A personal mobile DRM manager for smartphones

In this paper we report on our experience in building the experimental Personal Digital Rights Manager for Motorola smartphones, an industry first. Digital Rights Management allows producers or owners of digital content to control the manner in which the content is consumed. This may range from simply preventing duplication to finer access policies such as restricting who can use the content, on what devices, and for how long. In most commercial DRM systems, the average end user plays the role of content consumer, using DRM protected content made available by a service. Here we present a personal digital rights system for mobile devices where the end user has the ability to place DRM protection and controls on his or her own personal content. We designed the personal DRM system to allow users of a mobile device to transparently define controls and generate licenses on custom content and securely transfer them to other mobile devices. A user is able to define and restrict the intended audience and ensure expiration of the content as desired. Compatible devices automatically detect each other and exchange credentials. The personal DRM system on each device safely enforces the content usage rules and also handles moving licenses between devices while preventing leakage of content. We implemented a prototype of our system on Motorola E680i smartphones.

[1]  Renato Iannella,et al.  Digital Rights Management (DRM) Architectures , 2001, D Lib Mag..

[2]  Reihaneh Safavi-Naini,et al.  Import/export in digital rights management , 2004, DRM '04.

[3]  William J. Caelli,et al.  DRM, Trusted Computing and Operating System Architecture , 2005, ACSW.

[4]  John S. Erickson Fair use, DRM, and trusted computing , 2003, CACM.

[5]  Yee Wei Law,et al.  LicenseScript: a novel digital rights language and its semantics , 2003, Proceedings Third International Conference on WEB Delivering of Music.

[6]  Mark Stamp,et al.  P2PTunes: A Peer-to-Peer Digital Rights Management System , 2009 .

[7]  Andrew S. Tanenbaum,et al.  Support for multi-level security policies in DRM architectures , 2004, NSPW '04.

[8]  Jaehong Park,et al.  Security architectures for controlled digital information dissemination , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).

[9]  Marvin L. Smith Digital rights management & protecting the digital media value chain , 2004, MUM '04.

[10]  Ahmad-Reza Sadeghi,et al.  Trusted Computing , 2010, Handbook of Financial Cryptography and Security.

[11]  Sheng Zhong,et al.  Benchmarking Security Computations on Wireless Devices , 2006 .

[12]  Sai Ho Kwok Digital rights management for the online music business , 2002, SECO.

[13]  Carl A. Gunter,et al.  Models and languages for digital rights , 2001, Proceedings of the 34th Annual Hawaii International Conference on System Sciences.

[14]  Thomas S. Messerges,et al.  Digital rights management in a 3G mobile phone and beyond , 2003, DRM '03.

[15]  Reihaneh Safavi-Naini,et al.  Digital Rights Management for Content Distribution , 2003, ACSW.

[16]  Aaron Weiss Net neutrality?: there's nothing neutral about it , 2006, NTWK.

[17]  Andrew P. Martin,et al.  Towards an open, trusted digital rights management platform , 2006, DRM '06.

[18]  Pamela Samuelson,et al.  DRM {and, or, vs.} the law , 2003, CACM.

[19]  N. Rump Can digital rights management be standardized? , 2004, IEEE Signal Processing Magazine.

[20]  Reihaneh Safavi-Naini,et al.  Sharing digital rights with domain licensing , 2006, MCPS '06.

[21]  David W. Kravitz,et al.  Achieving media portability through local content translation and end-to-end rights management , 2005, DRM '05.

[22]  J. Alex Halderman,et al.  Evaluating New Copy-Prevention Techniques for Audio CDs , 2002, Digital Rights Management Workshop.

[23]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[24]  Paul C. van Oorschot,et al.  Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..

[25]  Andreas Matheus Authorization for digital rights management in the geospatial domain , 2005, DRM '05.

[26]  Mark Stamp,et al.  Digital Rights Management for Untrusted Peer-to-Peer Networks , 2009 .