Digital Rights Management for Mobiles Jani Suomalainen Research Seminar on Telecommunications Business II Telecommunications Software and Multimedia Laboratory.

Slides:



Advertisements
Similar presentations
ContentGuard An Intellectual Property Company IPED Conference November 1, 2007 Presented By Eddie Chen CONTENTGUARD.
Advertisements

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 © 2010 Cisco and/or its affiliates. All rights reserved. 1 BYOD: Security, Policy.
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Rob Farraher Ken Pickering Lim Vu
© 2004 Mobile VCE 3G © 2004 Mobile VCE 3G th October 2004 Regional Blackouts: Protection of Broadcast.
ACCESS 2003 November 11, 2003 Spencer Gusick VP Intellectual Property Counsel Universal Studios If you build it, they will come… Delivery of Content to.
Online Content and Media
1 Windows Media Rights Manager and FairPlay Seminar Digital Rights Management Clara Fernández de Castro.
P l a c e h o l d e r T e x t1 OMA DRM 2.0 Status and Future Work Jan van der Meer (Philips) Chair OMA DLDRM
May 14, 2015 Context-Related DRM in the Mobile Networks A Master’s thesis research project done at Small Planet Ltd Antti-Jussi Kangas
1 Jeremy Wyant W3C DRM Workshop 23 January 2001 Establishing Security Requirements For DRM Enabled Systems.
Copyrights1 By Saud Al-Harbi & AbdulAziz Al-Shamrani.
Multi-PC, Networked, Broadband Households US: 19.2 M, Globally: 40+ M and growing Source: Microsoft Primary Research CountryHouseholds (millions) Broadband.
1 MPEG-21 : Goals and Achievements Ian Burnett, Rik Van de Walle, Keith Hill, Jan Bormans and Fernando Pereira IEEE Multimedia, October-November 2003.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Internet Resources Discovery (IRD) IBM DB2 Digital Library Thanks to Zvika Michnik and Avital Greenberg.
Digital Asset Protection in Personal Private Networks Imad Abbadi Information Security Group Royal Holloway, University of London
Jau-Wu Huang1 Digital Rights Management for Visual Content in Mobile Applications Trimeche, M.; Chebil, F.; Nokia Research Center Control, Communications.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Seven.
CONTENT PROTECTION AND DIGITAL RIGHTS MANAGMENT
Cloud Usability Framework
Digital Rights Management 5th Annual Wireless Java Conference January 21-23, 2004 Kevin Mowry, Motorola Chair, OMA Download and DRM group.
Windows Media DRM Device Ecosystem For Windows Vista Milan Gada – Program Manager Kevin Lau – Program Manager Windows Media (Content Access Technologies)
Digital Video Disk (DVD) Protection “Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application.
DVD Decryption What happened and is it ethical?. DVD CSS n The purpose of encrypting data on DVD. n The CSS Security Model. n How that security model.
Introduction to HASP ® Software DRM Solutions, Products, Benefits All Rights Reserved © Aladdin Knowledge Systems.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Advanced Access Content System (AACS) Industry Briefing July 14, 2004.
Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment Peter Scott Based on paper by S. E. Schechter, R. A. Greenstadt,
Matthew Rothmeyer. Digital Rights Management (DRM) “ A class of technologies that are used by hardware manufacturers, publishers, copyright holders, and.
Introducing Digital Rights Management Willms Buhse October 2002, Vilnius.
Donald M. Whiteside Vice President, Corporate Technology Group Director, Technical Policy and Standards ITU and EBU Presentation A perspective on trends.
IMA - Digital Libraries February 13, 2001 Slide 1 Multimedia Security: Is Their Hope In Securing Our Digital Future? Edward J. Delp Purdue University School.
1 ENC Encryption/ISO Julia Powell Office of Coast Survey Marine Chart Division.
Trusted Computing Or How I Learned to Stop Worrying and Love the MPAA.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Who owns the Bits? Digital copyright issues are continually evolving. IP address do not map to a single person – hard to trace user Music and movie industry.
Copyright Frost & Sullivan Mobile Digital Rights Management: Managing Rights, Managing Revenues Interactive Analyst Briefing Allison Webb 12 March 2003.
A bridge between standardisation and End-Users DMP workshop on "Development of and Access to Standards" Martin Springer 2004/07/12.
Android Mobile Security Krystal Salerno. Introductions.
1 Analysis of Consumer Issues and Paths for Concrete Approaches Dr. Carsten Orwat Forschungszentrum Karlsruhe in the Helmholtz Association, Institute for.
Applying Digital Watermarking Technology to Control CD copying BY CHAYAN RATTANAVIJAI.
Digital Rights Management (DRM) in the Mobile Environment T Research Seminar on Telecommunications Business Yrjö Raivio.
Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.
Networking Classification A network is two or more computers that are connected 1 There size 2 Their Servers.
HASP ® SRM Enabling Business Growth through Software Rights Management All Rights Reserved © 2007 Aladdin Knowledge Systems. Yariv Drory International.
György Kálmán, Josef Noll IEEE Symposium on Wireless Pervasive Computing, Santorini, Greece Speaker: 黃韋綸 User Controlled Content Access.
PWC ‘98 Tokyo, April Terminal Mobility in Broadband Networks Personal Wireless Communications ‘98 Olli Martikainen*, Esa Nyman**, Juhana Räsänen*,
Towards a Software Architecture for DRM Joint work with Kristof Verslype, Wouter Joosen, and Bart De Decker DistriNet research.
Mobile music Elina Vartiainen T Research Seminar on Telecommunications Business II Spring 2005.
Legal and Ethical Issues in Computer Security Csilla Farkas
Using Social Factors in Digital Rights Management 차병래.
IEEE History & Role in Advancement of Data Communications By Josiah Fink.
The Digital Media Project1 Leonardo Chiariglione.
OMA Secure Content Delivery for the Mobile World ODRL Workshop, Vienna Dr. Willms Buhse Vice Chair, OMA Download and DRM group.
Preparing Your Apps for Publication Test your app thoroughly on a variety of devices. The app might work perfectly using the emulator on your.
© 2015 Digital Rights Management in a 3G Mobile Phone and Beyond Thomas S.Messerges, Ezzat A. Dabbish ILKOO LEE.
Video Streaming vs Video Casting
Chapter 1- Introduction
Social, Legal, and Ethical Issues for Computing Technology
4. NCdisk SP-based SoC Architecture 5. NCdisk Security Protocol
ABYSS : An Architecture for Software Protection
Seminar on…. 5G Wireless Technology By: Niki Upadhyay
Mobile Commerce and the Internet of Things
Network management system
4K Content protection overview
Presentation transcript:

