ImageVerifierCode 换一换
格式:PDF , 页数:100 ,大小:1.03MB ,
资源ID:1046306      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-1046306.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(SMPTE RDD 10-2006 An Open Transport and Navigational Specification Optionally Supporting Multiple Conditional Access Systems《可选型支持多条件接收系统的开放性运输和导航规范》.pdf)为本站会员(bowdiet140)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

SMPTE RDD 10-2006 An Open Transport and Navigational Specification Optionally Supporting Multiple Conditional Access Systems《可选型支持多条件接收系统的开放性运输和导航规范》.pdf

1、 The attached document is a Registered Disclosure Document prepared by the proponent identified below. It has been examined by the appropriate SMPTE Technology Committee and is believed to contain adequate information to satisfy the objectives defined in the Scope, and to be technically consistent.

2、This document is NOT a Standard, Recommended Practice or Engineering Guideline, and does NOT imply a finding or representation of the Society. Errors in this document should be reported to the proponent identified below, with a copy to engsmpte.org, . All other inquiries in respect of this document,

3、 including inquiries as to intellectual property requirements that may be attached to use of the disclosed technology, should be addressed to the proponent identified below. Proponent contact information: Lee Pedlow Sony Electronics INC 16530 Via Esprillo, San Diego, CA. 92127 E-mail: Page 1 of 100

4、 pages RDD 10-2006 Copyright 2006 by THE SOCIETY OF MOTION PICTURE AND TELEVISION ENGINEERS 3 Barker Avenue, White Plains, NY 10601 (914) 761-1100 Approved September 6, 2006 SMPTE REGISTERED DISCLOSURE DOCUMENT An Open Transport and Navigational Specification, Optionally Supporting Multiple Conditio

5、nal Access Systems RDD 10-2006 Page 2 of 100 pages Introduction This specification is in two parts: Part 1 deals with the transportation and management syntax of a tool kit that providing basic access control and optionally allowing for multiple Conditional Access (CA) systems to coexist; Part 2 of

6、the specification deals with the navigational tools. This technology was developed to provide basic management of devices accessing basic-tier program content, optionally coexisting in the presence of one or more conditional access systems. Unlike other attempts to address this issue, the basic acce

7、ss control and one or more CA systems operate within a common MPEG-2 transport stream without any direct or indirect interaction between the CA systems. Much of the syntax and data structure is based upon the ETSI-DVB model and related standards. Applications of this specification are potentially an

8、y point to multi-point content distribution requirement such as network program distribution, theater content distribution, as well as applications in the cable and Satellite industries. RDD 10-2006 Page 3 of 100 pages Part 1 Transport and Basic Access Control System Specification Table of Contents

9、Page 1 Scope 6 1.1 Overview 6 1.2 All-Digital Content Carriage . 6 1.3 Reference Documents . 6 1.4 Acronyms and Abbreviations . 7 2 Content Access Control 8 2.1 Basic Access Control Concept Overview. 8 2.2 Architecture 9 2.3 Encryption Keys . 10 2.3.1 EMM Keys. 10 2.3.2 Download Keys . 10 2.3.3 Cont

10、ent Keys. 10 2.3.4 Content Key Delivery 11 2.4 Signatures 12 2.5 Device Addressability. 12 2.5.1 Global Address 12 2.5.2 Unit Addresses 13 2.5.3 Group Addresses 13 2.6 Content Access Management 13 2.6.1 Channel Maps. 13 2.6.2 Service Access Authorization . 14 2.6.3 Service Access Process Flow. 14 3

11、Entitlement Management Messages. 16 3.1 EMM Carousels, Carousel Nesting and Group Usage 18 3.1.1 Address Priority. 18 3.1.2 EMM Descriptor Hierarchy 19 3.1.3 Provisioning Process 19 3.1.4 Global Group Address Usage. 22 3.1.5 Super Group EMM Address Usage 22 3.1.6 Unique EMM Address Usage 22 3.2 EMM

12、Descriptors 22 3.2.1 Software Download Command Descriptor 22 3.2.2 EAS Message Descriptor 24 3.2.3 Key Data Descriptor 26 3.2.4 Signature Data Descriptor. 26 3.2.5 Fingerprint Message Descriptor 27 3.2.6 Program Authorization Descriptor. 27 3.2.7 Group Assignment Descriptor. 28 3.2.8 FIPS Assignment

13、Descriptor 29 3.2.9 OSD Descriptor. 30 3.2.10 Key Index List Descriptor. 31 3.2.11 Operation Mask Descriptor 31 3.2.12 Service Mask Descriptor 32 RDD 10-2006 Page 4 of 100 pages 3.2.13 Bouquet Descriptor.33 3.2.14 Version Descriptor33 3.2.15 EMM Descriptor35 4 Software Download .35 4.1 EUE Device Up

