Copy Protection Technical Working Group Presentation September 2005

Download Report

Transcript Copy Protection Technical Working Group Presentation September 2005

QuickTime™ and a
TIFF (LZW) decompressor
are needed to see this picture.
Copy Protection Technical Working Group
Presentation
September 2005
All Content Enclosed in this Briefing is either public domain, marketing material, or
technical information from open sources or educational text book material.
QuickTime™ and a
TIFF (LZW) decompressor
are needed to see this picture.
Jon Paul Javellana
Vice President Operations
www.optikeysecurity.com
[email protected]
(323)620-2868 cell
All Content Enclosed in this Briefing is either public domain, marketing material, or
technical information from open sources or educational text book material.
Introduction: Optikey
•
An Authentication and Verification System that can be Tailored to
Meet Complex or Simplistic Ultra High Security Requirements.
–
Ranging from simple Pass/Fail to secure storage and verification of
Large Volumes data
–
Can Either Replace or Augment Existing Anti-Counterfeit and
Security Technologies.
5/20/2016
.
3
QuickTime™ and a
TIFF (LZW) decompressor
are needed to see this picture.
OptikeyTM Pedigree
• Optikey was originally developed under government contract as an authentication system
to meet current and anticipated shortfalls in PURELY DIGITAL anti-counterfeiting methods for
HIGH SECURITY GOVERNMENT APPLICATIONS.
– U.S. Government and Commercial Investment
• National Institute of Standards and Technology (NIST) www.nist.gov, US Air
Force (Hanscom AFB) Sensors Directorate (AFRL/SNHC), and US Army
funded development.
• Competitively Awarded SBIR (Small Business Innovative Research) Contract to
Physical Optics Corporation www.poc.com in Torrance, CA
• Private Investment Leading to Several Patents
– Optikey, LLC www.optikeysecurity.com
• Exclusive Worldwide License for OptikeyTM
• Strategic Relationship with Physical Optics Corporation (POC)
• Management and Engineering Resources
– Defense, Aerospace and Entertainment Industries
5/20/2016
.
4
QuickTime™ and a
TIFF (LZW) decompressor
are needed to see this picture.
The OptikeyTM Team
Bringing OptikeyTM to Market
QuickTime™ and a
TIFF (LZW) decompressor
are needed to see this picture.
OptikeyTM Designer & Developer
Exclusive Worldwide Licensee
U.S. Government (SBIR* Contract)
Functional and Operational Management
National Institute of Standards and Technology
Business Development and Strategic Planning
Competitively Awarded Small Business Innovative
Research Contract to Physical Optics Corporation
Program/Project Management
Sole Source
Principal Contracting Agency
Private Investment
Product and Technical Support
Manufacturing Base
Government Marketing Organization
Licensee of Patents
Established Presence in Washington DC
Significant Manufacturing Experience
Experienced with DOD Programs
Existing Manufacturing Licenses with Hitachi for
Light Sensing Diffusers
Established Technology Base
Broad Technology Base Developed by US
Government Contracts
Highly Successful Small Business Track Record
Aerospace Industry Foundation: Hughes Aircraft Company
Commercial Marketing Organization
Established Presence in The Entertainment Industry
Experience in the Motion Picture Industry
Extensive Patent Registrations
5/20/2016
.
Experience in Financial Industry
5
QuickTime™ and a
TIFF (LZW) decompressor
are needed to see this picture.
Why OptikeyTM ?
• Shortfalls of current authentication systems
– VISUAL VERIFICATION SYSTEMS
• Logos, Barcodes, Holograms can all be readily reproduced using home
computers and laser printers.
• Relies on the subjectivity of an observer (normally human) to determine
authenticity.
• Machine readable barcodes were invented for convenience, not security.
Quic kTime™ and a
TIFF (Unc ompres sed) dec ompres sor
are needed to see this pic ture.
5/20/2016
.
6
QuickTime™ and a
TIFF (LZW) decompressor
are needed to see this picture.
