CI Plus Specification V1.2 (2009-04)
Total Page:16
File Type:pdf, Size:1020Kb
CI Plus Specification V1.2 (2009-04) Technical Specification CI Plus Specification. Content Security Extensions to the Common Interface. 2 CI Plus Specification V1.2 (2009-04) CI Plus LLP The Billings Guildford Surrey GU1 4YD UK A company registered in England and Wales Registered Number: OC341596 Copyright Notification All rights reserved. Reproduction in whole or in part is prohibited without the written consent of the copyright owners. © 2008, 2009 CI Plus LLP 3 CI Plus Specification V1.2 (2009-04) Contents Foreword ..........................................................................................................................................................12 1 Scope......................................................................................................................................................13 2 References..............................................................................................................................................13 2.1 Normative references....................................................................................................................................... 13 3 Definitions, symbols and abbreviations .................................................................................................15 3.1 Definitions ....................................................................................................................................................... 15 3.2 Symbols ........................................................................................................................................................... 16 3.3 Abbreviations................................................................................................................................................... 16 3.4 Use of Words ................................................................................................................................................... 17 4 System Overview (informative).............................................................................................................17 4.1 Introduction...................................................................................................................................................... 17 4.2 Content Control System Components.............................................................................................................. 18 4.2.1 Host............................................................................................................................................................ 18 4.2.2 CICAM....................................................................................................................................................... 19 4.2.3 Head-End ................................................................................................................................................... 19 4.3 Implementation Outline ................................................................................................................................... 19 4.4 Device Authentication ..................................................................................................................................... 20 4.5 Key Exchange and Content Encryption........................................................................................................... 20 4.6 Enhanced MMI ................................................................................................................................................ 20 4.7 CI Plus Extensions........................................................................................................................................... 20 5 Theory of Operation (normative) ...........................................................................................................21 5.1 End to End Architecture .................................................................................................................................. 21 5.2 General Interface Behaviour............................................................................................................................ 21 5.3 Key Hierarchy.................................................................................................................................................. 24 5.3.1 Keys on the Credentials Layer ................................................................................................................... 25 5.3.2 Keys on the Authentication Layer.............................................................................................................. 25 5.3.3 Keys on the SAC Layer.............................................................................................................................. 26 5.3.4 Keys on the Content Control Layer............................................................................................................ 26 5.4 Module Deployment ........................................................................................................................................ 26 5.4.1 Deployment In Basic Service Mode........................................................................................................... 27 5.4.2 Deployment In Registered Service Mode................................................................................................... 29 5.4.2.1 Registration Messages.......................................................................................................................... 30 5.4.2.2 Notification Messages .......................................................................................................................... 31 5.4.3 Generic Error Reporting............................................................................................................................. 32 5.5 Introduction to Revocation (informative) ........................................................................................................ 32 5.5.1 Host Revocation......................................................................................................................................... 33 5.5.2 Revocation Granularity .............................................................................................................................. 33 5.5.3 Host Devices Revocation Control .............................................................................................................. 34 5.5.4 Revocation Signalling Data........................................................................................................................ 34 5.5.5 Transmission Time-out .............................................................................................................................. 34 5.5.6 CRL and CWL Download Process............................................................................................................. 34 5.5.7 Denial of Service........................................................................................................................................ 37 5.6 (De)Scrambling of Content.............................................................................................................................. 38 5.6.1 Transport Stream Level Scrambling........................................................................................................... 38 5.6.1.1 PES Level Scrambling.......................................................................................................................... 39 5.6.2 Scrambler/Descrambler Definition............................................................................................................. 39 5.6.2.1 Scrambling rules................................................................................................................................... 39 5.6.2.2 Transport Stream Scrambling with DES .............................................................................................. 40 5.6.2.3 Transport Stream Scrambling with AES .............................................................................................. 41 5.7 Copy Control Exertion on Content .................................................................................................................. 44 5.7.1 URI Definition ........................................................................................................................................... 44 5.7.2 Associating URI with Content ................................................................................................................... 44 5.7.3 URI transfer – Head-End to CICAM ......................................................................................................... 44 5.7.4 URI transfer – CICAM to Host.................................................................................................................. 44 © 2008, 2009 CI Plus LLP 4 CI Plus Specification V1.2 (2009-04) 5.7.5 URI Refresh Protocol................................................................................................................................. 45 5.7.5.1 URI Version Negotiation Protocol ....................................................................................................... 47 5.7.5.2 Format of the URI message.................................................................................................................. 47 5.7.5.3 Constants .............................................................................................................................................