Secure Digital Music Initiative (SDMI) Overview Provided by Texas Instruments June, 2000.

Slides:



Advertisements
Similar presentations
ContentGuard An Intellectual Property Company IPED Conference November 1, 2007 Presented By Eddie Chen CONTENTGUARD.
Advertisements

CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
Compliance and Robustness Rules for Windows Media DRM Implementations Microsoft Corporation.
© 2003 Verance Corporation. 1 Verance Copy Management System Presentation to CPTWG ARDG April 10, 2003.
Digital rights management Audio watermark Jiamian.
Rob Farraher Ken Pickering Lim Vu
From Cassettes to CDs Digitizing Audio. Topics Overview Tools Required Media Types Preparing the Computer Recording the Audio Editing the Audio Creating.
1. Digitization of Sound What is Sound? Sound is a wave phenomenon like light, but is macroscopic and involves molecules of air being compressed and expanded.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
T O P I C ST O P I C S Uses of Technical Measures Case Studies and Types of Technical Measures The Problem of Hacking and Circumvention Online Music Distribution.
© 2000 Verance Corporation Verance Audio Watermarking Technologies for Protection of Digital Audio and Video Joseph M. Winograd, Ph.D. Verance Corporation.
An Assessment of Toshiba HIDE Technology against the ARDG Attribute List Oct. 22, 2003 TOSHIBA Corporation.
Implementation of an Audio Reverberation Algorithm
A Study of the Secure Digital Music Initiative Brandon Sutler Vineet Aggarwal Sachin Kamath University of Virginia CS 551.
Blue Spike © 2001 Blue Spike, Inc. - 1 Copyright Protection? What are the technologies which can address copyright management in a world of digital copies?
3 Section C: Installing Software and Upgrades  Web Apps  Mobile Apps  Local Applications  Portable Software  Software Upgrades and Updates  Uninstalling.
Chapter 3: System design. System design Creating system components Three primary components – designing data structure and content – create software –
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
CONTENT PROTECTION AND DIGITAL RIGHTS MANAGMENT
A Quick Review of Unit 1 – Recognizing Computers Computing Fundamentals © CCI Learning Solutions.
Chapter 14 Recording and Editing Sound. Getting Started FAQs: − How does audio capability enhance my PC? − How does your PC record, store, and play digital.
Software Design Division 秘 CONFIDENTIAL Panther Content Security Mar. 14, 2014 Sony Corporation.
Windows Media DRM Device Ecosystem For Windows Vista Milan Gada – Program Manager Kevin Lau – Program Manager Windows Media (Content Access Technologies)
Digital Video Disk (DVD) Protection “Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application.
Digital Certificate Installation & User Guide For Class - 2 Certificates.
© 2008 The McGraw-Hill Companies, Inc. All rights reserved. M I C R O S O F T ® Preparing for Electronic Distribution Lesson 14.
The 6713 DSP Starter Kit (DSK) is a low-cost platform which lets customers evaluate and develop applications for the Texas Instruments C67X DSP family.
A Quick Review of Unit 1 – Recognizing Computers Computing Fundamentals © CCI Learning Solutions.
Advanced Access Content System (AACS) Industry Briefing July 14, 2004.
Copyright © DivXNetworks, Inc. All Rights Reserved. DivX is a registered trademark of DivXNetworks, Inc. SLIDE 2 © DivXNetworks, Inc. 19 September 2015.
© 2011 The McGraw-Hill Companies, Inc. All rights reserved Chapter 6: Video.
Millennium Group Update Millennium Group Update Presentation for Copy Protection Technical Working Group September 20, 2000 Presentation for Copy Protection.
DRM Building Blocks - Protecting and Tracking Content Adopted from Chapter 5, Digital Rights Management Business and Technology.
CHAPTER FOUR COMPUTER SOFTWARE.
Module 7: Fundamentals of Administering Windows Server 2008.
BDA UHD Format Study (SPE internal update)
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Module 8 Review Questions 1.VGA stands for A. Video Graphic Association B. Video Gradient Array C. Video Graphic Array D. Video Graphic Arrangement.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Digital Media Project-3 Dr. Jordan Isailovic Web site:
MediaServer:1 Device Template Version 1.01 Date: June 25, 2002 For UPnP™ Version 1.0 Status: Standardized DCP File from: MediaServer1.0.pdf Author: John.
Chapter 15 Recording and Editing Sound. 2Practical PC 5 th Edition Chapter 15 Getting Started In this Chapter, you will learn: − How sound capability.
Presented by HDMI, L.L.C. May, 2005 HDMI Retail Training Program Part 1: Overview HDMI – The Standard for Connecting HDTV.
Applying Digital Watermarking Technology to Control CD copying BY CHAYAN RATTANAVIJAI.
Sony Pictures Confidential Watermarking in AACS. Sony Pictures Confidential SPE Forensic Watermarking Goals Goals: – Identify the device that was compromised.
Digital Audio. Analog versus Digital Analog Sound waves “similar” or “copy” Electrical impedance creates noise Digital Sound encoded in binary form Sampled.
Senior Design Project “ MP3 Player ” Brian P. Allen Zeeshan A. Khan Jerry T. Koshy.
Slide 1 SONY PICTURES ENTERTAINMENT CONFIDENTIAL Security requirements for early window consumer services Spencer Stephens and Tim Wright Version 0.1 SONY.
Lesson 3-Multimedia Skills. Overview Members of a multimedia team. Roles and responsibilities in a multimedia team.
Extended Content Control Information (ExCCI) Packet — The Studio Side of DRM Hollywood Post Alliance 11 th Technology Retreat – Rancho Mirage, CA January.
November 28, 2001 CPTWG Protecting Against Unauthorized Redistribution of Digital Broadcast Content Presentation to the CPTWG Intel, Hitachi, Matsushita,
The World Leader in High Performance Signal Processing Solutions SD/SDIO Introduction Cliff Cai.
Information Systems Design and Development Technical Implications (Storage) Computing Science.
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
SEPTEMBER 8, 2015 Computer Hardware 1-1. HARDWARE TERMS CPU — Central Processing Unit RAM — Random-Access Memory  “random-access” means the CPU can read.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
XP Practical PC, 3e Chapter 14 1 Recording and Editing Sound.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
III Digital Audio III.7 (W Nov 04) The MP3 frame format.
Chapter 15 Recording and Editing Sound
III Digital Audio III.7 (F Oct 20) The MP3 frame format.
Chapter 6: Video.
Applying Digital Watermarking Technology to Control CD copying
Content protection for 4k
III Digital Audio III.7 (Mo Oct 22) The MP3 frame format.
The bios.
Computer Concepts Module 3
Presentation transcript:

Secure Digital Music Initiative (SDMI) Overview Provided by Texas Instruments June, 2000

What is SDMI?  SDMI is: An architecture A set of reference models  Applications Layer  Licensed Compliant Module (LCM) Layer  Portable Device (PD) Layer A set of requirements:  Security  Robustness  Content screening A work in progress  SDMI is NOT A true standard A single file format A single cryptographic algorithm A single coder Designed for interoperability Secure Digital Music Initiative = SDMI

TI and SDMI  SDMI grew out of a meeting at Comdex ‘98 that was sponsored by TI and the RIAA  TI supports SDMI, and believes a programmable TI Digital Signal Processor (DSP) solution is the best choice for the changing SDMI environment  TI was first to announce SDMI-compliant portable solutions (with Liquid Audio, FhG and SanDisk)  SDMI-compliant portable players using TI DSPs are shipping now. The first SDMI-compliant player was the Sony VAIO® Music Clip™, which started shipping in the US in January ‘00.

TI and SDMI (cont’d)  The Verance Phase I watermark decoder will be available on TI’s TMS320C54x ™ DSPs in early 3Q00  The TI C54x-based evaluation module (EVM) is one of the 3 platforms that Phase II proposers will use to implement their technology. Therefore SDMI Phase II will be available on C54x very soon after the Phase II technology is chosen.  TI has been approved as an SDMI ID Assignment Authority and has been granted a block of 64-bit unique IDs for use in TI DSP-based devices with built-in flash memory

SDMI-Compliant System Layers  The Licensed Compliant Module (LCM) transfers content between SDMI- compliant applications (S/W jukeboxes, etc.) and portable devices (PDs) or portable media (PM). It is roughly equivalent to a device driver.  The application may delegate screening and other functions to the LCM or other trusted task -- this is simply one possible structure.

SDMI Version 1.0 Reference Model  The SDMI Version 1.0 Reference Model includes a host with application(s) and LCM(s) interfaced to a portable player and/or portable media.  Inputs to the Reference Model may include CD, Electronic Music Distribution (EMD), portable media, DVD, etc.

Screening  The most important concept within SDMI  Considered by the record labels to be a major concession  Allows perpetual usage of current (“legacy”) content (existing CDs and MP3s, etc.), but legacy content must be screened, encrypted, and bound to a specific player or piece of media  Designed to enable the secure distribution of “new” (watermarked) content  Phase 2 technology will use watermarking or similar means to detect new content that has been illegally copied and distributed.

SDMI Screening Timeline  Phase I - begins when SDMI-compliant applications start to ship Verance (formerly Aris/Solana) watermarking technology selected for Phase I 3 bits decoded: “Phase 1 trigger” plus two copy control bits (DVD-A CCI bits) All SDMI-compliant Phase I applications must implement screening for the Phase I trigger  Phase II - begins when content providers start shipping content with the Phase I trigger and the Phase II technology Phase II technology should be selected late 2000 or early Phase II proposals are due in June The Phase II technology may require re-marking (changing “copy once” to “copy no more”. When Phase II begins, applications will see the Phase I trigger and request an upgrade for the application to a Phase II application Users who decline the upgrade will only be able to play legacy content Users who upgrade will be able to play new content plus legacy content

SDMI Phase 1 Content Flow and Usage  The “Biddle Diagram” specifies the flow of content into, out of, and within the SDMI Domain, and specifies the Phase I screening process.

The SDMI Version 1 Portable Device (PD)  General Requirements: A PD must Store all content in SDMI-protected form Observe content usage rules Only accept portable media with content in SDMI-protected format  Inputs: SDMI-protected content from an LCM or PM Embedded microphone, limited to mono, voice-grade Hz, -60 KHz. Microphone input must be stored in SDMI-protected form, and screened before it can be exported from the SDMI domain. Unprotected digital and analog inputs must be screened within the PD and stored in SDMI-protected form  Outputs: Analog output is allowed. Playback >1.5 normal speed must be degraded or pitch- corrected. Output during seek (FF/rewind) must be noticeably degraded Unprotected digital output of content is not allowed

IDs and Binding  Binding: Content must be “bound” To the portable memory (PM), if the PM is removable To the PD, if the PD has non-removable memory  IDs: IDs must be Readable by the LCM and PD Statistically or truly unique across all devices or components for a given manufacturer A minimum length of  128 bits, if randomly assigned  32 bits, if assigned by an appropriate authority Security must not depend on the secrecy of the ID

Robustness (i.e., Security and Tamper-Proofing)  Content Content must be maintained in a secure form at all times until it is played out No unprotected content on a user-accessible bus (PCMCIA, device bay, 1394, Cardbus, etc., EXCEPT unprotected digital playback (e.g., USB speakers) is permitted, limited to 16-bit stereo at 48 KHz or less.  Bypass/Defeating Functions or Procedures No switches, jumpers, traces that can be cut, secret control functions, etc., that will access to unprotected content  Software Must be secured or encrypted Must perform self-checking/authentication to prevent unauthorized modification  Hardware Must protect keys/algorithms using hardware or software means Must be designed so that removing or replacing components cannot be done without risk of damage Must require professional tools and difficulty to defeat security functions

SDMI Status -- June 1, 2000 Current SDMI priorities (in rough priority order)  Definition of testing methods and procedures for evaluating Phase II screening technology candidates  Selection of Phase II technology Must detect that content has been compressed and then uncompressed Need not be watermarking Highest priority of record companies  Discussions of the implications of screening on usability and the consumer experience May lead to temporary relaxation of screening procedures  Discussion of SDMI requirements for wireless devices, and what constitutes a SDMI Portable Device  Completion of final trademark and licensing agreement Requires agreement on what constitutes SDMI compliance Difficult liability issues still remain

SDMI Information on the Web The SDMI Portable Device Specification, Part 1, Version 1.0, is available on the public area of the SDMI Web site at Additional information including a FAQ and how to join SDMI is also available on the public area of the Web site. SDMI members are given a login name and password to access the private area of the Web site, where all SDMI documents are stored.