Security And DRM - Internet Engineering Task Force

Transcription

Security and DRMJoseph ChouTexas InstrumentsIETF 60 PERM BOF1

Security and DRM DRM is Based on Security Principals Authentication (device, user, service)Key management, data encryption and signature fordata confidentiality and integritySecured delivery of premium content usage rightsCan be used for personal content protectionDRM Interoperability is Needed PERM Interoperability Framework 2

Issues with DRM System Diversity Lack of a unified and open DRM system standardfor PC, CE and mobile handheld devices forbroadcast, internet and packaged contentinteroperabilityCurrent DRM system implementations are notinteroperable Diversity Diversity Diversityof smart card/CI implementationsof internet DRM system implementationsof packaged media content protectionimplementations Mismatches between different trust andprotection modelsMismatches between rights expressionlanguagesConsumer devices cannot locate and connect toall needed services/content3

Diversity of Security, ContentProtection/DRM Implementations Pre-recorded/Recordable content (DVD, DVD-Audio) Internet streaming audio/video content Various DRMs WM DRM 10, Fairplay, Real, Open Magic Gate, OMA, SDMI and etc.Broadcast content CSS (Prerecorded DVD)CPPM (Prerecorded Audio)CPRM (Recordable Audio/Video)Smart Card DRMs DigiCipher, Cable Card ITU-T SG9, DVB-CSA, DirectTV, Multi-2, NDS (ICAM),Irdeto, Nagra, DVB Content Protection and Copy Management (CPCM) and manyothers.Between media client and TV/display HDCP (HDMI/DVI)DTCP/1394/USB (1394/USB)Macrovision (analog TV)4

Rationales of DRM InteroperabilityFramework Users are able to locate and connect to thecontent services that they needA security protocol can be used to protectpersonal contents or clear contents from theoriginal content ownersAn open DRM interoperability standardaccelerates content consumption in the homenetwork and propels device volume growth andthus benefits the consumers, the contentowners and the device manufacturers5

DRM InteroperabilityCSS/CPPMSmart CardHDCP(HDMI/DVI)BroadcastSmart CardCable, Satellite,TerrestrialSTBBB STB/PVRIn the Living RoomCSS/CPRM/CPPMDVD/PVRIn the Living RoomPre-packaged/Personal MediaDVD, CD, SourceDTCP(1394)CSS/CPPMNeed DRMTranscryptionBased onGame ConsoleSecurityPrincipalsVarious DRMs*DRMs*DTVMacrovisionVarious DRMs*DRMs*Various DRMs*DRMs*PC in the DenInternetDVD/MPEG4DSL, CMAccessMedia PlayerPERMVarious DRMs*DRMs*DirectBroadbandAccessMedia ServerAnalog TVMobile/HandheldHNET BridgeAuthenticationEncryptionIntegrityClientAV CableA/V Device6

2 Security and DRM DRM is Based on Security Principals Authentication (device, user, service) Key management, data encryption and signature for data confidentiality and integrity Secured delivery of premium content usage rights Can be used for personal content protection DRM Interoperability is Needed PERM Interoperability Framework