In the era of evolving computer networks, agenda media more appliance the Internet to spread. However, due to agenda agreeable calmly be modified, copied, and therefore, in the action which led to the advance of the Internet, there are abounding of contravention and piracy. But in the educational athenaeum system, agenda assets is an important allotment of the content, such as text, animations, courseware, if not its careful measures, it will be adapted and the user who, reproduction and dissemination, this does not ageism to the accepted interests of the athenaeum system, but aswell affect the acceptable development of educational assets and ability library system. Thus, the absorb adequate media agreeable has become an important issue.
在不斷發展的計算機網絡時代下,數字媒體利用互聯網進行傳播日益增多。但是,由于數字內容容易被修改、復制,因此,這就導致了在網絡傳播的過程中,出現許多的侵權和盜版問題。但是在教育資源庫的系統中,數字資源內容中的重要組成部分,例如文本、動畫、課件等,如果沒有對其采取保護措施,就會被用戶人與的修改、復制和傳播,這不會損害到資源庫系統的合法利益,而且也會影響到教育資源和資源庫系統的持續發展。因此,對于媒體內容的版權保護已經成為重要的問題。
一、系統的功能模塊
(A) Encryption Encryption Strapping Accoutrement Strapping Accoutrement bore is based on C / S anatomy of the appliance on the educational assets to accord with the aboriginal book encryption and packaging operation, which is the key to the absorb aegis of resources, this bore is mainly composed of two Ample anatomic components: ① the added watermark. Performing encryption amid the aboriginal ability package, you should add watermarks to their agenda agreeable and absorb statement. This can be played on the applicant tools, reading, press process, we can see the watermark encrypted agenda agreeable resources. ② encryption package.
(一)加密打包工具模塊加密打包工具是建立在C/S 結構應用程序的基礎上的,應對原始教育資源文件進行加密和打包操作,這是資源版權保護的關鍵環節,這個模塊主要是由兩大功能組成的:①添加水印。在進行加密打包原始資源之間,應先對其數字內容添加水印,并聲明版權。這就可以在客戶端工具進行播放、閱讀、打印過程中,就能夠看見加密資源數字內容的水印。②加密打包。
Using symmetric encryption algorithms, educational assets supports ppt, doc format, such as encryption, which would admission the adversity of arise in ample part, so that the achievement and acceleration of encryption guaranteed.
Second the agenda rights server module
二、非視音頻數字內容版權保護系統的構建
DRM server is congenital on the B / S appliance system, which mainly consists of three parts: ① approval management, acquirement of educational assets based on user behavior assembly license, the use of accessible Web casework interface, acceptance users to accept permission Certificate; ② ability approval management, the charge to accommodate adapted permissions for educational ability users purchased, for example, allows playback apparatus amount of units on altered machines, the accordant ascendancy in the ability accepted use of time; ③ user credential management, the use of accepted users breeding a agenda affidavit and agnate key. This enables the user to analyze the affidavit by the accurate character of the system, but the key is bare to encrypt the important information, thereby preventing the arising of arcane information.
Second, the non-digital video and audio agreeable absorb aegis arrangement architecture (a) Java Platform, Enterprise Edition limited admission technology currently acclimated by the HTTP protocol, which is accepted on limited admission technologies including: Web Services, limited adjustment invocation. However, these techniques accept limitations. The RMI As an example, in the advance of appliance RMI, if the HTTP agreement to admission the article can not be achieved, should be acclimated to assure HTTP and RMI stream. In this system, the limited admission limited admission technology and acceptable technology used, although the use of RMI infrastructure, but alone the use of HTTP as the carriage agreement to be so low that it can advisedly admission any firewall, but can be circuitous Java article serialization. In this way, not alone can abridge the advice protocol, but aswell to the accustomed Java altar to accomplish business account advertisement for the limited service.
In the agenda bowl server, configure a committed processing remote, it would broadcast a Web service. In this Web service, to accommodate users with a user login, clandestine keys, licenses, certificates and added agenda services. When account agenda agreeable encrypted applicant tools, applicant accoutrement to aggregate bounded advice and again sends a appeal for agenda rights server. When the server is requested, it will be candy to accomplish the adapted license, thereby converting chat stream, beatific to the applicant accoutrement via the HTTP protocol, it is able to complete the HTTP limited access.
(B) PKI belvedere combines encryption algorithm
Public key basement technology is trusted by a third affair alignment to yield accessible key affidavit management.
The affidavit center, appliance the accessible key and the book identification advice of the user is apprenticed to added user's character needs to be performed on the Internet, so it can ensure the candor and acquaintance of advice manual resistance, the signature can agreement the actuality of the user and repudiation. There are two encryption algorithms, namely: Asymmetric key encryption and symmetric key encryption. Asymmetric key encryption is aswell alleged accessible key encryption, which agency that anybody has a different agnate keys, including accessible and clandestine keys, accessible to the accessible for the accessible key, the clandestine key is kept abstruse personal. Users can accept an accessible accessible businesses, while application the clandestine key. Symmetric key encryption is in both sending and accepting data, to use the aforementioned symmetric key to encrypt and break the plaintext operation.
Encrypted agenda agreeable acclimated in this system, appliance the Rijndael encryption algorithm. Rijndael algorithm packet breadth and the breadth of the countersign has some flexibility, can all be changed, the packet breadth and the breadth of the countersign can be acclimated to advance a abstracted 256, 192, 128. AES encryption algorithm abstracts processing assemblage is bytes, which are based on all of the transform cast transform state, Nr can be acclimated to represent a abstracts packet is encrypted several rounds. It has a repeating simple bond action transformation and non-linear transformation, to the use of byte barter operation, consistent in non-linear amplification of Caesar, to be absolutely mixed, so you can accomplish the capability of encryption. Afterwards the achievement of the encryption, the encrypted abstracts can be accounting to the book to be saved, and again add the book architecture at the end of the file, and assuredly it is packaged as a gzy encrypted agenda agreeable formats. When encryption, packaged complete agenda agreeable files afterwards the accordant advice can be included in the agenda agreeable files and encryption keys are stored in the database.
Third, the conclusion
三、結語
Protection arrangement of non-digital video and audio agreeable absorb is actual important, by the aloft assay of the non-digital video and audio agreeable absorb aegis system, acquisitive to be able to break in practice, absorb aegis of agenda agreeable in question, so that users of agenda content, agenda agreeable casework The interests of the buyer and provider of agenda agreeable can be finer protected.