Feeds

UK operation patents DVD lockdown

Premium content ransomed without use of special kit

Security for virtualized datacentres

Liquid11, better known for phone-number aggregation service SwitchboardFree, has got a patent on a DVD lockdown technology that enables pay-to-play without mucking about with proprietary hardware or risking internet sharing of security codes.

The premise is a DVD with some free content, and some that is only unlocked once a call has been made to a premium-rate line or credit-card-payment system. The company suggests that the disk could be given away with a newspaper, with free content acting as a teaser to draw in revenue for the paid stuff. It's a fine idea if it can be done technically, which is where Liquid11's patent comes in to play.

When the user attempts to play back the additional content they are asked to call a number, which can be a premium-rate line and is unique to that DVD title. The caller is then given a unique number based on their phone number, which is picked up on the caller-ID (the company has registered as a telco, so they get caller ID even when it's blocked). The code is then entered into the DVD player, along with the phone number, and the premium content unlocked.

The good point is the lack of specialist kit - normal DVD player, disk and phone, along with the fact that sharing an unlock code means also sharing a phone number. In the US the company has been using credit-card numbers instead, making it very unlikely anyone going to share their unlock code with the world.

The real question is if punters actually want DVDs with additional, premium, content on them. The company has, for the last 18 months, been supplying the technology to purveyors of porn titles where the access to premium content has apparently gone down well, but whether the rest of the world is ready to pay is another matter entirely.

Technically the solution is one of the more elegant attempts to improve the DVD business. It won't stop every attempt to access the content, but it will stop the majority. But despite that, it's still trying to solve a problem that hardly exists. ®

Internet Security Threat Report 2014

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
Special pleading against mass surveillance won't help anyone
Protecting journalists alone won't protect their sources
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Apple's iPhone 6 first-day sales are MEANINGLESS, mutters analyst
Big weekend queues only represent fruity firm's supply
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Bill Gates, drugs and the internet: Top 10 Larry Ellison quotes
'I certainly never expected to become rich ... this is surreal'
Big Content Australia just blew a big hole in its credibility
AHEDA's research on average content prices did not expose methodology, so appears less than rigourous
EMC, HP blockbuster 'merger' shocker comes a cropper
Stand down, FTC... you can put your feet up for a bit
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.