Authors:
            
                    Masaki Inamura
                    
                        
                    
                     and
                
                    Toshiaki Tanaka
                    
                        
                    
                    
                
        
        
            Affiliation:
            
                    
                        
                    
                    KDDI R&D Laboratories Inc., Japan
                
        
        
        
        
        
             Keyword(s):
            Digital Rights Management, Private Copy, Illegal Copy Protection, Terminal ID, Group Key Agreement.
        
        
            
                Related
                    Ontology
                    Subjects/Areas/Topics:
                
                        Data Engineering
                    ; 
                        Data Management and Quality
                    ; 
                        Digital Rights Management
                    ; 
                        Information and Systems Security
                    ; 
                        Security in Information Systems
                    ; 
                        Security Information Systems Architecture and Design and Security Patterns
                    ; 
                        Security Requirements
                    ; 
                        Workflow and Business Process Security
                    
            
        
        
            
                Abstract: 
                We propose a new method of illegal copy protection, which is adapted to digital contents delivery service, allows for legitimate users to make private copies on arbitrary terminals within the limited times, and requires no secure hardware. Using the method, we can realize two types of services; one is a client-server model over peer-to-peer network, and the other is a broadcast model over multicast network which is similar to existing broadcast. In this paper, we implement the proposed method and evaluate whether our method is feasible from the viewpoint of security and performance.