1 Intellectual Property Management and Protection in MPEG Standards Rob Koenen Chairman MPEG Requirements Group 1 Abstract MPEG has a long history in dealing with DRM issues. Gradually, MPEG is moving from defining hooks to proprietary systems (MPEG-2, MPEG-4 Version 1) to more encompassing standardization in Intellectual Property Management and Protection. MPEG feels that this is necessary to achieve MPEG s most important goal: interoperability. The need for a standard rights description language has been identified in MPEG-4, MPEG-7 and MPEG-21. This will be discussed in Pisa during MPEG s 55 th meeting, which takes place the week before the W3C workshop 2 Introduction MPEG has a long history with Digital Rights Management issues. The MPEG specific term for DRM is Intellectual Property Management and Protection IPMP. In this paper, DRM will refer to the general issue of digital rights management, while IPMP will denote MPEG specifics. At the invitation of Renato Ianella, work group chair, this paper will give an overview of MPEG s work in the DRM space. This covers the existing standards MPEG-2 and MPEG-4, the upcoming multimedia description standard MPEG-7 and the Multimedia Framework MPEG-21. It will not address the details of the most recent activity in the context of MPEG-4, the IPMP Extensions (Amendment 3 to 14496: MPEG-4 Systems). The details of this work will be covered in another position paper. While rights holders communities have always played an important role in driving the DRM-related work items in MPEG, crafting the solutions has been a joint effort of the rights holders, manufacturers of conditional access (CA) and DRM systems, ICT and CE industries and the academic community. DRM is usually associated with content exclusively. MPEG has recognized that IP also exists in MPEG Technology. In principle, MPEG-4 IPMP technology can also be applied to manage the usage of this type of IP. The goal of the work in MPEG is interoperability. Two kinds of interoperability could be distinguished: 1. From the manufacturer s point of view: ensuring that modules from different suppliers can be integrated in a product through clear interface agreements; 2. From the consumer s point of view: ensuring that content from multiple sources will play on players from different make. It is the last type of interoperability that MPEG is most concerned with. 3 MPEG-2: digital TV MPEG-2  contains a few tools for the Identification as well as the Protection of (copyright on) content. It is important to distinguish the two. For identification purposes, there is the copyright descriptor. Individual streams as well as collections of streams forming a program can be identified to contain copyrighted material. The copyright descriptor consists of two parts: a unique copyright identifier of 32 bits, which identifies the type of the work (like ISBN, ISSN etc.). This number points at a registration authority. Each such authority can define its own syntax and semantics for identifying the work itself, through the use of a copyright number. The copyright can be signaled at the Audio or Video level, but also (as a collection) at the Systems Level. For enabling protection, there are the similar provisions, can be used to: Signal whether particular packets have been scrambled (Elementary Stream or Transport Stream packets) Send messages to be used in (proprietary) Conditional Access systems: the ECM (Encryption Control Message) and the EMM (Encryption Management Message) Identify the Conditional Access System used. Registration Authorities outside of MPEG take care that no collisions between identifiers occur (The CA Table and the CA_Supplier_ID). While MPEG-2 enabled Conditional Access systems to be integrated with MPEG-2 technology, there are no provisions for achieving interworking between different systems. The Simulcrypt systenm, providing a limited form of interoperability in digital television, was developed using these hooks (and some further semantics defined in the European Digital Video Broadcast (DVB) project). 4 MPEG-4: IPMP Hooks In MPEG-4 , representatives of rights holders communities raised the problem of protection of content in an early stage. Recognizing the power of the standard on the one hand and the digital developments on the other, MPEG issued, in April 1997, MPEG issued a Call for Proposals for the Identification and Protection of Content in MPEG-4 . That Call for Proposals (CfP) covered:
2 Identification of content Automated monitoring and tracking of creations Prevention of illegal copying Tracking object manipulation and modification history Supporting transactions between Users Media Distributors and Rights Holders The call looked at the issue from all sides, and took into account requirements from (alphabetical and not exhaustive): authors, broadcasters, collection societies, consumers, creation providers, creators, rights management agencies, media companies, media distributors, performers, producers, publishers, retailers, rights holders, telecom companies and trusted third parties. In response to this Call, a number of different proposals where received, ranging from watermarking technologies to complete DRM systems. The call brought together a good number of DRM experts, who, together with MPEG Systems experts and stakeholders, defined two different pieces of technology: one for the identification of copyright, and one to enable its protection. Below is a summary of this work, a more elaborate description can be found in . 