Digital copyright management proxy system based on dependable computing concept

A technology of credible computing and thinking, applied in the direction of electronic digital data processing, computing, computer security devices, etc., can solve the problems of digital copyright protection, improve security and anti-cracking ability, ensure security, ensure Effect of legitimate interest

Inactive Publication Date: 2009-06-17
SHANGHAI AISINOCHIP ELECTRONICS TECH
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the DRM Agent cannot be implemented well, digital copyright protection is out of the question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital copyright management proxy system based on dependable computing concept
  • Digital copyright management proxy system based on dependable computing concept
  • Digital copyright management proxy system based on dependable computing concept

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Embodiments of the present invention will be described in further detail below in conjunction with the accompanying drawings, but the present embodiments are not intended to limit the present invention, and all similar structures, methods and similar changes of the present invention should be included in the protection scope of the present invention.

[0031] The DRM Agent based on the trusted computing idea proposed by the present invention is characterized in the following four aspects: first, the DRM Agent proposed by the present invention is based on the trusted computing idea; second, the DRM Agent is composed of the trusted computing module TCM, Authentication and login module, copyright information management module, content processing module, daemon process and shared data modules; third, trusted computing module TCM is used to save DRM Agent private key information, verify DRM Agent core code integrity, and decrypt CEK etc.; Fourth, for the realization of DRM Ag...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A DRM Agent based on trust computing theory and a method thereof relate to digital copyright management technical field, for resolving the protection problem of digital copyrights. The DRM Agent comprises a trust computing module, an authentication and login module, a copyright information management module, a content processing module, and a daemon process and share data module which are connected with each other, wherein the copyright information management module requests, receives and manages RO; the content processing module decrypts encrypted digital information product and controls use; the trust computing module verifies the integration of DRM Agent code at client and the accuracy of client time; the daemon process and share data module initializes DRM Agent, processes real-time monitor, shares data among all modules, interacts data and coordinates all modules. The invention can effectively confirm the integrality of DRM Agent code, having high application safety.

Description

technical field [0001] The invention relates to the technical field of digital rights management (DRM), in particular to the technology of a digital rights management agent system (DRM Agent) residing in a client device in a DRM system. Background technique [0002] With the advent of the information age, interactive Internet TV IPTV, electronic publishing houses, online education and other industries that provide services for the use of digital information products have made great progress, and these industries have greater and greater value. In such a period, it is more necessary to effectively protect the copyright of digital information products than in any previous period. Digital Rights Management (DRM) was born under such a background. [0003] DRM technology mainly realizes the protection of digital copyright through digital information product content encryption, authorization management and other technologies. Its three basic elements are encrypted digital informa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/10
Inventor 周玉洁李飞
Owner SHANGHAI AISINOCHIP ELECTRONICS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products