Professional Documents
Culture Documents
Table
of
Contents
1.
Introduction
...........................................................................................................................
3
2.
Market
evolution
....................................................................................................................
3
2.1
The
main
players
...............................................................................................................................
3
2.2
How
the
market
is
developing
...........................................................................................................
4
2.3
The
causes
of
market
evolution
.........................................................................................................
5
Reasons
for
the
rise
of
DRM
.......................................................................................................................
5
3.
Business
and
Technology
Challenges
......................................................................................
7
3.1
The
differences
between
CA
and
DRM
..............................................................................................
7
The
CA
model
..............................................................................................................................................
7
The
DRM
model
..........................................................................................................................................
8
3.2
The
changing
nature
of
content
piracy
..............................................................................................
8
3.3
Ongoing
management
of
devices
......................................................................................................
9
3.4
Implications
for
pricing
.....................................................................................................................
10
3.5
Implementing
DRM
in
Devices
..........................................................................................................
10
4.
Market
adoption
..................................................................................................................
11
5.
Conclusions
and
Recommendations
for
DRM
Adopters
.........................................................
12
The
need
for
robust
security
implementations
on
connected
devices
is
increasing
................................
12
CAS
and
DRM
have
different
models
and
pricing
cannot
easily
be
compared
.........................................
12
AES
is
facilitating
the
growth
of
DRM-based
security
solutions
...............................................................
12
In-home
distribution
of
premium
content
requires
bridging
solutions
....................................................
12
Complexity
of
DRM
implementation
(and
time-to-market)
is
context-dependent
..................................
12
Combating
modern
piracy
requires
more
than
just
CA
and
DRM
...........................................................
13
6.
About
Farncombe
.................................................................................................................
13
7.
About
Irdeto
.........................................................................................................................
13
Copyright
2013
Farncombe
Page 2
1. Introduction
Conditional
Access
Systems
(CAS)
and
Digital
Rights
Management
(DRM)
once
inhabited
two
completely
different
sectors
not
surprisingly,
because
they
were
invented
for
two
different
purposes:
CA
technologies
evolved
in
one-way
broadcast
environments
in
the
early
90s
to
protect
the
transport
of
video
content
and
control
access
to
it
and
were
adopted
by
vertically
integrated
pay-TV
operators
to
ensure
that
only
those
subscribers
who
had
purchased
their
premium
content
could
view
it.
DRM
came
later,
and
was
created
by
the
publishing
industry
for
an
already
connected
world,
where
it
was
used
to
control
consumers
usage
rights
to
premium
textual
and
graphical
content
acquired
over
the
Internet:
it
was
not
generally
deployed
to
control
access
or
protect
transport.
However,
the
recent
trend
towards
on-demand
video
consumption
has
caused
these
formerly
distinct
roles
to
evolve
and
merge.
Today,
CA
solutions
can
be
found
managing
viewers
rights
to
consume
video
on-demand
from
Digital
Video
Recorders
(DVRs),
while
the
boom
in
TV
Everywhere
consumption
on
handheld
devices
has
meant
that
the
DRM
solutions
they
integrate
are
being
increasingly
deployed
to
protect
video
distribution
and
control
access
to
it.
This
White
Paper
investigates
some
of
the
issues
this
development
raises,
focussing
on
the
recent
shift
in
the
TV
market
towards
the
adoption
of
DRM-based
content
protection
solutions,
and
assesses
the
main
drivers
for
this
change,
taking
an
in-depth
look
at
the
business
and
technology
implications
for
market
players
wishing
to
adopt
a
DRM
approach.
Our
broad
conclusion
is
that
properly-implemented
DRM
can
be
as
effective
a
mechanism
for
protecting
premium
video
content
as
properly-implemented
CAS
but
it
is
not
as
easy
to
implement
in
a
robust
manner,
and
therefore
not
as
inexpensive
as
may
be
popularly
supposed.
2. Market
evolution
2.1 The
main
players
For
the
purposes
of
this
White
Paper,
we
define
a
Conditional
Access
System
or
CAS
as
a
content-protection
solution
used
in
a
managed
network,
either
one-way
or
two-way.
