• Title/Summary/Keyword: 콘텐츠 배포

Search Result 347, Processing Time 0.028 seconds

Player Structure for Circulation Activation of DRM Contents (DRM콘텐츠의 유통활성화를 위한 플레이어 구조)

  • Kim, Tae-Min;Han, Myung-Muk;Lee, Byung-Wook;Yang, Young-Kyu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.103-106
    • /
    • 2007
  • 디지털 콘텐츠가 나타나면서 시대별 유통 방법이 제안되고 발전돼왔다. 초창기 저용량의 디지털 콘텐츠에서 현재 대용량의 DVD급 화질의 콘텐츠가 유통되고 있다. 아날로그 콘텐츠와는 달리 디지털 콘텐츠가 불법복제 되면 콘텐츠의 저작권자는 더욱 큰 물질적인 손해를 입게 된다. 그래서 DRM(Digital Rights Management)기술이 디지털 콘텐츠에 적용되어 콘텐츠를 보호하게 되었다. 하지만 표준화되지 못한 DRM 기술은 여러개의 전용 클라이언트 프로그램이 필요하게 되었고, 콘텐츠의 유통흐름을 원활하게 못하고 있는 실정이다. 제안된 시스템은 디지털 콘텐츠와 플레이어의 일체화된 구조로서 디지털콘텐츠를 1차 패키징 하고, 플레이어의 Secure Storage에 2차 패키징 하여 콘텐츠와 플레이어가 하나의 파일로 배포되어진다. 2차 패키징 된 결과물은 PackPlayer라 명칭한다. 콘텐츠와 플레이어가 하나의 파일로 배포되어지면 사용자가 쉽게 콘텐츠를 볼 수 있으며, 원활한 콘텐츠의 유통과 다양한 상품서비스를 가능하게 해줄 수 있을 것이다.

  • PDF

Design & Implementation of DRM System for End-to-end Content Protection (End-to-end 콘텐츠 보호를 위한 DRM 시스템 설계 및 구현)

  • Jeong Yeon-Jeong;Yoon Ki-Song
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.35-44
    • /
    • 2006
  • Current technologies on digital rights management (DRM) have focused on security and encryption as a means of solving the issue of unauthorized copying, that is, locking the content and limiting its distribution to only purchasers. But, illegal content copy should be protected not only from purchasers but also from other principals such as media distributors and content providers. In this paper, we designed and implemented end-to-end digital lights management system that can cover a content protection on the overall value-chains of content distribution. Proposed system provides content protection and secure management of digital rights in creator, provider, and distributor like in purchaser. Accordingly it can provide an environment protecting each principal's digital rights and prohibiting illegal usage of content.

Design of License Management Model for super-distribution between DRM Consumers (DRM 사용자간 재배포를 위한 라이센스관리 모델 설계)

  • Lee, Byung-Wook;Liu, Zong-Hua
    • Journal of Internet Computing and Services
    • /
    • v.8 no.3
    • /
    • pp.9-17
    • /
    • 2007
  • Super-distribution is essential for revitalization of digital contents industry in DRM system. Since existing DRM systems emphasize on security for intellectual property rights, it became restrictions to content distribution and the consumer rights. This paper suggests license management mechanism which strengthen super-distribution between consumers. It is to manage distribution history for each content by inserting consumer's identification information in content head. Client can verify security by comparing header and license after issuing license. It classifies the type of distribution and license, and then applies adaptive distribution methods. It can revitalize contents distribution by releasing proper license for super-distribution.

  • PDF

Trend analysis and Classification of Linux distributions (리눅스 배포판의 분류 및 동향 분석)

  • Jung, Sung-Jae;Sung, Kyung
    • Journal of Digital Contents Society
    • /
    • v.18 no.2
    • /
    • pp.357-363
    • /
    • 2017
  • The Linux operating system, considered to be a subset of the UNIX operating system, is becoming the backbone of the enterprise server market and is seen as the key to building cloud computing and big data infrastructures. Linux has a variety of Linux distributions due to the fact that the source is open and anyone can freely modify and distribute it. First of all, Linux dominated the server market, the emergence of various distributions dominates the desktop and mobile operating system markets. In this paper, we examine the birth and history of Linux and classify and characterize various Linux distributions. The emergence of various Linux distributions will play a pivotal role in the Internet of Things and will further expand their power.

Web-based Software Development and Distribution in YouFree (YouFree에서 웹 기반 SW 개발 및 배포)

  • Kim, Ki-Heon;Ku, Kyong-I;Chung, Moon-Young;Choi, Won-Hyuk;Kim, Won-Young;Hur, Sung-Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.895-896
    • /
    • 2009
  • 본 논문에서는 이동형 개인 맞춤 SW 플랫폼인 YouFree에서 동작하는 웹 기반 SW의 개발과 배포를 지원하는 시스템을 설계하고 구현하였다. 개발 시스템은 YouFree의 콘텐츠를 접근하고 조작하는 API와 자바스크립트로 구성된 웹 사용자 인터페이스를 편리하게 개발할 수 있는 UI 자동 생성 기능을 제공한다. 배포 시스템은 개발된 웹 기반 SW 패키지를 설치하고 제거하는 기능뿐만 아니라 의존성 있는 패키지가 함께 설치되는 기능과 새 버전의 패키지를 업그레이드 할 수 있는 기능을 지원한다.

