SlideShare a Scribd company logo
1 of 17
Digital Right Management
Paper by : Omkar S. Tembe .
TY BCA
D.G.College of Commerce ,
Satara.Prepared by - Omkar Tembe 1
 A class of technologies that are used by hardware manufacturers,
publishers, copyright holders, and individuals to control the use of
digital content and devices after sale .
 To prevent unauthorized redistribution of digital media and restrict
the ways consumers can copy content they've purchased.
 Technology that creates certain conditions about how some digital
media files - such as audio and video - can be used and shared.
 Introduction :-
Prepared by - Omkar Tembe 2
 Identification (unique identifier of the work)
 Clear description (Metadata)
 Usage rules
 Governs content management. (Includes control on creating,
manipulating, fixing, storing, transferring, performing,
rendering and disposing of the content)
 Meaning :-
Prepared by - Omkar Tembe 3
 DRM deals with :-
 Intellectual Property (IP) rights
 Copyright
 Payment mechanisms
 Security (water marks , digital signature)
 E-commerce and ERP systems
 Licensing.
Prepared by - Omkar Tembe 4
 Content lifecycle (where DRM gets used) :-
DIGITAL
CONTENT
PRODUCED
STOREDDISTRIBUTED
RETRIEVED &
COMBINED
USED
Prepared by - Omkar Tembe 5
 Examples of DRM :-
Prepared by - Omkar Tembe 6
 Documents :
1) MS Word
2) PDF
3) Auto-CAD files
4) Intranet Web pages
 E – Books :
1) Mobipocket
2) KF8
3) Topaz
4) e Pub
5) PDF
 Practical Examples of DRM:-
Prepared by - Omkar Tembe 7
 Ideal Concept of DRM (Books,Music,Movies):-
Player
Artist Distributor Consumer
Package
Content
Secure network transactions
Software player
Content Package
Content
Prepared by - Omkar Tembe 8
 How DRM Works :-
persistent
protection
Sender
Recipient
SDS
(Secure Document
Server)
encrypt
Prepared by - Omkar Tembe 9
Four common stages :
 Packaging is when DRM encryption keys are built right into the
software, the music file, or the movie file.
 Distribution is when DRM-encrypted files are delivered to the
customers. This is usually through web server downloads, CD's/DVD's,
or via files emailed to the customers.
 License Serving is where specialized servers authenticate legitimate
users through an Internet connection, and allow them to access the
DRM files. Simultaneously, license servers lock up the files when
illegitimate users try to open or copy the files.
 License Acquisition is where legitimate customers acquire their
encryption keys so they can unlock their files.
 How DRM Works :-
Prepared by - Omkar Tembe 10
 How DRM Should work :-
1
Take any
content
2
Package with
appropriate
security
3
Trade with
chosen
‘currency’
4
Allow the
content to
be used
Prepared by - Omkar Tembe 11
 You are using a WMA file;
 You need specific software or specific music player hardware to play the
file;
 You are limited to how many times you can download;
 You are limited in number of hours/days you can download;
 The number of different computers you can download to is limited;
 The number of times you can burn a CD is limited;
 You need a special password and/or logon ID before you can play the file;
 You need to reply to confirmation emails before you can play the file;
 In some instances, AAC files have DRM locks.
 How to identify DRM :-
Prepared by - Omkar Tembe 12
 Game coNsoles (Nintendo, Sony PlayStation, …)
 Microsoft software (Genuine certificate verification)
 Trial use of a software for a limited period of time
 Online registration to activate the software
 Companies Opting for DRM :-
Prepared by - Omkar Tembe 13
Apple’s Fair Play Technology
 Restricts playing, recording, sharing of files
 Allows media to be shared among devices
 Allows others to listen to (but not copy) music
 Can burn audio CD, eliminates DRM protection
How it works (overview)
iTunes uses encrypted MP4 audio files
Acquire decryption key by trying to play song
 player generates a unique ID, sends ID to iTunes server
 if not over authorization limit, server sends decryption key.
 Decryption key is encrypted in iTunes to prevent transfer to another
machine
 Case Studies of DRM :-
Prepared by - Omkar Tembe 14
 Case Studies of DRM :-
Prepared by - Omkar Tembe 15
www.microsoft.com
www.howstuffworks.com
www.sonymusic.com
www.wekipedia.com
 References :-
Prepared by - Omkar Tembe 16
Thank you !!!
Prepared by - Omkar Tembe 17

More Related Content

Similar to Digital Right Management

digital rights management for multimedia files
digital rights management for multimedia filesdigital rights management for multimedia files
digital rights management for multimedia filesApurva Vyas
 
Digital rights management (drm) and you
Digital rights management (drm) and youDigital rights management (drm) and you
Digital rights management (drm) and youSaneMaly
 
Vdrm presentation
Vdrm   presentationVdrm   presentation
Vdrm presentationRanjithaS25
 
Can DRM achieve its security goals?
Can DRM achieve its security goals?Can DRM achieve its security goals?
Can DRM achieve its security goals?blogzilla
 
De-mystifying DRM
De-mystifying DRMDe-mystifying DRM
De-mystifying DRMcastLabs
 
[InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology
[InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology[InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology
[InDMF 2013] Prof. John Choi - Evolution of Copyright Protection TechnologySegitiga.Net
 
Peerless DRM and Enterprise Security-Enabled Removable Data Storage Cartridges
Peerless DRM and Enterprise Security-Enabled Removable Data Storage CartridgesPeerless DRM and Enterprise Security-Enabled Removable Data Storage Cartridges
Peerless DRM and Enterprise Security-Enabled Removable Data Storage CartridgesFred_C_Thomas
 
DRM Workflows: How to Provide Protected Content to Desktop, Mobile, TVs, & St...
DRM Workflows: How to Provide Protected Content to Desktop, Mobile, TVs, & St...DRM Workflows: How to Provide Protected Content to Desktop, Mobile, TVs, & St...
DRM Workflows: How to Provide Protected Content to Desktop, Mobile, TVs, & St...Bitmovin Inc
 
Presentation1.presentation presentation presenstat
Presentation1.presentation presentation presenstatPresentation1.presentation presentation presenstat
Presentation1.presentation presentation presenstatLeaMayMuozGaurino
 
Protection and distribution Systems, part B of 2
Protection and distribution Systems, part B of 2Protection and distribution Systems, part B of 2
Protection and distribution Systems, part B of 2Paolo Nesi
 
Digital rights management an essential feature in the digital era
Digital rights management an essential feature in the digital eraDigital rights management an essential feature in the digital era
Digital rights management an essential feature in the digital eraKishor Satpathy
 
DRM Basics With Irdeto and Bitmovin
DRM Basics With Irdeto and BitmovinDRM Basics With Irdeto and Bitmovin
DRM Basics With Irdeto and BitmovinBitmovin Inc
 
Asia TV Forum-0812xx (canpublish)
Asia TV Forum-0812xx (canpublish)Asia TV Forum-0812xx (canpublish)
Asia TV Forum-0812xx (canpublish)PasocoPteLtd
 
Authorship Drm Seminar
Authorship Drm SeminarAuthorship Drm Seminar
Authorship Drm Seminarcorinnejordan
 
Digital Rights Management and Trusted Computing Base
Digital Rights Management and Trusted Computing BaseDigital Rights Management and Trusted Computing Base
Digital Rights Management and Trusted Computing BaseSajid Marwat
 

Similar to Digital Right Management (20)

digital rights management for multimedia files
digital rights management for multimedia filesdigital rights management for multimedia files
digital rights management for multimedia files
 
Digital rights management (drm) and you
Digital rights management (drm) and youDigital rights management (drm) and you
Digital rights management (drm) and you
 
Vdrm presentation
Vdrm   presentationVdrm   presentation
Vdrm presentation
 
Can DRM achieve its security goals?
Can DRM achieve its security goals?Can DRM achieve its security goals?
Can DRM achieve its security goals?
 
De-mystifying DRM
De-mystifying DRMDe-mystifying DRM
De-mystifying DRM
 
[InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology
[InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology[InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology
[InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology
 
Peerless DRM and Enterprise Security-Enabled Removable Data Storage Cartridges
Peerless DRM and Enterprise Security-Enabled Removable Data Storage CartridgesPeerless DRM and Enterprise Security-Enabled Removable Data Storage Cartridges
Peerless DRM and Enterprise Security-Enabled Removable Data Storage Cartridges
 
DRM Workflows: How to Provide Protected Content to Desktop, Mobile, TVs, & St...
DRM Workflows: How to Provide Protected Content to Desktop, Mobile, TVs, & St...DRM Workflows: How to Provide Protected Content to Desktop, Mobile, TVs, & St...
DRM Workflows: How to Provide Protected Content to Desktop, Mobile, TVs, & St...
 
Presentation1.presentation presentation presenstat
Presentation1.presentation presentation presenstatPresentation1.presentation presentation presenstat
Presentation1.presentation presentation presenstat
 
Protection and distribution Systems, part B of 2
Protection and distribution Systems, part B of 2Protection and distribution Systems, part B of 2
Protection and distribution Systems, part B of 2
 
Digital rights management an essential feature in the digital era
Digital rights management an essential feature in the digital eraDigital rights management an essential feature in the digital era
Digital rights management an essential feature in the digital era
 
DRM Basics With Irdeto and Bitmovin
DRM Basics With Irdeto and BitmovinDRM Basics With Irdeto and Bitmovin
DRM Basics With Irdeto and Bitmovin
 
Copyright powerpoint
Copyright powerpointCopyright powerpoint
Copyright powerpoint
 
Copyright powerpoint
Copyright powerpointCopyright powerpoint
Copyright powerpoint
 
Asia TV Forum-0812xx (canpublish)
Asia TV Forum-0812xx (canpublish)Asia TV Forum-0812xx (canpublish)
Asia TV Forum-0812xx (canpublish)
 
Digital Libraries
Digital LibrariesDigital Libraries
Digital Libraries
 
Authorship Drm Seminar
Authorship Drm SeminarAuthorship Drm Seminar
Authorship Drm Seminar
 
DRM_Interoperability_Final
DRM_Interoperability_FinalDRM_Interoperability_Final
DRM_Interoperability_Final
 
Digital Rights Management
Digital Rights Management Digital Rights Management
Digital Rights Management
 
Digital Rights Management and Trusted Computing Base
Digital Rights Management and Trusted Computing BaseDigital Rights Management and Trusted Computing Base
Digital Rights Management and Trusted Computing Base
 

More from Omkar Tembe

Organizational Communication
Organizational CommunicationOrganizational Communication
Organizational CommunicationOmkar Tembe
 
Elevator Manners
Elevator MannersElevator Manners
Elevator MannersOmkar Tembe
 
Plant Visit Communication
Plant Visit CommunicationPlant Visit Communication
Plant Visit CommunicationOmkar Tembe
 
Employee Motivation
Employee MotivationEmployee Motivation
Employee MotivationOmkar Tembe
 
Occupational Health and Safety
Occupational Health and SafetyOccupational Health and Safety
Occupational Health and SafetyOmkar Tembe
 
HR Presentation (2017 18)
HR Presentation (2017 18)HR Presentation (2017 18)
HR Presentation (2017 18)Omkar Tembe
 
HR Department Induction
HR Department InductionHR Department Induction
HR Department InductionOmkar Tembe
 
Operation Department Induction
Operation Department InductionOperation Department Induction
Operation Department InductionOmkar Tembe
 
Rural Education Using Akash Tablet
Rural Education Using Akash TabletRural Education Using Akash Tablet
Rural Education Using Akash TabletOmkar Tembe
 
Recent Trends in Advertising
Recent Trends in AdvertisingRecent Trends in Advertising
Recent Trends in AdvertisingOmkar Tembe
 
A study of change in advertising techniques in Satara Taluka
A study of change in advertising techniques in Satara TalukaA study of change in advertising techniques in Satara Taluka
A study of change in advertising techniques in Satara TalukaOmkar Tembe
 
Business Intelligence
Business IntelligenceBusiness Intelligence
Business IntelligenceOmkar Tembe
 
Corporate Social Responsibility
Corporate Social ResponsibilityCorporate Social Responsibility
Corporate Social ResponsibilityOmkar Tembe
 
Android Technology
Android TechnologyAndroid Technology
Android TechnologyOmkar Tembe
 

More from Omkar Tembe (16)

Alive 2016
Alive 2016Alive 2016
Alive 2016
 
Organizational Communication
Organizational CommunicationOrganizational Communication
Organizational Communication
 
Elevator Manners
Elevator MannersElevator Manners
Elevator Manners
 
Tie Etiquettes
Tie EtiquettesTie Etiquettes
Tie Etiquettes
 
Plant Visit Communication
Plant Visit CommunicationPlant Visit Communication
Plant Visit Communication
 
Employee Motivation
Employee MotivationEmployee Motivation
Employee Motivation
 
Occupational Health and Safety
Occupational Health and SafetyOccupational Health and Safety
Occupational Health and Safety
 
HR Presentation (2017 18)
HR Presentation (2017 18)HR Presentation (2017 18)
HR Presentation (2017 18)
 
HR Department Induction
HR Department InductionHR Department Induction
HR Department Induction
 
Operation Department Induction
Operation Department InductionOperation Department Induction
Operation Department Induction
 
Rural Education Using Akash Tablet
Rural Education Using Akash TabletRural Education Using Akash Tablet
Rural Education Using Akash Tablet
 
Recent Trends in Advertising
Recent Trends in AdvertisingRecent Trends in Advertising
Recent Trends in Advertising
 
A study of change in advertising techniques in Satara Taluka
A study of change in advertising techniques in Satara TalukaA study of change in advertising techniques in Satara Taluka
A study of change in advertising techniques in Satara Taluka
 
Business Intelligence
Business IntelligenceBusiness Intelligence
Business Intelligence
 
Corporate Social Responsibility
Corporate Social ResponsibilityCorporate Social Responsibility
Corporate Social Responsibility
 
Android Technology
Android TechnologyAndroid Technology
Android Technology
 

Recently uploaded

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Digital Right Management

  • 1. Digital Right Management Paper by : Omkar S. Tembe . TY BCA D.G.College of Commerce , Satara.Prepared by - Omkar Tembe 1
  • 2.  A class of technologies that are used by hardware manufacturers, publishers, copyright holders, and individuals to control the use of digital content and devices after sale .  To prevent unauthorized redistribution of digital media and restrict the ways consumers can copy content they've purchased.  Technology that creates certain conditions about how some digital media files - such as audio and video - can be used and shared.  Introduction :- Prepared by - Omkar Tembe 2
  • 3.  Identification (unique identifier of the work)  Clear description (Metadata)  Usage rules  Governs content management. (Includes control on creating, manipulating, fixing, storing, transferring, performing, rendering and disposing of the content)  Meaning :- Prepared by - Omkar Tembe 3
  • 4.  DRM deals with :-  Intellectual Property (IP) rights  Copyright  Payment mechanisms  Security (water marks , digital signature)  E-commerce and ERP systems  Licensing. Prepared by - Omkar Tembe 4
  • 5.  Content lifecycle (where DRM gets used) :- DIGITAL CONTENT PRODUCED STOREDDISTRIBUTED RETRIEVED & COMBINED USED Prepared by - Omkar Tembe 5
  • 6.  Examples of DRM :- Prepared by - Omkar Tembe 6
  • 7.  Documents : 1) MS Word 2) PDF 3) Auto-CAD files 4) Intranet Web pages  E – Books : 1) Mobipocket 2) KF8 3) Topaz 4) e Pub 5) PDF  Practical Examples of DRM:- Prepared by - Omkar Tembe 7
  • 8.  Ideal Concept of DRM (Books,Music,Movies):- Player Artist Distributor Consumer Package Content Secure network transactions Software player Content Package Content Prepared by - Omkar Tembe 8
  • 9.  How DRM Works :- persistent protection Sender Recipient SDS (Secure Document Server) encrypt Prepared by - Omkar Tembe 9
  • 10. Four common stages :  Packaging is when DRM encryption keys are built right into the software, the music file, or the movie file.  Distribution is when DRM-encrypted files are delivered to the customers. This is usually through web server downloads, CD's/DVD's, or via files emailed to the customers.  License Serving is where specialized servers authenticate legitimate users through an Internet connection, and allow them to access the DRM files. Simultaneously, license servers lock up the files when illegitimate users try to open or copy the files.  License Acquisition is where legitimate customers acquire their encryption keys so they can unlock their files.  How DRM Works :- Prepared by - Omkar Tembe 10
  • 11.  How DRM Should work :- 1 Take any content 2 Package with appropriate security 3 Trade with chosen ‘currency’ 4 Allow the content to be used Prepared by - Omkar Tembe 11
  • 12.  You are using a WMA file;  You need specific software or specific music player hardware to play the file;  You are limited to how many times you can download;  You are limited in number of hours/days you can download;  The number of different computers you can download to is limited;  The number of times you can burn a CD is limited;  You need a special password and/or logon ID before you can play the file;  You need to reply to confirmation emails before you can play the file;  In some instances, AAC files have DRM locks.  How to identify DRM :- Prepared by - Omkar Tembe 12
  • 13.  Game coNsoles (Nintendo, Sony PlayStation, …)  Microsoft software (Genuine certificate verification)  Trial use of a software for a limited period of time  Online registration to activate the software  Companies Opting for DRM :- Prepared by - Omkar Tembe 13
  • 14. Apple’s Fair Play Technology  Restricts playing, recording, sharing of files  Allows media to be shared among devices  Allows others to listen to (but not copy) music  Can burn audio CD, eliminates DRM protection How it works (overview) iTunes uses encrypted MP4 audio files Acquire decryption key by trying to play song  player generates a unique ID, sends ID to iTunes server  if not over authorization limit, server sends decryption key.  Decryption key is encrypted in iTunes to prevent transfer to another machine  Case Studies of DRM :- Prepared by - Omkar Tembe 14
  • 15.  Case Studies of DRM :- Prepared by - Omkar Tembe 15
  • 17. Thank you !!! Prepared by - Omkar Tembe 17