By: Rohit Thapliyal 23 september 2010

`

DRM refers to those technologies which have been specifically developed for managing digital rights

` Set of technologies that enable content owners to specify and control:
the access they want to give consumers and the conditions under which it is given.

`

`

`

Early implementation of DRM was devised by the Japanese engineer Ryoichi Mori in 1983 based on encryption. first-generation: focused on security and encryption. second-generation: covers the description, identification, trading, protection, monitoring and tracking of all forms of rights usage.

`

Standard DRM architecture is composed by three components:
Creation, Distribution and Consumption of the digital contents.

1. 2.

3. 4.

5.

6.

User requests a digital content. The content server demand to user to fill some information. User sends the information. The Content server requests license generation to license server. The license server generate license and send it to the content server. The content server gives to user authorization to read the digital content.

`

DRM and film:
Content Scrambling System (CSS). Protected Media Path.

`

DRM and music:
Apple's FairPlay DRM system.

`

E-books:
Adobe Reader: restricted and unrestricted files. Microsoft Reader: sealed, inscribed and owner exclusive e-books.

`

` `

`

Digital watermarking is the process of inserting a digital signal or pattern into digital content. The signal, known as a watermark. can be used later to identify the owner of the work and to trace illegal copies of the work. Types:
visible :easily perceived by a viewer (or listener). invisible: imperceptible under normal viewing.

`

Fingerprints are an extension to watermarking principle. Making each copy of the content unique to the person who receives it. Fingerprinting technique:
Secure Hash Algorithm (SHA): takes a message of less than 264 bits in length and produces a 160-bit message digest.

`

`

`

F4MS not only includes software components but also hardware components. This co-design framework permit to design, develop a high performance, flexible, reuse, maintainable DRM systems.

`

`

A modeling of several levels of abstraction A separation between the communication model and the treatment model describing the system Heterogeneity: possibility to use multiple programming languages and hardware architectures Distributed Validation.

`

`

`

`

There are many methods to bypass DRM control on audio and video content.
Burn and then rip into DRM-free files. Many software programs.

`

Watermarks can be removed. Analog hole: use software to record the signals being sent through the audio or video cards.

`

`

DRM is emerging as a formidable new challenge, and it is essential for DRM systems to provide interoperable services. Solutions to DRM challenges will enable untold amounts of new content to be made available in safe, open, and trusted environments.

`

`

It¶s an accepted fact that rarity increases the worth of almost anything. If something is easily copied it is often regarded as being of low value. Hence we require high performance DRM systems to protect the original work with less cost time to deal with rapid growing DRM market.

`

` ` `

³DRMS Co-design by F4MS´ by Aissam BERRAHOU, Mourad RAFI and Mohsine ELEULDJ, IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 2, No 2, March 2010 http://www.epic.org/privacy/drm/ http://www.dlib.org/dlib/june01/iannella/06iannella.html http://www.eff.org/IP/DRM/

Sign up to vote on this title
UsefulNot useful