1 / 9

A Trusted Key Management Scheme for Digital Rights Management

A Trusted Key Management Scheme for Digital Rights Management. Yeonjeong Jeong, Kisiong Yoon, and Jaecheol Ryou. ETRI Journal, Volume 27, Number 1,February 2005. Outline. Introduction DRM system Trusted Key Management Scheme Encryption Key Key Distribution Scheme Key Delivery Scheme

will
Download Presentation

A Trusted Key Management Scheme for Digital Rights Management

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Trusted Key Management Scheme for Digital Rights Management Yeonjeong Jeong, Kisiong Yoon, and Jaecheol Ryou ETRI Journal, Volume 27, Number 1,February 2005

  2. Outline • Introduction • DRM system • Trusted Key Management Scheme • Encryption Key • Key Distribution Scheme • Key Delivery Scheme • Conclusion

  3. Introduction • Digital rights management adopts a license-based mechanism which separates the keys from encrypted contents. • Digital rights management do not provide a way to protect a digital content form the license server.

  4. DRM system

  5. Encryption Key • The digital content is encrypted with a symmetric keys. • To protect against the illegal use of symmetric keys, the seeds of symmetric keys are encrypted with a public key.

  6. Key Distribution Scheme

  7. Key Delivery Scheme Key delivery when packaging

  8. Key Delivery Scheme Key delivery when content service is provided

  9. Conclusion • The proposed scheme protects the key from not only the purchaser but also other principals.

More Related