|By Willms Buhse||
|October 6, 2004 12:00 AM EDT||
Managing content in the next few years is only going to get more complicated. Luckily standards are on the way.
The sharing of media and entertainment via mobile devices is becoming an increasingly popular pastime and one of the most widely used mobile services. People download content to their mobile phones or receive information by MMS every day, thereby allowing content to be passed along from one to the other, finding the natural path toward the perfect target audience.
Typically, the media consumed on a mobile device today includes light media content types, with a lower value of around $1.00-$2.00 per item, such as screensavers, wallpapers, or ringtones. Content providers and mobile carriers are facing piracy issues similar to those caused by peer-to-peer networks on the Internet, and they are losing revenues since much of today's lower-value content is forwarded from one user to the next for free. As new smart phones and other devices with color displays and richer audio capabilities penetrate the market, and as network capacities increase thanks to a growing number of WLAN hotspots, consumers are demanding access to higher-value content. Recognizing the revenue potential of these services, mobile carriers and content providers aim to fulfill these consumer demands, while at the same time looking to protect their investments in high-value content.
They are looking for a copy protection solution that is specifically designed for the mobile environment (i.e., mobile digital rights management [DRM]). Addressing the most critical dilemmas in the life cycle of premium content - intellectual property, integrity protection, security, and privacy - successful DRM solutions enable the operation of high-quality mobile services with secured revenues, while also allowing super distribution - the easy, secure forwarding of content from one person to another.
DRM solutions need to work across different devices, geographies, operators, and mobile terminals. They need to escort protected files wherever they go and enforce administrator-defined policies, including who can read what, what content can be duplicated or e-mailed, and how long a user can view a file. Without a secure and interoperable DRM solution, the full potential of mobile media and entertainment delivery cannot be realized.
Defining Open Standards for Interoperable Mobile Services
This is where the Open Mobile Alliance (OMA), or, more specifically, the OMA DRM open standards for the mobile industry, comes in. Created in June 2002, its membership now includes over 400 mobile operators, content, service and applications providers, wireless vendors, and IT companies. OMA aims to stimulate the fast and wide adoption of a variety of new, enhanced mobile information, communication, and entertainment services. Its goal is to deliver high-quality, open technical specifications based upon market requirements that drive modularity, extensibility, and consistency among enablers to reduce industry implementation effort.
OMA identified the market need for various levels of protection depending on the value of the content being protected. The different levels impact the user interfaces and business models. Service providers and mobile vendors wanted a solution that is timely and inexpensive to deploy, can be implemented in mass-market mobile devices, and does not require a costly infrastructure.
In late 2002, OMA released the OMA DRM version 1.0 enabler, its first set of specifications. Based on a subset of the Open Digital Rights Language (ODRL) Rights Expression Language, and entirely royalty-free, the OMA DRM v.1.0 has been adopted by all the major parties in the content value chain. This includes handset vendors such as Motorola, Nokia, and Siemens, and various European and Asian software providers, such as CoreMedia. (CoreMedia is one of the only leading software houses to offer a mobile DRM solution based on the Open Mobile Alliance's (OMA's) DRM specifications.) While handset manufacturers are implementing DRM on their mobile phones, operators are integrating the DRM server components into their content delivery infrastructure.
OMA DRM v.1.0 - Basic Content Protection on Three Levels
Designed to protect light media content such as ringtones, wallpaper, Java games, video and audio clips, and screensavers, OMA's first DRM enabler provides an appropriate level of security for these content types. It includes three levels of protection and functionality: Forward Lock, Combined Delivery, and Separate Delivery, each level adding a layer of protection on top of the previous level.
The first level, Forward Lock, prevents the unauthorized transfer of content from one device to another. The intention is to prevent peer-to-peer distribution, or super-distribution, of lower value content. Often applied to subscription-based services, such as news or sports, the plaintext content is packaged inside a DRM message that is delivered to the terminal. The device can play, display, or execute the content, but not forward the object.
