欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    ITU-T J 95-1999 Copy Protection of Intelluctual Property for Content Delivered on Cable Television Systems Series J Transmission of Television Sound Programme and Other Multimedia si.pdf

    • 资源ID:799114       资源大小:2.92MB        全文页数:61页
    • 资源格式: PDF        下载积分:10000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要10000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    ITU-T J 95-1999 Copy Protection of Intelluctual Property for Content Delivered on Cable Television Systems Series J Transmission of Television Sound Programme and Other Multimedia si.pdf

    1、INTERNATIONAL TELECOMMUNICATION UNION ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU J.95 (09/99) SERIES J: TRANSMISSION OF TELEVISION, SOUND PROGRAMME AND OTHER MULTIMEDIA SIGNALS Ancillary digital services for television transmission Copy protection of intellectual property for content deli

    2、vered on cable television systems ITU-T Recommendation J.95 (Previously CCITT Recommendation) ITU-T J-SERIES RECOMMENDATIONS TRANSMISSION OF TELEVISION, SOUND PROGRAMME AND OTHER MULTIMEDIA SIGNALS General Recommendations General specifications for analogue sound-programme transmission Performance c

    3、haracteristics of analogue sound-programme circuits Equipment and lines used for analogue sound-programme circuits Digital encoders for analogue sound-programe signals Digital transmission of sound-programme signals Circuits for analogue television transmission Analogue television transmission over

    4、metallic lines and interconnection with radio-relay links J.l-J.9 J. 10-J. 19 J.20-J.29 5.30-5.39 5.40-5.49 J. 50-J. 59 5.60-5.69 5.70-5.79 Digital transmission of television signals 5.80-5.89 Y I Ancillary digital services for television transmission J.9-J.99 Operational requirements and methods fo

    5、r television transmission Interactive systems for digital television distribution Transport of WEG-2 signals on packetised networks Measurement of the quality of service Digital television distribution through local subscriber networks J. 100-J. 109 J. 1 10-J. 129 J.130-J.139 J. 140-5.149 J. 150-J.

    6、159 For further details, please rer to ITD-T List of Recommendations. ITU-T RECOMMENDATION J.95 COPY PROTECTION OF INTELLECTUAL PROPERTY FOR CONTENT DELIVERED ON CABLE TELEVISION SYSTEMS Summary This Recommendation describes the necessary requirements for a system to protect the intellectual propert

    7、y rights (IPR) of television programming entities against the illegal copying, duplication and distribution of their creative property. The system described herein has aspects that prohibit unauthorized individuals from accessing encrypted WEG data streams. Also, techniques for “watermarking“ televi

    8、sion signals for identification and copying allowances are presented. The material herein contains both general descriptions and discussions of specific technical approaches to copy protection. Source ITU-T Recommendation J.95 was prepared by ITU-T Study Group 9 (1997-2000) and was approved under th

    9、e WTSC Resolution No. 1 procedure on 16 September 1999. Keywords Conditional access, digital television, WEG, security, television, video recording. Recommendation J.95 (09/99) 1 FOREWORD ITU (International Telecommunication Union) is the United Nations Specialized Agency in the field of telecommuni

    10、- cations. The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of the ITU. The ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis. The World Tel

    11、ecommunication Standardization Conference (WTSC), which meets every four years, establishes the topics for study by the ITU-T Study Groups which, in their turn, produce Recommendations on these topics. The approval of Recommendations by the Members of the ITU-T is covered by the procedure laid down

    12、in WTSC Resolution No. 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with IS0 and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate both a telecommunicatio

    13、n administration and a recognized operating agency. INTELLECTUAL PROPERTY RIGHTS The ITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right. The ITU takes no position concerning the evidence, vali

    14、dity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recommendation, the ITU had not received notice of intellectual property, protected by patents, which may be

    15、required to implement this Recommendation. However, implementors are cautioned that this may not represent the latest information and are therefore strongly urged to consult the TSB patent database. O ITU 2001 All rights reserved. No part of this publication may be reproduced or utilized in any form

    16、 or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing fiom the ITU. Recommendation J.95 (09/99) 11 CONTENTS Introduction and background Scope References (Informative) Definitions Watermarking of digital television intellectual property 5.1 Ba

    17、ckground and functional requirements 5.2 Implications for design approach Access control copy protection measures . Background and functional requirements - WEG digital signals . 6.3 Authorization centre functionality . electronics equipment . Access control copy protection . 6.1 6.2 Background and

    18、functional requirements - Analogue signals Factors regarding the inclusion of copy protection functionality into cable television and consumer 7.1 Watermarking 7.2 7.3 Other impacts Appendix I . The EBU approach to copy protection of television intellectual property delivered on secondary cable TV s

    19、ystems Appendix II . Galaxy watermark proposal II . 1 11.2 11.3 11.4 11.5 11.6 11.7 11.8 11.9 Appendix III III . 1 111.2 111.3 111.4 111.5 111.6 111.7 111.8 . System Architecture Generation Copy Control Technical mahuity Gate Count analysis . Robustness tests False Positive analysis . Embedding tech

    20、nology and system . Abbrviations Contact Information . The 5C proposal for the copy protection of WEG video intellectual property Introduction . Terms and abbreviations . The 5C Digital Transmission Content Protection System . Full Authentication Restricted Authentication Content Channel management

    21、and protection . System Renewability . AV/C Digital Interface Command Set Extensions Recommendation J.95 (0999) Page 1 1 1 2 3 3 4 4 4 4 4 5 5 5 5 5 7 8 11 11 12 12 13 14 15 15 16 16 21 21 23 30 34 43 45 1 111 Recommendation J.95 COPY PROTECTION OF INTELLECTUAL PROPERTY FOR CONTENT DELIVERED ON CABL

    22、E TELEVISION SYSTEMS (Geneva, 1999) 1 Introduction and background The illegal recording and duplicating of television intellectual property has resulted in a very large illegal business worldwide, and has cost the owners of the intellectual property significant funds in lost revenue. With the change

    23、 to digital WEG television, the problem is exacerbated because digital recordings can be duplicated in their original quality over many generations, whereas analogue recordings are reduced in fidelity with each successive generation, and become unusable at some point. In systems where the WEG digita

    24、l signal is received and rendered into an analogue equivalent for viewing on an analogue-only television receiver, the quality of that analogue signal causes it to be a target for pirating also, and thus must be protected. To assist in these goals, approaches have been developed for hiding digital m

    25、arkings in digital television intellectual property in a manner that is both undetectable and incorruptible. This process, called “watermarking“, is based on the science of cryptography but is not cryptographic in itself, and it contains the identity of the property owner and that owners rules regar

    26、ding copies, namely, none, one copy for personal use, or unlimited copies. In addition to watermarking, copy protection requires that clear-text WEG digital television signals, or their analogue equivalents, are never allowed to traverse signal lines outside of the physical boundaries of the in-home

    27、 consumer electronics equipment. To accommodate this requirement, a secondary scrambling system is required to temporarily cover these signals during their in-premises distribution, whether in digital or analogue format. A cryptographic system is proposed to cover the digital WEG signals, and an exi

    28、sting commercial system which rapidly varies the timing is proposed to cover the analogue signals. To accommodate legal action against any one who would subvert these countermeasures, it is desired that the processes be proprietary and protected by licensing procedures. However, the licensing should

    29、 be carefully crafted so as not to produce unnecessary discrimination andor disadvantage to companies who must produce these copy protection systems. 2 Scope This Recommendation describes both the cryptographic techniques to protect access to clear-text WEG digital television signals, and a process,

    30、 known as “watermarking“ which indelibly marks the intellectual property as to its owner and that owners requirements regarding copying. A successful copy protection system supports the legal privilege of the owner of the IPR to control the distribution of the protected product. Approaches to copy p

    31、rotection for content described in this Recommendation should be considered for use in other applications that require similar protection, such as over-the-air broadcasting, distribution of recorded programmes (e.g. by DVD), etc. 3 References (Informative) - 1394 Trade Association, Specification for

    32、 AVIC Digital Interface Command Set. - Digital Transmission Protection License Agreement, Development and Evaluation License, Digital Transmission Licensing Authority. - Digital Transmission Licensing Administrator, 5C Digital Transmission Content Protection Specification, Volume 1 , Version 0.9 1.

