SlideShare une entreprise Scribd logo
1  sur  26
Dr. Tarek Gaber 
Faculty of Computers & Informatics 
Suez Canal University , Ismailia, Egypt 
and 
SRGE (www.scienceegypt.net) 
Email: tmgaber@gmail.com 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
Before the digital era, 
one's ability to do various 
things with content were 
limited. 
The Internet (digital age) 
makes it possible to 
nearly do anything with 
digital content. 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
Digital contents, e.g. Music, 
Movies, documents, are: 
very easy and cheap to copy 
Essentially no “resistance” from 
duplication 
This led to: 
Loss of billion dollars a year for world 
trade. 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
 Cryptographic 
Techniques 
could help but 
not enough 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014 
4
Can content be protected even 
after its decryption? 
Copying by persistent pirate would 
always be succeed. 
Current technology can potentially 
minimize the scale of copying: 
“keeping honest people honest” 
Digital Rights Management (DRM) 
technologies can be help in this issue. 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
 It is a set of technologies (encryption, 
watermarking, hash function, signature, 
etc.) enabling content owners to identify 
and control: 
 the access to their content and 
 the conditions under which this access is given. 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
 DRM includes: 
 Persistent Protection: License to be always checked before 
using a content 
 Access tracking: Capability of tracking access to and 
operations on content 
 Rights licensing: Capability of defining specific rights to 
content and making them available by contract 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
Government Agencies 
• Interested in controlled viewing and sharing of highly secure and 
confidential documents, audio and video data. 
Private Corporations 
• Want to limit the sharing of their proprietary information 
• Track accesses and any modifications made to it. 
• E.g. news agencies like Reuters 
Owners of commercial content 
• Content owners, artists, and publishers want to gain revenue 
through sale and promotions 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
DRM can help to ensure companies that: 
• Rights are tracked at consumption 
• Access is controlled during production processes 
• Protection for the content extends throughout 
product lifecycles 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
 DRM can be integrated with content 
management (collection, managing, and 
publishing of information in any form or 
medium) to ensure: 
 Proper business practices 
 Implementation of new business models 
 Compliance with regulatory requirements in 
industries such as financial services, healthcare, 
and government 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
 The process of drafting a law is circulated among 
committee members (e.g. judges and lawyers). 
 Using DRM technology, this becomes a closed 
circulation. 
 Also, the drafting law is in a tamper-proof format, with 
 print-only user-rights, 
 limited to a pre-determined timeframe, after which the draft 
is withdrawn and replaced by the final law. 
 The judges and lawyers can 
 withdraw, alter, or grant permissions related to the content 
at any time. 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
 Systems should be able to update rights and usage as 
needed to accommodate new distribution models, 
 E.g. allowing content to be accessed by to 2, 3, or 5 devices 
 Otherwise cost a lot of money and be a disincentive to 
customers. 
 DRM, in such case, can facilitate 
 collaboration, by creating the ‘trusted environment’ 
 by persistently protecting critical Intellectual Property (IP). 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
Piracy, whether of software, music, images, or text, 
costs billions of dollars each year. 
It takes time and resources to detect and deter 
theft. 
This could lead to counterproductive to developing 
new business models for digital content. 
DRM could also help to provide protection 
throughout the distribution and consuming of 
content. 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
