Nothing Special   »   [go: up one dir, main page]

Skip to main content

The Illegal Copy Protection Using Hidden Agent

  • Conference paper
  • First Online:
EurAsia-ICT 2002: Information and Communication Technology (EurAsia-ICT 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2510))

Included in the following conference series:

  • 306 Accesses

Abstract

There have been researches into digital Watermarking technology or Fingerprinting vigorously to safeguard Protective rights for knowledge and poverty for digital contents. DRM(Digital Rights Management) is not only Protective rights for knowledge and poverty, but also management and systems that are necessary to put out, circulate and use for contents. This technology, DRM, encrypts contents to protect digital contents and they are sold users on. Sellers transmit contents with ’Usage Right’ and a license including a key of encryption. The key of encryption decodes encoded files. The right of usage restricts users’ application of contents. Even if digital contents that are applied the DRM are coped illegally and circulated, contents will be protected from that because a player of DRM checks existence of licenses and allows contents to be restored. However, this method might cause users to feel inconvenient since the users can only restore contents through the licenses offered by a player or a Smartcard. If radio as well as cable is used popularly in the future, there will be a lot of limits to use those kinds of players. In the method of that, the method using players need different players in order to work successfully in wired and wireless environment. In the case of using Smartcards, there might be a dangerous situation when the Smartcards disappeared. This paper proposes two kinds of ideas. One is protecting contents from illegal acts such as illegal copies when the contents are in the process of circulation. The other is the protocol that can give users convenience. Hidden Agents are used so that contents are protected from illegal copies and illegal use in the contents and cuts off those illegal acts. The Agent will be installed without any special setup. In addition, it can replace roles of Watermarking as a protection. Therefore, this paper shows the solution of illegal copies that happens frequently.

This work is supported in part by the Ministry of Information & Communication of Korea (“Support Project of University Information Technology Research Center” supervised by KIPA)

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Wagner N. R, 1983. “Fingerprinting”, IEEE Symposium on Security and Privacy

    Google Scholar 

  2. Lee K. H. 2001 “A Contents Protection Technology based on Mobile Agent,” Korea Multimedia Society review. pp 164–171

    Google Scholar 

  3. Vigna A., 1998, “Cryptographic traces for Mobile Agents,” In: G. Vigna (Ed.), Mobile Agents and Security, Springer-Verlag, Lecture Note in Computer Science 1419, pp 99–113

    Google Scholar 

  4. Hohl F., 1998, “Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts”, In: G. Vigna (Ed.), Mobile Agents and Security, Springer-Verlag, Lecture Note in Computer Science 1419, pp 137–153

    Google Scholar 

  5. Sander T. & Tschudin, 1997, “Toward Mobile Cryptography”, International Computer Security Institute (ICSI), TR-97-049

    Google Scholar 

  6. http://www.intertrust.com

  7. http://www.uspto.gov

  8. http://www.markany.com

  9. http://www.dreamintech.co.kr

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, DG., Lee, IY., Ahn, JK., Kong, YH. (2002). The Illegal Copy Protection Using Hidden Agent. In: Shafazand, H., Tjoa, A.M. (eds) EurAsia-ICT 2002: Information and Communication Technology. EurAsia-ICT 2002. Lecture Notes in Computer Science, vol 2510. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36087-5_96

Download citation

  • DOI: https://doi.org/10.1007/3-540-36087-5_96

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00028-0

  • Online ISBN: 978-3-540-36087-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics