This presentation was prepared and presented by me during last year of our Graduation, in the State Level Paper Presentation Competition, in which, I stood 1st.
This presentation focuses on the basic concepts of Digital Right Management,its life cycle,working and examples. The core objective of this presentation was to create awareness about Digital Right Management among the audience.
2. A class of technologies that are used by hardware manufacturers,
publishers, copyright holders, and individuals to control the use of
digital content and devices after sale .
To prevent unauthorized redistribution of digital media and restrict
the ways consumers can copy content they've purchased.
Technology that creates certain conditions about how some digital
media files - such as audio and video - can be used and shared.
Introduction :-
Prepared by - Omkar Tembe 2
3. Identification (unique identifier of the work)
Clear description (Metadata)
Usage rules
Governs content management. (Includes control on creating,
manipulating, fixing, storing, transferring, performing,
rendering and disposing of the content)
Meaning :-
Prepared by - Omkar Tembe 3
4. DRM deals with :-
Intellectual Property (IP) rights
Copyright
Payment mechanisms
Security (water marks , digital signature)
E-commerce and ERP systems
Licensing.
Prepared by - Omkar Tembe 4
5. Content lifecycle (where DRM gets used) :-
DIGITAL
CONTENT
PRODUCED
STOREDDISTRIBUTED
RETRIEVED &
COMBINED
USED
Prepared by - Omkar Tembe 5
7. Documents :
1) MS Word
2) PDF
3) Auto-CAD files
4) Intranet Web pages
E – Books :
1) Mobipocket
2) KF8
3) Topaz
4) e Pub
5) PDF
Practical Examples of DRM:-
Prepared by - Omkar Tembe 7
8. Ideal Concept of DRM (Books,Music,Movies):-
Player
Artist Distributor Consumer
Package
Content
Secure network transactions
Software player
Content Package
Content
Prepared by - Omkar Tembe 8
9. How DRM Works :-
persistent
protection
Sender
Recipient
SDS
(Secure Document
Server)
encrypt
Prepared by - Omkar Tembe 9
10. Four common stages :
Packaging is when DRM encryption keys are built right into the
software, the music file, or the movie file.
Distribution is when DRM-encrypted files are delivered to the
customers. This is usually through web server downloads, CD's/DVD's,
or via files emailed to the customers.
License Serving is where specialized servers authenticate legitimate
users through an Internet connection, and allow them to access the
DRM files. Simultaneously, license servers lock up the files when
illegitimate users try to open or copy the files.
License Acquisition is where legitimate customers acquire their
encryption keys so they can unlock their files.
How DRM Works :-
Prepared by - Omkar Tembe 10
11. How DRM Should work :-
1
Take any
content
2
Package with
appropriate
security
3
Trade with
chosen
‘currency’
4
Allow the
content to
be used
Prepared by - Omkar Tembe 11
12. You are using a WMA file;
You need specific software or specific music player hardware to play the
file;
You are limited to how many times you can download;
You are limited in number of hours/days you can download;
The number of different computers you can download to is limited;
The number of times you can burn a CD is limited;
You need a special password and/or logon ID before you can play the file;
You need to reply to confirmation emails before you can play the file;
In some instances, AAC files have DRM locks.
How to identify DRM :-
Prepared by - Omkar Tembe 12
13. Game coNsoles (Nintendo, Sony PlayStation, …)
Microsoft software (Genuine certificate verification)
Trial use of a software for a limited period of time
Online registration to activate the software
Companies Opting for DRM :-
Prepared by - Omkar Tembe 13
14. Apple’s Fair Play Technology
Restricts playing, recording, sharing of files
Allows media to be shared among devices
Allows others to listen to (but not copy) music
Can burn audio CD, eliminates DRM protection
How it works (overview)
iTunes uses encrypted MP4 audio files
Acquire decryption key by trying to play song
player generates a unique ID, sends ID to iTunes server
if not over authorization limit, server sends decryption key.
Decryption key is encrypted in iTunes to prevent transfer to another
machine
Case Studies of DRM :-
Prepared by - Omkar Tembe 14