Feeds

Sun streaks ahead in open source DRM and CAS

DReaM to come true?

The Power of One Infographic

We can see from last week's story on Sun Microsystems DReaM DRM that it is rapidly honing in on a future open source DRM market, with a completely new vision of how DRM should work, and it's running at least six months ahead of schedule by our reckoning.

Last week we revealed how one Korean IPTV service was planning to use a simplified version of the DReaM specification known as DReaM CAS, or D-CAS to protect its IPTV service and also bring a Korean conditional Access system to market.

Now Sun says it will have version 1.0 for its DReaM MMI software out by the summer and will then launch straight into building a compliance organisation under the Common Development and Distribution License (CDDL) that came out of the Mozilla development process.

And next month at its Java One conference in San Francisco, Sun will demonstrate using the next generation Java SIM smart card, the upgrade to the one that is used in most mobile handsets phones today, as a basis for identity in an IPTV set up. The one big innovation that Sun has brought to this system, and something that we pointed out in our discussion of it back in October, is that Sun will use its own Liberty Alliance ideas on identity and allow a single copy of a person’s true identity to reside securely on a network and allow communication between servers to track this identity and offer services to multiple devices the identity owns or uses, without carrying around all that data baggage and responsibility that goes with a person’s identity.

At the Java One conference, Sun will show a phone being used to prove its proximity to a set top, and authorise the delivery of content to the owner of a phone, over a separate TV network. What Sun hopes to end up with is an architecture which separately delivers authentication, licensing, rights management, and protection technologies under the same framework by disintermediating each of those functions.

Usage rights will be defined as a separate license management system allowing the unmodified use of players and DRM clients which are already installed on devices.In this way, Sun hopes to retrofit onto existing systems a whole variety of new usage models, that were not previously possible.

We talked this week to Tom Jacobs, director of engineering at the Sun Labs, Open Media Commons project on DReaM, who agreed that perhaps Sun had missed an earlier opportunity to get the message out there on the Open Media Commons approach to DReaM. We had covered the basic idea in October, but not the Commons approach.

"That's why we held a workshop on it in March where we put a lot of substantive technical detail on the bones of the DReaM ideas and discussed how it could be successful with some of the companies that have downloaded the code."

But will this be another technology that Sun fails to dominate, despite creating the opportunity?

"We understand just how important DRM is going forwards. We were brought into this debate by the cellular community that is worried that it will end up with a huge royalty bill for DRM. We’ve had the codec wars, and the network protocol wars, and every other technology in pay TV is free and standard except for conditional access," Jacobs said.

Sun Microsystems has contributed a lot of work towards the Java based standard OCAP/MHP set top environment that is only just rolling out onto cable and other TV networks.

"There has been a smear campaign by traditional conditional access suppliers to try to put Fear Uncertainty and Doubt into AES based DRM systems, suggesting they are not as secure as those already in place, but funnily enough Conditional Access specialist NDS was one of the first companies to download the source code," said Jacobs.

Does that mean that NDS might contribute to the open source process for a royalty free DRM system?

"Anything that NDS contributes will become royalty free, so we don’t expect any of its core technology to be offered up. Maybe they are just interested in seeing what they may be up against in the future."

So how do you go about navigating the CDDL process in a world that is full of patents and litigation over patent infringements?

"The DCAS technology is already pretty well cleared legally. Many of the lawyers that worked on the Digital Cinema Initiative also joined up to work on this, doing both a claims analysis and a technical analysis. Some of the technology in here was patented back in the 1970s forthe first round of pay TV and has since expired. There is pre-existing IP such as PKI (Public Key Infrastructure) and AES has always been offered royalty free and was mandated as such by the National Institute of Standards and Technology when it was developed.

Mobile application security vulnerability report

More from The Register

next story
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.