overview of motorola ip rights management (iprm) system: … · overview of motorola . ip rights...

22
Overview of Motorola IP Rights Management (IPRM) System: Content Protection for Home Networks (IPRM-HN) Version 1.2 14 May 2009 MOTOROLA, the Stylized M Logo and all other trademarks indicated as such herein are trademarks of Motorola, Inc. ® Reg. U.S. Pat. & Tm. Off. All other product or service names are the property of their respective owners. Copyright © 2000-2009 Motorola, Inc. All rights reserved.

Upload: others

Post on 03-Feb-2021

2 views

Category:

Documents


0 download

TRANSCRIPT

  • Overview of Motorola IP Rights Management (IPRM) System:

    Content Protection for Home Networks

    (IPRM-HN)

    Version 1.2 14 May 2009

    MOTOROLA, the Stylized M Logo and all other trademarks indicated as such herein are trademarks of Motorola, Inc. ® Reg. U.S. Pat. & Tm. Off. All other product or service names are the property of their respective owners.

    Copyright © 2000-2009 Motorola, Inc. All rights reserved.

  • Overview of Motorola IPRM System (IPRM-HN)

    Table of Contents

    1. Introduction................................................................................................................. 3 1.1 Acronyms............................................................................................................ 3 1.2 References........................................................................................................... 5

    2. IPRM Overview.......................................................................................................... 6 2.1 Security for Persistent Content ........................................................................... 6 2.2 In-Home Content Re-Distribution ...................................................................... 8

    2.2.1 Sharing Content in the Home Domain........................................................ 8 2.2.2 Domain Management.................................................................................. 9 2.2.3 Remote Access to Content in the Home Domain ....................................... 9

    3. IPRM Architecture.................................................................................................... 10 3.1 Local DVR Protection....................................................................................... 10

    3.1.1 Secure Recording ...................................................................................... 10 3.1.2 Secure Playback ........................................................................................ 11

    3.2 Home Network Content Sharing....................................................................... 12 3.2.1 Content Streaming in the Home Network................................................. 12 3.2.2 Content Copying in the Home Network ................................................... 13 3.2.3 Content Transcoding................................................................................. 14 3.2.4 Remote Streaming from the Home Network ............................................ 15

    3.3 Security Algorithms .......................................................................................... 15 3.4 Rights Binding and Translation ........................................................................ 16

    3.4.1 Supported Inputs ....................................................................................... 16 3.4.1.1 CableCARD Input................................................................................. 16 3.4.1.2 Conditional Access System Input ......................................................... 17 3.4.1.3 Free-to-Air Terrestrial Input ................................................................. 17 3.4.1.4 Analog Inputs........................................................................................ 17 3.4.1.5 DTCP Input........................................................................................... 17

    3.4.2 Authorized Outputs................................................................................... 18 3.4.2.1 DTCP Output ........................................................................................ 18 3.4.2.2 DVI and HDMI/HDCP Output ............................................................. 18 3.4.2.3 Analog Output....................................................................................... 18 3.4.2.4 Persistent Bound Storage ...................................................................... 18 3.4.2.5 Persistent Portable Storage ................................................................... 18

    3.4.3 IPRM Mapping of Copy Control Bits....................................................... 19 3.5 Content Protection Profiles ............................................................................... 19

    3.5.1 Content Protection for MPEG-2 Transport Packet Payloads.................... 19 3.5.2 Content Protection for Generic RTP Payloads ......................................... 19 3.5.3 Generic IPRM Message Encapsulation .................................................... 19

    3.6 Key Management & Domain Control............................................................... 20 3.6.1 Support for Multiple DVRs ...................................................................... 20 3.6.2 Limits on an IPRM-Protected Domain ..................................................... 21

    3.7 DLNA Support.................................................................................................. 21 3.8 Certificate Management.................................................................................... 21 3.9 Revocation ........................................................................................................ 22

    4. IPRM Obligations ..................................................................................................... 22

    Motorola, Inc. 2

  • Overview of Motorola IPRM System (IPRM-HN)

    1. Introduction Motorola provides a complete standards-based end-to-end scalable Digital Rights Management (DRM) system for delivery, storage and in-home distribution of digital content over IP networks using file-based delivery or streaming protocols such as Real-time Transport Protocol (RTP) and/or IP-encapsulated MPEG-2 Transport Streams. The system has been developed based on Motorola’s long successful history of the MediaCipher product line for cable and satellite conditional access systems (CAS) and PacketCable security for Voice over IP (VoIP) of which Motorola was a leading author. The IPRM system combines the strength and advantages of both systems applied primarily to Video over IP distribution to achieve a flexible and secure end-to-end content protection system. IPRM has been designed to protect high-value content throughout its lifecycle. The complete IPRM architecture enables protection of content starting with content authoring, going through content management and distribution systems, edge streaming servers or download servers, all the way to the consumer’s home network and the end device intended for content consumption. This document focuses on the subset of the IPRM architecture applicable to capturing, persistently storing, outputting and displaying high-value content within a home environment, including Digital Video Recorders (DVRs) and personal portable devices. The details of the delivery of on-demand content to an in-home device and its eventual consumption are described in Reference [14]. IPRM has been approved by CableLabs for protection of high-value cable content on Digital Video Recorders (DVR) and secure content redistribution in the home (see References [10] and [11] for details).

