1、 I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T J.1005 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (08/2015) SERIES J: CABLE NETWORKS AND TRANSMISSION OF TELEVISION, SOUND PROGRAMME AND OTHER MULTIMEDIA SIGNALS Conditional access and protection Digital rights managem
2、ent for cable television multiscreen service Architecture and requirements of digital rights management (DRM) for cable television multiscreen Recommendation ITU-T J.1005 Rec. ITU-T J.1005 (08/2015) i Recommendation ITU-T J.1005 Architecture and requirements of digital rights management (DRM) for ca
3、ble television multiscreen Summary Recommendation ITU-T J.1005 specifies the architecture and requirements for a digital rights management (DRM) system for a cable television content delivery service including multiple device viewing experiences. It is anticipated that the architecture and requireme
4、nts identified in this Recommendation can be applied to the DRM service that covers protected IP-type content (IP VoD, IP linear TV, etc.) delivery from a content provider or cable operator to end terminal devices (PC, tablet, smartphones, etc.) via a cable television network. History Edition Recomm
5、endation Approval Study Group Unique ID* 1.0 ITU-T J.1005 2015-08-13 9 11.1002/1000/12570 _ * To access the Recommendation, type the URL http:/handle.itu.int/ in the address field of your web browser, followed by the Recommendations unique ID. For example, http:/handle.itu.int/11.1002/1000/11830-en.
6、 ii Rec. ITU-T J.1005 (08/2015) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of telecommunications, information and communication technologies (ICTs). The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of IT
7、U. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics f
8、or study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered by the procedure laid down in WTSA Resolution 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared
9、 on a collaborative basis with ISO and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate both a telecommunication administration and a recognized operating agency. Compliance with this Recommendation is voluntary. However, the Recommendation may co
10、ntain certain mandatory provisions (to ensure, e.g., interoperability or applicability) and compliance with the Recommendation is achieved when all of these mandatory provisions are met. The words “shall“ or some other obligatory language such as “must“ and the negative equivalents are used to expre
11、ss requirements. The use of such words does not suggest that compliance with the Recommendation is required of any party. INTELLECTUAL PROPERTY RIGHTSITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Proper
12、ty Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recommendation, ITU had not received notice of i
13、ntellectual property, protected by patents, which may be required to implement this Recommendation. However, implementers are cautioned that this may not represent the latest information and are therefore strongly urged to consult the TSB patent database at http:/www.itu.int/ITU-T/ipr/. ITU 2015 All
14、 rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. Rec. ITU-T J.1005 (08/2015) iii Table of Contents Page 1 Scope . 1 2 References . 1 3 Definitions 1 3.1 Terms defined elsewhere 1 3.2 Terms defined in this Recommend
15、ation . 2 4 Abbreviations and acronyms 2 5 Conventions 3 6 Overview of DRM for cable television multiscreen . 4 6.1 Cable platform and DRM . 4 6.2 Service model . 6 6.3 Delivery method and content protection 6 7 Architecture of DRM for cable television multiscreen. 7 7.1 Components and flow . 9 7.2
16、Encoder/Transcoder 10 7.3 Content package server (encryption) 10 7.4 Content delivery server . 10 7.5 Licence server . 11 7.6 Domain management server . 11 7.7 Client device . 11 7.8 Authentication server 12 8 Requirements of the DRM system for cable television multiscreen 12 8.1 System requirements
17、 12 8.2 Functional requirements . 13 8.3 Service requirements 14 8.4 DRM content format requirements . 16 Appendix I Use cases 18 Appendix II Service scenarios 20 II.1 Online streaming 20 II.2 Purchase of download content 21 II.3 Rental 21 II.4 Subscription 22 Appendix III Multi-DRM service types 24
18、 III.1 Multi-DRM type I: Plug-in type . 24 III.2 Multi-DRM type II: Common communication interface type . 24 III.3 Multi-DRM type III: Download type . 25 Bibliography. 26 iv Rec. ITU-T J.1005 (08/2015) Introduction The rapid deployment of smartphones and tablet devices has changed peoples TV watchin
19、g habits in the home and outdoors. TV Everywhere services, including IP linear TV and IP video on demand (VoD), will inevitably increase the traffic of media streaming and downloading over IP networks that enable both in-home and outdoor services. In such a case, a digital rights management (DRM) te
20、chnology is required for content rights protection based on device authentication. Currently DRM is an aggregation of different technologies and each DRM closely depends on the content holders rights. DRM architecture and requirements for cable operators are required to be standardized so that they
21、can deploy new services in keeping with content holders rights that shall cover cable customers multiple devices. Figure 1-1 DRM for cable television IP video service As shown in Figure 1-1, there are three aspects of DRM: content, headend and end terminal devices. The DRM function is itself indepen
22、dent from content delivery network structures. This Recommendation provides an overview of DRM for cable television multiscreen and defines DRM architecture. The requirements of DRM for cable television multiscreen are also described based on a defined architecture model. In accordance with these re
23、quirements, this Recommendation considers DRM specifications which contain a DRM licence scenario for future services. This Recommendation describes content format specifications because this is related to the existing DRM system. A possible implementation of a DRM system that satisfies these requir
24、ements and considerations is also described. Generally raw contents (content that has not been encrypted and that are mostly supplied by the content provider) are entered into the platform. After the authentication of the cable customer and of the customers end terminal devices by the identity provi
25、der (IdP) function in the platform, the DRM server encrypts the content using the content key. The encrypted contents are distributed to the customers end terminal devices over the content delivery network (CDN) and the cable network. The content key is encrypted by another key (the device key) for
26、secure key delivery and distributed separately from the contents. The end terminal device which has a DRM licence can only decrypt the content distributed by the content key and the device key of the end terminal device. Rec. ITU-T J.1005 (08/2015) 1 Recommendation ITU-T J.1005 Architecture and requ
27、irements of digital rights management (DRM) for cable television multiscreen 1 Scope This Recommendation specifies the architecture and requirements for a DRM system for a cable television content delivery service including multiple device viewing experiences. It is anticipated that the architecture
28、 and requirements identified in this Recommendation can be applied to the DRM service that covers protected IP-type contents (IP VOD, IP linear, etc.) delivery from content providers or cable operators to end terminal devices (PC, tablet, smartphones, etc.) via cable platforms, content delivery netw
29、orks (CDNs), headend and cable networks. 2 References The following ITU-T Recommendations and other references contain provisions which, through reference in this text, constitute provisions of this Recommendation. At the time of publication, the editions indicated were valid. All Recommendations an
30、d other references are subject to revision; users of this Recommendation are therefore encouraged to investigate the possibility of applying the most recent edition of the Recommendations and other references listed below. A list of the currently valid ITU-T Recommendations is regularly published. T
31、he reference to a document within this Recommendation does not give it, as a stand-alone document, the status of a Recommendation. ITU-T H.222.0 Recommendation ITU-T H.222.0 | ISO/IEC 13818-1:2013, Information technology Generic coding of moving pictures and associated audio information: Systems. IT
32、U-T H.265 Recommendation ITU-T H.265 (2015), High efficiency video coding. ISO/IEC 14496-12 ISO/IEC 14496-12:2012, Information technology Coding of audio-visual objects Part 12: ISO base media file format. ISO/IEC 23001-7 ISO/IEC 23001-7:2012, Information technology MPEG systems technologies Part 7:
33、 Common encryption in ISO base media file format files. ISO/IEC 23009-1 ISO/IEC 23009-1:2012, Information technology Dynamic adaptive streaming over HTTP (DASH) Part 1: Media presentation description and segment formats. 3 Definitions 3.1 Terms defined elsewhere This Recommendation uses the followin
34、g terms defined elsewhere: 3.1.1 authentication b-ITU-T X.800: See data origin authentication and peer-entity authentication. 3.1.2 authorization b-ITU-T J.260: The act of determining if a particular privilege, such as access to telecommunications resource, can be granted to the presenter of a parti
35、cular credential. 3.1.3 content provider b-ITU-T Y.1910: The entity that owns or is licenced to sell content or content assets. 2 Rec. ITU-T J.1005 (08/2015) 3.1.4 content delivery network b-ITU-T F.750: A network optimized for delivering digital content. 3.1.5 data origin authentication b-ITU-T X.8
36、00: The corroboration that the source of data received is as claimed. 3.1.6 digital rights management b-ITU-T X.1193: A synonym for service and content protection or content protection, depending upon the context of use. 3.1.7 identity provider b-ITU-T X.1252: An entity that verifies, maintains, man
37、ages, and may create and assign identity information of other entities. 3.1.8 linear broadcast b-ITU-T Y.1910: Also known as linear TV. A television service in which a continuous stream flows in real time from the service provider to the terminal device and where the user cannot control the temporal
38、 order in which contents are viewed. 3.1.9 peer-entity authentication b-ITU-T X.800: The corroboration that a peer entity in an association is the one claimed. 3.1.10 platform b-ITU-T J.296: A business entity that manages and operates a collection service on a network of digital broadcasting. 3.1.11
39、 revocation b-ITU-T X.1252: The annulment by someone having the authority, of something previously done. 3.1.12 service provider b-ITU-T M.1400: A general reference to an operator that provides telecommunication services to customers and other users, either on a tariff or contract basis. A service p
40、rovider may or may not operate a network. A service provider may or may not be a customer of another service provider. 3.1.13 streaming b-ITU-T Y.2253: Streaming service over multi-connection provides multimedia features such as video/audio/text/graphics/data in real time supported by the required l
41、evel of QoS/QoE, security, interactivity and reliability. 3.1.14 video on demand (VoD)b-ITU-T Y.1910: A service in which the end user can, on demand, select and view video content and where the end user can control the temporal order in which the video content is viewed (e.g., the ability to start t
42、he viewing, pause, fast forward, rewind, etc.). 3.2 Terms defined in this Recommendation This Recommendation defines the following terms: 3.2.1 content key: A key used to protect the cable content data stream(s). 3.2.2 domain: A group of devices defined by a rights issuer such that the rights issuer
43、 can issue rights to objects for the group that can be processed by all devices within the group and only by those devices. 3.2.3 multi-DRM: A system which can select suitable DRM from two or more DRMs based on a special service feature, the load of a system, a network situation, etc. 3.2.4 IP VoD:
44、A service to deliver video content following a request from a user. IP-VOD supplies each video content on an on-demand basis. 3.2.5 non-STB: Personal computers (PCs), tablets and smartphone devices other than set-top boxes (STBs) which are capable of handling IP based interactive services. 4 Abbrevi
45、ations and acronyms This Recommendation uses the following abbreviations and acronyms: ABR Adaptive Bit Rate Rec. ITU-T J.1005 (08/2015) 3 BS Broadcast Satellite television CAS Conditional Access System CDN Content Delivery Network CENC Common Encryption scheme CP Content Provider CPCM Content Prote
46、ction and Copy Management DASH Dynamic Adaptive Streaming over HTTP DECE Digital Entertainment Content Ecosystem DOCSIS Data Over Cable Service Interface Specifications DRM Digital Rights Management DTCP Digital Transmission Content Protection FTTH Fibre To The Home HD High Definition HDS HTTP Dynam
47、ic Streaming HLS HTTP Live Streaming HFC Hybrid Fibre/Coaxial LTE Long Term Evolution MPEG Moving Picture Experts Group MSS Microsoft Smooth Streaming PF Platform SMS Subscriber Management System SDK Software Development Kit STB Set-Top Box SP Service Provider VoD Video on Demand 5 Conventions In th
48、is Recommendation: The keywords “is required to“ indicate a requirement which must be strictly followed and from which no deviation is permitted if conformance to this document is to be claimed. The keywords “is recommended“ indicate a requirement which is recommended but which is not absolutely req
49、uired. Thus this requirement need not be present to claim conformance. The keywords “is prohibited from“ indicate a requirement which must be strictly followed and from which no deviation is permitted if conformance to this document is to be claimed. The keywords “can optionally“ indicate an optional requirement which is permissible, without implying any sense of being recommended. This term is not intended to imply that the vendors implementation must provide the option and the