4,985 research outputs found
Recommended from our members
Security architectures in mobile integrated pay-TV
This paper presents the design and describes the advantage of the state-of-the-art Mobile Integrated Conditional Access System (MICAS) concerning interoperability, personalisation, security and operational costs in Pay-TV systems. The Message Handling Subsystem is proposed and outlined together with âFollow-Meâ service, which proposed herewith to extend mobility and personalisation concepts on Pay-TV service
Cooperating broadcast and cellular conditional access system for digital television
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.The lack of interoperability between PayâTV service providers and a horizontally integrated business transaction model have compromised the competition in the PayâTV market. In addition, the lack of interactivity with customers has resulted in high churn rate and improper security measures have contributed into considerable business loss. These issues are the main cause of high operational costs and subscription fees in the PayâTV systems.
This paper presents a novel endâtoâend system architecture for PayâTV systems cooperating mobile and broadcasting technologies. It provides a costâeffective, scalable, dynamic and secure access control mechanism supporting converged services and new business opportunities in PayâTV systems. It enhances interactivity, security and potentially reduces customer attrition and operational cost. In this platform, service providers can effectively interact with their customers, personalise their services and adopt appropriate security measures. It breaks up the rigid relationship between a viewer and setâtop box as imposed by traditional conditional access systems, thus, a viewer can fully enjoy his entitlements via an arbitrary setâtop box.
Having thoroughly considered stateâofâtheâart technologies currently being used across the world, the thesis highlights novel use cases and presents the full design and implementation aspects of the system. The design section is enriched by providing possible security structures supported thereby. A business collaboration structure is proposed, followed by a reference model for implementing the system. Finally, the security architectures are analysed to propose the best architecture on the basis of security, complexity and setâtop box production cost criteria
- âŠ