An implementation of a trusted and secure DRM architecture

被引:0
|
作者
Torres, Victor [1 ]
Delgado, Jaime [1 ]
Llorente, Silvia [1 ]
机构
[1] Univ Pompeu Fabra, Passeig Circumval Iacio 8, Barcelona 08003, Spain
关键词
content management; multimedia content protection; digital rights management systems;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Content providers and distributors need to have secured and trusted systems for the distribution of multimedia content with Digital Rights Management (DRM) to ensure the revenues derived from their works. This paper discusses the security mechanisms applied to the implementation of a DRM architecture, regarding the certification and verification of user tools integrity during their whole life cycle, the mechanisms for providing a secure and trusted communication between client tools and the server framework for authorisation, certification or verification purposes, and the mechanisms for the secure storage and resynchronisation of the reports that describe the actions performed by users during the tool offline operation. The presented architecture is being implemented in the AXMEDIS project, which aims to create an innovative technology framework for the automatic production, protection and distribution of digital cross media contents over a range of different media channels, including PC (on the Internet), PDA, kiosks, mobile phones and i-TV.
引用
收藏
页码:312 / +
页数:2
相关论文
共 50 条
  • [1] Trusting software tools in a secure DRM architecture
    Torres, Victor
    Delgado, Jaime
    Llorente, Silvia
    [J]. AXMEDIS 2007: THIRD INTERNATIONAL CONFERENCE ON AUTOMATED PRODUCTION OF CROSS MEDIA CONTENT FOR MULTI-CHANNEL DISTRIBUTION, PROCEEDINGS, 2007, : 55 - +
  • [2] Secure DRM scheme for future mobile networks based on trusted mobile platform
    Zheng, Y
    He, D
    Wang, HX
    Tang, XH
    [J]. 2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 1164 - 1167
  • [3] A Secure Mobile DRM System Based on Cloud Architecture
    Chen, Chin-Ling
    Tsaur, Woei-Jiunn
    Chen, Yu-Yi
    Chang, Yao-Chung
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 11 (03) : 925 - 941
  • [4] Secure Multimedia Content Delivery with Multiparty Multilevel DRM Architecture
    Thomas, Tony
    Emmanuel, Sabu
    Das, Amitabha
    Kankanhalli, Mohan S.
    [J]. NOSSDAV 09: 18TH INTERNATIONAL WORKSHOP ON NETWORK AND OPERATING SYSTEMS SUPPORT FOR DIGITAL AUDIO AND VIDEO, 2009, : 85 - 90
  • [5] A Secure IIoT Gateway Architecture based on Trusted Execution Environments
    Froehlich, Antonio Augusto
    Horstmann, Leonardo Passig
    Hoffmann, Jose Luis Conradi
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2023, 31 (02)
  • [6] A Trusted Mobile Phone Reference Architecture via Secure Kernel
    Zhang, Xinwen
    Aciicmez, Onur
    Seifert, Jean-Pierre
    [J]. STC'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON SCALABLE TRUSTED COMPUTING, 2007, : 7 - 14
  • [7] Trusted and secure composite digital twin architecture for collaborative ecosystems
    Kuruppuarachchi, Pasindu Manisha
    Rea, Susan
    McGibney, Alan
    [J]. IET COLLABORATIVE INTELLIGENT MANUFACTURING, 2023, 5 (01)
  • [8] A Secure IIoT Gateway Architecture based on Trusted Execution Environments
    Antônio Augusto Fröhlich
    Leonardo Passig Horstmann
    José Luis Conradi Hoffmann
    [J]. Journal of Network and Systems Management, 2023, 31
  • [9] Fair use, DRM, and trusted computing
    Erickson, JS
    [J]. COMMUNICATIONS OF THE ACM, 2003, 46 (04) : 34 - 39
  • [10] Trusted platforms, DRM, and beyond - Introduction
    Kuhlmann, D
    Gehring, RA
    [J]. DIGITAL RIGHTS MANAGEMENT: TECHNOLOGICAL, ECONOMIC, LEGAL AND POLITICAL ASPECTS, 2003, 2770 : 178 - 205