Content deleted Content added
Adamgoldberg (talk | contribs) DCAS was abandoned in 2009; added that fact with reference, and (attempted) to change discussion into past tense. |
m Cleanup/Typo fixing, typos fixed: A allegedly → An allegedly using AWB |
||
Line 6:
DCAS, as envisioned, removed the need for physical [[set-top box]]es or [[CableCARD]]s to protect [[encryption|encrypted]] digital content. It was proposed that instead of a card with removable circuitry, a custom [[ASIC]] chip could be soldered onto the circuitboard of any digital cable-ready device. DCAS software would then run on this custom chip. Additional circuitry needed to run the OCAP operating system would be required. OCAP programs then would be used as the sole method of interacting with DCAS since it will enable cable companies to force the download of new security software.
The basic purpose of DCAS was to implement DRM protection in software, supported by future OCAP-compliant consumer devices such as [[digital television]]s, [[digital video recorder|DVR]]s, and set-top boxes (still required to support legacy non-OCAP-compliant devices). This would secure the information transmitted in the link between the cable company and the consumer device. Besides decryption, the DCAS software would control how the content is used—whether it must be deleted immediately after viewing, or after a set period of time, which devices it may be transferred to and if transfer or recording is permitted. The scheme could possibly be used more broadly and was being advanced by [[Rupert Murdoch]]'s company [[NDS Group|NDS]] as a DRM method useful also for [[portable media player]]s and other devices not attached to cable networks.
According to Brian Dietz of the National Cable & Telecommunications Association (NCTA):
|