logo资料库

CP-SecureMMC-1_00-test(MMC卡资料).pdf

第1页 / 共111页
第2页 / 共111页
第3页 / 共111页
第4页 / 共111页
第5页 / 共111页
第6页 / 共111页
第7页 / 共111页
第8页 / 共111页
资料共111页,剩余部分请下载后查看
MMCA CONFIDENTIAL The Content Protection SecureMMC System Specification Version 1.00 November 2001
Revision History Revision Date Chapter/Section Changes compared to previous issue 0.90 0.91 11/May/’01 All First issue 16/Jul/’01 2 3 5.3 Typo: [X.680], Deletion of [Part1]:”Keitaide-Music Specification Part1” reference. Concatenation of [Part1] definitions and additional definitions Addition of “Ixx” description. 6.1 ~ 6.5 Addition of the requirements instead of the reference. 6.2, 6.3.1.1, 6.3.2 Clarification of the definition 7 Addition of the MMC mode. 8.4, 8.7 Typo: Table 8.3, Table 8.7 8.5 9, 9.2 9.1 9.2.1 9.2.11 9.3 Clarification of the license control area and the license table. Clarification of the basic specification Deletion of the BUS_SWITCH and SET_BLOCK_TRANSFERRED commands. Clarification of the CPC execution timeout. Change of the definition of the data field in SET_SESSION_KEY Rearrangement of the command formats. Explanation addition of the Data Block divided into multiple blocks. 9.3.4, 9.3.5 Typo: R1b 10 11.1.2 Chapter 10 was moved to Appendix A. Clarification of the UTCTime. 11.1.3, 11.1.4 Typo 11.1.4 11.3.1 Clarification of the 2’s complement descrotion. Definition of the MoveCount and SafeLevel was consistent with chapter 8. 11.3.3, 11.3.4 The certificate and CRL are defined in Appendix B. 11.3.2, 11.3.9 11.3.8, ACp format was changed to reserved. Appendix B Addition of the certificate and CRL format 0.92 10/Sep/’01 2. MMCA/2.11 --> MMCA/3.1 Content Protection Secure MMC System Specification Version 1.0 Official Release ª November 2001
4. 5.3 6.3 6.5.1 6.7.2 7. 8. 8.1 8.3 8.4 8.5 8.6 9.1 9.2 Addition of “Ecc163” Deletion of duplicated descriptions Addition of the explanation of the service model and the license Modification of figure 6.1 Addition of the explanation of CRLUpdate. Clarifying of the random number definition Deletion of MMC mode limitation KPmx may be located in semi-secure area. Modification of the key related information Clarifying of the transaction log Modification of the session status Clarifying of the minimum license number and verification of the signature of encrypted licenses. Clarifying of the “SafeLevel” and verification of the signature of encrypted licenses. Clarifying of the expression. (The detailed operations are described in section.9.2) Addition of the explanation of the data padding 9.2.1-9.2.17 Modification of expression of “cnt” 9.2.1 Modification of expression of “Security System ID” Typo: Number of storable licenses Clarifying of the definition of CPC_MAX_TIME 9.2.5,9.2.6,9.2.8 Clarifying of “any data” 9.2.5,9.2.6 Addition of the safe level process 9.3 10. 10.1 Deletion of the explanation of the response Addition of the MMC mode timing Modification of expression Modification of Figure 10.1 10.1, 10.2, 10.4, 10.5 Addition of the expression of “-“ in Table 10.1, 10.2, 10.4, 10.5. 11.3.7 Modification of the session status 1.00 5/Nov/’01 9.2.1 Modification of the S_VER Content Protection Secure MMC System Specification Version 1.0 Official Release ª November 2001
is provided the attached standard (the “Standard) You acknowledge to you on an “AS IS” basis. MULTIMEDIACARD ASSOCIATION (“MMCA”) MAKES NO EXPRESS, IMPLIED OR STATUORY WARRENTIES AND EXPRESSLY DISCLAIMS THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT OF THIRD PARTY RIGHTS. MMCA SHALL NOT BE LIABLE FOR (I) TECHNICAL OR EDITORIAL ERRORS OR OMISSIONS CONTAINED WITHIN THE STANDARD, OR (II) ANY INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTAIL DAMAGES (INCLUDING WITHOUT LIMITATION LOST PROFITS OR LOSS OF USE) RESULTING FROM THE FURNISING, PERFORMANCE OR USE OF THE STANDARD, EVEN IF THE ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Copyright ª reserved. November 2001 MultiMediaCard Association, P.O. Box 2012, Cupertino, CA 95015-2012. World rights No part of this publication may be transmitted, reproduced or distributed in any way, including but not limited to photocopying, electronic copying, magnetic or other recording without the prior written consent of MMCA. Content Protection Secure MMC System Specification Version 1.0 Official Release ª November 2001
Introduction Due to the recent trends in the rapid popularization of mobile phones and the Internet as well as the realization of high-speed data transmission, a new type of information distribution service has gradually been emerged into the market as a large volume data distribution service through these cyber networks. In addition, the music data content distribution service is expected to grow in the future among the various large volume data distribution services. However, in distributing a valuable content such as the music data on the Internet, it is crucial to establish the technologies to protect the content from illegal piracies and unauthorized distributions, which have emerged as one of the important social issues. The Content Protection Secure MultiMediaCard System Specification describes the technical specifications required to distribute the digital data content from the server to the storage media inserted in the portable device for recording and playback of the digital data content. This specification realizes those functions both in a secure manner and without losses of conveniences for the users. This specification is based on the protocols for the interoperability among systems to realize the content protection technology called UDAC-MB (Universal Distribution with Access Control - Media Base). UDAC-MB is applicable to the encrypted content distribution through not only the cyber networks but also packaged media or the local data exchange between consumers. Implementations conforming to this specification avail to strongly protect the content distributed through the mobile phone networks and/or the Internet and, hence, easily realize the new type of content distribution services through the networks. Though this specification mainly describes on the distribution of contents through the mobile phone terminals, its application may also be expanded and applied to other various types of network terminals, portable devices and contents. ‘UDAC-MB’ is the trademark of FUJITSU LIMITED, Hitachi Ltd., NIPPON COLUMBIA CO., LTD., PFU Limited and SANYO Electric Co, Ltd. Content Protection Secure MMC System Specification Version 1.0 Official Release ª November 2001
Contents 1 SCOPE........................................................................................................................................1 2 REFERENCES .............................................................................................................................2 3 DEFINITIONS .............................................................................................................................3 3.1 Definitions in [X. 509]..................................................................................................................................................3 3.2 Definitions in [MMCA/3.1].........................................................................................................................................3 3.3 Additional Definitions in this Specification..............................................................................................................3 4 ABBREVIATIONS........................................................................................................................6 5 CONVENTIONS ..........................................................................................................................7 5.1 Expression of Numerical Values .................................................................................................................................7 5.2 Expression of Keys .......................................................................................................................................................7 5.3 Notations.........................................................................................................................................................................7 6 REQUIREMENTS........................................................................................................................9 6.1 Compatibility..................................................................................................................................................................9 6.2 User Requirements ........................................................................................................................................................9 6.3 Supposed Service Model..............................................................................................................................................9 6.4 Security Requirements................................................................................................................................................11 Supposed Requirements for Content Protection..................................................................................11 Content Usage Control (Access Control)............................................................................................ 