CEA-851 2-A-2011 Security Services for the Versatile Home Network《通用家用网络的安全服务》.pdf
《CEA-851 2-A-2011 Security Services for the Versatile Home Network《通用家用网络的安全服务》.pdf》由会员分享,可在线阅读,更多相关《CEA-851 2-A-2011 Security Services for the Versatile Home Network《通用家用网络的安全服务》.pdf(48页珍藏版)》请在麦多课文档分享上搜索。
1、 CEA Standard Security Services for the Versatile Home Network CEA-851.2-A March 2011 NOTICE Consumer Electronics Association (CEA) Standards, Bulletins and other technical publications are designed to serve the public interest through eliminating misunderstandings between manufacturers and purchase
2、rs, facilitating interchangeability and improvement of products, and assisting the purchaser in selecting and obtaining with minimum delay the proper product for his particular need. Existence of such Standards, Bulletins and other technical publications shall not in any respect preclude any member
3、or nonmember of CEA from manufacturing or selling products not conforming to such Standards, Bulletins or other technical publications, nor shall the existence of such Standards, Bulletins and other technical publications preclude their voluntary use by those other than CEA members, whether the stan
4、dard is to be used either domestically or internationally. Standards, Bulletins and other technical publications are adopted by CEA in accordance with the American National Standards Institute (ANSI) patent policy. By such action, CEA does not assume any liability to any patent owner, nor does it as
5、sume any obligation whatever to parties adopting the Standard, Bulletin or other technical publication. This CEA Standard is considered to have International Standardization implication, but the International Electrotechnical Commission activity has not progressed to the point where a valid comparis
6、on between the CEA Standard and the IEC document can be made. This Standard does not purport to address all safety problems associated with its use or all applicable regulatory requirements. It is the responsibility of the user of this Standard to establish appropriate safety and health practices an
7、d to determine the applicability of regulatory limitations before its use. This document is copyrighted by the Consumer Electronics Association (CEA) and may not be reproduced, in whole or part, without written permission. Federal copyright law prohibits unauthorized reproduction of this document by
8、 any means. Organizations may obtain permission to reproduce a limited number of copies by entering into a license agreement with IHS (http:/). .Requests to reproduce text, data, charts, figures or other material should be made to the CEA. (Formulated under the cognizance of the CEAs R7 Home Network
9、 Committee.) Published by CONSUMER ELECTRONICS ASSOCIATION 2011 Technology furthermore, it uses web tools, such as HTTP, for device control. (Note that, while the CEA-851 also defines a network architecture and requires a backbone topology based on IEEE 1394b, the security services specified in this
10、 standard are not based on any protocols below layer 3 of the ISO Standard Reference Model; thus, these requirements could be used for networks other than a VHN, so long as they are digital, IP-based, and use web tools for device control.) This document specifies security services to defend against
11、threats coming from the outside the home into to the home. Security issues stemming from threats originating on devices within the home, or directed from devices within the home to an outside network, will be addressed in a future issue of this standard. 1Indeed, one of the persistent problems for m
12、anagers of enterprise security systems is the tendency of employees to use simplistic passwords; favorites are the users own name, the users street name, or a common dictionary word. CEA-851.2-A 72.2 Normative References The following standards contain provisions that, through reference in this text
13、, constitute normative provisions of this standard. At the time of publication, the editions indicated were valid. All standards are subject to revision, and parties to agreements based on this standard are encouraged to investigate the possibility of applying the most recent editions of the standar
14、ds listed in Section 2.2.1. If the referenced standard is dated, the reader is advised to use the version specified. 2.2.1 Normative Reference List 1. Ramsdell, B., Ed., Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.1 Certificate Handling, RFC 3850, Internet Engineering Task Force,
15、 July 2004. 2. Ramsdell, B., Ed., Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.1 Message Specification, RFC 3851, Internet Engineering Task Force, July 2004. 3. Schaad, J., Enhanced Security Services (EES) Update: Adding CertID Algorithm Agility, RFC 5035, Internet Engineering Tas
16、k Force, August 2007. 4. Kelsey, J., B. Schneier, and N. Ferguson, “Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator,” Sixth Annual Workshop on Selected Areas in Cryptography, Springer-Verlag, 1999, http:/ 5. Kent, S., K. Seo, Security Architecture for the I
17、nternet Protocol, RFC 4301, Internet Engineering Task Force, December 2005. 6. Housley, R., W. Ford, W. Polk, and D. Solo, Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, RFC 3280, Internet Engineering Task Force, April 2002. 7. Rivest, R., The MD5
18、 Message-Digest Algorithm, RFC 1321, Internet Engineering Task Force, April 1992 8. Secure Hash Standard, FIPS PUB 180-1, National Institute of Standards and Technology, April 17, 1995. 9. Advanced Encryption Standard (AES), Federal Information Processing Standards Publication 197, November 26, 2001
19、. 10. Brown, M., R. Housley, The Transport Layer Security (TLS) Authorization Extensions, RFC 5878, Internet Engineering Task Force, May 2010. 11. Karn, P., P. Metzger, and W. Simpson, The ESP Triple DES Transform, RFC 1851, Internet Engineering Task Force, September 1995. 12. Nottingham, M., E. Ham
20、mer-Lahav, Defining Well-Known Uniform Resource Identifiers (URIs), RFC 5785, Internet Engineering Task Force, April 2010. 13. Freed, N., Behavior of and Requirements for the Internet Firewalls, RFC 2979, Internet Engineering Task Force, October 2000. CEA-851.2-A 814. Baker, F., and P. Savola, Ingre
21、ss Filtering for Multihomed Networks, RFC 3704, Internet Engineering Task Force, March 2004 2.2.2 Normative Reference Acquisition IETF www.ietf.org AES http:/csrc.nist.gov/publications/fips/fips197/fips-197.pdf NIST www.nist.gov 2.3 Informative References The following documents contain information
22、that is useful in understanding this standard. Some of these documents are drafts of standards that may become normative references in a future release of this standard. 2.3.1 Informative Reference List 15. Dusse, S., P. Hoffman, B. Ramsdell, L. Lundblad, and L. Repka, S/MIME Version 2 Message Speci
23、fication, RFC 2311, Internet Engineering Task Force, March 1998. 16. Dusse, S., P. Hoffman, B. Ramsdell, and J. Weinstein, S/MIME Version 2 Certificate Handling, RFC 2312, Internet Engineering Task Force, March 1998. 17. Kaliski, B, and J. Jonsson, Public-Key Cryptography Standards (PKCS) #1: RSA Cr
24、yptography Specifications Version 2.1, RFC 3447, Internet Engineering Task Force, February 2003. 18. Cheng, P., and R. Glenn, Test Cases for HMAC-MD5 and HMAC-SHA-1, RFC 2202, Internet Engineering Task Force, September 1997. 19. Madson, C., and R. Glenn, The Use of HMAC-MD5-96 within ESP and AH, RFC
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- CEA8512A2011SECURITYSERVICESFORTHEVERSATILEHOMENETWORK 通用 家用 网络 安全 服务 PDF

链接地址:http://www.mydoc123.com/p-591495.html