欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    ITU-R REPORT BT 2052-2005 Protection of end-users privacy in interactive broadcasting systems《在交互式广播系统的终端用户隐私保护》.pdf

    • 资源ID:792892       资源大小:259.57KB        全文页数:9页
    • 资源格式: PDF        下载积分:10000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要10000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    ITU-R REPORT BT 2052-2005 Protection of end-users privacy in interactive broadcasting systems《在交互式广播系统的终端用户隐私保护》.pdf

    1、 Rep. ITU-R BT.2052 1 REPORT ITU-R BT.2052*Protection of end-users privacy in interactive broadcasting systems (Question ITU-R 111/6) (2005) 1 Introduction Interactive broadcasting systems enable attractive services to end-users. On the other hand, the system offers the opportunity to collect inform

    2、ation related to the end-user to the service provider or the other third party or parties, and to send a malicious program code to the receiver to malicious party or parties. To protect end-users privacy from potential threat, information to be protected and potential attack points in the interactiv

    3、e broadcast chain should be clarified. In this Report, a detailed analysis of interactive broadcast systems is discussed with two principles below to clarify the problem of protection of end-users privacy: Free-to-air broadcasting services, even when including interactive elements, should be availab

    4、le to the end-users without any need for a return channel connection. Any information of a personal nature is, by default, considered private. A privacy threat to a broadcast receiver with a return channel can potentially materialize as soon as a connection to a remote computer is established over t

    5、he return channel. 2 Information to be protected Considering the second principle in the previous section, all data related to the user should be regarded as potentially sensitive. There are different kinds of user data such as: personal data, e.g. name, date of birth, personal profiles and preferen

    6、ces; link data, e.g. address and telephone number, bank account or credit card number; data stored within the broadcast receiver, e.g. zapping history, return/interaction channel usage history, ID number; data stored outside the broadcast receiver, for a static receiver, e.g. return/interaction chan

    7、nel usage history, for a mobile receiver, e.g. location data. This tells that protection of the end-users privacy can be achieved when all the elements affecting it in the interactive broadcast chain work properly. 3 Interactive broadcast system model In order to approach these questions, an analysi

    8、s of threat to privacy infliction should be undertaken. Typical models for the interactive broadcast chain, with a unidirectional and bidirectional return channel, as illustrated in Figs. 1 and 2 respectively, are used for this analysis. *This Report is brought to the attention of ITU-T SG 9, ITU-T

    9、SG 17 and ITU-D SG 2. 2 Rep. ITU-R BT.2052 FIGURE 1 Model for an interactive broadcast chain with a unidirectional return channel The receiver in Fig. 1 comprises the following components: (A) DeMUX/broadcast channel decrypter This is to descramble a broadcast signal that has been encrypted for cert

    10、ain purposes such as pay-service or copy control of the broadcast content. Rep. ITU-R BT.2052 3 (B) Protocol handler/AV decoder This is to handle various broadcast protocols such as transport stream and carousel, etc. in a receiver and audio/video decoding. Data or messages other than audio/video si

    11、gnals taken out of the received signal by this are passed to an appropriate part of subsequent processes. (C) Secure device This stores an end-users authorization information, including identification of the user and key(s) for descramble. Certification authority can track the end-users name, addres

    12、s and telephone number, etc., through the identification number. (D) Processor/renderer This controls receiver behaviour instructed by both a broadcast content and a system program. (E) Storage This keeps information provided by the broadcast content, initial set-up, or user. Information provided by

    13、 a user includes user profile such as name, age, sex, address, genre of interest of contents, etc. (F) Return channel encrypter This enciphers message(s) sent through a return channel. This could be optional. (G) Access point A point to connect a receiver to a communication network for return channe

    14、l. To access the network, a receiver may require information to logon the network, e.g. user-id and password, or number to dial. A broadcast station provides the following components: (H) Multiplexer This combines broadcast services into a single stream and provides signalling information such as PS

    15、I/SI. Service_id of each service is included in SI. (I) Broadcast channel encrypter This enciphers broadcast contents and provides key(s) information and control message(s) for a descrambler in a receiver. (J) Broadcast content server This feeds broadcast contents to a broadcast channel encrypter (I

    16、). (K) Authoring system Interactive contents are authored by this system. Some contents may be renewed frequently to reflect end-user response derived from a communication server to the content. (L) Communication server This gathers responses of end-users. One possible use of these responses is to u

    17、pdate the content. Gathered information or communication log may be stored if needed. (M) Return channel decrypter This deciphers incoming encrypted messages from receivers through return channel. This is a counterpart of encrypter provided in a receiver. 4 Rep. ITU-R BT.2052 FIGURE 2 Model for an i

    18、nteractive broadcast chain with a bidirectional return channel NOTE 1 Multiple content providers using content server (K), authoring system (L), communication server (M) and encrypter/decrypter (N) or part of them may take part in establishing the interactive broadcast service. For example, addition

    19、al audio/visual component fed through interaction channel is provided by a different provider from broadcaster. The actual structure of these components above depends upon the service. NOTE 2 The destination at provider side, i.e. broadcaster side, of the interaction channel depends upon the structu

    20、re described in Note 1. A receiver in Fig. 2 comprises the following components: (A) Descrambler This is to descramble a signal that has been encrypted. In some cases, an encrypted signal may come from the interaction channel in addition to the broadcast channel. (B) Protocol stack No. 1 This is to

    21、handle various broadcast protocols such as transport stream and carousel, etc. in a receiver. Data or messages taken out of a received signal by this are passed to an appropriate part of subsequent processes. Rep. ITU-R BT.2052 5 (C) Secure device This stores information regarding legality of an end

    22、-user to enjoy the services, including identification of the user and key(s) for descramble. Certification authority can track the end-users name, address, and telephone number, etc. through the identification number. (D) Processor/renderer This controls receiver behaviour instructed by both a conte

    23、nt and a system program. (E) Storage This keeps information provided by the broadcast content, initial set-up, or user. Information provided by a user includes user profile such as name, age, sex, address, genre of interest of contents, etc. Information provided by the content may be some tags to ho

    24、ld a state of the content, or to distinguish each receiver or user. (F) Encrypter/decrypter This enciphers and deciphers a signal sent and received through the interaction channel. This may not always be employed to all kinds of interaction channel. Authentication of the content from interaction cha

    25、nnel may be applied here when using a different technique from authentication for broadcast channel applied with secure device (C). If the protocol in the interaction channel used to deliver a content to a receiver is the same as that in the broadcast channel, a received signal will be forwarded to

    26、the descrambler (A). (G) Protocol Stack No. 2 This handles communication protocol used for the interaction channel. In case of Internet protocol, this holds the IP address. (H) Access point A point to connect a receiver to a communication network for the interaction channel. Physical connection to t

    27、he access point varies by the interaction channel medium; telephone line for dial-up connection, Ethernet for broadband connection and base station for wireless connection including WiFi and cell phone network. A broadcast station comprises the following components: (I) Multiplexer (MUX) This combin

    28、es broadcast services for broadcast channel into a single stream and provides signalling information such as PSI/SI. Service_id of each service is included in SI. (J) Scramble controller This scrambles broadcast contents for broadcast channel and provides key(s) information and control message(s) fo

    29、r the descrambler (A) in a receiver. (K) Content server This routes components of the content such as data broadcast content, video or audio for transmission toward a receiver. When this receives a trigger or a request for transmission based on program timetable, all the components of the content at

    30、 that time will be routed to the broadcast channel. When a request message for transmission comes through the interaction channel, requested component(s) of the content will be routed to the interaction channel. Selection of the components follows an incoming request message from the interaction cha

    31、nnel, which is generated by the instruction of the content running on processor/browser (D) in a receiver, or by a system program of the receiver. 6 Rep. ITU-R BT.2052 (L) Authoring system Interactive content is authored by this system. Some content may be renewed frequently to reflect end-user resp

    32、onses, or instantly created (“active content”) based on information of a sender of an incoming request message from the interaction channel derived from the communication server (M). (M) Communication server (M) This controls all the communication on the interaction channel including the establishme

    33、nt of logical connection, transmission/reception of messages and logical disconnection. A typical example is a web server. This can gather end-users responses to the content as well. (N) Encrypter/decrypter (N) This enciphers and deciphers messages for the interaction channel. This is a counterpart

