Table of Contents

 1     Scope          
 2     References
 3     Definitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions            
 6      Principles 
        6.1     Overview       
        6.2     System Robustness model     
        6.3     Secure Video Path and Output Protection System Control        
        6.4     Specification principles            
 7     Key Ladder Application and associated functions     
        7.1     General          
        7.2     AS System and client data authentication        
        7.3     Asymmetrical Micro Server mode       
        7.4     Interface to Secure Video Path             
        7.5     AS Key Ladder Block input output definition   
        7.6     ACF definition              
 8     Advanced Security Slot        
        8.1     Advanced Security Slot introduction   
        8.2     AS Slot Definition       
 9     Scrambling/descrambling and Content Export           
        9.1     Basic functionality      
        9.2     Scrambler and descrambler specifications       
        9.3     Export control              
        9.4     Output control             
        9.5     Content Property comparison on coupled sessions      
        9.6     Content Property propagation on Export          
        9.7     Basic URI enforcement on Export        
        9.8     Content Property application on industry standard outputs     
        9.9     Control word synchronization
10     Certificate Processing Subsystem  
       10.1     Basic processing rules for Certificate Chains   
       10.2     Specific rules for Host Image Chains  
       10.3     Specific rules for Client Image chains
       10.4     Specific rules for Platform Operation Certificates        
       10.5     Specific rules for export/import chains            
       10.6     CPS ECI Root Key initialization              
11     Loader core             
       11.1     Introduction
       11.2     Host loader rules       
       11.3     Client Loader rules   
       11.4     Revocation enforcement       
       11.5     Client image decryption         
12     Timing requirements          
       12.1     Introduction
       12.2     Administrative functions        
       12.3     Symmetrical cryptography functions
       12.4     Asymmetrical cryptography functions              
Annex A – Cryptography function definitions    
        A.1     Hash function              
        A.2     Asymmetrical cryptography   
        A.3     Random number generation 
Appendix I – Sample Micro DRM System application    
        I.1     Introduction  
        I.2     Application scenario   
        I.3     Assumptions and notation       
        I.4     Micro Server pseudo code       
        I.5     Micro Client pseudo code        
        I.6     Micro DRM System cascading effect on ECM pre‑delay
        I.7     Content property change timing interface convention 
Appendix II – Areas for further development    
Bibliography