1 / 13

IPcypher™

IPcypher™. Network Security Technologies For Internet Protocol Networks. MSO’s Flexible (don’t lock into one technology or provider) Upgradeable Cost Efficient ($ / sub) Will it satisfy Hollywood?. Consumers No perceived restrictions. Goals for IP Security # 1 – No Unauthorized Copies.

masato
Download Presentation

IPcypher™

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IPcypher™ Network Security TechnologiesFor Internet Protocol Networks

  2. MSO’s Flexible (don’t lock into one technology or provider) Upgradeable Cost Efficient ($ / sub) Will it satisfy Hollywood? Consumers No perceived restrictions Goals for IP Security# 1 – No Unauthorized Copies

  3. IP Network conversion – “When?” not “If” Consumer Demand is high More MSO Revenue/ Sub opportunity Asia and other “green field” markets are there already Will ’02 be the year? Convergence – hype or reality?

  4. Vulnerabilities • Access • Establish Unique Identity of Consumer • PPV, Subscription Management (get only what you pay for) • Delivery • Encrypt Data to Eliminate Interception of Content • Playback • Monitor for hacked players, VCR Utilities, etc. • Output • Macrovision, 5C, etc.

  5. Concerns • Whose security standard will be adopted? • Is there a threshold that must be met to license VOD?

  6. IPcypher “Intelligent, real-time, data encryption for IP based networks.” • Real-time encryption:only solution for real-time communications, provides capability of unique session encryption, fully automated supporting broadcast, live events, archived content and real time communications. Process is performed without affecting latency, performance or quality of service. • Intelligent Encryption:IPcypher system can recognize and parse multiple media formats then encrypt at the protocol payload level ensuring persistence and transparency unlike all other solutions that encrypt IP payload. This ensures encryption without data expansion. IPcypher is NOT a tunneling technology. • Persistent encryption: encrypted data can be held securely in network or client storage devices such as a personal video recorder or at any point in the distribution chain without any change to software or hardware of third parties. • Transparent encryption:encrypted data can effectively navigate all devices on IP network such as proxies, NATs, firewalls, caches, storage devices, and client hardware/software processes.

  7. IPcypher “Intelligent, real-time, data encryption for IP based networks.” • Client-side security technologies:provides tamper evidence and tamper monitoring capability for open or semi-open client environments. Prevents data packets from being captured by network stack hacking, screen-scraping, VCR- like utilities, in-circuit emulators, and other techniques. • US government cryptography standards:uses standard encryption technology tested by the US government and approved for NSA, department of defense, and CIA communications. Provides unique session keys and/or massive key rotation based upon standards key management schemes. • Platform and Format Independence:support for a variety of formats including Mpeg 2, Mpeg 4, Windows Media, Real, QuickTime, Video Conferencing (H.323 etc.), Instant Messaging protocols and VoIP. Support for a variety of platforms and operating systems including Wireless 3G technology and devices.

  8. Standard Packet Protected Content TCP/UDP Header Content TCP/UDP Header Content TCP/UDP Header IP Header IP Header IP Header Widevine IPcypher Packet IPSec Packet Potential difference of up to 285 bytes per protected packet when compared to IPSEC. IP Header ESP Header ESP Trailer IPcypher packet vs. IPSEC packet

  9. Widevine IPcypher Client Security • Tamper Resistance – E-shield • Tamper Hardening Technology that makes alterations of the security difficult. • Tamper Monitoring - ActiveGuard • Tamper evidence technology monitors the integrity of security on a computer or device. Constantly monitors different operational characteristics of the operating environment. Functions in both on and offline modes. • Tamper Response • Executes the appropriate tamper response as dictated by MSO’s business rules.

  10. The Widevine IPcypher Framework

  11. IPcypher Unicast Configuration IPcypher software performs all functions including key generation and management

  12. Multicast configuration - CA/Smart Cards • Extending existing Conditional Access Systems to support IP. • Integrating with Smart Card systems. • Providing technologies for companies looking to delivery CA services. • The Widevine IPcypher system can also be integrated easily with ANY existing key management schemes.

  13. IPcypher™ Network Security TechnologiesFor Internet Protocol Networks Tom Claeys VP Business Development tclaeys@widevine.com 206-254-3156 www.widevine.com

More Related