1、INTERNATIONAL TELECOMMUNICATION UNION ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU J.95 (09/99) SERIES J: TRANSMISSION OF TELEVISION, SOUND PROGRAMME AND OTHER MULTIMEDIA SIGNALS Ancillary digital services for television transmission Copy protection of intellectual property for content deli
2、vered on cable television systems ITU-T Recommendation J.95 (Previously CCITT Recommendation) ITU-T J-SERIES RECOMMENDATIONS TRANSMISSION OF TELEVISION, SOUND PROGRAMME AND OTHER MULTIMEDIA SIGNALS General Recommendations General specifications for analogue sound-programme transmission Performance c
3、haracteristics of analogue sound-programme circuits Equipment and lines used for analogue sound-programme circuits Digital encoders for analogue sound-programe signals Digital transmission of sound-programme signals Circuits for analogue television transmission Analogue television transmission over
4、metallic lines and interconnection with radio-relay links J.l-J.9 J. 10-J. 19 J.20-J.29 5.30-5.39 5.40-5.49 J. 50-J. 59 5.60-5.69 5.70-5.79 Digital transmission of television signals 5.80-5.89 Y I Ancillary digital services for television transmission J.9-J.99 Operational requirements and methods fo
5、r television transmission Interactive systems for digital television distribution Transport of WEG-2 signals on packetised networks Measurement of the quality of service Digital television distribution through local subscriber networks J. 100-J. 109 J. 1 10-J. 129 J.130-J.139 J. 140-5.149 J. 150-J.
6、159 For further details, please rer to ITD-T List of Recommendations. ITU-T RECOMMENDATION J.95 COPY PROTECTION OF INTELLECTUAL PROPERTY FOR CONTENT DELIVERED ON CABLE TELEVISION SYSTEMS Summary This Recommendation describes the necessary requirements for a system to protect the intellectual propert
7、y rights (IPR) of television programming entities against the illegal copying, duplication and distribution of their creative property. The system described herein has aspects that prohibit unauthorized individuals from accessing encrypted WEG data streams. Also, techniques for “watermarking“ televi
8、sion signals for identification and copying allowances are presented. The material herein contains both general descriptions and discussions of specific technical approaches to copy protection. Source ITU-T Recommendation J.95 was prepared by ITU-T Study Group 9 (1997-2000) and was approved under th
9、e WTSC Resolution No. 1 procedure on 16 September 1999. Keywords Conditional access, digital television, WEG, security, television, video recording. Recommendation J.95 (09/99) 1 FOREWORD ITU (International Telecommunication Union) is the United Nations Specialized Agency in the field of telecommuni
10、- cations. The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of the ITU. The ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis. The World Tel
11、ecommunication Standardization Conference (WTSC), which meets every four years, establishes the topics for study by the ITU-T Study Groups which, in their turn, produce Recommendations on these topics. The approval of Recommendations by the Members of the ITU-T is covered by the procedure laid down
12、in WTSC Resolution No. 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with IS0 and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate both a telecommunicatio
13、n administration and a recognized operating agency. INTELLECTUAL PROPERTY RIGHTS The ITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right. The ITU takes no position concerning the evidence, vali
14、dity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recommendation, the ITU had not received notice of intellectual property, protected by patents, which may be
15、required to implement this Recommendation. However, implementors are cautioned that this may not represent the latest information and are therefore strongly urged to consult the TSB patent database. O ITU 2001 All rights reserved. No part of this publication may be reproduced or utilized in any form
16、 or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing fiom the ITU. Recommendation J.95 (09/99) 11 CONTENTS Introduction and background Scope References (Informative) Definitions Watermarking of digital television intellectual property 5.1 Ba
17、ckground and functional requirements 5.2 Implications for design approach Access control copy protection measures . Background and functional requirements - WEG digital signals . 6.3 Authorization centre functionality . electronics equipment . Access control copy protection . 6.1 6.2 Background and
