Knowledge (XXG)

Renewable security

Source 📝

25: 108:. This data consisted generally of the decoder's identity, the subscriber's identity number and subscription data. When the decoder was hacked, the whole system was effectively compromised as other subscriber identity data could be substituted and the hackers had control. This security model also more commonly known as the Embedded Secure Processor model as the secure processor, the microcontroller, was embedded in the decoder itself. 133:
system, the initial expectation was that the smartcards would be replaced every six months thus making the emergence of a pirate smartcard less likely. In reality, changing or upgrading the smartcards on a widely used TV Encryption system can be expensive and is done as infrequently as possible.
116:
The systems manufacturers countered with the Detachable Secure Processor model. In this security model, the decoder itself would not be the critical part of the system. The subscriber identity data and subscription details would be stored in a
96:
systems in the late 1980s. Simply stated, rather than completely replacing a hacked TV encryption system, only part of it would have to be replaced to make it secure again.
54: 191: 327: 121:- the Detachable Secure Processor. Any compromise of the smartcard could then be countered by issuing a new, more secure, smartcard to subscribers. 295: 184: 148: 76: 533: 387: 159: 160:
Digital Video Broadcasting (DVB);IP Datacast over DVB-H: Service Purchase and Protection Technical Standard ETSI TS 102 474
177: 347: 37: 253: 47: 41: 33: 129:
Renewable Security is good in theory. It provides hackers with a moving target rather than a stationary one. In the
240: 403: 258: 204: 58: 381: 273: 93: 200: 169: 225: 212: 143:
John McCormac. European Scrambling Systems 5 – The Black Book, Waterford University Press, 1996,
483: 459: 449: 411: 144: 300: 248: 154: 105: 104:
The decoders at that time often contained all of the conditional access control data in a
514: 488: 421: 527: 431: 510: 444: 439: 352: 322: 268: 493: 337: 317: 498: 360: 355: 305: 287: 283: 164: 130: 478: 220: 118: 365: 263: 342: 473: 332: 165:
Method for protecting the audio/visual data across the NRSS interface
468: 416: 312: 393: 92:
was a concept that evolved after the repeated hacks of analogue
173: 18: 458: 430: 402: 374: 282: 239: 211: 46:but its sources remain unclear because it lacks 185: 8: 155:National Renewable Security Standard CEA679 192: 178: 170: 77:Learn how and when to remove this message 7: 14: 23: 388:Advanced Access Content System 1: 125:Advantages and disadvantages 112:Detachable secure processor 550: 507: 259:Conditional-access module 226:Conditional access system 205:digital rights management 100:Embedded secure processor 32:This article includes a 382:Content Scramble System 61:more precise citations. 534:Television technology 201:Broadcast encryption 460:Analogue broadcast 375:Digital video disc 318:Irdeto Cryptoworks 231:Renewable security 213:Conditional access 90:Renewable Security 34:list of references 521: 520: 450:Pirate decryption 412:Authorized domain 87: 86: 79: 541: 301:Cisco Videoscape 249:Common Interface 194: 187: 180: 171: 82: 75: 71: 68: 62: 57:this article by 48:inline citations 27: 26: 19: 549: 548: 544: 543: 542: 540: 539: 538: 524: 523: 522: 517: 503: 454: 426: 398: 370: 278: 235: 207: 198: 140: 127: 114: 106:microcontroller 102: 83: 72: 66: 63: 52: 38:related reading 28: 24: 17: 12: 11: 5: 547: 545: 537: 536: 526: 525: 519: 518: 515:pay television 508: 505: 504: 502: 501: 496: 491: 486: 481: 476: 471: 465: 463: 456: 455: 453: 452: 447: 442: 436: 434: 428: 427: 425: 424: 422:Broadcast flag 419: 414: 408: 406: 400: 399: 397: 396: 391: 385: 378: 376: 372: 371: 369: 368: 363: 358: 350: 345: 340: 335: 330: 325: 320: 315: 310: 309: 308: 298: 292: 290: 280: 279: 277: 276: 271: 266: 261: 256: 251: 245: 243: 237: 236: 234: 233: 228: 223: 217: 215: 209: 208: 199: 197: 196: 189: 182: 174: 168: 167: 162: 157: 152: 139: 136: 126: 123: 113: 110: 101: 98: 85: 84: 42:external links 31: 29: 22: 15: 13: 10: 9: 6: 4: 3: 2: 546: 535: 532: 531: 529: 516: 512: 506: 500: 497: 495: 492: 490: 487: 485: 482: 480: 477: 475: 472: 470: 467: 466: 464: 461: 457: 451: 448: 446: 443: 441: 438: 437: 435: 433: 432:Data security 429: 423: 420: 418: 415: 413: 410: 409: 407: 405: 401: 395: 392: 389: 386: 383: 380: 379: 377: 373: 367: 364: 362: 359: 357: 354: 351: 349: 346: 344: 341: 339: 336: 334: 331: 329: 326: 324: 321: 319: 316: 314: 311: 307: 304: 303: 302: 299: 297: 294: 293: 291: 289: 285: 281: 275: 272: 270: 267: 265: 262: 260: 257: 255: 252: 250: 247: 246: 244: 242: 238: 232: 229: 227: 224: 222: 219: 218: 216: 214: 210: 206: 202: 195: 190: 188: 183: 181: 176: 175: 172: 166: 163: 161: 158: 156: 153: 150: 149:1-873556-22-5 146: 142: 141: 137: 135: 132: 124: 122: 120: 111: 109: 107: 99: 97: 95: 94:TV encryption 91: 81: 78: 70: 67:February 2012 60: 56: 50: 49: 43: 39: 35: 30: 21: 20: 511:free-to-view 440:Card sharing 230: 128: 115: 103: 89: 88: 73: 64: 53:Please help 45: 494:Videocipher 338:Nagravision 284:Smart cards 274:Syndication 59:introducing 499:VideoCrypt 361:Verimatrix 356:Mediaguard 323:Digicipher 306:VideoGuard 288:encryption 138:References 131:VideoCrypt 509:See also 489:Oak Orion 479:EuroCrypt 221:CableCARD 119:smartcard 528:Category 462:encoding 366:Viaccess 264:DVB-CPCM 343:PowerVu 55:improve 16:Concept 484:Leitch 474:CGMS-A 390:(AACS) 333:KeyFly 147:  469:B-MAC 417:B-CAS 384:(CSS) 313:Conax 40:, or 513:and 353:SECA 328:HDCP 296:BISS 286:and 203:and 145:ISBN 445:FTA 404:DRM 394:BD+ 348:RAS 269:FTV 254:CSA 241:DVB 530:: 44:, 36:, 193:e 186:t 179:v 151:. 80:) 74:( 69:) 65:( 51:.

Index

list of references
related reading
external links
inline citations
improve
introducing
Learn how and when to remove this message
TV encryption
microcontroller
smartcard
VideoCrypt
ISBN
1-873556-22-5
National Renewable Security Standard CEA679
Digital Video Broadcasting (DVB);IP Datacast over DVB-H: Service Purchase and Protection Technical Standard ETSI TS 102 474
Method for protecting the audio/visual data across the NRSS interface
v
t
e
Broadcast encryption
digital rights management
Conditional access
CableCARD
Conditional access system
Renewable security
DVB
Common Interface
CSA
Conditional-access module
DVB-CPCM

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.