SlideShare a Scribd company logo
The L d
Th Landscape of Content P t ti
                 f C t t Protection
            Technology:
 Implications for Digital Publishing

                June 5, 2012
                  Bill Rosenblatt
     GiantSteps Media Technology Strategies
             www.giantstepsmts.com
     billr@giantstepsmts.com 212 956 1045
                         1
Ways to Fight Copyright Infringement

Legal
Economic
Behavioral
Technical



(Courtesy Larry Lessig, Code and Other Laws of Cyberspace)


                                            2
Ways to Fight Copyright Infringement

Legal: Strengthen copyright law
Economic: Make content cheaper & easier to access
Behavioral: Educate public about copyright
Technical: Use technology to enforce copyright
                        gy              py g



(Courtesy Larry Lessig, Code and Other Laws of Cyberspace)


                                            3
Technical Methods

           Proactive                            Reactive
 Limit what consumer can do          Don’t limit what consumer can
  with content                         do with content
 Encrypt content, require special    Search for infringing copies of
  s/w or h/w to decrypt                content
 Ti access to user or device
  Tie         t         d i           Id tif their source by context
                                       Identify th i        b      t t
  identity                             or examination
 Expiry date & time                  Create evidence for legal
 Limits on print, copy to             infringement complaint
  clipboard, etc.

                                     4
Technical Methods

              DRM                        Content Identification
 Limit what consumer can do          Don’t limit what consumer can
  with content                         do with content
 Encrypt content, require special    Search for infringing copies of
  s/w or h/w to decrypt                content
 Ti access to user or device
  Tie         t         d i           Id tif their source by context
                                       Identify th i        b      t t
  identity                             or examination
 Expiry date & time                  Create evidence for legal
 Limits on print, copy to             infringement complaint
  clipboard, etc.

                                     5
Pros and Cons of DRM
Constituency       Attribute           DRM
Publishers         Piracy              Maybe
Retailers          Lock-in             Yes
Libraries          E-lending           Some
Distributors, E-   Cost to implement   Yes
reader vendors
Users              Portability         Restricted
Users              Sharing             Restricted
Users              Borrowing           Some
eReading Market    Growth              Fragmentation
                                 6
Fragmentation:
       Current DRM f eBooks
       C      t DRMs for B k
DRM                      Platforms
AZW DRM                  Amazon Kindle devices/apps
Adobe Content Server 4   B&N Nook Sony Reader
                              Nook,      Reader,
(ACS4)                   Kobo Reader, various others
Apple FairPlay           iOS (iPhone, iPad)
“Screen shot DRM”        Google Books
Fictionwise DRM          B&N Nook
Microsoft PlayReady      Blio Reader
Kobo Vox DRM             Kobo Vox tablet

                          7
DRM in Music

Paid downloads DRM free
                   DRM-free
iTunes post-DRM functionality restrictions
Streams (Spotify, Pandora) encrypted
“Offline listening mode” in mobile subscription
                  g                        p
 services (Spotify, Rhapsody, MOG) use DRM




                        8
DRM in Movies & TV

Protection getting stronger not weaker
                    stronger,
“Software hardening” to deter hacking
Impact of hacks limited
Forensic antipiracy services to catch hacks
               p y
UltraViolet standard for downloads: family accounts,
 rights locker, 5 DRMs, stream encryption
        locker DRMs
Watermarking + encryption for early window high def

                           9
DRM for Corporate Documents

Protect confidential information
Adjunct to corporate content management systems
Complements firewalls, DLP, SSO, etc.
Strong protection
      gp
Integrated into Word, Excel, Acrobat, etc.
Integrated with identity management


                        10
Content Identification in Publishing
       Watermarking                           Fingerprinting
       (Safari,
       (Safari Booxtream)                     (Attributor,
                                              (Attributor Irdeto)
   Adding user identity into to         Examining files to determine
    downloaded eBook                      their identity
                                                       y
   User ID, real name, cc# in           Fancy form of pattern matching
    obfuscated or plaintext form         Requires web crawling to find
   Once, in every chapter, or on
    O     i         h t                   unauthorized copies online
                                               th i d      i     li
    every page                           Cannot identify user who
   Legal one-click hacks possible
          one click                       copied content
   Web crawling optional                Hacks not relevant


