1 / 12

Economic incentives for protecting digital rights online

Economic incentives for protecting digital rights online. Outline. Introduction Background & Related work The proposed protocol (SPIES) Exchange period Protection period Conclusions. Introduction.

elma
Télécharger la présentation

Economic incentives for protecting digital rights online

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Economic incentives for protecting digital rights online

  2. Outline • Introduction • Background & Related work • The proposed protocol (SPIES) • Exchange period • Protection period • Conclusions

  3. Introduction • Once electronic content has been released, it is very difficult to prevent it from being shared. • This disclosure often represents economic harm to the content’s owner and others. • To discourage illegitimate sharing.

  4. Background&Related work(1/2) • Game theory • Digital rights management (DRM) • DRM is the use of technological means to allow only authorized uses of or access to content. • Traditional DRM uses techniques: encryption & watermarking • DRM-free

  5. Background&Related work(2/2) • Digital rights management (DRM) Content provider Content consumer Escrow service

  6. The proposed protocol (1/5) • Secret Protection Incentive-based Escrow System (SPIES). • SPIES is best suited for applications in which the content is legitimately shared among a small set of participants. • SPIES should not be used to replace traditional DRM. (ex. movie and music files sold online) • SPIES used to limit unauthorized sharing of passwords for accessing content on websites.

  7. The proposed protocol (2/5) • SPIES is a protocol executed between several actors: 信託付款服務(第三方)

  8. The proposed protocol (3/5) • Variables in SPIES

  9. The proposed protocol (4/5) • Exchange period

  10. The proposed protocol (5/5) • Protection period Fig. the Bounty Payment

  11. Conclusions • SPIESuses the techniques of game theory to analyze strategies andoutcomes. • Applicable: passwords, corporate knowledge-sharing, pre-release media. • Its chief limitations are the requirements for a limited number of legitimate. • To limit and detect unauthorized sharing.

  12. Thanks for your attention!

More Related