Not only Safe but Competitive Presentation to Copy Protection Technical Working Group October 22, 2003 Far East Engineering Corp, Tokyo Japan Makoto Saito/Rie.

Slides:



Advertisements
Similar presentations
Software Bundle ViPNet Secure Remote Access Arrangement using ViPNet Mobile © Infotecs.
Advertisements

CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
Speaker Name, Title Windows 8 Pro: For Small Business.
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Competition and ‘Trusted Computing’ Ross Anderson Cambridge University and Foundation for Information Policy Research.
Which server is right for you? Get in Contact with us
Video Streaming in the Lee Library Present and Future.
TCPA TCPA TCPA T rusted C omputing P latform A lliance Saurabh Phansalkar.
Trusted Computing Platforms Blessing or Curse? by Bastian Sopora, Seminar DRM 2006.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Chapter 21 Successfully Implementing The Information System
Trusted Computing Initiative Beyond trustworthy. Trusted Computing  Five Key Concepts >Endorsement Key >Secure Input and Output >Memory Curtain / Protected.
Chapter 1 - Introduction to Computers and the Internet Basic functions of a Computer Input – entering info into the computer (e.g. keyboard, mouse, mic,
Multi-PC, Networked, Broadband Households US: 19.2 M, Globally: 40+ M and growing Source: Microsoft Primary Research CountryHouseholds (millions) Broadband.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
1 © Copyright 2007 EMC Corporation. All rights reserved. EMC Documentum Information Rights Management EMC Content Management and Archiving.
CONTENT PROTECTION AND DIGITAL RIGHTS MANAGMENT
CLOUD COMPUTING.
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
Digital Rights Management 5th Annual Wireless Java Conference January 21-23, 2004 Kevin Mowry, Motorola Chair, OMA Download and DRM group.
Windows Media DRM Device Porting Kit Review Scott Plette Program Manager Media Technology Group microsoft.com Microsoft Corporation.
Moving USB …beyond the desktop TM at Wireless Coexistence Conference, San Jose, CA powered by ExtremeUSB.
Mobile commerce Yuri kang.
Introduction to HASP ® Software DRM Solutions, Products, Benefits All Rights Reserved © Aladdin Knowledge Systems.
Hardware: Storage Devices. Definition Memory, i.e.: RAM (Random Access memory) Optical Disks Hard Disks USB Storage Devices CD’s, DVD’s Cache memory Databases.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
E-Commerce. What is E-Commerce Industry Canada version Commercial activity conducted over networks linking electronic devices (usually computers.) Simple.
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
Advanced Access Content System (AACS) Industry Briefing July 14, 2004.
January 2011 Travel Experts Website Prepared By : Gomaa, Kevin, and Lidiya.
Using the WDK for Windows Logo and Signature Testing Craig Rowland Program Manager Windows Driver Kits Microsoft Corporation.
Matthew Rothmeyer. Digital Rights Management (DRM) “ A class of technologies that are used by hardware manufacturers, publishers, copyright holders, and.
Week 1 – Seneca Networking Environment. Agenda Overview of Seneca Server names How to access servers Terminal Emulation (Putty) Browser – IE, Netscape,
Trusted Computing BY: Sam Ranjbari Billy J. Garcia.
Introducing Digital Rights Management Willms Buhse October 2002, Vilnius.
Donald M. Whiteside Vice President, Corporate Technology Group Director, Technical Policy and Standards ITU and EBU Presentation A perspective on trends.
XPand your capabilities with Citrix ® MetaFrame XP ™ for Windows ®, Feature Release 2.
Architecture for Protecting Critical Secrets in Microprocessors Ruby Lee Peter Kwan Patrick McGregor Jeffrey Dwoskin Zhenghong Wang Princeton Architecture.
Digital Planet: Tomorrow’s Technology and You
Module 3: Business Information Systems Chapter 8: Electronic and Mobile Commerce.
Josh Dallyn, Technical Advisor – Microsoft Bill Durham, President – Basileia Consulting Group Windows 8: For Business.
14.1 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts Chapter 14: Protection Goals of Protection Principles of Protection Domain of Protection.
Trusted Computing Or How I Learned to Stop Worrying and Love the MPAA.
569 Semantic Web. Dr. J. Lu University of windsor, Project Presentation Encrypted Web service application Encrypted Web Application Presented by:
Eng.Abed Al Ghani H. Abu Jabal Introduction to computers.
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Digital Media Project-3 Dr. Jordan Isailovic Web site:
Copyright Frost & Sullivan Mobile Digital Rights Management: Managing Rights, Managing Revenues Interactive Analyst Briefing Allison Webb 12 March 2003.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
MIS 105 LECTURE 1 INTRODUCTION TO COMPUTER HARDWARE CHAPTER REFERENCE- CHP. 1.
HASP ® SRM Enabling Business Growth through Software Rights Management All Rights Reserved © 2007 Aladdin Knowledge Systems. Yariv Drory International.
Welcome. Welcome to this TechNet Event URL for on-line feedback is in your reminder No Planned Fire Drills Please turn your Mobile Phones off To.
E-Commerce & M-Commerce. Introduction Electronic commerce, commonly known as e- commerce, It is a type of industry where buying and selling of product.
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
History of Windows Operating System. Windows 1.0 Debuted in 1985 First version of Windows that was set up to use bitmap displays and mouse pointing devices.
OMA Secure Content Delivery for the Mobile World ODRL Workshop, Vienna Dr. Willms Buhse Vice Chair, OMA Download and DRM group.
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
Your data, protected and under control wherever they go SealPath Enterprise – IRM
What is DRM? Digital Rights Management is: –From Richard Stallman, President of the FSF: ”The motive for DRM schemes is to increase profits for those.
Chapter 2 Operating Systems
Unit 3 Virtualization.
Chapter 6: Securing the Cloud
Utilize Internal Data via Mobile Business Apps
Chapter 1 - Introduction to Computers and the Internet
+Vonus: An Intuitive, Cloud-Based Point-of-Sale Solution That’s Powered by Microsoft Office 365 with Tools to Increase Sales Using Social Media OFFICE.
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
ONLINE SECURE DATA SERVICE
Presentation transcript:

Not only Safe but Competitive Presentation to Copy Protection Technical Working Group October 22, 2003 Far East Engineering Corp, Tokyo Japan Makoto Saito/Rie Saito

DRM CA CSS Secure Export DTCP CPRM Intel LaGrande Microsoft NGSCB ARM TrustZone HDCP CPPM Protection at the Source Encryption Methods Establishment of a Protected Digital Domain through Link Protection Technologies Consumer Platform PC, DTV, Mobile, etc… Content Protection Technologies Others ~Industry Efforts Today and Tomorrow~ Local Reference Monitor Key Server Externally Controlling Reference Monitor Internet Home Network

DecryptionRE-Encryption (Rights Enforcement Encryption) Encrypted Content InputEncrypted Content Output The Decryption and RE-Encryption Operations are accomplished entirely within the secure environment i.e. hardware such as chipset. The Principle of Content Protection Cipher Key(K1) Cipher Key(K2)

1. Passive Key Chain Model 2. Hybrid Key Chain Model 3. Active Key Chain Model Platform Local Key Key Server Three Models of Content Protection Platform Local key External Key

Policy on Content Protection under Content Owner Control Reference Monitor is defined as software that lets a content owner set specific policies for determining how the content is used Reference Monitor Active Key Content Protection Passive Key Content Protection How to make Digital Content Safe and Flexible ? Hybrid Key Content Protection Local Key built-in Consumer Platform External Key from Remote Key Server A Combination of Local Key and External Key

Reference Monitor Active Key Content Protection Passive Key Content Protection How to embed “Competitive- Advantage” in Policy ? User Choice User Choice User Choice Hybrid Key Content Protection Policy on User Choice under Content Owner Control Competition would drive consumers to buy products from companies who allowed more freedom of use with their content e.g. Digital First Sale, Digital Gift, Time-Shift, Space-Shift, Backup-Copy, Editing, etc…

Reference Monitor Content Rights Enforcement Encryption (RE-Encryption) Fair-Use Rights Enforcement Decryption (RE-Decryption) How to realize the “Balance” in Policy ? Using RE-Encryption and RE-Decryption for Policy Enforcement RE-Encryption is Content Protection and RE-Decryption is Fair-Use Execution as User Choice

i ≧ 2 C : Cipher text M : plaintext Material K : Key E : Encryption operation D : Decryption operation Encryption and Decryption normally utilize symmetric ciphers, meaning that E and D are equivalent C 1 =E(M,K 1 ) : Encryption for Digital Content Distribution M=D(C 1 ,K 1 ) : Decryption for Pay per Use C i =E(D(C i-1 ,K i-1 ),K i ) : RE-Encryption for Content Protection M=D(C i ,K i ) : RE-Decryption for Fair-Use Execution as User Choice Equations of the “Balance”

