Digital Rights Management in Digital Delivery Le Chen 1 2010

Click here to load reader

download Digital Rights Management in Digital Delivery Le Chen 1 2010

of 34

  • date post

    23-Dec-2015
  • Category

    Documents

  • view

    214
  • download

    0

Embed Size (px)

Transcript of Digital Rights Management in Digital Delivery Le Chen 1 2010

  • Slide 1
  • Digital Rights Management in Digital Delivery Le Chen 1 2010
  • Slide 2
  • Company Confidential Mobile Internet Next Major Computing Cycle 2 2010 DRM in Digital Delivery/Le Chen
  • Slide 3
  • Company Confidential Increase in consumption of Digital Content Improvements in social networking and mobile computing platforms are fundamentally changing ways people communicate with each other and ways developers / advertisers / vendors reach consumers. Mobile devices will evolve as remote controls for ever expanding types of real-time services, including emerging category of location-based services, creating opportunities and dislocations, empowering consumers in unprecedented and transformative ways. Users Tend to Pay on Mobile Internet Digital Content (Wallpaper, Ringtone, Downloadable Game, Music, Video...) 3 2010 DRM in Digital Delivery/Le Chen
  • Slide 4
  • Company Confidential Digital Delivery Process 4 2010 DRM in Digital Delivery/Le Chen
  • Slide 5
  • Company Confidential Challenges in Digital Delivery Ensuring the origin and integrity of downloaded content to prevent issues like Faulty download package, i.e. because of user or system mistake Incompatible package with the device Missing supporting software component Failure in activation of download package Malicious software like viruses Securing the involved parties and control of transaction to prevent issues like Payment information leak out Downloading without payment Preventing the authorized use of delivered content like Reverse engineering Forwarding to others 5 2010 DRM in Digital Delivery/Le Chen
  • Slide 6
  • Company Confidential DRM DRM, Digital Rights Management, is a term used to describe a range of access control techniques that publishers and copyright holders use to restrict usage of digital media or devices. It manages copyright material and the terms and conditions on which the digital content is made available to users. DRM had traditionally been focused on security and encryption as a means to solve Intellectual Property (IP) management. It aimed to lock the content and limit its distribution to only those who pay DRM is now being defined to cover the description, identification, trading, protection, monitoring and tracking of all forms of rights permissions, constraints, and requirements over both tangible and intangible assets including management of rights holders relationships. 6 2010 DRM in Digital Delivery/Le Chen
  • Slide 7
  • Company Confidential DRM standards Open Mobile Alliance (OMA) DRM Windows Media DRM 10 Real Networks Helix DRM Apple FairPlay Sony OpenMG DRM Opera ISO MPEG-21 7 2010 DRM in Digital Delivery/Le Chen
  • Slide 8
  • Company Confidential Mission of DRM Standards Provide interoperability between infrastructure, terminals and services Support healthy competition and cooperate between content owners, delivery service provider and developers resulting in better consumer propositions Require lower cost when introducing new services Support fast global service deployment Provide enriched user experience and compelling new mobile services across service providers The focus of DRM should not be only restricting all unlawful duplication, but also seeking a good balance between security and user friendliness. 8 2010 DRM in Digital Delivery/Le Chen
  • Slide 9
  • Company Confidential OMA DRM Open Mobile Alliance (OMA), as one of the mostly used DRM standards in mobile industry, has the members representing the key players of the value chain. Its members include mobile phone manufacture like Nokia and Samsung, mobile network system manufacturers like Ericsson and Nokia Siemens Networks, operators like Vodafone and Orange, and IT companies like IBM and Microsoft. OMA DRM follows the common DRM practices and takes into account the special requirements and characteristics of the mobile domain, and has been implemented in many mobile phone models already. It is recognized as the standard which different stakeholders will contribute and follow continuously in mobile community. 9 2010 DRM in Digital Delivery/Le Chen
  • Slide 10
  • Company Confidential OMA DRM v1.0 Right Expression Language 10 2010 DRM in Digital Delivery/Le Chen
  • Slide 11
  • Company Confidential OMA DRM v1.0 Forward lock 11 2010 DRM in Digital Delivery/Le Chen Combined Delivery Separate Delivery
