View
213
Download
0
Tags:
Embed Size (px)
Citation preview
11
Digital Rights Management using RFID Digital Rights Management using RFID in an E-Commerce Environmentin an E-Commerce Environment
World Applied Sciences JournalWorld Applied Sciences Journal,5 (3), pp. 324-331, 2008,5 (3), pp. 324-331, 2008
Asso HamzeheiAsso HamzeheiDepartment of E-Commerce, Faculty of Industrial Engineering,Department of E-Commerce, Faculty of Industrial Engineering,Iran University of Science and Technology (IUST), Tehran, IranIran University of Science and Technology (IUST), Tehran, Iran
Presented byPresented by Chang Shun-ShyanChang Shun-Shyan
2010.08.26
22
OutlinesOutlines
IntroductionIntroductionWhat is IOTPWhat is IOTPWhat is DRMWhat is DRMUsing RFID for DRMUsing RFID for DRMProposed SchemeProposed SchemeConclusionConclusion
33
IntroductionIntroduction
Most newly content is available in digitalMost newly content is available in digitalDigital contents are easy to copyDigital contents are easy to copyDRM prevents unauthorized use of digital DRM prevents unauthorized use of digital filesfilesMany researches talk about DRM with RFIDMany researches talk about DRM with RFIDWe proposed a DRM scheme in the IOTP We proposed a DRM scheme in the IOTP serviceservice
44
Introduction cont.Introduction cont.
We describe the IOTP and the role of RFID We describe the IOTP and the role of RFID in proposed frameworkin proposed frameworkIn the last we introduced a framework that In the last we introduced a framework that consists ofconsists of1.1. Buying digital content phaseBuying digital content phase2.2. Using digital content phaseUsing digital content phase3.3. Transfer digital right phaseTransfer digital right phase
55
IOTPIOTP
Internet Open Trading ProtocolInternet Open Trading ProtocolAn framework for Internet commerceAn framework for Internet commerceRFC2801RFC2801April 2000April 2000
66
IOTP cont.IOTP cont.
Provides Provides BuyingBuying SellingSelling ValueValue ExchangeExchange
Five rolesFive roles ConsumerConsumer MerchantMerchant Payment handlerPayment handler Delivery handlerDelivery handler Customer care providerCustomer care provider
77
IOTP cont.IOTP cont.
Baseline transactionsBaseline transactions brand-independent paymentbrand-independent payment
(consumer choose MasterCard or VISA etc)(consumer choose MasterCard or VISA etc) brand-dependent paymentbrand-dependent payment
Supports both B2B and B2C modelsSupports both B2B and B2C models
88
IOTP cont.IOTP cont.
Offer Trading ExchangeOffer Trading ExchangePayment Trading ExchangePayment Trading ExchangeDelivery Trading ExchangeDelivery Trading ExchangeAuthentication Trading ExchangeAuthentication Trading Exchange
1010
DRMDRM
A technical measure used to protect A technical measure used to protect copyrighted contents from any copyright copyrighted contents from any copyright violation of intellectual propertyviolation of intellectual property Be named “Digital Rights Management”Be named “Digital Rights Management”
1111
Using RFID for DRMUsing RFID for DRM
Method based on digital mediumsMethod based on digital mediumsMethod based on digital contentsMethod based on digital contents
1414
Proposed SchemeProposed Scheme
Buying digital content phaseBuying digital content phaseUsing digital content phaseUsing digital content phaseTransferring digital rights phaseTransferring digital rights phase
1818
ConclusionConclusion
We developed a new framework for digital We developed a new framework for digital rights management in the context of the rights management in the context of the Internet Open Trading Protocol (IOTP) for Internet Open Trading Protocol (IOTP) for electronic commerce applications and electronic commerce applications and services.services.In this framework we used fingerprinting In this framework we used fingerprinting as a tool for content based identification as a tool for content based identification the digital content based on its the digital content based on its representation such as feature or signals representation such as feature or signals and matches the result to an entry in a and matches the result to an entry in a database.database.We also used RFID as a tool for storing We also used RFID as a tool for storing required data during implementation of required data during implementation of the DRM system.the DRM system.