Abstract
Digital Rights Management (DRM) enforces the rights of copyright holders and enforces their business models. This imposes restrictions on the way users handle content. These restrictions apply specifically in networked environments. Authorized Domain (AD) DRM concepts remove, or at least reduce, several of these restrictions to a large extent, while at the same time taking into account the content providers’ need to limit the proliferation of content. In this paper we describe the design and operation of an Authorized Domain system, which we call the Personal Entertainment Domain (PED).
Chapter PDF
Similar content being viewed by others
References
Vevers, R., Hibbert, C.: Copy Protection and Content Management in the DVB. In: IBC Conference Publication, IBC 2002, Amsterdam, September 15, vol. 2002, pp. 458–466 (2002)
van den Heuvel, S.A.F.A., Jonker, W., Kamperman, F.L.A.J., Lenoir, P.J.: Secure Content Management in Authorised Domains. In: IBC Conference Publication, Amsterdam, IBC 2002, September 15, pp. 467–474 (2002)
DVB-CPT, DVB-CPT Authorized Domain: Definition / Requirements, cpt-018r5 (2002)
Thomson Multimedia, SmartRight (2003), http://www.smartright.org
5C, DTCP Volume 1 Supplement E Mapping DTCP to IP (Informational Version), DRAFT Revision 0.9, September 12 (2003)
IBM, IBM Response to DVB-CPT Call for Proposals for Content Protection & Copy Management: xCP Cluster Protocol, DVB-CPT-716, October 19 (2003)
Gildred, J., Andreasyan, A., Osawa, R., Stahl, T.: Protected Entertainment Rights Management (PERM): Specification Draft v0.54, Pioneer Research Center USA Inc, Thomson, June 9 (2003)
Eskicioglu, A.M., Delp, E.J.: An overview of multimedia content protection in consumer electronic devices. In: Signal Processing: Image Communication. Elsevier, Amsterdam (2001)
Jonker, W., Linnartz, J.-P.: Digital Rights Management in Consumer Electronics Products. IEEE Signal Processing Magazine, Special Issue on Digital Rights Management (2004)
Gooch, R.: Requirements for DRM systems. In: Digital Rights Management. LNCS, vol. 2770. Springer, Heidelberg (2003)
Guth, S.: A Sample DRM System. Digital Rights Management: Technological, Economic, Legal and Political Aspects. Springer, Heidelberg (2003)
Open Mobile Alliance, DRM Architecture: Draft Version 2.0, OMA-DRM-ARCH-V2_0-20040820-C, August 20 (2004)
Conrado, C., Petkovic, M., Jonker, W.: Privacy-Preserving DRM. In: SDM 2004. LNCS, vol. 3178. Springer, Heidelberg (2004)
Philips Semiconductors, Near Field Communication (2004), http://www.semiconductors.philips.com/markets/identification/products/nfc/
Dierks, T., Allen, C.: RFC2246: The TLS Protocol, version 1 (1999)
Microsoft, Windows Media Connect - Connectivity Solution for Networked Media Players, WinHEC2004 (2004)
Microsoft, Next Generation Windows Media DRM for Consumer Electronics Devices, WinHEC2004 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 IFIP International Federation for Information Processing
About this paper
Cite this paper
Koster, P., Kamperman, F., Lenoir, P., Vrielink, K. (2005). Identity Based DRM: Personal Entertainment Domain. In: Dittmann, J., Katzenbeisser, S., Uhl, A. (eds) Communications and Multimedia Security. CMS 2005. Lecture Notes in Computer Science, vol 3677. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11552055_5
Download citation
DOI: https://doi.org/10.1007/11552055_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28791-9
Online ISBN: 978-3-540-31978-8
eBook Packages: Computer ScienceComputer Science (R0)