A portable DRM scheme using smart cards

被引:12
作者
Lee, Wei-Bin [1 ]
Wu, Wei-Jhen [1 ]
Chang, Chen-Yi [1 ]
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 407, Taiwan
关键词
digital rights management; e-commerce; security; cryptography; digital signature;
D O I
10.1080/10919390701436390
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet is a relatively friendly and convenient environment for allowing music, audio, video files, and other digital contents to be copied, modified, and distributed easily. Nevertheless, from the point view of content owners, copyrights protection and intellectual property rights are critical issues that involve revenue loss. The current digital rights management (DRM) systems provide an acceptable copyright protection solution. The DRM venders usually provide a function allowing consumers to migrate their authorized license from one device to another. Still, this function is restricted by the device type and network domain, which does not completely satisfy consumers' needs. However, a successful DRM system should make consumers willing to use it. Therefore, improving copyright protection convenience for consumers is a significant issue. In this paper, a portable DRM scheme in which the usage-rights follow the consumer, but not the device, is presented for constructing a flexible DRM system that improves portability, therefore allowing users to have content use rights on any devices. In addition, an awkward storage system for encrypted data does not need to be maintained by the proposed scheme, thereby giving a more secure, cost-effective solution.
引用
收藏
页码:247 / 258
页数:12
相关论文
共 17 条
[1]  
[Anonymous], 2003, P ACSW FRONT 03
[2]   LicenseScript: A novel digital rights language and its semantics [J].
Chong, CN ;
Corin, R ;
Etalle, S ;
Hartel, P ;
Jonker, W ;
Law, YW .
THIRD INTERNATIONAL CONFERENCE ON WEB DELIVERING OF MUSIC, PROCEEDINGS, 2003, :122-129
[3]   Privacy in an identity-based DRM system [J].
Conrado, C ;
Kamperman, F ;
Schrijen, GJ ;
Jonker, W .
14TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2003, :389-395
[4]  
COX IJ, 2001, DIGITAL WATERMAKING
[5]  
Daemon J., 2002, DESIGN RIJNDAEL AES
[6]   Hardware and software symbiosis helps smart card evolution [J].
Dhem, JF ;
Feyt, N .
IEEE MICRO, 2001, 21 (06) :14-25
[7]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[8]  
Garnett Nic, 2001, ACM SIGCOM EXCHANGES, V2, P1
[9]  
JONKER W, 2004, IEEE SIGNAL PROCESSI, V21
[10]   Examining smart-card security under the threat of power analysis attacks [J].
Messerges, TS ;
Dabbish, EA ;
Sloan, RH .
IEEE TRANSACTIONS ON COMPUTERS, 2002, 51 (05) :541-552