Abstract：In this model,the .Net framework is regarded as service management point,applying the WEC technique,the P2P and DRM technique is introduced to serve for the requirement and implemented the combine with the existing platform.In the model,the point is the research about the implementation which from the video release to user download and monitoring of the resource using process.The advantages of it are the unified management and accelerate download and the resource protection.This model offers a better billing mode for operators and SP.
Keyword：High Definition Download,WEB,.Net,P2P,DRM
With the growing popularity of broadband,video and audio content on the Internet has become increasingly diverse.More and More people develop a way through the network to access and watch video content consumption habits,and operators to promote products through the years of broadband star world occupy the strategic objectives of the user’s living room has taken an important step.With in-depth promotion of business, has achieved initial results.And nurture a mature star wide user group of consumers.With the wide-Star users continue to increase,the market for the business such as support for HD offline play,pay-per-view,a number of newdemands.If you can successfully meet these requirements,great benefits will follow-up business to promote and build a more flexible business model.It is in this context,the operator of the project requirements of broadband high-definition download platform.Telecom operators access to terminal equipment through the integration of audio and video content providers and video content,providing a convenient platform for free viewing and download audio and video content,creating a broad and huge potential of audio-visual consumer market.
2 System Model
2.1 Overall Description
Download high-definition model with broadband Star world business management system compatible with the introduction of DRM and HTTP/P2P,service system,upgrade the client software on the broadband star world existing terminal P2P download capabilities of HD sources for download through PC for playback.System using the MS SQLServer2008 for database management systems,in C# for mainstream development language,C++ complete DRM dynamic link library,using the WebService as each subsystem interface to achieve,based on these thechnologies,to built the one kind of the P2P + th DRM-based high-definition download platform model and download acceleration and on-chip source protection.
2.2 P2P Applications
P2P networks,also known as peer-to-peer network to break the traditional network of C/S mode –set it in the transmission mode.C/S architecture,the client to the server to issue a service request,these server response to client requests and provide the necessary services,the status of the client and server is based on the resources not.Therefore,when a user makes too many requests,the server is overloaded,the reaction,however,resulting in a denial of service,resulting in server crashes,the link bandwidth is idle,has been wasted.P2P mode network service,just to fully tap the idle resources of the network,each node in the P2P network is both a server and client resources,load balancing assigned to each node in the network,so that each a node will have to bear part of the computing tasks and storage tasks.Therefore,the a mount of resources in the network with the number of nodes join the network is proportional to the number of nodes,the more contribution of more resources,and its quality of service higher.
2.3 Streaming Media
Streaming media refers to a series of media data is compressed,segmented transmission of data through the network,real-time on the network transmit audio and video for the viewing of a technology and process,this technology allows data packets can be sent like water；If you do not use this technology,you must download the entire media file before using.Transmission site of streaming audio and video stored on the server of the film when the viewer to watch these video files,audio and video data immediately after delivery to the viewer’s computer by particular player software to play.In the P2P streaming system,each users is a node with multiple users according to their respective load conditions and equipment performance to establish a connection in order to share each other’s streaming media data,this approach is both balanced server load,but also can improve the quality of the server for each user,which can overcome the traditional streaming media bandwidth capacity is not enough.
2.4 Trust Management
This model is based on a multi-system environment,we use PKI erected in strict confidence mechanism both in the communications,and trust management system allows the unkown to each other information the Union to establish a trust relationship based on the certificate.,Unified authentication is a core part of our design model.We rely on the certificate trust list；this list is by a trusted unified certification.The list itself is signed by electronic means,to ensure its integrity.It replaces the need for cross-validation process.Registered in the certificate trust table cooperation Unified Certification Services are well known and trusted each other.
All information is signed and encrypted using PKI technology,the user agent can not have their PIN to ensure reliable user agent services due to their high number and dynamic,the other hand,the other instances have their own The private key.
3 Model Construction
3.1 Overall Technology Route of Model
Select Net technology system as an application integration platform for the entire system.Net framework is a technologically advanced,fully functional,reliable,fast and safe framework.Net can quickly build distribution,scalable,portable,safe and reliable the server-side configuration.
In order to achieve customization and unified authentication,unified content management purposes,we use the portal.The characteristics of the portal are a unique,integrated,personalized and holistic.Among them：the only requirements of the enterprise,but also the significance of the portal；integration limit of reality,and reflects the continuity of the business；personalized customer preferences,but also the vitality of portal；and integrity is the high level of information requirements.
Fig.1.The Route of Technology
The entire system for three-tier structure,namely,the presentation layer,middle layer,data layer is completely separate.The technical architecture can best guarantee of efficiency and stability of the system.Added to the interface layer,making the content management and application system separation,not only to make the system easy to expand and upgrade,and improve the integration of system security.
3.2 Model of the Target and the Network Topology
This model,when completed,will achieve the following objectives.
First,the definition film source(10-20Mbps bit rate) can not be online real-time viewing.To a local or external hard drive,you can watch by downloading new sources.
Second,to solve the current on-demand process due to occasional network congestion,resulting in players halfway cards,to make the playback smoother.
