SlideShare una empresa de Scribd logo
1 de 21
29th National Convention and Conference of
29th National Convention and Conference of

                  SIS
                  SIS
                       on
                      on

Information-Innovation-Technology ::
Information-Innovation-Technology
     Creating Seamless Linkages
     Creating Seamless Linkages

                Organised By ::
                Organised By

        Central Library, NIT, Silchar
        Central Library, NIT, Silchar
         26th – 28th November, 2012
         26th – 28th November, 2012
DIGITAL RIGHTS MANAGEMENT :
AN ESSENTIAL FEATURE IN THE DIGITAL ERA



                         by

             JAYANTI CHAKRAVORTY
                       &
            LANGMUANJOHN TONSING

           LIBRARY & INFORMATION ASSISTANTS

 CENTRAL LIBRARY, NATIONAL INSTITUTE OF TECHNOLOGY
                      SILCHAR
Introduction

  Advent of Digital Revolution since the
later part of the 20th Century, coupled
    with invention of advanced ICT has
   brought in an integrated knowledge
     linkage and sharing mechanism
            around the world.
It has opened up new opportunities to
   academicians, research scholars,
    students, information scientists,
 industrialists, business groups, others.
But unfortunately, it has also brought in
   the menace of Digital Piracy and
     Violation of Copyright Laws.
 Digital Rights Management aims to stop
this practice of piracy and help copyright
 holders safeguard their digital content.
               Back-Drop
 Prior to arrival of digital or electronic
media, owners of copyright products and
materials had business-legal objections
  to copying their D-products and D-
                materials.
In early days of recorded sound in the
1960s, piracy was not a serious threat.
But, introduction of magnetic tapes as
  a recording medium changed the
               situation.

  Arrival of digital media and analog /
digital conversion technologies greatly
  increased the concern of copyright
   owners, particularly in music and
motion picture industry, because they
are much dependent on the revenue of
        their copyrighted works.
Since early 1980s, software were being
  evolved to control Digital Piracy and in
       1990s, laws started coming up.
 DRM was first popularized when Digital
 Millennium Copyright Act, was enacted in
   USA in 1998, which implemented two
    treaties of 1996 of World Intellectual
           Property Organization :
        WIPO Copyright Treaty, and
WIPO Performance and Phonogram Treaty.
 Other WIPO Member-countries enacted
        similar laws subsequently.
Definition

   Digital Rights Management is a
  combination of control devices and
    technologies that are used by :
 hardware manufacturers, software
engineers, publishers, writers, dramatic
  and musical performers, individuals
        and copyright-holders
with the intent to limit the use of digital
        content and devices after
          sale or publication.
Historical Overview

Earliest implementation of DRM was in the form
of a concept, invented in 1983 by Ryoichi Mori,a
Japanese-scientist. Named as ‘Software Service
 System’-SSS, it was the 1st generation of DRM.
It attached focus on security and encryption as
    a measure to curb unauthorized copying.

2nd generation DRM came as Superdistribution
Architecture - SdA, developed by Mori himself.
An improvement over SSS, it covers tracking
and monitoring of all form of rights, usages
over both tangible and intangible assets and
management of relationship with right holders.
Evolution of DRM Architecture
    Development of DRM was in 4 specific stages :
Level   Key Concept              Remarks
0       No physical protection   Laws and ethics
1       Hardware protection      Controlling Execution :
                                    Hardware Key
                                 Inhibiting Duplication :
                                    Copy Protection
                                    Non-compatible ROM
2       Customizing Software     Customizing Deciphering key
        with Computer ID            1982 – GB Purdy, SPS
                                    1984 – DJ Albert
                                    1986 – A Herzberg, PPS
3       Execution Privileges     SSS, 1983, Ryoichi Mori
                                 ABYSS, 1987, IBM
4       Superdistribution        SdA, 1987, Ryoichi Mori
Chronology of Development of DRM
 1G DRM, SSS had the following components :
 A cryptographic wrapper for digital products
 that cannot be removed and remains in place
        whenever the product is copied.
  2G DRM, SdA had the following properties :
  Software products are distributed without
restriction, the user pays for the products. The
 vendor sets the terms and conditions of use.
Products can be executed by any user having
proper equipment, provided that, he adheres to
                  the set terms.
Proper operation of the system is ensured by
    temper resistant e-devices as digitally
               protected modules.
DRM Framework
 An ideal DRM system is flexible, sufficiently
 transparent and a complex system, which a
  computer program generally cannot crack.
The scheme operates on three parameters :
 Establishing copyright for a Digital Content
    Managing its proper distribution, and
   Controlling its application by the user.
For effective implementation, a DRM Program
   has to define and describe three entities :
 The User, the Content and the Usage Rights
DRM Architecture
DRM Architecture consists of two vital components :
 Functional Architecture & Information Architecture
        as shown in the following diagram.
                                  DRM ARCHITECTURE




       FUNCTIONAL                                                       INFORMATION
      ARCHITECTURE                                                     ARCHITECTURE




     IP Assets Creation         IP Assets                   IP Usage
        and Capture            Management




        Modeling of Entities     Identifying & describing         Expressing statements
                                   entities sequentially             regarding rights
Functional Architecture covers three modules :
Intellectual Property Assets Creation and Capture
  Intellectual Property Assets Management, and
             Intellectual Property Usage
 Information Architecture is concerned with :
 Modeling, Identifying and Describing the Entities
sequentially and expressing statements of Rights.
Information Architecture Core Entity Model is depicted in the following figure :

                                   Digital
                                  Contents


                      Over                           Create/use




            Rights                    Own                   Users
Application of DRM


 DRM Technologies are now used in the form
      of Restrictive Licensing Agreements.
Technologies like, encryption, embedding of a
   tag and scrambling of expressive materials
  are used to control access and reproduction
             of on-line information.

 DRM Technologies are used for protecting
    digital contents like, film, television,
 recorded music, computer games, software
  packages, metadata, e-books, documents
                 and others.
Application of DRM in e-books
 Mainly four e-book formats, Mobipocket, Topaz,
 ePub and PDF are used to limit copying, printing
   and sharing of e-books. The Amazon Kindle
 uses Mobipocket and Topaz. Three main e-book
  DRM schemes in common use are, one each
     from Adobe, Apple and the Marlin Trust.

 Widely used sofware to view e-books are Adobe
   Reader and Microsoft Reader. Generally when
   an e-book reader opens a file, he finds the right
      statement outlining the pre-conditions for
          viewing, copying and printing etc.
In Microsoft reader, there are three different levels
   of access control : sealed e-books, inscribed e-
        books and owner exclusive e-books.
Application DRM in Documents
  Now-a-days, majority of the government agencies,
  financial institutions and professional companies
 store and process their information in digital format.
   Enterprise Digital Rights Management (E-DRM)
is an improvised application of DRM Scheme
   to control access to these corporate digital
  documents which remain in various formats
     and in e-mails and internet web pages.
   E-DRM protects sensitive information by
    enforcing access and usage rights to the
       information throughout its lifecycle.
    There are three main phases of data lifecycle
    management that is considered in developing a
               viable security strategy :
protection of data at rest, protection of data in transit
            and protection of data in use.
Application DRM in Libraries
    Electronic Resource Management (ERM)
   poises to be an advancement indicator for
          modern Library functioning.
ERM is the software used by Libraries to keep
    track of important information about e-
   resources, especially the internet-based
  ones, like e-journals, e- books and others.
The development of ERM became necessary in
      the early 2000s, as it was evident that
   traditional Library Catalogues and Library
      systems were not designed to handle
   metadata and many other online products.
 Libraries receiving e-resources from publishers,
  vendors and copyright owners must understand,
  record and inform their users about the financial,
    legal, and access aspects of the resources.
Features of ERM
The main features of ERM systems include :
Supporting acquisition and management of
           licensed e-resources.
Providing descriptions of resources at the
package (database) level and relate package
     contents (say an e-journal) to the
            package record.
Encoding and perhaps publicly displaying
licensed rights such as e-reserves, course-
       packs, and inter-library loan.
 Tracking e-resources from point of order
     through licensing and final access.
DRM : The Task Ahead for the Library People
Libraries are the Repositories of Information
 and Knowledge. Over the centuries, libraries
  have been helping hundreds of millions of
 people meet their work, study, research and
  other needs. They preserve our history and
   cultural heritage and promote our right to
              access information.
In the present context, to achieve these goals,
  libraries need international copyright norms,
    together with limitations and exceptions.
   Legal flexibilities in copyright, known as
  limitations and exceptions, provide balance
    in a copyright system between users and
          creators of protected works.
IFLA holds the view that :
Copyright limitations and exceptions are fundamental for access
  of knowledge and thus for human and social development.
IFLA and other Library organizations are working actively
     with WIPO Member Nations to foster support for
    enacting a binding international legal instrument on
  copyright limitations and exceptions enabling libraries to
   preserve their collections and support their users with
                    the needed documents.
     It is time for the Library people, knowledge
    professionals, information scientists, scholars
   and students to get involved in mobilizing their
  respective National Governments and the world
    communities to shape an international law on
  copyright, that could satisfy the needs of the 21 st
  century libraries and could build up a seamless
   linkage across the world, dedicated to achieve
  common human welfare and prosperity through
   academic, scientific and social development.
WITH BEST REGARDS

Más contenido relacionado

La actualidad más candente

Institutional Repositories
Institutional RepositoriesInstitutional Repositories
Institutional Repositories
Joshua Parker
 
Book Selection Tools
Book Selection Tools Book Selection Tools
Book Selection Tools
tonyviamll89
 
Institutional repositories
Institutional repositoriesInstitutional repositories
Institutional repositories
Smita Chandra
 
EXPLAIN REMOTE ACCESS TO LIBRARY RESOURCES? DESCRIBE ANY ONE SOFTWARE AVAILAB...
EXPLAIN REMOTE ACCESS TO LIBRARY RESOURCES? DESCRIBE ANY ONE SOFTWARE AVAILAB...EXPLAIN REMOTE ACCESS TO LIBRARY RESOURCES? DESCRIBE ANY ONE SOFTWARE AVAILAB...
EXPLAIN REMOTE ACCESS TO LIBRARY RESOURCES? DESCRIBE ANY ONE SOFTWARE AVAILAB...
`Shweta Bhavsar
 

La actualidad más candente (20)

Digital Library Architecture
Digital Library ArchitectureDigital Library Architecture
Digital Library Architecture
 
Structure of subject lit ppt
Structure of subject lit pptStructure of subject lit ppt
Structure of subject lit ppt
 
Digital preservation
Digital preservationDigital preservation
Digital preservation
 
DIGITAL LIBRARY ARCHITECTURE
DIGITAL LIBRARY ARCHITECTUREDIGITAL LIBRARY ARCHITECTURE
DIGITAL LIBRARY ARCHITECTURE
 
DRM Powerpoint
DRM PowerpointDRM Powerpoint
DRM Powerpoint
 
Cloud Computing in Libraries
Cloud Computing in LibrariesCloud Computing in Libraries
Cloud Computing in Libraries
 
APPLICATION OF RFID TECHNOLOGY IN LIBRARIES AND ROLE OF LIBRARIAN
APPLICATION OF RFID TECHNOLOGY IN LIBRARIES AND ROLE OF LIBRARIANAPPLICATION OF RFID TECHNOLOGY IN LIBRARIES AND ROLE OF LIBRARIAN
APPLICATION OF RFID TECHNOLOGY IN LIBRARIES AND ROLE OF LIBRARIAN
 
Cloud computing and its application in libraries
Cloud computing and its application in librariesCloud computing and its application in libraries
Cloud computing and its application in libraries
 
Collection development
Collection developmentCollection development
Collection development
 
Digital Reference Service in Library
Digital Reference Service in LibraryDigital Reference Service in Library
Digital Reference Service in Library
 
Institutional Repositories
Institutional RepositoriesInstitutional Repositories
Institutional Repositories
 
Digital rights management (drm) and you
Digital rights management (drm) and youDigital rights management (drm) and you
Digital rights management (drm) and you
 
ISBD
ISBDISBD
ISBD
 
Bibliographic description an overview
Bibliographic description an overviewBibliographic description an overview
Bibliographic description an overview
 
Procurement and management of periodical resources
Procurement and management of periodical resourcesProcurement and management of periodical resources
Procurement and management of periodical resources
 
