Download presentation
Presentation is loading. Please wait.
Published byDonald Phillips Modified over 8 years ago
1
WELCOME TO THE SEMINAR on Digital Rights Management
2
Seminar presentation DIGITAL RIGHTS MANAGEMENT (By R.Lakshmi) 2. Digital rights management (DRM) is a systematic approach to copyright protection for digital media. DRM's purpose is to prevent illegal distribution of paid content over the Internet. Although online content is protected by copyright laws, policing the Web and catching law-breakers is very difficult. DRM technology focuses on making it impossible to steal Web content in the first place, a much surer approach to the problem than the hit-and-miss strategies aimed at apprehending online poachers after the fact.
3
Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016 Seminar presentation DIGITAL RIGHTS MANAGEMENT (By R.Lakshmi) 3 Digital Rights Management (DRM) focused on security and encryption as a means of solving the issue of unauthorized copying, that is, lock the content and limit its distribution to only those who pay. This was the first-generation of DRM, and it represented a substantial narrowing of the real and broader capabilities of DRM. The second-generation of DRM covers the description, identification, trading, protection, monitoring and tracking of all forms of rights usages over both tangible and intangible assets including management of rights holders relationships. DRM limits what a user can do with that content even when he has possession of it.
4
Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016 Seminar presentation DIGITAL RIGHTS MANAGEMENT (By R.Lakshmi) 4 ContentGuard's DRM product has four major components. A protection toolkit that allows users to decide on their own access and encryption rules, a distribution toolkit that helps users create interfaces for content distribution, a consumer toolkit that verifies authorization before content is distributed, and a back-office component that tracks usage and licensing. ContentGuard DRM software uses XrML (Extensible Rights Markup Language), the company's patented XML-based language. MPEG REL (ISO/IEC 21000-5:2004), a rights expression language, is based on XrML.
5
Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016 Seminar presentation DIGITAL RIGHTS MANAGEMENT (By R.Lakshmi) 5. Digital technology changed everything. Today, most information, from newspaper stories to motion pictures, is available in digital form. It's quick and simple to make absolutely perfect copies of digital data. For digital information, the Internet eliminates the need to sell and move physical objects, such as books or magazines, floppy disks, cassette tapes or CDs. With high-speed networks and widely accessible broadband, we can send digital content anywhere in the world almost instantaneously and at virtually no cost.
6
Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016 Seminar presentation DIGITAL RIGHTS MANAGEMENT (By R.Lakshmi) 6. The following figure illustrates the general principle of DRM content authoring.
7
Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016 Seminar presentation DIGITAL RIGHTS MANAGEMENT (By R.Lakshmi) 7 * Authena is an example of open source digital rights management (DRM) framework and implementation. *The basic principle is that the content creator should have ultimate control over the restrictions applied to the content, as opposed to a middleman between the creator and consumer. open sourcedigital rights managementopen sourcedigital rights management
8
Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016 Seminar presentation DIGITAL RIGHTS MANAGEMENT (By R.Lakshmi) 8. In designing and implementing DRM systems, there are two critical architectures to consider. The first is the Functional Architecture, which covers the high-level modules or components of the DRM system that together provide an end-to-end management of rights. The second critical architecture is the Information Architecture, which covers the modeling of the entities within a DRM system as well as their relationships.
9
Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016 Seminar presentation DIGITAL RIGHTS MANAGEMENT (By R.Lakshmi) 9 Intellectual Property (IP) Asset Creation and Capture IP Asset Management IP Asset Usage.
10
Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016 Seminar presentation DIGITAL RIGHTS MANAGEMENT (By R.Lakshmi) 10.
11
Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016 Seminar presentation DIGITAL RIGHTS MANAGEMENT (By R.Lakshmi) 11 Rights Validation Rights Creation Rights Workflow.
12
Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016 Seminar presentation DIGITAL RIGHTS MANAGEMENT (By R.Lakshmi) 12 Repository functions Trading functions.
13
Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016 Seminar presentation DIGITAL RIGHTS MANAGEMENT (By R.Lakshmi) 13 Permissions Management Tracking Management.
14
Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016 Seminar presentation DIGITAL RIGHTS MANAGEMENT (By R.Lakshmi) 14 The Information Architecture deals with how the entities are modeled in the overall DRM framework and their relationships. The main issues that require addressing in the development of a DRM Information model include: Modeling the entities Identifying and describing the entities, and Expressing the rights statements.
15
Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016 Seminar presentation DIGITAL RIGHTS MANAGEMENT (By R.Lakshmi) 15 It is important to adopt a clear and extensible model for the DRM entities and their relationship with other entities. These entities can be clearly identified and distinguished as Users, Content, and Rights. This model implies that any metadata about the three entities needs to include a mechanism to relate the entities to each other. The key principle in the modeling of Content is that Content contains many "layers" from various intellectual stages or evolution of its development. Such a model will enable clearer (i.e., more explicit and/or appropriate) attribution of rights information..
16
Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016 Seminar presentation DIGITAL RIGHTS MANAGEMENT (By R.Lakshmi) 16 At each of these layers, different rights and rights holders may need to be supported. The layers of the Content defined as Work and Expression reflect scholarly or creative content. On the other hand, the other layers of Content, defined as Manifestation and Item, reflect physical or digital form..
17
Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016 Seminar presentation DIGITAL RIGHTS MANAGEMENT (By R.Lakshmi) 17.
18
Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016 Seminar presentation DIGITAL RIGHTS MANAGEMENT (By R.Lakshmi) 18 All entities need to be both identified and described. Identification should be accomplished via open and standard mechanisms for each entity in the model. Both the entities and the metadata records about the entities must be identifiable. Open standards such as Uniform Resource Identifiers [URI] and Digital Object Identifiers [DOI] and the emerging ISO International Standard Textual Work Code [ISTC] are typical schemes useful for Rights identification. It is also critical that such metadata standards do not themselves try to include metadata elements that attempt to address rights management information..
19
Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016 Seminar presentation DIGITAL RIGHTS MANAGEMENT (By R.Lakshmi) 19 The Rights entity allows expressions to be made about the allowable permissions, constraints, obligations, and any other rights-related information about Users and Content. Hence, the Rights entity is critical because it represents the expressiveness of the language that will be used to inform the rights metadata. Rights expressions can become complex quite quickly. Rights expressions should consist of : Permissions (i.e., usages) - what you are allowed to do. Constraints - restrictions on the permissions. Obligations - what you have to do/provide/accept. Rights Holders - who is entitled to what..
20
Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016 Seminar presentation DIGITAL RIGHTS MANAGEMENT (By R.Lakshmi) 20.
21
Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016 Seminar presentation DIGITAL RIGHTS MANAGEMENT (By R.Lakshmi) 21 DRM network server software wraps the digital content. DRM client software unwraps it or otherwise makes it accessible in accordance with its rights. DRM software protects proprietary and sensitive material on the company intranet. The Mirage server intercepts and encrypts designated documents or sections of documents. The Mirage client decrypts and displays the protected document, but the recipient cannot copy, save, print, e- mail or perform a screen capture unless authorized to do so. The document is decrypted to be viewable but otherwise remains encrypted, even in RAM..
22
Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016 Seminar presentation DIGITAL RIGHTS MANAGEMENT (By R.Lakshmi) 22.
23
Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016 Seminar presentation DIGITAL RIGHTS MANAGEMENT (By R.Lakshmi) 23 Planning your product Right at the beginning, when you are planning what you want to do, and well before you use any material, you should identify and record the work, its copyright owners and specific rights and consents associated with the work. You will need to Identify your materials (existing and new) map rights and consents required, including moral rights and performers rights identify the creator or producers of the material work out the basis of your use of the materials determine relevant agreements (assignments and licences) for digital rights negotiate agreements including payment rates determine risk exposure and sensitivity to leakage of content..
24
Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016 Seminar presentation DIGITAL RIGHTS MANAGEMENT (By R.Lakshmi) 24. develop a strategy for providing content and rights to your customers including decisions about security, personalisation and watermarking. decide how to develop your system. build it in-house. buy the components and assemble it yourself. buy a complete end-to-end system. outsource to an external provider of a turn key hosted service. identify providers of the selected strategy.
