• Title/Summary/Keyword: DRM+

Search Result 558, Processing Time 0.026 seconds

A Study of ePUB-based Interoperability Method of Rights Information Supporting Mutual Comparability of eBook DRM (전자책 DRM의 상호호환성을 지원하는 ePUB 기반의 권리정보 호환 방법에 관한 연구)

  • Kim, Tae-Hyun;Kang, Ho-Gap;Yoon, Hee-Don;Cho, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.205-214
    • /
    • 2012
  • IDPF, which builds formats and copyright protection standards of eBooks, has announced ePUB 3.0 as a technical standard of eBooks in October, 2011. This standard includes methods how to represent eBooks and technical specifications to protect eBook content. While technical specifications for content protection describe how to represent encryption and digital signature techniques, they do not identify any technical standards for rights expression but just file names for storages of rights information. It does not provide any unification of copyright information representation and formats used by eBook service companies. When copyright protection techniques for eBooks are used, comparability among eBook readers cannot be expected, even though there is a standard of ePUB. This study suggests a method to maintain compatibility toward eBook DRM by using unified rights information process under circumstances where different eBook service companies use diverse methods. The standard reference software of the model proposed in this study, together with other results of this study, will be offered as a registered open software.

Extending the OMA DRM Framework for Supporting an Active Content (능동형 콘텐츠 지원을 위한 OMA DRM 프레임워크의 확장)

  • Kim, Hoo-Jong;Jung, Eun-Su;Lim, Jae-Bong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.93-106
    • /
    • 2006
  • With the rapid growth of the wireless Internet communication, a new generation of mobile devices have made possible the broad distribution of mobile digital contents, such as image, music, video, games and applications over the wireless Internet. Mobile devices are rapidly becoming the major means to extend communication channels without copy Protection, usage rule controlling and authentication. As a result, mobile digital contents may be illegally altered, copied and distributed among unauthorized mobile devices. In this paper, we take a look at Open Mobile Alliance (OMA) DRM v2.0 in general, its purpose and function. The OMA is uniquely the focal point for development of an open standard for mobile DRM. Next we introduces features for an active content and illustrates the difference between an active content and an inactive content. Enabling fast rendering of an active content, we propose an OMA-based DRM framework. This framework include the following: 1) Extending DCF Header for supporting an selective encryption, 2) Content encryption key management, 3) Rendering API for an active content. Experimental results show that the proposed framework is able to render an active content fast enough to satisfy Quality of Experience. %is framework has been proposed for a mobile device environment, but it is also applicable to other devices, such as portable media players, set-top boxes, or personal computer.

테마연재 / 모바일 DRM 비지니스 현황

  • Kim, Jin-Yeong
    • Digital Contents
    • /
    • no.8 s.123
    • /
    • pp.116-117
    • /
    • 2003
  • 폭발적인 모바일 콘텐츠의 범람 현상을 우리는 현재 목도하고 있다. 벨소리나 온라인 게임 등은 이미 수익원으로 공인받은 상태이고, IMT2000 서비스를 통한 동영상 콘텐츠의 개화도 진행 중에 있다. 하지만 이런 장밋빛 예상과 기대 뒤에는 콘텐츠를 어떻게 하면 잘 보호할 수 있을까라는 문제가 복병처럼 숨어 있다. 이 문제는 바로 콘텐츠 보호를 책임질 DRM기술과 직접적인 관련이 있다고 해도 과언이 아니다.

  • PDF

DRM-디지털 콘텐츠 불법 복제방지 대안으로 부상

  • Kim, Chi-Won
    • 프린팅코리아
    • /
    • s.42
    • /
    • pp.90-93
    • /
    • 2005
  • IT산업이 급격히 발전하고 대중화 되면서 아날로그 형태로 생산, 보관, 솬리되던 일반 상거래 저작물(도서, 음반, 영화, 신문)들은 대부분 디지털화되어가고 있다. 디지털 콘텐츠는 저작물에 대한 복사가 용이한 반면, 저작자들의 사기를 저하시켜 저작물에 대한 제작 의지를 감소시키는 장애요인으로 작용하는 문제점을 가지고 있다. 이런 상황 속에서 디지털저작권 관리 시스템인 DRM(Digital Right Management)은 디지털 콘텐츠를 불법 복제로부터 보호하는 동시에 저작권자의 이익을 보호할 수 있는 시스템이라는 점에서 관심을 모으고 있다.

