SlideShare a Scribd company logo
www.oeclib.in
Submitted By:
Odisha Electronic Control Library
Seminar
On
Conditional Access System
Conditional Access System
Index
• Introduction
• Functional requirements of a CA system
• Fundamentals Of CAS
• How Conditional Access Systems Work
• Applications
• Advantages
• Conclusions and recommendations
• References
Introduction
• A conditional access (CA) system comprises a
combination of scrambling and encryption to
prevent unauthorized reception.
• Scrambling is the process of rendering the
sound, pictures and data unintelligible.
Functional requirements of a CA
system
• Payment schemes:
• Multiple-decoder households:
 Sharing of the CA system
 Receivers/decoders
 Delivery system
 CA Systems
Fundamentals Of CAS
• A conditional access system comprises a combination
of scrambling and encryption to prevent
unauthorized reception.
• Encryption is the process of protecting the secret
keys that are transmitted with a scrambled signal to
enable the descrambler to work.
How Conditional Access Systems Work
Applications
• While Conditional Access Systems are
commonly used for Pay-Per-View applications,
they are also often used to restrict Internet
and telephone services from subscribers who
have not purchased them.
• For example, while data is constantly being
passed through a coaxial cable provided by a
cable company, the data is encrypted in order
to prevent it from reaching the user’s modem.
Advantages
• Conditional Access Systems are advantageous
because they are able to prevent
unauthorized users from accessing data they
have not purchased without interfering with
subscribers who have purchased service.
• Conditional Access Systems are also
advantageous because they are seamless and
work without the user’s knowledge.
Conclusions and recommendations
• A basic set of transactional and functional
models of CA systems for use with digital
video broadcasting systems has been outlined.
• These models are intended to help EBU
Members to understand and evaluate
practical CA systems for use with future DVB
services and, in particular, to understand the
functionality, technical terms, and trade-offs
in these systems.
References
• www.google.com
• www.wikipedia.org
• www.oeclib.in
THANKS

More Related Content

What's hot

Distributed objects & components of corba
Distributed objects & components of corbaDistributed objects & components of corba
Distributed objects & components of corbaMayuresh Wadekar
 
cloud computing models
cloud computing modelscloud computing models
cloud computing models
Kiran Kumar Anumandla
 
Cloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and consCloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and cons
Amritpal Singh Bedi
 
Mobile operating systems
Mobile operating systemsMobile operating systems
Mobile operating systems
Nicolas Demetriou
 
Ubuntu-Overview
Ubuntu-OverviewUbuntu-Overview
Ubuntu-Overview
Nirma University
 
Android Project Presentation
Android Project PresentationAndroid Project Presentation
Android Project Presentation
Laxmi Kant Yadav
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptJagriti Rai
 
Cloud computing
Cloud computingCloud computing
Cloud computing
kanchu17
 
Cloud Deployment
Cloud DeploymentCloud Deployment
Cloud Deployment
Tushar Choudhary
 
Cloud computing
Cloud computingCloud computing
Cloud computing
pgayatrinaidu
 
Introduction to Java Cloud Service
Introduction to Java Cloud ServiceIntroduction to Java Cloud Service
Introduction to Java Cloud Service
Perficient, Inc.
 
Cloud computing for Teachers and Students
Cloud computing for Teachers and StudentsCloud computing for Teachers and Students
Cloud computing for Teachers and Students
Mukesh Tekwani
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
Datta Dharanikota
 
Cloud Computing ppt
Cloud Computing pptCloud Computing ppt
Open source Vs Licenced Software
Open source Vs Licenced SoftwareOpen source Vs Licenced Software
Open source Vs Licenced Software
SURESH BANALA
 
Cloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptxCloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptx
MuhammadArslan799356
 
Project Report on Cloud Storage
Project Report on Cloud StorageProject Report on Cloud Storage
Project Report on Cloud Storage
RachitSinghal17
 
Project report 393_395
Project report 393_395Project report 393_395
Project report 393_395
VishruthKhare
 
Tizen operating system seminar ppt
Tizen operating system seminar pptTizen operating system seminar ppt
Tizen operating system seminar ppt
Ajinkyalenekar12
 

What's hot (20)

Distributed objects & components of corba
Distributed objects & components of corbaDistributed objects & components of corba
Distributed objects & components of corba
 
cloud computing models
cloud computing modelscloud computing models
cloud computing models
 
Cloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and consCloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and cons
 
Mobile operating systems
Mobile operating systemsMobile operating systems
Mobile operating systems
 
Ubuntu-Overview
Ubuntu-OverviewUbuntu-Overview
Ubuntu-Overview
 
Android Project Presentation
Android Project PresentationAndroid Project Presentation
Android Project Presentation
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Deployment
Cloud DeploymentCloud Deployment
Cloud Deployment
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Introduction to Java Cloud Service
Introduction to Java Cloud ServiceIntroduction to Java Cloud Service
Introduction to Java Cloud Service
 
Cloud computing for Teachers and Students
Cloud computing for Teachers and StudentsCloud computing for Teachers and Students
Cloud computing for Teachers and Students
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud Computing ppt
Cloud Computing pptCloud Computing ppt
Cloud Computing ppt
 
Open source Vs Licenced Software
Open source Vs Licenced SoftwareOpen source Vs Licenced Software
Open source Vs Licenced Software
 
Cloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptxCloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptx
 
Project Report on Cloud Storage
Project Report on Cloud StorageProject Report on Cloud Storage
Project Report on Cloud Storage
 
Cloud storage
Cloud storageCloud storage
Cloud storage
 
Project report 393_395
Project report 393_395Project report 393_395
Project report 393_395
 
Tizen operating system seminar ppt
Tizen operating system seminar pptTizen operating system seminar ppt
Tizen operating system seminar ppt
 

Similar to Conditional Access System

Service mesh on Kubernetes - Istio 101
Service mesh on Kubernetes - Istio 101Service mesh on Kubernetes - Istio 101
Service mesh on Kubernetes - Istio 101
Huy Vo
 
Unit 5 - Designing Internet Systems and Servers - IT
Unit 5 - Designing Internet Systems and Servers - ITUnit 5 - Designing Internet Systems and Servers - IT
Unit 5 - Designing Internet Systems and Servers - IT
Deepraj Bhujel
 
boundary_security.pptx
boundary_security.pptxboundary_security.pptx
boundary_security.pptx
KelvinDube4
 
Slashing Your Cloud Risk: 3 Must-Do's
Slashing Your Cloud Risk: 3 Must-Do'sSlashing Your Cloud Risk: 3 Must-Do's
Slashing Your Cloud Risk: 3 Must-Do's
Security Innovation
 
Securing Kubernetes Workloads
Securing Kubernetes WorkloadsSecuring Kubernetes Workloads
Securing Kubernetes Workloads
Jim Bugwadia
 
Securing management, control & data plane
Securing management, control & data planeSecuring management, control & data plane
Securing management, control & data plane
NetProtocol Xpert
 
Oracle 11g database security
Oracle 11g database securityOracle 11g database security
Oracle 11g database securityelshiekh1980
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Hamza Sajjad
 
WLAN Architecture - Considerations
WLAN Architecture - ConsiderationsWLAN Architecture - Considerations
WLAN Architecture - Considerations
Aruba, a Hewlett Packard Enterprise company
 
Patterns of Distributed Application Design
Patterns of Distributed Application DesignPatterns of Distributed Application Design
Patterns of Distributed Application Design
Orkhan Gasimov
 
Networkprotocolstructurescope 130719081246-phpapp01
Networkprotocolstructurescope 130719081246-phpapp01Networkprotocolstructurescope 130719081246-phpapp01
Networkprotocolstructurescope 130719081246-phpapp01Gaurav Goyal
 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scope
Sanat Maharjan
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
ThangDang53
 
Presentation cisco intelligent automation for cloud
Presentation   cisco intelligent automation for cloudPresentation   cisco intelligent automation for cloud
Presentation cisco intelligent automation for cloud
xKinAnx
 
Enterprise campus networks
Enterprise campus networksEnterprise campus networks
Enterprise campus networks
Kishor Satpathy
 
Cloud based dlms cosem metering head end
Cloud based dlms cosem metering head endCloud based dlms cosem metering head end
Cloud based dlms cosem metering head end
Nirmal Thaliyil
 
Cloud Computing Essentials in Alibaba Cloud
Cloud Computing Essentials in Alibaba CloudCloud Computing Essentials in Alibaba Cloud
Cloud Computing Essentials in Alibaba Cloud
Ferdin Joe John Joseph PhD
 
Wireless Connections In The Or Display
Wireless Connections In The Or DisplayWireless Connections In The Or Display
Wireless Connections In The Or Display
greatorrn
 
Architecting for the cloud scability-availability
Architecting for the cloud scability-availabilityArchitecting for the cloud scability-availability
Architecting for the cloud scability-availability
Len Bass
 

Similar to Conditional Access System (20)

Service mesh on Kubernetes - Istio 101
Service mesh on Kubernetes - Istio 101Service mesh on Kubernetes - Istio 101
Service mesh on Kubernetes - Istio 101
 
Unit 5 - Designing Internet Systems and Servers - IT
Unit 5 - Designing Internet Systems and Servers - ITUnit 5 - Designing Internet Systems and Servers - IT
Unit 5 - Designing Internet Systems and Servers - IT
 
boundary_security.pptx
boundary_security.pptxboundary_security.pptx
boundary_security.pptx
 
Slashing Your Cloud Risk: 3 Must-Do's
Slashing Your Cloud Risk: 3 Must-Do'sSlashing Your Cloud Risk: 3 Must-Do's
Slashing Your Cloud Risk: 3 Must-Do's
 
Securing Kubernetes Workloads
Securing Kubernetes WorkloadsSecuring Kubernetes Workloads
Securing Kubernetes Workloads
 
Securing management, control & data plane
Securing management, control & data planeSecuring management, control & data plane
Securing management, control & data plane
 
Oracle 11g database security
Oracle 11g database securityOracle 11g database security
Oracle 11g database security
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
WLAN Architecture - Considerations
WLAN Architecture - ConsiderationsWLAN Architecture - Considerations
WLAN Architecture - Considerations
 
Patterns of Distributed Application Design
Patterns of Distributed Application DesignPatterns of Distributed Application Design
Patterns of Distributed Application Design
 
Networkprotocolstructurescope 130719081246-phpapp01
Networkprotocolstructurescope 130719081246-phpapp01Networkprotocolstructurescope 130719081246-phpapp01
Networkprotocolstructurescope 130719081246-phpapp01
 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scope
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
 
Presentation cisco intelligent automation for cloud
Presentation   cisco intelligent automation for cloudPresentation   cisco intelligent automation for cloud
Presentation cisco intelligent automation for cloud
 
Enterprise campus networks
Enterprise campus networksEnterprise campus networks
Enterprise campus networks
 
Cloud based dlms cosem metering head end
Cloud based dlms cosem metering head endCloud based dlms cosem metering head end
Cloud based dlms cosem metering head end
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing Essentials in Alibaba Cloud
Cloud Computing Essentials in Alibaba CloudCloud Computing Essentials in Alibaba Cloud
Cloud Computing Essentials in Alibaba Cloud
 
Wireless Connections In The Or Display
Wireless Connections In The Or DisplayWireless Connections In The Or Display
Wireless Connections In The Or Display
 
Architecting for the cloud scability-availability
Architecting for the cloud scability-availabilityArchitecting for the cloud scability-availability
Architecting for the cloud scability-availability
 

More from OECLIB Odisha Electronics Control Library

5G technology-ppt
5G technology-ppt5G technology-ppt
Futex ppt
Futex  pptFutex  ppt
Distributed Computing ppt
Distributed Computing pptDistributed Computing ppt
Autonomic Computing PPT
Autonomic Computing PPTAutonomic Computing PPT
Asynchronous Chips ppt
Asynchronous Chips pptAsynchronous Chips ppt
Artificial Eye PPT
Artificial Eye PPTArtificial Eye PPT
Agent Oriented Programming PPT
Agent Oriented Programming PPTAgent Oriented Programming PPT
Agent Oriented Programming PPT
OECLIB Odisha Electronics Control Library
 
Wireless application protocol ppt
Wireless application protocol  pptWireless application protocol  ppt
Wireless application protocol ppt
OECLIB Odisha Electronics Control Library
 
Wireless Communication ppt
Wireless Communication pptWireless Communication ppt
Wireless Communication ppt
OECLIB Odisha Electronics Control Library
 
4G Wireless Systems ppt
4G Wireless Systems ppt4G Wireless Systems ppt
Sixth sense technology ppt
Sixth sense technology pptSixth sense technology ppt
Sixth sense technology ppt
OECLIB Odisha Electronics Control Library
 
