Академический Документы
Профессиональный Документы
Культура Документы
Overview
DRM Concepts Piracy Scenarios DRM effectiveness Best Case DRM Common DRM Implementations DRM and your online business model Who is providing DRM?
DRM Concepts
Digital Rights Management (DRM) is any of several technologies used by publishers (or copyright owners) to control access to and usage of digital data (such as software, music, movies) and hardware. No DRM solution completely effective against piracy.
Web Video - tony@mediatonetv.com 3
Piracy Scenarios
Password Protection:
Subscriber pays once for content, then shares it with non-paying friends non-
Piracy Scenarios
Stream Recorders:
Hacker program that records incoming streaming media to a file, then redistributes the file.
Piracy Scenarios
DRM Hack Progams:
Hacker program locates hidden DRM key to unlock media, shares key with non-paying friends. non-
Piracy Scenarios
Fake Video Card:
Hacker program pretends to be real video card and saves media to disk, then redistributes file
Piracy Scenarios
Exploiting Video Output
Capture video out from computer into camcorder, reredigitize from tape, then redistibutes file.
Watermarking (mass-distribute physical content) (massVENDOR(s)=SmartMark technology VENDOR(s)=SmartMark assumes content will be pirated or shared illegally on some level, so it level, provides a way to trace content back to the original distribution. distribution. detain and prosecute digital media pirates not mainstream for online content yet
Web Video - tony@mediatonetv.com 10
12
13
Summary
DRM wont protect your content forever, but it can deter widespread distribution to non-paying customers. Dont go it alone, partner with a Content Delivery Network that provides DRM.
They all have custom implementations of DRM
14