Presentation is loading. Please wait.

Presentation is loading. Please wait.

The MediaSnap ® Digital Rights Management System Priti Sabadra and Mark Stamp Department of Computer Science San Jose State University.

Similar presentations


Presentation on theme: "The MediaSnap ® Digital Rights Management System Priti Sabadra and Mark Stamp Department of Computer Science San Jose State University."— Presentation transcript:

1 The MediaSnap ® Digital Rights Management System Priti Sabadra and Mark Stamp Department of Computer Science San Jose State University

2 DRM2 This talk…  MediaSnap, Inc.  What is DRM?  Overview of MediaSnap DRM system  Conclusions

3 DRM3 What is DRM?  “Remote control” problem  Digital book example  Digital music, video, documents, etc.  Privacy

4 DRM4 Persistent Protection Restrictions on use after delivery  No copying  Limited number of reads  Time limits  No forwarding  etc.

5 DRM5 What to do?  The honor system (The Plant)  Give up (HIPAA, etc.)  Lame software-based DRM  Better software-based DRM  Tamper-resistant hardware http://www.cl.cam.ac.uk/%7Erja14/tcpa-faq.html http://www.cl.cam.ac.uk/%7Erja14/tcpa-faq.html

6 DRM6 Current state of DRM  Security by obscurity (at best)  Secret designs (Kerckhoff’s Principle?)  Is crypto the answer?  “Whoever thinks his problem can be solved using cryptography, doesn’t understand his problem and doesn’t understand cryptography.” --- Attributed by Roger Needham and Butler Lampson to each other

7 DRM7 MediaSnap’s DRM system  Secure Document Server (SDS)  PDF plugin (or reader)  Security stuff…

8 DRM8 Protecting a document SDS Recipient Sender encrypt persistent protection

9 DRM9 Security issues  Server (SDS)  Protect keys, authentication data, etc.  Apply persistent protection  Client (Reader/PDF plugin)  Protect keys, authenticate, etc.  Enforce persistent protection

10 DRM10 Document reader security Obscurity Tamper-resistance

11 DRM11 Obscurity  Key management  Authentication  Caching (keys, authentication, etc.)  Encryption and “scrambling”  Key parts (data and code)  Multiple keys

12 DRM12 Other security features  Module tamper checking (hashing)  Anti-screen capture  Watermarking  “Unique-ification”  Code “fragilization”  OS issues

13 DRM13 Conclusions  Current DRM systems are weak  Ideal software-based DRM features…  Individual content is non-trivial to attack  Overall system survives repeated attacks  Is this possible?

14 DRM14 More info…  M. Stamp, Digital rights management: The technology behind the hype, to appear in Journal of Electronic Commerce Research, http://home.earthlink.net/~mstamp1/papers/DRM.doc http://home.earthlink.net/~mstamp1/papers/DRM.doc  M. Stamp, Risks of digital rights management, Communications of the ACM, http://www.csl.sri.com/users/neumann/insiderisks.html#147 http://www.csl.sri.com/users/neumann/insiderisks.html#147  M. Stamp, Digital rights management: For better or for worse?, ExtremeTech, http://www.extremetech.com/article2/0,3973,1051610,00.asp http://www.extremetech.com/article2/0,3973,1051610,00.asp


Download ppt "The MediaSnap ® Digital Rights Management System Priti Sabadra and Mark Stamp Department of Computer Science San Jose State University."

Similar presentations


Ads by Google