uruli N. LISc Ysore University 2010-11 M
Overview of my presentation: Mission Introduction History DRM functional architecture Interested Players in DRM Example of DRM Implementation Laws regarding DRM Controversy of DRM Future of DRM
Digital Rights Management  Mission : protect rights of digital media producers while enabling access for fair use grant exclusive rights in exchange for disclosure Reality : DRM is just protection technology, and is fast eroding our rights of fair use may never be able to reuse parts of  any  digital content (documents, film, images, audio, etc.) hinders progress of science and the useful arts
Introduction: Digital rights management  ( DRM ) is a term for  access control  technologies that are used by hardware manufacturers, publishers,  copyright  holders and individuals to limit the use of digital content and devices. The term is used to describe any technology that inhibits uses of digital content that is not desired or intended by the content provider .  The term does not generally refer to other forms of  copy protection , which can be circumvented without modifying the file or device, such as  serial numbers  or  key files .
Conti…. It can also refer to restrictions associated with specific instances of digital works or devices. Digital rights management is used by companies such as  Sony ,  Amazon ,  Apple Inc. ,  Microsoft ,  AOL  and the  BBC . The use of digital rights management is controversial. Proponents argue it is needed by copyright holders to prevent unauthorized duplication of their work, either to maintain  artistic integrity [1]  or to ensure continued revenue streams DRM technologies attempt to control use of digital media by preventing access, copying or conversion to other formats by  end users .
Conti… DRM technologies have enabled publishers to enforce access policies that not only disallow  copyright infringements , but also prevent lawful  fair use  of copyrighted works, or even implement use constraints on non-copyrighted works that they distribute DRM is most commonly used by the  entertainment industry  (e.g.,  film  and  recording ). [6]  Many  online music stores , such as  Apple Inc. 's  iTunes Store , as well as many  e-book  publishers have implemented DRM. In recent years, a number of  television producers  have implemented DRM on consumer electronic devices to control access to the freely-broadcast content of their shows, in response to the rising popularity of time-shifting  digital video recorder  systems
What does an organisation need to consider? Intellectual Property (IP) rights  Copyright Payment mechanisms Security E-commerce and ERP systems Licensing…
How do customers access your content? Devices & Platforms Package/Protect/Licence Content
How  should  it work? 2 Package with  appropriate  security 3 Trade with chosen  ‘ currency’ 4 Allow the content to be used 1 Take any content
History of DRM In the pre-digital era, people's ability to do various things to or with content were limited. The networked digital age makes it possible to do just about anything to digital content, instantaneously and at virtually no cost. While this is a great opportunity for new content business models, it threatens the livelihood of content creators by making rampant piracy possible  Also, more and more public and private entities are going digital and doing business online. Information is increasing retrieved through computer networks by customers, employees and partners etc.
History of DRM Thus, we see the need for a technology that enables the secure creation, management, distribution and promotion of digital content on the Internet. A very early implementation of DRM was the Software Service System (SSS) devised by the Japanese engineer Ryoichi Mori in 1983.
DRM includes: It includes: Persistent Protection:  Technology for protecting files via encryption and allowing access to them only after the entity desiring access has had its identity authenticated and its rights to that specific type of access verified Business rights:  Capability of associating business rights with a content by contract, e.g. author’s rights to an article or musician’s rights to a song Access tracking : Capability of tracking access to and operations on content  Rights licensing : Capability of defining specific rights to content and making them available by contract
DRM Functional Architecture IP Asset Creation and Capture Module Rights Validation to ensure content being created includes the rights to do so Rights Creation to allow rights to be assigned to new content Rights Workflow to allow for content to be processed through series of workflow steps IP Asset Management Module Repository functions to enable the access/retrieval of content in potentially distributed databases and the access/retrieval of metadata Trading functions to enable assignment of licenses to parties who have traded agreements for rights over content, including payments from licensees to rights holders (e.g., royalty payments) IP Asset Usage Module Permissions Management to enable usage environment to honor the rights associated with the content, e.g., if user only has the right to view the document, then printing will not be allowed Tracking Management to enable monitoring of usage of content where such tracking is part of the agreed to license conditions, e.g., user has license to play video ten times
DRM Functional Architecture  
Interested Players in DRM Government Agencies Interested in controlled viewing and sharing of highly secure and confidential documents, audio and video data. “ Need to know basis” Private Corporations Want to limit the sharing of their proprietary information Track accesses and any modifications made to it.  E.g. news agencies like Reuters  Owners of commercial content  Content owners, artists, and publishers want to gain revenue through sale and promotions But are concerned about protecting their copyrighted works from illegal use
Interested Players in DRM  Intermediaries (service providers, content distributors etc.) Concerned about minimizing costs of providing services Cautious about protecting themselves from lawsuits over illegal distribution  Producers of end user equipment (PCs, players, etc.)  Concerned about minimizing design and production costs Unwilling to pay for features that only some users need End users Interested in immediate access to desired content Want to use the content conveniently
Thus, we see… DRM can help ensure companies, corporations, and other entities who share similar business that: Rights are tracked at ingestion Access is controlled during production processes Protection for the content extends throughout product lifecycles Additionally, DRM can integrate persistent content protection with content management to ensure: Proper business practices  Implementation of new business models Compliance with regulatory requirements in industries such as financial services, healthcare, and government
An Example of DRM Implementation  OzAuthors (An online e-book store) Rights Interface
Laws regarding DRM Digital rights management systems have received some international legal backing by implementation of the 1996  WIPO Copyright Treaty  (WCT). Article 11 of the Treaty requires nations party to the treaties to enact laws against DRM circumvention. The WCT has been implemented in most member states of the  World Intellectual Property Organization .  The American implementation is the  Digital Millennium Copyright Act  (DMCA),  while in Europe the treaty has been implemented by the 2001  European directive on copyright , which requires member states of the  European Union  to implement legal protections for technological prevention measures.  In 2006, the lower house of the French parliament adopted such legislation as part of the controversial  DADVSI  law, but added that protected DRM techniques should be made interoperable, a move which caused widespread controversy in the United States.
Controversy Many organizations, prominent individuals, and computer scientists are opposed to DRM.  Two notable DRM critics are  John Walker , as expressed for instance, in his article  The Digital Imprimatur : How big brother and big media can put the Internet genie back in the bottle , and  Richard Stallman  in his article  The Right to Read   and in other public statements: "DRM is an example of a malicious feature - a feature designed to hurt the user of the software, and therefore, it's something for which there can never be toleration.
Professor  Ross Anderson  of Cambridge University heads a British organization which opposes DRM and similar efforts in the UK and elsewhere.  Cory Doctorow , a prominent writer and technology blogger, spoke on the Microsoft campus criticizing the technology, the morality, and the marketing of DRM.
The Future of DRM DRM is emerging as a formidable new challenge, and it is essential for DRM systems to provide interoperable services. Solutions to DRM challenges will enable untold amounts of new content to be made available in safe, open, and trusted environments.  The technology can be expected to be heavily used in the future to support digital library collections, code and software development, distance education, and networked collaboration, among other applications.
The Future of DRM DRM standardization is occurring in a number of open organizations.  The Open EBook Forum [OEBF] and the MPEG group [MPEG] are leading the charge for the eBook and multimedia sectors.  The Internet Engineering Task Force [IETF] and the World Wide Web Consortium [W3C] have also commenced work on DRM issues. Their work will be important for the entire DRM sector, and it is also important that all communities be heard during these standardization processes in industry and sector-neutral standards organizations.
References “ Integrating Content Management with Digital Rights Manangement”,  Bill Rosenblatt and Gail Dykstra, May 14 2003 http://www.epic.org/privacy/drm/ http://www.dlib.org/dlib/june01/iannella/06iannella.html http://www.eff.org/IP/DRM/
 
 

More Related Content

PPT
Cybersquattingand its remedies
PPTX
Chapter1 Cyber security Law & policy.pptx
PPTX
Cyber security and current trends
PPTX
Copyright issues in cyberspace
PPT
Cyber security standards
PDF
Cyber Ethics Notes.pdf
PPTX
Computer ethics and crime
Cybersquattingand its remedies
Chapter1 Cyber security Law & policy.pptx
Cyber security and current trends
Copyright issues in cyberspace
Cyber security standards
Cyber Ethics Notes.pdf
Computer ethics and crime

What's hot (20)

PPTX
Digital Rights Management PPT
PPT
Digital rights management an essential feature in the digital era
PPTX
Digital library
PPT
DRM Powerpoint
PPT
Information retrieval system
PPTX
Digital Right Management
PPT
Digital Preservation
PPTX
Model of information retrieval (3)
PPTX
Digital rights management (drm) and you
PDF
Web technology
PPTX
Open source software
PPTX
Content Management System - CMS
PDF
Introduction to Digital libraries
PPSX
PPTX
Digital library software
PPT
Application software
PPTX
Network forensic
PPTX
Ppt evaluation of information retrieval system
PPTX
Cloud Computing and Services | PPT
Digital Rights Management PPT
Digital rights management an essential feature in the digital era
Digital library
DRM Powerpoint
Information retrieval system
Digital Right Management
Digital Preservation
Model of information retrieval (3)
Digital rights management (drm) and you
Web technology
Open source software
Content Management System - CMS
Introduction to Digital libraries
Digital library software
Application software
Network forensic
Ppt evaluation of information retrieval system
Cloud Computing and Services | PPT
Ad

Viewers also liked (18)

PDF
Digital Rights Management for Ebooks
PDF
DRM, Digital Content, and the Consumer Experience: Lessons Learned From The M...
PPTX
De-mystifying DRM
PPTX
Electronic Publishing Arun Joseph MLISc
PPT
Tarikere: my native place
PPT
Digital Rights Management for Animation & Gaming
PPTX
Drm landscape and online streaming
PPTX
Digital Rights Management One For Sharepoint
PPTX
Software Piracy
PPT
Digital Strategy For Publishers
PPTX
Delphi method ed.3
PDF
معرفی و آموزش سامانه مدیریت محتوای مزانین - سید مسعود صدر نژاد
PPT
E-Publishing: Challenges and Opportunities
PPTX
Software piracy
PDF
DRM, Digital Content, and the Consumer Experience: More Lessons Learned from ...
PPS
Dewey Decimal Classification
PPTX
مدیریت محتوا Content management
Digital Rights Management for Ebooks
DRM, Digital Content, and the Consumer Experience: Lessons Learned From The M...
De-mystifying DRM
Electronic Publishing Arun Joseph MLISc
Tarikere: my native place
Digital Rights Management for Animation & Gaming
Drm landscape and online streaming
Digital Rights Management One For Sharepoint
Software Piracy
Digital Strategy For Publishers
Delphi method ed.3
معرفی و آموزش سامانه مدیریت محتوای مزانین - سید مسعود صدر نژاد
E-Publishing: Challenges and Opportunities
Software piracy
DRM, Digital Content, and the Consumer Experience: More Lessons Learned from ...
Dewey Decimal Classification
مدیریت محتوا Content management
Ad

Similar to Digital Rights Management (20)

PDF
Presentazione
PPT
Lec49 50 digital rights management
PDF
What is DRM_ The Ultimate Guide to Digital Rights Management.pdf
PPTX
Digital Libraries
PDF
What is DRM, Types of DRM
PPT
Privacy in computing & interlectual property
PDF
Guideline for the Production of Digital Rights Management (DRM)
DOCX
digital rights management for multimedia files
PPT
Huiyun zhang
PPTX
Authorship Drm Seminar
PPT
Digital Right Management
PDF
To DRM or not to DRM?
PPT
DRM in the Digital Age
PPT
Is Digital Rights Management a Means to end
PDF
A Digital Rights Management System Based on Cloud
PPTX
Vdrm presentation
PPT
DRM: A Skeptics View
PPT
Digital Rights Management and Trusted Computing Base
PDF
What is Digital Rights Management System and How does it work : Ameva Tech
Presentazione
Lec49 50 digital rights management
What is DRM_ The Ultimate Guide to Digital Rights Management.pdf
Digital Libraries
What is DRM, Types of DRM
Privacy in computing & interlectual property
Guideline for the Production of Digital Rights Management (DRM)
digital rights management for multimedia files
Huiyun zhang
Authorship Drm Seminar
Digital Right Management
To DRM or not to DRM?
DRM in the Digital Age
Is Digital Rights Management a Means to end
A Digital Rights Management System Based on Cloud
Vdrm presentation
DRM: A Skeptics View
Digital Rights Management and Trusted Computing Base
What is Digital Rights Management System and How does it work : Ameva Tech

