Feeds

Feds OK DVD+R/RW DRM tech

The licensor will see you now

  • alert
  • submit to reddit

Top three mobile application threats

The US Federal Communications Commission (FCC) has approved the use of Video Content Protection System (VCPS), the DVD+RW Alliance's preferred copy-protection system.

VCPS essentially governs the recording of digital TV shows onto DVD+RW media. The FCC has defined what it calls the 'Broadcast Flag', a code that can be transmitted with digital broadcasts that indicates the broadcaster's willingness to allow consumers who've recorded a programme to make further copies of it.

The idea is that pirates will not be able to use digital broadcasts as a source of material for illicit DVDs, but quite clearly it has the potential to stop fans recording and archiving their favourite shows.

Video Content Protection System - look for this signVCPS detects the Broadcast Flag and applies it to the recorded content on DVD+R and DVD+RW, single- and dual-layer media. The FCC's Broadcast Flag rule comes into force on 1 July 2005, and all digital TV receivers must be capable of supporting the DRM technology from that date onwards. The technology is not mandatory for recorders, but equipment and discs without VCPS capability will be unable to record or play TV broadcast in the US that is protected with the Broadcast Flag.

VCPS was developed by HP and Philips under the codename 'Vidi'. Both are DVD+RW Alliance members. So is Thomson, and it too has received FCC approval for its own Broadcast Flag support system, SmartRight.

Philips is handling the licensing of VCPS and is charging a one-off fee of €5000, an annual fee of €10,000 plus other royalties depending on what you're licensing the technology for - software, disc mastering tools, disc replication equipment, etc.

VCPS protects the video recording by encrypting the MPEG 2 streams. A variety of techniques are used, including encrypting the disc sectors that contain MPEG 2 video using 128-bit AES. Blank media are equipped with a Disk Key Block in their track wobble (ADIP) data, with which the hardware uses its own Device Key to encrypt and decrypt the recorded MPEG 2 data.

Protected and un-protected content can be recorded on the same disc, Philips says. ®

Related stories

FCC awards small win to TiVo sharers, MPAA slips safety catch
DiVX to move 20 million CE devices by Christmas
Real fires back at Apple in DRM dogfight
Apple blasts Real DRM translator
DRM begins to work its magic
Macrovision preps '99% effective' CD lock-in tech
Dolby adds High-Efficiency AAC to MPEG 4 patent pool
Guilty until proven innocent - DRM the mobile phone way
Intel, MS and co. to tout copy-friendly DRM tech

The Essential Guide to IT Transformation

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.