Skip to main content

Enforcing Regional DRM for Multimedia Broadcasts With and Without Trusted Computing

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3919))

Abstract

We present the problem of enforcing a Digital Rights Management (DRM) system that needs to consider location-dependent licensing policies and operates on top of existing conditional access standards. A major application for location-dependent DRM is Pay-TV broadcasting as rightsholders require different business models in different regions. A global provider’s enduser equipment needs to validate the user location in some way in order to enforce DRM in this scenario. We will depict several solutions to the problem and compare their security qualities. The main result is that trusted computing hardware may not be the most appropriate solution given reasonable conditions.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jan Bormans, K.H.: Mpeg-21 overview v.5. Technical Report JTC1/SC29/WG11/N5231, ISO/IEC, Requirements Group (2002)

    Google Scholar 

  2. CENELEC: Common interface specification for conditional access and other digital video broadcasting decoder applications. Technical Report EN 50221, Technical Committee TC 206 (1997)

    Google Scholar 

  3. Gabber, E., Wool, A.: How to prove where you are. In: Proceedings of the 5th ACM Conference on Computer and Communications Security, pp. 142–149 (1998)

    Google Scholar 

  4. Greveler, U.: How pay-TV becomes e-commerce. In: Proceedings of the 7th International IEEE Conference on E-Commerce Technology 2005, pp. 508–511 (2005)

    Google Scholar 

  5. Hillebrand, F.: GSM and UMTS - The Creation of Global Mobile Communication, 1st edn. Wiley, Chichester (2002)

    Google Scholar 

  6. Harris, I.: Technical realization of short message service cell broadcast (smscb). Technical Report 3GPP TS 03.41, 3rd Generation Partnership Project (3GPP) (1996)

    Google Scholar 

  7. Taylor, J.: DVD Demystified, 2nd edn. McGraw-Hill Professional, New York (2000)

    Google Scholar 

  8. Anderson, R., Kuhn, M.: Low cost attacks on tamper resistant devices. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 125–136. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  9. Kommerling, O., Kuhn, M.: Design principles for tamper resistant smartcard processors. In: Proceedings of the USENIX Workshop on Smartcard Technology, pp. 9–20 (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Greveler, U. (2006). Enforcing Regional DRM for Multimedia Broadcasts With and Without Trusted Computing. In: Safavi-Naini, R., Yung, M. (eds) Digital Rights Management. Technologies, Issues, Challenges and Systems. DRMTICS 2005. Lecture Notes in Computer Science, vol 3919. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11787952_25

Download citation

  • DOI: https://doi.org/10.1007/11787952_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-35998-2

  • Online ISBN: 978-3-540-35999-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics