1 / 43

Protecting Content for MobileTV

Protecting Content for MobileTV. BES Conference February 2007. Agenda. Agenda. Mobile TV. Service & Content Protection. Irdeto Solutions. Agenda. Agenda. Mobile TV. Service & Content Protection. Irdeto Solutions. Mobile Communications Over 2 billion GSM subscribers)

Download Presentation

Protecting Content for MobileTV

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Protecting Content for MobileTV BES Conference February 2007 Company confidential: Internal usage only.

  2. Agenda Agenda Mobile TV Service & Content Protection Irdeto Solutions Company confidential: Internal usage only.

  3. Agenda Agenda Mobile TV Service & Content Protection Irdeto Solutions Company confidential: Internal usage only.

  4. Mobile Communications Over 2 billion GSM subscribers) 3 billion subscribers expected by end of 2010 (Ovum). Digital Convergence Television Mobile Communications Television • Over 4 billion users Mobile TV • Attractive new services • Easy to understand • Successful launch (over cellular network) … but issue with network capacities Company confidential: Internal usage only.

  5. Mobile Broadcaster (DVB-H) Mobile Netowrk Operator (GSM, GPRS, UMTS) The Return Channel • Mobile Broadcasting networks and cellular networks (GSM, GPRS or UMTS) are complementary to Mobile TV services. • The cellular networks provide a ‘return channel’ for: • Service request • Service charging/payment • Video-on-Demand (VOD) • Other interactive services (voting, betting, information) Company confidential: Internal usage only.

  6. Regulatory factors • Frequency allocation and Licensing • Technology factors • Standardization, • Availability of terminals • Interoperability • Network (reception in mobile situation) • Similar to Cellular networks • Delivery costs low enough for a profitable value chain • International roaming ? • Service & Content Protection • To set up a trustworthy environment • To secure revenue streams Challenges facing Mobile TV • A true consumers’ value proposition (not simply a technology) • Content (Live TV / TV-on demand / Push TV, not simply a rebroadcast of terrestrial content) • Relevant Services (Interactivity, ESG and additional information) • Positive user experience (Easy to use & easy to pay service) • Value for money & Straightforward pricing • Consumers • Demand and acceptance • Business factors • Business models • Co-operation along the value chain (“win-win”) Company confidential: Internal usage only.

  7. Agenda Agenda Mobile TV Service & Content Protection Irdeto Solutions Company confidential: Internal usage only.

  8. Why Service & Content Protection? • Service and Content protection is critical for the success of mobile business models. Content Owners Service Providers Consumers • Want to protect their return on investment • Want to build a trustworthy network • Want to optimize revenues through multiple subscription models • Want to protect the rights of their assets, and to control their consumption • Want to secure revenues • Want Trust in the delivery mechanism • Prepared to pay for premium content. • Want choice and flexibility in the way they consume content. Company confidential: Internal usage only.

  9. Service & Content Protection Re-Distribution Live Broadcast Service Protection Content Protection Ensures that only paying customers have access to content Solution: Conditional Access (CA) Controls the use of content once it has reached the device Solution: Digital Rights Management (DRM) The two technologies can work together to protect recorded content ! Company confidential: Internal usage only.

  10. Digital Rights Management (DRM) Company confidential: Internal usage only.

  11. Downloading Services to Mobiles • Mobile phones have evolved into multimedia devices • Technologies enable efficient delivery of rich multimedia content (from ring tones to live TV) to mobiles Pictures Ringtones Games Video clips Peer-to-peer connection Music MP3 Company confidential: Internal usage only.

  12. Mobile DRM Rich multimedia content is delivered to mobile devices Protects the interests of the content rights owner, by providing a way to control access to the use and consumption of digital content Opportunity to define new ways of selling, distributing and consuming content Company confidential: Internal usage only.

  13. Standards • Many proprietary standards (e.g. Microsoft, iTunes) • Open standard specified by OMA • The Open Mobile Alliance (OMA) is a mobile industry organization dedicated to promoting the worldwide adoption of mobile data services by emphasizing interoperability across devices and networks. • OMA was formed in June 2002. The 350 member companies represent the world’s leading mobile operators, device and network suppliers, information technology companies, application developers and content providers. • OMA DRM specifications released: • OMA DRM 1.0 (2004) • OMA DRM 2.0 (2006) • The IPR licensing terms & conditions are defined by the CMLA (Content Management License Administrator) which is a licensing and compliance entity formed to provide a full solution implementation of OMA DRM 2.0. Company confidential: Internal usage only.

  14. DRM message Forward lock Device prohibited from forwarding content to other devices Content DRM message Combined delivery Forward lock Adds rights definition to control content usage Rights Content Combined delivery Rights Separate delivery Separate delivery Enable super distribution Content OMA DRM 1.0 DRM v.1.0 Features: Company confidential: Internal usage only.

  15. OMA DRM 2.0 • Enhanced Security • Higher security to ensure authenticity and integrity of both content and right object • Rights object and content encryption key encrypted using device’s public key to bind to target device • Mutual authentication between device and rights issuer • Rights issuer can accurately identify device to determine revocation status (Device revocation) DRM v.2.0 Features: • Support for a variety of distribution and payment use cases while enhancing user experience • User can preview content • User can register several devices for playback (Domain) • DRM content can be shared between devices • Non-connected devices acquire content rights via connected device • Use of removable media/storage More Security More business models Company confidential: Internal usage only.

  16. Content Encryption keys Content Issuer Rights Issuer Share content within a user-domain OMA DRM Architecture 2 Purchase “rights” and establish trust 3 Establish Trust, purchase and deliver rights object 4 Browse to website and download protected content 6 Deliver protected rights object 1 5 Super-distribute content to a friend User Company confidential: Internal usage only.

  17. DRM not suitable for Mobile TV • Device-based DRM does not work for Mobile TV • “Japanese mobile giant NTT DoCoMo is scrambling to release a new version of its popular mobile TV handset after unscrupulous users found a loophole allowing them to watch free mobile TV.” (loss of €250 per handset) • A breach in Microsoft DRM • “A program called Fairuse4wm has been posted on the net and is said to be capable of bypassing Microsoft’s Digital Rights Management (DRM) system.” • “BSkyB has suspended its Sky by Broadband movie service until Microsoft patches a security loophole in its Windows DRM technology” • Fixing DRM does not work ! • "DRM is fundamentally an impossible problem. Making it work at all involves tricks, and breaking DRM is akin to "fixing" the software so the tricks don't work. Anyone looking for a demonstration that technical DRM is doomed should watch this story unfold.” (Bruce Schneier on Microsoft DRM, 15 October 2006) Company confidential: Internal usage only.

  18. Conditional Access (CA) Company confidential: Internal usage only.

  19. S-DMB T-DMB DVB-H Mobile Broadcast Services • Live broadcast multimedia content is accessible by mobile phones • Delivers content to a large audience more cost-effectively than a cellular network TV channels Radio Channels Data Company confidential: Internal usage only.

  20. Mobile CA TV and Radio services delivered to enabled mobile devices only Restricts service access to paying subscribers only Company confidential: Internal usage only.

  21. Mobile Broadcasting Technologies MBMS (3GPP) Multimedia Broadcast Multicast Service is a broadcasting service that requires a UMTS network upgrade. ISDB-T (NHK) Terrestrial TV standard in Japan and Brazil. Also usable for mobile TV. MediaFLO (Qualcomm) Proprietary technology. DMB (Digital Multimedia Broadcasting) Digital radio transmission system for sending multimedia to mobile devices. Based on Eureka-147 DAB standard Accepted as a standard by ETSI. DVB-H (Digital Video Broadcasting-Handheld) Standard based on DVB-T and adapted to Handhelds Accepted as a standard by ETSI Company confidential: Internal usage only.

  22. Mobile Broadcasting Technologies Company confidential: Internal usage only.

  23. Competing CA Standards Spec. not expected to be completed before end-2007 Spec. released. Company confidential: Internal usage only.

  24. OSF vs. 18Crypt Issue with 18Crypt when a breach occurs: • Does the MNO have a dedicated and specialized team to investigate hacked phones? • Who is liable? • Handset manufacturers will deny responsibility as they comply with standard requirements. Moreover there might be a conflict of interest as a hacked phone might generate more handset sales • Stack provider, software vendor, OS provider, …?? • If the handset manufacturer does not solve the breach the content owner will stop providing content and start legal action • The keys of the phone can be revoked. But if one phone is pirated all phones in that model are very likely to be pirated. And this might lead to high operational costs to manage phone replacement or customer complaints OSF model 18Crypt model Company confidential: Internal usage only.

  25. Control Word (CW) (U)SIM or SMD Overall Mobile Architecture Irdeto PIsys offers: • State-of-art security • Numerous business models • Simplicity of use • Ease of integration • Advanced bandwidth management. Encoder + Scrambler Encoder IPE Modulator ECMsEMMs Irdeto CA Control System Subscriber Management System SMS-C OTA server Company confidential: Internal usage only.

