A player issued request to use a specific component within the server must include a specific device signature, the signer data and the content id for the server to be able to grant the license.Unfortunately, this high demand for video content is often undermined by a lack of security around original content.
As a result, creators and distributors alike are finding themselves in position where they need to protect themselves; enter DRM technologies what are they and how do they work. Without DRM, content can be easily copied it is therefore necessary in an online video distribution architecture, but it is not visible to the consumer. DRM is also used offline to provide copyright protection of CDs, DVDs and BluRays. Used on Android Devices natively, in Chrome, Edge (soon), Roku, Smart TVs, uses protobuf format for metadata. Supported on Windows, most set-top boxes and TVs, uses WRMHEADER tag objects as metadata format. The following graph shows the current distribution in application of DRM systems within the Developer community. Digital Rights Management Software Drm Software Implementation TypesRegardless of DRM hardware or software implementation types, all providers seeking to protect their content will see their files pass through an encryption decryption cycle (as seen below). Each segment is encrypted according to the MPEG Common Encryption (CENC) specification for ISO-BMFF andor MPEG-TS streams, where either all content is encrypted or only subsamples, like i-frames. The MPEG-CENC standard is comprised of XML style formats and requires a minimum of a key and key id to run. CENC is also used for HLS if the segments are in a fMP4 container. There are at least three types of encryption formats (algorithms) for video, most notably: Widevine, FairPlay, Playready. Their application can vary greatly based on many unique factors having to select an algorithm that matches the content distributors delivery playback needs (based on which devices are supported) can introduce a lot of complexity to the DRM implementation process. In order to improve the security and decrease the risk of reverse engineering DRM systems, there are typically no clear log statements. In fact, parts of the process are treated as a black box and as a result, debugging can be even harder on devices (for example: SmartTVs or Set Top Boxes with older versions of DRM software). The content will then be decrypted by a Content Decryption Module (CDM), which decrypts each encrypted audio and video segment. Digital Rights Management Software Drm License Requests AreLicense requests are generated by the CDM and passed to the player through the EME. All of the decryption work is done by the CDM, the EME is simply the interface for the module. The sessions are also updated by the CDM when the player calls the appropriate function on the EME interface. The EME interfaces with the CDM at the Operating System or browser level, AND handles the decryption of the segments. However, the EME never interfaces with the playback client application and the decrypted content is only available to the CDM. If the license is cached locally, this request can happen before the content is decrypted or played back. The licensing server information can be contained either in the manifest (like MPEG-DASH or embedded in HLS ), in a players configuration, or within the individual segments.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |