Protecting and Managing Electronic Content using Digital Battery

Slides:



Advertisements
Similar presentations
ContentGuard An Intellectual Property Company IPED Conference November 1, 2007 Presented By Eddie Chen CONTENTGUARD.
Advertisements

Do the anti-circumvention provisions of the Digital Millennium Copyright (DMCA) Act further or harm public interests?
Your Interactive Guide to the Digital World Discovering Computers Fundamentals, 2012 Edition.
Prepared By: Kopila Sharma  Enables communication between two or more system.  Uses standard network protocols for communication.  Do.
A Gift of Fire, 2edChapter 1: Unwrapping the Gift1 Appreciating the Benefits Benefits Computers Bring to Automation Organize and access large inventories.
Discovering Computers Chapter 1 Discovering Computers & Microsoft Office 2010.
Does DRM Affect the Mobile Application Market Tihomir Katulić, Faculty of Law Kruno Golubić, University Computing Center University of Zagreb.
C opyright Protection and Digital Rights Management 1.
Project supported by YESS 2009 Young Engineering Scientist Symposium « Identity Management » Cryptography for the Security of Embedded Systems Ambient.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Introduction to Computers. Objectives Overview Describe the five components of a computer Discuss the advantages and disadvantages that users experience.
Matthew Rothmeyer. Digital Rights Management (DRM) “ A class of technologies that are used by hardware manufacturers, publishers, copyright holders, and.
Introducing Digital Rights Management Willms Buhse October 2002, Vilnius.
BUSINESS B1 Information Security.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Lector: Aliyev H.U. Lecture №15: Telecommun ication network software design multimedia services. TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES THE DEPARTMENT.
Introduction to Secure Messaging Issues Russ Chung, American Eagle Group The Open Group Messaging Forum July 24, 2003.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
DRM. What is DRM Digital Rights management Used to describe a number of techniques used to restrict the use of digital media.
Essential Components: Acceptable Use Policy Presenter: John Mendes.
Presentation.  Suppression of speech or public communication.
DRM: Technology overview Keunwoo Lee CSE 590 SO 19 April 2005.
Summary of Distributed Computing Security Yifeng Zou Georgia State University
Applying Digital Watermarking Technology to Control CD copying BY CHAYAN RATTANAVIJAI.
The McGraw-Hill Companies, Inc Information Technology & Management Thompson Cats-Baril Chapter 1 Introduction to Information Technology & Management.
Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Evaluating New Copy-Protection Techniques for Audio CDs J. A. Halderman, 2002 ACM Workshop on Digital Rights Management (DRM 2002). Available at
Copyright and Intellectual Property Right 1. 2 Use and Protection of Intellectual Property in Online Business Intellectual property (general term) includes:
Digital Rights Management / DMCA Anti-Circumvention Edward W. Felten Dept. of Computer Science Princeton University.
Describe the potential of IT to improve internal and external communications By Jim Green.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Digital Battery A Portable System to Gather Statistical Utilization Information for Digital Media without Compromising Consumer Anonymity Timothy A. Budd.
The Section 1201 Rulemaking Jonathan Band Jonathan Band PLLC
Living in a Digital World Discovering Computers Fundamentals, 2011 Edition.
The Digital Battery From: Budd, T.A. "Protecting and Managing Electronic Content with a Digital Battery". IEEE Computer (2001) 2-8. Steve Lord.
History of Windows Operating System. Windows 1.0 Debuted in 1985 First version of Windows that was set up to use bitmap displays and mouse pointing devices.
Web bugs are tiny graphic files embedded in messages and Web pages that are designed to monitor who is reading the message or Web page and.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
1 © 2016 Samsung Electronics America - Confidential Introducing MagicInfo Lite I 4.0.
Find Cheap Samsung S7 Wallet Case
Security of Digital Signatures
Firmware threat Dhaval Chauhan MIS 534.
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
Social, Legal, and Ethical Issues for Computing Technology
e-Health Platform End 2 End encryption
COMPUTING BTEC LEVEL /17.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Add library banner image here
Digital Signature.
Applying Digital Watermarking Technology to Control CD copying
Basic Introduction to Computers
Objectives Overview Explain why computer literacy is vital to success in today's world Describe the five components of a computer Discuss the advantages.
Introducing MagicInfo Lite
PREPARED BY: RUMMY MIRANDA
By Jake Schmitt, Seth Raleigh, Neil McLain
Information Technology
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
*.
Digital Rights Management (DRM)
Student: Ying Hong Course: Database Security Instructor: Dr. Yang
Cryptography and Network Security
MUMT611: Music Information Acquisition, Preservation, and Retrieval
Intellectual Property Rights
Encryption and Digital Rights Management
International Data Encryption Algorithm
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
Woodland Hills School District
Chapter 6 Innovative Systems: From E-Government and E-Learning to C2C E-Commerce and Collaborative Commerce.
Presentation transcript:

Protecting and Managing Electronic Content using Digital Battery Timothy A. Budd, Oregon State University, IEEE Computer , Volume: 34 Issue: 8 , Aug 2001 Pages: 24 -30 Surender Reddy Adavalli

Digital Battery A de-grading program and a monitoring program along with decryption algorithm embedded in a secured place like smart card is called as Digital Battery.

Overview According to Budd, digital batteries can be used to protect electronic content from illegal access. All music and video content should be encrypted and can be decrypted using digital batteries only. Users should pay for digital battery and not to music and video content. Artist gets paid depending on usage statistics obtained from battery.

Purpose of Digital Battery Protection: Uses cryptographic technique to decrypt electronic content while it is played on device. Management : All the degraded batteries are collected and processed for statistical analysis depending on which artists and producers are paid.

Appreciative Comment Good diagrammatic representation of the concept Traditional vs. Digital Battery Model In traditional model, there is no control over product except legal defense. In digital battery model, product can be controlled and managed.

Appreciative Comment Cont.. Presents an innovative concept which may initiate further research. Concept can be used for security of intellectual property like software installations, which is more convincing than electronic content like music and video content.

Critical Comments Encryption techniques not discussed in detail. Practical implementation not discussed Problems with existing devices Need to redesign all the consumer appliances like music and video players, print devices etc As device architecture has to be changed manufacturers may suffer Considered only artists and producers but not manufacturers

Question Electronic content is played on enormous number of devices and if this new concept is introduced consumer appliance manufacturers are not gaining any thing. How can they be convinced and compromised? Thank You