Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1282100.1282138acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicecConference Proceedingsconference-collections
Article

Digital rights management using a mobile phone

Published: 19 August 2007 Publication History

Abstract

This paper focuses on the problem of preventing illegal copying of digital assets without jeopardising the right of legitimate licence holders to transfer content between their own devices, which make up a domain. Our novel idea involves the use of a domain-specific mobile phone and the mobile phone network operator to authenticate the domain owner before devices can join a domain. This binds devices in a domain to a single owner, that, in turn, enables the binding of domain licences to the domain owner. In addition, the way in which we control domain membership, and the use of the domain-specific mobile phone that enables a domain owner to add devices wherever he/she is physically present, ensures that devices joining the domain are in physical proximity to the mobile phone, preventing illicit content proliferation.

References

[1]
3rd Generation Partnership Project. 3GPP TS 21.133 - 3G Security; Security Threats and Requirements. Specification version 4.1.0 Release 4, December 2001.
[2]
3rd Generation Partnership Project. 3GPP TS 33.120 - 3G Security; Security Principles and Objectives. Specification version 4.0.0 Release 4, March 2001.
[3]
3rd Generation Partnership Project. 3GPP TS 33.908 - General Report on the Design, Specification and Evaluation of 3GPP Standard Confidentiality and Integrity Algorithms. Specification version 4.0.0 Release 4, September 2001.
[4]
3rd Generation Partnership Project. 3GPP TS 33.102 - 3G Security; Security architecture. Specification version 7.0.0 Release 7, December 2005.
[5]
3rd Generation Partnership Project. 3GPP TS 33.220 - Generic Authentication Architecture (GAA) - System Description. Specification version 7.0.0 Release 7, March 2006.
[6]
3rd Generation Partnership Project. 3GPP TS 33.919 - Generic Authentication Architecture (GAA) - Generic Bootstrapping Architecture. Specification version 7.4.0 Release 7, June 2006.
[7]
Imad Abbadi. Digital asset protection in personal private networks. In 8th International Symposium on Systems and Information Security (SSI 2006), Sao Jose dos Campos, Sao Paulo, Brazil, November 2006.
[8]
E. A. Dabbish and T. S. Messerges. Digital rights management in a 3G mobile phone and beyond. In Joan Feigenbaum, Tomas Sander, and Moti Yung, editors, Proceedings of the 3rd ACM workshop on Digital Rights Management, pages 27--38. ACM Press, NY, 2003.
[9]
Eimear Gallery and Allan Tomlinson. Secure delivery of conditional access applications to mobile receivers. In Chris J. Mitchell, editor, Trusted Computing, chapter 7, pages 195--237. IEE, 2005.
[10]
Trusted Computing Group. Trusted platform module FAQ.
[11]
André Günther and Christian Hoene. Measuring round trip times to determine the distance between WLAN nodes. In Raouf Boutaba, Kevin C. Almeroth, Ramn Puigjaner, Sherman X. Shen, and James P. Black, editors, Proceedingsof 4th International IFIP-TC6 Networking Conference, Waterloo, Canada, volume 3462 of Lecture Notes in Computer Science, pages 768--779. Springer-Verlag, Berlin, May 2005.
[12]
Bradley Huffaker, Marina Fomenkov, Daniel J. Plummer, David Moore, and K. Claffy. Distance metrics in the Internet. In IEEE International Telecommunications Symposium, 2002. http://www.caida.org/publications/papers/2002/Distance/.
[13]
IBM Research Division Almaden Research Center. xCP cluster protocol, 2003. http://www-03.ibm.com/solutions/digitalmedia/doc/content/bin/xCPWhitepaper_final_1.pdf.
[14]
International Organization for Standardization. ISO/IEC 9798-3, Information technology - Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques, 2nd edition, 1998.
[15]
International Organization for Standardization. ISO/IEC 21481: Information technology - Telecommunications andinformation exchange between systems - Near Field Communication Interface and Protocol-2 (NFCIP-2), 2005.
[16]
International Organization for Standardization. ISO/IEC 18033-2, Information technology - Security techniques - Encryption algorithms - Part 2: Asymmetric ciphers, 2006.
[17]
International Organization for Standardization. ISO/IEC 2nd CD 19772, Information technology - Security techniques - Authenticated encryption mechanisms, 2006.
[18]
H. Krawczyk, M. Bellare, and R. Canetti. HMAC: keyed-hashing for message authentication. RFC 2104, Internet Engineering Task Force, February 1997.
[19]
M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP. RFC 2560, Internet Engineering Task Force, June 1999.
[20]
A. Niemi and J. Arkko. Hypertext transfer protocol (HTTP) digest authentication using authentication and key agreement (AKA). RFC 3310, Internet Engineering Task Force, September 2002.
[21]
Open Mobile Alliance. DRM Specification - Version 2.0, 2006.
[22]
B. C. Popescu, F. L. A. J. Kamperman, B. Crispo, and A. S. Tanenbaum. A DRM security architecture for home networks. In Joan Feigenbaum, Tomas Sander, and Moti Yung, editors, Proceedings of the 4th ACM workshop on Digital Rights Management, pages 1--10. ACM Press, NY, 2004.
[23]
Thomson. SmartRight technical white paper, 2003. http://www.smartright.org/images/SMR/content/SmartRight_tech_whitepaper_jan28.pdf.
[24]
Trusted Computing Group. TPM Main, Part 1, Design Principles. Specification version 1.2 Revision 94, 2006.
[25]
Trusted Computing Group. TPM Main, Part 2, TPM Structures. Specification version 1.2 Revision 94, 2006.
[26]
Trusted Computing Group. TPM Main, Part 3, Design Principles. Specification version 1.2 Revision 94, 2006.

