{"title":"DRM系统中的优雅侵权反应","authors":"S. Katzenbeisser, K. Kursawe, J. Talstra","doi":"10.1145/1179509.1179526","DOIUrl":null,"url":null,"abstract":"In this paper, we propose an alternative DRM technology for next-generation optical media. Instead of implementing a hard access control mechanism, we propose a scheme that monitors the behavior of users in a privacy-preserving manner, detects potential infringement actions and reacts in a graceful way, which is dependent on the severity of infringements. The scheme is based on blacklists of known unauthorized content and compromised players, which are maintained by content providers and shipped alongside the content. Most of the functionality is implemented by content code provided on the disc, allowing for player independent and flexible reactions.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Graceful infringement reactions in DRM systems\",\"authors\":\"S. Katzenbeisser, K. Kursawe, J. Talstra\",\"doi\":\"10.1145/1179509.1179526\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we propose an alternative DRM technology for next-generation optical media. Instead of implementing a hard access control mechanism, we propose a scheme that monitors the behavior of users in a privacy-preserving manner, detects potential infringement actions and reacts in a graceful way, which is dependent on the severity of infringements. The scheme is based on blacklists of known unauthorized content and compromised players, which are maintained by content providers and shipped alongside the content. Most of the functionality is implemented by content code provided on the disc, allowing for player independent and flexible reactions.\",\"PeriodicalId\":124354,\"journal\":{\"name\":\"ACM Digital Rights Management Workshop\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-10-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ACM Digital Rights Management Workshop\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/1179509.1179526\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Digital Rights Management Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1179509.1179526","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In this paper, we propose an alternative DRM technology for next-generation optical media. Instead of implementing a hard access control mechanism, we propose a scheme that monitors the behavior of users in a privacy-preserving manner, detects potential infringement actions and reacts in a graceful way, which is dependent on the severity of infringements. The scheme is based on blacklists of known unauthorized content and compromised players, which are maintained by content providers and shipped alongside the content. Most of the functionality is implemented by content code provided on the disc, allowing for player independent and flexible reactions.