簡易檢索 / 詳目顯示

研究生: 劉亭均
Ting-Chun Liu
論文名稱: 二手電子書之擁有權轉移機制
Ownership Transfer Mechanism for Second-hand eBooks
指導教授: 吳宗成
Tzong-Chen Wu
口試委員: 楊維寧
Wei-Ning Yang
查士朝
Shi-Cho Cha
學位類別: 碩士
Master
系所名稱: 管理學院 - 資訊管理系
Department of Information Management
論文出版年: 2011
畢業學年度: 99
語文別: 中文
論文頁數: 64
中文關鍵詞: 電子書數位版權管理完整性機密性對稱式密碼系統非對稱式密碼系統數位簽章
外文關鍵詞: eBooks, Digital Rights Management, Integrity, Confidentiality, Symmetric Encryption, Asymmetric Encryption, Digital Signature
相關次數: 點閱:308下載:2
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 隨著電腦科技與網際網路快速的發展,使用者的閱讀習慣也逐漸從傳統紙本的模式,轉變成利用行動裝置進行閱讀電子書的模式。電子書將是未來人們閱讀型態的新趨勢,而如何保謢電子書之合法版權避免被非法使用,將是電子書要面對的問題之一。由於目前的數位版權管理機制過度的保護,限制使用者的行為,很難從商業模型的觀點實現。故本研究中基於二手電子書的概念設計新的系統模型,主要著重在兩個關鍵議題:如何安全地傳輸數位內容,以及如何讓使用者合法使用二手數位內容。本研究所提出的方法搭配對稱式密碼系統、非對稱式密碼系統以達到數位內容安全地傳遞與溝通雙方傳遞資料的完整性與機密性,並且運用數位簽章方式達到傳遞過程的不可否認性。


    With the development of network technology and the rise of Internet, the reading habit of people is gradually changed from reading traditional paper-made books to electronic books on mobile devices. Therefore, it is an inevitable trend that eBooks will be the future mainstream of reading. Furthermore, it is important to protect the legal rights of each eBook. Most of the previously proposed digital rights management mechanisms only focused on the protection technology for digital contents. Unfortunately, such mechanisms usually restrict user behaviors and hard to be realized from a business model point of view. In this thesis a new system model, based on the concepts of second-hand eBook transaction is proposed to support second-hand eBook distribution and corresponding business model. The proposed system focuses on two major issues: how to transfer digital content safely and how to allow users to legally access second-hand digital content. Our system achieves integrity and confidentiality for the electronic data transmitting through Internet. In addition, non-repudiation property is also considered and embedded in system design. The system adopts symmetric cryptosystem, asymmetric cryptosystem and digital signature to build a secure transmission environment.

    中文摘要 I ABSTRACT II 誌謝 III 目錄 V 圖目錄 VII 表目錄 IX 第一章 緒論 1 1.1 研究背景與動機 1 1.2 研究目的 3 1.3 論文架構 6 第二章 文獻探討 7 2.1 數位版權管理機制探討 7 2.2 現行數位版權管理系統 15 2.3 密碼學相關理論與技術 21 2.3.1 對稱式密碼系統 21 2.3.2 非對稱式密碼系統 22 2.3.3 單向雜湊函數 24 2.3.4 數位簽章 25 第三章 本研究所提出的方法 27 3.1 系統模式介紹 27 3.2 符號定義 28 3.3 系統角色定義與系統架構圖 30 3.4 擁有權轉移機制 35 3.4.1 原始版電子書擁有權獲得階段 37 3.4.2 電子書閱讀階段 39 3.4.3 二手電子書之擁有權轉移階段 41 第四章 安全與功能分析 46 4.1 安全分析 46 4.2 功能分析 50 第五章 結論 54 參考文獻 56 附錄A 重要名詞中英文對照表 62

