Digital Right Management


Published on

This presentation is made from an IEEE transection:
IEEE Computer April 2009

Published in: Technology, Business
1 Comment
1 Like
No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Digital Right Management

  1. 1. How viable is<br />Digital Rights Management<br />
  2. 2. Introduction<br />Digital Right Management:<br /><ul><li>Commonly known as DRM.
  3. 3. The term is used to describe any technology which makes the unauthorized use of digital content.
  4. 4. Sony, Apple Inc., Microsoft and the BBC use DRM technology.</li></ul>2<br />Qudrat-E-Alahy Ratul, Kuet, Khulna, Bangladesh<br />
  5. 5. Overview<br /><ul><li>Most current DRM schema are based on the notation that the user is untrustworthy and the use of protected content must be restricted.
  6. 6. This gives rise the interoperability issue among DRM schema.
  7. 7. So to built a trusted infrastructure to protect the content is being difficult.
  8. 8. The computer community revisit the current approaches.</li></ul>3<br />Qudrat-E-Alahy Ratul, Kuet, Khulna, Bangladesh<br />
  9. 9. Early Technology<br />Encrypted with K1 <br />Content<br />Purchaser 1<br />Having k1<br />Content<br />Rights<br />Encrypted with K2 <br />Content<br />Purchaser 2<br />Having k2<br />Content<br />Content<br />provider<br />Rights<br />Encrypted with K3 <br />Content<br />Content<br />Purchaser 3<br />Having k3<br />Rights<br />4<br />Qudrat-E-Alahy Ratul, Kuet, Khulna, Bangladesh<br />
  10. 10. Second Generation DRM<br />Encrypted with K1 <br />Encrypted with K<br />Content<br />Purchaser 1<br />Having k1<br />Rights<br />Content<br />K<br />Encrypted with K<br />Content<br />Encrypted with K2 <br />Content<br />Purchaser 2<br />Having k2<br />Rights<br />Content<br />provider<br />K<br />Encrypted with K3 <br />Rights<br />Content<br />Purchaser 3<br />Having k3<br />K<br />5<br />Qudrat-E-Alahy Ratul, Kuet, Khulna, Bangladesh<br />
  11. 11. Current Architecture<br />Financial Clearinghouse<br />Content Provider<br />End user<br />web server<br />Rights<br />Clearinghouse<br />6<br />Qudrat-E-Alahy Ratul, Kuet, Khulna, Bangladesh<br />
  12. 12. DRM Security Model<br />Attacks<br />Attacks<br />Rendering<br />Application<br />Content Provider<br />Attacks<br />7<br />Qudrat-E-Alahy Ratul, Kuet, Khulna, Bangladesh<br />
  13. 13. Interoperability Approaches<br />Interoperability:<br /><ul><li>A framework makes the DRM schema transparent.
  14. 14. User can consume protected content with the list amount of information loss.</li></ul>Approaches:<br /><ul><li>Full-format interoperability
  15. 15. Building-block-based interoperability
  16. 16. Transformation driven interoperability</li></ul>8<br />Qudrat-E-Alahy Ratul, Kuet, Khulna, Bangladesh<br />
  17. 17. DRM Interoperability<br />User device<br />Interoperability services/ interfaces<br />DRM Interoperability framework<br />DRm<br />1<br />DRm<br />2<br />DRm<br />n<br />DRm schemas<br />9<br />Qudrat-E-Alahy Ratul, Kuet, Khulna, Bangladesh<br />
  18. 18. Why Interoperability is Complex<br /><ul><li>Interoperability works with trusted model
  19. 19. PKI(Public Key Infrastructure) is an example of trust model.
  20. 20. For Example:
  21. 21. OMA(Open Mobile Alliances) use PKI
  22. 22. MPEG-21 DRM schema does not specify a particular authentication framework.
  23. 23. These differences makes complexity. </li></ul>10<br />Qudrat-E-Alahy Ratul, Kuet, Khulna, Bangladesh<br />
  24. 24. Open problems<br /><ul><li>To achieve inner-DRM the computing community must meet two major challenges:
  25. 25. Preserving the protection level
  26. 26. Building a trusted environment.</li></ul>11<br />Qudrat-E-Alahy Ratul, Kuet, Khulna, Bangladesh<br />
  27. 27. Conclusion <br /><ul><li>Much work remain to bring DRM technology in line with customer and business demand.
  28. 28. A strong platform should make at the business level to protect unauthorized data passing
  29. 29. The new technology should enough friendly for the user.</li></ul>12<br />Qudrat-E-Alahy Ratul, Kuet, Khulna, Bangladesh<br />
  30. 30. Thank You<br />
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.