Transparent Digital Rights Management System with Superdistribution

6
Transparent Digital Rights Management System with Superdistribution Chih-Ta Yen 1 , Hrong-Twu Laiw 2 , Nai-Wei Lo 1* , Ting-Chun Liu 1 , Jay Stu 3 1 Department of Information Management National Taiwan University of Science and Technology 2 Department of Information Management Shih Hsin University 3 Innovative DigiTech-Enabled Applications and Services Institute Institute for Information Industry Taiwan, Taipei * [email protected] Abstract—Digital rights management allows content providers to control the distribution and usage of digital contents for their e-commerce applications. Most of previously proposed digital rights management mechanisms focus on the protection mechanisms for digital contents and pay less attention to the discussion on business models and users’ convenience. It will decrease effective distribution for digital contents and the intentions of users’ usage. With the superdistribution model, we first propose a digital rights management system that increases distribution channels to increase the efficiency of distribution for digital contents. Then, we implement the proposed digital rights management system by using the API Hook with Microsoft Foundation Classes (MFC) as a wrapper. The implemented digital rights management system can achieve content protection without sacrificing user’s convenience. In addition, the proposed digital rights management system satisfies the following requirements: description, identification, transaction, protection, monitoring, tracing, superdistribution, transparency, and portability. Keywords-component; Digital Rights Management, API Hook, Wrapper, Transparency I. INTRODUCTION With the rapid development of Internet and computers, more and more digital contents including text files, audios, and videos can be distributed through public network channels. However, it is easy for a pirate to illegally copy, use and distribute those digital contents from public channels. Intentional piracy of digital contents has become a serious problem. The consequence of piracy has brought large amount of revenue loss to the digital content providers [12]. Digital Rights Management (DRM) is a mechanism which applies cryptosystem to defend against unauthorized copy or usage and protects the rights of digital content providers [8, 12]. DRM can be used to track and manage the utilization of digital contents, including copy permission, distribution, and legal issues. In 2001, Iannella [9] proposed a DRM architecture, and the architecture describes how core entities interact with each other to protect a digital content and its distribution. The architecture points out that a successful DRM must consider both content protection and content distribution. Since then, a variety of research works have been published [2-3, 5, 7-8, 10-11, 13-14, 18-21, 24-26. 28]. However, most of them only focus on content protection and do not consider effective content distribution in order to earn more profits. Liaw et al. [13] provided a complete digital rights management process design. However, they do not specify any method for offline tracking. Furthermore, their mechanism does not support rights transfer and the rights revoking as they package all files including digital contents, rights expression language, and monitor module into a single protected file. Their mechanism does not support superdistribution either. Sun et al. [24] introduced an improved system to rectify privacy deficiencies of the identity-based DRM system proposed by Conrado. Moreover, their system retains users’ privacy by removing the relationship between users and digital contents. Nonetheless, they only mentioned that digital contents are protected by using secure memory and their work does not monitor the use of digital contents. Sun et al. [25] designed a ticket based DRM to solve user privacy problem. Although their scheme introduces a new role as service provider and uses the ticket issuing mechanism to protect users’ privacy, this system may encounter unavailability problem and require enormous computing cost from users as it consumes considerable computing power to perform a partial blind signature mechanism. In view of currently existing multimedia application systems, such as Windows Media Rights Manager, iTunes, Adobe Systems, the vendors only support their own digital content types and thus do not offer system transparency for the sake of users’ convenience. System transparency is an important feature for users who can use a new system without changing their using behaviors and habits [27]. A successful DRM system heavily relies on its support capability to business models of digital content providers as well as potential customers. In 1990, Mori and Kawahara [18] introduced the concept and architecture of superdistribution for software distribution. Under such architecture, the chosen target of software can be available 2010 International Conference on Broadband, Wireless Computing, Communication and Applications Unrecognized Copyright Information DOI 10.1109/BWCCA.2010.110 435 2010 International Conference on Broadband, Wireless Computing, Communication and Applications Unrecognized Copyright Information DOI 10.1109/BWCCA.2010.110 435 2010 International Conference on Broadband, Wireless Computing, Communication and Applications 978-0-7695-4236-2/10 $26.00 © 2010 IEEE DOI 10.1109/BWCCA.2010.110 435 2010 International Conference on Broadband, Wireless Computing, Communication and Applications 978-0-7695-4236-2/10 $26.00 © 2010 IEEE DOI 10.1109/BWCCA.2010.110 435

Transcript of Transparent Digital Rights Management System with Superdistribution

Transparent Digital Rights Management System with Superdistribution

Chih-Ta Yen1, Hrong-Twu Laiw2, Nai-Wei Lo1*, Ting-Chun Liu1, Jay Stu3 1Department of Information Management

National Taiwan University of Science and Technology 2Department of Information Management

Shih Hsin University 3Innovative DigiTech-Enabled Applications and Services Institute

Institute for Information Industry Taiwan, Taipei

*[email protected]

Abstract—Digital rights management allows content providers to control the distribution and usage of digital contents for their e-commerce applications. Most of previously proposed digital rights management mechanisms focus on the protection mechanisms for digital contents and pay less attention to the discussion on business models and users’ convenience. It will decrease effective distribution for digital contents and the intentions of users’ usage. With the superdistribution model, we first propose a digital rights management system that increases distribution channels to increase the efficiency of distribution for digital contents. Then, we implement the proposed digital rights management system by using the API Hook with Microsoft Foundation Classes (MFC) as a wrapper. The implemented digital rights management system can achieve content protection without sacrificing user’s convenience. In addition, the proposed digital rights management system satisfies the following requirements: description, identification, transaction, protection, monitoring, tracing, superdistribution, transparency, and portability.

Keywords-component; Digital Rights Management, API Hook, Wrapper, Transparency

I. INTRODUCTION With the rapid development of Internet and computers,

more and more digital contents including text files, audios, and videos can be distributed through public network channels. However, it is easy for a pirate to illegally copy, use and distribute those digital contents from public channels. Intentional piracy of digital contents has become a serious problem. The consequence of piracy has brought large amount of revenue loss to the digital content providers [12]. Digital Rights Management (DRM) is a mechanism which applies cryptosystem to defend against unauthorized copy or usage and protects the rights of digital content providers [8, 12]. DRM can be used to track and manage the utilization of digital contents, including copy permission, distribution, and legal issues.

In 2001, Iannella [9] proposed a DRM architecture, and the architecture describes how core entities interact with each other to protect a digital content and its distribution. The architecture points out that a successful DRM must consider

both content protection and content distribution. Since then, a variety of research works have been published [2-3, 5, 7-8, 10-11, 13-14, 18-21, 24-26. 28]. However, most of them only focus on content protection and do not consider effective content distribution in order to earn more profits.

Liaw et al. [13] provided a complete digital rights management process design. However, they do not specify any method for offline tracking. Furthermore, their mechanism does not support rights transfer and the rights revoking as they package all files including digital contents, rights expression language, and monitor module into a single protected file. Their mechanism does not support superdistribution either.

Sun et al. [24] introduced an improved system to rectify privacy deficiencies of the identity-based DRM system proposed by Conrado. Moreover, their system retains users’ privacy by removing the relationship between users and digital contents. Nonetheless, they only mentioned that digital contents are protected by using secure memory and their work does not monitor the use of digital contents.

Sun et al. [25] designed a ticket based DRM to solve user privacy problem. Although their scheme introduces a new role as service provider and uses the ticket issuing mechanism to protect users’ privacy, this system may encounter unavailability problem and require enormous computing cost from users as it consumes considerable computing power to perform a partial blind signature mechanism.

In view of currently existing multimedia application systems, such as Windows Media Rights Manager, iTunes, Adobe Systems, the vendors only support their own digital content types and thus do not offer system transparency for the sake of users’ convenience. System transparency is an important feature for users who can use a new system without changing their using behaviors and habits [27].

A successful DRM system heavily relies on its support capability to business models of digital content providers as well as potential customers. In 1990, Mori and Kawahara [18] introduced the concept and architecture of superdistribution for software distribution. Under such architecture, the chosen target of software can be available

2010 International Conference on Broadband, Wireless Computing, Communication and Applications

Unrecognized Copyright Information

DOI 10.1109/BWCCA.2010.110

435

2010 International Conference on Broadband, Wireless Computing, Communication and Applications

Unrecognized Copyright Information

DOI 10.1109/BWCCA.2010.110

435

2010 International Conference on Broadband, Wireless Computing, Communication and Applications

978-0-7695-4236-2/10 $26.00 © 2010 IEEE

DOI 10.1109/BWCCA.2010.110

435

2010 International Conference on Broadband, Wireless Computing, Communication and Applications

978-0-7695-4236-2/10 $26.00 © 2010 IEEE

DOI 10.1109/BWCCA.2010.110

435

freely in various distribution channels without restriction in an encrypted format. Lately, Hwang [8] successfully employed superdistribution into the design of a DRM system for digital contents in a more creative and effective manner [12, 15]. A DRM system with superdistribution has the advantages of increasing distribution channels, reducing costs, and forming strong partner networks [12, 15-16]. Thus, a DRM system is successful if the following requirements are satisfied [8, 12, 15-16, 18, 23]: Description: For consumers to know what the digital content is before they buy it, content information description and preview should be provided in the system. Identification: A digital content must be uniquely identified. Thus, each digital content should be assigned a unique number. Transaction: To support transactions of the protected digital content, various transaction processes should be defined or provided. Protection: Only an authenticated consumer can use the corresponding digital content. In our system design, cryptosystem is adopted to encrypt the digital content and only legal and authenticated user owns the decryption key. Monitoring: To assure every action from a user is valid, a DRM system should provide monitoring feature. In our system, API HOOK technique is adopted to monitor consumer’s behaviors on content usage. Tracing: Content provider may want to know how consumers use purchased digital contents, so the system should be able to transfer usage records of consumers from their devices to the content provider. Superdistribution: It can increase the distribution channels when a DRM system supports superdistribution. In our system, we separate content usage license from the content itself to facilitate content distribution. Transparency: In our system API HOOK is implemented to achieve monitoring feature and allows consumers to keep using his favor media player. Portable: In our system, online authentication and smart card authentication mechanisms are provided for consumers to use contents in different devices.

In this paper, we propose a novel DRM system that adopts the superdistribution model to increase distribution channels and consequently support more versatile business models. We also implement a prototype for the proposed DRM system using the API Hook technique from Microsoft Foundation Classes (MFC) as a software wrapper to achieve system transparency and provide user’s convenience. Note that our implementation is under Windows 32-bit platform.

II. THE PROPOSED THEME In this paper, we propose a secure, fair and effective

DRM system to support the distribution and management of digital contents through Internet.

Our system model is shown in Fig. 1 and stakeholders of this whole system model are introduced as follows.

Consumer (C): A consumer who utilizes this system is to consume digital contents. A consumer buys digital contents from the digital content rights issuing management platform, and then completes the payment. Later, the consumer can

download the digital contents and obtain the license. Following this, the consumer enjoys his digital contents and can distribute digital contents or get digital contents through superdistribution.

Certificate Authority (CA): CA is the TTP of this mechanism. Its services are as follows: registration of applicants, licenses issuing, licenses revoking, and licenses management. Moreover, it will store evidence during the process of transactions for future judgment should arguments occur.

Digital Content Provider (CP): His alias is the provider. His major tasks are to provide contents produced by the government or publishers and to digitalize authors’ works. Then, he provides these digital contents for distribution.

Digital Content Rights Issuing Management Platform (MP): Its alias is management platform and its services are (1) providing a website to advertise and market providers’ digital contents. This website must contain functions that include flexibility with regard to transaction, licenses issuing, and tracing (2) identifying banks, consumers, and providers. Moreover, it serves as a bridge and manages cash flow.

Bank (BK): Providing financial transactions and related business.

BK CA

CP MP

C1

Protected Content

Superdistribution

C2

C3

Protected LicenseBuy license

Figure 1. The proposed DRM system model

The following describes the detailed processes of our mechanism. Our mechanism contains seven phases: Initial Phase, Superdistirbution Phase, Content Selection and Authentication Phase, Flexible Payment Phase, License Issuing Phase, Tracking Phase, License Reissuing Phase. We show system notations in this paper as follows:

IDX: Identity of user X PW: Password TIDX: Temporary identity generated with KryptoKnight PM: The selected method of payment DIDX: Serial number of X’s device. The device may be

