The Digital Battery From: Budd, T.A. "Protecting and Managing Electronic Content with a Digital Battery". IEEE Computer (2001) 2-8. Steve Lord.

Slides:



Advertisements
Similar presentations
Do the anti-circumvention provisions of the Digital Millennium Copyright (DMCA) Act further or harm public interests?
Advertisements

Wireless network security Lt. Robert Drmola, University of defence, Communication and information system department.
Confidential 1 Corporate Research © THOMSON multimedia, 1999 Mixing cryptography and watermarking for copy protection in consumer electronic devices FURON.
Passwords suck Nico Smit November “The million passwords dilemma:”  Just like having a million keys suck, so also having a million usernames and.
Superdistribution --- The Concept and the Architecture Ryoichi Mori and Masaji Kawahara presented by Ping Xu 1. Introduction to Superdistribution 2. Protect.
Blue Spike © 2001 Blue Spike, Inc. - 1 Copyright Protection? What are the technologies which can address copyright management in a world of digital copies?
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Cryptography 101 How is data actually secured. RSA Public Key Encryption RSA – names after the inventors –Rivest, Shamir, and Adleman Basic Idea: Your.
Written By KEVIN J. O’BRIEN Published: December 28, 2009 By The New York Times A Report by Michael Abdullah.
Computers in Society Encryption. Shameless Plug Catch the kayak club trip to Glenwood on Saturday. Fun!
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
1 DVD Copyright Management Schemes Tanveer Alam CVN.
CYBER CRIME AND SECURITY TRENDS
Encryption Methods By: Michael A. Scott
Electronic Customer Portal System. Reducing Risks – Increasing Efficiency – Lowering Costs Secure Internet based Communication Gateway direct to your.
DVD Decryption What happened and is it ethical?. DVD CSS n The purpose of encrypting data on DVD. n The CSS Security Model. n How that security model.
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Advanced Access Content System (AACS) Industry Briefing July 14, 2004.
Fine-Grained Access Control (FGAC) in the Cloud Robert Barton.
Matthew Rothmeyer. Digital Rights Management (DRM) “ A class of technologies that are used by hardware manufacturers, publishers, copyright holders, and.
BUSINESS B1 Information Security.
Defining Computer Security cybertechnology security can be thought of in terms of various counter measures: (i) unauthorized access to systems (ii) alteration.
Policy-Induced Computer Science Problems? Background for NYU Public Design Workshop Fred B. Schneider Department of Computer Science Cornell University.
Computer Ethics.
DRM Building Blocks - Protecting and Tracking Content Adopted from Chapter 5, Digital Rights Management Business and Technology.
Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Digital Inheritance of Personal and Commercial Content Using DRM H. Li, NXP Research M. Petkovic, Philips Research CCNC’07 DRM workshop, Jan
ECE Lecture 1 Security Services.
Public-Key Cryptography CS110 Fall Conventional Encryption.
A Growing Threat Debbie Russ 1/28/2015. What is Ransomware? A type of malware which restricts access to the computer system that it infects, and demands.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
CSCI EXTRA CREDIT ASSIGNMENT ASHLEY R. BROADNAX TUESDAY 3:30 CLASS MARCH 11, 2008.
LWDRM (Lightweight Digital Rights Management) Information Science and Technology Master 1 st Yuuki Horita.
1 Number Theory and Advanced Cryptography 6. Digital Signature Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography.
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, databases and websites. Data.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Pairing Based Cryptography Standards Terence Spies VP Engineering Voltage Security
By Hani AlQaffas.  Cryptography is a technique used to hide the meaning of a message and is derived from the Greek word kryptos (hidden).  This is different.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
ISO/IEC 27001:2013 Annex A.8 Asset management
When DRM Meets Restricted Multicast A Content Encryption Key Scheme for Restricted Multicast and DRM Min FENG and Bin ZHU Microsoft Research Asia.
Digital Battery A Portable System to Gather Statistical Utilization Information for Digital Media without Compromising Consumer Anonymity Timothy A. Budd.
Woodland Hills School District Computer Network Acceptable Use Policy.
Paper On Cryptography CS300 Technical Paper Review Avinash Chambhare Abdus Samad.
HOW SECURE IS CLOUD COMPUTING? Michael Becker. Summary  This article is about the security flaws and our growing dependence on cloud computing such as.
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
[FUNCTIONALITY AND SAFETY OF A MODERN TECHNOLOGY] [CLOUD COMPUTING FOR INDIVIDUAL CONSUMERS]
PRESENTED BY Raju. What is information security?  Information security is the process of protecting information. It protects its availability, privacy.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
ICT II Unit 6 Networking.
Symmetric and Asymmetric Encryption
Hardware Protection Against Software Piracy
A Gift of Fire Third edition Sara Baase
B. R. Chandavarkar CSE Dept., NITK Surathkal
Big Numbers: Mathematics and Internet Commerce
Protecting and Managing Electronic Content using Digital Battery
COMPUTER PRIVACY.
Get Solution at Trezor Support Phone Number
PREPARED BY: RUMMY MIRANDA
Digital Rights Management (DRM)
Cryptography and Security Fall 2009 Steve Lai
Presentation transcript:

The Digital Battery From: Budd, T.A. "Protecting and Managing Electronic Content with a Digital Battery". IEEE Computer (2001) 2-8. Steve Lord

Budd proposes that all electronic entertainment, such as music and video should be encrypted. Users would pay for a digital battery that decodes the content, rather than paying for the content itself. Summary

Good things about this paper Addresses a serious problem for content providers Criticisms of this paper Never been practically implemented Short on technical details

The problem: Budd says that unauthorized copying of digital media is destroying the entertainment industry

According to Budd, two Solutions: Try to prevent people from making copies OR Monitor when the product is being used.

Digital battery : the idea All content is encrypted, and can only be unlocked with a digital battery. User pays for the digital battery, not for the content itself. Battery identifies the content being used. Royalties allocated to content-provider when battery is returned/re-charged.

Advantages for producers: Will know when their product is used More accurate measure of popularity Advantages for consumers: Have a resistance to degrading content - paying for battery is more acceptable Consumers also want anonymity.

What kind of cryptography? RSA (public-private key) or Advanced Encryption Standard (private key) (AES had just been introduced at time of writing)

One major problem: All content will be protected by the same key – hacking into one gets you into all. Budd’s defence: Make decryption economically unprofitable Courts will vigorously prosecute hackers Make batteries so easy to use, pirating would not be worth the trouble.

For discussion: “Secure Digital Music Initiative” (SDMI), has already failed due to conflicting interests among its members. Can a scheme like the digital battery ever satisfy everyone: content providers, consumers, IT companies?