    [1] Adobe, http://www.Adobe.com (2010)
    [2] S. Bhatt, R. Sion, and B. Carbunar, “A Personal Mobile DRM Manager for Smartphones,” Computers & Security, Vol. 28, No. 6, pp. 327-340 (2009)
    [3] Circumventing Kindle For PC DRM, http://i-u2665-cabbages. blogspot.com/2009/12/circumventing-kindle-for-pc-drm.html, (2010)
    [4] K. Coyle, “Rights Expression Languages,” Technical report, A Report for the Library of Congress, http://www.loc.gov/ standards/Coylereport_final1single.pdf (2004)
    [5] C.C. Chang, J.S. Lee and J.Y. Kuo, “Time-Bound Based Authentication Scheme for Multi-Server Architecture,” International Journal of Innovative Computing, Information and Control, Vol. 4, pp. 2987-2996 (2008)
    [6] J. Daemen, V. Rijmen, “The Design of Rijndael: AES - The Advanced Encryption Standard,” Springer, Heidelberg (2002)
    [7] W. Diffie and M.E. Hellman, “New Directions in Cryptography,” IEEE Transactions on Information Theory, Vol. IT-22, No. 6, pp. 644-654 (1976)
    [8] D. E. Dilger, “How FairPlay Works: Apple’s iTunes DRM Dilemma,” Roughly Drafted Magazine, http://www. roughlydrafted.com/RD/RDM.Tech.Q1.07/2A351C60-A4E5-4764-A083-FF8610E66A46.html (2010)
    [9] M. Elgan, “Opinion: Why Amazon's Kindle is revolutionary,” http://www.macworld.com/news/2007/11/26/kindle/index.php (2010)
    [10] T. ElGamal, “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” IEEE Transactions on Information Theory, Vol. 31, No. 4, pp. 469-472 (1985)
    [11] J. Erickson, R. Iannella, and R. Wenning, “Workshop Report,” in Proceedings of the W3C Workshop on Digital Rights Management, Sophia-Antipolis, France (2001)
    [12] G. Fleishman, “Kindle Not Ready to Catch Fire,” The Seattle Times Company, http://seattletimes.nwsource.com/html/ businesstechnology/2004045881_ptkindle01.html (2010)
    [13] H. Galen and B. Doug, “Detours: Binary Interception of Win32 Functions,” in Proceedings of the 3rd USENIX Windows NT Symposium, USENIX Association Berkeley, Vol. 3, pp. 135-144 (1999)
    [14] S.O. Hwang, “How Viable Is Digital Rights Management,” Computer, Vol. 42, No. 4, pp. 28-34 (2009)
    [15] R. Hwang, S. Shiau, and D. Jan, “A New Mobile Payment Scheme for Roaming Services,” Journal of Electronic Commerce Research and Applications, Vol. 6, No. 2, pp. 184-191 (2007)
    [16] R. Iannella, “Digital Rights Management (DRM) Architectures,” D-Lib Magazine, pp. 207-216 (2001)
    [17] iTunes, http://www.apple.com/itunes/ (2010)
    [18] P.A. Jamkhedkar, G.L. Heileman, “Digital Rights Management Architectures,” Computers and Electrical Engineering, Vol. 35, pp. 376-394 (2009)
    [19] P.A. Jamkhedkar, G.L. Heileman, and I. Martinez-Ortiz. “Middleware Services for DRM,” in Proceedings of the 2nd International Conference on Communication Systems Software and Middleware, Bangalore, India, pp. 1-8 (2007)
    [20] M.A. Kaplan, “IBM Cryptolopes, Superdistribution and Digital Rights Management,” IBM Research, http://dimacs.rutgers.edu/ Workshops/Management/Kaplan.html (2010)
    [21] D. Kirovski and K. Jain, “Off-line Economies for Digital Media,” in Proceedings of the 16th international workshop on network and operating systems support for digital audio and video, Rhode Island, USA, pp. 118-123 (2006)
    [22] H. Kim, Y. Lee and Y. Park, “A Robust and Flexible Digital Rights Management System for Home Networks,” Journal of System and Software, Vol. 83, No. 12, pp. 2431-2440 (2010)
    [23] KKBOX, http://tw.kkbox.com/index.html (2011)
    [24] Q. Liu, R. Safavi-Naini, and N.P. Sheppard, “Digital Rights Management for Content Distribution,” in Proceedings of the 4th workshop on Australasian information security, Adelaide, Australia, Vol. 21, pp. 49-58 (2003)
