Table of Contents

 1     Scope            
 2     References   
 3     Definitions   
        3.1     Terms defined elsewhere
        3.2     Terms defined in this Recommendation     
 4     Abbreviations and acronyms  
 5     Conventions
 6     Introduction
        6.1     IPTV general architecture and content protection architecture              
        6.2     IPTV general architecture and content protection architecture              
        6.3     Reference model of group key management             
        6.4     Grouping of TDs              
 7     Requirements for the key management scheme 
        7.1     Requirements for key management described in [ITU-T X.1191]         
        7.2     General requirements for key management               
        7.3     Functional requirements for key management          
 8     Key management scheme for secure IPTV services           
        8.1     Key management scheme for unicast-based IPTV service     
        8.2     Key management scheme for multicast IPTV service             
        8.3     Key management scheme for a downloadable SCP scheme 
Appendix I – Multimedia Internet keying    
        I.1                   Overview of MIKEY         
        I.2                   Protocol operation              
Appendix II – Extensible authentication protocol    
       II.1     EAP-AKA          
       II.2     EAP-PSK           
       II.3     EAP-TLS           
       II.4     EAP-FAST         
       II.5     EAP-IKEv2       
       II.6     EAP-TTLS         
       II.7     PEAP  
Bibliography