throbber

`
`INTERNATIONAL TELECOMMUNICATION UNION
`
`ITU-T
`
`TELECOMMUNICATION
`STANDARDIZATION SECTOR
`OF ITU
`
`H.235
`
`(02/98)
`
`SERIES H: AUDIOVISUAL AND MULTIMEDIA SYSTEMS
`
`Infrastructure of audiovisual services — Systems aspects
`
`Security and encryption for H-Series
`(H.323 and other H.245-based) multimedia
`terminals
`
`ITU-T Recommendation H.235
`
`(Previously CCITT Recommendation)
`
`Petitioner Apple Inc. - Exhibit 1084, Cover
`
`Petitioner Apple Inc. - Exhibit 1084, Cover
`
`

`

`ITU—T H-SERIES RECOMMENDATIONS
`
`AUDIOVISUAL AND MULTIMEDIA SYSTEMS
`
`Characteristics of transmission channels used for other than telephone purposes
`
`H.10—H.19
`
`H.300—H.399
`
`Use of telephone—type circuits for voice-frequency telegraphy
`
`Telephone circuits or cables used for various types of telegraph transmission or
`simultaneous transmission
`'
`
`Telephone-type circuits used for facsimile telegraphy
`Characteristics of data signals
`CHARACTERISTICS OF VISUAL TELEPHONE SYSTEMS
`INFRASTRUCTURE OF AUDIOVISUAL SERVICES
`
`General
`
`Transmission multiplexing and ynchronization
`
`
`
`(Communication procedures
`Coding of moving video
`Related systems aspects
`Systems and terminal equipment for audiovisual services
`
`H.20—H.29
`
`H.30—H.39
`
`H.40—H.49
`H.50~H.99
`H.100—H.199
`
`H.200—H.219
`
`H 220 H.229
`
`H.240—:II.259
`H.260—H.279
`H.280—H.299
`
`Forfurther details, please refer to [TU—TList ofRecommendations.
`
`Petitioner Apple Inc. - Exhibit 1084, Cover 2
`
`Petitioner Apple Inc. - Exhibit 1084, Cover 2
`
`

`

`ITU-T RECOMMENDATION H.235
`
`SECURITY AND ENCRYPTION FOR H—SERIES
`
`(H.323 AND OTHER H.245-BASED)
`MULTIMEDIA TERMINALS
`
`Summary
`
`This Recommendation describes enhancements within the framework of the H.3xx-Series
`
`Recommendations to incorporate security services such as Authentication and Privacy (data
`encryption). The proposed scheme is applicable to both simple point—to-point and multipoint
`conferences for any terminals which utilize Recommendation H.245 as a control protocol.
`
`For example, H.323 systems operate over packet-based networks which do not provide a guaranteed
`quality of service. For the same technical reasons that the base network does not provide QOS, the
`network does not provide a secure service. Secure real-time communication over insecure networks
`generally involves two major areas of concern — authentication and privacy.
`
`This Recommendation describes the security infrastructure and specific privacy techniques to be
`employed by the H.3xx-Series of multimedia terminals. This Recommendation will cover areas of
`concern for
`interactive conferencing. These areas
`include, but are not strictly limited to,
`authentication and privacy of all real—time media streams that are exchanged in the conference. This
`Recommendation provides the protocol and algorithms needed between the H.323 entities.
`
`This Recommendation utilizes the general facilities supported in Recommendation H.245 and as
`such, any standard which operates in conjunction with this control protocol may use this security
`framework. It is expected that, wherever possible, other H-Series terminals may interoperate and
`directly utilize the methods described in this Recommendation. This Recommendation will not
`initially provide for complete implementation in all areas, and will specifically highlight endpoint
`authentication and media privacy.
`
`This Recommendation includes the ability to negotiate services and functionality in a generic
`manner, and to be selective concerning cryptographic techniques and capabilities utilized. The
`specific manner in which they are used relates to systems capabilities, application requirements and
`specific security policy constraints. This Recommendation supports varied cryptographic algorithms,
`with varied options appropriate for different purposes; e.g. key lengths. Certain cryptographic
`algorithms may be allocated to specific security services (e.g. one for fast media stream encryption
`and another for signalling encryption).
`
`It should also be noted that some of the available cryptographic algorithms or mechanisms may be
`reserved for export or other national issues (e.g. with restricted key lengths). This Recommendation
`supports
`signalling of well-known algorithms in addition to signalling non—standardized or
`proprietary cryptographic algorithms. There are no specifically mandated algorithms; however, it is
`strongly suggested that endpoints support as many of the applicable algorithms as possible in order to
`achieve interoperability. This parallels the concept that the support of Recommendation H.245 does
`not guarantee the interoperability between two entities‘ codecs.
`
`Source
`
`ITU-T Recommendation H.235 was prepared by ITU-T Study Group 16 (1997-2000) and was
`approved under the WTSC Resolution No. 1 procedure on the 6th February 1998.
`
`Petitioner Apple Inc. - Exhibit 1084, p. i
`
`Petitioner Apple Inc. - Exhibit 1084, p. i
`
`

`

`FOREWORD
`
`ITU (International Telecommunication Union) is the United Nations Specialized Agency in the field of
`telecommunications. The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of
`the ITU. The ITU-T is responsible for studying technical, operating and tariff questions and issuing
`Recommendations on them with a View to standardizing telecommunications on a worldwide basis.
`
`The World Telecommunication Standardization Conference (WTSC), which meets every four years,
`establishes the topics for study by the ITU-T Study Groups which, in their turn, produce Recommendations
`on these topics.
`
`The approval of Recommendations by the Members of the ITU—T is covered by the procedure laid down in
`WTSC Resolution No. 1.
`
`In some areas of information technology which fall within ITU-T’s purview, the necessary standards are
`prepared on a collaborative basis with ISO and IEC.
`
`the expression "Administration" is used for conciseness to indicate both a
`In this Recommendation,
`telecommunication administration and a recognized operating agency.
`
`NOTE
`
`INTELLECTUAL PROPERTY RIGHTS
`
`The ITU draws attention to the possibility that the practice or implementation of this Recommendation may
`involve the use of a claimed Intellectual Property Right. The ITU takes no position concerning the evidence,
`validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others
`outside of the Recommendation development process.
`
`As of the date of approval of this Recommendation, the ITU had not received notice of intellectual property,
`protected by patents, which may be required to implement this Recommendation. However, implementors are
`cautioned that this may not represent the latest information and are therefore strongly urged to consult the
`TSB patent database.
`
`All rights reserved. No part of this publication may be reproduced or utilized in any form or by any means,
`electronic or mechanical, including photocopying and microfilm, without permission in writing from the ITU.
`
`© ITU 1998
`
`ii
`
`Recommendation H.235
`
`(02/98)
`
`Petitioner Apple Inc. - Exhibit 1084, p. ii
`
`Petitioner Apple Inc. - Exhibit 1084, p. ii
`
`

`

`CONTENTS
`
`Page
`
`Scope ..........................................................................................................................
`
`1
`
`Normative references..................................................................................................
`
`Definitions ..................................................................................................................
`
`Symbols and abbreviations .........................................................................................
`
`Conventions ................................................................................................................
`
`System introduction....................................................................................................
`
`Summary ....................................................................................................................
`
`Authentication ............................................................................................................
`
`6.2.1
`
`Certificates ....................................................................................................
`
`Call establishment security .........................................................................................
`
`Call control (H.245) security ......................................................................................
`
`Media stream privacy .................................................................................................
`
`Trusted elements .........................................................................................................
`
`6.6.1
`
`Key escrow ....................................................................................................
`
`Non-repudiation..........................................................................................................
`
`Connection establishment procedures ........................................................................
`
`7.1
`
`Introduction ................................................................................................................
`
`8.1
`
`8.2
`
`8.3
`
`8.4
`
`8.5
`
`9.1
`
`9.2
`
`10
`
`10.1
`
`10.2
`
`H.245 signalling and procedures ................................................................................
`
`Secure H.245 channel operation .................................................................................
`
`Unsecured H.245 channel operation...........................................................................
`
`Capability exchange ...................................................................................................
`
`Master role ..................................................................................................................
`
`Logical channel signalling..........................................................................................
`
`Multipoint procedures ................................................................................................
`
`Authentication ............................................................................................................
`
`Privacy ........................................................................................................................
`
`Authentication signalling and procedures ..................................................................
`
`Introduction ................................................................................................................
`
`Diffie—Hellman with optional authentication .............................................................
`
`\I\I\JO\O\C\O\UIUIUIJ>-I>UJN
`000000000000
`
`00
`
`00
`
`,_. 0
`
`+— O
`
`H 0
`
`H O
`
`Recommendation H.235
`
`(02/98)
`
`iii
`
`Petitioner Apple Inc. - Exhibit 1084, p. iii
`
`Petitioner Apple Inc. - Exhibit 1084, p. iii
`
`

