Conference Paper

Achieving Interoperability in Conditional Access Systems through the Dynamic Download and Execution of Cryptographic Software for the IPTV System

U-Comput. Res. Group, Electron. & Telecommun. Res. Inst., Daejeon
DOI: 10.1109/ICCIT.2008.222 Conference: Convergence and Hybrid Information Technology, 2008. ICCIT '08. Third International Conference on, Volume: 2
Source: IEEE Xplore

ABSTRACT An IPTV system that transmits multimedia contents through the IP network needs to adopt a conditional access system allowing the only entitled subscribers to view the premium content as other pay-TV systems do. Although several standard specifications have been published for interoperable models of conditional access systems, the proposed models are based on the unidirectional or restricted bidirectional broadcasting network and do not utilize the characteristics of the IP network. However, software download scheme through the bidirectional IP network enables it to change existing conditional access systems in a secure way. This paper introduces an interoperable conditional access system that can update any cryptographic software provided by different conditional access system vendors through downloading and executing dynamically the downloaded conditional access software only if the software follows the pre-defined interfaces.

  • [Show abstract] [Hide abstract]
    ABSTRACT: For interactive TV (ITV) services in converged network, the DVB-based DTV and the IP-based IPTV coexist in a single dual mode set-top box (STB) and the traditional one-way DVB-CA cannot be adapted to the variation. In this paper, a simplified and secure conditional access scheme based on the simplified double layer is proposed to realize authentication and access control between servers and STBs. In this scheme, the advanced encryption standard (AES) and the common scramble algorithm (CSA) are combined to secure the ITV service and its entitled control message. The video fingerprint and legitimate watermark is used for the piracy tracking and the conditional playing. The elliptic curve based authentication algorithm is used for secure authentication. Under the tripartite participation, the service key access protocol is designed to dynamically update the service keys. The algorithm in the front-end, the algorithm in the STB client and the service key access protocol are proposed in detail. Through the test in an actual application environment and the analysis of security, the proposed conditional access system is very secure with high performance for high definition ITV service and large scale customers.
    Management and Service Science, 2009. MASS '09. International Conference on; 10/2009
  • [Show abstract] [Hide abstract]
    ABSTRACT: IPTV (Internet Protocol Television) is a very important field in the network development. Comparing to the traditional television, the IPTV combines the digital contents like media. The communication and the advertisement with the interaction serve into the emerging business model to provide the users to watch television service. Because the IPTV contains many merits; therefore, the world holds the high interest to develop of the IPTV. IPTV application scope is quite big, not only include wired and wireless, but also unify the telecommunication entrepreneur to provide the handset service, mobile device service and so on. It will be possible to affect the traditional television in the future, and even to displace it. If the user can use the IPTV effectively, it could be an enormous market. Generally, because the users' identities are easily exposed when Internet Protocol Television authenticate them, the best way to secure information security is to hide the identities of users. This paper will design the internet authentication system which is anonymous and secured. It can apply to solve the smart card duplication and the data resending attack problems. Session key and time-stamp of cryptography are used in the technique to achieve security and anonymous of the authentication process. Simultaneously, how to authenticate more efficiently by encryption in smart card authentication process is also our research objective. Further, this paper will contribute to how to build a security mechanism to prevent from the attacks. Based on those researches, this project plans to propose a new efficient and safe Internet Protocol Television. This new mechanism improves the security, efficiency and usability in the authentication process. More complete studies on Internet Protocol Television will be needed.