Drm
-
Upload
sajan-sahu -
Category
Technology
-
view
88 -
download
0
description
Transcript of Drm
MAIN TOPIC
S
I
L
I
C
O
N
MAIN TOPIC
NAME
ROLL.No
MAIN TOPIC
S
I
L
I
C
O
N
CONTENTS IntroductionIntroduction DefinationDefination Survey And AspectSurvey And Aspect Design And ImplementationDesign And Implementation Requirements For DRMRequirements For DRM DRM under AttackDRM under Attack Emerging TrendsEmerging Trends ConclusionConclusion
MAIN TOPIC
S
I
L
I
C
O
N
INTRODUCTION
The Internet has emerged as a vibrant information The Internet has emerged as a vibrant information and digital entertainment .and digital entertainment .
AS a hyper distribution channel for its easy and AS a hyper distribution channel for its easy and efficient dissemination of content, it also facilitates efficient dissemination of content, it also facilitates the synergy of digital technologies to provide a the synergy of digital technologies to provide a richer user experience. richer user experience.
The ease of copying and sharing of digital content The ease of copying and sharing of digital content such as music, without any deterioration in quality, such as music, without any deterioration in quality, has resulted in rampant piracy.has resulted in rampant piracy.
To curb this piracy ,One of such measures is Digital To curb this piracy ,One of such measures is Digital Rights Management (DRM).Rights Management (DRM).
MAIN TOPIC
S
I
L
I
C
O
N
DEFINITION
DRM is a cluster of techniques designed to DRM is a cluster of techniques designed to restrict unwanted copying and distribution restrict unwanted copying and distribution of intellectual property such as of intellectual property such as music,video,software.music,video,software...
DRM refers to controlling and managing DRM refers to controlling and managing rights to digital intellectual property.rights to digital intellectual property.
DRM is the description, identification, and DRM is the description, identification, and protection, monitoring and tracking of all protection, monitoring and tracking of all forms of rights . forms of rights .
Examples include Apple's iTunes/Fairplay, Examples include Apple's iTunes/Fairplay, Windows Media Player, Real Networks.Windows Media Player, Real Networks.
MAIN TOPIC
S
I
L
I
C
O
N
SURVEY Survey on the technological aspects of
Digital Rights Management
William Ku and Chi-Hung Chi
School of Computing, National University of Singapore .
Singapore 117543, Republic of Singapore
MAIN TOPIC
S
I
L
I
C
O
N
ASPECT
Mainly it has 3aspects:Mainly it has 3aspects: Legal AspectLegal Aspect: : No DRM technology is going No DRM technology is going
to be of much help if the law does not provide to be of much help if the law does not provide provisions to enforce the rights of the content provisions to enforce the rights of the content owners.owners.
Social AspectSocial Aspect: : DRM needs to address a host of DRM needs to address a host of social issues such as privacy And fair use.social issues such as privacy And fair use.
Economic AspectEconomic Aspect:: It r It requires certain equires certain economic questions to be answered such as who economic questions to be answered such as who would pay for the DRM structurewould pay for the DRM structure..
MAIN TOPIC
S
I
L
I
C
O
N
DESIGN AND IMPLIMENTATIONDESIGN AND IMPLIMENTATION
There are two critical architectures to There are two critical architectures to consider:consider:
Functional Architecture: Functional Architecture: Information Architecture:Information Architecture:
MAIN TOPIC
S
I
L
I
C
O
N
Functional ArchitectureIt work under three AreaIt work under three Area• Intellectual Property (IP) Asset Creation And CaptureIntellectual Property (IP) Asset Creation And Capture It supports three modulesIt supports three modules
right validationright validationRight creationRight creationWork flowWork flow
• IP Asset Management IP Asset Management It supports two modulesIt supports two modules
repository functionrepository function trading function trading function
• IP Asset Usage IP Asset Usage It supports two modulesIt supports two modules
permission managementpermission management tracking managementtracking management
MAIN TOPIC
S
I
L
I
C
O
N
Functional Architecture
Figure 1 - DRM Functional Architecture
MAIN TOPIC
S
I
L
I
C
O
N
Information Architecture:
It Includes 3 Points
Modeling the entitiesModeling the entities
It involve It involve user,content,rightsuser,content,rights.. Identifying and describing the entities Identifying and describing the entities
All entities need to be Identified and Described.All entities need to be Identified and Described. Expressing the rights statementsExpressing the rights statements
It consists of Permission, constraints,ObligationIt consists of Permission, constraints,Obligation
MAIN TOPIC
S
I
L
I
C
O
N
Information Architecture
Figure 2 - DRM Information Architecture - Core Entities Model
MAIN TOPIC
S
I
L
I
C
O
N
IFLA MODEL
It allows content to be identifiedIt allows content to be identified WorkWork(Distinct Intellectual or artistic (Distinct Intellectual or artistic
creation)creation)
Expression(relization of a work)Expression(relization of a work) Manifestion(digital embodiment of an Manifestion(digital embodiment of an
expression of work.expression of work. Item(Instantiation of Manifestion)Item(Instantiation of Manifestion)
MAIN TOPIC
S
I
L
I
C
O
N
CONT….
Figure 3 - DRM Information Architecture - Content Model
MAIN TOPIC
S
I
L
I
C
O
N
RIGHT EXPRESSION MODEL
Permissions (i.e., usages) - what you are Permissions (i.e., usages) - what you are allowed to do allowed to do
Constraints - restrictions on the permissions Constraints - restrictions on the permissions Obligations - what you have to Obligations - what you have to
do/provide/accept do/provide/accept Rights Holders - who is entitled to what Rights Holders - who is entitled to what
MAIN TOPIC
S
I
L
I
C
O
N
CONT….Figure 4 - DRM Information Architecture - Rights Expression Model
MAIN TOPIC
S
I
L
I
C
O
N
REQUIREMENTS FOR DRM
Hardware and software implementationsHardware and software implementations MobilityMobility SecuritySecurity User PrivacyUser Privacy
MAIN TOPIC
S
I
L
I
C
O
N
DRM UNDER ATTACK
Weakness in Existing SystemsWeakness in Existing Systems
as three main categories:as three main categories:
direct attacks at the architecture of the DRM direct attacks at the architecture of the DRM systemsystem
circumvention attacks such as sound and video circumvention attacks such as sound and video grabbinggrabbing
brute-force attacks on password-based systems brute-force attacks on password-based systems
MAIN TOPIC
S
I
L
I
C
O
N
THREE KNOWN ATTACKS
Attacks on Audio DRM systems: Sound Grabbing
E.g: unfuck software
Attacks on Video DRM systems: Video grabbing
eBooks: Brute-Force attacks
MAIN TOPIC
S
I
L
I
C
O
N
Emerging Trends
Mobile DRM Mobile DRM DRM for Everyone DRM for Everyone DRM and Trusted Computing DRM and Trusted Computing Content reuse and granularity Content reuse and granularity
MAIN TOPIC
S
I
L
I
C
O
N
CONCLUSION
Digital Rights Management is emerging as a formidable new challenge and it is essential for DRM systems to provide interoperable services. DRM standardization is now occuring in a number of open organisation. Solutions to DRM challenges will enable untold amounts of new content to be made available in safe, open, and trusted environments
MAIN TOPIC
S
I
L
I
C
O
N