1
Scope
2 References
3 Terms and definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this
Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Security requirements
6.1 General security
requirements
6.2 Content security
requirements
6.3 Service security
requirements
6.4 Network security
requirements
6.5 Terminal security
requirements
6.6 Subscriber security
requirements
7 Security architecture
7.1 General security
architecture
7.2 Content protection
architecture
7.3 Service protection architecture
7.4 Description of
functions and functional blocks in IPTV security architectures
8 Security mechanisms
8.1 Security mechanisms
dealing with content protection
8.2 Security mechanisms
dealing with service protection
8.3 Security mechanisms
dealing with networks protection
8.4 Security mechanisms
dealing with terminal device protection
8.5 Security mechanisms
dealing with subscribers or end users
Annex A – Subscriber security protection
A.1 User data protection
A.2 Parental control,
protection of legal minors, access control
Appendix I – Security threats
I.1 Security threats model
Appendix II – Interoperability of SCP
II.1 Overview of
interoperability of SCP
II.2 Interoperable SCP scenarios
II.3 Technical areas of SCP interoperability
II.4 SCP interoperable
architectures
II.5 Scenarios of SCP-B or SCP-IX deployed in TD
Appendix III – Example of IPTV content protection process
Appendix IV – DVB content protection and copy management
IV.1 Introduction
IV.2 Definitions
IV.3 Abbreviations and acronyms
IV.4 CPCM architecture
IV.5 CPCM reference model and functional entities
IV.6 CPCM-authorized domain
IV.7 CPCM content usage rules
IV.8 Usage state information metadata
IV.9 CPCM content
IV.10 CPCM device
IV.11 Usage rule and usage state information
Appendix V – Secure transcodable scheme
V.1 Overview of the secure transcodable scheme
Bibliography