1
Scope
2
References
3
Definitions
3.1
Terms defined elsewhere
3.2
Terms defined in this Recommendation
4
Abbreviations and acronyms
5
Conventions
6
Introduction
6.1
IPTV general architecture and content protection architecture
6.2
IPTV general architecture and content protection architecture
6.3
Reference model of group key management
6.4
Grouping of TDs
7
Requirements for the key management scheme
7.1
Requirements for key management described in [ITU-T X.1191]
7.2
General requirements for key management
7.3
Functional requirements for key management
8
Key management scheme for secure IPTV services
8.1
Key management scheme for unicast-based IPTV service
8.2
Key management scheme for multicast IPTV service
8.3
Key management scheme for a downloadable SCP scheme
Appendix I – Multimedia Internet keying
I.1 Overview
of MIKEY
I.2 Protocol
operation
Appendix II – Extensible authentication protocol
II.1
EAP-AKA
II.2
EAP-PSK
II.3
EAP-TLS
II.4
EAP-FAST
II.5
EAP-IKEv2
II.6
EAP-TTLS
II.7 PEAP
Bibliography