CAS
generally
uses
entitlements
management
and
encryption
to
control
content
consumption,
and
has
traditionally
been
deployed
to
protect
premium
content
delivered
in
a
vertically
integrated
solution
to
receivers
controlled
by
a
pay-TV
operator,
using
a
hardware-based
approach
(usually
smartcards,
although
cardless
CA
systems
also
exist1).
By
contrast,
Digital
Rights
Management
(DRM)
products
have
emanated
from
the
publishing
industry,
initially
being
used
to
protect
textual
or
graphical
content
delivered
over
un-managed,
horizontal
networks
such
as
the
Internet.
DRM
generally
uses
a
combination
of
licences
and
keys
to
deliver
rights
to
content,
and
has
latterly
been
applied
to
over-the-top
(OTT)
video
for
consumption
on
handheld/portable
devices
such
as
laptops,
tablets,
and
smartphones.
Generally,
DRM
solutions
take
a
software-based
approach.
These
distinctions
have
become
increasingly
fuzzy
which
is
partly
what
this
White
Paper
is
about
but
they
can
be
helpful
in
understanding
the
players
and
their
different
business
models.
In
the
CAS
camp,
we
would
list
the
principal
players
as
China
Digital
TV,
Cisco
(NDS),
Conax,
Irdeto,
Motorola,
Nagra,
Latens,
Viaccess-Orca,
and
Verimatrix.
A
number
of
these
have
added
DRM
products
to
their
line-ups
in
recent
years.
The
table
overleaf
ranks
them
according
to
estimated
revenues2.
1
Page 3
Company
CAS Platform
1.
Cisco (NDS)
VideoGuard
2.
Nagra
MediaAccess
3.
Irdeto
Irdeto CAS
4.
MediaCipher
5.
China Digital TV
Novel Supertv
6.
Conax
Contego
7.
Viaccess-Orca
VO
8.
Verimatrix
VCAS
9.
Latens
Titanium
Meanwhile,
the
main
DRM
players
are
Adobe,
Apple,
Marlin
(Intertrust),
Microsoft,
and
Widevine.
They
are
listed
in
the
table
below
alphabetically
rather
than
ranked
by
revenue,
since
in
most
cases
DRM
sales
are
incidental
in
revenue
terms
to
their
main
business,
or
do
not
figure
at
all
(e.g.
Apple).
Figure
2:
Main
DRM
players
Company
DRM Platform
Adobe
Adobe
Access
FairPlay
Apple
Marlin
Intertrust
Microsoft
PlayReady
Widevine
Multiplatform DRM
Page 4
According
to
research
by
IHS
Screen
Digest,
by
2015,
49%
of
all
devices
obtaining
television
services
from
the
largest
global
pay-TV
operators
will
be
PCs,
smartphones,
tablets
and
other
multiscreen
devices,
up
from
18%
in
2011.
Set-top
boxes
will
account
for
the
other
51%,
having
declined
from
82%
of
all
devices
over
the
same
period
(see
Figure
3
below).
Figure
3:
Forecast
of
Installed
Base
of
Set-Top
Boxes
and
Active
Multiscreen
Devices
Accessing
Pay-TV
Services
for
43
of
the
Largest
Operators
(Thousands
of
Units)
700,000
600,000
500,000
400,000
300,000
200,000
100,000
0
2010
2011
2012
2013
2014
2015
Almost
universally,
the
non-STB
devices
will
use
software-based
DRM-type
solutions
to
protect
video
content,
for
reasons
that
we
explore
in
the
rest
of
this
section.
These
developments
are
taking
place
in
an
environment
where
the
nature
of
piracy
attacks
is
also
changing:
broadly
speaking,
where
before
hacks
tended
to
be
directed
at
revealing
the
secret
keys
used
to
scramble
content,
the
objective
today
is
increasingly
the
redistribution
of
illegally-acquired
content
over
broadband
networks.
The
implication
of
this
switch
in
piracy
tactics
is
that
an
operator
needs
to
do
much
more
to
secure
its
content
than
simply
to
deploy
a
CA
or
DRM
system,
a
point
we
develop
further
in
Section
3.
