ATIS 0800034-2010 Secure Time Interoperability Specification.pdf
《ATIS 0800034-2010 Secure Time Interoperability Specification.pdf》由会员分享,可在线阅读,更多相关《ATIS 0800034-2010 Secure Time Interoperability Specification.pdf(19页珍藏版)》请在麦多课文档分享上搜索。
1、 Access to Additional Content for ATIS 0800034 (Click here to view the publication) This Page is not part of the original publication This page has been added by IHS as a convenience to the user in order to provide access to additional content as authorized by the Copyright holder of this document C
2、lick the link(s) below to access the content and use normal procedures for downloading or opening the files. ATIS 0800034 Additional Content Information contained in the above is the property of the Copyright holder and all Notice of Disclaimer however, before it is trusted, this value should be che
3、cked for authenticity and integrity after reception. By specifying a message format and authentication scheme that can be applied at both preparation and reception of the time values, interoperability will be achieved and use of trusted time can be established. 5.4 Analysis of Secure Time Currency O
4、nce a Secure Time value is received, the ongoing measurement of elapsed time may be applied to that initial value to keep the value temporally current. This may be accomplished by referencing a hardware-based elapsed time measurement device. For example, when the Secure Time value is received (TS),
5、the hardware time reference is read to be X1. Later, when Secure Time is needed, the hardware time reference is read again and returns X2. The current secured time (TC) can be determined from the formula: TC= TS+ X2 X1 The robustness of the hardware time reference should be considered in order to pr
6、event local tampering with the time value. The solution should address the robustness rules for the hardware time reference, such as those stated in section 5.1.6 of ATIS-0800024 2. In some systems, the Secure Time may be used in a manner - or delivered with a frequency - such that currency via the
7、use of hardware time reference is obviated. 5.5 Analysis of Preparation of Secure Time Values One method to provide Secure Time is to respond to a device request by taking the current (implicitly trusted) time source and digitally signing the value. Such a method has the advantage of providing relat
8、ively accurate time information, but has several disadvantages. The most significant disadvantage is the expense or complexity of scaling such a system to the size necessary to support a large population of devices and request traffic. An alternative method to provide Secure Time is to pre-generate
9、a batch of messages in advance, then release these messages one at a time as the corresponding time interval occurs. Depending on the intended use of the Secure Time in the system, the interval may vary widely: for instance, one per day or one per minute. ATIS-0800034 5 The disadvantage of this alte
10、rnative is that the device lacks knowledge about whether the pre-generated time messages are released in a timely and proper fashion, and thus the security of functions relying on this process can be jeopardized. 5.6 Analysis of Secure Time Availability When an IPTV device is first powered on or res
11、et, it may have no knowledge of date or time at all until the first successful delivery of a Secure Time message. Also, the device may be detached from a network where it cannot receive updated Secure Time messages. In the latter case, it may have the last Secure Time message available from persiste
12、nt storage to provide some reference. The system design for Secure Time should recognize that the IPTV device may be in one of the following four states: 1) Unknown Secure Time. 2) Known Secure Time from persistent local storage, but not updated since most recent power cycle. 3) Secure Time has been
13、 updated from the network during the current device power cycle. 4) Secure Time has been updated from the network during the current device power cycle, but an updated value has not been received within a set period of time as specified by a system policy. The example of unknown Secure Time would be
14、 the first power-on of a device. The device must still function to the degree necessary to obtain the Secure Time for the first time. Also, this state may exist when a persistently stored time is lost for example, if it was stored on low-robustness storage such as a disk drive that was reformatted,
15、replaced, or unavailable. An example for the use of stored Secure Time with no update might be an IPTV device that was removed from the network such as taken to a vacation cottage with the expectation that content stored on the device could be viewed at the secondary location. Such a device may appe
16、ar frozen in time, which could contradict system requirements to reliably expire stored content. The use of a dedicated hardware element with battery backup may be considered as a reliable clock to track elapsed time even when the device is powered off. However, the battery may be removed or fail, t
17、he device may drift over prolonged intervals, or the device might be reprogrammed via unauthorized use or circumvention. In the context of reliance on battery backed-up clocks to maintain time when the power is removed or the device is reset, the robustness rules in ATIS-0800024 2 provide some guide
18、lines. A system design might include an expiration timer to ensure that a recent Secure Time value is kept current with periodic updates. Ensuring frequent updates means that any local clock drift or intentional tampering will not accumulate into large differences from actual time. 5.7 Secure Time U
19、pdate Interval It is outside the scope of this standard to provide highly accurate or sub-second precision time information, and it is not the intent of this standard to supplant protocols (e.g., NTP) suited to the dissemination of accurate time signals throughout a network. Secure Time can provide
20、a sanity check on the time delivered by other means to reject attempts to manipulate the non-secure time source outside of a window of tolerance set by system policy. ATIS-0800034 6 Time accuracy can vary because of frequency of update generation. For example, consider a system set up to update the
21、time value in Secure Time messages at the top of each hour of the day, which transmits the same message once per minute. A device joining the network will receive the same message at the beginning and end of a given hour. For this reason, it may be useful to include the updating interval in the Secu
22、re Time message so the recipient knows the expected value of the next Secure Time message. Long intervals between Secure Time updates may be satisfactory for enforcement of, for example, certificate validity. However, in order to accommodate the management of precise event windows, the system may be
23、 designed to provide Secure Time messages more often, such as a Secure Time value update once per minute rather than once per hour. Such a delivery method would have a variability range up to 60 seconds from the actual time, which may be considered suitable for event management. If frequent Secure T
24、ime updates are burdensome to Secure Time servers, another solution is to use non-secure time (such as an NTP signal) to fill in the gap between Secure Time updates. For example, in a system in which Secure Time updates are generated once per hour, a Secure Time message may indicate it is between 5:
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ATIS08000342010SECURETIMEINTEROPERABILITYSPECIFICATIONPDF

链接地址:http://www.mydoc123.com/p-541371.html