研究生: |
王宏達 Hon-Da Wang |
---|---|
論文名稱: |
運用Buyer-Seller浮水印協定生物認證技術及Java Card行動商務機制改進cIDf提出的架構 Use Buyer-Seller Watermark Protocol, Biometric Verification and Java Card Mobile-Commerce Payment System to Improve the cIDf Reference Model |
指導教授: |
許文星 教授
Prof. Wen-Hsing Hsu |
口試委員: | |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 電機工程學系 Department of Electrical Engineering |
論文出版年: | 2004 |
畢業學年度: | 92 |
語文別: | 英文 |
論文頁數: | 121 |
中文關鍵詞: | 浮水印協定 、生物認證技術 、行動商務機制 |
外文關鍵詞: | Buyer-Seller Watermark Protocol, Biometric Verification, Content ID Forum |
相關次數: | 點閱:2 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
近年來,因為通訊和網路的發達,使得數位訊息的如同影像、音樂、電影或是其他型態的數位內容在數位世界的傳播更為方便,也造就了數位內容交易的龐大商機。雖然通訊的發達為數位內容的傳播或交易帶來許多的便利,但相對的也產生許多的問題,其中最為重要的就是數位內容的智慧財產權保護的問題和交易的安全性的問題。以數位內容的保護來說,當一件商品被轉換為數位的型式之後,就很容易被隨意的複製,而降低商品的價值。另一方面,如何確保網路上交易安全性,讓交易雙方都能放心的交易數位內容,也是數位世界要蓬勃發展的關鍵因素。
數位世界的骨幹如果是硬體,那數位世界的血脈就是數位內容,沒有數位內容的硬體是沒有存在的價值的。要數位內容的交易能蓬勃發展,首先就必須先要確保數位內容的價值,亦即建立保護數位內容智慧財產權的觀念和方法,使得數位內容不會被隨意的更改或複製。以前大家並沒有建立起智慧財產權的觀念,導致數位內容被隨意的複製、修改、傳送而導致數位內容所有人的損失,降低了提供數位內容的意願,因此數位世界的發展就受到了阻礙。
經過政府大力的宣導,不但智慧財產權的觀念已經逐漸成形,而且在數位內容上加入有關所有人的資訊來保護所有人的智慧財產權也漸漸為大家所接受。
內容身份(Content ID)是一個用來保護數位內容智慧財產權很好的方法,它可以提供一個在數位世界理唯一的身份證明給數位內容,內容身份不但可以對非法使用數位內容的使用者產生威脅,而且可以提供關於數位內容所有人的相關資訊,讓使用者可以輕易要求數位內容的授權。
討論數位內容身份的組織有很多,內容身份討論會(Content ID forum) 是由Dr. Hiroshi Yasuda博士在東京大學提出的,這個討論會的主要目的是為促進內容身份的商業行為,並且和其他的組織合作提出一套全球通用的標準,他提出了許多參考的數位內容交易模組和後期資料(metadata)的設定,希望能為數位內容的交易定下標準。
數位內容交易要發展,除了數位內容價值的保護之外,另一個重點就是交易的安全性。傳統的交易方式是買賣雙方面對面的交易,一手交錢一手交貨,但在現今的網路交易,買賣雙方不會實際面對面而是透過虛擬的網路進行交易,因此如何確保交易的安全性是很大的難題。
有鑑於此,我們運用買方-賣方的浮水印協定和生物認證技術系統及Java Card之消費者導向行動商務付款系統結合cIDf所提出的架構,來架構了一個能保護數位內容所有人智慧財產權且安全有效率的數位內容交易模組。
In recent years, due to rapid development of the network and communication technologies, the digital content (image, video, music or film) transaction is becoming faster and more convenient so that a huge market for digital content transaction is created. Although the developing communication technologies bring many conveniences, they also introduce two important problems for digital content transaction. The first problem is how to protect intellectual property rights of digital content and the second is how to protect the security of digital content transaction. The first problem derives from when the valued content is transferred to digital form, it can be easily duplicated and freely redistributed without any degradation. These unauthorized transfers of digital content will lead to the economical loss of rights holder. On the other hand, how to ensure digital content transaction is secure and protected so that merchant and purchaser can transact digital content without worrying about is the key point for vigorous development of digital content transaction.
If hardware is the bone of digital world, then digital content is its blood. The first thing for developing digital content transaction is to protect the value of digital content and hence ensure its intellectual property rights. These can prevent the digital content from duplicating and redistributing by illegal user.
Since the government to publicize the importance of intellectual property rights, the concept of embedding an identifier in digital content has gradually become accepted. Content ID is a new idea for protect intellectual property rights, in order to achieve safe distribution of digital content requirement that content should be persistently associated with unique identifiers (Ids). With the persistent association of Ids with digital content, Content ID can be used to prevent copy. Content ID can guarantee digital content identification over the world, thus can provide protection to intellectual property rights. The Content ID can help to reduce the concern that rights owners distribute their digital content over the digital environment that can foster a new type commerce-“digital content commerce”.
Now day, have many organization discuss with Content ID. The cIDf (Content ID Forum) was established by Professor Dr. Hiroshi Yasuda at the University of Tokyo for the purpose of providing guard for copyright management. The main object of this forum is to standardize the “Content ID,” which is a set of well-defined metadata including a unique code embedded in each digital content for the purpose of copyright verification.
