Digital rights management standards

Content Protection for Recordable Media

Content Protection for Recordable Media and Pre-Recorded Media (CPRM / CPPM) is a mechanism for controlling the copying, moving, and deletion of digital media on a host device, such as a personal computer, or other player. It is a form of digital rights management (DRM) developed by The 4C Entity, LLC (consisting of IBM, Intel, Matsushita and Toshiba). The CPRM / CPPM specification defines a renewable cryptographic method for restricting content when recorded on physical media. The currently implemented method utilizes the Cryptomeria cipher (C2) algorithm for symmetric encryption. The types of physical media supported include, but are not limited to, recordable DVD media and flash memory. The most widespread use of CPRM is arguably in Secure Digital cards such as the standard. Note that the available 0.9 revision includes only the portions of the specification covering DVD media. The CPRM / CPPM specification was designed to meet the requirements of intellectual property owners while balancing the implementation requirements of manufacturers. To accomplish these requirements, the system defined by the specification relies on public-key cryptography's key management for interchangeable media, content encryption, and "media-based renewability." The use of the CPRM specification and access to the cryptographic materials required to implement it requires a license from 4C Entity, LLC. The license includes a facsimile key for the product which uses CPRM / CPPM technology. A controversial proposal to add generic key exchange commands (that could be utilized by CPRM and other content restriction technologies) to ATA specifications for removable hard drives was abandoned after outcry in 2001.CPRM is widely deployed in the popular Secure Digital card consumer-electronics flash memory format. (Wikipedia).

Video thumbnail

Internet Safety

If you are interested in learning more about this topic, please visit http://www.gcflearnfree.org/ to view the entire tutorial on our website. It includes instructional text, informational graphics, examples, and even interactives for you to practice and apply what you've learned.

From playlist The Internet

Video thumbnail

DsiN Film Campaign for Secure Internet Use: Data Privacy

The film Data Privacy shows how important it is to protect yourself against prying eyes just like in real life. Source: Deutschland Sicher Im Netze (http://bit.ly/cRQoOo)

From playlist awareness

Video thumbnail

How to configure Firefox settings for maximum privacy and security

Firefox is a very powerful browser and in this 2019 tutorial you learn how to access essential privacy and security settings to protect your online privacy. More info: https://www.privacytools.io/ https://wiki.mozilla.org/Privacy/Privacy_Task_Force/firefox_about_config_privacy_tweeks Bi

From playlist The state of surveillance

Video thumbnail

CERIAS Security: An Analysis of Data Breach Disclosure 2/6

Clip 2/6 Speaker: Melissa Dark · Purdue University In the past six years, 44 states in the United States have embraced a new form of privacy and identity theft regulation mandatory disclosure of data breach information. Information disclosure regulation is a form of legislation consider

From playlist The CERIAS Security Seminars 2009

Video thumbnail

PRIVATE MATTERS: Data Privacy in an Online World

Speaker: Atty. Edgar "Jet" Pascua II Moderator: Mr. Miguel Karlo Abadines

From playlist Center for Applied Cybersecurity Research (CACR)

Video thumbnail

How to protect your online privacy in 2019 | Tutorial

You can now support me on https://www.patreon.com/thehatedone and get access to more exclusive content. To learn how to best protect your online privacy in 2019 means to learn privacy by compartmentalization. Isolating your different digital identities and activities from each other is t

From playlist TUTORIALS & HOW TO's

Video thumbnail

Turing Lecture: AI for innovative social work, Desmond U. Patton

The lockdowns due to COVID-19 have led to the expansion of our online lives – with many groups and communities flourishing in the communal spaces of social media. But what about the most vulnerable in our society? Social inequalities have been dramatically highlighted by the necessary

From playlist Turing Lectures

Video thumbnail

22C3: The Right Track

Speaker: Nicholas Bentley A new approach to copyright in the digital world A discussion of the Intellectual Contributions model and the Rights Office system as an alternative for regulating copyright in a digital environment. For more information visit: http://bit.ly/22c3_information To

From playlist 22C3: Private Investigations

Video thumbnail

Media Policy & You: Crash Course Media Literacy #9

Copyright and other media regulations have always been a bit tricky, but the internet made all of that infinitely more complicated. But what does all of that mean for you, the consumer? *** Resources: The Berkman Klein Center for Internet & Society at Harvard University’s Digital Literac

From playlist Media Literacy

Video thumbnail

UNSWTV Information session by Patrick Stoddart

UNSWTV Information session by Patrick Stoddart, Manager Research and innovation at Learning and Teaching @UNSW

From playlist eLearning Howtos

Video thumbnail

Privacy Matters

http://privacymatters.nl/

From playlist awareness

Video thumbnail

First Draft of History: How a Free Press Protects Freedom

Journalism is an essential part of providing information in free societies, but journalists and their ability to serve the public is under constant threat of being silenced, even violence. How do journalists do their jobs in the face of danger and what happens when they can’t fill that rol

From playlist Journalism Under Siege: Truth and Trust in a Time of Turmoil, Fall 2018

Related pages

Public-key cryptography | Cryptography | Cryptomeria cipher