We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byAlisha Donahue
Modified over 2 years ago
1 THOMSON multimedia 2001 ©24 May 2001 Copy Protection System for Digital Home Networks CPTWG – May 24, 2001
224 May 2001THOMSON multimedia 2001 © First introduction of the SmartRight system Presentation of the SmartRight system’s philosophy / principles characteristics Further technical and business information to be given individually, under NDA Purpose of the presentation
324 May 2001THOMSON multimedia 2001 © A Smart system which: Enforces the rights of digital content providers and distributors Enables new business models for the benefit of content providers, content distributors and consumers Addresses the practice of private use for the consumer Why SmartRight ?
424 May 2001THOMSON multimedia 2001 © Without a home network Content Viewer Conditional Access Clearing House Content Viewer Digital Rights Management Clearing House BroadcastBroadband
524 May 2001THOMSON multimedia 2001 © Content Viewer With a home network Content Viewer BroadcastBroadband Copy Protection Conditional Access Clearing House Digital Rights Management Clearing House Smart Right
624 May 2001THOMSON multimedia 2001 © The SmartRight vision SmartRight
724 May 2001THOMSON multimedia 2001 © SmartRight protected content Privately protected Content SmartRight architecture
824 May 2001THOMSON multimedia 2001 © SmartRight CP modes Three modes of copy protection Copy freely View only A copy cannot be read Similar to never-copy Secure Viewing Environment Copy for my network Viewable only within its Personal Private Network
924 May 2001THOMSON multimedia 2001 © Personal Private Network Set of devices whose cards share a common secret Not limited to a given location Support of mobile devices – No continuous connection required Defines the boundaries of “copy for your network” At any time, a SmartRight device belongs to one Personal Private Network Personal Private Networks cannot interoperate
1024 May 2001THOMSON multimedia 2001 © Main Home Summer Home Personal Private Network Implementing private use practice Neighbor’s Home
1124 May 2001THOMSON multimedia 2001 © SmartRight principles Lessons learned from Conditional Access Content must remain encrypted until rendered Content security must be fully renewable Dedicated to protection of digital home networks Interoperates with any Conditional Access system Interoperates with any Digital Rights Management system Compatible with any bi-directional digital bus Does not require a return channel to a back office Global system deployable in any region of the world
1224 May 2001THOMSON multimedia 2001 © SmartRight characteristics Protects Broadcast content Streamed, or downloaded content Prerecorded content Free-to-air content Imports from and exports to other CP systems DTCP, CPRM, CPPM, DVI-HDCP, watermarking, … Under control of content providers and broadcasters Business model neutral User friendly Minimal card handling
1324 May 2001THOMSON multimedia 2001 © Highlights End to end protection Content never descrambled within personal private network Personal Private Network Permits private use through “copy for your network” Secure Viewing Environment True renewability No obsolete instruments in case of piracy Business model neutral Compatible with other CP systems
1424 May 2001THOMSON multimedia 2001 © Next steps SmartRight is an open initiative proposed to any interested party A SmartRight Association will be created to deal with system management A SmartRight Licensing Administration will be created to deal with essential IP management Further details will be given at the next CPTWG
1524 May 2001THOMSON multimedia 2001 © SmartRight planning CPTWG - July More technical details More information on SmartRight Association and Licensing Administration End 2001 SmartRight prototype
1624 May 2001THOMSON multimedia 2001 © Contact names Al BAKER Eric DIEHL Solen JABOULET Olivier LAFAYE
17 THOMSON multimedia 2001 ©24 May 2001 Thank you for your attention This document is for background informational purposes only. Some points may, for example, be simplified. No guarantees, implied or otherwise, are intended
Services Course Windows Live SkyDrive Participant Guide.
Forestwood Middle School LISD’s 1:X Initiative Arrives.
An Introduction to Object Modeling An Introduction to Object Modeling The approach of using object modeling during systems analysis and design is called.
© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 1 Addressing “The BYOD Gap” Richard Absalom, Analyst, Consumer Impact Technology.
Welcome to the EIFL-Licensing webinar Introduction to the EIFL Model Licences Emanuella Giavarra, Legal Adviser to EIFL The first webinar in a three-part.
CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
© SafeNet Confidential and Proprietary Administering SafeNet StorageSecure Smart Card Module 3: Lesson 5 SafeNet StorageSecure Storage Security Course.
MPEG-21 Multimedia Framework Dwight Borses MTS FAE SW Region OCCS Nov 25, 2002.
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
1 Switchover from Analogue to Digital Terrestrial Television Broadcasting in Central and Eastern Europe Case Study of Poland Péter Vári Belgrade, 28th.
ICT Environment: Internet Architecture, Growth, Governance and Security Overview EACO ICT Conference on Broadband Access for All.
The Dirty Little Secret of the Internet Jothy Rosenberg Chief Technology Officer & Co-founder November 2001.
Introduction to Web Bill of Lading Q Proprietary and Confidential Copyright © 2005 INTTRA Inc. 2 Agenda Industry Challenges INTTRA Solution Value.
The following 10 questions test your knowledge of client site assignment in Configuration Manager Configuration Manager 2007 Client Site Assignment.
Services Course Outlook Live Participant Guide.
National Safety Compliance, Inc. …because safety is never an accident… Presentation works best if displayed on a computer with an active internet connection.
Objectives Audience: This deck has been fully scripted and is intended to educate Microsoft partners on opportunities to sell Microsoft Exchange to small.
Making the Connection…. Mapping standards for rights management in the Multimedia Framework Keith Hill MCPS-PRS Alliance 1st November, 1999.
Microsoft and Community Tour 2011 – Infrastrutture in evoluzione Planning, Deploying and Managing a Microsoft VDI Infrastructure Level Advanced.
1 Blackboard Sales Presentation. 2 Agenda Introduction –The Company and the Community Why Blackboard –Product Strategy What Blackboard Provides –Product.
Technologies for IPR and data protection Theodore S. Papatheodorou & Dimitris K. Tsolis (University of Patras) Vito Cappellini & Alessandro Piva (University.
1 A Cloud Reference Framework … for discussion only … Please send comments and suggestions to Bhumip Khasnabish Friday,
18 November 2009 Dianna Knauss Virtual Desktop Technical Program Manager.
Doc.: IEEE /0635r0 Submission July 2005 Andrew Myles, CiscoSlide 1 Wireless WG response to proposed 802.1AM PAR & 5 criteria Notice:
PSC – Confidential – All Rights Reserved Tony Bates Mobile Payment Security The Good, the Bad and the Ugly.
Convergence of IPTV and Mobile TV Julien Maisonneuve July 2008.
Introducing Xerox ® Mobile Print Solution and Xerox ® Mobile Print Cloud An overview of the Xerox on-site mobile print solution and Xerox cloud based mobile.
Introduction to the Summary Care Record (SCR) GP Module SCR Concept Training GP Module Self Run v
Universal Access Policies ITU-WTO Workshop on Telecom & ICT Regulation Relating to WTO Obligations and Commitments 1-7 December 2004 WTO, Geneva Presented.
© 2016 SlidePlayer.com Inc. All rights reserved.