Cinepedia

The Technology Behind The Big Screen

  • System
    • System Basics
    • DCI & SMPTE
  • Packaging
    • DCP
    • The Composition
    • Title Versions
    • Composition Playlist (CPL)
    • Track Files
    • Track File Encryption
    • Packing List
    • Additional Metadata
    • Interop DCP / SMPTE DCP
  • Security
    • Trust Model
    • Encryption
    • Trusted Device List
    • Digital Certificate
    • KDM
    • Media Block
    • Security Log
  • Picture
    • Picture Introduction
    • Color Distribution & Display
    • Color Gamut
    • Contrast & Dynamic Range
    • Resolution & Aspect Ratio
    • Light
    • Picture Track File & Compression
    • Projector Image Formation
    • Projection Screens
    • Stereoscopic 3D
  • Sound
    • Cinema Sound Basics
    • Sound Formats and Soundfields
    • MainSound Track File
  • Accessibility
    • Accessibility Overview
    • Accessibility & Audio Track File
    • Timed Text Track Files
    • Reel Flexibility for Timed Text
    • Communications for Off-Screen Timed Text
  • FAQs
    • Technology FAQs
    • Business FAQs
    • Accessibility FAQs
  • History
    • Early History
  • Terminology
  • References
  • Interop DCP
  • About Cinepedia
  • menuToggle Mobile Menu
  • Back to Top

Security Log

section-126

Digital Cinema Security
The Digital Cinema Security Log documents the usage and behavior of a digital cinema system. It supports the logging of both secure and non-secure information by accommodating authenticated as well as non-authenticated log records.

Each record of the Security Log consists of a Header, Body, and optional Signature sections. The log record signature provides authentication of the log record header, or optionally, authentication over a number of log records recorded in a sequence.  A sequence is created using a system of shared hashes and digital signature, such that the integrity of the sequence can be readily validated. The sequence structure allows for the filtering (removal) of a log record while preserving the fact of the record’s existence.

Security logs are shared with business partners for numerous reasons, including the establishment of trust.  As a log may contain business information that pertains to multiple business partners, the ability to remove sensitive information when sharing is an important structural feature of the Security Log.

Security Logs are generated within a Secure Processing Boundary (see Media Block) for purposes of integrity. It is desireable that one log records all events of a digital cinema system. Where a Media Block is connected to other “remote” secure devices, such as a projector (separare from the Media Block), provision is made for the communication of log data over a TLS link to the Media Block for its logging activity. (See SMPTE 430-6 Auditorium Security Message for Intra-Theater Communications.)

Several record classes are supported, comprised of:

  • Security Events
  • Operational Events
  • Health / Status events
  • Maintenance Events
  • Debugging Events

Detailed information about the Security Log is available in SMPTE ST 430-4 Log Record Format Specification and SMPTE ST 430-5 Security Log Event Class and Constraints.

last changed 2019-03-11 in Security by MK

→  Picture Introduction
←  Media Block

copyright © 2016 - 2026 mkpe consulting llc

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}