Abstract
This article focus on IPTV security and IPTV service personalization by the introduction of an Identity Provider as new participant in IPTV service provision that deals with authentication, user profile and device profile management. The Identity Provider, integrated as part of the Telco operator, would provider user profiles with a wider scope than application specific profiles, enabling high personalization of services and improvement of user experience. Paper gives overview about existing IPTV security technologies but also describe novel architecture for secure personalized NGN based IPTV services.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Support for use of scrambling and Conditional Access (CA) within digital broadcasting systems, ETR 281 V1. Technical Report, Digital Video Broadcasting (1996)
Implementation Guidelines, of the DVB Simulcrypt Standard, TR 102 035 V1.1.1. Digital Video Broadcasting (2004)
Common Interface Specification for Conditional Access and other Digital Video Broadcasting Decoder Applications, EN 50221. Technical Report, CENELEC (1997)
Marlin Broadband Architecture Overview for Marlin Adopters. Intertrust (2007)
Mobile Broadcast Services Architecture, Candidate Version 1.1, OMA-AD-BCAST-V1_1-20091013-C. Technical Report, Open Mobile Alliance (2009)
Wang, X.: MPEG-21 Rights Expression Language: enabling interoperable digital rights management. IEEE Multimedia 11(4), 84–87 (2004)
Digital Video Broadcasting Content Protection & Copy Management (DVB-CPCM), DVB Project Bluebook Document A094R2 (2008)
The Role of Octopus in Marlin. Technical Report, Marlin Developer Community (2006)
CI Plus Specification, Content Security Extensions to the Common Interface V1.2. Technical Report, CI Plus LLP (2009)
Díaz-Sánchez, D., Marín, A., Almenárez, F., Cortés, A.: Sharing conditional access modules through the home network for Pay TV Access. Transactions on Consumer Electronics 55(1), 88–96 (2009)
Díaz-Sánchez, D., Sanvido, F., Proserpio, D., Marín, A.: Extended DLNA protocol for sharing protected Pay TV contents. In: IEEE International Conference on Consumer Electronics, Las Vegas, USA (2010)
High-Bandwidth Digital Content Protection System Revision 1.3, Technical Report (2006)
OITF Release 1: Vol.1 Overview. Technical Report, Open IPTV Forum (2009)
OITF Release 1: Vol.7 Authentication, Content Protection and Service Protection. Technical Report, Open IPTV Forum (2009)
Open IPTV Forum, Functional Architecture V1.2. Technical Report, Open IPTV Forum (2008)
Generic Authentication Architecture (GAA), Generic bootstrapping architecture, TS 33.220 V8.7.0. Technical Report 3GPP, ETSI (2009)
Mishra, P.: SAML v2.0. OASIS Standard. Technical Report SAML v2.0, OASIS Security Services TC (2005)
ETSI ES 282 001, TISPAN; NGN Functional Architecture (2009)
ETSI TS 182 027, TISPAN; IPTV functions supported by the IMS subsystem (2009)
ETSI TS 182 028, TISPAN; NGN Integrated IPTV Subsystem in NGN (2009)
ETSI TS 187 003,TISPAN; NGN Security; Security Architecture (2009)
ETSI TR 187 013, TISPAN; Feasibility study on IPTV Security Architecture (2009)
OMA-TS-BCAST_SvcCntProtection – v1_0: Service and Content Protection for Mobile Broadcast Services”, version 1.0, Open Mobile Alliance
ETSI TS 103 197,DVB; Head-end implementation of DVB SimulCrypt
3GPP TS 26.237, IP Multimedia Subsystem (IMS) based Packet Switch Streaming (PSS) and Multimedia Broadcast/Multicast Service (MBMS) User Service. Release 8
Leung, Y., Peinado, M., Strom, C.: Binding Digital Content to a Portable Storage Device or the like in a Digital Rights Management (DRM) System, U.S. Patent 7010808. Microsoft Corporation (2006)
Palfrey, J., Gasser, U.: Digital Identity Interoperability and eInnovation. Retrieved from Case Study (2007), http://cyber.law.harvard.edu/interop/pdfs/interop-digital-id.pdf
Subenthiran, S., Sandrasegaran, K., Shalak, R.: Requirements for identity management in next generation networks. In: 6th International Conference on Advanced Communication Technology, pp. 138–142. IEEE, Los Alamitos (2004)
ITU-T Focus Group on Identity Management. Report on Identity Management Use Cases and Gap Analysis. ITU-T (2008)
Schumann, S., Mikoczy, E., Podhradsky, P., Muruchi, F., Maruschke, M.: Presence management and merging presence information for NGN services” on “Wireless and Mobile Networking”, WMNC 2009, Gdansk, Poland, September 9-11. Springer, Heidelberg (2009) ISBN: 978- 3-642-03840-2
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Sánchez, D.D., Almenárez, F., Marín, A., Mikoczy, E., Weik, P., Magedanz, T. (2011). An Identity Management Infrastructure for Secure Personalized IPTV Services. In: Magedanz, T., Gavras, A., Thanh, N.H., Chase, J.S. (eds) Testbeds and Research Infrastructures. Development of Networks and Communities. TridentCom 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 46. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17851-1_67
Download citation
DOI: https://doi.org/10.1007/978-3-642-17851-1_67
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17850-4
Online ISBN: 978-3-642-17851-1
eBook Packages: Computer ScienceComputer Science (R0)