CPTWG Jan05© Copyright SVP1 Secure Video Processor Eli Hibshoosh Open Platform for Content Protection.

Slides:



Advertisements
Similar presentations
CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
Advertisements

Compliance and Robustness Rules for Windows Media DRM Implementations Microsoft Corporation.
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Agenda Overview Business Drivers Adoption Devices Features Services
B. Fairman Sony US Advanced Technologies Center 1 Ubiquitous Video W3C Video on the Web Workshop
T O P I C ST O P I C S Uses of Technical Measures Case Studies and Types of Technical Measures The Problem of Hacking and Circumvention Online Music Distribution.
© 2000 Verance Corporation Verance Audio Watermarking Technologies for Protection of Digital Audio and Video Joseph M. Winograd, Ph.D. Verance Corporation.
“...creating knowledge.” Enabling Digital Content Protection on Super-Distribution Models - Carlos Serrão ISCTE – Intituto Superior.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
A Credential Based Approach to Managing Exceptions in Digital Rights Management Systems Jean-Henry Morin University of Geneva – CUI.
CONTENT PROTECTION AND DIGITAL RIGHTS MANAGMENT
Introduction to ICANN’s new gTLD program. A practical example: the Dot Deloitte case. Jan Corstens, Partner, Deloitte WIPO Moscow, 9 Dec 2011.
Digital Rights Management 5th Annual Wireless Java Conference January 21-23, 2004 Kevin Mowry, Motorola Chair, OMA Download and DRM group.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Key Management in Cryptography
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
4K CONTENT PLAN Sony Pictures Technologies. Consumer Offering Broadcast (Over the air, cable, satellite, IPTV) Premium Content (Movies, episodic TV) Premium.
TV-Anytime (and the myTV project) Ronald Tol Philips Research.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
Advanced Access Content System (AACS) Industry Briefing July 14, 2004.
DLNA Confidential Who Owns the Home Network? Glen Stone Director, Standards & Strategy Sony Electronics Inc. Chair: DLNA Technical Committee Glen Stone.
Not only Safe but Competitive Presentation to Copy Protection Technical Working Group October 22, 2003 Far East Engineering Corp, Tokyo Japan Makoto Saito/Rie.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Trusted Computing BY: Sam Ranjbari Billy J. Garcia.
Donald M. Whiteside Vice President, Corporate Technology Group Director, Technical Policy and Standards ITU and EBU Presentation A perspective on trends.
RMP Specification SP005-1 TV-Anytime Rights Management and Protection Information for Broadcast Applications TV Anytime IDE, September 20, 2004, Sony in.
Copyright © DivXNetworks, Inc. All Rights Reserved. DivX is a registered trademark of DivXNetworks, Inc. SLIDE 2 © DivXNetworks, Inc. 19 September 2015.
Millennium Group Update Millennium Group Update Presentation for Copy Protection Technical Working Group September 20, 2000 Presentation for Copy Protection.
R EUTERS 150 Y EARS David Parrott Reuters/Chief Technology Office 18 July 2001 Report on Reuters Response to MPEG-21 CfR Report to XACML Committee Face-to-Face.
Rights Expression Languages in Digital Rights Management Xin Wang ContentGuard, Inc. October 19, 2006.
SmartRight™ 1 THOMSON multimedia 2001 ©28 November 2001 Copy Protection System for Digital Home Networks Deployment process CPTWG – November 28, 2001.
2005/10/12DMP Reference Software1 Martin Springer Contributor to the DMP Chinese Academy of Sciences Beijing, 2005/10/13.
SmartRight™ 1 THOMSON multimedia 2001 ©11 july 2001 Copy Protection System for Digital Home Networks CPTWG – July 11, 2001.
1 Anonymous Trust: Digital Rights Management Using Broadcast Encryption Proceedings of the IEEE, Vol. 92, No. 6, June 2004.
The Open Connected TV (OCTV) project 2011/08/28. Connected TV: dream and reality The dream Connected TV: the means to provide the much sought- after convergence.
Media Center and OTT. 10 years ago Now Offerings Spectrum: PPV, Pay TV, Basic cable, Free to air IP: VOD, SVOD, FVOD, AVOD Windows: early window, home.
Rights, exceptions, usages…1 Rights, exceptions, usages… But no expectations, please! Leonardo Chiariglione, Martin Springer 3 rd DRM Conference Berlin.
1 Automating Production of Cross Media Content for Multichannel Distribution Eng. Ivan Bruno (DSI – Univ. of Florence, Italy) 9 th November,
Copyright Frost & Sullivan Mobile Digital Rights Management: Managing Rights, Managing Revenues Interactive Analyst Briefing Allison Webb 12 March 2003.
Delivering Video over IP
Modernising Government Conference 29 October 2004 Mike Eastham Head of Technology ITSO Ltd.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
1 Analysis of Consumer Issues and Paths for Concrete Approaches Dr. Carsten Orwat Forschungszentrum Karlsruhe in the Helmholtz Association, Institute for.
Applying Digital Watermarking Technology to Control CD copying BY CHAYAN RATTANAVIJAI.
Sony Pictures Confidential Watermarking in AACS. Sony Pictures Confidential SPE Forensic Watermarking Goals Goals: – Identify the device that was compromised.
An Introduction to Trusted Platform Technology Siani Pearson Hewlett Packard Laboratories, UK
Timothy Putprush Baltimore, MD September 30, 2009 Federal Emergency Management Agency (FEMA) Integrated Public Alert and Warning System Presentation to.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Creating and Managing Digital Certificates Chapter Eleven.
Richard Gurdak International Development Blue Ridge Networks Service Providers and Lawful Intercept.
Describe the potential of IT to improve internal and external communications By Jim Green.
Digital Rights Management for Mobiles Jani Suomalainen Research Seminar on Telecommunications Business II Telecommunications Software and Multimedia Laboratory.
November 28, 2001 CPTWG Protecting Against Unauthorized Redistribution of Digital Broadcast Content Presentation to the CPTWG Intel, Hitachi, Matsushita,
OMA Secure Content Delivery for the Mobile World ODRL Workshop, Vienna Dr. Willms Buhse Vice Chair, OMA Download and DRM group.
©Ofcom REGULATING THE MEDIA: WHAT ROLE FOR THE EU? European Parliament 17 October 2006 Chris Banatvala Director of Standards Ofcom.
© 2015 Digital Rights Management in a 3G Mobile Phone and Beyond Thomas S.Messerges, Ezzat A. Dabbish ILKOO LEE.
Content protection for 4k
Digital Transmission Content Protection (DTCP)
E-MARC Recommendations
جايگاه گواهی ديجيتالی در ايران
William Hackett & Co. Solicitors
4K Content protection overview
ETSI Contribution to 3rd Meeting of EC Expert Group on RRS
Presentation transcript:

CPTWG Jan05© Copyright SVP1 Secure Video Processor Eli Hibshoosh Open Platform for Content Protection

CPTWG Jan05© Copyright SVP2

CPTWG Jan05CPTWG Jan05© Copyright SVP3 Content Protection Agenda  Set the driving principles for  –E2E Security –Open Content Protection model –Interoperability for consumers and devices

CPTWG Jan05© Copyright SVP4 Driving Principles for Market Adoption  Enable the interests of all the players: from content creators, distributors…device manufacturers, consumers –E.g., robust security, level-field competition, cost, interoperability  Pay TV security lessons applied cost-effectively to “horizontal” market to promote hi-quality content consumption  Enable interaction between the CA/DRM and standard SVP Open-CP  Flexibility Built-in to allow the market to reach its equilibrium – Enabling not Mandating rules, e.g., –No immutable encoding rules; –Embracing technological change

CPTWG Jan05© Copyright SVP5 Opportunities & Threats Threats:  Theft and distribution of clear content  Theft and distribution of broadcast (global) keys - McCormac  Circumvention of content usage rights  Technology potentially outpaces protection –BB, Internet, p2p, compression tools, SW debug tools, ubiquitous cheap storage, media writers… –Broadcast-key servers to non compliant devices  Regulation – questionable role and sluggish relative to technology Opportunities:  Quality content, secure, profitable, … Anytime, Everywhere

CPTWG Jan05© Copyright SVP6 SVP Open Content Protection (CP) - Inside the Device CA/DRM Business Model Enforcement SW Chip Driver TRS-SW Enforcement for (Domain, Proximity, B-Flag, Private Extensions) CA / DRM / FTA Agent Usage Model Definition and Billing HW Chip Requirements e.g, Personalization, Compliance and Robustness Core Security Functions: Certificates handling, SAC, CryptoTools., Time, Key-Mgmt, Content License (UsageRules & content-keys), Export content control, revocation Content processing: Content De/Scrambling, Content Decoding Secure Boot Loader in HW HARDWARE SOFTWARE Open CP

CPTWG Jan05© Copyright SVP7 SVP – Home Network and Beyond

CPTWG Jan05© Copyright SVP8 Open Content Protection (CP) Operational Definition  Enforce Spatial and Temporal content-usage rights related to –Acquisition –Consumption –Storage (Copy/Move) –Distribution: intra- (Proximity) and inter-user domain –Content processing, e.g., watermarking detection/insertion –Time (Retention, rental control) –Export to other approved CP systems –Analog-hole - Map analog protection –“Adoption” by network operator  Shared content control - Enable Persistent CA/DRM control: Interaction between: Open-CP (standard SVP in horizontal device) with CA/DRM systems

CPTWG Jan05© Copyright SVP9 Inter-Device

CPTWG Jan05© Copyright SVP10 SVP E2E Security for Compressed Content  Under SVP E2E: Clear Content and its License (content keys & rights) are always inside secure chip silicon, Not in the device!  No global secrets in SVP; Only single device compromise is possible; no system-wide compromise  Recovery of a single device compromise via revocation  Content encrypted by Unique-Device-Key or Domain-Key  When content goes from device A to C through B, unlike pipe protection, only A and C know the encryption keys B A C

CPTWG Jan05© Copyright SVP11 Interoperability  Via Compliant Acquisition –Input from any CA/DRM –Input from Fixed-media Many-to-One content protection system –Input from VOD server  Controlled Export to Authorized CP systems –Desirable - To enhance security export-CP is built into SVP chip –Less desirable - clear content is exported to Authorized CP in the device; protected by device compliance & robustness rules

CPTWG Jan05© Copyright SVP12 Certificates  Certificates Tree  Certification authority: Root or manufacturer or network operator  Device Attributes, restrictions on content usage  Certificate attributes and content license Together determine content usage ( in conflict – use the stricter of the two)  Issuer: Device manufacturer, Network operator

CPTWG Jan05© Copyright SVP13 Recovery  Content revocation – content license specifies whether the content is to be sent to (accessed) by a revoked device  Revocation criteria/procedure  CRL – list of revoked device IDs delivered securely via SAC

CPTWG Jan05© Copyright SVP14 Compliance and Robustness (C&R) the What and How  Acquisition point and SVP-enabled Media Chip must be externally certified by accredited SVPLA lab.  Media devices are certified either by: –External entity - By accredited SVPLA lab, or –Internal entity - By device manufacturer  Acquisition points (examples): –Smart Card –Fixed Media –VOD server at the headend

CPTWG Jan05© Copyright SVP15 Organization and Legal SVP AllianceSVPLA Members Associates Technology and Rights Licensing Compliance & Accreditation Root Certificate Authority Impact technical and commercial operations Support

CPTWG Jan05© Copyright SVP16 SVPLA LLC*  Publish complete SVP specification  Set criteria for eligibility for licensing (RaND) and then license  Operate root certificate authority  Implement SVP specification change procedures  Implement revocation procedures  Establish and implement prices for licensing  Set rules for compliance and robustness  Accredit testing labs  Authorize non-SVP content protection systems as trusted for purposes of Export  Provide support services *Wholly-owned subsidiary of NDS

CPTWG Jan05© Copyright SVP17 SVP Alliance Inc.*  Act as an advisory committee to SVPLA –Propose changes to specification and procedures –Set accreditation rules for testing labs –Promote SVP adoption and usage –Technical Working Groups  Initiate and second revocation  Lobby standards bodies  Responsible for marketing – website, shows and events  Encourage interoperability –Recommend non-SVP content protection systems to be authorized as trusted for purposes of export *Not-for-profit organization

CPTWG Jan05© Copyright SVP18 SVP Advantages - Conclusion  Open  Secure  Flexible  Low-Cost  Interoperable

CPTWG Jan05© Copyright SVP19 Bottom line For high-quality, valuable content the lesson is: Use SVP Open CP!

CPTWG Jan05© Copyright SVP20 For More Info