Image Processing Reference
In-Depth Information
service who is stupid enough to try and access T-commerce using that card probably
deserves to be caught and penalized.
18.14.5
Authentication
All of these control mechanisms depend on authenticating the users. Knowing that they are
who they say they are is important, but this proposition is not as simple as it appears. It is
very easy to determine that someone in a particular household is using the pay-per-view
service, but it is a lot harder to determine exactly which family member that is. Minors could
be viewing totally unsuitable content without the knowledge or permission of their parents.
In the end, access control probably comes down to managing the viewing rights at
the level of a household and then relying on parental supervision after that.
Thus we need to determine exactly what a household means. This is important because
it sets the boundary limits for a network. The technologies for watching TV in a domestic set-
ting are converging toward a streamed model built around household servers and gateways.
18.14.6
Territory Management/Region Codes
The movie industry has attempted to manage territorial distribution by using region codes
on DVDs and then mandating that players must honor those codes.
Figure 18-3 shows the organization of the regions, and Table 18-1 lists their names
and identities.
Within 12 months of the introduction of DVD players, chips to get around region
coding were devised; they have been available ever since. You can even buy region-free
“chipped” players that retain the manufacturers' warranties.
Region code enhancements (RCE) have been added by the film companies to defeat this
chipping of players. The enhanced disks play in multi-region players but not in the chipped
units. Disks with this additional regional coding protection are beginning to enter the market.
5
2
1
1
6
2
3
5
4
4
Figure 18-3 DVD region code map.
Search WWH ::




Custom Search