Presentation is loading. Please wait.

Presentation is loading. Please wait.

4K Content protection overview

Similar presentations


Presentation on theme: "4K Content protection overview"— Presentation transcript:

1 4K Content protection overview
Sony Pictures Technologies June 15th, 2012 12/30/2018

2 Introduction 4k is a new opportunity for Sony, Consumers and Content Providers 4k is a “green field” for all stake holders The Studios will set a high bar for 4k content protection This presentation will outline a comprehensive approach to 4k content protection 12/30/2018

3 Media path during playback Monitoring & Takedowns Forensics
Critical Focus Areas Media path during playback Monitoring & Takedowns Forensics Revocation & Renewal 12/30/2018

4 High-Level Model of Video Path
12/30/2018

5 (1) Decryption / Decoding
Threats Attacker extracts Device Key Attacker extracts Content Key Attacker captures decrypted compressed content Mitigations Unique software diversity per Device/Title Decode in Trusted Execution Environment Device keys protected by a Hardware Root of Trust Only distribute Content Key over the Internet (i.e. keys not distributed on physical media) Require 3rd party verification of trusted DRM software 12/30/2018

6 Security Solutions Function NDS Solution Platforms Android IOS Win 8
MacOS PS3 XBox CE (TV, Blu-ray) Software diversity Moving target technology Trusted Execution Environment Trust Zone Intel, AMD Custom in SoC Hardware Root of Trust Secure boot, root/jailbreak detect Code hardening ? Watermark insertion [what is their watermark technology called?] Breach monitoring & response

7 (2) Framebuffer Threats Mitigations
Attacker captures raw frames from framebuffer Mitigations Use protected framebuffer (e.g. TrustZone) Use secured links to video hardware (e.g. Nvidia) 12/30/2018

8 (3) HDCP Source Threats Mitigations
Attacker captures raw frames from hacked driver Attacker captures raw frames from hacked video hardware Mitigations Require HDCP 2.1 for source devices Never send unencrypted frame data to video drivers/hardware Only send frame data to protected video hardware on SoC (e.g. TrustZone) Require 3rd party verification of trusted hardware 12/30/2018

9 (4) HDCP Sink Threats Mitigations
Attacker captures video from HDMI to analog interface Attacker creates HDCP stripper with stolen/generated Device Key Mitigations Require HDCP 2.0 or higher for sink devices Tie forensics to devices used in video path 12/30/2018

10 (5) Screen Threats Threats Mitigations
Attacker captures video from screen using camera Mitigations Forensically watermark content to identify user account and playback devices Revoke devices that have been used for content theft 12/30/2018

11 Monitoring & Takedowns
Trust Authority monitors file sharing networks for breaches Fingerprinting and watermarking data retrieved from illegally shared content Takedown notices automatically sent to services 12/30/2018

12 Fingerprinting used to identify content on sharing networks
Forensics Fingerprinting used to identify content on sharing networks Watermarking used to identify devices used in video path as well as user account that content was registered to 12/30/2018

13 Revocation & Renewal Devices and user accounts identified from forensics are immediately revoked Trust Authority works with manufacturers to identify circumventions used by attackers Countermeasures developed and deployed globally Some new content may prevent playback on certain devices until firmware is up-to-date 12/30/2018

14 Security Vendor Selection
Years 1-7 Years 8-14 Security Vendor Security Vendor 1 Security Vendor 2 Security Vendor 1 Security Vendor 2 Vendor’s Technology Vendor’s Technology Vendor’s Technology Vendor’s Technology Vendor’s Technology Implementation 1 Implementation 2 Content Protection Content Protection 1 Content Protection 2 Transition accomplished by renewability 3rd Party DRM


Download ppt "4K Content protection overview"

Similar presentations


Ads by Google