TM Click to edit Master subtitle style Lessons from Napster Copy Protection Technical Working Group Mickey W. Mantle – COO/SVP Development

Slides:



Advertisements
Similar presentations
Rightsrouter and DOI Presentation to IDF Members Meeting 22nd June 2004 Gordon Rintoul - Director of Operations.
Advertisements

CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Supporting New Business Imperatives Creating a Framework for Interoperable Media Services (FIMS)
Service Composition Scenarios for Next Generation Networks Bhaskaran Raman, ICEBERG, EECS, U.C.Berkeley Presentation at Siemens, Munich, June 2001.
Digital Rights Management © Knowledge Books & Software, 2012.
Audible Magic Corporation 985 University Avenue #35 Los Gatos, CA USA x145 Tools to Help Universities.
Persistent Protection Using E-DRM Technology Jason Fasoo 06/18/2008.
A 21 st Century Solution For 21 st Century Publishers.
EXPERT DOCUMENT SOLUTIONS FOR YOUR BUSINESS EXPERT DOCUMENT SOLUTIONS FOR YOUR BUSINESS.
11© 2011 Hitachi Data Systems. All rights reserved. HITACHI DATA DISCOVERY FOR MICROSOFT® SHAREPOINT ® SOLUTION SCALING YOUR SHAREPOINT ENVIRONMENT PRESENTER.
Privately held Developing a Digital Content Distribution Marketplace Globally positioned Incorporated in Delaware About Node Science Corporation.
The Internet & The New IT Infrastructure Chapter 9.
Toolbox Mirror -Overview Effective Distributed Learning.
© Copyright 2011 John Wiley & Sons, Inc.
Copyrights1 By Saud Al-Harbi & AbdulAziz Al-Shamrani.
Copyright 2002 Prentice-Hall, Inc. Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Chapter 16 Designing.
Grow Your Business with the Mitel Applications Suite PSG Networks Mitel Business Partner.
WDK Driver Test Manager. Outline HCT and the history of driver testing Problems to solve Goals of the WDK Driver Test Manager (DTM) Automated Deployment.
DIGITAL Download Sharing and Copying. Digital Download Process of downloading content or materials with the elimination of physical media. (dvd/cdrom)
Data-PASS Shared Catalog Micah Altman & Jonathan Crabtree 1 Micah Altman Harvard University Archival Director, Henry A. Murray Research Archive Associate.
Digital Rights Management on the Web Dr Renato Iannella IPR Systems Chief Scientist 10th World-Wide Web.
Advanced Access Content System (AACS) Industry Briefing July 14, 2004.
 Secure Release Here is a service developed by Pharos systems to facilitate more secure, convenient and flexible printing.  Instead of sending the job.
AtomPark Software is founded in The head office is located in Saint-Petersburg, Russia. Company is officially registered in the United States. AtomPark.
15 Copyright © 2005, Oracle. All rights reserved. Performing Database Backups.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
DRM Building Blocks - Protecting and Tracking Content Adopted from Chapter 5, Digital Rights Management Business and Technology.
1. 2 Our Business Digital Rights Management (DRM) Application Service Provider (ASP) offering a component-based DRM solution to content providers. Mission.
material assembled from the web pages at
Marvel Enterprises & Oracle. Marvel’s History 1961Marvel Comics born with debut of Fantastic Four X-Men, Spider-Man, Hulk and others born 1991Marvel.
Going Mobile Checklist for Delivering Your Content on Devices Ulhas Anand Sr. Product Manager.
BDA UHD Format Study (SPE internal update)
European Interoperability Architecture e-SENS Workshop : Collecting data for the Cartography Tool 7-8 January 2015.
15 Copyright © 2007, Oracle. All rights reserved. Performing Database Backups.
Moving Large Amounts of Data Rob Schuler University of Southern California.
Media Center and OTT. 10 years ago Now Offerings Spectrum: PPV, Pay TV, Basic cable, Free to air IP: VOD, SVOD, FVOD, AVOD Windows: early window, home.
KNOVADA – CUSTOMERSOFT SOLUTIONS Maximizing The Business Value Of Your Employees.
Metadata Strategy Case Study Bill Rosenblatt GiantSteps Media Technology Strategies (212)
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Copyright Frost & Sullivan Mobile Digital Rights Management: Managing Rights, Managing Revenues Interactive Analyst Briefing Allison Webb 12 March 2003.
Copyright © 2010 Pearson Education, Inc. publishing as Prentice HallChapter Crafting Messages for Electronic Media.
Privacy Engineering for Digital Rights Management Systems By XiaoYu Chen.
Copyright © 2008, Solbourne Confidential Leveraging UPK 3.1 Content Management and Guided Re-Record Features Terri Oltman, Education Consultant NorCal.
ITVP Platform: delivering interactive TV services over IP networks Miroslaw Czyrnek
Global Unique Well Identifier (GUWI) Service. Copyright © 2006 IHS Inc. All Rights Reserved. 2 Objectives Establish an industry standard unique identifier.
Click to edit Master title style 1 © 2007 Actuate Corporation. All rights reserved. Pete Cittadini President & CEO Actuate Corporation Actuate European.
Digital Rights Management and Trusted Computing Kari Kostiainen T Special Course in Operating System Security April 13 th 2007.
Making Friends with Your Public Works Department Using GIS Sherry Coatney Intergraph Corporation
1 Copyright © 2009, Oracle. All rights reserved. I Course Introduction.
Biosimilar (Insulin) – Competitive Landscape and Market & Pipeline Analysis, 2016 DelveInsight’s, “Biosimilar (Insulin) – Competitive Landscape and Market. Request for sample of this research report:
Comparison Report: VS 6/13/2006 Brandon Wu Network Media Development Dept. Personal Solution Business Group SONY Corporation.
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
IBM Software Group © 2006 IBM Corporation Confidentiality/date line: 13pt Arial Regular, white Maximum length: 1 line Information separated by vertical.
Copyright 2013 Exostar LLC.| All Rights Reserved.| Proprietary and Confidential1 Identity Proofing Service United Technologies Corporation September 26.
The Digital Media Project1 Leonardo Chiariglione.
5/29/2001Y. D. Wu & M. Liu1 Content Management for Digital Library May 29, 2001.
OMA Secure Content Delivery for the Mobile World ODRL Workshop, Vienna Dr. Willms Buhse Vice Chair, OMA Download and DRM group.
1 Copyright © 2008, Oracle. All rights reserved. Repository Basics.
Software sales at U Waterloo Successfully moved software sales online Handle purchases from university accounts Integrated with our Active Directory and.
AWS AWS Certified Solutions Architect
+ The Learning Registry: A How To Primer for Digital Content Publishers and Aggregators December 20, 2011.
Media Center and OTT.
Computer Networking Fundamentals
An Innovative Distributive Training and Information Platform
PREPARED BY: RUMMY MIRANDA
Systems Analysis and Design 5th Edition Chapter 8. Architecture Design
Presentation transcript:

TM Click to edit Master subtitle style Lessons from Napster Copy Protection Technical Working Group Mickey W. Mantle – COO/SVP Development Stephen White – Director Business Development

2 2 Confidential and Proprietary Outline The Problem Possible approaches Lessons From Napster Be prepared by putting the necessary pieces in place How Gracenote can help Experts in identification and database technologies System Diagram About Gracenote Partners

3 3 Confidential and Proprietary The Problem Technology advances have enabled explosion of “small” user generated transferable video and audio files Peer-to-peer network proliferation exponentially magnifying the distribution of “illegal” content Distributed network architecture makes blocking/policing difficult DRM solutions attempt to control and limit distribution creating an arms race mentality Copyright holders currently not participating in the success of peer-to-peer Public perception very important to not alienate end- users

4 4 Confidential and Proprietary

5 5 Confidential and Proprietary Possible Approaches Use the legal system to enforce control of distribution Takes a long time Expensive For every 1 shut down 2 start-up Use technology to block, police, and track No central rights database Tracking/Blocking systems not in place Create legal alternative Requires licensing and royalty structure Has to be complementary to existing business

6 6 Confidential and Proprietary Lessons From Napster Legal approach was employed by copyright holders to STOP distribution –Joint responsibility for proof of copyright –Blocking system Copyright information submission –Tracking and rights payment system irrelevant – no licenses Eventually shut down the network but not the distribution of content New Peer-to-peer networks harder to track –New networks off-shore –No central servers

7 7 Confidential and Proprietary Lessons From Napster Proactive approach required –Blocking not the only answer Any single approach destined to fail Embrace and extend –Any technical solution must work for both sides –Availability of required technology and data key –Willingness to license distribution may be necessary Find ways to harness the distribution for copyright holders benefit

8 8 Confidential and Proprietary Lessons from Napster Be prepared by putting the necessary pieces in place Support creation of blocking, tracking, and rights payment database Create standards around identification, tracking, rights payment across all studios and formats Submit video and associated metadata to centralized database Tracking, Rights Payment, Blocking, Reporting all possible if right pieces are readily deployable If music copyright holders had pieces in place they would have had more options

9 9 Confidential and Proprietary How Gracenote Can Help Experts in identification and database technologies –Multi-step ID solutions –Experts in creating large scalable databases –Mature technology –Distributed secure submission systems –Rules-based systems with custom administrative interfaces

10 10 Confidential and Proprietary

11 11 Confidential and Proprietary About Gracenote Founded in 1995; 43 employees in Berkeley & Tokyo CDDB core technology Over 4000 PC and device licensees Database of 23+ million titles Multiple recognition technologies Related content delivery technology Targeted content delivery Usage data Peer-to-peer identification, tracking and rights payment Multi-step identification and tracking system Enables rights payment, targeted content delivery and usage data aggregation

12 12 Confidential and Proprietary Gracenote’s Customers

TM Click to edit Master subtitle style