Content Security Special 2013 | Page 15

verimatrix_verimatrix 30/09/2013 07:12 Page 2 COMPANY CONTRIBUTION end protection of the content as well as control over the number of devices receiving the content, while the local operator maintains the role as the primary TV provider to the subscribers. Evolving STB content protection requirements Hardware security core in the STB chipset. pirates and this makes the control paths vulnerable to analysis and potential alteration. Certainly, if software runs in an unprotected STB host environment, skilled hackers can figure out how to short-circuit the access entitlement logic and/or extract CWs. By integrating the security implementation with the support of a hardware security core, the potential for hackers to use emulators and rogue devices to manipulate the content access decision and extract CWs is greatly reduced. Hardware security cores can therefore play a significant role in enabling the use of cardless CA for mainstream one-way broadcast operation. Example 2: Hybrid broadcast – broadband support – Flexible hardware security cores will support the different scrambling and rights processing schemes used for DVB broadcasting, IPTV live-TV streaming and on-demand delivery. The same core can then be used to harden both the broadcast CA and the ondemand and streaming digital rights management (DRM) system clients of hybrid STBs and homegateways providing a very compact solution supporting picture-in-picture, recording one programme while viewing another and multiroom even if the content is received from different networks. Example 3: Two-way pay-TV networks – When distributing pay-TV content via two-way networks, the STBs authenticate themselves to a head-end CA/DRM server. The server becomes the point of decision making for individual STB and content entitlements, and provides the information necessary for accessing the content after entitlement verification. While two-way communication offers more control options than one-way distribution – including positive acknowledgement of updates and integrity checks – it does not completely eliminate the threat of CW sharing attacks and potential client emulation. If pirates are able to hack a STB/device using a sophisticated form of logic attack (for example DPA), or otherwise appear as authentic for the CA/DRM server, they might obtain access to the compressed digital content as well as CW information that can be used for CW sharing. Device authentication performed in conjunction with headend servers, including HW sup- from other technology environments can achieve a strong composite ‘seat belt + airbag’ effect. If the card, security app or hardware security core is penetrated, hackers would still need to break the other protection(s) to compromise overall security. Note that such double configuration is different from Simulcrypt. Normal Simulcrypt assumes the receiver device to have a single security module that processes a single CA/DRM only, while parallel CA configuration assumes the receiver device to have several security modules configured in a way that forces pirates to break them all to exploit the system. Example 5: Cloud based OTT content distribution service – A cloud-based content distributor’s security app can be installed on operator client devices that Hardware security cores in STB chipsets represent the next step in STB content protection. Their first and foremost contribution is a significant increase of robustness where it is now needed: inside the STB chipsets. Leaving minimal room for piracy benefits all stakeholders along the value chain. Addition ?Gf?FvW2??6?VFP??ffW&??r?W&F?'2f?W??&??G?F???F??6R6??FV?B&W6V?FF????@????WF?6F???f?Gf?6VB7?7FV?6?gGv&R?6?7BVff?6?V?7?2???W?FW&??6?'B6&G2?"4?2&P?&WV?&VB?&VGV6VB&?6??b&V?GW&R5D"&W?6V?V?G2GVRF???&7???B??7&V6VB??V????B?`??'F????r6??FV?Bv?F???V&??&V?V6Rv??F?w2Bff?W&&?P?FW&?2??5D"?B6??6WB??W'2?6??&V?Vf?Bg&???W726??FV?B&?FV7F????&V?FVB6??7G&??G2?v??6???V?2??&Rg&VVF??f?"????fF??????Bf?????4?E$?7?7FV?fV?F?'2&R&?RF??ffW"?&vW ?6V7W&?G?&WW'F??&R??6?VF??p???&?fVB6V7W&?G?v??7B6??G&???v?&B6?&??r?( ?F?V&?R?V??( ?6V7W&???W???R?b??'&?B'&?F&?B?B?FV?fW'?W6??rV??f?VB6V7W&?G??Ff?&??'FVB6???V?vR?&W7??6R?V6???6?2&V6??W26?v??f?6?F??7G&??vW"v?V?W&f?&?VB??6???V?7F???v?F??&Gv&R6V7W&?G??6?&R??W???RC?&??V?4( ?F?V&?R?V??( ?6V7W&?G?( 26??&????p??&Gv&R6V7W&?G?6?&R?V6???6?2v?F?6V7W&?G?FV6???VW0???fR?&Gv&R6V7W&?G?6?&W0???6?FR?F?R?EB6??FV?B6?F?V??&RV?7'?FVB??v?F?@?&WV?&W2&?F?F?R6V7W&?G??@?F?R?&Gv&R6V7W&?G?6?&RF?&?f?FR6W&FR5w2f?"6??FV?@?FV7'?F?????7V6?66?V?R&?f?FW2F?P?6??VB?W&F?"6???WFRV?B?F???G?6?V???WF2?F?v???B&WF????W&F?"7W7F??W'2?F?W6P???&?fVB7?7FV?&?GV7G2?ffW ??W&F?'2??&RfVGW&W2??5D'0??B7W?'B??'&?BFV?fW'???E@?FV?fW'??6??VBFV?fW'??B?V?F?67&VV??EbWfW'?v?W&R( B6W'f??p?2F?Rf?V?FF????b5D"6??FV?@??B&WfV?VR&?FV7F????6??FV?B6V7W&?G?7V6??P??