Protecting Rights

Protecting Rights

The MPEG-1 standard was an offspring of its age. Just as CD Audio had no content protection provision  – something the music industry had come to regret – the MPEG-1 standard has no content protection provision.

MPEG-2 is a different story. Even without considering subscription-based CATV, pay TV, both on terrestrial and satellite networks, was not unknown in the early 1990s. Most of the pay TV available at that time was good old composite television with some tricks to scramble video and audio. Anybody wanting to watch those programs could subscribe to a Service Provider and receive a special “decoder” to unscramble the signal so that he could watch the TV programs. Some pay TV services using MAC already existed because this was a well-designed system where video information was analogue (when the design of MAC had started that was the only practical choice), but all the rest of the information, including audio, was (uncompressed) digital and packet-based! In particular it already contained the necessary infrastructure to provide encryption support. 

Pay TV has been a major driver for MPEG-2 use. The content protection systems of analogue pay TV were fully proprietary, but the technology was rather simple and STBs not very costly. The same could have been done with MPEG-2, but the pay TV constituency rightly assessed that there would be benefits in adopting a basic standard infrastructure for the clear-text version of the signal. So MPEG-2 Systems provides two types of messages: Entitlement Control Messages (ECM) and Entitlement Management Messages (EMM) that simplifies implementation of an encrypted broadcasting service.

In Figure 1 below the payload is first scrambled with a Control Word (CW). The CW is sent scrambled with a Service Key (SK) via an ECM message. The CW is changed with a frequency of about 1 Hz. The SK is scrambled using a user-specific key and sent via an EMM message. As all users must receive a scrambled SK, this information reaches the intended user within a much longer period of time. 

MPEG-2_CP_encoder

Figure 1 – MPEG-2 content protection (encoder)

The recovery of the clear-text information is achieved as indicated in Figure 2 where the scrambled SK is extracted from the EMM message and converted to clear text using the User Key (UK) stored in the receiver’s smart card. In its turn this descrambles the CW that can eventually be used to descramble the audio-visual payload. This is where MPEG-2 Systems stops. Nothing is said about the nature of the keys, the scrambling algorithms, etc. 

MPEG-2_CP_decoder

Figure 2 – MPEG-2 content protection (decoder)

The DVD encryption system – known as Content Scrambling System – is conceptually similar to the system used for pay TV. The player has a Master Key, which is unique to the DVD player manufacturer and accordingly also known as a Player Key (PK). This is equivalent to the key stored in the smart card inserted in a STB. The player decrypts a Disk Key (DK) that is stored in encrypted form on the DVD disc using its PK. Then the player reads the encrypted Title Key (TK) for the file that it has been asked to play. The TK is needed because a DVD usually contains several files, each with its own TK. The TK is decrypted using the DK. Finally, the decrypted TK is used to descramble the actual content.

DVD_CP

Figure 3 – Content Protection in DVD

Because of the way encryption support is defined, MPEG-2 provides a standard technology that is universally interoperable when used in clear-text, but encrypted transmission is Service Provider-specific. If I am an End User I have an obvious service requirement: if I am only subscribed to SP A, I should not be able to watch the offer of SP B, unless I decide to subscribe with SP B. In the early digital television days this I had to stack two STBs, but this is not (should not be) a requirement.

This situation was inconvenient to both SP and subscriber. SP needed to find a manufacturer of STBs and make a deal with a security technology provider. The two parties worked together to provide STBs to the SP who then has to purchase the STBs and then subsidise their deployment, the largest cost factor in the SP’s accounts after content itself. The advantage for the SP was the creation of a barrier to the entry of other SPs in the subscriber’s home. The subscriber was inconvenienced because he had to stack as many boxes as there were SPs whose offers he wanted to watch. This was all the more irrational if one thinks that possibly 95% of the electronics in all the boxes is functionally the same. Duplication of STB was needed only because of that security-related 5%. 

One way to alleviate this problem was to use the same STB to watch different SPs who had an agreement to provide common access to their combined services, as in the figure below

simulcrypt

Figure 4 – Simulcrypt (SP1 and SP2)

With “Simulcrypt”, as the system is called, SP1 and SP2 send EMM messages (dotted lines) to the combined set of their subscribers, so that encrypted content (full lines) from both SP1 and SP2 can be viewed by subscribers of both SPs. This requires that the encrypted SK be sent using the UKs of both SPs. The system only works if the two SPs share their subscriber databases, hardly something SPs are willing to do because subscribers are the core asset of their business, unless the SPs are two in name but one in practice. 

Some bolder attempts have been made to decouple MPEG-2 decoding from access control.

CA0-CA1

Figure 5 – The DVB and DAVIC approaches to “more open” content protection

In the figure the CA0 interface, defined by DVB and called Common Interface (CI), is simply an interface where an external, SP-specific, box is plugged: scrambled streams enter the box and leave the box as clear-text. STB’s with CI are expensive and the external device is also expensive because of the high-speed electronics. Further, the clear-text program crosses the SI and can be easily tapped. The CA1 interface, defined by DAVIC, is more elaborate, with low bitrate ECM and EMM signals entering an external device (a smart card) and the control word entering the STB. The DAVIC solution would not suffer from the shortcomings of CI because it only handles the low bitrate EMM and ECM messages and does not provide access to clear-text signals, but requires some form of standardisation that SPs have been loath to accept. 

Another solution that has taken root in several countries is to embed all Conditional Access (CA) technologies used in a country for Digital Terrestrial Broadcasting in one set top box. Practical as it may appear, this solution ratifies the existence of a security technology club where it would be hard for a new security company to enter.

Several years ago, European regulators did not perceive the apparent contradiction when they mandated, in one of their directives, the use of MPEG-2 for source coding and multiplexing but remained silent about the Conditional Access (CA) part. Much as I am flattered by the idea that the use of MPEG-2 is made legally binding in Europe if somebody wants to broadcast, I cannot help but wonder about the meaning of such an imposition. If the STB is proprietary because of CA, so could be source coding and multiplexing. Why should there ever have been a directive? On the other hand we see that today the creation of monopolies in information provision is swallowed without a gulp. 

I may be the only one, but I am in desperate need for an explanation of what is the meaning and purpose of regulation and competition.

117 thoughts on “Protecting Rights

  1. Pingback: The Roadmap | Riding the Media Bits

  2. Pingback: Site alisexypics com

  3. Pingback: Source hotxxmom com

  4. Pingback: More dubaipornx com

  5. Pingback: Origin site galleries medicalfuckers com

  6. Pingback: Origin sexpics abudhabihottestgirls com

  7. Pingback: Go link hotpics abudhabihottestgirls com

  8. Pingback: mine site funfuck mysexydownload com

  9. Pingback: mine site sexvids pro

  10. Pingback: Go link camslut nakedgirlfuck com

  11. Pingback: Website dadlook nakedgirlfuck com

  12. Pingback: url site hotnude vikipets ru

  13. Pingback: Video site anal assfuckz com

  14. Pingback: Homepage sochi1mt ru

  15. Pingback: See link iztube ru

  16. Pingback: xaxazu ru

  17. Pingback: Origin site babacams com

  18. Pingback: More telegra ph jennifer-aniston-wedding-etwq-11-11

  19. Pingback: Go link aliassporn com

  20. Pingback: mine site xxvidos mobi

  21. Pingback: feed xxvideos pro

  22. Pingback: Go site seowm ru

  23. Pingback: Web vpizde mobi

  24. Pingback: Click here xopxa ru

  25. Pingback: mine site hh-tube ru

  26. Pingback: Pix link mimizo ru

  27. Pingback: красивые смс поздравления маме от дочери с 8 марта

  28. Pingback: datingnzcougar.info

  29. Pingback: mobile sex chat rooms free south africa no registration

  30. Pingback: continue reading

  31. Pingback: Ambika Ahuja Jaipur Escorts

  32. Pingback: NEHA TYAGI XXX PORN MODEL JAIPUR ESCORTS

  33. Pingback: XXX JAIPUR ESCORTS ALIYA SINHA

  34. Pingback: XXX PORN BANGALORE COMPANION ESCORTS

  35. Pingback: XXX PORN Dhruvi Jaipur Escorts

  36. Pingback: XXX JAIPUR ESCORTS MODEL DRISHYA

  37. Pingback: Heena Khan Bangalore Escorts

  38. Pingback: Jiya Malik High Profile Jaipur Escorts Model

  39. Pingback: XXX FUN WITH JAIPUR ESCORTS PUJA KAUR

  40. Pingback: XXX BANGALORE ESCORTS ROZLYN MODEL

  41. Pingback: XXX PORN SAPNA CHAUDHARY ESCORTS

  42. Pingback: Selly Arora Independent Bangalore Escorts

  43. Pingback: Enjoy With Jaipur Escorts Tanisha Walia

  44. Pingback: XXX PORN RUBEENA RUSSIAN BANGALORE ESCORTS

  45. Pingback: Bristy Roy Independent Bangalore Escorts

  46. Pingback: XXX PORN SRUTHI PATHAK MODEL ESCORTS

  47. Pingback: Bangalore Escorts Sneha Despandey

  48. Pingback: XXX PORN MODEL HONEY PREET ESCORTS

  49. Pingback: XXX PORN Radhika Apte Model Escort

  50. Pingback: address

  51. Pingback: click for details

  52. Pingback: go here

  53. Pingback: page address

  54. Pingback: continue reading

  55. Pingback: learn more here

  56. Pingback: a source

  57. Pingback: more on this page

  58. Pingback: Best Porn Meet List 3000

  59. Pingback: Best Sex Meet Users 45985

  60. Pingback: Best XXX Meet Users 26905

  61. Pingback: 100% Free Porn Dates List 93191

  62. Pingback: 100% Free Sex Hookup List 45081

  63. Pingback: Best XXX Dates Users 55675

  64. Pingback: FREE PORNO Dates Users 84170

  65. Pingback: FREE XXX Hookup Users 91569

  66. Pingback: FREE Porn Meet Members 16743

  67. Pingback: 4f8399dedf47934722b63.com

  68. Pingback: notehub.org go to the page

  69. Pingback: notehub.org follow this link RzYgV

  70. Pingback: a source

  71. Pingback: notehub.org continued here VwF

  72. Pingback: find out more here

  73. Pingback: more on this page

  74. Pingback: notehub.org continue reading

  75. Pingback: notehub.org click for details 6bPP

  76. Pingback: source

  77. Pingback: notehub.org here

  78. Pingback: notehub.org

  79. Pingback: notehub.org click the following article

  80. Pingback: notehub.org more on this page sUgU

  81. Pingback: read completely

  82. Pingback: notehub.org read lC3

  83. Pingback: notehub.org link to a continuation

  84. Pingback: notehub.org

  85. Pingback: notehub.org i'll provide a link 3pQ

  86. Pingback: click

  87. Pingback: notehub.org

  88. Pingback: find out more

  89. Pingback: read

  90. Pingback: notehub.org

  91. Pingback: notehub.org continue INVe

  92. Pingback: notehub.org click 3qGS

  93. Pingback: notehub.org provided link

  94. Pingback: notehub.org continue reading

  95. Pingback: notehub.org

  96. Pingback: notehub.org follow this post EEy8

  97. Pingback: notehub.org click to go

  98. Pingback: notehub.org

  99. Pingback: Ruby Sen Kolkata Independent Escorts

  100. Pingback: Diana Diaz Goa Independent Escorts Services

  101. Pingback: Diksha Arya Independent Escorts Services in Kolkata

  102. Pingback: Devika Kakkar Goa Escorts Services

  103. Pingback: Rebecca Desuza Goa Independent Escorts Services

  104. Pingback: Yamini Mittal Independent Escorts Services in Goa

  105. Pingback: Simmi Mittal Kolkata Escorts Services

  106. Pingback: Kolkata Escorts Services Ragini Mehta

  107. Pingback: Navya Sharma Independent Kolkata Escorts Services

  108. Pingback: Elisha Roy Goa Independent Escorts Services

  109. Pingback: Alisha Oberoi Kolkata Escorts Services

  110. Pingback: Divya Arora Goa Independent Escorts Services

  111. Pingback: Simran Batra Independent Escorts in Kolkata

  112. Pingback: Ashna Ahuja Escorts Services in Kolkata

  113. Pingback: Sofia Desai Escorts Services in Goa

  114. Pingback: Goa Escorts Services Drishti Goyal

  115. Pingback: Mayra Khan Escorts Services in Kolkata

  116. Pingback: Eva J Law Independent Goa Escorts Services

  117. Pingback: Fiza Khan Kolkata Escorts Services