SECURING DIGITAL CONTENT – STRENGTHS and WEAKNESSES of SOFTWARE and HARDWARE IMPLEMENTATIONS Robin Wilson Nagravision Abstract

Total Page:16

File Type:pdf, Size:1020Kb

SECURING DIGITAL CONTENT – STRENGTHS and WEAKNESSES of SOFTWARE and HARDWARE IMPLEMENTATIONS Robin Wilson Nagravision Abstract SECURING DIGITAL CONTENT – STRENGTHS AND WEAKNESSES OF SOFTWARE AND HARDWARE IMPLEMENTATIONS Robin Wilson Nagravision Abstract HARDWARE VS. SOFTWARE SECURITY Conditional Access (CA) and Digital “Overview” Rights Management (DRM) are implemented in a number of ways in software (SW) and The security system relies on a hardware (HW). Often these schemes are computation, or algorithm, to decode the described as either “HW” or “SW” based protected content. security or rights management systems. Since SW requires HW on which to execute, Most digital CA systems employ a unique and HW has necessarily SW running on it, key that enables a successful computation. the terminology is often thoroughly confusing The locations on the Set-Top Box (STB) for and misleading. Since we are not dealing the decoding program and key are a the with locks and keys or hypothetical systems, subject o the hardware and software security both hardware and software elements must designations. be present, and work together smoothly, in any sophisticated content security system. “Software Only” Security Further confounding the confusion is the frequent use (and abuse) of terms like This and other terms like “Hardware- “replaceable”, “renewable”, “obfuscated” less”, “Downloadable” and even and “tamperproof”. In this session, these “Renewable” are used to describe security terms will be explained in the context of systems where the security solution supplied content security. by a CA or DRM company does not include hardware. Here the product of the company may be limited to only software but the TERMINOLOGY AND TECHNOBABLE inference is sometimes wrongly made that no additional resources are required or costs are Before embarking on comparing various incurred. security implementations and trade-offs, we will first define the terminology used. This Software Needs Hardware Too step will help to overcome the ambiguous definitions and terminologies recently Obvious, but software still requires applied under the guise of marketing new hardware for execution. Conventionally this security concepts. hardware is referred to as the CPU. In a security system, hardware security is a significant concern. “Hardware” Security Hardware can be secure or not. Likewise, security software can either be written As we are not discussing security using without concern for potential reverse tumbler locks or brass keys, it should be of engineering or cleverly concealed attacks no surprise that the hardware referred to here within the hardware/system. Efficient is electronic in nature and it runs software! implementations are often a hybrid mix of In many instances, the decoding algorithm is several SW and HW security techniques. programmed into the “hardware” device. SOFTWARE IN A SECURITY SYSTEM Hardware is free? Bug Free (and we really mean free) A further misrepresentation is sometimes made that a so called “SW only” systems A Bug in any software jeopardizes your have zero hardware cost. While it may be hard-earned customer relationship and true that there is no hardware cost in the STB potentially your corporate reputation. While to be passed on by the CA / DRM company, a bug in a security system can be catastrophic someone, usually the operator, pays. and possibly threaten your business. Even a single bug can quickly give hackers many The assertion that CPU cycles are more clues as to how a system operates incrementally free is also misleading. Any compared with months or even years of CPU on any STB is almost always maxed analyzing a bug free system. This is further out. Indeed prior to launch of a new STB or compounded in a security system where a service it is unusual to find less than 110% of bug can be classified as any unplanned CPU resources are already assigned. There is operation regardless of the stimulus. For this a significant opportunity cost and a real cost reason the security of SW has much more to freeing up cycles for security applications. stringent requirements including the need to Even if the security application takes only do nothing when stimulated by any of an 20% of an existing CPU that can become infinite array of malicious or accidental several dollars in additional cost. stimuli. Try requiring that of you web browser! As the computational power of the STB increases and the sophistication of the CA Beyond the impact on the CA system, any system is enhanced to meet ever-growing unplanned and unexpected operations will threats, there is the risk that legacy STB’s impact the viewer. This is likely to have a will be unable to support the CA system negative effect on the viewing experience. necessary to protect content. Small is Good To Summarize: For the reason above and for speed of • Security software runs on hardware operation, bug free security software is best • Security hardware runs software written in very small kernels by very small • Hardware is always