18、functional requirements - Analogue signals Factors regarding the inclusion of copy protection functionality into cable television and consumer 7.1 Watermarking 7.2 7.3 Other impacts Appendix I . The EBU approach to copy protection of television intellectual property delivered on secondary cable TV s
19、ystems Appendix II . Galaxy watermark proposal II . 1 11.2 11.3 11.4 11.5 11.6 11.7 11.8 11.9 Appendix III III . 1 111.2 111.3 111.4 111.5 111.6 111.7 111.8 . System Architecture Generation Copy Control Technical mahuity Gate Count analysis . Robustness tests False Positive analysis . Embedding tech
20、nology and system . Abbrviations Contact Information . The 5C proposal for the copy protection of WEG video intellectual property Introduction . Terms and abbreviations . The 5C Digital Transmission Content Protection System . Full Authentication Restricted Authentication Content Channel management
21、and protection . System Renewability . AV/C Digital Interface Command Set Extensions Recommendation J.95 (0999) Page 1 1 1 2 3 3 4 4 4 4 4 5 5 5 5 5 7 8 11 11 12 12 13 14 15 15 16 16 21 21 23 30 34 43 45 1 111 Recommendation J.95 COPY PROTECTION OF INTELLECTUAL PROPERTY FOR CONTENT DELIVERED ON CABL
22、E TELEVISION SYSTEMS (Geneva, 1999) 1 Introduction and background The illegal recording and duplicating of television intellectual property has resulted in a very large illegal business worldwide, and has cost the owners of the intellectual property significant funds in lost revenue. With the change
23、 to digital WEG television, the problem is exacerbated because digital recordings can be duplicated in their original quality over many generations, whereas analogue recordings are reduced in fidelity with each successive generation, and become unusable at some point. In systems where the WEG digita
24、l signal is received and rendered into an analogue equivalent for viewing on an analogue-only television receiver, the quality of that analogue signal causes it to be a target for pirating also, and thus must be protected. To assist in these goals, approaches have been developed for hiding digital m
25、arkings in digital television intellectual property in a manner that is both undetectable and incorruptible. This process, called “watermarking“, is based on the science of cryptography but is not cryptographic in itself, and it contains the identity of the property owner and that owners rules regar
26、ding copies, namely, none, one copy for personal use, or unlimited copies. In addition to watermarking, copy protection requires that clear-text WEG digital television signals, or their analogue equivalents, are never allowed to traverse signal lines outside of the physical boundaries of the in-home
27、 consumer electronics equipment. To accommodate this requirement, a secondary scrambling system is required to temporarily cover these signals during their in-premises distribution, whether in digital or analogue format. A cryptographic system is proposed to cover the digital WEG signals, and an exi
28、sting commercial system which rapidly varies the timing is proposed to cover the analogue signals. To accommodate legal action against any one who would subvert these countermeasures, it is desired that the processes be proprietary and protected by licensing procedures. However, the licensing should
29、 be carefully crafted so as not to produce unnecessary discrimination andor disadvantage to companies who must produce these copy protection systems. 2 Scope This Recommendation describes both the cryptographic techniques to protect access to clear-text WEG digital television signals, and a process,
30、 known as “watermarking“ which indelibly marks the intellectual property as to its owner and that owners requirements regarding copying. A successful copy protection system supports the legal privilege of the owner of the IPR to control the distribution of the protected product. Approaches to copy p
31、rotection for content described in this Recommendation should be considered for use in other applications that require similar protection, such as over-the-air broadcasting, distribution of recorded programmes (e.g. by DVD), etc. 3 References (Informative) - 1394 Trade Association, Specification for
32、 AVIC Digital Interface Command Set. - Digital Transmission Protection License Agreement, Development and Evaluation License, Digital Transmission Licensing Authority. - Digital Transmission Licensing Administrator, 5C Digital Transmission Content Protection Specification, Volume 1 , Version 0.9 1.
33、Recommendation J.95 (09/99) 1 Digital Transmission Licensing Administrator, 5C Digital Transmission Content Protection Specijcation, Volume 2, Version 0.90. IEC 61883-1 (1998), Consumer audio/video Equipment - Digital Interface -Part 1: General. IEEE Std 1394-1995, IEEEs Standardfor a High Performan
34、ce Serial Bus. IEEE P1363, Editorial Contribution to Standard for Public Key Cyptography, Preliminary Draft, P1363ID3 (May 11 , 1998). National Institute of Standards and Technology (NIST), Secure Hash Standard (SHS, FIPS Publication 180-1 , 17 April, 1995. Toshiba Corporation, Eficient Implementati
35、on of an Elliptic Cume Cyptosystem (available at http:/wwW). Definitions This Recommendation defiies the following terms: 4.1 algorithm: A mathematical process that can be used for the scrambling and descrambling of a data stream. 4.2 authentication: The process intended to allow the system to check
36、 with certainty the identification of a party. 4.3 authorization coding: A digital word that describes the personality or service access capability of the subscriber decoder unit. NOTE - This code word, which is based on the service access authorized by the billing system, determines which keys are
37、distributed to each customer, and is required at the subscriber decoder to authorize the descrambling of any specific programme. 4.4 Conditional Access system (CA): The complete system for ensuring that cable services are accessible only to those who are entitled to receive them, and that the orderi
38、ng of such services is not subject to modification or repudiation. 4.5 key in electronic cryptographic systems). 4.6 number of bits that can be securely encrypted before it becomes advisable to change the key. 4.7 sound, and data services. 4.8 electronic key: The term for data signals that are used
39、to control the descrambling process in subscriber decoders. NOTE - There are at least three types of electronic keys: those used for television signal streams, those used for protecting control system operations, and those used for the distribution of electronic keys on the cable system. See also “a
40、uthorization coding“ which is also effectively a key. 4.9 4.10 operating hours of the delivery system. NOTE - By contrast, other services, such as a pay-per-view feature film, are only available for a specific period of time. 4.11 connected. cryptanalysis: The science of recovering the plaintext of
41、a message without access to the key (to the electronic cryptographic duty cycle: The maximum secure capacity of a cryptographic process, based on the total descrambling: The process of reversing the scrambling function (see “scrambling“) to yield usable pictures, encryption: The process of scramblin
42、g signals to avoid unauthorized access. full period terminated service: A subscription service that is always available to subscribers during the host: A device with generalized functionality where modules containing specialized functionality can be 4.12 unauthorized results. integrity: The ability
43、of a function to withstand being usurped for unauthorized use, or modified to yield 4.13 to internal functionality by unauthorized parties. 4.14 4.15 having sent the message. intrusion resistance: The ability of a hardware object to deny physical, electrical, or irradiation-based access module: A sm
44、all device, not working by itself, designed to run specialized tasks in association with a host. non-repudiation: A process by which the sender of a message (e.g. a request on a pay-per-view) cannot deny 2 Recommendation J.95 (09/99) 4.16 one-way hash: A mathematical process or algorithm whereby a v
45、ariable length message is changed into a fiied-length digital word, such that it is very difficult to calculate the original message from the word, and also very difficult to find a second message with the same word. 4.17 period of time. pay-per-view: A payment system whereby the subscriber can pay
46、for an individual programme or specified 4.18 access for unauthorized reception. piracy: The act of acquiring unauthorized access to programmes, usually for the purpose of reselling such 4.19 public key cryptography: A cryptographic technique based upon a two-key algorithm, private and public, where
47、in a message is encrypted with the public key but can only be decrypted with the private key. Also known as a Private-Public Key (PPK) system. NOTE - Knowing the public key does not reveal the private key. Example: Party A would devise such a private and public key, and send the public key openly to
48、 all who might wish to communicate with Party A, but retain the private key in secret. Then, while any who have the public key can encrypt a message for Party A, only Party A with the private key can decrypt the messages. 4.20 unauthorized parties. scrambling: The process of using an encryption func
49、tion to render television and data signals unusable to 4.21 secure signature: A mathematical process by which the origin and integrity of a transmitted message can be ascertained. NOTE - If a secure signature system is used, the originator cannot deny having sent the message, and the receiver can determine if the message has been modified. 4.22 transport stream: An MPEG-2 Transport Stream. 5 Watermarking of digital television intellectual property 5.1 Background and functional requirements One of the basic requirements for defining intellectual property is that it must be m