Digital Rights Management with Consumer Interests 逢甲大學資工系 教授 李維斌 Nov. 06, 2009.

Slides:



Advertisements
Similar presentations
ContentGuard An Intellectual Property Company IPED Conference November 1, 2007 Presented By Eddie Chen CONTENTGUARD.
Advertisements

Developing the Digital Market October 23, 2006 Mitch Singer EVP Technology and New Media Sony Pictures Entertainment.
Many personal devices have rich set of capabilities: sensors, communication, computing power and data storage, and they are personal. Potentially they.
Hart District Acceptable Use Policy Acceptable Use Policy.
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Rob Farraher Ken Pickering Lim Vu
With the friendly assistance of: 4FriendsOnly.com AG (4FO AG) and Fraunhofer IIS AEMT Potato System and Signed Media Format - an Alternative Approach to.
A Cryptographic Key Management Solution for HIPAA Privacy/Security Regulations 針對 HIPAA 隱私 / 安全規則的一種密碼金鑰管理方法 IEEE Transactions on Information Technology.
IRMA Anti-Piracy Compliance Programme. What is IRMA? International Recording Media Association IRMA developed the Anti-Piracy Compliance Programme in.
Fuzzy Stuff Lecture 24, Outline Motivation: Biometric Architectures Motivation: Biometric Architectures New Tool (for us): Error Correcting.
Copyright or Copywrong. What is a copyright and what can be copyrighted? What is “Fair Use” and what four factors determine “Fair Use”? What are the two.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
1 Windows Media Rights Manager and FairPlay Seminar Digital Rights Management Clara Fernández de Castro.
Digital Rights Management © Knowledge Books & Software, 2012.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.
 Secure Authentication Using Biometric Data Karen Cui.
1 Digital Rights Management using RFID in an E-Commerce Environment World Applied Sciences Journal,5 (3), pp , 2008 Asso Hamzehei Department of.
The Downside to DRM. What is DRM? “Digital Rights Management” Software used to control access to copyrighted material Protect company from piracy.
UFCEXR-20-1Multimedia Sound Production Multimedia Sound Production and Copyright.
INTRODUCTIONDEFINITIONSAPPLICATIONSCONCLUSION Copyright © KATZAROV S.A.24/01/2007 Digital Rights Management (DRM) and Software Products Olivier Sacroug.
Intellectual Property Rights and Online File Sharing Erwin Solis Antoine Herve Matt Olsen Nikolai Hart Tim Scott.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
WELCOME TO THE SEMINAR ON Money Pad, The Future Wallet
New copyright challenges for the users digital works Dragutin Nemec Library of the Faculty of law in Zagreb LIBRARIES IN THE DIGITAL AGE (LIDA) 2007.
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
THIS IS With Host... Your Software Software Piracy GUI Authori zation Digital Assistance Globalization of software.
>>APMG 8119: DIGITAL ENTERPRISE. Copyright ??  Copyright is a exclusive right that gives the right to owner for ownership, transfer or sell to others.
Matthew Rothmeyer. Digital Rights Management (DRM) “ A class of technologies that are used by hardware manufacturers, publishers, copyright holders, and.
Your Interactive Guide to the Digital World Discovering Computers 2012.
CptS 401 Adam Carter Section 4.3.
Group 06-From Lecture 06 Member 02 Presented by: Xu Wei iTunes B2C SUCCESS STORY&CONTROVERSIAL ISSUES.
Computer Ethics for Computer Users
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
1 Digital Rights Management Dissenting Argument: Users of Digital Media should obey digital rights management systems to guarantee the integrity and protect.
Unethical use of Computers and Networks
Phosphor A Cloud based DRM Scheme with Sim Card th International Asia-Pacific Web Conference Author : Peng Zou, Chaokun Wang, Zhang Liu, Dalei.
Digital Citizenship Project By Allen Naylor Ed 505.
Copyright Frost & Sullivan Mobile Digital Rights Management: Managing Rights, Managing Revenues Interactive Analyst Briefing Allison Webb 12 March 2003.
A Flexible Access Control Model for Web Services Elisa Bertino CERIAS and CS Department, Purdue University Joint work with Anna C. Squicciarini – University.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
EC The transformative character of the IT sector and the eCommerce applications built upon it is deep and provocative. Consider the example of the entertainment.
DRM: Technology overview Keunwoo Lee CSE 590 SO 19 April 2005.
Economic incentives for protecting digital rights online Source: Authors: Reporter: Date: Electronic Commerce Research and Applications, Vol.10, Issue.
1 Analysis of Consumer Issues and Paths for Concrete Approaches Dr. Carsten Orwat Forschungszentrum Karlsruhe in the Helmholtz Association, Institute for.
1 Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards 使用在 smart cards 的強韌及高效率密碼驗證金鑰協定 IEEE Transactions on Industrial Electronics,
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
A flexible biometrics remote user authentication scheme Authors: Chu-Hsing Lin and Yi-Yi Lai Sources: Computer Standards & Interfaces, 27(1), pp.19-23,
Apple Inc ISO.
When DRM Meets Restricted Multicast A Content Encryption Key Scheme for Restricted Multicast and DRM Min FENG and Bin ZHU Microsoft Research Asia.
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
And the technology’s effect on consumer rights. What is DRM?  Defined by Encyclopedia of Multimedia as “technology [that] offers the ability to control.
Robust and Efficient Password- Authenticated Key Agreement Using Smart Cards Authors: Wen-Shenq Juang, Sian-Teng Chen and Horng-Twu Liaw Src: IEEE Transaction.
Digital Rights Management for Mobiles Jani Suomalainen Research Seminar on Telecommunications Business II Telecommunications Software and Multimedia Laboratory.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
OMA Secure Content Delivery for the Mobile World ODRL Workshop, Vienna Dr. Willms Buhse Vice Chair, OMA Download and DRM group.
Social Ethical and Legal Issues Web Design. 3.4 Social, Ethical, and Legal Issues Focus on Reading Main Ideas Ethical, social, and legal guidelines govern.
What is DRM? Digital Rights Management is: –From Richard Stallman, President of the FSF: ”The motive for DRM schemes is to increase profits for those.
© 2015 Digital Rights Management in a 3G Mobile Phone and Beyond Thomas S.Messerges, Ezzat A. Dabbish ILKOO LEE.
iPhones and iPads and iTunes, Oh My!
A Gift of Fire Third edition Sara Baase
A secure and traceable E-DRM system based on mobile device
Five Unethical Uses of Computers
Digital Rights Management (DRM)
Welcome To Money pad November 23, 2018 Sample footer.
An efficient biometric based remote user authentication scheme for secure internet of things environment Source: Journal of Intelligent & Fuzzy Systems.
Biometrics-based RSA Cryptosystem for Securing Real-Time Communication
Privacy Protection for E-Health Systems by
Presentation transcript:

Digital Rights Management with Consumer Interests 逢甲大學資工系 教授 李維斌 Nov. 06, 2009

2 Outline Introduction What is DRM? Preferences of digital users Overview of content portability schemes  Consumer’s private key  Smart card  Biometric The proposed DRM scheme with consumer interests Conclusions

3 Revenue growth vs. loss in DRM Revenue growth  The global entertainment and media industry grows fast at a CAGR of 6.6% to $2.2 trillion by (Source: PricewaterhouseCoopers, 2008) Loss caused by piracies in 2008  PC software piracy rate is 38%. (Source: BSA, 2008)  Music piracy rate is around 95 %. (Source: IFPI, 2009)

4 What is DRM? A technical measure used to protect copyrighted contents from any copyright violation of intellectual property  Be named “Digital Rights Management” A restraint on consumers “freedom” when using content  Be a very negative connotation associated with draconian restrictions on usage rights  Be named “Digital Restrictions Management”, “Digital Restrictions Malware”, or “Digital Handcuffs”

5 Typical DRM model Protected Content (1) Usage Rule+ Content Key (2) (3) License(4) Content Owner Distributor Consumer License Server DRM Agent

6 Microsoft’s DRM Protected Content (1) Usage Rule+ Content Key (2) (3) License(4) Content Owner Distributor Consumer License Server DRM Agent

7 Apple FairPlay Digital Content Usage Rule + Content Key License(3) iTunes Music Store Consumer iTunes Client Protected Content (1) (2) iPod nano iPod iPod touch iPhone

8 Why consumers’ interests must be considered in the design of DRM? Violations of consumers’ interests  Tie license to a limited device Microsoft’s DRM  Cannot provide super-distribution Apple FairPlay  Discourage consumers from using the related service again Awkward predicament  Bear the risk of restraining the growth potential of digital content industries  Require to sell DRM-free music (Steve Jobs, 2007)

9 Microsoft’s DRM Apple FairPlay DRM game C V Purchase Download Technical Protection No Technical Protection C V g1 No Sharing Sharing Action No Action g2 g3 No Sharing Sharing Action No Action g4 C V Sharing No Sharing Action No Action Conditional Technical Protection C C V V V: Content Owner C: Consumer

10 Would you agree or not agree to the following? Fully disagree Important to transfer files between devices I want to share music with friends and family Listening is more important to me than storing I am afraid that files will be unusable in future (in % of digital music users) (4,852 European consumers ) Disagree somewhat Agree somewhat Fully agree I want to resell purchased files 1541 Preferences of digital users 10 (Source: INDICARE/Berlecon Research, 2005) 4 5 Microsoft’s DRM Apple FairPlay

11 DRM and law (to protect consumer interests) DRM and the law in EU  Private copying exception Consumers who want to make a private copy for personal use will be not obliged to acquire the content owner's permission before doing so. The purpose of the copy may not be commercial. It is allowed that the consumer makes copying of legitimately obtained content on any device for private use.

12 To protect consumer interests (Content portability) (1/2) Tie the license to the authorized consumer instead of specific device Be bound to consumer’s private key  (Löytynoja et al., 2003)  (Chen et al., 2008) Be bound to smart card  (Lee et al., 2007 )  (Sun et al., 2007)  (Chen and Lee, 2008)

13  Challenges in the scheme with consumer’s private key or smart chard Share private key with other consumers May be duplicated, such as smart card cloning

14 To protect consumer interests (Content portability) (2/2) Be bound to biometrics  European Union’s report stated “…biometrics might be useful for DRM to replace code and/or password protected files in everyday life in year 2015”.  Biometric traits Need not remember Be extremely difficult to copy, share, and forge Require the consumer to be present

15 (Source: Zhang et al. 2006) Biometrics-based key release The content key is released if and only if the offered biometric sample matches the biometric template. (Wang et al., 2007) and (Zhang and Zhang, 2004) Biometric Matcher Biometric Template Key Decision Retrieve Key Key End Offer Biometric Sample Accept Reject

16  Completely decouple consumer authentication and key release in “biometrics-based key release”  Be vulnerable to Trojan horse attacks. (Source: Uludag et al., 2004)  Be costly if online connection to a remote storage is required every authentication  Be insecure because of theft of biometric template stored locally Challenges in “Biometrics-based key release”

17 Turning biometric into key Biometrics-based key generation  Extract/generate cryptographic key from biometrics Challenge  Not reproducible precisely each time biometric is measured  Acceptable biometric key length Biometric Fuzzy Extractor

18 The key length directly extracted from biometrics  140 bits with acceptable recognition performance (Hao et al., 2006)  938 bits with FRR=0.52% and FAR=0 (Zhang et al., 2009)

19 PinSketch  Sketch Given an input set A of any number of (nonzero) m-bit strings and a parameter t, the program “sketch” will produce as output a sketch of A of size tm bits. (Source: Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, “Fuzzy Extractor: How to Generate Strong Keys from Biometrics and Other Noisy Data,” SIAM Journal on Computing, Vol. 38, No. 1, pp , 2008.)

20 Biometric fuzzy extractor Key generation Extractor A Key Generation Public Store PinSketch  Sketch s Fuzzy Generation

21 PinSketch  Differ Then, if the size of the symmetric difference between sets A and B is at most t, the program “differ” will find the symmetric difference between A and B given only B and the sketch of A. (Source: Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, “Fuzzy Extractor: How to Generate Strong Keys from Biometrics and Other Noisy Data,” SIAM Journal on Computing, Vol. 38, No. 1, pp , 2008.)

22 Key reproduction Key Generation s Public Store B PinSketch  Differ dis(A, B) < t Extractor Reject YesNo Fuzzy Reproduction A

23 For example Assume A = {10, 21, 23, 33} Give s and B = {11, 21, 23, 33} 1. Set Difference = {10, 11} 2. if n in B and Set Difference, delete n in the both. SD = {10}; B’ ={21, 23, 33} 3. Recover A = {SD, B’ } = {10, 21, 23, 33} PinSketch  Differ s B A Set Difference SD Recover B’

24 The proposed DRM scheme with consumer’s interests Preliminary Protected Content Usage Rule+ Content Key Content Owner Distributor License Server

25 (s, ) Registration phase License Server Consumer Fuzzy Generation A s Key Generation

26 License obtainment phase License Server Consumer License

27 Play phase Consumer License Fuzzy Reproduction A s Key Generation Public Store (s, )

28 Play on an other device Consumer License Fuzzy Reproduction A s Key Generation Public Store (s, )

29 Conclusions  Protect consumer’ interests as well as content owners’ interests Design in line with consumers’ behaviors and needs – play at any where Provide super-distribution Focus on content owners’ remunerations for their creations Future works  Take other consumer’s interests into account Content sharing (in an authorized domain) Consumer privacy

Thanks for Your Attention!