Top Banner
Digital Rights Management John Manferdelli University of Washington
22

Digital Rights Management John Manferdelli University of ...

Feb 25, 2022

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Digital Rights Management John Manferdelli University of ...

Dig

ital R

ight

s M

anag

emen

t

John

Man

ferd

elli

Uni

vers

ity o

f Was

hing

ton

Page 2: Digital Rights Management John Manferdelli University of ...

DR

M a

s P

rote

ctio

n fo

r cop

yrig

hted

m

ater

ials

�D

igita

l obj

ects

are

ver

y ea

sy a

nd c

heap

to c

opy:

�M

usic

, M

ovie

s, T

ext,

Exe

cuta

bles

.�

Esse

ntia

lly n

o �fr

ictio

n�fro

m d

uplic

atio

n co

sts

�H

owto

pro

tect

dig

ital c

opyr

ight

ed c

onte

nt?

�S

houl

dco

nten

t be

prot

ecte

d?

�40

billi

on d

olla

rs a

yea

r in

fore

ign

trade

for t

he U

S.

�Sh

ould

not

con

flict

with

�fai

r-us

e�do

ctrin

e.�

Wha

t is

fair

use

anyw

ay?

�C

anco

nten

t be

prot

ecte

d?�

Pers

iste

nt p

irate

will

alw

ays

succ

eed

in c

opyi

ng.

�Te

chno

logy

can

pot

entia

lly p

reve

nt s

mal

l sca

le c

opyi

ng:

�kee

ping

hon

est p

eopl

e ho

nest

�Sl

ide

from

Dan

Bon

eh

Page 3: Digital Rights Management John Manferdelli University of ...

Com

pute

r Sec

urity

and

DR

M

�C

ompu

ter S

ecur

ityin

volv

es p

roce

sses

and

tech

nolo

gy th

at

enab

le th

e en

forc

emen

t of a

sec

urity

pol

icy

on a

com

pute

r sy

stem

. Se

curit

y P

olic

y sp

ecifi

es:

�Is

olat

ion/

Sec

ure

Exe

cutio

n an

d ot

her �

safe

ty�p

rope

rties

Acce

ss a

nd u

se re

stric

tions

on

reso

urce

s im

pose

d on

sec

urity

pr

inci

pals

(thin

k �u

sers

�) u

sing

the

com

pute

r sys

tem

(�Ac

cess

C

ontro

l�)�

Avai

labi

lity

and

othe

r �liv

enes

s�pr

oper

ties

�D

igita

l Rig

ht M

anag

emen

t (a.

k.a

�co

pyrig

ht/c

onte

nt

prot

ectio

n)in

volv

es e

nfor

cem

ent o

f a s

ecur

ity p

olic

y af

fect

ing

use

of d

igita

lly e

ncod

ed m

ater

ial s

peci

fied

by a

co

nten

t �ow

ner�

on c

ompu

ters

not

in th

e ph

ysic

al c

ontro

l of

the

cont

ent o

wne

r.

Page 4: Digital Rights Management John Manferdelli University of ...

Ker

neliz

edD

esig

n

�Tr

uste

d C

ompu

ting

Bas

e�

Har

dwar

e an

d so

ftwar

e fo

r en

forc

ing

secu

rity

rule

s�

Ref

eren

ce m

onito

r�

Part

of T

CB

All s

yste

m c

alls

go

thro

ugh

refe

renc

e m

onito

r for

sec

urity

ch

ecki

ng�

Not

e im

plic

it tru

st a

ssum

ptio

n:

�ow

ner�

or �A

dmin

�ful

ly tr

uste

d an

d om

nipo

tent

�Ad

ditio

nal a

ssum

ptio

n: n

o of

fline

at

tack

.

Use

r sp

ace

Kern

el s

paceU

ser

proc

ess

OS

kern

el

TCBR

efer

ence

m

onito

r

Page 5: Digital Rights Management John Manferdelli University of ...

�an

d no

w fo

r som

ethi

ng c

ompl

etel

y di

ffere

nt�

Supe

rfici

ally

any

way

�Tr

ust M

odel

Cha

nges

�Ad

min

is n

ot �r

oot o

f tru

st�f

or a

ll ac

tions

�M

odel

is n

atur

ally

dis

tribu

ted

�Pe

rsis

tent

Rig

hts

�O

ff-lin

e�

Gra

nula

r and

Fle

xibl

e

�C

rypt

ogra

phic

pro

tect

ion

�So

ftwar

e ru

ns in

Tru

sted

Env

ironm

ent.

�So

ftwar

e is

the

Sec

urity

Prin

cipa

l�

Lam

pson

, Aba

di, W

obbe

rmod

el

Page 6: Digital Rights Management John Manferdelli University of ...

Key

Ele

men

ts o

f DR

M

�Li

cens

ing

�Th

e pr

oces

s of

pac

kagi

ng a

nd d

eliv

erin

g pr

otec

ted

bits

w

ith u

n-fo

rgea

ble

term

s of

usa

ge (�

digi

tal l

icen

se�)

us

eabl

e on

ly b

y au

then

ticat

ed u

ser/e

nviro

nmen

t �

Enfo

rcem

ent

�Th

e pr

oces

s of

insu

ring

that

the

use

of th

e di

gita

l wor

k ad

here

s to

enu

mer

ated

use

, priv

acy

and

oper

atin

g re

stric

tions

sta

ted

in a

dig

ital l

icen

se

Page 7: Digital Rights Management John Manferdelli University of ...

Enc

rypt

ion

and

Rul

es

�C

onte

nt is

enc

rypt

ed�

Ther

efor

e un

usab

le w

ith th

e rig

ht to

dec

rypt

the

cont

ent

�C

onte

nt li

cens

e sp

ecifi

es ri

ghts

(�ca

pabi

litie

s�) �

cann

ot b

e fo

rged

�S

peci

fies

auth

entic

atio

n in

form

atio

n, e

nviro

nmen

t (a

pplic

atio

n, O

S, e

tc.)

�S

peci

fies

usag

e/ac

cess

con

trol r

ules

�C

onta

ins

the

�sea

led�

key

for t

he c

onte

nt. K

ey c

an b

e se

aled

by

any

licen

sor (

usin

g a

publ

ic k

ey) b

ut c

an o

nly

be �u

nsea

led�

with

in a

n is

olat

ed,

trust

ed e

nviro

nmen

t (b

y a

priv

ate

key

only

kn

own

in th

at tr

uste

d en

viro

nmen

t)

Content License 938473

Machine 02345 Running

Program 1 (with hash 0x7af33)

Can view Document 3332 on 2002-20-01

Sealed Key: 0x445635

Signed Boeing

Page 8: Digital Rights Management John Manferdelli University of ...

Enf

orce

men

tA

t ini

tializ

atio

n, T

rust

ed P

rogr

am s

ays:

1.Is

olat

e m

e2.

Aut

hent

icat

e m

eA

fter I

nitia

lizat

ion

com

plet

es s

ucce

ssfu

lly, J

eff�s

PC

1.M

akes

Priv

ate

key

avai

labl

e fo

r use

Whe

n co

nsum

ing

cont

ent,

Trus

ted

Prog

ram

:1.

Ret

rieve

s lic

ense

and

enc

rypt

ed c

onte

nt fi

le2.

Aut

hent

icat

es li

cens

e by

che

ckin

g di

gita

l sig

natu

re3.

Che

cks

rule

com

plia

nce

4.U

ses

priv

ate

key

to u

nsea

l the

con

tent

key

5.D

ecry

pts

and

uses

con

tent

with

in T

rust

ed P

rogr

am

Trus

ted

Prog

ram

Trus

ted

Prog

ram

Aut

hent

icat

ing

Pub

lic K

eyA

uthe

ntic

atin

g P

ublic

Key

(( ��R

oot o

f Tru

stR

oot o

f Tru

st�� ))

0x7a

f33

0x7a

f33

PK

: 837

4505

PK

: 837

4505Je

ff�s

PC

Jeff�

s P

C

Page 9: Digital Rights Management John Manferdelli University of ...

Obt

aini

ng R

ight

s an

d P

erm

issi

ons

Lice

nse

Serv

er

Content License 938473

Machine 02345 Running

Program 1 (with hash 0x7af33)

Can view Document 3332

on 2002-20-01

Sealed Key: 0x445635

Signed Boeing

Machine License 83874

Machine 02345 Running

Program 1 (with hash 0x7af33)

Has access to a private key

Whose public key is 0x2231

Signed Microsoft

2) R

espo

nse

2) R

espo

nse

Her

eH

ere ��

s yo

ur li

cens

es

your

lice

nse

Cus

tom

er b

enef

itsC

usto

mer

ben

efits

!!Li

cens

es c

an b

e us

ed o

fflin

eLi

cens

es c

an b

e us

ed o

fflin

e!!

Sim

ple

man

agem

ent o

f aut

horiz

atio

n (n

o ce

ntra

l aut

horit

y)S

impl

e m

anag

emen

t of a

utho

rizat

ion

(no

cent

ral a

utho

rity)

!!V

ery

sim

ple

and

flexi

ble

dist

ribut

ion

(a s

erve

r can

dis

tribu

te t

Ver

y si

mpl

e an

d fle

xibl

e di

strib

utio

n (a

ser

ver c

an d

istri

bute

t o o �� a

nyany ��

clie

nt)

clie

nt)

12

Jeff�

s PC

1)1)R

eque

stR

eque

stI w

ant d

ocum

ent 2

346.

I w

ant d

ocum

ent 2

346.

H

ere

Her

e ��s

my

Mac

hine

Lic

ense

s

my

Mac

hine

Lic

ense

to

sho

w y

ou c

an tr

ust m

y to

sho

w y

ou c

an tr

ust m

y m

achi

nem

achi

ne

Page 10: Digital Rights Management John Manferdelli University of ...

Key

Har

dwar

e C

ompo

nent

s

""

##

$$

%%

Page 11: Digital Rights Management John Manferdelli University of ...

A H

yper

viso

r?

Page 12: Digital Rights Management John Manferdelli University of ...

XrM

L E

xpre

ssio

nsEa

ch �

right

s ex

pres

sion

�m

ay s

peci

fy a

com

bina

tion

of

rule

s su

ch a

s:�

wha

t rig

hts

are

avai

labl

e,�

for w

hom

,�

for h

ow m

any

times

, �

with

in w

hat t

ime

perio

d,�

unde

r wha

t acc

ess

cond

ition

s,

�fo

r wha

t fee

s,

�w

ithin

whi

ch te

rrito

ry, a

nd

�w

ith w

hato

blig

atio

ns,

�Et

c.

Page 13: Digital Rights Management John Manferdelli University of ...

�Sm

all�

Rig

hts

Man

agem

ent

�Pr

otec

ting

Per

sona

l Inf

orm

atio

n�

Prot

ectin

g pe

rson

al H

ealth

and

Fin

anci

al

info

rmat

ion

�Pr

otec

ting

indi

vidu

al c

omm

unic

atio

n�

Prot

ectin

g C

orpo

rate

info

rmat

ion

Page 14: Digital Rights Management John Manferdelli University of ...

Sce

nario

s fo

r Sm

all R

ight

s M

anag

emen

t

!!C

entr

aliz

ed lo

ggin

g of

lice

nse

requ

ests

Cen

tral

ized

logg

ing

of li

cens

e re

ques

ts!!

Cen

tral

ized

tem

plat

es to

exp

ress

pol

icy

Cen

tral

ized

tem

plat

es to

exp

ress

pol

icy

!!O

fflin

e an

d on

line

scen

ario

sO

fflin

e an

d on

line

scen

ario

s

!!Se

cure

dat

abas

eSe

cure

dat

abas

e --ba

cked

con

tent

back

ed c

onte

nt!!

Intr

anet

por

tals

Intr

anet

por

tals

!!B

ackw

ard

com

patib

ility

for e

arlie

r app

sB

ackw

ard

com

patib

ility

for e

arlie

r app

s

!!W

ho c

an a

cces

s se

nsiti

ve p

lans

Who

can

acc

ess

sens

itive

pla

ns!!

Leve

l of a

cces

s: p

rint,

edit,

sav

e, e

tc.

Leve

l of a

cces

s: p

rint,

edit,

sav

e, e

tc.

!!Le

ngth

of a

cces

s pe

riod

Leng

th o

f acc

ess

perio

d

!!K

eep

mai

l off

inte

rnal

mem

os.c

om

Kee

p m

ail o

ff in

tern

alm

emos

.com

!!

Secu

re E

xecu

tive

Secu

re E

xecu

tive --

leve

l mai

l le

vel m

ail

!!C

onsi

sten

t app

licat

ion

of e

xpiry

rule

sC

onsi

sten

t app

licat

ion

of e

xpiry

rule

s

Web

W

eb

Con

tent

Con

tent

Prot

ecte

d Pr

otec

ted

Info

rmat

ion

Info

rmat

ion

Do

Do --

Not

Not

-- For

war

d Fo

rwar

d Em

ail

Emai

l

Cen

tral

ized

C

entr

aliz

ed

Polic

y C

ontr

olPo

licy

Con

trol

Page 15: Digital Rights Management John Manferdelli University of ...

�Big

�Rig

hts

Man

agem

ent

�M

ass

Mar

ket C

onte

nt�

Book

s�

Audi

o�

Vide

o�

Softw

are

�M

uch

mor

e fle

xibl

e us

e an

d be

tter c

onte

nt

man

agem

ent

�Bu

t the

re a

re �F

air U

se�c

once

rns

whi

ch c

an b

e m

itiga

ted

�m

aybe

Page 16: Digital Rights Management John Manferdelli University of ...

Sce

nario

s fo

r Big

Rig

hts

Man

agem

ent

!!Li

brar

y/ar

chiv

eLi

brar

y/ar

chiv

e!!

Roa

min

gR

oam

ing

!!�� A

ctiv

eA

ctiv

e ��co

nten

tco

nten

t

!!Pr

emiu

m re

leas

esPr

emiu

m re

leas

es!!

Pric

e di

scrim

inat

ion

Pric

e di

scrim

inat

ion

!!I h

ear i

t. I

wan

t it.

I get

it.

I hea

r it.

I w

ant i

t. I g

et it

.!!

Low

er m

anuf

actu

ring

cost

sLo

wer

man

ufac

turin

g co

sts

!!M

ore

varie

ty?

Mor

e va

riety

?

!!M

ost p

opul

ar u

se o

f DR

MM

ost p

opul

ar u

se o

f DR

M!!

I don

I don

�� t ge

t it

t get

it

Pay

per v

iew

Pa

y pe

r vie

w

mov

ies

mov

ies

Web

dis

trib

uted

Web

dis

trib

uted

song

sso

ngs

Rin

g to

nes

Rin

g to

nes

EE-- B

ooks

Boo

ks

Page 17: Digital Rights Management John Manferdelli University of ...

Wat

erm

arki

ng

�D

urab

le, i

mpe

rcep

tible

mar

king

of c

onte

nt.

Eac

h �m

ark�

is

one

bit o

f inf

orm

atio

n.�

Rob

ust w

ater

mar

king

�w

ater

mar

k is

har

d to

rem

oved

(usi

ng

Stir

mar

k, e

tc)

�Ap

proa

ch ta

ken

by S

DM

I, D

igim

arc,

Ver

ence

.�

A fa

ilure

, gen

eral

ly s

peak

ing

�W

ater

mar

king

is c

onte

nt s

peci

fic�

Text

-cus

tom

spa

cing

, cus

tom

font

s, d

elib

erat

e er

rors

�M

usic

�C

hang

es to

Fou

rier t

rans

form

ed c

ompo

nent

s �

Pict

ure

�Sl

ight

cha

nges

to F

ourie

r tra

nsfo

rmed

imag

e�

Vide

o

�W

ater

mar

king

ban

dwid

th is

als

o co

nten

t spe

cific

Page 18: Digital Rights Management John Manferdelli University of ...

How

a w

ater

mar

king

sys

tem

pro

tect

ion

syst

ems

wor

k

�O

ne b

it of

info

rmat

ion

(The

�pro

tect

ed b

it�) s

igna

ls

to p

laye

r (IE

, Rea

lPla

yer,

Win

dow

s M

edia

Pla

yer,

DV

D P

laye

r) th

at c

onte

nt is

pro

tect

ed a

nd

requ

ires

a lic

ense

.�

Som

etim

es a

dditi

onal

bits

enc

oded

iden

tifyi

ng c

onte

nt�

Play

er re

fuse

s to

pla

y co

nten

t with

out a

lice

nse

�C

an y

ou th

ink

how

to d

efea

t thi

s?�

Hin

t: D

on�t

ask,

don

�t te

ll, d

on�t

enfo

rce

Page 19: Digital Rights Management John Manferdelli University of ...

DR

M S

yste

ms

in th

e N

ews

�SD

MI

�W

indo

ws

Med

ia P

laye

r�

Rea

l DR

M�

Appl

e D

RM

�IR

M�

CSS

�M

acro

visi

on�

LexM

ark

�Xb

ox�

Sony

Pla

ysta

tion

Page 20: Digital Rights Management John Manferdelli University of ...

Tech

nica

l Iss

ues

in M

echa

nism

s

�Br

eak

Onc

e B

reak

Eve

ryw

here

�D

egre

e of

isol

atio

n�

Tran

sduc

er P

robl

em�

I/O�

Priv

acy

and

Inte

rope

rabi

lity

�Fl

exib

ility

(tra

nsfe

r, et

c)�

Mul

tiple

dev

ices

�M

ultip

le u

sers

�M

igra

tion

�U

ser C

ontro

l/Bac

kup

Page 21: Digital Rights Management John Manferdelli University of ...

Soc

ial a

nd P

olic

y Is

sues

��F

air U

se�

�M

onop

oly

�Loc

k-in

��

Eros

ion

of c

opyr

ight

in fa

vor o

f �co

ntra

cts�

�Ar

chiv

e�

DM

CA

and

hac

king

��In

form

atio

n w

ants

to b

e fre

e��

Con

sum

er e

xpec

tatio

ns�

Dra

coni

an li

cens

ing

polic

ies

Page 22: Digital Rights Management John Manferdelli University of ...

An

Ana

log

Atta

ck �