
establish the Application/Transaction level security. Concerning components those
are registered on OpenSDRM AUS. In order to complete this process the following
steps are necessary, during the installation of each of the components: (a) Each com-
ponent computes a key-pair (1024 bit length RSA keys, but higher key lengths are
also possible): Kpub
Component
, Kpriv
Component
(respectively the public and private keys);
(b) The component administrator selects a login and a password, and ciphers the
Kpriv
Component
, using AES, with the key (K
AES
) deduced from the hash of the concate-
nation of the login and password selected: K
AES
:= MD5(login+password). The ci-
phered component private key gets then protected from unauthorized usage:
K
AES
[Kpriv
Component
]; (c) The component then connects to the AUS and sends some
registration information together with the Kpub
Component
. AUS verifies the information
sent by the component, validates and registers it, and issues a certificate for the com-
ponent: Cert
AUS
Component
. This certificate is returned to the component. With these
component certificates, each of the components will be able to establish trust relation-
ships among them and sign and authenticate all the transactions – this establishes then
the Application Level security.
1.2 User’s registration on the OpenSDRM platform
In OpenSDRM three components interact directly with external users/entities – MPL,
CPS and ITS. These users, respectively Content Users, Content Providers and IPMP
Tools Providers are registered on the platform, through the AUS. Content Providers
and IPMP Tools Providers, subscribe respectively on the CPS and ITS, relying on the
registration and authentication functionalities of the AUS. Therefore, when a new
user subscribes, it provides some personal information, a login and password and
requests the registration. The following processes can be described like this: (a) The
components (ITS and CPS) gather the new registrant information (Info) and request
the registration of a new user on the AUS; (b) The components build a new message:
SignKpriv
Component
{Component
ID
, Info}. This message is send to AUS; (c) AUS veri-
fies and validates the message, registering the new User and returning a unique User
ID
to the component. Registering a Content User is a more complex process. This is due
to the fact that while both Content Providers and IPMP Tool Providers have their
information stored on remote servers, Content Users rely on their own platforms to
store their data. In order to provide some additional degree of security, OpenSDRM
provides a digital wallet, capable of storing sensitive information such as crypto-
graphic data and licenses in a secure way. The process to register new Content Users
can be described in the following steps: (a) When the user runs the wallet for the first
time, it creates the User a RSA key pair (Kpriv
User
, Kpub
User
) and asks the user to
enter a login and a password; (b) Using the entered login and password, it creates the
secure repository master key: K
AES
= MD5(login+password), and stores sensitive
information (Info) on it: K
AES
[Info]; (c) The wallet asks the user to enter some per-
sonal data (Person
Data
) and also some payment data (Pay
Data
) used to charge the user
for any commercial content usage; (d) The wallet requests the AUS to register a new
User, sending all the information ciphered with the AUS Kpub
AUS
:
Kpub
AUS
[Person
Data
, Pay
Data
, KPriv
User
, Kpub
User
]; (e) AUS receives the data, deci-
phers it and registers the User. AUS responds to the Wallet with a new certificate
182