CONTENTS

 1     Scope
 2     References
        2.1     Normative references
        2.2     Informative references
 3     Terms and definitions
 4     Abbreviations, acronyms and conventions
 5     Overview
        5.1     Key goals
        5.2     Key features
        5.3     Key technical points
        5.4     DRM bridge general requirements
        5.5     Background
 6     Robustness requirements
        6.1     Construction
        6.2     Controlled content paths
        6.3     Methods of making functions robust
 7     Compliance rules
        7.1     Introduction
        7.2     Outputs
        7.3     Copying, recording, and storage of controlled content
 8     Change control
Annex A – Copy control information
        A.1     Channel change
        A.2     CCI Definition
        A.3     EMI – digital copy control bits
        A.4     APS – analogue protection system
        A.5     CIT – constrained image trigger
        A.6     Authenticated tunnel protocol
Annex B – Robustness checklist
Appendix I – Digital outputs
Appendix II – Review criteria
       II.1     Video transport
       II.2     Security interfaces
       II.3     Points of attack and system weaknesses
       II.4     Effectiveness of proposed technology
       II.5     Security processing
       II.6     Revocation and renewability of keys
       II.7     New algorithms
       II.8     Preservation of service integrity
       II.9     Licensing terms
      II.10     Overall impact on the video distribution network
Appendix III – Elements of technology review submission
      III.1     Licence terms
      III.2     Security overview
      III.3     Video transport
      III.4     Content protection profiles
      III.5     Key exchange algorithms
      III.6     Security interfaces
      III.7     Security processing
      III.8     Certificate management
      III.9     Revocation/renewability of key
     III.10     Points of attack/potential weaknesses
     III.11     Commercial use
     III.12     Contact information