C2PA Provenance Signature Vault

 

Robust C2PA Provenance Data in the Cloud

As a member of the widely supported C2PA (Coalition for Content Provenance and Authenticity), EZDRM's new content integrity offerings enable authors and rights holders—whether at the point of original creation or any subsequent stage of processing or editing—to securely attach their provenance assertions to video content using their unique credentials, and to back up these assertions via the cloud. With robust provenance data available within live and on demand video streams, video players can access and display the credentials of that video and assure consumers of its integrity–without negative performance impacts.

As a new foundational revenue security product, the EZDRM Provenance Signature Vault enables authors of provenance data—whether at the point of original creation or any subsequent stage of processing or editing—to reinforce their provenance content metadata assertions through a robust cloud provenance repository.

EZDRM_SignatureVault_final_LightBG_24.7.25
Diag stripes

Enabling the C2PA Ecosystem

Product Features

Cloud Micro-service Resilience

Like other EZDRM micro-service offerings, this service is meticulously designed to seamlessly integrate with existing streaming workflows. for large-scale service deployments. The API-centric micro-service architecture ensures, robust low latency support, and secure metadata storage in a independent, trusted location.

HLS, MPEG-DASH and CMAF Streams

Fully leverages metadata, transport, and streaming standards to enable provenance support for all major delivery formats. As the industry moves toward adoption of CMAF, the approach ensures that provenance data is fully compatible with current and future streaming security implementations.

Using the EZDRM Provenance Signature Vault ensures that provenance metadata is securely stored in a separate, trusted location outside of the immediate media file or container. This hosted manifest model, based on the C2PA framework, offers several key advantages over internal content manifests:

  • Faster and more reliable verification: By externalizing the manifest, content authenticity and provenance can be verified rapidly and independently of the media file itself—without introducing additional latency to the streaming workflow.
  • Resilience against corruption or tampering: In the event that the media file or internal manifest is corrupted, altered, or removed—whether accidentally or due to malicious interference—the hosted manifest remains intact. This ensures the origin and integrity of the content can still be validated using the secure repository.
  • Secure and flexible updates: A hosted manifest allows for updates to the provenance metadata, such as changing attribution or adjusting rights information, without requiring the file to be re-signed or re-ingested. This is not possible with embedded manifests, which are tightly coupled to the file and require regeneration after each update.
  • Interoperability and scalability: Maintaining a centralized, standards-compliant manifest aligns with modern cloud and multi-platform distribution models. It enables consistent trust signals to be verified across disparate systems, services, and playback environments.
This architecture is particularly valuable in high-security workflows—such as premium video streaming, enterprise media management, and digital news distribution—where persistent trust in content identity is critical across the entire content lifecycle.

Supporting Technologies

 Content Credentials are based on an open technical specification developed and maintained by the C2PA, a cross-industry standards development organization. The capability to recognize and display C2PA data is integrated into many streaming client devices and player technologies:

Platforms

  • Edge browser
  • Chrome browser
  • Apps on iPhone/iPad
  • Apps on Android phones/tablets
  • Roku, Amazon Fire and many other streaming media players
  • Many Smart TVs with commercial players

Formats

  • MPEG-DASH
  • HLS
  • CMAF

New to DRMaaS, C2PA, and Micro-services Revenue Security?

Access our comprehensive FAQ through the sample questions below:

Ready to Get Started?

Our no-obligation Proof of Concept (POC) trial account is quick and easy to set up.

Request a POC Account