• Title/Summary/Keyword: IPTV System

Search Result 231, Processing Time 0.043 seconds

A Study for a Secure User Authentication System on Multi-Screen Services (멀티-스크린 환경에서 안전한 사용자 인증시스템에 관한 연구)

  • Kim, JinMook;Lee, JongSub
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.11-16
    • /
    • 2014
  • Recently, request of IPTV was increase. It is a multi-screen service by used TV, PC, and smart-phones. Especially, IPTV and smart-phone linked multi-screen service are very growth by user's recommends. Now, IPTV have a security service partial and multi-screen service. But smart-phone and multi-screen service don't have security service. And authentication service for smart-phone and IPTV linked multi-screen service is don't.. Therefore, We propose that user authentication system for multi-screen service with IPTV and multi-device linked authentcation services. Our proposed system base on Kerberos, so proposal is easy and fast about user authentication. This have simple procedures and more secure services against of PKI. So, our system can support secure multi-screen services against various security threats in multi-screen environments.

A Review of IPTV Threats Based on the Value Chain

  • Lee, Hong-Joo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.2
    • /
    • pp.163-177
    • /
    • 2009
  • The demand for services using digital technology is constantly increasing as new developments in digital consumer electronics and the Internet are made. This is especially true in terms of the demand for IPTV utilizing high speed Internet networks. Research on IPTV threats is important for facilitating financial transactions via IPTV and preventing illegal use or copying of digital content. Thus, this paper analyzes IPTV threats via the IPTV value chain. That is, the distribution system for IPTV service is analyzed along with the components of the value chain and corresponding IPTV security requirements or security technologies, in order to perform a threat analysis and research suitable for the IPTV service environment. This paper has a greater focus on the value chain of the IPTV business than the approach in previous research, in order to analyze security requirements and technologies that are more applicable to the business environment.

A Study on DCAS Security Framework Model for Mobile IPTV (모바일 IPTV 환경에 적합한 DCAS 보안 프레임워크 연구)

  • Choi, Jung-Young;Cho, Kwan-Tae;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.105-116
    • /
    • 2011
  • Mobile IPTV is a IPTV interactive broadcasting service through wireless Internet. Mobile IPTV service would be much more promoted. Thus, the methods for protecting the broadcasting contents will be indispensible elements for the successful Mobile IPTV service achievement. This paper describes the characteristics of Mobile IPTV and the related contents protection techniques. To evaluate several security issues, we suggest a DCAS security framework model for Mobile IPTV, and speculate the most widespread, a security technologies for Mobile IPTV such as DCSA. Moreover, candidate models of Mobile IPTV protection system are suggested based on these technologies.

A Study of IPTV-VOD Program Recommendation System using Collaborative Filtering (협업 필터링을 이용한 IPTV-VOD 프로그램 추천 시스템에 대한 연구)

  • Sun, Chul-Yong;Kang, Yong-Jin;Park, Kyu-Sik
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.10
    • /
    • pp.1453-1462
    • /
    • 2010
  • In this paper, a new program recommendation system is proposed to recommend user preferred VOD program in IPTV environment. A proposed system is implemented with collaborative filtering method. For a user profile which describes user program preference, a program preference, sub-genre preference, and US(user similarity) weight of the user neighborhood is averaged and updated every week. In order to evaluate system performance, real 24-weeks cable TV watching data provided by Nilson Research Corp. are modified to fit for IPTV broadcasting environment and the simulation result shows quite comparative quality of recommendation. The experimental results optimum performance when user similarity based weighting, five person per group and five recommendation programs are used.

A Petri Net Representation of an IPTV System (IPTV 시스템의 페트리넷 표현)

  • Yim, Jae-Geol;Lee, Gye-Young;Woo, Jin-Seok
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2012.01a
    • /
    • pp.91-94
    • /
    • 2012
  • 융합 시스템의 표본으로 주목받고 있는 IPTV는 라디오 전파 방송이 아닌 인터넷을 통하여 사용자들에게 멀티미디어 콘텐츠를 제공한다. IPTV 응용 분야에는 VOD(Video On Demand) 서비스, 교육, 문화, 오락 등 다양한 양방향 응용 서비스가 포함된다. 본 연구에서는 이러한 IPTV 시스템을 페트리 넷으로 표현하고, CPNTools를 이용하여 페트리 넷을 분석함으로써 IPTV 시스템이 막힘없이 운행됨을 검증한다.

  • PDF

A Study on Contents Management of IPTV System (IPTV 시스템의 콘텐츠 관리 연구)

  • Lee, Gyeyoung;Yim, Jaegeol
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.876-879
    • /
    • 2012
  • IPTV는 방송과 통신이 융합된 모범 사례로 널리 알려지고 있으며, 가까운 미래에는 인터넷 통신량의 대부분을 IPTV 데이터가 차지할 것으로 예상할 만큼 유망한 연구 주제이다. 근래에는 스마트TV라는 용어가 등장하였으나 이것 역시 IPTV의 범주를 벗어나지 못한다. IPTV 시스템을 구성하는 가장 중요한 요소 부분은 콘텐츠 관리와 방송관리이며, 본 논문은 콘텐츠 관리에 대하여 조사 연구한다.

Conditional Access Authentication and Management System for IPTV Service (IPTV 서비스를 위한 수신권한 인증 및 관리 시스템)

  • Cho, Yong-Soon;Park, Ki-Chul;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.1
    • /
    • pp.45-52
    • /
    • 2009
  • Currently broadcasting and telecommunication has integrated, And IPTV Service has appeared who called TPS(Triple Play Service) which integrated with broadcasting, telecommunication and Phone Service. IPTV provide broadcasting service and VOD(Video on Demand) service, and it must be satisfied digital content security. For this condition, IPTV Forum working on standardization of interface for digital content security. The Security solution for broadcasting and VOD are CAS (Conditional Access System) and DRM(Digital Rights Management). But these solutions manufactured by many vendors, so there is no inter-operability. And after finished standardization of interface for CAS and DRM system, the problem of inter-operability with them will be issued. For this reason, Rights management system which possible to operate independently with platform is necessary. In this paper, To protect multimedia digital content, we designed and implemented Conditional Access Management System.

A Robust Multiple Set-Top Box Authentication Scheme for IPTV Against Smart Card Cloning Attack (IPTV 환경에서 스마트카드 복제에 강건한 다중 셋톱박스 인증기법)

  • Lim, Ji-Hwan;Oh, Hee-Kuck;Kim, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.37-46
    • /
    • 2010
  • In an IPTV system, the rights of the content and service provider can be protected by using Conditional Access System (CAS) and Digital Right Management (DRM). In case of the CAS, only the authorized user who has structured authentication keys can decrypt the encrypted content. However, since the CAS establishes a secure channel only between content provider and Smart Card (SC), it cannot protect the system against McCormac Hack attack which eavesdrops on unsecure channel between SC and Set-Top Box (STB) and SC cloning attack. In this paper, we propose a robust multi-STB assisted SC / STB authentication protocol which can protect the IPTV system against not only McCormac Hack attack, but also SC cloning attack. The previous works which bind a STB and a SC during the SC registration phase against the SC cloning attack does not support multi-STB environments. The proposed system which dynamically updates the STB information in subscriber management system using the bi-directional channel characteristic of IPTV system can support the user's multi-STB device effectively.

Pricing Strategy for Access Charge of IPTV Network : A Dynamic Analysis (IPTV 망 임대의 가격책정 전략 : 동태적 분석)

  • Kim, Dong-Hee;Cha, Jeong-Hyun;Oh, Jung-Suk;Kim, Soo-Wook
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.35 no.3
    • /
    • pp.45-58
    • /
    • 2010
  • Due to rapid developments of IT technologies, convergence services like IPTV (Internet protocol television) are shown up. Even though expert and customer had great expectations for this innovative service, commercialization was delayed for years by the legal dispute between industry players. One of the biggest problems was that whether internet backbone providers have to share their internet network backbone with IPTV service providers (which don't have network backbone) or not. As other countries, Korean government set the rules that ISP have to offer indiscriminate access to other IPTV service provider. At the same time, internet backbone providers can charge access charge based on cost by way of compensation. Thus access charge is very critical to the IPTV industry players. The objective of this paper is to provide model that can calculate the reasonable access charge by system dynamics, based upon real data in Korean telecommunication industry.

Trust Authority(TA) Establishment Strategy for Domestic IPTV Service in iCAS environment (iCAS 환경의 국내 IPTV 서비스를 위한 인증기관 설립방안에 관한 연구)

  • Choi, Hyun-Woo;Jung, Young-Gon;Yeo, Don-Gu;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.171-181
    • /
    • 2010
  • The iCAS specification that download CAS s/w image from the IPTV provider's server to the IPTV devices provides compatibility and service mobility between the IPTV service providers. However, to ensure mobility of the device, a TA(Trust Authority) within an IPTV eco-system that is capable of systematically managing keys or certificates is required. In the Legacy CAS, solution providers for CAS play a critical role of carrying out the TA. However, in order to standardize the device mobility, a TA should be established by implementing iCAS technology that manages the entire IPTV eco-system including iCAS. In this paper, we analysis TA issues related iCAS commercialization, and propose TA establishment strategy for IPTV service in iCAS environment.