Download presentation
Presentation is loading. Please wait.
Published byJuliana Henderson Modified over 9 years ago
1
DRM Building Blocks - Protecting and Tracking Content Adopted from Chapter 5, Digital Rights Management Business and Technology
2
Outline A DRM Reference Architecture Content server License Server Client DRM Technologies Encryption Watermarking …
3
The DRM Reference Architecture Three major components of the DRM reference architecture Content Repository Product Information DRM Packager Rights Encryption Keys DRM License Generator Identities Content Package Content Metadata DRM Controller License Keys Rights Rendering Application Identity Content Server License Server Client
4
Content Server Content server is the component that is most likely to locate behind the content provider’s firewall, consisting Content repository Actual content Information about the products or services the content provider want to distribute DRM packager Functionality to prepare content for DRM-based distribution
5
Content Repository A content provider who implements a DRM solution has a repository of content, and the repository contains Content either in a suitable format for distribution or can be put into the correct format on demand Metadata Form a pragmatic viewpoint, the repository would be a file server or a database server
6
Product Info Content provider typically have catalogs of product information for their products in physical media. These contain metadata about products, such as Price Marketing information Format Physical dimension … Metadata exist both in content repository and product info databases
7
DRM Packager DRM Packager (content packager) Functionality that preparing content for distribution through the system The packager does its job when Before putting the content into the repository On-the-fly before distribution In addition to the content, two types of metadata are especially prevalent in DRM packages Identification Discovery
8
DRM Packager (cont.) Tasks of the packager Encryption (or at least tamperproof) on the content and the metadata Create description of the rights to the content on which the provider allow the users to exercise Modern DRM systems separate rights information from content packages by encapsulating the former in licenses Q: Why not bundle rights in with the content package? Multiple sets of rights for a given piece of content A set of rights applied to more than one pieces of content Certain types of content reside on the server only e.g. streaming media
9
The License Server Licenses contain information about The identity of the user or device that want to exercise rights to content Identification of the content to which the rights apply Specifications of those rights An analogy to DRM licenses in the real world is tickets for plane and trains.
10
The License Server (cont.) The license generator takes in the following components to produce the license Rights specifications Encryption keys Identity From the DRM packager
11
The Client The DRM controller does the following things: Receives the user’s request to exercise rights on a content package Gathers the user’s identity information and obtains a license from the license server Authenticates the application that perform the rights exercise, such as rendering Retrieve encryption keys from the license, decrypts the content, and releases it to the rendering application
12
DRM Events on the Client Side The DRM controller on the client side has to check the rendering application at some time To avoid making unauthorized copies To check certain rights limits Content Repository Product Information DRM Packager Rights Encryption Keys DRM License Generator Identities Content Package Content Metadata DRM Controller License Keys Rights Rendering Application Identity Content Server License Server Client (1) Obtaining the content package (2) Activating the DRM controller (3) Sending info to the License Server (4) Authenticating the client’s identity (5) Look up rights info. (6) Financial transactions (7) Generating the license (8) Sending back the license (9) Decrypting the content and releasing it to the rendering application
13
Rendering Applications Types of rendering applications Stand-alone rendering application Installation and training may stop common users Distribution can cause problems Plug-in Users get it with more motivations and less trouble Not as secure as one that is purpose-built Java technology No installation is needed The “write once, run anywhere” promise was never delivered
14
Identifications For Users A piece of information that you supply, such as name, E-mail address, ID, password…etc A piece of information inherent to you, such as a biometric Digital certificate, network passport… For devices Serial numbers on components, such as IP, MAC address, or serial number on HDD Considerations Privacy Dynamic or non-unique nature
15
Streaming Content Current low-quality streaming content may not needed to be protected Poor quality Large volume for raw-saved file Packet loss With the advanced H/W performance and the improved infrastructure, the protection of streaming data will be an important issue
16
Encryption Encryption in DRM The most common means for copy protection The core technology most closely associated with DRM Everyone has heard about encryption, few people really understand it Goals of encryption in DRM To prevent content from being accessible in its native format all the time except when the DRM controller permits it
17
Strength of Encryption Strength of Encryption The length of time it would take for a cracker to break it using a brute-force attack Key length The algorithm’s susceptibility to various clever forms of cryptanalysis Heuristic guesses Patterns of random numbers System holes Human fallibility
18
Encryption Schemes in DRM Public-key encryption Too inefficient to encrypt content E.g. RSA Symmetric-key encryption Popular for content encryption DES AES Magnolia
19
Temper-proofing Hash values (digest) can be used to ensure that contents of the file is not tempered …We will meet at school on May 31, 2002… Digest Algorithms Key 71123223234 …We will meet at school on May 31, 2003… Digest Algorithms Key 12940575753
20
Digital Certificates Certificates are important ways of establishing the identities of both users and organizations CA-the organizations that create, store, and manage digital certificates, have business that fundamentally depend on their being trustworthy CA will lost its business if Allowing a user to create a certificate under false circumstances Allowing a data inside the certificate to be tampered with Leaking the information inside the certificate to the third party
21
Digital Signatures Combining both certificates and digests A digital signature ensures both the content of a message and the identity of the person who signs it According to the Electronic Signature Act signed into law in 2000, digital signatures are now legally acceptable replacement for handwritten signatures Usually implemented with public-key encryption
22
Watermarking Watermarks are meant to convey some information about a document in a way that Do not interfere with the appearance or readability of the document Inextricably bound together with the document Characteristics Undetectability Robustness Capacity Security Efficiency
23
Watermarks v.s. Encryption Music Metadata Encryption DRM Packager Music Metadata DecryptionPlayer Metadata DRM Controller Music Metadata Watermark Embedding DRM Packager Music Metadata Watermark Extraction Player Metadata Watermarked File
24
Watermark and Decryption DRM Controller Music Metadata Watermark Embedding DRM Packager Music Metadata Watermark Extraction Player Metadata Watermarked File Encryption Music Metadata Decryption Music Metadata
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.