Digital Rights Management
Digital Rights Management
By
CHANDRASHEKHARA N
2nd Year MSc.
Department of Studies and Research in Library and
Information Science,
Tumkur University, Tumakuru.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
Content
• Introduction
• What is DRM
• Purpose of DRM
• Functional Architecture of DRM
• DRM Techniques
• Conclusion
• References
1-2
Introduction
1-3
What is DRM
1-4
Purpose of DRM
Copyright Protection
Preventing Piracy
Content Monetization
Access Control
Digital Rights Enforcement
Protecting Sensitive Information
1-5
Functional Architecture of DRM
1-6
DRM Techniques
• Water marking
• Digital Signature
• Digital Certificate
• Finger Printing
• Encryption
• License Control / Access Control
1-7
DRM Techniques
Watermarking:
Embeds identifying information into digital content.
Can be visible or invisible.
Helps track unauthorized distribution.
Provides proof of ownership.
Digital Signature:
Uses cryptographic techniques to authenticate the sender and
ensure the integrity of digital content.
Provides assurance that the content has not been altered or
tampered with.
Typically involves the use of public-private key pairs.
1-8
DRM Techniques
Digital Certificate:
Issued by a trusted authority (Certificate Authority) to validate
the identity of individuals or entities.
Contains public key and other identifying information.
Used in conjunction with digital signatures to establish trust.
Fingerprinting:
Generates a unique identifier for each copy of digital content.
Can be based on specific characteristics of the content itself or
metadata associated with it.
Allows tracking of individual copies to identify sources of
unauthorized distribution.
1-9
DRM Techniques
Encryption:
Converts digital content into a coded form using algorithms.
Requires a key to decrypt and access the original content.
Protects content from unauthorized access or interception.
License Control / Access Control:
Governs the usage rights and permissions associated with
digital content.
Specifies conditions under which the content can be accessed,
copied, or distributed.
Can involve techniques such as DRM licenses, user
authentication, and content expiration.
1-10
Conclusion
1-11
References
1-12
Y o u
a n k
T h
1-13