2. MAIN TOPIC
S
I
L
I
C
O
N
CONTENTS
IntroductionIntroduction
DefinationDefination
Survey And AspectSurvey And Aspect
Design And ImplementationDesign And Implementation
Requirements For DRMRequirements For DRM
DRM under AttackDRM under Attack
Emerging TrendsEmerging Trends
ConclusionConclusion
3. MAIN TOPIC
S
I
L
I
C
O
N
INTRODUCTION
The Internet has emerged as a vibrant informationThe Internet has emerged as a vibrant information
and digital entertainment .and digital entertainment .
AS a hyper distribution channel for its easy andAS a hyper distribution channel for its easy and
efficient dissemination of content, it also facilitatesefficient dissemination of content, it also facilitates
the synergy of digital technologies to provide athe synergy of digital technologies to provide a
richer user experience.richer user experience.
The ease of copying and sharing of digital contentThe ease of copying and sharing of digital content
such as music, without any deterioration in quality,such as music, without any deterioration in quality,
has resulted in rampant piracy.has resulted in rampant piracy.
To curb this piracy ,One of such measures is DigitalTo curb this piracy ,One of such measures is Digital
Rights Management (DRM).Rights Management (DRM).
4. MAIN TOPIC
S
I
L
I
C
O
N
DEFINITION
DRM is a cluster of techniques designed toDRM is a cluster of techniques designed to
restrict unwanted copying and distributionrestrict unwanted copying and distribution
of intellectual property such asof intellectual property such as
music,video,software.music,video,software...
DRM refers to controlling and managingDRM refers to controlling and managing
rights to digital intellectual property.rights to digital intellectual property.
DRM is the description, identification, andDRM is the description, identification, and
protection, monitoring and tracking of allprotection, monitoring and tracking of all
forms of rights .forms of rights .
Examples include Apple's iTunes/Fairplay,Examples include Apple's iTunes/Fairplay,
Windows Media Player, Real Networks.Windows Media Player, Real Networks.
5. MAIN TOPIC
S
I
L
I
C
O
N
SURVEY
Survey on the technological aspects of
Digital Rights Management
William Ku and Chi-Hung Chi
School of Computing, National University
of Singapore .
Singapore 117543, Republic of Singapore
6. MAIN TOPIC
S
I
L
I
C
O
N
ASPECT
Mainly it has 3aspects:Mainly it has 3aspects:
Legal AspectLegal Aspect:: No DRM technology is goingNo DRM technology is going
to be of much help if the law does not provideto be of much help if the law does not provide
provisions to enforce the rights of the contentprovisions to enforce the rights of the content
owners.owners.
Social AspectSocial Aspect:: DRM needs to address a host ofDRM needs to address a host of
social issues such as privacy And fair use.social issues such as privacy And fair use.
Economic AspectEconomic Aspect:: It rIt requires certainequires certain
economic questions to be answered such as whoeconomic questions to be answered such as who
would pay for the DRM structurewould pay for the DRM structure..
7. MAIN TOPIC
S
I
L
I
C
O
N
DESIGN AND IMPLIMENTATIONDESIGN AND IMPLIMENTATION
There are two critical architectures toThere are two critical architectures to
consider:consider:
Functional Architecture:Functional Architecture:
Information Architecture:Information Architecture:
8. MAIN TOPIC
S
I
L
I
C
O
N
Functional Architecture
It work under three AreaIt work under three Area
• Intellectual Property (IP) Asset Creation And CaptureIntellectual Property (IP) Asset Creation And Capture
It supports three modulesIt supports three modules
right validationright validation
Right creationRight creation
Work flowWork flow
• IP Asset ManagementIP Asset Management
It supports two modulesIt supports two modules
repository functionrepository function
trading functiontrading function
• IP Asset UsageIP Asset Usage
It supports two modulesIt supports two modules
permission managementpermission management
tracking managementtracking management
10. MAIN TOPIC
S
I
L
I
C
O
N
Information Architecture:
It Includes 3 Points
Modeling the entitiesModeling the entities
It involveIt involve user,content,rightsuser,content,rights..
Identifying and describing the entitiesIdentifying and describing the entities
All entities need to be Identified and Described.All entities need to be Identified and Described.
Expressing the rights statementsExpressing the rights statements
It consists of Permission, constraints,ObligationIt consists of Permission, constraints,Obligation
12. MAIN TOPIC
S
I
L
I
C
O
N
IFLA MODEL
It allows content to be identifiedIt allows content to be identified
WorkWork(Distinct Intellectual or artistic(Distinct Intellectual or artistic
creation)creation)
Expression(relization of a work)Expression(relization of a work)
Manifestion(digital embodiment of anManifestion(digital embodiment of an
expression of work.expression of work.
Item(Instantiation of Manifestion)Item(Instantiation of Manifestion)
14. MAIN TOPIC
S
I
L
I
C
O
N
RIGHT EXPRESSION MODEL
Permissions (i.e., usages) - what you arePermissions (i.e., usages) - what you are
allowed to doallowed to do
Constraints - restrictions on the permissionsConstraints - restrictions on the permissions
Obligations - what you have toObligations - what you have to
do/provide/acceptdo/provide/accept
Rights Holders - who is entitled to whatRights Holders - who is entitled to what
16. MAIN TOPIC
S
I
L
I
C
O
N
REQUIREMENTS FOR DRM
Hardware and software implementationsHardware and software implementations
MobilityMobility
SecuritySecurity
User PrivacyUser Privacy
17. MAIN TOPIC
S
I
L
I
C
O
N
DRM UNDER ATTACK
Weakness in Existing SystemsWeakness in Existing Systems
as three main categories:as three main categories:
direct attacks at the architecture of the DRMdirect attacks at the architecture of the DRM
systemsystem
circumvention attacks such as sound and videocircumvention attacks such as sound and video
grabbinggrabbing
brute-force attacks on password-based systemsbrute-force attacks on password-based systems
18. MAIN TOPIC
S
I
L
I
C
O
N
THREE KNOWN ATTACKS
Attacks on Audio DRM systems:
Sound Grabbing
E.g: unfuck software
Attacks on Video DRM systems:
Video grabbing
eBooks:
Brute-Force attacks
19. MAIN TOPIC
S
I
L
I
C
O
N
Emerging Trends
Mobile DRMMobile DRM
DRM for EveryoneDRM for Everyone
DRM and Trusted ComputingDRM and Trusted Computing
Content reuse and granularityContent reuse and granularity
20. MAIN TOPIC
S
I
L
I
C
O
N
CONCLUSION
Digital Rights Management is emerging as a
formidable new challenge and it is essential for DRM
systems to provide interoperable services.
DRM standardization is now occuring in a number of
open organisation.
Solutions to DRM challenges will enable untold
amounts of new content to be made available in safe,
open, and trusted environments