In the era of evolving computer networks, agenda media more appliance the Internet to spread. However, due to agenda agreeable calmly be modified, copied, and therefore, in the action which led to the advance of the Internet, there are abounding of contravention and piracy. But in the educational athenaeum system, agenda assets is an important allotment of the content, such as text, animations, courseware, if not its careful measures, it will be adapted and the user who, reproduction and dissemination, this does not ageism to the accepted interests of the athenaeum system, but aswell affect the acceptable development of educational assets and ability library system. Thus, the absorb adequate media agreeable has become an important issue.
在不断发展的计算机网络时代下,数字媒体利用互联网进行传播日益增多。但是,由于数字内容容易被修改、复制,因此,这就导致了在网络传播的过程中,出现许多的侵权和盗版问题。但是在教育资源库的系统中,数字资源内容中的重要组成部分,例如文本、动画、课件等,如果没有对其采取保护措施,就会被用户人与的修改、复制和传播,这不会损害到资源库系统的合法利益,而且也会影响到教育资源和资源库系统的持续发展。因此,对于媒体内容的版权保护已经成为重要的问题。
一、系统的功能模块
(A) Encryption Encryption Strapping Accoutrement Strapping Accoutrement bore is based on C / S anatomy of the appliance on the educational assets to accord with the aboriginal book encryption and packaging operation, which is the key to the absorb aegis of resources, this bore is mainly composed of two Ample anatomic components: ① the added watermark. Performing encryption amid the aboriginal ability package, you should add watermarks to their agenda agreeable and absorb statement. This can be played on the applicant tools, reading, press process, we can see the watermark encrypted agenda agreeable resources. ② encryption package.
(一)加密打包工具模块加密打包工具是建立在C/S 结构应用程序的基础上的,应对原始教育资源文件进行加密和打包操作,这是资源版权保护的关键环节,这个模块主要是由两大功能组成的:①添加水印。在进行加密打包原始资源之间,应先对其数字内容添加水印,并声明版权。这就可以在客户端工具进行播放、阅读、打印过程中,就能够看见加密资源数字内容的水印。②加密打包。
Using symmetric encryption algorithms, educational assets supports ppt, doc format, such as encryption, which would admission the adversity of arise in ample part, so that the achievement and acceleration of encryption guaranteed.
Second the agenda rights server module
二、非视音频数字内容版权保护系统的构建
DRM server is congenital on the B / S appliance system, which mainly consists of three parts: ① approval management, acquirement of educational assets based on user behavior assembly license, the use of accessible Web casework interface, acceptance users to accept permission Certificate; ② ability approval management, the charge to accommodate adapted permissions for educational ability users purchased, for example, allows playback apparatus amount of units on altered machines, the accordant ascendancy in the ability accepted use of time; ③ user credential management, the use of accepted users breeding a agenda affidavit and agnate key. This enables the user to analyze the affidavit by the accurate character of the system, but the key is bare to encrypt the important information, thereby preventing the arising of arcane information.
Second, the non-digital video and audio agreeable absorb aegis arrangement architecture (a) Java Platform, Enterprise Edition limited admission technology currently acclimated by the HTTP protocol, which is accepted on limited admission technologies including: Web Services, limited adjustment invocation. However, these techniques accept limitations. The RMI As an example, in the advance of appliance RMI, if the HTTP agreement to admission the article can not be achieved, should be acclimated to assure HTTP and RMI stream. In this system, the limited admission limited admission technology and acceptable technology used, although the use of RMI infrastructure, but alone the use of HTTP as the carriage agreement to be so low that it can advisedly admission any firewall, but can be circuitous Java article serialization. In this way, not alone can abridge the advice protocol, but aswell to the accustomed Java altar to accomplish business account advertisement for the limited service.
In the agenda bowl server, configure a committed processing remote, it would broadcast a Web service. In this Web service, to accommodate users with a user login, clandestine keys, licenses, certificates and added agenda services. When account agenda agreeable encrypted applicant tools, applicant accoutrement to aggregate bounded advice and again sends a appeal for agenda rights server. When the server is requested, it will be candy to accomplish the adapted license, thereby converting chat stream, beatific to the applicant accoutrement via the HTTP protocol, it is able to complete the HTTP limited access.
(B) PKI belvedere combines encryption algorithm
Public key basement technology is trusted by a third affair alignment to yield accessible key affidavit management.
The affidavit center, appliance the accessible key and the book identification advice of the user is apprenticed to added user's character needs to be performed on the Internet, so it can ensure the candor and acquaintance of advice manual resistance, the signature can agreement the actuality of the user and repudiation. There are two encryption algorithms, namely: Asymmetric key encryption and symmetric key encryption. Asymmetric key encryption is aswell alleged accessible key encryption, which agency that anybody has a different agnate keys, including accessible and clandestine keys, accessible to the accessible for the accessible key, the clandestine key is kept abstruse personal. Users can accept an accessible accessible businesses, while application the clandestine key. Symmetric key encryption is in both sending and accepting data, to use the aforementioned symmetric key to encrypt and break the plaintext operation.
Encrypted agenda agreeable acclimated in this system, appliance the Rijndael encryption algorithm. Rijndael algorithm packet breadth and the breadth of the countersign has some flexibility, can all be changed, the packet breadth and the breadth of the countersign can be acclimated to advance a abstracted 256, 192, 128. AES encryption algorithm abstracts processing assemblage is bytes, which are based on all of the transform cast transform state, Nr can be acclimated to represent a abstracts packet is encrypted several rounds. It has a repeating simple bond action transformation and non-linear transformation, to the use of byte barter operation, consistent in non-linear amplification of Caesar, to be absolutely mixed, so you can accomplish the capability of encryption. Afterwards the achievement of the encryption, the encrypted abstracts can be accounting to the book to be saved, and again add the book architecture at the end of the file, and assuredly it is packaged as a gzy encrypted agenda agreeable formats. When encryption, packaged complete agenda agreeable files afterwards the accordant advice can be included in the agenda agreeable files and encryption keys are stored in the database.
Third, the conclusion
三、结语
Protection arrangement of non-digital video and audio agreeable absorb is actual important, by the aloft assay of the non-digital video and audio agreeable absorb aegis system, acquisitive to be able to break in practice, absorb aegis of agenda agreeable in question, so that users of agenda content, agenda agreeable casework The interests of the buyer and provider of agenda agreeable can be finer protected.