4K Content protection overview

Slides:



Advertisements
Similar presentations
CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
Advertisements

Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
S. Contents INTRODUCTION WHAT IS CHROME OS ? CHROME OS INSTALLATION CHROME OS SECURITY CHROME OS FAST BOOT TRADITIONAL VS CHROME OS SOFTWARE ARCHITECTURE.
© 2000 Verance Corporation Verance Audio Watermarking Technologies for Protection of Digital Audio and Video Joseph M. Winograd, Ph.D. Verance Corporation.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
CONTENT PROTECTION AND DIGITAL RIGHTS MANAGMENT
4K CONTENT PLAN Sony Pictures Technologies. The 4k Consumer Value 4k has to offer all of these features: – Higher resolution – Richer colors (wider color.
Software Design Division 秘 CONFIDENTIAL Panther Content Security Mar. 14, 2014 Sony Corporation.
Analog Reconversion Reference Architecture Proposal presented to the Analog Reconversion Discussion Group March 5, 2003 by Brad Hunt Chief Technology Officer.
4K CONTENT PLAN Sony Pictures Technologies. Consumer Offering Broadcast (Over the air, cable, satellite, IPTV) Premium Content (Movies, episodic TV) Premium.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
Cloud Control Senior Project Summer Overview Cloud Control is a platform to control data transmission to/from internet connected devices from the.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Mac OS Lion Memory Forensics Using IEEE 1394 to Bypass FileVault 2 Full Volume Encryption. Todd Garrison September 18, 2011.
Donald M. Whiteside Vice President, Corporate Technology Group Director, Technical Policy and Standards ITU and EBU Presentation A perspective on trends.
Watermarking Video Content What is video watermarking? November 2010 Rajaram Pejaver Note: The views presented here are solely those of.
ENHANCED CONTENT PROTECTION OVERVIEW. Security Solution Characteristics Comprehensive security ecosystem All devices meet the same standard – No assumption.
4K. Contents Context Online required? UltraViolet connection.
Protecting Data on Smartphones and Tablets from Memory Attacks
Trusted Computing Or How I Learned to Stop Worrying and Love the MPAA.
HDCP1.4+ Material for Certification 10 August 2012 Sony Corporation 2012/8/10 Sony Confidential 1.
F1 Cross-Company Call Follow Up Process Flow against Security Breach on F1 Phase 1 6.iii.2013 Sony Confidential.
DRM: Technology overview Keunwoo Lee CSE 590 SO 19 April 2005.
Operating Systems Security 1. The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as booting or.
Sony Pictures Confidential Watermarking in AACS. Sony Pictures Confidential SPE Forensic Watermarking Goals Goals: – Identify the device that was compromised.
F1 BOX/SECURITY/SERVER SYSTEM SPTECH FEEDBACK(DRAFT2) 12012/9/21Sony/SPTech Confidential.
Towards a Software Architecture for DRM Joint work with Kristof Verslype, Wouter Joosen, and Bart De Decker DistriNet research.
Security of Broadcast Networks 1. Overview r Broadcast networks are used mostly for TV r Historical development r Commercial models r One-way or Two-way.
  Computer Fundamentals Training   Windows 8 Intermediate.
TV Broadcasting What to look for Architecture TV Broadcasting Solution
Security of Digital Signatures
LAS16-203: Platform Security Architecture for embedded devices
WELCOME Mobile Applications Testing
Building a Trustworthy Computer
Trusted Computing and the Trusted Platform Module
SPE Expectations Leverage existing delivery technologies
4k Content Delivery Sony Pictures Technologies.
Roku Com Link Call (Toll- Free) Visit Our Website
MOBILE DEVICE OPERATING SYSTEM
Sony Pictures Technologies
Facing Problem with Hulu on Android and iPhone Device? (Check Here)
Content protection for 4k
4k Theoretical Discussion
Today’s Risk. Today’s Solutions. Cyber security and
4k Discussion Sony Pictures.
4k Theoretical Discussion
4k Theoretical Discussion
4k Theoretical Discussion
How to allow USB Flash Drive Scan in Avast Antivirus.
Kind of evidence gathered by agents
4k Discussion Sony Pictures.
Product Overview.
4K Content protection overview
Unit 1: Introduction to Operating System
4K Content protection overview
We secure the communication
Securing Android Apps using Trusted Execution Environment (TEE) - 07/08/14 Presented by: Mike Hendrick VP Product Sequitur Labs.
Encryption and Digital Rights Management
TPM, UEFI, Trusted Boot, Secure Boot
Erica Burch Jesse Forrest
MyLion Registration Website | Mobile device
Breach Monitoring and Response
Presentation transcript:

4K Content protection overview Sony Pictures Technologies June 19th, 2012 12/7/2018

Introduction 4k is a new opportunity for Sony, Consumers and Content Providers 4k is a “green field”, there are no legacy 4k devices in the hands of consumers The Studios will set a high bar for 4k content protection 12/7/2018

Security Solution Characteristics Comprehensive security ecosystem All devices meet the same standard No assumption that any particular class of devices is more difficult to hack “Hack once, hack all” is not possible Breach limited to a single title Breach response is rapid Within days Security solution provider has a proven track record Similar idea of per title diversity as BD+ but very different approach BD+ is not effective

High-Level Model of Video Path 12/7/2018

Decryption / Decoding Threats Mitigations Attacker extracts Device Key Attacker extracts Content Key Attacker captures decrypted compressed content Attacker captures decrypted uncompressed content Mitigations Software diversity per title Decode in Trusted Execution Environment Device keys protected by a Hardware Root of Trust Require 3rd party verification of trusted DRM software 12/7/2018

Framebuffer Threats Mitigations Attacker captures raw frames from framebuffer E.g. Screen scraping Mitigations Use protected framebuffer (e.g. TrustZone) Use secured links to video hardware (e.g. Nvidia) 12/7/2018

HDCP Source Threats Mitigations Attacker captures raw frames from hacked driver Attacker captures raw frames from hacked video hardware Mitigations Require HDCP 2.1 for source devices and repeaters HDCP 2.x increases security and robustness Never send unencrypted frame data to video drivers/hardware Only send frame data to protected video hardware on SoC (e.g. TrustZone) Require 3rd party verification of trusted hardware 12/7/2018

HDCP Sink Threats Mitigations Attacker captures video from HDMI to screen driver interface Attacker uses HDCP stripper with valid HDCP 1.x Device Keys Since attackers can generate valid HDCP 1.x device keys revocation is ineffective Mitigations Require HDCP 2.0 or higher for sink devices HDCP source only transmits 4k content to HDCP 2.x devices 12/7/2018

Screen Threats Threats Mitigations Attacker captures video from screen using camera Mitigations Security solution inserts forensic watermark that can be used to identify user account and playback device 12/7/2018

Breach Management Security provider monitors Internet (websites, chat rooms, IRC, etc) for indications of security breaches Security provider works with manufacturers to identify circumventions used by attackers Countermeasures developed and deployed immediately a breach is detected Some new content may prevent playback on certain devices until firmware is up-to-date 12/7/2018

Example of Renewability on Android/ARM Video player app (which includes content protection) is renewed by security provider as part of content licensing Video player app verifies that OS and TrustZone have not been hacked If OS or TrustZone have been hacked video app will not play content but will alert consumer that device needs to be updated. Device maker has the option of renewing OS and Trustzone components or leaving consumer with a device that won’t play content 12/7/2018

Example: NDS Security Solutions Function NDS Solution Platforms Android IOS Win 8 MacOS PS3 XBox CE (TV, Blu-ray) Software diversity Moving target technology ✔ Trusted Execution Environment TZ Intel, AMD Custom in SoC Hardware Root of Trust ? Secure boot, root/jailbreak detect Code hardening Watermark insertion [what is their watermark technology called?] Breach monitoring & response

Security Management 12/7/2018