jayeeta mullick_DRM_1

advertisement
Tools, Techniques and Standards of
Digital Rights Management Systems
By
Jayeeta Mullick
Overview
•
•
•
•
•
•
What is DRM?
What are the Digital contents?
Tools and Techniques of DRM
DRM Standards
Commercial DRM Systems
DRM and its impacts in Libraries
DRM
Digital Rights Management (DRM) refers to those technologies
which have been specifically developed for managing digital rights.
“Digital rights management (DRM) is a class of access control
technologies that are used by hardware manufacturers, publishers,
copyright holders and individuals with the intent to limit the use of
digital content and devices after sale. DRM is any technology that
inhibits uses of digital content that are not desired or intended by the
content provider.” –wikipedia.
As stated in the eBook User Bill of Rights , “Digital Rights
Management (DRM), like a tariff, acts as a mechanism to inhibit the
free exchange of ideas, literature, and information.”
What are Digital contents?
Digital Materials are mostly digital files or programmes available in
digital environment.
Some of these are
•
•
•
•
•
•
Documents/ E-text
E-books/ E-Publishing
Images
Audio
Video
Software
Theses digital contents are accessed through Computers, Phone,
various types of video or audio players, TV etc.
Tools and Techniques of DRM
I.
Encryption
Encryption is a technique to protect digital work. In this technique
file is encrypted using a key and only the key holders are able to
decrypt the file. Sometimes when key is linked with BIOS or
hardware of the authorized user then the security level will be
increased. The key is the most important component in an
encryption system. In this way unauthorized user access can be
protected but not fully because key holders have the authority to
disclose the key to other users. There are two possible scheme
viz., private key (symmetric) cryptographic and public key
(asymmetric) cryptography.
A key is generally bound to a certificate that attests to the key’s
validity. Keys are generally assigned by trusted third parties, who
are responsible for certifying the security of keys, so that all parties
trust the keys, and for assigning keys to specific users and uses.
Tools and Techniques of DRM
contd.
 Digital Certificate is a special kind of machine-readable document
issued by a trusted Certificate Authority (CA) to an individual or
organization which is unique to them. Some digital certificates
conform to a standard, X.509.
 A Digital Signature is an electronic signature that can be used to
authenticate the identity of a message sender or the signer of a
document, and possibly to ensure that the original content of the
message or document that has been sent is unchanged.
A digital certificate contains the digital signature of the certificateissuing authority so that anyone can verify the authenticity.
Tools and Techniques of DRM
contd.
II. Watermarking
Watermarking is a group of methods and technologies
that can be used to protect digital data. Watermarking
may be used for copyright protection of Digital data. By
watermarking techniques we can protect our files,
images, audio, video, etc. Watermarking may also be
used in authentication, certification, photo development
laboratory, OCR software etc. Some watermarking tools
available are WMT Plus, visual water mark etc.
Tools and Techniques of DRM
contd.
III. Broadcast Flag
The Broadcast Protection Discussion Group (BPDG) is a working
group of content providers, television broadcasters, consumer
electronics manufacturers, information technology companies,
interested individuals. The group proposed that digital TV
programs should be embedded with a "broadcast flag."
A broadcast flag is a set of status bits (or a "flag") sent in the data
stream of a digital television program that indicates whether the
data stream can be recorded, or if there are any restrictions on
recorded content.
Tools and Techniques of DRM
contd.
IV. Licenses
Licenses, sometimes also called end-user license agreements
(EULAs), are a core component of DRM systems. Licenses
documents and control permission are provided to the end users to
access the protected content. Licenses may be hidden in encrypted
content, such as water mark. A license usually communicates
directly with a device to allow access to content.
Many e-publishers, license DRM-enabled content for online
transactions or subscription services. There are various types of
models for distributors and consumers to choose from multiple
fee/free business models. For example, the content could be
included in both the free-content or it could be licensed on a fee-for
pay use by different types of organizations viz. corporate,
government or institutional users.
Organisations need to update & incorporate new licensing
requirements when necessary.
Tools and Techniques of DRM
contd.
V. Secured hardware
In recent years, hardware components with embedded
DRM support and other security features have
emerged to provide support for DRM controlled
content. These include the SD memory card, TPM
(Trusted Platform Module) microcontroller, SVP
(Secure Video Processor).
Tools and Techniques of DRM
VI.
contd.
Secured Transmission Protocols
Several protocols have been developed to secure the transport of
protected content between devices across the networks.
SSL (Secure Sockets Layers) or TLS (Transport Layer Security)
are protocols for cryptographic communications over the internet.
Secure Socket Layer version 3 (SSLv3) and its successor Transport
Layer Security version 1 (TLSv1) are used to provide data integrity
and security for network communications. These security protocols
are used to secure application protocols such as HTTP, FTP, SIP,
SMTP, NNTP, XMPP, and others.
SSLv3/TLSv1 operates on a layer between the transport layer and
the application layer. In this position it can support multiple
application layer protocols by securing the application data before
sending it to the transport layer.
DRM Standards
DRM technologies are cumbersome and can result many
problems for consumers. Such as incompatibility with upgrades
of operating systems, incompatible hardware upgrades,
automatic upgrades from self-renewing DRM systems etc.
DRM systems attempt to address these serious consumer
concerns through DRM standards. It is “An end-to- end process
for content delivery and consumption, specify standardized
technologies for each step of the DRM process, and provide a
certification process for content providers and device
manufacturers to prove compliance with the standard.”
DRM Standards…
• SDMI (Secure Digital Music Initiative)
SDMI was a forum formed in late 1998, composed of
more than 200 IT, consumer electronics, security
technology, ISP and recording industry companies, to
develop technology specifications that protect the
playing, storing, and distribution of digital music.
But since 2001 technology is obsolete as team of
researchers from Princeton and Rice universities
successfully cracked the watermark with the four SDMI
technologies.
DRM Standards…
• CPSA (Content Protection System Architecture)
CPSA is a content technology protection framework that includes
a number of technologies designed to protect content that is
physically distributed through analog tapes or digital media.
CPSA specifies technologies to protect content and to specify
Content Management Information (CMI).
Three basic objectives of CPSA's are:
1. to protect content at its source (wherever it is stored and
whenever it is copied).
2. to protect content as it is transmitted (between transmission
points or between devices).
3. to protect content from unauthorized copying. CPSA relies
primarily on copy control information, watermarks and encryption.
CPSA technology standards…
There are a number of copy control technology standards that can be
included under this CPSA category, some of them are mentioned here.
 CSS (Content Scramble System) is an encryption technology first
introduced in 1996 and is licensed primarily for encrypting content stored on
DVD. CSS utilizes a series of keys for encryption and decryption.
 CPPM (Content Protection for Pre-Recorded Media) utilizes a stronger
encryption algorithm than CSS, key blocks, watermarking and revocation for
compromised devices.
 CGMS (Copy Generation Management System) is information embedded
in video signals, indicating whether the information can be copied, to
prevent both initial and generational (copy of a copy) copying.
 CPRM is a renewable copy protection format for DVD- R/ RW and DVDRAM discs.
Contd.
CPSA technology standards…
• VCPS (Video Content Protection System) provides copy- once
protection for DVD-R and DVD-RW to enable direct digital recording
of digital broadcasts from satellite and cable sources.
• HDCP (High-bandwidth Digital Content Protection) a content
protection system designed to protect illegal transmission of HighDefinition entertainment. It blocks unofficial digital interception and
replication between a player and a monitor. HDCP protects the
contents transmitted through cables using high definition interfaces,
such as DVI (Digital Visual Interface) and UDI (Unified Display
Interface).
It protects transmission of content from a source device to a
destination device, such as TV set-top, using authentification,
encryption and key implementation.
Contd.
CPSA technology standards…
•
DTCP (Digital Transmission Content Protection) protects transmission over
the cable and interface components between two communicating devices
such as USB and fireware. It includes a device authentification and key
exchange protocol. DTCP-IP extends DTCP to support transmission over IP
networks, using 128 bit advanced encryption standard. DTCP are designed
to incorporate with other DRM protocols.
•
Verance VCMS/AV Watermarking Technology protects DVD audio, HDDVD and Blu-ray audio content from being captured by either analog or
digital recorders.
•
AACS (Advanced Access Content System) is a newer encryption standard
for personal computing and consumer electronics devices that is intended to
support high-definition content and to provide stronger protection for digital
audiovisual content than the compromised CSS encryption technology
provides. AACS uses 128-bit AES encryption, and a stronger key
management system that involves media key block technology.
Contd.
