Copyright and Technology London 2012: Content Identification - Werner Strydom, Irdeto
Upcoming SlideShare
Loading in...5
×
 

Copyright and Technology London 2012: Content Identification - Werner Strydom, Irdeto

on

  • 856 views

 

Statistics

Views

Total Views
856
Views on SlideShare
527
Embed Views
329

Actions

Likes
0
Downloads
5
Comments
0

3 Embeds 329

http://copyrightandtechnology.com 326
http://www.google.com 2
http://36ohk6dgmcd1n-c.c.yom.mail.yahoo.net 1

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Copyright and Technology London 2012: Content Identification - Werner Strydom, Irdeto Copyright and Technology London 2012: Content Identification - Werner Strydom, Irdeto Presentation Transcript

    • Content Identification The Fight Against Internet Content Redistribution Werner Strydom VP Technology Irdeto 19 July 20122012 © IRDETO | This document contains information that is privileged or confidential
    • Piracy Is Not A Single Behaviour The Piracy Continuum™ Frustrated Confused Criminals Hackers Casual Pirates Consumers Consumers ConsumersSteal content for Steal content Download Can’t get what Unknowingly Buy contentcommercial gain and distribute it content for they want consume illegal through over the Internet personal use legally content legitimate channels Conditional Software Security Content Detection & Access Hardening Audits Fingerprinting Removal Digital Rights Anti-Piracy Legal Session Based Management Services Support Watermarking 2 2
    • Skyrocketing Internet Content Redistribution Large Online High-Speed Always-Connected Content Library Broadband Access Devices Linear TV Music VODLive Streaming Games e-Publications Piracy is Control Word Internet Smart Card Redistribution Redistribution Piracy shifting… Piracy Piracy 2012 © IRDETO | This document contains information that is privileged or confidential 3
    • Requirements for Session-BasedWatermarking Need for A Centralized SolutionSupports deployed devices Easy/Fast to deploy & operateNo special software or hardware Scalable, cost effective and fast forrequired in the client device live and on-demand content Easy to secure and renew Watermarks and technology updateable on server side to stay ahead of piracy 2012 © IRDETO | This document contains information that is privileged or confidential
    • Effective Management = Solution + Services Trace Identify  Search for and  Track source find unauthorized content Insert Counter Generate and  Collect evidence insert mark  Apply countermeasures  Kill the session if desired Renew  Respond to new threats 2012 © IRDETO | This document contains information that is privileged or confidential 5
    • THANK YOU! WWW.IRDETO.COM ALL CONTENTS COPYRIGHT 2012 IRDETO B.V.2012 © IRDETO | This document contains information that is privileged or confidential 6