See:
http://bit.ly/11GDTQF
DVB
press
release
issued
9
March
1995
Copyright
2013
Farncombe
Page 5
Given
the
boom
in
video
consumption
on
high-powered
PC-like
devices
such
as
smartphones
and
tablets,
that
approach
may
no
longer
be
applicable
in
todays
world,
but
its
legacy
has
left
CA
vendors
trying
to
access
a
market
that
DVB
sought
to
exclude.
Increasing
consumption
of
(HD)
OTT
video
Smartphones
and
tablets
in
particular
are
having
a
significant
impact
on
the
number
of
video
streams
being
viewed,
while
the
increasing
broadband
bandwidth
available
is
making
it
ever
more
possible
to
consume
high-resolution
formats
such
as
HDTV
on
these
second
screens:
Ciscos
latest
Global
Mobile
Data
Traffic
Forecast
Update
for
2012-2017
says
that
global
mobile
data
traffic5
grew
70%
in
2012,
largely
on
the
back
of
increased
video
consumption,
which
exceeded
50%
of
all
traffic
by
the
end
of
last
year.
The
company
forecasts
that
mobile
video
will
grow
at
a
CAGR
of
75%
between
now
and
2017,
generating
two-thirds
of
mobile
data
traffic
by
2017.
Cisco
also
argues
that
as
mobile
network
connection
speeds
increase,
the
average
bit-rate
of
content
accessed
through
the
mobile
network
will
increase,
predicting
that
high-definition
video
will
be
more
prevalent.
Thus
not
only
is
the
amount
of
video
being
consumed
on
handheld/portable
devices
increasing,
but
because
of
the
trend
towards
HD,
which
is
a
premium
product
there
is
a
greater
need
to
protect
it.
Of
itself,
this
would
merely
signify
an
increased
requirement
for
the
deployment
of
content
security
solutions
in
general
(i.e.
both
CAS
and
DRM),
but
because
of
the
nature
of
these
new
devices
and
the
type
of
networks
they
use,
DRM
is
the
only
choice,
for
the
reasons
outlined
below.
Note
that
Ciscos
definition
encompasses
traffic
off-loaded
from
cellular
networks
to
fixed-line
broadband
indeed,
Cisco
is
forecasting
that
mobile
off-loading
will
increase
from
around
a
third
of
traffic
in
2012
to
nearly
half
in
2017.
6
http://www.farncombe.com/2009/05/tv-conditional-access-systems-in-two-way-environments/,
see
p.14
Copyright
2013
Farncombe
Page 6
smartphones
and
they
derive
economic
efficiencies
from
these
being
as
undifferentiated
as
possible.
A
player
like
Microsoft
can
offer
them
a
single
DRM
solution
across
their
entire
product
range,
something
that
CAS
vendors
do
not
generally
have
the
reach
to
deliver.
Competition
from
native
IP
players
The
traditional
security
system
providers
have
been
slow
to
develop
their
own
cardless
solutions,
and
even
where
they
have
done
so
they
have
encountered
competition
from
technology
providers
in
the
IPTV
and
OTT
space
especially
Microsoft
and
Apple,
whose
respective
installed
bases
are
much
larger
than
any
pay-TV
platforms.
Since
these
consumer
device
manufacturers
address
businesses
and
usages
that
are
natively
IP-based,
they
have
naturally
constructed
their
security
and
cost
models
from
the
outset
on
very
different
paradigms
from
those
on
which
traditional
pay-TV
businesses
were
grown,
and
these
have
proved
attractive
to
IPTV
and
OTT
players.
The
result
is
that
smartcard-based
security
systems
have
found
it
difficult
to
colonize
these
native
IP
environments.
Product
differentiation
failure
Comparisons
between
CA
and
DRM
solutions
are
often
misleading
because
the
former
tends
to
be
aimed
at
addressing
security
of
the
transport
of
broadcast
content,
while
the
latter
tends
to
be
used
for
facilitating
transactions.
In
practice,
solutions
falling
into
the
first
category
usually
appear
more
expensive
than
the
second,
for
reasons
we
explore
later.
