1 functional reference model for digital rights management systems vural Ünlü / prof. dr. thomas...
TRANSCRIPT
1
Functional reference model for Digital Rights Management Systems
Vural Ünlü / Prof. Dr. Thomas HessMunich School of Management
Berlin, 5. September2004
2
The fundamental Problem: Copying and Exchange of content are facilitated through ICT
Easy data exchange through P2P networks
Easy copying through separation of content and
medium
3
... the first visible consequencesother affected media segments might follow…
Source: Deutsche Landesgruppe der IFPI, Jahreswirtschaftsbericht 2001
Y2Y Change in revenues of Germany music market (in %)
-14
-12
-10
-8
-6
-4
-2
0
2
1996 1997 1998 1999 2000 2001 0% 20% 40% 60% 80% 100%
Advertisingjournal
Free-TV
Newspaper
Scient.publication
Pay-TV
Book
Sales revenues
Advertising revenues
Share of total sales
Revenue split of media segments
4
Generic Copyright Protection Strategies
Technical
Digital Rights Management
Systems
• Encryption• Watermarking• Rights Expression
Languages
Legal
Statutory and contractual
• Mass Market licenses• Lobbyism• Change of Copyright
regime• Legal education of
end consumers
Business
Business models
• Revenue Model• Value Chain• Cost structure
5
Digital Rights Management Systems as the most effective solution?
• DRM pursues the objective of technically enforcing the economic and moral interests of content providers.
• By using a bundle of technical components, a secure and efficient use of digital content via all media is ensured and usage-dependent business models are made possible.
– In a narrower sense, DRM-systems pursue a complete control over distribution and use of content.
– In a broader sense, DRM-systems allow an individual and differentiated royalty management of the use of content and efficient backend legal administration.
6
Logical architecture of Digital Rights Management Systems
ClearedContent
Billing
Billing Data
AccessControl
LicenseData
Prosecution of infringe-
ments
UsageControl
Content-library
Source: Ünlü/Hess 2004
7
Access control
DNS-Rerouting
IP-Blocking
Application Blocking
Proxy Filtering
Anonymous
ID/Password
Token-based
Biometric
Example: Pay-TV
y=f(x) X=f`(y)
End consumerContent ProviderFiltering
techniquesAuthentification
8
Usage control
Rights ExpressionLanguages
Right to render content
Right to transport content
Right to produce derivative works
Example: xrML
• eXtensible rights Markup Language (XrML) is a language for the expression of rights for a media asset
• Syntax is defined in XML
grantgrant
Issuer
license
Right
Principal
Resource
Condition
Source: Based on ContentGuard 2002, Version 2.0
9
Prosecution of infringements
Example: ImageBridge™ Enterprise
Visible Wasserzeichen
Invisible – robuste watermarks
Invisible – fragile watermarks
DigitalFinderprints
Watermarks
Source: Digimarc, http://www.digimarc.com/products/imagebridge/default.asp
10
Billing
Pay-per-use(Pay-per-Listen)(Pay-per-view)
Usage Metering
Superdistribution
Billing
PublisherBook buyer
Book buyer
Price of book
Price of book
minus X%
X% of Book price
Super -distribution
Rights
•Rendering: display on output device, print
•Extent: indefinite
Rights
•Rendering: display on output device
•Extent: indefinite
Example: Superdistribution of book content
11
Digital content
Protected media
Streaming or web server
Clearinghouse license server
1
2
4
3
Package Media
Distributecontent
Set up license server
Request /Receive media
End customer (front-end DRMS)
Content provider (back-end DRMS)
6 Rendercontent
Portabledevice
5Authenticate/Downloadlicense
Microsoft Media Player with Media
Rights Manager
Example: Microsoft Windows Media Player
12
DRM Functionality as a result of intertwining technologies
Encryption
Digital watermarks
Authentication techniques (e.g., digital signature)
Robust watermarks for authentication
check
Access control
Rights expression languages
Representation of authorized users /
devices
Representation of license rights
Usage release through content
decryption (e.g. based on symmetrical algorithms)
Robust watermarks for enforcement of
copy protection
Usage control
Elimination of manipulated DRMS-
clients (device revocation after
challenge-response operation)
Fragile watermarks for integrity check
Prosecution of infringements
Representation of authorized users /
devices
Representation of usage information
Secure payment procedures
(e.g. SET-protocol)
Robust watermarks for authentication
check
Metered-usage billing
Function
Technology