Digital rights management in a 3G mobile phone and beyond
Proceedings of the 3rd ACM workshop on Digital rights management
A DRM security architecture for home networks
Proceedings of the 4th ACM workshop on Digital rights management
Measuring round trip times to determine the distance between WLAN nodes
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
DRM domain authentication using electronic payment systems
Proceedings of the 10th international conference on Electronic commerce
Preventing information leakage between collaborating organisations
Proceedings of the 10th international conference on Electronic commerce
Sharing but Protecting Content Against Internal Leakage for Organisations
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
An efficient contents sharing method for DRM
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
AtDRM: a DRM architecture with rights transfer and revocation capability
Proceedings of the 6th ACM India Computing Convention
Hi-index | 0.01 |
This paper focuses on the problem of preventing illegal copying of digital assets without jeopardising the right of legitimate licence holders to transfer content between their own devices, which make up a domain. Our novel idea involves the use of a domain-specific mobile phone and the mobile phone network operator to authenticate the domain owner before devices can join a domain. This binds devices in a domain to a single owner, that, in turn, enables the binding of domain licences to the domain owner. In addition, the way in which we control domain membership, and the use of the domain-specific mobile phone that enables a domain owner to add devices wherever he/she is physically present, ensures that devices joining the domain are in physical proximity to the mobile phone, preventing illicit content proliferation.