IMPLEMENTATION AND EVALUATION OF NEW ILLEGAL COPY PROTECTION - Protection Against Making a Illegal Copy of a Copy
Masaki Inamura, Toshiaki Tanaka
2007
Abstract
We propose a new method of illegal copy protection, which is adapted to digital contents delivery service, allows for legitimate users to make private copies on arbitrary terminals within the limited times, and requires no secure hardware. Using the method, we can realize two types of services; one is a client-server model over peer-to-peer network, and the other is a broadcast model over multicast network which is similar to existing broadcast. In this paper, we implement the proposed method and evaluate whether our method is feasible from the viewpoint of security and performance.
References
- 4C Entity CPRM, http://www.4centity.com/
- Association of Radio Industries and Businesses, 2003. Conditional Access System Specifications for Digital Broadcasting, In ARIB STD-B25. ARIB.
- Fujii, H., Takei, H., Nakasato, K., Ihori, S., Miyake, N., 2001. A New Method of Copyright Protection Enabling Less Restricted Personal Copy. In EIP2001. IPSJ.
- Spencer, C., Avni, R., 2003. DRM and Standardization - Can DRM Be Standardized?, In Digital Rights Management, Springer-Verlag.
- Whitfield, D., Martin, E. H., 1976, New directions in cryptography, In Trans. On Information Theory, IEEE.
- Carlos, S., Miguel, D., Jaime, D., 2006, Digital Object Rights Management -Interoperable Client-side DRM Middleware, In SECRYPT2006, INSTICC.
Paper Citation
in Harvard Style
Inamura M. and Tanaka T. (2007). IMPLEMENTATION AND EVALUATION OF NEW ILLEGAL COPY PROTECTION - Protection Against Making a Illegal Copy of a Copy . In Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007) ISBN 978-989-8111-12-8, pages 427-432. DOI: 10.5220/0002124204270432
in Bibtex Style
@conference{secrypt07,
author={Masaki Inamura and Toshiaki Tanaka},
title={IMPLEMENTATION AND EVALUATION OF NEW ILLEGAL COPY PROTECTION - Protection Against Making a Illegal Copy of a Copy},
booktitle={Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)},
year={2007},
pages={427-432},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002124204270432},
isbn={978-989-8111-12-8},
}
in EndNote Style
TY - CONF
JO - Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)
TI - IMPLEMENTATION AND EVALUATION OF NEW ILLEGAL COPY PROTECTION - Protection Against Making a Illegal Copy of a Copy
SN - 978-989-8111-12-8
AU - Inamura M.
AU - Tanaka T.
PY - 2007
SP - 427
EP - 432
DO - 10.5220/0002124204270432