INDEX

Cardless Conditional Access: IC Integration, Modules, and Soft CAS

Worldwide, technology providers are investing their R&D spending to ensure that they can deliver robust security with cardless conditional access systems, with a number of large scale deployments underway. Operators are increasingly considering cardless security as one option that can provide the security level required in many deployment scenarios. They are now evaluating cardless systems on threat resiliency and total cost of the system throughout its forecast lifecycle, as well as secondary factors including impact on marketing and sales channels.

This report relates to Conditional Access Systems (CAS) within Pay TV Systems protected via a set-top box. ABI Research defines protection of content to other video consumption devices (notably, smartphones, tablets, and connected TV technologies including game consoles, smart set-top boxes or digital media adapters, connected TVs, and connected Blu-Ray Players) as Digital Rights Management (DRM). While we recognize some convergence of these solutions, ABI Research continues to distinguish and will research TV Everywhere focused DRM solutions in future reports.

Table of Contents

  • 1. CARDLESS CAS IS NOT ONE-SIZE FITS ALL
    • 1.1. Technologies within the Cardless CAS Space
      • 1.1.1. Intellectual Property / Patent Claims
      • 1.1.2. Security Chip Integrated in Board Manufacturing
      • 1.1.3. Hardware Root of Trust Embedded in CAM
      • 1.1.4. Hardware Root of Trust Embedded in STB SoC (Non Volatile Memory)
      • 1.1.5. Separate Physical Security Processors
      • 1.1.6. Trusted Execution Environments (TEE)
      • 1.1.7. Use of Software Obfuscation for Security
      • 1.1.8. White Box Cryptography
      • 1.1.9. Card Slot for Replacement Security Provisioning
      • 1.1.10. Dynamic Root of Trust Established
      • 1.1.11. Tamper Detection and Prevention
      • 1.1.12. Countermeasures
    • 1.2. Cardless CAS in One-way Networks
      • 1.2.1. Cable
      • 1.2.2. Satellite and Terrestrial
    • 1.3. Cardless CAS in Two-way IPTV Networks
    • 1.4. Cardless CAS in Two-way Cable Networks
    • 1.5. Shift in Threat Profiles
      • 1.5.1. Control Word Sharing
      • 1.5.2. Rebroadcasting of Content
      • 1.5.3. Rise of Watermarking
    • 1.6. Shift of Responsibility up the Supply Chain
  • 2. TIER 1 OPERATORS CHOOSE A PROVIDER FIRST AND PRODUCT SECOND
  • 3. CARDLESS CAS GROWTH STRONGEST IN IPTV AND ASIA-PACIFIC
  • 4. BUT SHIFTS TO LICENSED SOFTWARE AND HARDWARE SECURITY ARE UNDERWAY

Tables

  1. Conditional Access / Digital Rights Management Ownership and Operator Affiliations
  2. Cardless Conditional Access (CAS) Implementations
  3. Hardware and Software IP Approaches

Charts

  1. Cardless CAS Growth by Platform, Millions of Set-Top Boxes, Worldwide, 2011 to 2017
  2. Cardless CAS Penetration by Platform, Worldwide, 2011 to 2017
  3. Cardless CAS Penetration by Geography, Worldwide, 2011 to 2017