Methods and apparatuses for providing DRM interoperability
First Claim
1. A method of providing digital rights management (DRM) interoperability in a proxy agent with respect to a plurality of DRM service providers and a device which supports a predetermined DRM, comprising:
- at a first DRM service provider having keys EK1 and EK2, a second DRM service provider having a key CEKA, the proxy agent, and the device, identifying each other; and
proxy re-encrypting an interoperable content (IC) provided from the first DRM service provider and providing the IC to the device,wherein the IC comprises a key KM that is second-level encrypted using keys EK1 and EK2 of the first DRM service provider,wherein proxy re-encryption is performed by using a proxy key generated from proxy key information provided from the first DRM service provider and the second DRM service provider to provide DRM interoperability between different devices,wherein second-level encryption refers to an encryption technique which is performed in advance in order to perform the proxy re-encryption later,wherein proxy re-encrypting a second-level encrypted content generates a first-level encrypted content, andwherein proxy re-encrypting is expressed PREPRoxYKEY(PRE2EK1,EK2(KM))=PRE1CEKA(KM).
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and apparatuses for providing DRM interoperability are provided. Proxy re-encryption technique using bilinear map is used, and the same content can be used in different devices. According to the method of providing DRM interoperability includes in proxy agent with respect to digital rights management (DRM) service providers and device which supports predetermined DRM, first DRM service provider, second DRM service provider, the proxy agent, and the device identify each other, and proxy re-encrypt an interoperable content (IC) and provide the IC to the device. The IC is second-level encrypted by using a key of the first DRM service provider, and the proxy re-encryption is performed by using a proxy key generated from proxy key information provided from the first DRM service provider and the second DRM service provider. Therefore, a problem in which interoperability cannot be guaranteed since a DRM technique depends on a service provider is resolved.
-
Citations
19 Claims
-
1. A method of providing digital rights management (DRM) interoperability in a proxy agent with respect to a plurality of DRM service providers and a device which supports a predetermined DRM, comprising:
-
at a first DRM service provider having keys EK1 and EK2, a second DRM service provider having a key CEKA, the proxy agent, and the device, identifying each other; and proxy re-encrypting an interoperable content (IC) provided from the first DRM service provider and providing the IC to the device, wherein the IC comprises a key KM that is second-level encrypted using keys EK1 and EK2 of the first DRM service provider, wherein proxy re-encryption is performed by using a proxy key generated from proxy key information provided from the first DRM service provider and the second DRM service provider to provide DRM interoperability between different devices, wherein second-level encryption refers to an encryption technique which is performed in advance in order to perform the proxy re-encryption later, wherein proxy re-encrypting a second-level encrypted content generates a first-level encrypted content, and wherein proxy re-encrypting is expressed PREPRoxYKEY(PRE2EK1,EK2(KM))=PRE1CEKA(KM). - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus of providing digital rights management (DRM) interoperability with respect to a plurality of DRM service providers and a device which supports a predetermined DRM, comprising:
-
at least one processor which identifies a first DRM service provider having keys EK1 and EK2, a second DRM service provider having a key CEKA, and the device and is identified by the first DRM service provider, the second DRM service provider, and the device, proxy re-encrypts an interoperable content (IC) provided from the first DRM service provider and provides the IC to the device; and a memory connected with the processor to store the IC, wherein the IC comprises key KM that is second-level encrypted using the keys EK1 and EK2 of the first DRM service provider, wherein the processors performs the proxy re-encryption by using a proxy key generated from proxy key information provided from the first DRM service provider and the second DRM service provider to provide DRM interoperability between different devices, wherein the second-level encryption refers to an encryption technique which is performed in advance in order to perform the proxy re-encryption later, wherein proxy re-encrypting a second-level encrypted content generates a first-level encrypted content, and wherein proxy re-encrypting is expressed as PREPROXYKEY(PRE2EK1,EK2(KM))=PRE1CEKA(KM). - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
Specification