130 likes | 192 Views
Upgradeable, cost-efficient solution satisfying high consumer demand with no perceived restrictions. Explore IP security goals, convergence potentials, and concerns to adopt a secure standard.
E N D
IPcypher™ Network Security TechnologiesFor Internet Protocol Networks
MSO’s Flexible (don’t lock into one technology or provider) Upgradeable Cost Efficient ($ / sub) Will it satisfy Hollywood? Consumers No perceived restrictions Goals for IP Security# 1 – No Unauthorized Copies
IP Network conversion – “When?” not “If” Consumer Demand is high More MSO Revenue/ Sub opportunity Asia and other “green field” markets are there already Will ’02 be the year? Convergence – hype or reality?
Vulnerabilities • Access • Establish Unique Identity of Consumer • PPV, Subscription Management (get only what you pay for) • Delivery • Encrypt Data to Eliminate Interception of Content • Playback • Monitor for hacked players, VCR Utilities, etc. • Output • Macrovision, 5C, etc.
Concerns • Whose security standard will be adopted? • Is there a threshold that must be met to license VOD?
IPcypher “Intelligent, real-time, data encryption for IP based networks.” • Real-time encryption:only solution for real-time communications, provides capability of unique session encryption, fully automated supporting broadcast, live events, archived content and real time communications. Process is performed without affecting latency, performance or quality of service. • Intelligent Encryption:IPcypher system can recognize and parse multiple media formats then encrypt at the protocol payload level ensuring persistence and transparency unlike all other solutions that encrypt IP payload. This ensures encryption without data expansion. IPcypher is NOT a tunneling technology. • Persistent encryption: encrypted data can be held securely in network or client storage devices such as a personal video recorder or at any point in the distribution chain without any change to software or hardware of third parties. • Transparent encryption:encrypted data can effectively navigate all devices on IP network such as proxies, NATs, firewalls, caches, storage devices, and client hardware/software processes.
IPcypher “Intelligent, real-time, data encryption for IP based networks.” • Client-side security technologies:provides tamper evidence and tamper monitoring capability for open or semi-open client environments. Prevents data packets from being captured by network stack hacking, screen-scraping, VCR- like utilities, in-circuit emulators, and other techniques. • US government cryptography standards:uses standard encryption technology tested by the US government and approved for NSA, department of defense, and CIA communications. Provides unique session keys and/or massive key rotation based upon standards key management schemes. • Platform and Format Independence:support for a variety of formats including Mpeg 2, Mpeg 4, Windows Media, Real, QuickTime, Video Conferencing (H.323 etc.), Instant Messaging protocols and VoIP. Support for a variety of platforms and operating systems including Wireless 3G technology and devices.
Standard Packet Protected Content TCP/UDP Header Content TCP/UDP Header Content TCP/UDP Header IP Header IP Header IP Header Widevine IPcypher Packet IPSec Packet Potential difference of up to 285 bytes per protected packet when compared to IPSEC. IP Header ESP Header ESP Trailer IPcypher packet vs. IPSEC packet
Widevine IPcypher Client Security • Tamper Resistance – E-shield • Tamper Hardening Technology that makes alterations of the security difficult. • Tamper Monitoring - ActiveGuard • Tamper evidence technology monitors the integrity of security on a computer or device. Constantly monitors different operational characteristics of the operating environment. Functions in both on and offline modes. • Tamper Response • Executes the appropriate tamper response as dictated by MSO’s business rules.
IPcypher Unicast Configuration IPcypher software performs all functions including key generation and management
Multicast configuration - CA/Smart Cards • Extending existing Conditional Access Systems to support IP. • Integrating with Smart Card systems. • Providing technologies for companies looking to delivery CA services. • The Widevine IPcypher system can also be integrated easily with ANY existing key management schemes.
IPcypher™ Network Security TechnologiesFor Internet Protocol Networks Tom Claeys VP Business Development tclaeys@widevine.com 206-254-3156 www.widevine.com