Conditional Access System
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science crazy
Super Moderator
******

Posts: 3,048
Joined: Dec 2008
#1
22-09-2008, 10:46 AM


Definition
In recent years, broadcasting and information society services (IS services) have been making ever-increasing use of conditional access devices. This trend is expected to gather pace as the market for these services develops. The conditional access device (CA) provides the user with a technical facility which allows him to determine who has access to electronically-distributed services and under which conditions. In order to improve the legal situation of providers of broadcasting and IS services, the European Commission has recently drafted and adopted a Directive on the legal protection of services based on, or consisting of, conditional access (CAD)This Directive introduces a common standard of legal protection for conditional access devices. However, it focuses exclusively on conditional access devices that serve the remuneration interest of service providers and makes no provision for CA devices that serve other interests.

The traditional role of conditional access is to ensure that viewers see only those programs that they have paid to view. In the digital environment, conditional access has evolved far beyond this role. Today's conditional access systems still support traditional pay TV revenue generation. In addition they enable TV operators to create and protect a unique gateway to the enhanced TV experience - a world of interactive services, including home shopping, games, sports, interactive advertising, and pay-perview programming.
Using today's conditional access systems, you can target programming, advertisements, and promotions to subscribers by geographic area, by market segment, or according to subscribers' personal preferences.You can take advantage of conditional access features to implement flexible program packaging options and support new ways of generating revenue.

Conditional Access System (CAS) is defined as any technical measure and/or arrangement whereby access to the protected service in an intelligible form is made conditional upon prior individual authorization.

The definition of conditional access indicates the two key features of CA - the possibility:
- to exercise control over the access to a service or content which is transmitted electronically
- to control the conditions under which access is granted.

The main conditional access techniques which are currently supported are:
- password devices
- encryption devices.

Evaluating and filtering devices are also increasingly used in the Internet domain, mainly to prevent undesirable material from being delivered to minors, but also for other applications, such as the secure delivery of professional documents. " Push technologies" in the Internet domain could possibly also be assimilated into access control since, on the basis of this technology, content or material is sent only to selected receivers. In the longer term, devices based on biometrics will also be increasingly used to implement conditional access, particularly within the framework of banking services or any other activity, which involves authentication of users, certification of parties and integrity of data.

Fundamentals Of CAS
A conditional access system comprises a combination of scrambling and encryption to prevent unauthorized reception. Encryption is the process of protecting the secret keys that are transmitted with a scrambled signal to enable the descrambler to work. The scrambler key, called the control word must, of course, be sent to the receiver in encrypted form as an entitlement control message (ECM). The CA subsystem in the receiver will decrypt the control word only when authorized to do so; that authority is sent to the receiver in the form of an entitlement management message (EMM). This layered approach is fundamental to all proprietary CA systems in use today
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
karan_vikesh
Active In SP
**

Posts: 1
Joined: Jul 2009
#2
19-07-2009, 08:32 PM

can u plz send me the seminar and presentation report on my email id....karan_vikesh@yahoo.co.in along with ppt if possible
Reply
durgai
Active In SP
**

Posts: 2
Joined: Jan 2010
#3
04-02-2010, 11:28 PM

hey help me out with the seminar and presentation report , along with ppt on my email id anoop_dravid@yahoo.com thank you
Reply
project report tiger
Active In SP
**

Posts: 1,062
Joined: Feb 2010
#4
04-02-2010, 11:45 PM


.pdf   conditional Access System.pdf (Size: 129.77 KB / Downloads: 107)

INTRODUCTION
In recent years, broadcasting and information society services
(IS services) have been making ever-increasing use of conditional
access devices. This trend is expected to gather pace as the market
for these services develops. The conditional access device (CA)
provides the user with a technical facility which allows him to
determine who has access to electronically-distributed services and
under which conditions. In order to improve the legal situation of
providers of broadcasting and IS services, the European
Commission has recently drafted and adopted a Directive on the
legal protection of services based on, or consisting of, conditional
access (CAD)This Directive introduces a common standard of
legal protection for conditional access devices. However, it focuses
exclusively on conditional access devices that serve the
remuneration interest of service providers and makes no provision
for CA devices that serve other interests.
The traditional role of conditional access is to ensure that viewers
see only those programs that they have paid to view. In the digital
environment, conditional access has evolved far beyond this role.
Todayâ„¢s conditional access systems still support traditional pay TV
revenue generation. In addition they enable TV operators to create
and protect a unique gateway to the enhanced TV experience ” a
world of interactive services, including home shopping, games,
sports, interactive advertising, and pay-perview programming.
Using todayâ„¢s conditional access systems, you can target
programming, advertisements, and promotions to subscribers by
geographic area, by market segment, or according to subscribersâ„¢
personal preferences.You can take advantage of conditional access
features to implement flexible program packaging options and
support new ways of generating revenue.


What is CAS?
Conditional Access System (CAS) is defined as any technical
measure and/or arrangement whereby access to the protected
service in an intelligible form is made conditional upon prior
individual authorization.
The definition of conditional access indicates the two key features
of CA “ the possibility:
- to exercise control over the access to a service or content which is
transmitted electronically
- to control the conditions under which access is granted.
The main conditional access techniques which are currently
supported are:
- password devices
- encryption devices.
Evaluating and filtering devices are also increasingly used in the
Internet domain, mainly to prevent undesirable material from being
delivered to minors, but also for other applications, such as the
secure delivery of professional documents. « Push technologies» in
the Internet domain could possibly also be assimilated into access
control since, on the basis of this technology, content or material is
sent only to selected receivers. In the longer term, devices based on
biometrics will also be increasingly used to implement conditional
access, particularly within the framework of banking services or
any other activity which involves authentication of users,
certification of parties and integrity of data.


FUNDAMENTALS OF CAS
A conditional access system comprises a combination of
scrambling and encryption to prevent unauthorized reception.
Encryption is the process of protecting the secret keys that are
transmitted with a scrambled signal to enable the descrambler to
work. The scrambler key, called the control word must, of course,
be sent to the receiver in encrypted form as an entitlement control
message (ECM). The CA subsystem in the receiver will decrypt
the control word only when authorised to do so; that authority is
sent to the receiver in the form of an entitlement management
message (EMM). This layered approach is fundamental to all
proprietry CA systems in use today.
The system block schematic is shown below:
The control word is changed at intervals of 10 seconds, typically.
The ECM, sometimes called the multi-session key, is changed at
perhaps monthly intervals to avoid hackers gaining ground.

INTEROPERABILITY FOR CONDITIONAL
ACCESS
Currently, downloading interoperable applications into Set Top
Boxes (STBs) is receiving a lot of attention. Interoperability is
achieved by choosing a widely accepted language like Java
byte code, which can run on increasingly powerful
microprocessors now used in STBs. The mechanism that
implements application interoperability can be exploited to
achieve CA-STB interoperability. This will now be
discussed using two different approaches.
The first approach focuses on the communication between
an STB application and the CA security module (smart
card or PC card), inserted into the STB. The STB software
that implements this communication is made down loadable. The
standardized MultiCrypt approaches cover basic CA
interoperability (i.e. controlling access to scrambled services).
However, many STB applications need to consult the security
module (for example to determine the entitlements that the user has
bought), and this type of functionality is hardly covered by the
existing MultiCrypt modules. Interoperability between STB
applications and (standard) security modules can be
achieved by defining an API (Application Programming
Interface) that provides low-level access to the security
module. The interoperable CA sub-system (CASS)
software that implements access to the security module via
the API can then be downloaded and could be part of the
application. This approach to application-CA interoperability
is shown in Figure 2.


The second approach concerns the entire CASS of an STB.
The CASS uses the basic STB functions shown in Fig.1
(filtering ECMs and EMMs, accessing the CA security
module, writing control words to the descrambler, etc.).
The software that implements the CASS is interoperable
and made downloadable. This approach extends the idea of
MultiCrypt to all CA software in the STB, so that highly
standardized security modules are no longer needed. The
basic STB functions needed by the CA system are made
accessible to the downloaded CA software through APIs.
This approach to STB-CA interoperability is shown in
Figure 3.

CA-STB interoperability through downloading interoperable
software provides considerable advantages when
used in addition to (or instead of) the existing methods for
achieving interoperability.
The existing SimulCrypt approach requires that service
providers agree to use each otherâ„¢s STBs. Software
downloading on the other hand is a form of MultiCrypt,
and allows service providers to operate independently of
each other.
Simulcrypt allows two CA systems to work side by side,
transmitting separate entitlement messages to two separate types of
STU, with different CA systems. It also gives the multiplex
provider the opportunity to increase his viewer base by cooperating
with other multiplex operators. Technical simulcrypt is the same

thing but within a single multiplex, thus giving the multiplex
operator some leverage with the CA suppliers.
The simulcrypt system is shown diagramatically below. Note that
it requires cooperation between CA suppliers - something which
does not come naturally!
If a viewer wishes to receive services from different providers who
do not simulcrypt each other's ECMs, the only option is to acquire
separate decryption for each CA system. The Common Interface
enables a multicrypt environment, allowing an additional CA
system to be added as a module.

The existing MultiCrypt approaches require all parties to
agree on the details of the CA system that show up in the
interface between the STB and the CA security module.
This is not required if interoperable and downloaded
software accesses the security module via a low level API,
so that interoperability can be achieved with a high level of
functionality and flexibility.
Existing proprietary CA systems can be made interoperable
by using software downloading. The only requirements are
that the security module be of a standard type (as far as the
low-level communication with the STB is concerned) and
that a common scrambling algorithm be used if the
descrambler is in the STB (like the existing Common
Scrambling algorithm of DVB).
Current existing CA technologies consist basically of software or
data, codes, keys etc. designed to make the access to content or a
service conditional upon prior authorisation. Producers of CA
devices stated that nowadays the main focus of CA is on software
rather than hardware. Although the hardware of e.g. a smart card
itself provides some functionality, the 'device' may be realised in
software rather than in hardware. In particular in the field of IS
services, CAs are designed to run on a PC and therefore, in this
particular market segment, the design of CA is even exclusively
concentrated on software development.
Software can be adapted and could be designed to do different
things at different times. In technological terms, a single CA
system that would serve all kinds of reasons simultaneously or at
different times is not inconceivable. This may indicate that CA
devices are characterised by a functionality which is principally
independent of any particular purpose the device may ultimately
serve.


CONDITIONAL ACCESS DEVICES
For the broadcasting sector, a number of conditional access
systems currently co-exist in the European market (Viacess
(France Telekom), Mediaguard (Seca), Betacrypt (Betaresearch)
Among these, a selection of systems such as Mediaguard and
Viaccess dominate the market and are used by different service
providers throughout Europe. Some of these providers also
develop CA devices for the sector of IS services (e.g.
Betaresearch).
Reply
project report helper
Active In SP
**

Posts: 2,270
Joined: Sep 2010
#5
09-10-2010, 02:59 PM


.zip   seminaaar.zip (Size: 2.33 MB / Downloads: 50)
conditional access device (CA)

SEMINAR REPORT

In partial fulfillment of Requirements in
Degree of Bachelor of Technology
In
COMPUTER SCIENCE & ENGINEERING


SUBMITTED BY
Anju A.
Reg.No: 39019

Seminar Guide Head of the dept.
Ms. Liby Antony Ms. Sareena


INTRODUCTION

In recent years, broadcasting and information society services (IS services) have been making ever-increasing use of conditional access devices. This trend is expected to gather pace as the market for these services develops. The conditional access device (CA) provides the user with a technical facility which allows him to determine who has access to electronically-distributed services and under which conditions. In order to improve the legal situation of providers of broadcasting and IS services, the European Commission has recently drafted a Directive on the legal protection of services based on, or consisting of, conditional access (CAD)This Directive introduces a common standard of legal protection for conditional access devices. However, it focuses exclusively on CAD that serve the remuneration interest of service providers and makes no provision for CA devices that serve other interests.
The traditional role of conditional access is to ensure that viewers see only those programs that they have paid to view. In the digital environment, conditional access has evolved far beyond this role. In addition they enable TV operators to create and protect a unique gateway to the enhanced TV experience a world of interactive services. Using today’s conditional access systems, you can target programming, advertisements, and promotions to subscribers by geographic area, by market segment, or according to subscribers’ personal preferences. You can take advantage of conditional access features to implement flexible program packaging options and support new ways of generating revenue.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
Video Random Access Memory ( Download Full Seminar Report ) computer science crazy 2 2,392 10-05-2014, 09:44 AM
Last Post: seminar project topic
  Fuzzy MLS: An Experiment on Quantified Risk– Adaptive Access Control seminar projects maker 0 358 30-09-2013, 04:23 PM
Last Post: seminar projects maker
  performance analysis of data access monitoring in cloud ppt seminar projects maker 0 378 12-09-2013, 12:43 PM
Last Post: seminar projects maker
  Detection of Movements of Head and Mouth to Provide Computer Access for Disabled pdf study tips 0 332 09-09-2013, 03:42 PM
Last Post: study tips
  generic access network full report computer science technology 4 4,893 05-09-2013, 10:29 AM
Last Post: study tips
  Code Division Multiple Access for Wireless Communications pdf study tips 0 332 26-06-2013, 01:05 PM
Last Post: study tips
  An Online Data Access Prediction and Optimization Approach for Distributed pdf study tips 0 332 24-06-2013, 03:29 PM
Last Post: study tips
  The Case for Non-cooperative Multihoming of Users to Access Points in IEEE 802.11 study tips 0 281 10-06-2013, 03:57 PM
Last Post: study tips
  Report on BroadbandWireless Access study tips 0 270 28-05-2013, 03:30 PM
Last Post: study tips
  Delivering the promise of improved Access, Coverage and Teledensity in India study tips 0 318 19-04-2013, 03:45 PM
Last Post: study tips