NRC/CSTB/Information Systems Trustworthiness Project

Panel 3: Rights Management, Copy Detection, and Access Control

Rohit Khare & Joseph Reagle, World Wide Web Consortium

  1. Introduction
  2. Responses to Selected Panel Topics
  3. Additional Background Material
  4. (Slides as presented in Irvine)

1. Introduction

The World Wide Web Consortium is dedicated to 'Realizing the Full Potential of the Web'. One of the core principles behind that commitment is 'automatability': enabling rich meta-data and context to be associated with Web content so computers and humans can effectively find, communicate, and use information. Intellectual Property Rights (IPR) are an example of "rich" information. The W3C Technology & Society Domain has investigated issues related to IPR over the last two years, and we look forward to discussing some of the research challenges ahead for IPR Rights Management (RM).

Intellectual property on the Internet has been a contentious topic for a number of reasons. These include (1) does the nature of the technology require us to change the legal status of copyright as it stands now, (2) what rights should be associated with Web content, (3) how to technically express the rights, and (4) should the expression of the rights be used for notification, enforcement, or payment negotiation? The questions addressed towards this panel tend to focus on the later two questions with respect to technology. An important realization is that the answers to the latter two questions will be answered in part by the business models supporting their deployment, and the availability of actors/players to apply those business models in a successful manner.

2. Responses to Selected Panel Topics

In answering the following questions, we are either providing a reasonable expectation of what may occur; providing a range of what may occur; or asking further questions that elicit a better understanding of the problem. This exploration does not necessarily reflect official W3C positions.

2.1 What essential services are needed for Rights Management Protection?

To recognize and enforce various rights, we need three interlocking components:

  1. Rights Declaration. We need deterministic statements of the rights being claimed, and distribution mechanisms for binding these declarations to the information objects. We believe that machine-readable meta-data formats & transport mechanisms, such as PICS, are an ideal way to capture rights declarations. [See attached <draft-reagle-PICS-copyright-00.txt>]
  2. Policy Expression. We promote deterministic, machine-readable declarations because they are the key to automatable operations. This could include guiding the interaction of agents using/transfering intellectual property, the automatic refreshing of dated content on the Web, and the enforcement of IPR policies. Hence we need ways of prescribing the behavior to be taken in reaction to labels, perhaps through portable policy languages.
  3. Social Models. Rights declaration and the technical means of operating upon those declarations are an extension of real world legal and social policies. Hence, a consistent frame work for addressing these issues can further the technical development immensely. Understanding the appropriate business and economic models in the context of the Net will affect the success of any technical undertaking.

W3C's own experimental agenda follows this layout. Our PICS work, and digitally-signed PICS label work addresses #1; we are developing trust management engines and languages through PICS-NG and in joint research with AT&T, TU-Graz, and MIT; and we plan to work with our 160 member organizations to understand the models behind #3 in our Intellectual Property Rights Activity Area.

2.2 How secure will Rights Management techniques be? Against which threats?

An observation of this domain is that all rights management (RM) systems are breakable, the question is at what cost? Another observation is that the inherent value of content (and the associated intellectual property rights (IPR)) are different. With this understanding, we need techniques which make it cheaper for users to comply with IPR policies rather than circumvent them for any piece of content. Hence, we need to discuss and develop target scenarios for dealing with different types of content: library books, pay-per-view movies, home-page caching, etc. and their associated qualities: timeliness, scope, economic value, etc.

Only when we understand the applications of IPR can we fairly evaluate the security of the proposed solutions. For instance, at one end of the spectrum, we will need secure coprocessor hardware; at the other end of the spectrum, a mere advisory README files may suffice. [see 2.6 for further thoughts.] Finally, there is an additional consideration for online IPR management: the failure of an IPR protection scheme may be limited to a single instance (one copy is abused) or it may propagate to the failure of the whole mechanism (and innumerable instances of IPR abuse). RM protection ought to degrade gracefully (see 2.4).

2.3 How will Rights Management evolve over the Internet?

Evolution, of course, is important in this open-standards arena. We expect to see vigorous experimentation at each layer of the model proposed in 2.1 (rights declaration, policy expression, and social models). But on what time-scale? In which direction? This is difficult to predict, but Internet RM activity is certainly gaining increasing attention during the past couple of years. We make a few comments about the nature and direction of the medium in Section 2.5.

