F1 Encoding and Content Security Spencer Stephens CTO, Sony Pictures.

Slides:



Advertisements
Similar presentations
Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
Advertisements

T O P I C ST O P I C S Uses of Technical Measures Case Studies and Types of Technical Measures The Problem of Hacking and Circumvention Online Music Distribution.
© 2000 Verance Corporation Verance Audio Watermarking Technologies for Protection of Digital Audio and Video Joseph M. Winograd, Ph.D. Verance Corporation.
Content Protection for Recordable Media Florian Pestoni IBM Almaden Research Center.
1 DVD Copyright Management Schemes Tanveer Alam CVN.
CONTENT PROTECTION AND DIGITAL RIGHTS MANAGMENT
4K CONTENT PLAN Sony Pictures Technologies. The 4k Consumer Value 4k has to offer all of these features: – Higher resolution – Richer colors (wider color.
Payment Card Industry (PCI) Data Security Standard
4k – Technical Summary.
4k – Technical Summary.
4K CONTENT PLAN Sony Pictures Technologies. Consumer Offering Broadcast (Over the air, cable, satellite, IPTV) Premium Content (Movies, episodic TV) Premium.
Sony Pictures1 Preparing your customers and your facilities for Blu-ray A powerful format that leads to new challenges in authoring and creative design.
1 ::: Presentation title ::: August 22, 2007 HTCIA Conference San Diego, California August 29, 2007 Windows Vista What Has Changed.
© 2011 Verizon. All Rights Reserved. Reserved Net Conference for Cisco WebEx Event Center Presenter Name Presenter Title Month XX, 2013.
Suggested F1 Plan Sony Pictures Technologies. Not functionally organized, but people and current organization- centric (i.e.- SPE, SCE, SNEI, etc) – F1.
Advanced Access Content System (AACS) Industry Briefing July 14, 2004.
PCI: As complicated as it sounds? Gerry Lawrence CTO
UXTC - Technical Planning Group Sony Electronics 7/22/2014 4K Network Security.
Donald M. Whiteside Vice President, Corporate Technology Group Director, Technical Policy and Standards ITU and EBU Presentation A perspective on trends.
Millennium Group Update Millennium Group Update Presentation for Copy Protection Technical Working Group September 20, 2000 Presentation for Copy Protection.
Watermarking Video Content What is video watermarking? November 2010 Rajaram Pejaver Note: The views presented here are solely those of.
秘 | CONFIDENTIAL Wasu/Panther 4K Project Confidential
ENHANCED CONTENT PROTECTION OVERVIEW. Security Solution Characteristics Comprehensive security ecosystem All devices meet the same standard – No assumption.
4K. Contents Context Online required? UltraViolet connection.
BDA UHD Format Study (SPE internal update)
HDCP1.4+ Material for Certification 10 August 2012 Sony Corporation 2012/8/10 Sony Confidential 1.
October 22-23, 2003 About Visionaire Develop and license IP Develop and license IP Focused on hardware based Copy-Protection Focused on hardware based.
Media Center and OTT. 10 years ago Now Offerings Spectrum: PPV, Pay TV, Basic cable, Free to air IP: VOD, SVOD, FVOD, AVOD Windows: early window, home.
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
F1 Cross-Company Call Follow Up Process Flow against Security Breach on F1 Phase 1 6.iii.2013 Sony Confidential.
Confidential. For use within only Slide 1 iOS and Android content protection requirements Version 0.2 Sony Pictures Entertainment Tim Wright.
Presented by HDMI, L.L.C. May, 2005 HDMI Retail Training Program Part 1: Overview HDMI – The Standard for Connecting HDTV.
Applying Digital Watermarking Technology to Control CD copying BY CHAYAN RATTANAVIJAI.
Module 3 Configuring File Access and Printers on Windows 7 Clients.
Sony Pictures Confidential Watermarking in AACS. Sony Pictures Confidential SPE Forensic Watermarking Goals Goals: – Identify the device that was compromised.
Slide 1 SONY PICTURES ENTERTAINMENT CONFIDENTIAL Security requirements for early window consumer services Spencer Stephens and Tim Wright Version 0.1 SONY.
11 Restricting key use with XACML* for access control * Zack’-a-mul.
The Content Scrambling System (CSS) Carlos Garcia Jurado Suarez 03/10/2006.
F1 BOX/SECURITY/SERVER SYSTEM SPTECH FEEDBACK(DRAFT2) 12012/9/21Sony/SPTech Confidential.
Presented by HDMI, L.L.C. May, 2005 HDMI Retail Training Program Part II: Additional Information HDMI – The Standard for Connecting HDTV.
Water Rights Website (Toolshed Tour) RWUA Water Rights Workshop April 29, 2008
The Digital Battery From: Budd, T.A. "Protecting and Managing Electronic Content with a Digital Battery". IEEE Computer (2001) 2-8. Steve Lord.
OMA Secure Content Delivery for the Mobile World ODRL Workshop, Vienna Dr. Willms Buhse Vice Chair, OMA Download and DRM group.
1 IMDS data use CLEPA Materials Regulations Event ( ) Presented by Sylvia Aßmann Dr. Stefan Dully On behalf of Supplier Alliance (SUAL)
Media Center and OTT.
Online Learning Journal Information Session Reception & Nursery
SPE Expectations Leverage existing delivery technologies
4k Content Delivery Sony Pictures Technologies.
Sony Pictures Technologies
Content protection for 4k
Technology Development Group
4k Discussion Sony Pictures.
4k Theoretical Discussion
Unit 1.6 Systems security Lesson 3
Digital Transmission Content Protection (DTCP)
4k Discussion Sony Pictures.
4K Content protection overview
05 | Making the Cloud Transition
4K Content protection overview
4K Content protection overview
Breach Monitoring and Response
Getting Ready For GDPR Simon Marks Director
Bethesda Cybersecurity Club
Presentation transcript:

F1 Encoding and Content Security Spencer Stephens CTO, Sony Pictures

Encoding Phase 0 Image: 60Mbps CBR AVC HP L5.1 (active picture Color space - rec709 full range bit Audio: 384kbps VBR HE- AACv2 (AAC+ v2) 96KHz Phase 1 - EyeIO Image: 26Mbps VBR Max 40Mbps AVC HP L5.1 (active picture only) Color space – YUV full range bit 4:2:2 Audio: to be determined

Phase 0 Security Meets security goals Summary Each copy is individually watermarked using Verimatrix. Pirated copies can be traced back to the consumer Content is encrypted with unique Content Encryption Key (CEK) per title per target server CEK is encrypted with public key of target server Watermark payload, CEK ID and target server ID are associated and logged by SEL NOTE: “Chain of custody” may be used in legal proceedings. No user log-on on server BitLocker full disk encryption All ports locked except for tablet access Tablet bound to server

Phase 1 Security SummaryStatus Phase 1 will use HDCP 2.2V. good Marlin Broadband. There is no per-title diversity, hacking one player exposes all content. There is also no per-device diversity, hacking one player exposes all players. Falls short Marlin implementation will be more robust than is required by the Marlin compliance and robustness rules but we have not been able to discuss it so far with Phase 1 engineers because of NDA with Panasonic – discussion will be week of November 12 ? There will not be any third party assessment of the security solutionFalls short F1 box cannot embed individual forensic watermarks AND SNEI unable to embed individual forensic watermarks Falls short

Phase 1 Security SummaryStatus SPE is solely responsible for monitoring for security breaches. NOTE: Industry practice is content protection licensing authority monitors for security beaches aided by implementers and content participants Falls short “Revocation” Criteria shall be equal to the criteria Marlin BB defines. (Eligible) Content Provider and (Eligible) Service Provider will have a right to commence “Revocation” process when such criteria is satisfied. NOTE: Goal of Enhanced Content Protection is rapid response to security breaches. This process will be relatively slow. Falls short No decision has been made on how or whether to respond to a security breach. ? F1 box may not be upgradable to better security. F1 box engineers are studying FW update capability to add additional features ? SNEI will not support any features beyond standard Marlin Broadband