Why OptikeyTM ? continued
– PURE DIGITAL VERIFICATION SYSTEMS
• Mag-Stripes, Smart Chips, RFID, Smart Media, CD, DVD etc. contain DIGITAL DATA that
requires a reader to verify its authenticity.
– Still Vulnerable: data that is reproduced or modified cannot be distinguished from data in its original
form. In other words, a copy looks just like the original.
• Encryption techniques
– Increases the size of data
– Limited Effectiveness & Limited Longevity
– With the advent of faster, more powerful computers, encryption techniques have to evolve regularly
to meet the growing threat of more faster, more powerful processors. 128 Bit Encryption today may
not be Robust enough tomorrow.
» Threat is increased by State Sponsored Piracy Programs (China, Ukraine, Iran etc.) and their
respective resources.
» Even small criminal hackers have access to increased computing power with associated
hardware required to crack most digital countermeasures.
– ECONOMICALLY INEFFICIENT as it necessitates upgrading or replacing systems as encryption
requirements increase.
Optikey was developed to address these shortfalls
5/20/2016
.
7
QuickTime™ and a
TIFF (LZW) decompressor
are needed to see this picture.
OptikeyTM Basics
The Difference
•
What Does it do?
 OptikeyTM Integrates a Unique Three Dimensional SUBMICRON ANALOG
STRUCTURE (optical fingerprint) on a Given Medium: DVDs / CDs, Passports, ID
Cards, Credit Cards, Currency, Documents, aircraft parts, or any other high risk items.
QuickTi me™ a nd a
TIFF (Uncompre ssed ) decomp resso r
are need ed to se e th is p icture.
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.

5/20/2016
QuickTime™ and a
TIFF (Uncomp resse d) de com press or
are nee ded to s ee this picture.
Permits ON THE SPOT INSTANTANEOUS VERIFICATION of authenticity by using an
optical reader through Optical correlation. Does not require connection to database.
.
8
QuickTime™ and a
TIFF (LZW) decompressor
are needed to see this picture.
OptikeyTM Basics
•
What Sets Optikey apart?
– Unbreakable ANALOG OPTICAL signature that CANNOT be Successfully Duplicated
(see NIST final report and Optikey Unbreakability White Paper)
•
UNLIKE ENCRYPTION WHICH CAN BE ATTACKED WITH COMPUTING POWER
– Copies made from stolen or compromised Optikey protected items and readers (DVDs
or players) will not correlate.
– The ability to store data using the OPTICAL SIGNATURE that cannot be tampered
with or overwritten.
•
•
Data is stored via a matrix where each data point or BIT is actually an Optikey signature
Since the structure is SUBMICRON, DATA payload is relatively high
– Substantially Lower Cost than Competitive Systems with Very High Rate Production
Capability.
– Easily integrated into many current consumer product lines plagued by piracy and
counterfeiting.
– Works best as a complement to next generation digital encryption technology (I.e.
AACS, AKT)
•
5/20/2016
.
Optikey Functions as a verifier or a key reference that can neither be compromised nor
become obsolete.
9
QuickTime™ and a
TIFF (LZW) decompressor
are needed to see this picture.
The Genesis of OptikeyTM
A Unique Glass Master
• An Ar-ion laser (  457.9 nm) is used to generate speckle patterns. The laser beam is
expanded by a lens and illuminated around a spot of diameter d on a frosted glass diffuser.
Photoresist
Diffuser
d
Ar laser
Lens
Z
• A photo resist-covered plate is set at a distance from the diffuser. As an example, with
d = 8 mm and Z  36 mm this will generate a speckle pattern in the slit with an average
speckle width   1.22Z/d  2.51 m.
• The exposed positive photo resist is dissolved away during development. The resulting
surface feature depth h is on the order of a few microns with smallest surface features in the
order of .2 microns. It is this size of detail that makes copying impossible.
•No controllable wavelength exists which short enough to successfully etch the complex 3-dimensional
topographical structure of OptikeyTM.
• Infinite repetitions of this process always results in a UNIQUE STRUCTURE with no two
alike.
5/20/2016
.
