SlideShare uma empresa Scribd logo
1 de 25
Baixar para ler offline
The Carrot or the Stick:
Opportunities and Challenges in Rights
Technologies
Bill Rosenblatt
November 4, 2013
About GiantSteps
Consultancy focused on content & rights technologies
Clients include copyright owners, service providers,
technology vendors
Advisory work for public policy and standards bodies
on digital copyright
Rights Technology Innovation in Asia-Pacific
450

70

400

60

350
50

Gross Expenditure
on R&D (USD Billion)

300
250

40

200

30

150
20
100

Rights Technologies
Output (research
papers)
Rights Technologies
R&D Index

10

50
0

0

Device Producers

Content Producers
Sources: OECD, IMF
Carrots and Sticks
Carrots and Sticks
and Rights Technologies
 Creative content
models
 Licensing
automation

 Encryption
(DRM, CAS)
 Piracy monitoring
 Upload filtering
Technologies
Encryption Technologies
DRM
– Generally refers to encrypted downloaded files

CAS
– Encryption of streams/signals over managed network

Stream encryption
– Over unmanaged network (Internet)
Where Has Encryption Succeeded?
 Time-bounded
access
 Content bundled
with devices

 Managing risk during
transition from
physical to digital
 Reducing personal
infringement
(“oversharing”)
Digital Transitions and DRM
 DRM manages risk in new digital markets
– Risk of infringement by tech-savvy early adopters
– Protection of service providers’ investment

 When leader emerges, DRM becomes less necessary
– Service providers’ investments recouped
– Inconvenience of leaving leader’s ecosystem is like form of DRM
– And competitors will respond with DRM-free anyway

 Case in point: music downloads
 E-books may be next
Time-Bounded Models

 Subscription music
 Subscription over the top video on demand
 Library e-book lending
 E-textbook rentals
Bundling Content with Devices

 Original bundled network/device model:
Managed networks, CAS
 Mobile phones with free music downloads

 Subsidized e-book “lending”:
Amazon Prime Kindle Owners’ Lending Library
Where Has Encryption Failed?
 Legacy emulations if kept around too long:
DRM for music downloads
 New time-based models if introduced too early:
e-book rentals
 Bundling content with unpopular devices:
Nokia & Sony Ericsson music services
Content Identification
Identify content on download or “in the wild”
Take action:
– Flag infringement
– Block upload
– Monetize with contextual ad
– Suggest legal alternative

Techniques
– Fingerprinting
– Watermarking
Content Identification Techniques







Watermarking
Embed invisible/inaudible data
before or during distribution
Can be up to a few dozen bytes
Software to detect watermarks
in files
Can contain user information
Content must be watermarked







Fingerprinting
No change to content required
Run sophisticated algorithm to
compute “fingerprint” of file
Match against fingerprint
database
Does not contain information
Works with all content
Where Has Content Identification Succeeded?
 Identifying music &
offering buy
opportunity (F)
 Monetizing uploads
with contextual ads
(F)
 Second screen apps
(F or W)

 “Social DRM” for ebooks (W)
 Extra protection with
DRM for high-value
video (W)
 Piracy monitoring
(mostly F)
 Filtering file uploads
(F)
Licensing Automation:
Identifiers & Rights Registries
Online database of rights information for content
Standard identifiers for content
Problem badly needs to be solved
Licensing Automation Challenges
Identifiers: what do they identify?
IP (abstract), product, whole vs. part
Machine-readable rights descriptions
Registry ownership, governance, maintenance
Private sector progress vs. antitrust concerns
Fragmentation by media type and geography
Too Many Standards
Identifiers
Music
 ISRC
 ISWC
 GRid
Publishing
 ISBN
 ISSN
 DOI

Video
 ISAN
 EIDR
 UMID
General
 URN
 URI
 Handle

Rights Description Languages








XRML
MPEG REL
ODRL
RightsML (news)
CC REL (Creative Commons)
PLUS (images)
PRISM RL (periodicals)
ID/Registry Initiatives
Public Sector/Non-profit
 Global Repertoire Database
(music)
 International Music Registry
(WIPO)
 UK Copyright Hub
 Copyright Data Clearinghouse
(Japan, music)
 Korean Copyright Exchange

Private Sector
 ImageIRC – Getty Images
 Book Rights Registry – Google
Missed Opportunity: Book Rights Registry
Content

Publishers
Publishers

Publishers

Metadata &
Rights
Payments

Content

Metadata,
Rights,
Payments

Book Rights
Registry

Payments

Metadata &
Rights

Service
Providers

Content

Libraries
Libraries

Libraries
Opportunities
Economic Incentives
Economics are the primary issue
Underlying economics of rights technologies:
– Copyright owners benefit
– Downstream entities bear much of the cost

