Building secure software-based DRM systems

نویسندگان

  • Gisle Grimen
  • Christian Mönch
  • Roger Midtstraum
چکیده

Software-based DRM systems promise fast access to a large market. But for a long time it has been assumed that software-based DRM systems are inherently insecure and should not be used for high quality content. We present a way to build secure software-based DRM systems. After analysing the weaknesses of current DRM systems we devise a strategy for the construction of software-based DRM systems that are capable of withstanding a large variety of attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Sound proofs of authorship and distribution of digital rights

Secure distribution and protection of digital content has become a crucial problem in the Digital Millennium. Digital Rights Management (DRM) systems are technical means for the secure distribution, processing and consumption of digital content. The major driving force behind the research, development and deployment of DRM systems are the music and film industries, seeking for technical means t...

متن کامل

Knowledge Based Security Using Drm

To take precautionary secures to the software is combat work. The analysis of avoiding the unauthorized access to the software will be done by the knowledge based security using Digital Rights Management. DRM is a standard code. The DRM will embed with source code which will protect from piracy. Knowledge based DRM and biometric based DRM are the two methods using in security process. In the pr...

متن کامل

Nonius: Implementing a DRM Extension to an XML Browser

The paper describes experiences, ideas, and problems that were discovered while developing a digital rights management (DRM) extension to an XML browser. The supported rights description language is ODRL. The most significant implemented features are restrictions related to an individual, time, and usage-counts. On the other hand, some interesting features were intentionally left out. They incl...

متن کامل

Anonymous Pairing-Free and Certificateless Key Exchange Protocol for DRM System

Mostly, current security architectures for Digital rights management (DRM) systems use either Public Key Cryptography (PKC) or Identity-based Public Key Cryptography (ID-PKC). However, PKC has a complex certificate management and ID-PKC has a key escrow problem. Certificateless Public Key Cryptography (CL-PKC) has some attractive properties which seem compatible with the requirements of DRM sys...

متن کامل

A Foundation for Secure Mobile DRM Embedded Security

D igital Rights Management (DRM) is a compelling reason to enhance security of mobile phones against attacks by the phone holder. DRM systems allow content owners to specify and control the usage policy for their content; such systems are crucial for the entertainment industry and for secure information handling in corporate environments. Modern Smartphone’s have more memory and computing power...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006