簡易檢索 / 詳目顯示

研究生: 顏宏易
Yen, Hong-Yi
論文名稱: 基於DVB多媒體數位家用平台之數位產權管理的改良與實現
Improvement and Implementation of Digital Rights Management based on DVB-MHP
指導教授: 賴溪松
Laih, Chi-Sung
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 電腦與通信工程研究所
Institute of Computer & Communication Engineering
論文出版年: 2007
畢業學年度: 95
語文別: 英文
論文頁數: 81
中文關鍵詞: 存取條件系統多媒體家用平台數位產權管理
外文關鍵詞: Multimedia Home Platform, Digital Rights Management, Conditional Access System
相關次數: 點閱:114下載:1
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 近年來,由於各種數位技術和儲存設備的迅速發展,許多資訊逐漸數位化,數位內容在網路發展蓬勃的現在,將更容易的被傳遞和散播。而數位內容在本質上,也非常容易的對其做非法的修改、儲存。為此,數位產權管理(DRM)因應而生,數位產權管理的目的即是提供數位內容的保護和管理,讓數位內容在其的生命週期中提供有效的保護;在應用上,傳統存取條件系統(CAS)無法滿足未來的的電視商業型態,在機上盒(Set-TopBox)仍可竊盜數位內容,造成數位產業鍊額外的損失。因此逐漸有將數位產權管理和傳統存取條件系統整合在一起的討論。由於目前許多的數位產權管理系統並沒有考慮到使用者消費時的匿名性還有主機可能的惡意行為,我們以更高的安全標準,運用已提出的安全性理論,針對現有的系統架構進行改良,提出了更完整、更安全的架構。在我們的論文中,首先簡略的介紹密碼學、傳統存取條件和數位產權管理相關的概念與系統,並說明先前已提出的架構,接下來提出新的安全需求和改良後的運行方式。最後,我們依照公開行動聯盟所訂定的數位產權管理系統(OMA DRM),建立相容於於標準的系統在OpenMHP上。

    In recent years, the trend has been already progressive toward digitalization in many industries. The natures of digital content are easy to be modified and distributed. According to the problem, Digital Rights Management (DRM) is used to protect and manage digital content. Nowadays, multimedia content protected under Conditional Access Broadcasting system is not enough for commercial modes, and users can still usurp multimedia contents from Set-Top
    Box. To prevent the multimedia contents from being usurped, there are some researches which focus on how to integrate DRM into CAS. However, many existing DRM systems do not consider the anonymous consumption and malicious server. In this thesis, we proposed protocols to achieve anonymous consumption and against malicious server. Furthermore, we built a DRM system compatible with OMA DRM in OpenMHP.

    Chinese Abstract i English Abstract ii Contents iv List of Tables vii List of Figures viii Chapter 1. Introduction 1 1.1 General Background 1 1.2 Motivation 2 1.3 Contributions 3 1.4 Overviews 3 Chapter 2. Related Cryptology Functions 5 2.1 Symmetric-key Cryptographys 7 2.1.1 Backgrounds 7 2.1.2 AES 8 2.2 Asymmetric-key Cryptography 9 2.2.1 Background 9 2.2.2 RSA 9 2.3 Message Integrity and Hash Function 10 2.4 Digital Signature 11 2.5 Mutual Authentication 12 2.6 Smart Card 12 2.7 Public key Infrastructure 13 2.8 Blind Signature 16 Chapter 3. Conditional Access System and Digital Rights Management System 18 3.1 Conditional Access System 18 3.2 Digital Rights Management 24 3.2.1 DRM Background 24 3.2.2 Basic DRM Architecture 25 Chapter 4. Related Work of DRM System 28 4.1 The Commercial DRM System 28 4.2 The DRM Research of TV 31 4.3 Wu’s Architecture of DRM System 34 4.3.1 Motivation 34 4.3.2 Architecture 35 Chapter 5. The Improvement of the Past DRM Architecture 38 5.1 Requirements 38 5.1.1 Anonymous 38 5.1.2 Share… 39 5.1.3 Against Malicious Server 39 5.2 The proposed Architecture 40 5.2.1 Ticket 40 5.2.1.1 A Provably Secure Restrictive Partially Blind Signature Scheme 40 5.2.1.2 Protocol 44 5.2.2 Against Malicious Server 50 Chapter 6. The Implementation of DRM Based on Multimedia Home Platform 54 6.1 Previous Implement of DRM Based on MHP in NCKU 54 6.1.1 Multimedia Home Platform 54 6.1.2 Structure 58 6.2 Introduction of OMA DRM 58 6.3 OMA DRM Implement Structure & Environment 63 6.3.1 Structure 63 6.3.2 Environment 66 6.4 Demonstration 67 Chapter 7. Conclusion & Future Work 75 References 77

    [1] “Digital video broadcasting: multimedia home platform specification 1.1.1,”European Telecommunications Standards Institute (ETSI), TS 102 812, Jun. 2003. [Online]. Available: http://www.dvb.org/
    [2] “Digital rights management,” Open Mobile Alliance, Tech. Rep., Jun. 2004. [Online]. Available: http://www.openmobilealliance.org/
    [3] “DRM specification,” Open Mobile Alliance, Tech. Rep., Mar. 2006. [Online]. Available: http://www.openmobilealliance.org/
    [4] “DRM rights expression language,” Open Mobile Alliance, Approved Version2.0, Mar. 2006. [Online]. Available: http://www.openmobilealliance.org/
    [5] “DRM content format,” Open Mobile Alliance, Approved Version 2.0, Mar. 2006. [Online]. Available: http://www.openmobilealliance.org/
    [6] “DRM architecture,” Open Mobile Alliance, Tech. Rep. Aug., 2004. [Online]. Available: http://www.openmobilealliance.org/
    [7] “OpenMHP : free open source MHP - compliant library.”
    [Online]. Available: http://www.openmhp.org/
    [8] “Webopedia: online computer dictionary for computer and internet terms and Definitions,” [Online]. Available: http://www.webopedia.com/TERM/D/DRM.html
    [9] “Windows media digital rights management,” [Online]. Available: http://www.microsoft.com/windows/windowsmedia/tw/drm/default.aspx
    [10] “The definition of conditional access,” Open Mobile Alliance, Tech. Rep. Aug., 2004.
    [Online]. Available:
    http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci331380,00.html
    [11] “Non-repudiation”, WIKIPEDIA, [Online]. Available:
    http://en.wikipedia.org/wiki/Non-repudiation
    [12] “Conditional - access broadcasting system,” International Telecommunication Union,”
    Recommendation BT.810, 1993.
    [13] “Head - end implementation of simulcrypt,” Digital Video Broadcasting (DVB)
    Document A045 Rev. 3.
    [14] M. Abe and E. Fujisaki, “How to date blind signatures,” Advances in Cryptology-Asia
    Crypt’96, LNCS 11631, Springer, New York, pp.244-251, 1996.
    [15] Masayuki Abe and Tatsuaki Okamoto, “Provably secure partially blind signatures,”
    Advances in Cryptology-CRYPTO 2000, Volume 1880 of Lecture Notes in Computer
    Science, pp. 271-286. Springer-Verlag, 20-24 August 2000.
    [16] Stefan Brands, “An efficitent off-line electronic cash system based on the representation
    problem,” Technical Report CS-R9323, Centrum Voor Wiskunde en Informatica (CWI),
    March 1993.
    [17] Stefan Brands, “Untraceable off-line cash in wallets with observers,” Advances in
    Cryptology-CRYPTO’93, Volume 773 of Lecture Notes in Computer Science, pp.
    302-318. Springer-Verlag, 22-26 August 1993.
    [18] D. Chaum, "Blind signature for untraceable payments", Advances in Cryptology:
    Crypto'82, pp.199-203. Plenum Press, New York and London, 1983, 23-25 August 1982.
    [19] D. Chaum and T. Pryds Pedersen, “Wallet databases with observers,” Advances in
    Cryptology-CRYPTO’92, volume 740 of Lecture Notes in Computer Science, pages
    89-105. Springer-Verlag, 1993, 16-20 August 1992.
    [20] Ronald J F. Cramer, Ivan B. Damgard and L. A. M. choenmakers. “Proofs of partial
    knowledge and simplified design of witness hiding protocols,” Centrum Voor
    Wiskundeen Informatica, 116, page 18 ISSN 0169-118X, February 28 1994.
    [21] J. P. Evain, “The multimedia home platform - an overview,” EBU Technical Department,
    Tech. Rep., 1998.
    [22] Y. Jeong, K. Yoon and J. Ryou, “A trusted key management scheme for digital
    management,” ETRI Journal, Volume 27, Number 1, February 2005.
    [23] J. Kim, Y. Jeong, K. Yoon and J. Ryou, “A trustworthy end-to-end key management
    scheme for digital rights management,” MM’06, October 23-27, 2006.
    [24] F. Kamperman and B. van Rijnsoever, “Conditional access system interoperability
    through software downloading,” Consumer Electronics, IEEE Transactions on, vol. 47,
    pp. 47–54, Feb. 2001.
    [25] H. J. Lee, B. S. Choi, J. W. Seok and J. W. Hong, “Design of protection and distribution
    service model for digital broadcasting content,” International Conference on Multimedia
    and Expo (ICME), 2004.
    [26] Q. Liu, R. Safavi-Naini and N.P. Sheppard, “Digital rights management for content
    distribution,” Australasian Information Security Workshop 2003 (AISW2003), Adelaide,
    Australia Conferences, in Research and Practice in Information Technology, Vol. 21.
    2003.
    [27] C.-K. Liang, C.-C. Liu and H. H. Chen, “A robust DRM system on the DVB multimedia
    home platform,” Consumer Communications and Networking Conference, 2006. 3rd
    IEEE, vol. 1, Jan. 2006, pp. 605–609.
    [28] Greg Maitland and Colin Boyd, “A provably restrictive partially blind signature scheme,”
    Springer-Verlag Berlin Heidelberg 2002, Public Key Cryptosystems (PKC) 2002, LNCS
    2274, pp. 99-114, 2002.
    [29] D. K. Mulligan, J. Han and A. J. Burstein, ”How DRM-based content delivery systems
    disrupt expectations of personal use”, DRM’03 of ACM, Oct. 2003.
    [30] S. Michiels, K. Verslype, W. Joosen and B. D. Decker, “Towards a software architecture
    for DRM,” DRM’05 of ACM, Nov. 2005.
    [31] N. Molavi and X. Zhao, “A security study of digital TV distribution systems,” Master
    Thesis, Department of Computer and Systems Sciences Royal Institute of Technology,
    Jun. 2005.
    [32] Bok-Nyong Park, Jae-Won Kim and Wonjun Lee, “PrecePt: A privacy-enhancing license
    management protocol for digital rights management,” Proceedings of IEEE AINA’04,
    2004, pp.574-579.
    [33] Milan Petković and R. Paul Koster, “User-attreibuted Rights in DRM,” Digital Rights
    Management: Technology, Issues, Challenges and Systems (DRMTICS) 2005, LNCS
    3919.
    [34] J. Piesing, “The DVB multimedia home platform (MHP) and related specifications,”
    Proceedings of the IEEE, vol. 94, pp. 237–247, 2006.
    [35] B. Rosenblatt, B. Trippe and S. Mooney, Digital Rights Management – Business and
    Technology, J. Jensen, M. Walter and D. Lesh, Eds. M&T Books, 2002.
    [36] C. Serrao, M. Dias, A. Calado, J. Trindade, P. Fonseca, H. Carvalho, M. Aurelio, A.
    Calado and S. Ferro, “DRM/CP requirements of selected use cases and business
    scenarios,” Multimedia Networking, Deliverable DB.5.7, Nov. 2004,
    IST-Project:FP6-507252
    [37] C. P. Schnorr, “Efficient signature generation by smart cards,” Journal of Cryptology,
    4(3):161-174, 1991.
    [38] R. Song and L. Korba, “Pay-TV system with strong privacy and non-repudiation
    protection,” IEEE Transactions on Consumer Electronics, Vol. 49, No. 2, MAY 2003
    [39] C. L. Wu, “A study and implement of digital rights management on the DVB multimedia
    home platform,” Master Thesis, Institute of Computer and Communication Engineering
    in NCKU, Jun. 2006.
    [40] Jiang Zhang, Bin Li, Li Zhao and Shi-Qiang Yang, “License management scheme with
    anonymous trust for digital rights management,” Multimedia and Expo 2005, ICME 2005.
    IEEE International Conference on, 2005.

    下載圖示 校內:2008-07-18公開
    校外:2008-07-18公開
    QR CODE