SlideShare una empresa de Scribd logo
1 de 17
Descargar para leer sin conexión
OMA DRM Overview




1   © NOKIA
Digital Rights Management

         •        Controlling the usage of digital objects in cyberspace


             1. Associate usage rules with digital content

             2. Enforce that the rules are followed




                                                                                          YYu utnnt
                                                                                           oo oo c
                                                                                           bb t
                                                                                            u
                                                                                             ucan t ooy
                                                                                                canp cpp.y
     •        What we really want to do is to enable the paid content model




                                                                                                    pay, .
                                                                                                    ll
                                                                                                       a y,
              •     Content owner gets paid when his content is consumed
              •     An alternative for the subsidized advertising model – banners suck
     •        Superdistribution is an important feature
              •     Excellent content propagates from peer to peer like a virus – and the content
                    owner gets paid for each copy


2   © NOKIA
Threats and counter-
              measures
              The challenge is not to express rights,
              but to enforce them.




3   © NOKIA
Threats
        Content
        • A Mickey Mouse screensaver                   ”You                  Replace the
                                                        ”Youca
                                                                 n
                                                        fooe canppay      rights with more
                                                         f r re e l lay
                                                              vv r.”          loose ones
       Replace                                                   er.”
    content with                                   Rights
     illegal one
                                                   • Enable preview (test drive)
                                                   <rights>
                                ” Yo u
                                  ”Y
                                oo loucaanpla
                                                      <agreement>
                                  nny cn p y
                                     lyoo ce lay
                                        nn .             <asset>
                                           ce””
                                             .               <uid>mid:mickey_14@disney.com</uid>
     Extract content                                     </asset>
                                                         <permission>
      from the DRM
         system
                                                             <play>                    Modify the
                                                                <count> 99 </count>
                                                                         1            existing rights
                                                             </play>
                                                         </permission>
                                                      </agreement>
                                                   </rights>


                            T
                                          Terminal                            Hack the terminal
                                          • Plays the content once and then discards it
                                                               forever    implementation


4    © NOKIA
Counter-measures
     • Protect the confidentiality of Content                                 Extract content
              • Content encryption                                          from the DRM
              • In practise hybrid encryption i.e. combination of symmetric    system
                and asymmetric encryption
     • Protect the integrity and authenticity of Rights                        Modify the
              • Digitally signed Rights                                       existing rights



     • Protect the integrity of the Content-Rights associationrights withthe
                                                                 Replace
                                                                          more
              • Include hash of the content inside the (signed) Rights          loose ones


                                                                                Replace the
     • Careful implementation inside the terminal                              content with
                                                                                 illegal one
              • Access control, integrity and confidentiality protection...
              • Only well behaving applications shall be able to
               access the bits                                                   Hack the
                                                                                 terminal
                                                                              implementation
5   © NOKIA
Example architecture

                                    Rights
                                     Rights          Certifies RIs     Rights
                                                                        Rights
                                    Issuer
                                     Issuer                          Issuer PKI
                                                                      Issuer PKI
                   Registers
                   Content

                                            Issues
       Content                              Rights
        Content                  ”You
                                  ”Y
        Server                   oo loucaanpla
                                  nny cn p y
         Server                      lyoo ce lay
                                        nn .
                                           ce””
                                             .




                  Distributes
                  Content
                                                      Certifies      Terminal
                                                                      Terminal
                                       T1             Terminals         PKI
                                                                         PKI
                          P2P
6   © NOKIA
                  Distribution
Implications
     • Key management infrastructure – actually maybe even two
              • Terminal PKI – content encryption, device authentication
              • Rights Issuer PKI – signed rights

     • Both Terminal and Rights Issuer have a private key to hide
              • Hiding secrets is difficult – especially in the DRM threat model

     • The counter-measures are not cheap
              • Computationally expensive, increased footprint, deployment issues
              • Overkill for low value content

     • The market needs something that can be deployed now !



7   © NOKIA
OMA DRM Rel 1 Simplifications
        1. Forget the key management infrastructures
           •   No Terminal or Rights Issuer PKIs
               • No private keys / trust roots in terminals
               • No private keys / trust roots at Rights Issuers
           •   Big trade-off between security and simplicity / ease of
               deployment
        2. No DRM-specific architectural entities
           • No DRM-servers
           • Rights Issuer = Content / rights packaging tool
           • Easy to deploy
        • However, an evolution path towards a “real DRM” should exist
        • Functional requirements:
           • Object level “forward-lock” semantics
           • Preview feature




8   © NOKIA
OMA DRM Rel 1
              ”A simple DRM for low value mobile content”




9   © NOKIA
How to deliver content and rights ?
     • OMA DRM Rel 1 defines three DRM methods


                                                              Separate delivery
     Forward-lock          Combined delivery
                                                              & Superdistribution
     DRM Message                DRM Message

           Content           Content        Rights             Content             Rights
                                                                                 ”You can play
                                        ”You can play                             only once.”
                                         only once.”



