Content Protection Revocation Information Delivery & Processing Brad Hunt Chief Technology Officer Motion Picture Association of America, Inc. Copy Protection.

Slides:



Advertisements
Similar presentations
What is. Digital Certificate It is an identity.
Advertisements

1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Intermediate 2 Computing
DLNA CVP-2 Overview for W3C
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
1 CGMS-A Plus RC Response to CPTWG-ARDG CFI October 22/23, 2003 Multicompany Submission (Matsushita, Mitsubishi, Hitachi, Intel, JVC, Samsung, Thomson,
1 THOMSON multimedia 2001 ©24 May 2001 Copy Protection System for Digital Home Networks CPTWG – May 24, 2001.
A New Extended Copy Control Information (ExCCI) Data Packet by Brad Hunt Chief Technology Officer Motion Picture Association.
T O P I C ST O P I C S Uses of Technical Measures Case Studies and Types of Technical Measures The Problem of Hacking and Circumvention Online Music Distribution.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Content Protection for Recordable Media Florian Pestoni IBM Almaden Research Center.
In the CA I trust. A look at Certification Authorities James E. Shearer CSEP 590 March 8 th 2006.
CONTENT PROTECTION AND DIGITAL RIGHTS MANAGMENT
Analog Reconversion Reference Architecture Proposal presented to the Analog Reconversion Discussion Group March 5, 2003 by Brad Hunt Chief Technology Officer.
HDMI Madhav Achar, Patrick D’Agostino, and Arthur Rajala EECS 373 March 2014 University of Michigan 1.
4K CONTENT PLAN Sony Pictures Technologies. Consumer Offering Broadcast (Over the air, cable, satellite, IPTV) Premium Content (Movies, episodic TV) Premium.
National Smartcard Project Work Package 8 – Security Issues Report.
Key Management Lifecycle. Cryptographic key management encompasses the entire lifecycle of cryptographic keys and other keying material. Basic key management.
DTV Captioning Transitioning from 608 to 708 Gerry Field, Manager DTV Access Project CPB/WGBH National Center for Accessible Media DTV CAPTION SUMMIT March.
CNRI Handle System and its Applications
Advanced Access Content System (AACS) Industry Briefing July 14, 2004.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
An Overview of MPEG-21 Cory McKay. Introduction Built on top of MPEG-4 and MPEG-7 standards Much more than just an audiovisual standard Meant to be a.
Millennium Group Update Millennium Group Update Presentation for Copy Protection Technical Working Group September 20, 2000 Presentation for Copy Protection.
Proposal for Representative Set of Usage Rights Signaling States presented to the Analog Reconversion Discussion Group April 10, 2003 Brad Hunt Chief Technology.
+1 (801) Standards for Registration Practices Statements IGTF Considerations.
Enabling Protected and Premium Broadcast Content in Windows Jay Kapur & Jan Hofmeyr Windows TV Group Microsoft Corporation.
SmartRight™ 1 THOMSON multimedia 2001 ©28 November 2001 Copy Protection System for Digital Home Networks Deployment process CPTWG – November 28, 2001.
HDCP1.4+ Material for Certification 10 August 2012 Sony Corporation 2012/8/10 Sony Confidential 1.
SmartRight™ 1 THOMSON multimedia 2001 ©11 july 2001 Copy Protection System for Digital Home Networks CPTWG – July 11, 2001.
1 Anonymous Trust: Digital Rights Management Using Broadcast Encryption Proceedings of the IEEE, Vol. 92, No. 6, June 2004.
Media Center and OTT. 10 years ago Now Offerings Spectrum: PPV, Pay TV, Basic cable, Free to air IP: VOD, SVOD, FVOD, AVOD Windows: early window, home.
March 27, 2006TAGPMA - Rio de Janeiro1 Short Lived Credential Services Profile Tony J. Genovese The Americas Grid PMA DOEGridsATF/ESnet/LBNL.
F1 Cross-Company Call Follow Up Process Flow against Security Breach on F1 Phase 1 6.iii.2013 Sony Confidential.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
2003/10/231 Proposal for ARDG 2003/10/22 Kenwood Corporation.
April 14, 2005 Status Report of ATSC TSG (T3) Ad Hoc Group on SRMs Scope: “To develop a set of requirements and a work statement for developing a recommended.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Slide 1 SONY PICTURES ENTERTAINMENT CONFIDENTIAL Security requirements for early window consumer services Spencer Stephens and Tim Wright Version 0.1 SONY.
DIGITAL SIGNATURE.
Timothy Putprush Baltimore, MD September 30, 2009 Federal Emergency Management Agency (FEMA) Integrated Public Alert and Warning System Presentation to.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
By: Rosalyn Martinez. The Copyright Act of 1976 is a United States legislative statute that protects the rights of copyright holders. It was enacted on.
Extended Content Control Information (ExCCI) Packet — The Studio Side of DRM Hollywood Post Alliance 11 th Technology Retreat – Rancho Mirage, CA January.
Electronic Signatures CTO Workshop January 6, 2005 System Computing Services.
November 28, 2001 CPTWG Protecting Against Unauthorized Redistribution of Digital Broadcast Content Presentation to the CPTWG Intel, Hitachi, Matsushita,
April 20023CSG11 Electronic Commerce Authentication John Wordsworth Department of Computer Science The University of Reading Room.
Mar RTLAB KNU1 DTCP (Digital Transmission Content Protection) Real Time Systems Lab. KNU Myung Jin, Lee Hitachi, Ltd. Intel Corporation MEI (Matsushita.
PKI Services for CYPRUS STOCK EXCHANGE Kostas Nousias.
Content Protection: Extending content protection into the home and personal environment TODAY Jeff Lawrence Director, Global Content Policy Intel Corporation.
IP Video & Digital Signage Solutions Partner Training Encoder V2.6 and HDCP Professional, Q4 16.
Media Center and OTT.
Technical Report PKI for
CPB/WGBH National Center for Accessible Media
Use Cases and Requirements
4k Content Delivery Sony Pictures Technologies.
Content protection for 4k
Digital Transmission Content Protection (DTCP)
Draft ETSI TS Annex C Presented by Michał Tabor for PSD2 Workshop
Technical Report PKI for
Role of Metadata in Census Data Dissemination
Presentation transcript:

Content Protection Revocation Information Delivery & Processing Brad Hunt Chief Technology Officer Motion Picture Association of America, Inc. Copy Protection Technical Working Group Meeting September 1, 2004

Content Protection Device Key Revocation Definition - “The capability of a licensed content protection technology to provide a means to revoke the digital keys associated with one or more devices’ ability to authenticate and gain access to content protected using the licensed technology.”

Importance of Content Protection Revocation The continuing effectiveness of a content protection technology greatly relies on device key revocation.The continuing effectiveness of a content protection technology greatly relies on device key revocation. Some CP technologies (e.g. HDCP) do not store Revocation Lists and must rely on real-time delivery and downstream conveyance of SRMs.Some CP technologies (e.g. HDCP) do not store Revocation Lists and must rely on real-time delivery and downstream conveyance of SRMs. Dissemination of up-to-date revocation information (System Renewability Messages) depends on SRM delivery with new content.Dissemination of up-to-date revocation information (System Renewability Messages) depends on SRM delivery with new content. Lost, stolen, and cloned device keys can be used to produce non-compliant devices that ignore compliance rules.Lost, stolen, and cloned device keys can be used to produce non-compliant devices that ignore compliance rules. Device key revocation can be used to disable these non- licensed devices’ ability to gain access to protected content.Device key revocation can be used to disable these non- licensed devices’ ability to gain access to protected content.

Digital Cable Plug and Play Receiver Content Protection Revocation Digital Cable Receiver QAM Tuner/ Demod DTCP MPEG-2 TSP HDCP HDCP.SRM Process DTCP.SRM HDCP.SRM CA- Encrypted Digital Cable with DTCP.SRM HDCP.SRM IEEE 1394 HDMI DTCP.SRM HDCP.SRM MPEG2 SPTS CableCard DTCP.SRM Process DTCP 4C CPRM Recorder 4C CPRM DVD-RW HDCP HDCP.SRM Process Record Copy DTCP.SRM HDMI DTCP.SRM HDCP.SRM IEEE 1394 Play Copy Play Copy MPEG2 SPTS DTCP DTCP.SRM HDCP.SRM 4C CPRM Recorder 4C CPRM DVD-RW HDCP HDCP.SRM Process HDCP.SRM DTCP.SRM HDMI Record Copy IEEE 1394 Play Copy Play Copy MPEG2 SPTS

Proposal for Revocation Information Carriage The MPEG-2 Registration Descriptor would be used to specify the identity of the Private Section revocation data using the format_identifier.The MPEG-2 Registration Descriptor would be used to specify the identity of the Private Section revocation data using the format_identifier. The necessary standards are in place to do this today.The necessary standards are in place to do this today. Content protection licensors obtain from the Registration Authority (SMPTE) a unique format_identifier to use in identifying their revocation information private data.Content protection licensors obtain from the Registration Authority (SMPTE) a unique format_identifier to use in identifying their revocation information private data. Content protection revocation information would be carried in the MPEG-2 Transport Stream as private data in a long form Private Section belonging to a Private Table.Content protection revocation information would be carried in the MPEG-2 Transport Stream as private data in a long form Private Section belonging to a Private Table. The MPAA has asked the ATSC to undertake the documentation of a Recommended Practice once agreement on a common format for identification and carriage is reached.The MPAA has asked the ATSC to undertake the documentation of a Recommended Practice once agreement on a common format for identification and carriage is reached.