• Title/Summary/Keyword: 콘텐츠 배포

Search Result 347, Processing Time 0.029 seconds

Design and implementation of improved authentication mechanism base on mobile DRM using blockchain (블록체인을 이용한 모바일 DRM 기반 개선된 인증 메커니즘 설계 및 구현)

  • Jeon, Jinl-Oh;Seo, Byeong-Min
    • Journal of Digital Convergence
    • /
    • v.19 no.4
    • /
    • pp.133-139
    • /
    • 2021
  • Due to the rapid progress in network technology, many research on content security technologies is also being conducted in the mobile digital content sector. In the meantime, content protection has been immersed in preventing illegal copying, certifying, and issuance/management certificates, but still have many vulnerabilities in managing or authenticating confidential information. This study aims to strengthen confidential information about content based on dual management of content download rights through mobile phone numbers or device numbers. It also protect replay-attack by building a secure mobile DRM system where digital content is safely distributed based on a three-stage user authentication process. In addition, blockchain-based content security enhancements were studied during the primary/secondary process for user authentication for the prevention of piracy and copyright protection. In addition, the client authentication process was further improved through three final stages of authorization in the use of illegal content, considering that legitimate users redistributed their content to third-party.

명예훼손과 e-프라이버시(1)

  • Kim, Yeon-Su
    • Digital Contents
    • /
    • no.11 s.114
    • /
    • pp.68-81
    • /
    • 2002
  • 온라인을 통한 커뮤니케이션이 활성화되면서 인터넷 게시판과 대화방을 통한 명예훼손이 빈번하게 발생하고 있다. 이에 쇼핑몰 게시판에서 발생하는 악의적인 비방, 정부기관 웹사이트의 게시판에 특정 공무원의 성희롱 내용을 게시해 명예를 훼손한 경우, 형법의 명예훼손죄와 정보통신보호법의 사이버 명예훼손죄의 차이에 대해 알아본다. 다음 호에는 안티사이트에 비판하는 글을 게재한 경우, 유즈넷 또는 메일링 리스트를 통해 배포한 글이 명예훼손등에 문제가 발생한 경우에 관해 게재한다. 2회에 걸쳐 명예훼손과 e-프라이버시에 관해 게재한다.

  • PDF

A study of Convergence Relationship between Post-Modern aspects and storytelling from Imaging Content Production (영상 콘텐츠를 통한 포스트모던과 스토리텔링의 융합관계성에 관한 연구)

  • Jeong, Eui Tae;Jung, Kyoung He;Song, Ho Jin
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.6
    • /
    • pp.177-184
    • /
    • 2016
  • The age of digital content mainstream consumers in the era of smart technology is expanding compared to the past. Consumers are taking a leading role in the production and distribution of contents in various forms. At the center of this is a post-modern social structure and space that break down the boundaries among Personal Digital Device, contents, production and consumption as a medium. Content rejects the existence of the same thing in the world. The tendency of the main consumer segment and the provision of post modern storytelling that penetrates it creates a huge industry group with various forms of contents. In order to carry out this study, with analyzing examples of movies, games, and advertisements, we found the fact that the center of content creation for individuals made their unique style, excluding generality. As a result of this research, the relationship between the user-driven digital contents and post modern storytelling have been revised the awareness about the possibility of various convergence in the field of contents production.

A study of new business creation on digital contents industries (디지털콘텐츠 산업분석을 통한 기술사엄화 기회창출 연구)

  • Park, Dong-Un;Kim, Eun-Sun;Park, Young-Seo
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.759-762
    • /
    • 2006
  • Historically, internet is the fastest growing media together with the ICT development and the key of the development is contents. Digital contents indicate information which covers voice, DB, game, publications and music etc. and the areas have been creating new technology business opportunities. The value chain of digital contents consists of production, collection, processing, services, connection and navigation and is expected to be reorganized around business players of production and distribution areas. This paper presents on those changes occurring in business environment and examples of business models, and further provides industries and academias with technology commercialization strategies.

  • PDF

A License Audit Model for Secure DRM System in Home Network Environment (홈네트워크 환경에서의 안전한 DRM 시스템을 위한 라이센스 감사 모델)

  • Jang, Ui-Jin;Jung, Byung-Ok;Yeo, Sang-Soo;Shin, Yong-Tae
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.3
    • /
    • pp.438-447
    • /
    • 2009
  • Digital home devices aims at providing the multimedia service which is not limited at time and space in home network environment. However, it is incapable of the fair use of consumers who legally buys contents, and causes damage to the contents providers owing to the indiscriminate distribution and use of illegal contents. DRM system appeared to solve this problem cannot protect the license stored on digital home devices and manage license by redistribution. This paper proposes a license audit model which makes an inspection of illegal access, modification and redistribution and reports alert logs to server.

  • PDF

SDRM: The Design and Analysis of Secure DRM Systems Based on PKI using Steganography (SDRM: PKI기반의 스테가노그래피를 이용한 Secure DRM 시스템 설계 및 분석)

  • 도경화;전문석
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.4
    • /
    • pp.167-181
    • /
    • 2003
  • The contents for multimedia are very activated along to revolution of Internet. So this fact allows the contents for multimedia to be commercialized. These contents , however, included much vulnerability that it is difficult to be commercialized because attackers easily reproduce that. Many developers want to use watermarking method as the technique to protect the contents for multimedia, but it is very vulnerable to use only one method. This paper proposes the Secure DRM system which protects the contents for multimedia using Public Key Infrastructure and steganography methods. The SDRM system is more powerful than general DRM systems in that it has the special feature of watermarking and steganography techniques. We can prevent the attackers from reproducing and stealing the contents illegally, and authenticating users through SDRM systems.

  • PDF

The Design and Analysis of Secure DRM Systems using Steganography (스테가노그래피를 이용한 안전한 DRM 시스템 설계 및 분석)

  • Do Kyoung-Hwa;Jun Moon-Seog
    • Journal of Internet Computing and Services
    • /
    • v.4 no.5
    • /
    • pp.21-29
    • /
    • 2003
  • Transferring the contents for multimedia shows recently very activity, So this fact ailows the contents for multimedia to be commercialized. These contents, however, included much vulnerability that it is difficult to be commercialized because attackers easily reproduce that. Many developers want to use watermarking method as the technique to protect the contents for multimedia, but it is very vulnerable to use only one method, This paper proposes the Secure DRM system which protects the contents for multimedia steganography methods. The DRM system is more powerful than general DRM systems in that it has the special feature of watermarking and steganography techniques, We can prevent the attackers from reproducing and stealing the contents illegally, and authenticating users through DRM systems.

  • PDF

Group Key Management Scheme for Batch Operation (효율적인 Batch 처리를 위한 그룹키 관리 기술)

  • Kim, Dae-Youb;Huh, Mi-Suk;Ju, Hak-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.189-193
    • /
    • 2008
  • Digital Contents Services based on Internet are developing into an ubiquitous television that allows subscribers to be able to enjoy digital contents anytime and anywhere However, illegal copies and distributions of digital contents are also increasing proportionally. To guarantee the stability of contents service, many technologies are being developed and installed. The efficient scheme to manage content encryption keys is one of them. In this paper, we propose an improved key management scheme to manage the members of groups. The proposed scheme has a minimized transmission overhead for batch operation to renew content encryption keys.

Design and Implementation of Digital Contents Protection System using Triple DES Algorithm (Triple DES 알고리즘을 이용한 디지털 콘텐츠 보호 시스템 설계 및 구현)

  • 권도윤;이경원;김정호
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.05a
    • /
    • pp.160-164
    • /
    • 2003
  • Broadcasting environment of present our country is greeting period of transition that undergo a change to digital broadcasting system in analog broadcasting system continued for last several decades. With change of these broadcasting environment interest about various digital broadcasting contents industry that fill to digital broadcasting infra and unlawfulness reproduction prevention technology far digital broadcasting contents of high added value is rising. According as is converted to digital broadcasting environment interest about reproduction prevention is well-founded to be risen sensitively. First analog broadcasting environment can not remove perfectly error at transmission in receiver, but can reconstruct contents such as original by error correction function in receiver in the case of digital broadcasting environment. Secondarily, although quality of copy is dwindled than original repeat reproduction in case of analog, many copies are available innumerably regardless of number of times of copy keeping quality such as original in the case of digital And third element is possible easily to anyone to on-line along with development of internet in case of digital contents unlike analog. Under these background, this thesis wish to design and implement digital contents protection system to prevent unlawfulness reproduction and distribution of digital contents using Triple DES algorithm.

  • PDF

Big Data and Entertainment Content : Case Studies and Prospects (빅데이터와 엔터테인먼트 콘텐츠 : 사례연구 및 전망)

  • Kim, Hae Won;Lee, Mina
    • Journal of Internet Computing and Services
    • /
    • v.17 no.2
    • /
    • pp.109-118
    • /
    • 2016
  • Big data, thanks to the development of data sciences, has been key words for economic development and governmental policies. This study reviewed how big data has been used with entertainment contents since the uses of big data in the fields have been more popular and the cases making successful business have been reported. To do ends, the changes in production, distribution, and consumption of entertainment contents have been characterized and prime cases have been introduced. Furthermore, Korean production companies of entertainment contents, Bloter and NEOTOUCHPOINT, were selected to investigate how big data has been utilized. It was found that the companies used big data to analyze consumers' behaviors and gain insights of content creation, such as identifying specific elements of enjoyments and conditions to share the contents with others. The domestic entertainment companies are preparing a full-scale of use of big data but, in order to take advantage of big data, collaboration between developers and experts in the field and specific goal-setting and model building are recommended.