期刊文献+

基于授权域的DRM密钥管理模型及其应用 被引量:1

Authorized domain-based key management model and application for DRM
下载PDF
导出
摘要 针对现有基于授权域的数字版权保护方法中授权节点间不具备独立性的问题,降低了版权保护的灵活性,从而提出了一种基于授权域的密钥管理模型。模型支持多设备授权并满足授权节点间独立性,即一台设备加入或离开授权域与其他域成员设备无关,提高了版权保护的灵活性。基于该密钥管理模型,提出了应用系统框架以及版权保护协议;进一步,提出了满足该模型的两种密钥管理方法,并分析比较其性能。通过对系统的性能分析,验证了该密钥管理模型的有效性。 In order to solve the non-independence problem between authorized nodes which would reduce the flexibility in existing authorized domain-based DRM methods,this paper proposed an authorized domain-based key management model. The model supported multi-device authorization and satisfied the independence between authorized nodes. A device should be transparent to other intra-domain devices when it registered or removed from the domain,which improved the flexibility. Based on the key management model,it proposed an application system architecture and the copyright protection protocols. Moreover,it proposed two kinds of key management methods which satisfied the model and analyzed and compared their performance. By analyzing the system performance,the result verifies the effectiveness of the key management model.
作者 冯雪
出处 《计算机应用研究》 CSCD 北大核心 2016年第3期866-869,881,共5页 Application Research of Computers
基金 北京市教委科技计划面上项目(KM201411232012) 国家"863"计划资助项目(2012AA013102)
关键词 数字版权保护 密钥管理 授权域 内容共享 多设备 digital rights management key management authorized domain content sharing multi-device
  • 相关文献

参考文献15

  • 1Subramanya S R, Byung K Y. Digital rights management[J] . IEEE Potentials Magazine, 2006, 25(2):31-34. 被引量:1
  • 2He Yijun, Hui L C K, Siu M Y. Avoid illegal encrypted DRM content sharing with non-transferable re-encryption[C] //Proc of the 13th IEEE International Conference on Communication Technology. [S. l.] :IEEE Press, 2011:703-708. 被引量:1
  • 3Ghita S V, Patriciu V V, Bica I. A new DRM architecture based on mobilel code and white-box encryption[C] // Proc of the 9th International Conference on Communications. [S. l.] :IEEE Press, 2012:303-306. 被引量:1
  • 4Gaber T, Zhang Ning, Hassanien A E. A novel approach to allow multiple resales of DRM-protected contents[C] //Proc of the 8th International Conference on Computer Engineering & Systems. [S. l.] :IEEE Press, 2013:86-91. 被引量:1
  • 5黄涛,张志勇,牛丹梅,张丽丽,田伟莉.DRM细粒度使用控制模型及其安全机制[J].计算机工程与设计,2012,33(5):1734-1737. 被引量:3
  • 6Feng Xue, Tang Zhi, Yu Yinyan. An efficient contents sharing met-hod for DRM[C] //Proc of the 6th Consumer Communications and Networking Conference. Washington DC:IEEE Computer Society, 2009:1-5. 被引量:1
  • 7Pestoni F, Lotsloech J B, Nusser S. xCP:peer-to-peer content protection[J] . IEEE Signal Processing Magazine, 2004, 21(2):71-81. 被引量:1
  • 8Open Mobile Alliance. DRM specification version 2. 2[EB/OL] . (2011-04-19)[2014-11-10] . http://technical. openmobilealliance. org/ Technical/technical-information/release-program/current-releases/drm-v2-2. 被引量:1
  • 9Keoh S L. Marlin:toward seamless content sharing and rights mana-gement[J] . IEEE Communications Magazine, 2011, 49(11):174-180. 被引量:1
  • 10Koster P, Kamperman F, Lenoir P, et al. Identity based DRM:personal entertainment domain[M] //Transactions on Data Hiding and Multimedia Security. Berlin:Springer-Verlag, 2006:104-122. 被引量:1

二级参考文献11

共引文献2

同被引文献8

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部