  26. Adapting CA solution to Mobile • Mature & proven CA technologies available for Mobile service protection • Irdeto has developed two innovative technologies: • Dual Key Hierarchy – limits bandwidth required for key exchange • Rapid Refresh – increases security through rapid cycling of rights • Mobile subscribers may be roaming orpowered down for significant periods, but demand immediate gratification. The delivery of EMMs Over The Air (OTA) helps in reducing costs and ensures their rapid delivery to the device. Company confidential: Internal usage only.

  27. Irdeto CA Key Hierarchy Company confidential: Internal usage only.

  28. Agenda Agenda Mobile TV Service & Content Protection Irdeto Solutions Company confidential: Internal usage only.

  29. CA Business Models Company confidential: Internal usage only.

  30. Supported CA Business Models • Irdeto PIsys for Mobile supports different CA models: Company confidential: Internal usage only.

  31. Head-end & Client Architectures Company confidential: Internal usage only.

  32. KMS EMMG ECMG EIS IP Encapsulator Multiplexer SMS-C OTA Server Encoder Scheduling System Scrambler Database Subscriber Management System Head-end architecture Content SimulcryptECMs/CWs DVB-H IB EMMs GSM/UMTS OOB EMMs AppletMgmt Conditional Access System Components supplied by Irdeto Company confidential: Internal usage only.

  33. Client Side Architecture Mobile Device DVB-H ESG Client Applications DVB-H Receiver ESG SDP Decoder CDP Descrambler IP Stack Content CW EMM EMM KMS Device Agent (Softcell) CA Applet GSM/UMTS ECM ECM/CW GSM Receiver SMSBIP EMM/Msgs (U)SIM Components supplied by Irdeto Company confidential: Internal usage only.

  34. Hardware Component • Irdeto supports 2 secure hardware components: • SMD (Surface Mounted Device) • SIM (Subscriber Identity Module) • SMD can be supplied by Irdeto to manufacturer to be placed directly on the chipboard of their device. This is adapted for: • Non-connected devices (PDAs, Portable Multimedia Players (PMPs), in-car devices) • Phones without SIMs (CDMA phones) • SIM is a smart card that securely stores the key identifying a mobile phone service subscriber, as well as subscription information, preferences and text messages. The equivalent of a SIM in UMTS is a Universal Subscriber Identity Module (USIM). Irdeto will place its secure Java applet on the existing MNOs SIM card. Company confidential: Internal usage only.

  35. Benefits of the (U)SIM • The (U)SIM is owned by the MNOs. It is their only asset in the mobile device. MNOs have full control over it. With DVB-H and an Irdeto CA solution, MNOs will keep ownership of their subscriber base. • The (U)SIM is a tamper resistant device and as such, it offers high levels of security. With the Irdeto CA solution, the (U)SIM handles all security related processing (ECMs and EMMs). • The (U)SIM offers easy-to-manage customer relationship. Customer management and service provisioning can be handled via the OTA server. In addition, security updates can be managed without swapping terminals or impacting the customer experience. • Irdeto’s basic requirements for the (U)SIM are: • JavaCard V2.1.2 & Global Platform V2.1.1 • Irdeto applet size on (U)SIM: ~30K • Other security related requirements (available upon request). Company confidential: Internal usage only.

  36. Interoperability Company confidential: Internal usage only.

  37. Technology Partners Company confidential: Internal usage only.

  38. Some DVB-H devices Company confidential: Internal usage only.

  39. USPs & Case Studies Company confidential: Internal usage only.

  40. Irdeto USPs • Proven & Secure technologies: Conditional Access • Solution optimized for Mobile environment • Bandwidth saving techniques • Dual hierarchy keys • Delivery of rights out-of-band • On-going bandwidth consumption enhancements… • Based on the OSF specification • Single accountable owner for security • Solution based on the (U)SIM • Flexibility • High level of security • Requirement from the MNOs as they have full control on it • Flexibility • In case of a breach, only the Irdeto applet needs to be updated. This can be done over-the-air. • Support of multiple subscription models that can be customized to the operators’ needs • SimulCrypt • Ease of integration for client (based on experience with over 20 different device manufacturers) • Convergence of CA and DRM based on our knowledge and expertise in both areas Company confidential: Internal usage only.

  41. Ku-Band 12,214-12,239 GHz Ku-Band 13,824-13,883 GHz S-Band 2,630-2,655 GHz 7,877 gap fillers in 2005. Coverage over 58 cities. S-DMB Broadcasting center • World’s First Mobile Multimedia Broadcasting Service • March 2004: Satellite launch • May 2005: Commercial launch of TU Media service • May 2006: 540,000 subscribers • August 2006: 680,000 subscribers Company confidential: Internal usage only.

  42. Company confidential: Internal usage only.

  43. Company confidential: Internal usage only.

More Related