ImageVerifierCode 换一换
格式:PDF , 页数:61 ,大小:2.92MB ,
资源ID:799114      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-799114.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ITU-T J 95-1999 Copy Protection of Intelluctual Property for Content Delivered on Cable Television Systems Series J Transmission of Television Sound Programme and Other Multimedia si.pdf)为本站会员(visitstep340)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ITU-T J 95-1999 Copy Protection of Intelluctual Property for Content Delivered on Cable Television Systems Series J Transmission of Television Sound Programme and Other Multimedia si.pdf

1、INTERNATIONAL TELECOMMUNICATION UNION ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU J.95 (09/99) SERIES J: TRANSMISSION OF TELEVISION, SOUND PROGRAMME AND OTHER MULTIMEDIA SIGNALS Ancillary digital services for television transmission Copy protection of intellectual property for content deli

2、vered on cable television systems ITU-T Recommendation J.95 (Previously CCITT Recommendation) ITU-T J-SERIES RECOMMENDATIONS TRANSMISSION OF TELEVISION, SOUND PROGRAMME AND OTHER MULTIMEDIA SIGNALS General Recommendations General specifications for analogue sound-programme transmission Performance c

3、haracteristics of analogue sound-programme circuits Equipment and lines used for analogue sound-programme circuits Digital encoders for analogue sound-programe signals Digital transmission of sound-programme signals Circuits for analogue television transmission Analogue television transmission over

4、metallic lines and interconnection with radio-relay links J.l-J.9 J. 10-J. 19 J.20-J.29 5.30-5.39 5.40-5.49 J. 50-J. 59 5.60-5.69 5.70-5.79 Digital transmission of television signals 5.80-5.89 Y I Ancillary digital services for television transmission J.9-J.99 Operational requirements and methods fo

5、r television transmission Interactive systems for digital television distribution Transport of WEG-2 signals on packetised networks Measurement of the quality of service Digital television distribution through local subscriber networks J. 100-J. 109 J. 1 10-J. 129 J.130-J.139 J. 140-5.149 J. 150-J.

6、159 For further details, please rer to ITD-T List of Recommendations. ITU-T RECOMMENDATION J.95 COPY PROTECTION OF INTELLECTUAL PROPERTY FOR CONTENT DELIVERED ON CABLE TELEVISION SYSTEMS Summary This Recommendation describes the necessary requirements for a system to protect the intellectual propert

7、y rights (IPR) of television programming entities against the illegal copying, duplication and distribution of their creative property. The system described herein has aspects that prohibit unauthorized individuals from accessing encrypted WEG data streams. Also, techniques for “watermarking“ televi

8、sion signals for identification and copying allowances are presented. The material herein contains both general descriptions and discussions of specific technical approaches to copy protection. Source ITU-T Recommendation J.95 was prepared by ITU-T Study Group 9 (1997-2000) and was approved under th

9、e WTSC Resolution No. 1 procedure on 16 September 1999. Keywords Conditional access, digital television, WEG, security, television, video recording. Recommendation J.95 (09/99) 1 FOREWORD ITU (International Telecommunication Union) is the United Nations Specialized Agency in the field of telecommuni

10、- cations. The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of the ITU. The ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis. The World Tel

11、ecommunication Standardization Conference (WTSC), which meets every four years, establishes the topics for study by the ITU-T Study Groups which, in their turn, produce Recommendations on these topics. The approval of Recommendations by the Members of the ITU-T is covered by the procedure laid down

12、in WTSC Resolution No. 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with IS0 and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate both a telecommunicatio

13、n administration and a recognized operating agency. INTELLECTUAL PROPERTY RIGHTS The ITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right. The ITU takes no position concerning the evidence, vali

14、dity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recommendation, the ITU had not received notice of intellectual property, protected by patents, which may be

15、required to implement this Recommendation. However, implementors are cautioned that this may not represent the latest information and are therefore strongly urged to consult the TSB patent database. O ITU 2001 All rights reserved. No part of this publication may be reproduced or utilized in any form

16、 or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing fiom the ITU. Recommendation J.95 (09/99) 11 CONTENTS Introduction and background Scope References (Informative) Definitions Watermarking of digital television intellectual property 5.1 Ba

17、ckground and functional requirements 5.2 Implications for design approach Access control copy protection measures . Background and functional requirements - WEG digital signals . 6.3 Authorization centre functionality . electronics equipment . Access control copy protection . 6.1 6.2 Background and

18、functional requirements - Analogue signals Factors regarding the inclusion of copy protection functionality into cable television and consumer 7.1 Watermarking 7.2 7.3 Other impacts Appendix I . The EBU approach to copy protection of television intellectual property delivered on secondary cable TV s

19、ystems Appendix II . Galaxy watermark proposal II . 1 11.2 11.3 11.4 11.5 11.6 11.7 11.8 11.9 Appendix III III . 1 111.2 111.3 111.4 111.5 111.6 111.7 111.8 . System Architecture Generation Copy Control Technical mahuity Gate Count analysis . Robustness tests False Positive analysis . Embedding tech

20、nology and system . Abbrviations Contact Information . The 5C proposal for the copy protection of WEG video intellectual property Introduction . Terms and abbreviations . The 5C Digital Transmission Content Protection System . Full Authentication Restricted Authentication Content Channel management

21、and protection . System Renewability . AV/C Digital Interface Command Set Extensions Recommendation J.95 (0999) Page 1 1 1 2 3 3 4 4 4 4 4 5 5 5 5 5 7 8 11 11 12 12 13 14 15 15 16 16 21 21 23 30 34 43 45 1 111 Recommendation J.95 COPY PROTECTION OF INTELLECTUAL PROPERTY FOR CONTENT DELIVERED ON CABL

22、E TELEVISION SYSTEMS (Geneva, 1999) 1 Introduction and background The illegal recording and duplicating of television intellectual property has resulted in a very large illegal business worldwide, and has cost the owners of the intellectual property significant funds in lost revenue. With the change

23、 to digital WEG television, the problem is exacerbated because digital recordings can be duplicated in their original quality over many generations, whereas analogue recordings are reduced in fidelity with each successive generation, and become unusable at some point. In systems where the WEG digita

24、l signal is received and rendered into an analogue equivalent for viewing on an analogue-only television receiver, the quality of that analogue signal causes it to be a target for pirating also, and thus must be protected. To assist in these goals, approaches have been developed for hiding digital m

25、arkings in digital television intellectual property in a manner that is both undetectable and incorruptible. This process, called “watermarking“, is based on the science of cryptography but is not cryptographic in itself, and it contains the identity of the property owner and that owners rules regar

26、ding copies, namely, none, one copy for personal use, or unlimited copies. In addition to watermarking, copy protection requires that clear-text WEG digital television signals, or their analogue equivalents, are never allowed to traverse signal lines outside of the physical boundaries of the in-home

27、 consumer electronics equipment. To accommodate this requirement, a secondary scrambling system is required to temporarily cover these signals during their in-premises distribution, whether in digital or analogue format. A cryptographic system is proposed to cover the digital WEG signals, and an exi

28、sting commercial system which rapidly varies the timing is proposed to cover the analogue signals. To accommodate legal action against any one who would subvert these countermeasures, it is desired that the processes be proprietary and protected by licensing procedures. However, the licensing should

29、 be carefully crafted so as not to produce unnecessary discrimination andor disadvantage to companies who must produce these copy protection systems. 2 Scope This Recommendation describes both the cryptographic techniques to protect access to clear-text WEG digital television signals, and a process,

30、 known as “watermarking“ which indelibly marks the intellectual property as to its owner and that owners requirements regarding copying. A successful copy protection system supports the legal privilege of the owner of the IPR to control the distribution of the protected product. Approaches to copy p

31、rotection for content described in this Recommendation should be considered for use in other applications that require similar protection, such as over-the-air broadcasting, distribution of recorded programmes (e.g. by DVD), etc. 3 References (Informative) - 1394 Trade Association, Specification for

32、 AVIC Digital Interface Command Set. - Digital Transmission Protection License Agreement, Development and Evaluation License, Digital Transmission Licensing Authority. - Digital Transmission Licensing Administrator, 5C Digital Transmission Content Protection Specification, Volume 1 , Version 0.9 1.

33、Recommendation J.95 (09/99) 1 Digital Transmission Licensing Administrator, 5C Digital Transmission Content Protection Specijcation, Volume 2, Version 0.90. IEC 61883-1 (1998), Consumer audio/video Equipment - Digital Interface -Part 1: General. IEEE Std 1394-1995, IEEEs Standardfor a High Performan

34、ce Serial Bus. IEEE P1363, Editorial Contribution to Standard for Public Key Cyptography, Preliminary Draft, P1363ID3 (May 11 , 1998). National Institute of Standards and Technology (NIST), Secure Hash Standard (SHS, FIPS Publication 180-1 , 17 April, 1995. Toshiba Corporation, Eficient Implementati

35、on of an Elliptic Cume Cyptosystem (available at http:/wwW). Definitions This Recommendation defiies the following terms: 4.1 algorithm: A mathematical process that can be used for the scrambling and descrambling of a data stream. 4.2 authentication: The process intended to allow the system to check

36、 with certainty the identification of a party. 4.3 authorization coding: A digital word that describes the personality or service access capability of the subscriber decoder unit. NOTE - This code word, which is based on the service access authorized by the billing system, determines which keys are

37、distributed to each customer, and is required at the subscriber decoder to authorize the descrambling of any specific programme. 4.4 Conditional Access system (CA): The complete system for ensuring that cable services are accessible only to those who are entitled to receive them, and that the orderi

38、ng of such services is not subject to modification or repudiation. 4.5 key in electronic cryptographic systems). 4.6 number of bits that can be securely encrypted before it becomes advisable to change the key. 4.7 sound, and data services. 4.8 electronic key: The term for data signals that are used

39、to control the descrambling process in subscriber decoders. NOTE - There are at least three types of electronic keys: those used for television signal streams, those used for protecting control system operations, and those used for the distribution of electronic keys on the cable system. See also “a

40、uthorization coding“ which is also effectively a key. 4.9 4.10 operating hours of the delivery system. NOTE - By contrast, other services, such as a pay-per-view feature film, are only available for a specific period of time. 4.11 connected. cryptanalysis: The science of recovering the plaintext of

41、a message without access to the key (to the electronic cryptographic duty cycle: The maximum secure capacity of a cryptographic process, based on the total descrambling: The process of reversing the scrambling function (see “scrambling“) to yield usable pictures, encryption: The process of scramblin

42、g signals to avoid unauthorized access. full period terminated service: A subscription service that is always available to subscribers during the host: A device with generalized functionality where modules containing specialized functionality can be 4.12 unauthorized results. integrity: The ability

43、of a function to withstand being usurped for unauthorized use, or modified to yield 4.13 to internal functionality by unauthorized parties. 4.14 4.15 having sent the message. intrusion resistance: The ability of a hardware object to deny physical, electrical, or irradiation-based access module: A sm

44、all device, not working by itself, designed to run specialized tasks in association with a host. non-repudiation: A process by which the sender of a message (e.g. a request on a pay-per-view) cannot deny 2 Recommendation J.95 (09/99) 4.16 one-way hash: A mathematical process or algorithm whereby a v

45、ariable length message is changed into a fiied-length digital word, such that it is very difficult to calculate the original message from the word, and also very difficult to find a second message with the same word. 4.17 period of time. pay-per-view: A payment system whereby the subscriber can pay

46、for an individual programme or specified 4.18 access for unauthorized reception. piracy: The act of acquiring unauthorized access to programmes, usually for the purpose of reselling such 4.19 public key cryptography: A cryptographic technique based upon a two-key algorithm, private and public, where

47、in a message is encrypted with the public key but can only be decrypted with the private key. Also known as a Private-Public Key (PPK) system. NOTE - Knowing the public key does not reveal the private key. Example: Party A would devise such a private and public key, and send the public key openly to

48、 all who might wish to communicate with Party A, but retain the private key in secret. Then, while any who have the public key can encrypt a message for Party A, only Party A with the private key can decrypt the messages. 4.20 unauthorized parties. scrambling: The process of using an encryption func

49、tion to render television and data signals unusable to 4.21 secure signature: A mathematical process by which the origin and integrity of a transmitted message can be ascertained. NOTE - If a secure signature system is used, the originator cannot deny having sent the message, and the receiver can determine if the message has been modified. 4.22 transport stream: An MPEG-2 Transport Stream. 5 Watermarking of digital television intellectual property 5.1 Background and functional requirements One of the basic requirements for defining intellectual property is that it must be m

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1