Top Banner
Digital Rights Management John Manferdelli University of Washington
22

Digital Rights Management John Manferdelli University of Washington.

Dec 22, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Digital Rights Management John Manferdelli University of Washington.

Digital Rights Management

John Manferdelli

University of Washington

Page 2: Digital Rights Management John Manferdelli University of Washington.

DRM as Protection for copyrighted materials

• Digital objects are very easy and cheap to copy:– Music, Movies, Text, Executables.– Essentially no “friction” from duplication costs

• How to protect digital copyrighted content?• Should content be protected?

– 40 billion dollars a year in foreign trade for the US.– Should not conflict with “fair-use” doctrine.– What is fair use anyway?

• Can content be protected?– Persistent pirate will always succeed in copying.– Technology can potentially prevent small scale copying:

“keeping honest people honest”Slide from Dan Boneh

Page 3: Digital Rights Management John Manferdelli University of Washington.

Computer Security and DRM

• Computer Security involves processes and technology that enable the enforcement of a security policy on a computer system. Security Policy specifies:– Isolation/Secure Execution and other “safety” properties – Access and use restrictions on resources imposed on security

principals (think “users”) using the computer system (“Access Control”)

– Availability and other “liveness” properties

• Digital Right Management (a.k.a – copyright/content protection) involves enforcement of a security policy affecting use of digitally encoded material specified by a content “owner” on computers not in the physical control of the content owner.

Page 4: Digital Rights Management John Manferdelli University of Washington.

Kernelized Design

• Trusted Computing Base– Hardware and software for

enforcing security rules

• Reference monitor– Part of TCB – All system calls go through

reference monitor for security checking

– Note implicit trust assumption: “owner” or “Admin” fully trusted and omnipotent

– Additional assumption: no offline attack.

User space

Kernel space

User proces

s

OS kernel

TCB

Reference monitor

Page 5: Digital Rights Management John Manferdelli University of Washington.

… and now for something completely different

• Superficially anyway• Trust Model Changes

– Admin is not “root of trust” for all actions– Model is naturally distributed

• Persistent Rights– Off-line– Granular and Flexible

• Cryptographic protection• Software runs in Trusted Environment.

– Software is the Security Principal– Lampson, Abadi, Wobber model

Page 6: Digital Rights Management John Manferdelli University of Washington.

Key Elements of DRM

• Licensing– The process of packaging and delivering protected bits

with un-forgeable terms of usage (“digital license”) useable only by authenticated user/environment

• Enforcement– The process of insuring that the use of the digital work

adheres to enumerated use, privacy and operating restrictions stated in a digital license

Page 7: Digital Rights Management John Manferdelli University of Washington.

Encryption and Rules

• Content is encrypted– Therefore unusable with the right to decrypt the content

• Content license specifies rights (“capabilities”) – cannot be forged– Specifies authentication information, environment

(application, OS, etc.)

– Specifies usage/access control rules

– Contains the “sealed” key for the content. Key can be sealed by any licensor (using a public key) but can only be “unsealed” within an isolated, trusted environment (by a private key only known in that trusted environment)

Content License 938473

Machine 02345 RunningProgram 1 (with hash 0x7af33)Can view Document 3332 on 2002-20-01Sealed Key: 0x445635

Signed Boeing

Page 8: Digital Rights Management John Manferdelli University of Washington.

EnforcementAt initialization, Trusted Program says:

1. Isolate me2. Authenticate me

After Initialization completes successfully, Jeff’s PC1. Makes Private key available for use

When consuming content, Trusted Program: 1. Retrieves license and encrypted content file2. Authenticates license by checking digital signature3. Checks rule compliance4. Uses private key to unseal the content key5. Decrypts and uses content within Trusted Program

Trusted ProgramTrusted ProgramAuthenticating Public KeyAuthenticating Public Key(“Root of Trust”)(“Root of Trust”)

0x7af330x7af33 PK: 8374505PK: 8374505

Jeff’s PC

Jeff’s PC

Page 9: Digital Rights Management John Manferdelli University of Washington.

Obtaining Rights and Permissions

License Server

Content License 938473

Machine 02345 RunningProgram 1 (with hash 0x7af33)Can view Document 3332on 2002-20-01Sealed Key: 0x445635

Signed Boeing

Machine License 83874

Machine 02345 RunningProgram 1 (with hash 0x7af33)Has access to a private keyWhose public key is 0x2231

Signed Microsoft

2) Response2) ResponseHere’s your licenseHere’s your license

Customer benefitsCustomer benefits Licenses can be used offlineLicenses can be used offline Simple management of authorization (no central authority)Simple management of authorization (no central authority) Very simple and flexible distribution (a server can distribute to “any” client)Very simple and flexible distribution (a server can distribute to “any” client)

1 2

Jeff’s PC

1)1) RequestRequestI want document 2346. I want document 2346. Here’s my Machine License Here’s my Machine License to show you can trust my to show you can trust my machinemachine

Page 10: Digital Rights Management John Manferdelli University of Washington.

