A personal mobile DRM manager for smartphones

نویسندگان

  • Siddharth Bhatt
  • Radu Sion
  • Bogdan Carbunar
چکیده

In this paper we report on our experience in building the experimental Personal Digital Rights Manager for Motorola smart phones, an industry first. Digital Rights Management allows producers or owners of digital content to control the manner in which the content is consumed. This may range from simply preventing duplication to finer access policies such as restricting who can use the content, on what devices, and for how long. In most commercial DRM systems, the average end user plays the role of content consumer, using DRM protected content made available by a service. Here we present a personal digital rights system for mobile devices where the end user has the ability to place DRM protection and controls on his or her own personal content. We designed the personal DRM system to allow users of a mobile device to transparently define controls and generate licenses on custom content and securely transfer them to other mobile devices. A user is able to define and restrict the intended audience and ensure expiration of the content as desired. Compatible devices automatically detect each other and exchange credentials. The personal DRM system on each device safely enforces the content Supported by Motorola, NSF (IIS-0803197, CNS-0627554,0716608,0708025), IBM, Xerox, CEWIT. Preprint submitted to Computers & Security March 3, 2009 usage rules and also handles moving licenses between devices while preventing leakage of content. We implemented a prototype of our system on Motorola E680i smartphones.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

کاربرد رایانه‌های جیبی و تلفن‌های هوشمند در دسترسی به اطلاعات سلامت

Background and Aim: Today, one of the challenges of doctors is how they can access medical information as quick as possible. Personal Digital Assistants (PDAs) and Smartphones are such information technologies that can be used to access health information. This study aimed to review the most important uses of Personal Digital Assistants and Smartphones in medicine and in accessing health inform...

متن کامل

NEMESYS: First Year Project Experience in Telecom Italia Information Technology

Nowadays smartphones are ubiquitous, their usage continues to grow all over the world. With the International Telecommunication Union (ITU) estimating global mobile subscriptions at 6 billion at the end of 2011, it is calculated that global smartphones penetration is now 16.7 percent [7]. Smartphones are devices built on full-fledged operating systems, with advanced computing capabilities and e...

متن کامل

Using OMA DRM 2.0 Protected Content - Ogg Vorbis Protected Audio under Symbian OS

The lack of control inherent to digital content has been put on the spotlight by copyright infringement coupled with massive content distribution online (e.g., Peer-to-Peer). Digital Rights Management seems to be the solution to counter this problem advocating the use of cryptography and other related security mechanisms to protect digital content and to associate rights with it which determine...

متن کامل

Guohong Cao Mobile Web Browsing Using the Cloud

This chapter introduces the technical challenges arising from supporting web browsing on smartphones. For ease of understanding and further discussions, we briefly describe existing techniques on reducing the access delay and power consumption of smartphones. Then, we propose a new architecture, called Virtual Machine-based Proxy (VMP), which aims to shift the computationally intensive web brow...

متن کامل

The Rise of Ubiquitous Instrumentation

POPULARITY AND ECONOMIES OF SCALE Mobile phones overtook personal computers in popularity in 2013. Today, an estimated 22% of the world’s population owns a mobile phone, while 20% owns a personal computer. In western societies, mobile phones are used by more than 90% of the population, and developing nations are quickly catching up. The economies of scale involved in manufacturing billions of s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computers & Security

دوره 28  شماره 

صفحات  -

تاریخ انتشار 2009