Controlled Sharing of Personal Content using Digital Rights Management - PowerPoint PPT Presentation

1 / 32
About This Presentation
Title:

Controlled Sharing of Personal Content using Digital Rights Management

Description:

Controlled Sharing of Personal Content using Digital Rights Management. Claudine Conrado, Milan Petkovic, Michiel van der Veen and Wytse van der Velde ... – PowerPoint PPT presentation

Number of Views:80
Avg rating:3.0/5.0
Slides: 33
Provided by: Conr4
Category:

less

Transcript and Presenter's Notes

Title: Controlled Sharing of Personal Content using Digital Rights Management


1
Controlled Sharing of Personal Content using
Digital Rights Management
  • Claudine Conrado, Milan Petkovic, Michiel van der
    Veen and Wytse van der Velde
  • ISS Department, Philips Research
  • Eindhoven, The Netherlands

2
Overview
  • Digital content distribution
  • Digital Rights Management (DRM)
  • Extended DRM for personal content
  • Components and architecture
  • Content protection
  • Content sharing
  • Registration of content
  • Private ownership of content
  • Conclusions

3
Digital content distribution
  • Digital content distribution is an emerging
    business for commercial content providers
  • So commercial content distribution requires
    measures to prevent illegal content distribution
  • Digital Rights Management
  • Technology providing content protection by
    enforcing the use of digital content according to
    granted rights

4
Digital content distribution
  • Trend digital personal content nowadays is
    produced in large scales by users
  • Personal content
  • requires distribution and management tools, and
  • it is usually (very) private
  • Controlled sharing of personal content Reuse
    (concepts of) a commercial DRM

5
Extended commercial DRM
  • Requirements
  • It is essential that the commercial DRM system
    security is not compromised
  • Given the security requirements, the privacy of
    users should be preserved as much as possible

6
A DRM system for commercial and personal content
7
Extended DRM for personal content
  • DRM main components

8
Extended DRM for personal content
  • Certificate Hierarchy

9
Content protection and sharing
10
Content protection
Usually the users device
User who owns the content
1. User A authenticates with the compliant device
11
Content protection
2. The compliant device creates the content
container, the Content Right and User Right for
user A.
12
Content sharing
Device where content is accessed
3. A compliant device obtains the relevant
certificates as well as the content container.
13
Content sharing
User who is given the right to access the content
4. User B authenticates with the compliant device.
14
Content sharing
5. The compliant device checks all certificates
before giving user B access to the content.
15
How is content registered?
16
Content registration
  • Goals of registration
  • to securely establish content ownership (so that
    the user can act as content provider of her own
    content)
  • to check the content (to prevent that a user
    introduces in the system illegal content, i.e.,
    content that does not belong to her)

17
Content registration
1. The user imports the content into her
compliant device, which calculates the content
fingerprint.
18
Content registration
2. The compliant device provides the Service
Provider Authority (SPA) with the content
fingerprint and users identity.
19
Content registration
3. The SPA matches the fingerprint against a
database of fingerprints of known commercial and
registered personal content.
20
Content registration
A watermark identifier may be optionally
generated.
  • 4. When there is no match, the SPA generates
  • a database entry linking the user and the
    content, and
  • a Content ID Certificate.

21
Content registration
5. The SPA sends the Content ID Certificate (and
the watermark identifier, if used) to the
compliant device.
22
Content registration
When watermarks are used, the device embeds the
watermark identifier into the content.
6. Finally, all necessary certificates are
created to make the content suitable for
distribution in the DRM system.
23
Content registration
  • Security against import of illegal content
  • Fingerprint check prevents a user from
    introducing known content into the system
  • DRM infrastructure allows tracking of a
    dishonest user who distributes the content
  • Watermark extraction allows forensic tracking
    outside the DRM system

24
And what about the users privacy?
25
Private content ownership
  • Pseudonyms content registration
  • A user may register content so that there is no
    link between her real identity and the content
  • The user may also require that all her content
    items cannot be linked to one another
  • Controlled anonymity the user is anonymous
    towards all parties, except the SPA

26
Pseudonymous content registration
  • Assume a cryptographic system where the
    public/private key pair is built as
  • the private key is x , and
  • the public key is h gx ,
  • where g is a group generator in that system
  • The SPA generates a different public key h (a
    new pseudonym) for each piece of content
    registered by the user by
  • choosing a random value a , and
  • calculating h ha, with the new private key
    being x xa

27
Pseudonymous content registration
  • When there is no match in fingerprints, the SPA
  • generates the random value a ,
  • computes the users pseudonym h
  • h gt Content ID Cert
  • a gt database entry

28
Pseudonymous content registration
  • The SPA sends to the compliant device
  • the Content ID Certificate,
  • the random value a

29
Pseudonymous content registration
  • Content is anonymously introduced into the DRM
    system
  • h content providers identity
  • However, the user is still accountable via the
    SPA

30
Concluding..
31
Conclusions
  • Commercial DRM system is extended to handle also
    personal content, allowing users to controllably
    share their content
  • Content registration is performed to establish
    content ownership and prevent illegal import of
    content
  • Users may remain anonymous in the system, but
    anonymity is revocable gt likely to be a
    requirement on the part of commercial content
    providers

32
(No Transcript)
Write a Comment
User Comments (0)
About PowerShow.com