A License Transfer System for Supporting Content Portability in Digital Rights Management

  • Qiong Liu
  • Reihaneh Safavi-Naini
  • Nicholas Paul Sheppard
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 181)

Abstract

Current digital rights management systems typically bind the right to use content to a particular device whose location cannot be changed easily. Users may find it difficult to acquire a new license for each device. We propose a license transfer system that allows the user to share a license between devices and uses transaction track files to ensure that only one device can use the license at a time. We analyze the security properties of the proposed system.

Key words

digital rights management content portability license transfer 

References

  1. 1.
    Q. Liu, R. Safavi-Naini, and N. P. Sheppard, “Digital rights management for content distribution,” In Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003, pp. 49–58, Australian.Google Scholar
  2. 2.
    D. K. Mulligan, J. Han, and A. J. Burstein, “How DRM-based content delivery systems disrupt expectations of ‘personal use’,” In Proceedings of the 2003 ACM workshop on Digital rights management, pp. 77–89, ACM Press, 2003.Google Scholar
  3. 3.
    W. Eric, “Protecting digital music using DRM: example of a mobile service over WLAN (version 1.0)”, 2002.Google Scholar
  4. 4.
    J. Feigenbaum, M. J. Freedman, T. Sander, and A. Shostack, “Privacy engineering for digital rights management systems,” In Digital Rights Management Workshop, pp. 76–105, 2001.Google Scholar
  5. 5.
    Digital World Services, “Digital world services launches rights locker and content manager,” http://www.dwsco.com/, 2001.Google Scholar
  6. 6.
    Cyber Patrol, “Free MP3.com technology takes cue from open-source movement,”http://news.com.com/2100-1023-251014.html?legacy=cnet, 2001.Google Scholar
  7. 7.
    T. S. Messerges and E. A. Dabbish, “Digital rights management in a 3G mobile phone and beyond,” In Proceedings of the 2003 ACM workshop on Digital rights management, pp. 27–38, ACM Press, 2003.Google Scholar
  8. 8.
    F. Pestoni, J. B. Lotspiech, and S. Nusser, “xCP: Peer-to-Peer Content Protection,” IEEE Signal Processing Magazine, 2004.Google Scholar
  9. 9.
    Open Mobile Alliance, “OMA DRM specification v2.0. draft version,” http://member.openmobilealliance.org/ftp/Publicdocuments/BAC/DLDRM/, Jan. 2004.Google Scholar
  10. 10.
    M. Terada, H. Kuno, M. Hanadate, and K. Fujimura, “Copy prevention scheme for rights trading infrastructure”.Google Scholar
  11. 11.
    T. Aura and D. Gollmann, “Software license management with smart cards,” USENIX Workshop on Smartcard Technology, May 1999.Google Scholar
  12. 12.
    P. England, B. Lampson, J. Manferdelli, M. Peinado, and B. Willman, “A Trusted Open Platform,” IEEE Computer Security, 2003.Google Scholar
  13. 13.
    Microsoft Corporation, “Next-generation secure computing base: the road to security,” http://www.microsoft.com/ngscb, 2003.Google Scholar
  14. 14.
    M. Sosonkin, G. Naumovich and Nasir Memon, “Obfuscation of design intent in object-oriented applications,” In Proceedings of the 2003 ACM workshop on Digital rights management, pp. 142–153, ACM Press, 2003.Google Scholar
  15. 15.
    W. Stallings, “Cryptography and network security: principles and practice,” Prentice-Hall, Inc., Upper Saddle River, NJ 07458, USA, third edition, 2002.Google Scholar
  16. 16.
    D. Boneh and M. K. Franklin, “An efficient public key traitor tracing scheme,” In Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, pp. 338–353, Springer-Verlag, 1999.Google Scholar
  17. 17.
    R. Safavi-Naini and H. Wang, “Broadcast authentication for group communication,” Theoretical Computer Science, 269(1–2): 1–21, October 2001.MATHCrossRefMathSciNetGoogle Scholar
  18. 18.
    The Internet Society, “Uniform Resource Identifiers (URI): Generic Syntax. http://www.ietf.org/rfc/rfc2396.txt, 1998.Google Scholar
  19. 19.
    The Internet Society, “Registration Procedures for URL Scheme Names”, http://www.ietf.org/rfc/rfc2717.txt, 1999.Google Scholar

Copyright information

© International Federation for Information Processing 2005

Authors and Affiliations

  • Qiong Liu
    • 1
  • Reihaneh Safavi-Naini
    • 1
  • Nicholas Paul Sheppard
    • 1
  1. 1.Center for Information Security, School of Information Technology and Computer ScienceUniversity of WollongongAustralia

Personalised recommendations