Digital Rights Management © Knowledge Books & Software, 2012.

Slides:



Advertisements
Similar presentations
E-resources Collection Management Anna Grigson E-resources Manager.
Advertisements

Introduction to Web Bill of Lading Q Proprietary and Confidential Copyright © 2005 INTTRA Inc. 2 Agenda Industry Challenges INTTRA Solution Value.
Context & Dataflow Diagrams.
CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
HINARI: Introductory Overview (DO’s and DON’Ts of HINARI)
10 Top Tips for Getting the Most out of HINARI
HINARI – Accessing Articles: Problems and Solutions.
HINARI Introductory Overview (DOs and DONTs of HINARI)
NIMAC 2.0: The Accessible Media Producer Portal NIMAC 2.0 for AMPs.
Do the anti-circumvention provisions of the Digital Millennium Copyright (DMCA) Act further or harm public interests?
Click to Begin Part of the IEEE IPR Tutorial Series.
Computer Technology Timpview High School. A collection of local, regional, national, and international computer networks that are linked together to exchange.
Online Learning and the Laptop Initiative Hidden Valley High School Roanoke County Public Schools 2006.
Copyright 2004 AEShareNet Ltd Unlocking IP VATL July 2004.
DRM: Digital Rights Management DRM: Digital Rights Management IDPF: International Digital Publishing Forum IDPF: International Digital Publishing Forum.
Copyright and Moodle Tony Simmonds Information Services June 2012.
Digital Rights Management © Knowledge Books & Software, 2012.
A 21 st Century Solution For 21 st Century Publishers.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Online resources in TCD Library:
Offsite Backups. The purpose of this Startup Guide is to familiarize you with Own Web Now's Offsite Backup offering and show you how to purchase, deploy.
The Concept and Advantages of Creating an eBook Business Presented by Milt Zee SCORE Chapter 476 Staten Island, NY.
Introduction to HASP ® Software DRM Solutions, Products, Benefits All Rights Reserved © Aladdin Knowledge Systems.
Introductory Meeting. Why are we here? RIP FrontPage Versions prior to 2003 will not work with Windows7 No longer supported by Microsoft You can still.
Website From Open and Closed Source to Managing Your Institutional Knowledge with a Content Management System, (CMS) Upside Down.
Rich Foley - Executive Vice President Academic & Public Markets Helen Wilbur - Vice President Consortia Sales & Marketing Digital ArchivesResearch CollectionseBooks.
E-books, E-audio, and Other E-content Instructor: Anthony Costa An Infopeople Workshop Fall 2006.
Not only Safe but Competitive Presentation to Copy Protection Technical Working Group October 22, 2003 Far East Engineering Corp, Tokyo Japan Makoto Saito/Rie.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
EED 502: UNIT A MULTI MEDIA TOUR.
Marshall University Electronic Theses & Dissertations Program Implementation Issues & Responsibilities.
Adding Genes This presentation gives a quick overview on how to add Genes to Osprey.
Section 2 Software.
Electronic Commerce Semester 2 Term 2 Lecture 8. Digital Copyrights & Electronic Publishing Intellectual property rights (copyrights, trademarks, and.
Chapter 3.  The characteristics and purpose of: ◦ Intranets ◦ Internet ◦ Extranets.
B O N N E V I L L E P O W E R A D M I N I S T R A T I O N BPA Energy Efficiency Marketing Portal Training Instructions for adding images and changing graphics.
Library Card/ Number Computer or mobile device A need to read!
Getting Started with E-Books: Kobo.  Introductions  How do library e-books work?  Demo of process  How to get help  Questions?  Please fill out.
Turnitin is an application that helps support the development of your skills in preparing written assignments.
Author: Victor Rosenberg, 2010 License: Unless otherwise noted, this material is made available under the terms of the Creative Commons Attribution 3.0.
ادارة الوثائق الالكترونية Naji Shukri Alzaza University of Palestine April 2010.
Developing Policy and Procedure Management System إعداد برنامج سياسات وإجراءات العمل 8 Safar February 2007 HERA GENERAL HOSPITAL.
Adobe Dreamweaver CS3 Revealed CHAPTER SIX: MANAGING A WEB SERVER AND FILES.
Changing Databases This presentation gives a quick overview on how to change databases in Osprey.
DIGITAL SIGNATURE.
Journals can be accessed by title from an alphabetical list. For this exercise, click on ‘L’ from the A-Z list. Note: there also is a View complete list.
The Choices Program curriculum units and the contents of the electronic versions are copyrighted— 1989-present. These copyright protections extend to all.
COM: 111 Introduction to Computer Applications Department of Information & Communication Technology Panayiotis Christodoulou.
© Ciena Confidential and Proprietary Keycode Manager Welcome Kit - MEN Network Management Licenses Elisabeth Roy January 31st, 2011 V1.0.
Make HTML5 Magazine from PDF/Photos/Office Files.
UNCLASSIFIED Matthew Bruce, Senior Solutions Consultant, Adobe Using Logic, Strategy, and DRM to Protect and Manage Content.
HINARI Introductory Overview (DO’s and DON’Ts of HINARI)
CACI Proprietary Information | Date 1 PD² SR13 Client Upgrade Name: Semarria Rosemond Title: Systems Analyst, Lead Date: December 8, 2011.
EVALUATING WEB SITES AND SOURCES. Knowledge is Empowerment Today’s objective is to learn how to be critical with each resource you use in your literature.
01 OPTIONS 01 OPTIONS Lorem Ipsum In play mode, click the image in the tab to the left. This will load the slide for the option clicked. Be sure to edit.
Your data, protected and under control wherever they go SealPath Enterprise – IRM
EIFL Licensing Training 2: EIFL LICENCE AGREEMENTS
Access Problems and Solutions for Full-text Articles or E-books
How to use Library Kindle Books
How to use Library Kindle Books
A Gift of Fire Third edition Sara Baase
EBSCO eBooks.
COPYRIGHT A Melbourne Athenaeum Library Cybersafety Information Guide
Copyright, Designs and Patents Act 1988
EIFL-Licensing webinars on the
Adding signatures to outgoing in Webmail and Microsoft Outlook
Computer Concepts Module 3
Presentation transcript:

Digital Rights Management © Knowledge Books & Software, 2012

Introduction DRM of digital content is now the difference between being in library services or not! If you don’t want to be paying impossibly high margins to I-Tunes, Adobe DRM or Amazon – consider your options! We have the inexpensive and effective solution for school and academic libraries! Annual service fee or user pays – whatever you want! Authentik™ patented solutions that works like an ‘app’ – it is a stand-alone program with a viewer and database. It is central server controlled and can be distributed by your , fixed media or library circulation software.

Contents Webstore – 1, 2 Who Uses DRM? How Does It Work? 1-2 Publishers Business Government Security? Process Technology

Library content setup 1

Library Lending 2

Who Uses DRM? Student texts and libraries Lecturers, educators, trainers and teachers Publishers to secure distribution of digital content Libraries to circulate their digital content securely Government departments wanting limited time usage and ability to release edition changes rapidly Businesses for securing the transfer of confidential information Legal entities and the Courts for document distribution

How Does It Work? How many users? How many views? Which users? How long can they access content?

How Does It Work? 2

user Content Website DRM RAW Content DRM Content Borrow Purchase process

How Does It Work? 2 user DRM Check license every view Library DRM Content Viewing process user Check license every view

Digital Libraries – Licence Controls Defined distribution of digital content:- Control the number of views! Control the time from one day to unlimited Control the number of users Control which users Report on the specific device used Files can be updated – read edition and edit controls

OOOOPs! OMG! Typos!!!! 1 “This contract shall be effective as of the singing of this agreement.” “He used his wench to pull his truck out of the ditch.” “I know judo, karate, jujitsu and other forms of marital arts.” “Sign up now for our Beauty and Fitness Curse.” “We practice an esoteric form of transcendental medication.” Source: faculty.winthrop.edu/kosterj/WRIT465/samples/typos.htmfaculty.winthrop.edu/kosterj/WRIT465/samples/typos.htm In the case of a publisher – there can be small edits or new editions – this can be managed via Authentik! In the case of discussion papers/draft policies/ research papers with new additions – the convenor may want to update the information often resulting in the master document changing rapidly – to keep all reviewers current! Read on about Edition Management = PTO

Edition Management Version/Edition updates via the web server Version updates can be made ‘voluntary’ ie. ‘please click to update your edition!’ OR Version updates can be made ‘compulsory’ in that the file opens and is updated otherwise it does not open. No limit to updates and works similar to Windows updates – background without downtime.

Library Services Legal and Court entities distributing secure documents Teachers and Academics sending DRAFT information for discussion with a time limit to view Secure use by specific users = students for a specific subject Intellectual property being transferred to a nominated user – plans, documents, and images = student usage Secret and confidential reports = named users

School Document Management Draft ‘Green’ papers – time limit on usage Editing of distributed documents on the fly – so files can be updated continually Distributing ‘White’ papers Lending content and licensing intellectual property in the form of documents and images Stop information theft and misuse! Whole of school reporting on document usage and controls

Is It Secure from Piracy?

Everything is Hackable! It is possible to hack into a bank, the FBI, the Pentagon and so on! Time and the content reward are inextricably linked-hacker’s glory! Achieving celebrity by hacking a text? OCR and screen grabs copying -our proprietary technologies have taken care of this with ‘watermarking’! See figure!

Security Layers Content and code encrypted with AES/256 Polymorphic code generation, code is randomly generated prohibiting signature matching – patented Obfuscation technologies – patented Adaptive code generation changes over time - patented If one executable is reverse engineered the rest are still protected All usage continually monitored Licenses can be revoked or modified anytime at the central server

Secure for libraries Digital distribution via web, cd rom, portal etc. Instant usage reporting Live ‘on the fly’ edits and changes to a million users or more! ‘App type updates’ Network Educational Australia or Knowledge Books & Software at Contact person: Rob Watts p f Conclusion