Donald M. Whiteside Vice President, Corporate Technology Group Director, Technical Policy and Standards ITU and EBU Presentation A perspective on trends.

Slides:



Advertisements
Similar presentations
ContentGuard An Intellectual Property Company IPED Conference November 1, 2007 Presented By Eddie Chen CONTENTGUARD.
Advertisements

SOS Interoperability III: Standards, Open standards and Interoperability ETSI, Sophia Antipolis 20 February 2006 How OSS can/will/should impact standardization?
CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 © 2010 Cisco and/or its affiliates. All rights reserved. 1 BYOD: Security, Policy.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
ACCESS 2003 November 11, 2003 Spencer Gusick VP Intellectual Property Counsel Universal Studios If you build it, they will come… Delivery of Content to.
T O P I C ST O P I C S Uses of Technical Measures Case Studies and Types of Technical Measures The Problem of Hacking and Circumvention Online Music Distribution.
© 2000 Verance Corporation Verance Audio Watermarking Technologies for Protection of Digital Audio and Video Joseph M. Winograd, Ph.D. Verance Corporation.
1 Jeremy Wyant W3C DRM Workshop 23 January 2001 Establishing Security Requirements For DRM Enabled Systems.
William Y. Arms Using Technology to Manage Copyrighted Resources.
CONTENT PROTECTION AND DIGITAL RIGHTS MANAGMENT
C opyright Protection and Digital Rights Management 1.
Windows Media DRM Device Ecosystem For Windows Vista Milan Gada – Program Manager Kevin Lau – Program Manager Windows Media (Content Access Technologies)
Electronic Customer Portal System. Reducing Risks – Increasing Efficiency – Lowering Costs Secure Internet based Communication Gateway direct to your.
Open Cloud Sunil Kumar Balaganchi Thammaiah Internet and Web Systems 2, Spring 2012 Department of Computer Science University of Massachusetts Lowell.
4K CONTENT PLAN Sony Pictures Technologies. Consumer Offering Broadcast (Over the air, cable, satellite, IPTV) Premium Content (Movies, episodic TV) Premium.
Introduction to HASP ® Software DRM Solutions, Products, Benefits All Rights Reserved © Aladdin Knowledge Systems.
Advanced Access Content System (AACS) Industry Briefing July 14, 2004.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Not only Safe but Competitive Presentation to Copy Protection Technical Working Group October 22, 2003 Far East Engineering Corp, Tokyo Japan Makoto Saito/Rie.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Copyright © 2001 Espial Group Inc. All rights reserved. Evolution of the Pervasive Internet Ella Mar VP Operations Dilshan De Silva Director, Product Development.
Matthew Rothmeyer. Digital Rights Management (DRM) “ A class of technologies that are used by hardware manufacturers, publishers, copyright holders, and.
Introducing Digital Rights Management Willms Buhse October 2002, Vilnius.
IMA - Digital Libraries February 13, 2001 Slide 1 Multimedia Security: Is Their Hope In Securing Our Digital Future? Edward J. Delp Purdue University School.
Deepak Maheshwari Director – Corporate Affairs Microsoft India.
ENHANCED CONTENT PROTECTION OVERVIEW. Security Solution Characteristics Comprehensive security ecosystem All devices meet the same standard – No assumption.
Module 3: Business Information Systems Chapter 8: Electronic and Mobile Commerce.
Presentation Software as a Service Applications Software-as-a-Service Partner Enablement Program Enabling ‘Software as a Service’
