Feeds

Blu-ray body confirms format to use 'interim' copy protection code

Won't limit the consumer, apparently

High performance access to file storage

CeBIT Blu-ray Disc's lack of full AACS support will not limit the consumer in any way, Blu-ray Disc Association (BDA) spokesman Frank Simonis said today after confirming the next-generation optical disc format will incorporate an "interim" version of the copy-protection technology.

The organisation also indicated the format's European launch timeframe will be formally announced after Blu-ray's US launch in May. This despite comments from Samsung, Panasonic and others that they will ship BD players over here in the Autumn.

AACS (Advanced Access Content System) is a cornerstone of both HD DVD and Blu-ray Disc. Hints that the technology - currently being developed separately from either optical format - was running behind schedule emerged last month when Sony warned that its PlayStation 3 might be delayed by an unnamed industry consortium being unable to come up with their final specifications in time.

We suggested Sony might have AACS in mind - it's part of the PS3's BD drive - and sure enough it quickly emerged as the front runner for potential PS3 delays.

The BDA's comments yesterday confirm that AACS isn't done - but there's enough of it in place to allow HD DVD and BD hardware and content providers to offer product. Whatever technology is incorporated into initial units must remain compatible with future versions of AACS, and Simonis indicated that would indeed be the case. If not, the consumer backlash is likely to be considerable.

Simonis added that BD will ship with the format's BD+ and ROMmark security systems - both of which come in addition to AACS. BD+ allows the BDA to update at a future date the Blu-ray encryption keys should they be cracked or made public at a future date. ROMmark is essentially a 'genuine disc' stamp encoded on each BD as it comes out of a pressing machine.

As for a European launch, Phillipe Coppens, of BDA member company Philips, said an announcement would come in the near future - essentially, when the US launch has taken place, he added. ®

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.