How to prove where you are: tracking the location of customer equipment
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
GSM and Umts: The Creation of Global Mobile Communications
GSM and Umts: The Creation of Global Mobile Communications
Low Cost Attacks on Tamper Resistant Devices
Proceedings of the 5th International Workshop on Security Protocols
CEC '05 Proceedings of the Seventh IEEE International Conference on E-Commerce Technology
DVD Demystified
Design principles for tamper-resistant smartcard processors
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
Location constraints in digital rights management
Computer Communications
A ticket based digital rights management model
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Hi-index | 0.00 |
We present the problem of enforcing a Digital Rights Management (DRM) system that needs to consider location-dependent licensing policies and operates on top of existing conditional access standards. A major application for location-dependent DRM is Pay-TV broadcasting as rightsholders require different business models in different regions. A global provider's enduser equipment needs to validate the user location in some way in order to enforce DRM in this scenario. We will depict several solutions to the problem and compare their security qualities. The main result is that trusted computing hardware may not be the most appropriate solution given reasonable conditions.