Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Upcoming SlideShare
Loading in...5
×
 

Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011

on

  • 1,211 views

Irdeto Spokesman Yuan Xiang Gu, Co-Founder & Chief Architect of Cloakware and Senior Director of Cloakware Advanced Research Center Speaks At ISI SSP Beijing 2011

Irdeto Spokesman Yuan Xiang Gu, Co-Founder & Chief Architect of Cloakware and Senior Director of Cloakware Advanced Research Center Speaks At ISI SSP Beijing 2011

Statistics

Views

Total Views
1,211
Views on SlideShare
1,160
Embed Views
51

Actions

Likes
0
Downloads
9
Comments
0

2 Embeds 51

http://www.eastwestpr.com 50
http://twitter.com 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Apply our multi layer security to protect the Digital Asset better than any oneApply our Diversity to mitigateApply our renewability to updatesSLM , which is the category that ActiveTrust addresses is: A more dynamic model than traditional security modelsAssumes that the protection can be updated in the fieldAssumes that given enough investment by hackers, a protection solution will be crackedIt is gaining acceptance …Security requirements imposed by Studios mirror thisSome CW customers have partially implemented content protection schemes that reflect thisIt’s readily accepted when presented to prospects, influencers and owners/custodians of DA’sThis is similar to what we do in PAY-TV to protect the business model of our customers, in this case operators. In that case, we use:Smartcard or Cloaked CA, Flexi Flash technology for renewability,And Offer security services to protect our customersIn this case, we apply different technologies and protect different assets and business models but in the same manner.

Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011 Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011 Presentation Transcript

  • 1
  • Software Protection Is Becoming Mainstream
    Yuan Xiang Gu
    Irdeto, Canada
  • About Irdeto
    Founded in 1969 by Ir. Pieter den Toonder
    1000 employees, over 500 customers
    Dual headquarters: Amsterdam and Beijing
    25 offices around the world
    Part of Naspers, multinational media company
    10.000 employees
    USD $3.7B revenue in FY10
    Pay TV Solutions (CA, Middleware, Billing)
    Enable Broadcasters to become “Broadbanders”
    Content Management & Distribution for Any Screen
    Security Lifecycle Management for Any DeviceOver 3 billion software instances protected
  • Un-Trusted Environment Reality
    4
    Cloud Computing
    Environments
    Un-trusted environments
    are everywhere and even becoming more dominated in digital world
    Persistent Security on
    un-trusted environments
    is becoming
    #1 concern
    Public Internet
    Consumer Devices & Home Networks & Internet of Things
  • New Challenges to Traditional Security
    5
    White-Box Security
    Dynamic Security
    Security of Un-Trusted Environment
  • Traditional Attacks
    Black Box Attack
    Grey Box Attack
    Man-In-The-Middle Attack (Indirect)
    Bob
    Alice
    Network
    Software
    Software
    Trusted Inside Box
    6
  • White-Box Attacks
    Man-At-The-End Attack
    Bob is the Attacker
    Alice
    Software
    7
    Network
    Software
  • Just Like Security and Protection in Museum
    8
    Beijing’s Forbidden City
    suffers break-in
    Beijing’s Forbidden City
    Robbed, May 11, 2011
  • Static Security vs Dynamic Security
    Dynamic Security
    Static Security
    Once static security breaks, the entire security is gone and hard to be restored
    Once dynamic security breaks, the security can be renewed and restored immediately in a planned way
    9
  • Fundamental to Digital Asset Protection
    Tampering
    Analysis
    Data Flow Transforms
    Control Flow
    Transforms
    Dynamic Integrity Verification
    White Box Crypto
    Stage 1a. Implement Attack Resistance
    Protect Digital Assets through fundamental enabling software security and services through the lifecycle
    Dynamic Code
    Decryption
    Dynamic Code
    Decryption
    Core Technology Defenses
    Stage 2. Monitor & Analyze Hacker Progress
    Stage 3. Deploy Counter-measures
    Stage 4. Respond to Attacks
    Stage 5. Renew Security
    Anti-Debug
    Stage 1b. Implement Attack Mitigation
    Software Diversity
    Software Diversity
    Attack
    Automation
    Attack
    Distribution
    Software
    Renewability
    Software
    Renewability
    Lifecycle
    Security
    Digital AssetProtection
    Protected Digital Asset Distributed and Consumed
    10
  • Irdeto Technology Protects Beyond Media
    11
    Multi-Media
    • Video
    • Film
    • TV
    Games
    E-Maps
    E-Publications
    • E-Book
    • E-Magazine
    • E-Journal
    Cloud Computing
    Smarter Metering
    Applications
    • Native App
    • Scripted App
    • Network App
    Any digitalized assets to be protected
  • Questions?
    Thank You!
  • www.irdeto.com