News Focus
News Focus
icon url

awk

09/13/04 2:16 AM

#52773 RE: 2bStealthy #52744

SVP: I would urge every critic of 2bStealthy's SVP reference to read this following paper in its entirety:

http://www.svp-cp.org/docs/copy_protection_strategies_ibc_lecture.pdf


Certificates and SVP Each SVP is associated with a public certificate that uniquely identifies the SVP, and the properties of the device in which it resides. For example the type of device, whether it supports watermark detection capability, which decryption algorithms it supports, which video formats, and other properties.

The exact message formats and mechanisms are described in the various documents available at www.svp-cp.org.

The exchange of certificates, and the public keys they contain, is used to establish a Secure Authenticated Channel (SAC) that is protected using negotiated session keys. The keys for this channel can then be updated at regular intervals. This channel is then used to convey such information as the CSLs, BL-ECMs and any details needed about domains.

This process is defined in greater detail in the documents on the above mentioned web site. The SVP standard also supports revocation of certificates. This is essential since it is possible that a certificate may be compromised. If this occurs, a pirate could emulate a device and steal the content. Revocation provides a means to stop this.