Committed to connecting the world

WTISD

Question 3/9

Question 3/9 - Methods and practices for conditional access, protection against unauthorized copying and against unauthorized redistribution ("redistribution control" for digital cable television distribution to the home)

(Continuation of Question 3/9)

Motivation

Studies are currently under way in several countries, on ways to improve the security of conditional access systems used for television subscription, pay-per-view and similar services distributed to the home by cable television. The need for such studies immediately emerges when the security and viability of conditional access systems, currently used in Europe, the United States and elsewhere, is assessed.

Such an assessment shows the evident need to develop enhanced, better performing, piracy-resistant systems that would enable a cable television system to implement programme distribution to the home (be it a subscription or a pay-per-view service) with a security level adequate to make it commercially viable. Indeed, conditional access systems that were considered to be totally secure when they were developed only a few years ago for television distribution to the home, have been invariably "compromised" by pirates, who extract the conditional access enabling information and sell it at a fraction of the regular subscription fee.

Any conditional access system may eventually be compromised, irrespective of its sophistication, if the compromised enabling information can be sold to a sufficiently large base of customers.

It seems that a conditional access system will be more secure if the conditions below are met:

The concurrence of these conditions makes it expensive to compromise the system, and it reduces the pirate's customer base, to the point where piracy is no longer economically viable. Another very important aspect dealing with digital rights management that is related to conditional access is the provision of measures to prevent a distributed programme from being copied or redistributed, unless the owner of its intellectual property rights authorizes such copying or redistribution. Several approaches, which are not mutually exclusive, are being investigated to achieve this goal:

The study should thus focus on:

Question 

Study items to be considered include, but are not limited to:

Tasks

Tasks include, but are not limited to:

An up-to-date status of work under this Question is contained in the Study Group 9 work programme (http://itu.int/ITU-T/workprog/wp_search.aspx?sp=15&q=3/9).

Relationships