Advertisement

Identity Based DRM: Personal Entertainment Domain

  • Paul Koster
  • Frank Kamperman
  • Peter Lenoir
  • Koen Vrielink
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3677)

Abstract

Digital Rights Management (DRM) enforces the rights of copyright holders and enforces their business models. This imposes restrictions on the way users handle content. These restrictions apply specifically in networked environments. Authorized Domain (AD) DRM concepts remove, or at least reduce, several of these restrictions to a large extent, while at the same time taking into account the content providers’ need to limit the proliferation of content. In this paper we describe the design and operation of an Authorized Domain system, which we call the Personal Entertainment Domain (PED).

Keywords

Digital Rights Management DRM Authorized Domain 

References

  1. 1.
    Vevers, R., Hibbert, C.: Copy Protection and Content Management in the DVB. In: IBC Conference Publication, IBC 2002, Amsterdam, September 15, vol. 2002, pp. 458–466 (2002)Google Scholar
  2. 2.
    van den Heuvel, S.A.F.A., Jonker, W., Kamperman, F.L.A.J., Lenoir, P.J.: Secure Content Management in Authorised Domains. In: IBC Conference Publication, Amsterdam, IBC 2002, September 15, pp. 467–474 (2002)Google Scholar
  3. 3.
    DVB-CPT, DVB-CPT Authorized Domain: Definition / Requirements, cpt-018r5 (2002)Google Scholar
  4. 4.
    Thomson Multimedia, SmartRight (2003), http://www.smartright.org
  5. 5.
    5C, DTCP Volume 1 Supplement E Mapping DTCP to IP (Informational Version), DRAFT Revision 0.9, September 12 (2003)Google Scholar
  6. 6.
    IBM, IBM Response to DVB-CPT Call for Proposals for Content Protection & Copy Management: xCP Cluster Protocol, DVB-CPT-716, October 19 (2003)Google Scholar
  7. 7.
    Gildred, J., Andreasyan, A., Osawa, R., Stahl, T.: Protected Entertainment Rights Management (PERM): Specification Draft v0.54, Pioneer Research Center USA Inc, Thomson, June 9 (2003)Google Scholar
  8. 8.
    Eskicioglu, A.M., Delp, E.J.: An overview of multimedia content protection in consumer electronic devices. In: Signal Processing: Image Communication. Elsevier, Amsterdam (2001)Google Scholar
  9. 9.
    Jonker, W., Linnartz, J.-P.: Digital Rights Management in Consumer Electronics Products. IEEE Signal Processing Magazine, Special Issue on Digital Rights Management (2004)Google Scholar
  10. 10.
    Gooch, R.: Requirements for DRM systems. In: Digital Rights Management. LNCS, vol. 2770. Springer, Heidelberg (2003)Google Scholar
  11. 11.
    Guth, S.: A Sample DRM System. Digital Rights Management: Technological, Economic, Legal and Political Aspects. Springer, Heidelberg (2003)Google Scholar
  12. 12.
    Open Mobile Alliance, DRM Architecture: Draft Version 2.0, OMA-DRM-ARCH-V2_0-20040820-C, August 20 (2004)Google Scholar
  13. 13.
    Conrado, C., Petkovic, M., Jonker, W.: Privacy-Preserving DRM. In: SDM 2004. LNCS, vol. 3178. Springer, Heidelberg (2004)Google Scholar
  14. 14.
    Philips Semiconductors, Near Field Communication (2004), http://www.semiconductors.philips.com/markets/identification/products/nfc/
  15. 15.
    Dierks, T., Allen, C.: RFC2246: The TLS Protocol, version 1 (1999)Google Scholar
  16. 16.
    Microsoft, Windows Media Connect - Connectivity Solution for Networked Media Players, WinHEC2004 (2004)Google Scholar
  17. 17.
    Microsoft, Next Generation Windows Media DRM for Consumer Electronics Devices, WinHEC2004 (2004)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2005

Authors and Affiliations

  • Paul Koster
    • 1
  • Frank Kamperman
    • 1
  • Peter Lenoir
    • 1
  • Koen Vrielink
    • 1
  1. 1.Information and System Security DepartmentPhilips ResearchEindhovenThe Netherlands

Personalised recommendations