A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
The Internet is changing the music industry
Communications of the ACM
IEEE Spectrum - Biological warfare canaries
Digital Rights Management: Business and Technology
Digital Rights Management: Business and Technology
Bluetooth: Technology for Short-Range Wireless Apps
IEEE Internet Computing
IEEE Micro
Napster: A Walking Copyright Infringement?
IEEE Micro
Golden Times for Digital Rights Management?
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Efficient State Updates for Key Management
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Implications of Digital Rights Management for Online Music - A Business Perspective
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Secure Open Systems for Protecting Privacy and Digital Services
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Privacy Engineering for Digital Rights Management Systems
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Future Mobile Phones--Complex Design Challenges from an Embedded Systems Perspective
ICECCS '01 Proceedings of the Seventh International Conference on Engineering of Complex Computer Systems
The mobile phone meets the Internet
IEEE Spectrum
Digital rights management and watermarking of multimedia content for m-commerce applications
IEEE Communications Magazine
Import/export in digital rights management
Proceedings of the 4th ACM workshop on Digital rights management
Digital rights management using a mobile phone
Proceedings of the ninth international conference on Electronic commerce
Hardware organization to achieve high-speed elliptic curve cryptography for mobile devices
Mobile Networks and Applications
The impact of incentive mechanisms in multi-channel mobile music distribution
Multimedia Tools and Applications
An architecture to easily produce adventure and movie games for the mobile scenario
Computers in Entertainment (CIE) - Theoretical and Practical Computer Applications in Entertainment
Authorised domain management using location based services
Mobility '07 Proceedings of the 4th international conference on mobile technology, applications, and systems and the 1st international symposium on Computer human interaction in mobile technology
A secure and traceable E-DRM system based on mobile device
Expert Systems with Applications: An International Journal
DRM domain authentication using electronic payment systems
Proceedings of the 10th international conference on Electronic commerce
Digital contents interoperability between diverse DRM systems in mobile environment
CSECS'08 Proceedings of the 7th conference on Circuits, systems, electronics, control and signal processing
Digital rights management using a master control device
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
A digital rights management model for healthcare
POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
DRM architecture for mobile VOD services
MRCS'06 Proceedings of the 2006 international conference on Multimedia Content Representation, Classification and Security
A tag-based data model for privacy-preserving medical applications
EDBT'06 Proceedings of the 2006 international conference on Current Trends in Database Technology
Mobile music distribution: a multichannel approach
Advances in Multimedia
Strong authentication with mobile phone
ISC'12 Proceedings of the 15th international conference on Information Security
Hi-index | 0.00 |
In this paper we examine how copyright protection of digital items can be securely managed in a 3G mobile phone and other devices. First, the basic concepts, strategies, and requirements for digital rights management are reviewed. Next, a framework for protecting digital content in the embedded environment of a mobile phone is proposed and the elements in this system are defined. The means to enforce security in this system are described and a novel "Family Domain" approach to content management is introduced. Our new approach uses key sharing to help alleviate bad user experiences that are associated with some rights management systems. Examples outlining the enrollment of devices and the acquisition, rendering, and superdistribution of content are shown. Our proposed system is not only applicable to a mobile phone system, but may also be extended to other embedded systems, such as personal digital assistants, set-top boxes, or personal computers.