Content providers and distributors need to have secured and trusted systems for the distribution of multimedia content with Digital Rights Management (DRM) to ensure the revenues derived from their works. This paper discusses the security mechanisms applied to the implementation of a DRM architecture, regarding the certification and verification of user tools integrity during their whole life cycle, the mechanisms for providing a secure and trusted communication between client tools and the server framework for authorisation, certification or verification purposes, and the mechanisms for the secure storage and resynchronisation of the reports that describe the actions performed by users during the tool offline operation. The presented architecture is being implemented in the AXMEDIS project, which aims to create an innovative technology framework for the automatic production, protection and distribution of digital cross media contents over a range of different media channels, including PC (on the Internet), PDA, kiosks, mobile phones and i-TV. © Springer-Verlag Berlin Heidelberg 2006.
CITATION STYLE
Torres, V., Delgado, J., & Llorente, S. (2006). An implementation of a trusted and secure DRM architecture. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4277 LNCS-I, pp. 312–321). Springer Verlag. https://doi.org/10.1007/11915034_55
Mendeley helps you to discover research relevant for your work.