Introduction to Digital Rights Management

download Introduction to Digital Rights Management

of 60

  • date post

    05-Apr-2018
  • Category

    Documents

  • view

    217
  • download

    0

Embed Size (px)

Transcript of Introduction to Digital Rights Management

  • 8/2/2019 Introduction to Digital Rights Management

    1/60

    InInIntttrrroooduduductctctionionion tttoooDDDigitaigitaigital Righl Righl RightststsMMManananageageagemememennnttt

    Grace AgnewSURA/ViDe Digital Video Conference

    March 2004

  • 8/2/2019 Introduction to Digital Rights Management

    2/60

    Digital Rights Management Definitions

    IntellectualPropertyRights

    DRM System

    DRM Action

    Essential DRMComponents

    Right of ownership and control ofproducts of the creator s mind. WTO-supported

    Digital application to apply andenforce organizational policies for theaccess and use of IP

    Authorization decision based onintersection of attributes about user,content and usage

    Directory Services supporting

    authentication and authorization;Rights Expression; Rights

    Enforcement

  • 8/2/2019 Introduction to Digital Rights Management

    3/60

    Essential DRM ComponentsDirectory Services:

    Identity Management

    Authentication

    Authorization(Role-basedAccess Control)

    Procedures for establishing and

    maintaining identity including

    format, database structure,

    privacy and confidentiality

    Determining that the user

    requesting a service has the

    required ( authentic ) identity

    through a secured system

    Determining that theauthenticated user possesses theauthorized role to access a serviceor object. (e.g. student registeredin History 101 )

  • 8/2/2019 Introduction to Digital Rights Management

    4/60

    Federated DRM

    Community of Trust :

    Common understanding. Shared agreement andenforcement among community members. Ex:Copyright

    Trusted Systems

    Standardized, shared technologies for establishingand enforcing DRM

  • 8/2/2019 Introduction to Digital Rights Management

    5/60

    Essential DRM Components

    Identity Management:

    Privacy:Whether the user s identity is exposed

    Confidentiality:Whether the user s activities areexposed

    Trust:Authenticates any entity in a rightstransaction rights holder, rights

    requester and the content beingrequested.

  • 8/2/2019 Introduction to Digital Rights Management

    6/60

    Enabling Technology: Internet2 Shibboleth Project

    Developing architectures, policy structures, practicaltechnologies, and an open source implementation tosupport inter-institutional sharing of web resourcessubject to access controls.

    Source: Shibboleth Project:http://shibboleth.internet2.edu

  • 8/2/2019 Introduction to Digital Rights Management

    7/60

    Why Shibboleth?

    .. Active privacy a core principle

    .. Emphasis on federated administration

    .. Emphasis on flexible yet secure access

    .. Establishes trust communities

    .. Open source with active community development

    .. Maturing project with increasing use in highereducation and educational collaborations (e.g. NSF sNational Science Digital Library).. Utilizes mature, open source applications andstandards, such as LDAP (lightweight directory accessprotocol

  • 8/2/2019 Introduction to Digital Rights Management

    8/60

    User requests aShib-requestedresource2

    1

    Shib-protectedresourceUser is directed back tohome institution toauthenticate3

    Home institutiongenerates atemporary handlefor user activeprivacy authenticated RU facultymember not John

    SmithHow Shibboleth Works

  • 8/2/2019 Introduction to Digital Rights Management

    9/60

    User receivesaccess toresourceHow Shibboleth WorksUses temporaryhandle to requestfurther attributesabout the user (e.g.,teaching ininterinstitutionalprogram with validaccess to relevante-resources ateither institutionUser s homeinstitution providesnecessary attribute456Shib-protectedresource

  • 8/2/2019 Introduction to Digital Rights Management

    10/60

    IIIssssssuuueseses fffororor TrTrTruuuststst anananddd AAAuuuttthhhenenentttiiicicicitttyyy

    The Structure of Information (IFLA)WorkExpression ExpressionDistinct intellectual orartistic creationManifestationManifestation ManifestationItemIntellectual or artisticrealization of a work( interpretation )

    Physical manifestationof an expression. Maydiffer in physical format,but not in content orinterpretation

    Unique physical

    instance of a manifestation.

  • 8/2/2019 Introduction to Digital Rights Management

    11/60

    KKKeeeyyy WoWo Wor

    rrkkk

    CoCoConcncnceeeppptststs fofoforrr CoCoCommmmmmuniuniunitytyty DDDeeefififini

    ninitititiooonnn

    o Copy identical in the abstract and the concreteo Version Intellectual content unchanged concretepresentation differs (format, language)oRevision revisions should not impact reuse, accordingto community

    o Edition substantially the same but revisions impact useaccording to community policy. Attributes expanded,

    reduced policy.o Adaptation object based on theme or premise ofanother object. Community decision how granular theattribution should be.oDerivation Theme or premise of original object isstarting point for new object

  • 8/2/2019 Introduction to Digital Rights Management

    12/60

    Digital Provenance record in RUL repositoryDigital Provenance record in RUL repository

  • 8/2/2019 Introduction to Digital Rights Management

    13/60

    Lots of CopiesKeep Stuff Safe

    Stanford-initiated project currently applied to ejournalsthat uses a peer-to-peer network tocreate a selective web cache by polling a webjournal at intervals, storing content, and providingto authorized local users.