Book Selection Tools
Book Selection Tools Book Selection Tools
Book Selection Tools
 
Copyright issues in a library digital environment
Copyright issues in a library digital environmentCopyright issues in a library digital environment
Copyright issues in a library digital environment
 
Institutional repositories
Institutional repositoriesInstitutional repositories
Institutional repositories
 
The library in the life of the user
The library in the life of the userThe library in the life of the user
The library in the life of the user
 
EXPLAIN REMOTE ACCESS TO LIBRARY RESOURCES? DESCRIBE ANY ONE SOFTWARE AVAILAB...
EXPLAIN REMOTE ACCESS TO LIBRARY RESOURCES? DESCRIBE ANY ONE SOFTWARE AVAILAB...EXPLAIN REMOTE ACCESS TO LIBRARY RESOURCES? DESCRIBE ANY ONE SOFTWARE AVAILAB...
EXPLAIN REMOTE ACCESS TO LIBRARY RESOURCES? DESCRIBE ANY ONE SOFTWARE AVAILAB...
 

Destacado

معرفی و آموزش سامانه مدیریت محتوای مزانین - سید مسعود صدر نژاد
معرفی و آموزش سامانه مدیریت محتوای مزانین - سید مسعود صدر نژادمعرفی و آموزش سامانه مدیریت محتوای مزانین - سید مسعود صدر نژاد
معرفی و آموزش سامانه مدیریت محتوای مزانین - سید مسعود صدر نژاد
irpycon
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
Byerdavi
 
The major differences between a major and an independent record company
The major differences between a major and an independent record companyThe major differences between a major and an independent record company
The major differences between a major and an independent record company
CammieSarah51
 
Software Piracy Powerpoint
Software Piracy PowerpointSoftware Piracy Powerpoint
Software Piracy Powerpoint
Mbradber
 

Destacado (20)

Digital Rights Management for Ebooks
Digital Rights Management for EbooksDigital Rights Management for Ebooks
Digital Rights Management for Ebooks
 
DRM, Digital Content, and the Consumer Experience: Lessons Learned From The M...
DRM, Digital Content, and the Consumer Experience: Lessons Learned From The M...DRM, Digital Content, and the Consumer Experience: Lessons Learned From The M...
DRM, Digital Content, and the Consumer Experience: Lessons Learned From The M...
 
De-mystifying DRM
De-mystifying DRMDe-mystifying DRM
De-mystifying DRM
 
Digital Right Management
Digital Right ManagementDigital Right Management
Digital Right Management
 
Digital Rights Management for Animation & Gaming
Digital Rights Management for Animation & GamingDigital Rights Management for Animation & Gaming
Digital Rights Management for Animation & Gaming
 
Drm landscape and online streaming
Drm landscape and online streamingDrm landscape and online streaming
Drm landscape and online streaming
 
Electronic Publishing Arun Joseph MLISc
Electronic Publishing Arun Joseph MLIScElectronic Publishing Arun Joseph MLISc
Electronic Publishing Arun Joseph MLISc
 
Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepoint
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
Digital Strategy For Publishers
Digital Strategy For PublishersDigital Strategy For Publishers
Digital Strategy For Publishers
 
معرفی و آموزش سامانه مدیریت محتوای مزانین - سید مسعود صدر نژاد
معرفی و آموزش سامانه مدیریت محتوای مزانین - سید مسعود صدر نژادمعرفی و آموزش سامانه مدیریت محتوای مزانین - سید مسعود صدر نژاد
معرفی و آموزش سامانه مدیریت محتوای مزانین - سید مسعود صدر نژاد
 
E-Publishing: Challenges and Opportunities
E-Publishing: Challenges and OpportunitiesE-Publishing: Challenges and Opportunities
E-Publishing: Challenges and Opportunities
 
Software piracy
Software piracySoftware piracy
Software piracy
 
e-publishing
e-publishinge-publishing
e-publishing
 
مدیریت محتوا Content management
مدیریت محتواContent managementمدیریت محتواContent management
مدیریت محتوا Content management
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
The major differences between a major and an independent record company
The major differences between a major and an independent record companyThe major differences between a major and an independent record company
The major differences between a major and an independent record company
 
Software Piracy Powerpoint
Software Piracy PowerpointSoftware Piracy Powerpoint
Software Piracy Powerpoint
 
Beyond Good & Evil: The nuts and bolts of DRM - Dave Cramer - ebookcraft 2017
Beyond Good & Evil: The nuts and bolts of DRM - Dave Cramer - ebookcraft 2017Beyond Good & Evil: The nuts and bolts of DRM - Dave Cramer - ebookcraft 2017
Beyond Good & Evil: The nuts and bolts of DRM - Dave Cramer - ebookcraft 2017
 
Software piracy
Software piracySoftware piracy
Software piracy
 

Similar a Digital rights management an essential feature in the digital era

Drm metadata presentation fina lwith-notes
Drm metadata presentation fina lwith-notesDrm metadata presentation fina lwith-notes
Drm metadata presentation fina lwith-notes
Pamela Carson
 
E commerce economic essay assignment - www.topgradepapers.com
E commerce economic essay assignment - www.topgradepapers.comE commerce economic essay assignment - www.topgradepapers.com
E commerce economic essay assignment - www.topgradepapers.com
Top Grade Papers
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
10e11a0545
 
A Digital Rights Management System Based on Cloud
A Digital Rights Management System Based on CloudA Digital Rights Management System Based on Cloud
A Digital Rights Management System Based on Cloud
TELKOMNIKA JOURNAL
 
Intellectual Property Rights in the Digital Era.pptx
Intellectual Property Rights in the Digital Era.pptxIntellectual Property Rights in the Digital Era.pptx
Intellectual Property Rights in the Digital Era.pptx
AshiQulIslam34
 
Development of strategy for the e pub library of wu
Development  of strategy for the e pub library of wuDevelopment  of strategy for the e pub library of wu
Development of strategy for the e pub library of wu
Room to Read
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
Aten Kecik
 

Similar a Digital rights management an essential feature in the digital era (20)

Presentazione
PresentazionePresentazione
Presentazione
 
Drm
DrmDrm
Drm
 
Digital Libraries
Digital LibrariesDigital Libraries
Digital Libraries
 
What is DRM, Types of DRM
What is DRM, Types of DRMWhat is DRM, Types of DRM
What is DRM, Types of DRM
 
What is Digital Rights Management System and How does it work : Ameva Tech
What is Digital Rights Management System and How does it work : Ameva TechWhat is Digital Rights Management System and How does it work : Ameva Tech
What is Digital Rights Management System and How does it work : Ameva Tech
 
Digital rights management
Digital rights managementDigital rights management
Digital rights management
 
Drm metadata presentation fina lwith-notes
Drm metadata presentation fina lwith-notesDrm metadata presentation fina lwith-notes
Drm metadata presentation fina lwith-notes
 
E commerce economic essay assignment - www.topgradepapers.com
E commerce economic essay assignment - www.topgradepapers.comE commerce economic essay assignment - www.topgradepapers.com
E commerce economic essay assignment - www.topgradepapers.com
 
digital rights management for multimedia files
digital rights management for multimedia filesdigital rights management for multimedia files
digital rights management for multimedia files
 
What is DRM?
What is DRM? What is DRM?
What is DRM?
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
Information-Control.pptx
Information-Control.pptxInformation-Control.pptx
Information-Control.pptx
 
A Digital Rights Management System Based on Cloud
A Digital Rights Management System Based on CloudA Digital Rights Management System Based on Cloud
A Digital Rights Management System Based on Cloud
 
Intellectual Property Rights in the Digital Era.pptx
Intellectual Property Rights in the Digital Era.pptxIntellectual Property Rights in the Digital Era.pptx
Intellectual Property Rights in the Digital Era.pptx
 
DRM_Interoperability_Final
DRM_Interoperability_FinalDRM_Interoperability_Final
DRM_Interoperability_Final
 
Development of strategy for the e pub library of wu
Development  of strategy for the e pub library of wuDevelopment  of strategy for the e pub library of wu
Development of strategy for the e pub library of wu
 
Digital Rights management Software for a Research Company : Ameva Tech
 Digital Rights management Software for a Research Company : Ameva Tech Digital Rights management Software for a Research Company : Ameva Tech
Digital Rights management Software for a Research Company : Ameva Tech
 
