November 28, 2001 CPTWG Protecting Against Unauthorized Redistribution of Digital Broadcast Content Presentation to the CPTWG Intel, Hitachi, Matsushita,

Slides:



Advertisements
Similar presentations
The Digital Millennium Copyright Act and Liability for Hosting and Linking Mark D. Robins Nixon Peabody LLP.
Advertisements

Oxford Media Convention 2006 Rights and revenue models: what IP model for public service communications?
TVAF - RMP Kobe Meeting November 2003 Final Plenary.
© 2003 Verance Corporation. 1 Verance Copy Management System Presentation to CPTWG ARDG April 10, 2003.
1 CGMS-A Plus RC Response to CPTWG-ARDG CFI October 22/23, 2003 Multicompany Submission (Matsushita, Mitsubishi, Hitachi, Intel, JVC, Samsung, Thomson,
Content Protection Revocation Information Delivery & Processing Brad Hunt Chief Technology Officer Motion Picture Association of America, Inc. Copy Protection.
A New Extended Copy Control Information (ExCCI) Data Packet by Brad Hunt Chief Technology Officer Motion Picture Association.
Connecticut Ave NW, Washington, DC Understanding Patient Engagement in Stage 2 MU: Direct, HIPAA, VDT, and Patient Engagement.
Confidential 1 Corporate Research © THOMSON multimedia, 1999 Mixing cryptography and watermarking for copy protection in consumer electronic devices FURON.
ACCESS 2003 November 11, 2003 Spencer Gusick VP Intellectual Property Counsel Universal Studios If you build it, they will come… Delivery of Content to.
T O P I C ST O P I C S Uses of Technical Measures Case Studies and Types of Technical Measures The Problem of Hacking and Circumvention Online Music Distribution.
Confidentiality and Privacy Controls
© 2000 Verance Corporation Verance Audio Watermarking Technologies for Protection of Digital Audio and Video Joseph M. Winograd, Ph.D. Verance Corporation.
Analog Protection System A Presentation to the Analog Reconversion Discussion Group March 5, 2003 Analog Protection System A Presentation to the Analog.
Analog Reconversion Problem presented by the Motion Picture Association of America to the Analog Reconversion Discussion Group February 12, 2003.
1 Analog Reconversion History CPTWG’s Data Hiding SubGroup (DHSG) CPTWG’s.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
DICOM INTERNATIONAL DICOM INTERNATIONAL CONFERENCE & SEMINAR April 8-10, 2008 Chengdu, China DICOM Security Eric Pan Agfa HealthCare.
1 THE BROADCASTING AGENCY OF THE REPUBLIC OF SERBIA Belgrade, 2012.
1 Reform of the EU regulatory framework for electronic communications What it means for Access to Emergency Services Reform of the EU regulatory framework.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
© 2011 Autodesk Securing AutoCAD IP in the era of WikiLeaks Presenter: Rahul Kopikar Co-Founder, Seclore Technology.
Copy Protection for DVD Video Aline Martin ECE 738 Project – Spring 2005 J.Bloom, I.Cox,T.Kalker,J.P.Linnartz,M.Miller, and C.B.S.Traw.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
CUI Statistical: Collaborative Efforts of Federal Statistical Agencies Eve Powell-Griner National Center for Health Statistics.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Standards and Standardization. Standard Levels Standards preside according to the level. Their effect, image and their scope of work change from one level.
CLOUD AND SECURITY: A LEGISLATOR'S PERSPECTIVE 6/7/2013.
Donald M. Whiteside Vice President, Corporate Technology Group Director, Technical Policy and Standards ITU and EBU Presentation A perspective on trends.
"Managing and Protecting Digital Broadcast Audio, Video and Data on Personal Computers” Dewey Weaver President January 15, 2002.
Agenda Welcome – Don Welch Introduction to CALEA – Mary McLaughlin Non-CALEA Assistance Obligations – Beth Cate CALEA Update – Matt Brill Making the Compliance.
Demos Sharing a document B2B Protected with Policy Tips Departmental Templates Mac Outlook Protected PDF OneDrive / SharePoint Document Tracking.
Millennium Group Update Millennium Group Update Presentation for Copy Protection Technical Working Group September 20, 2000 Presentation for Copy Protection.
Philips ElectronicsMarch 5, 2003 Architecture for Protection of Content Via Watermarks Michael Epstein Raymond Krasinski Philips Electronics.
Proposal for Representative Set of Usage Rights Signaling States presented to the Analog Reconversion Discussion Group April 10, 2003 Brad Hunt Chief Technology.
Module 9 Configuring Messaging Policy and Compliance.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
Doc.: IEEE /0115r1 Submission July 2012 Mika Kasslin, NokiaSlide 1 Design Principles for Entity Responsibilities Notice: This document has been.
SmartRight™ 1 THOMSON multimedia 2001 ©11 july 2001 Copy Protection System for Digital Home Networks CPTWG – July 11, 2001.
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
U.S. DTV Environment Overview TV-Anytime IDE San Jose, CA 20 September 2004 Skip Pizzi Manager, Technical Policy Media/Entertainment & Technology Convergence.
Applying Digital Watermarking Technology to Control CD copying BY CHAYAN RATTANAVIJAI.
2003/10/231 Proposal for ARDG 2003/10/22 Kenwood Corporation.
Module 7 Planning and Deploying Messaging Compliance.
Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.
Technical Meeting on Milestones for nuclear power infrastructure development Radiation Protection Khammar Mrabit Head, Regulatory Infrastructure and Transport.
Slide 1 SONY PICTURES ENTERTAINMENT CONFIDENTIAL Security requirements for early window consumer services Spencer Stephens and Tim Wright Version 0.1 SONY.
ISO/IEC 27001:2013 Annex A.8 Asset management
Agenda Analog Reconversion Discussion Group February 12 th, 2003 Washington D.C. 9:30am Welcome – CPTWG Co-chairs’ introduction 10:00am Overview of new.
CPTWG Jan05© Copyright SVP1 Secure Video Processor Eli Hibshoosh Open Platform for Content Protection.
ACS Primary Authority Assured Advice James Lowman.
Secure Digital Music Initiative (SDMI) Overview Provided by Texas Instruments June, 2000.
Doc.: IEEE g Submission November, 2010 Roberto Aiello, ItronSlide 1 Project: IEEE P Working Group for Wireless Personal Area.
Mar RTLAB KNU1 DTCP (Digital Transmission Content Protection) Real Time Systems Lab. KNU Myung Jin, Lee Hitachi, Ltd. Intel Corporation MEI (Matsushita.
SIPREC Conference Recording (draft-kyzivat-siprec-conference-use-cases-00) IETF 87, November 4, 2013 Authors: Michael Yan, Paul Kyzivat, Simon Romano.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Twenty-First Century Communications and Video Accessibility Act of 2010 (CVAA) Public Law and Public Law Wireless RERC and CTIA Accessibility.
Protection of Personal Information Act An Analysis on the impact.
1 CPTWG MEETING #78 January 13, 2003 Legislative/Regulatory Update [Happy New Year] Jim Burger CPTWG MEETING #78 January 13, 2003.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Applying Digital Watermarking Technology to Control CD copying
Content protection for 4k
Digital Transmission Content Protection (DTCP)
Red Flags Rule An Introduction County College of Morris
4K Content protection overview
Open access in the post-2014 REF: an overview
Fun Stuff: Digital Media
Presentation transcript:

November 28, 2001 CPTWG Protecting Against Unauthorized Redistribution of Digital Broadcast Content Presentation to the CPTWG Intel, Hitachi, Matsushita, Sony and Toshiba

November 28, 2001 CPTWG Problem Statement Currently, there is no enforceable technical means to prevent unauthorized redistribution of unencrypted digital terrestrial broadcasts. A solution for such content is needed that would:   Enable content owners to signal application of content protection.   Avoid deletion or alteration of such signaling means.   Prevent unauthorized routing of protected content to unprotected digital outputs and unauthorized recording technologies.   Not interfere with lawful consumer recording and enjoyment of broadcast content.

November 28, 2001 CPTWG Challenges Achieve consensus on signaling means - broadcast flag (BF, ATSC flag for US use) and broadcast watermark (BW, the consensus watermark) - to signal application of protection against unauthorized redistribution for unencrypted digital terrestrial broadcast content. Develop compliance and robustness rules to govern the secure handling of unencrypted digital terrestrial broadcast content received by CE and IT products.   From tuner through to authorized outputs and recording technologies.

November 28, 2001 CPTWG Unmarked Content Technical Proposal TunerTSP Present? Yes No In-the-clear, terrestrial digital broadcast content Detect either BF or BW at election of implementer Received Content Marked Content Permitted recording technologies and methods Permitted physical outputs

November 28, 2001 CPTWG Definitions “Received Content” is digital terrestrial broadcast content that has been processed by a digital demodulator. “Marked Content” is Received Content that has been screened for either the BF or BW and determined to contain such signaling means. “Unmarked Content” is Received Content that has been screened for either the BF or BW and determined not to contain such signaling means.

November 28, 2001 CPTWG Compliance Rules Summary Compliant Products: Must comply with specified robustness rules (see next slide). Must ensure Received Content is screened for either the BF or BW at the election of the implementer. Must ensure Marked Content leaves the product only by:   Authorized outputs (e.g., IEEE1394 w/DTCP, DVI w/HDCP, analog, etc.).   Removable media that implement secure recording means (e.g., CPRM, D-VHS, etc.). Subject to the robustness rules, have no limitations concerning the internal   display,   processing or   secure buffering or lawful storage of Received Content. Have no requirements concerning Unmarked Content.

November 28, 2001 CPTWG Robustness Rules Summary Compliant Products must: Not have functions that defeat the compliance or robustness rules. Be designed and manufactured in a manner that provides a specified level of protection against unauthorized routing of Received Content, and against interference with the BF or BW, prior to screening for either of such signaling means. Be designed and manufactured in a manner that provides a specified level of protection against unauthorized routing of Marked Content.

November 28, 2001 CPTWG Proposed Next Steps: invited for a technical discussion of issues related to the proposed solution Multi-industry participation is invited for a technical discussion of issues related to the proposed solution. Make expeditious progress:   Technical and enforcement solutions   Substantial completion by Q1, '02 Meeting following CPTWG today:   Further review and discuss this technical proposal   Organize group and set intermediate milestones and logistics for next series of meetings

November 28, 2001 CPTWG To Participate in the Working Group: Send an to Send an to  In the body of the message, note that you want to join the “Broadcast Protection” group