Cisco DNCS System Release 2.8.1 3.8.1 4.3.1 User Guide

Page of 1878
Protect On-Demand Content From Unauthorized Copying
Quick Path - Without RCS: DNCS Administrative Console > Application Interface Modules > BFS
Client > [Expand the OSM File Cabinet] > File > Delete
Quick Path - With RCS: DNCS Administrative Console > Application Interface Modules > Please
select a site > [Select Site] > BFS Client > [Expand the OSM File Cabinet] > File > Delete
To protect the content of an encrypted on-demand source, assign CCI to each segment that provides a service
from this source. This procedure describes how to configure the Set Up Segment window to assign a level of CCI
to an existing segment. To determine the level of security required for each encrypted service you offer to
subscribers, contact your corporate office or the content provider.
Notes:
CCI settings are effective immediately.
In a system where PowerKEY is not used, the provider of the primary conditional access (CA) system is
responsible for delivering CCI data to the DHCT.
A content-protection method is not enforced on OpenCable Host devices that are not running the
PowerTV OS. For example, you may require the HDCP to be always on, but the OpenCable Host may
disable HDCP for Copy Freely content.
Important: If more than one segment has been created from the same source, all segments must have
the same levels of content-protection. Otherwise, content-protection may not work as expected for those
segments.
You Need to Know
For details on these content-protection settings, including the content-protection methods used by output ports
on our DHCTs, see Enabling Content Protection for Broadcast Programming Configuration Guide (part number
4005893). To obtain a copy of this publication, see 
.
Before you begin, contact your corporate office or your content provider to determine the level of security
required for each encrypted service you offer subscribers.
Important: CCI is delivered in the ECM for a program. As a result, it may be applied to any encrypted source.
However, it cannot be applied to a clear source because clear sources do not require ECMs.
Adding security to one segment takes about a minute.
Page  1060