• Title/Summary/Keyword: DRM system

Search Result 257, Processing Time 0.022 seconds

A Robust Multiple Set-Top Box Authentication Scheme for IPTV Against Smart Card Cloning Attack (IPTV 환경에서 스마트카드 복제에 강건한 다중 셋톱박스 인증기법)

  • Lim, Ji-Hwan;Oh, Hee-Kuck;Kim, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.37-46
    • /
    • 2010
  • In an IPTV system, the rights of the content and service provider can be protected by using Conditional Access System (CAS) and Digital Right Management (DRM). In case of the CAS, only the authorized user who has structured authentication keys can decrypt the encrypted content. However, since the CAS establishes a secure channel only between content provider and Smart Card (SC), it cannot protect the system against McCormac Hack attack which eavesdrops on unsecure channel between SC and Set-Top Box (STB) and SC cloning attack. In this paper, we propose a robust multi-STB assisted SC / STB authentication protocol which can protect the IPTV system against not only McCormac Hack attack, but also SC cloning attack. The previous works which bind a STB and a SC during the SC registration phase against the SC cloning attack does not support multi-STB environments. The proposed system which dynamically updates the STB information in subscriber management system using the bi-directional channel characteristic of IPTV system can support the user's multi-STB device effectively.

A Development of Explicit Algorithm for Stress-Erection Analysis of STRARCH System (스트라치 시스템의 긴장응력해석을 위한 명시적 해석법의 개발)

  • Lee, Kyoung-Soo;Han, Sang-Eul
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.24 no.5
    • /
    • pp.513-520
    • /
    • 2011
  • In this paper, the advanced explicit algorithm is proposed to simulate the stress-erection process analysis of Strarch system. The Strarch(Stressed-Arch) system is a unique and innovative structural system and member prestress comprising prefabricated plane truss frames which are erected by a post-tensioning stress-erection procedure. The flexible bottom chord which have sleeve and gap detail are closed by the reaction force of prestressing tendon. The prestress imposing to the tendon will make the Strarch system to be erected. This post tensioning process is called as "stress-erection process". During the stress-erection process, the plastic rigid body rotation is occurred to the flexible top chord by the excessive amount of plastic strain, and the structural characteristic becomes to be unstable. In this study, the large deformational beam-column element with plastic hinge is used to model the flexible top chord, and the advanced Dynamic Relaxation method(DRM) are applied to the unstable problem of stress-erection process of Strarch system. Finally, the verification of proposed explicit algorithm is evaluated by analysing the stress-erection of real project of Strarch system.

Development of a Distributed Rainfall-Runoff System for the Guem River Basin Using an Object-oriented Hydrological Modeling System (객체지향형 수문 모델링 시스템을 이용한 금강유역 분포형 강우-유출 시스템의 개발)

  • Lee, Gi-Ha;Takara, Kaoru;Jung, Kwan-Sue;Kim, Jeong-Yup;Jeon, Ja-Hun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2009.05a
    • /
    • pp.149-153
    • /
    • 2009
  • Physics-based distributed rainfall-runoff models are now commonly used in a variety of hydrologic applications such as to estimate flooding, water pollutant transport, sedimentation yield and so on. Moreover, it is not surprising that GIS has become an integral part of hydrologic research since this technology offers abundant information about spatial heterogeneity for both model parameters and input data that control hydrological processes. This study presents the development of a distributed rainfall-runoff prediction system for the Guem river basin ($9,835km^2$) using an Object-oriented Hydrological Modeling System (OHyMoS). We developed three types of element modules: Slope Runoff Module (SRM), Channel Routing Module (CRM), and Dam Reservoir Module (DRM) and then incorporated them systemically into a catchment modeling system under the OHyMoS. The study basin delineated by the 250m DEM (resampled from SRTM90) was divided into 14 midsize catchments and 80 sub-catchments where correspond to the WAMIS digital map. Each sub-catchment was represented by rectangular slope and channel components; water flows among these components were simulated by both SRM and CRM. In addition, outflows of two multi-purpose dams: Yongdam and Daechung dams were calculated by DRM reflecting decision makers' opinions. Therefore, the Guem river basin rainfall-runoff modeling system can provide not only each sub-catchment outflow but also dam inand outflow at one hour (or less) time step such that users can obtain comprehensive hydrological information readily for the effective and efficient flood control during a flood season.

  • PDF

Design on Protection and Authentication System of IPTV Contents using HSI Watermark (HSI 워터마크를 이용한 IPTV 콘텐츠 보호 및 인증 시스템 설계)

  • Kim, Dae-Jin;Choi, Hong-Sub
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.7
    • /
    • pp.55-62
    • /
    • 2010
  • While the broadband network and multimedia technologies have been developing, the commercial market of digital contents also has been widely spreading with recently starting IPTV. As the IPTV services are getting to be generalized and popularized, the contents illicit copying and distribution of copyright meterials tends to draw more attentions. So we need a right service system that can protect contents and copyright using watermark inserting. Until now, the conventional protection and authentication system is taking advantages of merits both in CAS and DRM. But this system can not protect the contents when acquiring them from TV output using A/D convertor. So we apply watermark method using HSI color space against contents illicit copying. And for distribution of copyright materials. we compound unique settop ID and copyrighter's ID to make new ID that is watermark. When inserting watermark, we use the watermark for copyright protection and authentication. So we can protect copyright and identify last settop's user in illicit distribution. we design download based IPTV contents protection and authentication system using HSI watermark method.

