Misplaced Pages

Digital rights management: Difference between revisions

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Browse history interactively← Previous editNext edit →Content deleted Content addedVisualWikitext
Revision as of 02:56, 23 September 2002 view sourceDanny (talk | contribs)41,414 editsm typo← Previous edit Revision as of 14:59, 30 November 2002 view source The Anome (talk | contribs)Edit filter managers, Administrators252,873 edits Examples of "digital rights management" and "copy protection" systems:Next edit →
Line 6: Line 6:


New DRM initiaives have been proposed in recent years which could prove more difficult to circumvent, including copy-prevention codes embedded in broadcast ] signals and the ]. A wide variety of DRM systems have also been employed to restrict access to ]s. New DRM initiaives have been proposed in recent years which could prove more difficult to circumvent, including copy-prevention codes embedded in broadcast ] signals and the ]. A wide variety of DRM systems have also been employed to restrict access to ]s.

Examples of "digital rights management" and "copy protection" systems:
* ] (SCMS)
* ]

Revision as of 14:59, 30 November 2002

Digital rights management, commonly abbreviated DRM, is a system whereby the usage of copyrighted data by someone who has purchased a copy of it may be restricted by the copyright holder. In contrast to the usual legal restrictions which copyright itself imposes on the owner of a copy of such data, DRM would allow additional restrictions to be imposed solely at the discretion of the copyright holder, through hardware and software code under the copyright holder's control.

An early example of a DRM system is the Content Scrambling System (CSS) employed by the DVD Consortium on movie DVD disks. The data on the DVD is encrypted so that it can only be decoded and viewed using an encryption key, which the DVD Consortium kept secret. In order to gain access to the key, a DVD player manufacturer would have to sign a licence agreement with the DVD Consortium which restricted them from including certain features in their players such as a digital output which could be used to extract a high-quality digital copy of the movie. Since the only hardware capable of decoding the movie was controlled by the DVD Consortium in this way, they were able to impose whatever restrictions they chose on the playback of such movies. See also DIVX for a more draconian and less commercially successful variation.

The Digital Millennium Copyright Act was passed in the United States in an effort to make the circumvention of such systems illegal. Despite this law, which has received substantial opposition on constitutional grounds, it is now relatively easy to find DVD players which bypass the limitations the DVD Consortium sought to impose. The cryptographic keys themselves have been discovered and widely disseminated (see DeCSS).

New DRM initiaives have been proposed in recent years which could prove more difficult to circumvent, including copy-prevention codes embedded in broadcast HDTV signals and the Palladium operating system. A wide variety of DRM systems have also been employed to restrict access to eBooks.

Examples of "digital rights management" and "copy protection" systems: