RightsMaster Dwight Cavendish Systems Mazen Abdin Dr Baolin Tan Dr David Robinson Dwight Cavendish Systems RightsMaster Summary Design Principles & Philosophy The Process Conclusion 7 November 2015 ARDG.
Download ReportTranscript RightsMaster Dwight Cavendish Systems Mazen Abdin Dr Baolin Tan Dr David Robinson Dwight Cavendish Systems RightsMaster Summary Design Principles & Philosophy The Process Conclusion 7 November 2015 ARDG.
RightsMaster Dwight Cavendish Systems Mazen Abdin Dr Baolin Tan Dr David Robinson Dwight Cavendish Systems RightsMaster Summary Design Principles & Philosophy The Process Conclusion 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster Design Principles & Philosophy Multi Layer Algorithm Keep It Simple Easy to use Easy to Implement Cost Effective 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster Design Principles & Philosophy Build on Strength Pushing the Innovation Envelope 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster Design Principles & Philosophy Whatever you do will be hacked 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster Design Principles & Philosophy Make difficult to hack Must need Software & hardware anyone can download something from the internet a “black box” must be designed, manufactured, imported, and purchased As a hacker, which would you prefer? 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster Design Considerations Starting point: Millions of legacy source devices DVD players, VCRs, STBs etc Millions of legacy recorders DVD recorders, PVRs, capture cards, VCRs etc 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster Design Considerations As we bring analog rights management into the market place, we enter a transitional phase Compliant and legacy devices will coexist for many many years 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster Design Considerations Legacy and Compliant Equipment Rights management with watermarking only 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster Design Considerations Legacy and Compliant Equipment Rights management with watermarking only Clearly this situation poses a problem We propose a solution… 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster The Process Add rights information to video and audio signals at mastering stage Players add copy protection, if appropriate Recorders detect rights in video and audio signals after re-digitization 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster The Process Analog connection Rights Information Carried within content inserted into video and audio signals through authoring, mastering, and replication 7 November 2015 ARDG Player Recorder adds copy protection if required detects and acts upon rights information Dwight Cavendish Systems RightsMaster The Process Mastering Insert into video and audio signals Increase required hacking effort Easily detect hacking, and block Use strengths of each technology 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster The Process Mastering Insert before MPEG and Dolby encoding No need to insert rights within player Simple to implement at source Ensures every analog output will carry rights information 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster The Process Signal Processing Primary Watermark carries basic rights information Copy Label backs up rights information, and controls “copy once” > “copy no more” 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster The Process Signal Processing Primary Watermark Inserted into audio signal. 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster The Process Signal Processing Primary Watermark Inserted into audio signal. Why? Marking and Detection Easy to Implement 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster The Process Signal Processing Copy Label Inserted into video signal. 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster The Process Signal Processing: Copy Label 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster The Process Rights States: Primary Watermark 0 Play Never 1 Copy Never 2 Copy No More 3 Copy Freely, No Redistribution 4 Copy Freely (no watermark) (further states available for future expansion) 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster The Process Rights States: Copy Label 0 Play Never 1 Copy Never 3 Copy Freely, No Redistribution 4 Copy Freely (no copy label) (further states available for future expansion) 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster The Process Rights States: Copy Label 0 Play Never 1 Copy Never 2 Copy Once / Copy No More 3 Copy Freely, No Redistribution 4 Copy Freely (no copy label) (further states available for future expansion) 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster The Process Copy Once: Mastering Generate a 64-bit random number 1110110010101111100100110001001010010111001010010100010000100011 Store this number in the CL One-way encrypt this number 1110110101011010000010010001101000100001110100101011000111001010 Store the result in the PW 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster The Process Copy Once: Copying Read the number from the CL 1110110010101111100100110001001010010111001010010100010000100011 one-way encrypt the number 1110110101011010000010010001101000100001110100101011000111001010 1110110101011010000010010001101000100001110100101011000111001010 Read the number from the PW Match indicates “Copy Once” 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster The Process Copy Once: Copying On the copy, one-way encrypt the number in the CL This marks the copy “Copy No More” 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster The Process Copy Once: Advantages The Primary Watermark never needs to be re-written The Copy Label is easy to change simplifies recorder processing 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster The Process Copy Once: Advantages The one-way encryption is very secure Has not been hacked in over 20 years of use! Hacker can’t alter CL to give “Copy Once” again 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster The Process Copy Protection Player should add copy protection to “Copy Never” and “Copy No More” content. Dwight Cavendish copy protection is effective on analog (VHS) copies, and analog>digital (DVD-R) copies. 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster The Process Legacy and Compliant Equipment Rights management with DCS RightsMaster 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster The Process Summary Audio Primary Watermark Video Copy Label Insert during mastering Players add Copy Protection 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster Advantages 1. Effective on legacy equipment Including legacy capture cards, which would otherwise provide a gate to the digital world, and software hacking 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster Advantages 2. Simple player circuitry No need to generate or alter watermark in player or recorder 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster Advantages 3. Requires both hardware and software to hack Can’t distribute a complete hack via the internet – need to buy something illegal 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster Advantages 4. Rights maintained through a whole chain of legacy/hacked/non compliant devices As soon as content passes through compliant device, rights are detected and acted upon 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster Advantages 5. Any attempt to clone, separate, or tamper with the audio or video rights information will cause a mismatch. Hacked content will be treated as “copy never”. 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster Advantages 6. Has no impact on picture quality And no one will “imagine” that it does either! 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster Conclusion RightsMaster does what you want… …and more! 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster Conclusion Protection layers: Audio watermark Copy label (Video) Tampering detection with either will activate no play or CP Copy Protection (A/A and A/D) if required 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster Conclusion Hacking is NOT straight forward and requires HARDWARE Legislation and enforcement is possible and EFFECTIVE Simple to Implement Cost effective all round 7 November 2015 ARDG Dwight Cavendish Systems RightsMaster Conclusions Rights present in all analog outputs Effective on legacy devices where ever possible Minimize burden on players and recorders 7 November 2015 ARDG