HAND’s Talent ID Technology On Show At IBC 2024

HAND (Human & Digital) is showcasing its global Talent Identifier framework and registry at IBC 2024 in the IBC Accelerator Innovation Zone.
HAND’s Talent ID is an interoperable tool for the media supply-chain that solves current challenges to talent identity automation today, as well as growing threats to NIL – (Name, Image, and Likeness) rights from unlicensed AI-based deepfakes, by persistently identifying legitimate, consent-based ‘digital replicas' - thus protecting talent rights and preventing misuse.
Designed for the identification of measurably notable talent in cultural industries of entertainment, sports, fashion, music, news, gaming, and more - HAND’s ISO-level, standards-based technology is available as both a business intelligence-based, SaaS (Software-as-a-Service) platform with an API subscription model, and as a free Web UI for searching a limited amount of Talent IDs per day. It provides unique Talent ID verification for real persons, their virtual counterparts, and fictional characters.
Like a “tracking beacon” for talent, HAND helps automate the identification, verification, origin and authenticity of talent-related assets in audio/visual works. This helps content owners/providers streamline the management of talent residuals, royalties and participations - providing studios, payment processors, and content rights owners with a way to automatically track and more efficiently compensate talent and cast lists, protecting both assets and brands, and ensuring authenticity in media content.
At IBC 2024, HAND is leading an Accelerator Media Innovation Programme project: “Digital Replicas and Talent ID: Provenance, Verification and New Automated Workflows” - which provides a platform for the media community to collaborate on this critical challenge the industry is facing. Along with project champions Paramount Global, SMPTE, and Movie Labs – participants include EIDR, USC ETC (Entertainment Technology Centre), The Scan Truck, EZDRM, and more. In it, HAND will aim to show an example of how a notable Hollywood actor, with their consent - creates a digital replica of themselves, and how the usage of that replica can be securely identified and tracked across different platforms, ensuring that the rights and permissions of the talent are respected and enforced, preventing unauthorized or unethical uses of their digital likeness.
HAND is also participating in a second Accelerator project: “Design Your Weapons in the Fight Against Disinformation,” championed by BBC and Paramount Global, with participants including EBU, TV2, ITN, Transmixr, Media City Bergen, YLE, Channel 4, Associated Press, USC ETC (Entertainment Technology Centre), and CBC. This challenge will explore deepfake or anomaly detection tools and processes, the use of media provenance signals, and aims to establish closer industry collaboration and information sharing.
You might also like...
Building Software Defined Infrastructure: Observability In Microservice Architecture
Building dynamic microservices based infrastructure introduces the potential for variable latency which brings new monitoring challenges that require an understanding of observability.
Broadcast Standards: Kubernetes & The Architecture Of Cloud Compute Based Systems
Here we describe Kubernetes and the taxonomy of containerized architecture based cloud compute system designs it manages.
Live Sports Production: Backhaul In Live Sports Production
Getting content reliably and securely from venue to studio remains key to live sports production so here we discuss the technology and services required.
Monitoring & Compliance In Broadcast: Monitoring Delivery In The Converged OTA – OTT Ecosystem
Convergence or coexistence between linear broadcast, IP based delivery and 5G mobile networks creates new challenges for monitoring of delivery paths, both technically and logistically.
IP Monitoring & Diagnostics With Command Line Tools: Part 4 - SSH Public Keys
Installing public SSH keys created on your workstation in a server will authenticate you without needing a password. This streamlines the SSH interaction and avoids the need to use stored and visible passwords in your scripts.