Strategies:
– Lower the costs
– Turn sticks into carrots
Lower the Costs
Explore lightweight mechanisms to encourage
widespread adoption
Instead of “arms race,” match security strength to user
behavior and economic realities
Rely on anticircumvention laws in many countries
Develop policies that spread costs equitably throughout
content value chain
Convert Sticks to Carrots
Find a behavior that could be infringing
Find someone who benefits from it
Track and monetize the behavior
Best example:
감사합니다
Thank You
Bill Rosenblatt
GiantSteps Media Technology Strategies
www.giantstepsmts.com
billr@giantstepsmts.com
Blog: copyrightandtechnology.com
Twitter: @copyrightandtec
+1 212 956 1045

Mais conteúdo relacionado

Mais procurados

Fasoo Company And Product Information
Fasoo Company And Product InformationFasoo Company And Product Information
Fasoo Company And Product Informationpabatan
 
Peerless DRM and Enterprise Security-Enabled Removable Data Storage Cartridges
Peerless DRM and Enterprise Security-Enabled Removable Data Storage CartridgesPeerless DRM and Enterprise Security-Enabled Removable Data Storage Cartridges
Peerless DRM and Enterprise Security-Enabled Removable Data Storage CartridgesFred_C_Thomas
 
Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)pabatan
 
Anonos PR Newswire Press Release 07-09-15
Anonos PR Newswire Press Release 07-09-15Anonos PR Newswire Press Release 07-09-15
Anonos PR Newswire Press Release 07-09-15Ted Myerson
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowAct-On Software
 
Seclore File Secure Introduction Brief
Seclore File Secure Introduction   BriefSeclore File Secure Introduction   Brief
Seclore File Secure Introduction BriefNováccent
 
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...ProductNation/iSPIRT
 
From e-Readiness to e-Awareness (or the way back)
From e-Readiness to e-Awareness (or the way back)From e-Readiness to e-Awareness (or the way back)
From e-Readiness to e-Awareness (or the way back)Ismael Peña-López
 
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business PeopleDSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business PeopleAndris Soroka
 
Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepointpabatan
 

Mais procurados (11)

Fasoo Company And Product Information
Fasoo Company And Product InformationFasoo Company And Product Information
Fasoo Company And Product Information
 
Peerless DRM and Enterprise Security-Enabled Removable Data Storage Cartridges
Peerless DRM and Enterprise Security-Enabled Removable Data Storage CartridgesPeerless DRM and Enterprise Security-Enabled Removable Data Storage Cartridges
Peerless DRM and Enterprise Security-Enabled Removable Data Storage Cartridges
 
Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)
 
Anonos PR Newswire Press Release 07-09-15
Anonos PR Newswire Press Release 07-09-15Anonos PR Newswire Press Release 07-09-15
Anonos PR Newswire Press Release 07-09-15
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
 
Seclore File Secure Introduction Brief
Seclore File Secure Introduction   BriefSeclore File Secure Introduction   Brief
Seclore File Secure Introduction Brief
 
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
 
From e-Readiness to e-Awareness (or the way back)
From e-Readiness to e-Awareness (or the way back)From e-Readiness to e-Awareness (or the way back)
From e-Readiness to e-Awareness (or the way back)
 
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business PeopleDSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
 
Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepoint
 

Destaque

The united nations and the security council
The united nations and the security councilThe united nations and the security council
The united nations and the security councilFezekile Cokile
 
Self determination presentation
Self determination presentationSelf determination presentation
Self determination presentationJanet Van Heck
 
Nationalism
NationalismNationalism
Nationalismjrwv
 
Self determination theory
Self determination theorySelf determination theory
Self determination theoryJeannie Maraya
 

Destaque (6)

The united nations security council
The united nations security councilThe united nations security council
The united nations security council
 
The united nations and the security council
The united nations and the security councilThe united nations and the security council
The united nations and the security council
 
Security council
Security councilSecurity council
Security council
 
Self determination presentation
Self determination presentationSelf determination presentation
Self determination presentation
 
Nationalism
NationalismNationalism
Nationalism
 
Self determination theory
Self determination theorySelf determination theory
Self determination theory
 

Semelhante a Rights Technologies: Carrots, Sticks and the Path Forward

Authorship Drm Seminar
Authorship Drm SeminarAuthorship Drm Seminar
Authorship Drm Seminarcorinnejordan
 
DSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilDSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilAndris Soroka
 
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best PracticesE Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best PracticesDan York
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Andris Soroka
 
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...Andris Soroka
 
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your InformationAIIM International
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professionalciso_insights
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic ChallengesJorge Sebastiao
 
The evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivityThe evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivityAPNIC
 
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...Black Duck by Synopsys
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)Andris Soroka
 
Digital rights management an essential feature in the digital era
Digital rights management an essential feature in the digital eraDigital rights management an essential feature in the digital era
Digital rights management an essential feature in the digital eraKishor Satpathy
 
