{"id":373430,"date":"2024-10-20T02:34:02","date_gmt":"2024-10-20T02:34:02","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iso-iec-ts-23078-32021\/"},"modified":"2024-10-26T04:31:03","modified_gmt":"2024-10-26T04:31:03","slug":"bsi-pd-iso-iec-ts-23078-32021","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iso-iec-ts-23078-32021\/","title":{"rendered":"BSI PD ISO\/IEC TS 23078-3:2021"},"content":{"rendered":"
This document defines a technical solution for encrypting resources of EPUB publications, effectively registering a device certificate to providers and securely delivering decryption keys to reading systems included in licenses tailored to specific devices. This technical solution uses the passphrase-based authentication method defined in ISO\/IEC TS 23078\u20112 for reading systems to receive the license and access the encrypted resources of such digital publications.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 4 Abbreviated terms 5 Overview 5.1 General <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 5.2 Protecting the publication 5.3 Licensing the publication <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5.4 Reading the publication 5.4.1 General 5.4.2 Registering a device 5.4.3 Acquiring a device key-based license document <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.4.4 Decrypting a resource 5.5 Licensing workflows 5.5.1 General 5.5.2 Getting a protected publication <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.5.3 Transferring a protected publication <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5.5.4 Register device certificate and update license document <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 6 License document 6.1 General 6.2 Content conformance 6.3 License information 6.3.1 General 6.3.2 Encryption (transmitting keys) <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 6.3.3 Links (pointing to external resources) <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 6.3.4 Rights (identifying rights and restrictions) 6.3.5 User (identifying the user) 6.3.6 Signature (signing the license) 6.4 User key 6.4.1 General <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 6.4.2 Calculating the user key 6.4.3 Hints 6.4.4 Requirements for the user key and user passphrase 6.5 Signature and public key infrastructure 6.5.1 General 6.5.2 Certificates <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 6.5.3 Canonical form of the license document 6.5.4 Generating the signature 6.5.5 Validating the certificate and signature 6.6 Device key 6.6.1 General <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 6.6.2 Generating the device key 6.6.3 Recommendations for the device private key protection 7 License status document 7.1 General 7.2 Content conformance <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 7.3 License status information 7.3.1 General 7.3.2 Status 7.3.3 Updated 7.3.4 Links <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 7.3.5 Potential rights 7.3.6 Events 7.4 Interactions 7.4.1 General 7.4.2 Handling errors 7.4.3 Checking the status of a license 7.4.4 Registering a device <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 7.4.5 Returning a publication <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 7.4.6 Renewing a license 8 Encryption profiles 8.1 General 8.2 Encryption profile requirements 8.3 Basic encryption profile <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 9 Integration in EPUB 10 Reading system behaviours 10.1 Detecting protected publications 10.2 License document processing 10.3 User key processing 10.4 Signature processing 10.5 Publication processing 10.6 Device key processing <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | Annex A (informative) Examples <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | Annex B (informative) Schema of license document <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Specification of DRM technology for digital publications – Device key-based protection<\/b><\/p>\n |