1 G CARD Lock your data in memory card. The key to unlock your data is your memory card. Cross Platform for your security solution 8/25/2011.

Slides:



Advertisements
Similar presentations
11/2/2013 2:02:38 AM 5864_ER_FED 1 Importing Certificates into Lotus Notes R6.
Advertisements

1 Digital Media Distribution Channels ©OverDrive, Inc DRM Challenges in Digital Media Distribution Channels Steve Potash May.
Slide 1 Insert your own content. Slide 2 Insert your own content.
Confidential 1 Phoenix Security Architecture and DevID July 2005 Karen Zelenko Phoenix Technologies.
CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
Click the home button to go to the map. Click the arrow to advance the slides.
P2 – Describe the purpose of different types of computer systems
Our Digital World Second Edition
Information Systems Today: Managing in the Digital World
Discovering Computers Fundamentals, 2012 Edition
Contents Different O.S. and platforms. Different programming languages. Possibilities for mobiles. GPS, digital compass, accelerometer,… Augmented reality.
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Little Big Brains: Mobile Application Production by: Jose, Francis, Xuong.
WHAT IS ANDROID? A Software platform and operating system for mobile. Based on the Linux kernel. Android was found way back in It was developed.
ICE-TT A UDIOBOOKS & PORTABLE LISTENING DEVICES Pierce County Library System.
Get the best of both worlds. With Windows 8, customers can get the fun of a tablet and the productivity of a PC, all in a single Windows 8 device. Game.
VCE IT Theory Slideshows By Mark Kelly McKinnon Secondary College Vceit.com Mobile computing devices.
A lesson approach © 2011 The McGraw-Hill Companies, Inc. All rights reserved. a lesson approach Microsoft® PowerPoint 2010 © 2011 The McGraw-Hill Companies,
Proven Value OverDrive: Proven Value for Libraries Contact us for more information Web:
V.2010 | © OverDrive, Inc | Page 1 v | © OverDrive, Inc | Page 1v | © OverDrive, Inc | Page 1 Learn how to browse,
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
310km Lab4 Presentation. Comparison between mobile OS Palm OS Blackberry Os Windows Mobile Symbian i OS Android.
V | © OverDrive, Inc | Page 1 Browse, Check Out, Download! Learn how to browse, check out, and download digital titles from [YOUR LIBRARY]
Your Interactive Guide to the Digital World Discovering Computers Fundamentals, 2012 Edition.
Your Interactive Guide to the Digital World Discovering Computers Fundamentals, 2012 Edition.
New Scenarios for Portable Media Usage David Proctor Hardware Lead Microsoft Portable Media Centers.
HNA-Drive Familiarization Presentation. From the address bar in your preferred internet browser, navigate to Site supports: Internet.
Computing Fundamentals Module A © CCI Learning Solutions Inc. 1 Unit 1: Recognizing Computers Lesson Topic 1Computers All Around Us 2Elements of a Personal.
Chung Man Ho Willims Chow Man Kei Gary Kwok Pak Wai Lion.
FALL 2006 Abstracts Arial Font Family. 2 Group Members  Muhammad Waqas Naseer  Adnan Khan.
Chapter 1 - Introduction to Computers and the Internet Basic functions of a Computer Input – entering info into the computer (e.g. keyboard, mouse, mic,
Discovering Computers Chapter 1 Discovering Computers & Microsoft Office 2010.
Computer and Internet Basics.
Advanced Access Content System (AACS) Industry Briefing July 14, 2004.
Destiny Quest Powerful, Personalized, Portable. Powerful Virtual Library with 24/7 Access Browse Library Shelves – Virtually Title Peek – Preview the.
©Copyrights 2011 Eom, Hyeonsang All Rights Reserved Distributed Information Processing 20 th Lecture Eom, Hyeonsang ( 엄현상 ) Department of Computer Science.
Introduction to Computers. Objectives Overview Describe the five components of a computer Discuss the advantages and disadvantages that users experience.
Matthew Rothmeyer. Digital Rights Management (DRM) “ A class of technologies that are used by hardware manufacturers, publishers, copyright holders, and.
Introducing Digital Rights Management Willms Buhse October 2002, Vilnius.
Group 06-From Lecture 06 Member 02 Presented by: Xu Wei iTunes B2C SUCCESS STORY&CONTROVERSIAL ISSUES.
Computers Are Your Future Tenth Edition Spotlight 7: Multimedia Devices Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Getting Started with E-Books: iPad/iPhone. How does it work?  Choose from popular items including fiction and non- fiction, children’s and teen  Download.
Library Card/ Number Computer or mobile device A need to read!
Maria Savova Collection Development and Special Projects Librarian.
Computer Concepts 2014 Chapter 8 Digital Media. 8 Digital Audio Basics  Sampling a sound wave Chapter 8: Digital Media 2.
Outline Personal Computer Desktop Computer Mobile Computers and Mobile Devices - Notebook Computer - Tablet PC - Smart Phones and PDAs - Ebook Readers.
Chapter 1: Applying Computer Basics – Lesson 1 © 2010, 2006 South-Western, Cengage Learning.
Use flash eBook software AnyFlip to make page flip book works seamlessly on mobile devices.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
Protecting Teens Online Practical Steps. Statistics  One in every three teens say they have been a victim of cyber- bullying  One in every two teens.
Welcome!! May Providing affordable access to downloadable audio books and eBooks for libraries large and small Includes libraries in central, southwest,
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
Backup DVD to Hard Drive From: -
OMA Secure Content Delivery for the Mobile World ODRL Workshop, Vienna Dr. Willms Buhse Vice Chair, OMA Download and DRM group.
1 1 Social Security Platform James Wu We Simplify Security.
How to Sync Android Phone to Computer (PC/Mac)? Are you a person that always has your Android phone in your hands? Nowadays, a cell phone is not just for.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Types of computers Module 1.10 AS identifies and distinguishes between computer types and associated software. AS identifies the main hardware.
Melodie Aggrey DIGITAL PRINT-BASED TEXTS
iPhones and iPads and iTunes, Oh My!
Want to Create Page Flip HTML5 Magazine?
Michael Etse and Maverick Fermill
Add library banner image here
Objectives Overview Explain why computer literacy is vital to success in today's world Describe the five components of a computer Discuss the advantages.
*.
Digital Rights Management (DRM)
Encryption and Digital Rights Management
Computer Concepts Module 3
Presentation transcript:

1 G CARD Lock your data in memory card. The key to unlock your data is your memory card. Cross Platform for your security solution 8/25/2011

2 App. Game Map Music Movie eBook Program Content Digital content

3 Home Appliance GPS Navigator Media Player PC Mobile Phone Tablet Game Console Platform for Digital Content

4 Product Structure Anti hardware copy Unique ID for each card by Flash block lock technology. Anti Software copy 1024 bits PKI Public Key Infrastructure) and AES Advanced Encryption Standard Cross platform Cross platform usage without any card reader

5 Security solution of digital content Data in memory card can only be used in single/ the same model device Data can only be used by single memory card On Line Streaming data to specified memory card is secured by our solution. Limit read data from memory card Data can be read, duplicated and cant be deleted

6 Both portion of GSiMedia software security solution reach security purpose : DRM Agent(embedded in playback software) and inside GSI SD card(controller hardware) 1. DRM Agent GSiMedia file follow OMA 2.0 DCF package format. DCF include Common Object and Right Object a. Common Object use AES encryption as Content Encryption Key b. Right Object follow ODRL standard, using 1024 bits PKI mechanisms for digital signature to verify whether Right Object is altered 2. GSiMedia SD Card Unique PSID Portable Storage ID.PSID is the basis for identity recognition. Unique PSID is generate by the unique Flash ID and True Random Number Generator and OTP (Once Time Programming Instruction of Software security solution

8 Certification of digital content protection Business process certification Fox Entertainment, Inc / Paramount Pictures, Inc./Warner Brothers/ Disney entertainment Co./ Sony Pictures System certification 1. Telecommunication companies Taiwan Mobile electronic bookstore 2. Completed Holly Wood Studio Approval by February 2012

9 Content encryption card: Book card File Encryption Card: Game Card Online trial reading and download to memory card for legal reading Personal Data Protection A : Whole card Encryption B: Selected Files Encryption Application Examples

10 Application Examples- Content Encryption Card Use Encryption Card play video Open program in the card Open program in the computer, can not be played Copy program from encryption card to computer

11 Application Examples- read online, download provide purchasing platform for encryption digital content The unique code in card is key for decrypt content Use content cross platform Use as common card in different mobile devices Use as download cardUse as common card

12 Application Examples- Encryption card Used in the Android mobile devices and computer Information security assurance by the users and mobile devices when use the card in the mobile device When the card is removed from the mobile device, who can protect the data ? The only solution: Whole encryption card 1.Insert the card into computer or mobile. 2.Input password, start decryption function to protect data + =

13 Application Examples _ Encryption program Encryption card can be used in Android mobile devices and computer Insert the card into mobile device, type password in program to encrypt specific content Can not use specific content before decryption

14 Advantage of Patent More than twenty worldwide patentsMore than twenty worldwide patents Software player and hardware playerSoftware player and hardware player Full patentsFull patents protection Product patent

15 Has applied the following patents Patent protection

List of software player 16 Application software Productplatformproductplatform GSiMusic (Music player) PC Java version GsiSafe PC Java version PC Win32 versionJava Mobile version Winodws Mobile vesion Symbian S60 Mobile version Android Mobile version GSiKaraoke (Karaoke player) PC Java version GsiMovie (Movie player) PC Win32 version Winodws Mobile vesion Java Mobile versionSymbian S60 Mobile version Winodws Mobile vesionAndroid Mobile version Symbian S60 Mobile version Android Mobile version GSieBook (ebook ) PDF specification for PC Java vesion Derivative Product FotoSafe Android version PDF specification for Winodws Mobile vesion advertising SD card PC Win32 version PDF specification for Android Mobile version advertising SD card Android Mobile version PDF specification for Android Pad version advertising SD card Window Mobile version PDF specification for Android iPad version advertising SD card Symbian S60 Mobile version PDF specification for iPhone version vedio advertising SD card PC Win32 version ePub specification for Android mobile version vedio advertising SD card Android Mobile version ePub specification for Android Pad version ePub specification for iPad version ePub specification for iphone version