Study of Document Distribution System Architecture for Digital Secret Document Leakage Prevention (전자기밀문서 유출봉쇄 유통시스템 구조 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.143-158
    • /
    • 2010
  • The illegal leakage of enterprise digital confidential information will threaten the enterprise with bankruptcy. Today since most small-and-medium companies have no capability to fight against illegally compromising their critically confidential documents in spite of knowing the leakage of them, strongly safe distribution system of the digital confidential documents should be designed so in secure as to prevent any malicious intent of embezzlement from accessing the critical information. Current DRM-based protection system is not always perfect to protect the digital secrets, even seems to leave the secrets open. Therefore our study has analyzed the illegal leakage paths that hackers attack against and the vulnerability of the current protection systems. As result, we study the group communication based system architecture satisfying the security conditions to make even legitimate working employee keep out of the confidential documents, without performance degradation. The main idea of this architecture is to stay every secrets in encrypted form; to isolate the encrypted documents from the crypto-key; to associate every entity with one activity and to authenticate every entity with DSA-based public key system; multiple authentication method make hackers too busy to get a privilege to access the secrets with too many puzzle pieces. This paper deal with the basic architectural structure for the above issues.

Biological Activity of Extracts of the Starfish Asterias amurensis (아무르불가사리 추출물의 생리활성)

  • Go, Hye-Jin;Jo, Mi Jeong;Kim, Tae Young;Hong, Yong-Ki;Kim, Gun-Do;Lee, Byung-Woo;Park, Nam Gyu
    • Journal of Life Science
    • /
    • v.24 no.5
    • /
    • pp.491-497
    • /
    • 2014
  • Nowadays, starfish is one of problems about interruption of marine ecosystem, so many researchers are focusing on application of the starfish (Asterias amurensis). In this study, we investigated the contractile and relaxant activity of the smooth muscles and the antimicrobial and antioxidant activity of six different tissues (muscle, gut, liver, tube feet, gonads, and body) of A. amurensis. Frozen samples were extracted with distilled water containing 1% acetic acid. Extracts from all the tissues, except the body tissue, showed potent antimicrobial activity against Escherichia coli D31. The dorsal retractor muscles (DRM) of muscle and gut extracts showed strong contraction responses. On the other hand, contractile activity on esophagus of squid Todarodes pacificus could be detected in all tissues tested. The contractile activity of the liver extract was higher than that of the other tissues. The body, tube feet, and liver extracts showed the contractile activity on the intestine of the panther puffer fish (Takifugu pardalis). Relaxation response on the DRM of starfish (A. pectinifera) was observed in all tissues tested. Increased antioxidant activity was observed in the gut, liver, and body extracts. The results suggest that the starfish (A. amurensis) is a potential source of novel bioactive compounds.

Isolation of a Novel Neuropeptide with Contractile Activity on the Smooth Muscle from the Snakehead Channa argus (가물치(Channa argus)로부터 평활근 수축활성 펩타이드의 정제)

  • Go, Hye-Jin;Park, Nam-Gyu
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.45 no.2
    • /
    • pp.114-121
    • /
    • 2012
  • A novel neuropeptide was isolated from the skin of the snakehead Channa argus using the dorsal retractor muscle (DRM) of a starfish Asterina pectinifera as a bioassay system. The amino acid sequence of the purified peptide was analyzed using automated sequencing and MALDI-TOF mass spectrophotometry. The primary structure of the purified peptide was determined to be Pro-Ala-Leu-Ala-Leu. To investigate the complete primary structure of this peptide, Pro- Ala-Leu-Ala-Leu-OH and Pro-Ala-Leu-Ala-Leu-NH2 were synthesized. The chemical and pharmacological properties of the synthetic peptides were compared with those of the native peptide. Both the native peptide and synthetic Pro-Ala- Leu-Ala-Leu-OH had identical behaviors on the reverse-phase and cation-exchange HPLC chromatograms. Synthetic Pro-Ala-Leu-Ala-Leu-OH showed contractile activity on the DRM, and the threshold concentration of this peptide was approximately $10^{-8}$ M. The maximal contractile effect ($E_{max}$) of this peptide was $294{\pm}45.4$% at $10^{-5}$ M.