However,
when
pricing
their
own
cardless
solutions
for
the
transactional
end
of
the
market,
traditional
security
system
vendors
have
often
ignored
industry
perceptions,
and
have
not
adjusted
their
offers
accordingly.
The
control-word
sharing
risk
It
is
now
well-known
that
the
way
in
which
the
DVB
approach
to
CA
implements
the
CSA
makes
piracy
attacks
possible
through
so-called
control-word
sharing7.
However,
the
DVB
argues
that
this
is
not
an
issue
anymore
because
in
modern
STB
SoCs
the
descrambler
is
integrated
in
the
chip:
there
is
therefore
no
need
to
transfer
the
control
word
between
two
devices.
Moreover,
compliance
and
robustness
regimes
for
CA
integration
typically
request
the
STB
provider
to
guarantee
that
there
is
no
access
to
the
control
words
or
content
in
the
clear
a
requirement
which
can
be
fulfilled
by
today's
SoCs.
However,
even
for
the
latest
version
of
the
CSA
(CSA-3),
the
DVB
does
not
mandate
specific
control
word
protection
requirements,
which
is
not
ideal.
Ibid, p.4
Copyright
2013
Farncombe
Page 7
Page 8
In
this
new
environment,
the
role
of
security
technologies
needs
to
be
extended.
Previously
it
was
important
that
these
systems
remained
un-hacked
so
that
pirates
could
not
reproduce
clones
or
modify
clients
to
pirate
content.
Today
it
is
becoming
equally
important
for
security
solutions
to
enable
traceability
of
leaked
keys
or
leaked
content
and
to
allow
suspect
services
to
be
swiftly
cordoned-off.
For
example,
where
a
pirate
outside
a
friendly
jurisdiction
is
using
a
legitimate
subscription
to
illegally
redistribute
control
words
or
content,
if
that
pirates
source
cannot
be
identified,
there
is
nothing
that
can
be
done
to
stop
the
operation,
since
takedown
orders
cannot
be
enforced.
If,
on
the
other
hand,
the
security
system
contains
the
necessary
features
(such
as
session-based
watermarking)
to
allow
the
offending
subscription
account
to
be
traced,
it
can
in
principle
be
disrupted.
The
operators
ability
to
cause
disruption
becomes
dependent
on
how
fast
it
can
trace
the
source
of
leakage
and
once
identified
how
fast
the
pirated
subscription
can
be
disabled.
These
new
piracy
challenges
add
extra
weight
to
our
contention
that
implementation
of
a
security
system
requires
much
more
than
simply
deploying
a
CA
or
DRM
solution
in
isolation.
Bulletin
ID
Bulletin Title
Maximum
Severity
Restart
Requirement
Affected Software
MS13-
028
Critical
Remote
Code
Execution
Requires restart
Microsoft
Windows,
Internet
Explorer
MS13-
029
Critical
Remote
Code
Execution
May
require
restart
Microsoft Windows
MS13-
030
Important
Information
Disclosure
May
require
restart
Microsoft
Office,
Microsoft
Server
Software
MS13-
031
Important
Elevation
of
Privilege
Requires restart
Microsoft Windows
MS13-
032
Important
Requires
restart
Denial
of
Service
Microsoft Windows
Copyright
2013
Farncombe
Page 9
MS13-
033
Important
Elevation
of
Privilege
Requires restart
Microsoft Windows
MS13-
034
Important
Elevation
of
Privilege
Requires restart
Microsoft
Security
Software
MS13-
035
Important
Elevation
of
Privilege
May
require
restart
Microsoft
Office,
Microsoft
Server
Software
MS13-
036
Important
Elevation
of
Privilege
Requires restart
Microsoft Windows
With a CA platform it is usual to pay a fee per user to use the system, but not transaction fees
Copyright
2013
Farncombe
Page 10
In
these
situations,
the
aggregator
needs
to
rely
on
software-based
measures
to
protect
the
secret
keys
used
to
authenticate
the
device
and
decrypt
premium
content,
such
as
White
Box
Cryptography
or
code
obfuscation.
