We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byGretchen Hell
Modified over 2 years ago
www.mobilevce.com © 2004 Mobile VCE 3G 20041
www.mobilevce.com © 2004 Mobile VCE 3G 20042 19 th October 2004 Regional Blackouts: Protection of Broadcast Content on 3G Networks Alexander W. Dent Allan Tomlinson, Information Security Group, Royal Holloway, University of London
www.mobilevce.com © 2004 Mobile VCE 3G 20043 Introduction Motivation Collaboration between broadcast and mobile networks Potential to deliver broadcast content over 3G networks Potential issues with content protection Digital Rights Management (DRM) Ownership of Content Distribution Rights Licensing
www.mobilevce.com © 2004 Mobile VCE 3G 20044 Background Regional Blackouts Broadcast Content subject to restrictions Geographical In the region around a stadium where a live event is taking place Time During the time when a live event takes place Immediately after the event
www.mobilevce.com © 2004 Mobile VCE 3G 20045 Background Current Solutions Conditional Access systems Scrambled content Regional codes Embedded in receivers Entitlement management Descrambling authorised according to regional codes Broadcast time controlled by broadcaster
www.mobilevce.com © 2004 Mobile VCE 3G 20046 Background
www.mobilevce.com © 2004 Mobile VCE 3G 20047 Background Mobile Receivers Current solutions assume Relatively static receivers Broadcaster controls play-out and billing Mobile receivers No longer static Content forwarding
www.mobilevce.com © 2004 Mobile VCE 3G 20048 Background
www.mobilevce.com © 2004 Mobile VCE 3G 20049 New Problem Content Provider may trust broadcaster to control distribution to initial receiver Content Provider cannot trust initial receiver to control further distribution Further distribution is controlled by the user End Device can be any IP enabled device End Device may be completely controlled by user Impact on future mobile services
www.mobilevce.com © 2004 Mobile VCE 3G 200410 Potential Solutions Trusted Hardware Insist on trusted hardware on End Device Install GPS on end device Expensive Trusted Network Network provides time and location data End Device must be connected directly to network Secure Protocols
www.mobilevce.com © 2004 Mobile VCE 3G 200411 Network Model
www.mobilevce.com © 2004 Mobile VCE 3G 200412 Assumptions STB and ED have a secure execution environment and a tamper-proof data storage area All cryptographic processing on STB and ED is carried out in the secure execution environment Only applications running in the secure execution environment have access to the tamper-proof data storage areas in the STB and the ED At least one authenticated key, K, is shared by STB and ED and is stored in the tamper-proof data storage areas
www.mobilevce.com © 2004 Mobile VCE 3G 200413 Assumptions At least one of the ED or STB possesses a public verification transform, V CA, for a certification authority CA, stored in its tamper-proof data storage area At least one of the ED or STB possesses a DRM application stored in its tamper-proof data storage area At least one of the ED or STB has knowledge of the usage criteria for each service received
www.mobilevce.com © 2004 Mobile VCE 3G 200414 Protocol 1
www.mobilevce.com © 2004 Mobile VCE 3G 200415 Protocol 1 Advantages Simple Disadvantages Heavy computational load on the intermediary network. Heavy computational load on the end device (which may have limited computational power) Trust in DRM application on the end device
www.mobilevce.com © 2004 Mobile VCE 3G 200416 Protocol 2
www.mobilevce.com © 2004 Mobile VCE 3G 200417 Protocol 2 Advantages Simple Low computational load for the end device Good source of nonces from scrambled broadcasts Most DRM performed on STB, less trust in ED Disadvantages Still heavy computational load on the intermediary network
www.mobilevce.com © 2004 Mobile VCE 3G 200418 Conclusions Protocols deliver secure time and location information from mobile devices to DRM applications. Computational load on intermediary network. Potential for Denial of Service attacks
www.mobilevce.com © 2004 Mobile VCE 3G 200419 Thank you ! For further information please contact: Dr. Allan Tomlinson E-mail: firstname.lastname@example.org Tel:+44 (1784) 414346 WWW:www.mobilevce.com
Effective Design of Trusted Information Systems Luděk Novák,
Digital Rights Management for Mobiles Jani Suomalainen Research Seminar on Telecommunications Business II Telecommunications Software and Multimedia Laboratory.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
© 2004 Mobile VCE June 2004 Security – Requirements and approaches to securing future mobile services Malcolm K Payne BT.
© 2007 Mobile VCE 15th September 2008 PIMRC 2008: Ubiquitous Services over Heterogeneous Networks - The Key to ‘True’ Mobility Stewart.
© 2007 Mobile VCE. © 2007 Mobile VCE Core 5: User Interactions Service Architecture Eamonn O’Neill Academic Coordinator.
LAAC: A Location-Aware Access Control Protocol YounSun Cho, Lichun Bao and Michael T. Goodrich IWUAC 2006.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Sponsored by the U.S. Department of Defense © 2008 by Carnegie Mellon University page 1 Pittsburgh, PA The Implications of a Single Mobile Computing.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
Cryptography and Network Security Chapter 1. Background Information Security requirements have changed in recent times traditionally provided by physical.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Digital Security Jesline James! 9cc. Contents The CREATORS!!!! =] The CREATORS!!!! =] What is Digital Security? What is Digital Security? How does.
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
© 2005 Mobile VCE Interactive Mobile TV Seminar- November 2005 Interworking Digital Broadcast & Mobile Networks Richard Egan Industrial.
Securing Vehicular Communications Author ： Maxim Raya, Panos Papadimitratos, and Jean-Pierre Hubaux From ： IEEE Wireless Communications Magazine, Special.
© 2017 SlidePlayer.com Inc. All rights reserved.