1. Digital Rights Management
DRM refers to a system solution that includes information security technology, which protects the copyright of digital media creators and owners while ensuring the normal use of digital media content (such as digital images, audio, video, etc.). ) is used by legally authorized users, obtains legal benefits according to copyright information, and can identify the copyright ownership of digital information and the authenticity of copyright information when copyright is infringed.
There are many DRM systems on the market at present. According to the protected objects, it can be divided into DRM systems for software and DRM systems for general digital content such as e-books and streaming media. According to the existence of special hardware, it can be divided into hardware-based DRM system and pure software DRM system; According to the security technology adopted, it can be divided into DRM system based on password technology, DRM system based on digital watermarking technology and DRM system combining the two.
2. Digital rights management technology
(1) cryptography.
Cryptography technology aims to realize access control of digital content. The specific method is to encrypt the digital content that needs copyright protection with a certain intensity algorithm, so that users with keys or permissions can use it.
Cryptography technology is mainly used in the application of digital content security and authentication, mainly used in digital content security service, identity authentication, undeniable authentication, data integrity authentication and so on.
1) encryption technology: encryption technology is used to keep digital content secret.
2) Digital Digest Technology: Content providers use some algorithms (such as one-way hash function) to generate a digital digest of the content to be protected and store it safely. When users obtain content, they first use the same algorithm to generate a summary, and then compare it with the original summary to verify whether the digital content is complete and accurate.
If the summaries of the two figures are the same, the proof content is complete and accurate; If it is not the same, it proves that the contents have been tampered with.
Digital summarization technology is used to verify the accuracy and integrity of digital content and whether the purchased content is complete and accurate.
3) Digital signature technology: Digital signature technology mainly adopts public key cryptosystem, where the signer signs the information with his own private key and the verifier verifies it with the signer's public key.
Using digital signature technology can protect the signer's copyright on digital content, ensure that the signer can't deny the signed information, and ensure that the verifier can't forge others' signatures.
(2) Digital watermarking.
Based on the copyright protection of cryptographic technology, authority, signature and protected digital content are usually separated from each other, which can not resist the destruction of digital content copyright by bad users. It is often necessary to add security modules, such as smart cards and DRM agents, to the user's cost, so that its actual security depends on the security of the terminal. In the copyright protection based on digital watermarking technology, copyright information, authority, signature, etc. are all embedded into digital content as watermarks and integrated with the content. If you want to destroy their connection, you must destroy the usability of the content, thus effectively preventing bad users from damaging copyright.
3. The application of digital rights management technology in the library
(1) access control.
Intellectual property rights of resources are the main reason for access control of content and services in digital libraries. Access control service provides a unified management mechanism for multiple systems. Access control mainly includes authorization, authentication and the realization of access rights. The main authentication means include password /ID, restricted IP and CA (Certificate Authority). When the subjects visit the subjects, they must consider: the visit is limited, and it is not appropriate to keep the subjects' right to visit the subjects permanently under any circumstances; Follow the principle of minimum authorization, and no additional access is allowed; You should check the access method, that is, not only whether it is accessible, but also what kind of access is allowed.
(2) Copyright management and billing.
The first generation of digital rights management (DRM) mainly solves the problem of unauthorized and illegal copying by means of security and encryption, that is, locking the content and limiting its distribution right to paying users. The second generation DRM has penetrated into the whole process of digital copyright description, identification, transaction, protection, monitoring and tracking. In the three important modules of intellectual property management: the creation, management and use of property rights, DRM defines the roles and behavioral norms of cooperation and interactive operation modules. Ideally, these modules will be component-based.
refer to
Lv Shuping.2013. Practice and case of copyright management of digital resources in libraries [M]. Beijing: Beijing Library Press.
Ma haiqun 20 1 1. Copyright system of digital library [M]. Beijing: Intellectual Property Press.
Qin Ke, Dou Min, Li Shujuan. 20 1 1. Research on Library Copyright Management [M]. Beijing: Intellectual Property Press.
Ren Ningning.2013. Research on the Balance Mechanism of Copyright Interests in Digital Library [M]. Beijing: Economic Management Press.
Wang Yulin, Feng Jing. 20 1 1。 Copyright management and control of digital media [M]. Beijing: Science Press.
Zhang Ru, Yu Yang, Zhang Xiao. 2008. Digital Rights Management. Beijing: Beijing University of Posts and Telecommunications Press.
Fanke Peak, Zhang Zhiyong. 20 13。 Digital rights management and security technology [M]. Beijing: National Defense Industry Press.