Research on Digital Content Copyright Protection ...

6 downloads 31419 Views 201KB Size Report
systems and software-only DRM systems; according to the .... Secure Hash Algorithm (SHA), for Digital Signature. Standard [3]. ... MAC is the best way to avoid.
 

Research on Digital Content Copyright Protection System WANG Yun-Cai Chinese People's Public Security University, Beijing 100038, China Corresponding author: +86 010 13261923909 E-mail address: [email protected]

NIU Ju-Fen Hebei University, Baoding 071002, China E-mail address: [email protected]

Abstract: This article studies copyright protection system, and generalize system framework, Firstly, it introduces the technological base of digital copyright protection systems, outlined several digital content encrypting algorithms and one-way hash function; Secondly, it introduces system design, security requirements and working principle. Finally, it introduces digital copyright protection system framework, and designs a secure transaction system for digital content. Keywords: digital resources management (DRM), copyright protection system, encryption, decryption, secure transaction system

1. Introduction

safety technology in use, was divided into cryptographic

With the rapid development of the Internet and digital

techniques oriented DRM systems and digital watermarking

technology, the digital content which trade and diffuse

technology oriented DRM systems, as well as the DRM

online, such as e-books, music, movies, pictures, games and

systems combined both above. Although there existed

software, becoming more and more. Web publishing and

difference in the protected objects, supported business

traditional works digitization are inevitable. Nevertheless,

models and adopted techniques, the DRM system hold the

the easiness of copy, modification and dissemination lead to

same core idea, that is to protect the digital content through

a lot of piracy and infringement, Users, copy and paste the

the use of digital content permission. [2]

value

2. The technology base of digital content copyright

information

intentionally

or

unintentionally,

especially the unaccounted secondary spread, such as disk

protection

replication, network sharing, etc., which just waste potential

2.1 Cryptography theory

consumer resources with the geometric speed and cause

Modern cryptography includes four parts:

great loss, frustrate the enthusiasm of using Internet, and

Clear text: the original information can be read may be

holdback the information dissertation, Traditional copyright

a bit sequence, a text file, bitmap, digital voice sequence or

protection of digital content can no longer satisfy the needs

digital video images sequence.

of digital content copyright protection.

[1]

So that, it is

Cipher text: after encrypted, the clear texts become

necessary to manage and protect various digital content,

unable-read text.

integrate digital content copyright protection technology,

Encryption Algorithm: mathematical formulas which

business models and the existing legal system according to

used for the clear text to cipher text and cipher text to clear

the characteristics of digital content, and construct the

text.

Digital Rights Management System structure.

Secret key: the key used for encryption and

Currently, there are a lot of DRM systems in the

decryption.

market, which, according to the protected object, was

Modern encrypting techniques can be divided into

divided into DRM systems correspond to software and

three categories: the private key cryptography, public key

DRM systems correspond to e-books, streaming media and

cryptography and one-way hash function.

other digital content; according to the special hardware

2.2 Private key encrypting technology

weather in use, was divided into hardware-based DRM

Private key encrypting technology, also known as a

systems and software-only DRM systems; according to the

symmetric single key cipher system which indicates that the

___________________________________ 978-1-4244-4900-2/09/$25.00 ©2009 IEEE    

1050

 

encrypting key is the same with decrypting key or one can

system is often used to encrypt the core of confidential data,

be derived from the other known key. Symmetric key

while the symmetric cipher system is often used to encrypt

algorithm can be encrypted faster for the key being short, it

large amounts of data.

suits the encryption for a large number of data. But it also

2.4 One-way hash function

revealed the inherent disadvantage of the code mechanism:

(1) One-way hash function [3]

it is difficult to keep secrecy; the key is in too large number

One-way hash function H (M), acting on message M

to manage, for example, N users may generate N * (N-1) / 2

with arbitrary length, return a fixed-length hash value h0. h

key; user authentication issues is unresolved. The general

= H (M)> h,the length is ma, there are many functions

[2, 3, 4, 5, 6, 7]

which input arbitrary-length value and output fixed-length

symmetric encryption algorithms are as following: Key

Data block-

Application

value. However, one-way hash function has the following

bit-long

long

examples

characteristics:

DES

56

64

DEM,SNMPv2

Triple DES

112

64

PEM

Algorithms

Given M, it is easy to calculate h0 Given h, it is hard to calculate M according to H (M) = h. Given M, it is hard to find another message M 'and meet

IDEA

128

64

PGP

the demand H (M) = H (M').

