SlideShare a Scribd company logo
JULY 2018, MILE HIGH VIDEO, DENVER
CONTENT PROTECTION
IN MPEG-DASH
2
CONTENT PROTECTION AND SECURITY
Austin, Texas / USA, sales@buydrm.com
• DASH-IF IOP provides a framework for multiple DRMs to protect DASH content by adding instructions:
• Protection System Specific Information
• Proprietary information in predetermined locations in MPDs or
• DASH Content that is encrypted with CENC as defined in ISO/IEC 23001-7
• Common Encryption Schema (cenc)
• Specifies encryption parameters
• Key mapping methods (common KID)
• The DRM scheme for each pssh is identified by a DRM specific SystemID
• The Base Technologies Summary
• ISO BMFF Support for Common Encryption and DRM
• MPD Support for Encryption and DRM Signaling
• Additional Content Protection Constraints
• Transport security in HTTP-based delivery
3
COMMON ENCRYPTION IN MPEG-DASH
Austin, Texas / USA, sales@buydrm.com
• The normative standard that defines common encryption with ISO BMFF is
ISO/IEC 23001-7 includes:
• Common Encryption (CENC) of NAL structure video and other media data
with AES 128 CTR mode
• CBC Mode is also supported within CENC but not in DASH IF IOPs
• Support for decryption of a single Representation by multiple DRM Systems
• Key Rotation
• XML Syntax for expressing a default KID attribute and pssh element in MPDs
4
COMMON ENCRYPTION IN MPEG-DASH
Austin, Texas / USA, sales@buydrm.com
Common
Key ID
Common
AES CTR
128-bit
Key
Scrambler System / Encryptor
DASH
Clear
Content
DASH DRM
Encrypted Content
MPD with
default_KID and
PSSH
Simplified illustration of content encryption using common key
MPD with
default_KID and
PSSH
Full Sample
Encryption
Sub Sample
Encryption
5
BASE TECHNOLOGY SUMMARY
Austin, Texas / USA, sales@buydrm.com
• Main DRM Components:
• ContentProtection Descriptors in the MPD
• URI for signaling or
• specific DRM being used
• Parameters that specify encryption parameters and default_KID (tenc)
• Parameters that may store initialization vectors and subsample encryption
ranges (senc)
• License acquisition data or keys for each DRM in a format that is “Protection
System Specific” (pssh)
• Key rotation is mainly used to allow changes in entitlement for continuous live
content
6
WORKFLOW OVERVIEW
Austin, Texas / USA, sales@buydrm.com
DRM Content Keys can be provided through ”Content Protection Information Exchange Format” v2.0
Content
Provider
DRM
Service
Player &
DRM Client
MPD
Creator
Packager
Encryptor
Encoder
DRM Information
7
INFORMATION FLOW. DRM LICENSE RETRIEVAL
Austin, Texas / USA, sales@buydrm.com
MPD
(default_KID)
Init Segment
“tenc”
(default_KID)
Play
Player DRM Client DRM Server
System ID Verification
License Acquisition
License Response
DRM License
Key Decryption
Encrypted Sample
Clear Sample
Decode
Encrypted
Sample
Data
1
2
7
4
5
6
3
8
Sample Decryption
9
10
8
ENCRYPTION AND DRM SIGNALING
Austin, Texas / USA, sales@buydrm.com
ContentProtection Descriptor for mp4protection Scheme
<ContentProtection schemeIdUri="urn:mpeg:dash:mp4protection:2011"
value="cenc" cenc:default_KID="34e5db32-8625-47cd-ba06-68fca0655a72"/>
ContentProtection Descriptor for UUID Scheme
<ContentProtection schemeIdUri="urn:uuid:xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx" value="DRMNAME version"/>
Protection System Specific Header Box cenc:pssh element in MPD
‘pssh’ Box data in MPD
<ContentProtection schemeIdUri=”urn:uuid:d0ee2730-09b5-459f-8452-200e52b37567”
value=”2.0”>
<!-- base64 encoded contents of ‘pssh’ box with this SystemID -->
<acme ::pssh>
YmFzZTY0IGVuY29kZWQgY29udGVudHMgb2YgkXB
zc2iSIGJveCB3aXRoIHRoaXMgU3lzdGVtSUQ=
</acme::pssh>
</ContentProtection>
Signals that content is
encrypted with the
scheme indicated in the
@value attribute
A UUID may indicate the
availability of a
particular DRM scheme
for license acquisition
The contents of the data array specified in the
’pssh’ box is defined by each DRM system for
use with their registered SystemID, and the
same data array can be stored in the MPD
within a ContentProtection Descriptor for UUID
scheme
9
TRANSPORT AND SECURITY IN HTTP BASED DELIVERY
Austin, Texas / USA, sales@buydrm.com
MPEG-DASH explicitly permits the use of https as a scheme and hence, HTTP over TLS as transport protocol
All media segments can be delivered over HTTPS by declaring <BaseURL>
<BaseURL>https://cdn1.example.com/</BaseURL>
<BaseURL>https://cdn2.example.com/</BaseURL>
Impacts of using HTTPs in DASH:
• CDN
• It causes difficulties in caching encrypted DASH segment content
• Network
• For underlying networks impossible to manage and optimize encrypted data traffics
• Efficiency
• “double encryption” when streaming content is already encrypted using DRM. HTTPs add extra
encryption overhead and therefore latency in streaming
10
KEYOS MULTI-DRM OTT PRODUCTS
Austin, Texas / USA, sales@buydrm.com
KeyOS MultiPack
Standards-based Content Encryption
Solution for On-Premise, In-Datacenter
and In-The-Cloud deployments. Supports
all three popular consumer DRMs and
formats for VOD and Live. Integrated with
KeyOS MultiKey Service and supported via
NGINX Server.
KeyOS MultiKey
DRM as a Service (DaaS) Platform based
on Multi-DRM concept. API- based for
content encryption keys acquisition and
content license key delivery. Supports all
popular formats and DRMs, streaming /
downloads and all popular playback
platforms.
KeyOS MultiPlay
Device SDKs for Android and iOS
platforms providing a feature-rich player,
extensive multi-DRM / multi-format
support, and an integrated download
manager. Deployed inside customer-built
Google Play and/or Apple iTunes premium
application.
DASH AND CPIX COMPATIBLE
11
THANK YOU
ANDREW POPOV, СTO
ANDREW@KEYOS.COM
Facebook:
www.facebook.com/buydrm
Twitter:
www.twitter.com/buydrm
LinkedIn:
www.linkedin.com/company/buydrm

More Related Content

What's hot

Lesson 2 Cryptography tools
Lesson 2 Cryptography toolsLesson 2 Cryptography tools
Lesson 2 Cryptography tools
MLG College of Learning, Inc
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
cclay3
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
Nishant Pahad
 
Ssl for e commerce
Ssl for  e commerceSsl for  e commerce
Ssl for e commerce
shahab zebari
 
TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006
Nate Lawson
 
PKCS8
PKCS8PKCS8
Transport Layer Security - Mrinal Wadhwa
Transport Layer Security - Mrinal WadhwaTransport Layer Security - Mrinal Wadhwa
Transport Layer Security - Mrinal Wadhwa
Mrinal Wadhwa
 
Ssl and tls
Ssl and tlsSsl and tls
Ssl and tls
Rana assad ali
 
TLS Optimization
TLS OptimizationTLS Optimization
TLS Optimization
Nate Lawson
 
Linux securities
Linux securitiesLinux securities
Linux securities
Gaurav Mishra
 
Encryption symmetric key
Encryption symmetric keyEncryption symmetric key
Encryption symmetric key
mdhar123
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) Protocol
Mohammed Adam
 
Securing TCP connections using SSL
Securing TCP connections using SSLSecuring TCP connections using SSL
Securing TCP connections using SSL
Sagar Mali
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
amanchaurasia
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
Abhishek Gupta
 
Authenticated key exchange protocols for parallel
Authenticated key exchange protocols for parallelAuthenticated key exchange protocols for parallel
Authenticated key exchange protocols for parallel
jpstudcorner
 
SSL
SSLSSL
OpenSSL
OpenSSLOpenSSL
OpenSSL
Timbal Mayank
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
Adz91 Digital Ads Pvt Ltd
 
wolfSSL and TLS 1.3
wolfSSL and TLS 1.3wolfSSL and TLS 1.3
wolfSSL and TLS 1.3
wolfSSL
 

What's hot (20)

Lesson 2 Cryptography tools
Lesson 2 Cryptography toolsLesson 2 Cryptography tools
Lesson 2 Cryptography tools
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
 
Ssl for e commerce
Ssl for  e commerceSsl for  e commerce
Ssl for e commerce
 
TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006
 
PKCS8
PKCS8PKCS8
PKCS8
 
Transport Layer Security - Mrinal Wadhwa
Transport Layer Security - Mrinal WadhwaTransport Layer Security - Mrinal Wadhwa
Transport Layer Security - Mrinal Wadhwa
 
Ssl and tls
Ssl and tlsSsl and tls
Ssl and tls
 
TLS Optimization
TLS OptimizationTLS Optimization
TLS Optimization
 
Linux securities
Linux securitiesLinux securities
Linux securities
 
Encryption symmetric key
Encryption symmetric keyEncryption symmetric key
Encryption symmetric key
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) Protocol
 
Securing TCP connections using SSL
Securing TCP connections using SSLSecuring TCP connections using SSL
Securing TCP connections using SSL
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Authenticated key exchange protocols for parallel
Authenticated key exchange protocols for parallelAuthenticated key exchange protocols for parallel
Authenticated key exchange protocols for parallel
 
SSL
SSLSSL
SSL
 
OpenSSL
OpenSSLOpenSSL
OpenSSL
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
wolfSSL and TLS 1.3
wolfSSL and TLS 1.3wolfSSL and TLS 1.3
wolfSSL and TLS 1.3
 

Similar to 2 15 popov_m3

INFO
INFOINFO
INFO
Videoguy
 
Ott Streaming Protocols and DRM
Ott Streaming Protocols and DRMOtt Streaming Protocols and DRM
Ott Streaming Protocols and DRM
ASIMYILDIZ
 
Introduction to CPSA
Introduction to CPSAIntroduction to CPSA
Introduction to CPSA
fullhouseweb
 
Azure Media Services Step-by-Step Tutorial Docs Series - Part 6
Azure Media Services   Step-by-Step Tutorial Docs Series - Part 6Azure Media Services   Step-by-Step Tutorial Docs Series - Part 6
Azure Media Services Step-by-Step Tutorial Docs Series - Part 6
Shige Fukushima
 
IBM Spectrum Scale Secure- Secure Data in Motion and Rest
IBM Spectrum Scale Secure- Secure Data in Motion and RestIBM Spectrum Scale Secure- Secure Data in Motion and Rest
IBM Spectrum Scale Secure- Secure Data in Motion and Rest
Sandeep Patil
 
Robust video data hiding using forbidden data hiding
Robust video data hiding using forbidden data hidingRobust video data hiding using forbidden data hiding
Robust video data hiding using forbidden data hiding
nandhu_m08
 
Why TPM in Automotive?
Why TPM in Automotive?Why TPM in Automotive?
Why TPM in Automotive?
Alan Tatourian
 
HKG18-113- Secure Data Path work with i.MX8M
HKG18-113- Secure Data Path work with i.MX8MHKG18-113- Secure Data Path work with i.MX8M
HKG18-113- Secure Data Path work with i.MX8M
Linaro
 
BSET_Lecture_Crypto and SSL_Overview_FINAL
BSET_Lecture_Crypto and SSL_Overview_FINALBSET_Lecture_Crypto and SSL_Overview_FINAL
BSET_Lecture_Crypto and SSL_Overview_FINAL
Glenn Haley
 
1_MWS2018_Tutorial1_Pham_Internet Delivered Media.pdf
1_MWS2018_Tutorial1_Pham_Internet Delivered Media.pdf1_MWS2018_Tutorial1_Pham_Internet Delivered Media.pdf
1_MWS2018_Tutorial1_Pham_Internet Delivered Media.pdf
AliIssa53
 
Azure mediaservices
Azure mediaservicesAzure mediaservices
Azure mediaservices
sharan gowde
 
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET Journal
 
Tokenization vs encryption vs masking
Tokenization vs encryption vs maskingTokenization vs encryption vs masking
Tokenization vs encryption vs masking
Ulf Mattsson
 
Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...
IGEEKS TECHNOLOGIES
 
BUILD 2014 - Building end-to-end video experience with Azure Media Services
BUILD 2014 - Building end-to-end video experience with Azure Media ServicesBUILD 2014 - Building end-to-end video experience with Azure Media Services
BUILD 2014 - Building end-to-end video experience with Azure Media Services
Mingfei Yan
 
Privacy Enhanced RTP Conferencing with WebRTC - PERC
Privacy Enhanced RTP Conferencing with WebRTC - PERCPrivacy Enhanced RTP Conferencing with WebRTC - PERC
Privacy Enhanced RTP Conferencing with WebRTC - PERC
Arnaud BUDKIEWICZ
 
DRM Basics With Irdeto and Bitmovin
DRM Basics With Irdeto and BitmovinDRM Basics With Irdeto and Bitmovin
DRM Basics With Irdeto and Bitmovin
Bitmovin Inc
 
DDS: The IoT Data Sharing Standard
DDS: The IoT Data Sharing StandardDDS: The IoT Data Sharing Standard
DDS: The IoT Data Sharing Standard
Angelo Corsaro
 
M.FLORENCE DAYANA/electronic mail security.pdf
M.FLORENCE DAYANA/electronic mail security.pdfM.FLORENCE DAYANA/electronic mail security.pdf
M.FLORENCE DAYANA/electronic mail security.pdf
Dr.Florence Dayana
 
Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...
IGEEKS TECHNOLOGIES
 

Similar to 2 15 popov_m3 (20)

INFO
INFOINFO
INFO
 
Ott Streaming Protocols and DRM
Ott Streaming Protocols and DRMOtt Streaming Protocols and DRM
Ott Streaming Protocols and DRM
 
Introduction to CPSA
Introduction to CPSAIntroduction to CPSA
Introduction to CPSA
 
Azure Media Services Step-by-Step Tutorial Docs Series - Part 6
Azure Media Services   Step-by-Step Tutorial Docs Series - Part 6Azure Media Services   Step-by-Step Tutorial Docs Series - Part 6
Azure Media Services Step-by-Step Tutorial Docs Series - Part 6
 
IBM Spectrum Scale Secure- Secure Data in Motion and Rest
IBM Spectrum Scale Secure- Secure Data in Motion and RestIBM Spectrum Scale Secure- Secure Data in Motion and Rest
IBM Spectrum Scale Secure- Secure Data in Motion and Rest
 
Robust video data hiding using forbidden data hiding
Robust video data hiding using forbidden data hidingRobust video data hiding using forbidden data hiding
Robust video data hiding using forbidden data hiding
 
Why TPM in Automotive?
Why TPM in Automotive?Why TPM in Automotive?
Why TPM in Automotive?
 
HKG18-113- Secure Data Path work with i.MX8M
HKG18-113- Secure Data Path work with i.MX8MHKG18-113- Secure Data Path work with i.MX8M
HKG18-113- Secure Data Path work with i.MX8M
 
BSET_Lecture_Crypto and SSL_Overview_FINAL
BSET_Lecture_Crypto and SSL_Overview_FINALBSET_Lecture_Crypto and SSL_Overview_FINAL
BSET_Lecture_Crypto and SSL_Overview_FINAL
 
1_MWS2018_Tutorial1_Pham_Internet Delivered Media.pdf
1_MWS2018_Tutorial1_Pham_Internet Delivered Media.pdf1_MWS2018_Tutorial1_Pham_Internet Delivered Media.pdf
1_MWS2018_Tutorial1_Pham_Internet Delivered Media.pdf
 
Azure mediaservices
Azure mediaservicesAzure mediaservices
Azure mediaservices
 
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication System
 
Tokenization vs encryption vs masking
Tokenization vs encryption vs maskingTokenization vs encryption vs masking
Tokenization vs encryption vs masking
 
Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...
 
BUILD 2014 - Building end-to-end video experience with Azure Media Services
BUILD 2014 - Building end-to-end video experience with Azure Media ServicesBUILD 2014 - Building end-to-end video experience with Azure Media Services
BUILD 2014 - Building end-to-end video experience with Azure Media Services
 
Privacy Enhanced RTP Conferencing with WebRTC - PERC
Privacy Enhanced RTP Conferencing with WebRTC - PERCPrivacy Enhanced RTP Conferencing with WebRTC - PERC
Privacy Enhanced RTP Conferencing with WebRTC - PERC
 
DRM Basics With Irdeto and Bitmovin
DRM Basics With Irdeto and BitmovinDRM Basics With Irdeto and Bitmovin
DRM Basics With Irdeto and Bitmovin
 
DDS: The IoT Data Sharing Standard
DDS: The IoT Data Sharing StandardDDS: The IoT Data Sharing Standard
DDS: The IoT Data Sharing Standard
 
M.FLORENCE DAYANA/electronic mail security.pdf
M.FLORENCE DAYANA/electronic mail security.pdfM.FLORENCE DAYANA/electronic mail security.pdf
M.FLORENCE DAYANA/electronic mail security.pdf
 
Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...
 

Recently uploaded

Codes n Conventions Website Media studies.pptx
Codes n Conventions Website Media studies.pptxCodes n Conventions Website Media studies.pptx
Codes n Conventions Website Media studies.pptx
ZackSpencer3
 
HOW TO USE PINTEREST_by: Clarissa Credito
HOW TO USE PINTEREST_by: Clarissa CreditoHOW TO USE PINTEREST_by: Clarissa Credito
HOW TO USE PINTEREST_by: Clarissa Credito
ClarissaAlanoCredito
 
My storyboard for a sword fight scene with lightsabers
My storyboard for a sword fight scene with lightsabersMy storyboard for a sword fight scene with lightsabers
My storyboard for a sword fight scene with lightsabers
AlejandroGuarnGutirr
 
Ealing London Independent Photography meeting - June 2024
Ealing London Independent Photography meeting - June 2024Ealing London Independent Photography meeting - June 2024
Ealing London Independent Photography meeting - June 2024
Sean McDonnell
 
storyboard: Victor and Verlin discussing about top hat
storyboard: Victor and Verlin discussing about top hatstoryboard: Victor and Verlin discussing about top hat
storyboard: Victor and Verlin discussing about top hat
LyneSun
 
Dino Ranch Storyboard / Kids TV Advertising
Dino Ranch Storyboard / Kids TV AdvertisingDino Ranch Storyboard / Kids TV Advertising
Dino Ranch Storyboard / Kids TV Advertising
Alessandro Occhipinti
 
In Focus_ The Evolution of Boudoir Photography in NYC.pdf
In Focus_ The Evolution of Boudoir Photography in NYC.pdfIn Focus_ The Evolution of Boudoir Photography in NYC.pdf
In Focus_ The Evolution of Boudoir Photography in NYC.pdf
Boudoir Photography by Your Hollywood Portrait
 
Complete Lab 123456789123456789123456789
Complete Lab 123456789123456789123456789Complete Lab 123456789123456789123456789
Complete Lab 123456789123456789123456789
vickyvikas51556
 
My storyboard for the short film "Maatla".
My storyboard for the short film "Maatla".My storyboard for the short film "Maatla".
My storyboard for the short film "Maatla".
AlejandroGuarnGutirr
 
2024 MATFORCE Youth Poster Contest Winners
2024 MATFORCE Youth Poster Contest Winners2024 MATFORCE Youth Poster Contest Winners
2024 MATFORCE Youth Poster Contest Winners
matforce
 
一比一原版美国亚利桑那大学毕业证(ua毕业证书)如何办理
一比一原版美国亚利桑那大学毕业证(ua毕业证书)如何办理一比一原版美国亚利桑那大学毕业证(ua毕业证书)如何办理
一比一原版美国亚利桑那大学毕业证(ua毕业证书)如何办理
homgo
 
Portfolio of my work as my passion and skills
Portfolio of my work as my passion and skillsPortfolio of my work as my passion and skills
Portfolio of my work as my passion and skills
waljorylypil626
 
➒➌➎➏➑➐➋➑➐➐ Dpboss Satta Matka Matka Guessing Kalyan Chart Indian Matka Satta ...
➒➌➎➏➑➐➋➑➐➐ Dpboss Satta Matka Matka Guessing Kalyan Chart Indian Matka Satta ...➒➌➎➏➑➐➋➑➐➐ Dpboss Satta Matka Matka Guessing Kalyan Chart Indian Matka Satta ...
➒➌➎➏➑➐➋➑➐➐ Dpboss Satta Matka Matka Guessing Kalyan Chart Indian Matka Satta ...
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
FinalFinalSelf-PortraiturePowerPoint.pptx
FinalFinalSelf-PortraiturePowerPoint.pptxFinalFinalSelf-PortraiturePowerPoint.pptx
FinalFinalSelf-PortraiturePowerPoint.pptx
abbieharman
 
Tibbetts_HappyAwesome_NewArc Sketch to AI
Tibbetts_HappyAwesome_NewArc Sketch to AITibbetts_HappyAwesome_NewArc Sketch to AI
Tibbetts_HappyAwesome_NewArc Sketch to AI
Todd Tibbetts
 
一比一原版(BC毕业证)波士顿学院毕业证如何办理
一比一原版(BC毕业证)波士顿学院毕业证如何办理一比一原版(BC毕业证)波士顿学院毕业证如何办理
一比一原版(BC毕业证)波士顿学院毕业证如何办理
40fortunate
 
一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
taqyea
 
Domino Express Storyboard - TV Adv Toys 30"
Domino Express Storyboard - TV Adv Toys 30"Domino Express Storyboard - TV Adv Toys 30"
Domino Express Storyboard - TV Adv Toys 30"
Alessandro Occhipinti
 
This is a test powerpoint!!!!!!!!!!!!!!!
This is a test powerpoint!!!!!!!!!!!!!!!This is a test powerpoint!!!!!!!!!!!!!!!
This is a test powerpoint!!!!!!!!!!!!!!!
briannedpegg
 
Cherries 32 collection of colorful paintings
Cherries 32 collection of colorful paintingsCherries 32 collection of colorful paintings
Cherries 32 collection of colorful paintings
sandamichaela *
 

Recently uploaded (20)

Codes n Conventions Website Media studies.pptx
Codes n Conventions Website Media studies.pptxCodes n Conventions Website Media studies.pptx
Codes n Conventions Website Media studies.pptx
 
HOW TO USE PINTEREST_by: Clarissa Credito
HOW TO USE PINTEREST_by: Clarissa CreditoHOW TO USE PINTEREST_by: Clarissa Credito
HOW TO USE PINTEREST_by: Clarissa Credito
 
My storyboard for a sword fight scene with lightsabers
My storyboard for a sword fight scene with lightsabersMy storyboard for a sword fight scene with lightsabers
My storyboard for a sword fight scene with lightsabers
 
Ealing London Independent Photography meeting - June 2024
Ealing London Independent Photography meeting - June 2024Ealing London Independent Photography meeting - June 2024
Ealing London Independent Photography meeting - June 2024
 
storyboard: Victor and Verlin discussing about top hat
storyboard: Victor and Verlin discussing about top hatstoryboard: Victor and Verlin discussing about top hat
storyboard: Victor and Verlin discussing about top hat
 
Dino Ranch Storyboard / Kids TV Advertising
Dino Ranch Storyboard / Kids TV AdvertisingDino Ranch Storyboard / Kids TV Advertising
Dino Ranch Storyboard / Kids TV Advertising
 
In Focus_ The Evolution of Boudoir Photography in NYC.pdf
In Focus_ The Evolution of Boudoir Photography in NYC.pdfIn Focus_ The Evolution of Boudoir Photography in NYC.pdf
In Focus_ The Evolution of Boudoir Photography in NYC.pdf
 
Complete Lab 123456789123456789123456789
Complete Lab 123456789123456789123456789Complete Lab 123456789123456789123456789
Complete Lab 123456789123456789123456789
 
My storyboard for the short film "Maatla".
My storyboard for the short film "Maatla".My storyboard for the short film "Maatla".
My storyboard for the short film "Maatla".
 
2024 MATFORCE Youth Poster Contest Winners
2024 MATFORCE Youth Poster Contest Winners2024 MATFORCE Youth Poster Contest Winners
2024 MATFORCE Youth Poster Contest Winners
 
一比一原版美国亚利桑那大学毕业证(ua毕业证书)如何办理
一比一原版美国亚利桑那大学毕业证(ua毕业证书)如何办理一比一原版美国亚利桑那大学毕业证(ua毕业证书)如何办理
一比一原版美国亚利桑那大学毕业证(ua毕业证书)如何办理
 
Portfolio of my work as my passion and skills
Portfolio of my work as my passion and skillsPortfolio of my work as my passion and skills
Portfolio of my work as my passion and skills
 
➒➌➎➏➑➐➋➑➐➐ Dpboss Satta Matka Matka Guessing Kalyan Chart Indian Matka Satta ...
➒➌➎➏➑➐➋➑➐➐ Dpboss Satta Matka Matka Guessing Kalyan Chart Indian Matka Satta ...➒➌➎➏➑➐➋➑➐➐ Dpboss Satta Matka Matka Guessing Kalyan Chart Indian Matka Satta ...
➒➌➎➏➑➐➋➑➐➐ Dpboss Satta Matka Matka Guessing Kalyan Chart Indian Matka Satta ...
 
FinalFinalSelf-PortraiturePowerPoint.pptx
FinalFinalSelf-PortraiturePowerPoint.pptxFinalFinalSelf-PortraiturePowerPoint.pptx
FinalFinalSelf-PortraiturePowerPoint.pptx
 
Tibbetts_HappyAwesome_NewArc Sketch to AI
Tibbetts_HappyAwesome_NewArc Sketch to AITibbetts_HappyAwesome_NewArc Sketch to AI
Tibbetts_HappyAwesome_NewArc Sketch to AI
 
一比一原版(BC毕业证)波士顿学院毕业证如何办理
一比一原版(BC毕业证)波士顿学院毕业证如何办理一比一原版(BC毕业证)波士顿学院毕业证如何办理
一比一原版(BC毕业证)波士顿学院毕业证如何办理
 
一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
 
Domino Express Storyboard - TV Adv Toys 30"
Domino Express Storyboard - TV Adv Toys 30"Domino Express Storyboard - TV Adv Toys 30"
Domino Express Storyboard - TV Adv Toys 30"
 
This is a test powerpoint!!!!!!!!!!!!!!!
This is a test powerpoint!!!!!!!!!!!!!!!This is a test powerpoint!!!!!!!!!!!!!!!
This is a test powerpoint!!!!!!!!!!!!!!!
 
Cherries 32 collection of colorful paintings
Cherries 32 collection of colorful paintingsCherries 32 collection of colorful paintings
Cherries 32 collection of colorful paintings
 

2 15 popov_m3

  • 1. JULY 2018, MILE HIGH VIDEO, DENVER CONTENT PROTECTION IN MPEG-DASH
  • 2. 2 CONTENT PROTECTION AND SECURITY Austin, Texas / USA, sales@buydrm.com • DASH-IF IOP provides a framework for multiple DRMs to protect DASH content by adding instructions: • Protection System Specific Information • Proprietary information in predetermined locations in MPDs or • DASH Content that is encrypted with CENC as defined in ISO/IEC 23001-7 • Common Encryption Schema (cenc) • Specifies encryption parameters • Key mapping methods (common KID) • The DRM scheme for each pssh is identified by a DRM specific SystemID • The Base Technologies Summary • ISO BMFF Support for Common Encryption and DRM • MPD Support for Encryption and DRM Signaling • Additional Content Protection Constraints • Transport security in HTTP-based delivery
  • 3. 3 COMMON ENCRYPTION IN MPEG-DASH Austin, Texas / USA, sales@buydrm.com • The normative standard that defines common encryption with ISO BMFF is ISO/IEC 23001-7 includes: • Common Encryption (CENC) of NAL structure video and other media data with AES 128 CTR mode • CBC Mode is also supported within CENC but not in DASH IF IOPs • Support for decryption of a single Representation by multiple DRM Systems • Key Rotation • XML Syntax for expressing a default KID attribute and pssh element in MPDs
  • 4. 4 COMMON ENCRYPTION IN MPEG-DASH Austin, Texas / USA, sales@buydrm.com Common Key ID Common AES CTR 128-bit Key Scrambler System / Encryptor DASH Clear Content DASH DRM Encrypted Content MPD with default_KID and PSSH Simplified illustration of content encryption using common key MPD with default_KID and PSSH Full Sample Encryption Sub Sample Encryption
  • 5. 5 BASE TECHNOLOGY SUMMARY Austin, Texas / USA, sales@buydrm.com • Main DRM Components: • ContentProtection Descriptors in the MPD • URI for signaling or • specific DRM being used • Parameters that specify encryption parameters and default_KID (tenc) • Parameters that may store initialization vectors and subsample encryption ranges (senc) • License acquisition data or keys for each DRM in a format that is “Protection System Specific” (pssh) • Key rotation is mainly used to allow changes in entitlement for continuous live content
  • 6. 6 WORKFLOW OVERVIEW Austin, Texas / USA, sales@buydrm.com DRM Content Keys can be provided through ”Content Protection Information Exchange Format” v2.0 Content Provider DRM Service Player & DRM Client MPD Creator Packager Encryptor Encoder DRM Information
  • 7. 7 INFORMATION FLOW. DRM LICENSE RETRIEVAL Austin, Texas / USA, sales@buydrm.com MPD (default_KID) Init Segment “tenc” (default_KID) Play Player DRM Client DRM Server System ID Verification License Acquisition License Response DRM License Key Decryption Encrypted Sample Clear Sample Decode Encrypted Sample Data 1 2 7 4 5 6 3 8 Sample Decryption 9 10
  • 8. 8 ENCRYPTION AND DRM SIGNALING Austin, Texas / USA, sales@buydrm.com ContentProtection Descriptor for mp4protection Scheme <ContentProtection schemeIdUri="urn:mpeg:dash:mp4protection:2011" value="cenc" cenc:default_KID="34e5db32-8625-47cd-ba06-68fca0655a72"/> ContentProtection Descriptor for UUID Scheme <ContentProtection schemeIdUri="urn:uuid:xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx" value="DRMNAME version"/> Protection System Specific Header Box cenc:pssh element in MPD ‘pssh’ Box data in MPD <ContentProtection schemeIdUri=”urn:uuid:d0ee2730-09b5-459f-8452-200e52b37567” value=”2.0”> <!-- base64 encoded contents of ‘pssh’ box with this SystemID --> <acme ::pssh> YmFzZTY0IGVuY29kZWQgY29udGVudHMgb2YgkXB zc2iSIGJveCB3aXRoIHRoaXMgU3lzdGVtSUQ= </acme::pssh> </ContentProtection> Signals that content is encrypted with the scheme indicated in the @value attribute A UUID may indicate the availability of a particular DRM scheme for license acquisition The contents of the data array specified in the ’pssh’ box is defined by each DRM system for use with their registered SystemID, and the same data array can be stored in the MPD within a ContentProtection Descriptor for UUID scheme
  • 9. 9 TRANSPORT AND SECURITY IN HTTP BASED DELIVERY Austin, Texas / USA, sales@buydrm.com MPEG-DASH explicitly permits the use of https as a scheme and hence, HTTP over TLS as transport protocol All media segments can be delivered over HTTPS by declaring <BaseURL> <BaseURL>https://cdn1.example.com/</BaseURL> <BaseURL>https://cdn2.example.com/</BaseURL> Impacts of using HTTPs in DASH: • CDN • It causes difficulties in caching encrypted DASH segment content • Network • For underlying networks impossible to manage and optimize encrypted data traffics • Efficiency • “double encryption” when streaming content is already encrypted using DRM. HTTPs add extra encryption overhead and therefore latency in streaming
  • 10. 10 KEYOS MULTI-DRM OTT PRODUCTS Austin, Texas / USA, sales@buydrm.com KeyOS MultiPack Standards-based Content Encryption Solution for On-Premise, In-Datacenter and In-The-Cloud deployments. Supports all three popular consumer DRMs and formats for VOD and Live. Integrated with KeyOS MultiKey Service and supported via NGINX Server. KeyOS MultiKey DRM as a Service (DaaS) Platform based on Multi-DRM concept. API- based for content encryption keys acquisition and content license key delivery. Supports all popular formats and DRMs, streaming / downloads and all popular playback platforms. KeyOS MultiPlay Device SDKs for Android and iOS platforms providing a feature-rich player, extensive multi-DRM / multi-format support, and an integrated download manager. Deployed inside customer-built Google Play and/or Apple iTunes premium application. DASH AND CPIX COMPATIBLE
  • 11. 11 THANK YOU ANDREW POPOV, СTO ANDREW@KEYOS.COM Facebook: www.facebook.com/buydrm Twitter: www.twitter.com/buydrm LinkedIn: www.linkedin.com/company/buydrm