                                     11
Content Identification in Publishing

         Watermarking                           Fingerprinting
 Safari Books Online                     At least 4 of Big 6 trade
  PDF downloads:                          Majority of major K-12 and
                                                              K 12
  user’s name on every page                higher ed
 Harry Potter EPUB downloads:            Many major STM and
  obfuscated user ID on copyright          university presses
                                              i    it
  page




                                    12
Publishers Going DRM-Free?

Genres: SF/fantasy, IT
         SF/fantasy
Demographics: young/techie
…otherwise most publishers do and will use DRM
…and publishers either use it for e-lending or don’t
        p                                  g
 allow e-lending at all
Particularly hard to imagine higher ed & profesional
 going DRM-free

                          13
Non-Optimal Choices
Status quo               Go DRM-free




Standardize strong DRM   Standardize w’marking




                         14
Non-Optimal Choices
Status quo                     Go DRM-free
   • M k tf
     Market fragmentation
                    t ti
     and slower e-readership
     g
     growth
   • Or monopoly

Standardize t
St d di strong DRM             Standardize ’ ki
                               St d di w’marking




                               15
Non-Optimal Choices
Status quo                     Go DRM-free
   • M k tf
     Market fragmentation
                    t ti            • I
                                      Irreversible d i i
                                              ibl decision
     and slower e-readership        • Not practical for some
     g
     growth                           models
   • Or monopoly                    • Might increase piracy

Standardize t
St d di strong DRM             Standardize ’ ki
                               St d di w’marking




                               16
Non-Optimal Choices
Status quo                       Go DRM-free
   • M k tf
     Market fragmentation
                    t ti              • I
                                        Irreversible d i i
                                                ibl decision
     and slower e-readership          • Not practical for some
     g
     growth                             models
   • Or monopoly                      • Might increase piracy

Standardize t
St d di strong DRM               Standardize ’ ki
                                 St d di w’marking
   • Expensive and complex
   • Resistance from retailers
     and device makers
   • Privacy issues

                                 17
Non-Optimal Choices
Status quo                       Go DRM-free
   • M k tf
     Market fragmentation
                    t ti              • I
                                        Irreversible d i i
                                                ibl decision
     and slower e-readership          • Not practical for some
     g
     growth                             models
   • Or monopoly                      • Might increase piracy

Standardize t
St d di strong DRM               Standardize ’ ki
                                 St d di w’marking
   • Expensive and complex            • Privacy vs. efficacy
   • Resistance from retailers          tradeoff
     and device makers                • Hacks are legal
   • Privacy issues

                                 18
IDPF Is Exploring a New Choice:
           EPUB LCP
 Lightweight Content Protection for EPUB 3
 Open pro-competitive standard
 Use personal information (e.g. name email cc#)
                            (e g name, email,
  as password, stored in obfuscated form
 Complementary to watermarking
 Library lending (expiry period) support




                        19
EPUB LCP is “Lightweight”

Give away password to others, they can read content
                       others
  – “Social DRM” concept
  – Who do you trust with your personal information?
No “phoning home”
  – Heavyweight DRM depends on it
  – Can be used offline (or if retailer goes out of business)
Designed to be extended for certain markets
  – More security
  – More business models
                               20
Heavyweight vs. Lightweight

                      Heavyweight         Lightweight
File sharing          Restricted          “Social”
Net cnxn required
            q         Yes                 No
One-click hacks       No                  Yes
Recovery from hacks Possible              Not possible
Legality of hacks     Illegal             Illegal
Cost/complexity       Expensive/complex   Cheaper/simpler
Bus model flexibility More                Less



                               21
Security Strength of DRMs and
   Anticircumvention Law
   A ti i         ti L
                      Illegal under Anticircumvention Law



No DRM          Light DRM                          Heavy DRM



      One-Click Hacks Available

 Watermark      EPUB LCP ACS4, AZW             Pay TV CAS/DRM




                                  22
Models Not Possible with EPUB LCP

    Separate license delivery
      – One file, multiple sets of rights
    Domain authentication
      – “Family accounts”: multiple users and/or devices
    License chaining
      – Subscription services
    Master-slave
      –S
       Secure t
              transfer f
                   f from PC t portable d i
                             to t bl device
    Forward-and-delete
      – Support for “Digital First Sale”
                     Digital       Sale
                                23
Window of Opportunity

