Design and Implementation of DRM Proxy for DRM Cloud Service
نویسندگان
چکیده
منابع مشابه
DRM Cloud Architecture and Service Scenario for Content Protection
The smart devices and cloud computing technology have been introduced into a new content service such as N-Screen service. The DRM(digital rights management) techniques have been rapidly developed in accordance with the new service environment after the awareness on the importance of DRM technology. In spite of the technical advancement of DRM, it is being taken as an unwelcome thing by the con...
متن کاملDRM - the BBC World Service distribution chain
At the basic RF-channel level, DRM shares many characteristics with other modern systems such as DVB-T and DAB. It utilises Coded Orthogonal Frequency Division Multiplexing (COFDM) [1][2] to combat noise, narrowband fading and multipath. Broadcasts can be synchronized to support Single-Frequency Networks (SFNs) and Multi-Frequency Networks (MFNs). One DRM service normally occupies one AM channe...
متن کاملAn efficient proxy signature scheme in home network DRM
In this paper we overview the existing home network DRM schemes and especially Philips’ invention. Then we propose to use the proxy signature to simplify the authentication of certificate chain in Philips’ scheme. And we also give an efficient scheme of proxy signature based on the characters of certificate chain. We then give a detailed security analysis to show that our scheme meets the six p...
متن کاملA White-Box DES Implementation for DRM Applications
For digital rights management (drm) software implementations incorporating cryptography, white-box cryptography (cryptographic implementation designed to withstand the white-box attack context) is more appropriate than traditional black-box cryptography. In the whitebox context, the attacker has total visibility into software implementation and execution. Our objective is to prevent extraction ...
متن کاملAn Efficient DRM Standard Protocol Implementation for Media Cards
DRM provides an effective method to protect digital contents against copyright infringement. However, existing general DRM systems cannot be directly applied to low computation-power systems such as media cards. We propose an implementation of a DRM system which is applicable to such limited environments by improving the main specifications and modifying key aspects of the cryptographic algorit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: KIPS Transactions on Computer and Communication Systems
سال: 2013
ISSN: 2287-5891
DOI: 10.3745/ktccs.2013.2.12.553