{"id":353940,"date":"2024-10-20T01:00:34","date_gmt":"2024-10-20T01:00:34","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iso-iec-ts-23078-22020\/"},"modified":"2024-10-26T01:11:47","modified_gmt":"2024-10-26T01:11:47","slug":"bsi-pd-iso-iec-ts-23078-22020","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iso-iec-ts-23078-22020\/","title":{"rendered":"BSI PD ISO\/IEC TS 23078-2:2020"},"content":{"rendered":"
This document defines a technical solution for encrypting resources in digital publications (especially EPUB) and for securely delivering decryption keys to reading systems, included in licenses tailored to specific users. It also defines a simple passphrase-based authentication method for reading systems to verify the license and access the encrypted resources of such digital publications.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4 Abbreviated terms 5 Overview 5.1 General <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5.2 Protecting the publication <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 5.3 Licensing the publication 5.4 Reading the publication <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 6 License document 6.1 General 6.2 Content conformance 6.3 License information 6.3.1 General <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 6.3.2 Encryption (transmitting keys) <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 6.3.3 Links (pointing to external resources) <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6.3.4 Rights (identifying rights and restrictions) <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 6.3.5 User (identifying the user) <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 6.3.6 Signature (signing the license) <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 6.4 User key 6.4.1 General 6.4.2 Calculating the user key <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 6.4.3 Hints 6.4.4 Requirements for the user key and user passphrase 6.5 Signature and public key infrastructure 6.5.1 General <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 6.5.2 Certificates 6.5.3 Canonical form of the license document <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 6.5.4 Generating the signature <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 6.5.5 Validating the certificate and signature 7 License status document 7.1 General <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 7.2 Content conformance 7.3 License status information 7.3.1 General 7.3.2 Status <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 7.3.3 Updated (timestamps) 7.3.4 Links <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 7.3.5 Potential rights 7.3.6 Events <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 7.4 Interactions 7.4.1 General 7.4.2 Handling errors 7.4.3 Checking the status of a license 7.4.4 Registering a device <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 7.4.5 Returning a publication <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 7.4.6 Renewing a license <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 8 Encryption profile 8.1 General 8.2 Encryption profile requirements <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 8.3 Basic encryption profile 1.0 9 Integration in EPUB 9.1 General 9.2 Encrypted resources <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 9.3 Using META-INF\/encryption.xml for LCP <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 10 Reading system behavior 10.1 Detecting LCP protected publication 10.2 License document processing 10.2.1 Overall 10.2.2 Validating the license document 10.2.3 Acquiring the publication 10.2.4 License status processing <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 10.3 User key processing 10.4 Signature processing 10.5 Publication processing <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | Annex A (informative) Examples <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | Annex B (informative) Use case scenarios for library lending model <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Specification of DRM technology for digital publications – User key-based protection<\/b><\/p>\n |