A Proxy Delegation and Local Authorization Scheme in Digital Rights Management System

碩士 === 逢甲大學 === 資訊工程所 === 99 === For the OMA DRM domain model, Kim et al. mentioned that providing different access rights to different devices in a domain increases overhead of a license server and further proposed a proxy scheme to authorize delegated licensing in home domain locally to reduce the...

Full description

Bibliographic Details
Main Authors: Chee-Chian Chia, 謝志權
Other Authors: Wei-Bin Lee
Format: Others
Language:en_US
Published: 2011
Online Access:http://ndltd.ncl.edu.tw/handle/93997125738597569721
Description
Summary:碩士 === 逢甲大學 === 資訊工程所 === 99 === For the OMA DRM domain model, Kim et al. mentioned that providing different access rights to different devices in a domain increases overhead of a license server and further proposed a proxy scheme to authorize delegated licensing in home domain locally to reduce the problem. In Kim et al.’s DRM proxy scheme, a device with reasonable computation and storage capability called local domain manager (LDM) for managing devices, licenses and contents in home networking is necessary. The device in home networking can gain the right to render the contents managed by LDM without any problem. However, it is very easy to understand that everyone is able to render contents in the domain without caring about the authorization. The major reason is that the authorization is defined for the devices in the domain; that is, the design ignores the role of user. It can be seen that Kim et al.’s scheme excessively deflects to the consumer and thus causes the abuse problem. Generally, people hope that the devices used are going to render the content without caring about the authorization; Kim et al.’s scheme achieved this requirement. On the other hand, the content provider hopes that the content would only be rendered by the authorized owner, but Kim et al.’s scheme does not complete this point. To balance the conflict, we try to propose a proxy-delegation based scheme to help the content manager distribute the authorized content and verify the authorized owner locally. Therefore, this proposed scheme preserves the advantages of Kim et al.’s scheme and solves the abuse problem.