SlideShare une entreprise Scribd logo
1  sur  17
Télécharger pour lire hors ligne
OMA DRM Overview




1   © NOKIA
Digital Rights Management

         •        Controlling the usage of digital objects in cyberspace


             1. Associate usage rules with digital content

             2. Enforce that the rules are followed




                                                                                          YYu utnnt
                                                                                           oo oo c
                                                                                           bb t
                                                                                            u
                                                                                             ucan t ooy
                                                                                                canp cpp.y
     •        What we really want to do is to enable the paid content model




                                                                                                    pay, .
                                                                                                    ll
                                                                                                       a y,
              •     Content owner gets paid when his content is consumed
              •     An alternative for the subsidized advertising model – banners suck
     •        Superdistribution is an important feature
              •     Excellent content propagates from peer to peer like a virus – and the content
                    owner gets paid for each copy


2   © NOKIA
Threats and counter-
              measures
              The challenge is not to express rights,
              but to enforce them.




3   © NOKIA
Threats
        Content
        • A Mickey Mouse screensaver                   ”You                  Replace the
                                                        ”Youca
                                                                 n
                                                        fooe canppay      rights with more
                                                         f r re e l lay
                                                              vv r.”          loose ones
       Replace                                                   er.”
    content with                                   Rights
     illegal one
                                                   • Enable preview (test drive)
                                                   <rights>
                                ” Yo u
                                  ”Y
                                oo loucaanpla
                                                      <agreement>
                                  nny cn p y
                                     lyoo ce lay
                                        nn .             <asset>
                                           ce””
                                             .               <uid>mid:mickey_14@disney.com</uid>
     Extract content                                     </asset>
                                                         <permission>
      from the DRM
         system
                                                             <play>                    Modify the
                                                                <count> 99 </count>
                                                                         1            existing rights
                                                             </play>
                                                         </permission>
                                                      </agreement>
                                                   </rights>


                            T
                                          Terminal                            Hack the terminal
                                          • Plays the content once and then discards it
                                                               forever    implementation


4    © NOKIA
Counter-measures
     • Protect the confidentiality of Content                                 Extract content
              • Content encryption                                          from the DRM
              • In practise hybrid encryption i.e. combination of symmetric    system
                and asymmetric encryption
     • Protect the integrity and authenticity of Rights                        Modify the
              • Digitally signed Rights                                       existing rights



     • Protect the integrity of the Content-Rights associationrights withthe
                                                                 Replace
                                                                          more
              • Include hash of the content inside the (signed) Rights          loose ones


                                                                                Replace the
     • Careful implementation inside the terminal                              content with
                                                                                 illegal one
              • Access control, integrity and confidentiality protection...
              • Only well behaving applications shall be able to
               access the bits                                                   Hack the
                                                                                 terminal
                                                                              implementation
5   © NOKIA
Example architecture

                                    Rights
                                     Rights          Certifies RIs     Rights
                                                                        Rights
                                    Issuer
                                     Issuer                          Issuer PKI
                                                                      Issuer PKI
                   Registers
                   Content

                                            Issues
       Content                              Rights
        Content                  ”You
                                  ”Y
        Server                   oo loucaanpla
                                  nny cn p y
         Server                      lyoo ce lay
                                        nn .
                                           ce””
                                             .




                  Distributes
                  Content
                                                      Certifies      Terminal
                                                                      Terminal
                                       T1             Terminals         PKI
                                                                         PKI
                          P2P
6   © NOKIA
                  Distribution
Implications
     • Key management infrastructure – actually maybe even two
              • Terminal PKI – content encryption, device authentication
              • Rights Issuer PKI – signed rights

     • Both Terminal and Rights Issuer have a private key to hide
              • Hiding secrets is difficult – especially in the DRM threat model

     • The counter-measures are not cheap
              • Computationally expensive, increased footprint, deployment issues
              • Overkill for low value content

     • The market needs something that can be deployed now !



7   © NOKIA
OMA DRM Rel 1 Simplifications
        1. Forget the key management infrastructures
           •   No Terminal or Rights Issuer PKIs
               • No private keys / trust roots in terminals
               • No private keys / trust roots at Rights Issuers
           •   Big trade-off between security and simplicity / ease of
               deployment
        2. No DRM-specific architectural entities
           • No DRM-servers
           • Rights Issuer = Content / rights packaging tool
           • Easy to deploy
        • However, an evolution path towards a “real DRM” should exist
        • Functional requirements:
           • Object level “forward-lock” semantics
           • Preview feature




8   © NOKIA
OMA DRM Rel 1
              ”A simple DRM for low value mobile content”




9   © NOKIA
How to deliver content and rights ?
     • OMA DRM Rel 1 defines three DRM methods


                                                              Separate delivery
     Forward-lock          Combined delivery
                                                              & Superdistribution
     DRM Message                DRM Message

           Content           Content        Rights             Content             Rights
                                                                                 ”You can play
                                        ”You can play                             only once.”
                                         only once.”



                                                                                      2. WAP Push
               e.g. OMA                e.g. OMA         1. e.g. OMA
               Download                Download          Download




         Terminal                Terminal                             Terminal
10   © NOKIA
OMA DRM Release 2




11   © NOKIA
OMA DRM Rel 2 Requirements

        • Main requirement for OMA DRM Rel 2:
               • Need to support more valuable content => more security required
               • Music and video


        • The two big assumptions that made life easy in OMA DRM Rel 1 go away
               • OMA needs to bite the bullet
        • A key management infrastructure is needed to provide more security
        • If we do have terminal keys we need to personalize the rights objects
          on-the-fly
               • In OMA DRM Rel 1 the same rights object can be sent to any terminal
               • In OMA DRM Rel 2 the service must encrypt parts of the rights object with a
                 terminal specific key
               • A real-time back-end solution is needed to do that




12   © NOKIA
OMA DRM Release 2

      Content
       Content    Rights
                   Rights
       Issuer
        Issuer    Issuer
                   Issuer
                                             Certifies             Key Management
                                             Rights Issuers

                                                                       Rights
                                                                        Rights
                 Rights             Rights                           Issuer PKI
      Content    Object             Object                            Issuer PKI



                                                                      Device
                                                                       Device
                                                                        PKI
                                                                         PKI

                                                       Certifies
                                                       devices
                          Content




13   © NOKIA
OMA DRM Release 2
                                         DOMAINS ADDED RECENTLY…
      Content
       Content    Rights
                   Rights
       Issuer
        Issuer    Issuer
                   Issuer
                                             Certifies             Key Management
                                             Rights Issuers

                                                                       Rights
                                                                        Rights
                 Rights             Rights                           Issuer PKI
      Content    Object             Object                            Issuer PKI



                                                                      Device
                                                                       Device
                                                                        PKI
                                                                         PKI

                                                       Certifies
                                                       devices
                          Content                                    Content Key

                                                                     Device 1 Key
                                                                     Device 2 Key

                                                                     Rights Issuer Key

14   © NOKIA                                                         Rights Issuer’s Signature
OMA DRM 2.0
     Next generation open DRM technology specification




                                                                    Mobile
                                                                    domain

                                                         Internet            Enterprise
                                                         (media)              domain
                                                         domain

                                                                     Home
                                                                    domain




 Fulfills security             Enables consumers to      Convergence of DRM
 requirements of               buy content once and      technology across
 future rich media e.g.        consume with his/her      Internet, media, mobile
 music services                registered devices        and home domains


15   © NOKIA
Learnings and summary

        • Most people conduct payment transactions practically every day
          and carry a mobile phone, too
               • It is a strong value proposition for consumers and merchants if some
                 part of these payments could be conducted with a mobile phone
        • Remote macro payments are increasing – existing credit card
          infrastructure offers a globally sustainable solution
        • While today’s technologies offer strong enablers, m-Commerce and
          mobile payments market is primarily business driven
        • Practical DRM is needed today
        • End-use experience is crucial: “easy to find, to use, to pay!”
        • Sustainable value chains are essential for the expansion of m-
          Commerce and mobile payments ecosystem
        • Co-creation of the customer experience is needed




16   © NOKIA
17   © NOKIA

Contenu connexe

En vedette

Project2 Layout 1
Project2 Layout 1Project2 Layout 1
Project2 Layout 1guestfc3487
 
Virtual Worlds Paper Ni09 Hansen Murray Erd
Virtual Worlds Paper Ni09 Hansen Murray ErdVirtual Worlds Paper Ni09 Hansen Murray Erd
Virtual Worlds Paper Ni09 Hansen Murray Erdm2hansen
 
4 Cr2 1330 Hansen
4 Cr2 1330 Hansen4 Cr2 1330 Hansen
4 Cr2 1330 Hansenm2hansen
 
азартные игры пользователей с брендом
азартные игры пользователей с брендомазартные игры пользователей с брендом
азартные игры пользователей с брендомЮрий Лукашевич
 
лид. эволюция одного сайта
лид. эволюция одного сайталид. эволюция одного сайта
лид. эволюция одного сайтаЮрий Лукашевич
 
2008 09 06 Eric Ries Haas Columbia Customer Development Engineering
2008 09 06 Eric Ries Haas Columbia Customer Development Engineering2008 09 06 Eric Ries Haas Columbia Customer Development Engineering
2008 09 06 Eric Ries Haas Columbia Customer Development Engineeringguest472f47
 
Telling Persona Stories
Telling Persona StoriesTelling Persona Stories
Telling Persona StoriesErin Liman
 
Marketing strategyslideshare
Marketing strategyslideshareMarketing strategyslideshare
Marketing strategyslideshareErin Liman
 
Prepare for the Future: Achieving Growth and Competitive Advantage
Prepare for the Future: Achieving Growth and Competitive AdvantagePrepare for the Future: Achieving Growth and Competitive Advantage
Prepare for the Future: Achieving Growth and Competitive AdvantageErin Liman
 

En vedette (11)

B2 b без мимими
B2 b без мимимиB2 b без мимими
B2 b без мимими
 
Project2 Layout 1
Project2 Layout 1Project2 Layout 1
Project2 Layout 1
 
Virtual Worlds Paper Ni09 Hansen Murray Erd
Virtual Worlds Paper Ni09 Hansen Murray ErdVirtual Worlds Paper Ni09 Hansen Murray Erd
Virtual Worlds Paper Ni09 Hansen Murray Erd
 
4 Cr2 1330 Hansen
4 Cr2 1330 Hansen4 Cr2 1330 Hansen
4 Cr2 1330 Hansen
 
Quotes by Sougat Chatterjee
Quotes by Sougat ChatterjeeQuotes by Sougat Chatterjee
Quotes by Sougat Chatterjee
 
азартные игры пользователей с брендом
азартные игры пользователей с брендомазартные игры пользователей с брендом
азартные игры пользователей с брендом
 
лид. эволюция одного сайта
лид. эволюция одного сайталид. эволюция одного сайта
лид. эволюция одного сайта
 
2008 09 06 Eric Ries Haas Columbia Customer Development Engineering
2008 09 06 Eric Ries Haas Columbia Customer Development Engineering2008 09 06 Eric Ries Haas Columbia Customer Development Engineering
2008 09 06 Eric Ries Haas Columbia Customer Development Engineering
 
Telling Persona Stories
Telling Persona StoriesTelling Persona Stories
Telling Persona Stories
 
Marketing strategyslideshare
Marketing strategyslideshareMarketing strategyslideshare
Marketing strategyslideshare
 
Prepare for the Future: Achieving Growth and Competitive Advantage
Prepare for the Future: Achieving Growth and Competitive AdvantagePrepare for the Future: Achieving Growth and Competitive Advantage
Prepare for the Future: Achieving Growth and Competitive Advantage
 

Oma Drm2 Pki

  • 2. Digital Rights Management • Controlling the usage of digital objects in cyberspace 1. Associate usage rules with digital content 2. Enforce that the rules are followed YYu utnnt oo oo c bb t u ucan t ooy canp cpp.y • What we really want to do is to enable the paid content model pay, . ll a y, • Content owner gets paid when his content is consumed • An alternative for the subsidized advertising model – banners suck • Superdistribution is an important feature • Excellent content propagates from peer to peer like a virus – and the content owner gets paid for each copy 2 © NOKIA
  • 3. Threats and counter- measures The challenge is not to express rights, but to enforce them. 3 © NOKIA
  • 4. Threats Content • A Mickey Mouse screensaver ”You Replace the ”Youca n fooe canppay rights with more f r re e l lay vv r.” loose ones Replace er.” content with Rights illegal one • Enable preview (test drive) <rights> ” Yo u ”Y oo loucaanpla <agreement> nny cn p y lyoo ce lay nn . <asset> ce”” . <uid>mid:mickey_14@disney.com</uid> Extract content </asset> <permission> from the DRM system <play> Modify the <count> 99 </count> 1 existing rights </play> </permission> </agreement> </rights> T Terminal Hack the terminal • Plays the content once and then discards it forever implementation 4 © NOKIA
  • 5. Counter-measures • Protect the confidentiality of Content Extract content • Content encryption from the DRM • In practise hybrid encryption i.e. combination of symmetric system and asymmetric encryption • Protect the integrity and authenticity of Rights Modify the • Digitally signed Rights existing rights • Protect the integrity of the Content-Rights associationrights withthe Replace more • Include hash of the content inside the (signed) Rights loose ones Replace the • Careful implementation inside the terminal content with illegal one • Access control, integrity and confidentiality protection... • Only well behaving applications shall be able to access the bits Hack the terminal implementation 5 © NOKIA
  • 6. Example architecture Rights Rights Certifies RIs Rights Rights Issuer Issuer Issuer PKI Issuer PKI Registers Content Issues Content Rights Content ”You ”Y Server oo loucaanpla nny cn p y Server lyoo ce lay nn . ce”” . Distributes Content Certifies Terminal Terminal T1 Terminals PKI PKI P2P 6 © NOKIA Distribution
  • 7. Implications • Key management infrastructure – actually maybe even two • Terminal PKI – content encryption, device authentication • Rights Issuer PKI – signed rights • Both Terminal and Rights Issuer have a private key to hide • Hiding secrets is difficult – especially in the DRM threat model • The counter-measures are not cheap • Computationally expensive, increased footprint, deployment issues • Overkill for low value content • The market needs something that can be deployed now ! 7 © NOKIA
  • 8. OMA DRM Rel 1 Simplifications 1. Forget the key management infrastructures • No Terminal or Rights Issuer PKIs • No private keys / trust roots in terminals • No private keys / trust roots at Rights Issuers • Big trade-off between security and simplicity / ease of deployment 2. No DRM-specific architectural entities • No DRM-servers • Rights Issuer = Content / rights packaging tool • Easy to deploy • However, an evolution path towards a “real DRM” should exist • Functional requirements: • Object level “forward-lock” semantics • Preview feature 8 © NOKIA
  • 9. OMA DRM Rel 1 ”A simple DRM for low value mobile content” 9 © NOKIA
  • 10. How to deliver content and rights ? • OMA DRM Rel 1 defines three DRM methods Separate delivery Forward-lock Combined delivery & Superdistribution DRM Message DRM Message Content Content Rights Content Rights ”You can play ”You can play only once.” only once.” 2. WAP Push e.g. OMA e.g. OMA 1. e.g. OMA Download Download Download Terminal Terminal Terminal 10 © NOKIA
  • 11. OMA DRM Release 2 11 © NOKIA
  • 12. OMA DRM Rel 2 Requirements • Main requirement for OMA DRM Rel 2: • Need to support more valuable content => more security required • Music and video • The two big assumptions that made life easy in OMA DRM Rel 1 go away • OMA needs to bite the bullet • A key management infrastructure is needed to provide more security • If we do have terminal keys we need to personalize the rights objects on-the-fly • In OMA DRM Rel 1 the same rights object can be sent to any terminal • In OMA DRM Rel 2 the service must encrypt parts of the rights object with a terminal specific key • A real-time back-end solution is needed to do that 12 © NOKIA
  • 13. OMA DRM Release 2 Content Content Rights Rights Issuer Issuer Issuer Issuer Certifies Key Management Rights Issuers Rights Rights Rights Rights Issuer PKI Content Object Object Issuer PKI Device Device PKI PKI Certifies devices Content 13 © NOKIA
  • 14. OMA DRM Release 2 DOMAINS ADDED RECENTLY… Content Content Rights Rights Issuer Issuer Issuer Issuer Certifies Key Management Rights Issuers Rights Rights Rights Rights Issuer PKI Content Object Object Issuer PKI Device Device PKI PKI Certifies devices Content Content Key Device 1 Key Device 2 Key Rights Issuer Key 14 © NOKIA Rights Issuer’s Signature
  • 15. OMA DRM 2.0 Next generation open DRM technology specification Mobile domain Internet Enterprise (media) domain domain Home domain Fulfills security Enables consumers to Convergence of DRM requirements of buy content once and technology across future rich media e.g. consume with his/her Internet, media, mobile music services registered devices and home domains 15 © NOKIA
  • 16. Learnings and summary • Most people conduct payment transactions practically every day and carry a mobile phone, too • It is a strong value proposition for consumers and merchants if some part of these payments could be conducted with a mobile phone • Remote macro payments are increasing – existing credit card infrastructure offers a globally sustainable solution • While today’s technologies offer strong enablers, m-Commerce and mobile payments market is primarily business driven • Practical DRM is needed today • End-use experience is crucial: “easy to find, to use, to pay!” • Sustainable value chains are essential for the expansion of m- Commerce and mobile payments ecosystem • Co-creation of the customer experience is needed 16 © NOKIA
  • 17. 17 © NOKIA