ATIS 0800014-2012 Secure Download and Messaging Interoperability Specification (Version 003).pdf
《ATIS 0800014-2012 Secure Download and Messaging Interoperability Specification (Version 003).pdf》由会员分享,可在线阅读,更多相关《ATIS 0800014-2012 Secure Download and Messaging Interoperability Specification (Version 003).pdf(34页珍藏版)》请在麦多课文档分享上搜索。
1、 ATIS-0800014.v003 SECURE DOWNLOAD AND MESSAGING INTEROPERABILITY SPECIFICATION ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry. More tha
2、n 200 companies actively formulate standards in ATIS Committees and Forums, covering issues including: IPTV, Cloud Services, Energy Efficiency, IP-Based and Wireless Technologies, Quality of Service, Billing and Operational Support, Emergency Services, Architectural Platforms and Emerging Networks.
3、In addition, numerous Incubators, Focus and Exploratory Groups address evolving industry priorities including Smart Grid, Machine-to-Machine, Connected Vehicle, IP Downloadable Security, Policy Management and Network Optimization. ATIS is the North American Organizational Partner for the 3rd Generat
4、ion Partnership Project (3GPP), a member and major U.S. contributor to the International Telecommunication Union (ITU) Radio and Telecommunications Sectors, and a member of the Inter-American Telecommunication Commission (CITEL). ATIS is accredited by the American National Standards Institute (ANSI)
5、. For more information, please visit . Notice of Disclaimer e.g., video, games, music). 6. Server-Side Middleware (Subscriber/Service/Asset Management System). 7. IPTV Receiving Device. 8. IPTV Receiving Device Software. This document specifies functionality and methodology for authentication (ISS/A
6、) and encryption (ISS/E) used for securing persistent and non-persistent data in order to meet the objectives stated in section 1. Data is non-persistent when it is used only at reception time. Data is persistent when it is retained after reception time. Typical examples of persistent data that may
7、require authentication include: Secure download of executable software. Secure download of DRM code. Secure delivery of operational data (e.g., configuration files). Updates to the certificate hierarchy. Typical examples of non-persistent data that may require authentication include: Secure delivery
8、 of EAS messages. Secure delivery of operational data (e.g., one-time commands). Secure end-to-end communications. Figure 1 illustrates the basic components involved in the IPTV Security Solution and DRM interoperability. ATIS-0800014.v003 5 Server Side DRM SystemVOD RepositoryBroadcastContentServer
9、 VOD ServerIPTV NetworkServer Side MiddlewareOff-line EncryptionReal-Time EncryptionIPTV Receiving DeviceIPTVReceiving DeviceDRMComponentKey Management DRM system Management ServerScrambling AlgorithmEncryptedDe-Scrambling AlgorithmScrambling AlgorithmApplication Level InterfacesDRM Interoperability
10、 Application Level Interfaces Content Flow (Video/Audio Packets)LEGENDSDRM Black Box ComponentsIPTV Receiving DeviceSoftwareFigure 1: Basic DRM Components Block Diagram This specification defines an IPTV Security Solution/Authentication (ISS/A) and an IPTV Security Solution/Encryption (ISS/E) functi
11、on. The ISS/A specified in this document defines the authentication functionality required to enable secure download and reception of messages. The specification of the ISS/E within the IPTV Security Solution is motivated by the requirement to provide confidentiality of messages and secure downloads
12、. Confidentiality is provided by a security process called encryption. The encryption keys used to provide confidentiality must be securely managed. ISS/A and ISS/E together provide a complete solution for messaging and secure download to IPTV Devices by providing authentication, integrity, and conf
13、identiality. Aspects of ISS/A and ISS/E may be implemented in both server-side and client-side devices. 4.1 Secure Download The operator wants the capability to securely download various executable software images into IPTV Devices. This leads to the need to ensure the authentication, confidentialit
14、y, and integrity of software images downloaded into the IPTV Device. Note that video, audio, and data service content are not executable software images for the purposes of this specification. 4.2 Authenticated Messaging In order to verify that system messages are received unmodified from legitimate
15、 sources, there is a need to ensure the authentication and integrity of the content and the source of system messages. Note that an EAS message, which could include text and audio portions, can be made secure by mechanisms in this specification. The ISS/A is implemented following Robustness Rules es
16、tablished in ATIS-0800024 10. ATIS-0800014.v003 6 4.3 Encryption ISS/E uses an open, standardized encryption method to protect downloads or messages intended for the IPTV Devices. The ISS/E is implemented following Robustness Rules established in ATIS-0800024 10. 4.4 Secure Environment of the IPTV D
17、evice To characterize the security environment of the IPTV Device, this document defines the concepts of the Native Security Solution (NSS) and the ISS Security Profile. 4.4.1 Native Security Solution (NSS) The NSS of an IPTV Device comprises the hardware and software that is present at manufacturin
18、g time and is designed to secure the execution environment of that IPTV Device. ATIS-0800024 10 defines Secure Execution Environment (SEE) elements and their robustness levels. Because IPTV Devices will be designed and manufactured by different vendors for a variety of different applications, the ac
19、tual implementation of the SEE, its robustness, and the security capabilities afforded to an IPTV Device NSS can vary. This specification expects the ISS/A and the ISS/E to be incorporated into the NSS when present. There are two methods by which the ISS/A and the ISS/E may be incorporated into the
20、NSS of an IPTV Device. They are: 1. Incorporated at the manufacturing time of the IPTV Device. 2. Downloaded and authenticated using the capabilities of the NSS. 4.4.2 ISS Security Profiles The ISS/A and the ISS/E are vulnerable to subversion or imitation if the execution environment of the IPTV Dev
21、ice is not sufficiently secure. This document introduces the concept of an ISS Security Profile as a means to classify security characteristics of a specific implementation of an IPTV Device. In particular, these profiles define the characteristics of the execution environment in which the NSS and h
22、ence the ISS/A and the ISS/E operate. Some of these profiles depend on the existence of a SEE. ATIS-0800024 10 defines robustness levels for SEE elements. 5 ANALYSIS FOR INTEROPERABILITY 5.1 Analysis of Authentication The following subsections outline considerations for: Downloading DRM code to the
23、IPTV Receiving Device. Downloading middleware and application software to the IPTV Receiving Device. Securing messages and operational data sent to the IPTV Receiving Device. The secure download and messaging security functions will operate in a manner independent of the specific download or message
24、 transport mechanism. This specification defines mechanisms for assuring the authenticity, confidentiality, and integrity of downloads/messages. ATIS-0800014.v003 7 5.1.1 DRM Code Download This section lists examples of the downloading of DRM executable code into the IPTV Receiving Device. The purpo
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
本资源只提供5页预览,全部文档请下载后查看!喜欢就下载吧,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ATIS08000142012SECUREDOWNLOADANDMESSAGINGINTEROPERABILITYSPECIFICATIONVERSION003PDF

链接地址:http://www.mydoc123.com/p-541353.html