Skip to main content

Identity-Based DRM: Personal Entertainment Domain

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((TDHMS,volume 4300))

Abstract

Digital Rights Management (DRM) enforces the rights of copyright holders and enforces their business models. This imposes restrictions on how users can handle content. These restrictions apply specifically in networked environments. Authorized Domain (AD) DRM concepts remove several of these restrictions, while taking into account the content providers’ need to limit the proliferation of content. This paper compares a number of alternative DRM concepts based on some criteria including control on content proliferation and user experience. We introduce a new concept called Personal Entertainment Domain (PED) DRM. PED-DRM binds content to a person. This person has a number of permanent domain devices. The person’s content can be rendered on these permanent domain devices and temporarily on other devices after user authentication. This concept aims at providing a better user experience than current solutions by making it more person identity based. The concept builds upon the best aspects of device-based and person-based DRM. Furthermore, we present the architecture of a PED-DRM realization. We conclude that PED-DRM meets the criteria and is practical to implement, although it has the prerequisite of having an authentication infrastructure.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Apple, iTunes Music Store: Authorizing your computer (2005), http://www.apple.com/support/itunes/musicstore/authorization/

  2. Conrado, C., Petkovic, M., Jonker, W.: Privacy-Preserving DRM. In: Jonker, W., Petković, M. (eds.) SDM 2004. LNCS, vol. 3178, Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  3. Dierks, T., Allen, C.: RFC2246: The TLS Protocol (version 1) (1999)

    Google Scholar 

  4. Eskicioglu, A.M., Delp, E.J.: An overview of multimedia content protection in con-sumer electronic devices. Signal Processing: Image Communication 16, 681–699 (2000)

    Article  Google Scholar 

  5. Gildred, J., Andreasyan, A., Osawa, R., Stahl, T.: Protected Entertainment Rights Man-agement (PERM): Specification Draft v0.54. Pioneer Research Center USA Inc, Thomson (2003)

    Google Scholar 

  6. Gooch, R.: Requirements for DRM systems. In: Becker, E., Buhse, W., Günnewig, D., Rump, N. (eds.) Digital Rights Management. LNCS, vol. 2770, Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  7. Guth, S.: A Sample DRM System. In: Becker, E., Buhse, W., Günnewig, D., Rump, N. (eds.) Digital Rights Management. LNCS, vol. 2770, Springer, Heidelberg (2003)

    Google Scholar 

  8. Heuvel, S.A.F.A., van den Jonker, W., Kamperman, F.L.A.J., Lenoir, P.J.: Secure Content Management in Authorised Domains. In: IBC Conference Publication, Amsterdam, pp. 467–474 (2002)

    Google Scholar 

  9. Iannella, R.: Open Digital Rights Language (ODRL) Version 1.1 (2003)

    Google Scholar 

  10. Jonker, W., Linnartz, J.P.: Digital Rights Management in Consumer Electronics Products. IEEE Signal Processing Magazine, Special Issue on Digital Rights Management 21, 82–91 (2004)

    Google Scholar 

  11. Liberty Alliance Project, Liberty ID-FF Architecture Overview, version 1.2 (2005)

    Google Scholar 

  12. Microsoft, Next Generation Windows Media DRM for Consumer Electronics De-vices. In: WinHEC 2004 (2004)

    Google Scholar 

  13. Microsoft, Windows Media Connect - Connectivity Solution for Networked Media Players. In: WinHEC 2004 (2004)

    Google Scholar 

  14. Microsoft, Windows Media Digital Rights Management (2005), http://www.microsoft.com/windows/windowsmedia/drm/default.aspx

  15. Open Mobile Alliance, DRM Architecture: Approved Version 2.0 (2006)

    Google Scholar 

  16. Open Mobile Alliance, DRM Specification: Approved Version 2.0 (2006)

    Google Scholar 

  17. Pestoni, F., Lotspiech, J.B., Nusser, S.: xCP: peer-to-peer content protection. IEEE Signal Processing Magazine 21, 71–81 (2004)

    Article  Google Scholar 

  18. Petkovic, M., Koster, R.P.: User Attributed Rights in DRM. In: First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems, Sydney, Australia, October 31 - November 2 (2005)

    Google Scholar 

  19. Popescu, B.C., Crispo, B., Kamperman, F.L.A.G., Tanenbaum, A.S.: A DRM Security Ar-chitecture for Home Networks. In: Proceedings of the 4th ACM Workshop on Digital Rights Management, pp. 1–10 (2004)

    Google Scholar 

  20. Rosenblatt, B., Trippe, B., Mooney, S.: Digital Rights Management: Business and Technology. M&T Books, New York (2002)

    Google Scholar 

  21. Thomson: SmartRight: Technical white paper, version 1.7 (2003)

    Google Scholar 

  22. Vevers, R., Hibbert, C.: Copy Protection and Content Management in the DVB. In: IBC Conference Publication, Amsterdam, pp. 458–466 (2002)

    Google Scholar 

  23. Wegner, S. (ed.): OPERA - Interoperability of Digital Rights Management (DRM) Technologies: An Open DRM Architecture. Eurescom report (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Koster, P., Kamperman, F., Lenoir, P., Vrielink, K. (2006). Identity-Based DRM: Personal Entertainment Domain. In: Shi, Y.Q. (eds) Transactions on Data Hiding and Multimedia Security I. Lecture Notes in Computer Science, vol 4300. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11926214_4

Download citation

  • DOI: https://doi.org/10.1007/11926214_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-49071-5

  • Online ISBN: 978-3-540-49072-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics