Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/19322
DC FieldValueLanguage
dc.contributor張真誠zh_TW
dc.contributorChin-Chen Changen_US
dc.contributor曾育民zh_TW
dc.contributor伍麗樵zh_TW
dc.contributorYuh-Min Tsengen_US
dc.contributor.advisor詹進科zh_TW
dc.contributor.advisorJinn-Ke Janen_US
dc.contributor.author陳政潔zh_TW
dc.contributor.authorChen, Cheng-Jieen_US
dc.contributor.other中興大學zh_TW
dc.date2007zh_TW
dc.date.accessioned2014-06-06T07:06:32Z-
dc.date.available2014-06-06T07:06:32Z-
dc.identifierU0005-0407200610284200zh_TW
dc.identifier.citation1. M. Bellare and R. Sandhu, "The Security of Practical Two-party RSA Signature Schemes", Manuscript, 2001. 2. C. Boyd, “Digital multi-signature”, in Proceedings of Conference on Coding and Cryptography, 1986, pp. 15-17 3. D. Chadwick, "Smart Cards aren''t always the Smart Choice", IEEE Computer, Volume 32, Issue 12, Dec. 1999, pp.142-143. 4. H. Chang and M. G. Atallah, "Protecting Software Code By Guards", ACM Workshop on Security and Privacy in Digital Rights Management, 2001. 5. Claudine Conrado, Frank Kamperman, Geert Jan Schrijen, and Willem Jonker, "Privacy in an Identity-based DRM System", IEEE Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA’03), Prague, September 2003, pp.389-395. 6. J. S. Erickson, "Fair use, DRM, and Trusted Computing", Communications of the ACM, Vol.46(4), 2003, pp.34-39. 7. E. W. Felten, "A Skeptical View of DRM and Fair Use", Communications of the ACM, Vol. 46(4), 2003, pp.56-59. 8. Pramod A. Jamkhedkar and Gregory L. Heileman, "DRM as a Layered System", ACM DRM Washington, DC, USA., October 25, 2004. 9. Mayur Kamat, "Security Requirements for Digital Rights Management", TRACK: Leading Edge and Emerging Technologies, October 14, 2003. 10. Taekyoung Kwon, "Virtual Software Tokens – A Practical Way to Secure PKI Roaming", Proceedings of the Infrastructure Security (InfraSec), Vol. 2437 of LNCS, Springer-Verlag, 2002, pp.288-302. 11. Taekyoung Kwon, "Refinement and Improvement of Virtual Software Token Protocols", IEEE Communications Letters, Vol. 8, Issue 1, Jan. 2004, pp.75-77. 12. Qiong Liu, Reihaneh Safavi-Naini, and Nicholas Paul Sheppard, "Digital Rights Management for Content Distribution", Australasian Information Security Workshop, 2003. 13. D.K. Mulligan, J. Han, and A.J. Burstein, "How DRM-Based Content Delivery Systems Disrupt Expectations of Personal Use", ACM DRM 2003, Washington D.C., USA, October 27, 2003, pp.77-89. 14. T. Sander and C. F. Tschudin, "Protecting Mobile Agents Against alicious Hosts. In G. Vigna (ed.)", Mobile Agent Security of LNCS, 2003. 15. Hung-Min Sun, Chi-Fu Hung, and Bying-He Ku, "An Improved Identity- Based DRM System", The 15th Information Security Conference(ISC2005), Kaohsiung, Taiwan , June 2005. 16. Jeffrey Dambrtowski, "InterTrust''s Role in Information Assurance for Digital Media", http://www.acsu.buffalo.edu/~jwd/MGS602project/intertrust.shtml, Nov. 20, 2003. 17. "FairPlay:Effectiveness and Weaknesses of Apple’s Digital Right Management Technology", http://e170.ex.com/p1/indigo.pdf 18. IDC, http://www.idc.com 19. J. Manferdelli, "Q&A: Microsoft Seeks Industry-Wide Collaboration for ‘Palladium’ Initiative", http://www.microsoft.com/presspass/features/2002/jul02/07-01palladium.mspx 20. Microsoft,"Secure Audio Path", http://msdn.microsoft.com/library/default.asp?url=/library/en-us/wmrm10/htm/wmrm_sdk_guide_ncbj.asp 21. Microsoft, "Windows Media Digital Rights Management", http://www.microsoft.com/windows/windowsmedia/tw/drm/default.aspx 22. Microsoft, "Microsoft Window Right Management Services System", http://www.microsoft.com/taiwan/windowsserver2003/technologies/rightsmgmt/default.mspx 23. National Institute of Standards and Technology, http://www.nist.org. 24. Trusted Computing Group, https://www.trustedcomputinggroup.org 25. 陳育毅、蔡柏宏、詹進科, "建立家庭網路與個人合理使用的跨平台數位產權管理機制", 2005商管與資訊研討會(Taiwan conference on Business and Information), Sep. 29-30, 2005. 26. "中華民國著作權法", http://www.cca.gov.tw/law/html/7-1.htmlzh_TW
