RightsMaster Dwight Cavendish Systems Mazen Abdin Dr Baolin Tan Dr David Robinson Dwight Cavendish Systems RightsMaster Summary  Design Principles & Philosophy  The Process  Conclusion 7 November 2015 ARDG.

Download Report

Transcript RightsMaster Dwight Cavendish Systems Mazen Abdin Dr Baolin Tan Dr David Robinson Dwight Cavendish Systems RightsMaster Summary  Design Principles & Philosophy  The Process  Conclusion 7 November 2015 ARDG.

RightsMaster
Dwight Cavendish Systems
Mazen Abdin
Dr Baolin Tan
Dr David Robinson
Dwight Cavendish Systems
RightsMaster
Summary

Design Principles & Philosophy

The Process

Conclusion
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Design Principles & Philosophy

Multi Layer Algorithm

Keep It Simple
Easy to use
Easy to Implement

Cost Effective
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Design Principles & Philosophy

Build on Strength

Pushing the Innovation Envelope
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Design Principles & Philosophy

Whatever you do will be hacked
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Design Principles & Philosophy

Make difficult to hack
Must need Software & hardware



anyone can download something from the
internet
a “black box” must be designed, manufactured,
imported, and purchased
As a hacker, which would you prefer?
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Design Considerations

Starting point:
Millions of legacy source devices

DVD players, VCRs, STBs etc
Millions of legacy recorders

DVD recorders, PVRs, capture cards, VCRs etc
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Design Considerations

As we bring analog rights management
into the market place, we enter a
transitional phase

Compliant and legacy devices will
coexist for many many years
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Design Considerations
Legacy and Compliant Equipment
Rights management with watermarking only
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Design Considerations
Legacy and Compliant Equipment
Rights management with watermarking only

Clearly this situation poses a problem

We propose a solution…
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process

Add rights information to video and
audio signals at mastering stage

Players add copy protection, if
appropriate

Recorders detect rights in video and
audio signals after re-digitization
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Analog connection
Rights
Information
Carried within
content
inserted into
video and
audio signals
through
authoring,
mastering, and
replication
7 November 2015
ARDG
Player
Recorder
adds copy
protection if
required
detects and
acts upon
rights
information
Dwight Cavendish Systems
RightsMaster
The Process
Mastering

Insert into video and audio signals
Increase required hacking effort
Easily detect hacking, and block
Use strengths of each technology
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Mastering

Insert before MPEG and Dolby encoding
No need to insert rights within player
Simple to implement at source
Ensures every analog output will carry
rights information
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Signal Processing

Primary Watermark
carries basic rights information

Copy Label
backs up rights information, and controls
“copy once” > “copy no more”
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Signal Processing

Primary Watermark
Inserted into audio signal.
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Signal Processing

Primary Watermark
Inserted into audio signal. Why?
Marking and Detection Easy to Implement
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Signal Processing

Copy Label
Inserted into video signal.
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Signal Processing: Copy Label
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Rights States: Primary Watermark
0 Play Never
1 Copy Never
2 Copy No More
3 Copy Freely, No Redistribution
4 Copy Freely (no watermark)
(further states available for future expansion)
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Rights States: Copy Label
0 Play Never
1 Copy Never
3 Copy Freely, No Redistribution
4 Copy Freely (no copy label)
(further states available for future expansion)
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Rights States: Copy Label
0 Play Never
1 Copy Never
2 Copy Once / Copy No More
3 Copy Freely, No Redistribution
4 Copy Freely (no copy label)
(further states available for future expansion)
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Copy Once: Mastering

Generate a 64-bit random number
1110110010101111100100110001001010010111001010010100010000100011

Store this number in the CL

One-way encrypt this number
1110110101011010000010010001101000100001110100101011000111001010

Store the result in the PW
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Copy Once: Copying
Read the number from the CL

1110110010101111100100110001001010010111001010010100010000100011
one-way encrypt the number

1110110101011010000010010001101000100001110100101011000111001010
1110110101011010000010010001101000100001110100101011000111001010

Read the number from the PW

Match indicates “Copy Once”
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Copy Once: Copying

On the copy, one-way encrypt the
number in the CL

This marks the copy “Copy No More”
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Copy Once: Advantages

The Primary Watermark never needs to
be re-written

The Copy Label is easy to change
simplifies recorder processing
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Copy Once: Advantages

The one-way encryption is very secure
Has not been hacked in over 20 years of
use!
Hacker can’t alter CL to give “Copy Once”
again
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Copy Protection

Player should add copy protection to
“Copy Never” and “Copy No More”
content.

Dwight Cavendish copy protection is
effective on analog (VHS) copies, and
analog>digital (DVD-R) copies.
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Legacy and Compliant Equipment
Rights management with DCS RightsMaster
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
The Process
Summary

Audio Primary Watermark

Video Copy Label

Insert during mastering

Players add Copy Protection
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Advantages

1. Effective on legacy equipment
Including legacy capture cards, which
would otherwise provide a gate to the
digital world, and software hacking
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Advantages

2. Simple player circuitry
No need to generate or alter watermark in
player or recorder
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Advantages

3. Requires both hardware and software
to hack
Can’t distribute a complete hack via the
internet – need to buy something illegal
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Advantages

4. Rights maintained through a whole
chain of legacy/hacked/non compliant
devices
As soon as content passes through
compliant device, rights are detected and
acted upon
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Advantages

5. Any attempt to clone, separate, or
tamper with the audio or video rights
information will cause a mismatch.
Hacked content will be treated as “copy
never”.
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Advantages

6. Has no impact on picture quality
And no one will “imagine” that it does
either!
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Conclusion

RightsMaster does what you want…
…and more!
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Conclusion

Protection layers:

Audio watermark

Copy label (Video)

Tampering detection with either will activate
no play or CP

Copy Protection (A/A and A/D) if required
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Conclusion

Hacking is NOT straight forward and
requires HARDWARE

Legislation and enforcement is possible
and EFFECTIVE

Simple to Implement

Cost effective all round
7 November 2015
ARDG
Dwight Cavendish Systems
RightsMaster
Conclusions

Rights present in all analog outputs

Effective on legacy devices where ever
possible

Minimize burden on players and
recorders
7 November 2015
ARDG