Digital rights management: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Sandy Harris
imported>Tom Morris
No edit summary
Line 2: Line 2:
{{EZarticle-open-auto|CZ:CIS 700 Special Topics 2008}}
{{EZarticle-open-auto|CZ:CIS 700 Special Topics 2008}}


'''Digital Rights Management (DRM)''' refers to the laws and technologies which provide intellectual property owners control over the distribution and use of their digital property by defining consumers' rights in its usage. DRM's primary function is to restore control over copying digital media and to restrict access and content use beyond what is granted by copyright law<ref name=Bates>Bates, BJ. (2008) 'Commentary: Value and Digital Rights Management-A Social Economics Approach', Journal of Media Economics, 21:1, 53-77</ref>.
'''Digital Rights Management (DRM)''' refers to the laws and technologies which provide intellectual property owners control over the distribution and use of their digital property by defining consumers' rights in its usage. DRM's primary function is to restore control over copying digital media and to restrict access and content use beyond what is granted by copyright law<ref name=Bates>Bates, BJ. (2008) 'Commentary: Value and Digital Rights Management-A Social Economics Approach', Journal of Media Economics, 21:1, 53-77</ref>.




==Legal Background==
==Legal Background==
The [[Copyright|copyright]] since its formal creation in 1710 by the British [[Statute of Anne]] and its inclusion in the first article of the [[U.S. Constitution]]<ref name=Bennett>Bennett, S. (1999) 'Authors' Rights', Journal of Electronic Publishing, vol. 5, no. 2, Dec., 1999</ref> has been the main protection scheme for intellectual property rights for creative information goods and services. [[Copyright]] law grants exclusive legal ownership of information under specific conditions and terms. Through two major revisions of U.S. copyright law in 1909 and 1976 the range of content and media forms covered by legislation were expanded.
The [[Copyright|copyright]] since its formal creation in 1710 by the British [[Statute of Anne]] and its inclusion in the first article of the [[U.S. Constitution]]<ref name=Bennett>Bennett, S. (1999) 'Authors' Rights', Journal of Electronic Publishing, vol. 5, no. 2, Dec., 1999</ref> has been the main protection scheme for intellectual property rights for creative information goods and services. [[Copyright]] law grants exclusive legal ownership of information under specific conditions and terms. Through two major revisions of U.S. copyright law in 1909 and 1976 the range of content and media forms covered by legislation were expanded.


During the pre-digital era, large-scale copying was expensive and usually resulted in degraded content. The development of electronic and digital media transformed the production and distribution of information goods and services. In digital form, the content could be copied perfectly or easily converted to another form or format<ref name=Bates />.
During the pre-digital era, large-scale copying was expensive and usually resulted in degraded content. The development of electronic and digital media transformed the production and distribution of information goods and services. In digital form, the content could be copied perfectly or easily converted to another form or format<ref name=Bates />.


==DRM Approaches==
==DRM Approaches==


==Technology==
==Technology==


===Compact Discs (CDs)===
===Compact Discs (CDs)===


===Digital Versatile Discs (DVDs)===
===Digital Versatile Discs (DVDs)===


== Difficulties of DRM ==
== Difficulties of DRM ==
=== Consumer attitudes ===
Many people find DRM systems to be a hindrance to the use of the media they have purchased, and some consumers actively boycott companies and products that use DRM. Many consumers express a preference for material that is not 'hindered' with DRM protections. DRM also seems to be doing very little to stop unauthorized copyright infringement: "today, infringement is more widespread than ever"<ref>[[Cory Doctorow]], [http://craphound.com/complexecosystems.txt All Complex Ecosystems Have Parasites], [[O'Reilly Emerging Technology Conference]], 16 March 2005.</ref>.


=== Legal problems ===
=== Legal problems ===
There is a basic principle of copyright law, called "fair use" <ref>Electronic Frontier Foundation 'Fair Use Frequently Asked Questions (and Answers)', 2002 [http://w2.eff.org/IP/eff_fair_use_faq.php]</ref> in US law. Copyright does not prevent quoting a work in a review or anaylsis, creating a parody of it, and so on. The principle is clear, but border is by no means sharply delineated. Between the black of copyright infringement and the white of perfectly legal fair use, there is a large grey area. This is being narrowed down by various court rulings, but will likely never go away entirely.
There is a basic principle of copyright law, called "fair use" <ref>Electronic Frontier Foundation 'Fair Use Frequently Asked Questions (and Answers)', 2002 [http://w2.eff.org/IP/eff_fair_use_faq.php]</ref> in US law. Copyright does not prevent quoting a work in a review or anaylsis, creating a parody of it, and so on. The principle is clear, but border is by no means sharply delineated. Between the black of copyright infringement and the white of perfectly legal fair use, there is a large grey area. This is being narrowed down by various court rulings, but will likely never go away entirely.


Line 30: Line 29:


=== Technical problems ===
=== Technical problems ===
 
DRM is attempting a fundamentally difficult task. Security author [[Bruce Schneier]] states of DRM: "Trying to make digital files uncopyable is like trying to make water not wet."<ref>Bruce Schneier 'Quickest Patch Ever' [http://www.schneier.com/essay-126.html]</ref>
DRM is attempting a fundamentally difficult task. "Trying to make digital files uncopyable is like trying to make water not wet."<ref>Bruce Schneier 'Quickest Patch Ever' [http://www.schneier.com/essay-126.html]</ref>


In particular cases, the costs may be quite high. Peter Gutmann, commenting on Microsoft DRM efforts, wrote "The Vista Content Protection specification could very well constitute the longest suicide note in history"<ref>Peter Gutmann 'A Cost Analysis of Windows Vista Content Protection' [http://www.cs.auckland.ac.nz/~pgut001/pubs/vista_cost.html]</ref>.
In particular cases, the costs may be quite high. Peter Gutmann, commenting on Microsoft DRM efforts, wrote "The Vista Content Protection specification could very well constitute the longest suicide note in history"<ref>Peter Gutmann 'A Cost Analysis of Windows Vista Content Protection' [http://www.cs.auckland.ac.nz/~pgut001/pubs/vista_cost.html]</ref>.


Why is this so difficult? Assume you are a totally legal user of the material protected by DRM, and all the security tests for your music, or your software, are successful. To hear the music, it has to be put into a form the speakers will reproduce. At some point between the DRM-protected recording and the speaker, the signal has to be put into a useful form. Once it is in that form, how does the DRM enforcer prevent it from being copied?
Why is this so difficult? Assume you are a totally legal user of the material protected by DRM, and all the security tests for your music, or your software, are successful. To hear the music, it has to be put into a form the speakers will reproduce. At some point between the DRM-protected recording and the speaker, the signal has to be put into a useful form. Once it is in that form, how does the DRM enforcer prevent it from being copied?


The problem of protecting material on a DVD or other physical storage device are simple when compared to delivering content across the Internet. Think of pay-per-view television. Even in [[encryption|encrypted]] form, it has to pass through intermediate distribution points on the Internet; the general distribution problem here is part of [[inter-domain multicast routing]] (IDMR). How do the legal users get the [[cryptographic key|decryption key]] for the program for which they have paid, and only for that program? Can anyone along the path from content user to content buyer intercept that key and use it? If so, will the legitimate user still be able to use it? Alternatively, can the stolen key be distributed?
The problem of protecting material on a DVD or other physical storage device are simple when compared to delivering content across the Internet. Think of pay-per-view television. Even in [[encryption|encrypted]] form, it has to pass through intermediate distribution points on the Internet; the general distribution problem here is part of [[inter-domain multicast routing]] (IDMR). How do the legal users get the [[cryptographic key|decryption key]] for the program for which they have paid, and only for that program? Can anyone along the path from content user to content buyer intercept that key and use it? If so, will the legitimate user still be able to use it? Alternatively, can the stolen key be distributed?

Revision as of 09:12, 8 August 2008

This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
This editable Main Article is under development and subject to a disclaimer.
Nuvola apps kbounce green.png
Nuvola apps kbounce green.png
This article is currently being developed as part of an Eduzendium student project. The project's homepage is at CZ:CIS 700 Special Topics 2008. One of the goals of the course is to provide students with insider experience in collaborative educational projects, and so you are warmly invited to join in here, or to leave comments on the discussion page. However, please refrain from removing this notice.
Besides, many other Eduzendium articles welcome your collaboration!



Digital Rights Management (DRM) refers to the laws and technologies which provide intellectual property owners control over the distribution and use of their digital property by defining consumers' rights in its usage. DRM's primary function is to restore control over copying digital media and to restrict access and content use beyond what is granted by copyright law[1].


Legal Background

The copyright since its formal creation in 1710 by the British Statute of Anne and its inclusion in the first article of the U.S. Constitution[2] has been the main protection scheme for intellectual property rights for creative information goods and services. Copyright law grants exclusive legal ownership of information under specific conditions and terms. Through two major revisions of U.S. copyright law in 1909 and 1976 the range of content and media forms covered by legislation were expanded.

During the pre-digital era, large-scale copying was expensive and usually resulted in degraded content. The development of electronic and digital media transformed the production and distribution of information goods and services. In digital form, the content could be copied perfectly or easily converted to another form or format[1].

DRM Approaches

Technology

Compact Discs (CDs)

Digital Versatile Discs (DVDs)

Difficulties of DRM

Consumer attitudes

Many people find DRM systems to be a hindrance to the use of the media they have purchased, and some consumers actively boycott companies and products that use DRM. Many consumers express a preference for material that is not 'hindered' with DRM protections. DRM also seems to be doing very little to stop unauthorized copyright infringement: "today, infringement is more widespread than ever"[3].

Legal problems

There is a basic principle of copyright law, called "fair use" [4] in US law. Copyright does not prevent quoting a work in a review or anaylsis, creating a parody of it, and so on. The principle is clear, but border is by no means sharply delineated. Between the black of copyright infringement and the white of perfectly legal fair use, there is a large grey area. This is being narrowed down by various court rulings, but will likely never go away entirely.

That principle greatly complicates the design of DRM systems. Copyright law has exceptions for fair use; how can you design those into DRM software? What do you do about the grey areas? If you ignore fair use, or just misjudge some grey areas, you will infringe on the users' legal rights; what are the market or legal consequences of that?

Technical problems

DRM is attempting a fundamentally difficult task. Security author Bruce Schneier states of DRM: "Trying to make digital files uncopyable is like trying to make water not wet."[5]

In particular cases, the costs may be quite high. Peter Gutmann, commenting on Microsoft DRM efforts, wrote "The Vista Content Protection specification could very well constitute the longest suicide note in history"[6].

Why is this so difficult? Assume you are a totally legal user of the material protected by DRM, and all the security tests for your music, or your software, are successful. To hear the music, it has to be put into a form the speakers will reproduce. At some point between the DRM-protected recording and the speaker, the signal has to be put into a useful form. Once it is in that form, how does the DRM enforcer prevent it from being copied?

The problem of protecting material on a DVD or other physical storage device are simple when compared to delivering content across the Internet. Think of pay-per-view television. Even in encrypted form, it has to pass through intermediate distribution points on the Internet; the general distribution problem here is part of inter-domain multicast routing (IDMR). How do the legal users get the decryption key for the program for which they have paid, and only for that program? Can anyone along the path from content user to content buyer intercept that key and use it? If so, will the legitimate user still be able to use it? Alternatively, can the stolen key be distributed?

References

  1. 1.0 1.1 Bates, BJ. (2008) 'Commentary: Value and Digital Rights Management-A Social Economics Approach', Journal of Media Economics, 21:1, 53-77
  2. Bennett, S. (1999) 'Authors' Rights', Journal of Electronic Publishing, vol. 5, no. 2, Dec., 1999
  3. Cory Doctorow, All Complex Ecosystems Have Parasites, O'Reilly Emerging Technology Conference, 16 March 2005.
  4. Electronic Frontier Foundation 'Fair Use Frequently Asked Questions (and Answers)', 2002 [1]
  5. Bruce Schneier 'Quickest Patch Ever' [2]
  6. Peter Gutmann 'A Cost Analysis of Windows Vista Content Protection' [3]