Introduction to Digital Rights Management (Drm); Identifying, Tracking, Authorizing and Restricting Access to Digital Media by Lawrence Harte
Author:Lawrence Harte [Harte, Lawrence]
Language: eng
Format: azw3
Publisher: UNKNOWN
Published: 2017-03-17T04:00:00+00:00
Figure 1.17, Digital Watermarking Operation
Digital Fingerprint A digital fingerprint is a unique set of characteristics and data that is associated with a particular data file, transmission system or storage medium. Digital fingerprints may be codes that are uniquely embedded in a media file or they may be unique characteristics that can be identified in the storage or transmission medium such as the particular variance of digital bits that are stored on a DVD.
Digital Certificate A digital certificate is information that is encapsulated in a file or media stream that identifies that a specific person or device has originated the media. Certificates are usually created or validated by a trusted third party that guarantees or assures that the information contained within the certificate is valid.
A trusted third party is a person or company that is recognized by two (or more) parties to a transaction (such as an online) as a credible or reliable entity who will ensure a transaction or process is performed as both parties have agreed. Trusted third parties that issue digital certificates are called a certificate authority (CA). The CA typically requires specific types of information to be exchanged with each party to validate their identity before issuing a certificate.
The CA maintains records of the certificates that it has issued in repositories and these records allow the real time validation of certificates. If the certificate information is compromised, the certificate can be revoked.
Figure 1.18 shows how digital certificates can be used to validate the identity of a provider of content. This diagram shows that users of digital certificates have a common trusted bond with a certificate authority (CA). This diagram shows that because the content owner and content user both exchange identification information with the CA, they have an implied trusted relationship with each other. The content user registers with the CA and receives a certificate from the CA. The content owner registers with the CA and receives a key pair and a certificate signed by the CA. When the user requests information from a content owner, the content owner sends their public key that is in the signed certificate. Because the user can validate the signature on the certificate using the CA’s public key, the user can trust the certificate and use the public key provided by the content owner (such as an online store).
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Automotive | Engineering |
Transportation |
Whiskies Galore by Ian Buxton(41499)
Introduction to Aircraft Design (Cambridge Aerospace Series) by John P. Fielding(32868)
Small Unmanned Fixed-wing Aircraft Design by Andrew J. Keane Andras Sobester James P. Scanlan & András Sóbester & James P. Scanlan(32540)
Craft Beer for the Homebrewer by Michael Agnew(17910)
Turbulence by E. J. Noyes(7671)
The Complete Stick Figure Physics Tutorials by Allen Sarah(7107)
Kaplan MCAT General Chemistry Review by Kaplan(6554)
The Thirst by Nesbo Jo(6415)
Bad Blood by John Carreyrou(6251)
Modelling of Convective Heat and Mass Transfer in Rotating Flows by Igor V. Shevchuk(6213)
Learning SQL by Alan Beaulieu(6003)
Weapons of Math Destruction by Cathy O'Neil(5794)
Man-made Catastrophes and Risk Information Concealment by Dmitry Chernov & Didier Sornette(5604)
Digital Minimalism by Cal Newport;(5337)
Life 3.0: Being Human in the Age of Artificial Intelligence by Tegmark Max(5154)
iGen by Jean M. Twenge(5132)
Secrets of Antigravity Propulsion: Tesla, UFOs, and Classified Aerospace Technology by Ph.D. Paul A. Laviolette(4882)
Design of Trajectory Optimization Approach for Space Maneuver Vehicle Skip Entry Problems by Runqi Chai & Al Savvaris & Antonios Tsourdos & Senchun Chai(4819)
Electronic Devices & Circuits by Jacob Millman & Christos C. Halkias(4711)
