Digital Rights Management
(DRM)
By:
Rohit Thapliyal
23 september 2010
Digital Rights Management?
DRM refers to those technologies which have
been specifically developed for managing
digital rights
Set of technologies that enable content
owners to specify and control:
◦ the access they want to give consumers and
◦ the conditions under which it is given.
History of DRM
Early implementation of DRM was devised by
the Japanese engineer Ryoichi Mori in 1983
based on encryption.
first-generation: focused on security and
encryption.
second-generation: covers the description,
identification, trading, protection, monitoring
and tracking of all forms of rights usage.
Standard DRM architecture
Standard DRM architecture is composed by
three components:
◦ Creation,
◦ Distribution and
◦ Consumption of the digital contents.
DRM architecture
Standard DRM work
1. User requests a digital content.
2. The content server demand to user to fill
some information.
3. User sends the information.
4. The Content server requests license
generation to license server.
5. The license server generate license and
send it to the content server.
6. The content server gives to user
authorization to read the digital content.
Sequence diagram
DRM technologies
DRM and film:
◦ Content Scrambling System (CSS).
◦ Protected Media Path.
DRM and music:
◦ Apple's FairPlay DRM system.
E-books:
◦ Adobe Reader: restricted and unrestricted files.
◦ Microsoft Reader: sealed, inscribed and owner
exclusive e-books.
DRM technology: Watermarking
Digital watermarking is the process of
inserting a digital signal or pattern into
digital content.
The signal, known as a watermark.
can be used later to identify the owner of the
work and to trace illegal copies of the work.
Types:
◦ visible :easily perceived by a viewer (or listener).
◦ invisible: imperceptible under normal viewing.
Invisible and Visible watermarking
DRM technology: Fingerprinting
Fingerprints are an extension to
watermarking principle.
Making each copy of the content unique to
the person who receives it.
Fingerprinting technique:
◦ Secure Hash Algorithm (SHA): takes a message of
less than 264 bits in length and produces a 160-bit
message digest.
DRM technology :Framework for
mixed systems(F4MS)
F4MS not only includes software components
but also hardware components.
This co-design framework permit to design,
develop a high performance, flexible, reuse,
maintainable DRM systems.
Features of F4MS
A modeling of several levels of abstraction
A separation between the communication model
and the treatment model describing the system
Heterogeneity: possibility to use multiple
programming languages and hardware
architectures
Distributed Validation.
Architecture of F4MS
Shortcomings
There are many methods to bypass DRM
control on audio and video content.
◦ Burn and then rip into DRM-free files.
◦ Many software programs.
Watermarks can be removed.
Analog hole: use software to record the
signals being sent through the audio or video
cards.
The Future of DRM
DRM is emerging as a formidable new
challenge, and it is essential for DRM
systems to provide interoperable services.
Solutions to DRM challenges will enable
untold amounts of new content to be made
available in safe, open, and trusted
environments.
conclusion
It’s an accepted fact that rarity increases the
worth of almost anything. If something is
easily copied it is often regarded as being of
low value. Hence we require high
performance DRM systems to protect the
original work with less cost time to deal with
rapid growing DRM market.
References
“DRMS Co-design by F4MS” by Aissam BERRAHOU,
Mourad RAFI and Mohsine ELEULDJ, IJCSI
International Journal of Computer Science Issues,
Vol. 7, Issue 2, No 2, March 2010
[Link]
[Link]
[Link]
[Link]
THANK YOU