We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byGretchen Hell
Modified about 1 year ago
www.mobilevce.com © 2004 Mobile VCE 3G 20041
www.mobilevce.com © 2004 Mobile VCE 3G 20042 19 th October 2004 Regional Blackouts: Protection of Broadcast Content on 3G Networks Alexander W. Dent Allan Tomlinson, Information Security Group, Royal Holloway, University of London
www.mobilevce.com © 2004 Mobile VCE 3G 20043 Introduction Motivation Collaboration between broadcast and mobile networks Potential to deliver broadcast content over 3G networks Potential issues with content protection Digital Rights Management (DRM) Ownership of Content Distribution Rights Licensing
www.mobilevce.com © 2004 Mobile VCE 3G 20044 Background Regional Blackouts Broadcast Content subject to restrictions Geographical In the region around a stadium where a live event is taking place Time During the time when a live event takes place Immediately after the event
www.mobilevce.com © 2004 Mobile VCE 3G 20045 Background Current Solutions Conditional Access systems Scrambled content Regional codes Embedded in receivers Entitlement management Descrambling authorised according to regional codes Broadcast time controlled by broadcaster
www.mobilevce.com © 2004 Mobile VCE 3G 20046 Background
www.mobilevce.com © 2004 Mobile VCE 3G 20047 Background Mobile Receivers Current solutions assume Relatively static receivers Broadcaster controls play-out and billing Mobile receivers No longer static Content forwarding
www.mobilevce.com © 2004 Mobile VCE 3G 20048 Background
www.mobilevce.com © 2004 Mobile VCE 3G 20049 New Problem Content Provider may trust broadcaster to control distribution to initial receiver Content Provider cannot trust initial receiver to control further distribution Further distribution is controlled by the user End Device can be any IP enabled device End Device may be completely controlled by user Impact on future mobile services
www.mobilevce.com © 2004 Mobile VCE 3G 200410 Potential Solutions Trusted Hardware Insist on trusted hardware on End Device Install GPS on end device Expensive Trusted Network Network provides time and location data End Device must be connected directly to network Secure Protocols
www.mobilevce.com © 2004 Mobile VCE 3G 200411 Network Model
www.mobilevce.com © 2004 Mobile VCE 3G 200412 Assumptions STB and ED have a secure execution environment and a tamper-proof data storage area All cryptographic processing on STB and ED is carried out in the secure execution environment Only applications running in the secure execution environment have access to the tamper-proof data storage areas in the STB and the ED At least one authenticated key, K, is shared by STB and ED and is stored in the tamper-proof data storage areas
www.mobilevce.com © 2004 Mobile VCE 3G 200413 Assumptions At least one of the ED or STB possesses a public verification transform, V CA, for a certification authority CA, stored in its tamper-proof data storage area At least one of the ED or STB possesses a DRM application stored in its tamper-proof data storage area At least one of the ED or STB has knowledge of the usage criteria for each service received
www.mobilevce.com © 2004 Mobile VCE 3G 200414 Protocol 1
www.mobilevce.com © 2004 Mobile VCE 3G 200415 Protocol 1 Advantages Simple Disadvantages Heavy computational load on the intermediary network. Heavy computational load on the end device (which may have limited computational power) Trust in DRM application on the end device
www.mobilevce.com © 2004 Mobile VCE 3G 200416 Protocol 2
www.mobilevce.com © 2004 Mobile VCE 3G 200417 Protocol 2 Advantages Simple Low computational load for the end device Good source of nonces from scrambled broadcasts Most DRM performed on STB, less trust in ED Disadvantages Still heavy computational load on the intermediary network
www.mobilevce.com © 2004 Mobile VCE 3G 200418 Conclusions Protocols deliver secure time and location information from mobile devices to DRM applications. Computational load on intermediary network. Potential for Denial of Service attacks
www.mobilevce.com © 2004 Mobile VCE 3G 200419 Thank you ! For further information please contact: Dr. Allan Tomlinson E-mail: firstname.lastname@example.org Tel:+44 (1784) 414346 WWW:www.mobilevce.com
Effective Design of Trusted Information Systems Luděk Novák,
Digital Rights Management for Mobiles Jani Suomalainen Research Seminar on Telecommunications Business II Telecommunications Software and Multimedia Laboratory.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
© 2004 Mobile VCE June 2004 Security – Requirements and approaches to securing future mobile services Malcolm K Payne BT.
© 2007 Mobile VCE 15th September 2008 PIMRC 2008: Ubiquitous Services over Heterogeneous Networks - The Key to ‘True’ Mobility Stewart.
© 2007 Mobile VCE. © 2007 Mobile VCE Core 5: User Interactions Service Architecture Eamonn O’Neill Academic Coordinator.
LAAC: A Location-Aware Access Control Protocol YounSun Cho, Lichun Bao and Michael T. Goodrich IWUAC 2006.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Sponsored by the U.S. Department of Defense © 2008 by Carnegie Mellon University page 1 Pittsburgh, PA The Implications of a Single Mobile Computing.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
Cryptography and Network Security Chapter 1. Background Information Security requirements have changed in recent times traditionally provided by physical.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Digital Security Jesline James! 9cc. Contents The CREATORS!!!! =] The CREATORS!!!! =] What is Digital Security? What is Digital Security? How does.
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
© 2005 Mobile VCE Interactive Mobile TV Seminar- November 2005 Interworking Digital Broadcast & Mobile Networks Richard Egan Industrial.
Securing Vehicular Communications Author ： Maxim Raya, Panos Papadimitratos, and Jean-Pierre Hubaux From ： IEEE Wireless Communications Magazine, Special.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Mobile Agent Security Presented By Sayuri Yonekawa October 17, 2000.
Digital Asset Protection in Personal Private Networks Imad Abbadi Information Security Group Royal Holloway, University of London
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
1 Jeremy Wyant W3C DRM Workshop 23 January 2001 Establishing Security Requirements For DRM Enabled Systems.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
Patterns for Secure Boot and Secure Storage in Computer Systems By: Hans L¨ohr, Ahmad-Reza Sadeghi, Marcel Winandy Horst G¨ortz Institute for IT Security,
© 2008 Mobile VCE 1PIMRC Ubiquitous Workshop 2008 A Combined Mobility and QoS Framework for Delivering Ubiquitous Services Dev Pragad.
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
Voice over IP in the Enterprise. What is VOIP? The use of data networks to carry voice without a loss of sound quality The use of data networks to carry.
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.
Installing Fake Root Keys in a PC Adil Alsaid and Chris J. Mitchell Information Security Group Royal Holloway, University of London.
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Cryptography and Network Security (CS435) Part One (Introduction)
© 2015 Digital Rights Management in a 3G Mobile Phone and Beyond Thomas S.Messerges, Ezzat A. Dabbish ILKOO LEE.
Computer Emergency Notification System (CENS). CENS Application The implementation of the Computer Emergency Notification System (CENS) application will.
1 Automating Production of Cross Media Content for Multichannel Distribution Eng. Ivan Bruno (DSI – Univ. of Florence, Italy) 9 th November,
Dr. Sarbari Gupta Electrosoft Services Tel: (703) Security Characteristics of Cryptographic.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Security Issues in Mobile Code Systems David M.Chess, High Integrity Computing Lab, IBM T.J. Watson Research Center Hawthorne, NY, USA Mobile code systems.
1 Anonymous Trust: Digital Rights Management Using Broadcast Encryption Proceedings of the IEEE, Vol. 92, No. 6, June 2004.
SmartRight™ 1 THOMSON multimedia 2001 ©28 November 2001 Copy Protection System for Digital Home Networks Deployment process CPTWG – November 28, 2001.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
© 2017 SlidePlayer.com Inc. All rights reserved.