Skip to main content

Currently Skimming:

11 Digital Rights Management Technology
Pages 65-75

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 65...
... I am engaged now in the music and publishing space, but I have a history of looking at rights management in terms of digital products and messaging, e-mail in particular, dealing with issues such as the unauthorized forwarding of e-mails in the sense of how conversations are considered under copyright law and the ability to abuse conversations. I have both a technological hacker perspective and a policy approach that includes a focus on risk management in terms of how to control content.
From page 66...
... iTo render means to convert a format into a human-consumable element displaying data as images, playing data as sound, or streaming data as video. 2Milo Medin pointed out that the music publishers themselves created the unencrypted format in which CDs are published, effectively creating this problem.
From page 67...
... I have heard that devices exist that can take a biometric measurement and determine the age of that measurement, but I do not believe it.4 The collector of the information is responsible for enforcing the privacy issues. If you are willing to go deeper into the privacy issue and maybe involve so-called trusted third parties, porn sites often perform age authentication through the submission of a credit card number.
From page 68...
... Sandra Calvert noted that the V-chip is not designed to censor violence only; it also screens sex and language. It has about five different ratings: fantasy violence, real violence, sex, language, and so on.
From page 69...
... XML already is being applied in various ways that have a global effect. The idea of modifying client applications that already use the underlying XML processing engine is not a stretch either.
From page 70...
... If we implement such a solution in the turbulent waters of the industry now, we would create an interesting and difficult problem. Some giants, such as Microsoft, want to dominate the content-rendering space, and whoever wins that battle effectively dominates digital entertainment.
From page 71...
... As long as people can make a change between the XML rendering engine and the underlying hardware, they can get around anything. Dan Geer said another future trend is automatic updating by manufacturers on a regular basis.
From page 72...
... Bob Schloss suggested a default rating, so that if actual rating information is absent, the content is assumed to be X rated and for adults only.
From page 73...
... Many applications do this today: AOL accounts, Netscape, and Internet Explorer offer a profiled login. This way, when a child sits down to use that computer, he or she is constrained by the user profile, which technically becomes intertwined with the P3P profile.
From page 74...
... There is another industry trend that relates to age verification. Dan Geer is probably one of the world's leading experts on this, because he designed the system that Wall Street uses, Identrus, which issues digital certificates to own identity.
From page 75...
... Someone could keep a database in a way such that it would be difficult to find. 22Herb Lin summarized the presentation as follows: To control distribution of content to only age-appropriate people, you would have to make many changes in the existing technology and policy infrastructure, going far beyond the issue of age verification for inappropriate content.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.