RMP Specification SP005-1 TV-Anytime Rights Management and Protection Information for Broadcast Applications TV Anytime IDE, September 20, 2004, Sony in.

Slides:



Advertisements
Similar presentations
Design by Contract.
Advertisements

TVAF - RMP Kobe Meeting November 2003 Final Plenary.
Software Requirements
A New Extended Copy Control Information (ExCCI) Data Packet by Brad Hunt Chief Technology Officer Motion Picture Association.
5.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Chapter 5: CPU Scheduling.
Persistent identifiers – an Overview Juha Hakala The National Library of Finland
Geolocation databases for spectrum sharing : ECC findings and studies EC DG CONNECT Workshop, 20 March 2015 Bruno Espinosa, Deputy Director, ECO.
Systems Engineering in a System of Systems Context
Mark Evans, Tessella Digital Preservation Boot Camp – PASIG meeting, Washington DC, 22 nd May 2013 PREMIS Practical Strategies For Preservation Metadata.
A Credential Based Approach to Managing Exceptions in Digital Rights Management Systems Jean-Henry Morin University of Geneva – CUI.
1 MPEG-21 : Goals and Achievements Ian Burnett, Rik Van de Walle, Keith Hill, Jan Bormans and Fernando Pereira IEEE Multimedia, October-November 2003.
1 CS 426 Senior Projects Chapter 9: Relationships Chapter 10: Inheritance and Polymorphism [Arlow and Neustadt, 2002] February 27, 2007.
Software Requirements
ISO 9001 Interpretation : Exclusions
Enterprise Privacy Promises and Enforcement Adam Barth John C. Mitchell.
CONTENT PROTECTION AND DIGITAL RIGHTS MANAGMENT
System Design/Implementation and Support for Build 2 PDS Management Council Face-to-Face Mountain View, CA Nov 30 - Dec 1, 2011 Sean Hardman.
ADVANCED MICROSOFT ACTIVE DIRECTORY CONCEPTS
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
Chapter 7 Data Modeling with Entity Relationship Diagrams Database Principles: Fundamentals of Design, Implementation, and Management Tenth Edition.
Chapter 6: Integrity and Security Thomas Nikl 19 October, 2004 CS157B.
The Audit Process Tahera Chaudry March Clinical audit A quality improvement process that seeks to improve patient care and outcomes through systematic.
TELEVISION WITHOUT FRONTIERS DIRECTIVE Purpose and importance of qualitative & quantitative rules Warsaw, 8 December 2005 Frédéric Bokobza European and.
Profiling Metadata Specifications David Massart, EUN Budapest, Hungary – Nov. 2, 2009.
An Overview of MPEG-21 Cory McKay. Introduction Built on top of MPEG-4 and MPEG-7 standards Much more than just an audiovisual standard Meant to be a.
Chapter 9 Integrity. Copyright © 2004 Pearson Addison-Wesley. All rights reserved.9-2 Topics in this Chapter Predicates and Propositions Internal vs.
Chapter 4 Requirements engineering Chapter 4 – Requirements Engineering Lecture 1 1.
2-Oct-15 Bojan Orlic, TU/e Informatica, System Architecture and Networking 12-Oct-151 Homework assignment 1 feedback Bojan Orlic Architecture.
The Data Grid: Towards an Architecture for the Distributed Management and Analysis of Large Scientific Dataset Caitlin Minteer & Kelly Clynes.
Rights Expression Languages in Digital Rights Management Xin Wang ContentGuard, Inc. October 19, 2006.
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by.
Coming up: Software Engineering: A Practitioner’s Approach, 6/e Chapter 5 Practice: A Generic View copyright © 1996, 2001, 2005 R.S. Pressman & Associates,
Mobile Communication The SMS implies of several additional elements in the network architecture There is also another Element called.
17 March 2008 © 2008 The University of Edinburgh, European Microsoft Innovation Center and University of Southampton IT Innovation Centre 1 NextGRID Security.
sec1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: TGa_Proposal_Antonio_Izquierdo (Protecting the Information Service.
Information Security - City College1 Access Control in Collaborative Systems Authors: Emis Simo David Naco.
SDL as an Object Oriented Language Lecture 6 Huma Ayub Software Engineering Department 1.
CS212: Object Oriented Analysis and Design Lecture 13: Relationship between Classes.
Applying Digital Watermarking Technology to Control CD copying BY CHAYAN RATTANAVIJAI.
Doc.: IEEE /0256r0 Submission March 2010 Zhou Lan NICTSlide 1 Proposal of Synchronized Quiet Period for Incumbent User Detection Date: 2010-March.
Doc.: 802_Handoff_WMAN_Presentation Submission July David Johnston, IntelSlide Handoff A Technical Preview David Johnston
Discussion of Unpaid Claim Estimate Standard  Raji Bhagavatula  Mary Frances Miller  Jason Russ November 13, 2006 CAS Annual Meeting San Francisco,
What’s MPEG-21 ? (a short summary of available papers by OCCAMM)
IS550: Software requirements engineering Dr. Azeddine Chikh 2. Functional and non-functional requirements.
Standards of competition law in Member States of the European Union. The conceptual definition of a consumer - The consequence of understanding the terminology.
CPTWG Jan05© Copyright SVP1 Secure Video Processor Eli Hibshoosh Open Platform for Content Protection.
European Aviation Safety Agency Head of Aircraft Product Certification
Doc.: IEEE /0175r2 Submission June 2011 Slide 1 FCC TVWS Terminology Date: Authors: Peter Ecclesine, Cisco.
Lecture 13.  Failure mode: when team understands requirements but is unable to meet them.  To ensure that you are building the right system Continually.
Extended Content Control Information (ExCCI) Packet — The Studio Side of DRM Hollywood Post Alliance 11 th Technology Retreat – Rancho Mirage, CA January.
Lecture 14 22/10/15. The Object-Oriented Analysis and Design  Process of progressively developing representation of a system component (or object) through.
Privilege Management Chapter 22.
Recent Results of JCA-NID and TSAG Byoung Nam LEE HyoungJun KIM ETRI, Korea.
Doc.: IEEE /xxxxr0 July 2011 Padam Kafle, Nokia Submission Simplification of Enablement Procedure for TVWS Authors: Date: July 18, 2011 NameCompanyAddressPhone .
M2M Service Layer – DM Server Security Group Name: OMA-BBF-oneM2M Adhoc Source: Timothy Carey, Meeting Date:
UML Fundamental Elements. Structural Elements Represent abstractions in our system. Elements that encapsulate the system's set of behaviors. Structural.
Eurostat Sharing data validation services Item 5.1 of the agenda.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Propositional Logic. Assignment Write any five rules each from two games which you like by using propositional logic notations.
Project 2: Phase 1 Submission 7 Late submissions 10% 10 No submissions 14% Better than project 1 phase 3 submissions 10-point bonus: If you catch the deadline.
Computer Systems Architecture Edited by Original lecture by Ian Sunley Areas: Computer users Basic topics What is a computer?
Understanding the Value and Importance of Proper Data Documentation 5-1 At the conclusion of this module the participant will be able to List the seven.
 TATA CONSULTANCY SERVICES MM - Inventory management.
Presentation on Software Requirements Submitted by
Timing Model Start Simulation Delay Update Signals Execute Processes
White Space Map Notification
CS 426 Senior Projects Chapter 9: Relationships
PKI (Public Key Infrastructure)
Synchronization of Quiet Periods for Incumbent User Detection
Support for syntaxes (UBL and UN/CEFACT) Nicosia October 30, 2017
Presentation transcript:

RMP Specification SP005-1 TV-Anytime Rights Management and Protection Information for Broadcast Applications TV Anytime IDE, September 20, 2004, Sony in San Jose CA Nicholas R. Givotovsky - MMG -

RMP Approach & Scope TVAF RMP started with a vision of an end to end security system with the goal of standardizing all of it. This proved somewhat challenging Some degree of controversy regarding the overall requirements and specific required technologies for such a system may have played a role in slowing its completion Via a lengthy debate followed by a scoping process, TVAF RMP has been able to define the set of high priority usage cases or key scenarios RMP was to support This in turn has allowed us to progress on a modular basis, while still respecting the requirements of the overall architecture.

R ights M anagement & P rotection I nformation RMPI= Rights Management & Protection Information or, “the minimum set of usage rules and conditions required to enable protection of broadcast digital television content within a TVA RMP compliant domain.” RMPI is the essential signaling element of the system which has become the first element of the overall RMP toolbox to be standardized. We debated (argued) a lot more about what usage models such RMPI should support. On one end of the spectrum, a very rich set of functions could in theory be supported by “RICH” RMPI. However, it was agreed that RMP’s immediate priority should be on the creation of standardized signaling for the unidirectional broadcast environment.

RMPI-MB & RMPI-M When associated with a broadcast signal, RMPI for Broadcast Applications is called RMPI-Micro Broadcast (RMPI-MB). When associated with content present in a TVA RMP compliant domain (post broadcast/ acquisition) it is called RMPI-Micro (RMPI-M).

RMPI in the Broadcast Environment In the diagram above transfer of content from one RMP domain to another is not regulated by the RMPI-M/MB but the use of the content is.

Introducing SP005-1 SP005-1 Specifies the semantics, syntax and encoding for the usage rights, controls and permissions to be conveyed in RMPI-MB and RMPI-M.

Principle: Positive Assertion of Rights TV-Anytime RMPI-MB rights are positively asserted and never implied. These rights are granted to the RMP System component or entity (EG: a domain) and not to a person. When a right is exercised, asserted conditions are validated. If those asserted conditions are not met, then the right cannot be exercised If conditions are not asserted, then they do not constrain the rights.

Operational Approach RMPI-MB and RMPI-M focus on the usage of content as opposed to the movement of content. Therefore there is no notion of “copy” within the secure RMP-compliant domain as only those Principals that have been granted rights to use the content are given access to the content under the conditions expressed in RMPI-MB and RMPI-M.

Compliance TV-Anytime RMP does not itself mandate specific implementations or compliance and robustness rules. There are certain parameters in the specification that are left for assignment by the compliance bodies; for example geographic control, RMP domain identifier, single point of control identifier and security level. It is anticipated that compliance bodies that adopt the specification will define implementation requirements and associated compliance regimes to meet the needs of their respective environments.

Principals: RMP Domains A Domain is a set of TVA RMP-compliant devices that are securely bound to each other for the purpose of exchanging protected content. It is an instance of a Principal. The rules for creating and managing domains are outside the scope of this specification

Rights PLAY ANALOG EXPORT DIGITAL EXPORT HD DIGITAL EXPORT SD EXTEND RIGHTS

CONDITIONS Geographical Control Single Point of Control Physical Proximity Buffer Duration Time Window Start Date & Time Window End Date Standard Definition Digital Export Control High Definition Digital Export Control Analog Export Signaling Analog Standard Definition (SD) control Security Level Simultaneous Rendering Count Source of Additional Rights

ANCILLIARY RIGHTS INFORMATION Scrambling Control No scrambling/ Maintain broadcast scrambling Apply RMP cipher Cipher Algorithm Origin of RMPI

Syntax and encoding for RMPI- MB and RMPI-M The syntax and encoding for the RMPI-MB and RMPI-M payload is composed of at most four grants including:- A grant for the Receiving Domain that signals the rights and conditions that apply to content once it has entered a given Receiving Domain. This grant excludes the Extend Rights right. A grant for Any Domain that signals the rights and conditions that apply to content once it has entered Any Domain. This grant excludes the Extend Rights right. A grant for the Receiving Domain that signals the Extend Rights right and associated conditions. A grant for Any Domain that signals the Extend Rights right and associated conditions.

RMPI-MB and RMPI-M Lifecycle RMPI-MB is transmitted in conjunction with the broadcast signal. At the time of reception in the end user’s TVA RMP Domain it is converted to RMPI-M. Rights that are granted to the Receiving Domain and Single Point of Control (if present) in RMPI-MB are carried over in RMPI-M. Generic mentioning of the Receiving Domain and Single Point of Control (if present) in RMPI-MB is translated into explicit mentioning through the explicit statement of Identifiers in RMPI-M. In order to maintain the persistence of the rights assigned by the broadcaster or content provider, a TVA RMP compliant receiver shall not change any other value in RMPI. Rights granted to Any Domain are always carried over unchanged from RMPI-MB to RMPI-M. The figure below illustrates the transition from RMPI-MB to RMPI-M in a case where Single Point of Control is asserted.

Conclusion We believe that RMP RMPI provides a useful mechanism for the explicit uniform signaling of content usage conditions. It does not mandate those conditions, but enables them to be expressed. It does not exhaustively enable every conceivable consumption model, nor does it impose unrealistic performance requirements on delivery devices or unrealistic restrictions on the use of content. TVAF RMP - I T L W C D

Thanks! TVAF RMP