Copyright Protection Allowing for Fair Use Team 9 David Dobbs William Greenwell Jennifer Kahng Virginia Volk.

Slides:



Advertisements
Similar presentations
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Advertisements

Cryptography and Network Security
Public Key Management and X.509 Certificates
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Computer and Network Security. Introduction Internet security –Consumers entering highly confidential information –Number of security attacks increasing.
Encryption An Overview. Fundamental problems Internet traffic goes through many networks and routers Many of those networks are broadcast media Sniffing.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
CSCI 6962: Server-side Design and Programming
1 Copyright & Other Legal Issues. 2 WHAT IS COPYRIGHT? Copyright is the form of protection provided by the laws of the United States to authors of “original.
Programming Satan’s Computer
Electronic Mail Security
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Secure Electronic Transaction (SET)
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
COPYRIGHT LAW IN MEDIA NOTES. WHAT IS COPYRIGHT? The exclusive right to reproduce, publish, and sell the matter and form of a literary, musical, or artistic.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Risks of data manipulation and theft Gateway Average route travelled by an sent via the Internet from A to B Washington DC A's provider Paris A.
SECURITY MANAGEMENT Key Management in the case of public-key cryptosystems, we assumed that a sender of a message had the public key of the receiver at.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Web Security : Secure Socket Layer Secure Electronic Transaction.
Who owns the Bits? Digital copyright issues are continually evolving. IP address do not map to a single person – hard to trace user Music and movie industry.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
Digital Signatures, Message Digest and Authentication Week-9.
DIGITAL SIGNATURE.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Private key
+ How do you make a fair use determination? Charlene, Linda and Mady.
Principles of AAVTC Ethics & Copyright Copyright © Texas Education Agency, All rights reserved. Images and other multimedia content used with permission.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Copyright 2004 MayneStay Consulting Group Ltd. - All Rights Reserved Jan-041 Security using Encryption Security Features Message Origin Authentication.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
X509 Web Authentication From the perspective of security or An Introduction to Certificates.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
The Secure Sockets Layer (SSL) Protocol
Key management issues in PGP
Unit 3 Section 6.4: Internet Security
Who owns the Bits? Digital copyright issues are continually evolving.
e-Health Platform End 2 End encryption
Ethics & Copyright.
How to Check if a site's connection is secure ?
IS3230 Access Security Unit 9 PKI and Encryption
Using SSL – Secure Socket Layer
Lecture 4 - Cryptography
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
The Secure Sockets Layer (SSL) Protocol
CDK: Chapter 7 TvS: Chapter 9
Electronic Payment Security Technologies
Who owns the Bits? Digital copyright issues are continually evolving.
Presentation transcript:

Copyright Protection Allowing for Fair Use Team 9 David Dobbs William Greenwell Jennifer Kahng Virginia Volk

Fair Use Music Distributor BuyerFriend World

The Copyright Act and Fair Use "the factors to be considered [in determining fair use] shall include - 1. The purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes; 2. The nature of the copyrighted work; 3. The amount and substantiality of the portion used in relation to the copyrighted work as a whole; and 4. The effect of the use upon the potential market for or value of the copyrighted work."

Court Precedents Currently there are no court cases dealing specifically with the issue of fair use and the distribution of digital music on the Internet. 1. Universal City Studios vs. Sony – Found that home recording of TV is legal because it can be done for noncommercial, private fair use. 2. Playboy vs. web publishers – Scanning and posting copyrighted images on the Internet is illegal because an individual has no right to "become an alternate publisher of the material.” (Samuelson 11)

Current Software SDMI Music Distributors can limit the number of copies of the music that can be made or even prohibit copying. Liquid Audio Liquid Passports allow users to play music on multiple machines but are not designed to let the user pass the music to another person.

Design Goals Allow second-hand distribution by original buyer only. Preclude distribution by clients other than the original buyer. Allow revocation of distribution by specific clients. Reduce load on MDC’s server Preclude access to the content outside of the music distribution protocol.

Buying Music File Sent to Customer Encrypt (using Session Key) Hash Sign (using MDC’s Private Key) Buyer’s Private Key Encrypt (using Buyer’s Public Key) Encrypt (using Player’s Secret Key) Session Key

Giving Music to a Friend Buyer’s client checks to ensure music is valid & can be shared. Buyer’s client looks up recipient’s public key. Recipient looks up sender’s public key. Server ensures recipient’s public key is valid and returns that key to the client. Client encrypts file to recipient’s public key and buyer’s private key, and sends file to recipient. Server ensures that key is valid and returns that to recipient. Recipient client verifies signature and allows playback of the file.

Trusted Playback: The Secret Trusted playback can be achieved if a shared secret exists, known only to the producer and the player. Authentication: The producer can ask the player to perform some transformation on a random value that can only be done with the key. Uniqueness: If you need the secret to play content, no other player will be able to play back content.

Any Questions?

First Security Check: Sender’s Client Hash Sign (using MDC’s Private Key) Buyer’s Private Key Step 1: Verify Signature on header. Step 2: Verify hash of music. Step 3: Hash sender’s public key. If the hash value doesn’t match, then the client will terminate the process.

Second Security Check: Key Lookup If a request is made for a non-existent public key, the server will not return a value, and the client will terminate the sending or receiving procedure. If a key pair is found to be compromised, it can be revoked. During this step, the server will return no value, and the client will terminate the procedure.

Re-Encryption Sender’s client decrypts the session key, and then re- encrypts it to use the receiver’s public key. Entire file is then encrypted using the sender’s private key. Encrypt (using Sender’s Public Key) Encrypt (using Player’s Secret Key) Session Key Encrypt (using Receiver’s Public Key) Encrypt (using Player’s Secret Key) Session Key Old Session Key New Session Key

Third Security Check: Receiver’s Client Authentication of Sender by key lookup Decryption: if the encrypted file received doesn’t decrypt using the receiver’s private key, attempt to play fails. Verify signature Verify hash of music Hash Sign (using MDC’s Private Key) Buyer’s Private Key