Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


09:59 AM
Connect Directly

What's With Mobile DRM?

Without widely accepted standards, mobile DRM faces compatibility, cost, and usage issues and may stifle cool content

Analysts say that the profusion of proprietary digital rights management software now out for wireless and mobile devices will result in myriad problems for the users of such gadgets and could stifle innovation on the content side.

The Open Mobile Alliance (OMA) started to put together a standard specification for vendors and operators in the mobile world in 2004. Some in the industry, however, are unhappy about the licensing terms for the DRM standard. (See GSMA Wants Review of DRM Options.) This opened the gate for a slew of alternative DRM software offerings, argues Harry Wang, DRM analyst at Parks Associates.

"The main issue with mobile DRM is simply that there are too many of them already," says Wang. Industry efforts to push OMA DRM have been stalled, so proprietary ones blossomed in 2005 and early 2006.

"My concern is that without industry standards, proprietary DRM [vendors] will battle each other for marketshare. Those who exit the market will give headaches for consumers who purchased content protected by the losing DRM," Wang adds

Different specifications software means that content bought through one provider may not be transferable to another device, meaning MP3 or video files could be locked into a single phone. "DRM non-interoperability hasn't caused any consumer backlash yet, says Wang. "But in the future it will, as mobile phones become the third major source for consumers to get digital entertainment content, and they want mobile content on their PCs or CE devices, too."

Rob Enderle of the Enderle Group notes that this is already commonplace in the desktop world. "IPod only works with iTunes and visa versa, older devices don't work with new subscription services, and phones are a crap shoot with online music services -- some work many don't. The most popular service, iTunes, is the least compatible."

This kind of proprietary lockdown brings up many questions about who actually owns the downloaded music -- or other files -- on your mobile phone, and what is fair usage. "Will users accept paying for downloads they can only listen to on their devices?" asks analyst Jack Gold of Cold Associates. "This is the dilemma of 'owning the music' versus owning rights to the music on a single device. I don't think most users will accept 'phone only' music downloads."

Particularly, he and Enderle both note that it seems like users are being asked to pay a premium for cell-phone downloads and may even have to buy songs they already own again simply to play them on the phone.

"If the carriers are too restrictive or don't address the ownership and loss/recovery issues, users will not be very happy consumers of the services, and will likely opt for an independent music player that they can control," says Gold.

This may, in fact, be a better option, as Enderle says, it isn't managing content on a phone. "Managing the music on a limited device, lots of music combined with limited storage resources, and managing large files and play lists on a small device can be painful," he says. "Protected music may not come across to the device for a number of reasons, and you could be left searching for songs on the device that never made it there."

Timothy Lee at the public policy organization the Show-Me Institute says that the phone lockdown could have wider implications beyond the inability to hear your favorite tune.

"It stifles the creation of interesting new uses for mobile phones," says Lee. "If it were easier to install custom software on mobile phones, it's likely that people could come up with all sorts of new functionality… [Currently] you're stuck with whatever the cell phone company decides to give you. That has the advantage of simplicity, but I suspect we're missing out on some innovative software as a result."

Lee believes, however, that the operators' closed systems may help them to remain more secure than DRM on the desktop. "Mobile DRM schemes have the big advantage that cell phones tend to run on closed, proprietary networks, so even if you did manage to hack the DRM, there wouldn't be a whole lot you could do with the cracked content."

— Dan Jones, Site Editor, Unstrung

Dan is to hats what Will.I.Am is to ridiculous eyewear. Fedora, trilby, tam-o-shanter -- all have graced the Jones pate during his career as the go-to purveyor of mobile essentials. But hey, Dan is so much more than 4G maps and state-of-the-art headgear. Before joining the ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
The Yellow Brick Road to Risk Management
Andrew Lowe, Senior Information Security Consultant, TalaTek,  11/19/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: He hits the gong anytime he sees someone click on an email link.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-11-26
petl before 1.68, in some configurations, allows resolution of entities in an XML document.
PUBLISHED: 2020-11-26
A heap overflow vulnerability exists within FactoryTalk Linx Version 6.11 and prior. This vulnerability could allow a remote, unauthenticated attacker to send malicious port ranges, which could result in remote code execution.
PUBLISHED: 2020-11-26
A flaw exists in the Ingress/Egress checks routine of FactoryTalk Linx Version 6.11 and prior. This vulnerability could allow a remote, unauthenticated attacker to specifically craft a malicious packet resulting in a denial-of-service condition on the device.
PUBLISHED: 2020-11-26
A heap overflow vulnerability exists within FactoryTalk Linx Version 6.11 and prior. This vulnerability could allow a remote, unauthenticated attacker to send malicious set attribute requests, which could result in the leaking of sensitive information. This information disclosure could lead to the b...
PUBLISHED: 2020-11-26
A flaw was found in the SPICE file transfer protocol. File data from the host system can end up in full or in parts in the client connection of an illegitimate local user in the VM system. Active file transfers from other users could also be interrupted, resulting in a denial of service. The highest...