Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2072298.2072009acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
short-paper

Once upon a time, i bought a movie and it played everywhere in my home

Published: 28 November 2011 Publication History

Abstract

As digital media replaces analog, consumers are beginning to discover that their devices no longer interoperate in the way they are accustomed to. For example, they may find it impossible to transfer a DVR-recorded show onto a portable media player from a different manufacturer. Content creators are weary of supporting myriad ecosystems, each with different rules, restrictions, DRM systems, and file formats. To address these issues, IBM has developed the Advanced Secure Content Cluster Technology (ASCCT), which provides the highest levels of DRM protections for content owners, while at the same time being completely invisible to the user, allowing them to freely move, play, and backup content from any and all ASCCT devices within their home network. We describe the plug-and-play automatic construction of an interoperable secure cluster of heterogeneous devices using a minimal message protocol.

References

[1]
Advanced Access Content System, http://www.aacsla.com/specifications
[2]
A. Fiat, M. Naor, "Broadcast Encryption", Advances in Cryptography (Crypto 93), Lecture Notes in Computer Science 773, Springer-Verlag, New York, pp.480--491
[3]
D. Naor, M. Naor, and J. Lotspiech, "Revocation and Tracing Routines for Stateless Receivers," Advances in Cryptology (Crypto 2000), Lecture Notes in Computer Science 2139, Springer-Verlag, New York, 2001, pp. 41--62.
[4]
G. Deen, D Ponceleon, Donald Leake Jr, "Broadcast Encryption: Paving the Road to Practical Content Protection Systems", SPIE, January, 2009 San Jose CA

Index Terms

  1. Once upon a time, i bought a movie and it played everywhere in my home

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MM '11: Proceedings of the 19th ACM international conference on Multimedia
    November 2011
    944 pages
    ISBN:9781450306164
    DOI:10.1145/2072298
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 28 November 2011

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. ascct
    2. audio/video
    3. broadcast encryption
    4. consumer electronics
    5. content protection
    6. digital media
    7. home networking
    8. interoperability
    9. nnl
    10. security classes

    Qualifiers

    • Short-paper

    Conference

    MM '11
    Sponsor:
    MM '11: ACM Multimedia Conference
    November 28 - December 1, 2011
    Arizona, Scottsdale, USA

    Acceptance Rates

    Overall Acceptance Rate 2,145 of 8,556 submissions, 25%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 135
      Total Downloads
    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 06 Jan 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media