Abstract:
A method for importing DRM(Digital Rights Management) data available within a user domain in a wired/wireless environment is provided to convert non-OMA(Open Mobile Alliance) DRM data into OMA DRM data available in the user domain by using an LRM(Local Right Manager), and enable a DRM agent to obtain an imported RO from an RI(Rights Issuer) and the LRM. User domain information is exchanged by registering the LRM to a DA(Domain authority)(S202). The LRM generates a DCF(DRM(Digital Rights Management) Contents Format) suitable for an OMA DRM rule from the non-OMA DRM data based on the exchanged user domain information(S204). The RI generates the RO for the user domain by a request of the LRM(S206). The LRM transfers the DCF to the DRM agent of a specified device(S214). The DRM agent is registered to the user domain when the DRM agent is not registered to the user domain(S218). The DRM agent obtains the RO from the RI to use the received DCF.
Abstract:
A method for managing digital rights in a wired/wireless environment is provided to guarantee single operation in a DRM(Digital Rights Management) function such as moving, copying, lending, user domain sharing, and ad-hoc sharing RO(Rights Object) to enable a user to share the RO with other users, and prevent a device supporting an OMA(Open Mobile Alliance) DRM standard from performing a disallowed illegal operation by transmitting a result of the DRM function to a sender device. An RO of the sender device is disabled after it is checked whether the RO can be moved(102). An RO move request message including the RO moved to a receiver device and the information for generating the RO to be transferred to the receiver device is transmitted to an RI(Rights Issuer)(104). The RI moves the RI by using the received RO or the RO generated based on the information included in the RO move request message(106). The disabled RO is enabled when move is failed by checking a move result of the RO(110).
Abstract:
A method for managing digital rights in a wired/wireless environment by using a trusted authority parameter is provided to process an error in both ends of a device and an RI(Right Issuer) when the error occurring in processing a trusted RI authority parameter during a registration stage of a DRM(Digital Rights Management) solution. A device wanting registration transmits a first message including basic information of the device to an RI(S100). The RI receiving the first message transmits a second message including the basic information of the RI to the device(S102). The device transmits a third message for requesting the registration to the RI(S104). The RI registers the device and transmits a fourth message including registration result information to the device(S106). The third message includes a trusted RI authority parameter, which is list information of upper objects an RI certificate trusted by the device, and the fourth message includes state information for representing whether or not one of the trusted RI authority parameter is included in a certificate chain of the RI.
Abstract:
A method for performing authentication among members of a user domain is provided to enhance an operation speed by authenticating the members of the user domain with a keyed hash function or symmetric encryption when the user domain is managed. A DEA(Domain Enforcement Agent) transmits authentication information which is a hash value processed by a keyed hash function, to a DA(Domain Authority)(S110). The DA verifies the received authentication information by using an MDK(Main Domain Key) of the DA(S120). The DA transmits an authentication result which is the hash value processed by a hash function, to the DEA(S130).