Recently uploaded (20)

PDF
Hospital Case Study .architecture design
PPTX
Designing Adaptive Learning Paths in Virtual Learning Environments
PDF
African Communication Research: A review
PDF
CHALLENGES FACED BY TEACHERS WHEN TEACHING LEARNERS WITH DEVELOPMENTAL DISABI...
PPTX
Diploma pharmaceutics notes..helps diploma students
PPTX
2025 High Blood Pressure Guideline Slide Set.pptx
PDF
Review of Related Literature & Studies.pdf
PPTX
Key-Features-of-the-SHS-Program-v4-Slides (3) PPT2.pptx
PDF
Kalaari-SaaS-Founder-Playbook-2024-Edition-.pdf
PDF
Disorder of Endocrine system (1).pdfyyhyyyy
PDF
anganwadi services for the b.sc nursing and GNM
PDF
Horaris_Grups_25-26_Definitiu_15_07_25.pdf
PPTX
BSCE 2 NIGHT (CHAPTER 2) just cases.pptx
PPTX
4. Diagnosis and treatment planning in RPD.pptx
PPTX
IT infrastructure and emerging technologies
DOCX
EDUCATIONAL ASSESSMENT ASSIGNMENT SEMESTER MAY 2025.docx
PDF
Health aspects of bilberry: A review on its general benefits
PDF
FYJC - Chemistry textbook - standard 11.
PDF
BSc-Zoology-02Sem-DrVijay-Comparative anatomy of vertebrates.pdf
PPTX
operating_systems_presentations_delhi_nc
Hospital Case Study .architecture design
Designing Adaptive Learning Paths in Virtual Learning Environments
African Communication Research: A review
CHALLENGES FACED BY TEACHERS WHEN TEACHING LEARNERS WITH DEVELOPMENTAL DISABI...
Diploma pharmaceutics notes..helps diploma students
2025 High Blood Pressure Guideline Slide Set.pptx
Review of Related Literature & Studies.pdf
Key-Features-of-the-SHS-Program-v4-Slides (3) PPT2.pptx
Kalaari-SaaS-Founder-Playbook-2024-Edition-.pdf
Disorder of Endocrine system (1).pdfyyhyyyy
anganwadi services for the b.sc nursing and GNM
Horaris_Grups_25-26_Definitiu_15_07_25.pdf
BSCE 2 NIGHT (CHAPTER 2) just cases.pptx
4. Diagnosis and treatment planning in RPD.pptx
IT infrastructure and emerging technologies
EDUCATIONAL ASSESSMENT ASSIGNMENT SEMESTER MAY 2025.docx
Health aspects of bilberry: A review on its general benefits
FYJC - Chemistry textbook - standard 11.
BSc-Zoology-02Sem-DrVijay-Comparative anatomy of vertebrates.pdf
operating_systems_presentations_delhi_nc

