Cisco DNCS System Release 2.8.1 3.8.1 4.3.1 User Guide
CCI Impact on Subscribers
CCI is a bit-encoded value associated with specific media content. It is delivered in the ECM for a program and
describes the
describes the
protection that should be applied, it is up to the various software components that receive CCI to implement an
appropriate content-protection method based on the CCI level they receive.
appropriate content-protection method based on the CCI level they receive.
The software components responsible for implementing content protection have some control over the output
devices on various consumer equipment (VCRs and digital recording devices) and on service provider equipment
(DHCTs, CableCARD modules, or tru2way™ hosts). Because each output device, or output port, performs a
unique function and resides on equipment manufactured by diverse vendors, the industry uses a variety of
devices on various consumer equipment (VCRs and digital recording devices) and on service provider equipment
(DHCTs, CableCARD modules, or tru2way™ hosts). Because each output device, or output port, performs a
unique function and resides on equipment manufactured by diverse vendors, the industry uses a variety of
Note: To determine the versions of client software and PowerTV
®
OS that support content protection, contact
.
As the following broad examples show, user impact varies according to the output port to which a subscriber
connects when attempting to record content and how the program content is protected:
connects when attempting to record content and how the program content is protected:
Analog recording: When subscribers attempt to view a content-protected program that was sent
® technology will distort the program so
that it will be unviewable.
Digital recording: When subscribers attempt to view a content-protected program that was sent from
a digital output port, the digital recording device that receives the content will behave as required based
on the
on the
Important: CCI is delivered in the ECM for a program. As a result, it may be applied to any encrypted source.
However, it cannot be applied to a clear source because clear sources do not require ECMs.
However, it cannot be applied to a clear source because clear sources do not require ECMs.
Page 635