Table 1 general symmetric encryption algorithms

At present, the commonly used hash functions are MD5

2.3 Public key encrypting technology

and SHA. (2) MD5 [10]

Public key encrypting technology, also known as public key asymmetric cipher system, which indicates that

MD5 algorithm is a kind of message-decomposed

the encrypting key is different from the decrypting key, and

function and one-way mathematical function, which can

the mutual calculation is not practicable. Each user of

extract any information for a large number. It has a high

Public key cipher system has a pair of key: private key and

safety, and any information can be expressed as a 128-bit

public key. Public-key cipher system can make up for the

digital. Meanwhile MD5 is a one-way mapping function.

shortcomings of symmetric key system, simplify key

Some information can be generated the corresponding MD5

management, and make digital signature. However,

code, but it is difficult to resume the same information from

Public-key cipher system has disadvantages, such as low

MD5 code. The outstanding nature of MD5 code has been

operation speed, impacts network performance. The general

widely used in a variety of data protection occasions.

asymmetric encryption algorithms are as following

[8, 9]

:

(3) American National Institute of Standards and

Algorithm

Function

Applications examples

Technology and the National Security Agency designed

RSA

digital

PEM, PGP

Secure Hash Algorithm (SHA), for Digital Signature [3]

. SHA generates a 160-bit hash value, longer

signatures,

Standard

encryption

than the MD5.

DSA

digital signature

DSS

Diffie-Hellman

Key Exchange

Omitted

(4) Message authentication code MAC MAC is a certificating mark, also known as the checksum, which is a hash function with private secret key.

key exchange

It is the result that certain algorithm and key act on specified

Table 2 general asymmetric encryption algorithms

information. Information reception calculates the MAC with

In practical applications, it is important to make

the same algorithm and key, if the result is sameness with

advantage of both above respects, take symmetric cipher

the reception, it reveals that information is not tampered in

system to encrypt files, take asymmetric cryptosystem to

the process of transmission, contrarily, the information is

encrypt systems, which is hybrid encryption system. It

regarded tampered. MAC is the best way to avoid

solves the problem of computing the speed of key

encrypting bit stream modified maliciously.

distribution and management. Therefore, public-key cipher    

1051

 

(5) HMAC

to B. Conversely, if B forged M to M', then B can't present

HMAC is authentication method based on message

DSKA (M), it proves that B forges message. 2. 6 DRM Right Description Language

integrity, the security on the base of the hash algorithm, requires the two sides share communication the key and the

DRM rights description language is a kind of method

agreement algorithm, carry out the hash computing on

to describe the author or digital publications, through which,

message, such as MD5, SHA, RIPEMD etc. So it forms a

DRM systems can describe a particular number of

fixed-length authentication code. Both the communicating

publications or documents flexibly, include: licenses, rights,

sides determine the legality of message through the check

restrictions, obligations, employing agreement etc. So,

authentication code to. This agreement can be used for

Right description language should have the character of

encryption, digital signatures, message authentication and

flexibility, general purpose, scalability and so on. At present,

so on.

there are many organizations and research institutions are

2.5 Digital signature technology

working in this area, and developed some language with

Digital Signature Technology is data that attached to the data unit or the password change of data units.

[11]

characteristics

It has

and

Language Competence

certification: [12]

Extensible

Markup

, Open Digital Rights Language,

three functions: information receiver can confirm the

Extensible Access Control Markup Language [13], Extensible

identity of the information sender: Information sender

Media Commerce Language, MPEG Rights Expression

should not deny have sent message; information receiver or

Language and so on.  

the illegal should not be forged or distort information.

2. 7 DRM meta-data DRM meta-data is data on data, which can identify and

(1) Digital Signature Technology

describe the actual content-related information except the

First of all, signers employ one-way hash function to

[14]

. The metadata attached to digital products

digest the messages. Secondly, the signer encrypts the

content itself

digest message with public key encrypting system, to

enable us to understand digital products better.

generate the so-called "digital signature". After received the

At present, the best digital product identifying system

document, receiver identify digital signature, disengage

is the DOI(Digital Object Identifier)which is developed by

"digital signature" message with the signatory's public key,

IDF(International DOI Foundation). IDF was founded in

get hold of the message digest, then use the same one-way

1998, is a non-profit organization whose purpose is to

hash function calculate message digest, compare the results.

develop and promote the digital object identifier system as a

If the results match entirely, then the integrity and

common basis. The DOI system is such system for the

correctness of the document contents and the authenticity of

intellectual property rights markup and exchange, the latest

signatures have been guaranteed.

version 2.3.0 released in August 2002.