    34、of encrypter/decrypter (F) in a receiver. 4 Consideration on personal information and its handling in the elements of the interactive broadcast chain Based on the two models described in the previous section, generated or stored information related to the end-users privacy and potential threat to it

    35、 as a result of the process of the information is discussed below. 4.1 Receiver A receiver is a major source of private information in an interactive broadcast chain. Following information are examples kept in a secure device and/or storage, or created by a processor as a result of user interaction:

    36、 Viewing history Return/interaction channel usage History of interactive operation Personal profiles and preferences ID number. In some interactive broadcast systems, the ID number is used for the purpose of content copy control even in free-to-air services. 4.2 Return channel The following aspects

    37、of return channel characteristics and configuration are to be considered: 4.2.1 Return channel characteristic Non-disclosure of the channel specification This may help to protect the system including the end-users receiver from attack by malicious third party or parties. Communication operator In th

    38、e case of employing IP in the interaction channel, protection of the DNS server may be one of the key actions to protect the end-users receiver from attack by malicious third party or parties. Rep. ITU-R BT.2052 7 IP address In general, a dynamic assignment of IP address (DHCP) by the Internet servi

    39、ce provider (ISP) makes it difficult for the entity who owns a server to find out the relationship between IP address and personal information. But if the interaction channel is a broadband IP connection, the channel may be shared with other equipment, such as PCs using a broadband router. In the ca

    40、se of using the router, a connection is established at all times and this may lead to keeping the same IP address even in a DHCP environment. This degrades anonymity of the end-user to the broadcaster. Improvement of anonymity of the end-user can be achieved by using a trustworthy proxy that has no

    41、relationship to the content author/service provider. 4.2.2 Return channel configuration Telephone number of a caller In the case of using a telephone line for return channel, notifying this number to the destination leads to giving an opportunity to the service or content provider to collect informa

    42、tion about who responds to it. Network configuration for broadband IP connection In the case of using a broadband IP communication network such as DSL, optical fibre and WiFi, the gateway device at the access point should be configured properly. If a broadband router installed near the receiver is n

    43、ot configured properly, this may be a possible hole to probe the activity of return channel communication. If a WiFi channel is not configured securely enough, attackers will monitor the traffic and obtain important parameters such as the nearest DNS server address. This may result in a takeover of

    44、the DNS server and a fake DNS server will subsequently lead the connection to the improper server. 4.3 Content/service provider The following aspects are to be taken into account concerning the information exchange between the content/service provider and the receiver: Authentication When transmitti

    45、ng information from the receiver to the content author/service provider, authentication carried out by the receiver is important to prevent the establishment of a connection to a fake server. Such a server is considered malicious, thus transmitted information will be monitored, stored and consumed f

    46、or unintended purpose by the malicious party or parties. The seriousness of this attack depends on the choice of return channel; an IP connection is considered more vulnerable than a direct connection to such a server using a telephone line. In the bidirectional return channel model illustrated in F

    47、ig. 2, the communication server (M) should be authenticated properly by a receiver when the interaction channel is used as a “forward” channel. Authentication of a receiver may also be needed with the same reason why a scramble controller (J) and descrambler (A) pair is used. Without the authenticat

    48、ion of communication server (M), a malicious code can be transmitted to the receiver by pretence. In other words, a fake server will deliver a malicious code to the receiver. A takeover of DNS (Domain Name System) server near the receiver makes this activity possible. The encrypter/decrypter pair (F

    49、) and (N) is in charge of authentication in the interaction channel. When using the same authentication technique of the broadcast channel, an incoming signal from the interaction channel should be forwarded to the descrambler (A). 8 Rep. ITU-R BT.2052 IP address In general, a communication using IP often makes a record of access in a server, e.g. access log. In Fig. 1, the communication server (M) is in charge of it. This keeps the date, time and IP address of an entity that has made a connection and, in some cases, the file name that has bee


    注意事项

    本文(ITU-R REPORT BT 2052-2005 Protection of end-users privacy in interactive broadcasting systems《在交互式广播系统的终端用户隐私保护》.pdf)为本站会员(王申宇)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开