2008 IEEE International Symposium on Consumer Electronics 2008
DOI: 10.1109/isce.2008.4559437
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Integrated Conditional Access System (MICAS)

Abstract: Abstract-This paper presents design of a novel security architecture integrating mobile and broadcasting technologies in the Pay-TV system. The security architecture proposed herein is a state-of-theart solution to tackle well-known problems challenging current Pay-TV systems including but not limited to interoperability amongst service providers, relatively high cost of the service deployment, the security compromise, limited interactivity and bespoken services offered to subscribers. It also proposes the Fol… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2008
2008
2013
2013

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 12 publications
(7 reference statements)
0
3
0
Order By: Relevance
“…The mobile CA agent extracts the CW and sends it to the set-top box for content descrambling. 9) Security architecture (9): In this model, the CA message processing and content descrambling take place in the mobile phone. The content can be delivered to the mobile phone over either the mobile (i.e.…”
Section: ) Security Architecture (8)mentioning
confidence: 99%
See 1 more Smart Citation
“…The mobile CA agent extracts the CW and sends it to the set-top box for content descrambling. 9) Security architecture (9): In this model, the CA message processing and content descrambling take place in the mobile phone. The content can be delivered to the mobile phone over either the mobile (i.e.…”
Section: ) Security Architecture (8)mentioning
confidence: 99%
“…9 presents a static view of the interactive protocol stack used in the MICAS. Two ways of implementation can be considered in the MICAS: first, mobile centric [9] and second, set-top box centric implementations. In the former all the interactions are initiated from the mobile phone; as such the mobile phone presents the EPG-/ESG-like information and navigates the user to settle a specific request like sign-up request.…”
Section: Reference Model Implementationmentioning
confidence: 99%
“…This contribution, however, will be eventually added to the subscription fee for the liable subscribers. Therefore, the high subscription fee would discourage public to subscribe to TV services and consequently encourage them to illegally attempt to access to the contents, which would result in revenue loss for service provider [1].…”
Section: T II Analysis Of Current Systemmentioning
confidence: 99%