Digital Rights Protection - a Great Challenge of the New Millennium Monica E

Total Page:16

File Type:pdf, Size:1020Kb

Digital Rights Protection - a Great Challenge of the New Millennium Monica E Digital Rights Protection - a Great Challenge of the New Millennium Monica E. Borda1 Abstract – The digital era is a blessing and a curse at the same The financial losses caused by piracy became quite time. The huge benefits of digital contents leading to the important and forced producers and distributors of digital explosion of multimedia industries are also responsible for the content to impose standardization in copy protection [33]. huge piracy. The weapons against this piracy are technology and To limit the consequences of piracy the solutions are: legislation, defining digital rights management (DRM), able to technology, meaning technical solutions to prevent or catch protect and enforce the rights associated to the digital content. the illegal behaviors, standardization to impose rules on how The paper discusses the necessity of intellectual rights protection content need to be produced, distributed and consumed, generally and the concepts of DRM in today’s life. It also presents the state of art concerning encryption and defining the so called DRM systems and also protection of watermarking, the main technical solutions for DRM, and digital rights in court. The last years in addition to technical discusses the challenges and new directions for this topic. and legal measures business solutions were taken, based on the bonus concept [14]. Keywords- Intellectual property, Digital Rights Management, Encryption, Watermarking, Security II. DIGITAL RIGHTS PROTECTION CONCEPT I. INTRODUCTION Digital rights - a new concept of the digital world- are the set of rules governing the digital content from the generation Starting with this new millennium, we become “volens, to the consumption. It is at its very beginnings, huge nolens”, performers of “e-life”: e-learning, e-commerce, e- challenges facing it and requiring right solutions (technical, health, e-voting, e-banking etc. The advent of this era is due legislative and political) given by the common effort of the overwhelming to the advantages of digital information whole society. To grow healthily, each culture needs rules compared to its analog counterpart: higher quality in (codes) as Hammurabi Code, the first known legislation code transmission, processing and storage, simpler editing for the Assirobabylonian Empire (approx. 1700 BC), the facilities, lossless copying (the copy of a digital document is Roman Code for the Roman Empire so, obviously the Digital identical with the original). All these were a real blessing for Rights Code for the emerging “Digital Empire”, the largest digital multimedia technologies. “E-life” is in fact everyday one ever known, taking into account the globalization. human’s life put on electronic support. Is it good? Is it wrong? The most widely used term for this code (not yet developed Time will give the right answer. It offers a lot of benefits: as a whole) in today literature is Digital Rights Management distance is vanished; costs of processing, transportation and (DRM) defined as “the collective set of methods and consumption are highly reduced. The old face-to-face techniques used to impose rules on how content is being communications are transposed on computer networks. A produced, distributed and consumed“ [1]. Some other naïve could believe that’s time of “Heaven on Earth”: all the definitions of the term available on the Internet can be found problems caused by human’s dishonesty are disappearing on at [28],[29]. In the MPEG-21 framework [25], DRM is used this new support. Nothing more wrong: the old problems of as Intellectual Property Management and Protection (IPMP). human interaction remain and many new arise, some with All these definitions are referring to the technical aspects of dramatic consequences such as: how to trust the identity of the the problem and are in fact an extension of the Intellectual correspondent, the authenticity and confidentiality of the Rights Protection for digital technologies. information, how to protect the intellectual property. Thus the Intellectual Property (IP) refers “to creation of the mind in blessing given by digital could act as a curse. For producers the scientific, literary and artistic fields” [21]. The creations in and distributors of multimedia contents some of the above- the scientific field, including patents, trademarks, industrial mentioned advantages became generators of huge financial designs and geographic indications of source are defining the losses. Piracy (illegal copying and distribution) of digital Industrial Property, while copyright refers to literary and content stored on CD’s and DVD’s is currently a major artistic works. problem. Also the information contained in web pages, books, The history of the intellectual property starts officially with broadcasted information, are frequently copied and used 1709 Statute of Anne, known as the first copyright law given without any permission of the editor/author. in the 10-th of April 1710 [30]. In fact its beginnings are much deeper in time. In Antiquity and Middle Age, before Guttenberg, copyright protection was not known, the copying 1 Monica E. Borda is with the Communications Department, of manuscripts was made by scribes, than monks (trusty Technical University of Cluj-Napoca, Romania, 400414, 15 C. persons -TP) and the problem of large diffusion being Daicoviciu Street, Email: [email protected] unknown because the population was illiterate, so no need for such protection. The advent of printing press in the European space and its huge development, determined a real revolution (IRTF) Research Group. Now the IRTF group is no longer (“Guttenberg revolution”) in thinking with huge consequences active without accomplishing its missions [15]. for power owners (church and nobility). Consequently History shows that necessity imposes solutions in measures for printing distribution were made: the Licensing legislation, which need to follow the technical and social Act 1662, was the first of many royal decrees to control what development of the society. was being printed. It “established a register of licensed books The history of Intellectual Rights protection illustrates that along with the requirement to deposit a copy of the book to be international laws do not exist for the protection of works licensed. Deposit was administrated by Stationers Company through the whole world. The national laws include measures who were given power to seize books suspected of containing to prevent unauthorized use of copyrighted works (see 1976 matters hostile to the church or government” [30]. Copyright Act of U.S. law [20]). The same history shows that Concerning the Industrial Property, the beginning is countries, through membership in international organizations assigned to the Paris Convention for the Protection of or conventions, try to gain wider protection for home works. It Industrial Property (1883), the first major international treaty is illegal to violate rights protected by copyright laws but (including 14 states) to protect people from one country, to these rights have also limitations, one of them being the “fair obtain protection in the others for their industrial property use” [14]. As an example: despite hacking the Content rights. The necessity of such protection “became evident Scrambled System (CSS) for DVD protection, the Norwegian when foreign exhibitors refused to attend the International teenager Jon Johansen was absolved by the Oslo court Exhibition of Inventions in Vienna in 1873 because they were meanwhile its U.S. partners selling the DeCSS (the afraid their ideas would be stolen and exploited commercially corresponding decryption device) were put to jail. in other countries” [30]. Beside governmental conventions, the private sector is Other important steps in the history of IP protection are: making associations to improve international protection of . 1886 – the Berne Convention for the protection of copyrighted materials (a modern form of guild’s law). One of Literary and Artistic Works, resulting the International them is International Intellectual Property Alliance (IIPA) Copyright Act of 1886 [21], established in 1984 and composed by 7 trade . 1893 – the United International Bureau for Protection of associations from the most interested industries in digital Intellectual Property (BIRPI - corresponding to its French content protection: motion picture, consumer electronics and acronyms), the predecessor of today World Intellectual information technologies [14], [15]. Property Organization (WIPO) For the today’s digital environment, DRM could be . 1912 – the Copyright Act 1911, adopted in 1.07.1912, is a regarded as an extension of copyright for digital medium, but copyright law built by revising and repealing most earlier acts. in reality DRM and copyright have different regime and It extends copyright on records, perforated rolls, sound regulations. Although the used technologies (cryptography recordings and architecture works. and watermarking) are fairly mature, DRM is a new discipline, born to solve the new problems of global . 1952 – the Universal Copyright Convention (UCC) communications requiring universal multimedia access developed by UNESCO as an alternative to the Berne (UMA), which means “delivery of all types of data, for all convention for the non member states as developing countries types of users in all types of conditions” [23]. Fig.1 is giving a and Soviet Union representation of such a system. 1957 – the Copyright Act 1956, adopted in 1.06.1957, In the UMA system the digital
Recommended publications
  • Opencable™ Specifications Opencable Unidirectional Receiver OC-SP-OCUR-I08-081114
    OpenCable™ Specifications OpenCable Unidirectional Receiver OC-SP-OCUR-I08-081114 ISSUED Notice This OpenCable specification is a cooperative effort undertaken at the direction of Cable Television Laboratories, Inc. (CableLabs®) for the benefit of the cable industry. This document may contain references to other documents not owned or controlled by CableLabs. Use and understanding of this document may require access to such other documents. Designing, manufacturing, distributing, using, selling, or servicing products, or providing services, based on this document may require intellectual property licenses for technology referenced in the document. Neither CableLabs, nor any other entity participating in the creation of this document, is responsible for any liability of any nature whatsoever resulting from or arising out of use or reliance upon this document by any party. This document is furnished on an AS-IS basis and neither CableLabs, nor other participating entity, provides any representation or warranty, express or implied, regarding its accuracy, completeness, or fitness for a particular purpose. © Copyright 2005-2008 Cable Television Laboratories, Inc. All rights reserved. OC-SP-OCUR-I08-081114 OpenCable™ Specifications Document Status Sheet Document Control Number: OC-SP-OCUR-I08-081114 Document Title: OpenCable Unidirectional Receiver Revision History: I01 – Released January 9, 2006 I02 – Released February 10, 2006 I03 – Released April 13, 2006 I04 – Released June 22, 2006 I05 – Released October 31, 2006 I06 – Released November 13, 2007 I07 – Released June 20, 2008 I08 – Released November 14, 2008 Date: November 14, 2008 Status: Work in Draft Issued Closed Progress Distribution Restrictions: Author CL/Member CL/ Member/ Public Only Vendor Key to Document Status Codes: Work in Progress An incomplete document, designed to guide discussion and generate feedback that may include several alternative requirements for consideration.
    [Show full text]
  • Tr 101 532 V1.1.1 (2015-02)
    ETSI TR 101 532 V1.1.1 (2015-02) TECHNICAL REPORT End-to-End Network Architectures (E2NA); Mechanisms addressing interoperability of multimedia service and content distribution and consumption with respect to CA/DRM solutions 2 ETSI TR 101 532 V1.1.1 (2015-02) Reference DTR/E2NA-00004-CA-DRM-interop Keywords CA, DRM, interoperability, terminal ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice The present document can be downloaded from: http://www.etsi.org/standards-search The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: https://portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI.
    [Show full text]
  • Smartright: a Copy Protection System for Digital Home Networks Jean-Pierre Andreaux, Alain Durand, Teddy Furon, Eric Diehl
    SmartRight: A Copy Protection System for Digital Home Networks Jean-Pierre Andreaux, Alain Durand, Teddy Furon, Eric Diehl To cite this version: Jean-Pierre Andreaux, Alain Durand, Teddy Furon, Eric Diehl. SmartRight: A Copy Protection System for Digital Home Networks. IEEE Signal Processing Magazine, Institute of Electrical and Electronics Engineers, 2004, 21 (2), pp.100–108. inria-00083200 HAL Id: inria-00083200 https://hal.inria.fr/inria-00083200 Submitted on 29 Jun 2006 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. SmartRight: A Copy Protection System for Digital Home Networks Jean-Pierre Andreaux1, Alain Durand1, Teddy Furon2 and Eric Diehl1 1 THOMSON multimedia R&D France, Rennes, France {jean-pierre.andreaux, alain.durand, eric.diehl}@thomson.net, 2 INRIA / TEMICS, Rennes, France [email protected] Abstract This paper describes the rationales supporting the design of a Copy Protection System. It reflects the experience of the Security Laboratory of Thomson in the development of SmartRight. This paper does not only account the chosen technical solutions. It also explores less technical but highly important issues such as the social, legal and commercial aspects. Hence, while carefully developing our motivations, some light is shed on the very peculiar problems raised by the enforcement of copy protection.
    [Show full text]
  • SECURING DIGITAL CONTENT – STRENGTHS and WEAKNESSES of SOFTWARE and HARDWARE IMPLEMENTATIONS Robin Wilson Nagravision Abstract
    SECURING DIGITAL CONTENT – STRENGTHS AND WEAKNESSES OF SOFTWARE AND HARDWARE IMPLEMENTATIONS Robin Wilson Nagravision Abstract HARDWARE VS. SOFTWARE SECURITY Conditional Access (CA) and Digital “Overview” Rights Management (DRM) are implemented in a number of ways in software (SW) and The security system relies on a hardware (HW). Often these schemes are computation, or algorithm, to decode the described as either “HW” or “SW” based protected content. security or rights management systems. Since SW requires HW on which to execute, Most digital CA systems employ a unique and HW has necessarily SW running on it, key that enables a successful computation. the terminology is often thoroughly confusing The locations on the Set-Top Box (STB) for and misleading. Since we are not dealing the decoding program and key are a the with locks and keys or hypothetical systems, subject o the hardware and software security both hardware and software elements must designations. be present, and work together smoothly, in any sophisticated content security system. “Software Only” Security Further confounding the confusion is the frequent use (and abuse) of terms like This and other terms like “Hardware- “replaceable”, “renewable”, “obfuscated” less”, “Downloadable” and even and “tamperproof”. In this session, these “Renewable” are used to describe security terms will be explained in the context of systems where the security solution supplied content security. by a CA or DRM company does not include hardware. Here the product of the company may be limited to only software but the TERMINOLOGY AND TECHNOBABLE inference is sometimes wrongly made that no additional resources are required or costs are Before embarking on comparing various incurred.
    [Show full text]
  • Etsi Tr 101 532 V1.1.2 (2015-03)
    ETSI TR 101 532 V1.1.2 (2015-03) TECHNICAL REPORT End-to-End Network Architectures (E2NA); Mechanisms addressing interoperability of multimedia service and content distribution and consumption with respect to CA/DRM solutions 2 ETSI TR 101 532 V1.1.2 (2015-03) Reference RTR/E2NA-00007-CA-DRM-interop Keywords CA, DRM, interoperability, terminal ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice The present document can be downloaded from: http://www.etsi.org/standards-search The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: https://portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI.
    [Show full text]
  • Opencable™ Specifications Cablecard Interface 2.0
    OpenCable™ Specifications CableCARD Interface 2.0 Specification OC-SP-CCIF2.0-I27-150330 ISSUED Notice This OpenCable specification is the result of a cooperative effort undertaken at the direction of Cable Television Laboratories, Inc. for the benefit of the cable industry and its customers. You may download, copy, distribute, and reference the documents herein only for the purpose of developing products or services in accordance with such documents, and educational use. Except as granted by CableLabs® in a separate written license agreement, no license is granted to modify the documents herein (except via the Engineering Change process), or to use, copy, modify or distribute the documents for any other purpose. This document may contain references to other documents not owned or controlled by CableLabs. Use and understanding of this document may require access to such other documents. Designing, manufacturing, distributing, using, selling, or servicing products, or providing services, based on this document may require intellectual property licenses from third parties for technology referenced in this document. To the extent this document contains or refers to documents of third parties, you agree to abide by the terms of any licenses associated with such third party documents, including open source licenses, if any. Cable Television Laboratories, Inc. 2004-2015 OC-SP-CCIF2.0-I27-150330 OpenCable™ Specifications DISCLAIMER This document is furnished on an "AS IS" basis and neither CableLabs nor its members provides any representation or warranty, express or implied, regarding the accuracy, completeness, noninfringement, or fitness for a particular purpose of this document, or any document referenced herein. Any use or reliance on the information or opinion in this document is at the risk of the user, and CableLabs and its members shall not be liable for any damage or injury incurred by any person arising out of the completeness, accuracy, or utility of any information or opinion contained in the document.
    [Show full text]
  • NCTA Comments on the ENERGY STAR Version 4.1 STB Specification
    April 13, 2012 Katharine Kaplan EPA Team Lead ENERGY STAR Product Development US Environmental Protection Agency 1200 Pennsylvania Avenue, N.W. Washington, DC 20460 [email protected] Re: ENERGY STAR® Specification for Set-top Boxes Version 4.0 Dear Ms. Kaplan: On behalf of the National Cable & Telecommunications Association (“NCTA”), I am responding to the Environmental Protection Agency’s (“EPA”) March 20, 2012 request for comment on ENERGY STAR® Specification for Set-top Boxes Version 4.0 (“ESv4”). Since the adoption of EPA’s Energy Star Version 3.0 and 4.0 specifications for set-top boxes, the cable industry has launched new initiatives dedicated to improving the energy efficiency of cable-provided consumer set-top boxes on an aggressive timeline. These new initiatives include (1) the creation of CableLabs - Energy Lab (a specific facility within CableLabs1 dedicated to improving energy efficiency); (2) focused projects to increase the efficiency of set-top boxes through development of “light sleep” and “deep sleep” set-top box modes that function with U.S. cable system architectures; and (3) cable operator volume procurement commitments for set-top boxes that meet ENERGY STAR standards to move the 1 Cable Television Laboratories or CableLabs, founded in 1988, is the cable industry’s R&D consortium playing a role similar to that played by BellLabs for the telephone industry. CableLabs has over 40 cable operator members representing over 80 million customers, predominantly in North American (US and Canada), but also internationally in Europe, Asia, and Central America. Among other things, CableLabs developed common specifications for the cable modem enabling the size and price of such modems to plummet in a short time as they were made available at retail outlets across the country which, in turn, spurred the revolution in broadband access the Nation has experienced in recent years.
    [Show full text]
  • Approaches to Security and Access Control for Digital Cable Television
    APPROACHES TO SECURITY AND ACCESS CONTROL FOR DIGITAL CABLE TELEVISION Claude T. Baggett Cable Television Laboratories, Inc. Louisville, CO 80027-1266 Abstract cable system size, services, operating philosophy, and access to capital. This paper addresses the several design trade-offs which should be considered by a system operator in selecting a security and In analog television, there is basically only access control sub-system for protecting digital one decision which must be made for access television signals on cable television systems. control; that is, whether to descramble the Factors are discussed which have a strong incoming signal or not. The same descrambler impact on the strength, adaptability, and cost in the set-top converter is used whether the of such systems. The principles discussed in system has one scrambled channel or many. this paper apply whether the primary source of The sophistication and depth of the scrambling security and access control in the subscriber mechanism is limited because the analog signal home is found in a set-top decoder, a decoder is very difficult to reconstruct without leaving interface unit, a home server, or as an insertion unacceptable artifacts in the visible picture. in an MPEG-capable computer or television Therefore, with only one, very limited, receiver. process to protect the analog television signal, meaningful security is difficult. Some later systems, which use line shuffling under the SCOPE control of a modem cryptographic system and hard-encrypted audio, are much superior in This paper will address the options which this aspect, but are costly and have come too system operators should consider in choosing late relative to the advent of digital television.
    [Show full text]
  • Advances in Digital Video Content Protection
    Advances in Digital Video Content Protection EUGENE T. LIN, STUDENT MEMBER, IEEE, AHMET M. ESKICIOGLU, REGINALD L. LAGENDIJK, SENIOR MEMBER, IEEE, AND EDWARD J. DELP, FELLOW, IEEE Invited Paper The use of digital video offers immense opportunities for of illegal copying and distribution on a massive scale. This creators; however, the ability for anyone to make perfect copies problem is not merely theoretical. Popular Internet software and the ease by which those copies can be distributed also facilitate based on a peer-to-peer (P2P) architecture (such as Kazaa misuse, illegal copying and distribution (“piracy”), plagiarism, and misappropriation. Popular Internet software based on a [1], BitTorrent [2], eDonkey [3], and Gnutella) has been used peer-to-peer architecture has been used to share copyrighted to share (distribute) copyrighted music, movies, software, movies, music, software, and other materials. Concerned about and other materials. Furthermore, future P2P systems may the consequences of illegal copying and distribution on a massive encrypt the data being shared, preserve the anonymity of scale, content owners are interested in digital rights management its users, support a larger number of users, and be more (DRM) systems which can protect their rights and preserve the economic value of digital video. A DRM system protects and robust [4], [5]. These advances in P2P systems will create enforces the rights associated with the use of digital content. considerable challenges for copyright enforcement. Thus, Unfortunately, the technical challenges for securing digital content there is a great desire for digital rights management (DRM) are formidable and previous approaches have not succeeded. We systems that can preserve the economic value of digital overview the concepts and approaches for video DRM and describe video and protect the rights of the owners.
    [Show full text]
  • DSTAC WG4 Report August 4, 2015
    DSTAC WG4 Report August 4, 2015 REPORT OF WORKING GROUP 4 TO DSTAC Introduction Working Group 4 (WG4) was formed out of the larger DSTAC to address the topic of device platforms, variability, and interfaces. Guidance Description (Part I) The working group will identify existing devices and technologies that receive MVPD and OTT service, such as DVRs, HDTVs, personal computers, tablets in home, connected mobile devices, take- and-go mobile devices, etc., and identify the salient differences important to implementation of the non-security elements of a system to promote the competitive availability of such devices based on downloadable security. (Part II) For each category of existing device identified above, the working group will identify a system comprising minimum standards, protocols, and information other than security elements to enable competitive availability of devices that receive MVPD services. (Part III) The working group may identify alternative systems as appropriate to promote the availability of different categories of navigation devices, consistent with the Commission’s instruction to recommend an approach that would allow consumer electronics manufactures to build devices with competitive interfaces and an approach under which MVPDs would maintain control of the user interface. Product The working group will deliver and present its findings to the full DSTAC. DSTAC WG4 Report August 4, 2015 Table of Contents Part I: Existing Devices and Technologies ...............................................................................................
    [Show full text]
  • Certification for FCC Approval for Use with the Broadcast Flag
    Certification for FCC Approval for Use With the Broadcast Flag Submitted by: THOMSON, on behalf of itself and the following companies supporting the SmartRight system: AXALTO GEMPLUS SA MICRONAS NAGRAVISION SA PIONEER CORPORATION SCM MICROSYSTEMS ST MICROELECTRONICS N.V. Research and Innovation, 10330 North Meridian St. (317) 587-4832 Phone Innovation Projects, INH 415 (317) 587-9796 Fax THOMSON Indianapolis, IN 46290 David H. Arland www.thomson.net Vice President U.S. Corporate Communications and Government Relations March 1, 2004 Federal Communications Commission Office of the Secretary Att: Broadcast Flag Certifications c/o Natek, Inc. 236 Massachusetts Avenue, N.E. Suite 110 Washington, D.C. 20002 Re: Dear Ms. Dortch: Thomson, on behalf of itself and Axalto, Gemplus S.A., Micronas, Nagravision S.A., Pioneer Corporation, SCM Microsystems, and ST Microelectronics N.V., companies that support the SmartRight system, is pleased to submit for the Commission’s consideration a Broadcast Flag technology certification for “SmartRight.” SmartRight is an encryption-based digital broadcast content protection system that recognizes and gives effect to the “Broadcast Flag” for the purpose of preventing unauthorized, indiscriminate redistribution of digital broadcast content over the Internet, in conformance with FCC rules. The attached Broadcast Flag Certification includes information and documentation to permit the Commission to evaluate SmartRight consistent with the elements requested in its January 23, 2004 Public Notice (DA 04-145) (“Broadcast Flag Certification Public Notice”). This includes: a general description of how SmartRight works, including its scope of redistribution; a detailed analysis of the level of protection SmartRight affords to digital broadcast content; information regarding the extent to which content owners, broadcasters, or equipment manufacturers have expressed support for SmartRight; and a copy of SmartRight’s licensing terms and fees, which evidence that the technology will be licensed on a reasonable and non- discriminatory basis.
    [Show full text]
  • The Complete Technical Paper Proceedings From
    THE COMPLETE TECHNICAL PAPER PROCEEDINGS FROM: AN EVALUATION OF ALTERNATIVE TECHNOLOGIES FOR INCREASING NETWORK INFORMATION CAPACITY Ron Shani, Xtend Networks David Large, Consultant Abstract interchangeably with “information capacity” and “RF bandwidth” will be used when the HDTV, VOD, ITV and other applications historical meaning is intended). The are placing ever-greater pressure on increasing bandwidth demands fall into three operators to transport more information – broad categories: that which is widely distributed as well as communications with individual customers. 1) Common downstream (“broadcast”) Choosing how to create adequate capacity is bandwidth; that is, bandwidth occupied by difficult; driven by financial and regulatory signals that are transmitted throughout the constraints, capital costs and ongoing network (irrespective of whether or not operating considerations. individual customers are enabled to receive them). An example of common signals would This paper will evaluate some of the be a high-definition stream from HBO that technical options against those factors. would be continuously transmitted system- Evaluated technologies will include wide, but for which only certain subscribers bandwidth expansion to 1 GHz, more efficient would be authorized. modulation, more efficient video encoding, elimination of analog video carriage, splitting 2) Interactive downstream (“unicast”) of existing nodes, switched digital video and a bandwidth; that is, bandwidth occupied by proposed use of frequencies above 1 GHz that signals that are transmitted to individual offers the greatest bi-directional bandwidth customers. VOD, Internet communications expansion and the greatest benefit/cost ratio. and telephone are all examples of such signals. INTRODUCTION 3) Upstream bandwidth; that is, bandwidth occupied by signals that are transmitted from Bandwidth Pressures individual customers towards the headend.
    [Show full text]