Download presentation
Presentation is loading. Please wait.
Published byKristin Cain Modified over 6 years ago
1
What is IPTV? Internet Protocol television (IPTV)
IPTV is defined as multimedia services such as tv/video/audio/text/graphics/data delivered over IP based networks managed to provide the required level of quality of service and experience, security, interactivity and reliability.
2
IPTV history? 1994 first time television show was broadcast over internet by ABC - Word News Now. The term IPTV first appeared in 1995 with the founding of Precept Software by Judith Estrin and Bill Carrico. First continuous live webcasts started by Internet radio company AudioNet 10.Jan.1998
3
IPTV main services Live television Time-shifted television (replays)
Video on demand (VOD) Radio broadcast Interactive applications (web browsing, e- mail, games and others) live television, with or without interactivity related to the current TV show; time-shifted television: catch-up TV (replays a TV show that was broadcast hours or days ago), start-over TV (replays the current TV show from its beginning); video on demand (VOD): browse a catalog of videos, not related to TV programming.
4
IPTV Architecture Content source (Video/stream store)
Delivery and Management Network (Encode and stream servers. Multicast, Unicast) Home network (PC, TV, STB...)
5
IPTV Architecture 2
6
IPTV Security Objectives
The main security objectives for IPTV service are: IPTV service should be high stable and high available. Only allowed people can access and operate on the IPTV services Abuse actions should be controlled to reduce garbage data. The IPTV service should be protected against unauthorized deletion, insertion, modification or replay attack. The IPTV service programs should be protected by copyrights.
7
IPTV Attacker's Goals Take control of home networks Service disruption
Spreading worms, trojans, virus Broadcast own material (for political or other reasons) Steal the content For piracy or as simple as P2P TV source For free TV or VOD
8
IPTV Security Testing A combination of: Network penetration testing
Web application security testing Device security testing Software vulnerability testing May also include Policy and procedure review
9
VOD Encryption Flow Process
1 The video stream enters the HTTP live streaming encoder. The encoder splits the continuous video stream into equal chunks of predefined duration (for example, 10s). The encoder transcodes each chunk into multiple different bit rates chunk files. 2 For each chunk, the encoder requests an encryption key from the VCAS for Internet TV server. The encoder encrypts each of the different bit rate chunk files with the provided encryption for the chunk. 3 The encoder creates the playlists and sends them together with the chunk files onto the HTTP content server. 4 A user device with a Verimatrix client requests the playlist for a particular piece of content from the content server. The Verimatrix client then requests the content key(s) from the VCAS for Internet TV server. 5 If the user's client device is authorized to receive the content key(s), the VCAS for Internet TV server returns the key(s) to the Verimatrix Client, and the client device can start decrypting and playing the content. If the user's client device is not authorized to receive the content key(s), the VCAS for Internet TV server denies the keys to the Verimatrix client in the client device
10
Verimatrix Encryption solusion
11
Verimatrix High-Level Architecture
12
Thank you for listening!
Questions?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.