Click to enlargeIntroduction to <br>Digital Rights Management<a name="top">

ISBN: 1932813403
Page Size: 8 1/4 x 11 soft cover book
Author: Lawrence Harte
Copyright: 2007


This book explains the fundamentals of digital rights management systems including identifying, tracking, authorizing and restricting access to digital media. You will learn how DRM systems help to protect and enforce copyrights, patents, trademarks, and other forms of intellectual property.

Digital assets can take various forms including audio, data and digital video. You will discover how it is possible to provide simple access to authorized users (paying customers) and how to restrict access to unauthorized users.

You will learn how DRM systems manage the storage of content, track the distribution of digital assets and ways DRM systems can take action to restrict and remove unauthorized materials.

Companies usually desire to allow distribution of digital assets through many digital distribution channels including CDs, DVDs, Internet and Mobile Telephone. DRM systems need to provide various types of access control for these systems.

Digital assets can be tracked based on their distribution addresses (IP address) and through unique identifying characteristics of the digital media such as the use of digital watermarks.

Basic encryption processes are described along with introduction on some of the ways to use and implement encryption. Common hacking and ripping methods are explained along with ways to reduce the risk of decoding and copying of digital media by unauthorized people. Some of the most important topics featured are:

Fundamentals of DRM Systems
Copyright, Patents, Trademarks and Intellectual Property
Audio, Data and Video Digital Assets
Digital Content Distribution
Managing, Tracking and Restricting Digital assets
Access Control and Key Management
Tracking and Watermarks
Data Coding and Encryption
Common Hacking Methods
Digital Content Distribution

Sample Diagrams

There are more than 29 explanatory diagrams in this book

Basic Authentication Process

This figure shows a typical authentication process used in a WLAN system. In this diagram, two wireless data terminals each share a secret key. When one of the devices wants to authenticate the other device (roles can also be reversed), it sends an authentication request and a random number. This random number is used by the receiving device and is processed with the secret key with an authentication (data processing) algorithm to produce a result. This result is sent to the originator. The originator uses the random number it sent along with its secret key to calculate a result. If the result received from the remote device with its own result matches, the authentication passes. Note that the secret key is not sent on the radio channel and that the result will change each time the random number changes.

Basic Encryption Process

This diagram shows the fundamental process used by encryption to modify data to an unrecognizable form. The letters in the original information in this example are shifted up by 1 letter (example - the letter I becomes the letter J). With this simple encryption, this example shows that the original information becomes unrecognizable by the typical viewer.

Table of Contents

Intellectual Property Rights

-Trade Secrets (Confidential Information)

Types of Rights

-Rendering Rights
-Transport Rights
-Derivative Rights

Digital Rights Management

-Rights Attributes
-Rights Models

Digital Assets

-Digital Audio (Voice and Music)
-Digital Video
-Data Files (Books and Databases)
-Application Program Files (Software Applications)
-Container Files
-Digital Asset Management (DAM)

Media Identification

-Unique Material Identifier (UMID)
-International Standard Book Number (ISBN)
-International Standard Serial Number (ISSN)
-Digital Object Identifier (DOI)
-International Standard Recording Code (ISRC)
-International Standard Audiovisual Number (ISAN)
-International Standard Work Code (ISWC)

DRM Security Processes

-Digital Watermarks
-Digital Fingerprint
-Digital Certificate
-Digital Signature
-Secure Hypertext Transfer Protocol (S-HTTP)
-Machine Binding
-Conditional Access (CA)
-Product Activation
-Secure Socket Layer (SSL)
-Transport Layer Security (TLS)

DRM System

-Content Server
-DRM Packager
-License Server
-Key Server
-DRM Controller
-DRM Client

Media Transfer

-File Downloading
-Media Streaming

Stored Media Distribution

-Media Distribution
-Direct Distribution
-Peer to Peer Distribution
-Media Portability

Monitoring Media Distribution

-Broadcast Monitoring
-Internet Tracking
-Usage Monitoring

Key Management

-Smart Card
-Virtual Card

Digital Rights Management Threats

-Bit Torrent
-Insider Piracy
-Analog Hole
-Digital Hole

Protocols and Industry Standards

-Extensible Rights Management Language (XrML)
-Extensible Media Commerce Language (XMCL)
-Open Digital Rights Language (ODRL)
-Contracts Expression Language (CEL)
-Secure Digital Music Initiative (SDMI)
-Resource Description Framework (RDF)
-Universally Unique Identifier (UUID)
-Publishing Requirements for Industry Standard Metadata (PRISM)
-Online Information Exchange (ONIX)
-Learning Objects Metadata (LOM)
-News Markup Language (NewsML)
-Sports Markup Language (SportsML)
-Events Markup Language (EventsML)
-Moving Picture Experts Group (MPEG)
-Information and Content Exchange (ICE)

Copy Protection Systems

-Copy Control Information (CCI)
-Copy Generation Management System (CGMS)
-Broadcast Flag
-Serial Copy Management System (SCMS)
-Content Protection for Prerecorded Media (CPPM)
-Content Protection for Recordable Media (CPRM)
-Content Scrambling System (CSS)
-Secure Video Processing (SVP)
-Digital Transmission Content Protection (DTCP)
-High Bandwidth Digital Content Protection (HDCP)
-High Definition Multimedia Interface (HDMI)
-Extended Conditional Access (XCA)

About the Author

Mr. Lawrence Harte is the president of Althos, an expert information provider which researches, trains, and publishes on technology and business industries. He has over 29 years of technology analysis, development, implementation, and business management experience. Mr. Harte has worked for leading companies including Ericsson/General Electric, Audiovox/Toshiba and Westinghouse and has consulted for hundreds of other companies. Mr. Harte continually researches, analyzes, and tests new communication technologies, applications, and services. He has authored over 50 books on telecommunications technologies and business systems covering topics such as mobile telephone systems, data communications, voice over data networks, broadband, prepaid services, billing systems, sales, and Internet marketing. Mr. Harte holds many degrees and certificates including an Executive MBA from Wake Forest University (1995) and a BSET from the University of the State of New York (1990).

Introduction to Digital Rights Management bk7781340$19.99

Click to enlargeIntoduction to DRM eBook
Click to enlargeBook + eBook (pdf format)