purchaser may not see each other, and never exchange any digital content hand by hand. For this reason, how to identifying and exchanging digital content in the digital environment become more important.
    For above reason, we hope to provide a digital content transaction system that can protect intellectual property rights and ensure secure digital content transaction. In this thesis, we improved Content ID Forum (cIDf) reference model by combined the Buyer-Seller watermark protocol, biometric verification and Java Card Mobile-Commerce Payment System with cIDf reference model.

    Chapter 1 Introduction 1 1.1 Motivation 1 1.2 Benefits of Content ID 5 1.2.1 Efficient Charging and Royalty Allocation 5 1.2.2 Efficient Watching of Unscrupulous Use 5 1.2.3 Efficient Collection of Mart Information 6 1.2.4 Promote to Originality 6 1.2.5 Assertion of Origination 6 1.2.6 Introduction of the Concept of Individuality to Digital Content 6 1.3 Objective 7 1.3.1 Protection Intellectual Property Rights 7 1.3.2 Identification Verification 7 1.3.3 Anonymity 8 1.3.4 Confidentiality 8 1.3.5 Convenience 8 1.3.6 Integrity 9 1.3.7 Non-Repudiation 9 1.4 Thesis Organization 9 Chapter 2 Content ID Forum 10 2.1 Introduction 10 2.1.1 Background 10 2.1.2 Scope of the Content ID Forum 11 2.2 Function Analysis 11 2.2.1 High Level View 12 2.2.1.1 Perceived Problems 12 2.2.1.2 The Principles of cIDf 12 2.2.1.3 The Scope of Rights Targeted by cIDf 13 2.2.2 Reference Model 13 2.2.2.1 Definitions of Terms 13 2.2.2.2 Reference Model 16 2.2.2.3 Case Studies 17 2.2.2.4 Security of Digital Content 21 2.2.3 Function Requirements 21 2.2.3.1 Rights Owner Requirements 21 2.2.3.2 Editor/Arranger Requirements 21 2.2.3.3 Aggregator/Distributor Requirements 21 2.2.3.4 Consumer Requirements 22 2.3 The Technology to Implement the Practical Use of Content ID 22 2.3.1 Overview of Processing to Issue Content ID 22 2.3.2 Distributed Content Descriptor 23 2.3.2.1 DCD Attributes 23 2.3.2.2 Functions of DCD 23 2.3.2.3 Alternative Models for Associating the DCD to Content 24 2.3.2.4 DCD Functions 24 2.3.2.5 DCD Expression Models 25 2.3.3 Digital Watermarking 27 2.3.3.1 Strategy for Using Watermarks 27 2.3.3.2 Watermarking Methods 27 2.3.3.3 Meta-Watermarking 28 2.3.4 The Content ID Issuing Center(CIC) and the IPR Database(IPR-DB) 28 2.3.4.1 The Functions of the Content ID Issuing Center 28 2.3.4.2 Consumer Acquiring the Digital Content From an Aggregator/Distributor 32 2.3.4.3 Consumer Requesting the Identification of the Metadata Contained in the Watermark 32 2.3.4.4 Protocol 33 2.3.4.5 The Content ID Management Center and the IPR-DB 33 2.3.5 Detection of Illegal Use 33 2.3.5.1 Types of Illegal Acts and Detection Mechanisms 34 2.3.5.2 Detection of illegal acts using “Netwatcher” technologies 34 2.4 cIDf Metadata 35 2.4.1 cIDf Metadata Sets 35 2.4.2 cIDf Metadata Expression 36 2.4.2.1 Essential Attributes 36 2.4.2.2 Notation Format 37 2.4.2.3 Data Transfer Interface 37 2.5 cIDf Registration Authorities and cIDf Identifier Resolution 37 2.5.1 Definition of Terms 37 2.5.2 The Relationship between the Registration Authority and the Content ID Management Center (CIC) 38 2.5.2.1 Role and Operations of the Registration Authority 38 2.5.2.2 The Function of Registration Agencies 40 2.5.3 cIDf Resolution 41 2.5.3.1 What is cIDf Resolution? 