1 / 8

Digital Rights Management for Mobiles

Digital Rights Management for Mobiles. Jani Suomalainen Research Seminar on Telecommunications Business II Telecommunications Software and Multimedia Laboratory Helsinki University of Technology April 20th 2004. 2 . Introduction.

oriel
Télécharger la présentation

Digital Rights Management for Mobiles

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Digital Rights Management for Mobiles Jani Suomalainen Research Seminar on Telecommunications Business II Telecommunications Software and Multimedia Laboratory Helsinki University of Technology April 20th 2004

  2. 2. Introduction • The openness of multimedia capable mobile terminals for content (e.g. ringtones, music and video tracks, programs, games) has brought the piracy problem also to mobile content industry • Digital Rights Management (DRM) is provisioning and storing content in such a manner that use and copying is authorized and controlled • This presentation will provide a survey on: • DRM content provisioning strategies, • protection means, • actors affecting in the DRM economy • from mobile terminals point of view

  3. 3. Content Provisioning • OMA DRM content delivery models try to fulfil all users’ requirements (trying not to make the use of DRM content more difficult than ‘free’ content): • basic download • streaming • sharing content between peers (super distribution) • using content with multiple devices (domain model) • Wireless interface or hardware modules as delivery medium (wireless is the strategy used in OMA DRM)

  4. 4. Content and Rights • Identifying copy righted content from ‘free’ content is one of the fundamental problems of DRM • OMA’s strategy is a separate delivery of rights and content - enabling diverse content delivery methods (see figure) • Alternatively rights could be embedded to content (e.g. Watermarks) Content issuer Rights issuer Content object Right object Right object Network Storage Content object Other Mobiles Mobile Terminal Content object Removable Media Right object

  5. Means against distribution of pirated content: - fingerprints to track leakage - scanning and attacking distributors - P2P poisoning, DoS attacks Trusted Computing - HW based mandatory access control (Trusted Computing Group) - Assuring terminal trustworthiness (remote attestation) Access to content can be based on possession of - trusted hardware - encryption keys (CMLA for trusted OMA key distribution) Knowledge of ‘what is right’, threat of punishment and correct pricing will prevent normal users from acquiring ‘free’ content through awkward ways Copies from transport medium Copies from terminal Reverse- engin. / transform. Copying using analog means Darknets (pirated content) Proactive means - legislation -ethics -pricing Secure delivery - trusted hardware - encryption Terminal security - mandatory access control Reactive coun- ter attacks - legislation - hindering P2P Content producer Mobile terminal Mobile user 5. DRM Protection Threat examples Protective barrier Provisioning path of DRM data

  6. Darknet Wantcontent Users Wantcontent Want terminals without content usage restrictions Anti-piracy legislation Regulators Provides devices Encourage competition Provides content Encourage competition Content producers Manufacturers Want content availability Want DRM capable devices Industry alliances Provides guarantees of compatibility and trustworthiness Provides guarantees of compatibility and content availability 6. Actors in the DRM Field

  7. 7. Conclusions • Technical and social means cannot weed piracy completely • Openness of mobile terminals is out of the ‘bottle’, terminals will be able to play free content • DRM content can be made to look like free content and will be available from somewhere • DRM protection can only provide extra time and make piracy awkward • Trends seem to direct us towards flexibility (user-friendliness) as well as industry wide trust model and compatibility

  8. 8. Thank You! • Comments, questions?

More Related