10
QuickTime™ and a
TIFF (LZW) decompressor
are needed to see this picture.
The Hierarchy of OptikeyTM Security
Why a Fraudulent Copy of OptikeyTM Will not Authenticate
Created during a single period of Time
Unique to each client and each iteration
Glass
Master
Lower “Resolution”
XN
Sub-Level
Master
Sub-Level
Master
Sub-Level
Master
Sub-Level
Master
5/20/2016
Sub-Level
Master
.
Sub-Level
Master
Sub-Level
Master
Sub-Level
Master
Sub-Level
Master
Sub-Level
Master
Sub-Level
Master
Sub-Level
Master
Sub-Level
Master
Sub-Level
Master
Sub-Level
Master
Sub-Level
Master
Sub-Level
Master
Sub-Level
Master
XN
Sub-Level
Master
Sub-Level
Master
Sub-Level
Master
Sub-Level
Master
Sub-Level
Master
Sub-Level
Master
XN
Sub-Level
Master
Sub-Level
Master
XN
Sub-Level
Master
Assumption:
Truth:
1. A Correlator/Reader is Stolen At this Lowest Level
2. Reference Structure can be replicated
Generations of Phase Structures Below this Level Made
with a Stolen Sub-Level Master Will be Two Generations
Lower in Analog “Resolution” and Will Not Correlate
With “Fielded” Correlator/Readers
11
QuickTime™ and a
TIFF (LZW) decompressor
are needed to see this picture.
OptikeyTM Correlation
If it is so hard to copy, why so easy to verify?
Two computational stages:
1.
Fourier-fresnel Transform Stage
Performed on Two High-resolution Phase
Patterns (Reference and Disc Phase
Masks) Placed Side by Side Each With
Sub-micron Resolution. The Result of
This Stage Is Joint Power Spectrum
(JPS).
2.
Inverse Fourier-fresnel Transform Stage
Where the JPS Is Used an Input. The
Result of This Stage Is the Correlation
Result Represented by a High-energy
Peak (Dirack Delta) in the Case of
Identical Phase Patterns or Lack of It
(Noise Floor) in a Case of Different
Patterns.
5/20/2016
.
12
QuickTime™ and a
TIFF (LZW) decompressor
are needed to see this picture.
Correlation Operation Results
By comparing the correlation peak against a predefined threshold value the phase
mask authenticity can be determined when the correlation peak is above the threshold
and non-authenticity in the opposite case.
In the case of two identical phase patterns the Inverse FourierFresnel transform of the uniform fringe pattern of the JPS
produces high energy peak (due to the only one special
frequency component of the JPS)
2D Intensity Distribution
Positive Correlation
In the case of two different phase patterns, the Inverse FourierFresnel transform will produce wide range of low energy
peaks signifying diversity of special frequencies in the JPS
No 2D Intensity
Negative Correlation
5/20/2016
.
13
QuickTime™ and a
TIFF (LZW) decompressor
are needed to see this picture.
Military and Government Near Term Customers
US Air Force
Electronic Systems
Command
Hanscom AFB, MA
• Funded US Air Force Demonstration Program
• Optikey is Proposed for Homeland Security Presidential
Directive - 12
• “Standard” identification system for federal employees,
military and contractors
– Electronic Systems Command (ESC), Hanscom AFB, MA
– $1,000,000 FY2005
– Prototype Demonstration Program
– Secured Access to Controlled Facilities and Aircraft
• Have Made Direct Contact with State Homeland Security
Decision Makers
Access
US Army
Electronic Proving
Grounds
• Provided Technical and Program Documents
• Targets:
• Drivers Licenses, State Welfare and Payroll Checks,
Identification Systems
Ft. Huachuca, AZ
Nevada Gaming Commission
• Immediate Requirement for Optikey
• Several Arab Speaking Security Penetrations from
the Mexican Border
5/20/2016
.
• Introductions to be Made by the Nevada
Delegation, US House of Representatives
14
QuickTime™ and a
TIFF (LZW) decompressor
are needed to see this picture.
