This presentation/paper will address Digital Rights Management (DRM).
It starts explaining what DRM is and why it is used. It then will dive
into some technical details by explaining the operation of DRM with
its content containers, rights management languages, key management,
and trust infrastructure. This will among others make clear that a DRM
system in itself is in principle network technology independent. It
furthermore will give attention to robustness and compliance rules,
which play an important role in DRM systems.
With the basic knowledge in place some examples of system and business models deployed with DRM will be given and also some attention will be given to fingerprint and watermarking technologies that sometimes are used within DRM systems. The presentation/paper will end with some new trends in DRM like authorized domains, person based DRM, and walled gardens. |
![]() |
![]() |
![]() |
![]() |
Last modified: Sat, 24 Jun 2006 16:30:48 +0200