  • Slide 12
  • Company Confidential OMA DRM v1.0 Super Distribution 12 2010 DRM in Digital Delivery/Le Chen It can be noticed that OMA DRM v1.0 lacks the mechanisms of Secure delivery of rights Authentication of devices and rights issuers Revocation method
  • Slide 13
  • Company Confidential OMA DRM v2.0 Enhanced security with PKI mechanism 13 2010 DRM in Digital Delivery/Le Chen
  • Slide 14
  • Company Confidential OMA DRM v2.0 ROAP A 4-pass protocol for registration of a Device with an RI Two protocols by which the Device requests and acquires Rights Objects (RO). The 2-pass RO acquisition protocol encompasses request and delivery of an RO The 1-pass RO acquisition protocol is only a delivery of an RO from an RI to a Device (e.g. messaging/push) 2-pass protocols for Devices joining and leaving a Domain 14 2010 DRM in Digital Delivery/Le Chen
  • Slide 15
  • Company Confidential OMA DRM v2.0 CMLA 15 2010 DRM in Digital Delivery/Le Chen For compliance assurance CMLA provisions keying material to client adopters with which to manufacture devices or applications, and service providers with which to provision rights DRM Release 2.0 technology specifications come from OMA OMA DRM protected content/rights are served to compliant devices
  • Slide 16
  • Company Confidential OMA DRM v2.0 Domains Domains allow a Right Issuer to bind rights and content encryption keys to a group of DRM Agents instead of just a single DRM Agent Unconnected Device Support OMA DRM enables a Connected Device to act as an intermediary to assist an Unconnected Device to purchase and download content and Rights Objects Export DRM Content may be exported to other DRM systems, for use on devices that are not OMA DRM compliant but support some other DRM mechanism Streaming of DRM Content In OMA DRM v1.0, the digital content is packaged and delivered in its entirety. Alternatively, in v2.0, content may be packetized and delivered as a stream. 16 2010 DRM in Digital Delivery/Le Chen
  • Slide 17
  • Company Confidential OMA DRM v1.0 Infrastructure Requirements 17 2010 DRM in Digital Delivery/Le Chen
  • Slide 18
  • Company Confidential OMA DRM v2.0 Infrastructure Requirements 18 2010 DRM in Digital Delivery/Le Chen Client side:
  • Slide 19
  • Company Confidential OMA DRM v2.0 Infrastructure Requirements 19 2010 DRM in Digital Delivery/Le Chen Server side:
  • Slide 20
  • Company Confidential DRM Service/Server Integration Architecture Scenario 20 2010 DRM in Digital Delivery/Le Chen
  • Slide 21
  • Company Confidential Initiative of Case Study in RTS server Design According to OMA DRM specifications, DRM content is protected with DRM Content Encryption Key (CEK) embedded in Right Object (RO) which is then encrypted with device public keys. This is needed to prohibit forward copying of the content. If a customers mobile device needs to be repaired for certain reasons, the care service provider should be able to repair the terminal and return it in working condition after the service, or give replacement terminal to the customer if a terminal is in a non-repairable condition. In both cases DRM protected content must be returned to the customer in working condition. The capability to backup, restore and transfer encryption keys is needed to be able to restore or move the content of consumers in case of device replacement, upgrade sales or hardware repair for OMA DRM complaint mobile devices. 21 2010 DRM in Digital Delivery/Le Chen
  • Slide 22
  • Company Confidential Use Case Design for RTS server: 22 2010 DRM in Digital Delivery/Le Chen
  • Slide 23
  • Company Confidential Replacement Generate Password 23 2010 DRM in Digital Delivery/Le Chen
  • Slide 24
  • Company Confidential Replacement DRM Right Data Transfer 24 2010 DRM in Digital Delivery/Le Chen
  • Slide 25
  • Company Confidential Exception Flow Bad Package 25 2010 DRM in Digital Delivery/Le Chen
  • Slide 26
  • Company Confidential Exception Flow HSM not available 26 2010 DRM in Digital Delivery/Le Chen
  • Slide 27
  • Company Confidential Exception Flow Bad acknoledgement 27 2010 DRM in Digital Delivery/Le Chen
  • Slide 28
  • Company Confidential RTS Protocol Unpack RTS Request 28 2010 DRM in Digital Delivery/Le Chen
  • Slide 29
  • Company Confidential RTS Protocol Pack RTS Request 29 2010 DRM in Digital Delivery/Le Chen
  • Slide 30
  • Company Confidential Logical view Design 30 2010 DRM in Digital Delivery/Le Chen Presentation layer Business Logic Tier (EJBs) Integration Tier (DAOs) Resource Tier
  • Slide 31
  • Company Confidential Operation 31 2010 DRM in Digital Delivery/Le Chen
  • Slide 32
  • Company Confidential Deployment view 32 2010 DRM in Digital Delivery/Le Chen
  • Slide 33