1、 a I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T J.1010 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (09/2016) SERIES J: CABLE NETWORKS AND TRANSMISSION OF TELEVISION, SOUND PROGRAMME AND OTHER MULTIMEDIA SIGNALS Conditional access and protection Exchangeable embedde
2、d conditional access and digital rights management solutions Embedded common interface for exchangeable CA/DRM solutions; Use cases and requirements Recommendation ITU-T J.1010 Rec. ITU-T J.1010 (09/2016) i Recommendation ITU-T J.1010 Embedded common interface for exchangeable CA/DRM solutions; Use
3、cases and requirements Summary Recommendation ITU-T J.1010 specifies use cases and requirements for exchangeable, embedded conditional access/digital rights management (CA/DRM) solutions, enabling customer premises equipment (CPE), which are capable of receiving broadcast and broadband content, to d
4、ownload CA/DRM clients under a trusted environment. By utilizing downloadable multi-CA/DRM service, entitled consumers can consume broadcast and broadband content, which is controlled by DRM and/or conditional access (CA) systems, even though a CPE does not have a required content-related CA/DRM cli
5、ent available by downloading it from a trusted source into various types of CPEs including set-top-boxes (STBs), smart TVs, PCs, smart phones and/or smart tablets. History Edition Recommendation Approval Study Group Unique ID* 1.0 ITU-T J.1010 2016-09-02 9 11.1002/1000/12772 Keywords CA/DRM, exchang
6、eable embedded common interface, retail CPE. * To access the Recommendation, type the URL http:/handle.itu.int/ in the address field of your web browser, followed by the Recommendations unique ID. For example, http:/handle.itu.int/11.1002/1000/11830-en. ii Rec. ITU-T J.1010 (09/2016) FOREWORD The In
7、ternational Telecommunication Union (ITU) is the United Nations specialized agency in the field of telecommunications, information and communication technologies (ICTs). The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical,
8、 operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups which, in tu
9、rn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered by the procedure laid down in WTSA Resolution 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOT
10、E In this Recommendation, the expression “Administration“ is used for conciseness to indicate both a telecommunication administration and a recognized operating agency. Compliance with this Recommendation is voluntary. However, the Recommendation may contain certain mandatory provisions (to ensure,
11、e.g., interoperability or applicability) and compliance with the Recommendation is achieved when all of these mandatory provisions are met. The words “shall“ or some other obligatory language such as “must“ and the negative equivalents are used to express requirements. The use of such words does not
12、 suggest that compliance with the Recommendation is required of any party. INTELLECTUAL PROPERTY RIGHTSITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right. ITU takes no position concerning the
13、evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recommendation, ITU had not received notice of intellectual property, protected by patents, whi
14、ch may be required to implement this Recommendation. However, implementers are cautioned that this may not represent the latest information and are therefore strongly urged to consult the TSB patent database at http:/www.itu.int/ITU-T/ipr/. ITU 2017 All rights reserved. No part of this publication m
15、ay be reproduced, by any means whatsoever, without the prior written permission of ITU. Rec. ITU-T J.1010 (09/2016) iii Table of Contents Page 1 Scope . 1 2 References . 1 3 Definitions 1 3.1 Terms defined elsewhere 1 3.2 Terms defined in this Recommendation . 1 4 Abbreviations and acronyms 2 5 Conv
16、entions 2 6 Requirements for exchangeable embedded CA/DRM solutions 3 6.1 General remarks 3 6.2 Generic requirements 4 6.3 Versatility related requirements . 5 6.4 Practicability related requirements . 5 6.5 ECI Client Swap related requirements . 5 6.6 ECI System Security related requirements . 6 An
17、nex A Use Cases. 8 A.1 Use case 1 . 8 A.2 Use case 2 . 8 A.3 Use case 3 . 9 A.4 Use case 4 (Trusted third party (TTP) related use case). 9 Bibliography. 10 iv Rec. ITU-T J.1010 (09/2016) Introduction Service and content protection realized by conditional access (CA) and digital rights management (DR
18、M) are essential in the rapidly developing area of digital broadcast and broadband, including content, services, networks and customer premises equipment (CPE), to protect business models of content owners, network operators and PayTV operators. While conceptually CA focuses on mechanisms to access
19、protected content distributed by a service provider over a network, DRM originally describes type and extent of the usage rights, according to the subscribers contract. PayTV operators have established digital TV platforms, which implement standards for basic functions, extended with proprietary ele
20、ments. Most CA and DRM systems used for classical digital broadcasting, IPTV or new OTT (over-the-top) services capture consumer premises equipment by binding it with proprietary security related elements. As a result, consumer premises equipment configured for use in network or platform A cannot be
21、 used in network or platform B or vice versa. Thus, the consumer electronics (CE) market for digital TV is still fragmented, as specifications differ not only per country, but also per platform. Detachable CA/DRM modules only offer a partial solution: the modules are again proprietary to the CA/DRM
22、system, they are not cheap either, and they are used primarily for cable or satellite TV and are not usable in modern-type equipment such as tablets due to lack of appropriate physical interfaces. Currently implemented solutions, whether embedded or as detachable hardware, result in “Lock-in“ effect
23、s. This seriously restricts the freedom of many players in digital multimedia content markets. Due to technological advances, innovative, software-based CA/DRM solutions become feasible. Maximizing interoperability while maintaining a high level of security, they promise to meet upcoming demands in
24、the market, allow for new businesses, and broaden consumer choice. It is in consumers interest that they are able to continue using the CPEs they bought e.g., after a move or a change of network provider or even utilize devices for services of different commercial video portals. This can only be ach
25、ieved by interoperability of CPEs regarding CA and DRM, based on an appropriate security architecture. Further fragmentation of the market for CPEs can only be prevented and competition encouraged by ensuring a consumer-friendly and context-sensitive exchangeability of CA and DRM systems. Rec. ITU-T
26、 J.1010 (09/2016) 1 Recommendation ITU-T J.1010 Embedded common interface for exchangeable CA/DRM solutions; Use cases and requirements 1 Scope The object of this Recommendation is a set of basic requirements for an exchangeable, embedded common interface, in order to download any necessary CA/DRM s
27、ystem to CPE. The download process is operated under a trusted environment and enables the consumption of protected content delivered via broadcast and/or broadband connections with various types of terminal equipment in line with the acquired content rights of the end-user. This Recommendation is o
28、ne in a series of Recommendations, specifying the whole ECI eco-system. 2 References The following ITU-T Recommendations and other references contain provisions which, through reference in this text, constitute provisions of this Recommendation. At the time of publication, the editions indicated wer
29、e valid. All Recommendations and other references are subject to revision; users of this Recommendation are therefore encouraged to investigate the possibility of applying the most recent edition of the Recommendations and other references listed below. A list of the currently valid ITU-T Recommenda
30、tions is regularly published. The reference to a document within this Recommendation does not give it, as a stand-alone document, the status of a Recommendation. The following referenced documents are necessary for the application of the present document. ETSI GS ECI 001-1 ETSI GS ECI 001-1: 2014, E
31、mbedded Common Interface (ECI) for exchangeable CA/DRM solutions (ECI); Part 1: Architecture, Definitions and Overview. ETSI GS ECI 001-2 ETSI GS ECI 001-2: 2014, Embedded Common Interface (ECI) for exchangeable CA/DRM solutions; Part 2: Use cases and requirements. 3 Definitions 3.1 Terms defined el
32、sewhere None. 3.2 Terms defined in this Recommendation This Recommendation defines the following terms: 3.2.1 embedded common interface (ECI): Architecture and system to be specified in the ETSI ISG “Embedded CI“, which allows the development and implementation of software-based swappable ECI client
33、s in customer premises equipment (CPE) and thus provides interoperability of CPE devices with respect to ECI. 3.2.2 embedded common interface client (ECI client): Implementation of a CA/DRM client which is compliant with the planned Embedded CI specifications. Note that it is the software module in
34、a CPE which provides all means to receive, in a protected manner, a consumers entitlements and rights concerning the content that is distributed by a content distributor or operator. It also receives the conditions under which a right or an entitlement can be used by the consumer, and the keys to de
