没有合适的资源?快使用搜索试试~ 我知道了~
ISMA Encryption and Authentication V2.0
3星 · 超过75%的资源 需积分: 10 11 下载量 97 浏览量
2010-08-10
13:45:47
上传
评论 1
收藏 1011KB PDF 举报
温馨提示
试读
60页
INTERNET STREAMING MEDIA ALLIANCE Encryption and Authentication Version :2.0
资源推荐
资源详情
资源评论
ISMA Encryption and Authentication, Version 2.0
15 November 2007 Page 1 of 60
Copyright © 2007 Internet Streaming Media Alliance. All Rights Reserved.
ISMA is a Trademark and Service Mark of Internet Streaming Media Alliance
INTERNET STREAMING MEDIA ALLIANCE
Encryption and Authentication
Version 2.0
AREA / Task Force: DRM
Status: External Proposed Specification
November 2007
ISMA Encryption and Authentication, Version 2.0
15 November 2007 Page 2 of 60
Copyright © 2007 Internet Streaming Media Alliance. All Rights Reserved.
ISMA is a Trademark and Service Mark of Internet Streaming Media Alliance
ISMA SPECIFICATION LIMITATIONS
AND CONDITIONS OF USE
LEGAL LIMITATIONS AND CONDITIONS OF USE
USERS OF THE ISMA SPECIFICATION ARE NOT PERMITTED OR
AUTHORIZED TO STATE OR CLAIM THAT THEIR PRODUCTDS
OR APPLICATIONS COMPLY WITH THE SPECIFICATION,
PENDING ISMA’S DEVELOPMENT AND IMPLEMENTATION OF
A COMPLIANCE OR CERTIFICATION PROGRAM AND USER’S
EXPRESS AGREEMENT WITH THE TERMS AND CONDITIONS
THEREOF. BY REQUESTING OR USING THE SPECIFICATION,
USER AGREES TO THIS LIMITATION AND CONDITION.
ISMA Encryption and Authentication, Version 2.0 November 2007
ISMA Encryption and Authentication, Version 2.0
15 November 2007 Page 3 of 60
Copyright © 2007 Internet Streaming Media Alliance. All Rights Reserved.
ISMA is a Trademark and Service Mark of Internet Streaming Media Alliance
Table of Contents
1.0 Introduction ....................................................................................................................................................5
2.0 References .......................................................................................................................................................5
2.1 Normative ....................................................................................................................................................5
2.2 Informative ..................................................................................................................................................7
3.0 Terminology and Conventions.....................................................................................................................9
3.1 Conventions.................................................................................................................................................9
3.2 Definitions / Glossary of Terms .................................................................................................................9
3.3 Abbreviations ............................................................................................................................................10
4.0 Goals and Requirements.............................................................................................................................11
5.0 ISMA Encryption and Authentication .....................................................................................................12
5.1 Receiver Architecture and End-to-End Flows ........................................................................................12
5.2 Transforms.................................................................................................................................................13
5.2.1 Default message authentication (integrity) transform ....................................................................14
5.2.2 Default cipher and mode ..................................................................................................................14
6.0 ISMACryp File Structure...........................................................................................................................15
6.1 General principles .....................................................................................................................................15
6.1.1 Sample transformation......................................................................................................................15
6.1.2 Sample description transformation ..................................................................................................15
6.2 ISMA Encryption......................................................................................................................................16
6.2.1 Encryption scheme............................................................................................................................16
6.2.2 Encryption information ....................................................................................................................16
6.2.3 Sample transformation......................................................................................................................17
6.3 Sub-samples...............................................................................................................................................17
6.4 Bytestream format for encrypted AVC video stream .............................................................................17
6.5 Usage of Brands ........................................................................................................................................18
7.0 ISMACryp RTP Transport Packet Structure.........................................................................................19
7.1 General principles .....................................................................................................................................19
7.2 Decryption process....................................................................................................................................20
7.3 Payload header ..........................................................................................................................................20
7.3.1 enc-isoff-generic header ...................................................................................................................20
7.3.2 enc-mpeg4-generic header ...............................................................................................................24
7.4 Encrypted payload modes.........................................................................................................................25
7.4.1 enc-isoff-generic mode.....................................................................................................................25
7.4.2 enc-mpeg4-generic mode .................................................................................................................26
8.0 ISMACryp SDP Signaling ..........................................................................................................................29
8.1 Overview ...................................................................................................................................................29
8.2 ISMACryp version identification ............................................................................................................29
8.3 ISMACryp parameters..............................................................................................................................30
8.4 'enc-isoff-generic' SDP signaling.............................................................................................................31
8.4.1 Codec identification..........................................................................................................................32
8.4.2 Codec initialization ...........................................................................................................................32
8.4.3 Optional parameters..........................................................................................................................33
8.5 'enc-mpeg4-generic' SDP signaling .........................................................................................................33
9.0 ISMACryp Encryption (Default) Cryptography Specification ............................................................35
9.1 ISMACryp AES-CTR Encryption Transform ........................................................................................35
9.1.1 Default cipher, mode, and configuration.........................................................................................35
9.1.2 Fixed parameters and signaling values............................................................................................37
9.1.3 Transport packetization values.........................................................................................................38
9.2 ISMACryp Message Authentication (Integrity) Transform...................................................................39
9.3 The Security of ISMACryp Cryptography ..............................................................................................39
10.0 Name Assignment and Registration........................................................................................................41
ISMA Encryption and Authentication, Version 2.0 November 2007
ISMA Encryption and Authentication, Version 2.0
15 November 2007 Page 4 of 60
Copyright © 2007 Internet Streaming Media Alliance. All Rights Reserved.
ISMA is a Trademark and Service Mark of Internet Streaming Media Alliance
Annex A: Local Playback (Informative) ........................................................................................................42
Annex B: Encryption Process Example (Informative).................................................................................43
Annex C: 'enc-mpeg4-generic' SDP Examples (Informative).....................................................................47
Annex D: 'enc-isoff-generic' RTP packetization and SPD examples (Informative) ................................49
Annex E: 'enc-isoff-generic' RTP receiver behaviour in case of packet loss (Informative)...................52
Annex F: Interoperability with OMA DRM Version 2.0 (Informative)....................................................54
F.1 Overview ...................................................................................................................................................54
F.2 MPEG-4 File Structure.............................................................................................................................54
F.2.1 Sample description transformation..................................................................................................54
F.3 Transport Signaling ..................................................................................................................................54
Annex G: Use of ISMACryp prior to OMA DRM 2.0 super-distribution (informative) .......................56
G.1 Introduction ..............................................................................................................................................56
G.2 ISMACryp streaming followed by OMA DRM 2.0 super-distribution ...............................................56
G.3 Requirements for ISMACryp streaming.................................................................................................57
G.4 Conclusion................................................................................................................................................58
Annex H: 'enc-isoff-generic' SVC protection (Informative) .......................................................................59
ISMA Encryption and Authentication, Version 2.0 November 2007
ISMA Encryption and Authentication, Version 2.0
15 November 2007 Page 5 of 60
Copyright © 2007 Internet Streaming Media Alliance. All Rights Reserved.
ISMA is a Trademark and Service Mark of Internet Streaming Media Alliance
1.0 Introduction
This document specifies content encryption, message authentication (integrity) services, an RTP payload
format and a file format for pre-encrypted content for ISMA 1.0 [ISMASPEC], ISMA 2.0 [ISMASPEC2]
and more generally any media that can be stored as elementary stream in an ISO media file [14496-12].
The official name for this service specification is "ISMA Encryption and Authentication" but it is
unofficially called "ISMACryp" throughout much of this document.
The ISMACryp framework is extensible to new media encodings, can be upgraded to new cryptographic
transforms, and is applicable to a variety of key management, security, or digital rights management
(DRM) systems. ISMACryp defines a default encryption of media streams and authentication of media
messages. The ISMA Encryption and Authentication transforms conform to the ISMA DRM
Recommendations [ISMADRM].
Section 4 briefly describes requirements and architecture. Sections 5, 6, 7, 8 and 9 define ISMACryp
cryptography, ISO file format, RTP payload format and SDP signaling.
2.0 References
2.1 Normative
[14496-1] ISO/IED 14496-1
Information technology -- Coding of audio-visual objects --
Part 1: Systems,
Third Edition, November 2004.
[14496-8] ISO/IEC 14496-8
Information technology -- Coding of audio-visual objects --
Part 8: Carriage of ISO/IEC 14496 contents over IP networks,
First Edition, May 2004.
[14496-10] ISO/IEC 14496-10
Information technology -- Coding of audio-visual objects --
Part 10: Advanced Video Coding
2003
ITU-T Recommendation H.264 (2003): “Advanced video coding for generic audiovisual
services”
[14496-12] ISO/IEC 14496-12|15444-12
Information technology -- Coding of audio-visual objects --
Part 12: ISO base media file format,
Information technology -- JPEG 2000 image coding system --
Part 12: ISO base media file format,
Second Edition, April 2005.
[14496-14] ISO/IEC 14496-14
Information technology -- Coding of audio-visual objects --
Part 14: MP4 file format,
First Edition, November 2003.
剩余59页未读,继续阅读
资源评论
- joey63672012-05-24光看2.0是不行的,要结合1.1一起看
liulyw_1978
- 粉丝: 15
- 资源: 103
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功