Electronic Commerce Semester 2 Term 2 Lecture 8. Digital Copyrights & Electronic Publishing Intellectual property rights (copyrights, trademarks, and.
Digital Content Protection Overview April 26, 2002.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
SmartRight™ 1 THOMSON multimedia 2001 ©11 july 2001 Copy Protection System for Digital Home Networks CPTWG – July 11, 2001.
Media Center and OTT. 10 years ago Now Offerings Spectrum: PPV, Pay TV, Basic cable, Free to air IP: VOD, SVOD, FVOD, AVOD Windows: early window, home.
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Copyright Frost & Sullivan Mobile Digital Rights Management: Managing Rights, Managing Revenues Interactive Analyst Briefing Allison Webb 12 March 2003.
Fair Use By Design or By Law? Stefan Bechtold Stanford Law School / University of Tübingen, Germany April 16, 2002.
Delivering Video over IP
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
, Josef NollNISnet NISnet meeting Mobile Applied Trusted Computing Josef Noll,
Chapter Six Maintaining a Computer Part II: Installing, Repairing, and Removing Applications.
DRM: Technology overview Keunwoo Lee CSE 590 SO 19 April 2005.
1 Analysis of Consumer Issues and Paths for Concrete Approaches Dr. Carsten Orwat Forschungszentrum Karlsruhe in the Helmholtz Association, Institute for.
Software Industry Issues Mark Lange Microsoft EMEA March 1, 2005.
Sony Pictures Confidential Watermarking in AACS. Sony Pictures Confidential SPE Forensic Watermarking Goals Goals: – Identify the device that was compromised.
International Telecommunication Union ITU-T Workshop on Home Networking and Home Services Tokyo, Japan, June 2004 Home Networking U.S. Cable Perspective.
Copyrights on the internet vincent yee. Digital Millennium Copyright Act October 28, 1998, President Clinton signed the Act into law.
HASP ® SRM Enabling Business Growth through Software Rights Management All Rights Reserved © 2007 Aladdin Knowledge Systems. Yariv Drory International.
Digital Audio. Analog versus Digital Analog Sound waves “similar” or “copy” Electrical impedance creates noise Digital Sound encoded in binary form Sampled.
CPTWG Jan05© Copyright SVP1 Secure Video Processor Eli Hibshoosh Open Platform for Content Protection.
CSE 303 Concepts and Tools for Software Development Richard C. Davis UW CSE – 11/29/2006 Social Implications Discussion 4 – Digital Rights Management.
Digital Rights Management for Mobiles Jani Suomalainen Research Seminar on Telecommunications Business II Telecommunications Software and Multimedia Laboratory.
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
Sharing makes life beautiful ARKUDA STB SOLUTION.
Information Rules: A Strategic Guide to the Network Economy The Information Economy Carl Shapiro Hal R. Varian.
The Digital Media Project1 Leonardo Chiariglione.
Web bugs are tiny graphic files embedded in messages and Web pages that are designed to monitor who is reading the message or Web page and.
What is DRM? Digital Rights Management is: –From Richard Stallman, President of the FSF: ”The motive for DRM schemes is to increase profits for those.
Content Protection: Extending content protection into the home and personal environment TODAY Jeff Lawrence Director, Global Content Policy Intel Corporation.
Joint CIO Council and HR Deans & Directors Meeting
4k Content Delivery Sony Pictures Technologies.
PREPARED BY: RUMMY MIRANDA
William Hackett & Co. Solicitors
4K Content protection overview
Software Interoperability.... Same game, same rules?
Presentation transcript:

Donald M. Whiteside Vice President, Corporate Technology Group Director, Technical Policy and Standards ITU and EBU Presentation A perspective on trends and policy challenges in the digital content delivery environment

Intel’s Policy Perspective Our Content Policy – a Balancing act Respect for Intellectual Property, Rights Holders and Consumers A Reasonably Protected Digital Environment is Necessary Infrastructure For Digital Future Protected Digital Environment Should Provide Consumers Flexibility, Portability and Choice Markets, Not Mandates, Stimulate Innovation and Deliver Consumer Value Copy LEFT Copy RIGHT Content should be FREE Content should be reasonably PROTECTED Content is Property Content should not be protected Balancing public/private Interests

Basic Content Protection Security Tools Technology is Basic Tool Content distributed in encrypted form. Technology and “keys” are licensing “hook”. License Agreements create Root of Trust and govern Products Decryption keys subject to license; license sets out rules for products/manufacturers. Copyright Laws (DMCA, EUCD) target Pirates Neither License Nor Technology works against Pirates. Casual copier Hobbyist Hacker Small scale pirate Professional pirate Effectiveness of Specific Tools Technology Licensing Laws

Vision:... voice, video- and data-streams can be exchanged seamlessly on all-digital networks, competition between delivery platforms will intensify. Portable Playback (protected by Portable DRM) Broadcast (protected by CA) (Web) Internet Internet Content (protected by DRM) Optical (protected by DRM) Personal content Optical Copies (protected by AACS, CPRM, CSS) Streaming Content (protected by DTCP-IP) Vision assumes consumer choice, flexibility and portability based on interoperability

Standardizing technology will not standardize business models IT : Generally, wants access to all services with one/all devices Content Providers Interoperability Challenge: Competing Interests and Business Models Governments, Regulators and Courts Regulators and Courts Service Providers Proprietary Model XProprietary Model X Consumers: w ant choice, flexibility and portability: access to all services with one/all devices Service Providers Proprietary Model BProprietary Model B Service Providers Proprietary Model DProprietary Model D Service Providers Proprietary Model AProprietary Model A Service Providers Proprietary Model EProprietary Model E Service Providers Proprietary Model CProprietary Model C CE: Mixed interests, many business models Can laws compel interoperability?

Multiple Services on Common Platforms Maximize Consumer Choice and Leverage Volume Manufacturing Computing Platform Service Some Key Policy Challenges Service: How to bring proprietary verticals to common platforms? Standard Security: Consumer is “not” trusted from service perspective; Need for common robustness and compliance? Need for common robustness and compliance? Service/Content Protection: Protection, Consumer policing Privacy and Consumer Notice: Device control, personal information, Personal & premium content Internet ecosystem Open environment Premium content Service provider ecosystem Closed environment Standards Based Security* Open Platform PC Service Security (e.g. STB)

Security Challenges: Security Goals: Keep “Honest People Honest” “Reasonable Protection” Perfect systems not possible/necessary (CSS) Commercial Viability is Key Technology Challenge: Cost-Effective End to End Systems Many security standards assume user is trusted Low Cost Technology Licenses Hardware and/or Software, PC and/or CE Implementation OK Reasonable System Resources Reasonable Implementation Costs Trends: –Increasing security requirements creating a bidding war –Bidding wars lead to proprietary HW and gate maximum choice

Use Technology to Enable a Protected and Productive Digital Market. “Protecting Content” Content is encrypted Consumer buys and “opts in” Devices maintain protection of the specific content. Examples: DVD Content MSDRM Sourced Content Cable/Satellite Content AACS Content “Policing Consumer” Consumer gets clear content No consumer “opt in”, BUT Device looks for an invisible mark and won’t play content anyway Examples: DVRA/Holling: Screen CGMSD SCD: “Spy-ware” limits coping DVD: Audio Watermark? AACS: Audio Watermark Use Technology to Police Consumer in Home and Internet. What Notice is adequate? Privacy and Consumer Notice

Use technology to track escaped content back to licensed distributors “Tracking” Content marked at distribution Mark identifies the distributor Mark is invisible to consumers Escaped Content traced back to distributor Examples: “United” mark on airline content “Policing” Invisible mark inserted into content in consumer device Mark is invisible to consumer Mark identifies consumers Escaped Content forensically traced to consumer Examples: CableSTB adds consumer ID Purchased audio file contains purchaser’s address Use Technology to Police Consumer in Home and Internet. What notice is good enough? Consumer Notice and Privacy

Levies, Private Copies and Market Dynamics Markets function best when consumers with full information pay directly at the point of sale for all rights associated with specific goods and services. Levies undermine market principles and emphasize importance of information and notice. -What rights do I get, express and implied? -What is my total cost, direct and indirect? -What technical limitations What is the role of government? Private parties?