7 research outputs found

    A proposal on open DRM system coping with both benefits of rights-holders and users

    Get PDF

    Provable Secure and Efficient Digital Rights Management Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography

    Get PDF
    Since the concept of ubiquitous computing is firstly proposed by Mark Weiser, its connotation has been extending and expanding by many scholars. In pervasive computing application environment, many kinds of small devices containing smart cart are used to communicate with others. In 2013, Yang et al. proposed an enhanced authentication scheme using smart card for digital rights management. They demonstrated that their scheme is secure enough. However, Mishra et al. pointed out that Yang et al.’s scheme suffers from the password guessing attack and the denial of service attack. Moreover, they also demonstrated that Yang et al.’s scheme is not efficient enough when the user inputs an incorrect password. In this paper, we analyze Yang et al.’s scheme again, and find that their scheme is vulnerable to the session key attack. And, there are some mistakes in their scheme. To surmount the weakness of Yang et al.’s scheme, we propose a more efficient and provable secure digital rights management authentication scheme using smart card based on elliptic curve cryptography

    A proposal on open DRM system coping with both benefits of rights-holders and users

    No full text

    Digital Rights Management and the Process of Fair Use

    Get PDF
    Producers of digital media works increasingly employ technological protection measures, commonly referred to as digital rights management (or DRM ) technologies, that prevent the works from being accessed or used except upon conditions the producers themselves specify. These technologies have come under criticism for interfering with the rights users enjoy under copyright law, including the right to engage in fair uses of the DRM-protected works. Most DRM mechanisms are not engineered to include exceptions for fair use, and user circumvention of the DRM may violate the Digital Millennium Copyright Act even if the use for which the circumvention occurs is itself noninfringing. The academic literature on fair use in digital media has suggested several possible ways to resolve the tension between fair use on the one hand and DRM on the other. Among the more provocative possibilities is that DRM technologies themselves may evolve to incorporate greater built-in protections for end-user rights. This article examines several such proposals and finds that they are not likely to provide users with the same measure of protections for fair use of copyrighted works that exists in the offline world. The failure of these proposals, however, does not suggest that the broader goal of protecting fair use rights in digital media is unattainable. It is possible to advance much more closely towards that goal by altering the design philosophy of DRM technologies to focus more on the processes by which fair uses occur and less on attempting to replicate the substantive law of fair use in machine-administrable form. The article concludes by outlining one possible system engineered to protect the process of fair use

    iDRM - Interoperability Mechanisms for Open Rights Management Platforms

    Get PDF
    Today’s technology is raising important challenges in the Intellectual Property (IP) field in general and to Copyright in particular [Arkenbout et al., 2004]. The same technology that has made possible the access to content in a ubiquitous manner, available to everyone in a simple and fast way, is also the main responsible for the challenges affecting the digital content IP of our days [Chiariglione, 2000]. Technological solutions and legal frameworks were created to meet these new challenges. From the technological point of view, Rights Management Systems (RMS) and Copy Protection Systems (CPS) have been developed and deployed to try to cope with them. At first, they seemed to work however, their closed and non-interoperable nature and a growing number of wrong strategic business decisions, soon lead to a strong opposition. One of the strongest negative points is the lack of rights management interoperability [Geer, 2004]. The work presented on this thesis primarily addresses the RMS interoperability problems. The objective of the thesis is to present some possible mechanisms to improve the interoperability between the different existing and emerging rights management platforms [Guth, 2003a]. Several different possible directions to rights management interoperability are pointed in this thesis. One of the most important is openness. Interoperability between different rights management mechanisms can only be achieved if they are open up to a certain level. Based on this concept, an open rights management platform is designed and presented in this thesis. Also, some of the interoperability mechanisms are presented and explained. This platform makes usage of the emerging service-oriented architectures to provide a set of distributed rights management services. Rights management solutions rely heavily on the establishment of authenticated and trust environments between its different elements. While considering different RMS, the establishment of such trust environments can be somehow complex. This thesis provides a contribution to the establishment of interoperable RMS trust environments through the usage of Public-Key Infrastructure (PKI) mechanisms. Modern rights management systems have to handle with both keying material and licenses which are used mostly to define how content is governed by the system. Managing this is a complex and hard task when different rights management solutions are considered. This thesis presents and describes a generic model to handle the key and license management life cycle, that can be used to establish a global interoperable management solution between different RMS

    Digital Rights Management and the Rights of End-Users.

    Get PDF
    PhDDigital Rights Management systems (DRM) are frequently used by rightsholders in order to protect their works from the, very high indeed, possibility to be copied, altered or distributed without authorisation by users who take advantage of available state-of-the-art copying techniques. Because DRM are legally protected by anti-circumvention legislation both in the United States and in Europe, a debate goes on more than a decade now regarding their impact to the notion of “balance” among copyright stakeholders that traditionally underpinned copyright law. In this context, this study examines, in turn, the philosophical underpinnings of analogue and digital copyright law focusing of copyright exceptions, the development of a notion of a minimum of lawful personal use for the digital environment based on existing copyright exceptions and users’ expectations of personal use, and the impact of the use of DRM and of the introduction of anti-circumvention legislation to this notion. While the European Information Society Directive 2001/29/EC (EUCD) is the main legal instrument analysed and criticised, the role of other Directives is also examined to the extent they address the relationship between lawful personal use and anticircumvention legislation. Legal developments in the United States could not have been absent from this discussion since anti-circumvention legislation was introduced there much earlier than the EUCD and important case-law and legal commentaries have developed since. Following the identification of problems regarding the operation of a minimum of lawful personal use in digital settings, the proposal to introduce a right to engage in self-help circumvention afforded to users of DRM-protected works for Europe is put-forward. Such a right would not undermine rightsholders incentives to offer works online and develop new business models but would acknowledge the users’ interest to interact and tinker with digital works taking full advantage of the new possibilities offered by digitisation.Greek State Scholarships Foundation (SSF
    corecore