A Device Management and Credit Evaluation System in Home Network Domain
2013-06-03 16:05:42 来源: 评论:0 点击:
Abstract—Many DRM systems were created to protect content rights, but controversy never ends on the necessity. Doubters believe that the loss of user experience will be greater than profit gained. The key point to be solved, is not proposing a method, but proving the expected revenue is satisfactory. In this paper, a centralized home network content protection system firstly proposed. The management part and evaluation part is built on a special designed intelligent home gateway. It supports multiple domains and functions, and has flexible features. Then, profits of operator and user are both taken into consideration. Proposed content protection scheme is proved practical by game theory. Compared with previous systems, the system has many advantages.
Index Terms—Digital Rights Management (DRM), multi-media gateway, credit value, game theory
Cite: Xie Lanchi, Tian Chen, and Wang Xingjun, "A Device Management and Credit Evaluation System in Home Network Domain," Lecture Notes on Information Theory, Vol.1, No.3, pp. 104-108, Sept. 2013. doi: 10.12720/lnit.1.3.104-108
Index Terms—Digital Rights Management (DRM), multi-media gateway, credit value, game theory
Cite: Xie Lanchi, Tian Chen, and Wang Xingjun, "A Device Management and Credit Evaluation System in Home Network Domain," Lecture Notes on Information Theory, Vol.1, No.3, pp. 104-108, Sept. 2013. doi: 10.12720/lnit.1.3.104-108
Array
相关热词搜索:
上一篇:A Hybrid Mutation-based Artificial Bee Colony for Traveling Salesman Problem
下一篇:A Proactive Complex Event Processing Method for Intelligent Transportation Systems
分享到:
收藏
评论排行
频道总排行
频道本月排行
- 366Efficient Voice Integrated Browser Using Naïve Approach
- 2A Proactive Complex Event Proc...
- 14 Bit Comparator Design Based on Reversible Logic Gates
- 1Design Consideration for Config...
- 1A Comparative Analysis for WLM...
- 1A Hybrid Mutation-based Artific...
- 1A Device Management and Credit...
- 1Design and Development of a H...
- 1Information Security Requirement...
- 1A Model-checking Algorithm for...