14、grade Process 40 4.1.1 Headend/source Signature Server 40 4.1.2 EUE Resident Signature Client .40 4.1.3 EUE Resident Upgrade Agent push_command_set Interface .40 4.1.4 Headend/source Carousel Support for FORCED, NORMAL and BETA Images40 4.2 Upgrade Image Types and Policies .41 4.2.1 FORCED Image Typ

15、e .41 4.2.2 NORMAL Image Type .41 4.2.1 BETA Image Type .41 4.3 Upgrade Process Overview42 4.3.1 Pull Software Upgrade Process 42 4.3.2 Push Software Upgrade Process 42 4.3.3 Bootloader Upgrade Detection Process and Policies .44 4.3.4 Image Corruption Checking.45 4.4 Upgrade Scenarios.46 4.4.1 EUE D

16、elivered to a Customer/Enduser46 4.4.2 EUE Image Corruption .46 4.4.3 Critical/Immediate Upgrade46 4.4.4 Normal Release Upgrade.46 4.4.5 Beta Users Upgrade.47 4.5 Provisioning Messages.47 4.5.1 Two-Way IP Provisioning Descriptor.49 4.5.2 DDC Message Descriptor50 4.6 Module Delivery Protocol53 4.7 Up

17、grade Stream Format.56 4.8 Upgrade Image Encryption.56 4.9 Upgrade Authentication56 4.10 Upgrade Agent to SBS-Client Interface56 4.11 EUE Version Information Storage 58 4.12 Boot-time Software Validity Checking 59 4.13 Download Image Preparation.59 4.13.1 Module Packing Process61 4.13.2 Conversion o

18、f Packed Files to MPEG-2 Format 64 4.13.3 Module Signing.64 4.14 Provisioning Message Preparation.65 4.14.1 DDC Message Creation66 4.14.2 DDC Message Signing .69 4.14.3 Provisioning Message Descriptor Creation 70 4.14.4 Conversion of Provisioning Message to MPEG-2 Format72 5 EUE Fingerprint .72 5.1

19、Fingerprint Process 73 Annex A Part 177 Part 2 Navigation Data Specification . 78 RDD 10-2006 Page 5 of 100 pages List of Figures Part 1 Figure 1 Typical Cable BAC System Architecture . 8 Figure 2 Content Key Structure . 10 Figure 3 Association of Content Key to a Service . 11 Figure 4 Program Autho

20、rization Table Structure . 14 Figure 5 Channel Access Process Flow 15 Figure 6 Group and Message Relationship . 18 Figure 7 EMM Processing Flow . 21 Figure 8 SBS-Client Invocation 36 Figure 9 Module/Descriptor Relationship. 38 Figure 10 SBS-Client Upgrade Logic. 43 Figure 11 Module Creation Process

21、60 Figure 12 Provisioning Message Creation Process. 65 Figure 13 RF Fingerprint System. 73 Figure 14 EUE Challenge/Activation Process . 74 Figure 15 Digital Cable Appliance Location Audio Process at Reboot 75 RDD 10-2006 Page 6 of 100 pages 1 Scope The intent of this specification is to provide deta

22、iled system-level specifications for the basic access control subsystem and algorithms for application in both the source equipment and EUE devices. This technology is applicable wherever an MPEG-2 transport stream is used for content delivery. 1.1 Overview The purpose of the initiative, promoted by

23、 Sony, is to facilitate competition in an open marketplace by providing a means to deploy non-legacy source equipment, subscriber devices and services on existing legacy networks or distribution channels. The navigation data specification forms part of a tool kit allowing content owners and network

24、operators to implement a method for digitally distributing content that was previously analog and to optionally choose alternative CA vendors while still preserving legacy choices. Migration paths to up-grades are also possible. Having the capability to support the coexistence of multiple CA systems

25、 without the need for content replication can be a bandwidth saver in many installations. 1.2 All-Digital Content Carriage The enabled all-digital system implements a standards-based method to provide basic access control, to implement remote authorization and management of the EUE/receivers. This a

26、chieves the objective for centralized connection management, something that is common with network distribution and in the cable industry. The basic access control system can operate in conjunction with traditional 3rd party CA systems, thereby enabling open-market alternative devices to be employed

27、. 1.3 Reference Documents Unless a specific version or revision number is included, the following references are non-specific, and the latest version applies. 1 ISO/IEC 13818-1, Information Technology Generic Coding of Moving Pictures and Associated Audio Information: Systems Part 1: Systems, ISO, 4

28、/02 2 ETSI EN 300 468 v1.4.1 (2000-11), Digital Video Broadcasting (DVB); Specification for Service Information (SI) in DVB Systems 3 ETSI ETR 289 ed.1 (1996-10), Digital Video Broadcasting (DVB); Support for Use of Scrambling and Conditional Access (CA) within Digital Broadcasting Systems 4 Specifi

29、cation of the Macrovision Copy Protection Process for EUE/IRD Products, v7.1.S1, 1999, Macrovision Corporation 5 ETSI TS 103 197, Head-end Implementation of DVB Simulcrypt, v1.3.1 (2003-01) 6 ETSI EN 301 192, DVB Specification for Data Broadcasting, v1.3.1 (2003-05) 7 ANSI J-STD-042-2002, Emergency

30、Alert Message for Cable, American National Standards Institute, 12/3/02 8 FIPS PUB 180-2, Secure Hash Standard, Information Technology Laboratory, National Institute of Standards and Technology, August 1, 2002 9 FIPS PUB 198, The Keyed-Hash Message Authentication Code (HMAC), Information Technology

31、Laboratory, National Institute of Standards and Technology, March 6, 2002 RDD 10-2006 Page 7 of 100 pages 10 FIPS PUB 6-4, Counties and Equivalent Entities of the United States, Its Possessions and Associated Areas, National Institute of Standards and Technology, January 24, 2002 11 Fowler/Noll/Vo (

32、FNV) Hash, 12 EUI-48,http:/standards.ieee.org/regauth/index.html 1.4 Acronyms and Abbreviations ANI Automated Number Identification AV BOOLEAN key_phase; UINT64 content_keykey_index, 2; if (transport_scrambling_control = 10) key_phase = 0; else if (transport_scrambling_control = 11) key_phase = 1;

33、The maximum possible storage requirement for this structure is 1 MByte, though it is highly unlikely that a system would have 65,536 unique keys. The same content key shall be used for both audio, metadata and video elements of a particular service. The association of a particular key pair (even and

34、 odd phase) to a specific service is done through data contained in the table delivered through the program authorization descriptor, mapping a logical channel to a key_index value, which is then used to find the corresponding content key pair in the content key array. This relationship is illustrat

35、ed in Figure 3. The table containing the list of logical channels and the associated key indices shall also be securely stored in nonvolatile memory within the EUE. Figure 3 Association of Content Key to a Service The content keys may be delivered dynamically. The content key array structure shall b

36、e implemented as described above and could optionally be pre-loaded with static data as part of the software image downloaded to the device. For these elements, the content key array may be physically located in a different memory resource or a different portion of a memory resource. Likewise, the d

37、ata structure containing the logical_channel, key_index and service_mask values shall be a hardcoded table organized in the same manner as if a channel authorization descriptor had actually been received in an EMM. This data shall be embedded in the downloaded software image. The same caveats as ind

38、icated for the content key structure apply regarding storage of this structure. 2.3.4 Content Key Delivery Content key delivery is performed through the receipt of an EMM containing a valid key data descriptor. Content key data is organized as a table containing the pair of content key values coveri

39、ng both MPEG-2 encryption phases (even and odd). These content key pairs are associated with an index identifying a RDD 10-2006 Page 12 of 100 pages particular content key pair. The key data descriptor structure allows for the en masse replacement of the entire column of content keys in the table as

40、sociated with a particular encryption phase. A single descriptor cannot replace both the content keys in a particular key pair. Two independent messages must be sent to populate or refresh the entire content key table, one identified as associated with the even encryption phase and then one identifi

41、ed as associated with the odd encryption phase. The order of these messages is unimportant. Additionally, an optional third element may be employed to increase the level of indirection in transmitted data. The key index descriptor allows the key index to be transmitted separately from the program au

42、thorization table and the key data tables. This descriptor overwrites index data in the program authorization table and can be used to initially provision index data separately or to rekey a system solely through transmission of new indices without transmitting key data or program authorization tabl

43、es. The EMM carrying the complete indices for a program tier would be very small and is likely contained in a single packet, being 1/3 the size of the authorization table and at a minimum 1/4 the size of the key data table. The EUE device shall never alter or modify in any way the format or contents

44、 of the data structures containing the program authorization and the key data tables, except to apply the appropriate descriptor data from a validated EMM. The EUE device shall place the data received from the relevant EMM in the exact form and order into the storage structure and in no event sort o

45、r alter the order of entries in the table. It shall be incumbent upon the BAC system to provide the logical channel entries in the program authorization table in a sorted fashion. Each program authorization table and the key data table shall be transmitted in a complete form and shall replace any ex

46、isting table in its entirety. In practice, the key data message shall be used to update only the future content key, which would be the keys associated with the phase opposite of the one currently being used to encrypt content. This method allows background provisioning of authorized s with the cont

47、ent keys for the next epoch without any impact upon current device operation. 2.4 Signatures Electronic signatures shall be employed to authenticate entitlement messages and software download messages. The signature method employed is the published SHA-1 hash 8. This process produces a unique 160-bi

48、t condensed cryptographic checksum of the evaluated message or image. The hash value is then encrypted using a published algorithm (HMAC) Error! Reference source not found., but employing a secret key. The combination of the one-way hash and the secret encryption prevents both alteration of the orig

49、inal message or image and substitution of both content and a corresponding hash. The secret 512-bit key value used for EMMs shall be different from the value used for software download. 2.5 Device Addressability The basic access control system architecture provides a simple yet powerful method for addressing EUE devices based upon the EUI-48 f

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1