Misplaced Pages

Digital rights management: Difference between revisions

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Browse history interactively← Previous editNext edit →Content deleted Content addedVisualWikitext
Revision as of 17:35, 24 May 2003 view source216.150.138.150 (talk)No edit summary← Previous edit Revision as of 17:49, 24 May 2003 view source 216.150.138.150 (talk) added some pointers, minor editsNext edit →
Line 5: Line 5:
An early example of a DRM system is the ] (CSS) employed by the ] on movie ] disks. The data on the DVD is ] so that it can only be decoded and viewed using an encryption key, which the DVD Consortium kept secret. In order to gain access to the key, a DVD player manufacturer would have to sign a licence agreement with the DVD Consortium which restricted them from including certain features in their players such as a digital output which could be used to extract a high-quality digital copy of the movie. Since the only hardware capable of decoding the movie was controlled by the DVD Consortium in this way, they were able to impose whatever restrictions they chose on the playback of such movies. See also ] for a more draconian and less commercially successful variation. An early example of a DRM system is the ] (CSS) employed by the ] on movie ] disks. The data on the DVD is ] so that it can only be decoded and viewed using an encryption key, which the DVD Consortium kept secret. In order to gain access to the key, a DVD player manufacturer would have to sign a licence agreement with the DVD Consortium which restricted them from including certain features in their players such as a digital output which could be used to extract a high-quality digital copy of the movie. Since the only hardware capable of decoding the movie was controlled by the DVD Consortium in this way, they were able to impose whatever restrictions they chose on the playback of such movies. See also ] for a more draconian and less commercially successful variation.


The ] was passed in the ] in an effort to make the circumvention of such systems illegal. Despite this law, which has received substantial opposition on constitutional grounds, it is now relatively easy to find DVD players which bypass the limitations the DVD Consortium sought to impose. The cryptographic keys themselves have been discovered and widely disseminated (see ]). The ] was passed in the ] in an effort to make the circumvention of such systems illegal. Despite this law, which has received substantial opposition on constitutional grounds, it is now relatively easy to find DVD players which bypass the limitations the DVD Consortium sought to impose. The cryptographic keys themselves have been discovered and widely disseminated (see ]). See Professor Edward Felton's freedom-to-tinker Web site (www.freedom-to-tinker.com) for some observations on the DCMA and its consequences, intended and unintended hilarious(www.freedom-to-tinker.com/archives/cat_fritxs_hit_list.html/).


New DRM initiatives have been proposed in recent years which could prove more difficult to circumvent, including copy-prevention codes embedded in broadcast ] signals and the ]. A wide variety of DRM systems have also been employed to restrict access to ]s. See the TCPA. Pallidium FAQ maintained by Professor Ross J Anderson on his Web Site. New DRM initiatives have been proposed in recent years which could prove more difficult to circumvent, including copy-prevention codes embedded in broadcast ] signals and the ]. A wide variety of DRM systems have also been employed to restrict access to ]s. See the TCPA / Pallidium FAQ maintained by Professor Ross J Anderson on his Web site at www.cl.cam.ac.uk/~rja14/tcpa-faq.html/ for a clear discussion of two prominent proposals.


Examples of existing "digital rights management" and "copy protection" systems: Examples of existing "digital rights management" and "copy protection" systems:
Line 17: Line 17:
== DRM and document restriction technology == == DRM and document restriction technology ==


Opponents of DRM have noted that the proposed use of some DRM schemes to restrict the ability to copy and distribute documents can be used as a way of preventing the enforcement of laws against ] and other corporate wrongdoing. Opponents of DRM have noted that the proposed use of some DRM schemes to restrict the ability to copy and distribute documents can be used by the criminal as a means of preventing enforcement of laws against ] and other wrongdoing. Since DRM is unlikely to be so used by individuals, only corporate skullduggery is likely to be concealed this way.


See also ]. See also ].

Revision as of 17:49, 24 May 2003


Digital rights management or digital restrictions management, commonly abbreviated DRM, is a system whereby the usage of copyrighted data by someone who has purchased a copy of it may be restricted by the copyright holder. In contrast to the usual legal restrictions which copyright itself imposes on the owner of a copy of such data, DRM would allow additional restrictions to be imposed solely at the discretion of the copyright holder, through hardware and software code under the copyright holder's control.

An early example of a DRM system is the Content Scrambling System (CSS) employed by the DVD Consortium on movie DVD disks. The data on the DVD is encrypted so that it can only be decoded and viewed using an encryption key, which the DVD Consortium kept secret. In order to gain access to the key, a DVD player manufacturer would have to sign a licence agreement with the DVD Consortium which restricted them from including certain features in their players such as a digital output which could be used to extract a high-quality digital copy of the movie. Since the only hardware capable of decoding the movie was controlled by the DVD Consortium in this way, they were able to impose whatever restrictions they chose on the playback of such movies. See also DIVX for a more draconian and less commercially successful variation.

The Digital Millennium Copyright Act was passed in the United States in an effort to make the circumvention of such systems illegal. Despite this law, which has received substantial opposition on constitutional grounds, it is now relatively easy to find DVD players which bypass the limitations the DVD Consortium sought to impose. The cryptographic keys themselves have been discovered and widely disseminated (see DeCSS). See Professor Edward Felton's freedom-to-tinker Web site (www.freedom-to-tinker.com) for some observations on the DCMA and its consequences, intended and unintended hilarious(www.freedom-to-tinker.com/archives/cat_fritxs_hit_list.html/).

New DRM initiatives have been proposed in recent years which could prove more difficult to circumvent, including copy-prevention codes embedded in broadcast HDTV signals and the Palladium operating system. A wide variety of DRM systems have also been employed to restrict access to eBooks. See the TCPA / Pallidium FAQ maintained by Professor Ross J Anderson on his Web site at www.cl.cam.ac.uk/~rja14/tcpa-faq.html/ for a clear discussion of two prominent proposals.

Examples of existing "digital rights management" and "copy protection" systems:

DRM and document restriction technology

Opponents of DRM have noted that the proposed use of some DRM schemes to restrict the ability to copy and distribute documents can be used by the criminal as a means of preventing enforcement of laws against fraud and other wrongdoing. Since DRM is unlikely to be so used by individuals, only corporate skullduggery is likely to be concealed this way.

See also copy protection.