Conditional Access Concepts and Principles
This paper describes concepts and principles for infrastructures that manage chargeable content, more commonly known as conditional access (CA) systems. We present a functional overview of CA systems and the security components and design principles that enable the solutions. We then present concepts that may be used to quantify the risk associated with the delivery of particular valued content in a particular way. Finally, we describe how the threat model changes as the networking bandwidth available to pirates and their customers increases, and propose a possible long-term solution.
KeywordsAuditability authentication conditional access copyright protection smart cards trust management
Unable to display preview. Download preview PDF.
- 2.International Business Machine. 1997. Cryptolope containers: A white paper.Google Scholar
- 3.J.L. Cohen, M.H. Etzel, D.W. Faucher, and D.N. Heer, “Security for Broadband Digital Networks,” Communications Technology, August 1995, pages 58–69.Google Scholar
- 4.‘Open Verifier’ Functionality in Consumer Electronics Devices, GD-T204, Release B, News Data Systems, Ltd.Google Scholar
- 5.ISO 7816 Identification Cards, Integrated Circuit Cards with Contact, 1987.Google Scholar
- 6.EIA-679, National Renewable Security Standard (NRSS) Parts A and B, March 1998.Google Scholar
- 7.D.M. Goldschlag and D.W. Kravitz, “Pirate Card Rejection,” Cardis 98,Louvain-la-Nueve, Belgium, September 14-16, 1998.Google Scholar
- 8.J.P.M.G. Linnartz, “The ‘Ticket’ Concept for Copy Control Based on Embedded Signalling,” ESORICS 98, Louvain-la-Nueve, Belgium, September 16-18, 1998.Google Scholar