MMCA CONFIDENTIAL
The
Content Protection
SecureMMC
System Specification
Version 1.00
November 2001
Revision History
Revision
Date
Chapter/Section
Changes compared to previous issue
0.90
0.91
11/May/’01 All
First issue
16/Jul/’01
2
3
5.3
Typo:  [X.680],  Deletion  of  [Part1]:”Keitaide-Music  Specification
Part1” reference.
Concatenation of [Part1] definitions and additional definitions
Addition of “Ixx” description.
6.1 ~ 6.5
Addition of the requirements instead of the reference.
6.2, 6.3.1.1, 6.3.2 Clarification of the definition
7
Addition of the MMC mode.
8.4, 8.7
Typo: Table 8.3, Table 8.7
8.5
9, 9.2
9.1
9.2.1
9.2.11
9.3
Clarification of the license control area and the license table.
Clarification of the basic specification
Deletion  of  the  BUS_SWITCH  and  SET_BLOCK_TRANSFERRED
commands.
Clarification of the CPC execution timeout.
Change of the definition of the data field in SET_SESSION_KEY
Rearrangement of the command formats.
Explanation addition of the Data Block divided into multiple blocks.
9.3.4, 9.3.5
Typo: R1b
10
11.1.2
Chapter 10 was moved to Appendix A.
Clarification of the UTCTime.
11.1.3, 11.1.4
Typo
11.1.4
11.3.1
Clarification of the 2’s complement descrotion.
Definition  of  the  MoveCount  and  SafeLevel  was  consistent  with
chapter 8.
11.3.3, 11.3.4
The certificate and CRL are defined in Appendix B.
11.3.2, 
11.3.9
11.3.8,
ACp format was changed to reserved.
Appendix B
Addition of the certificate and CRL format
0.92
10/Sep/’01
2.
MMCA/2.11 --> MMCA/3.1
Content Protection Secure MMC System Specification Version 1.0 Official Release ª
 November 2001
4.
5.3
6.3
6.5.1
6.7.2
7.
8.
8.1
8.3
8.4
8.5
8.6
9.1
9.2
Addition of “Ecc163”
Deletion of duplicated descriptions
Addition of the explanation of the service model and the license
Modification of figure 6.1
Addition of the explanation of CRLUpdate.
Clarifying of the random number definition
Deletion of MMC mode limitation
KPmx may be located in semi-secure area.
Modification of the key related information
Clarifying of the transaction log
Modification of the session status
Clarifying  of  the  minimum  license  number  and  verification  of  the
signature of encrypted licenses.
Clarifying  of  the  “SafeLevel”  and  verification  of  the  signature  of
encrypted licenses.
Clarifying of the expression. (The detailed operations are described in
section.9.2)
Addition of the explanation of the data padding
9.2.1-9.2.17
Modification of expression of “cnt”
9.2.1
Modification of expression of “Security System ID”
Typo: Number of storable licenses
Clarifying of the definition of CPC_MAX_TIME
9.2.5,9.2.6,9.2.8
Clarifying of “any data”
9.2.5,9.2.6
Addition of the safe level process
9.3
10.
10.1
Deletion of the explanation of the response
Addition of the MMC mode timing
Modification of expression
Modification of Figure 10.1
10.1,  10.2,  10.4,
10.5
Addition of the expression of “-“ in Table 10.1, 10.2, 10.4, 10.5.
11.3.7
Modification of the session status
1.00
5/Nov/’01
9.2.1
Modification of the S_VER
Content Protection Secure MMC System Specification Version 1.0 Official Release ª
 November 2001
is  provided 
the  attached  standard  (the  “Standard) 
You  acknowledge 
to  you  on  an  “AS  IS”  basis.
MULTIMEDIACARD  ASSOCIATION  (“MMCA”)  MAKES  NO  EXPRESS,  IMPLIED  OR  STATUORY
WARRENTIES AND EXPRESSLY DISCLAIMS THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR
A  PARTICULAR  PURPOSE  AND  NON-INFRINGEMENT  OF  THIRD  PARTY  RIGHTS.    MMCA  SHALL  NOT
BE  LIABLE  FOR  (I)  TECHNICAL  OR  EDITORIAL  ERRORS  OR  OMISSIONS  CONTAINED  WITHIN  THE
STANDARD,  OR  (II)  ANY  INCIDENTAL,  SPECIAL,  EXEMPLARY  OR  CONSEQUENTAIL  DAMAGES
(INCLUDING  WITHOUT  LIMITATION  LOST  PROFITS  OR  LOSS  OF  USE)  RESULTING  FROM  THE
FURNISING,  PERFORMANCE  OR  USE  OF  THE  STANDARD,  EVEN  IF  THE  ADVISED  OF  THE
POSSIBILITY OF SUCH DAMAGES.
Copyright ª
reserved.
 November 2001 MultiMediaCard Association, P.O. Box 2012, Cupertino, CA 95015-2012. World rights
No  part  of  this  publication  may  be  transmitted,  reproduced  or  distributed  in  any  way,  including  but  not  limited  to
photocopying,  electronic  copying,  magnetic  or  other  recording  without  the  prior  written  consent  of  MMCA.
Content Protection Secure MMC System Specification Version 1.0 Official Release ª
 November 2001
Introduction
Due to the recent trends in the rapid popularization of mobile phones and the Internet as well as the realization of
high-speed data transmission, a new type of information distribution service has gradually been emerged into the
market  as  a  large  volume  data  distribution  service  through  these  cyber  networks.    In  addition,  the  music  data
content distribution service  is  expected  to  grow  in  the  future  among  the  various  large  volume  data  distribution
services.  However,  in  distributing  a  valuable  content  such  as  the  music  data  on  the  Internet,  it  is  crucial  to
establish the technologies to protect the content from illegal piracies and  unauthorized distributions, which have
emerged as one of the important social issues.
The  Content  Protection  Secure  MultiMediaCard  System  Specification  describes  the  technical  specifications
required to distribute the digital data content from the server to the storage media inserted in the portable device
for recording and playback of the digital data content. This specification realizes those functions both in a secure
manner and without losses of conveniences for the users.
This  specification  is  based  on  the  protocols  for  the  interoperability  among  systems  to  realize  the  content
protection technology called UDAC-MB (Universal Distribution with Access Control - Media Base). UDAC-MB
is applicable to the encrypted content distribution through not only the cyber networks but also packaged media
or the local data exchange between consumers.
Implementations  conforming  to  this  specification  avail  to  strongly  protect  the  content  distributed  through  the
mobile phone networks and/or the Internet and, hence, easily realize the new type of content distribution services
through  the  networks.  Though  this  specification  mainly  describes  on  the  distribution  of  contents  through  the
mobile  phone  terminals,  its  application  may  also  be  expanded  and  applied  to  other  various  types  of  network
terminals, portable devices and contents.
‘UDAC-MB’ is the trademark of FUJITSU LIMITED, Hitachi Ltd., NIPPON COLUMBIA CO., LTD., PFU Limited
and SANYO Electric Co, Ltd.
Content Protection Secure MMC System Specification Version 1.0 Official Release ª
 November 2001
Contents
1
SCOPE........................................................................................................................................1
2 REFERENCES .............................................................................................................................2
3 DEFINITIONS .............................................................................................................................3
3.1 Definitions in [X. 509]..................................................................................................................................................3
3.2 Definitions in [MMCA/3.1].........................................................................................................................................3
3.3 Additional Definitions in this Specification..............................................................................................................3
4 ABBREVIATIONS........................................................................................................................6
5 CONVENTIONS ..........................................................................................................................7
5.1 Expression of Numerical Values .................................................................................................................................7
5.2 Expression of Keys .......................................................................................................................................................7
5.3 Notations.........................................................................................................................................................................7
6 REQUIREMENTS........................................................................................................................9
6.1 Compatibility..................................................................................................................................................................9
6.2 User Requirements ........................................................................................................................................................9
6.3 Supposed Service Model..............................................................................................................................................9
6.4 Security Requirements................................................................................................................................................11
Supposed Requirements for Content Protection..................................................................................11
Content Usage Control (Access Control)............................................................................................ 12
Access Control by Security Level.......................................................................................................... 13
Relationship with Electronic Commerce Security.............................................................................. 13
6.5 Supposed Protocol.......................................................................................................................................................14
Authorization Protocol Basic Procedure............................................................................................. 14
Procedures of each Protocol.................................................................................................................. 16
6.6 Structural Requirements .............................................................................................................................................16
6.7 Implementation criteria...............................................................................................................................................17
Implementation of Tamper Resistant Module ..................................................................................... 17
Generation of Random Numbers........................................................................................................... 17
FEATURES................................................................................................................................18
6.4.1
6.4.2
6.4.3
6.4.4
7
6.5.1
6.5.2
6.7.1
6.7.2
8
INFORMATION IN SEMI-SECURE AND SECURE AREA.............................................................20
8.1 Key Related Information............................................................................................................................................20
8.2 Certificates....................................................................................................................................................................21
8.3 CRL................................................................................................................................................................................21
8.4 Transaction Log ...........................................................................................................................................................21
8.5 License Table................................................................................................................................................................22
8.6 License Control Area ..................................................................................................................................................22
8.7 Work Registers.............................................................................................................................................................23
9 ADDITIONAL COMMANDS.......................................................................................................25
9.1 Outline ...........................................................................................................................................................................25
9.2 Additional Command Specifications .......................................................................................................................27
SEND_SCSR............................................................................................................................................. 28
SEND_LOG............................................................................................................................................... 29
ESTABLISH_WRITE_SESSION ............................................................................................................ 30
SEND_SESSION_KEY............................................................................................................................ 30
SEND_PLAY_LICENSE.......................................................................................................................... 31
SEND_MOVE_LICENSE ....................................................................................................................... 31
SEND_SIGNED_LOG............................................................................................................................. 32
SEND_CERT............................................................................................................................................. 32
WRITE_LICENSE.................................................................................................................................... 33
READ_LICENSE...................................................................................................................................... 33
SET_SESSION_KEY................................................................................................................................ 34
9.2.1
9.2.2
9.2.3
9.2.4
9.2.5
9.2.6
9.2.7
9.2.8
9.2.9