Licensing 
 The process of packaging and delivering protected 
bits with un-forgeable terms of usage (“digital 
license”) useable only by authenticated 
user/environment 
Enforcement 
 The process of insuring that the use of the digital 
work adheres to enumerated use, privacy and 
operating restrictions stated in a digital license 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
Content is encrypted 
 So, unusable without authorization 
Content license 
 Specifies authentication information, DRM client and OS. 
 Specifies usage/access control rules 
 Contains the “sealed” key for the content. 
Content License 938473 
Machine 02345 Running 
Program 1 (with hash 0x7af33) 
Can view Document 3332 on 2014-20-01 
Sealed Key: 0x445635 
Signed by ACCD Company 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
At initialization, Trusted Program says: 
1. Isolate me from other rendering programs 
2. Authenticate me 
After Initialization completes successfully, Bob’s PC 
1. Makes Private key available for use 
When consuming content, Trusted Program: 
1. Retrieves license and encrypted content file 
2. Authenticates license by checking digital signature 
3. Checks rule compliance (e.g. out-of-date) 
4. Uses private key to unseal the content key 
5. Decrypts and uses content within Trusted Program 
Bob’s PC 
Trusted Program 
Authenticating Public Key 
(“Root of Trust”) 
0x7af33 PK: 8374505 
Bob’s PC 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
License Server 
2) Response 
Here’s your license 
Content License 938473 
Machine 02345 Running 
Program 1 (with hash 0x7af33) 
Can view Document 3332 
on 2014-20-01 
Sealed Key: 0x445635 
Signed ACCD Company 
1) Request 
I want document 2346. 
Here’s my Machine License 
to show you can trust my 
machine 
Machine License 83874 
Machine 02345 Running 
Program 1 (with hash 0x7af33) 
Has access to a private key 
Whose public key is 0x2231 
Signed Microsoft 
1 2 
Bob’s PC 
Customer benefits 
 Licenses can be used offline 
 Simple management of authorization (no central authority) 
 Very simple and flexible distribution (a server can distribute to “any” client) 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
Each “rights expression” may specify a 
combination of rules such as: 
 what rights are available, 
 for whom, 
 for how many times, 
 within what time period, 
 under what access conditions, 
 for what fees, 
 within which territory, and 
 with what obligations, 
 Etc. 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
• Mass Market Content 
• Books 
• Audio 
• Video 
• Software 
• Much more flexible use and better content 
management 
– But there are “Fair Use” and privacy concerns which 
can be mitigated … maybe 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
 Premium releases 
 Price discrimination 
 I hear it. I want it. I get it. 
 Lower manufacturing costs 
 More variety? 
 Most popular use of DRM 
 I don’t get it 
 Library/archive 
 Roaming 
 “Active” content 
Pay per view 
movies 
Web distributed 
songs 
Ring tones 
E-Books 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
 Windows Media Player 
 Apple DRM 
 Macrovision 
 LexMark 
 Xbox 
 Sony Playstation 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
 Break Once Break Everywhere 
 Degree of isolation 
 Transducer Problem 
 I/O 
 Privacy and Interoperability 
 Flexibility (transfer, etc) 
 Multiple devices 
 Multiple users 
 Migration 
 User Control/Backup 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
• “Fair Use” 
• Monopoly “Lock-in” 
• Erosion of copyright in favor of “contracts” 
• Archive 
• “Information wants to be free” 
• Consumer expectations 
• severe licensing policies 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
 It is essential for DRM systems to provide 
interoperable services. 
 DRM could enable a big amounts of new content to 
be made available in safe, open, and trusted 
environments. 
 DRM can be expected to be heavily used in the 
future to support 
 digital library collections, 
 code and software development, 
 distance education, and 
 networked collaboration, among other applications. 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
Thanks 
2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014

Contenu connexe

Tendances

North Lincolnshire and safer neighbourhoods
North Lincolnshire and safer neighbourhoodsNorth Lincolnshire and safer neighbourhoods
North Lincolnshire and safer neighbourhoodslocalinsight
 
Security 2 Q 07[1]
Security 2 Q 07[1]Security 2 Q 07[1]
Security 2 Q 07[1]Sharpe Smith
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing BotBellaj Badr
 
McCord Security Plus Technology Solutions Capacity Statement 2010
McCord Security Plus Technology Solutions Capacity Statement 2010McCord Security Plus Technology Solutions Capacity Statement 2010
McCord Security Plus Technology Solutions Capacity Statement 2010emmettmccord
 
Ipr and enforcement mechanism
Ipr and enforcement mechanismIpr and enforcement mechanism
Ipr and enforcement mechanismGanesh Chindanuru
 
SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7Chin Wan Lim
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshiplarkinsa
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issuesatuljaybhaye
 
Regulating Data: The Implications of Informatics on International Law
Regulating Data: The Implications of Informatics on International LawRegulating Data: The Implications of Informatics on International Law
Regulating Data: The Implications of Informatics on International LawJon Garon
 
Cyber security
Cyber securityCyber security
Cyber securityjvsihag
 
Qo E E2 E4 Net Neutrality Leo Van Audenhove
Qo E E2 E4   Net Neutrality   Leo Van AudenhoveQo E E2 E4   Net Neutrality   Leo Van Audenhove
Qo E E2 E4 Net Neutrality Leo Van Audenhoveimec.archive
 
Dmc aexemptions2010
Dmc aexemptions2010Dmc aexemptions2010
Dmc aexemptions2010dixieyeager
 
Mobile and SIM data - quantifying the risk - 2011
Mobile and SIM data - quantifying the risk - 2011Mobile and SIM data - quantifying the risk - 2011
Mobile and SIM data - quantifying the risk - 2011CPPGroup Plc
 
DMCAexemptions2010edit2014
DMCAexemptions2010edit2014DMCAexemptions2010edit2014
DMCAexemptions2010edit2014dixieyeager
 
Dubai 2
Dubai 2Dubai 2
Dubai 2mmavis
 
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...Lillie Coney
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human rightAgustina
 
cyber security legal perspective
cyber security legal perspectivecyber security legal perspective
cyber security legal perspectiveShoeb Ahmed
 

Tendances (20)

North Lincolnshire and safer neighbourhoods
North Lincolnshire and safer neighbourhoodsNorth Lincolnshire and safer neighbourhoods
North Lincolnshire and safer neighbourhoods
 
Security 2 Q 07[1]
Security 2 Q 07[1]Security 2 Q 07[1]
Security 2 Q 07[1]
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing Bot
 
IBM
IBMIBM
IBM
 
McCord Security Plus Technology Solutions Capacity Statement 2010
McCord Security Plus Technology Solutions Capacity Statement 2010McCord Security Plus Technology Solutions Capacity Statement 2010
McCord Security Plus Technology Solutions Capacity Statement 2010
 
Ipr and enforcement mechanism
Ipr and enforcement mechanismIpr and enforcement mechanism
Ipr and enforcement mechanism
 
SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
 
Regulating Data: The Implications of Informatics on International Law
Regulating Data: The Implications of Informatics on International LawRegulating Data: The Implications of Informatics on International Law
Regulating Data: The Implications of Informatics on International Law
 
Cyber security
Cyber securityCyber security
Cyber security
 
Qo E E2 E4 Net Neutrality Leo Van Audenhove
Qo E E2 E4   Net Neutrality   Leo Van AudenhoveQo E E2 E4   Net Neutrality   Leo Van Audenhove
Qo E E2 E4 Net Neutrality Leo Van Audenhove
 
Dmc aexemptions2010
Dmc aexemptions2010Dmc aexemptions2010
Dmc aexemptions2010
 
Mobile and SIM data - quantifying the risk - 2011
Mobile and SIM data - quantifying the risk - 2011Mobile and SIM data - quantifying the risk - 2011
Mobile and SIM data - quantifying the risk - 2011
 
DMCAexemptions2010edit2014
DMCAexemptions2010edit2014DMCAexemptions2010edit2014
DMCAexemptions2010edit2014
 
Dubai 2
Dubai 2Dubai 2
Dubai 2
 
Deep web
Deep webDeep web
Deep web
 
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human right
 
cyber security legal perspective
cyber security legal perspectivecyber security legal perspective
cyber security legal perspective
 

En vedette

Drm Evolution 2005 10 19
Drm Evolution 2005 10 19Drm Evolution 2005 10 19
Drm Evolution 2005 10 19Amit Maitra
 
Developing a digital copyright strategy
Developing a digital copyright strategyDeveloping a digital copyright strategy
Developing a digital copyright strategyHeather Ford
 
DRM Interoperability
DRM InteroperabilityDRM Interoperability
DRM InteroperabilityHiram Juarbe
 
Weber DRM What Should The Model Be MIT 11 26 07
Weber DRM What Should The Model Be MIT 11 26 07Weber DRM What Should The Model Be MIT 11 26 07
Weber DRM What Should The Model Be MIT 11 26 07bobweber
 
8 Critical Success Factors For Lead Generation
8 Critical Success Factors For Lead Generation8 Critical Success Factors For Lead Generation
8 Critical Success Factors For Lead GenerationNicole Wafer
 
To DRM or not to DRM?
To DRM or not to DRM?To DRM or not to DRM?
To DRM or not to DRM?Carlos Serrao
 
Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)pabatan
 
IP CCTV Why new firms dominate the new technology
IP CCTV Why new firms dominate the new technologyIP CCTV Why new firms dominate the new technology
IP CCTV Why new firms dominate the new technologyChris Sandström
 
Start-up Lingo For Dummies
Start-up Lingo For DummiesStart-up Lingo For Dummies
Start-up Lingo For DummiesNasscom Startups
 
Digital Content Frustration
Digital Content FrustrationDigital Content Frustration
Digital Content FrustrationSarah Houghton
 
Digital Rights Management for Animation & Gaming
Digital Rights Management for Animation & GamingDigital Rights Management for Animation & Gaming
Digital Rights Management for Animation & GamingRamesh Kumar
 
An OWL Copyright Ontology for Semantic Digital Rights Management
An OWL Copyright Ontology for Semantic Digital Rights ManagementAn OWL Copyright Ontology for Semantic Digital Rights Management
An OWL Copyright Ontology for Semantic Digital Rights ManagementRoberto García
 
Start up India
Start up IndiaStart up India
Start up IndiaJatin Goel
 
Digital rights management (drm) and you
Digital rights management (drm) and youDigital rights management (drm) and you
Digital rights management (drm) and youSaneMaly
 
Every Brief is A Start Up | Ioana Filip Keynote @ Eurobest
Every Brief is A Start Up | Ioana Filip Keynote @ EurobestEvery Brief is A Start Up | Ioana Filip Keynote @ Eurobest
Every Brief is A Start Up | Ioana Filip Keynote @ EurobestIoana Filip
 
Start up innovation culture
Start up innovation cultureStart up innovation culture
Start up innovation cultureJag Randhawa
 
Why the lean start-up changes everything
Why the lean start-up changes everythingWhy the lean start-up changes everything
Why the lean start-up changes everythingWei Li
 
De-mystifying DRM
De-mystifying DRMDe-mystifying DRM
De-mystifying DRMcastLabs
 

En vedette (20)

Drm Evolution 2005 10 19
Drm Evolution 2005 10 19Drm Evolution 2005 10 19
Drm Evolution 2005 10 19
 
Developing a digital copyright strategy
Developing a digital copyright strategyDeveloping a digital copyright strategy
Developing a digital copyright strategy
 
DRM Interoperability
DRM InteroperabilityDRM Interoperability
DRM Interoperability
 
Weber DRM What Should The Model Be MIT 11 26 07
Weber DRM What Should The Model Be MIT 11 26 07Weber DRM What Should The Model Be MIT 11 26 07
Weber DRM What Should The Model Be MIT 11 26 07
 
8 Critical Success Factors For Lead Generation
8 Critical Success Factors For Lead Generation8 Critical Success Factors For Lead Generation
8 Critical Success Factors For Lead Generation
 
To DRM or not to DRM?
To DRM or not to DRM?To DRM or not to DRM?
To DRM or not to DRM?
 
Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)
 
IP CCTV Why new firms dominate the new technology
IP CCTV Why new firms dominate the new technologyIP CCTV Why new firms dominate the new technology
IP CCTV Why new firms dominate the new technology
 
Start-up Lingo For Dummies
Start-up Lingo For DummiesStart-up Lingo For Dummies
Start-up Lingo For Dummies
 
Scenario Mapping
Scenario MappingScenario Mapping
Scenario Mapping
 
Digital Content Frustration
Digital Content FrustrationDigital Content Frustration
Digital Content Frustration
 
Start-up valuation: a quick and dirty approach
Start-up valuation: a quick and dirty approachStart-up valuation: a quick and dirty approach
Start-up valuation: a quick and dirty approach
 
Digital Rights Management for Animation & Gaming
Digital Rights Management for Animation & GamingDigital Rights Management for Animation & Gaming
Digital Rights Management for Animation & Gaming
 
An OWL Copyright Ontology for Semantic Digital Rights Management
An OWL Copyright Ontology for Semantic Digital Rights ManagementAn OWL Copyright Ontology for Semantic Digital Rights Management
An OWL Copyright Ontology for Semantic Digital Rights Management
 
