Digital content trusted usage control method based on cloud computing

A digital content and control method technology, applied in the Internet field, can solve the problems of terminal equipment confidential privacy data and platform configuration information leakage, cracking and tampering, and achieve the effect of guaranteeing two-way trust relationship and protecting confidential privacy data

Inactive Publication Date: 2012-05-02
HENAN UNIV OF SCI & TECH
View PDF3 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] As the core component of digital copyright protection, the existing DRM controller is mainly located on the user terminal equipment, and still faces the possibility of malicious attacks such as cracking and tampering by illegal users; and although the existing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital content trusted usage control method based on cloud computing
  • Digital content trusted usage control method based on cloud computing
  • Digital content trusted usage control method based on cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0066] based on figure 2 Framework, the protocol flow of the technical solution of the present invention can be specifically implemented as follows:

[0067] Here, it mainly includes a cloud-based multimedia server (Server) and a mobile terminal (Mobile Client, MC), which are two-way verifiers (or verifiers) and verifiers (or verifiers) respectively. In addition, it also includes a trusted third party - the authentication agent (APP). Among them, the DRM controller (DRMC) is the verified object of the multimedia cloud server.

[0068] Before the start of this protocol process, it is assumed that entities such as Server, MC, and APP have obtained the certificate of the attestation identity key AIK (Attestation Identity Key, attestation identity key) from the certificate and license server, K (APP-Server) and K (APP -MC) are the shared secret keys generated between APP, Server, and MC before the RA session starts.

[0069] The two-way integrity verification security protoco...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a digital content trusted usage control method based on cloud computing. The system framework comprises a multimedia server, a mobile terminal, a verification agent server, a certificate and license server, an integrity measurement reference and security policy database and a trust measurement log, wherein the mobile terminal uses the multimedia digital content on the multimedia server through a graphical user interface of a DRM (digital rights management) controller; a multimedia server platform runs the DRM controller and performs usage control on the DRM controller through a DRM license; the mobile terminal and the multimedia server determine a verification agent through negotiation; and by adopting a remote proof method and a bidirectional integrity verification security protocol, which support the verification agent, the bidirectional trust relationship between the multimedia content provider and the terminal user is guaranteed, and the secrete privacy data on the terminal equipment of the user is protected as well. In the invention, as the DRM controller is configured on the multimedia server, the possibility of malicious attack such as breaking, tampering and the like, performed by an illegal user, is avoided.

Description

technical field [0001] The present invention relates to the field of Internet technologies, in particular to a digital rights management (Digital Rights Management, DRM)-oriented and cloud computing-based trusted use control method for digital content. Background technique [0002] Usage Control (UCON, Chinese name is "Usage Control") is a basic access control framework that can be used for DRM applications. It integrates three basic components: Authorization, Obligation and Condition. Known as UCON ABC . Under the research of Sandhu et al., this framework is regarded as the next-generation access control architecture, which has continuous access control characteristics, and is easy to describe the dynamic changes of entity attributes during resource usage, and is suitable for digital rights management application scenarios [Document: Park J, Sandhu R. The UCON ABC Usage Control Model [J]. ACM Transactions on Information and System Security, 2004, 7( 1): 128- 174.]. at ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L29/06
Inventor 张志勇黄涛王剑张丽丽牛丹梅杨丽君陈书全田伟莉仝利红贾涛
Owner HENAN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products