Presentation is loading. Please wait.

Presentation is loading. Please wait.

William Y. Arms Using Technology to Manage Copyrighted Resources.

Similar presentations


Presentation on theme: "William Y. Arms Using Technology to Manage Copyrighted Resources."— Presentation transcript:

1 William Y. Arms Using Technology to Manage Copyrighted Resources

2 Economic and Social Context 1. The Sony Betamax case The fear: Home video-taping of TV would undermine revenue for film makers. The action: Universal and Disney sued to have video recorders banned. The result: Universal and Disney lost in court... But video rental became big business. The conclusion: New technology creates new markets.

3 Economic and Social Context 2. Copy protection of software for personal computers The fear: Copying of software from diskettes would undermine revenue for publishers. The technology: Copy-protected diskettes. The result: Inconvenience for customers. Who turned to products that were not copy-protected. Today most software is unprotected. The conclusion: Happy customers are essential.

4 Economic and Social Context 3. Economic models for broadcast TV Network broadcast: Open access -- revenue from advertising. Public broadcasting: Open access -- separate funding. Cable television: Restricted access -- payment by subscription. Pay-by-view: Restricted access -- payment by program The conclusion: There are many ways to create markets.

5 Digitized Music on the Internet The fear: Unlicensed distribution of high-fidelity music will undermine revenue for music publishers.

6 Digitized Music on the Internet First attempt: Ban the technology: Music publishers sued to ban Rio. Federal court ruled that Rio is legal. Second attempt: Secure Digital Music Initiative: Formats with copy protection.... but how many customers will like it?

7 Digitized Music on the Internet Nobody knows, what the future holds, but... New technology creates new markets. Happy customers are essential. There are many ways to create markets.

8 User Digital Material Authorization Authentication User Roles Object Attributes Authenticity Laws & Agreements Policy Rules Authoriz'd Access Stated Ops Use Information Manager

9 Authorization Laws & Agreements Policy Rules Information Manager Policy rules determine what operations are authorized

10 Authorization Authentication User Roles User Authorization requires the current user context.

11 Authentication of Users The dilemma of authentication Crude and insecure Address of computer ID and password Expensive and intrusive

12 Digital Material Authorization Object Attributes Authenticity

13 Authorization Authoriz'd Access Stated Ops Use

14 Enforcement Operations Encryption and other security measures may by used to enforce the stated operations. Authorization

15 Technical Needs Technology can support alternative market strategies: Strong enforcement: Emphasis is on strict control by technical means. Subsequent use is barred by technology. Weak enforcement: Emphasis is on customer satisfaction and market growth. Technology augmented by economic and social forces.

16 Secure Container (Cryptolope)

17 Encryption Decryption

18 Encryption in Practice Key management is difficult Single key encryption needs shared private keys. Dual key encryption needs public key infrastructure. One-time keys are good for secure transmission. Government policies are misguided

19 Conclusion The technical challenge of access management: To support the policy rules: Friendly to the customers Inexpensive to administer In conjunction with social, economic, and legal incentives.


Download ppt "William Y. Arms Using Technology to Manage Copyrighted Resources."

Similar presentations


Ads by Google