SlideShare une entreprise Scribd logo
1  sur  41
Télécharger pour lire hors ligne
Slide 1




             The Trajectory of DRM Technologies:
                  Past, Present, and Future
                                                           Bill Rosenblatt
                                              GiantSteps Media Technology Strategies
                                                          +1 212 956 1045
                                                     billr@giantstepsmts.com
                                                      www.giantstepsmts.com

    © 2009
                GiantSteps                                        1
                Media Technology Strategies
Slide 2


                                                      Outline

                         How DRM technologies developed
                         Factors influencing their evolution
                                           – Lessig’s 4 factors
                         The current state
                         Possibilities for the future




    © 2009
             GiantSteps                                      2
             Media Technology Strategies
Slide 3




                             How DRM Technologies
                                  Developed




    © 2009
             GiantSteps                    3
             Media Technology Strategies
Slide 4


                  The Birth of DRM: Mid-1990s

     Conference: Technological Strategies for Protecting Intellectual
      Property in the Networked Multimedia Environment, late 1993,
      Washington DC
             – Sponsored by Coalition for Networked Information, Interactive
               Multimedia Association, MIT, and Harvard Kennedy School of
               Government
     White Paper: Mark Stefik, Xerox PARC, Letting Loose the Light:
      Igniting Commerce in Electronic Publication, 1994
             – Appears as chapter in Internet Dreams, MIT Press, 1996
     First important patent applications filed

    © 2009
                  GiantSteps                    4
                  Media Technology Strategies
Slide 5


                                             Early Technologies

          CD-ROM Protection (mid-90s)                                1996-1997
                  CD-MAX                                    DeskGate
                  CrypKey                                   Digital River
                  InfoSafe                                  IBM Cryptolope
                  TestDrive                                 EPR/InterTrust DigiBox
                  TTR                                       Liquid Audio
                                                             ZipLock (Portland Software)




    © 2009
               GiantSteps                             5
               Media Technology Strategies
Slide 6


                                               Early Technologies

                                       1998                            1999
                DMOD                                          Alchemedia
                FileOpen                                      Authentica (now EMC)
                Greenleaf                                     ContentGuard (Xerox)
                MediaDNA                                      Infraworks (now Liquid
                NetQuartz                                      Machines)
                Phocis                                        NetActive
                Preview Systems                               Perimele
                RightsMarket (TragoeS)                        PublishOne
                Softlock                                      SDC (now Packet Video)
                ViaTech                                       VYou

    © 2009
                 GiantSteps                             6
                 Media Technology Strategies
Slide 7


                                   How Were These Sold?

          Legal dept: Make the Internet safe for your content
             – Print documents -> protected PDFs
             – CDs -> digital music files
          Marketing: Enable new business models for content
             – Pay per view
             – Subscription
             – Site licenses



    © 2009
                GiantSteps                    7
                Media Technology Strategies
Slide 8


                                            What Happened?

          Bubble burst
          Content owners would not pay, and/or
           vendors charged too much
          Business models were not developed or marketed
          DRM became subsidiary to platform control
           (formats, codecs, players)



    © 2009
              GiantSteps                           8
              Media Technology Strategies
Slide 9


                           Second Bubble ca. 2005:
                                   Mobile
                   OMA DRM                           Others
                CoreMedia                        SDC
                Viaccess                         Melodeo
                Beep Science                     Teruten
                Lockstream/Irdeto                INKA (Netsync)
                Access
                NDS
                Discretix
                Etc.


    © 2009
             GiantSteps                    9
             Media Technology Strategies
Slide 10

             A Pseudo-Scientific DRM Market Barometer:
                   Vendors on Trade Show Floors
                    16
                    14
                    12
                    10
                       8
                       6
                       4
                       2
                       0
                                  1h99 2h99 1h00 2h00 1h01 2h01 1h02 2h02 … 1h04 2h04 2h05 … 2h07




    © 2009
               GiantSteps                                      10
               Media Technology Strategies
Slide 11


                                 The DRM Scene Today:
                                        Music
             Internet: DRM confined to subscription services
               – E.g. Napster, Rhapsody
               – DRMs: mostly Microsoft WM DRM 10/11
             Mobile: various DRM-based models
               – Device/music bundles: Nokia Comes With Music,
                 Sony Ericsson PlayNow Plus
               – Subscription models
               – Paid downloads
               – DRMs: OMA DRM, Microsoft WM DRM,
                 Microsoft PlayReady, SDC
    © 2009
                GiantSteps                    11
                Media Technology Strategies
Slide 12


                              The DRM Scene Today:
                                     Video
                        Internet: download and rental services
                                     – Apple iTunes: FairPlay
                                     – Blockbuster, CinemaNow, others: WM DRM
                        Mobile: digital broadcast, WiFi
                                     – OMA BCAST Profile
                        IPTV, TelcoTV, Digital Cable
                                     –     CA vendors (Irdeto, Nagra, NDS, etc.)
                                     –     Marlin
                                     –     Widevine
                                     –     Verimatrix
                                     –     SecureMedia
    © 2009
             GiantSteps                                      12
             Media Technology Strategies
Slide 13


