<<

CONTENT SUPPLIER’S PERSPECTIVE: HOME NETWORKS AND RIGHTS MANAGEMENT

Robert M. Zitter, Craig D. Cuttner Home Box Office

Abstract subsequent distribution windows such as home , pay-per-view, etc. – each Protection, Digital Rights window and its attendant revenue stream is Management, Home Networks and other critical to the total revenue stream that buzzwords are all swirling around in a makes theatrical movie production a viable frenzy that has seemingly pitted content ongoing business. providers against operators and all seem to make consumers appear to be felons. If video programs are available on the Internet at no charge, once the Internet is This paper defines the scope of the issue connected to a digital home network, and discusses the pro- and con-attributes of consumers will be less likely to pay for the a Home Network. services MVPDs offer.

Beginning in the first-steps of initial Distribution Security implementation of “simple” Copy Control Information (CCI) and how that may Over time, cable distribution technology evolve into sophisticated Digital Rights has evolved to thwart the capabilities of the Management (DRM) systems. “consuming public” to circumvent the collection of fees and protect revenues. BACKGROUND Non-standard channel (“mid-band” placement for pay channel security in the Content Value and Cable Value ‘70s) was succeeded by block converter devices and, later, by the cable-ready TV, The ‘sale’ of access to video content has which necessitated trapping. Higher value been a hallmark of the cable television premium TV led to channel scrambling and industry since its inception. Technology fixed (programmed) descrambling STB’s. used in the distribution, securing the Pay per view required addressability – and distribution and the content itself has the consumer’s ability to record high-value evolved over time as has the value of the content led to analog copy control (a/k/a content being distributed. Cable, and other Macrovision). forms of multichannel distribution (MVPDs), are actually the ‘tip of the Each of these steps was necessitated by iceberg’ related to a multi-faceted time- an evolutionary requirement to continue to value food-chain that impacts all aspects of collect revenue to keep growing the cable content. and content industries.

Time-value of content and distribution Likewise, the “robustness” of systems are not new concepts. Hard cover books was driven to sophistication requirements by become mass-market paperbacks and later the day’s environment. Security evolved motion pictures. Theatrical movies have from virtually-none (since early TVs did not generally tune RF non-standard channels), Consumers increasingly want all of their compromised by simple “orange wires” in home electronics products to integrate and set-top-boxes, to sync-suppression provide a ‘greater good’ by using common scrambling – and, in fact, it was not always control systems and making content clear that the consumer electronics products available in different rooms, on different were designed to respect the necessity of devices – including computers, portable cable security – early versions of digital- devices, and, perhaps, vehicles. chassis receivers were able to defeat very sophisticated sync- This need for integration means a suppression scrambling. network – and the “Home Network” connectivity promise soon available to Although there were limited cases of consumers is both a potential revenue source “redistribution” of video programming (e.g. for enhanced services, provisioning, an apartment building with ‘channel-3 management, and maintenance – and a sharing’),. the physical audit capabilities of threat to the distribution-revenue just as has the cable operator, and simple physical occurred in decades past. limitations of single-premium-channel distribution, were adequate limits on the The stakes today, unfortunately, are spreading of content redistribution. much higher.

TODAY’S LANDSCAPE While a crude ‘channel-3 network’ might have provided a few like-minded apartment Building on the premise that the “on/off” dwellers a single-channel of HBO in the nature of (traps, 1970’s – one copy of a motion picture on the addressability, or other forms of access Internet has devastating impact on the denial) was appropriate to the consumer’s revenue stream before, during and after the then-current abilities to circumvent those cable window. The impact will be more systems. Further building on the ability to devastating now that the value of cable use simple analog Macrovision as an content has significantly increased – and appropriate means to prevent analog VCR more of that content is original-to- cable, as copies in the PPV window – where does that its first exhibition window. leave us today? First Steps in Security – Basic Conditional Digital cable-ready receivers will soon be Access able to be directly-attached to cable systems; digital VCR and DVD burning devices are The FCC and industry economics have growing in popularity, and the fastest- dictated the first steps to continue the growing segment of the (IT) computer evolution of cable security – the one-way industry, the ‘Media Center PC’ – promotes digital cable ready television is a reality. a video program guide, Digital Video Recording and DVD-burning. Using contemporary industry-standard digital encryption techniques, the Clearly, the next evolution in conditional CableCARD™ can take the best-of-breed access, content security – and potential new conditional access systems deployed today revenue streams are upon us. and integrate it into a consumer-purchased host device. As required by the Digital Millennium Copyright Act (DMCA), no used to ensure that the host device properly consumer-accessible ‘in-the-clear’ streams adheres to the PHILA principles. are available courtesy of DFAST encryption. 2. Compressed Firewire (1394) – the It is important to note that the current ‘5C’ (DTCP) regime is implication in the nature of consumer specifically tailored for high-speed behavior is that “in the clear” is a direct tie compressed applications. to “distributed on the Internet” without recourse. It is the need to encrypt content 3. Uncompressed DVI (also HDMI) – securely to both maintain its value and retain the ‘HDCP’ copy protection regime is legal protections under DMCA. specifically tailored for uncompressed digital such as might be transported CableCARD, however, is only the first- between a host device and display device. step evolution of an integrated TV / set top – and it alone does not provide functionality These copyright protection systems for the Home Network as consumers would protect, generally, a source-to-sink deploy it. relationship and convey only ‘basic’ copy control states. (Generally, signals in this In a consumer environment, more context, originate in a “source” device and connections than cable-to-host / display are are consumed in a “sink” device. A set top envisioned. Modular components (set top to is an example of a source, a TV display is a plasma display; recorder to display; media sink.) storage to display) begin to form the basis of a series of output to input links – all digital – The ability to separately enable and hence all needing some form of copyright disable items 2 and 3 (above), is referred to protection to prevent ‘unprotected copying as “selectable output control” which was a and redistribution.’ Each type of interface point of considerable discussion during the has a defined and approved copy protection Plug and Play negotiation. system and is a overall part of the ‘Plug-and Play Agreement’ tied to a set of principles Second Step – (Unprotected Interfaces) and rules that govern access to and use of cryptographic keys that control system Analog video, in many contemporary behavior. consumer devices today, is routinely converted from analog to digital in a very Second Step – (Protected Interfaces) high-quality manner. Once that conversion has occurred, all of the concerns about As secure digital interfaces require copyright protection, Internet redistribution, copyright protection regimes, there are etc. equally apply to the converted . systems appropriate to the major interfaces: This is the so-called “Analog Hole.”

1. The CableCARD itself – although NTSC composite analog video is not intended for consumer access, the pins “protected” only to the extent that of the card interface could be intercepted Macrovision may be applied as a part of the during their transport of high-value content ‘copy never’ state. CGMS-A may also be – thus, the DFAST encryption system is present to signal other copy control states, but may be removed by some consumer devices, thus it is not, by itself, sufficient for authoritative signaling. Further, the “low- Home Network Topology quality” nature of NTSC limits the quality of Secure copies that may be made from either the Video original analog or digital copies thereof. Home TV Display Network

Component analog video interfaces are

higher quality than NTSC, and can support DVR very-high quality signals up to high- “The Internet” definition. Considering the weaknesses of CGMS-A noted above, and the fact that only certain resolutions and formats of component analog support a vertical There are two other “competitors” that blanking interval for carriage of copyright currently are working to be the key control information, there are concerns providers of that home network: about very high-quality analog to digital conversions of component analog. When 1. Consumer Electronics (CE) component interfaces are “unprotected” manufacturers that look at device some content owners necessitate lowering connectivity as an extension of their the picture resolution to that of NTSC, so devices’ functionality – and hope to leverage that analog to digital conversion is less that product benefit into their offerings; effective – thus called “down-resolution” – which is also a point of discussion in the 2. Information Technology (IT) two-way negotiations. manufacturers, recently growing into the traditional CE space by selling Copy protection states are discussed entertainment hardware, have looked at more fully below. home networking as an extension of their data infrastructure – and the increased FUTURE NETWORK FEATURES functionality is also a point of desired benefit. Third Step – Protected Home Network 3. Of course, it is desired that the How do we evolve the current secure and MVPD be included in this list – as a very revenue-generating MVPD distribution key provider with decades of expertise in the infrastructure into a similarly secure (often transport of high-value content – and a key called “trusted”) part of the content participant in the revenue chain that benefits distribution infrastructure? Considering that from the secure transport of content. it is a forgone conclusion that consumer home networks will exist, this is an Currently, neither of these two non-cable important task at hand – as will be discussed potential home network providers are for the remainder of this paper. involved in the revenue stream nor the protection of the time-value of the content in the food chain. Although home networks will exist, it is Copyright protection is necessary to essential that the home network be ‘trusted’ augment conditional access. in the economic sense – and, in the technical realm, ‘robust’ in implementation – unlike Copy Control Modes the previous evolution from traps to scrambling, the stakes are much higher. Generally, there are but a few business model concerns that need protection: If three equal home networks were to evolve, content companies need the same No uncontrolled redistribution on the level of security – and already have Internet – this restriction is mandatory in experience with “trusted” cable networks. every copy ‘restriction’ state – and also a Content security is a “new” feature to the requirement for the ‘Retransmission Control “other two” home network developers. Descriptor’ (RCD) (also known as Thus, MSOs have an advantage because of “”) if the content is not their participation in the revenue chain – and otherwise copy controlled. (Note that the the attendant concerns to preserve security, RCD is currently under industry discussion and to evolve conditional access as they and is not necessarily ratified in standards have before. mentioned below.)

