SlideShare une entreprise Scribd logo
1  sur  21
MAIN TOPIC
S
I
L
I
C
O
N
MAIN TOPIC
NAME
ROLL.No
MAIN TOPIC
S
I
L
I
C
O
N
CONTENTS
 IntroductionIntroduction
 DefinationDefination
 Survey And AspectSurvey And Aspect
 Design And ImplementationDesign And Implementation
 Requirements For DRMRequirements For DRM
 DRM under AttackDRM under Attack
 Emerging TrendsEmerging Trends
 ConclusionConclusion
MAIN TOPIC
S
I
L
I
C
O
N
INTRODUCTION
 The Internet has emerged as a vibrant informationThe Internet has emerged as a vibrant information
and digital entertainment .and digital entertainment .
 AS a hyper distribution channel for its easy andAS a hyper distribution channel for its easy and
efficient dissemination of content, it also facilitatesefficient dissemination of content, it also facilitates
the synergy of digital technologies to provide athe synergy of digital technologies to provide a
richer user experience.richer user experience.
 The ease of copying and sharing of digital contentThe ease of copying and sharing of digital content
such as music, without any deterioration in quality,such as music, without any deterioration in quality,
has resulted in rampant piracy.has resulted in rampant piracy.
 To curb this piracy ,One of such measures is DigitalTo curb this piracy ,One of such measures is Digital
Rights Management (DRM).Rights Management (DRM).
MAIN TOPIC
S
I
L
I
C
O
N
DEFINITION

DRM is a cluster of techniques designed toDRM is a cluster of techniques designed to
restrict unwanted copying and distributionrestrict unwanted copying and distribution
of intellectual property such asof intellectual property such as
music,video,software.music,video,software...
 DRM refers to controlling and managingDRM refers to controlling and managing
rights to digital intellectual property.rights to digital intellectual property.
 DRM is the description, identification, andDRM is the description, identification, and
protection, monitoring and tracking of allprotection, monitoring and tracking of all
forms of rights .forms of rights .
 Examples include Apple's iTunes/Fairplay,Examples include Apple's iTunes/Fairplay,
Windows Media Player, Real Networks.Windows Media Player, Real Networks.
MAIN TOPIC
S
I
L
I
C
O
N
SURVEY
 Survey on the technological aspects of
Digital Rights Management
William Ku and Chi-Hung Chi
School of Computing, National University
of Singapore .
Singapore 117543, Republic of Singapore
MAIN TOPIC
S
I
L
I
C
O
N
ASPECT
Mainly it has 3aspects:Mainly it has 3aspects:
 Legal AspectLegal Aspect:: No DRM technology is goingNo DRM technology is going
to be of much help if the law does not provideto be of much help if the law does not provide
provisions to enforce the rights of the contentprovisions to enforce the rights of the content
owners.owners.
 Social AspectSocial Aspect:: DRM needs to address a host ofDRM needs to address a host of
social issues such as privacy And fair use.social issues such as privacy And fair use.
 Economic AspectEconomic Aspect:: It rIt requires certainequires certain
economic questions to be answered such as whoeconomic questions to be answered such as who
would pay for the DRM structurewould pay for the DRM structure..
MAIN TOPIC
S
I
L
I
C
O
N
DESIGN AND IMPLIMENTATIONDESIGN AND IMPLIMENTATION
There are two critical architectures toThere are two critical architectures to
consider:consider:
 Functional Architecture:Functional Architecture:
 Information Architecture:Information Architecture:
MAIN TOPIC
S
I
L
I
C
O
N
Functional Architecture
It work under three AreaIt work under three Area
• Intellectual Property (IP) Asset Creation And CaptureIntellectual Property (IP) Asset Creation And Capture
It supports three modulesIt supports three modules
right validationright validation
Right creationRight creation
Work flowWork flow
• IP Asset ManagementIP Asset Management
It supports two modulesIt supports two modules
repository functionrepository function
trading functiontrading function
• IP Asset UsageIP Asset Usage
It supports two modulesIt supports two modules
 permission managementpermission management
 tracking managementtracking management
MAIN TOPIC
S
I
L
I
C
O
N
Functional Architecture
Figure 1 - DRM Functional Architecture
MAIN TOPIC
S
I
L
I
C
O
N
Information Architecture:
It Includes 3 Points
 Modeling the entitiesModeling the entities
It involveIt involve user,content,rightsuser,content,rights..
 Identifying and describing the entitiesIdentifying and describing the entities
All entities need to be Identified and Described.All entities need to be Identified and Described.
 Expressing the rights statementsExpressing the rights statements
It consists of Permission, constraints,ObligationIt consists of Permission, constraints,Obligation
MAIN TOPIC
S
I
L
I
C
O
N
Information Architecture
Figure 2 - DRM Information Architecture - Core Entities Model
MAIN TOPIC
S
I
L
I
C
O
N
IFLA MODEL
It allows content to be identifiedIt allows content to be identified
 WorkWork(Distinct Intellectual or artistic(Distinct Intellectual or artistic
creation)creation)
 Expression(relization of a work)Expression(relization of a work)
 Manifestion(digital embodiment of anManifestion(digital embodiment of an
expression of work.expression of work.
 Item(Instantiation of Manifestion)Item(Instantiation of Manifestion)
MAIN TOPIC
S
I
L
I
C
O
N
CONT….
Figure 3 - DRM Information Architecture - Content Model
MAIN TOPIC
S
I
L
I
C
O
N
RIGHT EXPRESSION MODEL
 Permissions (i.e., usages) - what you arePermissions (i.e., usages) - what you are
allowed to doallowed to do
 Constraints - restrictions on the permissionsConstraints - restrictions on the permissions
 Obligations - what you have toObligations - what you have to
do/provide/acceptdo/provide/accept
 Rights Holders - who is entitled to whatRights Holders - who is entitled to what
MAIN TOPIC
S
I
L
I
C
O
N
CONT….
Figure 4 - DRM Information Architecture - Rights Expression Model
MAIN TOPIC
S
I
L
I
C
O
N
REQUIREMENTS FOR DRM
 Hardware and software implementationsHardware and software implementations
 MobilityMobility
 SecuritySecurity
 User PrivacyUser Privacy
MAIN TOPIC
S
I
L
I
C
O
N
DRM UNDER ATTACK
Weakness in Existing SystemsWeakness in Existing Systems
as three main categories:as three main categories:
 direct attacks at the architecture of the DRMdirect attacks at the architecture of the DRM
systemsystem
 circumvention attacks such as sound and videocircumvention attacks such as sound and video
grabbinggrabbing
 brute-force attacks on password-based systemsbrute-force attacks on password-based systems
MAIN TOPIC
S
I
L
I
C
O
N
THREE KNOWN ATTACKS
Attacks on Audio DRM systems:
Sound Grabbing
E.g: unfuck software
Attacks on Video DRM systems:
Video grabbing
eBooks:
Brute-Force attacks
MAIN TOPIC
S
I
L
I
C
O
N
Emerging Trends
 Mobile DRMMobile DRM
 DRM for EveryoneDRM for Everyone
 DRM and Trusted ComputingDRM and Trusted Computing
 Content reuse and granularityContent reuse and granularity
MAIN TOPIC
S
I
L
I
C
O
N
CONCLUSION
 Digital Rights Management is emerging as a
formidable new challenge and it is essential for DRM
systems to provide interoperable services.
 DRM standardization is now occuring in a number of
open organisation.
 Solutions to DRM challenges will enable untold
amounts of new content to be made available in safe,
open, and trusted environments
MAIN TOPIC
S
I
L
I
C
O
N

Contenu connexe

Tendances

Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...Global Business Events
 
Law Is Code - Tech for Lawyers Masterclass
Law Is Code - Tech for Lawyers MasterclassLaw Is Code - Tech for Lawyers Masterclass
Law Is Code - Tech for Lawyers MasterclassAdrien van den Branden
 
IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)Rui Miguel Feio
 
Information Technology (IT)
Information Technology (IT)Information Technology (IT)
Information Technology (IT)Malik Afzaal
 
Question chapter 1
Question chapter 1Question chapter 1
Question chapter 1Aten Kecik
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereJim Brashear
 
ISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_IntindoloISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_IntindoloJohn Intindolo
 
Copyright Infringement
Copyright InfringementCopyright Infringement
Copyright InfringementWCU_Becca
 

Tendances (14)

Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
 
Law Is Code - Tech for Lawyers Masterclass
Law Is Code - Tech for Lawyers MasterclassLaw Is Code - Tech for Lawyers Masterclass
Law Is Code - Tech for Lawyers Masterclass
 
A Brief History of Police Technology
A Brief History of Police TechnologyA Brief History of Police Technology
A Brief History of Police Technology
 
IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)
 
Information Technology (IT)
Information Technology (IT)Information Technology (IT)
Information Technology (IT)
 
Question chapter 1
Question chapter 1Question chapter 1
Question chapter 1
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
Copyright and Technology 2011: Opening Remarks - Bill Rosenblatt
Copyright and Technology 2011: Opening Remarks - Bill RosenblattCopyright and Technology 2011: Opening Remarks - Bill Rosenblatt
Copyright and Technology 2011: Opening Remarks - Bill Rosenblatt
 
Introduction to Police Technology
Introduction to Police TechnologyIntroduction to Police Technology
Introduction to Police Technology
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
 
ISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_IntindoloISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_Intindolo
 
Copyright Infringement
Copyright InfringementCopyright Infringement
Copyright Infringement
 
Presentazione
PresentazionePresentazione
Presentazione
 
B.Ed class-1
B.Ed class-1B.Ed class-1
B.Ed class-1
 

En vedette

4 ltr powerpoint2010_ch20_pr1a_dawnstorck_2
4 ltr powerpoint2010_ch20_pr1a_dawnstorck_24 ltr powerpoint2010_ch20_pr1a_dawnstorck_2
4 ltr powerpoint2010_ch20_pr1a_dawnstorck_2dawn-storck1
 
Data warehouseing
Data warehouseingData warehouseing
Data warehouseingSajan Sahu
 
4 ltr powerpoint2010_ch21_pr1a_taylerjoyal_2
4 ltr powerpoint2010_ch21_pr1a_taylerjoyal_24 ltr powerpoint2010_ch21_pr1a_taylerjoyal_2
4 ltr powerpoint2010_ch21_pr1a_taylerjoyal_2Tayler Joyal
 
Cs ppt2010 1a_dawn_storck_2
Cs ppt2010 1a_dawn_storck_2Cs ppt2010 1a_dawn_storck_2
Cs ppt2010 1a_dawn_storck_2dawn-storck1
 
Construction and use of broadband transformers
Construction and use of broadband transformersConstruction and use of broadband transformers
Construction and use of broadband transformersSajan Sahu
 
Concurrent transactions
Concurrent transactionsConcurrent transactions
Concurrent transactionsSajan Sahu
 
Data compretion
Data compretionData compretion
Data compretionSajan Sahu
 
Hvdc transmission
Hvdc transmissionHvdc transmission
Hvdc transmissionSajan Sahu
 
10 gigabit ethernet technology
10 gigabit ethernet technology10 gigabit ethernet technology
10 gigabit ethernet technologySajan Sahu
 
Internet telephony
Internet telephonyInternet telephony
Internet telephonySajan Sahu
 
Bio sensors ei
Bio sensors eiBio sensors ei
Bio sensors eiSajan Sahu
 
Automatic meter reading
Automatic meter readingAutomatic meter reading
Automatic meter readingSajan Sahu
 

En vedette (18)

Em bnet
Em bnetEm bnet
Em bnet
 
Ann
AnnAnn
Ann
 
4 ltr powerpoint2010_ch20_pr1a_dawnstorck_2
4 ltr powerpoint2010_ch20_pr1a_dawnstorck_24 ltr powerpoint2010_ch20_pr1a_dawnstorck_2
4 ltr powerpoint2010_ch20_pr1a_dawnstorck_2
 
Data warehouseing
Data warehouseingData warehouseing
Data warehouseing
 
4 ltr powerpoint2010_ch21_pr1a_taylerjoyal_2
4 ltr powerpoint2010_ch21_pr1a_taylerjoyal_24 ltr powerpoint2010_ch21_pr1a_taylerjoyal_2
4 ltr powerpoint2010_ch21_pr1a_taylerjoyal_2
 
Cs ppt2010 1a_dawn_storck_2
Cs ppt2010 1a_dawn_storck_2Cs ppt2010 1a_dawn_storck_2
Cs ppt2010 1a_dawn_storck_2
 
Construction and use of broadband transformers
Construction and use of broadband transformersConstruction and use of broadband transformers
Construction and use of broadband transformers
 
Concurrent transactions
Concurrent transactionsConcurrent transactions
Concurrent transactions
 
Bluetooth
Bluetooth Bluetooth
Bluetooth
 
Data compretion
Data compretionData compretion
Data compretion
 
Hvdc transmission
Hvdc transmissionHvdc transmission
Hvdc transmission
 
10 gigabit ethernet technology
10 gigabit ethernet technology10 gigabit ethernet technology
10 gigabit ethernet technology
 
Internet telephony
Internet telephonyInternet telephony
Internet telephony
 
Dna computing
Dna computingDna computing
Dna computing
 
Bio sensors ei
Bio sensors eiBio sensors ei
Bio sensors ei
 
Black box
Black boxBlack box
Black box
 
Wlan security
Wlan securityWlan security
Wlan security
 
Automatic meter reading
Automatic meter readingAutomatic meter reading
Automatic meter reading
 

Similaire à Drm

Bridging the Gap: Securing IP
Bridging the Gap: Securing IPBridging the Gap: Securing IP
Bridging the Gap: Securing IPipspat
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspectsCAS
 
What You Can Do Under the DMCA--And the Two (Yes, Just TWO) That You Can't
What You Can Do Under the DMCA--And the Two (Yes, Just TWO) That You Can'tWhat You Can Do Under the DMCA--And the Two (Yes, Just TWO) That You Can't
What You Can Do Under the DMCA--And the Two (Yes, Just TWO) That You Can'tmelmoskal
 
Information-Control.pptx
Information-Control.pptxInformation-Control.pptx
Information-Control.pptxJeydeeeYhudieee
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Samuel Kamuli
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...Editor IJMTER
 
Understanding Cybercrime: Theft of Intellectual Property - Janine Hollesen
Understanding Cybercrime: Theft of Intellectual Property - Janine HollesenUnderstanding Cybercrime: Theft of Intellectual Property - Janine Hollesen
Understanding Cybercrime: Theft of Intellectual Property - Janine HollesenWerksmans Attorneys
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdfSuleiman55
 
Conf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_tConf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_tBeau Christensen
 
Module 3 (scanning)
Module 3 (scanning)Module 3 (scanning)
Module 3 (scanning)Wail Hassan
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trendsSsendiSamuel
 
Controlling the value in software companies
Controlling the value in software companiesControlling the value in software companies
Controlling the value in software companiesJohan Örneblad
 
One page business summary - cryptsonic technologies incorporated
One page business summary - cryptsonic technologies incorporatedOne page business summary - cryptsonic technologies incorporated
One page business summary - cryptsonic technologies incorporatedSeiji Eto
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planetVincent Kwon
 

Similaire à Drm (20)

Digital Rights Management
Digital Rights Management Digital Rights Management
Digital Rights Management
 
Bridging the Gap: Securing IP
Bridging the Gap: Securing IPBridging the Gap: Securing IP
Bridging the Gap: Securing IP
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspects
 
What You Can Do Under the DMCA--And the Two (Yes, Just TWO) That You Can't
What You Can Do Under the DMCA--And the Two (Yes, Just TWO) That You Can'tWhat You Can Do Under the DMCA--And the Two (Yes, Just TWO) That You Can't
What You Can Do Under the DMCA--And the Two (Yes, Just TWO) That You Can't
 
Information-Control.pptx
Information-Control.pptxInformation-Control.pptx
Information-Control.pptx
 
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
 
Digital rights management
Digital rights managementDigital rights management
Digital rights management
 
Understanding Cybercrime: Theft of Intellectual Property - Janine Hollesen
Understanding Cybercrime: Theft of Intellectual Property - Janine HollesenUnderstanding Cybercrime: Theft of Intellectual Property - Janine Hollesen
Understanding Cybercrime: Theft of Intellectual Property - Janine Hollesen
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
 
Case Study.pdf
Case Study.pdfCase Study.pdf
Case Study.pdf
 
Conf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_tConf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_t
 
Module 3 (scanning)
Module 3 (scanning)Module 3 (scanning)
Module 3 (scanning)
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trends
 
Controlling the value in software companies
Controlling the value in software companiesControlling the value in software companies
Controlling the value in software companies
 
One page business summary - cryptsonic technologies incorporated
One page business summary - cryptsonic technologies incorporatedOne page business summary - cryptsonic technologies incorporated
One page business summary - cryptsonic technologies incorporated
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 

Plus de Sajan Sahu

Architecture of message oriented middleware
Architecture of message oriented middlewareArchitecture of message oriented middleware
Architecture of message oriented middlewareSajan Sahu
 
Insurance envoy
Insurance envoyInsurance envoy
Insurance envoySajan Sahu
 
Computer’s memory
Computer’s memoryComputer’s memory
Computer’s memorySajan Sahu
 
Automated inspection of aircraft
Automated inspection of aircraftAutomated inspection of aircraft
Automated inspection of aircraftSajan Sahu
 
Information system
Information systemInformation system
Information systemSajan Sahu
 
Wireless application protocol (WAP)
Wireless application protocol (WAP)Wireless application protocol (WAP)
Wireless application protocol (WAP)Sajan Sahu
 
Blink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisatBlink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisatSajan Sahu
 
Database system
Database systemDatabase system
Database systemSajan Sahu
 
Implimating counter
Implimating counterImplimating counter
Implimating counterSajan Sahu
 
Content management server
Content management serverContent management server
Content management serverSajan Sahu
 
Conceptual indexing
Conceptual indexingConceptual indexing
Conceptual indexingSajan Sahu
 
High speed adder used in digital signal processing
High speed adder used in  digital signal processingHigh speed adder used in  digital signal processing
High speed adder used in digital signal processingSajan Sahu
 

Plus de Sajan Sahu (20)

Architecture of message oriented middleware
Architecture of message oriented middlewareArchitecture of message oriented middleware
Architecture of message oriented middleware
 
Insurance envoy
Insurance envoyInsurance envoy
Insurance envoy
 
Computer’s memory
Computer’s memoryComputer’s memory
Computer’s memory
 
Automated inspection of aircraft
Automated inspection of aircraftAutomated inspection of aircraft
Automated inspection of aircraft
 
Deadlock
DeadlockDeadlock
Deadlock
 
Information system
Information systemInformation system
Information system
 
Wireless application protocol (WAP)
Wireless application protocol (WAP)Wireless application protocol (WAP)
Wireless application protocol (WAP)
 
Blink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisatBlink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisat
 
Database system
Database systemDatabase system
Database system
 
GPRS
GPRSGPRS
GPRS
 
Bios
BiosBios
Bios
 
802.11
802.11802.11
802.11
 
Erp
ErpErp
Erp
 
Wcdma
WcdmaWcdma
Wcdma
 
Criptography
CriptographyCriptography
Criptography
 
Implimating counter
Implimating counterImplimating counter
Implimating counter
 
Honeypot
HoneypotHoneypot
Honeypot
 
Content management server
Content management serverContent management server
Content management server
 
Conceptual indexing
Conceptual indexingConceptual indexing
Conceptual indexing
 
High speed adder used in digital signal processing
High speed adder used in  digital signal processingHigh speed adder used in  digital signal processing
High speed adder used in digital signal processing
 

Dernier

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Dernier (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Drm

  • 2. MAIN TOPIC S I L I C O N CONTENTS  IntroductionIntroduction  DefinationDefination  Survey And AspectSurvey And Aspect  Design And ImplementationDesign And Implementation  Requirements For DRMRequirements For DRM  DRM under AttackDRM under Attack  Emerging TrendsEmerging Trends  ConclusionConclusion
  • 3. MAIN TOPIC S I L I C O N INTRODUCTION  The Internet has emerged as a vibrant informationThe Internet has emerged as a vibrant information and digital entertainment .and digital entertainment .  AS a hyper distribution channel for its easy andAS a hyper distribution channel for its easy and efficient dissemination of content, it also facilitatesefficient dissemination of content, it also facilitates the synergy of digital technologies to provide athe synergy of digital technologies to provide a richer user experience.richer user experience.  The ease of copying and sharing of digital contentThe ease of copying and sharing of digital content such as music, without any deterioration in quality,such as music, without any deterioration in quality, has resulted in rampant piracy.has resulted in rampant piracy.  To curb this piracy ,One of such measures is DigitalTo curb this piracy ,One of such measures is Digital Rights Management (DRM).Rights Management (DRM).
  • 4. MAIN TOPIC S I L I C O N DEFINITION  DRM is a cluster of techniques designed toDRM is a cluster of techniques designed to restrict unwanted copying and distributionrestrict unwanted copying and distribution of intellectual property such asof intellectual property such as music,video,software.music,video,software...  DRM refers to controlling and managingDRM refers to controlling and managing rights to digital intellectual property.rights to digital intellectual property.  DRM is the description, identification, andDRM is the description, identification, and protection, monitoring and tracking of allprotection, monitoring and tracking of all forms of rights .forms of rights .  Examples include Apple's iTunes/Fairplay,Examples include Apple's iTunes/Fairplay, Windows Media Player, Real Networks.Windows Media Player, Real Networks.
  • 5. MAIN TOPIC S I L I C O N SURVEY  Survey on the technological aspects of Digital Rights Management William Ku and Chi-Hung Chi School of Computing, National University of Singapore . Singapore 117543, Republic of Singapore
  • 6. MAIN TOPIC S I L I C O N ASPECT Mainly it has 3aspects:Mainly it has 3aspects:  Legal AspectLegal Aspect:: No DRM technology is goingNo DRM technology is going to be of much help if the law does not provideto be of much help if the law does not provide provisions to enforce the rights of the contentprovisions to enforce the rights of the content owners.owners.  Social AspectSocial Aspect:: DRM needs to address a host ofDRM needs to address a host of social issues such as privacy And fair use.social issues such as privacy And fair use.  Economic AspectEconomic Aspect:: It rIt requires certainequires certain economic questions to be answered such as whoeconomic questions to be answered such as who would pay for the DRM structurewould pay for the DRM structure..
  • 7. MAIN TOPIC S I L I C O N DESIGN AND IMPLIMENTATIONDESIGN AND IMPLIMENTATION There are two critical architectures toThere are two critical architectures to consider:consider:  Functional Architecture:Functional Architecture:  Information Architecture:Information Architecture:
  • 8. MAIN TOPIC S I L I C O N Functional Architecture It work under three AreaIt work under three Area • Intellectual Property (IP) Asset Creation And CaptureIntellectual Property (IP) Asset Creation And Capture It supports three modulesIt supports three modules right validationright validation Right creationRight creation Work flowWork flow • IP Asset ManagementIP Asset Management It supports two modulesIt supports two modules repository functionrepository function trading functiontrading function • IP Asset UsageIP Asset Usage It supports two modulesIt supports two modules  permission managementpermission management  tracking managementtracking management
  • 10. MAIN TOPIC S I L I C O N Information Architecture: It Includes 3 Points  Modeling the entitiesModeling the entities It involveIt involve user,content,rightsuser,content,rights..  Identifying and describing the entitiesIdentifying and describing the entities All entities need to be Identified and Described.All entities need to be Identified and Described.  Expressing the rights statementsExpressing the rights statements It consists of Permission, constraints,ObligationIt consists of Permission, constraints,Obligation
  • 11. MAIN TOPIC S I L I C O N Information Architecture Figure 2 - DRM Information Architecture - Core Entities Model
  • 12. MAIN TOPIC S I L I C O N IFLA MODEL It allows content to be identifiedIt allows content to be identified  WorkWork(Distinct Intellectual or artistic(Distinct Intellectual or artistic creation)creation)  Expression(relization of a work)Expression(relization of a work)  Manifestion(digital embodiment of anManifestion(digital embodiment of an expression of work.expression of work.  Item(Instantiation of Manifestion)Item(Instantiation of Manifestion)
  • 13. MAIN TOPIC S I L I C O N CONT…. Figure 3 - DRM Information Architecture - Content Model
  • 14. MAIN TOPIC S I L I C O N RIGHT EXPRESSION MODEL  Permissions (i.e., usages) - what you arePermissions (i.e., usages) - what you are allowed to doallowed to do  Constraints - restrictions on the permissionsConstraints - restrictions on the permissions  Obligations - what you have toObligations - what you have to do/provide/acceptdo/provide/accept  Rights Holders - who is entitled to whatRights Holders - who is entitled to what
  • 15. MAIN TOPIC S I L I C O N CONT…. Figure 4 - DRM Information Architecture - Rights Expression Model
  • 16. MAIN TOPIC S I L I C O N REQUIREMENTS FOR DRM  Hardware and software implementationsHardware and software implementations  MobilityMobility  SecuritySecurity  User PrivacyUser Privacy
  • 17. MAIN TOPIC S I L I C O N DRM UNDER ATTACK Weakness in Existing SystemsWeakness in Existing Systems as three main categories:as three main categories:  direct attacks at the architecture of the DRMdirect attacks at the architecture of the DRM systemsystem  circumvention attacks such as sound and videocircumvention attacks such as sound and video grabbinggrabbing  brute-force attacks on password-based systemsbrute-force attacks on password-based systems
  • 18. MAIN TOPIC S I L I C O N THREE KNOWN ATTACKS Attacks on Audio DRM systems: Sound Grabbing E.g: unfuck software Attacks on Video DRM systems: Video grabbing eBooks: Brute-Force attacks
  • 19. MAIN TOPIC S I L I C O N Emerging Trends  Mobile DRMMobile DRM  DRM for EveryoneDRM for Everyone  DRM and Trusted ComputingDRM and Trusted Computing  Content reuse and granularityContent reuse and granularity
  • 20. MAIN TOPIC S I L I C O N CONCLUSION  Digital Rights Management is emerging as a formidable new challenge and it is essential for DRM systems to provide interoperable services.  DRM standardization is now occuring in a number of open organisation.  Solutions to DRM challenges will enable untold amounts of new content to be made available in safe, open, and trusted environments

Notes de l'éditeur

  1. .