Such
techniques,
while
effective,
have
a
cost
associated
with
their
implementation
(someone
has
to
develop,
test
and
integrate
the
solution
before
it
can
be
deployed)
and
they
may
have
an
impact
on
performance
(for
instance,
it
takes
longer
to
decrypt
content
that
uses
entirely
software-based
modes
of
protection).
Moreover,
the
rights-holders
may
not
regard
such
software-based
techniques
as
adequate
for
protecting
their
top-level
premium
content.
Thus,
for
instance,
while
Apple
devices
are
allowed
to
access
HD
iTunes
movies
protected
with
hardware-based
FairPlay,
they
may
only
be
permitted
to
access
SD
movies
protected
with
software-based
PlayReady.
In
a
non-native
DRM
situation,
it
is
also
difficult
to
find
a
solution
that
allows
for
secure
device
authentication.
Implementing
DRM
in
a
legacy
environment
The
imperative
for
traditional
pay-TV
operators
to
address
their
subscribers
requirements
for
a
user-
friendly
multiscreen
eco-system
is
made
harder
by
the
need
to
support
legacy
systems.9
Given
that
the
final
step
of
the
distribution
chain
will
almost
invariably
involve
the
use
of
DRM,
a
bridging
solution
between
the
two
types
of
security
approach
is
required.
There
are
two
broad
approaches
an
operator
can
take:
the
first
is
to
use
its
existing
primary
distribution
network
(i.e.
cable,
satellite,
terrestrial
or
IPTV)
to
pipe
paid-for
content
into
the
home,
and
then
convert
it
locally
for
the
various
security
solutions
used
by
the
non-legacy
devices
wanting
to
receive
it.
the
second
is
to
deliver
separate
streams
from
the
headend,
over
broadband,
for
instance,
which
are
encoded
and
encrypted
for
access
by
non-legacy
devices.
The
first
route
can
be
described
as
a
gateway
approach
the
second
as
cloud-based.
In
practice,
early
implementations
have
tended
to
take
the
cloud-based
approach
rather
than
the
gateway
one.
These
types
of
hybrid
security
implementations
involve
a
number
of
complexities
that
are
outside
the
scope
of
this
White
Paper.
4. Market
adoption
At
the
beginning
of
this
White
Paper
we
noted
that
we
had
found
there
to
be
a
perception
that
DRM
content
protection
solutions
are
less
expensive
to
implement
than
CAS-based
solutions.
This
view
is
bundled
with
a
number
of
other
associated
notions,
such
as
compliance
procedures
being
more
straightforward,
implementation
being
simpler,
and
so
on.
Yet
the
expense,
complexity,
and
time-to-market
of
any
security
implementation
depend
critically
on
a
range
of
factors
which
have
nothing
to
do
with
whether
the
solution
happens
to
be
CAS
or
DRM-based
such
as
the
type
of
content,
the
legacy
network,
and
the
mix
of
devices
being
targeted.
If
an
operator
is
seeking
to
protect
the
distribution
of
early-release
window
movies
or
premium
sports,
then
there
will
likely
be
little
difference
in
the
rigour
of
the
implementation
required
and
the
timeline
for
its
deployment,
whether
the
solution
is
CAS
or
DRM-based
because
it
implies
the
creation
of
an
end-to-end
system
using
a
managed
network
where
security
is
actively
controlled
for
the
lifetime
of
the
platform.
Increasingly,
operators
have
an
alternative
to
what
used
to
be
a
binary
choice:
that
is
to
say
either
to
purchase
the
entire
technology
integration-and-management
bundle
from
a
single
source
(e.g.
a
CA
vendor);
or
just
to
purchase
a
standalone
solution,
and
manage
the
rest
of
the
process
themselves.
The
third
alternative
is
to
buy
a
technology
package
from
one
of
the
new
platform
system
vendors
who
are
starting
to
integrate
DRM
into
their
back-end
solutions,
offering
these
as
an
off-the-shelf
product.