COPY PROTECTION BASICS Copy Once – content marked copy once is restricted to one copy (even on removable Access to Content and archival material), but all playback devices must mark the playback output as In the 1970’s ‘legacy’ consumer “copy no more” to ensure that no subsequent environment, where “on and off” were copies are made. A copy on a device such sufficient business conditions – and there as a Digital Video Recorder (DVR) might be were no recording or distribution issues of ‘moved’ to an archive under the rules of concern – conditional access worked fine at Copy Once. a very simplistic level. As noted, when consumer copying of PPV became a Copy Never – content marked copy never potential threat, copy protection was added. is prohibited from having any recorded copies other than copies that are of short- Today’s access to content, if the duration (convenience-type) copies. environment was devoid of redistribution, copying and there was no desire to increase These three states are communicated by revenue by exploitation of the time value of two binary “bits” in several control content, then simple conditional access messages that are either embedded in would be sufficient. content or sent via control streams. Copy control information (CCI) bits can occur in However, the home network implies some or all of the following forms: connectivity, copying for convenience and device portability – and the risk of • Setup in the configuration of set-top uncontrolled redistribution of high-quality boxes, control software and digital interface content beyond the subscriber is too drivers. In this way permanent modes could economically devastating to ignore. be set via programmer (content provider) direction. • Analog (Copy Generation Management System – Analog (CGMS-A)) BASIC COPY CONTROL STATES bits are sent via Line-20 (International use, standardized by IEC); US VBI Bits Control Mode RCD Redistribution 0 0 Copy Freely 0 Allowed standardization of CGMS-A is included in 1 Prohibited CEA-608-B via Line-21. Note: The intent is 0 1 Copy Once x Prohibited not to restrict analog recording but identify 1 0 Copy Never x Prohibited copyrighted content to downstream Analog 1 1 Copy No More* x Prohibited to Digital (A/D) devices or encoders to give (* sometimes copy no more is flagged as copy never) instructions regarding redistribution and x = “don’t care” copying.

• Other signaling such as Program Map Table (PMT) is under discussion and is HBO / Cinemax linear content is proposed in some technology licensing designated “Copy Once” and HBO / agreements. Cinemax on-demand content is designated “Copy Never.” It is important to note that declaration of copy control mode, the mechanism that sets Fourth Step – Digital Rights Management the mode (whether that control is embedded in the content or ‘authoritative’ via secure The next step in the evolution that channel such as an encryption system) and optimizes the trend in time-value content the type (category) of content that is copy- revenue optimization, secure distribution of controlled is governed by the DMCA, FCC content, copy management, portable device rules, and technology licensing agreements management and takes the role of (so-called “Encoding Rules”). conditional access to its, arguably, ultimate level – is to include digital rights Encoding Rules as proposed by the cable management functionality into a ‘traditional’ and consumer electronics industries (and conditional access system. adopted by the FCC) propose the following ceiling levels (less restrictive levels are DRM will be the tool by which MVPDs allowed for a particular content type, but not and content owners will be able to use more restrictive) for copy control: copyright protection technology to create new consumer offerings rather than simply employing the technology in attempts to • Copy Never: PPV, VOD (on- preserve the status quo. demand PPV), SVOD.

Conditional Access systems, generally, • Copy Once: Linear premium and are ‘trusted’ for their security and have basic television evolved from quite simple on/off gates to

addressable, VOD-enabled, two-way • Copy Freely: Over-the-air broadcast session-based, transactional systems. television (however, the RCD may be applied). Digital Rights Management (DRM) systems, now deploying for Internet-related content delivery, provide basic security (encryption) technology – but have very complex on/off rules – sometimes embedded The integration by a MVPD of an within the content (not necessarily requiring ‘trusted’ conditional access / DRM system a two-way connection). On/Off rules can be into a whole-home-network environment soft descriptions of business cases (such as that exerts authoritative control over content subscription, copying permission, quantity within the network, provides all protected of viewing (e.g. x-views), duration of outputs from the network under that control viewing (self-destruction of copy after y- umbrella, is the genesis of a ‘Trusted days), etc.). Domain.’ Such a secure environment will be necessary to optimize the time-value Signaling the DRM control states is an revenue stream – that has served cable so ongoing industry discussion (“Extended well since its very first paying subscriber. CCI”) and is not yet embodied in cable But, that was a few hundred billion dollars standards or other rules. ago, and there are plenty more to go around.