SlideShare una empresa de Scribd logo
1 de 13
Descargar para leer sin conexión
Slide 1




             Digital Rights and Digital TV

                                                        Bill Rosenblatt
                                           GiantSteps Media Technology Strategies
                                                  billr@giantstepsmts.com
                                                       (212) 956-1045
                                                   www.giantstepsmts.com


    © 2007
             GiantSteps                                        1
             Media Technology Strategies
Slide 2


                                            Purposes of DRM

             Curb misuse of content
             Enable new content business models
             Track content usage
             Lock consumers into technology platforms
              or content formats




    © 2007
              GiantSteps                           2
              Media Technology Strategies
Slide 3


                                     Perspectives on DRM

      “DRM technologies … keep honest people honest”
           -- Fritz Attaway, MPAA
      “Trying to make digital files uncopyable is like trying
       to make water not wet”
           -- Bruce Schneier, BT Counterpane
              (noted cryptography expert)



    © 2007
             GiantSteps                        3
             Media Technology Strategies
Slide 4


                                         The DRM Conundrum

      Content owners
             – …require technical protection as condition of licensing
             – …try to fight the piracy battle on all fronts (law, technology,
               education)
             – …will not subsidize DRM
      Technology vendors
             – …want to sell new technologies that implement new content models
             – …see the Digital Home as the next huge opportunity
             – …see DRM as a necessary evil to get content licenses
      Consumers
             – …want to consume content in convenient ways
             – …may enjoy new business models (e.g. subscription services)
             – …generally dislike DRM

    © 2007
                  GiantSteps                     4
                  Media Technology Strategies
Slide 5


             Digital Rights Technologies

                              Encryption
                                           – “Classic DRM”
                              Content Identification
                                           – Watermarking
                                           – Fingerprinting
                              Rights Information Management
                                           – B-to-B



    © 2007
             GiantSteps                                       5
             Media Technology Strategies
Slide 6


                    DRM Domains

             Head End to
               Gateway
                Device



                               Personal Network




    © 2007
                           6
Slide 7


               Head End to Gateway Device

          Successor technology to Conditional Access
          Encrypt the link
             – Cable, satellite, IPTV
          Pass along rights information
             – From offers in subscriber management system
             – To gateway device, e.g. STB
          Minimize cost of incremental hardware in gateway
           device
             – Encourage adoption by gateway device makers

    © 2007
               GiantSteps                    7
               Media Technology Strategies
Slide 8


          Gateway Device to Personal Network

          Allow reasonable use throughout personal networks
             – Play on any monitor
             – Store for playback later
             – Transfer to portable device
          Content owners becoming comfortable with this
          Consumer electronics makers see next big market
          Consumers generally scratching their heads (so far)


    © 2007
                GiantSteps                    8
                Media Technology Strategies
Slide 9


             DRM Schemes for Personal Networks:
                    The Axes of Power
           Goal: become the control center & gatekeeper
           Set-top box axis: NDS, Thomson, Humax, Pace Micro,…
              – Secure Video Processor (SVP) Alliance
           Media player axis: Sony, Philips, Samsung, Matsushita
              – Marlin
           Mobile handset axis: Nokia, Motorola, Sony Ericsson,…
              – Open Mobile Alliance DRM 2.0
           Microsoft (axis unto itself):
              – Windows Media DRM, Microsoft Media Transfer Protocol
           Apple
              – Maybe, someday…


    © 2007
                GiantSteps                    9
                Media Technology Strategies
Slide 10


                                           Interoperability

                      Among existing DRMs
                                    – Coral Consortium (standards group):
                                      everybody but service providers
                      De facto standards
                                    – See “axes”
                      Escape to analog
                                    – Domain of copyright law and Fair Use
                      Hack
                                    – Anticircumvention law

    © 2007
             GiantSteps                              10
             Media Technology Strategies
Slide 11


                                           Watermarking




    © 2007
             GiantSteps                          11
             Media Technology Strategies
Slide 12


                                                 Video Fingerprinting

     Examining content in order to identify it
             – “Take its fingerprint”
             – Filter: block identified content from upload
             – Or do something else – serve a related ad, charge a fee, etc.
     Reasonably proven technology for music
             – Less proven for video
     Bone of contention in Viacom v. Google litigation
             – Attempt to extend Grokster and secondary liability law to include a
               duty to filter
     Focus of “UCG Principles” document
             – CBS, DailyMotion, Disney, News Corp, NBCU, Veoh, Viacom, Microsoft
             – Encompasses fingerprinting or watermarking


