170 likes | 408 Views
Digital Inheritance of Personal and Commercial Content Using DRM. H. Li, NXP Research M. Petkovic, Philips Research CCNC’07 DRM workshop, Jan 11 2007. Content. Introduction Private content protection model using DRM Inheritance protocols Digital last will Conclusions.
E N D
Digital Inheritance of Personal and Commercial Content Using DRM H. Li, NXP Research M. Petkovic, Philips Research CCNC’07 DRM workshop, Jan 11 2007
Content • Introduction • Private content protection model using DRM • Inheritance protocols • Digital last will • Conclusions
More will be protected for privacy and for copyright Hackers & Users & Observers People own and manage exploding amount of digital content in the whole life • Personal content and commercial content • Personal digital history: photos and video, health info, financial info, behaviours, … • Music, movies…
How to regulate inheritance of digital property? • Traditional ways insufficient • Free copy or paper last will: usage rights issues • Not easy for managing a huge collection • Traditional ways may fail for confidential content protected by cryptography • His keys, private knowledge and biometric authentication may be lost forever, if a person is dead
Secure digital inheritance solutions are required • Requirements: • Trusted posthumous transaction of the inheritance • Secure process for encrypted personal confidential content • Secure process for transferring usage rights of commercial content • Options for testator to assign conditions and rights to a beneficiary for a particular digital bequest • Non-repudiation • Ease of use
Content • Introduction • Private content protection model using DRM • Inheritance protocols • Digital last will • Conclusions
Private content protection model using DRM • Personal keys and license process capability are in compliant devices • Ownership secured in Owner Licenses • Owner License (OL): full rights, incl. to grant rights to others • User License (UL): usage rights given by the owner
Owner 1 grants ‘takeOwnership’ UL Owner 2 takes ownership Owner 2 asks to clean-up the old ownership Owner 1 cleans the old ownership Ownership and ownership transfer ULx : TakeOwnership UL ULClean : Clean-up UL Secured by compliant personal devices (keys)
Content • Introduction • Private content protection model using DRM • Inheritance protocols • Digital last will • Conclusions
Digital Inheritance Protocols • Principles for inheritance of digital content using DRM • by adding inheritance information (including conditions) to content licenses • by binding activation of inheritance to a death certificate • Two examples of protocols for personal content • One example for commercial content
Inheritance protocols of personal content (1) • Put inheritance information in an ownership license and coupling inheritance activation with the death certificate of the testator
Inheritance protocols of personal content (2) • Put inheritance information in a usage license and coupling inheritance activation with the death certificate of the testator
Inheritance of commercial content • Append an additional license with inheritance information and conditions
Content • Introduction • Private content protection model using DRM • Inheritance protocols • Digital last will • Conclusions
Using a digital last will • Using containers to secure the rights-transfer licenses • Selected executor / TTP opens the containers with the death certificate • Beneficiaries complete the inheritance using the right-transfer licenses
Conclusions • Secure inheritance solutions required for protected digital content • Several protocols presented for transferring the ownership and usage rights posthumously • A digital last will solution presented • More work needed to introduce ownership and inheritance protocols in a real DRM standard / system