9
A Trusted Key Management Scheme for Digital Rights Management ETRI Journal, Volume 27, Number 1,February 2005 Yeonjeong Jeong, Kisiong Yoon, and Jaecheol R you

A Trusted Key Management Scheme for Digital Rights Management ETRI Journal, Volume 27, Number 1,February 2005 Yeonjeong Jeong, Kisiong Yoon, and Jaecheol

Embed Size (px)

Citation preview

Page 1: A Trusted Key Management Scheme for Digital Rights Management ETRI Journal, Volume 27, Number 1,February 2005 Yeonjeong Jeong, Kisiong Yoon, and Jaecheol

A Trusted Key Management Scheme for Digital Rights Management

ETRI Journal, Volume 27, Number 1,February 2005

Yeonjeong Jeong, Kisiong Yoon, and Jaecheol Ryou

Page 2: A Trusted Key Management Scheme for Digital Rights Management ETRI Journal, Volume 27, Number 1,February 2005 Yeonjeong Jeong, Kisiong Yoon, and Jaecheol

OutlineIntroductionDRM systemTrusted Key Management Scheme

Encryption Key Key Distribution Scheme Key Delivery Scheme

Conclusion

Page 3: A Trusted Key Management Scheme for Digital Rights Management ETRI Journal, Volume 27, Number 1,February 2005 Yeonjeong Jeong, Kisiong Yoon, and Jaecheol

Introduction Digital rights management adopts a license-based

mechanism which separates the keys from encrypted contents.

Digital rights management do not provide a way to protect a digital content form the license server.

Page 4: A Trusted Key Management Scheme for Digital Rights Management ETRI Journal, Volume 27, Number 1,February 2005 Yeonjeong Jeong, Kisiong Yoon, and Jaecheol

DRM system

Page 5: A Trusted Key Management Scheme for Digital Rights Management ETRI Journal, Volume 27, Number 1,February 2005 Yeonjeong Jeong, Kisiong Yoon, and Jaecheol

Encryption Key

The digital content is encrypted with a symmetric keys.

To protect against the illegal use of symmetric keys, the seeds of symmetric keys are encrypted with a public key.

Page 6: A Trusted Key Management Scheme for Digital Rights Management ETRI Journal, Volume 27, Number 1,February 2005 Yeonjeong Jeong, Kisiong Yoon, and Jaecheol

Key Distribution Scheme

Page 7: A Trusted Key Management Scheme for Digital Rights Management ETRI Journal, Volume 27, Number 1,February 2005 Yeonjeong Jeong, Kisiong Yoon, and Jaecheol

Key Delivery Scheme

Key delivery when packaging

Page 8: A Trusted Key Management Scheme for Digital Rights Management ETRI Journal, Volume 27, Number 1,February 2005 Yeonjeong Jeong, Kisiong Yoon, and Jaecheol

Key Delivery Scheme

Key delivery when content service is provided

Page 9: A Trusted Key Management Scheme for Digital Rights Management ETRI Journal, Volume 27, Number 1,February 2005 Yeonjeong Jeong, Kisiong Yoon, and Jaecheol

Conclusion The proposed scheme protects the key from not only the

purchaser but also other principals.