Drm

21
MAIN TOPIC S I L I C O N MAIN TOPIC NAME ROLL.No

description

drm

Transcript of Drm

Page 1: Drm

MAIN TOPIC

S

I

L

I

C

O

N

MAIN TOPIC

NAME

ROLL.No

Page 2: Drm

MAIN TOPIC

S

I

L

I

C

O

N

CONTENTS IntroductionIntroduction DefinationDefination Survey And AspectSurvey And Aspect Design And ImplementationDesign And Implementation Requirements For DRMRequirements For DRM DRM under AttackDRM under Attack Emerging TrendsEmerging Trends ConclusionConclusion

Page 3: Drm

MAIN TOPIC

S

I

L

I

C

O

N

INTRODUCTION

The Internet has emerged as a vibrant information The Internet has emerged as a vibrant information and digital entertainment .and digital entertainment .

AS a hyper distribution channel for its easy and AS a hyper distribution channel for its easy and efficient dissemination of content, it also facilitates efficient dissemination of content, it also facilitates the synergy of digital technologies to provide a the synergy of digital technologies to provide a richer user experience. richer user experience.

The ease of copying and sharing of digital content The ease of copying and sharing of digital content such as music, without any deterioration in quality, such as music, without any deterioration in quality, has resulted in rampant piracy.has resulted in rampant piracy.

To curb this piracy ,One of such measures is Digital To curb this piracy ,One of such measures is Digital Rights Management (DRM).Rights Management (DRM).

Page 4: Drm

MAIN TOPIC

S

I

L

I

C

O

N

DEFINITION

DRM is a cluster of techniques designed to DRM is a cluster of techniques designed to restrict unwanted copying and distribution restrict unwanted copying and distribution of intellectual property such as of intellectual property such as music,video,software.music,video,software...

DRM refers to controlling and managing DRM refers to controlling and managing rights to digital intellectual property.rights to digital intellectual property.

DRM is the description, identification, and DRM is the description, identification, and protection, monitoring and tracking of all protection, monitoring and tracking of all forms of rights . forms of rights .

Examples include Apple's iTunes/Fairplay, Examples include Apple's iTunes/Fairplay, Windows Media Player, Real Networks.Windows Media Player, Real Networks.

Page 5: Drm

MAIN TOPIC

S

I

L

I

C

O

N

SURVEY Survey on the technological aspects of

Digital Rights Management

William Ku and Chi-Hung Chi

School of Computing, National University of Singapore .

Singapore 117543, Republic of Singapore

Page 6: Drm

MAIN TOPIC

S

I

L

I

C

O

N

ASPECT

Mainly it has 3aspects:Mainly it has 3aspects: Legal AspectLegal Aspect: : No DRM technology is going No DRM technology is going

to be of much help if the law does not provide to be of much help if the law does not provide provisions to enforce the rights of the content provisions to enforce the rights of the content owners.owners.

Social AspectSocial Aspect: : DRM needs to address a host of DRM needs to address a host of social issues such as privacy And fair use.social issues such as privacy And fair use.

Economic AspectEconomic Aspect:: It r It requires certain equires certain economic questions to be answered such as who economic questions to be answered such as who would pay for the DRM structurewould pay for the DRM structure..

Page 7: Drm

MAIN TOPIC

S

I

L

I

C

O

N

DESIGN AND IMPLIMENTATIONDESIGN AND IMPLIMENTATION

There are two critical architectures to There are two critical architectures to consider:consider:

Functional Architecture: Functional Architecture: Information Architecture:Information Architecture:

Page 8: Drm

MAIN TOPIC

S

I

L

I

C

O

N

Functional ArchitectureIt work under three AreaIt work under three Area• Intellectual Property (IP) Asset Creation And CaptureIntellectual Property (IP) Asset Creation And Capture It supports three modulesIt supports three modules

right validationright validationRight creationRight creationWork flowWork flow

• IP Asset Management IP Asset Management It supports two modulesIt supports two modules

repository functionrepository function trading function trading function

• IP Asset Usage IP Asset Usage It supports two modulesIt supports two modules

permission managementpermission management tracking managementtracking management

Page 9: Drm

MAIN TOPIC

S

I

L

I

C

O

N

Functional Architecture

Figure 1 - DRM Functional Architecture

Page 10: Drm

MAIN TOPIC

S

I

L

I

C

O

N

Information Architecture:

It Includes 3 Points

Modeling the entitiesModeling the entities

It involve It involve user,content,rightsuser,content,rights.. Identifying and describing the entities Identifying and describing the entities

All entities need to be Identified and Described.All entities need to be Identified and Described. Expressing the rights statementsExpressing the rights statements

It consists of Permission, constraints,ObligationIt consists of Permission, constraints,Obligation

Page 11: Drm

MAIN TOPIC

S

I

L

I

C

O

N

Information Architecture

Figure 2 - DRM Information Architecture - Core Entities Model

Page 12: Drm

MAIN TOPIC

S

I

L

I

C

O

N

IFLA MODEL

It allows content to be identifiedIt allows content to be identified WorkWork(Distinct Intellectual or artistic (Distinct Intellectual or artistic

creation)creation)

Expression(relization of a work)Expression(relization of a work) Manifestion(digital embodiment of an Manifestion(digital embodiment of an

expression of work.expression of work. Item(Instantiation of Manifestion)Item(Instantiation of Manifestion)

Page 13: Drm

MAIN TOPIC

S

I

L

I

C

O

N

CONT….

Figure 3 - DRM Information Architecture - Content Model

Page 14: Drm

MAIN TOPIC

S

I

L

I

C

O

N

RIGHT EXPRESSION MODEL

Permissions (i.e., usages) - what you are Permissions (i.e., usages) - what you are allowed to do allowed to do

Constraints - restrictions on the permissions Constraints - restrictions on the permissions Obligations - what you have to Obligations - what you have to

do/provide/accept do/provide/accept Rights Holders - who is entitled to what Rights Holders - who is entitled to what

Page 15: Drm

MAIN TOPIC

S

I

L

I

C

O

N

CONT….Figure 4 - DRM Information Architecture - Rights Expression Model

Page 16: Drm

MAIN TOPIC

S

I

L

I

C

O

N

REQUIREMENTS FOR DRM

Hardware and software implementationsHardware and software implementations MobilityMobility SecuritySecurity User PrivacyUser Privacy

Page 17: Drm

MAIN TOPIC

S

I

L

I

C

O

N

DRM UNDER ATTACK

Weakness in Existing SystemsWeakness in Existing Systems

as three main categories:as three main categories:

direct attacks at the architecture of the DRM direct attacks at the architecture of the DRM systemsystem

circumvention attacks such as sound and video circumvention attacks such as sound and video grabbinggrabbing

brute-force attacks on password-based systems brute-force attacks on password-based systems

Page 18: Drm

MAIN TOPIC

S

I

L

I

C

O

N

THREE KNOWN ATTACKS

Attacks on Audio DRM systems: Sound Grabbing

E.g: unfuck software

Attacks on Video DRM systems: Video grabbing

eBooks: Brute-Force attacks

Page 19: Drm

MAIN TOPIC

S

I

L

I

C

O

N

Emerging Trends

Mobile DRM Mobile DRM DRM for Everyone DRM for Everyone DRM and Trusted Computing DRM and Trusted Computing Content reuse and granularity Content reuse and granularity

Page 20: Drm

MAIN TOPIC

S

I

L

I

C

O

N

CONCLUSION

Digital Rights Management is emerging as a formidable new challenge and it is essential for DRM systems to provide interoperable services. DRM standardization is now occuring in a number of open organisation. Solutions to DRM challenges will enable untold amounts of new content to be made available in safe, open, and trusted environments

Page 21: Drm

MAIN TOPIC

S

I

L

I

C

O

N