{"id":228667,"date":"2024-10-19T14:52:08","date_gmt":"2024-10-19T14:52:08","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-62481-32011\/"},"modified":"2024-10-25T08:58:00","modified_gmt":"2024-10-25T08:58:00","slug":"bs-en-62481-32011","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-62481-32011\/","title":{"rendered":"BS EN 62481-3:2011"},"content":{"rendered":"
This part of IEC 62481 specifies the DLNA link protection guidelines, which are an extension of the DLNA guidelines. DLNA link protection is defined as the protection of a content stream between two devices on a DLNA network from illegitimate observation or interception using the protocols defined within this standard.<\/p>\n
Content protection is an important mechanism for ensuring that commercial content is protected from piracy and illegitimate redistribution. Link protection is a technique that enables distribution of protected commercial content on a home network, thus resulting in greater consumer flexibility while still preserving the rights of copyright holders and content providers.<\/p>\n
The guidelines in this standard reference existing technologies for link protection and provide mechanisms for interoperability between different implementations as well as integration with the DLNA architecture.<\/p>\n
This standard is organized to align with the overall structure of IEC 62481-1 and IEC 62481-2.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
7<\/td>\n | CONTENTS <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 1 Scope 2 Normative reference <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 3 Terms, definitions and acronyms 3.1 Terms and definition <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 3.2 Abbreviation terms <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 4 DLNA home network architecture 5 DLNA device model 6 Guideline terminology and conventions 6.1 Guideline compliance classifiers 6.2 Standard of specification usage classifiers <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6.3 Guideline font usage conventions 6.4 Guideline syntax notation convention <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 6.5 Guideline normative and informative text conventions 6.6 DLNA XML namespaces and schemas 7 Common link protection guidelines 7.1 General Tables Table 1 \u2013 DLNA namespace values <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | Figures Figure 1 \u2013 Guideline layout and definitions <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | Figure 2 \u2013 Visual map of possible values for the attribute tables Table 2 \u2013 Allowed values for change indicator field in attribute table <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 7.2 Conditions for measuring time in message exchanges 7.3 Networking and connectivity Table 3 \u2013 Normative priorities for dlna traffic types for link protection <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 7.4 Device discovery and control 7.5 Media management <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | Table 4 \u2013 Summary of domain elementsfor full random access data availability mode <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | Table 5 \u2013 Summary of domain elementsfor limited random access data availability model <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | Table 6 \u2013 AV media management guideline changes <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | Table 7 \u2013 Recommended metadata properties Table 8 \u2013 Property type and multi value <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 7.6 Media transport <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | Table 9 \u2013 Updates to existing general media transport guidelines <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | Table 10 \u2013 Updates to existing general HTTP media transport guidelines <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | Table 11 \u2013 Updates to existing general HTTP media transportfor streaming transfer guidelines <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 7.7 Content conversion device virtualization 7.8 Media interoperability unit (MIU) 7.9 Link protection technology guidelines requirements <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 8 DTCP-IP link protection system guidelines 8.1 General 8.2 Networking and connectivity <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 8.3 Device discovery and control 8.4 Media management <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 8.5 Media transport <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 8.6 Content conversion device virtualization 8.7 Media interoperability unit (MIU) 8.8 Media format \u2013 DTCP-IP profiling guidelines <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 8.9 General requirements 9 WMDRM-ND link protection system guidelines 9.1 General <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 9.2 General requirements <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 9.3 Networking and connectivity 9.4 Device discovery and control 9.5 Media management <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 9.6 Media transport <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | 9.7 Content conversion device virtualization 9.8 Media interoperability unit (MIU) 9.9 Media format \u2013 WMDRM-ND profiling guidelines <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | Annex A (informative) An introduction to DLNA seek operations <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | Figure A.1 \u2013 UCDAM definitions for seek operations <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | Figure A.2 \u2013 Full random access data availability model <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | Table A.1 \u2013 DLNA constructs of full random access data availability mode <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | Figure A.3 \u2013 Limited random access data availability model mode 0 <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | Figure A.4 \u2013 Limited random access data availability mode 1 <\/td>\n<\/tr>\n | ||||||
67<\/td>\n | Table A.2 \u2013 DLNA constructs of limited random access data availability model <\/td>\n<\/tr>\n | ||||||
68<\/td>\n | Figure A.5 \u2013 Content flow unprotected content Figure A.6 \u2013 Content flow link protected content <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Digital living network alliance (DLNA) home networked device interoperability guidelines – Link protection<\/b><\/p>\n |