Design of Real-time Security Contents Sharing System based on Peer-to-Peer (Peer-to-Peer기반 실시간 보안 콘텐츠 공유 시스템 설계)

  • Lee, KwangJin;Lee, SeungHa;Pang, SeChung;Kim, YangWoo;Kim, KiHong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.780-783
    • /
    • 2009
  • 기존 정보보호 콘텐츠에 대한 공유는 웹이나 메일 등을 통하여 수동적으로 배포되고, 운영관리자의 판단을 거친 후 보안등급에 맞게 제공되었다. 하지만 사이버 공간의 침해사고는 급속히 확산되어 끊임없이 보안 환경을 위협하는데 그에 대한 확산방지 대응은 즉각적이지 못한 문제점을 가지고 있다. 이러한 침해사고의 빠른 확산을 방지하기 위해서는 실시간 보안 콘텐츠 공유를 통해 각 시스템에서 콘텐츠의 추가 및 변경이 발생할 경우 자동으로 인지 또는 배포할 수 있는 정보보호 시스템을 개발할 필요가 있다. 따라서 본 논문에서는 보안등급에 따른 가상 정보공유 그룹을 구성하기 위해 P2P방식인 JXTA 플랫폼을 적용하였다. 또한 JXTA CMS의 확장을 통해 정보공유 시스템 간 연동할 수 있는 실시간 보안 콘텐츠 공유 시스템을 설계하였다. 이를 통하여 지리적으로 분산된 정보보호 콘텐츠를 실시간 자동인지와 보안등급에 맞는 실시간 공유 방식으로 배포하는 정보보호 시스템을 구현하고자 한다.

Design and Implementation of Educational Content Authoring Tool for Smart Devices (스마트 디바이스를 위한 교육용 콘텐츠 저작 도구 설계 및 구현)

  • Kwon, Sun-Ock;Kim, Jong-Oh;Ju, Seong-Yeon;Jeong, Ji-Seong;Yoo, Kwan-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.12
    • /
    • pp.1-8
    • /
    • 2013
  • Teachers, who are the subject of on-site training, cannot create education content easily reflecting their experience for themselves, and also cannot distribute the content to leaners. Even though the content is distributed, there are limited in available devices as well as representable content features. So, an applicable authoring tool is needed at the user level. In this paper, we propose an authoring tool by which users and teachers can make education content easier based on WYSIWYG interface, and can distribute that. The proposed authoring tool supports various media education content of XML format so that viewers on various smart devices can see the content regardless of operating systems. And not only we conduct survey of users to evaluate convenience and expression of proposed authoring tool, but also we check whether the content can be equally visualized on various smart devices.

Broadcast Program Distribution System of PKI Certificate-based (PKI 인증서기반 방송 프로그램 유통시스템)

  • Park, Ki-Chul;Lee, Joo-Young;Nam, Je-Ho;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.9
    • /
    • pp.1760-1766
    • /
    • 2009
  • Digital broadcasting and digital CATV and IPTV will continue in the competition, regardless of how the content of the program was broadcast over the Internet distribution and the damage of piracy is also growing. Excellent quality of the content of the digital CATV sales of DVD and high-density storage media because there is no difference in content and quality is the problem of illegal distribution. However, users can record and reuse program in the position of the guaranteed rights, and the purpose of training in fair and illegal recording and distribution needs to be separate from it. In this paper using a digital certificate recorded by the user and the process to ensure the purpose of illegal distribution of pharmaceutical distribution system design and implementation of the program was broadcast.

The Shortest Authentication Path for Performance Improvement of MHT Contents Authentication Method in Distributed Network Environment (분산 네트워크 환경에서의 MHT 콘텐츠 인증 기술 성능 개선을 위한 최소 인증 경로에 관한 연구)

  • Kim, DaeYoub
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.9
    • /
    • pp.235-242
    • /
    • 2018
  • Various technologies have been developed to more efficiently share content such as P2P, CDN, and CCN. These technologies take a common approach that content request packets is responded by distributed network nodes or hosts, not by a single content distributor. Such approaches not only resolve network congestion around content distributors, but also make it possible to distribute content regardless of the system and network status of content distributors. However, when receiving content from distributed nodes/hosts, not from authenticated distributors, users cannot practically identify which node/host sent content to them. Due to this characteristic, various hacking caused by the malicious modification of content is possible. Therefore, to make such approaches more secure, a content authentication technique is required. In this paper, we propose a improved operation of MHT used in CCN for authenticating distributed content. Then we evaluate the proposed method by comparing its performance with the existing technology.

Network Overhead Improvement for MHT-based Content Authentication Scheme (MHT 기반 콘텐츠 인증 기술의 전송량 개선)

  • KIM, DAEYOUB
    • Journal of Digital Convergence
    • /
    • v.16 no.1
    • /
    • pp.271-279
    • /
    • 2018
  • Various technologies have been developed to more efficiently share content such as P2P and CDN. These technologies take a common approach that request packets are responded by distributed network nodes, not by a single distributor. Such approaches not only resolve network congestion around content distributors, but also make it possible to distribute content regardless of the system and network status of content distributors. However, when receiving content from distributed nodes/hosts, not from authenticated distributors, users cannot practically identify which node/host sent content to them. Due to this characteristic, various hacking caused by the malicious modification of content is possible. Therefore, to make such approaches more secure, a content authentication technique is required. In this paper, we propose a improved operation of MHT used in CCN for authenticating distributed content. Then we evaluate the proposed method by comparing its performance with the existing technology.