Abstract
This paper describes concepts and principles for infrastructures that manage chargeable content, more commonly known as conditional access (CA) systems. We present a functional overview of CA systems and the security components and design principles that enable the solutions. We then present concepts that may be used to quantify the risk associated with the delivery of particular valued content in a particular way. Finally, we describe how the threat model changes as the networking bandwidth available to pirates and their customers increases, and propose a possible long-term solution.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
R. Anderson and M. Kuhn, “Low Cost Attacks on Tamper Resistant Devices,” 5th Security Protocols Workshop, Lecture Notes in Computer Sciences 1361, Springer-Verlag, 1997, pages 125–136.
International Business Machine. 1997. Cryptolope containers: A white paper.
J.L. Cohen, M.H. Etzel, D.W. Faucher, and D.N. Heer, “Security for Broadband Digital Networks,” Communications Technology, August 1995, pages 58–69.
‘Open Verifier’ Functionality in Consumer Electronics Devices, GD-T204, Release B, News Data Systems, Ltd.
ISO 7816 Identification Cards, Integrated Circuit Cards with Contact, 1987.
EIA-679, National Renewable Security Standard (NRSS) Parts A and B, March 1998.
D.M. Goldschlag and D.W. Kravitz, “Pirate Card Rejection,” Cardis 98,Louvain-la-Nueve, Belgium, September 14-16, 1998.
J.P.M.G. Linnartz, “The ‘Ticket’ Concept for Copy Control Based on Embedded Signalling,” ESORICS 98, Louvain-la-Nueve, Belgium, September 16-18, 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kravitz, D.W., Goldschlag, D.M. (1999). Conditional Access Concepts and Principles. In: Franklin, M. (eds) Financial Cryptography. FC 1999. Lecture Notes in Computer Science, vol 1648. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48390-X_12
Download citation
DOI: https://doi.org/10.1007/3-540-48390-X_12
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-66362-1
Online ISBN: 978-3-540-48390-8
eBook Packages: Springer Book Archive