{"id":229229,"date":"2024-10-19T14:54:42","date_gmt":"2024-10-19T14:54:42","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iec-62481-72017\/"},"modified":"2024-10-25T09:02:33","modified_gmt":"2024-10-25T09:02:33","slug":"bs-iec-62481-72017","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iec-62481-72017\/","title":{"rendered":"BS IEC 62481-7:2017"},"content":{"rendered":"
This part of IEC 62481 specifies DLNA interoperability guidelines for device authentication.<\/p>\n
The DLNA interoperability guidelines are based on a device authentication solution, which is defined as methods to enable authentication of a client device as DLNA Certified. Methods are included to allow a client device to authenticate a server device as trusted by a Certificate Authority.<\/p>\n
The guidelines are intended to supplement other interoperability mechanisms already defined for DLNA link protection and DLNA DRM interoperability solutions.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | CONTENTS <\/td>\n<\/tr>\n | ||||||
5<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | INTRODUCTION <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | 1 Scope 2 Normative references <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 3 Terms, definitions and conventions 3.1 General terms 3.2 Conventions <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 4 Networking architecture and guideline conventions 4.1 DLNA home networking architecture 4.2 Document conventions 4.3 Guideline structure 5 DLNA Device Model 5.1 General 5.2 Authentication Device Functions <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | Figure 1 \u2013 Authentication functions <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5.3 Device Options 5.4 System usages 5.5 Theory of operation <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 6 Guideline requirements 6.1 Device discovery and control 6.1.1 Authentication Server discovery 6.1.2 Authentication Client discovery <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 6.2 Authentication guidelines 6.2.1 Authentication Server protocols <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 6.2.2 Authentication Client protocols <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 6.2.3 Client Authentication guidelines <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6.2.4 Server Authentication guidelines <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Digital living network alliance (DLNA) home networked device interoperability guidelines – Authentication<\/b><\/p>\n |