ATIS 0800024-2009 Security Robustness Rules Interoperability Specification.pdf
《ATIS 0800024-2009 Security Robustness Rules Interoperability Specification.pdf》由会员分享,可在线阅读,更多相关《ATIS 0800024-2009 Security Robustness Rules Interoperability Specification.pdf(32页珍藏版)》请在麦多课文档分享上搜索。
1、 ATIS-0800024 SECURITY ROBUSTNESS RULES INTEROPERABILITY SPECIFICATION The Alliance for Telecommunication Industry Solutions (ATIS) is a technical planning and standards development organization that is committed to rapidly developing and promoting technical and operations standards for the communic
2、ations and related information technologies industry worldwide using a pragmatic, flexible and open approach. Over 1,100 participants from over 300 communications companies are active in ATIS 22 industry committees and its Incubator Solutions Program. Notice of Disclaimer the entity whose Content is
3、 being Protected. 3.1.9 Content Protection: A combination of Access Control and Copy Control. 3.1.10 Content Provider: An entity that is either a Content Issuer or a Rights Issuer. 3.1.11 Content Subscription: A subscription that a User has with a Content Provider for the purposes of paying for Prot
4、ected Content purchased from that Content Provider and played on a Users Device. 3.1.12 Copy: To make a perfect reproduction of DRM Content or Rights. 3.1.13 Copy Control: The enforcement of conditions under which copyrighted content can be copied. Copy Control is one part of Content Protection. 3.1
5、.14 Copy Protection: A mechanism used to protect content from being copied in an unauthorized manner via analog and/or digital IPTV Receiving Device interfaces. Copy Protection is a combination of Access Control and Copy Control. ATIS-0800024 5 3.1.15 Cryptographically Robust: This term cryptographi
6、cally robust is often used to describe an encryption algorithm and implies, in comparison to some other algorithm (which is thus cryptographically weaker), greater resistance to attack. 3.1.16 Device: A Device is the entity (hardware/software or combination thereof) within a users equipment that imp
7、lements a DRM Client. The Device is also conformant to the specifications of the DRM it supports. 3.1.17 DRM: A collection of technologies that technically enable the definition of and the enforcement of secure content transportation as well as secure content licensing, including: Protection and con
8、trol of the viewing of content that is delivered over IP transport. Rights Management for the delivered content. 3.1.18 DRM Client: The entity in the Device that manages Permissions for Content and Media Objects on the Device. 3.1.19 Entitlement: Information about the authorization level/s a user ha
9、s to access and use certain services and to access, use, copy, and distribute certain contents received in his/her IPTV Receiving Device. 3.1.20 Integrity: The property that data (Contents, Rights, etc.) has not been altered or destroyed in an unauthorized manner. 3.1.21 IPTV Device: IPTV Receiving
10、Device or server-side devices or equipment. 3.1.22 IPTV Receiving Device: IPTV Terminal Function (ITF) and Delivery Network Gateway (DNG) as defined in ATIS-0800002, IPTV Architecture Requirements, represents the functionality within the consumer network that is responsible for terminating the IP si
11、gnal and converting the content into a renderable format (e.g., a STB). 3.1.23 ISS/A: The part of the ISS toolkit that deals with authentication functionality. See ATIS-0800014, Secure Download and Messaging Interoperability Specification. 3.1.24 ISS/E: The part of the ISS toolkit that deals with co
12、nfidentiality functionality. See ATIS-0800014, Secure Download and Messaging Interoperability Specification. 3.1.25 ISS/S: The part of the ISS toolkit that deals with content scrambling. See ATIS-0800006, IIF Default Scrambling Algorithm. 3.1.26 Key Management: All of the provisions made in a secure
13、 IPTV system, which are related to the generation, transport, exchange, storage, safeguarding, use, revocation, and renewing of cryptographic keys. 3.1.27 Message Integrity: The quality of a transmitted message, such that its recipient can be assured that the contents of the message have not been ta
14、mpered with or altered since the time it was transmitted by the sender. One common approach is to use a one-way hash function that combines all of the bytes in the message to produce a message digest that is impossible to reverse, and then make a digital signature of this hash value by the sender. A
15、nother method involves combining message bytes with a key value known only to the sender and recipient in a hash function. 3.1.28 Native Security Solution: The hardware and software present at manufacturing time, designed to secure the execution environment of an IPTV Receiving Device. 3.1.29 Privac
16、y: Confidentiality of user viewership and interactions with IPTV systems. 3.1.30 Protected Content: Media Objects that are consumed according to a set of Permissions in a Rights Object. ATIS-0800024 6 3.1.31 Revoke: A Device has been Revoked by a particular Rights Issuer if that Rights Issuer has de
17、cided it does not wish to issue Rights Objects to that Device (for example, because it has concerns about the robustness of the Devices implementation). 3.1.32 Rights: The ability to perform a pre-defined set of utilization functions on a content item. These utilization functions are the permissions
18、 (e.g., to view/hear, copy, modify, record, excerpt, sample, translate in another language, keep for a certain period, distribute), constraints (e.g., play/view/hear multiple times, play/view/hear certain number of hours), and obligations (e.g., payment, tracking information) that apply to the conte
19、nt and provide liberty of use granted to the end-user. 3.1.33 Rights Expression: The statement of utilization functions that can be performed on a Content Item and the conditions in which they can be performed. 3.1.34 Rights Holder: Indicates the entity that is entitled to grant rights. 3.1.35 Separ
20、able Security Element: The module providing operator based conditional access, which is not an integral part of the IPTV Receiving Device at manufacture time. 3.1.36 Server-Side Middleware: This is the system external to the Server-Side DRM System that is interacting with the Server-Side DRM System
21、to facilitate the delivery of secure content to the IPTV Receiving Device. 3.2 Acronyms and 2) keys cannot be directly read by hardware means. Part of the mitigation strategy of this vulnerability is complying with the robustness rules described in this document. The next figure shows the attack tre
22、e for content theft by impersonating a valid IPTV Receiving Device. ATIS-0800024 12 ContentTheftContentSplicingCapture Clear ContentDecrypt Encrypted ContentDuplicate IPTV Receiving Device with key informationDeter any duplicate IPTV Receiving Devicesby providing robustnessUse ofRevokedCertificateFi
23、gure 6: IPTV Receiving Device Content Theft - Duplicate Device with key information - Attack Tree Part of the mitigation strategy of this vulnerability may also involve various levels of tamper proofing. ContentTheftContentSplicingCapture Clear ContentDecrypt Encrypted ContentDuplicate IPTV Receivin
24、g Device with key informationUse revocation status-checking services(OCSP/CRL)Use ofRevokedCertificateFigure 7: IPTV Receiving Device Content Theft Use of Revoked Certificate - Attack Tree ATIS-0800024 13 4.2.1.2 Service Theft Service theft involves the viewing of video content which the attacker ha
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ATIS08000242009SECURITYROBUSTNESSRULESINTEROPERABILITYSPECIFICATIONPDF

链接地址:http://www.mydoc123.com/p-541362.html