1 / 19

19 th October 2004 Regional Blackouts: Protection of Broadcast Content on 3G Networks

19 th October 2004 Regional Blackouts: Protection of Broadcast Content on 3G Networks Alexander W. Dent Allan Tomlinson , Information Security Group, Royal Holloway, University of London. Introduction. Motivation Collaboration between broadcast and mobile networks

svein
Download Presentation

19 th October 2004 Regional Blackouts: Protection of Broadcast Content on 3G Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 19th October 2004 Regional Blackouts: Protection of Broadcast Content on 3G Networks Alexander W. Dent Allan Tomlinson, Information Security Group, Royal Holloway, University of London

  2. Introduction • Motivation • Collaboration between broadcast and mobile networks • Potential to deliver broadcast content over 3G networks • Potential issues with content protection • Digital Rights Management (DRM) • Ownership of Content • Distribution Rights • Licensing

  3. Background • Regional Blackouts • Broadcast Content subject to restrictions • Geographical • In the region around a stadium where a live event is taking place • Time • During the time when a live event takes place • Immediately after the event

  4. Background • Current Solutions • Conditional Access systems • Scrambled content • Regional codes • Embedded in receivers • Entitlement management • Descrambling authorised according to regional codes • Broadcast time controlled by broadcaster

  5. Background

  6. Background • Mobile Receivers • Current solutions assume • Relatively static receivers • Broadcaster controls play-out and billing • Mobile receivers • No longer static • Content forwarding

  7. Background

  8. New Problem • Content Provider may trust broadcaster to control distribution to initial receiver • Content Provider cannot trust initial receiver to control further distribution • Further distribution is controlled by the user • End Device can be any IP enabled device • End Device may be completely controlled by user • Impact on future mobile services

  9. Potential Solutions • Trusted Hardware • Insist on trusted hardware on End Device • Install GPS on end device • Expensive • Trusted Network • Network provides time and location data • End Device must be connected directly to network • Secure Protocols

  10. Network Model

  11. Assumptions • STB and ED have a secure execution environment and a tamper-proof data storage area • All cryptographic processing on STB and ED is carried out in the secure execution environment • Only applications running in the secure execution environment have access to the tamper-proof data storage areas in the STB and the ED • At least one authenticated key, K, is shared by STB and ED and is stored in the tamper-proof data storage areas

  12. Assumptions • At least one of the ED or STB possesses a public verification transform, VCA, for a certification authority CA, stored in its tamper-proof data storage area • At least one of the ED or STB possesses a DRM application stored in its tamper-proof data storage area • At least one of the ED or STB has knowledge of the usage criteria for each service received

  13. Protocol 1

  14. Protocol 1 • Advantages • Simple • Disadvantages • Heavy computational load on the intermediary network. • Heavy computational load on the end device (which may have limited computational power) • Trust in DRM application on the end device

  15. Protocol 2

  16. Protocol 2 • Advantages • Simple • Low computational load for the end device • Good source of nonces from scrambled broadcasts • Most DRM performed on STB, less trust in ED • Disadvantages • Still heavy computational load on the intermediary network

  17. Conclusions • Protocols deliver secure time and location information from mobile devices to DRM applications. • Computational load on intermediary network. • Potential for Denial of Service attacks

  18. Thank you ! For further information please contact: Dr. Allan Tomlinson E-mail: allan.tomlinson@rhul.ac.uk Tel: +44 (1784) 414346 WWW: www.mobilevce.com

More Related