SPE Expectations Leverage existing delivery technologies

Slides:



Advertisements
Similar presentations
KIERAN JACOBSEN HP Understanding PKI and Certificate Services Gold Sponsors Silver Sponsors.
Advertisements

Microsoft Windows XP SP2 Urs P. Küderli Strategic Security Advisor Microsoft Schweiz GmbH.
Advanced Metering Infrastructure AMI Security Roadmap April 13, 2007.
Sony White House Anthem Lockheed Aramco Bushehr nuclear reactor NSA Hacked Facebook Hacked Apple,Google,Microsoft,
Script Kiddies; CybercrimeCyber-espionage; Cyber-warfare CybercriminalsState sponsored actions; Unlimited resources Attacks on fortune 500All sectors.
Content Protection for Recordable Media Florian Pestoni IBM Almaden Research Center.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Finalize RESTful Application Programming Interface (API) Security Recommendations Transport & Security Standards Workgroup January 28, 2014.
4K CONTENT PLAN Sony Pictures Technologies. The 4k Consumer Value 4k has to offer all of these features: – Higher resolution – Richer colors (wider color.
4K CONTENT PLAN Sony Pictures Technologies. Consumer Offering Broadcast (Over the air, cable, satellite, IPTV) Premium Content (Movies, episodic TV) Premium.
IDA Security Experts Workshop Olivier LIBON Vice President – GlobalSign November 2000.
Free, online, technical courses Take a free online course. Microsoft Virtual Academy.
Compliance and Regulation for Mobile Solutions Amanda J. Smith Messick & Lauer, P.C. May 16, 2013.
Suggested F1 Plan Sony Pictures Technologies. Not functionally organized, but people and current organization- centric (i.e.- SPE, SCE, SNEI, etc) – F1.
Advanced Access Content System (AACS) Industry Briefing July 14, 2004.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
00 SONY PICTURES TECHNOLOGIES Mid-Range Plan: FY 2014 – FY 2016 Current Developments & Objectives SP Technologies Operations Technology Development  Working.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
ENHANCED CONTENT PROTECTION OVERVIEW. Security Solution Characteristics Comprehensive security ecosystem All devices meet the same standard – No assumption.
4K. Contents Context Online required? UltraViolet connection.
Looking beyond the obvious!! HOW SECURE IS BANKS’ CORE DATA? Prashant Pande Head Professional Services IDBI Intech Ltd.
BDA UHD Format Study (SPE internal update)
Proposal for device identification PAR. Scope Unique per-device identifiers (DevID) Method or methods for authenticating that device is bound to that.
HDCP1.4+ Material for Certification 10 August 2012 Sony Corporation 2012/8/10 Sony Confidential 1.
F1 Cross-Company Call Follow Up Process Flow against Security Breach on F1 Phase 1 6.iii.2013 Sony Confidential.
Confidential. For use within only Slide 1 iOS and Android content protection requirements Version 0.2 Sony Pictures Entertainment Tim Wright.
Shibboleth: An Introduction
Sony Pictures Confidential Watermarking in AACS. Sony Pictures Confidential SPE Forensic Watermarking Goals Goals: – Identify the device that was compromised.
F1 Encoding and Content Security Spencer Stephens CTO, Sony Pictures.
Copyright ©2015 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard Training WatchGuard XCS What’s New in version 10.1.
South Wales Cyber Security Cluster A networking group with a purpose Membership Open to anyone with an interest in Cyber Security.
F1 BOX/SECURITY/SERVER SYSTEM SPTECH FEEDBACK(DRAFT2) 12012/9/21Sony/SPTech Confidential.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Security Systems | ST/SRM3-NA | 4/6/2016 © 2016 Robert Bosch LLC and affiliates. All rights reserved. 1 Ensure data security in a hyper-connected world.
© 2012 IBM Corporation IBM Worklight Overview Martin Triska – IBM Worklight specialist (420) July 2012.
AAVS Middleware Security Group Bob Cowles CERN – September 14, 2005.
Cyber Security Means Locking the Front Door Too: Use High-Assurance Identity Management to Control Access to the Federal Bridge.
Performing Risk Analysis and Testing: Outsource or In-house
Keyhub Identity and Access Management App is Powered by Azure and Offers Customers Easy Authentication, Authorization for Mobile Devices MICROSOFT AZURE.
Impact of IT Consumerisation on Enterprise Security
Wonderware Online Cost-Effective SaaS Solution Powered by the Microsoft Azure Cloud Platform Delivers Industrial Insights to Users and OEMs MICROSOFT AZURE.
4k Content Delivery Sony Pictures Technologies.
pVault Sharing Architecture
Sony Pictures Technologies
Content protection for 4k
4k Theoretical Discussion
Enhancing Web Application Security with Secure Hardware Tokens
On-Premises, or Deployed in a Hybrid Environment
NAAS 2.0 Features and Enhancements
IS4680 Security Auditing for Compliance
Information Security Risk Management
4K Content protection overview
4K Content protection overview
Cybersecurity Am I concerned?
4K Content protection overview
AMI Security Roadmap April 13, 2007.
Group Meeting Ming Hong Tsai Date :
How to address security, cost, IT and migration concerns
O.S. Security.
In the attack index…what number is your Company?
Shared Infrastructure
Christian Nordbakk Objectware AS
Draft UN Regulation on Cyber Security
Presentation transcript:

SPE Expectations Leverage existing delivery technologies Raise the bar on content protection Hardware protected video path Solutions must be acceptable to other Studios Hardware root of trust Avoid vendor lock-in for delivery Allow for extensibility Content bound to consumer’s domain

Enhanced Content Protection Active monitoring and response Renew security with every new Title Limit number of protection systems Updated Compliance & Robustness Rules HDCP 2.0 only Keys bound to rights locker (not to physical media) Require 3rd party device certification

Principles for content protection with rationale Issue with current systems Mitigation for 4K Software systems are vulnerable Hardware systems only allowed Permanently offline players cannot be authenticated, revoked or updated 4K security architecture will require online authentication, revocation and update checks Self-certification allows lazy OEMs through Mandatory 3rd party certification of 4K devices Single, long-standing security architecture gives hackers time to attack, and means that attacks have high impact, if successful (as whole device base is vulnerable) 4K security will be renewable, at least for each Title, at a system and individual device level, and support diversity across devices and Titles HDCP 1.4 is vulnerable HDCP2.0 only allowed, with NO backward compatibility with earlier versions Existing robustness rules are outdated and too broad New robustness rules, for devices with hardware security only, will be developed Systems allowing multiple content protection systems are as strong as the weakest system A single, renewable, content protection system only will be allowed