required teams with exhaustive regression testing. • Hardware can be secure or insecure • You pay for security hardware even Throwing tens or hundreds of staff at the in a “SW” only system problem will not help. Neither will bloating the code-base with huge code footprint. It is in this area that a few very experienced a temporary or permanent halt to the security programmers can easily out-perform the huge processes. corporations who’s bug ethics are driven by “good enough to ship” or “let the end HARDWARE IN A SECURITY SYSTEM customers find the bugs”. It is easy to see that a large, complex, system presents many Having bug free security SW is useless if more opportunities for error and bugs. the operating states, registers etc, can easily be monitored. While it is well beyond the Isolation scope of this paper to discuss the security philosophies relating to hiding and keeping It is counter-productive to implement tight secrets, having a transparent hardware highly-secure bug-free security kernel only to platform like a generic CPU, where the have other applications sharing CPU or operation and architecture are well memory resources (planned or unplanned). understood, fatally undermines almost any That strategy will totally undermine security. security scheme. Security will be at the mercy of the application suite du-jour. In-turn the QA HW Obfuscation issues of requiring that all the applications sharing the same code and memory space are Just as with SW, in the context of HW the totally bug free make this flawed structure of silicon or functional blocks are implementation unworkable. Security deliberately made non-obvious or non- software needs to be isolated in a protected intuitive to either human or machine. The environment isolated from a hostile memory term camouflage may also be used. Here the and bugs. Denial of visibility and silicon structure is laid out in an apparently accessibility of the CA process is essential to identical manner for many of the building protecting its secrets. blocks and the critical differences are hidden deep inside an obscure silicon structure. SW Obfuscation HW Tamper-proofing This means that the operation or structure Here the goal is to detect any abnormal of the software is deliberately made non- probing of the silicon or functional block. obvious or non-intuitive to either human or Numerous techniques are employed from machine. Although this term has recently detection layers to radiation detectors to gained some use in referring to automated produce electrical anomalies. transformations applied to pure software products like games, the technique has been One common measure employs fuseable in use for more than a decade in CA or DRM links that can be burned away or destroyed systems. after the CA programming is loaded into memory. This makes reading that code and SW Tamper-proofing analyzing the memory structure far more difficult. Here the goal is to detect any abnormal operation in the SW due do any unwelcome As with SW tamper proofing, when an external stimulus. When detected, the attempted intrusion is detected, the tampering tampering will almost always result in either will almost always result in either a temporary or permanent halt to the security Countermeasures processes. The countermeasures feature within the RENEWABILITY – WHAT DOES IT security system allows for secure and REALLY MEAN? validated updates to the current executing version of the security solution. It also Downloadable assists the service provider in detecting and disabling compromised platforms. The downloadable feature within the security system authenticates or identifies a PERFORMANCE CONSIDERATIONS network element i.e. STB, securely communicates a downloadable solution, and Latency launches the solution into a secured environment. Providing an easy-to-use viewing experience is critical to keeping customers Replaceable happy and giving them no reason to look at other methods of content delivery into the This has two possible meanings: home. Although not often thought as a factor in subscriber retention or churn it is 1). Electronic - The replaceable feature important to ensure that viewers are never within the security system revokes the annoyed by additional channel selection current security solution, restores the secure delays. In the new competitive video environment, and securely enables the environment, channel change delays will downloadable feature for the replacement become a differentiating factor for service security solution. providers. 2). Physical – Here a physical device may be Latency in a CA system can be broadly replaced. Replacement is based on proper categorized as two issues: authentication, binding/paring and secure provisioning. Note: this does not always 1). The first is the time taken between a infer that the removal of the previous device. subscriber’s request to view a channel or Physically replaceable hardware cuts both view a stored file and the proper permission ways. It permits total replacement of a communicated to the security process. This compromised CA system but it also permits could be summarized as “checking the cloning of apparently legitimate hardware viewing rights”.
Recommended publications
  • FCC-06-11A1.Pdf
    Federal Communications Commission FCC 06-11 Before the FEDERAL COMMUNICATIONS COMMISSION WASHINGTON, D.C. 20554 In the Matter of ) ) Annual Assessment of the Status of Competition ) MB Docket No. 05-255 in the Market for the Delivery of Video ) Programming ) TWELFTH ANNUAL REPORT Adopted: February 10, 2006 Released: March 3, 2006 Comment Date: April 3, 2006 Reply Comment Date: April 18, 2006 By the Commission: Chairman Martin, Commissioners Copps, Adelstein, and Tate issuing separate statements. TABLE OF CONTENTS Heading Paragraph # I. INTRODUCTION.................................................................................................................................. 1 A. Scope of this Report......................................................................................................................... 2 B. Summary.......................................................................................................................................... 4 1. The Current State of Competition: 2005 ................................................................................... 4 2. General Findings ....................................................................................................................... 6 3. Specific Findings....................................................................................................................... 8 II. COMPETITORS IN THE MARKET FOR THE DELIVERY OF VIDEO PROGRAMMING ......... 27 A. Cable Television Service ..............................................................................................................
    [Show full text]
  • 912Digital Sat Equipment 912-Tt
    DIGITAL SAT EQUIPMENT 912-TT 912 DVB-S/S2 to DVB-T/H with Common Interface transmodulators Description Transmodulator of encrypted satellite digital television services to terrestrial digital television. Each module selects the services of a DVB-S/S2 satellite transponder and includes them in a DVB-T channel. Equipped with a Common Interface slot for insertion of the CAM and the subscriber’s card. Programmable using PC software and a wireless programmer. Applications Collective terrestrial digital television installations where the aim is to distribute encrypted satellite television services while avoiding the installation of satellite receivers. Compatible with all collective TV installations since the channels can be distributed throughout the terrestrial band. TT-211 Characteristics Automatic error-detection system which greatly reduces maintenance work on the installation. Generated output channel of outstanding quality. Does not include the CAM or the decoder card. Zamak chassis with metal side panels. F-type connectors. The equipment can be assembled quickly and easily. CODE 9120147 MODEL TT-211 DVB-S / DVB-S2 DVB-T/DVB-H TV system EN 300421 EN 302307 EN 300744 DVB-S/S2 receiver Frequency range MHz 950 - 2.150 Frequency step KHz 1 +12 LNB power supply mA 350 máx Symbol rate Mbaud 1..45 Diplexing through loss dB±TOL 1.0 ±0,2 DVB-S2 receiver dBμV 45..95 Input level dBm -63..-13 F.E.C. QPSK Auto, 1/2, 3/5, 2/3, 3/4, 4/5 5/6, 8/9, 9/10 DVB: EN 302307 F.E.C. 8PSK Auto, 3/5, 2/3, 3/4, 5/6, 8/9, 9/10 DVB: EN 302307 Roll-Off dB 0,35/0,25/0,20 DVB-S receiver dBμV 40..95 Input level dBm -68..-13 F.E.C.
    [Show full text]
  • Institutionen För Systemteknik Department of Electrical Engineering
    Institutionen för systemteknik Department of Electrical Engineering Examensarbete Analysis of new and alternative encryption algorithms and scrambling methods for digital-tv and implementation of a new scrambling algorithm (AES128) on FPGA Examensarbete utfört i Datorteknik vid Tekniska högskolan vid Linköpings universitet av Gustaf Bengtz LiTH-ISY-EX--14/4791--SE Linköping 2014 Department of Electrical Engineering Linköpings tekniska högskola Linköpings universitet Linköpings universitet SE-581 83 Linköping, Sweden 581 83 Linköping Analysis of new and alternative encryption algorithms and scrambling methods for digital-tv and implementation of a new scrambling algorithm (AES128) on FPGA Examensarbete utfört i Datorteknik vid Tekniska högskolan vid Linköpings universitet av Gustaf Bengtz LiTH-ISY-EX--14/4791--SE Handledare: Oscar Gustafsson isy, Linköpings universitet Patrik Lantto WISI Norden Examinator: Kent Palmkvist isy, Linköpings universitet Linköping, 12 augusti 2014 Avdelning, Institution Datum Division, Department Date Organisatorisk avdelning Department of Electrical Engineering 2014-08-12 SE-581 83 Linköping Språk Rapporttyp ISBN Language Report category — Svenska/Swedish Licentiatavhandling ISRN Engelska/English Examensarbete LiTH-ISY-EX--14/4791--SE C-uppsats Serietitel och serienummer ISSN D-uppsats Title of series, numbering — Övrig rapport URL för elektronisk version Titel Analys av nya alternativa krypteringsalgoritmer och skramblingsmetoder för digital-TV Title samt implementation av en ny skramblingsalgoritm (AES128) på FPGA Analysis of new and alternative encryption algorithms and scrambling methods for digital-tv and implementation of a new scrambling algorithm (AES128) on FPGA Författare Gustaf Bengtz Author Sammanfattning Abstract This report adresses why the currently used scrambling standard CSA needs a replacement. Proposed replacements to CSA are analyzed to some extent, and an alternative replacement (AES128) is analyzed.
    [Show full text]
  • Opencable™ Specifications Opencable Unidirectional Receiver OC-SP-OCUR-I08-081114
    OpenCable™ Specifications OpenCable Unidirectional Receiver OC-SP-OCUR-I08-081114 ISSUED Notice This OpenCable specification is a cooperative effort undertaken at the direction of Cable Television Laboratories, Inc. (CableLabs®) for the benefit of the cable industry. This document may contain references to other documents not owned or controlled by CableLabs. Use and understanding of this document may require access to such other documents. Designing, manufacturing, distributing, using, selling, or servicing products, or providing services, based on this document may require intellectual property licenses for technology referenced in the document. Neither CableLabs, nor any other entity participating in the creation of this document, is responsible for any liability of any nature whatsoever resulting from or arising out of use or reliance upon this document by any party. This document is furnished on an AS-IS basis and neither CableLabs, nor other participating entity, provides any representation or warranty, express or implied, regarding its accuracy, completeness, or fitness for a particular purpose. © Copyright 2005-2008 Cable Television Laboratories, Inc. All rights reserved. OC-SP-OCUR-I08-081114 OpenCable™ Specifications Document Status Sheet Document Control Number: OC-SP-OCUR-I08-081114 Document Title: OpenCable Unidirectional Receiver Revision History: I01 – Released January 9, 2006 I02 – Released February 10, 2006 I03 – Released April 13, 2006 I04 – Released June 22, 2006 I05 – Released October 31, 2006 I06 – Released November 13, 2007 I07 – Released June 20, 2008 I08 – Released November 14, 2008 Date: November 14, 2008 Status: Work in Draft Issued Closed Progress Distribution Restrictions: Author CL/Member CL/ Member/ Public Only Vendor Key to Document Status Codes: Work in Progress An incomplete document, designed to guide discussion and generate feedback that may include several alternative requirements for consideration.
    [Show full text]
  • Brute-Force Angriff Auf DVB-CSA1 Mithilfe Eines Preisgünstigen FPGA-Clusters
    Brute-force Angriff auf DVB-CSA1 mithilfe eines preisgünstigen FPGA-Clusters BACHELORARBEIT zur Erlangung des akademischen Grades Bachelor of Science im Rahmen des Studiums Technische Informatik eingereicht von Ioannis Daktylidis Matrikelnummer 1128193 an der Fakultät für Informatik der Technischen Universität Wien Betreuung: Ao.Univ.-Prof. DI Dr. Wolfgang KASTNER Mitwirkung: DI Dr. Markus Kammerstetter Wien, 15. April 2017 Ioannis Daktylidis Wolfgang KASTNER Technische Universität Wien A-1040 Wien Karlsplatz 13 Tel. +43-1-58801-0 www.tuwien.ac.at Brute-force Attacks on DVB-CSA1 using a low-cost FPGA-Cluster BACHELOR’S THESIS submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Engineering by Ioannis Daktylidis Registration Number 1128193 to the Faculty of Informatics at the TU Wien Advisor: Ao.Univ.-Prof. DI Dr. Wolfgang KASTNER Assistance: DI Dr. Markus Kammerstetter Vienna, 15th April, 2017 Ioannis Daktylidis Wolfgang KASTNER Technische Universität Wien A-1040 Wien Karlsplatz 13 Tel. +43-1-58801-0 www.tuwien.ac.at Erklärung zur Verfassung der Arbeit Ioannis Daktylidis [email protected] Hiermit erkläre ich, dass ich diese Arbeit selbständig verfasst habe, dass ich die verwendeten Quellen und Hilfs- mittel vollständig angegeben habe und dass ich die Stellen der Arbeit – einschließlich Tabellen, Karten und Abbildungen –, die anderen Werken oder dem Internet im Wortlaut oder dem Sinn nach entnommen sind, auf jeden Fall unter Angabe der Quelle als Entlehnung kenntlich gemacht habe. Wien, 15. April 2017 Ioannis Daktylidis iii Abstract The DVB Common Scrambling Algorithm (CSA) is widely used to encrypt PayTV MPEG transport streams around the world.
    [Show full text]
  • Tr 101 532 V1.1.1 (2015-02)
    ETSI TR 101 532 V1.1.1 (2015-02) TECHNICAL REPORT End-to-End Network Architectures (E2NA); Mechanisms addressing interoperability of multimedia service and content distribution and consumption with respect to CA/DRM solutions 2 ETSI TR 101 532 V1.1.1 (2015-02) Reference DTR/E2NA-00004-CA-DRM-interop Keywords CA, DRM, interoperability, terminal ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice The present document can be downloaded from: http://www.etsi.org/standards-search The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: https://portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI.
    [Show full text]
  • Copyright and DRM
    CHAPTER 22 Copyright and DRM The DeCSS case is almost certainly a harbinger of what I would consider to be the defining battle of censorship in cyberspace. In my opinion, this will not be fought over pornography, neo-Nazism, bomb design, blasphemy, or political dissent. Instead, the Armageddon of digital control, the real death match between the Party of the Past and Party of the Future, will be fought over copyright. — John Perry Barlow Be very glad that your PC is insecure — it means that after you buy it, you can break into it and install whatever software you want. What YOU want, not what Sony or Warner or AOL wants. — John Gilmore 22.1 Introduction Copyright, and digital rights management (DRM), have been among the most contentious issues of the digital age. At the political level, there is the conflict alluded to by Barlow in the above quotation. The control of information has been near the centre of government concerns since before William Tyndale (one of the founders of the Cambridge University Press) was burned at the stake for printing the Bible in English. The sensitivity continued through the estab- lishment of modern copyright law starting with the Statute of Anne in 1709, through the eighteenth century battles over press censorship, to the Enlight- enment and the framing of the U.S. Constitution. The link between copyright and censorship is obscured by technology from time to time, but has a habit of reappearing. Copyright mechanisms exist to keep information out of the hands of people who haven’t paid for it, while censors keep information out of the hands of people who satisfy some other criterion.
    [Show full text]
  • Smartright: a Copy Protection System for Digital Home Networks Jean-Pierre Andreaux, Alain Durand, Teddy Furon, Eric Diehl
    SmartRight: A Copy Protection System for Digital Home Networks Jean-Pierre Andreaux, Alain Durand, Teddy Furon, Eric Diehl To cite this version: Jean-Pierre Andreaux, Alain Durand, Teddy Furon, Eric Diehl. SmartRight: A Copy Protection System for Digital Home Networks. IEEE Signal Processing Magazine, Institute of Electrical and Electronics Engineers, 2004, 21 (2), pp.100–108. inria-00083200 HAL Id: inria-00083200 https://hal.inria.fr/inria-00083200 Submitted on 29 Jun 2006 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. SmartRight: A Copy Protection System for Digital Home Networks Jean-Pierre Andreaux1, Alain Durand1, Teddy Furon2 and Eric Diehl1 1 THOMSON multimedia R&D France, Rennes, France {jean-pierre.andreaux, alain.durand, eric.diehl}@thomson.net, 2 INRIA / TEMICS, Rennes, France [email protected] Abstract This paper describes the rationales supporting the design of a Copy Protection System. It reflects the experience of the Security Laboratory of Thomson in the development of SmartRight. This paper does not only account the chosen technical solutions. It also explores less technical but highly important issues such as the social, legal and commercial aspects. Hence, while carefully developing our motivations, some light is shed on the very peculiar problems raised by the enforcement of copy protection.
    [Show full text]
  • Case 2:16-Cv-01362-JRG Document 101 Filed 08/16/17 Page 1 of 46 Pageid #: 2460
    Case 2:16-cv-01362-JRG Document 101 Filed 08/16/17 Page 1 of 46 PageID #: 2460 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF TEXAS MARSHALL DIVISION NAGRAVISION SA and NAGRA FRANCE SAS, Plaintiffs, Case No.: 2:16-cv-1362-JRG vs. JURY TRIAL DEMANDED COMCAST CABLE COMMUNICATIONS, LLC, Defendant. SECOND AMENDED COMPLAINT FOR PATENT INFRINGEMENT Plaintiffs Nagravision SA and Nagra France SAS (collectively, “Plaintiffs”), by and through their undersigned attorneys, for their Second Amended Complaint against Defendant Comcast Cable Communications, LLC (“Defendant” or “Comcast”), hereby allege as follows, upon actual knowledge with respect to themselves and their own acts, and upon information and belief as to all other matters: NATURE OF THE ACTION 1. Plaintiffs bring this patent infringement action to stop Comcast from continuing its wrongful and unlicensed use of Plaintiffs’ patented technologies in its products and services, including Xfinity digital video, audio, and other content services (or any predecessor services) provided to Comcast’s customers with the Xfinity set-top boxes and other hardware provided to Comcast’s customers. 2. Comcast infringes the following of Plaintiffs’ United States Patents, which are attached hereto as Exhibits A, B, and C (collectively “the Asserted Patents”): Case 2:16-cv-01362-JRG Document 101 Filed 08/16/17 Page 2 of 46 PageID #: 2461 • U.S. Patent No. 7,725,740 (“the ’740 Patent”); • U.S. Patent No. 8,356,188 (“the ’188 Patent”); and • U.S. Patent No. RE40,334 (“the ’334 Patent”). 3. Comcast directly and indirectly infringes the Asserted Patents by making, using, testing, importing, offering for sale/lease, selling, and leasing infringing products and services to Comcast’s customers.
    [Show full text]
  • Digital Satellite Receiver / Video Cassette Recorder
    DIGITAL SATELLITE RECEIVER / VIDEO CASSETTE RECORDER OWNER'S MANUAL MODEL : LSV-701W LSV-700W PAL Before connecting, operating or adjusting this product, please read this instruction booklet carefully and completely. Safety Precautions / Notes on using this unit SERIAL NUMBER: The serial number is found on the back of CAUTION this unit. This number is unique to this unit and not available to RISK OF ELECTRIC SHOCK. others. DO NOT OPEN. Model No. ___________________________________ Serial No. CAUTION: TO REDUCE THE RISK ___________________________________ OF ELECTRIC SHOCK DO NOT REMOVE COVER (OR BACK). NO USER-SERVICEABLE PARTS INSIDE. Features: REFER SERVICING TO QUALIFIED SERVICE ? Brilliant On Screen Graphic PERSONNEL. ? MPEG-2 & Fully DVB Compliant ? MPEG-2 Video ( MP@ML), MPEG-1 Audio Layer1, Layer2 This flash with arrowhead within lightning symbol ?PLLRF-ModulatorUHF30~40withPALI/G/B/D/K an equilateral triangle is intended to alert the user ? LNB Controlling Logic (0/22KHz Tone, 13/18V, 14/19V) to the presence of uninsulated dangerous voltage ? within the product's enclosure that may be of SCPS/MCPC Receivable from C /Ku-Band Satellites sufficient to constitute a risk of electric ? magnitude Digital Tuner with Loop-through shock to persons. ? Wide Symbol Rate 1~45Msps & Frequency Input 950~2150MHz The exclamation mark within an equilateral triangle ? 1.2 is intended to alert the user to the presence of DiSEqC Supported important operating and maintenance (servicing) ?1SCARTforTV instructions in the literature the accompanying ? User friendly OSD Menu with Full Function product. ? 256 Colors Graphic User Interface WARNING: TO REDUCE THE RISK OF FIRE OR ELEC- ? Multi-language Menu TRIC SHOCK, DO NOT EXPOSE THIS PRODUCT TO ? LED Display RAIN OR MOISTURE.
    [Show full text]
  • Etsi Tr 101 532 V1.1.2 (2015-03)
    ETSI TR 101 532 V1.1.2 (2015-03) TECHNICAL REPORT End-to-End Network Architectures (E2NA); Mechanisms addressing interoperability of multimedia service and content distribution and consumption with respect to CA/DRM solutions 2 ETSI TR 101 532 V1.1.2 (2015-03) Reference RTR/E2NA-00007-CA-DRM-interop Keywords CA, DRM, interoperability, terminal ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice The present document can be downloaded from: http://www.etsi.org/standards-search The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: https://portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI.
    [Show full text]
  • Dsr 3700(Fta) / Dsr 3800(Ci)
    DSR 3700(FTA) / DSR 3800(CI) DSR 3700: Digital Free To Air Satellite Receiver DSR 3800: Digital Satellite Receiver with Dual Common Interface Slots Technical Specifications SYSTEM CAPABILITY RCA CONNECTOR MPEG-2 Digital & Fully DVB Compliant Output Video, Audio L/R TUNER PART RF MODULATOR Modulation QPSK Output Level 65~75dB FEC Reed Solomon + Viterbi Output CH3, CH4 Symbol Rate 2~45 MSys/S(SCPC/MCPC) System NTSC Convolution Code 1/2, 2/3, 3/4, 5/6, 7/8 Audio MlX MONO Input Frequency 950~2150MHz LNB Power Control 13V/18V, 22KHz Tone SERIAL DATA INTERFACE DiSEqC 1.2 Supported Connector 9-pin D-sub Female Signal RS232 Specification DESCRAMBLER Data Transfer Rate 115.2 Kbps Max Scrambling System DVB Common Scrambling Algorithm GENERAL FEATURE Embedded Conditional Access System Viaccess (two slots) Full Function lnfra-Red Remote Control Unit Common interface 2 Dimension 351 225 61mm (Supported Module: Nagravision, Conax, Cryptoworks, Viaccess, lrdeto, Seca) Full Tuner Loop Through Power Supply AC 120V~ SOFTWARE UPDATE Voltage Frequency 60Hz Update software over the air(Astra, Hotbird, Sirius) OTHER FEATURES APPLICATION SYSTEM RESOURCES 9 Favorite lists for TV and Radio each Main CPU 16bit RISC CPU Advanced Electronic Program Guide FLASH 2Mbyte - Auto update EPG - Adjustable Time Interval SDRAM 8Mbyte S-VHS(Y, C) Video Track selected for multi-video programs VIDEO DECODER Timer function supported Decompression MPEG2: Main Profile SMATV scanning in terms of frequency or symbol rate @Main Level Positioner and DiSEqC switch available at the same time Video Transfer Rate Up to 15Mbit/sec Adjustable OSD transparency Picture Resolution 720pixel 576lines Adjustable timeout for channel information 720pixel 480lines NVOD programs supported Aspect Ratio 4 : 3, 16 : 9 Letter Box, Pan & Scan, Mixed, Full Decoding Subtitle Supported Decoding MPEG Still Supported On Screen Display Graphics 16 bit colors AUDIO DECODER Decompression MPEG 1, Layer 1,2 Sampling Frequency 32, 44.1, 48KHz Operation Mode STEREO, DUAL, MONO, JOINT STEREO Distributed by: SAMSUNG ELECTRONICS CO.,LTD.
    [Show full text]