Pirate card rejection

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Renewable security cards provide the primary security protection in conditional access (CA) systems. Since the legitimate cards are intended to be inexpensive to produce, easy to distribute, and user-installable via externally accessible slots, sales of counterfeit cards may offer the pirate a profitable business. However, since the legitimate infrastructure is likely to be backed by a significant operating budget, it is reasonable to design that infrastructure to detect and reject counterfeit cards. Such an infrastructure would require customers of the pirate to use pirated hosts as well as pirated cards. This secondary security layer increases the pirate’s cost of doing business, and may therefore reduce the amount of piracy. This paper presents a protocol that the legitimate infrastructure can use to detect and reject content decrypted by counterfeit cards. © Springer-Verlag Berlin Heidelberg 2000.

Cite

CITATION STYLE

APA

Goldschlag, D. M., & Kravitz, D. W. (2000). Pirate card rejection. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 1820, 141–149. https://doi.org/10.1007/10721064_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free