Cited By

View all
  • (2018)Security of Distance-BoundingACM Computing Surveys10.1145/326462851:5(1-33)Online publication date: 25-Sep-2018
  • (2018)A Survey and Taxonomy of Core Concepts and Research Challenges in Cross-Platform Mobile DevelopmentACM Computing Surveys10.1145/324173951:5(1-34)Online publication date: 19-Nov-2018
  • (2018)A Survey of Cloudlet-Based Mobile Augmentation Approaches for Resource OptimizationACM Computing Surveys10.1145/324173851:5(1-28)Online publication date: 19-Nov-2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICEC '07: Proceedings of the ninth international conference on Electronic commerce
August 2007
482 pages
ISBN:9781595937001
DOI:10.1145/1282100
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 19 August 2007

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. 3GPP GAA
  2. DRM
  3. access control
  4. authorised domain management
  5. copyright protection
  6. trusted computing

Qualifiers

  • Article

Conference

ICEC07

Acceptance Rates

Overall Acceptance Rate 150 of 244 submissions, 61%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 27 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2018)Security of Distance-BoundingACM Computing Surveys10.1145/326462851:5(1-33)Online publication date: 25-Sep-2018
  • (2018)A Survey and Taxonomy of Core Concepts and Research Challenges in Cross-Platform Mobile DevelopmentACM Computing Surveys10.1145/324173951:5(1-34)Online publication date: 19-Nov-2018
  • (2018)A Survey of Cloudlet-Based Mobile Augmentation Approaches for Resource OptimizationACM Computing Surveys10.1145/324173851:5(1-28)Online publication date: 19-Nov-2018
  • (2018)A Manifesto for Future Generation Cloud ComputingACM Computing Surveys10.1145/324173751:5(1-38)Online publication date: 19-Nov-2018
  • (2018)Survey on Computational Trust and Reputation ModelsACM Computing Surveys10.1145/323600851:5(1-40)Online publication date: 19-Nov-2018
  • (2018)A Survey on Game-Theoretic Approaches for Intrusion Detection and Response OptimizationACM Computing Surveys10.1145/323284851:5(1-31)Online publication date: 22-Aug-2018
  • (2018)Host-Based Intrusion Detection System with System CallsACM Computing Surveys10.1145/321430451:5(1-36)Online publication date: 19-Nov-2018
  • (2017)Generic and agile service function chain verification on cloud2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS)10.1109/IWQoS.2017.7969150(1-10)Online publication date: Jun-2017
  • (2017)Which DRM grade could BYOD users employ? A differentiated DRM service between the cloud and mobile devices2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS)10.1109/IWQoS.2017.7969124(1-6)Online publication date: Jun-2017
  • (2017)Enabling accurate and efficient modeling-based CPU power estimation for smartphones2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS)10.1109/IWQoS.2017.7969112(1-10)Online publication date: Jun-2017
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media