Protection Profile for Connected Interoperable DRM Framework

  • Donghyun Choi
  • Sungkyu Cho
  • Dongho Won
  • Seungjoo Kim
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5379)


Nowadays, interoperability of DRM is an issue in market. It can be achieved by three different approaches: full-format, configuration-driven and connected interoperability. In particular, the connected interoperability refers to devices that contact an online translation service. When the consumers want to transfer content to a different device, they access the online translation server and rely upon online services. The connected interoperability does not need defining one standard and has the ability to monitor. Therefore, the connected interoperability is used more than others in market. However, in the connected interoperability, even though two distinct DRM systems want to share the content, they cannot share the content if the online translation server does not guarantee reliability. In this paper, we propose a protection profile for connected interoperable DRM framework to solve the problem. This PP can be used to establish trust between the DRM provider and the online translation server for interoperability. If that happens, the connected interoperable DRM market will be more active than before.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Lee, S., Shin, M.: Protection Profile for Software Development Site. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 499–507. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  2. 2.
    Common Criteria, Common Criteria for Information Technology Security Evaluation; part 1: Introduction and general model, Version 3.1 R1, CCMB-2006-09-001 (September 2006)Google Scholar
  3. 3.
    Common Criteria, Common Criteria for Inofrmation Technology Security Evaluation; part 2: Security functional components, Version 3.1 R2, CCMB-2007-09-002 (September 2007)Google Scholar
  4. 4.
    Common Criteria, Common Criteria for Information Technology Security Evaluation; part 3: Security assurance components, Version 3.1 R2, CCMB-2007-09-003 (September 2007)Google Scholar
  5. 5.
    Taban, G., Cardenas, A.A., Gligor, c.d.: Towards a Secure and Interoperable DRM Architecture. In: ACM Workshop On Digital Rights Management, pp. 69–78 (October 2006)Google Scholar
  6. 6.
    Koenen, R.H., Lacy, J., Mackey, M., Mitchell, S.: The Long March to Interoperable Digital Rights Management. Proceedings of the IEEE 92(6), 883–897 (2004)CrossRefGoogle Scholar
  7. 7.
    Safavi-Naini, R., Sheppard, N.P., Uehara, T.: Import/Export in Digital Rights Management. In: Proceedings of the 4th ACM workshop on Digital rights management, pp. 99–110 (2004)Google Scholar
  8. 8.
    Schmidt, A.U., Tafreschi, O., Wolf, R.: Interoperability Challenges for DRM Systems. In: Second International Workshop on Virtual Goods, Ilmenau, Germany (May 2004)Google Scholar
  9. 9.
    Michiels, S., Verslype, K., Joosen, W., De Decker, B.: Towards a Software Architecture for DRM. In: Proceedings of the ACM Digital Rights Management workshop DRM 2005, pp. 65–74 (2005)Google Scholar
  10. 10.
    Kravitz, D.W., Messerges, T.S.: Achieving Media Portability through Local Content Translation and End-to-End Rights Management. In: Proceedings of the ACM Digital Rights Management workshop DRM 2005, pp. 27–36 (2005)Google Scholar
  11. 11.
    Wegner, S.: Prototype Description of an Open DRM Architecture, OPERA-Interoperability of Digital Rights Management Technologies. EURESCOM project report (December 2003)Google Scholar
  12. 12.
    The Informed Dialogue about Consumer Acceptability of DRM Solutions in Europe. Consumer Survey on Digital Music and DRM (May 2005)Google Scholar
  13. 13.
  14. 14.
    Open Mobile Alliance,
  15. 15.
  16. 16.
  17. 17.

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Donghyun Choi
    • 1
  • Sungkyu Cho
    • 1
  • Dongho Won
    • 1
  • Seungjoo Kim
    • 1
  1. 1.Information Security Group, School of Information and Communication EngineeringSungkyunkwan UniversityKorea

Personalised recommendations