12 Access Control by Security Level.......................................................................................................... 13 Relationship with Electronic Commerce Security.............................................................................. 13 6.5 Supposed Protocol.......................................................................................................................................................14 Authorization Protocol Basic Procedure............................................................................................. 14 Procedures of each Protocol.................................................................................................................. 16 6.6 Structural Requirements .............................................................................................................................................16 6.7 Implementation criteria...............................................................................................................................................17 Implementation of Tamper Resistant Module ..................................................................................... 17 Generation of Random Numbers........................................................................................................... 17 FEATURES................................................................................................................................18 6.4.1 6.4.2 6.4.3 6.4.4 7 6.5.1 6.5.2 6.7.1 6.7.2 8 INFORMATION IN SEMI-SECURE AND SECURE AREA.............................................................20 8.1 Key Related Information............................................................................................................................................20 8.2 Certificates....................................................................................................................................................................21 8.3 CRL................................................................................................................................................................................21 8.4 Transaction Log ...........................................................................................................................................................21 8.5 License Table................................................................................................................................................................22 8.6 License Control Area ..................................................................................................................................................22 8.7 Work Registers.............................................................................................................................................................23 9 ADDITIONAL COMMANDS.......................................................................................................25 9.1 Outline ...........................................................................................................................................................................25 9.2 Additional Command Specifications .......................................................................................................................27 SEND_SCSR............................................................................................................................................. 28 SEND_LOG............................................................................................................................................... 29 ESTABLISH_WRITE_SESSION ............................................................................................................ 30 SEND_SESSION_KEY............................................................................................................................ 30 SEND_PLAY_LICENSE.......................................................................................................................... 31 SEND_MOVE_LICENSE ....................................................................................................................... 31 SEND_SIGNED_LOG............................................................................................................................. 32 SEND_CERT............................................................................................................................................. 32 WRITE_LICENSE.................................................................................................................................... 33 READ_LICENSE...................................................................................................................................... 33 SET_SESSION_KEY................................................................................................................................ 34 9.2.1 9.2.2 9.2.3 9.2.4 9.2.5 9.2.6 9.2.7 9.2.8 9.2.9 9.2.10 9.2.11 Content Protection Secure MMC System Specification Version 1.0 Official Release ª November 2001
9.3.1 9.3.2 9.3.3 9.3.4 9.3.5 9.2.12 9.2.13 9.2.14 9.2.15 9.2.16 9.2.17 SET_LICENSE ..........................................................................................................................................35 ESTABLISH_PLAY_SESSION ................................................................................................................35 ESTABLISH_MOVE_SESSION ..............................................................................................................36 RECOVER_SESSION...............................................................................................................................36 SEARCH_LICENSE .................................................................................................................................37 VERIFY_CERT..........................................................................................................................................38 9.3 Command Format........................................................................................................................................................ 39 Block Read type (without SEND_CERT)..............................................................................................39 SEND_CERT .............................................................................................................................................40 Block Write type........................................................................................................................................41 WRITE_LICENSE.....................................................................................................................................41 READ_LICENSE ......................................................................................................................................42 10 STATE TRANSITIONS .............................................................................................................. 