ITU-R REPORT BT 2052-2005 Protection of end-users privacy in interactive broadcasting systems《在交互式广播系统的终端用户隐私保护》.pdf

上传人:王申宇 文档编号:792892 上传时间:2019-02-02 格式:PDF 页数:9 大小:259.57KB
下载 相关 举报
ITU-R REPORT BT 2052-2005 Protection of end-users privacy in interactive broadcasting systems《在交互式广播系统的终端用户隐私保护》.pdf_第1页
第1页 / 共9页
ITU-R REPORT BT 2052-2005 Protection of end-users privacy in interactive broadcasting systems《在交互式广播系统的终端用户隐私保护》.pdf_第2页
第2页 / 共9页
ITU-R REPORT BT 2052-2005 Protection of end-users privacy in interactive broadcasting systems《在交互式广播系统的终端用户隐私保护》.pdf_第3页
第3页 / 共9页
ITU-R REPORT BT 2052-2005 Protection of end-users privacy in interactive broadcasting systems《在交互式广播系统的终端用户隐私保护》.pdf_第4页
第4页 / 共9页
ITU-R REPORT BT 2052-2005 Protection of end-users privacy in interactive broadcasting systems《在交互式广播系统的终端用户隐私保护》.pdf_第5页
第5页 / 共9页
点击查看更多>>
资源描述

1、 Rep. ITU-R BT.2052 1 REPORT ITU-R BT.2052*Protection of end-users privacy in interactive broadcasting systems (Question ITU-R 111/6) (2005) 1 Introduction Interactive broadcasting systems enable attractive services to end-users. On the other hand, the system offers the opportunity to collect inform

2、ation related to the end-user to the service provider or the other third party or parties, and to send a malicious program code to the receiver to malicious party or parties. To protect end-users privacy from potential threat, information to be protected and potential attack points in the interactiv

3、e broadcast chain should be clarified. In this Report, a detailed analysis of interactive broadcast systems is discussed with two principles below to clarify the problem of protection of end-users privacy: Free-to-air broadcasting services, even when including interactive elements, should be availab

4、le to the end-users without any need for a return channel connection. Any information of a personal nature is, by default, considered private. A privacy threat to a broadcast receiver with a return channel can potentially materialize as soon as a connection to a remote computer is established over t

5、he return channel. 2 Information to be protected Considering the second principle in the previous section, all data related to the user should be regarded as potentially sensitive. There are different kinds of user data such as: personal data, e.g. name, date of birth, personal profiles and preferen

6、ces; link data, e.g. address and telephone number, bank account or credit card number; data stored within the broadcast receiver, e.g. zapping history, return/interaction channel usage history, ID number; data stored outside the broadcast receiver, for a static receiver, e.g. return/interaction chan

7、nel usage history, for a mobile receiver, e.g. location data. This tells that protection of the end-users privacy can be achieved when all the elements affecting it in the interactive broadcast chain work properly. 3 Interactive broadcast system model In order to approach these questions, an analysi

8、s of threat to privacy infliction should be undertaken. Typical models for the interactive broadcast chain, with a unidirectional and bidirectional return channel, as illustrated in Figs. 1 and 2 respectively, are used for this analysis. *This Report is brought to the attention of ITU-T SG 9, ITU-T

9、SG 17 and ITU-D SG 2. 2 Rep. ITU-R BT.2052 FIGURE 1 Model for an interactive broadcast chain with a unidirectional return channel The receiver in Fig. 1 comprises the following components: (A) DeMUX/broadcast channel decrypter This is to descramble a broadcast signal that has been encrypted for cert

10、ain purposes such as pay-service or copy control of the broadcast content. Rep. ITU-R BT.2052 3 (B) Protocol handler/AV decoder This is to handle various broadcast protocols such as transport stream and carousel, etc. in a receiver and audio/video decoding. Data or messages other than audio/video si

11、gnals taken out of the received signal by this are passed to an appropriate part of subsequent processes. (C) Secure device This stores an end-users authorization information, including identification of the user and key(s) for descramble. Certification authority can track the end-users name, addres

12、s and telephone number, etc., through the identification number. (D) Processor/renderer This controls receiver behaviour instructed by both a broadcast content and a system program. (E) Storage This keeps information provided by the broadcast content, initial set-up, or user. Information provided by

13、 a user includes user profile such as name, age, sex, address, genre of interest of contents, etc. (F) Return channel encrypter This enciphers message(s) sent through a return channel. This could be optional. (G) Access point A point to connect a receiver to a communication network for return channe

14、l. To access the network, a receiver may require information to logon the network, e.g. user-id and password, or number to dial. A broadcast station provides the following components: (H) Multiplexer This combines broadcast services into a single stream and provides signalling information such as PS

15、I/SI. Service_id of each service is included in SI. (I) Broadcast channel encrypter This enciphers broadcast contents and provides key(s) information and control message(s) for a descrambler in a receiver. (J) Broadcast content server This feeds broadcast contents to a broadcast channel encrypter (I

16、). (K) Authoring system Interactive contents are authored by this system. Some contents may be renewed frequently to reflect end-user response derived from a communication server to the content. (L) Communication server This gathers responses of end-users. One possible use of these responses is to u

17、pdate the content. Gathered information or communication log may be stored if needed. (M) Return channel decrypter This deciphers incoming encrypted messages from receivers through return channel. This is a counterpart of encrypter provided in a receiver. 4 Rep. ITU-R BT.2052 FIGURE 2 Model for an i

18、nteractive broadcast chain with a bidirectional return channel NOTE 1 Multiple content providers using content server (K), authoring system (L), communication server (M) and encrypter/decrypter (N) or part of them may take part in establishing the interactive broadcast service. For example, addition

19、al audio/visual component fed through interaction channel is provided by a different provider from broadcaster. The actual structure of these components above depends upon the service. NOTE 2 The destination at provider side, i.e. broadcaster side, of the interaction channel depends upon the structu

20、re described in Note 1. A receiver in Fig. 2 comprises the following components: (A) Descrambler This is to descramble a signal that has been encrypted. In some cases, an encrypted signal may come from the interaction channel in addition to the broadcast channel. (B) Protocol stack No. 1 This is to

21、handle various broadcast protocols such as transport stream and carousel, etc. in a receiver. Data or messages taken out of a received signal by this are passed to an appropriate part of subsequent processes. Rep. ITU-R BT.2052 5 (C) Secure device This stores information regarding legality of an end

22、-user to enjoy the services, including identification of the user and key(s) for descramble. Certification authority can track the end-users name, address, and telephone number, etc. through the identification number. (D) Processor/renderer This controls receiver behaviour instructed by both a conte

23、nt and a system program. (E) Storage This keeps information provided by the broadcast content, initial set-up, or user. Information provided by a user includes user profile such as name, age, sex, address, genre of interest of contents, etc. Information provided by the content may be some tags to ho

24、ld a state of the content, or to distinguish each receiver or user. (F) Encrypter/decrypter This enciphers and deciphers a signal sent and received through the interaction channel. This may not always be employed to all kinds of interaction channel. Authentication of the content from interaction cha

25、nnel may be applied here when using a different technique from authentication for broadcast channel applied with secure device (C). If the protocol in the interaction channel used to deliver a content to a receiver is the same as that in the broadcast channel, a received signal will be forwarded to

26、the descrambler (A). (G) Protocol Stack No. 2 This handles communication protocol used for the interaction channel. In case of Internet protocol, this holds the IP address. (H) Access point A point to connect a receiver to a communication network for the interaction channel. Physical connection to t

27、he access point varies by the interaction channel medium; telephone line for dial-up connection, Ethernet for broadband connection and base station for wireless connection including WiFi and cell phone network. A broadcast station comprises the following components: (I) Multiplexer (MUX) This combin

28、es broadcast services for broadcast channel into a single stream and provides signalling information such as PSI/SI. Service_id of each service is included in SI. (J) Scramble controller This scrambles broadcast contents for broadcast channel and provides key(s) information and control message(s) fo

29、r the descrambler (A) in a receiver. (K) Content server This routes components of the content such as data broadcast content, video or audio for transmission toward a receiver. When this receives a trigger or a request for transmission based on program timetable, all the components of the content at

30、 that time will be routed to the broadcast channel. When a request message for transmission comes through the interaction channel, requested component(s) of the content will be routed to the interaction channel. Selection of the components follows an incoming request message from the interaction cha

31、nnel, which is generated by the instruction of the content running on processor/browser (D) in a receiver, or by a system program of the receiver. 6 Rep. ITU-R BT.2052 (L) Authoring system Interactive content is authored by this system. Some content may be renewed frequently to reflect end-user resp

32、onses, or instantly created (“active content”) based on information of a sender of an incoming request message from the interaction channel derived from the communication server (M). (M) Communication server (M) This controls all the communication on the interaction channel including the establishme

33、nt of logical connection, transmission/reception of messages and logical disconnection. A typical example is a web server. This can gather end-users responses to the content as well. (N) Encrypter/decrypter (N) This enciphers and deciphers messages for the interaction channel. This is a counterpart

34、of encrypter/decrypter (F) in a receiver. 4 Consideration on personal information and its handling in the elements of the interactive broadcast chain Based on the two models described in the previous section, generated or stored information related to the end-users privacy and potential threat to it

35、 as a result of the process of the information is discussed below. 4.1 Receiver A receiver is a major source of private information in an interactive broadcast chain. Following information are examples kept in a secure device and/or storage, or created by a processor as a result of user interaction:

36、 Viewing history Return/interaction channel usage History of interactive operation Personal profiles and preferences ID number. In some interactive broadcast systems, the ID number is used for the purpose of content copy control even in free-to-air services. 4.2 Return channel The following aspects

37、of return channel characteristics and configuration are to be considered: 4.2.1 Return channel characteristic Non-disclosure of the channel specification This may help to protect the system including the end-users receiver from attack by malicious third party or parties. Communication operator In th

38、e case of employing IP in the interaction channel, protection of the DNS server may be one of the key actions to protect the end-users receiver from attack by malicious third party or parties. Rep. ITU-R BT.2052 7 IP address In general, a dynamic assignment of IP address (DHCP) by the Internet servi

39、ce provider (ISP) makes it difficult for the entity who owns a server to find out the relationship between IP address and personal information. But if the interaction channel is a broadband IP connection, the channel may be shared with other equipment, such as PCs using a broadband router. In the ca

40、se of using the router, a connection is established at all times and this may lead to keeping the same IP address even in a DHCP environment. This degrades anonymity of the end-user to the broadcaster. Improvement of anonymity of the end-user can be achieved by using a trustworthy proxy that has no

41、relationship to the content author/service provider. 4.2.2 Return channel configuration Telephone number of a caller In the case of using a telephone line for return channel, notifying this number to the destination leads to giving an opportunity to the service or content provider to collect informa

42、tion about who responds to it. Network configuration for broadband IP connection In the case of using a broadband IP communication network such as DSL, optical fibre and WiFi, the gateway device at the access point should be configured properly. If a broadband router installed near the receiver is n

43、ot configured properly, this may be a possible hole to probe the activity of return channel communication. If a WiFi channel is not configured securely enough, attackers will monitor the traffic and obtain important parameters such as the nearest DNS server address. This may result in a takeover of

44、the DNS server and a fake DNS server will subsequently lead the connection to the improper server. 4.3 Content/service provider The following aspects are to be taken into account concerning the information exchange between the content/service provider and the receiver: Authentication When transmitti

45、ng information from the receiver to the content author/service provider, authentication carried out by the receiver is important to prevent the establishment of a connection to a fake server. Such a server is considered malicious, thus transmitted information will be monitored, stored and consumed f

46、or unintended purpose by the malicious party or parties. The seriousness of this attack depends on the choice of return channel; an IP connection is considered more vulnerable than a direct connection to such a server using a telephone line. In the bidirectional return channel model illustrated in F

47、ig. 2, the communication server (M) should be authenticated properly by a receiver when the interaction channel is used as a “forward” channel. Authentication of a receiver may also be needed with the same reason why a scramble controller (J) and descrambler (A) pair is used. Without the authenticat

48、ion of communication server (M), a malicious code can be transmitted to the receiver by pretence. In other words, a fake server will deliver a malicious code to the receiver. A takeover of DNS (Domain Name System) server near the receiver makes this activity possible. The encrypter/decrypter pair (F

49、) and (N) is in charge of authentication in the interaction channel. When using the same authentication technique of the broadcast channel, an incoming signal from the interaction channel should be forwarded to the descrambler (A). 8 Rep. ITU-R BT.2052 IP address In general, a communication using IP often makes a record of access in a server, e.g. access log. In Fig. 1, the communication server (M) is in charge of it. This keeps the date, time and IP address of an entity that has made a connection and, in some cases, the file name that has bee

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 标准规范 > 国际标准 > 其他

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1