BS EN 62481-3:2011
$215.11
Digital living network alliance (DLNA) home networked device interoperability guidelines – Link protection
Published By | Publication Date | Number of Pages |
BSI | 2011 | 72 |
This part of IEC 62481 specifies the DLNA link protection guidelines, which are an extension of the DLNA guidelines. DLNA link protection is defined as the protection of a content stream between two devices on a DLNA network from illegitimate observation or interception using the protocols defined within this standard.
Content protection is an important mechanism for ensuring that commercial content is protected from piracy and illegitimate redistribution. Link protection is a technique that enables distribution of protected commercial content on a home network, thus resulting in greater consumer flexibility while still preserving the rights of copyright holders and content providers.
The guidelines in this standard reference existing technologies for link protection and provide mechanisms for interoperability between different implementations as well as integration with the DLNA architecture.
This standard is organized to align with the overall structure of IEC 62481-1 and IEC 62481-2.
PDF Catalog
PDF Pages | PDF Title |
---|---|
7 | CONTENTS |
10 | 1 Scope 2 Normative reference |
11 | 3 Terms, definitions and acronyms 3.1 Terms and definition |
15 | 3.2 Abbreviation terms |
16 | 4 DLNA home network architecture 5 DLNA device model 6 Guideline terminology and conventions 6.1 Guideline compliance classifiers 6.2 Standard of specification usage classifiers |
17 | 6.3 Guideline font usage conventions 6.4 Guideline syntax notation convention |
18 | 6.5 Guideline normative and informative text conventions 6.6 DLNA XML namespaces and schemas 7 Common link protection guidelines 7.1 General Tables Table 1 – DLNA namespace values |
19 | Figures Figure 1 – Guideline layout and definitions |
20 | Figure 2 – Visual map of possible values for the attribute tables Table 2 – Allowed values for change indicator field in attribute table |
21 | 7.2 Conditions for measuring time in message exchanges 7.3 Networking and connectivity Table 3 – Normative priorities for dlna traffic types for link protection |
22 | 7.4 Device discovery and control 7.5 Media management |
23 | Table 4 – Summary of domain elementsfor full random access data availability mode |
24 | Table 5 – Summary of domain elementsfor limited random access data availability model |
25 | Table 6 – AV media management guideline changes |
26 | Table 7 – Recommended metadata properties Table 8 – Property type and multi value |
28 | 7.6 Media transport |
29 | Table 9 – Updates to existing general media transport guidelines |
30 | Table 10 – Updates to existing general HTTP media transport guidelines |
37 | Table 11 – Updates to existing general HTTP media transportfor streaming transfer guidelines |
39 | 7.7 Content conversion device virtualization 7.8 Media interoperability unit (MIU) 7.9 Link protection technology guidelines requirements |
40 | 8 DTCP-IP link protection system guidelines 8.1 General 8.2 Networking and connectivity |
41 | 8.3 Device discovery and control 8.4 Media management |
42 | 8.5 Media transport |
45 | 8.6 Content conversion device virtualization 8.7 Media interoperability unit (MIU) 8.8 Media format – DTCP-IP profiling guidelines |
50 | 8.9 General requirements 9 WMDRM-ND link protection system guidelines 9.1 General |
51 | 9.2 General requirements |
53 | 9.3 Networking and connectivity 9.4 Device discovery and control 9.5 Media management |
54 | 9.6 Media transport |
59 | 9.7 Content conversion device virtualization 9.8 Media interoperability unit (MIU) 9.9 Media format – WMDRM-ND profiling guidelines |
61 | Annex A (informative) An introduction to DLNA seek operations |
62 | Figure A.1 – UCDAM definitions for seek operations |
63 | Figure A.2 – Full random access data availability model |
64 | Table A.1 – DLNA constructs of full random access data availability mode |
65 | Figure A.3 – Limited random access data availability model mode 0 |
66 | Figure A.4 – Limited random access data availability mode 1 |
67 | Table A.2 – DLNA constructs of limited random access data availability model |
68 | Figure A.5 – Content flow unprotected content Figure A.6 – Content flow link protected content |
70 | Bibliography |