Digital Rights Management

  • 1. uruli N. LISc Ysore University 2010-11 M
  • 2. Overview of my presentation: Mission Introduction History DRM functional architecture Interested Players in DRM Example of DRM Implementation Laws regarding DRM Controversy of DRM Future of DRM
  • 3. Digital Rights Management Mission : protect rights of digital media producers while enabling access for fair use grant exclusive rights in exchange for disclosure Reality : DRM is just protection technology, and is fast eroding our rights of fair use may never be able to reuse parts of any digital content (documents, film, images, audio, etc.) hinders progress of science and the useful arts
  • 4. Introduction: Digital rights management ( DRM ) is a term for access control technologies that are used by hardware manufacturers, publishers, copyright holders and individuals to limit the use of digital content and devices. The term is used to describe any technology that inhibits uses of digital content that is not desired or intended by the content provider . The term does not generally refer to other forms of copy protection , which can be circumvented without modifying the file or device, such as serial numbers or key files .
  • 5. Conti…. It can also refer to restrictions associated with specific instances of digital works or devices. Digital rights management is used by companies such as Sony , Amazon , Apple Inc. , Microsoft , AOL and the BBC . The use of digital rights management is controversial. Proponents argue it is needed by copyright holders to prevent unauthorized duplication of their work, either to maintain artistic integrity [1] or to ensure continued revenue streams DRM technologies attempt to control use of digital media by preventing access, copying or conversion to other formats by end users .
  • 6. Conti… DRM technologies have enabled publishers to enforce access policies that not only disallow copyright infringements , but also prevent lawful fair use of copyrighted works, or even implement use constraints on non-copyrighted works that they distribute DRM is most commonly used by the entertainment industry (e.g., film and recording ). [6] Many online music stores , such as Apple Inc. 's iTunes Store , as well as many e-book publishers have implemented DRM. In recent years, a number of television producers have implemented DRM on consumer electronic devices to control access to the freely-broadcast content of their shows, in response to the rising popularity of time-shifting digital video recorder systems
  • 7. What does an organisation need to consider? Intellectual Property (IP) rights Copyright Payment mechanisms Security E-commerce and ERP systems Licensing…
  • 8. How do customers access your content? Devices & Platforms Package/Protect/Licence Content
  • 9. How should it work? 2 Package with appropriate security 3 Trade with chosen ‘ currency’ 4 Allow the content to be used 1 Take any content
  • 10. History of DRM In the pre-digital era, people's ability to do various things to or with content were limited. The networked digital age makes it possible to do just about anything to digital content, instantaneously and at virtually no cost. While this is a great opportunity for new content business models, it threatens the livelihood of content creators by making rampant piracy possible Also, more and more public and private entities are going digital and doing business online. Information is increasing retrieved through computer networks by customers, employees and partners etc.
  • 11. History of DRM Thus, we see the need for a technology that enables the secure creation, management, distribution and promotion of digital content on the Internet. A very early implementation of DRM was the Software Service System (SSS) devised by the Japanese engineer Ryoichi Mori in 1983.
  • 12. DRM includes: It includes: Persistent Protection: Technology for protecting files via encryption and allowing access to them only after the entity desiring access has had its identity authenticated and its rights to that specific type of access verified Business rights: Capability of associating business rights with a content by contract, e.g. author’s rights to an article or musician’s rights to a song Access tracking : Capability of tracking access to and operations on content Rights licensing : Capability of defining specific rights to content and making them available by contract
  • 13. DRM Functional Architecture IP Asset Creation and Capture Module Rights Validation to ensure content being created includes the rights to do so Rights Creation to allow rights to be assigned to new content Rights Workflow to allow for content to be processed through series of workflow steps IP Asset Management Module Repository functions to enable the access/retrieval of content in potentially distributed databases and the access/retrieval of metadata Trading functions to enable assignment of licenses to parties who have traded agreements for rights over content, including payments from licensees to rights holders (e.g., royalty payments) IP Asset Usage Module Permissions Management to enable usage environment to honor the rights associated with the content, e.g., if user only has the right to view the document, then printing will not be allowed Tracking Management to enable monitoring of usage of content where such tracking is part of the agreed to license conditions, e.g., user has license to play video ten times