    1.1 Acronyms 3DES Triple DES AES Advanced Encryption Standard API Application Programming Interface APS Analog Protection System ARIB Association of Radio Industries and Businesses ATSC Advanced Television Systems Committee AVC Advanced Video Coding (also known as H.264) CA Conditional Access or Certificate Authority CAS Conditional Access System CBC Cipher Block Chaining CCI Copy Control Information CDS Content Directory Service

    Motorola, Inc. 3

  • Overview of Motorola IPRM System (IPRM-HN)

    CGMS Copy Generation Management System CIT Constrained Image Trigger CPRM Content Protection for Recordable Media CRL Certificate Revocation List CTR Counter DES Data Encryption Standard DH Diffie-Hellman DLNA Digital Living Network Alliance DOI Domain of Interpretation DMP Digital Media Player DMS Digital Media Server DRM Digital Rights Management DTCP Digital Transmission Copy Protection DVB Digital Video Broadcasting DVR Digital Video Recorder ECB Electronic Code Book ECC Elliptic Curve Cryptography ECDSA Elliptic Curve Digital Signature Algorithm EMI Encryption Mode Indicator EPG Electronic Program Guide ESB Electronic Security Broker protocol EST Electronic Sell-Through HD High Definition HDC Home Domain Controller HDD Hard Disk Drive HDCP High-Bandwidth Digital Copy Protection HMAC Hashed Message Authentication Code IDE Integrated Drive Electronics IANA Internet Assigned Numbers Authority ICANN Internet Corporation for Assigned Names and Numbers IP Internet Protocol IPRM Internet Protocol Rights Management System KDC Key Distribution Center KMS Key Management Server MIME Multipurpose Internet Mail Extensions MoCA Multimedia over Coax Alliance KS Key Store MC MediaCipher (Motorola CAS) MPEG Motion Picture Expert Group OCAP OpenCable Application Platform OCAP-HN OCAP Home Networking Extension PID Packet Identifier PKI Public Key Infrastructure PMP Portable Media Player POD Point of Deployment module [used interchangeably with CableCARD] RFC Request for Comments

    Motorola, Inc. 4

  • Overview of Motorola IPRM System (IPRM-HN)

    RSA Rivest-Shamir-Adelman RTP Real-time Transport Protocol SAP Session Announcement Protocol SATA Serial Advanced Technology Attachment SD Secure Digital or Standard Definition SDP Session Description Protocol SHA Secure Hash Algorithm SMS Subscriber Management System SRO Session Rights Object SRM System Renewability Message STB Set-Top Box Sub-CA Subordinate Certificate Authority (subordinate to a Root CA) TGT Ticket Granting Ticket USB Universal Serial Bus VOD Video on Demand VoIP Voice over IP

    1.2 References [1] Public Key Cryptography for Initial Authentication in Kerberos [draft-ietf-cat-

    kerberos-pk-init-25] [2] The Kerberos Network Authentication Service (V5) [RFC1510] [3] Federal Information Processing Standards Publication 197 – Announcing the

    Advanced Encryption Standard (AES), November 26, 2001. [4] HMAC: Keyed-Hashing for Message Authentication, IETF (Krawczyk, Bellare,

    and Canetti), Internet Proposed Standard, RFC 2104, March 1996. [5] Secure Hash Algorithm, Department of Commerce, NIST, FIPS 180-1, April

    1995. [6] OpenCable™ CableCARD™ Copy Protection System Interface Specification, 2.0,

    OC-SP-CCCP2.0-I01-050331 [7] ATSC Standard: Program and System Information Protocol for Terrestrial

    Broadcast and Cable (Revision C), A/65C [8] IETF RFC 3280, Internet X.509 Public Key Infrastructure Certificate and

    Certificate Revocation List (CRL) Profile, Network Working Group, R. Housley, W. Polk, W. Ford, D. Solo, April 2002.

    [9] SEC1: Elliptic Curve Cryptography, Standards for Efficient Cryptography, Version 1.0, Certicom Research, September 20, 2000.

    [10] DFAST Technology License Agreement For Unidirectional Digital Cable Products, www.cablelabs.com.

    [11] tru2way™ Host Device License Agreement; CableLabs, May 2008 [12] DTLA Digital Transmission Protection License Agreement (Adopter

    Agreement); www.dtcp.com. [13] Overview of Motorola IPRM System: Electronic Security Broker (ESB)

    Protocol; Motorola, March 2009. [14] Overview of Motorola IPRM System: Delivery of Multimedia on Demand

    (IPRM-VOD); Motorola, March 2009.

    Motorola, Inc. 5

    http://www.cablelabs.com/http://www.dtcp.com/

  • Overview of Motorola IPRM System (IPRM-HN)

    2. IPRM Overview The IP Rights Management (IPRM) system allows content owners and service providers to deliver content in a secure manner so that the content owner’s rights are protected, and business models and contracts enforced, while simultaneously providing end-users with seamless content consumption controls. Within the home, IPRM also provides a mechanism for importing content from a different security system (e.g. conditional access subsystem, such as MediaCipher, or CableCard [6], or ATSC broadcast, or analog input, or CPRM), re-encrypting that content uniquely for the receiving device, persistently storing that content, and exporting that content at a later time to another security system (e.g. HDCP, DTCP, CPRM or CSS). For content that is explicitly or implicitly allowed to be shared within the user’s domain, IPRM provides the ability to securely stream or copy persistently stored content from the initial receiving device to another device that has been authenticated as part of that customer’s personal IP network, also called the secure home domain. For example, this allows sharing of content between a DVR and a STB, or a DVR and a mobile handset, a Portable Media Player (PMP) or Personal Computers (PCs) that are all registered as part of the same user domain. When two end points want to securely stream or copy content between them, a secure session is established which includes a set of symmetric keys that both end points share and use to encrypt, decrypt and authenticate individual packets or messages. This portion of the IPRM system employs symmetric cryptography, so that latency and loading are minimized during session set-up. The secure session is used to communicate control and rights information, as well as key exchange. Content is transmitted over a separate encrypted channel which supports multiple file-based and streaming formats.

