OMA-AD-DRM-V2_0_1-20080226-A Page 3 (24)
2008 Open Mobile Alliance Ltd. All Rights Reserved.
Used with the permission of the Open Mobile Alliance Ltd. under the terms as stated in this document.
Contents
1.
SCOPE................................................................................................................................................................................4
2.
REFERENCES ..................................................................................................................................................................5
2.1
N
ORMATIVE
R
EFERENCES
..........................................................................................................................................5
2.2
I
NFORMATIVE
R
EFERENCES
.......................................................................................................................................5
3.
TERMINOLOGY AND CONVENTIONS......................................................................................................................6
3.1
C
ONVENTIONS
.............................................................................................................................................................6
3.2
D
EFINITIONS
................................................................................................................................................................6
3.3
A
BBREVIATIONS
..........................................................................................................................................................7
4.
INTRODUCTION .............................................................................................................................................................8
4.1
A
CTORS AND
F
UNCTIONAL
E
NTITIES
.........................................................................................................................8
4.2
F
UNCTIONAL
A
RCHITECTURE
....................................................................................................................................9
4.3
T
ECHNICAL
U
SE
C
ASES
............................................................................................................................................10
4.3.1
Basic Pull Model................................................................................................................................................10
4.3.2
Push of DRM Content........................................................................................................................................10
4.3.3
Streaming of DRM Content ...............................................................................................................................10
4.3.4
Domains.............................................................................................................................................................11
4.3.5
Backup ...............................................................................................................................................................11
4.3.6
Super Distribution..............................................................................................................................................11
4.3.7
Export ................................................................................................................................................................11
4.3.8
Unconnected Device Support.............................................................................................................................11
5.
TRUST AND SECURITY MODEL...............................................................................................................................13
5.1
O
VERVIEW
.................................................................................................................................................................13
5.2
T
RUST
M
ODEL
...........................................................................................................................................................13
5.3
C
ONTENT
P
ROTECTION
............................................................................................................................................14
5.4
R
IGHTS
O
BJECT
........................................................................................................................................................14
5.5
R
IGHTS
O
BJECT
P
ROTECTION
..................................................................................................................................14
5.6
O
THER
S
ECURITY
A
SPECTS
......................................................................................................................................14
6.
USE CASES......................................................................................................................................................................16
6.1
B
ASIC
D
OWNLOAD
....................................................................................................................................................17
6.2
S
UPER
D
ISTRIBUTION
................................................................................................................................................18
6.3
S
TREAMING
M
EDIA
...................................................................................................................................................19
6.4
D
OMAINS
...................................................................................................................................................................20
6.5
E
XPORT
.....................................................................................................................................................................21
6.6
U
NCONNECTED
D
EVICE
S
UPPORT
............................................................................................................................22
APPENDIX A.
CHANGE HISTORY (INFORMATIVE)..............................................................................................24
A.1
A
PPROVED
V
ERSION
H
ISTORY
.................................................................................................................................24
Figures
Figure 1. Functional architecture.............................................................................................................................................9
Figure 2: Basic Download - Pull and Push Models...............................................................................................................17
Figure 3: Super Distribution...................................................................................................................................................18
Figure 4: DRM Protected Streaming Service........................................................................................................................20
Figure 5: Domains....................................................................................................................................................................21
Figure 6: Export.......................................................................................................................................................................22
Figure 7: Store & Forward .....................................................................................................................................................23