• Title/Summary/Keyword: 디지털 콘텐츠 식별자

Search Result 33, Processing Time 0.022 seconds

Digital Content Certification and Management Technology Based on Blockchain Technology

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.11
    • /
    • pp.121-128
    • /
    • 2021
  • After entering the 4th Industrial Revolution, the digital content market, which was only dependent on existing contents supply enterprises, is providing various digital content through the participation of users like YouTube. Accordingly, it activated the digital content market, but it causes a negative influence on the digital content market due to the copyright of the creator and the indiscriminate illegal use and usage of the content. This study researched digital content management technology based on blockchain technology to protect digital content and the copyright of the creator. The suggested technology protects the digital content and the copyright holder and discerns the users and prevents the indiscriminate approach and illegal use of digital content. For the safe management of digital content, hash function applied as the certification technology of blockchain is used to certify the users and manage the digital content and provide integrity and authentication service.

Management Policy of Identification System based on URN (정보자원관리를 위한 식별체계 구조 및 운영 정책 분석에 관한 연구)

  • Ham, Jeong-Hun;O, Sang-Hun;Kim, Seok-Hun
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2004.05a
    • /
    • pp.179-193
    • /
    • 2004
  • Introduction of domestic digital content identification system mean to building district identification by supplying international identification system and interoperability that reflect domestic special state than accept it as it is. This study presented an policy direction for the domestic digital content identification system by the results that analyzed of the identification systems that were commonly used internationally. An identification system is composed to a registration authority, registration agencies, registrants. There should be defined their roles and set up their cooperative system to be able to bring efficiency into more.

  • PDF

Efficient Class Identification based on Event (이벤트 기반의 효율적인 클래스 식별)

  • Choi, Mi-Sook;Lee, Jong-Suk
    • Journal of Digital Contents Society
    • /
    • v.9 no.2
    • /
    • pp.165-175
    • /
    • 2008
  • Currently, software development methods have been advanced to service-oriented from component-oriented, to component-oriented from object-oriented. The component-oriented and service-oriented software development methods are analyzed by object-oriented UML model. So, the efficient analysis method for object-oriented UML model needs. In this paper, we suggest the analysis guideline and process based on event using Input Data-Process-Output Data Table for identifying use cases and classes efficiently. And the suggested method complements the problems depending the developer's perspective and experience.

  • PDF

A Study on the Development of the Digital Content Service Scenario, An Integrated Structure of ICN and UCI Identifier System (ICN과 UCI식별체계 연계구조 및 디지털저작물 서비스 시나리오 개발)

  • Oh, Sang-Hoon;Lee, Jung-Jea
    • Journal of the Korean Society for information Management
    • /
    • v.26 no.3
    • /
    • pp.317-333
    • /
    • 2009
  • The role of digital content identification system is being considered as a useful solution for the content management system and service system. Integrated Copyright Number(ICN), only one domestic identifier to the managing of copyright, can provide the service model in the copyright industry, because it include the information of copyright between the creator and the service provider on the digital work. Universal Content Identifier(UCI), has developed on the focus of digital content service, is somewhat lacking on the copyright management, but it is expected that systematical management and distribution system for copyright and digital work to be able to build as that make up for disadvantage with each identifier's advantage by UCI associate with ICN. In this context, This article can suggest the efficiency integrated structure and the service scenario. Therefore it is contribute to the efficient using and the effective running in the digital identification system.

License Management Method supporting secure contents distribution in Family Domain (패밀리 도메인에서 안전한 콘텐츠 배포를 지원하는 라이센스 관리 기법)

  • Wang, Bo-Hyun;Lee, Byung-Wook
    • Journal of Internet Computing and Services
    • /
    • v.8 no.6
    • /
    • pp.9-19
    • /
    • 2007
  • Superdistribution service of DRM system is an essential part for revitalization of digital contents distribution. However, it limits superdistribution range to superdistribution between consumers. Recently, as the demands of the consumer increase, the consumers want to use the contents in their multiple devices, In this paper, we propose a license management method supporting superdistribution between devices owned by a consumer, The proposed method creates domain key for device authentication by using identification informations of devices owned by a consumer and stores it in license, If devices are changed, domain key and license are updated, Through this method, contents distribution between devices can be achieved securely and efficiently, Also, this license management method can apply to superdistribution between consumers.

  • PDF

Reference Model for IPMP Assessment include Digital Contents Identification (디지털콘텐츠 식별체계를 포함하는 IPMP 평가참조모델)

  • 소본홍;최한석;서형식;김석훈;오상훈
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.285-288
    • /
    • 2004
  • 인터넷의 확산과 IT의 혁신으로 인하여 Digital Item(이하 DI)의 종류와 양은 기하급수적으로 증가하고 있으며 DI를 실행시키는 application 역시 양적인 측면이 증가하고 있다. DI와 관련된 이해관계자인 제작자, 저작권자, 공급자, 최종 사용자간에는 저작권 관련 문제들이 발생하고 있으며 이를 위한 표준화 활동 또한 활발히 진행되고 있으며 본 논문은 표준화 제정에 관한 MPEG 표준기구의 활동을 이해하고 최근 진행되고 있는 MPEG-21 Part4 IPMP 표준화 논의에 최종적으로 도출될 결과물들을 예상하여 그 수준을 평가할 수 있는 상위참조모델을 제시한다.

  • PDF

Network Overhead Improvement for MHT-based Content Authentication Scheme (MHT 기반 콘텐츠 인증 기술의 전송량 개선)

  • KIM, DAEYOUB
    • Journal of Digital Convergence
    • /
    • v.16 no.1
    • /
    • pp.271-279
    • /
    • 2018
  • Various technologies have been developed to more efficiently share content such as P2P and CDN. These technologies take a common approach that request packets are responded by distributed network nodes, not by a single distributor. Such approaches not only resolve network congestion around content distributors, but also make it possible to distribute content regardless of the system and network status of content distributors. However, when receiving content from distributed nodes/hosts, not from authenticated distributors, users cannot practically identify which node/host sent content to them. Due to this characteristic, various hacking caused by the malicious modification of content is possible. Therefore, to make such approaches more secure, a content authentication technique is required. In this paper, we propose a improved operation of MHT used in CCN for authenticating distributed content. Then we evaluate the proposed method by comparing its performance with the existing technology.

A Study on Z39.56 Standard and It's Applications (Z39.56 표준과 그 적용에 관한 연구)

  • Noh, Kyung-Ran
    • Journal of Information Management
    • /
    • v.33 no.4
    • /
    • pp.129-144
    • /
    • 2002
  • SICI(Serial Item and Contribution Identifier) is intended primarily for use by those involved in the use or management of serial titles and their contributions. And SICI is a standard that is developed for interoperability and electronic data exchange because of increasing need of the unique resource identifier. This paper introduces metadata standard ANSI/NISO Z39.56 that relates serials management. And it examines applications and implementations of Z39.56 toward serials management.

Research on DDoS Detection using AI in NFV (인공지능 기술을 이용한 NFV 환경에서의 DDoS 공격 탐지 연구)

  • Kim, HyunJin;Park, Sangho;Ryou, JaeCheol
    • Journal of Digital Contents Society
    • /
    • v.19 no.4
    • /
    • pp.837-844
    • /
    • 2018
  • Recently, the cloud technology has made dynamical network changes by enabling the construction of a logical network without building a physical network. Despite recent research on the cloud, it is necessary to study security functions for the identification of fake virtual network functions and the encryption of communication between entities. Because the VNFs are open to subscribers and able to implement service directly, which can make them an attack target. In this paper, we propose a virtual public key infrastructure mechanism that detects a fake VNFs and guarantees data security through mutual authentication between VNFs. To evaluate the virtual PKI, we built a management and orchestration environment to test the performance of authentication and key generation for data security. And we test the detection of a distributed denial of service by using several AI algorithms to enhance the security in NFV.

Fire Extinguisher Maintenance System using Smart NFC Communication and Real-Time Pressure Measurement (스마트 NFC 통신과 실시간 압력 측정을 이용한 소화기 유지관리 시스템)

  • Park, Byeng-Cheol;Park, Ki-Hong
    • Journal of Digital Contents Society
    • /
    • v.18 no.2
    • /
    • pp.403-410
    • /
    • 2017
  • In this paper, the fire extinguisher maintenance system using smart NFC communication and the real-time pressure measurement is proposed. The proposed system consists of three steps in the flow of information. The first step is to identify the fire extinguisher through NFC tagging in the fire extinguisher module using the smart device. The fire extinguisher appearance check and the real-time pressure measurement is performed in the second step, and the last step sends the check status information to the management server. In particular, the actual pressure value is calculated based on the angle of the green area and the indicating needle. Some experiments are conducted so as to verify the proposed system, and as a result, the proposed system shows that the administrator can effectively control the status information of fire safety check.