Digital Rights Management

Size: px
Start display at page:

Download "Digital Rights Management"

Transcription

1 Digital Rights Management Master s thesis in Image Coding by Cristina García Valverde and Rubén Cano Collado Report nº LITH-ISY-EX Date:

2

3 Digital Rights Management Master s thesis in Image Coding by Cristina García Valverde and Rubén Cano Collado Report nº LITH-ISY-EX Date: Supervisors: Karl-Göran Stenborg and Jacob Löfvenberg Examiner: Robert Forchheimer Linköping

4

5 Avdelning, Institution Division, Department Institutionen för Systemteknik LINKÖPING Datum Date Språk Language Svenska/Swedish X Engelska/English Rapporttyp Report category Licentiatavhandling X Examensarbete C-uppsats D-uppsats Övrig rapport ISBN ISRN LITH-ISY-EX Serietitel och serienummer Title of series, numbering ISSN URL för elektronisk version Titel Title Digital Rights Management Författare Authors Cristina García Valverde and Rubén Cano Collado Sammanfattning Abstract Nowadays, one of the main issues for the enterprises that are interested in e-bussiness is to protect their Intellectual Properties (IP) against illegal uses, that is, to guarantee, thanks to the Digital Rights, that only the users which have those Digital Rights granted can enjoy such IPs. The DRM systems emerge towards this end. This thesis will study the different steps that are followed in order to develope a DRM Solution: the framework, the requirements, the identifiers and metadata (data about data) of the IP, a standard language to express the rights (<indecs> project) and the available tools to develop the DRM Solution. To conclude, we will study a practical example of Open Proposal: OpenIPMP, and we will draw the relevant conclusions. Nyckelord Keyword DRM, IP, metadata, identifiers, interoperability, persistence, <indecs> project, rights, trusted system, DOI, ODRL, XML Security Standards, XrML, OpenIPMP.

6

7 Acknowledgements We would like to thank Magnus Andrén and our supervisors Karl-Göran Stenborg and Jacob Löfvenberg for their support in the development of this thesis. We also want to thank our supervisor Robert Forchheimer who has done everything possible in order to help us.

8

9 Abstract Nowadays, one of the main issues for the enterprises that are interested in e-bussiness is to protect their Intellectual Properties (IP) against illegal uses, that is, to guarantee, thanks to the Digital Rights, that only the users which have those Digital Rights granted can enjoy such IPs. The DRM systems emerge towards this end. This thesis will study the different steps that are followed in order to develope a DRM Solution: the framework, the requirements, the identifiers and metadata (data about data) of the IP, a standard language to express the rights (<indecs> project) and the available tools to develop the DRM Solution. To conclude, we will study a practical example of Open Proposal: OpenIPMP, and we will draw the relevant conclusions.

10

11 Table of Contents 1. Introduction and Background What it is and why it is needed DRM: Distribution Value Chain Digital Rights Management: Technical description Architecture and Framework Summary Functional Architecture Information Architecture Modeling the entities Identifying and describing the entities Expressing rights statements Software Application Architecture Requirements Summary Digital Asset Management Trusted Systems Expression Language Protection Conditional Access Systems DRM Systems Software Protection Technologies Trading Architectures Identification and Metadata Summary The relationship of Identifiers and Metadata Identifiers Unique identification Different concepts of what an identifier is Namespaces as a way of Managing Identifiers Granularity Aids to Identifier Use: Readability and Check Digits Resolution Persistence DRM Identifier Implementations Require Metadata...54

12 2.4. The <indecs> project Summary Well-formed Metadata The <indecs> initiative: an Overview Interoperability Types of Interoperability The limits of Technology Intellectual property metadata The <indecs> Metadata Framework Characteristics of the <indecs> framework Principles Metadata Model Metadata Dictionary Creating Interoperability: Mapping Metadata Directory of Parties Metadata Registry DRM Implementations Summary Existing Languages Open Digital Rights Language (ODRL) ODRL Definition ODRL Scope ODRL Expression Language ODRL XML Syntax Digital Object Identifier (DOI) DOI Definition DOI Syntax DOI System DOI Explained How the DOI complements DRM DOI Implementation XML Security Standars XML Digital Signature XML Encryption Security Assertion Markup Language (SAML) XML Access Control Markup Language (XACML) XML Key Management Services (XKMS) Extensible Rights Markup Language (XrML) Introduction XrML data model XrML basic data constructs Structure and organization of the language System features of the language...115

13 4. OpenIPMP Summary Specifications Technology Overview Components Download software requirements OpenIPMP Source Server Java MySQL ANT JBOSS EJBCA OSMS Microsoft Visual C MPEG4IP Client Installation and Experiments Installation Server Client Experiments User Registration Encoding Playback Conclusion 137 Bibliography 139

14

15 List of Figures FIGURE 1.1. Distribution Value Chain...2 FIGURE 2.1. DRM Functional Architecture...7 FIGURE 2.2. Core Entities Model...10 FIGURE 2.3. Creation Structural Types: Descriptive Data...11 FIGURE 2.4. Parties model...12 FIGURE 2.5. Primary Entity Relationships: Integrated Data Model...14 FIGURE 2.6. Rights Expression Model...15 FIGURE 2.7. Generic DRM Software Application Architecture...16 FIGURE 2.8. DRM processes between Server and User...17 FIGURE 2.9. Logical Model of a Digital Asset...20 FIGURE Encryption and decryption...29 FIGURE Conventional Encryption...30 FIGURE Public Key Encryption...32 FIGURE Simple Digital Signatures...33 FIGURE Software Security Dongles...34 FIGURE Principle of Individual Video Watermarking...37 FIGURE Interoperability of watermarking in the uncoded and coded domain...38 FIGURE Broadcasting of video with individual watermark embedding at the receiver side...39 FIGURE 3.1. ODRL Foundation Model...74 FIGURE 3.2. ODRL Permission Model...76 FIGURE 3.3. ODRL Constraint Model...78 FIGURE 3.4. ODRL Requirement Model...80 FIGURE 3.5. ODRL Condition Model...81 FIGURE 3.6. ODRL Rights Holder Model...81 FIGURE 3.7. ODRL Context Model...83 FIGURE 3.8. ODRL Offer Model...83 FIGURE 3.9. ODRL Agreement Model...84 FIGURE ODRL Revoke Model...85 FIGURE ODRL Encryption Model...86 FIGURE ODRL Digital Signature Model...87 FIGURE DOI Syntax...90 FIGURE DRM process flow...96 FIGURE The DOI Directory...97 FIGURE Components of an XML Signature...99 FIGURE XML Data structure without encryption FIGURE XML Data structure fully encryted FIGURE The SAML Domain Model FIGURE SAML Request-Response Protocol...106

16 FIGURE Data-flow diagram FIGURE XACML context FIGURE Relationship between XML DSig, XML Encrypt and the XML Key Management Services FIGURE XrML data model FIGURE XrML license model FIGURE XrML organization FIGURE XrML trust model FIGURE 4.1. EJBCA Architecture FIGURE 4.2. OpenIPMP Login FIGURE 4.3. OpenIPMP Register New User FIGURE 4.4. OpenIPMP Acquire Keystore FIGURE 4.5. OpenIPMP Registered Content FIGURE 4.6. OpenIPMP Licenses FIGURE 4.7. Mp4creator command line FIGURE 4.8. GUI Player...135

17 List of Tables TABLE 2.1. Creations: Structural Types...11 TABLE 2.2. Rights Expressions...14 TABLE 2.3. Main Iniciatives with which <indecs> has communicated...59 TABLE 2.4. Mapped in the development of the <indecs> model...65 TABLE 4.1. Standards that have been employed in OpenIPMP...121

18

19 Chapter 1 Introduction and Background 1.1. WHAT IT IS AND WHY IT IS NEEDED "Digital Rights Management (DRM) involves the description, identification, trading, protection, monitoring and tracking of all forms of rights usages over both tangible and intangible assets -both in physical and digital form- including management of Rights Holders relationships." [1]. The need of security and safe in electronic distribution of digital contents makes that Digital Rights Management (DRM) grows as an emerging and vital business concept. In its purest form, DRM provides a technology platform to allow trusted packaging, flexible distribution and managed consumption of digital content over electronic networks. DRM technology provides content owners, service providers, distributors and retailers with a safe, secure method for meeting the consumer s need for interactive, on-demand access to movies, online games, books, music, software and propietary data (virtually any type of digital media). It is important to note that DRM is the digital management of rights and not the management of digital rights. That is, DRM manages all rights, not only the rights applicable to permissions over digital content. In order to find solutions to digital piracy, technology companies have spent hundreds of millions of dollars and thousands of engineering hours.there is not single solution that will solve all threats of piracy in all circumstances. Developing these technologies involves complex engineering efforts and it is the best interest for all content industries to work cooperatively. 1

20 1.2. DRM: DISTRIBUTION VALUE CHAIN The objectives for managing content rights in the traditional media world include: protecting the content and avoiding piracy, enabling revenue through outright purchase or licensing, reinforcing traditional media brands and learning more about company s audience. This is so difficult to get in the digital world. Content creation, packaging and distribution have new meanings in the Internet economy. Content conversion, digitization, compression and storage technologies have created new oportunities and efficiencies, for media and information, to be archived, repackaged and redistributed through electronic channels (e.g., the Internet, extranets, cable, terrestrial broadcasts or satellites). As content becomes more widely available in digital form, it becomes even easier to distribute, share, copy and alter if it is improperly meta-tagged (unique identifying tags related to media format, creator, usage and distribution rules) and encrypted throughout the digital distribution value chain. This brings an exponential increase in the threat of piracy and the loss of revenue for original content owners and producers. Now that electronic content can be copied much more easily, content owners have a greater need for content control. IP authentication and password access are not able to protect the content from being duplicated or shared, thus creating a need for greater rights management controls. At the same time, digital media distribution can bring a variety of new business opportunities for owners or generators of content who incorporate the right technologies to control their digital media distribution value chain [2]. Content, Creators and Rights Owners Packaging Service Providers, Distributors and Retailers Clients or Consumers Sponsors / Advertisers FIGURE 1.1. Distribution Value Chain The Distribution Value Chain shows the need for a safe and secure method for accesing, distributing and merchandaising digital content. It is important to notice the following aspects of each link of the chain [3]: 2

21 Content, Creators and Rights Owners: - Safeguards copyright integrity. - Assures revenue generation. - Expands business model alternatives. - Protects brand identity. Service Providers, Distributors and Retailers: - Maximizes business opportunities. - Protects revenue streams. - Minimizes risk of unauthorized distribution. - Expands potential customer base. Clients or Consumers: - Expands digital content choices. - Simplifies authorized playback. - Allows full-featured user experience. - Facilitates authorized portability between devices. 3

22 4

23 Chapter 2 Digital Rights Management: Technical description 2.1. ARCHITECTURE AND FRAMEWORK SUMMARY The basic responsibility of a standards organization is to construct reference architecture. However, it is also necessary to create a mechanism that takes into account the innovation and the future growth of technological developments. This concept is embodied in the guiding principle adopted by several organizations with which the owner of the media contents (music and video) has been associated; a specification shall not preclude any technological solution that provides the requisite functionality demanded by the industry stakeholders. Components must be constructed in a modular manner and integrated into a flexible architecture so that the specification may survive. It is also necessary to develop a common language or structure that facilitates discussion of complex issues by parties with widely divergent points of view and vocabularies in order to implement any standardized scheme for the management of rights in digital environment. In this section we will study several architectures in order to define and give a framework to the DRM Solutions: Functional Architecture The Functional Architecture tries to modeled the total DRM framework in order to build digital rights-enable systems. It is a vision, in three areas, of how to manage the creation of content, the trade of the content and the use of the content. It stipulates, also, the roles and the behaviour of these three areas of Intellectual Property (IP). 5

24 Information Architecture The Information Architecture is a more flexible model to describe DRM framework. In order to do this description, this architecture take into account three main steps: to model the entities, to identify and describe them and to express the rights statements. This architecture tries to model the entities and their relationships. To do that, it defines the three core entities: Users, Content and Rights. Once the entities have been defined, it is necessary to express the rights that will be applied to the transactions between them (the Rights Expressions). The Information Architecture also evidences the need of a standard, like Open Digital Rights Language (ODRL), that models the Rights Expressions and their relationships because these Rights Expressions can became complex very quickly. Software Application Architecture The Software Application Architecture is a model from the technological point of view. It tries to explain different points: - The steps to get a correct, safe and security transaction: metataging, encryption, permissions... - The components of a typical DRM Software Architecture: content server, license server and client software. - The process of a DRM transaction: the differents steps between the server and the user since the user asks for the content until he receives it. These three different architectures give us a general vision, from different points of view (Intellectual Property (IP), entities and technological) of the DRM framework. Reference [4] has been one of the most important sources of information for this section FUNCTIONAL ARCHITECTURE The total DRM framework adapted to building digital rights-enabled systems can be modeled in three areas: Intellectual Property (IP) Asset Creation and Capture: How to manage the creation of content so it can be easily exchange. This includes asserting rights when content is first created (or reused and extended with appropiate rights to do so) by various content creators/providers. 6

25 IP Asset Management: How to manage and enable the trade of content. This includes accepting content from creators into an asset management system (we will see in section : Digital Asset Management). The trading systems need to manage the descriptive metadata and rights metadata (e.g. parties, usages, payments, etc.). IP Asset Usage: How to manage the usage of content once it has been traded. This includes supporting contraints over traded content in specific desktop systems/software. The Functional Architecture provides a framework for the modules to implement DRM functionality (Figure 2.1.). So that, the Functional Architecture stipulates the roles and behaviour of a number of cooperating and interoperating modules under the three areas of Intellectual Property (IP): Asset Creation, Management and Usage. DRM Architecture IP Asset Creation Capture IP Asset Management IP Asset Usage Rights Validation Rights Creation Repository Trading Permission Management Tracking Managementt Rights Workflow Metadata Content Payments Fulfilment Parties Rights Works Licenses Packaging FIGURE 2.1. DRM Functional Architecture The IP Asset Creation and Capture module supports: Rights Validation: this is a part to ensure that content being created from existing content (e.g. a copy) includes the rights to do so. Rights Creation: to allow rights to be assigned to new content, such as specifying the rights owners and allowable usage permissions. Rights Workflow: this part is to allow that the content can be processed through a series of workflow steps for review and/or approval of rights (and content). 7

26 The IP Asset Management module supports: Repository functions: to allow the access/retrieval of the content in potentially distributed databases and the access/retrieval of metadata. The metadata covers Parties, Rights and descriptions of the Works. (See the Information Architecture section for more details). Trading functions: to enable the assignment of licenses to parties who have traded agreements for rights over content, including the payments from licenses to rights holders. In some cases, the content may need to go through fulfillment operations to satisfy the license agreement. For example, the content may be encrypted/protected or packaged for a particular type of desktop usage environment. The IP Asset Ussage module supports: Permissions Management: this is a part to enable the use associated with the content in accordance with the rights. For example, if the user only has the right to view the document, then printing will not be allowed. Tracking Management: it function is to enable the monitoring of the usage of content where such tracking is part of the agreed to license conditions (e.g., the user has a license to play a video ten times). This module may also need to interoperate with the trading system to track usage or to record transactions if there is payment due for each usage. These three modules and their relationships provide the core functionality for DRM systems. The modules have been described only at a high level, and they would also need to operate within other, existing e-business modules and Digital Asset Management modules (that we will study in section: Digital Asset Management). Additionally, the modules would support other principles, requirements and characteristics, like interoperability, persistence, granularity, etc., that we will describe in next sections. The Functional Architecture is only one of the models that exist in order to describe the DRM framework. The fast advance of technological development causes that Rights Management can become complex. For this reason, DRM systems must support the most flexible model possible to provide these complex and layered relationships. The Information Architecture provides this [4] INFORMATION ARCHITECTURE The Information Architecture is another model to describe DRM framework, but more flexible. The development of this model consists in three main issues: Modeling the entities Identifying and describing the entities Expressing the rights statements They will be describe in the next sections. 8