Soa ppt
Soa pptSoa ppt
Software developement life cycle ppt
Software developement life cycle pptSoftware developement life cycle ppt
Software developement life cycle ppt
OECLIB Odisha Electronics Control Library
 
Voice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) pptVoice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) ppt
OECLIB Odisha Electronics Control Library
 
Wimax ppt
Wimax pptWimax ppt
Wibree ppt
Wibree pptWibree ppt
Wearable Computing
Wearable ComputingWearable Computing
UNIX Operating System ppt
UNIX Operating System pptUNIX Operating System ppt

More from OECLIB Odisha Electronics Control Library (20)

5G technology-ppt
5G technology-ppt5G technology-ppt
5G technology-ppt
 
Futex ppt
Futex  pptFutex  ppt
Futex ppt
 
Distributed Computing ppt
Distributed Computing pptDistributed Computing ppt
Distributed Computing ppt
 
Autonomic Computing PPT
Autonomic Computing PPTAutonomic Computing PPT
Autonomic Computing PPT
 
Asynchronous Chips ppt
Asynchronous Chips pptAsynchronous Chips ppt
Asynchronous Chips ppt
 
Artificial Eye PPT
Artificial Eye PPTArtificial Eye PPT
Artificial Eye PPT
 
Agent Oriented Programming PPT
Agent Oriented Programming PPTAgent Oriented Programming PPT
Agent Oriented Programming PPT
 
Wireless application protocol ppt
Wireless application protocol  pptWireless application protocol  ppt
Wireless application protocol ppt
 
Wireless Communication ppt
Wireless Communication pptWireless Communication ppt
Wireless Communication ppt
 
4G Wireless Systems ppt
4G Wireless Systems ppt4G Wireless Systems ppt
4G Wireless Systems ppt
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Sixth sense technology ppt
Sixth sense technology pptSixth sense technology ppt
Sixth sense technology ppt
 
Soa ppt
Soa pptSoa ppt
Soa ppt
 
Software developement life cycle ppt
Software developement life cycle pptSoftware developement life cycle ppt
Software developement life cycle ppt
 
Voice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) pptVoice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) ppt
 
ZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY pptZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY ppt
 
Wimax ppt
Wimax pptWimax ppt
Wimax ppt
 
Wibree ppt
Wibree pptWibree ppt
Wibree ppt
 
Wearable Computing
Wearable ComputingWearable Computing
Wearable Computing
 
UNIX Operating System ppt
UNIX Operating System pptUNIX Operating System ppt
UNIX Operating System ppt
 

Conditional Access System

  • 1. www.oeclib.in Submitted By: Odisha Electronic Control Library Seminar On Conditional Access System
  • 3. Index • Introduction • Functional requirements of a CA system • Fundamentals Of CAS • How Conditional Access Systems Work • Applications • Advantages • Conclusions and recommendations • References
  • 4. Introduction • A conditional access (CA) system comprises a combination of scrambling and encryption to prevent unauthorized reception. • Scrambling is the process of rendering the sound, pictures and data unintelligible.
  • 5. Functional requirements of a CA system • Payment schemes: • Multiple-decoder households:  Sharing of the CA system  Receivers/decoders  Delivery system  CA Systems
  • 6. Fundamentals Of CAS • A conditional access system comprises a combination of scrambling and encryption to prevent unauthorized reception. • Encryption is the process of protecting the secret keys that are transmitted with a scrambled signal to enable the descrambler to work.
  • 7. How Conditional Access Systems Work
  • 8. Applications • While Conditional Access Systems are commonly used for Pay-Per-View applications, they are also often used to restrict Internet and telephone services from subscribers who have not purchased them. • For example, while data is constantly being passed through a coaxial cable provided by a cable company, the data is encrypted in order to prevent it from reaching the user’s modem.
  • 9. Advantages • Conditional Access Systems are advantageous because they are able to prevent unauthorized users from accessing data they have not purchased without interfering with subscribers who have purchased service. • Conditional Access Systems are also advantageous because they are seamless and work without the user’s knowledge.
  • 10. Conclusions and recommendations • A basic set of transactional and functional models of CA systems for use with digital video broadcasting systems has been outlined. • These models are intended to help EBU Members to understand and evaluate practical CA systems for use with future DVB services and, in particular, to understand the functionality, technical terms, and trade-offs in these systems.