Dokudogs DRM

12 downloads 150 Views 1MB Size Report
Widevine . .... When the Digital Rights Management and Content Delivery Service ... Widevine's multiplatform DRM provides the capability to license, securely ...
Aalborg University Copenhagen

Dokudogs DRM

Student:

Orkun Gençoğlu

Supervisors: Allan Hammershøj, Jannick Sørensen

2012

Contents Executive Summary ................................................................................................................................. 2 1.

Introduction ..................................................................................................................................... 3

2.

Usage Scenario: End Users .............................................................................................................. 4

3.

Widevine.......................................................................................................................................... 4

4.

Technical Issues ............................................................................................................................... 5 4.1

High Level System Design ........................................................................................................ 5

4.2

Confidentiality / Integrity / Availability / Authentication ....................................................... 5

4.2.1

SSL with Public Key .......................................................................................................... 6

4.2.2

Certificate concept .......................................................................................................... 6

4.3

Cross Platform Content Delivery: Dynamic Adaptive Streaming over HTTP ........................... 7

4.4

Geographical restriction .......................................................................................................... 9

4.5 Recommendation system that takes ratings of user and ones friends from various social networks: Item based Collaborative Filtering with Slope One Scheme ............................................ 10 4.5.1

Explicit Ratings ............................................................................................................... 10

4.6

Recommendation system that takes editor’s recommendations: Latent Semantic Analysis 10

4.7

Showing Recommendations .................................................................................................. 11

4.8

Social Interaction ................................................................................................................... 12

4.7 Copyright violation with Reproduction ....................................................................................... 13 Conclusion ............................................................................................................................................. 13 Bibliography........................................................................................................................................... 14 Appendices ............................................................................................................................................ 15 1.

Screen Prototype: Login screen for registered user with e-mail and password ....................... 15

2. Screen Prototype: If the Certificate is expired, Peter needs to choose a new one provided by Trusted Certificate Authority............................................................................................................. 15 3.

Screen Prototype: Welcome Screen showing recommendations and search bar .................... 16

4. Screen Prototype: Social Interaction page show list numbers of friends from various networks and user also can see online friends and search among ................................................................... 16 5.

Screen Prototype: Social Interactions and settings ................................................................... 17

6.

Screen Prototype: Recommendation algorithm setting ........................................................... 17

7.

Screen Prototype: Search Results and Quality Settings before Play ......................................... 17

8. Screen Prototype: Video Screen minimized version with social conversations, ability to forward-rewind to specific scenes and friend invitation .................................................................. 18

Executive Summary When the Digital Rights Management and Content Delivery Service mechanism enriched with recommendation algorithms, implementation and management costs rises. A typical DRM System consists of three entities; Users, Content Holders, License Holders where DRM is the umbrella term for this ecosystem. In this report, given request from Dokudogs has been elaborated within a real life scenario and expended with low fidelity mobile-tablet screen prototypes for desired system. Also, other market player Widevine is introduced and suggested for Dokudogs. As the interoperability with the latest standards and scalability are the basis at the request, nevertheless the choice of Dokudogs for the solution- both, considerations of technologies or the Widevine- it is possible to join interoperable Content Delivery and Digital Rights-Licensing ecosystem.

1. Introduction Exponential growth in digital media and the stakeholders brings out new business models with their high dependency on secure deliverable and interoperable digital technology in order to claim sustainability within sector. Dokudogs is one of the stakeholders for digital media where the role is to deliver high quality documentary movies, precisely being a medium between consumers and content owners. More, Dokudogs has sustaining and incremental innovative product (Figure 1) which addresses a phase mature enough to adapt with successive improvements upon existing products and processes. Also, Dokudogs project addresses to be a differentiated and sophisticated system which fit into existing core competencies and the core business and rise up the documentary movies market value.

Figure 1 Evolution of a Technology and the position of Dokudogs is in the high maturity level

In order to deliver a successive and sophisticated improvement to market, Dokudogs DRM system will be analyzed and elaborated within the basic DRM Principle (Figure 2) with a real life scenario where the requirements fit into.

Figure 2 Basic DRM Principle: Encrypted Content and License brings the access[1]

2. Usage Scenario: End Users Peter uses Dokudogs system in order to purchase and consume documentary movies. Peter likes to rate movies and share his ideas upon what he has seen. Also, Peter uses the system in order to get recommendations based on his ratings of other documentaries consumed. Moreover, Peter has an attitude – which helps him to give final decisions if he did not consumed before - for having professional ideas and summaries upon the documentaries. Peter attended CPH: DOX festival and love “Millennium Hippies” documentary film. He would like to watch it again on a Saturday night and drink a couple of beers. While the documentary is about the underground life style and its survivals at Scandic countries, he fell again into the documentary, especially after few beers. Peter got other friends from all over the world whom have met on university years with lots of adventures. Since the documentary takes focus on their common, he thinks it is as much interesting for them as Peter. Peter checks the “Dokudogs Social Interaction” screen if his friends are also online. Since some of Peter’s friends use the Dokudogs, suddenly he sees that Celine- from France- and Jackfrom Australia- are online. He feels to introduce mentioned documentary to remember good old days. Peter just would like to have fun and feel the same atmosphere with friends as they are online. Peter invited Celine and Jack to purchase the same documentary. Simultaneously, Celine accept and choose “Start from beginning”, not “Synchronize”. Before Celine starts to watch the documentary, a short chat session of Peter and Celine occurs; also, Celine had chance to read editor’s comment and got even more excited and starts to watch. Celine lies on her coach with a glass of vine while it is the midnight at Paris. Same time it is morning at Denham, West Australia. Jack sees the invitation from Peter however he also sees the “Dokudogs Warning Message” tells him related documentary is restricted to publish in WA. Reason might be: 1- Exclusive rights of Dokudogs which does not grant access for particular documentary in restricted geographical area , 2- The creator’s exclusive rights which Australian government did not fulfill, 3- Exclusive rights of Australian government which does not let related documentary to be seen at Australia. So Jack decides to watch another documentary, which is closely related to “Millennium Hippies” recommended by Dokudogs Recommender feature. While Dokudogs will be holding a significant amount of acquired content, DRM solutions are critical to securely deliver key content to the endpoints where the viewers want. Also,

3. Widevine Widevine’s multiplatform DRM provides the capability to license, securely distribute and protect playback of multimedia content on any consumer device. Content owners, MSOs and Internet digital media providers can utilize Widevine’s solutions to ensure revenue generating services keep flowing to whatever device consumers desire. Widevine adds an additional layer of post decryption copy protection for stream recorders and screen scrapers which pirate content[2].

4. Technical Issues 4.1 High Level System Design

Following sections will be explaining the system in order to incept and relate the high level design.

4.2 Confidentiality / Integrity / Availability / Authentication CIA is abbreviation for the basic security elements where the requested degree level of the system must implement. At the essence, basic security elements and their state at the system design can be sorted as following: Confidentiality: Ensure that only authorized consumer can access Integrity: Documentaries only can be modified (create-read-update) by authorized access Availability: Dokudogs should be accessible anywhere-anytime, systems should follow fault tolerance. Risk analysis is necessary. Authentication: Preventation/Detection for forgery of content which are, documentary movies which has distribution rights for, user profile and ratings, editor’s recommendation .

4.2.1 SSL with Public Key The SSL protocol provides secure connections by allowing two applications connecting over a network connection to authenticate the other’s identity and by encrypting the data exchanged between the applications. The SSL protocol uses public key encryption for authentication. With public key encryption, a pair of asymmetric keys generated for a principal or an application server. The keys are related such that the data encrypted with the public key can only be decrypted using the corresponding private key which the only consumer knows. Conversely, data encrypted with the private key can be decrypted only with the public key. The private key is carefully protected so that only the owner can decrypt messages. The public key, however, is distributed freely so that anyone can encrypt messages intended for the owner.[3] On the other hand, key distribution to both parties should be done by efficient and strong algorithms so that keys will not be obtained by third party intruders. RSA key exchange (Figure 3) is an efficient way of distributing keys to recipients.

Figure 3 Illustration of RSA Key Exchange [4]

4.2.2 Certificate concept Digital certificates are electronic documents used to uniquely identify principals and entities over networks such as the Internet. A digital certificate securely binds the identity of a principal or entity, as verified by a trusted third party known as a certificate authority (CA), to a particular public key. The combination of the public key and the private key provides a unique identity to the owner of the digital certificate.[3] A digital certificate includes; name of certificate holder and other information in order to identify the certificate- URL of the Web Server requiring the certificate, certificate holder’s public key, the name of the Certificate Authority1, serial number for the certificate and the lifetime of the digital certificate. With digital certificate usage, it is clearer to guarantee the validity of information and establishing the trust with end users.

Authentication SSL client sends a message to a SSL server, and the server responds with the information that the server needs to authenticate itself. The client and server perform an additional exchange of session keys, and the authentication dialog ends.

Digital certificates are issued by a certificate authority. Any trusted third-party organization or company that is willing to vouch for the identities of those to whom it issues digital certificates and public keys can be a certificate authority[3]. 1

Figure 4 Public Key encryption[5]

Figure 5 SSL Protocol Handshake [6]

Confidentiality When authentication is completed, SSL-secured communication can begin between the server and the client using the asymmetric encryption keys (Figure 2) that are delivered with RSA key exchange algorithm during the authentication process (Figure 3).

4.3 Cross Platform Content Delivery: Dynamic Adaptive Streaming over HTTP Adaptive streaming involves producing several instances of a live or on-demand source file and making them available to various clients depending upon their delivery bandwidth and CPU processing power. MPEG DASH (Dynamic Adaptive Streaming over HTTP) is a developing ISO Standard (ISO/IEC 23009-1). As the name suggests, DASH is a standard for adaptive streaming over HTTP that has the potential to replace existing proprietary technologies like Microsoft Smooth Streaming, Adobe Dynamic Streaming, and Apple HTTP Live Streaming (HLS). [7].

Figure 6 DASH Media Presentation Data Model [7]

One disadvantage of adaptive streaming might be “forcing users to consume the quality depend on their broadband”. This situation would be uneasy for the users who pay attention to quality, especially for a purchased documentary film. In this case, system should be able to let users choosing a predefined video quality2 nevertheless the broadband speed- in this case delay will be occurredwhile the waiting responsibility delivered with understandable warning messages.

Figure 7 Dynamic Adaptive HTTP Streaming to a “Capable Client”

2

Pay Per Quality, additional use case and possible bussiness strategy[1]

4.4 Geographical restriction In order to control the geographical access, Dublin Core Element Set (DCMI: Coverage) with the usage Dublin Core Metadata Initiative Box will be appropriate. DCMI Box lets predefining the country by rectangular box manner where the “northlimit”, “southlimit”, “westlimit”, “eastlimit” coordinates defining the landscape as rectangular shape- 3th dimension “uplimit” and “downlimit” of the landscape are also definable. Coverage is defined by using dcterm Box which is a value string using DCSV syntax and using the predefined components as seen on Scheme 1. Following Resource Description Framework Scheme is an example for defining a coverage area (in this example West Australia) which could be used in order to restrict access to content on predefined geographical area:

Scheme 1 DCMI Box and values encoded with DCSV Encoding[8]

Restrictions should be applied by authorized administrator who will be using graphical user interface in order to control the access to specific Dokudogs content.

4.5 Recommendation system that takes ratings of user and ones friends from various social networks: Item based Collaborative Filtering with Slope One Scheme Slope One algorithm[9], item based collaborative filtering, assuming the relationship between all items on the first degree- brings the lower complexity for processing amounts of data- makes it simple approach for recommending users items based on the other items which have been rated.

4.5.1 Explicit Ratings Explicit ratings, taken from user consciously, are useful in the manner of providing recommendations both based on user’s ratings on item and other users- in this case all users from social networks who are registered to Dokudogs. This can be used in order to predict user’s recommendations for other films and provide more accurate suggestions. As long as Dokudogs will customers rates intentionally, explicit ratings will be trusted, this will make shilling problem minimized.

4.6 Recommendation system that takes editor’s recommendations: Latent Semantic Analysis Dokudogs has limited funds for investing an editor who will be extracting meaning from each documentary movie. Latent Semantic Analysis is an algebraic set of algorithms which proofs the efficiency by delivering sophisticated text summaries in meaningful manner[10]. Also, LSA is able to extract meanings from text based content. As long as Dokudogs will be having the documentary scripts, LSA will be an appropriate summarization algorithm. Moreover, LSA can be combined with item based collaborative filtering algorithms in order to suggest the meanings gathered by itself[11]. Extraction: Extraction takes the practical process into account. Within extraction process, the goal is to find and collect the important sentences of the given text and create a summary within set. The important sentences of the text are the sentences that represent the main topics of the text[11].

4.7 Showing Recommendations Each recommendation algorithm set should be shown with meaningful words, so the user can easily perceive the designer’s model. “Selected for you” emphasises to user such type of suggestion based on his rankings and his friends. On the other hand, “Fresh from production” types of films are sorted by using “DCMI: Release Date” element in order to emphasise the user new films. Related to daily news emphasises the films related to social debates from news broadcaster. Moreover, when the user clicks on “More details” link, at the right section of the page “Editor’s Comment” and an average rating will be shown.

Screen Prototype 1 User’s Welcome Page, different types of recommendations shown to user

At “Recommendation Settings” page (Figure 2), user can set the algorithms, so will not receive related suggestion.

Screen Prototype 2 User should be able to set recommendation types and have a better understanding of the system by understanding the algorithms and creating the mental model.

4.8 Social Interaction Consumers should be able to interact with other users who are mostly from social networks. Also, consumers should be able to invite friends through e-mail and see other users who have account at Dokudogs. Dokudogs might be organizing “Premier Documentary Movie3” nights for users within system. Promotions shall bring more customers and networks to Dokudogs.

Screen Prototype 3 Peter is able to see his online friends and chat with them.

3

Other variations of ideas can be discussed as well

Screen Prototype 4 Peter is able to see the quantity of the friends and add new ones from social networks or with e-mail address, his network expends

Although Dokudogs predefines business model, Subscription page will be including examples for improvement. Pay Per View, Pay Per Quality, Pay Per Monthly are predefined but not included at prototypes, variations can be modeled depend on your strategy.

4.7 Copyright violation with Reproduction The distribution right grants to the holder the exclusive right to make a work available to the public by sale, rental, lease, or lending. This right allows the holder to prevent the distribution of unauthorized copies of a work. In addition, the right allows the copyright holder to control the first distribution of a particular authorized copy[12]. However, distribution rights, as stated, which Dokudogs negotiated for, does not cover the reproduction rights. Reproduction rights, forces no one other than the copyright owner may make any reproductions or copies of the work. In this case, letting other content providers to “buy for reproducing the content”, would bring violation of copyrights situation to Dokudogs unless having the Copyright of the documentary films. Instead of “selling” the content for reproduction, Dokudogs may benefit from distribution rights which do let to redistribute. In this case, Dokudogs should claim self-exclusive rights on the documentary and redistribute the documentary movies to other content providers, not to reproduce manner but redistribute. With this strategy, Dokudogs will have own exclusive rights which cover risks for violating copyrights of content creator and expending the networks with other business players and their customers.

Conclusion Elaboration report shows that it is possible to implement and control the system as desired. Given screenshots are for visual expression which only shows main functionalities for users where

Dokudogs feedbacks are appropriate for delivering the real need. Also, for Dokudogs, it should be considered to join systems as Widevine.

Bibliography [1]

F. Hartung, S. Kesici, and D. Catrein, “DRM PROTECTED DYNAMIC ADAPTIVE HTTP STREAMING Digital Rights Management ( DRM ).”

[2]

“Widevine.” *Online+. Available: http://www.widevine.com/drm.html.

[3]

“Oracle SSL Introduction.” *Online+. Available: http://docs.oracle.com/cd/E35855_01/tuxedo/docs12c/security/publickey.html#wp1050680.

[4]

Microsoft, “RSA Key Exchange.”

[5]

Microsoft, “Symmetric Key Exchange.” *Online+. Available: http://msdn.microsoft.com/enus/library/ff650720.aspx.

[6]

Http://www.zytrax.com, “SSL Handshake.” .

[7]

J. Ozer, “No Title,” 2011. *Online+. Available: http://www.streamingmedia.com/Articles/ReadArticle.aspx?ArticleID=79041.

[8]

“DCMI Box.” *Online+. Available: http://dublincore.org/documents/2000/07/28/dcmi-box/.

[9]

D. Lemire and A. Maclachlan, “Slope One Predictors for Online Rating-Based Collaborative Filtering,” 2005.

[10]

A. Hammershøj, “Content and Media Management Introduction to semantics - Can you speak the language of the machines Introduction to semantics.”

[11]

O. Gençoğlu, “Latent Semantic Analysis Exercise 2012,” 2012.

[12]

“Bitlaw.”

Appendices 1. Screen Prototype: Login screen for registered user with e-mail and password

2. Screen Prototype: If the Certificate is expired, Peter needs to choose a new one provided by Trusted Certificate Authority

3. Screen Prototype: Welcome Screen showing recommendations and search bar

4. Screen Prototype: Social Interaction page show list numbers of friends from various networks and user also can see online friends and search among

5. Screen Prototype: Social Interactions and settings

6. Screen Prototype: Recommendation algorithm setting

7. Screen Prototype: Search Results and Quality Settings before Play

8. Screen Prototype: Video Screen minimized version with social conversations, ability to forward-rewind to specific scenes and friend invitation