Mobile DRM in Ubiquitous Environments

6 downloads 201 Views 1MB Size Report
Browse to website ... trust; purchase and deliver rights object. Share content within your domain. Domain of user ... OMA DRM Domain Concept not appropriate.
© 2005 ORGA Systems | All rights reserved | www.orga-systems.com

ORGA Systems We know how.

Dr. Stephan Flake Research & Development

© 2005 ORGA Systems | All rights reserved | www.orga-systems.com

Creation/Revision Date: 23.03.2005

Mobile DRM in Ubiquitous Environments Stephan Flake, Matthias Runowski, Jürgen Tacken ORGA Systems enabling services GmbH Motivation OMA DRM Version 2.0 Mobile DRM Approach Conclusion and Outlook 9. Deutscher IT-Sicherheitskongress Bonn-Bad Godesberg, 10.05.2005 © 2005 ORGA Systems | All rights reserved | www.orga-systems.com

Content Protection in Mobile Networks 1. High bandwidth cellular networks 2. Mobile devices with large screens  Enable downloading and streaming of high value media Essential Content Protection Requirement (Provider View) : Enhanced Security and Trust Management 1. Enhanced security to prevent unauthorized access 2. Target device must be trusted for keeping secrets safe

 Mobile Digital Rights Management, i.e.: secured access to high value media through wireless networks at arbitrary locations © 2005 ORGA Systems | All rights reserved | www.orga-systems.com

Ubiquitous Environments and DRM “Ubiquitous Computing” Vision (M. Weiser, 1993): Ubiquitous computing has as its goal the enhancing computer use by making many computers available throughout the physical environment, but making them effectively invisible to the user.

Mobile DRM in Ubiquitous Environments Essential DRM Requirement (Consumer View): Allow using any appropriate target device for the consumption of protected high value media © 2005 ORGA Systems | All rights reserved | www.orga-systems.com

Mobile DRM in Ubiquitous Environments Motivation OMA DRM Version 2.0 M-DRM Approach Conclusion and Outlook

© 2005 ORGA Systems | All rights reserved | www.orga-systems.com

DRM Standard of the Open Mobile Alliance 

OMA DRM Version 1.0 for protection of “light” media content



Three kinds of content protection 

Forward Lock prevents content from leaving device



Combined Delivery of encrypted content and right



Separate Delivery of encrypted content and right



Official specification in September 2002



OMA DRM 1.0 lacks mechanisms for, e.g.,





secure delivery of rights



authentication of devices and rights issuers



revocation of devices/DRM agents/Rights Issuers

Draft OMA DRM Version 2.0, December 2004 © 2005 ORGA Systems | All rights reserved | www.orga-systems.com

Important Notions DRM Agent 

A trusted entity in a device responsible for  enforcing permissions and constraints associated with DRM Content,  controlling access to DRM Content, etc.



Must have a public/private key pair and a certificate.

Rights Object (RO) 

An XML document expressing permissions and constraints



associated with a piece of DRM Content



DRM Content can only be used with an associated Rights Object and only as specified by that Rights Object © 2005 ORGA Systems | All rights reserved | www.orga-systems.com

OMA DRM Version 2.0 (still draft) New Security and Trust Enabling Elements 

Public/private key encryption for protecting symmetric keys (the latter are used to encrypt content)



Digital signatures for ensuring integrity of content, rights, and exchanged messages



Authentication protocols for registration and rights acquisition

New Features (Consumer View) 

Domains

Sharing rights among multiple end devices



Unconnected devices

Use of intermediary device + ROAP protocol



Preview functionality

Optionally offered by content providers



Export to other copy protection schemes

Centralized approach over RI

© 2005 ORGA Systems | All rights reserved | www.orga-systems.com

OMA DRM 2.0 Content Provider View Enhanced Security 

Individually encrypted rights objects using public keys of end devices



Integrity protection for content, rights objects, and ROAP messages

Trust Mechanisms 

Mutual Authentication between end devices and Rights Issuers



Revocation 

Rights Issuer can check device revocation status



Devices can check Rights Issuer revocation status

© 2005 ORGA Systems | All rights reserved | www.orga-systems.com

OMA DRM Content Usage Application Flow Content Provider

Rights Issuer

2. Transfer Content Encryption key

3. Purchase right and establish trust

1. Browse to website and download protected content Domain of user devices

Share content within your domain

6. Establish trust; purchase 4. Deliver and deliver protected rights object rights object

5. Super-distribute content to a friend

[Buhse,02/2004]

© 2005 ORGA Systems | All rights reserved | www.orga-systems.com

Other user’s device

OMA DRM Content Usage Application Flow Content Provider

Rights Issuer

2. Transfer Content Encryption key

Finding

OMA DRM Domain Concept not appropriate Purchase right Environments for application in 3.Ubiquitous 1. Browse to website and establish trust

and download protected content

Domain of user devices

Share content within your domain

6. Establish trust; purchase 4. Deliver and deliver protected rights object rights object

5. Super-distribute content to a friend

[Buhse,02/2004]

© 2005 ORGA Systems | All rights reserved | www.orga-systems.com

Other user’s device

Mobile DRM in Ubiquitous Environments Motivation OMA DRM Version 2.0 Proposed Mobile DRM Approach for Ubiquitous Environments Conclusion and Outlook

© 2005 ORGA Systems | All rights reserved | www.orga-systems.com

Proposed Mobile DRM Approach End-to-end realization of OMA DRM 2.0 Extensions and adjustments: 

Server-Side Components: Protocols to securely exchange rights and related information



Client-Side Components: User Interaction, e.g., provide selection among different usage options and charges



Charging 

Prices are essential information when purchasing rights  combine with OMA DRM Rights Expression Language



Extension of ROAP protocols: billing information sent to a clearing house © 2005 ORGA Systems | All rights reserved | www.orga-systems.com

Proposed Mobile DRM Approach (cont’d) End-to-end realization of OMA DRM 2.0 Extensions and adjustments: 

Apply target devices with secure hardware: Mobile phones with (U)SIM card  already widely in use,  easy to adopt for mobile DRM  allows to easily integrate billing



Distributed DRM Agent Functionality 

DRM Secure Device Agent: obtained rights are always kept on mobile phones



DRM Consumer Agents: other end devices request decryption keys, but must not distribute decryption key/decrypted content © 2005 ORGA Systems | All rights reserved | www.orga-systems.com

Mobile DRM Architecture Content Provider

Rights Issuer

Certification Authority

Content Management

Rights Management

Certification Management I_CA

I_DRM_RM Web Server I_DRM_RI

Mobile Network Operator

I_DRM_CNT «device» Client Device «executable» Browser

Communication Management

«device» Secure Mobile Device «executable» DRM SD Agent I_KT

I_DRM_RAQ

File System «executable» DRM CNS Agent

© 2005 ORGA Systems | All rights reserved | www.orga-systems.com

Billing

Proposed Mobile DRM Approach (cont’d) Mutual authentication among DRM SD Agent and Consumer Agent 

Re-use OMA DRM 2.0 elements (ROAP, OMA REL) where possible



Definition of 2-pass key acquisition protocol DRM CNS Agent

DRM SD Agent



Request Parameters Device ID Device Nonce Request Time  Context Permission Certificate Chain Signature

Key Request

Key Response

© 2005 ORGA Systems | All rights reserved | www.orga-systems.com

Response Parameters Status Device ID Device Nonce Certificate Chain Protected CEK Signature

Mobile DRM in Ubiquitous Environments Motivation OMA DRM Version 2.0 M-DRM Approach Conclusion and Outlook

© 2005 ORGA Systems | All rights reserved | www.orga-systems.com

Conclusion and Outlook 

Extension of OMA DRM Version 2.0 for ubiquitous environments



Proof-of-Concept Implementation for our Mobile DRM approach





Consider new Java APIs for Mobile Phones and Java Cards (MIDP 2.0, JCRMI, JSR 177)



Explore different communication channels (e.g., IrDA, Bluetooth) to connect mobile phones and various end devices

Integration of enhanced PKI and trust solutions 

Establish trust among DRM agents even in “disconnected mode” (i.e., when no online Certification Authority is accessible)

© 2005 ORGA Systems | All rights reserved | www.orga-systems.com

Thank You for Your Attention!

Acknowledgement: ORGA Systems Am Hoppenhof 33 33104 Paderborn

IST FP6 Project http://www.ubisec.org © 2005 ORGA Systems | All rights reserved | www.orga-systems.com

Tel: +49 (0) 52 51 889-0 Fax: +49 (0) 52 51 889-3707

[email protected] www.orga-systems.com Creation/Revision Date: 23.03.2005