1
Security and DRM
Joseph Chou Texas Instruments
IETF 60 PERM BOF
Security and DRM Joseph Chou Texas Instruments IETF 60 PERM BOF 1 - - PowerPoint PPT Presentation
Security and DRM Joseph Chou Texas Instruments IETF 60 PERM BOF 1 Security and DRM DRM is Based on Security Principals Authentication (device, user, service) Key management, data encryption and signature for data confidentiality
1
IETF 60 PERM BOF
2
DRM is Based on Security Principals
Authentication (device, user, service) Key management, data encryption and signature for
data confidentiality and integrity
Secured delivery of premium content usage rights Can be used for personal content protection
DRM Interoperability is Needed PERM Interoperability Framework
3
Lack of a unified and open DRM system standard
for PC, CE and mobile handheld devices for broadcast, internet and packaged content interoperability
Current DRM system implementations are not
interoperable
Diversity of smart card/CI implementations Diversity of internet DRM system implementations Diversity of packaged media content protection
implementations
Mismatches between different trust and
protection models
Mismatches between rights expression
languages
Consumer devices cannot locate and connect to
all needed services/content
4
Diversity of Security, Content Protection/DRM Implementations
Pre-recorded/Recordable content (DVD, DVD-Audio)
CSS
CSS (Prerecorded DVD)
CPPM
CPPM (Prerecorded Audio)
CPRM
CPRM (Recordable Audio/Video)
Internet streaming audio/video content
Various
Various DRMs DRMs
WM DRM 10, Fairplay, Real, Open Magic Gate, OMA, SDMI and etc.
Broadcast content
Smart Card
Smart Card DRMs DRMs
DigiCipher, Cable Card ITU-T SG9, DVB-CSA, DirectTV, Multi-2, NDS (ICAM),
Irdeto, Nagra, DVB Content Protection and Copy Management (CPCM) and many
Between media client and TV/display
HDCP
HDCP (HDMI/DVI)
DTCP/1394/USB
DTCP/1394/USB (1394/USB)
Macrovision
Macrovision (analog TV)
5
Rationales of DRM Interoperability Framework
Users are able to locate and connect to the
content services that they need
A security protocol can be used to protect
personal contents or clear contents from the
An open DRM interoperability standard
accelerates content consumption in the home network and propels device volume growth and thus benefits the consumers, the content
6
Media Player DVD/MPEG4 Game Console
Broadcast Internet
STB PC in the Den
Media Server HNET Bridge Client
DSL, CM
Access
DVD/PVR In the Living Room BB STB/PVR In the Living Room Mobile/Handheld
A/V Device
Analog TV
Pre-packaged/ Personal Media Source
DTV
Cable, Satellite, Terrestrial DVD, CD,…
AV Cable
Various Various DRMs DRMs* * CSS/CPPM CSS/CPPM CSS/CPPM CSS/CPPM Various Various DRMs DRMs* * HDCP(HDMI/DVI) HDCP(HDMI/DVI) DTCP(1394) DTCP(1394) Macrovision Macrovision Need DRM Need DRM Transcryption Transcryption Based on Based on Security Security Principals Principals
PERM
Direct Broadband Access
Smart Card Smart Card Smart Card Smart Card CSS/ CSS/ CPRM/CPPM CPRM/CPPM Various Various DRMs DRMs* * Various Various DRMs DRMs* *
Authentication Encryption Integrity