2008 Trends
2008 Trends2008 Trends
2008 TrendsTBledsoe
 
Achieving Data Privacy in the Enterprise
Achieving Data Privacy in the EnterpriseAchieving Data Privacy in the Enterprise
Achieving Data Privacy in the EnterpriseSafeNet
 
An Ethical Exploration of Privacy andRadio Frequency Ident.docx
An Ethical Exploration of Privacy andRadio Frequency Ident.docxAn Ethical Exploration of Privacy andRadio Frequency Ident.docx
An Ethical Exploration of Privacy andRadio Frequency Ident.docxnettletondevon
 

Semelhante a Rights Technologies: Carrots, Sticks and the Path Forward (20)

Digital Rights Management
Digital Rights Management Digital Rights Management
Digital Rights Management
 
Authorship Drm Seminar
Authorship Drm SeminarAuthorship Drm Seminar
Authorship Drm Seminar
 
DSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilDSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_April
 
Digital Libraries
Digital LibrariesDigital Libraries
Digital Libraries
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best PracticesE Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
 
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
 
Rights Technologies for E-Publishing
Rights Technologies for E-PublishingRights Technologies for E-Publishing
Rights Technologies for E-Publishing
 
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
 
Drm
DrmDrm
Drm
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
 
The evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivityThe evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivity
 
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
Digital rights management an essential feature in the digital era
Digital rights management an essential feature in the digital eraDigital rights management an essential feature in the digital era
Digital rights management an essential feature in the digital era
 
2008 Trends
2008 Trends2008 Trends
2008 Trends
 
Achieving Data Privacy in the Enterprise
Achieving Data Privacy in the EnterpriseAchieving Data Privacy in the Enterprise
Achieving Data Privacy in the Enterprise
 
An Ethical Exploration of Privacy andRadio Frequency Ident.docx
An Ethical Exploration of Privacy andRadio Frequency Ident.docxAn Ethical Exploration of Privacy andRadio Frequency Ident.docx
An Ethical Exploration of Privacy andRadio Frequency Ident.docx
 

Mais de GiantSteps Media Technology Strategies

Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?GiantSteps Media Technology Strategies
 
Copyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysisCopyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysisGiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...GiantSteps Media Technology Strategies
 
International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright   Arthur Hoyle, Univ of CanberraInternational Perspectives on Digital Copyright   Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright Arthur Hoyle, Univ of CanberraGiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...GiantSteps Media Technology Strategies
 

Mais de GiantSteps Media Technology Strategies (20)

Enabling Efficient and Fair Markets for Digital Content
Enabling Efficient and Fair Markets for Digital ContentEnabling Efficient and Fair Markets for Digital Content
Enabling Efficient and Fair Markets for Digital Content
 
Digital Disruption of the Book Publishing Industry
Digital Disruption of the Book Publishing IndustryDigital Disruption of the Book Publishing Industry
Digital Disruption of the Book Publishing Industry
 
Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?
 
Copyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysisCopyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysis
 
The landscape of content protection technology
The landscape of content protection technologyThe landscape of content protection technology
The landscape of content protection technology
 
You bought it, but do you own it?
You bought it, but do you own it?You bought it, but do you own it?
You bought it, but do you own it?
 
Standards success factors
Standards success factorsStandards success factors
Standards success factors
 
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
 
International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright   Arthur Hoyle, Univ of CanberraInternational Perspectives on Digital Copyright   Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra
 
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
 
Copyright and Technology London 2012: Eric Walter, Hadopi
Copyright and Technology London 2012: Eric Walter, HadopiCopyright and Technology London 2012: Eric Walter, Hadopi
Copyright and Technology London 2012: Eric Walter, Hadopi
 
Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...
 
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
 
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
 
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
 
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
 
Copyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler PresentationCopyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler Presentation
 
Copyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler PresentationCopyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler Presentation
 
Copyright and Technology 2011: Hillel Parness Presentation
Copyright and Technology 2011: Hillel Parness PresentationCopyright and Technology 2011: Hillel Parness Presentation
Copyright and Technology 2011: Hillel Parness Presentation
 
Copyright and Technology 2011: Opening Remarks - Bill Rosenblatt
Copyright and Technology 2011: Opening Remarks - Bill RosenblattCopyright and Technology 2011: Opening Remarks - Bill Rosenblatt
Copyright and Technology 2011: Opening Remarks - Bill Rosenblatt
 

Último

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 

Último (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 

Rights Technologies: Carrots, Sticks and the Path Forward

  • 1. The Carrot or the Stick: Opportunities and Challenges in Rights Technologies Bill Rosenblatt November 4, 2013
  • 2. About GiantSteps Consultancy focused on content & rights technologies Clients include copyright owners, service providers, technology vendors Advisory work for public policy and standards bodies on digital copyright
  • 3. Rights Technology Innovation in Asia-Pacific 450 70 400 60 350 50 Gross Expenditure on R&D (USD Billion) 300 250 40 200 30 150 20 100 Rights Technologies Output (research papers) Rights Technologies R&D Index 10 50 0 0 Device Producers Content Producers Sources: OECD, IMF
  • 5. Carrots and Sticks and Rights Technologies  Creative content models  Licensing automation  Encryption (DRM, CAS)  Piracy monitoring  Upload filtering
  • 7. Encryption Technologies DRM – Generally refers to encrypted downloaded files CAS – Encryption of streams/signals over managed network Stream encryption – Over unmanaged network (Internet)
  • 8. Where Has Encryption Succeeded?  Time-bounded access  Content bundled with devices  Managing risk during transition from physical to digital  Reducing personal infringement (“oversharing”)
  • 9. Digital Transitions and DRM  DRM manages risk in new digital markets – Risk of infringement by tech-savvy early adopters – Protection of service providers’ investment  When leader emerges, DRM becomes less necessary – Service providers’ investments recouped – Inconvenience of leaving leader’s ecosystem is like form of DRM – And competitors will respond with DRM-free anyway  Case in point: music downloads  E-books may be next
  • 10. Time-Bounded Models  Subscription music  Subscription over the top video on demand  Library e-book lending  E-textbook rentals
  • 11. Bundling Content with Devices  Original bundled network/device model: Managed networks, CAS  Mobile phones with free music downloads  Subsidized e-book “lending”: Amazon Prime Kindle Owners’ Lending Library
  • 12. Where Has Encryption Failed?  Legacy emulations if kept around too long: DRM for music downloads  New time-based models if introduced too early: e-book rentals  Bundling content with unpopular devices: Nokia & Sony Ericsson music services
  • 13. Content Identification Identify content on download or “in the wild” Take action: – Flag infringement – Block upload – Monetize with contextual ad – Suggest legal alternative Techniques – Fingerprinting – Watermarking
  • 14. Content Identification Techniques      Watermarking Embed invisible/inaudible data before or during distribution Can be up to a few dozen bytes Software to detect watermarks in files Can contain user information Content must be watermarked      Fingerprinting No change to content required Run sophisticated algorithm to compute “fingerprint” of file Match against fingerprint database Does not contain information Works with all content
  • 15. Where Has Content Identification Succeeded?  Identifying music & offering buy opportunity (F)  Monetizing uploads with contextual ads (F)  Second screen apps (F or W)  “Social DRM” for ebooks (W)  Extra protection with DRM for high-value video (W)  Piracy monitoring (mostly F)  Filtering file uploads (F)
  • 16. Licensing Automation: Identifiers & Rights Registries Online database of rights information for content Standard identifiers for content Problem badly needs to be solved
  • 17. Licensing Automation Challenges Identifiers: what do they identify? IP (abstract), product, whole vs. part Machine-readable rights descriptions Registry ownership, governance, maintenance Private sector progress vs. antitrust concerns Fragmentation by media type and geography
  • 18. Too Many Standards Identifiers Music  ISRC  ISWC  GRid Publishing  ISBN  ISSN  DOI Video  ISAN  EIDR  UMID General  URN  URI  Handle Rights Description Languages        XRML MPEG REL ODRL RightsML (news) CC REL (Creative Commons) PLUS (images) PRISM RL (periodicals)
  • 19. ID/Registry Initiatives Public Sector/Non-profit  Global Repertoire Database (music)  International Music Registry (WIPO)  UK Copyright Hub  Copyright Data Clearinghouse (Japan, music)  Korean Copyright Exchange Private Sector  ImageIRC – Getty Images  Book Rights Registry – Google
  • 20. Missed Opportunity: Book Rights Registry Content Publishers Publishers Publishers Metadata & Rights Payments Content Metadata, Rights, Payments Book Rights Registry Payments Metadata & Rights Service Providers Content Libraries Libraries Libraries
  • 22. Economic Incentives Economics are the primary issue Underlying economics of rights technologies: – Copyright owners benefit – Downstream entities bear much of the cost Strategies: – Lower the costs – Turn sticks into carrots
  • 23. Lower the Costs Explore lightweight mechanisms to encourage widespread adoption Instead of “arms race,” match security strength to user behavior and economic realities Rely on anticircumvention laws in many countries Develop policies that spread costs equitably throughout content value chain
  • 24. Convert Sticks to Carrots Find a behavior that could be infringing Find someone who benefits from it Track and monetize the behavior Best example:
  • 25. 감사합니다 Thank You Bill Rosenblatt GiantSteps Media Technology Strategies www.giantstepsmts.com billr@giantstepsmts.com Blog: copyrightandtechnology.com Twitter: @copyrightandtec +1 212 956 1045