Digital Rights Management



Similar documents
Digital Rights Management - The Difference Between DPM and CM

Digital Rights Management (DRM) in Education - The Need for Standardisation

Internet Technologies for Digital Libraries

DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES

URM Usage Rights Management

Experimental DRM Architecture Using Watermarking and PKI

Current and Emerging Requirements for Digital Rights Management Systems Through Examination of Business Networks

Digital Rights Management for the Online Music Business

FOSSBazaar A Governance Initiative to manage Free and Open Source Software life cycle

Foundations for your. portable cloud

Intellectual Property Management and Protection in MPEG Standards

A Robust Multimedia Contents Distribution over IP based Mobile Networks

PARCC TECHNOLOGY ARCHITECTURE ARCHITECTURAL PRINCIPLES AND CONSTRAINTS SUMMARY

Functional Requirements for Digital Asset Management Project version /30/2006

STRATEGIC OUTLINES: BETWEEN VALUE AND DIGITAL ASSETS MANAGEMENT

Digital Rights Management in the Internet

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

Content Protection in Silverlight. Microsoft Corporation

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

Solution & Design Architecture

Building a Modular Server Platform with OSGi. Dileepa Jayakody Software Engineer SSWSO2 Inc.

northplains Whitepaper Differentiating DAM from ECM What Do You Really Need? Connecting your world. Visually.

A refined architecture for DRM

Software Testing A Time for Standard Models

Digital preservation a European perspective

Smarter Balanced Technology Implementation Readiness v July 2014

DIGIMARC CORPORATION 9405 SW Gemini Drive Beaverton, Oregon

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES

Service Oriented Architecture (SOA) An Introduction

SGFS: Secure, Flexible, and Policy-based Global File Sharing

Security Considerations for Public Mobile Cloud Computing

Document Management. Document Management for the Agile Enterprise. AuraTech Pte Ltd

DCML - The Standard that Enables ITIL Compliance

Microsoft SOA Roadmap

An Open Policy Framework for Cross-vendor Integrated Governance

National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016

CLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service

Technical Proposition. Security

The Recipe for Sarbanes-Oxley Compliance using Microsoft s SharePoint 2010 platform

Software Configuration Management for Embedded Systems Developers

Designing Data Models for Asset Metadata Daniel Hurtubise SGI

A License Aware P2P Client with URM

L Impatto della SOA sulle competenze e l organizzazione ICT di Fornitori e Clienti

UNIVERSAL UNIQUE IDENTIFIERS AN ENTERTAINMENT IDENTIFIER REGISTRY (EIDR) IN MOVIE AND TELEVISION SUPPLY CHAIN MANAGEMENT WHITEPAPER

Reference Process Models User's Guide for Oracle Application Integration Architecture Foundation Pack 11g Release 1 ( )

The IDA Catalogue. of GENERIC SERVICES. Interchange of Data between Administrations

Digital Rights Management(DRM) Using XrML

Filestor Digital Asset Management. The way it works

RS MDM. Integration Guide. Riversand

Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop Presented by An In seok

Enterprise Content Management and Alfresco

OPEN CLOUD OPEN CLOUD OPEN CLOUD. Seyed Abolfazl Hoseini Tampere University of Technology March 02, 2012 OPEN CLOUD

Security Issues in Cloud Computing

Guiding SOA Evolution through Governance From SOA 101 to Virtualization to Cloud Computing

Software Defined Networking (SDN) Networking excellence Maniyan Sundaresan

Energy Efficient Storage - Multi- Tier Strategies For Retaining Data

TICKET BASED IDENTITY SYSTEM FOR DRM

Policy Policy--driven Distributed driven Distributed Data Management (irods) Richard M arciano Marciano marciano@un

Concepts and Architecture of the Grid. Summary of Grid 2, Chapter 4

SERVICE ORIENTED ARCHITECTURE

Enterprise Digital Rights Management

Filing Information Rich Digital Asset Management Coca-Cola s Archive Research Assistant: Using DAM for Competitive Advantage IDC Opinion

irods and Metadata survey Version 0.1 Date March Abhijeet Kodgire 25th

Key Management Interoperability Protocol (KMIP)

Five best practices for deploying a successful service-oriented architecture

SIF 3: A NEW BEGINNING

Development of Mobile Enterprise Inventory Management System Application with CBD

CREATIVE EXPRESS. Digital Upload MODULE 2A. Version 3 November Copyright 2010 Hewlett-Packard Development Company, L.P.

Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0

Business Object Document (BOD) Message Architecture for OAGIS Release 9.+

CMDB Essential to Service Management Strategy. All rights reserved 2007

SOA REFERENCE ARCHITECTURE: SERVICE ORIENTED ARCHITECTURE

White Paper BMC Remedy Action Request System Security

Transcription:

The term Digital Rights Management - DRM - has its origins in the combined efforts of some vendors, their marketing staff and some other industry analysts in the late 1990s [1]. It is a breakthrough in the evolution of Conditional Access Systems (CAS). CP, for Copy Protection, often completes the DRM acronym although CP should be part of a DRM system for Rights Enforcement. DRM spans a broad array of technological and business concepts. It includes relatively specialized technologies such as watermarking, Public Key Infrastructure (PKI) and encryption, as well as other business areas such as pricing, terms, and conditions for use [1]. A main issue for DRM is the lack of a standardized definition for the process and for the key concepts involved [2]. Different interpretations of the term abound, including: "Digital Rights Management refers to controlling and managing rights to digital intellectual property." [1] "Digital Rights Management is "the description, identification, trading, protection, monitoring and tracking of all forms of rights usages over both tangible and intangible assets including management of rights holders relationships...it is the "digital management of rights" not the "management of digital rights." [3] Digital Rights Management (DRM) involves the description, layering, analysis, valuation, trading and monitoring of the rights over an individual or organization's assets; both in physical and digital form; and of tangible and intangible value [4]. DRM covers the digital management of rights - being them rights in a physical manifestation of a work (e.g. a book), or being them rights in a digital manifestation of a work (e.g. an e-book). Current methods of managing, trading and protecting such assets are inefficient, proprietary, or else often require the information to be wrapped or embedded in a physical format [4]. The copyright environment consists of three main aspects: rights (what can be protected by copyright) and exceptions (e.g. copies for private use or for public libraries); enforcement of rights (sanctions for making illegal copies and for trading in circumvention devices); and management of rights (exploiting the rights). In the online world, management of rights may be facilitated by the use of technical systems called Digital Rights Management (DRM) systems [5] [6]. DRM consist broadly of 2 elements: the identification of intellectual property and associated rights and the enforcement of usage restrictions. The identification consists in the attribution of an (standard) identifier (such as the ISBN numbers for books) and the marking of the property with a sign (such as a watermark). The description of the rights relies on Rights Expression Languages (REL). The enforcement is based on encryption and key management, by i.e. ensuring that the digital content is only used for purposes agreed by the right holder. Page 1

DRM is the chain of hardware and software services and technologies governing the authorized use of digital content and managing any consequences of that use throughout the entire life cycle of the content [6]. Generic DRM Functional Architecture Any DRM architecture is composed of a standardized set of different building blocks. Two different visions from DRM can be presented: an architectural view and a functional view. From an architectural view, three major components can be identified: the content server, the license server, and the client [6]. Page 2

The content server is a server component on the DRM architecture that consists of the actual content, information about products (services) that the content provider wants to distribute, and functionality to prepare content for a DRM-based distribution. The license server is responsible for managing licensing information. Licenses contain information about the identity of the user or device that wants to exercise rights concerning the content, identification of the content to which the rights apply, and specifications of those rights. The client resides on the user's side and supplies the following functionalities: DRM controller, the rendering application and the user's authentication mechanism [7]. From a functional point of view, the following diagram can resume the most important functions of any DRM architecture: Content Creation and Capture Content Management Content Use Content creation and capture: Page 3

Managing the creation of content to facilitate trading, including asserting rights when content is first created (or reused and extended with appropriate rights to do so) by various content creators or providers. This module supports: Rights validation - to ensure that content being created from existing content includes the rights to do so and that the rights are consistent. Rights creation - to assign rights to new content, such as specifying the rights owners and allowable use (permissions). Rights workflow - to process content for review and/or approval of rights. Content management: Managing and enabling the trade of content, including accepting content from creators into an asset management system. This module supports: Repository functions - to access content and the "metadata" that describes the content and the rights specifications (see Information Architecture). Trading functions - to assign licenses to parties who have done deals for rights over content, including, for example, royalty payments. Content use: Managing the use of content once it has been traded. This module supports: Permissions management - to enforce the rights associated with the content. For example, if the user has only the right to view the document, then printing will be prohibited. Tracking management - to monitor the use of content where such tracking is a requirement of the user's agreement. This module may need to interoperate with the trading functions to track use or to record transactions for "per use" payments [6]. Page 4

[1] Rosenblatt B., Trippe B., Mooney S., "Digital Rights Management - Business and Technology", M&T Books, 2003 [2] Martin M., Agnew G., Boyle J., McNair J., Page M., Rhodes W., "DRM Requirements for Research and Education - Discussion Paper", The NSF Middleware Initiative and Digital Rights Management Workshop, 2002 [3] Iannella R., "Digital Rights Management (DRM) Architectures." D-Lib Magazine v.7, no.6, http://www.dlib.org/dlib/ june01/iannella/06iannella.html, 2001 [4] Rosenblatt B., "Integrating DRM with P2P networks - Enabling the future of Online Content Business Models", GiantSteps Media Technology Strategies, November 2003 [5] Commission Staff Working Paper - "Digital Rights Background, Systems, Assessment", European Commission, February 2002 [6] Duhl J., Kevorkian S., "Understanding DRM Systems", IDC, 2001 [7] Rosenblatt B., Tripp B., Mooney S., "Digital Rights Management: Business and Technology", John Wiley & Sons, 2001 Page 5