    2.1 Security for Persistent Content IPRM supports robust security mechanisms for persistent storage of high-value content. In general, IPRM enables an authorized device to capture streamed content or to download file-based content, and save it for future playbacks. Such storage media can be hard drives (internal or external), memory cards, DVD-R, and other forms. Persistently saved content is protected and never available in a clear-text form all at once but rather when it is played back, it is decrypted one small unit at a time, while preserving the ability to fast forward, rewind, pause, and seek into the middle of the content. As an alternative, content may be pre-positioned (typically protected under a conditional access system) with the capability to purchase such cached unpaid-for content later and then stream it from local storage. In the home, IPRM may accept content from a variety of secured sources. For example, a home gateway might receive content from an IP delivery system, protected via a conditional access system, or from an over-the-air broadcast such as ATSC, from IEEE 1394 under DTCP, from the home IP network protected by DTCP-IP, or from an analog

    Motorola, Inc. 6

  • Overview of Motorola IPRM System (IPRM-HN)

    input. Each source typically presents a set of copy controls or other control information that IPRM imports, and acts upon. During a local playback, IPRM allows streaming to approved consumer electronics industry output interfaces (e.g. IEEE 1394, HDMI, home IP network, and analog composite or component) while passing copy control related information to any external interface that supports it. For example, for IEEE 1394/DTCP the copy control information (CCI) and Encryption Mode Indicator (EMI) is sent along with the content, similar to DTCP-IP as used by DLNA. For an analog output interface that supports copy protection, IPRM specifies the type of analog protection system (e.g. Macrovision) to invoke and includes CGMS-A and other related information with the output where appropriate. When content is sent over an external unprotected analog interface, IPRM controls the resolution of the output according to the Constrained Image Trigger. For MPEG-2 transport content marked with the Redistribution Control descriptor (a.k.a. Broadcast Flag) in the PMT [7], IPRM prevents unauthorized redistribution of such content. For content marked as copy never with time-shifting allowed, IPRM limits the lifetime of the pause buffer to prevent permanent recordings. Additional controls to support the multitude of business models include specifying the number of times that content can be played back, and support for a rental model by controlling the period during which a consumer is allowed to play back a particular piece of content. A “subscription” rental, as common in the music industry, is also supported.

    Media Client

    QAMTuner

    CableCARDDFAST or Embedded CA Domain

    PersistentStorage(all types)

    HDMI

    Media Server(DVR)

    1394 Analog

    Media Client

    Router

    IPRM Local Domain

    DTCPDomain

    HDCPDomain

    MacrovisionDomain

    CA Domain

    Analog

    MacrovisionDomain

    Portable Device

    storagePortable StreamingDevice

    IPRM Remote Domain

    ATSCTuner

    B-Flag

    EthernetIPRM IPTV Delivery

    Exportable Removable Storage

    Figure 2-1: Multi-room DVR and Client Example IPRM supports enforcement of content access rules, such as copy control. At each input domain boundary, (see Figure 2-1) rules information (e.g. CCI) is imported and securely

    Motorola, Inc. 7

  • Overview of Motorola IPRM System (IPRM-HN)

    linked with the received media. Similarly, at each output boundary rules information is exported to the appropriate output control mechanism.

    2.2 In-Home Content Re-Distribution In addition to content distribution and persistent storage, and its output on industry defined interfaces, IPRM also supports the concept of the home domain, a collection of IPRM devices identified specifically with the home or the user’s household, where content may be shared. The content usage rules determine the circumstances under which the consumer may make one or more copies of such content or render it on such multiple in-home devices. In order to fully enforce content usage rules, IPRM requires authentication of all devices within the home network. The same content rights that apply to the content stored on a persistent storage device (e.g. DVR, handset, etc.) also apply to the other devices in the DRM domain. For example, if the content is to expire after some period of time, the rule has to be enforced on each device that is a member of the home domain. In the case that a device is not able to maintain secure time, then that device would be given a one-time rendering of the content without an ability to store a local copy. In general, if a device is not capable of enforcing all of the relevant DRM rules, its access to stored content will be more restricted. There are also additional rules defined specifically for the DRM domains. In order to fully enforce content usage rules, IPRM protection needs to be applied within the home network. If the content provider is not aware of all of the devices on the home network, these devices need to register with the Home Domain Controller (HDC), the point of domain control, and comply with the domain policy (e.g. maximum number of devices in a domain, proximity test, etc.). IPRM inside a home network securely translates content usage rules between the security systems used to deliver the content to the home, and any non-IPRM security systems used to protect the content within the home (e.g., outputs like IEEE 1394/DTCP, DLNA/DTCP-IP). The translation and interpretation of different types of persistent controls and sometimes the same persistent controls, essentially forms an “IPRM Policy,” and is definitely delivery system dependent, and often governed by signed legal licenses permitting such access. Thus an IPRM client may receive ATSC content protected using the Broadcast Flag (Redistribution Descriptor), Conditional Access-protected content with CCI controls, DLNA/DTCP-IP or IEEE 1394/DTCP content, etc., behave appropriately, and output that content subsequently to other IPRM devices in the home, HDCP/HDMI connections, or analog outputs with Macrovision protection and/or CGMS-A, etc. 2.2.1 Sharing Content in the Home Domain A single device in an IPRM-protected domain is designated as the domain control point, called the Home Domain Controller (HDC), and is responsible for device registration into

    Motorola, Inc. 8

  • Overview of Motorola IPRM System (IPRM-HN)

    the domain, and also for obtaining Certificate Revocation Lists (CRLs), processing them and making them available to other devices in the home network. There are several possible options to share content within an IPRM-protected domain:

    1. Stream content from a DVR to another device that is in the proximity of the transmitter (see Section 3.6.2 on proximity controls).