35、crypt the various messages and content. An Embedded CI client may have an associated smart card. 2 Rec. ITU-T J.1010 (09/2016) 3.2.3 embedded common interface (ECI) host: Hardware and software system of a CPE, which covers ECI related functionalities and has interfaces to an ECI Client. Note that th
36、e ECI host is one part of the CPE firmware. 3.2.4 protected content: All kinds of protected media, in particular A/V and associated metadata, delivered to the customer application either via linear or non-linear delivery means. 3.2.5 software container: Set of software interfaces to the host and to
37、the client, which strictly separates the CA/DRM client from the host. The provisioning of the interfaces enables the exchangeability of the CA/DRM clients. 4 Abbreviations and acronyms This Recommendation uses the following abbreviations and acronyms: AES Advanced Encryption Standard CA Conditional
38、Access CA/DRM Conditional Access/Digital Rights Management CE Consumer Electronics CPE Customer Premises Equipment CSA Common Scrambling Algorithm DECE Digital Entertainment Content Ecosystem DRM Digital Rights Management DVB Digital Video Broadcasting ECI Embedded Common Interface IP Internet Proto
39、col IPTV TV using the Internet Protocol OMA Open Mobile Access OTT Over The Top (over the open Internet) PVR Personal Video Recorder TTP Trusted Third Party URI Usage Rights Information VM Virtual Machine 5 Conventions In this Recommendation: The keywords “is required to“ indicate a requirement whic
40、h must be strictly followed and from which no deviation is permitted if conformance to this document is to be claimed. The keywords “is recommended“ indicate a requirement which is recommended but which is not absolutely required. Thus this requirement need not be present to claim conformance. The k
41、eywords “is prohibited from“ indicate a requirement which must be strictly followed and from which no deviation is permitted if conformance to this document is to be claimed. The keywords “can optionally“ indicate an optional requirement which is permissible, without implying any sense of being reco
42、mmended. This term is not intended to imply that the vendors Rec. ITU-T J.1010 (09/2016) 3 implementation must provide the option and the feature can be optionally enabled by the network operator/service provider. Rather, it means the vendor may optionally provide the feature and still claim conform
43、ance with the specification. In the body of this document and its annexes, the words shall, shall not, should, and may sometimes appear, in which case they are to be interpreted, respectively, as is required to, is prohibited from, is recommended, and can optionally. The appearance of such phrases o
44、r keywords in an appendix or in material explicitly marked as informative are to be interpreted as having no normative intent. 6 Requirements for exchangeable embedded CA/DRM solutions 6.1 General remarks The Group Specification on ECI basic requirements, as covered by the present Recommendation, is
45、 part of a multi-part deliverable specifying a system architecture for general purpose, software-based, embedded and exchangeable CA/DRM systems which would be the most appropriate and future-proof solution for overcoming market fragmentation and enabling interoperability. Key benefits of the envisa
46、ged approach for content security are: Flexibility and scalability due to software-based implementation. Exchangeability fostering future-proof solution and enabling innovation. Applicability to content distributed via broadcast and broadband, including OTT. Support of multi-screen environment. Stim
47、ulation of the market for platform operators, network/service providers, and consumers by avoiding “Lock-in“. The specification of an open eco-system fostering market development. The ECI system aims at exchangeability of CA and DRM systems in CPEs on all relevant levels and aspects, at lowest possi
48、ble costs for the consumers and at minimal restrictions for CA or DRM vendors to develop their target products for the PayTV market. Therefore, amongst others, the ECI has the following functionalities: A software container for the CA respectively the DRM kernel hereafter called ECI Client with: sta
49、ndardized interfaces to all relevant functionalities of the CPE; a standardized Virtual Machine (VM) to run upon. Support of smartcard-less systems as well as use in smartcard-based systems. Inclusion of a multitude of such software containers in a CPE, each container running on its own instance of the VM. Installation of the ECI Client independently from other CPE software by a secure and standardized loader concept. Advanced Security, also known as Chip Set Security, to support content protection and to prevent unauthorized content a