This page contains a Flash digital edition of a book.
OTT 2.0 special report


for the operator. Such an approach enables the operator to use DRM (key management) that makes sense based upon the device type (eg pre- integrated) and streaming standard. The complexity of the DRM key management servers is hidden inside a ‘black box’ whereby they are unified from the more important perspective of ‘rights management’. Operators don’t have to engineer a


custom solution or deal with the inherent issues of applying a single DRM system across the delivery network, whether operating in the pure OTT domain or through managed fixed and mobile networks. As an added benefit, harmonised rights management will streamline efforts of service providers who are developing hybrid networks where IP-based content is a critical component of multi-device service strategies. No more forcing a square peg into a round hole, but instead deploying the underlying DRM technologies best suited to the devices, networks, and streaming formats in use.


The next frontier


These new premium content services, however, will mandate advanced security technologies that feature fine grain control mechanisms. Demonstrating robust protection techniques will enable some operators to obtain higher value material - such as early release HD movies. It should be noted that OTT 2.0 will require security that is equivalent in protection and features to those currently available for more mature pay-TV networks like managed IPTV and DVB. Watermarking has proven to be an


especially valuable technique, as it can enable content identification and copyright communication on a broad scale. It can provide a range of options for identifying, securing, managing and tracking digital images, audio, video and printed materials. To discourage and identify end user piracy, forensic (user-specific) marks are deployed. The watermark is embedded to uniquely mark compressed content files during delivery, even when these content files already are encrypted. Mass delivery of uniquely marked content offers a valuable tool to combat revenue leakage in the latest video consumption models, such as early release window (ERW) on-demand content and OTT services. Other new technologies include


output controls, fingerprinting and ‘jail breaking’. Output controls enable


www.ibeweb.com l september/october 2012 l ibe l 81


content owners to shut off or restrict certain types of outputs for content in certain combinations or release windows and quality levels. Fingerprinting entails overlaying a visible identifier mark in various positions over the video. Jail breaking involves limiting or removing various limitations imposed by the operating system manufacturer. While these security techniques can be more difficult to apply in an OTT environment due to the absence of a downstream transmission mechanism, in general they are inherently more capable of exercising fine grain real- time controls over OTT distribution, making them an ideal choice for securing OTT 2.0. As the OTT landscape grows


As the OTT landscape grows increasingly complex... taking a unified approach to security will become a critical competitive differentiator.


increasingly complex and encompasses even more devices, taking a unified approach to security will become a critical competitive differentiator. The world of OTT is by no means uniform and wrinkle-free. In the early days of OTT, the PC was the coveted second screen; operators were therefore naturally drawn to Smooth Streaming and PlayReady as the best security protocol. However, the advent of the iPad has forced operators to re-evaluate which devices to support, as well as re-examine their security strategies. Taking a ‘black box’ approach to


revenue security can help unify different security models and optimise the overall strategy by ensuring that the best tools for the job are being


Continued on Page 82.


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62  |  Page 63  |  Page 64  |  Page 65  |  Page 66  |  Page 67  |  Page 68  |  Page 69  |  Page 70  |  Page 71  |  Page 72  |  Page 73  |  Page 74  |  Page 75  |  Page 76  |  Page 77  |  Page 78  |  Page 79  |  Page 80  |  Page 81  |  Page 82  |  Page 83  |  Page 84