Ci Plus - Specification - v1 4 4
Ci Plus - Specification - v1 4 4
4 (2021-09)
Technical Specification
CI Plus Specification.
Content Security Extensions to the Common Interface.
2 CI Plus Specification v1.4.4 (2021-09)
CI Plus LLP
31 Chertsey Street,
Guildford,
Surrey,
GU1 4HD,
UK
Copyright Notification
Contents
1 Scope...................................................................................................................................................... 5
2 References .............................................................................................................................................. 5
3 Definitions, symbols and abbreviations .................................................................................................. 6
3.1 Definitions ..................................................................................................................................................... 6
3.2 Abbreviations................................................................................................................................................. 6
3.3 Use of Words ................................................................................................................................................. 6
4 Mandatory Resources ............................................................................................................................. 7
4.1 Operator Profile Version 2 and 3 .................................................................................................................... 7
4.1.1 Operator Profile Version 3 ........................................................................................................................ 8
4.2 Host Control Version 3 .................................................................................................................................. 8
4.3 Low Speed Communication Version 4 for IP connection................................................................................ 8
4.4 High-Level MMI............................................................................................................................................ 9
4.5 Void ............................................................................................................................................................... 9
4.6 Content Control ............................................................................................................................................. 9
4.6.1 Critical Security Update Version protocol ................................................................................................. 9
4.6.2 SRM file transmission for DTCP ............................................................................................................ 10
4.6.3 Transport stream output protection ......................................................................................................... 10
4.7 Application Information ............................................................................................................................... 10
5 Optional Functionalities ....................................................................................................................... 10
5.1 Multi-Stream ................................................................................................................................................ 10
5.1.1 Additional Mandatory Resources ............................................................................................................ 10
5.1.2 Resource advertisement .......................................................................................................................... 11
5.1.3 Diversification of CCK computation ....................................................................................................... 11
5.1.4 Void ....................................................................................................................................................... 11
5.1.5 Allocation of LTS_id .............................................................................................................................. 11
5.1.6 PID selection .......................................................................................................................................... 11
5.1.7 Content Control ...................................................................................................................................... 11
5.1.8 Host Control ........................................................................................................................................... 11
5.1.9 High-Level MMI .................................................................................................................................... 12
5.2 CICAM Player Mode ................................................................................................................................... 12
5.2.1 Additional Mandatory Resources ............................................................................................................ 12
5.2.2 Low Speed Communication Version 4 for Hybrid connection ................................................................. 12
5.2.3 Access from Virtual Channel .................................................................................................................. 12
5.3 Host Player Mode ........................................................................................................................................ 12
5.3.1 Additional Mandatory Resources ............................................................................................................ 12
5.3.2 Formats and protocols............................................................................................................................. 13
5.4 HbbTV CICAM AppMMI Application ........................................................................................................ 13
5.4.1 Additional Mandatory Resources ............................................................................................................ 13
5.4.2 Application Domain and InitialObject..................................................................................................... 13
5.5 Application MMI ......................................................................................................................................... 13
5.5.1 Additional Mandatory Resources ............................................................................................................ 14
5.5.2 Void ....................................................................................................................................................... 14
5.5.3 Application Life Cycle Management....................................................................................................... 14
5.6 Overt Watermarking .................................................................................................................................... 14
5.6.1 Additional Mandatory Resources ............................................................................................................ 14
5.6.2 Additional Content Control Feature ........................................................................................................ 14
5.6.3 Overt Watermarking profiling................................................................................................................. 15
5.6.3.1 General ............................................................................................................................................. 15
5.6.3.2 Host requirements ............................................................................................................................. 15
5.6.3.3 CICAM requirements ........................................................................................................................ 16
6 CI Plus 2nd Root of Trust .................................................................................................................... 16
6.1 Introduction ................................................................................................................................................. 16
6.2 Content Control Resource ............................................................................................................................ 16
6.2.1 Resource Version.................................................................................................................................... 16
6.2.2 CI Plus CC system ID ............................................................................................................................. 17
1 Scope
This specification provides the description of a CI Plus LLP implementation based on ETSI TS 103 205 [3], [17], and
CI Plus Specification 1.3 [2], pulling together those specifications and specifying what parts need to be implemented in
order to realise a device compliant with CI Plus LLP.
This specification is intended to be used in combination with the appropriate certification process, and subject to
conformance by the manufacturers to the CI Plus Compliance and Robustness Rules [4].
In addition, chapter 6 introduces the CI Plus 2nd Root of Trust based on the SHA-256 hash algorithm.
2 References
[1] CI Plus Licensee Specification, available under licence from the CI Plus Trust Authority.
[2] CI Plus Specification v1.3.2 (2015-03): “Content Security Extensions to the Common Interface”.
[3] ETSI TS 103 205 v1.2.1 (2015-11): “Digital Video Broadcasting (DVB); Extensions to the CI Plus
Specification”.
[5] Void
[6] ETSI TS 103 285 v1.1.1 (2015-05): “MPEG-DASH Profile for Transport of ISO BMFF Based
DVB Services over IP Based Networks”.
[8] High-bandwidth Digital Content Protection System, Interface Independent Adaptation, Revision
2.0.
[9] High-bandwidth Digital Content Protection System, Interface Independent Adaptation, Revision
2.2.
[11] ETSI TS 102 796 v1.4.1 (2016-08): “Hybrid Broadcast Broadband TV”,
HbbTV 2.0.1 Specification.
[12] ETSI TS 102 809 v1.2.1 (2013-07): “Digital Video Broadcasting (DVB); Signalling and carriage
of interactive applications and services in Hybrid Broadcast/Broadband environments”.
[13] ETSI TS 102 034 v1.5.1 (2014-05): “Digital Video Broadcasting (DVB); Transport of MPEG-2
TS Based DVB Services over IP Based Networks”.
[14] Open IPTV Forum Release 2 specification, volume 2 (V2.3): "Media Formats".
[15] EN 50221:1996 (1997-02): “Common Interface Specification for Conditional Access and other
Digital Video Broadcasting Decoder Applications”.
https://www.dvb.org/resources/public/standards/En50221.V1.pdf
[16] ETSI TS 101 699 v1.1.1 (1999-11): “Digital Video Broadcasting (DVB); Extensions to the
Common Interface Specification”.
[17] ETSI TS 103 205 v1.4.1 (2019-05): “Digital Video Broadcasting (DVB); Extensions to the CI Plus
Specification”.
https://www.etsi.org/deliver/etsi_ts/103200_103299/103205/01.04.01_60/ts_103205v010401p.pdf
[18] RSA PKCS#1 v2.1: June 14, 2002. RSA Cryptography Standard, RSA security inc.
ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-1/pkcs-1v2-1.pdf
[19] NIST Special Publication 800-90A Revision 1 (June 2015): Recommendation for Random
Number Generation Using Deterministic Random Bit Generators
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf
[20] RFC5280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List
(CRL) Profile (version 3).
https://www.ietf.org/rfc/rfc5280.txt
Standard Security Level: The security level achieved by a device of a Device Type as defined in the ILA [4]
ECP Security Level: The security level achieved by a device of an ECP Device Type as defined in the ILA Addendum
for ECP [21]
3.2 Abbreviations
For the purposes of the present document, the following abbreviations apply in addition to those defined in CI Plus
Specification 1.3 [2]:
The word should is used to indicate that among several possibilities one is recommended as particularly suitable,
without mentioning or excluding others; or that a certain course of action is preferred but not necessarily required
(should equals is recommended that).
The word may is used to indicate a course of action permissible within the limits of the specification (may equals is
permitted to).
4 Mandatory Resources
A CI Plus LLP compliant device shall support the mandatory resources shown in Table 4.1:
The installation of IP delivered services by use of the OSDT as defined in TS 103 205 [3] clause 15.4 is optional.
However, when a Host implements installation of IP delivered services by use of the OSDT, it shall be available for
both profile_type 1 and 2.
The Host shall support the Virtual Channel as defined in TS 103 205 [3] clause 15.3 for both profile_type 1 and 2.
The Host shall manage the Virtual Channel in a similar manner to other installed broadcast services. It is recommended
that Hosts treat the Event Information associated with the Virtual Channel as if it were the event name in a
short_event_descriptor(). The Host may ignore the service provider name of the cicam_virtual_channel_descriptor().
The Host shall make the Virtual Channel as accessible as other services, including but not limited to:
• Assign a valid service name to the Virtual Channel of between 1 and 14 characters
• Limit the event_information_length to 40 characters
The Host may ignore the declaration of the Virtual Channel when the service_name_length of the
cicam_virtual_channel_descriptor() is set to zero.
When installing a profile with profile type 2, the CICAM may attempt to use any logical_channel_number (LCN),
including zero. With profile_type 2, the Host is not guaranteed to honour this LCN request and may re-negotiate with
the CICAM for a new LCN.
The Host shall support negotiation of supported component types, as well as the ciplus_advanced_service_descriptor as
defined in TS 103 205 [17] clause 17.
The CICAM should send the operator_codec_verify_req() APDU to the Host if needed when performing search
operations, following reception of operator_search_start() and before sending the operator_search_status() APDU.
In response to an operator_codec_verify_req() APDU from the CICAM, the Host shall send an
operator_codec_verify_reply() APDU with each combination_tag corresponding to a supported component_descriptor.
NOTE: The Host is expected to properly handle component_descriptor values reserved for future use and
therefore unsupported.
Support for tune_ip_req() is not mandatory; Hosts not supporting tuning to IP-delivered services shall return a
tune_reply() with status_field set to 0x01 (unsupported delivery system descriptor) in reply to a tune_ip_req() APDU
sent by the CICAM.
The Host shall support connection requests for LSC resource with device_type 0x60 with the following connection
descriptor types:
• IP_descriptor
• Hostname_descriptor
The Host may support connection requests with IP_multicast_descriptor for LSC resource with device_type 0x60. If
connections with IP_multicast_descriptor() are not supported the Host shall reply with a comms_reply() indicating the
error.
The CICAM shall not use the following connection descriptors when sending a connection request for LSC resource
with device_type 0x60:
• telephone_descriptor()
• hybrid_descriptor()
If the CICAM sends a comms_cmd() APDU with a connection descriptor type that is not supported by the Host, the
Host shall respond with a comms_reply() APDU with comms_reply_id=Connect_Ack and set the field return_value to
0xFE (Connection protocol not supported).
If the CICAM sends a comms_info_req() APDU for LSC resource with device type 0x60 the Host shall return a
comms_info_reply() APDU with status field set to 0b0. The CICAM shall not use this APDU to determine if a
connection has succeeded, and should rather rely on the comms_reply() APDU.
The CICAM may send the comms_IP_config_req() APDU for LSC resource with device type 0x60 at any time; the
Host shall respond with the comms_IP_config_reply() APDU.
The High-Level MMI shall have priority over any broadcast application where the CICAM is descrambling the service
being presented, which may require the broadcast application to be terminated. Whenever the High-Level MMI is
displayed by the Host, it shall have focus and be visible to the user.
4.5 Void
4.6 Content Control
A CI Plus compliant device shall support:
• versions 1, 2 and 4 of the Content Control resource and the requirements of this chapter. Support of version 3
of the Content Control resource is not required.
• versions 0x01, 0x02 and 0x04 of the URI and may ignore other URI versions. The support of the URI version
3 is not required.
The CICAM shall not request a session to version 3 of the Content Control resource and shall not use the URI version
0x03.
A CICAM not achieving the ECP Security Level and making use of version 0x05 of the URI shall always set the
ecp_control_info to 0b000 (Content is not ECP protected).
Refer to the ILA [4] for compliance rules for the trick_mode_control_info parameter of the URI.
The CICAM may request the Host critical security update version at any time but shall wait for the acknowledgement
from the Host before sending any further critical security update version protocol message. The Host shall implement
the critical security update version protocol.
The critical security update version is maintained by the Host, the version starts at 0x00 and shall only be incremented
when the hardware or software is modified such that it improves or fixes a security or non-conformance issue. The Host
shall not use the version value of 0xFF.
There is no requirement to increment critical security update version for every software update.
A CICAM shall not request the critical security update version in Content Control versions 1 or 2 for resource_type 64.
The scrambler capabilities present in each device certificate shall be interpreted according to Table 4.3
Value Meaning
0 Forbidden (note 1)
1 AES
all others reserved for future use
Note 1: DES only scrambler capability is not allowed for new device registrations and has never been deployed in the
market.
5 Optional Functionalities
5.1 Multi-Stream
Support of multi-stream functionality as described in clause 6 of TS 103 205 [3] is optional for both Host and CICAM
devices. Multi-stream capable devices shall meet the requirements of the current chapter and clause 6 of TS 103 205
[3].
The requirements of chapter 4 for single-stream resources are applicable to the corresponding multi-stream resources of
this chapter.
Where the Host advertises some but not all of the resources listed in Table 5.1, the CICAM shall not open a session to
the multi-stream resource and it shall restrict to the single stream versions of the resources.
5.1.4 Void
5.1.5 Allocation of LTS_id
A Host shall not allocate LTS_id 0x00 or 0xFF.
• resource_type 65 and version 2. The support of the Content Control resource with resource_type 65 and
version 1 is not required.
• Versions 0x01, 0x02 and 0x04 of the URI and may ignore other URI versions. The support of the URI version
3 is not required
• Output control protocol as defined in TS 103 205 [17]
• Critical Security Update Version protocol as defined in clause 4.6.1
• SRM file transmission protocol for DTCP as defined in clause 4.6.2
The CICAM shall not request a session to resource_type 65 and version 1 of the Content Control resource and shall not
use the URI version 0x03.
The Host shall support connection requests for LSC resource with device_type 0x70 with the following connection
descriptor types:
• IP_descriptor
• Hostname_descriptor
• multicast_descriptor
It is recommended that the Host minimally supports 12 concurrent LSC sessions, with device types 0x60 or 0x70. The
allocation of those 12 sessions with device_type 0x60 or 0x70 is determined by the CICAM. A representative system
using the CICAM player mode is described in Annex B, showing a possible allocation of concurrent LSC sessions with
different device types.
• Support of AVC_SD_25 video format as defined in OIPF “Media Formats” [14] clause 5.1.2.1
• Support of HEAAC audio format as defined in OIPF “Media Formats” [14] clause 8.1.1
• Support of video bitrate of at least 1 Mbps
The XML AIT file shall be as defined in clause 5.4 of TS 102 809 [12].
The URL schemes for the HbbTV Application accessing files are as defined in the clause 9.2 of HbbTV Specification
[11].
The CICAM shall offer the file system by use of the Auxiliary File System resource FileSystemOffer() APDU with the
DomainIdentifier set to “HbbTVEngineProfile1” as defined in clause 11.4.3 of HbbTV Specification [11].
The semantics of Table 7 of HbbTV Specification [11] shall apply except that the applicationTransport field in the
XML AIT shall be either HTTPTransportType (as defined in Table 7 of HbbTV Specification [11]) or CITransportType
(as defined in clause 12.4.3.3.3 of TS 103 205 [3]).
The XML file shall contain an application discovery record containing one or more <application> elements, all with the
same orgId and appId values but with different application types.
The application launched by this method shall be considered as a CICAM AppMMI application and the requirements of
the clause 5.5.3 are then applicable for its life cycle.
In case of multiple CICAMs in a Host, the Host should use the Auxiliary File System resource of the CICAM that
started the HbbTV application.
Support of Application MMI functionality as described in clause 12 of CI Plus Specification 1.3 [2] with the
DomainIdentifier set to “CIEngineProfile1” (CI Plus Browser) is deprecated for both Host and CICAM devices and no
longer within the scope of a CI Plus LLP Device implementation.
If the Host is multi-stream capable, it shall implement the Application MMI resource with resource_type 2 and version
1 with the requirements as defined in the present clause with the following restrictions:
• The Host may ignore the Application Domain Query (ADQ) option.
• The Host may not implement the caching mechanism.
A multi-stream capable CICAM shall implement the caching mechanism and shall not include the ADQ option in the
RequestStart() APDU.
5.5.2 Void
5.5.3 Application Life Cycle Management
The Host shall give priority to broadcast applications as defined in clause 12.4.4.2 of TS 103 205 [3]. Where the Host is
unable to execute the CICAM AppMMI application, the Host shall either respond to the RequestStart() APDU with a
RequestStartAck() APDU with an AckCode value of 0x03 (API Busy) or refuse to open the session to Application
MMI resource.
When a CICAM AppMMI application is running, it shall not be interrupted until the application exits, or the
Application MMI session is closed, or specific user interaction takes place.
When a CICAM AppMMI application is running, if the Host terminates the application, then the AppAbortRequest()
APDU shall be sent by the Host to inform the CICAM.
A Host that supports Overt Watermarking shall advertise the support of that feature during the negotiation protocol
when the CICAM requests it, as defined in clause 23.1 of TS 103 205 [17].
After a Host has reported a status of ‘rendered’ to the CICAM, a Host may suspend the display of a rendered watermark
without informing the CICAM in the following cases, which extend the exceptions defined in clause 24.2.3 of TS
103 205 [17]:
As soon as the abovementioned exceptions no longer apply, the Host shall resume display of the watermark. The Host is
not required to report the status of ‘rendered’ to the CICAM at that time.
The Host is not required to render or display overt watermarks during playback of IP-delivered content using CICAM
player mode or Host player mode, as defined in chapter 24.2.7 of TS 103 205 [17]. If the Host does not render an overt
watermark when requested by the CICAM during playback of IP-delivered content, it shall report a rendering status of
‘not rendered’.
The Host is not required to record or playback recorded Controlled Content that has an associated overt watermark.
During playback of recorded Controlled Content, the Host is not required to render and display overt watermarks
associated with the recording when the playback speed is greater than four times (x4) normal playback speed, in either
direction (fast-forwards or reverse playback).
When the CICAM requests the Host to stop rendering the watermark, as described in clause 24.2.5.3 of TS 103 205
[17], then the Host shall stop rendering and displaying the watermark and acknowledge the CICAM’s request within 5
seconds.
The Host may ignore the alpha field in the wm_instructions parameter.
NOTE 1: In this case, the four corners of the watermark plane will touch the four corners of a Host’s 16:9 display (and
output video).
NOTE 2: Displayed full-screen means scaled to fill the entire width or height (or both) of the internal display (and
output video) of the Host. The Host may further adjust the scaling and position of the Controlled Content video (e.g.
apply overscan, black bar removal), which has no impact on the watermark plane.
When the Controlled Content video associated with the watermark is not displayed full-screen (e.g. downscaled within
an interactive application), the Host shall comply with clause 24.2.3 of TS 103 205 [17].
NOTE 3: References to the non-full-screen Host video plane in clause 24.2.3 of TS 103 205 [17] refer to the scaled
Controlled Content video associated with the watermark.
The Host shall support the maximum text lengths according to font size, as described in Table 132 of TS 103 205 [17].
In relation to font size, note that "font height in logical pixels" refers to the em-height of the font. Therefore, when a
Host renders a watermark with the maximum text length allowed according to the font size, placed at the leftmost
position within the watermark logical plane, it shall not be clipped. I.e., when displaying such a watermark, the
complete watermark text is visible.
A CICAM shall not request the rendering of an overt watermark that overflows beyond the boundary of the watermark
logical plane.
It is recommended for the CICAM to define the watermark position, size, and content so it remains within the Graphics
Safe Area as defined in EBU R095 [22].
This chapter defines the format of the certificates issued from the CI Plus 2nd Root of Trust and how a CI Plus device
declares the support of and makes use of this new Root of Trust.
A Host that does not support CC system ID 1 and only supports CC system ID 2 shall only support Content Control
resource with resource identifier 0x008C1004 for single stream and 0x008C1042 for multi stream, if multi stream
functionality is supported. A Host may additionally support Content Control resource with resource identifier
0x008C1005 for single stream and 0x008C1043 for multi stream, if Overt Watermarking functionality is supported. If a
CICAM attempts to open the Content Control resource with a different identifier, then the Host shall deny the resource
opening as specified in EN50221 [15] and may inform the end user.
The Table 6.1 below indicates the cc_system_id_bitmask advertised by the Host according to (i) the identifier of the
Content Control resource opened by the CICAM and (ii) the CC system ID(s) supported by the Host.
cc_system_id_bitmask
CC system ID
CC v2 for CC v3 for
supported by Host CC v1 CC v2 CC v4 CC v5
multi-stream multi-stream
(00 8C 10 01) (00 8C 10 02) (00 8C 10 04) (00 8C 10 05)
(00 8C 10 42) (00 8C 10 43)
Not Not
Only CC system ID 2 Applicable Applicable 0b00000010 0b00000010 0b00000010 0b00000010
(see Note 1) (see Note 1)
NOTE 1: Host shall deny Content Control resource opening
CC system ID 2 is allocated for the CI Plus LLP PKI as defined in clause 6.3 of the present document (CI Plus 2nd Root
of Trust).
During the Authentication protocol, the Host shall advertise the supported CC system ID(s) using the method defined in
clause 11.3.1.2 of CI Plus Specification 1.3 [2].
Table 11.34 of CI Plus Specification 1.3 [2] shall be replaced by Table 6.2:
A CI Plus device may advertise support for both CC system ID 1 and CC system ID 2.
A CICAM supporting CC system ID 2 shall select the CC system ID 2 when the Host advertises it regardless of the
Security Level supported by the Host. The Security Level extension is defined in clause 6.3.3.9.8.
The CICAM shall inform the Host of the selection of the CC system as described in clause 20 of TS 103 205 [17].
NOTE: The CC system ID 1 public and private keys are different from the CC system ID 2 public and private
keys.
The certificate chain for both CICAM and Host for CC system ID 2 is described in clause 6.3 of the present document.
This certificate chain is independent from the certificate chain for CC system ID 1 defined in CI Plus Specification 1.3
[2].
When the CC system ID 2 is selected, the constants (DH_p, DH_g, DH_q) involved in operations on the authentication
layer are specific to CC system ID 2 and are different from the constants used for the CC system ID 1.
6.2.4 Authentication
6.2.4.1 Random Number Generation
During the execution of the authentication protocol for CC system ID 1 and CC system ID 2, a CI Plus device shall
generate the random values listed in Table A.1 of CI Plus Specification 1.3 [2] by use of either a PRNG as defined in
Annex A of CI Plus Specification 1.3 [2] or a PRNG as defined in NIST 800-90A Revision 1[19].
The Figure 6.1 of CI Plus Specification 1.3 [2] is then updated per Figure 6.1 below:
(1)
CC resource (13) CICAM is DVB CI and
No
reported by host operate with limitations.
?
Yes
No (2) success
No
(14) Reset. (response opening CC
(wrong system id)
timed out) resource ?
Yes
(3)
CICAM
stores valid AKM
?
Yes
No
(5)
AKH matches stored AKM and
Selected CC System ID
matches stored CC System ID
?
No
(7) Success
performing DH No
protocol?
Yes Yes
Yes
Step 5 of the authentication basic steps as described in clause 6.1.4 of CI Plus Specification 1.3 [2] is updated as
followed:
5. The CICAM shall compare its stored AKM with the received AKH. If the authentication keys match and
the selected CC system ID is the same as the CC system ID stored in the authentication context, then a
previous authentication has been completed successfully with the selected CC system ID and the
certificates are considered valid. The DH Secret Key (DHSK) and authentication keys (AKM/AKH)
computed on both sides are then preserved; the key material for the SAC (SAK and SEK) and the Content
Control Key (CCK) are independently (re)generated and synchronized on both sides. The system shall
then continue with step (10). If the authentication keys or the CC system IDs do not match then the system
is required to authenticate and shall continue with step (6). Note that Host behaviour for multiple modules
and multiple slots is defined in clause 6.3 of CI Plus Specification 1.3 [2].
- self-signed
- only one root certificate exists for all of CI Plus 2nd Root of Trust
• Brand certificate
- one certificate of this type exists for each brand (or manufacturer)
• Device certificate
Each certificate contains a public key (MDP/HDP) for which there is a corresponding private key (MDQ/HDQ).
Each Host and CICAM shall integrate the following certificate related information at manufacturing time:
• the private key corresponding to the device certificate (MDQ or HDQ, see Table 5.2 of CI Plus Specification
1.3 [2])
Unlike other certificates, the service operator certificate does not have to be integrated into the Host or CICAM at time
of manufacturing.
6.3.3.1 version
As defined in CI Plus Specification 1.3 [2] clause 9.3.1.
6.3.3.3 signature
All certificates use RSASSA-PSS signatures as defined in PKCS#1v2.1 [18], clause 8.1.1.
The fields of the RSASSA-PSS-params shall have values as defined in Table 6.3:
6.3.3.4 issuer
As defined in CI Plus Specification 1.3 [2] clause 9.3.4 except that reference to RFC3280 shall be replaced by reference
to RFC5280 [20], and the following definitions shall replace those in CI Plus Specification 1.3 [2] Table 9.2:
Device certificate CN: “CI Plus 2nd ROT for <brand name>”
NOTE: Attributes not listed remain as defined in CI Plus Specification 1.3 [2] Table 9.2.
6.3.3.5 validity
As defined in CI Plus Specification 1.3 [2] clause 9.3.5 except that reference to RFC3280 shall be replaced by reference
to RFC5280 [20].
6.3.3.6 subject
As defined in CI Plus Specification 1.3 [2] clause 9.3.6 except that reference to RFC3280 shall be replaced by reference
to RFC5280 [20], and the following definitions shall replace those in CI Plus Specification 1.3 [2] Table 9.3:
Brand certificate CN: “CI Plus 2nd ROT for <brand name>”
NOTE: Attributes not listed remain as defined in CI Plus Specification 1.3 [2] Table 9.3.
6.3.3.7 subjectPublicKeyInfo
As defined in CI Plus Specification 1.3 [2] clause 9.3.7 except that reference to RFC3280 shall be replaced by reference
to RFC5280 [20].
6.3.3.9 extensions
As defined in CI Plus Specification 1.3 [2] clause 9.3.9 except that:
Value Meaning
0 Reserved
1 AES
all others reserved for future use
Value Meaning
0 Standard Security Level
1 ECP Security Level
all others reserved for future use for higher security levels
The CICAM may use the Security Level extension to determine the Security Level supported by the Host and decide
whether to descramble content when the Host supports a sufficient Security Level for accessing such content.
A CICAM using the Security Level shall store the Security Level supported by the Host as part of the Authentication
Context.
6.3.3.10 signatureAlgorithm
This field is as defined in clause 6.3.3.3.
6.3.3.11 signatureValue
This field is defined in RFC 5280 [20], section 4.1.1.3.
A CICAM shall support both the CI Plus Root of Trust defined in CI Plus Specification 1.3 [2] and the CI Plus 2nd
Root of Trust defined in chapter 6 of the present document.
A Host shall support the CI Plus Root of Trust defined in CI Plus Specification 1.3 [2] and shall not support the CI Plus
2nd Root of Trust defined in chapter 6 of the present document.
The CI Plus 2nd Root of Trust Device Certificate shall indicate support of the Standard Security Level, as defined in
clause 6.3.3.9.8.
Figure B.1 depicts the implementation of a IPTV client with the support of FCC and RET in the CICAM, where the
FCC Server is compliant with the definition of Annex I of DVB-IPTV [13]. The figure shows the involved LSC
sessions and their corresponding device type is indicated in Table B.1.
Host CICAM
FCC/RET Server Port I RTCP RR (Unicast) + RAMS-T 1
FCC/RET
IGMP
Port Port A
Primary Multicast Stream 4
2 0x70 (Hybrid connection) Session for RET request (of multicast) and FCC request. The reply
consists of FCC information, RET sender reports and the unicast burst
(and RET packets)
3 0x60 (IP connection) Session for the Management Channel for configuration of the FCC
client
Some further LSC sessions may be necessary for the purposes as described in the Table B.2:
History
Document history
Version Date Description
1.4 29-Jun-2015 Publication for comments
1.4.1 20-Nov-2015 Update of reference [3] from DVB Bluebook A165 to ETSI TS 103 205.
Typos error correction.
Clarification on handling of multiple CICAMs with Auxiliary File System
resource.
1.4.2 09-May-2016 Fixed typo errors for Content Control resource and LSC resource in Table 4.1.
Fixed typo error for LSC resource identifier in Table 5.2.
Consistent renumbering of tables.
Combination of Application MMI sections.
1.4.3 18-Oct-2017 Introduction of the CI Plus 2nd Root of Trust in chapter 6.
Support of the 2nd Root of Trust becomes mandatory for CICAM (chapter 7).
1.4.4 20-Sep-2021 Added Operator Profile v3 as mandatory for Hosts and CICAMs (chapter 4.1).
As Application MMI is now optional, chapter 4.5 was moved to chapter 5.5.
Added support of Overt Watermarking functionality as optional (chapter 5.6),
Removed references to the ‘CI Plus Browser’ (chapter 4.5).
Added clarification on usage of URIv5 by CICAM not achieving the ECP
Security Level (chapter 4.6).