Third,to support the pre-set-top box device customization and download audio and video programs remotely via a PC,thus avoiding the bad experience of the buffer in front of the TV,etc.Download.
Fourth,we can easily build a business model of broadband audio and video downloads.and more convenient to introduce the SP with the program source,to achieve a win-win,win.
Fifth,we can build a media advertising to download the distribution network business model,facilitate the advertising and media through the platform,and advertising.
3.3 DRM Design
DRM implementation mechanisms,including part of the back-end business systems and terminals.The back-end business system is mainly responsible for SP providers to upload media files encrypted.The terminal part is mainly responsible for the decryption play the video.
The platform side consists of two main systems：the media encryption system and the certificate issuing system.Need to download the release of media content,the platform side can produce the key ID and the random seed.The key ID and the random seed to generate the encryption key of the media file header,and asymmetric (RSA) encryption mechanism,and to generate public and private key.Use the pulbic key to encrypt the file header,the private key is stored in the platform side.And change the media file header,the head of the media fils stored key ID and encryption,to form an encrypted file.
The encrypted file is sent to the terminal,the terminal can not be read directly decode and play.The key ID and encryption headers in the file header need to be sent to the platform-side certificate server.Certificate server according to the key ID from the database to read the corresponding private key.Decrypted using the read private key encryption terminal hair over the head,the generated header file is sent back to the terminal.Terminal access to the file header with the encrypted file to exctract the media is not encrypted portion can be re-restore the temporary original media files,use this file to the player for playing.To ensure that difficult to crack,need special treatment,in the end the header and the restore process to ensure document confidentiality.
In order to guarantee the security of the system,the transmission of confidential messages is transmitted through and encrypted message,if necessary,to sign and encrypt the user through the web server to complete registration and browser want to download movies.After successful registration,the certificate server to generate the user public and private key pair,and the private key in a safe manner transmitted to the user；web server load to determine when the user selected they will need to download the move and then decide from which file server to botain the sepecified film and sent to the user.Calculated for the key in order to ensure that only legitimate users can watch their encryption to encrypt media files need to be the connection of the Random Number Generator to generate random numbers with the key ID,one-way Function,and dense key and key ID is stored in the database,to decrypt need.Find the information needed to decrypt the key stored in the file header.
In order to guarantee the security of the system,in addition to the movie file is encrypted,but also the need for various types of keys for protection,otherwise the security of the media file is empty talk.The user’s private key will be the user password to transform the generated encryption key,the file header contains the decryption information to privent identity impersonate,will also use signature and encryption are two means at the same time,will be filled in order to prevent replay attacks the key needed to decrypt the media file,similar to the protection of the header,will also be at the same time the use of signatures,encryption and fill the three means.
Finally,in order to protect media files after decryption,each player confusion,play a certain number of times,it will be completely distortion can not be played,thus avoiding illegal copy.
3.4 P2P Model and Terminal Access to the Main Flow
PC or terminal to download P2P/HTTP/FTP a variety of ways to download,so not only improve the HD download speeds,but also to save some bandwidth for the server,reduce operating costs.Terminal to download and play process as shown below.
In this paper,a three-tier technology,the use of polular Net development framework and the introducation of P2P+DRM technology,designed a high-definition download model,the model of HD sources for the preceding management,and set the accounting principles,the terminal downloaded through P2P/HTTP manner specified new sources in terminal for playback,the introduction of DRM monitoring new sources,and to prevent the spread of new sources of copy.Data exchange in the design of the model are based on XML,because XML has a good scalability,platform-independent structured data description capability,so that the model has good flexibility,scalability and cross-platform for the model further optimization and integration and provide a basis for.
 Wu,J.-Q.,Liu,F.,Peng,Y.-X.；Epss：An Extensible Peer-to-Peer Streaming Simulator.Computer Engineering ＆Science(7),101-105(2011)
 Jin,S.：The Study of Copyright Protection in P2P Network Mode.Journal of the Postgraduate of Zhongnan University of Economics and Law(1),58-61,98(2011)
 Lin,K.,Yang,M.,Mao,D.-L.；Scheme for Performance Improvement of P2P Live Video Streaming on LANs.Journal of Chinese Computer Systems.Journal of Chinese Computer Systems(7)(2011)
 Luo,C.,Ouyang,J.,Zhang,W.：Design of Truest and Authorization Service Platform Based on SMAL.Computer Engineering31(13),118-120(2005)
 Cheng,A.,Yu,Q.,Yao,X.,Ye,Y.：Application Research on Authorization Management Model of PMI Based on Attribute Certificate.Computer Engineering(4),162-164(2006)
 Zhao,Z.L.,Liu,B.,Li,W.：Image Clustering Based on Exctreme K-means Algorithm.IEIT Journal of Adaptive ＆ Dynamic Computing(1),12-16(2012),DOI=10.5813/www.ieit-web.org/IJADC/2012.1.13
 Zheng,L.P.,Hu,X.M.,Guo,M.：On the q-Szasz Operators on Two Variables.IEIT Journal of Adaptive ＆ Dynamic Computing(1),17-21(2012),DOI=10.5813/www.ieit-web.org/IJADC/2012.1.4