25:
108:. This data consisted generally of the decoder's identity, the subscriber's identity number and subscription data. When the decoder was hacked, the whole system was effectively compromised as other subscriber identity data could be substituted and the hackers had control. This security model also more commonly known as the Embedded Secure Processor model as the secure processor, the microcontroller, was embedded in the decoder itself.
133:
system, the initial expectation was that the smartcards would be replaced every six months thus making the emergence of a pirate smartcard less likely. In reality, changing or upgrading the smartcards on a widely used TV Encryption system can be expensive and is done as infrequently as possible.
116:
The systems manufacturers countered with the
Detachable Secure Processor model. In this security model, the decoder itself would not be the critical part of the system. The subscriber identity data and subscription details would be stored in a
96:
systems in the late 1980s. Simply stated, rather than completely replacing a hacked TV encryption system, only part of it would have to be replaced to make it secure again.
54:
191:
327:
121:- the Detachable Secure Processor. Any compromise of the smartcard could then be countered by issuing a new, more secure, smartcard to subscribers.
295:
184:
148:
76:
533:
387:
159:
160:
Digital Video
Broadcasting (DVB);IP Datacast over DVB-H: Service Purchase and Protection Technical Standard ETSI TS 102 474
177:
347:
37:
253:
47:
41:
33:
129:
Renewable
Security is good in theory. It provides hackers with a moving target rather than a stationary one. In the
240:
403:
258:
204:
58:
381:
273:
93:
200:
169:
225:
212:
143:
John McCormac. European
Scrambling Systems 5 – The Black Book, Waterford University Press, 1996,
483:
459:
449:
411:
144:
300:
248:
154:
105:
104:
The decoders at that time often contained all of the conditional access control data in a
514:
488:
421:
527:
431:
510:
444:
439:
352:
322:
268:
493:
337:
317:
498:
360:
355:
305:
287:
283:
164:
130:
478:
220:
118:
365:
263:
342:
473:
332:
165:
Method for protecting the audio/visual data across the NRSS interface
468:
416:
312:
393:
92:
was a concept that evolved after the repeated hacks of analogue
173:
18:
458:
430:
402:
374:
282:
239:
211:
46:but its sources remain unclear because it lacks
185:
8:
155:National Renewable Security Standard CEA679
192:
178:
170:
77:Learn how and when to remove this message
7:
14:
23:
388:Advanced Access Content System
1:
125:Advantages and disadvantages
112:Detachable secure processor
550:
507:
259:Conditional-access module
226:Conditional access system
205:digital rights management
100:Embedded secure processor
32:This article includes a
382:Content Scramble System
61:more precise citations.
534:Television technology
201:Broadcast encryption
460:Analogue broadcast
375:Digital video disc
318:Irdeto Cryptoworks
231:Renewable security
213:Conditional access
90:Renewable Security
34:list of references
521:
520:
450:Pirate decryption
412:Authorized domain
87:
86:
79:
541:
301:Cisco Videoscape
249:Common Interface
194:
187:
180:
171:
82:
75:
71:
68:
62:
57:this article by
48:inline citations
27:
26:
19:
549:
548:
544:
543:
542:
540:
539:
538:
524:
523:
522:
517:
503:
454:
426:
398:
370:
278:
235:
207:
198:
140:
127:
114:
106:microcontroller
102:
83:
72:
66:
63:
52:
38:related reading
28:
24:
17:
12:
11:
5:
547:
545:
537:
536:
526:
525:
519:
518:
515:pay television
508:
505:
504:
502:
501:
496:
491:
486:
481:
476:
471:
465:
463:
456:
455:
453:
452:
447:
442:
436:
434:
428:
427:
425:
424:
422:Broadcast flag
419:
414:
408:
406:
400:
399:
397:
396:
391:
385:
378:
376:
372:
371:
369:
368:
363:
358:
350:
345:
340:
335:
330:
325:
320:
315:
310:
309:
308:
298:
292:
290:
280:
279:
277:
276:
271:
266:
261:
256:
251:
245:
243:
237:
236:
234:
233:
228:
223:
217:
215:
209:
208:
199:
197:
196:
189:
182:
174:
168:
167:
162:
157:
152:
139:
136:
126:
123:
113:
110:
101:
98:
85:
84:
42:external links
31:
29:
22:
15:
13:
10:
9:
6:
4:
3:
2:
546:
535:
532:
531:
529:
516:
512:
506:
500:
497:
495:
492:
490:
487:
485:
482:
480:
477:
475:
472:
470:
467:
466:
464:
461:
457:
451:
448:
446:
443:
441:
438:
437:
435:
433:
432:Data security
429:
423:
420:
418:
415:
413:
410:
409:
407:
405:
401:
395:
392:
389:
386:
383:
380:
379:
377:
373:
367:
364:
362:
359:
357:
354:
351:
349:
346:
344:
341:
339:
336:
334:
331:
329:
326:
324:
321:
319:
316:
314:
311:
307:
304:
303:
302:
299:
297:
294:
293:
291:
289:
285:
281:
275:
272:
270:
267:
265:
262:
260:
257:
255:
252:
250:
247:
246:
244:
242:
238:
232:
229:
227:
224:
222:
219:
218:
216:
214:
210:
206:
202:
195:
190:
188:
183:
181:
176:
175:
172:
166:
163:
161:
158:
156:
153:
150:
149:1-873556-22-5
146:
142:
141:
137:
135:
132:
124:
122:
120:
111:
109:
107:
99:
97:
95:
94:TV encryption
91:
81:
78:
70:
67:February 2012
60:
56:
50:
49:
43:
39:
35:
30:
21:
20:
511:free-to-view
440:Card sharing
230:
128:
115:
103:
89:
88:
73:
64:
53:Please help
45:
494:Videocipher
338:Nagravision
284:Smart cards
274:Syndication
59:introducing
499:VideoCrypt
361:Verimatrix
356:Mediaguard
323:Digicipher
306:VideoGuard
288:encryption
138:References
131:VideoCrypt
509:See also
489:Oak Orion
479:EuroCrypt
221:CableCARD
119:smartcard
528:Category
462:encoding
366:Viaccess
264:DVB-CPCM
343:PowerVu
55:improve
16:Concept
484:Leitch
474:CGMS-A
390:(AACS)
333:KeyFly
147:
469:B-MAC
417:B-CAS
384:(CSS)
313:Conax
40:, or
513:and
353:SECA
328:HDCP
296:BISS
286:and
203:and
145:ISBN
445:FTA
404:DRM
394:BD+
348:RAS
269:FTV
254:CSA
241:DVB
530::
44:,
36:,
193:e
186:t
179:v
151:.
80:)
74:(
69:)
65:(
51:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.