Preventing piracy - Conax
Preventing piracy - Conax
Preventing piracy - Conax
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>Preventing</strong> <strong>piracy</strong><br />
Protect yourself to the full<br />
Today most pirates are searching for digital<br />
treasure. Some just want pay-TV services for free,<br />
but plenty more are organised criminals, chasing<br />
the lucrative gains they can make from card sharing<br />
and redistribution of premium content.<br />
The results can be hugely damaging for operators.<br />
Piracy not only threatens your immediate revenues,<br />
it also limits your potential for subscriber growth.
<strong>Conax</strong> has an unprecedented 20-year record in<br />
preventing <strong>piracy</strong> and securing valuable content.<br />
Our goal is to make it impossible for pirates to share<br />
smart cards or to redistribute content in any way.<br />
The key advanced security defences we deploy are:<br />
- <strong>Conax</strong> Chipset Pairing<br />
- <strong>Conax</strong> Fingerprinting<br />
- <strong>Conax</strong> Watermarking<br />
<strong>Conax</strong> Chipset Pairing – securing smart cards<br />
and devices<br />
<strong>Conax</strong> Chipset Pairing is an additional level of<br />
security that protects content all the way through<br />
to the consumer device.<br />
We pioneered the concept of pairing – the<br />
cryptographic coupling between smart cards<br />
and STBs, so that an STB only accepts a smart<br />
card with which it has been paired, effectively<br />
preventing control word sharing.<br />
Our pairing technology prevents STB hijacking,<br />
where STBs are used in operations they were not<br />
licensed for. All major vendors supplying chipsets<br />
for use in STBs have integrated <strong>Conax</strong> Chipset<br />
Pairing. <strong>Conax</strong>-secured chipsets are used in a large<br />
variety of devices, from entry level STBs and<br />
CAMs to the most advanced high-end residential<br />
gateways and connected home devices.<br />
<strong>Conax</strong> Chipset Pairing:<br />
• Prevents control word sharing<br />
• Prevents STB hijacking<br />
• Enables secure authorisation of several devices<br />
in a connected home<br />
Fingerprinting – securing live content<br />
<strong>Conax</strong> Fingerprinting combined with <strong>Conax</strong> Chipset<br />
Pairing is an effective deterrent against pirates<br />
because it allows you to determine the source of<br />
illegal redistribution of live content straightaway.<br />
All you need to do is look at the screen.<br />
We embed a unique subscriber identification<br />
code as a fingerprint at chipset level in the video<br />
stream in order to identify the source device. If live<br />
content is being streamed illegally, the code shows<br />
on the screen. You can then shut down the source<br />
device immediately. Meanwhile the fingerprint<br />
gives you incontrovertible evidence in order to take<br />
action against the perpetrator.<br />
In some countries, fingerprinting is mandated<br />
by law. Many content owners also insist on<br />
fingerprinting technology.<br />
<strong>Conax</strong> Fingerprinting:<br />
• Deters pirates from redistributing live content<br />
• Identifies the source of illegal redistribution<br />
• Furnishes incontrovertible evidence in legal<br />
actions<br />
Watermarking – securing stored content<br />
<strong>Conax</strong> Watermarking identifies subscribers who<br />
illegally copy and redistribute stored content.<br />
It works by integrating the subscriber’s identity<br />
in the video content as a digital watermark.<br />
Using <strong>Conax</strong> Watermarking, you can limit viewing<br />
to devices that are embedded with a watermark.<br />
The watermark is invisible to viewers, but easy to<br />
detect for the operator and available as proof in a<br />
court of law.<br />
<strong>Conax</strong> Watermarking:<br />
• Deters pirates from redistributing stored content<br />
• Identifies the source of illegal redistribution<br />
• Limits viewing to watermark-embedded devices<br />
• Furnishes incontrovertible evidence in legal<br />
actions<br />
www.conax.com