(2) The basic process of digital signature    

Standardized meta-data format is a most promising

A sender use the key SKA to decrypt the message M, get

technology for the solution of DRM mutual operation. So

DSKA (M), then use public key PKB to carry out encryption,

that, the study of digital products definition and

get EPKB (DSKA (M)), then send it to the recipient B, B take

identification based on the DOI identification system is one

decrypt operations with private SKA, get DSKA (M), then

researching hotspot.

take public key PKA take encrypting operation, restore a

3. Design Idea of Digital Rights Management System

clear text EPKA (DSKA (M)) = M0. During this process, no

A integrate DRM system should have the following functions [15], as is shown in Figure 3-1:

other people except A has decrypting key SKA, so no other people except A can generate cipher-text DSKA (M), thus

(1) Intellectual Property Initialization

message M has been a signature. If A deny sending

How to manage knowledge content, how to enable

messages to B, B can present M and DSKA (M) to public

asset product become the assets and carry out the

notary, to identify with PKA that A does send a message M

transaction secure and easy, it is as the following respects:

   

1052

 

*

competence recognizing:

to

ensure

that

the

The common function achieved by general DRM

intellectual content have gained from the knowledge content

system attribute to the above-mentioned system, but it is not

with legitimate competence.

perfect due to the technical limitations and other conditions. 4.

* competence creation: Allow rights assigned to new

The

security

requirements of

Digital

Rights

Management System

content, for example, to designate rights holder and permit

Authentication: it includes the mutual authentications

utilization license. competence workflow: is the series of

between service-provider and client.

work processes of knowledge content become assets. (2) IP asset management  

Safe transfer of contents: it aims to prevent the theft of

How to manage content and carry out knowledge

attacker. Content authentication: it aims to authenticate digital

transaction,the following includes: * The repository functions: store knowledge and allow

works from tampering through forgery.

the access of database. Changing meta-data include the

Controlled use of the content: that is, users only carry

copartner, the powers of the authors and works description

out authorized action. For example, prevent illegal copying

etc.

and printing etc. * The transaction functions: complete the assets trading

Different security levels: adopt different requirements

process of the intellectual content, pay the cost to

and different levels of security environment.

knowledge-holder. The concrete process is to encrypt the

Privacy: as far as possible to ensure that the privacy of

package, and decrypt after finishing payment, to protect the

information and user purchasing behavior. [16]

intellectual property rights.

5. The Working Principle of Digital Rights Management System

(3) IP assets employment  How to manage the content trading, it includes the

The typical digital rights management system is the

following respects:

combination of the following technologies: encryption,

* License Management: take the environment relevant

public key / private key, digital certificates, digital

to the permission and knowledge content. For example, only

watermarks,

permit users to view, not to print.

communication protocols, secure content storage, right

access

control,

authentication,

secure

specification language etc. [17]

* Tracking management: monitor and control the use of

Employing DRM technology, digital content producers

knowledge content, for example, issue a permitting card for

can control access to digital content by encrypting

ten times to users.

technology. Distributors provide private key to end-users, enable them to look at or listen to digital content, meanwhile, limit copy, printing and re-distribution of an end-users. When a user downloads a set of documents, DRM software checks the user's identity, calculate the cost and assign the private key. Publishers can take various measures to restrict the accessing rights. For example, whether or not allow printing, copying and utilization during the period etc. DRM not only provides users with legitimate accessing rights effectively, but also ensures that everyone can get

Fig. 1 DRM system function

paid from the creation, production and distribution process.

   

1053

 

(5)the users decrypt the media data using decrypting

End-to-end solution will trace the payment process all the time.

key, access and use the media data.

6. The Framework of Digital Rights Management

6.4 The system analysis

System

The core of digital copyright protection is the

6.1 the construction of system

authorizing center, it takes cryptography technology,

The general digital right protection system includes four

through the encryption, authorization and authentication to

major sections: the digital content owner, media authorizing

protect the digital content. The success of copyright

center, the media distribution server and the authorized

protection depends on the key safety, the key was delivered

users.

to authorized users to decrypt the media content. It can be seen from the above, the general digital copyright protection system takes into account the security of storage and transmission for the prevention of network eavesdropping and invaders, but does not take into account a number of adverse authorized users can easily decrypt the digital content, and engages in illegal dissemination. At present, there are different DRM systems for various applications, mainly include: e-book

 

media

Fig.2 the general application framework of digital

[19]

[18]

, streaming

, electronic documents. In the respect of copyright

protection of these systems, they generally use the above

copyright management system

6.2 The working principle of system

framework, includes: Microsoft Windows Media DRM,

On the server side, the digital content was encrypted by

Microsoft DAS, Adobe Content Server, MPEG4, IPMP, etc.,

symmetric key encryption algorithm, then it was set in the

can effectively prevent the destruction from unauthorized

content licenses through XML description, and encrypt

users.

content licenses after get users public key. Finally, transfer

7. The general shortcomings of the copyright protection

the encrypted digital content and content license to the

system

users.

(1) Weak prevention measure of illegal acts

On the client side, after authorized user access to

From above, the general copyright protection system

encrypted digital content and contents licenses encrypted by

framework described the end-to-end secure communications.

their own public key, they decrypt the contents with their

As long as the encryption algorithm accords the strength

own private key to get content key, once they get the

and security requirements, it can achieve the secure content

content key, users factually get the content.  

delivery. It is no doubt that encrypting technology in the

6.3 The process of system operation

framework of the protection plays an important role in

(1)the system establishes media authorizing access,

anti-piracy. For example, the transmission of music and

the purpose is to preserve the decrypting key and identify

video content through internet probably leads to copy and

users and make authorization.

tamper. So these data transmission needs encrypted

(2)the media owners make and encrypt media data.

protection.

(3)the media owners send encrypted data to media

(2) Take public key recognizing system

distribution server. At the same time, send the decrypting

From general framework description of the copyright

key to digital media centers for secure storage.

protection system, we know that the system general take

(4)the users were authorized decrypting key from

public key recognizing model to identify users and control

media center, and gain the requested data from media

rights. Especially, in the stage of right control, it is

distribution server.

important to take public key encrypt and private key decrypt,

   

1054

 

private key sign and public key certificate, so to ensure the

technology for various domains, not deal with and protect

license safe transmission and data integrity .

copyright of e-book, multimedia, electronic documents etc.,

The use of public key recognizing system exist

thus it causes the lack of versatility. 8. Conclusion

shortcomings. First, it is difficult to eliminate the

 At present, there are different DRM systems for various

anonymous purchase behavior. Second, the mechanism only suit to the large users. To many small users, they do not like

applications,

it

includes:

e-book,

streaming

media,

to register for one digital product.

electronic documents etc. But these copyright protection

(3) The digital content lack versatility

systems aim to specific applications, not integrate all the

Currently, there are different DRM systems for various

applying technology to deal with and protect the copyright

applications, main include: e-book, streaming media,

of e-book, multimedia, electronic documents, so it leads to

electronic documents etc. But these copyright protection

the lack of versatility.

systems are only for specific applications, not integrate References [11] Zhang Yan, On digital signature technology [J]. The

[1] YU Yin-Yan, TANG Zhi. A Survey of the Research on

computer age, 1998, (5): 20-22

Digital Rights Management [J]. Chinese journal of

[12] WANG Xiao-bin, HUANG Shao-Kuan. Digital copyright

computer. 2005(12)

management and XrML [J], knowledge of Library and

[2] CASE J, MC. Cloghrie K,Rose Metal. Protocol operations

Information Service, 2003, (4) : 48-51

for Version 2 of the Simple Network Management Protocol

[13] OAS1S.Extensible Aeeess Control Markup Language

(SNMPv2).RFC1905.1996-01 [3] YANG Yi-Xian, a new theory of modern password [M],

(XACML) Version1.0. OASIS Standard,http://www.oasisopen.org/xaeml/, 2002-02-18

Beijing: Science Press, 2002

[14] Hurwitz Group. Enterprise Metadata Management [R].

[4] LI Ke-Hong, Wang Da-Ling etc. Practical Cryptography

Hurwitz Group Balanced View RePort,1998

and security of computer data [M], Shenyang: Northeastern

[15] ZHANG Xue. Digital rights management system and

University Press, 1997

information structure analysis [J]. Information technology,

[5] ERIK ZEGW AART. Privacy Enhanced Mail in More

2002, (6) : 26-27

Detail. Computer Networks and ISDN Systems 25 (Suppl.2)

[16] Sand win, BAI Shuo. A kind of Internet content copyright

1993, SS63-S71

protection and its implementation mechanism model [J].

[6] CHEN Lu-sheng, SHEN Shi-yi. Modern Cryptography [M],

Computer engineering and should be Used, 2002, 38

Beijing: Science Press, 2002

(6):195-198

[7] LICQUIA J. PGP frequently asked questions with answers.

[17] John S , Eriekson. Information objects and rights

Partl-Part3,Internet Draft,June 1995. [8]

CHAN

Xue,

encryption

and

management: a mediation-based approach to DRM

decryption—software

protection technology and complete solutions [M], Beijing:

interoperability[J].D-Lib Magazine,2001,7(4) [18] Association of American Publishers. Digital rights

Publishing House of Electronics Industry, 2001

management for e-books: publisher requirement version1.0

[9] Er, M.C. Decision Support System. A Summary, Problem and

Future

Trends,

Decision

Support

System,

2000,(11).http://www.publisher.Org/home/drm.pdf [19] FAN Zhi-yong. Streaming media streaming media systems

1998,4(3):355-363.

and digital rights management technology [C]. Northeastern

[10] HE Jun-Jie, LI Guang-Xi. MDS encryption algorithm used

University, 2003

to protect the user password [J]. Computer Engineering, 2000, (10): 27-280

   

1055