ETSI GS ECI 001-2-2018 Embedded Common Interface (ECI) for exchangeable CA DRM solutions Part 2 Use cases and requirements (V1 2 1).pdf

上传人:medalangle361 文档编号:733244 上传时间:2019-01-08 格式:PDF 页数:15 大小:102.38KB
下载 相关 举报
ETSI GS ECI 001-2-2018 Embedded Common Interface (ECI) for exchangeable CA DRM solutions Part 2 Use cases and requirements (V1 2 1).pdf_第1页
第1页 / 共15页
ETSI GS ECI 001-2-2018 Embedded Common Interface (ECI) for exchangeable CA DRM solutions Part 2 Use cases and requirements (V1 2 1).pdf_第2页
第2页 / 共15页
ETSI GS ECI 001-2-2018 Embedded Common Interface (ECI) for exchangeable CA DRM solutions Part 2 Use cases and requirements (V1 2 1).pdf_第3页
第3页 / 共15页
ETSI GS ECI 001-2-2018 Embedded Common Interface (ECI) for exchangeable CA DRM solutions Part 2 Use cases and requirements (V1 2 1).pdf_第4页
第4页 / 共15页
ETSI GS ECI 001-2-2018 Embedded Common Interface (ECI) for exchangeable CA DRM solutions Part 2 Use cases and requirements (V1 2 1).pdf_第5页
第5页 / 共15页
点击查看更多>>
资源描述

1、 ETSI GS ECI 001-2 V1.2.1 (2018-03) Embedded Common Interface (ECI) for exchangeable CA/DRM solutions; Part 2: Use cases and requirements Disclaimer The present document has been produced and approved by the Embedded Common Interface (ECI) for exchangeable CA/DRM solutions ETSI Industry Specificatio

2、n Group (ISG) and represents the views of those members who participated in this ISG. It does not necessarily represent the views of the entire ETSI membership. GROUP SPECIFICATION ETSI ETSI GS ECI 001-2 V1.2.1 (2018-03) 2 Reference RGS/ECI-001-2 Ed2 Keywords CA, DRM, swapping ETSI 650 Route des Luc

3、ioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be downloaded from: http:/www.etsi.org/stand

4、ards-search The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in content

5、s between such versions and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. I

6、nformation on the current status of this and other ETSI documents is available at https:/portal.etsi.org/TB/ETSIDeliverableStatus.aspx If you find errors in the present document, please send your comment to one of the following services: https:/portal.etsi.org/People/CommiteeSupportStaff.aspx Copyri

7、ght Notification No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written authorization of ETSI. The c

8、opyright and the foregoing restriction extend to reproduction in all media. ETSI 2018. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are trademarks of ETSI registered for the benefit of its Members. 3GPPTM and LTETMare trademarks of ETSI registered for the benefit of its Members

9、and of the 3GPP Organizational Partners. oneM2M logo is protected for the benefit of its Members. GSMand the GSM logo are trademarks registered and owned by the GSM Association. ETSI ETSI GS ECI 001-2 V1.2.1 (2018-03) 3 Contents Intellectual Property Rights 4g3Foreword . 4g3Modal verbs terminology 4

10、g3Introduction 5g31 Scope 6g32 References 6g32.1 Normative references . 6g32.2 Informative references 7g33 Definitions and abbreviations . 7g33.1 Definitions 7g33.2 Abbreviations . 8g34 Requirements 9g34.1 General remark . 9g34.2 Generic Requirements 9g34.3 Versatility related Requirements 9g34.4 Pr

11、acticability related Requirements 10g34.5 ECI Client Swap related Requirements 10g34.6 ECI System Security related Requirements 10g34.7 Content protection and Usage Rights Information (URI) related requirements . 11g3Annex A (informative): List of use cases 13g3A.0 Use cases 13g3A.1 Use case 1 . 13g

12、3A.2 Use case 2 . 14g3A.3 Use case 3 . 14g3A.4 Use case 4 (Trusted Third Party (TTP) related use case) . 14g3History 15g3ETSI ETSI GS ECI 001-2 V1.2.1 (2018-03) 4 Intellectual Property Rights Essential patents IPRs essential or potentially essential to normative deliverables may have been declared t

13、o ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is av

14、ailable from the ETSI Secretariat. Latest updates are available on the ETSI Web server (https:/ipr.etsi.org/). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI S

15、R 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Trademarks The present document may include trademarks and/or tradenames which are asserted and/or registered by their owners. ETSI claims no ownership of these except for any wh

16、ich are indicated as being the property of ETSI, and conveys no right to use or reproduce any trademark and/or tradename. Mention of those trademarks in the present document does not constitute an endorsement by ETSI of products, services or organizations associated with those trademarks. Foreword T

17、his Group Specification (GS) has been produced by ETSI Industry Specification Group (ISG) Embedded Common Interface (ECI) for exchangeable CA/DRM solutions. The present document is part 2 of a multi-part deliverable covering Use cases and Requirements for the Embedded Common Interface for exchangeab

18、le CA/DRM solutions specification, as identified below: Part 1: “Architecture, Definitions and Overview“; Part 2: “Use cases and requirements“; Part 3: “CA/DRM Container, Loader, Interfaces, Revocation“; Part 4: “The Virtual Machine“; Part 5: “The Advanced Security System“; Part 6: “Trust Environmen

19、t“. The use of terms in bold and starting with capital characters in the present document shows that those terms are defined with an ECI specific meaning, which may deviate from the common use of those terms. Modal verbs terminology In the present document “shall“, “shall not“, “should“, “should not

20、“, “may“, “need not“, “will“, “will not“, “can“ and “cannot“ are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of provisions). “must“ and “must not“ are NOT allowed in ETSI deliverables except when used in direct citation. ETSI ETSI GS ECI 0

21、01-2 V1.2.1 (2018-03) 5 Introduction Service and content protection realized by Conditional Access (CA) and Digital Rights Management (DRM) are essential in the rapidly developing area of digital Broadcast and Broadband services. This includes the distribution of HD and UHD content to various types

22、of customer premises equipment (CPE) in order to protect business models of content owners and service providers, including Broadcasters and PayTV Operators. While CA systems primarily focus on the protection of content distributed via unidirectional networks as usually used in broadcast environment

23、, DRM systems originate from bidirectional network environments and permit access to content on certified devices for authenticated Users, with typically rich content rights expressions. In practice, a clear distinction between CA and DRM functionalities is not feasible in all cases and therefore wi

24、thin the present document the term CA/DRM systems is used. Currently implemented CA/DRM solutions, whether embedded or as detachable hardware, often result in usage restrictions for service/platform providers on one side and consumers on the other. The consequences for consumers are dependencies wit

25、h regard to the applicable network, service and content providers and the applied CPE suited for classical digital broadcasting, IPTV or OTT (over-the-top) services. While CPEs with embedded platform-proprietary CA or DRM functionality bind a User to a specific platform operator, detachable hardware

26、 modules allow using retail CPE as e.g. Set-Top-Boxes (STB) and integrated TV sets (iDTV). Due to their form factor and cost, detachable hardware modules do not fulfil future demands, especially those with regard to consumption of protected content on tablets and mobile devices and for cost-critical

27、 deployments. Existing technologies thus bind the freedom of many players in digital multimedia content markets. Due to technological progress, innovative, software-based CA/DRM solutions become feasible. Maximizing interoperability while maintaining a high level of security, these solutions promise

28、 to meet upcoming demands in the market, allow for new businesses, and broaden consumer choice with respect to content consumption via broadcast and broadband connections. It is in consumers interest that bought and owned CPEs are available for further use after a move or a change of the network pro

29、vider and those devices can be utilized for services of different commercial video portals. This can be achieved by the implementation of interoperable CA and DRM mechanisms inside CPEs based on appropriate security architecture. Further fragmentation of the market for CPEs can only be prevented and

30、 competition encouraged by ensuring solutions for consumer-friendly and flexible exchangeability of CA and DRM systems, associated with a state-of-the-art security environment. It is in the Platform Operators interest that security technology can be deployed flexibly and managed easily across variou

31、s networks and on all kinds of devices. The advantage of updating existing devices with the latest security systems in a seamless way provides unparalleled business opportunity. Requirements of an ECI Ecosystem as specified in the present document as part of the ECI multi-part deliverable lay the ba

32、ses for important attributes, as flexibility and scalability due to software-based implementation, exchangeability fostering a future-proof solution as well as for enabling innovation. Further aspects are applicability to content distributed via different types of networks, including classical digit

33、al broadcasting, IPTV and OTT services. The ECI system specification of an open eco-system, fostering market development, provides the basis for exchangeability of CA and DRM systems in CPEs, at lowest possible costs for the consumers and with minimal restrictions for CA or DRM vendors to develop th

34、eir target products for the PayTV market. The present document, part 2 of this multi-part deliverable, specifies all requirements, which the specifications have to fulfil in order to build the ECI Ecosystem in an appropriate way. The requirements reflect the needs of the different stakeholders along

35、 the value-chain. ETSI ETSI GS ECI 001-2 V1.2.1 (2018-03) 6 1 Scope The present document serves as a collection of requirements and use-cases of the different stakeholders along the value-chain for the ECI Ecosystem as specified in the ECI multi-part deliverable, including specification of the archi

36、tecture of the ECI system as defined in ECI specification ETSI GS ECI 001-1 (V1.2.1) 1. An ECI Ecosystem which fulfils these requirements will reveal the following features: A major advantage and innovation of the ECI Ecosystem, compared with currently deployed systems, is a complete software-based

37、architecture for the loading and exchange of CA/DRM systems, avoiding any detachable hardware modules. Software containers provide a secure (“Sandbox“) environment for either CA or DRM kernels, hereafter named as ECI Clients, together with their individual Virtual Machine instances. The Advanced Sec

38、urity System is a powerful tool for the ECI Client to enhance its security. The download process is embedded in a secure and trusted environment, providing a trust hierarchy for installation and exchange of ECI Host and ECI Clients and thus enabling an efficient protection against integrity- and sub

39、stitution attacks. The present document covers requirements details in the following clauses: Clause 4 contains all requirements structured in clauses: 4.1 Generic Requirements; 4.2 Versatility related Requirements; 4.3 Practicability related Requirements; 4.4 ECI Client Swap related Requirements; 4

40、.5 ECI System Security related Requirements; and 4.6 Content protection and Usage Rights Information (URI) related requirements. Annex A deals with relevant use cases. 2 References 2.1 Normative references References are either specific (identified by date of publication and/or edition number or ver

41、sion number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. Referenced documents which are not found to be publicly available in the expected location might be fo

42、und at https:/docbox.etsi.org/Reference. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity. The following referenced documents are necessary for the application of the present document. 1 ETSI GS ECI 001-1 (V1.2.1

43、): “Embedded Common Interface for exchangeable CA/DRM solutions (ECI); Part 1: Architecture, Definitions and Overview“. ETSI ETSI GS ECI 001-2 V1.2.1 (2018-03) 7 2.2 Informative references References are either specific (identified by date of publication and/or edition number or version number) or n

44、on-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their l

45、ong term validity. The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. i.1 Recommendation ITU-T H.222.0 (2017)/ISO/IEC 13818-1:2007: “Information technology - Generic coding of moving pict

46、ures and associated audio information: Systems“. i.2 ISO/IEC 14496-12:2015 : “Information Technology - Coding of Audio-Visual Objects - Part 12: ISO Base Media file format“. i.3 ISO/IEC 23001-7:2016: “Information technology - MPEG systems technologies - Part 7: Common encryption in ISO base media fi

47、le format files“. i.4 NIST Special Publication 800-90C:2016: “Recommendation for Random Bit Generator (RBG) Constructions“. 3 Definitions and abbreviations 3.1 Definitions For the purposes of the present document, the following terms and definitions apply: Advanced Security System (AS System): funct

48、ion of an ECI compliant CPE, which provides enhanced security functions (hardware and software) for an ECI Client certificate: data with a complementary secure Digital Signature that identifies an Entity NOTE: The holder of the secret key of the signature attests to the correctness of the data - aut

49、henticates it - by signing it with its secret key. Its public key can be used to verify the data. content protection system: systems that employs cryptographic techniques to manage access to content and services NOTE: The term may be interchanged frequently with the alternate Service Protection system. Typical systems of this sort are either Conditional Access Systems, or Digital Rights Management systems. CPE Manufacturer: company that manufactures ECI compliant CPEs digital signature: data (byte sequence) that decrypted with the public key of the signatory of a

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 标准规范 > 国际标准 > 其他

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1