Contenu connexe Similaire à Copyright and Technology London 2012: Content Identification - Werner Strydom, Irdeto Similaire à Copyright and Technology London 2012: Content Identification - Werner Strydom, Irdeto (20) Plus de GiantSteps Media Technology Strategies Plus de GiantSteps Media Technology Strategies (20) Copyright and Technology London 2012: Content Identification - Werner Strydom, Irdeto1. Content Identification
The Fight Against Internet Content Redistribution
Werner Strydom
VP Technology
Irdeto
19 July 2012
2012 © IRDETO | This document contains information that is privileged or confidential
2. Piracy Is Not A Single Behaviour
The Piracy Continuum™
Frustrated Confused
Criminals Hackers Casual Pirates Consumers Consumers Consumers
Steal content for Steal content Download Can’t get what Unknowingly Buy content
commercial gain and distribute it content for they want consume illegal through
over the Internet personal use legally content legitimate
channels
Conditional Software Security Content Detection &
Access Hardening Audits Fingerprinting Removal
Digital Rights Anti-Piracy Legal Session Based
Management Services Support Watermarking
2 2
3. Skyrocketing Internet Content Redistribution
Large Online High-Speed Always-Connected
Content Library Broadband Access Devices
Linear TV
Music
VOD
Live Streaming
Games
e-Publications
Piracy is Control Word Internet
Smart Card
Redistribution Redistribution
Piracy
shifting… Piracy Piracy
2012 © IRDETO | This document contains information that is privileged or confidential
3
4. Requirements for Session-Based
Watermarking
Need for A Centralized Solution
Supports deployed devices Easy/Fast to deploy & operate
No special software or hardware Scalable, cost effective and fast for
required in the client device live and on-demand content
Easy to secure and renew
Watermarks and technology
updateable on server side to stay
ahead of piracy
2012 © IRDETO | This document contains information that is privileged or confidential
5. Effective Management = Solution + Services
Trace Identify
Search for and Track source
find unauthorized
content
Insert Counter
Generate and Collect evidence
insert mark Apply
countermeasures
Kill the session if
desired
Renew
Respond to
new threats
2012 © IRDETO | This document contains information that is privileged or confidential
5
6. THANK YOU!
WWW.IRDETO.COM
ALL CONTENTS COPYRIGHT 2012 IRDETO B.V.
2012 © IRDETO | This document contains information that is privileged or confidential
6