Global Convergent Media
Interactive Theater
Digital Cinema
Contact Information

 

Back one page
back to home
Forward one page

         copyright 2002
           David Baker

About Global Convergent Media

"As the world of media stubbornly transitions from divergent mediums, methods and platforms to a digital convergent replacement, the provider and user stand to gain great benefits. For the provider, comprehensive control and transaction combined with unlimited user potential will substantially drive up revenue potential while reducing cost. For the user, the benefit is simple access to a universe of content on demand."

The primary driver behind the impending media evolution is content management. In the broadest terms, content management will evolve into an engine allowing control and tracking of content from acquisition through distribution. This content management engine operates at fullest potential only when the fuel, in this case content, is properly formulated or prepared. Therefore, a content preparation and management methodology or model is the key to the success of convergence.

The Model
There are two primary
elements making up the
convergent content management formula.

Security Shell
The outer wrapper of the convergent content package is a Security Shell.
Like the outer wall of a biological cell, the Security Shell maintains the integrity
of the content until unlocked at use. This single shell of security in fact represents multiple layers of protection. These layers provide numerous security functions including intrusion detection, protection during transport and deliver, etc.. As with any sentry, there must be a set of orders or instructions indicating when protection is necessary and when it is not. That is determined by the Use Management Metadata.

Use Management Metadata — This layer is made up of many segments. Each segment includes a specific set of instructions determining rights of use, effectively the DNA of use management. This DNA includes instructions regarding the users address (similar to IP or terminal address), transaction or financial instructions (PPV, etc.), length of use, verification of user and authentication of content (watermarking). Focusing for a moment on transaction, Use Management Metadata may be programmed to report back to the provider when and how content is being used. It is simple to imagine the reporting capability being tied back to copyright or ownership attributes. With that in place, per performance compensation becomes a manageable objective.