Start up India
Start up IndiaStart up India
Start up India
 
Digital rights management (drm) and you
Digital rights management (drm) and youDigital rights management (drm) and you
Digital rights management (drm) and you
 
Every Brief is A Start Up | Ioana Filip Keynote @ Eurobest
Every Brief is A Start Up | Ioana Filip Keynote @ EurobestEvery Brief is A Start Up | Ioana Filip Keynote @ Eurobest
Every Brief is A Start Up | Ioana Filip Keynote @ Eurobest
 
Start up innovation culture
Start up innovation cultureStart up innovation culture
Start up innovation culture
 
Why the lean start-up changes everything
Why the lean start-up changes everythingWhy the lean start-up changes everything
Why the lean start-up changes everything
 
De-mystifying DRM
De-mystifying DRMDe-mystifying DRM
De-mystifying DRM
 

Similaire à Drm digital rights managment-june2014-tarek gaber

Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013
Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013
Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013Franck Franchin
 
A Digital Rights Management System Based on Cloud
A Digital Rights Management System Based on CloudA Digital Rights Management System Based on Cloud
A Digital Rights Management System Based on CloudTELKOMNIKA JOURNAL
 
Nota Padat ICT SPM - Form 4
Nota Padat ICT SPM - Form 4Nota Padat ICT SPM - Form 4
Nota Padat ICT SPM - Form 4D.J Md Thani
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation Anjana Shivangi
 
What is DRM, Types of DRM
What is DRM, Types of DRMWhat is DRM, Types of DRM
What is DRM, Types of DRMJarom Joseph
 
Jawapan bab 1
Jawapan bab 1Jawapan bab 1
Jawapan bab 1ikmalsham
 
La1 powerpoint-1
La1 powerpoint-1La1 powerpoint-1
La1 powerpoint-1suefee
 
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...Paolo Nesi
 
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderUsing a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderRemmy Nweke, mNGE, mNUJ, mGOCOP
 
Isoc2011 new release
Isoc2011 new releaseIsoc2011 new release
Isoc2011 new releaseElena Zvarici
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet GovernanceKenny Huang Ph.D.
 
20100602 porticor at igt short
20100602 porticor at igt   short20100602 porticor at igt   short
20100602 porticor at igt shortgiladpn
 
FAD® | Autograph signature on electronic media
FAD® | Autograph signature on electronic mediaFAD® | Autograph signature on electronic media
FAD® | Autograph signature on electronic mediaFirma Autógrafa Digital
 
What is Digital Rights Management System and How does it work : Ameva Tech
What is Digital Rights Management System and How does it work : Ameva TechWhat is Digital Rights Management System and How does it work : Ameva Tech
What is Digital Rights Management System and How does it work : Ameva TechAmeva Tech
 

Similaire à Drm digital rights managment-june2014-tarek gaber (20)

Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013
Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013
Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013
 
Lecture7
Lecture7Lecture7
Lecture7
 
Digital Rights Management
Digital Rights Management Digital Rights Management
Digital Rights Management
 
A Digital Rights Management System Based on Cloud
A Digital Rights Management System Based on CloudA Digital Rights Management System Based on Cloud
A Digital Rights Management System Based on Cloud
 
Nota Padat ICT SPM - Form 4
Nota Padat ICT SPM - Form 4Nota Padat ICT SPM - Form 4
Nota Padat ICT SPM - Form 4
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
 
What is DRM, Types of DRM
What is DRM, Types of DRMWhat is DRM, Types of DRM
What is DRM, Types of DRM
 
Jawapan bab 1
Jawapan bab 1Jawapan bab 1
Jawapan bab 1
 
La1 powerpoint-1
La1 powerpoint-1La1 powerpoint-1
La1 powerpoint-1
 
Digital Libraries
Digital LibrariesDigital Libraries
Digital Libraries
 
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
 
A Study on the Security Warning Algorithmfor Copyright Protectionin Network E...
A Study on the Security Warning Algorithmfor Copyright Protectionin Network E...A Study on the Security Warning Algorithmfor Copyright Protectionin Network E...
A Study on the Security Warning Algorithmfor Copyright Protectionin Network E...
 
