Overview of Collective Licensing Models and of DRM Systems and Technologies Used for IPR Protection and Management

Total Page:16

File Type:pdf, Size:1020Kb

Overview of Collective Licensing Models and of DRM Systems and Technologies Used for IPR Protection and Management Overview of collective licensing models and of DRM systems and technologies used for IPR protection and management ECP-2007-DILI-517005 ATHENA Overview of collective licensing models and of DRM systems and technologies used for IPR protection and management Deliverable number D6.2 Dissemination level Public Delivery date 31 October 2009 Status Final Barbara Dierickx (PACKED) & Dimitrios Author(s) Tsolis (University of Patras) eContentplus This project is funded under the eContentplus programme1, a multiannual Community programme to make digital content in Europe more accessible, usable and exploitable. 1 OJ L 79, 24.3.2005, p. 1. 1/125 Overview of collective licensing models and of DRM systems and technologies used for IPR protection and management Table of Contents EXECUTIVE SUMMARY .............................................................................................................................................. 4 PART ONE – OVERVIEW OF COLLECTIVE LICENSING MODELS ................................................................. 5 1. GENERAL INTRODUCTION .............................................................................................................................. 5 1.1. INTRODUCTION 5 1.2. CULTURAL HERITAGE IN AN ONLINE ENVIRONMENT 7 2. THE SCOPE OF COPYRIGHT............................................................................................................................. 8 2.1. SCOPE AND EXCEPTIONS 8 2.2. THE EUROPEAN FRAMEWORK 9 2.3. SPECIAL POINTS OF INTEREST 9 3. THE COLLECTIVE LICENSING OF RIGHTS ............................................................................................... 13 3.1. THE COLLECTIVE MANAGEMENT OF RIGHTS 13 3.2. VOLUNTARY COLLECTIVE LICENSING 16 3.3. COUNTRY SPECIFIC REGIMES FOR ORPHAN WORKS 17 3.4. EXTENDED COLLECTIVE LICENSING 21 4. OPEN AND NEW LICENSING MODELS......................................................................................................... 23 4.1. INTRODUCTION 23 4.2. OPEN CONTENT LICENSES: CREATIVE COMMONS AS AN EXAMPLE 23 4.3. THE APPLICATION OF OPEN CONTENT LICENSES BY CULTURAL HERITAGE INSTITUTIONS 26 4.4. EXAMPLES & CASES OF BEST PRACTICE 27 5. GENERAL CONCLUSION.................................................................................................................................. 36 PART TWO – OVERVIEW OF DRM TECHNIQUES ............................................................................................. 37 1. GENERAL INTRODUCTION ............................................................................................................................. 37 2. DIGITAL RIGHTS MANAGEMENT SYSTEMS – AN OVERVIEW............................................................ 38 2.1. INTRODUCTION 38 2.2. THE FOCUS OF DIGITAL RIGHTS MANAGEMENT SYSTEMS 38 2.3. COPYRIGHT PROTECTION TOOLS 39 2.4. DIGITAL RIGHTS MANAGEMENT 41 2.5. TECHNOLOGICAL PROTOTYPES – STANDARDS 46 2.6. THE FUTURE OF DRM SYSTEMS 50 2.7. FUTURE RESEARCH DIRECTIONS 50 3. DIGITAL WATERMARKING IN-DEPTH........................................................................................................ 52 3.1. DIGITAL IMAGE WATERMARKING TECHNIQUES FOR DRM APPLICATIONS 52 3.2. WATERMARKING AND AUTHENTICATION IN JPEG2000 66 3.3. PROTECTING THE COPYRIGHT OF DIGITAL VIDEO THROUGH WATERMARKING TECHNOLOGIES 77 4. DIGITAL RIGHTS MANAGEMENT AND TRANSACTIONS – ON-LINE RIGHTS CLEARANCE....... 81 4.1. INTRODUCTION 81 4.2. BACKGROUND 81 4.3. RIGHTS CLEARANCE & DRM 83 4.4. RIGHTS CLEARANCE & BUSINESS MODEL 87 4.5. RIGHTS CLEARANCE TECHNOLOGIES 89 4.6. CASE STUDY: SILKDRM 96 4.7. CONCLUSION 101 4.8. FUTURE RESEARCH DIRECTIONS 101 2/125 Overview of collective licensing models and of DRM systems and technologies used for IPR protection and management 5. DIGITAL RIGHTS MANAGEMENT – A EUROPEAN LAW PERSPECTIVE ......................................... 103 5.1. INTRODUCTION 103 5.2. EU COPYRIGHT LAW AND DRM 103 5.3. THE PROVISIONS OF THE COPYRIGHT DIRECTIVE 2001/29 104 5.4. OTHER EU LEGISLATION RELEVANT TO TECHNOLOGICAL MEASURES AND DRM INFORMATION 111 5.5. ONGOING DISCUSSION ON DRM SYSTEMS 113 5.6. FUTURE RESEARCH DIRECTIONS 115 6. BEST PRACTICE FOR DRM & IPR PROTECTION IN EUROPEANA .................................................... 