Patent US9. 22. 41. Venue based digital rights using capture device with digital watermarking .. FIELD OF THE INVENTIONAspects of the presently disclosed technology generally pertain to the control of digital rights management (DRM) for captured digital media, including video, photo, and audio content. More particularly, features and steps are provided to enable a controlling entity such as a venue, performer, rights manager, etc. The proliferation of digital technology, such as computers and the internet, has introduced a myriad of challenges to rights holders, since the use of digital technology allows for exact copies of media to be made without degradation. For instance, an image obtained using a capture device such as a digital still camera or digital video camera may be copied an infinite number of times by a theoretically infinite number of persons. If any such copying is unauthorized, rights holders may have legal recourse, but may face tremendous difficulty in tracing and proving the extent of such unauthorized copying. OM4 50-Micron Multimode Fiber Optic Patch Cable - Duplex, PVC, ST-SC. Home: AV Equipment: Control Panels & Interfaces : 3,527 Products Subcategories Apple. Studio television production and directing media MANUAL This page intentionally left blank studio television production and directing andrew h. Three Star Leadership Wally Bock Home MP3 Musiqi ve Yeni Mahnlar Pulsuz Y kle.
The proliferation of digital technology also affects rights holders with respect to live performances. For instance, the ever- increasing ubiquity of digital cameras creates a point of conflict for rights holders, such as performers or venue management authorities. Specifically, concert goers are accustomed to taking digital photographs of themselves and their surroundings using digital cameras and the like. However, in a concert setting, such cameras could be used to capture content which is owned by, e. Therefore, generally speaking, most venues and performers prohibit attendees at a performance from even bringing a content capture device such as a digital camera into the venue. Even if the venue or performer wished to grant the attendee a limited right to use his capture device, due to the innate nature of digital content, the venue or performer would have no guarantee that the attendees would honor any such limits. In response to the challenges posed by the proliferation of digital content capture and management devices, various digital rights management (DRM) schemes and techniques have been developed. For example, different DRM implementations include, but are not limited to, Microsoft Windows Media DRM, Open Mobile Alliance DRM, Open MG (Sony), Fair Play (i. Apple i. Tunes), and the MPEG 2. These and other DRM implementations may be used to render content in a DRM- compatible format. However, rendering content in a DRM- compatible form may require additional steps and coordination that content owners may wish to avoid in certain circumstances. Another known technique used in the field of content protection is watermarking. Watermarking comprises placing additional data in the same bits comprising content data. Various watermarking schemes have been proposed in which the watermark does not noticeably degrade the quality of the content when present. Furthermore, such watermarking schemes may be implemented in a manner that the quality of the content is severely degraded if the watermark is removed. The use of watermarks in the context of identifying digital rights has been disclosed. Patent Application Publication No. Rhoads) includes discussion of the use of a database registry from which the identity of a rights holder for a copyrighted work may be ascertained by decoding information placed in the content by the rights holder. For instance, at a concert, audio may be identification coded before it drives concert hall speakers with the result that unauthorized recordings of the concert can be traced to a particular place and time. It would be desirable for a venue or other rights holder to be able to implement a DRM policy or DRM policies with regard to content that is captured by third parties unaffiliated with the rights holder, such as concert attendees, without the need for the rights holder to resort to watermarking or otherwise including data in the content. Furthermore, it would be desirable to track content to a particular source in the event of a violation of DRM policies, or for other purposes. SUMMARY OF THE INVENTIONA method of ensuring compliance with a DRM policy can comprise registering at least one capture device prior to presenting protectable content. Registering can include obtaining identification data associated with the device, such as a device ID. The method can further include storing time interval data identifying the time that the content was provided. A publicly- accessible copyright policy database may be made available, including copyright and/or rights policies for particular events, associated with time interval data and device identification identifying specific devices. The capture device or devices may be configured to embed identification data and time of capture data and all content captured by the devices. For instance, the device may include its ID number and the time that the content was captured. Registering can include verifying that the person registering the capture device agrees with a copyright policy and storing a record of such agreement. Registering can also include verifying the integrity of the device after content has been captured by the device. For example, the date and time accuracy of the device may be checked, as well as the integrity of the device's watermarking configuration. Data may be embedded into content in a variety of ways, including by watermarking the content files. If content is provided at a venue, information identifying the device may be obtained prior to allowing the device to enter the venue. In some embodiments, the exemplary method above may further comprise a step of verifying the integrity of the device prior to allowing the device to enter the venue, including ensuring the device is capable of embedding data into content at the time of capture and ensuring that the date and time of the device are accurate within acceptable tolerances. Device identification data may be obtained during the process of providing a ticket to a venue attendee. The database may be configured to provide copyright status data, including accessing a copyright policy in response to a query identifying a device and at least a time interval. The method may include providing a DRM implementation application, the application including computer readable instructions that direct a computing device to access data embedded in content, such as by reading a watermark, the data including a unique identifier identifying the device that captured the content and capture time data that identifies when the content was captured. The DRM implementation application may further include instructions to direct a computing device to access a copyright policy database by sending a query including data identifying the device that captured the content and data indicating when the content was captured. The implementation application may then provide an indication of the copyright status of the content. An exemplary method of ensuring the protection of digital content can include accessing data associated with at least one file that includes digital content, based upon the access data, determining the identity of the device that captured the content and when the content was captured, and querying a copyright policy database, including sending data identifying the device and the time when the content was captured. An exemplary method of device registration in a DRM compliance system can comprise obtaining data from a capture device, the data including information uniquely identifying the device and the device's internal date and time. The device may be verified to ensure that it is compliant in accordance with DRM system requirements. Verification may include determining if the device is capable of embedding data into content at the time the content is captured and determining if the internal date and time of the device is accurate within acceptable tolerances. Registering can further include adding information identifying the device to a copyright policy database, including associating the added information with data identifying at least one time interval and at least one copyright policy. Prior to adding information identifying the device to the database, a copy of the copyright policy may be provided in human- readable form, for acknowledgement by a device user. The acknowledgement may be stored and associated with the identification information. Verifying that the device is compliant may include accessing device attributes directly or indirectly by checking a manufacturer's database. An exemplary system for ensuring third- party compliance with DRM policies can comprise at least one capture device, with each capture device having a unique identifier and each device being capable of embedding data into content at the time of capture. The system may include at least one copyright policy database, the database associating at least one device, at least one time interval, and at least one copyright policy with one another. The system may include a rights compliance computer application, with the computer application configured to obtain data associated with digital content, the data including identification data and time data identifying a device that captured the content and the time the content was captured. The application may access the copyright policy database by providing the device identifier and time data. The devices may be configured to embed data by watermarking content, with each watermark including a unique identifier for the capturing device and the time that the content was captured. An exemplary computer software product for use in a DRM compliance system can include instructions rendered in a computer- readable medium to direct a computing device to access data associated with at least one content file, and determine, based on the data, data identifying the device that captured the content in the file and the time at which the content was captured by the device.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
January 2017
Categories |