• Title/Summary/Keyword: IPTV service process

Search Result 40, Processing Time 0.026 seconds

A Review of IPTV Threats Based on the Value Chain

  • Lee, Hong-Joo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.2
    • /
    • pp.163-177
    • /
    • 2009
  • The demand for services using digital technology is constantly increasing as new developments in digital consumer electronics and the Internet are made. This is especially true in terms of the demand for IPTV utilizing high speed Internet networks. Research on IPTV threats is important for facilitating financial transactions via IPTV and preventing illegal use or copying of digital content. Thus, this paper analyzes IPTV threats via the IPTV value chain. That is, the distribution system for IPTV service is analyzed along with the components of the value chain and corresponding IPTV security requirements or security technologies, in order to perform a threat analysis and research suitable for the IPTV service environment. This paper has a greater focus on the value chain of the IPTV business than the approach in previous research, in order to analyze security requirements and technologies that are more applicable to the business environment.

Design of Efficient Adult Authentication Model for prevent of illegal Service of Child in IPTV Service Environment (IPTV 서비스를 이용하는 사용자의 효율적인 성인인증 모델 설계)

  • Jeong, Yoon-Su;Kim, Yong-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.1
    • /
    • pp.68-75
    • /
    • 2013
  • Recently IPTV that transmits multimedia contents in real time through internet, cable TV net and satelite net gets the limelight. But IPTV service that gives service to users by various media has a problem of not supporting user certification fully. This paper suggests a certification model which prevents getting access permission of IPTV service by sending illegal certification information by adolescent through integrating mobile communication technique with RFID(Radio Frequency IDentification) technique which is a key technique of Ubiquitous environment. This model performs the process of adult certification by keeping synchronization with user's certificaiton information that is saved in data-base of certification server and contents server after getting the system of class categorization in contents server to overcome disadvantage of simple adult certification system that is popular in the existing internet. Also, it adapts double hash chain technique not to down load illegally contents without the permission of manager even if an adolescent gets manager's approval key.

A Study on IPTV Standardization

  • Shahzad, Aamir;Ali, Mumtaz;Shin, Seo-Yong;Kim, Han-Su
    • Review of Korean Society for Internet Information
    • /
    • v.8 no.3
    • /
    • pp.49-58
    • /
    • 2007
  • The IPTV Standardization work being done by the ITU-T in collaboration with other SDOs and telecommunication companies. Currently IPTV services are provided with no global standards and interoperability. ITU-T leads the process of IPTV standardization. We used the ITU-Ts working documents which were publically available to investigate the direction of IPTV standardization process. Many things including architecture, services, service requirements, codec and error correction mechanisms etc already defined through recommendations. But still there is effort going on to standardize the complete IPTV system.

  • PDF

A Low-weight Authentication Protocol using RFID for IPTV Users (RFID를 이용한 IPTV 사용자의 경량화 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.105-115
    • /
    • 2009
  • At the most recent, IPTV service is increasing, which isa communicative broadcasting fusion service that provides various multimedia contents interactively followed by user's request through super high-speed internet. For IPTV user service with high mobility, IPTV user's enrollment is essential. However, IPTV service provided to mobile users can't provide the certification of mobile user securely. This paper proposes light user certification protocol which can certificate mobile users by attaching RFID to IPTV STB for secure awareness of mobile users who get IPTV service. The proposed protocol prevent reply attack and man-in-the-middle attack from happening oftenin a wireless section by transmitting the result value hashed by hash function with both its' ID and random number received from tag after tag transmits random number which generated randomly in the process of certification of mobile user to IPTV STB.

A Study for Determining Factors of Service Quality IPTV (IPTV 서비스품질 결정요인에 관한 연구 <기술수용모델을 중심으로>)

  • Park, Jae-Min;Jung, Kyung-Hee;Cho, Jai-Rip
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2008.11a
    • /
    • pp.201-214
    • /
    • 2008
  • IPTV services, as the convergence service of communication and broadcasting, are regarded as the essential information communication media in the New Economy era by providing the consumers with various services through the collaboration among communications, broadcasting and many of other media service providers. The research starts with recognition that, in the new media era, where communication and broadcasting are converging, there are endless demands for new services and various contents, which are driving forces behind the business model of IPTV. In other words, the research expected that customer satisfaction and purchase intention would be different according to the service quality(contents). It was expected that the difference of the perceived service quality(contents) could cause the difference of the process of adopting new technologies. The study on how consumers are satisfied with services provided, and which factors of the service quality have a more significant effect on consumer satisfaction will provide very valuable information for forecasting future trends in the IPTV market. The research tried to investigate factors which influence on consumer satisfaction and loyalty through an empirical survey with real users of IPTV services. Based on the results, the research suggested effective ways of diffusing IPTV.

  • PDF

A Mutual Authentication Protocol based on Hash Function for Efficient Verification of User Entitlement in IPTV Service (IPTV 서비스에서 사용자의 수신자격을 효율적으로 판별할 수 있는 해쉬 함수 기반의 상호 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Jung, Yoon-Sung;Park, Gil-Cheol;Lee, Sang-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.3
    • /
    • pp.187-197
    • /
    • 2010
  • The fusion stream of recent broadcasting and communication make multimedia content served in the area of broadcasting into IPTV service which transmits it through high-speed internet, cable TV net and satellite net in realtime. However, as the digital broadcasting service is extended to various media, the security of IPTV service content provided to users by service provider is not fully supported by CAS(Conditional Access System) provided by existing broadcasting system. This paper proposes interactive certification protocol which can efficiently distinguish the receiving-qualification of user between Set-Top Box and Smart Card which are parts of configurations for IPTV system. The proposed protocol uses hash function to make Set-Top Box transmit receiving-qualification about the channel fee which user pays more properly than existing protocol. Also, the proposed protocol uses session key generated between receiver and smart card through inter certification process and encrypts EMM not the service to be used by anyone illegally.

Implementation and Standardization of an IPTV Terminal Provisioning Procedure (IPTV 단말 프로비저닝 절차의 구현과 표준화에 관한 연구)

  • Cho, Sungsoo;Kim, Kyoungyoul;Choi, Hyungi;Kim, Hyoungsoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.12
    • /
    • pp.1230-1244
    • /
    • 2012
  • To boost the IPTV industry, it has being considered to provide terminal portability from one service provider to another for users. If the terminal portability is guaranteed, then a service user can purchase an IPTV terminal in a market and select an IPTV service provider. For this, the IPTV terminal should process a series of pre-configuration, so called provisioning procedure. Telecommunications Technology Association (TTA) established the standard of IPTV terminal provisioning procedure, TTAK.KO-08.0026. In this paper, we explain the revised standard TTAK.KO-08.0026/R2, and introduce the architecture, functions, operating procedures and parameters of the IPTV terminal provisioning system that we implemented based on it. Finally, we discuss the future issues of the standard of the IPTV terminal provisioning procedure.

Effects of Key Drivers on Continuing to Use Digital Convergence Services: Hierarchical Component Approach

  • Joung, Seokin;Han, Eoksoo;Han, Hyunsoo
    • ETRI Journal
    • /
    • v.36 no.6
    • /
    • pp.1051-1061
    • /
    • 2014
  • Technological advances made with the development of digital technology and the Internet have led to the emergence and evolution of digital convergence - the integration of media and communications. This, in turn, has led to the creation of the representative broadcast and communication convergence business model (IPTV service). This study examines the consumption patterns and behaviors of IPTV service customers and explores the process of their continuous use of the IPTV service, thereby endeavoring to contribute to the diffusion of digital convergence services. To survey customers' continuous use of the IPTV service, this study first designs a research framework based on an examination of the existing literature on satisfaction, loyalty, and so on. In addition, research is conducted on the switching barrier of the method of consolidating customers' adherence to a given IPTV service by increasing the burden on them, thereby developing a final research model with which to attempt yet another heterogeneous approach. This enables not only an analysis of the causal relationship with antecedent variables but also a measurement of the explanatory contribution of the antecedent variables' sub-variables.

A Convergence Technology of IPTV-RFID against Clone Attack (Clone 공격에 강한 IPTV-RFID 융합 기술)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.145-156
    • /
    • 2010
  • Now a days, the development of TV and internet like communicational technique makes IPTV service which combines internet with multimedia contents increase. But when a user gets service in specific place, the certification process and user's ID check in IPTV service is complicate so that there occurs communicational difficulty like increasing illegal users and service delay etc. This paper proposes communication security mechanism to prevent Clone attack which happens in wireless section by efficiently extracting illegal user. The proposed mechanism performs key distribution procedure, inter certification procedure, and key initiation procedure by putting security agent in RFID-USB for RFID tags users use to perform plug-and-plug function. Also, the proposed mechanism updates the hased token value by its ID and the random number which RFID-USB creates whenever a user accesses in the area of RFID-USB so that it protects reply attack and man-in-the-middle attack which happen often in the area of wireless section.

Design of Multi-dimensional Contents Retrieval UI for Mobile IPTV

  • Byeon, Jae-Hee;Song, Ju-Hong;Moon, Nam-Mee
    • Journal of Information Processing Systems
    • /
    • v.7 no.2
    • /
    • pp.355-362
    • /
    • 2011
  • Since two-way interactive broadcasting service began, remote controls have been fitted with 4 color buttons, which enables interaction and convenience to increase between users and content. Currently, diverse studies on IPTV are in progress. Particularly, as the mobile market rapidly grows, studies on mobile IPTV and on linkage with other media are constantly increasing. However, mobile IPTV has never been studied until now. In that sense, this present study attempted to design a mobile-based IPTV UI that could use a multi-dimensional search method based on consistent criteria for content search. As a result, the proposed IPTV UI is fitted with more usability and functionality for 4 color buttons. The UI designed in this study was compared to the IMDb Android Application, which uses GOMS-KLM. The results showed that the performance process was reduced by three stages, and that the performance time was reduced by more than 17.9%. Therefore, the conclusion can be reached that the proposed UI is effective for a fast search of contents.