Feeds

Phone DRM too expensive, say carriers

Fragmentation looms

  • alert
  • submit to reddit

High performance access to file storage

Mobile phone networks dissatisfaction with the copyright interests has gone public. The association representing the GSM standard, with over a billion users worldwide, has declared that the proposed tariff for DRM is too high and is unworkable. Members of the GSM Association think that the per-transaction model agreed by the MPEG Licensing Authority - and proposed to the Open Mobile Alliance standards group - harms users in the long run.

The proposal put to OMA by the MPEG LA in January requires carriers to pay one per cent of transactions and $1 per handset back to the DRM patent holders, which include ContentGuard, Intertrust, Matsushita, Philips and Sony.

In a statement, GSMA CEO Rob Conway described "significant discontent" with the licensing proposal, and characterized the plan as "impractical, excessive and short-sighted". The GSMA objects to both the ‘per transaction’ fee that carriers must pay, as well as the $1 a handset DRM fee.

"Based on frank responses from operators throughout the world, our Board understands that members are being 'forced away' from the OMA DRM standards by this unworkable licensing scheme", added GSMA chairman Craig Ehrlich.

Erlich predicted that the carriers would use cheaper incompatible DRM schemes and consequently the market would fragment. Incompatibilities between DRM schemes from Microsoft, Apple and Real plague the 'legitimate' PC download market, which has failed to make an impact on 'illegal' file sharing currently being discussed by the US Supreme Court.

Carriers are more reluctant to introduce DRM than their counterparts in the PC business. Verizon went to court to protect the identity of file sharers, and Orange has been vocal about insisting that users can move their music from PC to phone and back again. The networks see music as a way to drive related transactions, such as ticket sales. ®

Related stories

DRM comes to mobiles
Sony Ericsson launches 'Walkman'
Mobile DRM levy hits operators where it hurts
Phone biz agrees on $1 levy
Killing an iPod - harder than it looks?

High performance access to file storage

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.