Abstract
We present the problem of enforcing a Digital Rights Management (DRM) system that needs to consider location-dependent licensing policies and operates on top of existing conditional access standards. A major application for location-dependent DRM is Pay-TV broadcasting as rightsholders require different business models in different regions. A global provider’s enduser equipment needs to validate the user location in some way in order to enforce DRM in this scenario. We will depict several solutions to the problem and compare their security qualities. The main result is that trusted computing hardware may not be the most appropriate solution given reasonable conditions.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Jan Bormans, K.H.: Mpeg-21 overview v.5. Technical Report JTC1/SC29/WG11/N5231, ISO/IEC, Requirements Group (2002)
CENELEC: Common interface specification for conditional access and other digital video broadcasting decoder applications. Technical Report EN 50221, Technical Committee TC 206 (1997)
Gabber, E., Wool, A.: How to prove where you are. In: Proceedings of the 5th ACM Conference on Computer and Communications Security, pp. 142–149 (1998)
Greveler, U.: How pay-TV becomes e-commerce. In: Proceedings of the 7th International IEEE Conference on E-Commerce Technology 2005, pp. 508–511 (2005)
Hillebrand, F.: GSM and UMTS - The Creation of Global Mobile Communication, 1st edn. Wiley, Chichester (2002)
Harris, I.: Technical realization of short message service cell broadcast (smscb). Technical Report 3GPP TS 03.41, 3rd Generation Partnership Project (3GPP) (1996)
Taylor, J.: DVD Demystified, 2nd edn. McGraw-Hill Professional, New York (2000)
Anderson, R., Kuhn, M.: Low cost attacks on tamper resistant devices. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 125–136. Springer, Heidelberg (1998)
Kommerling, O., Kuhn, M.: Design principles for tamper resistant smartcard processors. In: Proceedings of the USENIX Workshop on Smartcard Technology, pp. 9–20 (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Greveler, U. (2006). Enforcing Regional DRM for Multimedia Broadcasts With and Without Trusted Computing. In: Safavi-Naini, R., Yung, M. (eds) Digital Rights Management. Technologies, Issues, Challenges and Systems. DRMTICS 2005. Lecture Notes in Computer Science, vol 3919. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11787952_25
Download citation
DOI: https://doi.org/10.1007/11787952_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-35998-2
Online ISBN: 978-3-540-35999-9
eBook Packages: Computer ScienceComputer Science (R0)