A Content Protection Scheme Using MPEG-21 Concepts and Tools Chia-Hsien Lu Feng-Cheng Chang Hsueh-Ming Hang Dept. Electronics Engineering National Chiao.

Slides:



Advertisements
Similar presentations
ContentGuard An Intellectual Property Company IPED Conference November 1, 2007 Presented By Eddie Chen CONTENTGUARD.
Advertisements

Software Bundle ViPNet Secure Remote Access Arrangement using ViPNet Mobile © Infotecs.
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
AUTHENTICATION AND KEY DISTRIBUTION
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
Lecture 23 Internet Authentication Applications
Authentication & Kerberos
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
“...creating knowledge.” Enabling Digital Content Protection on Super-Distribution Models - Carlos Serrão ISCTE – Intituto Superior.
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Java Security Model Lab#1 I. Omaima Al-Matrafi. Safety features built into the JVM Type-safe reference casting Structured memory access (no pointer arithmetic)
LAB#2 JAVA SECURITY OVERVIEW Prepared by: I.Raniah Alghamdi.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
1 MPEG-21 : Goals and Achievements Ian Burnett, Rik Van de Walle, Keith Hill, Jan Bormans and Fernando Pereira IEEE Multimedia, October-November 2003.
Jau-Wu Huang1 Digital Rights Management for Visual Content in Mobile Applications Trimeche, M.; Chebil, F.; Nokia Research Center Control, Communications.
Securing Web Services Using Semantic Web Technologies Brian Shields PhD Candidate, Department of Information Technology, National University of Ireland,
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
MPEG-21 Multimedia Framework: Status and Directions January 8, 2003 John R. Smith Pervasive Media Management Group IBM T. J. Watson Research Center 19.
Web services security I
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
1 Authentication Protocols Celia Li Computer Science and Engineering York University.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Chapter 3 Mohammad Fozlul Haque Bhuiyan Assistant Professor CITI Jahangirnagar University.
1 Functional reference model for Digital Rights Management Systems Vural Ünlü / Prof. Dr. Thomas Hess Munich School of Management Berlin, 5. September2004.
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
©Copyrights 2011 Eom, Hyeonsang All Rights Reserved Distributed Information Processing 20 th Lecture Eom, Hyeonsang ( 엄현상 ) Department of Computer Science.
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
DRM Building Blocks - Protecting and Tracking Content Adopted from Chapter 5, Digital Rights Management Business and Technology.
MPEG-21 : Overview MUMT 611 Doug Van Nort. Introduction Rather than audiovisual content, purpose is set of standards to deliver multimedia in secure environment.
WS-Security: SOAP Message Security Web-enhanced Information Management (WHIM) Justin R. Wang Professor Kaiser.
Rights Expression Languages in Digital Rights Management Xin Wang ContentGuard, Inc. October 19, 2006.
Cryptography, Authentication and Digital Signatures
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
Module 9: Fundamentals of Securing Network Communication.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Key Mangement Marjan Causevski Sanja Zakovska. Contents Introduction Key Management Improving Key Management End-To-End Scheme Vspace Scheme Conclusion.
DSKPP And PSKC: IETF Standard Protocol And Payload For Symmetric Key Provisioning Philip Hoyer Senior Architect – CTO Office.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Slide 1 © 2004 Reactivity The Gap Between Reliability and Security Eric Gravengaard Reactivity.
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
CHAPTER 5: MULTIMEDIA DATABASE MANAGEMENT SYSTEM ARCHITECTURE TOPIC : 5.1 DISTRIBUTED MULTIMEDIA DATABASE MANAGEMENT SYSTEM ARCHITECTURE GROUP MEMBERS:
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
MPEG 21 – An Overview MUMT 611 Elliot Sinyor January 2005.
Network Security Lecture 27 Presented by: Dr. Munam Ali Shah.
A Trusted Key Management Scheme for Digital Rights Management ETRI Journal, Volume 27, Number 1,February 2005 Yeonjeong Jeong, Kisiong Yoon, and Jaecheol.
DIGITAL SIGNATURE.
Task Force CoRD Meeting / XML Security for Statistical Data Exchange Gregory Farmakis Agilis SA.
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
Privacy and Security Topics From Greenlaw/Hepp, In-line/On-line: Fundamentals of the Internet and the World Wide Web 1 Introduction Known Information Software.
Key Management and Distribution Anand Seetharam CST 312.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
© 2015 Digital Rights Management in a 3G Mobile Phone and Beyond Thomas S.Messerges, Ezzat A. Dabbish ILKOO LEE.
The Secure Sockets Layer (SSL) Protocol
The Secure Sockets Layer (SSL) Protocol
MUMT611: Music Information Acquisition, Preservation, and Retrieval
Key Distribution Reference: Pfleeger, Charles P., Security in Computing, 2nd Edition, Prentice Hall, /18/2019 Ref: Pfleeger96, Ch.4.
Electronic Payment Security Technologies
Presentation transcript:

A Content Protection Scheme Using MPEG-21 Concepts and Tools Chia-Hsien Lu Feng-Cheng Chang Hsueh-Ming Hang Dept. Electronics Engineering National Chiao Tung University Hsinchu, Taiwan, R.O.C.

C.-H. Lu, F.-C. Chang, H.-M. HangCommLab EE NCTU 2 Outline Goals Goals Overview Overview Design and Implementation Design and Implementation Application Example Application Example Conclusions Conclusions Demonstration Demonstration

C.-H. Lu, F.-C. Chang, H.-M. HangCommLab EE NCTU 3 Goals A DRM System A DRM System Integrate concepts of Integrate concepts of MPEG-21 IPMP MPEG-21 IPMP MPEG-21 REL MPEG-21 REL Implement using Implement using MPEG-4 IPMPX MPEG-4 IPMPX MPEG-21 Test Bed MPEG-21 Test Bed

C.-H. Lu, F.-C. Chang, H.-M. HangCommLab EE NCTU 4 Fundamental Concepts MPEG-21 MPEG-21 Digital Item (DI) Digital Item (DI) Part 2 Part 2 Digital Item Declaration (DID) Digital Item Declaration (DID) Digital Item Declaration Language (DIDL) Digital Item Declaration Language (DIDL) Part 4 Part 4 Intellectual Property Management and Protection (IPMP) Intellectual Property Management and Protection (IPMP) IPMP DIDL IPMP DIDL Part 5 Part 5 Rights Expression Language (REL) Rights Expression Language (REL)

C.-H. Lu, F.-C. Chang, H.-M. HangCommLab EE NCTU 5 MPEG-21 Part-4 IPMP Goals of MPEG-21 IPMP: Goals of MPEG-21 IPMP: Effective protection and management on DIs Effective protection and management on DIs Protect a specific part of the DI by encapsulating it in IPMP DIDL Protect a specific part of the DI by encapsulating it in IPMP DIDL Element interchangeability: Element interchangeability: DIDL IPMP DIDL … …

C.-H. Lu, F.-C. Chang, H.-M. HangCommLab EE NCTU 6 MPEG-21 Part-5 REL An XML-based rights expression language An XML-based rights expression language Declare an authorized distribution for the use of any resource owned by specific users Declare an authorized distribution for the use of any resource owned by specific users Characteristics: Characteristics: Comprehensive Data Model Comprehensive Data Model Precise Authorization Model Precise Authorization Model Extensible Extension and flexible Profiling Extensible Extension and flexible Profiling

C.-H. Lu, F.-C. Chang, H.-M. HangCommLab EE NCTU 7 REL License General semantics of a license: General semantics of a license: An identified principal has specific rights for exercising those resources under the terms and conditions. An identified principal has specific rights for exercising those resources under the terms and conditions. license grant John play wifi_audio.aac during June 2006 issuer Music Station

C.-H. Lu, F.-C. Chang, H.-M. HangCommLab EE NCTU 8 MPEG-4 IPMPX Tool Manager Terminal IPMP Tool IPMP Filter (Control Point)

C.-H. Lu, F.-C. Chang, H.-M. HangCommLab EE NCTU 9 MPEG-21 Test Bed Control Channel Data Channel Control Point Control Point

Design and Implementation

C.-H. Lu, F.-C. Chang, H.-M. HangCommLab EE NCTU 11 IPMP_Info_Engine An IPMPX Tool An IPMPX Tool Perform functionalities of MPEG-21 IPMP and REL Perform functionalities of MPEG-21 IPMP and REL Parse_IPMPDIDL() Parse_IPMPDIDL() Parse an IPMP DIDL element Parse an IPMP DIDL element REL_authorize() REL_authorize() Extend REL reference software (ContentGuard) Extend REL reference software (ContentGuard) Perform rights authorization and generate an authorization proof Perform rights authorization and generate an authorization proof

C.-H. Lu, F.-C. Chang, H.-M. HangCommLab EE NCTU 12 Example Scenario Each IPMP Tool can send requests to the IPMP_Info_Engine Tool for the right to process data through IPMP Message Each IPMP Tool can send requests to the IPMP_Info_Engine Tool for the right to process data through IPMP Message DES Tool IPMP_Info_Engine Tool 1. Send an message for request the right to decrypt. 2. Perform REL verification 3. Send an message with the result of verification

C.-H. Lu, F.-C. Chang, H.-M. HangCommLab EE NCTU 13 Content Protection Mechanism Layer 1: Content is protected with symmetric encryption algorithm. Layer 1: Content is protected with symmetric encryption algorithm. Layer 2: Content encryption keys are protected with asymmetric encryption algorithm. Layer 2: Content encryption keys are protected with asymmetric encryption algorithm. (Encryption) DES Tool (Decryption) DES Tool Key Server Layer 1 Layer 2 RequestSetup Ask for keys Verify Encrypted Content Server Client

C.-H. Lu, F.-C. Chang, H.-M. HangCommLab EE NCTU 14 Key Server Function of a Key server Function of a Key server Manage keys Manage keys Client authentication and authorization Client authentication and authorization Encrypt keys with client ’ s public keys Encrypt keys with client ’ s public keys Implementation of a Key server Implementation of a Key server A local web server A local web server

C.-H. Lu, F.-C. Chang, H.-M. HangCommLab EE NCTU 15 Example: Super-distribution Manage the user ’ s right in a distributed mobile environment. Manage the user ’ s right in a distributed mobile environment. Example of OMA DRM v2.0 Example of OMA DRM v2.0

C.-H. Lu, F.-C. Chang, H.-M. HangCommLab EE NCTU 16 License Verification Online verification Online verification Remote server verifies the client. Remote server verifies the client. Offline verification Offline verification Online verification is more secure than offline verification. Online verification is more secure than offline verification. Use an online certificate to represent if a successful online verification already exists. Use an online certificate to represent if a successful online verification already exists.

C.-H. Lu, F.-C. Chang, H.-M. HangCommLab EE NCTU 17 License structure License Grant 1 (online) 3 Grant 2 (offline)

C.-H. Lu, F.-C. Chang, H.-M. HangCommLab EE NCTU 18 Authorization Flow False Online? True Interval valid? True Count valid? False True Grant 1 (Online) Grant 2 (Offline) Offline? False TrueFalse Interval valid? False True

C.-H. Lu, F.-C. Chang, H.-M. HangCommLab EE NCTU 19 Conclusions We construct a DRM system implemented using MPEG-21 IPMP and REL We construct a DRM system implemented using MPEG-21 IPMP and REL Two specifications are included: Two specifications are included: Content protection Content protection Rights Management Rights Management A two-layer content protection scheme is proposed for delivering both content and key securely A two-layer content protection scheme is proposed for delivering both content and key securely Develop one application example Develop one application example

C.-H. Lu, F.-C. Chang, H.-M. HangCommLab EE NCTU 20 Demonstration Offline play without a certificate  Failure Offline play without a certificate  Failure Online play  Success Online play  Success Offline playback three times  Success Offline playback three times  Success Fail to continue offline playback (counts are limited to three times)  Failure Fail to continue offline playback (counts are limited to three times)  Failure