The Digital Media Project



IEDs Breakout


IED Requirements


0077/Los Angeles

This document collects requirements derived from DEUs (normal) and TRUs (italic)

  1. Support for listing of DMP conforming content.

  2. Support for meta data navigation.

    1. Sorting on fields

    2. Searching on field data

    3. Filtering on field data

  3. Support for indicating a selection from a listing.

  4. Negotiation and adaptation of DRM requirements/capabilities.

  5. Negotiation and adaptation of content format.

  6. Support for making a copy of the content in its original form

  7. Support for indicating the authorization for making a copy

  8. Support the declaration of information necessary for the adaptation of content

  9. Support for the communication of adaptation information

  10. Support for adaptation negotiation

  11. Support of a broad range of payment methods and mechanisms

  12. Negotiation of device authentication method.

  13. Support for the unambiguous and unique identification of content.

  14. Negotiation of User authentication method.

  15. Binding entitlements to specific content

  16. Binding entitlements to a specific User or groups of Users

  17. Binding entitlements to a specific device or class of devices

  18. Machine readable entitlements

  19. Determination of entitlement authenticity and integrity.

  20. Support for detecting un-authorized changes in the content

    1. Support for verification of integrity

    2. Support for authenticating integrity verification data

  21. Support for verifying the source of content

  22. Support for declaring and negotiating content encryption/decryption algorithms

  23. The key for decryption/unscrambling being distributed to authenticated license holders only.

  24. The decryption/unscrambling key enabling only operations authorized in the license.

  25. The key being used in automated operations only. Users shall not have direct access to the key.

  26. The system being resistant to tampering as much as possible.

  27. Protection of media all the way from creation (mastering) to consumption (playback) so that at no middle stage it is available as clear text.

  28. Prevention of keys from being stolen and used for operations that are not allowed by the license terms.

  29. An in individual key for each media item, so that if one key is exposed only the single associated media item is endangered.

  30.  A standard algorithm to encrypt/scramble the media.

  31. The use of proprietary or renewable algorithms to be softly loadable into the devices through a standard framework.

  32. Support for the secure local storage of large amounts of data

  33. Support for the digital signing and subsequent verification of code elements.

  34. Protocols for connecting to a source of secure time.

  35. Support for access and use DMP content whose copyright has expired

  36. Support for continuous access to DMP content by DMP users

  37. Support for free choice of services independently of the media item and the license.