RightsMaster Dwight Cavendish Systems Mazen Abdin Dr Baolin Tan Dr David Robinson Dwight Cavendish Systems RightsMaster Summary Design Principles & Philosophy The Process Conclusion 7 November 2015 ARDG.
Download
Report
Transcript RightsMaster Dwight Cavendish Systems Mazen Abdin Dr Baolin Tan Dr David Robinson Dwight Cavendish Systems RightsMaster Summary Design Principles & Philosophy The Process Conclusion 7 November 2015 ARDG.
RightsMaster
Dwight Cavendish Systems
Mazen Abdin
Dr Baolin Tan
Dr David Robinson
Dwight Cavendish Systems
RightsMaster
Summary
Design Principles & Philosophy
The Process
Conclusion
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Design Principles & Philosophy
Multi Layer Algorithm
Keep It Simple
Easy to use
Easy to Implement
Cost Effective
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Design Principles & Philosophy
Build on Strength
Pushing the Innovation Envelope
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Design Principles & Philosophy
Whatever you do will be hacked
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Design Principles & Philosophy
Make difficult to hack
Must need Software & hardware
anyone can download something from the
internet
a “black box” must be designed, manufactured,
imported, and purchased
As a hacker, which would you prefer?
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Design Considerations
Starting point:
Millions of legacy source devices
DVD players, VCRs, STBs etc
Millions of legacy recorders
DVD recorders, PVRs, capture cards, VCRs etc
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Design Considerations
As we bring analog rights management
into the market place, we enter a
transitional phase
Compliant and legacy devices will
coexist for many many years
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Design Considerations
Legacy and Compliant Equipment
Rights management with watermarking only
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Design Considerations
Legacy and Compliant Equipment
Rights management with watermarking only
Clearly this situation poses a problem
We propose a solution…
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Add rights information to video and
audio signals at mastering stage
Players add copy protection, if
appropriate
Recorders detect rights in video and
audio signals after re-digitization
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Analog connection
Rights
Information
Carried within
content
inserted into
video and
audio signals
through
authoring,
mastering, and
replication
7 November 2015
ARDG
Player
Recorder
adds copy
protection if
required
detects and
acts upon
rights
information
Dwight Cavendish Systems
RightsMaster
The Process
Mastering
Insert into video and audio signals
Increase required hacking effort
Easily detect hacking, and block
Use strengths of each technology
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Mastering
Insert before MPEG and Dolby encoding
No need to insert rights within player
Simple to implement at source
Ensures every analog output will carry
rights information
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Signal Processing
Primary Watermark
carries basic rights information
Copy Label
backs up rights information, and controls
“copy once” > “copy no more”
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Signal Processing
Primary Watermark
Inserted into audio signal.
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Signal Processing
Primary Watermark
Inserted into audio signal. Why?
Marking and Detection Easy to Implement
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Signal Processing
Copy Label
Inserted into video signal.
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Signal Processing: Copy Label
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Rights States: Primary Watermark
0 Play Never
1 Copy Never
2 Copy No More
3 Copy Freely, No Redistribution
4 Copy Freely (no watermark)
(further states available for future expansion)
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Rights States: Copy Label
0 Play Never
1 Copy Never
3 Copy Freely, No Redistribution
4 Copy Freely (no copy label)
(further states available for future expansion)
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Rights States: Copy Label
0 Play Never
1 Copy Never
2 Copy Once / Copy No More
3 Copy Freely, No Redistribution
4 Copy Freely (no copy label)
(further states available for future expansion)
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Copy Once: Mastering
Generate a 64-bit random number
1110110010101111100100110001001010010111001010010100010000100011
Store this number in the CL
One-way encrypt this number
1110110101011010000010010001101000100001110100101011000111001010
Store the result in the PW
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Copy Once: Copying
Read the number from the CL
1110110010101111100100110001001010010111001010010100010000100011
one-way encrypt the number
1110110101011010000010010001101000100001110100101011000111001010
1110110101011010000010010001101000100001110100101011000111001010
Read the number from the PW
Match indicates “Copy Once”
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Copy Once: Copying
On the copy, one-way encrypt the
number in the CL
This marks the copy “Copy No More”
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Copy Once: Advantages
The Primary Watermark never needs to
be re-written
The Copy Label is easy to change
simplifies recorder processing
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Copy Once: Advantages
The one-way encryption is very secure
Has not been hacked in over 20 years of
use!
Hacker can’t alter CL to give “Copy Once”
again
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Copy Protection
Player should add copy protection to
“Copy Never” and “Copy No More”
content.
Dwight Cavendish copy protection is
effective on analog (VHS) copies, and
analog>digital (DVD-R) copies.
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Legacy and Compliant Equipment
Rights management with DCS RightsMaster
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Summary
Audio Primary Watermark
Video Copy Label
Insert during mastering
Players add Copy Protection
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Advantages
1. Effective on legacy equipment
Including legacy capture cards, which
would otherwise provide a gate to the
digital world, and software hacking
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Advantages
2. Simple player circuitry
No need to generate or alter watermark in
player or recorder
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Advantages
3. Requires both hardware and software
to hack
Can’t distribute a complete hack via the
internet – need to buy something illegal
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Advantages
4. Rights maintained through a whole
chain of legacy/hacked/non compliant
devices
As soon as content passes through
compliant device, rights are detected and
acted upon
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Advantages
5. Any attempt to clone, separate, or
tamper with the audio or video rights
information will cause a mismatch.
Hacked content will be treated as “copy
never”.
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Advantages
6. Has no impact on picture quality
And no one will “imagine” that it does
either!
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Conclusion
RightsMaster does what you want…
…and more!
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Conclusion
Protection layers:
Audio watermark
Copy label (Video)
Tampering detection with either will activate
no play or CP
Copy Protection (A/A and A/D) if required
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Conclusion
Hacking is NOT straight forward and
requires HARDWARE
Legislation and enforcement is possible
and EFFECTIVE
Simple to Implement
Cost effective all round
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Conclusions
Rights present in all analog outputs
Effective on legacy devices where ever
possible
Minimize burden on players and
recorders
7 November 2015
ARDG