IPTV security: protecting high-value digital contents
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Chichester [u.a.]
John Wiley
2008
|
Schlagworte: | |
Online-Zugang: | Publisher description lizenzfrei Inhaltsverzeichnis |
Beschreibung: | Includes index |
Beschreibung: | XVI, 234 S. graph. Darst. |
ISBN: | 9780470519240 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV023290596 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 080506s2008 d||| j||| 00||| eng d | ||
020 | |a 9780470519240 |c cloth |9 978-0-470-51924-0 | ||
035 | |a (OCoLC)173480528 | ||
035 | |a (DE-599)GBV545980429 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1043 |a DE-Po75 | ||
050 | 0 | |a TK5105.887 | |
082 | 0 | |a 621.388 |2 22 | |
084 | |a ZN 6380 |0 (DE-625)157558: |2 rvk | ||
100 | 1 | |a Ramirez, David |e Verfasser |4 aut | |
245 | 1 | 0 | |a IPTV security |b protecting high-value digital contents |c David Ramirez |
264 | 1 | |a Chichester [u.a.] |b John Wiley |c 2008 | |
300 | |a XVI, 234 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes index | ||
650 | 0 | |a Internet television | |
650 | 0 | |a Computer security | |
650 | 4 | |a Computer security | |
650 | 4 | |a Internet television | |
655 | 7 | |0 (DE-588)4173536-5 |a Patentschrift |2 gnd-content | |
856 | 4 | |u http://www.loc.gov/catdir/enhancements/fy0745/2007039302-d.html |z Publisher description |z lizenzfrei | |
856 | 4 | |u http://www.loc.gov/catdir/enhancements/fy0745/2007039302-t.html |z lizenzfrei |3 Inhaltsverzeichnis | |
856 | 4 | 2 | |m GBV Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016475212&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-016475212 |
Datensatz im Suchindex
_version_ | 1804137613732347904 |
---|---|
adam_text | IPTV SECURITY PROTECTING HIGH-VALUE DIGITAL CONTENTS DAVID RAMIREZ
ALCATEL-LUCENT, UK JOHN WILEY & SONS, LTD CONTENTS PREFACE XV ABOUT THE
AUTHOR XVII 1 INTRODUCTION TO IPTV 1 1.1 INTRODUCTION 1 1.2 GENERAL
THREATS TO IPTV DEPLOYMENTS 3 1.2.1 ACCESS FRAUD 4 1.2.2 UNAUTHORIZED
BROADCASTING 5 1.2.3 ACCESS INTERRUPTION 5 1.2.4 CONTENT CORRUPTION 6 2
PRINCIPLES SUPPORTING IPTV 9 2.1 HISTORY OF VIDEO AND TELEVISION 9 2.1.1
TELEVISION 10 2.2 VIEWING EXPERIENCE OF VIDEO 15 2.2.1 LINE SCANNING 15
2.2.2 VIDEO RESOLUTION 15 2.2.3 NUMBER OF PICTURES PER SECOND 16 2.2.4
ASPECT RATIO 16 2.2.5 VIDEO COMPRESSION METHOD 16 2.3 VIDEO COMPRESSION
16 2.3.1 MPEG-2 17 2.3.2 H.263 18 2.3.3 MPEG-4 18 2.4 TCP/IP PRINCIPLES
19 2.4.1 ADDRESSES 1 9 2.4.2 ROUTING 20 2.4.2.1 IP PACKET 20 2.5 SUMMARY
21 REFERENCES 22 BIBLIOGRAPHY 22 VIIL CONTENTS 3 IPTV ARCHITECTURE 23
3.1 HIGH-LEVEL ARCHITECTURE 23 3.1.1 SERVICE TYPES 25 3.2 FUNCTIONAL
ARCHITECTURE FOR THE IPTV SERVICE 25 3.2.1 CONTENT PROVISION 26 3.2.2
CONTENT DELIVERY 26 3.2.3 IPTV CONTROL 26 3.2.4 SUBSCRIBER FUNCTIONS 26
3.2.5 SECURITY 27 3.3 DETAILED IPTV ARCHITECTURE 28 3.3.1 HEAD END (IPTV
SERVICE PROVIDER) 28 3.3.1.1 CRITICAL ELEMENTS OF THE HEAD END 29
3.3.1.2 CONTENT INPUT 30 3.3.1.3 MPEG VIDEO ENCODER 32 3.3.1.4 IP
ENCAPSULATOR 33 3.3.1.5 VIDEO TRANSCODER 34 3.3.1.6 CONTENT MANAGEMENT
SERVER 34 3.3.1.7 VIDEO REPOSITORY 35 3.3.1.8 DIGITAL RIGHTS MANAGEMENT
36 3.3.1.9 VIDEO STREAMING SERVER 37 3.3.1.10 SUBSCRIBER INTERACTION 37
3.3.2 TRANSPORT AND AGGREGATION NETWORK (IPTV NETWORK PROVIDER) 40
3.3.2.1 RP AND RTSP 49 3.3.2.2 RTSP 49 3.3.2.3 ISMACRYP 51 3.3.2.4 PIM
52 3.3.2.5 MSDP 53 3.3.2.6 DSM-CC 53 3.3.2.7 INTERNET SERVICE PROVIDER
53 3.3.2.8 DSLAM 53 3.3.3 HOME END (SUBSCRIBER) 57 3.3.3.1 SET TOP BOX
58 3.4 SUMMARY 61 REFERENCES 62 4 INTELLECTUAL PROPERTY 63 4.1
INTRODUCTION 63 4.2 SUPPORTING TECHNOLOGY 73 4.2.1 SYMMETRIE KEY
CRYPTOGRAPHY 73 4.2.2 ASYMMETRIE KEY CRYPTOGRAPHY 74 4.2.3 HYBRID
ENCRYPTION 74 4.2.4 HASH- DIGEST 74 4.2.5 COMMONLY USED ALGORITHMS 75
4.2.6 PUBLIC KEY INFRASTRUCTURE AND ITU-TRECOMMENDATION X.509 76 4.2.7
OPERATION OFPKI 80 4.2.8 SECURE SOCKET LAYER AND TRANSPORT LAYER
SECURITY 81 4.3 GENERAL MECHANISMS FOR CONTENT PROTECTION 82 4.3.1 CPS
82 4.3.2 CAS 83 4.3.3 DRM 83 CONTENTS IX 4.4 OPERATION OF DRM ON IPTV 86
4.4.1 DRM APPLIED TOVOD 87 4.4.2 DRM APPLIED TO BROADCAST TV 88 4.4.3
SMART CARDS AND DRM 88 4.4.4 STORAGE PROTECTION 8 9 4.4.4.1 VCPS 89
4.4.4.2 CPRM/CPPM (CPSA) 89 4.4.5 OPENDRMS 89 4.4.5.1 SDMI 89 4.4.5.2
OMA DRM 90 4.4.5.3 DMP 90 4.4.5.4 MPEG21 91 4.4.5.5 MPEG21 REL DATA
MODEL 91 4.4.5.6 DVB-CPCM 91 4.4.5.7 DVB-CBMS 91 4.4.5.8 PERM 92 4.4.5.9
DCAS 92 4.4.5.10 DREAM 92 4.4.5.11 OPENIPMP 93 4.4.5.12 OPENCA 93
4.4.5.13 PACHYDRM 93 4.4.6 INTEROPERABILITY PROPOSAIS 93 4.4.6.1 CORAL
93 4.4.6.2 DMP 94 4.4.6.3 SMARTRIGHT 94 4.4.6.4 SVP 94 4.4.6.5 OPENCP 95
4.4.6.6 OMARLIN 95 4.5 WATERMARKING AND FINGERPRINTING 95 4.5.1 HISTORY
95 4.5.2 STEGANOGRAPHY TECHNIQUES 98 4.5.3 WATERMARKING AND
FINGERPRINTING PRINCIPLES 99 4.5.4 TYPICAL ATTACKS 101 4.5.5 FORENSIC
USE OF DIGITAL FINGERPRINTS 103 4.6 WWW? (WHAT WENT WRONG?) 105 4.6.1
INTRODUCTION 105 4.6.2 SATELLITE TELEVISION 106 4.6.3 DVD PROTECTION 107
4.6.4 AACS ON BLUE-RAY AND HD-DVD 108 4.6.5 VIDEOS OVER THE WEB 110 4.7
AUTHENTICATION 111 4.8 SINNMARY 111 REFERENCES 112 BIBLIOGRAPHY 113 5
EXISTING THREATS TO IPTV IMPLEMENTATIONS 115 CO-AUTHORED BY ANDREW R.
MCGEE, FRANK A. BASTRY AND DAVID RAMIREZ 5.1 INTRODUCTION TO IPTV
THREATS 118 5.1.1 SPECIFIC THREATS TO IPTV ENVIRONMENTS 120 5.2 IPTV
SERVICE PROVIDER - HEAD END 125 5.2.1 VIDEO FEEDS - LIVE OR PRERECORDED
(PHYSICAL MEDIA, OTA, ETC.) 126 X CONTENTS 5.2.2 VIDEO SWITCH 126 5.2.3
INGEST GATEWAY (VIDEO CAPTURE) 121 5.2.4 PLATFORM SW/OS - STORED/RUNNING
127 5.2.5 CONTENT MANAGEMENT SYSTEM 127 5.2.6 CONTENT METADATA FROM
VIDEO REPOSITORY 128 5.2.7 MPEG-2 CONTENT FROM VIDEO REPOSITORY 128
5.2.8 MPEG-4 CONTENT 128 5.2.9 LOAD BALANCER SOFTWARE 129 5.2.10 MASTER
VIDEO STREAMING SOFTWARE 129 5.2.11 CA/DRM SERVICE 129 5.2.12 SRTP KEYS
129 5.2.13 ISMACRYP KEY 130 5.2.14 KEY MANAGEMENT PROTOCOL 130 5.2.15
CA/DRM SERVICE ADMINISTRATION 13 1 5.2.16 VOD APPLICATION - CACHED VIDEO
CONTENT METADATA 131 5.2.17 CACHED MPEG-2/MPEG-4 CONTENT (PRIMARY AND
SECONDARY STORAGE) 131 5.2.18 VIDEO STREAMING SOFTWARE 132 5.2.19 LOCAL
AD INSERTION AUTHENTICATION INFORMATION (E.G. USER ID(S) AND
PASSWORDFS)) 132 5.2.20 LOCAL AD METADATA 132 5.2.21 LOCAL AD
MPEG-2/MPEG-4 CONTENT 133 5.2.22 LOCAL AD INSERTION TRACKING INFORMATION
133 5.2.23 NPVR APPLICATION RECORDED/STORED CONTENT METADATA 133 5.2.24
RECORDED/STORED MPEG-2/MPEG-4 CONTENT 134 5.2.25 NPVR/VIDEO RECORDING
SOFTWARE 134 5.3 IPTV NETWORK PROVIDER - TRANSPORT AND AGGREGATION
NETWORK 134 5.3.1 PROTOCOL VULNERABILITIES 134 5.3.2 CONTENT
DISTRIBUTION SERVICE: UNICAST CONTENT PROPAGATION - FTP OR OTHER
TRANSPORT PROTOCOL 137 5.3.3 MULTICAST CONTENT PROPAGATION 137 5.3.3.1
IGMPV2/V3 (SNOOPING) 137 5.3.3.2 PIM (SM, SSM, SNOOPING) 138 5.3.3.3
MBGP 139 5.3.3.4 MSDP 139 5.3.3.5 MFTP 140 5.3.3.6 RTP 141 5.3.4 QOS
SIGNALING (RSVP, DIFSSERV) 141 5.3.5 MANAGEMENT OF CONTENT DISTRIBUTION
SERVICE 142 5.3.6 CONNECTION MANAGEMENT SERVICE 142 5.3.6.1 DSM-CC
PROTOCOL 143 5.3.6.2 RTSP PROTOCOL 143 5.3.6.3 MPEG-2 VIDEO STREAM 143
5.3.6.4 MPEG-4 VIDEO STREAM 144 5.3.6.5 DSM-CC 144 5.3.6.6 RTSP 145 5.4
IPTV SUBSCRIBER - HOME END 145 5.4.1 SET TOP BOX 145 5.4.2 STB EXECUTING
SOFTWARE 147 5.4.2.1 DRM SOFTWARE 147 5.4.2.2 MIDDLEWARE CLIENT SW 147
CONTENTS XI 5.4.2.3 STB PLATFORM SW 148 5.4.2.4 DVR/PVR 148 5.4.2.5 STB
CREDENTIALS 149 5.4.2.6 DIGITAL CERTIFICATE (SOFTWARE PROVIDER) 150
5.4.2.7 STB DIGITAL CERTIFICATE 150 5.4.2.8 PUBLIC KEYS (USED FOR
DIGITAL CERTIFICATES) 151 5.4.3 STB USER STORAGE 151 5.4.3.1 DOWNLOADED
CONTENT 151 5.4.3.2 USER-CREATED CONTENT 152 5.4.3.3 STB SMART CARD 152
5.4.3.4 STB CREDENTIALS 152 5.4.3.5 STB DIGITAL CERTIFICATE 153 5.4.3.6
STB HIGH-DEFINITION OUTPUT INTERFACE 153 5.4.3.7 DVI 154 5.4.4
RESIDENTIAL GATEWAY 154 5.4.5 DSLAM 154 5.4.5.1 AUDIENCE METERING
INFORMATION 154 5.4.5.2 FRAUD CONTROL INFORMATION 155 5.4.5.3 IP FILTERS
155 5.4.6 BROADCAST/MULTICAST TV VLAN SERVICE 156 5.4.6.1 DECRYPTION
KEYS 156 5.4.6.2 CWMP 157 5.4.6.3 NTP/SNTP 157 5.4.7 BROADCAST/MULTICAST
TV APPLICATION 158 5.4.7.1 MPEG-2 AND MPEG-4 VIDEO STREAM 158 5.4.7.2
DSM-CC 158 5.4.8 MIDDLEWARE APPLICATION 158 5.4.8.1 EPG 158 5.4.8.2
MENUES 159 5.4.8.3 SUBSCRIBER CREDENTIALS 159 5.4.8.4 PURCHASING
INFORMATION 160 5.4.8.5 DIGITAL CERTIFICATES (CONTENT PROVIDER) 161
5.4.8.6 PARENTAL CONTROLS 161 5.4.8.7 PVR/DVR APPLICATION 162 5.4.8.8
USER-SOURCED CONTENT 162 5.4.9 APPLICATION MANAGEMENT 163 5.4.9.1 IPTV
USAGE INFORMATION 163 5.4.9.2 IPTV BILLING INFORMATION 164 5.5
CONCLUSION 165 6 COUNTERING THE THREATS 167 6.1 SECURING THE BASIS 167
6.1.1 HARDENING OPERATING SYSTEMS 167 6.1.2 BUSINESS CONTINUITY 172
6.1.3 INTRUSION DETECTION/INTRUSION PREVENTION 173 6.1.4 NETWORK
FIREWALLS IIA 6.1.5 FRAUD PREVENTION 175 6.1.6 DRM-CAS 176 6.2 HEAD END
(IPTV SERVICE PROVIDER) 176 6.2.1 CRITICAL ELEMENTS OF THE HEAD END 176
6.2.2 CONTENT INPUT 11 XII CONTENTS 6.2.2.1 SATELLITE FEED 6.2.2.2
PREMIUM AND DIRECT-FEED CONTENT, PRE-ENCODED CONTENT READY TO BE
ENCAPSULATED 6.2.2.3 PHYSICAL MEDIA 6.2.3 MPEG VIDEO ENCODER AND VIDEO
TRANSCODER FUNCTIONS 6.2.4 IP ENCAPSULATOR 6.2.5 CONTENT MANAGEMENT
SERVER 6.2.6 VIDEO REPOSITORY 6.2.7 DIGITAL RIGHTS MANAGEMENT 6.2.8
VIDEO STREAMING SERVER 6.2.8.1 IGMPV2/V3 6.2.8.2 MBGP 6.2.8.3 MSDP
6.2.8.4 RTP 6.2.8.5 RTSP PACKETS 6.2.8.6 RSVP 6.2.9 MIDDLEWARE SERVER
6.3 AGGREGATION AND TRANSPORT NETWORK 6.3.1 DSLAM 6.3.1.1 ACCESS AND
SESSION CONTROL 6.3.1.2 ROUTING 6.3.1.3 USER SEGREGATION 6.3.1.4 QUALITY
OF SERVICE 6.3.1.5 VIRTUAL NETWORKS AND VIRTUAL CIRCUITS 6.3.1.6 802.1X
AUTHENTICATION 6.3.2 FIREWALLS 6.4 HOME END 6.4.1 RESIDENTIAL GATEWAY
6.4.1.1 FILTERING 6.4.1.2 QUALITY OF SERVICE 6.4.2 SET TOP BOX 6.4.2.1
SECURE PROCESSOR 6.4.2.2 DRM 6.4.2.3 OUTPUT PROTECTION 6.5 SECURE IPTV A
REALITY REFERENCES APPENDIX 1 CONVERGED VIDEO SECURITY AL.L INTRODUCTION
AI.2 THREATS TO IPTV DEPLOYMENTS AI.3 PROTECTING INTELLECTUAL PROPERTY
AI .4 VOD AND BROADCAST AI.5 SMART CARDS AND DRM AI.6 COUNTERING THE
THREATS AI.6.1 THREAT REFERENCES AL.6.2 THREAT MODELS APPENDIX 2
FEDERATED IDENTITY IN IPTV ENVIRONMENTS A2.1 INTRODUCTION A2.2 IPTV
FEDERATED IDENTITY SOLUTIONS A2.2.1 SAMLFOR SECURITY 11 178 179 179 180
182 182 184 187 188 188 188 188 189 189 189 190 190 191 193 193 194 194
195 196 197 197 197 198 198 198 200 200 201 202 205 205 205 206 207 208
208 210 211 217 217 217 218 CONTENTS XIII A2.2.1.1 THE SAML PROCESS 218
A2.2.1.2 REVIEWING EXISTING STANDARDS 220 A2.3 APPLICABILITY TO AN IPTV
SECURITY ENVIRONMENT 220 A2.3.1 INTERNAL APPLICATIONS 220 A2.3.2 SET TOP
BOX SECURITY 221 A2.4 VIDEO ON DEMAND 221 APPENDIX 3 BARBARIANS AT THE
GATE 223 A3.1 BARBARIANS AT THE GATE 223 A3.2 HOW TO BREAK AN IPTV
ENVIRONMENT 224 A3.3 NETWORK UNDER SIEGE 224 A3.3.1 CONFLDENTIALITY 224
A3.3.2 INTEGRITY 225 A3.3.3 AVAILABILITY 225 A3.4 COUNTERMEASURES 225
A3.4.1 SET TOP BOX 225 A3.4.2 DSLAM 226 A3.4.3 ROUTING 227 A3.4.4 USER
SEGREGATION 228 A3.4.5 QUALITY OF SERVICE 228 A3.4.6 VIRTUAL NETWORKS
AND VIRTUAL CIRCUITS 229 A3.5 CONCLUSION 229 INDEX 231
|
adam_txt |
IPTV SECURITY PROTECTING HIGH-VALUE DIGITAL CONTENTS DAVID RAMIREZ
ALCATEL-LUCENT, UK JOHN WILEY & SONS, LTD CONTENTS PREFACE XV ABOUT THE
AUTHOR XVII 1 INTRODUCTION TO IPTV 1 1.1 INTRODUCTION 1 1.2 GENERAL
THREATS TO IPTV DEPLOYMENTS 3 1.2.1 ACCESS FRAUD 4 1.2.2 UNAUTHORIZED
BROADCASTING 5 1.2.3 ACCESS INTERRUPTION 5 1.2.4 CONTENT CORRUPTION 6 2
PRINCIPLES SUPPORTING IPTV 9 2.1 HISTORY OF VIDEO AND TELEVISION 9 2.1.1
TELEVISION 10 2.2 VIEWING EXPERIENCE OF VIDEO 15 2.2.1 LINE SCANNING 15
2.2.2 VIDEO RESOLUTION 15 2.2.3 NUMBER OF PICTURES PER SECOND 16 2.2.4
ASPECT RATIO 16 2.2.5 VIDEO COMPRESSION METHOD 16 2.3 VIDEO COMPRESSION
16 2.3.1 MPEG-2 17 2.3.2 H.263 18 2.3.3 MPEG-4 18 2.4 TCP/IP PRINCIPLES
19 2.4.1 ADDRESSES 1 9 2.4.2 ROUTING 20 2.4.2.1 IP PACKET 20 2.5 SUMMARY
21 REFERENCES 22 BIBLIOGRAPHY 22 VIIL CONTENTS 3 IPTV ARCHITECTURE 23
3.1 HIGH-LEVEL ARCHITECTURE 23 3.1.1 SERVICE TYPES 25 3.2 FUNCTIONAL
ARCHITECTURE FOR THE IPTV SERVICE 25 3.2.1 CONTENT PROVISION 26 3.2.2
CONTENT DELIVERY 26 3.2.3 IPTV CONTROL 26 3.2.4 SUBSCRIBER FUNCTIONS 26
3.2.5 SECURITY 27 3.3 DETAILED IPTV ARCHITECTURE 28 3.3.1 HEAD END (IPTV
SERVICE PROVIDER) 28 3.3.1.1 CRITICAL ELEMENTS OF THE HEAD END 29
3.3.1.2 CONTENT INPUT 30 3.3.1.3 MPEG VIDEO ENCODER 32 3.3.1.4 IP
ENCAPSULATOR 33 3.3.1.5 VIDEO TRANSCODER 34 3.3.1.6 CONTENT MANAGEMENT
SERVER 34 3.3.1.7 VIDEO REPOSITORY 35 3.3.1.8 DIGITAL RIGHTS MANAGEMENT
36 3.3.1.9 VIDEO STREAMING SERVER 37 3.3.1.10 SUBSCRIBER INTERACTION 37
3.3.2 TRANSPORT AND AGGREGATION NETWORK (IPTV NETWORK PROVIDER) 40
3.3.2.1 RP AND RTSP 49 3.3.2.2 RTSP 49 3.3.2.3 ISMACRYP 51 3.3.2.4 PIM
52 3.3.2.5 MSDP 53 3.3.2.6 DSM-CC 53 3.3.2.7 INTERNET SERVICE PROVIDER
53 3.3.2.8 DSLAM 53 3.3.3 HOME END (SUBSCRIBER) 57 3.3.3.1 SET TOP BOX
58 3.4 SUMMARY 61 REFERENCES 62 4 INTELLECTUAL PROPERTY 63 4.1
INTRODUCTION 63 4.2 SUPPORTING TECHNOLOGY 73 4.2.1 SYMMETRIE KEY
CRYPTOGRAPHY 73 4.2.2 ASYMMETRIE KEY CRYPTOGRAPHY 74 4.2.3 HYBRID
ENCRYPTION 74 4.2.4 HASH- DIGEST 74 4.2.5 COMMONLY USED ALGORITHMS 75
4.2.6 PUBLIC KEY INFRASTRUCTURE AND ITU-TRECOMMENDATION X.509 76 4.2.7
OPERATION OFPKI 80 4.2.8 SECURE SOCKET LAYER AND TRANSPORT LAYER
SECURITY 81 4.3 GENERAL MECHANISMS FOR CONTENT PROTECTION 82 4.3.1 CPS
82 4.3.2 CAS 83 4.3.3 DRM 83 CONTENTS IX 4.4 OPERATION OF DRM ON IPTV 86
4.4.1 DRM APPLIED TOVOD 87 4.4.2 DRM APPLIED TO BROADCAST TV 88 4.4.3
SMART CARDS AND DRM 88 4.4.4 STORAGE PROTECTION 8 9 4.4.4.1 VCPS 89
4.4.4.2 CPRM/CPPM (CPSA) 89 4.4.5 OPENDRMS 89 4.4.5.1 SDMI 89 4.4.5.2
OMA DRM 90 4.4.5.3 DMP 90 4.4.5.4 MPEG21 91 4.4.5.5 MPEG21 REL DATA
MODEL 91 4.4.5.6 DVB-CPCM 91 4.4.5.7 DVB-CBMS 91 4.4.5.8 PERM 92 4.4.5.9
DCAS 92 4.4.5.10 DREAM 92 4.4.5.11 OPENIPMP 93 4.4.5.12 OPENCA 93
4.4.5.13 PACHYDRM 93 4.4.6 INTEROPERABILITY PROPOSAIS 93 4.4.6.1 CORAL
93 4.4.6.2 DMP 94 4.4.6.3 SMARTRIGHT 94 4.4.6.4 SVP 94 4.4.6.5 OPENCP 95
4.4.6.6 OMARLIN 95 4.5 WATERMARKING AND FINGERPRINTING 95 4.5.1 HISTORY
95 4.5.2 STEGANOGRAPHY TECHNIQUES 98 4.5.3 WATERMARKING AND
FINGERPRINTING PRINCIPLES 99 4.5.4 TYPICAL ATTACKS 101 4.5.5 FORENSIC
USE OF DIGITAL FINGERPRINTS 103 4.6 WWW? (WHAT WENT WRONG?) 105 4.6.1
INTRODUCTION 105 4.6.2 SATELLITE TELEVISION 106 4.6.3 DVD PROTECTION 107
4.6.4 AACS ON BLUE-RAY AND HD-DVD 108 4.6.5 VIDEOS OVER THE WEB 110 4.7
AUTHENTICATION 111 4.8 SINNMARY 111 REFERENCES 112 BIBLIOGRAPHY 113 5
EXISTING THREATS TO IPTV IMPLEMENTATIONS 115 CO-AUTHORED BY ANDREW R.
MCGEE, FRANK A. BASTRY AND DAVID RAMIREZ 5.1 INTRODUCTION TO IPTV
THREATS 118 5.1.1 SPECIFIC THREATS TO IPTV ENVIRONMENTS 120 5.2 IPTV
SERVICE PROVIDER - HEAD END 125 5.2.1 VIDEO FEEDS - LIVE OR PRERECORDED
(PHYSICAL MEDIA, OTA, ETC.) 126 X CONTENTS 5.2.2 VIDEO SWITCH 126 5.2.3
INGEST GATEWAY (VIDEO CAPTURE) 121 5.2.4 PLATFORM SW/OS - STORED/RUNNING
127 5.2.5 CONTENT MANAGEMENT SYSTEM 127 5.2.6 CONTENT METADATA FROM
VIDEO REPOSITORY 128 5.2.7 MPEG-2 CONTENT FROM VIDEO REPOSITORY 128
5.2.8 MPEG-4 CONTENT 128 5.2.9 LOAD BALANCER SOFTWARE 129 5.2.10 MASTER
VIDEO STREAMING SOFTWARE 129 5.2.11 CA/DRM SERVICE 129 5.2.12 SRTP KEYS
129 5.2.13 ISMACRYP KEY 130 5.2.14 KEY MANAGEMENT PROTOCOL 130 5.2.15
CA/DRM SERVICE ADMINISTRATION 13 1 5.2.16 VOD APPLICATION - CACHED VIDEO
CONTENT METADATA 131 5.2.17 CACHED MPEG-2/MPEG-4 CONTENT (PRIMARY AND
SECONDARY STORAGE) 131 5.2.18 VIDEO STREAMING SOFTWARE 132 5.2.19 LOCAL
AD INSERTION AUTHENTICATION INFORMATION (E.G. USER ID(S) AND
PASSWORDFS)) 132 5.2.20 LOCAL AD METADATA 132 5.2.21 LOCAL AD
MPEG-2/MPEG-4 CONTENT 133 5.2.22 LOCAL AD INSERTION TRACKING INFORMATION
133 5.2.23 NPVR APPLICATION RECORDED/STORED CONTENT METADATA 133 5.2.24
RECORDED/STORED MPEG-2/MPEG-4 CONTENT 134 5.2.25 NPVR/VIDEO RECORDING
SOFTWARE 134 5.3 IPTV NETWORK PROVIDER - TRANSPORT AND AGGREGATION
NETWORK 134 5.3.1 PROTOCOL VULNERABILITIES 134 5.3.2 CONTENT
DISTRIBUTION SERVICE: UNICAST CONTENT PROPAGATION - FTP OR OTHER
TRANSPORT PROTOCOL 137 5.3.3 MULTICAST CONTENT PROPAGATION 137 5.3.3.1
IGMPV2/V3 (SNOOPING) 137 5.3.3.2 PIM (SM, SSM, SNOOPING) 138 5.3.3.3
MBGP 139 5.3.3.4 MSDP 139 5.3.3.5 MFTP 140 5.3.3.6 RTP 141 5.3.4 QOS
SIGNALING (RSVP, DIFSSERV) 141 5.3.5 MANAGEMENT OF CONTENT DISTRIBUTION
SERVICE 142 5.3.6 CONNECTION MANAGEMENT SERVICE 142 5.3.6.1 DSM-CC
PROTOCOL 143 5.3.6.2 RTSP PROTOCOL 143 5.3.6.3 MPEG-2 VIDEO STREAM 143
5.3.6.4 MPEG-4 VIDEO STREAM 144 5.3.6.5 DSM-CC 144 5.3.6.6 RTSP 145 5.4
IPTV SUBSCRIBER - HOME END 145 5.4.1 SET TOP BOX 145 5.4.2 STB EXECUTING
SOFTWARE 147 5.4.2.1 DRM SOFTWARE 147 5.4.2.2 MIDDLEWARE CLIENT SW 147
CONTENTS XI 5.4.2.3 STB PLATFORM SW 148 5.4.2.4 DVR/PVR 148 5.4.2.5 STB
CREDENTIALS 149 5.4.2.6 DIGITAL CERTIFICATE (SOFTWARE PROVIDER) 150
5.4.2.7 STB DIGITAL CERTIFICATE 150 5.4.2.8 PUBLIC KEYS (USED FOR
DIGITAL CERTIFICATES) 151 5.4.3 STB USER STORAGE 151 5.4.3.1 DOWNLOADED
CONTENT 151 5.4.3.2 USER-CREATED CONTENT 152 5.4.3.3 STB SMART CARD 152
5.4.3.4 STB CREDENTIALS 152 5.4.3.5 STB DIGITAL CERTIFICATE 153 5.4.3.6
STB HIGH-DEFINITION OUTPUT INTERFACE 153 5.4.3.7 DVI 154 5.4.4
RESIDENTIAL GATEWAY 154 5.4.5 DSLAM 154 5.4.5.1 AUDIENCE METERING
INFORMATION 154 5.4.5.2 FRAUD CONTROL INFORMATION 155 5.4.5.3 IP FILTERS
155 5.4.6 BROADCAST/MULTICAST TV VLAN SERVICE 156 5.4.6.1 DECRYPTION
KEYS 156 5.4.6.2 CWMP 157 5.4.6.3 NTP/SNTP 157 5.4.7 BROADCAST/MULTICAST
TV APPLICATION 158 5.4.7.1 MPEG-2 AND MPEG-4 VIDEO STREAM 158 5.4.7.2
DSM-CC 158 5.4.8 MIDDLEWARE APPLICATION 158 5.4.8.1 EPG 158 5.4.8.2
MENUES 159 5.4.8.3 SUBSCRIBER CREDENTIALS 159 5.4.8.4 PURCHASING
INFORMATION 160 5.4.8.5 DIGITAL CERTIFICATES (CONTENT PROVIDER) 161
5.4.8.6 PARENTAL CONTROLS 161 5.4.8.7 PVR/DVR APPLICATION 162 5.4.8.8
USER-SOURCED CONTENT 162 5.4.9 APPLICATION MANAGEMENT 163 5.4.9.1 IPTV
USAGE INFORMATION 163 5.4.9.2 IPTV BILLING INFORMATION 164 5.5
CONCLUSION 165 6 COUNTERING THE THREATS 167 6.1 SECURING THE BASIS 167
6.1.1 HARDENING OPERATING SYSTEMS 167 6.1.2 BUSINESS CONTINUITY 172
6.1.3 INTRUSION DETECTION/INTRUSION PREVENTION 173 6.1.4 NETWORK
FIREWALLS IIA 6.1.5 FRAUD PREVENTION 175 6.1.6 DRM-CAS 176 6.2 HEAD END
(IPTV SERVICE PROVIDER) 176 6.2.1 CRITICAL ELEMENTS OF THE HEAD END 176
6.2.2 CONTENT INPUT \11 XII CONTENTS 6.2.2.1 SATELLITE FEED 6.2.2.2
PREMIUM AND DIRECT-FEED CONTENT, PRE-ENCODED CONTENT READY TO BE
ENCAPSULATED 6.2.2.3 PHYSICAL MEDIA 6.2.3 MPEG VIDEO ENCODER AND VIDEO
TRANSCODER FUNCTIONS 6.2.4 IP ENCAPSULATOR 6.2.5 CONTENT MANAGEMENT
SERVER 6.2.6 VIDEO REPOSITORY 6.2.7 DIGITAL RIGHTS MANAGEMENT 6.2.8
VIDEO STREAMING SERVER 6.2.8.1 IGMPV2/V3 6.2.8.2 MBGP 6.2.8.3 MSDP
6.2.8.4 RTP 6.2.8.5 RTSP PACKETS 6.2.8.6 RSVP 6.2.9 MIDDLEWARE SERVER
6.3 AGGREGATION AND TRANSPORT NETWORK 6.3.1 DSLAM 6.3.1.1 ACCESS AND
SESSION CONTROL 6.3.1.2 ROUTING 6.3.1.3 USER SEGREGATION 6.3.1.4 QUALITY
OF SERVICE 6.3.1.5 VIRTUAL NETWORKS AND VIRTUAL CIRCUITS 6.3.1.6 802.1X
AUTHENTICATION 6.3.2 FIREWALLS 6.4 HOME END 6.4.1 RESIDENTIAL GATEWAY
6.4.1.1 FILTERING 6.4.1.2 QUALITY OF SERVICE 6.4.2 SET TOP BOX 6.4.2.1
SECURE PROCESSOR 6.4.2.2 DRM 6.4.2.3 OUTPUT PROTECTION 6.5 SECURE IPTV A
REALITY REFERENCES APPENDIX 1 CONVERGED VIDEO SECURITY AL.L INTRODUCTION
AI.2 THREATS TO IPTV DEPLOYMENTS AI.3 PROTECTING INTELLECTUAL PROPERTY
AI .4 VOD AND BROADCAST AI.5 SMART CARDS AND DRM AI.6 COUNTERING THE
THREATS AI.6.1 THREAT REFERENCES AL.6.2 THREAT MODELS APPENDIX 2
FEDERATED IDENTITY IN IPTV ENVIRONMENTS A2.1 INTRODUCTION A2.2 IPTV
FEDERATED IDENTITY SOLUTIONS A2.2.1 SAMLFOR SECURITY \11 178 179 179 180
182 182 184 187 188 188 188 188 189 189 189 190 190 191 193 193 194 194
195 196 197 197 197 198 198 198 200 200 201 202 205 205 205 206 207 208
208 210 211 217 217 217 218 CONTENTS XIII A2.2.1.1 THE SAML PROCESS 218
A2.2.1.2 REVIEWING EXISTING STANDARDS 220 A2.3 APPLICABILITY TO AN IPTV
SECURITY ENVIRONMENT 220 A2.3.1 INTERNAL APPLICATIONS 220 A2.3.2 SET TOP
BOX SECURITY 221 A2.4 VIDEO ON DEMAND 221 APPENDIX 3 BARBARIANS AT THE
GATE 223 A3.1 BARBARIANS AT THE GATE 223 A3.2 HOW TO BREAK AN IPTV
ENVIRONMENT 224 A3.3 NETWORK UNDER SIEGE 224 A3.3.1 CONFLDENTIALITY 224
A3.3.2 INTEGRITY 225 A3.3.3 AVAILABILITY 225 A3.4 COUNTERMEASURES 225
A3.4.1 SET TOP BOX 225 A3.4.2 DSLAM 226 A3.4.3 ROUTING 227 A3.4.4 USER
SEGREGATION 228 A3.4.5 QUALITY OF SERVICE 228 A3.4.6 VIRTUAL NETWORKS
AND VIRTUAL CIRCUITS 229 A3.5 CONCLUSION 229 INDEX 231 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Ramirez, David |
author_facet | Ramirez, David |
author_role | aut |
author_sort | Ramirez, David |
author_variant | d r dr |
building | Verbundindex |
bvnumber | BV023290596 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.887 |
callnumber-search | TK5105.887 |
callnumber-sort | TK 45105.887 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ZN 6380 |
ctrlnum | (OCoLC)173480528 (DE-599)GBV545980429 |
dewey-full | 621.388 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.388 |
dewey-search | 621.388 |
dewey-sort | 3621.388 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
discipline_str_mv | Elektrotechnik / Elektronik / Nachrichtentechnik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01555nam a2200397 c 4500</leader><controlfield tag="001">BV023290596</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">080506s2008 d||| j||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470519240</subfield><subfield code="c">cloth</subfield><subfield code="9">978-0-470-51924-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)173480528</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBV545980429</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1043</subfield><subfield code="a">DE-Po75</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.887</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.388</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ZN 6380</subfield><subfield code="0">(DE-625)157558:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ramirez, David</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">IPTV security</subfield><subfield code="b">protecting high-value digital contents</subfield><subfield code="c">David Ramirez</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Chichester [u.a.]