DRM – Digital Rights Management

In recent years, technological developments have led to digital files being more easily distributed, for example through Napster (a file sharing service on the Internet). In order to manage and control the distribution of digital files, a new concept has been developed, called DRM (Digital Rights Management). The purpose is to set every single file with individual rights that are extremely hard to break, and consequently make people pay and use the files legally. The file will then be fully protected from intrusion and alteration until the set rights expire. The goal of this thesis is to look into and summarise DRM of today. We have concentrated on the mobile DRM market, and especially mobile phones. Especially the solutions/applications that already exist and their functionality and properties, but also requirements regarding security levels, compatibility etc. We have also added predictions of the near future, ours as well as others. Existing applications for DRM are well made but few are constructed for mobile phones. Mobile phones will however be a good and secure platform for DRM. At present there is no DRM application inserted in mobile phones in Europe. The third generation (3G) network will push the progress with the capability of broader bandwidth, with capacity of downloading more content to the phone.
Since the mobile phone software is embedded and the mobile phones are within a trusted network, the security level of a DRM application in a mobile phone can be discussed. A lower level of security would make it easier for managing content but also open up the market for hackers that wish to trespass. With a lower level of security you always have to consider the consequences and often it creates more problems than it solves.We believe the DRM market and its value will increase exponentially over the next few years. The number of players on the mobile Internet DRM market will be less than on the Internet DRM market, due to the complexity of getting applications into the phone. The latter will consist of many more players, and remain fragmented, since it is an open market.

Reference URL 1: Visit Now

Author: Johan Bengtsson, Emma Hansson

Source: Blekinge Institute of

Contents

1 INTRODUCTION
1.1 BACKGROUND
1.2 PROBLEM DEFINITION
1.3 PURPOSE
2 THE QUESTION AT ISSUE
2.1 HYPOTHESIS
2.2 QUESTIONS
2.3 LIMITATIONS
3 METHODS
3.1 RESEARCH
3.1.1 Literature
3.1.2 Interviews
4 HISTORY AND DEVELOPMENT OF DRM
4.1 HISTORY AND DEVELOPMENT OF DRM
4.2 OBSTACLES TO DRM DEVELOPMENT
5 DRM – DIGITAL RIGHTS MANAGEMENT
5.1 COMPONENTS OF DRM
5.2 DRM CONCEPTS
5.2.1 A general DRM concept
5.2.2 An alternative DRM concept
5.2.4 Differences between general DRM and alternative DRM
5.2.3 Rights Descriptions Languages
5.3 MOBILE INTERNET DRM VS. INTERNET DRM
5.3.1 Internet DRM
5.3.2 Mobile Internet DRM
5.3.3 How they differ from each other
6 DRM APPLICATIONS
6.1 GENERAL INFORMATION
7 ANALYSIS AND RESULT
7.1 SURVEY
7.2 WHAT SECURITY LEVEL IS REQUIRED IN A DRM SYSTEM FOR MOBILE PHONES?
7.3 FUTURE ASPECTS
7.3.1 NTT DoCoMo I-mode
7.2.1 Interviews with mobile operators about DRM
9 DISCUSSION AND CONCLUSION
9 REFERENCES
10 ENCLOSURES
10.1 ENCLOSURE 1
10.2 ENCLOSURE 2
10.3 ENCLOSURE 3

Leave a Comment