  • PDF

An eBook Service System based on VOD Broadcasting Contents of Smart TV (스마트 TV의 VOD 방송 콘텐츠 기반 전자책 서비스 시스템 개발)

  • Jun, Eung Sup;Chang, Yong Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.12
    • /
    • pp.257-266
    • /
    • 2014
  • In this paper, we propose the development of an eBook Service System based on VOD Broadcasting Contents(eBSS-VOD) which protects the illegal copy through the effective DRM strategy. Here, eBSS-VOD is composed of three sub-systems - eBook server management system, ePub Builder, and eBook App - according to the functional points of view. The eBook server management system operates to manage the eBooks, the encription keys, the VOD contents, the membership and the history of users' viewing log. The ePub Builder assists to produce eBooks by DRM strategy. The eBook App provides users with the utility services of VOD viewing and eBook purchase processing. The proposed eBSS-VOD, differently from the current eBook systems, helps to increase the users' interests in reading books and to motivate the users' purchasing needs and it also makes new distribution channel for eBooks based on VOD broadcasting contents through smart applications. We provides the differentiated eBook builder which are based on ePub3.0 and DRM strategy. Through empirical survey results on users' interests and purchase intention for eBooks, we show that the proposed eBSS-VOD has the comparative effects compared to the current systems.

Use of Bentonite and Organobentonite as Alternatives of Partial Substitution of Cement in Concrete Manufacturing

  • Lima-Guerra, D.J.;Mello, I.;Resende, R.;Silva, R.
    • International Journal of Concrete Structures and Materials
    • /
    • v.8 no.1
    • /
    • pp.15-26
    • /
    • 2014
  • In order to study the capacities of a new occurrence of Brazilian clay samples as partial replacements of cement, a bentonite sample was selected for utilization in the natural and modified forms for present study. The natural bentonite (BBT) was modified by anchorament of 3-aminopropyltrietoxisilane ($BBT_{APS}$) and 3,2-aminoethylaminopropyltrimetoxisilane (BBTAEAPS) in the surface of component minerals of bentonite sample. The original and organo-bentonite samples were characterized by elemental analysis, scanning electron microscopic and textural analyses. The values of micropore area were varying from $7.2m^2g^{-1}$ for the BBT to $12.3m^2g^{-1}$ for the $BBT_{AEAPS}$. The bentonite samples were characterized by the main variable proportion of bentonite in the natural and intercalated forms (2, 5, 10, 15, 20, 25, 30, and 35 % by weight of cement) in the replacement mode whiles the amount of cementations material. The workability, density of fresh concrete, and absorption of water decreased as the substitution of ordinary Portland cement by perceptual of natural and modified bentonite increased. The results reveal that workability decreased with decrease of the amount of natural bentonite in the concrete, same behavior is observed for bentonite functionalized, varying from 49 to 28 mm. The energetic influence of the interaction of calcium nitrate in the structure of blends was determined through the calorimetric titration procedure.

Interval Two-dimensional Hash Chains and Application to a DRM system

  • Jung, Chae-Duk;Shin, Weon;Hong, Young-Jin;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.12
    • /
    • pp.1663-1670
    • /
    • 2007
  • One-way hash chains are important cryptographic primitives and have been used as building blocks of various cryptographic applications. Advantages of one-way hash chains are their simplicity and efficiency for generation based on low-powered processors with short time. However, a drawback of one-way hash chains is their difficulty of control to compute interval values of one-way hash chains. That is, when hash values in one-way hash chain are used as encryption keys, if one hash value is compromised, then the attacker can compute other encryption keys from the compromised hash value. Therefore, direct use of one-way hash chains as encryption keys is limited to many cryptographic applications, such as pay per view system and DRM system. In this paper, we propose a new concept which is called interval hash chain using a hash function. In particular, proposed hash chains are made for only computing interval hash values by using two different one-way hash chains. The proposed scheme can be applied to contents encryption scheme for grading and partially usable contents in DRM system.

  • PDF