27 MODELING THE ENTITIES It is important to adopt a clear and extensible model for the DRM entities and their relationship with other entities. There are currently four major active communities of rights-holders directly confronting these questions: based in the book and electronic publishing sector works the DOI community; the IFPI community of record companies; the ISAN community for producers, users, and rights owners of audiovisuals; and the CISAC community of collecting societies for composers and publishers of music, but also extending into other areas of authors' rights, including literary, visual, and plastic arts [5]. DOI (Digital Object Identifier) is a term that embraces a set of related initiatives centred on a persistent digital identifier (the DOI), a technology (Handle by the Corporation for National Research Initiatives,CNRI), and an organisation (the International DOI Foundation). Metadata definition has become a major issue for the DOI. MUSE is an EC-funded initiative of the record industry scheduled to announce (around October 1998) a secure means of encoding and protecting identifiers within digital audio. It is linked to the ISRC (International Standard Recording Code), and the project includes the specification of ISRC-related metadata. ISAN (International Standard Audiovisual Number) is backed by the film industry and collecting societies and is currently in draft in ISO TC46 sc9. It will be the backbone of several industry databases and related metadata sets. The CIS (Common Information System) plan is a copyright society-led international standardisation programme based on the integration of identifiers and related metadata to support efficient licensing and royalty distribution. Existing work in this area includes the <indecs> (Interoperability of Data in E- Commerce Systems) project [6]. The basic principle of the <indecs> model is to clearly separate and identify the three core entities: Users, Content and Rights, as shown in Figure 2.2. We will study this in section 2.4: The <indecs> project. Another view of <indecs> is the Commerce one. The cycle of making and using can go round and round indefinitely, although ultimately there will be end users who simply perceive or enjoy a creation with one or more of their senses. In the framework this gives rise to three basic types of commerce entity: Parties, Creations and Transactions. In the core entities model we can identify, as we said before, three parts [4]: Users entity: It can be any type of user, from a rights holder to an end-consumer, an agent undertaking an activity or task in a creative or commercial event. Content entity: that is any type of content at any level of aggregation, the output of creative activity. Rights entity: is an expression of the permissions, constraints, and obligations between the Parties and the Creations, an event determining or recording the use of possible use of an entity. 9

28 This model provides the greatest flexibility when assigning rights to any combination or layering of Users and Content. The Core Entities Model also allows Creations from being used in new and evolving business models. USERS Make Used by CONTENT do about RIGHTS FIGURE 2.2. Core Entities Model We could analyse the relationships, the rights and the descriptive metadata about the three entities. This metadata needs to include a mechanism to relate the entities to each other. The need for integration of metadata and rights management could be support for three propositions that set out a possible framework for an integrated approach. It based on models developed in the CIS plan and the DOI Rights Metadata group, and work on the ISRC, ISAN and ISWC standards and proposals [5]. The three propositions are: 1. DOI metadata must support all types of creation. 2. The secure transaction of requests and offers data depends on maintaining an integrated structure for documenting rights ownership agreements. 3. All elements of descriptive metadata (except titles) may also be elements of agreements. The main consequences of these propositions are: 1. A general and standard vocabulary is essential. 2. Non-confidential terms of rights ownership agreements must be generally accessible in a standard form. By this way, the network must be able to automatically determine the current owner of any right in any creation for any territory. 3. All descriptive metadata values (except titles) must be stored as unique, coded values. If we take into account these propositions, the implications on the behaviour and the future inter-dependency of the rights owner and content communities (audiovisual, visual, text ) are considerable. The CIS plan uses the generic term creation to denote a product of human imagination and/or endeavour by one or more Parties in which Rights may exist [5]. The term has the advantage that it does not carry much baggage. It is free of the connotations or legal matters of the narrower term work and it has not been employed in any specific sector until now. It is now employed as a basic term in the vocabularies of CIS, DOI and in the IMPRIMATUR business model. 10

29 Creations appear to come in four main structural types [5]: Structural type Medium (material) Examples Means of identification Package Physical (atoms, a single exemplar instantiation of an object) Book, CD, video, photograph, painting Printed text or barcodes (e.g., UPC/EAN, ISBN, ISSN, ISMN) Object Digital (bits, the digital embodiment of a performance of a work) Text, picture, audio, av file Digitally encoded (e.g., ISRC, ISAN, DOI ) Performance Spatio-temporal (actions, the intellectual or artistic realization of a work) Live performance of work, broadcast of recording In metadata only Work Abstract (concepts, ideas, a distinct intellectual or artistic creation) Musical composition, literary work In metadata only (e.g., ISWC, ISAN) TABLE 2.1. Creations: Structural Types Each structural type of creation may be manifested in any other. The same principles apply in audiovisual, visual, text and other primary types. The generic structural relationships are modelled in Figure 2.3. Physical Package Spatio- Temporal Performance Object Digital Relationships Work Abstract FIGURE 2.3. Creation Structural Types: Descriptive Data We could also say that creations can be said to be nested within each other: this also applies to creation of the same type (such as acts in a play or movements in a symphony). The phenomenon of nesting is the norm for most works, not the exception. When one creation is traded, a complex network of them may in fact be traded. A single multimedia creation may nest hundreds of audiovisual works, graphics, texts, audio recordings and all their underlying abstract compositions and works: often thousands of distinct creations with rights owners attendance. 11

30 E-commerce creates the ability for each component creation to be individually discovered, identified, offered, acquired and for the resulting transaction to be accounted to source, although it does not mean anything new about the relationships in themselves. This scalability has different implications. The creations can be used, adapted or combined in several ways with electronic tools in an environment which will be accessible in time to billions of users. For that reason, the issues of secure protection and billing are very important. However, under the analysis being carried out within the communities identified above and by those who are developing technology and languages for rights-based e-commerce, it is becoming clear that functional metadata is also a critical component. It is metadata (including identifiers) which defines a creation and its relationship to other creations and to the parties who created and variously own it; without a coherent metadata infrastructure e-commerce cannot properly flow. Securing the metadata network is every bit as important as securing the content, and there is little doubt which poses the greater problem [5] IDENTIFYING AND DESCRIBING THE ENTITIES Generically, we call Parties to people and companies, as shown in Figure 2.4. (a simpler form of the CIS term Interested Party). Names as identifiers are helpful for discovery but inadequate for secure identification and dangerous as a basis for automated e-commerce transactions because they are not unique, for this reason the parties require unique structured identifiers. Parties Author Corporate Agent Publisher FIGURE 2.4. Parties model Because parties may make creations and own rights of any kind, party metadata must be adaptable to all creation types [5]. We need to identify and describe all entities. Identification should be done via open and standard mechanisms for each entity in the model. Both the entities and the metadata records about the entities must be identifiable. Open standards such as Uniform Resource Identifiers (URI) and Digital Object Identifiers (DOI) (that we will study in section 3.2.2) and the emerging ISO International Standard Textual Work Code (ISTC) are typical schemes useful for Rights identification. 12

31 For describe each different type of Content, it should be used the most appropriate metadata standard (for example, the EDItEUR ONIX standard (ONIX) for books (physical and electronic) and the IMS Learning Resource Meta-data Information Model (IMS) for educational learning objects). Such metadata standards do not themselves try to include metadata elements in order to address rights management information, for this reason, it could be a problem how to describe such rights expressions. For example, the ONIX standard has elements for a number of rights holders (e.g., Authors and Publishers) and Territories for rights and single Price information. (The latter poses a problem in setting multiple prices depending on what rights are traded). In such cases, following the <indecs> model should take precedence. To describe Users, vcard (VCARD) is the most well-known metadata standard for describing people and (to some extent) organizations. Rights model has to explain and fix the roles that Parties have with respect to Content [4]. At the present time, ownership and exploitation of rights in different creation-types is the norm. The majority of the enterprises in the different sectors do e-business with text, pictures, graphics, photographs, audiovisuals and sound recordings and, in general terms, there are no essential operational differences between them. So, the metadata framework has to cover all their requirements. It should also be considered that, in operational terms, there may be little or no difference between the digital transactions of different e-business enterprises EXPRESSING RIGHTS STATEMENTS People that make Creations have to assign Rights in them to other people or companies through Agreements. CIS defines a Right as the authority originating in law or by international convention for a Party to do or to authorise another Party to do a defined act to a Creation [5]. An agreement is a written or unwritten accord between Parties which determines Rights or entitlements in relation to Creations for a given Place and Time [5]. Figure 2.5. shows these relationships, which models the fundamental entity relationships that form an integrated model. Agreements cover everything from a copyright act at one extreme to the terms of a single download transaction at the other. 13

32 Component Party Creation Component Relationship Relationship PARTY Contributor CREATION Party Schedule AGREEMENT Component Agreement Term Term Term PLACE RIGHT TIME FIGURE 2.5. Primary Entity Relationships: Integrated Data Model A grant (or refusal) of rights can describe every transaction that involves creations, even where the rights are in the public domain. These transactions can be described in the same terms for physical packages, digital objects or abstract works, although the grant of rights have to go with different consequences for different structures. The Rights entity allows transactions to be made about the allowable permissions, constraints, obligations, and any other rights-related information about Parties and Creations. By this way, the Rights entity is critical because it represents the expressiveness of the language that will be used to inform the rights metadata. It is necessary to model rights expression and the relationships between them, because rights expressions can become complex quickly. Open Digital Rights Language (ODRL) (that we will study in section) is a very good example of that [5]. As shown in Figure 2.6., Rights expressions should consist of: Permissions/usages Constraints Obligations Rights Holders Rewards What you are allowed to do Restrictions on the permissions What you have to do/provide/accept Who is entitled to what What you obtain TABLE 2.2. Rights Expressions 14

33 For example, a Rights expression may say that a particular video can by played (i.e., a usage permission) for a maximum of 10 times (i.e., a count constraint) in any semester (i.e., a time constraint) for a $10 fee (i.e., an obligation to pay). Each time the video is played, John, Mary, and Sue (the rights holders) receive a percentage of the fee. Usually, if a right is not explicit in an expression, it means that the right has not been granted. This is a critical assumption made by Rights languages and should be made clear to all Users. For an example of a rights language, see the Open Digital Rights Language (ODRL). ODRL lists the many potential terms for permissions, constraints, and obligations as well as the rights holder agreements. As such terms may vary across sectors, rights languages should be modeled to allow the terms to be managed via a Data Dictionary and expressed via the language [4]. Percentage Fixed Rewards Rights Holders Count Quantity Pay Tracking Obligations RIGHTS Constraints Territory Devices Loyalty Points Usages Time Play Lend Print Reuse FIGURE 2.6. Rights Expression Model SOFTWARE APPLICATION ARCHITECTURE From the technological point of view, we have to follow different steps to do a correct and safe transaction: First step: once the assets have been created it is necessary to provide a flexible DRM technology strategy capable of meta-tag the assets and store them in databases and media asset management technologies. Second step: the information, after the assets are metatagged, is encrypted to ensure the security of the content. Third step: once we have obtained the permissions and authorizations that we need to, the content can be transmitted (a decrypted key unlocks protected content) and displayed in a secure and trusted environment via a client technology. In order to determine the rights and policies for use the assets, as we have seen previosly, a set of rules have created in most of the commonly used DRM software applications for text, audio, video and software. The use of DRM software applications during the creation phase of digital content works towards creating a trusted environment where both the sender and the 15

34 consumer can be assured that the content they receive was indeed sent by the appropriate party and in security conditions and that the consumer is authorized to receive the content. ERP Content Server Commerce Copyrights Permissions Content Files Busienss Rules Card Processing Tax Calculation Finance Meta Data, Assets Rights Packager Transactions Marketing R & D Digital Asset Management System Content Workflow System (CMS) SSL AVS License Decrypter Rendering Client License Manager Content Library Sales Management DRM License License Server Order Manager License IDs Settlement Territory Management DRM Handler Rights Manager View/ Play/Print Commerce Manager Account Manager License Creator FIGURE 2.7. Generic DRM Software Application Architecture DRM architecture typically consists of the following components: Content Server: consisting of four blocks: 1. A content repository containing a metadata management environment to uniquely identify the digital assets. Some of the more efficient DRM software applications can integrate with asset management systems. 2. Product information, consisting of rights and product metadata. 3. A packager that encrypts the content with the appropriate mechanisms to unlock the content upon delivery to an end user. 4. A delivery mechanism that will be as DRM format independent as possible. License Server: consisting of three components: 1. An encrytion key repository. 2. A user identity database that collects the content. 3. A DRM license generator that binds the content and the encrytion key to the end user s device and registers the user with the appropriate parties that make up the digital dstribution value chain. Client Software: A piece of software that resides locally on an end user s device that displays the encrypted content, communicating the appropriate rights and permissions to the end user and back to the license server. The number of communications back to the license server is determined by the contents rules at the time of packaging. 16

35 DRM processes typically take place in the following order (see Figure 2.8): 1. The user obtains the content packages using various digital delivery services. 2. The user requests the content usage operation (e.g., view, play) within the client application. 3. Once the user abides by the appropiate registration (e.g., name, address, ), payment and clearing methodologies (e.g., credit card, purchase order, taxes) for operation, the DRM license handler collects the user and content asset information and produces a license to decrypt the asset on the end user s device. Depending upon the specific type of DRM software application used by the content creator, the license delivery process may happen simultaneously during the financial clearing part of the content delivery [2]. SERVER USER Content Package Content Usage Request Operation (registration, payment, clearing) requests Validation Data Content FIGURE 2.8. DRM processes between Server and User 17

36 2.2. REQUIREMENTS SUMMARY In the previous section we have studied several architectures in order to define and give a framework to the DRM Solutions. Once we have the framework, we need to know the requirements to develop an effective DRM solution. For this purpose, in this section, we are going to study the following points: Digital Asset Management (DAM) In order to complete a DRM solution it is necessary a good Digital Asset Management (DAM) System. In fact, DAM is a basis of effective Rights Management. This kind of systems give to the enterprises a competitive advantage: to stablish an asset repository that enables the association of essential rights and permissions information with specific assets. Technically, a DAM System stores, indexes, categorizes, secures, searches, transforms, assembles and exports intellectual property. Trusted System Once the DAM System has been chosen, it is necessary to guarantee that the transactions will be reliable by means of the identification of system participants, access restrictions, protection of digital content, etc. Trusted systems allow to solve these problems that are associated with digital content management. Expression Language In order to standarize the expressions that are used in the information about intellectual property rights in digital transactions a general vocabulary is needed. The objective is to get automated rights transacions in an universal language and, to do that, it is necessary a machine readable that permits to realize the conversion of original rights granted into usage permissions for digital transactions in an automatical and unique way. Protection Up to now, we have a system that manages the intellectual property (DAM System), that guarantees secure digital transactions and a common language that expresses the information about intellectual property rights. Now, we need to protect and prepare the digital content and the transaction environment in order to avoid piracy and illegal exploitations. To do that, different technologies are used and we are going to study the following ones: - Conditional Accesss Systems: in order to give access to the digital content only to suscribers. - DRM Systems: in wich the client obtains the content in protected form and with a license that specifies the uses for it. - Software: to avoid that the digital content can work on an unlicensed machine. 18

37 - Protection Technologies: methods for protection for the digital content to prevent piracy, to ensure integrity, to enforce the user the terms of license agreement, etc. We will study Cryptography (Conventional Cryptography, Public Key Cryptography, Digital Signature and Keys), Software Security Dongles, Watermarking (Digital Watermarking for Video and Digital Watermarking for Audio) and Fingerprinting. Trading Architectures To conclude, trading architecture helps enterprises to provide the users an environment to share data, applications and processes by means of internet-based technologies. We will study the principal components, the requirements and general architectures of a trading system DIGITAL ASSET MANAGEMENT Any company that wishes to obtain a competitive advantage in business must to have the content rights on they own and, thanks to that, this company will obtain an efficience inventory of their assets. Precisely because of that, it is necessary a basis for effective Rights Management: Digital Asset Management (DAM) Solutions. DAM software will stablish an asset repository that enables the association of essential rights and permissions information with specific assets at the very beginning of the DRM value chain. Due to the modular design of a DAM system (the best DAM solutions also have the capability to integrate with other DRM funcional applications), documented APIs and strong relationships with different partners, it is possible to ensure that consumers can use DAM to provide extended DRM functionality that grows with their business. In order to complete a Digital Rights Management Solution, one of the most important steps is to choose a good Digital Asset Management system. By this way and thanks to DAM solutions, a lot of companies are building a strong foundation for a digital business strategy and, for this reason, are positioning themselves to take the competitive advantage [8]. Technically, Digital Asset Management stores, indexes, categorizes, secures, searches, transforms, assembles and exports content that has monetary or cultural value. Digital assets often include rich media such as video, audio and graphics, but this is not a requirement, the main characteristic of a digital asset is that it is an asset. On the other hand, the fact that an asset is represented digitally presents numerous opportunities for revenue generation and operational efficiency; for this reason, a digital asset management platform gives preference to functionality and is quite different from other classes of software. There are three essential elements that distinguish Enterprise Digital Asset Management solutions from other content management solutions: 1. All the system functions is the asset (security, search results, transactions, rights ), defined as specific combinations of content and data that have financial (monetary or cultural) value. 19

38 2. Each functional component of a Digital Asset Management solution including, but not limited to, store, indexing, cataloguing, navigation, transformation and export must offer thorough support for all types of media including streaming and still formats and for all traditional and e-delivery channels. 3. The architecture needs to be a basis component and an important value for the company, able to assure fulfillint the operations, scalable performance and distributed access throughout the extended organization. In DAM systems it is very important the definition of an asset. There is general agreement that a digital asset is the asset's content plus metadata (or data about the content, as we have said before). Metadata can include information about format type, rights and permissions, usage history, etc. This kind of information is typically well suited to be stored in fields, e.g. as simple data elements [9]. When we have another type of related information, it is better to model it as relationships between assets. For this reason, it exits a complementary technology to DAM systems: link engines. This technology supplements classic metadata fields and can capture the relationships between assets and any other type of relationship that can occur between complex and compound digital assets. Another widely used approach for providing context (and therefore additional value) to digital assets is the technique of categorization. Organizing digital assets into hierarchies (or webs) or related categories serves as a powerful organizing principle, simplifies navigation and provides a great advantage in relation to other search techniques. The following figure illustrates the logical model for a Digital Asset: the definition and management of content, metadata (information about the content), and every other related information and behaviour is organized around the asset [9]. Vocabulary Sets Links ASSET Object Location Fielded Model (Metadata) Rights & Permissions FIGURE 2.9. Logical Model of a Digital Asset 20

39 This logical model of a Digital Asset is an extended metadata approach, that can be used to track physical assets as well, that adds to the three mainly facets of fielded metadata, links and categories (vocabulary), additional information about rights and permissions, aggregations of assets (membership in sets) and mapping to the physical location of a digital asset. Nowadays, every enterprise has the need to support all types of media content. From the technical point of view, it becomes clear that the way one stores, indexes, previews, navigates, transforms, secures and transports digital assets is highly dependent on the type of media that the digital assets are composed of. The behaviours that correspond to DAM functionality are radically different and demand distinct technological solutions. When an Enterprise demands a DAM solution to another will not only looks for a system that supports a broad array of media types, the Enterprise looks for a solution based upon a modular architecture that will permit incremental extensions to accommodate new media types and increasingly sophisticated behaviours. Use cases, logical workflows, functional requirements and appropiate code are completely distinct as one considers different media types. In conclusion, Digital Asset Management has clearly emerged as a critical component of IT infrastructure and has left behind its early niche as specialized software for effective Rights Management. The Internet revolution and the convergence of digital media has catapulted Digital Asset Management across the enterprise and into e-business industries [9] TRUSTED SYSTEMS The Trusted systems notion was based on concepts of Trust Management, that has appeared as a new philosophy of encryption, analysis and trusted solutions management in computer systems. With the appearance of World Wide Web this concept was advanced and extended for using in terms of opened decentralizing systems that consist of the multiple administrative domens. Before to trust whomever from system participants (trustee) to execute some action on some object, there are a basic principles of trust management to follow: to be exactly aware of privilege of this participant (trustee), to entrust himself in the event of the external request and to be careful before and after performing this operations. In the process of creation trusted systems these principles are realized by performing the following requirements: Identification of system participants; Connecting of access restrictions with each system element; Assuming the authorized solutions in accordance with some rules. For this purpose both software and single-purpose hardware devices can be used. In order to realize these requirements, it is necessary to ensure a flexibility level and protection of trusted systems in terms of open network environment. Due to this, in the second half of 90s the researches on using the trusted systems for controlled spreading of digital 21

40 intellectual property were started. As a result of these researches up to year 2000 a point of view was formed, in accordance with which digital rights management systems are to be considered and created as trusted systems. Trusted systems allow to solve some key problems associated with digital content management: trusted systems allow publishers to put a set of rights in correspondence of specific digital work, according to which user shall use this work; trusted systems enforce user to meet the conditions and requirements of license agreement between publisher and user of digital content; trusted systems ensure integrity and protection of digital documents during the transactions across open networks; trusted systems can get information from other trusted systems and define inauthentic or wrong given data; trusted systems ensure confidentiality of user information. As we are studying, concept of rights is a key in digital intellectual property management systems. It includes both copyrights associated with digital work, and rights of publishers, as well as usage rights that can be obtained by user. As shown before, there are several types of rights, for each type of right can be determined a charge, which user of content should pay for its realization. Besides, for each type of right are to be determined term of access that define who from users can realize this right [10]. To ensure a relationship between digital documents and rights, different companies and consortiums have designed and developed several special interpreted description language of the digital rights, as we will see in Expression Language (section ). When a buyer acquire a digital work, through a right management system, enters into a digital contract with the publisher, assuming the obligations to execute the rights associated with it.that contract also defines ways of possible using of digital product. Another characteristic of trusted systems is the presence of mechanisms that enfore the buyer to meet the terms of digital contract. Once the server and the user are connected, with the necessary permissions on the part of the user, the transaction can carry out by two ways: by development of solutions based on software only by means of shared use of special hardware devices and software. Nowadays companies are using the first way, developing technological solutions for digital rights management and sale of electronic content. However the use of only software solutions does not ensure required protection of digital work and protection of rights of owners. As a result, the number of hacker attacks on protected electronic publications has increased. The second way can be realized by using the trusted peripherals for rendering, print or copying of the digital documents. The trusted systems work, as we have shown, in digital content management and the conexion with it rights. This work allows to organize a protected, secure and safe transfer of digital work between the author and publisher to the seller and buyer. 22

Digital Rights Management - The Difference Between DPM and CM

Digital Rights Management - The Difference Between DPM and CM WHITEPAPER SERIES 2003 IPR SYSTEMS Level 12, 77 Castlereagh Street Sydney, NSW 2000, AUSTRALIA info@iprsystems.com http://www.iprsystems.com Driving Content Management With Digital Rights Management Dr

More information

DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES

DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the

More information

UNIVERSAL UNIQUE IDENTIFIERS AN ENTERTAINMENT IDENTIFIER REGISTRY (EIDR) IN MOVIE AND TELEVISION SUPPLY CHAIN MANAGEMENT WHITEPAPER

UNIVERSAL UNIQUE IDENTIFIERS AN ENTERTAINMENT IDENTIFIER REGISTRY (EIDR) IN MOVIE AND TELEVISION SUPPLY CHAIN MANAGEMENT WHITEPAPER UNIVERSAL UNIQUE IDENTIFIERS IN MOVIE AND TELEVISION SUPPLY CHAIN MANAGEMENT AN ENTERTAINMENT IDENTIFIER REGISTRY (EIDR) WHITEPAPER OCTOBER 2010 TABLE OF CONTENTS EXECUTIVE SUMMARY... 1 INTRODUCTION...

More information

Digital Rights Management

Digital Rights Management The term Digital Rights Management - DRM - has its origins in the combined efforts of some vendors, their marketing staff and some other industry analysts in the late 1990s [1]. It is a breakthrough in

More information

Digital Rights Management (DRM) in Education - The Need for Standardisation

Digital Rights Management (DRM) in Education - The Need for Standardisation Digital Rights Management (DRM) in Education - The Need for Standardisation A Briefing Paper for IMS Neil Mclean, IMS Australia Centre Renato Iannella, IPR Systems February 2002 Version 1.0 1 Overview

More information

Summary Final Report <Indecs> Interoperability of Data in E-commerce Systems

Summary Final Report <Indecs> Interoperability of Data in E-commerce Systems Putting Metadata to Rights Summary Final Report Interoperability of Data in E-commerce Systems This project is supported under the European Commission INFO 2000 Programme Contents 1. The initiative:

More information

Introduction to Service Oriented Architectures (SOA)

Introduction to Service Oriented Architectures (SOA) Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction

More information

STORRE: Stirling Online Research Repository Policy for etheses

STORRE: Stirling Online Research Repository Policy for etheses STORRE: Stirling Online Research Repository Policy for etheses Contents Content and Collection Policies Definition of Repository Structure Content Guidelines Submission Process Copyright and Licenses Metadata

More information

Intellectual Property Management and Protection in MPEG Standards

Intellectual Property Management and Protection in MPEG Standards Intellectual Property Management and Protection in MPEG Standards Rob Koenen Chairman MPEG Requirements Group (rob@intertrust.com) 1 Abstract MPEG has a long history in dealing with DRM issues. Gradually,

More information

WEB SERVICES SECURITY

WEB SERVICES SECURITY WEB SERVICES SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Digital Object Identifier (DOI ) System

Digital Object Identifier (DOI ) System Digital Object Identifier (DOI ) System Norman Paskin Tertius Ltd., Oxford, U.K. Abstract The Digital Object Identifier (DOI ) System is a managed system for persistent identification of content on digital

More information

E-Business Technologies for the Future

E-Business Technologies for the Future E-Business Technologies for the Future Michael B. Spring Department of Information Science and Telecommunications University of Pittsburgh spring@imap.pitt.edu http://www.sis.pitt.edu/~spring Overview

More information

bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5

bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5 bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5 2008 Adobe Systems Incorporated. All rights reserved. Adobe Flash Media Rights Management Server 1.5 Overview for Microsoft

More information

northplains Whitepaper Differentiating DAM from ECM What Do You Really Need? Connecting your world. Visually.

northplains Whitepaper Differentiating DAM from ECM What Do You Really Need? Connecting your world. Visually. Whitepaper Differentiating DAM from ECM What Do You Really Need? Both analysts and organizations can agree on one thing - the recent and unprecedented rise in demand for multi-media assets has driven the

More information

Module 6. e-business and e- Commerce

Module 6. e-business and e- Commerce Module 6 e-business and e- Commerce 6.1 e-business systems 6.2 e-commerce systems 6.3 Essential e- commerce processes 6.4 Electronic payment processes 6.5 e-commerce application trends 6.6 Web store requirements

More information

Integrated Library Systems (ILS) Glossary

Integrated Library Systems (ILS) Glossary Integrated Library Systems (ILS) Glossary Acquisitions Selecting, ordering and receiving new materials and maintaining accurate records. Authority files Lists of preferred headings in a library catalogue,

More information

WHITE PAPER MANAGING VALUABLE IMAGE ASSETS USING DIGITAL WATERMARKING FOR COPYRIGHT COMMUNICATION AND IMAGE SEARCH INTRODUCTION

WHITE PAPER MANAGING VALUABLE IMAGE ASSETS USING DIGITAL WATERMARKING FOR COPYRIGHT COMMUNICATION AND IMAGE SEARCH INTRODUCTION www.digitalwatermarkingalliance.org WHITE PAPER MANAGING VALUABLE IMAGE ASSETS USING DIGITAL WATERMARKING FOR COPYRIGHT COMMUNICATION AND IMAGE SEARCH INTRODUCTION Consider where you encounter digital

More information

Technical Proposition. Security

Technical Proposition. Security Technical Proposition ADAM Software NV The global provider of media workflow and marketing technology software ADAM Software NV adamsoftware.net info@adamsoftware.net Why Read this Technical Proposition?

More information

THE BRITISH LIBRARY. Unlocking The Value. The British Library s Collection Metadata Strategy 2015-2018. Page 1 of 8

THE BRITISH LIBRARY. Unlocking The Value. The British Library s Collection Metadata Strategy 2015-2018. Page 1 of 8 THE BRITISH LIBRARY Unlocking The Value The British Library s Collection Metadata Strategy 2015-2018 Page 1 of 8 Summary Our vision is that by 2020 the Library s collection metadata assets will be comprehensive,

More information

Comparison of Enterprise Digital Rights Management systems

Comparison of Enterprise Digital Rights Management systems Comparison of Enterprise Digital Rights Management systems M.H. van Beek Master Thesis Computer Science MT Advice report Aia Software Thesis number 565 June 22, 2007 Radboud University Nijmegen Computer

More information

Geospatial Digital Rights Management

Geospatial Digital Rights Management Geospatial Digital Rights Management By Daniel J. Wright Any use of trade, firm, of product names is for descriptive purposes only and does not imply endorsement by the U.S. Government Open-File Report

More information

DIGIMARC CORPORATION 9405 SW Gemini Drive Beaverton, Oregon 97008 www.digimarc.com

DIGIMARC CORPORATION 9405 SW Gemini Drive Beaverton, Oregon 97008 www.digimarc.com DIGITAL WATERMARKING: FOSTERING AND ENHANCING LEGITIMATE PEER-TO-PEER (P2P) ECOSYSTEMS DIGIMARC CORPORATION 9405 SW Gemini Drive Beaverton, Oregon 97008 www.digimarc.com Copyright 2006 1 TABLE OF CONTENTS

More information

Secure Semantic Web Service Using SAML

Secure Semantic Web Service Using SAML Secure Semantic Web Service Using SAML JOO-YOUNG LEE and KI-YOUNG MOON Information Security Department Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA

More information

Functional Requirements for Digital Asset Management Project version 3.0 11/30/2006

Functional Requirements for Digital Asset Management Project version 3.0 11/30/2006 /30/2006 2 3 4 5 6 7 8 9 0 2 3 4 5 6 7 8 9 20 2 22 23 24 25 26 27 28 29 30 3 32 33 34 35 36 37 38 39 = required; 2 = optional; 3 = not required functional requirements Discovery tools available to end-users:

More information

Web development, intellectual property, e-commerce & legal issues. Presented By: Lisa Abe

Web development, intellectual property, e-commerce & legal issues. Presented By: Lisa Abe Web development, intellectual property, e-commerce & legal issues Presented By: Lisa Abe October 8, 2005 Web development, intellectual property, e-commerce & legal issues 1. what intellectual property

More information

Papermule Workflow. Workflow and Asset Management Software. Papermule Ltd

Papermule Workflow. Workflow and Asset Management Software. Papermule Ltd Papermule Workflow Papermule Workflow - the power to specify adaptive and responsive workflows that let the business manage production problems in a resilient way. Workflow and Asset Management Software

More information

OpenHRE Security Architecture. (DRAFT v0.5)

OpenHRE Security Architecture. (DRAFT v0.5) OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2

More information

Masters in Human Computer Interaction

Masters in Human Computer Interaction Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from

More information

Masters in Advanced Computer Science

Masters in Advanced Computer Science Masters in Advanced Computer Science Programme Requirements Taught Element, and PG Diploma in Advanced Computer Science: 120 credits: IS5101 CS5001 up to 30 credits from CS4100 - CS4450, subject to appropriate

More information

Masters in Artificial Intelligence

Masters in Artificial Intelligence Masters in Artificial Intelligence Programme Requirements Taught Element, and PG Diploma in Artificial Intelligence: 120 credits: IS5101 CS5001 CS5010 CS5011 CS4402 or CS5012 in total, up to 30 credits

More information

Business Proposition. Digital Asset Management. Media Intelligent

Business Proposition. Digital Asset Management. Media Intelligent Business Proposition Digital Asset Management Executive Summary º º The Changing Face of Digital Asset Management Today, a true enterprise-class DAM solution must be the core component of an integrated

More information

Rights Management Services

Rights Management Services www.css-security.com 425.216.0720 WHITE PAPER Microsoft Windows (RMS) provides authors and owners the ability to control how they use and distribute their digital content when using rights-enabled applications,

More information

A Robust Multimedia Contents Distribution over IP based Mobile Networks

A Robust Multimedia Contents Distribution over IP based Mobile Networks , pp. 283-288 http://dx.doi.org/10.14257/ijseia.2015.9.9.24 A Robust Multimedia Contents Distribution over IP based Mobile Networks Ronnie D. Caytiles, Seungyong Shin and Byungjoo Park * Multimedia Engineering

More information

Cisco Videoscape Media Suite

Cisco Videoscape Media Suite Data Sheet Cisco Videoscape Media Suite Cisco Videoscape Media Suite is a carrier-grade, cloud-based software platform for powering comprehensive multiscreen media services. Cisco Videoscape Media Suite

More information

Experimental DRM Architecture Using Watermarking and PKI

Experimental DRM Architecture Using Watermarking and PKI Experimental DRM Architecture Using Watermarking and PKI Mikko Löytynoja, Tapio Seppänen, Nedeljko Cvejic MediaTeam Oulu Information Processing Laboratory University of Oulu, Finland {mikko.loytynoja,

More information

U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC)

U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC) U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC) econsent Trial Project Architectural Analysis & Technical Standards Produced

More information

Information Security for Modern Enterprises

Information Security for Modern Enterprises Information Security for Modern Enterprises Kamal Jyoti 1. Abstract Many enterprises are using Enterprise Content Management (ECM) systems, in order to manage sensitive information related to the organization.

