SlideShare a Scribd company logo
1 of 17
Download to read offline
European Digital Reading Lab
Licensed Content Protection (LCP)
EPUB Summit workshop
Laurent Le Meur
Scope of the workshop
● Update the participants on the architecture of Readium LCP, the workflow, the
state of the developments, the agenda, the costs involved;
● Detail the certification process;
● Exchange on the level of protection of Readium LCP;
● Exchange on the level of support of this new DRM by the participants.
DRM = Digital Rights Management
Technical
implementation of a
business model (ex.
Library lending)
Protection against wild
dissemination (anti-
pirating)
Are obligations more than
rights
Complexify access to e-books
Lower interopérability and
accessibility
Hurt honest sharing
Make archiving an illusion
=> push people to use anti-
DRM tools
What the devil was he doing in that galley?
LCP implémentation decided in november 2015,
launched in january 2016.
Why do we offer our beloved ebooks to the
DRM Moloch?
- Because public libraries need a better solution than
the Adobe DRM
- Because for most publishers, unprotected EPUB is a
showstopper
- Because the spec is almost ready for 2 years
- Because we have been donated source code to help
Goals of Readium LCP
● Simplicity for the user
● Perfect interoperability in the LCP ecosystem
● No limitation on content accessibility
● Offline access to the documents always possible
● Dynamic update of licenses
● Unlimited access (in time) to the documents
● Family sharing possible
● No centralized server
● Low development costs
● Limited cost of certification
LCP - search for a good balance
Readium LCP = simplicity
Encrypted content
Associated decryption key
(passphrase)
The owner of the
passphrase can read the
document
The App can store the key,
so that the user can forget it
More details … 1/ encryption
+ =
+ Content Key
Protected
Content
2/ License generation
= + + + + +
Protected
content key
Rights Provider
certificate
Passphrase
hint
Signature
License
Personal
data
Standard rights: start/end datetime,
print (# pages),
copy (# characters),
tts (yes/no)
Choose a passphrase
A user will usually have one passphrase per bookseller or public library.
Must be easy to remember or find.
A hint stored in the license by the licensor will help the user when needed.
It MUST be clear to the user. In a public library, the user ID can be a good choice.
The passphrase will usually be requested only when a protected document is side
loaded in a new device.
3/ LCP / EPUB file
= +
EPUB / LCP License Protected content
4/ Open with a passphrase
Hint User Passphrase
Signature
checking
EPUB / LCP Content key Clear content
content
The passphrase may be acquired automatically and stored in the
app without user action. The user will use the hint to “remember”
the document passphrase.
5/ Dynamic update of the license
● Early return
● Extended lending
● Requires an online connection
● The licensor can track the number of devices opening the document
Readium LCP ecosystem
Publisher Distributor
Bookseller
1
2
Distributor /
Bookseller
What is the certification?
● Readium LCP is a DRM ecosystem
● Certification is
○ Guarantee of compliance
○ Guarantee of robustness
○ Guarantee of interoperability
● The specification will be public
● The source code will be open-source (BSD-like)
● But some confidential information will be transferred to the participants to an
LCP ecosystem
○ Root certificate (ITU)
○ Provider certificate
○ Readium LCP 1.0 profile information (unavailable in the specification)
Compliance rules, Robustness rules
● Client and server side
● Compliance
○ Server app must alert if *many* devices use the same license
○ Client app must develop an anti-rollback clock (details to be defined)
○ etc.
● Robustness
○ A certain data type must be protected against a certain type of attack to a certain extent
■ Client app must obfuscate the decryption process
■ Client app must hide Readium LCP confidential information
■ Client app must securely store user keys
■ Server app must protect the provider private key
Agenda
Q1 2016: development (iOS, MacOS, Android)
Q2 2016: development (iOS, MacOS, Android); first tests; contractual documents;
pricing;
Q3 2016: interop tests; certificate authority setup
Q4 2016: first certifications; launch

More Related Content

Similar to 2016 Readium LCP workshop at EPUB Summit

Ubucon 2013, licensing and packaging OSS
Ubucon 2013, licensing and packaging OSSUbucon 2013, licensing and packaging OSS
Ubucon 2013, licensing and packaging OSSNuno Brito
 
Open Source & What It Means For Self-Sovereign Identity (SSI)
Open Source & What It Means For Self-Sovereign Identity (SSI)Open Source & What It Means For Self-Sovereign Identity (SSI)
Open Source & What It Means For Self-Sovereign Identity (SSI)Evernym
 
Open source technology
Open source technologyOpen source technology
Open source technologyaparnaz1
 
Lesson 1. General Introduction to IT and Cyber Security.pptx
Lesson 1. General Introduction to IT and Cyber Security.pptxLesson 1. General Introduction to IT and Cyber Security.pptx
Lesson 1. General Introduction to IT and Cyber Security.pptxJezer Arces
 
Start your open source project
Start your open source projectStart your open source project
Start your open source projectAhmed Othman
 
“State of the Tooling” in Open Source Automation
“State of the Tooling” in Open Source Automation“State of the Tooling” in Open Source Automation
“State of the Tooling” in Open Source AutomationShane Coughlan
 
Drm landscape and online streaming
Drm landscape and online streamingDrm landscape and online streaming
Drm landscape and online streamingJas Chhabra
 
OpenId Connect Protocol
OpenId Connect ProtocolOpenId Connect Protocol
OpenId Connect ProtocolMichael Furman
 
Managing Software Dependencies and the Supply Chain_ MIT EM.S20.pdf
Managing Software Dependencies and the Supply Chain_ MIT EM.S20.pdfManaging Software Dependencies and the Supply Chain_ MIT EM.S20.pdf
Managing Software Dependencies and the Supply Chain_ MIT EM.S20.pdfAndrew Lamb
 
Not my problem - Delegating responsibility to infrastructure
Not my problem - Delegating responsibility to infrastructureNot my problem - Delegating responsibility to infrastructure
Not my problem - Delegating responsibility to infrastructureYshay Yaacobi
 
Outlook and thunderbird ii
Outlook and thunderbird iiOutlook and thunderbird ii
Outlook and thunderbird iiBanukaVidusanka
 
DRM Basics With Irdeto and Bitmovin
DRM Basics With Irdeto and BitmovinDRM Basics With Irdeto and Bitmovin
DRM Basics With Irdeto and BitmovinBitmovin Inc
 
Internet and open source concepts
Internet and open source conceptsInternet and open source concepts
Internet and open source conceptsSachidananda M H
 
How to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS AppsHow to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS AppsBitbar
 
Drupal Dev Days Vienna 2023 - What is the secure software supply chain and th...
Drupal Dev Days Vienna 2023 - What is the secure software supply chain and th...Drupal Dev Days Vienna 2023 - What is the secure software supply chain and th...
Drupal Dev Days Vienna 2023 - What is the secure software supply chain and th...sparkfabrik
 
VPN vs. PROXY
VPN vs. PROXYVPN vs. PROXY
VPN vs. PROXYali25rad
 
apidays LIVE Australia 2021 - Levelling up database security by thinking in A...
apidays LIVE Australia 2021 - Levelling up database security by thinking in A...apidays LIVE Australia 2021 - Levelling up database security by thinking in A...
apidays LIVE Australia 2021 - Levelling up database security by thinking in A...apidays
 
Nt1330 Unit 3 Types Of Dngs
Nt1330 Unit 3 Types Of DngsNt1330 Unit 3 Types Of Dngs
Nt1330 Unit 3 Types Of DngsLaura Martin
 
SFO15-TR1: The Philosophy of Open Source Development
SFO15-TR1: The Philosophy of Open Source DevelopmentSFO15-TR1: The Philosophy of Open Source Development
SFO15-TR1: The Philosophy of Open Source DevelopmentLinaro
 

Similar to 2016 Readium LCP workshop at EPUB Summit (20)

Ubucon 2013, licensing and packaging OSS
Ubucon 2013, licensing and packaging OSSUbucon 2013, licensing and packaging OSS
Ubucon 2013, licensing and packaging OSS
 
Open Source & What It Means For Self-Sovereign Identity (SSI)
Open Source & What It Means For Self-Sovereign Identity (SSI)Open Source & What It Means For Self-Sovereign Identity (SSI)
Open Source & What It Means For Self-Sovereign Identity (SSI)
 
Polish the Wheel
Polish the WheelPolish the Wheel
Polish the Wheel
 
Open source technology
Open source technologyOpen source technology
Open source technology
 
Lesson 1. General Introduction to IT and Cyber Security.pptx
Lesson 1. General Introduction to IT and Cyber Security.pptxLesson 1. General Introduction to IT and Cyber Security.pptx
Lesson 1. General Introduction to IT and Cyber Security.pptx
 
Start your open source project
Start your open source projectStart your open source project
Start your open source project
 
“State of the Tooling” in Open Source Automation
“State of the Tooling” in Open Source Automation“State of the Tooling” in Open Source Automation
“State of the Tooling” in Open Source Automation
 
Drm landscape and online streaming
Drm landscape and online streamingDrm landscape and online streaming
Drm landscape and online streaming
 
OpenId Connect Protocol
OpenId Connect ProtocolOpenId Connect Protocol
OpenId Connect Protocol
 
Managing Software Dependencies and the Supply Chain_ MIT EM.S20.pdf
Managing Software Dependencies and the Supply Chain_ MIT EM.S20.pdfManaging Software Dependencies and the Supply Chain_ MIT EM.S20.pdf
Managing Software Dependencies and the Supply Chain_ MIT EM.S20.pdf
 
Not my problem - Delegating responsibility to infrastructure
Not my problem - Delegating responsibility to infrastructureNot my problem - Delegating responsibility to infrastructure
Not my problem - Delegating responsibility to infrastructure
 
Outlook and thunderbird ii
Outlook and thunderbird iiOutlook and thunderbird ii
Outlook and thunderbird ii
 
DRM Basics With Irdeto and Bitmovin
DRM Basics With Irdeto and BitmovinDRM Basics With Irdeto and Bitmovin
DRM Basics With Irdeto and Bitmovin
 
Internet and open source concepts
Internet and open source conceptsInternet and open source concepts
Internet and open source concepts
 
How to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS AppsHow to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS Apps
 
Drupal Dev Days Vienna 2023 - What is the secure software supply chain and th...
Drupal Dev Days Vienna 2023 - What is the secure software supply chain and th...Drupal Dev Days Vienna 2023 - What is the secure software supply chain and th...
Drupal Dev Days Vienna 2023 - What is the secure software supply chain and th...
 
VPN vs. PROXY
VPN vs. PROXYVPN vs. PROXY
VPN vs. PROXY
 
apidays LIVE Australia 2021 - Levelling up database security by thinking in A...
apidays LIVE Australia 2021 - Levelling up database security by thinking in A...apidays LIVE Australia 2021 - Levelling up database security by thinking in A...
apidays LIVE Australia 2021 - Levelling up database security by thinking in A...
 
Nt1330 Unit 3 Types Of Dngs
Nt1330 Unit 3 Types Of DngsNt1330 Unit 3 Types Of Dngs
Nt1330 Unit 3 Types Of Dngs
 
SFO15-TR1: The Philosophy of Open Source Development
SFO15-TR1: The Philosophy of Open Source DevelopmentSFO15-TR1: The Philosophy of Open Source Development
SFO15-TR1: The Philosophy of Open Source Development
 

Recently uploaded

How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 

Recently uploaded (20)

How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 

2016 Readium LCP workshop at EPUB Summit

  • 1. European Digital Reading Lab Licensed Content Protection (LCP) EPUB Summit workshop Laurent Le Meur
  • 2. Scope of the workshop ● Update the participants on the architecture of Readium LCP, the workflow, the state of the developments, the agenda, the costs involved; ● Detail the certification process; ● Exchange on the level of protection of Readium LCP; ● Exchange on the level of support of this new DRM by the participants.
  • 3. DRM = Digital Rights Management Technical implementation of a business model (ex. Library lending) Protection against wild dissemination (anti- pirating) Are obligations more than rights Complexify access to e-books Lower interopérability and accessibility Hurt honest sharing Make archiving an illusion => push people to use anti- DRM tools
  • 4. What the devil was he doing in that galley? LCP implémentation decided in november 2015, launched in january 2016. Why do we offer our beloved ebooks to the DRM Moloch? - Because public libraries need a better solution than the Adobe DRM - Because for most publishers, unprotected EPUB is a showstopper - Because the spec is almost ready for 2 years - Because we have been donated source code to help
  • 5. Goals of Readium LCP ● Simplicity for the user ● Perfect interoperability in the LCP ecosystem ● No limitation on content accessibility ● Offline access to the documents always possible ● Dynamic update of licenses ● Unlimited access (in time) to the documents ● Family sharing possible ● No centralized server ● Low development costs ● Limited cost of certification
  • 6. LCP - search for a good balance
  • 7. Readium LCP = simplicity Encrypted content Associated decryption key (passphrase) The owner of the passphrase can read the document The App can store the key, so that the user can forget it
  • 8. More details … 1/ encryption + = + Content Key Protected Content
  • 9. 2/ License generation = + + + + + Protected content key Rights Provider certificate Passphrase hint Signature License Personal data Standard rights: start/end datetime, print (# pages), copy (# characters), tts (yes/no)
  • 10. Choose a passphrase A user will usually have one passphrase per bookseller or public library. Must be easy to remember or find. A hint stored in the license by the licensor will help the user when needed. It MUST be clear to the user. In a public library, the user ID can be a good choice. The passphrase will usually be requested only when a protected document is side loaded in a new device.
  • 11. 3/ LCP / EPUB file = + EPUB / LCP License Protected content
  • 12. 4/ Open with a passphrase Hint User Passphrase Signature checking EPUB / LCP Content key Clear content content The passphrase may be acquired automatically and stored in the app without user action. The user will use the hint to “remember” the document passphrase.
  • 13. 5/ Dynamic update of the license ● Early return ● Extended lending ● Requires an online connection ● The licensor can track the number of devices opening the document
  • 14. Readium LCP ecosystem Publisher Distributor Bookseller 1 2 Distributor / Bookseller
  • 15. What is the certification? ● Readium LCP is a DRM ecosystem ● Certification is ○ Guarantee of compliance ○ Guarantee of robustness ○ Guarantee of interoperability ● The specification will be public ● The source code will be open-source (BSD-like) ● But some confidential information will be transferred to the participants to an LCP ecosystem ○ Root certificate (ITU) ○ Provider certificate ○ Readium LCP 1.0 profile information (unavailable in the specification)
  • 16. Compliance rules, Robustness rules ● Client and server side ● Compliance ○ Server app must alert if *many* devices use the same license ○ Client app must develop an anti-rollback clock (details to be defined) ○ etc. ● Robustness ○ A certain data type must be protected against a certain type of attack to a certain extent ■ Client app must obfuscate the decryption process ■ Client app must hide Readium LCP confidential information ■ Client app must securely store user keys ■ Server app must protect the provider private key
  • 17. Agenda Q1 2016: development (iOS, MacOS, Android) Q2 2016: development (iOS, MacOS, Android); first tests; contractual documents; pricing; Q3 2016: interop tests; certificate authority setup Q4 2016: first certifications; launch