DRM that middle school students can understand

Translation | Alex

This article is from OTTVerse by Krishna Rao Vijayanagar.

Easy-Tech#015#——DRM

In video services, DRM, Digital Rights Management (Digital Rights Management), refers to the use of encryption technology to protect video content, securely store and transmit keys (encryption key and decryption key) through professional technology, and allow content production A system in which providers set business rules to limit content viewers.

In this article, we will cover:

  • What is DRM (Digital Rights Management)?

  • DRM plays an important role in ensuring the fair use of digital resources through encryption, access restriction technology, and business rules.

A Tale of Two Friends

Ram and Shyam in seventh grade like to pass small notes in class. The two of them played together all the time, and the notes usually contained the latest school gossip, cheat codes for computer games, and cricket game scores.

Because their seats are relatively far apart, small notes often have to go through several classmates before they can be passed to them. But the two little boys trust their classmates very much and don't worry about their secrets being peeped.

But one day, a sad thing happened, a classmate broke their trust and opened the note! Then he used the stimulating gossip on the note to threaten Ram and Shyam and managed to get their lunch money.

picture

After being "hijacked" of all his lunch money, Ram thought hard and finally let him think of a way to safely deliver the note to Shyam.

How about replacing the words on the small note with codes?

good idea! He thought about it and started creating alternate codes (1 for A, 2 for B, etc.). In class the next day, he passed Shyam a secret note written in the new code language, and the note reached Shyam after being passed by several classmates. These students were very curious about what was written on the note, but no one could unlock the password.

But when Shyam received the note, he was completely dazed and thought:

"What do these numbers, letters, and squiggly lines mean? Is Ram trying out his new pen? Or has he been hit on the head by a cricket ball?"

Seeing Shyam's bewildered expression, Ram was also confused. Suddenly, he realized the problem: he forgot to tell Shyam how to decode it!

Then, Ram immediately wrote the code on a piece of paper and passed it to Shyam again. Shyam can use the code on this paper to decode the previous small note.

Done! Ram thought.

But what they don't know is that a classmate has copied down the code information and now has a code book. For the second day in a row, Ram and Shyam lost their secrets and their lunch money.

They realize that every time the code is used or changed, the code needs to be transmitted securely.

But how?

What did Ram and Shyam do?

Narrator: What Ram and Shyam are facing is a classic problem in data transmission. It's as simple as using a code pad, writing a secret message, and sending it to the recipient. But how do you securely deliver the codebook to the recipient without it falling into the wrong hands?

One night, Shyam suddenly had a flash of inspiration, and he called Ram immediately:

Shyma: What if we had Hari join the note delivery? We put the password book in his schoolbag, it is sure to be safe. Every time I or you need to read or write a note, we ask Hari for the code book. how do you feel?

Ram: I think it will work! But will Hari agree?

Shyam: I also thought of this question. Every time we ask him for a codebook, we can give him a bar of chocolate!

Ram: Ha, great idea!

picture

Narrator: Ram and Shyam decided to include their friend Hari in the plan, asking him to be a "trusted" third party. What Hari has to do is:

  • In order to reduce the chance of being cracked, a new password must be invented every day

  • Provide the key of the password only to Ram and Shyam, and no one else can open and read this key

Every time Ram and Shyam asked Hari for the code book, they gave him a piece of chocolate .

What a delicious reward!

Digital Rights Management (DRM)

Back in reality, what these two seventh-graders invented was a digital rights management (DRM) system that not only protects content (the little slip of paper), but also helps them set the rules.

DRM is a method of protecting content, which can flexibly select viewing audience through commercial rules, secure and protected communication protocols.

For example, you can set up rules like this:

  • Block people in certain countries from viewing content

  • Allow users to access content at specific times

  • Prevent users from casting movies to the screen

  • Prevent free users from accessing paid content

  • Block playback on certain devices

  • etc.

DRM plays a very important role in reducing piracy and ensuring that content creators get paid.

But, remember - DRM is not the same as encryption .

DRM is a system or solution that:

  • Protect content using encryption

  • Use specialized technology to securely store and transmit encryption and decryption keys (such as a codebook in the 7th grade example) and decrypt content with the key in a way that does not make it fall into the wrong hands

  • Allows content producers to set business rules and limit viewers (expiration time, etc.)

We'll have more on that in a future article.

Going back to the 7th grader example again

Let's step back and look at a simple method invented by two 7th graders that provides:

  • High security level with daily update and replacement of passwords

  • Authentication and permission management (read and write permissions)

  • Well-defined pricing model

The coolest part about this scheme is when Ram and Shyam are getting more and more popular in the school, they can allow a few classmates to "only read" the message and not be able to "write" the message.

All they had to do was go to Hari, show Hari the names and photos of their "new trusted friends," and ask Hari to allow only those people to read the messages.

If the news is really hot, they can ask Hari to:

  • According to the seats of the students in the classroom, block or allow them to visit, for example: the students in the front row are not allowed. ( geo-blocked )

  • Write a special set of little notes and ask the other students to give out two chocolates in exchange for reading the notes. All they have to do is tell Hari the subscriber name. ( pay-to-use/subscriber/freemium model )

  • Deny access to news published more than two hours ago (stale news). ( expiration date and time limit )

It's amazing, isn't it!

A simple technology that prevents others from reading messages has become a full-fledged business with:

  • Strict encryption measures

  • Business rules that determine access and usage rights

Commercial DRM Solutions

Commercially, there are many reliable DRM technologies on the market, such as Microsoft's PlayReady, Google's Widevine and Apple's FairPlay. Around DRM solutions, these DRM vendors provide additional infrastructure by adding more business rules, analysis and tools for content producers.

In future articles, we will examine the differences between these DRM technologies and understand where they are applicable.

Until then, take care! See you soon!

Thanks:

This article has been translated and published with the authorization of the author Krishna Rao Vijayanagar, thank you very much.

Original link:

https://ottverse.com/what-is-drm-digital-rights-management/

Further reading:

Understand ABR and how it works

What is HLS (HTTP Live Streaming)?

Easy Tech: What is the MPEG-DASH Protocol

The Complete Guide to Video Encoding


pictureScan the QR code in the picture to learn more about the conference

Guess you like

Origin blog.csdn.net/u011482225/article/details/123275390