digital rights management in digital delivery le chen 1 2010

34
Digital Rights Management in Digital Delivery Le Chen 1 2010

Upload: heather-jacobs

Post on 23-Dec-2015

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Digital Rights Management in Digital Delivery Le Chen 1 2010

Digital Rights Managementin Digital Delivery

Le Chen

1 2010

Page 2: Digital Rights Management in Digital Delivery Le Chen 1 2010

Company Confidential

Mobile Internet Next Major Computing Cycle

2 © 2010 DRM in Digital Delivery/Le Chen

Page 3: Digital Rights Management in Digital Delivery Le Chen 1 2010

Company Confidential

Increase in consumption of Digital Content

• Improvements in social networking and mobile computing platforms are fundamentally changing ways people communicate with each other and ways developers / advertisers / vendors reach consumers.

• Mobile devices will evolve as remote controls for ever expanding types of real-time services, including emerging category of location-based services, creating opportunities and dislocations, empowering consumers in unprecedented and transformative ways.

• Users Tend to ‘Pay’ on Mobile Internet Digital Content (Wallpaper, Ringtone, Downloadable Game, Music, Video...)

3 © 2010 DRM in Digital Delivery/Le Chen

Page 4: Digital Rights Management in Digital Delivery Le Chen 1 2010

Company Confidential

Digital Delivery Process

4 © 2010 DRM in Digital Delivery/Le Chen

Page 5: Digital Rights Management in Digital Delivery Le Chen 1 2010

Company Confidential

Challenges in Digital Delivery

• Ensuring the origin and integrity of downloaded content to prevent issues like

• Faulty download package, i.e. because of user or system mistake• Incompatible package with the device• Missing supporting software component• Failure in activation of download package• Malicious software like viruses

• Securing the involved parties and control of transaction to prevent issues like

• Payment information leak out• Downloading without payment

•  Preventing the authorized use of delivered content like• Reverse engineering• Forwarding to others

5 © 2010 DRM in Digital Delivery/Le Chen

Page 6: Digital Rights Management in Digital Delivery Le Chen 1 2010

Company Confidential

DRM

• DRM, Digital Rights Management, is a term used to describe a range of access control techniques that publishers and copyright holders use to restrict usage of digital media or devices. It manages copyright material and the terms and conditions on which the digital content is made available to users.

• DRM had traditionally been focused on security and encryption as a means to solve Intellectual Property (IP) management. It aimed to lock the content and limit its distribution to only those who pay

• DRM is now being defined to cover the description, identification, trading, protection, monitoring and tracking of all forms of rights permissions, constraints, and requirements over both tangible and intangible assets including management of rights holders’ relationships.

6 © 2010 DRM in Digital Delivery/Le Chen

Page 7: Digital Rights Management in Digital Delivery Le Chen 1 2010

Company Confidential

DRM standards

• Open Mobile Alliance (OMA) DRM

• Windows Media DRM 10

• Real Networks Helix DRM

• Apple FairPlay

• Sony OpenMG

• DRM Opera

• ISO MPEG-21

7 © 2010 DRM in Digital Delivery/Le Chen

Page 8: Digital Rights Management in Digital Delivery Le Chen 1 2010

Company Confidential

Mission of DRM Standards

• Provide interoperability between infrastructure, terminals and services • Support healthy competition and cooperate between content owners,

delivery service provider and developers resulting in better consumer propositions

• Require lower cost when introducing new services • Support fast global service deployment• Provide enriched user experience and compelling new mobile services

across service providers

The focus of DRM should not be only restricting all unlawful duplication, but also

seeking a good balance between security and “user friendliness”.

8 © 2010 DRM in Digital Delivery/Le Chen

Page 9: Digital Rights Management in Digital Delivery Le Chen 1 2010

Company Confidential

OMA DRM

• Open Mobile Alliance (OMA), as one of the mostly used DRM standards in mobile industry, has the members representing the key players of the value chain.

• Its members include mobile phone manufacture like Nokia and Samsung, mobile network system manufacturers like Ericsson and Nokia Siemens Networks, operators like Vodafone and Orange, and IT companies like IBM and Microsoft.

• OMA DRM follows the common DRM practices and takes into account the special requirements and characteristics of the mobile domain, and has been implemented in many mobile phone models already. It is recognized as the standard which different stakeholders will contribute and follow continuously in mobile community.

9 © 2010 DRM in Digital Delivery/Le Chen

Page 10: Digital Rights Management in Digital Delivery Le Chen 1 2010

Company Confidential

OMA DRM v1.0• Right Expression Language

10 © 2010 DRM in Digital Delivery/Le Chen

Page 11: Digital Rights Management in Digital Delivery Le Chen 1 2010

Company Confidential

OMA DRM v1.0

• Forward lock

11 © 2010 DRM in Digital Delivery/Le Chen

• Combined Delivery

• Separate Delivery

Page 12: Digital Rights Management in Digital Delivery Le Chen 1 2010

Company Confidential

OMA DRM v1.0

• Super Distribution

12 © 2010 DRM in Digital Delivery/Le Chen

It can be noticed that OMA DRM v1.0 lacks the mechanisms of• Secure delivery of rights• Authentication of devices and rights issuers• Revocation method

Page 13: Digital Rights Management in Digital Delivery Le Chen 1 2010

Company Confidential

OMA DRM v2.0

• Enhanced security with PKI mechanism

13 © 2010 DRM in Digital Delivery/Le Chen

Page 14: Digital Rights Management in Digital Delivery Le Chen 1 2010

Company Confidential

OMA DRM v2.0

• ROAP• A 4-pass protocol for registration of a Device with an RI• Two protocols by which the Device requests and acquires Rights

Objects (RO). • The 2-pass RO acquisition protocol encompasses request and delivery of an RO• The 1-pass RO acquisition protocol is only a delivery of an RO from an RI to a

Device (e.g. messaging/push)

• 2-pass protocols for Devices joining and leaving a Domain

14 © 2010 DRM in Digital Delivery/Le Chen

Page 15: Digital Rights Management in Digital Delivery Le Chen 1 2010

Company Confidential

OMA DRM v2.0

• CMLA

15 © 2010 DRM in Digital Delivery/Le Chen

For compliance assurance CMLA provisions keying material to client adopters with which to manufacture devices or applications, and service providers with which to provision rights

DRM Release 2.0 technology specifications come from OMA

OMA DRM protected content/rights are served to compliant devices

Page 16: Digital Rights Management in Digital Delivery Le Chen 1 2010

Company Confidential

OMA DRM v2.0

• Domains• Domains allow a Right Issuer to bind rights and content encryption keys to

a group of DRM Agents instead of just a single DRM Agent• Unconnected Device Support

• OMA DRM enables a Connected Device to act as an intermediary to assist an Unconnected Device to purchase and download content and Rights Objects

• Export• DRM Content may be exported to other DRM systems, for use on devices

that are not OMA DRM compliant but support some other DRM mechanism• Streaming of DRM Content

• In OMA DRM v1.0, the digital content is packaged and delivered in its entirety. Alternatively, in v2.0, content may be packetized and delivered as a stream.

16 © 2010 DRM in Digital Delivery/Le Chen

Page 17: Digital Rights Management in Digital Delivery Le Chen 1 2010

Company Confidential

OMA DRM v1.0 Infrastructure Requirements

17 © 2010 DRM in Digital Delivery/Le Chen

Page 18: Digital Rights Management in Digital Delivery Le Chen 1 2010

Company Confidential

OMA DRM v2.0 Infrastructure Requirements

18 © 2010 DRM in Digital Delivery/Le Chen

Client side:

Page 19: Digital Rights Management in Digital Delivery Le Chen 1 2010

Company Confidential

OMA DRM v2.0 Infrastructure Requirements

19 © 2010 DRM in Digital Delivery/Le Chen

Server side:

Page 20: Digital Rights Management in Digital Delivery Le Chen 1 2010

Company Confidential

DRM Service/Server Integration Architecture Scenario

20 © 2010 DRM in Digital Delivery/Le Chen

Page 21: Digital Rights Management in Digital Delivery Le Chen 1 2010

Company Confidential

Initiative of Case Study in RTS server Design

• According to OMA DRM specifications, DRM content is protected with DRM Content Encryption Key (CEK) embedded in Right Object (RO) which is then encrypted with device public keys. This is needed to prohibit forward copying of the content.

