Availability: Public OMA Confidential

Slides:



Advertisements
Similar presentations
4 th DataGRID Project Conference, Paris, 5 March 2002 Testbed Software Test Plan I. Mandjavidze on behalf of L. Bobelin – CS SI; F.Etienne, E. Fede – CPPM;
Advertisements

Doc.: IEEE tvws Submission September 2009 Stanislav Filin et al, NICTSlide 1 Comments to WS coexistence draft PAR Notice: This document.
The International Security Standard
© 2003 Open Mobile Alliance Ltd. All Rights Reserved. Used with the permission of the Open Mobile Alliance Ltd. under the terms as stated in this document.
Professional Behaviour
© 2008 Open Mobile Alliance Ltd. All Rights Reserved. Used with the permission of the Open Mobile Alliance Ltd. under the terms as stated in this document.
© 2003 Open Mobile Alliance Ltd. All Rights Reserved. Used with the permission of the Open Mobile Alliance Ltd. under the terms as stated in this document.
© 2011 Open Mobile Alliance Ltd. All Rights Reserved. Used with the permission of the Open Mobile Alliance Ltd. under the terms as stated in this document.
© 2003 Open Mobile Alliance Ltd. All Rights Reserved. Used with the permission of the Open Mobile Alliance Ltd. under the terms as stated in this document.
© 2011 Open Mobile Alliance Ltd. All Rights Reserved. Used with the permission of the Open Mobile Alliance Ltd. under the terms as stated in this document.
Authentication, Access Control, and Authorization (1 of 2) 0 NPRM Request (for 2017) ONC is requesting comment on two-factor authentication in reference.
© 2003 Open Mobile Alliance Ltd. All Rights Reserved. Used with the permission of the Open Mobile Alliance Ltd. under the terms as stated in this document.
Unit 15 Webpage Creator. Outlines Introduction Starter Listening Language Work Work study Speaking Writing.
© NOKIADEFAULT.PPT / / AO page: 1 USIM requirements and structure NOKIA Mobile Phones TSGT3#3(99)082.
CONTENTS 1.Work done in JUNE (22nd-30th)‏ i) Stage 1:Concept proposal acceptance module upload (Slide 2nd)‏ 2. Work done in JULY a) Stage 1: Improvised.
Yang Shi (Richard), Yong Zhang IETF 74 th 26 March 2009, San Francisco CAPWAP WG MIB Drafts Report.
Introduction to Software Development. Systems Life Cycle Analysis  Collect and examine data  Analyze current system and data flow Design  Plan your.
© 2005 Open Mobile Alliance Ltd. All Rights Reserved. Used with the permission of the Open Mobile Alliance Ltd. under the terms as stated in this document.
Company Confidential Contact Center information package for new Device First Use flow 22 nd Dec 2009.
© 2003 Open Mobile Alliance Ltd. All Rights Reserved. Used with the permission of the Open Mobile Alliance Ltd. under the terms as stated in this document.
Sony Pictures Confidential Watermarking in AACS. Sony Pictures Confidential SPE Forensic Watermarking Goals Goals: – Identify the device that was compromised.
Software Life Cycle The software life cycle is the sequence of activities that occur during software development and maintenance.
CDNI Requirements (draft-lefaucheur-cdni-requirements-02) CDNI Working Group IETF 81 Quebec City, Canada July 28, 2011 Kent Leung Yiu.
© 2007 Open Mobile Alliance Ltd. All Rights Reserved. Used with the permission of the Open Mobile Alliance Ltd. under the terms as stated in this document.
Slide #1 Nov 6 – 11, 2005XCON WG IETF54 Conference Package Extensions draft-levin-xcon-conference-package-ext-00 by Orit Levin The Discussion Starter.
© 2004 Open Mobile Alliance Ltd. All Rights Reserved. Used with the permission of the Open Mobile Alliance Ltd. under the terms as stated in this document.
Chapter 5 How are software packages developed?. What are the main steps in software project development? Writing Specifications - Analysis Phase Developing.
Recent Results of JCA-NID and TSAG Byoung Nam LEE HyoungJun KIM ETRI, Korea.
Doc.: IEEE g Submission November, 2010 Roberto Aiello, ItronSlide 1 Project: IEEE P Working Group for Wireless Personal Area.
Cornell Information Technologies Information Systems/Data Delivery ACTUATE RETIREMENT PROJECT ASPC UPDATE 12/7/06 Objectives Primary - Retire Actuate Reduce.
CAP169 02/04/09. 2 Today  Agree Terms of Reference  Timetable going forward  Discussion of Part 1 and Part 2 Finalise and agree  Discussion of Part.
The ODV Draft Handbook Submisssion to the Commerce Commission on behalf of the Electricity Networks Association Stuart Shepherd 14 April 2004.
ONF presentations to ETSI NFV Info Modelling Industry Status ONF Modeling Update 29 March 2016 Note that some points are related to the Multi-SDO Issues.
Interface extensions YANG & VLAN sub-interface YANG Status update
The Right Selective Adoption Strategy for Greater ROI
Administrator Training
P802.1CS Link-local Registration Protocol
CAIDP Contracting Workshop Contracts Performance Guarantee Update
ATIS Cybersecurity DOCUMENT #: GSC13-GTSC6-12 FOR: Presentation
P802.11aq Waiver request regarding IEEE RAC comments
Response to ANEC proposal for Booster phase out in R44
UNIT 15 Webpage Creator.
ETSI Standardization Activities on M2M communications
Textbook Engineering Web Applications by Sven Casteleyn et. al. Springer Note: (Electronic version is available online) These slides are designed.
Transmitted by the expert
Inducements Mike Ashley – IESBA Member and Task Force Chair
doc.: IEEE <doc#>
doc.: IEEE <doc#>
Unit 09 – LO3 - Be able to Implement and Test Products
Response to Comments Received on the a PAR and CSD
Coordinate Operations Standard
Chapter 22, Part
ESB Networks Market Release Meeting of the IGG, April 16th 2009
Date, location 1.
TG1 and System Design Document
VERITE – Dissemination plan
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
TG1 Draft Topics Date: Authors: September 2012 Month Year
Strategic Coordination Group
Requirements Date: Authors: March 2010 Month Year
Jul 12, /12/10 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Response to PAR and 5C Comments.
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
Clause 7 Comment Resolutions
Proposed solution for comments on Beam modes
TG1 Draft Topics Date: Authors: September 2012 Month Year
General Discussion Conclusions:
Subject Name: SOFTWARE ENGINEERING Subject Code:10IS51
OMA-TISPAN Workshop an integrated operator vision
ETSI Contribution to 3rd Meeting of EC Expert Group on RRS
draft-ietf-dtn-bpsec-06
Presentation transcript:

Availability: Public OMA Confidential OMA-BCAST-2004-0145-RD Comments Issues not addressed in BCAST Requirements Comments to slides #3 and #4 by Lucent Submitted To: BCAST Date: 4th November 2004 Availability: Public OMA Confidential Contact: Arieh Moller (amoller@ndsisrael.com) Arjen van der Vegt (avegt@irdetoaccess.com) Herve Brugal (herve.brugal@gemplus.com) Ilan Mahalal (imahalal@axalto.com) Source: NDS, Irdeto Access, Gemplus, Axalto X USE OF THIS DOCUMENT BY NON-OMA MEMBERS IS SUBJECT TO ALL OF THE TERMS AND CONDITIONS OF THE USE AGREEMENT (located at http://www.openmobilealliance.org/UseAgreement.html) AND IF YOU HAVE NOT AGREED TO THE TERMS OF THE USE AGREEMENT, YOU DO NOT HAVE THE RIGHT TO USE, COPY OR DISTRIBUTE THIS DOCUMENT. THIS DOCUMENT IS PROVIDED ON AN "AS IS" "AS AVAILABLE" AND "WITH ALL FAULTS" BASIS.

Key Issues We believe that the current version of the BCAST requirement contain some serious security flaws. The area that we believe need requirements added is Service & Content Protection

Service & Content Protection The issues that we still believe needs to be addressed are as follows: There needs to be a mechanism to allow for the application of “bug fixes” to deployed devices There needs to be a mechanism to allow for upgrading the key management systems if new business models are required to be supported There needs to be a method to allow for the key management system to be replaced if (and when) it gets compromised. There needs to be a mechanism that can complement device revocation, as revocation has many negative operational implications e.g. an annoyed user base the requirement as formulated calls for a specific solution to a potential problem (there is no business requirement that would call for replacable modules; the business requirement is to have a secure solution that supports mobility and interoperability) Conclusion: if experts in the DRM group conclude that a mechanism such as the proposed one is needed, this mechanism can and will be specified

S&CP requirements Therefore we suggest that the following requirement be added: The system SHALL support the defined key management system, and SHALL allow for an open standard secure mechanism to allow for system recovery, upgrades, and bug fixes. In light of preliminary comments we wish to stress that by no means does the above conflict with the following requirement: SPCP-2 Openness - All functions needed for service and content protection, including e.g. the key management, the delivery, and encryption and decryption operations of keys and content, and interfaces, SHALL be fully specified so that no proprietary extension to any part of the system are required. The above does not require any extension, but rather ALLOWS it. DO NOT VIEW IN SLIDE SHOW MODE. SEE BELOW FOR NOKIA and LUCENT COMMENTS NOKIA COMMENT upgrades shall be covered by device management if security of the upgrade mechanism is of concern, this can be brought into DM we need no standardized mechanism to distribute bug fixes bugs in the mechanism need to be eliminated in the specification and IOP phase bugs in the implementation are under the responsibility of the vendors what does system recovery mean? there can’t be a requirement for something we don’t know what it is Conclusion: the mechanisms that make up a secure service and content protection system, as well as the mechanisms that are required to keep it secure, shall be specified during specification work, but there is at this moment in time no genuine requirement that calls for a particular solution such as the proposed one. LUCENT COMMENT: To allow for an Open Standard Secure Mechanism for system recovery, upgrades or bug fixes. This standard does not exist and we should like to see evidence of work in progress for this if we are to support placing a requirement upon this Open Standard. SHALL, as discussed in the call 15th Dec, will mandate operators to pay for a costly and complex to manage feature. If this requirement stands, we feel this needs to become SHOULD. To call up the defined key management system is outside of requirements work and shall be left to stage 2/3 work. The call already agreed to remove the text up to the comma, that was my understanding. Device Management is now covering capabilities to download potential upgrades so this requirement becomes subsumed into a broader work. Bug fixes can be classed as maintenance work and not a security specific issue. System recovery, as mentioned in the call by several, appears to address system wide issues, not specifically security.

Thank you!