Conditional Access System
#1

Definition
In recent years, broadcasting and information society services (IS services) have been making ever-increasing use of conditional access devices. This trend is expected to gather pace as the market for these services develops. The conditional access device (CA) provides the user with a technical facility which allows him to determine who has access to electronically-distributed services and under which conditions. In order to improve the legal situation of providers of broadcasting and IS services, the European Commission has recently drafted and adopted a Directive on the legal protection of services based on, or consisting of, conditional access (CAD)This Directive introduces a common standard of legal protection for conditional access devices. However, it focuses exclusively on conditional access devices that serve the remuneration interest of service providers and makes no provision for CA devices that serve other interests.

The traditional role of conditional access is to ensure that viewers see only those programs that they have paid to view. In the digital environment, conditional access has evolved far beyond this role. Today's conditional access systems still support traditional pay TV revenue generation. In addition they enable TV operators to create and protect a unique gateway to the enhanced TV experience - a world of interactive services, including home shopping, games, sports, interactive advertising, and pay-perview programming.
Using today's conditional access systems, you can target programming, advertisements, and promotions to subscribers by geographic area, by market segment, or according to subscribers' personal preferences.You can take advantage of conditional access features to implement flexible program packaging options and support new ways of generating revenue.

Conditional Access System (CAS) is defined as any technical measure and/or arrangement whereby access to the protected service in an intelligible form is made conditional upon prior individual authorization.

The definition of conditional access indicates the two key features of CA - the possibility:
- to exercise control over the access to a service or content which is transmitted electronically
- to control the conditions under which access is granted.

The main conditional access techniques which are currently supported are:
- password devices
- encryption devices.

Evaluating and filtering devices are also increasingly used in the Internet domain, mainly to prevent undesirable material from being delivered to minors, but also for other applications, such as the secure delivery of professional documents. " Push technologies" in the Internet domain could possibly also be assimilated into access control since, on the basis of this technology, content or material is sent only to selected receivers. In the longer term, devices based on biometrics will also be increasingly used to implement conditional access, particularly within the framework of banking services or any other activity, which involves authentication of users, certification of parties and integrity of data.

Fundamentals Of CAS
A conditional access system comprises a combination of scrambling and encryption to prevent unauthorized reception. Encryption is the process of protecting the secret keys that are transmitted with a scrambled signal to enable the descrambler to work. The scrambler key, called the control word must, of course, be sent to the receiver in encrypted form as an entitlement control message (ECM). The CA subsystem in the receiver will decrypt the control word only when authorized to do so; that authority is sent to the receiver in the form of an entitlement management message (EMM). This layered approach is fundamental to all proprietary CA systems in use today
Reply
#2
can u plz send me the seminar report on my email id....karan_vikesh[at]yahoo.co.in along with ppt if possible
Reply
#3
hey help me out with the seminar report , along with ppt on my email id anoop_dravid[at]yahoo.com thank you
Reply
#4
[attachment=1737]

INTRODUCTION
In recent years, broadcasting and information society services
(IS services) have been making ever-increasing use of conditional
access devices. This trend is expected to gather pace as the market
for these services develops. The conditional access device (CA)
provides the user with a technical facility which allows him to
determine who has access to electronically-distributed services and
under which conditions. In order to improve the legal situation of
providers of broadcasting and IS services, the European
Commission has recently drafted and adopted a Directive on the
legal protection of services based on, or consisting of, conditional
access (CAD)This Directive introduces a common standard of
legal protection for conditional access devices. However, it focuses
exclusively on conditional access devices that serve the
remuneration interest of service providers and makes no provision
for CA devices that serve other interests.
The traditional role of conditional access is to ensure that viewers
see only those programs that they have paid to view. In the digital
environment, conditional access has evolved far beyond this role.
Todayâ„¢s conditional access systems still support traditional pay TV
revenue generation. In addition they enable TV operators to create
and protect a unique gateway to the enhanced TV experience ” a
world of interactive services, including home shopping, games,
sports, interactive advertising, and pay-perview programming.
Using todayâ„¢s conditional access systems, you can target
programming, advertisements, and promotions to subscribers by
geographic area, by market segment, or according to subscribersâ„¢
personal preferences.You can take advantage of conditional access
features to implement flexible program packaging options and
support new ways of generating revenue.


What is CAS?
Conditional Access System (CAS) is defined as any technical
measure and/or arrangement whereby access to the protected
service in an intelligible form is made conditional upon prior
individual authorization.
The definition of conditional access indicates the two key features
of CA “ the possibility:
- to exercise control over the access to a service or content which is
transmitted electronically
- to control the conditions under which access is granted.
The main conditional access techniques which are currently
supported are:
- password devices
- encryption devices.
Evaluating and filtering devices are also increasingly used in the
Internet domain, mainly to prevent undesirable material from being
delivered to minors, but also for other applications, such as the
secure delivery of professional documents. « Push technologies» in
the Internet domain could possibly also be assimilated into access
control since, on the basis of this technology, content or material is
sent only to selected receivers. In the longer term, devices based on
biometrics will also be increasingly used to implement conditional
access, particularly within the framework of banking services or
any other activity which involves authentication of users,
certification of parties and integrity of data.


FUNDAMENTALS OF CAS
A conditional access system comprises a combination of
scrambling and encryption to prevent unauthorized reception.
Encryption is the process of protecting the secret keys that are
transmitted with a scrambled signal to enable the descrambler to
work. The scrambler key, called the control word must, of course,
be sent to the receiver in encrypted form as an entitlement control
message (ECM). The CA subsystem in the receiver will decrypt
the control word only when authorised to do so; that authority is
sent to the receiver in the form of an entitlement management
message (EMM). This layered approach is fundamental to all
proprietry CA systems in use today.
The system block schematic is shown below:
The control word is changed at intervals of 10 seconds, typically.
The ECM, sometimes called the multi-session key, is changed at
perhaps monthly intervals to avoid hackers gaining ground.

INTEROPERABILITY FOR CONDITIONAL
ACCESS
Currently, downloading interoperable applications into Set Top
Boxes (STBs) is receiving a lot of attention. Interoperability is
achieved by choosing a widely accepted language like Java
byte code, which can run on increasingly powerful
microprocessors now used in STBs. The mechanism that
implements application interoperability can be exploited to
achieve CA-STB interoperability. This will now be
discussed using two different approaches.
The first approach focuses on the communication between
an STB application and the CA security module (smart
card or PC card), inserted into the STB. The STB software
that implements this communication is made down loadable. The
standardized MultiCrypt approaches cover basic CA
interoperability (i.e. controlling access to scrambled services).
However, many STB applications need to consult the security
module (for example to determine the entitlements that the user has
bought), and this type of functionality is hardly covered by the
existing MultiCrypt modules. Interoperability between STB
applications and (standard) security modules can be
achieved by defining an API (Application Programming
Interface) that provides low-level access to the security
module. The interoperable CA sub-system (CASS)
software that implements access to the security module via
the API can then be downloaded and could be part of the
application. This approach to application-CA interoperability
is shown in Figure 2.


The second approach concerns the entire CASS of an STB.
The CASS uses the basic STB functions shown in Fig.1
(filtering ECMs and EMMs, accessing the CA security
module, writing control words to the descrambler, etc.).
The software that implements the CASS is interoperable
and made downloadable. This approach extends the idea of
MultiCrypt to all CA software in the STB, so that highly
standardized security modules are no longer needed. The
basic STB functions needed by the CA system are made
accessible to the downloaded CA software through APIs.
This approach to STB-CA interoperability is shown in
Figure 3.

CA-STB interoperability through downloading interoperable
software provides considerable advantages when
used in addition to (or instead of) the existing methods for
achieving interoperability.
The existing SimulCrypt approach requires that service
providers agree to use each otherâ„¢s STBs. Software
downloading on the other hand is a form of MultiCrypt,
and allows service providers to operate independently of
each other.
Simulcrypt allows two CA systems to work side by side,
transmitting separate entitlement messages to two separate types of
STU, with different CA systems. It also gives the multiplex
provider the opportunity to increase his viewer base by cooperating
with other multiplex operators. Technical simulcrypt is the same

thing but within a single multiplex, thus giving the multiplex
operator some leverage with the CA suppliers.
The simulcrypt system is shown diagramatically below. Note that
it requires cooperation between CA suppliers - something which
does not come naturally!
If a viewer wishes to receive services from different providers who
do not simulcrypt each other's ECMs, the only option is to acquire
separate decryption for each CA system. The Common Interface
enables a multicrypt environment, allowing an additional CA
system to be added as a module.

The existing MultiCrypt approaches require all parties to
agree on the details of the CA system that show up in the
interface between the STB and the CA security module.
This is not required if interoperable and downloaded
software accesses the security module via a low level API,
so that interoperability can be achieved with a high level of
functionality and flexibility.
Existing proprietary CA systems can be made interoperable
by using software downloading. The only requirements are
that the security module be of a standard type (as far as the
low-level communication with the STB is concerned) and
that a common scrambling algorithm be used if the
descrambler is in the STB (like the existing Common
Scrambling algorithm of DVB).
Current existing CA technologies consist basically of software or
data, codes, keys etc. designed to make the access to content or a
service conditional upon prior authorisation. Producers of CA
devices stated that nowadays the main focus of CA is on software
rather than hardware. Although the hardware of e.g. a smart card
itself provides some functionality, the 'device' may be realised in
software rather than in hardware. In particular in the field of IS
services, CAs are designed to run on a PC and therefore, in this
particular market segment, the design of CA is even exclusively
concentrated on software development.
Software can be adapted and could be designed to do different
things at different times. In technological terms, a single CA
system that would serve all kinds of reasons simultaneously or at
different times is not inconceivable. This may indicate that CA
devices are characterised by a functionality which is principally
independent of any particular purpose the device may ultimately
serve.


CONDITIONAL ACCESS DEVICES
For the broadcasting sector, a number of conditional access
systems currently co-exist in the European market (Viacess
(France Telekom), Mediaguard (Seca), Betacrypt (Betaresearch)
Among these, a selection of systems such as Mediaguard and
Viaccess dominate the market and are used by different service
providers throughout Europe. Some of these providers also
develop CA devices for the sector of IS services (e.g.
Betaresearch).
Reply
#5

[attachment=5527]
conditional access device (CA)

SEMINAR REPORT

In partial fulfillment of Requirements in
Degree of Bachelor of Technology
In
COMPUTER SCIENCE & ENGINEERING


SUBMITTED BY
Anju A.
Reg.No: 39019

Seminar Guide Head of the dept.
Ms. Liby Antony Ms. Sareena


INTRODUCTION

In recent years, broadcasting and information society services (IS services) have been making ever-increasing use of conditional access devices. This trend is expected to gather pace as the market for these services develops. The conditional access device (CA) provides the user with a technical facility which allows him to determine who has access to electronically-distributed services and under which conditions. In order to improve the legal situation of providers of broadcasting and IS services, the European Commission has recently drafted a Directive on the legal protection of services based on, or consisting of, conditional access (CAD)This Directive introduces a common standard of legal protection for conditional access devices. However, it focuses exclusively on CAD that serve the remuneration interest of service providers and makes no provision for CA devices that serve other interests.
The traditional role of conditional access is to ensure that viewers see only those programs that they have paid to view. In the digital environment, conditional access has evolved far beyond this role. In addition they enable TV operators to create and protect a unique gateway to the enhanced TV experience a world of interactive services. Using today’s conditional access systems, you can target programming, advertisements, and promotions to subscribers by geographic area, by market segment, or according to subscribers’ personal preferences. You can take advantage of conditional access features to implement flexible program packaging options and support new ways of generating revenue.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: authorisation, ja sig cas, conditional access system market share, how to access system administrator xp, access to, conditional access system with report, conditional monitorinng of transformer paper presentation,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Resistive random-access memory (RRAM) project topics 4 3,225 13-04-2017, 10:49 AM
Last Post: jaseela123d
  Direct Memory Access computer science crazy 2 3,704 29-01-2015, 02:00 AM
Last Post: Guest
  W-CDMA : Wideband Code-Division Multiple Access computer science crazy 3 4,121 20-09-2014, 07:21 PM
Last Post: seminar report asees
  WiMAX for Broadband Wireless Access full report seminar topics 7 7,329 07-10-2013, 09:02 PM
Last Post: Guest
  Layered Approach Using Conditional Random Fields for Intrusion Detection project report helper 11 7,751 01-03-2013, 11:58 AM
Last Post: [email protected]
Exclamation Internet Access via TV cable Network pritam 14 19,605 08-12-2012, 03:50 PM
Last Post: seminar details
Thumbs Down High Speed OFDM Packet Access (HSOPA) computer science crazy 2 10,428 08-12-2012, 02:44 PM
Last Post: seminar details
  High-Speed Downlink Packet Access (HSDPA) shibin.sree 1 9,166 08-12-2012, 02:44 PM
Last Post: seminar details
  High Speed Packet Access seminar surveyer 1 9,120 08-12-2012, 02:44 PM
Last Post: seminar details
  Wimax Broadband wireless access through 802 16 nit_cal 1 1,839 02-11-2012, 04:10 PM
Last Post: seminar details

Forum Jump: