The Digital Media Project

 

Source

L. Chiariglione

Title

A table of requirements derived from Traditional Rights and Usages (TRU) of Media Users

No.

040306dmp01

 

The table below is gives the list of requirements developed by the 1st General Assembly of the Digital Media Project. Each entry in the table starts with "DMP shall support".

 

RQ#

Description

TRU#

  1.  

creation of DMP quotes by a user

1.

  1.  

automatic notification to a DMP right holder that a portion of his piece of DMP content is being quoted

1.

  1.  

making accessible quotes from a piece of DMP content by an anonymous DMP user to other DMP users

1.

  1.  

filtering/suppression of quotes from a piece of DMP content, within a given circle of DMP users, especially based on criteria such as assigned ratings or an excessive number emanating from an anonymous DMP user

1.

  1.  

preservation of a stable DMP content rendering to be quoted

1.

  1.  

attribution of a piece of DMP content to a DMP creator

1., 11.

  1.  

sectional reference to specific portions of a piece of DMP content (e.g. chapter-and-verse with text, timecode start-stop with linear audio and audiovisual material, geometrical sections of 2D/3D art, references to the state of the piece of DMP content)

1.

  1.  

fully enjoying the referenced sections of a quote by DMP users who have rights to the referenced DMP content

1.

  1.  

means to locate/purchase/rent full access to DMP content or else to obtain limited access to rendered references

1.

  1.  

continuous access to DMP content by DMP users

2., 19, 20.

  1.  

space-shifted use of DMP content according to the rules of the place in which it is used (Add/cover restricting this)

3.

  1.  

time-shifted use of DMP content (Add/cover restricting this)

4.

  1.  

the manufacturing of DMP devices by a manufacturer

5.

  1.  

the users' free choice of DMP devices

6.

  1.  

access and use DMP content whose copyright has expired

7.

  1.  

the ability of a DMP user to allow certain DMP users to receive DMP content and to prevent other DMP users from receiving it

8., 48.

  1.  

making available a piece of DMP content by an anonymous creator to DMP users

9.

  1.  

anonymous use of a piece of DMP content by a DMP end-user

10., 30.

  1.  

editing of a piece of DMP content by a DMP user

13., 14., 15.

  1.  

checking by a DMP right holder that a piece of DMP content released to another DMP user is being used according to the law of the jurisdiction of the DMP user and usage rules

13., 14., 15., 16

  1.  

placing of links to a piece of DMP content by a DMP user

18.

  1.  

inhibiting the making accessible to a DMP user a modification of a piece of DMP content made by a DMP user who is not the creator

24.

  1.  

temporary/permanent revocation of one's rights to a piece of DMP content and temporary/permanent transfer of those rights to another DMP end-user

25., 49.

  1.  

transcoding of a piece of DMP content from one format to another

26.

  1.  

moving a piece of DMP content from one device to another

26.

  1.  

removal of a piece of DMP content that has been declared prohibited by a DMP user with the appropriate authority from public access

27.

  1.  

insertion of a non-removable piece of DMP content at a given time in another piece of DMP content by a DMP user

28.

  1.  

making a piece of content available to a community of DMP users at a time that is different from another community

29.

  1.  

withdrawal of a piece of DMP content by the DMP creator

32.

  1.  

making accessible DMP content of authenticated origin

52.

  1.  

access to published DMP content

55., 57.

  1.  

guarantee given to a DMP user that a piece of DMP content is what it says it is

56.

  1.  

the creation and introduction in the platform of governed content

67.

  1.  

access content of an end-user choice

69.

  1.  

running applications chosen by an end-user on his content consumption device

70.

  1.  

attaching content-consumption devices of end-user's choice to a delivery systems

71.

  1.  

interoperable end-user devices (IEDs) to receive and provide access to content from multiple sources and services.

6., 36.

  1.  

a DMP compliant bitstream/file shall be transmission-agnostic, able to exist as a file or be transmitted by wire or wireless.

6.

  1.  

the persistent association of rights expressions and conditions to DMP DRM compliant bitstreams/files.

?

  1.  

the persistent and unique identification of DMP DRM compliant bitstreams/files and their derivatives.

?

  1.  

the persistent binding or association of an individual person, user or other entity with DMP DRM compliant bitstreams/files.

22., 23

  1.  

extensibility of rights expressions and conditions for DMP DRM compliant bitstreams/files such that new, trusted and duly authorized semantics and syntax can be introduced periodically over time.

n+1

  1.  

trust relationships to be determined as existing between DMP DRM compliant devices, applications, services, and DMP DRM compliant bitstreams/files.

5., 36., 37., 39-51., 56., 60., 62-66., 73., 75.

  1.  

the secure transfer of governed DMP DRM compliant bitstreams/files in cleartext over unsecure channels.

5., 6., 8., 9., 10., 15., 23., 24., 27., 28-30., 32., 34-45., 47-66., 71., 73., 75.

  1.  

a DMP bitstream/file to exist in a DRM governed state unless stored in or accessed from a DMP DRM compliant device or virtual environment.

5., 6., 8., 9., 10., 15., 23., 24., 27., 28-30., 32., 34-45., 47-66., 71., 73., 75.

  1.  

the transfer and use of DMP DRM compliant bitstreams/files between one given DMP DRM compliant DRM implementation and another DMP DRM compliant DRM implementation.

2., 3., 5., 6., 10., 25., 26., 34., 36., 55., 57., 58., 62., 65., 71., 75.

  1.  

the storage, transfer and use of DMP DRM compliant bitstreams/files on non-DMP DRM compliant devices.

5.

  1.  

the transfer of DMP DRM compliant bitstreams/files from one DMP DRM compliant device to another with the secure removal from the first device.

25.

  1.  

the implementation of the loan, transfer by intent (including but not limited to by inheritance or last will and testament), or deletion of DMP DRM compliant bitstreams/files.

25, 33-37., 42., 48-50., 62., 73.

  1.  

the acquisition and use of DMP DRM compliant bitstreams/files anonymously. (Needs additional TRU)

10.

  1.  

efficient access control.

27., 62., 45., 48.

  1.  

and motivate license respect and royalty payment.

37.

  1.  

tools for assistance in law enforcing.

?

  1.  

the prevention of illegal access to the protected media.

48.

  1.  

association of  legal access to media with payment mechanisms.

37(?)

  1.  

elimination of the proliferation of unprotected copyrighted media.

69.

  1.  

assurance that digital media consumers enjoy at least the same rights and usages as they had with traditional media.

?

  1.  

assurance of  access to protected media is as easy and as simple as to unprotected media.

?

  1.  

anonymity of the consumers.

12.

  1.  

avoidance of adding extra encumbrance to the cost of the media creation, distribution and consumption.

?

  1.  

free choice of services independently of the media item and the license.

57., 5.

  1.  

assuring consumers that remuneration is distributed fairly.

?42.

  1.  

innocent consumers aware when the media is pirated.

?

  1.  

tracing the media source and trail.

?

  1.  

making it difficult for violators to stay anonymous. On-line/off-line?

?

  1.  

key for decryption/unscrambling being distributed to authenticated license holders only.

?

  1.  

the decryption/unscrambling key enabling only operations authorized in the license.

?

  1.  

the key being used in automated operations only. Users shall not have direct access to the key.

?

  1.  

the system being resistant to tampering as much as possible.

?

  1.  

monitoring each usage or transit of media that is subject to authorization or fiscal transaction.

?

  1.  

reporting of such events (76) to management systems. The reports shall identify the operation, the media item and the license involved in the event.

?

  1.  

reporting of violations to management systems. The reports should include as much details as possible for identifying the violators.

?

  1.  

protection of media all the way from creation (mastering) to consumption (playback) so that at no middle stage it is available as clear text.

?

  1.  

prevention of keys from being stolen and used for operations that are not allowed by the license terms.

?

  1.  

an in individual key for each media item, so that if one key is exposed only the single associated media item is endangered.

?

  1.  

a standard algorithm to encrypt/scramble the media.

?

  1.  

use of standard signaling.

?

  1.  

use of standard environment for key management.

?

  1.  

The use of proprietary or renewable algorithms to be softly loadable into the devices through a standard framework.

?

  1.  

to be authenticated through a virtual identity (VI)

10

  1.  

licenses being granted to media items independently of the format the items are represented in, the network type it is delivered through or the way it is consumed by.

?

  1.  

scalable media coding without hindering the full potential of that technology.

?

  1.  

To easily access the media with no further manual operation after the license is obtained for the first time

57 58 69

  1.  

To provide mechanisms for license trade

35?

  1.  

To provide mechanisms for enabling the licenses on devices

2

  1.  

To provide payment and subscription methods

69

  1.  

To deliver the media to the customer in anonymity

?

  1.  

To deliver to the license customer in anonymity

10 12?

  1.  

To hinder? the license from expose details about the media item or its source

?