|
1
|
- Edward W. Felten
- Dept. of Computer Science
- Princeton University
|
|
2
|
- DRM technology tries to enforce limits on when and how digital content
may be used.
- Limits may be based on copyright law, but need not be.
- Not just another security mechanism.
DRM is different, treating the device’s owner as adversary.
- Different DRM strategies raise different policy issues.
|
|
3
|
- Enforce compliance with copyright laws.
- problem: copyright law can’t be automated (no “judge on a chip”), so
can only hope to enforce a very rough approximation to it
- Enable new business models for publishers.
- pay-per-use
- sophisticated pricing / price discrimination
|
|
4
|
- Copyright offers exception for fair use.
- depends on nature of use, and circumstances
- Difficult for DRM to handle: loopholes end up
- too broad, or too narrow, or (usually) both.
- Even approximating the right result requires gathering information about
the user, the circumstances, etc.
- might need to collate and audit as a sanity check
|
|
5
|
- Approach:
- put unique serial number on each copy
- record each buyer’s identity
- find unauthorized duplicates
- check serial number on duplicate, blame original buyer
- Can limit copying and dissemination, but not use
- Enforcement raises serious privacy issues
- Must authenticate each buyer’s identity
- Must keep track of who has each copy
- Must monitor dissemination of copies
- This strategy is falling out of favor.
|
|
6
|
- Approach:
- distribute content in a virtual lockbox
- only authorized player devices can unlock it
- authorized player devices enforce limits on use
- Typical implementation:
- distribute content in encrypted form
- authorized player knows decryption key
- Can enforce any limits on usage
|
|
7
|
- Threat model: user will “rip” a copy of the content and put on
peer-to-peer system
- “Break once, infringe anywhere”
- Moderately skilled user, with moderate effort, can defeat DRM.
- DRM will not prevent infringement.
|
|
8
|
- Digital Millennium Copyright Act of 1998
- Many provisions
- Focus here on Section 1201
- Rationale for 1201: DRM technology can be circumvented; so make
circumvention, and circumvention tools, illegal
|
|
9
|
- 17 U.S.C. 1201(a)(1)(A): “No person shall circumvent a technological
measure that effectively controls access to a [copyrighted work].”
- Circumvent: “to descramble a scrambled work, to decrypt an encrypted
work, or otherwise to avoid, bypass, remove, deactivate, or impair a
technological measure, without the authority of the copyright owner”
|
|
10
|
- 17 U.S.C. 1201(a)(1)(A): “No person shall circumvent a technological
measure that effectively controls access to a [copyrighted work].”
- “[A] technological measure `effectively controls access to a work' if
the measure, in the ordinary course of its operation, requires the
application of information, or a process or a treatment, with the
authority of the copyright owner, to gain access to the work.”
|
|
11
|
- 17 U.S.C. 1201(a)(2): “No person shall manufacture, import, offer to the
public, provide, or otherwise traffic in any technology, product,
service, device, component, or part thereof, that–
- is primarily designed or produced for the purpose of circumventing a
technological measure that effectively controls access to a work
protected under this title;
- has only limited commercially significant purpose or use other than to
circumvent …; or
- is marketed by that person or another acting in concert with that
person with that person's knowledge for use in circumventing...
|
|
12
|
- Similar ban on tools that effectively control copying, or other
exclusive rights of the copyright holder.
|
|
13
|
- DMCA applies to access controls and to copy controls.
- Copyright law controls copying but not access.
- DMCA applies to acts of circumvention, even when no infringement occurs.
|
|
14
|
- Corley (DeCSS software for decrypting DVDs)
- Sklyarov / Elcomsoft (criminal case; Adobe e-book reader)
- Felten (digital watermarking research)
- Chamberlain v. Skylink (garage door openers), Lexmark v. Static Control
(printer cartridges)
|
|
15
|
|