The digital content transaction not only have rights problem but also have security problem. In the digital transaction environment (as internet), merchant and purchaser may not see each other, and never exchange any digital content hand by hand. For this reason, how to identifying and exchanging digital content in the digital environment become more important.
For above reason, we hope to provide a digital content transaction system that can protect intellectual property rights and ensure secure digital content transaction. In this thesis, we improved Content ID Forum (cIDf) reference model by combined the Buyer-Seller watermark protocol, biometric verification and Java Card Mobile-Commerce Payment System with cIDf reference model.
[1] The Digital Object Identifier System, “The DOI Handbook,” Edition 3.3.0, November 2003.
[2] International DOI Foundation, http://www.doi.org/
[3] Counting Online Usage of Networked Electronic Resources, http://www.projectcounter.org
[4] Interoperability of Data in E-Commerce System, http://www.indecs.org/
[5] The Open eBook Forum, http://www.openebook.org/.
[6] Content ID Forum (cIDf), ”cIDf Specification 2.0 /English version/,” Content ID Forum specification Ver.2.0 ,August 2003.
[7] Content ID Forum (cIDf), ”cIDf Specification Ver.2.0 Appendices /English version/,” Content ID Forum specification Ver.2.0 appendices ,August 11 2003.
[8] Chen-Hai Yu, “A Java Card Based Consumer-Oriented Mobile-Commerce Payment System,” Master thesis, National Tsing Hua University, June 2001.
[9] Nasir Memon, Ping Wah Wong , “A Buyer-Seller Watermarking Protocol,” IEEE Transactions on Image Processing, VOL. 10, NO.4, April 2001.
[10] S. Korper and J. Ellis, “The E-commerce book: Building the E-Empire,” Acdemic Press, San Diego, San Francisco, 2000.
[11] L. Jean Camp, “Trust and Risk in Internet Commerce,” MIT Press, Cambridge, Massachusetts, 2000.
[12] D. Amor, “The e-business (R) evolution: living and working in an interconnected world, Prentice Hall PTR,” Upper Saddle River,2000.
[13] N. Itoi, and P. Honeyman, “Practical Security Systems with Smartcards,” Proc., 7th Workshop on Hot Topics in Operating Systems, pages 185~190, 1999.
[14] Zhiqun Chen, ”Java Card Technology for Smart Cards: Architecture and Programmer’s Guide,” Reading, MA: Addison Wesley, June 2000.
[15] Chin-Chen Yen, “A Secure Authentication System for Distributed Computing Environment Based on PKI Biometric Verification and Kerberos,” Master thesis, National Tsing Hua University, June 2002.
[16] L. Qian and K. Nahrstedt, “Watermarking schemes and protocols for protecting rightfuk ownership and customer’s rights,” J. Visual Commun. Image Represent., vol. 9, pp. 194–210, Sept. 1998
[17] R. Rivest, A. Shamir, and L. Adelman, “A method for obtaining digital signatures and public key cryptosystems,” Commun. ACM, vol. 21, pp. 120–126, 1978.
[18] D. Stinson, Cryptography: Theory and Practice. Boca Raton, FL: CRC, 1995.
[19] J. D. Cohen and M. J. Fischer, “Arobust and verifiable cryptographically secure election scheme (extended abstract),” in Proc. IEEE 26th Annu. Symp. Foundations Computer Science, Portland, OR, Oct. 21–23, 1985, pp. 372–382.
[20] Chin-Chen Yen, “A Secure Authentication System for Distributed Computing Environment Based on PKI Biometric Verification and Kerberos,” Proceeding of the 2002 International Computer Symposium, pp. 1330~1337, December. 2002.
[21] M. Vandenwauver, R. Govaerts, and J. Vandewalle, “Overview of Authentication Protocol.” Proc. IEEE Int. 31st Annual IEEE Carnahan Conference on Security Technology, pages 108-113, 1997.
[22] Y. Isobe, Y. Seto, and M. Kataoka, “Development of Personal Authentication System Using Fingerprint with Digital Signature Technologies.” Proc., 34th Annual Hawaii International Conference on System Sciences, pp. 4039~4047, 2001.
[23] Chin-Chen Yen, “A Secure Authentication System for Distributed Computing Environment Based on PKI Biometric Verification and Kerberos,” Master thesis, National Tsing Hua University, June 2002.
[24] Interoperability of Data in E-Commerce System, “Principles, model and data dictionary,” WP1a-006-2.0, June 2000.
[25] Handel system, http://www.handle.net/
[26] Handel system,” Handle System 5.3,” November 2002.
[27] Korea Digital content Forum, http://www.dcforum.or.kr/
[28] Korea Digital content Forum, http://www.dcforum.or.kr/
[29] D.E. Denning and G.M. Sacco, “Timestamps in Key Distribution Protocols.” Communication of the ACM, vol. 24, no. 8, pp.533~536, August 1981.
[30] W. Diffie, and M. Hellman, “New Directions in Cryptography,” IEEE Transactions on information theory, Nov 1995.
[31] “Public Key Infrastructure Specification.” The specification issued by Object Management Group (OMG), February 2001.