Abstract
Current DRM implementations rely on obfuscating the inner working of the DRM client. Moreover, the rights to consume content are rather device bound than person bound. We present a first step towards an open DRM framework which is based on the security of its building blocks. The presented framework binds the right to consume content to persons instead of to devices. An extension of the current TPM specification is proposed to enhance the security of DRM clients.
Chapter PDF
Similar content being viewed by others
References
Atallah, M.J., Bryant, E.D., Stytz, M.R.: A survey of Anti-Tamper Technologies (2004)
de Castro Pacitti, M., Finamore, W.A.: Digital watermarking robustness and fragility characteristics: New modelling and coding influence. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 325–335. Springer, Heidelberg (2005)
Chow, S., Eisen, P., Johnson, H., van Oorschot, P.C.: A White-Box DES Implementation for DRM applications. In: Proceedings of ACM CCS-9 Workshop DRM 2002. LNCS, vol. 2595, pp. 1–15. Springer, Heidelberg (2003)
Chow, S., Eisen, P., Johnson, H., van Oorschot, P.C.: White-Box Cryptography and an AES implementation. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 250–270. Springer, Heidelberg (2003)
Horne, B., Matheson, L., Sheehan, C., Tarjan, R.E.: Dynamic Self Checking Techniques for Improved Tamper Resistance. In: ACM Workshop on Security and Privacy in Digital Rights Management, pp. 141–159 (2001)
Ku, W., Chi-Hung, C.: Survey on the Technological Aspects of Digital Rights Management. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 391–403. Springer, Heidelberg (2004)
Windows Media DRM 10 cracked? (2005), http://www.engadget.com/2005/02/01/windows-media-drm-10-cracked/
Michiels, S., Verslype, K., Joosen, W., De Decker, B.: Towards a software architecture for DRM. In: DRM 2005: Proceedings of the 5th ACM workshop on Digital rights management (2005)
Microsoft Next Generation Secure Computing Base, http://www.microsoft.com/resources/ngscb/default.mspx
Proudler, G.J.: Concepts of Trusted Computing. IEE Professional Applications of Computing Series, vol. 6 (2005)
Reid, J.F., Caelli, W.J.: DRM, Trusted Computing and Operating System Architecture (2005)
Trusted Computing Group. TCG TPM Specification Version 1.2 (2006), Revision 94, https://www.trustedcomputinggroup.org/specs/TPM
Verslype, K., De Decker, B.: A Flexible and Open DRM construction. KULeuven dept. computer science, technical report (2006)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2006 IFIP International Federation for Information Processing
About this paper
Cite this paper
Verslype, K., De Decker, B. (2006). A Flexible and Open DRM Framework. In: Leitold, H., Markatos, E.P. (eds) Communications and Multimedia Security. CMS 2006. Lecture Notes in Computer Science, vol 4237. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11909033_16
Download citation
DOI: https://doi.org/10.1007/11909033_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-47820-1
Online ISBN: 978-3-540-47823-2
eBook Packages: Computer ScienceComputer Science (R0)