25
Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016 Seminar presentation DIGITAL RIGHTS MANAGEMENT (By R.Lakshmi) 25. set up a security system (e.g. password, personal identification number [PIN], encryption). implement an e-commerce facility to enable payment. implement a system for recording and tracking use and payment for materials.
26
Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016 Seminar presentation DIGITAL RIGHTS MANAGEMENT (By R.Lakshmi) 26 Licenses stipulate conditions that can include : 1. payment registration/login. 2. restrictions on copying. 3. limitations on burning to CD. 4. a custom page (usually an advertisment)that users view before license delivery and many others. When a user wishes to view DRM protected content,they are required to obtain a license. Licenses stipulate conditions that can include : 1. payment registration/login. 2. restrictions on copying. 3. limitations on burning to CD. 4. a custom page (usually an advertisment)that users view before license delivery and many others.
27
Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016 Seminar presentation DIGITAL RIGHTS MANAGEMENT (By R.Lakshmi) 27. DRM technology focuses on making it impossible to steal Web content. Digital Rights Management (DRM) is a method for managing different kinds of content (audio, video, images, etc.). It helps in protecting content against illegal copying and allows controlled consumption of media, for example by allowing an audio clip to be played only a finite number of times. DRM covers the description, identification, trading, protection, monitoring and tracking of all forms of rights usages over both tangible and intangible assets including management of rights holders relationships.
28
Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016 Seminar presentation DIGITAL RIGHTS MANAGEMENT (By R.Lakshmi) 28. DRM systems make rich-country assumptions about family and domestic life that are inappropriate to many developing countries. DRM systems can't protect themselves, they require "anti- circumvention" laws to silence researchers who discover their flaws. DRM systems retard innovation, putting new features under the veto of incumbent industries who fear being out-competed by new market entrants. The success of the information society depends on digital content being accessible. Digital content must not locked up behind technical barriers. DRM systems require that their users take a restrictive license from a cartel, often at a high cost.
29
Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016 Seminar presentation DIGITAL RIGHTS MANAGEMENT (By R.Lakshmi) 29. DRM technology is currently used mostly for music, videos, and books. The end-user's terminal is a personal computer or a portable music player that can download DRM protected music from a PC. With the emergence of Digital Rights Management Systems (DRMS), the music industry seems to have found the appropriate tool to simultaneously fight piracy and to monetize their assets. Another important area garnering much interest is Mobile Digital Rights Management (MDRM). With MDRM, Java games, polyphonic ringing tones, images, etc. could be delivered over the air to mobile phones and users could distribute the content in peer- to-peer fashion to their friends.
30
Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016 Seminar presentation DIGITAL RIGHTS MANAGEMENT (By R.Lakshmi) 30 Figure 6 - OzAuthors - Rights Interface A typical example from the E-book sector is the OzAuthors online e- book store. OzAuthors is a service provided by the Australian Society of Authors in a joint venture with IPR Systems. Their goal is to provide an easy way for Society members (including Authors and Publishers) to provide their content (e-books) to the market place at low cost and with maximum royalties to content owners. In this example, the "Usage Rights and Pricing" allows the content provider to specify “Read” and/or “Print” permissions, pricing, and security options for the e-book. Additionally, a number of pages can be specified as a free preview. The second part of the interface allows the content provider to specify all the rights holders, their roles, and their percentage of the royalty split. Each time the e-book is sold, the rights holders will automatically receive the indicated amount.
31
Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016Wednesday, September 28, 2016 Seminar presentation DIGITAL RIGHTS MANAGEMENT (By R.Lakshmi) 31. DRM technologies represent an attempt to get all users to adopt a more stringent legal protection for owners’ rights. Digital Rights Management is emerging as a formidable new challenge, and it is essential for DRM systems to provide interoperable services. Solutions to DRM challenges will enable untold amounts of new content to be made available in safe, open, and trusted environments.
32
Thank you ! Thank you !.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.