|
Burning the Jolly Roger Technical Solutions For Armoring Data Puts Creatives Back in Control by Peter Cassidy This article is adapted from a talk given on intellectual property control at the Digital Commerce Society of Boston in October, 1998. It is easy to be fatalistic about the loss of control of intellectual property. Allegedly intelligent people like Esther Dyson and Bill Gates have told us copyright as we know it today is doomed. That is a rather pre-mature assessment Ñ though it is certainly true that for the near term analogue media and unprotected digital media will be naked to exploitation. There are, for example, a number of simple-to-use software packages that allow anyone to convert sound files on a music CD to MP3 format to be played on a computer. With a little more trouble, most anyone can take an analogue recording of Maria Callas, play it on their stereo, pipe it into their computers, digitize it and place it on a server in New Caledonia to be downloaded. Whether that server can survive denial of service attacks or mail-bombing attacks sponsored by Maria Callas' fans, heirs, attorneys, publicists and publishers is another issue altogether. (I figure if oil companies can hire their own armies Ñ as they do in the Third World Ñ then it is not unthinkable that Sony might someday hire their own counter-hackers and cyber-mercenaries to strike back.) How the forces of creation and distribution will respond to piracy threats the Internet poses remains to be seen - but we will survey some of the means of control that are being developed today. One thing should be understood. Piracy of electronic intellectual property is not inevitable and neither is it insuperable. Every time a superseding technology has given tools to pirates, such as cassettes and VHS tapes, industry has found a way to contain the losses those with asset control technologies - such as the copy defeating schemes built into video-tape versions of movies. Given our moment in history, the early dawn of the Internet age, this kind of piracy is to be expected. It is merely the kind of exploitation that can take place between the eras when one technology has made new and quantum gains on its predecessors. Once, the fusion of intellectual property and media was enough to ensure that its owners could reasonably be expected to profit from its consumption. Most people didn't have the means to lift music from records, so fans would actually have to go out and buy the records of their favorite artists. Today, a high proportion of ordinary households have the technical capacity to take software, music recordings, visual media and images in hand Ñ digitize them if need be Ñ and transmit them to millions of people over the Internet. Evolving almost as quickly as the interlopers' sophistication in acquiring and distributing ill-gained wares, however, are technical solutions to foil pirates, technologies of varying potency, persistence and adaptability. My sense is that the publishers can be just as savvy and just as adept as the copyright interlopers and, in fact, have a profit motive to retain control over their copyrighted works that most casual copiers Ñ the real enemy of copyright Ñ do not have. Technical solutions that will allow creators and publishers to control digital proprietaries are quickly making their way to market that will make it very difficult to steal intellectual property and forcing the bulk of consumers to pay - or not play. Intellectual property control and management solutions, in fact, is one of the most active segments of the information technologies industry today. A month doesn't go by that I don't trip over another new IP-protection technology, or that I don't get a call from one company or another developing new software to foil pirates. The key technology that will allow creators and publishers to frustrate interlopers is cryptography and all the marking and protection schemes into which it is integrated. Depending on the scheme that is developed, cryptography can be used to mark digital works, to limit access along a number of parameters (discriminating by individual, by machine, by network node, by time, by number of simultaneous users, etc.), to create audit trails of usage - and to reveal the identities of consumers. With these capabilities, creators can not only protect their works - but sculpt some incredibly flexible business models. One example: Software might be, in its demonstration mode, protected by a time-bombing system that will give browsers a trial period of, say, 30 days. After it is licensed (assuming payment through a credit card), that software could be conditioned with license management technologies which deny access to all but the licensed user - and digitally marked so that when and if the software is passed along, the identity of the licensed user is exposed when the software is licensed upstream by another consumer. In this scenario, the software is protected in two ways - first by simple time-bombing and then, after purchase, by license management. Using these techniques, however, has effected a rather sophisticated affinity scheme that could give, for example, discounts on updates for consumers that have passed around the software to others who have become licensed users. All of that is technically possible today. The exciting part is that a lot of this is coming true. Though cryptography is the mainstay disciplines that informs most all protection systems, intellectual property control and protection technologies fall into three broad functional categories.
This summer, GLOBEtrotter Software and Preview Systems announced a formal agreement to market their respective license management and electronic software distribution technologies. GLOBEtrotter markets license management systems that are very popular on the Unix platform. Preview is the developer of the ZipLock ESD System, an electronic package of sorts that enables a Try-Before-You-Buy scheme for software and mediates payment. What is most encouraging is that industry is increasingly working to develop standards for protection and control systems. Last year, members of the electronics manufacturing and recorded music and video industries issued a specification for a so-called Content Scrambling System (CSS) that would encrypt material that is shipped on DVD. Licensing the technology - and extending it to PCs with DVD is controversial. In Fall of 1998, the Open Group fast tracked a technical specification for software license management systems. The open question for all technologies of protection and control is when a usable PKI will make these solutions as simple and easy to deploy as, say, 800-number ordering systems. That, of course, is contingent on the power of the market to overwhelm the US politico-military complex that is disrupting the development of cryptography and/or the US government's ability to wrest control of cryptographic policy development from the military intelligence plexus. What follows is a review of some of the control and protection technologies that are making their way into increasing use by publishers today. Though I focus on innovators who market applied technologies, most all of their approaches are effected by publishers who roll their own solutions. While I doubt that packaged solutions will ever replace home-brewed, standards-making will bring conventions to what are now more or less ad hoc constructions. To date, these e-books are some of the most elegant deployments of public key infrastructure systems yet placed on the consumer market. The books come with the public keys embedded - when the customer dials in, the server encrypts the manuscripts with the appropriate, reciprocal private key before sending it. That way only that it can be read is when it is decrypted by the consumer's private key in his e-book. The wonder of them is that they each use PKI to protect manuscripts - but that the consumer never has to touch any technology. i. Presentation control
technologies.
Basically, presentation control
technologies create the context for the viewing of proprietaries. These
frameworks control who will see the protected work and what power they
will have to manipulate it. Some of these technologies got their earliest
use by companies vending text Ñ often the contents of expensive reports.
These systems make sure that anyone who views your material cannot lift
it electronically by copying, forwarding it, mailing it or printing it,
making theft a good deal more difficult.
One the most established
companies in this space is a UK outfit called
C-dilla,
Limited that is making a number of intellectual property control systems.
The company's SafeDisc technology typically protects text and/or software.
Everything in a company's
- or an artist's - catalogue can be made available for the licensed user
on a CD-ROM. However, the user who pays for a license will be supplied
with a key to access the file on the pre-registered target disc Ñ in order
to access the proprietary content. Access allows the user only to see the
data. The viewer is modified so that he cannot copy or print the material
in any way.
C-dilla has transferred a
lot of this technology to the Web with its more recently developed SafeCast
suite. With SafeCast artisans can display parts of works, abstracts, low-quality
images Ñ or images with visible watermarks and vend the images of maximum
resolution to paying customers who choose an image or work they want to
buy Ñ via CD-ROM or through download right from the Web.
Coming out this year is a
similar system by InterTrust of
Sunnyvale, California. The InterTrust architecture is based on two principal
software technologies: the DigiBox is a cryptographic container for any
kind of digital media Ñ including music, software, images, or text Ñ to
secure intellectual property against unauthorized use; the InterTrust Commerce
Node is a software suite that resides on end users' computers and negotiates
the transactions for them and keeps track of their usage.
A consumer pulls something
off the Web that is encased in a DigiBox, perhaps an image or a QuickTime
streaming video presentation. When the browser detects the DigiBox, a helper
application hands it off to the InterTrust Commerce Node, which unpacks
the item and displays the content abstract, rules of usage, and the pricing
scheme. That unencrypted artifact can only be seen on that consumers' browser.
Should he send the data file to someone else, the receiver's browser would
not be able to display it.
Adding another dimension of security to
data presentation Digital
Delivery, Inc.
of Massachusetts released GeoSecure, a system that restricts file access
that allows conditioned files to be viewed only in specific locations.
Using GPS signals broadcast by satellite and an outboard receiver, creators
can limit exactly who views protected data, under what conditions - and
the precise physical location in which they may be viewed within a 50 meter
radius. The system builds on the company's Confidential Courier scheme
that controls individual access to protected files, defining terms of usage
by user and time.
Most recently, an Israeli
start-up called Csafe has introduced
a technology to thwart copying, forwarding, printing and mailing of Web
pages that are viewed by ordinary browsers surfing Web pages and Intranet
resources. Pirates are forced to photograph the pages off the monitor,
leaving them with a rendering of very low quality. (Anyone who has had
artwork printed
exactly as it appears on-screen understands just
how awful a display space a monitor is.)
Ñ Consumer Market
One of the most important
developments in the presentation control technologies industry has actually
taken place in the consumer market with the advent of electronic books.
Once the stuff of science fiction, they are here today with a number of
competitors on the market. Each uses a handheld reading palette that
is integrated with devices to connect the e-books to the Internet for access
to libraries of electronic book manuscripts and periodical literature.
By the end of last year there
were at least three e-books on market: NuvoMedia's Rocket eBook, the Millennium
Reader from Librius, and the SoftBook from SoftBook
Press. The books arrive without content. With the Rocket eBook
and Millennium Reader, users connect their e-books to their computers via
docking stations. The e-books connect to their respective libraries
through communications software that speaks to the docking station. With
the SoftBook, users need connect the unit to a phone line to dial into
the Soft-Book Press server.
ii. Execution Control
Technologies:
Some of the greatest strides
in execution control technologies have been made in the software industry.
Software companies were among the first industries exposed to substantial
harm by the Internet Ñ though also they had the most substantial experience
in mitigating the dangers of piracy.
Ñ Dongles.
Around 15 years ago, commercial
and industrial software makers began shipping their software with hard
keys Ñ dongles Ñ that fit into one port or another on the machine in which
the software would execute. If the software doesn't get an answer-back
from the dongle while it is working, it simply stops. It's primitive but
it works. The dongle business continues to grow with such companies as
Rainbow
Technologies, Aladdin,
Hardlock.
Dongles, however, are destined
to be superseded by much more flexible License Management systems. LM systems
basically encode the dongle into the software.
Ñ License Management These systems typically protect software by establishing a license server and an event log on the host during software set-up; a semi-smart agent embedded in the software searches for the proper licenses on the license server and checks the log for activity, reconciling, for example, the number of people currently using a program against the maximum allowed. When license-managed software is successfully invoked, it scribbles a note in the event log to be read when someone else requests the software. Typically, these systems are applied by the developer to prevent piracy. Many have features, however under used, that can be used to sculpt extraordinarily specific licenses, for example, reserving the software for use by a particular department or even for specific users for a given period of time. License management technologies that software vendors used were initially designed to make it impossible for protected software to execute anywhere but on the machines of the licensees Ñ and then only to the extent allowed by the license on file. They are most prevalent in the Unix platform where industrial and commercial software vendors have applied them to secure titles that could cost well into six figures per installations. The Open Group has recently issued a technical specification for license management system. Now that the specifications are being published and companies can update their license management tools to meet those specifications, the Open Group is working on a test bed and certification system for License Management systems Ñ (its own "UL seal of approval" for LM systems). How quickly the standard will attract support is still an open question. The principal proponents were mainframe makers and companies that develop LM products for mainframe and Unix platforms. Though Microsoft was absent from the discussions and proceedings of the LM committee at GUIDE, a mainframe user group, which developed the technical specification and the technical requirement document that preceded it, Oracle and Sybase have both sent their own representatives to the last mark-up meeting in August. See Globetrotter's article on software licensing, Isogon's software assest management prowess, and Rainbow, who acquired Elan and Wyatt River, publishers of LM systems. Ñ Audio/video scrambling systems Because of the threat of the Internet as a channel for piracy all new media will be forevermore designed as protected media. DVD discs published by the big film studios, for example, are protected by a scheme called the Content Scrambling System (CSS) created by an alliance of big content and electronic companies - among them Phillips, Sony, Matsushita and Hitachi. The insistence on a protection scheme by the big content developers like Sony delayed the release of DVD players last year for several months. CSS decoding chips in the players read the encrypted data and allow the content to be displayed on televisions. Data Files from DVD discs can be sent around the Internet but you would have to burn it into new media and then put the disc into a player Ñ enough to stop the casual copying that makes up the lion's share of piracy. Arguments are going on now about how and if there is going to be a software version of CSS for computers, given the large computational overhead it demands. With the advent of the Internet, however, the entertainment industry faced its greatest threat. A medium that could deliver unlimited copies as perfect as the original anywhere in the world. Clearly the media was only going to get more pervasive and more capacious. Not that the industry was ill-prepared for the task. Copy protection schemes are nothing new to the video entertainment industry. There are a number of scrambling schemes that have been used on cable television for years in the United State and Europe that are being adapted for digital media and the Internet. No doubt the Internet will be used to transmit lots of stolen content Ñ but just is likely is that this media will be used another pay-per-view channel as bandwidth expands. As well as adaptions of existing technologies for protecting audio and video content, a good deal of innovation is taking place in the development of purely Net-specific control and protection technologies. One good example of those is Cognicity's AudioKey. AudioKey is a suite that includes a client-side RealAudio plug-in that reads files that are protected and enhanced the AudioKey server-side software which embeds control data into music streams. As I've pointed out before, control technologies are not only about denying access to pirates. It's about relationship building. In this vein, AudioKey, links digital content to the individual's player. The Web surfer that uses this system can use the links and features that are embedded in the sound file such as transcripts, lyrics, profiles and special promotions. See Macrovision, a company that makes scrambling technologies for cable and satellite TV companies, Videodiscovery's discussion of CSS within context of discussion about DVD, DVD Digital's background on DIVX, and Cognicity. In February of 1998, an alliance of entertainment and consumer electronics industry titans announced a common encryption standard to be used to protect music and videos - however they are distributed, on CDs or through the Internet. The proposed encryption technology could be deployed on television sets, PCs, set-top boxes used by cable TV and satellite services, VCRs and on digital video disk (DVD) players. Several major music industry players - including Sony Music, Warner Music and BMI have - already announced that they will develop a standard for recorded music they hope to have standard for securing music this year. That coalition - the so-called Secure Digital Music Initiative (SDMI) - will, however, run into electronics device manufacturers like Samsung, Creative Labs, Philips and Diamond Multimedia rushing their own products to market - with or without integrating compatible technology. Every coalition and manufacturer's security
scheme uses an encryption system. Songs are downloaded and arrive
in the consumers computer encrypted. Once payment is negotiated,
appropriate keys are provided so that the consumer's player can unlock
the song and play it. The details of how keys are delivered and managed
and how the content is unlocked must be faultlessly co-ordinated otherwise
it will not work. The fast-growing market for MP3 players, however,
could compel the electronics makers to market before the security systems
are perfected.
iii. Watermarking technologies.
Late in January of this year,
Liquid Audio, MP3, CDnow and a number of music entertainment companies
formed a coalition to watermark digitally distributed music. The
technology, which puts codes into content that reveal the owner's - and
often the licensee's - identities when scanned by a watermark reader.
A number of watermarking schemes are under consideration by different industry
groups - and some are included in the specification for DVD technologies
issued last year.
No doubt this technology
will get less headline space than anti-piracy schemes. The application
profile is less dramatic than those systems that stop the thieves.
Watermarking technologies are the content industries' "digital branding
irons" that could expose transgressions against copyright holders and,
as well, enable easy clearance of copyrighted material in ways not possible
with traditional analogue media.
Though they cannot lock out
pirates, watermarking has promise for allowing creators and companies to
brand intellectual property objects - thus facilitating affinity
schemes and discounting regimes that require consumers to surrender tokens
or tokenized items to receive program benefits. As well, watermarks
can be the markers by which automated spiders find and report on the whereabouts
of proprietaries.
Watermarking schemes weave
a code into the very fabric of digital creations. Some schemes include
only the creators' digital imprimaturs Ñ yet the most sophisticated ones
also implant the identities of the distributor and final consumer Ñ into
the images or sound and video media as a commerce enabler and a determent
to copying.
Today, the applications for
watermarks are much more mundane. Typically, they are applied to
images, video and audio works with the mark of the creator or licensed
distributor. Graphic software companies are making the most aggressive
move toward incorporating watermarking management technologies as features
in their own software packages, principally as plug-in watermarking systems
that embed an indelible signature throughout the work.
Adobe's Photoshop Version
4 and the latest releases of Corel Draw and Photopaint incorporate a plug-in
of PictureMarc, a digital watermarking technology by DigiMarc Corp. of
Portland, OR. PictureMarc embeds an ID number into every image by altering
certain pixels, creating an invisible pattern inside of the image.
When a user opens a PictureMarc-ed
file, either within a DigiMarc-enabled version of Photoshop or using Digimarc's
stand alone viewer, the copyright symbol appears in the title bar with
a link back to Digimarc's MarcCentre online registry. That link will bring
viewers to the home page of the creator at the MarcCentre with contact
information and usage specifications. Creators don't have to join the MarcCentre,
however, as it's offered as a separate service.
Like a hologram, the watermark
remains even if the image is cropped or published Ñ or both. Pull up a
fragment from within any Digimarc-enabled application and the watermark
will again report the copyright. A paper-based magazine stole your image?
Scan it and pull it up in the viewer and the mark will appear again.
These systems are not perfect.
First, there are cracker programs like StirMark or Unsign that are designed
to remove or corrupt watermarks to make them unreadable. Some powerful
graphics programs like Kai's Power Tools have filters and effects that
will distort the bits that are marshalled by the watermark. Some will be
more resistant to this kind of corruption than others and those that aren't
robust enough to resist the simplest attacks will be subject to the swift
and unbridled criticism of the Web.
Here is a cursory survey
of watermarking technologies:
Corbis
Corbis Corporation, a digital
image archive founded by Bill Gates after he acquired the Betteman Archives.
Corbis isn't marketing its proprietary watermarking system, yet, but it's
a neat example of how an on-line stock photo shop could give clients a
full view of available images without exposing them to mundane screen capture
techniques. (To remove the Corbis watermark Ñ a huge, stylized "C" Ñ you
hold down the CNRTL and left-mouse-button keys together, neutralizing key
sequences usually reserved for printing, copying and mailing commands.)
Signum Technologies, Ltd.
Signum
Technologies, a British company, has already, licensed its SureSign
watermarking technology to the British Telecom Picture Library and to the
BBC.
SureSign enables users to
both embed and detect fingerprints in images. Creators can process images
one by one or with another SureSign batch converter to imbed their "fingerprint"
that can be located by freeware detection software offered by Signum.
Informix and NEC
First out of the gate with
a database/server and watermarking solution was Informix and NEC
Corp. In early December, the companies announced the Informix Universal
Server with an image DataBlade module that uses NEC's TigerMark watermarking
system Ñ which was developed specifically to distribute music and video
over the Internet.
Informix had developed, after
the company acquired Illustra, a firm with strong multimedia database technology,
a server with the capability to move any form of media. With NEC's TigerMark
watermarking system, Informix could put all the tools in the suite together
for the multimedia artisan: database, server management and copyright management.
NEC's watermarking technique
allows unique identification of copyright owners, buyers and the distributors,
thus providing a deterrent to illegal copying. What's more, NEC places
a watermark in parts of the signal stream that cannot be removed without
substantially degrading its quality.
This means that if someone
want to get into the pirate media business, he is going to either get real
masters without a consumers ID on it Ñ or find someone who doesn't care
if he is fingered as a an accomplice to a thief. So far, it remains to
be seen if anyone has taken up NEC's technology for a sound or video-media
application.
The first NEC DataBlade,
called the TigerMark Image DataBlade, allows owners of images to add watermarks
to images stored in Informix's object-relational Universal Server. DataBlades
are modules that can share processing space with the Universal Server core
engine.
Giovanni
Miami-based
BlueSpike
developed Giovanni as a watermarking system for music Ñ though the company
says it can apply the scheme to any digital media that does not require
100 percent accuracy in reproduction Ñ like software.
Giovanni was published as
part of the DVD specification last year, along with NEC's watermarking
scheme. Creator Scott Moscowitz said Giovanni is robust enough to stand
up against filters and programs like StirMark.
Giovanni is a three-channel
watermarking technology in which each channel is accessible by a separate
key that is used to burn rights ownership and distribution data into the
music or video or image object at the point of sale.
One channel would contain
copyright data Ñ with that key held by the creator.
The second channel in the
same copy may be designated a distribution channel with a key held by the
intended distributor in the same way a distribution agreement is made between
parties.
The third channel may be
designated as an "ownership channel" where consumer's information is watermarked
as the consumer is paying for the content.
The distributor would be
free to issue an "ownership key" to the purchaser to validate the purchaser
as if he were being issued a receipt. All three channels are distinct and
become an audit trail accessible by the three separate keys, ensuring privacy
and efficiency in identifying a given copy of content.
An artist or his representative,
say, a record company executive, coming upon a bogus copy could recover
the keys, unlock the data in each channel and track it back to the purchaser,
thus exposing the infringer.
For more literature on and
examples of sophisticated watermarking systems, see Bluespike,
publisher of Giovanni's digital watermarking system, Microsoft's
Corbis Archives, Signum Technologies'
pages on its watermarking systems, and a treatise
on techniques to defeat watermarking. |
US Offices: 38 Rice Street Suites 2-0/2-2 Cambridge, Massachusetts, USA 02140 VOX: 1-617-491-2952     FAX: 1-815-364-3002 Email: info@triarche.com | Genesis Myth | Consultants | Commentary | Partners | International Bureaus | Network Architecture | Marketing Campaigns | E-Commerce Stategies | Research | Technical Assessment | Homepage | Contact Us | All Rights reserved: Triarche Research Group Copyright: 1995-2003 |