    33、Recommendation J.95 (09/99) 1 Digital Transmission Licensing Administrator, 5C Digital Transmission Content Protection Specijcation, Volume 2, Version 0.90. IEC 61883-1 (1998), Consumer audio/video Equipment - Digital Interface -Part 1: General. IEEE Std 1394-1995, IEEEs Standardfor a High Performan

    34、ce Serial Bus. IEEE P1363, Editorial Contribution to Standard for Public Key Cyptography, Preliminary Draft, P1363ID3 (May 11 , 1998). National Institute of Standards and Technology (NIST), Secure Hash Standard (SHS, FIPS Publication 180-1 , 17 April, 1995. Toshiba Corporation, Eficient Implementati

    35、on of an Elliptic Cume Cyptosystem (available at http:/wwW). Definitions This Recommendation defiies the following terms: 4.1 algorithm: A mathematical process that can be used for the scrambling and descrambling of a data stream. 4.2 authentication: The process intended to allow the system to check

    36、 with certainty the identification of a party. 4.3 authorization coding: A digital word that describes the personality or service access capability of the subscriber decoder unit. NOTE - This code word, which is based on the service access authorized by the billing system, determines which keys are

    37、distributed to each customer, and is required at the subscriber decoder to authorize the descrambling of any specific programme. 4.4 Conditional Access system (CA): The complete system for ensuring that cable services are accessible only to those who are entitled to receive them, and that the orderi

    38、ng of such services is not subject to modification or repudiation. 4.5 key in electronic cryptographic systems). 4.6 number of bits that can be securely encrypted before it becomes advisable to change the key. 4.7 sound, and data services. 4.8 electronic key: The term for data signals that are used

    39、to control the descrambling process in subscriber decoders. NOTE - There are at least three types of electronic keys: those used for television signal streams, those used for protecting control system operations, and those used for the distribution of electronic keys on the cable system. See also “a

    40、uthorization coding“ which is also effectively a key. 4.9 4.10 operating hours of the delivery system. NOTE - By contrast, other services, such as a pay-per-view feature film, are only available for a specific period of time. 4.11 connected. cryptanalysis: The science of recovering the plaintext of

    41、a message without access to the key (to the electronic cryptographic duty cycle: The maximum secure capacity of a cryptographic process, based on the total descrambling: The process of reversing the scrambling function (see “scrambling“) to yield usable pictures, encryption: The process of scramblin

    42、g signals to avoid unauthorized access. full period terminated service: A subscription service that is always available to subscribers during the host: A device with generalized functionality where modules containing specialized functionality can be 4.12 unauthorized results. integrity: The ability

    43、of a function to withstand being usurped for unauthorized use, or modified to yield 4.13 to internal functionality by unauthorized parties. 4.14 4.15 having sent the message. intrusion resistance: The ability of a hardware object to deny physical, electrical, or irradiation-based access module: A sm

    44、all device, not working by itself, designed to run specialized tasks in association with a host. non-repudiation: A process by which the sender of a message (e.g. a request on a pay-per-view) cannot deny 2 Recommendation J.95 (09/99) 4.16 one-way hash: A mathematical process or algorithm whereby a v

    45、ariable length message is changed into a fiied-length digital word, such that it is very difficult to calculate the original message from the word, and also very difficult to find a second message with the same word. 4.17 period of time. pay-per-view: A payment system whereby the subscriber can pay

    46、for an individual programme or specified 4.18 access for unauthorized reception. piracy: The act of acquiring unauthorized access to programmes, usually for the purpose of reselling such 4.19 public key cryptography: A cryptographic technique based upon a two-key algorithm, private and public, where

    47、in a message is encrypted with the public key but can only be decrypted with the private key. Also known as a Private-Public Key (PPK) system. NOTE - Knowing the public key does not reveal the private key. Example: Party A would devise such a private and public key, and send the public key openly to

    48、 all who might wish to communicate with Party A, but retain the private key in secret. Then, while any who have the public key can encrypt a message for Party A, only Party A with the private key can decrypt the messages. 4.20 unauthorized parties. scrambling: The process of using an encryption func

    49、tion to render television and data signals unusable to 4.21 secure signature: A mathematical process by which the origin and integrity of a transmitted message can be ascertained. NOTE - If a secure signature system is used, the originator cannot deny having sent the message, and the receiver can determine if the message has been modified. 4.22 transport stream: An MPEG-2 Transport Stream. 5 Watermarking of digital television intellectual property 5.1 Background and functional requirements One of the basic requirements for defining intellectual property is that it must be m


    注意事项

    本文(ITU-T J 95-1999 Copy Protection of Intelluctual Property for Content Delivered on Cable Television Systems Series J Transmission of Television Sound Programme and Other Multimedia si.pdf)为本站会员(visitstep340)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开