Download presentation
Presentation is loading. Please wait.
Published byPearl Shepherd Modified over 9 years ago
1
C opyright Protection and Digital Rights Management 1
2
Copyright protection A form of intellectual property rights law that protect original works of ownership. Does not protect ideas, facts, parodies. Registration done by the Library of congress for $30. Commercial companies offer legal help for $20-$200 Certification can be done on-line (Active for life span of author plus 45 years) 2
3
Loopholes to copyright protection Fair use laws Regional jurisdictions Enforcement mechanisms Technological changes and better software Social media and cultural norms. 3
4
Digital Rights Management Collection of systems used to protect the copyrights of electronic media. Apple iTunes uses it to limit access to songs. Ensures Publishers of rightful revenue for their work Longer shelf life Easy access to digital files and storage. Technological advances in the Internet streaming and quality videos. 4
5
Digital Rights Management Useful in trading, controlling and tracking digital media. Limits the illegal Propagation of Copyright material. Uses watermarks or Propriety file encryption to restrict access to files. Setting servers to block forwarding message Software in DVDs to limit number of copies to 2 Music labels include bits of information that confuses ripping software 5
6
DRM systems Wipo laws and Digital Millennium Act Watermarks And Encryption logarithm Watermarks found in broadcasts and DVR operation Encryption system is a content scrambling system(CSS) A decryption key or processing key is needed Limits access and recording or playback. Microsoft uses the PVP(proven video path) drm that can encrypt information to the monitor. All models of a particular brand have shared decryption key. 6
7
HD/Blue ray Systems Use the Advanced access content system(AACS) Major companies united to control optical and HD file sharing Major difference with CSS is in the way decryption keys are organized. Advanced systems use a binary tree structure. Processing key, volume id, decryption key and device key all needed to operate. 7
8
Copyright Protection/DRM Trends Increased Internet software (strip copy software) to decrypt DRMs. Social and cultural norms about copyright. Inability to regulate the Internet. Critics complain about competitive laws. Ownership and how to control digital data. 8
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.