</subfield><subfield code="b">John Wiley</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVI, 234 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet television</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet television</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4173536-5</subfield><subfield code="a">Patentschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/enhancements/fy0745/2007039302-d.html</subfield><subfield code="z">Publisher description</subfield><subfield code="z">lizenzfrei</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/enhancements/fy0745/2007039302-t.html</subfield><subfield code="z">lizenzfrei</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">GBV Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016475212&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016475212</subfield></datafield></record></collection> |
genre | (DE-588)4173536-5 Patentschrift gnd-content |
genre_facet | Patentschrift |
id | DE-604.BV023290596 |
illustrated | Illustrated |
index_date | 2024-07-02T20:43:06Z |
indexdate | 2024-07-09T21:15:05Z |
institution | BVB |
isbn | 9780470519240 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016475212 |
oclc_num | 173480528 |
open_access_boolean | |
owner | DE-1043 DE-Po75 |
owner_facet | DE-1043 DE-Po75 |
physical | XVI, 234 S. graph. Darst. |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | John Wiley |
record_format | marc |
spelling | Ramirez, David Verfasser aut IPTV security protecting high-value digital contents David Ramirez Chichester [u.a.] John Wiley 2008 XVI, 234 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Includes index Internet television Computer security (DE-588)4173536-5 Patentschrift gnd-content http://www.loc.gov/catdir/enhancements/fy0745/2007039302-d.html Publisher description lizenzfrei http://www.loc.gov/catdir/enhancements/fy0745/2007039302-t.html lizenzfrei Inhaltsverzeichnis GBV Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016475212&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Ramirez, David IPTV security protecting high-value digital contents Internet television Computer security |
subject_GND | (DE-588)4173536-5 |
title | IPTV security protecting high-value digital contents |
title_auth | IPTV security protecting high-value digital contents |
title_exact_search | IPTV security protecting high-value digital contents |
title_exact_search_txtP | IPTV security protecting high-value digital contents |
title_full | IPTV security protecting high-value digital contents David Ramirez |
title_fullStr | IPTV security protecting high-value digital contents David Ramirez |
title_full_unstemmed | IPTV security protecting high-value digital contents David Ramirez |
title_short | IPTV security |
title_sort | iptv security protecting high value digital contents |
title_sub | protecting high-value digital contents |
topic | Internet television Computer security |
topic_facet | Internet television Computer security Patentschrift |
url | http://www.loc.gov/catdir/enhancements/fy0745/2007039302-d.html http://www.loc.gov/catdir/enhancements/fy0745/2007039302-t.html http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016475212&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT ramirezdavid iptvsecurityprotectinghighvaluedigitalcontents |