BT Sport Fights Back Against Stream Piracy With BISS-CA Protocol
BT Sport has been protecting association football matches against piracy this season with the BISS-CA protocol.
BT has joined a growing list of premium sports broadcasters deploying the BISS-CA protocol to combat the proliferating piracy that threatens to derail business models in the sector.
The telco’s sports broadcasting operation has chosen French encoder vendor ATEME to supply equipment running the protocol, which enables real-time entitlement management of content streams. Developed by the European Broadcasting Union (EBU) in collaboration with French compression technology vendor ATEME and Norwegian media infrastructure developer Nevion, BISS-CA is a protocol that enables real-time entitlement management of content streams. It was developed to complement forensic watermarking and enable end-end video protection from the field, including contribution.
BT Sport is using the encryption technology to protect satellite uplinked content, having first evaluated it for its transmission of the FA Community Shield football match at Wembley Stadium on Sunday August 4th, 2019. Since then BT Sport has continued to use BISS-CA to protect its English Premier League (EPL) live broadcasts, which are also shown under distribution agreements by other pay TV operators such as Comcast’s Sky and Liberty Global’s cable company Virgin Media.
“For BT it’s imperative that we protect broadcasters from the threat of illegal piracy and ensure that those watching the content legally are getting the best viewing experience possible, wherever they are in the world,” commented Dominik Wrona, Head of TV Outside Broadcast, BT.
BISS-CA is based on the long-proven symmetric AES and asymmetric RSA cryptography, with an important point being that it carries all entitlement credentials in-stream, which means it does not rely on an internet connection. This brings two primary benefits.
Firstly, it means that since cryptographic entitlements are transported in-stream together with the live video content, the rights holder or broadcaster is able to grant and revoke usage rights in real-time. Broadcasters can publish a list of public keys before or during the event, change them transparently and determine who can use them at any point during the transmission. Therefore they can revoke access to pirated streams and ensure only authorized users can access the live stream at that stage.
Secondly, it offers some protection against attacks on forensic watermarking systems, which pirates are increasingly carrying out in an attempt to prevent identification of infringing sources. Forensic watermarking has proved effective at tracing the source of unauthorized redistributions once they have been identified as being likely to be pirated. When BISS-CA is used alongside forensic watermarking solutions, broadcasters can insert relevant marks, detailing for example the serial number of the decoder, in-stream so that the process is invisible to pirates. Yet the provider then has the means to identify who or which organization is responsible for the leak and can revoke the rights of the decoder. While providers can then cut the stream if they want, they can also choose to negotiate with the organization that caused the leak in order to ensure it does not happen again, if that looks like a more productive route. Operators may be reluctant to cut off streams too indiscriminately in case mistakes have been made identifying infringing sources, which can mean that legitimate users are denied service.
BISS-CA also deters piracy at the contribution end by changing encryption keys dynamically every 10 seconds, which does not give pirates enough time to find the new key and enter it into their system. Pirates have been employing algorithms to discover keys but lack computational resources to do this in anywhere close to 10 seconds. In practice they end up being far too far behind live for the content to be of any value.
You might also like...
HDR & WCG For Broadcast: Part 3 - Achieving Simultaneous HDR-SDR Workflows
Welcome to Part 3 of ‘HDR & WCG For Broadcast’ - a major 10 article exploration of the science and practical applications of all aspects of High Dynamic Range and Wide Color Gamut for broadcast production. Part 3 discusses the creative challenges of HDR…
IP Security For Broadcasters: Part 4 - MACsec Explained
IPsec and VPN provide much improved security over untrusted networks such as the internet. However, security may need to improve within a local area network, and to achieve this we have MACsec in our arsenal of security solutions.
Standards: Part 23 - Media Types Vs MIME Types
Media Types describe the container and content format when delivering media over a network. Historically they were described as MIME Types.
Six Considerations For Transitioning To Cloud Based Video Distribution
There are many reasons why companies are transitioning from legacy video distribution workflows to ones hosted entirely in the public cloud, but it’s not a simple process and takes an enormous amount of planning. Many potential pitfalls can be a…
IP Security For Broadcasters: Part 3 - IPsec Explained
One of the great advantages of the internet is that it relies on open standards that promote routing of IP packets between multiple networks. But this provides many challenges when considering security. The good news is that we have solutions…