Verimatrix (encoding) - what is it?

Table of contents:

Verimatrix (encoding) - what is it?
Verimatrix (encoding) - what is it?
Anonim

Most users today have an association with the word "torrent" associated with the placement of illegal content and the problem of copyright. The same is happening with the development of IPTV. Today's copyright holders are very concerned about protecting the rights to their own content.

verimatrix encoding
verimatrix encoding

Protection of rights

A recent incident that happened to one of the providers in Tomsk made us think about the importance of security for the legitimate owners of content encoding. In addition, the Tomsk branch of MegaFon was very popular, being engaged in illegal broadcasting of about 85 channels, for which its work was suspended. This is because they were not encoded with Verimatrix technology, which prevents content from being copied and re-shared by other users.

What does this mean? This issue is relevant for both users and companies providing IPTV services. Below is a detailed explanation of what Verimatrix is.

verimatrix encoding
verimatrix encoding

What is this?

Verimatrix is the recognized leader in security solutions for digital content providers.television. The company is taking a 3D innovative approach to deliver media across multiple devices. In general, this technology was the first in the world in terms of broadcast video security. Today, most rights holders agree to the translation of content only if it is encoded in accordance with Verimatrix. Encoding offers profitable solutions in terms of voice acting. If an operator enters the market these days with Verimatrix, it could be quite a strong competitor. Because the company's paid licenses are widely available, copyright holders can reap significant profits.

what is verimatrix
what is verimatrix

How does it work?

Verimatrix encoding is based on a technology called VCAS (Video Content Management System), which is suitable for most networks: IPTV, Internet TV, DBV, hybrid and mobile TV. The technology was developed using international security and data protection standards (HLS, AES, PKI, SSL, etc.), so it provides reliable content protection. Modular design, good scalability and flexibility allow this technology to be used not only by providers with a small number of subscribers, but also by large telecommunications operators with multi-mode networks.

verimatrix encoding sharing
verimatrix encoding sharing

The main principle of Verimatrix encoding is to support the protection of content from viewing and use by unregistered subscribers, and also eliminates the possibility of itcopying and distribution. Data protection itself is based on a single system for storing, generating and managing access protocols, as well as broadcasting a dedicated channel to a specific system. Verimatrix encoding is quite flexible and comfortable in the process of setting up and using, since it is not associated with restrictions on the architecture of other components of the system and does not require modification of the subscriber device. Today, the system is integrated with a large number of STB models (more than 200), and also supports other types of devices running on various platforms (iOS, PC/Mac, Android, Smart TV, STB (HLS).

satellite verimatrix encoding
satellite verimatrix encoding

Key Features

As already mentioned, Verimatrix encoding uses VCAS technology for Internet TV. Its main characteristics are as follows:

  • ViewRight web client supports a wide range of devices open to HLS;
  • Protection against illegal unauthorized copying and subsequent distribution of content is carried out by watermarking technique called VideoMark;
  • High scalability with support for multiple networks: 3G/4G, broadband, Wi-Fi and so on;
  • supported video formats: MPEG-2, DivX, MPEG-4/H.264, VC1;
  • supported codec format: MPEG-2 stream;
  • VOD content is encrypted automatically or manually through a user-friendly interface.

Technical aspects

Verimatrix encoding usesdigital content management (DRM) systems that provide the ability to control how people can consume content. Typically, video owners and copyright holders force distributors (providers) to use certain DRM systems to protect each piece of content. Depending on copyright requirements, Verimatrix may not always be necessary. Sometimes it is enough to provide basic protection through secure token-based authentication or simple AES encryption, without complex license exchange and policy management. This simplifies the video viewing process for end users, but slightly reduces the security of the content.

verimatrix viewrighttm plugin
verimatrix viewrighttm plugin

Why is it difficult to use Verimatrix? This is due to the fact that in order to view video in this encoding, you need to install a specific plugin. It is called Verimatrix Viewrighttm Plugin and can run on any modern web browser. It is usually provided free of charge by video content providers.

On the use and development of technology

Verimatrix specializes in generating and generating revenue for multi-service and multi-screen digital television services worldwide. The company behind this technology has won numerous awards because the Verimatrix Viewright Plugin enables cable, satellite, IPTV and OTT operators to cost-effectively expand their networks and create new business models. As a recognized leader in solutions forcopyright enforcement, the company is using its innovative 3D security approach to deliver high-quality content to a range of devices over new hybrid network combinations. The plugin is currently available for installation on any mobile platform and operating system (in modern versions).

verimatrix viewright plugin
verimatrix viewright plugin

Prospects

Keeping close relationships with major studios and standards organizations and partnering relationships allows Verimatrix to provide a unique perspective on the video industry beyond content security as carriers roll out new services to take advantage of the proliferation of connected devices.

Where is it used?

Thus, the spread of Internet TV and mobile video access presents both a competitive challenge and a wide range of new opportunities for digital TV operators. The Verimatrix architecture delivers security convergence that appeals to a new emerging market with a proactive approach to secure and increase revenue.

Currently, the encoding is focused more on digital television operators with IPTV architecture, hybrid or DVB networks. VCAS integrates security methods for these standards-based managed networks to deliver Internet TV to PCs, phones, tablets, and STB devices. Whatever the network transition challenges for service operators, technology can help themoptimize operating costs and use a wider network with its services.

Despite the fact that the technology is mainly designed to protect Internet video, Verimatrix encoding is also used today on the satellite. In particular, in Russia it is used by a provider known as Satellite MTS TV.

Can this encoding be cracked?

So, how can a user access encrypted channels? There is only one legal way: to pay for the provider's services. However, due to their high cost, emulators or pirated cards are often used. This illegal method will allow you to access the video for free. At the same time, such funds also began to rise in price due to the high demand for them. This resulted in little benefit from such actions. In addition, commercially available pirate cards provide very limited access to video content.

In this regard, Verimatrix encoding sharing appeared, which allows you to get quite low-cost access to watching videos. What does this mean? In simple words, this is the viewing of a data package by many end users, provided through one card. Moreover, such a connection can be configured not only on the Internet, but also in the local home network. Payment is made for one card and, accordingly, distributed to all connected subscribers.

This bypasses the Verimatrix technology to some extent. What does it mean? You will only need certain equipment and some technical knowledge to connect a receiver to the server. Providerscan detect such an illegal connection, but this is associated with some difficulties.