DOI QR코드

DOI QR Code

End-to-end 콘텐츠 보호를 위한 DRM 시스템 설계 및 구현

Design & Implementation of DRM System for End-to-end Content Protection

  • 발행 : 2006.02.01

초록

현재의 저작권 보호 기술 개발은 디지털 콘텐츠의 최종 소비자인 구매자단을 대상으로 해서 주로 이루어지고 있다. 그러나. 불법복제는 최종 소비자인 구매자뿐만 아니라 디지털 콘텐츠의 유통 가치사슬 중간 단계인 공급자와 배포자단에서도 항상 발생할 수 있다. 이에 본 논문에서는 창작자가 콘텐츠를 배포한 시점부터 구매자가 소비하는 시점까지 모든 유통 가치사슬에서 콘텐츠의 저작권 보호를 지원하는 End-to-end 디지털 저작권 보호 시스템을 설계하고 구현한다 제안하는 시스템은 창작자, 공급자, 배포자 단에서도 구매자 단에서와 같이 콘텐츠 저작권을 안전하게 관리하고 콘텐츠의 불법 사용을 방지할 수 있는 기술적 장치를 제공함으로써 각 유통주체의 저작권을 보호하고 소유권 침해를 방지할 수 있는 환경을 제공한다.

Current technologies on digital rights management (DRM) have focused on security and encryption as a means of solving the issue of unauthorized copying, that is, locking the content and limiting its distribution to only purchasers. But, illegal content copy should be protected not only from purchasers but also from other principals such as media distributors and content providers. In this paper, we designed and implemented end-to-end digital lights management system that can cover a content protection on the overall value-chains of content distribution. Proposed system provides content protection and secure management of digital rights in creator, provider, and distributor like in purchaser. Accordingly it can provide an environment protecting each principal's digital rights and prohibiting illegal usage of content.

키워드

참고문헌

  1. R. H. Koenen, J. Lacy, M. Mackay, S. Mitchell, 'The long march to interoperable digital rights management', Proceedings of the IEEE, Volume 92, Issue 6, pp.883-897, June, 2004 https://doi.org/10.1109/JPROC.2004.827357
  2. B. C. Popescu, B. Crispo, A. S. Tanenbaum, 'Digital rights management: Support for multi-level security policies in DRM architectures', Proceedings of the 2004 workshop on New security paradigms, pp.3-9, Sep., 2004 https://doi.org/10.1145/1065907.1065909
  3. M. L. Smith, 'Digital rights management & protecting the digital media value chain', Proceedings of the 3rd international conference on Mobile and ubiquitous multimedia MUM '04, pp.187-191, Oct., 2004 https://doi.org/10.1145/1052380.1052406
  4. Y. Jeong, K. Yoon, J. Ryou, 'A Trusted Key Management Scheme for Digital Rights Management', ETRl Journal, Vol.27, No.1, Feb., 2004 https://doi.org/10.4218/etrij.05.0204.0043
  5. G. Hanaoka, K. Ogawa, I. Murota, G. Ohtake, K. Majima, S. Gohshi, K. Oyamada, S. Namba, and H. Imai, 'Managing Encryption and Key Publication Independentaly in Digital Rights Management Systems', IEICE TRANS. FUNDAMENTALS, Vol.E87-A, No.1, Jan., 2004
  6. Q. Liu, R. Safavi-Naini, and N. P. Sheppard, 'Digital rights management for content distribution', Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003, Vol.21, Jan., 2003
  7. M. Fetscherin, M. Schmid, 'Comparing the usage of digital rights management systems in the music, film, and print industry', Proceedings of the 5th international conference on Electronic commerce ICEC '03, pp.316-325, Sep., 2003 https://doi.org/10.1145/948005.948047
  8. ISO/IEC JTC 1/SC 29/WG 11 MPEG/N5235 Draft Requirements for MPEG-21, Intellectual Property Management and Protection, 2002
  9. ISO/IEC JTC 1/SC 29/WG 11, Information Technology Multimedia Framework(MPEG-2l) - Part 1: Vision, Technologies and Strategy, N3939, Jan., 2001
  10. F. Hartung and F. Ramrne, 'Digital rights management and watermarking of multimedia content for m-comrnercc applications', Communications Magazine, IEEE, Vol.38, pp.78-84, Nov., 2000 https://doi.org/10.1109/35.883493
  11. G. Durfee and M. Franklin, 'Distribution chain security', Proceedings of the 7th ACM conference on Computer and communications security, pp.63-70, Nov., 2000 https://doi.org/10.1145/352600.352610
  12. http://www.imprimatur.net. IMPRlMATUR
  13. http://www.intertrust.com/, InterTrust
  14. http://www.microsoft.corn/, Microsoft
  15. http://www.markany.com/, Markany