ImageVerifierCode 换一换
格式:PDF , 页数:18 ,大小:260.47KB ,
资源ID:1047046      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-1047046.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(SMPTE ST 430-1-2017 D-Cinema Operations - Key Delivery Message.pdf)为本站会员(jobexamine331)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

SMPTE ST 430-1-2017 D-Cinema Operations - Key Delivery Message.pdf

1、 Table of Contents Page Foreword . 2 Intellectual Property 2 1 Scope 3 2 Normative References 3 3 Glossary 3 4 Overview of the KDM (Informative) . 4 4.1 Basic KDM Elements and D-Cinema Relationships 4 4.2 XML Overview of the KDM 6 5 Authenticated and Unencrypted Information 6 5.1 MessageType . 6 5.2

2、 RequiredExtentions 7 5.2.1 Recipient 7 5.2.2 CompositionPlaylistId . 7 5.2.3 ContentTitleText . 7 5.2.4 ContentAuthenticator (Optical). 8 5.2.5 AuthorizedDeviceInfo . 9 5.2.6 ContentKeysNotValidBefore 9 5.2.7 ContentKeysNotValidAfter . 10 5.2.8 KeyIDList 10 5.2.9 ForensicMarkFlagList (Optical) 11 5

3、.3 NonCriticalExtensions . 12 6 Authenticated and Encrypted Information . 12 6.1 EncryptedKey . 13 6.1.1 KenInfo . 13 6.1.2 CipherData . 13 6.2 EncryptedData . 14 7 Signature Information 14 Annex A Design Features and Security Goals (Informative) 15 Annex B XML Schema for KDM (Normative) 16 Bibliogr

4、aphy (Informative) 18 Page 1 of 17 pages SMPTE ST 430-1:2017 Revision of SMPTE 430-1:2006 SMPTE STANDARD D-Cinema Operations Key Delivery Message Approved January 12, 2017 Copyright 2017 by THE SOCIETY OF MOTION PICTURE AND TELEVISION ENGINEERS 3 Barker Avenue, White Plains, NY 10601 (914) 761-1100

5、SMPTE ST 430-1:2017 Page 2 of 18 pages Foreword SMPTE (the Society of Motion Picture and Television Engineers) is an internationally recognized standards developing organization. Headquartered and incorporated in the United States of America, SMPTE has members in over 80 countries on six continents.

6、 SMPTEs Engineering Documents, including Standards, Recommended Practices and Engineering Guidelines, are prepared by SMPTEs Technology Committees. Participation in these Committees is open to all with a bona fide interest in their work. SMPTE cooperates closely with other standards-developing organ

7、izations, including ISO, IEC and ITU. SMPTE Engineering Documents are drafted in accordance with the rules given in its Standards Operations Manual. SMPTE ST 430-1 was prepared by Technology Committee 21DC. Intellectual Property SMPTE draws attention to the fact that it is claimed that compliance wi

8、th this Standard may involve the use of one or more patents or other intellectual property rights (collectively, “IPR“). The Society takes no position concerning the evidence, validity, or scope of this IPR. Each holder of claimed IPR has assured the Society that it is willing to License all IPR it

9、owns, and any third party IPR it has the right to sublicense, that is essential to the implementation of this Standard to those (Members and non-Members alike) desiring to implement this Standard under reasonable terms and conditions, demonstrably free of discrimination. Each holder of claimed IPR h

10、as filed a statement to such effect with SMPTE. Information may be obtained from the Director, Standards e.g., When Pigs Will Fly II. It is strictly meant as a display hint to the user. The optional language attribute is an ISO 3166 language code and indicates the language used. If the language attr

11、ibute is not present, the content of the field shall be English. SMPTE ST 430-1:2017 Page 8 of 18 pages Figure 3 KDMRequiredExtensions Element (Informative) 5.2.4 ContentAuthenticator (Optional) This field, if present, shall contain a certificate thumbprint (defined in D-Cinema Digital Certificate)

12、that supports authentication of the content as an authorized version (e.g. through a Composition Playlist CPL). This field may be absent at the discretion of the KDM creator (who acts on behalf of the rights owner), but it is part of the RequiredExtentions elements because compliant receiving equipm

13、ent is required to understand and process it when present. SMPTE ST 430-1:2017 Page 9 of 18 pages Informative Notes: 1 If this field is present, then it is intended that the recipient crosscheck the certificate chain for the signer of the CPL against this value. Specifically, one of the certificates

14、 in the signer chain of the CPL should have a certificate thumbprint that matches this field in the KDM. 2 This field facilitates the business requirement of allowing an exhibitor to show content produced by a wide range of studios without needing to have a business relationship with all those studi

15、os (e.g., without needing to know the root certificates for all studios). The exhibitor has a relationship with a set of distributors (and knows their root certificates), and the distributors in turn have relationships with studios. To support business flexibility, the ContentAuthenticator is not ne

16、cessarily the thumbprint of the studios root certificate. 3 Of course, nothing precludes an exhibitor from knowing the root certificates of specific studios and using those certificates as part of validating CPL. 5.2.5 AuthorizedDeviceInfo This item contains three elements as described below. Inform

17、ative Note: This field is intended to support authorization of devices which process content keys delivered by the KDM, or perform other security services related to content protected by those content keys. The AuthorizedDeviceInfo field does not play any role in validating the KDM itself. This fiel

18、d facilitates the dual business requirements of (a) allowing exhibition equipment to be implemented as multiple secure devices (e.g. image media block, sound media block, projector) and (b) allowing a rights owner to limit delivery of his content or keys to specific trustworthy devices. 5.2.5.1 Devi

19、ceListIdentifier This field shall contain a value uniquely identifying a list of trusted equipment. It is a required member of the AuthorizedDeviceInfo structure. Informative Note: This field is an aid to management of device lists and tracking of updates to them. 5.2.5.2 DeviceListDescription (Opti

20、onal) The DeviceListDescription parameter, where present, shall contain a human-readable title description of the device list, e.g. “Bigtown Multiplex facility equipment list updated June 20, 2006”. It is strictly meant as a display hint to the user. The optional language attribute is an ISO 3166 la

21、nguage code and indicates the language used. If the language attribute is not present, the content of the field shall be English. 5.2.5.3 DeviceList The DeviceList item shall contain a set of one or more certificate thumbprints See D-Cinema Certificate. Informative Note: Each entry typically represe

22、nts a specific device which is authorized for use in connection with some of the keys in this KDM. However, the normative behavior of receiving equipment is outside the scope of this standard. 5.2.6 ContentKeysNotValidBefore This field specifies the time before which the content keys contained in th

23、is KDM are not valid. The time shall be 25 characters in the form of a Universal Coordinated Time timestamp as specified in RFC 3339 Time Section 5.6 date-time. Timestamps shall not include fractional seconds (RFC 3339 time-secfrac). Timestamps shall not use Z (Zulu) time zone offset notation. It is

24、 possible for a separate KDM to provide a different time window for the same content keys (e.g., to allow a pre-view showing, or to extend an engagement). SMPTE ST 430-1:2017 Page 10 of 18 pages This is an informational field that is a copy of the definitive value that appears in the RSA protected E

25、ncryptedKey structure. It may be ignored by mechanisms that process the EncryptedKey field. The time windows of all content keys shall be the same in the RSA protected blocks. 5.2.7 ContentKeysNotValidAfter This field specifies the time after which the content keys contained in this KDM are not vali

26、d. The time shall be 25 characters in the form of a Universal Coordinated Time timestamp as specified in RFC 3339 Time Section 5.6 date-time. Timestamps shall not include fractional seconds (RFC 3339 time-secfrac). Timestamps shall not use Z (Zulu) time zone offset notation. It is possible for a sep

27、arate KDM to provide a different time window for the same keys (e.g., to allow a pre-view showing, or to extend an engagement). This is an informational field that is a copy of the definitive value that appears in the RSA protected EncryptedKey structure. It may be ignored by mechanisms that process

28、 the EncryptedKey field. The time windows of all content keys shall be the same in the RSA protected blocks. 5.2.8 KeyIdList This field shall contain an unordered list of one or more TypedKeyId elements, which are defined below. This is an informational field that is a copy of the definitive values

29、that appear in the RSA protected EncryptedKey structures (see Section 6.1). It may be ignored by mechanisms that process the EncryptedKey field. 5.2.8.1 KeyId KeyIds are 128-bit UUIDs that shall be represented in “urn:uuid:” format when they appear as an XML value UUID. The KeyId parameter uniquely

30、identifies the content key. All keys shall be for use with the assets referenced by the Composition Playlist identified by the CompositionPlaylistId field. As shown below, it shall be used to identify the content key used in encrypting d-cinema assets, as defined by KLV. It shall be represented by a

31、 UUID UUID. 5.2.8.2 TypedKeyId A TypedKeyId is a compound element consisting of a KeyType field and a KeyId. The KeyType shall be a string of characters, further constrained as described below. The KeyType distinguishes keys targeted to different types of devices (e.g. image media decryptor, sound m

32、edia decryptor). The KeyID shall be as defined in Section 5.2.8.1. Binding a KeyType to each KeyId assists in defending against cross-system attacks. The KeyType element shall contain a symbol composed of four (4) characters from the set of 52 upper and lower case ASCII letters A-Z (0x41-0x5A) and a

33、-z (0x61-0x7A). The KeyType element shall have an optional “scope” attribute, which shall be a URI value identifying the normative reference which defines the four character key type identifier contained within the element. The default value of the scope attribute shall be the URI value “http:/www.s

34、mpte-ra.org/430-1/2006/KDM#kdm-key-type”. Associated with this URI is the following set of key type identifiers: Byte String (hexadecimal notation) Character String Description 4D.44.49.4B “MDIK” Image essence key 4D.44.41.4B “MDAK” Sound essence key 4D.44.53.4B “MDSK” Subtitle essence key 46.4D.49.

35、4B “FMIK” Image forensic marking key 46.4D.41.4B “FMAK” Sound forensic marking key SMPTE ST 430-1:2017 Page 11 of 18 pages Informative Note 1: Receiving equipment is contemplated to use the information in this field to restrict delivery of key information to devices which serve the intended D-Cinema

36、 roles. However, the normative behavior of receiving equipment is outside the scope of this document. The scope attribute with the value “http:/www.smpte-ra.org/430-1/2017/KDM#kdm-key-type“ shall be associated with the following KeyType values: Byte String (hexadecimal notation) Character String Des

37、cription 4D.44.58.31 “MDX1“ Aux Data Type 1 key 4D.44.58.32 “MDX2“ Aux Data Type 2 key Informative Note 2: The MDX1 and MDX2 values allow two distinct sets of security policies to be associated with essence carried in Aux Data Track Files (see ADTF), based on the nature of this essence. Specifically

38、, MDX1 is intended to signal that the plaintext essence (potentially forensically marked unless forensic marking is disabled per Section 5.2.9.1) is transmitted without restrictions within the exhibition environment. In contrast, MDX2 is intended to signal that the plaintext essence (potentially for

39、ensically marked unless forensic marking is disabled per Section 5.2.9.1) is transmitted over encrypted links within the exhibition environment. Conformance to these security policies is not specified here, and is left to other documents. The scope attribute with a value that conforms to the syntax

40、“http:/www.smpte-ra.org/430-1/2017/KDM#mic-key-type-ID“, where ID conforms to the lowercase UUID string representation specified in UUID, shall be associated with the following KeyType value: Byte String (hexadecimal notation) Character String Description 4D.44.4D.4B “MDMK“ MIC key The ID shall be e

41、qual to a KeyId value within the KeyIdList element. Informative Note 3: The MDMK key is intended to define the MICKey (see KLV) to be used in conjunction with the content key identifier by the UUID embedded in the scope attribute. EXAMPLE: MDMK identifies a MIC key associated with the content key wi

42、th KeyId “e5421139-0f4a-445e-bc1f-3018a2a858ab“. 5.2.9 ForensicMarkFlagList (Optional) When present, this element shall contain an unordered list of one or more ForensicMarkFlag elements, which are defined below. Each ForensicMarkFlag element in the list shall have a distinct value. 5.2.9.1 Forensic

43、MarkFlag A ForensicMarkFlag element shall contain a single URI value indicating whether forensic marking is to be used in conjunction with a particular KeyType contained in the KDM. The following table lists the forensic marking requirements defined by this standard: SMPTE ST 430-1:2017 Page 12 of 1

44、8 pages Forensic Mark Flags URI value Requirement http:/www.smpte-ra.org/430-1/2006/KDM#mrkflg-picture-disable Disable forensic marking in connection with keys of KeyType “MDIK” http:/www.smpte-ra.org/430-1/2006/KDM#mrkflg-audio-disable Disable forensic marking in connection with keys of KeyType “MD

45、AK” http:/www.smpte-ra.org/430-1/2017/KDM#mrkflg-mdx1-ID-disable Disable forensic marking in connection with key with KeyId equal to ID and of KeyType equal to “MDX1“ http:/www.smpte-ra.org/430-1/2017/KDM#mrkflg-mdx2-ID-disable Disable forensic marking in connection with key with KeyId equal to ID a

46、nd of KeyType equal to “MDX2“. ID in the table above shall conform to the lowercase UUID string representation specified in UUID and shall be equal to a KeyId value of the key to which the Forensic Mark Flag applies. EXAMPLE: http:/www.smpte-ra.org/430-1/2017/KDM#mrkflg-mdx1-dfc4c132-c318-44fd-a515-

47、d2a8075f4c5a-disable 5.3 NonCriticalExtensions This field is defined in ETM. Informative Note: This element may contain proprietary extensions. Conforming implementations should ignore the contents of this element. 6 Authenticated and Encrypted Information The AuthenticatedPrivate element is normati

48、vely defined in ETM. It is described here only to illustrate the use of this element for carrying encrypted keys in a KDM. This portion of the KDM is authenticated by the signature, and encrypted for the recipient before being transmitted. The word “private” appears in the XML label for this portion

49、, though this does not mean that the information is proprietary or vendor-specific. It means that through encryption only a specified recipient is allowed to view this information. The recipient performs standard XML decryption operations to recover the private information. The normative schema is defined in Annex B and the schema code snippet is illustrated in Figure 4. SMPTE ST 430-1:2017 Page 13 of 18 pages Figure 4 Authenticated and Private Portion of KDM (Informative) A

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1