CPSA technology standards…
• BD+ is an additional layer of content protection
developed for Blu-ray discs. It is defined as a ‘virtual
machine-based content protection technology’.
• MPEG IPMP-X. The Moving Picture Experts Group
(MPEG) is responsible for a range of standards to
encode and manage digital video and audio. IPMP-X
(Intellectual Property Management and Protection
Extension) is a DRM architecture based on principles
of normative re-use of standard DRM technologies;
mutual authentication to create an authenticated
channel for secure communications
CPSA technology standards…
• OMA DRM is a digital rights management system that
emerged from the Open Mobile Alliance, a consortium of
mobile system manufacturers, mobile phone
manufacturers, mobile telecom providers and IT
companies.
• CMLA (Content Management Licensing Administrator) is
an created by four companies - Intel, Nokia, Panasonic
and Samsung - to implement a “trust model” for the
Open Mobile Alliance (OMA) Digital Rights Management
technical specification version 2.0 standards.
Commercial DRM Systems
In addition to open standards that might be utilized by a range of commercial and
non-commercial entities, there are many proprietary DRM systems
•
DRM technology has been embraced by many of the largest companies in the world
including Apple, Microsoft, Disney, Sony, IBM and Intel.
•
Windows Media DRM (WM-DRM) is an end-to-end DRM system that can be applied
by anyone in a Windows environment to provide secure delivery of digital media over
an IP network.
•
Adobe Acrobat has the facility to protect digital work from copying and pasting.
Adobe has incorporated DRM into its digital creation applications, such as Adobe
Acrobat Professional, which supports assigning digital signatures to verify a file's
authenticity, file encryption, password protection for files, and role-based permissions
for file access and use.
•
Apple FairPlay is a DRM system integrated with QuickTime multimedia technology
that provides DRM for protected digital files for the iPod, iTunes and iTunes Music
Store applications.
DRM and Libraries
In the increasingly protected digital information
space, libraries may be supplying digital content
which is controlled by DRM technologies that the
library may not manage.
Security of digital data and DRM is essential
because through this a large amounts of new
content can be made available in safe, open,
and trusted environments.
DRM and Libraries…..
Contd.
• By embedding controls within the product,
providers can prevent the public from use that is
non-infringing under copyright law as well as
enforce restrictions that extend far beyond those
specific rights enumerated in the Copyright Act
(or other laws). Thus, DRM changes the
fundamental relationship between the creators,
publishers, and users, to the detriment of
creators, users, and the institutions that serve
them.
DRM and Libraries…..
Contd.
But there are significant challenges as well, especially in these
areas:
• Archiving and Future Use
Libraries subscribing online databases, the content and the control
of the content will remain in vendor systems, and libraries are just
"outsource" access to the digital materials.
Some titles are available on a term-limited licensing basis, many
titles are being offered for sale to libraries on a perpetual basis , but
it doesn’t mean that libraries are physically acquiring the digital files.
There is also no guarantee of future access and the addition of DRM
into this can make it more worse.
DRM and Libraries…..
Contd.
• Infrastructural upgrade: access and control
Libraries and archives that deal with electronic formats
have long been concerned about the problem of format
obsolescence, information could be inaccessible or it
cannot be read by modern hardware.
while using these e-documents we have to go through a
complex system to open and read a book, So, its a big
question what happens twenty or fifty or a hundred years
from now when that system no longer exist?
Diversity in e-book formats
Different e-book publishers publish their books in different formats. Like,











Amazon Kindle (published as: .azw; .kf8);
Apple iBooks Author(.iba);
Broadband eBooks ( .lrf; .lrx);
Comic Book Archive file (.cbr , .cbz , .cbt , .cba);
eReader (.pdb);
Hypertext Markup Language (.htm; .html);
Microsoft Reader (.lit);
Mobipocket (.prc; .mobi);
Multimedia eBooks (.exe or .html);
Open Electronic Package (.opf);
Portable Document Format (.pdf) and many more.
So, in such a scenario Hardware, software and OS compatibility are very important
aspects for managing these data in libraries.
conclusion
• There is no doubt that DRM has the potential to
have a tremendous impact on libraries and how
they do their work. Exactly what the impact will
be, is hard to predict today because, this is a
technology in the early stages of its potential
development.
• But it is possible to present some general
cautions based on current experience with
protected works.
Thank You
Download