Nothing Special   »   [go: up one dir, main page]

Mishra et al., 2021 - Google Patents

A provably secure content distribution framework for portable DRM systems

Mishra et al., 2021

Document ID
10596565238276927646
Author
Mishra D
Rana S
Publication year
Publication venue
Journal of Information Security and Applications

External Links

Snippet

The growing demand for digital content using smart devices has taken the attenuation towards the enforcement of rights in digital content distribution. Digital rights management (DRM) systems support copyrights and try to control the access of digital content in a user …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources

Similar Documents

Publication Publication Date Title
Mishra et al. A provably secure content distribution framework for portable DRM systems
Zhang et al. Blockchain-based privacy preserving e-health system for healthcare data in cloud
Zhu et al. Digital asset management with distributed permission over blockchain and attribute-based access control
US9032497B2 (en) System and method for securing embedded media
US10554634B2 (en) Techniques for shared private data objects in a trusted execution environment
CN108462689B (en) Techniques for remote SGX enclave authentication
US20200067694A1 (en) Techniques for key provisioning in a trusted execution environment
TW201830280A (en) Trusted login method, server, and system
GB2581913A (en) Access control in microservice architectures
CN110176987A (en) A kind of method, apparatus, equipment and the computer storage medium of equipment certification
GB2473566A (en) Systems and method for data security
WO2010011919A3 (en) Http authentication and authorization management
PH12014502304B1 (en) Abstracted and randomized one-time passwords for transactional authentication
CN104995634A (en) Key refresh between trusted units
JP2013511103A5 (en)
WO2015116998A3 (en) Electronic transfer and obligation enforcement system
US20150113276A1 (en) Distributing Keys for Decrypting Client Data
CN103366135A (en) Tenant driven security system and method in a storage cloud
CN108234451A (en) Electric power intranet and extranet request forwarding Proxy Method and computer readable storage medium
CN105812350A (en) Cross-platform single-point registration system
CN105100248A (en) Cloud storage security realization method based on data encryption and access control
CN111245861A (en) Power data storage and sharing method
CN104463584A (en) Method for achieving mobile terminal App safety payment
CN103188208A (en) Authority control method and authority control system of webpage access, and call center
KR20150116537A (en) Method for user authentication in virtual private cloud system and apparatus for providing virtual private cloud service