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderUsing a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
 
Isoc2011 new release
Isoc2011 new releaseIsoc2011 new release
Isoc2011 new release
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
Moral And Ethics
Moral And EthicsMoral And Ethics
Moral And Ethics
 
20100602 porticor at igt short
20100602 porticor at igt   short20100602 porticor at igt   short
20100602 porticor at igt short
 
FAD® | Autograph signature on electronic media
FAD® | Autograph signature on electronic mediaFAD® | Autograph signature on electronic media
FAD® | Autograph signature on electronic media
 
What is Digital Rights Management System and How does it work : Ameva Tech
What is Digital Rights Management System and How does it work : Ameva TechWhat is Digital Rights Management System and How does it work : Ameva Tech
What is Digital Rights Management System and How does it work : Ameva Tech
 

Plus de Tarek Gaber

Writing a Successful Paper (Academic Writing Engineering)
Writing a Successful Paper (Academic Writing Engineering)Writing a Successful Paper (Academic Writing Engineering)
Writing a Successful Paper (Academic Writing Engineering)Tarek Gaber
 
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...Tarek Gaber
 
Thermal Imaging: Opportunities and Challenges for Breast Cancer Detection
Thermal Imaging: Opportunities and Challenges for Breast Cancer DetectionThermal Imaging: Opportunities and Challenges for Breast Cancer Detection
Thermal Imaging: Opportunities and Challenges for Breast Cancer DetectionTarek Gaber
 
Using Google Scholar to get similar paper to your class/gradation project
Using Google Scholar to get similar paper to your class/gradation projectUsing Google Scholar to get similar paper to your class/gradation project
Using Google Scholar to get similar paper to your class/gradation projectTarek Gaber
 
Brief Guidelines for Writing Graduation Project Thesis
Brief Guidelines for Writing Graduation Project ThesisBrief Guidelines for Writing Graduation Project Thesis
Brief Guidelines for Writing Graduation Project ThesisTarek Gaber
 
Simple Overview of PKI and Digital signature by Tarek_Gaber
Simple Overview of PKI and Digital signature by Tarek_GaberSimple Overview of PKI and Digital signature by Tarek_Gaber
Simple Overview of PKI and Digital signature by Tarek_GaberTarek Gaber
 
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_GaberSimple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_GaberTarek Gaber
 
Integer Wavelet Transform for Thermal Image Authentication
Integer Wavelet Transform for Thermal Image AuthenticationInteger Wavelet Transform for Thermal Image Authentication
Integer Wavelet Transform for Thermal Image AuthenticationTarek Gaber
 
Segmentation of thermograms breast cancer tarek-to-slid share
Segmentation of thermograms breast cancer tarek-to-slid shareSegmentation of thermograms breast cancer tarek-to-slid share
Segmentation of thermograms breast cancer tarek-to-slid shareTarek Gaber
 
Touch paper presentation-tarek
Touch paper presentation-tarekTouch paper presentation-tarek
Touch paper presentation-tarekTarek Gaber
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014Tarek Gaber
 
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...Tarek Gaber
 
Fair and abuse free contract signing protocol supporting fair license reselli...
Fair and abuse free contract signing protocol supporting fair license reselli...Fair and abuse free contract signing protocol supporting fair license reselli...
Fair and abuse free contract signing protocol supporting fair license reselli...Tarek Gaber
 
A novel approach to allow multiple resales of DRM protected contents - icces2...
A novel approach to allow multiple resales of DRM protected contents - icces2...A novel approach to allow multiple resales of DRM protected contents - icces2...
A novel approach to allow multiple resales of DRM protected contents - icces2...Tarek Gaber
 
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014Tarek Gaber
 

Plus de Tarek Gaber (15)

Writing a Successful Paper (Academic Writing Engineering)
Writing a Successful Paper (Academic Writing Engineering)Writing a Successful Paper (Academic Writing Engineering)
Writing a Successful Paper (Academic Writing Engineering)
 
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...
 
Thermal Imaging: Opportunities and Challenges for Breast Cancer Detection
Thermal Imaging: Opportunities and Challenges for Breast Cancer DetectionThermal Imaging: Opportunities and Challenges for Breast Cancer Detection
Thermal Imaging: Opportunities and Challenges for Breast Cancer Detection
 
Using Google Scholar to get similar paper to your class/gradation project
Using Google Scholar to get similar paper to your class/gradation projectUsing Google Scholar to get similar paper to your class/gradation project
Using Google Scholar to get similar paper to your class/gradation project
 
Brief Guidelines for Writing Graduation Project Thesis
Brief Guidelines for Writing Graduation Project ThesisBrief Guidelines for Writing Graduation Project Thesis
Brief Guidelines for Writing Graduation Project Thesis
 
Simple Overview of PKI and Digital signature by Tarek_Gaber
Simple Overview of PKI and Digital signature by Tarek_GaberSimple Overview of PKI and Digital signature by Tarek_Gaber
Simple Overview of PKI and Digital signature by Tarek_Gaber
 
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_GaberSimple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
 
Integer Wavelet Transform for Thermal Image Authentication
Integer Wavelet Transform for Thermal Image AuthenticationInteger Wavelet Transform for Thermal Image Authentication
Integer Wavelet Transform for Thermal Image Authentication
 
Segmentation of thermograms breast cancer tarek-to-slid share
Segmentation of thermograms breast cancer tarek-to-slid shareSegmentation of thermograms breast cancer tarek-to-slid share
Segmentation of thermograms breast cancer tarek-to-slid share
 
Touch paper presentation-tarek
Touch paper presentation-tarekTouch paper presentation-tarek
Touch paper presentation-tarek
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014
 
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...
 
Fair and abuse free contract signing protocol supporting fair license reselli...
Fair and abuse free contract signing protocol supporting fair license reselli...Fair and abuse free contract signing protocol supporting fair license reselli...
Fair and abuse free contract signing protocol supporting fair license reselli...
 
A novel approach to allow multiple resales of DRM protected contents - icces2...
A novel approach to allow multiple resales of DRM protected contents - icces2...A novel approach to allow multiple resales of DRM protected contents - icces2...
A novel approach to allow multiple resales of DRM protected contents - icces2...
 
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
 

Dernier

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 

Dernier (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Drm digital rights managment-june2014-tarek gaber

  • 1. Dr. Tarek Gaber Faculty of Computers & Informatics Suez Canal University , Ismailia, Egypt and SRGE (www.scienceegypt.net) Email: tmgaber@gmail.com 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 2. Before the digital era, one's ability to do various things with content were limited. The Internet (digital age) makes it possible to nearly do anything with digital content. 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 3. Digital contents, e.g. Music, Movies, documents, are: very easy and cheap to copy Essentially no “resistance” from duplication This led to: Loss of billion dollars a year for world trade. 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 4.  Cryptographic Techniques could help but not enough 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014 4
  • 5. Can content be protected even after its decryption? Copying by persistent pirate would always be succeed. Current technology can potentially minimize the scale of copying: “keeping honest people honest” Digital Rights Management (DRM) technologies can be help in this issue. 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 6.  It is a set of technologies (encryption, watermarking, hash function, signature, etc.) enabling content owners to identify and control:  the access to their content and  the conditions under which this access is given. 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 7.  DRM includes:  Persistent Protection: License to be always checked before using a content  Access tracking: Capability of tracking access to and operations on content  Rights licensing: Capability of defining specific rights to content and making them available by contract 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 8. Government Agencies • Interested in controlled viewing and sharing of highly secure and confidential documents, audio and video data. Private Corporations • Want to limit the sharing of their proprietary information • Track accesses and any modifications made to it. • E.g. news agencies like Reuters Owners of commercial content • Content owners, artists, and publishers want to gain revenue through sale and promotions 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 9. 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 10. DRM can help to ensure companies that: • Rights are tracked at consumption • Access is controlled during production processes • Protection for the content extends throughout product lifecycles 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 11.  DRM can be integrated with content management (collection, managing, and publishing of information in any form or medium) to ensure:  Proper business practices  Implementation of new business models  Compliance with regulatory requirements in industries such as financial services, healthcare, and government 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 12.  The process of drafting a law is circulated among committee members (e.g. judges and lawyers).  Using DRM technology, this becomes a closed circulation.  Also, the drafting law is in a tamper-proof format, with  print-only user-rights,  limited to a pre-determined timeframe, after which the draft is withdrawn and replaced by the final law.  The judges and lawyers can  withdraw, alter, or grant permissions related to the content at any time. 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 13.  Systems should be able to update rights and usage as needed to accommodate new distribution models,  E.g. allowing content to be accessed by to 2, 3, or 5 devices  Otherwise cost a lot of money and be a disincentive to customers.  DRM, in such case, can facilitate  collaboration, by creating the ‘trusted environment’  by persistently protecting critical Intellectual Property (IP). 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 14. Piracy, whether of software, music, images, or text, costs billions of dollars each year. It takes time and resources to detect and deter theft. This could lead to counterproductive to developing new business models for digital content. DRM could also help to provide protection throughout the distribution and consuming of content. 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 15. Licensing  The process of packaging and delivering protected bits with un-forgeable terms of usage (“digital license”) useable only by authenticated user/environment Enforcement  The process of insuring that the use of the digital work adheres to enumerated use, privacy and operating restrictions stated in a digital license 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 16. Content is encrypted  So, unusable without authorization Content license  Specifies authentication information, DRM client and OS.  Specifies usage/access control rules  Contains the “sealed” key for the content. Content License 938473 Machine 02345 Running Program 1 (with hash 0x7af33) Can view Document 3332 on 2014-20-01 Sealed Key: 0x445635 Signed by ACCD Company 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 17. At initialization, Trusted Program says: 1. Isolate me from other rendering programs 2. Authenticate me After Initialization completes successfully, Bob’s PC 1. Makes Private key available for use When consuming content, Trusted Program: 1. Retrieves license and encrypted content file 2. Authenticates license by checking digital signature 3. Checks rule compliance (e.g. out-of-date) 4. Uses private key to unseal the content key 5. Decrypts and uses content within Trusted Program Bob’s PC Trusted Program Authenticating Public Key (“Root of Trust”) 0x7af33 PK: 8374505 Bob’s PC 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 18. License Server 2) Response Here’s your license Content License 938473 Machine 02345 Running Program 1 (with hash 0x7af33) Can view Document 3332 on 2014-20-01 Sealed Key: 0x445635 Signed ACCD Company 1) Request I want document 2346. Here’s my Machine License to show you can trust my machine Machine License 83874 Machine 02345 Running Program 1 (with hash 0x7af33) Has access to a private key Whose public key is 0x2231 Signed Microsoft 1 2 Bob’s PC Customer benefits  Licenses can be used offline  Simple management of authorization (no central authority)  Very simple and flexible distribution (a server can distribute to “any” client) 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 19. Each “rights expression” may specify a combination of rules such as:  what rights are available,  for whom,  for how many times,  within what time period,  under what access conditions,  for what fees,  within which territory, and  with what obligations,  Etc. 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 20. • Mass Market Content • Books • Audio • Video • Software • Much more flexible use and better content management – But there are “Fair Use” and privacy concerns which can be mitigated … maybe 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 21.  Premium releases  Price discrimination  I hear it. I want it. I get it.  Lower manufacturing costs  More variety?  Most popular use of DRM  I don’t get it  Library/archive  Roaming  “Active” content Pay per view movies Web distributed songs Ring tones E-Books 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 22.  Windows Media Player  Apple DRM  Macrovision  LexMark  Xbox  Sony Playstation 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 23.  Break Once Break Everywhere  Degree of isolation  Transducer Problem  I/O  Privacy and Interoperability  Flexibility (transfer, etc)  Multiple devices  Multiple users  Migration  User Control/Backup 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 24. • “Fair Use” • Monopoly “Lock-in” • Erosion of copyright in favor of “contracts” • Archive • “Information wants to be free” • Consumer expectations • severe licensing policies 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 25.  It is essential for DRM systems to provide interoperable services.  DRM could enable a big amounts of new content to be made available in safe, open, and trusted environments.  DRM can be expected to be heavily used in the future to support  digital library collections,  code and software development,  distance education, and  networked collaboration, among other applications. 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014
  • 26. Thanks 2e CONFÉRENCE -« Cybercriminalité & confiance numérique », Port-Saïd, Egypt., 19 June 2014