Skip to main content

Currently Skimming:

12 A Trusted Third Party in Digital Rights
Pages 76-84

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 76...
... But we should not give up just because we cannot design a perfect system to prevent a hacker from hacking PCs. There are techniques that can make hacking difficult, and in particular techniques that can allow business models to be supported in spite of security breakdowns.
From page 77...
... There could be rules associated with the information placed in the container. There also could be other containers linked to that first container that contain additional rules, such as rules that the publisher thought of later on or rules that say that the previous rules are revoked.
From page 78...
... Therefore, you need exception mechanisms, which are difficult to implement. The exception mechanism might say, "You can have emergency access if you say who you are; then an audit record will be collected and will flow upstream to a clearinghouse, and later on someone may ask you why you did this." At least this approach tends to ensure that the exception mechanism is not abused.
From page 79...
... We work directly with chipmakers such as Texas Instruments, and chip platform makers, such as ARM, and other companies making chips that go in settop boxes, cell phones, or personal digital assistants to put in security mechanisms (e.g., trust management) so that we can have a protected processing environment.
From page 80...
... For years, they have been playing that game of keeping the piracy below a certain level while ensuring that the protection measures are not that expensive in a generalized sense, and that includes intrusion on legitimate rights. The Hack Watch News, which I used to monitor quite a bit, covered what happened when the purveyors of one of these protection systems tried using a renewal technique.
From page 81...
... You will still have Thus, even with a great system, all the old pornography produced before a certain date a lot of material still would be available for everyone to see. 3David Forsyth said the problem is different because the satellite pirates are "vicarious" content providers who are not doing anything to their own satellites.
From page 82...
... For new things, you can use the lack of an "in the clear" distribution path as the exclusion mechanism; this is the issue with the record industry. But from the perspective of media, do you believe that this type of structure, which, in essence, rents content or distributes rights according to content, will be any more successful outside of the commerce space, where you can basically say, "If you want to do this, then you have to do it this way"?
From page 83...
... to pay all the authors more money than to implement a rights management system, the costs of which, for a big publishing company, would be astronomical. Herb Lin said representatives of the adult online industry told the committee that they have problems with people copying their content and redistributing it without paying.
From page 84...
... In some of this space, we need to identify principals in an anonymous way. P3P addresses some of this, but I am not sure whether it will do everything that we want without things like exception mechanisms.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.