Download Protecting Content for Mobile TV

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
Protecting Content
for MobileTV
BES Conference
February 2007
Company confidential: Internal usage only.
Agenda
Agenda
Mobile TV
Service & Content Protection
Irdeto Solutions
Company confidential: Internal usage only.
2
Agenda
Agenda
Mobile TV
Service & Content Protection
Irdeto Solutions
Company confidential: Internal usage only.
3
Digital Convergence
Television
Mobile Communications
Television
 Over 4 billion users
Mobile Communications
 Over 2 billion GSM subscribers)
 3 billion subscribers expected by end
of 2010 (Ovum).
Mobile TV



Company confidential: Internal usage only.
Attractive new services
Easy to understand
Successful launch (over cellular network)
… but issue with network capacities
4
The Return Channel


Mobile Broadcasting networks and cellular networks (GSM, GPRS or UMTS)
are complementary to Mobile TV services.
The cellular networks provide a ‘return channel’ for:




Service request
Service charging/payment
Video-on-Demand (VOD)
Other interactive services (voting, betting, information)
Mobile Broadcaster
(DVB-H)
Mobile Netowrk Operator
(GSM, GPRS, UMTS)
Company confidential: Internal usage only.
5
Challenges facing Mobile TV

Regulatory factors


Frequency allocation and Licensing
A true consumers’ value proposition
(not simply a technology)


Technology factors






Network (reception in mobile situation)




Standardization,
Availability of terminals
Interoperability
Similar to Cellular networks
Delivery costs low enough for a profitable
value chain
International roaming ?
Service & Content Protection


To set up a trustworthy environment
To secure revenue streams
Company confidential: Internal usage only.


Consumers


Content (Live TV / TV-on demand / Push
TV, not simply a rebroadcast of terrestrial
content)
Relevant Services (Interactivity, ESG and
additional information)
Positive user experience (Easy to use &
easy to pay service)
Value for money & Straightforward pricing
Demand and acceptance
Business factors


Business models
Co-operation along the value chain (“win-
win”)
6
Agenda
Agenda
Mobile TV
Service & Content Protection
Irdeto Solutions
Company confidential: Internal usage only.
7
Why Service & Content Protection?

Service and Content protection is critical for the success of mobile
business models.
Content Owners
Want to protect the
rights of their assets,
and to control their
consumption
 Want to secure
revenues
 Want Trust in the
delivery mechanism

Service Providers
Want to protect their
return on
investment
 Want to build a
trustworthy network
 Want to optimize
revenues through
multiple subscription
models
Consumers

Company confidential: Internal usage only.
Prepared to pay for
premium content.
 Want choice and
flexibility in the way
they consume
content.

8
Service & Content Protection
Re-Distribution
Live Broadcast
Service Protection
Content Protection
Ensures that only paying
customers have access to content
Controls the use of content
once it has reached the device
Solution:
Conditional Access (CA)
Solution:
Digital Rights Management (DRM)
The two technologies can work together to
protect recorded content !
Company confidential: Internal usage only.
9
Digital Rights Management (DRM)
Company confidential: Internal usage only.
Downloading Services to Mobiles


Pictures
Mobile phones have evolved into
multimedia devices
Technologies enable efficient delivery of
rich multimedia content (from ring tones
to live TV) to mobiles
Ringtones
Games
Video clips
Peer-to-peer connection
Music MP3
Company confidential: Internal usage only.
11
Mobile DRM
Rich multimedia content
is delivered to mobile devices
Protects the interests
of the content rights owner,
by providing a way to control
access to the use and
consumption of digital content
Opportunity to define new ways of selling,
distributing and consuming content
Company confidential: Internal usage only.
12
Standards


Many proprietary standards (e.g. Microsoft, iTunes)
Open standard specified by OMA




The Open Mobile Alliance (OMA) is a mobile industry organization
dedicated to promoting the worldwide adoption of mobile data
services by emphasizing interoperability across devices and
networks.
OMA was formed in June 2002. The 350 member companies
represent the world’s leading mobile operators, device and
network suppliers, information technology companies, application
developers and content providers.
OMA DRM specifications released:
- OMA DRM 1.0 (2004)
- OMA DRM 2.0 (2006)
The IPR licensing terms & conditions are defined by the CMLA
(Content Management License Administrator) which is a licensing
and compliance entity formed to provide a full solution
implementation of OMA DRM 2.0.
Company confidential: Internal usage only.
13
Forward lock
Combined delivery
Separate delivery
Separate delivery
DRM v.1.0
Features:
Combined delivery
Forward lock
OMA DRM 1.0
DRM message
Content
Device prohibited from forwarding
content to other devices
DRM message
Rights
Content
Adds rights definition to control
content usage
Rights
Enable super distribution
Content
Company confidential: Internal usage only.
14
OMA DRM 2.0

