![]() |
La gestion des DRM en perspectivepar Herwann Perrin Université René Descartes Paris V - DESS de Droit et Pratique du Commerce électronique 2004 |
B- Protection of the contentsThe interest of the installation of a system of DRM is related to the fact that it is about a technology which makes it possible to the owners of contents to protect their products. Indeed, protection is ensured by the encoding of the multi-media contents and authorizes the access only to the people in possession of the license to read this one.10(*) The protection of the contents is closely related to the selected type of protection. One will remember, for example, protection associated with the DVD, the algorithm CS (Content Scrambling System) which was, inter alia, broken by Jon Lech Johansen.11(*) As example, it is right now recommended to use lengths of keys of 80 bits for symmetrical algorithm TDES and of 1024 bits for asymmetrical algorithm RSA. 12(*) * 10 The license is a certificate specifying for a customer given the conditions and the rights of use of given contents. It contains information on the consumer, the product, the owner of the product, the key with which the contents were packaged, authorized rights and other information. * 11 Jon Lech Johansen, young person Norwegian 22 years called «DVD Jon» and become famous for his high facts in term of piracy on Internet, was recognized innocent by the Court of Appeal of Oslo of the charges carried by the studios of cinema of Hollywood which affirmed that it had enfreint the law by diffusing on Internet a program making it possible to unbolt DeCSS, a code preventing the film DVD copy. Jon Lech Johansen had already been discharged last January, and the Court of Appeal confirmed the first judgment which insisted on the fact that the young man could do what he wanted with his DVD, bought legally. http://www.journaldunet.com/0312/031223brefinter.shtml * 12 http://www.rsasecurity.com/ |
|