Copyright and Technology London 2012: Content Identification - Werner Strydom, Irdeto

1,163 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,163
On SlideShare
0
From Embeds
0
Number of Embeds
420
Actions
Shares
0
Downloads
10
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Copyright and Technology London 2012: Content Identification - Werner Strydom, Irdeto

  1. 1. Content Identification The Fight Against Internet Content Redistribution Werner Strydom VP Technology Irdeto 19 July 20122012 © IRDETO | This document contains information that is privileged or confidential
  2. 2. Piracy Is Not A Single Behaviour The Piracy Continuum™ Frustrated Confused Criminals Hackers Casual Pirates Consumers Consumers ConsumersSteal content for Steal content Download Can’t get what Unknowingly Buy contentcommercial gain and distribute it content for they want consume illegal through over the Internet personal use legally content legitimate channels Conditional Software Security Content Detection & Access Hardening Audits Fingerprinting Removal Digital Rights Anti-Piracy Legal Session Based Management Services Support Watermarking 2 2
  3. 3. Skyrocketing Internet Content Redistribution Large Online High-Speed Always-Connected Content Library Broadband Access Devices Linear TV Music VODLive Streaming Games e-Publications Piracy is Control Word Internet Smart Card Redistribution Redistribution Piracy shifting… Piracy Piracy 2012 © IRDETO | This document contains information that is privileged or confidential 3
  4. 4. Requirements for Session-BasedWatermarking Need for A Centralized SolutionSupports deployed devices Easy/Fast to deploy & operateNo special software or hardware Scalable, cost effective and fast forrequired in the client device live and on-demand content Easy to secure and renew Watermarks and technology updateable on server side to stay ahead of piracy 2012 © IRDETO | This document contains information that is privileged or confidential
  5. 5. Effective Management = Solution + Services Trace Identify  Search for and  Track source find unauthorized content Insert Counter Generate and  Collect evidence insert mark  Apply countermeasures  Kill the session if desired Renew  Respond to new threats 2012 © IRDETO | This document contains information that is privileged or confidential 5
  6. 6. THANK YOU! WWW.IRDETO.COM ALL CONTENTS COPYRIGHT 2012 IRDETO B.V.2012 © IRDETO | This document contains information that is privileged or confidential 6

×