ImageVerifierCode 换一换
格式:PDF , 页数:17 ,大小:196.45KB ,
资源ID:1047045      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-1047045.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(SMPTE ST 430-1-2006 D-Cinema Operations Key Delivery Message.pdf)为本站会员(figureissue185)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

SMPTE ST 430-1-2006 D-Cinema Operations Key Delivery Message.pdf

1、 Table of Contents Page 1 Scope 3 2 Normative References 3 3 Glossary 3 4 Overview of the KDM (Informative). 4 4.1 Basic KDM Elements and D-Cinema Relationships. 4 4.2 XML Overview of the KDM . 6 5 Authenticated and Enencrypted Information. 6 5.1 Message Type 6 5.2 RequiredExtentions. 7 5.2.1 Receip

2、t . 7 5.2.2 CompositionPlaylisted 7 5.2.3 ContentTitleText. 7 5.2.4 ContentAuthenticalor (Optical). 8 5.2.5 AuthorizedDeviceInfo. 9 5.2.6 ContentKeysNotValidBefore 9 5.2.7 ContentKEysNotValidAfter. 10 5.2.8 LeyIDList 10 5.2.9 ForensicMarkFlagList (Optional) 10 5.3 NonCriticalExtensions. 11 6 Authent

3、icated and Excrypted Information. 11 6.1 EncryptedKey 12 6.1.1 KenInfo. 12 6.1.2 CipherData. 12 6.2 EncryptedData 13 7 Signature Information 13 Annex A Design Features and Secutiry Goals (Informative) 14 Annex B Bibliography (Informative) 15 Annex C XML Schema for KDM (Normative) 16 Page 1 of 17 pag

4、es SMPTE 430-1-2006 Copyright 2006 by THE SOCIETY OF MOTION PICTURE AND TELEVISION ENGINEERS 3 Barker Avenue, White Plains, NY 10601 (914) 761-1100 Approved October 3, 2006 SMPTE STANDARD D-Cinema Operations Key Delivery Message SMPTE 430-1-2006 Page 2 of 17 pages Foreword SMPTE (the Society of Moti

5、on Picture and Television Engineers) is an internationally recognized standards developing organization. Headquartered and incorporated in the United States of America, SMPTE has members in over 80 countries on six continents. SMPTEs Engineering Documents, including Standards, Recommended Practices

6、and Engineering Guidelines, are prepared by SMPTEs Technology Committees. Participation in these Committees is open to all with a bona fide interest in their work. SMPTE cooperates closely with other standards-developing organizations, including ISO, IEC and ITU. SMPTE Engineering Documents are draf

7、ted in accordance with the rules given in Part XIII of its Administrative practices. SMPTE Standard 430-1 was prepared by Technology Committee DC28. SMPTE 430-1-2006 Page 3 of 17 pages 1 Scope This specification defines a “Key Delivery Message” (KDM) for use in Digital Cinema (D-Cinema) systems. The

8、 KDM has been designed to deliver security parameters and usage rights between D-Cinema content processing centers (e.g. from post production to distribution, or from distribution to exhibition). The KDM carries fundamentally three information types: Content keys for a specified Composition Play Lis

9、t (CPL). Content key parameters primarily the permitted key usage date/time window. The Trusted Device List (TDL) which identifies equipment permitted to use the content keys. The KDM is based on the D-Cinema generic Extra-Theater Message (ETM) format ETM. It uses XML to represent the information ab

10、out the content decryption keys and TDLs, and provides security using standardized XML encryption and signature primitives. The KDM message uses X.509 digital certificates, specified in D-Cinema Digital Certificate, to provide authentication and trust. NOTE The brackets convention “” as used herein

11、denotes either a normative or informative reference. 2 Normative References The following standards contain provisions which, through reference in this text, constitute provisions of this standard. At the time of publication, the editions indicated were valid. All standards are subject to revision,

12、and parties to agreements based on this standard are encouraged to investigate the possibility of applying the most recent edition of the standards indicated below. KLV SMPTE 429-6-2006, D-Cinema Packaging MXF Track File Essence Encryption D-Cinema Digital Certificate SMPTE 430-2-2006, D-Cinema Oper

13、ations Digital Certificate ETM SMPTE 430-3-2006, D-Cinema Operations Generic Extra Theater Message Format RFC2253 Lightweight Directory Access Protocol (v3):UTF-8 String Representation of Distinguished Names, December 1997. See: http:/www.ietf.org/rfc/rfc2253.txt Time UTC, RFC 3339: Date and Time on

14、 the Internet: Timestamps. G. Klyne and C. Newman. Informational, July 2002. See: http:/ietf.org/rfc/rfc3339.txt UUID “A Universally Unique Identifier (UUID) URN Namespace” July 2005. See: http:/www.ietf.org/rfc/rfc4122.txt 3 Glossary The following paragraphs define the acronyms used in this standar

15、d. AES: Advanced Encryption Standard secret key algorithm. See FIPS-197. ASN.1: Abstract Syntax Notation 1. Base64: A printable encoding of binary data. See Base64. DES: Data Encryption Standard. See FIPS-46-3. ETM: Extra Theatre Message See ETM FIPS: Federal Information Processing Standards of NIST

16、. HMAC-SHA-1: Hash-based Message Authentication Code based on SHA-1. See FIPS-198. IETF: Internet Engineering Task Force standards group. SMPTE 430-1-2006 Page 4 of 17 pages IP: Internet Protocol. An IETF standard. ISO: International Standards Organization. KEK: Key Encrypting Key LE: Link Encrypter

17、. LD: Link Decrypter. MD: Media Decrypter. NIST: National Institute of Standards and Technologies. OAEP: Optimal Asymmetric Encryption Pattern. See PKCS1. RO: Rights Owner. RSA: Rivest Shamir Adleman public key algorithm. SE: Security Entity. Any Digital Cinema entity that performs cryptography. SHA

18、-1: Secure Hash Algorithm revision 1. See FIPS-180-2. SHA-256: Secure Hash Algorithm. See FIPS-180-2. SM: Security Manager. S/MIME: Secure Multipurpose Internet Mail Extensions. SPB: Secure Processing Block. TCP: Transmission Control Protocol. IETF standard for reliable bi-directional streams. TDES:

19、 Triple DES. See FIPS-43-3. TLS: Transport Layer Security protocol. See Rescorla. TMS: Theater Management System. X.509. A widely used and supported digital certificate standard. XML: Extensible Markup Language. 4 Overview of the KDM (Informative) 4.1 Basic KDM Elements and D-Cinema Relationships Th

20、is standard presents a specification for the Key Delivery Message (KDM) for use in a Digital Cinema (D-Cinema) system. The D-Cinema Key Delivery Message is normally sent: 1. Between a post-production system and a Distributor, or 2. Between a Distributor and a Theater facility. D-Cinema systems requi

21、re that content keys, key usage time window (key parameters) and “trusted equipment” information (Trusted Device List or TDL) be communicated to exhibition facilities. The KDM carries all the critical information required to enable content decryption according to a baseline interoperable security st

22、andard. The basic form of the KDM is shown in figure 1. Access to the full information payload of the KDM requires knowledge of the targeted recipients private key. Having this key, the legitimate recipient may unlock and validate both encrypted and plain text information contents carried. As is exp

23、lained further in the appropriate sections of this document, the structure of the KDM has been designed to allow this without the recipient having stores of root certificates. To preserve intended security, full KDM information access should only take place within a secure environment (e.g., within

24、a D-Cinema Secure Processing Block). KDMs can, however, be authenticated by insecure devices if such devices have copies of the root certificate of the entity that created and signed the KDM. The KDM uses XML to represent the information about content decryption keys and provides security using the

25、XML Encryption and Signature primitives. To facilitate efficient processing with hardware security chips, the KDM individually encrypts each content key (along with other information) with RSA, and is structured to allow KDMs to be processed by devices that have limited resources of physically secur

26、e memory. SMPTE 430-1-2006 Page 5 of 17 pages RecipientPublic KeyContent Keyse.g., When Pigs Will Fly II. It is strictly meant as a display hint to the user. The optional language attribute is an ISO 3166 language code and indicates the language used. If the language attribute is not present, the co

27、ntent of the field shall be English. SMPTE 430-1-2006 Page 8 of 17 pages Figure 3 KDMRequiredExtensions Element (Informative) 5.2.4 ContentAuthenticator (Optional) This field, if present, shall contain a certificate thumbprint (defined in D-Cinema Digital Certificate) that supports authentication of

28、 the content as an authorized version (e.g. through a Composition Playlist CPL). This field may be absent at the discretion of the KDM creator (who acts on behalf of the rights owner), but it is part of the RequiredExtentions elements because compliant receiving equipment is required to understand a

29、nd process it when present. SMPTE 430-1-2006 Page 9 of 17 pages INFORMATIVE NOTES 1 If this field is present, then it is intended that the recipient crosscheck the certificate chain for the signer of the CPL against this value. Specifically, one of the certificates in the signer chain of the CPL sho

30、uld have a certificate thumbprint that matches this field in the KDM. 2 This field facilitates the business requirement of allowing an exhibitor to show content produced by a wide range of studios without needing to have a business relationship with all those studios (e.g., without needing to know t

31、he root certificates for all studios). The exhibitor has a relationship with a set of distributors (and knows their root certificates), and the distributors in turn have relationships with studios. To support business flexibility, the ContentAuthenticator is not necessarily the thumbprint of the stu

32、dios root certificate. 3 Of course, nothing precludes an exhibitor from knowing the root certificates of specific studios and using those certificates as part of validating CPL. 5.2.5 AuthorizedDeviceInfo This item contains three elements as described below. INFORMATIVE NOTE This field is intended t

33、o support authorization of devices which process keys delivered by the KDM, or perform other security services related to content protected by those keys. The AuthorizedDeviceInfo field does not play any role in validating the KDM itself. This field facilitates the dual business requirements of (a)

34、allowing exhibition equipment to be implemented as multiple secure devices (e.g. image media block, sound media block, projector) and (b) allowing a rights owner to limit delivery of his content or keys to specific trustworthy devices. 5.2.5.1 DeviceListIdentifier This field shall contain a value un

35、iquely identifying a list of trusted equipment. It is a required member of the AuthorizedDeviceInfo structure. INFORMATIVE NOTE This field is an aid to management of device lists and tracking of updates to them. 5.2.5.2 DeviceListDescription (Optional) The DeviceListDescription parameter, where pres

36、ent, shall contain a human-readable title description of the device list, e.g. “Bigtown Multiplex facility equipment list updated June 20, 2006”. It is strictly meant as a display hint to the user. The optional language attribute is an ISO 3166 language code and indicates the language used. If the l

37、anguage attribute is not present, the content of the field shall be English. 5.2.5.3 DeviceList The DeviceList item shall contain a set of one or more certificate thumbprints See D-Cinema Certificate. INFORMATIVE NOTE Each entry typically represents a specific device which is authorized for use in c

38、onnection with some of the keys in this KDM. However, the normative behavior of receiving equipment is outside the scope of this standard. 5.2.6 ContentKeysNotValidBefore This field specifies the time before which the content keys contained in this KDM are not valid. The time shall be in the form of

39、 a Universal Coordinated Time timestamp as specified in RFC 3339. Timestamps shall not include fractional seconds. It is possible for a separate KDM to provide a different time window for the same keys (e.g., to allow a pre-view showing, or to extend an engagement). This is an informational field th

40、at is a copy of the definitive value that appears in the RSA protected EncryptedKey structure. It may be ignored by mechanisms that process the EncryptedKey field. The time windows of all content keys shall be the same in the RSA protected blocks. SMPTE 430-1-2006 Page 10 of 17 pages 5.2.7 ContentKe

41、ysNotValidAfter This field specifies the time after which the content keys contained in this KDM are not valid. The time shall be in the form of a Universal Coordinated Time timestampas specified in RFC 3339. Timestamps shall not include fractional seconds. It is possible for a separate KDM to provi

42、de a different time window for the same keys (e.g., to allow a pre-view showing, or to extend an engagement). This is an informational field that is a copy of the definitive value that appears in the RSA protected EncryptedKey structure. It may be ignored by mechanisms that process the EncryptedKey

43、field. The time windows of all content keys shall be the same in the RSA protected blocks. 5.2.8 KeyIdList This field shall contain an unordered list of one or more TypedKeyId elements, which are defined below. This is an informational field that is a copy of the definitive values that appear in the

44、 RSA protected EncryptedKey structures (see 6.1). It may be ignored by mechanisms that process the EncryptedKey field. 5.2.8.1 KeyId KeyIds are 128-bit UUIDs that shall be represented in “urn:uuid:” format when they appear as an XML value UUID. The KeyId parameter uniquely identifies the content dec

45、ryption key. All keys shall be for use with the same content (identified by the CompositionPlaylistId field). As shown below, it shall be used to identify the cryptographic key used in encrypting d-cinema assets, as defined by KLV. It shall be represented by a UUID UUID. 5.2.8.2 TypedKeyId A TypedKe

46、yId is a compound element consisting of a KeyType field and a KeyId. The KeyType shall be a string of characters, further constrained as described below. The KeyType distinguishes keys targeted to different types of devices (e.g. image media decryptor, sound media decryptor). The KeyID shall be as d

47、efined in 5.2.8.1. Binding a KeyType to each KeyId assists in defending against cross-system attacks. The KeyType element shall contain a symbol composed of four (4) characters from the set of 52 upper and lower case ASCII letters A-Z (0x41-0x5A) and a-z (0x61-0x7A). The KeyType element shall have a

48、n optional “scope” attribute, which shall be a URI value identifying the normative reference which defines the four character key type identifier contained within the element. The default value of the scope attribute shall be the URI value “http:/www.smpte-ra.org/430-1/2006/KDM#kdm-key-type”. Associ

49、ated with this URI is the following set of key type identifiers: INFORMATIVE NOTE Receiving equipment is contemplated to use the information in this field to restrict delivery of key information to devices which serve the intended D-Cinema roles. However, the normative behavior of receiving equipment is outside the scope of this document. 5.2.9 ForensicMarkFlagList (Optional) When present, this element shall contain an unordered list of one or more ForensicMarkFlag elements, which a

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1