116 6.1. INTRODUCTION 116 6.2. TABLE OF EXISTING DRM TECHNOLOGIES AND ASSOCIATED DEVICES 116 6.3. BUILDING A TYPICAL DRM SYSTEM FOR A CULTURAL ORGANISATION 117 6.4. CONCLUSION 120 7. GENERAL CONCLUSIONS .................................................................................................................................. 121 8. LIST OF FIGURES.................................................................................................................................................. 122 9. ADDITIONAL READING ...................................................................................................................................... 123 3/125 Overview of collective licensing models and of DRM systems and technologies used for IPR protection and management Executive summary This report, created by the WP6 on Intellectual Property Rights of the ATHENA-project, is divided into two main parts; one on collective licensing and one on the use of Digital Rights Management (DRM) techniques. Part one: overview of collective licensing models The goal of this part is to present an overview of collective licensing models in relation to the digitisation and disclosure of cultural heritage content. It should be noted that the general scope of copyright will not be discussed in this report since it already featured extensively in the ATHENA D.6.1. Overview of IPR legislation in relation to the objectives of Europeana. The first section of the report situates current trends in unlocking cultural heritage content by making it digitally available on the internet. Some specific issues on copyright to which collective licensing might provide an answer are presented here as well. We take a look at the current copyright discussions within the European policy field as well as regulatory initiatives by Europeana. The following chapter gives an overview of the actual collective licensing mechanisms. It starts off by presenting what the collective management of rights is and why it can be useful to the cultural heritage sector. Different collective licensing models are then illustrated, as well as some country-specific regimes. This is followed by a chapter on new and emerging licensing models. Collective licensing may be one option but we should also look at others. Open content licenses and Creative Commons licenses in particular will be discussed here. Their application in the field of cultural heritage, as well as some cases and best pratices, illustrate the theory. A general conclusion summarizes this first part of the report. Part two: overview of DRM techniques The issues of wide access to cultural and scientific content and in parallel protection and management of copyright create the next digital dilemma and considerable scepticism to Web 2.0 users and content providers: do we consider creations as human kind advances and in some way patrimony of the humanity freely accessible and reusable by anyone or do we consider wiser to protect it as the result of ‘personal’ investments and efforts? How intellectual property laws could embrace the apparently paradoxical goals of motivating individual creation and preserving the ultimate benefits of that creation for the common good, is a major question. As a result the necessity of using systems which allow broad exchange of the creations while at the same time use copyright protection methodologies and tools during this exchange is important. Digital Rights Management systems have the objective to fulfil this goal, thus to protect and manage rights and copyrights and in parallel support the distribution and publication of priceless digital creations in the form of digital content. A technical study presents the main aspects of Digital Rights Management Systems and is structured in the following main sections: • Digital Rights Management Systems – An Overview. The DRMS is being defined and certain technological aspects are presented. • Digital Watermarking in-Depth. The state of the art, new trends and the uses regarding digital watermarking for image and video files are presented. • Digital Rights Management and Transactions – On-line Rights Clearance. The DRMS uses for transactions between users and content and new on-line clearance strategies are being analysed. • Digital Rights Management – A European Law Perspective. A specialised review of legislation referring to Digital Rights Management systems is included. • Best Practice for DRM & IPR Protection in Europeana. This chapter is concluding on what is the best practice for implementing a Digital Rights Management System which applies IPR protection and management for digital cultural content which is being published through websites and/or Europeana’s portal. This technical study could be proved useful to organisations and people who might not know what a DRM system is, while at the same time and in certain aspects reaches depths useful for experienced scientists and experts active in the scientific field of DRM and copyright protection/management. 