Abstract
Digital rights management(DRM) systems are used to control the use and distribution of copyrighted content. OMA specification creates devices collection of domain, and the use of contents is free in this domain. Domains are created and managed directly by the RI(rights issuer) that issues rights to the domain. In this paper, we propose a new rights object acquisition protocol(ROAP) for DRM and a efficient key distribution protocol. The proposed ROAP provides billing functionality for purchasing rights via network operator which was not considered in OMA DRM 2.0 specifications.
This research was supported by the Program for the Training of Graduate Students in Regional Innovation which was conducted by the Ministry of Commerce Industry and Energy of the Korean Government.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Open Mobile Alliance, DRM Architecture, Draft Version 2.0 (August 2004)
Open Mobile Alliance, DRM Specification, Candidate Version 2.0 (July 2005)
Soriano, M., Flake, S., Tacken, J., Bormann, F., Tomas, J.: Mobile digital Rights Management: Security Requirements and Copy Detection Mechanism. In: Database and Expert Systems Applications 2005, Proceedings Sixteenth Information Workshop, pp. 251–256 (2005)
IEEE 1363a, IEEE Standard Specification for Public-Key Cryptography – Amendment 1: Additional Techniques (2004)
Draft ANSI X9.44, Public Key Cryptography for the Financial Services Industry – Key Establishment Using Integer Factorization Cryptography, Draft 6 (2003)
Schad, J., Housley, R.: Advanced Encryption Standards(AES) Key Warp Algorithm, RFC 3394 (September 2002)
Patel, S.: Number Threoretic Attacks on Secure Password Schemes. In: Proceedings of the Symposium on Security and Privacy, IEEE, pp. 236–247 (1997)
Popescu, B.C., Kamperman, F.L.A.J., Crispo, B., Tanenbaum, A.S.: A DRM Security Architecture for Home Networks. In: Proceedings of the 4th ACM workshop on Digital Rights Management, pp. 1-10 (2004)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, J., Lee, S., Shin, S. (2007). A Secure DRM Framework for User’s Domain and Key Management. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds) Autonomic and Trusted Computing. ATC 2007. Lecture Notes in Computer Science, vol 4610. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73547-2_43
Download citation
DOI: https://doi.org/10.1007/978-3-540-73547-2_43
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73546-5
Online ISBN: 978-3-540-73547-2
eBook Packages: Computer ScienceComputer Science (R0)