1
--Suresh Khutale
2Digital Content
 Digital content comes in many forms, from text ,audio and
videos files, to graphics, animations and images.
 Information available for download or distribution on
electronic media such as an eBook or iTunes song.
3
Digital Rights Management (DRM)
 DRM refers to protecting ownership/copyright of electronic
content by restricting what actions an authorized recipient may
take in regard to that content. It can refer to all technologies
that protect them from piracy
 DRM gives digital-content publishers, hardware
manufacturers, copyright holders, and individuals the ability to
securely distribute high-value content.
 Bought a DVD or Blu-Ray but can't copy the video onto your
portable disk? That's DRM.
 Bought an eBook from Amazon but can't read it on your eBook
reader of choice? That's DRM.
4Digital Rights Management (DRM)
 Set of technologies that enable content owners to specify and
control:
 the access they want to give consumers and
 the conditions under which it is given.
 It includes:
 Persistent Protection:
 Business rights: Rights Associated with content
 Access tracking: operations on content
 Rights licensing: Capability of defining specific rights to content and
making them available by contract
5
DRM
Architecture
IP Asset
Creation and
Capture
Rights
Validations
Rights Creation
Rights
Workflow
IP Asset
Management
Repository
Content
Meta Data
Parties
Rights
Works
Trading
Payment Licenses
Fulfillment
Packaging
IP Asset Usage
Permission
Management
Tracking
Management
DRM Architecture
6
Time Territory …..
Play
Count
Obligations
Constraints
Print
Pay
…..
Permissions
Reuse
Tracking
Loyalty
Points
Rights
Holder
…..
DRM Rights Expression Model
7
DRM Techniques
 Encryption
 License Control / Access control
 Digital certificates
 Watermarking
 Rights specification language
 Hashing
8
• Encryption:
• Cryptographic algorithm
• Scrambling
• Protection that encryption offers has its own limitations.
• License Control / Access Control:
• Administration Server/ Permission Server
• Ability to control operations on content
• License Authorization encoded uniquely to the Individual desktop
• Policy Enforcement.
• Prevents user from transferring their rights
DRM Techniques Cont.
9
Certificate
Authority
(CA)
Content
Owner
Content
User
Trusted
Third Party
Content Request
Signed Certificate with Public Key
• Digital Certificate:
• Identifies Specific person or Device.
DRM Techniques Cont.
10DRM Techniques Cont.
• Watermarking
• Embedding information
• Method of embedding a copyright stamp into content
• cannot be captured by a human
• Hashing
• One Way Hash Function
• Message Digest
• Rights specification language
• Mechanism for describing the author or publisher rights
Emerging Standard
Digital Property Rights Language (DPRL)
Electronic Book Exchange (EBX) Working Group
Extensible Access Control Mark-up Language (XACML)
Extensible Rights Mark-up Language(XrML)
MPEG Rights Expression Language
11
Copy
Control
Digital Rights Management
DRM Techniques Cont.
Author
Identification
Credential
Authentication
Conditional
Access
Integrity
Checking
Interoperabilit
y
Usage
Rule
-Watermarking
-Fingerprinting
-Cryptography
-Hashing
-Digital Signature
Rights
Languages
• XrML
• DPRL
• MPEG REL
12
Secure
Wrapping/
Encryption
Publisher
-Read-only
-Copy and Paste
-Forward
-Print
Rights specification:
DRM
Packaging
Software
©
DRM
Packaging
Software
Secure
Wrapping/E
ncryption
©
Secure
Wrapping/
Encryption
©
Courtesy Content Directions Inc.
How DRM Works?
13
Publisher
-Read-only
-Copy and Paste
-Forward
-Print
Rights specification:
DRM
Packaging
Software
Content
Hosting
Secure
Wrapping/
Encryption
©
Publisher
©
Meta-
data
How DRM Works?
14
©
Secure
Wrapping/
Encryption
Publisher
-Read-only
-Copy and Paste
-Forward
-Print
Rights specification:
DRM
Packaging
Software
©
DRM
Packaging
Software
Secure
Wrapping/
Encryption
©
Secure
Wrapping/
Encryption
©
Publisher
Customer
-Visited Publisher website, and been
referred to copy of encrypted content
-Received the encrypted file from a
friend or colleague.
Content
Hosting
©
Meta-
data
How DRM Works?
15
Secure
Wrapping/
Encryption
Publisher
-Read-only
-Copy and Paste
-Forward
-Print
Rights specification:
DRM
Packaging
Software
©
DRM
Packaging
Software
Secure
Wrapping/
Encryption
©
Secure
Wrapping/
Encryption
©
Publisher
E-Commerce
Vendor
• Credit card validation
• Billing
• Reporting
$
Rights
Clearinghouse
©©
Customer
• Reports to Publisher (either aggregate sales
numbers or individual customer information)
• Issues key or Permit
• Checks user ID
• Checks rights assigned (if any) to user by Publisher
• Takes payment
Content
Hosting
©
Meta-
data
How DRM Works?
16
©
Customer
©Customer
Customer ©
Customer
©
Secure
Wrapping/
Encryption
-Read-only
-Copy and Paste
-Forward
-Print
Rights specification:
DRM
Packaging
Software
©
Customer
Customer
Customer
Customer
Customer
Content
Distributors/
Syndicators/
Aggregators
Content
Hosting
©
Meta-
data
Publisher
E-Commerce
Vendor
• Credit card validation,
• Billing
• Reporting
Rights
Clearinghouse
• Reports to Publisher (either aggregate sales
numbers or individual customer information)
• Issues key or Permit
• Checks user ID
• Checks rights assigned (if any) to user by Publisher
• Takes payment
How DRM Works?
17
• DRM attempts to protect the copyright holders intellectual property
rights
• Allows for secure content delivery for the consumer
• Allows for content providers to monitor sales of their products more
efficiently
• Cuts down on the amount of piracy
DRM Advantages
18DRM Vendors
• Microsoft
• Macrovision
• IBM
• Adode
• Intertrust
• Sony
• Contentguard
• LockLizard
19
Thank You

Digital Rights Management PPT

  • 1.
  • 2.
    2Digital Content  Digitalcontent comes in many forms, from text ,audio and videos files, to graphics, animations and images.  Information available for download or distribution on electronic media such as an eBook or iTunes song.
  • 3.
    3 Digital Rights Management(DRM)  DRM refers to protecting ownership/copyright of electronic content by restricting what actions an authorized recipient may take in regard to that content. It can refer to all technologies that protect them from piracy  DRM gives digital-content publishers, hardware manufacturers, copyright holders, and individuals the ability to securely distribute high-value content.  Bought a DVD or Blu-Ray but can't copy the video onto your portable disk? That's DRM.  Bought an eBook from Amazon but can't read it on your eBook reader of choice? That's DRM.
  • 4.
    4Digital Rights Management(DRM)  Set of technologies that enable content owners to specify and control:  the access they want to give consumers and  the conditions under which it is given.  It includes:  Persistent Protection:  Business rights: Rights Associated with content  Access tracking: operations on content  Rights licensing: Capability of defining specific rights to content and making them available by contract
  • 5.
    5 DRM Architecture IP Asset Creation and Capture Rights Validations RightsCreation Rights Workflow IP Asset Management Repository Content Meta Data Parties Rights Works Trading Payment Licenses Fulfillment Packaging IP Asset Usage Permission Management Tracking Management DRM Architecture
  • 6.
  • 7.
    7 DRM Techniques  Encryption License Control / Access control  Digital certificates  Watermarking  Rights specification language  Hashing
  • 8.
    8 • Encryption: • Cryptographicalgorithm • Scrambling • Protection that encryption offers has its own limitations. • License Control / Access Control: • Administration Server/ Permission Server • Ability to control operations on content • License Authorization encoded uniquely to the Individual desktop • Policy Enforcement. • Prevents user from transferring their rights DRM Techniques Cont.
  • 9.
    9 Certificate Authority (CA) Content Owner Content User Trusted Third Party Content Request SignedCertificate with Public Key • Digital Certificate: • Identifies Specific person or Device. DRM Techniques Cont.
  • 10.
    10DRM Techniques Cont. •Watermarking • Embedding information • Method of embedding a copyright stamp into content • cannot be captured by a human • Hashing • One Way Hash Function • Message Digest • Rights specification language • Mechanism for describing the author or publisher rights Emerging Standard Digital Property Rights Language (DPRL) Electronic Book Exchange (EBX) Working Group Extensible Access Control Mark-up Language (XACML) Extensible Rights Mark-up Language(XrML) MPEG Rights Expression Language
  • 11.
    11 Copy Control Digital Rights Management DRMTechniques Cont. Author Identification Credential Authentication Conditional Access Integrity Checking Interoperabilit y Usage Rule -Watermarking -Fingerprinting -Cryptography -Hashing -Digital Signature Rights Languages • XrML • DPRL • MPEG REL
  • 12.
    12 Secure Wrapping/ Encryption Publisher -Read-only -Copy and Paste -Forward -Print Rightsspecification: DRM Packaging Software © DRM Packaging Software Secure Wrapping/E ncryption © Secure Wrapping/ Encryption © Courtesy Content Directions Inc. How DRM Works?
  • 13.
    13 Publisher -Read-only -Copy and Paste -Forward -Print Rightsspecification: DRM Packaging Software Content Hosting Secure Wrapping/ Encryption © Publisher © Meta- data How DRM Works?
  • 14.
    14 © Secure Wrapping/ Encryption Publisher -Read-only -Copy and Paste -Forward -Print Rightsspecification: DRM Packaging Software © DRM Packaging Software Secure Wrapping/ Encryption © Secure Wrapping/ Encryption © Publisher Customer -Visited Publisher website, and been referred to copy of encrypted content -Received the encrypted file from a friend or colleague. Content Hosting © Meta- data How DRM Works?
  • 15.
    15 Secure Wrapping/ Encryption Publisher -Read-only -Copy and Paste -Forward -Print Rightsspecification: DRM Packaging Software © DRM Packaging Software Secure Wrapping/ Encryption © Secure Wrapping/ Encryption © Publisher E-Commerce Vendor • Credit card validation • Billing • Reporting $ Rights Clearinghouse ©© Customer • Reports to Publisher (either aggregate sales numbers or individual customer information) • Issues key or Permit • Checks user ID • Checks rights assigned (if any) to user by Publisher • Takes payment Content Hosting © Meta- data How DRM Works?
  • 16.
    16 © Customer ©Customer Customer © Customer © Secure Wrapping/ Encryption -Read-only -Copy andPaste -Forward -Print Rights specification: DRM Packaging Software © Customer Customer Customer Customer Customer Content Distributors/ Syndicators/ Aggregators Content Hosting © Meta- data Publisher E-Commerce Vendor • Credit card validation, • Billing • Reporting Rights Clearinghouse • Reports to Publisher (either aggregate sales numbers or individual customer information) • Issues key or Permit • Checks user ID • Checks rights assigned (if any) to user by Publisher • Takes payment How DRM Works?
  • 17.
    17 • DRM attemptsto protect the copyright holders intellectual property rights • Allows for secure content delivery for the consumer • Allows for content providers to monitor sales of their products more efficiently • Cuts down on the amount of piracy DRM Advantages
  • 18.
    18DRM Vendors • Microsoft •Macrovision • IBM • Adode • Intertrust • Sony • Contentguard • LockLizard
  • 19.