Download presentation
Presentation is loading. Please wait.
Published byAllyson Grant Modified over 9 years ago
1
Streaming Media Digital Rights Management Class 8 July 18, 2006
2
Why do we have DRM? Content Concerns Digital audio and Video, if unmodified enables perfect duplication Low Cost or near-no-cost The original does not degrade over time (video tape and film) probably The original does not degrade with duplication so copies are limited only by resources
3
This is why owners of digital content are paranoid If the copy is as good as the original, why purchase the original?
4
The music industry points to slumping sales and cries “Pirates!”
5
Record companies usually blame the internet and file sharing as the root of their business failures. In 2003 27% or Americans and 13% of Europeans downloaded music through P2P networks.
6
The tangled web of the traditional music business
7
Peer-to-Peer Networks Where are they now?
8
More Information on file sharing and the music industry “On the reproduction of the musical economy after the Internet” Leyshon, Webb, French, Thrift & Crewe Media, Culture & Society, Vol. 27, 2005 Sage Publications
9
Security Most DRM have the following security features: Secure downloads Secure audio path – audio can’t be streamed from user’s computer Persistence – each license is specific to a particular computer Individualization – the license for a player is linked to a specific computer. You can’t just move the player and music to transfer the files Revocability – if a license is stored on a server it can be revoked if a user breaches the licensing terms Portable device support – files can be transferred, but most distributors will limit it to devices that support the Secure Digital Music Initiative (SDMI) copy- protection scheme
10
Payment Models Varities Pay-as-you-go (iTunes) Monthly fee for unlimited use (subscription) One-time fee Pay Per View (PPV) Free – promote a product or service Timed fee Tiered access Trial offer Reward program
11
Streaming media server vendors also sell DRM tools Music producers, media creators and retailers in particular want to ensure their copyrights are protected Typical DRM features include – Strong encryption – Producer defined business rules for accessing content – Content licensing verification (“Are you authorized to view this?”) – License auditing to track royalties – Support for handheld devices and mobile phones
12
Types of rules that may be a part of a DRM system When, how, where and for how long rights are granted Limited number of CD copies File can only be played on one computer What devices are supported for transfer (iTunes/iPod model)
13
For digital distribution to reach its potential copyrighted material needs to be protected System must be: – Truly secure – Flexible – Easy to use – Integrated into existing e-comerce systems
14
Many of the current systems are not very adequate because: – Not secure enough – passwords can be shared, registration code can be hacked – Not flexible enough – content providers want different models for subscription (monthly, pay per view, free trials) – Inconvenient for users – to work it must block unauthorized use but be easy for authorized users. Passwords and registration keys are lame – Difficult to integrate into a wide variety of devices and hardware – consumers want to transfer media they own to devices they own
15
Some companies (and marketers) use DRM to mean any sort of control of media – All forms of copy protection – Digital watermarks Real, Apple and Microsoft define it more narrowly
16
Apple uses standard MPEG-4 audio technologies (AAC) This how they deliver music to iPods and iTunes They use proprietary DRM approach (FairPlay) that is unique Each manufacturer uses a proprietary DRM system Once again, it is unlikely there will be an industry “standard”
17
Implementing DRM Here is a typical sequence of events: 1)Media provider packages the media file – create file and license 2)Provider places file on a streaming server 3)When user tries to play a file, media player requests a license 4)User’s computer downloads a license without any action or directs a user to a register/payment page 5)After the license is issued, the user can play the content under the terms of the license
18
DRM Models
19
Encryption Encryption scrambles the content so that it cannot be viewed Need a decryption key This is most often an enabled viewer or player Many DRM solutions are asynchronous The key is not in your player but somewhere out on the internet
20
Encryption cont. A user needs to perform a separate action or transaction to secure the decryption key The problem for content distributors is you can hack the player to play the media without a key
21
The Encryption Dance create encryption scheme scheme is hacked distribute scheme Distributors they claim each successive scheme becomes more expensive to create and manage
22
Walled Garden A walled garden is where content is secured behind a virtual barrier A user must purchase access Authorization/authentication system – Wall Street Journal, ESPN & New York Times They have a public site with content available to the public They have a premium content site where a user pays an annual or monthly fee for access. This is a popular model among religious sites
23
“Cheap and Easy Access” iTunes To keep something from being stolen make the price less than/equal to the cost of theft This relies on the honesty of the majority of potential users Make it cheap and easy and most folks are more likely to buy than steal Challenges Many consumers are conditioned that music is free (filesharing, radio, ripping) Value is difficult to establish when there is a ready supply, scarcity creates value Disney movie example For existing music the cat is out of the bag
24
PC Client Content/Download Managers Require consumers/users to download a management client on their computer This application connects to a dedicated service – a wholesale intermediary They can use ptp strategies to move the content to the consumer They can act as the DRM police Monitor and manage the user’s functions and actions on their computer They can enforce DRM irrespective of an internet connection
25
PC Client Content/Download Managers Bit Torrent Sony’s rootkit/CD copy protection debacle Privacy Issues / Data mining Digital Media permits intrusion & access on a massively efficient scale International reach of technology subjects networks to multiple cultures and laws (and multiple risks)
26
PC Client Content/Download Managers There is a push for Digital Licenses, separate from the media file and conforms to a standard format Separating a universal license from the media has many advantages It can accommodate many different licensing scenarios You don’t need to prevent file copying Because file is on a server the provider has complete control
27
Windows Media Rights Server End-to-end DRM system for Windows Media It supports a huge variety of security and business model options It delivers WMA and WMV files WMRM (Windows Media Rights Manager) includes server and client software development kits (SDK) so developers can write unique applications to encrypt files and issue licenses It does not play well with other platforms and older software
28
RealSystem Media Commerce Suite RealNetwork’s DRM solution The Packager – encrypts the media The License Server – issues content licenses Media Commerce Upgrade for Real Server – tracks the business side RealSystem Server plug-in – enables the service on a media server Like WMRM it enables a variety of business and distribution models
29
Flash
30
Flash Basics Macromedia’s Flash has been adopted as the de facto “rich media” solution in the industry It is used extensively in entertainment, games and advertising Graphics are essentially vector-based instructions Infinitely scalable in an interface
31
More Flash Basics Many companies now standardize embedded video on their sites as Flash Video Huge growth in handhelds and mobile delivery Flash files are called SWF (“swiff”) Files are closely tied to the authoring system
32
Even More Flash Basics Not really a codec SWF files contain graphics and instructions how to animate Drawing is done with math (x/y/z axis and vectors over time) Files are often smaller Not sending huge graphic files, just the parts and instruction on how to recompose the animation on the user’s computer
33
Will these Flash Basics Ever End? With QuickTime support and Macromedia’s integration of the Sorenson Spark codec SWF can be used as a container for video The header information of a file has most of the same data types as the other codecs we have reviewed – File version – Length of file – Frame size – Frame count
34
The End of Flash Basics As We Have Known Them Two main types of tags – Definition tags – define content – Control tags – control content For example, definition tag defines and triangle and the control tag will move it across the screen
35
OK, I lied, this really is the final Flash Basics Slide. Perhaps SWF files are a progressive format Blocks are sent in the order of use This allows the file to be essentially streamed Viewer can watch the parts as they arrive This can occur without special server software – no need for a media server A web server, the flash content and a flash player are the only requirements
36
Great Flash Video Example http://www.lebronsbikeathon.com/http://www.lebronsbikeathon.com/ Video #11 & #14
37
Flash Example & Workshop
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.