没有合适的资源?快使用搜索试试~ 我知道了~
首页DVB-CI 标准 (Digital Video Broadcasting )
资源详情
资源评论
资源推荐
ETSI TS 101 699
V1.1.1
(1999-11)
Technical Specification
Digital Video Broadcasting (DVB);
Extensions to the Common Interface Specification
EBU
UER
European Broadcasting Union Union Européenne de Radio-Télévision
ETSI
E
TSI TS 101 699 V1.1.1 (1999-11)
2
Reference
DTS/JTC-DVB-94 (fqc00icr.PDF)
Keywords
Broadcast, TV
ETSI
Postal address
F-06921 Sophia Antipolis Cedex - FRANCE
Office address
650 Route des Lucioles - Sophia Antipolis
Valbonne - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - NAF 742 C
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° 7803/88
Internet
secretariat@etsi.fr
Individual copies of this ETSI deliverable
can be downloaded from
http://www.etsi.org
If you find errors in the present document, send your
comment to:
editor@etsi.fr
Important notice
This ETSI deliverable may be made available in more than one electronic version or in print. In any case of existing or
perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF).
In case of dispute, the reference should be the printing on ETSI printers of the PDF version kept on a specific network
drive within ETSI Secretariat.
Copyright Notification
No part may be reproduced except as authorized by written permission.
The copyright and the foregoing restriction extend to reproduction in all media.
© European Telecommunications Standards Institute 1999.
© European Broadcasting Union 1999.
All rights reserved.
ETSI
E
TSI TS 101 699 V1.1.1 (1999-11)
3
Contents
Intellectual Property Rights ...............................................................................................................................6
Foreword............................................................................................................................................................6
1 Scope........................................................................................................................................................7
1.1 From version 1................................................................................................................................................... 8
2 References ...............................................................................................................................................9
3 Definitions and abbreviations..................................................................................................................9
3.1 Definitions ......................................................................................................................................................... 9
3.2 Abbreviations................................................................................................................................................... 10
4 Command Interface - Resource Management........................................................................................11
4.1 Extending use of the resource ID type field..................................................................................................... 11
4.2 Establishing the Module ID ............................................................................................................................. 12
4.2.1 Resource Manager - version 2.................................................................................................................... 13
4.2.1.1 Resource Manager Protocol.................................................................................................................. 13
4.2.1.2 Module ID establishment...................................................................................................................... 13
4.2.1.3 Resource profile establishment............................................................................................................. 15
4.2.1.4 Profile Enquiry ..................................................................................................................................... 15
4.2.1.5 Profile Reply......................................................................................................................................... 15
4.2.1.6 Profile Changed.................................................................................................................................... 16
4.2.1.7 Module ID Send ................................................................................................................................... 16
4.2.1.8 Module ID Command........................................................................................................................... 17
4.3 Defining and using common interface private resources ................................................................................. 17
4.3.1 Introduction................................................................................................................................................ 17
4.3.2 Defining private resources.......................................................................................................................... 17
4.3.2.1 Registering the resource ID .................................................................................................................. 17
4.3.2.2 Use of module IDs................................................................................................................................ 19
4.3.2.3 Resource object definition.................................................................................................................... 19
4.3.2.4 Resource declaration ............................................................................................................................ 20
4.3.2.5 Access to man machine interface.......................................................................................................... 20
4.3.3 Using Private Resources............................................................................................................................. 20
4.3.3.1 From Modules ...................................................................................................................................... 20
4.3.3.2 From Hosts ........................................................................................................................................... 20
5 Command interface - application information.......................................................................................21
5.1 Application information - version 2................................................................................................................. 21
5.1.1 New application types................................................................................................................................ 21
5.1.2 Unrecognized application type semantics .................................................................................................. 21
6 Command interface - additional resources............................................................................................21
6.1 Input modules .................................................................................................................................................. 21
6.1.1 Requirements for both input module types................................................................................................. 22
6.1.1.1 TS format.............................................................................................................................................. 22
6.1.1.2 TS control............................................................................................................................................. 22
6.1.1.3 Input module sessions........................................................................................................................... 22
6.1.2 Type 'A' input modules............................................................................................................................... 23
6.1.2.1 Introduction (informative) .................................................................................................................... 23
6.1.2.2 Type 'A' module command interface .................................................................................................... 25
6.1.3 Type 'B' input modules............................................................................................................................... 29
6.1.3.1 Introduction (informative) .................................................................................................................... 29
6.1.3.2 Service presentation.............................................................................................................................. 31
6.1.3.3 Event Presentation................................................................................................................................ 39
6.2 Status Query Functions.................................................................................................................................... 41
6.2.1 Status Query sessions................................................................................................................................. 41
6.2.2 Generic status queries................................................................................................................................. 42
6.2.2.1 StatusQuery .......................................................................................................................................... 43
ETSI
E
TSI TS 101 699 V1.1.1 (1999-11)
4
6.2.2.2 Trap ...................................................................................................................................................... 43
6.2.2.3 GetNextItemReq................................................................................................................................... 43
6.2.2.4 GetNextItemAck................................................................................................................................... 44
6.2.2.5 StatusAck.............................................................................................................................................. 44
6.2.3 Audience metering ..................................................................................................................................... 45
6.2.3.1 Protecting consumer privacy ................................................................................................................ 45
6.2.3.2 Selection information............................................................................................................................ 45
6.2.3.3 Port profile............................................................................................................................................ 48
6.2.3.4 Auxiliary decoder ................................................................................................................................. 49
6.2.4 Activation status......................................................................................................................................... 50
6.3 Power manager ................................................................................................................................................ 50
6.3.1 Activation state change request.................................................................................................................. 51
6.3.2 Activation state change acknowledge......................................................................................................... 51
6.3.2.1 Overview of dialogues (informative).................................................................................................... 52
6.4 Event management........................................................................................................................................... 53
6.4.1 Event manager sessions.............................................................................................................................. 53
6.4.2 Event Manager resources ........................................................................................................................... 54
6.4.3 Time range ................................................................................................................................................. 54
6.4.4 Resource priorities ..................................................................................................................................... 54
6.4.5 Power-up timing......................................................................................................................................... 55
6.4.6 Energy conservation................................................................................................................................... 55
6.4.7 Event request.............................................................................................................................................. 55
6.4.8 Event request acknowledge........................................................................................................................ 56
6.4.9 Event notification....................................................................................................................................... 56
6.5 Application MMI............................................................................................................................................. 57
6.5.1 Resource Contention.................................................................................................................................. 57
6.5.2 RequestStart ............................................................................................................................................... 58
6.5.3 RequestStartAck......................................................................................................................................... 59
6.5.4 FileRequest................................................................................................................................................. 59
6.5.5 FileAcknowledge ....................................................................................................................................... 60
6.5.6 AppAbortRequest....................................................................................................................................... 60
6.5.7 AppAbortAck............................................................................................................................................. 61
6.6 Copy protection ............................................................................................................................................... 61
6.6.1 Copy protection system instance management........................................................................................... 61
6.6.1.1 Module provided systems..................................................................................................................... 61
6.6.1.2 Host provided systems.......................................................................................................................... 61
6.6.1.3 Application use of copy protection systems.......................................................................................... 62
6.6.2 Copy protection system ID management.................................................................................................... 62
6.6.3 Minimum repetition interval....................................................................................................................... 62
6.6.4 CP_query and CP_reply............................................................................................................................. 62
6.6.5 CP_command and CP_response................................................................................................................. 63
6.7 Software download .......................................................................................................................................... 64
6.7.1 Introduction................................................................................................................................................ 64
6.7.2 Life cycle overview.................................................................................................................................... 64
6.7.3 Download resource..................................................................................................................................... 65
6.7.3.1 Identification of manufacturer binaries................................................................................................. 66
6.7.4 Resource-objects........................................................................................................................................ 67
6.7.4.1 Download Enquiry................................................................................................................................ 67
6.7.4.2 Download Reply................................................................................................................................... 67
6.7.4.3 User Authorization Initiate ................................................................................................................... 67
6.7.4.4 User Authorization Result .................................................................................................................... 68
6.7.5 Host-module exchanges ............................................................................................................................. 69
6.7.5.1 Initial host-module negotiation............................................................................................................. 69
6.7.5.2 User Authorization ............................................................................................................................... 72
6.7.5.3 Data Download..................................................................................................................................... 72
6.7.5.4 Private Data Fields in DSM-CC messages ........................................................................................... 74
6.7.5.5 Minimum compatibility........................................................................................................................ 74
6.8 CA pipeline resource ....................................................................................................................................... 75
6.8.1 Overview.................................................................................................................................................... 75
6.8.2 Functionality .............................................................................................................................................. 75
ETSI
E
TSI TS 101 699 V1.1.1 (1999-11)
5
6.8.3 Message Transfer....................................................................................................................................... 76
6.8.4 Alternative implementations....................................................................................................................... 77
7 Definition of profiles.............................................................................................................................77
7.1 Profile 1 ........................................................................................................................................................... 77
7.2 Profile 2 ........................................................................................................................................................... 78
7.3 Profile 3 ........................................................................................................................................................... 78
7.4 Domain specific extensions to profiles ............................................................................................................ 78
8 Resource identifiers and application object tags...................................................................................79
8.1 Resource type = 1* .......................................................................................................................................... 81
Bibliography ....................................................................................................................................................82
History..............................................................................................................................................................83
剩余82页未读,继续阅读
hadao
- 粉丝: 29
- 资源: 13
上传资源 快速赚钱
- 我的内容管理 收起
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
会员权益专享
最新资源
- 27页智慧街道信息化建设综合解决方案.pptx
- 计算机二级Ms-Office选择题汇总.doc
- 单链表的插入和删除实验报告 (2).docx
- 单链表的插入和删除实验报告.pdf
- 物联网智能终端项目设备管理方案.pdf
- 如何打造品牌的模式.doc
- 样式控制与页面布局.pdf
- 武汉理工Java实验报告(二).docx
- 2021线上新品消费趋势报告.pdf
- 第3章 Matlab中的矩阵及其运算.docx
- 基于Web的人力资源管理系统的必要性和可行性.doc
- 基于一阶倒立摆的matlab仿真实验.doc
- 速运公司物流管理模式研究教材
- 大数据与管理.pptx
- 单片机课程设计之步进电机.doc
- 大数据与数据挖掘.pptx
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功
评论3