Automatically Bypassing DRM Protection in Streaming Media
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
DRM) Technology in Contemporary Copyright
The Role of Digital Rights Management (DRM) Technology in Contemporary Copyright Joseph Straus Munich International Forum on the Centennial of Chinese Copyright Legislation Renmin University of China, Beijing October 15, 2010 © J. Straus 2010 -1- Points to Consider • Copyright & technology – two old companions – dialectic relationship • Technology promoter of (re)production and distribution of works & challenge of copyright • Digitization – new quantitative & qualitative challenge • Legal & technical response • Where is the right balance of interests: creators & publishers v. users, hardware manufacturers, etc. → social progress? © J. Straus 2010 -2- Copyright & Technology – Two Old Companions China, the Technological Frontrunner • 105 AD - Lun Cai invents paper manufacturing technique • 1041 AD – Sheng Bi invents movable type printing • No legal impact – due to social/intellectual environment [no revolution] and due fragmented to agricultural economy [Chao Xu] © J. Straus 2010 -3- Copyright & Technology – Two Old Companions Europe – the Late(r) Commer • 1439 – Johannes Gutenberg invents movable type printing • 1469 – Johann von Speyer granted printing privilege by the city of Venice • Etching technique (copper engraving) invented – privileges for reproduction granted (Albrecht Dürer) • 15th-17th Century – numerous such privileges granted in Europe Social Revolution (Renaissance, humanism, reformation) & technology & market → protection against copying → printers & publishers, i.e. industry prime beneficiary • Idea of intellectual property -
(12) Patent Application Publication (10) Pub. No.: US 2013/017.9995 A1 Basile Et Al
US 2013 017.9995A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2013/017.9995 A1 Basile et al. (43) Pub. Date: Jul. 11, 2013 (54) SYSTEMS AND METHODS FOR (52) U.S. Cl. AUTHENTICATION OF DIGITAL CONTENT USPC ............................................................ 726/32 (75) Inventors: Carmen Laura Basile, London (GB); Nigh Schottenfeld, Sebastopol, CA (57) ABSTRACT (73) Assignee: United Video Properties, Inc., Santa Clara, CA (US) Systems and methods for authenticating a digital file are (21) Appl. No.: 13/439,103 provided. The systems and methods may operate indepen (22) Filed: Apr. 4, 2012 dently or Supplement existing copy protection systems, such as CSS, and help make them more robust. The digital file may Related U.S. Application Data be stored on a computer readable medium such as a physical (60) Provisional application No. 61/584,506, filed on Jan. disc, digital content downloaded from the Internet, or any 9, 2012. sa- wws other suitable digital content. In some aspects, the systems s and methods described herein include identifying media con Publication Classification tent stored in a digital file that needs to be authenticated, and Subsequently reading Suitably chosen media blocks in (51) Int. Cl. encrypted (and unencrypted) form from the digital file for G06F2L/00 (2006.01) comparison with corresponding blocks (e.g., stored in a data G06F 7/30 (2006.01) base) obtained from a genuine copy. The digital file will be G06F 7/04 (2006.01) authenticated only in the case of a successful match. 1000 10O2 ldentify Media Content Stored in Digital File Retrieve Reference Blocks Based on dentified Content from a Remote Database Identify Media Blocks in the Media Content Corr. -
Ms. Marlene H. Dortch, Secretary Federal Communications Commission 445 12Th St., SW Washington DC 20554
aai American Antitrust Institute Ms. Marlene H. Dortch, Secretary Federal Communications Commission 445 12th St., SW Washington DC 20554 October 21, 2003 Dear Chairman Powell: Subject: Digital Broadcast Copy Protection, MB Docket No. 02-230 We are writing to urge the Commission to carefully consider the consumer effects, the anticompetitive impacts, and the extensive costs that a Broadcast Flag scheme will impose on a wide-range of consumer-electronics devices and personal computers. Despite our efforts to raise these questions about the Broadcast Flag approach—efforts that predate even the Commission’s decision to create a Broadcast Flag docket—they remain unanswered to this day, except by unsupported generalizations that the scheme will cost “pennies.”1 Because the proponents of the Broadcast Flag scheme have yet to address these issues—issues that may not only affect consumer pocketbooks but also may slow or even halt the transition to digital television—we believe the Commission does not yet have the complete record necessary to decide whether and how to implement this scheme. Below we suggest potential remedies to these deficiencies. Here are three of the major questions that remain unanswered in the existing record: After the flag is adopted, will consumers have the same reasonable and customary uses with their digital television content that they enjoy in today’s analog world? The proposal offered by the Motion Picture Association of America makes clear that the Flag scheme will tether user-recorded content in new ways. It will not allow consumers to watch that content on machines other than new, compliant devices (but it is unclear if it will permit recordings to be shared within a user’s own “personal digital network”). -
An Overview of Multimedia Content Protection in Consumer Electronics Devices
An overview of multimedia content protection in consumer electronics devices Ahmet M. Eskicioglu* and Edward J. Delp‡ *Thomson Consumer Electronics Corporate Research 101 W. 103rd Street Indianapolis, Indiana 46290-1102 USA ‡ Video and Image Processing Laboratory (VIPER) School of Electrical and Computer Engineering Purdue University West Lafayette, Indiana 47907-1285 USA ABSTRACT A digital home network is a cluster of digital audio/visual (A/V) devices including set-top boxes, TVs, VCRs, DVD players, and general-purpose computing devices such as personal computers. The network may receive copyrighted digital multimedia content from a number of sources. This content may be broadcast via satellite or terrestrial systems, transmitted by cable operators, or made available as prepackaged media (e.g., a digital tape or a digital video disc). Before releasing their content for distribution, the content owners may require protection by specifying access conditions. Once the content is delivered to the consumer, it moves across home the network until it reaches its destination where it is stored or displayed. A copy protection system is needed to prevent unauthorized access to bit streams in transmission from one A/V device to another or while it is in storage on magnetic or optical media. Recently, two fundamental groups of technologies, encryption and watermarking, have been identified for protecting copyrighted digital multimedia content. This paper is an overview of the work done for protecting content owners’ investment in intellectual property. Keywords: multimedia, copy protection, cryptography, watermarking, consumer electronics, digital television, digital video disc, digital video cassette, home networks. 1. INTRODUCTION In the entertainment world, original multimedia content (e.g., text, audio, video and still images) is made available for consumers through a variety of channels. -
Content Supplier's Perspective
CONTENT SUPPLIER’S PERSPECTIVE: HOME NETWORKS AND RIGHTS MANAGEMENT Robert M. Zitter, Craig D. Cuttner Home Box Office Abstract subsequent distribution windows such as home video, pay-per-view, etc. – each Copyright Protection, Digital Rights window and its attendant revenue stream is Management, Home Networks and other critical to the total revenue stream that buzzwords are all swirling around in a makes theatrical movie production a viable frenzy that has seemingly pitted content ongoing business. providers against operators and all seem to make consumers appear to be felons. If video programs are available on the Internet at no charge, once the Internet is This paper defines the scope of the issue connected to a digital home network, and discusses the pro- and con-attributes of consumers will be less likely to pay for the a Home Network. services MVPDs offer. Beginning in the first-steps of initial Distribution Security implementation of “simple” Copy Control Information (CCI) and how that may Over time, cable distribution technology evolve into sophisticated Digital Rights has evolved to thwart the capabilities of the Management (DRM) systems. “consuming public” to circumvent the collection of fees and protect revenues. BACKGROUND Non-standard channel (“mid-band” placement for pay channel security in the Content Value and Cable Value ‘70s) was succeeded by block converter devices and, later, by the cable-ready TV, The ‘sale’ of access to video content has which necessitated trapping. Higher value been a hallmark of the cable television premium TV led to channel scrambling and industry since its inception. Technology fixed (programmed) descrambling STB’s. -
Copy Protection
Content Protection / DRM Content Protection / Digital Rights Management Douglas Dixon November 2006 Manifest Technology® LLC www.manifest-tech.com 11/2006 Copyright 2005-2006 Douglas Dixon, All Rights Reserved – www.manifest-tech.com Page 1 Content Protection / DRM Content Goes Digital Analog -> Digital for Content Owners • Digital Threat – No impediment to casual copying – Perfect digital copies – Instant copies – Worldwide distribution over Internet – And now High-Def content … • Digital Promise – Can protect – Encrypt content – Associate rights – Control usage 11/2006 Copyright 2005-2006 Douglas Dixon, All Rights Reserved – www.manifest-tech.com Page 2 1 Content Protection / DRM Conflict: Open vs. Controlled Managed Content • Avoid Morality: Applications & Technology – How DRM is impacting consumer use of media – Awareness, Implications • Consumers: “Bits want to be free” – Enjoy purchased content: Any time, anywhere, anyhow – Fair Use: Academic, educational, personal • Content owners: “Protect artist copyrights” – RIAA / MPAA : Rampant piracy (physical and electronic) – BSA: Software piracy, shareware – Inhibit indiscriminate casual copying: “Speed bump” • “Copy protection” -> “Content management” (DRM) 11/2006 Copyright 2005-2006 Douglas Dixon, All Rights Reserved – www.manifest-tech.com Page 3 Content Protection / DRM Content Protection / DRM How DRM is being applied • Consumer Scenarios: Impact of DRM – Music CD Playback on PC – Archive Digital Music – Play and Record DVDs – Record and Edit Personal Content • Industry Model: Content -
DAT330 – Principles of Digital Audio Cogswell Polytechnical College Spring 2009