4.1 Identification of Intellectual Property The Identification part the Intellectual Property dataset identifies: Whether the content is protected by a (non-standard) IPMP System The type of the content (Audiovisual, Audio, Visual, Still Picture, ) The Registration Authority that hands out unique numbers for the type of content: ISAN (International Standard Audiovisual Number), ISBN, ISRC (International Standard Recording Code), etc. The number that identifies the content according to such a system Variable length fields for titles and supplementary information. References to separate data streams with such information. This identification can be applied at the level of an object, which, in MPEG-4, can have any level of granularity. It can be a complete movie but also a single sound lasting for a few seconds. The standard does not prescribe when and how often to use such descriptors. International treaties and legislation prohibit removal of this information. MPEG does not (and, due to its nature, cannot) enforce that this information be present, persistent or correct. The second part of the IPMP framework can, however, be used to technically prevent the information to be altered or removed. Figure 1 Tight integration of IPMP and MPEG-4 System (DMIF: delivery layer; CB: Composition Buffer; DB: decoding Buffer) 4.2 Protection and more Next to the description part, also MPEG-4 has the protection part. Protection is actually too limited a term for the purposes; MPEG views protection as an integral part of the management of content of DRM, that is. The discussions after the CfP in 1997 led to the conclusion that 1) it was not desirable to enforce IPMP tools upon all MPEG-4 content
3 and MPEG-4 players, and 2) it was neither feasible nor desirable, at that point in time, to standardize a complete DRM system (or more than one). The great diversity in application domains, ranging from real time communications on low complexity devices to valuable content in set top boxes. Protection technology comes at a cost, and there is always a cost/benefit trade-off, so one size does not fit all. Also, there were concerns that content from a high value domain could be laundered through a low protection domain. Hence, again a hooks approach was pursued. MPEG-4 integrates the hooks tightly with the MPEG-4 Systems layer, which makes it possible to build secure MPEG-4 delivery chains in very smart and efficient ways. The underlying philosophy is simple. The bitstream embeds information that informs the terminal which (of possibly multiple) IPMP system should be used to process governed objects in compliance with rules declared by the content provider. The respective IPMP systems themselves were not specified within MPEG-4. There are two simple extensions of basic MPEG-4 systems constructs: IPMP-Descriptors (IPMP-Ds): a part of the MPEG-4 object descriptors that describe how an object can be accessed and decoded. These IPMP-Ds are used to denote the IPMP System that was used to encrypt the object. An independent registration authority (RA) is used so any party can register its own IPMP system and identify this without collisions. IPMP-Elementary Streams (IPMP-ES). All MPEG objects are represented by elementary streams, that can reference each other. These special elementary streams can be used to convey IPMP specific data. Their syntax and semantics are not specified in the standard. Using these tools, it is possible to have IPMP Systems act on (See Figure 1): The media data The scene description and the compositor The interaction messages Any other information conveyed in the BIFS (Binary Format for Scenes, MPEG-4 s binary language for scene description and scene animation) In principle, these IPMP tools can be used to govern the usage of technology-related IP or patent royalties. It is beyond the scope of this paper to describe a possible implementation. 5 Reasons and Requirements for MPEG-4 s IPMP Extensions Fairly soon after MPEG-4, with its IPMP hooks, became an International Standard, concerns were voiced within MPEG that many similar devices might be built by different manufacturers, all MPEG-4, but many of them not interworking. The reason for this: they would incorporate different, non-interworking protection schemes, because the manufacturers would work together with different service providers. This concern was exacerbated by the developments the Secure Digital Music Initiative (SDMI where all players gathered to discuss technology for secure delivery of music. The agreements in SDMI pave the way for electronic distribution of valuable content, but interworking would still not be guaranteed. Such a development was not thought to be in the interest of the end user, who might have to buy, for example, a number of different portable devices to be able to play content from all labels. After all, as was stated in the introduction, the very goal of a standard like MPEG-4 is creating interoperability for consumers. Therefore, MPEG-4 recently (July 2000) issued a new Call for Proposals for IPMP Technology . A summary from the requirements for such a solution, taken from  can be found in annex A: The CfP resulted in 13 submissions. MPEG s Systems Group is now working with the proposers to see how the requirements can be met, and has started an extension to the MPEG-4 Systems standard in the form of an amendment. The requirements are widely supported in MPEG, and all parties participate constructively to see how much is achievable. The work currently concentrates on various interfaces, e.g. for downloading IPMP modules and renewing security. Major issues are the management of trust and tamper resistance. In the course of the work, it has become clear that a standard rights description language may be helpful. Several responses to the CfP addressed such a language. Another submission to the Workshop will address the technical aspects of this work. 6 MPEG-7: Descriptions are as valuable as content MPEG-7 specifies a different kind of coding than MPEG standards, as it does not define content representation for reproduction, but for content management (including search and retrieval, filtering of broadcasts, database asset management). MPEG-7 defines descriptions of content, from very low-level (colors, shapes, sound characteristics, segmentations in space and time) to very high level (written content descriptions, semantic information, the classical metadata ). Special attention has been given to Intellectual Property, which comes in a number of different forms in MPEG-7, from describing rights pertaining to content to protecting the value of MPEG-7 descriptions themselves. MPEG-7 defines the following elements: Descriptors (Ds), Description Schemes (DSs) a Description Definitions Language (DDL based on XML Schema Language) and again a Systems layer. Included is also a binary, streamable representation of Descriptions and the DDL, called BiM (Binary format for MPEG-7).
4 Like in MPEG-2 and in MPEG-4, MPEG has worked with all of its constituent industry sectors, among which rights holders, to define the requirements. Annex B contains an excerpt of the MPEG-7 Requirements Document V.12  highlighting MPEG-7 s IPMP requirements. Again, we see the distinction between identification of IP (in this case in content as well as descriptions of content) and the protection of IP. Additional elements like audit trails make it possible to not only protect, but also manage the content and the descriptions. With the abundance of electronic content, good descriptions will be as important as the content itself, and descriptions will certainly hold significant value. The author of this paper believes that the provisions in MPEG-4 can resolve most of the requirements above. The requirements for identification are very similar as in MPEG-4, and so will the solutions be: references to external registration bodies, together with unique IDs assigned by these. Also the protection and management can and probably will be similar. If we view MPEG-7 descriptions as just another form of content ( one man s metadata is another man s data ), then the existing DRM tools can be used for their authentication and protection. Additional Description Schemes are probably needed, e.g. for requirement 9 (usage history) One requirement cannot be resolved using existing tools: the usage rules, requirement 8. Hence, a requirement to develop a rights description language comes not only from the MPEG-4 project, but also from MPEG-7 (and, as we will see, it has also surfaced in the context of MPEG-21). 7 MPEG-21: Integrating the pieces The following, taken from , explains MPEG-21 s goals best. Many elements exist to build an infrastructure for the delivery and consumption of multimedia content. There is, however, no 'big picture' to describe how the specification of these elements, either in existence or under development, relate to each other. The aim of MPEG-21 is 1) to understand if and how these various components fit together and 2) to discuss which new standards may be required, if gaps in the infrastructure exist and, once the above two points have been reached, 3) to actually accomplish the integration of different standards. To cut a long story short, (see  and the introductory Sections of  for more detail), MPEG-21 currently concentrates on a number of areas in which MPEG thinks lacking standardization is hindering interoperability: 1. Digital Item Declaration (a uniform and flexible abstraction and interoperable schema for declaring Digital Items) 2. Content Representation (how the media resources are represented) 3. Digital Item Identification and Description (a framework for identification and description of any entity regardless of its nature, type or granularity) 4. Content Management and Usage (provide interfaces and protocols that enable creation, manipulation, search, access, storage, delivery, and (re)use of content across the content distribution and consumption value chain) 5. Intellectual Property Management and Protection (the means to enable content to be persistently and reliably managed and protected across a wide range of networks and devices) 6. Terminals and Networks (the ability to provide interoperable and transparent access to content across networks and terminals) 7. Event Reporting (the metrics and interfaces that enable Users to understand precisely the performance of all reportable events within the framework) See Figure 2 for a graphical overview of MPEG-21. Calls for Proposals have been issued for THE digital item Declaration (see , responses due in January 2001) and the Digital Item Identification and Description (see , responses due in March 2001). Again, a specification of how to deal with IPMP is an important part of the work, because it is needed for interoperability. With respect to the management and protection of Digital Items (the MPEG-21 term for content a loose definition), the MPEG-21 PDTR makes the following observations: 1. Most of the e-content existent today is governed by at best rudimentary IPMP systems. 2. No IPMP system has yet emerged as a de-facto standard. 3. While various IPMP systems exist today, no framework exists to allow for interoperation amongst such systems. 4. One problem for consumers interacting with e-content today is the lack of interoperability between IPMP systems. 5. Owners of rights of e-content require the freedom to exercise their rights by choosing channels and technologies (including IPMP Systems) through which to offer and make available their content. Note:
5 Through new technologies (e.g., the Internet), end users increasingly become owners of rights in content. 6. Consumers of e-content may in some circumstances require the freedom to manage their privacy, which includes interacting with content anonymously. 7. Most existing IPMP systems cannot deal with the subtleties of issues related to Intellectual Property Law. It is MPEG-21 s aim in the IPMP area to [ ] provide a uniform framework that enables all users to express their rights and interests in, and agreements related to, Digital Items and to have assurance that those rights, interests and agreements will be persistently and reliably managed and protected across a wide range of networks and devices. The requirements for technology to accommodate this are the same as for MPEG-4 (see Section 3). MPEG-21 will be developed consistently with MPEG-4 (and MPEG-7), which is notably important in the IPMP area, where many overlapping requirements exist. The notion of users expressing their rights again leads to the necessity of defining a rights description language. Note that a User in MPEG-21 context can be any party in the chain, not just the end user. Container Item Resource Digital Item Declaration Natural and Synthetic Scalability Content Representation Digital Item Identification and Description Unique Identifiers Content Descriptors User A Encryption Authentication Watermarking Resource Abstraction Resource Mgt. (QoS) Transaction/Use/Relationship Digital Item Authorization/Value Exchange Content Management and usage Intellectual Property management and Protection Terminals & Networks User B Storage Mgt. Content Personalization Figure 2 - Graphical Overview of MPEG-21 8 References  ISO/IEC : Generic coding of moving pictures and associated audio: Systems. (MPEG-2 Systems)  ISO/IEC : Coding of Audiovisual Objects: Systems. (MPEG-4 Systems)  ISO/IEC JTC1/SC29/WG11 N1714, MPEG Requirements Group, Call for Proposals for the Identification and Protection of Content in MPEG-4, April 1997, Bristol MPEG meeting  ISO/IEC JTC1 SC29 WG11 N2614, MPEG-4 Intellectual Property Management & Protection (IPMP) Overview & Applications Document, December 1998, Rome MPEG meeting. (http://www.cselt.it/mpeg/public/mpeg-4_ipmp.zip)  ISO/IEC JTC1/SC29/WG11 N3543, MPEG Requirements Group, Call for Proposals for IPMP Solutions, July 2000, Beijing MPEG meeting  ISO/IEC JTC1/SC29/WG11 N3548, MPEG Requirements Group, MPEG-7 Requirements Document V.12, October 2000, La Baule MPEG meeting (http://www.cselt.it/mpeg/public/mpeg-7_requirements.zip)  ISO/IEC JTC1/SC29/WG11 N3500, MPEG Requirements Group, MPEG-21 Proposed Draft Technical Report, July 2000, Beijing MPEG meeting (http://www.cselt.it/mpeg/public/mpeg-21_pdtr.zip)
6  ISO/IEC JTC1/SC29/WG11 N3755, MPEG Requirements Group, Study of MPEG-21 Proposed Draft Technical Report, October 2000, La Baule MPEG meeting (http://www.cselt.it/mpeg/public/w3755.zip)  Keith Hill, Leonardo Chiariglione, Rob Koenen, Program for MPEG-21 Workshop in Noordwijkerhout, NL, March 2000 (http://www.cselt.it/mpeg/events/mpeg-21/workshop_announcement.htm)  ISO/IEC JTC1/SC29/WG11 N757, MPEG Requirements Group, Call for Proposals for Digital Item Declaration, October 2000, La Baule MPEG meeting (http://www.cselt.it/mpeg/cfp/digital_item_declaration.zip)  ISO/IEC JTC1/SC29/WG11 N757, MPEG Requirements Group, Call for Proposals for Digital Item Identification and Description, October 2000, La Baule MPEG meeting (http://www.cselt.it/mpeg/cfp/digital_item_identification_and_description.zip) Annex A IPMP Requirements in MPEG-4 8. The solution shall support access to and interaction with content while keeping the amount of hardware to a minimum. There shall be no duplication of similar devices to interact with similar content from different sources. To a lesser extent, the same applies to software. Examples of interaction with content are playback, copy, edit, create and so forth. 9. The solution shall support easy interaction with content from different sources without swapping of physical modules; that is without requiring action on the part of the end user. Addition of modules is acceptable if it requires a one-time action, if the device supports it, and if the cost is reasonable. 10. The solution shall support conveying to end users which conditions apply to what types of interaction with the content. An example is payment for playback. 11. The solution shall support protection of user privacy. Note: In many countries legislation requires that no user information shall be disclosed without the explicit consent of the end user. 12. The solution shall support service models in which the end user's identity is not disclosed to the service/content provider and/or to other parties. 13. The solution shall support the preservation of user rights. Notes: 1) For instance, the solution shall support preservation of user rights in such events as the provider going out of business. 2 ) It is believed that an important requirement of end users is that their rights to interact with the content not be revoked for alleged misuse when the burden of disproving misuse is entirely on the end user. However, MPEG does not currently see any implications for these requirements. 14. The solution shall support the content and the end user s rights to interact with it to survive common accidents, e.g. an operating system crash, or a flat battery. 15. The solution shall support MPEG-4 terminal mobility, e.g. end users should be able to use the same device in different locations. 16. The solution shall support content mobility across MPEG-4 terminals, e.g. end users should be able to move to a different terminal and keep their rights to interact with the content. Note: Assuming easy access to the content, this mainly applies to the portability of the rights to interact with it. 17. The solution shall support content and the end user s rights to interact with it to survive changing to a new version of similar hardware or software. Note: Assuming easy access to the content, this mainly applies to the renewability of the rights to interact with it. 18. The solution shall support content and the end user s rights to interact with it to survive changing to a different type of MPEG-4 hardware. Note: Assuming easy access to the content, this mainly applies to the survivability the rights to interact with it. 19. The solution shall support transferring, temporarily or permanently, content and the rights to interact with it to another party. 20. The solution shall enable content owners to control which of their assets are available when, where and under what conditions. 21. The solution shall support persistent security over time and renewability of that security. 22. The solution shall support the flexible expression of different business models/rules, which might yet be unknown and which may change over time, markets and geography. Note: Some business models are envisaged to involve super distribution, in which content and rights to interact with it are passed along from one user to another 23. The solution shall enable content owners to change business rules whenever and however they wish. 24. The solution shall support implementations that are cost effective with regard to the value of the content to be managed and protected. 25. The solution shall support fast development of products and services. 26. The solution shall support implementations into devices that have a long life cycle, i.e. at least five years.