Still, here is one possible course of events for Web RM, based on the hypothesis that each layer will stabilize in succession:

  1. Rights Notification. Simple rights notification based upon a standard meta-data labeling format. PICS is already converging as the meta-data format for content rating. Many browsers can provide advisory notice that a site is labeled in some system (RSAC, SafeSurf~~, etc) and the corresponding ratings for that page.
  2. Application-specific Rights Management. The next step is a series of applications which protect rights within a single context. For example, an OS might only print or display fonts based on the embedded label -- as already occurs with embedded TrueType fonts. Browsers could be programmed to always consult a 'blacklist' of copyright-infringing resources run by a trusted third party. Rights labels could reflect ACLs and protections already enforced by underlying security mechanisms. Finally, we already have interest in high-value lock-box enveloped data with rights labels, such as Cryptolopes.
  3. General-purpose Rights Management. In some sense, rights management can converge with trust management -- RM is the asking of "permission to take specified actions upon a given resource." Just as with PICS, users will start asking for customizable, portable enforcement policies. The policy language and policy-enforcement engines will become cross-application services.
  4. Automated Settlement Models. Finally, automated policy engines can interface with an electronic payments infrastructure to actively seek out and settle rights. New social and business models will drive the development of micropayments, aggregation services, and other players which will make many kinds of rights easily and inexpensively clearable.

2.4 Will we be able to effectively trace large-scale rights abuse on the Internet?

Certainly, online environments bring new opportunities for large-scale rights abuse. In the past, the very nature of the distribution media limited fraudulent dissemination (i.e. copy degradation, reproduction cost, traceability, etc). The Internet's low to no-cost for copying is key to the success of NetNews, FTP, and the Web -- and could also make it impossible to ever migrate high-value content to this medium.

To address the question in detail, we first ask the question of what can we trace when rights abuse is discovered?

Next, where else can we discover rights abuse on the Internet?

Finally, will any of this constitute "effective measures"? Again, there will be segmentation based on the inherent value of the rights: only some abuses are worth the expense of tracing.

2.5 What are the technical trends and issues for micro-level rights management vs. a more aggregated (e.g. bulk or sampling) approach?

We believe the technical trends might be separated from the economic models. While social and business models may gravitate towards bundled or sampled rights settlement, the medium itself may drive the technology towards micro-level rights management. For example, Alice may be charged a micro amount per page that she views, but the payments and settlement may actually be managed by her telecom provider; who conducts settlements on an aggregated or sampling (ASCAP, BMI) basis, even though Alice still receives an itemized bill that details each transaction.

In essence, the argument is that the Internet will always deliver information in discrete chunks, and each chunk will have to be labeled, audited, and transmitted whole -- even though settlement models may be decoupled. Unlike the Internet, rights management for traditional media (and the settlement options) have often been dependent on their respective media. Cable TV, for example, is a passive fire-hose of video data, and there is no micro level control -- so it evolved bundled channels instead of per-sitcom pricing. Telephones require explicit per-call circuits, which became the natural granularity for the transaction. Newspapers also bundled several different information products (news, weather, sports) together per-issue and over time (subscription).

Hence, to make this model more explicit, one should ask: 1) what are the boundaries between the agents of a transaction (user, merchant, content owner, content host, service provider, payment server, etc.), 2) what are the mechanisms involved (selection, payment, clearance, settlement, billing, etc.) and how do they relate to one another? (aggregation, sampling, bundling, etc.)

2.6 Are there meaningful differences in the robustness and costs of alternative approaches to Rights Management? How can technology affect them?

Definitely. The spectrum of needs is wide enough that we must generate a variety of strategies. All-out universal protection with its one-size-fits-all 'policy' (e.g. the DAT's second-generation copying lockout, proposed hardware PC usage meters, etc) will be completely unworkable as a single solution for the Internet. There are applications for rights notification, cooperative rights, licensing agreements, and cryptographically protected rights, with many more models in between, each of which have a place on the Internet.

Since the market needs mechanisms at different price points for each segment, technology should provide distinctly different costs for 1) labeling 2) distribution 3) enforcement 4) auditing 5) ownership identification 6) bad actor identification and more. This follows directly from our end-goal: to help enforce a range of societal rights protections. There are a range of penalties, and hence a range of techniques. In particular, we should expect variations in the level of cryptography, modes of distribution, amount of auditing and logging, and processing cost for publishing (e.g. watermarking) and for reading (e.g. decryption), since these technology decisions can affect the overall cost and value proposition.