dc.identifier.urihttp://hdl.handle.net/11455/19322-
dc.description.abstract數位產權管理系統(Digital Right Management)為產權管理與著作權議題之新興領域,可運用在各種不同格式(文字、影像、聲音、多媒體)的數位內容服務,主要提供數位內容永久性的保護。數位產權管理系統的運作,除了需要有保護數位內容的相關技術外,還要有完整的產權控管機制。因此現今許多的數位產權管理系統皆致力於如何保護數位內容的著作權以防止非法拷貝、竄改和散佈,且只讓合法使用者可存取數位內容。然而這些數位產權管理系統對於數位內容的使用限制甚多,法律上賦予消費者在合理範圍內的使用原則幾乎都未受到保障。這是因為其設計實質上是把使用執照授權對象指定在裝置而不是使用者本身,致使數位內容的使用也因此被限定在該台裝置才能播放,所以目前數位產權管理系統下的數位內容使用缺乏可攜性,並不能讓使用者合法購買的數位內容可以合理使用,其看似對數位內容業者較為有利,因為數位內容不會被重製,有效保障數位內容業者的權益。但持續限制使用者的權益,不僅對使用者造成不便,更是違反相關法律規定,讓使用者對數位產權管理系統望而卻步,反而造成數位產權管理系統的推廣不易。 在本論文中,我們提出如何將Virtual Software Token(虛擬軟體令牌)機制導入數位產權管理系統中,讓使用執照的實質授權對象指定在使用者本身而非裝置,使得數位內容的播放亦不再限定於某特定裝置,有效改善一般數位產權管理中產權可攜性不足的缺點,且讓使用者無須攜帶任何可驗證身份的裝置,便可任何時間地點都可透過網路進行身份認證,合法存取數位內容。因而達到保障使用者的合理使用權。zh_TW
dc.description.abstractDigital Right Management (DRM) is a emerging field of right management and copyright topic. It can be applied to digital content (text, image, music, video etc.) and aims to provide persistent access control over digital content. Its technology still need perfect management mechanism of right, in addition to the security technology to increase secure level of digital content. Most existing DRM systems focus on protecting copyright to prohibit illegal copy and illegal distribution of the content and to let only authorized users access them. However, these designs actually make License's authorized entity be assigned to the specific device not to the user himself. The content is bound to a specific device. Therefore, the content encoded using most existing DRM systems lacks portability. This restriction may hamper legitimate users to access their legal content on multiple compliant devices. These DRM systems may come into conflict with fair use (also referred to as personal use). And due to this limitation, user will not want to use or buy the content which is encoded by DRM systems. In this paper we propose how to utilize the concept of Virtual Software Token mechanism into DRM systems. We use this concept to make License portable among various compliant devices as permissions to use the content. Additionally, the content is no longer bound to a specific device (containing smart card) owned by the user, but to the user himself. Consequently our paper will improve portability of DRM system and achieve fair use.en_US
dc.description.tableofcontents第一章 緒論 1 第一節 數位產權管理系統的簡介 1 第二節 研究動機 2 第三節 研究目的 3 第二章 數位產權管理系統介紹 4 第一節 一般數位產權管理系統概論 4 第二節 目前現行數位產權管理介紹 12 2.2.1 Apple-FairPlay 12 2.2.2 Microsoft-Windows Media Right Management 16 2.2.3 Microsoft-Window Right Management Services System 19 2.2.4 InterTrust-Rights|System 25 第三節 整體數位產權管理系統的安全性 27 第三章 目前一般數位產權管理系統潛在的問題 32 第一節 一般數位產權管理系統潛在的問題 32 3.1.1 產權可攜性不足 32 3.1.2 未符合法律所保障的合理使用權 33 第二節 安全技術與合理使用權的平衡 34 第四章 數位產權可攜性的相關研究 35 第一節 Privacy in an Identity-based DRM System 35 第二節 An Improved Identity-Based DRM System 39 第三節 使用智慧卡解決產權可攜性是否具實用性之議題討論 43 第五章 我們的設計 44 第一節 Virtual Software Token 44 第二節 保障合理使用權的線上數位產權系統設計 45 第三節 安全分析 52 第六章 結論與未來方向 56 第一節 結論 56 第二節 未來方向 58 參考書目 59zh_TW
dc.language.isoen_USzh_TW
dc.publisher資訊科學系所zh_TW
dc.relation.urihttp://www.airitilibrary.com/Publication/alDetailedMesh1?DocID=U0005-0407200610284200en_US
dc.subjectDigital Right Managementen_US
dc.subject數位產權管理系統zh_TW
dc.subjectfair useen_US
dc.subjectportabilityen_US
dc.subjectrightsen_US
dc.subjectVirtual Software Tokenen_US
dc.subject合理使用權zh_TW
dc.subject可攜性zh_TW
dc.subject產權zh_TW
dc.subject虛擬軟體令牌zh_TW
dc.title保障合理使用權的線上數位產權管理系統設計zh_TW
dc.titleThe Design of Fair-use Online DRM Systemen_US
dc.typeThesis and Dissertationzh_TW
item.openairetypeThesis and Dissertation-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.languageiso639-1en_US-
item.grantfulltextnone-
item.fulltextno fulltext-
item.cerifentitytypePublications-
Appears in Collections:資訊科學與工程學系所
Show simple item record
 

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.