7 27. Implementation of the solution shall be based on currently available technology. 28. The solution shall not impose policies. Note: Imposing policies is the legitimate domain of content, service and application providers, and governments. Annex B MPEG-7 and MPEG-21 IPMP Requirements 1. No legal status of descriptions - MPEG-7 Descriptions by nature have no legal bearing. The standard shall be designed in such a way that this is as clear as possible. Note: The greatest concern amongst the creative sectors is associated with the dangers inherent in the misrepresentation of legal attribution to information relating to intellectual property. 2. Describing content rights - MPEG-7 shall provide a mechanism for pointing to content rights (rights owners, contractual information). Ds and DSs shall not directly describe content rights. Note: Rights ownership can change regularly which precludes the accurate declaration of this information in MPEG-7 applications. Allocation a unique identifier to each content element could be the answer. A resolution service could ensure that parties needing this information have appropriate access to it. [Note that MPEG-4 already allows this, RK] 3. Relationship to content management and protection measures - MPEG-7 shall accommodate, and not by design interfere with, rights management information and technological protection measures used to manage and protect content. Note: In accordance with the World Intellectual Property Organization (WIPO) treaties it is prohibited to circumvent, alter or remove: Rights Management Information associated with content. Technical Protection Measures managing and protecting copyright material. 4. Applications distinguishing between legitimate and illegitimate content - a. MPEG-7 shall support applications that distinguish between legitimate and illegitimate content. b. The MPEG-7 standard shall be constructed so as to allow clear and unambiguous reference, in external specifications, agreements and in legislation, to the clauses in the MPEG-7 standard that address the requirement (a) above. Notes: While it is understood how (a) could be done inside trusted domains, further work is needed to investigate how this can be implemented outside trusted domains. On (b): The ability to reference the relevant part of the MPEG-7 standard in contracts, laws etc., will allow the enforcement of this feature where appropriate.. 5. Authentication of descriptions - MPEG-7 shall offer a mechanism to allow for the authentication of MPEG-7 Descriptions. Note: This could be useful for companies specializing in selling Descriptions and for their customers. 6. Management and protection of descriptions - MPEG-7 shall support the management of intellectual property in Descriptions and protection from unauthorized access, use and modification Note: Descriptions may embody content that requires management and protection. 7. Management and protection of Ds and DSs - MPEG-7 shall support the management of intellectual property in Ds and DSs and protection from unauthorized access, use and modification. Note: The design of Ds and DSs may be intellectual property requiring management and protection. 8. Usage rules - MPEG-7 shall contain Ds/DSs that provide information on how content may be used. Note: Such a feature may provide considerable consumer benefit by, for example, providing prepurchase information. It may also enable different creative sectors to achieve interoperability between the providers of similar services. However, it should be noted that MPEG-7 cannot override the usage rules associated with the content itself which will be governed by the usage rules of its own management and protection system. 9. Usage history - MPEG-7 shall contain Ds/DSs that provide information on how content has been used, in accordance with privacy rules. Note: 1) Such a usage history may be anonymous. 2) Such a description scheme can be used to record how often a film in a home database has been viewed. 10. Identification of content - MPEG-7 shall enable the identification of content by international identification conventions. Note: Each of the creative sectors can manage content identification at its own discretion through MPEG-7 Ds and DSs. Such identification is preferably accomplished as in the MPEG-4 IP Identification Data Set. 11. Identification of content in descriptions - Where the description contains content, MPEG-7 shall enable the identification of that content by international identification conventions. Notes: 1) For example, it is possible that a representation of the content, such as a thumbnail of an image or the MIDI file of a sound recording will be used as the basis for constructing a Description for search purposes. In these examples, it may be necessary to identify the content in the Description. Such identification is preferably accomplished as in the MPEG-4 IP Identification Data Set. 2) There may be a need to be able to identify Descriptions.
8 12. Identification of descriptions - MPEG-7 may need to enable the unique identification of Descriptions. Note: This is for further discussion.
INTERNATIONAL STANDARD ISO/IEC 23001-3 First edition 2008-10-01 Information technology MPEG systems technologies Part 3: XML IPMP messages Technologies de l'information Technologies des systèmes MPEG Partie
HbbTV Forum Nederland Specification for use of HbbTV in the Netherlands Version 1.0 Approved for Publication 2013, HbbTV Forum Nederland Date: 1 May 2013 Contact: Rob Koenen, firstname.lastname@example.org Specification
INTERNATIONAL ORGANISATION FOR STANDARDISATION ORGANISATION INTERNATIONALE DE NORMALISATION ISO/IEC JTC1/SC29/WG11 CODING OF MOVING PICTURES AND ASSOCIATED AUDIO INFORMATION ISO/IEC JTC1/SC29/WG11 M3039
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the
UNIVERSAL UNIQUE IDENTIFIERS IN MOVIE AND TELEVISION SUPPLY CHAIN MANAGEMENT AN ENTERTAINMENT IDENTIFIER REGISTRY (EIDR) WHITEPAPER OCTOBER 2010 TABLE OF CONTENTS EXECUTIVE SUMMARY... 1 INTRODUCTION...
bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5 2008 Adobe Systems Incorporated. All rights reserved. Adobe Flash Media Rights Management Server 1.5 Overview for Microsoft
TS 184 009 V2.0.0 (2008-06) Technical Specification Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Rules covering the use of TV URIs for the Identification
Digital Rights Management for the Online Business Sai Ho Kwok Digital rights management has become a pressing concern for the online music business. Existing digital rights management systems are backed
OVERVIEW OF JPSEARCH: A STANDARD FOR IMAGE SEARCH AND RETRIEVAL Frédéric Dufaux, Michael Ansorge, and Touradj Ebrahimi Institut de Traitement des Signaux Ecole Polytechnique Fédérale de Lausanne (EPFL)
WHITEPAPER SERIES 2003 IPR SYSTEMS Level 12, 77 Castlereagh Street Sydney, NSW 2000, AUSTRALIA email@example.com http://www.iprsystems.com Driving Content Management With Digital Rights Management Dr
Introduction to MPEG-21 workshop 20th & 21st of March 2000 MPEG-7: Multimedia Content Description interface Philippe Salembier Olivier Avaro Universitat Politècnica de Catalunya France Telecom firstname.lastname@example.org
COMPANY INFO Prada S.p.A. Registered Office: Via Antonio Fogazzaro, 28 20135 Milan, Italy Telephone +39.02.550281 Fax +39.02.55028859 Share capital: Euro 255,882,400 entirely paid up VAT number: 10115350158
DOC No: INFOSOC 37 08 DATE ISSUED: MARCH 2008 Charter of Consumer Rights in the Digital World Digital technologies contribute to an improvement in the quality of people s lives in many ways. They create
Geospatial Digital Rights Management By Daniel J. Wright Any use of trade, firm, of product names is for descriptive purposes only and does not imply endorsement by the U.S. Government Open-File Report
A Metadata Model for Peer-to-Peer Media Distribution Christian Timmerer 1, Michael Eberhard 1, Michael Grafl 1, Keith Mitchell 2, Sam Dutton 3, and Hermann Hellwagner 1 1 Klagenfurt University, Multimedia
Digital Rights Management for Content Distribution Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003 Presented by An In seok. 2010.12.1 Contents
ATSC Standard: ATSC Security and Service Protection Standard Doc. A/106 28 September 2015 Advanced Television Systems Committee 1776 K Street, N.W. Washington, D.C. 20006 202-872-9160 1 The Advanced Television
Date(s) of Evaluation: CHECKLIST ISO/IEC 17021:2011 Conformity Assessment Requirements for Bodies Providing Audit and Certification of Management Systems Assessor(s) & Observer(s): Organization: Area/Field
, pp. 283-288 http://dx.doi.org/10.14257/ijseia.2015.9.9.24 A Robust Multimedia Contents Distribution over IP based Mobile Networks Ronnie D. Caytiles, Seungyong Shin and Byungjoo Park * Multimedia Engineering
SOLARWINDS, INC ipmonitor 8.0 MANAGER END USER LICENSE AGREEMENT REDISTRIBUTION NOT PERMITTED IMPORTANT -- READ CAREFULLY BEFORE USING THIS SOFTWARE: THIS IS A LEGAL AGREEMENT BETWEEN YOU (EITHER AN INDIVIDUAL
IT 4823 Information Security Administration Legal and Ethical Considerations March 24 Legal and Ethical Aspects Topics include: cybercrime and computer crime intellectual property issues privacy ethical
Company info Fondazione Prada Largo Isarco 2, 20139 Milan, Italy VAT no. and taxpayer s code no. 08963760965 telephone +39.02.56662611 fax +39.02.56662601 email: email@example.com TERMS
Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015 The following comprises a checklist of areas that genomic research organizations or consortia (collectively referred
Supplement to Gaming Machine Technical Standards Consultation Downloadable, Wireless and Cashless Gaming Machine Systems Consultation paper, September 2006 Introduction 1. This paper is a supplement to
Technische Universität München Lehrstuhl für Datenverarbeitung Univ.-Prof. Dr.-Ing. K. Diepold Content management and protection using Trusted Computing and MPEG-21 technologies Florian Schreiner Vollständiger
NSW Data & Information Custodianship Policy June 2013 v1.0 CONTENTS 1. PURPOSE... 4 2. INTRODUCTION... 4 2.1 Information Management Framework... 4 2.2 Data and information custodianship... 4 2.3 Terms...
ISO TC 46/SC 4 N515 Date: 2003-02-26 ISO 15836:2003(E) ISO TC 46/SC 4 Secretariat: ANSI Information and documentation The Dublin Core metadata element set Information et documentation Éléments fondamentaux
The term Digital Rights Management - DRM - has its origins in the combined efforts of some vendors, their marketing staff and some other industry analysts in the late 1990s . It is a breakthrough in
Panel: The InterTrust Commerce Architecture Chair: Willis Ware, RAND Corporation firstname.lastname@example.org Panelists David Van Wie email@example.com Olin Sibert firstname.lastname@example.org James Horning email@example.com
Unofficial translation Disclaimer 1 Federal Service for Intellectual Property, Patents and Trademarks (ROSPATENT), 2011 CIVIL CODE OF THE RUSSIAN FEDERATION Passed by the State Duma on November 24, 2006
International Telecommunication Union ITU-T Y.2740 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (01/2011) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS
Checklist and guidance for a Data Management Plan Please cite as: DMPTuuli-project. (2016). Checklist and guidance for a Data Management Plan. v.1.0. Available online: https://wiki.helsinki.fi/x/dzeacw
NTERNATONAL STANDARD SO/EC 11172-1 First edition 1993-08-0 1 nformation technology - Coding of moving pictures and associated audio for digital storage media at up to about 1,5 Mbit/s - Part 1: Systems
Before the Library of Congress Copyright Office IN THE MATTER OF ORPHAN WORKS 70 Fed. Reg. 3739 (Jan. 26, 2005) REPLY COMMENTS OF THE COMPETITIVE ENTERPRISE INSTITUTE Orphan Works: A Public Problem Requiring
(KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).
Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
EU: 2015 Place of Supply Changes Changes to the VAT place of supply for e-services EU: 2015 Changes to the place of supply From 1 January 2015, supplies of telecommunications, broadcasting and electronically
EXHIBIT A Part IV Content Identification 1 As this article has been considering certain intellectual property ramifications relating to the transmission of content, it is important to consider how content
DASH-IF Implementation Guidelines: Content Protection Information Exchange Format (CPIX) July 17, 2015 DASH Industry Forum Version 1.0 Scope The scope of this document is to define a Content Protection
An SDMI-based Rights Management Systems for Electronic Media Using Digital Watermarking S. H. Kwok, C.C. Yang, K.Y. Tam, and Jason S.W. Wong Department of Information and Systems Management The Hong Kong
AN ENVIRONMENT FOR EFFICIENT HANDLING OF DIGITAL ASSETS PAULO VILLEGAS, STEPHAN HERRMANN, EBROUL IZQUIERDO, JONATHAN TEH AND LI-QUN XU IST BUSMAN Project, www.ist-basman.org We present a system designed
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
INTERNATIONAL STANDARD ISO/IEC 14662 First edition Information Technologies - Open-edi reference model Technologie de l'information - Modèle de référence EDI-ouvert Reference number Page 2 Contents Foreword...
ARTICLE 29 DATA PROTECTION WORKING PARTY 00879/12/EN WP 194 Opinion 04/2012 on Cookie Consent Exemption Adopted on 7 June 2012 This Working Party was set up under Article 29 of Directive 95/46/EC. It is
CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT CAREFULLY BEFORE DOWNLOADING, INSTALLING OR USING CITRIX OR CITRIX-SUPPLIED SOFTWARE. BY DOWNLOADING OR INSTALLING
COMMITTEE DRAFT ISO/CD 26324 Date 2008-01-24 Reference number ISO/TC 46 / SC 9 N 475 Supersedes document TC46/SC9 N455 WARNING: This document is not an International Standard. It is distributed for review
Applications that Benefit from IPv6 Lawrence E. Hughes Chairman and CTO InfoWeapons, Inc. Relevant Characteristics of IPv6 Larger address space, flat address space restored Integrated support for Multicast,
Use of ESF Computing and Network Resources Introduction: The electronic resources of the State University of New York College of Environmental Science and Forestry (ESF) are powerful tools, shared among
intellectual property bulletin June 2012 copyright reform Bill C - 11 After several failed attempts, the federal government has finally passed copyright reform legislation, namely Bill C-11, the Copyright
INFORM ATION SHEET G056v 09 May 2015 Internet: Copying & Downloading This information sheet is for people who want to copy or download material from the Internet or swap and share files online. The purpose
MovieLabs Specification for Enhanced Content Protection Version 1.0 Introduction Digital content distribution technologies are evolving and advancing at a rapid pace. Content creators are using these technologies
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential
NSW Government Open Data Policy September 2013 V1.0 Contact firstname.lastname@example.org Department of Finance & Services Level 15, McKell Building 2-24 Rawson Place SYDNEY NSW 2000 DOCUMENT CONTROL Document
W3C Web and TV Workshop, 8-9 February 2011 Adaptive HTTP streaming and HTML5 Mark Watson, Netflix Inc. 1 Introduction 1.1 Netflix background Netflix is a leading provider of streaming video services in
Page 1 of 6 CHAPTER 5 HB 418-FN FINAL VERSION 15Mar2011 0733h 01/18/12 0009s 2012 SESSION 11-0741 05/10 HOUSE BILL 418-FN AN ACT relative to the use of open source software and open data formats by state
Content Protection in Silverlight Microsoft Corporation April 2010 Contents Contents...2 Introduction...3 What is Content Protection?... 3 Why Should You Protect Online Content?... 3 Techniques for Protecting
Information Governance Policy Document Number 01 Version Number 2.0 Approved by / Date approved Effective Authority Customer Services & ICT Authorised by Assistant Director Customer Services & ICT Contact
Copyright, standards and the internet In brief The Internet has made it easier to find and obtain ISO and IEC International Standards. The purpose of this brochure is to help users and customers of ISO
A refined architecture for DRM Koen Buyens Sam Michiels Wouter Joosen Report CW 450, June 2006 nkatholieke Universiteit Leuven Department of Computer Science Celestijnenlaan 200A B-3001 Heverlee (Belgium)
The goal of the New Mexico Highlands University (NMHU) Computer & Networking Services (CNS) Group is to support the University in the pursuit of its Mission Statement 1. These policies, guidelines, and
Digital Video Broadcasting Conditional Access Architecture Introduction Digital Video Broadcasting (DVB) is a standard defining a one-to-many unidirectional data network for sending digital TV programs
A BNA, INC. HEALTH IT! LAW & INDUSTRY Meaningful Use REPORT VOL. 2, NO. 15 APRIL 12, 2010 BNA Insights: Toward Achieving Meaningful Use: HHS Establishes Certification Criteria for Electronic Health Record
Design of Database Security Policy In Enterprise Systems by Krishna R Singitam Database Architect Page 1 of 10 Table of Contents 1. Abstract... 3 2. Introduction... 3 2.1. Understanding the Necessity of
Enterprise content management solutions Better decisions, faster Storing, finding and managing content in the digital enterprise. Streamlines the collection, protection, sharing and distribution of digital
STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES Star has adopted this Acceptable Use Policy ( AUP ) to outline the acceptable use of Star s Broadband Internet
CEN/WS einvoicing Phase 3 Date: 2011-11 CEN Workshop AgreementTC WI Secretariat: NEN Code of Practice on Electronic Invoicing in the EU Status: for public review (23 November 2011-23 January 2012) ICS:
MICROSOFT SOFTWARE LICENSE TERMS MICROSOFT WINDOWS SERVER 2003 R2 STANDARD EDITION, ENTERPRISE EDITION, STANDARD x64 EDITION, ENTERPRISE x64 EDITION These license terms are an agreement between you and
DSTAC SUMMARY REPORT FINAL: 8/28/2015 Introduction The STELA Reauthorization (STELAR) Act of 2014 directed the FCC Chairman to establish a working group of technical experts that represent the viewpoints
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
A Limited Copyright Exception for Digital Media Shifting Annex B Media shifting 1 refers to the practice of copying genuine copyright material from one medium to another, such as copying legitimate musical
VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE GENERAL INSTITUTION Chapter 3 Computer Use - Computer and Electronic Communication Systems AP 3720(a) Contents 1.0 Introduction...1 2.0
NATO Communications and Information Agency (NCI Agency) - Industry Cyber Security Information Sharing at the Technical Level Guidelines Effective date: 28 March 2014 Revision No: Rev 1 Change History Revision
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
COMPUTER AND NETWORK USAGE POLICY Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media.
DFS C2013-6 Open Data Policy Status Current KEY POINTS The NSW Government Open Data Policy establishes a set of principles to simplify and facilitate the release of appropriate data by NSW Government agencies.
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
ELECTRONIC ARTS SOFTWARE END USER LICENSE AGREEMENT FIFA MANAGER 11 This End User License Agreement ( License ) is an agreement between you and Electronic Arts Inc., its subsidiaries and affiliates ( EA
1. Acceptance of Terms Welcome to s Social Trading (the Social Trading Features ). Social Trading Features provide an integrated solution of equity trading and exploration of interactions among investors
The challenges of becoming a Trusted Digital Repository Annemieke de Jong is Preservation Officer at the Netherlands Institute for Sound and Vision (NISV) in Hilversum. She is responsible for setting out