3. Additional Background Material

We have attached copies of some additional material from our Web site. We are looking forward to becoming more closely involved in Intellectual Property and Rights Management issues in 1997, particularly with the addition of Joseph Reagle and Ralph Swick to W3C's Technology & Society team.

  1. W3C Activity Statement on Intellectual Property Rights
    http://www.w3.org/pub/WWW/IPR/Activity
  2. W3C Overview of Intellectual Property Rights on the Web
    http://www.w3.org/pub/WWW/IPR/
  3. Using PICS Labels for Trust Management
    http://www.w3.org/pub/WWW/Talks/961001-DIMACS/
  4. Using PICS for Copyright Notice and Control
    <draft-reagle-pics-copyright-00.txt>


W3C Activity Statement on Intellectual Property Rights

Introduction

Networking technology is requiring us to rethink and reinterpret existing intellectual property law. For instance, digital networks cache copies of documents to improve performance -- is this infringement, should royalties be paid? If it isn't an infringement because it is temporary, how long is temporary? What happens if these cached copies decrease the hits a Web service sees, and consequently the revenue it generates from marketing? Does a link to an infringing copy of intellectual property constitute contributory infringement, or is this well within the bounds of fair use?

Intellectual property rights on the Internet is a contentious topic for a number of reasons. These include (1) does the nature of the technology require us to change the legal understanding or status of copyright as it stands now, (2) what rights should be associated with Web content, (3) how should the rights be expressed, and (4) should the expression of the rights be used for notification, enforcement, or payment negotiation? We expect the answer to these questions does not lie solely in technology nor policy, but the rational combination of both.

Requirements

While there has been much heated debate regarding the questions raised on the Overview page, we expect the W3C can make a positive contribution by exploring two different approaches:

  1. To make it easier for users to obey the law. Combining payment and labeling technologies will make it simple for IP owners to express the terms and conditions related to their materials, and for users to comply with the stated policies.
  2. To make it easier to stop the indiscriminate redistribution of protected material by establishing a labeling system for enumerating sites that are known to contain infringing materials.

One can describe the first approach as a "social negotiation" protocol. This type of protocol can be used to address the problems of IPR and Privacy by leveraging PICS and PEP as the tools for conducting negotiations. For instance, consider the following scenario that the W3C may wish to address:

John is a Web disc jockey, and goes to his favorite online music store where he is told "Here is the copyright notice associated with this CD, notice that it costs $13.99 for personal use. If  you'd like to license the capability to serve the CD from your own Web site, it will cost $450, plus $0.10 per hit. Fees that are due from Web hits should be paid to X."

Current Situation

See the Intellectual Property Rights Overview Page.

Products

No products as of 17 December 96. Potential products could include an intellectual property rights PICS ratings system (vocabulary) and a demonstration of its integration with preference and payment negotiation protocols. These products may not be a direct result of this project, but other related projects such as the PICS, JEPI, and the Privacy and Demographics projects.

Next Step

The W3C expects to have a briefing package available in this area in the second quarter of 1997. Joseph Reagle is tracking the IPR area and preparing a briefing package for this project. Our initial impression is that the requirements of this domain (as well as those of the Privacy and Demography domain) are well met by a PICS like protocol. See draft-reagle-pics-copyright-00.txt for an example of this approach.

In order to advance, the W3C must:

  1. identify the significant stake holders in this complex area and how to apply their understanding to the problem above.
  2. understand the legal issues associated with (1) making statements about the sites with potentially infringing materials, and (2) a PICS label format that enables IP owners to describe the intellectual property and usage rights of their materials.
  3. understand the business/policy issues associated with caching IP that should not be cached because of temporal constraints (price lists, stock reports, etc.)
  4. understand the technical issues related to rights management and payment negotiation.

Public Commitments

No public commitments as of 17 December 1996.



W3C Overview of Intellectual Property Rights on the Web

Introduction

Networking technology is requiring us to rethink and reinterpret existing intellectual property law. For instance, digital networks cache copies of documents to improve performance -- is this infringement, should royalties be paid? If it isn't an infringement because it is temporary, how long is temporary? What happens if these cached copies decrease the hits a Web service sees, and consequently the revenue it generates from marketing? Does a link to an infringing copy of intellectual property constitute contributory infringement, or is this well within the bounds of fair use?

