Upload
pearl-shepherd
View
222
Download
0
Embed Size (px)
Citation preview
1
Copyright Protection and Digital Rights Management
2
Copyright protectionA form of intellectual property rights law
that protect original works of ownership.Does not protect ideas, facts, parodies.Registration done by the Library of
congress for $30. • Commercial companies offer legal help
for $20-$200Certification can be done on-line• (Active for life span of author plus
45 years)
3
Loopholes to copyright protection
Fair use lawsRegional jurisdictionsEnforcement mechanismsTechnological changes and
better software Social media and cultural norms.
4
Digital Rights Management
Collection of systems used to protect the copyrights of electronic media.
• Apple iTunes uses it to limit access to songs.
Ensures Publishers of rightful revenue for their work
• Longer shelf life• Easy access to digital files and storage.• Technological advances in the Internet
streaming and quality videos.
5
Digital Rights Management
Useful in trading, controlling and tracking digital media.
Limits the illegal Propagation of Copyright material.
Uses watermarks or Propriety file encryption to restrict access to files.
• Setting servers to block forwarding message• Software in DVDs to limit number of copies to 2• Music labels include bits of information that
confuses ripping software
6
DRM systems
Wipo laws and Digital Millennium Act Watermarks And Encryption logarithm• Watermarks found in broadcasts and DVR operation Encryption system is a content scrambling
system(CSS) A decryption key or processing key is needed • Limits access and recording or playback. Microsoft uses the PVP(proven video path)
drm that can encrypt information to the monitor.
All models of a particular brand have shared decryption key.
7
HD/Blue ray Systems
• Use the Advanced access content system(AACS)
• Major companies united to control optical and HD file sharing
Major difference with CSS is in the way decryption keys are organized.
Advanced systems use a binary tree structure.• Processing key, volume id, decryption key and
device key all needed to operate .
8
Copyright Protection/DRM Trends
Increased Internet software (strip copy software) to decrypt DRMs.
Social and cultural norms about copyright.
Inability to regulate the Internet.Critics complain about competitive
laws.Ownership and how to control
digital data.