{"id":228766,"date":"2024-10-19T14:52:36","date_gmt":"2024-10-19T14:52:36","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iec-ts-622242013\/"},"modified":"2024-10-25T08:58:40","modified_gmt":"2024-10-25T08:58:40","slug":"bsi-pd-iec-ts-622242013","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iec-ts-622242013\/","title":{"rendered":"BSI PD IEC\/TS 62224:2013"},"content":{"rendered":"
This Technical Specification explains the conceptual model of the protocol specification to exchange license information between DRM modules. This Technical Specification also outlines which models should be defined as standard models as well as the standard meanings (mainly from the viewpoint of information security in the environment, including home server systems).<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
4<\/td>\n | CONTENTS <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | INTRODUCTION <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 4 Abbreviations <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5 Notation 5.1 Numerical values 5.2 Notation list Tables Table 1 \u2013 Expression of numerical values Table 2 \u2013 Notations used in this model <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 6 Requirements 6.1 License service model 6.1.1 General <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6.1.2 Threats and countermeasures Figures Figure 1 \u2013 License service model to consider the threats <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 6.1.3 Evaluation criteria Table 3 \u2013 Threats and countermeasures in the license service model <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 7 Design considerations 7.1 General 7.2 Security model 7.2.1 General 7.2.2 Overview of security model <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 7.2.3 TREM functions 7.2.4 Secure license transaction protocol (SLTP) model Figure 2 \u2013 Security model of content protection <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 7.2.5 Certification authority Figure 3 \u2013 Basic procedure of SLTP model <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 7.2.6 Key revocation and termination of the TREM 7.3 Interconnection model 7.3.1 Generic interconnection model Figure 4 \u2013 Overview of issuing TREM class certificates <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 7.3.2 License relay protocol (LRP) model Figure 5 \u2013 Generic interconnection model for content protection <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 7.3.3 Implementation model of inter-connection <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 7.4 License information model 7.4.1 General 7.4.2 Digital rights permissions data Figure 6 \u2013 Implementation model of interconnection <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 8 Issues to be standardized <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | Annex A (informative) Example of algorithms for cryptosystem and hash <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | Annex B (informative) Example of conversion of rights information in DRM based upon SLTP into that of existing DRM Figure B.1 \u2013 Example of static conversion of rights information <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | Figure B.2 \u2013 Example of dynamic conversion of rights information <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Multimedia home server systems. Conceptual model for digital rights management<\/b><\/p>\n |