Redistributing time-based rights between consumer devices for content sharing in DRM system

Device-based digital rights management (DRM) systems tightly bind rights for content to a device. However, it can decrease the consumers’ convenience because it disturbs consumers who want to use the already purchased content with their other devices freely. Previous research into solving this problem still have burdens such as restricting the number of devices that a consumer can use and requiring a special device that manages content sharing. In this paper, we propose a new rights sharing scheme which does not restrict the number of devices that a consumer can use and does not require a specialized device. In our scheme, the right to use content is represented as the right to use the content for a certain amount of time. Consumers can use the content with any of their devices by redistributing the usage amount of time between devices. The redistribution process only requires local synchronization among participating devices. To prevent illegal content sharing and to detect illegally increased content usage time, the amount of time that a consumer can have is limited and the rights for each unit of time has a unique number to prevent illegal duplications. We present data structures and protocols, analyze security properties of our scheme, compare our scheme with related work, and evaluate our scheme through implementation.

[1]  Deepa Kundur,et al.  Video fingerprinting and encryption principles for digital rights management , 2004, Proceedings of the IEEE.

[2]  Paul Koster,et al.  Identity-Based DRM: Personal Entertainment Domain , 2006, Trans. Data Hiding Multim. Secur..

[3]  Steve Mitchell,et al.  The long march to interoperable digital rights management , 2004, Proceedings of the IEEE.

[4]  S.A.F.A. van den Heuvel,et al.  Secure content management in authorised domains , 2002 .

[5]  Deirdre K. Mulligan,et al.  How DRM-based content delivery systems disrupt expectations of "personal use" , 2003, DRM '03.

[6]  Eric DIEHL,et al.  /spl copy/ watermark: closing the analog hole , 2003, 2003 IEEE International Conference on Consumer Electronics, 2003. ICCE..

[7]  Andrew S. Tanenbaum,et al.  A DRM security architecture for home networks , 2004, DRM '04.

[8]  F. Pestoni,et al.  xCP: peer-to-peer content protection , 2004, IEEE Signal Processing Magazine.

[9]  Wei-Bin Lee,et al.  A Portable DRM Scheme Using Smart Cards , 2007, J. Organ. Comput. Electron. Commer..

[10]  Amos Fiat,et al.  Tracing Traitors , 1994, CRYPTO.

[11]  G. Cena,et al.  Analysis of Response Times in 802.11 Industrial Networks , 2007, 2007 5th IEEE International Conference on Industrial Informatics.

[12]  John Viega,et al.  Network Security with OpenSSL , 2002 .