Intellectual property rights on the Internet is a contentious topic for a number of reasons. These include (1) does the nature of the technology require us to change the legal understanding or status of copyright as it stands now, (2) what rights should be associated with Web content, (3) how should the rights be expressed, and (4) should the expression of the rights be used for notification, enforcement, or payment negotiation? We expect the answer to these questions does not lie solely in technology nor policy, but the rational combination of both.

The W3C Intellectual Property Rights Activity Page describes how the W3C is addressing these questions.

In the News

Intellectual property rights (IPR) and the Web are newsworthy topics, such stories from 1996 include:

IPR Issues and Resources

Copyright Infringement

Issues Copyright has been the focus of protecting intellectual property on the Internet. As such, there have been both technological (IPR/encryption wrappers) and legislative efforts to continue incentives for authors to create useful works. Recent initiatives have been at the international level include at the OECD, and a conference (Dec. 96) hosted by the World Intellectual Property Organization (WIPO).
Resources Basics of Copyright
Copyright FAQ
INTERNATIONAL LAW Government Agencies
The EU Green Paper in IPR
EFG Intellectual Property Page
Cryptolopes
Liability Based on Traditional Forum Analogy
Intellectual Property Implications of WTO and NAFTA
Online Service Operator and Provider Liability for Contributory Infringement Is Still Uncertain

Link Liability (Contributory Copyright Infringement)

Issues Contributory infringement (and the consequential liability) is one of the most contentious areas of the copyright debate. For instance, is an ISP liable for contributory infringement when it allows its users to link to hacker sites? If an ISP closed a user's account when informed by an IP owner, would the ISP be liable for the violation of civil rights or breach of contract?
Resources EFG Intellectual Property Rights Page
Battle Sites: Online Service Operator and Provider Liability for Contributory Infringement Is Still Uncertain
Computer Information Systems Law and System Operator Liability in 1995

Domain Name Registration (Trademarks)

Issues Resources InterNIC is not a Net cop
Trademarks and DNS
Domain Name Legal Bibliography
Remedies in Internet Domain Name Trademark Lawsuits

Font Protection

Issues Owners of fonts want to distribute them for different purposes at different prices. They fear that freely distributing fonts for reading documents might allow people to author documents without paying for additional rights such as redistribution. Neither a purely legal nor purely technical solution is likely to be successful.
Resources Are Fonts Copyrightable - Copyright FAQ
Font Discussion and Protecting Embedded Fonts
OpenType Initiative
The Font Meeting at W5, Paris

Caching

Issues Bandwidth on the network is limited, and continues to be so. The traditional technical solution , caching, is to allow copies to be saved at distributed points throughout the network. However, caching raises two issues. First, cached copies can be out of date yet still contain information which is time sensitive (such as prices or stock quotes). Second, some Web sites derive revenue based on the amount  and kind of access to their servers, and they currently have no verifiable way of counting the number of accesses to their documents cached elsewhere on the network.
Resources CACHING ON THE INTERNET
  



Using PICS Labels for Trust Management

Rohit Khare, World Wide Web Consortium
Presented at DIMACS Workshop on Trust Management, October 1, 1996

Using PICS Labels for Trust Management

  1. Introduction to PICS
  2. Critical Trust Management Applications for the Web
  3. New Directions for W3C Activities

Introduction to PICS

Example: RSAC over PICS

How PICS Works

Trust Management Applications

Example: Security-related PICS Systems

New Directions for W3C Activities

Digital Signature Initiative

Conclusions

For Further Information...



Using PICS for Copyright Notice and Control

Joseph M. Reagle Jr.,
INTERNET-DRAFT                          MIT
<draft-reagle-PICS-copyright-00.txt>    December 1996 (Expires July 1997)

    
    
            Using PICS for Copyright Notice and Control 
    
    
Status of this Memo
    
    This document is an Internet-Draft.  Internet-Drafts are
    working documents of the Internet Engineering Task Force
    (IETF), its areas, and its working groups.  Note that other
    groups may also distribute working documents as Internet-
    Drafts.
    
    Internet-Drafts are draft documents valid for a maximum of
    six months and may be updated, replaced, or obsoleted by
    other documents at any time.  It is inappropriate to use
    Internet- Drafts as reference material or to cite them other
    than as ``work in progress.''
    
    To learn the current status of any Internet-Draft, please
    check the ``1id-abstracts.txt'' listing contained in the
    Internet- Drafts Shadow Directories on ftp.is.co.za (Africa),
    nic.nordu.net (Europe), munnari.oz.au (Pacific Rim),
    ds.internic.net (US East Coast), or ftp.isi.edu (US West
    Coast).
    
Abstract
    
    This document presents an alternative expression mechanism
    for the copyright status of Web resources. Specifically it
    employs the Platform for Internet Content Selection (PICS)
    [2] label format to associate web resources with their
    copyright and usage information. This in turn can be used by
    search engines, proxy servers, agents, clients, and users for
    content selection or to aid in rights compliance. This
    document employs the copy control system described in [1].
    
1. Introduction
    
    Intellectual property on the Internet has been a contentious
    topic for a number of reasons. These include (1) does the
    nature of the technology require us to change the legal
    status of copyright as it stands now, (2) what rights should
    be associated with Web content, (3) how to express the
    rights, and (4) should the expression of the rights be used
    for notification, enforcement, or payment negotiation? This
    draft only addresses the expression of rights and uses the
    copy control method/rights found in [1]. We argue that PICS
    is an effective method of communicating intellectual property
    information about Web content.

Reagle                  Expires July, 1 1997                  [Page  2]


Draft       Using PICS for Copyright Notice and Control   November 1996

    
2.1 Copyright Status and Control
    
    How intellectual property rights should be expressed is
    affected by the following questions. Are the rights human
    readable, machine readable? Are the rights easily encoded,
    efficiently encoded? Does this encoding change across
    multiple media (ASCII, images, audio, video, etc.) where size
    and speed considerations may be of importance? In this draft
    we do not address these issues in detail, rather we use the
    copy control system specified in [1] and use PICS to
    associate the copy control information with Web content.
    
    In [1], Daviel specified a system in which a Web document has
    "Print", "Save", and "Quote" variables associated with it,
    where ({0 = disallowed}, {1 = conditionally allowed}, {2 =
    unconditionally allowed}). These permissions are associated
    with a document by encoding them in an HTTP header, or HTML
    META tag. PICS is a more effective means of associating Web
    resources with their copyright status and control information
    as demonstrated in section 2.3.
    
2.2 PICS Expression of Copyright Status and Control
    
    Consider the case in which Mark Twain wrote the material at
    http://www.twain.com/story.html . He also has a page
    describing the copyright statement in fuller detail at
    http://www.twain.com/IP-notice.html . He uses the copy
    control system in [1] to create the following label:
    
       (PICS-1.1 "http://www.wipo.org/v1.5"
         by "Mark Twain"
         labels on "1994.11.05T08:15-0500"
                for "http://www.twain.com/story.html"
                full "http://www.twain.com/IP-notice.html"
                ratings (print 1 save 1 quote 2))
    
2.3 Benefits of Using PICS labels for Copyright Status and
   Control
    
    The benefits of using PICS labels for copyright status and
    control include:
    
    1. Detached labels can easily associate copyright information
       with any web referenceable resource including audio and visual
       content.
    2. Multiple distribution methods (embedded within the document,
       transported by the server, or distributed from a label bureau)
       improve copy status and control management. Organizations can
       control the use and access to their IPR from their server or
       proxy. Organizations can also create "audit" spiders to
       understand the distribution and use of their content on the
       Internet.
    3. Generic labeling (implicitly rates every URL for which the
       specified URL is the prefix of) improves the management of the
       copyright information, since one doesn't have to label every
       document in a directory if the tree has a homogenous copyright
       status. (Though as someone said, "The same thing as with robots
       exclusion protocol. Regular expressions are needed, URL prefixes
       are not enough.")
    4. Capabilities for digital signatures are provided in the PICS
       format.
    5. PICS is being widely used in other domains.
    
3.  Security Considerations
    
    This document does not address the integrity of intellectual
    property assertions, cases of unauthorized disclosure, nor
    enforcement mechanisms. However, PICS labels can provide the
    basic information that the advanced functionality operate
    upon.
    
Author's Address
    
    Joseph M. Reagle Jr.
    Massachusetts Institute of Technology
    Laboratory for Computer Science
    W3C, NE43-350
    545 Technology Square
    Cambridge, MA 02139
    
    Telephone: + 1.617.258.7621
    Fax: + 1.617.258.5999
    mailto:[email protected]
    
References
    
    [1] A. Daviel, "Copy Control for Web Documents.", Vancouver
    Webpages, INTERNET DRAFT, <draft-daviel-web-copy-control-
    00.txt>, November 1996.
    [2] PICS, "Label Syntax and Communication Protocols",
    INTERNET DRAFT, "draft-pics-labels-00.txt", 11/21/95.