Free Compatibility Reports by aig17760

VIEWS: 19 PAGES: 8

More Info
									Digital Rights Management for Mobiles


                    Jani Suomalainen


    Research Seminar on Telecommunications Business II
       Telecommunications Software and Multimedia Laboratory
                Helsinki University of Technology
                          April 20th 2004
2. Introduction
   The openness of multimedia capable mobile terminals for
    content (e.g. ringtones, music and video tracks, programs,
    games) has brought the piracy problem also to mobile
    content industry

   Digital Rights Management (DRM) is provisioning and storing
    content in such a manner that use and copying is authorized
    and controlled

   This presentation will provide a survey on:
      – DRM content provisioning strategies,
      – protection means,
      – actors affecting in the DRM economy
   from mobile terminals point of view

                 Jani Suomalainen / Digital Rights Management for Mobiles / 20.4.2004
3. Content Provisioning
   OMA DRM content delivery models try to fulfil all users’
    requirements (trying not to make the use of DRM content
    more difficult than ‘free’ content):
      – basic download
      – streaming
      – sharing content between peers (super distribution)
      – using content with multiple devices (domain model)

   Wireless interface or hardware modules as delivery
    medium (wireless is the strategy used in OMA DRM)




                Jani Suomalainen / Digital Rights Management for Mobiles / 20.4.2004
4. Content and Rights
   Identifying copy righted content from ‘free’ content is one of
     the fundamental problems of DRM
   • OMA’s strategy is a separate delivery of rights and content -
     enabling diverse content delivery methods (see figure)
   • Alternatively rights could be embedded to content (e.g.
     Watermarks)
                     Content                                             Rights
                      issuer                                             issuer

                            Content                           Right
                             object                           object                    Right
                                                                                        object
   Network
   Storage      Content
                 object                                                                     Other
                                             Mobile                         Content
   Removable    Right                                                        object         Mobiles
                object                      Terminal
     Media

                 Jani Suomalainen / Digital Rights Management for Mobiles / 20.4.2004
                                                                              Means against ‘what is right’, threat
                                                                              Knowledge of distribution based
                                                                              Access to content
                                                                              Trusted Computing can beof
  5. DRM Protection                                                           pirated content: of
                                                                              of possession
                                                                              onpunishment and correct pricing
                                                                              - HW based mandatory access
                                                                                trusted hardware
                                                                              - fingerprintsnormal users from
                                                                              will prevent to Computing Group)
                                                                              control (Trusted track leakage
                                                                              - Assuring‘free’attackingthrough
                                                                              acquiring and content distributors
                                                                                encryption keys trustworthiness
                                                                                scanning terminal (CMLA for
                                                                              trusted OMA key distribution)
                                                                              (remote attestation)
                                                                              awkward ways
                                                                              - P2P poisoning, DoS attacks

               Copies from                                   Reverse-                   Copying        Darknets
                                Copies from
 Threat         transport                                     engin. /                using analog     (pirated
                                 terminal
examples         medium                                     transform.                   means         content)



               Proactive means       Secure delivery                  Terminal                 Reactive coun-
Protective     - legislation         - trusted                        security                 ter attacks
               -ethics               hardware                         - mandatory              - legislation
 barrier
               -pricing              - encryption                     access control           - hindering P2P


Provisioning        Content                                    Mobile                                Mobile
  path of           producer                                  terminal                                user
 DRM data
                        Jani Suomalainen / Digital Rights Management for Mobiles / 20.4.2004
6. Actors in the DRM Field

                                          Darknet


                                                     Want content

              Want content                   Users
                                         Want terminals without
                                         content usage restrictions
                               Anti-piracy
                               legislation
                                                         Provides
  Provides      Encourage Regulators      Encourage      devices
  content       competition               competition
         Content
                                                                             Manufacturers
        producers     Want DRM                                  Want content
                      capable devices                           availability
      Provides guarantees       Industry                                          Provides guarantees
      of compatibility and      alliances                                         of compatibility and
      trustworthiness                                                             content availability
                    Jani Suomalainen / Digital Rights Management for Mobiles / 20.4.2004
7. Conclusions
   Technical and social means cannot weed piracy completely
      – Openness of mobile terminals is out of the ‘bottle’,
        terminals will be able to play free content
      – DRM content can be made to look like free content and
        will be available from somewhere

   DRM protection can only provide extra time and make piracy
    awkward

   Trends seem to direct us towards flexibility (user-
    friendliness) as well as industry wide trust model and
    compatibility




                 Jani Suomalainen / Digital Rights Management for Mobiles / 20.4.2004
8. Thank You!

   Comments, questions?




              Jani Suomalainen / Digital Rights Management for Mobiles / 20.4.2004

								
To top