Abstract
The commercial distribution of multimedia content over the Internet demands high security mechanisms. There is not only the possibility of third persons intercepting the communication, but also the risk of malevolent hackers faking the identity of registered users. This paper describes mechanisms that prevent such attacks. First an overview of cryptographic algorithms is given. After that the terms identification and authentication are defined and examples of techniques and protocols for user and content authentication are given. The next sections give a short overview of connection based security protocols and the secure container technology used in DRM systems. The final section shows some security aspects of client DRM systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Spenger, G. (2003). Authentication, Identification Techniques, and Secure Containers – Baseline Technologies. In: Becker, E., Buhse, W., Günnewig, D., Rump, N. (eds) Digital Rights Management. Lecture Notes in Computer Science, vol 2770. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10941270_5
Download citation
DOI: https://doi.org/10.1007/10941270_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40465-1
Online ISBN: 978-3-540-45038-2
eBook Packages: Springer Book Archive