Skip to main content

Modeling Content Protection

  • Chapter
  • First Online:
Securing Digital Video
  • 1042 Accesses

Abstract

To model a system, the designer often analyses different points of view. Each model will represent one point of view. Using one single model is often insufficient for understanding the system. This is especially true for complex systems such as DRM. Currently, content protection models primarily address functional, transactional, and architectural points of view. The functional model describes the different functions of a system and the interactions between them. The transactional model defines the chaining of exchanged messages, of their steps. The architectural model maps the different elements of a system to actual principals such as servers, storage units, and devices. The four-layer model provides a security oriented view of the system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    In fact, the storage and distribution of electronic files with guaranteed quality of service is a complex topic. In the multimedia world, it uses often a complex architecture, called Contribution Distribution Network, based on intermediate caching servers that attempt to bring the files as near as possible to the customers.

  2. 2.

    In some cases, this delivery may itself be controlled by DRM [184].

  3. 3.

    This is not true if DRM protects live content. In that case, the definition of the sales conditions occurs before the actual delivery of content from the content provider. Of course, the preparation of the protected content then has to be performed in real time.

  4. 4.

    The use of terms such as scrambling and descrambling to refer to bulk encryption is inherited from the early Pay TV systems. When content was analog, content was scrambled using different techniques such as variable time delay, line cut and rotate or line shuffling. Often the associated licenses were digitally encrypted. Thus, the vocabulary practice generalized for scrambling content and encrypting license. See Sect. 6.2: Pay TV: the Ancestor.

  5. 5.

    In Pay TV, the problem is exacerbated. The license server has to issue several times the same license because it does not know if the targeted set top box is powered on. Only repetitions of the message may reasonably ensure that the set top box received the renewed license.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Eric Diehl .

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Diehl, E. (2012). Modeling Content Protection. In: Securing Digital Video. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17345-5_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17345-5_4

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17344-8

  • Online ISBN: 978-3-642-17345-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics