CPTWG Jan. 2002 MacroSafe TM System A Solution for Secure Digital Media Distribution Presentation to the CPTWG Jan. 15, 2002.

Slides:



Advertisements
Similar presentations
ContentGuard An Intellectual Property Company IPED Conference November 1, 2007 Presented By Eddie Chen CONTENTGUARD.
Advertisements

Software Bundle ViPNet Secure Remote Access Arrangement using ViPNet Mobile © Infotecs.
CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
Compliance and Robustness Rules for Windows Media DRM Implementations Microsoft Corporation.
Welcome to Middleware Joseph Amrithraj
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Secure Sockets Layer eXtended (SSLX) Next Generation Internet Security Overview Presentation April 2011.
© 2000 Verance Corporation Verance Audio Watermarking Technologies for Protection of Digital Audio and Video Joseph M. Winograd, Ph.D. Verance Corporation.
1 Windows Media Rights Manager and FairPlay Seminar Digital Rights Management Clara Fernández de Castro.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Digital Rights Management © Knowledge Books & Software, 2012.
1 Jeremy Wyant W3C DRM Workshop 23 January 2001 Establishing Security Requirements For DRM Enabled Systems.
A 21 st Century Solution For 21 st Century Publishers.
UNDERSTANDING JAVA APIS FOR MOBILE DEVICES v0.01.
“...creating knowledge.” Enabling Digital Content Protection on Super-Distribution Models - Carlos Serrão ISCTE – Intituto Superior.
Protecting Digital Content - The Challenge Andy Barlow CTO – Phocis.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
ManageEngine TM Applications Manager 8 Monitoring Custom Applications.
Cryptography and Network Security Chapter 17
An Overlay Multicast Infrastructure for Live/Stored Video Streaming Visual Communication Laboratory Department of Computer Science National Tsing Hua University.
Chapter 8 Web Security.
CONTENT PROTECTION AND DIGITAL RIGHTS MANAGMENT
Digital Rights Management 5th Annual Wireless Java Conference January 21-23, 2004 Kevin Mowry, Motorola Chair, OMA Download and DRM group.
Introduction to Cyberspace
Mobile CRM and beyond Martin Booth Partner Technical Specialist.
Introduction to HASP ® Software DRM Solutions, Products, Benefits All Rights Reserved © Aladdin Knowledge Systems.
MPEG-4 & Windows Media Dr. Jordi Ribas-Corbera Lead Program Manager, Codecs Digital Media Division Microsoft Corp
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Windows Vista: Volume Activation 2.0
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
SOE and Application Delivery Gwenael Moreau, Abbotsleigh.
1 Functional reference model for Digital Rights Management Systems Vural Ünlü / Prof. Dr. Thomas Hess Munich School of Management Berlin, 5. September2004.
Advanced Access Content System (AACS) Industry Briefing July 14, 2004.
35% of Internet traffic is video today, by % Growing at ~50% CAGR TV IP Delivery ~50 million internet connected TVs sold this year 150M+ video.
Quality of Protection (QoP) An approach that separates the development of security services from the application development partitions security services.
Remote OMNeT++ v2.0 Introduction What is Remote OMNeT++? Remote environment for OMNeT++ Remote simulation execution Remote data storage.
Introducing Digital Rights Management Willms Buhse October 2002, Vilnius.
1 Web Developer Foundations: Using XHTML Chapter 10 Helper Applications and Plug-in Concepts.
"Managing and Protecting Digital Broadcast Audio, Video and Data on Personal Computers” Dewey Weaver President January 15, 2002.
Media Server Streaming Elizabeth Canela David Vera Bernard James Lilian Ohanian.
Copyright © DivXNetworks, Inc. All Rights Reserved. DivX is a registered trademark of DivXNetworks, Inc. SLIDE 2 © DivXNetworks, Inc. 19 September 2015.
Millennium Group Update Millennium Group Update Presentation for Copy Protection Technical Working Group September 20, 2000 Presentation for Copy Protection.
DRM Building Blocks - Protecting and Tracking Content Adopted from Chapter 5, Digital Rights Management Business and Technology.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Delivering Video over IP
Confidential. For use within only Slide 1 iOS and Android content protection requirements Version 0.2 Sony Pictures Entertainment Tim Wright.
LWDRM (Lightweight Digital Rights Management) Information Science and Technology Master 1 st Yuuki Horita.
Windows Media Connect and PlaysForSure for Network Devices Jason Flaks Program Manager Digital Media Division microsoft.com Microsoft Corporation.
HASP ® SRM Enabling Business Growth through Software Rights Management All Rights Reserved © 2007 Aladdin Knowledge Systems. Yariv Drory International.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Creating and Managing Digital Certificates Chapter Eleven.
Towards a Software Architecture for DRM Joint work with Kristof Verslype, Wouter Joosen, and Bart De Decker DistriNet research.
Chapter 3 Selecting the Technology. Agenda Internet Technology –Architecture –Protocol –ATM IT for E-business –Selection Criteria –Platform –Middleware.
COM 597 Streaming Media Class 5 July 6, Fortune 1000 Companies expectations on Streaming Budgets 2004.
Digital Rights Management for Mobiles Jani Suomalainen Research Seminar on Telecommunications Business II Telecommunications Software and Multimedia Laboratory.
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
Sharing makes life beautiful ARKUDA STB SOLUTION.
OMA Secure Content Delivery for the Mobile World ODRL Workshop, Vienna Dr. Willms Buhse Vice Chair, OMA Download and DRM group.
E-commerce Architecture Ayşe Başar Bener. Client Server Architecture E-commerce is based on client/ server architecture –Client processes requesting service.
© 2015 Digital Rights Management in a 3G Mobile Phone and Beyond Thomas S.Messerges, Ezzat A. Dabbish ILKOO LEE.
TV Broadcasting What to look for Architecture TV Broadcasting Solution
Enterprise Town Hall solution
An Innovative Distributive Training and Information Platform
PREPARED BY: RUMMY MIRANDA
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Designed for powerful live monitoring of larger installations
Presentation transcript:

CPTWG Jan MacroSafe TM System A Solution for Secure Digital Media Distribution Presentation to the CPTWG Jan. 15, 2002

CPTWG Jan Problem Statement  The lack of a highly secure, flexible and easy to use system to protect, consume and distribute high value content via the Internet is one factor that has limited the distribution of high value content and the associated revenue opportunities

CPTWG Jan Customer Requirements  Highly secure, end-to-end solution  Seamless interface with existing e-Commerce infrastructures  Scalable architecture to cost effectively support growing demand  No change to existing content authoring workflows  Media agnostic – usable with any type of compression or file format  Support for different means of distribution  Support for flexible business models  Able to be ported to other devices: STBs, PVR, HMS  High quality user experience  Highly secure, end-to-end solution  Seamless interface with existing e-Commerce infrastructures  Scalable architecture to cost effectively support growing demand  No change to existing content authoring workflows  Media agnostic – usable with any type of compression or file format  Support for different means of distribution  Support for flexible business models  Able to be ported to other devices: STBs, PVR, HMS  High quality user experience

CPTWG Jan Macrovision’s Strategy  Leverage its “best in class” security technologies and products to develop a highly secure, end-to- end solution Analog Copy Protection –Customers: Content Owners, HW Man., IC Man. –Technology: Patented, analog-centric SafeWrap/SafeCast/SafeDisc consumer software copy protection and DRM –Customers: Microsoft, EA, Digital River, Borland –Technology: Tamper Hardening, Tamper Evidence, DRM Flexlm, GTlicensing business software license management –Customers: Sun, Cadence, SGI, AutoDesk, ReleaseNow –Technology: License Generation, DRM SafeAudio audio CD copy protection –Currently in trials  Leverage its “best in class” security technologies and products to develop a highly secure, end-to- end solution Analog Copy Protection –Customers: Content Owners, HW Man., IC Man. –Technology: Patented, analog-centric SafeWrap/SafeCast/SafeDisc consumer software copy protection and DRM –Customers: Microsoft, EA, Digital River, Borland –Technology: Tamper Hardening, Tamper Evidence, DRM Flexlm, GTlicensing business software license management –Customers: Sun, Cadence, SGI, AutoDesk, ReleaseNow –Technology: License Generation, DRM SafeAudio audio CD copy protection –Currently in trials

CPTWG Jan Macrovision’s Strategy (cont.)  Acquire new technology Investments in companies –Digimarc - watermarking –NTRU - encryption –RioPort – media distribution –Command Audio – media distribution –Widevine – encryption and tamper evidence –iVAST – MPEG-4 and media distribution –Digital Fountain – media distribution Purchase IP and patents –AudioSoft –MediaDNA –Others  Acquire new technology Investments in companies –Digimarc - watermarking –NTRU - encryption –RioPort – media distribution –Command Audio – media distribution –Widevine – encryption and tamper evidence –iVAST – MPEG-4 and media distribution –Digital Fountain – media distribution Purchase IP and patents –AudioSoft –MediaDNA –Others

CPTWG Jan MacroSafe System Architecture Analog Video Out Digital Video Out Analog Copy Protection Digital Copy Protection

CPTWG Jan MacroSafe System Architecture Analog Video Out Digital Video Out Analog Copy Protection Digital Copy Protection

CPTWG Jan Server-Side Components  Publisher Rights and encryption strategy defined IPMP placeholders added to content stream –During encryption, the placeholders are replaced with encrypted “content decryption keys” Metafile generated  Cypher Service 192-bit, AES encryption Content is encrypted before being stored in the content repository Manages the Key Escrow  Content Repository Series of one or more network disk volumes Stores encrypted content and metafile  Publisher Rights and encryption strategy defined IPMP placeholders added to content stream –During encryption, the placeholders are replaced with encrypted “content decryption keys” Metafile generated  Cypher Service 192-bit, AES encryption Content is encrypted before being stored in the content repository Manages the Key Escrow  Content Repository Series of one or more network disk volumes Stores encrypted content and metafile

CPTWG Jan Server-Side Components (cont.)  DRM Server Slave to the E-commerce system, but master to the DRM system –Coordinates all activities in the DRM system –Controls key generation, content encryption, content and certificate delivery  Streaming Server Streams encrypted content to the client  Download Server Transfers encrypted content files to the client  DRM Server Slave to the E-commerce system, but master to the DRM system –Coordinates all activities in the DRM system –Controls key generation, content encryption, content and certificate delivery  Streaming Server Streams encrypted content to the client  Download Server Transfers encrypted content files to the client

CPTWG Jan Client Components  DRM Validation Determines if the client has the rights to do the requested action, with the selected content Compares the requested action vs. the rights given to the client in the certificates stored in the Secured Registry  Decryption Engine Decrypts content keys Decrypts content using decrypted content keys and enables viewing of content by authorized users  DRM Control Manages and controls all access to the Secured Registry  DRM Validation Determines if the client has the rights to do the requested action, with the selected content Compares the requested action vs. the rights given to the client in the certificates stored in the Secured Registry  Decryption Engine Decrypts content keys Decrypts content using decrypted content keys and enables viewing of content by authorized users  DRM Control Manages and controls all access to the Secured Registry

CPTWG Jan Client Components (cont.)  Secured Registry A secure container to store: –Component Signatures used to detect tampering –Client’s certificates (ie. the user’s rights) Locked to a specific computer The only access to the Secured Registry is by using trust authenticated controls  Quality of Service Validates that content has been received so that the E-Commerce system can complete the payment transaction  Secured Registry A secure container to store: –Component Signatures used to detect tampering –Client’s certificates (ie. the user’s rights) Locked to a specific computer The only access to the Secured Registry is by using trust authenticated controls  Quality of Service Validates that content has been received so that the E-Commerce system can complete the payment transaction

CPTWG Jan Macrovision’s Solution - MacroSafe  Highly secure, end-to-end solution Frame-based deep encryption, 192-bit AES Multi-layer encryption, similar to CA –Content key –License key –Signing and authentication Ability to revoke compromised clients Client to Server communication uses signatures for authentication  Highly secure, end-to-end solution Frame-based deep encryption, 192-bit AES Multi-layer encryption, similar to CA –Content key –License key –Signing and authentication Ability to revoke compromised clients Client to Server communication uses signatures for authentication

CPTWG Jan Macrovision’s Solution - MacroSafe  Highly secure, end-to-end solution (cont.) Multiple layers of client security –Tamper Hardening – obfuscation, debugger detection, encryption, etc. –Tamper Evidence – Module signatures compared to signatures stored in Secure Registry –Tamper Detection – Self-revocation if tampering is detected, requiring renewal –Secure registry – contains module signatures and certificates –Trust authentication - During runtime, module-to- module communication checked for man-in-the- middles attacks –Client locked to a specific computer –Continuous security updates to code  Highly secure, end-to-end solution (cont.) Multiple layers of client security –Tamper Hardening – obfuscation, debugger detection, encryption, etc. –Tamper Evidence – Module signatures compared to signatures stored in Secure Registry –Tamper Detection – Self-revocation if tampering is detected, requiring renewal –Secure registry – contains module signatures and certificates –Trust authentication - During runtime, module-to- module communication checked for man-in-the- middles attacks –Client locked to a specific computer –Continuous security updates to code

CPTWG Jan Macrovision’s Solution - MacroSafe  Seamless interface with existing e-Commerce infrastructures MacroSafe is a subsystem to the e-commerce system or SMS Interfaces to e-commerce using industry standards –SOAP, RMI, TCP/IP, CORBA Certificates generated using industry standards –XML, XrML, XMCL, ORDL  Seamless interface with existing e-Commerce infrastructures MacroSafe is a subsystem to the e-commerce system or SMS Interfaces to e-commerce using industry standards –SOAP, RMI, TCP/IP, CORBA Certificates generated using industry standards –XML, XrML, XMCL, ORDL

CPTWG Jan Macrovision’s Solution - MacroSafe  Scalable architecture to cost effectively support growing demand Distributed architecture allows servers operating in parallel Java-based server applications run on Unix, Linux and Windows platforms  Scalable architecture to cost effectively support growing demand Distributed architecture allows servers operating in parallel Java-based server applications run on Unix, Linux and Windows platforms

CPTWG Jan Macrovision’s Solution - MacroSafe  No change to existing content authoring workflows Separate authoring and publishing Author once for multiple distribution methods Pricing, usage rules and content package are independent  No change to existing content authoring workflows Separate authoring and publishing Author once for multiple distribution methods Pricing, usage rules and content package are independent

CPTWG Jan Macrovision’s Solution - MacroSafe  Media agnostic – usable with any type of compression or file format Audio, Video, Software, Text,.pdf MPEG-1, MPEG-2, MPEG-4 AAC, MP3, WMA, others Real, Microsoft, QuickTime  Media agnostic – usable with any type of compression or file format Audio, Video, Software, Text,.pdf MPEG-1, MPEG-2, MPEG-4 AAC, MP3, WMA, others Real, Microsoft, QuickTime

CPTWG Jan Macrovision’s Solution - MacroSafe  Support for different means of distribution: Download, streaming, pre-packaged “Push” and “Pull” business models supported –Download or stream to a specific consumer –Datacast to a large audience Peer-to-Peer super-distribution supported  Support for different means of distribution: Download, streaming, pre-packaged “Push” and “Pull” business models supported –Download or stream to a specific consumer –Datacast to a large audience Peer-to-Peer super-distribution supported

CPTWG Jan Macrovision’s Solution - MacroSafe  Support for flexible business models Rental Purchase Subscription Time restricted playback Number restricted playback PPV VOD Super Distribution  Support for flexible business models Rental Purchase Subscription Time restricted playback Number restricted playback PPV VOD Super Distribution

CPTWG Jan Macrovision’s Solution - MacroSafe  Able to be migrated to other devices: STB, PVR, HMS Complements CA and other copy management schemes Java-based client compatible with Windows, Linux and STBs running DVB-J Client’s skin can be easily customized for branding or specific applications Rights definitions map into CCI states  Able to be migrated to other devices: STB, PVR, HMS Complements CA and other copy management schemes Java-based client compatible with Windows, Linux and STBs running DVB-J Client’s skin can be easily customized for branding or specific applications Rights definitions map into CCI states

CPTWG Jan Macrovision’s Solution - MacroSafe  High Quality User Experience Security is transparent to the user DVD-like video and audio quality and user controls Frame-based encryption enables trick-play of encrypted media Java-based client compatible with –Win98, WinMe, WinNT, Win2K, WinXP –Linux –Mac OSX QoS feedback loop signals e-commerce system when media has been successfully transferred Supports “fair use”  High Quality User Experience Security is transparent to the user DVD-like video and audio quality and user controls Frame-based encryption enables trick-play of encrypted media Java-based client compatible with –Win98, WinMe, WinNT, Win2K, WinXP –Linux –Mac OSX QoS feedback loop signals e-commerce system when media has been successfully transferred Supports “fair use”

CPTWG Jan Schedule  Content Download to PC Client Customer Trials – 3Q2002 Production Release – 4Q2002  Streaming to PC Client Customer Trials – 4Q2002 Production Release – 1Q2003  Content Download to PC Client Customer Trials – 3Q2002 Production Release – 4Q2002  Streaming to PC Client Customer Trials – 4Q2002 Production Release – 1Q2003

CPTWG Jan Summary - MacroSafe  Highly secure, end-to-end solution  Seamless interface with existing e-Commerce infrastructures  Scalable architecture to cost effectively support growing demand  No change to existing content authoring workflows  Media agnostic – usable with any type of compression or file format  Support for different means of distribution  Support for flexible business models  Able to be ported to other devices: STBs, PVR, HMS  High quality user experience  Highly secure, end-to-end solution  Seamless interface with existing e-Commerce infrastructures  Scalable architecture to cost effectively support growing demand  No change to existing content authoring workflows  Media agnostic – usable with any type of compression or file format  Support for different means of distribution  Support for flexible business models  Able to be ported to other devices: STBs, PVR, HMS  High quality user experience

CPTWG Jan For more information, contact:  Kirby J. Kish Macrovision  Kirby J. Kish Macrovision