ImageVerifierCode 换一换
格式:PDF , 页数:26 ,大小:1.07MB ,
资源ID:798589      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-798589.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ITU-T J 1011-2016 Embedded common interface for exchangeable CA DRM solutions Architecture definitions and overview (Study Group 9)《多CA DRM解决方案的嵌入式通用接口 架构 定义和概述(研究组9)》.pdf)为本站会员(王申宇)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ITU-T J 1011-2016 Embedded common interface for exchangeable CA DRM solutions Architecture definitions and overview (Study Group 9)《多CA DRM解决方案的嵌入式通用接口 架构 定义和概述(研究组9)》.pdf

1、 1. I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T J.1011 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (09/2016) SERIES J: CABLE NETWORKS AND TRANSMISSION OF TELEVISION, SOUND PROGRAMME AND OTHER MULTIMEDIA SIGNALS Conditional access and protection Exchangeable embedd

2、ed conditional access and digital rights management solutions Embedded common interface for exchangeable CA/DRM solutions; Architecture, definitions and overview Recommendation ITU-T J.1011 Rec. ITU-T J.1011 (09/2016) i Recommendation ITU-T J.1011 Embedded common interface for exchangeable CA/DRM so

3、lutions; Architecture, definitions and overview Summary Recommendation ITU-T J.1011 specifies an architecture for exchangeable, embedded conditional access/digital rights management or CA/DRM solutions, enabling consumer premises equipment (CPE), which are capable of receiving broadcast and broadban

4、d content, to download CA/DRM clients under a trusted environment. By utilizing a downloadable multi-CA/DRM service, entitled consumers can consume broadcast and broadband content, which is controlled by digital rights management (DRM) and/or CA systems, even though a CPE does not have a required co

5、ntent-related CA/DRM client available, by downloading it from a trusted source into various types of CPEs including set-top boxes (STBs), smart TVs, PCs, smart phones and/or smart tablets. History Edition Recommendation Approval Study Group Unique ID* 1.0 ITU-T J.1011 2016-09-02 9 11.1002/1000/12773

6、 Keywords CA/DRM, exchangeable embedded common interface, retail CPE. * To access the Recommendation, type the URL http:/handle.itu.int/ in the address field of your web browser, followed by the Recommendations unique ID. For example, http:/handle.itu.int/11.1002/1000/11830-en. ii Rec. ITU-T J.1011

7、(09/2016) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of telecommunications, information and communication technologies (ICTs). The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsibl

8、e for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T

9、study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered by the procedure laid down in WTSA Resolution 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative ba

10、sis with ISO and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate both a telecommunication administration and a recognized operating agency. Compliance with this Recommendation is voluntary. However, the Recommendation may contain certain mandator

11、y provisions (to ensure, e.g., interoperability or applicability) and compliance with the Recommendation is achieved when all of these mandatory provisions are met. The words “shall“ or some other obligatory language such as “must“ and the negative equivalents are used to express requirements. The u

12、se of such words does not suggest that compliance with the Recommendation is required of any party. INTELLECTUAL PROPERTY RIGHTSITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right. ITU takes no

13、 position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recommendation, ITU had not received notice of intellectual property,

14、protected by patents, which may be required to implement this Recommendation. However, implementers are cautioned that this may not represent the latest information and are therefore strongly urged to consult the TSB patent database at http:/www.itu.int/ITU-T/ipr/. ITU 2017 All rights reserved. No p

15、art of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. Rec. ITU-T J.1011 (09/2016) iii Table of Contents Page 1 Scope . 1 2 References . 1 3 Definitions 1 3.1 Terms defined elsewhere 1 3.2 Terms defined in this Recommendation . 1 4 Abbreviati

16、ons and acronyms 2 5 Conventions 3 6 Architecture for exchangeable, embedded CA/DRM solutions . 3 6.1 General remarks 3 6.2 The technical concept of the ECI system . 5 7 Trust environment . 11 7.1 Necessary operational workflows . 12 Appendix I Implementation of an ECI-compliant trust system 15 Bibl

17、iography. 17 iv Rec. ITU-T J.1011 (09/2016) Introduction Service and content protection realized by conditional access (CA) and digital rights management (DRM) are essential in the rapidly developing area of digital broadcast and broadband, including content, services, networks and customer premises

18、 equipment (CPE), to protect business models of content owners, network operators and PayTV operators. While conceptually CA focuses on mechanisms to access protected content distributed by a service provider over a network, DRM originally describes type and extent of the usage rights, according to

19、the subscribers contract. PayTV operators have established digital TV platforms, which implement standards for basic functions, extended with proprietary elements. Most CA and DRM systems used for classical digital broadcasting, Internet protocol television (IPTV) or new over-the-top (OTT) services

20、capture consumer premises equipment (CPE) by binding it with proprietary security related elements. As a result, consumer premises equipment configured for use in network or platform A cannot be used in network or platform B or vice versa. Thus, the consumer electronics market for digital TV is stil

21、l fragmented, as specifications differ not only per country, but also per platform. Detachable CA/DRM modules only offer a partial solution; the modules are again proprietary to the CA/DRM system, they are not cheap either and they are used primarily for cable or satellite TV and are not usable in m

22、odern-type equipment such as tablets due to lack of appropriate physical interfaces. Currently implemented solutions, whether embedded or as detachable hardware, result in “lock-in“ effects. This seriously restricts the freedom of many players in digital multimedia content markets. Due to technologi

23、cal advances, innovative, software-based CA/DRM solutions become feasible. Maximizing interoperability while maintaining a high level of security, they promise to meet upcoming demands in the market, allow for new businesses, and broaden consumer choice. It is in consumers interest that they are abl

24、e to continue using the CPEs they bought e.g., after a move or a change of network provider or even utilize devices for services of different commercial video portals. This can only be achieved by interoperability of CPEs regarding CA and DRM, based on an appropriate security architecture. Further f

25、ragmentation of the market for CPEs can only be prevented and competition encouraged by ensuring a consumer-friendly and context-sensitive exchangeability of CA and DRM systems. Rec. ITU-T J.1011 (09/2016) 1 Recommendation ITU-T J.1011 Embedded common interface for exchangeable CA/DRM solutions; Arc

26、hitecture, definitions and overview 1 Scope The object of this Recommendation is to specify functional entities of an architecture for an exchangeable, embedded common interface, in order to download any necessary CA/DRM system to CPE. The download process is operated under a trusted environment and

27、 enables the consumption of protected content delivered via broadcast and/or broadband connections with various types of terminal equipment in line with the acquired content rights of the end user. This Recommendation is one in a series of Recommendations, specifying the whole embedded common interf

28、ace (ECI) eco-system. 2 References The following ITU-T Recommendations and other references contain provisions which, through reference in this text, constitute provisions of this Recommendation. At the time of publication, the editions indicated were valid. All Recommendations and other references

29、are subject to revision; users of this Recommendation are therefore encouraged to investigate the possibility of applying the most recent edition of the Recommendations and other references listed below. A list of the currently valid ITU-T Recommendations is regularly published. The reference to a d

30、ocument within this Recommendation does not give it, as a stand-alone document, the status of a Recommendation. ETSI GS ECI 001-1 ETSI GS ECI 001-1 (2014), Embedded Common Interface for exchangeable CA/DRM solutions (ECI); Part 1: Architecture, Definitions and Overview. ETSI GS ECI 001-2 ETSI GS ECI

31、 001-2 (2014), Embedded Common Interface (ECI) for exchangeable CA/DRM solutions; Part 2: Use cases and requirements. 3 Definitions 3.1 Terms defined elsewhere None. 3.2 Terms defined in this Recommendation This Recommendation defines the following terms: 3.2.1 advanced security: Function of an ECI

32、compliant CPE which provides enhanced security functions (hardware and software) for an ECI client. Note that the details are specified in b-ETSI GS ECI 001-5. 3.2.2 ECI (embedded CI): The architecture and the system specified in the ETSI ISG “embedded CI“, which allows the development and implement

33、ation of software-based swappable ECI clients in customer premises equipment (CPE) and thus provides interoperability of CPE devices with respect to ECI. 3.2.3 ECI client (embedded CI client): Implementation of a CA/DRM client which is compliant with the embedded CI specifications. Note that it is t

34、he software module in a CPE which provides all means to receive, in a protected manner and to control execution of a consumers entitlements and rights concerning the content that is distributed by a content distributor or operator. It also 2 Rec. ITU-T J.1011 (09/2016) receives the conditions under

35、which a right or an entitlement can be used by the consumer and the keys to decrypt the various messages and content. 3.2.4 ECI client loader: Software module part of the ECI host which allows downloading, verification and installation of new ECI client software in an ECI container of the ECI host.

36、3.2.5 ECI container (embedded CI container): Abstract concept which provides an isolated environment comprised of a virtual machine and a single ECI client. 3.2.6 ECI host: Hardware and software system of a CPE, which covers ECI related functionalities and has interfaces to an ECI client. Note that

37、the ECI host is one part of the CPE firmware. The ECI host is responsible for ensuring the isolation of each ECI container and provides authenticated loading of ECI clients. 3.2.7 ECI host loader: Software module which allows downloading, verification and installation of (new) ECI host software into

38、 a CPE. Note that in a multi-stage loading configuration this term is used to refer to all security critical loading functions involved in loading the ECI host. 3.2.8 trust authority (TA): Organization governing all rules and regulations that apply to implementations of ECI. Note that the trust auth

39、ority has to be a legal entity to be able to achieve legal claims. The trust authority needs to be impartial to all players in the downloadable CA/DRM ecosystem. 3.2.9 trusted third party (TTP): Technical service provider which issues certificates and keys to compliant manufacturers of the relevant

40、components of an ECI-system under control of the trust authority (TA). 4 Abbreviations and acronyms This Recommendation uses the following abbreviations and acronyms: API Application Programming Interface CA Conditional Access CENC Common Encryption CI Common Interface CPE Customer Premises Equipmen

41、t DRM Digital Rights Management DVB Digital Video Broadcasting ECI Embedded Common Interface HD High Definition HTTP Hypertext Transfer Protocol iDTV integrated Digital TV IP Internet Protocol IPTV Internet Protocol Television LA License Agreement MPEG Motion Picture Experts Group OS Operating Syste

42、m OSD On Screen Display OTT Over-The-Top Rec. ITU-T J.1011 (09/2016) 3 PIN Personal Identification Number PVR Personal Video Recorder ROM Read Only Memory SI Service Information STB Set-Top Box TA Trust Authority TTP Trusted Third Party TV Television UI User Interface VM Virtual Machine 5 Convention

43、s In this Recommendation: The keywords is required to indicate a requirement which must be strictly followed and from which no deviation is permitted if conformance to this Recommendation is to be claimed. The keywords is recommended indicate a requirement which is recommended but which is not absol

44、utely required. Thus this requirement need not be present to claim conformance. The keywords is prohibited from indicate a requirement which must be strictly followed and from which no deviation is permitted if conformance to this Recommendation is to be claimed. The keywords can optionally indicate

45、 an optional requirement which is permissible, without implying any sense of being recommended. This term is not intended to imply that the vendors implementation must provide the option and the feature can be optionally enabled by the network operator/service provider. Rather, it means the vendor m

46、ay optionally provide the feature and still claim conformance with the specification. In the body of this Recommendation and its annexes, the words shall, shall not, should, and may sometimes appear, in which case they are to be interpreted, respectively, as is required to, is prohibited from, is re

47、commended, and can optionally. The appearance of such phrases or keywords in an appendix or in material explicitly marked as informative are to be interpreted as having no normative intent. 6 Architecture for exchangeable, embedded CA/DRM solutions 6.1 General remarks ECI architecture, definitions a

48、nd overview, as covered by this framework Recommendation, is part of a multi-part standard specifying a system architecture for general purpose, software-based, embedded and exchangeable CA/DRM systems which would be the most appropriate and future-proof solution for overcoming market fragmentation

49、and enabling interoperability. Key benefits of the envisaged approach for content security are: Flexibility and scalability due to software-based implementation Exchangeability fostering future-proof solutions and enabling innovation Applicability to content distributed via broadcast and broadband, including OTT Support of multi-screen environment 4 Rec. ITU-T J.1011 (09/2016) Stimulation of the market for platform operators, network/service providers and consumers by avoiding “lock-in“ The specification of an open eco-system fostering m

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1