Adding a rights definition to the first level, Combined Delivery equally prevents super-distribution (or forwarding), but also controls the content usage. The DRM message contains two objects: the content and a rights object. The rights object, written into the content using OMA Rights Expression Language (REL), a mobile profile of ODRL, defines usage rules that govern the content. The rules include and support all kinds of business models, including preview and time- and usage-based constraints; for example, a complimentary preview - the permission to play a tune only once, using the content only for a specific number of days, or an annual subscription with non-interfering price models. When applying the Combined Delivery mechanism, neither content nor the rights object can be forwarded from the target device.
The third level, called Separate Delivery, is the most sophisticated mechanism because here the content is encrypted, thereby providing better protection for higher value content. Encrypted into DRM Content Format (DCF) using symmetric encryption, the content is useless without a rights object and the symmetric Content Encryption Key (CEK), which is delivered separately from the content. OMA requires that the CEK is delivered securely via WAP push directly to the authorized mobile device, where the DRM User Agent uses it for content decryption.
An OMA DRM-compliant device such as the Nokia 3200 or 6230, or the Siemens SX1 and C62, securely stores the rights objects outside of the consumer's reach. Only the media player on that device has access to both encrypted content and the rights object including the CEK, in order to enable the consumption of the content by displaying or playing it.
People can download media and entertainment content and forward it to friends via MMS, but the recipients will not be able to use the content until they obtain their own CEK for content decryption. A "rights refresh" mechanism enables recipients of super-distributed content to contact the content provider to obtain rights to either preview or purchase the content they have received.
This so-called super-distribution is the key benefit of Separate Delivery. OMA aims to promote super-distribution of content because it maximizes the number of potential customers through peer-to-peer recommendations while retaining control for the content provider through centralized rights acquisition - thereby potentially triggering enormous revenue growth.
Added Protection and Functionality
OMA has taken a different approach to DRM when compared to other standards groups. The alliance aims to enable content delivery in an evolutionary process by implementing basic protection as soon as possible and then taking on more complex issues, thereby avoiding spending years addressing every threat before implementing a definite standard. Hence, the OMA DRM v.1.0 enabler release was developed rapidly in order to reduce time to market and to be immediately available for member companies to implement into their mobile products without requiring massive new infrastructure or changes to handsets.
The DRM v.1.0 enabler is a suitable protection system for lower-value content, appropriate for lower-bandwidth networks and simpler devices. However, as higher bandwidth provided by 2.5G and 3G mobile networks allows for larger content files to be transmitted over the air, and as smart phones and other mobile devices with removable media and larger color screens support downloading and streaming of valuable rich media content, the level of security that OMA DRM v.1.0 provides is no longer satisfying to content providers and mobile carriers who are eager to release high-value rich media content and applications into the mobile marketplace but worry about a "napsterization" of the mobile space.
OMA's Browser and Content (BAC)
The Download and DRM Sub-Working Group began working on its upgraded DRM v.2.0 enabler in early 2003 and announced it to the public in February of this year. The new specifications take advantage of expanded device capabilities and offer improved support for audio/video rendering, streaming content, and access to protected content using multiple devices, thus enabling new business models. They have added security and trust certificates that allow more complex and rich forms of media content (i.e., premium content such as music tracks, video clips, and animated color screensavers and games) as well as improved support to preview and share content.
Security is enhanced by encrypting the rights object and the content encryption key, using the device's public key to bind them to the target device. Integrity protection for both content and the rights object reduces the risk of either being tampered with.
In addition to these enhanced security features, the specifications include additional trust elements. Mutual authentication between the device and the rights issuer (the content provider) will add trust to the downloading or messaging scenario. The rights issuer can accurately identify the device in order to determine the revocation status of the transaction. The new enabler also supports a wide variety of distribution and payment use cases.
Since February, several draft specifications have been announced as part of the OMA DRM 2.0 enabler release. The enhanced version includes countless benefits for content owners as well as end consumers. Content owners will profit from the following features:
- Enhanced security, enabled by the binding of rights objects to user identity: Individually encrypted rights objects use a device's public key to provide cryptographic binding (to SIM/WIM), integrity protection for content and rights objects.
- Explicit trust mechanisms, including mutual authentication between a device and the rights issuer as well as device revocation: The rights issuer can identify the device revocation status.
- Support of secure multicast and unicast streaming: Collaboration with 3GPP and 3GPP2 on a file format for protected streaming and progressive download.
- Export to other copy protection schemes: For example, the transfer of music to the SD Card (which incorporates its own DRM mechanism) for a mobile music player.
- Support for a wide variety of business models: These include metered time and usage constraints, subscription rights for content bundles, and gifting.
- Support for messaging and peer-to-peer (i.e., super-distribution): Viral marketing and a reward mechanism.
- Enhanced security: Premium mobile content will be available to users.
- Advanced content management: Content and rights can, for example, be easily moved between several devices owned by one user or moved to remote or removable storage and later be restored to the device.
- Sharing of content between multiple users: Within domain (community or family).
- Unconnected devices: Content can be copied to SD Card for a mobile music player without network connectivity.
- Complimentary previews: Constraints for super-distributed content before purchase.
- Export to other copy protection schemes: Transfer of music to a DRM-enabled set-top box or computing device is supported.
Implementing OMA DRM
The success of premium 3G applications and high-value media and entertainment content delivery lies in security, ease of use, and in the market penetration of suitable handsets. Handsets and other mobile devices that support OMA-defined DRM technology are already on the market. Currently about 80 models are available in all categories. Given that the specifications were released 14 months ago, this can be considered a tremendous success. As OMA DRM has penetrated into the OS and into, for example, Nokia's widely used Series 60, it has become easy for handset manufacturers to implement DRM. Some leading handset vendors have decided to release DRM in all of their phone models. For these devices, the enhanced DRM v.2.0 specifications represent the next step in pervasive mobile access. The new enabler, the specifics of which have just been released, takes advantage of expanded device capabilities - multimedia applications, processing speed, and storage, among others - and offers improved support for the downloading and streaming of content as well as for sophisticated business models.
OMA's DRM solution sets the stage for generating multimedia revenues in a mobile environment. The solution is widely accepted in the content industry and has been embraced by music labels, game providers, and movie studios. But, as Avi Greengart, senior analyst for wireless and personal technology at JupiterResearch states, "It's still early in the wireless content market. Content providers have been encouraged because consumers have shown a willingness to pay $2 for ringtone versions of songs they won't pay $1 to download on their PCs. As such, the lack of open-standards-based DRM hasn't inhibited content providers from releasing ringtones and graphics so far. However, it's pretty clear that as new services evolve for faster wireless networks and more capable handsets, content providers are looking for stronger rights protection and are hopeful that super-distribution will enable new business models."
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...
Jan. 18, 2017 09:45 PM EST Reads: 6,490
Big Data, cloud, analytics, contextual information, wearable tech, sensors, mobility, and WebRTC: together, these advances have created a perfect storm of technologies that are disrupting and transforming classic communications models and ecosystems. In his session at @ThingsExpo, Erik Perotti, Senior Manager of New Ventures on Plantronics’ Innovation team, provided an overview of this technological shift, including associated business and consumer communications impacts, and opportunities it m...
Jan. 18, 2017 09:30 PM EST Reads: 5,728
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
Jan. 18, 2017 09:30 PM EST Reads: 7,613
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
Jan. 18, 2017 07:30 PM EST Reads: 3,139
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus o...
Jan. 18, 2017 06:15 PM EST Reads: 4,190
Big Data engines are powering a lot of service businesses right now. Data is collected from users from wearable technologies, web behaviors, purchase behavior as well as several arbitrary data points we’d never think of. The demand for faster and bigger engines to crunch and serve up the data to services is growing exponentially. You see a LOT of correlation between “Cloud” and “Big Data” but on Big Data and “Hybrid,” where hybrid hosting is the sanest approach to the Big Data Infrastructure pro...
Jan. 18, 2017 05:30 PM EST Reads: 4,877
In his General Session at 16th Cloud Expo, David Shacochis, host of The Hybrid IT Files podcast and Vice President at CenturyLink, investigated three key trends of the “gigabit economy" though the story of a Fortune 500 communications company in transformation. Narrating how multi-modal hybrid IT, service automation, and agile delivery all intersect, he will cover the role of storytelling and empathy in achieving strategic alignment between the enterprise and its information technology.
Jan. 18, 2017 04:45 PM EST Reads: 4,587
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists peeled away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud enviro...
Jan. 18, 2017 04:30 PM EST Reads: 4,778
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
Jan. 18, 2017 03:30 PM EST Reads: 3,684
"LinearHub provides smart video conferencing, which is the Roundee service, and we archive all the video conferences and we also provide the transcript," stated Sunghyuk Kim, CEO of LinearHub, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Jan. 18, 2017 02:45 PM EST Reads: 1,594
Things are changing so quickly in IoT that it would take a wizard to predict which ecosystem will gain the most traction. In order for IoT to reach its potential, smart devices must be able to work together. Today, there are a slew of interoperability standards being promoted by big names to make this happen: HomeKit, Brillo and Alljoyn. In his session at @ThingsExpo, Adam Justice, vice president and general manager of Grid Connect, will review what happens when smart devices don’t work togethe...
Jan. 18, 2017 02:00 PM EST Reads: 409
The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...
Jan. 18, 2017 01:00 PM EST Reads: 5,105
"There's a growing demand from users for things to be faster. When you think about all the transactions or interactions users will have with your product and everything that is between those transactions and interactions - what drives us at Catchpoint Systems is the idea to measure that and to analyze it," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York Ci...
Jan. 18, 2017 01:00 PM EST Reads: 5,608
Discover top technologies and tools all under one roof at April 24–28, 2017, at the Westin San Diego in San Diego, CA. Explore the Mobile Dev + Test and IoT Dev + Test Expo and enjoy all of these unique opportunities: The latest solutions, technologies, and tools in mobile or IoT software development and testing. Meet one-on-one with representatives from some of today's most innovative organizations
Jan. 18, 2017 12:15 PM EST Reads: 1,546
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
Jan. 18, 2017 12:00 PM EST Reads: 4,234
SYS-CON Events announced today that Super Micro Computer, Inc., a global leader in Embedded and IoT solutions, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 7-9, 2017, at the Javits Center in New York City, NY. Supermicro (NASDAQ: SMCI), the leading innovator in high-performance, high-efficiency server technology, is a premier provider of advanced server Building Block Solutions® for Data Center, Cloud Computing, Enterprise IT, Hadoop/Big Data, HPC and E...
Jan. 18, 2017 12:00 PM EST Reads: 5,766
SYS-CON Events announced today that Linux Academy, the foremost online Linux and cloud training platform and community, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Linux Academy was founded on the belief that providing high-quality, in-depth training should be available at an affordable price. Industry leaders in quality training, provided services, and student certification passes, its goal is to c...
Jan. 18, 2017 12:00 PM EST Reads: 1,954
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
Jan. 18, 2017 10:30 AM EST Reads: 3,113
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Jan. 18, 2017 09:45 AM EST Reads: 11,562
WebRTC sits at the intersection between VoIP and the Web. As such, it poses some interesting challenges for those developing services on top of it, but also for those who need to test and monitor these services. In his session at WebRTC Summit, Tsahi Levent-Levi, co-founder of testRTC, reviewed the various challenges posed by WebRTC when it comes to testing and monitoring and on ways to overcome them.
Jan. 18, 2017 08:15 AM EST Reads: 5,986