Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Index
 Introduction
 Functional requirements of a CA system
 Fundamentals Of CAS
 How Conditional Access Systems Work
...
Introduction
 A conditional access (CA) system includes a
combination of scrambling way and
encryption to prevent unautho...
Functional requirements of
a CA system
 Payment schemes:
 Multiple-decoder households:
 Sharing of the CA system
 Rece...
Fundamentals Of CAS
A conditional access system includes a combination
of scrambling and encryption to prevent
unauthoriz...
How Conditional Access
Systems Work
Applications
 While Conditional Access Systems are commonly
used for Pay-Per-View applications, they are also
often used ...
Advantages
 Conditional Access Systems are useful
because they are able to prevent
unauthorized users from accessing data...
Conclusions and
recommendations
 A basic set of transactional and functional
models of CA systems for use with digital
vi...
Thank You
Presented By:- ANKIT NAITHANI
Student of BCA 3rd SEM
Conditional Access System
Upcoming SlideShare
Loading in …5
×

Conditional Access System

After Reading This PPT You Will Understand The Concept Of Conditional Access Systems

  • Login to see the comments

Conditional Access System

  1. 1. Index  Introduction  Functional requirements of a CA system  Fundamentals Of CAS  How Conditional Access Systems Work  Applications  Advantages  Conclusions and recommendations
  2. 2. Introduction  A conditional access (CA) system includes a combination of scrambling way and encryption to prevent unauthorized reception.  Scrambling is the process of changing the sound, pictures and data unintelligible.
  3. 3. Functional requirements of a CA system  Payment schemes:  Multiple-decoder households:  Sharing of the CA system  Receivers/decoders  Delivery system  CA Systems
  4. 4. Fundamentals Of CAS A conditional access system includes a combination of scrambling and encryption to prevent unauthorized reception.  Encryption is the process of protecting the secret keys that are transmitted with a scrambled signal to enable the descrambler to work.
  5. 5. How Conditional Access Systems Work
  6. 6. Applications  While Conditional Access Systems are commonly used for Pay-Per-View applications, they are also often used to restrict Internet and telephone services from subscribers who have not purchased them.  For example, while data is constantly being passed through a coaxial cable provided by a cable company, the data is encrypted in order to prevent it from reaching the user’s modem.
  7. 7. Advantages  Conditional Access Systems are useful because they are able to prevent unauthorized users from accessing data they have not purchased without interfering with subscribers who have purchased service.  Conditional Access Systems are also useful because they are seamless and work without the user’s knowledge.
  8. 8. Conclusions and recommendations  A basic set of transactional and functional models of CA systems for use with digital video broadcasting.  These models are intended to understand the functionality, technical terms, and trade- offs in these systems.
  9. 9. Thank You Presented By:- ANKIT NAITHANI Student of BCA 3rd SEM

×