Upload
hn10788092
View
217
Download
0
Embed Size (px)
Citation preview
7/31/2019 MPKF-WP-08002v1.7 KeyFly 2.0 White Paper English
1/30
Key Fly 2.0Xtreme
Conditional Access System
Document Reference: MPKF-WP-08001v1.7
7/31/2019 MPKF-WP-08002v1.7 KeyFly 2.0 White Paper English
2/30
SIDSA, 2008. All rights reservedAccording to the laws of Spain, this document and the information contained therein are confidential and valuable trade secrets of SIDSA. This document shall notbe used for commercial purposes other than for supporting internal discussions between SIDSA and the Company. This document cannot be copied, disclosed, re-produced, stored in a retrieval system or transmitted in any form or by any means or otherwise used, whether in whole or in part, except in accordance with the prior
written agreement of SIDSA. The information contained in this document shall not be understood in any case as being legally or contractually binding for SIDSA inany manner whatsoever. SIDSA shall be entitled to modify the contents of this document, in whole or in part, at any time, without the other party or any third partyholding any right to seek compensation for those changes or compliance from SIDSA with its terms.
KeyFly 2.0
Xtreme
Key Fly 2.0XtremeSIDSA
7/31/2019 MPKF-WP-08002v1.7 KeyFly 2.0 White Paper English
3/30
Table of Contents
NAMING CONVENTIONS -----------------------------------------------------------------
INTRODUCTION -------------------------------------------------------------------------------
Present situation of conditional access systems (CAS) -------------------------Main hacks ---------------------------------------------------------------------------------------Market trends -----------------------------------------------------------------------------------Smartcard systems vs. systems without smartcards -----------------------------Breakdown of CA costs in receivers ---------------------------------------------------
ABOUT KEYFLY 2.0XTREME---------------------------------------------------------------
Description of the System ------------------------------------------------------------------Architecture -----------------------------------------------------------------------------End client devices --------------------------------------------------------------------Security ----------------------------------------------------------------------------------Scalability -------------------------------------------------------------------------------Modularity ------------------------------------------------------------------------------Types of rights ------------------------------------------------------------------------KeyFly business model development -----------------------------------------Product generation system -------------------------------------------------------KeyFly support in the set-top box ----------------------------------------------KeyFly commercial parameters
--------------------------------------------------Central server architecture --------------------------------------------------------
KeyFly 2.0XtremeFAQ ------------------------------------------------------------------------Conditional access system specifications -----------------------------------General -----------------------------------------------------------------------------------Integration in DVB-T headends --------------------------------------------------
Support for receivers -------------------------------------------------------------------------Which manufacturers and models support KeyFly? ---------------------How is a receiver certified and how long does the process take? --What does the receiver require to support KeyFly? ---------------------Can the terminal software be updated? --------------------------------------Can information banners or messages be sent to the user? ----------
KeyFly security ----------------------------------------------------------------------------------How is security implemented in KeyFly CAM? ----------------------------How does KeyFly avoid piracy? -------------------------------------------------Are there any countermeasures? -----------------------------------------------What is KeyFlys roadmap? ------------------------------------------------------
GLOSSARY --------------------------------------------------------------------------------------
4
4
4
5
8
9
10
12
13
13
16
17
17
17
18
19
19
20
20
20
21
21
21
23
26
26
26
27
2727
27
27
28
28
29
30
SIDSA
7/31/2019 MPKF-WP-08002v1.7 KeyFly 2.0 White Paper English
4/30
SIDSA
Naming Conventions / Introduction
In this document, the names KeyFly, Key-Fly 2.0 and KeyFly 2.0Xtreme are used todescribe KeyFly 2.0XtremeCAS.
Present situation of conditionalaccess systems (CAS)
At present, the conditional access marketis highly fragmented. Although the DVBforum has created a standard, it is limitedto interfaces and basic communication
protocols between standard equipment(such as multiplexers) and CAS proprie-tary equipment, e.g. Simulcrypt (betweenthe multiplexer-encoder and the CAS),CA message containers (EMM, ECM),common interface, etc.
Basically, broadcasters marry a pro-prietary security solution, which has itsadvantages and disadvantages. Onefundamental advantage is that the moreproprietary the solution, the more guaran-
teed the security and in the event of a se-curity breach, there is always a companyto turn to. The main disadvantage is that arelevant part of the business depends onanother company.
It is true that a company can have twoCAS providers, but that also increases thepossibilities of a security breach.
It is important to note that a CASscapacity for resisting hacks dependson how good the CAS devices in the
receivers are.
At present, there are three trends in se-curity issues (according to the philosophyin the receiver):
Traditional smartcard-based CAS.
SW-based CAS.
CAS based on proprietary HW(i.e. chip).
Smartcard-based CAS
Almost all the traditional CAS providersuse smartcards.
Basically, the smartcard stores the se-cret of the CAS (i.e. the code for openingthe content and the algorithmics).
The smartcard communicates eitherdirectly with the STB or with a conditionalaccess module (CAM), which houses the
smartcard and is inserted in a PCMCIAslot available in certain STBs and iDTVs.If the communication is direct with theSTB and the decryption function availa-ble in the decoder chips is used, CASsoftware is required in the STB thatis capable of communicating with thesmartcard to carry the keys, programmeinformation, etc.
In the case of a CAM, the entire TS (trans-port stream) reaches the CAM, which
communicates with the smartcard, de-crypts the corresponding programmes andsupplies them to the decoder chip (thenew CI+ standard protects this communi-cation between the CAM and the decoderchip with a copy protection system).
SW-based CAS
SW-based CASs are beginning to beaccepted in IPTV environments since,as there is bidirectional communication,authentication mechanisms can be es-
tablished that are not possible in a purebroadcast environment.
The main problem of a SW-based systemis the difficulty involved in providinghorizontal solutions, since it is basic forthe STB MW (where the SW-based CASworks) to be closely controlled (a CASmust be continuously updated to avoidpirac; in other words, it is much easierto break pure SW-based CASs, wherethere is no HW to hide secret codes).
4
7/31/2019 MPKF-WP-08002v1.7 KeyFly 2.0 White Paper English
5/30
SIDSA
Naming Conventions / Introduction
Basically, they are working in operatingenvironments with middle-to-top-of-the-range controlled STBs.
CAS based on proprietaryHW (chip)
This is undoubtedly the most secure solu-tion. It is based on the TS being insertedin a security chip and, with no exchangeof codes with the exterior (i.e. with asmartcard), it comes out decrypted (in
the future, when CI+ becomes available,even with copy-protection mechanisms).
SIDSAs KeyFly 2.0 system works witha high-security chip, the K1, which canbe found either embedded in an STB orin a CAM. This chip decrypts the progra-mmes users have the right to watch, byprocessing the ECM (carrying the keysfor opening the programmes) and theEMMs (carrying the users rights) thatare included in the TS itself.
This document will show the advantages of using a solu-
tion based on a security chip and will perform a benchmark
test with other CASs, demonstrating that, in many cases,
the solution is cheaper than smartcard-based solutions and
infinitely more secure.
Main hacks
Nowadays, there are two typical typesof hacking:
Discovering how the CAS works (with
access to the CAS program and keys).
Card-sharing.
The breach of the CAS usually occursdue to inverse engineering processes(less and less frequent) or due to themultiple integrations CAS manufacturersmake with STB, often manufactured inChina, which sooner or later reveal keyparts of the CAS, making it possible forit to be opened.
The Hacker industry is very powerfulindeed. Price competition (and this alsoapplies to the issue of card-sharing) isvery intense and manufacturers and dis-tributors need strong sales arguments.A STB that opens many channels freeis a good sales argument.
Card-sharing is worse. It is an atomic bombfor the industry. It is based on sharingsmartcards. Basically, the CAS is not brea-ched; what happens is that the communica-tion (which has a very low bitrate) betweenthe smartcard and the STB, carrying thekeys, is intercepted and sent over theInternet to other STBs (in some cases, theyare sent on data channels by satellite or byusing card-sharing gadgets at home).
5
CAS
STB
ContentSubs-
cribers
Market
SHR
Comp Tech
Pay TV
STB
Industry
Prices
STBMarket
SHR
Comp
Pay TV
Industry
STB
VendorsImporters Distributors Dealers
End Users
PC/CS
Piracy
Introducing sharing as
value added FeatureSTB
Market
Potential customers find it attractive offer,
many go for it
Noticeable shift of current subscribers
to sharing
7/31/2019 MPKF-WP-08002v1.7 KeyFly 2.0 White Paper English
6/30
SIDSA
Naming Conventions / Introduction
There are only two ways of fightingagainst card-sharing: A solution without a smartcard, e.g. theSIDSA solution based on a security chip.If there is no exchange of keys, there canhardly be any sharing.
Pairing the STB (or the CAM) withthe smartcard.
Problems with pairing
STB with smartcard:
The STB requires a safe area to securi-tise communications between the smart-card and the STB, but not all the decoderchips have this function. Therefore, it isnot a universal solution. Furthermore, itcould force STB manufacturers to use aspecific decoder chip in accordance withthe agreements between the manufactu-rer and the CAS provider.
Although breaching the communicationbetween the STB and the smartcard is acomplex business, it is possible and theproblem would remain. It would eitherrequire OTA to change the protocol or thesmartcard would have to be changed.
Pairing the STB with the smartcardis not useful for horizontal markets; it isuseful only for vertical markets, where theSTBs are strictly controlled.
CAM with smartcard:
The CAM requires a safe area to secu-ritise the communications between thesmartcard and the CAM; although not allthe CAMs have this function, in generalit is possible. Using a CAM does openup horizontal markets, since all it needsis for the STB (or the iDTV) to includea common interface slot (which is astandard feature, except for implementa-tion errors).
Although breaking into the communica-tion between the CAM and the smartcardis a complex business, it is possible andthe problem would remain. It would eitherrequire OTA to change the protocol or thesmartcard would have to be changed.
In greater detail:
Smartcard-based systems suffer froma potentially serious security problem.The problem lies in the communication
between the transport stream decryptionunit located in the decoder in an insecureenvironment and the smartcard, whichis, in principle, a secure environment, butwith a very simple physical interface.
A hacker could obtain the keys andalgorithms that determine the encoding ofthe communications in a hired receiver byreverse engineering and ultimately be ca-pable of obtaining the control words usedto encrypt the transport stream, which
6
Price29%
Brand31%
Features40%
Built-in cam25% PRV
13%
Sharing
33%
Other
13%
Friendlyuser 16%
Which comes first?
What features customers
look for?
Survey on satellite STB dealers in the Middle EastSource: Non-disclosable SIDSA partner
Transport Streamscrambled
STB with Smart
Card readerEncrypted keys SmartCard
Clear keysINTERCEPTABLE:
REVERSEENGINNERING
CARD SHARING
INTERNET
Card-sharing scheme
7/31/2019 MPKF-WP-08002v1.7 KeyFly 2.0 White Paper English
7/30
SIDSA
Naming Conventions / Introduction
are unique. The control words are knownwith a typical anticipation of approxima-tely 10 seconds, just enough time for apirate server on the Internet to publishthem for its subscribers.
Basically, these subscribers have systemsconnected to the Internet that use theappropriate programmes to receive thecontrol words in real-time and apply themto the decryption process of the transportstream without the need for any conditio-
nal access or contents provider device.
If the pirate subscriber uses a PC witha fast Internet connection, penetrationis unstoppable. The so-called pairingbetween the receiver and the smartcardwould not represent an effective counter-measure on the above scenario. The exis-tence of these so-called key servers iswell known, albeit true that they have notattained popularity owing to the existenceof other alternatives.
The above system reveals several
security problems:
1) Security is not actually end to endsince the transport stream deciphering de-vice is located in an insecure environment.The transport stream decryption processcannot be performed in the smart cardowing to its huge bandwidth requirements.The communication can be protected onlywith reduced security means as far as thedecoder software is concerned.
2) In the above system, there is no breachof the smartcard, but rather of the decodersoftware, which is much more insecure.Replacing the smartcard does not preventthe aforementioned attack.
3) The smartcard interface is the easiestoption for reverse engineering operations,for being copied by very cheap illegaldevices and for modifying the smartcardcontents with special commands.
4) The conditional access softwarecan only be fully renewed if it is donein the smartcard and in the decoder; normally, there are several decodermodels deployed, typically with diffe-rent hardware and software versions.In practice, in a traditional softwareplus smartcard system, it is extremelydifficult to change the software in all thecomponents. Only the software in thesmartcard can be changed.
However, with the K1 technology ofKeyFly 2.0, all the security functions areexecuted in a protected environment.Even if there is communication withan external card for any reason (notethat in KeyFly 2.0, there is no need forthis since all CAS function runs insideK1), it is made between two protec-ted environments. The only input andoutput points of the K1 are the transportstream and the user interface; there areno keys or rights on open
user interfaces.Furthermore, since conditional accessin KeyFly 2.0 is completely independentfrom the decoder software, there is realindependence from the manufacturer ofthe decoder. Even with different brandsof decoder, exactly the same softwarecan be used to change the full conditio-nal access on all the decoders.
Finally, KeyFly maintains the concept ofrenewable security. Secured OTA upgradeis done in order to update CAS software
in end-user devices (e.g. to add furthersecurity processing of keys) and to modifyhardware configuration of K1 (e.g. modifyconfiguration of decryption algorithms).These two methods ensure renewablesecurity at no cost.
Market trends
The figures given here are taken fromvarious market studies, mainly fromIMS research.
7
7/31/2019 MPKF-WP-08002v1.7 KeyFly 2.0 White Paper English
8/30
SIDSA
STB or iDTV
Integrated digital televisions (iDTV) aregaining ground on STBs. The new plasmatechnologies, LCD and DLP allow screensizes and quality levels that are far superiorto traditional television sets, which makespeople buy them (the push from DVDs andHD DVD/Blu-ray is also important for thepurchase of an iDTV) and the integration of
digital receivers is simple (a near insigni-ficant cost in comparison with the otherelectronics and the screen).
Besides the adoption of TDT, govern-ment mandates (in Europe, it is obliga-tory for iDTVs to include TDT) and fallingtechnology prices have boosted sales.113.1 million units are expected to havebeen sold by 2012, with Western Europetaking a share of 31.6%.
However, iDTVs are still limited by the
entry barrier of cost and there is a greatpossibility of only the TV set in the livingroom being an iDTV while the others aremuch cheaper traditional TVs with a STB.
There are also STBs that involve a highervalue-added than iDTVs, such as PVRfunctions, programme recommenders/finders, interactive services, etc. In addi-tion, certain STBs are evolving into homemedia centres, which is a complicatedgoal for iDTVs in the short-mid term.
H264.AVC and HDTV
Europe and the Middle East are expectedto become the second-largest HDTV mar-ket in the world thanks to satellite on theone hand and to the planned launches of
HD in TDT in Europe.
H264.AVC will gradually replaceMPEG-2 over the next five years,although many new launches of TDThave already begun with H264.AVC.High-definition TV marks the differencewith multichannel standard-definition TV.The best content is therefore expected tomove over to HDTV (sports, film premie-res, etc.) and, in many cases, the contentwill possibly be pay television.
The common interface (CI)
The CI is enjoying a second youth and,as will be shown in later chapters, it isbeginning to be more interesting for ma-nufacturers to include a CI rather than asmartcard reader and reach agreementswith CAS providers to include their pro-prietary protocols.
In addition, the price of CAM in compa-rison with middle- or top-of-the-range
8
600
500
400
300
200
100
0
2004 2005 2006 2007 2008 2009 2010 2011 2012
Prediction of worldwie receiver grown
600
400
200
0feb07 mar07 abril07 mayo07 junio07 julio07 ago07 sep07 oct07 nov07 dic07 ene08 feb08
191
118
186
133
161
109
219
132
202
111
248
129
207
129
225
154
314
166 127
291
429
257
433
252
337
141
iDTV vs STB in spanish market(monthly sales, in thousands)
STB iDTV
iDTV vs STB in spanish market: accumula-ted sales per year (in thousands)
4000
3000
2000
1000
02500 2600 2700 Feb 2008
STB iDTV
2560
858
3789
4341 4734
4559
Naming Conventions / Introduction
iDTV
STB
DVD
7/31/2019 MPKF-WP-08002v1.7 KeyFly 2.0 White Paper English
9/30
SIDSA
Naming Conventions / Introduction
STBs or iDTVs is beginning to becomeirrelevant (as happened with middle- orlow-range STBs or zappers).
CI+
The strength of the common interface(in general, iDTVs incorporate CI baysand not smartcard readers) is making theindustry take the current voids of the CIstandard very seriously. Basically, the TS(transport stream) arrives encoded from
the CAM (through the CI) and leavesclear from the CAM to the decoder(through the CI). Nowadays, it would bemore than possible to capture the TS andresend it over the Internet. Accordingly,CI+ is being standardised. By means ofa copy protection mechanism, it encodesthe communication between the CAMand the decoder chip.
The industry is waiting for CI+ to make afirm commitment to value contents, such as
high-definition content (which, in any case,also requires new equipment in homes).
Smartcard systems vs.systems without smartcards
Basically, this section compares smartcard-based CASs with CASs based on securitychips, such as KeyFly 2.0. We do notmake a comparison with software CASs(such as DCAS, i.e. downloadable CAS).
Security
Smartcard-based: traditionally, all thesmartcard-based CASs have been hac-ked. The solution involves changing all thesmartcards. Examples: some CAS ven-dors recommends changing them every18 months while other systematically re-commends changing the older smartcards(to avoid macro-substitutions); further-more, on markets where smartcards arecontinuously being taken out and insertedin the STB, there is a high fault rate (they
break easily).
In addition, smartcard-based CASs areprone to card-sharing.Security chip: unlike smartcards, whichrequire communication with the devices(CAM or STB), the security chip containsall the elements in the chip itself, whichprevents reverse engineering (apart fromtamper-resistant mechanisms). Besides,the fact that both its HW (part of it) andSW can be reconfigured by OTA, there are
virtually millions of countermeasures (forpossible hacking) that can be applied wi-thout the need for any physical change. Inaddition, the system is completely immuneto card-sharing.
OTA (over-the-air updating)
Both systems can perform OTA. However,once the keys have been discovered, thesmartcard needs to be replaced, but thechip HW can be reconfigured and a new
CAS loaded and no replacement is neces-sary to set up a new CAS system.
Business models: PPV,subscriptions, etc.
Both support all models.
Embedded rights
Both support embedded rights.
Single multi-operator card
Both support single multi-operator cards,although the system without a smartcard isa virtual card.
Value-added applications withelectronic IDs
Systems that use smartcards cannot per-form simultaneous value-added applica-tions that use electronic IDs since the SIMreader is occupied by the CAS. However,
9
7/31/2019 MPKF-WP-08002v1.7 KeyFly 2.0 White Paper English
10/30
SIDSA
Naming Conventions / Introduction
with a system based on the security chip,such as KeyFly, it is possible, since thereader is not used (e.g. the smartcard rea-der in the CAM, although a KeyFly CAMwithout a smartcard reader is possible toreduce costs).
Cost
See the following section; however, by wayof summary, the systems based on a secu-rity chip are generally cheaper than those
based on a smartcard.
Breakdown of CA costsin receivers
What consumer equipment is necessary towatch pay-TV?
STB with embedded CAS (+ smartcard)
STB with CI plus a CAM (+ smartcard)
iDTV plus a CAM (+ smartcard)
STB with a patch hacked to watch freepay-TV
STB-sharing generally with an Internet con-nection to obtain the keys.
NB: the pirate systems are in italics... No further
details will be given...
A STB with an embedded CAS must haveimplemented the CAS in the STB SW;
in other words, the manufacturer mustpurchase a licence, pass the certificationtests and pay a licence for each unit soldto the CA provider. Furthermore, the CASsoftware must be regularly updated (as acountermeasure) and the service is alsousually charged (maintenance). Of course,the STB must include at least one smart-card reader.
For including a CI Bay, the manufac-turer does not have to pay any licence
or have any contact with CA vendorsat all. All that is necessary is a CAM, aCA module that is generally availablewith a smartcard reader and is capableof communicating with the smartcard.In this case, the CA vendor only hasto provide an interface with the CAMmanufacturer instead of with all the STBmanufacturers (or iDTV manufacturers).The situation is much more controlled.Pairing is much easier and the possibilityof horizontal markets is also opened.
In the CAM, there is a TS processorchip with a decrypter (DVB CSA: com-mon scrambling algorithm). The SW thatcommunicates with the smartcard runsin the said chip.
Depending on the CAM, the STB willhave more or fewer capacities: it will beable to perform multi-descrambling, havea dual or single smartcard reader, etc.There are CAMs that support several
CASs at the same time.
In a system without a smartcard, such asKeyFly 2.0, the said chip, which in thecase of SIDSA is called K1, also inclu-des highly protected internal memoriesand a greater processing capacity toinclude the CAS without the need fora smartcard. In other words, it is like aCAM chip with a SIM in it.
Cost comparisons in reception:
(these comparisons exclude platformlogo costs, which are commercial oppor-tunity costs).
Costs are calculated for minimum quan-tity of 100.000 ud.
STBs with smartcard vs. STBswith CI
STB with smartcard reader
10
7/31/2019 MPKF-WP-08002v1.7 KeyFly 2.0 White Paper English
11/30
SIDSA
Naming Conventions / Introduction
NRE certification CAS: between200,000 and 15,000 (plus the costof own development staff). This costmay be negligible when consideringbig quantities.
Upgrades, CAS support: between10,000 and 3000 per annum.
CAS licence per unit: between $0 and$10 (depends largely on the market).
Smart Card renewal is estimated each18 months. Smart card cost depends onquantities and other commercial factors.
Smartcard reader: approximately $1.30.STB with CI
CI bay: approximately $2.
CAM: CAM cost depends on quanti-ties. CAM cost includes CAS license.
In other words, for an extra 0.70 USDin HW, the manufacturer avoids all theintegration problems with CAS vendors.
However, for the pay-TV operator, themost secure option is undoubtedly theinclusion of the STB with CI.
Overall CAS cost in reception,solution with smartcard
STB
STB: Smart card reader. CAS license. Smart card: two units, after 18 months.
CAM
STB (or iDTV): CI bay. CAM Smart card: two units, after 18 months.
Overall CAS cost in reception,solution with KeyFly 2.0 CAMSTB or iDTV
STB (or iDTV): CI bay CAM.
Overall CAS cost in reception,solution with embedded KeyFly2.0 (K1 chip)
STB
NRE: Integration of K1 in STB. Thereference design is similar to a CI, butwith the SIDSA chip instead of the CI. Asin the case of the smartcard system, thecost in the bill will be negligible if conside-ring big quantities.
STB: K1 chip cost and related circuitry.
Smartcard reader (optional, not neces-sary with KeyFly CAS).
Cost comparative table (after 18 monthsservice and for large sales of devices).NB: Does not include the cost of the STB
or the iDTV itself, only the extra charge ofthe CA.
To conclude, systems based on a securitychip are cheaper than those based on asmartcard reader and they also have agreater level of security.
11
Overall cost calculated after 24 mon-ths business plan (typical renewal ofSC every 18 months)
Overall CASdevice Cost
KeyFly 2.0CAS
Smarth Card
Based CAS
KeyFly 2.0 embedded in STB
STB/iDTV CAM KeyFly
2.0 (CI)
STB with Smart Card
STB/iDVT with CAM (CI)
7/31/2019 MPKF-WP-08002v1.7 KeyFly 2.0 White Paper English
12/30
SIDSA
About KeyFly 2.0Xtreme
KeyFly 2.0Xtreme (herinafter KeyFly 2.0or KeyFly) is an advanced conditionalaccess system that can be adapted tothe various technical and commercialoperating environments required bydigital television broadcasting systems.KeyFly is particularly adapted to horizon-tal markets, such as TDT.
The system is based on SIDSAs broadexperience in the development of ASICsfor cryptographic applications, conditio-
nal access and digital television. SIDSAis a conditional access provider capableof developing its own in-house ASIChardware solutions for the problem ofpiracy that affects digital TV.
KeyFly has been designed spe-
cifically to support the following
specifications:
Multiple client-side solutions. KeyFlysupports smartcards, CAMs with inte-
grated security (without smartcard), STBreceivers with integrated security.
Interoperable and independent fromheadend equipment manufacturers andbased on open standards.
Easily extendable, with support startingfrom a reduced number of subscribersand fully scalable.
Supports distributed subscriber mana-gement, allowing another organisation to
assume responsibility for distributing theaccess system (billing, etc.).
Modular, with support ranging fromsimple subscription systems (not basedon subscriber identity) to PPV.
Interfaces with flexible subscription,including the Internet, SMS messages,call centers, etc.
Multiple client-deployment options, from
support for common interface technologyto integrated decoders.
Implementation of scalable security.
Brands:
- KeyFly 1.0: CAS currently beingdiscontinued, with devices based onMACtsp I chip.
- KeyFly 2.0Xtreme: CAS that incorpo-
rates CAM devices or the embedded K1chip only.
- KeyFly+: future CAS (roadmap Q4-2008/Q1-2009) compatible with CI+. Itwill use the K2 chip.
- KeyFly CI ready: If the product incor-porates a common interface port that hasbeen tested by SIDSA as compatible withour CAMs.
-KeyFly empowered:
The product in-corporates the Kx chip inside (both STBsand CAMs).
CAS devices:
- MACtsp I: TS processing chip. Discon-tinued except for KeyFly 1.0.
- Kx: family of conditional access chips.Current chip: K1. Scheduled for Q3 2008,the K2 supporting CI+.
- Easy CAM: CAM that does not includea smartcard reader, only supports KeyFly2.0. Decrypts two services.
- Single CAM: CAM that only incorpora-tes KeyFly 2.0 and a smartcard reader tosupport electronic ID reading. Decryptstwo services.
- Dual CAM: CAM that includes KeyFly2.0 and the CAS of a licensed manufactu-rer. Decrypts two services.
12
7/31/2019 MPKF-WP-08002v1.7 KeyFly 2.0 White Paper English
13/30
SIDSA
About KeyFly 2.0Xtreme
- Triple CAM: (roadmap Q4-2008)CAM that includes KeyFly 2.0 andsupports two licensed CASs. Incorpo-rates a dual smartcard reader. Decryptstwo services.
- CAM PRO: Professional CAM, de-crypts all the TS services simultaneously.
All the CAMs support HDTV, MPEG-2and H264/AVC. They also incorporatesecure OTA.
Description of the System
KeyFly has been designed as a modern,flexible conditional access system thatadapts to the various technical and com-mercial operating environments requiredby digital TV broadcasting systems.
KeyFly follows the definition of the DVBfor conditional access systems, i.e.security divided between a common
scrambling algorithm, approved by theDVB and safeguarded by the ETSI,which SIDSA is authorised to use ac-cordingly, and a high-security encryptionsystem developed and owned by SIDSA.
On the receiver side, the KeyFly systemis based on hardware circuits designedspecifically by SIDSA for this purpose.The circuits allow the deployment of thesystem without the need for smartcards,but retaining all their flexibility.
The K1 is the latest security device forprocesing DVB Digital video developedby SIDSA. It is the only solution on themarket in which all the security opera-tions on the client side, from right-ma-nagement to the decryption of the DVBstream, are carried out in one singletamper-resistant chip with RAM and in-ternal FLASH and proprietary algorithmsdirectly on the hardware. The K1 can beused embedded in the decoder or in acommon interface module.
Besides the proprietary hardware te-chnology as a security support, KeyFlyuses cryptographic algorithms andproprietary keys management systems,as well as an innovative traitor-tracingtechnique, which enables the rapid iden-tification of compromised devices andtheir rejection in the system, excludingthem from key renewals.
KeyFly also uses cutting-edge technologyfor system and database management,
using Web interfaces and XML-SOAPtechnologies to allow the integration withthird-party systems for business mana-gement. The interfaces with purchasingchannels and other systems are managedwith separate modules, which means thatthe system can be configured to meet theoperators requirements.
Architecture
The figure shows KeyFlys main software
modules. The figure is used as a referenceonly for the dependencies and communi-cations between the different modules anddoes not indicate the number of machinesor instances of modules on which theyrun. Depending on the size of the system,all the modules can run on one single ser-ver or be distributed on several machinesfor performance reasons.
The ECMG and the EMMG are the twocomponents that connect with the mul-tiplexer. The connection interface they
follow is Simulcrypt, which allows otherconditional accesses to coexist withKeyFly and not restrict the operator whowishes to migrate to other systems, whichwould require a change of equipment. Inaddition, the Simulcrypt standard ensurescompatibility for a wide range of headendequipment available on the market.
The function of the ECMG is to transmitthe ECMs, right-control messages that in-dicate the access conditions that apply to
13
7/31/2019 MPKF-WP-08002v1.7 KeyFly 2.0 White Paper English
14/30
SIDSA
About KeyFly 2.0Xtreme
SIDSA
a specific content and the keys with whichit is encrypted. The EMMG transmits theEMMs, right-management messages thattransmit the new access conditions (aka.rights) to a client device or a group ofclient devices.
The cryptoserver (CS) is a centralisedcryptographic operations unit. All thecryptographic operations on the systemare carried out by this module, which alsohas tamper-resistant devices to prevent
the illegal extraction of keys by employeeswho are disloyal to the operator. The cryp-toserver uses techniques established inthe field of banking for operation security.
The SAS is the component that builds theEMMs and manages the ECM-generationconditions. Unlike other conditional acces-ses, the SAS does not have databases.
The DS is the component responsiblefor the software downloads on the client
devices. The KeyFly monitor is an applica-tion that can be executed remotely on anymachine and monitors the status of theabove components.
The said above components (SAS, DS,CS, ECMG, EMMG and KM) constitutethe KeyFlyCORE, which is essential foroperating a conditional access system inits most basic configuration. This configu-ration does not handle client databases(anonymous users) and the rights areawarded for a set period when the decryp-
tion device is purchased. The channels arenot managed dynamically and only theirbasic configuration is accepted.
In a distributed environment, such as DTTnetworks, each headend would includea KeyFlyCORE that would communicatewith a KeyFlyCORE master and the KeyFlyCRM for user control, etc.
14
7/31/2019 MPKF-WP-08002v1.7 KeyFly 2.0 White Paper English
15/30
15
GraphiteSMS Mobile
Gateway
GraphiteCustomersWeb Portal
GraphiteOperator
Portal
Graphite Subscri-ber Manager
Third partyCRM/BSS
Data base:Customer infoCA infoOPS tracking...
KeyFly System
Crypto Server
SAS ECMG
EMMG
DS
KeyFly Monitor
KeyFly Manager
Headed components
MODULATION andDISTRIBUTION
CHANNEL (DVB-S,DVB-C, DVB-T)
SIMULCRYPT
MULTIPLEXERSCRAMBLER
ENCORERCONTRIBUTIONVIDEOSERVER
Customer permises components
STB KeyflyEmbedded
IDTV/STBwith CI
CAM
Horizontal market(common interface)
Vertical market:Embedded STB
This figure depicts the depen-dencies among components.Actual system may vary innumber of instances of com-ponents and machines.
GraphiteBankingInterface
7/31/2019 MPKF-WP-08002v1.7 KeyFly 2.0 White Paper English
16/30
SIDSA
About KeyFly 2.0Xtreme
KeyFlyCORE and KeyFly Manager makesup KeyFly System, which provides a com-plete set of features that enable operatorsto protect their content and to manageKeyFly CAS.
KeyFly Manager is a module that enablesthe tracing of all the operations perfor-med on the client devices. It allows themanagement of rights and the creation ofproducts, but it does not have commercialinformation about the client. With KeyFly
Manager, it is possible to know everythingthat happens in the conditional accesssystem and it also provides an additionallevel of system control.
Graphite Subscriber Manager increa-se functionality by providing additionalmanagement and business models andpurchasing interfaces. Technologies basedon application servers and Web serverswith XML-soap interfaces are used toenable customisation tasks, improve the
user interface (which does not requirespecific interface applications) and scaleup performance. These technologies arealso widely adopted for the developmentof business applications.
Graphite Subscriber Managerenables thecommercial operation of the system itself,including the management of operationswith the client, package definition and datause. It is readily adaptable and can assumebusiness rules and connect with otherinterfaces on interactive application servers
and return channels. Several interfaces areprovided for operating Graphite. Graphi-te Operator Portal for distributors or callcenter agents, Graphite Customer WebPortal, for end users that perform basicoperations, and Graphite SMS MobileGateway, for managing operations comingfrom Mobile phone such us scratch-cardactivation. Finally, Graphite BankingInterface is used for connecting GraphiteCustomer Web Portal to a Bank Gatewayfor credit card purchase. A database ser-
ver provides storage services for GraphiteSubscriber Manager and KeyFly Manager.It is also possible to carry out data-miningoperations with the information available inthis database.
On the other hand, integration between Key-Fly System and existing Business SupportSystems (BSS, aka. Back Office) or third-party Subscriber Manager is straightforwarddue to standard XML interface.
As indicated earlier, depending on the sizeof the system, all the modules can run onone single server or be distributed on di-fferent machines for performance reasons.KeyFly is perfectly scalable in accordancewith the operators requirements.
KeyFly has been designed in modulesthat can be added to a basic configu-ration to provide more features. Thesefeatures make KeyFly particularly attrac-tive for TV operators that are entering
the market and want an alternative that isindependent from existing CAS opera-tors and plan to introduce new businessmodels in the future.
End client devices
KeyFly is supported on ASICs (Applica-tion-Specific Integrated Circuits), develo-ped by SIDSA itself, which permits to takeadvantage of microelectronic technologyfor system usability and security.
SIDSA has developed the following ASICsfor conditional access support:
MACtsp I (in phase-out). This wasthe first-generation device for CAMs.The first to have an internally embedded32-bit microprocessor.
K1. The first device for common inter-face modules and receivers to includeintegrated RAM and Flash, with internalproprietary cryptographic devices and a
16
7/31/2019 MPKF-WP-08002v1.7 KeyFly 2.0 White Paper English
17/30
SIDSA
About KeyFly 2.0Xtreme
capacity for processing the entire con-ditional access from rights managementto transport stream decryption withoutdelegating in third-party hardware orreducing security due to the fact thatit is a tamper-resistant system. The K1is integrated in a STB without affectingsystem security since no informationis provided to the receiver on how todecrypt the content or how to sendmessages (ECMs or EMMs) to the smartcard, as occurs in traditional conditional
access systems.
CAMWatch. Integrated circuit forintegrating the common interface (CI) inthe receivers. In other words, it allows adual CI.
K2 (at design stage; scheduled forQ3-2008). The next generation of the Kxintroduces support for CI+, Opencard,MHEG-5 interactivity.
The final market format includes a verywide range of system implementations:
In CAMs (PCMCIA) that allow anySTB or iDTV receiver fitted with a com-mon interface bay to support KeyFly. TheKx-based CAMs do not require the useof smart cards (even though they couldbe deployed as an option, since it is aCAM chip; indeed, SIDSA has a line ofbusiness for the sale of CAMs for otherCAS providers), with the consequentreduction in the price of the system, in
its deployment on horizontal markets.
Embedded in STBs. The K1 isintegrated in the receivers. Indicated es-pecially for vertical markets or for a verylow-cost STB with conditional access.
Security
Security is the main feature on whichthe KeyFly conditional access system isbased. A smart card based conditional
access system is only as secure as thesecurity of the software in the receiver.The receiver is exposed to anybody whowants to change the software to obtainprotected content illegally. KeyFly 2.0 isbased on the K1 MPEG processor chip,designed and developed entirely by SID-SA. The chip has been designed fromthe experience obtained by SIDSAsengineers in the field of cryptographyand conditional access over the last10 years.
The K1 in the receiver, whether in aCAM or embedded in STB, provides afully protected environment for conditio-nal access software. The K1 has internalFLASH and RAM memory that is protec-ted from illegal access. This means thatto change the software inside the chip,you must have the cryptographic toolsrequired for the system to accept newsoftware; this means that changing thesoftware illegally is almost impossible.
The K1
architecture is such that accessto the internal chip memory is virtuallyimpossible. This feature has been widelytested to ensure a very high level of trustin the chips capacity for protecting theinternal memory from hackers.
Scalability
Scalability is the capacity for adjusting thesystem based on the continuous growth ofclient subscriptions. The basic system con-figuration is limited in the maximum number
of subscribers supported. This limitation isbased on physical limitations of the databa-se system and system performance. Thephysical limitations are the encryptors pro-cessing capacities, the server running allthe KeyFly System software and the serverrunning the Subscriber Manager.
KeyFly is completely scalable and su-pports multiple instances of its elements toimprove performance.
17
7/31/2019 MPKF-WP-08002v1.7 KeyFly 2.0 White Paper English
18/30
SIDSA
About KeyFly 2.0Xtreme
Modularity
KeyFly is modular in that certain functionscan be implemented depending on theclients requirements. If the client requiresminimum functionality, there is no need todeploy all the KeyFly systems modules.
Types of rights
From the point of view of the conditionalaccess system, there are three types of
rights over product consumption:
Subscription. Pay per view (session). Pay as you watch.
There are also two sources for awardingrights: Subscriber Manager (by means ofany of its gateways) or electronic purse or(which is also reloaded from the Subscri-ber Manager). Contents can be watchedsimultaneously using various forms of
consumption as chosen by the channeloperator. For example, content couldbe watched because it forms part of thesubscription or, at the same time, becausethe viewer pays using his purse (i.e. iPPV).
From the users point of view, there arethree types of purchases (which are ca-rried out on the Subscriber Manager):
Subscription to one or more channelsfor a specific period.
Purchase of a number of events of a cer-tain type (e.g. purchase of 10 action films).
Reloading the purse with a certain amount.
When viewing, the viewer can see a chan-nel because:
a) He has a valid subscription.
b) He has events of this type available (hebought 10 films). When he turns to the
channel, he authorises the deduction of 1event of this type.
c) He has sufficient credit in his purse.When he turns to the channel, he authori-ses the charge.
The charges are authorised through aspecific menu.
Subscription
Accordingly, the user can watch the con-tent if he has the right on the date on whichthe content is broadcasted. Subscription isdetermined by an identifier, a start date andan end date. The user pays for the viewingperiod and there is no control over whetherhe views everything or nothing during theterm of validity. Rights for consumption du-ring subscription can only be awarded fromSubscriber Manager or third party BSS.
Once special subscription system is auto-
subscription, in which the main parameteris the term of the subscription. The startdate is set when the consumer uses thecontent for the first time and the end dateis set automatically in accordance withthe term. This special type of right canonly be awarded when the card is issued.This right cannot be sent from an SMS.
Pay per view (session)
In this mode, users can view contentspecified by sessions. Session is the
content viewing unit, e.g. a complete filmor a chapter of a serial. Each viewing unitis marked by an identifier (event-ID). Theuser is charged for the number of viewingunits consumed. The user can changeto another channel and return to the paychannel without being charged again ifthe content corresponds to the one hewas charged for previously. This modeof consumption has maximum dates forconsuming the purchased content.
18
7/31/2019 MPKF-WP-08002v1.7 KeyFly 2.0 White Paper English
19/30
SIDSA
About KeyFly 2.0Xtreme
This mode of consumption has twosubtypes: impulsive and non-impulsive.In the impulsive subtype, the productis contracted from the purse, whichdiscounts the corresponding value. Inthe non-impulsive subtype, a number ofviewing sessions are charged exclusivelyfrom the Subscriber Manager.
The content is not automatically pur-chased simply because the user hascredit. The system asks the user for
express permission to purchase this typeof content. The system asks the userfor permission to watch a purchasedevent or for acquiring the rights for theviewing, charging the cost to the electro-nic purse.
Pay as you watch
In this mode, users can watch an event andpay as they watch it, e.g. if they watch 5minutes, they pay 5 cents and if they watch
10 minutes, they pay 10 cents. The cost ischarged exclusively to the electronic pursewhile the content is being viewed. The con-tent indicates the costs per ECM (time unit)charged to the user.
The content is not automatically purchasedsimply because the user has credit. Thesystem asks the user for express permis-sion to purchase this type of content.
KeyFly business model
development
With its modular structure and particularitiesthat can be performed on Graphite Subs-criber Manager or, in some cases, only ona third party Business Support System, theKeyFly architecture allows the developmentof different business models in accordancewith the type of rights indicated above, butwith interfaces with different means of pay-ment. The following are a few examples (NB:hereinafter, we refer to embedded K1 and
CAM devices as virtual cards):
Completely anonymous users with subs-cription rights or tokens on the virtual cardwith no update.
User who is anonymous with regard tothe operator but who reloads rights with acredit card on a bank gateway.
User who is anonymous with regard tothe operator but who reloads rights using
a mobile telephone. User known by the operator with aclassic subscription, interactive access tocontents via a return channel and charge toa bank account.
KeyFly has a mechanism for awardingrights that is particularly appropriate formanaging requests under low EMMbandwidth requirements and cryptographicprocessing. This provides technological
support for business models based on thePPV purchase of contents, with a shortresponse time between the request andthe right being awarded.
Besides straightforward conditionalaccess support, KeyFly supports theoption for implementing messaging andbartering services without the need fordeploying middleware in the decoders.Users can receive messages and viewthem on their own receivers. Thesemessages are usually sent from the
operator to the end user or to groupsof users.
Product generation system
The products are generated prefera-bly on the CRM and, if the CRM is notavailable, on the SMS. The products areconfigured in order of hierarchy: defi-nition of services, definition of productpatterns, definition of product and defini-tion of offer.
19
7/31/2019 MPKF-WP-08002v1.7 KeyFly 2.0 White Paper English
20/30
SIDSA
A service is a channel that is to be en-crypted. A product pattern correspondsto a combination of services linked to aright or purse consumption. A productis a refined product pattern with expiryor duration dates. An offer is a productwith a price.
The end clients purchase offers, whe-reas system administrators define thepurchasing conditions and hierarchy thatultimately define a product. This system
affords great flexibility to the creation ofthe commercial terms and conditions fora product.
KeyFly support in the set-top box
KeyFly uses the K1 chip as a securitysupport, embedded in the STB. The K1is the only device that handles the de-cryption, rights and all the cryptographicoperations. It has embedded RAM andFlash, as well as proprietary cryptogra-
phic elements for maximum security. TheSTB manufacturer has no informationabout the procedures that control theencryption of the content.
KeyFly commercial parameters
The typical commercial specificationsare as follows:
Number of providers: 4
Number of subscription rights per
provider: 21
Number of PPV rights per provider: 10
Number of associable rights perstream (service): 30
Number of different rights: 65,536
Number of different events for thesame right: 65,536
These parameters can be adjusted befo-re production.
Central server architecture
As indicated previously, all the manage-ment software uses application serverand web server technology, whichmakes it easy to increase the numberof features and also provide a uniqueinterface for other applications and for
a human interface. The system can becontrolled simply with a web browserwith access to the KeyFly network. Ausername and password system controlsthe operations that can be performed byeach user. The Web communications areprotected by https.
20
About KeyFly 2.0Xtreme
7/31/2019 MPKF-WP-08002v1.7 KeyFly 2.0 White Paper English
21/30
SIDSA
KeyFly 2.0Xtreme FAQ
Conditional access systemspecifications
General
Does KeyFly support smartcards?
Yes, KeyFly 2.0 has a smartcard imple-mentation, but it is not the recommendedmethod. KeyFly 2.0 is based mainly on acryptographic chip, the K1, for the comple-te rights management and the decryption
of protected contents. This is the greatdifference between KeyFly 2.0 and otherconditional access providers.
The K1 is a chip developed by SIDSA withthe following specifications:
Integration of Flash and RAM in the devi-ce. The chip has securitisation mechanismssimilar to those used in smartcards, butalso based on proprietary systems.
Decryption of the transport stream in thedevice, without the need for communica-tion with other devices for transporting thecontrol words.
Integration of cryptographic algorithms inhardware, some of which are proprietary,which prevents their reserve engineering.
Common interface support and supportfor communications with smartcards.
The K1 is supplied embedded in a common
interface module or it can be integrated inthe STB.
When do the client devices have to
be replaced?
Intrusion in the K1 chip is consideredalmost impossible due to its specifications.The K1 is not a generic smartcard device,but rather it has been specifically desig-ned to protect the transport stream. Thecontrol words are protected by proprietary
algorithms implemented directly on thehardware, as well as others implementedin software. SIDSA considers the reverseengineering of the said hardware algori-thms almost impossible: there is no CASsoftware that can be read and ported toanother processor. In addition, part of theHW can be reconfigured by OTA so that,even if the HW was emulated, SIDSAcould change it through OTA on all thedevices deployed.
The latest techniques used in hackingconditional access systems are basedon the publication of the control wordsthat protect the encrypted content overthe Internet. This technique is based onattacking the systems weakest point,which is the communication of the con-trol words between the smartcard andthe STB.
As the STB is not an intrinsically securedevice, it is relatively easy to extract the
algorithms and keys that protect the saidcommunication. Once the communicationin one single device has been broken(note the number of receiver manufac-turers and models), the entire system isseriously compromised. There are spe-cially designed receivers that connect tothe Internet to download these keys andapply them to the transport stream theyreceive. The popularity of ADSL linesmeans that this attack is very viable.
The replacement of the cards does not
solve the problem because to change thealgorithms that protect the communicationwith the smartcard it would be necessary toupdate the receiver firmware, which is notviable as there is no one common modelof machine (as is the case with standardWindows-PC architecture). Replacing thecards could only solve the vulnerable pointsof the card itself. The use of the K1 avoidsthe communication of control words and,therefore, eradicates the main weaknessthat affects all conditional access systems
21
7/31/2019 MPKF-WP-08002v1.7 KeyFly 2.0 White Paper English
22/30
SIDSA
KeyFly 2.0Xtreme FAQ
for smartcard-based broadcast systems.In the hypothetical case of a penetration inthe K1, as there is only one single executionplatform, the complete, continuous OTA up-dating of the conditional access is possibleand makes life very difficult for hackers. Inpractice, this increases the service life of thesystem, avoiding the need for renewing thedevices that have been deployed.
How is the user identified
for purchases?
The system uses the card serial numberas identification for purchasing by any pa-yment channel; however, the card serialnumber can be associated with a mo-bile telephone number so that the SMSpurchase message is shorter. In addition,the same mobile telephone number canbe used as an identifier for purchasesby other payment means. The associa-tion with the mobile telephone numberenables the identification of the device
that is to be reloaded.
Which commercial models are su-
pported? Subscription, PPV...? How
are the products organised?
KeyFly supports the following commercialmodels depending on the Business Su-pport System or Subscriber Manager used.
KeyFly supports PPV (also referred to asordered PPV), i.e. the sending of a GSM-SMS to request access to a content.
The system sends to the user devicean EMM, enabling the decryption of thecontent for him. This method providesexhaustive control over the real audienceof the contents.
In addition, PPV by electronic purse (iPPV)is also supported. This does not require thesending of EMMs for consuming the event,but it does require EMMs to be sent forreloading the purse on the client device.
The subscriber subscription model is alsosupported by KeyFly.
With KeyFly, an offer can group togetherseveral products, which are assigneda price. The prices do not apply to theproducts, but rather to the offers, as anaggregation of products. Discounts or 2x1are configured as offers of various productswith a specific price.
Can different commercial models be
supported on the same channel?
KeyFly is capable of offering the sameevent under subscription and by PPV. It canapply up to three commercial models to thesame event.
How much bandwidth is taken up
by the EMMs? Can I send EMMs to
user groups?
KeyFly allows the sending of rights to client
devices in groups or individually.
The EMMs to one single user have a typicallength of 376 bits, whereas the EMMs sentto a group have a length of 1193 bits. Theuse of one type of routing or another isfully configurable in the system. The criteriafor using one or the other depends on thepopulation to which the right is sent.A group EMM can be sent to 1024 usersdirectly. In this group, each user can bedistinguished individually.
On a scenario with 2 million users, assu-ming a bit rate of 150 Kbps for EMMs bymultiplex and 1 PPV service operating onthe multiplex, assuming that all the rightsare sent by group EMMs:
Number of group EMMs =
22
Numbers UsersxNumber Rights
1024
2000000x1
1024= 1,954=
7/31/2019 MPKF-WP-08002v1.7 KeyFly 2.0 White Paper English
23/30
SIDSA
KeyFly 2.0XtremeFAQ
Bit rate to be sent:1,954x1,193=2,330,078 bits.Delay time in sending the EMM carousel= 18,640,625/150,000 = 16 seconds.
What effect does the number of
users and channels have on KeyFly?
Is KeyFly scalable?
The number of subscribers does not havea significant effect on the system due to thelow storage requirements per system user.
The number of channels does not have asignificant effect on the size of the system.
What actually determines the size ofthe system is the number of transactionsper second that have to be processed.This is the most critical element of thesystem configuration. The number ofrequests per second also affects theGSM-SMS service provider for the sizeof his system.
Integration in DVB-T headends
Which multiplexers can work
wi th KeyFly?
KeyFly has been approved by the fo-llowing multiplexer manufacturers:
Harmonic, Thomson-Nextream, Tandberg,Scopus, Streamtel, Adtec and, of course,SIDSA itself. It has integration certificateswith Thomson and Tandberg. However,the capacities of the units made by the
aforementioned manufacturers may varysignificantly with regard to the number ofconditional accesses per service, numberof conditional accesses supported andthe dynamic access criteria manage-ment or encryption (scheduling). With allthe abovementioned manufacturers, theSI tables are generated in the multiplexer.
As no proprietary signalling is used in thetransport stream, KeyFly does not requirespecific table generators. On the basis
of previous experience, SIDSA considersthat there should be no integration pro-blems regarding other manufacturers notincluded on the above list.
KeyFly does not need to generate pro-prietary describers in the EIT tables.There are two methods for controllingopen-to-closed transitions and vice versa:
The multiplexers have multiplexerconfiguration scheduling applications,
including whether the programme isencrypted or not and the access criteriathat affects the service. These applica-tions are the multiplexer manufacturersproprietary applications.
The multiplexers implement the exten-sions laid down in Simulcrypt 1.3.1 for anexternal management system to com-mand the access criteria and the open-to-closed transitions and vice versa.
KeyFly does not control open-to-closedtransitions at any time. This is carried outby the Event Information System (in thecase of Simulcrypt) or the multiplexerconfiguration scheduling applications.
KeyFly does not restrict the combinationof PPV events with free broadcast eventsin the multiplexer.
Can KeyFly manage several hea-
dends at the same time?
The KeyFly platform is capable of simul-taneously managing several headends.However, the only interface supportedis the one laid down in Simulcryptv1.3.1. Other interfaces would requirespecific development.
Does KeyFly support distributed
multiplexing?
KeyFly supports distributed multiplexingmodels in such a way that a central
23
7/31/2019 MPKF-WP-08002v1.7 KeyFly 2.0 White Paper English
24/30
SIDSA
KeyFly 2.0XtremeFAQ
infrastructure can establish commu-
nications with other headends that
operate with provincial, regional or
local cover, as well as a headend at
state level.
In the case of distributed headends, theproposal normally involves the installationof servers with ECMG, CS and EMMGfunctions on the remote headends. This isdue to the following reasons.
The EMM carousel for the local headendis generated on an EMMG that is adja-cent to the local multiplexer. The centralheadend sends the individual EMMs tothe local EMMG without generating thedata carousel itself. This reduces con-nection requirements between the centraland regional headends considerably andmakes the system very robust. A loss ofconnection between the regional headendand a central headend would not mo-mentarily affect users. The EMMs would
continue to be sent normally, although,obviously, new requests could not beprocessed until the communication isrestored. The EMMs from the nationalheadend could be multiplexed with thosegenerated locally.
The ECMs are generated locally, butunder the access conditions laid downby the central headend. In the event ofconnection loss with the local headend,the system could continue to encrypt andchange the control words. To provide
the local ECMG with a service, a cryp-tographic service based on smartcard isincluded (not high-performance co-pro-cessors). The local CS keys are updatedfrom the central CS. The cryptographicoperations for generating the EMMs arecarried out on the central servers.
Although, in principle, a completelycentralised ECM and EMM managementmodel can be used on the central hea-dend, maintaining IP connections with the
local multiplexers, such a model wouldbe highly sensitive to connection lossesbetween both headends and there wouldbe a considerable aggregation of IPtraffic on the central server to support allthe local EMM and ECM carousels. Theproposed solution works well becausethe local headend servers do not haveexcessive performance requirements. Thecommunication between the local andcentral headends is protected by a VPNor an SSH tunnel if the Internet is used.
Is there any limitation to the future
addition of new headends?
KeyFly accepts the possibility of the pro-gressive addition of new headends.
The only requirement is the installation ofa KeyFlyCORE adjacent to the headendmultiplexer and IP connectivity betweenthe said server and the conditional ac-cess management system.
There are no restrictions to the number ofheadends that can be installed.
Can I issue permission without sen-
ding an EMM?
One method for drastically reducingEMM bandwidth and the reception of per-mission without the need for tuning themultiplexer is as follows:
- When the user wants to buy an event,
the STB or iDTV, following instructionsgiven by KeyFly, presents a code the usermust include in the GSM-SMS message,the Internet page or the telephone orderfor purchasing the event.
- In the return SMS message, Internetconfirmation page or when the telephoneorder is confirmed, the user is given a PINnumber which, once entered in a menuon the receiver, activates the purchaseof the requested event. The PIN number
24
7/31/2019 MPKF-WP-08002v1.7 KeyFly 2.0 White Paper English
25/30
SIDSA
KeyFly 2.0Xtreme FAQ
is cryptographically linked to the userdevice serial number and is different foreach event and serial number. There isa limited number of times a PIN numbercan be entered, after which the method isblocked and has to be unblocked by anoperator.
With the above method, EMMs would notbe strictly necessary to activate the rightsand, consequently, event request peaks canbe absorbed. However, user intervention is
necessary. Of course, it would be possibleto combine both methods (PIN and EMM) tocover different types of users.
This method is included in KeyFly 2.0.
Does KeyFly need a specific EPG?
Is it necessary to enter proprietary
information in the tables or generate
proprietary tables?
KeyFly does not have a system for sending
EPG information and does not imposeone. KeyFly does not need to generateproprietary tables or proprietary descri-bers in the EIT tables. The only proprietarydescribers are located in the CAT.
How is the transport stream encrypted?
At transport level, the encryption is perfor-med in DVB-CSA-v1. This task is perfor-med by the multiplexer, with which KeyFlycommunicates using the Simulcrypt proto-col (version 1.3.1) defined by the DVB.
What bitrate overhead applies to the
encryption process?
Encryption overheads.Signalling.CAT: 7 bytes + (4 bytes * numberof providers).PMT: Per encrypted service, 7 bytes.ECM bitrate.
Depends on Simulcrypt parameters. Con-
sumption of 7 kbit/s per service, suppo-sing a repetition period of 250 ms.
What APIs are used to control
KeyFly?
The integration can be performed at KeyFlyManager level or at Subscriber Mana-gerlevel. KeyFly Manager uses an HTTPinterface as an API, on which XML docu-ments are sent with a description of thetransaction that is to be made. The Subs-
criber Manager uses a SOAP interface asan API, where the Subscriber Managerfunctions are offered as web services.
The two APIs use technologies that arewidely used in the computer industry andsupported in the J2EE, .NET or otherprogramming environments. However, bothKeyFly Manager and Subscriber Manage-rare implemented in J2EE.
How do users process registrations
and removals in KeyFly?
The registrations and removals can be ca-rried out by a mobile text message (SMS),a telephone call to a call centre or via anInternet portal. The Graphite CustomerWeb Portal and Graphite SMS Gatewaymodules support the registration and remo-val function over the Internet and by SMS,respectively. For telephone calls, an ope-rator accesses the Graphite SubscriberManager via the Operator Portalto performthe operation required by the user.
Can information be preloaded in
virtual cards (CAM, Kx)?
During the manufacture of client devicesand the phase referred to as personalisa-tion, any additional information that can betransmitted as an EMM can be included.
This includes rights, electronic purse,expiry dates, etc. The only requirement isfor the personalisation phase to be unique.
25
7/31/2019 MPKF-WP-08002v1.7 KeyFly 2.0 White Paper English
26/30
SIDSA
KeyFly 2.0Xtreme FAQ
Subsequently, any updating of this informa-tion would require the sending of an EMM.
What format is used for billing?
The results of the billing queries are deli-vered in XML, which can be transformedinto another format using an XSLT trans-formation to another XML format that canbe used by the entity using the paymentcollection data.
Does the KeyFly management includeuser access profiles?
The implementation of the access profilefunction differs in accordance with eachKeyFly module. In the Graphite SubscriberManager, the administrator can define theoperations that define a profile. For example,the commercial profile can be defined toallow the definition of products, but not ac-cess to the queries or the screens that allowthe processing of a purchase. The profiles
can be fully customised. Of course, varioususers can then be defined with the profile.
Other applications limit access to only thetype of user that is going to access. Forexample, the Customer Web Portal only hasthe end client user type. Other informationthat may require access uses another inter-face or the Subscriber Manager.
How can I supervise and manage
KeyFly?
The CAS platform has web interfaces orremote access available (IP-based proprie-tary interface).
The SAS, CAS, ECMG and EMMGmodules have a specific monitoring andmanagement interface that can be used witha higher hierarchy management system.The protocol used is proprietary protocol.The KeyFly monitor tool enables the con-tinuous monitoring and management ofthese modules.
The Graphite Subscriber Manager, andinterfacing modules are controlled fromthe Tomcat application server manager it-self. There are also applications that checkthe status of these applications and sendan e-mail to report when the applicationshave crashed or generate an error messa-ge. The manager can indicate the requiredlogging level. These logs are stored in aconventional text file.
Support for receivers
Which manufacturers and mo-dels support KeyFly?
KeyFly devices have proven compatibilitywith the majority of the STB and iDTVwith Common Interface in the market.Interoperability with leading IRD ma-nufacturers ensures high-performancehigh-availability professional applica-tions. KeyFly devices support latestbroadcast technologies, such as H.264/
AVC, Dolby digital and High Definition,opening new markets for broadcastersand content providers.
Can KeyFly operate in receivers with MHP?
Yes, as long as the receiver has a com-mon interface bay.
However, the new K2 chip will includeMHEG-5 support, as indicated in theCI+ standard.
Tested receivers include iDTV with MHP(Sony), iDTV without MHP (Panasonic,Sony, Samsung), CI STB without MHPand CI STB with MHP.
How is a receiver certifiedand how long does theprocess take?
Support is provided with the integration.It includes schematics, layout tips andautomatic protocol test suites, which
26
7/31/2019 MPKF-WP-08002v1.7 KeyFly 2.0 White Paper English
27/30
SIDSA
KeyFly 2.0Xtreme FAQ
include a PC programme and transportstreams. Once the automatic test hasbeen passed, the receiver is subjectedto certification tests in our offices.Integration times vary greatly dependingon the resources used by the manufac-turer. Full integration times vary betweenthree weeks and two months.
What does the receiver require tosupport KeyFly?
No special processing requirements aremade of the receiver terminal since all thetransport stream decryption task is perfor-med in the K1, which has all the necessarymemory and CPU.
Can the terminal softwarebe updated?
Traditionally, the updating of terminal (STB)software on a horizontal market is almostimpossible in view of the large number of
models on the market and the fact that theirarchitectural models are not compatible.The terminal software can only be updatedon vertically integrated platforms wherethere are only a few models deployed.
However, in KeyFly, all the client deviceswith K1 support the OTA updating of theinternal firmware. This software is updatedas EMMs sent to the cards. These EMMsare digitally signed and encripted. Byreducing the number of architectures tobe supported, software updating is per-
fectly viable in KeyFly. This is particularlyimportant for the deployment of serviceimprovements and countermeasures.
Can information banners or mes-sages be sent to the user?
On all the KeyFly client devices, it ispossible to present pop-up messagesgenerated by client devices. These pop-upmessages can be sent from the headendand controlled by the operator. The text of
the message is free, but the presentationformat is limited by the receiver specifi-cations (especially those with a commoninterface). This service can be used, forexample, for messaging or chats, as wellas for providing information about specialoffers, etc.
There may be interoperability problemswith the presentation of messages insome (only a few) receivers with a com-mon interface, due exclusively to receiver
limitations. This problem is common to allthe CAMs, regardless of the manufactu-rer.
KeyFly security
How is security implemented inKeyFly CAM?
The K1 has internal flash that provides asecure execution environment. It also hasa keys repository with hardware support
whose content cannot be directly acces-sed by the applications, and standard andhardware-implemented proprietary cryp-tographic co-processors. Each K1 has aunique identifier in a write-protected areathat prevents the cloning of the device.
This set of measures is not only capa-ble of protecting the smartcard commu-nication keys (as in the case of smartcard based CAS), but also allows fullKeyFly support.
The CAMs can be updated by OTA,which allows the deployment of coun-termeasures. KeyFly has a traitor-tracingsystem that determines the origin of thedevice that may have been hacked. Onceidentified, the keys can be changed toexclude the devices that have been identi-fied as compromised. This system can berepeated indefinitely.
Parental control is set on a specific menuthat sets the assigned age above which
27
7/31/2019 MPKF-WP-08002v1.7 KeyFly 2.0 White Paper English
28/30
SIDSA
KeyFly 2.0Xtreme FAQ
an event cannot be seen in the parentalcontrol. Parental control is transmitted inthe ECMs. The parental control configu-ration is changed by a PIN number.
How does KeyFly avoid piracy?
KeyFly security is based on a series ofcryptographic techniques with hardwareand software support. The hardware su-pport (led by the K1) is a differentiating spe-cification offered by SIDSA in its conditional
access. The hardware provides a secureexecution environment that is unbeatable incomparison with those offered by softwaresolutions (which can always be emulated).
KeyFly security is implemented using thefollowing techniques:
1. Tamper-resistant execution means withprotected RAM/flash. The K1 is the firstdevice to decrypt the transport streamdirectly in a secure execution environ-
ment. The flash/RAM embedded in thechip ensures zero user intervention/mo-dification and makes reverse engineeringextremely difficult.
2. Hardware-embedded customised cryp-tographic processes. Besides standardalgorithms, the K1 has its own batch ofhardware-implemented proprietary crypto-graphic algorithms in which the processordoes not have direct access to the keys.
3. Cryptographic implementation with maxi-
mum diversification by device. High-securitykeys. All the K1 chips are diversified toprevent cloning. The length of the keys hasbeen increased to maintain the inviolabilitylevel of the algorithms.
4. Intrusion detection with identification(traitor-tracing). The diversification of thecryptographic devices can be seen in theirexecution profile. This makes it possible toidentify which chips have been attacked andapply specific countermeasures.
5. Constant renewal of cryptographickeys. This makes the cryptanalysis taskeven more difficult due to the short servi-ce life of the keys.
6. Embedded cryptographic softwarerenewal (moving target). This works inconjunction with the previous measure.The idea is not only to resort to armourplating as measure of protection, but alsoto have the system continuously evolvingin its execution environment.
7. Minimum number of possible intrusionchannels. As there are no communicationchannels available for the user (smart-card), the possibility of implementing che-ap illegal decryption solutions is reduced.In any case, as a secure platform, theK1 can process external communicationwith the smartcard without the keysthat protect the communication beingeasily revealed.
All the security, from the processing ofrights and purses to the decryption ofthe transport stream, is processed in onesingle hardware unit.
8. Tamper-resistant headend cryptogra-phic devices. To prevent possible securitybreaches by disloyal headend operators,the headend cryptographic devices alsohave tamper-resistant measures.
Are there any countermeasures?
KeyFly includes the following counter-measures:
1. Key renewal. In the case of intru-sion, the continuous renewal of keyscan adopt a more selective system toeliminate the cards that were originallyused to cryptanalyse the system.
There are 6 key renewal profiles, depen-ding on the compromise between EMMtraffic and security. In the case of intru-
28
7/31/2019 MPKF-WP-08002v1.7 KeyFly 2.0 White Paper English
29/30
SIDSA
sion, the continuous renewal of keys canadopt a more selective system to elimina-te the cards that were originally used tocryptanalyse the system.
2. Substitution of hardware crypto-graphic algorithms. There are variousproprietary hardware cryptographicalgorithms that can be selected at anytime (K1).
3. Downloading/upgrading of CAS
software with frequent updates andspecific countermeasures. The devicesaccept sw-downloading (as long as itis from appropriately certified sources)that enables the deployment of effectivecountermeasures.
KeyFly is based on the idea that the con-ditional access system must be economi-cally unviable for large-scale hacking. Anextremely limited level of hacking could beviable for hackers with a very high level of
technology who are committed to makinghigh investments, but the popularisationof the pirate version of the system is notpossible under any circumstances.
What is KeyFlys roadmap?
The following are the most signifi-cant elements of SIDSAs conditionalaccess roadmap.
K2, new generation of ASIC for condi-tional access, supporting CI+, MHEG-5
interactivity, Ethernet. It will also includeprice improvements in comparison withK1. It is anticipated for Q3/4 of 2008.
Devices based on K2: CAM, USB-CAM,interactive CAM. Q1/2009.
Support for new business models inKeyFly, PIN-based to reduce EMM band-width. Q2/3 2008.
Integration with different payment platforms
KeyFly 2.0Xtreme FAQ
29
and advanced Business Support Systems.
7/31/2019 MPKF-WP-08002v1.7 KeyFly 2.0 White Paper English
30/30
CAS
CRM
CS
DS
DVB
DVB-ASI
DVB-H
DVB-S
DVB-T
DVD
ECM
ECMG
EMM
EMMG
IP
KeyFly
OTA
SAS
SMS
Conditional Access System
Customer Rights Management
Cryptoserver
Downloading System
Digital Video Broadcasting
DVB Asynchronous Serial Interface
DVB Handheld
DVB Satellite
DVB Terrestrial
Digital Versatile Disk
Entitlement Control Management
ECM Generator
Entitlement Message Management
EMM Generator
Internet Protocol
SIDSA product. CAS system
Over The Air. Mechanism to upload newfirmware versions
Subscriber Authorization System
Subscriber Management System
30
Glossary