Skip to main content

A Secure DRM Framework for User’s Domain and Key Management

  • Conference paper
  • 838 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4610))

Abstract

Digital rights management(DRM) systems are used to control the use and distribution of copyrighted content. OMA specification creates devices collection of domain, and the use of contents is free in this domain. Domains are created and managed directly by the RI(rights issuer) that issues rights to the domain. In this paper, we propose a new rights object acquisition protocol(ROAP) for DRM and a efficient key distribution protocol. The proposed ROAP provides billing functionality for purchasing rights via network operator which was not considered in OMA DRM 2.0 specifications.

This research was supported by the Program for the Training of Graduate Students in Regional Innovation which was conducted by the Ministry of Commerce Industry and Energy of the Korean Government.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Open Mobile Alliance, DRM Architecture, Draft Version 2.0 (August 2004)

    Google Scholar 

  2. Open Mobile Alliance, DRM Specification, Candidate Version 2.0 (July 2005)

    Google Scholar 

  3. Soriano, M., Flake, S., Tacken, J., Bormann, F., Tomas, J.: Mobile digital Rights Management: Security Requirements and Copy Detection Mechanism. In: Database and Expert Systems Applications 2005, Proceedings Sixteenth Information Workshop, pp. 251–256 (2005)

    Google Scholar 

  4. IEEE 1363a, IEEE Standard Specification for Public-Key Cryptography – Amendment 1: Additional Techniques (2004)

    Google Scholar 

  5. Draft ANSI X9.44, Public Key Cryptography for the Financial Services Industry – Key Establishment Using Integer Factorization Cryptography, Draft 6 (2003)

    Google Scholar 

  6. Schad, J., Housley, R.: Advanced Encryption Standards(AES) Key Warp Algorithm, RFC 3394 (September 2002)

    Google Scholar 

  7. Patel, S.: Number Threoretic Attacks on Secure Password Schemes. In: Proceedings of the Symposium on Security and Privacy, IEEE, pp. 236–247 (1997)

    Google Scholar 

  8. Popescu, B.C., Kamperman, F.L.A.J., Crispo, B., Tanenbaum, A.S.: A DRM Security Architecture for Home Networks. In: Proceedings of the 4th ACM workshop on Digital Rights Management, pp. 1-10 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Bin Xiao Laurence T. Yang Jianhua Ma Christian Muller-Schloer Yu Hua

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, J., Lee, S., Shin, S. (2007). A Secure DRM Framework for User’s Domain and Key Management. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds) Autonomic and Trusted Computing. ATC 2007. Lecture Notes in Computer Science, vol 4610. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73547-2_43

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73547-2_43

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73546-5

  • Online ISBN: 978-3-540-73547-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics