Presentation 2002/11/7
Several New Methods for Protecting Digital Rights : Proposals from the Standpoints of Information Security
Masao KASAHARA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) In this paper, we present several new methods for protecting the various types of unauthorized reception of contents provided by such as Conditional Access Systems. We propose the using of a set of keys, each ot which is chosen by the small bits of header information sent by the providers, Rights Management Organizations(RMO), etc. We show the method of embedding the M sequence, for tracing traitors, in the set of keys.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) rights management / copy control / copy protection / CASC(Conditional Access Systems) / tracing traitors
Paper # ISEC2002-78
Date of Issue

Conference Information
Committee ISEC
Conference Date 2002/11/7(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Several New Methods for Protecting Digital Rights : Proposals from the Standpoints of Information Security
Sub Title (in English)
Keyword(1) rights management
Keyword(2) copy control
Keyword(3) copy protection
Keyword(4) CASC(Conditional Access Systems)
Keyword(5) tracing traitors
1st Author's Name Masao KASAHARA
1st Author's Affiliation Faculty of Informatics, Osaka Gakuin University()
Date 2002/11/7
Paper # ISEC2002-78
Volume (vol) vol.102
Number (no) 436
Page pp.pp.-
#Pages 8
Date of Issue