Untitled presentation.pptx
Untitled presentation.pptxUntitled presentation.pptx
Untitled presentation.pptx
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
 
Software Piracy Protection
Software Piracy ProtectionSoftware Piracy Protection
Software Piracy Protection
 

Más de Kishor Satpathy

Knowledge Management in Higher Education
Knowledge Management in Higher EducationKnowledge Management in Higher Education
Knowledge Management in Higher Education
Kishor Satpathy
 
Glimpses of the Past: An Album on the 125th Birth Anniversary of Prof PC Moha...
Glimpses of the Past: An Album on the 125th Birth Anniversary of Prof PC Moha...Glimpses of the Past: An Album on the 125th Birth Anniversary of Prof PC Moha...
Glimpses of the Past: An Album on the 125th Birth Anniversary of Prof PC Moha...
Kishor Satpathy
 

Más de Kishor Satpathy (20)

Knowledge Management in Higher Education
Knowledge Management in Higher EducationKnowledge Management in Higher Education
Knowledge Management in Higher Education
 
Glimpses of the Past: An Album on the 125th Birth Anniversary of Prof PC Moha...
Glimpses of the Past: An Album on the 125th Birth Anniversary of Prof PC Moha...Glimpses of the Past: An Album on the 125th Birth Anniversary of Prof PC Moha...
Glimpses of the Past: An Album on the 125th Birth Anniversary of Prof PC Moha...
 
Emerging Trends and Human Resource Management in Library and Information Centres
Emerging Trends and Human Resource Management in Library and Information CentresEmerging Trends and Human Resource Management in Library and Information Centres
Emerging Trends and Human Resource Management in Library and Information Centres
 
Electronic Resource Management in 21st Century: Issues & Challenges
Electronic Resource Management in 21st Century: Issues & ChallengesElectronic Resource Management in 21st Century: Issues & Challenges
Electronic Resource Management in 21st Century: Issues & Challenges
 
German Language Course @ NIT Silchar
German Language Course @ NIT SilcharGerman Language Course @ NIT Silchar
German Language Course @ NIT Silchar
 
Lib 2.0: Issues & Challenges
Lib 2.0: Issues & ChallengesLib 2.0: Issues & Challenges
Lib 2.0: Issues & Challenges
 
Trends in Library Technology & Marketing of Information
Trends in Library Technology & Marketing of InformationTrends in Library Technology & Marketing of Information
Trends in Library Technology & Marketing of Information
 
CWN By Arup
CWN By ArupCWN By Arup
CWN By Arup
 
HPC in higher education
HPC in higher educationHPC in higher education
HPC in higher education
 
Enterprise campus networks
Enterprise campus networksEnterprise campus networks
Enterprise campus networks
 
ERP For Univ
ERP For UnivERP For Univ
ERP For Univ
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Research & Ranking
Research & RankingResearch & Ranking
Research & Ranking
 
Leveraging ICT for administrative efficiency- Need for a CIO
Leveraging ICT for administrative efficiency- Need for a CIOLeveraging ICT for administrative efficiency- Need for a CIO
Leveraging ICT for administrative efficiency- Need for a CIO
 
Innovation in Higher Education
Innovation in Higher EducationInnovation in Higher Education
Innovation in Higher Education
 
E learning & Information Literacy
E learning & Information LiteracyE learning & Information Literacy
E learning & Information Literacy
 
IGNITS @NIT Silchar
IGNITS @NIT SilcharIGNITS @NIT Silchar
IGNITS @NIT Silchar
 
Wnl sponsor 2 scopus
Wnl sponsor 2 scopusWnl sponsor 2 scopus
Wnl sponsor 2 scopus
 
Wnl sponsor 1 sciencedirect
Wnl sponsor 1 sciencedirectWnl sponsor 1 sciencedirect
Wnl sponsor 1 sciencedirect
 
Wnl `155 evaluation characteristics-operations and space by s k mandal
Wnl `155 evaluation characteristics-operations and space  by s k mandalWnl `155 evaluation characteristics-operations and space  by s k mandal
Wnl `155 evaluation characteristics-operations and space by s k mandal
 

Último

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Último (20)

fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 

Digital rights management an essential feature in the digital era

  • 1. 29th National Convention and Conference of 29th National Convention and Conference of SIS SIS on on Information-Innovation-Technology :: Information-Innovation-Technology Creating Seamless Linkages Creating Seamless Linkages Organised By :: Organised By Central Library, NIT, Silchar Central Library, NIT, Silchar 26th – 28th November, 2012 26th – 28th November, 2012
  • 2. DIGITAL RIGHTS MANAGEMENT : AN ESSENTIAL FEATURE IN THE DIGITAL ERA by JAYANTI CHAKRAVORTY & LANGMUANJOHN TONSING LIBRARY & INFORMATION ASSISTANTS CENTRAL LIBRARY, NATIONAL INSTITUTE OF TECHNOLOGY SILCHAR
  • 3. Introduction Advent of Digital Revolution since the later part of the 20th Century, coupled with invention of advanced ICT has brought in an integrated knowledge linkage and sharing mechanism around the world. It has opened up new opportunities to academicians, research scholars, students, information scientists, industrialists, business groups, others.
  • 4. But unfortunately, it has also brought in the menace of Digital Piracy and Violation of Copyright Laws. Digital Rights Management aims to stop this practice of piracy and help copyright holders safeguard their digital content. Back-Drop Prior to arrival of digital or electronic media, owners of copyright products and materials had business-legal objections to copying their D-products and D- materials.
  • 5. In early days of recorded sound in the 1960s, piracy was not a serious threat. But, introduction of magnetic tapes as a recording medium changed the situation. Arrival of digital media and analog / digital conversion technologies greatly increased the concern of copyright owners, particularly in music and motion picture industry, because they are much dependent on the revenue of their copyrighted works.
  • 6. Since early 1980s, software were being evolved to control Digital Piracy and in 1990s, laws started coming up. DRM was first popularized when Digital Millennium Copyright Act, was enacted in USA in 1998, which implemented two treaties of 1996 of World Intellectual Property Organization : WIPO Copyright Treaty, and WIPO Performance and Phonogram Treaty. Other WIPO Member-countries enacted similar laws subsequently.
  • 7. Definition Digital Rights Management is a combination of control devices and technologies that are used by : hardware manufacturers, software engineers, publishers, writers, dramatic and musical performers, individuals and copyright-holders with the intent to limit the use of digital content and devices after sale or publication.
  • 8. Historical Overview Earliest implementation of DRM was in the form of a concept, invented in 1983 by Ryoichi Mori,a Japanese-scientist. Named as ‘Software Service System’-SSS, it was the 1st generation of DRM. It attached focus on security and encryption as a measure to curb unauthorized copying. 2nd generation DRM came as Superdistribution Architecture - SdA, developed by Mori himself. An improvement over SSS, it covers tracking and monitoring of all form of rights, usages over both tangible and intangible assets and management of relationship with right holders.
  • 9. Evolution of DRM Architecture Development of DRM was in 4 specific stages : Level Key Concept Remarks 0 No physical protection Laws and ethics 1 Hardware protection Controlling Execution : Hardware Key Inhibiting Duplication : Copy Protection Non-compatible ROM 2 Customizing Software Customizing Deciphering key with Computer ID 1982 – GB Purdy, SPS 1984 – DJ Albert 1986 – A Herzberg, PPS 3 Execution Privileges SSS, 1983, Ryoichi Mori ABYSS, 1987, IBM 4 Superdistribution SdA, 1987, Ryoichi Mori
  • 10. Chronology of Development of DRM 1G DRM, SSS had the following components : A cryptographic wrapper for digital products that cannot be removed and remains in place whenever the product is copied. 2G DRM, SdA had the following properties : Software products are distributed without restriction, the user pays for the products. The vendor sets the terms and conditions of use. Products can be executed by any user having proper equipment, provided that, he adheres to the set terms. Proper operation of the system is ensured by temper resistant e-devices as digitally protected modules.
  • 11. DRM Framework An ideal DRM system is flexible, sufficiently transparent and a complex system, which a computer program generally cannot crack. The scheme operates on three parameters : Establishing copyright for a Digital Content Managing its proper distribution, and Controlling its application by the user. For effective implementation, a DRM Program has to define and describe three entities : The User, the Content and the Usage Rights
  • 12. DRM Architecture DRM Architecture consists of two vital components : Functional Architecture & Information Architecture as shown in the following diagram. DRM ARCHITECTURE FUNCTIONAL INFORMATION ARCHITECTURE ARCHITECTURE IP Assets Creation IP Assets IP Usage and Capture Management Modeling of Entities Identifying & describing Expressing statements entities sequentially regarding rights
  • 13. Functional Architecture covers three modules : Intellectual Property Assets Creation and Capture Intellectual Property Assets Management, and Intellectual Property Usage Information Architecture is concerned with : Modeling, Identifying and Describing the Entities sequentially and expressing statements of Rights. Information Architecture Core Entity Model is depicted in the following figure : Digital Contents Over Create/use Rights Own Users
  • 14. Application of DRM DRM Technologies are now used in the form of Restrictive Licensing Agreements. Technologies like, encryption, embedding of a tag and scrambling of expressive materials are used to control access and reproduction of on-line information. DRM Technologies are used for protecting digital contents like, film, television, recorded music, computer games, software packages, metadata, e-books, documents and others.
  • 15. Application of DRM in e-books Mainly four e-book formats, Mobipocket, Topaz, ePub and PDF are used to limit copying, printing and sharing of e-books. The Amazon Kindle uses Mobipocket and Topaz. Three main e-book DRM schemes in common use are, one each from Adobe, Apple and the Marlin Trust. Widely used sofware to view e-books are Adobe Reader and Microsoft Reader. Generally when an e-book reader opens a file, he finds the right statement outlining the pre-conditions for viewing, copying and printing etc. In Microsoft reader, there are three different levels of access control : sealed e-books, inscribed e- books and owner exclusive e-books.
  • 16. Application DRM in Documents Now-a-days, majority of the government agencies, financial institutions and professional companies store and process their information in digital format. Enterprise Digital Rights Management (E-DRM) is an improvised application of DRM Scheme to control access to these corporate digital documents which remain in various formats and in e-mails and internet web pages. E-DRM protects sensitive information by enforcing access and usage rights to the information throughout its lifecycle. There are three main phases of data lifecycle management that is considered in developing a viable security strategy : protection of data at rest, protection of data in transit and protection of data in use.
  • 17. Application DRM in Libraries Electronic Resource Management (ERM) poises to be an advancement indicator for modern Library functioning. ERM is the software used by Libraries to keep track of important information about e- resources, especially the internet-based ones, like e-journals, e- books and others. The development of ERM became necessary in the early 2000s, as it was evident that traditional Library Catalogues and Library systems were not designed to handle metadata and many other online products. Libraries receiving e-resources from publishers, vendors and copyright owners must understand, record and inform their users about the financial, legal, and access aspects of the resources.
  • 18. Features of ERM The main features of ERM systems include : Supporting acquisition and management of licensed e-resources. Providing descriptions of resources at the package (database) level and relate package contents (say an e-journal) to the package record. Encoding and perhaps publicly displaying licensed rights such as e-reserves, course- packs, and inter-library loan. Tracking e-resources from point of order through licensing and final access.
  • 19. DRM : The Task Ahead for the Library People Libraries are the Repositories of Information and Knowledge. Over the centuries, libraries have been helping hundreds of millions of people meet their work, study, research and other needs. They preserve our history and cultural heritage and promote our right to access information. In the present context, to achieve these goals, libraries need international copyright norms, together with limitations and exceptions. Legal flexibilities in copyright, known as limitations and exceptions, provide balance in a copyright system between users and creators of protected works.
  • 20. IFLA holds the view that : Copyright limitations and exceptions are fundamental for access of knowledge and thus for human and social development. IFLA and other Library organizations are working actively with WIPO Member Nations to foster support for enacting a binding international legal instrument on copyright limitations and exceptions enabling libraries to preserve their collections and support their users with the needed documents. It is time for the Library people, knowledge professionals, information scientists, scholars and students to get involved in mobilizing their respective National Governments and the world communities to shape an international law on copyright, that could satisfy the needs of the 21 st century libraries and could build up a seamless linkage across the world, dedicated to achieve common human welfare and prosperity through academic, scientific and social development.