透過您的圖書館登入
IP:3.14.80.45
  • 學位論文

基於行動裝置的階層式企業數位版權管理系統

A Hierarchical Enterprise Digital Rights Management System based on Mobile Devices

指導教授 : 黃國軒
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


近年來在數位版權管理(Digital Rights Management, DRM)的技術已經越趨成熟之際,企業數位版權管理(Enterprise Digital Rights Management, EDRM)的領域也有眾多的廠商紛紛加入開發,但是由於安全需求與硬體的效能考量,這些EDRM系統一開始沒有支援在行動裝置上的使用。如今隨著智慧型手機規格與其作業系統版本推陳出新,處理器核心時脈也越來越快,帶動其應用軟體的發展與進步,而另一方面平板電腦則因為應用技術的突破以及價格相較於過去較為低廉,綜觀這些因素,行動裝置的使用普及率越來越高、技術發展更加成熟,因此本論文提出了一個基於行動裝置的階層式EDRM系統,讓使用者可以隨時隨地透過使用行動裝置來瀏覽及使用企業內部的文件。 在DRM與EDRM系統中主要多以Domain與Smart Card技術為基礎來限制使用者使用數位內容,本論文使用行動裝置結合EDRM系統,除了能夠兼顧Smart Card其可攜的便利性特性之外,並使用行動裝置中唯一的國際行動裝置辨識碼與個人數位憑證一起提交給認證中心做驗證,如此便可達到其安全性的要求。在系統中行動裝置將透過監控軟體來監控並限制企業文件的使用。而階層式架構的運用也為企業階層及各部門間的文件使用達到有效的控管與保護。

並列摘要


In recent years, Digital Rights Management (DRM) technology has become increasingly mature, and there are a large number of manufacturers have joined the development of the Enterprise Digital Rights Management (EDRM). However, these EDRM systems didn’t support the using on mobile devices in considering of security requirements and hardware performance. Now with the innovation of the specifications and operating system versions for the smartphone and the core clock of the processor is growing fast, promoted the development and progress of its application software. According to the above factors, the use of mobile devices is increasing and the development of the technology has more mature; hence, we propose a hierarchical EDRM system based on mobile device that users can browse and use the internal documents of enterprises at anytime and anywhere by using mobile devices. The DRM and EDRM systems utilize the technologies of Domain-based and Smart Card-based to limit users in using digital content. In this thesis, the portability feature of smart card can be kept by combining mobile devices with EDRM systems; besides by sending the unique International Mobile Equipment Identity number (IMEI) and the owner certificate to authorization authority for verifying the identity that can satisfy the required security requirements. The Monitor Software (MS) in the mobile devices is used to monitor and limit the use of enterprise documents. The hierarchical architecture is used to achieve effective file management and protection between the departments in the enterprise.

參考文獻


[23] 龔榮芳,「利用晶片卡保護電子病歷隱私權之研究」,台灣大學資訊工程學系,碩士論文,民國 93 年。
[25] 趙惠美,「個人電子資料保護技術之研究」,中原大學電機工程學系,博士論文,民國 94 年。
[1] C. Conrado, F. Kamperman, G. J. Schrijen and W. Jonker, “Privacy in an Identity-based DRM System,” In Proceedings of the 14th IEEE International Workshop on Database Experts Systems Applications, pp. 389-395, 2003.
[7] E.S. Jeong, C. Sur and K.H. Rhee, “A New DRM System based on Graded Contents Sharing and Time-Block Distribution for Home Networks,” In Proceedings of the 6th IEEE/ACIS International Conference on Computer and Information Science, pp. 830 - 833, July, 2007.
[9] Microsoft available at http://www.microsoft.com/zh/tw

延伸閱讀