Sunteți pe pagina 1din 22

DMCA, DRM, Computer Security & You

Jennifer Stisa Granick, Esq.


Stanford Law School
Center for Internet & Society
559 Nathan Abbott Way
Stanford, CA 94305

650-724-0014
jennifer@granick.com
Searching for Halvar…..
Sklyarov Case
• Russian programmer
• Wrote program that
decrypts Adobe
eBooks
• Program permits Read
Aloud function
• Also copyright
infringement
DMCA §1201 1 of 2
• (a)(1)(A) No person shall circumvent a technological
measure that effectively controls access to a work
protected under this title.
• (a)(2) No person shall manufacture, import, offer to the
public, provide, or otherwise traffic in any technology,
product, service, device, component, or part thereof, that--
• (A) is primarily designed or produced for the purpose of
circumventing a technological measure that effectively
controls access to a work protected under this title;
DMCA §1201 2 of 2
• (a)(2) No person shall manufacture, import, offer to the public,
provide, or otherwise traffic in any technology, product, service,
device, component, or part thereof, that--
• (B) has only limited commercially significant purpose or use other
than to circumvent a technological measure that effectively controls
access to a work protected under this title; or
• (C) is marketed by that person or another acting in concert with that
person with that person's knowledge for use in circumventing a
technological measure that effectively controls access to a work
protected under this title.
2600 VAN
Professor Ed Felten
My Speech
• Power of the Content Industries
• Development of Copyright Law
• Dwindling Rights of Citizens
• Copyright Maximalism
• Legal and Technological Controls of Content
• DMCA Anti-circumvention Provisions
• Whether You Will Do Something About It
The Congress shall
have Power To
promote the Progress
of Science and useful
Arts, by securing for
limited Times to
Authors and Inventors
the exclusive Right to
their respective
Writings and
Discoveries
Corporate Behemoths
Sonny Bono Copyright Term Extension Act
DRM = Control
• SDMI
• CSS
• pay per listen
• limited time purchases
• regional pricing schemes
Fair Use

• (1) the purpose and character of use


• (2) the nature of the copyrighted work
• (3) the amount and substantiality of
copying, and
• (4) the market effect.
DMCA 1201(b)(2)(C)(1)
• Other Rights, Etc., Not Affected.
• Nothing in this section shall affect rights,
remedies, limitations, or defenses to
copyright infringement, including fair use,
under this title.
Security Testing Exception
• information derived used solely to promote
the security of the owner or operator of the
tested computer system, or
• information obtained shared directly with
the developer of the system
• information obtained distributed in a way
that might enable copyright infringement
or other legal violations
Encryption Research
• Professional Cryptographers
• Seek Advance Permission
• Necessary to Advance the State of the Art
• Publishing Results Does Not Promote
Infringement
Reverse Engineering
• Purpose to Achieve Program-to-program
Interoperability
• Reverse Engineering Is Necessary
• Information Divulged for the Sole
Purposes of Enabling Program-to-Program
Interoperability
http://cryptome.org/ms-drm-os.htm

12 December 2001. Thanks to I.


Source: US Patent Office: http://www.uspto.gov

------------------------------------------------------------------------
United States Patent 6,330,670
England , et al. December 11, 2001

------------------------------------------------------------------------
Digital rights management operating system

Abstract

A digital rights management operating system protects rights-managed data, such as downloaded content,
from access by untrusted programs while the data is loaded into memory or on a page file as a result of the
execution of a trusted application that accesses the memory. To protect the rights-managed data resident in
memory, the digital rights management operating system refuses to load an untrusted program into memory
while the trusted application is executing or removes the data from memory before loading the untrusted
program. If the untrusted program executes at the operating system level, such as a debugger, the digital rights
management operating system renounces a trusted identity created for it by the computer processor when the
computer was booted. To protect the rights-managed data on the page file, the digital rights management
operating system prohibits raw access to the page file, or erases the data from the page file before allowing
such access. Alternatively, the digital rights management operating system can encrypt the rights-managed
data prior to writing it to the page file. The digital rights management operating system also limits the
functions the user can perform on the rights-managed data and the trusted application, and can provide a
trusted clock used in place of the standard computer clock.

S-ar putea să vă placă și