Intellectual Property Protection

Introduction

Why do we need DRM?

What can be done?

Technical measures

Content Lifecycle

Content Protection Lifecycle

Content protection

Trust

Cryptography

Broadcast Encryption

How does BE work?

Broadcast Encryption system

Vector

Matrix

Matrix (II)

Tree algorithm

Deployment issues

Compliance Agency

Standardizing trust

Some of IBM’s activities in CP

xCP: Extensible Content Protection

xCP Benefits

Cluster model

Local Authorization Model Step 1

Local Authorization Model Step 2

Local Authorization Model Step 3

Local Authorization Model Step 4

Central Authorization Model Step 1

Central Authorization Model Step 2

Central Authorization Model Step 3

Central Authorization Model Step 4

Central Authorization Model Step 5

Conclusion

Q & A

Thank you