Conference Paper

Achieving Interoperability in Conditional Access Systems through the Dynamic Download and Execution of Cryptographic Software for the IPTV System

U-Comput. Res. Group, Electron. & Telecommun. Res. Inst., Daejeon
DOI: 10.1109/ICCIT.2008.222 Conference: Convergence and Hybrid Information Technology, 2008. ICCIT '08. Third International Conference on, Volume: 2
Source: IEEE Xplore


An IPTV system that transmits multimedia contents through the IP network needs to adopt a conditional access system allowing the only entitled subscribers to view the premium content as other pay-TV systems do. Although several standard specifications have been published for interoperable models of conditional access systems, the proposed models are based on the unidirectional or restricted bidirectional broadcasting network and do not utilize the characteristics of the IP network. However, software download scheme through the bidirectional IP network enables it to change existing conditional access systems in a secure way. This paper introduces an interoperable conditional access system that can update any cryptographic software provided by different conditional access system vendors through downloading and executing dynamically the downloaded conditional access software only if the software follows the pre-defined interfaces.

24 Reads
  • [Show abstract] [Hide abstract]
    ABSTRACT: For interactive TV (ITV) services in converged network, the DVB-based DTV and the IP-based IPTV coexist in a single dual mode set-top box (STB) and the traditional one-way DVB-CA cannot be adapted to the variation. In this paper, a simplified and secure conditional access scheme based on the simplified double layer is proposed to realize authentication and access control between servers and STBs. In this scheme, the advanced encryption standard (AES) and the common scramble algorithm (CSA) are combined to secure the ITV service and its entitled control message. The video fingerprint and legitimate watermark is used for the piracy tracking and the conditional playing. The elliptic curve based authentication algorithm is used for secure authentication. Under the tripartite participation, the service key access protocol is designed to dynamically update the service keys. The algorithm in the front-end, the algorithm in the STB client and the service key access protocol are proposed in detail. Through the test in an actual application environment and the analysis of security, the proposed conditional access system is very secure with high performance for high definition ITV service and large scale customers.
    No preview · Conference Paper · Oct 2009
  • [Show abstract] [Hide abstract]
    ABSTRACT: IPTV (Internet Protocol Television) is a very important field in the network development. Comparing to the traditional television, the IPTV combines the digital contents like media. The communication and the advertisement with the interaction serve into the emerging business model to provide the users to watch television service. Because the IPTV contains many merits; therefore, the world holds the high interest to develop of the IPTV. IPTV application scope is quite big, not only include wired and wireless, but also unify the telecommunication entrepreneur to provide the handset service, mobile device service and so on. It will be possible to affect the traditional television in the future, and even to displace it. If the user can use the IPTV effectively, it could be an enormous market. Generally, because the users' identities are easily exposed when Internet Protocol Television authenticate them, the best way to secure information security is to hide the identities of users. This paper will design the internet authentication system which is anonymous and secured. It can apply to solve the smart card duplication and the data resending attack problems. Session key and time-stamp of cryptography are used in the technique to achieve security and anonymous of the authentication process. Simultaneously, how to authenticate more efficiently by encryption in smart card authentication process is also our research objective. Further, this paper will contribute to how to build a security mechanism to prevent from the attacks. Based on those researches, this project plans to propose a new efficient and safe Internet Protocol Television. This new mechanism improves the security, efficiency and usability in the authentication process. More complete studies on Internet Protocol Television will be needed.
    No preview · Conference Paper · Sep 2011
  • [Show abstract] [Hide abstract]
    ABSTRACT: As information technology continuously progresses, more applied technologies are developed, such as radio frequency identification (RFID). In this paper, we propose a novel digital television (DTV) structure that uses RFID for encryption. RFID is widely used for various applications because of its advantages such as an extended lifetime and security, and it is less affected by environmental constraints. The proposed protocol uses RFID for encryption to withstand many attacks that the traditional system is vulnerable to, such as impersonation attack, replay attack and smart card cloning. Compared with other protocols, the proposed protocol is more secure and efficient. Thus, our proposed protocol makes the DTV framework more complete and secure.
    No preview · Article · Nov 2013 · Telecommunication Systems