Video Education: What is DRM?

0:00

Have you ever been

0:00

on Netflix and

0:01

seen a scene that

0:02

you want to share

0:03

with friends or

0:03

family and so you

0:04

take a screenshot

0:05

or record your

0:06

screen, all for it

0:07

just to turn black?

0:08

Well that's

0:09

DRM in action.

0:10

DRM stands for

0:11

digital rights

0:12

management and is a

0:13

generic tool that's

0:14

used across digital

0:15

media to control

0:16

access to content.

0:17

Who can see or

0:17

view or share any

0:19

protected content.

0:21

DRM works really

0:22

well for companies

0:22

who are live

0:23

streaming sports

0:24

and want to prevent

0:25

valid customers from

0:26

sharing the stream

0:26

out with a lot of

0:27

other customers

0:28

who aren't paying.

0:29

It's especially

0:29

useful for companies

0:30

who are sharing

0:32

static stream URLs

0:33

and want to prevent

0:34

you from walking

0:34

away with your

0:35

favorite movie.

0:37

It can also be

0:37

used in some cases

0:39

where there's user

0:40

generated content

0:41

that's typically

0:41

behind a paywall,

0:42

maybe extended cuts

0:43

or extra features.

0:46

Part of the

0:47

intrinsic security

0:48

model with DRM is

0:49

that a lot of this

0:50

authentication is

0:50

actually delegated

0:51

across many

0:52

different actors.

0:53

So there's the

0:54

DRM provider on

0:55

one hand, which

0:56

does the actual

0:57

authentication

0:57

to allow your

0:58

computer or your

0:59

device to play

1:01

back the content.

1:02

The players check

1:03

the manifest for

1:04

keys and access the

1:05

license request.

1:07

The content

1:07

decryption module

1:08

takes the response

1:09

from the license and

1:10

actually decrypts

1:11

the content.

1:12

So take it from

1:13

me, there's a

1:14

number of different

1:14

steps in this

1:15

whole DRM process

1:16

and implementing

1:17

any one of them

1:18

is difficult.

1:19

But implementing

1:20

all of them by

1:20

yourself is next

1:22

to impossible.

1:30

So let's say

1:30

you want to

1:31

watch Dune this

1:31

weekend on Macs.

1:34

The first thing

1:35

you do is log in,

1:36

find your movie,

1:37

and click play.

1:37

This determines

1:38

if you as the user

1:40

are allowed to

1:40

view the content

1:41

in the first place,

1:42

but Now we have to

1:43

determine if the

1:43

device is allowed

1:44

to play it back.

1:45

The first thing the

1:46

player will do when

1:47

it recognizes that

1:48

it needs to make a

1:48

license request is

1:49

ask the CDM to look

1:51

at the host machine

1:53

and determine a

1:53

couple of factors,

1:54

like is it the right

1:55

operating system?

1:56

Do you have any

1:57

monitors plugged in?

1:58

And if those

1:58

monitors are

1:59

plugged in, are

2:00

they the right

2:00

HDMI, HDCP version?

2:03

If all those things

2:03

check out, it

2:04

creates an opaque

2:05

blob that the client

2:06

can then send to

2:07

the DRM provider.

2:09

The provider will

2:09

do that comparison

2:10

and see is this end

2:12

device allowed to

2:13

play this content.

2:14

It's an important

2:15

distinction to make

2:16

here that it doesn't

2:16

actually do the

2:17

user authentication.

2:18

That's still your

2:20

responsibility as

2:21

the platform owner.

2:22

But if that device

2:24

is allowed to play

2:25

back that content,

2:25

it will return

2:26

the decryption

2:27

key with a few

2:28

other features.

2:29

The CDN can then

2:30

take that response,

2:31

that license, apply

2:33

it to the encrypted

2:33

content, and return

2:35

to the client, uh,

2:36

decrypted and ready

2:38

to play video.

2:39

And that all happens

2:39

faster than you can

2:40

say Lisa Nalgaib.

2:41

So we've

2:45

talked about the CDM

2:47

and what information

2:48

it might put into

2:49

the license request.

2:50

It's important

2:50

to note that the

2:51

more strict you

2:52

make these license

2:52

requirements, the

2:53

more compatibility

2:54

issues you might

2:55

run into on lower

2:56

powered devices,

2:57

legacy devices, etc.

2:58

That might be

2:59

perfectly acceptable

3:00

for your use case.

3:01

You can think of

3:02

DRM as a constant

3:03

dialogue between you

3:04

and your end users.

3:05

There are a lot of

3:06

mitigating factors

3:07

you can use to

3:07

secure your top end

3:08

content, while still

3:10

being permissive

3:10

for some of your mid

3:12

range resolutions.

3:13

A very common

3:14

practice is to make

3:15

your 4K and UHD

3:17

content strictly

3:18

policed, whereas

3:19

your HD has some

3:21

middling security,

3:22

and then your SD

3:23

content is a little

3:24

bit more accessible.

3:26

Obviously we've

3:26

barely scratched

3:27

the surface for DRM.

3:29

There's an enormous

3:30

list of concerns

3:31

ranging from

3:31

cryptography to

3:32

video packaging,

3:33

but I'll save

3:34

you those details

3:34

in this video.