OptikeyTM HD DVD Security
Optikey, LLC Proprietary Design
•
Objective: Protect the Next Generation High Definition Media (both current and
anticipated technology evolutions) and Content in the Marketplace with a long-term
solution.
•
•
HD DVD or Blue Ray Disc
•
Flash / Stick Media / Next Gen Media
•
Streaming Media
Requirements:
•
Support High Bit Strength Encryption to minimize computer based rips and hacks
• Either Enhance Encryption or be seamlessly integrated with the same
•
Permit serialization of production batches and manufacturer identification
• IFPI numbers ,SID codes, Matrix numbers
•
5/20/2016
Prevent Unauthorized distribution of protected Content
.
15
QuickTime™ and a
TIFF (LZW) decompressor
are needed to see this picture.
OptikeyTM HD DVD Security
Optikey, LLC Proprietary Design
•Solution: Integrate Optikey into both players and media.
–Commercial Pressed Media and Blank Home Use Media would have their own unique Optikey signatures.
Either in location, serialization or both.
–Protected Content; Movies, Music etc. would contain embedded watermark instructions telling the player that
this is PROTECTED CONTENT.
–Media Will Only Play in DVD Players with Optikey Integration based on embedded watermarked instructions.
Removing the Optikey serialization prevents playback.
•Commercial Content “Shrek 2“ can only play if the player reads a commercial disc.
•Home use discs containing burned protected content will not play. Impossible to separate watermark
from movie content.
–We would STRONGLY SUGGEST AKT anonymous Key Technology in lieu of 128 Bit PKI since bit strength
can be increased without increasing size of data packets.
–AKT also allows Key revocation more simply than PKI
–MINOR Modification to Existing Player Architectures.
–MODERATE Modification to Player Software.
5/20/2016
.
16
QuickTime™ and a
TIFF (LZW) decompressor
are needed to see this picture.
OptikeyTM integrated Media
OptikeyTM numbering system
•Data matrix of SECURE Optikey structures
•IFPI numbers
•SID codes (Mastering & Mould)
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
•Matrix Numbers
•Additional coded data
•Can be placed in the same unused inner ring
•May be used as part of Encryption Key
•Conditional Revocable Key
OptikeyTM Difference
•Removal of codes prevents playback
•Tampering Rewriting Optikey IMPOSSIBLE
•Complements overt visible IFPI SID Matrix codes
•Eliminates need to forensically track tool
markings of violating manufacturers
•Allows Simple Differentiation of Commercial
Media vs. Blank Media
•Scaleable for any future media format or
encryption standard
5/20/2016
.
17
QuickTime™ and a
TIFF (LZW) decompressor
are needed to see this picture.
OptikeyTM HD-DVD Integrated Player
BLUE BOXES DENOTE MODIFICATIONS
HD-DVD is “Stamped” with
Fourier Reference Structure
Modify Existing DVD Player Optics With a Movable Reference Structure to Detect
Matched Filter Fourier Reference Structure on Disk
Optikey, LLC Proprietary
5/20/2016
.
18
QuickTime™ and a
TIFF (LZW) decompressor
are needed to see this picture.
Principal Anti-Piracy Methods
Optikey Addresses the Lost Revenue Stream
Hacker equipped with PC
and HD DVD/RW burner
Licensed HD Disc
Production Facility
Camcorder equipped
PIRATE in movie theatre
QuickTime™ and a
TIFF (LZW) decompressor
are needed to see this picture.
Optikey Solution:
• Optikey Analog Authentication signature cannot be reproduced from either players or media.
• Commercial and Blank media discs Will each have unique Optikey signature features.
• Disc players will only play Optikey stamped media according to embedded (watermarked) digital
bit stream instruction. This means protected content media will require playback on production
discs only.
• Serialization of Optikey signatures allows forensic tracking of compromised production facilities
and parties involved. IFPI numbers and SID codes cannot be removed or disc will not play.
• Simplicity of system for integration into whatever final iteration players and media become.
• Stamping of Optikey structure on small parts of the HD disc (part of stamping die)
• Moveable gateway in the laser diode beam path.
• Minor disc player software modification.
19
to address anticipated content protection
for streaming media.
.
5/20/2016 • Ability
QuickTime™ and a
TIFF (LZW) decompressor
are needed to see this picture.
Anti-Hacker Strategy
Commercial Cracking or Home Use Cracking
Hacker equipped with PC
and HD DVD/RW burner
Successfully Decrypts Digital Encryption
and copies media onto hard drive
Burns HD disc onto
blank HOME USE ONLY disc
Burned disc is placed into
Player, but player reads content as
commercial and detects disc as home use.
CONTENT DOES NOT PLAY
5/20/2016
.
HD-DVD is “Stamped”
with Fourier Reference
Structure
20
Modify Existing DVD Player Optics With a Movable
Reference Structure to Detect Matched Filter Fourier
Reference Structure on Disk
QuickTime™ and a
TIFF (LZW) decompressor
are needed to see this picture.
Counter Illegal Re-Production
* The Serialized Optikey Signature is a Reliable and Secure Forensic Tracking System
Licensed HD Disc
Production Facility
Produces unauthorized commercial
discs with Appropriate Optikey
Signature Containing content
for which they have not licensed
QuickTime™ and a
TIFF (LZW) decompressor
are needed to see this picture.
QuickTime™ and a
TIFF (LZW) decompressor
are needed to see this picture.
Discs are found on the market
With Optikey IFPI serial number of
Manufacturer (tamper proof)*
License is revoked
Facility is raided
Criminal Case is begun
5/20/2016
.
QuickTime™ and a
TIFF (LZW ) decompressor
are needed to see this picture.
Men charged after fake DVD raid
June 20, 2005 SOUTHERN CALIFORNIA
HIGH TECH TASK FORCE STAMPS OUT
ILLEGAL DVD/CD REPLICATING PLANT IN
LOS ANGELES
21
QuickTime™ and a
TIFF (LZW) decompressor
are needed to see this picture.
Counter Theater Piracy
Camcorder equipped
PIRATE in movie theatre
Transfers content onto a
HOME USE ONLY DISC
Using varied techniques to spoof camcorders
Pirate is left with unusable recorded DVD
•
Sub audio microphone noise
•
Mistimed frame rates
•
Intermittent audio/visual jamming
5/20/2016
.
22
QuickTime™ and a
TIFF (LZW) decompressor
are needed to see this picture.
Summary and Conclusions
•
Due to the COMPLEXITY and ANALOG NATURE of the Optikey Authentication
Signature, it cannot be successfully reproduced from either the media players nor
the media itself.
•
Optikey is the only NON-OBSOLESCENT SOLUTION. Advances in technology will
not result in a successful hack or “CRACK” of the system.
•
Commercial media and Home Use Blank media will contain unique Optikey signature
features and serialization corresponding to the appropriate content authorized.
•
Disc players can only play Optikey stamped media according to embedded
(watermarked) digital bit stream instruction; Protected content will only play on
pressed commercial discs.
•
Serialization of Optikey signatures allows forensic tracking of compromised
production facilities and parties involved. Removal of such Optikey serialization will
prevent playback.
•
Simplicity of system for integration into whatever final iteration players and media
become.
5/20/2016
•
Stamping of Optikey structure on small parts of the HD disc
•
Moveable gateway in the laser diode beam path.
•
Minor disc player software modification.
•
Ability to address anticipated content protection for streaming media.
•
Compatible for use with digital encryption
.
23
QuickTime™ and a
TIFF (LZW) decompressor
are needed to see this picture.
Optikey LLC
5375 Industrial Drive, Suite 103
Huntington Beach, CA 92649
www.optikeysecurity.com
QuickTime™ and a
TIFF (LZW) decompressor
are needed to see this picture.
William D. Schroer
President
[email protected]
(702)336-2858 cell
Jon Paul Javellana
Vice President Operations
[email protected]
(714)890-1012 office
(714)908-8095 fax
(323)620-2868 cell
All Content Enclosed in this Briefing is either public domain, marketing material, or
technical information from open sources or educational text book material.