    [25] S. Lin, and D. Liu, “An Incentive-based Electronic Payment Scheme for Digital Content Transactions over the Internet,” Journal of Network and Computer Applications, Vol. 32, No. 3, pp. 589-598 (2009)
    [26] mirasol Display Technology (IMOD) by Qualcomm, http:// www.mirasoldisplays.com/ (2010)
    [27] National Institute of Standards and Technology, “Data Encryption Standard,” Federal Information Processing Standards Publications 46-3 (1999)
    [28] National Institute of Standards and Technology, “Secure Hash Standard,” Federal Information Processing Standards Publications 180 (1993)
    [29] OMA DRM, http://www.openmobilealliance.org/ (2011)
    [30] B. Rosenblatt, B. Trippe, and S. Mooney, “Digital Rights Management: Business and Technology,” John Wiley & Sons (2001)
    [31] R.L. Rivest , A. Shamir , L. Adleman, “A Method for Obtaining Digital Signatures and Public-key Cryptosystems,” Communications of the ACM, Vol. 21, No. 2, pp. 120-126 (1978)
    [32] R.L. Rivest, “The MD5 Message-Digest Algorithm,” Internet Network Working Group RFC 1321 (1992)
    [33] R.L. Rivest, and A. Shamir, “PayWord and MicroMint: Two Simple Micropayment Schemes,” Lecture Notes In Computer Science, Vol. 1189, pp. 69-87 (1997)
    [34] H.M. Sun, C.F. Hung and C.M. Chen, “An Improved Digital Rights Management System Based on Smart Cards,” in Proceedings of The 1st IEEE/IES Conference on Digital Ecosystems and Technologies, Cairns, Australia, pp. 308-313 (2007)
    [35] L.F.G. Sarmenta, M. van Dijk, J. Rhodes, and S. Devadas, “Offline Count-limited Certificates,” in Proceedings of the 23rd ACM Symposium on Applied Computing, Fortaleza, Cear, Brazil, pp. 2145–2152 (2008)
    [36] C.P. Schnorr, “Efficient Identification and Signatures for Smart Cards,” in Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology, London, UK, pp. 239-252 (1989)
    [37] Windows Media Rights Manager, http://www.microsoft.com/ windows/windowsmedia/ drm/features.aspx (2010)
    [38] C.T. Yen, H.T. Liaw, N.W. Lo, T.C. Liu, and J. Stu, “Transparent Digital Rights Management System with Superdistribution,” in Proceedings of the 1st International Conference on Broadband, Wireless Computing, Communication and Applications, Fukuoka Prefecture, Japan, pp. 435-440 (2010)
    [39] Google逾百萬冊公共電子書將支援ePub 恐衝擊Kindle,http://www.funddj.com/KMDJ/News/NewsViewer.aspx?a=b4d03eea-55d7-47f1-9df2-123c36779aaa (2010)
    [40] 方正科技,http://www.foundertech.com (2010)
    [41] 中華電信Hami書城,http://www.hami.emome.net/ (2011)
    [42] 台視,工研院:電子書將走ePub格式,小筆電、手機各擁一片天, http://www.ttv.com.tw/news/view/?i=122009152312
    644006Q9ML04OGOD60A4IYY9E1ZB912FH706&r=sea&ext=a69f357122a0f802d079c9bf1cb4c38f (2010)
    [43] 台灣數位出版聯盟協會,電子書未來將打敗實體書市佔率, http://netreading.wordpress.com (2011)
    [44] 林金龍,“Wrapper-based 數位版權管理機制”,世新大學資訊管理學系碩士論文 (2006)
    [45] 電子書在被借閱26次後會自動銷毀,http://libraryviews. blogsome.com/2011/02/27/1032/ (2011)
    [46] 電子書大商機,http://www.businessweekly.com.tw/webartic le.php?id=37607 (2010)
    [47] 新華網江蘇頻道,揚州上了世界“第一課”電子書首次走進校園,http://www.js.xinhuanet.com/xin_wen_zhong_xin/2010-
    04/18/content_19550257.htm (2010)
    [48] 遠傳 e 書城,http://www.ebooktown.com.tw/portal/main/defau lt.jsp (2011)
    [49] 鄭建宏,無線數位內容產業的新契機,http://web.iii.org.tw/ itpd/new/itis/epaper/9409/9409_01.htm (2011)
    [50] 劉季昀、謝凱丞、施政延、吳曉光、蔡孟峰,電子書技術與產業發展現況,http://www.ncp.org.tw/vanilla/vj-attachment/ 2011/02/attach103.pdf (2011)
    [51] 劉淑君,數位出版品版權發行管理機制,世新大學資訊管理學系碩士論文 (2006)
    [52] 顏志達,以Wrapper-based為基礎建構數位版權管理系統之研究,世新大學資訊管理學系碩士論文 (2008)

    QR CODE