Feeds

Blu-ray body confirms format to use 'interim' copy protection code

Won't limit the consumer, apparently

Secure remote control for conventional and virtual desktops

CeBIT Blu-ray Disc's lack of full AACS support will not limit the consumer in any way, Blu-ray Disc Association (BDA) spokesman Frank Simonis said today after confirming the next-generation optical disc format will incorporate an "interim" version of the copy-protection technology.

The organisation also indicated the format's European launch timeframe will be formally announced after Blu-ray's US launch in May. This despite comments from Samsung, Panasonic and others that they will ship BD players over here in the Autumn.

AACS (Advanced Access Content System) is a cornerstone of both HD DVD and Blu-ray Disc. Hints that the technology - currently being developed separately from either optical format - was running behind schedule emerged last month when Sony warned that its PlayStation 3 might be delayed by an unnamed industry consortium being unable to come up with their final specifications in time.

We suggested Sony might have AACS in mind - it's part of the PS3's BD drive - and sure enough it quickly emerged as the front runner for potential PS3 delays.

The BDA's comments yesterday confirm that AACS isn't done - but there's enough of it in place to allow HD DVD and BD hardware and content providers to offer product. Whatever technology is incorporated into initial units must remain compatible with future versions of AACS, and Simonis indicated that would indeed be the case. If not, the consumer backlash is likely to be considerable.

Simonis added that BD will ship with the format's BD+ and ROMmark security systems - both of which come in addition to AACS. BD+ allows the BDA to update at a future date the Blu-ray encryption keys should they be cracked or made public at a future date. ROMmark is essentially a 'genuine disc' stamp encoded on each BD as it comes out of a pressing machine.

As for a European launch, Phillipe Coppens, of BDA member company Philips, said an announcement would come in the near future - essentially, when the US launch has taken place, he added. ®

Beginner's guide to SSL certificates

More from The Register

next story
Xperia Z3: Crikey, Sony – ANOTHER flagship phondleslab?
The Fourth Amendment... and it IS better
Don't wait for that big iPad, order a NEXUS 9 instead, industry little bird says
Google said to debut next big slab, Android L ahead of Apple event
Microsoft to enter the STRUGGLE of the HUMAN WRIST
It's not just a thumb war, it's total digit war
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Netscape Navigator - the browser that started it all - turns 20
It was 20 years ago today, Marc Andreeesen taught the band to play
A drone of one's own: Reg buyers' guide for UAV fanciers
Hardware: Check. Software: Huh? Licence: Licence...?
The Apple launch AS IT HAPPENED: Totally SERIOUS coverage, not for haters
Fandroids, Windows Phone fringe-oids – you wouldn't understand
Apple SILENCES Bose, YANKS headphones from stores
The, er, Beats go on after noise-cancelling spat
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.