1
Scope
2
References
2.1
Normative
references
2.2
Informative
references
3
Terms
and definitions
4
Abbreviations,
acronyms and conventions
5
Overview
5.1
Key
goals
5.2
Key
features
5.3
Key
technical points
5.4
DRM
bridge general requirements
5.5
Background
6
Robustness
requirements
6.1
Construction
6.2
Controlled
content paths
6.3
Methods
of making functions robust
7
Compliance
rules
7.1
Introduction
7.2
Outputs
7.3
Copying,
recording, and storage of controlled content
8
Change
control
Annex A –
Copy control information
A.1
Channel
change
A.2
CCI
Definition
A.3 EMI – digital copy control bits
A.4
APS
– analogue protection system
A.5
CIT
– constrained image trigger
A.6
Authenticated
tunnel protocol
Annex B –
Robustness checklist
Appendix I
– Digital outputs
Appendix II
– Review criteria
II.1
Video
transport
II.2
Security
interfaces
II.3
Points
of attack and system weaknesses
II.4
Effectiveness
of proposed technology
II.5
Security
processing
II.6
Revocation
and renewability of keys
II.7
New
algorithms
II.8
Preservation
of service integrity
II.9
Licensing
terms
II.10
Overall
impact on the video distribution network
Appendix
III – Elements of technology review submission
III.1
Licence
terms
III.2
Security
overview
III.3 Video transport
III.4 Content protection profiles
III.5
Key
exchange algorithms
III.6
Security
interfaces
III.7
Security
processing
III.8
Certificate
management
III.9
Revocation/renewability
of key
III.10
Points
of attack/potential weaknesses
III.11 Commercial use
III.12 Contact information