Rights Management for User Content

  • PDF / 423,621 Bytes
  • 16 Pages / 439.37 x 666.142 pts Page_size
  • 35 Downloads / 192 Views

DOWNLOAD

REPORT


György Kálmán and Josef Noll

16.1 Introduction With the spread of always-online Internet connections, digital user content and upcoming tools or services for content sharing induced a change in user behaviour. Traditional user and provider roles are not separated any more. The end user is creating his content and sharing it over the network. Rights management in the home area is composed from two, possibly disjunct problem areas. One is the management of content, which the user has been purchased from commercial sources, the other is the management of user-owned content. User created content induces the need for a rights management solution, which keeps the user and his content in focus. Current solutions offer services only for industrial customers and are only dealing with the traditional consumer role of the user. The more active, content producing users need a tailor-made solution to handle their content. Such a solution will enable fine grained rights control over distributed material in an easy and secure way. Social life over the internet is becoming more important, in an interconnected world, network presence – visibility and acknowledgement of other people – is a major driving force. A user may want to share pictures with his friends and family, with a society or just with one person. Currently, the user has a wide variety of possibilities to share content, but until now, no fine grained right management solution was designed with user needs in mind, and with support of home content.

298

G. Kálmán and J. Noll

16.2 Background The bigger user base results in the average knowledge in IT technologies is sinking. This raises the need for easy-to use systems, since this is not longer a matter convenience, but rather a limiting factor for success. Wide variety of terminals and extending range of user devices are requiring content adaptation (nearly the same user experience on different terminals) and integrated security methods (hard to set up public-key authentication or to type in 15 character passwords on a media player). For some purposes, it would be beneficial to use seamless authentication, like it is implemented for Wireless Application Protocol (WAP) services of the operator and selected third parties. Because no user interaction is needed it is recommended to use it in personalisation and content adaptation services [1]. If security is not critical, methods similar to cookies could be used, where after one successful authentication, the system is keeping the user logged in for a certain period. Alternatively, Single Sign On (SSO) solutions can be used, where after the user authenticates himself towards the SSO service, further authentication requests will be handled by the system. Content adaptation has a growing importance in pervasive computing, since terminals with very different capabilities are used to access the same information sources. Beside the technical problems associated with conversion, the commercial content protection solutions usually do not provide a method for content transformat