Fragmentation increasing
  – E.g. Kobo replacing ACS4 with proprietary DRM
Amazon at ~60% market share
            60%
  – Tipping point between monopoly and fragmentation
E-reading i
E di going global
             l b l
  – Moving into higher-piracy markets
EUPB 2 – EPUB 3 transition
                 t    iti
  – Opportunity to rectify IDPF’s historical inaction on DRM

                             24
What IDPF Is Doing

Engaged GiantSteps to help with EPUB LCP design
Draft requirements
Soliciting comments from knowledgeable
 constituents… like you!




                        25
More Information



    www.giantstepsmts.com




www.copyrightandtechnology.com

               26
Bill Rosenblatt
GiantSteps Media Technology Strategies
billr@giantstepsmts.com
212 956 1045
www.giantstepsmts.com
copyrightandtechnology.com
   py g             gy

                   27

More Related Content

PDF
Information Security Awareness Training
PDF
Rights Technologies for E-Publishing
PPTX
Digital Rights Management PPT
PPT
Sec Wars Episode 3
PDF
"Wp piracy continuum" by Irdeto
PPT
10 Keio513
PDF
Paul okade an introduction-of_cryptography
PDF
Information Security It's All About Compliance
Information Security Awareness Training
Rights Technologies for E-Publishing
Digital Rights Management PPT
Sec Wars Episode 3
"Wp piracy continuum" by Irdeto
10 Keio513
Paul okade an introduction-of_cryptography
Information Security It's All About Compliance

Similar to The landscape of content protection technology (20)

PDF
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
PDF
Copyright and Technology 2011: Opening Remarks - Bill Rosenblatt
PDF
A DRM system based on Social Networks
PDF
To DRM or not to DRM?
PPT
Copyright, Copy Fight
PDF
You bought it, but do you own it?
PDF
Policy Challenges Around Digital Copyright
PDF
Digital Disruption of the Book Publishing Industry
PPT
Gannon -u_of_t_presentation_2011
PDF
Presentazione
PDF
Automating Notice And Takedown
DOCX
digital rights management for multimedia files
PPTX
Integrating eBooks and eReaders into Your Library: Part 1 (April 2012)
PDF
Digital Rights And Digital Television
PPTX
Development of strategy for the e pub library of wu
PDF
2009 IP Club Lecture
PPTX
Purchasing E-Books for your Library
PPT
Drm and crypto
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
Copyright and Technology 2011: Opening Remarks - Bill Rosenblatt
A DRM system based on Social Networks
To DRM or not to DRM?
Copyright, Copy Fight
You bought it, but do you own it?
Policy Challenges Around Digital Copyright
Digital Disruption of the Book Publishing Industry
Gannon -u_of_t_presentation_2011
Presentazione
Automating Notice And Takedown
digital rights management for multimedia files
Integrating eBooks and eReaders into Your Library: Part 1 (April 2012)
Digital Rights And Digital Television
Development of strategy for the e pub library of wu
2009 IP Club Lecture
Purchasing E-Books for your Library
Drm and crypto
Ad

More from GiantSteps Media Technology Strategies (20)

PDF
Enabling Efficient and Fair Markets for Digital Content
PPTX
Is the CJEU likely to extend the UsedSoft ruling to works other than software?
PDF
Copyright and Technology Conference Observation protocol & impact analysis
PDF
The Carrot or the Stick: Opportunities and Challenges in Rights Technologies
PDF
Standards success factors
PDF
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
PDF
International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra
PDF
Copyright and Technology London 2012: Eric Walter, Hadopi
PDF
Copyright and Technology London 2012: Content Identification - Werner Strydom...
PDF
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
PPT
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
PPTX
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
PPTX
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
PDF
Copyright and Technology 2011: Ron Wheeler Presentation
PDF
Copyright and Technology 2011: Ron Wheeler Presentation
PDF
Copyright and Technology 2011: Hillel Parness Presentation
PDF
Standards success factors
PDF
Ben Marks, Weil Gotshal & Manges
PDF
Jean-Henry Morin, University of Geneva
PDF
Enabling Efficient and Fair Markets for Digital Content
Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Copyright and Technology Conference Observation protocol & impact analysis
The Carrot or the Stick: Opportunities and Challenges in Rights Technologies
Standards success factors
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra
Copyright and Technology London 2012: Eric Walter, Hadopi
Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Hillel Parness Presentation
Standards success factors
Ben Marks, Weil Gotshal & Manges
Jean-Henry Morin, University of Geneva
Ad

The landscape of content protection technology

  • 1. The L d Th Landscape of Content P t ti f C t t Protection Technology: Implications for Digital Publishing June 5, 2012 Bill Rosenblatt GiantSteps Media Technology Strategies www.giantstepsmts.com billr@giantstepsmts.com 212 956 1045 1
  • 2. Ways to Fight Copyright Infringement Legal Economic Behavioral Technical (Courtesy Larry Lessig, Code and Other Laws of Cyberspace) 2
  • 3. Ways to Fight Copyright Infringement Legal: Strengthen copyright law Economic: Make content cheaper & easier to access Behavioral: Educate public about copyright Technical: Use technology to enforce copyright gy py g (Courtesy Larry Lessig, Code and Other Laws of Cyberspace) 3
  • 4. Technical Methods Proactive Reactive  Limit what consumer can do  Don’t limit what consumer can with content do with content  Encrypt content, require special  Search for infringing copies of s/w or h/w to decrypt content  Ti access to user or device Tie t d i  Id tif their source by context Identify th i b t t identity or examination  Expiry date & time  Create evidence for legal  Limits on print, copy to infringement complaint clipboard, etc. 4
  • 5. Technical Methods DRM Content Identification  Limit what consumer can do  Don’t limit what consumer can with content do with content  Encrypt content, require special  Search for infringing copies of s/w or h/w to decrypt content  Ti access to user or device Tie t d i  Id tif their source by context Identify th i b t t identity or examination  Expiry date & time  Create evidence for legal  Limits on print, copy to infringement complaint clipboard, etc. 5
  • 6. Pros and Cons of DRM Constituency Attribute DRM Publishers Piracy Maybe Retailers Lock-in Yes Libraries E-lending Some Distributors, E- Cost to implement Yes reader vendors Users Portability Restricted Users Sharing Restricted Users Borrowing Some eReading Market Growth Fragmentation 6
  • 7. Fragmentation: Current DRM f eBooks C t DRMs for B k DRM Platforms AZW DRM Amazon Kindle devices/apps Adobe Content Server 4 B&N Nook Sony Reader Nook, Reader, (ACS4) Kobo Reader, various others Apple FairPlay iOS (iPhone, iPad) “Screen shot DRM” Google Books Fictionwise DRM B&N Nook Microsoft PlayReady Blio Reader Kobo Vox DRM Kobo Vox tablet 7
  • 8. DRM in Music Paid downloads DRM free DRM-free iTunes post-DRM functionality restrictions Streams (Spotify, Pandora) encrypted “Offline listening mode” in mobile subscription g p services (Spotify, Rhapsody, MOG) use DRM 8
  • 9. DRM in Movies & TV Protection getting stronger not weaker stronger, “Software hardening” to deter hacking Impact of hacks limited Forensic antipiracy services to catch hacks p y UltraViolet standard for downloads: family accounts, rights locker, 5 DRMs, stream encryption locker DRMs Watermarking + encryption for early window high def 9
  • 10. DRM for Corporate Documents Protect confidential information Adjunct to corporate content management systems Complements firewalls, DLP, SSO, etc. Strong protection gp Integrated into Word, Excel, Acrobat, etc. Integrated with identity management 10
  • 11. Content Identification in Publishing Watermarking Fingerprinting (Safari, (Safari Booxtream) (Attributor, (Attributor Irdeto)  Adding user identity into to  Examining files to determine downloaded eBook their identity y  User ID, real name, cc# in  Fancy form of pattern matching obfuscated or plaintext form  Requires web crawling to find  Once, in every chapter, or on O i h t unauthorized copies online th i d i li every page  Cannot identify user who  Legal one-click hacks possible one click copied content  Web crawling optional  Hacks not relevant 11
  • 12. Content Identification in Publishing Watermarking Fingerprinting  Safari Books Online  At least 4 of Big 6 trade PDF downloads:  Majority of major K-12 and K 12 user’s name on every page higher ed  Harry Potter EPUB downloads:  Many major STM and obfuscated user ID on copyright university presses i it page 12
