• Title/Summary/Keyword: DRM (Digital Rights Management)

Search Result 163, Processing Time 0.031 seconds

Effective Software Protection Strategy by Update Digital Rights Management: A case of Korean Firms (디지털 저작권 관리를 통한 효과적인 소프트웨어 보호 전략: 한국 기업의 사례를 중심으로)

  • Kim, Tae-Ha;Shin, Hyung-Deok;Park, Sung-Hee
    • 한국경영정보학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.767-785
    • /
    • 2008
  • This study investigates the effect of the update Digital Rights Management (DMR) strategy on a firm's profit. The model developed by Kim and Talalayevsky (2007) is applied to the case of two representative Korean software firms. Specifically, this study shows the model suggested by Kim and Talalayevsky (2007) fits the reality of Korean firms' DMR strategies. Based on the result, this study makes some implications to managers and policy makers.

  • PDF

A Study on Authentication Method for Wireless DRM System (무선 DRM 시스템에서의 인증방법에 대한 연구)

  • 김봉선;이권일;신영찬;류재철;이준석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.664-666
    • /
    • 2003
  • DRM (Digital Rights Management)은 디지털 저작권 관리를 뜻하는 말로, 전자책, 음악, 게임 등의 디지털 컨텐츠의 지적 재산권을 보호하기 위해 디지털 컨텐츠의 무단 유통을 방지하는 서비스를 의미한다. 이러한 DRM 시스템은 주로 유선 환경에서 사용되고 있었으나. 최근 정보통신 기술의 발달로 인한 무선 환경에서의 디지털 컨텐츠의 사용요구가 증가함에 따라 DRM 시스템은 유선 환경뿐만 아니라 무선 환경에서도 그 중요성이 날로 커지고 있는 실정이다. 현재 DRM은 디지털 컨텐츠에 대한 저작권에 대한 보호 뿐 아니라 더 나아가 디지털 컨텐츠를 이용한 마케팅 솔루션을 제공하는 것까지 그 영역을 확장함에 따라 각 비즈니스 영역별로 적합하도록 다양한 DRM 솔루션이 제시되고 있다. 이로 인해 시스템간의 호환성을 위해 현재 OMA 등의 단체에서 무선 DRM에 관한 표준을 제시하고 있다. 그러나 표준으로 제시되고 있는 DRM 모델에서는 인가된 사용자만이 컨텐츠를 사용할 수 있도록 하는 인증서비스에 관한 부분이 매우 취약한 상황이다. 이에 따라 본 논문에서는 키 관리 서버와 사용자별 암호키 리스트를 다르게 소유할 수 있도록 하는 방법을 사용하는 인증서비스를 제시해보고자 한다.

  • PDF

Delegated Rights Manipulation in P2P Environment for Promoting Contents Distribution (P2P 환경에서 라이선스 발급 권한위임을 통한 컨텐츠 유통 활성화 방법)

  • Jung, Sung-Gun;Lee, Jae-Won;Yoon, Hyun-Soo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06c
    • /
    • pp.212-214
    • /
    • 2012
  • 본 논문은 P2P(Peer-To-Peer) 환경이 가지는 장점과 DRM(Digital Rights Management) 기술이 가지는 장점을 결합하여, 서비스에 참여하는 사용자가 합법적으로 컨텐츠를 재판매 할 수 있는 방법을 제공 함으로써 컨텐츠 유통을 활성화 하는 방안을 제시한다. 사용자가 중앙 서버에서 구매한 컨텐츠나 이웃 피어(Peer)에게 구매한 컨텐츠를 재판매 할 경우, 실행권한 라이선스(Rights)를 중앙 서버의 권한 발급기(Rights Issuer)가 아닌, 판매하는 피어 측에서 권한을 위임 받아 직접 발급한다. 컨텐츠를 구매하면 결재가 진행되고, 해당 이익금은 판매한 피어와 해당 컨텐츠를 구매하기까지 참여한 피어의 경로를 분석하여 이익이 재분배 된다. 이러한 이익금 재분배 과정을 통해 합법적인 컨텐츠 유통의 활성화를 기대할 수 있고, P2P 네트워크 환경이 가지는 여러 장점과 DRM 기술의 장점을 융합하여 저비용의 신뢰할 수 있는 시스템 구축이 가능할 것으로 예상된다.

A Design and Implementation of System to Provide Secure Digital Contents Distribution on Mobile Environment (무선 환경에서 안전한 디지털 컨텐츠 유통을 제공하는 시스템 설계 및 구현)

  • Lee, Kwon-Il;Kim, Bong-Seon;Shin, Young-Chan;Ryou, Jae-Cheol;Lee, Jun-Seok
    • The KIPS Transactions:PartC
    • /
    • v.11C no.3
    • /
    • pp.327-336
    • /
    • 2004
  • There is a need for content providers and operators to control the usage of downloaded digital contents. Digital Rights Management(DRM) is the means to control the usage of the digital contents once it has been downloaded. Therefore, appropriate security mechanism is required. The mobile DRM system Is same as the general DRM system. We use encryption technology to package digital contents. In case of Mobile DRM system, secure distribution and secure keeping of packaging encryption key is important. In this paper, we design and implement DRM system on the Mobile Environments following on OMA(Open Mobile Alliance) DRM Model. We considered being a secure DRM system to contain appropriate security solution.

Design and implementation of improved authentication mechanism base on mobile DRM using blockchain (블록체인을 이용한 모바일 DRM 기반 개선된 인증 메커니즘 설계 및 구현)

  • Jeon, Jinl-Oh;Seo, Byeong-Min
    • Journal of Digital Convergence
    • /
    • v.19 no.4
    • /
    • pp.133-139
    • /
    • 2021
  • Due to the rapid progress in network technology, many research on content security technologies is also being conducted in the mobile digital content sector. In the meantime, content protection has been immersed in preventing illegal copying, certifying, and issuance/management certificates, but still have many vulnerabilities in managing or authenticating confidential information. This study aims to strengthen confidential information about content based on dual management of content download rights through mobile phone numbers or device numbers. It also protect replay-attack by building a secure mobile DRM system where digital content is safely distributed based on a three-stage user authentication process. In addition, blockchain-based content security enhancements were studied during the primary/secondary process for user authentication for the prevention of piracy and copyright protection. In addition, the client authentication process was further improved through three final stages of authorization in the use of illegal content, considering that legitimate users redistributed their content to third-party.

DRM Interoperable Support Scheme via EXIM in Home Domain (홈 도메인에서 EXIM을 통한 DRM 상호호환성 지원 방안)

  • Jo, In-Hee;Jee, Jung-Eun;Shin, Yong-Tae
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06d
    • /
    • pp.398-400
    • /
    • 2012
  • 디지털콘텐츠의 불법복제 방지 및 저작권 보호를 위해 널리 사용되고 있는 DRM(Digital Rights Management) 기술은 디지털콘텐츠 유통에 있어 가장 중요한 핵심기술 요소 중의 하나로 인식되고 있으나 표준 DRM의 부재로 인해 DRM 기술간 상호 호환성이 보장되지 않고 있어 소비자들의 불만을 초래하고 있다. 본 논문에서는 EXIM(EXport/IMport) 이라는 DRM 상호 연동 기술을 통해 상이한 DRM간 상호 호환성을 제공하며, 이 기술을 홈 도메인에 적용하여 좀 더 효율적인 홈 디바이스의 상이한 DRM간 상호 호환성을 제공하고자 한다.

Smart Home Environment for the Protection of Multimedia Digital Contents (멀티미디어 콘텐츠 보호를 위한 스마트 홈 환경)

  • Choi, Kee-Hyun;Jang, Kyung-Soo;Shin, Ho-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.189-196
    • /
    • 2011
  • As internet is getting advanced day by day, digital contents have been developed in various areas as killer content in the IT industry. It needs to develop lots of complicated digital content protect systems due to the enhancement and variety of user's multimedia devices. Although there are lots of protect systems based on DRM(Digital Rights Management) technology, it is difficult to provide secure protection because of the problems resulting from analog hole problem, inefficiency of key sharing and various independent protect technologies. Thus, in this paper, we propose a novel authentication and protect system based on RFID(Radio Frequency Identification) technology to solve the problems and show possibility of free content duplication and efficient contents management in smart home environments.

A Study on Multi-Media Contents Security using Smart Phone (스마트 폰을 이용한 멀티미디어 콘텐츠 보안에 관한 연구)

  • Kim, Dong-Ryool;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.675-682
    • /
    • 2013
  • This paper tries to solve the problems which previous methods have the model using smart card for protecting digital contents. This study provides a contents distribution model to protect the rights of author, distributor, and user as well as user's information by using technologies such as cryptography, DRM(Digital Right Management), access control, etc. The proposed system is evaluated as the most safety model compared with previous methods because it not only solves the problems which the previous methods have, but also protects four type of risks such as use of contents which other mobile devices download, the attack on the key to decode the message, the attack on leaking the contents, and the internal attack such as an illegal reproduction.

A Study on Video Copy Detection Methods Using Representative Color Sequence for Protecting Copyrights (저작권 보호를 위한 대표 색상 시퀀스를 이용한 동영상 복사 검출 방법)

  • Choi, Min-Seok;Choi, Sung-Wook
    • Journal of Digital Convergence
    • /
    • v.10 no.5
    • /
    • pp.185-191
    • /
    • 2012
  • This study deals with the technical approach related to the protection of digital video contents copyright, which has currently become a major issue in the digital contents market. With the production and distribution of digital video contents rapidly increasing, various policies and technical approaches are being made in relation to the protection of intellectual property rights. The technical approach from a DRM (Digital Rights Management) perspective was made from various angles, but its limitations have also been exposed in terms of convenience and quality. In this study, rather than the existing encoding certification and watermark technologies, it introduces technical approaches from a content-based copy detection method, while suggesting a copy detection method using the representative color sequence. In particular, this study takes into consideration the distribution environment of the domestic video market and deals with the technical approach in a direction that can control the illegal distribution of high quality videos.

A Study on a Illegal Copy Protection Model using Hidden Agent in Embedded Computing Environment (임베디드 컴퓨팅 환경에서 은닉 에이전트를 이용한 불법복사 방지 모델에 관한 연구)

  • Lee, Deok-Gyu;Han, Jong-Wook;Chung, Kyo-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.709-712
    • /
    • 2007
  • There have been researches into digital Watermarking technology or Fingerprinting vigorously to safeguard Protective rights for knowledge and poverty for digital contents. DRM(Digital Rights Management) is not only Protective rights for knowledge and poverty, but also management and systems that are necessary to put out, circulate and use for contents. This paper proposes two kinds of ideas. One is protecting contents from illegal acts such as illegal copies when the contents are in the process of circulation. The other is the protocol that can give users convenience. Hidden Agents are used so that contents are protected from illegal copies and illegal use in the contents and cuts off those illegal acts. The Agent will be installed without any special setup. In addition, it can replace roles of Watermarking as a protection. Therefore, this paper shows the solution of illegal copies that happens frequently.

  • PDF