1. Trang chủ
  2. » Công Nghệ Thông Tin

iptv security - protecting high-value digital contents

255 201 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 255
Dung lượng 3,39 MB

Nội dung

[...]... over the type of contents immediately available, as well as two-way communication with content providers A few years ago, another new technology shocked the entertainment industry – the infamous Napster enabled people to share music and movies in an unprecedented way With IPTV Security: Protecting High-Value Digital Contents David Ramirez © 2008 Alcatel-Lucent All Rights Reserved 2 IPTV Security this... History of Video and Television IPTV is based on video standards for the operation of the service Camcorders and computers supported the development of a number of technologies and inventions around video, and IPTV Security: Protecting High-Value Digital Contents David Ramirez © 2008 Alcatel-Lucent All Rights Reserved 10 IPTV Security these have been integrated into the IPTV service The evolution of... personal video recorders, digital video recorders, digital video Disc, high-definition TV and many others, even allowing viewers to use personal computers to have access to videos IPTV relies on modern video technology to broadcast contents Video is captured using high- and standard-definition cameras creating high-quality feeds that, in turn, are either stored or transmitted to the IPTV service provider...viii Contents 3 IPTV Architecture 3.1 High-level Architecture 3.1.1 Service Types 3.2 Functional Architecture for the IPTV Service 3.2.1 Content Provision 3.2.2 Content Delivery 3.2.3 IPTV Control 3.2.4 Subscriber Functions 3.2.5 Security 3.3 Detailed IPTV Architecture 3.3.1 Head End (IPTV Service Provider) 3.3.1.1 Critical Elements of the Head... 147 147 147 Contents xi 5.4.2.3 STB Platform SW 5.4.2.4 DVR/PVR 5.4.2.5 STB Credentials 5.4.2.6 Digital Certificate (Software Provider) 5.4.2.7 STB Digital Certificate 5.4.2.8 Public Keys (Used for Digital Certificates) 5.4.3 STB User Storage 5.4.3.1 Downloaded Content 5.4.3.2 User-created Content 5.4.3.3 STB Smart Card 5.4.3.4 STB Credentials 5.4.3.5 STB Digital Certificate 5.4.3.6 STB High-definition... Application 5.4.7.1 MPEG-2 and MPEG-4 Video Stream 5.4.7.2 DSM-CC 5.4.8 Middleware Application 5.4.8.1 EPG 5.4.8.2 Menus 5.4.8.3 Subscriber Credentials 5.4.8.4 Purchasing Information 5.4.8.5 Digital Certificates (Content Provider) 5.4.8.6 Parental Controls 5.4.8.7 PVR/DVR Application 5.4.8.8 User-sourced Content 5.4.9 Application Management 5.4.9.1 IPTV Usage Information 5.4.9.2 IPTV Billing Information... 206 207 208 208 210 211 Appendix 2 Federated Identity in IPTV Environments A2.1 Introduction A2.2 IPTV Federated Identity Solutions A2.2.1 SAML for Security 217 217 217 218 Contents xiii A2.2.1.1 The SAML Process A2.2.1.2 Reviewing Existing Standards A2.3 Applicability to an IPTV Security Environment A2.3.1 Internal Applications A2.3.2 Set Top Box Security A2.4 Video on Demand 218 220 220 220 221 221... The following chapters of this book will cover some of the basic measures required to implement IPTV security Chapter 1 will cover an initial reference to threats to IPTV infrastructures, including known attacks and effects on the IPTV solution Introduction to IPTV 3 Chapter 2 will cover references to the IPTV architecture, operation, elements and known requirements This will provide the novice with... broadcast Simple software modifications introduced by hackers allow them to break the encryption system and other security measures, or even capture and redistribute the contents using peer-to-peer networks The main fact related to access fraud is that, in order for an IPTV system to work, end-users have to be provided with the encrypted content, encryption algorithm and the encryption keys Anyone familiar... authorized access The DSLAM will block any access between systems, avoiding peer-to-peer connections that may result in hacking incidents or unauthorized access to content 1.2.2 Unauthorized Broadcasting IPTV contents are distributed in digital format, simplifying the work of any individual with an interest in copying or broadcasting the contents One of the arguments in the campaign against movie piracy is that . alt="" IPTV Security Protecting High-Value Digital Contents David Ramirez Alcatel-Lucent, UK This page intentionally left blank IPTV Security This page intentionally left blank IPTV Security Protecting. Data Ramirez, David. IPTV security :protecting high-value digital contents /David Ramirez. p. cm. Includes index. ISBN 97 8-0 -4 7 0-5 192 4-0 (cloth) 1. Internet television. 2. Computer security. I. Title. TK5105.887.R36. page intentionally left blank IPTV Security Protecting High-Value Digital Contents David Ramirez Alcatel-Lucent, UK Copyright © 2008 Alcatel-Lucent. All Rights Reserved. Published by John Wiley

Ngày đăng: 25/03/2014, 11:47

TỪ KHÓA LIÊN QUAN