Security of Digital Rights Management Systems Hugo Jonker

Slides:



Advertisements
Similar presentations
ContentGuard An Intellectual Property Company IPED Conference November 1, 2007 Presented By Eddie Chen CONTENTGUARD.
Advertisements

CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
FromAudiobook to Multimedia-Book Zhoulan Zhang
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
H.L. Jonker Security aspects of Digital Rights Management Systems H.L. Jonker, TNO ITSEF Co-authors: S. Mauw (TU/e), J.H.S. Verschuren and A.T.S.C. Schoonen.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
DR. MIGUEL ÁNGEL OROS HERNÁNDEZ 8. Cracking. Cracking Magnitude of piracy  All kinds of digital content (music, software, movies)  Huge economic repercussions.
A Content Protection Scheme Using MPEG-21 Concepts and Tools Chia-Hsien Lu Feng-Cheng Chang Hsueh-Ming Hang Dept. Electronics Engineering National Chiao.
1 Jeremy Wyant W3C DRM Workshop 23 January 2001 Establishing Security Requirements For DRM Enabled Systems.
UNDERSTANDING JAVA APIS FOR MOBILE DEVICES v0.01.
Digital Rights Management in Digital Libraries: an introduction to technology, effects and the available Open source tools Dr. N. S. Harinarayana Reader,
“...creating knowledge.” Enabling Digital Content Protection on Super-Distribution Models - Carlos Serrão ISCTE – Intituto Superior.
Project 1 Introduction to HTML.
3. Technical and administrative metadata standards Metadata Standards and Applications.
1 MPEG-21 : Goals and Achievements Ian Burnett, Rik Van de Walle, Keith Hill, Jan Bormans and Fernando Pereira IEEE Multimedia, October-November 2003.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Jau-Wu Huang1 Digital Rights Management for Visual Content in Mobile Applications Trimeche, M.; Chebil, F.; Nokia Research Center Control, Communications.
Philips Research France Delivery Context in MPEG-21 Sylvain Devillers Philips Research France Anthony Vetro Mitsubishi Electric Research Laboratories.
Applied Cryptography for Network Security
Protection for Web Delivered Music Patcharinee Tientrakool EE 6886: Topics in Signal Processing - Multimedia Security System.
Electronic Commerce Semester 1 Term 1 Lecture 2. Forces Fuelling E-Commerce Interest in e-commerce is being fuelled by: –Economic forces –Customer interaction.
MPEG-21 Multimedia Framework: Status and Directions January 8, 2003 John R. Smith Pervasive Media Management Group IBM T. J. Watson Research Center 19.
1st Project Introduction to HTML.
Digital Rights Management 5th Annual Wireless Java Conference January 21-23, 2004 Kevin Mowry, Motorola Chair, OMA Download and DRM group.
DIGITAL Download Sharing and Copying. Digital Download Process of downloading content or materials with the elimination of physical media. (dvd/cdrom)
HTML 1 Introduction to HTML. 2 Objectives Describe the Internet and its associated key terms Describe the World Wide Web and its associated key terms.
Chapter ONE Introduction to HTML.
Smart Learning Services Based on Smart Cloud Computing
Chapter 1 Introduction to HTML, XHTML, and CSS
Michael Miron CEO, ContentGuard Inc. CPTWG Meeting El Segundo 27 February 2002 The Language for Digital Rights The Language for Digital Rights ™ Enabling.
1 Functional reference model for Digital Rights Management Systems Vural Ünlü / Prof. Dr. Thomas Hess Munich School of Management Berlin, 5. September2004.
Not only Safe but Competitive Presentation to Copy Protection Technical Working Group October 22, 2003 Far East Engineering Corp, Tokyo Japan Makoto Saito/Rie.
Addressing Metadata in the MPEG-21 and PDF-A ISO Standards NISO Workshop: Metadata on the Cutting Edge May 2004 William G. LeFurgy U.S. Library of Congress.
Copyright © 2000 Internet Document Security Alan Weintraub Research Director March 9, 2000.
Introducing Digital Rights Management Willms Buhse October 2002, Vilnius.
Donald M. Whiteside Vice President, Corporate Technology Group Director, Technical Policy and Standards ITU and EBU Presentation A perspective on trends.
Electronic Commerce & Marketing. What is E-Commerce? Business communications and transactions over networks and through computers, specifically –The buying.
Metadata Xiangming Mu. What is metadata? What is metadata? (cont’) Data about data –Any data aids in the identification, description and location of.
MPEG-21 : Overview MUMT 611 Doug Van Nort. Introduction Rather than audiovisual content, purpose is set of standards to deliver multimedia in secure environment.
IEEE-LTSC MPEG Overview Martha Nalebuff Director of Policy & Strategy Content Security Business Unit.
HTML, XHTML, and CSS Sixth Edition Chapter 1 Introduction to HTML, XHTML, and CSS.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
Computer Concepts 2014 Chapter 8 Digital Media. 8 Digital Audio Basics  Sampling a sound wave Chapter 8: Digital Media 2.
1 DOI for eBooks: What are we identifying? Steve Mooney Sophia-Antipolis, France 22 JAN 01.
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Digital Rights Management with XML Eamonn Neylon Technology Director The YRM Group.
Cryptography and Network Security (CS435) Part One (Introduction)
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
The McGraw-Hill Companies, Inc Information Technology & Management Thompson Cats-Baril Chapter 1 Introduction to Information Technology & Management.
Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
MPEG 21 – An Overview MUMT 611 Elliot Sinyor January 2005.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
HTML Concepts and Techniques Fifth Edition Chapter 1 Introduction to HTML.
Chapter 1 Introduction to HTML, XHTML, and CSS HTML5 & CSS 7 th Edition.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Digital Rights Management for Mobiles Jani Suomalainen Research Seminar on Telecommunications Business II Telecommunications Software and Multimedia Laboratory.
György Kálmán, Josef Noll Mobile and Wireless Communications Summit, th IST 1-5, July 2007 Speaker : 黃韋綸 Right Management Infrastructure for Home.
OMA Secure Content Delivery for the Mobile World ODRL Workshop, Vienna Dr. Willms Buhse Vice Chair, OMA Download and DRM group.
OPERATING SYSTEMS (OS) By the end of this lesson you will be able to explain: 1. What an OS is 2. The relationship between the OS & application programs.
© 2015 Digital Rights Management in a 3G Mobile Phone and Beyond Thomas S.Messerges, Ezzat A. Dabbish ILKOO LEE.
DRM in Proprietary Products and Digital Archive
PREPARED BY: RUMMY MIRANDA
Key Challenges in DRM: An Industry Perspective
Presentation transcript:

Security of Digital Rights Management Systems Hugo Jonker

Outline Introduction Supporting techniques Modelling DRM systems Security Closing remarks

Copyright in the digital era Early content protection systems (e.g. cable tv, CSS): –Either full access or no access, no possibility to update access rights –Content supplier also grants access rights Current situation: –Digital versions of music/films/books (content) are being exchanged in various (digital) manners –Existing copy-protection measures (e.g. CSS) are not sufficient New possibilities: –Desire to offer digitised content (e.g. over the Internet) whilst ensuring copy protections after delivery –Interest in offering tailor-made access to content Legal situation Netherlands (2004): uploading bad, downloading not bad Introduction copyright purpose description constraints state Techniques Model Security Closing remarks

Purpose of DRM systems A new content protection mechanism –As desired by those offering content Access control –Not just copy prevention Practical security –In absense of perfect security, settle for practical security (e.g. prevent “break once, run everywhere”, updatable security measures) Introduction copyright purpose description constraints state Techniques Model Security Closing remarks

General description of DRM systems Govern the distribution and protective measures of content –video, audio, tekst, graphics, software Content can only be accessed with a license –More precise: in adherence to a valid license, issued by a bona fide license issuer –License specifies the access rights –License is typically bound to a device –Unlicensed access to protected content should be impossible Network oriented technique –Internet, cable television, cellular phone, CD / DVD Introduction copyright purpose description constraints state Techniques Model Security Closing remarks

Constraints DRM systems (as we consider them) offer: No protection of analogue content –DRM protection ends when content has been rendered No payment mechanisms –As this can be considered a seperate problem Introduction copyright purpose description constraints state Techniques Model Security Closing remarks

State of DRM development Existing systems: –Apple: iTunes (music) –Microsoft: MS Media DRM (music, audio/video), MS Reader (text) –Adobe: eBooks (text) Standards: –XrML, ODRL (right expression languages) – (metadata) –OMA (cellphones) Developments by: –Open Mobile Alliance (cellphones) –MPEG, OpenIPMP, SDMI, SMPTE, ISMA, OeBF, CRF, OASIS (IT industry) Note: there is not one standard DRM system, nor a DRM system which is market leader on all markets Introduction copyright purpose description constraints state Techniques Model Security Closing remarks

Supporting techniques

General goals: –Updatability –Interoperability Specialised techniques –Content identification: DOI, watermarking, fingerprinting –Stating rights: Right Expression Language, Rights Data Dictionary (REL, RDD) –Cryptography: secure container –Security enabling: hard/software Trusted Computing Base (TCB) –Traitor tracing Introduction Techniques supporting techniques content identification rights expression cryptography TCB Model Security Closing remarks

Content identification Digital Object Identifier (DOI) –Lookup system using codes, similar to bar codes –DOI number identifies content, but must be supplied with content Watermarking –Embedding information in content without disturbing perception of content –Embedded information can be used to identify content (e.g. a DOI) Fingerprinting –Identifying content based on perceptual equivalence Introduction Techniques supporting techniques content identification rights expression cryptography TCB Model Security Closing remarks

Rights expression Rights Expression Language (REL): syntax of the license Rights Data Dictionary (RDD): semantics of the REL Two main contenders: Open Data Rights Language (ODRL) –open standard, supported by OMA eXtensible rights Markup Language (XrML) –proprietary standard from Contentguard, supported by MPEG, Microsoft Both are XML-based Introduction Techniques supporting techniques content identification rights expression cryptography TCB Model Security Closing remarks

Cryptography Various uses of cryptography In communications –Authentication, secure channel For a secure container –(possibly conceptual) container consisting of the encrypted content, metadata describing content, and possibly access rights for the content –Seperate encryption from key management –Secure container can be exchanged unlimited Introduction Techniques supporting techniques content identification rights expression cryptography TCB Model Security Closing remarks

Trusted Computing Base Trusted computing base A component that provides a trusted platform on which computations are performed Computations cannot be inspected nor disturbed Traditionally implemented in hardware (e.g. smartcards) Software TCB conceptually impossible, but practically feasible Requirements: –code tamper resistance –data tamper resistance (secure storage) –key hiding Introduction Techniques supporting techniques content identification rights expression cryptography TCB Model Security Closing remarks

Modelling DRM systems

Possible components Content packaging Media server License server Content registration server Authentication server Payment gateway DRM tools server User interface Introduction Techniques Model possible components MOSES / OpenSDRM derived model process model Security Closing remarks

MOSES / OpenSDRM Content Packaging server Registration server Authentication server License server e-Commerce server Media delivery server DRM Tools server Payment gateway connection storage player video driver audio driver video card display hardware analogue out sound card audio hardware analogue out Server sideUser side Introduction Techniques Model possible components MOSES / OpenSDRM derived model process model Security Closing remarks

Derived model (old) packager license secure container network interface storage player video driver audio driver video card video output device sound card audio output device network trusted computing base distributor’s side content provider analogue output user’s side Introduction Techniques Model possible components MOSES / OpenSDRM derived model process model Security Closing remarks

Process model Introduction Techniques Model possible components MOSES / OpenSDRM derived model process model Security Closing remarks

Security

Intruder model –Typical intruder threat for entire DRM systems stronger than Dolev / Yao –Dolev / Yao seems adequate for protocols Security goals –Theory focuses on complete(?) security –Practice: not per se so strict E.g. iTunes allows creating CD’s which could then be “ripped” Security requirements

Method 1.Stakeholder analysis Establish core roles and incentives 2.Establish (high level) properties Use concepts of DRM systems (see process model) to translate the incentives into properties 3.Derive (low level) security requirements Use process model Introduction Techniques Model Security method stakeholder analysis high-level properties security requirements Closing remarks

Stakeholder analysis Parties: media company, developer, user, reseller,... A party can play more than one role Three core roles: user, license creator, content creator Incentives of the content creator –support new business models (e.g. bundling of content) –Offer revenue-generating alternative to downloading (opens new market) Incentives of the license creator –Offering tailor-made access (new market) –Low overhead compared to physical devices (CD / DVD) Incentives of the user –Legitimate and known-quality content (compared to downloading) –Ease of use –Pricing can be more fine-grained Introduction Techniques Model Security method stakeholder analysis high-level properties security requirements Closing remarks

High-level properties Content creator 1.Content is only accessible under the conditions of a valid license issued by a bona fide license creator (includes binding of license to device) License creator 1.The above 2.The impact of breaking the system must be constrained User 1.Ordering licenses / content requires user participation 2.Content nor licenses can be linked to the user Introduction Techniques Model Security method stakeholder analysis high-level properties security requirements Closing remarks

Security requirements Content cannot be eavesdropped Secure communications Content will only be rendered –if a valid license for the content and the renderer is available –if all conditions of such a license have been met The manager / renderer ‘s inner workings cannot be influenced Secrets stay secrets –E.g. cryptographic keys used by manager / renderer Prevent “break once, run everywhere” Updatability... Introduction Techniques Model Security method stakeholder analysis high-level properties security requirements Closing remarks

Further research Application of security requirements Formal verification of the correctness of used protocols –Secrecy, authentication Formal verification of other security properties of protocols –E.g. privacy Formal specifications pertaining to TCB Questions?