Reference Monitor User Choice Pay per Use User Choice Pay per Use Active Key Content Protection Passive Key Content Protection Decryption Rights Enforcement Encryption Scope of Implementation ~Enforcement of whatever Policy there is~ Rights Enforcement Encryption Rights Enforcement Decryption Rights Enforcement Decryption Hybrid Key Content Protection

Our Feedback to Intel LT Policy Team Apps Standard OS Standard Hardware LaGrande Technology Protected Hardware Reference Monitor

CPU Chip Set LPC AGP USB PCI User Mode Kernel Mode LaGrande Technology Adherence to Intel LT Policies ~Online Connection with Key Server~ Protected Channels Kernel to Kernel (Ring 0) Idea No.1 OS Protected Kernel ( Filter Driver) Idea No.2 System is ready Key Server Extension of TPM/SSC Active Key & Passive Key Enforcing Decryption /Encryption

Policy Enforcement Policy Standard Reference Monitor Decision Remote Decision Separation of Policy and Enforcement Key Server based on Reference Monitor Concept External Reference Monitor Local Reference Monitor

Billing and Traceability Who Accessed, Which Data, When and Where ? Externally Controlled Content Migration Digital Contents Pay per Use ∞ Key Sever K1/K2 Transfer (K2) K2/K3 Transfer (K3) Transfer (K4) K3/K4 K4/K5 K1 (K1)

Copyrights Management Unit Copyrights Management Unit Fair-use Management Unit Fair-use Management Unit Authentication Management Unit Authentication Management Unit How Key Server works Key Generation Unit Key Generation Unit User Choice 1. Digital First Sale 2. Digital Gift 3. Time-Shift 4. Space-Shift 6. Backup-Copy 7. Editing 8. If any RE-Decryption Key for User Choice RE-Encryption Key for Content Protection Decryption Key for Pay per Use

Policy on User Choice under Content Owner Control Policy on Content Protection under Content Owner Control Key Server Decryption Key for Pay per Use Consumer Platform Fair-Use Execution Domain for Consumer RE-Encryption Key for Content Protection Encrypted Content InputEncrypted Content Output RE-Decryption Key for User Choice Content Protection Domain for Content Owner Enforcement The Goal of Key Server Model

For further information URL :

Thank you

Appendix : Passive Key Chain Model Encrypted Content Migration Platform Local Key Decryption for Pay per Use RE-Encryption for Copyright Protection RE-Encryption for Copyright Protection RE-Decryption for Fair-Use Execution as User Choice Digital Contents

Key Server Appendix : Hybrid Key Chain Model Key1 K1 K2 Encrypted Content Migration K2 Platform Local Key Digital Contents Decryption for Pay per Use RE-Encryption for Copyright Protection RE-Encryption for Copyright Protection RE-Decryption for Fair-Use Execution as User Choice

Encrypted Content Key1 Key Server Migration K1 K2 K3 Appendix : Active Key Chain Model K2K3 Decryption for Pay per Use RE-Encryption for Copyright Protection RE-Decryption for Fair-Use Execution as User Choice RE-Encryption for Copyright Protection Digital Contents

Appendix : Case Study of Digital Paradox Content Owner’s Question How to get rid of consumer’s copy after they resell the content to someone else via Internet ? Consumer’s Question Consumers can resell CDs purchased in a music shop, but what about digital music files downloaded from an online store ? Service Provider’s Question Digital content services that develop techniques for easily reselling and transferring contents as gifts would have a competitive advantage over those of rivals. Are such techniques now available ?

There are two solutions to achieve data migration. One is decrypting data temporarily on migration and the other is encrypting data on migration. Temporary decryption is more suitable for data migration without raising fears of remote-controlled PCs. But piracy is possible in this case, so content owners rarely allow consumers temporary decryption. Though migration of encrypted data needs to be controlled externally by remote Key Server, there is no fear of piracy. This means it’s easy for content owners to allow consumers more freedom of use with their contents. Appendix : Data Migration Issues to be discussed

TV DVD Player Mobile Phone PC Car Appendix : Key for Digital Economy ~You can get the Key anytime and anywhere~ Distributed Key Server Network Copyrighted Content Migration New Infrastructure balancing Consumer Rights with Creator Rights Creator Society

How to protect both Digital Copyrights and Fair-Use Rights at the same time How to protect both Digital Copyrights and Fair-Use Rights at the same time Content Protection Patents (RE-Encryption) Fair-Use Execution Patents (RE-Decryption) Key Server Patents (Externally Controlling Reference Monitor) Appendix : Patent Information Other Patents (Watermarking and etc….)

The End