Self-Protecting Digital Content
   HOME

TheInfoList



OR:

{{Refimprove, date=March 2008 Self Protecting Digital Content (SPDC), is a
copy protection Copy protection, also known as content protection, copy prevention and copy restriction, describes measures to enforce copyright by preventing the reproduction of software, films, music, and other media. Copy protection is most commonly found on ...
(
digital rights management Digital rights management (DRM) is the management of legal access to digital content. Various tools or technological protection measures (TPM) such as access control technologies can restrict the use of proprietary hardware and copyrighted works. ...
) architecture which allows restriction of access to, and copying of, the next generation of
optical discs In computing and optical disc recording technologies, an optical disc (OD) is a flat, usually circular disc that encodes binary data (bits) in the form of Compact disk#Physical details, pits and lands on a special material, often aluminum, ...
and streaming/downloadable content.


Overview

Designed by Cryptography Research, Inc. of
San Francisco San Francisco (; Spanish language, Spanish for "Francis of Assisi, Saint Francis"), officially the City and County of San Francisco, is the commercial, financial, and cultural center of Northern California. The city proper is the List of Ca ...
, SPDC executes code from the encrypted content on the
DVD player A DVD player is a device that plays DVDs produced under both the DVD-Video and DVD-Audio technical standards, two different and incompatible standards. Some DVD players will also play audio CDs. DVD players are connected to a television to wa ...
, enabling the content providers to change DRM systems in case an existing system is compromised. It adds functionality to make the system "
dynamic Dynamics (from Greek δυναμικός ''dynamikos'' "powerful", from δύναμις ''dynamis'' "power") or dynamic may refer to: Physics and engineering * Dynamics (mechanics) ** Aerodynamics, the study of the motion of air ** Analytical dynam ...
", as opposed to "static" systems in which the system and keys for
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decip ...
and
decryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decip ...
do not change, thus enabling one compromised key to decode all content released using that encryption system. "Dynamic" systems attempt to make future content released immune to existing methods of
circumvention Anti-circumvention refers to laws which prohibit the circumvention of technological barriers for using a digital good in certain ways which the rightsholders do not wish to allow. The requirement for anti-circumvention laws was globalized in 1996 ...
.


Playback method

If a method of playback used in previously released content is revealed to have a weakness, either by review or because it has already been exploited, code embedded into content released in the future will change the method, and any attackers will have to start over and attack it again.


Targeting compromised players

If a certain model of players are compromised, code specific to the model can be activated to verify that the particular player has not been compromised. The player can be "fingerprinted" if found to be compromised and the information can be used later.


Forensic marking

Code inserted into content can add information to the output that specifically identifies the player, and in a large-scale distribution of the content, can be used to trace the player. This may include the fingerprint of a specific player.


Weaknesses

If an entire class of players is compromised, it is infeasible to revoke the ability to use the content on the entire class because many customers may have purchased players in the class. A
fingerprint A fingerprint is an impression left by the friction ridges of a human finger. The recovery of partial fingerprints from a crime scene is an important method of forensic science. Moisture and grease on a finger result in fingerprints on surfac ...
may be used to try to work around this limitation, but an attacker with access to multiple sources of video may "scrub" the fingerprint, removing the fingerprint entirely or rendering it useless at the very least. Because dynamic execution requires a
virtual environment A virtual environment is a networked application that allows a user to interact with both the computing environment and the work of other users. Email Electronic mail (email or e-mail) is a method of exchanging messages ("mail") betwee ...
, it may be possible to recreate an execution environment on a general purpose
computer A computer is a machine that can be programmed to Execution (computing), carry out sequences of arithmetic or logical operations (computation) automatically. Modern digital electronic computers can perform generic sets of operations known as C ...
that feeds the executing code whatever an attacker wants the code to see in terms of digital fingerprints and memory footprints. This allows players running on general purpose computers to
emulate Emulate, Inc. (Emulate) is a biotechnology company that commercialized Organs-on-Chips technology—a human cell-based technology that recreates organ-level function to model organs in healthy and diseased states. The technology has applications ...
any specific model of player, potentially by simply downloading
firmware In computing, firmware is a specific class of computer software that provides the low-level control for a device's specific hardware. Firmware, such as the BIOS of a personal computer, may contain basic functions of a device, and may provide h ...
updates for the players being emulated. Once the emulated execution environment has decrypted the content, it can then be stored in decrypted form. Because the content encryption scheme (such as BD+) is separate from the transport encryption scheme (such as
HDCP High-bandwidth Digital Content Protection (HDCP) is a form of digital copy protection developed by Intel Corporation to prevent copying of digital audio and video content as it travels across connections. Types of connections include DisplayPort ...
), digital content is transferred inside the player between circuits in unencrypted form. It is possible to extract digital data directly from circuit traces inside a licensed and legal player before that content has been re-encrypted for transport across the wire, allowing a modified player to be used as a decryption device for protected content. Only one such device must exist for the content to be widely distributed over digital networks such as the
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
. The final weakness of all DRM schemes for noninteractive works is the ultimate decryption for display to end-users. The content can at that time be re-encoded as a digital file. The presumption is that re-encoding is lossy, but fully digital copies can be made with modified viewing devices. For example, HDCP to unencrypted DVI adapters exist on the market and can be used by infringers to re-encode digital copies without modifying players. There also exists adapters that will split HDCP-encumbered HDMI stream into a non-encrypted DVI and S/PDIF streams, both digital, allowing for next-to-lossless reconstruction of digital copies with complete video and audio streams. Further, infringers can make copies through the
analog hole The analog hole (also known as the analog loophole or analog gap) is a perceived fundamental and inevitable vulnerability in copy protection schemes for noninteractive works in digital formats which can be exploited to duplicate copy-protected wo ...
. Modern HD televisions are merely 2 megapixels in resolution and the HD specification will be static for at least two decades, as high-expense consumer product cycles are necessarily long and higher resolution provides decreasing benefit to the consumer. By the time the specification is mid-life, cameras with 20 megapixel resolution will be available and able to record full-motion video, allowing for full two-axis oversampling and software reconstruction of the original stream pixel-by-pixel, with the only analog losses being encoded as slight variations in pixel color--and even this loss can be compensated for with color profile adjustment after the re-encode has completed. It would not be possible to compensate for possible compression of the color space dynamic, however, leading to a slight
posterizing Posterization or posterisation of an image is the conversion of a continuous gradation of tone to several regions of fewer tones, causing abrupt changes from one tone to another. This was originally done with photographic processes to create ...
effect. This effect is already apparent in compressed video and does not seem to bother most consumers.


External links


About Self-Protecting Digital Content

Self-Protecting Digital Content - A Technical Report from the CRI Content Security Research Initiative
Digital rights management DVD