TECH 3292-s1
TECH 3292-s1
BISS ? CA BASIC INTEROPERABLE SCRAMBLING SYSTEM
Supplement 1:
CONDITIONAL ACCESS MODE
Version 1.0
Geneva March 2018
There are blank pages throughout this document. This document is paginated for two sided printing
Tech 3292-s1
BISS ? Conditional Access (BISS-CA)
Abstract
This specification describes a conditional access mode for the Basic Interoperable Scrambling System (BISS), based on asymmetric cryptography for use on digital contribution circuits (satellite, DSNG, IP etc.).
It allows a dynamic, real-time and granular management of the stream entitlement whilst remaining Interoperable and secure.
3
BISS ? Conditional Access (BISS-CA)
Tech 3292-s1
4
BISS ? Conditional Access (BISS-CA)
Tech 3292-s1
Contents
Abstract .................................................................................................. 3
1. Introduction .................................................................................... 7
2. Glossary ......................................................................................... 8
3. BISS Operational Modes ...................................................................... 9
4. BISS-CA ......................................................................................... 10
4.1 Overview ....................................................................................... 10
4.2 Protocol Component Description .......................................................... 11
4.2.1 Public and Private Key pair ........................................................................ 11
4.2.1.1 Entitlement Key ID (EKID) .................................................................................... 11
4.2.1.2 Session Word (SW) ............................................................................................. 12
4.2.1.3 Session Key (SK) ................................................................................................ 12
4.2.1.4 Entitlement Session Id (ESID) ................................................................................ 12
4.2.1.5 Original Network ID ............................................................................................ 13
4.2.2 Table Definitions..................................................................................... 13
4.2.2.1 CAT ............................................................................................................... 14
4.2.2.2 Conditional Access Descriptor ............................................................................... 14
4.2.2.3 Scrambling descriptor ......................................................................................... 15
4.2.2.4 Generic private section syntax .............................................................................. 15
4.2.2.5 EMM and ECM tables ........................................................................................... 16
4.2.2.5.1
Table_id ........................................................................................................ 16
4.2.2.5.3
EMM section ................................................................................................... 17
4.2.2.5.4
Session data ................................................................................................... 18
4.2.2.5.5
ECM section .................................................................................................... 20
5. Normative Implementation Considerations ............................................. 22
6. References.....................................................................................23
Annex A: Use Cases & Credential Management Description (informative). ................ 25 A1 Entitlement Credentials Management ............................................................... 26
Annex B: Public Key Format Description (informative) ........................................ 28 B1 Binary DER structure ................................................................................... 28
Annex C: Component Examples .................................................................... 29 C1 Example of Public & Private Key pair ............................................................... 29 C2 Example of Entitlement Key ID generation ......................................................... 30 C3 Example of session data in EMM ...................................................................... 30 C4 Example of ESW......................................................................................... 31
5
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related searches
- l5 s1 fusion surgery
- l5 s1 fusion permanent restrictions
- l5 s1 microdiscectomy recovery time
- spinal fusion l4 l5 s1 recovery time
- l5 s1 surgery success rates
- annular fissure l5 s1 symptoms
- l5 s1 fusion recovery time
- l5 s1 facet hypertrophy symptoms
- l5 s1 stenosis
- l5 s1 symptoms best treatments
- severe l5 s1 stenosis
- l5 s1 nerve root compression