Feeds

IBM makes late DRM bid

xCP system backed by Intel, Matsushita and Toshiba

  • alert
  • submit to reddit

3 Big data security analytics techniques

IBM has thrown its hat into the ring as a late entrant into efforts to build sane and effective digital rights management. This week the company announced xCP - its eXtensible Content Protection system - at the US National Association of Broadcasters (NAB) event in Las Vegas.

IBM’s Almaden Research Center in San Jose has been quietly working on DRM systems for as long as we can remember, certainly for ten years, but when it first started out it mistakenly thought that the idea was only to build secure systems for the film-making process, with big ticket front ends, neglecting the mass market. With xCP it has gone back and re-engineered the entire idea for the Internet, peer to peer, piracy rich, age and come up with a credible architecture.

xCP is a one-way process for dropping not one, but multiple layers of encryption keys onto intelligent media playing devices in the home, be they set-tops, TiVos or other DVRs, Windows machines, MP3 players, digital TVs or DVD players. If the devices have a disk drive then they act as servers for the encryption keys and control the rights of the other, tethered devices.

The devices don’t get a say in which encryption key they sign up for, so this is a much easier scheme to bring into a home than previous PKI systems that have segregated public and private keys and which require a two way communication process to set them up. Now when a piece of film or music is copied from a commercial server, the keys can be automatically calculated and set working. When the content is copied, the keys are copied, until the content runs out of allocated rights.

There is one encryption key for all the devices to talk to each other and make content copies to one another, and another encryption key for every piece of media that can be used across all of the devices on the network. The second encryption key is decoded by the first and used to play music or film.

There is complex algorithmic calculation, which can be regularly re-calibrated when the network changes, and none of the keys, those protecting the media or those used for the devices to talk to each other, ever need to be known by a content purchaser, who just needs to what rights they have bought.

The scheme has been described in Association of Computer Machinery papers throughout last year, and IBM has now taken it into its marketing phase and used NAB to try and get support for it.

Sophisticated system

The IBM system seems more sophisticated than other similar systems from companies like Microsoft, which allow very simple rules relating to the number of copies that can be made, or the device types that a piece of media may go onto, and thereafter prevents copying completely.

In effect anyone that signs up to the IBM way of doing things will be building a set of inter-linked devices and will be able to buy any amount of rights for those devices that the content owner can imagine to sell.

The big issues for IBM now are political and financial. Which partners can it rely on right away, is the system going to be interoperable with other systems already out there, and what is it planning to charge device makers to run this scheme?

These are questions that IBM hasn’t addressed publicly but it has a strong relationships with Sony and Toshiba (working on the Cell chip manufacture together), and this project is expected to be offered in partnership with Intel, Matsushita, and Toshiba. The three founded 4C, an organization which licenses content protection technologies including the Content Protection System Architecture these four worked out in 2000 which the xCP Cluster Protocol was developed to be consistent with.

But IBM has not really described any process or language which will provide the syntax for stating the rights which are managed in this system, nor one that states accurately, different types of copy transactions, so it might easily adopt the ContentGuard work that has recently become an ISO standard and which might make interoperability with existing systems easy.

The big thing currently missing from the IBM equation is a big studio that is onside, so keep your eyes and ears open for such an announcement. Both Disney and Warner Brothers seemed to have backed Microsoft DRM, so it’s unlikely to be one of those.

© Copyright 2004 Faultline

Faultline is published by Rethink Research, a London-based publishing and consulting firm. This weekly newsletter is an assessment of the impact of events that have happened each week in the world of digital media. Faultline is where media meets technology. Subscription details here.

Related stories

Nokia leads bid to control mobile DRM standards
Europe demands open-to-all DRM tech
ISO applauded for MPEG 21 DRM blessing
MP3 DRM to demo at CeBIT
HP gets deeper into DRM
Why wireless will end piracy and doom DRM and TCPA - Jim Griffin

High performance access to file storage

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.