• If a customer’s mobile device needs to be repaired for certain reasons, the care service provider should be able to repair the terminal and return it in working condition after the service, or give replacement terminal to the customer if a terminal is in a non-repairable condition. In both cases DRM protected content must be returned to the customer in working condition.

• The capability to backup, restore and transfer encryption keys is needed to be able to restore or move the content of consumers in case of device replacement, upgrade sales or hardware repair for OMA DRM complaint mobile devices.

21 © 2010 DRM in Digital Delivery/Le Chen

Page 22: Digital Rights Management in Digital Delivery Le Chen 1 2010

Company Confidential

Use Case Design for RTS server:

22 © 2010 DRM in Digital Delivery/Le Chen

Help-desk user

Service Personnel

Search Archived Operation

Unlock Operation (Change Operation State)

Cancel Operation

Search Active Operation

<<uses>>

<<uses>>

Page 23: Digital Rights Management in Digital Delivery Le Chen 1 2010

Company Confidential

Replacement

• Generate Password

23 © 2010 DRM in Digital Delivery/Le Chen

Page 24: Digital Rights Management in Digital Delivery Le Chen 1 2010

Company Confidential

Replacement

• DRM Right Data Transfer

24 © 2010 DRM in Digital Delivery/Le Chen

Page 25: Digital Rights Management in Digital Delivery Le Chen 1 2010

Company Confidential

Exception Flow

• Bad Package

25 © 2010 DRM in Digital Delivery/Le Chen

Page 26: Digital Rights Management in Digital Delivery Le Chen 1 2010

Company Confidential

Exception Flow

• HSM not available

26 © 2010 DRM in Digital Delivery/Le Chen

Page 27: Digital Rights Management in Digital Delivery Le Chen 1 2010

Company Confidential

Exception Flow

• Bad acknoledgement

27 © 2010 DRM in Digital Delivery/Le Chen

Page 28: Digital Rights Management in Digital Delivery Le Chen 1 2010

Company Confidential

RTS Protocol

• Unpack RTS Request

28 © 2010 DRM in Digital Delivery/Le Chen

Page 29: Digital Rights Management in Digital Delivery Le Chen 1 2010

Company Confidential

RTS Protocol

• Pack RTS Request

29 © 2010 DRM in Digital Delivery/Le Chen

Page 30: Digital Rights Management in Digital Delivery Le Chen 1 2010

Company Confidential

Logical view Design

30 © 2010 DRM in Digital Delivery/Le Chen

• Presentation layer• Business Logic Tier (EJBs)• Integration Tier (DAOs)• Resource Tier

Page 31: Digital Rights Management in Digital Delivery Le Chen 1 2010

Company Confidential

Operation

31 © 2010 DRM in Digital Delivery/Le Chen

Page 32: Digital Rights Management in Digital Delivery Le Chen 1 2010

Company Confidential

Deployment view

32 © 2010 DRM in Digital Delivery/Le Chen

Page 33: Digital Rights Management in Digital Delivery Le Chen 1 2010

Company Confidential

Key Issues in Design

• The authentication requirement between Rights Issuer and receiving devices is one of the key improvements in OMA DRM v2.0, so when design application following OMA DRM v2.0 standards, authentication process needs to be included in the design

• OMA DRM v2.0 includes Public Key Infrastructure (PKI) security in the specification, so encryption and decryption process, and protection and distribution of keys needs to be considered the design

• The tiered design approach should be used to avoid tight coupling between components. This will facilitate the future development and bug fixing.

33 © 2010 DRM in Digital Delivery/Le Chen

Page 34: Digital Rights Management in Digital Delivery Le Chen 1 2010

Company Confidential

Future Development Areas for DRM

• Improving the usability to provide ease of use to consumers. This can be achieved by better technical DRM solution or by different business model

• Balancing between the user friendliness and the functionality of DRM standards

• Supporting Interoperability of different DRM standards

34 © 2010 DRM in Digital Delivery/Le Chen