9.2.10
9.2.11
Content Protection Secure MMC System Specification Version 1.0 Official Release ª
 November 2001
9.3.1
9.3.2
9.3.3
9.3.4
9.3.5
9.2.12
9.2.13
9.2.14
9.2.15
9.2.16
9.2.17
SET_LICENSE ..........................................................................................................................................35
ESTABLISH_PLAY_SESSION ................................................................................................................35
ESTABLISH_MOVE_SESSION ..............................................................................................................36
RECOVER_SESSION...............................................................................................................................36
SEARCH_LICENSE .................................................................................................................................37
VERIFY_CERT..........................................................................................................................................38
9.3 Command Format........................................................................................................................................................ 39
Block Read type (without SEND_CERT)..............................................................................................39
SEND_CERT .............................................................................................................................................40
Block Write type........................................................................................................................................41
WRITE_LICENSE.....................................................................................................................................41
READ_LICENSE ......................................................................................................................................42
10 STATE TRANSITIONS .............................................................................................................. 44
10.1 Whole State Transition for CPCs ............................................................................................................................. 45
10.2 Reading Session .......................................................................................................................................................... 47
10.3 Licensing for Playback............................................................................................................................................... 49
10.4 Moving License........................................................................................................................................................... 51
10.5 Writing Session ........................................................................................................................................................... 53
10.6 Retrying Session.......................................................................................................................................................... 55
11 MESSAGE FORMAT................................................................................................................. 57
11.2.1
11.2.2
11.2.3
11.2.4
11.2.5
11.3.1
11.3.2
11.3.3
11.3.4
11.3.5
11.3.6
11.3.7
11.3.8
11.3.9
11.1.1
11.1.2
11.1.3
11.1.4
11.1.5
11.1.6
11.1.7
11.1.8
11.1.9
11.1 Basic Rules ................................................................................................................................................................... 57
Encoding Rule...........................................................................................................................................57
Tag...............................................................................................................................................................57
Size Field Rule..........................................................................................................................................57
INTEGER Type Rule ................................................................................................................................57
BIT STRING Type Rule............................................................................................................................58
OCTET STRING Type Rule.....................................................................................................................58
SEQUENCE Type Rule............................................................................................................................58
OPTIONAL Rule.......................................................................................................................................59
UTCTime Type Rule .................................................................................................................................59
11.2 Appending Rules ......................................................................................................................................................... 60
Application Tags.......................................................................................................................................60
TripleDesKey Format...............................................................................................................................60
TripleDesCode Format............................................................................................................................61
Ecc163PublicKey Format.......................................................................................................................62
Ecc163Code Format................................................................................................................................62
11.3 Structure Definition .................................................................................................................................................... 62
ACm Structure...........................................................................................................................................62
ACp Structure............................................................................................................................................64
Certificate Structure ................................................................................................................................64
CRL Structure ...........................................................................................................................................67
SessionInformation Structure .................................................................................................................70
EncryptedLicense Structure....................................................................................................................70
TransactionLog Structure .......................................................................................................................72
PlayInformation Structure......................................................................................................................74
License Structure ......................................................................................................................................74
11.4 Terminal – Media Command..................................................................................................................................... 77
SEND_LOG command.............................................................................................................................77
SEND_CERT command...........................................................................................................................77
SET_SESSION_KEY command..............................................................................................................78
RECOVER_SESSION command............................................................................................................78
ESTABLISH_WRITE_SESSION command ..........................................................................................80
SET_LICENSE command........................................................................................................................81
WRITE_LICENSE command..................................................................................................................82
SEARCH_LICENSE command...............................................................................................................82
SEND_SIGNED_LOG command...........................................................................................................82
VERIFY_CERT command.......................................................................................................................82
SEND_SESSION_KEY command ..........................................................................................................83
ESTABLISH_MOVE_SESSION command ...........................................................................................84
ESTBLISH_PLAY_SESSION command................................................................................................85
11.4.1
11.4.2
11.4.3
11.4.4
11.4.5
11.4.6
11.4.7
11.4.8
11.4.9
11.4.10
11.4.11
11.4.12
11.4.13
Content Protection Secure MMC System Specification Version 1.0 Official Release ª
 November 2001
11.4.14
11.4.15
11.4.16
READ_LICENSE command................................................................................................................... 85
SEND_MOVE_LICENSE command..................................................................................................... 86
SEND_PLAY_LICENSE command....................................................................................................... 86
APPENDIX A  SEQUENCE AND INTERNAL DATA FLOW EXAMPLES ..............................................88
APPENDIX B  CERTIFICATE/CRL FORMAT (INFORMATIVE) .......................................................96
Content Protection Secure MMC System Specification Version 1.0 Official Release ª
 November 2001