                               The DRM Scene Today:
                                     E-Books
              Amazon
                   – Mobipocket DRM
                   – Kindle, iPhone, other portables
              EReader
                   – Partnership with Barnes & Noble, #1 US book retailer
                   – Proprietary DRM
                   – PC, Mac, iPhone, other portables
              Adobe
                   – Sony, IREX, Plastic Logic, other e-book devices
                   – Content Server DRM
                   – PC, Mac, iPhone
    © 2009
              GiantSteps                     13
              Media Technology Strategies
Slide 14


                                 The DRM Scene Today:
                                      Enterprise
       Corporate/institutional applications
       Became a distinct subfield in ~2003
       Now considered part of Content Management market
       Leading vendors:
             – Microsoft & partners
             – EMC (Authentica)
             – Oracle (SealedMedia)
             – Adobe

    © 2009
                GiantSteps                    14
                Media Technology Strategies
Slide 15


           Pioneering DRMs that Didn’t Survive

                                            Intertrust
                                              – Digibox/InterRightsPoint
                                              – RightsSystem
                                            IBM
                                              – infoMarket
                                              – EMMS




    © 2009
              GiantSteps                                  15
              Media Technology Strategies
Slide 16


              Larry Lessig’s Four Factors*

                                           Architecture (technology)
                                           Norms (behaviors)
                                           Law
                                           Market (economics)




                                                      *Code and Other Laws of Cyberspace, 1999, pp. 88-90
    © 2009
             GiantSteps                                 16
             Media Technology Strategies
Slide 17


                                                 Architecture

                  Technology Enablers                                Criteria
                File encryption                           Ease of use
                Network connectivity &                    Maintenance of user rights &
                 bandwidth                                  expectations
                License management                        Security effectiveness
                Rule specifications & RELs                Low support costs




    © 2009
                   GiantSteps                          17
                   Media Technology Strategies
Slide 18


                                                  Norms

                    Sources of Norms                                Criteria
                Popular online tool usage                Necessity of DRM in the first
                 patterns                                  place
                Trust                                    Height of barriers
                Opinions of thought leaders
                Motivations of hackers




    © 2009
                    GiantSteps                      18
                    Media Technology Strategies
Slide 19


                                                Law

                        Laws                                     Criteria
            Copyright infringement liability        Technological implementability
            Content usage rights                    User comprehensibility
            Anticircumvention                       Balance of burden
                                                     Effect on legitimate uses of
                                                      technology and innovation




    © 2009
                  GiantSteps                     19
                  Media Technology Strategies
Slide 20


                                                 Market

                    Economic Factors                            Criteria
                Compensation for content             Alignment of economic
                 creators                              incentives
                Investment in technology             Maximization of value to
                 development and R&D                   consumer through alternative
                Consumer value and choice             offers
                The pull of free                     Maximization of value to
                                                       publisher despite alternative
                                                       sources



    © 2009
                   GiantSteps                       20
                   Media Technology Strategies
Slide 21


                Factors Against DRM Success

             Market:
               – Economic incentives misaligned
             Norms:
               – Users don’t see value in choices of offers
               – Norms distorted by architecture (technology)
             Architecture:
               – Technological innovation hampered
             Laws:
               – Laws not amenable to technological implementation
    © 2009
                GiantSteps                    21
                Media Technology Strategies
Slide 22


               Economic Incentives Misaligned

     Content owners demand it but will not pay for it
             – Despite high expenditures on “anti-piracy services”
             – Claim that content protection is responsibility of technology
               vendors who want to offer access to their content
     CE vendors use it to suit their own purposes
             – Platform lock-in
     Consumers have no direct say in deliberations
             – Only indirect market forces
     In the end, music companies got what they paid for
    © 2009
                  GiantSteps                    22
                  Media Technology Strategies
Slide 23


     Consumers Don’t See Value in Choices
                 of Offers
     Expensive to educate consumers about unfamiliar
      offerings
             – Apple had huge marketing budget to educate about
               unbundled albums
             – But Rhapsody, Napster, etc. didn’t educate sufficiently
               about subscription services
     Focus is on getting rights equivalent to offline content
             – Perception: pay == ownership && free == radio;
               therefore the only improvement is free == ownership

    © 2009
                 GiantSteps                    23
                 Media Technology Strategies
Slide 24


           Users Influenced towards Infringing
                        Behavior
    Definition of DRM commandeered by the press
             – Narrower than original definitions
             – Yet broadened to apply to any technology that restricts user
               behavior in any way
    Notion that DRM == Big Media == evil
    Romanticism & rationalization of hacker/pirate ethic



    © 2009
                  GiantSteps                    24
                  Media Technology Strategies
Slide 25


           Technological Innovation Hampered

             Lack of revenue for DRM vendors
             Venture capital scared off
                        – Bad press
                        – Non-sexy topic
             Researchers scared off
                        – RIAA actions against Prof. Ed Felten in 1999
                        – DRM research “politically incorrect” in US



    © 2009
              GiantSteps                     25
              Media Technology Strategies
Slide 26


                    Laws Not Amenable to
                 Technological Implementation
       Fair Use/Fair Deailing laws notoriously hard to automate
             – EU Private Copying less so
       Privacy and due process are important but become obstacles
             – French Loi HADOPI
       Anticircumvention laws reduce incentive to develop effective
        technologies
             –   1993-6 accommodation between content and telecoms industries
             –   WIPO Copyright Treaty, EU Copyright Directive, US DMCA
             –   Liability solely on the hacker
             –   Important US appeals court case: Universal v. Reimerdes, 2000

    © 2009
                   GiantSteps                    26
                   Media Technology Strategies
Slide 27


                                        A Few Success Stories

                      Apple FairPlay                       Pay TV Digital CAS
              “Cheap and dirty” DRM                  Cable operators want to protect
              Component in first successful           signals from theft
               digital music application              “Walled garden” systems
              Educated consumers about                (no PCs)
               unbundling of albums                   Limited alternatives
              Tightly tied to hardware and           Lesson:
               software, no boundary glitches          Alignment of economic
              Lesson:                                 incentives
               Hardware vendor discovers
               how to benefit from DRM
    © 2009
                   GiantSteps                     27
                   Media Technology Strategies
Slide 28


                                       A Few Success Stories

             OverDrive E-Book Lending                     AACS (Blu-ray)
            Adobe Content Server supports e-      Designed to address problems
             book lending                           with CSS for DVDs
            E-Book lending expands power of       Costlier DRM in costlier product
             library services despite lack of      Graceful hack recovery
             marketing ability                     Impact of hacks overstated in
            Small market well served by            press
             single vendor, encourages             DVD industry forced to improve
             efficiency                             functionality
            Lesson: True expansion of             Lesson: Better DRM costs more
             consumer choices through DRM           money

    © 2009
                  GiantSteps                     28
                  Media Technology Strategies
Slide 29


           Status of Rights Technologies Today

                                            File encryption
                                            License management
                                            Rule specifications & RELs




    © 2009
              GiantSteps                                 29
              Media Technology Strategies
Slide 30


                                            Encryption

             Crypto algorithms were never an issue
             Cost is the issue
                  – Key management schemes
                  – Hardware vs. software key storage
             Software key management has gotten better
                  – Graceful failure e.g. AACS




    © 2009
              GiantSteps                         30
              Media Technology Strategies
Slide 31


                                      License Management

                                           Flexibility, yes
                                           Transparency, no




    © 2009
             GiantSteps                            31
             Media Technology Strategies
Slide 32


                     Rights Specifications/RELs

    Technology applicable outside of encryption
    Complex starting point was probably necessary
             – Emulate offline/legacy licensing models
    But didn’t work
             – XrML designed by engineers for engineers
    Market needed time to find opportunities for simplicity
             – Remember ICE? Me neither.
             – Remember RSS? Of course.

    © 2009
                 GiantSteps                    32
                 Media Technology Strategies
Slide 33




                                           Future Possibilities




    © 2009
             GiantSteps                              33
             Media Technology Strategies
Slide 34


                                           Grow from Simplicity

    Emulation of legacy models is doomed to failure
             – Consumer expectations
             – Technological complexity
             – Misaligned economics
    New business models based on simpler technology can
     succeed
             – Create models to fit new opportunities
             – Build complexity from the ground up instead


    © 2009
                  GiantSteps                         34
                  Media Technology Strategies
Slide 35


                                    UGC Will Lead the Way

            YouTube, DailyMotion, Flickr, Scribd, MySpace are the 0.X
             models
            Volume dwarfs that of commercial content
            UGC needs rights management too
            Exposure is important, but so are monetization and use
             tracking
            “Profit from abundance” is not inconsistent with rights
             management
            Ultimately, “commercial content” = “marketing investment”
    © 2009
                 GiantSteps                    35
                 Media Technology Strategies
Slide 36


                  Bet on These Technologies

                           Rights languages
                           Content identification
                           Connected devices and streaming




    © 2009
             GiantSteps                    36
             Media Technology Strategies
Slide 37


                                                Rights Languages

    Creative Commons
             – When services use it to make money, it’s no longer a
               “religion”
             – Note how “free” became “open source”
             – Commercial content owners beginning to look at it seriously
    ODRL
             – Moving beyond encryption applications
             – Making all the right moves: subsetting, PLUS, CC


    © 2009
                  GiantSteps                            37
                  Media Technology Strategies
Slide 38


                                          Content Identification

                      Fingerprinting                            Watermarking
              Easy to implement now                     Requires “connecting the dots”
              Works with content “as is”                Requires insertion
              Difficult at the ISP level                Easier at the ISP level
              Poor integration with rights              Good integration with rights
               languages                                  languages
              Not much benefit from                     Would benefit greatly from
               standardization                            standardization
              Too many vendors, market ripe             Market has already
               for consolidation                          consolidated

    © 2009
                   GiantSteps                        38
                   Media Technology Strategies
Slide 39


             Connected Devices and Streaming

           License management becomes much easier
              – No slave device transfer issues
           Encryption becomes less disruptive
           Consumer expectations shift away from ownership
              – Services no longer devolve to “MP3 delivery” model




    © 2009
                GiantSteps                    39
                Media Technology Strategies
Slide 40


                      Will Classic DRM Survive?