`

`10.3
`
`Subscription—based authentication..............................................................................
`10.3.1
`Introduction ....................................................................................................
`
`10.3.2 Password with symmetric encryption ...........................................................
`
`10.3.3 Password with hashing ..................................................................................
`
`10.3.4 Certificate-based with signatures ..................................................................
`
`11
`
`Media stream encryption procedures..........................................................................
`
`11.1 Media session keys .....................................................................................................
`
`12
`
`Security error recovery ...............................................................................................
`
`Annex A — H.235 ASN.1 .........................................................................................................
`
`Annex B — H.323 specific topics .............................................................................................
`
`B. 1
`
`B.2
`
`B.3
`
`B.4
`
`Background ................................................................................................................
`
`Signalling and procedures ..........................................................................................
`
`B21 Revision 1 compatibility ...............................................................................
`
`RTP/RTCP issues .......................................................................................................
`
`RAS signalling/procedures for authentication............................................................
`B41
`Introduction ...................................................................................................
`
`B.4.2 Endpoint-gatekeeper authentication (non-subscription based) .....................
`
`B.4.3
`
`Endpoint-gatekeeper authentication (subscription-based) ............................
`
`B.5
`
`Non-terminal interactions ...........................................................................................
`
`B51 Gateway.........................................................................................................
`
`Annex C — H.324 specific topics .............................................................................................
`
`Appendix I — H.323 implementation details ............................................................................
`
`1.1
`
`1.2
`
`1.3
`
`1.4
`
`Ciphertext padding methods .......................................................................................
`
`New keys ....................................................................................................................
`
`H.323 trusted elements ...............................................................................................
`
`Implementation examples...........................................................................................
`I41
`Tokens ...........................................................................................................
`
`1.4.2
`
`1.4.3
`
`Password .......................................................................................................
`
`IPSEC ............................................................................................................
`
`Appendix II — H.324 implementation details ..........................................................................
`
`Appendix III — Other H-series implementation details............................................................
`
`Appendix IV — Bibliography ...................................................................................................
`
`Page
`
`11
`11
`
`11
`
`12
`
`12
`
`13
`
`15
`
`16
`
`16
`
`19
`
`19
`
`20
`
`21
`
`21
`
`22
`22
`
`22
`
`23
`
`25
`
`25
`
`25
`
`25
`
`25
`
`27
`
`27
`
`28
`28
`
`29
`
`30
`
`31
`
`31
`
`31
`
`iv
`
`Recommendation H.235
`
`(02/98)
`
`Petitioner Apple Inc. - Exhibit 1084, p. iv
`
`Petitioner Apple Inc. - Exhibit 1084, p. iv
`
`

`

`Recommendation H.235
`
`SECURITY AND ENCRYPTION FOR H—SERIES
`
`(H.323 AND OTHER H.245—BASED)
`MULTIMEDIA TERMINALS
`
`(Geneva, 1998)
`
`1
`
`Scope
`
`The primary purpose of this Recommendation is to provide for authentication, privacy, and integrity
`within the current H-Series protocol framework. The current text of this Recommendation (1998)
`provides details on implementation with Recommendation H.323. This framework is expected to
`operate in conjunction with other H—Series protocols that utilize Recommendation H.245 as their
`control protocol.
`
`Additional goals in this Recommendation include:
`
`1)
`
`2)
`
`3)
`
`4)
`
`5)
`
`6)
`
`7)
`
`Security architecture should be developed as an extensible and flexible framework for
`implementing a security system for H—Series terminals. This should be provided through
`flexible and independent services and the functionality that they supply. This includes the
`ability to negotiate and to be selective concerning cryptographic techniques utilized, and the
`manner in which they are used.
`
`Provide security for all communications occurring as a result of H.3xx protocol usage. This
`includes aspects of connection establishment, call control, and media exchange between all
`entities. This requirement includes the use of confidential communication (privacy), and may
`exploit functions for peer authentication as well as protection of the user’s environment from
`attacks.
`
`This Recommendation should not preclude integration of other security functions in H.3xx
`entities which may protect them against attacks from the network.
`
`This Recommendation should not limit the ability for any H.3xx-Series Recommendation to
`scale as appropriate. This may include both the number of secured users and the levels of
`security provided.
`
`Where appropriate, all mechanisms and facilities should be provided independent of any
`underlying transport or
`topologies. Other means that are outside the scope of this
`Recommendation may be required to counter such threats.
`
`Provisions are made for operation in a mixed environment (secured and unsecured entities).
`
`This Recommendation should provide facilities for distributing session keys associated with
`the cryptography utilized. (This does not imply that public-key—based certificate management
`must be part of this Recommendation.)
`
`The security architecture, described in this Recommendation, does not assume that the participants
`are familiar with each other. It does however assume that appropriate precautions have been taken to
`physically secure the H-Series endpoints. The principal security threat to communications, therefore,
`is assumed to be eavesdropping on the network or some other method of diverting media streams.
`
`Recommendation H.323 (1996) provides the means to conduct an audio, video and data conference
`between two or more parties, but does not provide the mechanism to allow each participant to
`authenticate the identity of the other participants, nor provide the means to make the communications
`private (i.e. encrypt the streams).
`
`Recommendation H.235
`
`(02/98)
`
`1
`
`Petitioner Apple Inc. - Exhibit 1084, p. l
`
`Petitioner Apple Inc. - Exhibit 1084, p. 1
`
`

`

`Recommendations H.323, H.324 and H.310 make use of the logical channel signalling procedures of
`Recommendation H.245, in which the content of each logical channel is described when the channel
`is opened. Procedures are provided for expression of receiver and transmitter capabilities,
`transmissions are limited to what receivers can decode, and receivers may request a particular desired
`mode from transmitters. The security capabilities of each endpoint are communicated in the same
`manner as any other communication capability.
`'
`
`Some H-Series (H.323) terminals may be used in multipoint configurations. The security mechanism
`described in this Recommendation will allow for secure operation in these environments, including
`both centralized and decentralized MCU operation.
`
`2
`
`Normative references
`
`The following ITU-T Recommendations and other references contain provisions which, through
`reference in this text, constitute provisions of this Recommendation. At the time of publication, the
`editions indicated were valid. All Recommendations and other references are subject to revision; all
`users of this Recommendation are therefore encouraged to investigate the possibility of applying the
`most recent edition of the Recommendations and other references listed below. A list of the currently
`valid ITU-T Recommendations is regularly published.
`
`—
`
`—
`
`-
`
`-
`
`—
`
`—
`
`—
`
`—
`
`—
`
`—
`
`—
`
`—
`
`ITU-T Recommendation H.225.0 (1998), Call signalling protocols and media stream
`packetization for packet—based multimedia communications systems.
`
`ITU-T Recommendation H.245 (1998), Control protocolfor multimedia communication.
`
`ITU-T Recommendation H.323 (1998), Packet—based multimedia communications systems.
`
`ITU-T Recommendation Q.931 (1993), ISBN user-network interface layer 3 specification
`for basic call control.
`
`ITU—T Recommendation X.509 (1997) | ISO/IEC 9594—8:1997, Information technology —
`Open Systems Interconnection — The Directory: Authentication framework.
`
`CCITT Recommendation X.800 (1991), Security Architecture for Open Systems
`Interconnection for CCITT applications.
`
`ISO 7498-2989, Information processing systems — Open Systems Interconnection — Basic
`Reference Model — Part 2: Security Architecture.
`
`ITU-T Recommendation X803 (1994) I ISO/IEC 10745: 1995, Information technology —
`Open Systems Interconnection ~ Upper layers security model.
`
`ITU-T Recommendation X.810 (1995) | ISO/IEC 10181-lzl996, Information technology —
`Open Systems Interconnection — Securityframeworks for open systems: Overview.
`
`ITU-T Recommendation X.811 (1995) | ISO/IEC 10181—221996, Information technology —
`Open Systems Interconnection — Security fiameworks for open systems: Authentication
`framework.
`
`ISO/IEC 9798—21994, Information technology — Security techniques — Entity authentication
`— Part 2: Mechanisms using symmetric encipherment algorithms.
`
`ISO/IEC 9798—3:1993, Information technology — Security techniques — Entity authentication
`mechanisms — Part 3 .' Entity authentication using a public key algorithm.
`
`ISO/IEC 9798-4:l995, Information technology — Security techniques — Entity authentication
`— Part 4: Mechanisms using a cryptographic checkfunction.
`
`2
`
`Recommendation H.235
`
`(02/98)
`
`Petitioner Apple Inc. - Exhibit 1084, p. 2
`
`Petitioner Apple Inc. - Exhibit 1084, p. 2
`
`

`

`—
`
`—
`
`3
`
`ATKINSON (R.): Security Architecture for the Internet Protocol, RFC 1825, Internet
`Engineering Task Force, 1995.
`
`KRAWCZYK (H.), BELLARE (M.), CANETTI (R): HMAC: Keyed—Hashing for Message
`Authentication, RFC 2104, Internet Engineering Task Force, 1997.
`
`Definitions
`
`For the purposes of this Recommendation the definitions given in clause 3 of Recommendations
`H.323, H.225.0 and H.245 apply along with those in this clause. Some of the following terms are
`used as defined in CCITT Rec. X.800 I ISO 7498—2 and in Recommendations X803, X810 and
`X811.
`
`access control: The prevention of unauthorized use of a resource, including the prevention
`3.1
`of use of a resource in an unauthorized manner (X.800).
`
`3.2
`
`3.3
`
`authentication: The provision of assurance of the claimed identity of an entity (X811).
`
`authorization: The granting of permission on the basis of authenticated identification.
`
`attack: The activities undertaken to bypass or exploit deficiencies in a system‘s security
`3.4
`mechanisms. By a direct attack on a system they exploit deficiencies in the underlying algorithms,
`principles, or properties of a security mechanism. Indirect attacks are performed when they bypass
`the mechanism, or when they make the system use the mechanism incorrectly.
`
`certificate: A set of security-relevant data issued by a security authority or trusted third
`3.5
`party, together with security information which is used to provide the integrity and data origin
`authentication services for the data (X810). In this Recommendation the term refers to "public key"
`certificates which are values that represent an owners public key (and other optional information) as
`verified and signed by a trusted authority in an unforgeable format.
`
`3.6
`
`cipher: A cryptographic algorithm, a mathematical transform.
`
`confidentiality: The property that prevents disclosure of information to unauthorized
`3.7
`individuals, entities, or processes.
`
`cryptographic algorithm: Mathematical function that computes a result from one or several
`3.8
`input values.
`
`encipherment: Encipherment (encryption) is the process of making data unreadable to
`3.9
`unauthorized entities by applying a cryptographic algorithm (an encryption algorithm). Decipherment
`(decryption) is the reverse operation by which the ciphertext is transformed to the plaintext.
`
`3.10
`
`integrity: The property that data has not been altered in an unauthorized manner.
`
`key management: The generation, storage, distribution, deletion, archiving and application
`3.11
`of keys in accordance with a security policy (X.800).
`
`media stream: A media stream can be of type audio, video or data or a combination of any
`3.12
`of them. Media stream data conveys user or application data (payload) but no control data.
`
`nonrepudiation: Protection from denial by one of the entities involved in a communication
`3.13
`of having participated in all or part of the communication.
`
`privacy: A mode of communication in which only the explicitly enabled parties can interpret
`3.14
`the communication. This is typically achieved by encryption and shared key(s) for the cipher.
`
`Recommendation H.235
`
`(02/98)
`
`3
`
`Petitioner Apple Inc. - Exhibit 1084, p. 3
`
`Petitioner Apple Inc. - Exhibit 1084, p. 3
`
`

`

`private channel: For this Recommendation, a private channel is one that is a result of prior
`3.15
`negotiation on a secure channel. In this context it may be used to handle media streams.
`
`(for
`public key cryptography: An encryption system utilizing asymmetric keys
`3.16
`encryption/decryption) in which the keys have a mathematical relationship to each other — which
`cannot be reasonably calculated.
`
`symmetric (secret—key based) cryptographic algorithm: An algorithm for performing
`3.17
`encipherrnent or the corresponding algorithm for performing decipherment in which the same key is
`required for both encipherment and decipherment (X.810).
`
`3.18
`
`threat: A potential violation of security (X800).
`
`4
`
`Symbols and abbreviations
`
`This Recommendation uses the following abbreviations:
`
`DSS
`
`Digital Signature Standard
`
`IPSEC
`
`Internet Protocol Security
`
`QOS
`
`RSA
`SDU
`
`TLS
`
`Quality of Service
`
`Rivest, Shamir and Adleman (public key algorithm)
`Service Data Unit
`
`Transport Level Security
`
`5
`
`Conventions
`
`In this Recommendation the following conventions are used:
`
`—
`
`—
`
`—
`
`"Shall" indicates a mandatory requirement.
`
`"Should" indicates a suggested but optional course of action.
`
`"May" indicates an optional course of action rather than a recommendation that something
`take place.
`
`References to clauses, subclauses, annexes and appendices refer to those items within this
`Recommendation unless another Recommendation is explicitly listed. For example, "1.4" refers to
`subclause 1.4 of this Recommendation; "6.4/H.245" refers to subclause 6.4 in Recommendation
`H.245.
`
`This Recommendation describes the use of "n" different message types: H.245, RAS, Q.931, etc. To
`distinguish between the different message types,
`the following convention is followed. H.245
`message and parameter names consist of multiple concatenated words highlighted in bold typeface
`(maximumDelayJitter). RAS message names are represented by three-letter abbreviations (ARQ).
`Q.931 message names
`consist of one or
`two words with the
`first
`letters
`capitalized
`(Call Proceeding).
`
`4
`
`Recommendation H.235
`
`(02/98)
`
`Petitioner Apple Inc. - Exhibit 1084, p. 4
`
`Petitioner Apple Inc. - Exhibit 1084, p. 4
`
`

