digital rights management john manferdelli university of

22
Digital Rights Management John Manferdelli University of Washington

Upload: others

Post on 25-Feb-2022

3 views

Category:

Documents


0 download

TRANSCRIPT

Dig

ital R

ight

s M

anag

emen

t

John

Man

ferd

elli

Uni

vers

ity o

f Was

hing

ton

DR

M a

s P

rote

ctio

n fo

r cop

yrig

hted

m

ater

ials

�D

igita

l obj

ects

are

ver

y ea

sy a

nd c

heap

to c

opy:

�M

usic

, M

ovie

s, T

ext,

Exe

cuta

bles

.�

Esse

ntia

lly n

o �fr

ictio

n�fro

m d

uplic

atio

n co

sts

�H

owto

pro

tect

dig

ital c

opyr

ight

ed c

onte

nt?

�S

houl

dco

nten

t be

prot

ecte

d?

�40

billi

on d

olla

rs a

yea

r in

fore

ign

trade

for t

he U

S.

�Sh

ould

not

con

flict

with

�fai

r-us

e�do

ctrin

e.�

Wha

t is

fair

use

anyw

ay?

�C

anco

nten

t be

prot

ecte

d?�

Pers

iste

nt p

irate

will

alw

ays

succ

eed

in c

opyi

ng.

�Te

chno

logy

can

pot

entia

lly p

reve

nt s

mal

l sca

le c

opyi

ng:

�kee

ping

hon

est p

eopl

e ho

nest

�Sl

ide

from

Dan

Bon

eh

Com

pute

r Sec

urity

and

DR

M

�C

ompu

ter S

ecur

ityin

volv

es p

roce

sses

and

tech

nolo

gy th

at

enab

le th

e en

forc

emen

t of a

sec

urity

pol

icy

on a

com

pute

r sy

stem

. Se

curit

y P

olic

y sp

ecifi

es:

�Is

olat

ion/

Sec

ure

Exe

cutio

n an

d ot

her �

safe

ty�p

rope

rties

Acce

ss a

nd u

se re

stric

tions

on

reso

urce

s im

pose

d on

sec

urity

pr

inci

pals

(thin

k �u

sers

�) u

sing

the

com

pute

r sys

tem

(�Ac

cess

C

ontro

l�)�

Avai

labi

lity

and

othe

r �liv

enes

s�pr

oper

ties

�D

igita

l Rig

ht M

anag

emen

t (a.

k.a

�co

pyrig

ht/c

onte

nt

prot

ectio

n)in

volv

es e

nfor

cem

ent o

f a s

ecur

ity p

olic

y af

fect

ing

use

of d

igita

lly e

ncod

ed m

ater

ial s

peci

fied

by a

co

nten

t �ow

ner�

on c

ompu

ters

not

in th

e ph

ysic

al c

ontro

l of

the

cont

ent o

wne

r.

Ker

neliz

edD

esig

n

�Tr

uste

d C

ompu

ting

Bas

e�

Har

dwar

e an

d so

ftwar

e fo

r en

forc

ing

secu

rity

rule

s�

Ref

eren

ce m

onito

r�

Part

of T

CB

All s

yste

m c

alls

go

thro

ugh

refe

renc

e m

onito

r for

sec

urity

ch

ecki

ng�

Not

e im

plic

it tru

st a

ssum

ptio

n:

�ow

ner�

or �A

dmin

�ful

ly tr

uste

d an

d om

nipo

tent

�Ad

ditio

nal a

ssum

ptio

n: n

o of

fline

at

tack

.

Use

r sp

ace

Kern

el s

paceU

ser

proc

ess

OS

kern

el

TCBR

efer

ence

m

onito

r

�an

d no

w fo

r som

ethi

ng c

ompl

etel

y di

ffere

nt�

Supe

rfici

ally

any

way

�Tr

ust M

odel

Cha

nges

�Ad

min

is n

ot �r

oot o

f tru

st�f

or a

ll ac

tions

�M

odel

is n

atur

ally

dis

tribu

ted

�Pe

rsis

tent

Rig

hts

�O

ff-lin

e�

Gra

nula

r and

Fle

xibl

e

�C

rypt

ogra

phic

pro

tect

ion

�So

ftwar

e ru

ns in

Tru

sted

Env

ironm

ent.

�So

ftwar

e is

the

Sec

urity

Prin

cipa

l�

Lam

pson

, Aba

di, W

obbe

rmod

el

Key

Ele

men

ts o

f DR

M

�Li

cens

ing

�Th

e pr

oces

s of

pac

kagi

ng a

nd d

eliv

erin

g pr

otec

ted

bits

w

ith u

n-fo

rgea

ble

term

s of

usa

ge (�

digi

tal l

icen

se�)

us

eabl

e on

ly b

y au

then

ticat

ed u

ser/e

nviro

nmen

t �

Enfo

rcem

ent

�Th

e pr

oces

s of

insu

ring

that

the

use

of th

e di

gita

l wor

k ad

here

s to

enu

mer

ated

use

, priv

acy

and

oper

atin

g re

stric

tions

sta

ted

in a

dig

ital l

icen

se

Enc

rypt

ion

and

Rul

es

�C

onte

nt is

enc

rypt

ed�

Ther

efor

e un

usab

le w

ith th

e rig

ht to

dec

rypt

the

cont

ent

�C

onte

nt li

cens

e sp

ecifi

es ri

ghts

(�ca

pabi

litie

s�) �

cann

ot b

e fo

rged

�S

peci

fies

auth

entic

atio

n in

form

atio

n, e

nviro

nmen

t (a

pplic

atio

n, O

S, e

tc.)

�S

peci

fies

usag

e/ac

cess

con

trol r

ules

�C

onta

ins

the

�sea

led�

key

for t

he c

onte

nt. K

ey c

an b

e se

aled

by

any

licen

sor (

usin

g a

publ

ic k

ey) b

ut c

an o

nly

be �u

nsea

led�

with

in a

n is

olat

ed,

trust

ed e

nviro

nmen

t (b

y a

priv

ate

key

only

kn

own

in th

at tr

uste

d en

viro

nmen

t)

Content License 938473

Machine 02345 Running

Program 1 (with hash 0x7af33)

Can view Document 3332 on 2002-20-01

Sealed Key: 0x445635

Signed Boeing

Enf

orce

men

tA

t ini

tializ

atio

n, T

rust

ed P

rogr

am s

ays:

1.Is

olat

e m

e2.

Aut

hent

icat

e m

eA

fter I

nitia

lizat

ion

com

plet

es s

ucce

ssfu

lly, J

eff�s

PC

1.M

akes

Priv

ate

key

avai

labl

e fo

r use

Whe

n co

nsum

ing

cont

ent,

Trus

ted

Prog

ram

:1.

Ret

rieve

s lic

ense

and

enc

rypt

ed c

onte

nt fi

le2.

Aut

hent

icat

es li

cens

e by

che

ckin

g di

gita

l sig

natu

re3.

Che

cks

rule

com

plia

nce

4.U

ses

priv

ate

key

to u

nsea

l the

con

tent

key

5.D

ecry

pts

and

uses

con

tent

with

in T

rust

ed P

rogr

am

Trus

ted

Prog

ram

Trus

ted

Prog

ram

Aut

hent

icat

ing

Pub

lic K

eyA

uthe

ntic

atin

g P

ublic

Key

(( ��R

oot o

f Tru

stR

oot o

f Tru

st�� ))

0x7a

f33

0x7a

f33

PK

: 837

4505

PK

: 837

4505Je

ff�s

PC

Jeff�

s P

C

Obt

aini

ng R

ight

s an

d P

erm

issi

ons

Lice

nse

Serv

er

Content License 938473

Machine 02345 Running

Program 1 (with hash 0x7af33)

Can view Document 3332

on 2002-20-01

Sealed Key: 0x445635

Signed Boeing

Machine License 83874

Machine 02345 Running

Program 1 (with hash 0x7af33)

Has access to a private key

Whose public key is 0x2231

Signed Microsoft

2) R

espo

nse

2) R

espo

nse

Her

eH

ere ��

s yo

ur li

cens

es

your

lice

nse

Cus

tom

er b

enef

itsC

usto

mer

ben

efits

!!Li

cens

es c

an b

e us

ed o

fflin

eLi

cens

es c

an b

e us

ed o

fflin

e!!

Sim

ple

man

agem

ent o

f aut

horiz

atio

n (n

o ce

ntra

l aut

horit

y)S

impl

e m

anag

emen

t of a

utho

rizat

ion

(no

cent

ral a

utho

rity)

!!V

ery

sim

ple

and

flexi

ble

dist

ribut

ion

(a s

erve

r can

dis

tribu

te t

Ver

y si

mpl

e an

d fle

xibl

e di

strib

utio

n (a

ser

ver c

an d

istri

bute

t o o �� a

nyany ��

clie

nt)

clie

nt)

12

Jeff�

s PC

1)1)R

eque

stR

eque

stI w

ant d

ocum

ent 2

346.

I w

ant d

ocum

ent 2

346.

H

ere

Her

e ��s

my

Mac

hine

Lic

ense

s

my

Mac

hine

Lic

ense

to

sho

w y

ou c

an tr

ust m

y to

sho

w y

ou c

an tr

ust m

y m

achi

nem

achi

ne

Key

Har

dwar

e C

ompo

nent

s

""

##

$$

%%

A H

yper

viso

r?

XrM

L E

xpre

ssio

nsEa

ch �

right

s ex

pres

sion

�m

ay s

peci

fy a

com

bina

tion

of

rule

s su

ch a

s:�

wha

t rig

hts

are

avai

labl

e,�

for w

hom

,�

for h

ow m

any

times

, �

with

in w

hat t

ime

perio

d,�

unde

r wha

t acc

ess

cond

ition

s,

�fo

r wha

t fee

s,

�w

ithin

whi

ch te

rrito

ry, a

nd

�w

ith w

hato

blig

atio

ns,

�Et

c.

�Sm

all�

Rig

hts

Man

agem

ent

�Pr

otec

ting

Per

sona

l Inf

orm

atio

n�

Prot

ectin

g pe

rson

al H

ealth

and

Fin

anci

al

info

rmat

ion

�Pr

otec

ting

indi

vidu

al c

omm

unic

atio

n�

Prot

ectin

g C

orpo

rate

info

rmat

ion

Sce

nario

s fo

r Sm

all R

ight

s M

anag

emen

t

!!C

entr

aliz

ed lo

ggin

g of

lice

nse

requ

ests

Cen

tral

ized

logg

ing

of li

cens

e re

ques

ts!!

Cen

tral

ized

tem

plat

es to

exp

ress

pol

icy

Cen

tral

ized

tem

plat

es to

exp

ress

pol

icy

!!O

fflin

e an

d on

line

scen

ario

sO

fflin

e an

d on

line

scen

ario

s

!!Se

cure

dat

abas

eSe

cure

dat

abas

e --ba

cked

con

tent

back

ed c

onte

nt!!

Intr

anet

por

tals

Intr

anet

por

tals

!!B

ackw

ard

com

patib

ility

for e

arlie

r app

sB

ackw

ard

com

patib

ility

for e

arlie

r app

s

!!W

ho c

an a

cces

s se

nsiti

ve p

lans

Who

can

acc

ess

sens

itive

pla

ns!!

Leve

l of a

cces

s: p

rint,

edit,

sav

e, e

tc.

Leve

l of a

cces

s: p

rint,

edit,

sav

e, e

tc.

!!Le

ngth

of a

cces

s pe

riod

Leng

th o

f acc

ess

perio

d

!!K

eep

mai

l off

inte

rnal

mem

os.c

om

Kee

p m

ail o

ff in

tern

alm

emos

.com

!!

Secu

re E

xecu

tive

Secu

re E

xecu

tive --

leve

l mai

l le

vel m

ail

!!C

onsi

sten

t app

licat

ion

of e

xpiry

rule

sC

onsi

sten

t app

licat

ion

of e

xpiry

rule

s

Web

W

eb

Con

tent

Con

tent

Prot

ecte

d Pr

otec

ted

Info

rmat

ion

Info

rmat

ion

Do

Do --

Not

Not

-- For

war

d Fo

rwar

d Em

ail

Emai

l

Cen

tral

ized

C

entr

aliz

ed

Polic

y C

ontr

olPo

licy

Con

trol

�Big

�Rig

hts

Man

agem

ent

�M

ass

Mar

ket C

onte

nt�

Book

s�

Audi

o�

Vide

o�

Softw

are

�M

uch

mor

e fle

xibl

e us

e an

d be

tter c

onte

nt

man

agem

ent

�Bu

t the

re a

re �F

air U

se�c

once

rns

whi

ch c

an b

e m

itiga

ted

�m

aybe

Sce

nario

s fo

r Big

Rig

hts

Man

agem

ent

!!Li

brar

y/ar

chiv

eLi

brar

y/ar

chiv

e!!

Roa

min

gR

oam

ing

!!�� A

ctiv

eA

ctiv

e ��co

nten

tco

nten

t

!!Pr

emiu

m re

leas

esPr

emiu

m re

leas

es!!

Pric

e di

scrim

inat

ion

Pric

e di

scrim

inat

ion

!!I h

ear i

t. I

wan

t it.

I get

it.

I hea

r it.

I w

ant i

t. I g

et it

.!!

Low

er m

anuf

actu

ring

cost

sLo

wer

man

ufac

turin

g co

sts

!!M

ore

varie

ty?

Mor

e va

riety

?

!!M

ost p

opul

ar u

se o

f DR

MM

ost p

opul

ar u

se o

f DR

M!!

I don

I don

�� t ge

t it

t get

it

Pay

per v

iew

Pa

y pe

r vie

w

mov

ies

mov

ies

Web

dis

trib

uted

Web

dis

trib

uted

song

sso

ngs

Rin

g to

nes

Rin

g to

nes

EE-- B

ooks

Boo

ks

Wat

erm

arki

ng

�D

urab

le, i

mpe

rcep

tible

mar

king

of c

onte

nt.

Eac

h �m

ark�

is

one

bit o

f inf

orm

atio

n.�

Rob

ust w

ater

mar

king

�w

ater

mar

k is

har

d to

rem

oved

(usi

ng

Stir

mar

k, e

tc)

�Ap

proa

ch ta

ken

by S

DM

I, D

igim

arc,

Ver

ence

.�

A fa

ilure

, gen

eral

ly s

peak

ing

�W

ater

mar

king

is c

onte

nt s

peci

fic�

Text

-cus

tom

spa

cing

, cus

tom

font

s, d

elib

erat

e er

rors

�M

usic

�C

hang

es to

Fou

rier t

rans

form

ed c

ompo

nent

s �

Pict

ure

�Sl

ight

cha

nges

to F

ourie

r tra

nsfo

rmed

imag

e�

Vide

o

�W

ater

mar

king

ban

dwid

th is

als

o co

nten

t spe

cific

How

a w

ater

mar

king

sys

tem

pro

tect

ion

syst

ems

wor

k

�O

ne b

it of

info

rmat

ion

(The

�pro

tect

ed b

it�) s

igna

ls

to p

laye

r (IE

, Rea

lPla

yer,

Win

dow

s M

edia

Pla

yer,

DV

D P

laye

r) th

at c

onte

nt is

pro

tect

ed a

nd

requ

ires

a lic

ense

.�

Som

etim

es a

dditi

onal

bits

enc

oded

iden

tifyi

ng c

onte

nt�

Play

er re

fuse

s to

pla

y co

nten

t with

out a

lice

nse

�C

an y

ou th

ink

how

to d

efea

t thi

s?�

Hin

t: D

on�t

ask,

don

�t te

ll, d

on�t

enfo

rce

DR

M S

yste

ms

in th

e N

ews

�SD

MI

�W

indo

ws

Med

ia P

laye

r�

Rea

l DR

M�

Appl

e D

RM

�IR

M�

CSS

�M

acro

visi

on�

LexM

ark

�Xb

ox�

Sony

Pla

ysta

tion

Tech

nica

l Iss

ues

in M

echa

nism

s

�Br

eak

Onc

e B

reak

Eve

ryw

here

�D

egre

e of

isol

atio

n�

Tran

sduc

er P

robl

em�

I/O�

Priv

acy

and

Inte

rope

rabi

lity

�Fl

exib

ility

(tra

nsfe

r, et

c)�

Mul

tiple

dev

ices

�M

ultip

le u

sers

�M

igra

tion

�U

ser C

ontro

l/Bac

kup

Soc

ial a

nd P

olic

y Is

sues

��F

air U

se�

�M

onop

oly

�Loc

k-in

��

Eros

ion

of c

opyr

ight

in fa

vor o

f �co

ntra

cts�

�Ar

chiv

e�

DM

CA

and

hac

king

��In

form

atio

n w

ants

to b

e fre

e��

Con

sum

er e

xpec

tatio

ns�

Dra

coni

an li

cens

ing

polic

ies

An

Ana

log

Atta

ck �