             Yes, where it supports new content models
                    – Subscription
                    – Personal network boundary setting
                    – Hardware or service provider boundary setting




    © 2009
              GiantSteps                    40
              Media Technology Strategies
Slide 41




                                                        Bill Rosenblatt
                                           GiantSteps Media Technology Strategies
                                                  billr@giantstepsmts.com
                                                       +1 212 956 1045
                                                   www.giantstepsmts.com



    © 2009
             GiantSteps                                       41
             Media Technology Strategies

Contenu connexe

Tendances

Triangle InfoSecon Conference program 2011
Triangle InfoSecon Conference program   2011Triangle InfoSecon Conference program   2011
Triangle InfoSecon Conference program 2011Travis Barnes
 
Making it happy_with_mobile_content_management
Making it happy_with_mobile_content_managementMaking it happy_with_mobile_content_management
Making it happy_with_mobile_content_managementQuestexConf
 
Saiful hidayat strengthening cooperation in ict research & development best...
Saiful hidayat strengthening cooperation in ict research & development   best...Saiful hidayat strengthening cooperation in ict research & development   best...
Saiful hidayat strengthening cooperation in ict research & development best...Saiful Hidayat
 
Fortinet brochure by GTEC CxA
Fortinet brochure by GTEC CxAFortinet brochure by GTEC CxA
Fortinet brochure by GTEC CxAGTEC CxA
 
DLP - Network Security Conference_ Ramsés Gallego
DLP - Network Security Conference_ Ramsés GallegoDLP - Network Security Conference_ Ramsés Gallego
DLP - Network Security Conference_ Ramsés GallegoRamsés Gallego
 
m2m for the Security Industry
m2m for the Security Industrym2m for the Security Industry
m2m for the Security IndustrySMiUtilities
 

Tendances (10)

lte
 lte lte
lte
 
Triangle InfoSecon Conference program 2011
Triangle InfoSecon Conference program   2011Triangle InfoSecon Conference program   2011
Triangle InfoSecon Conference program 2011
 
The Requirement for ECMS
The Requirement for ECMSThe Requirement for ECMS
The Requirement for ECMS
 
Asigra Story
Asigra StoryAsigra Story
Asigra Story
 
Making it happy_with_mobile_content_management
Making it happy_with_mobile_content_managementMaking it happy_with_mobile_content_management
Making it happy_with_mobile_content_management
 
Saiful hidayat strengthening cooperation in ict research & development best...
Saiful hidayat strengthening cooperation in ict research & development   best...Saiful hidayat strengthening cooperation in ict research & development   best...
Saiful hidayat strengthening cooperation in ict research & development best...
 
Fortinet brochure by GTEC CxA
Fortinet brochure by GTEC CxAFortinet brochure by GTEC CxA
Fortinet brochure by GTEC CxA
 
Curated Computing
Curated Computing Curated Computing
Curated Computing
 
DLP - Network Security Conference_ Ramsés Gallego
DLP - Network Security Conference_ Ramsés GallegoDLP - Network Security Conference_ Ramsés Gallego
DLP - Network Security Conference_ Ramsés Gallego
 
m2m for the Security Industry
m2m for the Security Industrym2m for the Security Industry
m2m for the Security Industry
 

Similaire à The Trajectory Of DRM Technologies

digital rights management for multimedia files
digital rights management for multimedia filesdigital rights management for multimedia files
digital rights management for multimedia filesApurva Vyas
 
Mark Logic Digital Publishing Summit, Kellogg
Mark Logic Digital Publishing Summit, KelloggMark Logic Digital Publishing Summit, Kellogg
Mark Logic Digital Publishing Summit, KelloggDave Kellogg
 
The NRB Group mainframe day 2021 - Security On Z - Guillaume Hoareau
The NRB Group mainframe day 2021 - Security On Z - Guillaume HoareauThe NRB Group mainframe day 2021 - Security On Z - Guillaume Hoareau
The NRB Group mainframe day 2021 - Security On Z - Guillaume HoareauNRB
 
Lecture # 1
Lecture # 1Lecture # 1
Lecture # 1Mr SMAK
 
DDS Interoperability Demo
DDS Interoperability DemoDDS Interoperability Demo
DDS Interoperability DemoAngelo Corsaro
 
The Long Road To Profitable Digital Media Innovation - Digibiz'09
The Long Road To Profitable Digital Media Innovation  - Digibiz'09The Long Road To Profitable Digital Media Innovation  - Digibiz'09
The Long Road To Profitable Digital Media Innovation - Digibiz'09Digibiz'09 Conference
 