The
difficulty
for
an
operator
deciding
to
go
it
alone
is
that
if
for
some
reason
vital
security
steps
are
missed
because
it
is
keen
to
launch
as
early
as
possible,
it
may
find
itself
with
no
access
to
premium
content
or
a
9
See
our
recent
White
Paper
on
cable
and
multiscreen
for
a
more
detailed
analysis
of
these
issues,
at
http://www.farncombe.com/wp-content/uploads/2013/03/NagraWhitePaperFinal-copy1.pdf
Copyright
2013
Farncombe
Page 11
short
lifetime
for
the
devices
under
its
control
for
example,
if
a
hardware
root
of
trust
cannot
be
retro-
fitted
when
a
rights-holder
suddenly
demands
it,
or
the
level
of
attack
on
the
system
makes
it
necessary.
In
this
situation,
operators
need
to
consider
the
full
life
cycle
of
their
eco-system
and
how
it
matches
their
content
aspirations.
The
introduction
of
a
new
video
compression
technology
such
as
HEVC
may
enable
it
to
offer
HD
content
to
second
screens
in
two
or
three
years
time
but
if
its
security
implementation
today
assumes
a
need
only
to
protect
standard-definition
content,
it
could
find
itself
wrong-footed.
Platform-based
solutions
may
appear
to
present
an
attractive
new
alternative
to
these
risks
but
while
the
vendor
may
integrate
DRM
into
their
system
and
do
so
in
a
secure
way,
even
taking
on
responsibility
for
this,
they
will
still
not
be
responsible
for
the
DRM
technology
itself.
Moreover,
to
the
extent
that
a
secure
player
is
required,
or
the
security
of
devices
needs
to
be
assessed,
these
remain
matters
the
operator
has
to
manage.
Copyright
2013
Farncombe
Page 12
6. About
Farncombe
Farncombe
is
a
leading
provider
of
specialist
strategy,
technology
consultancy
and
engineering
services
to
the
digital
TV
industry,
with
a
global
reputation
in
the
content
security
field.
With
offices
in
the
UK,
France
and
Germany,
Farncombes
roster
of
clients
includes
many
of
the
worlds
leading
broadcasters,
platform
operators,
telecom
operators,
hardware
and
software
technology
providers
as
well
as
government
and
regulatory
bodies,
private
equity
companies
and
other
industry
stakeholders.
We
are
renowned
for
our
versatility:
we
cover
everything
from
initial
commercial
analysis
and
strategy
through
to
implementation
and
testing.
We
combine
sector
expertise
with
a
strong
analytical
methodology,
and
are
known
for
our
experience
with
new
technologies,
particularly
in
a
content
security
context.
These
skills
ensure
we
can
we
can
deliver
and
implement
any
digital
video
project,
no
matter
how
complex,
on
time
and
to
budget
-
whilst
never
losing
sight
of
the
big
picture.
For
further
information
visit
www.farncombe.com,
where
you
can
also
register
to
receive
news
updates
and
further
White
Papers
as
they
are
published.
7. About
Irdeto
Irdeto
is
a
world
leader
in
media
protection,
multi-screen
and
revenue
assurance
solutions
for
pay
TV
operators,
OTT
service
providers
and
content
owners.
Irdeto
enables
pay
media
companies
to
provide
a
personal
media
experience
for
their
consumers,
uncover
new
revenue
opportunities
and
offer
new
forms
of
entertainment
on
broadcast,
broadband
and
mobile
networks.
The
company
offers
an
advanced
portfolio
of
conditional
access,
multi-rights
management,
multi-screen,
home
networking,
piracy
control
and
business
intelligence
services.
Irdetos
success
in
the
market
is
evidenced
by
its
software
security
solutions
being
the
most
widely
deployed
in
the
world
for
pay
TV
on
satellite,
cable,
terrestrial
and
IP
networks
and
by
helping
customers
generate
a
quarter
of
a
billion
dollars
a
year
in
business
value
with
its
Multiscreen
services.
Irdeto
is
a
subsidiary
of
multinational
media
group
Naspers
(JSE:
NPN).
Please
visit
Irdeto
at
www.irdeto.com.
Copyright
2013
Farncombe
Page 13