• Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
1,055
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
66
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide
  • There is a range of emerging client devices and technologies. Its not only about making your content available to the Windows/PC based environment. If you want to trade digital content then how users access your information is important. For example: A PC might allow file download via HTTP where as a mobile phone might only support WAP. In Japan the mobile phone has overtaken the PC as the primary mode of access to the Internet. There are now 10M Japanese WAP (IMODE) CHECK???? based Internet users. You must be able to protect and manage your content whenever and however users are accessing content. Solutions should be able to package content on ‘the fly’ . This means that that the content can be securely packaged depending on where the content is being delivered to either a PDA, PC or Mobile Phone. It is protected according to the users individual requirements. For example delivering content via a PDF file makes it impossible to deliver via a mobile phone.

Transcript

  • 1. uruli N. LISc Ysore University 2010-11 M
  • 2. Overview of my presentation:
    • Mission
    • Introduction
    • History
    • DRM functional architecture
    • Interested Players in DRM
    • Example of DRM Implementation
    • Laws regarding DRM
    • Controversy of DRM
    • Future of DRM
  • 3. Digital Rights Management
    • Mission : protect rights of digital media producers while enabling access for fair use
      • grant exclusive rights in exchange for disclosure
    • Reality : DRM is just protection technology, and is fast eroding our rights of fair use
      • may never be able to reuse parts of any digital content (documents, film, images, audio, etc.)
      • hinders progress of science and the useful arts
  • 4. Introduction:
    • Digital rights management ( DRM ) is a term for access control technologies that are used by hardware manufacturers, publishers, copyright holders and individuals to limit the use of digital content and devices.
    • The term is used to describe any technology that inhibits uses of digital content that is not desired or intended by the content provider
    • .
    • The term does not generally refer to other forms of copy protection , which can be circumvented without modifying the file or device, such as serial numbers or key files .
  • 5. Conti….
    • It can also refer to restrictions associated with specific instances of digital works or devices. Digital rights management is used by companies such as Sony , Amazon , Apple Inc. , Microsoft , AOL and the BBC .
    • The use of digital rights management is controversial. Proponents argue it is needed by copyright holders to prevent unauthorized duplication of their work, either to maintain artistic integrity [1] or to ensure continued revenue streams
    • DRM technologies attempt to control use of digital media by preventing access, copying or conversion to other formats by end users .
  • 6. Conti…
    • DRM technologies have enabled publishers to enforce access policies that not only disallow copyright infringements , but also prevent lawful fair use of copyrighted works, or even implement use constraints on non-copyrighted works that they distribute
    • DRM is most commonly used by the entertainment industry (e.g., film and recording ). [6] Many online music stores , such as Apple Inc. 's iTunes Store , as well as many e-book publishers have implemented DRM. In recent years, a number of television producers have implemented DRM on consumer electronic devices to control access to the freely-broadcast content of their shows, in response to the rising popularity of time-shifting digital video recorder systems
  • 7. What does an organisation need to consider?
    • Intellectual Property (IP) rights
    • Copyright
    • Payment mechanisms
    • Security
    • E-commerce and ERP systems
    • Licensing…
  • 8. How do customers access your content? Devices & Platforms Package/Protect/Licence Content
  • 9. How should it work? 2 Package with appropriate security 3 Trade with chosen ‘ currency’ 4 Allow the content to be used 1 Take any content
  • 10. History of DRM
    • In the pre-digital era, people's ability to do various things to or with content were limited.
    • The networked digital age makes it possible to do just about anything to digital content, instantaneously and at virtually no cost.
    • While this is a great opportunity for new content business models, it threatens the livelihood of content creators by making rampant piracy possible
    • Also, more and more public and private entities are going digital and doing business online. Information is increasing retrieved through computer networks by customers, employees and partners etc.
  • 11. History of DRM
    • Thus, we see the need for a technology that enables the secure creation, management, distribution and promotion of digital content on the Internet.
    • A very early implementation of DRM was the Software Service System (SSS) devised by the Japanese engineer Ryoichi Mori in 1983.
  • 12. DRM includes:
    • It includes:
      • Persistent Protection: Technology for protecting files via encryption and allowing access to them only after the entity desiring access has had its identity authenticated and its rights to that specific type of access verified
      • Business rights: Capability of associating business rights with a content by contract, e.g. author’s rights to an article or musician’s rights to a song
      • Access tracking : Capability of tracking access to and operations on content
      • Rights licensing : Capability of defining specific rights to content and making them available by contract
  • 13. DRM Functional Architecture
    • IP Asset Creation and Capture Module
      • Rights Validation to ensure content being created includes the rights to do so
      • Rights Creation to allow rights to be assigned to new content
      • Rights Workflow to allow for content to be processed through series of workflow steps
    • IP Asset Management Module
      • Repository functions to enable the access/retrieval of content in potentially distributed databases and the access/retrieval of metadata
      • Trading functions to enable assignment of licenses to parties who have traded agreements for rights over content, including payments from licensees to rights holders (e.g., royalty payments)
    • IP Asset Usage Module
      • Permissions Management to enable usage environment to honor the rights associated with the content, e.g., if user only has the right to view the document, then printing will not be allowed
      • Tracking Management to enable monitoring of usage of content where such tracking is part of the agreed to license conditions, e.g., user has license to play video ten times
  • 14. DRM Functional Architecture  
  • 15. Interested Players in DRM
    • Government Agencies
      • Interested in controlled viewing and sharing of highly secure and confidential documents, audio and video data.
      • “ Need to know basis”
    • Private Corporations
      • Want to limit the sharing of their proprietary information
      • Track accesses and any modifications made to it.
      • E.g. news agencies like Reuters
    • Owners of commercial content
      • Content owners, artists, and publishers want to gain revenue through sale and promotions
      • But are concerned about protecting their copyrighted works from illegal use
  • 16. Interested Players in DRM
    • Intermediaries (service providers, content distributors etc.)
      • Concerned about minimizing costs of providing services
      • Cautious about protecting themselves from lawsuits over illegal distribution
    • Producers of end user equipment (PCs, players, etc.)
      • Concerned about minimizing design and production costs
      • Unwilling to pay for features that only some users need
    • End users
      • Interested in immediate access to desired content
      • Want to use the content conveniently
  • 17. Thus, we see…
    • DRM can help ensure companies, corporations, and other entities who share similar business that:
      • Rights are tracked at ingestion
      • Access is controlled during production processes
      • Protection for the content extends throughout product lifecycles
    • Additionally, DRM can integrate persistent content protection with content management to ensure:
      • Proper business practices
      • Implementation of new business models
      • Compliance with regulatory requirements in industries such as financial services, healthcare, and government
  • 18. An Example of DRM Implementation OzAuthors (An online e-book store) Rights Interface
  • 19. Laws regarding DRM
    • Digital rights management systems have received some international legal backing by implementation of the 1996 WIPO Copyright Treaty (WCT). Article 11 of the Treaty requires nations party to the treaties to enact laws against DRM circumvention.
    • The WCT has been implemented in most member states of the World Intellectual Property Organization .
    • The American implementation is the Digital Millennium Copyright Act (DMCA),
    • while in Europe the treaty has been implemented by the 2001 European directive on copyright , which requires member states of the European Union to implement legal protections for technological prevention measures.
    • In 2006, the lower house of the French parliament adopted such legislation as part of the controversial DADVSI law, but added that protected DRM techniques should be made interoperable, a move which caused widespread controversy in the United States.
  • 20. Controversy
    • Many organizations, prominent individuals, and computer scientists are opposed to DRM.
    • Two notable DRM critics are
    • John Walker , as expressed for instance, in his article The Digital Imprimatur : How big brother and big media can put the Internet genie back in the bottle , and
    • Richard Stallman in his article The Right to Read and in other public statements: "DRM is an example of a malicious feature - a feature designed to hurt the user of the software, and therefore, it's something for which there can never be toleration.
  • 21.
    • Professor Ross Anderson of Cambridge University heads a British organization which opposes DRM and similar efforts in the UK and elsewhere.
    • Cory Doctorow , a prominent writer and technology blogger, spoke on the Microsoft campus criticizing the technology, the morality, and the marketing of DRM.
  • 22. The Future of DRM
    • DRM is emerging as a formidable new challenge, and it is essential for DRM systems to provide interoperable services.
    • Solutions to DRM challenges will enable untold amounts of new content to be made available in safe, open, and trusted environments.
    • The technology can be expected to be heavily used in the future to support digital library collections, code and software development, distance education, and networked collaboration, among other applications.
  • 23. The Future of DRM
    • DRM standardization is occurring in a number of open organizations.
    • The Open EBook Forum [OEBF] and the MPEG group [MPEG] are leading the charge for the eBook and multimedia sectors.
    • The Internet Engineering Task Force [IETF] and the World Wide Web Consortium [W3C] have also commenced work on DRM issues.
    • Their work will be important for the entire DRM sector, and it is also important that all communities be heard during these standardization processes in industry and sector-neutral standards organizations.
  • 24. References
    • “ Integrating Content Management with Digital Rights Manangement”, Bill Rosenblatt and Gail Dykstra, May 14 2003
    • http://www.epic.org/privacy/drm/
    • http://www.dlib.org/dlib/june01/iannella/06iannella.html
    • http://www.eff.org/IP/DRM/
  • 25.  
  • 26.