ITU J.197:2005

ITU J.197:2005 High Level Requirements For A Digital Rights Management (drm) Bridge From A Cable Access Network To A Home Network Defines the requirements of a Digital Rights Management bridge from a cable access network to a home network, to which many types of content (e.g., video, audio, etc.) may be transferred by the networ

More details

Download

PDF AVAILABLE FORMATS IMMEDIATE DOWNLOAD
$17.53 tax incl.

$39.83 tax incl.

(price reduced by 56 %)

1000 items in stock

Table of Contents

1Scope
2References
2.1Normativereferences
2.2Informativereferences
3Termsanddefinitions
4Abbreviations,acronymsandconventions
5Overview
5.1Keygoals
5.2Keyfeatures
5.3Keytechnicalpoints
5.4DRMbridgegeneralrequirements
5.5Background
6Robustnessrequirements
6.1Construction
6.2Controlledcontentpaths
6.3Methodsofmakingfunctionsrobust
7Compliancerules
7.1Introduction
7.2Outputs
7.3Copying,recording,andstorageofcontrolled
content
8Changecontrol
AnnexA-Copycontrolinformation
A.1Channelchange
A.2CCIDefinition
A.3EMI-digitalcopycontrolbits
A.4APS-analogueprotectionsystem
A.5CIT-constrainedimagetrigger
A.6Authenticatedtunnelprotocol
AnnexB-Robustnesschecklist
AppendixI-Digitaloutputs
AppendixII-Reviewcriteria
II.1Videotransport
II.2Securityinterfaces
II.3Pointsofattackandsystemweaknesses
II.4Effectivenessofproposedtechnology
II.5Securityprocessing
II.6Revocationandrenewabilityofkeys
II.7Newalgorithms
II.8Preservationofserviceintegrity
II.9Licensingterms
II.10Overallimpactonthevideodistributionnetwork
AppendixIII-Elementsoftechnologyreviewsubmission
III.1Licenseterms
III.2Securityoverview
III.3Videotransport
III.4Contentprotectionprofiles
III.5Keyexchangealgorithms
III.6Securityinterfaces
III.7Securityprocessing
III.8Certificatemanagement
III.9Revocation/renewabilityofkey
III.10Pointsofattack/potentialweaknesses
III.11Commercialuse
III.12Contactinformation

Abstract

Defines the requirements of a Digital Rights Management bridge from a cable access network to a home network, to which many types of content (e.g., video, audio, etc.) may be transferred by the network operator with assurance that the content is not used in a manner that is a violation of any service agreements or legal requirements.

Contact us