Compliance and Robustness Rules for Windows Media DRM Implementations Microsoft Corporation.

Slides:



Advertisements
Similar presentations
1 Digital Media Distribution Channels ©OverDrive, Inc DRM Challenges in Digital Media Distribution Channels Steve Potash May.
Advertisements

Web Security for Network and System Administrators1 Chapter 1 Introduction to Information Security.
Module 13: Performance Tuning. Overview Performance tuning methodologies Instance level Database level Application level Overview of tools and techniques.
Cloakware Corporation, 260 Hearst Way, Suite 311, Kanata, Ontario, Canada K2L 3H1 Spencer Cheng Trusting DRM Software Presentation.
Building Secure, DRM-Enabled Devices Avni Rambhia Program Manager John C. Simmons Program Manager Strategic Relations & Policy Windows Client Division.
Tamper Resistant Software An Implementation By David Aucsmith, IAL “This paper describes a technology for the construction of tamper resistant software.”
Chapter 10 Securing Windows Server 2008 MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration.
Essential Introduction to Computers
COMPUTER SYSTEM CAN BE DIVIDED INTO : 1- General Computer 2- Special Computer.
Computer components IT skills: none IT concepts: computer components (input devices, output devices, memory, storage and CPU), information flow between.
Multi-PC, Networked, Broadband Households US: 19.2 M, Globally: 40+ M and growing Source: Microsoft Primary Research CountryHouseholds (millions) Broadband.
Copyright © 2012 Pearson Education, Inc. Chapter 1: Introduction to Computers and Programming.
Computer Hardware.
Computer Basics Flashcards #2
OPERATING SYSTEMS AND SYSTEMS SOFTWARE. SYSTEMS SOFTWARE Systems software consists of the programs that control the operations of the computer and its.
Windows Media DRM Device Porting Kit Review Scott Plette Program Manager Media Technology Group microsoft.com Microsoft Corporation.
Instructions Slides 3,4,5 are general questions that you should be able to answer. Use slides 6-27 to answer the questions. Write your answers in a separate.
Windows Media DRM Device Ecosystem For Windows Vista Milan Gada – Program Manager Kevin Lau – Program Manager Windows Media (Content Access Technologies)
JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
CS102 Introduction to Computer Programming
Chapter Introduction to Computers and Programming 1.
CPU The CPU is a microchip that is installed on a motherboard and acts as the computer’s brain - performing calculations and coordinating the hardware.
Internal components, Backing Storage, Operating Systems Software
Computer Basics. What is a Computer? “A computer is an electronic device, operating under the control of instructions stored in its own memory, than can.
1 Computer Literacy James P. Sampson, Jr. Florida State University Copyright 2001 by James P. Sampson, Jr. All Rights Reserved.
Not only Safe but Competitive Presentation to Copy Protection Technical Working Group October 22, 2003 Far East Engineering Corp, Tokyo Japan Makoto Saito/Rie.
Security Threats Connecting Computers Copyright Law & Ethics Storage & Memory Computer System
An Overview of Using Computers
Chapter 1: Introduction to Computers and Programming.
Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 1: Introduction to Computers and Programming.
Copyright (c) 2004 Prentice Hall. All rights reserved. 1 Committed to Shaping the Next Generation of IT Experts. Go! Computer Concepts.
Trusted Computing Or How I Learned to Stop Worrying and Love the MPAA.
Blancco – Data Erasure Management
Module 5: Designing a Terminal Services Infrastructure.
Section 2 Section 2.1 Identify hardware Describe processing components Compare and contrast input and output devices Compare and contrast storage devices.
Component 6 - Health Management Information Systems Unit 2-1a - Hardware and Software Supporting Health Information Systems.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Confidential. For use within only Slide 1 iOS and Android content protection requirements Version 0.2 Sony Pictures Entertainment Tim Wright.
Upload, Process, and Deliver Digital Media Assets from Everywhere and at Any Time with Reelway and the Microsoft Azure Cloud MICROSOFT ISV PROFILE: REELWAY.
5 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Computers Are Your Future Chapter 1 Slide 1 Introduction to the Computers & Internet Chapter 1 Concepts of Information Technology IT.
Sony Pictures Confidential Watermarking in AACS. Sony Pictures Confidential SPE Forensic Watermarking Goals Goals: – Identify the device that was compromised.
Introduction to Information Security
Understand the Components of a Network Mrs. Whaley.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls.
Click once to reveal the definition. Think of the answer. Then click to see if you were correct. HARDWARE Physical parts of the computer.
A.Abhari CPS1251 Topic 1: Introduction to Computers Computer Hardware Computer components Connecting Computers Computer Software Operating System (OS)
Health Management Information Systems Unit 2 Hardware and Software Supporting Health Information Systems Component 6/Unit21 Health IT Workforce Curriculum.
MICROSOFT ONENOTE ADVANCED MODULE 1 EXPLORE ONENOTE 2010  Navigate in the OneNote program window  Work in the OneNote program window  Explore.
FILE MANAGEMENT Computer Basics 1.3. FILE EXTENSIONS.txt.pdf.jpg.bmp.png.zip.wav.mp3.doc.docx.xls.xlsx.ppt.pptx.accdb.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Bring Your Own Security (BYOS™): Deploy Applications in a Manageable Java Container with Waratek Locker on Microsoft Azure MICROSOFT AZURE ISV PROFILE:
SLO Assessment Review Section 1. Differentiate between an output device and an input device. Input: any device that allows a user to enter data into a.
Copyright © 2010 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 1: Introduction to Computers and Programming.
Snip2Code: Search, Share and Collect Code Snippets Faster, Easier, Efficiently with Power of Microsoft Azure Platform MICROSOFT AZURE ISV PROFILE: SNIP2CODE.
Essential Introduction to Computers
Vidcoding Introduces Scalable Video and TV Encoding in the Cloud at an Affordable Price by Utilizing the Processing Power of Azure Batch MICROSOFT AZURE.
COMPUTERS IN THE LEARNING ENVIRONMENT
Computer Basics Section 2.1 YOU WILL LEARN TO… Identify hardware
practice-questions.html If you Are Thinking about your dumps? Introduction:
SVTRAININGS. SVTRAININGS Features of SCCM  Application management  Provides a set of tools and resources that can help you create, manage, deploy, and.
Replace with Application Image
PREPARED BY: RUMMY MIRANDA
Data Security for Microsoft Azure
Media365 Portal by Ctrl365 is Powered by Azure and Enables Easy and Seamless Dissemination of Video for Enhanced B2C and B2B Communication MICROSOFT AZURE.
Modular Object Scanning Technology (MOST)
Computer components is a programmable machine that receives input, stores and manipulates data, and provides output in a useful format. Computer The computer.
Presentation transcript:

Compliance and Robustness Rules for Windows Media DRM Implementations Microsoft Corporation

Copyright 2004 by Microsoft Corporation 2 Definitions Compliance Rules specify the required behaviors of the Windows Media DRM implementation and any applications accessing the implementation Compliance Rules include definitions of specific WMDRM license rights Compliance Rules include WMDRM device requirements Robustness Rules specify the Windows Media DRM assets and different levels of robustness required to protect each asset type

Copyright 2004 by Microsoft Corporation 3 Compliance Rules Scope Outputs DRM Stores Keys, Certificates Final Product Platform Application Platform implements Windows Media DRM Application accesses and/or passes Windows Media DRM- protected content Decrypted Content Decoded Content

Copyright 2004 by Microsoft Corporation 4 Anatomy of Robustness Rules Section 1: Construction Section 2: Accessibility of Content Section 3: Methods to Make a Robust Implementation Section 3.1: SoftwareSection 3.2: HardwareSection 3.3: Hybrids Section 4: Robustness Levels Section 3.x.1 Secure by ConstructionSection 3.x.2 Robust to Tampering

Copyright 2004 by Microsoft Corporation 5 Assets and Security Levels Immune to Widely Available Tools Immune to Widely Available Tools Resistant to Specialized Tools Resistant to Specialized Tools Level 1 Assets Level 2 Assets Level 3 Assets Widely Available Tools general purpose, easy to use: screwdrivers, clips, file editors, etc. general purpose, easy to use: screwdrivers, clips, file editors, etc. Specialized Tools reasonable price; some skill required: debuggers, reasonable price; some skill required: debuggers, memory scanners, etc. Professional Tools high price; high price; professional use ICE, logic analyzers professional use ICE, logic analyzers Immune to Widely Available & Specialized Tools Immune to Widely Available & Specialized Tools Resistant to Widely Available & Specialized Tools Resistant to Widely Available & Specialized Tools Device Key Content Key Profiling data

Copyright 2004 by Microsoft Corporation 6 HARD DRIVE Bus Monitor Device Asset Threat Surface And Robustness Rules CPU FLASH ROM SDRAM Obfuscated Device Key Obfuscation Components Crash File Paged Memory ICE, JTAG, ETM, OCD Memory Scanner, Debugger File Editor Professional Tools Widely Available Tools Specialized Tools Device Key

Copyright 2004 by Microsoft Corporation 7 Producing a Robust Solution Understand the Robustness Rules Secured assets on your device Protected content and user accessible bus Widely available, specialized & professional tools Threat model your design For each asset-tool pair, define attack path Evaluate how easily this attack would be done Compare Results to Robustness Rules Does your design meet the minimum standard?

Appendix

Copyright 2004 by Microsoft Corporation 9 WM DRM Content Distribution WM DRM for Portable Devices WM Format SDK WM DRM for Network Devices Distribution Authorization Protected Content WM Rights Manager Content Server