Nonius: Implementing a Drm System
نویسندگان
چکیده
The paper describes experiences, ideas, and problems that were discovered while developing a DRM extension to X-Smiles XML browser as a part of Helsinki Institute for Information Technology’s MobileIPR research project. The project succeeded in implementing a piece of software capable of demonstrating the most important DRM features. The most significant implemented features are restrictions related to an individual, time, and usage-counts. The implementation is not perfect. Some of the interesting features that were intentionally left out are aspect and target constraints. The most obvious shortcomings are related to security: certificates and user data are stored in a user’s hard disk in a human readable and modifiable format. Deliberately, there is no support for a secure encryption algorithm for protecting the content when it is transmitted over the network. The most difficult tasks in implementing a DRM system are related to security and parsers. A secure DRM system requires the support of hardware devices. A DRM document parser depends profoundly on a flexible software architecture. Merging certificates and implementing an interface for creating certificates are also challenging. The ODRL specification, too, produces some challenges for implementation. The three most challenging features in ODRL specification are logical operators, documents’ internal links to its elements, and the requirement that child elements may depend on ancestor elements’ children. Some general technical problems are discussed though largely left unanswered. How can we make secure software when the source code is available to anyone? In what layer should DRM be supported: application software, operating system, audio devices or even further? And how secure should the system be? Many non-technical issues are also discussed. Creating a common, global DRM standard is a very hard political problem. If the immaterial products are sold in a global Internet shop, new questions will arise. Guarantees must be implemented somehow, and some solution must be found for the payment. Probably the biggest non-technical problem with DRM is how to sell it to the consumers. A DRM-featured version of a product is worse and maybe more expensive for a consumer. DRM will make technically impossible some actions that are allowed by copyright laws, like copying a product for personal use or reproducing a part of a product for educational purposes. The publishers must have an answer to the people who find out that they have lost rights they used to have. But DRM is a radical change for publishers too. There is also a big question about the future role of the publishers since the main work is no longer producing and delivering physical products.
منابع مشابه
Nonius: Implementing a DRM Extension to an XML Browser
The paper describes experiences, ideas, and problems that were discovered while developing a digital rights management (DRM) extension to an XML browser. The supported rights description language is ODRL. The most significant implemented features are restrictions related to an individual, time, and usage-counts. On the other hand, some interesting features were intentionally left out. They incl...
متن کاملFixation disparity and nonius bias
Fixation disparity, i.e. the vergence error within Panum's area, can be measured psychophysically with two nonius (vernier) lines that are presented dichoptically, i.e. one to each eye. The observer adjusts these nonius lines to subjective alignment; the resulting physical nonius offset indicates the amount of fixation disparity. The present experiments investigate the relation between fixation...
متن کاملQuantitative Evaluation of Enterprise DRM Technology
It is of critical business importance for organizations to keep confidential digital documents secure, as the potential cost and damage incurred from the loss of confidential digital documents have increased significantly in recent years. Digital Rights Management (DRM) was developed to help organizations keep digital documents secure, as one of many digital information security solutions. In t...
متن کاملMethodological caveats for monitoring binocular eye position with Nonius stimuli
Three experiments, using two sets of Nonius lines placed in a random-dot stereogram, indicated that Nonius alignment does not always reflect binocular eye position and, thus, a caveat is necessary when Nonius alignment is used to monitor binocular eye position. We found that: (a) two Nonius lines with visual line values that differed by up to 7.6 min of arc can appear aligned; (b) the two lines...
متن کاملMistrust-Based Digital Rights Management
INTRODUCTION ....................................................................................... 48 I. WHY DIGITAL RIGHTS MANAGEMENT? .............................................. 51 A. Copy-Control DRM .................................................................. 51 B. Bundled Uses and Per-Use Pricing .......................................... 52 C. Patent-Royalty Collection ...........
متن کامل