ImageVerifierCode 换一换
格式:PDF , 页数:9 ,大小:259.57KB ,
资源ID:792892      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-792892.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ITU-R REPORT BT 2052-2005 Protection of end-users privacy in interactive broadcasting systems《在交互式广播系统的终端用户隐私保护》.pdf)为本站会员(王申宇)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ITU-R REPORT BT 2052-2005 Protection of end-users privacy in interactive broadcasting systems《在交互式广播系统的终端用户隐私保护》.pdf

1、 Rep. ITU-R BT.2052 1 REPORT ITU-R BT.2052*Protection of end-users privacy in interactive broadcasting systems (Question ITU-R 111/6) (2005) 1 Introduction Interactive broadcasting systems enable attractive services to end-users. On the other hand, the system offers the opportunity to collect inform

2、ation related to the end-user to the service provider or the other third party or parties, and to send a malicious program code to the receiver to malicious party or parties. To protect end-users privacy from potential threat, information to be protected and potential attack points in the interactiv

3、e broadcast chain should be clarified. In this Report, a detailed analysis of interactive broadcast systems is discussed with two principles below to clarify the problem of protection of end-users privacy: Free-to-air broadcasting services, even when including interactive elements, should be availab

4、le to the end-users without any need for a return channel connection. Any information of a personal nature is, by default, considered private. A privacy threat to a broadcast receiver with a return channel can potentially materialize as soon as a connection to a remote computer is established over t

5、he return channel. 2 Information to be protected Considering the second principle in the previous section, all data related to the user should be regarded as potentially sensitive. There are different kinds of user data such as: personal data, e.g. name, date of birth, personal profiles and preferen

6、ces; link data, e.g. address and telephone number, bank account or credit card number; data stored within the broadcast receiver, e.g. zapping history, return/interaction channel usage history, ID number; data stored outside the broadcast receiver, for a static receiver, e.g. return/interaction chan

7、nel usage history, for a mobile receiver, e.g. location data. This tells that protection of the end-users privacy can be achieved when all the elements affecting it in the interactive broadcast chain work properly. 3 Interactive broadcast system model In order to approach these questions, an analysi

8、s of threat to privacy infliction should be undertaken. Typical models for the interactive broadcast chain, with a unidirectional and bidirectional return channel, as illustrated in Figs. 1 and 2 respectively, are used for this analysis. *This Report is brought to the attention of ITU-T SG 9, ITU-T

9、SG 17 and ITU-D SG 2. 2 Rep. ITU-R BT.2052 FIGURE 1 Model for an interactive broadcast chain with a unidirectional return channel The receiver in Fig. 1 comprises the following components: (A) DeMUX/broadcast channel decrypter This is to descramble a broadcast signal that has been encrypted for cert

10、ain purposes such as pay-service or copy control of the broadcast content. Rep. ITU-R BT.2052 3 (B) Protocol handler/AV decoder This is to handle various broadcast protocols such as transport stream and carousel, etc. in a receiver and audio/video decoding. Data or messages other than audio/video si

11、gnals taken out of the received signal by this are passed to an appropriate part of subsequent processes. (C) Secure device This stores an end-users authorization information, including identification of the user and key(s) for descramble. Certification authority can track the end-users name, addres

12、s and telephone number, etc., through the identification number. (D) Processor/renderer This controls receiver behaviour instructed by both a broadcast content and a system program. (E) Storage This keeps information provided by the broadcast content, initial set-up, or user. Information provided by

13、 a user includes user profile such as name, age, sex, address, genre of interest of contents, etc. (F) Return channel encrypter This enciphers message(s) sent through a return channel. This could be optional. (G) Access point A point to connect a receiver to a communication network for return channe

14、l. To access the network, a receiver may require information to logon the network, e.g. user-id and password, or number to dial. A broadcast station provides the following components: (H) Multiplexer This combines broadcast services into a single stream and provides signalling information such as PS

15、I/SI. Service_id of each service is included in SI. (I) Broadcast channel encrypter This enciphers broadcast contents and provides key(s) information and control message(s) for a descrambler in a receiver. (J) Broadcast content server This feeds broadcast contents to a broadcast channel encrypter (I

16、). (K) Authoring system Interactive contents are authored by this system. Some contents may be renewed frequently to reflect end-user response derived from a communication server to the content. (L) Communication server This gathers responses of end-users. One possible use of these responses is to u

17、pdate the content. Gathered information or communication log may be stored if needed. (M) Return channel decrypter This deciphers incoming encrypted messages from receivers through return channel. This is a counterpart of encrypter provided in a receiver. 4 Rep. ITU-R BT.2052 FIGURE 2 Model for an i

18、nteractive broadcast chain with a bidirectional return channel NOTE 1 Multiple content providers using content server (K), authoring system (L), communication server (M) and encrypter/decrypter (N) or part of them may take part in establishing the interactive broadcast service. For example, addition

19、al audio/visual component fed through interaction channel is provided by a different provider from broadcaster. The actual structure of these components above depends upon the service. NOTE 2 The destination at provider side, i.e. broadcaster side, of the interaction channel depends upon the structu

20、re described in Note 1. A receiver in Fig. 2 comprises the following components: (A) Descrambler This is to descramble a signal that has been encrypted. In some cases, an encrypted signal may come from the interaction channel in addition to the broadcast channel. (B) Protocol stack No. 1 This is to

21、handle various broadcast protocols such as transport stream and carousel, etc. in a receiver. Data or messages taken out of a received signal by this are passed to an appropriate part of subsequent processes. Rep. ITU-R BT.2052 5 (C) Secure device This stores information regarding legality of an end

22、user to enjoy the services, including identification of the user and key(s) for descramble. Certification authority can track the end-users name, address, and telephone number, etc. through the identification number. (D) Processor/renderer This controls receiver behaviour instructed by both a conte

23、nt and a system program. (E) Storage This keeps information provided by the broadcast content, initial set-up, or user. Information provided by a user includes user profile such as name, age, sex, address, genre of interest of contents, etc. Information provided by the content may be some tags to ho

24、ld a state of the content, or to distinguish each receiver or user. (F) Encrypter/decrypter This enciphers and deciphers a signal sent and received through the interaction channel. This may not always be employed to all kinds of interaction channel. Authentication of the content from interaction cha

25、nnel may be applied here when using a different technique from authentication for broadcast channel applied with secure device (C). If the protocol in the interaction channel used to deliver a content to a receiver is the same as that in the broadcast channel, a received signal will be forwarded to

26、the descrambler (A). (G) Protocol Stack No. 2 This handles communication protocol used for the interaction channel. In case of Internet protocol, this holds the IP address. (H) Access point A point to connect a receiver to a communication network for the interaction channel. Physical connection to t

27、he access point varies by the interaction channel medium; telephone line for dial-up connection, Ethernet for broadband connection and base station for wireless connection including WiFi and cell phone network. A broadcast station comprises the following components: (I) Multiplexer (MUX) This combin

28、es broadcast services for broadcast channel into a single stream and provides signalling information such as PSI/SI. Service_id of each service is included in SI. (J) Scramble controller This scrambles broadcast contents for broadcast channel and provides key(s) information and control message(s) fo

29、r the descrambler (A) in a receiver. (K) Content server This routes components of the content such as data broadcast content, video or audio for transmission toward a receiver. When this receives a trigger or a request for transmission based on program timetable, all the components of the content at

30、 that time will be routed to the broadcast channel. When a request message for transmission comes through the interaction channel, requested component(s) of the content will be routed to the interaction channel. Selection of the components follows an incoming request message from the interaction cha

31、nnel, which is generated by the instruction of the content running on processor/browser (D) in a receiver, or by a system program of the receiver. 6 Rep. ITU-R BT.2052 (L) Authoring system Interactive content is authored by this system. Some content may be renewed frequently to reflect end-user resp

32、onses, or instantly created (“active content”) based on information of a sender of an incoming request message from the interaction channel derived from the communication server (M). (M) Communication server (M) This controls all the communication on the interaction channel including the establishme

33、nt of logical connection, transmission/reception of messages and logical disconnection. A typical example is a web server. This can gather end-users responses to the content as well. (N) Encrypter/decrypter (N) This enciphers and deciphers messages for the interaction channel. This is a counterpart

34、of encrypter/decrypter (F) in a receiver. 4 Consideration on personal information and its handling in the elements of the interactive broadcast chain Based on the two models described in the previous section, generated or stored information related to the end-users privacy and potential threat to it

35、 as a result of the process of the information is discussed below. 4.1 Receiver A receiver is a major source of private information in an interactive broadcast chain. Following information are examples kept in a secure device and/or storage, or created by a processor as a result of user interaction:

36、 Viewing history Return/interaction channel usage History of interactive operation Personal profiles and preferences ID number. In some interactive broadcast systems, the ID number is used for the purpose of content copy control even in free-to-air services. 4.2 Return channel The following aspects

37、of return channel characteristics and configuration are to be considered: 4.2.1 Return channel characteristic Non-disclosure of the channel specification This may help to protect the system including the end-users receiver from attack by malicious third party or parties. Communication operator In th

38、e case of employing IP in the interaction channel, protection of the DNS server may be one of the key actions to protect the end-users receiver from attack by malicious third party or parties. Rep. ITU-R BT.2052 7 IP address In general, a dynamic assignment of IP address (DHCP) by the Internet servi

39、ce provider (ISP) makes it difficult for the entity who owns a server to find out the relationship between IP address and personal information. But if the interaction channel is a broadband IP connection, the channel may be shared with other equipment, such as PCs using a broadband router. In the ca

40、se of using the router, a connection is established at all times and this may lead to keeping the same IP address even in a DHCP environment. This degrades anonymity of the end-user to the broadcaster. Improvement of anonymity of the end-user can be achieved by using a trustworthy proxy that has no

41、relationship to the content author/service provider. 4.2.2 Return channel configuration Telephone number of a caller In the case of using a telephone line for return channel, notifying this number to the destination leads to giving an opportunity to the service or content provider to collect informa

42、tion about who responds to it. Network configuration for broadband IP connection In the case of using a broadband IP communication network such as DSL, optical fibre and WiFi, the gateway device at the access point should be configured properly. If a broadband router installed near the receiver is n

43、ot configured properly, this may be a possible hole to probe the activity of return channel communication. If a WiFi channel is not configured securely enough, attackers will monitor the traffic and obtain important parameters such as the nearest DNS server address. This may result in a takeover of

44、the DNS server and a fake DNS server will subsequently lead the connection to the improper server. 4.3 Content/service provider The following aspects are to be taken into account concerning the information exchange between the content/service provider and the receiver: Authentication When transmitti

45、ng information from the receiver to the content author/service provider, authentication carried out by the receiver is important to prevent the establishment of a connection to a fake server. Such a server is considered malicious, thus transmitted information will be monitored, stored and consumed f

46、or unintended purpose by the malicious party or parties. The seriousness of this attack depends on the choice of return channel; an IP connection is considered more vulnerable than a direct connection to such a server using a telephone line. In the bidirectional return channel model illustrated in F

47、ig. 2, the communication server (M) should be authenticated properly by a receiver when the interaction channel is used as a “forward” channel. Authentication of a receiver may also be needed with the same reason why a scramble controller (J) and descrambler (A) pair is used. Without the authenticat

48、ion of communication server (M), a malicious code can be transmitted to the receiver by pretence. In other words, a fake server will deliver a malicious code to the receiver. A takeover of DNS (Domain Name System) server near the receiver makes this activity possible. The encrypter/decrypter pair (F

49、) and (N) is in charge of authentication in the interaction channel. When using the same authentication technique of the broadcast channel, an incoming signal from the interaction channel should be forwarded to the descrambler (A). 8 Rep. ITU-R BT.2052 IP address In general, a communication using IP often makes a record of access in a server, e.g. access log. In Fig. 1, the communication server (M) is in charge of it. This keeps the date, time and IP address of an entity that has made a connection and, in some cases, the file name that has bee

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1