digital rights management © knowledge books & software, 2012

Post on 31-Mar-2015

217 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Digital Rights Management

© Knowledge Books & Software, 2012

IntroductionDRM of digital content is now the difference

between being in library services or not! If you don’t want to be paying impossibly high margins to I-Tunes, Adobe DRM or Amazon – consider your options! We have the inexpensive and effective solution for school and academic libraries! Annual service fee or user pays – whatever you want! Authentik™ http://www.kbs.com.au/services/digital-

rights-management patented solutions that works like an ‘app’ – it is a stand-alone program with a viewer and database. It is central server controlled and can be distributed by your email, fixed media or library circulation software.

ContentsWebstore – 1, 2Who Uses DRM?How Does It Work? 1-2PublishersBusinessGovernmentSecurity?ProcessTechnology

Library content setup 1

Library Lending 2

Who Uses DRM?Student texts and librariesLecturers, educators, trainers and teachersPublishers to secure distribution of digital contentLibraries to circulate their digital content securelyGovernment departments wanting limited time

usage and ability to release edition changes rapidlyBusinesses for securing the transfer of confidential

informationLegal entities and the Courts for document

distribution

How Does It Work?

How many users?

How many views?

Which users?How long can they access content?

How Does It Work? 2

How Does It Work? 2

userContent Website

DRM

RAWContentDRM

Content

Borrow

Purchase process

How Does It Work? 2

user

DRM

Check license

every view

Library DRM

Content

Viewing process

user user user user

Check license

every view

Digital Libraries – Licence Controls Defined distribution of digital content:-

Control the number of views!Control the time from one day to unlimitedControl the number of usersControl which usersReport on the specific device usedFiles can be updated – read edition and edit controls

OOOOPs! OMG! Typos!!!! 1 “This contract shall be effective as of the singing of this

agreement.”  “He used his wench to pull his truck out of the ditch.” “I know judo, karate, jujitsu and other forms of marital arts.”  “Sign up now for our Beauty and Fitness Curse.” “We practice an esoteric form of transcendental medication.”Source: faculty.winthrop.edu/kosterj/WRIT465/samples/typos.htm

In the case of a publisher – there can be small edits or new editions – this can be managed via Authentik!

In the case of discussion papers/draft policies/ research papers with new additions – the convenor may want to update the information often resulting in the master document changing rapidly – to keep all reviewers current!

Read on about Edition Management = PTO

Edition ManagementVersion/Edition updates via the web serverVersion updates can be made ‘voluntary’ ie.

‘please click to update your edition!’ ORVersion updates can be made ‘compulsory’ in

that the file opens and is updated otherwise it does not open.

No limit to updates and works similar to Windows updates – background without downtime.

Library ServicesLegal and Court entities distributing secure

documentsTeachers and Academics sending DRAFT

information for discussion with a time limit to view

Secure use by specific users = students for a specific subject

Intellectual property being transferred to a nominated user – plans, documents, and images = student usage

Secret and confidential reports = named users

School Document ManagementDraft ‘Green’ papers – time limit on usage Editing of distributed documents on the fly –

so files can be updated continuallyDistributing ‘White’ papersLending content and licensing intellectual

property in the form of documents and images

Stop information theft and misuse!Whole of school reporting on document usage

and controls

Is It Secure from Piracy?

Everything is Hackable!It is possible to hack into a bank, the FBI, the Pentagon and so on!Time and the content reward are inextricably linked-hacker’s glory! Achieving celebrity by hacking a text?OCR and screen grabs copying-our proprietary technologies have taken care of this with ‘watermarking’! See figure!

Security LayersContent and code encrypted with AES/256Polymorphic code generation, code is randomly

generated prohibiting signature matching – patentedObfuscation technologies – patentedAdaptive code generation changes over time -

patentedIf one executable is reverse engineered the rest are

still protectedAll usage continually monitoredLicenses can be revoked or modified anytime at the

central server

Secure for librariesDigital distribution via web, cd rom, portal etc.Instant usage reportingLive ‘on the fly’ edits and changes to a million

users or more! ‘App type updates’

Network Educational Australia or Knowledge Books & Software at

Contact person: Rob Watts rob@kbs.com.aup.+61-7-55680288 f +61-7-55680277

www.kbs.com.au

Conclusion

top related