Achieving interoperability in conditional access systems through the dynamic download and execution of cryptographic software for the IPTV system

Jinyoung Moon, Jungtae Kim, Jongyoul Park, Euihyun Paik

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations

Abstract

An IPTV system that transmits multimedia contents through the IP network needs to adopt a conditional access system allowing the only entitled subscribers to view the premium content as other Pay-TV systems do. Although several standard specifications have been published for interoperable models of conditional access systems, the proposed models are based on the unidirectional or restricted bidirectional broadcasting network and do not utilize the characteristics of the IP network. However, software download scheme through the bidirectional IP network enables it to change existing conditional access systems in a secure way. This paper introduces an interoperable conditional access system that can update any cryptographic software provided by different conditional access system vendors through downloading and executing dynamically the downloaded conditional access software only if the software follows the pre-defined interfaces.

Original languageEnglish
Title of host publicationProceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008
Pages380-385
Number of pages6
DOIs
StatePublished - 2008
Event3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008 - Busan, Korea, Republic of
Duration: 11 Nov 200813 Nov 2008

Publication series

NameProceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008
Volume2

Conference

Conference3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008
Country/TerritoryKorea, Republic of
CityBusan
Period11/11/0813/11/08

Fingerprint

Dive into the research topics of 'Achieving interoperability in conditional access systems through the dynamic download and execution of cryptographic software for the IPTV system'. Together they form a unique fingerprint.

Cite this