Enforcing Regional DRM for Multimedia Broadcasts With and Without Trusted Computing

نویسنده

  • Ulrich Greveler
چکیده

We present the problem of enforcing a Digital Rights Management (DRM) system that needs to consider location-dependent licensing policies and operates on top of existing conditional access standards. A major application for location-dependent DRM is Pay-TV broadcasting as rightsholders require different business models in different regions. A global provider’s enduser equipment needs to validate the user location in some way in order to enforce DRM in this scenario. We will depict several solutions to the problem and compare their security qualities. The main result is that trusted computing hardware may not be the most appropriate solution given reasonable conditions.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DRM, Trusted Computing and Operating System Architecture

Robust technological enforcement of DRM licenses assumes that the prevention of direct access to the raw bit representation of decrypted digital content and the license enforcement mechanisms themselves is possible. This is difficult to achieve on an open computing platform such as a PC. Recent trusted computing initiatives namely, the Trusted Computing Group (TCG) specification, and Microsoft’...

متن کامل

Combining DRM with Trusted Computing for Effective Information Access Management

In this paper we used Digital Rights Management (DRM) associated with Trusted Computing to enforce a contentspecific fine-grained access control policy defined by content owner. This policy is associated with content, and when content is copied its access control policy is copied and bound to the target copy. This paper presents a generic approach for content protection utilising both DRM and T...

متن کامل

Applications of Broadcast Encryption Schemes and Related Technical Mechanisms for Digital Rights Management of Multimedia Broadcasts

Solutions to the problem of transmitting data to a group of receivers in a way that only the correct sub-set of all possible receivers can decrypt the data are needed by a number of applications: Pay-TV, rights-controlled media, audio streaming, realtime business data, multicast communication are current examples, but there also off-line applications, particularly with regard to storage media f...

متن کامل

An Implementation of a Trusted and Secure DRM Architecture

Content providers and distributors need to have secured and trusted systems for the distribution of multimedia content with Digital Rights Management (DRM) to ensure the revenues derived from their works. This paper discusses the security mechanisms applied to the implementation of a DRM architecture, regarding the certification and verification of user tools integrity during their whole life c...

متن کامل

Recent Advances in Multimedia Information System Security

A multimedia communication system enables multimedia data's generation, storage, management, distribution, receiving, consuming, editing, sharing, and so on. In such systems, there are various security issues, which must be considered such as eavesdropping, intrusion, forgery, piracy and privacy, etc. Until now, various security solutions for multimedia communication systems have been reported,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005