Open Phone Platforms for DAB/DMB Broadcasting
Open Phone Platforms for DAB/DMB BroadcastingOpen Phone Platforms for DAB/DMB Broadcasting
Open Phone Platforms for DAB/DMB BroadcastingFrancois Lefebvre
 
Mobile Pres
Mobile PresMobile Pres
Mobile Presslbedard
 
Asia TV Forum-0812xx (canpublish)
Asia TV Forum-0812xx (canpublish)Asia TV Forum-0812xx (canpublish)
Asia TV Forum-0812xx (canpublish)PasocoPteLtd
 
Champ Pitch Celtic-Plus Event 2011
Champ Pitch Celtic-Plus Event 2011Champ Pitch Celtic-Plus Event 2011
Champ Pitch Celtic-Plus Event 2011vrt-medialab
 
Update on CRC Open and Free DAB Tools
Update on CRC Open and Free DAB ToolsUpdate on CRC Open and Free DAB Tools
Update on CRC Open and Free DAB ToolsFrancois Lefebvre
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGtovmug
 
Thương mại di động M-Commerce
Thương mại di động M-CommerceThương mại di động M-Commerce
Thương mại di động M-CommerceCat Van Khoi
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and WelcomeCarahsoft
 

Similaire à The Trajectory Of DRM Technologies (20)

Policy Challenges Around Digital Copyright
Policy Challenges Around Digital CopyrightPolicy Challenges Around Digital Copyright
Policy Challenges Around Digital Copyright
 
digital rights management for multimedia files
digital rights management for multimedia filesdigital rights management for multimedia files
digital rights management for multimedia files
 
Mark Logic Digital Publishing Summit, Kellogg
Mark Logic Digital Publishing Summit, KelloggMark Logic Digital Publishing Summit, Kellogg
Mark Logic Digital Publishing Summit, Kellogg
 
The MPEG Extensible Middleware Vision
The MPEG Extensible Middleware VisionThe MPEG Extensible Middleware Vision
The MPEG Extensible Middleware Vision
 
The NRB Group mainframe day 2021 - Security On Z - Guillaume Hoareau
The NRB Group mainframe day 2021 - Security On Z - Guillaume HoareauThe NRB Group mainframe day 2021 - Security On Z - Guillaume Hoareau
The NRB Group mainframe day 2021 - Security On Z - Guillaume Hoareau
 
Deutsche telekom
Deutsche telekomDeutsche telekom
Deutsche telekom
 
Lecture # 1
Lecture # 1Lecture # 1
Lecture # 1
 
Rights Technologies for E-Publishing
Rights Technologies for E-PublishingRights Technologies for E-Publishing
Rights Technologies for E-Publishing
 
DDS Interoperability Demo
DDS Interoperability DemoDDS Interoperability Demo
DDS Interoperability Demo
 
Technology Portfolio
Technology PortfolioTechnology Portfolio
Technology Portfolio
 
The Long Road To Profitable Digital Media Innovation - Digibiz'09
The Long Road To Profitable Digital Media Innovation  - Digibiz'09The Long Road To Profitable Digital Media Innovation  - Digibiz'09
The Long Road To Profitable Digital Media Innovation - Digibiz'09
 
Open Phone Platforms for DAB/DMB Broadcasting
Open Phone Platforms for DAB/DMB BroadcastingOpen Phone Platforms for DAB/DMB Broadcasting
Open Phone Platforms for DAB/DMB Broadcasting
 
Mobile Pres
Mobile PresMobile Pres
Mobile Pres
 
Asia TV Forum-0812xx (canpublish)
Asia TV Forum-0812xx (canpublish)Asia TV Forum-0812xx (canpublish)
Asia TV Forum-0812xx (canpublish)
 
Champ Pitch Celtic-Plus Event 2011
Champ Pitch Celtic-Plus Event 2011Champ Pitch Celtic-Plus Event 2011
Champ Pitch Celtic-Plus Event 2011
 
Update on CRC Open and Free DAB Tools
Update on CRC Open and Free DAB ToolsUpdate on CRC Open and Free DAB Tools
Update on CRC Open and Free DAB Tools
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
 
Thương mại di động M-Commerce
Thương mại di động M-CommerceThương mại di động M-Commerce
Thương mại di động M-Commerce
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and Welcome
 
Bridging the Marketing-Sales chasm
Bridging the Marketing-Sales chasmBridging the Marketing-Sales chasm
Bridging the Marketing-Sales chasm
 

Plus de GiantSteps Media Technology Strategies

Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?GiantSteps Media Technology Strategies
 
Copyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysisCopyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysisGiantSteps Media Technology Strategies
 
The Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights TechnologiesThe Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights TechnologiesGiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...GiantSteps Media Technology Strategies
 
International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright   Arthur Hoyle, Univ of CanberraInternational Perspectives on Digital Copyright   Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright Arthur Hoyle, Univ of CanberraGiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...GiantSteps Media Technology Strategies
 

Plus de GiantSteps Media Technology Strategies (20)

Enabling Efficient and Fair Markets for Digital Content
Enabling Efficient and Fair Markets for Digital ContentEnabling Efficient and Fair Markets for Digital Content
Enabling Efficient and Fair Markets for Digital Content
 
Digital Disruption of the Book Publishing Industry
Digital Disruption of the Book Publishing IndustryDigital Disruption of the Book Publishing Industry
Digital Disruption of the Book Publishing Industry
 
Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?
 
Copyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysisCopyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysis
 
The Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights TechnologiesThe Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights Technologies
 
The landscape of content protection technology
The landscape of content protection technologyThe landscape of content protection technology
The landscape of content protection technology
 
You bought it, but do you own it?
You bought it, but do you own it?You bought it, but do you own it?
You bought it, but do you own it?
 
Standards success factors
Standards success factorsStandards success factors
Standards success factors
 
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
 
International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright   Arthur Hoyle, Univ of CanberraInternational Perspectives on Digital Copyright   Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra
 
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
 
Copyright and Technology London 2012: Eric Walter, Hadopi
Copyright and Technology London 2012: Eric Walter, HadopiCopyright and Technology London 2012: Eric Walter, Hadopi
Copyright and Technology London 2012: Eric Walter, Hadopi
 
Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...
 
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
 
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
 
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
 
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
 
Copyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler PresentationCopyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler Presentation
 
Copyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler PresentationCopyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler Presentation
 
Copyright and Technology 2011: Hillel Parness Presentation
Copyright and Technology 2011: Hillel Parness PresentationCopyright and Technology 2011: Hillel Parness Presentation
Copyright and Technology 2011: Hillel Parness Presentation
 

Dernier

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Dernier (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

The Trajectory Of DRM Technologies

  • 1. Slide 1 The Trajectory of DRM Technologies: Past, Present, and Future Bill Rosenblatt GiantSteps Media Technology Strategies +1 212 956 1045 billr@giantstepsmts.com www.giantstepsmts.com © 2009 GiantSteps 1 Media Technology Strategies
  • 2. Slide 2 Outline How DRM technologies developed Factors influencing their evolution – Lessig’s 4 factors The current state Possibilities for the future © 2009 GiantSteps 2 Media Technology Strategies
  • 3. Slide 3 How DRM Technologies Developed © 2009 GiantSteps 3 Media Technology Strategies
  • 4. Slide 4 The Birth of DRM: Mid-1990s  Conference: Technological Strategies for Protecting Intellectual Property in the Networked Multimedia Environment, late 1993, Washington DC – Sponsored by Coalition for Networked Information, Interactive Multimedia Association, MIT, and Harvard Kennedy School of Government  White Paper: Mark Stefik, Xerox PARC, Letting Loose the Light: Igniting Commerce in Electronic Publication, 1994 – Appears as chapter in Internet Dreams, MIT Press, 1996  First important patent applications filed © 2009 GiantSteps 4 Media Technology Strategies
  • 5. Slide 5 Early Technologies CD-ROM Protection (mid-90s) 1996-1997  CD-MAX  DeskGate  CrypKey  Digital River  InfoSafe  IBM Cryptolope  TestDrive  EPR/InterTrust DigiBox  TTR  Liquid Audio  ZipLock (Portland Software) © 2009 GiantSteps 5 Media Technology Strategies
  • 6. Slide 6 Early Technologies 1998 1999  DMOD  Alchemedia  FileOpen  Authentica (now EMC)  Greenleaf  ContentGuard (Xerox)  MediaDNA  Infraworks (now Liquid  NetQuartz Machines)  Phocis  NetActive  Preview Systems  Perimele  RightsMarket (TragoeS)  PublishOne  Softlock  SDC (now Packet Video)  ViaTech  VYou © 2009 GiantSteps 6 Media Technology Strategies
  • 7. Slide 7 How Were These Sold? Legal dept: Make the Internet safe for your content – Print documents -> protected PDFs – CDs -> digital music files Marketing: Enable new business models for content – Pay per view – Subscription – Site licenses © 2009 GiantSteps 7 Media Technology Strategies
  • 8. Slide 8 What Happened? Bubble burst Content owners would not pay, and/or vendors charged too much Business models were not developed or marketed DRM became subsidiary to platform control (formats, codecs, players) © 2009 GiantSteps 8 Media Technology Strategies
  • 9. Slide 9 Second Bubble ca. 2005: Mobile OMA DRM Others  CoreMedia  SDC  Viaccess  Melodeo  Beep Science  Teruten  Lockstream/Irdeto  INKA (Netsync)  Access  NDS  Discretix  Etc. © 2009 GiantSteps 9 Media Technology Strategies
  • 10. Slide 10 A Pseudo-Scientific DRM Market Barometer: Vendors on Trade Show Floors 16 14 12 10 8 6 4 2 0 1h99 2h99 1h00 2h00 1h01 2h01 1h02 2h02 … 1h04 2h04 2h05 … 2h07 © 2009 GiantSteps 10 Media Technology Strategies
  • 11. Slide 11 The DRM Scene Today: Music Internet: DRM confined to subscription services – E.g. Napster, Rhapsody – DRMs: mostly Microsoft WM DRM 10/11 Mobile: various DRM-based models – Device/music bundles: Nokia Comes With Music, Sony Ericsson PlayNow Plus – Subscription models – Paid downloads – DRMs: OMA DRM, Microsoft WM DRM, Microsoft PlayReady, SDC © 2009 GiantSteps 11 Media Technology Strategies
  • 12. Slide 12 The DRM Scene Today: Video  Internet: download and rental services – Apple iTunes: FairPlay – Blockbuster, CinemaNow, others: WM DRM  Mobile: digital broadcast, WiFi – OMA BCAST Profile  IPTV, TelcoTV, Digital Cable – CA vendors (Irdeto, Nagra, NDS, etc.) – Marlin – Widevine – Verimatrix – SecureMedia © 2009 GiantSteps 12 Media Technology Strategies
  • 13. Slide 13 The DRM Scene Today: E-Books  Amazon – Mobipocket DRM – Kindle, iPhone, other portables  EReader – Partnership with Barnes & Noble, #1 US book retailer – Proprietary DRM – PC, Mac, iPhone, other portables  Adobe – Sony, IREX, Plastic Logic, other e-book devices – Content Server DRM – PC, Mac, iPhone © 2009 GiantSteps 13 Media Technology Strategies
  • 14. Slide 14 The DRM Scene Today: Enterprise Corporate/institutional applications Became a distinct subfield in ~2003 Now considered part of Content Management market Leading vendors: – Microsoft & partners – EMC (Authentica) – Oracle (SealedMedia) – Adobe © 2009 GiantSteps 14 Media Technology Strategies
  • 15. Slide 15 Pioneering DRMs that Didn’t Survive Intertrust – Digibox/InterRightsPoint – RightsSystem IBM – infoMarket – EMMS © 2009 GiantSteps 15 Media Technology Strategies
  • 16. Slide 16 Larry Lessig’s Four Factors* Architecture (technology) Norms (behaviors) Law Market (economics) *Code and Other Laws of Cyberspace, 1999, pp. 88-90 © 2009 GiantSteps 16 Media Technology Strategies
  • 17. Slide 17 Architecture Technology Enablers Criteria  File encryption  Ease of use  Network connectivity &  Maintenance of user rights & bandwidth expectations  License management  Security effectiveness  Rule specifications & RELs  Low support costs © 2009 GiantSteps 17 Media Technology Strategies
  • 18. Slide 18 Norms Sources of Norms Criteria  Popular online tool usage  Necessity of DRM in the first patterns place  Trust  Height of barriers  Opinions of thought leaders  Motivations of hackers © 2009 GiantSteps 18 Media Technology Strategies
  • 19. Slide 19 Law Laws Criteria  Copyright infringement liability  Technological implementability  Content usage rights  User comprehensibility  Anticircumvention  Balance of burden  Effect on legitimate uses of technology and innovation © 2009 GiantSteps 19 Media Technology Strategies
  • 20. Slide 20 Market Economic Factors Criteria  Compensation for content  Alignment of economic creators incentives  Investment in technology  Maximization of value to development and R&D consumer through alternative  Consumer value and choice offers  The pull of free  Maximization of value to publisher despite alternative sources © 2009 GiantSteps 20 Media Technology Strategies
  • 21. Slide 21 Factors Against DRM Success Market: – Economic incentives misaligned Norms: – Users don’t see value in choices of offers – Norms distorted by architecture (technology) Architecture: – Technological innovation hampered Laws: – Laws not amenable to technological implementation © 2009 GiantSteps 21 Media Technology Strategies
  • 22. Slide 22 Economic Incentives Misaligned Content owners demand it but will not pay for it – Despite high expenditures on “anti-piracy services” – Claim that content protection is responsibility of technology vendors who want to offer access to their content CE vendors use it to suit their own purposes – Platform lock-in Consumers have no direct say in deliberations – Only indirect market forces In the end, music companies got what they paid for © 2009 GiantSteps 22 Media Technology Strategies
  • 23. Slide 23 Consumers Don’t See Value in Choices of Offers Expensive to educate consumers about unfamiliar offerings – Apple had huge marketing budget to educate about unbundled albums – But Rhapsody, Napster, etc. didn’t educate sufficiently about subscription services Focus is on getting rights equivalent to offline content – Perception: pay == ownership && free == radio; therefore the only improvement is free == ownership © 2009 GiantSteps 23 Media Technology Strategies
  • 24. Slide 24 Users Influenced towards Infringing Behavior Definition of DRM commandeered by the press – Narrower than original definitions – Yet broadened to apply to any technology that restricts user behavior in any way Notion that DRM == Big Media == evil Romanticism & rationalization of hacker/pirate ethic © 2009 GiantSteps 24 Media Technology Strategies
  • 25. Slide 25 Technological Innovation Hampered Lack of revenue for DRM vendors Venture capital scared off – Bad press – Non-sexy topic Researchers scared off – RIAA actions against Prof. Ed Felten in 1999 – DRM research “politically incorrect” in US © 2009 GiantSteps 25 Media Technology Strategies