4/125 Overview of collective licensing models and of DRM systems and technologies used for IPR protection and management PART ONE – OVERVIEW OF COLLECTIVE LICENSING MODELS 1. General introduction 1.1. Introduction The 21st century marked the birth of the ‘information society’ as we know
Recommended publications
  • Entity Framework with Microsoft Azure
    Microsoft Azure Step by Step Guide This free book is provided by courtesy of C# Corner and Mindcracker Network and its authors. Feel free to share this book with your friends and co-workers. Please do not reproduce, republish, edit or copy this book. Nitin Pandit Software Engineer, Microsoft.Net Consultant Noida C# corner Delhi Chapter Lead C# corner MVP Amit Mishra (Co-Author, Format Editor) Index Page No Chapter 1 - Getting Started With Microsoft Azure 1-17 Chapter 2 - How To Host Your Web Apps On Azure Via FileZilla 18-31 Chapter 3 - Configuring A Custom Domain Name For An Azure 32-40 Website Chapter 4 - Virtual Machine In Microsoft Azure Step by Step - Part 41-50 One Chapter 5 - Creating A Virtual Disk Virtual Machine In Microsoft 51-66 Azure Step by Step: Part Two Chapter 6 - Use of SQL Azure In Visual Studio 2015 Step By Step 67-98 Guide Chapter 7 - Entity Framework With Microsoft Azure SQL 99-113 Chapter 8 - Introducing U-SQL- Make Big Data Processing Easy 114-117 Chapter 9 - Installation Of Azure SDK And Blob Storage In Azure: 118-139 Part 1 Chapter 10 - Upload Image To Azure Blob Storage In ASP.NET: Part 140-163 2 Chapter 11 - Demo Project Azure Blob Storage With ASP.NET MVC 164-204 5.0: Part 3 Chapter 12 - Getting Started With Azure DocumentDB: Day 1 205-224 Chapter 13 - Querying In The Azure DocumentDB: Day Two 225-242 Chapter 14 - Manage Azure Mobile Services: Part One 243-259 Chapter 15 - How To Create A Mobile App In Microsoft Azure 260-277 Chapter 16 - Manage Database Settings Of Azure Mobile Services 278-281 Chapter 17
    [Show full text]
  • 1 in the UNITED STATES DISTRICT COURT for the DISTRICT of DELAWARE VIATECH TECHNOLOGIES, INC., ) ) Plaintiff, ) Case No. 1:17Cv5
    Case 1:17-cv-00570-RGA Document 11 Filed 10/01/17 Page 1 of 37 PageID #: 145 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF DELAWARE VIATECH TECHNOLOGIES, INC., ) ) Plaintiff, ) Case No. 1:17cv570 v. ) ) MICROSOFT CORPORATION, ) DEMAND FOR JURY TRIAL ) Defendant. ) AMENDED COMPLAINT FOR PATENT INFRINGEMENT Plaintiff ViaTech Technologies, Inc. (“plaintiff” or “ViaTech”), through its attorneys, for its complaint against defendant Microsoft Corporation (“defendant” or “Microsoft”), alleges as follows: THE PARTIES 1. Plaintiff is a corporation organized and existing under the laws of the State of Delaware having a place of business at 1136 Ashbourne Circle, Trinity, FL 34655-7103. 2. Defendant Microsoft is a corporation organized and existing under the laws of the State of Washington having its principal place of business at One Microsoft Way, Redmond, WA 98052. JURISDICTION AND VENUE 3. This action arises under the patent laws of the United States, Title 35 of the United States Code. Subject matter jurisdiction is proper in this Court pursuant to 28 U.S.C. §§ 1331 and 1338(a). 4. Defendant Microsoft is subject to this Court’s specific and general personal jurisdiction consistent with due process and the Delaware Long Arm Statute, 10 Del. C. § 3104. 1 Case 1:17-cv-00570-RGA Document 11 Filed 10/01/17 Page 2 of 37 PageID #: 146 5. Venue in this Judicial District is proper under 28 U.S.C. § 1400(b). 6. Microsoft is registered to do business in Delaware, and has appointed Corporation Service Company, 2711 Centerville Rd., Suite 400, Wilmington, DE 19808, as its registered agent, and either directly, or indirectly through its distribution network, has transacted and/or continues to transact business in Delaware, and has regularly solicited and continues to regularly solicit business in Delaware.
