A New Approach to Content and Digital Rights Management.

(PRWEB) November 9, 2001

One of the world’s leading Digital Rights Management Company Reciprocal has ceased trading on the 7th November 2001 without warning. Reciprocal (http://www.reciprocal.com) aimed to bring new-economy models to replace the widespread piracy of digital material such as music, software and films on the Internet but was thwarted by high overheads, intrusive complex technology and the free availability of material already pirated and passed from hand to hand on the Internet.

The failure is an important signpost to those who hope to commercialize Internet content and a warning that consumers will not struggle with technically complex solutions to protect the intellectual property of content owners.

The problem that digital rights management addresses is that unprotected digital files, whether they hold audio, video, text, can be spread almost instantly around the Internet and multiply uncontrollably much to the dismay of copyright owners and others with a stake in distribution. There are currently a handful of complex technologies that lock media files in a ‘digital safes’ where those who own the content can keep them until you rent the key but generally these require significant input from consumers to set up and often require content owners to risk new dot com inspired business models such a voluntary payment schemes.

Nevertheless, the pull-through market demand for easy to access content on demand is significant – consumers want to have more choice and get content quickly and cheaply. Customers have no objection to pay-per-use or hiring content – they do object to having to download and install special software just to pay for and protect to content they buy.

The push through, from music companies, movie studios and print publishers wishing to monetize vast back catalogues, and raise margins on new content by minimizing storage and distribution demands is also present. So what happened? Why were the solutions offered rejected by the mass markets?

Perhaps its time for the last of the dot coms to try not to foist new business models on their customers or intrusive technology and get back to the basics of simplicity and ease of use while expanding consumer choice.

Dr Mark R Baker. Is a Technology Consultant with Perimele Ltd in Oxford, England.







Comments off

Arxan Announces Key Hiding and Protection Capabilities with TransformIT

Bethesda, MD (PRWEB) August 4, 2008

Arxan Technologies, a leading provider of application hardening solutions designed to protect software from tampering and piracy, today announced the launch of its new patent-pending cryptographic key protection technology, TransformIT. Today cryptography and PKI form the cornerstones of information security. The effectiveness of these cryptographic routines in turn depends on the secrecy and integrity of keys. TransformIT enhances software security by preventing tampering and hacking attacks that target keys used within software applications — thereby preventing content, data and revenue loss.

Secret keys are used across many industries for various purposes including encryption, authentication and node-locking. In the digital media market, loss of first-level keys allows piracy of software or media titles. As deeper-level, system-critical keys are exploited, entire platforms become susceptible to widespread piracy allowing hackers to instantaneously rip media libraries or unlock subsidized devices. Similarly, public and private keys are used to protect enterprise applications and any related data. In addition to unauthorized access, malware insertion, data leakage and system level exploits can result in entire platforms becoming vulnerable – allowing hackers to instantaneously snoop on enterprise-wide systems such as mobile and e-banking transactions or VoIP communications.

“Encryption is widely used to prevent unauthorized access to data and information systems, and digital IP, against piracy and theft,” said Diana Kelley, Partner at SecurityCurve. “However, one critical point of failure in such systems is the instance at which the key is revealed and used. This point is identifiable through signature patterns and cryptographic routines. Once found, they direct an attacker straight to where the keys will typically be constructed in memory. Subsequently, fatal exploits can be created and used.”

Arxan’s TransformIT product ensures that private keys are never revealed statically or in run-time memory. It also ensures that public keys cannot be tampered with, thereby preventing a wide range of phishing, spoofing and code tampering attacks.

“We’re pleased to bring the latest in key hiding and protection technology to the market with TransformIT in response to market demand for stronger information security,” said Mike Dager, CEO of Arxan. “In conjunction with our GuardIT family of products, TransformIT enhances our proven ability to protect and harden applications against the growing range of attack vectors. Arxan security solutions now provide protection against key exploits that can result in system-wide compromise and data leakage.”

Key Features of TransformIT include:

White-Box Cryptography Key Representation – Algorithmically strong, this patent-pending approach is fundamentally secure and resistant to break-once-run-everywhere (BORE) attacks.
Effective Key Hiding – By preventing keys from ever showing their face, TransformIT thwarts memory dump and memory remnant attacks.
Tunable – Modifications to the depth and breadth of a key graph allow users to define their level of security. Moreover, a simple API allows TransformIT to easily integrate with other applications.
Intricately Hookable – Machine constants, hardware IDs and similar node-locking anchors can be tied into product calculations. The result is that the software cannot be separated from hardware, nor copied.

Arxan’s GuardIT family of software protection products can be seamlessly deployed with TransformIT for comprehensive key transformation and protection. This suite is comprised of GuardIT for Windows, GuardIT for Linux, and GuardIT for .NET. Each product features automated, easy to use, yet customizable protection across desktop, embedded and server software applications.

About Arxan Technologies

Arxan Technologies Inc. is a leading provider of application hardening solutions designed to protect software applications from tampering to minimize risk and maximize profitability. Our advanced software protection solutions secure enterprises, ISVs and digital media providers against unauthorized use, malware insertion, piracy, and reverse engineering of intellectual property. Our products defend, detect and react to attacks through a threat-based, customizable approach that is proven, easy to use and non-disruptive. Arxan supports a full range of application protection needs, from commercial software to military grade assurance. The government relies on Arxan Defense Systems, Inc., a subsidiary of Arxan Technologies, to deliver a best-of-breed anti-tamper platform to protect critical program information. Founded in 2001, Arxan Technologies has offices in Bethesda, San Francisco, London, New York, Dallas, Boston, Chicago and West Lafayette, Ind. For more information, please visit http://www.arxan.com.

###







Related Anti Software Piracy Press Releases

Comments off

Ghost Ship Haunts the Seas: Modern Technology Could Be the Answer

Cambridge, MA (PRWEB) January 28, 2014

A Russian cruise ship, the Lyubov Orlova, adrift on the Atlantic Ocean since last year, is a haunting reminder of the present dangers that can afflict our shores. The 328-ft, 1,565-ton cruise liner was being towed down to the Dominican Republic to be sold for scrap metal from Canada when a storm caused the line to break, sending the floating catastrophe on an unplanned, perilous journey into the unknown waters.

The Lyubov Orlova, it is believed now by Western European authorities to have sunk to the bottom of the Atlantic, but earlier last week reports surfaced that this boat was on a crash course to the British Isles with cannibalistic, diseased rats on board. This spooky phenomenon is hardly the first account of a Ghost Ship being reported. Over history, there have been numerous reports of these abandoned and unmanned ships drifting hopelessly at sea, at times with disastrous endings. Perhaps the most famous of these being the Mary Celeste, which when found in 1872 was completely intact and under sail but devoid of all crew, a mystery still to this day.

After sending the Lyubov Orlova into international waters, Transport Canada said it was satisfied the ship no longer poses a threat to the safety of [Canadian] offshore oil installations, their personnel, or the marine environment.

In the last 10 years, technology companies have come up with innovative solutions to tackle some of the dangers associated with open water, such as piracy or risks of collision. One of them is the Spynel camera system, manufactured by HGH Infrared Systems; Spynel is a rotating, panoramic infrared thermal imaging camera that provides continuous monitoring of ultra-wide areas in real-time. Its high resolution image coupled with automatic detection and tracking of targets on 360 degrees ensures that no event is missed, even in total darkness or fog. In Maritime applications, Spynel can successfully operate on very rough seas thanks to an autonomous gyro-stabilized platform and come with sea-specific image processing algorithms. This built-in image processing allows for minimal false alarm rate and effective differentiation between distant small boats and waves. The Spynel systems are currently used by the French Navy for anti-piracy purposes in the Gulf of Yemen.

Ghost ships and other collision risks in ports and open water can be intercepted effectively with the assistance of military grade equipment used today by private entities and security companies over the world.

About:

Founded in 1982, HGH designs, develops, assembles and sells complete high end optronics systems for security, industrial and civil applications. HGHs team of highly qualified engineers is comprised of experts in optics, software, mechanics and electronics and operates in the US, out of Boston, MA. HGH strives to provide advanced and innovative infrared equipment to protect their clients all around the world, while keeping the agility and dedication of a small and passionate team. Speed, flexibility, technical excellence and innovation constitute their core values. HGH has established itself as an international reference for infrared technology innovation through the development of multiple advanced thermal sensors, among which its award-winning real-time 360 degree thermal camera, the Spynel-C – 2008 Product of the Year from Photonics Tech Briefs, 2010 Innovation Prize from the EuroNaval Committee, 2011 Kummerman Award from the French Academy of Marine, 2012 GovSec Platinum Award, and 2012 Govies Homeland Security Award.

POC: Katie Shea, Marketing Associate

Katie(dot)Shea(at)hgh-infrared(dot)com







Comments off

https://youtube.com/devicesupport

https://youtube.com/devicesupport

http://m.youtube.com

Video Rating: 0 / 5

Comments off

APAC software piracy rate climbs to 62 percent

APAC software piracy rate climbs to 62 percent
Software piracy in the Asia-Pacific region has climbed to 62 percent as employees remain oblivious about what is installed in their systems, according to Business Software Alliance (BSA). The region's 2013 piracy rate was the highest among other …
Read more on ZDNet

Popcorn Time's movie piracy app works on iOS without tricks, for now
Popcorn Time tells The Next Web that it fully expects the folks in Cupertino to block the software, and that its installer team is "ready for any obstacle" — the crew went so far as to post a 1-year anniversary video (below) that thumbs its nose at …
Read more on Engadget

Western cracks down on piracy
“It could be because they have peer to peer software that's running on their machine, and they don't realize it, and we'll work with them. We'll try to figure out what's going on.” Another concern the student had surrounded the concept of privacy. “Who …
Read more on Western Courier (subscription)

Comments off

Say no to software piracy

project.
Video Rating: 3 / 5

Comments (1)

Latest Software Piracy News

The Android Dilemma: 10 problems that need fixing
What this means is that there are so many different kinds of Android devices out there with varied screen sizes and types, hardware, software versions, interfaces and features that it becomes difficult for Google or Android developers to efficiently …
Read more on Digit

Automakers Say You Don't Really Own Your Car
They say no one should be allowed to even look at the code without the manufacturer's permission because letting the public learn how cars work could help malicious hackers, “third-party software developers” (the horror!), and competitors. John Deere …
Read more on EFF

Comments off

Cliffs of Dover (live cover)

I’m playing Cliffs of Dover in a local talent show. It was pretty fun. Cliffs of Dover is a great song by Eric Johnson, a great guitarist. Guitar-Epiphone Les Paul Ultra-2 (with modifications!)…
Video Rating: 4 / 5

Comments (6)

Bass Extremes A Chick from Corea by Nefta Lopez/Cesar Huesca

Originally from “Bass Extremes”,A Chick from Corea is a composition by bass players Victor Wooten and Steve Bailey…(my heroes!!!) It’s a honor to me perform with my good friend and incredible…

Comments (25)

Intellectual Property Law Tutorial 9 Trade Mark Law – Infringement I

Intellectual Property Law Tutorial 9 Trade Mark Law - Infringement I

Tutorial covering UK/EU trade mark infringement. Part 1 of two parts on trade mark infringement!
Video Rating: 5 / 5

Comments (2)

« Previous entries Next Page »