We are on your team
A number of security approaches for virtual film festivals are employed on the Film Highway platform to ensure the protection of intellectual property for all exhibiting Titles. Below you will find the definitions and how we develop the “stacks” that allow them all to work hand in hand to provide security.
Our background has been in production, film festival and digital cinema packaging. Our parent company Cineworx has added virtual platforms to their services DBA Film Highway.
Our goal is to best protect your intellectual property but you must be a part of the solution as well.
We take the steps to ensure that our HLS exhibitions are secure with DRM protection when required.
SPEKE can be cumbersome to viewers as it requires passwords to be entered prior to watching a Title. We can go the distance by adding this feature if required by a distribution company.
Geo-blocking can be imposed on the ticketing side, in essence tickets can only be sold within a geographic location set by you. Geo-Blocking can also take place by Countries in the back end of our static site.
*The protocol stack or network stack is an implementation of a computer networking protocol suite or protocol family. Some of these terms are used interchangeably but strictly speaking, the suite is the definition of the communication protocols, and the stack is the software implementation of them. All of the below methods are similar to that of a KDM KEY for an encrypted DCP at a live venue. The precautions are similar and their intent is exactly the same.
HLS Live Streaming
HTTP Live Streaming (also known as HLS) is an HTTP-based adaptive bitrate streaming communications protocol. Support for the protocol is widespread in media players, web browsers, mobile devices, and streaming media servers.
HLS works by breaking the overall stream into a sequence of small HTTP-based file downloads, each downloading one short chunk of an overall potentially unbounded transport stream encoded at different bit rates.
The standard also includes a standard encryption mechanism and secure-key distribution using HTTPS, which together provide a simple system.
Digital Rights Management (DRM)
Protect your content using Digital Rights Management (DRM). DRM can be scaled automatically in response to load, so your viewers will always get a great experience without you having to accurately predict in advance the capacity you’ll need.
Digital rights management (DRM) tools or technological protection measures (TPM) are a set of technologies for restricting the use of proprietary hardware and works. DRM technologies control the use, modification, and distribution of copyrighted works (such as multimedia content), as well as systems within devices that enforce these policies.
DRM protection is believed that it is necessary to prevent intellectual property from being copied freely, just as physical locks are needed to prevent personal property from being stolen, that it can help the copyright holder maintain artistic control, and that it can ensure continued revenue streams.
SPEKE is the acronym for Secure Packager and Encoder Key Exchange (SPEKE), which is an API specification that defines the standard for encrypted communication between video encoders, transcoders, origin servers, and digital rights management (DRM) system key servers for live and on-demand streaming video.
SPEKE builds on the Content Protection Information Exchange (CPIX) specification developed by the DASH Industry Forum (DASH-IF) by adding specifications not included in CPIX, such as methods for authenticating and communicating between key servers and encryptors.
The Secure Packager and Encoder Key Exchange API has one purpose: the simplification of multiple complex processes. In a nutshell, SPEKE does this in the following ways:
- SPEKE simplifies content encryption by replacing hundreds of combinations of proprietary API integrations between multi-DRM vendor key servers and encryptors with a single open, standards-based API.
- SPEKE supports multiple DRM schema, as well as multiple packaging formats for different types of viewing devices.
Digital watermarks are embedded within audio or video data during production or distribution. They can be used for recording the copyright owner, the distribution chain or identifying the purchaser of the film. They are used as part of a system for copyright enforcement, such as helping provide prosecution evidence for legal purposes, rather than direct technological restriction.
Geoblocking is technology that restricts access to Internet content based upon the user’s geographical location. In a geo-blocking scheme, the user’s location is determined using geolocation techniques, such as checking the user’s IP address against a blacklist or whitelist, accounts, and measuring the end-to-end delay of a network connection to estimate the physical location of the user. The result of this check is used to determine whether the system will approve or deny access to the website or to particular content.
It is more effective to institute Geo-Blocking within the ticketing sales platform rather than on each individual page.