Key Hardware Components

Page 11: Digital Rights Management John Manferdelli University of Washington.

Main OS

HypervisorManages RAM, CPU, DEV, TPM

CPU TPM DRAMSecurevideo

Secureinput

DiskNetSound

Management

Partition

Application1

Legacy OS

Ring 0

Ring 3

Ring -1

Domain 0

DRM Apps

Small Trusted OS

for DRM

Application1 Mgmt Tools Dom0 UI

A Hypervisor?

Page 12: Digital Rights Management John Manferdelli University of Washington.

XrML Expressions

Each “rights expression” may specify a combination of rules such as:

– what rights are available,

– for whom,

– for how many times,

– within what time period,

– under what access conditions,

– for what fees,

– within which territory, and

– with what obligations,

– Etc.

Page 13: Digital Rights Management John Manferdelli University of Washington.

“Small” Rights Management

• Protecting Personal Information• Protecting personal Health and Financial

information• Protecting individual communication• Protecting Corporate information

Page 14: Digital Rights Management John Manferdelli University of Washington.

Scenarios for Small Rights Management

Centralized logging of license requestsCentralized logging of license requests Centralized templates to express policyCentralized templates to express policy Offline and online scenariosOffline and online scenarios

Secure database-backed contentSecure database-backed content Intranet portalsIntranet portals Backward compatibility for earlier appsBackward compatibility for earlier apps

Who can access sensitive plansWho can access sensitive plans Level of access: print, edit, save, etc.Level of access: print, edit, save, etc. Length of access periodLength of access period

Keep mail off internalmemos.com Keep mail off internalmemos.com Secure Executive-level mail Secure Executive-level mail Consistent application of expiry rulesConsistent application of expiry rules

Web Web ContentContent

Protected Protected InformationInformation

Do-Not-Forward Do-Not-Forward EmailEmail

Centralized Centralized Policy ControlPolicy Control

Page 15: Digital Rights Management John Manferdelli University of Washington.

“Big” Rights Management

• Mass Market Content– Books– Audio– Video– Software

• Much more flexible use and better content management– But there are “Fair Use” concerns which can be

mitigated … maybe

Page 16: Digital Rights Management John Manferdelli University of Washington.

Scenarios for Big Rights Management

Library/archiveLibrary/archive RoamingRoaming ““Active” contentActive” content

Premium releasesPremium releases Price discriminationPrice discrimination

I hear it. I want it. I get it.I hear it. I want it. I get it. Lower manufacturing costsLower manufacturing costs More variety?More variety?

Most popular use of DRMMost popular use of DRM I don’t get itI don’t get it

Pay per view Pay per view moviesmovies

Web distributedWeb distributedsongssongs

Ring tonesRing tones

E-BooksE-Books

Page 17: Digital Rights Management John Manferdelli University of Washington.

Watermarking

• Durable, imperceptible marking of content. Each “mark” is one bit of information.– Robust watermarking – watermark is hard to removed (using Stirmark, etc)– Approach taken by SDMI, Digimarc, Verence.– A failure, generally speaking

• Watermarking is content specific– Text- custom spacing, custom fonts, deliberate errors– Music – Changes to Fourier transformed components – Picture – Slight changes to Fourier transformed image– Video

• Watermarking bandwidth is also content specific

Page 18: Digital Rights Management John Manferdelli University of Washington.

How a watermarking system protection systems work

• One bit of information (The “protected bit”) signals to player (IE, RealPlayer, Windows Media Player, DVD Player) that content is protected and requires a license.– Sometimes additional bits encoded identifying content

• Player refuses to play content without a license

• Can you think how to defeat this?– Hint: Don’t ask, don’t tell, don’t enforce

Page 19: Digital Rights Management John Manferdelli University of Washington.

DRM Systems in the News

• SDMI• Windows Media Player• Real DRM• Apple DRM• IRM• CSS• Macrovision• LexMark• Xbox• Sony Playstation

Page 20: Digital Rights Management John Manferdelli University of Washington.

Technical Issues in Mechanisms

• Break Once Break Everywhere• Degree of isolation

– Transducer Problem– I/O

• Privacy and Interoperability• Flexibility (transfer, etc)

– Multiple devices– Multiple users– Migration

• User Control/Backup

Page 21: Digital Rights Management John Manferdelli University of Washington.

Social and Policy Issues

• “Fair Use”• Monopoly “Lock-in”• Erosion of copyright in favor of “contracts”• Archive• DMCA and hacking• “Information wants to be free”• Consumer expectations• Draconian licensing policies

Page 22: Digital Rights Management John Manferdelli University of Washington.

An Analog Attack …