41 2.5.3.2 The Relationship between cIDf and Handle 42 2.5.3.3 Handle System Management 42 2.5.3.4 Issuing of Handles 42 2.5.3.5 The Resolution Process 43 2.5.4 The CIDCMN/Handle Identifier Relationship 43 2.5.4.1 Handle Syntax 44 2.5.4.2 Handle Metadata for the cIDf Specification 44 2.5.5 Resolution Server System Architecture 44 Chapter 3 Related Techniques 46 3.1 E-Commerce and Smart Card Technique 47 3.1.1 E-Commerce Models 47 3.1.2 E-Commerce Payment Systems 47 3.1.2.1 Credit Card Payment System 47 3.1.2.2 Electronic Cash Payment System 49 3.1.2.3 Micropayment System 50 3.1.2.4 Electronic Check Payment System 51 3.1.3 Smart Card Technique 51 3.2 A Java Card based Consumer-Oriented Mobile-Commerce Payment System 54 3.2.1 Overview 54 3.2.2 Definition 55 3.2.3 Architecture 57 3.2.4 Transaction Procedure 58 3.2.5 Contents of Database 60 3.3 A Buyer–Seller Watermarking Protocol 60 3.3.1 Insertion Operation 61 3.3.2 Watermark Generation Protocol 62 3.3.3 Watermark Insertion Protocol 63 3.3.4 Copyright Violator Identification Protocol 64 3.3.5 Dispute Resolution Protocol 64 3.4 Biometric Authentication System 65 Chapter 4 Proposed System 68 4.1 Conception and Glossary 68 4.1.1 The Conception of Our System 68 4.1.2 Glossary and Symbols Used in Our System 69 4.2 System Servers 77 4.2.1 cIDf Domain 78 4.2.2 Smart Card Payment Domain 83 4.2.3 Biometric Authentication Domain 85 4.3 Flowchart of Our system 88 4.3.1 Preparation class 89 4.3.1.1 Register Phase 89 4.3.1.2 Application Phase 90 4.3.2 Content Transaction Class 92 4.3.2.1 Rights transaction phase 92 4.3.2.2 Authentication Phase 93 4.3.2.3 Payment Phase 98 4.3.2.4 Content Transfer Phase 100 4.3.3 Retrieval Class 103 Metadata Retrieval Phase 103 4.4 System Characteristics 107 1. Disputation Deterrence: 108 2. Non-Repudiation: 108 3. Effectively Retrieval Metadata: 108 4. Biometric Verification: 108 5. More General Assumption: 109 6. Anonymity and Privacy: 109 7. Confidentiality Communication Channel: 109 8. User Convenience: 109 9. User Identity Confirmation (support mutual authentication and Public-Key Infrastructural X.509 certificate) 110 10. Secure Storage Media: 110 11. Watermark Techniques and Cryptosystem: 110 4.5 System Analysis 112 1. Digital Content 112 2. User 112 3. Client 113 4. Aggregator/Distributor 114 5. Bank 114 6. Content ID Issuing Center 115 7. Biometric Watermark Secure Server 115 8. Watermark Management Center 115 9. System Limitation 116 Chapter 5 Conclusions 117 Bibliography 119

    [1] The Digital Object Identifier System, “The DOI Handbook,” Edition 3.3.0, November 2003.
    [2] International DOI Foundation, http://www.doi.org/
    [3] Counting Online Usage of Networked Electronic Resources, http://www.projectcounter.org
    [4] Interoperability of Data in E-Commerce System, http://www.indecs.org/
    [5] The Open eBook Forum, http://www.openebook.org/.
    [6] Content ID Forum (cIDf), ”cIDf Specification 2.0 /English version/,” Content ID Forum specification Ver.2.0 ,August 2003.
    [7] Content ID Forum (cIDf), ”cIDf Specification Ver.2.0 Appendices /English version/,” Content ID Forum specification Ver.2.0 appendices ,August 11 2003.
    [8] Chen-Hai Yu, “A Java Card Based Consumer-Oriented Mobile-Commerce Payment System,” Master thesis, National Tsing Hua University, June 2001.
    [9] Nasir Memon, Ping Wah Wong , “A Buyer-Seller Watermarking Protocol,” IEEE Transactions on Image Processing, VOL. 10, NO.4, April 2001.
    [10] S. Korper and J. Ellis, “The E-commerce book: Building the E-Empire,” Acdemic Press, San Diego, San Francisco, 2000.
    [11] L. Jean Camp, “Trust and Risk in Internet Commerce,” MIT Press, Cambridge, Massachusetts, 2000.
    [12] D. Amor, “The e-business (R) evolution: living and working in an interconnected world, Prentice Hall PTR,” Upper Saddle River,2000.
    [13] N. Itoi, and P. Honeyman, “Practical Security Systems with Smartcards,” Proc., 7th Workshop on Hot Topics in Operating Systems, pages 185~190, 1999.
    [14] Zhiqun Chen, ”Java Card Technology for Smart Cards: Architecture and Programmer’s Guide,” Reading, MA: Addison Wesley, June 2000.
    [15] Chin-Chen Yen, “A Secure Authentication System for Distributed Computing Environment Based on PKI Biometric Verification and Kerberos,” Master thesis, National Tsing Hua University, June 2002.
    [16] L. Qian and K. Nahrstedt, “Watermarking schemes and protocols for protecting rightfuk ownership and customer’s rights,” J. Visual Commun. Image Represent., vol. 9, pp. 194–210, Sept. 1998
    [17] R. Rivest, A. Shamir, and L. Adelman, “A method for obtaining digital signatures and public key cryptosystems,” Commun. ACM, vol. 21, pp. 120–126, 1978.
    [18] D. Stinson, Cryptography: Theory and Practice. Boca Raton, FL: CRC, 1995.
    [19] J. D. Cohen and M. J. Fischer, “Arobust and verifiable cryptographically secure election scheme (extended abstract),” in Proc. IEEE 26th Annu. Symp. Foundations Computer Science, Portland, OR, Oct. 21–23, 1985, pp. 372–382.
    [20] Chin-Chen Yen, “A Secure Authentication System for Distributed Computing Environment Based on PKI Biometric Verification and Kerberos,” Proceeding of the 2002 International Computer Symposium, pp. 1330~1337, December. 2002.
    [21] M. Vandenwauver, R. Govaerts, and J. Vandewalle, “Overview of Authentication Protocol.” Proc. IEEE Int. 31st Annual IEEE Carnahan Conference on Security Technology, pages 108-113, 1997.
    [22] Y. Isobe, Y. Seto, and M. Kataoka, “Development of Personal Authentication System Using Fingerprint with Digital Signature Technologies.” Proc., 34th Annual Hawaii International Conference on System Sciences, pp. 4039~4047, 2001.
    [23] Chin-Chen Yen, “A Secure Authentication System for Distributed Computing Environment Based on PKI Biometric Verification and Kerberos,” Master thesis, National Tsing Hua University, June 2002.
    [24] Interoperability of Data in E-Commerce System, “Principles, model and data dictionary,” WP1a-006-2.0, June 2000.
    [25] Handel system, http://www.handle.net/
    [26] Handel system,” Handle System 5.3,” November 2002.
    [27] Korea Digital content Forum, http://www.dcforum.or.kr/
    [28] Korea Digital content Forum, http://www.dcforum.or.kr/
    [29] D.E. Denning and G.M. Sacco, “Timestamps in Key Distribution Protocols.” Communication of the ACM, vol. 24, no. 8, pp.533~536, August 1981.
    [30] W. Diffie, and M. Hellman, “New Directions in Cryptography,” IEEE Transactions on information theory, Nov 1995.
    [31] “Public Key Infrastructure Specification.” The specification issued by Object Management Group (OMG), February 2001.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE