• Title/Summary/Keyword: conditional access system

Search Result 76, Processing Time 0.026 seconds

The Scheme for Delegation of Temporary Right to Watching Pay-TV in N-Screen Service (유료 콘텐츠의 N-스크린 서비스를 위한 일시적 시청권한 위임 기법)

  • Kim, Jung-Hoon;Lee, Hoon-Jung;Kim, Sang-Jin;Oh, Hee-Kuck
    • The KIPS Transactions:PartC
    • /
    • v.18C no.3
    • /
    • pp.135-142
    • /
    • 2011
  • Recently, the strategy for N-screen service is in the spotlight along with the consumer's need to use contents regardless of time and place due to the rapid development of communication technology, which is meshing with the desire of service providers seeking a new business model. N-screen, as a screen-extension-concept service which enables consumers to continuously share and use contents in various equipments such as TV, computer and portable terminals, is an advanced type of 3-screen service strategy initially proposed by AT&T, an American telecommunication company. In the N-screen service for pay-contents, in order to support continuous screen changes to and from various equipments, temporary watching right should be given to the equipment intended for screen change. However, it is impossible to give the temporary watching right in the present broadcasting environment, adopting an access-control system. In this paper, the access-control technology being used for pay-contents in the present broadcasting environment and the reason for not being able to give temporary watching right, will be examined. After the examination, the solution for delegation of watching right by using an additional key on the basis of currently used access-control technology, will be proposed.

An Authentication Protocol Supporting User Device Mobility in CAS-Based IPTV Environments (CAS 시스템 기반의 IPTV 환경에서 사용자 단말 이동성 지원을 위한 인증 프로토콜)

  • Roh, Hyo-Sun;Jung, Seo-Hyun;Yi, Jeong-Hyun;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.302-312
    • /
    • 2010
  • Internet Protocol Television (IPTV) service is the convergence service of the telecommunication and broadcasting that provides various bidirectional multimedia contents by IPTV service subscribe's request through the high-speed internet. However, the proposed technologies current do not guarantee the security such as authentication between Set-Top-Box (STB) and the user mobile devices available IPTV service at home domain, and authentication of mobile user device at out of door. This paper proposes the authentication protocol for distributing content securely from STB to the users' mobile devices at home domain and authentication for network access and IPTV service access when the user's mobile device is moved out of the house. The proposed scheme using the proxy signature enables to distribute and protect securely the contents protected through an underlying Conditional Access System (CAS) without re-encrypting then that the existing scheme should employ. Then this protocol supports the authentication scheme to get service access authentication based on network access authentication using the signature, which the STB issued on behalf of the trust authority of IPTV service provider. Also the proposed authentication protocol reduces the total communication overhead and computation time comparing to the other authentication protocol.

IPTV User Authentication using Single-Sign-On (Single-Sign-On을 이용한 IPTV 사용자 인증방안)

  • Kim, Kang;Jeong, J.I.;Song, S.H.;Shin, D.K.;Shin, D.I.
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10c
    • /
    • pp.540-543
    • /
    • 2006
  • DTV는 방송 서비스 운영에 가입자 개념을 추가하여 무료방송 외에 정당한 수신료를 지불하는 사람만이 프로그램을 시청할 수 있도록 하며, 그러한 수익을 이용하여 보다 양질의 서비스를 제공할 수 있게 되었다. 가입자간의 구분을 가능하게 해주기 위한 방법이 제한수신시스템(CAS: Conditional Access System)이다. IPTV는 웹 브라우저를 기반으로 동작하며, 방송 콘텐츠라는 기본 TV기능에서 벗어나 T-commerce, E-commerce 등의 다른 도메인으로 사용자의 요구에 따라 자유롭게 이동하며 사용자인증이 요구되기 때문에 기존의 제한수신시스템으로는 그 기능을 다 하기 힘들어졌다. Single-Sign-On은 사용자가 단한번의 인증을 통하여 추가적으로 인증할 필요가 있는 다른 서비스로의 자동적인 인증을 제공한다. 다수의 사용자가 다수의 서비스를 제공받기를 원하는 IPTV환경에서는 단순한 사용자 인증과 접근제어의 기능을 가진 제한수신시스템과 빈번한 사용자인증의 번거로움을 해결할 수 있는 편의성을 제공하는 SSO의 융합은 필연적이라 할 수 있다. 그러므로 Single-Sign-On은 사용자의 요구에 따라 이동하기 쉬운 IPTV 환경에 매우 적합하다. 이 논문에서는 제한수신시스템, SSO, IPTV에 대해 설명하고 제한수신시스템과 SSO의 기능을 통합하여 IPTV환경에 적합한 새로운 인증방안을 제안한다.

  • PDF

A Study on Weaknesses of Sun et al.'s Conditional Access System in Pay-TV Broadcasting Systems (Pay-TV 방송 시스템을 위한 Sun 등이 제안한 접근제어 시스템의 취약점 분석에 관한 연구)

  • Kim, Jung-Yoon;Kang, Seong-Yong;Jang, Hak-Beom;Choi, Hyoung-Kee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.808-811
    • /
    • 2011
  • Sun 등은 pay-TV 를 위한 새로운 접근제어 모델을 제안하였다. 그들의 모델은 서비스 제공자와 사용자 간의 형평성 (fairness)을 보장하고, 사용자에게 편의 (convenience)를 제공한다. 또한, Sun 등은 그들이 제안한 접근제어 모델을 지원하기 위한 새로운 접근제어 시스템을 제안하였다. 그들이 제안한 시스템은 대규모 그룹에도 적용할 수 있도록 확장 가능한 (scalable) 키 관리를 수행한다. 그러나 그들의 시스템은 pay-TV 의 핵심 보안 요구사항인 후방향 안전성 및 전방향 안전성(backward/forward secrecy)을 만족하지 못할 뿐 아니라, 공모 공격 (collusion attack)에 대한 취약점이 존재하고, 공격에 대한 낮은 복원 능력 (poor reparability)을 갖는다. 본 논문에서는 공격 시나리오를 통해 Sun 등이 제안한 시스템의 보안 문제점을 분석하고 그 결과를 제시한다.

Enhanced Internet Group Management Protocol for Pay-TV Service in IP Network (인터넷 기반의 유료 방송에서 IGMP를 개선한 그룹 관리 기법)

  • Kim, Jung-Hoon;Lee, Hoon-Jung;Kim, Sang-Jin;Oh, Hee-Kuck
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.927-930
    • /
    • 2011
  • 위성이나 케이블을 통해서 이루어지던 유료 방송 서비스가 최근에는 IPTV 라는 이름 아래 인터넷을 통해서 이루어지고 있다. IP 네트워크를 통해 콘텐츠가 전송되면서 네트워크의 대역폭을 효율적으로 사용하기 위해 멀티캐스트를 통해 이루어진다. 멀티캐스트는 IP 환경에서 동일한 내용의 데이터를 여러명의 특정한 그룹의 수신자에게 동시에 전송하는 것을 말하며, 이때 그룹을 관리하기 위해 인터넷 그룹 관리 프로토콜(Internet Group Management Protocol, IGMP)이 사용된다. IGMP에는 접근제어와 같은 보안 기능을 제공하지 않고 있으며, IPTV와 같은 유료 방송 서비스에서는 멀티캐스트를 통해 전송 되는 콘텐츠를 보호하기위해 접근제어시스템(Conditional Access System, CAS)을 사용한다. 그러나 CAS를 통해 콘텐츠를 보호 하더라도, IGMP에는 보안 기능이 없다는 근본적인 문제에 의해 사용자의 TV 시청을 방해할 수 있다는 가능성이 남아있다. 본 논문에서는 이러한 문제를 해결하기 위해 CAS가 운영되면서 교환된 키를 사용해 IGMP메시지에 보안기능을 추가한 기법을 제안한다.

Implementation of H.264 Transcoding & Selective Encryption of bit stream (H.264 트랜스코딩과 비트스트림의 선택적 암호화 구현)

  • Seong-Yeon Lee;Gyeong-Yeon Cho; Jong-Nam Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.141-144
    • /
    • 2008
  • IPTV, VOD와 같은 스트리밍 서비스와 유료 케이블 TV 방송 채널, 유료 위성방송 채널 등에는 반드시 제한 수신 시스템(Conditional Access System, CAS)이 필요하다. CAS시스템은 인증 받은 사용자에게는 깨끗한 화면을 보여주어야 하고 인증 받지 않은 사용자에게는 정상적으로 화면을 즐길 수 없도록 하여야 한다. 이러한 환경을 만들기 위하여 추가비용이 적은 알고리즘이 필요한데 그 방법으로 암호화를 제안한다. 본 논문에서는 CAS 등의 인증시스템을 위하여 H.264 영상의 선택적 암호화를 구현하였다. 제안하는 방법은 여러 가지 포맷으로 된 콘텐츠를 트랜스코딩하여 YUV 형식으로 변환한 뒤, 이것을 H.264 코덱을 이용하여 압축한 다음 필요에 따라 특정한 부분을 암호화하는 것이다. 실험을 통하여 암호화 키가 없는 미 인증 사용자는 영상을 제대로 볼 수 없었고 암호화의 강도를 강하게 할 경우 재생은 되지만 영상의 확인이 불가능함을 확인하였다. 또한 300프레임의 영상을 암호화 하는데 평균 71.3초가 걸려 속도 역시 빠름을 확인하였다. 제안하는 내용은 IPTV, VOD와 같은 스트리밍 서비스에서의 사용자 인증 및 저작권 보호 등의 분야에 유용하게 사용될 것이다.

Distribution Business Model and Protecting Management System of Contents for IPTV (IPTV를 위한 콘텐츠의 유통 비즈니스 모델 및 보호관리)

  • Ryu, Jee-Woong;Bang, Jin-Suk;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.4
    • /
    • pp.845-850
    • /
    • 2011
  • In this paper, we proposed the digital contents distribution business model for the operation of integration between heterogeneous systems in order to use IPTV. Also, we designed and implemented the protection management system through this distribution business model. This proposed model maintains interoperability between the heterogeneous systems, creates rights protection document based on REL, and provides the new version of packaged digital contents to itself by packaging the digital contents. Overall, it ultimately offers an interoperable environment. Moreover, since we pre-defines the relations among REL data based on MPEG-21 standard, which creates the newly packaged digital contents, it is easy to edit data. We can expect to save expenses of digital contents distribution and rights protection technology. Additionally, we can further improve security by encapsulating the security technology of CAS and DRM system.

T-DMB System Based on Limited Reception Function (제한수신 기능 기반 T-DMB 시스템)

  • Lee, Jong-Won;Kang, In-Shik;Yu, Dae-Sang;Kim, Jong-Moon;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.5
    • /
    • pp.957-962
    • /
    • 2016
  • Current terrestrial Digital Multimedia Broadcasting (T-DMB) is conducting the emergency alert broadcast, or can view a variety of broadcasting. However, propagation shadow area is a situation where the service is limited due to limitations of facilities investment. In addition, there is the problem of T-DMB broadcasting is for viewing only a restricted area and a mobile device because the mobile is also T-DMB viewing device impossible. In this paper, it receives a T-DMB broadcasting as a way to solve the problems of the T-DMB system, which was studied the re transmission to the mobile device. Accordingly, by receiving the broadcast may be watched in the mobile device the T-DMB reception impossible. Also provides a one-way/two-way authentication mechanism using a conditional access function, and the system was configured so that the user can watch only the registered broadcasting.

A Lightweight Key Agreement Protocol between Smartcard and Set-Top Box for Secure Communication in IPTV Broadcasting (IPTV환경에서 스마트카드와 셋톱박스간의 안전한 통신을 위한 경량화된 키 동의 프로토콜)

  • Lee, Hoon-Jung;Son, Jung-Gap;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.3
    • /
    • pp.67-78
    • /
    • 2010
  • CAS(Conditional Access System) is used in Pay-TV System to prohibit unauthorized user(s) accessing the contents in IPTV broadcasting environment. In the CAS, Smartcard transfers CW which is necessary in the process of descrambling the scrambled program to STB. CW hacking problem is one of the most serious problems in pay-TV system. There have been many researches on generating secure communication channel between smartcard and STB for secure transmitting, But they had problems in efficiency and security. In this paper, we propose a lightweight key agreement protocol based on a symmetric key algorithm. We show that our proposed protocol is more efficient than existing protocols by comparing the amount of computations, and analyzing the security requirement of the proposed protocol.

Conditional Generative Adversarial Network based Collaborative Filtering Recommendation System (Conditional Generative Adversarial Network(CGAN) 기반 협업 필터링 추천 시스템)

  • Kang, Soyi;Shin, Kyung-shik
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.3
    • /
    • pp.157-173
    • /
    • 2021
  • With the development of information technology, the amount of available information increases daily. However, having access to so much information makes it difficult for users to easily find the information they seek. Users want a visualized system that reduces information retrieval and learning time, saving them from personally reading and judging all available information. As a result, recommendation systems are an increasingly important technologies that are essential to the business. Collaborative filtering is used in various fields with excellent performance because recommendations are made based on similar user interests and preferences. However, limitations do exist. Sparsity occurs when user-item preference information is insufficient, and is the main limitation of collaborative filtering. The evaluation value of the user item matrix may be distorted by the data depending on the popularity of the product, or there may be new users who have not yet evaluated the value. The lack of historical data to identify consumer preferences is referred to as data sparsity, and various methods have been studied to address these problems. However, most attempts to solve the sparsity problem are not optimal because they can only be applied when additional data such as users' personal information, social networks, or characteristics of items are included. Another problem is that real-world score data are mostly biased to high scores, resulting in severe imbalances. One cause of this imbalance distribution is the purchasing bias, in which only users with high product ratings purchase products, so those with low ratings are less likely to purchase products and thus do not leave negative product reviews. Due to these characteristics, unlike most users' actual preferences, reviews by users who purchase products are more likely to be positive. Therefore, the actual rating data is over-learned in many classes with high incidence due to its biased characteristics, distorting the market. Applying collaborative filtering to these imbalanced data leads to poor recommendation performance due to excessive learning of biased classes. Traditional oversampling techniques to address this problem are likely to cause overfitting because they repeat the same data, which acts as noise in learning, reducing recommendation performance. In addition, pre-processing methods for most existing data imbalance problems are designed and used for binary classes. Binary class imbalance techniques are difficult to apply to multi-class problems because they cannot model multi-class problems, such as objects at cross-class boundaries or objects overlapping multiple classes. To solve this problem, research has been conducted to convert and apply multi-class problems to binary class problems. However, simplification of multi-class problems can cause potential classification errors when combined with the results of classifiers learned from other sub-problems, resulting in loss of important information about relationships beyond the selected items. Therefore, it is necessary to develop more effective methods to address multi-class imbalance problems. We propose a collaborative filtering model using CGAN to generate realistic virtual data to populate the empty user-item matrix. Conditional vector y identify distributions for minority classes and generate data reflecting their characteristics. Collaborative filtering then maximizes the performance of the recommendation system via hyperparameter tuning. This process should improve the accuracy of the model by addressing the sparsity problem of collaborative filtering implementations while mitigating data imbalances arising from real data. Our model has superior recommendation performance over existing oversampling techniques and existing real-world data with data sparsity. SMOTE, Borderline SMOTE, SVM-SMOTE, ADASYN, and GAN were used as comparative models and we demonstrate the highest prediction accuracy on the RMSE and MAE evaluation scales. Through this study, oversampling based on deep learning will be able to further refine the performance of recommendation systems using actual data and be used to build business recommendation systems.