Digital Rights Management

Read Complete Research Material



Digital Rights Management



Digital Rights Management

Topic 1:

The ease of access of the 3D drawings and designs is causing concern related to intellectual property breach as the owners of 3D printers can make copies of a product after downloading its digital plan, in the form of a CAD (computer-aided design) file. The internet sources that host these 3D printable CAD files are now struggling with the laws and policies related to this technology. A major provider of these designs, MakerBot removed all the designs from its website. Other manufacturing companies, especially toys and jewelry industries are also seeking development of proper laws and regulations in order to protect the authenticity and privacy of their designs (Anonymous, 2013).

The 3D objects of industrial productions are normally subjected to the copyright laws. These copyright laws aim to protect the 3D design of the objects. The new technology allows making copies of the copyrighted object only by acquiring the design of the object that makes the 3D design files of the object accessible to the users. The 3D design files of registered objects are subjected to patents. Patents are used for the protection of a unique design or scheme, it allots the rights of use of the registered pattern only to the patent holder. Patents are strictly limited to ornamental, non-functional designs. Whereas, the copyrights are subjected to the protection of the printed objects, that does not allow the physical copying of the objects.

3D printing is a vast venture that includes the printing of layer by layer printing of movable and interlocked designs. It can also print metallic objects, that allow the user to print weapons and other harmful objects. Therefore, the development of regulations and laws by the government are required to prevent such problems. (Weinberg, 2013).

Topic 2:

Piracy of digital data and content is getting to be a serious problem in a number of organizations, the improper security of data increases the chances of hacking and piracy. The piracy of data may also be done with the help of a source that exist inside the organization. Digital Rights Management (DRM) is seen as a potential solution to this difficulty. It helps reduce the piracy of the content by allowing limited access to the users. It is fed with the access Rights of certain users to provide access of sensitive data to the targeted user.

The security of data in a DRM system can be ensured by the encryption of data and by reducing the chances of unauthorized decryption of the content. The decryption keys should not be accessible to all users, only authorized personal should have the access to eliminate the chances of data theft and piracy. Although DRM is successful in eliminating piracy of content from an insider, but it is not completely effective to protect data from external hacking. To ensure protection against hacking and external breach, additional measures are required (Haber et. al, 2003).

The content of the DRM is stored inside the “secure container”, this secure container can only be accessed by a ...
Related Ads