TECH 3292-s1

TECH 3292-s1

BISS ? CA BASIC INTEROPERABLE SCRAMBLING SYSTEM

Supplement 1:

CONDITIONAL ACCESS MODE

Version 1.0

Geneva March 2018

There are blank pages throughout this document. This document is paginated for two sided printing

Tech 3292-s1

BISS ? Conditional Access (BISS-CA)

Abstract

This specification describes a conditional access mode for the Basic Interoperable Scrambling System (BISS), based on asymmetric cryptography for use on digital contribution circuits (satellite, DSNG, IP etc.).

It allows a dynamic, real-time and granular management of the stream entitlement whilst remaining Interoperable and secure.

3

BISS ? Conditional Access (BISS-CA)

Tech 3292-s1

4

BISS ? Conditional Access (BISS-CA)

Tech 3292-s1

Contents

Abstract .................................................................................................. 3

1. Introduction .................................................................................... 7

2. Glossary ......................................................................................... 8

3. BISS Operational Modes ...................................................................... 9

4. BISS-CA ......................................................................................... 10

4.1 Overview ....................................................................................... 10

4.2 Protocol Component Description .......................................................... 11

4.2.1 Public and Private Key pair ........................................................................ 11

4.2.1.1 Entitlement Key ID (EKID) .................................................................................... 11

4.2.1.2 Session Word (SW) ............................................................................................. 12

4.2.1.3 Session Key (SK) ................................................................................................ 12

4.2.1.4 Entitlement Session Id (ESID) ................................................................................ 12

4.2.1.5 Original Network ID ............................................................................................ 13

4.2.2 Table Definitions..................................................................................... 13

4.2.2.1 CAT ............................................................................................................... 14

4.2.2.2 Conditional Access Descriptor ............................................................................... 14

4.2.2.3 Scrambling descriptor ......................................................................................... 15

4.2.2.4 Generic private section syntax .............................................................................. 15

4.2.2.5 EMM and ECM tables ........................................................................................... 16

4.2.2.5.1

Table_id ........................................................................................................ 16

4.2.2.5.3

EMM section ................................................................................................... 17

4.2.2.5.4

Session data ................................................................................................... 18

4.2.2.5.5

ECM section .................................................................................................... 20

5. Normative Implementation Considerations ............................................. 22

6. References.....................................................................................23

Annex A: Use Cases & Credential Management Description (informative). ................ 25 A1 Entitlement Credentials Management ............................................................... 26

Annex B: Public Key Format Description (informative) ........................................ 28 B1 Binary DER structure ................................................................................... 28

Annex C: Component Examples .................................................................... 29 C1 Example of Public & Private Key pair ............................................................... 29 C2 Example of Entitlement Key ID generation ......................................................... 30 C3 Example of session data in EMM ...................................................................... 30 C4 Example of ESW......................................................................................... 31

5

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download