A digital Audio Watermarking Algorithm using 2D Barcode (2차원 바코드를 이용한 오디오 워터마킹 알고리즘)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.97-107
    • /
    • 2011
  • Nowadays there are a lot of issues about copyright infringement in the Internet world because the digital content on the network can be copied and delivered easily. Indeed the copied version has same quality with the original one. So, copyright owners and content provider want a powerful solution to protect their content. The popular one of the solutions was DRM (digital rights management) that is based on encryption technology and rights control. However, DRM-free service was launched after Steve Jobs who is CEO of Apple proposed a new music service paradigm without DRM, and the DRM is disappeared at the online music market. Even though the online music service decided to not equip the DRM solution, copyright owners and content providers are still searching a solution to protect their content. A solution to replace the DRM technology is digital audio watermarking technology which can embed copyright information into the music. In this paper, the author proposed a new audio watermarking algorithm with two approaches. First, the watermark information is generated by two dimensional barcode which has error correction code. So, the information can be recovered by itself if the errors fall into the range of the error tolerance. The other one is to use chirp sequence of CDMA (code division multiple access). These make the algorithm robust to the several malicious attacks. There are many 2D barcodes. Especially, QR code which is one of the matrix barcodes can express the information and the expression is freer than that of the other matrix barcodes. QR code has the square patterns with double at the three corners and these indicate the boundary of the symbol. This feature of the QR code is proper to express the watermark information. That is, because the QR code is 2D barcodes, nonlinear code and matrix code, it can be modulated to the spread spectrum and can be used for the watermarking algorithm. The proposed algorithm assigns the different spread spectrum sequences to the individual users respectively. In the case that the assigned code sequences are orthogonal, we can identify the watermark information of the individual user from an audio content. The algorithm used the Walsh code as an orthogonal code. The watermark information is rearranged to the 1D sequence from 2D barcode and modulated by the Walsh code. The modulated watermark information is embedded into the DCT (discrete cosine transform) domain of the original audio content. For the performance evaluation, I used 3 audio samples, "Amazing Grace", "Oh! Carol" and "Take me home country roads", The attacks for the robustness test were MP3 compression, echo attack, and sub woofer boost. The MP3 compression was performed by a tool of Cool Edit Pro 2.0. The specification of MP3 was CBR(Constant Bit Rate) 128kbps, 44,100Hz, and stereo. The echo attack had the echo with initial volume 70%, decay 75%, and delay 100msec. The sub woofer boost attack was a modification attack of low frequency part in the Fourier coefficients. The test results showed the proposed algorithm is robust to the attacks. In the MP3 attack, the strength of the watermark information is not affected, and then the watermark can be detected from all of the sample audios. In the sub woofer boost attack, the watermark was detected when the strength is 0.3. Also, in the case of echo attack, the watermark can be identified if the strength is greater and equal than 0.5.

The Study on Design and Implementation of MSEC-based Group Key Management Protocol for Corporate Secret Distribution (기업비밀유통을 위한 MSEC 기반 그룹 키 관리 프로토콜 설계와 구현 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.6
    • /
    • pp.87-110
    • /
    • 2010
  • Recently competitive Korean companies are suffered from financial loss due to illegal exposure of their own proprietary know-how secrets, since it is difficult to watch hidden illegal channels to leak them due to their digitalization. Today the DRM-based system designed to protect such secrets is insufficient to prevent it, since DRM-based protection system cannot defend the intelligent robbery of secrets, in special, employee's robbery. The MSEC is much appropriate to secure secrets against employee's robbery. Our paper notes that IGMP, MSEC and SNMP can work easily together to realize secure system that satisfy strong security condition for prevention from leaking secrets. Since the previous research was on the architectural design for prevention of illegal exposure, this paper proposes the efficient protocol based on MSEC protocol. Our protocol satisfies the strong security conditions that the principles that the secret should be stored/distributed only in an encrypted shape, and should be separated physically from its encryption key, and should be carried in registered mobile storage separate from its processing device, and should be verified in terms of both user and device. Thus this paper proposes both the protocol for secret document distribution and its group key management.

Example of Broadcasting Application based on MPEG-21 IPMP and Reference Model (MPEG-21 IPMP과 Reference Model의 방송환경 적용 예)

  • 채종진;김종연
    • Journal of Broadcast Engineering
    • /
    • v.8 no.4
    • /
    • pp.365-380
    • /
    • 2003
  • Since MPEG-21 IPMP has been working on International Standardization activity such as one of DRM systems from 1997, the standardization is recently re-started even though the activity was interrupted. According to the MPEG Brisbane meeting, the CfR of MPEG-21 IPMP will be determined on the next Hawaii meeting, therefore they will announce the CfP. However the CfP announced in MPEG Hawaii meeting but the CfR didn't announce because of unfinished requirement document job. Finally. the proposed techniques will be submitted till June 2004. In this paper, we explained the requirement of standardization based on a broadcasting circumstance and implemented the system of MPEG-21 including the architecture and IPMP systems, then we showed all functionality within the other MPEG-21 elements engines. In case of multimedia stream broadcasting system, it is a real-time processing system, the implemented MEPG-21 Architecture can be shown the use of Digital Item In the MPEG-21 terminal and additional MPEG-21 element engines.