Presentation is loading. Please wait.

Presentation is loading. Please wait.

C opyright Protection and Digital Rights Management 1.

Similar presentations


Presentation on theme: "C opyright Protection and Digital Rights Management 1."— Presentation transcript:

1 C opyright Protection and Digital Rights Management 1

2 Copyright protection  A form of intellectual property rights law that protect original works of ownership.  Does not protect ideas, facts, parodies.  Registration done by the Library of congress for $30. Commercial companies offer legal help for $20-$200  Certification can be done on-line (Active for life span of author plus 45 years) 2

3 Loopholes to copyright protection  Fair use laws  Regional jurisdictions  Enforcement mechanisms  Technological changes and better software  Social media and cultural norms. 3

4 Digital Rights Management  Collection of systems used to protect the copyrights of electronic media. Apple iTunes uses it to limit access to songs.  Ensures Publishers of rightful revenue for their work Longer shelf life Easy access to digital files and storage. Technological advances in the Internet streaming and quality videos. 4

5 Digital Rights Management  Useful in trading, controlling and tracking digital media.  Limits the illegal Propagation of Copyright material.  Uses watermarks or Propriety file encryption to restrict access to files. Setting servers to block forwarding message Software in DVDs to limit number of copies to 2 Music labels include bits of information that confuses ripping software 5

6 DRM systems  Wipo laws and Digital Millennium Act  Watermarks And Encryption logarithm Watermarks found in broadcasts and DVR operation  Encryption system is a content scrambling system(CSS)  A decryption key or processing key is needed Limits access and recording or playback.  Microsoft uses the PVP(proven video path) drm that can encrypt information to the monitor.  All models of a particular brand have shared decryption key. 6

7 HD/Blue ray Systems Use the Advanced access content system(AACS) Major companies united to control optical and HD file sharing  Major difference with CSS is in the way decryption keys are organized.  Advanced systems use a binary tree structure. Processing key, volume id, decryption key and device key all needed to operate. 7

8 Copyright Protection/DRM Trends  Increased Internet software (strip copy software) to decrypt DRMs.  Social and cultural norms about copyright.  Inability to regulate the Internet.  Critics complain about competitive laws.  Ownership and how to control digital data. 8


Download ppt "C opyright Protection and Digital Rights Management 1."

Similar presentations


Ads by Google