  • 26. Slide 26 Laws Not Amenable to Technological Implementation  Fair Use/Fair Deailing laws notoriously hard to automate – EU Private Copying less so  Privacy and due process are important but become obstacles – French Loi HADOPI  Anticircumvention laws reduce incentive to develop effective technologies – 1993-6 accommodation between content and telecoms industries – WIPO Copyright Treaty, EU Copyright Directive, US DMCA – Liability solely on the hacker – Important US appeals court case: Universal v. Reimerdes, 2000 © 2009 GiantSteps 26 Media Technology Strategies
  • 27. Slide 27 A Few Success Stories Apple FairPlay Pay TV Digital CAS  “Cheap and dirty” DRM  Cable operators want to protect  Component in first successful signals from theft digital music application  “Walled garden” systems  Educated consumers about (no PCs) unbundling of albums  Limited alternatives  Tightly tied to hardware and  Lesson: software, no boundary glitches Alignment of economic  Lesson: incentives Hardware vendor discovers how to benefit from DRM © 2009 GiantSteps 27 Media Technology Strategies
  • 28. Slide 28 A Few Success Stories OverDrive E-Book Lending AACS (Blu-ray)  Adobe Content Server supports e-  Designed to address problems book lending with CSS for DVDs  E-Book lending expands power of  Costlier DRM in costlier product library services despite lack of  Graceful hack recovery marketing ability  Impact of hacks overstated in  Small market well served by press single vendor, encourages  DVD industry forced to improve efficiency functionality  Lesson: True expansion of  Lesson: Better DRM costs more consumer choices through DRM money © 2009 GiantSteps 28 Media Technology Strategies
  • 29. Slide 29 Status of Rights Technologies Today File encryption License management Rule specifications & RELs © 2009 GiantSteps 29 Media Technology Strategies
  • 30. Slide 30 Encryption Crypto algorithms were never an issue Cost is the issue – Key management schemes – Hardware vs. software key storage Software key management has gotten better – Graceful failure e.g. AACS © 2009 GiantSteps 30 Media Technology Strategies
  • 31. Slide 31 License Management Flexibility, yes Transparency, no © 2009 GiantSteps 31 Media Technology Strategies
  • 32. Slide 32 Rights Specifications/RELs Technology applicable outside of encryption Complex starting point was probably necessary – Emulate offline/legacy licensing models But didn’t work – XrML designed by engineers for engineers Market needed time to find opportunities for simplicity – Remember ICE? Me neither. – Remember RSS? Of course. © 2009 GiantSteps 32 Media Technology Strategies
  • 33. Slide 33 Future Possibilities © 2009 GiantSteps 33 Media Technology Strategies
  • 34. Slide 34 Grow from Simplicity Emulation of legacy models is doomed to failure – Consumer expectations – Technological complexity – Misaligned economics New business models based on simpler technology can succeed – Create models to fit new opportunities – Build complexity from the ground up instead © 2009 GiantSteps 34 Media Technology Strategies
  • 35. Slide 35 UGC Will Lead the Way  YouTube, DailyMotion, Flickr, Scribd, MySpace are the 0.X models  Volume dwarfs that of commercial content  UGC needs rights management too  Exposure is important, but so are monetization and use tracking  “Profit from abundance” is not inconsistent with rights management  Ultimately, “commercial content” = “marketing investment” © 2009 GiantSteps 35 Media Technology Strategies
  • 36. Slide 36 Bet on These Technologies Rights languages Content identification Connected devices and streaming © 2009 GiantSteps 36 Media Technology Strategies
  • 37. Slide 37 Rights Languages Creative Commons – When services use it to make money, it’s no longer a “religion” – Note how “free” became “open source” – Commercial content owners beginning to look at it seriously ODRL – Moving beyond encryption applications – Making all the right moves: subsetting, PLUS, CC © 2009 GiantSteps 37 Media Technology Strategies
  • 38. Slide 38 Content Identification Fingerprinting Watermarking  Easy to implement now  Requires “connecting the dots”  Works with content “as is”  Requires insertion  Difficult at the ISP level  Easier at the ISP level  Poor integration with rights  Good integration with rights languages languages  Not much benefit from  Would benefit greatly from standardization standardization  Too many vendors, market ripe  Market has already for consolidation consolidated © 2009 GiantSteps 38 Media Technology Strategies
  • 39. Slide 39 Connected Devices and Streaming License management becomes much easier – No slave device transfer issues Encryption becomes less disruptive Consumer expectations shift away from ownership – Services no longer devolve to “MP3 delivery” model © 2009 GiantSteps 39 Media Technology Strategies
  • 40. Slide 40 Will Classic DRM Survive? Yes, where it supports new content models – Subscription – Personal network boundary setting – Hardware or service provider boundary setting © 2009 GiantSteps 40 Media Technology Strategies
  • 41. Slide 41 Bill Rosenblatt GiantSteps Media Technology Strategies billr@giantstepsmts.com +1 212 956 1045 www.giantstepsmts.com © 2009 GiantSteps 41 Media Technology Strategies