8
Copyright Protection and Digital Rights Management 1

C opyright Protection and Digital Rights Management 1

Embed Size (px)

Citation preview

Page 1: C opyright Protection and Digital Rights Management 1

1

Copyright Protection and Digital Rights Management

Page 2: C opyright Protection and Digital Rights Management 1

2

Copyright protectionA form of intellectual property rights law

that protect original works of ownership.Does not protect ideas, facts, parodies.Registration done by the Library of

congress for $30. • Commercial companies offer legal help

for $20-$200Certification can be done on-line• (Active for life span of author plus

45 years)

Page 3: C opyright Protection and Digital Rights Management 1

3

Loopholes to copyright protection

Fair use lawsRegional jurisdictionsEnforcement mechanismsTechnological changes and

better software Social media and cultural norms.

Page 4: C opyright Protection and Digital Rights Management 1

4

Digital Rights Management

Collection of systems used to protect the copyrights of electronic media.

• Apple iTunes uses it to limit access to songs.

Ensures Publishers of rightful revenue for their work

• Longer shelf life• Easy access to digital files and storage.• Technological advances in the Internet

streaming and quality videos.

Page 5: C opyright Protection and Digital Rights Management 1

5

Digital Rights Management

Useful in trading, controlling and tracking digital media.

Limits the illegal Propagation of Copyright material.

Uses watermarks or Propriety file encryption to restrict access to files.

• Setting servers to block forwarding message• Software in DVDs to limit number of copies to 2• Music labels include bits of information that

confuses ripping software

Page 6: C opyright Protection and Digital Rights Management 1

6

DRM systems

Wipo laws and Digital Millennium Act Watermarks And Encryption logarithm• Watermarks found in broadcasts and DVR operation Encryption system is a content scrambling

system(CSS) A decryption key or processing key is needed • Limits access and recording or playback. Microsoft uses the PVP(proven video path)

drm that can encrypt information to the monitor.

All models of a particular brand have shared decryption key.

Page 7: C opyright Protection and Digital Rights Management 1

7

HD/Blue ray Systems

• Use the Advanced access content system(AACS)

• Major companies united to control optical and HD file sharing

Major difference with CSS is in the way decryption keys are organized.

Advanced systems use a binary tree structure.• Processing key, volume id, decryption key and

device key all needed to operate .

Page 8: C opyright Protection and Digital Rights Management 1

8

Copyright Protection/DRM Trends

Increased Internet software (strip copy software) to decrypt DRMs.

Social and cultural norms about copyright.

Inability to regulate the Internet.Critics complain about competitive

laws.Ownership and how to control

digital data.