Secure procedures to reconnect intelligent devices and recover content usage control information
We previously developed content protection architecture suitable for both intelligent detachable storage and host devices. The foundation of the architecture is to encrypt the content payload and manage the usage control information for the content. We also previously reported on the procedures for...
Saved in:
Published in | 2009 Digest of Technical Papers International Conference on Consumer Electronics pp. 1 - 2 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.01.2009
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | We previously developed content protection architecture suitable for both intelligent detachable storage and host devices. The foundation of the architecture is to encrypt the content payload and manage the usage control information for the content. We also previously reported on the procedures for normal mutual authentication and transfer of usage control information between the authenticated devices. Here, we describe in detail two significant technological advances in usability: procedures to recover the usage control information lost during normal transfer and to reconnect previously authenticated devices through the simpler message exchange. |
---|---|
AbstractList | We previously developed content protection architecture suitable for both intelligent detachable storage and host devices. The foundation of the architecture is to encrypt the content payload and manage the usage control information for the content. We also previously reported on the procedures for normal mutual authentication and transfer of usage control information between the authenticated devices. Here, we describe in detail two significant technological advances in usability: procedures to recover the usage control information lost during normal transfer and to reconnect previously authenticated devices through the simpler message exchange. |
Author | Hirai, T. Inagaki, Y. |
Author_xml | – sequence: 1 givenname: T. surname: Hirai fullname: Hirai, T. organization: Central Res. Lab., Hitachi, Ltd – sequence: 2 givenname: Y. surname: Inagaki fullname: Inagaki, Y. organization: Central Res. Lab., Hitachi, Ltd |
BookMark | eNotkE1PAjEQhqtCwof8AONl_8Bipx9sezQbVBISD3LwhqWdJTVLS7oLif_eisxlZvI-82ZmJmQQYkBCHoDOAah-WtX1cs4o1XNJgYFSN2QCggnBpNSft2TMQKpSUAp3ZKYrddFERUEOrhrXWgzJSImF4CCqEZl13TfNISSXjI_J1wfaU8LimKJFl6uu6GOR0MYQ0PaFDz22rd9j6AuHZ28zYIK7EGdMReb6P-3UmT1euhTbPNXEdDC9j-GeDBvTdji75inZvCw39Vu5fn9d1c_r0mvalwqA60a4HTiNoKlVtJI0L29Mo41YcLS8UjuDtnK7fCU2ijkAhlCxZmEYn5LHf1uPiNtj8geTfrbXt_FfPZpeWQ |
ContentType | Conference Proceeding |
DBID | 6IE 6IH CBEJK RIE RIO |
DOI | 10.1109/ICCE.2009.5012188 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE/IET Electronic Library IEEE Proceedings Order Plans (POP) 1998-present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEL url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISBN | 142442559X 9781424425594 |
EISSN | 2158-4001 |
EndPage | 2 |
ExternalDocumentID | 5012188 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IH 6IL 6IN ABLEC ACGFS ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IJVOP M43 OCL RIE RIL RIO |
ID | FETCH-LOGICAL-i90t-81139f4db1d9e190c80750994aaf9a463ec378baec7db424ef82d112e172f6a23 |
IEDL.DBID | RIE |
ISBN | 9781424447015 1424447011 9781424425587 1424425581 |
ISSN | 2158-3994 |
IngestDate | Wed Jun 26 19:19:05 EDT 2024 |
IsPeerReviewed | true |
IsScholarly | true |
LCCN | 84643147 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i90t-81139f4db1d9e190c80750994aaf9a463ec378baec7db424ef82d112e172f6a23 |
PageCount | 2 |
ParticipantIDs | ieee_primary_5012188 |
PublicationCentury | 2000 |
PublicationDate | 2009-Jan. |
PublicationDateYYYYMMDD | 2009-01-01 |
PublicationDate_xml | – month: 01 year: 2009 text: 2009-Jan. |
PublicationDecade | 2000 |
PublicationTitle | 2009 Digest of Technical Papers International Conference on Consumer Electronics |
PublicationTitleAbbrev | ICCE |
PublicationYear | 2009 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0000453523 ssj0019959 |
Score | 1.7280904 |
Snippet | We previously developed content protection architecture suitable for both intelligent detachable storage and host devices. The foundation of the architecture... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1 |
SubjectTerms | Authentication Costs Cryptography Payloads Protection Random media Samarium Secure storage Security Uninterruptible power systems |
Title | Secure procedures to reconnect intelligent devices and recover content usage control information |
URI | https://ieeexplore.ieee.org/document/5012188 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV05T8MwFH5qO8HC0SJueWDEbdM4sT1XrQpSEUORuhXHh1QhpQiShV_Ps3NwiIHNjjPE9st7n9_xGeCGM81cKiRNTMoomyhGhYgYTZlKfKAr0YFdf_mQLp7Y_TpZd-C2rYWx1obkMzv0zRDLNztdelfZKPEEZEJ0oculrGq1Wn8KQhPEEq0W9pXHHvqiRRMUjTBriroQQouo6TCO4t0QP9WD_Fvfjyd1LDQay9HddDqrOC7rT_lxJ0swSfMDWDaTqTJRXoZlkQ31xy-ex__O9hAGX8V_5LE1a0fQsfkx7H_jLezDc_DSWxKsn8HWOyl2JJytc1SgZNvyfBbE2KCLiMpNeAN_HeLz4_1Y6bPaSJ0tT2oOVy8pA1jNZ6vpgtZXNdCtHBdURAgkHTNZZKRFiKFFQCKSKeWkYmlsdcxFpqzmJsOFtU5MDCI9i_DJpWoSn0Av3-X2FIi0ggun09gwPLy4SeYcbovJHDc6YbE5g75fqs1rRcaxqVfp_O_HF7BXhX-8z-QSesVbaa8QRRTZdRCfT5V9u_g |
link.rule.ids | 310,311,783,787,792,793,799,27939,55088 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED6VMgALjxbxxgMjbpvGTpy5atVCWzEUqVtJ_JAqpBRBsvDrOTsPCmJgs-MMsX25-3yPzwB3IZPMBCKiXAWMsn7MqBAeowGLuQ10cenY9WfzYPzMHpZ82YD7uhZGa-2Sz3THNl0sX21kbl1lXW4JyITYgV1ucUVRrVV7VBCcIJqo9bCtPbbgF22aoGiGWVXWhSBaeFWHhSjgFfVTORhu9e04L6OhXi_qTgaDYcFyWX7Mj1tZnFEaHcKsmk6Ri_LaybOkIz9_MT3-d75H0P4u_yNPtWE7hoZOT-Bgi7mwBS_OT6-Js38KWx8k2xB3uk5RhZJ1zfSZEaWdNiJxqtwb-PMQmyFvx3Kb10bKfHlSsrhaWWnDYjRcDMa0vKyBrqNeRoWHUNIwlXgq0ggypHBYJGJxbKKYBb6WfiiSWMtQJbiw2oi-QqynEUCZIO77p9BMN6k-AxJpEQojA18xPL6YfmIMbotKTKgkZ746h5ZdqtVbQcexKlfp4u_Ht7A3Xsymq-lk_ngJ-0UwyHpQrqCZvef6GjFFltw4UfoCo5-_RQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2009+Digest+of+Technical+Papers+International+Conference+on+Consumer+Electronics&rft.atitle=Secure+procedures+to+reconnect+intelligent+devices+and+recover+content+usage+control+information&rft.au=Hirai%2C+T.&rft.au=Inagaki%2C+Y.&rft.date=2009-01-01&rft.pub=IEEE&rft.isbn=9781424447015&rft.issn=2158-3994&rft.eissn=2158-4001&rft.spage=1&rft.epage=2&rft_id=info:doi/10.1109%2FICCE.2009.5012188&rft.externalDocID=5012188 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2158-3994&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2158-3994&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2158-3994&client=summon |