Digital inheritance of personal and commercial content using drm
This presentation is the property of its rightful owner.
Sponsored Links
1 / 17

Digital Inheritance of Personal and Commercial Content Using DRM PowerPoint PPT Presentation


  • 160 Views
  • Uploaded on
  • Presentation posted in: General

Digital Inheritance of Personal and Commercial Content Using DRM. H. Li, NXP Research M. Petkovic, Philips Research CCNC’07 DRM workshop, Jan 11 2007. Content. Introduction Private content protection model using DRM Inheritance protocols Digital last will Conclusions.

Download Presentation

Digital Inheritance of Personal and Commercial Content Using DRM

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Digital inheritance of personal and commercial content using drm

Digital Inheritance of Personal and Commercial Content Using DRM

H. Li, NXP Research

M. Petkovic, Philips Research

CCNC’07 DRM workshop, Jan 11 2007


Content

Content

  • Introduction

  • Private content protection model using DRM

  • Inheritance protocols

  • Digital last will

  • Conclusions


People own and manage exploding amount of digital content in the whole life

  • More will be protected for privacy and for copyright

Hackers & Users

& Observers

People own and manage exploding amount of digital content in the whole life

  • Personal content and commercial content

    • Personal digital history: photos and video, health info, financial info, behaviours, …

    • Music, movies…


How to regulate inheritance of digital property

How to regulate inheritance of digital property?

  • Traditional ways insufficient

    • Free copy or paper last will: usage rights issues

    • Not easy for managing a huge collection

  • Traditional ways may fail for confidential content protected by cryptography

    • His keys, private knowledge and biometric authentication may be lost forever, if a person is dead


Secure digital inheritance solutions are required

Secure digital inheritance solutions are required

  • Requirements:

    • Trusted posthumous transaction of the inheritance

    • Secure process for encrypted personal confidential content

    • Secure process for transferring usage rights of commercial content

    • Options for testator to assign conditions and rights to a beneficiary for a particular digital bequest

    • Non-repudiation

    • Ease of use


Content1

Content

  • Introduction

  • Private content protection model using DRM

  • Inheritance protocols

  • Digital last will

  • Conclusions


Private content protection model using drm

Private content protection model using DRM

  • Personal keys and license process capability are in compliant devices

  • Ownership secured in Owner Licenses

    • Owner License (OL): full rights, incl. to grant rights to others

    • User License (UL): usage rights given by the owner


Ownership and ownership transfer

Owner 1 grants ‘takeOwnership’ UL

Owner 2 takes ownership

Owner 2 asks to clean-up the old ownership

Owner 1 cleans the old ownership

Ownership and ownership transfer

ULx : TakeOwnership UL

ULClean : Clean-up UL

Secured by compliant personal devices (keys)


Content2

Content

  • Introduction

  • Private content protection model using DRM

  • Inheritance protocols

  • Digital last will

  • Conclusions


Digital inheritance protocols

Digital Inheritance Protocols

  • Principles for inheritance of digital content using DRM

    • by adding inheritance information (including conditions) to content licenses

    • by binding activation of inheritance to a death certificate

  • Two examples of protocols for personal content

  • One example for commercial content


Inheritance protocols of personal content 1

Inheritance protocols of personal content (1)

  • Put inheritance information in an ownership license and coupling inheritance activation with the death certificate of the testator


Inheritance protocols of personal content 2

Inheritance protocols of personal content (2)

  • Put inheritance information in a usage license and coupling inheritance activation with the death certificate of the testator


Inheritance of commercial content

Inheritance of commercial content

  • Append an additional license with inheritance information and conditions


Content3

Content

  • Introduction

  • Private content protection model using DRM

  • Inheritance protocols

  • Digital last will

  • Conclusions


Using a digital last will

Using a digital last will

  • Using containers to secure the rights-transfer licenses

  • Selected executor / TTP opens the containers with the death certificate

  • Beneficiaries complete the inheritance using the right-transfer licenses


Conclusions

Conclusions

  • Secure inheritance solutions required for protected digital content

  • Several protocols presented for transferring the ownership and usage rights posthumously

  • A digital last will solution presented

  • More work needed to introduce ownership and inheritance protocols in a real DRM standard / system


  • Login