CI Plus Specification V1.2 (2009-04)

CI Plus Specification V1.2 (2009-04)

CI Plus Specification V1.2 (2009-04) Technical Specification CI Plus Specification. Content Security Extensions to the Common Interface. 2 CI Plus Specification V1.2 (2009-04) CI Plus LLP The Billings Guildford Surrey GU1 4YD UK A company registered in England and Wales Registered Number: OC341596 Copyright Notification All rights reserved. Reproduction in whole or in part is prohibited without the written consent of the copyright owners. © 2008, 2009 CI Plus LLP 3 CI Plus Specification V1.2 (2009-04) Contents Foreword ..........................................................................................................................................................12 1 Scope......................................................................................................................................................13 2 References..............................................................................................................................................13 2.1 Normative references....................................................................................................................................... 13 3 Definitions, symbols and abbreviations .................................................................................................15 3.1 Definitions ....................................................................................................................................................... 15 3.2 Symbols ........................................................................................................................................................... 16 3.3 Abbreviations................................................................................................................................................... 16 3.4 Use of Words ................................................................................................................................................... 17 4 System Overview (informative).............................................................................................................17 4.1 Introduction...................................................................................................................................................... 17 4.2 Content Control System Components.............................................................................................................. 18 4.2.1 Host............................................................................................................................................................ 18 4.2.2 CICAM....................................................................................................................................................... 19 4.2.3 Head-End ................................................................................................................................................... 19 4.3 Implementation Outline ................................................................................................................................... 19 4.4 Device Authentication ..................................................................................................................................... 20 4.5 Key Exchange and Content Encryption........................................................................................................... 20 4.6 Enhanced MMI ................................................................................................................................................ 20 4.7 CI Plus Extensions........................................................................................................................................... 20 5 Theory of Operation (normative) ...........................................................................................................21 5.1 End to End Architecture .................................................................................................................................. 21 5.2 General Interface Behaviour............................................................................................................................ 21 5.3 Key Hierarchy.................................................................................................................................................. 24 5.3.1 Keys on the Credentials Layer ................................................................................................................... 25 5.3.2 Keys on the Authentication Layer.............................................................................................................. 25 5.3.3 Keys on the SAC Layer.............................................................................................................................. 26 5.3.4 Keys on the Content Control Layer............................................................................................................ 26 5.4 Module Deployment ........................................................................................................................................ 26 5.4.1 Deployment In Basic Service Mode........................................................................................................... 27 5.4.2 Deployment In Registered Service Mode................................................................................................... 29 5.4.2.1 Registration Messages.......................................................................................................................... 30 5.4.2.2 Notification Messages .......................................................................................................................... 31 5.4.3 Generic Error Reporting............................................................................................................................. 32 5.5 Introduction to Revocation (informative) ........................................................................................................ 32 5.5.1 Host Revocation......................................................................................................................................... 33 5.5.2 Revocation Granularity .............................................................................................................................. 33 5.5.3 Host Devices Revocation Control .............................................................................................................. 34 5.5.4 Revocation Signalling Data........................................................................................................................ 34 5.5.5 Transmission Time-out .............................................................................................................................. 34 5.5.6 CRL and CWL Download Process............................................................................................................. 34 5.5.7 Denial of Service........................................................................................................................................ 37 5.6 (De)Scrambling of Content.............................................................................................................................. 38 5.6.1 Transport Stream Level Scrambling........................................................................................................... 38 5.6.1.1 PES Level Scrambling.......................................................................................................................... 39 5.6.2 Scrambler/Descrambler Definition............................................................................................................. 39 5.6.2.1 Scrambling rules................................................................................................................................... 39 5.6.2.2 Transport Stream Scrambling with DES .............................................................................................. 40 5.6.2.3 Transport Stream Scrambling with AES .............................................................................................. 41 5.7 Copy Control Exertion on Content .................................................................................................................. 44 5.7.1 URI Definition ........................................................................................................................................... 44 5.7.2 Associating URI with Content ................................................................................................................... 44 5.7.3 URI transfer – Head-End to CICAM ......................................................................................................... 44 5.7.4 URI transfer – CICAM to Host.................................................................................................................. 44 © 2008, 2009 CI Plus LLP 4 CI Plus Specification V1.2 (2009-04) 5.7.5 URI Refresh Protocol................................................................................................................................. 45 5.7.5.1 URI Version Negotiation Protocol ....................................................................................................... 47 5.7.5.2 Format of the URI message.................................................................................................................. 47 5.7.5.3 Constants .............................................................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    243 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us