`

`6
`
`System introduction
`
`6.1
`
`1)
`
`2)
`
`3)
`
`4)
`
`5)
`
`6)
`
`7)
`
`Summary
`
`The call signalling channel may be secured using TLS [TLS] or IPSEC [13/IPSEC] on a
`secure well—known port (H2250).
`
`in the process of
`Users may be authenticated either during the initial callconnection,
`securing the H.245 channel and/or by exchanging certificates on the H.245 channel.
`
`The encryption capabilities of a media channel are determined by extensions to the existing
`capability negotiation mechanism.
`
`Initial distribution of key material from the master is via H.245 OpenLogicalChannel or
`OpenLogicalChannelAck messages.
`
`Re-keying may be accomplished by H.245 commands: EncryptionUpdateRequest and
`EncryptionUpdate.
`
`Key material distribution is protected either by operating the H.245 channel as a private
`channel or by specifically protecting the key material using the selected exchanged
`certificates.
`
`The security protocols presented either conform to ISO published standards or IETF
`proposed standards.
`
`6.2
`
`Authentication
`
`The process of authentication verifies that the respondents are, in fact, who they say they are.
`Authentication may be accomplished in conjunction with the exchange of public key based
`certificates. Authentication may also be accomplished by an exchange which utilizes a shared secret
`between the entities involved. This may be a static password or some other a priori piece of
`information.
`
`This Recommendation describes the protocol for exchanging the certificates, but does not specify the
`criteria by which they are mutually verified and accepted. In general, certificates give some assurance
`to the verifier that the presenter of the certificate is who he says he is. The intent behind the
`certificate exchange is to authenticate the user of the endpoint, not simply the physical endpoint.
`Using digital certificates, an authentication protocol proves that the respondents possess the private
`keys corresponding to the public keys contained in the certificates. This authentication protects
`against man—in-the—middle attacks, but does not automatically prove who the respondents are. To do
`this normally requires that there be some policy regarding the other contents of the certificates. For
`authorization certificates, for example, the certificate would normally contain the service-provider’s
`identification along with some form of user account identification prescribed by the service provider.
`
`The authentication framework in this Recommendation does not prescribe the contents of certificates
`(i.e. does not specify a certificate policy) beyond that required by the authentication protocol.
`However, an application using this framework may impose high-level policy requirements such as
`presenting the certificate to the user for approval. This higher level policy may either be automated
`within the application or require human interaction.
`
`For authentication which does not utilize digital certificates, this Recommendation provides the
`signalling to complete various challenge/response scenarios. This method of authentication requires
`prior coordination by the communicating entities so that a shared secret may be obtained. An
`example of this method would be a customer of a subscription—based service.
`
`As a third option, the authentication may be completed within the context of a separate security
`protocol such as TLS [TLS] or IPSEC [lS/IPSEC].
`
`Recommendation H.235
`
`(02/98)
`
`5
`
`Petitioner Apple Inc. - Exhibit 1084, p. 5
`
`Petitioner Apple Inc. - Exhibit 1084, p. 5
`
`

`

`Both bidirectional and unidirectional authentication may be supported by peer entities. This
`authentication may occur on some or all of the communication channels.
`
`All of the specific authentication mechanisms described in this Recommendation are identical to, or
`derived from, ISO developed algorithms as specified in Parts 2 to 3 of ISO/IEC 9798, or based on
`IETF protocols.
`
`6.2.1
`
`Certificates
`
`including their generation, administration and distribution is
`The standardization of certificates,
`outside the scope of this Recommendation. The certificates used to establish secure channels (call
`signalling and/or call control) shall conform to those prescribed by whichever protocol has been
`negotiated to secure the channel.
`
`It should be noted that for authentication utilizing public key certificates, the endpoints are required
`to provide digital signatures using the associated private key value. The exchange of public key
`certificates alone does not protect against man-in-the-middle attacks. The H.235 protocols conform
`to this requirement.
`
`6.3
`
`Call establishment security
`
`There are at least two reasons to motivate securing the call establishment channel (e.g. H.323 using
`Q.931). The first is for simple authentication, before accepting the call. The second reason is to allow
`for call authorization. If this functionality is desired in the H-Series terminal, a secure mode of
`communication should be used (such as TLS/IPSEC for H.323) before the exchange of call
`connection messages. Alternatively, the authorization may be provided based upon a service-specific
`authentication. The constraints of a service-specific authorization policy are outside the scope of this
`Recommendation.
`
`6.4
`
`Call control (H.245) security
`
`The call control channel (H.245) should also be secured in some manner to provide for subsequent
`media privacy. The H.245 channel shall be secured using any negotiated privacy mechanism (this
`includes the Option of "none"). H.245 messages are utilized to signal encryption algorithms and
`encryption keys used in the shared, private, media channels. The ability to do this, on a logical
`channel by logical channel basis, allows different media channels to be encrypted by different
`mechanisms. For example, in centralized multipoint conferences, different keys may be used for
`streams to each endpoint. This may allow media streams to be made private for each endpoint in the
`conference. In order to utilize the H.245 messages in a secure manner, the entire H.245 channel
`(logical channel 0) should be opened in a negotiated secur

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket