Introduction to Digital Rights Management (Drm); Identifying, Tracking, Authorizing and Restricting Access to Digital Media by Lawrence Harte

Introduction to Digital Rights Management (Drm); Identifying, Tracking, Authorizing and Restricting Access to Digital Media by Lawrence Harte

Author:Lawrence Harte [Harte, Lawrence]
Language: eng
Format: azw3
Publisher: UNKNOWN
Published: 2017-03-17T04:00:00+00:00


Figure 1.17, Digital Watermarking Operation

Digital Fingerprint A digital fingerprint is a unique set of characteristics and data that is associated with a particular data file, transmission system or storage medium. Digital fingerprints may be codes that are uniquely embedded in a media file or they may be unique characteristics that can be identified in the storage or transmission medium such as the particular variance of digital bits that are stored on a DVD.

Digital Certificate A digital certificate is information that is encapsulated in a file or media stream that identifies that a specific person or device has originated the media. Certificates are usually created or validated by a trusted third party that guarantees or assures that the information contained within the certificate is valid.

A trusted third party is a person or company that is recognized by two (or more) parties to a transaction (such as an online) as a credible or reliable entity who will ensure a transaction or process is performed as both parties have agreed. Trusted third parties that issue digital certificates are called a certificate authority (CA). The CA typically requires specific types of information to be exchanged with each party to validate their identity before issuing a certificate.

The CA maintains records of the certificates that it has issued in repositories and these records allow the real time validation of certificates. If the certificate information is compromised, the certificate can be revoked.

Figure 1.18 shows how digital certificates can be used to validate the identity of a provider of content. This diagram shows that users of digital certificates have a common trusted bond with a certificate authority (CA). This diagram shows that because the content owner and content user both exchange identification information with the CA, they have an implied trusted relationship with each other. The content user registers with the CA and receives a certificate from the CA. The content owner registers with the CA and receives a key pair and a certificate signed by the CA. When the user requests information from a content owner, the content owner sends their public key that is in the signed certificate. Because the user can validate the signature on the certificate using the CA’s public key, the user can trust the certificate and use the public key provided by the content owner (such as an online store).



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.