ETSI GS ECI 001-2-2014 Embedded Common Interface (ECI) for exchangeable CA DRM solutions Part 2 Use cases and requirements (V1 1 1)《可交换CA DRM解决方案的嵌入式通用接口 (ECI) 第2部分 用例和要求 (V1 1 1)》.pdf

上传人:medalangle361 文档编号:733243 上传时间:2019-01-08 格式:PDF 页数:15 大小:88.64KB
下载 相关 举报
ETSI GS ECI 001-2-2014 Embedded Common Interface (ECI) for exchangeable CA DRM solutions Part 2 Use cases and requirements (V1 1 1)《可交换CA DRM解决方案的嵌入式通用接口 (ECI) 第2部分 用例和要求 (V1 1 1)》.pdf_第1页
第1页 / 共15页
ETSI GS ECI 001-2-2014 Embedded Common Interface (ECI) for exchangeable CA DRM solutions Part 2 Use cases and requirements (V1 1 1)《可交换CA DRM解决方案的嵌入式通用接口 (ECI) 第2部分 用例和要求 (V1 1 1)》.pdf_第2页
第2页 / 共15页
ETSI GS ECI 001-2-2014 Embedded Common Interface (ECI) for exchangeable CA DRM solutions Part 2 Use cases and requirements (V1 1 1)《可交换CA DRM解决方案的嵌入式通用接口 (ECI) 第2部分 用例和要求 (V1 1 1)》.pdf_第3页
第3页 / 共15页
ETSI GS ECI 001-2-2014 Embedded Common Interface (ECI) for exchangeable CA DRM solutions Part 2 Use cases and requirements (V1 1 1)《可交换CA DRM解决方案的嵌入式通用接口 (ECI) 第2部分 用例和要求 (V1 1 1)》.pdf_第4页
第4页 / 共15页
ETSI GS ECI 001-2-2014 Embedded Common Interface (ECI) for exchangeable CA DRM solutions Part 2 Use cases and requirements (V1 1 1)《可交换CA DRM解决方案的嵌入式通用接口 (ECI) 第2部分 用例和要求 (V1 1 1)》.pdf_第5页
第5页 / 共15页
点击查看更多>>
资源描述

1、 ETSI GS ECI 001-2 V1.1.1 (2014-09) Embedded Common Interface (ECI) for exchangeable CA/DRM solutions; Part 2: Use cases and requirements Disclaimer This document has been produced and approved by the Embedded Common Interface (ECI) for exchangeable CA/DRM solutions ETSI Industry Specification Group

2、 (ISG) and represents the views of those members who participated in this ISG. It does not necessarily represent the views of the entire ETSI membership. GROUP SPECIFICATION ETSI ETSI GS ECI 001-2 V1.1.1 (2014-09) 2Reference DGS/ECI-001-2 Keywords CA, DRM, swapping ETSI 650 Route des Lucioles F-0692

3、1 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be downloaded from: http:/www.etsi.org The present docum

4、ent may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/o

5、r in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current sta

6、tus of this and other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced or u

7、tilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written authorization of ETSI. The copyright and the foregoing restriction extend t

8、o reproduction in all media. European Telecommunications Standards Institute 2014. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE are Trade Marks of ETSI registered for the benefit of its Members and

9、 of the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI GS ECI 001-2 V1.1.1 (2014-09) 3Contents Intellectual Property Rights 4g3Foreword . 4g3Modal verbs terminology 4g3Introduction 4g31 Scope 6g32 References 7g32.1 Normative

10、references . 7g32.2 Informative references 8g33 Definitions and abbreviations . 8g33.1 Definitions 8g33.2 Abbreviations . 9g34 Requirements 9g34.1 Generic Requirements 9g34.2 Versatility related Requirements 10g34.3 Practicability related Requirements 10g34.4 ECI Client Swap related Requirements 10g

11、34.5 ECI System Security related Requirements 11g3Annex A (normative): Use cases . 13g3A.1 Use case 1 . 13g3A.2 Use case 2 . 13g3A.3 Use case 3 . 14g3A.4 Use case 4 (Trusted Third Party (TTP) related use case) . 14g3History 15g3ETSI ETSI GS ECI 001-2 V1.1.1 (2014-09) 4Intellectual Property Rights IP

12、Rs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essential, or p

13、otentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http:/ipr.etsi.org). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI.

14、No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This Group Specification (GS) has been produced by ETSI Industry Specification Group

15、(ISG) Embedded Common Interface (ECI) for exchangeable CA/DRM solutions. The present document is part 2 of a multi-part deliverable covering Use cases and Requirements for the Embedded Common Interface for exchangeable CA/DRM solutions specification, as identified below: Part 1: “Architecture, Defin

16、itions and Overview“; Part 2: “Use cases and requirements“; Part 3: “CA/DRM Container, Loader, Interfaces, Revocation“; Part 4: “The Virtual Machine“; Part 5: “The Advanced Security System“; Part 6: “Trust Environment“; Part 7: “Extended Requirements“. Modal verbs terminology In the present document

17、 “shall“, “shall not“, “should“, “should not“, “may“, “may not“, “need“, “need not“, “will“, “will not“, “can“ and “cannot“ are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of provisions). “must“ and “must not“ are NOT allowed in ETSI deliv

18、erables except when used in direct citation. Introduction Service and content protection realized by Conditional Access (CA) and Digital Rights Management (DRM) are essential in the rapidly developing area of digital Broadcast and Broadband, including content, services, networks and customer premise

19、s equipment (CPE), to protect business models of content owners, network operators and PayTV operators. While conceptually CA focuses on mechanisms to access protected content distributed by a service provider over a network, DRM originally describes type and extent of the usage rights, according to

20、 the subscribers contract. ETSI ETSI GS ECI 001-2 V1.1.1 (2014-09) 5PayTV operators have established Digital TV platforms, which implement standards for basic functions, extended with proprietary elements. Most CA and DRM systems used for classical digital broadcasting, IPTV or new OTT (over-the-top

21、) services capture consumer premises equipment (CPE) by binding it with proprietary security related elements. As a result, consumer premises equipment configured for use in network or platform A cannot be used in network or platform B or vice versa. Thus, the consumer electronics market for digital

22、 TV is still fragmented, as specifications differ not only per country, but also per platform. Detachable CA/DRM modules only offer a partial solution: the modules are again proprietary to the CA/DRM system, they are not cheap either, and they are used primarily for cable or satellite TV and are not

23、 usable in modern-type equipment such as tablets due to lack of appropriate physical interfaces. Currently implemented solutions, whether embedded or as detachable hardware, result in “Lock-in“ effects. This seriously restricts the freedom of many players in digital multimedia content markets. Due t

24、o technological advances, innovative, software-based CA/DRM solutions become feasible. Maximizing interoperability while maintaining a high level of security, they promise to meet upcoming demands in the market, allow for new businesses, and broaden consumer choice. It is in consumers interest that

25、they are able to continue using the CPEs they bought e.g. after a move or a change of network provider or even utilize devices for services of different commercial video portals. This can only be achieved by interoperability of CPEs regarding CA and DRM, based on an appropriate security architecture

26、. Further fragmentation of the market for CPEs can only be prevented and competition encouraged by ensuring a consumer-friendly and context-sensitive exchangeability of CA and DRM systems. ETSI ETSI GS ECI 001-2 V1.1.1 (2014-09) 61 Scope The Group Specification on ECI basic requirements, as covered

27、by the present document, is part of a multi-part deliverable specifying a system architecture for general purpose, software-based, embedded and exchangeable CA/DRM systems which would be the most appropriate and future-proof solution for overcoming market fragmentation and enabling interoperability.

28、 Key benefits of the envisaged approach for content security are: Flexibility and scalability due to software-based implementation. Exchangeability fostering future-proof solution and enabling innovation. Applicability to content distributed via broadcast and broadband, including OTT. Support of mul

29、ti-screen environment. Stimulation of the market for platform operators, network/service providers, and consumers by avoiding “Lock-in“. The specification of an open eco-system fostering market development The ECI system aims at exchangeability of CA and DRM systems in CPEs on all relevant levels an

30、d aspects, at lowest possible costs for the consumers and at minimal restrictions for CA or DRM vendors to develop their target products for the PayTV market. Therefore, amongst others, the ECI has the following functionalities: A software container for the CA respectively the DRM kernel - hereafter

31、 called ECI Client - with: - standardized interfaces to all relevant functionalities of the CPE; - a standardized Virtual Machine (VM) to run upon. Support of smartcard-less systems as well as use in smartcard-based systems. Inclusion of a multitude of such software containers in a CPE, each contain

32、er running on its own instance of the VM. Installation of the ECI Client independently from other CPE software by a secure and standardized loader concept. Advanced Security, also known as Chip Set Security, to support content protection and to prevent unauthorized content access. Methods for the us

33、er to discover the right ECI Client to download. Methods for revocation of (parts of) the ECI Clients functionality and CPEs functionality. Suited for classical digital broadcasting, IPTV or modern OTT-based systems. Although ECI shows some similarity with already deployed solutions, there are subst

34、antial differences: 1) The module is in software, no longer in hardware, hence no need for costs at the consumer side to swap a CA or DRM system. 2) Several parallel ECI Clients can be implemented in one and the same CPE, without adding relevant cost. 3) These clients can run concurrently in the one

35、 device. As a result, a CA or DRM component can be exchanged much easier, allowing the end-user to change operator or get services from a variety of operators on his CPE, without having to exchange expensive modules. ETSI ETSI GS ECI 001-2 V1.1.1 (2014-09) 7The complete multi-part deliverable consis

36、ts of a group of specifications, including a Group Specification on Use cases and Requirements (the present document), in combination with the underlying specifications: Part 1: Architecture, Definitions and Overview 1. Part 2: Use cases and requirements (the present document). Part 3: CA/DRM Contai

37、ner, Loader, Interfaces, Revocation i.1. Part 4: The Virtual Machine (VM) i.2. Part 5: The Advanced Security System i.3. Part 6: Trust Environment i.4. Part 7: Extended Requirements i.5. Which together describe a solution allowing replacement of ECI Clients at any time by just downloading the ECI Cl

38、ients requested by an end customer. The ECI Clients are installed in a standard software container in the CPE by a separate loader, with separate security algorithms and keys to protect the ECI Clients against integrity and substitution attacks independently from all other software in the CPE. The c

39、ontainers interfaces with the CPE are generic and defined in GS ECI 001-3 i.1, enabling the ECI Client to interact with the various functions in the CPE and beyond. The ECI Clients run upon a virtual machine instance that is defined in GS ECI 001-4 i.2. GS ECI 001-5 i.3 specifies an Advanced Securit

40、y mechanism to protect the key to the content during its travel into the CPE processor chips content decryption facility. The present document addresses use cases and requirements as basis for the implementation of interoperable CA/DRM systems in CPEs. The ECI specification only applies to the recep

41、tion and further processing of content which is controlled by a Conditional Access and/or Digital Rights Management system and has been scrambled by the service provider. Content that is not controlled by a Conditional Access and/or DRM system is not covered by the present document. The ECI Group Sp

42、ecification is intended to be used in combination with a contractual framework (license agreement), compliance and robustness rules, and appropriate certification process (see note), under control of a Trust Authority, GS ECI 001-6 i.4. 2 References References are either specific (identified by date

43、 of publication and/or edition number or version number) or non-specific. For specific references,only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. Referenced documents which are not found to be publicly ava

44、ilable in the expected location might be found at http:/docbox.etsi.org/Reference. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity. 2.1 Normative references The following referenced documents are necessary for t

45、he application of the present document. 1 ETSI GS ECI 001-1: “Embedded Common Interface for exchangeable CA/DRM solutions (ECI); Part 1: Architecture, Definitions and Overview“. ETSI ETSI GS ECI 001-2 V1.1.1 (2014-09) 82.2 Informative references The following referenced documents are not necessary f

46、or the application of the present document but they assist the user with regard to a particular subject area. NOTE: The following references are intended to become normative references once these Group Specifications are completed. i.1 ETSI GS ECI 001-3: “Embedded Common Interface (ECI) for exchange

47、able CA/DRM solutions; Part 3: The CA/DRM Container: Loader, Interfaces, Revocation“. i.2 ETSI GS ECI 001-4: “Embedded Common Interface (ECI) for exchangeable CA/DRM solutions; Part 4: The Virtual Machine“. i.3 ETSI GS ECI 001-5: “Embedded Common Interface (ECI) for exchangeable CA/DRM solutions; Pa

48、rt 5: The Advanced Security System“. i.4 ETSI GS ECI 001-6: “Embedded Common Interface (ECI) for exchangeable CA/DRM solutions; Part 6: The Trust Environment“. i.5 ETSI GS ECI 001-7: “Embedded Common Interface (ECI) for exchangeable CA/DRM solutions; Part 7: Use cases and Requirements, extended Requ

49、irements“. i.6 Recommendation ITU-T H.222.0 (2006)/ISO/IEC 13818-1:2007: “Information technology - Generic coding of moving pictures and associated audio information: Systems“. i.7 ISO/IEC 14496-12:2012: “Information Technology - Coding of Audio-Visual Objects - Part 12: ISO Base Media file format“. i.8 ISO/IEC 23001-7:2011: “Information technology - MPEG systems technologies - Part 7: Common encryption in ISO base media file format files“. 3 Definitions and abbreviations 3.1 Definitions For the purposes

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 标准规范 > 国际标准 > 其他

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1