Research and Development of Digital Contents Sharing System that can Share like Library
Project/Area Number |
17500081
|
Research Category |
Grant-in-Aid for Scientific Research (C)
|
Allocation Type | Single-year Grants |
Section | 一般 |
Research Field |
Media informatics/Database
|
Research Institution | Kanagawa Institute of Technology |
Principal Investigator |
HAYAMI Haruo Kanagawa Institute of Technology, Faculty of information technology, Professor (90308536)
|
Co-Investigator(Kenkyū-buntansha) |
IOROI Shigenori Kanagawa Institute of Technology, Faculty of information technology, Associate Professor (20318992)
FURUI Younosuke Kyushu Sangyo University, Faculty of Information Science, Lecturer (70387083)
|
Project Period (FY) |
2005 – 2007
|
Project Status |
Completed (Fiscal Year 2007)
|
Budget Amount *help |
¥3,550,000 (Direct Cost: ¥3,100,000、Indirect Cost: ¥450,000)
Fiscal Year 2007: ¥1,950,000 (Direct Cost: ¥1,500,000、Indirect Cost: ¥450,000)
Fiscal Year 2006: ¥900,000 (Direct Cost: ¥900,000)
Fiscal Year 2005: ¥700,000 (Direct Cost: ¥700,000)
|
Keywords | Digital Contents / Copyright Protection / Sharering System like Library / Copy Protect / Service Time Management / IC Card / ICヵード |
Research Abstract |
The library buys a certain number of books, and lend them to the user. This business at the library bears the development of the culture such as sharing human knowledge. People has the demand that it wants to treat digital contents (henceforth contents) at the library. However, because unauthorized copying is made easily as for digital contents, it is not suitable for the lending business like the library. In this research, we achieve an original library business that is the meaning of this research in enabling sharing the library for digital contents, Concretely, we propose the system that the user can borrow contents through the network and can inspect contents without network connection in the use period. This system can be inspected only in the use period, and the unauthorized copying of contents is prevented. A necessary equipment should meet the following requirements with this proposal: it is possible to carry, it has the clock and the storage area that the ordinary user cannot u
… More
se, and CPU is built into. Such we develop an equipment (hereafter, token), because it did not exist. In 2005 fiscal year, to bring a requirement to make a real machine of the token, we develop the emulator of token and the prototype of the library system In 2006 fiscal year, We researched and developed the safe protocol to communicate and correct synchronization between token and library server. Moreover, it proposed the method of transmitting the confidential information on the password etc. as an application example that used the token. In 2007 fiscal year, we made the prototype of the token that considers mass-producing it as IC card type Moreover, it proposed the online examination system etc. as an application example that used the token. We proposed the system that was able to defend right holder's right while securing convenience on the user side : it is in point that the user can borrow contents using network, and inspect only in the use period not using network about this system. It seems that this research is very important aiming at the digitalization of contents in the future. Less
|
Report
(4 results)
Research Products
(24 results)