security and digital rights management
play

Security and digital rights management Kati Tuomainen - PowerPoint PPT Presentation

Security and digital rights management Kati Tuomainen khtuomai@cc.hut.fi Agenda Introduction Content based media security What is DRM? How do DRM systems work? DRM models Mobile DRM Concluding remarks Introduction


  1. Security and digital rights management Kati Tuomainen khtuomai@cc.hut.fi

  2. Agenda ● Introduction ● Content based media security ● What is DRM? ● How do DRM systems work? ● DRM models ● Mobile DRM ● Concluding remarks

  3. Introduction ● Computer security protects information on the computers ● Network security protects information while it is being transmitted over the network ● Content security protects intellectual rights at application or presentation layers utilizing security mechanisms generally used in computer and network security

  4. Security services ● Confidentiality ● Integrity ● Authentication ● Antipiracy protection ● Access control ● Nonrepudiation ● Availability

  5. Content based media security ● Characteristics of the information to be protected vary ● Protection is tied to a higher level of the content ● sematic information is added to assure intended use

  6. DRM 1/2 ● Digital management of user rights to content or of the content owners rights to the use of the content ● Linking specific user rights you wish to control to the media – Viewing – Duplication – Access – Distribution rights – ....

  7. DRM 2/2 ● DRM links content to users and their rights ● Content is seen as the intellectual property or work ● Users are all the parties involved in the content distribution chain ● Rights are the permissions, constraints, and obligations a user has

  8. Content value chain

  9. DRM building blocks ● Encryption ● Digital signatures ● Digital watermarking and fingerprinting ● Metadata ● Security protocols

  10. DRM distribution models ● Download ● Peer-to-peer ● Multicast ● DVB

  11. DRM models ● Subscribtion based ● Promotion ● Pay per view ● Micropayment ● Floating licences ● superdistribution

  12. Mobile DRM ● Mobile environments place their own requirements on DRM systems ● MDRM can be based on – Rights enforcement – System architectures – Usage rules – DRM models – Content variety or value – Security levels

  13. Concluding remarks ● The challenge in creating DRM systems is to find the balance between the protection of the information, and the cost, as well as usability ● The goal of DRM is to facilitate electronic marketing, not to create an unbreakable protection

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend