VCAS™ for Hospitality IPTV Optimized Configurations for Hospitality Applications

Total Page:16

File Type:pdf, Size:1020Kb

VCAS™ for Hospitality IPTV Optimized Configurations for Hospitality Applications VCAS™ for Hospitality IPTV Optimized Configurations for Hospitality Applications Verimatrix, Inc. 6825 Flanders Drive San Diego, CA 92121, USA Telephone: +1-858-677-7800 Fax: +1-858-677-7804 www.verimatrix.com Copyright © 2008-2010 Verimatrix, Inc. All rights reserved. Specifications and product availability are subject to change without notice. Table of Contents 1 Introduction .................................................................................................................................3 1.1 Verimatrix Video Content Authority System (VCAS™) .......................................................3 1.2 IPTV in Hospitality Deployments.........................................................................................3 2 VCAS for IPTV – Solution Overview ...........................................................................................4 2.1 Software-based Security for Hospitality IPTV .....................................................................4 2.2 System Architecture and Key Components.........................................................................5 2.3 Product Features.................................................................................................................6 2.4 Third-party Components and Resources ............................................................................6 3 VCAS for Hospitality IPTV - Configurations and Examples ........................................................7 3.1 Optimized VCAS for Hospitality IPTV Appliance.................................................................7 3.2 VOD Service Support..........................................................................................................8 3.3 Wholesale IP Broadcast Support ........................................................................................9 3.4 DTH Broadcast Support ....................................................................................................10 3.5 Adding Local Broadcast and VOD Encryption...................................................................11 3.6 Expanding Capacity and Redundancy ..............................................................................11 4 Client Device Technologies.......................................................................................................12 4.1 ViewRight® STB ...............................................................................................................12 4.2 ViewRight® PC Player ......................................................................................................12 4.3 VideoMark™......................................................................................................................13 5 Verimatrix – Securing Content, Enhancing Entertainment........................................................14 June 2010 Copyright © 2008-2010 Verimatrix, Inc. 2 1 Introduction 1.1 Verimatrix Video Content Authority System (VCAS™) Verimatrix specializes in securing and enhancing revenue on multi-device digital TV services around the globe. The award-winning and independently audited Verimatrix Video Content Authority System (VCAS™) and ViewRight® solutions offer an innovative approach for cable, satellite, terrestrial and IPTV operators to cost-effectively extend their networks and enable new business models. As the clear leader in software-based security solutions progressive service providers, Verimatrix has pioneered the 3-Dimensional Security approach that offers flexible layers of protection techniques to address evolving business needs and revenue threats. The Verimatrix 3- Dimensional strategy addresses key technology issues facing operators with a combination of: Network dimension – Best of breed encryption and key management for the widest range of delivery networks, including broadcast satellite, cable and terrestrial, IPTV and hybrid, video-on-demand (VOD), mobile, Internet TV and over-the-top (OTT). Device dimension – Beyond the living room to computers and on-the-go applications. The technology approach includes a hardened, downloadable Verimatrix ViewRight™ security core for STBs, PCs and Macs in IPTV and hybrid applications, as well as mobile/CE devices including iPhone/iPad and Android using adaptive rate streaming. Threat dimension – Since not all threats to digital TV security look alike, VCAS offers a layered set of tools and techniques to enable a flexible system protection profile. Features such as hardening, fingerprinting, watermarking and clone detection help operators address revenue loss from theft of service and rapid renewability provides a fast countermeasure capability. VCAS fully exploits the power and elegance of modern two-way IP infrastructure to provide a superior level of content and revenue security. Cryptographic and secure electronic transaction technologies proven in e-commerce, together with increasingly sophisticated features of client device chipsets, enable VCAS to offer a more renewable and flexible security implementation than legacy architectures. Maintaining close relationships with major studios, broadcasters, industry organizations and its unmatched partner ecosystem enables Verimatrix to provide a unique perspective on complex business issues beyond content security as operators seek to deliver compelling new services. 1.2 IPTV in Hospitality Deployments IP video distribution in hospitality environments has become the most advanced and cost effective technology, with many advantages, including: Flexibility in wiring infrastructure (CAT5/6, cable or telephone transmission) Fully digital quality distribution and display, including HD support Common components with in-room broadband access True interactive program guide and guest service utility displays State-of-the-art content security enables licensing of on-demand content incl. HD Broad choice of middleware, video-on-demand (VOD) and in-room client technologies. June 2010 Copyright © 2008-2010 Verimatrix, Inc. 3 2 VCAS for IPTV – Solution Overview 2.1 Software-based Security for Hospitality IPTV The heart of the hospitality content and revenue security solution is the VCAS for IPTV solution. Verimatrix has also cultivated a very broad partner ecosystem providing all required complementary components, installation and operational services for such applications. VCAS for IPTV is already operational in numerous hospitality deployments around the world. In the software-based VCAS for IPTV solution, Verimatrix eliminates the vulnerabilities related to smart card based architectures through the leverage of mature, proven two-way Internet security protocols, a Public Key Infrastructure (PKI) public/private key pair system and X.509 digital certificates. A downloadable security system for IPTV clients is not only more secure; it also enables less expensive receiver hardware. The renewable security software can be updated as required to combat any attempts at piracy. Verimatrix offers a layered security solution for hospitality pay-TV operators using a combination of: Strong encryption, using robust encryption algorithms such as AES, together with key management tried and trusted in the school of Internet commerce applications. User specific forensic watermarking of decompressed video streams with a unique, robust identifier that is traceable to the place and time of viewing. Technologies that can detect and alert the operator to suspicion of cloning in the client population, in order to prevent theft of service. This unique, multi-layered security is enabled for a wide variety of client types through a robust ViewRight client library implementation. An optimized VCAS for IPTV configuration is available for hospitality deployments, further described in this document. June 2010 Copyright © 2008-2010 Verimatrix, Inc. 4 2.2 System Architecture and Key Components Figure 1: VCAS for IPTV – End-to-End Architecture Content Security Manager (CSM™) – Contains the VCAS security components to support authentication, key distribution and user control. Real-Time Encryption System (RTES™) – Performs 128-bit AES or RC4 encryption of multicast streams of encapsulated video content. RTES offers intelligent MPEG-aware stream encryption, selectable from 1-100%. MultiCAS™/IP – An alternative to RTES, MultiCAS™/IP generates ECMs in conjunction with third-party, high-performance IP streamers supporting DVB Simulcrypt. Video Pre-Processor (VPP) – Performs offline 128-bit AES or RC4 encryption of on- demand content files before storage on dedicated VOD servers. The MPEG-aware encryption process preserves key header fields used by VOD servers for “trick play” support. ViewRight® STB – A robust package of portable embedded code that implements VCAS security functions within each IP-STB without the need for smart cards. It offers best-of- breed, software-based content security for two-way networks in a hardened implementation, incorporating signing, multi-level integrity checking, key obfuscation and rapid renewability. ViewRight® PC Player – A self-contained and highly secure player that turns any broadband-connected PC into a full-function IPTV client including video recording. VideoMark™ – Patented technology for user-specific forensic tracking, it inserts an invisible yet very robust watermark in the video stream prior to content output from the STB. This identifier can be used to trace misappropriated content back to the last authorized recipient. Third-party components (in blue) – Selection of receivers, middleware and VOD
Recommended publications
  • DRM) Technology in Contemporary Copyright
    The Role of Digital Rights Management (DRM) Technology in Contemporary Copyright Joseph Straus Munich International Forum on the Centennial of Chinese Copyright Legislation Renmin University of China, Beijing October 15, 2010 © J. Straus 2010 -1- Points to Consider • Copyright & technology – two old companions – dialectic relationship • Technology promoter of (re)production and distribution of works & challenge of copyright • Digitization – new quantitative & qualitative challenge • Legal & technical response • Where is the right balance of interests: creators & publishers v. users, hardware manufacturers, etc. → social progress? © J. Straus 2010 -2- Copyright & Technology – Two Old Companions China, the Technological Frontrunner • 105 AD - Lun Cai invents paper manufacturing technique • 1041 AD – Sheng Bi invents movable type printing • No legal impact – due to social/intellectual environment [no revolution] and due fragmented to agricultural economy [Chao Xu] © J. Straus 2010 -3- Copyright & Technology – Two Old Companions Europe – the Late(r) Commer • 1439 – Johannes Gutenberg invents movable type printing • 1469 – Johann von Speyer granted printing privilege by the city of Venice • Etching technique (copper engraving) invented – privileges for reproduction granted (Albrecht Dürer) • 15th-17th Century – numerous such privileges granted in Europe Social Revolution (Renaissance, humanism, reformation) & technology & market → protection against copying → printers & publishers, i.e. industry prime beneficiary • Idea of intellectual property
    [Show full text]
  • Ms. Marlene H. Dortch, Secretary Federal Communications Commission 445 12Th St., SW Washington DC 20554
    aai American Antitrust Institute Ms. Marlene H. Dortch, Secretary Federal Communications Commission 445 12th St., SW Washington DC 20554 October 21, 2003 Dear Chairman Powell: Subject: Digital Broadcast Copy Protection, MB Docket No. 02-230 We are writing to urge the Commission to carefully consider the consumer effects, the anticompetitive impacts, and the extensive costs that a Broadcast Flag scheme will impose on a wide-range of consumer-electronics devices and personal computers. Despite our efforts to raise these questions about the Broadcast Flag approach—efforts that predate even the Commission’s decision to create a Broadcast Flag docket—they remain unanswered to this day, except by unsupported generalizations that the scheme will cost “pennies.”1 Because the proponents of the Broadcast Flag scheme have yet to address these issues—issues that may not only affect consumer pocketbooks but also may slow or even halt the transition to digital television—we believe the Commission does not yet have the complete record necessary to decide whether and how to implement this scheme. Below we suggest potential remedies to these deficiencies. Here are three of the major questions that remain unanswered in the existing record: After the flag is adopted, will consumers have the same reasonable and customary uses with their digital television content that they enjoy in today’s analog world? The proposal offered by the Motion Picture Association of America makes clear that the Flag scheme will tether user-recorded content in new ways. It will not allow consumers to watch that content on machines other than new, compliant devices (but it is unclear if it will permit recordings to be shared within a user’s own “personal digital network”).
    [Show full text]
  • Content Supplier's Perspective
    CONTENT SUPPLIER’S PERSPECTIVE: HOME NETWORKS AND RIGHTS MANAGEMENT Robert M. Zitter, Craig D. Cuttner Home Box Office Abstract subsequent distribution windows such as home video, pay-per-view, etc. – each Copyright Protection, Digital Rights window and its attendant revenue stream is Management, Home Networks and other critical to the total revenue stream that buzzwords are all swirling around in a makes theatrical movie production a viable frenzy that has seemingly pitted content ongoing business. providers against operators and all seem to make consumers appear to be felons. If video programs are available on the Internet at no charge, once the Internet is This paper defines the scope of the issue connected to a digital home network, and discusses the pro- and con-attributes of consumers will be less likely to pay for the a Home Network. services MVPDs offer. Beginning in the first-steps of initial Distribution Security implementation of “simple” Copy Control Information (CCI) and how that may Over time, cable distribution technology evolve into sophisticated Digital Rights has evolved to thwart the capabilities of the Management (DRM) systems. “consuming public” to circumvent the collection of fees and protect revenues. BACKGROUND Non-standard channel (“mid-band” placement for pay channel security in the Content Value and Cable Value ‘70s) was succeeded by block converter devices and, later, by the cable-ready TV, The ‘sale’ of access to video content has which necessitated trapping. Higher value been a hallmark of the cable television premium TV led to channel scrambling and industry since its inception. Technology fixed (programmed) descrambling STB’s.
    [Show full text]
  • Copy Protection
    Content Protection / DRM Content Protection / Digital Rights Management Douglas Dixon November 2006 Manifest Technology® LLC www.manifest-tech.com 11/2006 Copyright 2005-2006 Douglas Dixon, All Rights Reserved – www.manifest-tech.com Page 1 Content Protection / DRM Content Goes Digital Analog -> Digital for Content Owners • Digital Threat – No impediment to casual copying – Perfect digital copies – Instant copies – Worldwide distribution over Internet – And now High-Def content … • Digital Promise – Can protect – Encrypt content – Associate rights – Control usage 11/2006 Copyright 2005-2006 Douglas Dixon, All Rights Reserved – www.manifest-tech.com Page 2 1 Content Protection / DRM Conflict: Open vs. Controlled Managed Content • Avoid Morality: Applications & Technology – How DRM is impacting consumer use of media – Awareness, Implications • Consumers: “Bits want to be free” – Enjoy purchased content: Any time, anywhere, anyhow – Fair Use: Academic, educational, personal • Content owners: “Protect artist copyrights” – RIAA / MPAA : Rampant piracy (physical and electronic) – BSA: Software piracy, shareware – Inhibit indiscriminate casual copying: “Speed bump” • “Copy protection” -> “Content management” (DRM) 11/2006 Copyright 2005-2006 Douglas Dixon, All Rights Reserved – www.manifest-tech.com Page 3 Content Protection / DRM Content Protection / DRM How DRM is being applied • Consumer Scenarios: Impact of DRM – Music CD Playback on PC – Archive Digital Music – Play and Record DVDs – Record and Edit Personal Content • Industry Model: Content
    [Show full text]
  • Content Protection Status Report
    April 25, 2002 CONTENT PROTECTION STATUS REPORT Overview For many years and within many forums MPAA and its member companies have engaged with the Information Technology (“IT”) and Consumer Electronics (“CE”) industries in collaborative efforts aimed at creating viable markets for digitally delivered media. The development of the DVD standard serves as a shining example of a vibrant consumer market that results when these collaborations hit their mark. While positive progress is being made on many fronts, ever-increasing levels of online piracy may destroy the market for digital entertainment before it has a chance to be fully birthed. In recent Congressional testimony, executives from the motion picture and television industries laid out three key goals that must be attained if this trend toward rampant piracy is to be stemmed and give way to the development of a legitimate market. These include: Goal One: Implementing a “broadcast flag” to prevent the unauthorized redistribution of in-the-clear digital over-the-air broadcast television including its’ unauthorized redistribution over the Internet. Goal Two: Plugging the “analog hole,” that results from the fact that digital devices are not generally designed to respond to current analog protection mechanisms. Thus, protected analog content, including content that originated in protected digital format but was stripped of its digital protection when it was converted to analog for display on analog TV receivers, is left unprotected when converted to a digital format. Goal Three: Putting an end to the avalanche of movie theft on so-called ‘file-sharing” services, such as Morpheus, Gnutella, and other peer-to-peer (p2p) networks.
    [Show full text]
  • Broadcast Flags and the War Against Digital Television Piracy: a Solution Or Dilemma for the Digital Era? Debra Kaplan Indiana University School of Law
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Indiana University Bloomington Maurer School of Law Federal Communications Law Journal Volume 57 | Issue 2 Article 12 3-2005 Broadcast Flags and the War Against Digital Television Piracy: A Solution or Dilemma for the Digital Era? Debra Kaplan Indiana University School of Law Follow this and additional works at: http://www.repository.law.indiana.edu/fclj Part of the Administrative Law Commons, Antitrust and Trade Regulation Commons, Communications Law Commons, Intellectual Property Law Commons, Jurisdiction Commons, and the Legislation Commons Recommended Citation Kaplan, Debra (2005) "Broadcast Flags and the War Against Digital Television Piracy: A Solution or Dilemma for the Digital Era?," Federal Communications Law Journal: Vol. 57: Iss. 2, Article 12. Available at: http://www.repository.law.indiana.edu/fclj/vol57/iss2/12 This Note is brought to you for free and open access by the Law School Journals at Digital Repository @ Maurer Law. It has been accepted for inclusion in Federal Communications Law Journal by an authorized administrator of Digital Repository @ Maurer Law. For more information, please contact [email protected]. Broadcast Flags and the War Against Digital Television Piracy: A Solution or Dilemma for the Digital Era? Debra Kaplan* I. INTRODUCTION ............................................................................ 326 II. THE MECHANICS OF THE SOLUTION ............................................ 328 A . The A TSC F lag
    [Show full text]
  • Before the Federal Communications Commission Washington, D.C. 20554
    Before the Federal Communications Commission Washington, D.C. 20554 In the Matter of ) ) Motion Picture Association of America, Inc. ) CS Docket No. 97-80 ) MB Docket No. 08-82 ) CSR-7947-Z Petition for Waiver of ) 47 C.F.R. § 76.1903 ) ) __________________________________________) Opposition of the Consumer Electronics Association to Motion Picture Association of America Petition for Waiver of 47 C.F.R. § 76.1903 July 21, 2008 Before the Federal Communications Commission Washington, D.C. 20554 In the Matter of ) ) Motion Picture Association of America, Inc. ) CS Docket No. 97-80 ) MB Docket No. 08-82 ) CSR-7947-Z Petition for Waiver of ) 47 C.F.R. § 76.1903 ) ) __________________________________________) Opposition of the Consumer Electronics Association to Motion Picture Association of America Petition for Waiver of 47 C.F.R. § 76.1903 The Consumer Electronics Association (“CEA”) submits these Comments in response and opposition to the permanent waiver of 47 C.F.R. § 76.1903, petitioned for by the Motion Picture Association of America (“MPAA”). CEA is the principal trade association promoting growth in the consumer technology industry through technology policy, events, research, promotion and the fostering of business and strategic relationships. CEA represents more than 2,200 corporate members involved in the design, development, manufacturing, distribution and integration of audio, video, mobile electronics, wireless and landline communications, information technology, home networking, multimedia and accessory products, as well as related services that are sold through consumer channels. CEA has a strong interest in the outcome of this proceeding. CEA’s members manufactured and distributed to the public, in good faith, the television receivers that would unexpectedly go dark in many homes as a result of Selectable Output Control (“SOC”) being activated, remotely, by content providers or distributors.
    [Show full text]
  • Ofcom BBC DRM Consultation Response
    Ofcom BBC DRM consultation response Organisational Signatories (see end for personal signatories): 1. Open Rights Group 2. Electronic Frontier Foundation 3. Consumer Focus 4. Free Software Foundation 5. Somethin' Else! 6. FriBit, Norway 7. Electronic Frontier, Norway 8. Open Source Initiative 9. Vrijschrift/Scriptum Libre 10. European Digital Rights 1. Summary Open Rights Group (ORG) was founded in 2005 by 1,000 digital activists. It has since become the UK’s leading voice defending freedom of expression, privacy, innovation, consumer rights and creativity on the net. ORG is pleased to contribute to this Ofcom consultation. ORG believes that the BBC has not made a case for adding DRM to its free-to-air broadcasts. The DRM proposed by the BBC (like all DRM systems) will not be adequate to prevent unauthorised redistribution of FTA broadcasts. Further, the existence of other, DRM-free versions of the same content (such as US FTA broadcasts) means that would-be redistributors can dispense with the bother of breaking the BBC's DRM and redistribute copies of the content that have originated from other sources, making the case for DRM even less sensible. However, this DRM failure will not have a material effect on the UK DTT rollout. The threats of unspecified copyright holders to boycott DTT without DRM are simply not credible; they are a re-hash of threats made over US broadcasts seven years ago, threats that rightsholders have not carried out. Furthermore, if access to the unspecified imperilled content is critical to DTT rollout, then this measure is inadequate to ensure that it will be present on DTT if the BBC gets its way, as the BBC has not produced any promises from rightsholders to the effect that they will license to DTT once DRM is in place.
    [Show full text]
  • Content Protection Technologies for Consumer Equipments
    CONTENT PROTECTION TECHNOLOGIES FOR CONSUMER EQUIPMENTS Serkan EMEK [email protected] DigiTurk, Digital Platform İletişim Hizmetleri A.Ş., 34353, Beşiktaş, İstanbul YTÜ FBE Elektronik ve Haberleşme Müh., Haberleşme Doktora Programı , Yıldız, İstanbul ABSTRACT unauthorized reproduction and distribution only in a digital environment. If protected digital content is Digital piracy is most important problem for multimedia converted to analog format these content protection services because of tremendous development of new IT mechanisms are eliminated or reduced. This presents a technologies. There is no one solution to the challenge of problem in that digital devices can capture and digitize digital piracy. There is today a robust and growing unprotected analog signals with complete disregard for market for content protection systems, and a number of current copy protection mechanisms, thus enabling a technologies have been developed and implemented, or major source of unauthorized duplication and/or are available for implementation.. In this work, we give a redistribution. Such analog to digital conversions are easy brief about current copy protection technology and to accomplish with the use of widely available, effects of technology for consumer equipments as well as inexpensive PC technology and other digital recording new STBs, DVRs, PVRs, DVD players and recorders, devices with analog inputs. VCRs, DV Camcoders. 2.1. WATERMARKING 1. INTRODUCTION The primary means to address the analog hole is via The success of the Internet, cost-effective and popular embedded watermarks Watermarking is a type of Copy digital recording, storage a and player devices, and the Control Information (CCI) marking system. These promise of higher bandwidth and quality of services for systems allow usage rules to be conveyed with the both wired and wireless networks have made it possible content.
    [Show full text]
  • Entertainment Industry Fights Piracy 7 February 2006
    Entertainment industry fights piracy 7 February 2006 Finding itself in a whirlwind battle of fighting devices, he says it's about protecting copyright revenue losses as a result of piracy, the material through signal technologies. entertainment industry is pushing legislation that would prevent the exploitation of a gap in content Meanwhile, Fritz Attaway, MPAA special policy protection technology known as the "analog hole." advisor, says such legislation "will prevent honest consumers from straying off the path," not intended The Digital Transition Content Security Act of 2005 for commercial pirates who could eventually hack referred to the House Committee on the Judiciary into such a system. last year is being heavily supported by giants in the industry such as the Motion Picture Association But both Marks and Attaway say it's a mandate who demonstrated Monday methods in how pirates protecting manufacturers who may soon be are taking advantage of the loophole during analog- regulated to ensure material is copyrighted. to-digital conversion. The proposed legislation also expands upon the The legislation addresses the breech in content power of the Patent Trademark Office authorizing it protection when digital signals are converted into to conduct ongoing rulemakings to update the an unprotected analog format, thus allowing for technology that would answer to the mandate. digital rights management information (DRM) or content protection coding not to be maintained and According to a spokesperson from the USPTO, the copies made of the original content. USPTO supports the Rep. F. James Sensenbrenner's, R-Wis., efforts to achieve inter- If passed, the bill mandates electronics industry consensus on a solution to the analog hole manufacturers to produce devices that detect problem.
    [Show full text]
  • Digital Television: an Overview
    Order Code RL31260 CRS Report for Congress Received through the CRS Web Digital Television: An Overview Updated June 22, 2005 Lennard G. Kruger Specialist in Science and Technology Resources, Science, and Industry Division Congressional Research Service ˜ The Library of Congress Digital Television: An Overview Summary Digital television (DTV) is a new television service representing the most significant development in television technology since the advent of color television in the 1950s. DTV can provide sharper pictures, a wider screen, CD-quality sound, better color rendition, and other new services currently being developed. The nationwide deployment of digital television is a complex and multifaceted enterprise. A successful deployment requires: the development by content providers of compelling digital programming; the delivery of digital signals to consumers by broadcast television stations, as well as cable and satellite television systems; and the widespread purchase and adoption by consumers of digital television equipment. The Telecommunications Act of 1996 (P.L. 104-104) provided that initial eligibility for any DTV licenses issued by the Federal Communications Commission (FCC) should be limited to existing broadcasters. Because DTV signals cannot be received through the existing analog television broadcasting system, the FCC decided to phase in DTV over a period of years, so that consumers would not have to immediately purchase new digital television sets or converters. Thus, broadcasters were given new spectrum for digital signals, while retaining their existing spectrum for analog transmission so that they can simultaneously transmit analog and digital signals to their broadcasting market areas. Congress and the FCC set a target date of December 31, 2006 for broadcasters to cease broadcasting their analog signals and return their existing analog television spectrum to be auctioned for commercial services (such as broadband) or used for public safety communications.
    [Show full text]
  • If Piracy Is the Problem, Is DRM the Answer?
    If Piracy is the Problem, Is DRM the Answer? Stuart Haber, Bill Horne, Joe Pato, Tomas Sander, Robert Endre Tarjan Trusted Systems Laboratory HP Laboratories Cambridge HPL-2003-110 May 27th , 2003* security, Piracy of digital content is considered a serious problem by content content companies. Digital Rights Management is considered a potential protection, solution to this problem. In this paper we study to what degree digital rights DRM can live up to this expectation. We conclude that given the management, current and foreseeable state of technology the content protection trust, privacy, features of DRM are not effective at combating piracy. The key piracy problem is that even if only a small fraction of users are able to get content from a protected form into an unprotected form, then illegitimate distribution networks are likely to make that content available ubiquitously. One possible technological solution to the problem is what we call “draconian DRM,” which involves deploying devices that only process managed content. However, we find that such systems face significant, if not insurmountable, obstacles to deployment and we believe that the real solution to the piracy problem is largely non-technical. The most effective way for interested parties to defeat piracy may be to compete with it. * Internal Accession Date Only Approved for External Publication To be published as a chapter in Digital Rights Management: Technological, Economic, Legal and Political Aspects, ed. Eberhard Becker, Willms Buhse, Dirk Günnewig, Niels Rump, Springer-Verlag, 2003 ã Copyright Springer-Verlag If Piracy is the Problem, Is DRM the Answer? 1 Stuart Haber, Bill Horne, Joe Pato, Tomas Sander, Robert Endre Tarjan Hewlett-Packard Company 1 Summary Piracy of digital content is considered a serious problem by content companies.
    [Show full text]