Abstract
Current digital rights management systems typically bind the right to use content to a particular device whose location cannot be changed easily. Users may find it difficult to acquire a new license for each device. We propose a license transfer system that allows the user to share a license between devices and uses transaction track files to ensure that only one device can use the license at a time. We analyze the security properties of the proposed system.
This work was funded by the Smart Internet Technology Cooperative Research Centre, Australia.
Chapter PDF
Similar content being viewed by others
References
Q. Liu, R. Safavi-Naini, and N. P. Sheppard, “Digital rights management for content distribution,” In Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003, pp. 49–58, Australian.
D. K. Mulligan, J. Han, and A. J. Burstein, “How DRM-based content delivery systems disrupt expectations of ‘personal use’,” In Proceedings of the 2003 ACM workshop on Digital rights management, pp. 77–89, ACM Press, 2003.
W. Eric, “Protecting digital music using DRM: example of a mobile service over WLAN (version 1.0)”, 2002.
J. Feigenbaum, M. J. Freedman, T. Sander, and A. Shostack, “Privacy engineering for digital rights management systems,” In Digital Rights Management Workshop, pp. 76–105, 2001.
Digital World Services, “Digital world services launches rights locker and content manager,” http://www.dwsco.com/, 2001.
Cyber Patrol, “Free MP3.com technology takes cue from open-source movement,”http://news.com.com/2100-1023-251014.html?legacy=cnet, 2001.
T. S. Messerges and E. A. Dabbish, “Digital rights management in a 3G mobile phone and beyond,” In Proceedings of the 2003 ACM workshop on Digital rights management, pp. 27–38, ACM Press, 2003.
F. Pestoni, J. B. Lotspiech, and S. Nusser, “xCP: Peer-to-Peer Content Protection,” IEEE Signal Processing Magazine, 2004.
Open Mobile Alliance, “OMA DRM specification v2.0. draft version,” http://member.openmobilealliance.org/ftp/Publicdocuments/BAC/DLDRM/, Jan. 2004.
M. Terada, H. Kuno, M. Hanadate, and K. Fujimura, “Copy prevention scheme for rights trading infrastructure”.
T. Aura and D. Gollmann, “Software license management with smart cards,” USENIX Workshop on Smartcard Technology, May 1999.
P. England, B. Lampson, J. Manferdelli, M. Peinado, and B. Willman, “A Trusted Open Platform,” IEEE Computer Security, 2003.
Microsoft Corporation, “Next-generation secure computing base: the road to security,” http://www.microsoft.com/ngscb, 2003.
M. Sosonkin, G. Naumovich and Nasir Memon, “Obfuscation of design intent in object-oriented applications,” In Proceedings of the 2003 ACM workshop on Digital rights management, pp. 142–153, ACM Press, 2003.
W. Stallings, “Cryptography and network security: principles and practice,” Prentice-Hall, Inc., Upper Saddle River, NJ 07458, USA, third edition, 2002.
D. Boneh and M. K. Franklin, “An efficient public key traitor tracing scheme,” In Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, pp. 338–353, Springer-Verlag, 1999.
R. Safavi-Naini and H. Wang, “Broadcast authentication for group communication,” Theoretical Computer Science, 269(1–2): 1–21, October 2001.
The Internet Society, “Uniform Resource Identifiers (URI): Generic Syntax. http://www.ietf.org/rfc/rfc2396.txt, 1998.
The Internet Society, “Registration Procedures for URL Scheme Names”, http://www.ietf.org/rfc/rfc2717.txt, 1999.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 International Federation for Information Processing
About this paper
Cite this paper
Liu, Q., Safavi-Naini, R., Sheppard, N.P. (2005). A License Transfer System for Supporting Content Portability in Digital Rights Management. In: Sasaki, R., Qing, S., Okamoto, E., Yoshiura, H. (eds) Security and Privacy in the Age of Ubiquitous Computing. SEC 2005. IFIP Advances in Information and Communication Technology, vol 181. Springer, Boston, MA. https://doi.org/10.1007/0-387-25660-1_13
Download citation
DOI: https://doi.org/10.1007/0-387-25660-1_13
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-25658-0
Online ISBN: 978-0-387-25660-3
eBook Packages: Computer ScienceComputer Science (R0)