ATIS 0800015-2011 Certificate Trust Hierarchy Interoperability Specification (Version 2 0 Pre-Pub).pdf
《ATIS 0800015-2011 Certificate Trust Hierarchy Interoperability Specification (Version 2 0 Pre-Pub).pdf》由会员分享,可在线阅读,更多相关《ATIS 0800015-2011 Certificate Trust Hierarchy Interoperability Specification (Version 2 0 Pre-Pub).pdf(27页珍藏版)》请在麦多课文档分享上搜索。
1、 ATIS-08000015.v002 CERTIFICATE TRUST HIERARCHY INTEROPERABILITY SPECIFICATION ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry. More than
2、 200 companies actively formulate standards in ATIS 17 Committees, covering issues including: IPTV, Cloud Services, Energy Efficiency, IP-Based and Wireless Technologies, Quality of Service, Billing and Operational Support, Emergency Services, Architectural Platforms and Emerging Networks. In additi
3、on, numerous Incubators, Focus and Exploratory Groups address evolving industry priorities including Smart Grid, Machine-to-Machine, Networked Car, IP Downloadable Security, Policy Management and Network Optimization. ATIS is the North American Organizational Partner for the 3rd Generation Partnersh
4、ip Project (3GPP), a member and major U.S. contributor to the International Telecommunication Union (ITU) Radio and Telecommunications Sectors, and a member of the Inter-American Telecommunication Commission (CITEL). ATIS is accredited by the American National Standards Institute (ANSI). For more in
5、formation, please visit . Notice of Disclaimer manufacturer 1 opts to deploy two sub-CAs, while manufacturer 2 opts to issue device certificates directly from the Manufacturer DEV CA. For a DEV CA (or a Manufacturer DEV CA) run by a trusted organization that is not a device manufacturer (see part B
6、of Figure 3), the DEV CA (or a Manufacturer DEV CA) subject field shall be formatted as described in section 3.2. For a Manufacturer DEV CA run by a manufacturer (see part A of Figure 3), the Manufacturer DEV CA subject field shall be formatted as described in section 3.2. ATIS-0800015.v002 15 For a
7、 Manufacturer DEV sub-CA issued by the Manufacturer DEV CA, the subject field shall be formatted as described in section 3.2. In all cases, the can simply be the name of the CA vendor or another name. 3.2.5 Management CA A Management CA may be used by a trusted organization to issue Management Certi
8、ficates for management functions and extend the Certificate Trust Hierarchy. A Management CA shall not sign and issue certificates for any type other than management purposes. In other words, a Management CA shall not sign and issue certificates belonging to any branches other than the Management br
9、anch. When issued, a Management CA certificate shall be signed by a Root CA and the subject field shall be formatted as described in section 3.2. The can simply be the name of the CA vendor or another name. 3.2.6 Operator OAM CA An Operator OAM CA (s) issues OAM Certificates for operations, administ
10、ration, and maintenance functions. This includes server-side devices that provide functionality, compliant with ATIS specifications as well as servers and/or network elements required for support of operations that are not specified directly in ATIS specifications. An Operator OAM CA may be a CA tha
11、t is controlled and maintained by an operator (Service Provider SP or Network Provider NP), or its agents, to issue certificates for servers that are directly under control of the operator. An Operator OAM CA may issue OAM Certificates to server devices that already possess manufacturer-issued Devic
12、e Certificates. Examples of OAM Certificates are certificates issued to servers implementing Device Authentication Functions or time servers. An Operator OAM CA shall not sign and issue certificates for any type other than OAM purposes (its own branch). When an Operator OAM CA certificate is issued,
13、 it shall be signed by a Root CA and the subject field shall be formatted as described in section 3.2. The can simply be the name of the CA vendor or another name. 3.2.7 OCSP responder certificates OSCP responder certificates are issued by the CA that is delegating the revocation status checking to
14、an OCSP responder; refer to ATIS-0800023 5 for details. The OCSP responder certificate shall have the ISS/CA profile as specified in ATIS-0800016 6. 3.2.7.1 Root Level OCSP Responder When an OCSP responder certificate is issued by the Root CA (as shown in Figure 2), the OCSP responder certificate su
15、bject shall be formatted as described in section 3.2 More than one OCSP responder can be provisioned for both scalability and trust/ business reasons. For large networks, the operator should consider the deployment of OSCP responders at lower levels of the Trust Hierarchy. The can simply be the name
16、 of the CA vendor or another name. ATIS-0800015.v002 16 3.2.7.2 CA Level OCSP Responder The OCSP responders under the Root CA may be sufficient for certificate status checking of CVC, MVC, and Management branches. It is possible, however, to allow the CVC, MVC, and Management CAs to sign OCSP respon
17、der certificates and run OCSP responders independent of the root. This allows for a more flexible trust and business model for a variety of server-side architectures. Figure 1 shows all the normative placements of OCSP responder certificates in the certificate hierarchy as small green boxes. When OC
18、SP responder certificates are to be issued, the naming (subject field) for such certificates shall follow the conventions described for CA-level OCSP responders in section 3.2. The shall be selected from the following list: CVC CA: Code-Signing CA. MVC CA: Message-Signing CA. DEV CA: Device CA. Manu
19、facturer DEV CA: Device Manufacturer CA. Management CA: Management CA. Operator OAM CA: OAM CA. 3.2.8 Code Verification Certificate When issued, a CVC shall be signed by the issuing CVC CA holding a valid CVC CA certificate. The holder of the CVC (code signer) shall use the private key corresponding
20、 to the CVC to directly sign software code images. The CVC subject field shall be formatted as described in section 3.2. A CVC contains certificate extensions described in ATIS-0800016 6. 3.2.9 MVC (Message Verification Certificate) When issued, a MVC shall be signed by the issuing MVC CA holding a
21、valid MVC CA certificate. The holder of a MVC shall use the private key corresponding to the MVC to directly sign authenticated messages sent to IPTV Devices. The MVC subject field shall be formatted as described in section 3.2. A MVC contains certificate extensions described in ATIS-0800016 6. 3.2.
22、10 Device Certificate A Manufacturer DEV CA can issue a Device Certificate for any device type listed in Table 3. The Device Certificate is used by an IPTV Device to present verifiable credentials to any requesting entity. The combination of issuer and certificate serialNumber uniquely identifies th
23、e certificate under the entire domain of the ATIS IIF Trust Hierarchy. The combination of issuer and subject uniquely identifies the device under the entire domain of the ATIS IIF Trust Hierarchy. See ATIS-0800024, Security Robustness Rules Interoperability Specification 7, for robustness rules for
24、key protection in IPTV Devices. The Device Certificate subject field shall be formatted as described in section 3.2. As mentioned in section 3.2, is the device identifier defined in ATIS-0800037 11. The field currently can have different values depending on the type of device to which a certificate
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ATIS08000152011CERTIFICATETRUSTHIERARCHYINTEROPERABILITYSPECIFICATIONVERSION20PREPUBPDF

链接地址:http://www.mydoc123.com/p-541354.html