    ImpliImpliImplicccaaatttiiiooonnnsss fffooorrr DDDRM

    RMRMRobust access throughdistributed, redundant management beyond therights holder or the authorized distributor.

  • 8/2/2019 Introduction to Digital Rights Management

    14/60

    RRRiiighghghtttsss EEExpxpxprrreeessississiononon LLLanananguguguagesagesages iiinnn DDDRRRMMM

    R

    RRiiiggghththtsss EEExxxprprpressiessiessiooonnn LLLaaanguag

    nguagnguage:e:e:

    .Documents offers & agreements between rightsholders, intermediaries, and end users, providingrights to license, distribute, access and useresources..Communicates rights, conditions on the exerciseof rights, and other context relevant to the rightstransactions.

  • 8/2/2019 Introduction to Digital Rights Management

    15/60

    RRRiiighghghtttsss EEExpxpxprrreeessississiononon LLLanananguguguagesagesages iiinnn DDDRRRMMM

    .

    Defines the parties and concepts engaged in offers oragreements for the exercise of rights that are exercisedagainst content..Expresses the underlying business model(s) of thecommunity sharing the DRM..Employs data dictionary and a standard syntax to provideinteroperable, logically consistent, semantically precisedocumentation for rights transactions

    .Should be human and machine interpretable

  • 8/2/2019 Introduction to Digital Rights Management

    16/60

    RRRiiighghghtttsss EEExpxpxprrreeessississiononon LLLanananguguguagesagesages iiinnn DDDRRRMMM

    R

    RRIIIGGGHHHTTTSSSRights, Constraints, Agents and terms ofagreement -tied to core IP processes - map readily.

    EEEXXXPPPRRRE

    EESSSSSSIIIOOONNNLogic for expressing IP offerings and licensescomplex and incompatible - requires advancedparsing.

    LLLAAANNNG

    GGUUUAAAGGGEEEXML provides common framework, grammar andsyntax. Use of multiple schemas and subschemasadds parsing complexity

  • 8/2/2019 Introduction to Digital Rights Management

    17/60

    RRRiiighghghtttsss EEExpxpxprrreeessississiononon LLLanananguguguagesagesages iiinnn DDDRRRMMM

    Rights Expression Implementations

    Documents the copyright status

    Passive

    Identifies the rights holder

    May provide guidance on attribution,

    reuse

    Documents and enforces permissions toActive

    be granted to the user, often afterconditions are met or constraintsimposed. Enforcement can be at pointof access to content or prior to access.

  • 8/2/2019 Introduction to Digital Rights Management

    18/60

    RRRiiighghghtttsss EEExpxpxprrreeessississiononon LLLanananguguguagesagesages iiinnn DDDRRRMMM

    Examples of Passive DRM: Creative Commons

  • 8/2/2019 Introduction to Digital Rights Management

    19/60

    RRRiiighghghtttsss EEExpxpxprrreeessississiononon LLLanananguguguagesagesages iiinnn DDDRRRMMMExamples of Passive DRM: Rutgers Libraries RM

  • 8/2/2019 Introduction to Digital Rights Management

    20/60

    UserDescriptionRightsHolderAuthenticationRightsVideoObjectPermissionAdministrationAuthorizationRights ExpressionLanguagesinDRMRights Expression Languages in DRMActive Rights Management

  • 8/2/2019 Introduction to Digital Rights Management

    21/60

    RRRiiighghghtttsss EEExpxpxprrreeessississiononon LLLanananguguguagesagesages iiinnn DDDRRRMMM

    Other resource metadata:

    .Administrative metadata:--provenance, fixity, context, reference, structure, andmanagement. Rights MD may be a subset

    .Descriptive Metadata: information to discover, identify,select and obtain the resource.Structural metadata: Information a bout the structuredrelationship between components of a complex object.

  • 8/2/2019 Introduction to Digital Rights Management

    22/60

    RRRiiighghghtttsss EEExpxpxprrreeessississiononon LLLanananguguguagesagesages iiinnn DDDRRRMMM

    REL in Context:

    Integration of Administrative, Descriptive, Structural & RightsMetadata:

    .integrated lifecycle management.insures consistency of content information across applications.Supports user decision-making in resource discovery and selection.Supports complex content management -