Table of Contents

 1     Scope          
 2     References
 3     Definitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions            
 6     Architecture for exchangeable, embedded CA/DRM solutions           
        6.1     General remarks         
        6.2     The technical concept of the ECI system           
 7     Trust environment
        7.1     Necessary operational workflows       
Appendix I – Implementation of an ECI-compliant trust system    
Bibliography