Abstract
To model a system, the designer often analyses different points of view. Each model will represent one point of view. Using one single model is often insufficient for understanding the system. This is especially true for complex systems such as DRM. Currently, content protection models primarily address functional, transactional, and architectural points of view. The functional model describes the different functions of a system and the interactions between them. The transactional model defines the chaining of exchanged messages, of their steps. The architectural model maps the different elements of a system to actual principals such as servers, storage units, and devices. The four-layer model provides a security oriented view of the system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
In fact, the storage and distribution of electronic files with guaranteed quality of service is a complex topic. In the multimedia world, it uses often a complex architecture, called Contribution Distribution Network, based on intermediate caching servers that attempt to bring the files as near as possible to the customers.
- 2.
In some cases, this delivery may itself be controlled by DRM [184].
- 3.
This is not true if DRM protects live content. In that case, the definition of the sales conditions occurs before the actual delivery of content from the content provider. Of course, the preparation of the protected content then has to be performed in real time.
- 4.
The use of terms such as scrambling and descrambling to refer to bulk encryption is inherited from the early Pay TV systems. When content was analog, content was scrambled using different techniques such as variable time delay, line cut and rotate or line shuffling. Often the associated licenses were digitally encrypted. Thus, the vocabulary practice generalized for scrambling content and encrypting license. See Sect. 6.2: Pay TV: the Ancestor.
- 5.
In Pay TV, the problem is exacerbated. The license server has to issue several times the same license because it does not know if the targeted set top box is powered on. Only repetitions of the message may reasonably ensure that the set top box received the renewed license.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Diehl, E. (2012). Modeling Content Protection. In: Securing Digital Video. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17345-5_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-17345-5_4
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17344-8
Online ISBN: 978-3-642-17345-5
eBook Packages: Computer ScienceComputer Science (R0)