Security and digital rights management Kati Tuomainen - - PowerPoint PPT Presentation

security and digital rights management
SMART_READER_LITE
LIVE PREVIEW

Security and digital rights management Kati Tuomainen - - PowerPoint PPT Presentation

Security and digital rights management Kati Tuomainen khtuomai@cc.hut.fi Agenda Introduction Content based media security What is DRM? How do DRM systems work? DRM models Mobile DRM Concluding remarks Introduction


slide-1
SLIDE 1

Security and digital rights management

Kati Tuomainen khtuomai@cc.hut.fi

slide-2
SLIDE 2

Agenda

  • Introduction
  • Content based media security
  • What is DRM?
  • How do DRM systems work?
  • DRM models
  • Mobile DRM
  • Concluding remarks
slide-3
SLIDE 3

Introduction

  • Computer security protects information on the

computers

  • Network security protects information while it is

being transmitted over the network

  • Content security protects intellectual rights at

application or presentation layers utilizing security mechanisms generally used in computer and network security

slide-4
SLIDE 4

Security services

  • Confidentiality
  • Integrity
  • Authentication
  • Antipiracy protection
  • Access control
  • Nonrepudiation
  • Availability
slide-5
SLIDE 5

Content based media security

  • Characteristics of the information to be protected

vary

  • Protection is tied to a higher level of the content
  • sematic information is added to assure intended

use

slide-6
SLIDE 6

DRM 1/2

  • Digital management of user rights to content or of

the content owners rights to the use of the content

  • Linking specific user rights you wish to control to

the media

– Viewing – Duplication – Access – Distribution rights – ....

slide-7
SLIDE 7

DRM 2/2

  • DRM links content to users and their rights
  • Content is seen as the intellectual property or

work

  • Users are all the parties involved in the content

distribution chain

  • Rights are the permissions, constraints, and
  • bligations a user has
slide-8
SLIDE 8

Content value chain

slide-9
SLIDE 9

DRM building blocks

  • Encryption
  • Digital signatures
  • Digital watermarking and fingerprinting
  • Metadata
  • Security protocols
slide-10
SLIDE 10

DRM distribution models

  • Download
  • Peer-to-peer
  • Multicast
  • DVB
slide-11
SLIDE 11

DRM models

  • Subscribtion based
  • Promotion
  • Pay per view
  • Micropayment
  • Floating licences
  • superdistribution
slide-12
SLIDE 12

Mobile DRM

  • Mobile environments place their own

requirements on DRM systems

  • MDRM can be based on

– Rights enforcement – System architectures – Usage rules – DRM models – Content variety or value – Security levels

slide-13
SLIDE 13

Concluding remarks

  • The challenge in creating DRM systems is to find

the balance between the protection of the information, and the cost, as well as usability

  • The goal of DRM is to facilitate electronic

marketing, not to create an unbreakable protection