Content protection for 4k

Slides:



Advertisements
Similar presentations
Andy Daniëls 3 SWMA ICT03. Introduction History Technical Comparison Companies Security Why Blu-ray is On the Rise? Television: HD vs. Standard Conclusion.
Advertisements

Understanding ULTRA HD. Resolution – According to the CEA An Ultra HD TV must support a minimum pixel count of 3840 Horizontally 2160 Vertically.
T O P I C ST O P I C S Uses of Technical Measures Case Studies and Types of Technical Measures The Problem of Hacking and Circumvention Online Music Distribution.
Content Protection for Recordable Media Florian Pestoni IBM Almaden Research Center.
DRM & Key Revocation By David Coleman. DRM & Key Revocation ► Digital Rights Management – A system for controlling the use of content ► Key Revocation.
Digital Rights Management Bill Cody – MSIT-526 – 12/20/05.
CONTENT PROTECTION AND DIGITAL RIGHTS MANAGMENT
4K CONTENT PLAN Sony Pictures Technologies. The 4k Consumer Value 4k has to offer all of these features: – Higher resolution – Richer colors (wider color.
Analog Reconversion Reference Architecture Proposal presented to the Analog Reconversion Discussion Group March 5, 2003 by Brad Hunt Chief Technology Officer.
Windows Media DRM Device Ecosystem For Windows Vista Milan Gada – Program Manager Kevin Lau – Program Manager Windows Media (Content Access Technologies)
4K CONTENT PLAN Sony Pictures Technologies. Consumer Offering Broadcast (Over the air, cable, satellite, IPTV) Premium Content (Movies, episodic TV) Premium.
Advanced Access Content System (AACS) Industry Briefing July 14, 2004.
UXTC - Technical Planning Group Sony Electronics 7/22/2014 4K Network Security.
Copyright © DivXNetworks, Inc. All Rights Reserved. DivX is a registered trademark of DivXNetworks, Inc. SLIDE 2 © DivXNetworks, Inc. 19 September 2015.
Millennium Group Update Millennium Group Update Presentation for Copy Protection Technical Working Group September 20, 2000 Presentation for Copy Protection.
Watermarking Video Content What is video watermarking? November 2010 Rajaram Pejaver Note: The views presented here are solely those of.
ENHANCED CONTENT PROTECTION OVERVIEW. Security Solution Characteristics Comprehensive security ecosystem All devices meet the same standard – No assumption.
4K. Contents Context Online required? UltraViolet connection.
BDA UHD Format Study (SPE internal update)
HDCP1.4+ Material for Certification 10 August 2012 Sony Corporation 2012/8/10 Sony Confidential 1.
F1 Cross-Company Call Follow Up Process Flow against Security Breach on F1 Phase 1 6.iii.2013 Sony Confidential.
Confidential. For use within only Slide 1 iOS and Android content protection requirements Version 0.2 Sony Pictures Entertainment Tim Wright.
Presented by HDMI, L.L.C. May, 2005 HDMI Retail Training Program Part 1: Overview HDMI – The Standard for Connecting HDTV.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Sony Pictures Confidential Watermarking in AACS. Sony Pictures Confidential SPE Forensic Watermarking Goals Goals: – Identify the device that was compromised.
F1 Encoding and Content Security Spencer Stephens CTO, Sony Pictures.
F1 BOX/SECURITY/SERVER SYSTEM SPTECH FEEDBACK(DRAFT2) 12012/9/21Sony/SPTech Confidential.
Towards a Software Architecture for DRM Joint work with Kristof Verslype, Wouter Joosen, and Bart De Decker DistriNet research.
Presented by HDMI, L.L.C. May, 2005 HDMI Retail Training Program Part II: Additional Information HDMI – The Standard for Connecting HDTV.
Security of Broadcast Networks 1. Overview r Broadcast networks are used mostly for TV r Historical development r Commercial models r One-way or Two-way.
AACS ● Digital Restrictions system for HD-DVD & BluRay ● Incredibly elaborate: – content encryption – 4 revocation mechanisms – 3 watermarking schemes.
Content Protection: Extending content protection into the home and personal environment TODAY Jeff Lawrence Director, Global Content Policy Intel Corporation.
Technische Universität München WISTP 2007 Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication 10 th May 2007 W. Bamberger, O. Welter.
TAG Presentation 18th May 2004 Paul Butler
Key management issues in PGP
Presented by– The HDMI Working Group Hitachi, Panasonic, Philips, Silicon Image, Sony, Thomson, Toshiba.
Top 3 Best Cinavia Removal Software
TAG Presentation 18th May 2004 Paul Butler
SPE Expectations Leverage existing delivery technologies
Presented by– The HDMI Working Group Hitachi, Panasonic, Philips, Silicon Image, Sony, Thomson, Toshiba.
4k Content Delivery Sony Pictures Technologies.
Symantec Code Signing Certificate
Introduction to Networking
Sony Pictures Technologies
Applying Digital Watermarking Technology to Control CD copying
4k Theoretical Discussion
4k Discussion Sony Pictures.
4k Theoretical Discussion
4k Theoretical Discussion
4k Theoretical Discussion
Digital Transmission Content Protection (DTCP)
4k Discussion Sony Pictures.
Software Testing and Maintenance Maintenance and Evolution Overview
4K Content protection overview
Cryptography and Network Security
4K Content protection overview
SPE Point of View Proposal
4K Content protection overview
Encryption and Digital Rights Management
Web Information Systems Engineering (WISE)
Erica Burch Jesse Forrest
Breach Monitoring and Response
Presentation transcript:

Content protection for 4k Studios’ Viewpoint HDMI Link DRM 9/17/2018 Sony Pictures Confidential

Sony Pictures Confidential Starting Point 4k in the home is being driven by CE. Studios show little interest in releasing 4k to the home. Studios can and will likely wait for an enhanced content protection system before releasing 4k premium content. Enhanced content protection debate has already started in Ultraviolet Studios want enhanced content protection for HD Implementers have proposed it for 4k, early window and 3D Blu-ray was different. Both CE and studios wanted HD discs therefore compromises were made. 9/17/2018 Sony Pictures Confidential

Content Protection Overview DRM Link Protection – Last six feet Protecting the content from the service provider all the way to the video buffers Ultraviolet has 5 DRMs for improved interoperability Today’s DRMs rely on renewable components to respond to security breaches E.g. Adobe Flash player updates Most DRMs today are “hack one, hack all” When the DRM is compromised, all titles published to date are exposed HDCP over HDMI interface HDCP 1.x is compromised HDCP 2.1 is much more secure Sony 4k products only have HDCP 1.x DTCP-IP Link protection for DNLA Not all Sony products with DNLA have DTCP-IP (that means there is no premium content over DNLA) Some studios do not believe DTCP robustness requirements are good enough. 9/17/2018 Sony Pictures Confidential

HDCP Link Protection for HDMI HDCP 1.0 published in 2003 56-bit proprietary encryption algorithm Key generation algorithm secrets were reverse engineered so device keys can be generated by anyone HDCP has no response for that scenario HDCP 2.0 published in 2008, HDCP 2.1 published in 2011, HDCP 2.2 is in adopter review (as of 8/12) HDCP 2.x has higher robustness requirements that HDCP 1.4 128-bit AES standard encryption New security model, not vulnerable to same attack as HDCP 1.4 Studios will require HDCP 2.1 or later for 4k content. Sony 4k TVs only support HDCP 1.4. 9/17/2018 Sony Pictures Confidential

AACS – Blu-ray’s Content Protection Design started in 2002 Sony, Panasonic, Toshiba, Intel, Microsoft, IBM, Disney, Warner Bros Different security models for CE and IT Unique device certificates for hardware BD players because CE did not want to have to download new firmware Shared device certificates for software BD players because cannot securely incorporate unique device certificates in software players Response to a security breach is to revoke compromised device certificates High definition analog outputs were permitted Studios did not want analog outputs because analog outputs cannot be protected CE needed to accommodate a legacy of several million HD TVs without digital inputs Compromise was HD analog sunset in December 2010 Fox disliked AACS so much they introduced BD+ 9/17/2018 Sony Pictures Confidential

AACS – Breach Management Breach response is to revoke compromised certificates so that they cannot be used to play AACS content When a device certificate compromised all Blu-ray discs mastered until that certificate is revoked can be ripped. This is “hack one, hack all” Revocation takes 3-6 months including due process for licensee Revocation only protects discs mastered after the certificate was revoked If a software player certificate is revoked consumers will have to update software players in order to play new discs. If a hardware player certificate is revoked the player is bricked (since CE did not want to support renewability) Makers of commercial ripping software obfuscate the certificates they are using making it very difficult to know which certificate to revoke Some commercial ripping software is SaaS Revocation only works at all until someone figures out how to hack a hardware player When that happens AACS revokes the player certificate, pirate buys a new player, repeat 9/17/2018 Sony Pictures Confidential

What do we learn from AACS? What it means for 4k Legacy HDTVs with only analog outputs were accommodated only because all parties wanted HD discs. “Hack one, hack all” has to be avoided. Compromised certificates came from weak software implementations Revocation does not work: too slow, cannot always tell which certificates to revoke, has an epic fail scenario. Since studios aren’t in a hurry for 4k they are unlikely to accept lower security standards in “legacy” 4k products Content protection needs to be per-title (or even per account) – no more hack one, hack all Third party certification of security implementations Continuous breach monitoring, rapid breach response, proactive breach response. 9/17/2018 Sony Pictures Confidential

Enhanced Content Protection Select a security solution provider with a proven track record Software diversity per title and even per account Decode in Trusted Execution Environment Protected right up to the video buffer HDCP 2.2* required for output Device keys protected by a Hardware Root of Trust Require 3rd party verification of trusted DRM software * HDCP 2.1 until HDCP 2.2 required by HDCP licensing terms 9/17/2018 Sony Pictures Confidential

Sony Pictures Confidential Breach Management Security provider monitors Internet (websites, chat rooms, IRC, etc) for indications of security breaches Security provider works with manufacturers to identify circumventions used by attackers Countermeasures developed and deployed immediately a breach is detected Some new content may prevent playback on certain devices until player is up-to-date “Tracing Traitors” mechanisms to track compromised implementations 9/17/2018 Sony Pictures Confidential

Content Protection Recommendations SPE recommends engaging with an established security solutions provider For example NDS, a Cisco company, has a long history in content security. While NDS does not have a current product that meets the requirements, they have the component technologies. We can socialize the idea with the other studios Avoid the 2-3 years to create a new content protection system Longer if too many companies are involved 9/17/2018 Sony Pictures Confidential