    [Show full text]
  • Nokia Lumia 925 User Guide
    User Guide Nokia Lumia 925 Issue 2.0 EN-US Psst... This guide isn't all there is... There's a user guide in your phone – it's always with you, available when needed. On the start screen, swipe left, and tap Nokia Care. Check out the videos at www.youtube.com/NokiaSupportVideos. For info on Nokia Service terms and Privacy policy, go to www.nokia.com/privacy. © 2013 Microsoft Mobile. All rights reserved. 2 User Guide Nokia Lumia 925 Contents Safety 5 Social networks 54 Get started 6 Messages 56 Keys and parts 6 Mail 60 Back, start, and search key 6 Camera 65 Antenna locations 7 Camera basics 65 Insert the SIM card 7 Advanced photography 70 Remove the SIM card 8 Photos and videos 74 Charge your phone 9 Maps & navigation 78 First start-up 12 Switch location services on 78 Transfer content to your Nokia Lumia 15 HERE Maps 78 Lock the keys and screen 18 HERE Drive+ 84 Connect the headset 19 Positioning methods 88 Change the volume 20 Internet 89 Icons shown on your phone 20 Define internet connections 89 Basics 22 Connect your computer to the web 89 Get to know your phone 22 Use your data plan efficiently 90 Personalize your phone 28 Web browser 90 Take a screenshot 33 Search the web 92 Extend battery life 34 Close all internet connections 92 Save on data roaming costs 36 Entertainment 94 Text input 36 Watch and listen 94 Scan codes or text 40 FM radio 95 Clock 41 Nokia Music 96 SkyDrive 42 Sync music and videos between your phone and computer 98 Nokia account 43 Games 99 Browse your SIM apps 44 Office 101 Store 44 Microsoft Office Mobile 101 People & messaging 47 Write a note 104 Calls 47 Continue with a document on another Contacts 51 device 104 © 2013 Microsoft Mobile.
    [Show full text]
  • UI Design and Interaction Guide for Windows Phone 7
    UI Design and Interaction Guide 7 for Windows Phone 7 July 2010 Version 2.0 UI Design and Interaction Guide for Windows Phone 7 July 2010 Version 2.0 This is pre-release documentation and is subject to change in future releases. This document supports a preliminary release of a software product that may be changed substantially prior to final commercial release. This docu- ment is provided for informational purposes only and Microsoft makes no warranties, either express or implied, in this document. Information in this document, including URL and other Internet Web site references, is subject to change without notice. The entire risk of the use or the results from the use of this document remains with the user. Unless otherwise noted, the companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted in examples herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this docu- ment. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
    [Show full text]
  • Webroot Secureanywhere® Business – DNS Protection Apache License 2.0 • Aws-Sdk-Net Copyright © Amazon.Com, Inc. Apache
    Webroot SecureAnywhere® Business – DNS Protection Apache License 2.0 • aws-sdk-net Copyright © Amazon.com, Inc. Apache License Version 2.0, January 2004 TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 1. Definitions. “License” shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document. “Licensor” shall mean the copyright owner or entity authorized by the copyright owner that is granting the License. “Legal Entity” shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity. For the purposes of this definition, “control” means (i) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity. “You” (or “Your”) shall mean an individual or Legal Entity exercising permissions granted by this License. “Source” form shall mean the preferred form for making modifications, including but not limited to software source code, documentation source, and configuration files. “Object” form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, and conversions to other media types. “Work” shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below).
    [Show full text]
  • Secure Remote Service Execution for Web Media Streaming
    Secure Remote Service Execution for Web Media Streaming vorgelegt von Dipl.-Ing. Alexandra Mikityuk geb. in Leningrad, UdSSR von der Fakultät IV – Elektrotechnik und Informatik der Technischen Universität Berlin zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften - Dr.-Ing. - genehmigte Dissertation Promotionsausschuss: Vorsitzender: Prof. Dr. Thomas Magedanz, Technische Universität Berlin Gutachter: Prof. Dr. Jean-Pierre Seifert, Technische Universität Berlin Gutachter: Prof. Dr. Jean-Claude Dufourd, ParisTech Gutachter: Prof. Dr.-Ing. Ina Schieferdecker, Technische Universität Berlin Tag der wissenschaftlichen Aussprache: 29. August 2017 Berlin 2017 D 83 Abstract Through continuous advancements in streaming and Web technologies over the past decade, the Web has become a platform for media delivery. Web standards like HTML5 have been designed accordingly, allowing for the delivery of applications, high-quality streaming video, and hooks for interoperable content protection. Efficient video encoding algorithms such as AVC/HEVC and streaming protocols such as MPEG-DASH have served as additional triggers for this evolution. Users now employ Web browsers as a tool for receiving streaming media and rendering Web applications, and browsers have been embedded into almost every kind of connected device. The drawback of these technical developments and quick rate of user adoption is that modern Web browsers have introduced significant constraints on devices’ capabilities. First, the computational requirements have risen continuously, resulting in a cycle where modern devices can be nearly outdated after a year or two. Second, as the integration of browser technologies is a complicated matter, not every platform provides the same performance. Different Operating Systems (OSs), chipsets and software engines are the main reasons for this difference in performance.
    [Show full text]
  • Digital Right Management Anagement
    DRM Digital Right Management Bronzetti Stefano mat: 264848 A. A. 2007/2008 1 DRM(Gestione dei diritti digitali) definizione: tutti quei sistemi tecnologici di controllo usati per limitare l’accesso e l’utili zzo a dati o hard ware. Chi detiene i diritti d’autore, può far valere i propri diritti in ambiente digitale grazie alla possibilità di rendere protetti, identificabili e tracc ia bili tu tti gli usi in rete di mater ia li adegua tamen te marchia ti. esempio: evitare duplicati senza autorizzazione (copy protection) spinti da: Chi detiene i diritti d’autore: case discografiche/cinematografiche aziende software/videogiochi/ebook osteggiati da: Gli utenti: Limitazione dei diritti degli utenti (chi compra regolarmente il materiale non può farne l’uso che vuole) DRM = DIGITAL RESTRICTION MANAGEMENT 2 FUNZIONAMENTO DEI SISTEMI DRM idea semplice: i file audio/video vengono codificati e criptati in modo da garantire la protezione contro la copia e l’inoltro verso terzi non autorizzati, consentendo così un uso limitato(ad esempio nel tempo) e predefinito nella licenza d’accesso fornita agli utenti finali. informazioni aggiuntive: la codifica permette di includere informazioni aggiuntive: copyright, licenza, biografia autore ecc.. accesso ai dati: procedure di autenticazione che permettono di distribuire i file richiesti nelle modalità previste dalla licenza sottoscritta dall’utente. EFFETTI: Utenti infastiditi e limitati anche se in buonafede. Non riescono realmente ad arginare le copie illegali, in quanto sono sempre sttitati scava lca tiiti in qua lhlche mo do. 3 PERCHE’ I DRM? nuove tecnologie: banda larga, p2p, lettori mp3/mp4, telefonini di ultima generazione, lettori divx, negozi di contenuti multimediali online.
    [Show full text]
  • Device Data Sheet for Nokia Lumia 710
    DEVICE DATA SHEET FOR NOKIA LUMIA 710 MICROSOFT OFFICE Take your office on the go with Nokia Lumia 710. From the Office Hub you can access pre-loaded mobile versions of Word, Excel, and OneNote to create, edit, and review documents. It also has PowerPoint to make it easy for you to review and edit presentations on your phone. SHARING Start a document on your phone and sync it online to edit on your computer later. With your Windows Live account, you get free* online storage through SkyDrive®. Plus you can easily access, edit, and synchronize SharePoint documents from Office 365 sites to share files with your coworkers. MESSAGING Keep in touch with the people who matter. From the People Hub, create Groups to quickly send emails and messages to your co-workers, family, and friends. For each contact, you can view the conversation history and get one-touch access to recent emails, text messages, phone calls, and NOKIA LUMIA 710 even IMs. You can also link your work and personal email accounts to one inbox so you never miss an important email. *Data charges may apply. TARGET AudIENCE Smartphone Intender/Minimalist NETWORK GSM 850/900/1800/1900 MHz WCDMA Band I (2100), Band II (1900), Band IV (1700/2100), and Band V (850) DIMENSIONS (IN.) 4.68 x 2.45 x 0.5 WEIGHT (OZ.) 4.42 INCludED BATTERY Lithium Ion, 1300mAh TALK TIME1 Up to 7 hours STANDBY TIME1 Up to 16 days HEARING AID M3 & T3 COMPATIBILITY DISPLAY 3.7” LCD touch screen (WVGA, 800 x 480 pixels, 16 million colors), capacitive touch with ClearBlack™ technology MEMORY 512 MB RAM, 8 GB internal
    [Show full text]
  • Microsoft Playready Content Access Technology White Paper
    Microsoft PlayReady Content Access Technology White Paper Microsoft Corporation July 2008 Applies to: Microsoft® PlayReady™ Content Access Technology Summary: Microsoft PlayReady technology provides the premier platform for applying business models to the distribution and use of digital content. This white paper provides an overview of the features, business scenarios, and the technology ecosystem. Legal Notice Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted in examples herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any
    [Show full text]
  • D2.1 System Architecture
    Directorate General for Communications Networks, Content and Technology Innovation Action ICT-687655 D2.1 System Architecture Due date of deliverable: 31 March 2016 Actual submission date: 10 May 2016 Resubmitted with minor changes: 14 July 2017 Start date of project: 1 December 2015 Duration: 36 months Lead contractor for this deliverable: Cisco Version: 14 July 2017 Confidentiality status: Public © 2-IMMERSE Consortium 2017 Page 1 of (135) Grant Agreement number: 687655 — 2-IMMERSE — H2020-ICT-2015 D2.1 System Architecture Abstract This document describes the system architecture being developed by the 2-IMMERSE project. This architecture is designed to enable the four multi-screen service prototypes that will be delivered through the project. The System Architecture is layered as a set of platform services, a client application architecture and production architecture. The system architecture is a work in progress; it will evolve both as we refine it and specify it in more detail, and as we deliver each of the multi-screen service prototypes through the project. Target audience This is a public deliverable and could be read by anyone with an interest in the system architecture being developed by the 2-IMMERSE project. As this is inherently technical in nature, we assume the audience is technically literate with a good grasp of television and Internet technologies in particular. We have included a Technology Overview section that summarises a range of technologies that are potentially applicable within the project. This document will be read by the Project Consortium as it defines the system architecture that will be adopted and evolved throughout the project.
    [Show full text]
  • Nokia 900 User Guide
    Nokia 900 User Guide Issue 1.1 2Contents Contents Divert calls to your voice mailbox or another phone number 30 Make a conference call 31 Safety 4 Silence an incoming call 32 Use your voice to call a contact 32 Get started 6 Keys and parts 6 Contacts & social networking Back, start, and search keys 7 services 32 Insert the SIM card 8 Contacts 32 Charge your phone 9 Social networks 36 Antenna locations 12 Switch the phone on or off 12 Internet 37 Create your Windows Live ID 13 Internet connections 37 Windows Live ID 13 Internet 40 Nokia account 14 Copy contacts from your old phone 14 Messaging & mail 41 Lock or unlock the keys and screen 15 Messages 41 Headset 16 Mail 44 Change the volume 17 Access codes 17 Camera 46 Set your phone to sync with your About the camera 46 computer 18 Take a picture 47 Record a video 47 Basics 18 Camera tips 47 About the start screen and apps Take a self-portrait 48 menu 18 Take a close-up picture 48 Touch screen actions 19 Take a picture in the dark 48 Use your phone when it's locked 21 Take a picture of a moving object 49 Switch between open apps 22 Save location information to your Personalise your phone 22 pictures and videos 49 Write text 24 Send a picture or video 49 Search your phone and the web 27 Share your pictures and videos 50 Control your phone with your voice 27 Indicators on the status bar 28 Your pictures 51 Use your phone in flight mode 28 About the Pictures hub 51 Increase battery life 29 View pictures 51 Mark a picture as a favourite 52 Calls 30 Upload pictures and videos to the Call a contact
    [Show full text]
  • Automated Malware Analysis Report For
    ID: 256920 Cookbook: browseurl.jbs Time: 15:47:13 Date: 04/08/2020 Version: 29.0.0 Ocean Jasper Table of Contents Table of Contents 2 Analysis Report http://micromedia.us/videos/Pichincha/Items/RemoteTeller.mp4 4 Overview 4 General Information 4 Detection 4 Signatures 4 Classification 4 Startup 4 Malware Configuration 4 Yara Overview 4 Sigma Overview 4 Signature Overview 4 Networking: 5 Mitre Att&ck Matrix 5 Behavior Graph 5 Screenshots 6 Thumbnails 6 Antivirus, Machine Learning and Genetic Malware Detection 7 Initial Sample 7 Dropped Files 7 Unpacked PE Files 7 Domains 7 URLs 7 Domains and IPs 8 Contacted Domains 8 Contacted URLs 8 URLs from Memory and Binaries 8 Contacted IPs 10 Public 10 General Information 10 Simulations 12 Behavior and APIs 12 Created / dropped Files 12 Static File Info 18 No static file info 18 Network Behavior 18 TCP Packets 18 DNS Queries 20 DNS Answers 20 HTTP Request Dependency Graph 20 Code Manipulations 20 Statistics 20 Behavior 21 System Behavior 21 Analysis Process: iexplore.exe PID: 6692 Parent PID: 800 21 General 21 File Activities 21 Registry Activities 21 Analysis Process: iexplore.exe PID: 6736 Parent PID: 6692 21 General 22 File Activities 22 Registry Activities 22 Analysis Process: ssvagent.exe PID: 6800 Parent PID: 6736 22 General 22 Copyright null 2020 Page 2 of 23 Registry Activities 22 Analysis Process: Video.UI.exe PID: 5616 Parent PID: 800 22 General 22 File Activities 23 File Read 23 Registry Activities 23 Disassembly 23 Code Analysis 23 Copyright null 2020 Page 3 of 23 Analysis Report http://micromedia.us/videos/Pichincha/…Items/RemoteTeller.mp4 Overview General Information Detection Signatures Classification Sample URL: micromedia.us/video s/Pichincha/Items/Remote SSnnoorrrttt IIIDDSS aallleerrrttt fffoorrr nneetttwwoorrrkk tttrrraaffffffiiicc (((ee...… Teller.mp4 ASAbnbnonorotrr rmIDaaSlll hahiiligeghrht CCfoPPr UUn e UUtwssaoagrgkee traffic (e.
    [Show full text]