22,874 research outputs found

    End-to-end security for video distribution

    Get PDF

    DRMs, Innovation and Creation

    Get PDF
    DRMs are intellectual property institutions. They transpose the empirical principle of copyright, which implicitly recognizes that specific ownership rules should be attached to non scientific creation, into the digital era. The legal protection of DRMs, a private means of enforcing content excludability, participates in the "privatization" of copyright protection. This, in turn, means that a proprietary software — governed by intellectual property rights, reinforced by public law — becomes the key to the vertical relations shaped by exclusive copyright. DRMs consequently represent a major stake in the competition to capture network effects in the content distribution vertical chaincopyright; distribution; DRMs; network effects

    Sale the seven Cs: Teaching/training aid for the (e-)retail mix

    Get PDF
    The ‘4Ps’ of the marketing mix have long been popular with students, tutors, trainers and practitioners as a learning and teaching aid. The purpose of this paper is to present an equivalent tool for retail and e-retail: ‘Sale the 7Cs’. The approach is by reference to other authors’ versions of the marketing, retail and e-retail mixes, distilled into a simplified framework: C1 Convenience; C2 Customer value and benefit; C3 Cost to the customer; C4 Computing and category management; C5 Customer franchise; C6 Customer care and service; C7 Communication and customer relationships. This simplified mnemonic is new for (e-)retail. Mini case examples are used to illustrate the applicability. These have a practical value for trainers and educators as specimen answers to activity exercises. Retailers may find the convenient 7Cs structure useful when planning strategies and tactics

    Network assisted content protection architectures for a connected world

    Full text link
    Content protection is a key component for the success of a multimedia services platform, as proven by the plethora of solutions currently on the market. In this paper we analyze a new network scenario where permanent bidirectional connectivity and video-aware encryption technologies allow a trustful operation of ubiquitous end devices. We propose new scalable models for a content protection architecture that may achieve dramatic improvement in robustness, reliability, and scalability. Selective ciphering and countermeasures are included in those models, together with several examples of their application

    Cooperating broadcast and cellular conditional access system for digital television

    Get PDF
    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.The lack of interoperability between Pay‐TV service providers and a horizontally integrated business transaction model have compromised the competition in the Pay‐TV market. In addition, the lack of interactivity with customers has resulted in high churn rate and improper security measures have contributed into considerable business loss. These issues are the main cause of high operational costs and subscription fees in the Pay‐TV systems. This paper presents a novel end‐to‐end system architecture for Pay‐TV systems cooperating mobile and broadcasting technologies. It provides a cost‐effective, scalable, dynamic and secure access control mechanism supporting converged services and new business opportunities in Pay‐TV systems. It enhances interactivity, security and potentially reduces customer attrition and operational cost. In this platform, service providers can effectively interact with their customers, personalise their services and adopt appropriate security measures. It breaks up the rigid relationship between a viewer and set‐top box as imposed by traditional conditional access systems, thus, a viewer can fully enjoy his entitlements via an arbitrary set‐top box. Having thoroughly considered state‐of‐the‐art technologies currently being used across the world, the thesis highlights novel use cases and presents the full design and implementation aspects of the system. The design section is enriched by providing possible security structures supported thereby. A business collaboration structure is proposed, followed by a reference model for implementing the system. Finally, the security architectures are analysed to propose the best architecture on the basis of security, complexity and set‐top box production cost criteria
    • 

    corecore