Abstract
As described before, there are many DRM systems, and content protection systems. Most of them are not interoperable. Unfortunately, the lack of interoperability affects all stakeholders, not only consumers. Thus, interoperability is a highly expected characteristic for the future. We explore five approaches of interoperability: vertical, horizontal, plug-in, translation, and Interoperable Rights Locker. Then, we describe existing solutions such as Coral, UltraViolet, and Keychest. The final section explores how to transcode bulk encryptions and translation of usage rights.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Pirated content does not (normally) have any copy protection or DRM. Hence, it can be played on any device, circumventing the interoperability issue. Furthermore, it is often free (or at least cheaper).
- 2.
A class attack is an attack that is applicable to every instance of the hacked system.
- 3.
DVB CSA3, the latest version, uses 128-bit keys.
- 4.
The replacement of the smart card can be triggered by economic factors. As long as the estimated loss due to piracy does not exceed the cost of replacing all the smart cards in the field, it is useless to replace them.
- 5.
It is understood that DRM A also meets the requirements of the latter release window.
- 6.
CORAL’s rights locker is less sophisticated than the digital rights locker of the Interoperable Rights Locker concept (see Sect. 11.2.5).
- 7.
Universally Unique Identifier (uuid) is a 128-bit identifier standard defined by the Open Software Foundation. It enables distributed systems to consistently, and uniquely identify information.
- 8.
Leonardo Chariglione is the founder of the MPEG standard and the SDMI.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Diehl, E. (2012). The Next Frontier: Interoperability. In: Securing Digital Video. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17345-5_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-17345-5_11
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17344-8
Online ISBN: 978-3-642-17345-5
eBook Packages: Computer ScienceComputer Science (R0)