1 Automated Copyright Notice System (ACNS) September 2003 UNIVERSAL MUSIC GROUP UNIVERSAL STUDIOS.

Slides:



Advertisements
Similar presentations
WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
Advertisements

ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Presentation for the Department of Commerce's Internet Policy Task Force Second Public Meeting Recording Industry Association of America, May 8, 2014.
Audible Magic Corporation 985 University Avenue #35 Los Gatos, CA USA x145 Tools to Help Universities.
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Beth Johnson April 27, What is a Firewall Firewall mechanisms are used to control internet access An organization places a firewall at each external.
Lesson 19: Configuring Windows Firewall
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Networking Components Chad Benedict – LTEC
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
15-1 More Chapter 15 Goals Compare and contrast various technologies for home Internet connections Explain packet switching Describe the basic roles of.
Data Communications and Networks
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Internet Service Provisioning Phase - I August 29, 2003 TSPT Web:
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
1. What is the DMCA? Digital Millennium Copyright Act. Signed into law in Provides the legal framework for copyright holders to claim copyright.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
1 iBizBuilder from ClearPath Welcome to the ClearPath Networks iBizaBuilder online Tool! This innovative tool will be an online source for automating your.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
Digital Millennium Copyright Act (“DMCA”). Common MLS Issue Listing Agent uploads infringing photo –Examples All members republish photo on IDX sites.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
Dual WAN Router Brand & Marketing MGMT Dept DrayTek Corp Vigor2912 Series 14 th Jan Based on f/w RC4.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Web Page Design I Basic Computer Terms “How the Internet & the World Wide Web (www) Works”
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
Firewalls. Intro to Firewalls Basically a firewall is a __________to keep destructive forces away from your ________ ____________.
1 / Name / Date IDA Interface for Distributed Automation The journey toward Distributed Intelligence.
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
Developing Policy and Procedure Management System إعداد برنامج سياسات وإجراءات العمل 8 Safar February 2007 HERA GENERAL HOSPITAL.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Digital Networking TOI David Smith
 Introduction – Consumer Market  Benefits – Operational Cost & Flexibility  Challenges – Quality of Service & Securing VOIP  Legal Issuers  Risk.
Module 7 Planning and Deploying Messaging Compliance.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Cisco S3C3 Virtual LANS. Why VLANs? You can define groupings of workstations even if separated by switches and on different LAN segments –They are one.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
1 Efficient- Flexible- Cost Effective. 2 The key is to ensure that your clients have a positive experience remotely irrespective of the process you wish.
Wikipedia Edit. Internet of Things It is the idea of enabling everyday objects with software, sensors and network connectivity. The connectivity would.
Linux Operations and Administration Chapter Twelve Configuring a Mail Server.
A Policy Perspective on the File Sharing Issues Charles E Phelps Provost University of Rochester.
Chapter 6.  Internet and characteristics of Internet.  Various Internet protocols  Static IP addressing and Dynamic IP addressing Prepared by Saher.
Distributed Systems Ryan Chris Van Kevin. Kinds of Systems Distributed Operating System –Offers Transparent View of Network –Controls multiprocessors.
A network without routers is a very simple concept. When information is sent across a network line, all devices connected to that line read the data. If.
IS3220 Information Technology Infrastructure Security
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Networks and Security Great Demo
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Virtual Private Networks (VPN)
Copyright Infringement: Don’t let it happen to you!
Web Caching? Web Caching:.
Firewalls.
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
IS4680 Security Auditing for Compliance
File Transfer Issues with TCP Acceleration with FileCatalyst
Chapter Goals Compare and contrast various technologies for home Internet connections Explain packet switching Describe the basic roles of various network.
Protocol Application TCP/IP Layer Model
COMPLETE BUSINESS TEXTING SOLUTION
Presentation transcript:

1 Automated Copyright Notice System (ACNS) September 2003 UNIVERSAL MUSIC GROUP UNIVERSAL STUDIOS

2 ACNS Proposal Contact Information: –Aaron Markham Universal Studios –Christopher Bell Universal Music Group

3 ACNS Proposal Background: –Universal has submitted the ACNS proposal to the RFI from the Technology Task Force of the “Colleges Joint Committee of the Higher Education and Entertainment Communities”. –Universal is arranging tests and pilots with technology vendors and interested parties. –Universal has incorporated XML into our Infringement notices since summer 2003

4 Current Notice Process MONITORING SERVICE 1. Infringement Located COPYRIGHT AGENT 2. Infringement Data Reported Many Internet protocols and P2P networks are scanned by the monitoring service. Infringement reports are checked by the agent and a copyright infringement notice is generated. ISP/University DMCA or Abuse agent 3. Notice Sent to ISP Agent takes actions to block access to file reported in the notice.

5 Current Notice Process Disable Access ActionCompliance Response minutes days days days Infringing Content Still Available Typical Timeline Identify User

6 ACNS Architecture Design Goals: –Capable of rapid development and deployment: take advantage of the popularity of traffic management devices –Use established concept of copyright notice. –Resistant to P2P evolutionary measures like encryption

7 P2P NETWORK ROUTER TRAFFIC SHAPER FIREWALL REMOTE P2P NODES DATA CENTER MONITORING STATION (operated by content owner) P2P NODE IP: CONTROL STATION STEP 1: An external Monitoring Station continuously monitors P2P network for illegitimate content distribution by logging onto P2P network and searching or downloading. UNIVERSITY or ISP ACNS PROCESS (STEP 1)

8 P2P NETWORK ROUTER TRAFFIC SHAPER FIREWALL REMOTE P2P NODES DATA CENTER MONITORING STATION P2P NODE IP: CONTROL STATION STEP 2: Monitoring Station locates illegitimate content distribution from a P2P node within university or ISP’s network UNIVERSITY or ISP ACNS PROCESS (STEP 2)

9 P2P NETWORK ROUTER TRAFFIC SHAPER FIREWALL REMOTE P2P NODES DATA CENTER MONITORING STATION P2P NODE IP: CONTROL STATION STEP 3: Monitoring Station automatically sends Electronic Notice with information on content, IP address, P2P network type, etc. to Control Station in Data Center Electronic Notice UNIVERSITY or ISP ACNS PROCESS (STEP 3)

10 P2P NETWORK ROUTER TRAFFIC SHAPER FIREWALL REMOTE P2P NODES DATA CENTER MONITORING STATION P2P NODE IP: CONTROL STATION STEP 4: Control Station updates Traffic Shaper to enforce rules. Example rules: block node’s outgoing P2P traffic for specified time, lowering traffic priority, etc. STOP UNIVERSITY or ISP ACNS PROCESS (STEP 4)

11 P2P NETWORK ROUTER TRAFFIC SHAPER FIREWALL REMOTE P2P NODES DATA CENTER MONITORING STATION P2P NODE IP: CONTROL STATION Other Internet services, such as Web and , can remain unaffected. STOP OTHER INTERNE T USES UNIVERSITY or ISP ACNS PROCESS (STEP 4 continued)

12 P2P NETWORK ROUTER TRAFFIC SHAPER FIREWALL REMOTE P2P NODES DATA CENTER MONITORING STATION P2P NODE IP: CONTROL STATION Other P2P network users (which may or may not be distributing illegitimate content) are not affected. OTHER P2P NODES UNIVERSITY or ISP ACNS PROCESS (STEP 4 continued)

13 P2P NETWORK ROUTER TRAFFIC SHAPER FIREWALL REMOTE P2P NODES DATA CENTER MONITORING STATION P2P NODE IP: CONTROL STATION System can be easily modified to address concerns over loss of network control or spurious notices by inserting manual control points. UNIVERSITY or ISP Manual approval point can be inserted before rules are enforced at the Traffic Shaper. ACNS PROCESS

14 ACNS Architecture System Elements : –Monitoring Station: Identify illegitimate content distribution by joining the P2P network and searching for specific content. –Traffic Shaper: Identify network traffic based on packets and enforce “penalty box” rules such as blocking traffic, bandwidth limits, or lower priorities. Example Vendors: Ellacoya, P-Cube, Cisco, Akonix Devices already deployed at many universities (800+) for cost savings. Moving into ISP market -- cable ISPs use “penalty box” to control bandwidth hogs.

15 ACNS Architecture System Elements : –“Penalty-Box”: Traffic-shapers already support very flexible rules such as: (i) block infringer’s P2P traffic for X hours; (ii) block outgoing P2P traffic; (iii) assign lower priority and bandwidth limit to infringer; etc. –Resistant to Encryption: Only need to identify the type of traffic, not the content. For example, existing traffic shapers are able to identify encrypted Freenet traffic. –Applicable to other distribution methods: FTP, IRC, HTTP, etc.

16 Standardized Notice Format Standardized Notice Format: –Service providers complain about the lack of a standardized copyright notice across movie, music, and software industries. –Universal has developed a standard XML format to append to copyright notices. –Schema has been finalized incorporating RIAA, MPAA, and IFPI feedback. In process of broadening to vendors (BayTSP, MediaSentry, Ranger, etc.) and other industries (BSA, etc.). –Universal Studios and other studios are now using the XML in their notices. –Many other copyright holders such as software and music companies are in the process of implementing the standard XML notice.

17 Standardized Notice Format XML Example: T12:34:53Z pcp574.nshville.tn.isp.net FTP ftp:// /8Mile/ guest 8 Mile 8Mile.mpg Movie EKR94KF985873KD930ER4 A Content Owner Inc. John Doe Anywhere St, L.A., CA ISP Broadband Inc. Jane Doe Nowhere St, L.A., CA

18 Advantages of ACNS Advantages: –Required staff resources for responding to copyright notices are greatly reduced. –Copyright notices are more efficiently handled and compliance tracking is improved, thus reducing potential liability. –Service provider’s own network policies are efficiently enforced. –Flexible, limited response via “penalty-box”.

19 Advantages of ACNS Disable Access minutes minutes Infringing content available much shorter time Timeline with ACNS Identify User Disciplinary Action minutes

20 Advantages of ACNS Advantages for content owners: –Reduces time required to get infringing content off the network, and avoid waiting until “business hours” for removal. –Containment: faster response means viral replication of content is limited.