0% found this document useful (0 votes)
200 views19 pages

Digital Rights Management

Digital Rights Management (DRM) refers to technologies that enable content owners to specify how access is given to digital content and under what conditions. Early DRM implementations used encryption, while modern DRM covers description, identification, trading, protection, monitoring and tracking of rights usage. Standard DRM architecture is composed of three parts - creation, distribution and consumption of digital contents. DRM technologies include Content Scrambling System for films, Apple's FairPlay for music, and Adobe Reader and Microsoft Reader for e-books. Watermarking and fingerprinting are also used to identify content owners and trace illegal copies. The Framework for Mixed Systems is a co-design approach that allows for flexible and reusable DRM systems using both software and

Uploaded by

rohit_thapli
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
200 views19 pages

Digital Rights Management

Digital Rights Management (DRM) refers to technologies that enable content owners to specify how access is given to digital content and under what conditions. Early DRM implementations used encryption, while modern DRM covers description, identification, trading, protection, monitoring and tracking of rights usage. Standard DRM architecture is composed of three parts - creation, distribution and consumption of digital contents. DRM technologies include Content Scrambling System for films, Apple's FairPlay for music, and Adobe Reader and Microsoft Reader for e-books. Watermarking and fingerprinting are also used to identify content owners and trace illegal copies. The Framework for Mixed Systems is a co-design approach that allows for flexible and reusable DRM systems using both software and

Uploaded by

rohit_thapli
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

Digital Rights Management

(DRM)

By:
Rohit Thapliyal
23 september 2010
Digital Rights Management?
 DRM refers to those technologies which have
been specifically developed for managing
digital rights

 Set of technologies that enable content


owners to specify and control:
◦ the access they want to give consumers and
◦ the conditions under which it is given.
History of DRM
 Early implementation of DRM was devised by
the Japanese engineer Ryoichi Mori in 1983
based on encryption.
 first-generation: focused on security and

encryption.
 second-generation: covers the description,

identification, trading, protection, monitoring


and tracking of all forms of rights usage.
Standard DRM architecture
 Standard DRM architecture is composed by
three components:
◦ Creation,
◦ Distribution and
◦ Consumption of the digital contents.
DRM architecture
Standard DRM work
1. User requests a digital content.
2. The content server demand to user to fill
some information.
3. User sends the information.
4. The Content server requests license
generation to license server.
5. The license server generate license and
send it to the content server.
6. The content server gives to user
authorization to read the digital content.
Sequence diagram
DRM technologies
 DRM and film:
◦ Content Scrambling System (CSS).
◦ Protected Media Path.
 DRM and music:
◦ Apple's FairPlay DRM system.
 E-books:
◦ Adobe Reader: restricted and unrestricted files.
◦ Microsoft Reader: sealed, inscribed and owner
exclusive e-books.
DRM technology: Watermarking
 Digital watermarking is the process of
inserting a digital signal or pattern into
digital content.
 The signal, known as a watermark.
 can be used later to identify the owner of the

work and to trace illegal copies of the work.


 Types:

◦ visible :easily perceived by a viewer (or listener).


◦ invisible: imperceptible under normal viewing.
Invisible and Visible watermarking
DRM technology: Fingerprinting
 Fingerprints are an extension to
watermarking principle.

 Making each copy of the content unique to


the person who receives it.

 Fingerprinting technique:
◦ Secure Hash Algorithm (SHA): takes a message of
less than 264 bits in length and produces a 160-bit
message digest.
DRM technology :Framework for
mixed systems(F4MS)

 F4MS not only includes software components


but also hardware components.

 This co-design framework permit to design,


develop a high performance, flexible, reuse,
maintainable DRM systems.
Features of F4MS
 A modeling of several levels of abstraction

 A separation between the communication model


and the treatment model describing the system

 Heterogeneity: possibility to use multiple


programming languages and hardware
architectures

 Distributed Validation.
Architecture of F4MS
Shortcomings
 There are many methods to bypass DRM
control on audio and video content.
◦ Burn and then rip into DRM-free files.
◦ Many software programs.

 Watermarks can be removed.

 Analog hole: use software to record the


signals being sent through the audio or video
cards.
The Future of DRM
 DRM is emerging as a formidable new
challenge, and it is essential for DRM
systems to provide interoperable services.

 Solutions to DRM challenges will enable


untold amounts of new content to be made
available in safe, open, and trusted
environments.
conclusion
 It’s an accepted fact that rarity increases the
worth of almost anything. If something is
easily copied it is often regarded as being of
low value. Hence we require high
performance DRM systems to protect the
original work with less cost time to deal with
rapid growing DRM market.
References
 “DRMS Co-design by F4MS” by Aissam BERRAHOU,
Mourad RAFI and Mohsine ELEULDJ, IJCSI
International Journal of Computer Science Issues,
Vol. 7, Issue 2, No 2, March 2010
 [Link]
 [Link]
[Link]
 [Link]
THANK YOU

You might also like