Home Cart Quotation About-Us
www.ChineseStandard.net
SEARCH

GY/T 336-2020 English PDF

US$379.00 ยท In stock
Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email.
GY/T 336-2020: (Video and audio content distribution digital rights management system compliance requirements)
Status: Valid
Standard IDUSDBUY PDFLead-DaysStandard Title (Description)Status
GY/T 336-2020379 Add to Cart 4 days (Video and audio content distribution digital rights management system compliance requirements) Valid

Similar standards

GY/T 398.1   

Basic data

Standard ID: GY/T 336-2020 (GY/T336-2020)
Description (Translated English): (Video and audio content distribution digital rights management system compliance requirements)
Sector / Industry: Radio, Film & TV Industry Standard (Recommended)
Word Count Estimation: 15,134
Date of Issue: 2020-11-09
Date of Implementation: 2020-11-09
Regulation (derived from): Broadcasting-TV announcement (2020) No. 76
Issuing agency(ies): State Administration of Radio and Television

GY/T 336-2020: (Video and audio content distribution digital rights management system compliance requirements)


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Digital rights management of video audio content distribution-System compliant requirements The People's Republic of China Radio, Television and Network Audiovisual Industry Standards Video and audio content distribution digital rights management system compliance Sexual requirements 2020-11-09 released 2020-11-09 implementation Issued by the State Administration of Radio and Television 1 Scope...1 2 Normative references...1 3 Terms and definitions...1 4 Abbreviations...2 5 Overview...2 6 DRM server product compliance requirements...3 6.1 Functional requirements...3 6.2 Standard compliance requirements...3 6.3 Safety requirements...4 7 DRM client product compliance requirements...5 7.1 Functional requirements...5 7.2 Standard compliance requirements...5 7.3 Safety requirements...5 8 DRM system implementation compliance requirements...8 8.1 Overview...8 8.2 DRM system implementation safety requirements...9 Appendix A (Normative) Values with confidentiality requirements and values with integrity requirements for DRM systems...10 A.1 DRM server has confidentiality requirements...10 A.2 DRM server has integrity requirements value...10 A.3 DRM client has confidentiality requirements...10 A.4 DRM client has integrity requirements value...10

Foreword

This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for Standardization Work Part 1.Structure and Drafting Rules of Standardization Documents" Drafting. Please note that some of the contents of this document may involve patents. The issuing agency of this document is not responsible for identifying these patents. This document is under the jurisdiction of the National Radio, Film and Television Standardization Technical Committee (SAC/TC 239). Drafting organizations of this document. National Radio and Television Research Institute, China Central Radio and Television, Communication University of China, British Tel (China) Co., Ltd., Shanghai HiSilicon Technology Co., Ltd., Alibaba (China) Co., Ltd., Wasu Digital TV Media Group Co., Ltd., Guangdong South New Media Co., Ltd., BesTV Network TV Technology Development Co., Ltd., Hunan Happy Sunshine Interactive Entertainment Media Co., Ltd., Beijing Aiqiyi Technology Co., Ltd., Beijing Jiangnan Tianan Technology Co., Ltd., Beijing Digital Taihe Technology Co., Ltd. Ren company, Beijing Digital Video Technology Co., Ltd., Beijing Yongxin Shibo Digital TV Technology Co., Ltd., Beijing Anshiwang Information Technology Co., Ltd. The company, Shanghai Guomao Digital Technology Co., Ltd., Liaoning Radio and Television Station, Shanghai Culture, Radio, Film and Television Group Co., Ltd. The main drafters of this document. Ding Wenhua, Guo Peiyu, Pan Xiaofei, Wang Lei, Lin Weiguo, Mei Xuelian, Liang Zhijian, Wang Bing, Wu Di, Sui Aina, Shang Wenqian, Zhou Jing, Cao Jianxiang, Zhang Zhijun, Shenyang, Xue Ziyu, Jiang Tao, Feng Hanwen, Zhang Yujuan, Zhang Jiekai, Liu Mengyu, Wang Yuanyuan, Jiang Pengfei, Zhao Peng, Chen Liang, Ran Dawei, Shao Qifeng, Tang Yi, Liu Guangbin, Chen Zhiye, Jiang Qun, Chen He, Chen Gang, Zhao Yunhui, Ma Jiwei, Liu Qi, Wang Pei, Zheng Lifang, Zhang Jing, Tian Xuebing, Liu Haowei, Zhang Peng, Fan Tao, Gao Hongpeng, Wu Nanshan. Video and audio content distribution digital rights management system compliance requirements

1 Scope

This document specifies the function, performance, standard compliance test requirements of the digital rights management system for the distribution of video and audio content, and system integration And safety management evaluation requirements for operation and maintenance. This document is applicable to the research and development, integration, construction, operation and maintenance of the digital rights management system for the distribution of video and audio content.

2 Normative references

The contents of the following documents constitute the indispensable clauses of this document through normative references in the text. Among them, dated reference documents, Only the version corresponding to that date is applicable to this document; for undated references, the latest version (including all amendments) is applicable to this document file. GB/T 37092-2018 Information Security Technology Cryptographic Module Security Requirements GY/T 277-2019 Technical Specification for Digital Rights Management of Video and Audio Content Distribution GY/T 333-2020 Video and audio content distribution digital rights management cable digital TV digital rights management system integration ISO /IEC 27002 Information Technology Security Technology Information Security Control Practice Code (Information technology- Security techniques-Code of practice for information security controls)

3 Terms and definitions

The following terms and definitions apply to this document. 3.1 Hardware root of trust The security primitive composed of hardware is responsible for providing a set of credible and critical security functions. It is designed to always operate in the expected manner OK and immutable. 3.2 Secure bootloader The process of establishing an initial state of trust for instructions and data contained in hardware or software before being executed. Usually the hardware and increase The secure boot loading function with strong hardware security level is rooted in the hardware. 3.3 Hardware execution environment; HEE The hardware root of trust used to enforce a secure hardware boundary for DRM applications. It can be a hardware root of trust, a secure The combination of a bootloader, a secure operating system, a secure processor, or the secure operating mode of a single processor. 3.4 Root detection When it is found that the device has been damaged, the device/software or software area can be accessed while detecting that the device/software or software area can be accessed. Other software is hidden. 3.5 Software execution environment; SEE A software-based mechanism used to isolate or protect the execution environment of software during execution. 3.6 Special tool Widely used dedicated electronic or software tools, including but not limited to memory managers, debuggers (for example, software-based bus Analyzer, interactive disassembler) or decompiler, integrated development environment, compiler, JTAG probe reader and similar software development products Product. 3.7 User accessible bus Designed and provided for end users, allowing end users to upgrade or access smart cards, PCMCIA, Cardbus, USB or PCI, etc. Data bus for quasi-slot or other plug-and-play facilities. Note. The user-accessible bus does not include the storage bus, CPU bus, and similar parts of the device's internal architecture that are not allowed to be accessed by end users.

4 Abbreviations

The following abbreviations apply to this document. CA Certification Authority CMAF Common Media Application Format (Common Media Application Format) CPU central processing unit DASH uses the HTTP protocol to transmit dynamic adaptive streaming media protocol (Dynamic Adaptive Streaming over HTTP) DRM Digital Rights Management (Digital Rights Management) HLS HTTP-based real-time streaming media protocol (HTTP Live Streaming) HMAC hashed message authentication code (Hashed Message Authentication Code) JTAG Joint Test Action Group (Joint Test Action Group) OCSP Online Certificate Status Protocol (Online Certificate Status Protocol) PC Personal Computer (Personal Computer) PCI defines the standard of the local bus (Peripheral Component Interconnect) PCMCIA Personal Computer Card (Personal Computer Memory Card International Association) TS transport stream USB Universal Serial Bus (Universal Serial Bus)

5 overview

The compliance requirements of the digital rights management system for the distribution of video and audio content include the compliance requirements for DRM products and the compliance requirements for the implementation of the DRM system. DRM product compliance requirements are used to guide the R&D and integration of DRM server products and the integration of DRM clients in terminal devices, mainly Including. functional requirements, standard compliance requirements and safety requirements. DRM system implementation compliance requirements are used to guide the integrated construction and operation and maintenance of DRM systems, and mainly refer to the security requirements during implementation.

6 DRM server product compliance requirements

6.1 Functional requirements The functions of DRM server products should include five types of live content encryption, on-demand content encryption, key management, key gateway, and content authorization. The specific requirements are as follows. a) Encryption of live content. 1) Should support one or more of the live content encryption and packaging such as real-time TS, HLS, DASH, CMAF, etc.; 2) Should support AVS, AVS2, H.264, H.265 and other video encoding formats; 3) It should support the application of live content encryption key through key management; 4) The live broadcast encryption key should be updated at a configurable frequency; 5) The live broadcast encryption delay should not be higher than 500ms; 6) It should support second-level content encryption key update frequency. b) On-demand content encryption. 1) Should support one or more of TS files, HLS, DASH, CMAF and other content encryption packages; 2) Should support AVS, AVS2, H.264, H.265 and other video encoding formats; 3) It should support the application of encryption keys for on-demand content through key management. c) Key management. 1) Support receiving and processing content encryption key applications; 2) Should support secure storage and management of content encryption keys; 3) Should support the synchronization of content encryption keys to the key gateway. d) Key gateway. 1) Support receiving and processing live/on-demand content encryption key requests for key management; 2) Support for secure storage and management of live/on-demand content encryption keys; 3) It should support receiving and processing content authorization live/on-demand content encryption key requests. e) Content authorization. 1) It should support receiving and processing DRM client live/on-demand content authorization license requests; 2) It shall support requesting the encryption key for live/on-demand content from the key gateway. 6.2 Standard compliance requirements The standard compliance requirements of DRM server products include live content encryption, on-demand content encryption, key management, key gateway and content The specific requirements are as follows. a) Encryption of live content. 1) The encryption of live content should comply with the provisions of 7.1.1 and 7.2 in GY/T 333-2020; 2) The application for the encryption key of the live content shall comply with the provisions of 8.1 in GY/T 333-2020. b) On-demand content encryption. 1) The encryption of on-demand content should comply with the provisions of 7.1.2 and 7.2 in GY/T 333-2020; 2) On-demand content encryption task management should comply with the regulations in 7.3 of GY/T 333-2020; 3) The application for the encryption key of on-demand content shall comply with the provisions of 8.2 in GY/T 333-2020. c) Key management. 1) The live broadcast key management shall comply with the provisions of 8.1 in GY/T 333-2020; 2) On-demand key management shall comply with the regulations in 8.2 of GY/T 333-2020. d) Key gateway. 1) The key synchronization should comply with the provisions of GY/T 277-2019, Section 9.2; 2) The key query should comply with the regulations in 9.3 of GY/T 277-2019. e) Content authorization. 1) The content authorization license request/response shall comply with the provisions of Chapter 8 in GY/T 277-2019; 2) The key query should comply with the regulations in 9.3 of GY/T 277-2019. 6.3 Safety requirements 6.3.1 Basic safety requirements The basic security requirements for DRM server products are as follows. a) The values with confidentiality requirements and integrity requirements specified in Appendix A shall be secured; b) It should support the generation and storage of public and private key pairs based on the device; c) Cryptographic calculation functions such as encryption, decryption, and signature should be implemented in the hardware cryptographic module; d) The device private key, content encryption key, session key, temporary key, etc. should not expose the plain text outside the hardware cryptographic module; e) The hardware cryptographic module should comply with the level two or higher security level specified in GB/T 37092-2018, and have a commercial cryptographic model certificate book. 6.3.2 Software security requirements The software security requirements for DRM server products are as follows. a) The DRM server software should have a hardware cryptographic module identification mechanism, and the service should be stopped when the hardware cryptographic module is removed; b) The DRM server software should have a software component integrity verification mechanism, and the service should be stopped after the software component is tampered with; c) The DRM server software should support security log recording and log review. Any operation of the DRM server includes software upgrades, software groups File modification, illegal tampering...
......
Image     

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GY/T 336-2020_English be delivered?

Answer: Upon your order, we will start to translate GY/T 336-2020_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GY/T 336-2020_English with my colleagues?

Answer: Yes. The purchased PDF of GY/T 336-2020_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.