ITU-T J 95-1999 Copy Protection of Intelluctual Property for Content Delivered on Cable Television Systems Series J Transmission of Television Sound Programme and Other Multimedia si.pdf

上传人:visitstep340 文档编号:799114 上传时间:2019-02-02 格式:PDF 页数:61 大小:2.92MB
下载 相关 举报
ITU-T J 95-1999 Copy Protection of Intelluctual Property for Content Delivered on Cable Television Systems Series J Transmission of Television Sound Programme and Other Multimedia si.pdf_第1页
第1页 / 共61页
ITU-T J 95-1999 Copy Protection of Intelluctual Property for Content Delivered on Cable Television Systems Series J Transmission of Television Sound Programme and Other Multimedia si.pdf_第2页
第2页 / 共61页
ITU-T J 95-1999 Copy Protection of Intelluctual Property for Content Delivered on Cable Television Systems Series J Transmission of Television Sound Programme and Other Multimedia si.pdf_第3页
第3页 / 共61页
ITU-T J 95-1999 Copy Protection of Intelluctual Property for Content Delivered on Cable Television Systems Series J Transmission of Television Sound Programme and Other Multimedia si.pdf_第4页
第4页 / 共61页
ITU-T J 95-1999 Copy Protection of Intelluctual Property for Content Delivered on Cable Television Systems Series J Transmission of Television Sound Programme and Other Multimedia si.pdf_第5页
第5页 / 共61页
点击查看更多>>
资源描述

1、INTERNATIONAL TELECOMMUNICATION UNION ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU J.95 (09/99) SERIES J: TRANSMISSION OF TELEVISION, SOUND PROGRAMME AND OTHER MULTIMEDIA SIGNALS Ancillary digital services for television transmission Copy protection of intellectual property for content deli

2、vered on cable television systems ITU-T Recommendation J.95 (Previously CCITT Recommendation) ITU-T J-SERIES RECOMMENDATIONS TRANSMISSION OF TELEVISION, SOUND PROGRAMME AND OTHER MULTIMEDIA SIGNALS General Recommendations General specifications for analogue sound-programme transmission Performance c

3、haracteristics of analogue sound-programme circuits Equipment and lines used for analogue sound-programme circuits Digital encoders for analogue sound-programe signals Digital transmission of sound-programme signals Circuits for analogue television transmission Analogue television transmission over

4、metallic lines and interconnection with radio-relay links J.l-J.9 J. 10-J. 19 J.20-J.29 5.30-5.39 5.40-5.49 J. 50-J. 59 5.60-5.69 5.70-5.79 Digital transmission of television signals 5.80-5.89 Y I Ancillary digital services for television transmission J.9-J.99 Operational requirements and methods fo

5、r television transmission Interactive systems for digital television distribution Transport of WEG-2 signals on packetised networks Measurement of the quality of service Digital television distribution through local subscriber networks J. 100-J. 109 J. 1 10-J. 129 J.130-J.139 J. 140-5.149 J. 150-J.

6、159 For further details, please rer to ITD-T List of Recommendations. ITU-T RECOMMENDATION J.95 COPY PROTECTION OF INTELLECTUAL PROPERTY FOR CONTENT DELIVERED ON CABLE TELEVISION SYSTEMS Summary This Recommendation describes the necessary requirements for a system to protect the intellectual propert

7、y rights (IPR) of television programming entities against the illegal copying, duplication and distribution of their creative property. The system described herein has aspects that prohibit unauthorized individuals from accessing encrypted WEG data streams. Also, techniques for “watermarking“ televi

8、sion signals for identification and copying allowances are presented. The material herein contains both general descriptions and discussions of specific technical approaches to copy protection. Source ITU-T Recommendation J.95 was prepared by ITU-T Study Group 9 (1997-2000) and was approved under th

9、e WTSC Resolution No. 1 procedure on 16 September 1999. Keywords Conditional access, digital television, WEG, security, television, video recording. Recommendation J.95 (09/99) 1 FOREWORD ITU (International Telecommunication Union) is the United Nations Specialized Agency in the field of telecommuni

10、- cations. The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of the ITU. The ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis. The World Tel

11、ecommunication Standardization Conference (WTSC), which meets every four years, establishes the topics for study by the ITU-T Study Groups which, in their turn, produce Recommendations on these topics. The approval of Recommendations by the Members of the ITU-T is covered by the procedure laid down

12、in WTSC Resolution No. 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with IS0 and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate both a telecommunicatio

13、n administration and a recognized operating agency. INTELLECTUAL PROPERTY RIGHTS The ITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right. The ITU takes no position concerning the evidence, vali

14、dity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recommendation, the ITU had not received notice of intellectual property, protected by patents, which may be

15、required to implement this Recommendation. However, implementors are cautioned that this may not represent the latest information and are therefore strongly urged to consult the TSB patent database. O ITU 2001 All rights reserved. No part of this publication may be reproduced or utilized in any form

16、 or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing fiom the ITU. Recommendation J.95 (09/99) 11 CONTENTS Introduction and background Scope References (Informative) Definitions Watermarking of digital television intellectual property 5.1 Ba

17、ckground and functional requirements 5.2 Implications for design approach Access control copy protection measures . Background and functional requirements - WEG digital signals . 6.3 Authorization centre functionality . electronics equipment . Access control copy protection . 6.1 6.2 Background and

18、functional requirements - Analogue signals Factors regarding the inclusion of copy protection functionality into cable television and consumer 7.1 Watermarking 7.2 7.3 Other impacts Appendix I . The EBU approach to copy protection of television intellectual property delivered on secondary cable TV s

19、ystems Appendix II . Galaxy watermark proposal II . 1 11.2 11.3 11.4 11.5 11.6 11.7 11.8 11.9 Appendix III III . 1 111.2 111.3 111.4 111.5 111.6 111.7 111.8 . System Architecture Generation Copy Control Technical mahuity Gate Count analysis . Robustness tests False Positive analysis . Embedding tech

20、nology and system . Abbrviations Contact Information . The 5C proposal for the copy protection of WEG video intellectual property Introduction . Terms and abbreviations . The 5C Digital Transmission Content Protection System . Full Authentication Restricted Authentication Content Channel management

21、and protection . System Renewability . AV/C Digital Interface Command Set Extensions Recommendation J.95 (0999) Page 1 1 1 2 3 3 4 4 4 4 4 5 5 5 5 5 7 8 11 11 12 12 13 14 15 15 16 16 21 21 23 30 34 43 45 1 111 Recommendation J.95 COPY PROTECTION OF INTELLECTUAL PROPERTY FOR CONTENT DELIVERED ON CABL

22、E TELEVISION SYSTEMS (Geneva, 1999) 1 Introduction and background The illegal recording and duplicating of television intellectual property has resulted in a very large illegal business worldwide, and has cost the owners of the intellectual property significant funds in lost revenue. With the change

23、 to digital WEG television, the problem is exacerbated because digital recordings can be duplicated in their original quality over many generations, whereas analogue recordings are reduced in fidelity with each successive generation, and become unusable at some point. In systems where the WEG digita

24、l signal is received and rendered into an analogue equivalent for viewing on an analogue-only television receiver, the quality of that analogue signal causes it to be a target for pirating also, and thus must be protected. To assist in these goals, approaches have been developed for hiding digital m

25、arkings in digital television intellectual property in a manner that is both undetectable and incorruptible. This process, called “watermarking“, is based on the science of cryptography but is not cryptographic in itself, and it contains the identity of the property owner and that owners rules regar

26、ding copies, namely, none, one copy for personal use, or unlimited copies. In addition to watermarking, copy protection requires that clear-text WEG digital television signals, or their analogue equivalents, are never allowed to traverse signal lines outside of the physical boundaries of the in-home

27、 consumer electronics equipment. To accommodate this requirement, a secondary scrambling system is required to temporarily cover these signals during their in-premises distribution, whether in digital or analogue format. A cryptographic system is proposed to cover the digital WEG signals, and an exi

28、sting commercial system which rapidly varies the timing is proposed to cover the analogue signals. To accommodate legal action against any one who would subvert these countermeasures, it is desired that the processes be proprietary and protected by licensing procedures. However, the licensing should

29、 be carefully crafted so as not to produce unnecessary discrimination andor disadvantage to companies who must produce these copy protection systems. 2 Scope This Recommendation describes both the cryptographic techniques to protect access to clear-text WEG digital television signals, and a process,

30、 known as “watermarking“ which indelibly marks the intellectual property as to its owner and that owners requirements regarding copying. A successful copy protection system supports the legal privilege of the owner of the IPR to control the distribution of the protected product. Approaches to copy p

31、rotection for content described in this Recommendation should be considered for use in other applications that require similar protection, such as over-the-air broadcasting, distribution of recorded programmes (e.g. by DVD), etc. 3 References (Informative) - 1394 Trade Association, Specification for

32、 AVIC Digital Interface Command Set. - Digital Transmission Protection License Agreement, Development and Evaluation License, Digital Transmission Licensing Authority. - Digital Transmission Licensing Administrator, 5C Digital Transmission Content Protection Specification, Volume 1 , Version 0.9 1.

33、Recommendation J.95 (09/99) 1 Digital Transmission Licensing Administrator, 5C Digital Transmission Content Protection Specijcation, Volume 2, Version 0.90. IEC 61883-1 (1998), Consumer audio/video Equipment - Digital Interface -Part 1: General. IEEE Std 1394-1995, IEEEs Standardfor a High Performan

34、ce Serial Bus. IEEE P1363, Editorial Contribution to Standard for Public Key Cyptography, Preliminary Draft, P1363ID3 (May 11 , 1998). National Institute of Standards and Technology (NIST), Secure Hash Standard (SHS, FIPS Publication 180-1 , 17 April, 1995. Toshiba Corporation, Eficient Implementati

35、on of an Elliptic Cume Cyptosystem (available at http:/wwW). Definitions This Recommendation defiies the following terms: 4.1 algorithm: A mathematical process that can be used for the scrambling and descrambling of a data stream. 4.2 authentication: The process intended to allow the system to check

36、 with certainty the identification of a party. 4.3 authorization coding: A digital word that describes the personality or service access capability of the subscriber decoder unit. NOTE - This code word, which is based on the service access authorized by the billing system, determines which keys are

37、distributed to each customer, and is required at the subscriber decoder to authorize the descrambling of any specific programme. 4.4 Conditional Access system (CA): The complete system for ensuring that cable services are accessible only to those who are entitled to receive them, and that the orderi

38、ng of such services is not subject to modification or repudiation. 4.5 key in electronic cryptographic systems). 4.6 number of bits that can be securely encrypted before it becomes advisable to change the key. 4.7 sound, and data services. 4.8 electronic key: The term for data signals that are used

39、to control the descrambling process in subscriber decoders. NOTE - There are at least three types of electronic keys: those used for television signal streams, those used for protecting control system operations, and those used for the distribution of electronic keys on the cable system. See also “a

40、uthorization coding“ which is also effectively a key. 4.9 4.10 operating hours of the delivery system. NOTE - By contrast, other services, such as a pay-per-view feature film, are only available for a specific period of time. 4.11 connected. cryptanalysis: The science of recovering the plaintext of

41、a message without access to the key (to the electronic cryptographic duty cycle: The maximum secure capacity of a cryptographic process, based on the total descrambling: The process of reversing the scrambling function (see “scrambling“) to yield usable pictures, encryption: The process of scramblin

42、g signals to avoid unauthorized access. full period terminated service: A subscription service that is always available to subscribers during the host: A device with generalized functionality where modules containing specialized functionality can be 4.12 unauthorized results. integrity: The ability

43、of a function to withstand being usurped for unauthorized use, or modified to yield 4.13 to internal functionality by unauthorized parties. 4.14 4.15 having sent the message. intrusion resistance: The ability of a hardware object to deny physical, electrical, or irradiation-based access module: A sm

44、all device, not working by itself, designed to run specialized tasks in association with a host. non-repudiation: A process by which the sender of a message (e.g. a request on a pay-per-view) cannot deny 2 Recommendation J.95 (09/99) 4.16 one-way hash: A mathematical process or algorithm whereby a v

45、ariable length message is changed into a fiied-length digital word, such that it is very difficult to calculate the original message from the word, and also very difficult to find a second message with the same word. 4.17 period of time. pay-per-view: A payment system whereby the subscriber can pay

46、for an individual programme or specified 4.18 access for unauthorized reception. piracy: The act of acquiring unauthorized access to programmes, usually for the purpose of reselling such 4.19 public key cryptography: A cryptographic technique based upon a two-key algorithm, private and public, where

47、in a message is encrypted with the public key but can only be decrypted with the private key. Also known as a Private-Public Key (PPK) system. NOTE - Knowing the public key does not reveal the private key. Example: Party A would devise such a private and public key, and send the public key openly to

48、 all who might wish to communicate with Party A, but retain the private key in secret. Then, while any who have the public key can encrypt a message for Party A, only Party A with the private key can decrypt the messages. 4.20 unauthorized parties. scrambling: The process of using an encryption func

49、tion to render television and data signals unusable to 4.21 secure signature: A mathematical process by which the origin and integrity of a transmitted message can be ascertained. NOTE - If a secure signature system is used, the originator cannot deny having sent the message, and the receiver can determine if the message has been modified. 4.22 transport stream: An MPEG-2 Transport Stream. 5 Watermarking of digital television intellectual property 5.1 Background and functional requirements One of the basic requirements for defining intellectual property is that it must be m

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 标准规范 > 国际标准 > 其他

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1