44 10.1 Whole State Transition for CPCs ............................................................................................................................. 45 10.2 Reading Session .......................................................................................................................................................... 47 10.3 Licensing for Playback............................................................................................................................................... 49 10.4 Moving License........................................................................................................................................................... 51 10.5 Writing Session ........................................................................................................................................................... 53 10.6 Retrying Session.......................................................................................................................................................... 55 11 MESSAGE FORMAT................................................................................................................. 57 11.2.1 11.2.2 11.2.3 11.2.4 11.2.5 11.3.1 11.3.2 11.3.3 11.3.4 11.3.5 11.3.6 11.3.7 11.3.8 11.3.9 11.1.1 11.1.2 11.1.3 11.1.4 11.1.5 11.1.6 11.1.7 11.1.8 11.1.9 11.1 Basic Rules ................................................................................................................................................................... 57 Encoding Rule...........................................................................................................................................57 Tag...............................................................................................................................................................57 Size Field Rule..........................................................................................................................................57 INTEGER Type Rule ................................................................................................................................57 BIT STRING Type Rule............................................................................................................................58 OCTET STRING Type Rule.....................................................................................................................58 SEQUENCE Type Rule............................................................................................................................58 OPTIONAL Rule.......................................................................................................................................59 UTCTime Type Rule .................................................................................................................................59 11.2 Appending Rules ......................................................................................................................................................... 60 Application Tags.......................................................................................................................................60 TripleDesKey Format...............................................................................................................................60 TripleDesCode Format............................................................................................................................61 Ecc163PublicKey Format.......................................................................................................................62 Ecc163Code Format................................................................................................................................62 11.3 Structure Definition .................................................................................................................................................... 62 ACm Structure...........................................................................................................................................62 ACp Structure............................................................................................................................................64 Certificate Structure ................................................................................................................................64 CRL Structure ...........................................................................................................................................67 SessionInformation Structure .................................................................................................................70 EncryptedLicense Structure....................................................................................................................70 TransactionLog Structure .......................................................................................................................72 PlayInformation Structure......................................................................................................................74 License Structure ......................................................................................................................................74 11.4 Terminal – Media Command..................................................................................................................................... 77 SEND_LOG command.............................................................................................................................77 SEND_CERT command...........................................................................................................................77 SET_SESSION_KEY command..............................................................................................................78 RECOVER_SESSION command............................................................................................................78 ESTABLISH_WRITE_SESSION command ..........................................................................................80 SET_LICENSE command........................................................................................................................81 WRITE_LICENSE command..................................................................................................................82 SEARCH_LICENSE command...............................................................................................................82 SEND_SIGNED_LOG command...........................................................................................................82 VERIFY_CERT command.......................................................................................................................82 SEND_SESSION_KEY command ..........................................................................................................83 ESTABLISH_MOVE_SESSION command ...........................................................................................84 ESTBLISH_PLAY_SESSION command................................................................................................85 11.4.1 11.4.2 11.4.3 11.4.4 11.4.5 11.4.6 11.4.7 11.4.8 11.4.9 11.4.10 11.4.11 11.4.12 11.4.13 Content Protection Secure MMC System Specification Version 1.0 Official Release ª November 2001
11.4.14 11.4.15 11.4.16 READ_LICENSE command................................................................................................................... 85 SEND_MOVE_LICENSE command..................................................................................................... 86 SEND_PLAY_LICENSE command....................................................................................................... 86 APPENDIX A SEQUENCE AND INTERNAL DATA FLOW EXAMPLES ..............................................88 APPENDIX B CERTIFICATE/CRL FORMAT (INFORMATIVE) .......................................................96 Content Protection Secure MMC System Specification Version 1.0 Official Release ª November 2001
分享到:
收藏