SEC 2005: Security and Privacy in the Age of Ubiquitous Computing pp 189-204 | Cite as
A License Transfer System for Supporting Content Portability in Digital Rights Management
Conference paper
Abstract
Current digital rights management systems typically bind the right to use content to a particular device whose location cannot be changed easily. Users may find it difficult to acquire a new license for each device. We propose a license transfer system that allows the user to share a license between devices and uses transaction track files to ensure that only one device can use the license at a time. We analyze the security properties of the proposed system.
Key words
digital rights management content portability license transfer Download
to read the full conference paper text
References
- 1.Q. Liu, R. Safavi-Naini, and N. P. Sheppard, “Digital rights management for content distribution,” In Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003, pp. 49–58, Australian.Google Scholar
- 2.D. K. Mulligan, J. Han, and A. J. Burstein, “How DRM-based content delivery systems disrupt expectations of ‘personal use’,” In Proceedings of the 2003 ACM workshop on Digital rights management, pp. 77–89, ACM Press, 2003.Google Scholar
- 3.W. Eric, “Protecting digital music using DRM: example of a mobile service over WLAN (version 1.0)”, 2002.Google Scholar
- 4.J. Feigenbaum, M. J. Freedman, T. Sander, and A. Shostack, “Privacy engineering for digital rights management systems,” In Digital Rights Management Workshop, pp. 76–105, 2001.Google Scholar
- 5.Digital World Services, “Digital world services launches rights locker and content manager,” http://www.dwsco.com/, 2001.Google Scholar
- 6.Cyber Patrol, “Free MP3.com technology takes cue from open-source movement,”http://news.com.com/2100-1023-251014.html?legacy=cnet, 2001.Google Scholar
- 7.T. S. Messerges and E. A. Dabbish, “Digital rights management in a 3G mobile phone and beyond,” In Proceedings of the 2003 ACM workshop on Digital rights management, pp. 27–38, ACM Press, 2003.Google Scholar
- 8.F. Pestoni, J. B. Lotspiech, and S. Nusser, “xCP: Peer-to-Peer Content Protection,” IEEE Signal Processing Magazine, 2004.Google Scholar
- 9.Open Mobile Alliance, “OMA DRM specification v2.0. draft version,” http://member.openmobilealliance.org/ftp/Publicdocuments/BAC/DLDRM/, Jan. 2004.Google Scholar
- 10.M. Terada, H. Kuno, M. Hanadate, and K. Fujimura, “Copy prevention scheme for rights trading infrastructure”.Google Scholar
- 11.T. Aura and D. Gollmann, “Software license management with smart cards,” USENIX Workshop on Smartcard Technology, May 1999.Google Scholar
- 12.P. England, B. Lampson, J. Manferdelli, M. Peinado, and B. Willman, “A Trusted Open Platform,” IEEE Computer Security, 2003.Google Scholar
- 13.Microsoft Corporation, “Next-generation secure computing base: the road to security,” http://www.microsoft.com/ngscb, 2003.Google Scholar
- 14.M. Sosonkin, G. Naumovich and Nasir Memon, “Obfuscation of design intent in object-oriented applications,” In Proceedings of the 2003 ACM workshop on Digital rights management, pp. 142–153, ACM Press, 2003.Google Scholar
- 15.W. Stallings, “Cryptography and network security: principles and practice,” Prentice-Hall, Inc., Upper Saddle River, NJ 07458, USA, third edition, 2002.Google Scholar
- 16.D. Boneh and M. K. Franklin, “An efficient public key traitor tracing scheme,” In Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, pp. 338–353, Springer-Verlag, 1999.Google Scholar
- 17.R. Safavi-Naini and H. Wang, “Broadcast authentication for group communication,” Theoretical Computer Science, 269(1–2): 1–21, October 2001.MATHCrossRefMathSciNetGoogle Scholar
- 18.The Internet Society, “Uniform Resource Identifiers (URI): Generic Syntax. http://www.ietf.org/rfc/rfc2396.txt, 1998.Google Scholar
- 19.The Internet Society, “Registration Procedures for URL Scheme Names”, http://www.ietf.org/rfc/rfc2717.txt, 1999.Google Scholar
Copyright information
© International Federation for Information Processing 2005