                                                                                      2. WAP Push
               e.g. OMA                e.g. OMA         1. e.g. OMA
               Download                Download          Download




         Terminal                Terminal                             Terminal
10   © NOKIA
OMA DRM Release 2




11   © NOKIA
OMA DRM Rel 2 Requirements

        • Main requirement for OMA DRM Rel 2:
               • Need to support more valuable content => more security required
               • Music and video


        • The two big assumptions that made life easy in OMA DRM Rel 1 go away
               • OMA needs to bite the bullet
        • A key management infrastructure is needed to provide more security
        • If we do have terminal keys we need to personalize the rights objects
          on-the-fly
               • In OMA DRM Rel 1 the same rights object can be sent to any terminal
               • In OMA DRM Rel 2 the service must encrypt parts of the rights object with a
                 terminal specific key
               • A real-time back-end solution is needed to do that




12   © NOKIA
OMA DRM Release 2

      Content
       Content    Rights
                   Rights
       Issuer
        Issuer    Issuer
                   Issuer
                                             Certifies             Key Management
                                             Rights Issuers

                                                                       Rights
                                                                        Rights
                 Rights             Rights                           Issuer PKI
      Content    Object             Object                            Issuer PKI



                                                                      Device
                                                                       Device
                                                                        PKI
                                                                         PKI

                                                       Certifies
                                                       devices
                          Content




13   © NOKIA
OMA DRM Release 2
                                         DOMAINS ADDED RECENTLY…
      Content
       Content    Rights
                   Rights
       Issuer
        Issuer    Issuer
                   Issuer
                                             Certifies             Key Management
                                             Rights Issuers

                                                                       Rights
                                                                        Rights
                 Rights             Rights                           Issuer PKI
      Content    Object             Object                            Issuer PKI



                                                                      Device
                                                                       Device
                                                                        PKI
                                                                         PKI

                                                       Certifies
                                                       devices
                          Content                                    Content Key

                                                                     Device 1 Key
                                                                     Device 2 Key

                                                                     Rights Issuer Key

14   © NOKIA                                                         Rights Issuer’s Signature
OMA DRM 2.0
     Next generation open DRM technology specification




                                                                    Mobile
                                                                    domain

                                                         Internet            Enterprise
                                                         (media)              domain
                                                         domain

                                                                     Home
                                                                    domain




 Fulfills security             Enables consumers to      Convergence of DRM
 requirements of               buy content once and      technology across
 future rich media e.g.        consume with his/her      Internet, media, mobile
 music services                registered devices        and home domains


15   © NOKIA
Learnings and summary

        • Most people conduct payment transactions practically every day
          and carry a mobile phone, too
               • It is a strong value proposition for consumers and merchants if some
                 part of these payments could be conducted with a mobile phone
        • Remote macro payments are increasing – existing credit card
          infrastructure offers a globally sustainable solution
        • While today’s technologies offer strong enablers, m-Commerce and
          mobile payments market is primarily business driven
        • Practical DRM is needed today
        • End-use experience is crucial: “easy to find, to use, to pay!”
        • Sustainable value chains are essential for the expansion of m-
          Commerce and mobile payments ecosystem
        • Co-creation of the customer experience is needed




16   © NOKIA
17   © NOKIA

Más contenido relacionado

Destacado

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationErica Santiago
 

Destacado (20)

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 

Oma Drm2 Pki

  • 2. Digital Rights Management • Controlling the usage of digital objects in cyberspace 1. Associate usage rules with digital content 2. Enforce that the rules are followed YYu utnnt oo oo c bb t u ucan t ooy canp cpp.y • What we really want to do is to enable the paid content model pay, . ll a y, • Content owner gets paid when his content is consumed • An alternative for the subsidized advertising model – banners suck • Superdistribution is an important feature • Excellent content propagates from peer to peer like a virus – and the content owner gets paid for each copy 2 © NOKIA
  • 3. Threats and counter- measures The challenge is not to express rights, but to enforce them. 3 © NOKIA
  • 4. Threats Content • A Mickey Mouse screensaver ”You Replace the ”Youca n fooe canppay rights with more f r re e l lay vv r.” loose ones Replace er.” content with Rights illegal one • Enable preview (test drive) <rights> ” Yo u ”Y oo loucaanpla <agreement> nny cn p y lyoo ce lay nn . <asset> ce”” . <uid>mid:mickey_14@disney.com</uid> Extract content </asset> <permission> from the DRM system <play> Modify the <count> 99 </count> 1 existing rights </play> </permission> </agreement> </rights> T Terminal Hack the terminal • Plays the content once and then discards it forever implementation 4 © NOKIA
  • 5. Counter-measures • Protect the confidentiality of Content Extract content • Content encryption from the DRM • In practise hybrid encryption i.e. combination of symmetric system and asymmetric encryption • Protect the integrity and authenticity of Rights Modify the • Digitally signed Rights existing rights • Protect the integrity of the Content-Rights associationrights withthe Replace more • Include hash of the content inside the (signed) Rights loose ones Replace the • Careful implementation inside the terminal content with illegal one • Access control, integrity and confidentiality protection... • Only well behaving applications shall be able to access the bits Hack the terminal implementation 5 © NOKIA
  • 6. Example architecture Rights Rights Certifies RIs Rights Rights Issuer Issuer Issuer PKI Issuer PKI Registers Content Issues Content Rights Content ”You ”Y Server oo loucaanpla nny cn p y Server lyoo ce lay nn . ce”” . Distributes Content Certifies Terminal Terminal T1 Terminals PKI PKI P2P 6 © NOKIA Distribution
  • 7. Implications • Key management infrastructure – actually maybe even two • Terminal PKI – content encryption, device authentication • Rights Issuer PKI – signed rights • Both Terminal and Rights Issuer have a private key to hide • Hiding secrets is difficult – especially in the DRM threat model • The counter-measures are not cheap • Computationally expensive, increased footprint, deployment issues • Overkill for low value content • The market needs something that can be deployed now ! 7 © NOKIA
  • 8. OMA DRM Rel 1 Simplifications 1. Forget the key management infrastructures • No Terminal or Rights Issuer PKIs • No private keys / trust roots in terminals • No private keys / trust roots at Rights Issuers • Big trade-off between security and simplicity / ease of deployment 2. No DRM-specific architectural entities • No DRM-servers • Rights Issuer = Content / rights packaging tool • Easy to deploy • However, an evolution path towards a “real DRM” should exist • Functional requirements: • Object level “forward-lock” semantics • Preview feature 8 © NOKIA
  • 9. OMA DRM Rel 1 ”A simple DRM for low value mobile content” 9 © NOKIA
  • 10. How to deliver content and rights ? • OMA DRM Rel 1 defines three DRM methods Separate delivery Forward-lock Combined delivery & Superdistribution DRM Message DRM Message Content Content Rights Content Rights ”You can play ”You can play only once.” only once.” 2. WAP Push e.g. OMA e.g. OMA 1. e.g. OMA Download Download Download Terminal Terminal Terminal 10 © NOKIA
  • 11. OMA DRM Release 2 11 © NOKIA
  • 12. OMA DRM Rel 2 Requirements • Main requirement for OMA DRM Rel 2: • Need to support more valuable content => more security required • Music and video • The two big assumptions that made life easy in OMA DRM Rel 1 go away • OMA needs to bite the bullet • A key management infrastructure is needed to provide more security • If we do have terminal keys we need to personalize the rights objects on-the-fly • In OMA DRM Rel 1 the same rights object can be sent to any terminal • In OMA DRM Rel 2 the service must encrypt parts of the rights object with a terminal specific key • A real-time back-end solution is needed to do that 12 © NOKIA
  • 13. OMA DRM Release 2 Content Content Rights Rights Issuer Issuer Issuer Issuer Certifies Key Management Rights Issuers Rights Rights Rights Rights Issuer PKI Content Object Object Issuer PKI Device Device PKI PKI Certifies devices Content 13 © NOKIA
  • 14. OMA DRM Release 2 DOMAINS ADDED RECENTLY… Content Content Rights Rights Issuer Issuer Issuer Issuer Certifies Key Management Rights Issuers Rights Rights Rights Rights Issuer PKI Content Object Object Issuer PKI Device Device PKI PKI Certifies devices Content Content Key Device 1 Key Device 2 Key Rights Issuer Key 14 © NOKIA Rights Issuer’s Signature
  • 15. OMA DRM 2.0 Next generation open DRM technology specification Mobile domain Internet Enterprise (media) domain domain Home domain Fulfills security Enables consumers to Convergence of DRM requirements of buy content once and technology across future rich media e.g. consume with his/her Internet, media, mobile music services registered devices and home domains 15 © NOKIA
  • 16. Learnings and summary • Most people conduct payment transactions practically every day and carry a mobile phone, too • It is a strong value proposition for consumers and merchants if some part of these payments could be conducted with a mobile phone • Remote macro payments are increasing – existing credit card infrastructure offers a globally sustainable solution • While today’s technologies offer strong enablers, m-Commerce and mobile payments market is primarily business driven • Practical DRM is needed today • End-use experience is crucial: “easy to find, to use, to pay!” • Sustainable value chains are essential for the expansion of m- Commerce and mobile payments ecosystem • Co-creation of the customer experience is needed 16 © NOKIA
  • 17. 17 © NOKIA