Ticket Based Identity System for DRM
نویسندگان
چکیده
One of the major stumbling blocks in achieving interoperability in DRM systems is due to the variety of different user authentication systems utilised by DRM systems. For example, in [6], the authors detailed how Microsoft’s Rights Management System fails in fulfilling its requirements mainly because of a lack of its user identity system. The authors discussed how, because one DRM system cannot authenticate users from another DRM system, it cannot offer interoperability, even if they shared the same data formats. Furthermore, interoperability for user authentication in DRM systems is further hampered by the wide range of devices that need to support DRM enabled data, but do not necessarily offer the same features. Decoupling of user identity from the main DRM system also reduces the chances of correlating users’ access patterns of protected works. This improves the privacy of users of DRM systems, another major criticisms of current DRM systems. In this paper we discuss the requirements for user identity in a DRM system and then introduce a Kerberos like reusable ticket based user identity system. This system allows multiple systems to be authenticated by the use of time limited authentication tickets, without requiring online authentication. Tickets can be stored at a central controlling point, which is also responsible for acquiring tickets from authentication servers and redistributing tickets to the devices that need the tickets. In our experience, our approach fulfils all the requirements and is a more scalable and inter-operable approach when compared to existing DRM systems. TICKET BASED IDENTITY SYSTEM FOR DRM
منابع مشابه
Identity Based Drm System with Total Anonymity and Device Flexibility Using Ibes
Most of the Digital Rights Management (DRM) systems fail to cover all requirements like user anonymity, user fairness, security and others. Device based DRM systems, adopted by most providers, lack user fairness and mostly follow proprietary formats. On the contrary, Smart Card DRM systems satisfy user anonymity and fairness, but have certain vulnerabilities, as identified in this paper. We pro...
متن کاملMistrust-Based Digital Rights Management
INTRODUCTION ....................................................................................... 48 I. WHY DIGITAL RIGHTS MANAGEMENT? .............................................. 51 A. Copy-Control DRM .................................................................. 51 B. Bundled Uses and Per-Use Pricing .......................................... 52 C. Patent-Royalty Collection ...........
متن کاملAnonymous Pairing-Free and Certificateless Key Exchange Protocol for DRM System
Mostly, current security architectures for Digital rights management (DRM) systems use either Public Key Cryptography (PKC) or Identity-based Public Key Cryptography (ID-PKC). However, PKC has a complex certificate management and ID-PKC has a key escrow problem. Certificateless Public Key Cryptography (CL-PKC) has some attractive properties which seem compatible with the requirements of DRM sys...
متن کاملConvertible Drm System Based on Identity-based Encryption
With the rapid growth of the Internet, acquiring digital contents over the Internet has become commonplace. Most traditional items can be translated into digital form. That is to say the digital contents can be distributed easily and rapidly to users over the Internet. Unfortunately, situations of piracy are common and become more serious, since the digital contents can be copied and distribute...
متن کاملMobile Broadcast DRM Based on User Identity Card
The current mobile broadcast systems do not provide efficient solution for consumption of service and content based on the user identity card such as a smartcard. This prevents users from consuming broadcast service and contents independent of a specific terminal (e.g., the one used for registration or purchase). To provide usage of broadcast services based on the user identity card, mutual aut...
متن کامل