Protecting Digital Content - The Challenge Andy Barlow CTO – Phocis.

Slides:



Advertisements
Similar presentations
ContentGuard An Intellectual Property Company IPED Conference November 1, 2007 Presented By Eddie Chen CONTENTGUARD.
Advertisements

MicroKernel Pattern Presented by Sahibzada Sami ud din Kashif Khurshid.
Creative Commons international approach to licencing actively promoting re-use respects IPR not a threat to commercial re-use can be used for user-generated.
The Cost to Preserve Authentic Electronic Records into Perpetuity: Comparing Costs Across Cost Models and Cost Frameworks Shelby Sanett April 3, 2003.
Lemonade and Mobile e- mail Stéphane H. Maes – Lemonade Intermediate meeting Vancouver, BC October 2004.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Dematerialization of Organisations’ Key Business Processes Security and e-Invoicing ATHENEE PALACE HILTON, Bucuresti September 21 st 2004 Genovel Iovu.
Vice President, e-Business Development Dubai United Nations Conference on Trade & Development Conference on Electronic Commerce.
™ May 8, 2015 Copyright
Digital Rights Management © Knowledge Books & Software, 2012.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
1 Jeremy Wyant W3C DRM Workshop 23 January 2001 Establishing Security Requirements For DRM Enabled Systems.
“...creating knowledge.” Enabling Digital Content Protection on Super-Distribution Models - Carlos Serrão ISCTE – Intituto Superior.
Copyright 2004 Monash University IMS5401 Web-based Systems Development Topic 2: Elements of the Web (g) Interactivity.
E-payment: An integral part of your e-business initiative Cybersource Pte Ltd is a Singapore incorporated company and has no relation, in whatsoever to.
“Harmonizing Digital Content TM ” Proprietary and Confidential InformationStreamTone EntertainmentXML CPTWG, MPAA Ravi Razdan
User Managed Privacy Using Distributed Trust Privacy and Security Research Workshop Carnegie Mellon University May 29-30, 2002 Lark M. Allen / Wave Systems.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
Flexible Network Access Overview. Flexible Access an Integral part of Universal Access Policy Universal Access to Campus IT Resources Managed LAN portsFlexible.
1 sm Using E-Business Solutions to Meet Management Challenges: Interoperability & Flexibility Bring Success to the Implementation of Specialized Components.
Text and data mining for non-commercial research: the UK’s planned exception to copyright UK Government 22 April 2013, Brussels.
Digital Rights Management An Overview By Jude Umeh (MBCS)
장홍예 Telecommunication Engineer Lab E-COMMERCE: TECHNICAL AND MARKET APPROACH.
Chapter 2 The Origins of Software
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Digital Rights Management on the Web Dr Renato Iannella IPR Systems Chief Scientist 10th World-Wide Web.
LU Chenglong ( ) DIAO Wenrui ( )
CPTWG Jan MacroSafe TM System A Solution for Secure Digital Media Distribution Presentation to the CPTWG Jan. 15, 2002.
Source: J. Hoffer ,J. George, J. Valacich
Matthew Rothmeyer. Digital Rights Management (DRM) “ A class of technologies that are used by hardware manufacturers, publishers, copyright holders, and.
Copyright © 2000 Internet Document Security Alan Weintraub Research Director March 9, 2000.
4K. Contents Context Online required? UltraViolet connection.
Electronic Commerce Semester 2 Term 2 Lecture 8. Digital Copyrights & Electronic Publishing Intellectual property rights (copyrights, trademarks, and.
Copyright © 2012 Axceleon Intellectual Property All rights reserved HPC User Forum, Dearborn MI. Our Focus: Enable HPC solutions in the Cloud for our Customer.
Compsci 82, Fall IP: Intellectual Property l Term is pervasive, so we will use it  What does Stallman say about IP?  What does IP mean to Cisco.
Your use of Ordnance Survey mapping – is it legal? Richard Mortara Local Government & Emergency Services Contracts Manager 8 November 2006.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
University of Kaiserslautern Department of Computer Science Integrated Communication Systems ICSY License4Grid: Adopting DRM for Licensed.
1 Brian Green International ISBN Agency. ISBN and different formats  Under “Rules of assignment”, the 2005 revision of the ISBN standard (ISO 2108) says:
Licensing, DRM, and the use by libraries and educational institutions Senior Legal Adviser WIPO / IPD Meetings on 15/16 March 2004.
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 17 Software as Intellectual Property.
Chapter 2 The Origins of Software Modern Systems Analysis and Design Fifth Edition Jeffrey A. Hoffer Joey F. George Joseph S. Valacich.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Privacy Engineering for Digital Rights Management Systems By XiaoYu Chen.
1 Ethics of Computing MONT 113G, Spring 2012 Session 32 Software as Intellectual Property.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Deconstructing API Security
Towards a Software Architecture for DRM Joint work with Kristof Verslype, Wouter Joosen, and Bart De Decker DistriNet research.
Strong Authentication Infrastructure Requirement: Trusted Input Devices National ID Workshop Carnegie Mellon University November 28, 2001 Lark M. Allen.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
OMA Secure Content Delivery for the Mobile World ODRL Workshop, Vienna Dr. Willms Buhse Vice Chair, OMA Download and DRM group.
1 EXPANDING E-BUSINESS OPPORTUNITIES FOR VIETNAM Presented by Russell Pipe Director of E-Government Programs Kenan Institute Asia – Bangkok at the VIETNAM.
Lecture 2 The Sources of Software. Copyright © 2011 Pearson Education, Inc. 2 Chapter 2 Introduction There are various sources of software for organizations.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
TV Broadcasting What to look for Architecture TV Broadcasting Solution
S/MIME T ANANDHAN.
By Jake Schmitt, Seth Raleigh, Neil McLain
Chapter 2 The Origins of Software
WhistleB Whistleblowing system with secure communication channel and case management tool
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
PLANNING A SECURE BASELINE INSTALLATION
Security Mechanisms Network Security.
Presentation transcript:

Protecting Digital Content - The Challenge Andy Barlow CTO – Phocis

© 2001 Phocis Limited DRM? DRM (Digital Rights Management) is a much used – and abused - term DRM refers to those technologies which have been specifically developed for managing digital rights We prefer the term “digital trading platforms” And we prefer the term “users” to “customers”

© 2001 Phocis Limited What does an organisation need to consider? Intellectual Property (IP) rights Copyright Payment mechanisms Security E-commerce and ERP systems Licensing…

© 2001 Phocis Limited Licensing Licensing by its very nature is complex Organisations and their business processes do not remain static Solutions should not place restrictions on the licensing process, which is the embodiment of a business process Organisations need to update & incorporate new licensing requirements when necessary

© 2001 Phocis Limited How do customers access your content? Devices & Platforms Package/Protect/Licence Content

© 2001 Phocis Limited Independence - encryption There is more than one encryption technology available Encryption independence can provide organisations with the flexibility they require Content can then be secured for different client platforms using different encryption technologies

© 2001 Phocis Limited Independence - DRM Currently a wide range of incompatible DRM technologies Organisations change and DRM gets hacked Different types of content need to be secured Users (and publishers) must be assured that they’re not buying (into) the Betamax model!

© 2001 Phocis Limited Independence – digital content Should be able to protect any type of content Should be able to enforce IPR using original file formats: is this possible? Yes! Give the user the choice of THEIR player/reader (within the constraints of the publisher’s T’s & C’s)

© 2001 Phocis Limited Independence - trust Essential factor in enabling e-commerce Say its you and prove its you PKI Smart cards and biometrics Digital rights technologies should work alongside these types of technologies

© 2001 Phocis Limited Watermarking Encryption is not always possible or required Watermarking and similar technologies provide traceability outside of the DRM domain

© 2001 Phocis Limited Payment Flexible “payment” mechanisms Credit card Information trade On-line currencies Authentication Organisations don’t need to use the same payment mechanisms all the time

© 2001 Phocis Limited E-commerce, ERP, Content Management Systems Most organisations already have these infrastructures in place and don’t want to re- invent them Digital protection technology should Integrate with current infrastructure Enabling rapid publishing of secure content Not be prescriptive outside of its own domain

© 2001 Phocis Limited How should it work? 2 Package with appropriate security 3 Trade with chosen ‘currency’ 4 Allow the content to be used 1 Take any content

© 2001 Phocis Limited Ease of use Easy to implement and use For both publisher and user Access to information should be easy but remain secure The cost should not be prohibitive Scaleable to run an Amazon or Yahoo! Adaptable to change as DRM, encryption, payment and e-commerce technologies come and go

© 2001 Phocis Limited Open standards DRM standards – isn’t that why we’re here? W3C standards – SOAP, XML e-business standards – ebXML, Biztalk UDDI, SDMI JFDI?

© 2001 Phocis Limited Questions