1 / 17

Digital Inheritance of Personal and Commercial Content Using DRM

Digital Inheritance of Personal and Commercial Content Using DRM. H. Li, NXP Research M. Petkovic, Philips Research CCNC’07 DRM workshop, Jan 11 2007. Content. Introduction Private content protection model using DRM Inheritance protocols Digital last will Conclusions.

calandra
Download Presentation

Digital Inheritance of Personal and Commercial Content Using DRM

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Digital Inheritance of Personal and Commercial Content Using DRM H. Li, NXP Research M. Petkovic, Philips Research CCNC’07 DRM workshop, Jan 11 2007

  2. Content • Introduction • Private content protection model using DRM • Inheritance protocols • Digital last will • Conclusions

  3. More will be protected for privacy and for copyright Hackers & Users & Observers People own and manage exploding amount of digital content in the whole life • Personal content and commercial content • Personal digital history: photos and video, health info, financial info, behaviours, … • Music, movies…

  4. How to regulate inheritance of digital property? • Traditional ways insufficient • Free copy or paper last will: usage rights issues • Not easy for managing a huge collection • Traditional ways may fail for confidential content protected by cryptography • His keys, private knowledge and biometric authentication may be lost forever, if a person is dead

  5. Secure digital inheritance solutions are required • Requirements: • Trusted posthumous transaction of the inheritance • Secure process for encrypted personal confidential content • Secure process for transferring usage rights of commercial content • Options for testator to assign conditions and rights to a beneficiary for a particular digital bequest • Non-repudiation • Ease of use

  6. Content • Introduction • Private content protection model using DRM • Inheritance protocols • Digital last will • Conclusions

  7. Private content protection model using DRM • Personal keys and license process capability are in compliant devices • Ownership secured in Owner Licenses • Owner License (OL): full rights, incl. to grant rights to others • User License (UL): usage rights given by the owner

  8. Owner 1 grants ‘takeOwnership’ UL Owner 2 takes ownership Owner 2 asks to clean-up the old ownership Owner 1 cleans the old ownership Ownership and ownership transfer ULx : TakeOwnership UL ULClean : Clean-up UL Secured by compliant personal devices (keys)

  9. Content • Introduction • Private content protection model using DRM • Inheritance protocols • Digital last will • Conclusions

  10. Digital Inheritance Protocols • Principles for inheritance of digital content using DRM • by adding inheritance information (including conditions) to content licenses • by binding activation of inheritance to a death certificate • Two examples of protocols for personal content • One example for commercial content

  11. Inheritance protocols of personal content (1) • Put inheritance information in an ownership license and coupling inheritance activation with the death certificate of the testator

  12. Inheritance protocols of personal content (2) • Put inheritance information in a usage license and coupling inheritance activation with the death certificate of the testator

  13. Inheritance of commercial content • Append an additional license with inheritance information and conditions

  14. Content • Introduction • Private content protection model using DRM • Inheritance protocols • Digital last will • Conclusions

  15. Using a digital last will • Using containers to secure the rights-transfer licenses • Selected executor / TTP opens the containers with the death certificate • Beneficiaries complete the inheritance using the right-transfer licenses

  16. Conclusions • Secure inheritance solutions required for protected digital content • Several protocols presented for transferring the ownership and usage rights posthumously • A digital last will solution presented • More work needed to introduce ownership and inheritance protocols in a real DRM standard / system

More Related