{"id":126419,"date":"2024-10-19T05:36:45","date_gmt":"2024-10-19T05:36:45","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-23078-22024\/"},"modified":"2024-10-24T23:20:00","modified_gmt":"2024-10-24T23:20:00","slug":"bs-iso-iec-23078-22024","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-23078-22024\/","title":{"rendered":"BS ISO\/IEC 23078-2:2024"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4 Abbreviated terms <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5 Overview 5.1 General 5.2 Protecting the publication <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 5.3 Licensing the publication 5.4 Reading the publication <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 6 License document 6.1 General 6.2 Content conformance 6.3 License information 6.3.1 General <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 6.3.2 Encryption (transmitting keys) <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 6.3.3 Links (pointing to external resources) <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6.3.4 Rights (identifying rights and restrictions) <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 6.3.5 User (identifying the user) <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 6.3.6 Signature (signing the license) <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 6.4 User key 6.4.1 General 6.4.2 Calculating the user key 6.4.3 Hints <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 6.4.4 Requirements for the user key and user passphrase 6.5 Signature and public key infrastructure 6.5.1 General 6.5.2 Certificates <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 6.5.3 Canonical form of the license document <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 6.5.4 Generating the signature <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 6.5.5 Validating the certificate and signature 7 License status document 7.1 General 7.2 Content conformance <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 7.3 License status information 7.3.1 General 7.3.2 Status 7.3.3 Updated (timestamps) <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 7.3.4 Links 7.3.5 Potential rights <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 7.3.6 Events 7.4 Interactions 7.4.1 General 7.4.2 Handling errors 7.4.3 Checking the status of a license <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 7.4.4 Registering a device <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 7.4.5 Returning a publication <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 7.4.6 Renewing a license <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 8 Encryption profile 8.1 General <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 8.2 Encryption profile requirements 8.3 Basic encryption profile 1.0 9 Integration in EPUB 9.1 General 9.2 Encrypted resources <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 9.3 Using META-INF\/encryption.xml for LCP <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 10 Reading system behaviour 10.1 Detecting LCP protected publication 10.2 License document processing 10.2.1 Overall 10.2.2 Validating the license document 10.2.3 Acquiring the publication <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 10.2.4 License status processing 10.3 User key processing 10.4 Signature processing <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 10.5 Publication processing <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | Annex A (informative) Examples <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | Annex B (informative) Use case scenarios for library lending model <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | Annex C (informative) An extension of the LCP specification for PDF <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Specification of digital rights management (DRM) technology for digital publications – User key-based protection<\/b><\/p>\n |