Digital Rights Management for Mobiles Jani Suomalainen Research Seminar on Telecommunications Business II Telecommunications Software and Multimedia Laboratory Helsinki University of Technology April 20th 2004

Jani Suomalainen / Digital Rights Management for Mobiles / Introduction The openness of multimedia capable mobile terminals for content (e.g. ringtones, music and video tracks, programs, games) has brought the piracy problem also to mobile content industry Digital Rights Management (DRM) is provisioning and storing content in such a manner that use and copying is authorized and controlled This presentation will provide a survey on: –DRM content provisioning strategies, –protection means, –actors affecting in the DRM economy from mobile terminals point of view

Jani Suomalainen / Digital Rights Management for Mobiles / Content Provisioning OMA DRM content delivery models try to fulfil all users’ requirements (trying not to make the use of DRM content more difficult than ‘free’ content): –basic download –streaming –sharing content between peers (super distribution) –using content with multiple devices (domain model) Wireless interface or hardware modules as delivery medium (wireless is the strategy used in OMA DRM)

Jani Suomalainen / Digital Rights Management for Mobiles / Content and Rights Identifying copy righted content from ‘free’ content is one of the fundamental problems of DRM OMA’s strategy is a separate delivery of rights and content - enabling diverse content delivery methods (see figure) Content issuer Rights issuer Mobile Terminal Other Mobiles Network Storage Removable Media Content object Right object Right object Content object Content object Right object Alternatively rights could be embedded to content (e.g. Watermarks)

Jani Suomalainen / Digital Rights Management for Mobiles / DRM Protection Threat examples Protective barrier Provisioning path of DRM data Means against distribution of pirated content: - fingerprints to track leakage - scanning and attacking distributors - P2P poisoning, DoS attacks Trusted Computing - HW based mandatory access control (Trusted Computing Group) - Assuring terminal trustworthiness (remote attestation) Access to content can be based on possession of - trusted hardware - encryption keys (CMLA for trusted OMA key distribution) Knowledge of ‘what is right’, threat of punishment and correct pricing will prevent normal users from acquiring ‘free’ content through awkward ways Reverse- engin. / transform. Copies from transport medium Copies from terminal Darknets (pirated content) Copying using analog means Mobile terminal Content producer Mobile user Proactive means - legislation -ethics -pricing Secure delivery - trusted hardware - encryption Terminal security - mandatory access control Reactive coun- ter attacks - legislation - hindering P2P

Jani Suomalainen / Digital Rights Management for Mobiles / Actors in the DRM Field Darknet Users Regulators Industry alliances Content producers Manufacturers Want content Want terminals without content usage restrictions Anti-piracy legislation Encourage competition Encourage competition Provides devices Want content availability Want DRM capable devices Provides content Provides guarantees of compatibility and trustworthiness Provides guarantees of compatibility and content availability

Jani Suomalainen / Digital Rights Management for Mobiles / Conclusions Technical and social means cannot weed piracy completely –Openness of mobile terminals is out of the ‘bottle’, terminals will be able to play free content –DRM content can be made to look like free content and will be available from somewhere DRM protection can only provide extra time and make piracy awkward Trends seem to direct us towards flexibility (user- friendliness) as well as industry wide trust model and compatibility

Jani Suomalainen / Digital Rights Management for Mobiles / Thank You! Comments, questions?