ImageVerifierCode 换一换
格式:PDF , 页数:32 ,大小:311.94KB ,
资源ID:541362      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-541362.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ATIS 0800024-2009 Security Robustness Rules Interoperability Specification.pdf)为本站会员(eastlab115)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ATIS 0800024-2009 Security Robustness Rules Interoperability Specification.pdf

1、 ATIS-0800024 SECURITY ROBUSTNESS RULES INTEROPERABILITY SPECIFICATION The Alliance for Telecommunication Industry Solutions (ATIS) is a technical planning and standards development organization that is committed to rapidly developing and promoting technical and operations standards for the communic

2、ations and related information technologies industry worldwide using a pragmatic, flexible and open approach. Over 1,100 participants from over 300 communications companies are active in ATIS 22 industry committees and its Incubator Solutions Program. Notice of Disclaimer the entity whose Content is

3、 being Protected. 3.1.9 Content Protection: A combination of Access Control and Copy Control. 3.1.10 Content Provider: An entity that is either a Content Issuer or a Rights Issuer. 3.1.11 Content Subscription: A subscription that a User has with a Content Provider for the purposes of paying for Prot

4、ected Content purchased from that Content Provider and played on a Users Device. 3.1.12 Copy: To make a perfect reproduction of DRM Content or Rights. 3.1.13 Copy Control: The enforcement of conditions under which copyrighted content can be copied. Copy Control is one part of Content Protection. 3.1

5、.14 Copy Protection: A mechanism used to protect content from being copied in an unauthorized manner via analog and/or digital IPTV Receiving Device interfaces. Copy Protection is a combination of Access Control and Copy Control. ATIS-0800024 5 3.1.15 Cryptographically Robust: This term cryptographi

6、cally robust is often used to describe an encryption algorithm and implies, in comparison to some other algorithm (which is thus cryptographically weaker), greater resistance to attack. 3.1.16 Device: A Device is the entity (hardware/software or combination thereof) within a users equipment that imp

7、lements a DRM Client. The Device is also conformant to the specifications of the DRM it supports. 3.1.17 DRM: A collection of technologies that technically enable the definition of and the enforcement of secure content transportation as well as secure content licensing, including: Protection and con

8、trol of the viewing of content that is delivered over IP transport. Rights Management for the delivered content. 3.1.18 DRM Client: The entity in the Device that manages Permissions for Content and Media Objects on the Device. 3.1.19 Entitlement: Information about the authorization level/s a user ha

9、s to access and use certain services and to access, use, copy, and distribute certain contents received in his/her IPTV Receiving Device. 3.1.20 Integrity: The property that data (Contents, Rights, etc.) has not been altered or destroyed in an unauthorized manner. 3.1.21 IPTV Device: IPTV Receiving

10、Device or server-side devices or equipment. 3.1.22 IPTV Receiving Device: IPTV Terminal Function (ITF) and Delivery Network Gateway (DNG) as defined in ATIS-0800002, IPTV Architecture Requirements, represents the functionality within the consumer network that is responsible for terminating the IP si

11、gnal and converting the content into a renderable format (e.g., a STB). 3.1.23 ISS/A: The part of the ISS toolkit that deals with authentication functionality. See ATIS-0800014, Secure Download and Messaging Interoperability Specification. 3.1.24 ISS/E: The part of the ISS toolkit that deals with co

12、nfidentiality functionality. See ATIS-0800014, Secure Download and Messaging Interoperability Specification. 3.1.25 ISS/S: The part of the ISS toolkit that deals with content scrambling. See ATIS-0800006, IIF Default Scrambling Algorithm. 3.1.26 Key Management: All of the provisions made in a secure

13、 IPTV system, which are related to the generation, transport, exchange, storage, safeguarding, use, revocation, and renewing of cryptographic keys. 3.1.27 Message Integrity: The quality of a transmitted message, such that its recipient can be assured that the contents of the message have not been ta

14、mpered with or altered since the time it was transmitted by the sender. One common approach is to use a one-way hash function that combines all of the bytes in the message to produce a message digest that is impossible to reverse, and then make a digital signature of this hash value by the sender. A

15、nother method involves combining message bytes with a key value known only to the sender and recipient in a hash function. 3.1.28 Native Security Solution: The hardware and software present at manufacturing time, designed to secure the execution environment of an IPTV Receiving Device. 3.1.29 Privac

16、y: Confidentiality of user viewership and interactions with IPTV systems. 3.1.30 Protected Content: Media Objects that are consumed according to a set of Permissions in a Rights Object. ATIS-0800024 6 3.1.31 Revoke: A Device has been Revoked by a particular Rights Issuer if that Rights Issuer has de

17、cided it does not wish to issue Rights Objects to that Device (for example, because it has concerns about the robustness of the Devices implementation). 3.1.32 Rights: The ability to perform a pre-defined set of utilization functions on a content item. These utilization functions are the permissions

18、 (e.g., to view/hear, copy, modify, record, excerpt, sample, translate in another language, keep for a certain period, distribute), constraints (e.g., play/view/hear multiple times, play/view/hear certain number of hours), and obligations (e.g., payment, tracking information) that apply to the conte

19、nt and provide liberty of use granted to the end-user. 3.1.33 Rights Expression: The statement of utilization functions that can be performed on a Content Item and the conditions in which they can be performed. 3.1.34 Rights Holder: Indicates the entity that is entitled to grant rights. 3.1.35 Separ

20、able Security Element: The module providing operator based conditional access, which is not an integral part of the IPTV Receiving Device at manufacture time. 3.1.36 Server-Side Middleware: This is the system external to the Server-Side DRM System that is interacting with the Server-Side DRM System

21、to facilitate the delivery of secure content to the IPTV Receiving Device. 3.2 Acronyms and 2) keys cannot be directly read by hardware means. Part of the mitigation strategy of this vulnerability is complying with the robustness rules described in this document. The next figure shows the attack tre

22、e for content theft by impersonating a valid IPTV Receiving Device. ATIS-0800024 12 ContentTheftContentSplicingCapture Clear ContentDecrypt Encrypted ContentDuplicate IPTV Receiving Device with key informationDeter any duplicate IPTV Receiving Devicesby providing robustnessUse ofRevokedCertificateFi

23、gure 6: IPTV Receiving Device Content Theft - Duplicate Device with key information - Attack Tree Part of the mitigation strategy of this vulnerability may also involve various levels of tamper proofing. ContentTheftContentSplicingCapture Clear ContentDecrypt Encrypted ContentDuplicate IPTV Receivin

24、g Device with key informationUse revocation status-checking services(OCSP/CRL)Use ofRevokedCertificateFigure 7: IPTV Receiving Device Content Theft Use of Revoked Certificate - Attack Tree ATIS-0800024 13 4.2.1.2 Service Theft Service theft involves the viewing of video content which the attacker ha

25、s not paid for; the next figure shows this attack tree. This service theft vulnerability has three attack branches that are decomposed in further figures: IPTV Receiving DeviceContentTheftInformationTheftServiceTheftServiceDisruptionAddEMMsIgnore EMM removalDuplicate IPTV Receiving DeviceFigure 8: I

26、PTV Receiving Device - Service Theft - Attack Tree The next figure shows the attack tree for service theft by manipulating EMMs. This attack tree has three more sub-branches as shown: ATIS-0800024 14 ServiceTheftManipulateEMMsIgnore EMM removalDuplicate IPTV Receiving DeviceSend ForgedEMMsRe-send Co

27、piedEMMsAdd entitlements by manipulating softwareSolution proprietaryTo DRM systemUse secure time sourceSecure Execution EnvironmentUse of revoked CertificatesFigure 9: IPTV Receiving Device - Service Theft - Manipulate EMMs - Attack Tree In the above attack tree, a single mitigation strategy may no

28、t be sufficiently robust, and multiple mitigation measures may be required. The next figure shows the attack tree for service theft by failure to ignore EMM removal: ATIS-0800024 15 ServiceTheftManipulateEMMsIgnore EMM removalDuplicate IPTV Receiving DeviceDRM specific solutionsUse of revoked certif

29、icatesFigure 10: IPTV Receiving Device - Service Theft - Ignore EMM removal - Attack Tree In the above attack tree, a single mitigation strategy may not be sufficiently robust and multiple mitigation measures may be required. The next figure shows the attack tree for service theft by the presence of

30、 a duplicate IPTV Receiving Device: ServiceTheftAddEMMsIgnore EMM removalDuplicate IPTV Receiving DeviceDeter and detect duplicate IPTV Receiving Device and deny serviceUse of revokedcertificatesFigure 11: IPTV Receiving Device - Service Theft - Duplicate Device - Attack Tree ATIS-0800024 16 Part of

31、 the mitigation strategy of this vulnerability may also involve various levels of tamper proofing. Detection of duplicate devices can be very difficult for devices with one-way links. Detection would likely be possible only for 2-way devices. 4.2.1.3 Information Theft Service refers to initial deliv

32、ery of content to IPTV Receiving Device. Information theft involves the acquisition of information about subscribers which the attacker is not entitled to. The next figure shows the information theft attack tree. This attack tree has four more sub-branches as shown: InformationTheftCapturesubscriber

33、s personal detailsCapture subscribers information fromcommunicationpathsSecuresubscribers personal infowhile stored Securesubscribersinformation duringtransportFigure 12: IPTV Receiving Device - Information Theft - Attack Tree In the above attack tree, a single mitigation may not be sufficiently rob

34、ust and multiple mitigation measures may be required. 4.2.1.4 Service Disruption Service Disruption involves either denying rightful access to services or making the experience poor. The next figure shows the attack tree for service disruption. This attack tree has three more sub-branches as shown.

35、4.2.1.4.1 Rogue Network Disruption Rogue network device sends offending code to headend, which sends code to all other devices and creates disruption of service. Mitigation is accomplished through authentication and secure execution of all downloads. ATIS-0800024 17 Service DisruptionDuplicate IPTV

36、ReceivingDeviceBroadcast EMM removalBroadcast channel change/leaveProvide deviceidentity uniquenessand protection DRMspecificDisallow IGMPFor other IPsAuthenticateIGMPmessagesRogue networkdevice placesoffending codeon serversAuthenticatedownloads and SecurelyexecuteFigure 13: IPTV Receiving Device -

37、 Service Disruption - Attack Tree This classic denial of service (DOS) attack is another vulnerability that must be mitigated. In the above attack tree, a single mitigation method may not be sufficiently robust and multiple mitigation measures may be required. 4.3 Threats to IPTV Devices 4.3.1 Threa

38、ts to Outputs and Paths Decrypted IPTV content data should not be available on outputs other than those intended by the design of the IPTV Receiving Device (e.g., viewing screen). For devices that have multiple components that are connected via user-accessible connectors or buses, confidentiality pr

39、otection needs to encompass such connections. In other words, confidential data such as DRM-related keys cannot be present on any user-accessible bus in unencrypted form, whether the data is in memory or in transit, including transit within the device. The definition of a user-accessible bus should

40、be defined by a trust authority and is therefore out of the scope of this document. 4.3.2 Device Information Integrity The identity of the IPTV Receiving Device, as defined at the time of manufacturing and recorded in device certificate, must be unique and protected from modification. This means the

41、 device identity in the certificate subject name is unique to the pool of all IPTV devices. Although not a direct security robustness requirement, the identities included within ATIS device certificates and all other identities required for the network to authenticate, recognize, and authorize the d

42、evice for ATIS-defined services must be unique. For instance, this could be accomplished by ATIS-0800024 18 establishing an IPTV Receiving Device identity naming convention in which the identity can be formed as a combination of a company- or organization-unique ID and a device-unique ID. 4.4 Genera

43、l Scope of Robustness Rules In order to address the threat analysis of the preceding sections, security robustness rules may be developed, and should consider, at the least, the following capabilities: Accurate identification of a valid IPTV Receiving Device. Tamper evidence and/or resistance. Prote

44、ction of content in motion and at rest. Enforcement of content authorization. Security renewability. 5 DESIGN FOR INTEROPERABILITY This section describes the IPTV Security Solution Interoperability Specification for the Security Robustness Rules. 5.1 Secure Execution Environment Elements The element

45、s that comprise a SEE are as follows: 1) Execution Engine 2) Storage 3) Trusted Paths 4) Algorithms 5) Secure Time Generation 6) Physical Security Any specific instance of a SEE will have a combination of different robustness levels of the above elements, and thus, this document specifies several le

46、vels of SEE robustness in section 5.2. 5.1.1 Execution Engine The execution engine is the computing element that performs the security functions embodied in the SEE. 5.1.2 Storage SEE storage consists of both the volatile and non-volatile memory used to implement the security functionality. There ar

47、e at least two ways to protect information while in this storage: 1) Use hardware-based secure memory protection, enabling the hardware to provide a proprietary method for memory protection without performing encryptions. ATIS-0800024 19 2) In the case of a lack of hardware-based secure memory prote

48、ction, reliance can be made on a unique, per-device secret that is protected by hardware and is used to encrypt all the other values to be protected and then decrypt them when needed. 5.1.3 Trusted Paths Trusted paths consist of all input and output ports from the SEE as well as all communication in

49、terfaces internal to the SEE. 5.1.4 Physical Security Physical security, as defined in FIPS 140-2 7, is the external indication that an attempt has been made to compromise a cryptographic module (i.e., the SEE) and possibly includes the capability of responding to that compromise attempt. In this document, physical security levels are described as follows: Low Physical Security: Having only the ability to show local evidence of tampering. High Physical Security: Having the ability to show local evidence of tamper

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1