ETSI
TSI TS 101 699 V1.1.1 (1999-11)
6.2.2.2 Trap ...................................................................................................................................................... 43
6.2.2.3 GetNextItemReq................................................................................................................................... 43
6.2.2.4 GetNextItemAck................................................................................................................................... 44
6.2.2.5 StatusAck.............................................................................................................................................. 44
6.2.3 Audience metering ..................................................................................................................................... 45
6.2.3.1 Protecting consumer privacy ................................................................................................................ 45
6.2.3.2 Selection information............................................................................................................................ 45
6.2.3.3 Port profile............................................................................................................................................ 48
6.2.3.4 Auxiliary decoder ................................................................................................................................. 49
6.2.4 Activation status......................................................................................................................................... 50
6.3 Power manager ................................................................................................................................................ 50
6.3.1 Activation state change request.................................................................................................................. 51
6.3.2 Activation state change acknowledge......................................................................................................... 51
6.3.2.1 Overview of dialogues (informative).................................................................................................... 52
6.4 Event management........................................................................................................................................... 53
6.4.1 Event manager sessions.............................................................................................................................. 53
6.4.2 Event Manager resources ........................................................................................................................... 54
6.4.3 Time range ................................................................................................................................................. 54
6.4.4 Resource priorities ..................................................................................................................................... 54
6.4.5 Power-up timing......................................................................................................................................... 55
6.4.6 Energy conservation................................................................................................................................... 55
6.4.7 Event request.............................................................................................................................................. 55
6.4.8 Event request acknowledge........................................................................................................................ 56
6.4.9 Event notification....................................................................................................................................... 56
6.5 Application MMI............................................................................................................................................. 57
6.5.1 Resource Contention.................................................................................................................................. 57
6.5.2 RequestStart ............................................................................................................................................... 58
6.5.3 RequestStartAck......................................................................................................................................... 59
6.5.4 FileRequest................................................................................................................................................. 59
6.5.5 FileAcknowledge ....................................................................................................................................... 60
6.5.6 AppAbortRequest....................................................................................................................................... 60
6.5.7 AppAbortAck............................................................................................................................................. 61
6.6 Copy protection ............................................................................................................................................... 61
6.6.1 Copy protection system instance management........................................................................................... 61
6.6.1.1 Module provided systems..................................................................................................................... 61
6.6.1.2 Host provided systems.......................................................................................................................... 61
6.6.1.3 Application use of copy protection systems.......................................................................................... 62
6.6.2 Copy protection system ID management.................................................................................................... 62
6.6.3 Minimum repetition interval....................................................................................................................... 62
6.6.4 CP_query and CP_reply............................................................................................................................. 62
6.6.5 CP_command and CP_response................................................................................................................. 63
6.7 Software download .......................................................................................................................................... 64
6.7.1 Introduction................................................................................................................................................ 64
6.7.2 Life cycle overview.................................................................................................................................... 64
6.7.3 Download resource..................................................................................................................................... 65
6.7.3.1 Identification of manufacturer binaries................................................................................................. 66
6.7.4 Resource-objects........................................................................................................................................ 67
6.7.4.1 Download Enquiry................................................................................................................................ 67
6.7.4.2 Download Reply................................................................................................................................... 67
6.7.4.3 User Authorization Initiate ................................................................................................................... 67
6.7.4.4 User Authorization Result .................................................................................................................... 68
6.7.5 Host-module exchanges ............................................................................................................................. 69
6.7.5.1 Initial host-module negotiation............................................................................................................. 69
6.7.5.2 User Authorization ............................................................................................................................... 72
6.7.5.3 Data Download..................................................................................................................................... 72
6.7.5.4 Private Data Fields in DSM-CC messages ........................................................................................... 74
6.7.5.5 Minimum compatibility........................................................................................................................ 74
6.8 CA pipeline resource ....................................................................................................................................... 75
6.8.1 Overview.................................................................................................................................................... 75
6.8.2 Functionality .............................................................................................................................................. 75
评论3