    © 2007
                   GiantSteps                              12
                   Media Technology Strategies
Slide 13




                                                 Bill Rosenblatt
                                           billr@giantstepsmts.com
                                                (212) 956-1045
                                           www.giantstepsmts.com

    © 2007
             GiantSteps                               13
             Media Technology Strategies

Más contenido relacionado

Similar a Digital Rights And Digital Television

Weber DRM What Should The Model Be MIT 11 26 07
Weber DRM What Should The Model Be MIT 11 26 07Weber DRM What Should The Model Be MIT 11 26 07
Weber DRM What Should The Model Be MIT 11 26 07bobweber
 
digital rights management for multimedia files
digital rights management for multimedia filesdigital rights management for multimedia files
digital rights management for multimedia filesApurva Vyas
 
DRM: A Skeptics View
DRM: A Skeptics ViewDRM: A Skeptics View
DRM: A Skeptics ViewLeigh Dodds
 
Visual intelligence driven smart imaging sensors
Visual intelligence driven smart imaging sensorsVisual intelligence driven smart imaging sensors
Visual intelligence driven smart imaging sensorsTarik Hammadou
 
Iia 2012 Spring Conference Philly V Final
Iia 2012 Spring Conference Philly V FinalIia 2012 Spring Conference Philly V Final
Iia 2012 Spring Conference Philly V FinalDanny Miller
 
Big Data Public Private Forum (BIG) @ European Data Forum 2013
Big Data Public Private Forum (BIG) @ European Data Forum 2013Big Data Public Private Forum (BIG) @ European Data Forum 2013
Big Data Public Private Forum (BIG) @ European Data Forum 2013Edward Curry
 
Csg international jim benz_final_distribution
Csg international jim benz_final_distributionCsg international jim benz_final_distribution
Csg international jim benz_final_distributionsouthmos
 
Intel Cloud summit: Big Data by Nick Knupffer
Intel Cloud summit: Big Data by Nick KnupfferIntel Cloud summit: Big Data by Nick Knupffer
Intel Cloud summit: Big Data by Nick KnupfferIntelAPAC
 
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...Real-Time Innovations (RTI)
 
Big Data Big Media the new paradigm of multimedia content management with Per...
Big Data Big Media the new paradigm of multimedia content management with Per...Big Data Big Media the new paradigm of multimedia content management with Per...
Big Data Big Media the new paradigm of multimedia content management with Per...ACTUONDA
 
To DRM or not to DRM?
To DRM or not to DRM?To DRM or not to DRM?
To DRM or not to DRM?Carlos Serrao
 
Thương mại di động M-Commerce
Thương mại di động M-CommerceThương mại di động M-Commerce
Thương mại di động M-CommerceCat Van Khoi
 
Fast & Big Data - the journey from innovative ideas to the creation of real v...
Fast & Big Data - the journey from innovative ideas to the creation of real v...Fast & Big Data - the journey from innovative ideas to the creation of real v...
Fast & Big Data - the journey from innovative ideas to the creation of real v...Daniel Zini
 
VIMANTRA Echelon Hong Kong Satellite Pitch
VIMANTRA Echelon Hong Kong Satellite PitchVIMANTRA Echelon Hong Kong Satellite Pitch
VIMANTRA Echelon Hong Kong Satellite PitchThomson Reuters
 

Similar a Digital Rights And Digital Television (20)

Automating Notice And Takedown
Automating Notice And TakedownAutomating Notice And Takedown
Automating Notice And Takedown
 
Weber DRM What Should The Model Be MIT 11 26 07
Weber DRM What Should The Model Be MIT 11 26 07Weber DRM What Should The Model Be MIT 11 26 07
Weber DRM What Should The Model Be MIT 11 26 07
 
digital rights management for multimedia files
digital rights management for multimedia filesdigital rights management for multimedia files
digital rights management for multimedia files
 
Building A Business Case For Digital Asset Management
Building A Business Case For Digital Asset ManagementBuilding A Business Case For Digital Asset Management
Building A Business Case For Digital Asset Management
 
DRM: A Skeptics View
DRM: A Skeptics ViewDRM: A Skeptics View
DRM: A Skeptics View
 
Visual intelligence driven smart imaging sensors
Visual intelligence driven smart imaging sensorsVisual intelligence driven smart imaging sensors
Visual intelligence driven smart imaging sensors
 
Rights Technologies for E-Publishing
Rights Technologies for E-PublishingRights Technologies for E-Publishing
Rights Technologies for E-Publishing
 
12 - Sanjeev Verma_mod2
12 - Sanjeev Verma_mod212 - Sanjeev Verma_mod2
12 - Sanjeev Verma_mod2
 
DRM_Interoperability_Final
DRM_Interoperability_FinalDRM_Interoperability_Final
DRM_Interoperability_Final
 
Presentazione
PresentazionePresentazione
Presentazione
 
Iia 2012 Spring Conference Philly V Final
Iia 2012 Spring Conference Philly V FinalIia 2012 Spring Conference Philly V Final
Iia 2012 Spring Conference Philly V Final
 
Big Data Public Private Forum (BIG) @ European Data Forum 2013
Big Data Public Private Forum (BIG) @ European Data Forum 2013Big Data Public Private Forum (BIG) @ European Data Forum 2013
Big Data Public Private Forum (BIG) @ European Data Forum 2013
 
Csg international jim benz_final_distribution
Csg international jim benz_final_distributionCsg international jim benz_final_distribution
Csg international jim benz_final_distribution
 
Intel Cloud summit: Big Data by Nick Knupffer
Intel Cloud summit: Big Data by Nick KnupfferIntel Cloud summit: Big Data by Nick Knupffer
Intel Cloud summit: Big Data by Nick Knupffer
 
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
 
Big Data Big Media the new paradigm of multimedia content management with Per...
Big Data Big Media the new paradigm of multimedia content management with Per...Big Data Big Media the new paradigm of multimedia content management with Per...
Big Data Big Media the new paradigm of multimedia content management with Per...
 
To DRM or not to DRM?
To DRM or not to DRM?To DRM or not to DRM?
To DRM or not to DRM?
 
Thương mại di động M-Commerce
Thương mại di động M-CommerceThương mại di động M-Commerce
Thương mại di động M-Commerce
 
Fast & Big Data - the journey from innovative ideas to the creation of real v...
Fast & Big Data - the journey from innovative ideas to the creation of real v...Fast & Big Data - the journey from innovative ideas to the creation of real v...
Fast & Big Data - the journey from innovative ideas to the creation of real v...
 
VIMANTRA Echelon Hong Kong Satellite Pitch
VIMANTRA Echelon Hong Kong Satellite PitchVIMANTRA Echelon Hong Kong Satellite Pitch
VIMANTRA Echelon Hong Kong Satellite Pitch
 

Más de GiantSteps Media Technology Strategies

Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?GiantSteps Media Technology Strategies
 
Copyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysisCopyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysisGiantSteps Media Technology Strategies
 
The Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights TechnologiesThe Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights TechnologiesGiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...GiantSteps Media Technology Strategies
 
International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright   Arthur Hoyle, Univ of CanberraInternational Perspectives on Digital Copyright   Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright Arthur Hoyle, Univ of CanberraGiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...GiantSteps Media Technology Strategies
 

Más de GiantSteps Media Technology Strategies (20)

Enabling Efficient and Fair Markets for Digital Content
Enabling Efficient and Fair Markets for Digital ContentEnabling Efficient and Fair Markets for Digital Content
Enabling Efficient and Fair Markets for Digital Content
 
Digital Disruption of the Book Publishing Industry
Digital Disruption of the Book Publishing IndustryDigital Disruption of the Book Publishing Industry
Digital Disruption of the Book Publishing Industry
 
Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?
 
Copyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysisCopyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysis
 
The Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights TechnologiesThe Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights Technologies
 
The landscape of content protection technology
The landscape of content protection technologyThe landscape of content protection technology
The landscape of content protection technology
 
You bought it, but do you own it?
You bought it, but do you own it?You bought it, but do you own it?
You bought it, but do you own it?
 
Standards success factors
Standards success factorsStandards success factors
Standards success factors
 
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
 
International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright   Arthur Hoyle, Univ of CanberraInternational Perspectives on Digital Copyright   Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra
 
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
 
Copyright and Technology London 2012: Eric Walter, Hadopi
Copyright and Technology London 2012: Eric Walter, HadopiCopyright and Technology London 2012: Eric Walter, Hadopi
Copyright and Technology London 2012: Eric Walter, Hadopi
 
Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...
 