  • 13. Publishers Going DRM-Free? Genres: SF/fantasy, IT SF/fantasy Demographics: young/techie …otherwise most publishers do and will use DRM …and publishers either use it for e-lending or don’t p g allow e-lending at all Particularly hard to imagine higher ed & profesional going DRM-free 13
  • 14. Non-Optimal Choices Status quo Go DRM-free Standardize strong DRM Standardize w’marking 14
  • 15. Non-Optimal Choices Status quo Go DRM-free • M k tf Market fragmentation t ti and slower e-readership g growth • Or monopoly Standardize t St d di strong DRM Standardize ’ ki St d di w’marking 15
  • 16. Non-Optimal Choices Status quo Go DRM-free • M k tf Market fragmentation t ti • I Irreversible d i i ibl decision and slower e-readership • Not practical for some g growth models • Or monopoly • Might increase piracy Standardize t St d di strong DRM Standardize ’ ki St d di w’marking 16
  • 17. Non-Optimal Choices Status quo Go DRM-free • M k tf Market fragmentation t ti • I Irreversible d i i ibl decision and slower e-readership • Not practical for some g growth models • Or monopoly • Might increase piracy Standardize t St d di strong DRM Standardize ’ ki St d di w’marking • Expensive and complex • Resistance from retailers and device makers • Privacy issues 17
  • 18. Non-Optimal Choices Status quo Go DRM-free • M k tf Market fragmentation t ti • I Irreversible d i i ibl decision and slower e-readership • Not practical for some g growth models • Or monopoly • Might increase piracy Standardize t St d di strong DRM Standardize ’ ki St d di w’marking • Expensive and complex • Privacy vs. efficacy • Resistance from retailers tradeoff and device makers • Hacks are legal • Privacy issues 18
  • 19. IDPF Is Exploring a New Choice: EPUB LCP  Lightweight Content Protection for EPUB 3  Open pro-competitive standard  Use personal information (e.g. name email cc#) (e g name, email, as password, stored in obfuscated form  Complementary to watermarking  Library lending (expiry period) support 19
  • 20. EPUB LCP is “Lightweight” Give away password to others, they can read content others – “Social DRM” concept – Who do you trust with your personal information? No “phoning home” – Heavyweight DRM depends on it – Can be used offline (or if retailer goes out of business) Designed to be extended for certain markets – More security – More business models 20
  • 21. Heavyweight vs. Lightweight Heavyweight Lightweight File sharing Restricted “Social” Net cnxn required q Yes No One-click hacks No Yes Recovery from hacks Possible Not possible Legality of hacks Illegal Illegal Cost/complexity Expensive/complex Cheaper/simpler Bus model flexibility More Less 21
  • 22. Security Strength of DRMs and Anticircumvention Law A ti i ti L Illegal under Anticircumvention Law No DRM Light DRM Heavy DRM One-Click Hacks Available Watermark EPUB LCP ACS4, AZW Pay TV CAS/DRM 22
  • 23. Models Not Possible with EPUB LCP  Separate license delivery – One file, multiple sets of rights  Domain authentication – “Family accounts”: multiple users and/or devices  License chaining – Subscription services  Master-slave –S Secure t transfer f f from PC t portable d i to t bl device  Forward-and-delete – Support for “Digital First Sale” Digital Sale 23
  • 24. Window of Opportunity Fragmentation increasing – E.g. Kobo replacing ACS4 with proprietary DRM Amazon at ~60% market share 60% – Tipping point between monopoly and fragmentation E-reading i E di going global l b l – Moving into higher-piracy markets EUPB 2 – EPUB 3 transition t iti – Opportunity to rectify IDPF’s historical inaction on DRM 24
  • 25. What IDPF Is Doing Engaged GiantSteps to help with EPUB LCP design Draft requirements Soliciting comments from knowledgeable constituents… like you! 25
  • 26. More Information www.giantstepsmts.com www.copyrightandtechnology.com 26
  • 27. Bill Rosenblatt GiantSteps Media Technology Strategies billr@giantstepsmts.com 212 956 1045 www.giantstepsmts.com copyrightandtechnology.com py g gy 27