DAT330 – Principles of Digital Audio Cogswell Polytechnical College Spring 2009 Week 6 – Class Notes Optical Disc Media: CD and DVD Optical Disc Media Design of Optical Media Most optical storage systems store data across the surface of a flat disc. This allows random access of data, as well as ease of manufacturing replication. Because the data is written and read via optical means, there is no physical contact between the media and the pickup. This ensures long media and pickup life and minimizes damage through head crashes or other failures. In addition, a protective layer can be used to protect the data from damages or contamination. Also, multiple data layers can be places within one substrate. Nonetheless, stored data must undergo both modulation and error correction. Data can be stored either along a spiral or concentric tracks. Most optical disc pickups shine a laser on the medium, and the reflected light is detected by a sensor and decoded to recover the carried data. The medium must have two states so that the change between them varies with the reflected light. Data can be represented as a phase change, polarization change, or change in the intensity of reflected light. The resulting variations picked up from the media can be converted into a varying electrical signal for data recovery. Laser beams, having a short wavelength, allow for high information data density and a high SNR needed for a high bit rate. Optical media must be supported by a sophisticated servo system to provide positioning, tracking, focusing of the pickup, and accurate rotation. -
Content Protection Status Report
April 25, 2002 CONTENT PROTECTION STATUS REPORT Overview For many years and within many forums MPAA and its member companies have engaged with the Information Technology (“IT”) and Consumer Electronics (“CE”) industries in collaborative efforts aimed at creating viable markets for digitally delivered media. The development of the DVD standard serves as a shining example of a vibrant consumer market that results when these collaborations hit their mark. While positive progress is being made on many fronts, ever-increasing levels of online piracy may destroy the market for digital entertainment before it has a chance to be fully birthed. In recent Congressional testimony, executives from the motion picture and television industries laid out three key goals that must be attained if this trend toward rampant piracy is to be stemmed and give way to the development of a legitimate market. These include: Goal One: Implementing a “broadcast flag” to prevent the unauthorized redistribution of in-the-clear digital over-the-air broadcast television including its’ unauthorized redistribution over the Internet. Goal Two: Plugging the “analog hole,” that results from the fact that digital devices are not generally designed to respond to current analog protection mechanisms. Thus, protected analog content, including content that originated in protected digital format but was stripped of its digital protection when it was converted to analog for display on analog TV receivers, is left unprotected when converted to a digital format. Goal Three: Putting an end to the avalanche of movie theft on so-called ‘file-sharing” services, such as Morpheus, Gnutella, and other peer-to-peer (p2p) networks. -
Broadcast Flags and the War Against Digital Television Piracy: a Solution Or Dilemma for the Digital Era? Debra Kaplan Indiana University School of Law
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Indiana University Bloomington Maurer School of Law Federal Communications Law Journal Volume 57 | Issue 2 Article 12 3-2005 Broadcast Flags and the War Against Digital Television Piracy: A Solution or Dilemma for the Digital Era? Debra Kaplan Indiana University School of Law Follow this and additional works at: http://www.repository.law.indiana.edu/fclj Part of the Administrative Law Commons, Antitrust and Trade Regulation Commons, Communications Law Commons, Intellectual Property Law Commons, Jurisdiction Commons, and the Legislation Commons Recommended Citation Kaplan, Debra (2005) "Broadcast Flags and the War Against Digital Television Piracy: A Solution or Dilemma for the Digital Era?," Federal Communications Law Journal: Vol. 57: Iss. 2, Article 12. Available at: http://www.repository.law.indiana.edu/fclj/vol57/iss2/12 This Note is brought to you for free and open access by the Law School Journals at Digital Repository @ Maurer Law. It has been accepted for inclusion in Federal Communications Law Journal by an authorized administrator of Digital Repository @ Maurer Law. For more information, please contact [email protected]. Broadcast Flags and the War Against Digital Television Piracy: A Solution or Dilemma for the Digital Era? Debra Kaplan* I. INTRODUCTION ............................................................................ 326 II. THE MECHANICS OF THE SOLUTION ............................................ 328 A . The A TSC F lag -
Before the Federal Communications Commission Washington, D.C. 20554
Before the Federal Communications Commission Washington, D.C. 20554 In the Matter of ) ) Motion Picture Association of America, Inc. ) CS Docket No. 97-80 ) MB Docket No. 08-82 ) CSR-7947-Z Petition for Waiver of ) 47 C.F.R. § 76.1903 ) ) __________________________________________) Opposition of the Consumer Electronics Association to Motion Picture Association of America Petition for Waiver of 47 C.F.R. § 76.1903 July 21, 2008 Before the Federal Communications Commission Washington, D.C. 20554 In the Matter of ) ) Motion Picture Association of America, Inc. ) CS Docket No. 97-80 ) MB Docket No. 08-82 ) CSR-7947-Z Petition for Waiver of ) 47 C.F.R. § 76.1903 ) ) __________________________________________) Opposition of the Consumer Electronics Association to Motion Picture Association of America Petition for Waiver of 47 C.F.R. § 76.1903 The Consumer Electronics Association (“CEA”) submits these Comments in response and opposition to the permanent waiver of 47 C.F.R. § 76.1903, petitioned for by the Motion Picture Association of America (“MPAA”). CEA is the principal trade association promoting growth in the consumer technology industry through technology policy, events, research, promotion and the fostering of business and strategic relationships. CEA represents more than 2,200 corporate members involved in the design, development, manufacturing, distribution and integration of audio, video, mobile electronics, wireless and landline communications, information technology, home networking, multimedia and accessory products, as well as related services that are sold through consumer channels. CEA has a strong interest in the outcome of this proceeding. CEA’s members manufactured and distributed to the public, in good faith, the television receivers that would unexpectedly go dark in many homes as a result of Selectable Output Control (“SOC”) being activated, remotely, by content providers or distributors. -
Secure Remote Service Execution for Web Media Streaming
Secure Remote Service Execution for Web Media Streaming vorgelegt von Dipl.-Ing. Alexandra Mikityuk geb. in Leningrad, UdSSR von der Fakultät IV – Elektrotechnik und Informatik der Technischen Universität Berlin zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften - Dr.-Ing. - genehmigte Dissertation Promotionsausschuss: Vorsitzender: Prof. Dr. Thomas Magedanz, Technische Universität Berlin Gutachter: Prof. Dr. Jean-Pierre Seifert, Technische Universität Berlin Gutachter: Prof. Dr. Jean-Claude Dufourd, ParisTech Gutachter: Prof. Dr.-Ing. Ina Schieferdecker, Technische Universität Berlin Tag der wissenschaftlichen Aussprache: 29. August 2017 Berlin 2017 D 83 Abstract Through continuous advancements in streaming and Web technologies over the past decade, the Web has become a platform for media delivery. Web standards like HTML5 have been designed accordingly, allowing for the delivery of applications, high-quality streaming video, and hooks for interoperable content protection. Efficient video encoding algorithms such as AVC/HEVC and streaming protocols such as MPEG-DASH have served as additional triggers for this evolution. Users now employ Web browsers as a tool for receiving streaming media and rendering Web applications, and browsers have been embedded into almost every kind of connected device. The drawback of these technical developments and quick rate of user adoption is that modern Web browsers have introduced significant constraints on devices’ capabilities. First, the computational requirements have risen continuously, resulting in a cycle where modern devices can be nearly outdated after a year or two. Second, as the integration of browser technologies is a complicated matter, not every platform provides the same performance. Different Operating Systems (OSs), chipsets and software engines are the main reasons for this difference in performance. -
Windows Vista Content Protection Overview
Windows Vista Content Protection Threat-modelling the attempt to seal an open architecture Peter Gutmann University of Auckland Overview What is it? • Intent of Vista’s content-protection measures • (Brief) Coverage of the technical mechanisms Problems • Some of the ways that it can go wrong Analysis • Effects on the industry • Inside look at Microsoft politics: Why they did it Closing thoughts A Note on Sources… Content-protection details were taken from a variety of sources • See http://www.cs.auckland.ac.nz/• ~pgut001/pubs/vista_cost.html (now rather out of date) for a few other references and technical information Best Microsoft reference is “Output Content Protection and Windows Vista” from WHDC • Otherwise unattributed supporting quotes are taken from various Microsoft documents Best third-party comment, from ATI, is “Digital Media Content Protection” from WinHEC A Note on Sources… (ctd) Other information was gathered from as wide a range of sources as (practically) feasible • Hardware review sites, web forums, news articles, blogs, … An experiment with a sample size of one is worthless; it may be trivially invalidated by a second experiment that returns the opposite result — Introduction to Statistics Updates, corrections, and further information from readers welcomed Updates… Updated slightly based on feedback from attendees • Split content across numerous slides to improve readability (several people complained about too much being crammed onto each slide) • Added several slides covering events like the Atsiv driver and its revocation and Purple Pill, which occurred after the talk • Added a few slides discussing hardware polyculture effects • Removed a few slides on DRM politics, a topic that’s been done to death elsewhere (see the footnotes slide for more) • Included a number of extra illustrations • Some comments and cartoons in here are explicitly meant as jokes/satire to lighten up a long technical presentation.