    2. Copy content marked as Copy-Free from a DVR to another storage device which is in the proximity of the transmitter. When the use of redistribution control is indicated, Copy-Free content must be encrypted and protected by IPRM. For Copy-Free content, proximity controls prevent the content from being distributed over the Internet.

    3. Move content that was originally received as Copy-One-Generation (and stored as Copy-No-More) from a DVR to another storage device in the proximity of the transmitter.

    4. Copy content marked as Copy-One-Generation to one or more devices within the domain if the Source Policy allows it (a.k.a. domain copy privilege).

    IPRM controls copying or moving content between storage devices by controlling the copying or moving of content decryption keys between the storage devices and by binding these keys to each device.

    There may also be devices in the IPRM-protected domain that are capable of only playing streamed content, without any support for persistent storage. Such a device would not persistently save the encrypted content or any of the associated information (e.g. keys, persistence rules and metadata). These devices may still have additional digital or analog output ports that must be enabled or disabled, depending on the copy protection rules associated with the content. 2.2.2 Domain Management IPRM domains are governed by a domain policy. There are several different mechanisms to control this policy:

    1. Stand-alone autonomous domains are controlled by a default policy which may specify a maximum number of domain members and proximity controls;

    2. A service provider may extend the default policy by downloading a service-provider-specific policy;

    3. A service provider may also control admission to the domain be explicitly listing the allowed devices and by assigning additional capabilities to these devices, such as a permission to allow remote access.

    2.2.3 Remote Access to Content in the Home Domain Domain control policy may allow one or more devices in the home to access the domain content remotely while they are out of the home (e.g. outside of the immediate proximity of the content server device).

    Motorola, Inc. 9

  • Overview of Motorola IPRM System (IPRM-HN)

    3. IPRM Architecture IPRM supports several different deployment and application models. It can be used in:

    1. A stand-alone environment to protect content stored on a Digital Video Recorder (DVR) or other storage device;

    2. Home networking environment to securely distribute content within the user’s IPRM-protected domain;

    3. A home network environment with limited control/assist by infrastructure. If available, infrastructure can be employed to deliver CRLs and secure time to the home devices, and optionally override or assist in domain registration.

    4. End-to-end content distribution protecting content at the Service Provider site and during its distribution to the end user. This aspect of IPRM is covered by IPRM-VOD (see Reference [14] for details).

    The above configurations may be combined to satisfy different use cases. This document focuses on persistent in-home storage and in-home content sharing aspect of the IPRM system also called IPRM-HN. IPRM employs a combination of asymmetric (Public Key Infrastructure (PKI) using elliptic curve (ECC) or RSA) and symmetric cryptography using standard algorithms such as AES and 3DES. IPRM key management protocol called Electronic Security Broker (ESB) is based on Kerberos (RFC 1510) (references [1] and [2]) and the use of X.509 certificates (RFC 3280) (reference [8]). An overview of the ESB protocol can be found in Reference [13].

    3.1 Local DVR Protection There are two main use cases that are applicable for local content protection: (1) secure recording of content and (2) secure playback of content. The detailed steps of these scenarios are described in the following sections. 3.1.1 Secure Recording The detailed steps of the content recording scenario are described below and depicted in Figure 3-1:

    1. The content is received from an external source; 2. Such content, if protected, is associated with access rights, in the form of Copy

    Control Information (CCI) or related metadata; 3. If the content is allowed to be recorded, a rights manager derives a unique key

    bound to the content rights and to this device. 4. For protected digital content, each content packet is first decrypted using the

    original protection mechanism (e.g. conditional access encryption) and 5. Immediately re-encrypted using the content encryption key, such that the content

    is never available all in the clear; (Analog content would be digitized, and then encrypted, while ATSC content would be encrypted.)

    Motorola, Inc. 10

  • Overview of Motorola IPRM System (IPRM-HN)

    6. The content rights are protected against unauthorized modifications by the binding mechanism, and stored in persistent storage (e.g. internal or external hard drive, Flash memory, Recordable DVD, etc.);

    7. Content is stored in its protected format, also in persistent storage.

    DVR

    Persistent Storage

    CA Interface

    Decrypt Encrypt

    Rights Manager

    Protected Rights

    Protected Content

    Digital Output (DTCP, HDCP)

    Analog Output (CGMS & Macrovision)

    12 3

    4 5

    6

    7

    Figure 3-1: Content Recording

    Since persistently stored content is cryptographically bound to the device, it cannot be played on another device just by copying the encrypted content and the associated rights data without properly exercising the IPRM key management protocols and enforcing the copy protection rules. 3.1.2 Secure Playback The detailed steps of the content playback scenario are described below and depicted in Figure 3-2:

    1. Before a stored protected content can be played back, the associated rights must be checked for integrity by deriving the content key under the rights binding. Then all applicable content access rules (e.g. rental period, playback count) must be enforced including analog and digital output control;

    2. If the rules permit the consumption of the content, the content decryption key will be loaded to the content decryptor;

    3. If the content is consumed on an external device (e.g. Digital TV), the corresponding analog and/or digital output must be configured to protect the content according to the relevant copy protection information in the rights data. This includes DTCP, HDCP, APS, Constrained Image, etc.;

    4. Rights data stored on disk must be updated as required (for example, play count decremented);

    5. Finally, the content can be read off the disk, decrypted, and optionally decoded; 6. If the content is output on a secure interface, the content is protected using the

    corresponding copy protection technology (e.g. DTCP, HDCP, APS, etc.).

    Motorola, Inc. 11

  • Overview of Motorola IPRM System (IPRM-HN)

    Similarly, content may be separately output to a digital removable medium (e.g. Recordable DVD, SD Card, etc.), protected under another approved output protection technology, such as CSS or CPRM.

    DVR

    Persistent Storage

    CA Interface

    Decrypt Decrypt

    Rights Manager

    Protected Rights

    Protected Content

    Digital Output (DTCP, HDCP)

    Analog Output (Macrovision)

    1

    2

    3

    3

    4

    5

    66 Figure 3-2: Secure Playback

    3.2 Home Network Content Sharing IPRM protects content distributed over in-home IP networks (e.g. Ethernet, HomePLUG, MOCA, WiFi, USB/IP, etc.) to authorized devices in the IPRM-protected domain. The following sections describe two main content sharing scenarios: streaming and copying. 3.2.1 Content Streaming in the Home Network The detailed steps of a secure content streaming in the home network are described below and depicted in Figure 3-3:

    1. Before content can be streamed or copied to another authorized device, the source and destination devices must be members of the home domain, and authenticate each other. Domain registration and authentication is based on the Electronic Security Broker (ESB) protocol that is described in Section 3.6.

    2. Next, the destination device will request the playback of a specified piece of content;

    3. The source device checks the rights data to verify that the requested access can be granted (e.g. copy protection has not been violated, rental period has not expired, etc.);

    4. Then the content decryption key is derived under the rights binding and, together with the rights, is securely communicated back to the destination device;

    Motorola, Inc. 12

  • Overview of Motorola IPRM System (IPRM-HN)

    5. In some cases, the original rights data must be updated accordingly (e.g., as in the case of counted playback, or disabled, as in the case of a secure move);

    6. If the content is going to be output on an approved protected interface, the corresponding parameters (e.g. CCI) are communicated to that interface module for subsequent content protection;

    7. Once the destination device obtains the decryption key, it configures the decryption engine;

    8. Content transfer process may proceed; 9. Output interfaces apply the relevant content protection and output content.

    Figure 3-3: Home Network Streaming Scenario

    3.2.2 Content Copying in the Home Network If the content is going to be stored directly on the destination device (for example, if it is a portable device) as shown in Figure 3-4, a corresponding protected rights object with the acquired rights and the decryption key is created and stored, under a unique device key. The first 5 steps are the same as in the streaming scenario described in Section 3.2.1:

    6. Device stores the acquired rights and the content decryption key in the Protected Rights data object;

    7. The content is stored in its encrypted delivered form.

    Motorola, Inc. 13

  • Overview of Motorola IPRM System (IPRM-HN)

    Figure 3-4: Home Network Copying Scenario

    Once the content has been copied or moved from a DVR to a portable device, that device will retain the ability to play back the content (as described in the Secure Playback scenario in Section 3.1.2), even when it is no longer in proximity to the Home network or to the DVR from which the content was shared. Note that if the original content stored on the DVR is marked as copy-one-generation and the “domain copy” policy is not allowed, the content must be moved rather than copied to the portable device rather than making a second copy. 3.2.3 Content Transcoding Not all devices in the home may be capable of playing content in the format, encoding and resolution used by the DVR. For example, a DVR may store MPEG-2 encoded, high definition content in an MPEG-2 transport stream format while a PMP may require Advanced Video Coding (AVC) in a MPEG-4 file format at a standard or lower resolution. An external transcoding device may be required to convert the content from one format to another. Since this process also requires decryption of the original content and re-encryption of the newly transcoded content, the transcoding device must include an IPRM module that authenticates the device to the DVR and performs key exchange with the DVR in order to decrypt the original content. There are several alternatives for handling the transcoded content.

    Motorola, Inc. 14

  • Overview of Motorola IPRM System (IPRM-HN)

    One option is to return the transcoded copy back to the DVR such that it can be subsequently redistributed to one or more PMPs that are members of the home domain. The DVR will maintain the DRM and copy protection rules for both the original and the transcoded content. Another option allows the transcoding device to further redistribute the transcoded content to other devices that are members of the same home domain directly. In this case, the transcoding device manages the associated DRM rules and performs key exchange with the PMP without the assistance of the DVR. IPRM guarantees that content is kept protected even during the transcoding process. 3.2.4 Remote Streaming from the Home Network Additionally, IPRM also supports remote access to the content stored in the home for content that permits such access. Remote access requires:

    1. The remote device must be an active member of the home domain (see Section 3.6 for details);

    2. The device must be approved for remote access; 3. Access is via streaming only of the single requested content; 4. Access to such content may be delayed if the content rights specify such

    restriction.

    This mechanism allows users to enjoy their content while they are traveling without any additional risk of unauthorized content redistribution to the content owners.

    3.3 Security Algorithms The following cryptographic algorithms are used in the IPRM system to protect content, control messages and other secrets for privacy, authenticity and integrity reasons as appropriate. The ESB protocol used by IPRM also allows the negotiation of these algorithms, where several are supported, to achieve the highest level of protection. IPRM supports the following industry standards:

    AES is used in a 128-bit block cipher mode that must be implemented according to FIPS 197 Error! Reference source not found..