More information

Masters in Networks and Distributed Systems

Masters in Networks and Distributed Systems Masters in Networks and Distributed Systems Programme Requirements Taught Element, and PG Diploma in Networks and Distributed Systems: 120 credits: IS5101 CS5001 CS5021 CS4103 or CS5023 in total, up to

More information

Enhancing Web Publishing with Digital Asset Management - Using Open Text Artesia DAM to enhance your Open Text WCMS (Red Dot) web sites

Enhancing Web Publishing with Digital Asset Management - Using Open Text Artesia DAM to enhance your Open Text WCMS (Red Dot) web sites Enhancing Web Publishing with Digital Asset Management - Using Open Text Artesia DAM to enhance your Open Text WCMS (Red Dot) web sites Lars Onasch Wolfgang Ruth Agenda A Brief Introduction Customer Examples

More information

Protecting Online Video Distribution with Adobe Flash Media Technology

Protecting Online Video Distribution with Adobe Flash Media Technology White Paper Protecting Online Video Distribution with Adobe Flash Media Technology Table of contents 1 Introduction 1 Overview of Adobe video distribution solutions 2 Best practices for effective content

More information

Masters in Computing and Information Technology

Masters in Computing and Information Technology Masters in Computing and Information Technology Programme Requirements Taught Element, and PG Diploma in Computing and Information Technology: 120 credits: IS5101 CS5001 or CS5002 CS5003 up to 30 credits

More information

PrivyLink Cryptographic Key Server *

PrivyLink Cryptographic Key Server * WHITE PAPER PrivyLink Cryptographic Key * Tamper Resistant Protection of Key Information Assets for Preserving and Delivering End-to-End Trust and Values in e-businesses September 2003 E-commerce technology

More information

UDDI Executive White Paper November 14, 2001

UDDI Executive White Paper November 14, 2001 UDDI Executive White Paper November 14, 2001 ! " #$! " % With the advent of service-centric computing, the Internet presents incredible value and reach for businesses of all sizes, providing opportunities

More information

Create and Distribute Rich Media for Optimized, Omnichannel Customer Engagement

Create and Distribute Rich Media for Optimized, Omnichannel Customer Engagement SAP Brief SAP Customer Relationship Management SAP Digital Asset Management by OpenText Objectives Create and Distribute Rich Media for Optimized, Omnichannel Customer Engagement Make the most of your

More information

Research on the Model of Enterprise Application Integration with Web Services

Research on the Model of Enterprise Application Integration with Web Services Research on the Model of Enterprise Integration with Web Services XIN JIN School of Information, Central University of Finance& Economics, Beijing, 100081 China Abstract: - In order to improve business

More information

Digital Asset Management. San Jose State University. Susan Wolfe MARA 211. July 22, 2012

Digital Asset Management. San Jose State University. Susan Wolfe MARA 211. July 22, 2012 DIGITAL ASSET MANAGEMENT 1 Digital Asset San Jose State University Susan Wolfe MARA 211 July 22, 2012 DIGITAL ASSET MANAGEMENT 2 Digital Asset While companies often exist within the same vertical markets,

More information

Beyond the Hype: Advanced Persistent Threats

Beyond the Hype: Advanced Persistent Threats Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,

More information

Before the UNITED STATES COPYRIGHT OFFICE LIBRARY OF CONGRESS Washington, D.C.

Before the UNITED STATES COPYRIGHT OFFICE LIBRARY OF CONGRESS Washington, D.C. Before the UNITED STATES COPYRIGHT OFFICE LIBRARY OF CONGRESS Washington, D.C. In the Matter of: Technological Upgrades to Registration And Recordation Functions Docket No. 2013 2 The International Federation

More information

Content Protection in Silverlight. Microsoft Corporation

Content Protection in Silverlight. Microsoft Corporation Content Protection in Silverlight Microsoft Corporation April 2010 Contents Contents...2 Introduction...3 What is Content Protection?... 3 Why Should You Protect Online Content?... 3 Techniques for Protecting

More information

Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003. Presented by An In seok. 2010.12.

Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003. Presented by An In seok. 2010.12. Digital Rights Management for Content Distribution Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003 Presented by An In seok. 2010.12.1 Contents

More information

Service Oriented Architecture

Service Oriented Architecture Service Oriented Architecture Charlie Abela Department of Artificial Intelligence charlie.abela@um.edu.mt Last Lecture Web Ontology Language Problems? CSA 3210 Service Oriented Architecture 2 Lecture Outline

More information

Digital Asset Management 数 字 媒 体 资 源 管 理 任 课 老 师 : 张 宏 鑫 2015-09-15

Digital Asset Management 数 字 媒 体 资 源 管 理 任 课 老 师 : 张 宏 鑫 2015-09-15 Digital Asset Management 数 字 媒 体 资 源 管 理 任 课 老 师 : 张 宏 鑫 2015-09-15 1. Introduction 1. 导 论 Outline Outline Content management Outline Content management Industrial Analysis Outline Content management Industrial

More information

Information and documentation The Dublin Core metadata element set

Information and documentation The Dublin Core metadata element set ISO TC 46/SC 4 N515 Date: 2003-02-26 ISO 15836:2003(E) ISO TC 46/SC 4 Secretariat: ANSI Information and documentation The Dublin Core metadata element set Information et documentation Éléments fondamentaux

More information

Enterprise content management solutions Better decisions, faster. Storing, finding and managing content in the digital enterprise.

Enterprise content management solutions Better decisions, faster. Storing, finding and managing content in the digital enterprise. Enterprise content management solutions Better decisions, faster Storing, finding and managing content in the digital enterprise. Streamlines the collection, protection, sharing and distribution of digital

More information

2008-04-25. Information et documentation Identificateur des objets numériques (DOI)

2008-04-25. Information et documentation Identificateur des objets numériques (DOI) COMMITTEE DRAFT ISO/CD 26324 Date 2008-01-24 Reference number ISO/TC 46 / SC 9 N 475 Supersedes document TC46/SC9 N455 WARNING: This document is not an International Standard. It is distributed for review

More information

BBC Technology Strategy

BBC Technology Strategy BBC Technology Strategy Issued: January 2010 For more information contact: Spencer.piggott@bbc.co.uk Copyright 2010 BBC All Rights Reserved TECHNOLOGY STRATEGY Introduction This paper defines the BBC s

More information

Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014

Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014 Standards for Identity & Authentication Catherine J. Tilton 17 September 2014 Purpose of these standards Wide deployment of authentication technologies that may be used in a global context is heavily dependent

More information

TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management

TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management Table of Contents Executive Summary 1 SECTION 1: CHALLENGE 2 The Need for

More information

Electronic Rights Enforcement for Learning Media

Electronic Rights Enforcement for Learning Media Electronic Rights Enforcement for Learning Media Susanne Guth Department of IS-New Media Lab Vienna University of Economics and Business Administration, Austria Phone: +43 (1) 31336 4427 susanne.guth@wu-wien.ac.at

More information

AHDS Digital Preservation Glossary

AHDS Digital Preservation Glossary AHDS Digital Preservation Glossary Final version prepared by Raivo Ruusalepp Estonian Business Archives, Ltd. January 2003 Table of Contents 1. INTRODUCTION...1 2. PROVENANCE AND FORMAT...1 3. SCOPE AND

More information

Digital Rights Management for the Online Music Business

Digital Rights Management for the Online Music Business Digital Rights Management for the Online Business Sai Ho Kwok Digital rights management has become a pressing concern for the online music business. Existing digital rights management systems are backed

More information

SWISSVBS LEARNING CLOUD (SLC)

SWISSVBS LEARNING CLOUD (SLC) SWISSVBS LEARNING CLOUD (SLC) OVERVIEW The LMS for the Mobile-Cloud World The SwissVBS Learning Cloud (SLC) is an enterprise-class learning management and analytics platform. It is designed from the ground

More information

Securing the future of mobile services. SIMalliance Open Mobile API. An Introduction v2.0. Security, Identity, Mobility

Securing the future of mobile services. SIMalliance Open Mobile API. An Introduction v2.0. Security, Identity, Mobility 1 An Introduction v2.0 September 2015 Document History 2 Version Date Editor Remarks 1.0 06/04/2011 OMAPI Working Group Public release 2.0 27/09/2015 OMAPI Working Group Public release Copyright 2015 SIMalliance

More information

PowerKey Conditional Access System Phase 1.0. System Overview. Revision 1.0

PowerKey Conditional Access System Phase 1.0. System Overview. Revision 1.0 PowerKey Conditional Access System Phase 1.0 System Overview Revision 1.0 Scientific-Atlanta, Inc, Unpublished Works of Scientific-Atlanta, Inc. Copyright 1997 Scientific-Atlanta, Inc. All Rights Reserved

More information

Server-Based PDF Creation: Basics

Server-Based PDF Creation: Basics White Paper Server-Based PDF Creation: Basics Copyright 2002-2009 soft Xpansion GmbH & Co. KG White Paper Server-Based PDF Creation: Basics 1 Table of Contents PDF Format... 2 Description... 2 Advantages

More information

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.

