INTRODUCTION
1 Scope
2 Normative references
3 Terms, definitions and abbreviated terms
3.1 Terms and definitions
3.2 Abbreviated terms
4 Notation
4.1 Numerical values
4.2 Notations for keys
4.3 Notation list
5 Requirements
5.1 Viewpoint of content user
5.1.1 Content usage environment
5.1.2 Content distribution services
5.1.3 Integrity of content
5.2 Viewpoint of rights holder
5.2.1 Overview of requirements for content protection
5.2.2 Licence service model
5.2.3 Threats and counter-measures
5.2.4 Evaluation criteria
6 Design considerations
6.1 Security model
6.1.1 Overview of security model
6.1.2 Secure licence transaction protocol (SLTP) model
6.1.3 Certification authority
6.1.4 Key revocation and termination of TREM
6.2 Interconnection model
6.2.1 Generic interconnection model
6.2.2 Licence relay protocol (LRP) model
6.2.3 Implementation model of inter-connection
6.3 Licence information model
6.3.1 Access conditions
6.3.2 Generic licence format (GLF) model
6.4 Protected content format (PCF) model
7 Issues to be standardized
Annex A (informative) - Example of algorithms for cryptosystem
and hash
Annex B (informative) - Example of conversion of licence
information in DRM based upon SLTP into that
of existing DRM
Bibliography