CPU, smart card, etc. MID: MP’s Server ID PID: CP’s Server ID DCSN: Serial number of the digital content L: License of the digital content tk: Verification code of the license SigX: Signature with key X EX: Encryption with key X UR: Grants of the digital content UD: The use data of the consumer GMX: Rates of X APX: Accounts payable of X

436436436436

t: Timestamp of license issuing time r: Random number MG: Money Guarantee TOX: Success message of X’s transaction CON: A digital content CON_S: A sample of CON OD: Other data describes CON DRM_CON: A protected digital content, including DRM

controller CertX: Certificate of X

Initial Phase During the initial phase, all participants within this

mechanism must register with CA and request certificates. After registration, CP decides on marketing and basic grants for superdistribution. If consumers wish enjoy these digital contents, they must register MP by sending a self certificate, device serial number or smart card. Then, CP registers his content as the following step: Message 1-1, CP MP: URCONIDPP ||||

CP transfers his grants of digital contents in XrML format and sends the digital contents and XrML to MP through a secure channel. MP saves the above information upon receiving it. Figure 2 shows the processes for uploading.

CP MP

2. Save

Figure 2. The upload content process of Initial Phase

Superdistribution Phase Potential consumer CN can receive a protected digital

content shared by original consumer CO through emails, instant messages, or P2P connections. CN can test the content with the basic grants. If CN is interested, he can buy the content through a DRM controller.

MP

CO CN

2. Enjoying the contentwith basic license

Figure 3. Superdistribution Phase

Content Selection and Authentication Phase After the consumer finishes registration and receives the

certificate, he can browse the website of MP or get the content by superdistribution to find contents of interest. Message 3-1, C MP: DCSN

The Consumer C sends a request containing the identity of the desired content and the desired grants to MP. Message 3-2, MP C:

)(||||_|||| MPPK UEODSCONURDCSNC

MP decides upon a temporary private key dMP and generates a public key UMP with Elliptic Curve Diffie-Hellman (ECDH). Next, MP sends the encrypted message PKC to C.

Gd U MPMP =

CP

C

3. Generatetemporary ID

5. Check the DIDis in the DB

Figure 4. Content Selection and Authentication Phase

Message 3-3, C MP: )||||( PMTIDDCSNE CPKMP

C receives the message and checks the content. If the message is correct, C decides upon a temporary private key dC and generates the private key UC with ECDH[1]. Next, C generates a temporary identity TIDC with KryptoKnight[17].

GdUd CCC =, )||||||( CCCCMPPKC UDIDUIDUETID

MP⊕=

Then, C sends the message to MP, including TIDC, the serial number of the content, and the payment method. The payment method may be credit transfer, micro-payment, or credit card payment.

Finally, MP decrypts the message with his own private key. Then, MP identifies C by checking the Database (DB) to see if it has TIDC or not. The process maintains the anonymity of consumers by using a temporary identity that does not involve the personal information of C to avoid the consumers’ privacy leaking. Flexible Payment Phase

Consumers can buy licenses from online services after authentication. Figure 5 shows the details of the processes: Message 4-1, C MP:

)||)||||(((|||||| MPCMPMPKMP CertUUrHSigEPMDCSNU MP decides the temporary private key dMP and generates

a public key UMP with ECDH after C requests the desired digital content. Then, MP selects a random number r and generates a session key K ( )||( rUdHK CMP= ) between MP and C by hashing. After this, MP sends the encrypted messages to C. Message 4-2, MP C:

)||)||||((( PMCertUUHSigE CMPCCK C can generate the same session key K

( )||( rUdHK MPC= ) of MP by using the parameter sent by MP and check the validity after receiving a message from

437437437437

MP. After checking the validity of K, C returns the related message as a response to MP.

BK CP MP

C

8. Charge

1. Compute session key K

3. Verify andcompute K

Figure 5. Flexible Payment Phase

Message 4-3, MP BK: )||(|||| CCPK AMIDEPMDCSN

BK

MP sends the related message to BK for payment, including the serial number of the content, the payment method, the identity, and the payment amount. Message 4-4, BK C: )||(|| CCPK TOIDEDCSN

MP

Message 4-5, BK MP: )||(|| CCPK TOIDEDCSNMP

When completing the transaction, BK sends a successful

message to inform C and MP that the transaction has been completed, including the serial number of the content, the consumer’s identity, and the message. Message 4-6, MP BK:

)||||(|| MPCPCPPK GMGMIDEDCSNMP

MP sends the profit distribution agreed upon by MP and

CP to BK. BK processes the transaction after receiving the above message.

In addition, the TOC contains a hash of the serial number of the content, the consumer’s identity, and the timestamp. The above messages are also signed with BK’s private key. License Issuing Phase

After payment, the consumer can request the license so as to enjoy the content. The details of the process are shown in Figure 6: Message 5-1, C MP:

)||(|||||| CCPKC TOIDEPMDCSNUMP

C sends TOC to MP for requesting the license. At the

same time, they start to agree on the session key K. Message 5-2, MP C:

MPPKCCMPMPKMP CertLEIDUUrHSigErUC

||)(||||)||||(((||||

MP checks the validity of the TOC, it issues the license encrypted with K to C.

)}||||||)||(||(||||||||)||(||{

ODURtMIDDIDHDCSNSigODURtMIDDIDHDCSNL

CMP

C=

MP

C

6. Save token

GdUd ccc =,2. Verify and

generate key

4. Generate token

Figure 6. License Issuing Phase

Message 5-3, C MP: )||)||||((( tkLUUHSigE MPCCK C decrypts the message and receives the license and

hashes the identity of C’s device and the license as a token for checking validity in the future. Finally, C sends the token to MP and MP saves the token.

)||( LDIDHtk C= In order to avoid the confusion which results in users’

licenses being reissued if CP requests for license transferring, we do not include CP’s identity in the license. Moreover, we can protect user privacy by eliminating it in the license. Furthermore, users cannot change the grants or other information because they are signed with MP’s private key. Tracking Phase

Regardless of online or offline patterns, the DRM controller must record and trace the processes whereby users enjoy contents so as to protect the contents. Figure 7 shows the details of the process:

MP

C

1. Using DCunder DRM controller

3. Generatekey K

5. Verify K

Figure 7. Tracking Phase

Message 6-1, C MP: )||||||)||((||||( tkDCSNUDrUHSigrUE CCCPKBK

When consumers connect to the Internet and enjoy the

digital contents at the same time, the DRM controller will verify the validity of the user and usage through MP. The DRM controller sends a request for identification which includes token, using data, and information to MP. Message 6-2, MP C:

)))||||||(((||)||||((|| UDrUUHSigErUUHSigU MPCMPKMPCMPMP After MP receives the request and determines the

validity, it sends information which contains the current state

438438438438

of information and this is signed with MP’s private key to C. Then, C saves the above information. License Reissuing Phase

Consumers may lose their licenses. This mechanism allows consumers to request license reissuing. The details of the process are shown in Figure 8:

MP

C

BK

DBC DIDDID?

.3 =

7. Revoke the original license

11. Save token

1. Generatetemporary ID

3. Check the DIDis in the DB

9. Verify andcompute K

Figure 8. License Reissuing Phase

Message 7-1, C MP: CTIDPMDCSN |||| C decides the temporary private key dC and generates a

temporary public key UC with ECDH. Then, C computes the temporary identity TIDC and sends the serial number of the content, the payment method for reissuing, and TIDC to MP to request license reissuing. Message 7-2, MP BK:

)||||(|||| MPCCPK GMAMIDEPMDCSNBK

P checks the validity of DIDC by searching its DB after

receiving the request. Next, MP notifies BK that C shall pay for the amount of fees. Message 7-3, BK MP: )||(|| CCPK TOIDEDCSN

BK

BK processes the transaction and sends a message to indicate that the transaction has been completed to MP. Message 7-4, MP C:

)||)(||||)||||(((|||| MPPKCCMPMPKMP CertLEIDUUrHSigErUC

MP revokes C’s original license and computes the session key K after receiving the message showing that the transaction has been completed. Next, MP reissues the license and encrypts it with K. Then, MP sends the above to C. Message 7-5, C MP: )||)||||((( tkLUUHSigE MPCCK

C computes a session key and then generates a token. After that, C sends the token to MP. MP saves the token after receiving it.

III. IMPLEMENTATION This paper implements a sample of DRM system for

protecting digital contents. The implementation contains the following features: attainment of integrity and security by wrapping; monitoring of processes by API HOOK and description of digital rights language with the XrML format. Moreover, this system allows various authentications, including both online and offline authentication with device identity of hardware or smart card. This section provides the architecture of this system.

There are four functional modules in this system, shown in Figures 9 and 10: Digital Content (DC) Management, DC Package, DC Wrapper, and DC Rights Exchange (DCRE). Furthermore, DC Management, DC Package, and DCRE are the modules of digital content rights issuing management platform. DC Wrapper is the module of clients and it starts when we use the services of digital contents.

The following describes the functions of each module: DC Management: This module provides content uploading and rights setting, such as the printing rights, times of use, durations of use. DC Package: What providers hope for is to distribute their contents effectively in order to earn money. Furthermore, consumers must be authenticated and paid for their contents. This system decrypts digital contents to avoid unauthorized use. Moreover, we package the contents to a new file, which includes encrypted content, copyright information, rights expression language, and API HOOK module. Moreover, we support marketing grants and basic grants for supporting superdistribution as well. In addition, the above mechanism makes rights exchanging and rights revoking more easily. Besides, this implementation provides a convenient and the user-friendly interface under an API HOOK by adopting MFC. DCRE: This system supports rights exchanging and rights revoking. As mentioned before, this paper allows providers to pay more attention on business models. DC Wrapper: In this system, we adopt an API HOOK to monitor processes. In addition, consumers need not install plug-in and change their habits.

Figure 9. The modules and functions in the digital content rights

management platform

IV. CONCLUSION In this paper, a novel digital content distribution and

management system is proposed to support versatile business models. In addition, a prototype is implemented. By using API HOOK technique, the prototype can hook to existing multimedia application. Hence, users do not need to change their usage behaviors and habits on existing applications

439439439439

when getting the proposed DRM support. In other words, this prototype achieves system transparency and thereby inherits all system advantages proposed by Liaw et al. [13]. Furthermore, we propose the concept of DRM controller to solve tracing issue without the need of installing plug-in program.

Figure 10. The functions of DC Wrapper

ACKNOWLEDGMENT This research is supported by the “Digital Convergence

Service Open Platform” project of the Institute for Information Industry which is subsidized by the Ministry of Economy Affairs of the Republic of China.

REFERENCES [1] E. Barker, D. Johnson, and M. Smid, “Recommendation for Pair-

Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised),” National Institute of Standards and Technology Special Content 800-56A, 2007.

[2] R.G. Cattelan, S. He, and D. Kirovski, “Prototyping a Novel Platform for Free-trade of Digital Content,” ACM International Conference Proceeding Series, Vol. 192, 2009.

[3] C. Conrado, F. Kamperman, C.J. Schrijen, and W. Jonker, “Privacy in an Identity-based DRM System,” Workshop on Database and Expert Systems Applications, pp. 389-395, 2003.

[4] K. Coyle, “Rights Expression Languages,” Technical report, A Report for the Library of Congress, 2004, http://www.loc.gov/standards/.

[5] E. Damiani and C. Fugazza, “Toward Semantics-aware Management of Intellectual Property Rights,” Online Information Review, Vol. 31, No. 1, 2007.

[6] J. Erickson, R. Iannella, and R. Wenning, “Workshop Report,” W3C Workshop on Digital Rights Management for the Web, 2001, http://www.w3.org/2000/12/ drm-ws/workshop-report.html

[7] F.M.F Filho, J.P. de Albuquerque, and P.L. de Geus, “A service-oriented framework to promote interoperability among DRM systems,” Lecture Notes in Computer Science, Vol. 4267, Springer Berlin, pp. 124-127, 2006.

[8] S.O. Hwang, “How Viable Is Digital Rights Management,” Computer, Vol. 42, No. 4, pp. 28-34, 2009.

[9] R. Iannella, “Digital Rights Management (DRM) Architectures,” D-Lib Magazine, Vol. 7, No. 6, pp. 207-216, 2001.

[10] P.A. Jamkhedkar, G.L. Heileman, and I. Martinez-Ortiz, “Middleware Services for DRM,” Proc. of the International Conference on Communication Systems Software and Middleware, Bangalore, India, pp. 1-8, 2007.

[11] D. Kirovski and K. Jain, “Off-line Economies for Digital Media,” Proc. of the International Workshop on Network and Operating Systems Support for Digital Audio and Video, Newport, Rhode Island, 2006.

[12] W. Ku and C.H. Chi, “Survey on the Technological Aspects of Digital Rights Management,” Proc. of the 7th Information Security Conference, Vol. 3225, pp. 391-403, 2004.

[13] M.T. Liaw, J.F. Lin, W.P. Liao, S.C. Liu, and C.L. Lin, “Digital Content Right Issuing Management Practice Mechanism,” Journal of e-Business, Vol. 9, No. 2, pp. 321-352, 2007.

[14] M.T. Liaw, M.H. Guo, W.P. Liao, and L.L. Hsiao, “Digital Right Issuing Management Mechanism and Implementation Strategy,” Journal of Computer Science and Application, Vol. 3, No. 1, pp. 23-42, 2007.

[15] Q. Liu, R. Safavi-Naini, and N.P. Sheppard, “Digital Rights Management for Content Distribution,” Proc. of the Australasian Information Security Workshop Conference on ACSW Frontiers, Vol. 21, pp. 49-58, 2003.

[16] Z. Liu, B. Wang, B. Lee, and M.M. Han, “Security License Distribution Mechanism for Rights Delegation Models of Group Distribution between Consumers,” Proc. of the International Conference on Computational Science and its Applications, pp. 144-152, 2007.

[17] R. Molva, G. Tsudik, E.V. Herreweghen, and S. Zatti, “KryptoKnight Authentication and Key Distribution System,” Proc. of Second European Symposium on Research in Computer Security, Vol. 648, pp. 155-174, 1992.

[18] R. Mor, and M. Kawahara, “Superdistribution: the Concept and the Architecture,” Transactions of the Institute of Electronics and Communication Engineers of Japan, Vol. E73-E, No. 7, pp. 1133-1146, 1990.

[19] A. Muhlbauer, R. Safavi-Naini, F. Salim, N.P. Sheppard, and M. Surminen, “Location Constrains in Digital Rights Management,” Computer Communications, Vol. 31, No. 6, pp. 1173-1180, 2008.

[20] N. Nadah, M.D. Rosnay, and B. Bachimont, “Licensing Digital Content with a Generic Ontology: Escaping from the Jungle of Rights Expression Languages,” Proc. of the International Conference on Artificial Intelligence and Law, pp. 65-69, 2007.

[21] Y. Nishimoto, A. Baba, T. Kimura, H. Imaizumi, and Y. Fujita, “Advanced Conditional Access System for Digital Broadcasting Receivers Using Metadata,” IEEE Transactions on Broadcasting, Vol. 53, No. 3, pp. 697-702, 2007.

[22] A. Osterwalder and Y. Pigneur, “An ontology for e-business models,” in Value Creation from E-Business Models, Butterworth-Heinemann, 2004.

[23] B. Rosenblatt, B. Trippe, and S. Mooney, “Digital Rights Management: Business and Technology,” John Wiley & Sons, 2001.

[24] H.M. Sun, C.F. Hung, and C.M. Chen, “An Improved Digital Rights Management System Based on Smart Cards,” Proc. of the International Conference on Digital EcoSystems and Technologies, Cairns, Australia, pp. 308-313, 2007.

[25] M.K. Sun, C.S. Laih, H.Y. Yen, and J.R. Kuo, “A Ticket Based Digital Rights Management Model,” Proc. of IEEE Consumer Communications and Networking Conference, Las Vegas, Nevada, pp. 1-5, 2009.

[26] N.P. Sheppard and R. Safavi-Naini, “Protecting Privacy with the MPEG-21 IPMP Framework,” Proc. of the International Workshop on Privacy Enhancing Technologies, Vol. 4528, pp. 152-171, 2006.

[27] S. Turkle, “The second self: computers and the human spirit,” Simon & Schuster, inc., New York, NY, 1984.

[28] B. Wang and B. Lee, “A Study for License Distribution Mechanism Using Accumulated Device Identifier in DRM System,” Proc. of the International Conference on Multimedia and Ubiquitous Engineering, Seoul, Korea, pp. 1118-1123, 2007.

[29] M. Zhaofeng, Y. Yixian, and N. Xinxin, “Secure and Flexible Digital Rights Management in a Pervasive Usage Mode,” Proc. of the International Conference on Computational Intelligence and Security, pp. 863-867, 2007.

440440440440