More information

Authoring Within a Content Management System. The Content Management Story

Authoring Within a Content Management System. The Content Management Story Authoring Within a Content Management System The Content Management Story Learning Goals Understand the roots of content management Define the concept of content Describe what a content management system

More information

The Key Elements of Digital Asset Management

The Key Elements of Digital Asset Management The Key Elements of Digital Asset Management The last decade has seen an enormous growth in the amount of digital content, stored on both public and private computer systems. This content ranges from professionally

More information

FNT EXPERT PAPER. // From Cable to Service AUTOR. Data Center Infrastructure Management (DCIM) www.fntsoftware.com

FNT EXPERT PAPER. // From Cable to Service AUTOR. Data Center Infrastructure Management (DCIM) www.fntsoftware.com FNT EXPERT PAPER AUTOR Oliver Lindner Head of Business Line DCIM FNT GmbH // From Cable to Service Data Center Infrastructure Management (DCIM) Data center infrastructure management (DCIM), as understood

More information

7 GOOD REASONS FOR GENUINE DIGITAL ASSET MANAGEMENT

7 GOOD REASONS FOR GENUINE DIGITAL ASSET MANAGEMENT 7 GOOD REASONS FOR GENUINE DIGITAL ASSET MANAGEMENT Why you should manage media in a dedicated Digital Asset Management System instead of a (Web) Content Management System. Marketing is all about content.

More information

Adaptive HTTP streaming and HTML5. 1 Introduction. 1.1 Netflix background. 1.2 The need for standards. W3C Web and TV Workshop, 8-9 February 2011

Adaptive HTTP streaming and HTML5. 1 Introduction. 1.1 Netflix background. 1.2 The need for standards. W3C Web and TV Workshop, 8-9 February 2011 W3C Web and TV Workshop, 8-9 February 2011 Adaptive HTTP streaming and HTML5 Mark Watson, Netflix Inc. 1 Introduction 1.1 Netflix background Netflix is a leading provider of streaming video services in

More information

Integration of Hotel Property Management Systems (HPMS) with Global Internet Reservation Systems

Integration of Hotel Property Management Systems (HPMS) with Global Internet Reservation Systems Integration of Hotel Property Management Systems (HPMS) with Global Internet Reservation Systems If company want to be competitive on global market nowadays, it have to be persistent on Internet. If we

More information

CRAFT ERP modules. Introduction

CRAFT ERP modules. Introduction Introduction 1 1 Introduction CRAFT is an ERP system providing automation in most important business aspects of an enterprise: Customer relations, Financial operations, Production and Distribution operations,

More information

Symplified I: Windows User Identity. Matthew McNew and Lex Hubbard

Symplified I: Windows User Identity. Matthew McNew and Lex Hubbard Symplified I: Windows User Identity Matthew McNew and Lex Hubbard Table of Contents Abstract 1 Introduction to the Project 2 Project Description 2 Requirements Specification 2 Functional Requirements 2

More information

SAMPLE EXAMINATION PAPER SAMPLE ANSWERS

SAMPLE EXAMINATION PAPER SAMPLE ANSWERS EXAMINATION PAPER: ACADEMIC SESSION 2003/2004 Campus School Department Level TITLE OF PAPER COURSE CODE Maritime Computing and Mathematical Sciences Information Systems and Multimedia Three ecommerce COMP1308

More information

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate

More information

Fight fire with fire when protecting sensitive data

Fight fire with fire when protecting sensitive data Fight fire with fire when protecting sensitive data White paper by Yaniv Avidan published: January 2016 In an era when both routine and non-routine tasks are automated such as having a diagnostic capsule

More information

SHared Access Research Ecosystem (SHARE)

SHared Access Research Ecosystem (SHARE) SHared Access Research Ecosystem (SHARE) June 7, 2013 DRAFT Association of American Universities (AAU) Association of Public and Land-grant Universities (APLU) Association of Research Libraries (ARL) This

More information

New Generation of Software Development

New Generation of Software Development New Generation of Software Development Terry Hon University of British Columbia 201-2366 Main Mall Vancouver B.C. V6T 1Z4 tyehon@cs.ubc.ca ABSTRACT In this paper, I present a picture of what software development

More information

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public

More information

INTERNATIONAL AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS

INTERNATIONAL AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS INTERNATIONAL PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (This Statement is effective) CONTENTS Paragraph Introduction... 1 5 Skills and Knowledge... 6 7 Knowledge

More information

Vantage Product Lifecycle Management

Vantage Product Lifecycle Management Vantage Product Lifecycle Management Abstract PLM enable companies to manage all information regarding a product, from the initial design and engineering through to manufacture, sourcing, support and run

More information

Software License Management using the Polymorphic Encryption Algorithm White Paper

Software License Management using the Polymorphic Encryption Algorithm White Paper pmc-ciphers.com Software License Management using the Polymorphic Encryption Algorithm White Paper Published: May 2007, first published in January 2003 PMC Software License Management 1 Software License

More information

Network device management solution

Network device management solution iw Management Console Network device management solution iw MANAGEMENT CONSOLE Scalability. Reliability. Real-time communications. Productivity. Network efficiency. You demand it from your ERP systems

More information

Digital Asset Management. Content Control for Valuable Media Assets

Digital Asset Management. Content Control for Valuable Media Assets Digital Asset Management Content Control for Valuable Media Assets Overview Digital asset management is a core infrastructure requirement for media organizations and marketing departments that need to

More information

Security. 2014 Yokogawa Users Group Conference & Exhibition Copyright Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX - 1 -

Security. 2014 Yokogawa Users Group Conference & Exhibition Copyright Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX - 1 - Security - 1 - OPC UA - Security Security Access control Wide adoption of OPC SCADA & DCS Embedded devices Performance Internet Scalability MES Firewalls ERP Communication between distributed systems OPC

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

The IDA Catalogue. of GENERIC SERVICES. Interchange of Data between Administrations

The IDA Catalogue. of GENERIC SERVICES. Interchange of Data between Administrations Interchange of Data between Administrations EUROPEAN COMMISSION ENTERPRISE DIRECTORATE- GENERAL INTERCHANGE OF DATA BETWEEN ADMINISTRATIONS PROGRAMME Interchange of Data between Administrations 2 of Generic

More information

Internet Technologies for Digital Libraries

Internet Technologies for Digital Libraries Internet Technologies for Digital Libraries Larry Masinter September 1998 THE DOCUMENT COMPANY (about the author) September 1998 1 For copies of slides... http://www.parc.xerox.com/masinter Send email

More information

HYPER MEDIA MESSAGING

HYPER MEDIA MESSAGING Email based document interchange known as messaging service and contribute to corporate productivity in following ways 1. it strengthens the automation of documentation life cycle 2. It allows document

More information

Evaluation of different Open Source Identity management Systems

Evaluation of different Open Source Identity management Systems Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems

More information

Extracting and Preparing Metadata to Make Video Files Searchable

Extracting and Preparing Metadata to Make Video Files Searchable Extracting and Preparing Metadata to Make Video Files Searchable Meeting the Unique File Format and Delivery Requirements of Content Aggregators and Distributors Table of Contents Executive Overview...

More information

Digital Asset Management

Digital Asset Management Digital Asset Management Managing the complexity of digital assets to support your business Product images, streaming video, sound bites, logos, Flash animations, presentations, web pages these days, digital

More information

Adobe Developer Workshop Series

Adobe Developer Workshop Series Adobe Developer Workshop Series Working with Security February 2005 San Francisco, California 2005 Adobe Systems Incorporated. All Rights Reserved. Agenda Introduction Overview of Intelligent Document

More information

1. Digital Asset Management User Guide... 2 1.1 Digital Asset Management Concepts... 2 1.2 Working with digital assets... 4 1.2.1 Importing assets in

1. Digital Asset Management User Guide... 2 1.1 Digital Asset Management Concepts... 2 1.2 Working with digital assets... 4 1.2.1 Importing assets in 1. Digital Asset Management User Guide........................................................................... 2 1.1 Digital Asset Management Concepts........................................................................

More information

GUIDE TO WEBSITES AND E-COMMERCE

GUIDE TO WEBSITES AND E-COMMERCE GUIDE TO WEBSITES AND E-COMMERCE Version 1.0, 26-Sept-01 This document is available from www.webcentro.com.au 2001, WebCentro WebCentro Guide To Websites And E-commerce CONTENTS 1. What is a Website? 1

More information

Data Management Plan. Name of Contractor. Name of project. Project Duration Start date : End: DMP Version. Date Amended, if any

Data Management Plan. Name of Contractor. Name of project. Project Duration Start date : End: DMP Version. Date Amended, if any Data Management Plan Name of Contractor Name of project Project Duration Start date : End: DMP Version Date Amended, if any Name of all authors, and ORCID number for each author WYDOT Project Number Any

More information

ORACLE DATABASE SECURITY. Keywords: data security, password administration, Oracle HTTP Server, OracleAS, access control.

ORACLE DATABASE SECURITY. Keywords: data security, password administration, Oracle HTTP Server, OracleAS, access control. ORACLE DATABASE SECURITY Cristina-Maria Titrade 1 Abstract This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource

More information