Enhanced Security



DRM v.2.0
Features:
More Security
More business
models


Higher security to ensure authenticity and integrity of
both content and right object
Rights object and content encryption key encrypted
using device’s public key to bind to target device
Mutual authentication between device and rights
issuer
Rights issuer can accurately identify device to
determine revocation status (Device revocation)
Support for a variety of distribution and
payment use cases while enhancing user
experience





Company confidential: Internal usage only.
User can preview content
User can register several devices for playback
(Domain)
DRM content can be shared between devices
Non-connected devices acquire content rights via
connected device
Use of removable media/storage
15
OMA DRM Architecture
Content Encryption keys
Content
Issuer
Rights
Issuer
2
Browse to website and
download protected
content
1
Purchase 3
“rights” and
establish
trust
Deliver
protected
rights object
5
Share content
within a user-domain
Company confidential: Internal usage only.
4
Establish
Trust,
6 purchase and
deliver rights
object
Super-distribute
content to a friend
User
16
DRM not suitable for Mobile TV

Device-based DRM does not work for Mobile TV


A breach in Microsoft DRM



“Japanese mobile giant NTT DoCoMo is scrambling to release a new version of its
popular mobile TV handset after unscrupulous users found a loophole allowing
them to watch free mobile TV.” (loss of €250 per handset)
“A program called Fairuse4wm has been posted on the net and is said to be capable
of bypassing Microsoft’s Digital Rights Management (DRM) system.”
“BSkyB has suspended its Sky by Broadband movie service until Microsoft patches a
security loophole in its Windows DRM technology”
Fixing DRM does not work !

"DRM is fundamentally an impossible problem. Making it work at all involves tricks,
and breaking DRM is akin to "fixing" the software so the tricks don't work. Anyone
looking for a demonstration that technical DRM is doomed should watch this story
unfold.” (Bruce Schneier on Microsoft DRM, 15 October 2006)
Company confidential: Internal usage only.
17
Conditional Access (CA)
Company confidential: Internal usage only.
Mobile Broadcast Services


Live broadcast multimedia content is
accessible by mobile phones
Delivers content to a large audience
more cost-effectively than a cellular
network
TV channels
Radio Channels
Data
S-DMB
T-DMB
DVB-H
Company confidential: Internal usage only.
19
Mobile CA
TV and Radio services
delivered to enabled
mobile devices only
Restricts service access
to paying subscribers only
Company confidential: Internal usage only.
20
Mobile Broadcasting Technologies
MBMS (3GPP)
Multimedia Broadcast Multicast Service is a broadcasting service
that requires a UMTS network upgrade.
ISDB-T (NHK)
Terrestrial TV standard in Japan and Brazil. Also usable for mobile TV.
MediaFLO (Qualcomm)
Proprietary technology.
DMB (Digital Multimedia Broadcasting)
Digital radio transmission system for sending multimedia to mobile
devices. Based on Eureka-147 DAB standard
Accepted as a standard by ETSI.
DVB-H (Digital Video Broadcasting-Handheld)
Standard based on DVB-T and adapted to Handhelds
Accepted as a standard by ETSI
Company confidential: Internal usage only.
21
Mobile Broadcasting Technologies
DVB-H
T-DMB
S-DMB
MBMS
FLO
Terrestrial
Terrestrial
Satellite +
Terrestrial
Terrestrial
Terrestrial
DVB-T
DAB
ITU-R Digital
System E
UMTS
CDMA
Channel
size
5,6,7,8 MHz
1.5 MHz
25 MHz
5 MHz
6 MHz
Bit rate
7 to 11 Mbps
1.5 Mbps
7.68 Mbps
0.384 Mbps
Up to 11 Mbps
Band
UHF, VHF, L
UHF, VHF, L
S
(UMTS)
UHF, VHF, L
Up to 12
Up to 30
Up to 3
Up to 30
Network
Origin
Number of
TV channels
Up to 30
Adoption/
Tests
Worldwide
Korea, China,
Europe
Korea
-
US/UK
Strong
Medium
Low
Low
Low
Industry
support
(3 @ 384kbps)
Company confidential: Internal usage only.
22
Competing CA Standards
SIM approach
Device software
approach
BCast smart card profile
Security related functions
in (U)SIM and fully
standardised KMS
Open Security
Framework (OSF)
Proprietary KMS
DRM profile
18Crypt
Extension of
OMA DRM 2.0
to support broadcast.
Fully standardised KMS
Spec. released.
Company confidential: Internal usage only.
Spec. not expected
to be completed before end-2007
23
OSF vs. 18Crypt
Issue with 18Crypt when a breach occurs:

Does the MNO have a dedicated and
specialized team to investigate hacked
phones?

Who is liable?

OSF model



18Crypt model
Company confidential: Internal usage only.
Handset manufacturers will deny
responsibility as they comply with standard
requirements. Moreover there might be a
conflict of interest as a hacked phone might
generate more handset sales
Stack provider, software vendor, OS
provider, …??
If the handset manufacturer does not
solve the breach the content owner will
stop providing content and start legal
action
The keys of the phone can be revoked.
But if one phone is pirated all phones in
that model are very likely to be pirated.
And this might lead to high operational
costs to manage phone replacement or
customer complaints
24
Overall Mobile Architecture
Encoder +
Scrambler
Encoder
Control
Word (CW)
IPE
Modulator
ECMs
EMMs
Irdeto CA
Control System
Subscriber
SMS-C
Management
OTA
server
Company confidential: Internal
usage
only.
System
Irdeto PIsys offers:
 State-of-art security
 Numerous business models
 Simplicity of use
 Ease of integration
 Advanced bandwidth management.
(U)SIM
or SMD
25
Adapting CA solution to Mobile


Mature & proven CA technologies available for Mobile
service protection
Irdeto has developed two innovative technologies:
 Dual Key Hierarchy – limits bandwidth


required for key exchange
Rapid Refresh – increases security
through rapid cycling of rights
Mobile subscribers may be roaming or
powered down for significant periods, but demand
immediate gratification. The delivery of EMMs Over
The Air (OTA) helps in reducing costs and ensures their
rapid delivery to the device.
Company confidential: Internal usage only.
26
Irdeto CA Key Hierarchy
Typical Key Usage
Typical Key
Lifespan
Key Management
Months
Group size: 4,096 ~ 16,380 Devices
Key & Entitlement
Management
Days/Weeks
Group size: 256 ~ 1,792 Devices
CW Provisioning
Hours/Minutes
Per Service/Event
Scrambling
Seconds
Per 10s Content (crypto-period)
Company confidential: Internal usage only.
27
Agenda
Agenda
Mobile TV
Service & Content Protection
Irdeto Solutions
Company confidential: Internal usage only.
28
CA Business Models
Company confidential: Internal usage only.
Supported CA Business Models

Irdeto PIsys for Mobile supports different CA models:
Subscription
Subscription for a fixed duration, can either be a single channel
or a bouquet
Pre-Paid with voucher
Vouchers are entitling particular package and duration. Enabling
via phone (IVR or SMS) or Internet.
Pre-enablement
Free entitlement with flexible channel-choice
Ordered Pay per View
Subscribers order an event via SMS, phone or internet every
time they wish to watch an event
Local Pay per View
Subscriber has credit stored on SIM card. Credits are debited
when the subscriber wishes to watch an event.
Impulse Pay per View
Credit stored on SIM but purchases are reported via return path
to operator for (pre/post) billing and logging purposes
Video on demand
Content to be delivered over the broadcast channel (Push VOD
or nVOD) or over the cellular network (VOD over 3G).
PVR
Push-VOD, DRM models; CA and DRM integration required
Company confidential: Internal usage only.
30
Head-end & Client Architectures
Company confidential: Internal usage only.
Head-end architecture
Content
Scrambler
Simulcrypt
ECMs/CWs
IP Encapsulator
IB EMMs
Encoder
DVB-H
Multiplexer
EIS
Scheduling
System
KMS
Subscriber
Management
System
ECMG
EMMG
Database
Conditional Access System
Company confidential: Internal usage only.
OOB
EMMs
SMS-C
Applet
Mgmt
OTA Server
Components supplied by Irdeto
GSM/
UMTS
32
Client Side Architecture
Mobile Device
DVB-H
ESG
DVB-H
Receiver
SDP
IP Stack
CDP
ESG
Client
Applications
Decoder
Descrambler
CW
EMM
GSM/
UMTS
ECM
SMS
BIP
GSM
Receiver
Content
EMM
KMS
Device
Agent
CA
Applet
ECM/CW
(Softcell)
EMM/Msgs
(U)SIM
Company confidential: Internal usage only.
Components supplied by Irdeto
33
Hardware Component

Irdeto supports 2 secure hardware components:



SMD can be supplied by Irdeto to manufacturer to be placed
directly on the chipboard of their device. This is adapted for:



SMD (Surface Mounted Device)
SIM (Subscriber Identity Module)
Non-connected devices (PDAs, Portable Multimedia Players
(PMPs), in-car devices)
Phones without SIMs (CDMA phones)
SIM is a smart card that securely stores the key identifying a
mobile phone service subscriber, as well as subscription
information, preferences and text messages. The equivalent of
a SIM in UMTS is a Universal Subscriber Identity Module
(USIM). Irdeto will place its secure Java applet on the existing
MNOs SIM card.
Company confidential: Internal usage only.
34
Benefits of the (U)SIM




The (U)SIM is owned by the MNOs. It is their only asset in the mobile device.
MNOs have full control over it. With DVB-H and an Irdeto CA solution, MNOs
will keep ownership of their subscriber base.
The (U)SIM is a tamper resistant device and as such, it offers high levels of
security. With the Irdeto CA solution, the (U)SIM handles all security related
processing (ECMs and EMMs).
The (U)SIM offers easy-to-manage customer relationship. Customer
management and service provisioning can be handled via the OTA server. In
addition, security updates can be managed without swapping terminals or
impacting the customer experience.
Irdeto’s basic requirements for the (U)SIM are:



JavaCard V2.1.2 & Global Platform V2.1.1
Irdeto applet size on (U)SIM: ~30K
Other security related requirements (available upon request).
Company confidential: Internal usage only.
35
Interoperability
Company confidential: Internal usage only.
Technology Partners
Head-End Platforms
Irdeto partners with H/E
equipment vendors to offer
an integrated solution for
broadcasting and mobile
services, including service &
content protection.
Devices
SIM Cards
Irdeto provides the necessary
support to device
manufacturers to ensure
highly reliable and efficient
integrations. The process is
based on field experience
with device manufacturers
for TU Media.
Irdeto’s solution is based on
(U)SIM cards as well as OTA
platforms, together with the
technical expertise of leading
smart card manufacturers.
Company confidential: Internal usage only.
37
Some DVB-H devices
Company confidential: Internal usage only.
38
USPs & Case Studies
Company confidential: Internal usage only.
Irdeto USPs


Proven & Secure technologies: Conditional Access
Solution optimized for Mobile environment

Bandwidth saving techniques
-


Single accountable owner for security
Solution based on the (U)SIM
-

Flexibility
High level of security
Requirement from the MNOs as they have full control on it
Flexibility
-

On-going bandwidth consumption enhancements…
Based on the OSF specification


Dual hierarchy keys
Delivery of rights out-of-band
In case of a breach, only the Irdeto applet needs to be updated. This can
be done over-the-air.
Support of multiple subscription models that can be customized to the
operators’ needs
SimulCrypt
Ease of integration for client (based on experience with over
20 different device manufacturers)
Convergence of CA and DRM based on our knowledge and
expertise in both areas
Company confidential: Internal usage only.
40
Ku-Band
12,214-12,239 GHz
Ku-Band
13,824-13,883 GHz
S-Band
2,630-2,655 GHz
S-DMB
Broadcasting
center

7,877 gap fillers in
2005.
Coverage over 58
cities.
World’s First Mobile Multimedia Broadcasting Service




March 2004: Satellite launch
May 2005: Commercial launch of TU Media service
May 2006: 540,000 subscribers
August 2006: 680,000 subscribers
Company confidential: Internal usage only.
41
Services

15 video channels
Entertainment, Sport, News, Music,
Movie, Drama, Adult, Games,
Education & MLB

Devices
Over 40 different devices including
mobile Phones, PDAs, in-car devices,
PMPs.
19 audio channels
Pricing

Initial Subscription fee:
Approx. US$16

Monthly Subscription fee:
Approx. US$10-12.5

Premium Channel:
US$ 3-4 per month
Company confidential: Internal usage only.
Irdeto supplied over 2 millions SMDs/SIMs to the Korean
S-DMB device manufacturers.
42
Service launched before the 2006
world cup of Football in Germany on
May 31st, 2006.
(Berlin, Stuttgart, Köln, Frankfurt,
München, Nürnberg, Hamburg,
Leipzig, Hannover, Dortmund,
Gelsenkirchen, Saarbrücken)
Services
4 video channels
 2 DAB audio channels

Pricing
24 months subscription contract
 Monthly subscription fee: € 9.95
 Samsung handset: € 169
 LG handset: € 99

Company confidential: Internal usage only.
43