AXMEDIS template DE7-2-1 Training Slides

advertisement
Piracy and file sharing: challenges
and perspectives for the Digital
Renaissance
technical point of view
23rd
C.A.P.I. European Federation: slides for the forum discussion
February 2010, 14.00 – 15.30, European Parliament, Room : JAN 6Q1
Paolo Nesi
AXMEDIS coordinator
DISIT-DSI, Distributed Systems and Internet Technology Lab
Department of Systems and Informatics, University of Florence
nesi@dsi.unifi.it,
paolo.nesi@unifi.it
http://www.dsi.unifi.it/~nesi,
http://www.disit.dsi.unifi.it
http://www.axmedis.org
version 2.0
1
The background
l
AXMEDIS has been initially developed during a large IP project of
the EC with the participation of more than 45 partners,
among them,
 content producers, collecting societies, content distributors, research
centers, broadcasters, editors, integrators, ISP, technology providers,
cultural institutions,
l
Maintained, expanded and valorized for a range of applications.
l
AXMEDIS is an open framework which presents the largest
number of integrated functionalities along the value chain:
 pre-production, post production, distribution, repurposing, adaptation,
clustering, recommendations, content management, profiling, semantic
computing
 DRM/CAS, verification, validation, protection/TPM,
 web monitoring, P2P control, P2P monitoring, etc.
2
Trends
l
Industry gradually abandoned DRM/TPM solutions
 most of them have been “rejected” by the consumers for the
presence of too strong restrictions or lack of usability
 Some of them are now returning back on their steps
l
Consumers are becoming content providers
 they are requesting to see their IPR respected; see last events on
social networks, that included controls and restrictions.
l
A large amount of illegal downloads are performed via P2P
as stated by numbers
l
adoption of advertising business models, without any TPM
have relaxed the control
 it is not clear what impact they have produced !!
 Free access and advertising does not means to exclude the need to
have technological protection measure/model (read as TMP, DRM, CAS
or their combination) to avoid content propagation out the context.
3
Some Facts on P2P
l
P2P and Internet are effective tools for distributing legal content,
for example:
 sharing protected content with DRM (i.e., super distribution)
 sharing of UGC, user generated content, non-covered by
copyright, ……
l
Activities performed in Internet and/or by using P2P may be
illegal as many other activities
 see the distribution of material related to terrorist activities, child
pornography, child trafficking, etc.
l
P2P and file sharing technologies should be taken as an
opportunity, since with those we can have
 Cost reduction for content distribution, super-distribution, for
broadcasting content: webTV, IPTV, VOD, DAB, etc.
4
Recent Proposed Actions
l
l
Recently proposed actions against piracy are still demanding
technological solutions ?
Are they feasible ?
Actions for control:
 drastically un-connect users from internet when copyright infringement is
detected
 reducing bandwidth capabilities on protocols: P2P, media, etc.
 three-strikes solution to cut off specific protocols to the infringing user.
 two warnings before breaking the connection, the first two times the
sharing of copyrighted material is detected.
l
Requesting detection from Collecting Soc., authors or third parties
 Implies also to provide an evidence via specific monitoring thus
technology
l
Automated detection/monitoring activities, technically based
 understanding if the content passing on the network/protocol is covered
by some right,
 They  the recognition of the all possible content in all formats,….
5
Technical implications of cut-off and/or control
l
Collaboration of ISPs:
the role of copyright enforcers?
l
Large effort in traffic monitoring and control
 a sort of signal interception: in many cases, it is regulated by
law and only authorized for relevant felony.
 high costs (A): to control the usage of distinct protocols of the
single users: distinguishing VOIP, HTTP/ P2P, IPTV..etc.
 millions of users for millions of digital content items declined on
several versions and formats, replicated on many channels;
 very hard to trust it feasible at reasonable costs.
l
Actions of Simple filtering on
 Media kind or protocols are not efficient:
 they do not cut only illegal material,
 Moreove r  New formats and protocols are created every day
 , ….. Never ending story…
6
On the contrary: the interoperable DRM
l
Interoperable DRM/CAS has been differently interpreted
 a unique standard for all, from proprietary and patent-based standards,
or proprietary
 a unique standard channel for all, a politically sealed platform that has
to be used as parallel force distribution.
 a unique royalty free standard for all, impossible to find an agreement
 a royalty free standard layer for interoperability among all different
DRM/CAS solutions and standards that should be agreed among the
different technology providers
l
The last solution would be pragmatically the most feasible
 it would preserve the market for different tech. providers to promote and
provide their solutions with different capabilities, functionalities, etc.
 This is the ground on which they conquer the market
l
Technologies and tools are largely available to take these paths !!
7
Conclusions
l
Consumers are looking for attracting functionalities
l
THUS: new trend is on Intelligent Packages, well known solutions
AXMEDIS/MPEG-21, MXF, MPEG-4, ZIP, or new solutions to reinvent the hot
water such as: MusicDNA, CMX.
l
l
l
Monitoring of web or P2P is possible  technology is there !
limitations of freedom would not be accepted
Regulatory actions of the enforcement are critical aspects


l
May be along the value chain, from B2B to B2C,  technology is there !
Monitoring solutions to control the access on specific protocols and/or
portals:


l
true-interoperability in a wider manner with respect to what they have with the
physical content. Commercial DRM and CAS solutions are not supporting such an
interoperability
Content owners are interested in enforcing control,

l
 technology is there !
DMCA: Digital Millennium Copyright Act  we have seen effects…
ACTA: Anti-Counterfeiting Trade Agreement  common best practices ??
P2P and file sharing in general have to be taken as opportunities for cost
reduction and new business models.
8
l
Thanks!
l
Documents and tools can be download
from web sites and on shareware sites
http://www.axmedis.org
http://mobmed.axmedis.org
l
l
9
l
l
The next two slides have been prepared for
answering to potential questions.
They will not be presented in the regular
stream
10
Regulatory vs Enforcement
l
Regulatory actions and agreements such as ACTA
(Anti-Counterfeiting Trade Agreement).
 Act on:
 Civil enforcement, border measures, criminal enforcement,
IPR enforcement in digital world.
 The stress of ACTA on best practices is interesting, while
probably would not solve the problems, since
 we do not see common practices that can be considered the
“best” solution.
l
The enforcement is probably the most critical,
 see for example the pros/cons of DMCA.
 collection of use data and statistical data
 enforcement of rights into the players
 procedures to monitoring, control and constrain, etc.
11
Monitoring technologies
l
Web portal/social networks monitoring: could be adopted by some
collecting societies and/or ISP:



l
we can use effective tools to analyze web portal/social network sites to assess
their content and providing evidence and statistical data.
The monitoring of Web Portal is not an interception since all data is public.
Results can be used to
 request a flat licensing fee for the media distribution on internet.
 identify and resolve copyright infringement, for example, the presence of
copyrighted materials in social networks
P2P monitoring: could be adopted by collecting societies and/or ISP:



we can use effective tools to analyze P2P networks to assess their content and
providing evidence and statistical data for several purposes.
In some measure, the monitoring of P2P is not an interception since all data is
public.
Results can be used to
 request a flat licensing fee for the media distribution on P2P.
 identify and resolve copyright infringement, differentiating who is
downloading from who is providing/seeding
12
Download