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
 
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
 
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
 
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
 
Copyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler PresentationCopyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler Presentation
 
Copyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler PresentationCopyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler Presentation
 
Copyright and Technology 2011: Hillel Parness Presentation
Copyright and Technology 2011: Hillel Parness PresentationCopyright and Technology 2011: Hillel Parness Presentation
Copyright and Technology 2011: Hillel Parness Presentation
 

Último

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 

Último (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 

Digital Rights And Digital Television

  • 1. Slide 1 Digital Rights and Digital TV Bill Rosenblatt GiantSteps Media Technology Strategies billr@giantstepsmts.com (212) 956-1045 www.giantstepsmts.com © 2007 GiantSteps 1 Media Technology Strategies
  • 2. Slide 2 Purposes of DRM Curb misuse of content Enable new content business models Track content usage Lock consumers into technology platforms or content formats © 2007 GiantSteps 2 Media Technology Strategies
  • 3. Slide 3 Perspectives on DRM “DRM technologies … keep honest people honest” -- Fritz Attaway, MPAA “Trying to make digital files uncopyable is like trying to make water not wet” -- Bruce Schneier, BT Counterpane (noted cryptography expert) © 2007 GiantSteps 3 Media Technology Strategies
  • 4. Slide 4 The DRM Conundrum  Content owners – …require technical protection as condition of licensing – …try to fight the piracy battle on all fronts (law, technology, education) – …will not subsidize DRM  Technology vendors – …want to sell new technologies that implement new content models – …see the Digital Home as the next huge opportunity – …see DRM as a necessary evil to get content licenses  Consumers – …want to consume content in convenient ways – …may enjoy new business models (e.g. subscription services) – …generally dislike DRM © 2007 GiantSteps 4 Media Technology Strategies
  • 5. Slide 5 Digital Rights Technologies Encryption – “Classic DRM” Content Identification – Watermarking – Fingerprinting Rights Information Management – B-to-B © 2007 GiantSteps 5 Media Technology Strategies
  • 6. Slide 6 DRM Domains Head End to Gateway Device Personal Network © 2007 6
  • 7. Slide 7 Head End to Gateway Device Successor technology to Conditional Access Encrypt the link – Cable, satellite, IPTV Pass along rights information – From offers in subscriber management system – To gateway device, e.g. STB Minimize cost of incremental hardware in gateway device – Encourage adoption by gateway device makers © 2007 GiantSteps 7 Media Technology Strategies
  • 8. Slide 8 Gateway Device to Personal Network Allow reasonable use throughout personal networks – Play on any monitor – Store for playback later – Transfer to portable device Content owners becoming comfortable with this Consumer electronics makers see next big market Consumers generally scratching their heads (so far) © 2007 GiantSteps 8 Media Technology Strategies
  • 9. Slide 9 DRM Schemes for Personal Networks: The Axes of Power  Goal: become the control center & gatekeeper  Set-top box axis: NDS, Thomson, Humax, Pace Micro,… – Secure Video Processor (SVP) Alliance  Media player axis: Sony, Philips, Samsung, Matsushita – Marlin  Mobile handset axis: Nokia, Motorola, Sony Ericsson,… – Open Mobile Alliance DRM 2.0  Microsoft (axis unto itself): – Windows Media DRM, Microsoft Media Transfer Protocol  Apple – Maybe, someday… © 2007 GiantSteps 9 Media Technology Strategies
  • 10. Slide 10 Interoperability Among existing DRMs – Coral Consortium (standards group): everybody but service providers De facto standards – See “axes” Escape to analog – Domain of copyright law and Fair Use Hack – Anticircumvention law © 2007 GiantSteps 10 Media Technology Strategies
  • 11. Slide 11 Watermarking © 2007 GiantSteps 11 Media Technology Strategies
  • 12. Slide 12 Video Fingerprinting  Examining content in order to identify it – “Take its fingerprint” – Filter: block identified content from upload – Or do something else – serve a related ad, charge a fee, etc.  Reasonably proven technology for music – Less proven for video  Bone of contention in Viacom v. Google litigation – Attempt to extend Grokster and secondary liability law to include a duty to filter  Focus of “UCG Principles” document – CBS, DailyMotion, Disney, News Corp, NBCU, Veoh, Viacom, Microsoft – Encompasses fingerprinting or watermarking © 2007 GiantSteps 12 Media Technology Strategies
  • 13. Slide 13 Bill Rosenblatt billr@giantstepsmts.com (212) 956-1045 www.giantstepsmts.com © 2007 GiantSteps 13 Media Technology Strategies