    3DES is an alternative to AES and can be used with either 168-bit keys or 112-bit keys.

    The keyed hash employed by the HMAC-Digest Attribute must use the HMAC message authentication method Error! Reference source not found. with the SHA-1 hash algorithm Error! Reference source not found.. HMAC-SHA1 is used to authenticate messages. The key is 160 bits long.

    Motorola, Inc. 15

  • Overview of Motorola IPRM System (IPRM-HN)

    IPRM normally uses RSA signatures and Diffie-Hellman key agreement for public key algorithms. Key sizes of 1024 bits or higher are used. Certificate Authority RSA modulus is at least 2048 bits.

    In some key storage sensitive environments, Elliptic Curve Cryptography (ECC) Public Key Operations Error! Reference source not found. with the Home Domain Controller (HDC) is used to distribute session keys. ECDSA algorithm is used for digital signatures and ECDH (Elliptic Curve Diffie-Hellman) is used as a key agreement algorithm. ECC curves are used with key sizes between 163 and 256 bits. The combination of X.509 certificates and ECDSA signatures are used to authenticate a host (an IPRM entity), while ECDH is used to derive a shared secret that is then used to encrypt a symmetric session key.

    3.4 Rights Binding and Translation IPRM processes incoming CCI and/or EMI information, DRM rules and other related metadata, determines whether the associated content can be recorded, and if recording is permitted, translates the relevant copy control data into the internal rights data format. This data is bound to the content key to prevent unauthorized rules modifications. The rules stored in the rights data are checked before a playback of recorded content is allowed. The information stored in the rights data is also used to set protection technologies on all relevant output interfaces, including DTCP, HDCP and Macrovision. The rights are securely bound to the recorded content using encryption. The IPRM system derives a unique encryption key for each recorded piece of content through the binding process, and based upon a unique device key. This prevents end-users from taking an unauthorized copy of the protected content and the associated rights to another device. 3.4.1 Supported Inputs IPRM accepts content from several different interfaces. The details of integration with the protection systems associated with each example input are described in the following sections.

    3.4.1.1 CableCARD Input The IPRM system can interface with the CableCARD-Host Interface Module in order to perform two functions: (1) Interpret the incoming CCI and translate it to the IPRM internal rights data format and (2) re-encrypt the incoming content for local storage. This is performed according to the relevant SCTE and OpenCable specifications. For the cases where CCI does not allow a permanent copy to be made, a temporary copy of the content can still be made in order to support trick modes such as PAUSE and REWIND. In this case, a temporary copy is limited to 90 minutes and the settings of Macrovision, APS and CGMS-A controls on the analog input are translated to

    Motorola, Inc. 16

  • Overview of Motorola IPRM System (IPRM-HN)

    appropriate copy protection settings on analog and digital outputs to a display device. For OCAP cable STBs, this 90 minute number can be overridden by an application.

    3.4.1.2 Conditional Access System Input The IPRM system can interface with any embedded or smart card based CA system. As with the CableCard interface, IPRM must interpret the incoming CCI and related metadata, translate it to the IPRM internal rights data format and (2) re-encrypt the incoming content for local storage. For the case where the conditional access system indicates that no permanent copy can be made, a temporary copy of the content is allowed in order to support trick modes such as PAUSE and REWIND. Retention time defaults to 90 minutes unless the CA system specifies some other value. Appropriate output copy protection settings are applied. The IPRM-HN system may also ingest and protect content delivered to the home using IPRM protection. See IPRM-VOD Overview [14] for details.

    3.4.1.3 Free-to-Air Terrestrial Input The IPRM system can accept unencrypted free-to-air digital streams from a tuner/demodulator. In this case, IPRM translates the redistribution control information to the IPRM internal rights data format and encrypts the incoming content for local storage. ATSC, DVB-T, and ARIB represent a type of over-the-air or free-to-air content distribution system.

    3.4.1.4 Analog Inputs If an analog input from the cable plant is accompanied by CGMS-A and APS information which allows a copy of the content to be made, the content may be digitized, compressed, encrypted and recorded. IPRM creates content rights data corresponding to this recorded content where it keeps track of the values of the CCI bits. For the cases when CGMS-A and APS information does not allow a permanent copy to be made, or when the analog input is already Macrovision-protected, a temporary copy of the content can still be made in order to support trick modes such as PAUSE and REWIND. In this case, a temporary copy is limited to 90 minutes and the settings of Macrovision, APS and CGMS-A controls on the analog input are translated to appropriate copy protection settings on analog and digital outputs to a display device.

    3.4.1.5 DTCP Input IPRM-HN may also ingest content originated on another device in the home, for instance a DLNA Digital Media Server (DMS), using DTCP or DTCP-IP link protection. IPRM will process and obey the EMI and other relevant copy protection information as specified in the DTLA compliance rules for sink devices.

    Motorola, Inc. 17

  • Overview of Motorola IPRM System (IPRM-HN)

    3.4.2 Authorized Outputs IPRM allows content to be exported from the IPRM-protected domain to other approved outputs with an alternate copy protection system, such as DTCP, DVI and HDMI/HDCP, and analog outputs protected by Macrovision and CGMS-A.

    3.4.2.1 DTCP Output IPRM integrates with DTCP over IEEE 1394 such that it passes EMI information received from the content source and enforces the proper CCI conversion. A DTCP descriptor is also passed through the MPEG-2 PMT. DTCP-IP is also supported as an approved IP output, typically used to stream content to DLNA or OCAP-HN devices.

    3.4.2.2 DVI and HDMI/HDCP Output IPRM integrates with HDCP for DVI and HDMI outputs for protected content.

    3.4.2.3 Analog Output For the case of analog input content, IPRM turns on Macrovision for the analog output as controlled by CEA-608-C, using APS control bits and CGMS-A information. CGMS, APS and Redistribution Control are also included appropriately. For the case of digital input content, IPRM applies Macrovision, CGMS-A and APS and Redistribution Control as required by the specific security system involved. IPRM also triggers the lowering of video resolution of content as specified by the CIT control when outputting HD content over an analog output.

    3.4.2.4 Persistent Bound Storage IPRM can encrypt content for storage (e.g. hard drive, etc) in a STB or other home device as directed by incoming DRM or CP (Copy Protection) rules (e.g. CCI) irrespective of the storage technology type or a specific interface to the storage element (e.g. IDE, SATA, USB). Since the storage encryption keys (or the rights data protection) are unique to the device, such content cannot be consumed by any other device simply by moving the storage element. This unique binding approach works equally well whether the storage element is internal to the STB, or external.

    3.4.2.5 Persistent Portable Storage Currently, IPRM includes DTCP among its approved outputs. Since DTCP permits CPRM protection for export to SD cards, IPRM also permits SD cards to be approved forms of output. As DTCP only allows this for standard definition content and lower resolution, this requirement is also enforced for IPRM. Additional portable storage support such as DVD/CSS is anticipated after discussion with content owners, although additional rights data control may be required.

    Motorola, Inc. 18

  • Overview of Motorola IPRM System (IPRM-HN)

    3.4.3 IPRM Mapping of Copy Control Bits Specific IPRM mapping for each input interface and output interface are often dependent on service provider policies; therefore, specific input-output copy control mappings are available on request.

    3.5 Content Protection Profiles 3.5.1 Content Protection for MPEG-2 Transport Packet Payloads In this mode, each MPEG-2 transport packet payload is encrypted in-place with the 4-byte transport headers and adaptation fields left in the clear. The typically used encryption algorithms are AES-ECB, AES-CBC with 128-bit keys, and 2-key 3-DES ECB encryption that must be implemented according to FIPS 197 [3]. These protected MPEG-2 packets can be encapsulated into UDP, TCP or RTP for transmission over the home IP network, typically 7 MPEG-2 packets per IP packet. 3.5.2 Content Protection for Generic RTP Payloads Generic RTP payloads can be protected using SRTP, using AES in counter mode and an optional SHA1-HMAC (truncated to 10 bytes) for packet authentication. 3.5.3 Generic IPRM Message Encapsulation In addition to the use of in-place encryption for MPEG-2 transport packet payloads, and SRTP, there are other types of information transfers that require protection. Each such transfer is encrypted using a symmetric encryption algorithm, where AES with 128-bit key is defined but other encryption algorithms could also be negotiated – as long as the effective strength of such algorithm is equal or better than 112-bit 3-DES. Typically, encryption utilizes CBC (Ciphertext Block Chaining Mode) which requires an Initialization Vector (IV). After such IPRM encryption is applied, it adds a clear header that includes the information needed to derive an IV. Optionally, Generic IPRM message encapsulation can also provide message integrity and replay protection. Each encrypted message would include a Message Authentication Code (MAC), where the defined algorithm is HMAC-SHA1, but other algorithms may be negotiated as well. Replay protection is provided by including a sequence number in the clear IPRM header, where this sequence number is authenticated along with the rest of the IPRM header and the encrypted content using the MAC. The keys used to encrypt such information are derived from a key that is established using ESBroker key management.

    Motorola, Inc. 19

  • Overview of Motorola IPRM System (IPRM-HN)

    3.6 Key Management & Domain Control The ESBroker protocol serves two main purposes for IPRM. First, via the single Home Domain Controller (HDC) all home devices are securely registered. Second, ESBroker provides key management for the content keys that flow in the home network.

    The HDC fundamentally keeps track of all the provisioned (registered) clients and servers (e.g., DVRs) in a system and the cryptographic data associated with them. Additionally, the HDC authenticates clients, and issues tickets for those clients to use as trusted tokens during client server communications. The HDC assigns expiration time to tickets, requiring clients to periodically renew them. By allowing clients to temporarily cache these tickets, the system eliminates transactions to the HDC that would otherwise occur before each request of content decryption keys from Key Management Servers. (Tickets are symmetric key constructs defined in the Kerberos documentation [2].)

    The client device (e.g. Media Hub, DVR, STB, PMP, and Handset) registers with the HDC using its digital certificate (factory provisioned) and the HDC stores the client’s unique identity and public key in its database.

    Once a device is provisioned into the home network and receives a ticket for some media hub (i.e. DVR), it can request content to be streamed from the media hub. A secure key management message is sent from the client device to the media hub using the Ticket to authenticate itself and to establish a secure session. Once the media hub has authenticated the device and has verified the rights associated with the requested content, it will send the content decryption key and content access rules (copy protection, DRM rules, etc.) to the device in a secure manner such that only the receiving device can verify the integrity of the message and decrypt the cryptographic data. Details of the IPRM key management protocol called ESBroker can be found in Reference [13]. 3.6.1 Support for Multiple DVRs Each DVR and other content storage source (e.g. Home Media Gateway, network accessed storage) in an IPRM-protected domain corresponds to a content server that must be registered to the HDC in order for content on that DVR to be transferable to another device within the same domain. Registration includes generation of a unique (typically AES) service key assigned to that server for the purpose of encrypting ESBroker tickets.

    If there is just a single DVR in the domain, typically it will include the HDC functionality on the same device and thus the management of a Service Key can be done through a local application that does not need to make use of a secure protocol. However, when multiple content source devices are added to the same domain, the additional units have to be registered securely to the HDC.

    Motorola, Inc. 20

  • Overview of Motorola IPRM System (IPRM-HN)

    3.6.2 Limits on an IPRM-Protected Domain The HDC controls the size of the IPRM-HN-protected domain by limiting the maximum number of devices that can be provisioned to the domain at the same time. This limit is currently set to 16 devices and may be adjusted by a service provider. To limit the geographical size of the IPRM-protected domain, and prevent connections across a wide area network such as the Internet, IPRM employs a proximity control during domain registration and renewal similar to other copy protection technologies, utilizing industry accepted upper limits of RTT=7ms and TTL=3. Proximity is checked during client provisioning with the HDC. Optionally for content that is limited by the delayed distribution restriction, the proximity test is also performed right before the content transfer session is established in the IPRM-protected domain.

    A Service Provider may also provide an explicit domain control by specifying an exact list of devices that are allowed to join the domain.

    3.7 DLNA Support IPRM may be integrated into a DLNA network by using existing UPnP constructs or by extending them:

    1. IPRM-protected content stored on a DVR which may act as a Digital Media server (DMS) will be advertised in the Content Directory Service (CDS) using an IANA-registered MIME type “vnd.motorola.iprm”. This allows client devices, or Digital Media Players (DMPs) to determine whether they can consume such content.

    2. IPRM also defines an IPRM Service which may be used during device discovery to indicate which device may act as a HDC. Other devices will use this information to start the domain registration process.

    3.8 Certificate Management The IPRM system makes use of standard X.509 certificates (compliant with RFC 3280) when authenticating IPRM clients to a HDC and vice versa. The use of digital certificates [8] and public key cryptography means that the HDC keeps a database of only the client public keys – and not their private or secret keys. The use of digital certificates and public key cryptography makes the overall system more secure and easier to administer. The overhead of public key cryptography is in this case minimal because it is used only during the client’s initial authentication to the HDC and is only repeated after a period of multiple weeks for the purpose of ticket renewal. An entity that is responsible for issuing digital certificates to clients is generally known as a Certificate Authority (CA). For Motorola’s IPRM-enabled devices, public/private key

    Motorola, Inc. 21

  • Overview of Motorola IPRM System (IPRM-HN)

    Motorola, Inc. 22

    pairs and the corresponding digital certificates are generated by the Motorola PKI Center and installed into each device during a manufacturing process.

    3.9 Revocation When a certificate is revoked, its serial number will be added to a CRL (Certificate Revocation List) that is generated by the same Certificate Authority that previously issued the corresponding certificate. The format of a CRL is defined by the X.509 standard and its ASN.1 encoding. If an infrastructure connection is present, the HDC can check the infrastructure CRL server periodically, and revoked clients no longer permitted to access stored content. For the case of primarily one-way content delivery and control, or when no infrastructure access is present, the IPRM system in the home is required to support any broadcast CRLs carried within the incoming content flows as part of the MPEG-2 transport stream delivery or IP network equivalent. Thus the IPRM device must examine the broadcast CRL streams to check for revocation.

    4. IPRM Obligations As with all DRM implementations, a major issue is the proper implementation of the security subsystem on each home device. Motorola has a long history of successful security implementation, and recognizes that this typically involves both hardware and software design. These aspects have been quantified in the industry in the form of “compliance and robustness rules”, a.k.a. C&R regime. The IPRM Compliance and Robustness Rules must of course include the parameters of the corresponding agreements for each supported input type. Thus if we accept a CableCard input, IPRM must meet the CableCard robustness and compliance rules. When the requirements are not so specific, as for some analog inputs, and the ATSC input, IPRM rules are still extremely similar to those other agreements. (The best models are the DFAST [10], tru2way™ [11] and DTCP [12] robustness and compliance rules.)

    1. Introduction1.1 Acronyms1.2 References

    2. IPRM Overview2.1 Security for Persistent Content2.2 In-Home Content Re-Distribution2.2.1 Sharing Content in the Home Domain2.2.2 Domain Management2.2.3 Remote Access to Content in the Home Domain

    3. IPRM Architecture3.1 Local DVR Protection3.1.1 Secure Recording3.1.2 Secure Playback

    3.2 Home Network Content Sharing3.2.1 Content Streaming in the Home Network3.2.2 Content Copying in the Home Network3.2.3 Content Transcoding3.2.4 Remote Streaming from the Home Network

    3.3 Security Algorithms3.4 Rights Binding and Translation3.4.1 Supported Inputs3.4.1.1 CableCARD Input3.4.1.2 Conditional Access System Input3.4.1.3 Free-to-Air Terrestrial Input3.4.1.4 Analog Inputs3.4.1.5 DTCP Input

    3.4.2 Authorized Outputs3.4.2.1 DTCP Output3.4.2.2 DVI and HDMI/HDCP Output3.4.2.3 Analog Output3.4.2.4 Persistent Bound Storage 3.4.2.5 Persistent Portable Storage

    3.4.3 IPRM Mapping of Copy Control Bits

    3.5 Content Protection Profiles3.5.1 Content Protection for MPEG-2 Transport Packet Payloads3.5.2 Content Protection for Generic RTP Payloads3.5.3 Generic IPRM Message Encapsulation

    3.6 Key Management & Domain Control3.6.1 Support for Multiple DVRs3.6.2 Limits on an IPRM-Protected Domain

    3.7 DLNA Support3.8 Certificate Management3.9 Revocation

    4. IPRM Obligations