  • 15. Interested Players in DRM Government Agencies Interested in controlled viewing and sharing of highly secure and confidential documents, audio and video data. “ Need to know basis” Private Corporations Want to limit the sharing of their proprietary information Track accesses and any modifications made to it. E.g. news agencies like Reuters Owners of commercial content Content owners, artists, and publishers want to gain revenue through sale and promotions But are concerned about protecting their copyrighted works from illegal use
  • 16. Interested Players in DRM Intermediaries (service providers, content distributors etc.) Concerned about minimizing costs of providing services Cautious about protecting themselves from lawsuits over illegal distribution Producers of end user equipment (PCs, players, etc.) Concerned about minimizing design and production costs Unwilling to pay for features that only some users need End users Interested in immediate access to desired content Want to use the content conveniently
  • 17. Thus, we see… DRM can help ensure companies, corporations, and other entities who share similar business that: Rights are tracked at ingestion Access is controlled during production processes Protection for the content extends throughout product lifecycles Additionally, DRM can integrate persistent content protection with content management to ensure: Proper business practices Implementation of new business models Compliance with regulatory requirements in industries such as financial services, healthcare, and government
  • 18. An Example of DRM Implementation OzAuthors (An online e-book store) Rights Interface
  • 19. Laws regarding DRM Digital rights management systems have received some international legal backing by implementation of the 1996 WIPO Copyright Treaty (WCT). Article 11 of the Treaty requires nations party to the treaties to enact laws against DRM circumvention. The WCT has been implemented in most member states of the World Intellectual Property Organization . The American implementation is the Digital Millennium Copyright Act (DMCA), while in Europe the treaty has been implemented by the 2001 European directive on copyright , which requires member states of the European Union to implement legal protections for technological prevention measures. In 2006, the lower house of the French parliament adopted such legislation as part of the controversial DADVSI law, but added that protected DRM techniques should be made interoperable, a move which caused widespread controversy in the United States.
  • 20. Controversy Many organizations, prominent individuals, and computer scientists are opposed to DRM. Two notable DRM critics are John Walker , as expressed for instance, in his article The Digital Imprimatur : How big brother and big media can put the Internet genie back in the bottle , and Richard Stallman in his article The Right to Read and in other public statements: "DRM is an example of a malicious feature - a feature designed to hurt the user of the software, and therefore, it's something for which there can never be toleration.
  • 21. Professor Ross Anderson of Cambridge University heads a British organization which opposes DRM and similar efforts in the UK and elsewhere. Cory Doctorow , a prominent writer and technology blogger, spoke on the Microsoft campus criticizing the technology, the morality, and the marketing of DRM.
  • 22. The Future of DRM DRM is emerging as a formidable new challenge, and it is essential for DRM systems to provide interoperable services. Solutions to DRM challenges will enable untold amounts of new content to be made available in safe, open, and trusted environments. The technology can be expected to be heavily used in the future to support digital library collections, code and software development, distance education, and networked collaboration, among other applications.
  • 23. The Future of DRM DRM standardization is occurring in a number of open organizations. The Open EBook Forum [OEBF] and the MPEG group [MPEG] are leading the charge for the eBook and multimedia sectors. The Internet Engineering Task Force [IETF] and the World Wide Web Consortium [W3C] have also commenced work on DRM issues. Their work will be important for the entire DRM sector, and it is also important that all communities be heard during these standardization processes in industry and sector-neutral standards organizations.
  • 24. References “ Integrating Content Management with Digital Rights Manangement”, Bill Rosenblatt and Gail Dykstra, May 14 2003 http://www.epic.org/privacy/drm/ http://www.dlib.org/dlib/june01/iannella/06iannella.html http://www.eff.org/IP/DRM/
  • 25.  
  • 26.  

Editor's Notes

  • #9: There is a range of emerging client devices and technologies. Its not only about making your content available to the Windows/PC based environment. If you want to trade digital content then how users access your information is important. For example: A PC might allow file download via HTTP where as a mobile phone might only support WAP. In Japan the mobile phone has overtaken the PC as the primary mode of access to the Internet. There are now 10M Japanese WAP (IMODE) CHECK???? based Internet users. You must be able to protect and manage your content whenever and however users are accessing content. Solutions should be able to package content on ‘the fly’ . This means that that the content can be securely packaged depending on where the content is being delivered to either a PDA, PC or Mobile Phone. It is protected according to the users individual requirements. For example delivering content via a PDF file makes it impossible to deliver via a mobile phone.