120 likes | 202 Views
Economic incentives for protecting digital rights online. Outline. Introduction Background & Related work The proposed protocol (SPIES) Exchange period Protection period Conclusions. Introduction.
E N D
Outline • Introduction • Background & Related work • The proposed protocol (SPIES) • Exchange period • Protection period • Conclusions
Introduction • Once electronic content has been released, it is very difficult to prevent it from being shared. • This disclosure often represents economic harm to the content’s owner and others. • To discourage illegitimate sharing.
Background&Related work(1/2) • Game theory • Digital rights management (DRM) • DRM is the use of technological means to allow only authorized uses of or access to content. • Traditional DRM uses techniques: encryption & watermarking • DRM-free
Background&Related work(2/2) • Digital rights management (DRM) Content provider Content consumer Escrow service
The proposed protocol (1/5) • Secret Protection Incentive-based Escrow System (SPIES). • SPIES is best suited for applications in which the content is legitimately shared among a small set of participants. • SPIES should not be used to replace traditional DRM. (ex. movie and music files sold online) • SPIES used to limit unauthorized sharing of passwords for accessing content on websites.
The proposed protocol (2/5) • SPIES is a protocol executed between several actors: 信託付款服務(第三方)
The proposed protocol (3/5) • Variables in SPIES
The proposed protocol (4/5) • Exchange period
The proposed protocol (5/5) • Protection period Fig. the Bounty Payment
Conclusions • SPIESuses the techniques of game theory to analyze strategies andoutcomes. • Applicable: passwords, corporate knowledge-sharing, pre-release media. • Its chief limitations are the requirements for a limited number of legitimate. • To limit and detect unauthorized sharing.